Chromium Code Reviews| Index: chrome/browser/extensions/content_script_apitest.cc |
| diff --git a/chrome/browser/extensions/content_script_apitest.cc b/chrome/browser/extensions/content_script_apitest.cc |
| index 4063d55b2426b0f91e117eca713d5dba2d45e9f1..863518ac8924f56209202ceb3530642867eea50b 100644 |
| --- a/chrome/browser/extensions/content_script_apitest.cc |
| +++ b/chrome/browser/extensions/content_script_apitest.cc |
| @@ -419,6 +419,18 @@ IN_PROC_BROWSER_TEST_F(ExtensionApiTestWithManagementPolicy, |
| ASSERT_TRUE(RunExtensionTest("content_scripts/policy")) << message_; |
| } |
| +IN_PROC_BROWSER_TEST_F(ExtensionApiTestWithManagementPolicy, |
| + ContentScriptPolicyWildcard) { |
| + // Set enterprise policy to block injection to policy specified hosts. |
| + // Verifies wildcard can be used for effecitve TLD. |
|
lazyboy
2017/06/30 20:43:22
Move this line as a test description before line 4
nrpeter
2017/06/30 21:22:15
Done.
|
| + { |
| + ExtensionManagementPolicyUpdater pref(&policy_provider_); |
| + pref.AddRuntimeBlockedHost("*", "*://example.*"); |
| + } |
| + ASSERT_TRUE(StartEmbeddedTestServer()); |
| + ASSERT_TRUE(RunExtensionTest("content_scripts/policy")) << message_; |
| +} |
| + |
| IN_PROC_BROWSER_TEST_P(ContentScriptApiTest, ContentScriptBypassPageCSP) { |
| ASSERT_TRUE(StartEmbeddedTestServer()); |
| ASSERT_TRUE(RunExtensionTest("content_scripts/bypass_page_csp")) << message_; |