| Index: chrome/browser/extensions/content_script_apitest.cc
|
| diff --git a/chrome/browser/extensions/content_script_apitest.cc b/chrome/browser/extensions/content_script_apitest.cc
|
| index 4063d55b2426b0f91e117eca713d5dba2d45e9f1..242b99ddbed745b2542336ab3d686dc2684d782e 100644
|
| --- a/chrome/browser/extensions/content_script_apitest.cc
|
| +++ b/chrome/browser/extensions/content_script_apitest.cc
|
| @@ -419,6 +419,18 @@ IN_PROC_BROWSER_TEST_F(ExtensionApiTestWithManagementPolicy,
|
| ASSERT_TRUE(RunExtensionTest("content_scripts/policy")) << message_;
|
| }
|
|
|
| +// Verifies wildcard can be used for effecitve TLD.
|
| +IN_PROC_BROWSER_TEST_F(ExtensionApiTestWithManagementPolicy,
|
| + ContentScriptPolicyWildcard) {
|
| + // Set enterprise policy to block injection to policy specified hosts.
|
| + {
|
| + ExtensionManagementPolicyUpdater pref(&policy_provider_);
|
| + pref.AddRuntimeBlockedHost("*", "*://example.*");
|
| + }
|
| + ASSERT_TRUE(StartEmbeddedTestServer());
|
| + ASSERT_TRUE(RunExtensionTest("content_scripts/policy")) << message_;
|
| +}
|
| +
|
| IN_PROC_BROWSER_TEST_P(ContentScriptApiTest, ContentScriptBypassPageCSP) {
|
| ASSERT_TRUE(StartEmbeddedTestServer());
|
| ASSERT_TRUE(RunExtensionTest("content_scripts/bypass_page_csp")) << message_;
|
|
|