| Index: chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc
|
| diff --git a/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc b/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc
|
| index b289b8faeab17f393adf2e0c9b5a575eb3ebdcb6..ca96634717b842122a5e944a1813c18c633b0ac5 100644
|
| --- a/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc
|
| +++ b/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc
|
| @@ -74,20 +74,24 @@ TEST_F(BrowserPermissionsPolicyDelegateTest, CanExecuteScriptOnPage) {
|
|
|
| // The same call should succeed with a normal process, but fail with a signin
|
| // process.
|
| - EXPECT_TRUE(PermissionsData::CanExecuteScriptOnPage(extension.get(),
|
| - kSigninUrl,
|
| - kSigninUrl,
|
| - -1,
|
| - NULL,
|
| - normal_process.GetID(),
|
| - &error)) << error;
|
| - EXPECT_FALSE(PermissionsData::CanExecuteScriptOnPage(extension.get(),
|
| + const PermissionsData* permissions_data =
|
| + PermissionsData::ForExtension(extension);
|
| + EXPECT_TRUE(permissions_data->CanExecuteScriptOnPage(extension,
|
| kSigninUrl,
|
| kSigninUrl,
|
| -1,
|
| NULL,
|
| - signin_process.GetID(),
|
| - &error)) << error;
|
| + normal_process.GetID(),
|
| + &error))
|
| + << error;
|
| + EXPECT_FALSE(permissions_data->CanExecuteScriptOnPage(extension,
|
| + kSigninUrl,
|
| + kSigninUrl,
|
| + -1,
|
| + NULL,
|
| + signin_process.GetID(),
|
| + &error))
|
| + << error;
|
| }
|
| #endif
|
|
|
|
|