Index: chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc |
diff --git a/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc b/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc |
index b289b8faeab17f393adf2e0c9b5a575eb3ebdcb6..ca96634717b842122a5e944a1813c18c633b0ac5 100644 |
--- a/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc |
+++ b/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc |
@@ -74,20 +74,24 @@ TEST_F(BrowserPermissionsPolicyDelegateTest, CanExecuteScriptOnPage) { |
// The same call should succeed with a normal process, but fail with a signin |
// process. |
- EXPECT_TRUE(PermissionsData::CanExecuteScriptOnPage(extension.get(), |
- kSigninUrl, |
- kSigninUrl, |
- -1, |
- NULL, |
- normal_process.GetID(), |
- &error)) << error; |
- EXPECT_FALSE(PermissionsData::CanExecuteScriptOnPage(extension.get(), |
+ const PermissionsData* permissions_data = |
+ PermissionsData::ForExtension(extension); |
+ EXPECT_TRUE(permissions_data->CanExecuteScriptOnPage(extension, |
kSigninUrl, |
kSigninUrl, |
-1, |
NULL, |
- signin_process.GetID(), |
- &error)) << error; |
+ normal_process.GetID(), |
+ &error)) |
+ << error; |
+ EXPECT_FALSE(permissions_data->CanExecuteScriptOnPage(extension, |
+ kSigninUrl, |
+ kSigninUrl, |
+ -1, |
+ NULL, |
+ signin_process.GetID(), |
+ &error)) |
+ << error; |
} |
#endif |