Index: chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc |
diff --git a/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc b/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc |
index 6c7e8d4aacc6dc077c197ae4643e68764d0f10d8..aba1f6f0a03066dbef5a0859934a09dd7dbb0cee 100644 |
--- a/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc |
+++ b/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc |
@@ -75,21 +75,19 @@ TEST_F(BrowserPermissionsPolicyDelegateTest, CanExecuteScriptOnPage) { |
// The same call should succeed with a normal process, but fail with a signin |
// process. |
const PermissionsData* permissions_data = extension->permissions_data(); |
- EXPECT_TRUE(permissions_data->CanExecuteScriptOnPage(extension, |
- kSigninUrl, |
- kSigninUrl, |
- -1, |
- NULL, |
- normal_process.GetID(), |
- &error)) |
+ EXPECT_TRUE(permissions_data->CanAccessPage(extension, |
+ kSigninUrl, |
+ kSigninUrl, |
+ -1, // no tab id. |
+ normal_process.GetID(), |
+ &error)) |
<< error; |
- EXPECT_FALSE(permissions_data->CanExecuteScriptOnPage(extension, |
- kSigninUrl, |
- kSigninUrl, |
- -1, |
- NULL, |
- signin_process.GetID(), |
- &error)) |
+ EXPECT_FALSE(permissions_data->CanAccessPage(extension, |
+ kSigninUrl, |
+ kSigninUrl, |
+ -1, // no tab id. |
+ signin_process.GetID(), |
+ &error)) |
<< error; |
} |
#endif |