Index: chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc |
diff --git a/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc b/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc |
index 5df284b55b63d5be0be834780a18ba36f29a8082..50278908f83fe53878a59678390565f9eb0147b7 100644 |
--- a/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc |
+++ b/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc |
@@ -95,8 +95,6 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) { |
const char* const non_sensitive_urls[] = { |
"http://www.google.com/" |
}; |
- const int kSigninProcessId = 99; |
- extension_info_map_->SetSigninProcess(kSigninProcessId); |
// Check that requests are rejected based on the destination |
for (size_t i = 0; i < arraysize(sensitive_urls); ++i) { |
@@ -145,25 +143,6 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) { |
EXPECT_TRUE(WebRequestPermissions::HideRequest( |
extension_info_map_.get(), sensitive_request.get())); |
} |
- // If the process is the signin process, it becomes protected. |
- { |
- int process_id = kSigninProcessId; |
- int view_id = 19; |
- scoped_ptr<net::URLRequest> sensitive_request(context.CreateRequest( |
- non_sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL)); |
- ResourceRequestInfo::AllocateForTesting(sensitive_request.get(), |
- content::RESOURCE_TYPE_SCRIPT, |
- NULL, |
- process_id, |
- view_id, |
- MSG_ROUTING_NONE, |
- false, // is_main_frame |
- false, // parent_is_main_frame |
- true, // allow_download |
- false); // is_async |
- EXPECT_TRUE(WebRequestPermissions::HideRequest( |
- extension_info_map_.get(), sensitive_request.get())); |
- } |
} |
TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, |