OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/common/extensions/extension.h" | 5 #include "chrome/common/extensions/extension.h" |
6 | 6 |
7 #include "base/format_macros.h" | 7 #include "base/format_macros.h" |
8 #include "base/file_path.h" | 8 #include "base/file_path.h" |
9 #include "base/file_util.h" | 9 #include "base/file_util.h" |
10 #include "base/json/json_file_value_serializer.h" | 10 #include "base/json/json_file_value_serializer.h" |
(...skipping 597 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
608 #endif | 608 #endif |
609 } | 609 } |
610 | 610 |
611 TEST(ExtensionTest, WantsFileAccess) { | 611 TEST(ExtensionTest, WantsFileAccess) { |
612 scoped_refptr<Extension> extension; | 612 scoped_refptr<Extension> extension; |
613 GURL file_url("file:///etc/passwd"); | 613 GURL file_url("file:///etc/passwd"); |
614 | 614 |
615 // <all_urls> permission | 615 // <all_urls> permission |
616 extension = LoadManifest("permissions", "permissions_all_urls.json"); | 616 extension = LoadManifest("permissions", "permissions_all_urls.json"); |
617 EXPECT_TRUE(extension->wants_file_access()); | 617 EXPECT_TRUE(extension->wants_file_access()); |
618 EXPECT_FALSE(extension->CanExecuteScriptOnPage(file_url, NULL, NULL)); | 618 EXPECT_FALSE(extension->CanExecuteScriptOnPage(file_url, -1, NULL, NULL)); |
619 extension = LoadManifest( | 619 extension = LoadManifest( |
620 "permissions", "permissions_all_urls.json", Extension::ALLOW_FILE_ACCESS); | 620 "permissions", "permissions_all_urls.json", Extension::ALLOW_FILE_ACCESS); |
621 EXPECT_TRUE(extension->wants_file_access()); | 621 EXPECT_TRUE(extension->wants_file_access()); |
622 EXPECT_TRUE(extension->CanExecuteScriptOnPage(file_url, NULL, NULL)); | 622 EXPECT_TRUE(extension->CanExecuteScriptOnPage(file_url, -1, NULL, NULL)); |
623 | 623 |
624 // file:///* permission | 624 // file:///* permission |
625 extension = LoadManifest("permissions", "permissions_file_scheme.json"); | 625 extension = LoadManifest("permissions", "permissions_file_scheme.json"); |
626 EXPECT_TRUE(extension->wants_file_access()); | 626 EXPECT_TRUE(extension->wants_file_access()); |
627 EXPECT_FALSE(extension->CanExecuteScriptOnPage(file_url, NULL, NULL)); | 627 EXPECT_FALSE(extension->CanExecuteScriptOnPage(file_url, -1, NULL, NULL)); |
628 extension = LoadManifest("permissions", "permissions_file_scheme.json", | 628 extension = LoadManifest("permissions", "permissions_file_scheme.json", |
629 Extension::ALLOW_FILE_ACCESS); | 629 Extension::ALLOW_FILE_ACCESS); |
630 EXPECT_TRUE(extension->wants_file_access()); | 630 EXPECT_TRUE(extension->wants_file_access()); |
631 EXPECT_TRUE(extension->CanExecuteScriptOnPage(file_url, NULL, NULL)); | 631 EXPECT_TRUE(extension->CanExecuteScriptOnPage(file_url, -1, NULL, NULL)); |
632 | 632 |
633 // http://* permission | 633 // http://* permission |
634 extension = LoadManifest("permissions", "permissions_http_scheme.json"); | 634 extension = LoadManifest("permissions", "permissions_http_scheme.json"); |
635 EXPECT_FALSE(extension->wants_file_access()); | 635 EXPECT_FALSE(extension->wants_file_access()); |
636 EXPECT_FALSE(extension->CanExecuteScriptOnPage(file_url, NULL, NULL)); | 636 EXPECT_FALSE(extension->CanExecuteScriptOnPage(file_url, -1, NULL, NULL)); |
637 extension = LoadManifest("permissions", "permissions_http_scheme.json", | 637 extension = LoadManifest("permissions", "permissions_http_scheme.json", |
638 Extension::ALLOW_FILE_ACCESS); | 638 Extension::ALLOW_FILE_ACCESS); |
639 EXPECT_FALSE(extension->wants_file_access()); | 639 EXPECT_FALSE(extension->wants_file_access()); |
640 EXPECT_FALSE(extension->CanExecuteScriptOnPage(file_url, NULL, NULL)); | 640 EXPECT_FALSE(extension->CanExecuteScriptOnPage(file_url, -1, NULL, NULL)); |
641 | 641 |
642 // <all_urls> content script match | 642 // <all_urls> content script match |
643 extension = LoadManifest("permissions", "content_script_all_urls.json"); | 643 extension = LoadManifest("permissions", "content_script_all_urls.json"); |
644 EXPECT_TRUE(extension->wants_file_access()); | 644 EXPECT_TRUE(extension->wants_file_access()); |
645 EXPECT_FALSE(extension->CanExecuteScriptOnPage( | 645 EXPECT_FALSE(extension->CanExecuteScriptOnPage( |
646 file_url, &extension->content_scripts()[0], NULL)); | 646 file_url, -1, &extension->content_scripts()[0], NULL)); |
647 extension = LoadManifest("permissions", "content_script_all_urls.json", | 647 extension = LoadManifest("permissions", "content_script_all_urls.json", |
648 Extension::ALLOW_FILE_ACCESS); | 648 Extension::ALLOW_FILE_ACCESS); |
649 EXPECT_TRUE(extension->wants_file_access()); | 649 EXPECT_TRUE(extension->wants_file_access()); |
650 EXPECT_TRUE(extension->CanExecuteScriptOnPage( | 650 EXPECT_TRUE(extension->CanExecuteScriptOnPage( |
651 file_url, &extension->content_scripts()[0], NULL)); | 651 file_url, -1, &extension->content_scripts()[0], NULL)); |
652 | 652 |
653 // file:///* content script match | 653 // file:///* content script match |
654 extension = LoadManifest("permissions", "content_script_file_scheme.json"); | 654 extension = LoadManifest("permissions", "content_script_file_scheme.json"); |
655 EXPECT_TRUE(extension->wants_file_access()); | 655 EXPECT_TRUE(extension->wants_file_access()); |
656 EXPECT_FALSE(extension->CanExecuteScriptOnPage( | 656 EXPECT_FALSE(extension->CanExecuteScriptOnPage( |
657 file_url, &extension->content_scripts()[0], NULL)); | 657 file_url, -1, &extension->content_scripts()[0], NULL)); |
658 extension = LoadManifest("permissions", "content_script_file_scheme.json", | 658 extension = LoadManifest("permissions", "content_script_file_scheme.json", |
659 Extension::ALLOW_FILE_ACCESS); | 659 Extension::ALLOW_FILE_ACCESS); |
660 EXPECT_TRUE(extension->wants_file_access()); | 660 EXPECT_TRUE(extension->wants_file_access()); |
661 EXPECT_TRUE(extension->CanExecuteScriptOnPage( | 661 EXPECT_TRUE(extension->CanExecuteScriptOnPage( |
662 file_url, &extension->content_scripts()[0], NULL)); | 662 file_url, -1, &extension->content_scripts()[0], NULL)); |
663 | 663 |
664 // http://* content script match | 664 // http://* content script match |
665 extension = LoadManifest("permissions", "content_script_http_scheme.json"); | 665 extension = LoadManifest("permissions", "content_script_http_scheme.json"); |
666 EXPECT_FALSE(extension->wants_file_access()); | 666 EXPECT_FALSE(extension->wants_file_access()); |
667 EXPECT_FALSE(extension->CanExecuteScriptOnPage( | 667 EXPECT_FALSE(extension->CanExecuteScriptOnPage( |
668 file_url, &extension->content_scripts()[0], NULL)); | 668 file_url, -1, &extension->content_scripts()[0], NULL)); |
669 extension = LoadManifest("permissions", "content_script_http_scheme.json", | 669 extension = LoadManifest("permissions", "content_script_http_scheme.json", |
670 Extension::ALLOW_FILE_ACCESS); | 670 Extension::ALLOW_FILE_ACCESS); |
671 EXPECT_FALSE(extension->wants_file_access()); | 671 EXPECT_FALSE(extension->wants_file_access()); |
672 EXPECT_FALSE(extension->CanExecuteScriptOnPage( | 672 EXPECT_FALSE(extension->CanExecuteScriptOnPage( |
673 file_url, &extension->content_scripts()[0], NULL)); | 673 file_url, -1, &extension->content_scripts()[0], NULL)); |
674 } | 674 } |
675 | 675 |
676 TEST(ExtensionTest, ExtraFlags) { | 676 TEST(ExtensionTest, ExtraFlags) { |
677 scoped_refptr<Extension> extension; | 677 scoped_refptr<Extension> extension; |
678 extension = LoadManifest("app", "manifest.json", Extension::FROM_WEBSTORE); | 678 extension = LoadManifest("app", "manifest.json", Extension::FROM_WEBSTORE); |
679 EXPECT_TRUE(extension->from_webstore()); | 679 EXPECT_TRUE(extension->from_webstore()); |
680 | 680 |
681 extension = LoadManifest("app", "manifest.json", Extension::FROM_BOOKMARK); | 681 extension = LoadManifest("app", "manifest.json", Extension::FROM_BOOKMARK); |
682 EXPECT_TRUE(extension->from_bookmark()); | 682 EXPECT_TRUE(extension->from_bookmark()); |
683 | 683 |
684 extension = LoadManifest("app", "manifest.json", Extension::NO_FLAGS); | 684 extension = LoadManifest("app", "manifest.json", Extension::NO_FLAGS); |
685 EXPECT_FALSE(extension->from_bookmark()); | 685 EXPECT_FALSE(extension->from_bookmark()); |
686 EXPECT_FALSE(extension->from_webstore()); | 686 EXPECT_FALSE(extension->from_webstore()); |
687 } | 687 } |
688 | 688 |
689 // Base class for testing the CanExecuteScriptOnPage and CanCaptureVisiblePage | 689 // Base class for testing the CanExecuteScriptOnPage and CanCaptureVisiblePage |
690 // methods of Extension for extensions with various permissions. | 690 // methods of Extension for extensions with various permissions. |
691 class ExtensionScriptAndCaptureVisibleTest : public testing::Test { | 691 class ExtensionScriptAndCaptureVisibleTest : public testing::Test { |
692 public: | 692 protected: |
693 ExtensionScriptAndCaptureVisibleTest() { | 693 ExtensionScriptAndCaptureVisibleTest() |
694 PathService::Get(chrome::DIR_TEST_DATA, &dirpath_); | 694 : http_url("http://www.google.com"), |
| 695 http_url_with_path("http://www.google.com/index.html"), |
| 696 https_url("https://www.google.com"), |
| 697 file_url("file:///foo/bar"), |
| 698 favicon_url("chrome://favicon/http://www.google.com"), |
| 699 extension_url("chrome-extension://" + |
| 700 Extension::GenerateIdForPath(FilePath(FILE_PATH_LITERAL("foo")))), |
| 701 settings_url("chrome://settings"), |
| 702 about_url("about:flags") { |
| 703 urls_.insert(http_url); |
| 704 urls_.insert(http_url_with_path); |
| 705 urls_.insert(https_url); |
| 706 urls_.insert(file_url); |
| 707 urls_.insert(favicon_url); |
| 708 urls_.insert(extension_url); |
| 709 urls_.insert(settings_url); |
| 710 urls_.insert(about_url); |
695 } | 711 } |
696 | 712 |
697 bool Allowed(const Extension* extension, const GURL& url) { | 713 bool Allowed(const Extension* extension, const GURL& url) { |
698 return (extension->CanExecuteScriptOnPage(url, NULL, NULL) && | 714 return Allowed(extension, url, -1); |
699 extension->CanCaptureVisiblePage(url, NULL)); | 715 } |
| 716 |
| 717 bool Allowed(const Extension* extension, const GURL& url, int tab_id) { |
| 718 return (extension->CanExecuteScriptOnPage(url, tab_id, NULL, NULL) && |
| 719 extension->CanCaptureVisiblePage(url, tab_id, NULL)); |
700 } | 720 } |
701 | 721 |
702 bool CaptureOnly(const Extension* extension, const GURL& url) { | 722 bool CaptureOnly(const Extension* extension, const GURL& url) { |
703 return !extension->CanExecuteScriptOnPage(url, NULL, NULL) && | 723 return CaptureOnly(extension, url, -1); |
704 extension->CanCaptureVisiblePage(url, NULL); | 724 } |
| 725 |
| 726 bool CaptureOnly(const Extension* extension, const GURL& url, int tab_id) { |
| 727 return !extension->CanExecuteScriptOnPage(url, tab_id, NULL, NULL) && |
| 728 extension->CanCaptureVisiblePage(url, tab_id, NULL); |
705 } | 729 } |
706 | 730 |
707 bool Blocked(const Extension* extension, const GURL& url) { | 731 bool Blocked(const Extension* extension, const GURL& url) { |
708 return !(extension->CanExecuteScriptOnPage(url, NULL, NULL) || | 732 return Blocked(extension, url, -1); |
709 extension->CanCaptureVisiblePage(url, NULL)); | |
710 } | 733 } |
711 | 734 |
712 protected: | 735 bool Blocked(const Extension* extension, const GURL& url, int tab_id) { |
713 FilePath dirpath_; | 736 return !(extension->CanExecuteScriptOnPage(url, tab_id, NULL, NULL) || |
| 737 extension->CanCaptureVisiblePage(url, tab_id, NULL)); |
| 738 } |
| 739 |
| 740 bool AllowedExclusivelyOnTab( |
| 741 const Extension* extension, |
| 742 const std::set<GURL>& allowed_urls, |
| 743 int tab_id) { |
| 744 bool result = true; |
| 745 for (std::set<GURL>::iterator it = urls_.begin(); it != urls_.end(); ++it) { |
| 746 const GURL& url = *it; |
| 747 if (allowed_urls.count(url)) |
| 748 result &= Allowed(extension, url, tab_id); |
| 749 else |
| 750 result &= Blocked(extension, url, tab_id); |
| 751 } |
| 752 return result; |
| 753 } |
| 754 |
| 755 // URLs that are "safe" to provide scripting and capture visible tab access |
| 756 // to if the permissions allow it. |
| 757 const GURL http_url; |
| 758 const GURL http_url_with_path; |
| 759 const GURL https_url; |
| 760 const GURL file_url; |
| 761 |
| 762 // We should allow host permission but not scripting permission for favicon |
| 763 // urls. |
| 764 const GURL favicon_url; |
| 765 |
| 766 // URLs that regular extensions should never get access to. |
| 767 const GURL extension_url; |
| 768 const GURL settings_url; |
| 769 const GURL about_url; |
| 770 |
| 771 private: |
| 772 // The set of all URLs above. |
| 773 std::set<GURL> urls_; |
714 }; | 774 }; |
715 | 775 |
716 TEST_F(ExtensionScriptAndCaptureVisibleTest, Permissions) { | 776 TEST_F(ExtensionScriptAndCaptureVisibleTest, Permissions) { |
717 scoped_refptr<Extension> extension; | 777 scoped_refptr<Extension> extension; |
718 // URLs that are "safe" to provide scripting and capture visible tab access | |
719 // to if the permissions allow it. | |
720 GURL http_url("http://www.google.com"); | |
721 GURL https_url("https://www.google.com"); | |
722 GURL file_url("file:///foo/bar"); | |
723 | |
724 // We should allow host permission but not scripting permission for favicon | |
725 // urls. | |
726 GURL favicon_url("chrome://favicon/http://www.google.com"); | |
727 | |
728 std::string dummy_id = | |
729 Extension::GenerateIdForPath(FilePath(FILE_PATH_LITERAL("whatever"))); | |
730 | |
731 // URLs that regular extensions should never get access to. | |
732 GURL extension_url("chrome-extension://" + dummy_id); | |
733 GURL settings_url("chrome://settings"); | |
734 GURL about_url("about:flags"); | |
735 | 778 |
736 // Test <all_urls> for regular extensions. | 779 // Test <all_urls> for regular extensions. |
737 extension = LoadManifestStrict("script_and_capture", | 780 extension = LoadManifestStrict("script_and_capture", |
738 "extension_regular_all.json"); | 781 "extension_regular_all.json"); |
739 EXPECT_TRUE(Allowed(extension, http_url)); | 782 EXPECT_TRUE(Allowed(extension, http_url)); |
740 EXPECT_TRUE(Allowed(extension, https_url)); | 783 EXPECT_TRUE(Allowed(extension, https_url)); |
741 EXPECT_TRUE(Blocked(extension, file_url)); | 784 EXPECT_TRUE(Blocked(extension, file_url)); |
742 EXPECT_TRUE(Blocked(extension, settings_url)); | 785 EXPECT_TRUE(Blocked(extension, settings_url)); |
743 EXPECT_TRUE(CaptureOnly(extension, favicon_url)); | 786 EXPECT_TRUE(CaptureOnly(extension, favicon_url)); |
744 EXPECT_TRUE(Blocked(extension, about_url)); | 787 EXPECT_TRUE(Blocked(extension, about_url)); |
(...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
803 EXPECT_TRUE(Allowed(extension, http_url)); | 846 EXPECT_TRUE(Allowed(extension, http_url)); |
804 EXPECT_TRUE(Blocked(extension, https_url)); | 847 EXPECT_TRUE(Blocked(extension, https_url)); |
805 EXPECT_TRUE(Blocked(extension, file_url)); | 848 EXPECT_TRUE(Blocked(extension, file_url)); |
806 EXPECT_TRUE(Blocked(extension, settings_url)); | 849 EXPECT_TRUE(Blocked(extension, settings_url)); |
807 EXPECT_TRUE(Blocked(extension, favicon_url)); | 850 EXPECT_TRUE(Blocked(extension, favicon_url)); |
808 EXPECT_TRUE(Blocked(extension, about_url)); | 851 EXPECT_TRUE(Blocked(extension, about_url)); |
809 EXPECT_TRUE(Blocked(extension, extension_url)); | 852 EXPECT_TRUE(Blocked(extension, extension_url)); |
810 EXPECT_FALSE(extension->HasHostPermission(settings_url)); | 853 EXPECT_FALSE(extension->HasHostPermission(settings_url)); |
811 } | 854 } |
812 | 855 |
| 856 TEST_F(ExtensionScriptAndCaptureVisibleTest, TabSpecific) { |
| 857 scoped_refptr<Extension> extension = |
| 858 LoadManifestStrict("script_and_capture", "tab_specific.json"); |
| 859 |
| 860 EXPECT_EQ(NULL, extension->GetTabSpecificHostPermissions(0)); |
| 861 EXPECT_EQ(NULL, extension->GetTabSpecificHostPermissions(1)); |
| 862 EXPECT_EQ(NULL, extension->GetTabSpecificHostPermissions(2)); |
| 863 |
| 864 std::set<GURL> no_urls; |
| 865 |
| 866 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 0)); |
| 867 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 1)); |
| 868 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 2)); |
| 869 |
| 870 URLPatternSet allowed_hosts; |
| 871 allowed_hosts.AddPattern(URLPattern(URLPattern::SCHEME_ALL, |
| 872 http_url.spec())); |
| 873 std::set<GURL> allowed_urls; |
| 874 allowed_urls.insert(http_url); |
| 875 // http_url_with_path() will also be allowed, because Extension should be |
| 876 // considering the security origin of the URL not the URL itself, and |
| 877 // http_url is in allowed_hosts. |
| 878 allowed_urls.insert(http_url_with_path); |
| 879 |
| 880 extension->SetTabSpecificHostPermissions(0, allowed_hosts); |
| 881 EXPECT_EQ(allowed_hosts, *extension->GetTabSpecificHostPermissions(0)); |
| 882 |
| 883 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, allowed_urls, 0)); |
| 884 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 1)); |
| 885 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 2)); |
| 886 |
| 887 extension->ClearTabSpecificHostPermissions(0); |
| 888 EXPECT_EQ(NULL, extension->GetTabSpecificHostPermissions(0)); |
| 889 |
| 890 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 0)); |
| 891 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 1)); |
| 892 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 2)); |
| 893 |
| 894 std::set<GURL> more_allowed_urls = allowed_urls; |
| 895 more_allowed_urls.insert(https_url); |
| 896 URLPatternSet more_allowed_hosts = allowed_hosts; |
| 897 more_allowed_hosts.AddPattern(URLPattern(URLPattern::SCHEME_ALL, |
| 898 https_url.spec())); |
| 899 |
| 900 extension->SetTabSpecificHostPermissions(0, allowed_hosts); |
| 901 EXPECT_EQ(allowed_hosts, *extension->GetTabSpecificHostPermissions(0)); |
| 902 extension->SetTabSpecificHostPermissions(1, more_allowed_hosts); |
| 903 EXPECT_EQ(more_allowed_hosts, *extension->GetTabSpecificHostPermissions(1)); |
| 904 |
| 905 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, allowed_urls, 0)); |
| 906 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, more_allowed_urls, 1)); |
| 907 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 2)); |
| 908 |
| 909 extension->ClearTabSpecificHostPermissions(0); |
| 910 EXPECT_EQ(NULL, extension->GetTabSpecificHostPermissions(0)); |
| 911 |
| 912 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 0)); |
| 913 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, more_allowed_urls, 1)); |
| 914 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 2)); |
| 915 |
| 916 extension->ClearTabSpecificHostPermissions(1); |
| 917 EXPECT_EQ(NULL, extension->GetTabSpecificHostPermissions(1)); |
| 918 |
| 919 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 0)); |
| 920 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 1)); |
| 921 EXPECT_TRUE(AllowedExclusivelyOnTab(extension, no_urls, 2)); |
| 922 } |
| 923 |
813 TEST(ExtensionTest, GenerateId) { | 924 TEST(ExtensionTest, GenerateId) { |
814 std::string result; | 925 std::string result; |
815 EXPECT_TRUE(Extension::GenerateId("", &result)); | 926 EXPECT_TRUE(Extension::GenerateId("", &result)); |
816 | 927 |
817 EXPECT_TRUE(Extension::GenerateId("test", &result)); | 928 EXPECT_TRUE(Extension::GenerateId("test", &result)); |
818 EXPECT_EQ(result, "jpignaibiiemhngfjkcpokkamffknabf"); | 929 EXPECT_EQ(result, "jpignaibiiemhngfjkcpokkamffknabf"); |
819 | 930 |
820 EXPECT_TRUE(Extension::GenerateId("_", &result)); | 931 EXPECT_TRUE(Extension::GenerateId("_", &result)); |
821 EXPECT_EQ(result, "ncocknphbhhlhkikpnnlmbcnbgdempcd"); | 932 EXPECT_EQ(result, "ncocknphbhhlhkikpnnlmbcnbgdempcd"); |
822 | 933 |
(...skipping 145 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
968 } | 1079 } |
969 | 1080 |
970 TEST(ExtensionTest, GetSyncTypeExtensionWithTwoPlugins) { | 1081 TEST(ExtensionTest, GetSyncTypeExtensionWithTwoPlugins) { |
971 scoped_refptr<Extension> extension( | 1082 scoped_refptr<Extension> extension( |
972 MakeSyncTestExtension(EXTENSION, GURL(), GURL(), | 1083 MakeSyncTestExtension(EXTENSION, GURL(), GURL(), |
973 Extension::INTERNAL, 2, FilePath())); | 1084 Extension::INTERNAL, 2, FilePath())); |
974 if (extension) | 1085 if (extension) |
975 EXPECT_EQ(extension->GetSyncType(), Extension::SYNC_TYPE_NONE); | 1086 EXPECT_EQ(extension->GetSyncType(), Extension::SYNC_TYPE_NONE); |
976 } | 1087 } |
977 #endif // !defined(OS_CHROMEOS) | 1088 #endif // !defined(OS_CHROMEOS) |
OLD | NEW |