Index: chrome/common/extensions/permissions/permission_set_unittest.cc |
diff --git a/chrome/common/extensions/permissions/permission_set_unittest.cc b/chrome/common/extensions/permissions/permission_set_unittest.cc |
index 633a7b15fc7c5656a0df56bc37426ca877a53b67..35de01e560a137ce2cd436c0da3603460114c389 100644 |
--- a/chrome/common/extensions/permissions/permission_set_unittest.cc |
+++ b/chrome/common/extensions/permissions/permission_set_unittest.cc |
@@ -125,12 +125,11 @@ TEST(PermissionsTest, EffectiveHostPermissions) { |
extension = LoadManifest("effective_host_permissions", "empty.json"); |
permissions = extension->GetActivePermissions(); |
- EXPECT_EQ( |
- 0u, |
- PermissionsData::GetEffectiveHostPermissions( |
- extension).patterns().size()); |
- EXPECT_FALSE(permissions->HasEffectiveAccessToURL( |
- GURL("http://www.google.com"))); |
+ EXPECT_EQ(0u, |
+ PermissionsData::GetEffectiveHostPermissions(extension.get()) |
+ .patterns().size()); |
+ EXPECT_FALSE( |
+ permissions->HasEffectiveAccessToURL(GURL("http://www.google.com"))); |
EXPECT_FALSE(permissions->HasEffectiveAccessToAllHosts()); |
extension = LoadManifest("effective_host_permissions", "one_host.json"); |
@@ -270,12 +269,12 @@ TEST(PermissionsTest, CreateUnion) { |
set1 = new PermissionSet(apis1, explicit_hosts1, scriptable_hosts1); |
set2 = new PermissionSet(apis2, explicit_hosts2, scriptable_hosts2); |
union_set = PermissionSet::CreateUnion(set1.get(), set2.get()); |
- EXPECT_TRUE(set1->Contains(*set2)); |
- EXPECT_TRUE(set1->Contains(*union_set)); |
- EXPECT_FALSE(set2->Contains(*set1)); |
- EXPECT_FALSE(set2->Contains(*union_set)); |
- EXPECT_TRUE(union_set->Contains(*set1)); |
- EXPECT_TRUE(union_set->Contains(*set2)); |
+ EXPECT_TRUE(set1->Contains(*set2.get())); |
+ EXPECT_TRUE(set1->Contains(*union_set.get())); |
+ EXPECT_FALSE(set2->Contains(*set1.get())); |
+ EXPECT_FALSE(set2->Contains(*union_set.get())); |
+ EXPECT_TRUE(union_set->Contains(*set1.get())); |
+ EXPECT_TRUE(union_set->Contains(*set2.get())); |
EXPECT_FALSE(union_set->HasEffectiveFullAccess()); |
EXPECT_EQ(expected_apis, union_set->apis()); |
@@ -330,12 +329,12 @@ TEST(PermissionsTest, CreateUnion) { |
set2 = new PermissionSet(apis2, explicit_hosts2, scriptable_hosts2); |
union_set = PermissionSet::CreateUnion(set1.get(), set2.get()); |
- EXPECT_FALSE(set1->Contains(*set2)); |
- EXPECT_FALSE(set1->Contains(*union_set)); |
- EXPECT_FALSE(set2->Contains(*set1)); |
- EXPECT_FALSE(set2->Contains(*union_set)); |
- EXPECT_TRUE(union_set->Contains(*set1)); |
- EXPECT_TRUE(union_set->Contains(*set2)); |
+ EXPECT_FALSE(set1->Contains(*set2.get())); |
+ EXPECT_FALSE(set1->Contains(*union_set.get())); |
+ EXPECT_FALSE(set2->Contains(*set1.get())); |
+ EXPECT_FALSE(set2->Contains(*union_set.get())); |
+ EXPECT_TRUE(union_set->Contains(*set1.get())); |
+ EXPECT_TRUE(union_set->Contains(*set2.get())); |
EXPECT_TRUE(union_set->HasEffectiveFullAccess()); |
EXPECT_TRUE(union_set->HasEffectiveAccessToAllHosts()); |
@@ -390,12 +389,12 @@ TEST(PermissionsTest, CreateIntersection) { |
set1 = new PermissionSet(apis1, explicit_hosts1, scriptable_hosts1); |
set2 = new PermissionSet(apis2, explicit_hosts2, scriptable_hosts2); |
new_set = PermissionSet::CreateIntersection(set1.get(), set2.get()); |
- EXPECT_TRUE(set1->Contains(*new_set)); |
- EXPECT_TRUE(set2->Contains(*new_set)); |
- EXPECT_TRUE(set1->Contains(*set2)); |
- EXPECT_FALSE(set2->Contains(*set1)); |
- EXPECT_FALSE(new_set->Contains(*set1)); |
- EXPECT_TRUE(new_set->Contains(*set2)); |
+ EXPECT_TRUE(set1->Contains(*new_set.get())); |
+ EXPECT_TRUE(set2->Contains(*new_set.get())); |
+ EXPECT_TRUE(set1->Contains(*set2.get())); |
+ EXPECT_FALSE(set2->Contains(*set1.get())); |
+ EXPECT_FALSE(new_set->Contains(*set1.get())); |
+ EXPECT_TRUE(new_set->Contains(*set2.get())); |
EXPECT_TRUE(new_set->IsEmpty()); |
EXPECT_FALSE(new_set->HasEffectiveFullAccess()); |
@@ -444,12 +443,12 @@ TEST(PermissionsTest, CreateIntersection) { |
set2 = new PermissionSet(apis2, explicit_hosts2, scriptable_hosts2); |
new_set = PermissionSet::CreateIntersection(set1.get(), set2.get()); |
- EXPECT_TRUE(set1->Contains(*new_set)); |
- EXPECT_TRUE(set2->Contains(*new_set)); |
- EXPECT_FALSE(set1->Contains(*set2)); |
- EXPECT_FALSE(set2->Contains(*set1)); |
- EXPECT_FALSE(new_set->Contains(*set1)); |
- EXPECT_FALSE(new_set->Contains(*set2)); |
+ EXPECT_TRUE(set1->Contains(*new_set.get())); |
+ EXPECT_TRUE(set2->Contains(*new_set.get())); |
+ EXPECT_FALSE(set1->Contains(*set2.get())); |
+ EXPECT_FALSE(set2->Contains(*set1.get())); |
+ EXPECT_FALSE(new_set->Contains(*set1.get())); |
+ EXPECT_FALSE(new_set->Contains(*set2.get())); |
EXPECT_FALSE(new_set->HasEffectiveFullAccess()); |
EXPECT_FALSE(new_set->HasEffectiveAccessToAllHosts()); |
@@ -504,7 +503,7 @@ TEST(PermissionsTest, CreateDifference) { |
set1 = new PermissionSet(apis1, explicit_hosts1, scriptable_hosts1); |
set2 = new PermissionSet(apis2, explicit_hosts2, scriptable_hosts2); |
new_set = PermissionSet::CreateDifference(set1.get(), set2.get()); |
- EXPECT_EQ(*set1, *new_set); |
+ EXPECT_EQ(*set1.get(), *new_set.get()); |
// Now use a real second set. |
apis2.insert(APIPermission::kTab); |
@@ -545,8 +544,8 @@ TEST(PermissionsTest, CreateDifference) { |
set2 = new PermissionSet(apis2, explicit_hosts2, scriptable_hosts2); |
new_set = PermissionSet::CreateDifference(set1.get(), set2.get()); |
- EXPECT_TRUE(set1->Contains(*new_set)); |
- EXPECT_FALSE(set2->Contains(*new_set)); |
+ EXPECT_TRUE(set1->Contains(*new_set.get())); |
+ EXPECT_FALSE(set2->Contains(*new_set.get())); |
EXPECT_FALSE(new_set->HasEffectiveFullAccess()); |
EXPECT_FALSE(new_set->HasEffectiveAccessToAllHosts()); |
@@ -607,7 +606,7 @@ TEST(PermissionsTest, HasLessPrivilegesThan) { |
new_extension->GetActivePermissions()); |
EXPECT_EQ(kTests[i].expect_increase, |
- old_p->HasLessPrivilegesThan(new_p)) << kTests[i].base_name; |
+ old_p->HasLessPrivilegesThan(new_p.get())) << kTests[i].base_name; |
} |
} |
@@ -814,7 +813,7 @@ TEST(PermissionsTest, GetWarningMessages_ManyHosts) { |
extension = LoadManifest("permissions", "many-hosts.json"); |
std::vector<string16> warnings = |
- PermissionsData::GetPermissionMessageStrings(extension); |
+ PermissionsData::GetPermissionMessageStrings(extension.get()); |
ASSERT_EQ(1u, warnings.size()); |
EXPECT_EQ("Access your data on encrypted.google.com and www.google.com", |
UTF16ToUTF8(warnings[0])); |
@@ -826,8 +825,8 @@ TEST(PermissionsTest, GetWarningMessages_Plugins) { |
extension = LoadManifest("permissions", "plugins.json"); |
std::vector<string16> warnings = |
- PermissionsData::GetPermissionMessageStrings(extension); |
- // We don't parse the plugins key on Chrome OS, so it should not ask for any |
+ PermissionsData::GetPermissionMessageStrings(extension.get()); |
+// We don't parse the plugins key on Chrome OS, so it should not ask for any |
// permissions. |
#if defined(OS_CHROMEOS) |
ASSERT_EQ(0u, warnings.size()); |
@@ -878,9 +877,9 @@ TEST(PermissionsTest, GetWarningMessages_Serial) { |
EXPECT_TRUE(extension->is_platform_app()); |
EXPECT_TRUE(extension->HasAPIPermission(APIPermission::kSerial)); |
std::vector<string16> warnings = |
- PermissionsData::GetPermissionMessageStrings(extension); |
- EXPECT_TRUE(Contains(warnings, |
- "Use serial devices attached to your computer")); |
+ PermissionsData::GetPermissionMessageStrings(extension.get()); |
+ EXPECT_TRUE( |
+ Contains(warnings, "Use serial devices attached to your computer")); |
ASSERT_EQ(1u, warnings.size()); |
} |
@@ -892,7 +891,7 @@ TEST(PermissionsTest, GetWarningMessages_Socket_AnyHost) { |
EXPECT_TRUE(extension->is_platform_app()); |
EXPECT_TRUE(extension->HasAPIPermission(APIPermission::kSocket)); |
std::vector<string16> warnings = |
- PermissionsData::GetPermissionMessageStrings(extension); |
+ PermissionsData::GetPermissionMessageStrings(extension.get()); |
EXPECT_EQ(1u, warnings.size()); |
EXPECT_TRUE(Contains(warnings, "Exchange data with any computer " |
"on the local network or internet")); |
@@ -906,7 +905,7 @@ TEST(PermissionsTest, GetWarningMessages_Socket_OneDomainTwoHostnames) { |
EXPECT_TRUE(extension->is_platform_app()); |
EXPECT_TRUE(extension->HasAPIPermission(APIPermission::kSocket)); |
std::vector<string16> warnings = |
- PermissionsData::GetPermissionMessageStrings(extension); |
+ PermissionsData::GetPermissionMessageStrings(extension.get()); |
// Verify the warnings, including support for unicode characters, the fact |
// that domain host warnings come before specific host warnings, and the fact |
@@ -932,7 +931,7 @@ TEST(PermissionsTest, GetWarningMessages_Socket_TwoDomainsOneHostname) { |
EXPECT_TRUE(extension->is_platform_app()); |
EXPECT_TRUE(extension->HasAPIPermission(APIPermission::kSocket)); |
std::vector<string16> warnings = |
- PermissionsData::GetPermissionMessageStrings(extension); |
+ PermissionsData::GetPermissionMessageStrings(extension.get()); |
// Verify the warnings, including the fact that domain host warnings come |
// before specific host warnings and the fact that domains and hostnames are |
@@ -954,12 +953,12 @@ TEST(PermissionsTest, GetWarningMessages_PlatformApppHosts) { |
extension = LoadManifest("permissions", "platform_app_hosts.json"); |
EXPECT_TRUE(extension->is_platform_app()); |
std::vector<string16> warnings = |
- PermissionsData::GetPermissionMessageStrings(extension); |
+ PermissionsData::GetPermissionMessageStrings(extension.get()); |
ASSERT_EQ(0u, warnings.size()); |
extension = LoadManifest("permissions", "platform_app_all_urls.json"); |
EXPECT_TRUE(extension->is_platform_app()); |
- warnings = PermissionsData::GetPermissionMessageStrings(extension); |
+ warnings = PermissionsData::GetPermissionMessageStrings(extension.get()); |
ASSERT_EQ(0u, warnings.size()); |
} |
@@ -1354,7 +1353,7 @@ TEST(PermissionsTest, SyncFileSystemPermission) { |
EXPECT_TRUE(extension->is_platform_app()); |
EXPECT_TRUE(extension->HasAPIPermission(APIPermission::kSyncFileSystem)); |
std::vector<string16> warnings = |
- PermissionsData::GetPermissionMessageStrings(extension); |
+ PermissionsData::GetPermissionMessageStrings(extension.get()); |
EXPECT_TRUE(Contains(warnings, "Store data in your Google Drive account")); |
ASSERT_EQ(1u, warnings.size()); |
} |