Index: extensions/common/permissions/permissions_data_unittest.cc |
diff --git a/extensions/common/permissions/permissions_data_unittest.cc b/extensions/common/permissions/permissions_data_unittest.cc |
index 3ca34e970f4ff8347ce557e540a4f376f20d5813..ff5ca86d9981e46e70479779d4c1541abb33116c 100644 |
--- a/extensions/common/permissions/permissions_data_unittest.cc |
+++ b/extensions/common/permissions/permissions_data_unittest.cc |
@@ -46,8 +46,8 @@ bool CheckSocketPermission( |
const char* host, |
int port) { |
SocketPermission::CheckParam param(type, host, port); |
- return PermissionsData::CheckAPIPermissionWithParam( |
- extension.get(), APIPermission::kSocket, ¶m); |
+ return PermissionsData::ForExtension(extension) |
+ ->CheckAPIPermissionWithParam(APIPermission::kSocket, ¶m); |
} |
// Creates and returns an extension with the given |id|, |host_permissions|, and |
@@ -81,10 +81,10 @@ bool RequiresActionForScriptExecution(const std::string& extension_id, |
GetExtensionWithHostPermission(extension_id, |
host_permissions, |
location); |
- return PermissionsData::RequiresActionForScriptExecution( |
- extension, |
- -1, // Ignore tab id for these. |
- GURL::EmptyGURL()); |
+ return PermissionsData::ForExtension(extension) |
+ ->RequiresActionForScriptExecution(extension, |
+ -1, // Ignore tab id for these. |
+ GURL::EmptyGURL()); |
} |
} // namespace |
@@ -95,40 +95,52 @@ TEST(ExtensionPermissionsTest, EffectiveHostPermissions) { |
extension = LoadManifest("effective_host_permissions", "empty.json"); |
EXPECT_EQ(0u, |
- PermissionsData::GetEffectiveHostPermissions(extension.get()) |
- .patterns().size()); |
+ PermissionsData::ForExtension(extension) |
+ ->GetEffectiveHostPermissions() |
+ .patterns() |
+ .size()); |
EXPECT_FALSE(hosts.MatchesURL(GURL("http://www.google.com"))); |
- EXPECT_FALSE(PermissionsData::HasEffectiveAccessToAllHosts(extension.get())); |
+ EXPECT_FALSE( |
+ PermissionsData::ForExtension(extension)->HasEffectiveAccessToAllHosts()); |
extension = LoadManifest("effective_host_permissions", "one_host.json"); |
- hosts = PermissionsData::GetEffectiveHostPermissions(extension.get()); |
+ hosts = |
+ PermissionsData::ForExtension(extension)->GetEffectiveHostPermissions(); |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://www.google.com"))); |
EXPECT_FALSE(hosts.MatchesURL(GURL("https://www.google.com"))); |
- EXPECT_FALSE(PermissionsData::HasEffectiveAccessToAllHosts(extension.get())); |
+ EXPECT_FALSE( |
+ PermissionsData::ForExtension(extension)->HasEffectiveAccessToAllHosts()); |
extension = LoadManifest("effective_host_permissions", |
"one_host_wildcard.json"); |
- hosts = PermissionsData::GetEffectiveHostPermissions(extension.get()); |
+ hosts = |
+ PermissionsData::ForExtension(extension)->GetEffectiveHostPermissions(); |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://google.com"))); |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://foo.google.com"))); |
- EXPECT_FALSE(PermissionsData::HasEffectiveAccessToAllHosts(extension.get())); |
+ EXPECT_FALSE( |
+ PermissionsData::ForExtension(extension)->HasEffectiveAccessToAllHosts()); |
extension = LoadManifest("effective_host_permissions", "two_hosts.json"); |
- hosts = PermissionsData::GetEffectiveHostPermissions(extension.get()); |
+ hosts = |
+ PermissionsData::ForExtension(extension)->GetEffectiveHostPermissions(); |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://www.google.com"))); |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://www.reddit.com"))); |
- EXPECT_FALSE(PermissionsData::HasEffectiveAccessToAllHosts(extension.get())); |
+ EXPECT_FALSE( |
+ PermissionsData::ForExtension(extension)->HasEffectiveAccessToAllHosts()); |
extension = LoadManifest("effective_host_permissions", |
"https_not_considered.json"); |
- hosts = PermissionsData::GetEffectiveHostPermissions(extension.get()); |
+ hosts = |
+ PermissionsData::ForExtension(extension)->GetEffectiveHostPermissions(); |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://google.com"))); |
EXPECT_TRUE(hosts.MatchesURL(GURL("https://google.com"))); |
- EXPECT_FALSE(PermissionsData::HasEffectiveAccessToAllHosts(extension.get())); |
+ EXPECT_FALSE( |
+ PermissionsData::ForExtension(extension)->HasEffectiveAccessToAllHosts()); |
extension = LoadManifest("effective_host_permissions", |
"two_content_scripts.json"); |
- hosts = PermissionsData::GetEffectiveHostPermissions(extension.get()); |
+ hosts = |
+ PermissionsData::ForExtension(extension)->GetEffectiveHostPermissions(); |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://google.com"))); |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://www.reddit.com"))); |
EXPECT_TRUE(extension->GetActivePermissions()->HasEffectiveAccessToURL( |
@@ -136,27 +148,34 @@ TEST(ExtensionPermissionsTest, EffectiveHostPermissions) { |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://news.ycombinator.com"))); |
EXPECT_TRUE(extension->GetActivePermissions()->HasEffectiveAccessToURL( |
GURL("http://news.ycombinator.com"))); |
- EXPECT_FALSE(PermissionsData::HasEffectiveAccessToAllHosts(extension.get())); |
+ EXPECT_FALSE( |
+ PermissionsData::ForExtension(extension)->HasEffectiveAccessToAllHosts()); |
extension = LoadManifest("effective_host_permissions", "all_hosts.json"); |
- hosts = PermissionsData::GetEffectiveHostPermissions(extension.get()); |
+ hosts = |
+ PermissionsData::ForExtension(extension)->GetEffectiveHostPermissions(); |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://test/"))); |
EXPECT_FALSE(hosts.MatchesURL(GURL("https://test/"))); |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://www.google.com"))); |
- EXPECT_TRUE(PermissionsData::HasEffectiveAccessToAllHosts(extension.get())); |
+ EXPECT_TRUE( |
+ PermissionsData::ForExtension(extension)->HasEffectiveAccessToAllHosts()); |
extension = LoadManifest("effective_host_permissions", "all_hosts2.json"); |
- hosts = PermissionsData::GetEffectiveHostPermissions(extension.get()); |
+ hosts = |
+ PermissionsData::ForExtension(extension)->GetEffectiveHostPermissions(); |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://test/"))); |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://www.google.com"))); |
- EXPECT_TRUE(PermissionsData::HasEffectiveAccessToAllHosts(extension.get())); |
+ EXPECT_TRUE( |
+ PermissionsData::ForExtension(extension)->HasEffectiveAccessToAllHosts()); |
extension = LoadManifest("effective_host_permissions", "all_hosts3.json"); |
- hosts = PermissionsData::GetEffectiveHostPermissions(extension.get()); |
+ hosts = |
+ PermissionsData::ForExtension(extension)->GetEffectiveHostPermissions(); |
EXPECT_FALSE(hosts.MatchesURL(GURL("http://test/"))); |
EXPECT_TRUE(hosts.MatchesURL(GURL("https://test/"))); |
EXPECT_TRUE(hosts.MatchesURL(GURL("http://www.google.com"))); |
- EXPECT_TRUE(PermissionsData::HasEffectiveAccessToAllHosts(extension.get())); |
+ EXPECT_TRUE( |
+ PermissionsData::ForExtension(extension)->HasEffectiveAccessToAllHosts()); |
} |
TEST(ExtensionPermissionsTest, SocketPermissions) { |
@@ -231,16 +250,18 @@ TEST(ExtensionPermissionsTest, RequiresActionForScriptExecution) { |
ManifestPermissionSet(), |
allowed_hosts, |
URLPatternSet())); |
- PermissionsData::UpdateTabSpecificPermissions(extension, 0, tab_permissions); |
- EXPECT_FALSE(PermissionsData::RequiresActionForScriptExecution( |
- extension, 0, GURL("https://www.google.com/"))); |
+ PermissionsData::ForExtension(extension) |
+ ->UpdateTabSpecificPermissions(0, tab_permissions); |
+ EXPECT_FALSE(PermissionsData::ForExtension(extension) |
+ ->RequiresActionForScriptExecution( |
+ extension, 0, GURL("https://www.google.com/"))); |
} |
TEST(ExtensionPermissionsTest, GetPermissionMessages_ManyAPIPermissions) { |
scoped_refptr<Extension> extension; |
extension = LoadManifest("permissions", "many-apis.json"); |
std::vector<base::string16> warnings = |
- PermissionsData::GetPermissionMessageStrings(extension.get()); |
+ PermissionsData::ForExtension(extension)->GetPermissionMessageStrings(); |
// Warning for "tabs" is suppressed by "history" permission. |
ASSERT_EQ(5u, warnings.size()); |
EXPECT_EQ("Read and modify your data on api.flickr.com", |
@@ -256,9 +277,10 @@ TEST(ExtensionPermissionsTest, GetPermissionMessages_ManyHostsPermissions) { |
scoped_refptr<Extension> extension; |
extension = LoadManifest("permissions", "more-than-3-hosts.json"); |
std::vector<base::string16> warnings = |
- PermissionsData::GetPermissionMessageStrings(extension.get()); |
+ PermissionsData::ForExtension(extension)->GetPermissionMessageStrings(); |
std::vector<base::string16> warnings_details = |
- PermissionsData::GetPermissionMessageDetailsStrings(extension.get()); |
+ PermissionsData::ForExtension(extension) |
+ ->GetPermissionMessageDetailsStrings(); |
ASSERT_EQ(1u, warnings.size()); |
ASSERT_EQ(1u, warnings_details.size()); |
EXPECT_EQ("Read and modify your data on 5 websites", |
@@ -274,7 +296,7 @@ TEST(ExtensionPermissionsTest, GetPermissionMessages_LocationApiPermission) { |
Manifest::COMPONENT, |
Extension::NO_FLAGS); |
std::vector<base::string16> warnings = |
- PermissionsData::GetPermissionMessageStrings(extension.get()); |
+ PermissionsData::ForExtension(extension)->GetPermissionMessageStrings(); |
ASSERT_EQ(1u, warnings.size()); |
EXPECT_EQ("Detect your physical location", UTF16ToUTF8(warnings[0])); |
} |
@@ -283,7 +305,7 @@ TEST(ExtensionPermissionsTest, GetPermissionMessages_ManyHosts) { |
scoped_refptr<Extension> extension; |
extension = LoadManifest("permissions", "many-hosts.json"); |
std::vector<base::string16> warnings = |
- PermissionsData::GetPermissionMessageStrings(extension.get()); |
+ PermissionsData::ForExtension(extension)->GetPermissionMessageStrings(); |
ASSERT_EQ(1u, warnings.size()); |
EXPECT_EQ( |
"Read and modify your data on encrypted.google.com and www.google.com", |
@@ -294,7 +316,7 @@ TEST(ExtensionPermissionsTest, GetPermissionMessages_Plugins) { |
scoped_refptr<Extension> extension; |
extension = LoadManifest("permissions", "plugins.json"); |
std::vector<base::string16> warnings = |
- PermissionsData::GetPermissionMessageStrings(extension.get()); |
+ PermissionsData::ForExtension(extension)->GetPermissionMessageStrings(); |
// We don't parse the plugins key on Chrome OS, so it should not ask for any |
// permissions. |
#if defined(OS_CHROMEOS) |
@@ -342,13 +364,13 @@ class ExtensionScriptAndCaptureVisibleTest : public testing::Test { |
bool AllowedScript(const Extension* extension, const GURL& url, |
const GURL& top_url, int tab_id) { |
- return PermissionsData::CanExecuteScriptOnPage( |
+ return PermissionsData::ForExtension(extension)->CanExecuteScriptOnPage( |
extension, url, top_url, tab_id, NULL, -1, NULL); |
} |
bool BlockedScript(const Extension* extension, const GURL& url, |
const GURL& top_url) { |
- return !PermissionsData::CanExecuteScriptOnPage( |
+ return !PermissionsData::ForExtension(extension)->CanExecuteScriptOnPage( |
extension, url, top_url, -1, NULL, -1, NULL); |
} |
@@ -357,10 +379,10 @@ class ExtensionScriptAndCaptureVisibleTest : public testing::Test { |
} |
bool Allowed(const Extension* extension, const GURL& url, int tab_id) { |
- return (PermissionsData::CanExecuteScriptOnPage( |
+ return (PermissionsData::ForExtension(extension)->CanExecuteScriptOnPage( |
extension, url, url, tab_id, NULL, -1, NULL) && |
- PermissionsData::CanCaptureVisiblePage( |
- extension, tab_id, NULL)); |
+ PermissionsData::ForExtension(extension) |
+ ->CanCaptureVisiblePage(tab_id, NULL)); |
} |
bool CaptureOnly(const Extension* extension, const GURL& url) { |
@@ -368,9 +390,10 @@ class ExtensionScriptAndCaptureVisibleTest : public testing::Test { |
} |
bool CaptureOnly(const Extension* extension, const GURL& url, int tab_id) { |
- return !PermissionsData::CanExecuteScriptOnPage( |
- extension, url, url, tab_id, NULL, -1, NULL) && |
- PermissionsData::CanCaptureVisiblePage(extension, tab_id, NULL); |
+ return !PermissionsData::ForExtension(extension)->CanExecuteScriptOnPage( |
+ extension, url, url, tab_id, NULL, -1, NULL) && |
+ PermissionsData::ForExtension(extension) |
+ ->CanCaptureVisiblePage(tab_id, NULL); |
} |
bool ScriptOnly(const Extension* extension, const GURL& url, |
@@ -381,7 +404,8 @@ class ExtensionScriptAndCaptureVisibleTest : public testing::Test { |
bool ScriptOnly(const Extension* extension, const GURL& url, |
const GURL& top_url, int tab_id) { |
return AllowedScript(extension, url, top_url, tab_id) && |
- !PermissionsData::CanCaptureVisiblePage(extension, tab_id, NULL); |
+ !PermissionsData::ForExtension(extension) |
+ ->CanCaptureVisiblePage(tab_id, NULL); |
} |
bool Blocked(const Extension* extension, const GURL& url) { |
@@ -389,10 +413,10 @@ class ExtensionScriptAndCaptureVisibleTest : public testing::Test { |
} |
bool Blocked(const Extension* extension, const GURL& url, int tab_id) { |
- return !(PermissionsData::CanExecuteScriptOnPage( |
+ return !(PermissionsData::ForExtension(extension)->CanExecuteScriptOnPage( |
extension, url, url, tab_id, NULL, -1, NULL) || |
- PermissionsData::CanCaptureVisiblePage( |
- extension, tab_id, NULL)); |
+ PermissionsData::ForExtension(extension) |
+ ->CanCaptureVisiblePage(tab_id, NULL)); |
} |
bool ScriptAllowedExclusivelyOnTab( |
@@ -453,10 +477,12 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, Permissions) { |
EXPECT_TRUE(BlockedScript(extension.get(), http_url, extension_url)); |
EXPECT_TRUE(BlockedScript(extension.get(), https_url, extension_url)); |
+ EXPECT_FALSE(PermissionsData::ForExtension(extension) |
+ ->HasHostPermission(settings_url)); |
EXPECT_FALSE( |
- PermissionsData::HasHostPermission(extension.get(), settings_url)); |
- EXPECT_FALSE(PermissionsData::HasHostPermission(extension.get(), about_url)); |
- EXPECT_TRUE(PermissionsData::HasHostPermission(extension.get(), favicon_url)); |
+ PermissionsData::ForExtension(extension)->HasHostPermission(about_url)); |
+ EXPECT_TRUE( |
+ PermissionsData::ForExtension(extension)->HasHostPermission(favicon_url)); |
// Test * for scheme, which implies just the http/https schemes. |
extension = LoadManifestStrict("script_and_capture", |
@@ -494,7 +520,8 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, Permissions) { |
EXPECT_TRUE(Blocked(extension.get(), settings_url)); |
EXPECT_TRUE(Blocked(extension.get(), favicon_url)); |
EXPECT_TRUE(Blocked(extension.get(), about_url)); |
- EXPECT_TRUE(PermissionsData::HasHostPermission(extension.get(), favicon_url)); |
+ EXPECT_TRUE( |
+ PermissionsData::ForExtension(extension)->HasHostPermission(favicon_url)); |
// Having http://favicon should not give you chrome://favicon |
extension = LoadManifestStrict("script_and_capture", |
@@ -510,7 +537,8 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, Permissions) { |
EXPECT_TRUE(Allowed(extension.get(), settings_url)); |
EXPECT_TRUE(Allowed(extension.get(), about_url)); |
EXPECT_TRUE(Allowed(extension.get(), favicon_url)); |
- EXPECT_TRUE(PermissionsData::HasHostPermission(extension.get(), favicon_url)); |
+ EXPECT_TRUE( |
+ PermissionsData::ForExtension(extension)->HasHostPermission(favicon_url)); |
// Component extensions should only get access to what they ask for. |
extension = LoadManifest("script_and_capture", |
@@ -523,8 +551,8 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, Permissions) { |
EXPECT_TRUE(Blocked(extension.get(), favicon_url)); |
EXPECT_TRUE(Blocked(extension.get(), about_url)); |
EXPECT_TRUE(Blocked(extension.get(), extension_url)); |
- EXPECT_FALSE( |
- PermissionsData::HasHostPermission(extension.get(), settings_url)); |
+ EXPECT_FALSE(PermissionsData::ForExtension(extension) |
+ ->HasHostPermission(settings_url)); |
} |
TEST_F(ExtensionScriptAndCaptureVisibleTest, PermissionsWithChromeURLsEnabled) { |
@@ -553,10 +581,11 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, PermissionsWithChromeURLsEnabled) { |
EXPECT_TRUE(BlockedScript(extension.get(), http_url, extension_url)); |
EXPECT_TRUE(BlockedScript(extension.get(), https_url, extension_url)); |
- EXPECT_FALSE( |
- PermissionsData::HasHostPermission(extension.get(), settings_url)); |
- EXPECT_FALSE(PermissionsData::HasHostPermission(extension.get(), about_url)); |
- EXPECT_TRUE(PermissionsData::HasHostPermission(extension.get(), favicon_url)); |
+ const PermissionsData* permissions_data = |
+ PermissionsData::ForExtension(extension); |
+ EXPECT_FALSE(permissions_data->HasHostPermission(settings_url)); |
+ EXPECT_FALSE(permissions_data->HasHostPermission(about_url)); |
+ EXPECT_TRUE(permissions_data->HasHostPermission(favicon_url)); |
// Test * for scheme, which implies just the http/https schemes. |
extension = LoadManifestStrict("script_and_capture", |
@@ -592,7 +621,8 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, PermissionsWithChromeURLsEnabled) { |
EXPECT_TRUE(Blocked(extension.get(), settings_url)); |
EXPECT_TRUE(ScriptOnly(extension.get(), favicon_url, favicon_url)); |
EXPECT_TRUE(Blocked(extension.get(), about_url)); |
- EXPECT_TRUE(PermissionsData::HasHostPermission(extension.get(), favicon_url)); |
+ EXPECT_TRUE( |
+ PermissionsData::ForExtension(extension)->HasHostPermission(favicon_url)); |
// Having http://favicon should not give you chrome://favicon |
extension = LoadManifestStrict("script_and_capture", |
@@ -608,7 +638,8 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, PermissionsWithChromeURLsEnabled) { |
EXPECT_TRUE(Allowed(extension.get(), settings_url)); |
EXPECT_TRUE(Allowed(extension.get(), about_url)); |
EXPECT_TRUE(Allowed(extension.get(), favicon_url)); |
- EXPECT_TRUE(PermissionsData::HasHostPermission(extension.get(), favicon_url)); |
+ EXPECT_TRUE( |
+ PermissionsData::ForExtension(extension)->HasHostPermission(favicon_url)); |
// Component extensions should only get access to what they ask for. |
extension = LoadManifest("script_and_capture", |
@@ -621,20 +652,19 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, PermissionsWithChromeURLsEnabled) { |
EXPECT_TRUE(Blocked(extension.get(), favicon_url)); |
EXPECT_TRUE(Blocked(extension.get(), about_url)); |
EXPECT_TRUE(Blocked(extension.get(), extension_url)); |
- EXPECT_FALSE( |
- PermissionsData::HasHostPermission(extension.get(), settings_url)); |
+ EXPECT_FALSE(PermissionsData::ForExtension(extension) |
+ ->HasHostPermission(settings_url)); |
} |
TEST_F(ExtensionScriptAndCaptureVisibleTest, TabSpecific) { |
scoped_refptr<Extension> extension = |
LoadManifestStrict("script_and_capture", "tab_specific.json"); |
- EXPECT_FALSE(PermissionsData::GetTabSpecificPermissions(extension.get(), 0) |
- .get()); |
- EXPECT_FALSE(PermissionsData::GetTabSpecificPermissions(extension.get(), 1) |
- .get()); |
- EXPECT_FALSE(PermissionsData::GetTabSpecificPermissions(extension.get(), 2) |
- .get()); |
+ const PermissionsData* permissions_data = |
+ PermissionsData::ForExtension(extension); |
+ EXPECT_FALSE(permissions_data->GetTabSpecificPermissionsForTesting(0)); |
+ EXPECT_FALSE(permissions_data->GetTabSpecificPermissionsForTesting(1)); |
+ EXPECT_FALSE(permissions_data->GetTabSpecificPermissionsForTesting(2)); |
std::set<GURL> no_urls; |
@@ -656,10 +686,9 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, TabSpecific) { |
scoped_refptr<PermissionSet> permissions( |
new PermissionSet(APIPermissionSet(), ManifestPermissionSet(), |
allowed_hosts, URLPatternSet())); |
- PermissionsData::UpdateTabSpecificPermissions( |
- extension.get(), 0, permissions); |
+ permissions_data->UpdateTabSpecificPermissions(0, permissions); |
EXPECT_EQ(permissions->explicit_hosts(), |
- PermissionsData::GetTabSpecificPermissions(extension.get(), 0) |
+ permissions_data->GetTabSpecificPermissionsForTesting(0) |
->explicit_hosts()); |
} |
@@ -667,9 +696,8 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, TabSpecific) { |
EXPECT_TRUE(ScriptAllowedExclusivelyOnTab(extension.get(), no_urls, 1)); |
EXPECT_TRUE(ScriptAllowedExclusivelyOnTab(extension.get(), no_urls, 2)); |
- PermissionsData::ClearTabSpecificPermissions(extension.get(), 0); |
- EXPECT_FALSE(PermissionsData::GetTabSpecificPermissions(extension.get(), 0) |
- .get()); |
+ permissions_data->ClearTabSpecificPermissions(0); |
+ EXPECT_FALSE(permissions_data->GetTabSpecificPermissionsForTesting(0)); |
EXPECT_TRUE(ScriptAllowedExclusivelyOnTab(extension.get(), no_urls, 0)); |
EXPECT_TRUE(ScriptAllowedExclusivelyOnTab(extension.get(), no_urls, 1)); |
@@ -685,20 +713,18 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, TabSpecific) { |
scoped_refptr<PermissionSet> permissions( |
new PermissionSet(APIPermissionSet(), ManifestPermissionSet(), |
allowed_hosts, URLPatternSet())); |
- PermissionsData::UpdateTabSpecificPermissions( |
- extension.get(), 0, permissions); |
+ permissions_data->UpdateTabSpecificPermissions(0, permissions); |
EXPECT_EQ(permissions->explicit_hosts(), |
- PermissionsData::GetTabSpecificPermissions(extension.get(), 0) |
+ permissions_data->GetTabSpecificPermissionsForTesting(0) |
->explicit_hosts()); |
permissions = new PermissionSet(APIPermissionSet(), |
ManifestPermissionSet(), |
more_allowed_hosts, |
URLPatternSet()); |
- PermissionsData::UpdateTabSpecificPermissions( |
- extension.get(), 1, permissions); |
+ permissions_data->UpdateTabSpecificPermissions(1, permissions); |
EXPECT_EQ(permissions->explicit_hosts(), |
- PermissionsData::GetTabSpecificPermissions(extension.get(), 1) |
+ permissions_data->GetTabSpecificPermissionsForTesting(1) |
->explicit_hosts()); |
} |
@@ -707,18 +733,16 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, TabSpecific) { |
ScriptAllowedExclusivelyOnTab(extension.get(), more_allowed_urls, 1)); |
EXPECT_TRUE(ScriptAllowedExclusivelyOnTab(extension.get(), no_urls, 2)); |
- PermissionsData::ClearTabSpecificPermissions(extension.get(), 0); |
- EXPECT_FALSE(PermissionsData::GetTabSpecificPermissions(extension.get(), 0) |
- .get()); |
+ permissions_data->ClearTabSpecificPermissions(0); |
+ EXPECT_FALSE(permissions_data->GetTabSpecificPermissionsForTesting(0)); |
EXPECT_TRUE(ScriptAllowedExclusivelyOnTab(extension.get(), no_urls, 0)); |
EXPECT_TRUE( |
ScriptAllowedExclusivelyOnTab(extension.get(), more_allowed_urls, 1)); |
EXPECT_TRUE(ScriptAllowedExclusivelyOnTab(extension.get(), no_urls, 2)); |
- PermissionsData::ClearTabSpecificPermissions(extension.get(), 1); |
- EXPECT_FALSE(PermissionsData::GetTabSpecificPermissions(extension.get(), 1) |
- .get()); |
+ permissions_data->ClearTabSpecificPermissions(1); |
+ EXPECT_FALSE(permissions_data->GetTabSpecificPermissionsForTesting(1)); |
EXPECT_TRUE(ScriptAllowedExclusivelyOnTab(extension.get(), no_urls, 0)); |
EXPECT_TRUE(ScriptAllowedExclusivelyOnTab(extension.get(), no_urls, 1)); |