summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordcheng <dcheng@chromium.org>2014-08-25 22:05:31 -0700
committerCommit bot <commit-bot@chromium.org>2014-08-26 05:06:55 +0000
commitc704794140dcfe95c002c7b0bfd7361f33088190 (patch)
treec78e5d70e95737ee4c5b5599717335903999b0ae
parent1bba58e7ed1fdfb97d53f7ed26df5571c2e9d7c5 (diff)
downloadchromium_src-c704794140dcfe95c002c7b0bfd7361f33088190.zip
chromium_src-c704794140dcfe95c002c7b0bfd7361f33088190.tar.gz
chromium_src-c704794140dcfe95c002c7b0bfd7361f33088190.tar.bz2
Remove implicit conversions from scoped_refptr to T* in chrome/browser/extensions/
This patch was generated by running the rewrite_scoped_refptr clang tool on a Linux build. BUG=110610 Review URL: https://codereview.chromium.org/508513002 Cr-Commit-Position: refs/heads/master@{#291844}
-rw-r--r--chrome/browser/extensions/active_script_controller_unittest.cc4
-rw-r--r--chrome/browser/extensions/active_tab_unittest.cc4
-rw-r--r--chrome/browser/extensions/blacklist.cc2
-rw-r--r--chrome/browser/extensions/blacklist_state_fetcher.cc10
-rw-r--r--chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc4
-rw-r--r--chrome/browser/extensions/crx_installer.cc2
-rw-r--r--chrome/browser/extensions/error_console/error_console_unittest.cc4
-rw-r--r--chrome/browser/extensions/extension_action_manager_unittest.cc33
-rw-r--r--chrome/browser/extensions/extension_context_menu_model_unittest.cc18
-rw-r--r--chrome/browser/extensions/extension_error_controller.cc2
-rw-r--r--chrome/browser/extensions/extension_error_controller_unittest.cc6
-rw-r--r--chrome/browser/extensions/extension_gcm_app_handler_unittest.cc20
-rw-r--r--chrome/browser/extensions/extension_install_prompt.cc8
-rw-r--r--chrome/browser/extensions/extension_install_prompt.h2
-rw-r--r--chrome/browser/extensions/extension_install_prompt_unittest.cc4
-rw-r--r--chrome/browser/extensions/extension_messages_apitest.cc181
-rw-r--r--chrome/browser/extensions/extension_service.cc4
-rw-r--r--chrome/browser/extensions/extension_service_unittest.cc2
-rw-r--r--chrome/browser/extensions/extension_system_impl.cc2
-rw-r--r--chrome/browser/extensions/extension_toolbar_model.cc16
-rw-r--r--chrome/browser/extensions/extension_ui_unittest.cc27
-rw-r--r--chrome/browser/extensions/external_install_error.cc2
-rw-r--r--chrome/browser/extensions/external_provider_impl.cc2
-rw-r--r--chrome/browser/extensions/install_verifier.cc4
-rw-r--r--chrome/browser/extensions/installed_loader.cc7
-rw-r--r--chrome/browser/extensions/location_bar_controller.cc4
-rw-r--r--chrome/browser/extensions/permissions_updater.cc13
-rw-r--r--chrome/browser/extensions/permissions_updater_unittest.cc14
-rw-r--r--chrome/browser/extensions/process_manager_browsertest.cc2
-rw-r--r--chrome/browser/extensions/sandboxed_unpacker.cc5
-rw-r--r--chrome/browser/extensions/settings_api_helpers.cc4
-rw-r--r--chrome/browser/extensions/shared_module_service_unittest.cc22
-rw-r--r--chrome/browser/extensions/test_blacklist_state_fetcher.cc2
-rw-r--r--chrome/browser/extensions/updater/extension_downloader.cc6
-rw-r--r--chrome/browser/extensions/user_script_loader.cc4
-rw-r--r--chrome/browser/extensions/webstore_installer.cc4
-rw-r--r--chrome/browser/extensions/webstore_standalone_installer.cc8
37 files changed, 244 insertions, 214 deletions
diff --git a/chrome/browser/extensions/active_script_controller_unittest.cc b/chrome/browser/extensions/active_script_controller_unittest.cc
index f816f6d..010ad02 100644
--- a/chrome/browser/extensions/active_script_controller_unittest.cc
+++ b/chrome/browser/extensions/active_script_controller_unittest.cc
@@ -110,8 +110,8 @@ const Extension* ActiveScriptControllerUnitTest::AddExtension() {
.Build();
ExtensionRegistry::Get(profile())->AddEnabled(extension_);
- PermissionsUpdater(profile()).InitializePermissions(extension_);
- return extension_;
+ PermissionsUpdater(profile()).InitializePermissions(extension_.get());
+ return extension_.get();
}
const Extension* ActiveScriptControllerUnitTest::ReloadExtension() {
diff --git a/chrome/browser/extensions/active_tab_unittest.cc b/chrome/browser/extensions/active_tab_unittest.cc
index b360fbd..efa00dc 100644
--- a/chrome/browser/extensions/active_tab_unittest.cc
+++ b/chrome/browser/extensions/active_tab_unittest.cc
@@ -108,8 +108,8 @@ class ActiveTabTest : public ChromeRenderViewHostTestHarness {
PermittedFeature feature,
int tab_id) {
const PermissionsData* permissions_data = extension->permissions_data();
- bool script =
- permissions_data->CanAccessPage(extension, url, url, tab_id, -1, NULL);
+ bool script = permissions_data->CanAccessPage(
+ extension.get(), url, url, tab_id, -1, NULL);
bool capture = HasTabsPermission(extension, tab_id) &&
permissions_data->CanCaptureVisiblePage(tab_id, NULL);
switch (feature) {
diff --git a/chrome/browser/extensions/blacklist.cc b/chrome/browser/extensions/blacklist.cc
index 56079f0..4d90dee 100644
--- a/chrome/browser/extensions/blacklist.cc
+++ b/chrome/browser/extensions/blacklist.cc
@@ -160,7 +160,7 @@ Blacklist::ScopedDatabaseManagerForTest::~ScopedDatabaseManagerForTest() {
Blacklist::Blacklist(ExtensionPrefs* prefs) {
scoped_refptr<SafeBrowsingDatabaseManager> database_manager =
g_database_manager.Get().get();
- if (database_manager) {
+ if (database_manager.get()) {
registrar_.Add(
this,
chrome::NOTIFICATION_SAFE_BROWSING_UPDATE_COMPLETE,
diff --git a/chrome/browser/extensions/blacklist_state_fetcher.cc b/chrome/browser/extensions/blacklist_state_fetcher.cc
index c28afa0..bbb6523 100644
--- a/chrome/browser/extensions/blacklist_state_fetcher.cc
+++ b/chrome/browser/extensions/blacklist_state_fetcher.cc
@@ -40,7 +40,7 @@ class BlacklistRequestContextGetter : public net::URLRequestContextGetter {
DCHECK_CURRENTLY_ON(BrowserThread::IO);
scoped_refptr<net::URLRequestContextGetter> context_getter =
- new BlacklistRequestContextGetter(parent_context_getter);
+ new BlacklistRequestContextGetter(parent_context_getter.get());
BrowserThread::PostTask(BrowserThread::UI,
FROM_HERE,
base::Bind(callback, context_getter));
@@ -99,8 +99,8 @@ void BlacklistStateFetcher::Request(const std::string& id,
if (request_already_sent)
return;
- if (url_request_context_getter_ ||
- !g_browser_process || !g_browser_process->safe_browsing_service()) {
+ if (url_request_context_getter_.get() || !g_browser_process ||
+ !g_browser_process->safe_browsing_service()) {
SendRequest(id);
} else {
scoped_refptr<net::URLRequestContextGetter> parent_request_context;
@@ -125,7 +125,7 @@ void BlacklistStateFetcher::SaveRequestContext(
const std::string& id,
scoped_refptr<net::URLRequestContextGetter> request_context_getter) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
- if (!url_request_context_getter_)
+ if (!url_request_context_getter_.get())
url_request_context_getter_ = request_context_getter;
SendRequest(id);
}
@@ -145,7 +145,7 @@ void BlacklistStateFetcher::SendRequest(const std::string& id) {
this);
requests_[fetcher] = id;
fetcher->SetAutomaticallyRetryOn5xx(false); // Don't retry on error.
- fetcher->SetRequestContext(url_request_context_getter_);
+ fetcher->SetRequestContext(url_request_context_getter_.get());
fetcher->SetUploadData("application/octet-stream", request_str);
fetcher->Start();
}
diff --git a/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc b/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc
index aba1f6f..422194c 100644
--- a/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc
+++ b/chrome/browser/extensions/browser_permissions_policy_delegate_unittest.cc
@@ -75,14 +75,14 @@ TEST_F(BrowserPermissionsPolicyDelegateTest, CanExecuteScriptOnPage) {
// The same call should succeed with a normal process, but fail with a signin
// process.
const PermissionsData* permissions_data = extension->permissions_data();
- EXPECT_TRUE(permissions_data->CanAccessPage(extension,
+ EXPECT_TRUE(permissions_data->CanAccessPage(extension.get(),
kSigninUrl,
kSigninUrl,
-1, // no tab id.
normal_process.GetID(),
&error))
<< error;
- EXPECT_FALSE(permissions_data->CanAccessPage(extension,
+ EXPECT_FALSE(permissions_data->CanAccessPage(extension.get(),
kSigninUrl,
kSigninUrl,
-1, // no tab id.
diff --git a/chrome/browser/extensions/crx_installer.cc b/chrome/browser/extensions/crx_installer.cc
index 5dd139e..77a1a47 100644
--- a/chrome/browser/extensions/crx_installer.cc
+++ b/chrome/browser/extensions/crx_installer.cc
@@ -307,7 +307,7 @@ CrxInstallerError CrxInstaller::AllowInstall(const Extension* extension) {
scoped_refptr<const PermissionSet> expected_permissions =
dummy_extension->permissions_data()->active_permissions();
valid = !(PermissionMessageProvider::Get()->IsPrivilegeIncrease(
- expected_permissions,
+ expected_permissions.get(),
extension->permissions_data()->active_permissions(),
extension->GetType()));
}
diff --git a/chrome/browser/extensions/error_console/error_console_unittest.cc b/chrome/browser/extensions/error_console/error_console_unittest.cc
index d330cbf..b6f18ab 100644
--- a/chrome/browser/extensions/error_console/error_console_unittest.cc
+++ b/chrome/browser/extensions/error_console/error_console_unittest.cc
@@ -111,14 +111,14 @@ TEST_F(ErrorConsoleUnitTest, EnableAndDisableErrorConsole) {
.Build();
ExtensionRegistry* registry = ExtensionRegistry::Get(profile_.get());
registry->AddEnabled(adt);
- registry->TriggerOnLoaded(adt);
+ registry->TriggerOnLoaded(adt.get());
EXPECT_TRUE(error_console_->enabled());
EXPECT_FALSE(error_console_->IsEnabledForChromeExtensionsPage());
EXPECT_TRUE(error_console_->IsEnabledForAppsDeveloperTools());
// Unloading the Apps Developer Tools should disable error console.
registry->RemoveEnabled(adt->id());
- registry->TriggerOnUnloaded(adt, UnloadedExtensionInfo::REASON_DISABLE);
+ registry->TriggerOnUnloaded(adt.get(), UnloadedExtensionInfo::REASON_DISABLE);
EXPECT_FALSE(error_console_->enabled());
EXPECT_FALSE(error_console_->IsEnabledForChromeExtensionsPage());
EXPECT_FALSE(error_console_->IsEnabledForAppsDeveloperTools());
diff --git a/chrome/browser/extensions/extension_action_manager_unittest.cc b/chrome/browser/extensions/extension_action_manager_unittest.cc
index d77ca8d..2240125 100644
--- a/chrome/browser/extensions/extension_action_manager_unittest.cc
+++ b/chrome/browser/extensions/extension_action_manager_unittest.cc
@@ -121,11 +121,11 @@ void ExtensionActionManagerTest::TestPopulateMissingValues(
action_type);
ASSERT_TRUE(extension.get());
- const ExtensionAction* action = GetAction(action_type, *extension);
+ const ExtensionAction* action = GetAction(action_type, *extension.get());
ASSERT_TRUE(action);
- ASSERT_TRUE(TitlesMatch(*extension, *action));
- ASSERT_TRUE(IconsMatch(*extension, 128, *action, 38));
+ ASSERT_TRUE(TitlesMatch(*extension.get(), *action));
+ ASSERT_TRUE(IconsMatch(*extension.get(), 128, *action, 38));
// Test that the action's missing default_icons are not replaced with smaller
// icons.
@@ -135,11 +135,11 @@ void ExtensionActionManagerTest::TestPopulateMissingValues(
action_type);
ASSERT_TRUE(extension.get());
- action = GetAction(action_type, *extension);
+ action = GetAction(action_type, *extension.get());
ASSERT_TRUE(action);
- ASSERT_TRUE(IconsMatch(*extension, 24, *action, 19));
- ASSERT_FALSE(IconsMatch(*extension, 24, *action, 38));
+ ASSERT_TRUE(IconsMatch(*extension.get(), 24, *action, 19));
+ ASSERT_FALSE(IconsMatch(*extension.get(), 24, *action, 38));
// Test that an action's 19px icon is not replaced if a 38px action icon
// exists.
@@ -150,10 +150,10 @@ void ExtensionActionManagerTest::TestPopulateMissingValues(
action_type);
ASSERT_TRUE(extension.get());
- action = GetAction(action_type, *extension);
+ action = GetAction(action_type, *extension.get());
ASSERT_TRUE(action);
- ASSERT_FALSE(IconsMatch(*extension, 128, *action, 19));
+ ASSERT_FALSE(IconsMatch(*extension.get(), 128, *action, 19));
// Test that existing default_icons and default_title are not replaced.
extension = BuildExtension(
@@ -165,12 +165,12 @@ void ExtensionActionManagerTest::TestPopulateMissingValues(
action_type);
ASSERT_TRUE(extension.get());
- action = GetAction(action_type, *extension);
+ action = GetAction(action_type, *extension.get());
ASSERT_TRUE(action);
- ASSERT_FALSE(TitlesMatch(*extension, *action));
- ASSERT_FALSE(IconsMatch(*extension, 128, *action, 19));
- ASSERT_FALSE(IconsMatch(*extension, 128, *action, 38));
+ ASSERT_FALSE(TitlesMatch(*extension.get(), *action));
+ ASSERT_FALSE(IconsMatch(*extension.get(), 128, *action, 19));
+ ASSERT_FALSE(IconsMatch(*extension.get(), 128, *action, 38));
}
namespace {
@@ -195,7 +195,7 @@ TEST_F(ExtensionActionManagerTest, GetBestFitActionTest) {
// Get a "best fit" browser action for |extension|.
scoped_ptr<ExtensionAction> action =
- manager()->GetBestFitAction(*extension, ActionInfo::TYPE_BROWSER);
+ manager()->GetBestFitAction(*extension.get(), ActionInfo::TYPE_BROWSER);
ASSERT_TRUE(action.get());
ASSERT_EQ(action->action_type(), ActionInfo::TYPE_BROWSER);
@@ -211,12 +211,13 @@ TEST_F(ExtensionActionManagerTest, GetBestFitActionTest) {
kPageAction);
ASSERT_TRUE(extension.get());
- action = manager()->GetBestFitAction(*extension, ActionInfo::TYPE_BROWSER);
+ action =
+ manager()->GetBestFitAction(*extension.get(), ActionInfo::TYPE_BROWSER);
// Now these values match because |extension| does not have page action
// defaults.
- ASSERT_TRUE(TitlesMatch(*extension, *action));
- ASSERT_TRUE(IconsMatch(*extension, 48, *action, 38));
+ ASSERT_TRUE(TitlesMatch(*extension.get(), *action));
+ ASSERT_TRUE(IconsMatch(*extension.get(), 48, *action, 38));
}
} // namespace
diff --git a/chrome/browser/extensions/extension_context_menu_model_unittest.cc b/chrome/browser/extensions/extension_context_menu_model_unittest.cc
index 51d645c..47d02db 100644
--- a/chrome/browser/extensions/extension_context_menu_model_unittest.cc
+++ b/chrome/browser/extensions/extension_context_menu_model_unittest.cc
@@ -172,41 +172,41 @@ TEST_F(ExtensionContextMenuModelTest, ExtensionItemTest) {
new ExtensionContextMenuModel(extension.get(), browser.get()));
// There should be no extension items yet.
- EXPECT_EQ(0, CountExtensionItems(menu));
+ EXPECT_EQ(0, CountExtensionItems(menu.get()));
// Add a browser action menu item for |extension| to |manager|.
AddContextItemAndRefreshModel(
- manager, extension.get(), MenuItem::BROWSER_ACTION, menu);
+ manager, extension.get(), MenuItem::BROWSER_ACTION, menu.get());
// Since |extension| has a page action, the browser action menu item should
// not be present.
- EXPECT_EQ(0, CountExtensionItems(menu));
+ EXPECT_EQ(0, CountExtensionItems(menu.get()));
// Add a page action menu item and reset the context menu.
AddContextItemAndRefreshModel(
- manager, extension.get(), MenuItem::PAGE_ACTION, menu);
+ manager, extension.get(), MenuItem::PAGE_ACTION, menu.get());
// The page action item should be present because |extension| has a page
// action.
- EXPECT_EQ(1, CountExtensionItems(menu));
+ EXPECT_EQ(1, CountExtensionItems(menu.get()));
// Create more page action items to test top level menu item limitations.
for (int i = 0; i < api::context_menus::ACTION_MENU_TOP_LEVEL_LIMIT; ++i)
AddContextItemAndRefreshModel(
- manager, extension.get(), MenuItem::PAGE_ACTION, menu);
+ manager, extension.get(), MenuItem::PAGE_ACTION, menu.get());
// The menu should only have a limited number of extension items, since they
// are all top level items, and we limit the number of top level extension
// items.
EXPECT_EQ(api::context_menus::ACTION_MENU_TOP_LEVEL_LIMIT,
- CountExtensionItems(menu));
+ CountExtensionItems(menu.get()));
AddContextItemAndRefreshModel(
- manager, extension.get(), MenuItem::PAGE_ACTION, menu);
+ manager, extension.get(), MenuItem::PAGE_ACTION, menu.get());
// Adding another top level item should not increase the count.
EXPECT_EQ(api::context_menus::ACTION_MENU_TOP_LEVEL_LIMIT,
- CountExtensionItems(menu));
+ CountExtensionItems(menu.get()));
}
// Test that the "show" and "hide" menu items appear correctly in the extension
diff --git a/chrome/browser/extensions/extension_error_controller.cc b/chrome/browser/extensions/extension_error_controller.cc
index 8ae3154..cf2f07c 100644
--- a/chrome/browser/extensions/extension_error_controller.cc
+++ b/chrome/browser/extensions/extension_error_controller.cc
@@ -119,7 +119,7 @@ void ExtensionErrorController::IdentifyAlertableExtensions() {
for (ExtensionSet::const_iterator iter = enabled_set.begin();
iter != enabled_set.end();
++iter) {
- const Extension* extension = *iter;
+ const Extension* extension = iter->get();
// Skip for extensions that have pending updates. They will be checked again
// once the pending update is finished.
diff --git a/chrome/browser/extensions/extension_error_controller_unittest.cc b/chrome/browser/extensions/extension_error_controller_unittest.cc
index ef8e6b1..2868a67 100644
--- a/chrome/browser/extensions/extension_error_controller_unittest.cc
+++ b/chrome/browser/extensions/extension_error_controller_unittest.cc
@@ -152,7 +152,7 @@ ExtensionPrefs* ExtensionErrorControllerUnitTest::GetPrefs() {
TEST_F(ExtensionErrorControllerUnitTest, ClosingAcknowledgesBlacklisted) {
// Add a blacklisted extension.
scoped_refptr<const Extension> extension = BuildExtension();
- ASSERT_TRUE(AddBlacklistedExtension(extension));
+ ASSERT_TRUE(AddBlacklistedExtension(extension.get()));
service_->Init();
@@ -181,7 +181,7 @@ TEST_F(ExtensionErrorControllerUnitTest, ClosingAcknowledgesBlacklisted) {
TEST_F(ExtensionErrorControllerUnitTest, AcceptingAcknowledgesBlacklisted) {
// Add a blacklisted extension.
scoped_refptr<const Extension> extension = BuildExtension();
- ASSERT_TRUE(AddBlacklistedExtension(extension));
+ ASSERT_TRUE(AddBlacklistedExtension(extension.get()));
service_->Init();
@@ -200,7 +200,7 @@ TEST_F(ExtensionErrorControllerUnitTest, AcceptingAcknowledgesBlacklisted) {
// already been acknowledged.
TEST_F(ExtensionErrorControllerUnitTest, DontWarnForAcknowledgedBlacklisted) {
scoped_refptr<const Extension> extension = BuildExtension();
- ASSERT_TRUE(AddBlacklistedExtension(extension));
+ ASSERT_TRUE(AddBlacklistedExtension(extension.get()));
GetPrefs()->AcknowledgeBlacklistedExtension(extension->id());
diff --git a/chrome/browser/extensions/extension_gcm_app_handler_unittest.cc b/chrome/browser/extensions/extension_gcm_app_handler_unittest.cc
index 21027f3..5aef203 100644
--- a/chrome/browser/extensions/extension_gcm_app_handler_unittest.cc
+++ b/chrome/browser/extensions/extension_gcm_app_handler_unittest.cc
@@ -411,29 +411,29 @@ TEST_F(ExtensionGCMAppHandlerTest, AddAndRemoveAppHandler) {
scoped_refptr<Extension> extension(CreateExtension());
// App handler is added when extension is loaded.
- LoadExtension(extension);
+ LoadExtension(extension.get());
waiter()->PumpUILoop();
EXPECT_TRUE(HasAppHandlers(extension->id()));
// App handler is removed when extension is unloaded.
- DisableExtension(extension);
+ DisableExtension(extension.get());
waiter()->PumpUILoop();
EXPECT_FALSE(HasAppHandlers(extension->id()));
// App handler is added when extension is reloaded.
- EnableExtension(extension);
+ EnableExtension(extension.get());
waiter()->PumpUILoop();
EXPECT_TRUE(HasAppHandlers(extension->id()));
// App handler is removed when extension is uninstalled.
- UninstallExtension(extension);
+ UninstallExtension(extension.get());
waiter()->PumpUILoop();
EXPECT_FALSE(HasAppHandlers(extension->id()));
}
TEST_F(ExtensionGCMAppHandlerTest, UnregisterOnExtensionUninstall) {
scoped_refptr<Extension> extension(CreateExtension());
- LoadExtension(extension);
+ LoadExtension(extension.get());
// Sign-in is needed for registration.
SignIn(kTestingUsername);
@@ -451,7 +451,7 @@ TEST_F(ExtensionGCMAppHandlerTest, UnregisterOnExtensionUninstall) {
GetGCMDriver()->AddAppHandler("Foo", gcm_app_handler());
// Unregistration should be triggered when the extension is uninstalled.
- UninstallExtension(extension);
+ UninstallExtension(extension.get());
waiter()->WaitUntilCompleted();
EXPECT_EQ(gcm::GCMClient::SUCCESS,
gcm_app_handler()->unregistration_result());
@@ -464,12 +464,12 @@ TEST_F(ExtensionGCMAppHandlerTest, UpdateExtensionWithGcmPermissionKept) {
scoped_refptr<Extension> extension(CreateExtension());
// App handler is added when the extension is loaded.
- LoadExtension(extension);
+ LoadExtension(extension.get());
waiter()->PumpUILoop();
EXPECT_TRUE(HasAppHandlers(extension->id()));
// App handler count should not drop to zero when the extension is updated.
- UpdateExtension(extension, "gcm2.crx");
+ UpdateExtension(extension.get(), "gcm2.crx");
waiter()->PumpUILoop();
EXPECT_FALSE(gcm_app_handler()->app_handler_count_drop_to_zero());
EXPECT_TRUE(HasAppHandlers(extension->id()));
@@ -479,13 +479,13 @@ TEST_F(ExtensionGCMAppHandlerTest, UpdateExtensionWithGcmPermissionRemoved) {
scoped_refptr<Extension> extension(CreateExtension());
// App handler is added when the extension is loaded.
- LoadExtension(extension);
+ LoadExtension(extension.get());
waiter()->PumpUILoop();
EXPECT_TRUE(HasAppHandlers(extension->id()));
// App handler is removed when the extension is updated to the version that
// has GCM permission removed.
- UpdateExtension(extension, "good2.crx");
+ UpdateExtension(extension.get(), "good2.crx");
waiter()->PumpUILoop();
EXPECT_TRUE(gcm_app_handler()->app_handler_count_drop_to_zero());
EXPECT_FALSE(HasAppHandlers(extension->id()));
diff --git a/chrome/browser/extensions/extension_install_prompt.cc b/chrome/browser/extensions/extension_install_prompt.cc
index 82745c9..dec1aa5 100644
--- a/chrome/browser/extensions/extension_install_prompt.cc
+++ b/chrome/browser/extensions/extension_install_prompt.cc
@@ -311,8 +311,8 @@ int ExtensionInstallPrompt::Prompt::GetDialogButtons() const {
}
bool ExtensionInstallPrompt::Prompt::ShouldShowExplanationText() const {
- return type_ == INSTALL_PROMPT &&
- extension_->is_extension() && experiment_ && experiment_->text_only();
+ return type_ == INSTALL_PROMPT && extension_->is_extension() &&
+ experiment_.get() && experiment_->text_only();
}
bool ExtensionInstallPrompt::Prompt::HasAcceptButtonLabel() const {
@@ -748,9 +748,9 @@ void ExtensionInstallPrompt::ShowConfirmation() {
const extensions::PermissionMessageProvider* message_provider =
extensions::PermissionMessageProvider::Get();
prompt_->SetPermissions(
- message_provider->GetWarningMessages(permissions_, type));
+ message_provider->GetWarningMessages(permissions_.get(), type));
prompt_->SetPermissionsDetails(
- message_provider->GetWarningMessagesDetails(permissions_, type));
+ message_provider->GetWarningMessagesDetails(permissions_.get(), type));
}
switch (prompt_->type()) {
diff --git a/chrome/browser/extensions/extension_install_prompt.h b/chrome/browser/extensions/extension_install_prompt.h
index bc185eb..54fa47e 100644
--- a/chrome/browser/extensions/extension_install_prompt.h
+++ b/chrome/browser/extensions/extension_install_prompt.h
@@ -167,7 +167,7 @@ class ExtensionInstallPrompt
bool has_webstore_data() const { return has_webstore_data_; }
const ExtensionInstallPromptExperiment* experiment() const {
- return experiment_;
+ return experiment_.get();
}
void set_experiment(ExtensionInstallPromptExperiment* experiment) {
experiment_ = experiment;
diff --git a/chrome/browser/extensions/extension_install_prompt_unittest.cc b/chrome/browser/extensions/extension_install_prompt_unittest.cc
index 347db0f..d43e46b 100644
--- a/chrome/browser/extensions/extension_install_prompt_unittest.cc
+++ b/chrome/browser/extensions/extension_install_prompt_unittest.cc
@@ -49,8 +49,8 @@ TEST(ExtensionInstallPromptUnittest, PromptShowsPermissionWarnings) {
prompt.set_callback_for_test(base::Bind(&VerifyPromptPermissionsCallback,
run_loop.QuitClosure()));
prompt.ConfirmPermissions(NULL, // no delegate
- extension,
- permission_set);
+ extension.get(),
+ permission_set.get());
run_loop.Run();
}
diff --git a/chrome/browser/extensions/extension_messages_apitest.cc b/chrome/browser/extensions/extension_messages_apitest.cc
index 1d6fff6..456d85c 100644
--- a/chrome/browser/extensions/extension_messages_apitest.cc
+++ b/chrome/browser/extensions/extension_messages_apitest.cc
@@ -461,12 +461,12 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest, NotInstalled) {
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
EXPECT_EQ(NAMESPACE_NOT_DEFINED,
- CanConnectAndSendMessagesToMainFrame(extension));
+ CanConnectAndSendMessagesToMainFrame(extension.get()));
EXPECT_FALSE(AreAnyNonWebApisDefinedForMainFrame());
ui_test_utils::NavigateToURL(browser(), google_com_url());
EXPECT_EQ(NAMESPACE_NOT_DEFINED,
- CanConnectAndSendMessagesToMainFrame(extension));
+ CanConnectAndSendMessagesToMainFrame(extension.get()));
EXPECT_FALSE(AreAnyNonWebApisDefinedForMainFrame());
}
@@ -477,30 +477,33 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
// Install the web connectable extension. chromium.org can connect to it,
// google.com can't.
- const Extension* chromium_connectable = LoadChromiumConnectableExtension();
+ scoped_refptr<const Extension> chromium_connectable =
+ LoadChromiumConnectableExtension();
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
- EXPECT_EQ(OK, CanConnectAndSendMessagesToMainFrame(chromium_connectable));
+ EXPECT_EQ(OK,
+ CanConnectAndSendMessagesToMainFrame(chromium_connectable.get()));
EXPECT_FALSE(AreAnyNonWebApisDefinedForMainFrame());
ui_test_utils::NavigateToURL(browser(), google_com_url());
EXPECT_EQ(NAMESPACE_NOT_DEFINED,
- CanConnectAndSendMessagesToMainFrame(chromium_connectable));
+ CanConnectAndSendMessagesToMainFrame(chromium_connectable.get()));
EXPECT_FALSE(AreAnyNonWebApisDefinedForMainFrame());
// Install the non-connectable extension. Nothing can connect to it.
- const Extension* not_connectable = LoadNotConnectableExtension();
+ scoped_refptr<const Extension> not_connectable =
+ LoadNotConnectableExtension();
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
// Namespace will be defined here because |chromium_connectable| can connect
// to it - so this will be the "cannot establish connection" error.
EXPECT_EQ(COULD_NOT_ESTABLISH_CONNECTION_ERROR,
- CanConnectAndSendMessagesToMainFrame(not_connectable));
+ CanConnectAndSendMessagesToMainFrame(not_connectable.get()));
EXPECT_FALSE(AreAnyNonWebApisDefinedForMainFrame());
ui_test_utils::NavigateToURL(browser(), google_com_url());
EXPECT_EQ(NAMESPACE_NOT_DEFINED,
- CanConnectAndSendMessagesToMainFrame(not_connectable));
+ CanConnectAndSendMessagesToMainFrame(not_connectable.get()));
EXPECT_FALSE(AreAnyNonWebApisDefinedForMainFrame());
}
@@ -510,16 +513,18 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
InitializeTestServer();
// Install the web connectable extension.
- const Extension* chromium_connectable = LoadChromiumConnectableExtension();
+ scoped_refptr<const Extension> chromium_connectable =
+ LoadChromiumConnectableExtension();
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
// If the background page closes after receipt of the message, it will still
// reply to this message...
EXPECT_EQ(OK,
- CanConnectAndSendMessagesToMainFrame(chromium_connectable,
+ CanConnectAndSendMessagesToMainFrame(chromium_connectable.get(),
close_background_message()));
// and be re-opened by receipt of a subsequent message.
- EXPECT_EQ(OK, CanConnectAndSendMessagesToMainFrame(chromium_connectable));
+ EXPECT_EQ(OK,
+ CanConnectAndSendMessagesToMainFrame(chromium_connectable.get()));
}
// Tests a web connectable extension that doesn't receive TLS channel id.
@@ -529,20 +534,21 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
// Install the web connectable extension. chromium.org can connect to it,
// google.com can't.
- const Extension* chromium_connectable = LoadChromiumConnectableExtension();
- ASSERT_TRUE(chromium_connectable);
+ scoped_refptr<const Extension> chromium_connectable =
+ LoadChromiumConnectableExtension();
+ ASSERT_TRUE(chromium_connectable.get());
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
// The web connectable extension doesn't request the TLS channel ID, so it
// doesn't get it, whether or not the page asks for it.
EXPECT_EQ(std::string(),
- GetTlsChannelIdFromPortConnect(chromium_connectable, false));
+ GetTlsChannelIdFromPortConnect(chromium_connectable.get(), false));
EXPECT_EQ(std::string(),
- GetTlsChannelIdFromSendMessage(chromium_connectable, true));
+ GetTlsChannelIdFromSendMessage(chromium_connectable.get(), true));
EXPECT_EQ(std::string(),
- GetTlsChannelIdFromPortConnect(chromium_connectable, false));
+ GetTlsChannelIdFromPortConnect(chromium_connectable.get(), false));
EXPECT_EQ(std::string(),
- GetTlsChannelIdFromSendMessage(chromium_connectable, true));
+ GetTlsChannelIdFromSendMessage(chromium_connectable.get(), true));
}
// Tests a web connectable extension that receives TLS channel id with a site
@@ -551,21 +557,21 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
WebConnectableWithTlsChannelIdWithNonMatchingSite) {
InitializeTestServer();
- const Extension* chromium_connectable =
+ scoped_refptr<const Extension> chromium_connectable =
LoadChromiumConnectableExtensionWithTlsChannelId();
- ASSERT_TRUE(chromium_connectable);
+ ASSERT_TRUE(chromium_connectable.get());
ui_test_utils::NavigateToURL(browser(), google_com_url());
// The extension requests the TLS channel ID, but it doesn't get it for a
// site that can't connect to it, regardless of whether the page asks for it.
EXPECT_EQ(base::StringPrintf("%d", NAMESPACE_NOT_DEFINED),
- GetTlsChannelIdFromPortConnect(chromium_connectable, false));
+ GetTlsChannelIdFromPortConnect(chromium_connectable.get(), false));
EXPECT_EQ(base::StringPrintf("%d", NAMESPACE_NOT_DEFINED),
- GetTlsChannelIdFromSendMessage(chromium_connectable, true));
+ GetTlsChannelIdFromSendMessage(chromium_connectable.get(), true));
EXPECT_EQ(base::StringPrintf("%d", NAMESPACE_NOT_DEFINED),
- GetTlsChannelIdFromPortConnect(chromium_connectable, false));
+ GetTlsChannelIdFromPortConnect(chromium_connectable.get(), false));
EXPECT_EQ(base::StringPrintf("%d", NAMESPACE_NOT_DEFINED),
- GetTlsChannelIdFromSendMessage(chromium_connectable, true));
+ GetTlsChannelIdFromSendMessage(chromium_connectable.get(), true));
}
// Tests a web connectable extension that receives TLS channel id on a site
@@ -574,21 +580,21 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
WebConnectableWithTlsChannelIdWithEmptyTlsChannelId) {
InitializeTestServer();
- const Extension* chromium_connectable =
+ scoped_refptr<const Extension> chromium_connectable =
LoadChromiumConnectableExtensionWithTlsChannelId();
- ASSERT_TRUE(chromium_connectable);
+ ASSERT_TRUE(chromium_connectable.get());
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
// Since the extension requests the TLS channel ID, it gets it for a site that
// can connect to it, but only if the page also asks to include it.
EXPECT_EQ(std::string(),
- GetTlsChannelIdFromPortConnect(chromium_connectable, false));
+ GetTlsChannelIdFromPortConnect(chromium_connectable.get(), false));
EXPECT_EQ(std::string(),
- GetTlsChannelIdFromSendMessage(chromium_connectable, false));
+ GetTlsChannelIdFromSendMessage(chromium_connectable.get(), false));
// If the page does ask for it, it isn't empty.
std::string tls_channel_id =
- GetTlsChannelIdFromPortConnect(chromium_connectable, true);
+ GetTlsChannelIdFromPortConnect(chromium_connectable.get(), true);
// Because the TLS channel ID has never been generated for this domain,
// no TLS channel ID is reported.
EXPECT_EQ(std::string(), tls_channel_id);
@@ -601,20 +607,21 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
DISABLED_WebConnectableWithEmptyTlsChannelIdAndClosedBackgroundPage) {
InitializeTestServer();
- const Extension* chromium_connectable =
+ scoped_refptr<const Extension> chromium_connectable =
LoadChromiumConnectableExtensionWithTlsChannelId();
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
// If the page does ask for it, it isn't empty, even if the background page
// closes upon receipt of the connect.
std::string tls_channel_id = GetTlsChannelIdFromPortConnect(
- chromium_connectable, true, close_background_message());
+ chromium_connectable.get(), true, close_background_message());
// Because the TLS channel ID has never been generated for this domain,
// no TLS channel ID is reported.
EXPECT_EQ(std::string(), tls_channel_id);
// A subsequent connect will still succeed, even if the background page was
// previously closed.
- tls_channel_id = GetTlsChannelIdFromPortConnect(chromium_connectable, true);
+ tls_channel_id =
+ GetTlsChannelIdFromPortConnect(chromium_connectable.get(), true);
// And the empty value is still retrieved.
EXPECT_EQ(std::string(), tls_channel_id);
}
@@ -628,22 +635,26 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
EnablingAndDisabling) {
InitializeTestServer();
- const Extension* chromium_connectable = LoadChromiumConnectableExtension();
- const Extension* not_connectable = LoadNotConnectableExtension();
+ scoped_refptr<const Extension> chromium_connectable =
+ LoadChromiumConnectableExtension();
+ scoped_refptr<const Extension> not_connectable =
+ LoadNotConnectableExtension();
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
- EXPECT_EQ(OK, CanConnectAndSendMessagesToMainFrame(chromium_connectable));
+ EXPECT_EQ(OK,
+ CanConnectAndSendMessagesToMainFrame(chromium_connectable.get()));
EXPECT_EQ(COULD_NOT_ESTABLISH_CONNECTION_ERROR,
- CanConnectAndSendMessagesToMainFrame(not_connectable));
+ CanConnectAndSendMessagesToMainFrame(not_connectable.get()));
DisableExtension(chromium_connectable->id());
EXPECT_EQ(COULD_NOT_ESTABLISH_CONNECTION_ERROR,
- CanConnectAndSendMessagesToMainFrame(chromium_connectable));
+ CanConnectAndSendMessagesToMainFrame(chromium_connectable.get()));
EnableExtension(chromium_connectable->id());
- EXPECT_EQ(OK, CanConnectAndSendMessagesToMainFrame(chromium_connectable));
+ EXPECT_EQ(OK,
+ CanConnectAndSendMessagesToMainFrame(chromium_connectable.get()));
EXPECT_EQ(COULD_NOT_ESTABLISH_CONNECTION_ERROR,
- CanConnectAndSendMessagesToMainFrame(not_connectable));
+ CanConnectAndSendMessagesToMainFrame(not_connectable.get()));
}
// Tests connection from incognito tabs when the user denies the connection
@@ -673,20 +684,22 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
// No connection because incognito-enabled hasn't been set for the app, and
// the user denied our interactive request.
- EXPECT_EQ(COULD_NOT_ESTABLISH_CONNECTION_ERROR,
- CanConnectAndSendMessagesToFrame(incognito_frame, app, NULL));
+ EXPECT_EQ(
+ COULD_NOT_ESTABLISH_CONNECTION_ERROR,
+ CanConnectAndSendMessagesToFrame(incognito_frame, app.get(), NULL));
EXPECT_EQ(1, alert_tracker.GetAndResetAlertCount());
// Try again. User has already denied so alert not shown.
- EXPECT_EQ(COULD_NOT_ESTABLISH_CONNECTION_ERROR,
- CanConnectAndSendMessagesToFrame(incognito_frame, app, NULL));
+ EXPECT_EQ(
+ COULD_NOT_ESTABLISH_CONNECTION_ERROR,
+ CanConnectAndSendMessagesToFrame(incognito_frame, app.get(), NULL));
EXPECT_EQ(0, alert_tracker.GetAndResetAlertCount());
}
// It's not possible to allow an app in incognito.
ExtensionPrefs::Get(profile())->SetIsIncognitoEnabled(app->id(), true);
EXPECT_EQ(COULD_NOT_ESTABLISH_CONNECTION_ERROR,
- CanConnectAndSendMessagesToFrame(incognito_frame, app, NULL));
+ CanConnectAndSendMessagesToFrame(incognito_frame, app.get(), NULL));
}
IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
@@ -707,16 +720,17 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
IncognitoConnectability::ScopedAlertTracker::ALWAYS_DENY);
// The alert doesn't show for extensions.
- EXPECT_EQ(
- COULD_NOT_ESTABLISH_CONNECTION_ERROR,
- CanConnectAndSendMessagesToFrame(incognito_frame, extension, NULL));
+ EXPECT_EQ(COULD_NOT_ESTABLISH_CONNECTION_ERROR,
+ CanConnectAndSendMessagesToFrame(
+ incognito_frame, extension.get(), NULL));
EXPECT_EQ(0, alert_tracker.GetAndResetAlertCount());
}
// Allowing the extension in incognito mode will bypass the deny.
ExtensionPrefs::Get(profile())->SetIsIncognitoEnabled(extension->id(), true);
- EXPECT_EQ(OK,
- CanConnectAndSendMessagesToFrame(incognito_frame, extension, NULL));
+ EXPECT_EQ(
+ OK,
+ CanConnectAndSendMessagesToFrame(incognito_frame, extension.get(), NULL));
}
// Tests connection from incognito tabs when the user accepts the connection
@@ -742,18 +756,21 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
// Connection allowed even with incognito disabled, because the user
// accepted the interactive request.
- EXPECT_EQ(OK, CanConnectAndSendMessagesToFrame(incognito_frame, app, NULL));
+ EXPECT_EQ(
+ OK, CanConnectAndSendMessagesToFrame(incognito_frame, app.get(), NULL));
EXPECT_EQ(1, alert_tracker.GetAndResetAlertCount());
// Try again. User has already allowed.
- EXPECT_EQ(OK, CanConnectAndSendMessagesToFrame(incognito_frame, app, NULL));
+ EXPECT_EQ(
+ OK, CanConnectAndSendMessagesToFrame(incognito_frame, app.get(), NULL));
EXPECT_EQ(0, alert_tracker.GetAndResetAlertCount());
}
// Apps can't be allowed in incognito mode, but it's moot because it's
// already allowed.
ExtensionPrefs::Get(profile())->SetIsIncognitoEnabled(app->id(), true);
- EXPECT_EQ(OK, CanConnectAndSendMessagesToFrame(incognito_frame, app, NULL));
+ EXPECT_EQ(OK,
+ CanConnectAndSendMessagesToFrame(incognito_frame, app.get(), NULL));
}
IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
@@ -774,16 +791,17 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
IncognitoConnectability::ScopedAlertTracker::ALWAYS_ALLOW);
// No alert is shown.
- EXPECT_EQ(
- COULD_NOT_ESTABLISH_CONNECTION_ERROR,
- CanConnectAndSendMessagesToFrame(incognito_frame, extension, NULL));
+ EXPECT_EQ(COULD_NOT_ESTABLISH_CONNECTION_ERROR,
+ CanConnectAndSendMessagesToFrame(
+ incognito_frame, extension.get(), NULL));
EXPECT_EQ(0, alert_tracker.GetAndResetAlertCount());
}
// Allowing the extension in incognito mode is what allows connections.
ExtensionPrefs::Get(profile())->SetIsIncognitoEnabled(extension->id(), true);
- EXPECT_EQ(OK,
- CanConnectAndSendMessagesToFrame(incognito_frame, extension, NULL));
+ EXPECT_EQ(
+ OK,
+ CanConnectAndSendMessagesToFrame(incognito_frame, extension.get(), NULL));
}
// Tests a connection from an iframe within a tab which doesn't have
@@ -792,16 +810,16 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
FromIframeWithPermission) {
InitializeTestServer();
- const Extension* extension = LoadChromiumConnectableExtension();
+ scoped_refptr<const Extension> extension = LoadChromiumConnectableExtension();
ui_test_utils::NavigateToURL(browser(), google_com_url());
EXPECT_EQ(NAMESPACE_NOT_DEFINED,
- CanConnectAndSendMessagesToMainFrame(extension));
+ CanConnectAndSendMessagesToMainFrame(extension.get()));
EXPECT_FALSE(AreAnyNonWebApisDefinedForMainFrame());
ASSERT_TRUE(AppendIframe(chromium_org_url()));
- EXPECT_EQ(OK, CanConnectAndSendMessagesToIFrame(extension));
+ EXPECT_EQ(OK, CanConnectAndSendMessagesToIFrame(extension.get()));
EXPECT_FALSE(AreAnyNonWebApisDefinedForIFrame());
}
@@ -811,16 +829,16 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
FromIframeWithoutPermission) {
InitializeTestServer();
- const Extension* extension = LoadChromiumConnectableExtension();
+ scoped_refptr<const Extension> extension = LoadChromiumConnectableExtension();
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
- EXPECT_EQ(OK, CanConnectAndSendMessagesToMainFrame(extension));
+ EXPECT_EQ(OK, CanConnectAndSendMessagesToMainFrame(extension.get()));
EXPECT_FALSE(AreAnyNonWebApisDefinedForMainFrame());
ASSERT_TRUE(AppendIframe(google_com_url()));
EXPECT_EQ(NAMESPACE_NOT_DEFINED,
- CanConnectAndSendMessagesToIFrame(extension));
+ CanConnectAndSendMessagesToIFrame(extension.get()));
EXPECT_FALSE(AreAnyNonWebApisDefinedForIFrame());
}
@@ -899,27 +917,27 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingWithTlsChannelIdTest,
InitializeTestServer();
std::string expected_tls_channel_id_value = CreateTlsChannelId();
- const Extension* chromium_connectable =
+ scoped_refptr<const Extension> chromium_connectable =
LoadChromiumConnectableExtensionWithTlsChannelId();
- ASSERT_TRUE(chromium_connectable);
+ ASSERT_TRUE(chromium_connectable.get());
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
// Since the extension requests the TLS channel ID, it gets it for a site that
// can connect to it, but only if the page also asks to send it.
EXPECT_EQ(std::string(),
- GetTlsChannelIdFromPortConnect(chromium_connectable, false));
+ GetTlsChannelIdFromPortConnect(chromium_connectable.get(), false));
EXPECT_EQ(std::string(),
- GetTlsChannelIdFromSendMessage(chromium_connectable, false));
+ GetTlsChannelIdFromSendMessage(chromium_connectable.get(), false));
// If the page does ask to send the TLS channel ID, it's sent and non-empty.
std::string tls_channel_id_from_port_connect =
- GetTlsChannelIdFromPortConnect(chromium_connectable, true);
+ GetTlsChannelIdFromPortConnect(chromium_connectable.get(), true);
EXPECT_NE(0u, tls_channel_id_from_port_connect.size());
// The same value is received by both connect and sendMessage.
std::string tls_channel_id_from_send_message =
- GetTlsChannelIdFromSendMessage(chromium_connectable, true);
+ GetTlsChannelIdFromSendMessage(chromium_connectable.get(), true);
EXPECT_EQ(tls_channel_id_from_port_connect, tls_channel_id_from_send_message);
// And since a TLS channel ID exists for the domain, the value received is
@@ -930,18 +948,21 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingWithTlsChannelIdTest,
// The TLS channel ID shouldn't change from one connection to the next...
std::string tls_channel_id2 =
- GetTlsChannelIdFromPortConnect(chromium_connectable, true);
+ GetTlsChannelIdFromPortConnect(chromium_connectable.get(), true);
EXPECT_EQ(tls_channel_id, tls_channel_id2);
- tls_channel_id2 = GetTlsChannelIdFromSendMessage(chromium_connectable, true);
+ tls_channel_id2 =
+ GetTlsChannelIdFromSendMessage(chromium_connectable.get(), true);
EXPECT_EQ(tls_channel_id, tls_channel_id2);
// nor should it change when navigating away, revisiting the page and
// requesting it again.
ui_test_utils::NavigateToURL(browser(), google_com_url());
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
- tls_channel_id2 = GetTlsChannelIdFromPortConnect(chromium_connectable, true);
+ tls_channel_id2 =
+ GetTlsChannelIdFromPortConnect(chromium_connectable.get(), true);
EXPECT_EQ(tls_channel_id, tls_channel_id2);
- tls_channel_id2 = GetTlsChannelIdFromSendMessage(chromium_connectable, true);
+ tls_channel_id2 =
+ GetTlsChannelIdFromSendMessage(chromium_connectable.get(), true);
EXPECT_EQ(tls_channel_id, tls_channel_id2);
}
@@ -953,18 +974,19 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingWithTlsChannelIdTest,
InitializeTestServer();
std::string expected_tls_channel_id_value = CreateTlsChannelId();
- const Extension* chromium_connectable =
+ scoped_refptr<const Extension> chromium_connectable =
LoadChromiumConnectableExtensionWithTlsChannelId();
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
// If the page does ask for it, it isn't empty, even if the background page
// closes upon receipt of the connect.
std::string tls_channel_id = GetTlsChannelIdFromPortConnect(
- chromium_connectable, true, close_background_message());
+ chromium_connectable.get(), true, close_background_message());
EXPECT_EQ(expected_tls_channel_id_value, tls_channel_id);
// A subsequent connect will still succeed, even if the background page was
// previously closed.
- tls_channel_id = GetTlsChannelIdFromPortConnect(chromium_connectable, true);
+ tls_channel_id =
+ GetTlsChannelIdFromPortConnect(chromium_connectable.get(), true);
// And the expected value is still retrieved.
EXPECT_EQ(expected_tls_channel_id_value, tls_channel_id);
}
@@ -1023,12 +1045,13 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest, HostedAppOnWebsite) {
// The presence of the hosted app shouldn't give the ability to send messages.
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
- EXPECT_EQ(NAMESPACE_NOT_DEFINED, CanConnectAndSendMessagesToMainFrame(app));
+ EXPECT_EQ(NAMESPACE_NOT_DEFINED,
+ CanConnectAndSendMessagesToMainFrame(app.get()));
EXPECT_FALSE(AreAnyNonWebApisDefinedForMainFrame());
// Once a connectable extension is installed, it should.
- const Extension* extension = LoadChromiumConnectableExtension();
- EXPECT_EQ(OK, CanConnectAndSendMessagesToMainFrame(extension));
+ scoped_refptr<const Extension> extension = LoadChromiumConnectableExtension();
+ EXPECT_EQ(OK, CanConnectAndSendMessagesToMainFrame(extension.get()));
EXPECT_FALSE(AreAnyNonWebApisDefinedForMainFrame());
}
@@ -1057,7 +1080,7 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
ui_test_utils::NavigateToURL(browser(), chromium_org_url());
EXPECT_EQ(COULD_NOT_ESTABLISH_CONNECTION_ERROR,
- CanConnectAndSendMessagesToMainFrame(invalid));
+ CanConnectAndSendMessagesToMainFrame(invalid.get()));
}
#endif // !defined(OS_WIN) - http://crbug.com/350517.
diff --git a/chrome/browser/extensions/extension_service.cc b/chrome/browser/extensions/extension_service.cc
index 3ec1c33..3530824 100644
--- a/chrome/browser/extensions/extension_service.cc
+++ b/chrome/browser/extensions/extension_service.cc
@@ -937,7 +937,7 @@ void ExtensionService::DisableUserExtensions(
extension != to_disable.end(); ++extension) {
if ((*extension)->was_installed_by_default() &&
extension_urls::IsWebstoreUpdateUrl(
- extensions::ManifestURL::GetUpdateURL(*extension)))
+ extensions::ManifestURL::GetUpdateURL(extension->get())))
continue;
const std::string& id = (*extension)->id();
if (except_ids.end() == std::find(except_ids.begin(), except_ids.end(), id))
@@ -1522,7 +1522,7 @@ void ExtensionService::CheckPermissionsIncrease(const Extension* extension,
// to a version that requires additional privileges.
is_privilege_increase =
extensions::PermissionMessageProvider::Get()->IsPrivilegeIncrease(
- granted_permissions,
+ granted_permissions.get(),
extension->permissions_data()->active_permissions().get(),
extension->GetType());
}
diff --git a/chrome/browser/extensions/extension_service_unittest.cc b/chrome/browser/extensions/extension_service_unittest.cc
index d297132..f9ec4cd 100644
--- a/chrome/browser/extensions/extension_service_unittest.cc
+++ b/chrome/browser/extensions/extension_service_unittest.cc
@@ -1124,7 +1124,7 @@ class ExtensionServiceTest : public extensions::ExtensionServiceTestBase,
content::WindowedNotificationObserver observer(
extensions::NOTIFICATION_CRX_INSTALLER_DONE,
- content::Source<extensions::CrxInstaller>(installer));
+ content::Source<extensions::CrxInstaller>(installer.get()));
installer->InstallCrx(crx_path);
diff --git a/chrome/browser/extensions/extension_system_impl.cc b/chrome/browser/extensions/extension_system_impl.cc
index 36f3894..3e17480 100644
--- a/chrome/browser/extensions/extension_system_impl.cc
+++ b/chrome/browser/extensions/extension_system_impl.cc
@@ -415,7 +415,7 @@ void ExtensionSystemImpl::Shared::Shutdown() {
extension_warning_service_->RemoveObserver(
extension_warning_badge_service_.get());
}
- if (content_verifier_)
+ if (content_verifier_.get())
content_verifier_->Shutdown();
if (extension_service_)
extension_service_->Shutdown();
diff --git a/chrome/browser/extensions/extension_toolbar_model.cc b/chrome/browser/extensions/extension_toolbar_model.cc
index 0f6f9e4..35e51b2 100644
--- a/chrome/browser/extensions/extension_toolbar_model.cc
+++ b/chrome/browser/extensions/extension_toolbar_model.cc
@@ -409,7 +409,7 @@ void ExtensionToolbarModel::Populate(const ExtensionIdList& positions,
size_t items_count = toolbar_items_.size();
for (size_t i = 0; i < items_count; i++) {
- const Extension* extension = toolbar_items_.back();
+ const Extension* extension = toolbar_items_.back().get();
// By popping the extension here (before calling BrowserActionRemoved),
// we will not shrink visible count by one after BrowserActionRemoved
// calls SetVisibleCount.
@@ -433,8 +433,9 @@ void ExtensionToolbarModel::Populate(const ExtensionIdList& positions,
if (iter->get() != NULL) {
toolbar_items_.push_back(*iter);
FOR_EACH_OBSERVER(
- Observer, observers_, ToolbarExtensionAdded(
- *iter, toolbar_items_.size() - 1));
+ Observer,
+ observers_,
+ ToolbarExtensionAdded(iter->get(), toolbar_items_.size() - 1));
}
}
for (ExtensionList::const_iterator iter = unsorted.begin();
@@ -442,8 +443,9 @@ void ExtensionToolbarModel::Populate(const ExtensionIdList& positions,
if (iter->get() != NULL) {
toolbar_items_.push_back(*iter);
FOR_EACH_OBSERVER(
- Observer, observers_, ToolbarExtensionAdded(
- *iter, toolbar_items_.size() - 1));
+ Observer,
+ observers_,
+ ToolbarExtensionAdded(iter->get(), toolbar_items_.size() - 1));
}
}
@@ -506,7 +508,7 @@ void ExtensionToolbarModel::MaybeUpdateVisibilityPref(
void ExtensionToolbarModel::MaybeUpdateVisibilityPrefs() {
for (size_t i = 0u; i < toolbar_items_.size(); ++i)
- MaybeUpdateVisibilityPref(toolbar_items_[i], i);
+ MaybeUpdateVisibilityPref(toolbar_items_[i].get(), i);
}
int ExtensionToolbarModel::IncognitoIndexToOriginal(int incognito_index) {
@@ -602,7 +604,7 @@ void ExtensionToolbarModel::EnsureVisibility(
extension != toolbar_items_.end(); ++extension) {
if ((*extension)->id() == (*it)) {
if (extension - toolbar_items_.begin() >= visible_icon_count_)
- MoveExtensionIcon(*extension, 0);
+ MoveExtensionIcon(extension->get(), 0);
break;
}
}
diff --git a/chrome/browser/extensions/extension_ui_unittest.cc b/chrome/browser/extensions/extension_ui_unittest.cc
index b23ab50..49446b3 100644
--- a/chrome/browser/extensions/extension_ui_unittest.cc
+++ b/chrome/browser/extensions/extension_ui_unittest.cc
@@ -76,8 +76,9 @@ class ExtensionUITest : public testing::Test {
return static_cast<base::DictionaryValue*>(value);
}
- const Extension* CreateExtension(const std::string& name,
- ListBuilder& permissions) {
+ const scoped_refptr<const Extension> CreateExtension(
+ const std::string& name,
+ ListBuilder& permissions) {
const std::string kId = crx_file::id_util::GenerateId(name);
scoped_refptr<const Extension> extension =
ExtensionBuilder().SetManifest(
@@ -92,7 +93,7 @@ class ExtensionUITest : public testing::Test {
.Build();
ExtensionRegistry::Get(profile())->AddEnabled(extension);
- PermissionsUpdater(profile()).InitializePermissions(extension);
+ PermissionsUpdater(profile()).InitializePermissions(extension.get());
return extension;
}
@@ -320,15 +321,13 @@ TEST_F(ExtensionUITest, ExtensionUIAllUrlsCheckbox) {
new FeatureSwitch::ScopedOverride(
FeatureSwitch::scripts_require_action(), true));
// Two extensions - one with all urls, one without.
- const Extension* all_urls_extension =
- CreateExtension("all_urls",
- ListBuilder().Append(kAllHostsPermission).Pass());
- const Extension* no_urls_extension =
+ scoped_refptr<const Extension> all_urls_extension = CreateExtension(
+ "all_urls", ListBuilder().Append(kAllHostsPermission).Pass());
+ scoped_refptr<const Extension> no_urls_extension =
CreateExtension("no urls", ListBuilder().Pass());
- scoped_ptr<base::DictionaryValue> value(
- handler()->CreateExtensionDetailValue(
- all_urls_extension, std::vector<ExtensionPage>(), NULL));
+ scoped_ptr<base::DictionaryValue> value(handler()->CreateExtensionDetailValue(
+ all_urls_extension.get(), std::vector<ExtensionPage>(), NULL));
bool result = false;
const std::string kWantsAllUrls = "wantsAllUrls";
const std::string kAllowAllUrls = "allowAllUrls";
@@ -345,7 +344,7 @@ TEST_F(ExtensionUITest, ExtensionUIAllUrlsCheckbox) {
// Now the extension should both want and have all urls.
value.reset(handler()->CreateExtensionDetailValue(
- all_urls_extension, std::vector<ExtensionPage>(), NULL));
+ all_urls_extension.get(), std::vector<ExtensionPage>(), NULL));
EXPECT_TRUE(value->GetBoolean(kWantsAllUrls, &result));
EXPECT_TRUE(result);
EXPECT_TRUE(value->GetBoolean(kAllowAllUrls, &result));
@@ -353,7 +352,7 @@ TEST_F(ExtensionUITest, ExtensionUIAllUrlsCheckbox) {
// The other extension should neither want nor have all urls.
value.reset(handler()->CreateExtensionDetailValue(
- no_urls_extension, std::vector<ExtensionPage>(), NULL));
+ no_urls_extension.get(), std::vector<ExtensionPage>(), NULL));
EXPECT_TRUE(value->GetBoolean(kWantsAllUrls, &result));
EXPECT_FALSE(result);
EXPECT_TRUE(value->GetBoolean(kAllowAllUrls, &result));
@@ -366,7 +365,7 @@ TEST_F(ExtensionUITest, ExtensionUIAllUrlsCheckbox) {
// Even though the extension has the all urls preference, the checkbox
// shouldn't show up with the switch off.
value.reset(handler()->CreateExtensionDetailValue(
- all_urls_extension, std::vector<ExtensionPage>(), NULL));
+ all_urls_extension.get(), std::vector<ExtensionPage>(), NULL));
EXPECT_TRUE(value->GetBoolean(kWantsAllUrls, &result));
EXPECT_FALSE(result);
EXPECT_TRUE(value->GetBoolean(kAllowAllUrls, &result));
@@ -379,7 +378,7 @@ TEST_F(ExtensionUITest, ExtensionUIAllUrlsCheckbox) {
// Even though the extension has all_urls permission, the checkbox shouldn't
// show up without the switch.
value.reset(handler()->CreateExtensionDetailValue(
- all_urls_extension, std::vector<ExtensionPage>(), NULL));
+ all_urls_extension.get(), std::vector<ExtensionPage>(), NULL));
EXPECT_TRUE(value->GetBoolean(kWantsAllUrls, &result));
EXPECT_FALSE(result);
EXPECT_TRUE(value->GetBoolean(kAllowAllUrls, &result));
diff --git a/chrome/browser/extensions/external_install_error.cc b/chrome/browser/extensions/external_install_error.cc
index 0ed176c..c01e8da 100644
--- a/chrome/browser/extensions/external_install_error.cc
+++ b/chrome/browser/extensions/external_install_error.cc
@@ -369,7 +369,7 @@ void ExternalInstallError::OnDialogReady(
prompt_ = prompt;
if (alert_type_ == BUBBLE_ALERT) {
- global_error_.reset(new ExternalInstallBubbleAlert(this, prompt_));
+ global_error_.reset(new ExternalInstallBubbleAlert(this, prompt_.get()));
error_service_->AddGlobalError(global_error_.get());
Browser* browser =
diff --git a/chrome/browser/extensions/external_provider_impl.cc b/chrome/browser/extensions/external_provider_impl.cc
index d4ab6c9..bb1e647 100644
--- a/chrome/browser/extensions/external_provider_impl.cc
+++ b/chrome/browser/extensions/external_provider_impl.cc
@@ -394,7 +394,7 @@ void ExternalProviderImpl::CreateExternalProviders(
#endif
// Policies are mandatory so they can't be skipped with command line flag.
- if (external_loader) {
+ if (external_loader.get()) {
provider_list->push_back(
linked_ptr<ExternalProviderInterface>(
new ExternalProviderImpl(
diff --git a/chrome/browser/extensions/install_verifier.cc b/chrome/browser/extensions/install_verifier.cc
index ebd3a8d..7ef862f 100644
--- a/chrome/browser/extensions/install_verifier.cc
+++ b/chrome/browser/extensions/install_verifier.cc
@@ -446,7 +446,7 @@ ExtensionIdSet InstallVerifier::GetExtensionsToVerify() const {
for (ExtensionSet::const_iterator iter = extensions->begin();
iter != extensions->end();
++iter) {
- if (NeedsVerification(**iter))
+ if (NeedsVerification(*iter->get()))
result.insert((*iter)->id());
}
return result;
@@ -494,7 +494,7 @@ void InstallVerifier::OnVerificationComplete(bool success, OperationType type) {
++iter) {
int disable_reasons = prefs_->GetDisableReasons((*iter)->id());
if (disable_reasons & Extension::DISABLE_NOT_VERIFIED &&
- !MustRemainDisabled(*iter, NULL, NULL)) {
+ !MustRemainDisabled(iter->get(), NULL, NULL)) {
prefs_->RemoveDisableReason((*iter)->id(),
Extension::DISABLE_NOT_VERIFIED);
}
diff --git a/chrome/browser/extensions/installed_loader.cc b/chrome/browser/extensions/installed_loader.cc
index 363c7d3..71fc70e 100644
--- a/chrome/browser/extensions/installed_loader.cc
+++ b/chrome/browser/extensions/installed_loader.cc
@@ -202,7 +202,8 @@ void InstalledLoader::Load(const ExtensionInfo& info, bool write_to_prefs) {
error = errors::kDisabledByPolicy;
extension = NULL;
} else if (!extension_prefs_->IsExtensionDisabled(extension->id()) &&
- policy->MustRemainDisabled(extension, &disable_reason, NULL)) {
+ policy->MustRemainDisabled(
+ extension.get(), &disable_reason, NULL)) {
extension_prefs_->SetExtensionState(extension->id(), Extension::DISABLED);
extension_prefs_->AddDisableReason(extension->id(), disable_reason);
force_disabled = true;
@@ -330,7 +331,7 @@ void InstalledLoader::LoadAllExtensions() {
for (ExtensionSet::const_iterator iter = extensions.begin();
iter != extensions.end();
++iter) {
- const Extension* extension = *iter;
+ const Extension* extension = iter->get();
Manifest::Location location = extension->location();
Manifest::Type type = extension->GetType();
@@ -498,7 +499,7 @@ void InstalledLoader::LoadAllExtensions() {
RecordDisableReasons(extension_prefs_->GetDisableReasons((*ex)->id()));
if (Manifest::IsExternalLocation((*ex)->location())) {
// See loop above for ENABLED.
- if (ManifestURL::UpdatesFromGallery(*ex)) {
+ if (ManifestURL::UpdatesFromGallery(ex->get())) {
UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalItemState",
EXTERNAL_ITEM_WEBSTORE_DISABLED,
EXTERNAL_ITEM_MAX_ITEMS);
diff --git a/chrome/browser/extensions/location_bar_controller.cc b/chrome/browser/extensions/location_bar_controller.cc
index 69491ba..21aa377 100644
--- a/chrome/browser/extensions/location_bar_controller.cc
+++ b/chrome/browser/extensions/location_bar_controller.cc
@@ -47,9 +47,9 @@ std::vector<ExtensionAction*> LocationBarController::GetCurrentActions() {
// one action per extension. If clicking on an active script action ever
// has a response, then we will need to split the actions.
ExtensionAction* action =
- page_action_controller_->GetActionForExtension(*iter);
+ page_action_controller_->GetActionForExtension(iter->get());
if (!action)
- action = active_script_controller_->GetActionForExtension(*iter);
+ action = active_script_controller_->GetActionForExtension(iter->get());
if (action)
current_actions.push_back(action);
}
diff --git a/chrome/browser/extensions/permissions_updater.cc b/chrome/browser/extensions/permissions_updater.cc
index f28ecdd..1b13c67 100644
--- a/chrome/browser/extensions/permissions_updater.cc
+++ b/chrome/browser/extensions/permissions_updater.cc
@@ -64,7 +64,7 @@ scoped_refptr<const PermissionSet> GetBoundedActivePermissions(
// If the extension has used the optional permissions API, it will have a
// custom set of active permissions defined in the extension prefs. Here,
// we update the extension's active permissions based on the prefs.
- if (!active_permissions)
+ if (!active_permissions.get())
return extension->permissions_data()->active_permissions();
scoped_refptr<const PermissionSet> required_permissions =
@@ -75,16 +75,17 @@ scoped_refptr<const PermissionSet> GetBoundedActivePermissions(
// a) active permissions must be a subset of optional + default permissions
// b) active permissions must contains all default permissions
scoped_refptr<PermissionSet> total_permissions = PermissionSet::CreateUnion(
- required_permissions,
+ required_permissions.get(),
PermissionsParser::GetOptionalPermissions(extension));
// Make sure the active permissions contain no more than optional + default.
scoped_refptr<PermissionSet> adjusted_active =
- PermissionSet::CreateIntersection(total_permissions, active_permissions);
+ PermissionSet::CreateIntersection(total_permissions.get(),
+ active_permissions.get());
// Make sure the active permissions contain the default permissions.
- adjusted_active =
- PermissionSet::CreateUnion(required_permissions, adjusted_active);
+ adjusted_active = PermissionSet::CreateUnion(required_permissions.get(),
+ adjusted_active.get());
return adjusted_active;
}
@@ -194,7 +195,7 @@ void PermissionsUpdater::InitializePermissions(const Extension* extension) {
// For example, the union of <all_urls> and "example.com" is <all_urls>, so
// we may lose "example.com". However, "example.com" is important once
// <all_urls> is stripped during withholding.
- if (active_permissions) {
+ if (active_permissions.get()) {
granted_explicit_hosts.AddPatterns(
FilterSingleOriginPermissions(active_permissions->explicit_hosts(),
bounded_active->explicit_hosts()));
diff --git a/chrome/browser/extensions/permissions_updater_unittest.cc b/chrome/browser/extensions/permissions_updater_unittest.cc
index 88d85e3..63d00de 100644
--- a/chrome/browser/extensions/permissions_updater_unittest.cc
+++ b/chrome/browser/extensions/permissions_updater_unittest.cc
@@ -218,7 +218,7 @@ TEST_F(PermissionsUpdaterTest, AddAndRemovePermissions) {
// Verify that the permission notification was sent correctly.
ASSERT_TRUE(listener.received_notification());
- ASSERT_EQ(extension, listener.extension());
+ ASSERT_EQ(extension.get(), listener.extension());
ASSERT_EQ(UpdatedExtensionPermissionsInfo::ADDED, listener.reason());
ASSERT_EQ(*delta.get(), *listener.permissions());
@@ -254,7 +254,7 @@ TEST_F(PermissionsUpdaterTest, AddAndRemovePermissions) {
// Verify that the notification was correct.
ASSERT_TRUE(listener.received_notification());
- ASSERT_EQ(extension, listener.extension());
+ ASSERT_EQ(extension.get(), listener.extension());
ASSERT_EQ(UpdatedExtensionPermissionsInfo::REMOVED, listener.reason());
ASSERT_EQ(*delta.get(), *listener.permissions());
@@ -304,7 +304,7 @@ TEST_F(PermissionsUpdaterTest, WithholdAllHosts) {
all_patterns, all_patterns, Manifest::INTERNAL);
const PermissionsData* permissions_data = extension->permissions_data();
PermissionsUpdater updater(profile_.get());
- updater.InitializePermissions(extension);
+ updater.InitializePermissions(extension.get());
// At first, the active permissions should have only the safe patterns and
// the withheld permissions should have only the all host patterns.
@@ -322,7 +322,7 @@ TEST_F(PermissionsUpdaterTest, WithholdAllHosts) {
all_host_patterns));
// Then, we grant the withheld all-hosts permissions.
- updater.GrantWithheldImpliedAllHosts(extension);
+ updater.GrantWithheldImpliedAllHosts(extension.get());
// Now, active permissions should have all patterns, and withheld permissions
// should have none.
EXPECT_TRUE(SetsAreEqual(
@@ -341,7 +341,7 @@ TEST_F(PermissionsUpdaterTest, WithholdAllHosts) {
.empty());
// Finally, we revoke the all hosts permissions.
- updater.WithholdImpliedAllHosts(extension);
+ updater.WithholdImpliedAllHosts(extension.get());
// We should be back to our initial state - all_hosts should be withheld, and
// the safe patterns should be granted.
@@ -362,7 +362,7 @@ TEST_F(PermissionsUpdaterTest, WithholdAllHosts) {
extension = CreateExtensionWithPermissions(
all_patterns, all_patterns, Manifest::COMPONENT);
permissions_data = extension->permissions_data();
- updater.InitializePermissions(extension);
+ updater.InitializePermissions(extension.get());
EXPECT_TRUE(SetsAreEqual(
permissions_data->active_permissions()->scriptable_hosts().patterns(),
all_patterns));
@@ -383,7 +383,7 @@ TEST_F(PermissionsUpdaterTest, WithholdAllHosts) {
extension = CreateExtensionWithPermissions(
all_patterns, all_patterns, Manifest::INTERNAL);
permissions_data = extension->permissions_data();
- updater.InitializePermissions(extension);
+ updater.InitializePermissions(extension.get());
EXPECT_TRUE(SetsAreEqual(
permissions_data->active_permissions()->scriptable_hosts().patterns(),
all_patterns));
diff --git a/chrome/browser/extensions/process_manager_browsertest.cc b/chrome/browser/extensions/process_manager_browsertest.cc
index 4140ebd..2395966 100644
--- a/chrome/browser/extensions/process_manager_browsertest.cc
+++ b/chrome/browser/extensions/process_manager_browsertest.cc
@@ -76,7 +76,7 @@ IN_PROC_BROWSER_TEST_F(ProcessManagerBrowserTest,
LoadExtension(test_data_dir_.AppendASCII("api_test")
.AppendASCII("browser_action")
.AppendASCII("popup"));
- ASSERT_TRUE(popup);
+ ASSERT_TRUE(popup.get());
// No background host was added.
EXPECT_EQ(0u, pm->background_hosts().size());
diff --git a/chrome/browser/extensions/sandboxed_unpacker.cc b/chrome/browser/extensions/sandboxed_unpacker.cc
index 56e5118..6b6c1c7 100644
--- a/chrome/browser/extensions/sandboxed_unpacker.cc
+++ b/chrome/browser/extensions/sandboxed_unpacker.cc
@@ -696,8 +696,9 @@ bool SandboxedUnpacker::RewriteImageFiles(SkBitmap* install_icon) {
}
}
- const std::string& install_icon_path = IconsInfo::GetIcons(extension_).Get(
- extension_misc::EXTENSION_ICON_LARGE, ExtensionIconSet::MATCH_BIGGER);
+ const std::string& install_icon_path =
+ IconsInfo::GetIcons(extension_.get()).Get(
+ extension_misc::EXTENSION_ICON_LARGE, ExtensionIconSet::MATCH_BIGGER);
// Write our parsed images back to disk as well.
for (size_t i = 0; i < images.size(); ++i) {
diff --git a/chrome/browser/extensions/settings_api_helpers.cc b/chrome/browser/extensions/settings_api_helpers.cc
index df73df2..2fcd9c8 100644
--- a/chrome/browser/extensions/settings_api_helpers.cc
+++ b/chrome/browser/extensions/settings_api_helpers.cc
@@ -27,7 +27,7 @@ const Extension* FindOverridingExtension(
for (ExtensionSet::const_iterator it = extensions.begin();
it != extensions.end();
++it) {
- const SettingsOverrides* settings = SettingsOverrides::Get(*it);
+ const SettingsOverrides* settings = SettingsOverrides::Get(it->get());
if (settings) {
if (type == BUBBLE_TYPE_HOME_PAGE && !settings->homepage)
continue;
@@ -56,7 +56,7 @@ const Extension* FindOverridingExtension(
continue; // Not primary.
// Found the primary extension.
- return *it;
+ return it->get();
}
}
diff --git a/chrome/browser/extensions/shared_module_service_unittest.cc b/chrome/browser/extensions/shared_module_service_unittest.cc
index 9f399984..ca12165 100644
--- a/chrome/browser/extensions/shared_module_service_unittest.cc
+++ b/chrome/browser/extensions/shared_module_service_unittest.cc
@@ -114,7 +114,7 @@ TEST_F(SharedModuleServiceUnitTest, AddDependentSharedModules) {
// Try to satisfy imports for the extension. This should queue the imported
// module's installation.
- service()->shared_module_service()->SatisfyImports(extension);
+ service()->shared_module_service()->SatisfyImports(extension.get());
EXPECT_TRUE(pending_extension_manager->IsIdPending(import_id));
}
@@ -135,13 +135,13 @@ TEST_F(SharedModuleServiceUnitTest, PruneSharedModulesOnUninstall) {
.SetID(crx_file::id_util::GenerateId("shared_module"))
.Build();
- EXPECT_TRUE(InstallExtension(shared_module, false));
+ EXPECT_TRUE(InstallExtension(shared_module.get(), false));
std::string extension_id = crx_file::id_util::GenerateId("extension_id");
// Create and install an extension that imports our new module.
scoped_refptr<Extension> importing_extension =
CreateExtensionImportingModule(shared_module->id(), extension_id, "1.0");
- EXPECT_TRUE(InstallExtension(importing_extension, false));
+ EXPECT_TRUE(InstallExtension(importing_extension.get(), false));
// Uninstall the extension that imports our module.
base::string16 error;
@@ -174,7 +174,7 @@ TEST_F(SharedModuleServiceUnitTest, PruneSharedModulesOnUpdate) {
.AddFlags(Extension::FROM_WEBSTORE)
.SetID(crx_file::id_util::GenerateId("shared_module_1"))
.Build();
- EXPECT_TRUE(InstallExtension(shared_module_1, false));
+ EXPECT_TRUE(InstallExtension(shared_module_1.get(), false));
scoped_ptr<base::DictionaryValue> manifest_2 =
DictionaryBuilder()
@@ -190,7 +190,7 @@ TEST_F(SharedModuleServiceUnitTest, PruneSharedModulesOnUpdate) {
.AddFlags(Extension::FROM_WEBSTORE)
.SetID(crx_file::id_util::GenerateId("shared_module_2"))
.Build();
- EXPECT_TRUE(InstallExtension(shared_module_2, false));
+ EXPECT_TRUE(InstallExtension(shared_module_2.get(), false));
std::string extension_id = crx_file::id_util::GenerateId("extension_id");
@@ -199,7 +199,7 @@ TEST_F(SharedModuleServiceUnitTest, PruneSharedModulesOnUpdate) {
CreateExtensionImportingModule(shared_module_1->id(),
extension_id,
"1.0");
- EXPECT_TRUE(InstallExtension(importing_extension_1, false));
+ EXPECT_TRUE(InstallExtension(importing_extension_1.get(), false));
// Create and install a new version of the extension that imports our new
// module 2.
@@ -207,7 +207,7 @@ TEST_F(SharedModuleServiceUnitTest, PruneSharedModulesOnUpdate) {
CreateExtensionImportingModule(shared_module_2->id(),
extension_id,
"1.1");
- EXPECT_TRUE(InstallExtension(importing_extension_2, true));
+ EXPECT_TRUE(InstallExtension(importing_extension_2.get(), true));
// Since the extension v1.1 depends the module 2 insteand module 1.
// So the module 1 should be uninstalled.
@@ -220,7 +220,7 @@ TEST_F(SharedModuleServiceUnitTest, PruneSharedModulesOnUpdate) {
// module.
scoped_refptr<Extension> importing_extension_3 =
CreateExtensionImportingModule("", extension_id, "1.2");
- EXPECT_TRUE(InstallExtension(importing_extension_3, true));
+ EXPECT_TRUE(InstallExtension(importing_extension_3.get(), true));
// Since the extension v1.2 does not depend any module, so the all models
// should have been uninstalled.
@@ -254,21 +254,21 @@ TEST_F(SharedModuleServiceUnitTest, WhitelistedImports) {
.SetID(crx_file::id_util::GenerateId("shared_module"))
.Build();
- EXPECT_TRUE(InstallExtension(shared_module, false));
+ EXPECT_TRUE(InstallExtension(shared_module.get(), false));
// Create and install an extension with the whitelisted ID.
scoped_refptr<Extension> whitelisted_extension =
CreateExtensionImportingModule(shared_module->id(),
whitelisted_id,
"1.0");
- EXPECT_TRUE(InstallExtension(whitelisted_extension, false));
+ EXPECT_TRUE(InstallExtension(whitelisted_extension.get(), false));
// Try to install an extension with an ID that is not whitelisted.
scoped_refptr<Extension> nonwhitelisted_extension =
CreateExtensionImportingModule(shared_module->id(),
nonwhitelisted_id,
"1.0");
- EXPECT_FALSE(InstallExtension(nonwhitelisted_extension, false));
+ EXPECT_FALSE(InstallExtension(nonwhitelisted_extension.get(), false));
}
} // namespace extensions
diff --git a/chrome/browser/extensions/test_blacklist_state_fetcher.cc b/chrome/browser/extensions/test_blacklist_state_fetcher.cc
index 879e189..986da8f 100644
--- a/chrome/browser/extensions/test_blacklist_state_fetcher.cc
+++ b/chrome/browser/extensions/test_blacklist_state_fetcher.cc
@@ -37,7 +37,7 @@ TestBlacklistStateFetcher::TestBlacklistStateFetcher(
scoped_refptr<net::TestURLRequestContextGetter> context =
new net::TestURLRequestContextGetter(
base::MessageLoopProxy::current());
- fetcher_->SetURLRequestContextForTest(context);
+ fetcher_->SetURLRequestContextForTest(context.get());
}
TestBlacklistStateFetcher::~TestBlacklistStateFetcher() {
diff --git a/chrome/browser/extensions/updater/extension_downloader.cc b/chrome/browser/extensions/updater/extension_downloader.cc
index 5846380..264e461 100644
--- a/chrome/browser/extensions/updater/extension_downloader.cc
+++ b/chrome/browser/extensions/updater/extension_downloader.cc
@@ -189,7 +189,7 @@ ExtensionDownloader::ExtensionDownloader(
base::Unretained(this))),
extension_cache_(NULL) {
DCHECK(delegate_);
- DCHECK(request_context_);
+ DCHECK(request_context_.get());
}
ExtensionDownloader::~ExtensionDownloader() {}
@@ -455,7 +455,7 @@ void ExtensionDownloader::CreateManifestFetcher() {
manifest_fetcher_.reset(net::URLFetcher::Create(
kManifestFetcherId, manifests_queue_.active_request()->full_url(),
net::URLFetcher::GET, this));
- manifest_fetcher_->SetRequestContext(request_context_);
+ manifest_fetcher_->SetRequestContext(request_context_.get());
manifest_fetcher_->SetLoadFlags(net::LOAD_DO_NOT_SEND_COOKIES |
net::LOAD_DO_NOT_SAVE_COOKIES |
net::LOAD_DISABLE_CACHE);
@@ -725,7 +725,7 @@ void ExtensionDownloader::CreateExtensionFetcher() {
const ExtensionFetch* fetch = extensions_queue_.active_request();
extension_fetcher_.reset(net::URLFetcher::Create(
kExtensionFetcherId, fetch->url, net::URLFetcher::GET, this));
- extension_fetcher_->SetRequestContext(request_context_);
+ extension_fetcher_->SetRequestContext(request_context_.get());
extension_fetcher_->SetAutomaticallyRetryOnNetworkChanges(3);
int load_flags = net::LOAD_DISABLE_CACHE;
diff --git a/chrome/browser/extensions/user_script_loader.cc b/chrome/browser/extensions/user_script_loader.cc
index eb29bae..ea22c45 100644
--- a/chrome/browser/extensions/user_script_loader.cc
+++ b/chrome/browser/extensions/user_script_loader.cc
@@ -84,7 +84,7 @@ bool LoadScriptContent(const ExtensionId& extension_id,
LOG(WARNING) << "Failed to load user script file: " << path.value();
return false;
}
- if (verifier) {
+ if (verifier.get()) {
content::BrowserThread::PostTask(content::BrowserThread::IO,
FROM_HERE,
base::Bind(&VerifyContent,
@@ -207,7 +207,7 @@ void LoadScriptsOnFileThread(scoped_ptr<UserScriptList> user_scripts,
LoadScriptsCallback callback) {
DCHECK(user_scripts.get());
LoadUserScripts(
- user_scripts.get(), extensions_info, added_script_ids, verifier);
+ user_scripts.get(), extensions_info, added_script_ids, verifier.get());
scoped_ptr<base::SharedMemory> memory = Serialize(*user_scripts);
BrowserThread::PostTask(
BrowserThread::UI,
diff --git a/chrome/browser/extensions/webstore_installer.cc b/chrome/browser/extensions/webstore_installer.cc
index 412be96..1a8ce8dd9 100644
--- a/chrome/browser/extensions/webstore_installer.cc
+++ b/chrome/browser/extensions/webstore_installer.cc
@@ -308,10 +308,10 @@ void WebstoreInstaller::Start() {
ExtensionService* extension_service =
ExtensionSystem::Get(profile_)->extension_service();
- if (approval_.get() && approval_->dummy_extension) {
+ if (approval_.get() && approval_->dummy_extension.get()) {
SharedModuleService::ImportStatus status =
extension_service->shared_module_service()->CheckImports(
- approval_->dummy_extension,
+ approval_->dummy_extension.get(),
&pending_modules_,
&pending_modules_);
// For this case, it is because some imports are not shared modules.
diff --git a/chrome/browser/extensions/webstore_standalone_installer.cc b/chrome/browser/extensions/webstore_standalone_installer.cc
index dc9ea0e..dd2ac5c 100644
--- a/chrome/browser/extensions/webstore_standalone_installer.cc
+++ b/chrome/browser/extensions/webstore_standalone_installer.cc
@@ -132,7 +132,7 @@ void WebstoreStandaloneInstaller::CompleteInstall(
void WebstoreStandaloneInstaller::ProceedWithInstallPrompt() {
install_prompt_ = CreateInstallPrompt();
- if (install_prompt_) {
+ if (install_prompt_.get()) {
ShowInstallUI();
// Control flow finishes up in InstallUIProceed or InstallUIAbort.
} else {
@@ -349,7 +349,8 @@ void WebstoreStandaloneInstaller::InstallUIProceed() {
// If the target extension has already been installed ephemerally and is
// up to date, it can be promoted to a regular installed extension and
// downloading from the Web Store is not necessary.
- const Extension* extension_to_install = GetLocalizedExtensionForDisplay();
+ scoped_refptr<const Extension> extension_to_install =
+ GetLocalizedExtensionForDisplay();
if (!extension_to_install) {
CompleteInstall(webstore_install::INVALID_MANIFEST,
kInvalidManifestError);
@@ -421,7 +422,8 @@ void WebstoreStandaloneInstaller::OnExtensionInstallFailure(
}
void WebstoreStandaloneInstaller::ShowInstallUI() {
- const Extension* localized_extension = GetLocalizedExtensionForDisplay();
+ scoped_refptr<const Extension> localized_extension =
+ GetLocalizedExtensionForDisplay();
if (!localized_extension) {
CompleteInstall(webstore_install::INVALID_MANIFEST, kInvalidManifestError);
return;