summaryrefslogtreecommitdiffstats
path: root/chrome/browser/extensions/scripting_permissions_modifier_unittest.cc
diff options
context:
space:
mode:
authorrob <rob@robwu.nl>2016-01-25 11:41:08 -0800
committerCommit bot <commit-bot@chromium.org>2016-01-25 19:53:47 +0000
commit889ceeb78a6745727ca8db2d26866a913fe2e02c (patch)
tree6cd61bb1b115e3d7701e3c33b57ca63658ec2d6b /chrome/browser/extensions/scripting_permissions_modifier_unittest.cc
parent0bbef05dd7107caea30ae4a075b242296bb795aa (diff)
downloadchromium_src-889ceeb78a6745727ca8db2d26866a913fe2e02c.zip
chromium_src-889ceeb78a6745727ca8db2d26866a913fe2e02c.tar.gz
chromium_src-889ceeb78a6745727ca8db2d26866a913fe2e02c.tar.bz2
Remove unused process_id parameter from permissions_data
The process ID was introduced in crbug.com/220039, and used to protect the signin process, but this special process was removed as a part of crbug.com/350202. There are no other uses for the process ID, so remove it. BUG=379356 TEST=still compiles Review URL: https://codereview.chromium.org/1622403002 Cr-Commit-Position: refs/heads/master@{#371282}
Diffstat (limited to 'chrome/browser/extensions/scripting_permissions_modifier_unittest.cc')
-rw-r--r--chrome/browser/extensions/scripting_permissions_modifier_unittest.cc3
1 files changed, 1 insertions, 2 deletions
diff --git a/chrome/browser/extensions/scripting_permissions_modifier_unittest.cc b/chrome/browser/extensions/scripting_permissions_modifier_unittest.cc
index e1e8e64..55add1c 100644
--- a/chrome/browser/extensions/scripting_permissions_modifier_unittest.cc
+++ b/chrome/browser/extensions/scripting_permissions_modifier_unittest.cc
@@ -310,8 +310,7 @@ TEST_F(ScriptingPermissionsModifierUnitTest, GrantHostPermission) {
const PermissionsData* permissions = extension->permissions_data();
auto get_page_access = [&permissions, &extension](const GURL& url) {
- return permissions->GetPageAccess(extension.get(), url, 0 /* tab id */,
- 0 /* process id */, nullptr /* error */);
+ return permissions->GetPageAccess(extension.get(), url, 0, nullptr);
};
EXPECT_EQ(PermissionsData::ACCESS_WITHHELD, get_page_access(kUrl));