Re-enable the ExtensionServiceTest tests.

This requires adding a workaround in ExtensionService::IsExtensionIdle() to prevent it from accessing ExtensionProcessManager and EventRouter components that aren't currently available during test.

This CL also adds DCHECKs of ExtensionSystem::event_router() in extensions::RuntimeEventRouter calls.

BUG=159754,149157,160796

Review URL: https://chromiumcodereview.appspot.com/11363214

git-svn-id: svn://svn.chromium.org/chrome/trunk/src@167575 0039d316-1c4b-4281-b951-d872f2087c98
diff --git a/chrome/browser/extensions/extension_service_unittest.cc b/chrome/browser/extensions/extension_service_unittest.cc
index 760db1a..57042ddd 100644
--- a/chrome/browser/extensions/extension_service_unittest.cc
+++ b/chrome/browser/extensions/extension_service_unittest.cc
@@ -1063,11 +1063,8 @@
      FAIL() << "Existing CRX should have been overwritten.";
 }
 
-// All tests in the file have been disabled because they are causing tree
-// instability.  Please fix.  http://crbug.com/149157
-
 // Test loading good extensions from the profile directory.
-TEST_F(ExtensionServiceTest, DISABLED_LoadAllExtensionsFromDirectorySuccess) {
+TEST_F(ExtensionServiceTest, LoadAllExtensionsFromDirectorySuccess) {
   PluginService::GetInstance()->Init();
 
   // Initialize the test dir with a good Preferences/extensions.
@@ -1170,7 +1167,7 @@
 };
 
 // Test loading bad extensions from the profile directory.
-TEST_F(ExtensionServiceTest, DISABLED_LoadAllExtensionsFromDirectoryFail) {
+TEST_F(ExtensionServiceTest, LoadAllExtensionsFromDirectoryFail) {
   // Initialize the test dir with a bad Preferences/extensions.
   FilePath source_install_dir = data_dir_
       .AppendASCII("bad")
@@ -1209,7 +1206,7 @@
 
 // Test that partially deleted extensions are cleaned up during startup
 // Test loading bad extensions from the profile directory.
-TEST_F(ExtensionServiceTest, DISABLED_CleanupOnStartup) {
+TEST_F(ExtensionServiceTest, CleanupOnStartup) {
   PluginService::GetInstance()->Init();
 
   FilePath source_install_dir = data_dir_
@@ -1323,7 +1320,7 @@
 // Test installing extensions. This test tries to install few extensions using
 // crx files. If you need to change those crx files, feel free to repackage
 // them, throw away the key used and change the id's above.
-TEST_F(ExtensionServiceTest, DISABLED_InstallExtension) {
+TEST_F(ExtensionServiceTest, InstallExtension) {
   InitializeEmptyExtensionService();
 
   // Extensions not enabled.
@@ -1380,7 +1377,7 @@
 
 // Tests that flags passed to OnExternalExtensionFileFound() make it to the
 // extension object.
-TEST_F(ExtensionServiceTest, DISABLED_InstallingExternalExtensionWithFlags) {
+TEST_F(ExtensionServiceTest, InstallingExternalExtensionWithFlags) {
   const char kPrefFromBookmark[] = "from_bookmark";
 
   InitializeEmptyExtensionService();
@@ -1414,7 +1411,7 @@
 }
 
 // Test the handling of Extension::EXTERNAL_EXTENSION_UNINSTALLED
-TEST_F(ExtensionServiceTest, DISABLED_UninstallingExternalExtensions) {
+TEST_F(ExtensionServiceTest, UninstallingExternalExtensions) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good.crx");
@@ -1466,7 +1463,7 @@
 // the extension could not be loaded.
 // This extension shown in preferences file requires an experimental permission.
 // It could not be loaded without such permission.
-TEST_F(ExtensionServiceTest, DISABLED_UninstallingNotLoadedExtension) {
+TEST_F(ExtensionServiceTest, UninstallingNotLoadedExtension) {
   FilePath source_install_dir = data_dir_
       .AppendASCII("good")
       .AppendASCII("Extensions");
@@ -1491,7 +1488,7 @@
 }
 
 // Test that external extensions with incorrect IDs are not installed.
-TEST_F(ExtensionServiceTest, DISABLED_FailOnWrongId) {
+TEST_F(ExtensionServiceTest, FailOnWrongId) {
   InitializeEmptyExtensionService();
   FilePath path = data_dir_.AppendASCII("good.crx");
   set_extensions_enabled(true);
@@ -1520,7 +1517,7 @@
 }
 
 // Test that external extensions with incorrect versions are not installed.
-TEST_F(ExtensionServiceTest, DISABLED_FailOnWrongVersion) {
+TEST_F(ExtensionServiceTest, FailOnWrongVersion) {
   InitializeEmptyExtensionService();
   FilePath path = data_dir_.AppendASCII("good.crx");
   set_extensions_enabled(true);
@@ -1546,7 +1543,7 @@
 }
 
 // Install a user script (they get converted automatically to an extension)
-TEST_F(ExtensionServiceTest, DISABLED_InstallUserScript) {
+TEST_F(ExtensionServiceTest, InstallUserScript) {
   // The details of script conversion are tested elsewhere, this just tests
   // integration with ExtensionService.
   InitializeEmptyExtensionService();
@@ -1576,7 +1573,7 @@
 }
 
 // Extensions don't install during shutdown.
-TEST_F(ExtensionServiceTest, DISABLED_InstallExtensionDuringShutdown) {
+TEST_F(ExtensionServiceTest, InstallExtensionDuringShutdown) {
   InitializeEmptyExtensionService();
 
   // Simulate shutdown.
@@ -1594,7 +1591,7 @@
 
 // This tests that the granted permissions preferences are correctly set when
 // installing an extension.
-TEST_F(ExtensionServiceTest, DISABLED_GrantedPermissions) {
+TEST_F(ExtensionServiceTest, GrantedPermissions) {
   InitializeEmptyExtensionService();
   FilePath path = data_dir_
       .AppendASCII("permissions");
@@ -1642,7 +1639,7 @@
 #if !defined(OS_CHROMEOS)
 // This tests that the granted permissions preferences are correctly set for
 // default apps.
-TEST_F(ExtensionServiceTest, DISABLED_DefaultAppsGrantedPermissions) {
+TEST_F(ExtensionServiceTest, DefaultAppsGrantedPermissions) {
   InitializeEmptyExtensionService();
   InitializeRequestContext();
   FilePath path = data_dir_
@@ -1687,7 +1684,7 @@
 // Tests that the granted permissions full_access bit gets set correctly when
 // an extension contains an NPAPI plugin. Don't run this test on Chrome OS
 // since they don't support plugins.
-TEST_F(ExtensionServiceTest, DISABLED_GrantedFullAccessPermissions) {
+TEST_F(ExtensionServiceTest, GrantedFullAccessPermissions) {
   PluginService::GetInstance()->Init();
 
   InitializeEmptyExtensionService();
@@ -1719,7 +1716,7 @@
 // Tests that the extension is disabled when permissions are missing from
 // the extension's granted permissions preferences. (This simulates updating
 // the browser to a version which recognizes more permissions).
-TEST_F(ExtensionServiceTest, DISABLED_GrantedAPIAndHostPermissions) {
+TEST_F(ExtensionServiceTest, GrantedAPIAndHostPermissions) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_
@@ -1819,7 +1816,7 @@
 }
 
 // Test Packaging and installing an extension.
-TEST_F(ExtensionServiceTest, DISABLED_PackExtension) {
+TEST_F(ExtensionServiceTest, PackExtension) {
   InitializeEmptyExtensionService();
   FilePath input_directory = data_dir_
       .AppendASCII("good")
@@ -1882,7 +1879,7 @@
 }
 
 // Test Packaging and installing an extension whose name contains punctuation.
-TEST_F(ExtensionServiceTest, DISABLED_PackPunctuatedExtension) {
+TEST_F(ExtensionServiceTest, PackPunctuatedExtension) {
   InitializeEmptyExtensionService();
   FilePath input_directory = data_dir_
       .AppendASCII("good")
@@ -1944,7 +1941,7 @@
   }
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_PackExtensionContainingKeyFails) {
+TEST_F(ExtensionServiceTest, PackExtensionContainingKeyFails) {
   InitializeEmptyExtensionService();
 
   ScopedTempDir extension_temp_dir;
@@ -1993,7 +1990,7 @@
 // > openssl pkcs8 -topk8 -nocrypt -in privkey.pem -out privkey_asn1.pem
 // The privkey.pem is a PrivateKey, and the pcks8 -topk8 creates a
 // PrivateKeyInfo ASN.1 structure, we our RSAPrivateKey expects.
-TEST_F(ExtensionServiceTest, DISABLED_PackExtensionOpenSSLKey) {
+TEST_F(ExtensionServiceTest, PackExtensionOpenSSLKey) {
   InitializeEmptyExtensionService();
   FilePath input_directory = data_dir_
       .AppendASCII("good")
@@ -2017,7 +2014,7 @@
   InstallCRX(crx_path, INSTALL_NEW);
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_InstallTheme) {
+TEST_F(ExtensionServiceTest, InstallTheme) {
   InitializeEmptyExtensionService();
 
   // A theme.
@@ -2055,7 +2052,7 @@
   ValidatePrefKeyCount(pref_count);
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_LoadLocalizedTheme) {
+TEST_F(ExtensionServiceTest, LoadLocalizedTheme) {
   // Load.
   InitializeEmptyExtensionService();
   FilePath extension_path = data_dir_
@@ -2073,7 +2070,7 @@
 
 // Tests that we can change the ID of an unpacked extension by adding a key
 // to its manifest.
-TEST_F(ExtensionServiceTest, DISABLED_UnpackedExtensionCanChangeID) {
+TEST_F(ExtensionServiceTest, UnpackedExtensionCanChangeID) {
   InitializeEmptyExtensionService();
 
   ScopedTempDir temp;
@@ -2116,7 +2113,7 @@
 }
 
 #if defined(OS_POSIX)
-TEST_F(ExtensionServiceTest, DISABLED_UnpackedExtensionMayContainSymlinkedFiles) {
+TEST_F(ExtensionServiceTest, UnpackedExtensionMayContainSymlinkedFiles) {
   FilePath source_data_dir = data_dir_.
       AppendASCII("unpacked").
       AppendASCII("symlinks_allowed");
@@ -2147,7 +2144,7 @@
 }
 #endif
 
-TEST_F(ExtensionServiceTest, DISABLED_InstallLocalizedTheme) {
+TEST_F(ExtensionServiceTest, InstallLocalizedTheme) {
   InitializeEmptyExtensionService();
   FilePath theme_path = data_dir_
       .AppendASCII("theme_i18n");
@@ -2160,7 +2157,7 @@
   EXPECT_EQ("description", theme->description());
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_InstallApps) {
+TEST_F(ExtensionServiceTest, InstallApps) {
   InitializeEmptyExtensionService();
 
   // An empty app.
@@ -2182,7 +2179,7 @@
 }
 
 // Tests that file access is OFF by default.
-TEST_F(ExtensionServiceTest, DISABLED_DefaultFileAccess) {
+TEST_F(ExtensionServiceTest, DefaultFileAccess) {
   InitializeEmptyExtensionService();
   const Extension* extension =
       PackAndInstallCRX(data_dir_
@@ -2194,7 +2191,7 @@
   EXPECT_FALSE(service_->extension_prefs()->AllowFileAccess(extension->id()));
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_UpdateApps) {
+TEST_F(ExtensionServiceTest, UpdateApps) {
   InitializeEmptyExtensionService();
   FilePath extensions_path = data_dir_.AppendASCII("app_update");
 
@@ -2214,7 +2211,7 @@
 }
 
 // Verifies that the NTP page and launch ordinals are kept when updating apps.
-TEST_F(ExtensionServiceTest, DISABLED_UpdateAppsRetainOrdinals) {
+TEST_F(ExtensionServiceTest, UpdateAppsRetainOrdinals) {
   InitializeEmptyExtensionService();
   ExtensionSorting* sorting = service_->extension_prefs()->extension_sorting();
   FilePath extensions_path = data_dir_.AppendASCII("app_update");
@@ -2246,7 +2243,7 @@
 }
 
 // Ensures that the CWS has properly initialized ordinals.
-TEST_F(ExtensionServiceTest, DISABLED_EnsureCWSOrdinalsInitialized) {
+TEST_F(ExtensionServiceTest, EnsureCWSOrdinalsInitialized) {
   InitializeEmptyExtensionService();
   service_->component_loader()->Add(IDR_WEBSTORE_MANIFEST,
                                     FilePath(FILE_PATH_LITERAL("web_store")));
@@ -2267,7 +2264,7 @@
 #define MAYBE_InstallAppsWithUnlimitedStorage InstallAppsWithUnlimitedStorage
 #endif
 
-TEST_F(ExtensionServiceTest, DISABLED_MAYBE_InstallAppsWithUnlimitedStorage) {
+TEST_F(ExtensionServiceTest, MAYBE_InstallAppsWithUnlimitedStorage) {
   InitializeEmptyExtensionService();
   InitializeRequestContext();
   EXPECT_TRUE(service_->extensions()->is_empty());
@@ -2317,7 +2314,7 @@
       IsStorageUnlimited(origin2));
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_InstallAppsAndCheckStorageProtection) {
+TEST_F(ExtensionServiceTest, InstallAppsAndCheckStorageProtection) {
   InitializeEmptyExtensionService();
   InitializeRequestContext();
   EXPECT_TRUE(service_->extensions()->is_empty());
@@ -2357,7 +2354,7 @@
 }
 
 // Test that when an extension version is reinstalled, nothing happens.
-TEST_F(ExtensionServiceTest, DISABLED_Reinstall) {
+TEST_F(ExtensionServiceTest, Reinstall) {
   InitializeEmptyExtensionService();
 
   // A simple extension that should install without error.
@@ -2378,7 +2375,7 @@
 
 // Test that we can determine if extensions came from the
 // Chrome web store.
-TEST_F(ExtensionServiceTest, DISABLED_FromWebStore) {
+TEST_F(ExtensionServiceTest, FromWebStore) {
   InitializeEmptyExtensionService();
 
   // A simple extension that should install without error.
@@ -2410,7 +2407,7 @@
 }
 
 // Test upgrading a signed extension.
-TEST_F(ExtensionServiceTest, DISABLED_UpgradeSignedGood) {
+TEST_F(ExtensionServiceTest, UpgradeSignedGood) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good.crx");
@@ -2430,7 +2427,7 @@
 }
 
 // Test upgrading a signed extension with a bad signature.
-TEST_F(ExtensionServiceTest, DISABLED_UpgradeSignedBad) {
+TEST_F(ExtensionServiceTest, UpgradeSignedBad) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good.crx");
@@ -2443,7 +2440,7 @@
 }
 
 // Test a normal update via the UpdateExtension API
-TEST_F(ExtensionServiceTest, DISABLED_UpdateExtension) {
+TEST_F(ExtensionServiceTest, UpdateExtension) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good.crx");
@@ -2460,7 +2457,7 @@
 }
 
 // Extensions should not be updated during browser shutdown.
-TEST_F(ExtensionServiceTest, DISABLED_UpdateExtensionDuringShutdown) {
+TEST_F(ExtensionServiceTest, UpdateExtensionDuringShutdown) {
   InitializeEmptyExtensionService();
 
   // Install an extension.
@@ -2481,7 +2478,7 @@
 }
 
 // Test updating a not-already-installed extension - this should fail
-TEST_F(ExtensionServiceTest, DISABLED_UpdateNotInstalledExtension) {
+TEST_F(ExtensionServiceTest, UpdateNotInstalledExtension) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good.crx");
@@ -2494,7 +2491,7 @@
 }
 
 // Makes sure you can't downgrade an extension via UpdateExtension
-TEST_F(ExtensionServiceTest, DISABLED_UpdateWillNotDowngrade) {
+TEST_F(ExtensionServiceTest, UpdateWillNotDowngrade) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good2.crx");
@@ -2512,7 +2509,7 @@
 }
 
 // Make sure calling update with an identical version does nothing
-TEST_F(ExtensionServiceTest, DISABLED_UpdateToSameVersionIsNoop) {
+TEST_F(ExtensionServiceTest, UpdateToSameVersionIsNoop) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good.crx");
@@ -2523,7 +2520,7 @@
 }
 
 // Tests that updating an extension does not clobber old state.
-TEST_F(ExtensionServiceTest, DISABLED_UpdateExtensionPreservesState) {
+TEST_F(ExtensionServiceTest, UpdateExtensionPreservesState) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good.crx");
@@ -2549,7 +2546,7 @@
 }
 
 // Tests that updating preserves extension location.
-TEST_F(ExtensionServiceTest, DISABLED_UpdateExtensionPreservesLocation) {
+TEST_F(ExtensionServiceTest, UpdateExtensionPreservesLocation) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good.crx");
@@ -2568,7 +2565,7 @@
 }
 
 // Makes sure that LOAD extension types can downgrade.
-TEST_F(ExtensionServiceTest, DISABLED_LoadExtensionsCanDowngrade) {
+TEST_F(ExtensionServiceTest, LoadExtensionsCanDowngrade) {
   InitializeEmptyExtensionService();
 
   ScopedTempDir temp;
@@ -2615,7 +2612,7 @@
 
 #if !defined(OS_CHROMEOS)
 // LOAD extensions with plugins require approval.
-TEST_F(ExtensionServiceTest, DISABLED_LoadExtensionsWithPlugins) {
+TEST_F(ExtensionServiceTest, LoadExtensionsWithPlugins) {
   FilePath extension_with_plugin_path = data_dir_
       .AppendASCII("good")
       .AppendASCII("Extensions")
@@ -2702,7 +2699,7 @@
 }  // namespace
 
 // Test adding a pending extension.
-TEST_F(ExtensionServiceTest, DISABLED_AddPendingExtensionFromSync) {
+TEST_F(ExtensionServiceTest, AddPendingExtensionFromSync) {
   InitializeEmptyExtensionService();
 
   const std::string kFakeId(all_zero);
@@ -2729,7 +2726,7 @@
 }  // namespace
 
 // Test updating a pending extension.
-TEST_F(ExtensionServiceTest, DISABLED_UpdatePendingExtension) {
+TEST_F(ExtensionServiceTest, UpdatePendingExtension) {
   InitializeEmptyExtensionService();
   EXPECT_TRUE(service_->pending_extension_manager()->AddFromSync(
       kGoodId, GURL(kGoodUpdateURL), &IsExtension,
@@ -2755,7 +2752,7 @@
 
 // Test updating a pending theme.
 // Disabled due to ASAN failure. http://crbug.com/108320
-TEST_F(ExtensionServiceTest, DISABLED_DISABLED_UpdatePendingTheme) {
+TEST_F(ExtensionServiceTest, DISABLED_UpdatePendingTheme) {
   InitializeEmptyExtensionService();
   EXPECT_TRUE(service_->pending_extension_manager()->AddFromSync(
       theme_crx, GURL(), &IsTheme, false));
@@ -2783,7 +2780,7 @@
 // Test updating a pending CRX as if the source is an external extension
 // with an update URL.  In this case we don't know if the CRX is a theme
 // or not.
-TEST_F(ExtensionServiceTest, DISABLED_MAYBE_UpdatePendingExternalCrx) {
+TEST_F(ExtensionServiceTest, MAYBE_UpdatePendingExternalCrx) {
   InitializeEmptyExtensionService();
   EXPECT_TRUE(service_->pending_extension_manager()->AddFromExternalUpdateUrl(
       theme_crx, GURL(), Extension::EXTERNAL_PREF_DOWNLOAD));
@@ -2807,7 +2804,7 @@
 // Test updating a pending CRX as if the source is an external extension
 // with an update URL.  The external update should overwrite a sync update,
 // but a sync update should not overwrite a non-sync update.
-TEST_F(ExtensionServiceTest, DISABLED_UpdatePendingExternalCrxWinsOverSync) {
+TEST_F(ExtensionServiceTest, UpdatePendingExternalCrxWinsOverSync) {
   InitializeEmptyExtensionService();
 
   // Add a crx to be installed from the update mechanism.
@@ -2847,7 +2844,7 @@
 
 // Updating a theme should fail if the updater is explicitly told that
 // the CRX is not a theme.
-TEST_F(ExtensionServiceTest, DISABLED_UpdatePendingCrxThemeMismatch) {
+TEST_F(ExtensionServiceTest, UpdatePendingCrxThemeMismatch) {
   InitializeEmptyExtensionService();
   EXPECT_TRUE(service_->pending_extension_manager()->AddFromSync(
       theme_crx, GURL(), &IsExtension, true));
@@ -2868,7 +2865,7 @@
 // UpdateExtension().
 
 // Test updating a pending extension which fails the should-install test.
-TEST_F(ExtensionServiceTest, DISABLED_UpdatePendingExtensionFailedShouldInstallTest) {
+TEST_F(ExtensionServiceTest, UpdatePendingExtensionFailedShouldInstallTest) {
   InitializeEmptyExtensionService();
   // Add pending extension with a flipped is_theme.
   EXPECT_TRUE(service_->pending_extension_manager()->AddFromSync(
@@ -2888,7 +2885,7 @@
 // unsyncable extensions are blocked.
 
 // Test updating a pending extension for one that is not pending.
-TEST_F(ExtensionServiceTest, DISABLED_UpdatePendingExtensionNotPending) {
+TEST_F(ExtensionServiceTest, UpdatePendingExtensionNotPending) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good.crx");
@@ -2899,7 +2896,7 @@
 
 // Test updating a pending extension for one that is already
 // installed.
-TEST_F(ExtensionServiceTest, DISABLED_UpdatePendingExtensionAlreadyInstalled) {
+TEST_F(ExtensionServiceTest, UpdatePendingExtensionAlreadyInstalled) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good.crx");
@@ -2918,7 +2915,7 @@
 }
 
 // Test pref settings for blacklist and unblacklist extensions.
-TEST_F(ExtensionServiceTest, DISABLED_SetUnsetBlacklistInPrefs) {
+TEST_F(ExtensionServiceTest, SetUnsetBlacklistInPrefs) {
   InitializeEmptyExtensionService();
   std::vector<std::string> blacklist;
   blacklist.push_back(good0);
@@ -2947,7 +2944,7 @@
 }
 
 // Unload installed extension from blacklist.
-TEST_F(ExtensionServiceTest, DISABLED_UnloadBlacklistedExtension) {
+TEST_F(ExtensionServiceTest, UnloadBlacklistedExtension) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good.crx");
@@ -2976,7 +2973,7 @@
 }
 
 // Unload installed extension from blacklist.
-TEST_F(ExtensionServiceTest, DISABLED_BlacklistedExtensionWillNotInstall) {
+TEST_F(ExtensionServiceTest, BlacklistedExtensionWillNotInstall) {
   InitializeEmptyExtensionService();
   std::vector<std::string> blacklist;
   blacklist.push_back(good_crx);
@@ -2995,7 +2992,7 @@
 }
 
 // Unload blacklisted extension on policy change.
-TEST_F(ExtensionServiceTest, DISABLED_UnloadBlacklistedExtensionPolicy) {
+TEST_F(ExtensionServiceTest, UnloadBlacklistedExtensionPolicy) {
   InitializeEmptyExtensionService();
   FilePath path = data_dir_.AppendASCII("good.crx");
 
@@ -3028,7 +3025,7 @@
 
 // Allow Google-blacklisted extension if policy explicitly allows it (blacklist
 // then set policy).
-TEST_F(ExtensionServiceTest, DISABLED_WhitelistGoogleBlacklistedExtension) {
+TEST_F(ExtensionServiceTest, WhitelistGoogleBlacklistedExtension) {
   InitializeEmptyExtensionService();
 
   std::vector<std::string> blacklist;
@@ -3048,7 +3045,7 @@
 
 // Allow Google-blacklisted extension if policy requires it (blacklist then set
 // policy).
-TEST_F(ExtensionServiceTest, DISABLED_ForcelistGoogleBlacklistedExtension) {
+TEST_F(ExtensionServiceTest, ForcelistGoogleBlacklistedExtension) {
   InitializeEmptyExtensionService();
 
   std::vector<std::string> blacklist;
@@ -3068,7 +3065,7 @@
 
 // Allow Google-blacklisted extension if policy explicitly allows it (set policy
 // then blacklist).
-TEST_F(ExtensionServiceTest, DISABLED_GoogleBlacklistWhitelistedExtension) {
+TEST_F(ExtensionServiceTest, GoogleBlacklistWhitelistedExtension) {
   InitializeEmptyExtensionService();
 
   base::ListValue whitelist;
@@ -3085,7 +3082,7 @@
 
 // Allow Google-blacklisted extension if policy requires it (set policy then
 // blacklist).
-TEST_F(ExtensionServiceTest, DISABLED_GoogleBlacklistForcelistedExtension) {
+TEST_F(ExtensionServiceTest, GoogleBlacklistForcelistedExtension) {
   InitializeEmptyExtensionService();
 
   base::ListValue forcelist;
@@ -3102,7 +3099,7 @@
 
 // Test loading extensions from the profile directory, except
 // blacklisted ones.
-TEST_F(ExtensionServiceTest, DISABLED_WillNotLoadBlacklistedExtensionsFromDirectory) {
+TEST_F(ExtensionServiceTest, WillNotLoadBlacklistedExtensionsFromDirectory) {
   // Initialize the test dir with a good Preferences/extensions.
   FilePath source_install_dir = data_dir_
       .AppendASCII("good")
@@ -3135,7 +3132,7 @@
 }
 
 // Will not install extension blacklisted by policy.
-TEST_F(ExtensionServiceTest, DISABLED_BlacklistedByPolicyWillNotInstall) {
+TEST_F(ExtensionServiceTest, BlacklistedByPolicyWillNotInstall) {
   InitializeEmptyExtensionService();
 
   // Blacklist everything.
@@ -3165,7 +3162,7 @@
 }
 
 // Extension blacklisted by policy get unloaded after installing.
-TEST_F(ExtensionServiceTest, DISABLED_BlacklistedByPolicyRemovedIfRunning) {
+TEST_F(ExtensionServiceTest, BlacklistedByPolicyRemovedIfRunning) {
   InitializeEmptyExtensionService();
 
   // Install good_crx.
@@ -3189,7 +3186,7 @@
 }
 
 // Tests that component extensions are not blacklisted by policy.
-TEST_F(ExtensionServiceTest, DISABLED_ComponentExtensionWhitelisted) {
+TEST_F(ExtensionServiceTest, ComponentExtensionWhitelisted) {
   InitializeEmptyExtensionService();
 
   // Blacklist everything.
@@ -3234,7 +3231,7 @@
 }
 
 // Tests that policy-installed extensions are not blacklisted by policy.
-TEST_F(ExtensionServiceTest, DISABLED_PolicyInstalledExtensionsWhitelisted) {
+TEST_F(ExtensionServiceTest, PolicyInstalledExtensionsWhitelisted) {
   InitializeEmptyExtensionService();
 
   // Blacklist everything.
@@ -3276,7 +3273,7 @@
 
 // Tests that extensions cannot be installed if the policy provider prohibits
 // it. This functionality is implemented in CrxInstaller::ConfirmInstall().
-TEST_F(ExtensionServiceTest, DISABLED_ManagementPolicyProhibitsInstall) {
+TEST_F(ExtensionServiceTest, ManagementPolicyProhibitsInstall) {
   InitializeEmptyExtensionService();
 
   management_policy_->UnregisterAllProviders();
@@ -3290,7 +3287,7 @@
 
 // Tests that extensions cannot be loaded from prefs if the policy provider
 // prohibits it. This functionality is implemented in InstalledLoader::Load().
-TEST_F(ExtensionServiceTest, DISABLED_ManagementPolicyProhibitsLoadFromPrefs) {
+TEST_F(ExtensionServiceTest, ManagementPolicyProhibitsLoadFromPrefs) {
   InitializeEmptyExtensionService();
 
   // Create a fake extension to be loaded as though it were read from prefs.
@@ -3325,7 +3322,7 @@
 }
 
 // Tests disabling an extension when prohibited by the ManagementPolicy.
-TEST_F(ExtensionServiceTest, DISABLED_ManagementPolicyProhibitsDisable) {
+TEST_F(ExtensionServiceTest, ManagementPolicyProhibitsDisable) {
   InitializeEmptyExtensionService();
 
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
@@ -3346,7 +3343,7 @@
 }
 
 // Tests uninstalling an extension when prohibited by the ManagementPolicy.
-TEST_F(ExtensionServiceTest, DISABLED_ManagementPolicyProhibitsUninstall) {
+TEST_F(ExtensionServiceTest, ManagementPolicyProhibitsUninstall) {
   InitializeEmptyExtensionService();
 
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
@@ -3367,7 +3364,7 @@
 
 // Tests that previously installed extensions that are now prohibited from
 // being installed are removed.
-TEST_F(ExtensionServiceTest, DISABLED_ManagementPolicyUnloadsAllProhibited) {
+TEST_F(ExtensionServiceTest, ManagementPolicyUnloadsAllProhibited) {
   InitializeEmptyExtensionService();
 
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
@@ -3388,7 +3385,7 @@
 
 // Tests that previously disabled extensions that are now required to be
 // enabled are re-enabled on reinstall.
-TEST_F(ExtensionServiceTest, DISABLED_ManagementPolicyRequiresEnable) {
+TEST_F(ExtensionServiceTest, ManagementPolicyRequiresEnable) {
   InitializeEmptyExtensionService();
 
   // Install, then disable, an extension.
@@ -3410,7 +3407,7 @@
   EXPECT_EQ(0u, service_->disabled_extensions()->size());
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_ExternalExtensionAutoAcknowledgement) {
+TEST_F(ExtensionServiceTest, ExternalExtensionAutoAcknowledgement) {
   InitializeEmptyExtensionService();
   set_extensions_enabled(true);
 
@@ -3446,7 +3443,7 @@
 
 #if !defined(OS_CHROMEOS)
 // This tests if default apps are installed correctly.
-TEST_F(ExtensionServiceTest, DISABLED_DefaultAppsInstall) {
+TEST_F(ExtensionServiceTest, DefaultAppsInstall) {
   InitializeEmptyExtensionService();
   InitializeRequestContext();
   set_extensions_enabled(true);
@@ -3486,7 +3483,7 @@
 #endif
 
 // Tests disabling extensions
-TEST_F(ExtensionServiceTest, DISABLED_DisableExtension) {
+TEST_F(ExtensionServiceTest, DisableExtension) {
   InitializeEmptyExtensionService();
 
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
@@ -3504,7 +3501,7 @@
   EXPECT_FALSE(service_->disabled_extensions()->is_empty());
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_DisableTerminatedExtension) {
+TEST_F(ExtensionServiceTest, DisableTerminatedExtension) {
   InitializeEmptyExtensionService();
 
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
@@ -3520,7 +3517,7 @@
 }
 
 // Tests disabling all extensions (simulating --disable-extensions flag).
-TEST_F(ExtensionServiceTest, DISABLED_DisableAllExtensions) {
+TEST_F(ExtensionServiceTest, DisableAllExtensions) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good.crx");
@@ -3554,7 +3551,7 @@
 }
 
 // Tests reloading extensions.
-TEST_F(ExtensionServiceTest, DISABLED_ReloadExtensions) {
+TEST_F(ExtensionServiceTest, ReloadExtensions) {
   InitializeEmptyExtensionService();
   InitializeRequestContext();
 
@@ -3596,7 +3593,7 @@
   EXPECT_EQ(0u, service_->disabled_extensions()->size());
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_UninstallExtension) {
+TEST_F(ExtensionServiceTest, UninstallExtension) {
   InitializeEmptyExtensionService();
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
   EXPECT_EQ(1u, service_->extensions()->size());
@@ -3604,7 +3601,7 @@
   EXPECT_EQ(0u, service_->extensions()->size());
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_UninstallTerminatedExtension) {
+TEST_F(ExtensionServiceTest, UninstallTerminatedExtension) {
   InitializeEmptyExtensionService();
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
   TerminateExtension(good_crx);
@@ -3612,13 +3609,13 @@
 }
 
 // Tests the uninstaller helper.
-TEST_F(ExtensionServiceTest, DISABLED_UninstallExtensionHelper) {
+TEST_F(ExtensionServiceTest, UninstallExtensionHelper) {
   InitializeEmptyExtensionService();
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
   UninstallExtension(good_crx, true);
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_UninstallExtensionHelperTerminated) {
+TEST_F(ExtensionServiceTest, UninstallExtensionHelperTerminated) {
   InitializeEmptyExtensionService();
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
   TerminateExtension(good_crx);
@@ -3628,7 +3625,7 @@
 // An extension disabled because of unsupported requirements should re-enabled
 // if updated to a version with supported requirements as long as there are no
 // other disable reasons.
-TEST_F(ExtensionServiceTest, DISABLED_UpgradingRequirementsEnabled) {
+TEST_F(ExtensionServiceTest, UpgradingRequirementsEnabled) {
   InitializeEmptyExtensionService();
   BlackListWebGL();
 
@@ -3653,7 +3650,7 @@
 }
 
 // Extensions disabled through user action should stay disabled.
-TEST_F(ExtensionServiceTest, DISABLED_UpgradingRequirementsDisabled) {
+TEST_F(ExtensionServiceTest, UpgradingRequirementsDisabled) {
   InitializeEmptyExtensionService();
   BlackListWebGL();
 
@@ -3680,7 +3677,7 @@
 
 // The extension should not re-enabled because it was disabled from a
 // permission increase.
-TEST_F(ExtensionServiceTest, DISABLED_UpgradingRequirementsPermissions) {
+TEST_F(ExtensionServiceTest, UpgradingRequirementsPermissions) {
   InitializeEmptyExtensionService();
   BlackListWebGL();
 
@@ -3708,7 +3705,7 @@
 
 // Unpacked extensions are not allowed to be installed if they have unsupported
 // requirements.
-TEST_F(ExtensionServiceTest, DISABLED_UnpackedRequirements) {
+TEST_F(ExtensionServiceTest, UnpackedRequirements) {
   InitializeEmptyExtensionService();
   BlackListWebGL();
 
@@ -3743,7 +3740,7 @@
 };
 
 // Verifies extension state is removed upon uninstall.
-TEST_F(ExtensionServiceTest, DISABLED_ClearExtensionData) {
+TEST_F(ExtensionServiceTest, ClearExtensionData) {
   InitializeEmptyExtensionService();
   ExtensionCookieCallback callback;
 
@@ -3834,7 +3831,7 @@
 }
 
 // Verifies app state is removed upon uninstall.
-TEST_F(ExtensionServiceTest, DISABLED_ClearAppData) {
+TEST_F(ExtensionServiceTest, ClearAppData) {
   InitializeEmptyExtensionService();
   InitializeRequestContext();
   ExtensionCookieCallback callback;
@@ -3964,7 +3961,7 @@
 }
 
 // Tests loading single extensions (like --load-extension)
-TEST_F(ExtensionServiceTest, DISABLED_LoadExtension) {
+TEST_F(ExtensionServiceTest, LoadExtension) {
   InitializeEmptyExtensionService();
 
   FilePath ext1 = data_dir_
@@ -4004,7 +4001,7 @@
 
 // Tests that we generate IDs when they are not specified in the manifest for
 // --load-extension.
-TEST_F(ExtensionServiceTest, DISABLED_GenerateID) {
+TEST_F(ExtensionServiceTest, GenerateID) {
   InitializeEmptyExtensionService();
 
   FilePath no_id_ext = data_dir_.AppendASCII("no_id");
@@ -4159,7 +4156,7 @@
 
 // Tests the external installation feature
 #if defined(OS_WIN)
-TEST_F(ExtensionServiceTest, DISABLED_ExternalInstallRegistry) {
+TEST_F(ExtensionServiceTest, ExternalInstallRegistry) {
   // This should all work, even when normal extension installation is disabled.
   InitializeEmptyExtensionService();
   set_extensions_enabled(false);
@@ -4172,7 +4169,7 @@
 }
 #endif
 
-TEST_F(ExtensionServiceTest, DISABLED_ExternalInstallPref) {
+TEST_F(ExtensionServiceTest, ExternalInstallPref) {
   InitializeEmptyExtensionService();
 
   // Now add providers. Extension system takes ownership of the objects.
@@ -4183,7 +4180,7 @@
   TestExternalProvider(pref_provider, Extension::EXTERNAL_PREF);
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_ExternalInstallPrefUpdateUrl) {
+TEST_F(ExtensionServiceTest, ExternalInstallPrefUpdateUrl) {
   // This should all work, even when normal extension installation is disabled.
   InitializeEmptyExtensionService();
   set_extensions_enabled(false);
@@ -4202,7 +4199,7 @@
   TestExternalProvider(pref_provider, Extension::EXTERNAL_PREF_DOWNLOAD);
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_ExternalInstallPolicyUpdateUrl) {
+TEST_F(ExtensionServiceTest, ExternalInstallPolicyUpdateUrl) {
   // This should all work, even when normal extension installation is disabled.
   InitializeEmptyExtensionService();
   set_extensions_enabled(false);
@@ -4223,7 +4220,7 @@
 
 // Tests that external extensions get uninstalled when the external extension
 // providers can't account for them.
-TEST_F(ExtensionServiceTest, DISABLED_ExternalUninstall) {
+TEST_F(ExtensionServiceTest, ExternalUninstall) {
   // Start the extensions service with one external extension already installed.
   FilePath source_install_dir = data_dir_
       .AppendASCII("good")
@@ -4252,7 +4249,7 @@
 
 // Test that running multiple update checks simultaneously does not
 // keep the update from succeeding.
-TEST_F(ExtensionServiceTest, DISABLED_MultipleExternalUpdateCheck) {
+TEST_F(ExtensionServiceTest, MultipleExternalUpdateCheck) {
   InitializeEmptyExtensionService();
 
   MockExtensionProvider* provider =
@@ -4325,7 +4322,7 @@
   };
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_ExternalPrefProvider) {
+TEST_F(ExtensionServiceTest, ExternalPrefProvider) {
   InitializeEmptyExtensionService();
 
   // Test some valid extension records.
@@ -4471,7 +4468,7 @@
 }
 
 // Test loading good extensions from the profile directory.
-TEST_F(ExtensionServiceTest, DISABLED_LoadAndRelocalizeExtensions) {
+TEST_F(ExtensionServiceTest, LoadAndRelocalizeExtensions) {
   // Ensure we're testing in "en" and leave global state untouched.
   extension_l10n_util::ScopedLocaleForTest testLocale("en");
 
@@ -4615,7 +4612,7 @@
 }
 
 // Test loading extensions that require limited and unlimited storage quotas.
-TEST_F(ExtensionServiceTest, DISABLED_StorageQuota) {
+TEST_F(ExtensionServiceTest, StorageQuota) {
   InitializeEmptyExtensionService();
 
   FilePath extensions_path = data_dir_
@@ -4650,7 +4647,7 @@
 }
 
 // Tests ComponentLoader::Add().
-TEST_F(ExtensionServiceTest, DISABLED_ComponentExtensions) {
+TEST_F(ExtensionServiceTest, ComponentExtensions) {
   InitializeEmptyExtensionService();
 
   // Component extensions should work even when extensions are disabled.
@@ -4698,7 +4695,7 @@
   };
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_GetSyncData) {
+TEST_F(ExtensionServiceTest, GetSyncData) {
   InitializeEmptyExtensionService();
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
   const Extension* extension = service_->GetInstalledExtension(good_crx);
@@ -4721,7 +4718,7 @@
   EXPECT_EQ(extension->name(), data.name());
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_GetSyncDataTerminated) {
+TEST_F(ExtensionServiceTest, GetSyncDataTerminated) {
   InitializeEmptyExtensionService();
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
   TerminateExtension(good_crx);
@@ -4746,7 +4743,7 @@
   EXPECT_EQ(extension->name(), data.name());
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_GetSyncDataFilter) {
+TEST_F(ExtensionServiceTest, GetSyncDataFilter) {
   InitializeEmptyExtensionService();
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
   const Extension* extension = service_->GetInstalledExtension(good_crx);
@@ -4761,7 +4758,7 @@
   ASSERT_EQ(list.size(), 0U);
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_GetSyncExtensionDataUserSettings) {
+TEST_F(ExtensionServiceTest, GetSyncExtensionDataUserSettings) {
   InitializeEmptyExtensionService();
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
   const Extension* extension = service_->GetInstalledExtension(good_crx);
@@ -4809,7 +4806,7 @@
   }
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_SyncForUninstalledExternalExtension) {
+TEST_F(ExtensionServiceTest, SyncForUninstalledExternalExtension) {
   InitializeEmptyExtensionService();
   InstallCRXWithLocation(data_dir_.AppendASCII("good.crx"),
                          Extension::EXTERNAL_PREF, INSTALL_NEW);
@@ -4845,7 +4842,7 @@
   EXPECT_TRUE(service_->IsExternalExtensionUninstalled(good_crx));
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_GetSyncAppDataUserSettings) {
+TEST_F(ExtensionServiceTest, GetSyncAppDataUserSettings) {
   InitializeEmptyExtensionService();
   const Extension* app =
       PackAndInstallCRX(data_dir_.AppendASCII("app"), INSTALL_NEW);
@@ -4890,7 +4887,7 @@
   }
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_GetSyncAppDataUserSettingsOnExtensionMoved) {
+TEST_F(ExtensionServiceTest, GetSyncAppDataUserSettingsOnExtensionMoved) {
   InitializeEmptyExtensionService();
   const size_t kAppCount = 3;
   const Extension* apps[kAppCount];
@@ -4933,7 +4930,7 @@
   }
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_GetSyncDataList) {
+TEST_F(ExtensionServiceTest, GetSyncDataList) {
   InitializeEmptyExtensionService();
   InstallCRX(data_dir_.AppendASCII("good.crx"), INSTALL_NEW);
   InstallCRX(data_dir_.AppendASCII("page_action.crx"), INSTALL_NEW);
@@ -4956,7 +4953,7 @@
   EXPECT_EQ(2u, service_->GetAllSyncData(syncer::EXTENSIONS).size());
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_ProcessSyncDataUninstall) {
+TEST_F(ExtensionServiceTest, ProcessSyncDataUninstall) {
   InitializeEmptyExtensionService();
   TestSyncProcessorStub processor;
   service_->MergeDataAndStartSyncing(
@@ -4994,7 +4991,7 @@
   EXPECT_FALSE(service_->GetExtensionById(good_crx, true));
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_ProcessSyncDataWrongType) {
+TEST_F(ExtensionServiceTest, ProcessSyncDataWrongType) {
   InitializeEmptyExtensionService();
 
   // Install the extension.
@@ -5041,7 +5038,7 @@
   }
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_ProcessSyncDataSettings) {
+TEST_F(ExtensionServiceTest, ProcessSyncDataSettings) {
   InitializeEmptyExtensionService();
   InitializeExtensionProcessManager();
   TestSyncProcessorStub processor;
@@ -5107,7 +5104,7 @@
   EXPECT_FALSE(service_->pending_extension_manager()->IsIdPending(good_crx));
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_ProcessSyncDataTerminatedExtension) {
+TEST_F(ExtensionServiceTest, ProcessSyncDataTerminatedExtension) {
   InitializeExtensionServiceWithUpdater();
   TestSyncProcessorStub processor;
   service_->MergeDataAndStartSyncing(
@@ -5142,7 +5139,7 @@
   EXPECT_FALSE(service_->pending_extension_manager()->IsIdPending(good_crx));
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_ProcessSyncDataVersionCheck) {
+TEST_F(ExtensionServiceTest, ProcessSyncDataVersionCheck) {
   InitializeExtensionServiceWithUpdater();
   InitializeRequestContext();
   TestSyncProcessorStub processor;
@@ -5210,7 +5207,7 @@
   EXPECT_FALSE(service_->pending_extension_manager()->IsIdPending(good_crx));
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_ProcessSyncDataNotInstalled) {
+TEST_F(ExtensionServiceTest, ProcessSyncDataNotInstalled) {
   InitializeExtensionServiceWithUpdater();
   InitializeRequestContext();
   TestSyncProcessorStub processor;
@@ -5252,7 +5249,7 @@
   // TODO(akalin): Figure out a way to test |info.ShouldAllowInstall()|.
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_InstallPriorityExternalUpdateUrl) {
+TEST_F(ExtensionServiceTest, InstallPriorityExternalUpdateUrl) {
   InitializeEmptyExtensionService();
 
   FilePath path = data_dir_.AppendASCII("good.crx");
@@ -5295,7 +5292,7 @@
   EXPECT_FALSE(pending->IsIdPending(kGoodId));
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_InstallPriorityExternalLocalFile) {
+TEST_F(ExtensionServiceTest, InstallPriorityExternalLocalFile) {
   Version older_version("0.1.0.0");
   Version newer_version("2.0.0.0");
 
@@ -5452,7 +5449,7 @@
   EXPECT_TRUE(pending->IsIdPending(kGoodId));
 }
 
-TEST_F(ExtensionServiceTest, DISABLED_ConcurrentExternalLocalFile) {
+TEST_F(ExtensionServiceTest, ConcurrentExternalLocalFile) {
   Version kVersion123("1.2.3");
   Version kVersion124("1.2.4");
   Version kVersion125("1.2.5");
@@ -5515,7 +5512,7 @@
 
 // This makes sure we can package and install CRX files that use whitelisted
 // permissions.
-TEST_F(ExtensionServiceTest, DISABLED_InstallWhitelistedExtension) {
+TEST_F(ExtensionServiceTest, InstallWhitelistedExtension) {
   std::string test_id = "hdkklepkcpckhnpgjnmbdfhehckloojk";
   CommandLine::ForCurrentProcess()->AppendSwitchASCII(
       switches::kWhitelistedExtensionID, test_id);
@@ -5686,7 +5683,7 @@
 }
 
 // Test that installing an external extension displays a GlobalError.
-TEST_F(ExtensionServiceTest, DISABLED_ExternalInstallGlobalError) {
+TEST_F(ExtensionServiceTest, ExternalInstallGlobalError) {
   FeatureSwitch::ScopedOverride prompt(
       FeatureSwitch::prompt_for_external_extensions(), true);
 
@@ -5733,7 +5730,7 @@
 
 // Test that external extensions are initially disabled, and that enabling
 // them clears the prompt.
-TEST_F(ExtensionServiceTest, DISABLED_ExternalInstallInitiallyDisabled) {
+TEST_F(ExtensionServiceTest, ExternalInstallInitiallyDisabled) {
   FeatureSwitch::ScopedOverride prompt(
       FeatureSwitch::prompt_for_external_extensions(), true);
 
@@ -5761,7 +5758,7 @@
 }
 
 // Test that installing multiple external extensions works.
-TEST_F(ExtensionServiceTest, DISABLED_ExternalInstallMultiple) {
+TEST_F(ExtensionServiceTest, ExternalInstallMultiple) {
   FeatureSwitch::ScopedOverride prompt(
       FeatureSwitch::prompt_for_external_extensions(), true);