| Index: chrome/browser/child_process_security_policy_unittest.cc
|
| diff --git a/chrome/browser/child_process_security_policy_unittest.cc b/chrome/browser/child_process_security_policy_unittest.cc
|
| index 26f794ff6f71269536492b28b1ab16027b92bcbf..cc311889d60f5405bb6173bb864fe31be957b007 100644
|
| --- a/chrome/browser/child_process_security_policy_unittest.cc
|
| +++ b/chrome/browser/child_process_security_policy_unittest.cc
|
| @@ -18,11 +18,11 @@ class ChildProcessSecurityPolicyTest : public testing::Test {
|
| // testing::Test
|
| virtual void SetUp() {
|
| // In the real world, "chrome:" is a handled scheme.
|
| - URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme,
|
| - &URLRequestTestJob::Factory);
|
| + net::URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme,
|
| + &URLRequestTestJob::Factory);
|
| }
|
| virtual void TearDown() {
|
| - URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, NULL);
|
| + net::URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, NULL);
|
| }
|
| };
|
|
|
| @@ -133,7 +133,7 @@ TEST_F(ChildProcessSecurityPolicyTest, RegisterWebSafeSchemeTest) {
|
| EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers")));
|
|
|
| // Once we register a ProtocolFactory for "asdf", we default to deny.
|
| - URLRequest::RegisterProtocolFactory("asdf", &URLRequestTestJob::Factory);
|
| + net::URLRequest::RegisterProtocolFactory("asdf", &URLRequestTestJob::Factory);
|
| EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("asdf:rockers")));
|
|
|
| // We can allow new schemes by adding them to the whitelist.
|
| @@ -141,7 +141,7 @@ TEST_F(ChildProcessSecurityPolicyTest, RegisterWebSafeSchemeTest) {
|
| EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers")));
|
|
|
| // Cleanup.
|
| - URLRequest::RegisterProtocolFactory("asdf", NULL);
|
| + net::URLRequest::RegisterProtocolFactory("asdf", NULL);
|
| EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers")));
|
|
|
| p->Remove(kRendererID);
|
|
|