Index: chrome/browser/child_process_security_policy_unittest.cc |
diff --git a/chrome/browser/child_process_security_policy_unittest.cc b/chrome/browser/child_process_security_policy_unittest.cc |
index 26f794ff6f71269536492b28b1ab16027b92bcbf..cc311889d60f5405bb6173bb864fe31be957b007 100644 |
--- a/chrome/browser/child_process_security_policy_unittest.cc |
+++ b/chrome/browser/child_process_security_policy_unittest.cc |
@@ -18,11 +18,11 @@ class ChildProcessSecurityPolicyTest : public testing::Test { |
// testing::Test |
virtual void SetUp() { |
// In the real world, "chrome:" is a handled scheme. |
- URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, |
- &URLRequestTestJob::Factory); |
+ net::URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, |
+ &URLRequestTestJob::Factory); |
} |
virtual void TearDown() { |
- URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, NULL); |
+ net::URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, NULL); |
} |
}; |
@@ -133,7 +133,7 @@ TEST_F(ChildProcessSecurityPolicyTest, RegisterWebSafeSchemeTest) { |
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); |
// Once we register a ProtocolFactory for "asdf", we default to deny. |
- URLRequest::RegisterProtocolFactory("asdf", &URLRequestTestJob::Factory); |
+ net::URLRequest::RegisterProtocolFactory("asdf", &URLRequestTestJob::Factory); |
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); |
// We can allow new schemes by adding them to the whitelist. |
@@ -141,7 +141,7 @@ TEST_F(ChildProcessSecurityPolicyTest, RegisterWebSafeSchemeTest) { |
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); |
// Cleanup. |
- URLRequest::RegisterProtocolFactory("asdf", NULL); |
+ net::URLRequest::RegisterProtocolFactory("asdf", NULL); |
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); |
p->Remove(kRendererID); |