Index: chrome/browser/safe_browsing/malware_details_unittest.cc |
diff --git a/chrome/browser/safe_browsing/malware_details_unittest.cc b/chrome/browser/safe_browsing/malware_details_unittest.cc |
index 073198013e7161d651e88385e6a0380805a7811c..67fdb68c00dfd0bc97b71ba0273b15b944b474a7 100644 |
--- a/chrome/browser/safe_browsing/malware_details_unittest.cc |
+++ b/chrome/browser/safe_browsing/malware_details_unittest.cc |
@@ -313,7 +313,7 @@ class MalwareDetailsTest : public ChromeRenderViewHostTestHarness { |
// Tests creating a simple malware report. |
TEST_F(MalwareDetailsTest, MalwareSubResource) { |
// Start a load. |
- controller().LoadURL(GURL(kLandingURL), GURL(), |
+ controller().LoadURL(GURL(kLandingURL), content::Referrer(), |
content::PAGE_TRANSITION_TYPED, std::string()); |
SafeBrowsingService::UnsafeResource resource; |
@@ -345,7 +345,7 @@ TEST_F(MalwareDetailsTest, MalwareSubResource) { |
// Tests creating a simple malware report where the subresource has a |
// different original_url. |
TEST_F(MalwareDetailsTest, MalwareSubResourceWithOriginalUrl) { |
- controller().LoadURL(GURL(kLandingURL), GURL(), |
+ controller().LoadURL(GURL(kLandingURL), content::Referrer(), |
content::PAGE_TRANSITION_TYPED, std::string()); |
SafeBrowsingService::UnsafeResource resource; |
@@ -385,7 +385,7 @@ TEST_F(MalwareDetailsTest, MalwareSubResourceWithOriginalUrl) { |
// Tests creating a malware report with data from the renderer. |
TEST_F(MalwareDetailsTest, MalwareDOMDetails) { |
- controller().LoadURL(GURL(kLandingURL), GURL(), |
+ controller().LoadURL(GURL(kLandingURL), content::Referrer(), |
content::PAGE_TRANSITION_TYPED, std::string()); |
SafeBrowsingService::UnsafeResource resource; |
@@ -442,8 +442,8 @@ TEST_F(MalwareDetailsTest, MalwareDOMDetails) { |
// Verify that https:// urls are dropped. |
TEST_F(MalwareDetailsTest, NotPublicUrl) { |
- controller().LoadURL(GURL(kHttpsURL), GURL(), content::PAGE_TRANSITION_TYPED, |
- std::string()); |
+ controller().LoadURL(GURL(kHttpsURL), content::Referrer(), |
+ content::PAGE_TRANSITION_TYPED, std::string()); |
SafeBrowsingService::UnsafeResource resource; |
InitResource(&resource, true, GURL(kMalwareURL)); |
scoped_refptr<MalwareDetailsWrap> report = new MalwareDetailsWrap( |
@@ -466,7 +466,7 @@ TEST_F(MalwareDetailsTest, NotPublicUrl) { |
// Tests creating a malware report where there are redirect urls to an unsafe |
// resource url |
TEST_F(MalwareDetailsTest, MalwareWithRedirectUrl) { |
- controller().LoadURL(GURL(kLandingURL), GURL(), |
+ controller().LoadURL(GURL(kLandingURL), content::Referrer(), |
content::PAGE_TRANSITION_TYPED, std::string()); |
SafeBrowsingService::UnsafeResource resource; |
@@ -518,7 +518,7 @@ TEST_F(MalwareDetailsTest, MalwareWithRedirectUrl) { |
// Tests the interaction with the HTTP cache. |
TEST_F(MalwareDetailsTest, HTTPCache) { |
- controller().LoadURL(GURL(kLandingURL), GURL(), |
+ controller().LoadURL(GURL(kLandingURL), content::Referrer(), |
content::PAGE_TRANSITION_TYPED, std::string()); |
SafeBrowsingService::UnsafeResource resource; |
@@ -591,7 +591,7 @@ TEST_F(MalwareDetailsTest, HTTPCache) { |
// Tests the interaction with the HTTP cache (where the cache is empty). |
TEST_F(MalwareDetailsTest, HTTPCacheNoEntries) { |
- controller().LoadURL(GURL(kLandingURL), GURL(), |
+ controller().LoadURL(GURL(kLandingURL), content::Referrer(), |
content::PAGE_TRANSITION_TYPED, std::string()); |
SafeBrowsingService::UnsafeResource resource; |
@@ -645,7 +645,7 @@ TEST_F(MalwareDetailsTest, HistoryServiceUrls) { |
// Wait for history service operation finished. |
profile()->BlockUntilHistoryProcessesPendingRequests(); |
- controller().LoadURL(GURL(kLandingURL), GURL(), |
+ controller().LoadURL(GURL(kLandingURL), content::Referrer(), |
content::PAGE_TRANSITION_TYPED, std::string()); |
SafeBrowsingService::UnsafeResource resource; |