Chromium Code Reviews| Index: chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
| diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
| index 9decd2afe9b3c472cb8bbbe16e71647a11265074..e50f0978eff59489e8aa35230a1293f98212b399 100644 |
| --- a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
| +++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
| @@ -52,7 +52,7 @@ using content::InterstitialPage; |
| using content::NavigationController; |
| using content::WebContents; |
| -namespace { |
| +namespace safe_browsing { |
| const char kEmptyPage[] = "empty.html"; |
| const char kMalwarePage[] = "safe_browsing/malware.html"; |
| @@ -354,8 +354,6 @@ class TestSafeBrowsingBlockingPageFactory |
| } |
| }; |
| -} // namespace |
|
mattm
2015/11/11 01:10:16
Keep the anon namespace inside the new namespace.
vakh (old account. dont use)
2015/11/11 18:59:53
Done.
|
| - |
| // Tests the safe browsing blocking page in a browser. |
| class SafeBrowsingBlockingPageBrowserTest |
| : public InProcessBrowserTest, |
| @@ -744,7 +742,7 @@ IN_PROC_BROWSER_TEST_P(SafeBrowsingBlockingPageBrowserTest, |
| if (expect_malware_details) { |
| malware_report_sent_runner->Run(); |
| std::string serialized = GetReportSent(); |
| - safe_browsing::ClientMalwareReportRequest report; |
| + ClientMalwareReportRequest report; |
| ASSERT_TRUE(report.ParseFromString(serialized)); |
| // Verify the report is complete. |
| EXPECT_TRUE(report.complete()); |
| @@ -1023,3 +1021,5 @@ INSTANTIATE_TEST_CASE_P(SafeBrowsingBlockingPageIDNTestWithThreatType, |
| testing::Values(SB_THREAT_TYPE_URL_MALWARE, |
| SB_THREAT_TYPE_URL_PHISHING, |
| SB_THREAT_TYPE_URL_UNWANTED)); |
| + |
| +} // namespace safe_browsing |