Index: chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
index 9decd2afe9b3c472cb8bbbe16e71647a11265074..e50f0978eff59489e8aa35230a1293f98212b399 100644 |
--- a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
+++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
@@ -52,7 +52,7 @@ using content::InterstitialPage; |
using content::NavigationController; |
using content::WebContents; |
-namespace { |
+namespace safe_browsing { |
const char kEmptyPage[] = "empty.html"; |
const char kMalwarePage[] = "safe_browsing/malware.html"; |
@@ -354,8 +354,6 @@ class TestSafeBrowsingBlockingPageFactory |
} |
}; |
-} // namespace |
mattm
2015/11/11 01:10:16
Keep the anon namespace inside the new namespace.
vakh (old account. dont use)
2015/11/11 18:59:53
Done.
|
- |
// Tests the safe browsing blocking page in a browser. |
class SafeBrowsingBlockingPageBrowserTest |
: public InProcessBrowserTest, |
@@ -744,7 +742,7 @@ IN_PROC_BROWSER_TEST_P(SafeBrowsingBlockingPageBrowserTest, |
if (expect_malware_details) { |
malware_report_sent_runner->Run(); |
std::string serialized = GetReportSent(); |
- safe_browsing::ClientMalwareReportRequest report; |
+ ClientMalwareReportRequest report; |
ASSERT_TRUE(report.ParseFromString(serialized)); |
// Verify the report is complete. |
EXPECT_TRUE(report.complete()); |
@@ -1023,3 +1021,5 @@ INSTANTIATE_TEST_CASE_P(SafeBrowsingBlockingPageIDNTestWithThreatType, |
testing::Values(SB_THREAT_TYPE_URL_MALWARE, |
SB_THREAT_TYPE_URL_PHISHING, |
SB_THREAT_TYPE_URL_UNWANTED)); |
+ |
+} // namespace safe_browsing |