Index: chrome/browser/safe_browsing/threat_details_cache.cc |
diff --git a/chrome/browser/safe_browsing/threat_details_cache.cc b/chrome/browser/safe_browsing/threat_details_cache.cc |
index 05a78e01b6b52e78d06ad48a8d6b09486cb371ce..c09f1c39bb095f47332a96da1776dbfad791deba 100644 |
--- a/chrome/browser/safe_browsing/threat_details_cache.cc |
+++ b/chrome/browser/safe_browsing/threat_details_cache.cc |
@@ -23,7 +23,10 @@ |
#include "net/url_request/url_request_status.h" |
using content::BrowserThread; |
-using safe_browsing::ClientMalwareReportRequest; |
+ |
+namespace safe_browsing { |
+ |
+class ClientMalwareReportRequest; |
Nathan Parker
2015/11/11 21:23:36
Shouldn't need this pre-decl, since it must be in
vakh (old account. dont use)
2015/11/11 23:22:46
Done.
|
// Only send small files for now, a better strategy would use the size |
// of the whole report and the user's bandwidth. |
@@ -34,7 +37,7 @@ ThreatDetailsCacheCollector::ThreatDetailsCacheCollector() |
void ThreatDetailsCacheCollector::StartCacheCollection( |
net::URLRequestContextGetter* request_context_getter, |
- safe_browsing::ResourceMap* resources, |
+ ResourceMap* resources, |
bool* result, |
const base::Closure& callback) { |
// Start the data collection from the HTTP cache. We use a URLFetcher |
@@ -89,7 +92,7 @@ void ThreatDetailsCacheCollector::OpenEntry() { |
ClientMalwareReportRequest::Resource* ThreatDetailsCacheCollector::GetResource( |
const GURL& url) { |
- safe_browsing::ResourceMap::iterator it = resources_->find(url.spec()); |
+ ResourceMap::iterator it = resources_->find(url.spec()); |
if (it != resources_->end()) { |
return it->second.get(); |
} |
@@ -201,3 +204,5 @@ void ThreatDetailsCacheCollector::AllDone(bool success) { |
BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, callback_); |
callback_.Reset(); |
} |
+ |
+} // namespace safe_browsing |