Index: chrome/browser/safe_browsing/threat_details_unittest.cc |
diff --git a/chrome/browser/safe_browsing/threat_details_unittest.cc b/chrome/browser/safe_browsing/threat_details_unittest.cc |
index f537c5c9948b2c84924703605f9f9b1e1a8ee99d..0829bf290b2825c3a8acdd196912031502414f57 100644 |
--- a/chrome/browser/safe_browsing/threat_details_unittest.cc |
+++ b/chrome/browser/safe_browsing/threat_details_unittest.cc |
@@ -59,9 +59,10 @@ static const char* kLandingData = |
using content::BrowserThread; |
using content::WebContents; |
-using safe_browsing::ClientMalwareReportRequest; |
-namespace { |
+namespace safe_browsing { |
+ |
+class ClientMalwareReportRequest; |
Nathan Parker
2015/11/05 22:00:53
Shouldn't need this.
vakh (old account. dont use)
2015/11/07 01:22:57
Done.
|
void WriteHeaders(disk_cache::Entry* entry, const std::string& headers) { |
net::HttpResponseInfo responseinfo; |
@@ -175,8 +176,6 @@ class MockSafeBrowsingUIManager : public SafeBrowsingUIManager { |
DISALLOW_COPY_AND_ASSIGN(MockSafeBrowsingUIManager); |
}; |
-} // namespace. |
- |
class ThreatDetailsTest : public ChromeRenderViewHostTestHarness { |
public: |
typedef SafeBrowsingUIManager::UnsafeResource UnsafeResource; |
@@ -561,10 +560,10 @@ TEST_F(ThreatDetailsTest, HTTPCache) { |
ClientMalwareReportRequest::Resource* pb_resource = expected.add_resources(); |
pb_resource->set_id(0); |
pb_resource->set_url(kLandingURL); |
- safe_browsing::ClientMalwareReportRequest::HTTPResponse* pb_response = |
+ ClientMalwareReportRequest::HTTPResponse* pb_response = |
pb_resource->mutable_response(); |
pb_response->mutable_firstline()->set_code(200); |
- safe_browsing::ClientMalwareReportRequest::HTTPHeader* pb_header = |
+ ClientMalwareReportRequest::HTTPHeader* pb_header = |
pb_response->add_headers(); |
pb_header->set_name("Content-Type"); |
pb_header->set_value("text/html"); |
@@ -697,3 +696,5 @@ TEST_F(ThreatDetailsTest, HistoryServiceUrls) { |
VerifyResults(actual, expected); |
} |
+ |
+} // namespace safe_browsing |