Chromium Code Reviews| Index: chrome/browser/safe_browsing/ui_manager_unittest.cc |
| diff --git a/chrome/browser/safe_browsing/ui_manager_unittest.cc b/chrome/browser/safe_browsing/ui_manager_unittest.cc |
| index 9c5806e0273418ca66941b4b95bb4386af860c20..df00ed244ff9499fa3986ba2bdfd6a3462211cfd 100644 |
| --- a/chrome/browser/safe_browsing/ui_manager_unittest.cc |
| +++ b/chrome/browser/safe_browsing/ui_manager_unittest.cc |
| @@ -2,9 +2,6 @@ |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| -#ifndef CHROME_BROWSER_SAFE_BROWSING_UI_MANAGER_UNITTEST_CC_ |
|
Nathan Parker
2015/11/05 22:00:53
Haha! That's pretty weird.
vakh (old account. dont use)
2015/11/07 01:22:57
Acknowledged. Yes, I was surprised to find it ther
|
| -#define CHROME_BROWSER_SAFE_BROWSING_UI_MANAGER_UNITTEST_CC_ |
| - |
| #include "base/memory/scoped_ptr.h" |
| #include "chrome/browser/safe_browsing/safe_browsing_service.h" |
| #include "chrome/browser/safe_browsing/safe_browsing_util.h" |
| @@ -23,6 +20,8 @@ static const char* kGoodURL = "https://www.good.com"; |
| static const char* kBadURL = "https://www.malware.com"; |
| static const char* kBadURLWithPath = "https://www.malware.com/index.html"; |
| +namespace safe_browsing { |
| + |
| class SafeBrowsingUIManagerTest : public ChromeRenderViewHostTestHarness { |
| public: |
| SafeBrowsingUIManagerTest() : ui_manager_(new SafeBrowsingUIManager(NULL)) {} |
| @@ -103,4 +102,4 @@ TEST_F(SafeBrowsingUIManagerTest, WhitelistIgnoresThreatType) { |
| EXPECT_TRUE(IsWhitelisted(resource_phishing)); |
| } |
| -#endif // CHROME_BROWSER_SAFE_BROWSING_UI_MANAGER_UNITTEST_CC_ |
| +} // namespace safe_browsing |