Index: content/browser/child_process_security_policy_unittest.cc |
diff --git a/content/browser/child_process_security_policy_unittest.cc b/content/browser/child_process_security_policy_unittest.cc |
index c74294f4f38196ce7821f963a8f01ba6a90233e5..e2096696b04cb253374a7390703bd2e7c2fa5b44 100644 |
--- a/content/browser/child_process_security_policy_unittest.cc |
+++ b/content/browser/child_process_security_policy_unittest.cc |
@@ -63,7 +63,7 @@ class ChildProcessSecurityPolicyTest : public testing::Test { |
// Claim to always handle chrome:// URLs because the CPSP's notion of |
// allowing WebUI bindings is hard-wired to this particular scheme. |
- test_browser_client_.AddScheme(chrome::kChromeUIScheme); |
+ test_browser_client_.AddScheme(kChromeUIScheme); |
// Claim to always handle file:// URLs like the browser would. |
// net::URLRequest::IsHandledURL() no longer claims support for default |
@@ -132,7 +132,7 @@ TEST_F(ChildProcessSecurityPolicyTest, IsWebSafeSchemeTest) { |
p->RegisterWebSafeScheme("registered-web-safe-scheme"); |
EXPECT_TRUE(p->IsWebSafeScheme("registered-web-safe-scheme")); |
- EXPECT_FALSE(p->IsWebSafeScheme(chrome::kChromeUIScheme)); |
+ EXPECT_FALSE(p->IsWebSafeScheme(kChromeUIScheme)); |
} |
TEST_F(ChildProcessSecurityPolicyTest, IsPseudoSchemeTest) { |
@@ -147,7 +147,7 @@ TEST_F(ChildProcessSecurityPolicyTest, IsPseudoSchemeTest) { |
p->RegisterPseudoScheme("registered-pseudo-scheme"); |
EXPECT_TRUE(p->IsPseudoScheme("registered-pseudo-scheme")); |
- EXPECT_FALSE(p->IsPseudoScheme(chrome::kChromeUIScheme)); |
+ EXPECT_FALSE(p->IsPseudoScheme(kChromeUIScheme)); |
} |
TEST_F(ChildProcessSecurityPolicyTest, StandardSchemesTest) { |