| Index: content/browser/child_process_security_policy_unittest.cc
|
| diff --git a/content/browser/child_process_security_policy_unittest.cc b/content/browser/child_process_security_policy_unittest.cc
|
| index c74294f4f38196ce7821f963a8f01ba6a90233e5..e2096696b04cb253374a7390703bd2e7c2fa5b44 100644
|
| --- a/content/browser/child_process_security_policy_unittest.cc
|
| +++ b/content/browser/child_process_security_policy_unittest.cc
|
| @@ -63,7 +63,7 @@ class ChildProcessSecurityPolicyTest : public testing::Test {
|
|
|
| // Claim to always handle chrome:// URLs because the CPSP's notion of
|
| // allowing WebUI bindings is hard-wired to this particular scheme.
|
| - test_browser_client_.AddScheme(chrome::kChromeUIScheme);
|
| + test_browser_client_.AddScheme(kChromeUIScheme);
|
|
|
| // Claim to always handle file:// URLs like the browser would.
|
| // net::URLRequest::IsHandledURL() no longer claims support for default
|
| @@ -132,7 +132,7 @@ TEST_F(ChildProcessSecurityPolicyTest, IsWebSafeSchemeTest) {
|
| p->RegisterWebSafeScheme("registered-web-safe-scheme");
|
| EXPECT_TRUE(p->IsWebSafeScheme("registered-web-safe-scheme"));
|
|
|
| - EXPECT_FALSE(p->IsWebSafeScheme(chrome::kChromeUIScheme));
|
| + EXPECT_FALSE(p->IsWebSafeScheme(kChromeUIScheme));
|
| }
|
|
|
| TEST_F(ChildProcessSecurityPolicyTest, IsPseudoSchemeTest) {
|
| @@ -147,7 +147,7 @@ TEST_F(ChildProcessSecurityPolicyTest, IsPseudoSchemeTest) {
|
| p->RegisterPseudoScheme("registered-pseudo-scheme");
|
| EXPECT_TRUE(p->IsPseudoScheme("registered-pseudo-scheme"));
|
|
|
| - EXPECT_FALSE(p->IsPseudoScheme(chrome::kChromeUIScheme));
|
| + EXPECT_FALSE(p->IsPseudoScheme(kChromeUIScheme));
|
| }
|
|
|
| TEST_F(ChildProcessSecurityPolicyTest, StandardSchemesTest) {
|
|
|