Index: chrome/browser/safe_browsing/unverified_download_field_trial_unittest.cc |
diff --git a/chrome/browser/safe_browsing/unverified_download_field_trial_unittest.cc b/chrome/browser/safe_browsing/unverified_download_field_trial_unittest.cc |
index 4d09f03ab529f50a10d3086a607a35510b890f88..7a234d0a645d4141c38c23b133ca6db53e0267a0 100644 |
--- a/chrome/browser/safe_browsing/unverified_download_field_trial_unittest.cc |
+++ b/chrome/browser/safe_browsing/unverified_download_field_trial_unittest.cc |
@@ -9,6 +9,7 @@ |
#include "base/metrics/field_trial.h" |
#include "chrome/common/chrome_switches.h" |
#include "chrome/common/safe_browsing/download_protection_util.h" |
+#include "chrome/common/safe_browsing/file_type_policies.h" |
#include "components/variations/variations_associated_data.h" |
#include "testing/gmock/include/gmock/gmock.h" |
#include "testing/gtest/include/gtest/gtest.h" |
@@ -56,10 +57,9 @@ class ScopedFieldTrialState { |
// Verify some test assumptions. Namely, that kSafeFilename is not a supported |
// binary file and that kHandledFilename is. |
TEST(UnverifiedDownloadFieldTrialTest, Assumptions) { |
- EXPECT_TRUE(download_protection_util::IsSupportedBinaryFile( |
- base::FilePath(kHandledFilename))); |
- EXPECT_FALSE(download_protection_util::IsSupportedBinaryFile( |
- base::FilePath(kSafeFilename))); |
+ FileTypePolicies* policies = FileTypePolicies::GetInstance(); |
+ EXPECT_TRUE(policies->IsCheckedBinaryFile(base::FilePath(kHandledFilename))); |
+ EXPECT_FALSE(policies->IsCheckedBinaryFile(base::FilePath(kSafeFilename))); |
} |
// Verify that disallow-unchecked-dangerous-downloads command line switch causes |