Index: chrome/browser/safe_browsing/incident_reporting/binary_integrity_analyzer_mac_unittest.cc |
diff --git a/chrome/browser/safe_browsing/incident_reporting/binary_integrity_analyzer_mac_unittest.cc b/chrome/browser/safe_browsing/incident_reporting/binary_integrity_analyzer_mac_unittest.cc |
index 2ae08d3f0c145048729ee0768b0cf58d9f0c5a02..9eb43c79936804fe804c0a6ba2cb16c1a0fa82f6 100644 |
--- a/chrome/browser/safe_browsing/incident_reporting/binary_integrity_analyzer_mac_unittest.cc |
+++ b/chrome/browser/safe_browsing/incident_reporting/binary_integrity_analyzer_mac_unittest.cc |
@@ -64,7 +64,7 @@ void BinaryIntegrityAnalyzerMacTest::SetUp() { |
base::FilePath signed_bundle_path = |
base::FilePath(test_data_dir_).Append(kBundleBase); |
base::FilePath copied_bundle_path = |
- base::FilePath(temp_dir_.path()).Append(kBundleBase); |
+ base::FilePath(temp_dir_.GetPath()).Append(kBundleBase); |
ASSERT_TRUE( |
base::CopyDirectory(signed_bundle_path, copied_bundle_path, true)); |
} |
@@ -94,7 +94,7 @@ TEST_F(BinaryIntegrityAnalyzerMacTest, GetCriticalPathsAndRequirements) { |
TEST_F(BinaryIntegrityAnalyzerMacTest, VerifyBinaryIntegrityForTesting) { |
std::unique_ptr<MockIncidentReceiver> mock_receiver( |
new StrictMock<MockIncidentReceiver>()); |
- base::FilePath bundle = temp_dir_.path().Append(kBundleBase); |
+ base::FilePath bundle = temp_dir_.GetPath().Append(kBundleBase); |
std::string requirement( |
"certificate leaf[subject.CN]=\"untrusted@goat.local\""); |
@@ -108,7 +108,7 @@ TEST_F(BinaryIntegrityAnalyzerMacTest, VerifyBinaryIntegrityForTesting) { |
ASSERT_EQ(IncidentType::BINARY_INTEGRITY, incident_to_clear->GetType()); |
ASSERT_EQ(incident_to_clear->GetKey(), "test-bundle.app"); |
- base::FilePath exe_path = temp_dir_.path().Append(kBundleURL); |
+ base::FilePath exe_path = temp_dir_.GetPath().Append(kBundleURL); |
ASSERT_TRUE(CorruptFileContent(exe_path)); |
std::unique_ptr<Incident> incident; |