Index: chrome/browser/download/download_target_determiner.cc |
diff --git a/chrome/browser/download/download_target_determiner.cc b/chrome/browser/download/download_target_determiner.cc |
index e1e662e79d7648e95e7b80725ece47ecedd6d5fe..fbc35cfeef8854132e5eca8142f25ca88397ccbe 100644 |
--- a/chrome/browser/download/download_target_determiner.cc |
+++ b/chrome/browser/download/download_target_determiner.cc |
@@ -28,6 +28,7 @@ |
#include "extensions/common/constants.h" |
#include "extensions/features/features.h" |
#include "net/base/filename_util.h" |
+#include "ppapi/features/features.h" |
#include "ui/base/l10n/l10n_util.h" |
#include "url/origin.h" |
@@ -36,7 +37,7 @@ |
#include "extensions/common/feature_switch.h" |
#endif |
-#if defined(ENABLE_PLUGINS) |
+#if BUILDFLAG(ENABLE_PLUGINS) |
#include "chrome/browser/plugins/plugin_prefs.h" |
#include "content/public/browser/plugin_service.h" |
#include "content/public/common/webplugininfo.h" |
@@ -444,7 +445,7 @@ void DownloadTargetDeterminer::DetermineMimeTypeDone( |
DoLoop(); |
} |
-#if defined(ENABLE_PLUGINS) |
+#if BUILDFLAG(ENABLE_PLUGINS) |
// The code below is used by DoDetermineIfHandledSafely to determine if the |
// file type is handled by a sandboxed plugin. |
namespace { |
@@ -504,7 +505,7 @@ void IsHandledBySafePlugin(content::ResourceContext* resource_context, |
} |
} // namespace |
-#endif // defined(ENABLE_PLUGINS) |
+#endif // BUILDFLAG(ENABLE_PLUGINS) |
DownloadTargetDeterminer::Result |
DownloadTargetDeterminer::DoDetermineIfHandledSafely() { |
@@ -523,7 +524,7 @@ DownloadTargetDeterminer::Result |
return CONTINUE; |
} |
-#if defined(ENABLE_PLUGINS) |
+#if BUILDFLAG(ENABLE_PLUGINS) |
BrowserThread::PostTask( |
BrowserThread::IO, |
FROM_HERE, |
@@ -541,7 +542,7 @@ DownloadTargetDeterminer::Result |
#endif |
} |
-#if defined(ENABLE_PLUGINS) |
+#if BUILDFLAG(ENABLE_PLUGINS) |
void DownloadTargetDeterminer::DetermineIfHandledSafelyDone( |
bool is_handled_safely) { |
DCHECK_CURRENTLY_ON(BrowserThread::UI); |