Index: components/subresource_filter/content/browser/fake_safe_browsing_database_manager.cc |
diff --git a/components/subresource_filter/content/browser/fake_safe_browsing_database_manager.cc b/components/subresource_filter/content/browser/fake_safe_browsing_database_manager.cc |
index cfd968e8f7eb8c0182389c12ba3eed06fb41e423..80ad87160f6cc940204e2259605242d69fadd695 100644 |
--- a/components/subresource_filter/content/browser/fake_safe_browsing_database_manager.cc |
+++ b/components/subresource_filter/content/browser/fake_safe_browsing_database_manager.cc |
@@ -15,8 +15,9 @@ FakeSafeBrowsingDatabaseManager::FakeSafeBrowsingDatabaseManager() |
void FakeSafeBrowsingDatabaseManager::AddBlacklistedUrl( |
const GURL& url, |
- safe_browsing::SBThreatType threat_type) { |
- url_to_threat_type_[url] = threat_type; |
+ safe_browsing::SBThreatType threat_type, |
+ safe_browsing::ThreatPatternType pattern_type) { |
+ url_to_threat_type_[url] = std::make_pair(threat_type, pattern_type); |
} |
void FakeSafeBrowsingDatabaseManager::SimulateTimeout() { |
@@ -51,8 +52,9 @@ void FakeSafeBrowsingDatabaseManager::OnCheckUrlForSubresourceFilterComplete( |
// Check to see if the request was cancelled to avoid use-after-free. |
if (checks_.find(client) == checks_.end()) |
return; |
- client->OnCheckBrowseUrlResult(url, url_to_threat_type_[url], |
- safe_browsing::ThreatMetadata()); |
+ safe_browsing::ThreatMetadata metadata; |
+ metadata.threat_pattern_type = url_to_threat_type_[url].second; |
+ client->OnCheckBrowseUrlResult(url, url_to_threat_type_[url].first, metadata); |
} |
bool FakeSafeBrowsingDatabaseManager::CheckResourceUrl(const GURL& url, |