| Index: components/subresource_filter/content/browser/fake_safe_browsing_database_manager.cc
|
| diff --git a/components/subresource_filter/content/browser/fake_safe_browsing_database_manager.cc b/components/subresource_filter/content/browser/fake_safe_browsing_database_manager.cc
|
| index cfd968e8f7eb8c0182389c12ba3eed06fb41e423..80ad87160f6cc940204e2259605242d69fadd695 100644
|
| --- a/components/subresource_filter/content/browser/fake_safe_browsing_database_manager.cc
|
| +++ b/components/subresource_filter/content/browser/fake_safe_browsing_database_manager.cc
|
| @@ -15,8 +15,9 @@ FakeSafeBrowsingDatabaseManager::FakeSafeBrowsingDatabaseManager()
|
|
|
| void FakeSafeBrowsingDatabaseManager::AddBlacklistedUrl(
|
| const GURL& url,
|
| - safe_browsing::SBThreatType threat_type) {
|
| - url_to_threat_type_[url] = threat_type;
|
| + safe_browsing::SBThreatType threat_type,
|
| + safe_browsing::ThreatPatternType pattern_type) {
|
| + url_to_threat_type_[url] = std::make_pair(threat_type, pattern_type);
|
| }
|
|
|
| void FakeSafeBrowsingDatabaseManager::SimulateTimeout() {
|
| @@ -51,8 +52,9 @@ void FakeSafeBrowsingDatabaseManager::OnCheckUrlForSubresourceFilterComplete(
|
| // Check to see if the request was cancelled to avoid use-after-free.
|
| if (checks_.find(client) == checks_.end())
|
| return;
|
| - client->OnCheckBrowseUrlResult(url, url_to_threat_type_[url],
|
| - safe_browsing::ThreatMetadata());
|
| + safe_browsing::ThreatMetadata metadata;
|
| + metadata.threat_pattern_type = url_to_threat_type_[url].second;
|
| + client->OnCheckBrowseUrlResult(url, url_to_threat_type_[url].first, metadata);
|
| }
|
|
|
| bool FakeSafeBrowsingDatabaseManager::CheckResourceUrl(const GURL& url,
|
|
|