| Index: chrome/browser/policy/policy_browsertest.cc
|
| diff --git a/chrome/browser/policy/policy_browsertest.cc b/chrome/browser/policy/policy_browsertest.cc
|
| index bc4bc930ab5133bc9c2839738c26540fa5a3e2e8..05bac8f817d5c928408f3530b4623006a3ebf77b 100644
|
| --- a/chrome/browser/policy/policy_browsertest.cc
|
| +++ b/chrome/browser/policy/policy_browsertest.cc
|
| @@ -69,6 +69,7 @@
|
| #include "chrome/browser/ui/omnibox/omnibox_edit_model.h"
|
| #include "chrome/browser/ui/omnibox/omnibox_view.h"
|
| #include "chrome/browser/ui/tabs/tab_strip_model.h"
|
| +#include "chrome/common/chrome_content_settings_client.h"
|
| #include "chrome/common/chrome_paths.h"
|
| #include "chrome/common/chrome_switches.h"
|
| #include "chrome/common/content_settings.h"
|
| @@ -2928,7 +2929,9 @@ class MediaStreamDevicesControllerBrowserTest
|
| list->AppendString(allow_rule);
|
| request_url_allowed_via_whitelist_ = true;
|
| } else {
|
| - list->AppendString(ContentSettingsPattern::Wildcard().ToString());
|
| + content_settings::ChromeContentSettingsClient client;
|
| + list->AppendString(
|
| + ContentSettingsPattern::Wildcard().ToString(&client));
|
| // We should ignore all wildcard entries in the whitelist, so even
|
| // though we've added an entry, it should be ignored and our expectation
|
| // is that the request has not been allowed via the whitelist.
|
|
|