Index: chrome/browser/policy/policy_browsertest.cc |
diff --git a/chrome/browser/policy/policy_browsertest.cc b/chrome/browser/policy/policy_browsertest.cc |
index bc4bc930ab5133bc9c2839738c26540fa5a3e2e8..05bac8f817d5c928408f3530b4623006a3ebf77b 100644 |
--- a/chrome/browser/policy/policy_browsertest.cc |
+++ b/chrome/browser/policy/policy_browsertest.cc |
@@ -69,6 +69,7 @@ |
#include "chrome/browser/ui/omnibox/omnibox_edit_model.h" |
#include "chrome/browser/ui/omnibox/omnibox_view.h" |
#include "chrome/browser/ui/tabs/tab_strip_model.h" |
+#include "chrome/common/chrome_content_settings_client.h" |
#include "chrome/common/chrome_paths.h" |
#include "chrome/common/chrome_switches.h" |
#include "chrome/common/content_settings.h" |
@@ -2928,7 +2929,9 @@ class MediaStreamDevicesControllerBrowserTest |
list->AppendString(allow_rule); |
request_url_allowed_via_whitelist_ = true; |
} else { |
- list->AppendString(ContentSettingsPattern::Wildcard().ToString()); |
+ content_settings::ChromeContentSettingsClient client; |
+ list->AppendString( |
+ ContentSettingsPattern::Wildcard().ToString(&client)); |
// We should ignore all wildcard entries in the whitelist, so even |
// though we've added an entry, it should be ignored and our expectation |
// is that the request has not been allowed via the whitelist. |