| Index: chrome/browser/policy/policy_browsertest.cc
|
| diff --git a/chrome/browser/policy/policy_browsertest.cc b/chrome/browser/policy/policy_browsertest.cc
|
| index bc4bc930ab5133bc9c2839738c26540fa5a3e2e8..65ab513b82d1aa62278a3d05320ca6600024a82a 100644
|
| --- a/chrome/browser/policy/policy_browsertest.cc
|
| +++ b/chrome/browser/policy/policy_browsertest.cc
|
| @@ -2928,7 +2928,8 @@ class MediaStreamDevicesControllerBrowserTest
|
| list->AppendString(allow_rule);
|
| request_url_allowed_via_whitelist_ = true;
|
| } else {
|
| - list->AppendString(ContentSettingsPattern::Wildcard().ToString());
|
| + list->AppendString(ContentSettingsPattern::Wildcard().ToString(
|
| + extensions::kExtensionScheme));
|
| // We should ignore all wildcard entries in the whitelist, so even
|
| // though we've added an entry, it should be ignored and our expectation
|
| // is that the request has not been allowed via the whitelist.
|
|
|