Index: chrome/browser/policy/policy_browsertest.cc |
diff --git a/chrome/browser/policy/policy_browsertest.cc b/chrome/browser/policy/policy_browsertest.cc |
index bc4bc930ab5133bc9c2839738c26540fa5a3e2e8..65ab513b82d1aa62278a3d05320ca6600024a82a 100644 |
--- a/chrome/browser/policy/policy_browsertest.cc |
+++ b/chrome/browser/policy/policy_browsertest.cc |
@@ -2928,7 +2928,8 @@ class MediaStreamDevicesControllerBrowserTest |
list->AppendString(allow_rule); |
request_url_allowed_via_whitelist_ = true; |
} else { |
- list->AppendString(ContentSettingsPattern::Wildcard().ToString()); |
+ list->AppendString(ContentSettingsPattern::Wildcard().ToString( |
+ extensions::kExtensionScheme)); |
// We should ignore all wildcard entries in the whitelist, so even |
// though we've added an entry, it should be ignored and our expectation |
// is that the request has not been allowed via the whitelist. |