| Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
|
| diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
|
| index a7b5bbfe14abc14a2be97590de4e041b28fc0518..2db88afd8b7e37bafdea41a7390582d3a26f2d5c 100644
|
| --- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
|
| +++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
|
| @@ -73,7 +73,7 @@ class PhishingDOMFeatureExtractorTest : public InProcessBrowserTest {
|
|
|
| virtual ~PhishingDOMFeatureExtractorTest() {}
|
|
|
| - virtual void SetUpCommandLine(CommandLine* command_line) OVERRIDE {
|
| + virtual void SetUpCommandLine(CommandLine* command_line) override {
|
| command_line->AppendSwitch(switches::kSingleProcess);
|
| #if defined(OS_WIN)
|
| // Don't want to try to create a GPU process.
|
| @@ -81,7 +81,7 @@ class PhishingDOMFeatureExtractorTest : public InProcessBrowserTest {
|
| #endif
|
| }
|
|
|
| - virtual void SetUpOnMainThread() OVERRIDE {
|
| + virtual void SetUpOnMainThread() override {
|
| extractor_.reset(new PhishingDOMFeatureExtractor(
|
| content::RenderView::FromRoutingID(kRenderViewRoutingId), &clock_));
|
|
|
|
|