Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
index 2db88afd8b7e37bafdea41a7390582d3a26f2d5c..129b6f208e739c953a2214f79e99902ef302ecac 100644 |
--- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
+++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
@@ -29,6 +29,7 @@ |
#include "content/public/browser/web_contents.h" |
#include "content/public/renderer/render_view.h" |
#include "content/public/test/browser_test_utils.h" |
+#include "content/public/test/routing_id_mangling_disabler.h" |
#include "content/public/test/test_utils.h" |
#include "net/dns/mock_host_resolver.h" |
#include "net/test/embedded_test_server/embedded_test_server.h" |
@@ -179,6 +180,7 @@ class PhishingDOMFeatureExtractorTest : public InProcessBrowserTest { |
// Any urls not in this map are served a 404 error. |
std::map<std::string, std::string> responses_; |
+ content::RoutingIDManglingDisabler mangling_disabler_; |
scoped_ptr<net::test_server::EmbeddedTestServer> embedded_test_server_; |
MockFeatureExtractorClock clock_; |
scoped_ptr<PhishingDOMFeatureExtractor> extractor_; |