| Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
|
| diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
|
| index fa7781220781011ad395d60ca84bf78cc5d1a101..b55232f5c471c3e4eca9221b84e38d46230d832d 100644
|
| --- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
|
| +++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
|
| @@ -71,9 +71,9 @@ class PhishingDOMFeatureExtractorTest : public InProcessBrowserTest {
|
| protected:
|
| PhishingDOMFeatureExtractorTest() : weak_factory_(this) {}
|
|
|
| - virtual ~PhishingDOMFeatureExtractorTest() {}
|
| + ~PhishingDOMFeatureExtractorTest() override {}
|
|
|
| - virtual void SetUpCommandLine(CommandLine* command_line) override {
|
| + void SetUpCommandLine(CommandLine* command_line) override {
|
| command_line->AppendSwitch(switches::kSingleProcess);
|
| #if defined(OS_WIN)
|
| // Don't want to try to create a GPU process.
|
| @@ -81,7 +81,7 @@ class PhishingDOMFeatureExtractorTest : public InProcessBrowserTest {
|
| #endif
|
| }
|
|
|
| - virtual void SetUpOnMainThread() override {
|
| + void SetUpOnMainThread() override {
|
| extractor_.reset(new PhishingDOMFeatureExtractor(
|
| content::RenderView::FromRoutingID(kRenderViewRoutingId), &clock_));
|
|
|
|
|