Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
index fa7781220781011ad395d60ca84bf78cc5d1a101..b55232f5c471c3e4eca9221b84e38d46230d832d 100644 |
--- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
+++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
@@ -71,9 +71,9 @@ class PhishingDOMFeatureExtractorTest : public InProcessBrowserTest { |
protected: |
PhishingDOMFeatureExtractorTest() : weak_factory_(this) {} |
- virtual ~PhishingDOMFeatureExtractorTest() {} |
+ ~PhishingDOMFeatureExtractorTest() override {} |
- virtual void SetUpCommandLine(CommandLine* command_line) override { |
+ void SetUpCommandLine(CommandLine* command_line) override { |
command_line->AppendSwitch(switches::kSingleProcess); |
#if defined(OS_WIN) |
// Don't want to try to create a GPU process. |
@@ -81,7 +81,7 @@ class PhishingDOMFeatureExtractorTest : public InProcessBrowserTest { |
#endif |
} |
- virtual void SetUpOnMainThread() override { |
+ void SetUpOnMainThread() override { |
extractor_.reset(new PhishingDOMFeatureExtractor( |
content::RenderView::FromRoutingID(kRenderViewRoutingId), &clock_)); |