Index: content/browser/child_process_security_policy_unittest.cc |
diff --git a/content/browser/child_process_security_policy_unittest.cc b/content/browser/child_process_security_policy_unittest.cc |
index eaacda8742e3d7d3a42427b644de861a35402904..61d2d1aa5bb6077ea8ca006d1607e7a45888556c 100644 |
--- a/content/browser/child_process_security_policy_unittest.cc |
+++ b/content/browser/child_process_security_policy_unittest.cc |
@@ -173,14 +173,14 @@ TEST_F(ChildProcessSecurityPolicyTest, AboutTest) { |
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:crash"))); |
// These requests for chrome:// pages should be granted. |
- p->GrantRequestURL(kRendererID, GURL(chrome::kTestNewTabURL)); |
- EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL(chrome::kTestNewTabURL))); |
+ p->GrantRequestURL(kRendererID, GURL(content::kTestNewTabURL)); |
+ EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL(content::kTestNewTabURL))); |
- p->GrantRequestURL(kRendererID, GURL(chrome::kTestHistoryURL)); |
- EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL(chrome::kTestHistoryURL))); |
+ p->GrantRequestURL(kRendererID, GURL(content::kTestHistoryURL)); |
+ EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL(content::kTestHistoryURL))); |
- p->GrantRequestURL(kRendererID, GURL(chrome::kTestBookmarksURL)); |
- EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL(chrome::kTestBookmarksURL))); |
+ p->GrantRequestURL(kRendererID, GURL(content::kTestBookmarksURL)); |
+ EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL(content::kTestBookmarksURL))); |
p->Remove(kRendererID); |
} |