Upstream version 5.34.104.0
[platform/framework/web/crosswalk.git] / src / content / browser / child_process_security_policy_unittest.cc
index c74294f..e209669 100644 (file)
@@ -63,7 +63,7 @@ class ChildProcessSecurityPolicyTest : public testing::Test {
 
     // Claim to always handle chrome:// URLs because the CPSP's notion of
     // allowing WebUI bindings is hard-wired to this particular scheme.
-    test_browser_client_.AddScheme(chrome::kChromeUIScheme);
+    test_browser_client_.AddScheme(kChromeUIScheme);
 
     // Claim to always handle file:// URLs like the browser would.
     // net::URLRequest::IsHandledURL() no longer claims support for default
@@ -132,7 +132,7 @@ TEST_F(ChildProcessSecurityPolicyTest, IsWebSafeSchemeTest) {
   p->RegisterWebSafeScheme("registered-web-safe-scheme");
   EXPECT_TRUE(p->IsWebSafeScheme("registered-web-safe-scheme"));
 
-  EXPECT_FALSE(p->IsWebSafeScheme(chrome::kChromeUIScheme));
+  EXPECT_FALSE(p->IsWebSafeScheme(kChromeUIScheme));
 }
 
 TEST_F(ChildProcessSecurityPolicyTest, IsPseudoSchemeTest) {
@@ -147,7 +147,7 @@ TEST_F(ChildProcessSecurityPolicyTest, IsPseudoSchemeTest) {
   p->RegisterPseudoScheme("registered-pseudo-scheme");
   EXPECT_TRUE(p->IsPseudoScheme("registered-pseudo-scheme"));
 
-  EXPECT_FALSE(p->IsPseudoScheme(chrome::kChromeUIScheme));
+  EXPECT_FALSE(p->IsPseudoScheme(kChromeUIScheme));
 }
 
 TEST_F(ChildProcessSecurityPolicyTest, StandardSchemesTest) {