content: Move kHttpScheme constant into content namespace.
BUG=None
TEST=None, no functional change.
[email protected]
Review URL: https://chromiumcodereview.appspot.com/23658056
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@223272 0039d316-1c4b-4281-b951-d872f2087c98
diff --git a/chrome/browser/autocomplete/autocomplete_input.cc b/chrome/browser/autocomplete/autocomplete_input.cc
index c1fdf54..0ddfa5c 100644
--- a/chrome/browser/autocomplete/autocomplete_input.cc
+++ b/chrome/browser/autocomplete/autocomplete_input.cc
@@ -172,7 +172,7 @@
// (e.g. "ftp" or "view-source") but I'll wait to spend the effort on that
// until I run into some cases that really need it.
if (parts->scheme.is_nonempty() &&
- !LowerCaseEqualsASCII(parsed_scheme, chrome::kHttpScheme) &&
+ !LowerCaseEqualsASCII(parsed_scheme, content::kHttpScheme) &&
!LowerCaseEqualsASCII(parsed_scheme, content::kHttpsScheme)) {
// See if we know how to handle the URL internally.
if (ProfileIOData::IsHandledProtocol(UTF16ToASCII(parsed_scheme)))
@@ -208,7 +208,7 @@
// We don't know about this scheme. It might be that the user typed a
// URL of the form "username:[email protected]".
const string16 http_scheme_prefix =
- ASCIIToUTF16(std::string(chrome::kHttpScheme) +
+ ASCIIToUTF16(std::string(content::kHttpScheme) +
content::kStandardSchemeSeparator);
url_parse::Parsed http_parts;
string16 http_scheme;
@@ -216,7 +216,7 @@
Type http_type = Parse(http_scheme_prefix + text, desired_tld,
&http_parts, &http_scheme,
&http_canonicalized_url);
- DCHECK_EQ(std::string(chrome::kHttpScheme), UTF16ToUTF8(http_scheme));
+ DCHECK_EQ(std::string(content::kHttpScheme), UTF16ToUTF8(http_scheme));
if (http_type == URL &&
http_parts.username.is_nonempty() &&
diff --git a/chrome/browser/autocomplete/autocomplete_match.cc b/chrome/browser/autocomplete/autocomplete_match.cc
index ae89aa0f..3346d35 100644
--- a/chrome/browser/autocomplete/autocomplete_match.cc
+++ b/chrome/browser/autocomplete/autocomplete_match.cc
@@ -378,8 +378,8 @@
// Replace https protocol with http protocol.
if (stripped_destination_url.SchemeIs(content::kHttpsScheme)) {
replacements.SetScheme(
- chrome::kHttpScheme,
- url_parse::Component(0, strlen(chrome::kHttpScheme)));
+ content::kHttpScheme,
+ url_parse::Component(0, strlen(content::kHttpScheme)));
needs_replacement = true;
}
diff --git a/chrome/browser/autocomplete/autocomplete_provider.cc b/chrome/browser/autocomplete/autocomplete_provider.cc
index 873bbac..15af9ab 100644
--- a/chrome/browser/autocomplete/autocomplete_provider.cc
+++ b/chrome/browser/autocomplete/autocomplete_provider.cc
@@ -129,7 +129,7 @@
if (url_util::FindAndCompareScheme(utf8_input, content::kViewSourceScheme,
&scheme))
utf8_input.erase(0, scheme.end() + 1);
- return url_util::FindAndCompareScheme(utf8_input, chrome::kHttpScheme, NULL);
+ return url_util::FindAndCompareScheme(utf8_input, content::kHttpScheme, NULL);
}
void AutocompleteProvider::UpdateStarredStateOfMatches() {
diff --git a/chrome/browser/autocomplete/history_provider.cc b/chrome/browser/autocomplete/history_provider.cc
index 90e25fa..32776b90 100644
--- a/chrome/browser/autocomplete/history_provider.cc
+++ b/chrome/browser/autocomplete/history_provider.cc
@@ -138,11 +138,11 @@
if (!HasHTTPScheme(*url))
return 0;
size_t scheme_pos =
- url->find(ASCIIToUTF16(chrome::kHttpScheme) + char16(':'));
+ url->find(ASCIIToUTF16(content::kHttpScheme) + char16(':'));
DCHECK_NE(string16::npos, scheme_pos);
// Erase scheme plus up to two slashes.
- size_t prefix_end = scheme_pos + strlen(chrome::kHttpScheme) + 1;
+ size_t prefix_end = scheme_pos + strlen(content::kHttpScheme) + 1;
const size_t after_slashes = std::min(url->length(), prefix_end + 2);
while ((prefix_end < after_slashes) && ((*url)[prefix_end] == '/'))
++prefix_end;
diff --git a/chrome/browser/autocomplete/history_url_provider.cc b/chrome/browser/autocomplete/history_url_provider.cc
index cf996fb7..a29f827 100644
--- a/chrome/browser/autocomplete/history_url_provider.cc
+++ b/chrome/browser/autocomplete/history_url_provider.cc
@@ -795,7 +795,7 @@
// input's text and parts between Parse() and here, it seems better to be
// paranoid and check.
if ((input.type() != AutocompleteInput::UNKNOWN) ||
- !LowerCaseEqualsASCII(input.scheme(), chrome::kHttpScheme) ||
+ !LowerCaseEqualsASCII(input.scheme(), content::kHttpScheme) ||
!input.parts().host.is_nonempty())
return false;
const std::string host(UTF16ToUTF8(
diff --git a/chrome/browser/autocomplete/search_provider.cc b/chrome/browser/autocomplete/search_provider.cc
index 5b366b6..e222ad0 100644
--- a/chrome/browser/autocomplete/search_provider.cc
+++ b/chrome/browser/autocomplete/search_provider.cc
@@ -745,7 +745,7 @@
// and happens to currently be invalid -- in which case we again want to run
// our checks below. Other QUERY cases are less likely to be URLs and thus we
// assume we're OK.
- if (!LowerCaseEqualsASCII(input_.scheme(), chrome::kHttpScheme) &&
+ if (!LowerCaseEqualsASCII(input_.scheme(), content::kHttpScheme) &&
!LowerCaseEqualsASCII(input_.scheme(), content::kHttpsScheme) &&
!LowerCaseEqualsASCII(input_.scheme(), chrome::kFtpScheme))
return (input_.type() == AutocompleteInput::QUERY);
diff --git a/chrome/browser/autocomplete/zero_suggest_provider.cc b/chrome/browser/autocomplete/zero_suggest_provider.cc
index 6680bb98..ead3844 100644
--- a/chrome/browser/autocomplete/zero_suggest_provider.cc
+++ b/chrome/browser/autocomplete/zero_suggest_provider.cc
@@ -222,7 +222,7 @@
// Only allow HTTP URLs or Google HTTPS URLs (including Google search
// result pages). For the latter case, Google was already sent the HTTPS
// URLs when requesting the page, so the information is just re-sent.
- return (url.scheme() == chrome::kHttpScheme) ||
+ return (url.scheme() == content::kHttpScheme) ||
google_util::IsGoogleDomainUrl(url, google_util::ALLOW_SUBDOMAIN,
google_util::ALLOW_NON_STANDARD_PORTS);
}
diff --git a/chrome/browser/browsing_data/browsing_data_helper_unittest.cc b/chrome/browser/browsing_data/browsing_data_helper_unittest.cc
index 26f04ae..0d49593 100644
--- a/chrome/browser/browsing_data/browsing_data_helper_unittest.cc
+++ b/chrome/browser/browsing_data/browsing_data_helper_unittest.cc
@@ -58,7 +58,7 @@
};
TEST_F(BrowsingDataHelperTest, WebSafeSchemesAreWebSafe) {
- EXPECT_TRUE(IsWebScheme(chrome::kHttpScheme));
+ EXPECT_TRUE(IsWebScheme(content::kHttpScheme));
EXPECT_TRUE(IsWebScheme(content::kHttpsScheme));
EXPECT_TRUE(IsWebScheme(chrome::kFtpScheme));
EXPECT_TRUE(IsWebScheme(chrome::kDataScheme));
@@ -82,7 +82,7 @@
}
TEST_F(BrowsingDataHelperTest, WebSafeSchemesAreNotExtensions) {
- EXPECT_FALSE(IsExtensionScheme(chrome::kHttpScheme));
+ EXPECT_FALSE(IsExtensionScheme(content::kHttpScheme));
EXPECT_FALSE(IsExtensionScheme(content::kHttpsScheme));
EXPECT_FALSE(IsExtensionScheme(chrome::kFtpScheme));
EXPECT_FALSE(IsExtensionScheme(chrome::kDataScheme));
diff --git a/chrome/browser/browsing_data/cookies_tree_model.cc b/chrome/browser/browsing_data/cookies_tree_model.cc
index f894e75f..756956c 100644
--- a/chrome/browser/browsing_data/cookies_tree_model.cc
+++ b/chrome/browser/browsing_data/cookies_tree_model.cc
@@ -1082,7 +1082,7 @@
domain = domain.substr(1);
// We treat secure cookies just the same as normal ones.
- source_string = std::string(chrome::kHttpScheme) +
+ source_string = std::string(content::kHttpScheme) +
content::kStandardSchemeSeparator + domain + "/";
}
diff --git a/chrome/browser/content_settings/local_shared_objects_container.cc b/chrome/browser/content_settings/local_shared_objects_container.cc
index d4a996d..da98b1b 100644
--- a/chrome/browser/content_settings/local_shared_objects_container.cc
+++ b/chrome/browser/content_settings/local_shared_objects_container.cc
@@ -98,7 +98,7 @@
// The |domain_url| is only created in order to use the
// SamePublicDomainOrHost method below. It does not matter which scheme is
// used as the scheme is ignored by the SamePublicDomainOrHost method.
- GURL domain_url(std::string(chrome::kHttpScheme) +
+ GURL domain_url(std::string(content::kHttpScheme) +
content::kStandardSchemeSeparator + cookie_domain);
if (SamePublicDomainOrHost(origin, domain_url))
++count;
diff --git a/chrome/browser/extensions/api/content_settings/content_settings_helpers.cc b/chrome/browser/extensions/api/content_settings/content_settings_helpers.cc
index 133e330..29af76e 100644
--- a/chrome/browser/extensions/api/content_settings/content_settings_helpers.cc
+++ b/chrome/browser/extensions/api/content_settings/content_settings_helpers.cc
@@ -43,7 +43,7 @@
// TODO(bauerb): Move this someplace where it can be reused.
std::string GetDefaultPort(const std::string& scheme) {
- if (scheme == chrome::kHttpScheme)
+ if (scheme == content::kHttpScheme)
return "80";
if (scheme == content::kHttpsScheme)
return "443";
diff --git a/chrome/browser/extensions/api/cookies/cookies_helpers.cc b/chrome/browser/extensions/api/cookies/cookies_helpers.cc
index 2d3e67ed..8ac5990 100644
--- a/chrome/browser/extensions/api/cookies/cookies_helpers.cc
+++ b/chrome/browser/extensions/api/cookies/cookies_helpers.cc
@@ -119,7 +119,7 @@
GURL GetURLFromCanonicalCookie(const net::CanonicalCookie& cookie) {
const std::string& domain_key = cookie.Domain();
const std::string scheme =
- cookie.IsSecure() ? content::kHttpsScheme : chrome::kHttpScheme;
+ cookie.IsSecure() ? content::kHttpsScheme : content::kHttpScheme;
const std::string host =
domain_key.find('.') != 0 ? domain_key : domain_key.substr(1);
return GURL(scheme + content::kStandardSchemeSeparator + host + "/");
diff --git a/chrome/browser/extensions/api/web_navigation/frame_navigation_state.cc b/chrome/browser/extensions/api/web_navigation/frame_navigation_state.cc
index 8df798b..aca20fb 100644
--- a/chrome/browser/extensions/api/web_navigation/frame_navigation_state.cc
+++ b/chrome/browser/extensions/api/web_navigation/frame_navigation_state.cc
@@ -15,7 +15,7 @@
// URL schemes for which we'll send events.
const char* kValidSchemes[] = {
chrome::kChromeUIScheme,
- chrome::kHttpScheme,
+ content::kHttpScheme,
content::kHttpsScheme,
chrome::kFileScheme,
chrome::kFtpScheme,
diff --git a/chrome/browser/extensions/api/web_request/web_request_permissions.cc b/chrome/browser/extensions/api/web_request/web_request_permissions.cc
index 4bad267..d483ce5 100644
--- a/chrome/browser/extensions/api/web_request/web_request_permissions.cc
+++ b/chrome/browser/extensions/api/web_request/web_request_permissions.cc
@@ -70,7 +70,7 @@
url.SchemeIs(chrome::kFileScheme) ||
url.SchemeIs(chrome::kFileSystemScheme) ||
url.SchemeIs(chrome::kFtpScheme) ||
- url.SchemeIs(chrome::kHttpScheme) ||
+ url.SchemeIs(content::kHttpScheme) ||
url.SchemeIs(content::kHttpsScheme) ||
url.SchemeIs(extensions::kExtensionScheme));
}
diff --git a/chrome/browser/history/history_backend.cc b/chrome/browser/history/history_backend.cc
index 21ca31dc..3913d1d 100644
--- a/chrome/browser/history/history_backend.cc
+++ b/chrome/browser/history/history_backend.cc
@@ -412,7 +412,7 @@
!is_keyword_generated) {
const GURL& origin_url(has_redirects ?
request.redirects[0] : request.url);
- if (origin_url.SchemeIs(chrome::kHttpScheme) ||
+ if (origin_url.SchemeIs(content::kHttpScheme) ||
origin_url.SchemeIs(content::kHttpsScheme) ||
origin_url.SchemeIs(chrome::kFtpScheme)) {
std::string host(origin_url.host());
diff --git a/chrome/browser/history/in_memory_url_index.cc b/chrome/browser/history/in_memory_url_index.cc
index d9b17e24..f859da4 100644
--- a/chrome/browser/history/in_memory_url_index.cc
+++ b/chrome/browser/history/in_memory_url_index.cc
@@ -43,7 +43,7 @@
whitelist->insert(std::string(chrome::kChromeUIScheme));
whitelist->insert(std::string(chrome::kFileScheme));
whitelist->insert(std::string(chrome::kFtpScheme));
- whitelist->insert(std::string(chrome::kHttpScheme));
+ whitelist->insert(std::string(content::kHttpScheme));
whitelist->insert(std::string(content::kHttpsScheme));
whitelist->insert(std::string(content::kMailToScheme));
}
diff --git a/chrome/browser/history/url_database.cc b/chrome/browser/history/url_database.cc
index e484dd2..1af9f40 100644
--- a/chrome/browser/history/url_database.cc
+++ b/chrome/browser/history/url_database.cc
@@ -312,7 +312,7 @@
bool URLDatabase::IsTypedHost(const std::string& host) {
const char* schemes[] = {
- chrome::kHttpScheme,
+ content::kHttpScheme,
content::kHttpsScheme,
chrome::kFtpScheme
};
diff --git a/chrome/browser/history/visit_database.cc b/chrome/browser/history/visit_database.cc
index f758a36a..d513efb6 100644
--- a/chrome/browser/history/visit_database.cc
+++ b/chrome/browser/history/visit_database.cc
@@ -491,7 +491,7 @@
bool VisitDatabase::GetVisibleVisitCountToHost(const GURL& url,
int* count,
base::Time* first_visit) {
- if (!url.SchemeIs(chrome::kHttpScheme) &&
+ if (!url.SchemeIs(content::kHttpScheme) &&
!url.SchemeIs(content::kHttpsScheme))
return false;
diff --git a/chrome/browser/predictors/resource_prefetch_predictor.cc b/chrome/browser/predictors/resource_prefetch_predictor.cc
index d0f3865..ea5bd89 100644
--- a/chrome/browser/predictors/resource_prefetch_predictor.cc
+++ b/chrome/browser/predictors/resource_prefetch_predictor.cc
@@ -178,17 +178,17 @@
// static
bool ResourcePrefetchPredictor::IsHandledMainPage(net::URLRequest* request) {
- return request->original_url().scheme() == chrome::kHttpScheme;
+ return request->original_url().scheme() == content::kHttpScheme;
}
// static
bool ResourcePrefetchPredictor::IsHandledSubresource(
net::URLRequest* response) {
int resource_status = 0;
- if (response->first_party_for_cookies().scheme() != chrome::kHttpScheme)
+ if (response->first_party_for_cookies().scheme() != content::kHttpScheme)
resource_status |= RESOURCE_STATUS_NOT_HTTP_PAGE;
- if (response->original_url().scheme() != chrome::kHttpScheme)
+ if (response->original_url().scheme() != content::kHttpScheme)
resource_status |= RESOURCE_STATUS_NOT_HTTP_RESOURCE;
std::string mime_type;
diff --git a/chrome/browser/prerender/prerender_contents.cc b/chrome/browser/prerender/prerender_contents.cc
index e9f38fe17..61570b6 100644
--- a/chrome/browser/prerender/prerender_contents.cc
+++ b/chrome/browser/prerender/prerender_contents.cc
@@ -504,7 +504,7 @@
}
bool PrerenderContents::AddAliasURL(const GURL& url) {
- const bool http = url.SchemeIs(chrome::kHttpScheme);
+ const bool http = url.SchemeIs(content::kHttpScheme);
const bool https = url.SchemeIs(content::kHttpsScheme);
if (!http && !https) {
DCHECK_NE(MATCH_COMPLETE_REPLACEMENT_PENDING, match_complete_status_);
diff --git a/chrome/browser/renderer_host/chrome_render_view_host_observer.cc b/chrome/browser/renderer_host/chrome_render_view_host_observer.cc
index e410cbb..2a6f67a 100644
--- a/chrome/browser/renderer_host/chrome_render_view_host_observer.cc
+++ b/chrome/browser/renderer_host/chrome_render_view_host_observer.cc
@@ -81,7 +81,8 @@
if (!predictor_)
return;
if (!CommandLine::ForCurrentProcess()->HasSwitch(switches::kChromeFrame) &&
- (url.SchemeIs(chrome::kHttpScheme) || url.SchemeIs(content::kHttpsScheme)))
+ (url.SchemeIs(content::kHttpScheme) ||
+ url.SchemeIs(content::kHttpsScheme)))
predictor_->PreconnectUrlAndSubresources(url, GURL());
}
diff --git a/chrome/browser/renderer_host/offline_resource_throttle.cc b/chrome/browser/renderer_host/offline_resource_throttle.cc
index 399d15db..28f9259 100644
--- a/chrome/browser/renderer_host/offline_resource_throttle.cc
+++ b/chrome/browser/renderer_host/offline_resource_throttle.cc
@@ -115,7 +115,7 @@
bool OfflineResourceThrottle::IsRemote(const GURL& url) const {
return !net::IsLocalhost(url.host()) && (url.SchemeIs(chrome::kFtpScheme) ||
- url.SchemeIs(chrome::kHttpScheme) ||
+ url.SchemeIs(content::kHttpScheme) ||
url.SchemeIs(content::kHttpsScheme));
}
diff --git a/chrome/browser/safe_browsing/database_manager.cc b/chrome/browser/safe_browsing/database_manager.cc
index b0d8ca98..fa4c2963 100644
--- a/chrome/browser/safe_browsing/database_manager.cc
+++ b/chrome/browser/safe_browsing/database_manager.cc
@@ -202,7 +202,7 @@
bool SafeBrowsingDatabaseManager::CanCheckUrl(const GURL& url) const {
return url.SchemeIs(chrome::kFtpScheme) ||
- url.SchemeIs(chrome::kHttpScheme) ||
+ url.SchemeIs(content::kHttpScheme) ||
url.SchemeIs(content::kHttpsScheme);
}
diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
index 51e75363..241675e 100644
--- a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
+++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
@@ -242,7 +242,7 @@
bool SafeBrowsingBlockingPage::CanShowMalwareDetailsOption() {
return (!web_contents_->GetBrowserContext()->IsOffTheRecord() &&
- web_contents_->GetURL().SchemeIs(chrome::kHttpScheme));
+ web_contents_->GetURL().SchemeIs(content::kHttpScheme));
}
SafeBrowsingBlockingPage::~SafeBrowsingBlockingPage() {
diff --git a/chrome/browser/safe_browsing/safe_browsing_test.cc b/chrome/browser/safe_browsing/safe_browsing_test.cc
index 2333936..c1fad55 100644
--- a/chrome/browser/safe_browsing/safe_browsing_test.cc
+++ b/chrome/browser/safe_browsing/safe_browsing_test.cc
@@ -91,7 +91,7 @@
<< urls[i];
return false;
}
- phishing_url.url = std::string(chrome::kHttpScheme) +
+ phishing_url.url = std::string(content::kHttpScheme) +
"://" + record_parts[0];
phishing_url.list_name = record_parts[1];
if (record_parts[2] == "yes") {
diff --git a/chrome/browser/search/search.cc b/chrome/browser/search/search.cc
index cdda21a..0ec40461 100644
--- a/chrome/browser/search/search.cc
+++ b/chrome/browser/search/search.cc
@@ -128,7 +128,7 @@
my_url.port() == other_url.port() &&
(my_url.scheme() == other_url.scheme() ||
(my_url.SchemeIs(content::kHttpsScheme) &&
- other_url.SchemeIs(chrome::kHttpScheme)));
+ other_url.SchemeIs(content::kHttpScheme)));
}
bool MatchesAnySearchURL(const GURL& url, TemplateURL* template_url) {
diff --git a/chrome/browser/search_engines/template_url_parser.cc b/chrome/browser/search_engines/template_url_parser.cc
index 9fa4c4a..69532d2 100644
--- a/chrome/browser/search_engines/template_url_parser.cc
+++ b/chrome/browser/search_engines/template_url_parser.cc
@@ -100,7 +100,7 @@
if (url.empty())
return true;
GURL gurl(url);
- return gurl.is_valid() && (gurl.SchemeIs(chrome::kHttpScheme) ||
+ return gurl.is_valid() && (gurl.SchemeIs(content::kHttpScheme) ||
gurl.SchemeIs(content::kHttpsScheme));
}
@@ -258,7 +258,7 @@
// favicon from the URL.
context->derive_image_from_url_ = true;
} else if (context->image_is_valid_for_favicon_ && image_url.is_valid() &&
- (image_url.SchemeIs(chrome::kHttpScheme) ||
+ (image_url.SchemeIs(content::kHttpScheme) ||
image_url.SchemeIs(content::kHttpsScheme))) {
context->data_.favicon_url = image_url;
}
diff --git a/chrome/browser/search_engines/template_url_service.cc b/chrome/browser/search_engines/template_url_service.cc
index a8e7dcf8..63a4808f 100644
--- a/chrome/browser/search_engines/template_url_service.cc
+++ b/chrome/browser/search_engines/template_url_service.cc
@@ -372,7 +372,7 @@
// type a web address, but rather an FTP, file:, or other scheme URL, or a
// search query with some sort of initial operator (e.g. "site:").
if (result.compare(0, scheme_component.end(),
- ASCIIToUTF16(chrome::kHttpScheme)) &&
+ ASCIIToUTF16(content::kHttpScheme)) &&
result.compare(0, scheme_component.end(),
ASCIIToUTF16(content::kHttpsScheme)))
return string16();
diff --git a/chrome/browser/ui/browser_browsertest.cc b/chrome/browser/ui/browser_browsertest.cc
index 402504c5..b283d31 100644
--- a/chrome/browser/ui/browser_browsertest.cc
+++ b/chrome/browser/ui/browser_browsertest.cc
@@ -942,7 +942,7 @@
ASSERT_TRUE(test_server()->Start());
GURL http_url(test_server()->GetURL(std::string()));
- ASSERT_TRUE(http_url.SchemeIs(chrome::kHttpScheme));
+ ASSERT_TRUE(http_url.SchemeIs(content::kHttpScheme));
ui_test_utils::NavigateToURL(browser(), http_url);
EXPECT_TRUE(command_updater->IsCommandEnabled(IDC_CREATE_SHORTCUTS));
}
@@ -1002,7 +1002,7 @@
IN_PROC_BROWSER_TEST_F(BrowserTest, DISABLED_ConvertTabToAppShortcut) {
ASSERT_TRUE(test_server()->Start());
GURL http_url(test_server()->GetURL(std::string()));
- ASSERT_TRUE(http_url.SchemeIs(chrome::kHttpScheme));
+ ASSERT_TRUE(http_url.SchemeIs(content::kHttpScheme));
ASSERT_EQ(1, browser()->tab_strip_model()->count());
WebContents* initial_tab = browser()->tab_strip_model()->GetWebContentsAt(0);
diff --git a/chrome/browser/ui/omnibox/omnibox_edit_model.cc b/chrome/browser/ui/omnibox/omnibox_edit_model.cc
index 7743ca53..0893a93 100644
--- a/chrome/browser/ui/omnibox/omnibox_edit_model.cc
+++ b/chrome/browser/ui/omnibox/omnibox_edit_model.cc
@@ -435,10 +435,10 @@
// entire host, and the user hasn't edited the host or manually removed the
// scheme.
GURL perm_url(PermanentURL());
- if (perm_url.SchemeIs(chrome::kHttpScheme) &&
- url->SchemeIs(chrome::kHttpScheme) && perm_url.host() == url->host()) {
+ if (perm_url.SchemeIs(content::kHttpScheme) &&
+ url->SchemeIs(content::kHttpScheme) && perm_url.host() == url->host()) {
*write_url = true;
- string16 http = ASCIIToUTF16(chrome::kHttpScheme) +
+ string16 http = ASCIIToUTF16(content::kHttpScheme) +
ASCIIToUTF16(content::kStandardSchemeSeparator);
if (text->compare(0, http.length(), http) != 0)
*text = http + *text;
diff --git a/chrome/browser/ui/search_engines/search_engine_tab_helper.cc b/chrome/browser/ui/search_engines/search_engine_tab_helper.cc
index d414510..dada154 100644
--- a/chrome/browser/ui/search_engines/search_engine_tab_helper.cc
+++ b/chrome/browser/ui/search_engines/search_engine_tab_helper.cc
@@ -54,7 +54,7 @@
// If we relax the path constraint, we need to be sure to sanitize the path
// elements and update AutocompletePopup to look for keywords using the path.
// See http://b/issue?id=863583.
- if (!url.SchemeIs(chrome::kHttpScheme) || (url.path().length() > 1))
+ if (!url.SchemeIs(content::kHttpScheme) || (url.path().length() > 1))
return string16();
return TemplateURLService::GenerateKeyword(url);
diff --git a/chrome/browser/web_applications/web_app.cc b/chrome/browser/web_applications/web_app.cc
index 103090d..072bbf0 100644
--- a/chrome/browser/web_applications/web_app.cc
+++ b/chrome/browser/web_applications/web_app.cc
@@ -198,7 +198,7 @@
chrome::kFileScheme,
chrome::kFileSystemScheme,
chrome::kFtpScheme,
- chrome::kHttpScheme,
+ content::kHttpScheme,
content::kHttpsScheme,
extensions::kExtensionScheme,
};