summaryrefslogtreecommitdiffstats
path: root/chrome/browser
diff options
context:
space:
mode:
authorthestig <thestig@chromium.org>2014-10-31 13:30:19 -0700
committerCommit bot <commit-bot@chromium.org>2014-10-31 20:30:47 +0000
commit4b36dd31c398092a74425a34d41c34fef49ab94d (patch)
tree87819aed346a0edfe7faa7bcf7f237a3a3dbcd4b /chrome/browser
parent19d23372e54437f91257276b60fcc3f244301be5 (diff)
downloadchromium_src-4b36dd31c398092a74425a34d41c34fef49ab94d.zip
chromium_src-4b36dd31c398092a74425a34d41c34fef49ab94d.tar.gz
chromium_src-4b36dd31c398092a74425a34d41c34fef49ab94d.tar.bz2
Cleanup: Better constify some strings in chrome/browser/{chromeos,extensions}.
Fix lint errors along the way. Review URL: https://codereview.chromium.org/635573005 Cr-Commit-Position: refs/heads/master@{#302318}
Diffstat (limited to 'chrome/browser')
-rw-r--r--chrome/browser/chromeos/drive/search_metadata_unittest.cc3
-rw-r--r--chrome/browser/chromeos/extensions/default_app_order.cc2
-rw-r--r--chrome/browser/chromeos/extensions/device_local_account_management_policy_provider.cc2
-rw-r--r--chrome/browser/chromeos/extensions/wallpaper_function_base.cc4
-rw-r--r--chrome/browser/chromeos/extensions/wallpaper_manager_browsertest.cc2
-rw-r--r--chrome/browser/chromeos/extensions/wallpaper_private_api_unittest.cc7
-rw-r--r--chrome/browser/chromeos/file_manager/file_tasks.cc2
-rw-r--r--chrome/browser/chromeos/input_method/input_method_engine.cc9
-rw-r--r--chrome/browser/chromeos/login/chrome_restart_request.cc2
-rw-r--r--chrome/browser/chromeos/login/oobe_localization_browsertest.cc6
-rw-r--r--chrome/browser/chromeos/login/ui/proxy_settings_dialog.cc2
-rw-r--r--chrome/browser/chromeos/login/ui/user_adding_screen_browsertest.cc6
-rw-r--r--chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc7
-rw-r--r--chrome/browser/chromeos/login/version_info_updater.cc2
-rw-r--r--chrome/browser/chromeos/memory/oom_priority_manager.cc2
-rw-r--r--chrome/browser/chromeos/net/network_portal_detector_impl_browsertest.cc6
-rw-r--r--chrome/browser/chromeos/net/network_portal_detector_impl_unittest.cc8
-rw-r--r--chrome/browser/chromeos/net/network_portal_notification_controller_unittest.cc2
-rw-r--r--chrome/browser/chromeos/offline/offline_load_page_unittest.cc4
-rw-r--r--chrome/browser/chromeos/policy/consumer_management_service.cc2
-rw-r--r--chrome/browser/chromeos/policy/consumer_management_service_unittest.cc4
-rw-r--r--chrome/browser/chromeos/policy/device_cloud_policy_manager_chromeos.cc2
-rw-r--r--chrome/browser/chromeos/policy/device_local_account_browsertest.cc12
-rw-r--r--chrome/browser/chromeos/policy/enterprise_install_attributes.cc2
-rw-r--r--chrome/browser/chromeos/policy/user_cloud_policy_manager_chromeos_browsertest.cc2
-rw-r--r--chrome/browser/chromeos/preferences_browsertest.cc3
-rw-r--r--chrome/browser/chromeos/proxy_config_service_impl_unittest.cc2
-rw-r--r--chrome/browser/chromeos/settings/device_settings_provider.cc4
-rw-r--r--chrome/browser/extensions/active_script_controller_browsertest.cc6
-rw-r--r--chrome/browser/extensions/activity_log/activity_actions.cc2
-rw-r--r--chrome/browser/extensions/activity_log/activity_database.cc4
-rw-r--r--chrome/browser/extensions/activity_log/activity_database.h4
-rw-r--r--chrome/browser/extensions/activity_log/activity_database_unittest.cc10
-rw-r--r--chrome/browser/extensions/activity_log/activity_log_enabled_unittest.cc4
-rw-r--r--chrome/browser/extensions/activity_log/activity_log_policy.cc5
-rw-r--r--chrome/browser/extensions/activity_log/activity_log_unittest.cc2
-rw-r--r--chrome/browser/extensions/activity_log/counting_policy.cc10
-rw-r--r--chrome/browser/extensions/activity_log/counting_policy.h4
-rw-r--r--chrome/browser/extensions/activity_log/fullstream_ui_policy.cc6
-rw-r--r--chrome/browser/extensions/activity_log/fullstream_ui_policy.h6
-rw-r--r--chrome/browser/extensions/activity_log/generate_ad_network_hashes.py2
-rw-r--r--chrome/browser/extensions/activity_log/hashed_ad_network_database.h4
-rw-r--r--chrome/browser/extensions/activity_log/hashed_ad_network_database_unittest.cc2
-rw-r--r--chrome/browser/extensions/activity_log/hashed_ad_networks.cc2
-rw-r--r--chrome/browser/extensions/activity_log/hashed_ad_networks.h2
-rw-r--r--chrome/browser/extensions/activity_log/uma_policy_browsertest.cc13
-rw-r--r--chrome/browser/extensions/api/alarms/alarms_api_unittest.cc11
-rw-r--r--chrome/browser/extensions/api/braille_display_private/braille_controller_brlapi.cc4
-rw-r--r--chrome/browser/extensions/api/content_settings/content_settings_apitest.cc4
-rw-r--r--chrome/browser/extensions/api/declarative_content/request_content_script_apitest.cc4
-rw-r--r--chrome/browser/extensions/api/declarative_webrequest/webrequest_action_unittest.cc2
-rw-r--r--chrome/browser/extensions/api/declarative_webrequest/webrequest_rules_registry_unittest.cc2
-rw-r--r--chrome/browser/extensions/api/downloads/downloads_api.cc18
-rw-r--r--chrome/browser/extensions/api/downloads/downloads_api_browsertest.cc10
-rw-r--r--chrome/browser/extensions/api/management/management_api_browsertest.cc2
-rw-r--r--chrome/browser/extensions/api/management/management_browsertest.cc8
-rw-r--r--chrome/browser/extensions/api/music_manager_private/device_id_linux.cc12
-rw-r--r--chrome/browser/extensions/api/proxy/proxy_api_constants.cc24
-rw-r--r--chrome/browser/extensions/api/proxy/proxy_api_constants.h4
-rw-r--r--chrome/browser/extensions/api/sessions/sessions_apitest.cc6
-rw-r--r--chrome/browser/extensions/api/socket/udp_socket_unittest.cc8
-rw-r--r--chrome/browser/extensions/api/system_private/system_private_api.cc2
-rw-r--r--chrome/browser/extensions/api/tab_capture/tab_capture_api.cc2
-rw-r--r--chrome/browser/extensions/api/web_navigation/frame_navigation_state.cc2
-rw-r--r--chrome/browser/extensions/api/web_request/web_request_api_unittest.cc2
-rw-r--r--chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc4
-rw-r--r--chrome/browser/extensions/chrome_app_sorting.cc2
-rw-r--r--chrome/browser/extensions/content_script_apitest.cc2
-rw-r--r--chrome/browser/extensions/crx_installer.cc4
-rw-r--r--chrome/browser/extensions/default_apps.cc2
-rw-r--r--chrome/browser/extensions/error_console/error_console_browsertest.cc5
-rw-r--r--chrome/browser/extensions/execute_script_apitest.cc2
-rw-r--r--chrome/browser/extensions/extension_disabled_ui_browsertest.cc2
-rw-r--r--chrome/browser/extensions/extension_keybinding_apitest.cc4
-rw-r--r--chrome/browser/extensions/extension_loading_browsertest.cc2
-rw-r--r--chrome/browser/extensions/extension_messages_apitest.cc6
-rw-r--r--chrome/browser/extensions/extension_nacl_browsertest.cc3
-rw-r--r--chrome/browser/extensions/extension_service_unittest.cc10
-rw-r--r--chrome/browser/extensions/extension_util.cc2
-rw-r--r--chrome/browser/extensions/extension_warning_badge_service_unittest.cc4
-rw-r--r--chrome/browser/extensions/external_component_loader.cc2
-rw-r--r--chrome/browser/extensions/hotword_browsertest.cc2
82 files changed, 193 insertions, 191 deletions
diff --git a/chrome/browser/chromeos/drive/search_metadata_unittest.cc b/chrome/browser/chromeos/drive/search_metadata_unittest.cc
index aeec016..0f5f54c 100644
--- a/chrome/browser/chromeos/drive/search_metadata_unittest.cc
+++ b/chrome/browser/chromeos/drive/search_metadata_unittest.cc
@@ -121,7 +121,6 @@ class SearchMetadataTest : public testing::Test {
entry.mutable_file_specific_info()->set_content_mime_type(
drive::util::kGoogleDocumentMimeType);
EXPECT_EQ(FILE_ERROR_OK, resource_metadata_->AddEntry(entry, &local_id));
-
}
ResourceEntry GetFileEntry(const std::string& name,
@@ -382,7 +381,7 @@ TEST_F(SearchMetadataTest, SearchMetadata_ExcludeDirectory) {
// "drive", "drive/root", "drive/other" should be excluded.
TEST_F(SearchMetadataTest, SearchMetadata_ExcludeSpecialDirectories) {
- const char* kQueries[] = { "drive", "root", "other" };
+ const char* const kQueries[] = { "drive", "root", "other" };
for (size_t i = 0; i < arraysize(kQueries); ++i) {
FileError error = FILE_ERROR_FAILED;
scoped_ptr<MetadataSearchResultVector> result;
diff --git a/chrome/browser/chromeos/extensions/default_app_order.cc b/chrome/browser/chromeos/extensions/default_app_order.cc
index 7055356..71c3874 100644
--- a/chrome/browser/chromeos/extensions/default_app_order.cc
+++ b/chrome/browser/chromeos/extensions/default_app_order.cc
@@ -31,7 +31,7 @@ const char kDefaultAttr[] = "default";
const char kNameAttr[] = "name";
const char kImportDefaultOrderAttr[] = "import_default_order";
-const char* kDefaultAppOrder[] = {
+const char* const kDefaultAppOrder[] = {
extension_misc::kChromeAppId,
extensions::kWebStoreAppId,
extension_misc::kGoogleSearchAppId,
diff --git a/chrome/browser/chromeos/extensions/device_local_account_management_policy_provider.cc b/chrome/browser/chromeos/extensions/device_local_account_management_policy_provider.cc
index 00bf2b9..88971cbd8 100644
--- a/chrome/browser/chromeos/extensions/device_local_account_management_policy_provider.cc
+++ b/chrome/browser/chromeos/extensions/device_local_account_management_policy_provider.cc
@@ -18,7 +18,7 @@ namespace chromeos {
namespace {
// Apps/extensions explicitly whitelisted for use in public sessions.
-const char* kPublicSessionWhitelist[] = {
+const char* const kPublicSessionWhitelist[] = {
// Public sessions in general:
"cbkkbcmdlboombapidmoeolnmdacpkch", // Chrome RDP
"djflhoibgkdhkhhcedjiklpkjnoahfmg", // User Agent Switcher
diff --git a/chrome/browser/chromeos/extensions/wallpaper_function_base.cc b/chrome/browser/chromeos/extensions/wallpaper_function_base.cc
index 1e100c90..11f4a06 100644
--- a/chrome/browser/chromeos/extensions/wallpaper_function_base.cc
+++ b/chrome/browser/chromeos/extensions/wallpaper_function_base.cc
@@ -16,7 +16,7 @@ namespace wallpaper_api_util {
namespace {
// Keeps in sync (same order) with WallpaperLayout enum in header file.
-const char* kWallpaperLayoutArrays[] = {
+const char* const kWallpaperLayoutArrays[] = {
"CENTER",
"CENTER_CROPPED",
"STRETCH",
@@ -25,7 +25,7 @@ const char* kWallpaperLayoutArrays[] = {
const int kWallpaperLayoutCount = arraysize(kWallpaperLayoutArrays);
-} // namespace
+} // namespace
const char kCancelWallpaperMessage[] = "Set wallpaper was canceled.";
diff --git a/chrome/browser/chromeos/extensions/wallpaper_manager_browsertest.cc b/chrome/browser/chromeos/extensions/wallpaper_manager_browsertest.cc
index cfbe2d8..e7c15d6 100644
--- a/chrome/browser/chromeos/extensions/wallpaper_manager_browsertest.cc
+++ b/chrome/browser/chromeos/extensions/wallpaper_manager_browsertest.cc
@@ -18,7 +18,7 @@ using extensions::Extension;
using extensions::ExtensionRegistry;
namespace {
-const char* kWallpaperManagerExtensionID = "obklkkbkpaoaejdabbfldmcfplpdgolj";
+const char kWallpaperManagerExtensionID[] = "obklkkbkpaoaejdabbfldmcfplpdgolj";
} // namespace
class WallpaperManagerBrowserTest : public extensions::PlatformAppBrowserTest {
diff --git a/chrome/browser/chromeos/extensions/wallpaper_private_api_unittest.cc b/chrome/browser/chromeos/extensions/wallpaper_private_api_unittest.cc
index 5e7a9ea..943b2f9 100644
--- a/chrome/browser/chromeos/extensions/wallpaper_private_api_unittest.cc
+++ b/chrome/browser/chromeos/extensions/wallpaper_private_api_unittest.cc
@@ -18,14 +18,11 @@
#include "ui/aura/window.h"
#include "ui/aura/window_event_dispatcher.h"
-//#include "base/compiler_specific.h"
-//#include "base/logging.h"
-//#include "chrome/browser/ui/ash/multi_user/multi_user_window_manager.h"
namespace chromeos {
namespace {
-const char* kTestAccount1 = "user1@test.com";
-const char* kTestAccount2 = "user2@test.com";
+const char kTestAccount1[] = "user1@test.com";
+const char kTestAccount2[] = "user2@test.com";
class WallpaperPrivateApiUnittest : public ash::test::AshTestBase {
public:
diff --git a/chrome/browser/chromeos/file_manager/file_tasks.cc b/chrome/browser/chromeos/file_manager/file_tasks.cc
index 5187372..8474b6e 100644
--- a/chrome/browser/chromeos/file_manager/file_tasks.cc
+++ b/chrome/browser/chromeos/file_manager/file_tasks.cc
@@ -112,7 +112,7 @@ bool IsFallbackFileHandler(const file_tasks::TaskDescriptor& task) {
task.task_type != file_tasks::TASK_TYPE_FILE_HANDLER)
return false;
- const char* kBuiltInApps[] = {
+ const char* const kBuiltInApps[] = {
kFileManagerAppId,
kVideoPlayerAppId,
kGalleryAppId,
diff --git a/chrome/browser/chromeos/input_method/input_method_engine.cc b/chrome/browser/chromeos/input_method/input_method_engine.cc
index 6a1dfed..ee15c7c 100644
--- a/chrome/browser/chromeos/input_method/input_method_engine.cc
+++ b/chrome/browser/chromeos/input_method/input_method_engine.cc
@@ -39,12 +39,13 @@
#endif
namespace chromeos {
-const char* kErrorNotActive = "IME is not active";
-const char* kErrorWrongContext = "Context is not active";
-const char* kCandidateNotFound = "Candidate not found";
namespace {
+const char kErrorNotActive[] = "IME is not active";
+const char kErrorWrongContext[] = "Context is not active";
+const char kCandidateNotFound[] = "Candidate not found";
+
// Notifies InputContextHandler that the composition is changed.
void UpdateComposition(const CompositionText& composition_text,
uint32 cursor_pos,
@@ -620,7 +621,7 @@ void InputMethodEngine::ProcessKeyEvent(
const ui::KeyEvent& key_event,
const KeyEventDoneCallback& callback) {
- KeyEventDoneCallback *handler = new KeyEventDoneCallback();
+ KeyEventDoneCallback* handler = new KeyEventDoneCallback();
*handler = callback;
KeyboardEvent ext_event;
diff --git a/chrome/browser/chromeos/login/chrome_restart_request.cc b/chrome/browser/chromeos/login/chrome_restart_request.cc
index 9b4ef5b..5368282 100644
--- a/chrome/browser/chromeos/login/chrome_restart_request.cc
+++ b/chrome/browser/chromeos/login/chrome_restart_request.cc
@@ -72,7 +72,7 @@ std::string DeriveCommandLine(const GURL& start_url,
CommandLine* command_line) {
DCHECK_NE(&base_command_line, command_line);
- static const char* kForwardSwitches[] = {
+ static const char* const kForwardSwitches[] = {
::switches::kDisableAccelerated2dCanvas,
::switches::kDisableAcceleratedVideoDecode,
::switches::kDisableDelegatedRenderer,
diff --git a/chrome/browser/chromeos/login/oobe_localization_browsertest.cc b/chrome/browser/chromeos/login/oobe_localization_browsertest.cc
index 69c60b6..9ba1947 100644
--- a/chrome/browser/chromeos/login/oobe_localization_browsertest.cc
+++ b/chrome/browser/chromeos/login/oobe_localization_browsertest.cc
@@ -35,10 +35,10 @@ namespace chromeos {
namespace {
// OOBE constants.
-const char* kLocaleSelect = "language-select";
-const char* kKeyboardSelect = "keyboard-select";
+const char kLocaleSelect[] = "language-select";
+const char kKeyboardSelect[] = "keyboard-select";
-const char* kUSLayout = "xkb:us::eng";
+const char kUSLayout[] = "xkb:us::eng";
}
diff --git a/chrome/browser/chromeos/login/ui/proxy_settings_dialog.cc b/chrome/browser/chromeos/login/ui/proxy_settings_dialog.cc
index ee1ce29..b819f7e 100644
--- a/chrome/browser/chromeos/login/ui/proxy_settings_dialog.cc
+++ b/chrome/browser/chromeos/login/ui/proxy_settings_dialog.cc
@@ -29,7 +29,7 @@ const int kProxySettingsDialogReasonableHeight = 525;
const float kProxySettingsDialogReasonableWidthRatio = 0.4f;
const float kProxySettingsDialogReasonableHeightRatio = 0.4f;
-const char* kProxySettingsURLParam = "?network=%s";
+const char kProxySettingsURLParam[] = "?network=%s";
int CalculateSize(int screen_size, int min_comfortable, float desired_ratio) {
int desired_size = static_cast<int>(desired_ratio * screen_size);
diff --git a/chrome/browser/chromeos/login/ui/user_adding_screen_browsertest.cc b/chrome/browser/chromeos/login/ui/user_adding_screen_browsertest.cc
index 002f353..d21d17f 100644
--- a/chrome/browser/chromeos/login/ui/user_adding_screen_browsertest.cc
+++ b/chrome/browser/chromeos/login/ui/user_adding_screen_browsertest.cc
@@ -25,9 +25,9 @@ using namespace testing;
namespace {
-const char* kTestUsers[] = {"test-user1@gmail.com",
- "test-user2@gmail.com",
- "test-user3@gmail.com"};
+const char* const kTestUsers[] = {"test-user1@gmail.com",
+ "test-user2@gmail.com",
+ "test-user3@gmail.com"};
} // anonymous namespace
diff --git a/chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc b/chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc
index 2751912..64f4c6c 100644
--- a/chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc
+++ b/chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc
@@ -30,7 +30,7 @@ namespace chromeos {
namespace {
-const char* kUsers[] = {"a@gmail.com", "b@gmail.com" };
+const char* const kUsers[] = {"a@gmail.com", "b@gmail.com" };
struct BehaviorTestCase {
const char* primary;
@@ -212,12 +212,13 @@ class MultiProfileUserControllerTest
int user_not_allowed_count_;
+ private:
DISALLOW_COPY_AND_ASSIGN(MultiProfileUserControllerTest);
};
// Tests that everyone is allowed before a session starts.
TEST_F(MultiProfileUserControllerTest, AllAllowedBeforeLogin) {
- const char* kTestCases[] = {
+ const char* const kTestCases[] = {
MultiProfileUserController::kBehaviorUnrestricted,
MultiProfileUserController::kBehaviorPrimaryOnly,
MultiProfileUserController::kBehaviorNotAllowed,
@@ -246,7 +247,7 @@ TEST_F(MultiProfileUserControllerTest, InvalidCacheBecomesDefault) {
TEST_F(MultiProfileUserControllerTest, CachedBehaviorUpdate) {
LoginUser(0);
- const char* kTestCases[] = {
+ const char* const kTestCases[] = {
MultiProfileUserController::kBehaviorUnrestricted,
MultiProfileUserController::kBehaviorPrimaryOnly,
MultiProfileUserController::kBehaviorNotAllowed,
diff --git a/chrome/browser/chromeos/login/version_info_updater.cc b/chrome/browser/chromeos/login/version_info_updater.cc
index edd2857..5298bb2 100644
--- a/chrome/browser/chromeos/login/version_info_updater.cc
+++ b/chrome/browser/chromeos/login/version_info_updater.cc
@@ -26,7 +26,7 @@ namespace chromeos {
namespace {
-const char* kReportingFlags[] = {
+const char* const kReportingFlags[] = {
chromeos::kReportDeviceVersionInfo,
chromeos::kReportDeviceActivityTimes,
chromeos::kReportDeviceBootMode,
diff --git a/chrome/browser/chromeos/memory/oom_priority_manager.cc b/chrome/browser/chromeos/memory/oom_priority_manager.cc
index cc14278..823207f 100644
--- a/chrome/browser/chromeos/memory/oom_priority_manager.cc
+++ b/chrome/browser/chromeos/memory/oom_priority_manager.cc
@@ -272,7 +272,7 @@ void OomPriorityManager::LogMemoryAndDiscardTab() {
bool OomPriorityManager::IsReloadableUI(const GURL& url) {
// There are many chrome:// UI URLs, but only look for the ones that users
// are likely to have open. Most of the benefit is the from NTP URL.
- const char* kReloadableUrlPrefixes[] = {
+ const char* const kReloadableUrlPrefixes[] = {
chrome::kChromeUIDownloadsURL,
chrome::kChromeUIHistoryURL,
chrome::kChromeUINewTabURL,
diff --git a/chrome/browser/chromeos/net/network_portal_detector_impl_browsertest.cc b/chrome/browser/chromeos/net/network_portal_detector_impl_browsertest.cc
index e749594..b34cf1e 100644
--- a/chrome/browser/chromeos/net/network_portal_detector_impl_browsertest.cc
+++ b/chrome/browser/chromeos/net/network_portal_detector_impl_browsertest.cc
@@ -31,11 +31,11 @@ namespace chromeos {
namespace {
-const char* kNotificationId =
+const char* const kNotificationId =
NetworkPortalNotificationController::kNotificationId;
-const char* kNotificationMetric =
+const char* const kNotificationMetric =
NetworkPortalNotificationController::kNotificationMetric;
-const char* kUserActionMetric =
+const char* const kUserActionMetric =
NetworkPortalNotificationController::kUserActionMetric;
const char kTestUser[] = "test-user@gmail.com";
diff --git a/chrome/browser/chromeos/net/network_portal_detector_impl_unittest.cc b/chrome/browser/chromeos/net/network_portal_detector_impl_unittest.cc
index f692f13..235a4e6 100644
--- a/chrome/browser/chromeos/net/network_portal_detector_impl_unittest.cc
+++ b/chrome/browser/chromeos/net/network_portal_detector_impl_unittest.cc
@@ -528,7 +528,7 @@ TEST_F(NetworkPortalDetectorImplTest, PortalDetectionTimeout) {
TEST_F(NetworkPortalDetectorImplTest, PortalDetectionRetryAfter) {
ASSERT_TRUE(is_state_idle());
- const char* retry_after = "HTTP/1.1 503 OK\nRetry-After: 101\n\n";
+ const char retry_after[] = "HTTP/1.1 503 OK\nRetry-After: 101\n\n";
ASSERT_TRUE(is_state_idle());
ASSERT_EQ(0, no_response_result_count());
@@ -549,7 +549,7 @@ TEST_F(NetworkPortalDetectorImplTest, PortalDetectionRetryAfter) {
TEST_F(NetworkPortalDetectorImplTest, PortalDetectorRetryAfterIsSmall) {
ASSERT_TRUE(is_state_idle());
- const char* retry_after = "HTTP/1.1 503 OK\nRetry-After: 1\n\n";
+ const char retry_after[] = "HTTP/1.1 503 OK\nRetry-After: 1\n\n";
ASSERT_TRUE(is_state_idle());
ASSERT_EQ(0, no_response_result_count());
@@ -570,7 +570,7 @@ TEST_F(NetworkPortalDetectorImplTest, FirstAttemptFailed) {
ASSERT_TRUE(is_state_idle());
set_delay_till_next_attempt(base::TimeDelta());
- const char* retry_after = "HTTP/1.1 503 OK\nRetry-After: 0\n\n";
+ const char retry_after[] = "HTTP/1.1 503 OK\nRetry-After: 0\n\n";
ASSERT_TRUE(is_state_idle());
ASSERT_EQ(0, no_response_result_count());
@@ -601,7 +601,7 @@ TEST_F(NetworkPortalDetectorImplTest, AllAttemptsFailed) {
ASSERT_TRUE(is_state_idle());
set_delay_till_next_attempt(base::TimeDelta());
- const char* retry_after = "HTTP/1.1 503 OK\nRetry-After: 0\n\n";
+ const char retry_after[] = "HTTP/1.1 503 OK\nRetry-After: 0\n\n";
ASSERT_TRUE(is_state_idle());
ASSERT_EQ(0, no_response_result_count());
diff --git a/chrome/browser/chromeos/net/network_portal_notification_controller_unittest.cc b/chrome/browser/chromeos/net/network_portal_notification_controller_unittest.cc
index ee1064e..87ad5bd 100644
--- a/chrome/browser/chromeos/net/network_portal_notification_controller_unittest.cc
+++ b/chrome/browser/chromeos/net/network_portal_notification_controller_unittest.cc
@@ -16,7 +16,7 @@ namespace chromeos {
namespace {
-const char* kNotificationId =
+const char* const kNotificationId =
NetworkPortalNotificationController::kNotificationId;
bool HasNotification() {
diff --git a/chrome/browser/chromeos/offline/offline_load_page_unittest.cc b/chrome/browser/chromeos/offline/offline_load_page_unittest.cc
index f1e0731..545c87e 100644
--- a/chrome/browser/chromeos/offline/offline_load_page_unittest.cc
+++ b/chrome/browser/chromeos/offline/offline_load_page_unittest.cc
@@ -13,8 +13,8 @@ using content::InterstitialPage;
using content::WebContents;
using content::WebContentsTester;
-static const char* kURL1 = "http://www.google.com/";
-static const char* kURL2 = "http://www.gmail.com/";
+static const char kURL1[] = "http://www.google.com/";
+static const char kURL2[] = "http://www.gmail.com/";
namespace chromeos {
diff --git a/chrome/browser/chromeos/policy/consumer_management_service.cc b/chrome/browser/chromeos/policy/consumer_management_service.cc
index 9d0d75b..6c05ac5 100644
--- a/chrome/browser/chromeos/policy/consumer_management_service.cc
+++ b/chrome/browser/chromeos/policy/consumer_management_service.cc
@@ -23,7 +23,7 @@ namespace {
const char kAttributeOwnerId[] = "consumer_management.owner_id";
// The string of Status enum.
-const char* kStatusString[] = {
+const char* const kStatusString[] = {
"StatusUnknown",
"StatusEnrolled",
"StatusEnrolling",
diff --git a/chrome/browser/chromeos/policy/consumer_management_service_unittest.cc b/chrome/browser/chromeos/policy/consumer_management_service_unittest.cc
index 08524be..ae11f82 100644
--- a/chrome/browser/chromeos/policy/consumer_management_service_unittest.cc
+++ b/chrome/browser/chromeos/policy/consumer_management_service_unittest.cc
@@ -31,8 +31,8 @@ using testing::_;
namespace em = enterprise_management;
namespace {
-const char* kAttributeOwnerId = "consumer_management.owner_id";
-const char* kTestOwner = "test@chromium.org.test";
+const char kAttributeOwnerId[] = "consumer_management.owner_id";
+const char kTestOwner[] = "test@chromium.org.test";
}
namespace policy {
diff --git a/chrome/browser/chromeos/policy/device_cloud_policy_manager_chromeos.cc b/chrome/browser/chromeos/policy/device_cloud_policy_manager_chromeos.cc
index 4814dcd..177213f 100644
--- a/chrome/browser/chromeos/policy/device_cloud_policy_manager_chromeos.cc
+++ b/chrome/browser/chromeos/policy/device_cloud_policy_manager_chromeos.cc
@@ -55,7 +55,7 @@ const char kSharkRequisition[] = "shark";
//
// TODO(mnissler): Move serial_number back to the top once the server side uses
// the correct serial number.
-const char* kMachineInfoSerialNumberKeys[] = {
+const char* const kMachineInfoSerialNumberKeys[] = {
"Product_S/N", // Lumpy/Alex devices
"serial_number", // VPD v2+ devices
"Product_SN", // Mario
diff --git a/chrome/browser/chromeos/policy/device_local_account_browsertest.cc b/chrome/browser/chromeos/policy/device_local_account_browsertest.cc
index 5922fee..0a2cd60 100644
--- a/chrome/browser/chromeos/policy/device_local_account_browsertest.cc
+++ b/chrome/browser/chromeos/policy/device_local_account_browsertest.cc
@@ -152,7 +152,7 @@ const char kAccountId1[] = "dla1@example.com";
const char kAccountId2[] = "dla2@example.com";
const char kDisplayName1[] = "display name 1";
const char kDisplayName2[] = "display name 2";
-const char* kStartupURLs[] = {
+const char* const kStartupURLs[] = {
"chrome://policy",
"chrome://about",
};
@@ -179,19 +179,19 @@ const char kPackagedAppCRXPath[] = "extensions/platform_apps/app_window_2.crx";
const char kExternalData[] = "External data";
const char kExternalDataURL[] = "http://localhost/external_data";
-const char* kSingleRecommendedLocale[] = {
+const char* const kSingleRecommendedLocale[] = {
"el",
};
-const char* kRecommendedLocales1[] = {
+const char* const kRecommendedLocales1[] = {
"pl",
"et",
"en-US",
};
-const char* kRecommendedLocales2[] = {
+const char* const kRecommendedLocales2[] = {
"fr",
"nl",
};
-const char* kInvalidRecommendedLocale[] = {
+const char* const kInvalidRecommendedLocale[] = {
"xx",
};
const char kPublicSessionLocale[] = "de";
@@ -563,7 +563,7 @@ class DeviceLocalAccountTest : public DevicePolicyCrosBrowserTest,
kAccountId1, device_local_account_policy_.GetBlob());
}
- void SetRecommendedLocales(const char* recommended_locales[],
+ void SetRecommendedLocales(const char* const recommended_locales[],
size_t array_size) {
em::StringListPolicyProto* session_locales_proto =
device_local_account_policy_.payload().mutable_sessionlocales();
diff --git a/chrome/browser/chromeos/policy/enterprise_install_attributes.cc b/chrome/browser/chromeos/policy/enterprise_install_attributes.cc
index 8ce3492..e66d075 100644
--- a/chrome/browser/chromeos/policy/enterprise_install_attributes.cc
+++ b/chrome/browser/chromeos/policy/enterprise_install_attributes.cc
@@ -121,7 +121,7 @@ void EnterpriseInstallAttributes::ReadAttributesIfReady(
!cryptohome_util::InstallAttributesIsFirstInstall()) {
device_locked_ = true;
- static const char* kEnterpriseAttributes[] = {
+ static const char* const kEnterpriseAttributes[] = {
kAttrEnterpriseDeviceId,
kAttrEnterpriseDomain,
kAttrEnterpriseMode,
diff --git a/chrome/browser/chromeos/policy/user_cloud_policy_manager_chromeos_browsertest.cc b/chrome/browser/chromeos/policy/user_cloud_policy_manager_chromeos_browsertest.cc
index e66780a..0953f6a 100644
--- a/chrome/browser/chromeos/policy/user_cloud_policy_manager_chromeos_browsertest.cc
+++ b/chrome/browser/chromeos/policy/user_cloud_policy_manager_chromeos_browsertest.cc
@@ -37,7 +37,7 @@ namespace {
const char kAccountId[] = "dla1@example.com";
const char kAccountPassword[] = "letmein";
-const char* kStartupURLs[] = {"chrome://policy", "chrome://about"};
+const char* const kStartupURLs[] = {"chrome://policy", "chrome://about"};
const char kTestAuthCode[] = "fake-auth-code";
const char kTestGaiaUberToken[] = "fake-uber-token";
const char kTestAuthLoginAccessToken[] = "fake-access-token";
diff --git a/chrome/browser/chromeos/preferences_browsertest.cc b/chrome/browser/chromeos/preferences_browsertest.cc
index bf12c33..72d0d75 100644
--- a/chrome/browser/chromeos/preferences_browsertest.cc
+++ b/chrome/browser/chromeos/preferences_browsertest.cc
@@ -32,7 +32,8 @@ namespace chromeos {
namespace {
-const char* kTestUsers[] = {"test-user1@gmail.com", "test-user2@gmail.com"};
+const char* const kTestUsers[] = {"test-user1@gmail.com",
+ "test-user2@gmail.com"};
} // namespace
diff --git a/chrome/browser/chromeos/proxy_config_service_impl_unittest.cc b/chrome/browser/chromeos/proxy_config_service_impl_unittest.cc
index 58f52e1..ccdc84e 100644
--- a/chrome/browser/chromeos/proxy_config_service_impl_unittest.cc
+++ b/chrome/browser/chromeos/proxy_config_service_impl_unittest.cc
@@ -204,7 +204,7 @@ const struct TestParams {
},
}; // tests
-const char* kUserProfilePath = "user_profile";
+const char kUserProfilePath[] = "user_profile";
} // namespace
diff --git a/chrome/browser/chromeos/settings/device_settings_provider.cc b/chrome/browser/chromeos/settings/device_settings_provider.cc
index a6a4ae1..a3dcfe9 100644
--- a/chrome/browser/chromeos/settings/device_settings_provider.cc
+++ b/chrome/browser/chromeos/settings/device_settings_provider.cc
@@ -37,7 +37,7 @@ namespace chromeos {
namespace {
// List of settings handled by the DeviceSettingsProvider.
-const char* kKnownSettings[] = {
+const char* const kKnownSettings[] = {
kAccountsPrefAllowGuest,
kAccountsPrefAllowNewUser,
kAccountsPrefDeviceLocalAccounts,
@@ -462,7 +462,7 @@ DeviceSettingsProvider::~DeviceSettingsProvider() {
// static
bool DeviceSettingsProvider::IsDeviceSetting(const std::string& name) {
- const char** end = kKnownSettings + arraysize(kKnownSettings);
+ const char* const* end = kKnownSettings + arraysize(kKnownSettings);
return std::find(kKnownSettings, end, name) != end;
}
diff --git a/chrome/browser/extensions/active_script_controller_browsertest.cc b/chrome/browser/extensions/active_script_controller_browsertest.cc
index d282170..eea16bd 100644
--- a/chrome/browser/extensions/active_script_controller_browsertest.cc
+++ b/chrome/browser/extensions/active_script_controller_browsertest.cc
@@ -108,7 +108,7 @@ const Extension* ActiveScriptControllerBrowserTest::CreateExtension(
"content_script" : "execute_script",
host_type == ALL_HOSTS ? "all_hosts" : "explicit_hosts");
- const char* permission_scheme =
+ const char* const permission_scheme =
host_type == ALL_HOSTS ? kAllHostsScheme : kExplicitHostsScheme;
std::string permissions = base::StringPrintf(
@@ -303,7 +303,7 @@ IN_PROC_BROWSER_TEST_F(ActiveScriptControllerBrowserTest,
base::FilePath active_script_path =
test_data_dir_.AppendASCII("active_script");
- const char* kExtensionNames[] = {
+ const char* const kExtensionNames[] = {
"inject_scripts_all_hosts",
"inject_scripts_explicit_hosts",
"content_scripts_all_hosts",
@@ -415,7 +415,7 @@ class FlagOffActiveScriptControllerBrowserTest
IN_PROC_BROWSER_TEST_F(FlagOffActiveScriptControllerBrowserTest,
ScriptsExecuteWhenFlagAbsent) {
- const char* kExtensionNames[] = {
+ const char* const kExtensionNames[] = {
"content_scripts_all_hosts",
"inject_scripts_all_hosts",
};
diff --git a/chrome/browser/extensions/activity_log/activity_actions.cc b/chrome/browser/extensions/activity_log/activity_actions.cc
index c681cade..6912abd 100644
--- a/chrome/browser/extensions/activity_log/activity_actions.cc
+++ b/chrome/browser/extensions/activity_log/activity_actions.cc
@@ -38,7 +38,7 @@ namespace {
// The "Extensions.PossibleAdInjection2" metric uses different Rappor
// parameters than the original metric.
-const char* kExtensionAdInjectionRapporMetricName =
+const char kExtensionAdInjectionRapporMetricName[] =
"Extensions.PossibleAdInjection2";
const char kBlinkSetAttributeEvent[] = "blinkSetAttribute";
diff --git a/chrome/browser/extensions/activity_log/activity_database.cc b/chrome/browser/extensions/activity_log/activity_database.cc
index 09b868b..286f24e 100644
--- a/chrome/browser/extensions/activity_log/activity_database.cc
+++ b/chrome/browser/extensions/activity_log/activity_database.cc
@@ -202,8 +202,8 @@ void ActivityDatabase::SetTimerForTesting(int ms) {
// static
bool ActivityDatabase::InitializeTable(sql::Connection* db,
const char* table_name,
- const char* content_fields[],
- const char* field_types[],
+ const char* const content_fields[],
+ const char* const field_types[],
const int num_content_fields) {
if (!db->DoesTableExist(table_name)) {
std::string table_creator =
diff --git a/chrome/browser/extensions/activity_log/activity_database.h b/chrome/browser/extensions/activity_log/activity_database.h
index 8435709..e90683e 100644
--- a/chrome/browser/extensions/activity_log/activity_database.h
+++ b/chrome/browser/extensions/activity_log/activity_database.h
@@ -133,8 +133,8 @@ class ActivityDatabase {
// field_types as content_fields, since the two arrays should correspond.
static bool InitializeTable(sql::Connection* db,
const char* table_name,
- const char* content_fields[],
- const char* field_types[],
+ const char* const content_fields[],
+ const char* const field_types[],
const int num_content_fields);
// Runs the given callback, passing it a handle to the database connection.
diff --git a/chrome/browser/extensions/activity_log/activity_database_unittest.cc b/chrome/browser/extensions/activity_log/activity_database_unittest.cc
index 4bef42b..da4bc2e 100644
--- a/chrome/browser/extensions/activity_log/activity_database_unittest.cc
+++ b/chrome/browser/extensions/activity_log/activity_database_unittest.cc
@@ -44,11 +44,11 @@ namespace extensions {
// the unit tests.
class ActivityDatabaseTestPolicy : public ActivityDatabase::Delegate {
public:
- ActivityDatabaseTestPolicy() {};
+ ActivityDatabaseTestPolicy() {}
static const char kTableName[];
- static const char* kTableContentFields[];
- static const char* kTableFieldTypes[];
+ static const char* const kTableContentFields[];
+ static const char* const kTableFieldTypes[];
virtual void Record(ActivityDatabase* db, scoped_refptr<Action> action);
@@ -62,9 +62,9 @@ class ActivityDatabaseTestPolicy : public ActivityDatabase::Delegate {
};
const char ActivityDatabaseTestPolicy::kTableName[] = "actions";
-const char* ActivityDatabaseTestPolicy::kTableContentFields[] = {
+const char* const ActivityDatabaseTestPolicy::kTableContentFields[] = {
"extension_id", "time", "action_type", "api_name"};
-const char* ActivityDatabaseTestPolicy::kTableFieldTypes[] = {
+const char* const ActivityDatabaseTestPolicy::kTableFieldTypes[] = {
"LONGVARCHAR NOT NULL", "INTEGER", "INTEGER", "LONGVARCHAR"};
bool ActivityDatabaseTestPolicy::InitDatabase(sql::Connection* db) {
diff --git a/chrome/browser/extensions/activity_log/activity_log_enabled_unittest.cc b/chrome/browser/extensions/activity_log/activity_log_enabled_unittest.cc
index df24455..ebdca47 100644
--- a/chrome/browser/extensions/activity_log/activity_log_enabled_unittest.cc
+++ b/chrome/browser/extensions/activity_log/activity_log_enabled_unittest.cc
@@ -24,7 +24,7 @@
namespace extensions {
-const char* kExtensionID = "abjoigjokfeibfhiahiijggogladbmfm";
+const char kExtensionID[] = "abjoigjokfeibfhiahiijggogladbmfm";
class ActivityLogEnabledTest : public ChromeRenderViewHostTestHarness {
protected:
@@ -283,4 +283,4 @@ TEST_F(ActivityLogEnabledTest, AppAndCommandLine) {
*CommandLine::ForCurrentProcess() = saved_cmdline_;
}
-} // namespace extensions
+} // namespace extensions
diff --git a/chrome/browser/extensions/activity_log/activity_log_policy.cc b/chrome/browser/extensions/activity_log/activity_log_policy.cc
index 5b75bfd..58c9f6b 100644
--- a/chrome/browser/extensions/activity_log/activity_log_policy.cc
+++ b/chrome/browser/extensions/activity_log/activity_log_policy.cc
@@ -25,8 +25,9 @@ namespace constants = activity_log_constants;
namespace {
// Obsolete database tables: these should be dropped from the database if
// found.
-const char* kObsoleteTables[] = {"activitylog_apis", "activitylog_blocked",
- "activitylog_urls"};
+const char* const kObsoleteTables[] = {"activitylog_apis",
+ "activitylog_blocked",
+ "activitylog_urls"};
} // namespace
namespace extensions {
diff --git a/chrome/browser/extensions/activity_log/activity_log_unittest.cc b/chrome/browser/extensions/activity_log/activity_log_unittest.cc
index 72af356..bf43068 100644
--- a/chrome/browser/extensions/activity_log/activity_log_unittest.cc
+++ b/chrome/browser/extensions/activity_log/activity_log_unittest.cc
@@ -37,7 +37,7 @@ namespace {
const char kExtensionId[] = "abc";
-const char* kUrlApiCalls[] = {
+const char* const kUrlApiCalls[] = {
"HTMLButtonElement.formAction", "HTMLEmbedElement.src",
"HTMLFormElement.action", "HTMLFrameElement.src",
"HTMLHtmlElement.manifest", "HTMLIFrameElement.src",
diff --git a/chrome/browser/extensions/activity_log/counting_policy.cc b/chrome/browser/extensions/activity_log/counting_policy.cc
index 5581fb2..0b8695ad 100644
--- a/chrome/browser/extensions/activity_log/counting_policy.cc
+++ b/chrome/browser/extensions/activity_log/counting_policy.cc
@@ -87,10 +87,10 @@ const ApiList kAlwaysLog[] = {
// Columns in the main database table. See the file-level comment for a
// discussion of how data is stored and the meanings of the _x columns.
-const char* kTableContentFields[] = {
+const char* const kTableContentFields[] = {
"count", "extension_id_x", "time", "action_type", "api_name_x", "args_x",
"page_url_x", "page_title_x", "arg_url_x", "other_x"};
-const char* kTableFieldTypes[] = {
+const char* const kTableFieldTypes[] = {
"INTEGER NOT NULL DEFAULT 1", "INTEGER NOT NULL", "INTEGER", "INTEGER",
"INTEGER", "INTEGER", "INTEGER", "INTEGER", "INTEGER",
"INTEGER"};
@@ -154,8 +154,8 @@ static const char kUrlTableCleanup[] =
namespace extensions {
-const char* CountingPolicy::kTableName = "activitylog_compressed";
-const char* CountingPolicy::kReadViewName = "activitylog_uncompressed";
+const char CountingPolicy::kTableName[] = "activitylog_compressed";
+const char CountingPolicy::kReadViewName[] = "activitylog_uncompressed";
CountingPolicy::CountingPolicy(Profile* profile)
: ActivityLogDatabasePolicy(
@@ -230,7 +230,7 @@ void CountingPolicy::QueueAction(scoped_refptr<Action> action) {
bool CountingPolicy::FlushDatabase(sql::Connection* db) {
// Columns that must match exactly for database rows to be coalesced.
- static const char* matched_columns[] = {
+ static const char* const matched_columns[] = {
"extension_id_x", "action_type", "api_name_x", "args_x", "page_url_x",
"page_title_x", "arg_url_x", "other_x"};
ActionQueue queue;
diff --git a/chrome/browser/extensions/activity_log/counting_policy.h b/chrome/browser/extensions/activity_log/counting_policy.h
index 3926670..8c224c6 100644
--- a/chrome/browser/extensions/activity_log/counting_policy.h
+++ b/chrome/browser/extensions/activity_log/counting_policy.h
@@ -59,8 +59,8 @@ class CountingPolicy : public ActivityLogDatabasePolicy {
// The main database table, and the name for a read-only view that
// decompresses string values for easier parsing.
- static const char* kTableName;
- static const char* kReadViewName;
+ static const char kTableName[];
+ static const char kReadViewName[];
protected:
// The ActivityDatabase::Delegate interface. These are always called from
diff --git a/chrome/browser/extensions/activity_log/fullstream_ui_policy.cc b/chrome/browser/extensions/activity_log/fullstream_ui_policy.cc
index 22db6e6..00c7d77 100644
--- a/chrome/browser/extensions/activity_log/fullstream_ui_policy.cc
+++ b/chrome/browser/extensions/activity_log/fullstream_ui_policy.cc
@@ -33,12 +33,12 @@ namespace constants = activity_log_constants;
namespace extensions {
-const char* FullStreamUIPolicy::kTableName = "activitylog_full";
-const char* FullStreamUIPolicy::kTableContentFields[] = {
+const char FullStreamUIPolicy::kTableName[] = "activitylog_full";
+const char* const FullStreamUIPolicy::kTableContentFields[] = {
"extension_id", "time", "action_type", "api_name", "args", "page_url",
"page_title", "arg_url", "other"
};
-const char* FullStreamUIPolicy::kTableFieldTypes[] = {
+const char* const FullStreamUIPolicy::kTableFieldTypes[] = {
"LONGVARCHAR NOT NULL", "INTEGER", "INTEGER", "LONGVARCHAR", "LONGVARCHAR",
"LONGVARCHAR", "LONGVARCHAR", "LONGVARCHAR", "LONGVARCHAR"
};
diff --git a/chrome/browser/extensions/activity_log/fullstream_ui_policy.h b/chrome/browser/extensions/activity_log/fullstream_ui_policy.h
index 8a583e4..f468e11 100644
--- a/chrome/browser/extensions/activity_log/fullstream_ui_policy.h
+++ b/chrome/browser/extensions/activity_log/fullstream_ui_policy.h
@@ -53,9 +53,9 @@ class FullStreamUIPolicy : public ActivityLogDatabasePolicy {
void DeleteDatabase() override;
// Database table schema.
- static const char* kTableName;
- static const char* kTableContentFields[];
- static const char* kTableFieldTypes[];
+ static const char kTableName[];
+ static const char* const kTableContentFields[];
+ static const char* const kTableFieldTypes[];
static const int kTableFieldCount;
protected:
diff --git a/chrome/browser/extensions/activity_log/generate_ad_network_hashes.py b/chrome/browser/extensions/activity_log/generate_ad_network_hashes.py
index 7d52c1f..4bac73e 100644
--- a/chrome/browser/extensions/activity_log/generate_ad_network_hashes.py
+++ b/chrome/browser/extensions/activity_log/generate_ad_network_hashes.py
@@ -52,7 +52,7 @@ _CC_TEMPLATE = '''\
namespace extensions {
-const char* kHashedAdNetworks[] = {
+const char* const kHashedAdNetworks[] = {
%(ad_networks)s
};
diff --git a/chrome/browser/extensions/activity_log/hashed_ad_network_database.h b/chrome/browser/extensions/activity_log/hashed_ad_network_database.h
index a281bd9..dae2eee 100644
--- a/chrome/browser/extensions/activity_log/hashed_ad_network_database.h
+++ b/chrome/browser/extensions/activity_log/hashed_ad_network_database.h
@@ -16,7 +16,7 @@ class HashedAdNetworkDatabase : public AdNetworkDatabase {
HashedAdNetworkDatabase();
~HashedAdNetworkDatabase() override;
- void set_entries_for_testing(const char** entries, int num_entries) {
+ void set_entries_for_testing(const char* const* entries, int num_entries) {
entries_ = entries;
num_entries_ = num_entries;
}
@@ -27,7 +27,7 @@ class HashedAdNetworkDatabase : public AdNetworkDatabase {
// Points to the array of hash entries. In practice, this is always set to
// kHashedAdNetworks, but is exposed via set_entries_for_testing().
- const char** entries_;
+ const char* const* entries_;
// The number of entries.
int num_entries_;
diff --git a/chrome/browser/extensions/activity_log/hashed_ad_network_database_unittest.cc b/chrome/browser/extensions/activity_log/hashed_ad_network_database_unittest.cc
index 7f29413..8b53cec 100644
--- a/chrome/browser/extensions/activity_log/hashed_ad_network_database_unittest.cc
+++ b/chrome/browser/extensions/activity_log/hashed_ad_network_database_unittest.cc
@@ -17,7 +17,7 @@ namespace extensions {
namespace {
// A list of fake ad networks.
-const char* kAdNetworkHosts[] = {
+const char* const kAdNetworkHosts[] = {
"alpha.adnetwork",
"bravo.adnetwork",
"charlie.delta.adnetwork"
diff --git a/chrome/browser/extensions/activity_log/hashed_ad_networks.cc b/chrome/browser/extensions/activity_log/hashed_ad_networks.cc
index 539f789..0bef0a6 100644
--- a/chrome/browser/extensions/activity_log/hashed_ad_networks.cc
+++ b/chrome/browser/extensions/activity_log/hashed_ad_networks.cc
@@ -12,7 +12,7 @@
namespace extensions {
-const char* kHashedAdNetworks[] = {
+const char* const kHashedAdNetworks[] = {
"00020F0183BABB09",
"00681CE94851B727",
"0078BE5CA25F9492",
diff --git a/chrome/browser/extensions/activity_log/hashed_ad_networks.h b/chrome/browser/extensions/activity_log/hashed_ad_networks.h
index 9ba112d..ddec2b2 100644
--- a/chrome/browser/extensions/activity_log/hashed_ad_networks.h
+++ b/chrome/browser/extensions/activity_log/hashed_ad_networks.h
@@ -13,7 +13,7 @@
namespace extensions {
-extern const char* kHashedAdNetworks[];
+extern const char* const kHashedAdNetworks[];
extern const int kNumHashedAdNetworks;
} // namespace extensions
diff --git a/chrome/browser/extensions/activity_log/uma_policy_browsertest.cc b/chrome/browser/extensions/activity_log/uma_policy_browsertest.cc
index 3dcea7c..3110310 100644
--- a/chrome/browser/extensions/activity_log/uma_policy_browsertest.cc
+++ b/chrome/browser/extensions/activity_log/uma_policy_browsertest.cc
@@ -16,8 +16,8 @@
using extensions::UmaPolicy;
-const char* kGooglePrefix = "ExtensionActivity.Google";
-const char* kNonGooglePrefix = "ExtensionActivity";
+const char kGooglePrefix[] = "ExtensionActivity.Google";
+const char kNonGooglePrefix[] = "ExtensionActivity";
// These tests need to ensure that all of the extension JavaScript completes
// before the histograms are checked. To accomplish this, the test relies on
@@ -209,14 +209,14 @@ IN_PROC_BROWSER_TEST_F(ActivityLogUmaPolicyTest, DISABLED_MultipleExtensions) {
LoadExtension(test_data_dir_.AppendASCII("uma_policy"));
ASSERT_TRUE(ext);
- const char* script2 =
+ const char script2[] =
"document.createElement('script');"
"document.createElement('iframe');"
"document.createElement('div');"
"document.createElement('embed');"
"document.createElement('object');";
- const char* manifest =
+ const char manifest[] =
"{"
" \"name\": \"Activity Log UMA Policy Test Extension\","
" \"version\": \"0.%s\","
@@ -248,13 +248,13 @@ IN_PROC_BROWSER_TEST_F(ActivityLogUmaPolicyTest, DISABLED_MultipleExtensions) {
ui_test_utils::NavigateToURLBlockUntilNavigationsComplete(
browser(), GURL("http://www.blocker.com"), 2);
- const char* subset_one[] = {
+ const char* const subset_one[] = {
"CreatedLink",
"InnerHtml",
"DocumentWrite"
};
- const char* subset_two[] = {
+ const char* const subset_two[] = {
"ContentScript",
"CreatedScript",
"CreatedIframe",
@@ -297,5 +297,4 @@ IN_PROC_BROWSER_TEST_F(ActivityLogUmaPolicyTest, DISABLED_MultipleExtensions) {
cnn_histogram->SnapshotSamples();
EXPECT_EQ(1, cnn_samples->GetCount(2));
}
-
}
diff --git a/chrome/browser/extensions/api/alarms/alarms_api_unittest.cc b/chrome/browser/extensions/api/alarms/alarms_api_unittest.cc
index 509fde2..c5f4e83 100644
--- a/chrome/browser/extensions/api/alarms/alarms_api_unittest.cc
+++ b/chrome/browser/extensions/api/alarms/alarms_api_unittest.cc
@@ -89,9 +89,9 @@ class ExtensionAlarmsTest : public ExtensionApiUnittest {
// Creates up to 3 alarms using the extension API.
void CreateAlarms(size_t num_alarms) {
- CHECK(num_alarms <= 3);
+ CHECK_LE(num_alarms, 3U);
- const char* kCreateArgs[] = {
+ const char* const kCreateArgs[] = {
"[null, {\"periodInMinutes\": 0.001}]",
"[\"7\", {\"periodInMinutes\": 7}]",
"[\"0\", {\"delayInMinutes\": 0}]",
@@ -460,8 +460,9 @@ class ExtensionAlarmsSchedulingTest : public ExtensionAlarmsTest {
EXPECT_EQ(scheduled_time, alarm_manager_->next_poll_time_);
}
- static void RemoveAlarmCallback (bool success) { EXPECT_TRUE(success); }
- static void RemoveAllAlarmsCallback () {}
+ static void RemoveAlarmCallback(bool success) { EXPECT_TRUE(success); }
+ static void RemoveAllAlarmsCallback() {}
+
public:
// Get the time that the alarm named is scheduled to run.
void VerifyScheduledTime(const std::string& alarm_name) {
@@ -477,7 +478,7 @@ class ExtensionAlarmsSchedulingTest : public ExtensionAlarmsTest {
base::Bind(&ExtensionAlarmsSchedulingTest::RemoveAlarmCallback));
}
- void RemoveAllAlarms () {
+ void RemoveAllAlarms() {
alarm_manager_->RemoveAllAlarms(extension()->id(), base::Bind(
&ExtensionAlarmsSchedulingTest::RemoveAllAlarmsCallback));
}
diff --git a/chrome/browser/extensions/api/braille_display_private/braille_controller_brlapi.cc b/chrome/browser/extensions/api/braille_display_private/braille_controller_brlapi.cc
index 96a79de..bc8409f 100644
--- a/chrome/browser/extensions/api/braille_display_private/braille_controller_brlapi.cc
+++ b/chrome/browser/extensions/api/braille_display_private/braille_controller_brlapi.cc
@@ -66,7 +66,7 @@ void BrailleControllerImpl::TryLoadLibBrlApi() {
return;
// These versions of libbrlapi work the same for the functions we
// are using. (0.6.0 adds brlapi_writeWText).
- static const char* kSupportedVersions[] = {
+ static const char* const kSupportedVersions[] = {
"libbrlapi.so.0.5",
"libbrlapi.so.0.6"
};
@@ -277,7 +277,7 @@ void BrailleControllerImpl::DispatchKeys() {
VLOG(1) << "BrlAPI error: " << connection_->BrlapiStrError();
Disconnect();
return;
- } else if (result == 0) { // No more data.
+ } else if (result == 0) { // No more data.
return;
}
scoped_ptr<KeyEvent> event = BrlapiKeyCodeToEvent(code);
diff --git a/chrome/browser/extensions/api/content_settings/content_settings_apitest.cc b/chrome/browser/extensions/api/content_settings/content_settings_apitest.cc
index b82fa64..bb4e217 100644
--- a/chrome/browser/extensions/api/content_settings/content_settings_apitest.cc
+++ b/chrome/browser/extensions/api/content_settings/content_settings_apitest.cc
@@ -214,8 +214,8 @@ IN_PROC_BROWSER_TEST_F(ExtensionContentSettingsApiTest,
FILE_PATH_LITERAL("/plugins/foo.plugin");
base::FilePath::CharType kBarPath[] =
FILE_PATH_LITERAL("/plugins/bar.plugin");
- const char* kFooName = "Foo Plugin";
- const char* kBarName = "Bar Plugin";
+ const char kFooName[] = "Foo Plugin";
+ const char kBarName[] = "Bar Plugin";
content::PluginService::GetInstance()->RegisterInternalPlugin(
content::WebPluginInfo(base::ASCIIToUTF16(kFooName),
diff --git a/chrome/browser/extensions/api/declarative_content/request_content_script_apitest.cc b/chrome/browser/extensions/api/declarative_content/request_content_script_apitest.cc
index 8d881e6..d6538b7 100644
--- a/chrome/browser/extensions/api/declarative_content/request_content_script_apitest.cc
+++ b/chrome/browser/extensions/api/declarative_content/request_content_script_apitest.cc
@@ -20,14 +20,14 @@ namespace extensions {
namespace {
// Manifest permissions injected into |kManifest|:
-const char* kPermissions[] = {
+const char* const kPermissions[] = {
"*://*/*", // ALL
"http://127.0.0.1/*", // PARTICULAR
"http://nowhere.com/*" // NOWHERE
};
// Script matchers for injected into |kBackgroundScriptSource|:
-const char* kScriptMatchers[] = {
+const char* const kScriptMatchers[] = {
"{ pageUrl: { hostContains: '' } }", // ALL
"{ pageUrl: { hostEquals: '127.0.0.1' } }", // PARTICULAR
"{ pageUrl: { hostEquals: 'nowhere.com' } }" // NOWHERE
diff --git a/chrome/browser/extensions/api/declarative_webrequest/webrequest_action_unittest.cc b/chrome/browser/extensions/api/declarative_webrequest/webrequest_action_unittest.cc
index 004ff2164..0c6bea8 100644
--- a/chrome/browser/extensions/api/declarative_webrequest/webrequest_action_unittest.cc
+++ b/chrome/browser/extensions/api/declarative_webrequest/webrequest_action_unittest.cc
@@ -558,7 +558,7 @@ TEST(WebRequestActionTest, GetName) {
" \"lowerPriorityThan\": 123,"
" \"hasTag\": \"some_tag\""
"}]";
- const char* kExpectedNames[] = {
+ const char* const kExpectedNames[] = {
"declarativeWebRequest.RedirectRequest",
"declarativeWebRequest.RedirectByRegEx",
"declarativeWebRequest.SetRequestHeader",
diff --git a/chrome/browser/extensions/api/declarative_webrequest/webrequest_rules_registry_unittest.cc b/chrome/browser/extensions/api/declarative_webrequest/webrequest_rules_registry_unittest.cc
index 36614b4..b49807d 100644
--- a/chrome/browser/extensions/api/declarative_webrequest/webrequest_rules_registry_unittest.cc
+++ b/chrome/browser/extensions/api/declarative_webrequest/webrequest_rules_registry_unittest.cc
@@ -643,7 +643,7 @@ TEST_F(WebRequestRulesRegistryTest, GetMatchesDifferentUrls) {
GURL("http://fpfc.example.com") // matching
};
// Which rules should match in subsequent test iterations.
- const char* matchingRuleIds[] = { kRuleId1, kRuleId2 };
+ const char* const matchingRuleIds[] = { kRuleId1, kRuleId2 };
COMPILE_ASSERT(arraysize(urls) == arraysize(firstPartyUrls),
urls_and_firstPartyUrls_need_to_have_the_same_size);
COMPILE_ASSERT(arraysize(urls) == arraysize(matchingRuleIds),
diff --git a/chrome/browser/extensions/api/downloads/downloads_api.cc b/chrome/browser/extensions/api/downloads/downloads_api.cc
index 84e1842..4676961 100644
--- a/chrome/browser/extensions/api/downloads/downloads_api.cc
+++ b/chrome/browser/extensions/api/downloads/downloads_api.cc
@@ -167,7 +167,7 @@ const char kUrlRegexKey[] = "urlRegex";
// Note: Any change to the danger type strings, should be accompanied by a
// corresponding change to downloads.json.
-const char* kDangerStrings[] = {
+const char* const kDangerStrings[] = {
kDangerSafe,
kDangerFile,
kDangerUrl,
@@ -183,7 +183,7 @@ COMPILE_ASSERT(arraysize(kDangerStrings) == content::DOWNLOAD_DANGER_TYPE_MAX,
// Note: Any change to the state strings, should be accompanied by a
// corresponding change to downloads.json.
-const char* kStateStrings[] = {
+const char* const kStateStrings[] = {
kStateInProgress,
kStateComplete,
kStateInterrupted,
@@ -347,7 +347,8 @@ IconLoader::IconSize IconLoaderSizeFromPixelSize(int pixel_size) {
typedef base::hash_map<std::string, DownloadQuery::FilterType> FilterTypeMap;
-void InitFilterTypeMap(FilterTypeMap& filter_types) {
+void InitFilterTypeMap(FilterTypeMap* filter_types_ptr) {
+ FilterTypeMap& filter_types = *filter_types_ptr;
filter_types[kBytesReceivedKey] = DownloadQuery::FILTER_BYTES_RECEIVED;
filter_types[kExistsKey] = DownloadQuery::FILTER_EXISTS;
filter_types[kFilenameKey] = DownloadQuery::FILTER_FILENAME;
@@ -371,7 +372,8 @@ void InitFilterTypeMap(FilterTypeMap& filter_types) {
typedef base::hash_map<std::string, DownloadQuery::SortType> SortTypeMap;
-void InitSortTypeMap(SortTypeMap& sorter_types) {
+void InitSortTypeMap(SortTypeMap* sorter_types_ptr) {
+ SortTypeMap& sorter_types = *sorter_types_ptr;
sorter_types[kBytesReceivedKey] = DownloadQuery::SORT_BYTES_RECEIVED;
sorter_types[kDangerKey] = DownloadQuery::SORT_DANGER;
sorter_types[kEndTimeKey] = DownloadQuery::SORT_END_TIME;
@@ -454,8 +456,8 @@ void CompileDownloadQueryOrderBy(
// comparisons.
static base::LazyInstance<SortTypeMap> sorter_types =
LAZY_INSTANCE_INITIALIZER;
- if (sorter_types.Get().size() == 0)
- InitSortTypeMap(sorter_types.Get());
+ if (sorter_types.Get().empty())
+ InitSortTypeMap(sorter_types.Pointer());
for (std::vector<std::string>::const_iterator iter = order_by_strs.begin();
iter != order_by_strs.end(); ++iter) {
@@ -487,8 +489,8 @@ void RunDownloadQuery(
// comparisons.
static base::LazyInstance<FilterTypeMap> filter_types =
LAZY_INSTANCE_INITIALIZER;
- if (filter_types.Get().size() == 0)
- InitFilterTypeMap(filter_types.Get());
+ if (filter_types.Get().empty())
+ InitFilterTypeMap(filter_types.Pointer());
DownloadQuery query_out;
diff --git a/chrome/browser/extensions/api/downloads/downloads_api_browsertest.cc b/chrome/browser/extensions/api/downloads/downloads_api_browsertest.cc
index cc008fe..74ae306 100644
--- a/chrome/browser/extensions/api/downloads/downloads_api_browsertest.cc
+++ b/chrome/browser/extensions/api/downloads/downloads_api_browsertest.cc
@@ -1573,7 +1573,7 @@ IN_PROC_BROWSER_TEST_F(DownloadExtensionTest,
ASSERT_TRUE(test_server()->Start());
GoOnTheRecord();
- static const char* kUnsafeHeaders[] = {
+ static const char* const kUnsafeHeaders[] = {
"Accept-chArsEt",
"accept-eNcoding",
"coNNection",
@@ -1731,7 +1731,7 @@ IN_PROC_BROWSER_TEST_F(DownloadExtensionTest,
LoadExtension("downloads_split");
GoOnTheRecord();
- static const char* kInvalidURLs[] = {
+ static const char* const kInvalidURLs[] = {
"foo bar",
"../hello",
"/hello",
@@ -2122,7 +2122,7 @@ IN_PROC_BROWSER_TEST_F(DownloadExtensionTest,
ASSERT_TRUE(test_server()->Start());
std::string download_url = test_server()->GetURL("auth-basic").spec();
// This is just base64 of 'username:secret'.
- static const char* kAuthorization = "dXNlcm5hbWU6c2VjcmV0";
+ static const char kAuthorization[] = "dXNlcm5hbWU6c2VjcmV0";
GoOnTheRecord();
scoped_ptr<base::Value> result(RunFunctionAndReturnResult(
@@ -2351,7 +2351,7 @@ IN_PROC_BROWSER_TEST_F(DownloadExtensionTest,
// NOTE: chrome disallows creating HTML5 FileSystem Files in incognito.
IN_PROC_BROWSER_TEST_F(DownloadExtensionTest,
MAYBE_DownloadExtensionTest_Download_FileSystemURL) {
- static const char* kPayloadData = "on the record\ndata";
+ static const char kPayloadData[] = "on the record\ndata";
GoOnTheRecord();
LoadExtension("downloads_split");
@@ -4087,7 +4087,7 @@ TEST(DownloadInterruptReasonEnumsSynced,
EXPECT_EQ( \
InterruptReasonExtensionToContent(downloads::INTERRUPT_REASON_##name), \
content::DOWNLOAD_INTERRUPT_REASON_##name);
-#include "content/public/browser/download_interrupt_reason_values.h"
+#include "content/public/browser/download_interrupt_reason_values.h" // NOLINT
#undef INTERRUPT_REASON
}
diff --git a/chrome/browser/extensions/api/management/management_api_browsertest.cc b/chrome/browser/extensions/api/management/management_api_browsertest.cc
index ebf9895..86a7bc7 100644
--- a/chrome/browser/extensions/api/management/management_api_browsertest.cc
+++ b/chrome/browser/extensions/api/management/management_api_browsertest.cc
@@ -249,7 +249,7 @@ class ExtensionManagementApiEscalationTest :
const std::string& expected_error) {
scoped_refptr<ManagementSetEnabledFunction> function(
new ManagementSetEnabledFunction);
- const char* enabled_string = enabled ? "true" : "false";
+ const char* const enabled_string = enabled ? "true" : "false";
if (user_gesture)
function->set_user_gesture(true);
bool response = util::RunFunction(
diff --git a/chrome/browser/extensions/api/management/management_browsertest.cc b/chrome/browser/extensions/api/management/management_browsertest.cc
index 9140b0c..0ebb012 100644
--- a/chrome/browser/extensions/api/management/management_browsertest.cc
+++ b/chrome/browser/extensions/api/management/management_browsertest.cc
@@ -437,7 +437,7 @@ IN_PROC_BROWSER_TEST_F(ExtensionManagementTest,
IN_PROC_BROWSER_TEST_F(ExtensionManagementTest, ExternalUrlUpdate) {
ExtensionService* service = extensions::ExtensionSystem::Get(
browser()->profile())->extension_service();
- const char* kExtensionId = "ogjcoiohnmldgjemafoockdghcjciccf";
+ const char kExtensionId[] = "ogjcoiohnmldgjemafoockdghcjciccf";
extensions::ExtensionUpdater::CheckParams params;
base::FilePath basedir = test_data_dir_.AppendASCII("autoupdate");
@@ -522,7 +522,7 @@ IN_PROC_BROWSER_TEST_F(ExtensionManagementTest, ExternalUrlUpdate) {
namespace {
-const char* kForceInstallNotEmptyHelp =
+const char kForceInstallNotEmptyHelp[] =
"A policy may already be controlling the list of force-installed "
"extensions. Please remove all policy settings from your computer "
"before running tests. E.g. from /etc/chromium/policies Linux or "
@@ -534,7 +534,7 @@ const char* kForceInstallNotEmptyHelp =
IN_PROC_BROWSER_TEST_F(ExtensionManagementTest, ExternalPolicyRefresh) {
ExtensionService* service = extensions::ExtensionSystem::Get(
browser()->profile())->extension_service();
- const char* kExtensionId = "ogjcoiohnmldgjemafoockdghcjciccf";
+ const char kExtensionId[] = "ogjcoiohnmldgjemafoockdghcjciccf";
base::FilePath basedir = test_data_dir_.AppendASCII("autoupdate");
@@ -615,7 +615,7 @@ IN_PROC_BROWSER_TEST_F(ExtensionManagementTest,
ExtensionService* service = extensions::ExtensionSystem::Get(
browser()->profile())->extension_service();
ExtensionRegistry* registry = ExtensionRegistry::Get(browser()->profile());
- const char* kExtensionId = "ogjcoiohnmldgjemafoockdghcjciccf";
+ const char kExtensionId[] = "ogjcoiohnmldgjemafoockdghcjciccf";
extensions::ExtensionUpdater::CheckParams params;
service->updater()->set_default_check_params(params);
const size_t size_before = registry->enabled_extensions().size();
diff --git a/chrome/browser/extensions/api/music_manager_private/device_id_linux.cc b/chrome/browser/extensions/api/music_manager_private/device_id_linux.cc
index 22b55f0..bb65b59 100644
--- a/chrome/browser/extensions/api/music_manager_private/device_id_linux.cc
+++ b/chrome/browser/extensions/api/music_manager_private/device_id_linux.cc
@@ -28,15 +28,15 @@ typedef base::Callback<bool(const void* bytes, size_t size)>
IsValidMacAddressCallback;
const char kDiskByUuidDirectoryName[] = "/dev/disk/by-uuid";
-const char* kDeviceNames[] = {
+const char* const kDeviceNames[] = {
"sda1", "hda1", "dm-0", "xvda1", "sda2", "hda2", "dm-1", "xvda2",
};
// Fedora 15 uses biosdevname feature where Embedded ethernet uses the
// "em" prefix and PCI cards use the p[0-9]c[0-9] format based on PCI
// slot and card information.
-const char* kNetDeviceNamePrefixes[] = {
- "eth", "em", "en", "wl", "ww", "p0", "p1", "p2", "p3", "p4", "p5", "p6",
- "p7", "p8", "p9", "wlan"
+const char* const kNetDeviceNamePrefixes[] = {
+ "eth", "em", "en", "wl", "ww", "p0", "p1", "p2", "p3", "p4", "p5", "p6",
+ "p7", "p8", "p9", "wlan"
};
// Map from device name to disk uuid
@@ -99,7 +99,7 @@ class MacAddressProcessor {
}
bool ProcessInterface(struct ifaddrs *ifaddr,
- const char* prefixes[],
+ const char* const prefixes[],
size_t prefixes_count) {
const int MAC_LENGTH = 6;
struct ifreq ifinfo;
@@ -132,7 +132,7 @@ class MacAddressProcessor {
private:
bool IsValidPrefix(const char* name,
- const char* prefixes[],
+ const char* const prefixes[],
size_t prefixes_count) {
for (size_t i = 0; i < prefixes_count; i++) {
if (strncmp(prefixes[i], name, strlen(prefixes[i])) == 0)
diff --git a/chrome/browser/extensions/api/proxy/proxy_api_constants.cc b/chrome/browser/extensions/api/proxy/proxy_api_constants.cc
index df2c8bb..3142b2f 100644
--- a/chrome/browser/extensions/api/proxy/proxy_api_constants.cc
+++ b/chrome/browser/extensions/api/proxy/proxy_api_constants.cc
@@ -30,17 +30,17 @@ const char kProxyEventOnProxyError[] = "proxy.onProxyError";
const char kPACDataUrlPrefix[] =
"data:application/x-ns-proxy-autoconfig;base64,";
-const char* field_name[] = { "singleProxy",
- "proxyForHttp",
- "proxyForHttps",
- "proxyForFtp",
- "fallbackProxy" };
-
-const char* scheme_name[] = { "*error*",
- "http",
- "https",
- "ftp",
- "socks" };
+const char* const field_name[] = { "singleProxy",
+ "proxyForHttp",
+ "proxyForHttps",
+ "proxyForFtp",
+ "fallbackProxy" };
+
+const char* const scheme_name[] = { "*error*",
+ "http",
+ "https",
+ "ftp",
+ "socks" };
COMPILE_ASSERT(SCHEME_MAX == SCHEME_FALLBACK,
SCHEME_MAX_must_equal_SCHEME_FALLBACK);
@@ -51,4 +51,4 @@ COMPILE_ASSERT(arraysize(scheme_name) == SCHEME_MAX + 1,
COMPILE_ASSERT(SCHEME_ALL == 0, singleProxy_must_be_first_option);
} // namespace proxy_api_constants
-} // extensions
+} // namespace extensions
diff --git a/chrome/browser/extensions/api/proxy/proxy_api_constants.h b/chrome/browser/extensions/api/proxy/proxy_api_constants.h
index 6dc64d1..69f7093 100644
--- a/chrome/browser/extensions/api/proxy/proxy_api_constants.h
+++ b/chrome/browser/extensions/api/proxy/proxy_api_constants.h
@@ -43,12 +43,12 @@ enum {
// The names of the JavaScript properties to extract from the proxy_rules.
// These must be kept in sync with the SCHEME_* constants.
-extern const char* field_name[];
+extern const char* const field_name[];
// The names of the schemes to be used to build the preference value string
// for manual proxy settings. These must be kept in sync with the SCHEME_*
// constants.
-extern const char* scheme_name[];
+extern const char* const scheme_name[];
} // namespace proxy_api_constants
} // namespace extensions
diff --git a/chrome/browser/extensions/api/sessions/sessions_apitest.cc b/chrome/browser/extensions/api/sessions/sessions_apitest.cc
index 6182c14..cccb653 100644
--- a/chrome/browser/extensions/api/sessions/sessions_apitest.cc
+++ b/chrome/browser/extensions/api/sessions/sessions_apitest.cc
@@ -39,7 +39,7 @@ namespace {
// Fake session tabs (used to construct arbitrary device info) and tab IDs
// (used to construct arbitrary tab info) to use in all tests.
-const char* kSessionTags[] = {"tag0", "tag1", "tag2", "tag3", "tag4"};
+const char* const kSessionTags[] = {"tag0", "tag1", "tag2", "tag3", "tag4"};
const SessionID::id_type kTabIDs[] = {5, 10, 13, 17};
void BuildSessionSpecifics(const std::string& tag,
@@ -102,10 +102,10 @@ class ExtensionSessionsTest : public InProcessBrowserTest {
fn->set_extension(extension_.get());
fn->set_has_callback(has_callback);
return fn;
- };
+ }
Browser* browser_;
- scoped_refptr<extensions::Extension> extension_;
+ scoped_refptr<Extension> extension_;
};
void ExtensionSessionsTest::SetUpCommandLine(CommandLine* command_line) {
diff --git a/chrome/browser/extensions/api/socket/udp_socket_unittest.cc b/chrome/browser/extensions/api/socket/udp_socket_unittest.cc
index 48a51ac..d9c4993 100644
--- a/chrome/browser/extensions/api/socket/udp_socket_unittest.cc
+++ b/chrome/browser/extensions/api/socket/udp_socket_unittest.cc
@@ -50,7 +50,7 @@ TEST(UDPSocketUnitTest, TestUDPSocketRecvFrom) {
}
TEST(UDPSocketUnitTest, TestUDPMulticastJoinGroup) {
- const char* kGroup = "237.132.100.17";
+ const char kGroup[] = "237.132.100.17";
UDPSocket src("abcdefghijklmnopqrst");
UDPSocket dest("abcdefghijklmnopqrst");
@@ -66,7 +66,7 @@ TEST(UDPSocketUnitTest, TestUDPMulticastJoinGroup) {
}
TEST(UDPSocketUnitTest, TestUDPMulticastTimeToLive) {
- const char* kGroup = "237.132.100.17";
+ const char kGroup[] = "237.132.100.17";
UDPSocket socket("abcdefghijklmnopqrst");
EXPECT_NE(0, socket.SetMulticastTimeToLive(-1)); // Negative TTL shall fail.
EXPECT_EQ(0, socket.SetMulticastTimeToLive(3));
@@ -74,7 +74,7 @@ TEST(UDPSocketUnitTest, TestUDPMulticastTimeToLive) {
}
TEST(UDPSocketUnitTest, TestUDPMulticastLoopbackMode) {
- const char* kGroup = "237.132.100.17";
+ const char kGroup[] = "237.132.100.17";
UDPSocket socket("abcdefghijklmnopqrst");
EXPECT_EQ(0, socket.SetMulticastLoopbackMode(false));
socket.Connect(kGroup, 13333, base::Bind(&OnConnected));
@@ -110,7 +110,7 @@ static void OnMulticastReadCompleted(bool *packet_received,
TEST(UDPSocketUnitTest, TestUDPMulticastRecv) {
const int kPort = 9999;
- const char* const kGroup = "237.132.100.17";
+ const char kGroup[] = "237.132.100.17";
bool packet_received = false;
base::MessageLoopForIO io_loop; // For Read to do its threaded work.
UDPSocket dest("abcdefghijklmnopqrst");
diff --git a/chrome/browser/extensions/api/system_private/system_private_api.cc b/chrome/browser/extensions/api/system_private/system_private_api.cc
index 383b6ae..54048c1 100644
--- a/chrome/browser/extensions/api/system_private/system_private_api.cc
+++ b/chrome/browser/extensions/api/system_private/system_private_api.cc
@@ -24,7 +24,7 @@ namespace {
// Maps prefs::kIncognitoModeAvailability values (0 = enabled, ...)
// to strings exposed to extensions.
-const char* kIncognitoModeAvailabilityStrings[] = {
+const char* const kIncognitoModeAvailabilityStrings[] = {
"enabled",
"disabled",
"forced"
diff --git a/chrome/browser/extensions/api/tab_capture/tab_capture_api.cc b/chrome/browser/extensions/api/tab_capture/tab_capture_api.cc
index 52e95b6..4c2e996 100644
--- a/chrome/browser/extensions/api/tab_capture/tab_capture_api.cc
+++ b/chrome/browser/extensions/api/tab_capture/tab_capture_api.cc
@@ -51,7 +51,7 @@ const char kMediaStreamSourceTab[] = "tab";
// Whitelisted extensions that do not check for a browser action grant because
// they provide API's.
-const char* whitelisted_extensions[] = {
+const char* const whitelisted_extensions[] = {
"enhhojjnijigcajfphajepfemndkmdlo", // Dev
"pkedcjkdefgpdelpbcmbmeomcjbeemfm", // Trusted Tester
"fmfcbgogabcbclcofgocippekhfcmgfj", // Staging
diff --git a/chrome/browser/extensions/api/web_navigation/frame_navigation_state.cc b/chrome/browser/extensions/api/web_navigation/frame_navigation_state.cc
index 75b900c..2cfa98f 100644
--- a/chrome/browser/extensions/api/web_navigation/frame_navigation_state.cc
+++ b/chrome/browser/extensions/api/web_navigation/frame_navigation_state.cc
@@ -14,7 +14,7 @@ namespace extensions {
namespace {
// URL schemes for which we'll send events.
-const char* kValidSchemes[] = {
+const char* const kValidSchemes[] = {
content::kChromeUIScheme,
url::kHttpScheme,
url::kHttpsScheme,
diff --git a/chrome/browser/extensions/api/web_request/web_request_api_unittest.cc b/chrome/browser/extensions/api/web_request/web_request_api_unittest.cc
index bc63252..2f08120 100644
--- a/chrome/browser/extensions/api/web_request/web_request_api_unittest.cc
+++ b/chrome/browser/extensions/api/web_request/web_request_api_unittest.cc
@@ -695,7 +695,7 @@ TEST_F(ExtensionWebRequestTest, NoAccessRequestBodyData) {
// a POST, PUT and GET request. For none of them the "requestBody" object
// property should be present in the details passed to the onBeforeRequest
// event listener.
- const char* kMethods[] = { "POST", "PUT", "GET" };
+ const char* const kMethods[] = { "POST", "PUT", "GET" };
// Set up a dummy extension name.
const std::string kEventName(web_request::OnBeforeRequest::kEventName);
diff --git a/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc b/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc
index edddf023..96279af 100644
--- a/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc
+++ b/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc
@@ -77,7 +77,7 @@ void ExtensionWebRequestHelpersTestWithThreadsTest::SetUp() {
TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) {
net::TestURLRequestContext context;
- const char* sensitive_urls[] = {
+ const char* const sensitive_urls[] = {
"http://clients2.google.com",
"http://clients22.google.com",
"https://clients2.google.com",
@@ -92,7 +92,7 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) {
"https://chrome.google.com/webstore/"
"inlineinstall/detail/kcnhkahnjcbndmmehfkdnkjomaanaooo"
};
- const char* non_sensitive_urls[] = {
+ const char* const non_sensitive_urls[] = {
"http://www.google.com/"
};
const int kSigninProcessId = 99;
diff --git a/chrome/browser/extensions/chrome_app_sorting.cc b/chrome/browser/extensions/chrome_app_sorting.cc
index 13bbc33..5f05f47 100644
--- a/chrome/browser/extensions/chrome_app_sorting.cc
+++ b/chrome/browser/extensions/chrome_app_sorting.cc
@@ -549,7 +549,7 @@ void ChromeAppSorting::CreateDefaultOrdinals() {
std::vector<std::string> app_ids;
chromeos::default_app_order::Get(&app_ids);
#else
- const char* kDefaultAppOrder[] = {
+ const char* const kDefaultAppOrder[] = {
extension_misc::kChromeAppId,
extensions::kWebStoreAppId,
};
diff --git a/chrome/browser/extensions/content_script_apitest.cc b/chrome/browser/extensions/content_script_apitest.cc
index 91d1ab6..53d3b77 100644
--- a/chrome/browser/extensions/content_script_apitest.cc
+++ b/chrome/browser/extensions/content_script_apitest.cc
@@ -110,7 +110,7 @@ IN_PROC_BROWSER_TEST_F(ExtensionApiTest, ContentScriptExtensionProcess) {
IN_PROC_BROWSER_TEST_F(ExtensionApiTest, ContentScriptFragmentNavigation) {
ASSERT_TRUE(StartEmbeddedTestServer());
- const char* extension_name = "content_scripts/fragment";
+ const char extension_name[] = "content_scripts/fragment";
ASSERT_TRUE(RunExtensionTest(extension_name)) << message_;
}
diff --git a/chrome/browser/extensions/crx_installer.cc b/chrome/browser/extensions/crx_installer.cc
index 731c8ef..d9cf9ca 100644
--- a/chrome/browser/extensions/crx_installer.cc
+++ b/chrome/browser/extensions/crx_installer.cc
@@ -330,7 +330,7 @@ CrxInstallerError CrxInstaller::AllowInstall(const Extension* extension) {
if (install_cause_ == extension_misc::INSTALL_CAUSE_USER_DOWNLOAD) {
if (FeatureSwitch::easy_off_store_install()->IsEnabled()) {
- const char* kHistogramName = "Extensions.OffStoreInstallDecisionEasy";
+ const char kHistogramName[] = "Extensions.OffStoreInstallDecisionEasy";
if (is_gallery_install()) {
UMA_HISTOGRAM_ENUMERATION(kHistogramName, OnStoreInstall,
NumOffStoreInstallDecision);
@@ -339,7 +339,7 @@ CrxInstallerError CrxInstaller::AllowInstall(const Extension* extension) {
NumOffStoreInstallDecision);
}
} else {
- const char* kHistogramName = "Extensions.OffStoreInstallDecisionHard";
+ const char kHistogramName[] = "Extensions.OffStoreInstallDecisionHard";
if (is_gallery_install()) {
UMA_HISTOGRAM_ENUMERATION(kHistogramName, OnStoreInstall,
NumOffStoreInstallDecision);
diff --git a/chrome/browser/extensions/default_apps.cc b/chrome/browser/extensions/default_apps.cc
index 1688509..7b9c560 100644
--- a/chrome/browser/extensions/default_apps.cc
+++ b/chrome/browser/extensions/default_apps.cc
@@ -35,7 +35,7 @@ bool IsLocaleSupported() {
// TODO(rogerta): Do this check dynamically once the webstore can expose
// an API. See http://crbug.com/101357
const std::string& locale = g_browser_process->GetApplicationLocale();
- static const char* unsupported_locales[] = {"CN", "TR", "IR"};
+ static const char* const unsupported_locales[] = {"CN", "TR", "IR"};
for (size_t i = 0; i < arraysize(unsupported_locales); ++i) {
if (EndsWith(locale, unsupported_locales[i], false)) {
return false;
diff --git a/chrome/browser/extensions/error_console/error_console_browsertest.cc b/chrome/browser/extensions/error_console/error_console_browsertest.cc
index f5ffa2a..a290b45 100644
--- a/chrome/browser/extensions/error_console/error_console_browsertest.cc
+++ b/chrome/browser/extensions/error_console/error_console_browsertest.cc
@@ -35,7 +35,7 @@ namespace {
const char kTestingPage[] = "/extensions/test_file.html";
const char kAnonymousFunction[] = "(anonymous function)";
-const char* kBackgroundPageName =
+const char* const kBackgroundPageName =
extensions::kGeneratedBackgroundPageFilename;
const int kNoFlags = 0;
@@ -274,6 +274,7 @@ class ErrorConsoleBrowserTest : public ExtensionBrowserTest {
}
ErrorConsole* error_console() { return error_console_; }
+
private:
// The URL used in testing for simple page navigations.
GURL test_url_;
@@ -391,7 +392,7 @@ IN_PROC_BROWSER_TEST_F(ErrorConsoleBrowserTest,
script_url,
"logHelloWorld", // function name
6u, // line number
- 11u /* column number */ );
+ 11u /* column number */);
CheckStackFrame(stack_trace1[1],
script_url,
diff --git a/chrome/browser/extensions/execute_script_apitest.cc b/chrome/browser/extensions/execute_script_apitest.cc
index 598a75c..fd2eea3 100644
--- a/chrome/browser/extensions/execute_script_apitest.cc
+++ b/chrome/browser/extensions/execute_script_apitest.cc
@@ -53,7 +53,7 @@ IN_PROC_BROWSER_TEST_F(ExecuteScriptApiTest, ExecuteScriptFileAfterClose) {
// If crashing, mark disabled and update http://crbug.com/67774.
IN_PROC_BROWSER_TEST_F(ExecuteScriptApiTest, ExecuteScriptFragmentNavigation) {
ASSERT_TRUE(StartEmbeddedTestServer());
- const char* extension_name = "executescript/fragment";
+ const char extension_name[] = "executescript/fragment";
ASSERT_TRUE(RunExtensionTest(extension_name)) << message_;
}
diff --git a/chrome/browser/extensions/extension_disabled_ui_browsertest.cc b/chrome/browser/extensions/extension_disabled_ui_browsertest.cc
index 4fa5c92..9b5a4d9 100644
--- a/chrome/browser/extensions/extension_disabled_ui_browsertest.cc
+++ b/chrome/browser/extensions/extension_disabled_ui_browsertest.cc
@@ -244,7 +244,7 @@ IN_PROC_BROWSER_TEST_F(ExtensionDisabledGlobalErrorTest,
// Test that an error appears if an extension gets installed server side.
IN_PROC_BROWSER_TEST_F(ExtensionDisabledGlobalErrorTest, RemoteInstall) {
- static const char* extension_id = "pgdpcfcocojkjfbgpiianjngphoopgmo";
+ static const char extension_id[] = "pgdpcfcocojkjfbgpiianjngphoopgmo";
ExtensionSyncService* sync_service =
ExtensionSyncService::Get(browser()->profile());
diff --git a/chrome/browser/extensions/extension_keybinding_apitest.cc b/chrome/browser/extensions/extension_keybinding_apitest.cc
index 66755bb..29c93a7d 100644
--- a/chrome/browser/extensions/extension_keybinding_apitest.cc
+++ b/chrome/browser/extensions/extension_keybinding_apitest.cc
@@ -377,9 +377,9 @@ IN_PROC_BROWSER_TEST_F(CommandsApiTest,
const Extension* extension = GetSingleLoadedExtension();
// Simulate the user setting the keybinding to Ctrl+D.
#if defined(OS_MACOSX)
- const char* hotkey = "Command+D";
+ const char hotkey[] = "Command+D";
#else
- const char* hotkey = "Ctrl+D";
+ const char hotkey[] = "Ctrl+D";
#endif // defined(OS_MACOSX)
command_service->UpdateKeybindingPrefs(
extension->id(), manifest_values::kBrowserActionCommandEvent, hotkey);
diff --git a/chrome/browser/extensions/extension_loading_browsertest.cc b/chrome/browser/extensions/extension_loading_browsertest.cc
index 6f98393..4bcf968 100644
--- a/chrome/browser/extensions/extension_loading_browsertest.cc
+++ b/chrome/browser/extensions/extension_loading_browsertest.cc
@@ -32,7 +32,7 @@ IN_PROC_BROWSER_TEST_F(ExtensionLoadingTest,
ASSERT_TRUE(embedded_test_server()->InitializeAndWaitUntilReady());
TestExtensionDir extension_dir;
- const char* manifest_template =
+ const char manifest_template[] =
"{"
" \"name\": \"Overrides New Tab\","
" \"version\": \"%d\","
diff --git a/chrome/browser/extensions/extension_messages_apitest.cc b/chrome/browser/extensions/extension_messages_apitest.cc
index d727ada..cae5667 100644
--- a/chrome/browser/extensions/extension_messages_apitest.cc
+++ b/chrome/browser/extensions/extension_messages_apitest.cc
@@ -213,7 +213,7 @@ class ExternallyConnectableMessagingTest : public ExtensionApiTest {
testing::AssertionResult AreAnyNonWebApisDefinedForFrame(
content::RenderFrameHost* frame) {
// All runtime API methods are non-web except for sendRequest and connect.
- const char* non_messaging_apis[] = {
+ const char* const non_messaging_apis[] = {
"getBackgroundPage",
"getManifest",
"getURL",
@@ -622,7 +622,7 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingTest,
// previously closed.
tls_channel_id =
GetTlsChannelIdFromPortConnect(chromium_connectable.get(), true);
- // And the empty value is still retrieved.
+ // And the empty value is still retrieved.
EXPECT_EQ(std::string(), tls_channel_id);
}
@@ -987,7 +987,7 @@ IN_PROC_BROWSER_TEST_F(ExternallyConnectableMessagingWithTlsChannelIdTest,
// previously closed.
tls_channel_id =
GetTlsChannelIdFromPortConnect(chromium_connectable.get(), true);
- // And the expected value is still retrieved.
+ // And the expected value is still retrieved.
EXPECT_EQ(expected_tls_channel_id_value, tls_channel_id);
}
diff --git a/chrome/browser/extensions/extension_nacl_browsertest.cc b/chrome/browser/extensions/extension_nacl_browsertest.cc
index 800c181..00b032a 100644
--- a/chrome/browser/extensions/extension_nacl_browsertest.cc
+++ b/chrome/browser/extensions/extension_nacl_browsertest.cc
@@ -30,7 +30,7 @@ using extensions::Manifest;
namespace {
-const char* kExtensionId = "bjjcibdiodkkeanflmiijlcfieiemced";
+const char kExtensionId[] = "bjjcibdiodkkeanflmiijlcfieiemced";
// This class tests that the Native Client plugin is blocked unless the
// .nexe is part of an extension from the Chrome Webstore.
@@ -142,7 +142,6 @@ class NaClExtensionTest : public ExtensionBrowserTest {
CheckPluginsCreated(extension->GetResourceURL("test.html"),
expected_to_succeed);
}
-
};
// Test that the NaCl plugin isn't blocked for Webstore extensions.
diff --git a/chrome/browser/extensions/extension_service_unittest.cc b/chrome/browser/extensions/extension_service_unittest.cc
index 618ea40..0d7905f 100644
--- a/chrome/browser/extensions/extension_service_unittest.cc
+++ b/chrome/browser/extensions/extension_service_unittest.cc
@@ -1309,7 +1309,7 @@ TEST_F(ExtensionServiceTest, LoadAllExtensionsFromDirectorySuccess) {
extensions::ContentScriptsInfo::GetContentScripts(
loaded_[index].get()).size());
EXPECT_EQ(Manifest::INTERNAL, loaded_[index]->location());
-};
+}
// Test loading bad extensions from the profile directory.
TEST_F(ExtensionServiceTest, LoadAllExtensionsFromDirectoryFail) {
@@ -1345,7 +1345,7 @@ TEST_F(ExtensionServiceTest, LoadAllExtensionsFromDirectoryFail) {
l10n_util::GetStringUTF8(IDS_EXTENSIONS_LOAD_ERROR_MESSAGE) + " *. " +
extensions::manifest_errors::kManifestUnreadable)) <<
base::UTF16ToUTF8(GetErrors()[3]);
-};
+}
// Test various cases for delayed install because of missing imports.
TEST_F(ExtensionServiceTest, PendingImports) {
@@ -4260,7 +4260,7 @@ TEST_F(ExtensionServiceTest, ReloadExtensions) {
base::FilePath path = data_dir().AppendASCII("good.crx");
InstallCRX(path, INSTALL_NEW,
Extension::FROM_WEBSTORE | Extension::WAS_INSTALLED_BY_DEFAULT);
- const char* extension_id = good_crx;
+ const char* const extension_id = good_crx;
service()->DisableExtension(extension_id, Extension::DISABLE_USER_ACTION);
EXPECT_EQ(0u, registry()->enabled_extensions().size());
@@ -4299,7 +4299,7 @@ TEST_F(ExtensionServiceTest, ReloadExtension) {
InitializeEmptyExtensionService();
// Simple extension that should install without error.
- const char* extension_id = "behllobkkfkfnphdnhnkndlbkcpglgmj";
+ const char extension_id[] = "behllobkkfkfnphdnhnkndlbkcpglgmj";
base::FilePath ext = data_dir()
.AppendASCII("good")
.AppendASCII("Extensions")
@@ -6476,7 +6476,7 @@ TEST_F(ExtensionServiceTest,
EXPECT_FALSE(
registry()->GenerateInstalledExtensionsSet()->Contains(extension_ids[1]));
}
-#endif // defined(ENABLE_MANAGED_USERS)
+#endif // defined(ENABLE_MANAGED_USERS)
TEST_F(ExtensionServiceTest, InstallPriorityExternalUpdateUrl) {
InitializeEmptyExtensionService();
diff --git a/chrome/browser/extensions/extension_util.cc b/chrome/browser/extensions/extension_util.cc
index 6e33a9a..f6ebc49 100644
--- a/chrome/browser/extensions/extension_util.cc
+++ b/chrome/browser/extensions/extension_util.cc
@@ -44,7 +44,7 @@ const char kExtensionAllowedOnAllUrlsPrefName[] =
// Returns true if |extension_id| for an external component extension should
// always be enabled in incognito windows.
bool IsWhitelistedForIncognito(const std::string& extension_id) {
- static const char* kExtensionWhitelist[] = {
+ static const char* const kExtensionWhitelist[] = {
"D5736E4B5CF695CB93A2FB57E4FDC6E5AFAB6FE2", // http://crbug.com/312900
"D57DE394F36DC1C3220E7604C575D29C51A6C495", // http://crbug.com/319444
"3F65507A3B39259B38C8173C6FFA3D12DF64CCE9" // http://crbug.com/371562
diff --git a/chrome/browser/extensions/extension_warning_badge_service_unittest.cc b/chrome/browser/extensions/extension_warning_badge_service_unittest.cc
index a135c75..8c533b9 100644
--- a/chrome/browser/extensions/extension_warning_badge_service_unittest.cc
+++ b/chrome/browser/extensions/extension_warning_badge_service_unittest.cc
@@ -53,8 +53,8 @@ bool HasBadge(Profile* profile) {
NULL;
}
-const char* ext1_id = "extension1";
-const char* ext2_id = "extension2";
+const char ext1_id[] = "extension1";
+const char ext2_id[] = "extension2";
} // namespace
diff --git a/chrome/browser/extensions/external_component_loader.cc b/chrome/browser/extensions/external_component_loader.cc
index 84f629f..f6379a2 100644
--- a/chrome/browser/extensions/external_component_loader.cc
+++ b/chrome/browser/extensions/external_component_loader.cc
@@ -32,7 +32,7 @@ ExternalComponentLoader::~ExternalComponentLoader() {}
// static
bool ExternalComponentLoader::IsModifiable(const Extension* extension) {
if (extension->location() == Manifest::EXTERNAL_COMPONENT) {
- static const char* enhanced_extension_hashes[] = {
+ static const char* const enhanced_extension_hashes[] = {
"D5736E4B5CF695CB93A2FB57E4FDC6E5AFAB6FE2", // http://crbug.com/312900
"D57DE394F36DC1C3220E7604C575D29C51A6C495", // http://crbug.com/319444
"3F65507A3B39259B38C8173C6FFA3D12DF64CCE9" // http://crbug.com/371562
diff --git a/chrome/browser/extensions/hotword_browsertest.cc b/chrome/browser/extensions/hotword_browsertest.cc
index a1bf617..25e5f27 100644
--- a/chrome/browser/extensions/hotword_browsertest.cc
+++ b/chrome/browser/extensions/hotword_browsertest.cc
@@ -20,7 +20,7 @@
namespace extensions {
-static const char* kHotwordHelperExtensionId =
+static const char kHotwordHelperExtensionId[] =
"dnhpdliibojhegemfjheidglijccjfmc";
class HotwordBrowserTest : public ExtensionBrowserTest {