| Index: chrome/browser/policy/cloud_policy_controller_unittest.cc
|
| ===================================================================
|
| --- chrome/browser/policy/cloud_policy_controller_unittest.cc (revision 98988)
|
| +++ chrome/browser/policy/cloud_policy_controller_unittest.cc (working copy)
|
| @@ -20,12 +20,12 @@
|
|
|
| namespace policy {
|
|
|
| +using ::testing::_;
|
| using ::testing::AnyNumber;
|
| using ::testing::AtLeast;
|
| using ::testing::InSequence;
|
| using ::testing::Mock;
|
| using ::testing::Return;
|
| -using ::testing::_;
|
|
|
| class MockDeviceTokenFetcher : public DeviceTokenFetcher {
|
| public:
|
| @@ -104,7 +104,7 @@
|
| TEST_F(CloudPolicyControllerTest, StartupWithDeviceToken) {
|
| data_store_->SetupForTesting("fake_device_token", "device_id", "", "",
|
| true);
|
| - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll(
|
| + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(DoAll(
|
| InvokeWithoutArgs(this, &CloudPolicyControllerTest::StopMessageLoop),
|
| MockDeviceManagementBackendSucceedSpdyCloudPolicy()));
|
| CreateNewController();
|
| @@ -140,9 +140,9 @@
|
| "auth_token", true);
|
| {
|
| InSequence s;
|
| - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(
|
| + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(
|
| MockDeviceManagementBackendSucceedSpdyCloudPolicy());
|
| - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll(
|
| + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(DoAll(
|
| InvokeWithoutArgs(this, &CloudPolicyControllerTest::StopMessageLoop),
|
| MockDeviceManagementBackendFailPolicy(
|
| DeviceManagementBackend::kErrorRequestFailed)));
|
| @@ -159,10 +159,10 @@
|
| "auth_token", true);
|
| {
|
| InSequence s;
|
| - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(
|
| + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(
|
| MockDeviceManagementBackendFailPolicy(
|
| DeviceManagementBackend::kErrorRequestFailed));
|
| - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll(
|
| + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(DoAll(
|
| InvokeWithoutArgs(this,
|
| &CloudPolicyControllerTest::StopMessageLoop),
|
| MockDeviceManagementBackendSucceedSpdyCloudPolicy()));
|
| @@ -177,7 +177,7 @@
|
| TEST_F(CloudPolicyControllerTest, InvalidToken) {
|
| data_store_->SetupForTesting("device_token", "device_id",
|
| "standup@ten.am", "auth", true);
|
| - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(
|
| + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(
|
| MockDeviceManagementBackendFailPolicy(
|
| DeviceManagementBackend::kErrorServiceManagementTokenInvalid));
|
| EXPECT_CALL(*token_fetcher_.get(), FetchToken()).Times(1);
|
| @@ -190,7 +190,7 @@
|
| TEST_F(CloudPolicyControllerTest, DeviceNotFound) {
|
| data_store_->SetupForTesting("device_token", "device_id",
|
| "me@you.com", "auth", true);
|
| - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(
|
| + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(
|
| MockDeviceManagementBackendFailPolicy(
|
| DeviceManagementBackend::kErrorServiceDeviceNotFound));
|
| EXPECT_CALL(*token_fetcher_.get(), FetchToken()).Times(1);
|
| @@ -204,7 +204,7 @@
|
| TEST_F(CloudPolicyControllerTest, NoLongerManaged) {
|
| data_store_->SetupForTesting("device_token", "device_id",
|
| "who@what.com", "auth", true);
|
| - EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(
|
| + EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(
|
| MockDeviceManagementBackendFailPolicy(
|
| DeviceManagementBackend::kErrorServiceManagementNotSupported));
|
| EXPECT_CALL(*token_fetcher_.get(), SetUnmanagedState()).Times(1);
|
|
|