Index: chrome/browser/policy/cloud_policy_controller_unittest.cc |
=================================================================== |
--- chrome/browser/policy/cloud_policy_controller_unittest.cc (revision 98988) |
+++ chrome/browser/policy/cloud_policy_controller_unittest.cc (working copy) |
@@ -20,12 +20,12 @@ |
namespace policy { |
+using ::testing::_; |
using ::testing::AnyNumber; |
using ::testing::AtLeast; |
using ::testing::InSequence; |
using ::testing::Mock; |
using ::testing::Return; |
-using ::testing::_; |
class MockDeviceTokenFetcher : public DeviceTokenFetcher { |
public: |
@@ -104,7 +104,7 @@ |
TEST_F(CloudPolicyControllerTest, StartupWithDeviceToken) { |
data_store_->SetupForTesting("fake_device_token", "device_id", "", "", |
true); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(DoAll( |
InvokeWithoutArgs(this, &CloudPolicyControllerTest::StopMessageLoop), |
MockDeviceManagementBackendSucceedSpdyCloudPolicy())); |
CreateNewController(); |
@@ -140,9 +140,9 @@ |
"auth_token", true); |
{ |
InSequence s; |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( |
MockDeviceManagementBackendSucceedSpdyCloudPolicy()); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(DoAll( |
InvokeWithoutArgs(this, &CloudPolicyControllerTest::StopMessageLoop), |
MockDeviceManagementBackendFailPolicy( |
DeviceManagementBackend::kErrorRequestFailed))); |
@@ -159,10 +159,10 @@ |
"auth_token", true); |
{ |
InSequence s; |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( |
MockDeviceManagementBackendFailPolicy( |
DeviceManagementBackend::kErrorRequestFailed)); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce(DoAll( |
InvokeWithoutArgs(this, |
&CloudPolicyControllerTest::StopMessageLoop), |
MockDeviceManagementBackendSucceedSpdyCloudPolicy())); |
@@ -177,7 +177,7 @@ |
TEST_F(CloudPolicyControllerTest, InvalidToken) { |
data_store_->SetupForTesting("device_token", "device_id", |
"standup@ten.am", "auth", true); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( |
MockDeviceManagementBackendFailPolicy( |
DeviceManagementBackend::kErrorServiceManagementTokenInvalid)); |
EXPECT_CALL(*token_fetcher_.get(), FetchToken()).Times(1); |
@@ -190,7 +190,7 @@ |
TEST_F(CloudPolicyControllerTest, DeviceNotFound) { |
data_store_->SetupForTesting("device_token", "device_id", |
"me@you.com", "auth", true); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( |
MockDeviceManagementBackendFailPolicy( |
DeviceManagementBackend::kErrorServiceDeviceNotFound)); |
EXPECT_CALL(*token_fetcher_.get(), FetchToken()).Times(1); |
@@ -204,7 +204,7 @@ |
TEST_F(CloudPolicyControllerTest, NoLongerManaged) { |
data_store_->SetupForTesting("device_token", "device_id", |
"who@what.com", "auth", true); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( |
MockDeviceManagementBackendFailPolicy( |
DeviceManagementBackend::kErrorServiceManagementNotSupported)); |
EXPECT_CALL(*token_fetcher_.get(), SetUnmanagedState()).Times(1); |