Index: chrome/browser/policy/cloud_policy_controller_unittest.cc |
diff --git a/chrome/browser/policy/cloud_policy_controller_unittest.cc b/chrome/browser/policy/cloud_policy_controller_unittest.cc |
index 8636c5c7db455b212d22c1b2e839dd491eaf75d5..bf31643e8bfcbe246497a36529d7efb2ccd799dc 100644 |
--- a/chrome/browser/policy/cloud_policy_controller_unittest.cc |
+++ b/chrome/browser/policy/cloud_policy_controller_unittest.cc |
@@ -117,7 +117,7 @@ class CloudPolicyControllerTest : public testing::Test { |
TEST_F(CloudPolicyControllerTest, StartupWithDeviceToken) { |
data_store_->SetupForTesting("fake_device_token", "device_id", "", "", |
true); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _, _)).WillOnce(DoAll( |
InvokeWithoutArgs(this, &CloudPolicyControllerTest::StopMessageLoop), |
MockDeviceManagementBackendSucceedSpdyCloudPolicy())); |
CreateNewController(); |
@@ -153,9 +153,10 @@ TEST_F(CloudPolicyControllerTest, RefreshAfterSuccessfulPolicy) { |
"auth_token", true); |
{ |
InSequence s; |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _, _)).WillOnce( |
MockDeviceManagementBackendSucceedSpdyCloudPolicy()); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll( |
+ EXPECT_CALL(backend_, |
+ ProcessPolicyRequest(_, _, _, _, _, _)).WillOnce(DoAll( |
InvokeWithoutArgs(this, &CloudPolicyControllerTest::StopMessageLoop), |
MockDeviceManagementBackendFailPolicy( |
DeviceManagementBackend::kErrorRequestFailed))); |
@@ -172,10 +173,11 @@ TEST_F(CloudPolicyControllerTest, RefreshAfterError) { |
"auth_token", true); |
{ |
InSequence s; |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _, _)).WillOnce( |
MockDeviceManagementBackendFailPolicy( |
DeviceManagementBackend::kErrorRequestFailed)); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll( |
+ EXPECT_CALL(backend_, |
+ ProcessPolicyRequest(_, _, _, _, _, _)).WillOnce(DoAll( |
InvokeWithoutArgs(this, |
&CloudPolicyControllerTest::StopMessageLoop), |
MockDeviceManagementBackendSucceedSpdyCloudPolicy())); |
@@ -190,7 +192,7 @@ TEST_F(CloudPolicyControllerTest, RefreshAfterError) { |
TEST_F(CloudPolicyControllerTest, InvalidToken) { |
data_store_->SetupForTesting("device_token", "device_id", |
"standup@ten.am", "auth", true); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _, _)).WillOnce( |
MockDeviceManagementBackendFailPolicy( |
DeviceManagementBackend::kErrorServiceManagementTokenInvalid)); |
EXPECT_CALL(*token_fetcher_.get(), FetchToken()).Times(1); |
@@ -203,7 +205,7 @@ TEST_F(CloudPolicyControllerTest, InvalidToken) { |
TEST_F(CloudPolicyControllerTest, DeviceNotFound) { |
data_store_->SetupForTesting("device_token", "device_id", |
"me@you.com", "auth", true); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _, _)).WillOnce( |
MockDeviceManagementBackendFailPolicy( |
DeviceManagementBackend::kErrorServiceDeviceNotFound)); |
EXPECT_CALL(*token_fetcher_.get(), FetchToken()).Times(1); |
@@ -216,7 +218,7 @@ TEST_F(CloudPolicyControllerTest, DeviceNotFound) { |
TEST_F(CloudPolicyControllerTest, DeviceIdConflict) { |
data_store_->SetupForTesting("device_token", "device_id", |
"me@you.com", "auth", true); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _, _)).WillOnce( |
MockDeviceManagementBackendFailPolicy( |
DeviceManagementBackend::kErrorServiceDeviceIdConflict)); |
EXPECT_CALL(*token_fetcher_.get(), FetchToken()).Times(1); |
@@ -230,7 +232,7 @@ TEST_F(CloudPolicyControllerTest, DeviceIdConflict) { |
TEST_F(CloudPolicyControllerTest, NoLongerManaged) { |
data_store_->SetupForTesting("device_token", "device_id", |
"who@what.com", "auth", true); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _, _)).WillOnce( |
MockDeviceManagementBackendFailPolicy( |
DeviceManagementBackend::kErrorServiceManagementNotSupported)); |
EXPECT_CALL(*token_fetcher_.get(), SetUnmanagedState()).Times(1); |
@@ -244,7 +246,7 @@ TEST_F(CloudPolicyControllerTest, NoLongerManaged) { |
TEST_F(CloudPolicyControllerTest, InvalidSerialNumber) { |
data_store_->SetupForTesting("device_token", "device_id", |
"who@what.com", "auth", true); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _, _)).WillOnce( |
MockDeviceManagementBackendFailPolicy( |
DeviceManagementBackend::kErrorServiceInvalidSerialNumber)); |
EXPECT_CALL(*token_fetcher_.get(), SetSerialNumberInvalidState()).Times(1); |
@@ -286,7 +288,7 @@ TEST_F(CloudPolicyControllerTest, SetFetchingDoneAfterPolicyFetch) { |
CreateNewWaitingCache(); |
data_store_->SetupForTesting("device_token", "device_id", |
"user@enterprise.com", "auth", true); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _, _)).WillOnce(DoAll( |
InvokeWithoutArgs(this, &CloudPolicyControllerTest::StopMessageLoop), |
MockDeviceManagementBackendSucceedSpdyCloudPolicy())); |
CreateNewController(); |
@@ -299,7 +301,7 @@ TEST_F(CloudPolicyControllerTest, SetFetchingDoneAfterPolicyFetchFails) { |
CreateNewWaitingCache(); |
data_store_->SetupForTesting("device_token", "device_id", |
"user@enterprise.com", "auth", true); |
- EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _)).WillOnce(DoAll( |
+ EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _, _, _)).WillOnce(DoAll( |
InvokeWithoutArgs(this, &CloudPolicyControllerTest::StopMessageLoop), |
MockDeviceManagementBackendFailPolicy( |
DeviceManagementBackend::kErrorRequestFailed))); |