Index: chrome/browser/sync/engine/apply_updates_command_unittest.cc |
diff --git a/chrome/browser/sync/engine/apply_updates_command_unittest.cc b/chrome/browser/sync/engine/apply_updates_command_unittest.cc |
index cadc14fe77963d49fa592f18d1a26970091db6b3..a70f17ebf67ce4c96466090d5d86351f0e46fcb8 100644 |
--- a/chrome/browser/sync/engine/apply_updates_command_unittest.cc |
+++ b/chrome/browser/sync/engine/apply_updates_command_unittest.cc |
@@ -426,7 +426,7 @@ TEST_F(ApplyUpdatesCommandTest, NigoriUpdate) { |
// Storing the cryptographer separately is bad, but for this test we |
// know it's safe. |
Cryptographer* cryptographer; |
- syncable::ModelEnumSet encrypted_types; |
+ syncable::ModelTypeSet encrypted_types; |
encrypted_types.Put(syncable::PASSWORDS); |
encrypted_types.Put(syncable::NIGORI); |
{ |
@@ -471,14 +471,14 @@ TEST_F(ApplyUpdatesCommandTest, NigoriUpdate) { |
EXPECT_TRUE(cryptographer->has_pending_keys()); |
EXPECT_TRUE( |
cryptographer->GetEncryptedTypes() |
- .Equals(syncable::ModelEnumSet::All())); |
+ .Equals(syncable::ModelTypeSet::All())); |
} |
TEST_F(ApplyUpdatesCommandTest, NigoriUpdateForDisabledTypes) { |
// Storing the cryptographer separately is bad, but for this test we |
// know it's safe. |
Cryptographer* cryptographer; |
- syncable::ModelEnumSet encrypted_types; |
+ syncable::ModelTypeSet encrypted_types; |
encrypted_types.Put(syncable::PASSWORDS); |
encrypted_types.Put(syncable::NIGORI); |
{ |
@@ -525,14 +525,14 @@ TEST_F(ApplyUpdatesCommandTest, NigoriUpdateForDisabledTypes) { |
EXPECT_TRUE(cryptographer->has_pending_keys()); |
EXPECT_TRUE( |
cryptographer->GetEncryptedTypes() |
- .Equals(syncable::ModelEnumSet::All())); |
+ .Equals(syncable::ModelTypeSet::All())); |
} |
TEST_F(ApplyUpdatesCommandTest, EncryptUnsyncedChanges) { |
// Storing the cryptographer separately is bad, but for this test we |
// know it's safe. |
Cryptographer* cryptographer; |
- syncable::ModelEnumSet encrypted_types; |
+ syncable::ModelTypeSet encrypted_types; |
encrypted_types.Put(syncable::PASSWORDS); |
encrypted_types.Put(syncable::NIGORI); |
{ |
@@ -621,7 +621,7 @@ TEST_F(ApplyUpdatesCommandTest, EncryptUnsyncedChanges) { |
// If ProcessUnsyncedChangesForEncryption worked, all our unsynced changes |
// should be encrypted now. |
- EXPECT_TRUE(syncable::ModelEnumSet::All().Equals( |
+ EXPECT_TRUE(syncable::ModelTypeSet::All().Equals( |
cryptographer->GetEncryptedTypes())); |
EXPECT_TRUE(VerifyUnsyncedChangesAreEncrypted(&trans, encrypted_types)); |
@@ -635,7 +635,7 @@ TEST_F(ApplyUpdatesCommandTest, CannotEncryptUnsyncedChanges) { |
// Storing the cryptographer separately is bad, but for this test we |
// know it's safe. |
Cryptographer* cryptographer; |
- syncable::ModelEnumSet encrypted_types; |
+ syncable::ModelTypeSet encrypted_types; |
encrypted_types.Put(syncable::PASSWORDS); |
encrypted_types.Put(syncable::NIGORI); |
{ |
@@ -733,7 +733,7 @@ TEST_F(ApplyUpdatesCommandTest, CannotEncryptUnsyncedChanges) { |
encrypted_types.Put(syncable::BOOKMARKS); |
EXPECT_TRUE( |
cryptographer->GetEncryptedTypes().Equals( |
- syncable::ModelEnumSet().All())); |
+ syncable::ModelTypeSet().All())); |
Syncer::UnsyncedMetaHandles handles; |
SyncerUtil::GetUnsyncedEntries(&trans, &handles); |