| Index: remoting/webapp/crd/js/dns_blackhole_checker_unittest.js
|
| diff --git a/remoting/webapp/crd/js/dns_blackhole_checker_unittest.js b/remoting/webapp/crd/js/dns_blackhole_checker_unittest.js
|
| index dafa2c2bf997bf3d6c8b4c235ed7123a94928983..6c553458d8bccca3ed07ce71a33716fe7199f056 100644
|
| --- a/remoting/webapp/crd/js/dns_blackhole_checker_unittest.js
|
| +++ b/remoting/webapp/crd/js/dns_blackhole_checker_unittest.js
|
| @@ -125,7 +125,7 @@ test('blocked',
|
| fakeXhrs[0].respond(400);
|
| sinon.assert.calledWith(onStateChange,
|
| remoting.SignalStrategy.State.FAILED);
|
| - equal(checker.getError().tag, remoting.Error.Tag.NOT_AUTHORIZED);
|
| + equal(checker.getError().getTag(), remoting.Error.Tag.NOT_AUTHORIZED);
|
| onStateChange.reset();
|
|
|
| [
|
| @@ -163,7 +163,7 @@ test('blocked after connected',
|
| fakeXhrs[0].respond(400);
|
| sinon.assert.calledWith(onStateChange,
|
| remoting.SignalStrategy.State.FAILED);
|
| - equal(checker.getError().tag, remoting.Error.Tag.NOT_AUTHORIZED);
|
| + ok(checker.getError().hasTag(remoting.Error.Tag.NOT_AUTHORIZED));
|
| }
|
| );
|
|
|
|
|