| Index: sandbox/linux/services/credentials_unittest.cc
 | 
| diff --git a/sandbox/linux/services/credentials_unittest.cc b/sandbox/linux/services/credentials_unittest.cc
 | 
| index db19f6fee561073c1dc7a0f0ba7dfc29b91abd65..6b93c86c3ecbc2104282b50da80e32f3d9ad06d3 100644
 | 
| --- a/sandbox/linux/services/credentials_unittest.cc
 | 
| +++ b/sandbox/linux/services/credentials_unittest.cc
 | 
| @@ -177,16 +177,17 @@ SANDBOX_TEST(Credentials, SetCapabilities) {
 | 
|  
 | 
|    base::ScopedFD proc_fd(ProcUtil::OpenProc());
 | 
|  
 | 
| -  CHECK(Credentials::HasCapability(LinuxCapability::kCapSysAdmin));
 | 
| -  CHECK(Credentials::HasCapability(LinuxCapability::kCapSysChroot));
 | 
| +  CHECK(Credentials::HasCapability(Credentials::Capability::SYS_ADMIN));
 | 
| +  CHECK(Credentials::HasCapability(Credentials::Capability::SYS_CHROOT));
 | 
|  
 | 
| -  const std::vector<LinuxCapability> caps = {LinuxCapability::kCapSysChroot};
 | 
| +  std::vector<Credentials::Capability> caps;
 | 
| +  caps.push_back(Credentials::Capability::SYS_CHROOT);
 | 
|    CHECK(Credentials::SetCapabilities(proc_fd.get(), caps));
 | 
|  
 | 
| -  CHECK(!Credentials::HasCapability(LinuxCapability::kCapSysAdmin));
 | 
| -  CHECK(Credentials::HasCapability(LinuxCapability::kCapSysChroot));
 | 
| +  CHECK(!Credentials::HasCapability(Credentials::Capability::SYS_ADMIN));
 | 
| +  CHECK(Credentials::HasCapability(Credentials::Capability::SYS_CHROOT));
 | 
|  
 | 
| -  const std::vector<LinuxCapability> no_caps;
 | 
| +  const std::vector<Credentials::Capability> no_caps;
 | 
|    CHECK(Credentials::SetCapabilities(proc_fd.get(), no_caps));
 | 
|    CHECK(!Credentials::HasAnyCapability());
 | 
|  }
 | 
| @@ -198,10 +199,11 @@ SANDBOX_TEST(Credentials, SetCapabilitiesAndChroot) {
 | 
|  
 | 
|    base::ScopedFD proc_fd(ProcUtil::OpenProc());
 | 
|  
 | 
| -  CHECK(Credentials::HasCapability(LinuxCapability::kCapSysChroot));
 | 
| +  CHECK(Credentials::HasCapability(Credentials::Capability::SYS_CHROOT));
 | 
|    PCHECK(chroot("/") == 0);
 | 
|  
 | 
| -  const std::vector<LinuxCapability> caps = {LinuxCapability::kCapSysChroot};
 | 
| +  std::vector<Credentials::Capability> caps;
 | 
| +  caps.push_back(Credentials::Capability::SYS_CHROOT);
 | 
|    CHECK(Credentials::SetCapabilities(proc_fd.get(), caps));
 | 
|    PCHECK(chroot("/") == 0);
 | 
|  
 | 
| @@ -216,7 +218,8 @@ SANDBOX_TEST(Credentials, SetCapabilitiesMatchesLibCap2) {
 | 
|  
 | 
|    base::ScopedFD proc_fd(ProcUtil::OpenProc());
 | 
|  
 | 
| -  const std::vector<LinuxCapability> caps = {LinuxCapability::kCapSysChroot};
 | 
| +  std::vector<Credentials::Capability> caps;
 | 
| +  caps.push_back(Credentials::Capability::SYS_CHROOT);
 | 
|    CHECK(Credentials::SetCapabilities(proc_fd.get(), caps));
 | 
|  
 | 
|    ScopedCap actual_cap(cap_get_proc());
 | 
| 
 |