Index: chrome/browser/chromeos/cros/network_library_unittest.cc |
diff --git a/chrome/browser/chromeos/cros/network_library_unittest.cc b/chrome/browser/chromeos/cros/network_library_unittest.cc |
index 26efa0145f04d58cc447cc963acc6ab354849abe..c5e8949acde9f06bef39751b94bcbfe3774a2fe7 100644 |
--- a/chrome/browser/chromeos/cros/network_library_unittest.cc |
+++ b/chrome/browser/chromeos/cros/network_library_unittest.cc |
@@ -17,11 +17,11 @@ |
#include "base/path_service.h" |
#include "chrome/browser/chromeos/cros/cros_library.h" |
#include "chrome/browser/chromeos/cros/network_library.h" |
-#include "chrome/browser/chromeos/cros/onc_constants.h" |
#include "chrome/browser/chromeos/cros/onc_network_parser.h" |
-#include "chrome/browser/chromeos/network_settings/onc_certificate_importer.h" |
-#include "chrome/browser/chromeos/network_settings/onc_utils.h" |
#include "chrome/common/chrome_paths.h" |
+#include "chromeos/network/onc/onc_certificate_importer.h" |
+#include "chromeos/network/onc/onc_constants.h" |
+#include "chromeos/network/onc/onc_utils.h" |
#include "crypto/nss_util.h" |
#include "net/base/crypto_module.h" |
#include "net/base/nss_cert_database.h" |
@@ -156,7 +156,6 @@ class NetworkLibraryStubTest : public testing::Test { |
scoped_ptr<base::ListValue>* certificates, |
scoped_ptr<base::ListValue>* network_configs) { |
FilePath path; |
- std::string error; |
PathService::Get(chrome::DIR_TEST_DATA, &path); |
path = path.AppendASCII("chromeos").AppendASCII("cros").Append(filename); |
ASSERT_TRUE(file_util::PathExists(path)) |
@@ -166,9 +165,8 @@ class NetworkLibraryStubTest : public testing::Test { |
<< "Unable to read test data file " << path.value(); |
scoped_ptr<base::DictionaryValue> root = |
- onc::ReadDictionaryFromJson(contents, &error); |
- CHECK(root.get() != NULL) << "ONC is not a valid json dictionary: " |
- << error; |
+ onc::ReadDictionaryFromJson(contents); |
+ CHECK(root.get() != NULL) << "ONC is not a valid JSON dictionary."; |
base::ListValue* certificates_ptr; |
CHECK(root->GetListWithoutPathExpansion(onc::kCertificates, |
@@ -304,12 +302,13 @@ TEST_F(NetworkLibraryStubTest, NetworkConnectOncWifi) { |
scoped_ptr<base::ListValue> certificates; |
GetTestData("cert-pattern.onc", &certificates, &network_configs); |
- onc::CertificateImporter importer(NetworkUIData::ONC_SOURCE_USER_IMPORT, |
+ onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, |
false /* don't allow webtrust */); |
- EXPECT_TRUE(importer.ParseAndStoreCertificates(*certificates, NULL)); |
+ EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, |
+ importer.ParseAndStoreCertificates(*certificates)); |
OncNetworkParser parser(*network_configs, |
- NetworkUIData::ONC_SOURCE_USER_IMPORT); |
+ onc::ONC_SOURCE_USER_IMPORT); |
ASSERT_TRUE(parser.parse_error().empty()); |
EXPECT_EQ(1, parser.GetNetworkConfigsSize()); |
scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); |
@@ -340,12 +339,13 @@ TEST_F(NetworkLibraryStubTest, NetworkConnectOncVPN) { |
scoped_ptr<base::ListValue> certificates; |
GetTestData("cert-pattern-vpn.onc", &certificates, &network_configs); |
- onc::CertificateImporter importer(NetworkUIData::ONC_SOURCE_USER_IMPORT, |
+ onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, |
false /* don't allow webtrust */); |
- EXPECT_TRUE(importer.ParseAndStoreCertificates(*certificates, NULL)); |
+ EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, |
+ importer.ParseAndStoreCertificates(*certificates)); |
OncNetworkParser parser(*network_configs, |
- NetworkUIData::ONC_SOURCE_USER_IMPORT); |
+ onc::ONC_SOURCE_USER_IMPORT); |
ASSERT_TRUE(parser.parse_error().empty()); |
EXPECT_EQ(1, parser.GetNetworkConfigsSize()); |
scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); |