| Index: chrome/browser/policy/network_configuration_updater_unittest.cc
|
| diff --git a/chrome/browser/policy/network_configuration_updater_unittest.cc b/chrome/browser/policy/network_configuration_updater_unittest.cc
|
| index 64c47cd8531cfec788ca09f98b9201ce60817099..e1c120f291c7efe83e3df92c6ab1a505e6e63e1c 100644
|
| --- a/chrome/browser/policy/network_configuration_updater_unittest.cc
|
| +++ b/chrome/browser/policy/network_configuration_updater_unittest.cc
|
| @@ -9,6 +9,7 @@
|
| #include "chrome/browser/policy/mock_configuration_policy_provider.h"
|
| #include "chrome/browser/policy/policy_map.h"
|
| #include "chrome/browser/policy/policy_service_impl.h"
|
| +#include "chromeos/network/onc/onc_constants.h"
|
| #include "policy/policy_constants.h"
|
| #include "testing/gmock/include/gmock/gmock.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
| @@ -42,13 +43,13 @@ class NetworkConfigurationUpdaterTest
|
| }
|
|
|
| // Maps configuration policy name to corresponding ONC source.
|
| - static chromeos::NetworkUIData::ONCSource NameToONCSource(
|
| + static chromeos::onc::ONCSource NameToONCSource(
|
| const std::string& name) {
|
| if (name == key::kDeviceOpenNetworkConfiguration)
|
| - return chromeos::NetworkUIData::ONC_SOURCE_DEVICE_POLICY;
|
| + return chromeos::onc::ONC_SOURCE_DEVICE_POLICY;
|
| if (name == key::kOpenNetworkConfiguration)
|
| - return chromeos::NetworkUIData::ONC_SOURCE_USER_POLICY;
|
| - return chromeos::NetworkUIData::ONC_SOURCE_NONE;
|
| + return chromeos::onc::ONC_SOURCE_USER_POLICY;
|
| + return chromeos::onc::ONC_SOURCE_NONE;
|
| }
|
|
|
| chromeos::MockNetworkLibrary network_library_;
|
| @@ -69,7 +70,7 @@ TEST_P(NetworkConfigurationUpdaterTest, InitialUpdates) {
|
| const char* device_onc = GetParam() == key::kDeviceOpenNetworkConfiguration ?
|
| kFakeONC : kEmptyConfiguration;
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| - device_onc, "", chromeos::NetworkUIData::ONC_SOURCE_DEVICE_POLICY, _, _));
|
| + device_onc, "", chromeos::onc::ONC_SOURCE_DEVICE_POLICY, _));
|
|
|
| {
|
| NetworkConfigurationUpdater updater(policy_service_.get(),
|
| @@ -79,9 +80,9 @@ TEST_P(NetworkConfigurationUpdaterTest, InitialUpdates) {
|
| // After the user policy is initialized, we always push both policies to the
|
| // NetworkLibrary.
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| - kFakeONC, "", NameToONCSource(GetParam()), _, _));
|
| + kFakeONC, "", NameToONCSource(GetParam()), _));
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| - kEmptyConfiguration, "", Ne(NameToONCSource(GetParam())), _, _));
|
| + kEmptyConfiguration, "", Ne(NameToONCSource(GetParam())), _));
|
|
|
| EXPECT_CALL(network_library_, RemoveNetworkProfileObserver(_));
|
|
|
| @@ -95,7 +96,7 @@ TEST_P(NetworkConfigurationUpdaterTest, AllowWebTrust) {
|
| EXPECT_CALL(network_library_, AddNetworkProfileObserver(_));
|
|
|
| // Initially web trust is disabled.
|
| - EXPECT_CALL(network_library_, LoadOncNetworks(_, _, _, false, _))
|
| + EXPECT_CALL(network_library_, LoadOncNetworks(_, _, _, false))
|
| .Times(AtLeast(0));
|
| NetworkConfigurationUpdater updater(policy_service_.get(),
|
| &network_library_);
|
| @@ -103,7 +104,7 @@ TEST_P(NetworkConfigurationUpdaterTest, AllowWebTrust) {
|
| Mock::VerifyAndClearExpectations(&network_library_);
|
|
|
| // Web trust should be forwarded to LoadOncNetworks.
|
| - EXPECT_CALL(network_library_, LoadOncNetworks(_, _, _, true, _))
|
| + EXPECT_CALL(network_library_, LoadOncNetworks(_, _, _, true))
|
| .Times(AtLeast(0));
|
|
|
| updater.set_allow_web_trust(true);
|
| @@ -124,7 +125,7 @@ TEST_P(NetworkConfigurationUpdaterTest, PolicyChange) {
|
| EXPECT_CALL(network_library_, AddNetworkProfileObserver(_));
|
|
|
| // Ignore the initial updates.
|
| - EXPECT_CALL(network_library_, LoadOncNetworks(_, _, _, _, _))
|
| + EXPECT_CALL(network_library_, LoadOncNetworks(_, _, _, _))
|
| .Times(AtLeast(0));
|
| NetworkConfigurationUpdater updater(policy_service_.get(),
|
| &network_library_);
|
| @@ -133,11 +134,11 @@ TEST_P(NetworkConfigurationUpdaterTest, PolicyChange) {
|
|
|
| // We should update if policy changes.
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| - kFakeONC, "", NameToONCSource(GetParam()), _, _));
|
| + kFakeONC, "", NameToONCSource(GetParam()), _));
|
|
|
| // In the current implementation, we always apply both policies.
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| - kEmptyConfiguration, "", Ne(NameToONCSource(GetParam())), _, _));
|
| + kEmptyConfiguration, "", Ne(NameToONCSource(GetParam())), _));
|
|
|
| PolicyMap policy;
|
| policy.Set(GetParam(), POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| @@ -149,11 +150,11 @@ TEST_P(NetworkConfigurationUpdaterTest, PolicyChange) {
|
| // implementation, we always apply both policies.
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| kEmptyConfiguration, "",
|
| - chromeos::NetworkUIData::ONC_SOURCE_DEVICE_POLICY, _, _));
|
| + chromeos::onc::ONC_SOURCE_DEVICE_POLICY, _));
|
|
|
| EXPECT_CALL(network_library_, LoadOncNetworks(
|
| kEmptyConfiguration, "",
|
| - chromeos::NetworkUIData::ONC_SOURCE_USER_POLICY, _, _));
|
| + chromeos::onc::ONC_SOURCE_USER_POLICY, _));
|
|
|
| EXPECT_CALL(network_library_, RemoveNetworkProfileObserver(_));
|
|
|
|
|