Index: chrome/browser/policy/network_configuration_updater_unittest.cc |
diff --git a/chrome/browser/policy/network_configuration_updater_unittest.cc b/chrome/browser/policy/network_configuration_updater_unittest.cc |
index e1c120f291c7efe83e3df92c6ab1a505e6e63e1c..404c95727b948ca11b71a00f66966421f90cc63b 100644 |
--- a/chrome/browser/policy/network_configuration_updater_unittest.cc |
+++ b/chrome/browser/policy/network_configuration_updater_unittest.cc |
@@ -10,6 +10,7 @@ |
#include "chrome/browser/policy/policy_map.h" |
#include "chrome/browser/policy/policy_service_impl.h" |
#include "chromeos/network/onc/onc_constants.h" |
+#include "chromeos/network/onc/onc_utils.h" |
#include "policy/policy_constants.h" |
#include "testing/gmock/include/gmock/gmock.h" |
#include "testing/gtest/include/gtest/gtest.h" |
@@ -23,8 +24,6 @@ using testing::_; |
namespace policy { |
static const char kFakeONC[] = "{ \"GUID\": \"1234\" }"; |
-static const char* kEmptyConfiguration = |
- NetworkConfigurationUpdater::kEmptyConfiguration; |
class NetworkConfigurationUpdaterTest |
: public testing::TestWithParam<const char*>{ |
@@ -68,7 +67,7 @@ TEST_P(NetworkConfigurationUpdaterTest, InitialUpdates) { |
// Initially, only the device policy is applied. The user policy is only |
// applied after the user profile was initialized. |
const char* device_onc = GetParam() == key::kDeviceOpenNetworkConfiguration ? |
- kFakeONC : kEmptyConfiguration; |
+ kFakeONC : chromeos::onc::kEmptyUnencryptedConfiguration; |
EXPECT_CALL(network_library_, LoadOncNetworks( |
device_onc, "", chromeos::onc::ONC_SOURCE_DEVICE_POLICY, _)); |
@@ -82,7 +81,10 @@ TEST_P(NetworkConfigurationUpdaterTest, InitialUpdates) { |
EXPECT_CALL(network_library_, LoadOncNetworks( |
kFakeONC, "", NameToONCSource(GetParam()), _)); |
EXPECT_CALL(network_library_, LoadOncNetworks( |
- kEmptyConfiguration, "", Ne(NameToONCSource(GetParam())), _)); |
+ chromeos::onc::kEmptyUnencryptedConfiguration, |
+ "", |
+ Ne(NameToONCSource(GetParam())), |
+ _)); |
EXPECT_CALL(network_library_, RemoveNetworkProfileObserver(_)); |
@@ -138,7 +140,10 @@ TEST_P(NetworkConfigurationUpdaterTest, PolicyChange) { |
// In the current implementation, we always apply both policies. |
EXPECT_CALL(network_library_, LoadOncNetworks( |
- kEmptyConfiguration, "", Ne(NameToONCSource(GetParam())), _)); |
+ chromeos::onc::kEmptyUnencryptedConfiguration, |
+ "", |
+ Ne(NameToONCSource(GetParam())), |
+ _)); |
PolicyMap policy; |
policy.Set(GetParam(), POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
@@ -149,11 +154,11 @@ TEST_P(NetworkConfigurationUpdaterTest, PolicyChange) { |
// Another update is expected if the policy goes away. In the current |
// implementation, we always apply both policies. |
EXPECT_CALL(network_library_, LoadOncNetworks( |
- kEmptyConfiguration, "", |
+ chromeos::onc::kEmptyUnencryptedConfiguration, "", |
chromeos::onc::ONC_SOURCE_DEVICE_POLICY, _)); |
EXPECT_CALL(network_library_, LoadOncNetworks( |
- kEmptyConfiguration, "", |
+ chromeos::onc::kEmptyUnencryptedConfiguration, "", |
chromeos::onc::ONC_SOURCE_USER_POLICY, _)); |
EXPECT_CALL(network_library_, RemoveNetworkProfileObserver(_)); |