| Index: components/password_manager/content/browser/credential_manager_dispatcher_unittest.cc
|
| diff --git a/components/password_manager/content/browser/credential_manager_dispatcher_unittest.cc b/components/password_manager/content/browser/credential_manager_dispatcher_unittest.cc
|
| index 280b3484a45ce67e6b81c9993a96604e23a7c350..56452f496916367321cd7a2ff383b5f4ab3e3634 100644
|
| --- a/components/password_manager/content/browser/credential_manager_dispatcher_unittest.cc
|
| +++ b/components/password_manager/content/browser/credential_manager_dispatcher_unittest.cc
|
| @@ -333,7 +333,7 @@ TEST_F(CredentialManagerDispatcherTest,
|
| EXPECT_TRUE(message);
|
| CredentialManagerMsg_SendCredential::Param param;
|
| CredentialManagerMsg_SendCredential::Read(message, ¶m);
|
| - EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_EMPTY, get<1>(param).type);
|
| + EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_EMPTY, base::get<1>(param).type);
|
| process()->sink().ClearMessages();
|
| }
|
|
|
| @@ -361,7 +361,7 @@ TEST_F(CredentialManagerDispatcherTest,
|
| EXPECT_TRUE(message);
|
| CredentialManagerMsg_SendCredential::Param param;
|
| CredentialManagerMsg_SendCredential::Read(message, ¶m);
|
| - EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_EMPTY, get<1>(param).type);
|
| + EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_EMPTY, base::get<1>(param).type);
|
| process()->sink().ClearMessages();
|
| }
|
|
|
| @@ -403,7 +403,8 @@ TEST_F(
|
| EXPECT_TRUE(message);
|
| CredentialManagerMsg_SendCredential::Param send_param;
|
| CredentialManagerMsg_SendCredential::Read(message, &send_param);
|
| - EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_EMPTY, get<1>(send_param).type);
|
| + EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_EMPTY,
|
| + base::get<1>(send_param).type);
|
| }
|
|
|
| TEST_F(CredentialManagerDispatcherTest,
|
| @@ -425,7 +426,8 @@ TEST_F(CredentialManagerDispatcherTest,
|
| EXPECT_TRUE(message);
|
| CredentialManagerMsg_SendCredential::Param send_param;
|
| CredentialManagerMsg_SendCredential::Read(message, &send_param);
|
| - EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_LOCAL, get<1>(send_param).type);
|
| + EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_LOCAL,
|
| + base::get<1>(send_param).type);
|
| }
|
|
|
| TEST_F(CredentialManagerDispatcherTest,
|
| @@ -450,7 +452,8 @@ TEST_F(CredentialManagerDispatcherTest,
|
| CredentialManagerMsg_SendCredential::Read(message, &send_param);
|
|
|
| // With two items in the password store, we shouldn't get credentials back.
|
| - EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_EMPTY, get<1>(send_param).type);
|
| + EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_EMPTY,
|
| + base::get<1>(send_param).type);
|
| }
|
|
|
| TEST_F(CredentialManagerDispatcherTest,
|
| @@ -477,10 +480,12 @@ TEST_F(CredentialManagerDispatcherTest,
|
|
|
| // We should get |origin_path_form_| back, as |form_| is marked as skipping
|
| // zero-click.
|
| - EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_LOCAL, get<1>(send_param).type);
|
| - EXPECT_EQ(origin_path_form_.username_value, get<1>(send_param).id);
|
| - EXPECT_EQ(origin_path_form_.display_name, get<1>(send_param).name);
|
| - EXPECT_EQ(origin_path_form_.password_value, get<1>(send_param).password);
|
| + EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_LOCAL,
|
| + base::get<1>(send_param).type);
|
| + EXPECT_EQ(origin_path_form_.username_value, base::get<1>(send_param).id);
|
| + EXPECT_EQ(origin_path_form_.display_name, base::get<1>(send_param).name);
|
| + EXPECT_EQ(origin_path_form_.password_value,
|
| + base::get<1>(send_param).password);
|
| }
|
|
|
| TEST_F(CredentialManagerDispatcherTest,
|
| @@ -508,7 +513,8 @@ TEST_F(CredentialManagerDispatcherTest,
|
|
|
| // We only have cross-origin zero-click credentials; they should not be
|
| // returned.
|
| - EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_EMPTY, get<1>(send_param).type);
|
| + EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_EMPTY,
|
| + base::get<1>(send_param).type);
|
| }
|
|
|
| TEST_F(CredentialManagerDispatcherTest,
|
| @@ -533,7 +539,7 @@ TEST_F(CredentialManagerDispatcherTest,
|
| CredentialManagerMsg_RejectCredentialRequest::Param reject_param;
|
| CredentialManagerMsg_RejectCredentialRequest::Read(message, &reject_param);
|
| EXPECT_EQ(blink::WebCredentialManagerError::ErrorTypePendingRequest,
|
| - get<1>(reject_param));
|
| + base::get<1>(reject_param));
|
| EXPECT_CALL(*client_, PromptUserToChooseCredentialsPtr(_, _, _, _))
|
| .Times(testing::Exactly(1));
|
| EXPECT_CALL(*client_, NotifyUserAutoSigninPtr(_)).Times(testing::Exactly(0));
|
| @@ -549,7 +555,8 @@ TEST_F(CredentialManagerDispatcherTest,
|
| EXPECT_TRUE(message);
|
| CredentialManagerMsg_SendCredential::Param send_param;
|
| CredentialManagerMsg_SendCredential::Read(message, &send_param);
|
| - EXPECT_NE(CredentialType::CREDENTIAL_TYPE_EMPTY, get<1>(send_param).type);
|
| + EXPECT_NE(CredentialType::CREDENTIAL_TYPE_EMPTY,
|
| + base::get<1>(send_param).type);
|
| process()->sink().ClearMessages();
|
| }
|
|
|
| @@ -616,7 +623,7 @@ TEST_F(CredentialManagerDispatcherTest, IncognitoZeroClickRequestCredential) {
|
| ASSERT_TRUE(message);
|
| CredentialManagerMsg_SendCredential::Param param;
|
| CredentialManagerMsg_SendCredential::Read(message, ¶m);
|
| - EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_EMPTY, get<1>(param).type);
|
| + EXPECT_EQ(CredentialType::CREDENTIAL_TYPE_EMPTY, base::get<1>(param).type);
|
| }
|
|
|
| } // namespace password_manager
|
|
|