Index: chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc |
diff --git a/chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc b/chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc |
index b62bca779356d12add3af6a55841c0638ddb4bf4..66701c385606e038921dde605c7d1ebd3d0ccd01 100644 |
--- a/chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc |
+++ b/chrome/browser/chromeos/policy/network_configuration_updater_impl_cros_unittest.cc |
@@ -175,7 +175,7 @@ TEST_F(NetworkConfigurationUpdaterTest, PolicyIsValidatedAndRepaired) { |
EXPECT_CALL(network_library_, LoadOncNetworks(_, _)); |
StrictMock<chromeos::MockCertificateHandler>* certificate_handler = |
new StrictMock<chromeos::MockCertificateHandler>(); |
- EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _)); |
+ EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _, _)); |
NetworkConfigurationUpdaterImplCros updater( |
policy_service_.get(), |
@@ -191,7 +191,7 @@ TEST_F(NetworkConfigurationUpdaterTest, PolicyIsValidatedAndRepaired) { |
EXPECT_CALL(network_library_, LoadOncNetworks( |
IsEqualTo(network_configs_repaired), |
onc::ONC_SOURCE_USER_POLICY)); |
- EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _)).Times(2); |
+ EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _, _)).Times(2); |
EXPECT_CALL(network_library_, RemoveNetworkProfileObserver(_)); |
@@ -235,7 +235,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, InitialUpdates) { |
StrictMock<chromeos::MockCertificateHandler>* certificate_handler = |
new StrictMock<chromeos::MockCertificateHandler>(); |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
- IsEqualTo(device_certs), onc::ONC_SOURCE_DEVICE_POLICY, _)); |
+ IsEqualTo(device_certs), onc::ONC_SOURCE_DEVICE_POLICY, _, _)); |
NetworkConfigurationUpdaterImplCros updater( |
policy_service_.get(), |
@@ -249,12 +249,12 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, InitialUpdates) { |
EXPECT_CALL(network_library_, LoadOncNetworks( |
IsEqualTo(device_networks), onc::ONC_SOURCE_DEVICE_POLICY)); |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
- IsEqualTo(device_certs), onc::ONC_SOURCE_DEVICE_POLICY, _)); |
+ IsEqualTo(device_certs), onc::ONC_SOURCE_DEVICE_POLICY, _, _)); |
EXPECT_CALL(network_library_, LoadOncNetworks( |
IsEqualTo(user_networks), onc::ONC_SOURCE_USER_POLICY)); |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
- IsEqualTo(user_certs), onc::ONC_SOURCE_USER_POLICY, _)); |
+ IsEqualTo(user_certs), onc::ONC_SOURCE_USER_POLICY, _, _)); |
EXPECT_CALL(network_library_, RemoveNetworkProfileObserver(_)); |
@@ -279,7 +279,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, |
EXPECT_CALL(network_library_, LoadOncNetworks(_, _)).Times(AnyNumber()); |
StrictMock<chromeos::MockCertificateHandler>* certificate_handler = |
new StrictMock<chromeos::MockCertificateHandler>(); |
- EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _)) |
+ EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _, _)) |
.WillRepeatedly(SetCertificateList(empty_cert_list)); |
NetworkConfigurationUpdaterImplCros updater( |
policy_service_.get(), |
@@ -302,11 +302,11 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, |
// Certificates with the "Web" trust flag set should be forwarded to the |
// trust provider. |
EXPECT_CALL(network_library_, LoadOncNetworks(_, _)); |
- EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _)) |
+ EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _, _)) |
.WillRepeatedly(SetCertificateList(empty_cert_list)); |
onc::ONCSource current_source = NameToONCSource(GetParam()); |
EXPECT_CALL(network_library_, LoadOncNetworks(_, current_source)); |
- EXPECT_CALL(*certificate_handler, ImportCertificates(_, current_source, _)) |
+ EXPECT_CALL(*certificate_handler, ImportCertificates(_, current_source, _, _)) |
.WillRepeatedly(SetCertificateList(cert_list)); |
// Trigger a new policy load, and spin the IO message loop to pass the |
// certificates to the |trust_provider| on the IO thread. |
@@ -336,7 +336,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, PolicyChange) { |
.Times(AnyNumber()); |
StrictMock<chromeos::MockCertificateHandler>* certificate_handler = |
new StrictMock<chromeos::MockCertificateHandler>(); |
- EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _)) |
+ EXPECT_CALL(*certificate_handler, ImportCertificates(_, _, _, _)) |
.Times(AnyNumber()); |
NetworkConfigurationUpdaterImplCros updater( |
policy_service_.get(), |
@@ -350,7 +350,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, PolicyChange) { |
EXPECT_CALL(network_library_, LoadOncNetworks( |
IsEqualTo(fake_network_configs_.get()), NameToONCSource(GetParam()))); |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
- IsEqualTo(fake_certificates_.get()), NameToONCSource(GetParam()), _)); |
+ IsEqualTo(fake_certificates_.get()), NameToONCSource(GetParam()), _, _)); |
// In the current implementation, we always apply both policies. |
EXPECT_CALL(network_library_, LoadOncNetworks( |
@@ -359,7 +359,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, PolicyChange) { |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
IsEqualTo(empty_certificates_.get()), |
Ne(NameToONCSource(GetParam())), |
- _)); |
+ _, _)); |
PolicyMap policy; |
policy.Set(GetParam(), POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
@@ -376,7 +376,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, PolicyChange) { |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
IsEqualTo(empty_certificates_.get()), |
onc::ONC_SOURCE_DEVICE_POLICY, |
- _)); |
+ _, _)); |
EXPECT_CALL(network_library_, LoadOncNetworks( |
IsEqualTo(empty_network_configs_.get()), |
@@ -384,7 +384,7 @@ TEST_P(NetworkConfigurationUpdaterTestWithParam, PolicyChange) { |
EXPECT_CALL(*certificate_handler, ImportCertificates( |
IsEqualTo(empty_certificates_.get()), |
onc::ONC_SOURCE_USER_POLICY, |
- _)); |
+ _, _)); |
EXPECT_CALL(network_library_, RemoveNetworkProfileObserver(_)); |