| Index: chrome/browser/chromeos/policy/user_cloud_policy_store_chromeos_unittest.cc
|
| diff --git a/chrome/browser/chromeos/policy/user_cloud_policy_store_chromeos_unittest.cc b/chrome/browser/chromeos/policy/user_cloud_policy_store_chromeos_unittest.cc
|
| index 9cb2b9c3c116ed1483b4bc3b4721d2ce7cf0ef43..ec7341850a00d840ed18509bf9e585a007507cd2 100644
|
| --- a/chrome/browser/chromeos/policy/user_cloud_policy_store_chromeos_unittest.cc
|
| +++ b/chrome/browser/chromeos/policy/user_cloud_policy_store_chromeos_unittest.cc
|
| @@ -239,7 +239,7 @@ class UserCloudPolicyStoreChromeOSTest : public testing::Test {
|
|
|
| TEST_F(UserCloudPolicyStoreChromeOSTest, InitialStore) {
|
| // Start without any public key to trigger the initial key checks.
|
| - ASSERT_TRUE(file_util::Delete(user_policy_key_file(), false));
|
| + ASSERT_TRUE(base::Delete(user_policy_key_file(), false));
|
| // Make the policy blob contain a new public key.
|
| policy_.set_new_signing_key(PolicyBuilder::CreateTestNewSigningKey());
|
| policy_.Build();
|
| @@ -383,7 +383,7 @@ TEST_F(UserCloudPolicyStoreChromeOSTest, LoadValidationError) {
|
|
|
| TEST_F(UserCloudPolicyStoreChromeOSTest, LoadNoKey) {
|
| // The loaded policy can't be verified without the public key.
|
| - ASSERT_TRUE(file_util::Delete(user_policy_key_file(), false));
|
| + ASSERT_TRUE(base::Delete(user_policy_key_file(), false));
|
| ExpectError(CloudPolicyStore::STATUS_VALIDATION_ERROR);
|
| ASSERT_NO_FATAL_FAILURE(PerformPolicyLoad(policy_.GetBlob()));
|
| VerifyStoreHasValidationError();
|
| @@ -480,7 +480,7 @@ TEST_F(UserCloudPolicyStoreChromeOSTest, MigrationNoPolicy) {
|
|
|
| TEST_F(UserCloudPolicyStoreChromeOSTest, MigrationAndStoreNew) {
|
| // Start without an existing public key.
|
| - ASSERT_TRUE(file_util::Delete(user_policy_key_file(), false));
|
| + ASSERT_TRUE(base::Delete(user_policy_key_file(), false));
|
|
|
| std::string data;
|
| em::CachedCloudPolicyResponse cached_policy;
|
|
|