| Index: chrome/browser/extensions/api/platform_keys/platform_keys_apitest_nss.cc
|
| diff --git a/chrome/browser/extensions/api/platform_keys/platform_keys_apitest_nss.cc b/chrome/browser/extensions/api/platform_keys/platform_keys_apitest_nss.cc
|
| index 0dc0b512fcfb19519a581e50de0646e8a3fab6ab..52269dfde93b8fc670892717f3c46b886f463fac 100644
|
| --- a/chrome/browser/extensions/api/platform_keys/platform_keys_apitest_nss.cc
|
| +++ b/chrome/browser/extensions/api/platform_keys/platform_keys_apitest_nss.cc
|
| @@ -396,7 +396,7 @@ IN_PROC_BROWSER_TEST_P(ManagedWithoutPermissionPlatformKeysTest,
|
| // To verify that the user is not prompted for any certificate selection,
|
| // set up a delegate that fails on any invocation.
|
| GetPlatformKeysService()->SetSelectDelegate(
|
| - base::WrapUnique(new TestSelectDelegate(net::CertificateList())));
|
| + base::MakeUnique<TestSelectDelegate>(net::CertificateList()));
|
|
|
| ASSERT_TRUE(RunExtensionTest("managedProfile")) << message_;
|
| }
|
| @@ -433,7 +433,7 @@ IN_PROC_BROWSER_TEST_P(ManagedWithPermissionPlatformKeysTest,
|
| certs.push_back(client_cert1_);
|
|
|
| GetPlatformKeysService()->SetSelectDelegate(
|
| - base::WrapUnique(new TestSelectDelegate(certs)));
|
| + base::MakeUnique<TestSelectDelegate>(certs));
|
|
|
| ASSERT_TRUE(RunExtensionTest("corporateKeyWithPermissionTests")) << message_;
|
| }
|
| @@ -444,7 +444,7 @@ IN_PROC_BROWSER_TEST_P(ManagedWithPermissionPlatformKeysTest,
|
| // As the profile is managed, the user must not be able to grant any
|
| // certificate permission. Set up a delegate that fails on any invocation.
|
| GetPlatformKeysService()->SetSelectDelegate(
|
| - base::WrapUnique(new TestSelectDelegate(net::CertificateList())));
|
| + base::MakeUnique<TestSelectDelegate>(net::CertificateList()));
|
|
|
| ASSERT_TRUE(RunExtensionTest("policyDoesGrantAccessToNonCorporateKey"))
|
| << message_;
|
|
|