| Index: components/policy/core/browser/configuration_policy_handler_unittest.cc
|
| diff --git a/components/policy/core/browser/configuration_policy_handler_unittest.cc b/components/policy/core/browser/configuration_policy_handler_unittest.cc
|
| index 629a5c247cade9b70dffc631178b16c4ea5701c4..5a07756f34aadc4f5afb3177f7bc7529cddd39e2 100644
|
| --- a/components/policy/core/browser/configuration_policy_handler_unittest.cc
|
| +++ b/components/policy/core/browser/configuration_policy_handler_unittest.cc
|
| @@ -85,8 +85,8 @@ TEST(StringToIntEnumListPolicyHandlerTest, CheckPolicySettings) {
|
| EXPECT_FALSE(errors.GetErrors(kTestPolicy).empty());
|
|
|
| policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::StringValue>("no list"), NULL);
|
| + POLICY_SOURCE_CLOUD, base::MakeUnique<base::Value>("no list"),
|
| + NULL);
|
| errors.Clear();
|
| EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors));
|
| EXPECT_FALSE(errors.empty());
|
| @@ -175,8 +175,8 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsClamp) {
|
| // Check that an entirely invalid value is rejected and yields an error
|
| // message.
|
| policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::StringValue>("invalid"), nullptr);
|
| + POLICY_SOURCE_CLOUD, base::MakeUnique<base::Value>("invalid"),
|
| + nullptr);
|
| errors.Clear();
|
| EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors));
|
| EXPECT_FALSE(errors.empty());
|
| @@ -231,8 +231,8 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsDontClamp) {
|
| // Check that an entirely invalid value is rejected and yields an error
|
| // message.
|
| policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::StringValue>("invalid"), nullptr);
|
| + POLICY_SOURCE_CLOUD, base::MakeUnique<base::Value>("invalid"),
|
| + nullptr);
|
| errors.Clear();
|
| EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors));
|
| EXPECT_FALSE(errors.empty());
|
| @@ -386,8 +386,8 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsClamp) {
|
| // Check that an entirely invalid value is rejected and yields an error
|
| // message.
|
| policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::StringValue>("invalid"), nullptr);
|
| + POLICY_SOURCE_CLOUD, base::MakeUnique<base::Value>("invalid"),
|
| + nullptr);
|
| errors.Clear();
|
| EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors));
|
| EXPECT_FALSE(errors.empty());
|
| @@ -443,8 +443,8 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsDontClamp) {
|
| // Check that an entirely invalid value is rejected and yields an error
|
| // message.
|
| policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::StringValue>("invalid"), nullptr);
|
| + POLICY_SOURCE_CLOUD, base::MakeUnique<base::Value>("invalid"),
|
| + nullptr);
|
| errors.Clear();
|
| EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors));
|
| EXPECT_FALSE(errors.empty());
|
|
|