Index: chrome/browser/policy/policy_network_browsertest.cc |
diff --git a/chrome/browser/policy/policy_network_browsertest.cc b/chrome/browser/policy/policy_network_browsertest.cc |
index faf74668066e86623704188a1dd62a5fa8564c28..38aca7466b7e6e60c71da4104e95ecf62d70637c 100644 |
--- a/chrome/browser/policy/policy_network_browsertest.cc |
+++ b/chrome/browser/policy/policy_network_browsertest.cc |
@@ -127,8 +127,8 @@ class QuicAllowedPolicyIsFalse: public QuicAllowedPolicyTestBase { |
protected: |
void GetQuicAllowedPolicy(PolicyMap* values) override { |
values->Set(key::kQuicAllowed, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_MACHINE, |
- POLICY_SOURCE_CLOUD, |
- base::MakeUnique<base::FundamentalValue>(false), nullptr); |
+ POLICY_SOURCE_CLOUD, base::MakeUnique<base::Value>(false), |
+ nullptr); |
} |
private: |
@@ -149,8 +149,8 @@ class QuicAllowedPolicyIsTrue: public QuicAllowedPolicyTestBase { |
protected: |
void GetQuicAllowedPolicy(PolicyMap* values) override { |
values->Set(key::kQuicAllowed, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_MACHINE, |
- POLICY_SOURCE_CLOUD, |
- base::MakeUnique<base::FundamentalValue>(true), nullptr); |
+ POLICY_SOURCE_CLOUD, base::MakeUnique<base::Value>(true), |
+ nullptr); |
} |
private: |
@@ -247,8 +247,8 @@ class QuicAllowedPolicyDynamicTest : public InProcessBrowserTest { |
bool value) { |
PolicyMap policy_map; |
policy_map.Set(key::kQuicAllowed, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- POLICY_SOURCE_CLOUD, |
- base::MakeUnique<base::FundamentalValue>(value), nullptr); |
+ POLICY_SOURCE_CLOUD, base::MakeUnique<base::Value>(value), |
+ nullptr); |
provider->UpdateChromePolicy(policy_map); |
base::RunLoop().RunUntilIdle(); |
} |