Index: chrome/browser/policy/configuration_policy_pref_store_unittest.cc |
diff --git a/chrome/browser/policy/configuration_policy_pref_store_unittest.cc b/chrome/browser/policy/configuration_policy_pref_store_unittest.cc |
index 0620c9c0f52c2dd85095c3fc28af162fb8858713..b89ebdf55b6c7b27b0e670cdf4b7079021d36ff9 100644 |
--- a/chrome/browser/policy/configuration_policy_pref_store_unittest.cc |
+++ b/chrome/browser/policy/configuration_policy_pref_store_unittest.cc |
@@ -44,8 +44,6 @@ class PolicyAndPref { |
class ConfigurationPolicyPrefStoreTest : public testing::Test { |
protected: |
ConfigurationPolicyPrefStoreTest() { |
- EXPECT_CALL(provider_, ProvideInternal(_)) |
- .WillRepeatedly(CopyPolicyMap(&policy_)); |
EXPECT_CALL(provider_, IsInitializationComplete()) |
.WillRepeatedly(Return(false)); |
PolicyServiceImpl::Providers providers; |
@@ -55,7 +53,6 @@ class ConfigurationPolicyPrefStoreTest : public testing::Test { |
POLICY_LEVEL_MANDATORY); |
} |
- PolicyMap policy_; |
MockConfigurationPolicyProvider provider_; |
scoped_ptr<PolicyServiceImpl> policy_service_; |
scoped_refptr<ConfigurationPolicyPrefStore> store_; |
@@ -75,9 +72,10 @@ TEST_P(ConfigurationPolicyPrefStoreListTest, SetValue) { |
base::ListValue* in_value = new base::ListValue(); |
in_value->Append(base::Value::CreateStringValue("test1")); |
in_value->Append(base::Value::CreateStringValue("test2,")); |
- policy_.Set(GetParam().policy_name(), POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, in_value); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(GetParam().policy_name(), POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, in_value); |
+ provider_.UpdateChromePolicy(policy); |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_OK, |
store_->GetValue(GetParam().pref_name(), &value)); |
@@ -117,10 +115,11 @@ TEST_P(ConfigurationPolicyPrefStoreStringTest, GetDefault) { |
} |
TEST_P(ConfigurationPolicyPrefStoreStringTest, SetValue) { |
- policy_.Set(GetParam().policy_name(), POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, |
- base::Value::CreateStringValue("http://chromium.org")); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(GetParam().policy_name(), POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue("http://chromium.org")); |
+ provider_.UpdateChromePolicy(policy); |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_OK, |
store_->GetValue(GetParam().pref_name(), &value)); |
@@ -166,9 +165,10 @@ TEST_P(ConfigurationPolicyPrefStoreBooleanTest, GetDefault) { |
} |
TEST_P(ConfigurationPolicyPrefStoreBooleanTest, SetValue) { |
- policy_.Set(GetParam().policy_name(), POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(GetParam().policy_name(), POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false)); |
+ provider_.UpdateChromePolicy(policy); |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_OK, |
store_->GetValue(GetParam().pref_name(), &value)); |
@@ -178,9 +178,9 @@ TEST_P(ConfigurationPolicyPrefStoreBooleanTest, SetValue) { |
ASSERT_TRUE(result); |
EXPECT_FALSE(boolean_value); |
- policy_.Set(GetParam().policy_name(), POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
- provider_.NotifyPolicyUpdated(); |
+ policy.Set(GetParam().policy_name(), POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
+ provider_.UpdateChromePolicy(policy); |
value = NULL; |
EXPECT_EQ(PrefStore::READ_OK, |
store_->GetValue(GetParam().pref_name(), &value)); |
@@ -299,9 +299,10 @@ TEST_P(ConfigurationPolicyPrefStoreIntegerTest, GetDefault) { |
} |
TEST_P(ConfigurationPolicyPrefStoreIntegerTest, SetValue) { |
- policy_.Set(GetParam().policy_name(), POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateIntegerValue(2)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(GetParam().policy_name(), POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateIntegerValue(2)); |
+ provider_.UpdateChromePolicy(policy); |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_OK, |
store_->GetValue(GetParam().pref_name(), &value)); |
@@ -377,15 +378,16 @@ class ConfigurationPolicyPrefStoreProxyTest |
}; |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, ManualOptions) { |
- policy_.Set(key::kProxyBypassList, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue("http://chromium.org/override")); |
- policy_.Set(key::kProxyServer, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue("chromium.org")); |
- policy_.Set( |
+ PolicyMap policy; |
+ policy.Set(key::kProxyBypassList, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue("http://chromium.org/override")); |
+ policy.Set(key::kProxyServer, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue("chromium.org")); |
+ policy.Set( |
key::kProxyServerMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
base::Value::CreateIntegerValue( |
ProxyPolicyHandler::PROXY_MANUALLY_CONFIGURED_PROXY_SERVER_MODE)); |
- provider_.NotifyPolicyUpdated(); |
+ provider_.UpdateChromePolicy(policy); |
VerifyProxyPrefs( |
"chromium.org", "", "http://chromium.org/override", |
@@ -393,15 +395,16 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, ManualOptions) { |
} |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, ManualOptionsReversedApplyOrder) { |
- policy_.Set( |
+ PolicyMap policy; |
+ policy.Set( |
key::kProxyServerMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
base::Value::CreateIntegerValue( |
ProxyPolicyHandler::PROXY_MANUALLY_CONFIGURED_PROXY_SERVER_MODE)); |
- policy_.Set(key::kProxyBypassList, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue("http://chromium.org/override")); |
- policy_.Set(key::kProxyServer, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue("chromium.org")); |
- provider_.NotifyPolicyUpdated(); |
+ policy.Set(key::kProxyBypassList, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue("http://chromium.org/override")); |
+ policy.Set(key::kProxyServer, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue("chromium.org")); |
+ provider_.UpdateChromePolicy(policy); |
VerifyProxyPrefs( |
"chromium.org", "", "http://chromium.org/override", |
@@ -409,11 +412,12 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, ManualOptionsReversedApplyOrder) { |
} |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, ManualOptionsInvalid) { |
- policy_.Set( |
+ PolicyMap policy; |
+ policy.Set( |
key::kProxyServerMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
base::Value::CreateIntegerValue( |
ProxyPolicyHandler::PROXY_MANUALLY_CONFIGURED_PROXY_SERVER_MODE)); |
- provider_.NotifyPolicyUpdated(); |
+ provider_.UpdateChromePolicy(policy); |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_NO_VALUE, store_->GetValue(prefs::kProxy, &value)); |
@@ -421,53 +425,59 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, ManualOptionsInvalid) { |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, NoProxyServerMode) { |
- policy_.Set(key::kProxyServerMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateIntegerValue( |
- ProxyPolicyHandler::PROXY_SERVER_MODE)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kProxyServerMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateIntegerValue( |
+ ProxyPolicyHandler::PROXY_SERVER_MODE)); |
+ provider_.UpdateChromePolicy(policy); |
VerifyProxyPrefs("", "", "", ProxyPrefs::MODE_DIRECT); |
} |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, NoProxyModeName) { |
- policy_.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue(ProxyPrefs::kDirectProxyModeName)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue(ProxyPrefs::kDirectProxyModeName)); |
+ provider_.UpdateChromePolicy(policy); |
VerifyProxyPrefs("", "", "", ProxyPrefs::MODE_DIRECT); |
} |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, AutoDetectProxyServerMode) { |
- policy_.Set( |
+ PolicyMap policy; |
+ policy.Set( |
key::kProxyServerMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
base::Value::CreateIntegerValue( |
ProxyPolicyHandler::PROXY_AUTO_DETECT_PROXY_SERVER_MODE)); |
- provider_.NotifyPolicyUpdated(); |
+ provider_.UpdateChromePolicy(policy); |
VerifyProxyPrefs("", "", "", ProxyPrefs::MODE_AUTO_DETECT); |
} |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, AutoDetectProxyModeName) { |
- policy_.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue( |
- ProxyPrefs::kAutoDetectProxyModeName)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue( |
+ ProxyPrefs::kAutoDetectProxyModeName)); |
+ provider_.UpdateChromePolicy(policy); |
VerifyProxyPrefs("", "", "", ProxyPrefs::MODE_AUTO_DETECT); |
} |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, PacScriptProxyMode) { |
- policy_.Set(key::kProxyPacUrl, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue("http://short.org/proxy.pac")); |
- policy_.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue( |
- ProxyPrefs::kPacScriptProxyModeName)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kProxyPacUrl, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue("http://short.org/proxy.pac")); |
+ policy.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue( |
+ ProxyPrefs::kPacScriptProxyModeName)); |
+ provider_.UpdateChromePolicy(policy); |
VerifyProxyPrefs("", "http://short.org/proxy.pac", "", |
ProxyPrefs::MODE_PAC_SCRIPT); |
} |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, PacScriptProxyModeInvalid) { |
- policy_.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue( |
- ProxyPrefs::kPacScriptProxyModeName)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue( |
+ ProxyPrefs::kPacScriptProxyModeName)); |
+ provider_.UpdateChromePolicy(policy); |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_NO_VALUE, store_->GetValue(prefs::kProxy, &value)); |
} |
@@ -475,57 +485,62 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, PacScriptProxyModeInvalid) { |
// Regression test for http://crbug.com/78016, CPanel returns empty strings |
// for unset properties. |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, PacScriptProxyModeBug78016) { |
- policy_.Set(key::kProxyServer, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue("")); |
- policy_.Set(key::kProxyPacUrl, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue("http://short.org/proxy.pac")); |
- policy_.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue( |
- ProxyPrefs::kPacScriptProxyModeName)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kProxyServer, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue("")); |
+ policy.Set(key::kProxyPacUrl, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue("http://short.org/proxy.pac")); |
+ policy.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue( |
+ ProxyPrefs::kPacScriptProxyModeName)); |
+ provider_.UpdateChromePolicy(policy); |
VerifyProxyPrefs("", "http://short.org/proxy.pac", "", |
ProxyPrefs::MODE_PAC_SCRIPT); |
} |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, UseSystemProxyServerMode) { |
- policy_.Set(key::kProxyServerMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ PolicyMap policy; |
+ policy.Set(key::kProxyServerMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
base::Value::CreateIntegerValue( |
ProxyPolicyHandler::PROXY_USE_SYSTEM_PROXY_SERVER_MODE)); |
- provider_.NotifyPolicyUpdated(); |
+ provider_.UpdateChromePolicy(policy); |
VerifyProxyPrefs("", "", "", ProxyPrefs::MODE_SYSTEM); |
} |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, UseSystemProxyMode) { |
- policy_.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue(ProxyPrefs::kSystemProxyModeName)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue(ProxyPrefs::kSystemProxyModeName)); |
+ provider_.UpdateChromePolicy(policy); |
VerifyProxyPrefs("", "", "", ProxyPrefs::MODE_SYSTEM); |
} |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, |
ProxyModeOverridesProxyServerMode) { |
- policy_.Set(key::kProxyServerMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateIntegerValue( |
- ProxyPolicyHandler::PROXY_SERVER_MODE)); |
- policy_.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue( |
- ProxyPrefs::kAutoDetectProxyModeName)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kProxyServerMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateIntegerValue( |
+ ProxyPolicyHandler::PROXY_SERVER_MODE)); |
+ policy.Set(key::kProxyMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue( |
+ ProxyPrefs::kAutoDetectProxyModeName)); |
+ provider_.UpdateChromePolicy(policy); |
VerifyProxyPrefs("", "", "", ProxyPrefs::MODE_AUTO_DETECT); |
} |
TEST_F(ConfigurationPolicyPrefStoreProxyTest, ProxyInvalid) { |
// No mode expects all three parameters being set. |
- policy_.Set(key::kProxyPacUrl, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue("http://short.org/proxy.pac")); |
- policy_.Set(key::kProxyBypassList, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue("http://chromium.org/override")); |
- policy_.Set(key::kProxyServer, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue("chromium.org")); |
+ PolicyMap policy; |
+ policy.Set(key::kProxyPacUrl, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue("http://short.org/proxy.pac")); |
+ policy.Set(key::kProxyBypassList, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue("http://chromium.org/override")); |
+ policy.Set(key::kProxyServer, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue("chromium.org")); |
for (int i = 0; i < ProxyPolicyHandler::MODE_COUNT; ++i) { |
- policy_.Set(key::kProxyServerMode, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateIntegerValue(i)); |
- provider_.NotifyPolicyUpdated(); |
+ policy.Set(key::kProxyServerMode, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateIntegerValue(i)); |
+ provider_.UpdateChromePolicy(policy); |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_NO_VALUE, |
store_->GetValue(prefs::kProxy, &value)); |
@@ -538,12 +553,13 @@ class ConfigurationPolicyPrefStoreDefaultSearchTest |
// Checks that if the policy for default search is valid, i.e. there's a |
// search URL, that all the elements have been given proper defaults. |
TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, MinimallyDefined) { |
+ PolicyMap policy; |
const char* const search_url = "http://test.com/search?t={searchTerms}"; |
- policy_.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
- policy_.Set(key::kDefaultSearchProviderSearchURL, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(search_url)); |
- provider_.NotifyPolicyUpdated(); |
+ policy.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
+ policy.Set(key::kDefaultSearchProviderSearchURL, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(search_url)); |
+ provider_.UpdateChromePolicy(policy); |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_OK, |
@@ -578,6 +594,7 @@ TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, MinimallyDefined) { |
// Checks that for a fully defined search policy, all elements have been |
// read properly. |
TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, FullyDefined) { |
+ PolicyMap policy; |
const char* const search_url = "http://test.com/search?t={searchTerms}"; |
const char* const suggest_url = "http://test.com/sugg?={searchTerms}"; |
const char* const icon_url = "http://test.com/icon.jpg"; |
@@ -586,21 +603,21 @@ TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, FullyDefined) { |
base::ListValue* encodings = new base::ListValue(); |
encodings->Append(base::Value::CreateStringValue("UTF-16")); |
encodings->Append(base::Value::CreateStringValue("UTF-8")); |
- policy_.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
- policy_.Set(key::kDefaultSearchProviderSearchURL, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(search_url)); |
- policy_.Set(key::kDefaultSearchProviderName, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(name)); |
- policy_.Set(key::kDefaultSearchProviderKeyword, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(keyword)); |
- policy_.Set(key::kDefaultSearchProviderSuggestURL, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(suggest_url)); |
- policy_.Set(key::kDefaultSearchProviderIconURL, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(icon_url)); |
- policy_.Set(key::kDefaultSearchProviderEncodings, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, encodings); |
- provider_.NotifyPolicyUpdated(); |
+ policy.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
+ policy.Set(key::kDefaultSearchProviderSearchURL, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(search_url)); |
+ policy.Set(key::kDefaultSearchProviderName, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(name)); |
+ policy.Set(key::kDefaultSearchProviderKeyword, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(keyword)); |
+ policy.Set(key::kDefaultSearchProviderSuggestURL, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(suggest_url)); |
+ policy.Set(key::kDefaultSearchProviderIconURL, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(icon_url)); |
+ policy.Set(key::kDefaultSearchProviderEncodings, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, encodings); |
+ provider_.UpdateChromePolicy(policy); |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_OK, |
@@ -631,6 +648,7 @@ TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, FullyDefined) { |
// Checks that if the default search policy is missing, that no elements of the |
// default search policy will be present. |
TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, MissingUrl) { |
+ PolicyMap policy; |
const char* const suggest_url = "http://test.com/sugg?t={searchTerms}"; |
const char* const icon_url = "http://test.com/icon.jpg"; |
const char* const name = "MyName"; |
@@ -638,19 +656,19 @@ TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, MissingUrl) { |
base::ListValue* encodings = new base::ListValue(); |
encodings->Append(base::Value::CreateStringValue("UTF-16")); |
encodings->Append(base::Value::CreateStringValue("UTF-8")); |
- policy_.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
- policy_.Set(key::kDefaultSearchProviderName, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(name)); |
- policy_.Set(key::kDefaultSearchProviderKeyword, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(keyword)); |
- policy_.Set(key::kDefaultSearchProviderSuggestURL, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(suggest_url)); |
- policy_.Set(key::kDefaultSearchProviderIconURL, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(icon_url)); |
- policy_.Set(key::kDefaultSearchProviderEncodings, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, encodings); |
- provider_.NotifyPolicyUpdated(); |
+ policy.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
+ policy.Set(key::kDefaultSearchProviderName, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(name)); |
+ policy.Set(key::kDefaultSearchProviderKeyword, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(keyword)); |
+ policy.Set(key::kDefaultSearchProviderSuggestURL, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(suggest_url)); |
+ policy.Set(key::kDefaultSearchProviderIconURL, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(icon_url)); |
+ policy.Set(key::kDefaultSearchProviderEncodings, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, encodings); |
+ provider_.UpdateChromePolicy(policy); |
EXPECT_EQ(PrefStore::READ_NO_VALUE, |
store_->GetValue(prefs::kDefaultSearchProviderSearchURL, NULL)); |
@@ -669,6 +687,7 @@ TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, MissingUrl) { |
// Checks that if the default search policy is invalid, that no elements of the |
// default search policy will be present. |
TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, Invalid) { |
+ PolicyMap policy; |
const char* const bad_search_url = "http://test.com/noSearchTerms"; |
const char* const suggest_url = "http://test.com/sugg?t={searchTerms}"; |
const char* const icon_url = "http://test.com/icon.jpg"; |
@@ -677,22 +696,22 @@ TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, Invalid) { |
base::ListValue* encodings = new base::ListValue(); |
encodings->Append(base::Value::CreateStringValue("UTF-16")); |
encodings->Append(base::Value::CreateStringValue("UTF-8")); |
- policy_.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
- policy_.Set(key::kDefaultSearchProviderSearchURL, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, |
- base::Value::CreateStringValue(bad_search_url)); |
- policy_.Set(key::kDefaultSearchProviderName, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(name)); |
- policy_.Set(key::kDefaultSearchProviderKeyword, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(keyword)); |
- policy_.Set(key::kDefaultSearchProviderSuggestURL, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(suggest_url)); |
- policy_.Set(key::kDefaultSearchProviderIconURL, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue(icon_url)); |
- policy_.Set(key::kDefaultSearchProviderEncodings, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, encodings); |
- provider_.NotifyPolicyUpdated(); |
+ policy.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
+ policy.Set(key::kDefaultSearchProviderSearchURL, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue(bad_search_url)); |
+ policy.Set(key::kDefaultSearchProviderName, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(name)); |
+ policy.Set(key::kDefaultSearchProviderKeyword, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(keyword)); |
+ policy.Set(key::kDefaultSearchProviderSuggestURL, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(suggest_url)); |
+ policy.Set(key::kDefaultSearchProviderIconURL, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue(icon_url)); |
+ policy.Set(key::kDefaultSearchProviderEncodings, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, encodings); |
+ provider_.UpdateChromePolicy(policy); |
EXPECT_EQ(PrefStore::READ_NO_VALUE, |
store_->GetValue(prefs::kDefaultSearchProviderSearchURL, NULL)); |
@@ -711,9 +730,10 @@ TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, Invalid) { |
// Checks that if the default search policy is invalid, that no elements of the |
// default search policy will be present. |
TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, Disabled) { |
- policy_.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false)); |
+ provider_.UpdateChromePolicy(policy); |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_OK, |
@@ -740,18 +760,19 @@ class ConfigurationPolicyPrefStoreIncognitoModeTest |
void SetPolicies(ObsoleteIncognitoEnabledValue incognito_enabled, |
int availability) { |
+ PolicyMap policy; |
if (incognito_enabled != INCOGNITO_ENABLED_UNKNOWN) { |
- policy_.Set(key::kIncognitoEnabled, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, |
- base::Value::CreateBooleanValue( |
- incognito_enabled == INCOGNITO_ENABLED_TRUE)); |
+ policy.Set(key::kIncognitoEnabled, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, |
+ base::Value::CreateBooleanValue( |
+ incognito_enabled == INCOGNITO_ENABLED_TRUE)); |
} |
if (availability >= 0) { |
- policy_.Set(key::kIncognitoModeAvailability, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, |
- base::Value::CreateIntegerValue(availability)); |
+ policy.Set(key::kIncognitoModeAvailability, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, |
+ base::Value::CreateIntegerValue(availability)); |
} |
- provider_.NotifyPolicyUpdated(); |
+ provider_.UpdateChromePolicy(policy); |
} |
void VerifyValues(IncognitoModePrefs::Availability availability) { |
@@ -828,18 +849,20 @@ TEST_F(ConfigurationPolicyPrefStoreSyncTest, Default) { |
} |
TEST_F(ConfigurationPolicyPrefStoreSyncTest, Enabled) { |
- policy_.Set(key::kSyncDisabled, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateBooleanValue(false)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kSyncDisabled, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateBooleanValue(false)); |
+ provider_.UpdateChromePolicy(policy); |
// Enabling Sync should not set the pref. |
EXPECT_EQ(PrefStore::READ_NO_VALUE, |
store_->GetValue(prefs::kSyncManaged, NULL)); |
} |
TEST_F(ConfigurationPolicyPrefStoreSyncTest, Disabled) { |
- policy_.Set(key::kSyncDisabled, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateBooleanValue(true)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kSyncDisabled, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateBooleanValue(true)); |
+ provider_.UpdateChromePolicy(policy); |
// Sync should be flagged as managed. |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_OK, store_->GetValue(prefs::kSyncManaged, &value)); |
@@ -862,11 +885,12 @@ TEST_F(ConfigurationPolicyPrefStorePromptDownloadTest, Default) { |
#if !defined(OS_CHROMEOS) |
TEST_F(ConfigurationPolicyPrefStorePromptDownloadTest, SetDownloadDirectory) { |
+ PolicyMap policy; |
EXPECT_EQ(PrefStore::READ_NO_VALUE, |
store_->GetValue(prefs::kPromptForDownload, NULL)); |
- policy_.Set(key::kDownloadDirectory, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateStringValue("")); |
- provider_.NotifyPolicyUpdated(); |
+ policy.Set(key::kDownloadDirectory, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateStringValue("")); |
+ provider_.UpdateChromePolicy(policy); |
// Setting a DownloadDirectory should disable the PromptForDownload pref. |
const base::Value* value = NULL; |
@@ -882,11 +906,12 @@ TEST_F(ConfigurationPolicyPrefStorePromptDownloadTest, SetDownloadDirectory) { |
TEST_F(ConfigurationPolicyPrefStorePromptDownloadTest, |
EnableFileSelectionDialogs) { |
+ PolicyMap policy; |
EXPECT_EQ(PrefStore::READ_NO_VALUE, |
store_->GetValue(prefs::kPromptForDownload, NULL)); |
- policy_.Set(key::kAllowFileSelectionDialogs, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
- provider_.NotifyPolicyUpdated(); |
+ policy.Set(key::kAllowFileSelectionDialogs, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
+ provider_.UpdateChromePolicy(policy); |
// Allowing file-selection dialogs should not influence the PromptForDownload |
// pref. |
@@ -896,11 +921,12 @@ TEST_F(ConfigurationPolicyPrefStorePromptDownloadTest, |
TEST_F(ConfigurationPolicyPrefStorePromptDownloadTest, |
DisableFileSelectionDialogs) { |
+ PolicyMap policy; |
EXPECT_EQ(PrefStore::READ_NO_VALUE, |
store_->GetValue(prefs::kPromptForDownload, NULL)); |
- policy_.Set(key::kAllowFileSelectionDialogs, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false)); |
- provider_.NotifyPolicyUpdated(); |
+ policy.Set(key::kAllowFileSelectionDialogs, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false)); |
+ provider_.UpdateChromePolicy(policy); |
// Disabling file-selection dialogs should disable the PromptForDownload pref. |
const base::Value* value = NULL; |
@@ -923,18 +949,20 @@ TEST_F(ConfigurationPolicyPrefStoreAutofillTest, Default) { |
} |
TEST_F(ConfigurationPolicyPrefStoreAutofillTest, Enabled) { |
- policy_.Set(key::kAutoFillEnabled, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateBooleanValue(true)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kAutoFillEnabled, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateBooleanValue(true)); |
+ provider_.UpdateChromePolicy(policy); |
// Enabling Autofill should not set the pref. |
EXPECT_EQ(PrefStore::READ_NO_VALUE, |
store_->GetValue(prefs::kAutofillEnabled, NULL)); |
} |
TEST_F(ConfigurationPolicyPrefStoreAutofillTest, Disabled) { |
- policy_.Set(key::kAutoFillEnabled, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateBooleanValue(false)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kAutoFillEnabled, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateBooleanValue(false)); |
+ provider_.UpdateChromePolicy(policy); |
// Disabling Autofill should switch the pref to managed. |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_OK, |
@@ -967,21 +995,22 @@ TEST_F(ConfigurationPolicyPrefStoreRefreshTest, Refresh) { |
store_->GetValue(prefs::kHomePage, NULL)); |
EXPECT_CALL(observer_, OnPrefValueChanged(prefs::kHomePage)).Times(1); |
- policy_.Set(key::kHomepageLocation, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- base::Value::CreateStringValue("http://www.chromium.org")); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kHomepageLocation, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ base::Value::CreateStringValue("http://www.chromium.org")); |
+ provider_.UpdateChromePolicy(policy); |
Mock::VerifyAndClearExpectations(&observer_); |
EXPECT_EQ(PrefStore::READ_OK, |
store_->GetValue(prefs::kHomePage, &value)); |
EXPECT_TRUE(base::StringValue("http://www.chromium.org").Equals(value)); |
EXPECT_CALL(observer_, OnPrefValueChanged(_)).Times(0); |
- provider_.NotifyPolicyUpdated(); |
+ provider_.UpdateChromePolicy(policy); |
Mock::VerifyAndClearExpectations(&observer_); |
EXPECT_CALL(observer_, OnPrefValueChanged(prefs::kHomePage)).Times(1); |
- policy_.Erase(key::kHomepageLocation); |
- provider_.NotifyPolicyUpdated(); |
+ policy.Erase(key::kHomepageLocation); |
+ provider_.UpdateChromePolicy(policy); |
Mock::VerifyAndClearExpectations(&observer_); |
EXPECT_EQ(PrefStore::READ_NO_VALUE, |
store_->GetValue(prefs::kHomePage, NULL)); |
@@ -992,7 +1021,8 @@ TEST_F(ConfigurationPolicyPrefStoreRefreshTest, Initialization) { |
EXPECT_CALL(provider_, IsInitializationComplete()) |
.WillRepeatedly(Return(true)); |
EXPECT_CALL(observer_, OnInitializationCompleted(true)).Times(1); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ provider_.UpdateChromePolicy(policy); |
Mock::VerifyAndClearExpectations(&observer_); |
EXPECT_TRUE(store_->IsInitializationComplete()); |
} |
@@ -1005,14 +1035,15 @@ TEST_F(ConfigurationPolicyPrefStoreOthersTest, JavascriptEnabled) { |
// This is a boolean policy, but affects an integer preference. |
EXPECT_EQ(PrefStore::READ_NO_VALUE, |
store_->GetValue(prefs::kManagedDefaultJavaScriptSetting, NULL)); |
- policy_.Set(key::kJavascriptEnabled, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kJavascriptEnabled, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true)); |
+ provider_.UpdateChromePolicy(policy); |
EXPECT_EQ(PrefStore::READ_NO_VALUE, |
store_->GetValue(prefs::kManagedDefaultJavaScriptSetting, NULL)); |
- policy_.Set(key::kJavascriptEnabled, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false)); |
- provider_.NotifyPolicyUpdated(); |
+ policy.Set(key::kJavascriptEnabled, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false)); |
+ provider_.UpdateChromePolicy(policy); |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_OK, |
store_->GetValue(prefs::kManagedDefaultJavaScriptSetting, &value)); |
@@ -1022,18 +1053,19 @@ TEST_F(ConfigurationPolicyPrefStoreOthersTest, JavascriptEnabled) { |
TEST_F(ConfigurationPolicyPrefStoreOthersTest, JavascriptEnabledOverridden) { |
EXPECT_EQ(PrefStore::READ_NO_VALUE, |
store_->GetValue(prefs::kManagedDefaultJavaScriptSetting, NULL)); |
- policy_.Set(key::kJavascriptEnabled, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false)); |
- provider_.NotifyPolicyUpdated(); |
+ PolicyMap policy; |
+ policy.Set(key::kJavascriptEnabled, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false)); |
+ provider_.UpdateChromePolicy(policy); |
const base::Value* value = NULL; |
EXPECT_EQ(PrefStore::READ_OK, |
store_->GetValue(prefs::kManagedDefaultJavaScriptSetting, &value)); |
EXPECT_TRUE(base::FundamentalValue(CONTENT_SETTING_BLOCK).Equals(value)); |
// DefaultJavaScriptSetting overrides JavascriptEnabled. |
- policy_.Set(key::kDefaultJavaScriptSetting, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, |
- base::Value::CreateIntegerValue(CONTENT_SETTING_ALLOW)); |
- provider_.NotifyPolicyUpdated(); |
+ policy.Set(key::kDefaultJavaScriptSetting, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, |
+ base::Value::CreateIntegerValue(CONTENT_SETTING_ALLOW)); |
+ provider_.UpdateChromePolicy(policy); |
EXPECT_EQ(PrefStore::READ_OK, |
store_->GetValue(prefs::kManagedDefaultJavaScriptSetting, &value)); |
EXPECT_TRUE(base::FundamentalValue(CONTENT_SETTING_ALLOW).Equals(value)); |