Chromium Code Reviews| Index: chrome/browser/policy/configuration_policy_pref_store_unittest.cc |
| diff --git a/chrome/browser/policy/configuration_policy_pref_store_unittest.cc b/chrome/browser/policy/configuration_policy_pref_store_unittest.cc |
| index f7082bfe23a6484312c59c15baea79593808afb8..7fd113764f84f7c87c170051ddadab1ea85faa90 100644 |
| --- a/chrome/browser/policy/configuration_policy_pref_store_unittest.cc |
| +++ b/chrome/browser/policy/configuration_policy_pref_store_unittest.cc |
| @@ -18,8 +18,8 @@ |
| #include "testing/gmock/include/gmock/gmock.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| -using testing::_; |
| using testing::Mock; |
| +using testing::_; |
| namespace policy { |
| @@ -61,12 +61,12 @@ TEST_P(ConfigurationPolicyPrefStoreListTest, GetDefault) { |
| } |
| TEST_P(ConfigurationPolicyPrefStoreListTest, SetValue) { |
| - ListValue* in_value = new ListValue(); |
| - in_value->Append(Value::CreateStringValue("test1")); |
| - in_value->Append(Value::CreateStringValue("test2,")); |
| + base::ListValue* in_value = new base::ListValue(); |
| + in_value->Append(base::Value::CreateStringValue("test1")); |
| + in_value->Append(base::Value::CreateStringValue("test2,")); |
| provider_.AddMandatoryPolicy(GetParam().policy_name(), in_value); |
| store_->OnUpdatePolicy(&provider_); |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, |
| store_->GetValue(GetParam().pref_name(), &value)); |
| ASSERT_TRUE(value); |
| @@ -111,13 +111,13 @@ TEST_P(ConfigurationPolicyPrefStoreStringTest, GetDefault) { |
| TEST_P(ConfigurationPolicyPrefStoreStringTest, SetValue) { |
| provider_.AddMandatoryPolicy(GetParam().policy_name(), |
| - Value::CreateStringValue("http://chromium.org")); |
| + base::Value::CreateStringValue("http://chromium.org")); |
| store_->OnUpdatePolicy(&provider_); |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, |
| store_->GetValue(GetParam().pref_name(), &value)); |
| ASSERT_TRUE(value); |
| - EXPECT_TRUE(StringValue("http://chromium.org").Equals(value)); |
| + EXPECT_TRUE(base::StringValue("http://chromium.org").Equals(value)); |
| } |
| INSTANTIATE_TEST_CASE_P( |
| @@ -160,9 +160,9 @@ TEST_P(ConfigurationPolicyPrefStoreBooleanTest, GetDefault) { |
| TEST_P(ConfigurationPolicyPrefStoreBooleanTest, SetValue) { |
| provider_.AddMandatoryPolicy(GetParam().policy_name(), |
| - Value::CreateBooleanValue(false)); |
| + base::Value::CreateBooleanValue(false)); |
| store_->OnUpdatePolicy(&provider_); |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, |
| store_->GetValue(GetParam().pref_name(), &value)); |
| ASSERT_TRUE(value); |
| @@ -172,7 +172,7 @@ TEST_P(ConfigurationPolicyPrefStoreBooleanTest, SetValue) { |
| EXPECT_FALSE(boolean_value); |
| provider_.AddMandatoryPolicy(GetParam().policy_name(), |
| - Value::CreateBooleanValue(true)); |
| + base::Value::CreateBooleanValue(true)); |
| store_->OnUpdatePolicy(&provider_); |
| value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, |
| @@ -288,9 +288,9 @@ TEST_P(ConfigurationPolicyPrefStoreIntegerTest, GetDefault) { |
| TEST_P(ConfigurationPolicyPrefStoreIntegerTest, SetValue) { |
| provider_.AddMandatoryPolicy(GetParam().policy_name(), |
| - Value::CreateIntegerValue(2)); |
| + base::Value::CreateIntegerValue(2)); |
| store_->OnUpdatePolicy(&provider_); |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, |
| store_->GetValue(GetParam().pref_name(), &value)); |
| EXPECT_TRUE(base::FundamentalValue(2).Equals(value)); |
| @@ -333,11 +333,12 @@ class ConfigurationPolicyPrefStoreProxyTest : public testing::Test { |
| const std::string& expected_proxy_pac_url, |
| const std::string& expected_proxy_bypass_list, |
| const ProxyPrefs::ProxyMode& expected_proxy_mode) { |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| ASSERT_EQ(PrefStore::READ_OK, |
| store.GetValue(prefs::kProxy, &value)); |
| - ASSERT_EQ(Value::TYPE_DICTIONARY, value->GetType()); |
| - ProxyConfigDictionary dict(static_cast<const DictionaryValue*>(value)); |
| + ASSERT_EQ(base::Value::TYPE_DICTIONARY, value->GetType()); |
| + ProxyConfigDictionary dict( |
| + static_cast<const base::DictionaryValue*>(value)); |
| std::string s; |
| if (expected_proxy_server.empty()) { |
| EXPECT_FALSE(dict.GetProxyServer(&s)); |
| @@ -367,12 +368,12 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, ManualOptions) { |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy( |
| key::kProxyBypassList, |
| - Value::CreateStringValue("http://chromium.org/override")); |
| + base::Value::CreateStringValue("http://chromium.org/override")); |
| provider.AddMandatoryPolicy(key::kProxyServer, |
| - Value::CreateStringValue("chromium.org")); |
| + base::Value::CreateStringValue("chromium.org")); |
| provider.AddMandatoryPolicy( |
| key::kProxyServerMode, |
| - Value::CreateIntegerValue( |
| + base::Value::CreateIntegerValue( |
| ProxyPolicyHandler::PROXY_MANUALLY_CONFIGURED_PROXY_SERVER_MODE)); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| @@ -386,14 +387,14 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, ManualOptionsReversedApplyOrder) { |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy( |
| key::kProxyServerMode, |
| - Value::CreateIntegerValue( |
| + base::Value::CreateIntegerValue( |
| ProxyPolicyHandler::PROXY_MANUALLY_CONFIGURED_PROXY_SERVER_MODE)); |
| provider.AddMandatoryPolicy( |
| key::kProxyBypassList, |
| - Value::CreateStringValue("http://chromium.org/override")); |
| + base::Value::CreateStringValue("http://chromium.org/override")); |
| provider.AddMandatoryPolicy( |
| key::kProxyServer, |
| - Value::CreateStringValue("chromium.org")); |
| + base::Value::CreateStringValue("chromium.org")); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| new ConfigurationPolicyPrefStore(&provider)); |
| VerifyProxyPrefs( |
| @@ -405,12 +406,12 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, ManualOptionsInvalid) { |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy( |
| key::kProxyServerMode, |
| - Value::CreateIntegerValue( |
| + base::Value::CreateIntegerValue( |
| ProxyPolicyHandler::PROXY_MANUALLY_CONFIGURED_PROXY_SERVER_MODE)); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| new ConfigurationPolicyPrefStore(&provider)); |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_NO_VALUE, store->GetValue(prefs::kProxy, &value)); |
| } |
| @@ -419,7 +420,7 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, NoProxyServerMode) { |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy( |
| key::kProxyServerMode, |
| - Value::CreateIntegerValue(ProxyPolicyHandler::PROXY_SERVER_MODE)); |
| + base::Value::CreateIntegerValue(ProxyPolicyHandler::PROXY_SERVER_MODE)); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| new ConfigurationPolicyPrefStore(&provider)); |
| @@ -430,7 +431,7 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, NoProxyModeName) { |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy( |
| key::kProxyMode, |
| - Value::CreateStringValue(ProxyPrefs::kDirectProxyModeName)); |
| + base::Value::CreateStringValue(ProxyPrefs::kDirectProxyModeName)); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| new ConfigurationPolicyPrefStore(&provider)); |
| @@ -441,7 +442,7 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, AutoDetectProxyServerMode) { |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy( |
| key::kProxyServerMode, |
| - Value::CreateIntegerValue( |
| + base::Value::CreateIntegerValue( |
| ProxyPolicyHandler::PROXY_AUTO_DETECT_PROXY_SERVER_MODE)); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| @@ -453,7 +454,7 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, AutoDetectProxyModeName) { |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy( |
| key::kProxyMode, |
| - Value::CreateStringValue(ProxyPrefs::kAutoDetectProxyModeName)); |
| + base::Value::CreateStringValue(ProxyPrefs::kAutoDetectProxyModeName)); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| new ConfigurationPolicyPrefStore(&provider)); |
| @@ -464,10 +465,10 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, PacScriptProxyMode) { |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy( |
| key::kProxyPacUrl, |
| - Value::CreateStringValue("http://short.org/proxy.pac")); |
| + base::Value::CreateStringValue("http://short.org/proxy.pac")); |
| provider.AddMandatoryPolicy( |
| key::kProxyMode, |
| - Value::CreateStringValue(ProxyPrefs::kPacScriptProxyModeName)); |
| + base::Value::CreateStringValue(ProxyPrefs::kPacScriptProxyModeName)); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| new ConfigurationPolicyPrefStore(&provider)); |
| @@ -479,11 +480,11 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, PacScriptProxyModeInvalid) { |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy( |
| key::kProxyMode, |
| - Value::CreateStringValue(ProxyPrefs::kPacScriptProxyModeName)); |
| + base::Value::CreateStringValue(ProxyPrefs::kPacScriptProxyModeName)); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| new ConfigurationPolicyPrefStore(&provider)); |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_NO_VALUE, store->GetValue(prefs::kProxy, &value)); |
| } |
| @@ -492,13 +493,13 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, PacScriptProxyModeInvalid) { |
| TEST_F(ConfigurationPolicyPrefStoreProxyTest, PacScriptProxyModeBug78016) { |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy(key::kProxyServer, |
| - Value::CreateStringValue("")); |
| + base::Value::CreateStringValue("")); |
| provider.AddMandatoryPolicy( |
| key::kProxyPacUrl, |
| - Value::CreateStringValue("http://short.org/proxy.pac")); |
| + base::Value::CreateStringValue("http://short.org/proxy.pac")); |
| provider.AddMandatoryPolicy( |
| key::kProxyMode, |
| - Value::CreateStringValue(ProxyPrefs::kPacScriptProxyModeName)); |
| + base::Value::CreateStringValue(ProxyPrefs::kPacScriptProxyModeName)); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| new ConfigurationPolicyPrefStore(&provider)); |
| @@ -510,7 +511,7 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, UseSystemProxyServerMode) { |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy( |
| key::kProxyServerMode, |
| - Value::CreateIntegerValue( |
| + base::Value::CreateIntegerValue( |
| ProxyPolicyHandler::PROXY_USE_SYSTEM_PROXY_SERVER_MODE)); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| @@ -522,7 +523,7 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, UseSystemProxyMode) { |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy( |
| key::kProxyMode, |
| - Value::CreateStringValue(ProxyPrefs::kSystemProxyModeName)); |
| + base::Value::CreateStringValue(ProxyPrefs::kSystemProxyModeName)); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| new ConfigurationPolicyPrefStore(&provider)); |
| @@ -534,10 +535,10 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy( |
| key::kProxyServerMode, |
| - Value::CreateIntegerValue(ProxyPolicyHandler::PROXY_SERVER_MODE)); |
| + base::Value::CreateIntegerValue(ProxyPolicyHandler::PROXY_SERVER_MODE)); |
| provider.AddMandatoryPolicy( |
| key::kProxyMode, |
| - Value::CreateStringValue(ProxyPrefs::kAutoDetectProxyModeName)); |
| + base::Value::CreateStringValue(ProxyPrefs::kAutoDetectProxyModeName)); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| new ConfigurationPolicyPrefStore(&provider)); |
| @@ -548,20 +549,20 @@ TEST_F(ConfigurationPolicyPrefStoreProxyTest, ProxyInvalid) { |
| for (int i = 0; i < ProxyPolicyHandler::MODE_COUNT; ++i) { |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy(key::kProxyServerMode, |
| - Value::CreateIntegerValue(i)); |
| + base::Value::CreateIntegerValue(i)); |
| // No mode expects all three parameters being set. |
| provider.AddMandatoryPolicy( |
| key::kProxyPacUrl, |
| - Value::CreateStringValue("http://short.org/proxy.pac")); |
| + base::Value::CreateStringValue("http://short.org/proxy.pac")); |
| provider.AddMandatoryPolicy( |
| key::kProxyBypassList, |
| - Value::CreateStringValue("http://chromium.org/override")); |
| + base::Value::CreateStringValue("http://chromium.org/override")); |
| provider.AddMandatoryPolicy(key::kProxyServer, |
| - Value::CreateStringValue("chromium.org")); |
| + base::Value::CreateStringValue("chromium.org")); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| new ConfigurationPolicyPrefStore(&provider)); |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_NO_VALUE, |
| store->GetValue(prefs::kProxy, &value)); |
| } |
| @@ -576,41 +577,41 @@ TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, MinimallyDefined) { |
| const char* const search_url = "http://test.com/search?t={searchTerms}"; |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderEnabled, |
| - Value::CreateBooleanValue(true)); |
| + base::Value::CreateBooleanValue(true)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderSearchURL, |
| - Value::CreateStringValue(search_url)); |
| + base::Value::CreateStringValue(search_url)); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| new ConfigurationPolicyPrefStore(&provider)); |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, |
| store->GetValue(prefs::kDefaultSearchProviderSearchURL, &value)); |
| - EXPECT_TRUE(StringValue(search_url).Equals(value)); |
| + EXPECT_TRUE(base::StringValue(search_url).Equals(value)); |
| EXPECT_EQ(PrefStore::READ_OK, |
| store->GetValue(prefs::kDefaultSearchProviderName, &value)); |
| - EXPECT_TRUE(StringValue("test.com").Equals(value)); |
| + EXPECT_TRUE(base::StringValue("test.com").Equals(value)); |
| EXPECT_EQ(PrefStore::READ_OK, |
| store->GetValue(prefs::kDefaultSearchProviderKeyword, &value)); |
| - EXPECT_TRUE(StringValue(std::string()).Equals(value)); |
| + EXPECT_TRUE(base::StringValue(std::string()).Equals(value)); |
| EXPECT_EQ(PrefStore::READ_OK, |
| store->GetValue(prefs::kDefaultSearchProviderSuggestURL, &value)); |
| - EXPECT_TRUE(StringValue(std::string()).Equals(value)); |
| + EXPECT_TRUE(base::StringValue(std::string()).Equals(value)); |
| EXPECT_EQ(PrefStore::READ_OK, |
| store->GetValue(prefs::kDefaultSearchProviderIconURL, &value)); |
| - EXPECT_TRUE(StringValue(std::string()).Equals(value)); |
| + EXPECT_TRUE(base::StringValue(std::string()).Equals(value)); |
| EXPECT_EQ(PrefStore::READ_OK, |
| store->GetValue(prefs::kDefaultSearchProviderEncodings, &value)); |
| - EXPECT_TRUE(StringValue(std::string()).Equals(value)); |
| + EXPECT_TRUE(base::StringValue(std::string()).Equals(value)); |
| EXPECT_EQ(PrefStore::READ_OK, |
| store->GetValue(prefs::kDefaultSearchProviderInstantURL, &value)); |
| - EXPECT_TRUE(StringValue(std::string()).Equals(value)); |
| + EXPECT_TRUE(base::StringValue(std::string()).Equals(value)); |
| } |
| // Checks that for a fully defined search policy, all elements have been |
| @@ -621,51 +622,51 @@ TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, FullyDefined) { |
| const char* const icon_url = "http://test.com/icon.jpg"; |
| const char* const name = "MyName"; |
| const char* const keyword = "MyKeyword"; |
| - ListValue* encodings = new ListValue(); |
| - encodings->Append(Value::CreateStringValue("UTF-16")); |
| - encodings->Append(Value::CreateStringValue("UTF-8")); |
| + base::ListValue* encodings = new base::ListValue(); |
| + encodings->Append(base::Value::CreateStringValue("UTF-16")); |
| + encodings->Append(base::Value::CreateStringValue("UTF-8")); |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderEnabled, |
| - Value::CreateBooleanValue(true)); |
| + base::Value::CreateBooleanValue(true)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderSearchURL, |
| - Value::CreateStringValue(search_url)); |
| + base::Value::CreateStringValue(search_url)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderName, |
| - Value::CreateStringValue(name)); |
| + base::Value::CreateStringValue(name)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderKeyword, |
| - Value::CreateStringValue(keyword)); |
| + base::Value::CreateStringValue(keyword)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderSuggestURL, |
| - Value::CreateStringValue(suggest_url)); |
| + base::Value::CreateStringValue(suggest_url)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderIconURL, |
| - Value::CreateStringValue(icon_url)); |
| + base::Value::CreateStringValue(icon_url)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderEncodings, encodings); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| new ConfigurationPolicyPrefStore(&provider)); |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, |
| store->GetValue(prefs::kDefaultSearchProviderSearchURL, &value)); |
| - EXPECT_TRUE(StringValue(search_url).Equals(value)); |
| + EXPECT_TRUE(base::StringValue(search_url).Equals(value)); |
| EXPECT_EQ(PrefStore::READ_OK, |
| store->GetValue(prefs::kDefaultSearchProviderName, &value)); |
| - EXPECT_TRUE(StringValue(name).Equals(value)); |
| + EXPECT_TRUE(base::StringValue(name).Equals(value)); |
| EXPECT_EQ(PrefStore::READ_OK, |
| store->GetValue(prefs::kDefaultSearchProviderKeyword, &value)); |
| - EXPECT_TRUE(StringValue(keyword).Equals(value)); |
| + EXPECT_TRUE(base::StringValue(keyword).Equals(value)); |
| EXPECT_EQ(PrefStore::READ_OK, |
| store->GetValue(prefs::kDefaultSearchProviderSuggestURL, &value)); |
| - EXPECT_TRUE(StringValue(suggest_url).Equals(value)); |
| + EXPECT_TRUE(base::StringValue(suggest_url).Equals(value)); |
| EXPECT_EQ(PrefStore::READ_OK, |
| store->GetValue(prefs::kDefaultSearchProviderIconURL, &value)); |
| - EXPECT_TRUE(StringValue(icon_url).Equals(value)); |
| + EXPECT_TRUE(base::StringValue(icon_url).Equals(value)); |
| EXPECT_EQ(PrefStore::READ_OK, |
| store->GetValue(prefs::kDefaultSearchProviderEncodings, &value)); |
| - EXPECT_TRUE(StringValue("UTF-16;UTF-8").Equals(value)); |
| + EXPECT_TRUE(base::StringValue("UTF-16;UTF-8").Equals(value)); |
| } |
| // Checks that if the default search policy is missing, that no elements of the |
| @@ -675,20 +676,20 @@ TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, MissingUrl) { |
| const char* const icon_url = "http://test.com/icon.jpg"; |
| const char* const name = "MyName"; |
| const char* const keyword = "MyKeyword"; |
| - ListValue* encodings = new ListValue(); |
| - encodings->Append(Value::CreateStringValue("UTF-16")); |
| - encodings->Append(Value::CreateStringValue("UTF-8")); |
| + base::ListValue* encodings = new base::ListValue(); |
| + encodings->Append(base::Value::CreateStringValue("UTF-16")); |
| + encodings->Append(base::Value::CreateStringValue("UTF-8")); |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderEnabled, |
| - Value::CreateBooleanValue(true)); |
| + base::Value::CreateBooleanValue(true)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderName, |
| - Value::CreateStringValue(name)); |
| + base::Value::CreateStringValue(name)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderKeyword, |
| - Value::CreateStringValue(keyword)); |
| + base::Value::CreateStringValue(keyword)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderSuggestURL, |
| - Value::CreateStringValue(suggest_url)); |
| + base::Value::CreateStringValue(suggest_url)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderIconURL, |
| - Value::CreateStringValue(icon_url)); |
| + base::Value::CreateStringValue(icon_url)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderEncodings, encodings); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| @@ -716,22 +717,22 @@ TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, Invalid) { |
| const char* const icon_url = "http://test.com/icon.jpg"; |
| const char* const name = "MyName"; |
| const char* const keyword = "MyKeyword"; |
| - ListValue* encodings = new ListValue(); |
| - encodings->Append(Value::CreateStringValue("UTF-16")); |
| - encodings->Append(Value::CreateStringValue("UTF-8")); |
| + base::ListValue* encodings = new base::ListValue(); |
| + encodings->Append(base::Value::CreateStringValue("UTF-16")); |
| + encodings->Append(base::Value::CreateStringValue("UTF-8")); |
| MockConfigurationPolicyProvider provider; |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderEnabled, |
| - Value::CreateBooleanValue(true)); |
| + base::Value::CreateBooleanValue(true)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderSearchURL, |
| - Value::CreateStringValue(bad_search_url)); |
| + base::Value::CreateStringValue(bad_search_url)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderName, |
| - Value::CreateStringValue(name)); |
| + base::Value::CreateStringValue(name)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderKeyword, |
| - Value::CreateStringValue(keyword)); |
| + base::Value::CreateStringValue(keyword)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderSuggestURL, |
| - Value::CreateStringValue(suggest_url)); |
| + base::Value::CreateStringValue(suggest_url)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderIconURL, |
| - Value::CreateStringValue(icon_url)); |
| + base::Value::CreateStringValue(icon_url)); |
| provider.AddMandatoryPolicy(key::kDefaultSearchProviderEncodings, encodings); |
| scoped_refptr<ConfigurationPolicyPrefStore> store( |
| @@ -751,6 +752,25 @@ TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, Invalid) { |
| store->GetValue(prefs::kDefaultSearchProviderEncodings, NULL)); |
| } |
| +// Checks that if the default search policy is invalid, that no elements of the |
| +// default search policy will be present. |
| +TEST_F(ConfigurationPolicyPrefStoreDefaultSearchTest, Disabled) { |
| + MockConfigurationPolicyProvider provider; |
| + provider.AddMandatoryPolicy(key::kDefaultSearchProviderEnabled, |
| + base::Value::CreateBooleanValue(false)); |
| + |
| + scoped_refptr<ConfigurationPolicyPrefStore> store( |
| + new ConfigurationPolicyPrefStore(&provider)); |
| + |
| + const base::Value* value = NULL; |
| + EXPECT_EQ(PrefStore::READ_OK, |
| + store->GetValue(prefs::kDefaultSearchProviderEnabled, &value)); |
| + EXPECT_TRUE(base::FundamentalValue(false).Equals(value)); |
|
Joao da Silva
2012/02/01 10:01:09
Will crash if |value| is NULL. How about
base::Fun
Mattias Nissler (ping if slow)
2012/02/01 12:19:39
Done.
|
| + EXPECT_EQ(PrefStore::READ_OK, |
| + store->GetValue(prefs::kDefaultSearchProviderSearchURL, &value)); |
| + EXPECT_TRUE(base::StringValue("").Equals(value)); |
|
Joao da Silva
2012/02/01 10:01:09
Same.
Mattias Nissler (ping if slow)
2012/02/01 12:19:39
Done.
|
| +} |
| + |
| // Tests Incognito mode availability preference setting. |
| class ConfigurationPolicyPrefStoreIncognitoModeTest : public testing::Test { |
| protected: |
| @@ -767,18 +787,19 @@ class ConfigurationPolicyPrefStoreIncognitoModeTest : public testing::Test { |
| if (incognito_enabled != INCOGNITO_ENABLED_UNKNOWN) { |
| provider_.AddMandatoryPolicy( |
| key::kIncognitoEnabled, |
| - Value::CreateBooleanValue( |
| + base::Value::CreateBooleanValue( |
| incognito_enabled == INCOGNITO_ENABLED_TRUE)); |
| } |
| if (availability >= 0) { |
| - provider_.AddMandatoryPolicy(key::kIncognitoModeAvailability, |
| - Value::CreateIntegerValue(availability)); |
| + provider_.AddMandatoryPolicy( |
| + key::kIncognitoModeAvailability, |
| + base::Value::CreateIntegerValue(availability)); |
| } |
| store_ = new ConfigurationPolicyPrefStore(&provider_); |
| } |
| void VerifyValues(IncognitoModePrefs::Availability availability) { |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, |
| store_->GetValue(prefs::kIncognitoModeAvailability, &value)); |
| EXPECT_TRUE(base::FundamentalValue(availability).Equals(value)); |
| @@ -812,7 +833,7 @@ TEST_F(ConfigurationPolicyPrefStoreIncognitoModeTest, |
| TEST_F(ConfigurationPolicyPrefStoreIncognitoModeTest, |
| NoObsoletePolicyAndNoIncognitoAvailability) { |
| SetPolicies(INCOGNITO_ENABLED_UNKNOWN, kIncognitoModeAvailabilityNotSet); |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_NO_VALUE, |
| store_->GetValue(prefs::kIncognitoModeAvailability, &value)); |
| } |
| @@ -856,7 +877,7 @@ TEST_F(ConfigurationPolicyPrefStoreSyncTest, Default) { |
| TEST_F(ConfigurationPolicyPrefStoreSyncTest, Enabled) { |
| provider_.AddMandatoryPolicy(key::kSyncDisabled, |
| - Value::CreateBooleanValue(false)); |
| + base::Value::CreateBooleanValue(false)); |
| store_->OnUpdatePolicy(&provider_); |
| // Enabling Sync should not set the pref. |
| EXPECT_EQ(PrefStore::READ_NO_VALUE, |
| @@ -865,10 +886,10 @@ TEST_F(ConfigurationPolicyPrefStoreSyncTest, Enabled) { |
| TEST_F(ConfigurationPolicyPrefStoreSyncTest, Disabled) { |
| provider_.AddMandatoryPolicy(key::kSyncDisabled, |
| - Value::CreateBooleanValue(true)); |
| + base::Value::CreateBooleanValue(true)); |
| store_->OnUpdatePolicy(&provider_); |
| // Sync should be flagged as managed. |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, store_->GetValue(prefs::kSyncManaged, &value)); |
| ASSERT_TRUE(value); |
| bool sync_managed = false; |
| @@ -893,11 +914,11 @@ TEST_F(ConfigurationPolicyPrefStorePromptDownloadTest, SetDownloadDirectory) { |
| EXPECT_EQ(PrefStore::READ_NO_VALUE, |
| store_->GetValue(prefs::kPromptForDownload, NULL)); |
| provider_.AddMandatoryPolicy(key::kDownloadDirectory, |
| - Value::CreateStringValue("")); |
| + base::Value::CreateStringValue("")); |
| store_->OnUpdatePolicy(&provider_); |
| // Setting a DownloadDirectory should disable the PromptForDownload pref. |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, store_->GetValue(prefs::kPromptForDownload, |
| &value)); |
| ASSERT_TRUE(value); |
| @@ -913,7 +934,7 @@ TEST_F(ConfigurationPolicyPrefStorePromptDownloadTest, |
| EXPECT_EQ(PrefStore::READ_NO_VALUE, |
| store_->GetValue(prefs::kPromptForDownload, NULL)); |
| provider_.AddMandatoryPolicy(key::kAllowFileSelectionDialogs, |
| - Value::CreateBooleanValue(true)); |
| + base::Value::CreateBooleanValue(true)); |
| store_->OnUpdatePolicy(&provider_); |
| // Allowing file-selection dialogs should not influence the PromptForDownload |
| @@ -927,11 +948,11 @@ TEST_F(ConfigurationPolicyPrefStorePromptDownloadTest, |
| EXPECT_EQ(PrefStore::READ_NO_VALUE, |
| store_->GetValue(prefs::kPromptForDownload, NULL)); |
| provider_.AddMandatoryPolicy(key::kAllowFileSelectionDialogs, |
| - Value::CreateBooleanValue(false)); |
| + base::Value::CreateBooleanValue(false)); |
| store_->OnUpdatePolicy(&provider_); |
| // Disabling file-selection dialogs should disable the PromptForDownload pref. |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, store_->GetValue(prefs::kPromptForDownload, |
| &value)); |
| ASSERT_TRUE(value); |
| @@ -953,7 +974,7 @@ TEST_F(ConfigurationPolicyPrefStoreAutofillTest, Default) { |
| TEST_F(ConfigurationPolicyPrefStoreAutofillTest, Enabled) { |
| provider_.AddMandatoryPolicy(key::kAutoFillEnabled, |
| - Value::CreateBooleanValue(true)); |
| + base::Value::CreateBooleanValue(true)); |
| store_->OnUpdatePolicy(&provider_); |
| // Enabling Autofill should not set the pref. |
| EXPECT_EQ(PrefStore::READ_NO_VALUE, |
| @@ -962,10 +983,10 @@ TEST_F(ConfigurationPolicyPrefStoreAutofillTest, Enabled) { |
| TEST_F(ConfigurationPolicyPrefStoreAutofillTest, Disabled) { |
| provider_.AddMandatoryPolicy(key::kAutoFillEnabled, |
| - Value::CreateBooleanValue(false)); |
| + base::Value::CreateBooleanValue(false)); |
| store_->OnUpdatePolicy(&provider_); |
| // Disabling Autofill should switch the pref to managed. |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, |
| store_->GetValue(prefs::kAutofillEnabled, &value)); |
| ASSERT_TRUE(value); |
| @@ -991,19 +1012,19 @@ class ConfigurationPolicyPrefStoreRefreshTest |
| }; |
| TEST_F(ConfigurationPolicyPrefStoreRefreshTest, Refresh) { |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_NO_VALUE, |
| store_->GetValue(prefs::kHomePage, NULL)); |
| EXPECT_CALL(observer_, OnPrefValueChanged(prefs::kHomePage)).Times(1); |
| provider_.AddMandatoryPolicy( |
| key::kHomepageLocation, |
| - Value::CreateStringValue("http://www.chromium.org")); |
| + base::Value::CreateStringValue("http://www.chromium.org")); |
| store_->OnUpdatePolicy(&provider_); |
| Mock::VerifyAndClearExpectations(&observer_); |
| EXPECT_EQ(PrefStore::READ_OK, |
| store_->GetValue(prefs::kHomePage, &value)); |
| - EXPECT_TRUE(StringValue("http://www.chromium.org").Equals(value)); |
| + EXPECT_TRUE(base::StringValue("http://www.chromium.org").Equals(value)); |
| EXPECT_CALL(observer_, OnPrefValueChanged(_)).Times(0); |
| store_->OnUpdatePolicy(&provider_); |
| @@ -1040,14 +1061,14 @@ TEST_F(ConfigurationPolicyPrefStoreOthersTest, JavascriptEnabled) { |
| EXPECT_EQ(PrefStore::READ_NO_VALUE, |
| store_->GetValue(prefs::kManagedDefaultJavaScriptSetting, NULL)); |
| provider_.AddMandatoryPolicy(key::kJavascriptEnabled, |
| - Value::CreateBooleanValue(true)); |
| + base::Value::CreateBooleanValue(true)); |
| store_->OnUpdatePolicy(&provider_); |
| EXPECT_EQ(PrefStore::READ_NO_VALUE, |
| store_->GetValue(prefs::kManagedDefaultJavaScriptSetting, NULL)); |
| provider_.AddMandatoryPolicy(key::kJavascriptEnabled, |
| - Value::CreateBooleanValue(false)); |
| + base::Value::CreateBooleanValue(false)); |
| store_->OnUpdatePolicy(&provider_); |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, |
| store_->GetValue(prefs::kManagedDefaultJavaScriptSetting, &value)); |
| EXPECT_TRUE(base::FundamentalValue(CONTENT_SETTING_BLOCK).Equals(value)); |
| @@ -1057,16 +1078,16 @@ TEST_F(ConfigurationPolicyPrefStoreOthersTest, JavascriptEnabledOverridden) { |
| EXPECT_EQ(PrefStore::READ_NO_VALUE, |
| store_->GetValue(prefs::kManagedDefaultJavaScriptSetting, NULL)); |
| provider_.AddMandatoryPolicy(key::kJavascriptEnabled, |
| - Value::CreateBooleanValue(false)); |
| + base::Value::CreateBooleanValue(false)); |
| store_->OnUpdatePolicy(&provider_); |
| - const Value* value = NULL; |
| + const base::Value* value = NULL; |
| EXPECT_EQ(PrefStore::READ_OK, |
| store_->GetValue(prefs::kManagedDefaultJavaScriptSetting, &value)); |
| EXPECT_TRUE(base::FundamentalValue(CONTENT_SETTING_BLOCK).Equals(value)); |
| // DefaultJavaScriptSetting overrides JavascriptEnabled. |
| provider_.AddMandatoryPolicy( |
| key::kDefaultJavaScriptSetting, |
| - Value::CreateIntegerValue(CONTENT_SETTING_ALLOW)); |
| + base::Value::CreateIntegerValue(CONTENT_SETTING_ALLOW)); |
| store_->OnUpdatePolicy(&provider_); |
| EXPECT_EQ(PrefStore::READ_OK, |
| store_->GetValue(prefs::kManagedDefaultJavaScriptSetting, &value)); |