| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/policy/core/common/policy_loader_win.h" | 5 #include "components/policy/core/common/policy_loader_win.h" |
| 6 | 6 |
| 7 #include <windows.h> | 7 #include <windows.h> |
| 8 #include <userenv.h> | 8 #include <userenv.h> |
| 9 | 9 |
| 10 #include <algorithm> | 10 #include <algorithm> |
| (...skipping 315 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 326 ASSERT_HRESULT_SUCCEEDED(RegOverridePredefKey(HKEY_CURRENT_USER, 0)); | 326 ASSERT_HRESULT_SUCCEEDED(RegOverridePredefKey(HKEY_CURRENT_USER, 0)); |
| 327 } | 327 } |
| 328 | 328 |
| 329 void ScopedGroupPolicyRegistrySandbox::DeleteKeys() { | 329 void ScopedGroupPolicyRegistrySandbox::DeleteKeys() { |
| 330 RegKey key(HKEY_CURRENT_USER, key_name_.c_str(), KEY_ALL_ACCESS); | 330 RegKey key(HKEY_CURRENT_USER, key_name_.c_str(), KEY_ALL_ACCESS); |
| 331 ASSERT_TRUE(key.Valid()); | 331 ASSERT_TRUE(key.Valid()); |
| 332 key.DeleteKey(L""); | 332 key.DeleteKey(L""); |
| 333 } | 333 } |
| 334 | 334 |
| 335 RegistryTestHarness::RegistryTestHarness(HKEY hive, PolicyScope scope) | 335 RegistryTestHarness::RegistryTestHarness(HKEY hive, PolicyScope scope) |
| 336 : PolicyProviderTestHarness(POLICY_LEVEL_MANDATORY, scope), hive_(hive) {} | 336 : PolicyProviderTestHarness(POLICY_LEVEL_MANDATORY, scope, |
| 337 POLICY_SOURCE_PLATFORM), |
| 338 hive_(hive) {} |
| 337 | 339 |
| 338 RegistryTestHarness::~RegistryTestHarness() {} | 340 RegistryTestHarness::~RegistryTestHarness() {} |
| 339 | 341 |
| 340 void RegistryTestHarness::SetUp() {} | 342 void RegistryTestHarness::SetUp() {} |
| 341 | 343 |
| 342 ConfigurationPolicyProvider* RegistryTestHarness::CreateProvider( | 344 ConfigurationPolicyProvider* RegistryTestHarness::CreateProvider( |
| 343 SchemaRegistry* registry, | 345 SchemaRegistry* registry, |
| 344 scoped_refptr<base::SequencedTaskRunner> task_runner) { | 346 scoped_refptr<base::SequencedTaskRunner> task_runner) { |
| 345 base::win::SetDomainStateForTesting(true); | 347 base::win::SetDomainStateForTesting(true); |
| 346 scoped_ptr<AsyncPolicyLoader> loader( | 348 scoped_ptr<AsyncPolicyLoader> loader( |
| (...skipping 101 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 448 PolicyProviderTestHarness* RegistryTestHarness::CreateHKCU() { | 450 PolicyProviderTestHarness* RegistryTestHarness::CreateHKCU() { |
| 449 return new RegistryTestHarness(HKEY_CURRENT_USER, POLICY_SCOPE_USER); | 451 return new RegistryTestHarness(HKEY_CURRENT_USER, POLICY_SCOPE_USER); |
| 450 } | 452 } |
| 451 | 453 |
| 452 // static | 454 // static |
| 453 PolicyProviderTestHarness* RegistryTestHarness::CreateHKLM() { | 455 PolicyProviderTestHarness* RegistryTestHarness::CreateHKLM() { |
| 454 return new RegistryTestHarness(HKEY_LOCAL_MACHINE, POLICY_SCOPE_MACHINE); | 456 return new RegistryTestHarness(HKEY_LOCAL_MACHINE, POLICY_SCOPE_MACHINE); |
| 455 } | 457 } |
| 456 | 458 |
| 457 PRegTestHarness::PRegTestHarness() | 459 PRegTestHarness::PRegTestHarness() |
| 458 : PolicyProviderTestHarness(POLICY_LEVEL_MANDATORY, POLICY_SCOPE_MACHINE) {} | 460 : PolicyProviderTestHarness(POLICY_LEVEL_MANDATORY, POLICY_SCOPE_MACHINE, |
| 461 POLICY_SOURCE_PLATFORM) {} |
| 459 | 462 |
| 460 PRegTestHarness::~PRegTestHarness() {} | 463 PRegTestHarness::~PRegTestHarness() {} |
| 461 | 464 |
| 462 void PRegTestHarness::SetUp() { | 465 void PRegTestHarness::SetUp() { |
| 463 base::win::SetDomainStateForTesting(false); | 466 base::win::SetDomainStateForTesting(false); |
| 464 ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); | 467 ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); |
| 465 preg_file_path_ = temp_dir_.path().Append(PolicyLoaderWin::kPRegFileName); | 468 preg_file_path_ = temp_dir_.path().Append(PolicyLoaderWin::kPRegFileName); |
| 466 ASSERT_TRUE(base::WriteFile(preg_file_path_, | 469 ASSERT_TRUE(base::WriteFile(preg_file_path_, |
| 467 preg_parser::kPRegFileHeader, | 470 preg_parser::kPRegFileHeader, |
| 468 arraysize(preg_parser::kPRegFileHeader))); | 471 arraysize(preg_parser::kPRegFileHeader))); |
| (...skipping 750 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1219 PolicyMap& expected_policy = expected.Get(ns); | 1222 PolicyMap& expected_policy = expected.Get(ns); |
| 1220 expected_policy.Set("alternative_browser_path", | 1223 expected_policy.Set("alternative_browser_path", |
| 1221 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_MACHINE, | 1224 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_MACHINE, |
| 1222 new base::StringValue("c:\\legacy\\browser.exe"), NULL); | 1225 new base::StringValue("c:\\legacy\\browser.exe"), NULL); |
| 1223 expected_policy.Set("url_list", POLICY_LEVEL_MANDATORY, POLICY_SCOPE_MACHINE, | 1226 expected_policy.Set("url_list", POLICY_LEVEL_MANDATORY, POLICY_SCOPE_MACHINE, |
| 1224 list.DeepCopy(), NULL); | 1227 list.DeepCopy(), NULL); |
| 1225 EXPECT_TRUE(Matches(expected)); | 1228 EXPECT_TRUE(Matches(expected)); |
| 1226 } | 1229 } |
| 1227 | 1230 |
| 1228 } // namespace policy | 1231 } // namespace policy |
| OLD | NEW |