Index: chrome/browser/chromeos/policy/device_local_account_policy_service_unittest.cc |
diff --git a/chrome/browser/chromeos/policy/device_local_account_policy_service_unittest.cc b/chrome/browser/chromeos/policy/device_local_account_policy_service_unittest.cc |
index 53649bf65acb0984c0828ce3106727fd38a3bad2..4d9c12f82e27691406d403b562bd1a74869f3c75 100644 |
--- a/chrome/browser/chromeos/policy/device_local_account_policy_service_unittest.cc |
+++ b/chrome/browser/chromeos/policy/device_local_account_policy_service_unittest.cc |
@@ -140,11 +140,9 @@ DeviceLocalAccountPolicyServiceTestBase:: |
void DeviceLocalAccountPolicyServiceTestBase::SetUp() { |
chromeos::DeviceSettingsTestBase::SetUp(); |
- expected_policy_map_.Set(key::kDisableSpdy, |
- POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, |
- new base::FundamentalValue(true), |
- NULL); |
+ expected_policy_map_.Set(key::kDisableSpdy, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, new base::FundamentalValue(true), |
+ NULL, POLICY_SOURCE_PLATFORM); |
device_local_account_policy_.payload().mutable_disablespdy()->set_value( |
true); |
@@ -199,6 +197,10 @@ DeviceLocalAccountPolicyServiceTest::DeviceLocalAccountPolicyServiceTest() { |
void DeviceLocalAccountPolicyServiceTest::SetUp() { |
DeviceLocalAccountPolicyServiceTestBase::SetUp(); |
+ expected_policy_map_.Set(key::kDisableSpdy, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_USER, new base::FundamentalValue(true), |
+ NULL, |
+ POLICY_SOURCE_DEFAULT); // No source from broker. |
service_->AddObserver(&service_observer_); |
} |
@@ -803,28 +805,21 @@ void DeviceLocalAccountPolicyProviderTest::SetUp() { |
provider_->AddObserver(&provider_observer_); |
// Values implicitly enforced for public accounts. |
- expected_policy_map_.Set(key::kLidCloseAction, |
- POLICY_LEVEL_MANDATORY, |
+ expected_policy_map_.Set( |
Thiemo Nagel
2015/09/01 17:40:36
Please don't reformat existing code.
fhorschig
2015/09/04 06:53:53
Done.
|
+ key::kLidCloseAction, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_MACHINE, |
+ new base::FundamentalValue( |
+ chromeos::PowerPolicyController::ACTION_STOP_SESSION), |
+ NULL, POLICY_SOURCE_PLATFORM); |
+ expected_policy_map_.Set(key::kShelfAutoHideBehavior, POLICY_LEVEL_MANDATORY, |
+ POLICY_SCOPE_MACHINE, new base::StringValue("Never"), |
+ NULL, POLICY_SOURCE_PLATFORM); |
+ expected_policy_map_.Set(key::kShowLogoutButtonInTray, POLICY_LEVEL_MANDATORY, |
POLICY_SCOPE_MACHINE, |
- new base::FundamentalValue( |
- chromeos::PowerPolicyController:: |
- ACTION_STOP_SESSION), |
- NULL); |
- expected_policy_map_.Set(key::kShelfAutoHideBehavior, |
- POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_MACHINE, |
- new base::StringValue("Never"), |
- NULL); |
- expected_policy_map_.Set(key::kShowLogoutButtonInTray, |
- POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_MACHINE, |
- new base::FundamentalValue(true), |
- NULL); |
- expected_policy_map_.Set(key::kFullscreenAllowed, |
- POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_MACHINE, |
- new base::FundamentalValue(false), |
- NULL); |
+ new base::FundamentalValue(true), NULL, |
+ POLICY_SOURCE_PLATFORM); |
+ expected_policy_map_.Set( |
+ key::kFullscreenAllowed, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_MACHINE, |
+ new base::FundamentalValue(false), NULL, POLICY_SOURCE_PLATFORM); |
} |
void DeviceLocalAccountPolicyProviderTest::TearDown() { |
@@ -884,13 +879,10 @@ TEST_F(DeviceLocalAccountPolicyProviderTest, Policy) { |
FlushDeviceSettings(); |
Mock::VerifyAndClearExpectations(&provider_observer_); |
- expected_policy_bundle.Get( |
- PolicyNamespace(POLICY_DOMAIN_CHROME, std::string())) |
- .Set(key::kDisableSpdy, |
- POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, |
- new base::FundamentalValue(false), |
- NULL); |
+ expected_policy_bundle.Get(PolicyNamespace(POLICY_DOMAIN_CHROME, |
+ std::string())) |
+ .Set(key::kDisableSpdy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
+ new base::FundamentalValue(false), NULL, POLICY_SOURCE_PLATFORM); |
EXPECT_TRUE(expected_policy_bundle.Equals(provider_->policies())); |
// Any values set for the |ShelfAutoHideBehavior|, |ShowLogoutButtonInTray| |