| Index: components/policy/core/browser/configuration_policy_handler_unittest.cc
|
| diff --git a/components/policy/core/browser/configuration_policy_handler_unittest.cc b/components/policy/core/browser/configuration_policy_handler_unittest.cc
|
| index 67b66049ae9f090344caeeefb58c2d1cad61c856..57db6d6fedd76d3e59cc836f2bd940cf9ebe49d9 100644
|
| --- a/components/policy/core/browser/configuration_policy_handler_unittest.cc
|
| +++ b/components/policy/core/browser/configuration_policy_handler_unittest.cc
|
| @@ -11,6 +11,7 @@
|
| #include "components/policy/core/browser/configuration_policy_handler.h"
|
| #include "components/policy/core/browser/policy_error_map.h"
|
| #include "components/policy/core/common/policy_map.h"
|
| +#include "components/policy/core/common/policy_types.h"
|
| #include "components/policy/core/common/schema.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
|
|
| @@ -56,22 +57,22 @@ TEST(StringToIntEnumListPolicyHandlerTest, CheckPolicySettings) {
|
| kTestPref,
|
| base::Bind(GetIntegerTypeMap));
|
|
|
| - policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER, list.DeepCopy(), NULL);
|
| + policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD, list.DeepCopy(), nullptr);
|
| errors.Clear();
|
| EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors));
|
| EXPECT_TRUE(errors.empty());
|
|
|
| list.AppendString("one");
|
| - policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER, list.DeepCopy(), NULL);
|
| + policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD, list.DeepCopy(), nullptr);
|
| errors.Clear();
|
| EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors));
|
| EXPECT_TRUE(errors.empty());
|
|
|
| list.AppendString("invalid");
|
| - policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER, list.DeepCopy(), NULL);
|
| + policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD, list.DeepCopy(), nullptr);
|
| errors.Clear();
|
| EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors));
|
| EXPECT_FALSE(errors.empty());
|
| @@ -80,6 +81,7 @@ TEST(StringToIntEnumListPolicyHandlerTest, CheckPolicySettings) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::StringValue("no list"),
|
| NULL);
|
| errors.Clear();
|
| @@ -99,23 +101,23 @@ TEST(StringMappingListPolicyHandlerTest, ApplyPolicySettings) {
|
| kTestPref,
|
| base::Bind(GetIntegerTypeMap));
|
|
|
| - policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER, list.DeepCopy(), NULL);
|
| + policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD, list.DeepCopy(), nullptr);
|
| handler.ApplyPolicySettings(policy_map, &prefs);
|
| EXPECT_TRUE(prefs.GetValue(kTestPref, &value));
|
| EXPECT_TRUE(base::Value::Equals(&expected, value));
|
|
|
| list.AppendString("two");
|
| expected.AppendInteger(2);
|
| - policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER, list.DeepCopy(), NULL);
|
| + policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD, list.DeepCopy(), nullptr);
|
| handler.ApplyPolicySettings(policy_map, &prefs);
|
| EXPECT_TRUE(prefs.GetValue(kTestPref, &value));
|
| EXPECT_TRUE(base::Value::Equals(&expected, value));
|
|
|
| list.AppendString("invalid");
|
| - policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER, list.DeepCopy(), NULL);
|
| + policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD, list.DeepCopy(), nullptr);
|
| handler.ApplyPolicySettings(policy_map, &prefs);
|
| EXPECT_TRUE(prefs.GetValue(kTestPref, &value));
|
| EXPECT_TRUE(base::Value::Equals(&expected, value));
|
| @@ -133,6 +135,7 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(0),
|
| NULL);
|
| errors.Clear();
|
| @@ -142,6 +145,7 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(5),
|
| NULL);
|
| errors.Clear();
|
| @@ -151,6 +155,7 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(10),
|
| NULL);
|
| errors.Clear();
|
| @@ -162,6 +167,7 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(-5),
|
| NULL);
|
| errors.Clear();
|
| @@ -171,6 +177,7 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(15),
|
| NULL);
|
| errors.Clear();
|
| @@ -182,6 +189,7 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::StringValue("invalid"),
|
| NULL);
|
| errors.Clear();
|
| @@ -201,6 +209,7 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(0),
|
| NULL);
|
| errors.Clear();
|
| @@ -210,6 +219,7 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(5),
|
| NULL);
|
| errors.Clear();
|
| @@ -219,6 +229,7 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(10),
|
| NULL);
|
| errors.Clear();
|
| @@ -230,6 +241,7 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(-5),
|
| NULL);
|
| errors.Clear();
|
| @@ -239,6 +251,7 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(15),
|
| NULL);
|
| errors.Clear();
|
| @@ -250,6 +263,7 @@ TEST(IntRangePolicyHandler, CheckPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::StringValue("invalid"),
|
| NULL);
|
| errors.Clear();
|
| @@ -271,6 +285,7 @@ TEST(IntRangePolicyHandler, ApplyPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(0),
|
| NULL);
|
| prefs.Clear();
|
| @@ -282,6 +297,7 @@ TEST(IntRangePolicyHandler, ApplyPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(5),
|
| NULL);
|
| prefs.Clear();
|
| @@ -293,6 +309,7 @@ TEST(IntRangePolicyHandler, ApplyPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(10),
|
| NULL);
|
| prefs.Clear();
|
| @@ -306,6 +323,7 @@ TEST(IntRangePolicyHandler, ApplyPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(-5),
|
| NULL);
|
| prefs.Clear();
|
| @@ -317,6 +335,7 @@ TEST(IntRangePolicyHandler, ApplyPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(15),
|
| NULL);
|
| prefs.Clear();
|
| @@ -340,6 +359,7 @@ TEST(IntRangePolicyHandler, ApplyPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(0),
|
| NULL);
|
| prefs.Clear();
|
| @@ -351,6 +371,7 @@ TEST(IntRangePolicyHandler, ApplyPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(5),
|
| NULL);
|
| prefs.Clear();
|
| @@ -362,6 +383,7 @@ TEST(IntRangePolicyHandler, ApplyPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(10),
|
| NULL);
|
| prefs.Clear();
|
| @@ -384,6 +406,7 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(0),
|
| NULL);
|
| errors.Clear();
|
| @@ -393,6 +416,7 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(5),
|
| NULL);
|
| errors.Clear();
|
| @@ -402,6 +426,7 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(10),
|
| NULL);
|
| errors.Clear();
|
| @@ -413,6 +438,7 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(-5),
|
| NULL);
|
| errors.Clear();
|
| @@ -422,6 +448,7 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(15),
|
| NULL);
|
| errors.Clear();
|
| @@ -433,6 +460,7 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::StringValue("invalid"),
|
| NULL);
|
| errors.Clear();
|
| @@ -453,6 +481,7 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(0),
|
| NULL);
|
| errors.Clear();
|
| @@ -462,6 +491,7 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(5),
|
| NULL);
|
| errors.Clear();
|
| @@ -471,6 +501,7 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(10),
|
| NULL);
|
| errors.Clear();
|
| @@ -482,6 +513,7 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(-5),
|
| NULL);
|
| errors.Clear();
|
| @@ -491,6 +523,7 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(15),
|
| NULL);
|
| errors.Clear();
|
| @@ -502,6 +535,7 @@ TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::StringValue("invalid"),
|
| NULL);
|
| errors.Clear();
|
| @@ -524,6 +558,7 @@ TEST(IntPercentageToDoublePolicyHandler, ApplyPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(0),
|
| NULL);
|
| prefs.Clear();
|
| @@ -535,6 +570,7 @@ TEST(IntPercentageToDoublePolicyHandler, ApplyPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(5),
|
| NULL);
|
| prefs.Clear();
|
| @@ -546,6 +582,7 @@ TEST(IntPercentageToDoublePolicyHandler, ApplyPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(10),
|
| NULL);
|
| prefs.Clear();
|
| @@ -559,6 +596,7 @@ TEST(IntPercentageToDoublePolicyHandler, ApplyPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(-5),
|
| NULL);
|
| prefs.Clear();
|
| @@ -570,6 +608,7 @@ TEST(IntPercentageToDoublePolicyHandler, ApplyPolicySettingsClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(15),
|
| NULL);
|
| prefs.Clear();
|
| @@ -594,6 +633,7 @@ TEST(IntPercentageToDoublePolicyHandler, ApplyPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(0),
|
| NULL);
|
| prefs.Clear();
|
| @@ -605,6 +645,7 @@ TEST(IntPercentageToDoublePolicyHandler, ApplyPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(5),
|
| NULL);
|
| prefs.Clear();
|
| @@ -616,6 +657,7 @@ TEST(IntPercentageToDoublePolicyHandler, ApplyPolicySettingsDontClamp) {
|
| policy_map.Set(kTestPolicy,
|
| POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| new base::FundamentalValue(10),
|
| NULL);
|
| prefs.Clear();
|
| @@ -661,8 +703,8 @@ TEST(SchemaValidatingPolicyHandlerTest, CheckAndGetValue) {
|
| ASSERT_TRUE(policy_map_value->GetAsDictionary(&policy_map_dict));
|
|
|
| PolicyMap policy_map;
|
| - policy_map.LoadFrom(
|
| - policy_map_dict, POLICY_LEVEL_RECOMMENDED, POLICY_SCOPE_USER);
|
| + policy_map.LoadFrom(policy_map_dict, POLICY_LEVEL_RECOMMENDED,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD);
|
|
|
| TestSchemaValidatingPolicyHandler handler(schema, SCHEMA_ALLOW_INVALID);
|
| scoped_ptr<base::Value> output_value;
|
| @@ -722,11 +764,13 @@ TEST(SimpleSchemaValidatingPolicyHandlerTest, CheckAndGetValue) {
|
|
|
| PolicyMap policy_map_recommended;
|
| policy_map_recommended.LoadFrom(
|
| - policy_map_dict, POLICY_LEVEL_RECOMMENDED, POLICY_SCOPE_USER);
|
| + policy_map_dict, POLICY_LEVEL_RECOMMENDED, POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD);
|
|
|
| PolicyMap policy_map_mandatory;
|
| policy_map_mandatory.LoadFrom(
|
| - policy_map_dict, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER);
|
| + policy_map_dict, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD);
|
|
|
| SimpleSchemaValidatingPolicyHandler handler_all(
|
| policy_name,
|
|
|