Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(579)

Side by Side Diff: chromeos/network/onc/onc_validator_unittest.cc

Issue 1431563005: Handle prohibited technologies in device policy ONC (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chromeos/network/onc/onc_validator.h" 5 #include "chromeos/network/onc/onc_validator.h"
6 6
7 #include <string> 7 #include <string>
8 #include <utility> 8 #include <utility>
9 9
10 #include "base/logging.h" 10 #include "base/logging.h"
(...skipping 131 matching lines...) Expand 10 before | Expand all | Expand 10 after
142 true), 142 true),
143 OncParams("managed_toplevel_with_global_config.onc", 143 OncParams("managed_toplevel_with_global_config.onc",
144 &kToplevelConfigurationSignature, 144 &kToplevelConfigurationSignature,
145 true), 145 true),
146 // Check that at least one configuration is accepted for 146 // Check that at least one configuration is accepted for
147 // device policies. 147 // device policies.
148 OncParams("managed_toplevel_wifi_peap.onc", 148 OncParams("managed_toplevel_wifi_peap.onc",
149 &kToplevelConfigurationSignature, 149 &kToplevelConfigurationSignature,
150 true, 150 true,
151 ::onc::ONC_SOURCE_DEVICE_POLICY), 151 ::onc::ONC_SOURCE_DEVICE_POLICY),
152 // Disabled technologies are only allowed for user policies. 152 // Disabled technologies are only allowed for device policies.
153 OncParams("managed_toplevel_with_disabled_technologies.onc", 153 OncParams("managed_toplevel_with_disabled_technologies.onc",
154 &kToplevelConfigurationSignature, 154 &kToplevelConfigurationSignature,
155 true, 155 true,
156 ::onc::ONC_SOURCE_USER_POLICY), 156 ::onc::ONC_SOURCE_DEVICE_POLICY),
157 // AllowOnlyPolicyNetworksToConnect is only allowed for device policies. 157 // AllowOnlyPolicyNetworksToConnect is only allowed for device policies.
158 OncParams("managed_toplevel_with_only_managed.onc", 158 OncParams("managed_toplevel_with_only_managed.onc",
159 &kToplevelConfigurationSignature, 159 &kToplevelConfigurationSignature,
160 true, 160 true,
161 ::onc::ONC_SOURCE_DEVICE_POLICY), 161 ::onc::ONC_SOURCE_DEVICE_POLICY),
162 OncParams("managed_toplevel_l2tpipsec.onc", 162 OncParams("managed_toplevel_l2tpipsec.onc",
163 &kToplevelConfigurationSignature, 163 &kToplevelConfigurationSignature,
164 true), 164 true),
165 OncParams("toplevel_wifi_hexssid.onc", 165 OncParams("toplevel_wifi_hexssid.onc",
166 &kToplevelConfigurationSignature, 166 &kToplevelConfigurationSignature,
(...skipping 380 matching lines...) Expand 10 before | Expand all | Expand 10 after
547 true, 547 true,
548 ::onc::ONC_SOURCE_DEVICE_POLICY), 548 ::onc::ONC_SOURCE_DEVICE_POLICY),
549 ExpectBothNotValid("", "")), 549 ExpectBothNotValid("", "")),
550 std::make_pair(OncParams("openvpn-invalid-verify-x509-type", 550 std::make_pair(OncParams("openvpn-invalid-verify-x509-type",
551 &kNetworkConfigurationSignature, 551 &kNetworkConfigurationSignature,
552 false), 552 false),
553 ExpectBothNotValid("", "")))); 553 ExpectBothNotValid("", ""))));
554 554
555 } // namespace onc 555 } // namespace onc
556 } // namespace chromeos 556 } // namespace chromeos
OLDNEW
« no previous file with comments | « chromeos/network/onc/onc_validator.cc ('k') | chromeos/network/prohibited_technologies_handler.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698