| Index: chrome/browser/chromeos/arc/arc_policy_bridge_unittest.cc
|
| diff --git a/chrome/browser/chromeos/arc/arc_policy_bridge_unittest.cc b/chrome/browser/chromeos/arc/arc_policy_bridge_unittest.cc
|
| index da58e3a77d742e2218f3e86c2ceca13094c7263d..b523bbad132155d40d172e8653d3762a3858c442 100644
|
| --- a/chrome/browser/chromeos/arc/arc_policy_bridge_unittest.cc
|
| +++ b/chrome/browser/chromeos/arc/arc_policy_bridge_unittest.cc
|
| @@ -6,6 +6,7 @@
|
| #include <string>
|
|
|
| #include "base/macros.h"
|
| +#include "base/memory/ptr_util.h"
|
| #include "base/values.h"
|
| #include "chrome/browser/chromeos/arc/arc_policy_bridge.h"
|
| #include "components/arc/test/fake_arc_bridge_service.h"
|
| @@ -85,15 +86,15 @@ TEST_F(ArcPolicyBridgeTest, ArcPolicyTest) {
|
| policy_map().Set(
|
| policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY,
|
| policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
|
| - new base::StringValue(
|
| + base::WrapUnique(new base::StringValue(
|
| "{\"applications\":"
|
| - "[{\"packageName\":\"com.google.android.apps.youtube.kids\","
|
| - "\"installType\":\"REQUIRED\","
|
| - "\"lockTaskAllowed\":false,"
|
| - "\"permissionGrants\":[]"
|
| - "}],"
|
| + "[{\"packageName\":\"com.google.android.apps.youtube.kids\","
|
| + "\"installType\":\"REQUIRED\","
|
| + "\"lockTaskAllowed\":false,"
|
| + "\"permissionGrants\":[]"
|
| + "}],"
|
| "\"defaultPermissionPolicy\":\"GRANT\""
|
| - "}"),
|
| + "}")),
|
| nullptr);
|
| policy_bridge()->GetPolicies(PolicyStringCallback(
|
| "{\"applications\":"
|
| @@ -108,11 +109,10 @@ TEST_F(ArcPolicyBridgeTest, ArcPolicyTest) {
|
|
|
| TEST_F(ArcPolicyBridgeTest, HompageLocationTest) {
|
| // This policy will not be passed on, result should be empty.
|
| - policy_map().Set(policy::key::kHomepageLocation,
|
| - policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
|
| - policy::POLICY_SOURCE_CLOUD,
|
| - new base::StringValue("http://chromium.org"),
|
| - nullptr);
|
| + policy_map().Set(
|
| + policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY,
|
| + policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr);
|
| policy_bridge()->GetPolicies(PolicyStringCallback("{}"));
|
| }
|
|
|
| @@ -120,25 +120,25 @@ TEST_F(ArcPolicyBridgeTest, DisableScreenshotsTest) {
|
| policy_map().Set(policy::key::kDisableScreenshots,
|
| policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
|
| policy::POLICY_SOURCE_CLOUD,
|
| - new base::FundamentalValue(true), nullptr);
|
| + base::WrapUnique(new base::FundamentalValue(true)), nullptr);
|
| policy_bridge()->GetPolicies(
|
| PolicyStringCallback("{\"screenCaptureDisabled\":true}"));
|
| }
|
|
|
| TEST_F(ArcPolicyBridgeTest, VideoCaptureAllowedTest) {
|
| - policy_map().Set(policy::key::kVideoCaptureAllowed,
|
| - policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
|
| - policy::POLICY_SOURCE_CLOUD,
|
| - new base::FundamentalValue(false), nullptr);
|
| + policy_map().Set(
|
| + policy::key::kVideoCaptureAllowed, policy::POLICY_LEVEL_MANDATORY,
|
| + policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::FundamentalValue(false)), nullptr);
|
| policy_bridge()->GetPolicies(
|
| PolicyStringCallback("{\"cameraDisabled\":true}"));
|
| }
|
|
|
| TEST_F(ArcPolicyBridgeTest, AudioCaptureAllowedTest) {
|
| - policy_map().Set(policy::key::kAudioCaptureAllowed,
|
| - policy::POLICY_LEVEL_MANDATORY,
|
| - policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
|
| - new base::FundamentalValue(false), nullptr);
|
| + policy_map().Set(
|
| + policy::key::kAudioCaptureAllowed, policy::POLICY_LEVEL_MANDATORY,
|
| + policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::FundamentalValue(false)), nullptr);
|
| policy_bridge()->GetPolicies(
|
| PolicyStringCallback("{\"unmuteMicrophoneDisabled\":true}"));
|
| }
|
| @@ -146,20 +146,20 @@ TEST_F(ArcPolicyBridgeTest, AudioCaptureAllowedTest) {
|
| TEST_F(ArcPolicyBridgeTest, DefaultGeolocationSettingTest) {
|
| policy_map().Set(policy::key::kDefaultGeolocationSetting,
|
| policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
|
| - policy::POLICY_SOURCE_CLOUD, new base::FundamentalValue(1),
|
| - nullptr);
|
| + policy::POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::FundamentalValue(1)), nullptr);
|
| policy_bridge()->GetPolicies(
|
| PolicyStringCallback("{\"shareLocationDisabled\":false}"));
|
| policy_map().Set(policy::key::kDefaultGeolocationSetting,
|
| policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
|
| - policy::POLICY_SOURCE_CLOUD, new base::FundamentalValue(2),
|
| - nullptr);
|
| + policy::POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::FundamentalValue(2)), nullptr);
|
| policy_bridge()->GetPolicies(
|
| PolicyStringCallback("{\"shareLocationDisabled\":true}"));
|
| policy_map().Set(policy::key::kDefaultGeolocationSetting,
|
| policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
|
| - policy::POLICY_SOURCE_CLOUD, new base::FundamentalValue(3),
|
| - nullptr);
|
| + policy::POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::FundamentalValue(3)), nullptr);
|
| policy_bridge()->GetPolicies(
|
| PolicyStringCallback("{\"shareLocationDisabled\":false}"));
|
| }
|
| @@ -168,7 +168,7 @@ TEST_F(ArcPolicyBridgeTest, ExternalStorageDisabledTest) {
|
| policy_map().Set(policy::key::kExternalStorageDisabled,
|
| policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
|
| policy::POLICY_SOURCE_CLOUD,
|
| - new base::FundamentalValue(true), nullptr);
|
| + base::WrapUnique(new base::FundamentalValue(true)), nullptr);
|
| policy_bridge()->GetPolicies(
|
| PolicyStringCallback("{\"usbFileTransferDisabled\":true}"));
|
| }
|
| @@ -179,7 +179,7 @@ TEST_F(ArcPolicyBridgeTest, URLBlacklistTest) {
|
| blacklist.Append(new base::StringValue("www.blacklist2.com"));
|
| policy_map().Set(policy::key::kURLBlacklist, policy::POLICY_LEVEL_MANDATORY,
|
| policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
|
| - blacklist.DeepCopy(), nullptr);
|
| + blacklist.CreateDeepCopy(), nullptr);
|
| policy_bridge()->GetPolicies(
|
| PolicyStringCallback("{\"globalAppRestrictions\":"
|
| "{\"com.android.browser:URLBlacklist\":"
|
| @@ -194,7 +194,7 @@ TEST_F(ArcPolicyBridgeTest, URLWhitelistTest) {
|
| whitelist.Append(new base::StringValue("www.whitelist2.com"));
|
| policy_map().Set(policy::key::kURLWhitelist, policy::POLICY_LEVEL_MANDATORY,
|
| policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
|
| - whitelist.DeepCopy(), nullptr);
|
| + whitelist.CreateDeepCopy(), nullptr);
|
| policy_bridge()->GetPolicies(
|
| PolicyStringCallback("{\"globalAppRestrictions\":"
|
| "{\"com.android.browser:URLWhitelist\":"
|
| @@ -207,22 +207,23 @@ TEST_F(ArcPolicyBridgeTest, MultiplePoliciesTest) {
|
| policy_map().Set(
|
| policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY,
|
| policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
|
| - new base::StringValue("{\"applications\":"
|
| - "[{\"packageName\":\"com.google.android.apps.youtube.kids\","
|
| - "\"installType\":\"REQUIRED\","
|
| - "\"lockTaskAllowed\":false,"
|
| - "\"permissionGrants\":[]"
|
| - "}],"
|
| - "\"defaultPermissionPolicy\":\"GRANT\"}"),
|
| + base::WrapUnique(new base::StringValue(
|
| + "{\"applications\":"
|
| + "[{\"packageName\":\"com.google.android.apps.youtube.kids\","
|
| + "\"installType\":\"REQUIRED\","
|
| + "\"lockTaskAllowed\":false,"
|
| + "\"permissionGrants\":[]"
|
| + "}],"
|
| + "\"defaultPermissionPolicy\":\"GRANT\"}")),
|
| nullptr);
|
| - policy_map().Set(policy::key::kHomepageLocation,
|
| - policy::POLICY_LEVEL_MANDATORY,
|
| - policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
|
| - new base::StringValue("http://chromium.org"), nullptr);
|
| - policy_map().Set(policy::key::kVideoCaptureAllowed,
|
| - policy::POLICY_LEVEL_MANDATORY,
|
| - policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
|
| - new base::FundamentalValue(false), nullptr);
|
| + policy_map().Set(
|
| + policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY,
|
| + policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr);
|
| + policy_map().Set(
|
| + policy::key::kVideoCaptureAllowed, policy::POLICY_LEVEL_MANDATORY,
|
| + policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::FundamentalValue(false)), nullptr);
|
| policy_bridge()->GetPolicies(PolicyStringCallback(
|
| "{\"applications\":"
|
| "[{\"installType\":\"REQUIRED\","
|
|
|