| Index: chrome/browser/chromeos/policy/configuration_policy_handler_chromeos_unittest.cc
|
| diff --git a/chrome/browser/chromeos/policy/configuration_policy_handler_chromeos_unittest.cc b/chrome/browser/chromeos/policy/configuration_policy_handler_chromeos_unittest.cc
|
| index 28e596b41684fa31e6f95ca08304c371d4b88554..50af703796f4f55ebf48366d2b8a079eb187da04 100644
|
| --- a/chrome/browser/chromeos/policy/configuration_policy_handler_chromeos_unittest.cc
|
| +++ b/chrome/browser/chromeos/policy/configuration_policy_handler_chromeos_unittest.cc
|
| @@ -5,10 +5,12 @@
|
| #include "chrome/browser/chromeos/policy/configuration_policy_handler_chromeos.h"
|
|
|
| #include <memory>
|
| +#include <utility>
|
|
|
| #include "base/callback.h"
|
| #include "base/json/json_reader.h"
|
| #include "base/macros.h"
|
| +#include "base/memory/ptr_util.h"
|
| #include "base/values.h"
|
| #include "chrome/browser/ui/ash/chrome_launcher_prefs.h"
|
| #include "chrome/common/pref_names.h"
|
| @@ -61,12 +63,9 @@ TEST_F(ScreenMagnifierPolicyHandlerTest, Default) {
|
| }
|
|
|
| TEST_F(ScreenMagnifierPolicyHandlerTest, Disabled) {
|
| - policy_.Set(key::kScreenMagnifierType,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - new base::FundamentalValue(0),
|
| - NULL);
|
| + policy_.Set(key::kScreenMagnifierType, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::FundamentalValue(0)), nullptr);
|
| handler_.ApplyPolicySettings(policy_, &prefs_);
|
|
|
| const base::Value* enabled = NULL;
|
| @@ -82,12 +81,9 @@ TEST_F(ScreenMagnifierPolicyHandlerTest, Disabled) {
|
| }
|
|
|
| TEST_F(ScreenMagnifierPolicyHandlerTest, Enabled) {
|
| - policy_.Set(key::kScreenMagnifierType,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - new base::FundamentalValue(1),
|
| - NULL);
|
| + policy_.Set(key::kScreenMagnifierType, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::FundamentalValue(1)), nullptr);
|
| handler_.ApplyPolicySettings(policy_, &prefs_);
|
|
|
| const base::Value* enabled = NULL;
|
| @@ -111,12 +107,9 @@ TEST(ExternalDataPolicyHandlerTest, Empty) {
|
|
|
| TEST(ExternalDataPolicyHandlerTest, WrongType) {
|
| PolicyMap policy_map;
|
| - policy_map.Set(key::kUserAvatarImage,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - new base::FundamentalValue(false),
|
| - NULL);
|
| + policy_map.Set(key::kUserAvatarImage, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::FundamentalValue(false)), nullptr);
|
| PolicyErrorMap errors;
|
| EXPECT_FALSE(ExternalDataPolicyHandler(key::kUserAvatarImage)
|
| .CheckPolicySettings(policy_map, &errors));
|
| @@ -127,12 +120,9 @@ TEST(ExternalDataPolicyHandlerTest, MissingURL) {
|
| std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue);
|
| dict->SetString("hash", "1234567890123456789012345678901234567890");
|
| PolicyMap policy_map;
|
| - policy_map.Set(key::kUserAvatarImage,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - dict.release(),
|
| - NULL);
|
| + policy_map.Set(key::kUserAvatarImage, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, std::move(dict),
|
| + nullptr);
|
| PolicyErrorMap errors;
|
| EXPECT_FALSE(ExternalDataPolicyHandler(key::kUserAvatarImage)
|
| .CheckPolicySettings(policy_map, &errors));
|
| @@ -144,12 +134,9 @@ TEST(ExternalDataPolicyHandlerTest, InvalidURL) {
|
| dict->SetString("url", "http://");
|
| dict->SetString("hash", "1234567890123456789012345678901234567890");
|
| PolicyMap policy_map;
|
| - policy_map.Set(key::kUserAvatarImage,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - dict.release(),
|
| - NULL);
|
| + policy_map.Set(key::kUserAvatarImage, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, std::move(dict),
|
| + nullptr);
|
| PolicyErrorMap errors;
|
| EXPECT_FALSE(ExternalDataPolicyHandler(key::kUserAvatarImage)
|
| .CheckPolicySettings(policy_map, &errors));
|
| @@ -160,12 +147,9 @@ TEST(ExternalDataPolicyHandlerTest, MissingHash) {
|
| std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue);
|
| dict->SetString("url", "http://localhost/");
|
| PolicyMap policy_map;
|
| - policy_map.Set(key::kUserAvatarImage,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - dict.release(),
|
| - NULL);
|
| + policy_map.Set(key::kUserAvatarImage, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, std::move(dict),
|
| + nullptr);
|
| PolicyErrorMap errors;
|
| EXPECT_FALSE(ExternalDataPolicyHandler(key::kUserAvatarImage)
|
| .CheckPolicySettings(policy_map, &errors));
|
| @@ -177,12 +161,9 @@ TEST(ExternalDataPolicyHandlerTest, InvalidHash) {
|
| dict->SetString("url", "http://localhost/");
|
| dict->SetString("hash", "1234");
|
| PolicyMap policy_map;
|
| - policy_map.Set(key::kUserAvatarImage,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - dict.release(),
|
| - NULL);
|
| + policy_map.Set(key::kUserAvatarImage, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, std::move(dict),
|
| + nullptr);
|
| PolicyErrorMap errors;
|
| EXPECT_FALSE(ExternalDataPolicyHandler(key::kUserAvatarImage)
|
| .CheckPolicySettings(policy_map, &errors));
|
| @@ -196,12 +177,9 @@ TEST(ExternalDataPolicyHandlerTest, Valid) {
|
| "hash",
|
| "1234567890123456789012345678901234567890123456789012345678901234");
|
| PolicyMap policy_map;
|
| - policy_map.Set(key::kUserAvatarImage,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - dict.release(),
|
| - NULL);
|
| + policy_map.Set(key::kUserAvatarImage, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, std::move(dict),
|
| + nullptr);
|
| PolicyErrorMap errors;
|
| EXPECT_TRUE(ExternalDataPolicyHandler(key::kUserAvatarImage)
|
| .CheckPolicySettings(policy_map, &errors));
|
| @@ -257,12 +235,9 @@ TEST(NetworkConfigurationPolicyHandlerTest, ValidONC) {
|
| "}");
|
|
|
| PolicyMap policy_map;
|
| - policy_map.Set(key::kOpenNetworkConfiguration,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - new base::StringValue(kTestONC),
|
| - NULL);
|
| + policy_map.Set(key::kOpenNetworkConfiguration, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::StringValue(kTestONC)), nullptr);
|
| std::unique_ptr<NetworkConfigurationPolicyHandler> handler(
|
| NetworkConfigurationPolicyHandler::CreateForUserPolicy());
|
| PolicyErrorMap errors;
|
| @@ -272,12 +247,9 @@ TEST(NetworkConfigurationPolicyHandlerTest, ValidONC) {
|
|
|
| TEST(NetworkConfigurationPolicyHandlerTest, WrongType) {
|
| PolicyMap policy_map;
|
| - policy_map.Set(key::kOpenNetworkConfiguration,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - new base::FundamentalValue(false),
|
| - NULL);
|
| + policy_map.Set(key::kOpenNetworkConfiguration, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::FundamentalValue(false)), nullptr);
|
| std::unique_ptr<NetworkConfigurationPolicyHandler> handler(
|
| NetworkConfigurationPolicyHandler::CreateForUserPolicy());
|
| PolicyErrorMap errors;
|
| @@ -288,12 +260,9 @@ TEST(NetworkConfigurationPolicyHandlerTest, WrongType) {
|
| TEST(NetworkConfigurationPolicyHandlerTest, JSONParseError) {
|
| const std::string kTestONC("I'm not proper JSON!");
|
| PolicyMap policy_map;
|
| - policy_map.Set(key::kOpenNetworkConfiguration,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - new base::StringValue(kTestONC),
|
| - NULL);
|
| + policy_map.Set(key::kOpenNetworkConfiguration, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::StringValue(kTestONC)), nullptr);
|
| std::unique_ptr<NetworkConfigurationPolicyHandler> handler(
|
| NetworkConfigurationPolicyHandler::CreateForUserPolicy());
|
| PolicyErrorMap errors;
|
| @@ -317,12 +286,9 @@ TEST(NetworkConfigurationPolicyHandlerTest, Sanitization) {
|
| "}");
|
|
|
| PolicyMap policy_map;
|
| - policy_map.Set(key::kOpenNetworkConfiguration,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - new base::StringValue(kTestONC),
|
| - NULL);
|
| + policy_map.Set(key::kOpenNetworkConfiguration, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::StringValue(kTestONC)), nullptr);
|
| std::unique_ptr<NetworkConfigurationPolicyHandler> handler(
|
| NetworkConfigurationPolicyHandler::CreateForUserPolicy());
|
| PolicyErrorMap errors;
|
| @@ -345,7 +311,7 @@ TEST(PinnedLauncherAppsPolicyHandler, PrefTranslation) {
|
| PinnedLauncherAppsPolicyHandler handler;
|
|
|
| policy_map.Set(key::kPinnedLauncherApps, POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, list.DeepCopy(),
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, list.CreateDeepCopy(),
|
| nullptr);
|
| handler.ApplyPolicySettings(policy_map, &prefs);
|
| EXPECT_TRUE(prefs.GetValue(prefs::kPolicyPinnedLauncherApps, &value));
|
| @@ -357,7 +323,7 @@ TEST(PinnedLauncherAppsPolicyHandler, PrefTranslation) {
|
| expected_pinned_apps.Append(entry1_dict);
|
| list.Append(entry1.DeepCopy());
|
| policy_map.Set(key::kPinnedLauncherApps, POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, list.DeepCopy(),
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, list.CreateDeepCopy(),
|
| nullptr);
|
| prefs.Clear();
|
| handler.ApplyPolicySettings(policy_map, &prefs);
|
| @@ -375,12 +341,10 @@ TEST_F(LoginScreenPowerManagementPolicyHandlerTest, Empty) {
|
|
|
| TEST_F(LoginScreenPowerManagementPolicyHandlerTest, ValidPolicy) {
|
| PolicyMap policy_map;
|
| - policy_map.Set(
|
| - key::kDeviceLoginScreenPowerManagement, POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - base::JSONReader::Read(kLoginScreenPowerManagementPolicy).release(),
|
| - NULL);
|
| + policy_map.Set(key::kDeviceLoginScreenPowerManagement, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| + base::JSONReader::Read(kLoginScreenPowerManagementPolicy),
|
| + nullptr);
|
| LoginScreenPowerManagementPolicyHandler handler(chrome_schema_);
|
| PolicyErrorMap errors;
|
| EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors));
|
| @@ -389,12 +353,9 @@ TEST_F(LoginScreenPowerManagementPolicyHandlerTest, ValidPolicy) {
|
|
|
| TEST_F(LoginScreenPowerManagementPolicyHandlerTest, WrongType) {
|
| PolicyMap policy_map;
|
| - policy_map.Set(key::kDeviceLoginScreenPowerManagement,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - new base::FundamentalValue(false),
|
| - NULL);
|
| + policy_map.Set(key::kDeviceLoginScreenPowerManagement, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::FundamentalValue(false)), nullptr);
|
| LoginScreenPowerManagementPolicyHandler handler(chrome_schema_);
|
| PolicyErrorMap errors;
|
| EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors));
|
|
|