| Index: remoting/host/policy_hack/policy_watcher_unittest.cc
|
| diff --git a/remoting/host/policy_hack/policy_watcher_unittest.cc b/remoting/host/policy_hack/policy_watcher_unittest.cc
|
| index 729a7bbad06620a00147a7070a9cf56b0a320c2d..0ed1a55d3cdbe8961e23c52142381cc9ecb514f4 100644
|
| --- a/remoting/host/policy_hack/policy_watcher_unittest.cc
|
| +++ b/remoting/host/policy_hack/policy_watcher_unittest.cc
|
| @@ -75,6 +75,13 @@ class PolicyWatcherTest : public testing::Test {
|
| true);
|
| gnubby_auth_false_.SetBoolean(PolicyWatcher::kHostAllowGnubbyAuthPolicyName,
|
| false);
|
| + relay_true_.SetBoolean(PolicyWatcher::kRelayPolicyName, true);
|
| + relay_false_.SetBoolean(PolicyWatcher::kRelayPolicyName, false);
|
| + port_range_full_.SetString(PolicyWatcher::kUdpPortRangePolicyName,
|
| + kPortRange);
|
| + port_range_empty_.SetString(PolicyWatcher::kUdpPortRangePolicyName,
|
| + std::string());
|
| +
|
| #if !defined(NDEBUG)
|
| SetDefaults(nat_false_overridden_others_default_);
|
| nat_false_overridden_others_default_.SetBoolean(
|
| @@ -99,6 +106,7 @@ class PolicyWatcherTest : public testing::Test {
|
| }
|
|
|
| static const char* kHostDomain;
|
| + static const char* kPortRange;
|
| base::MessageLoop message_loop_;
|
| scoped_refptr<base::MessageLoopProxy> message_loop_proxy_;
|
| MockPolicyCallback mock_policy_callback_;
|
| @@ -126,10 +134,16 @@ class PolicyWatcherTest : public testing::Test {
|
| base::DictionaryValue pairing_false_;
|
| base::DictionaryValue gnubby_auth_true_;
|
| base::DictionaryValue gnubby_auth_false_;
|
| + base::DictionaryValue relay_true_;
|
| + base::DictionaryValue relay_false_;
|
| + base::DictionaryValue port_range_full_;
|
| + base::DictionaryValue port_range_empty_;
|
|
|
| private:
|
| void SetDefaults(base::DictionaryValue& dict) {
|
| dict.SetBoolean(PolicyWatcher::kNatPolicyName, true);
|
| + dict.SetBoolean(PolicyWatcher::kRelayPolicyName, true);
|
| + dict.SetString(PolicyWatcher::kUdpPortRangePolicyName, "");
|
| dict.SetBoolean(PolicyWatcher::kHostRequireTwoFactorPolicyName, false);
|
| dict.SetString(PolicyWatcher::kHostDomainPolicyName, std::string());
|
| dict.SetBoolean(PolicyWatcher::kHostMatchUsernamePolicyName, false);
|
| @@ -150,6 +164,7 @@ class PolicyWatcherTest : public testing::Test {
|
| };
|
|
|
| const char* PolicyWatcherTest::kHostDomain = "google.com";
|
| +const char* PolicyWatcherTest::kPortRange = "12400-12409";
|
|
|
| MATCHER_P(IsPolicies, dict, "") {
|
| return arg->Equals(dict);
|
| @@ -355,5 +370,37 @@ TEST_F(PolicyWatcherTest, GnubbyAuth) {
|
| StopWatching();
|
| }
|
|
|
| +TEST_F(PolicyWatcherTest, Relay) {
|
| + testing::InSequence sequence;
|
| + EXPECT_CALL(mock_policy_callback_,
|
| + OnPolicyUpdatePtr(IsPolicies(&nat_true_others_default_)));
|
| + EXPECT_CALL(mock_policy_callback_,
|
| + OnPolicyUpdatePtr(IsPolicies(&relay_false_)));
|
| + EXPECT_CALL(mock_policy_callback_,
|
| + OnPolicyUpdatePtr(IsPolicies(&relay_true_)));
|
| +
|
| + StartWatching();
|
| + policy_watcher_->SetPolicies(&empty_);
|
| + policy_watcher_->SetPolicies(&relay_false_);
|
| + policy_watcher_->SetPolicies(&relay_true_);
|
| + StopWatching();
|
| +}
|
| +
|
| +TEST_F(PolicyWatcherTest, UdpPortRange) {
|
| + testing::InSequence sequence;
|
| + EXPECT_CALL(mock_policy_callback_,
|
| + OnPolicyUpdatePtr(IsPolicies(&nat_true_others_default_)));
|
| + EXPECT_CALL(mock_policy_callback_,
|
| + OnPolicyUpdatePtr(IsPolicies(&port_range_full_)));
|
| + EXPECT_CALL(mock_policy_callback_,
|
| + OnPolicyUpdatePtr(IsPolicies(&port_range_empty_)));
|
| +
|
| + StartWatching();
|
| + policy_watcher_->SetPolicies(&empty_);
|
| + policy_watcher_->SetPolicies(&port_range_full_);
|
| + policy_watcher_->SetPolicies(&port_range_empty_);
|
| + StopWatching();
|
| +}
|
| +
|
| } // namespace policy_hack
|
| } // namespace remoting
|
|
|