OLD | NEW |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <memory> | 5 #include <memory> |
6 #include <string> | 6 #include <string> |
7 | 7 |
8 #include "base/macros.h" | 8 #include "base/macros.h" |
9 #include "base/memory/ptr_util.h" | 9 #include "base/memory/ptr_util.h" |
10 #include "base/message_loop/message_loop.h" | 10 #include "base/message_loop/message_loop.h" |
(...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
101 EXPECT_CALL(policy_service_, | 101 EXPECT_CALL(policy_service_, |
102 GetPolicies(policy::PolicyNamespace( | 102 GetPolicies(policy::PolicyNamespace( |
103 policy::POLICY_DOMAIN_CHROME, std::string()))) | 103 policy::POLICY_DOMAIN_CHROME, std::string()))) |
104 .WillRepeatedly(ReturnRef(policy_map_)); | 104 .WillRepeatedly(ReturnRef(policy_map_)); |
105 EXPECT_CALL(policy_service_, AddObserver(policy::POLICY_DOMAIN_CHROME, _)) | 105 EXPECT_CALL(policy_service_, AddObserver(policy::POLICY_DOMAIN_CHROME, _)) |
106 .Times(1); | 106 .Times(1); |
107 | 107 |
108 mojom::PolicyInstancePtr policy_instance_ptr; | 108 mojom::PolicyInstancePtr policy_instance_ptr; |
109 policy_instance_ = base::MakeUnique<FakePolicyInstance>( | 109 policy_instance_ = base::MakeUnique<FakePolicyInstance>( |
110 GetProxy(&policy_instance_ptr), bridge_service_.get()); | 110 GetProxy(&policy_instance_ptr), bridge_service_.get()); |
111 bridge_service_->OnPolicyInstanceReady(std::move(policy_instance_ptr)); | 111 bridge_service_->policy()->OnInstanceReady(std::move(policy_instance_ptr)); |
112 policy_instance()->WaitForOnPolicyInstanceReady(); | 112 policy_instance()->WaitForOnPolicyInstanceReady(); |
113 } | 113 } |
114 | 114 |
115 protected: | 115 protected: |
116 ArcPolicyBridge* policy_bridge() { return policy_bridge_.get(); } | 116 ArcPolicyBridge* policy_bridge() { return policy_bridge_.get(); } |
117 FakePolicyInstance* policy_instance() { return policy_instance_.get(); } | 117 FakePolicyInstance* policy_instance() { return policy_instance_.get(); } |
118 policy::PolicyMap& policy_map() { return policy_map_; } | 118 policy::PolicyMap& policy_map() { return policy_map_; } |
119 | 119 |
120 private: | 120 private: |
121 // Not an unused variable. Unit tests do not have a message loop by themselves | 121 // Not an unused variable. Unit tests do not have a message loop by themselves |
(...skipping 30 matching lines...) Expand all Loading... |
152 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," | 152 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," |
153 "\"installType\":\"REQUIRED\"," | 153 "\"installType\":\"REQUIRED\"," |
154 "\"lockTaskAllowed\":false," | 154 "\"lockTaskAllowed\":false," |
155 "\"permissionGrants\":[]" | 155 "\"permissionGrants\":[]" |
156 "}]," | 156 "}]," |
157 "\"defaultPermissionPolicy\":\"GRANT\"" | 157 "\"defaultPermissionPolicy\":\"GRANT\"" |
158 "}")), | 158 "}")), |
159 nullptr); | 159 nullptr); |
160 policy_bridge()->GetPolicies(PolicyStringCallback( | 160 policy_bridge()->GetPolicies(PolicyStringCallback( |
161 "{\"applications\":" | 161 "{\"applications\":" |
162 "[{\"installType\":\"REQUIRED\"," | 162 "[{\"installType\":\"REQUIRED\"," |
163 "\"lockTaskAllowed\":false," | 163 "\"lockTaskAllowed\":false," |
164 "\"packageName\":\"com.google.android.apps.youtube.kids\"," | 164 "\"packageName\":\"com.google.android.apps.youtube.kids\"," |
165 "\"permissionGrants\":[]" | 165 "\"permissionGrants\":[]" |
166 "}]," | 166 "}]," |
167 "\"defaultPermissionPolicy\":\"GRANT\"" | 167 "\"defaultPermissionPolicy\":\"GRANT\"" |
168 "}")); | 168 "}")); |
169 } | 169 } |
170 | 170 |
171 TEST_F(ArcPolicyBridgeTest, HompageLocationTest) { | 171 TEST_F(ArcPolicyBridgeTest, HompageLocationTest) { |
172 // This policy will not be passed on, result should be empty. | 172 // This policy will not be passed on, result should be empty. |
173 policy_map().Set( | 173 policy_map().Set( |
174 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, | 174 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, |
175 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 175 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
176 base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr); | 176 base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr); |
(...skipping 135 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
312 policy_map().Set( | 312 policy_map().Set( |
313 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, | 313 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, |
314 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 314 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
315 base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr); | 315 base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr); |
316 policy_map().Set( | 316 policy_map().Set( |
317 policy::key::kVideoCaptureAllowed, policy::POLICY_LEVEL_MANDATORY, | 317 policy::key::kVideoCaptureAllowed, policy::POLICY_LEVEL_MANDATORY, |
318 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 318 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
319 base::WrapUnique(new base::FundamentalValue(false)), nullptr); | 319 base::WrapUnique(new base::FundamentalValue(false)), nullptr); |
320 policy_bridge()->GetPolicies(PolicyStringCallback( | 320 policy_bridge()->GetPolicies(PolicyStringCallback( |
321 "{\"applications\":" | 321 "{\"applications\":" |
322 "[{\"installType\":\"REQUIRED\"," | 322 "[{\"installType\":\"REQUIRED\"," |
323 "\"lockTaskAllowed\":false," | 323 "\"lockTaskAllowed\":false," |
324 "\"packageName\":\"com.google.android.apps.youtube.kids\"," | 324 "\"packageName\":\"com.google.android.apps.youtube.kids\"," |
325 "\"permissionGrants\":[]" | 325 "\"permissionGrants\":[]" |
326 "}]," | 326 "}]," |
327 "\"cameraDisabled\":true," | 327 "\"cameraDisabled\":true," |
328 "\"defaultPermissionPolicy\":\"GRANT\"" | 328 "\"defaultPermissionPolicy\":\"GRANT\"" |
329 "}")); | 329 "}")); |
330 } | 330 } |
331 | 331 |
332 // This and the following test send the policies through a mojo connection | 332 // This and the following test send the policies through a mojo connection |
333 // between a PolicyInstance and the PolicyBridge. | 333 // between a PolicyInstance and the PolicyBridge. |
334 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) { | 334 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) { |
335 policy_bridge()->OverrideIsManagedForTesting(false); | 335 policy_bridge()->OverrideIsManagedForTesting(false); |
336 policy_instance()->CallGetPolicies(PolicyStringCallback("")); | 336 policy_instance()->CallGetPolicies(PolicyStringCallback("")); |
337 } | 337 } |
338 | 338 |
339 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) { | 339 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) { |
340 policy_instance()->CallGetPolicies(PolicyStringCallback("{}")); | 340 policy_instance()->CallGetPolicies(PolicyStringCallback("{}")); |
341 } | 341 } |
342 | 342 |
343 } // namespace arc | 343 } // namespace arc |
OLD | NEW |