Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(186)

Side by Side Diff: chrome/browser/chromeos/arc/arc_policy_bridge_unittest.cc

Issue 2133503002: arc: Revamp the ArcBridgeService interface (Closed) Base URL: https://chromium.googlesource.com/a/chromium/src.git@master
Patch Set: More rebasing Created 4 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2016 The Chromium Authors. All rights reserved. 1 // Copyright 2016 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <memory> 5 #include <memory>
6 #include <string> 6 #include <string>
7 7
8 #include "base/macros.h" 8 #include "base/macros.h"
9 #include "base/memory/ptr_util.h" 9 #include "base/memory/ptr_util.h"
10 #include "base/message_loop/message_loop.h" 10 #include "base/message_loop/message_loop.h"
(...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after
101 EXPECT_CALL(policy_service_, 101 EXPECT_CALL(policy_service_,
102 GetPolicies(policy::PolicyNamespace( 102 GetPolicies(policy::PolicyNamespace(
103 policy::POLICY_DOMAIN_CHROME, std::string()))) 103 policy::POLICY_DOMAIN_CHROME, std::string())))
104 .WillRepeatedly(ReturnRef(policy_map_)); 104 .WillRepeatedly(ReturnRef(policy_map_));
105 EXPECT_CALL(policy_service_, AddObserver(policy::POLICY_DOMAIN_CHROME, _)) 105 EXPECT_CALL(policy_service_, AddObserver(policy::POLICY_DOMAIN_CHROME, _))
106 .Times(1); 106 .Times(1);
107 107
108 mojom::PolicyInstancePtr policy_instance_ptr; 108 mojom::PolicyInstancePtr policy_instance_ptr;
109 policy_instance_ = base::MakeUnique<FakePolicyInstance>( 109 policy_instance_ = base::MakeUnique<FakePolicyInstance>(
110 GetProxy(&policy_instance_ptr), bridge_service_.get()); 110 GetProxy(&policy_instance_ptr), bridge_service_.get());
111 bridge_service_->OnPolicyInstanceReady(std::move(policy_instance_ptr)); 111 bridge_service_->policy()->OnInstanceReady(std::move(policy_instance_ptr));
112 policy_instance()->WaitForOnPolicyInstanceReady(); 112 policy_instance()->WaitForOnPolicyInstanceReady();
113 } 113 }
114 114
115 protected: 115 protected:
116 ArcPolicyBridge* policy_bridge() { return policy_bridge_.get(); } 116 ArcPolicyBridge* policy_bridge() { return policy_bridge_.get(); }
117 FakePolicyInstance* policy_instance() { return policy_instance_.get(); } 117 FakePolicyInstance* policy_instance() { return policy_instance_.get(); }
118 policy::PolicyMap& policy_map() { return policy_map_; } 118 policy::PolicyMap& policy_map() { return policy_map_; }
119 119
120 private: 120 private:
121 // Not an unused variable. Unit tests do not have a message loop by themselves 121 // Not an unused variable. Unit tests do not have a message loop by themselves
(...skipping 30 matching lines...) Expand all
152 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," 152 "[{\"packageName\":\"com.google.android.apps.youtube.kids\","
153 "\"installType\":\"REQUIRED\"," 153 "\"installType\":\"REQUIRED\","
154 "\"lockTaskAllowed\":false," 154 "\"lockTaskAllowed\":false,"
155 "\"permissionGrants\":[]" 155 "\"permissionGrants\":[]"
156 "}]," 156 "}],"
157 "\"defaultPermissionPolicy\":\"GRANT\"" 157 "\"defaultPermissionPolicy\":\"GRANT\""
158 "}")), 158 "}")),
159 nullptr); 159 nullptr);
160 policy_bridge()->GetPolicies(PolicyStringCallback( 160 policy_bridge()->GetPolicies(PolicyStringCallback(
161 "{\"applications\":" 161 "{\"applications\":"
162 "[{\"installType\":\"REQUIRED\"," 162 "[{\"installType\":\"REQUIRED\","
163 "\"lockTaskAllowed\":false," 163 "\"lockTaskAllowed\":false,"
164 "\"packageName\":\"com.google.android.apps.youtube.kids\"," 164 "\"packageName\":\"com.google.android.apps.youtube.kids\","
165 "\"permissionGrants\":[]" 165 "\"permissionGrants\":[]"
166 "}]," 166 "}],"
167 "\"defaultPermissionPolicy\":\"GRANT\"" 167 "\"defaultPermissionPolicy\":\"GRANT\""
168 "}")); 168 "}"));
169 } 169 }
170 170
171 TEST_F(ArcPolicyBridgeTest, HompageLocationTest) { 171 TEST_F(ArcPolicyBridgeTest, HompageLocationTest) {
172 // This policy will not be passed on, result should be empty. 172 // This policy will not be passed on, result should be empty.
173 policy_map().Set( 173 policy_map().Set(
174 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, 174 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY,
175 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 175 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
176 base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr); 176 base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr);
(...skipping 135 matching lines...) Expand 10 before | Expand all | Expand 10 after
312 policy_map().Set( 312 policy_map().Set(
313 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, 313 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY,
314 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 314 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
315 base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr); 315 base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr);
316 policy_map().Set( 316 policy_map().Set(
317 policy::key::kVideoCaptureAllowed, policy::POLICY_LEVEL_MANDATORY, 317 policy::key::kVideoCaptureAllowed, policy::POLICY_LEVEL_MANDATORY,
318 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 318 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
319 base::WrapUnique(new base::FundamentalValue(false)), nullptr); 319 base::WrapUnique(new base::FundamentalValue(false)), nullptr);
320 policy_bridge()->GetPolicies(PolicyStringCallback( 320 policy_bridge()->GetPolicies(PolicyStringCallback(
321 "{\"applications\":" 321 "{\"applications\":"
322 "[{\"installType\":\"REQUIRED\"," 322 "[{\"installType\":\"REQUIRED\","
323 "\"lockTaskAllowed\":false," 323 "\"lockTaskAllowed\":false,"
324 "\"packageName\":\"com.google.android.apps.youtube.kids\"," 324 "\"packageName\":\"com.google.android.apps.youtube.kids\","
325 "\"permissionGrants\":[]" 325 "\"permissionGrants\":[]"
326 "}]," 326 "}],"
327 "\"cameraDisabled\":true," 327 "\"cameraDisabled\":true,"
328 "\"defaultPermissionPolicy\":\"GRANT\"" 328 "\"defaultPermissionPolicy\":\"GRANT\""
329 "}")); 329 "}"));
330 } 330 }
331 331
332 // This and the following test send the policies through a mojo connection 332 // This and the following test send the policies through a mojo connection
333 // between a PolicyInstance and the PolicyBridge. 333 // between a PolicyInstance and the PolicyBridge.
334 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) { 334 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) {
335 policy_bridge()->OverrideIsManagedForTesting(false); 335 policy_bridge()->OverrideIsManagedForTesting(false);
336 policy_instance()->CallGetPolicies(PolicyStringCallback("")); 336 policy_instance()->CallGetPolicies(PolicyStringCallback(""));
337 } 337 }
338 338
339 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) { 339 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) {
340 policy_instance()->CallGetPolicies(PolicyStringCallback("{}")); 340 policy_instance()->CallGetPolicies(PolicyStringCallback("{}"));
341 } 341 }
342 342
343 } // namespace arc 343 } // namespace arc
OLDNEW
« no previous file with comments | « chrome/browser/chromeos/arc/arc_policy_bridge.cc ('k') | chrome/browser/chromeos/arc/arc_process_service.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698