| OLD | NEW |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <memory> | 5 #include <memory> |
| 6 #include <string> | 6 #include <string> |
| 7 | 7 |
| 8 #include "base/macros.h" | 8 #include "base/macros.h" |
| 9 #include "base/memory/ptr_util.h" | 9 #include "base/memory/ptr_util.h" |
| 10 #include "base/message_loop/message_loop.h" | 10 #include "base/message_loop/message_loop.h" |
| (...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 101 EXPECT_CALL(policy_service_, | 101 EXPECT_CALL(policy_service_, |
| 102 GetPolicies(policy::PolicyNamespace( | 102 GetPolicies(policy::PolicyNamespace( |
| 103 policy::POLICY_DOMAIN_CHROME, std::string()))) | 103 policy::POLICY_DOMAIN_CHROME, std::string()))) |
| 104 .WillRepeatedly(ReturnRef(policy_map_)); | 104 .WillRepeatedly(ReturnRef(policy_map_)); |
| 105 EXPECT_CALL(policy_service_, AddObserver(policy::POLICY_DOMAIN_CHROME, _)) | 105 EXPECT_CALL(policy_service_, AddObserver(policy::POLICY_DOMAIN_CHROME, _)) |
| 106 .Times(1); | 106 .Times(1); |
| 107 | 107 |
| 108 mojom::PolicyInstancePtr policy_instance_ptr; | 108 mojom::PolicyInstancePtr policy_instance_ptr; |
| 109 policy_instance_ = base::MakeUnique<FakePolicyInstance>( | 109 policy_instance_ = base::MakeUnique<FakePolicyInstance>( |
| 110 GetProxy(&policy_instance_ptr), bridge_service_.get()); | 110 GetProxy(&policy_instance_ptr), bridge_service_.get()); |
| 111 bridge_service_->OnPolicyInstanceReady(std::move(policy_instance_ptr)); | 111 bridge_service_->policy()->OnInstanceReady(std::move(policy_instance_ptr)); |
| 112 policy_instance()->WaitForOnPolicyInstanceReady(); | 112 policy_instance()->WaitForOnPolicyInstanceReady(); |
| 113 } | 113 } |
| 114 | 114 |
| 115 protected: | 115 protected: |
| 116 ArcPolicyBridge* policy_bridge() { return policy_bridge_.get(); } | 116 ArcPolicyBridge* policy_bridge() { return policy_bridge_.get(); } |
| 117 FakePolicyInstance* policy_instance() { return policy_instance_.get(); } | 117 FakePolicyInstance* policy_instance() { return policy_instance_.get(); } |
| 118 policy::PolicyMap& policy_map() { return policy_map_; } | 118 policy::PolicyMap& policy_map() { return policy_map_; } |
| 119 | 119 |
| 120 private: | 120 private: |
| 121 // Not an unused variable. Unit tests do not have a message loop by themselves | 121 // Not an unused variable. Unit tests do not have a message loop by themselves |
| (...skipping 30 matching lines...) Expand all Loading... |
| 152 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," | 152 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," |
| 153 "\"installType\":\"REQUIRED\"," | 153 "\"installType\":\"REQUIRED\"," |
| 154 "\"lockTaskAllowed\":false," | 154 "\"lockTaskAllowed\":false," |
| 155 "\"permissionGrants\":[]" | 155 "\"permissionGrants\":[]" |
| 156 "}]," | 156 "}]," |
| 157 "\"defaultPermissionPolicy\":\"GRANT\"" | 157 "\"defaultPermissionPolicy\":\"GRANT\"" |
| 158 "}")), | 158 "}")), |
| 159 nullptr); | 159 nullptr); |
| 160 policy_bridge()->GetPolicies(PolicyStringCallback( | 160 policy_bridge()->GetPolicies(PolicyStringCallback( |
| 161 "{\"applications\":" | 161 "{\"applications\":" |
| 162 "[{\"installType\":\"REQUIRED\"," | 162 "[{\"installType\":\"REQUIRED\"," |
| 163 "\"lockTaskAllowed\":false," | 163 "\"lockTaskAllowed\":false," |
| 164 "\"packageName\":\"com.google.android.apps.youtube.kids\"," | 164 "\"packageName\":\"com.google.android.apps.youtube.kids\"," |
| 165 "\"permissionGrants\":[]" | 165 "\"permissionGrants\":[]" |
| 166 "}]," | 166 "}]," |
| 167 "\"defaultPermissionPolicy\":\"GRANT\"" | 167 "\"defaultPermissionPolicy\":\"GRANT\"" |
| 168 "}")); | 168 "}")); |
| 169 } | 169 } |
| 170 | 170 |
| 171 TEST_F(ArcPolicyBridgeTest, HompageLocationTest) { | 171 TEST_F(ArcPolicyBridgeTest, HompageLocationTest) { |
| 172 // This policy will not be passed on, result should be empty. | 172 // This policy will not be passed on, result should be empty. |
| 173 policy_map().Set( | 173 policy_map().Set( |
| 174 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, | 174 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, |
| 175 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 175 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
| 176 base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr); | 176 base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr); |
| (...skipping 135 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 312 policy_map().Set( | 312 policy_map().Set( |
| 313 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, | 313 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, |
| 314 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 314 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
| 315 base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr); | 315 base::WrapUnique(new base::StringValue("http://chromium.org")), nullptr); |
| 316 policy_map().Set( | 316 policy_map().Set( |
| 317 policy::key::kVideoCaptureAllowed, policy::POLICY_LEVEL_MANDATORY, | 317 policy::key::kVideoCaptureAllowed, policy::POLICY_LEVEL_MANDATORY, |
| 318 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 318 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
| 319 base::WrapUnique(new base::FundamentalValue(false)), nullptr); | 319 base::WrapUnique(new base::FundamentalValue(false)), nullptr); |
| 320 policy_bridge()->GetPolicies(PolicyStringCallback( | 320 policy_bridge()->GetPolicies(PolicyStringCallback( |
| 321 "{\"applications\":" | 321 "{\"applications\":" |
| 322 "[{\"installType\":\"REQUIRED\"," | 322 "[{\"installType\":\"REQUIRED\"," |
| 323 "\"lockTaskAllowed\":false," | 323 "\"lockTaskAllowed\":false," |
| 324 "\"packageName\":\"com.google.android.apps.youtube.kids\"," | 324 "\"packageName\":\"com.google.android.apps.youtube.kids\"," |
| 325 "\"permissionGrants\":[]" | 325 "\"permissionGrants\":[]" |
| 326 "}]," | 326 "}]," |
| 327 "\"cameraDisabled\":true," | 327 "\"cameraDisabled\":true," |
| 328 "\"defaultPermissionPolicy\":\"GRANT\"" | 328 "\"defaultPermissionPolicy\":\"GRANT\"" |
| 329 "}")); | 329 "}")); |
| 330 } | 330 } |
| 331 | 331 |
| 332 // This and the following test send the policies through a mojo connection | 332 // This and the following test send the policies through a mojo connection |
| 333 // between a PolicyInstance and the PolicyBridge. | 333 // between a PolicyInstance and the PolicyBridge. |
| 334 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) { | 334 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) { |
| 335 policy_bridge()->OverrideIsManagedForTesting(false); | 335 policy_bridge()->OverrideIsManagedForTesting(false); |
| 336 policy_instance()->CallGetPolicies(PolicyStringCallback("")); | 336 policy_instance()->CallGetPolicies(PolicyStringCallback("")); |
| 337 } | 337 } |
| 338 | 338 |
| 339 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) { | 339 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) { |
| 340 policy_instance()->CallGetPolicies(PolicyStringCallback("{}")); | 340 policy_instance()->CallGetPolicies(PolicyStringCallback("{}")); |
| 341 } | 341 } |
| 342 | 342 |
| 343 } // namespace arc | 343 } // namespace arc |
| OLD | NEW |