| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <stddef.h> | 5 #include <stddef.h> |
| 6 #include <stdint.h> | 6 #include <stdint.h> |
| 7 | 7 |
| 8 #include <algorithm> | 8 #include <algorithm> |
| 9 #include <memory> | 9 #include <memory> |
| 10 #include <string> | 10 #include <string> |
| (...skipping 1489 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1500 EXPECT_FALSE(ContainsVisibleElement(contents, "chrome-web-store-link")); | 1500 EXPECT_FALSE(ContainsVisibleElement(contents, "chrome-web-store-link")); |
| 1501 } | 1501 } |
| 1502 | 1502 |
| 1503 IN_PROC_BROWSER_TEST_F(PolicyTest, DownloadDirectory) { | 1503 IN_PROC_BROWSER_TEST_F(PolicyTest, DownloadDirectory) { |
| 1504 // Verifies that the download directory can be forced by policy. | 1504 // Verifies that the download directory can be forced by policy. |
| 1505 | 1505 |
| 1506 // Set the initial download directory. | 1506 // Set the initial download directory. |
| 1507 base::ScopedTempDir initial_dir; | 1507 base::ScopedTempDir initial_dir; |
| 1508 ASSERT_TRUE(initial_dir.CreateUniqueTempDir()); | 1508 ASSERT_TRUE(initial_dir.CreateUniqueTempDir()); |
| 1509 browser()->profile()->GetPrefs()->SetFilePath( | 1509 browser()->profile()->GetPrefs()->SetFilePath( |
| 1510 prefs::kDownloadDefaultDirectory, initial_dir.path()); | 1510 prefs::kDownloadDefaultDirectory, initial_dir.GetPath()); |
| 1511 // Don't prompt for the download location during this test. | 1511 // Don't prompt for the download location during this test. |
| 1512 browser()->profile()->GetPrefs()->SetBoolean( | 1512 browser()->profile()->GetPrefs()->SetBoolean( |
| 1513 prefs::kPromptForDownload, false); | 1513 prefs::kPromptForDownload, false); |
| 1514 | 1514 |
| 1515 // Verify that downloads end up on the default directory. | 1515 // Verify that downloads end up on the default directory. |
| 1516 base::FilePath file(FILE_PATH_LITERAL("download-test1.lib")); | 1516 base::FilePath file(FILE_PATH_LITERAL("download-test1.lib")); |
| 1517 DownloadAndVerifyFile(browser(), initial_dir.path(), file); | 1517 DownloadAndVerifyFile(browser(), initial_dir.GetPath(), file); |
| 1518 base::DieFileDie(initial_dir.path().Append(file), false); | 1518 base::DieFileDie(initial_dir.GetPath().Append(file), false); |
| 1519 | 1519 |
| 1520 // Override the download directory with the policy and verify a download. | 1520 // Override the download directory with the policy and verify a download. |
| 1521 base::ScopedTempDir forced_dir; | 1521 base::ScopedTempDir forced_dir; |
| 1522 ASSERT_TRUE(forced_dir.CreateUniqueTempDir()); | 1522 ASSERT_TRUE(forced_dir.CreateUniqueTempDir()); |
| 1523 PolicyMap policies; | 1523 PolicyMap policies; |
| 1524 policies.Set(key::kDownloadDirectory, POLICY_LEVEL_MANDATORY, | 1524 policies.Set( |
| 1525 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, | 1525 key::kDownloadDirectory, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
| 1526 base::MakeUnique<base::StringValue>(forced_dir.path().value()), | 1526 POLICY_SOURCE_CLOUD, |
| 1527 nullptr); | 1527 base::MakeUnique<base::StringValue>(forced_dir.GetPath().value()), |
| 1528 nullptr); |
| 1528 UpdateProviderPolicy(policies); | 1529 UpdateProviderPolicy(policies); |
| 1529 DownloadAndVerifyFile(browser(), forced_dir.path(), file); | 1530 DownloadAndVerifyFile(browser(), forced_dir.GetPath(), file); |
| 1530 // Verify that the first download location wasn't affected. | 1531 // Verify that the first download location wasn't affected. |
| 1531 EXPECT_FALSE(base::PathExists(initial_dir.path().Append(file))); | 1532 EXPECT_FALSE(base::PathExists(initial_dir.GetPath().Append(file))); |
| 1532 } | 1533 } |
| 1533 | 1534 |
| 1534 IN_PROC_BROWSER_TEST_F(PolicyTest, ExtensionInstallBlacklistSelective) { | 1535 IN_PROC_BROWSER_TEST_F(PolicyTest, ExtensionInstallBlacklistSelective) { |
| 1535 // Verifies that blacklisted extensions can't be installed. | 1536 // Verifies that blacklisted extensions can't be installed. |
| 1536 ExtensionService* service = extension_service(); | 1537 ExtensionService* service = extension_service(); |
| 1537 ASSERT_FALSE(service->GetExtensionById(kGoodCrxId, true)); | 1538 ASSERT_FALSE(service->GetExtensionById(kGoodCrxId, true)); |
| 1538 ASSERT_FALSE(service->GetExtensionById(kAdBlockCrxId, true)); | 1539 ASSERT_FALSE(service->GetExtensionById(kAdBlockCrxId, true)); |
| 1539 base::ListValue blacklist; | 1540 base::ListValue blacklist; |
| 1540 blacklist.AppendString(kGoodCrxId); | 1541 blacklist.AppendString(kGoodCrxId); |
| 1541 PolicyMap policies; | 1542 PolicyMap policies; |
| (...skipping 347 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1889 extensions::ScopedTestDialogAutoConfirm::ACCEPT); | 1890 extensions::ScopedTestDialogAutoConfirm::ACCEPT); |
| 1890 | 1891 |
| 1891 const GURL install_source_url( | 1892 const GURL install_source_url( |
| 1892 URLRequestMockHTTPJob::GetMockUrl("extensions/*")); | 1893 URLRequestMockHTTPJob::GetMockUrl("extensions/*")); |
| 1893 const GURL referrer_url(URLRequestMockHTTPJob::GetMockUrl("policy/*")); | 1894 const GURL referrer_url(URLRequestMockHTTPJob::GetMockUrl("policy/*")); |
| 1894 | 1895 |
| 1895 base::ScopedTempDir download_directory; | 1896 base::ScopedTempDir download_directory; |
| 1896 ASSERT_TRUE(download_directory.CreateUniqueTempDir()); | 1897 ASSERT_TRUE(download_directory.CreateUniqueTempDir()); |
| 1897 DownloadPrefs* download_prefs = | 1898 DownloadPrefs* download_prefs = |
| 1898 DownloadPrefs::FromBrowserContext(browser()->profile()); | 1899 DownloadPrefs::FromBrowserContext(browser()->profile()); |
| 1899 download_prefs->SetDownloadPath(download_directory.path()); | 1900 download_prefs->SetDownloadPath(download_directory.GetPath()); |
| 1900 | 1901 |
| 1901 const GURL download_page_url(URLRequestMockHTTPJob::GetMockUrl( | 1902 const GURL download_page_url(URLRequestMockHTTPJob::GetMockUrl( |
| 1902 "policy/extension_install_sources_test.html")); | 1903 "policy/extension_install_sources_test.html")); |
| 1903 ui_test_utils::NavigateToURL(browser(), download_page_url); | 1904 ui_test_utils::NavigateToURL(browser(), download_page_url); |
| 1904 | 1905 |
| 1905 // As long as the policy is not present, extensions are considered dangerous. | 1906 // As long as the policy is not present, extensions are considered dangerous. |
| 1906 content::DownloadTestObserverTerminal download_observer( | 1907 content::DownloadTestObserverTerminal download_observer( |
| 1907 content::BrowserContext::GetDownloadManager(browser()->profile()), 1, | 1908 content::BrowserContext::GetDownloadManager(browser()->profile()), 1, |
| 1908 content::DownloadTestObserver::ON_DANGEROUS_DOWNLOAD_DENY); | 1909 content::DownloadTestObserver::ON_DANGEROUS_DOWNLOAD_DENY); |
| 1909 PerformClick(0, 0); | 1910 PerformClick(0, 0); |
| (...skipping 2458 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 4368 | 4369 |
| 4369 SetEmptyPolicy(); | 4370 SetEmptyPolicy(); |
| 4370 // Policy not set. | 4371 // Policy not set. |
| 4371 CheckSystemTimezoneAutomaticDetectionPolicyUnset(); | 4372 CheckSystemTimezoneAutomaticDetectionPolicyUnset(); |
| 4372 EXPECT_TRUE(CheckResolveTimezoneByGeolocation(true, false)); | 4373 EXPECT_TRUE(CheckResolveTimezoneByGeolocation(true, false)); |
| 4373 EXPECT_TRUE(manager->TimeZoneResolverShouldBeRunningForTests()); | 4374 EXPECT_TRUE(manager->TimeZoneResolverShouldBeRunningForTests()); |
| 4374 } | 4375 } |
| 4375 #endif // defined(OS_CHROMEOS) | 4376 #endif // defined(OS_CHROMEOS) |
| 4376 | 4377 |
| 4377 } // namespace policy | 4378 } // namespace policy |
| OLD | NEW |