| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/chromeos/policy/user_cloud_policy_store_chromeos.h" | 5 #include "chrome/browser/chromeos/policy/user_cloud_policy_store_chromeos.h" |
| 6 | 6 |
| 7 #include <stdint.h> | 7 #include <stdint.h> |
| 8 | 8 |
| 9 #include <memory> | 9 #include <memory> |
| 10 #include <vector> | 10 #include <vector> |
| (...skipping 186 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 197 EXPECT_TRUE(store_->policy_map().empty()); | 197 EXPECT_TRUE(store_->policy_map().empty()); |
| 198 EXPECT_EQ(CloudPolicyStore::STATUS_VALIDATION_ERROR, store_->status()); | 198 EXPECT_EQ(CloudPolicyStore::STATUS_VALIDATION_ERROR, store_->status()); |
| 199 } | 199 } |
| 200 | 200 |
| 201 void RunUntilIdle() { | 201 void RunUntilIdle() { |
| 202 loop_.RunUntilIdle(); | 202 loop_.RunUntilIdle(); |
| 203 loop_.RunUntilIdle(); | 203 loop_.RunUntilIdle(); |
| 204 } | 204 } |
| 205 | 205 |
| 206 base::FilePath user_policy_dir() { | 206 base::FilePath user_policy_dir() { |
| 207 return tmp_dir_.path().AppendASCII("var_run_user_policy"); | 207 return tmp_dir_.GetPath().AppendASCII("var_run_user_policy"); |
| 208 } | 208 } |
| 209 | 209 |
| 210 base::FilePath user_policy_key_file() { | 210 base::FilePath user_policy_key_file() { |
| 211 return user_policy_dir().AppendASCII(kSanitizedUsername) | 211 return user_policy_dir().AppendASCII(kSanitizedUsername) |
| 212 .AppendASCII("policy.pub"); | 212 .AppendASCII("policy.pub"); |
| 213 } | 213 } |
| 214 | 214 |
| 215 base::FilePath token_file() { | 215 base::FilePath token_file() { |
| 216 return tmp_dir_.path().AppendASCII("token"); | 216 return tmp_dir_.GetPath().AppendASCII("token"); |
| 217 } | 217 } |
| 218 | 218 |
| 219 base::FilePath policy_file() { | 219 base::FilePath policy_file() { |
| 220 return tmp_dir_.path().AppendASCII("policy"); | 220 return tmp_dir_.GetPath().AppendASCII("policy"); |
| 221 } | 221 } |
| 222 | 222 |
| 223 base::MessageLoopForUI loop_; | 223 base::MessageLoopForUI loop_; |
| 224 chromeos::MockCryptohomeClient cryptohome_client_; | 224 chromeos::MockCryptohomeClient cryptohome_client_; |
| 225 chromeos::MockSessionManagerClient session_manager_client_; | 225 chromeos::MockSessionManagerClient session_manager_client_; |
| 226 UserPolicyBuilder policy_; | 226 UserPolicyBuilder policy_; |
| 227 MockCloudPolicyStoreObserver observer_; | 227 MockCloudPolicyStoreObserver observer_; |
| 228 std::unique_ptr<UserCloudPolicyStoreChromeOS> store_; | 228 std::unique_ptr<UserCloudPolicyStoreChromeOS> store_; |
| 229 const AccountId account_id_ = | 229 const AccountId account_id_ = |
| 230 AccountId::FromUserEmail(PolicyBuilder::kFakeUsername); | 230 AccountId::FromUserEmail(PolicyBuilder::kFakeUsername); |
| (...skipping 435 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 666 Mock::VerifyAndClearExpectations(&cryptohome_client_); | 666 Mock::VerifyAndClearExpectations(&cryptohome_client_); |
| 667 | 667 |
| 668 EXPECT_FALSE(store_->policy()); | 668 EXPECT_FALSE(store_->policy()); |
| 669 EXPECT_TRUE(store_->policy_map().empty()); | 669 EXPECT_TRUE(store_->policy_map().empty()); |
| 670 EXPECT_EQ(CloudPolicyStore::STATUS_VALIDATION_ERROR, store_->status()); | 670 EXPECT_EQ(CloudPolicyStore::STATUS_VALIDATION_ERROR, store_->status()); |
| 671 } | 671 } |
| 672 | 672 |
| 673 } // namespace | 673 } // namespace |
| 674 | 674 |
| 675 } // namespace policy | 675 } // namespace policy |
| OLD | NEW |