OLD | NEW |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <memory> | 5 #include <memory> |
6 #include <string> | 6 #include <string> |
7 | 7 |
8 #include "base/macros.h" | 8 #include "base/macros.h" |
9 #include "base/memory/ptr_util.h" | 9 #include "base/memory/ptr_util.h" |
10 #include "base/message_loop/message_loop.h" | 10 #include "base/message_loop/message_loop.h" |
(...skipping 215 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
226 policy_map().Set(policy::key::kExternalStorageDisabled, | 226 policy_map().Set(policy::key::kExternalStorageDisabled, |
227 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, | 227 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, |
228 policy::POLICY_SOURCE_CLOUD, | 228 policy::POLICY_SOURCE_CLOUD, |
229 base::MakeUnique<base::FundamentalValue>(true), nullptr); | 229 base::MakeUnique<base::FundamentalValue>(true), nullptr); |
230 policy_bridge()->GetPolicies( | 230 policy_bridge()->GetPolicies( |
231 PolicyStringCallback("{\"mountPhysicalMediaDisabled\":true}")); | 231 PolicyStringCallback("{\"mountPhysicalMediaDisabled\":true}")); |
232 } | 232 } |
233 | 233 |
234 TEST_F(ArcPolicyBridgeTest, URLBlacklistTest) { | 234 TEST_F(ArcPolicyBridgeTest, URLBlacklistTest) { |
235 base::ListValue blacklist; | 235 base::ListValue blacklist; |
236 blacklist.Append(new base::StringValue("www.blacklist1.com")); | 236 blacklist.AppendString("www.blacklist1.com"); |
237 blacklist.Append(new base::StringValue("www.blacklist2.com")); | 237 blacklist.AppendString("www.blacklist2.com"); |
238 policy_map().Set(policy::key::kURLBlacklist, policy::POLICY_LEVEL_MANDATORY, | 238 policy_map().Set(policy::key::kURLBlacklist, policy::POLICY_LEVEL_MANDATORY, |
239 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 239 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
240 blacklist.CreateDeepCopy(), nullptr); | 240 blacklist.CreateDeepCopy(), nullptr); |
241 policy_bridge()->GetPolicies( | 241 policy_bridge()->GetPolicies( |
242 PolicyStringCallback("{\"globalAppRestrictions\":" | 242 PolicyStringCallback("{\"globalAppRestrictions\":" |
243 "{\"com.android.browser:URLBlacklist\":" | 243 "{\"com.android.browser:URLBlacklist\":" |
244 "[\"www.blacklist1.com\"," | 244 "[\"www.blacklist1.com\"," |
245 "\"www.blacklist2.com\"" | 245 "\"www.blacklist2.com\"" |
246 "]}}")); | 246 "]}}")); |
247 } | 247 } |
248 | 248 |
249 TEST_F(ArcPolicyBridgeTest, URLWhitelistTest) { | 249 TEST_F(ArcPolicyBridgeTest, URLWhitelistTest) { |
250 base::ListValue whitelist; | 250 base::ListValue whitelist; |
251 whitelist.Append(new base::StringValue("www.whitelist1.com")); | 251 whitelist.AppendString("www.whitelist1.com"); |
252 whitelist.Append(new base::StringValue("www.whitelist2.com")); | 252 whitelist.AppendString("www.whitelist2.com"); |
253 policy_map().Set(policy::key::kURLWhitelist, policy::POLICY_LEVEL_MANDATORY, | 253 policy_map().Set(policy::key::kURLWhitelist, policy::POLICY_LEVEL_MANDATORY, |
254 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 254 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
255 whitelist.CreateDeepCopy(), nullptr); | 255 whitelist.CreateDeepCopy(), nullptr); |
256 policy_bridge()->GetPolicies( | 256 policy_bridge()->GetPolicies( |
257 PolicyStringCallback("{\"globalAppRestrictions\":" | 257 PolicyStringCallback("{\"globalAppRestrictions\":" |
258 "{\"com.android.browser:URLWhitelist\":" | 258 "{\"com.android.browser:URLWhitelist\":" |
259 "[\"www.whitelist1.com\"," | 259 "[\"www.whitelist1.com\"," |
260 "\"www.whitelist2.com\"" | 260 "\"www.whitelist2.com\"" |
261 "]}}")); | 261 "]}}")); |
262 } | 262 } |
(...skipping 75 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
338 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) { | 338 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) { |
339 policy_bridge()->OverrideIsManagedForTesting(false); | 339 policy_bridge()->OverrideIsManagedForTesting(false); |
340 policy_instance()->CallGetPolicies(PolicyStringCallback("")); | 340 policy_instance()->CallGetPolicies(PolicyStringCallback("")); |
341 } | 341 } |
342 | 342 |
343 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) { | 343 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) { |
344 policy_instance()->CallGetPolicies(PolicyStringCallback("{}")); | 344 policy_instance()->CallGetPolicies(PolicyStringCallback("{}")); |
345 } | 345 } |
346 | 346 |
347 } // namespace arc | 347 } // namespace arc |
OLD | NEW |