Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(43)

Side by Side Diff: chrome/browser/chromeos/arc/policy/arc_policy_bridge_unittest.cc

Issue 2476493003: Remove FundamentalValue
Patch Set: Fix Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2016 The Chromium Authors. All rights reserved. 1 // Copyright 2016 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <memory> 5 #include <memory>
6 #include <string> 6 #include <string>
7 7
8 #include "base/macros.h" 8 #include "base/macros.h"
9 #include "base/memory/ptr_util.h" 9 #include "base/memory/ptr_util.h"
10 #include "base/message_loop/message_loop.h" 10 #include "base/message_loop/message_loop.h"
(...skipping 168 matching lines...) Expand 10 before | Expand all | Expand 10 after
179 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, 179 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY,
180 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 180 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
181 base::MakeUnique<base::StringValue>("http://chromium.org"), nullptr); 181 base::MakeUnique<base::StringValue>("http://chromium.org"), nullptr);
182 policy_bridge()->GetPolicies(PolicyStringCallback("{}")); 182 policy_bridge()->GetPolicies(PolicyStringCallback("{}"));
183 } 183 }
184 184
185 TEST_F(ArcPolicyBridgeTest, DisableScreenshotsTest) { 185 TEST_F(ArcPolicyBridgeTest, DisableScreenshotsTest) {
186 policy_map().Set(policy::key::kDisableScreenshots, 186 policy_map().Set(policy::key::kDisableScreenshots,
187 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 187 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
188 policy::POLICY_SOURCE_CLOUD, 188 policy::POLICY_SOURCE_CLOUD,
189 base::MakeUnique<base::FundamentalValue>(true), nullptr); 189 base::MakeUnique<base::Value>(true), nullptr);
190 policy_bridge()->GetPolicies( 190 policy_bridge()->GetPolicies(
191 PolicyStringCallback("{\"screenCaptureDisabled\":true}")); 191 PolicyStringCallback("{\"screenCaptureDisabled\":true}"));
192 } 192 }
193 193
194 TEST_F(ArcPolicyBridgeTest, VideoCaptureAllowedTest) { 194 TEST_F(ArcPolicyBridgeTest, VideoCaptureAllowedTest) {
195 policy_map().Set(policy::key::kVideoCaptureAllowed, 195 policy_map().Set(policy::key::kVideoCaptureAllowed,
196 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 196 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
197 policy::POLICY_SOURCE_CLOUD, 197 policy::POLICY_SOURCE_CLOUD,
198 base::MakeUnique<base::FundamentalValue>(false), nullptr); 198 base::MakeUnique<base::Value>(false), nullptr);
199 policy_bridge()->GetPolicies( 199 policy_bridge()->GetPolicies(
200 PolicyStringCallback("{\"cameraDisabled\":true}")); 200 PolicyStringCallback("{\"cameraDisabled\":true}"));
201 } 201 }
202 202
203 TEST_F(ArcPolicyBridgeTest, AudioCaptureAllowedTest) { 203 TEST_F(ArcPolicyBridgeTest, AudioCaptureAllowedTest) {
204 policy_map().Set(policy::key::kAudioCaptureAllowed, 204 policy_map().Set(policy::key::kAudioCaptureAllowed,
205 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 205 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
206 policy::POLICY_SOURCE_CLOUD, 206 policy::POLICY_SOURCE_CLOUD,
207 base::MakeUnique<base::FundamentalValue>(false), nullptr); 207 base::MakeUnique<base::Value>(false), nullptr);
208 policy_bridge()->GetPolicies( 208 policy_bridge()->GetPolicies(
209 PolicyStringCallback("{\"unmuteMicrophoneDisabled\":true}")); 209 PolicyStringCallback("{\"unmuteMicrophoneDisabled\":true}"));
210 } 210 }
211 211
212 TEST_F(ArcPolicyBridgeTest, DefaultGeolocationSettingTest) { 212 TEST_F(ArcPolicyBridgeTest, DefaultGeolocationSettingTest) {
213 policy_map().Set(policy::key::kDefaultGeolocationSetting, 213 policy_map().Set(policy::key::kDefaultGeolocationSetting,
214 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 214 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
215 policy::POLICY_SOURCE_CLOUD, 215 policy::POLICY_SOURCE_CLOUD,
216 base::MakeUnique<base::FundamentalValue>(1), nullptr); 216 base::MakeUnique<base::Value>(1), nullptr);
217 policy_bridge()->GetPolicies( 217 policy_bridge()->GetPolicies(
218 PolicyStringCallback("{\"shareLocationDisabled\":false}")); 218 PolicyStringCallback("{\"shareLocationDisabled\":false}"));
219 policy_map().Set(policy::key::kDefaultGeolocationSetting, 219 policy_map().Set(policy::key::kDefaultGeolocationSetting,
220 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 220 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
221 policy::POLICY_SOURCE_CLOUD, 221 policy::POLICY_SOURCE_CLOUD,
222 base::MakeUnique<base::FundamentalValue>(2), nullptr); 222 base::MakeUnique<base::Value>(2), nullptr);
223 policy_bridge()->GetPolicies( 223 policy_bridge()->GetPolicies(
224 PolicyStringCallback("{\"shareLocationDisabled\":true}")); 224 PolicyStringCallback("{\"shareLocationDisabled\":true}"));
225 policy_map().Set(policy::key::kDefaultGeolocationSetting, 225 policy_map().Set(policy::key::kDefaultGeolocationSetting,
226 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 226 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
227 policy::POLICY_SOURCE_CLOUD, 227 policy::POLICY_SOURCE_CLOUD,
228 base::MakeUnique<base::FundamentalValue>(3), nullptr); 228 base::MakeUnique<base::Value>(3), nullptr);
229 policy_bridge()->GetPolicies( 229 policy_bridge()->GetPolicies(
230 PolicyStringCallback("{\"shareLocationDisabled\":false}")); 230 PolicyStringCallback("{\"shareLocationDisabled\":false}"));
231 } 231 }
232 232
233 TEST_F(ArcPolicyBridgeTest, ExternalStorageDisabledTest) { 233 TEST_F(ArcPolicyBridgeTest, ExternalStorageDisabledTest) {
234 policy_map().Set(policy::key::kExternalStorageDisabled, 234 policy_map().Set(policy::key::kExternalStorageDisabled,
235 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 235 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
236 policy::POLICY_SOURCE_CLOUD, 236 policy::POLICY_SOURCE_CLOUD,
237 base::MakeUnique<base::FundamentalValue>(true), nullptr); 237 base::MakeUnique<base::Value>(true), nullptr);
238 policy_bridge()->GetPolicies( 238 policy_bridge()->GetPolicies(
239 PolicyStringCallback("{\"mountPhysicalMediaDisabled\":true}")); 239 PolicyStringCallback("{\"mountPhysicalMediaDisabled\":true}"));
240 } 240 }
241 241
242 TEST_F(ArcPolicyBridgeTest, URLBlacklistTest) { 242 TEST_F(ArcPolicyBridgeTest, URLBlacklistTest) {
243 base::ListValue blacklist; 243 base::ListValue blacklist;
244 blacklist.AppendString("www.blacklist1.com"); 244 blacklist.AppendString("www.blacklist1.com");
245 blacklist.AppendString("www.blacklist2.com"); 245 blacklist.AppendString("www.blacklist2.com");
246 policy_map().Set(policy::key::kURLBlacklist, policy::POLICY_LEVEL_MANDATORY, 246 policy_map().Set(policy::key::kURLBlacklist, policy::POLICY_LEVEL_MANDATORY,
247 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 247 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
(...skipping 19 matching lines...) Expand all
267 "[\"www.whitelist1.com\"," 267 "[\"www.whitelist1.com\","
268 "\"www.whitelist2.com\"" 268 "\"www.whitelist2.com\""
269 "]}}")); 269 "]}}"));
270 } 270 }
271 271
272 TEST_F(ArcPolicyBridgeTest, CaCertificateTest) { 272 TEST_F(ArcPolicyBridgeTest, CaCertificateTest) {
273 // Enable CA certificates sync. 273 // Enable CA certificates sync.
274 policy_map().Set( 274 policy_map().Set(
275 policy::key::kArcCertificatesSyncMode, policy::POLICY_LEVEL_MANDATORY, 275 policy::key::kArcCertificatesSyncMode, policy::POLICY_LEVEL_MANDATORY,
276 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 276 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
277 base::MakeUnique<base::FundamentalValue>(ArcCertsSyncMode::COPY_CA_CERTS), 277 base::MakeUnique<base::Value>(ArcCertsSyncMode::COPY_CA_CERTS), nullptr);
278 nullptr);
279 policy_map().Set(policy::key::kOpenNetworkConfiguration, 278 policy_map().Set(policy::key::kOpenNetworkConfiguration,
280 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 279 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
281 policy::POLICY_SOURCE_CLOUD, 280 policy::POLICY_SOURCE_CLOUD,
282 base::MakeUnique<base::StringValue>(kFakeONC), nullptr); 281 base::MakeUnique<base::StringValue>(kFakeONC), nullptr);
283 policy_bridge()->GetPolicies(PolicyStringCallback( 282 policy_bridge()->GetPolicies(PolicyStringCallback(
284 "{\"caCerts\":" 283 "{\"caCerts\":"
285 "[{\"X509\":\"TWFuIGlzIGRpc3Rpbmd1aXNoZWQsIG5vdCBvbmx5IGJ5IGhpcyByZWFzb24" 284 "[{\"X509\":\"TWFuIGlzIGRpc3Rpbmd1aXNoZWQsIG5vdCBvbmx5IGJ5IGhpcyByZWFzb24"
286 "sIGJ1dCBieSB0aGlzIHNpbmd1bGFyIHBhc3Npb24gZnJvbSBvdGhlciBhbmltYWxzLCB3aGl" 285 "sIGJ1dCBieSB0aGlzIHNpbmd1bGFyIHBhc3Npb24gZnJvbSBvdGhlciBhbmltYWxzLCB3aGl"
287 "jaCBpcyBhIGx1c3Qgb2YgdGhlIG1pbmQsIHRoYXQgYnkgYSBwZXJzZXZlcmFuY2Ugb2YgZGV" 286 "jaCBpcyBhIGx1c3Qgb2YgdGhlIG1pbmQsIHRoYXQgYnkgYSBwZXJzZXZlcmFuY2Ugb2YgZGV"
288 "saWdodCBpbiB0aGUgY29udGludWVkIGFuZCBpbmRlZmF0aWdhYmxlIGdlbmVyYXRpb24gb2Y" 287 "saWdodCBpbiB0aGUgY29udGludWVkIGFuZCBpbmRlZmF0aWdhYmxlIGdlbmVyYXRpb24gb2Y"
289 "ga25vd2xlZGdlLCBleGNlZWRzIHRoZSBzaG9ydCB2ZWhlbWVuY2Ugb2YgYW55IGNhcm5hbCB" 288 "ga25vd2xlZGdlLCBleGNlZWRzIHRoZSBzaG9ydCB2ZWhlbWVuY2Ugb2YgYW55IGNhcm5hbCB"
290 "wbGVhc3VyZS4=\"}" 289 "wbGVhc3VyZS4=\"}"
291 "]}")); 290 "]}"));
292 291
293 // Disable CA certificates sync. 292 // Disable CA certificates sync.
294 policy_map().Set( 293 policy_map().Set(
295 policy::key::kArcCertificatesSyncMode, policy::POLICY_LEVEL_MANDATORY, 294 policy::key::kArcCertificatesSyncMode, policy::POLICY_LEVEL_MANDATORY,
296 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 295 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
297 base::MakeUnique<base::FundamentalValue>(ArcCertsSyncMode::SYNC_DISABLED), 296 base::MakeUnique<base::Value>(ArcCertsSyncMode::SYNC_DISABLED), nullptr);
298 nullptr);
299 policy_bridge()->GetPolicies(PolicyStringCallback("{}")); 297 policy_bridge()->GetPolicies(PolicyStringCallback("{}"));
300 } 298 }
301 299
302 TEST_F(ArcPolicyBridgeTest, DeveloperToolsDisabledTest) { 300 TEST_F(ArcPolicyBridgeTest, DeveloperToolsDisabledTest) {
303 policy_map().Set(policy::key::kDeveloperToolsDisabled, 301 policy_map().Set(policy::key::kDeveloperToolsDisabled,
304 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 302 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
305 policy::POLICY_SOURCE_CLOUD, 303 policy::POLICY_SOURCE_CLOUD,
306 base::MakeUnique<base::FundamentalValue>(true), nullptr); 304 base::MakeUnique<base::Value>(true), nullptr);
307 policy_bridge()->GetPolicies( 305 policy_bridge()->GetPolicies(
308 PolicyStringCallback("{\"debuggingFeaturesDisabled\":true}")); 306 PolicyStringCallback("{\"debuggingFeaturesDisabled\":true}"));
309 } 307 }
310 308
311 TEST_F(ArcPolicyBridgeTest, MultiplePoliciesTest) { 309 TEST_F(ArcPolicyBridgeTest, MultiplePoliciesTest) {
312 policy_map().Set( 310 policy_map().Set(
313 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY, 311 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY,
314 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 312 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
315 base::MakeUnique<base::StringValue>( 313 base::MakeUnique<base::StringValue>(
316 "{\"applications\":" 314 "{\"applications\":"
317 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," 315 "[{\"packageName\":\"com.google.android.apps.youtube.kids\","
318 "\"installType\":\"REQUIRED\"," 316 "\"installType\":\"REQUIRED\","
319 "\"lockTaskAllowed\":false," 317 "\"lockTaskAllowed\":false,"
320 "\"permissionGrants\":[]" 318 "\"permissionGrants\":[]"
321 "}]," 319 "}],"
322 "\"defaultPermissionPolicy\":\"GRANT\"}"), 320 "\"defaultPermissionPolicy\":\"GRANT\"}"),
323 nullptr); 321 nullptr);
324 policy_map().Set( 322 policy_map().Set(
325 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, 323 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY,
326 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 324 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
327 base::MakeUnique<base::StringValue>("http://chromium.org"), nullptr); 325 base::MakeUnique<base::StringValue>("http://chromium.org"), nullptr);
328 policy_map().Set(policy::key::kVideoCaptureAllowed, 326 policy_map().Set(policy::key::kVideoCaptureAllowed,
329 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 327 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
330 policy::POLICY_SOURCE_CLOUD, 328 policy::POLICY_SOURCE_CLOUD,
331 base::MakeUnique<base::FundamentalValue>(false), nullptr); 329 base::MakeUnique<base::Value>(false), nullptr);
332 policy_bridge()->GetPolicies(PolicyStringCallback( 330 policy_bridge()->GetPolicies(PolicyStringCallback(
333 "{\"applications\":" 331 "{\"applications\":"
334 "[{\"installType\":\"REQUIRED\"," 332 "[{\"installType\":\"REQUIRED\","
335 "\"lockTaskAllowed\":false," 333 "\"lockTaskAllowed\":false,"
336 "\"packageName\":\"com.google.android.apps.youtube.kids\"," 334 "\"packageName\":\"com.google.android.apps.youtube.kids\","
337 "\"permissionGrants\":[]" 335 "\"permissionGrants\":[]"
338 "}]," 336 "}],"
339 "\"cameraDisabled\":true," 337 "\"cameraDisabled\":true,"
340 "\"defaultPermissionPolicy\":\"GRANT\"" 338 "\"defaultPermissionPolicy\":\"GRANT\""
341 "}")); 339 "}"));
(...skipping 27 matching lines...) Expand all
369 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) { 367 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) {
370 policy_bridge()->OverrideIsManagedForTesting(false); 368 policy_bridge()->OverrideIsManagedForTesting(false);
371 policy_instance()->CallGetPolicies(PolicyStringCallback("")); 369 policy_instance()->CallGetPolicies(PolicyStringCallback(""));
372 } 370 }
373 371
374 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) { 372 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) {
375 policy_instance()->CallGetPolicies(PolicyStringCallback("{}")); 373 policy_instance()->CallGetPolicies(PolicyStringCallback("{}"));
376 } 374 }
377 375
378 } // namespace arc 376 } // namespace arc
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698