Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(4552)

Unified Diff: chrome/browser/chromeos/arc/arc_policy_bridge_unittest.cc

Issue 2476493003: Remove FundamentalValue
Patch Set: Fix Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « base/values_unittest.cc ('k') | chrome/browser/chromeos/arc/policy/arc_policy_bridge_unittest.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chrome/browser/chromeos/arc/arc_policy_bridge_unittest.cc
diff --git a/chrome/browser/chromeos/arc/policy/arc_policy_bridge_unittest.cc b/chrome/browser/chromeos/arc/arc_policy_bridge_unittest.cc
similarity index 80%
copy from chrome/browser/chromeos/arc/policy/arc_policy_bridge_unittest.cc
copy to chrome/browser/chromeos/arc/arc_policy_bridge_unittest.cc
index 4aeadc0fbfcf181837bcffaba623b6bd8684c191..ee3daa8f6879459a04a04a8f26db792de91a8785 100644
--- a/chrome/browser/chromeos/arc/policy/arc_policy_bridge_unittest.cc
+++ b/chrome/browser/chromeos/arc/arc_policy_bridge_unittest.cc
@@ -9,7 +9,7 @@
#include "base/memory/ptr_util.h"
#include "base/message_loop/message_loop.h"
#include "base/values.h"
-#include "chrome/browser/chromeos/arc/policy/arc_policy_bridge.h"
+#include "chrome/browser/chromeos/arc/arc_policy_bridge.h"
#include "components/arc/test/fake_arc_bridge_service.h"
#include "components/arc/test/fake_policy_instance.h"
#include "components/policy/core/common/mock_policy_service.h"
@@ -23,7 +23,7 @@
namespace {
-constexpr char kFakeONC[] =
+char kFakeONC[] =
"{\"NetworkConfigurations\":["
"{\"GUID\":\"{485d6076-dd44-6b6d-69787465725f5040}\","
"\"Type\":\"WiFi\","
@@ -51,10 +51,7 @@ constexpr char kFakeONC[] =
"\"GUID\":\"{00f79111-51e0-e6e0-76b3b55450d80a1b}\"}"
"]}";
-constexpr char kPolicyCompliantResponse[] = "{ \"policyCompliant\": true }";
-constexpr char kPolicyNonCompliantResponse[] = "{ \"policyCompliant\": false }";
-
-// Helper class to define callbacks that verify that they were run.
+// Helper class to define a PolicyStringCallback which verifies that it was run.
// Wraps a bool initially set to |false| and verifies that it's been set to
// |true| before destruction.
class CheckedBoolean {
@@ -70,23 +67,18 @@ class CheckedBoolean {
DISALLOW_COPY_AND_ASSIGN(CheckedBoolean);
};
-void ExpectString(std::unique_ptr<CheckedBoolean> was_run,
- const std::string& expected,
- const std::string& received) {
- EXPECT_EQ(expected, received);
+void ExpectPolicyString(std::unique_ptr<CheckedBoolean> was_run,
+ mojo::String expected,
+ mojo::String policies) {
+ EXPECT_EQ(expected, policies);
was_run->set_value(true);
}
arc::ArcPolicyBridge::GetPoliciesCallback PolicyStringCallback(
- const std::string& expected) {
- std::unique_ptr<CheckedBoolean> was_run(new CheckedBoolean());
- return base::Bind(&ExpectString, base::Passed(&was_run), expected);
-}
-
-arc::ArcPolicyBridge::ReportComplianceCallback PolicyComplianceCallback(
- const std::string& expected) {
+ mojo::String expected) {
std::unique_ptr<CheckedBoolean> was_run(new CheckedBoolean);
- return base::Bind(&ExpectString, base::Passed(&was_run), expected);
+ return base::Bind(&ExpectPolicyString, base::Passed(&was_run),
+ base::Passed(&expected));
}
} // namespace
@@ -126,12 +118,12 @@ class ArcPolicyBridgeTest : public testing::Test {
// Not an unused variable. Unit tests do not have a message loop by themselves
// and mojo needs a message loop for communication.
base::MessageLoop loop_;
- std::unique_ptr<FakeArcBridgeService> bridge_service_;
- std::unique_ptr<ArcPolicyBridge> policy_bridge_;
+ std::unique_ptr<arc::FakeArcBridgeService> bridge_service_;
+ std::unique_ptr<arc::ArcPolicyBridge> policy_bridge_;
// Always keep policy_instance_ below bridge_service_, so that
// policy_instance_ is destructed first. It needs to remove itself as
// observer.
- std::unique_ptr<FakePolicyInstance> policy_instance_;
+ std::unique_ptr<arc::FakePolicyInstance> policy_instance_;
policy::PolicyMap policy_map_;
policy::MockPolicyService policy_service_;
@@ -186,7 +178,7 @@ TEST_F(ArcPolicyBridgeTest, DisableScreenshotsTest) {
policy_map().Set(policy::key::kDisableScreenshots,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
policy::POLICY_SOURCE_CLOUD,
- base::MakeUnique<base::FundamentalValue>(true), nullptr);
+ base::MakeUnique<base::Value>(true), nullptr);
policy_bridge()->GetPolicies(
PolicyStringCallback("{\"screenCaptureDisabled\":true}"));
}
@@ -195,7 +187,7 @@ TEST_F(ArcPolicyBridgeTest, VideoCaptureAllowedTest) {
policy_map().Set(policy::key::kVideoCaptureAllowed,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
policy::POLICY_SOURCE_CLOUD,
- base::MakeUnique<base::FundamentalValue>(false), nullptr);
+ base::MakeUnique<base::Value>(false), nullptr);
policy_bridge()->GetPolicies(
PolicyStringCallback("{\"cameraDisabled\":true}"));
}
@@ -204,7 +196,7 @@ TEST_F(ArcPolicyBridgeTest, AudioCaptureAllowedTest) {
policy_map().Set(policy::key::kAudioCaptureAllowed,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
policy::POLICY_SOURCE_CLOUD,
- base::MakeUnique<base::FundamentalValue>(false), nullptr);
+ base::MakeUnique<base::Value>(false), nullptr);
policy_bridge()->GetPolicies(
PolicyStringCallback("{\"unmuteMicrophoneDisabled\":true}"));
}
@@ -213,19 +205,19 @@ TEST_F(ArcPolicyBridgeTest, DefaultGeolocationSettingTest) {
policy_map().Set(policy::key::kDefaultGeolocationSetting,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
policy::POLICY_SOURCE_CLOUD,
- base::MakeUnique<base::FundamentalValue>(1), nullptr);
+ base::MakeUnique<base::Value>(1), nullptr);
policy_bridge()->GetPolicies(
PolicyStringCallback("{\"shareLocationDisabled\":false}"));
policy_map().Set(policy::key::kDefaultGeolocationSetting,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
policy::POLICY_SOURCE_CLOUD,
- base::MakeUnique<base::FundamentalValue>(2), nullptr);
+ base::MakeUnique<base::Value>(2), nullptr);
policy_bridge()->GetPolicies(
PolicyStringCallback("{\"shareLocationDisabled\":true}"));
policy_map().Set(policy::key::kDefaultGeolocationSetting,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
policy::POLICY_SOURCE_CLOUD,
- base::MakeUnique<base::FundamentalValue>(3), nullptr);
+ base::MakeUnique<base::Value>(3), nullptr);
policy_bridge()->GetPolicies(
PolicyStringCallback("{\"shareLocationDisabled\":false}"));
}
@@ -234,15 +226,15 @@ TEST_F(ArcPolicyBridgeTest, ExternalStorageDisabledTest) {
policy_map().Set(policy::key::kExternalStorageDisabled,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
policy::POLICY_SOURCE_CLOUD,
- base::MakeUnique<base::FundamentalValue>(true), nullptr);
+ base::MakeUnique<base::Value>(true), nullptr);
policy_bridge()->GetPolicies(
PolicyStringCallback("{\"mountPhysicalMediaDisabled\":true}"));
}
TEST_F(ArcPolicyBridgeTest, URLBlacklistTest) {
base::ListValue blacklist;
- blacklist.AppendString("www.blacklist1.com");
- blacklist.AppendString("www.blacklist2.com");
+ blacklist.Append(new base::StringValue("www.blacklist1.com"));
+ blacklist.Append(new base::StringValue("www.blacklist2.com"));
policy_map().Set(policy::key::kURLBlacklist, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
blacklist.CreateDeepCopy(), nullptr);
@@ -256,8 +248,8 @@ TEST_F(ArcPolicyBridgeTest, URLBlacklistTest) {
TEST_F(ArcPolicyBridgeTest, URLWhitelistTest) {
base::ListValue whitelist;
- whitelist.AppendString("www.whitelist1.com");
- whitelist.AppendString("www.whitelist2.com");
+ whitelist.Append(new base::StringValue("www.whitelist1.com"));
+ whitelist.Append(new base::StringValue("www.whitelist2.com"));
policy_map().Set(policy::key::kURLWhitelist, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
whitelist.CreateDeepCopy(), nullptr);
@@ -274,8 +266,7 @@ TEST_F(ArcPolicyBridgeTest, CaCertificateTest) {
policy_map().Set(
policy::key::kArcCertificatesSyncMode, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
- base::MakeUnique<base::FundamentalValue>(ArcCertsSyncMode::COPY_CA_CERTS),
- nullptr);
+ base::MakeUnique<base::Value>(ArcCertsSyncMode::COPY_CA_CERTS), nullptr);
policy_map().Set(policy::key::kOpenNetworkConfiguration,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
policy::POLICY_SOURCE_CLOUD,
@@ -294,8 +285,7 @@ TEST_F(ArcPolicyBridgeTest, CaCertificateTest) {
policy_map().Set(
policy::key::kArcCertificatesSyncMode, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
- base::MakeUnique<base::FundamentalValue>(ArcCertsSyncMode::SYNC_DISABLED),
- nullptr);
+ base::MakeUnique<base::Value>(ArcCertsSyncMode::SYNC_DISABLED), nullptr);
policy_bridge()->GetPolicies(PolicyStringCallback("{}"));
}
@@ -303,7 +293,7 @@ TEST_F(ArcPolicyBridgeTest, DeveloperToolsDisabledTest) {
policy_map().Set(policy::key::kDeveloperToolsDisabled,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
policy::POLICY_SOURCE_CLOUD,
- base::MakeUnique<base::FundamentalValue>(true), nullptr);
+ base::MakeUnique<base::Value>(true), nullptr);
policy_bridge()->GetPolicies(
PolicyStringCallback("{\"debuggingFeaturesDisabled\":true}"));
}
@@ -328,7 +318,7 @@ TEST_F(ArcPolicyBridgeTest, MultiplePoliciesTest) {
policy_map().Set(policy::key::kVideoCaptureAllowed,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
policy::POLICY_SOURCE_CLOUD,
- base::MakeUnique<base::FundamentalValue>(false), nullptr);
+ base::MakeUnique<base::Value>(false), nullptr);
policy_bridge()->GetPolicies(PolicyStringCallback(
"{\"applications\":"
"[{\"installType\":\"REQUIRED\","
@@ -341,29 +331,6 @@ TEST_F(ArcPolicyBridgeTest, MultiplePoliciesTest) {
"}"));
}
-// Disabled due to memory leak https://crbug.com/666371.
-// TODO(poromov): Fix leak and re-enable.
-TEST_F(ArcPolicyBridgeTest, DISABLED_EmptyReportComplianceTest) {
- policy_bridge()->ReportCompliance(
- "", PolicyComplianceCallback(kPolicyCompliantResponse));
-}
-
-// Disabled due to memory leak https://crbug.com/666371.
-// TODO(poromov): Fix leak and re-enable.
-TEST_F(ArcPolicyBridgeTest, DISABLED_ParsableReportComplianceTest) {
- policy_bridge()->ReportCompliance(
- "{\"nonComplianceDetails\" : []}",
- PolicyComplianceCallback(kPolicyCompliantResponse));
-}
-
-// Disabled due to memory leak https://crbug.com/666371.
-// TODO(poromov): Fix leak and re-enable.
-TEST_F(ArcPolicyBridgeTest, DISABLED_NonParsableReportComplianceTest) {
- policy_bridge()->ReportCompliance(
- "\"nonComplianceDetails\" : [}",
- PolicyComplianceCallback(kPolicyNonCompliantResponse));
-}
-
// This and the following test send the policies through a mojo connection
// between a PolicyInstance and the PolicyBridge.
TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) {
« no previous file with comments | « base/values_unittest.cc ('k') | chrome/browser/chromeos/arc/policy/arc_policy_bridge_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698