| OLD | NEW |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <memory> | 5 #include <memory> |
| 6 #include <string> | 6 #include <string> |
| 7 | 7 |
| 8 #include "base/macros.h" | 8 #include "base/macros.h" |
| 9 #include "base/memory/ptr_util.h" | 9 #include "base/memory/ptr_util.h" |
| 10 #include "base/run_loop.h" | 10 #include "base/run_loop.h" |
| (...skipping 168 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 179 | 179 |
| 180 TEST_F(ArcPolicyBridgeTest, EmptyPolicyTest) { | 180 TEST_F(ArcPolicyBridgeTest, EmptyPolicyTest) { |
| 181 // No policy is set, result should be empty. | 181 // No policy is set, result should be empty. |
| 182 policy_bridge()->GetPolicies(PolicyStringCallback("{}")); | 182 policy_bridge()->GetPolicies(PolicyStringCallback("{}")); |
| 183 } | 183 } |
| 184 | 184 |
| 185 TEST_F(ArcPolicyBridgeTest, ArcPolicyTest) { | 185 TEST_F(ArcPolicyBridgeTest, ArcPolicyTest) { |
| 186 policy_map().Set( | 186 policy_map().Set( |
| 187 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY, | 187 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY, |
| 188 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 188 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
| 189 base::MakeUnique<base::StringValue>( | 189 base::MakeUnique<base::Value>( |
| 190 "{\"applications\":" | 190 "{\"applications\":" |
| 191 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," | 191 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," |
| 192 "\"installType\":\"REQUIRED\"," | 192 "\"installType\":\"REQUIRED\"," |
| 193 "\"lockTaskAllowed\":false," | 193 "\"lockTaskAllowed\":false," |
| 194 "\"permissionGrants\":[]" | 194 "\"permissionGrants\":[]" |
| 195 "}]," | 195 "}]," |
| 196 "\"defaultPermissionPolicy\":\"GRANT\"" | 196 "\"defaultPermissionPolicy\":\"GRANT\"" |
| 197 "}"), | 197 "}"), |
| 198 nullptr); | 198 nullptr); |
| 199 policy_bridge()->GetPolicies(PolicyStringCallback( | 199 policy_bridge()->GetPolicies(PolicyStringCallback( |
| 200 "{\"applications\":" | 200 "{\"applications\":" |
| 201 "[{\"installType\":\"REQUIRED\"," | 201 "[{\"installType\":\"REQUIRED\"," |
| 202 "\"lockTaskAllowed\":false," | 202 "\"lockTaskAllowed\":false," |
| 203 "\"packageName\":\"com.google.android.apps.youtube.kids\"," | 203 "\"packageName\":\"com.google.android.apps.youtube.kids\"," |
| 204 "\"permissionGrants\":[]" | 204 "\"permissionGrants\":[]" |
| 205 "}]," | 205 "}]," |
| 206 "\"defaultPermissionPolicy\":\"GRANT\"" | 206 "\"defaultPermissionPolicy\":\"GRANT\"" |
| 207 "}")); | 207 "}")); |
| 208 } | 208 } |
| 209 | 209 |
| 210 TEST_F(ArcPolicyBridgeTest, HompageLocationTest) { | 210 TEST_F(ArcPolicyBridgeTest, HompageLocationTest) { |
| 211 // This policy will not be passed on, result should be empty. | 211 // This policy will not be passed on, result should be empty. |
| 212 policy_map().Set( | 212 policy_map().Set( |
| 213 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, | 213 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, |
| 214 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 214 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
| 215 base::MakeUnique<base::StringValue>("http://chromium.org"), nullptr); | 215 base::MakeUnique<base::Value>("http://chromium.org"), nullptr); |
| 216 policy_bridge()->GetPolicies(PolicyStringCallback("{}")); | 216 policy_bridge()->GetPolicies(PolicyStringCallback("{}")); |
| 217 } | 217 } |
| 218 | 218 |
| 219 TEST_F(ArcPolicyBridgeTest, DisableScreenshotsTest) { | 219 TEST_F(ArcPolicyBridgeTest, DisableScreenshotsTest) { |
| 220 policy_map().Set(policy::key::kDisableScreenshots, | 220 policy_map().Set(policy::key::kDisableScreenshots, |
| 221 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, | 221 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, |
| 222 policy::POLICY_SOURCE_CLOUD, | 222 policy::POLICY_SOURCE_CLOUD, |
| 223 base::MakeUnique<base::Value>(true), nullptr); | 223 base::MakeUnique<base::Value>(true), nullptr); |
| 224 policy_bridge()->GetPolicies( | 224 policy_bridge()->GetPolicies( |
| 225 PolicyStringCallback("{\"screenCaptureDisabled\":true}")); | 225 PolicyStringCallback("{\"screenCaptureDisabled\":true}")); |
| (...skipping 100 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 326 | 326 |
| 327 TEST_F(ArcPolicyBridgeTest, CaCertificateTest) { | 327 TEST_F(ArcPolicyBridgeTest, CaCertificateTest) { |
| 328 // Enable CA certificates sync. | 328 // Enable CA certificates sync. |
| 329 policy_map().Set( | 329 policy_map().Set( |
| 330 policy::key::kArcCertificatesSyncMode, policy::POLICY_LEVEL_MANDATORY, | 330 policy::key::kArcCertificatesSyncMode, policy::POLICY_LEVEL_MANDATORY, |
| 331 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 331 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
| 332 base::MakeUnique<base::Value>(ArcCertsSyncMode::COPY_CA_CERTS), nullptr); | 332 base::MakeUnique<base::Value>(ArcCertsSyncMode::COPY_CA_CERTS), nullptr); |
| 333 policy_map().Set(policy::key::kOpenNetworkConfiguration, | 333 policy_map().Set(policy::key::kOpenNetworkConfiguration, |
| 334 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, | 334 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, |
| 335 policy::POLICY_SOURCE_CLOUD, | 335 policy::POLICY_SOURCE_CLOUD, |
| 336 base::MakeUnique<base::StringValue>(kFakeONC), nullptr); | 336 base::MakeUnique<base::Value>(kFakeONC), nullptr); |
| 337 policy_bridge()->GetPolicies(PolicyStringCallback( | 337 policy_bridge()->GetPolicies(PolicyStringCallback( |
| 338 "{\"caCerts\":" | 338 "{\"caCerts\":" |
| 339 "[{\"X509\":\"TWFuIGlzIGRpc3Rpbmd1aXNoZWQsIG5vdCBvbmx5IGJ5IGhpcyByZWFzb24" | 339 "[{\"X509\":\"TWFuIGlzIGRpc3Rpbmd1aXNoZWQsIG5vdCBvbmx5IGJ5IGhpcyByZWFzb24" |
| 340 "sIGJ1dCBieSB0aGlzIHNpbmd1bGFyIHBhc3Npb24gZnJvbSBvdGhlciBhbmltYWxzLCB3aGl" | 340 "sIGJ1dCBieSB0aGlzIHNpbmd1bGFyIHBhc3Npb24gZnJvbSBvdGhlciBhbmltYWxzLCB3aGl" |
| 341 "jaCBpcyBhIGx1c3Qgb2YgdGhlIG1pbmQsIHRoYXQgYnkgYSBwZXJzZXZlcmFuY2Ugb2YgZGV" | 341 "jaCBpcyBhIGx1c3Qgb2YgdGhlIG1pbmQsIHRoYXQgYnkgYSBwZXJzZXZlcmFuY2Ugb2YgZGV" |
| 342 "saWdodCBpbiB0aGUgY29udGludWVkIGFuZCBpbmRlZmF0aWdhYmxlIGdlbmVyYXRpb24gb2Y" | 342 "saWdodCBpbiB0aGUgY29udGludWVkIGFuZCBpbmRlZmF0aWdhYmxlIGdlbmVyYXRpb24gb2Y" |
| 343 "ga25vd2xlZGdlLCBleGNlZWRzIHRoZSBzaG9ydCB2ZWhlbWVuY2Ugb2YgYW55IGNhcm5hbCB" | 343 "ga25vd2xlZGdlLCBleGNlZWRzIHRoZSBzaG9ydCB2ZWhlbWVuY2Ugb2YgYW55IGNhcm5hbCB" |
| 344 "wbGVhc3VyZS4=\"}" | 344 "wbGVhc3VyZS4=\"}" |
| 345 "]}")); | 345 "]}")); |
| 346 | 346 |
| (...skipping 11 matching lines...) Expand all Loading... |
| 358 policy::POLICY_SOURCE_CLOUD, | 358 policy::POLICY_SOURCE_CLOUD, |
| 359 base::MakeUnique<base::Value>(true), nullptr); | 359 base::MakeUnique<base::Value>(true), nullptr); |
| 360 policy_bridge()->GetPolicies( | 360 policy_bridge()->GetPolicies( |
| 361 PolicyStringCallback("{\"debuggingFeaturesDisabled\":true}")); | 361 PolicyStringCallback("{\"debuggingFeaturesDisabled\":true}")); |
| 362 } | 362 } |
| 363 | 363 |
| 364 TEST_F(ArcPolicyBridgeTest, MultiplePoliciesTest) { | 364 TEST_F(ArcPolicyBridgeTest, MultiplePoliciesTest) { |
| 365 policy_map().Set( | 365 policy_map().Set( |
| 366 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY, | 366 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY, |
| 367 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 367 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
| 368 base::MakeUnique<base::StringValue>( | 368 base::MakeUnique<base::Value>( |
| 369 "{\"applications\":" | 369 "{\"applications\":" |
| 370 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," | 370 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," |
| 371 "\"installType\":\"REQUIRED\"," | 371 "\"installType\":\"REQUIRED\"," |
| 372 "\"lockTaskAllowed\":false," | 372 "\"lockTaskAllowed\":false," |
| 373 "\"permissionGrants\":[]" | 373 "\"permissionGrants\":[]" |
| 374 "}]," | 374 "}]," |
| 375 "\"defaultPermissionPolicy\":\"GRANT\"}"), | 375 "\"defaultPermissionPolicy\":\"GRANT\"}"), |
| 376 nullptr); | 376 nullptr); |
| 377 policy_map().Set( | 377 policy_map().Set( |
| 378 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, | 378 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, |
| 379 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 379 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
| 380 base::MakeUnique<base::StringValue>("http://chromium.org"), nullptr); | 380 base::MakeUnique<base::Value>("http://chromium.org"), nullptr); |
| 381 policy_map().Set(policy::key::kVideoCaptureAllowed, | 381 policy_map().Set(policy::key::kVideoCaptureAllowed, |
| 382 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, | 382 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, |
| 383 policy::POLICY_SOURCE_CLOUD, | 383 policy::POLICY_SOURCE_CLOUD, |
| 384 base::MakeUnique<base::Value>(false), nullptr); | 384 base::MakeUnique<base::Value>(false), nullptr); |
| 385 policy_bridge()->GetPolicies(PolicyStringCallback( | 385 policy_bridge()->GetPolicies(PolicyStringCallback( |
| 386 "{\"applications\":" | 386 "{\"applications\":" |
| 387 "[{\"installType\":\"REQUIRED\"," | 387 "[{\"installType\":\"REQUIRED\"," |
| 388 "\"lockTaskAllowed\":false," | 388 "\"lockTaskAllowed\":false," |
| 389 "\"packageName\":\"com.google.android.apps.youtube.kids\"," | 389 "\"packageName\":\"com.google.android.apps.youtube.kids\"," |
| 390 "\"permissionGrants\":[]" | 390 "\"permissionGrants\":[]" |
| (...skipping 41 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 432 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) { | 432 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) { |
| 433 policy_bridge()->OverrideIsManagedForTesting(false); | 433 policy_bridge()->OverrideIsManagedForTesting(false); |
| 434 policy_instance()->CallGetPolicies(PolicyStringCallback("")); | 434 policy_instance()->CallGetPolicies(PolicyStringCallback("")); |
| 435 } | 435 } |
| 436 | 436 |
| 437 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) { | 437 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) { |
| 438 policy_instance()->CallGetPolicies(PolicyStringCallback("{}")); | 438 policy_instance()->CallGetPolicies(PolicyStringCallback("{}")); |
| 439 } | 439 } |
| 440 | 440 |
| 441 } // namespace arc | 441 } // namespace arc |
| OLD | NEW |