OLD | NEW |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <memory> | 5 #include <memory> |
6 #include <string> | 6 #include <string> |
7 | 7 |
8 #include "base/macros.h" | 8 #include "base/macros.h" |
9 #include "base/memory/ptr_util.h" | 9 #include "base/memory/ptr_util.h" |
10 #include "base/run_loop.h" | 10 #include "base/run_loop.h" |
(...skipping 168 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
179 | 179 |
180 TEST_F(ArcPolicyBridgeTest, EmptyPolicyTest) { | 180 TEST_F(ArcPolicyBridgeTest, EmptyPolicyTest) { |
181 // No policy is set, result should be empty. | 181 // No policy is set, result should be empty. |
182 policy_bridge()->GetPolicies(PolicyStringCallback("{}")); | 182 policy_bridge()->GetPolicies(PolicyStringCallback("{}")); |
183 } | 183 } |
184 | 184 |
185 TEST_F(ArcPolicyBridgeTest, ArcPolicyTest) { | 185 TEST_F(ArcPolicyBridgeTest, ArcPolicyTest) { |
186 policy_map().Set( | 186 policy_map().Set( |
187 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY, | 187 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY, |
188 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 188 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
189 base::MakeUnique<base::StringValue>( | 189 base::MakeUnique<base::Value>( |
190 "{\"applications\":" | 190 "{\"applications\":" |
191 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," | 191 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," |
192 "\"installType\":\"REQUIRED\"," | 192 "\"installType\":\"REQUIRED\"," |
193 "\"lockTaskAllowed\":false," | 193 "\"lockTaskAllowed\":false," |
194 "\"permissionGrants\":[]" | 194 "\"permissionGrants\":[]" |
195 "}]," | 195 "}]," |
196 "\"defaultPermissionPolicy\":\"GRANT\"" | 196 "\"defaultPermissionPolicy\":\"GRANT\"" |
197 "}"), | 197 "}"), |
198 nullptr); | 198 nullptr); |
199 policy_bridge()->GetPolicies(PolicyStringCallback( | 199 policy_bridge()->GetPolicies(PolicyStringCallback( |
200 "{\"applications\":" | 200 "{\"applications\":" |
201 "[{\"installType\":\"REQUIRED\"," | 201 "[{\"installType\":\"REQUIRED\"," |
202 "\"lockTaskAllowed\":false," | 202 "\"lockTaskAllowed\":false," |
203 "\"packageName\":\"com.google.android.apps.youtube.kids\"," | 203 "\"packageName\":\"com.google.android.apps.youtube.kids\"," |
204 "\"permissionGrants\":[]" | 204 "\"permissionGrants\":[]" |
205 "}]," | 205 "}]," |
206 "\"defaultPermissionPolicy\":\"GRANT\"" | 206 "\"defaultPermissionPolicy\":\"GRANT\"" |
207 "}")); | 207 "}")); |
208 } | 208 } |
209 | 209 |
210 TEST_F(ArcPolicyBridgeTest, HompageLocationTest) { | 210 TEST_F(ArcPolicyBridgeTest, HompageLocationTest) { |
211 // This policy will not be passed on, result should be empty. | 211 // This policy will not be passed on, result should be empty. |
212 policy_map().Set( | 212 policy_map().Set( |
213 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, | 213 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, |
214 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 214 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
215 base::MakeUnique<base::StringValue>("http://chromium.org"), nullptr); | 215 base::MakeUnique<base::Value>("http://chromium.org"), nullptr); |
216 policy_bridge()->GetPolicies(PolicyStringCallback("{}")); | 216 policy_bridge()->GetPolicies(PolicyStringCallback("{}")); |
217 } | 217 } |
218 | 218 |
219 TEST_F(ArcPolicyBridgeTest, DisableScreenshotsTest) { | 219 TEST_F(ArcPolicyBridgeTest, DisableScreenshotsTest) { |
220 policy_map().Set(policy::key::kDisableScreenshots, | 220 policy_map().Set(policy::key::kDisableScreenshots, |
221 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, | 221 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, |
222 policy::POLICY_SOURCE_CLOUD, | 222 policy::POLICY_SOURCE_CLOUD, |
223 base::MakeUnique<base::Value>(true), nullptr); | 223 base::MakeUnique<base::Value>(true), nullptr); |
224 policy_bridge()->GetPolicies( | 224 policy_bridge()->GetPolicies( |
225 PolicyStringCallback("{\"screenCaptureDisabled\":true}")); | 225 PolicyStringCallback("{\"screenCaptureDisabled\":true}")); |
(...skipping 100 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
326 | 326 |
327 TEST_F(ArcPolicyBridgeTest, CaCertificateTest) { | 327 TEST_F(ArcPolicyBridgeTest, CaCertificateTest) { |
328 // Enable CA certificates sync. | 328 // Enable CA certificates sync. |
329 policy_map().Set( | 329 policy_map().Set( |
330 policy::key::kArcCertificatesSyncMode, policy::POLICY_LEVEL_MANDATORY, | 330 policy::key::kArcCertificatesSyncMode, policy::POLICY_LEVEL_MANDATORY, |
331 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 331 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
332 base::MakeUnique<base::Value>(ArcCertsSyncMode::COPY_CA_CERTS), nullptr); | 332 base::MakeUnique<base::Value>(ArcCertsSyncMode::COPY_CA_CERTS), nullptr); |
333 policy_map().Set(policy::key::kOpenNetworkConfiguration, | 333 policy_map().Set(policy::key::kOpenNetworkConfiguration, |
334 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, | 334 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, |
335 policy::POLICY_SOURCE_CLOUD, | 335 policy::POLICY_SOURCE_CLOUD, |
336 base::MakeUnique<base::StringValue>(kFakeONC), nullptr); | 336 base::MakeUnique<base::Value>(kFakeONC), nullptr); |
337 policy_bridge()->GetPolicies(PolicyStringCallback( | 337 policy_bridge()->GetPolicies(PolicyStringCallback( |
338 "{\"caCerts\":" | 338 "{\"caCerts\":" |
339 "[{\"X509\":\"TWFuIGlzIGRpc3Rpbmd1aXNoZWQsIG5vdCBvbmx5IGJ5IGhpcyByZWFzb24" | 339 "[{\"X509\":\"TWFuIGlzIGRpc3Rpbmd1aXNoZWQsIG5vdCBvbmx5IGJ5IGhpcyByZWFzb24" |
340 "sIGJ1dCBieSB0aGlzIHNpbmd1bGFyIHBhc3Npb24gZnJvbSBvdGhlciBhbmltYWxzLCB3aGl" | 340 "sIGJ1dCBieSB0aGlzIHNpbmd1bGFyIHBhc3Npb24gZnJvbSBvdGhlciBhbmltYWxzLCB3aGl" |
341 "jaCBpcyBhIGx1c3Qgb2YgdGhlIG1pbmQsIHRoYXQgYnkgYSBwZXJzZXZlcmFuY2Ugb2YgZGV" | 341 "jaCBpcyBhIGx1c3Qgb2YgdGhlIG1pbmQsIHRoYXQgYnkgYSBwZXJzZXZlcmFuY2Ugb2YgZGV" |
342 "saWdodCBpbiB0aGUgY29udGludWVkIGFuZCBpbmRlZmF0aWdhYmxlIGdlbmVyYXRpb24gb2Y" | 342 "saWdodCBpbiB0aGUgY29udGludWVkIGFuZCBpbmRlZmF0aWdhYmxlIGdlbmVyYXRpb24gb2Y" |
343 "ga25vd2xlZGdlLCBleGNlZWRzIHRoZSBzaG9ydCB2ZWhlbWVuY2Ugb2YgYW55IGNhcm5hbCB" | 343 "ga25vd2xlZGdlLCBleGNlZWRzIHRoZSBzaG9ydCB2ZWhlbWVuY2Ugb2YgYW55IGNhcm5hbCB" |
344 "wbGVhc3VyZS4=\"}" | 344 "wbGVhc3VyZS4=\"}" |
345 "]}")); | 345 "]}")); |
346 | 346 |
(...skipping 11 matching lines...) Expand all Loading... |
358 policy::POLICY_SOURCE_CLOUD, | 358 policy::POLICY_SOURCE_CLOUD, |
359 base::MakeUnique<base::Value>(true), nullptr); | 359 base::MakeUnique<base::Value>(true), nullptr); |
360 policy_bridge()->GetPolicies( | 360 policy_bridge()->GetPolicies( |
361 PolicyStringCallback("{\"debuggingFeaturesDisabled\":true}")); | 361 PolicyStringCallback("{\"debuggingFeaturesDisabled\":true}")); |
362 } | 362 } |
363 | 363 |
364 TEST_F(ArcPolicyBridgeTest, MultiplePoliciesTest) { | 364 TEST_F(ArcPolicyBridgeTest, MultiplePoliciesTest) { |
365 policy_map().Set( | 365 policy_map().Set( |
366 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY, | 366 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY, |
367 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 367 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
368 base::MakeUnique<base::StringValue>( | 368 base::MakeUnique<base::Value>( |
369 "{\"applications\":" | 369 "{\"applications\":" |
370 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," | 370 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," |
371 "\"installType\":\"REQUIRED\"," | 371 "\"installType\":\"REQUIRED\"," |
372 "\"lockTaskAllowed\":false," | 372 "\"lockTaskAllowed\":false," |
373 "\"permissionGrants\":[]" | 373 "\"permissionGrants\":[]" |
374 "}]," | 374 "}]," |
375 "\"defaultPermissionPolicy\":\"GRANT\"}"), | 375 "\"defaultPermissionPolicy\":\"GRANT\"}"), |
376 nullptr); | 376 nullptr); |
377 policy_map().Set( | 377 policy_map().Set( |
378 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, | 378 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, |
379 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, | 379 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, |
380 base::MakeUnique<base::StringValue>("http://chromium.org"), nullptr); | 380 base::MakeUnique<base::Value>("http://chromium.org"), nullptr); |
381 policy_map().Set(policy::key::kVideoCaptureAllowed, | 381 policy_map().Set(policy::key::kVideoCaptureAllowed, |
382 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, | 382 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, |
383 policy::POLICY_SOURCE_CLOUD, | 383 policy::POLICY_SOURCE_CLOUD, |
384 base::MakeUnique<base::Value>(false), nullptr); | 384 base::MakeUnique<base::Value>(false), nullptr); |
385 policy_bridge()->GetPolicies(PolicyStringCallback( | 385 policy_bridge()->GetPolicies(PolicyStringCallback( |
386 "{\"applications\":" | 386 "{\"applications\":" |
387 "[{\"installType\":\"REQUIRED\"," | 387 "[{\"installType\":\"REQUIRED\"," |
388 "\"lockTaskAllowed\":false," | 388 "\"lockTaskAllowed\":false," |
389 "\"packageName\":\"com.google.android.apps.youtube.kids\"," | 389 "\"packageName\":\"com.google.android.apps.youtube.kids\"," |
390 "\"permissionGrants\":[]" | 390 "\"permissionGrants\":[]" |
(...skipping 41 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
432 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) { | 432 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) { |
433 policy_bridge()->OverrideIsManagedForTesting(false); | 433 policy_bridge()->OverrideIsManagedForTesting(false); |
434 policy_instance()->CallGetPolicies(PolicyStringCallback("")); | 434 policy_instance()->CallGetPolicies(PolicyStringCallback("")); |
435 } | 435 } |
436 | 436 |
437 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) { | 437 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) { |
438 policy_instance()->CallGetPolicies(PolicyStringCallback("{}")); | 438 policy_instance()->CallGetPolicies(PolicyStringCallback("{}")); |
439 } | 439 } |
440 | 440 |
441 } // namespace arc | 441 } // namespace arc |
OLD | NEW |