Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(433)

Side by Side Diff: chrome/browser/chromeos/arc/policy/arc_policy_bridge_unittest.cc

Issue 2664753002: Remove base::StringValue (Closed)
Patch Set: Rebase Created 3 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2016 The Chromium Authors. All rights reserved. 1 // Copyright 2016 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <memory> 5 #include <memory>
6 #include <string> 6 #include <string>
7 7
8 #include "base/macros.h" 8 #include "base/macros.h"
9 #include "base/memory/ptr_util.h" 9 #include "base/memory/ptr_util.h"
10 #include "base/run_loop.h" 10 #include "base/run_loop.h"
(...skipping 168 matching lines...) Expand 10 before | Expand all | Expand 10 after
179 179
180 TEST_F(ArcPolicyBridgeTest, EmptyPolicyTest) { 180 TEST_F(ArcPolicyBridgeTest, EmptyPolicyTest) {
181 // No policy is set, result should be empty. 181 // No policy is set, result should be empty.
182 policy_bridge()->GetPolicies(PolicyStringCallback("{}")); 182 policy_bridge()->GetPolicies(PolicyStringCallback("{}"));
183 } 183 }
184 184
185 TEST_F(ArcPolicyBridgeTest, ArcPolicyTest) { 185 TEST_F(ArcPolicyBridgeTest, ArcPolicyTest) {
186 policy_map().Set( 186 policy_map().Set(
187 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY, 187 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY,
188 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 188 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
189 base::MakeUnique<base::StringValue>( 189 base::MakeUnique<base::Value>(
190 "{\"applications\":" 190 "{\"applications\":"
191 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," 191 "[{\"packageName\":\"com.google.android.apps.youtube.kids\","
192 "\"installType\":\"REQUIRED\"," 192 "\"installType\":\"REQUIRED\","
193 "\"lockTaskAllowed\":false," 193 "\"lockTaskAllowed\":false,"
194 "\"permissionGrants\":[]" 194 "\"permissionGrants\":[]"
195 "}]," 195 "}],"
196 "\"defaultPermissionPolicy\":\"GRANT\"" 196 "\"defaultPermissionPolicy\":\"GRANT\""
197 "}"), 197 "}"),
198 nullptr); 198 nullptr);
199 policy_bridge()->GetPolicies(PolicyStringCallback( 199 policy_bridge()->GetPolicies(PolicyStringCallback(
200 "{\"applications\":" 200 "{\"applications\":"
201 "[{\"installType\":\"REQUIRED\"," 201 "[{\"installType\":\"REQUIRED\","
202 "\"lockTaskAllowed\":false," 202 "\"lockTaskAllowed\":false,"
203 "\"packageName\":\"com.google.android.apps.youtube.kids\"," 203 "\"packageName\":\"com.google.android.apps.youtube.kids\","
204 "\"permissionGrants\":[]" 204 "\"permissionGrants\":[]"
205 "}]," 205 "}],"
206 "\"defaultPermissionPolicy\":\"GRANT\"" 206 "\"defaultPermissionPolicy\":\"GRANT\""
207 "}")); 207 "}"));
208 } 208 }
209 209
210 TEST_F(ArcPolicyBridgeTest, HompageLocationTest) { 210 TEST_F(ArcPolicyBridgeTest, HompageLocationTest) {
211 // This policy will not be passed on, result should be empty. 211 // This policy will not be passed on, result should be empty.
212 policy_map().Set( 212 policy_map().Set(
213 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, 213 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY,
214 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 214 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
215 base::MakeUnique<base::StringValue>("http://chromium.org"), nullptr); 215 base::MakeUnique<base::Value>("http://chromium.org"), nullptr);
216 policy_bridge()->GetPolicies(PolicyStringCallback("{}")); 216 policy_bridge()->GetPolicies(PolicyStringCallback("{}"));
217 } 217 }
218 218
219 TEST_F(ArcPolicyBridgeTest, DisableScreenshotsTest) { 219 TEST_F(ArcPolicyBridgeTest, DisableScreenshotsTest) {
220 policy_map().Set(policy::key::kDisableScreenshots, 220 policy_map().Set(policy::key::kDisableScreenshots,
221 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 221 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
222 policy::POLICY_SOURCE_CLOUD, 222 policy::POLICY_SOURCE_CLOUD,
223 base::MakeUnique<base::Value>(true), nullptr); 223 base::MakeUnique<base::Value>(true), nullptr);
224 policy_bridge()->GetPolicies( 224 policy_bridge()->GetPolicies(
225 PolicyStringCallback("{\"screenCaptureDisabled\":true}")); 225 PolicyStringCallback("{\"screenCaptureDisabled\":true}"));
(...skipping 100 matching lines...) Expand 10 before | Expand all | Expand 10 after
326 326
327 TEST_F(ArcPolicyBridgeTest, CaCertificateTest) { 327 TEST_F(ArcPolicyBridgeTest, CaCertificateTest) {
328 // Enable CA certificates sync. 328 // Enable CA certificates sync.
329 policy_map().Set( 329 policy_map().Set(
330 policy::key::kArcCertificatesSyncMode, policy::POLICY_LEVEL_MANDATORY, 330 policy::key::kArcCertificatesSyncMode, policy::POLICY_LEVEL_MANDATORY,
331 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 331 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
332 base::MakeUnique<base::Value>(ArcCertsSyncMode::COPY_CA_CERTS), nullptr); 332 base::MakeUnique<base::Value>(ArcCertsSyncMode::COPY_CA_CERTS), nullptr);
333 policy_map().Set(policy::key::kOpenNetworkConfiguration, 333 policy_map().Set(policy::key::kOpenNetworkConfiguration,
334 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 334 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
335 policy::POLICY_SOURCE_CLOUD, 335 policy::POLICY_SOURCE_CLOUD,
336 base::MakeUnique<base::StringValue>(kFakeONC), nullptr); 336 base::MakeUnique<base::Value>(kFakeONC), nullptr);
337 policy_bridge()->GetPolicies(PolicyStringCallback( 337 policy_bridge()->GetPolicies(PolicyStringCallback(
338 "{\"caCerts\":" 338 "{\"caCerts\":"
339 "[{\"X509\":\"TWFuIGlzIGRpc3Rpbmd1aXNoZWQsIG5vdCBvbmx5IGJ5IGhpcyByZWFzb24" 339 "[{\"X509\":\"TWFuIGlzIGRpc3Rpbmd1aXNoZWQsIG5vdCBvbmx5IGJ5IGhpcyByZWFzb24"
340 "sIGJ1dCBieSB0aGlzIHNpbmd1bGFyIHBhc3Npb24gZnJvbSBvdGhlciBhbmltYWxzLCB3aGl" 340 "sIGJ1dCBieSB0aGlzIHNpbmd1bGFyIHBhc3Npb24gZnJvbSBvdGhlciBhbmltYWxzLCB3aGl"
341 "jaCBpcyBhIGx1c3Qgb2YgdGhlIG1pbmQsIHRoYXQgYnkgYSBwZXJzZXZlcmFuY2Ugb2YgZGV" 341 "jaCBpcyBhIGx1c3Qgb2YgdGhlIG1pbmQsIHRoYXQgYnkgYSBwZXJzZXZlcmFuY2Ugb2YgZGV"
342 "saWdodCBpbiB0aGUgY29udGludWVkIGFuZCBpbmRlZmF0aWdhYmxlIGdlbmVyYXRpb24gb2Y" 342 "saWdodCBpbiB0aGUgY29udGludWVkIGFuZCBpbmRlZmF0aWdhYmxlIGdlbmVyYXRpb24gb2Y"
343 "ga25vd2xlZGdlLCBleGNlZWRzIHRoZSBzaG9ydCB2ZWhlbWVuY2Ugb2YgYW55IGNhcm5hbCB" 343 "ga25vd2xlZGdlLCBleGNlZWRzIHRoZSBzaG9ydCB2ZWhlbWVuY2Ugb2YgYW55IGNhcm5hbCB"
344 "wbGVhc3VyZS4=\"}" 344 "wbGVhc3VyZS4=\"}"
345 "]}")); 345 "]}"));
346 346
(...skipping 11 matching lines...) Expand all
358 policy::POLICY_SOURCE_CLOUD, 358 policy::POLICY_SOURCE_CLOUD,
359 base::MakeUnique<base::Value>(true), nullptr); 359 base::MakeUnique<base::Value>(true), nullptr);
360 policy_bridge()->GetPolicies( 360 policy_bridge()->GetPolicies(
361 PolicyStringCallback("{\"debuggingFeaturesDisabled\":true}")); 361 PolicyStringCallback("{\"debuggingFeaturesDisabled\":true}"));
362 } 362 }
363 363
364 TEST_F(ArcPolicyBridgeTest, MultiplePoliciesTest) { 364 TEST_F(ArcPolicyBridgeTest, MultiplePoliciesTest) {
365 policy_map().Set( 365 policy_map().Set(
366 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY, 366 policy::key::kArcPolicy, policy::POLICY_LEVEL_MANDATORY,
367 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 367 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
368 base::MakeUnique<base::StringValue>( 368 base::MakeUnique<base::Value>(
369 "{\"applications\":" 369 "{\"applications\":"
370 "[{\"packageName\":\"com.google.android.apps.youtube.kids\"," 370 "[{\"packageName\":\"com.google.android.apps.youtube.kids\","
371 "\"installType\":\"REQUIRED\"," 371 "\"installType\":\"REQUIRED\","
372 "\"lockTaskAllowed\":false," 372 "\"lockTaskAllowed\":false,"
373 "\"permissionGrants\":[]" 373 "\"permissionGrants\":[]"
374 "}]," 374 "}],"
375 "\"defaultPermissionPolicy\":\"GRANT\"}"), 375 "\"defaultPermissionPolicy\":\"GRANT\"}"),
376 nullptr); 376 nullptr);
377 policy_map().Set( 377 policy_map().Set(
378 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, 378 policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY,
379 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, 379 policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
380 base::MakeUnique<base::StringValue>("http://chromium.org"), nullptr); 380 base::MakeUnique<base::Value>("http://chromium.org"), nullptr);
381 policy_map().Set(policy::key::kVideoCaptureAllowed, 381 policy_map().Set(policy::key::kVideoCaptureAllowed,
382 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, 382 policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER,
383 policy::POLICY_SOURCE_CLOUD, 383 policy::POLICY_SOURCE_CLOUD,
384 base::MakeUnique<base::Value>(false), nullptr); 384 base::MakeUnique<base::Value>(false), nullptr);
385 policy_bridge()->GetPolicies(PolicyStringCallback( 385 policy_bridge()->GetPolicies(PolicyStringCallback(
386 "{\"applications\":" 386 "{\"applications\":"
387 "[{\"installType\":\"REQUIRED\"," 387 "[{\"installType\":\"REQUIRED\","
388 "\"lockTaskAllowed\":false," 388 "\"lockTaskAllowed\":false,"
389 "\"packageName\":\"com.google.android.apps.youtube.kids\"," 389 "\"packageName\":\"com.google.android.apps.youtube.kids\","
390 "\"permissionGrants\":[]" 390 "\"permissionGrants\":[]"
(...skipping 41 matching lines...) Expand 10 before | Expand all | Expand 10 after
432 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) { 432 TEST_F(ArcPolicyBridgeTest, PolicyInstanceUnmanagedTest) {
433 policy_bridge()->OverrideIsManagedForTesting(false); 433 policy_bridge()->OverrideIsManagedForTesting(false);
434 policy_instance()->CallGetPolicies(PolicyStringCallback("")); 434 policy_instance()->CallGetPolicies(PolicyStringCallback(""));
435 } 435 }
436 436
437 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) { 437 TEST_F(ArcPolicyBridgeTest, PolicyInstanceManagedTest) {
438 policy_instance()->CallGetPolicies(PolicyStringCallback("{}")); 438 policy_instance()->CallGetPolicies(PolicyStringCallback("{}"));
439 } 439 }
440 440
441 } // namespace arc 441 } // namespace arc
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698