| Index: chrome/browser/policy/policy_browsertest.cc
|
| diff --git a/chrome/browser/policy/policy_browsertest.cc b/chrome/browser/policy/policy_browsertest.cc
|
| index 1c77345bbea40745a727ff99c9c251e938af09a7..d72125ba09b36180256cdc014aef0abf01eb7348 100644
|
| --- a/chrome/browser/policy/policy_browsertest.cc
|
| +++ b/chrome/browser/policy/policy_browsertest.cc
|
| @@ -658,7 +658,7 @@ class PolicyTest : public InProcessBrowserTest {
|
| PolicyMap policies;
|
| policies.Set(key::kDisableScreenshots, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(!enabled), nullptr);
|
| + base::MakeUnique<base::Value>(!enabled), nullptr);
|
| UpdateProviderPolicy(policies);
|
| }
|
|
|
| @@ -813,11 +813,10 @@ class PolicyTest : public InProcessBrowserTest {
|
| }
|
| }
|
|
|
| - void ApplySafeSearchPolicy(
|
| - std::unique_ptr<base::FundamentalValue> legacy_safe_search,
|
| - std::unique_ptr<base::FundamentalValue> google_safe_search,
|
| - std::unique_ptr<base::FundamentalValue> legacy_youtube,
|
| - std::unique_ptr<base::FundamentalValue> youtube_restrict) {
|
| + void ApplySafeSearchPolicy(std::unique_ptr<base::Value> legacy_safe_search,
|
| + std::unique_ptr<base::Value> google_safe_search,
|
| + std::unique_ptr<base::Value> legacy_youtube,
|
| + std::unique_ptr<base::Value> youtube_restrict) {
|
| PolicyMap policies;
|
| SetPolicy(&policies, key::kForceSafeSearch, std::move(legacy_safe_search));
|
| SetPolicy(&policies, key::kForceGoogleSafeSearch,
|
| @@ -909,7 +908,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, BookmarkBarEnabled) {
|
| PolicyMap policies;
|
| policies.Set(key::kBookmarkBarEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(true), nullptr);
|
| + base::MakeUnique<base::Value>(true), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_TRUE(prefs->IsManagedPreference(bookmarks::prefs::kShowBookmarkBar));
|
| EXPECT_TRUE(prefs->GetBoolean(bookmarks::prefs::kShowBookmarkBar));
|
| @@ -921,7 +920,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, BookmarkBarEnabled) {
|
|
|
| policies.Set(key::kBookmarkBarEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_TRUE(prefs->IsManagedPreference(bookmarks::prefs::kShowBookmarkBar));
|
| EXPECT_FALSE(prefs->GetBoolean(bookmarks::prefs::kShowBookmarkBar));
|
| @@ -958,7 +957,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PRE_DefaultCookiesSetting) {
|
| PolicyMap policies;
|
| policies.Set(key::kDefaultCookiesSetting, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(4), nullptr);
|
| + base::MakeUnique<base::Value>(4), nullptr);
|
| UpdateProviderPolicy(policies);
|
| }
|
|
|
| @@ -1006,7 +1005,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DefaultSearchProvider) {
|
| PolicyMap policies;
|
| policies.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(true), nullptr);
|
| + base::MakeUnique<base::Value>(true), nullptr);
|
| policies.Set(key::kDefaultSearchProviderKeyword, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| base::MakeUnique<base::StringValue>(kKeyword), nullptr);
|
| @@ -1066,7 +1065,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DefaultSearchProvider) {
|
| ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL));
|
| policies.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| EXPECT_TRUE(service->GetDefaultSearchProvider());
|
| UpdateProviderPolicy(policies);
|
| EXPECT_FALSE(service->GetDefaultSearchProvider());
|
| @@ -1080,8 +1079,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SeparateProxyPoliciesMerging) {
|
| // Add an individual proxy policy value.
|
| PolicyMap policies;
|
| policies.Set(key::kProxyServerMode, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD, base::MakeUnique<base::FundamentalValue>(3),
|
| - nullptr);
|
| + POLICY_SOURCE_CLOUD, base::MakeUnique<base::Value>(3), nullptr);
|
| UpdateProviderPolicy(policies);
|
|
|
| // It should be removed and replaced with a dictionary.
|
| @@ -1128,16 +1126,16 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, LegacySafeSearch) {
|
| ApplySafeSearchPolicy(
|
| legacy_safe_search == 0
|
| ? nullptr
|
| - : base::MakeUnique<base::FundamentalValue>(legacy_safe_search == 1),
|
| + : base::MakeUnique<base::Value>(legacy_safe_search == 1),
|
| google_safe_search == 0
|
| ? nullptr
|
| - : base::MakeUnique<base::FundamentalValue>(google_safe_search == 1),
|
| + : base::MakeUnique<base::Value>(google_safe_search == 1),
|
| legacy_youtube == 0
|
| ? nullptr
|
| - : base::MakeUnique<base::FundamentalValue>(legacy_youtube == 1),
|
| + : base::MakeUnique<base::Value>(legacy_youtube == 1),
|
| youtube_restrict == 0
|
| ? nullptr // subtracting 1 gives 0,1,2, see above
|
| - : base::MakeUnique<base::FundamentalValue>(youtube_restrict - 1));
|
| + : base::MakeUnique<base::Value>(youtube_restrict - 1));
|
|
|
| // The legacy ForceSafeSearch policy should only have an effect if none of
|
| // the other 3 policies are defined.
|
| @@ -1200,14 +1198,13 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, ForceGoogleSafeSearch) {
|
| // ForceGoogleSafeSearch policy.
|
| for (int safe_search = 0; safe_search < 3; safe_search++) {
|
| // Override the Google safe search policy.
|
| - ApplySafeSearchPolicy(
|
| - nullptr, // ForceSafeSearch
|
| - safe_search == 0 // ForceGoogleSafeSearch
|
| - ? nullptr
|
| - : base::MakeUnique<base::FundamentalValue>(safe_search == 1),
|
| - nullptr, // ForceYouTubeSafetyMode
|
| - nullptr // ForceYouTubeRestrict
|
| - );
|
| + ApplySafeSearchPolicy(nullptr, // ForceSafeSearch
|
| + safe_search == 0 // ForceGoogleSafeSearch
|
| + ? nullptr
|
| + : base::MakeUnique<base::Value>(safe_search == 1),
|
| + nullptr, // ForceYouTubeSafetyMode
|
| + nullptr // ForceYouTubeRestrict
|
| + );
|
| // Verify that the safe search pref behaves the way we expect.
|
| PrefService* prefs = browser()->profile()->GetPrefs();
|
| EXPECT_EQ(safe_search != 0,
|
| @@ -1233,8 +1230,8 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, Disable3DAPIs) {
|
| // Disable with a policy.
|
| PolicyMap policies;
|
| policies.Set(key::kDisable3DAPIs, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(true), nullptr);
|
| + POLICY_SOURCE_CLOUD, base::MakeUnique<base::Value>(true),
|
| + nullptr);
|
| UpdateProviderPolicy(policies);
|
| // Crash and reload the tab to get a new renderer.
|
| content::CrashTab(contents);
|
| @@ -1242,8 +1239,8 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, Disable3DAPIs) {
|
| EXPECT_FALSE(IsWebGLEnabled(contents));
|
| // Enable with a policy.
|
| policies.Set(key::kDisable3DAPIs, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + POLICY_SOURCE_CLOUD, base::MakeUnique<base::Value>(false),
|
| + nullptr);
|
| UpdateProviderPolicy(policies);
|
| content::CrashTab(contents);
|
| EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_RELOAD));
|
| @@ -1284,7 +1281,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DisablePacHttpsUrlStripping) {
|
| PolicyMap policies;
|
| policies.Set(key::kPacHttpsUrlStrippingEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(false)), nullptr);
|
| + base::WrapUnique(new base::Value(false)), nullptr);
|
| UpdateProviderPolicy(policies);
|
| content::RunAllPendingInMessageLoop();
|
|
|
| @@ -1307,7 +1304,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DeveloperToolsDisabled) {
|
| PolicyMap policies;
|
| policies.Set(key::kDeveloperToolsDisabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(true), nullptr);
|
| + base::MakeUnique<base::Value>(true), nullptr);
|
| content::WindowedNotificationObserver close_observer(
|
| content::NOTIFICATION_WEB_CONTENTS_DESTROYED,
|
| content::Source<content::WebContents>(
|
| @@ -1394,7 +1391,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DeveloperToolsDisabledExtensionsDevMode) {
|
| PolicyMap policies;
|
| policies.Set(key::kDeveloperToolsDisabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(true), nullptr);
|
| + base::MakeUnique<base::Value>(true), nullptr);
|
| UpdateProviderPolicy(policies);
|
|
|
| // Expect devcontrols to be hidden now...
|
| @@ -1437,7 +1434,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DISABLED_WebStoreIconHidden) {
|
| PolicyMap policies;
|
| policies.Set(key::kHideWebStoreIcon, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(true)), nullptr);
|
| + base::WrapUnique(new base::Value(true)), nullptr);
|
| UpdateProviderPolicy(policies);
|
|
|
| // The web store icons should now be hidden.
|
| @@ -2091,7 +2088,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, HomepageLocation) {
|
|
|
| policies.Set(key::kHomepageIsNewTabPage, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(true), nullptr);
|
| + base::MakeUnique<base::Value>(true), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_HOME));
|
| content::WaitForLoadStop(contents);
|
| @@ -2116,7 +2113,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_IncognitoEnabled) {
|
| PolicyMap policies;
|
| policies.Set(key::kIncognitoEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_FALSE(chrome::ExecuteCommand(browser(), IDC_NEW_INCOGNITO_WINDOW));
|
| EXPECT_EQ(1u, active_browser_list->size());
|
| @@ -2125,7 +2122,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_IncognitoEnabled) {
|
| // Enable via policy and verify that incognito windows can be opened.
|
| policies.Set(key::kIncognitoEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(true), nullptr);
|
| + base::MakeUnique<base::Value>(true), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_NEW_INCOGNITO_WINDOW));
|
| EXPECT_EQ(2u, active_browser_list->size());
|
| @@ -2145,7 +2142,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, Javascript) {
|
| PolicyMap policies;
|
| policies.Set(key::kJavascriptEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
| // Reload the page.
|
| ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL));
|
| @@ -2163,8 +2160,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, Javascript) {
|
| EXPECT_FALSE(IsJavascriptEnabled(contents));
|
| policies.Set(key::kDefaultJavaScriptSetting, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(CONTENT_SETTING_ALLOW),
|
| - nullptr);
|
| + base::MakeUnique<base::Value>(CONTENT_SETTING_ALLOW), nullptr);
|
| UpdateProviderPolicy(policies);
|
| ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL));
|
| EXPECT_TRUE(IsJavascriptEnabled(contents));
|
| @@ -2180,7 +2176,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, NetworkPrediction) {
|
| PolicyMap policies;
|
| policies.Set(key::kDnsPrefetchingEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
|
|
| EXPECT_FALSE(IsNetworkPredictionEnabled(prefs));
|
| @@ -2188,7 +2184,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, NetworkPrediction) {
|
| // Enabled by new policy, this should override old one.
|
| policies.Set(key::kNetworkPredictionOptions, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(
|
| + base::MakeUnique<base::Value>(
|
| chrome_browser_net::NETWORK_PREDICTION_ALWAYS),
|
| nullptr);
|
| UpdateProviderPolicy(policies);
|
| @@ -2201,7 +2197,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SavingBrowserHistoryDisabled) {
|
| PolicyMap policies;
|
| policies.Set(key::kSavingBrowserHistoryDisabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(true), nullptr);
|
| + base::MakeUnique<base::Value>(true), nullptr);
|
| UpdateProviderPolicy(policies);
|
| GURL url = ui_test_utils::GetTestUrl(
|
| base::FilePath(base::FilePath::kCurrentDirectory),
|
| @@ -2214,7 +2210,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SavingBrowserHistoryDisabled) {
|
| // Now flip the policy and try again.
|
| policies.Set(key::kSavingBrowserHistoryDisabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
| ui_test_utils::NavigateToURL(browser(), url);
|
| // Verify that the navigation was saved in the history.
|
| @@ -2241,7 +2237,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DISABLED_TranslateEnabled) {
|
| PolicyMap policies;
|
| policies.Set(key::kTranslateEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(true)), nullptr);
|
| + base::WrapUnique(new base::Value(true)), nullptr);
|
| UpdateProviderPolicy(policies);
|
| // Instead of waiting for NOTIFICATION_TAB_CONTENTS_INFOBAR_ADDED, this test
|
| // waits for NOTIFICATION_TAB_LANGUAGE_DETERMINED because that's what the
|
| @@ -2284,7 +2280,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DISABLED_TranslateEnabled) {
|
| EXPECT_EQ(0u, infobar_service->infobar_count());
|
| policies.Set(key::kTranslateEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(false)), nullptr);
|
| + base::WrapUnique(new base::Value(false)), nullptr);
|
| UpdateProviderPolicy(policies);
|
| // Navigating to the same URL now doesn't trigger an infobar.
|
| content::WindowedNotificationObserver language_observer2(
|
| @@ -2469,7 +2465,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, FullscreenAllowedBrowser) {
|
| PolicyMap policies;
|
| policies.Set(key::kFullscreenAllowed, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
|
|
| BrowserWindow* browser_window = browser()->window();
|
| @@ -2484,7 +2480,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, FullscreenAllowedApp) {
|
| PolicyMap policies;
|
| policies.Set(key::kFullscreenAllowed, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
|
|
| const extensions::Extension* extension =
|
| @@ -2552,7 +2548,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DisableAudioOutput) {
|
| PolicyMap policies;
|
| policies.Set(key::kAudioOutputAllowed, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_TRUE(audio_handler->IsOutputMuted());
|
| // This should not change the state now and should not trigger output mute
|
| @@ -2564,7 +2560,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DisableAudioOutput) {
|
| // Toggle back and observe if the output mute changed event is fired.
|
| policies.Set(key::kAudioOutputAllowed, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(true), nullptr);
|
| + base::MakeUnique<base::Value>(true), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_FALSE(audio_handler->IsOutputMuted());
|
| EXPECT_EQ(1, test_observer->output_mute_changed_count());
|
| @@ -2599,8 +2595,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SessionLengthLimit) {
|
| PolicyMap policies;
|
| policies.Set(key::kSessionLengthLimit, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(kThreeHoursInMs),
|
| - nullptr);
|
| + base::MakeUnique<base::Value>(kThreeHoursInMs), nullptr);
|
| UpdateProviderPolicy(policies);
|
| base::RunLoop().RunUntilIdle();
|
| Mock::VerifyAndClearExpectations(&observer);
|
| @@ -2610,7 +2605,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SessionLengthLimit) {
|
| EXPECT_CALL(observer, Observe(chrome::NOTIFICATION_APP_TERMINATING, _, _));
|
| policies.Set(key::kSessionLengthLimit, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(kOneHourInMs), nullptr);
|
| + base::MakeUnique<base::Value>(kOneHourInMs), nullptr);
|
| UpdateProviderPolicy(policies);
|
| base::RunLoop().RunUntilIdle();
|
| Mock::VerifyAndClearExpectations(&observer);
|
| @@ -2640,7 +2635,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest,
|
| PolicyMap policies;
|
| policies.Set(key::kWaitForInitialUserActivity, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(true)), nullptr);
|
| + base::WrapUnique(new base::Value(true)), nullptr);
|
| UpdateProviderPolicy(policies);
|
| base::RunLoop().RunUntilIdle();
|
|
|
| @@ -2650,8 +2645,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest,
|
| .Times(0);
|
| policies.Set(key::kSessionLengthLimit, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(kOneHourInMs)),
|
| - nullptr);
|
| + base::WrapUnique(new base::Value(kOneHourInMs)), nullptr);
|
| UpdateProviderPolicy(policies);
|
| base::RunLoop().RunUntilIdle();
|
| Mock::VerifyAndClearExpectations(&observer);
|
| @@ -2684,11 +2678,10 @@ IN_PROC_BROWSER_TEST_F(PolicyTest,
|
| PolicyMap policies;
|
| policies.Set(key::kWaitForInitialUserActivity, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(true), nullptr);
|
| + base::MakeUnique<base::Value>(true), nullptr);
|
| policies.Set(key::kSessionLengthLimit, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(kThreeHoursInMs),
|
| - nullptr);
|
| + base::MakeUnique<base::Value>(kThreeHoursInMs), nullptr);
|
| UpdateProviderPolicy(policies);
|
| base::RunLoop().RunUntilIdle();
|
| Mock::VerifyAndClearExpectations(&observer);
|
| @@ -2698,7 +2691,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest,
|
| EXPECT_CALL(observer, Observe(chrome::NOTIFICATION_APP_TERMINATING, _, _));
|
| policies.Set(key::kSessionLengthLimit, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(kOneHourInMs), nullptr);
|
| + base::MakeUnique<base::Value>(kOneHourInMs), nullptr);
|
| UpdateProviderPolicy(policies);
|
| base::RunLoop().RunUntilIdle();
|
| Mock::VerifyAndClearExpectations(&observer);
|
| @@ -2718,7 +2711,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, LargeCursorEnabled) {
|
| PolicyMap policies;
|
| policies.Set(key::kLargeCursorEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_FALSE(accessibility_manager->IsLargeCursorEnabled());
|
|
|
| @@ -2742,7 +2735,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SpokenFeedbackEnabled) {
|
| PolicyMap policies;
|
| policies.Set(key::kSpokenFeedbackEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_FALSE(accessibility_manager->IsSpokenFeedbackEnabled());
|
|
|
| @@ -2766,7 +2759,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, HighContrastEnabled) {
|
| PolicyMap policies;
|
| policies.Set(key::kHighContrastEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_FALSE(accessibility_manager->IsHighContrastEnabled());
|
|
|
| @@ -2790,7 +2783,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, ScreenMagnifierTypeNone) {
|
| PolicyMap policies;
|
| policies.Set(key::kScreenMagnifierType, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(0), nullptr);
|
| + base::MakeUnique<base::Value>(0), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_FALSE(magnification_manager->IsMagnifierEnabled());
|
|
|
| @@ -2811,8 +2804,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, ScreenMagnifierTypeFull) {
|
| PolicyMap policies;
|
| policies.Set(key::kScreenMagnifierType, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(ash::MAGNIFIER_FULL),
|
| - nullptr);
|
| + base::MakeUnique<base::Value>(ash::MAGNIFIER_FULL), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_EQ(ash::MAGNIFIER_FULL, magnification_manager->GetMagnifierType());
|
| EXPECT_TRUE(magnification_manager->IsMagnifierEnabled());
|
| @@ -2836,7 +2828,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, AccessibilityVirtualKeyboardEnabled) {
|
| PolicyMap policies;
|
| policies.Set(key::kVirtualKeyboardEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_FALSE(accessibility_manager->IsVirtualKeyboardEnabled());
|
|
|
| @@ -2859,7 +2851,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, VirtualKeyboardEnabled) {
|
| PolicyMap policies;
|
| policies.Set(key::kTouchVirtualKeyboardEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(true), nullptr);
|
| + base::MakeUnique<base::Value>(true), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_TRUE(keyboard::IsKeyboardEnabled());
|
| keyboard::SetTouchKeyboardEnabled(false);
|
| @@ -2869,7 +2861,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, VirtualKeyboardEnabled) {
|
| // cannot enable the keyboard.
|
| policies.Set(key::kTouchVirtualKeyboardEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_FALSE(keyboard::IsKeyboardEnabled());
|
| keyboard::SetTouchKeyboardEnabled(true);
|
| @@ -2942,11 +2934,11 @@ class RestoreOnStartupPolicyTest
|
| expected_urls_.push_back(GURL(kRestoredURLs[i]));
|
| }
|
| PolicyMap policies;
|
| - policies.Set(key::kRestoreOnStartup, POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(
|
| - SessionStartupPref::kPrefValueURLs)),
|
| - nullptr);
|
| + policies.Set(
|
| + key::kRestoreOnStartup, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::Value(SessionStartupPref::kPrefValueURLs)),
|
| + nullptr);
|
| policies.Set(key::kRestoreOnStartupURLs, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, urls.CreateDeepCopy(),
|
| nullptr);
|
| @@ -2956,11 +2948,11 @@ class RestoreOnStartupPolicyTest
|
| void NTP() {
|
| // Verifies that policy can set the startup page to the NTP.
|
| PolicyMap policies;
|
| - policies.Set(key::kRestoreOnStartup, POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(
|
| - SessionStartupPref::kPrefValueNewTab)),
|
| - nullptr);
|
| + policies.Set(
|
| + key::kRestoreOnStartup, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::Value(SessionStartupPref::kPrefValueNewTab)),
|
| + nullptr);
|
| provider_.UpdateChromePolicy(policies);
|
| expected_urls_.push_back(GURL(chrome::kChromeUINewTabURL));
|
| }
|
| @@ -2968,11 +2960,11 @@ class RestoreOnStartupPolicyTest
|
| void Last() {
|
| // Verifies that policy can set the startup pages to the last session.
|
| PolicyMap policies;
|
| - policies.Set(key::kRestoreOnStartup, POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(
|
| - SessionStartupPref::kPrefValueLast)),
|
| - nullptr);
|
| + policies.Set(
|
| + key::kRestoreOnStartup, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| + POLICY_SOURCE_CLOUD,
|
| + base::WrapUnique(new base::Value(SessionStartupPref::kPrefValueLast)),
|
| + nullptr);
|
| provider_.UpdateChromePolicy(policies);
|
| // This should restore the tabs opened at PRE_RunTest below.
|
| for (size_t i = 0; i < arraysize(kRestoredURLs); ++i)
|
| @@ -3035,10 +3027,10 @@ class PolicyStatisticsCollectorTest : public PolicyTest {
|
| PolicyMap policies;
|
| policies.Set(key::kShowHomeButton, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(true), nullptr);
|
| + base::MakeUnique<base::Value>(true), nullptr);
|
| policies.Set(key::kBookmarkBarEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| policies.Set(key::kHomepageLocation, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| base::MakeUnique<base::StringValue>("http://chromium.org"),
|
| @@ -3107,8 +3099,7 @@ class MediaStreamDevicesControllerBrowserTest
|
| const char* allow_rule) {
|
| policies->Set(policy_name, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(policy_value_),
|
| - nullptr);
|
| + base::MakeUnique<base::Value>(policy_value_), nullptr);
|
|
|
| if (whitelist_policy) {
|
| // Add an entry to the whitelist that allows the specified URL regardless
|
| @@ -3336,7 +3327,7 @@ IN_PROC_BROWSER_TEST_F(WebBluetoothPolicyTest, Block) {
|
| PolicyMap policies;
|
| policies.Set(key::kDefaultWebBluetoothGuardSetting, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(2), nullptr);
|
| + base::MakeUnique<base::Value>(2), nullptr);
|
| UpdateProviderPolicy(policies);
|
|
|
| std::string rejection;
|
| @@ -3425,7 +3416,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SafeBrowsingExtendedReportingOptInAllowed) {
|
| PolicyMap policies;
|
| policies.Set(key::kSafeBrowsingExtendedReportingOptInAllowed,
|
| POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(false)), nullptr);
|
| + base::WrapUnique(new base::Value(false)), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_FALSE(
|
| prefs->GetBoolean(prefs::kSafeBrowsingExtendedReportingOptInAllowed));
|
| @@ -3507,7 +3498,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SSLErrorOverridingDisallowed) {
|
| PolicyMap policies;
|
| policies.Set(key::kSSLErrorOverrideAllowed, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(false)), nullptr);
|
| + base::WrapUnique(new base::Value(false)), nullptr);
|
| UpdateProviderPolicy(policies);
|
|
|
| // Policy should not allow overriding anymore.
|
| @@ -3555,7 +3546,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, TaskManagerEndProcessEnabled) {
|
| PolicyMap policies1;
|
| policies1.Set(key::kTaskManagerEndProcessEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_MACHINE, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(false)), nullptr);
|
| + base::WrapUnique(new base::Value(false)), nullptr);
|
| UpdateProviderPolicy(policies1);
|
|
|
| // Policy should not allow ending tasks anymore.
|
| @@ -3565,7 +3556,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, TaskManagerEndProcessEnabled) {
|
| PolicyMap policies2;
|
| policies2.Set(key::kTaskManagerEndProcessEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_MACHINE, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(true)), nullptr);
|
| + base::WrapUnique(new base::Value(true)), nullptr);
|
| UpdateProviderPolicy(policies2);
|
|
|
| // Policy should allow ending tasks again.
|
| @@ -3582,7 +3573,7 @@ class MediaRouterPolicyTest : public PolicyTest {
|
| PolicyMap policies;
|
| policies.Set(key::kEnableMediaRouter, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(enable), nullptr);
|
| + base::MakeUnique<base::Value>(enable), nullptr);
|
| provider_.UpdateChromePolicy(policies);
|
| }
|
| };
|
| @@ -3607,7 +3598,7 @@ class MediaRouterActionPolicyTest : public PolicyTest {
|
| PolicyMap policies;
|
| policies.Set(key::kShowCastIconInToolbar, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(enable), nullptr);
|
| + base::MakeUnique<base::Value>(enable), nullptr);
|
| provider_.UpdateChromePolicy(policies);
|
| }
|
|
|
| @@ -3766,11 +3757,10 @@ ComponentUpdaterPolicyTest::~ComponentUpdaterPolicyTest() {}
|
| void ComponentUpdaterPolicyTest::SetEnableComponentUpdates(
|
| bool enable_component_updates) {
|
| PolicyMap policies;
|
| - policies.Set(
|
| - key::kComponentUpdatesEnabled, POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_MACHINE, POLICY_SOURCE_ENTERPRISE_DEFAULT,
|
| - base::WrapUnique(new base::FundamentalValue(enable_component_updates)),
|
| - nullptr);
|
| + policies.Set(key::kComponentUpdatesEnabled, POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_MACHINE, POLICY_SOURCE_ENTERPRISE_DEFAULT,
|
| + base::WrapUnique(new base::Value(enable_component_updates)),
|
| + nullptr);
|
| UpdateProviderPolicy(policies);
|
| }
|
|
|
| @@ -4069,7 +4059,7 @@ class HardwareAccelerationModePolicyTest : public PolicyTest {
|
| PolicyMap policies;
|
| policies.Set(key::kHardwareAccelerationModeEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| provider_.UpdateChromePolicy(policies);
|
| }
|
| };
|
| @@ -4098,12 +4088,12 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, UnifiedDesktopEnabledByDefault) {
|
| PolicyMap policies;
|
| policies.Set(key::kUnifiedDesktopEnabledByDefault, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(true)), nullptr);
|
| + base::WrapUnique(new base::Value(true)), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_TRUE(display_manager->unified_desktop_enabled());
|
| policies.Set(key::kUnifiedDesktopEnabledByDefault, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(false)), nullptr);
|
| + base::WrapUnique(new base::Value(false)), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_FALSE(display_manager->unified_desktop_enabled());
|
| }
|
| @@ -4140,8 +4130,7 @@ class ArcPolicyTest : public PolicyTest {
|
| PolicyMap policies;
|
| policies.Set(key::kArcEnabled, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(enabled)),
|
| - nullptr);
|
| + base::WrapUnique(new base::Value(enabled)), nullptr);
|
| UpdateProviderPolicy(policies);
|
| if (browser()) {
|
| const PrefService* const prefs = browser()->profile()->GetPrefs();
|
| @@ -4187,7 +4176,7 @@ IN_PROC_BROWSER_TEST_F(ArcPolicyTest, ArcBackupRestoreEnabled) {
|
| PolicyMap policies;
|
| policies.Set(key::kArcBackupRestoreEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(false), nullptr);
|
| + base::MakeUnique<base::Value>(false), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_FALSE(pref->GetBoolean(prefs::kArcBackupRestoreEnabled));
|
| EXPECT_TRUE(pref->IsManagedPreference(prefs::kArcBackupRestoreEnabled));
|
| @@ -4195,7 +4184,7 @@ IN_PROC_BROWSER_TEST_F(ArcPolicyTest, ArcBackupRestoreEnabled) {
|
| // Enable ARC Backup & Restore through the policy.
|
| policies.Set(key::kArcBackupRestoreEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(true), nullptr);
|
| + base::MakeUnique<base::Value>(true), nullptr);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_TRUE(pref->GetBoolean(prefs::kArcBackupRestoreEnabled));
|
| EXPECT_TRUE(pref->IsManagedPreference(prefs::kArcBackupRestoreEnabled));
|
| @@ -4208,16 +4197,16 @@ IN_PROC_BROWSER_TEST_F(ArcPolicyTest, ArcLocationServiceEnabled) {
|
|
|
| // Values of the ArcLocationServiceEnabled policy to be tested.
|
| const std::vector<base::Value> test_policy_values = {
|
| - base::Value(), // unset
|
| - base::FundamentalValue(false), // disabled
|
| - base::FundamentalValue(true), // enabled
|
| + base::Value(), // unset
|
| + base::Value(false), // disabled
|
| + base::Value(true), // enabled
|
| };
|
| // Values of the DefaultGeolocationSetting policy to be tested.
|
| const std::vector<base::Value> test_default_geo_policy_values = {
|
| - base::Value(), // unset
|
| - base::FundamentalValue(1), // 'AllowGeolocation'
|
| - base::FundamentalValue(2), // 'BlockGeolocation'
|
| - base::FundamentalValue(3), // 'AskGeolocation'
|
| + base::Value(), // unset
|
| + base::Value(1), // 'AllowGeolocation'
|
| + base::Value(2), // 'BlockGeolocation'
|
| + base::Value(3), // 'AskGeolocation'
|
| };
|
|
|
| // The pref is switched off by default.
|
| @@ -4317,8 +4306,7 @@ class ChromeOSPolicyTest : public PolicyTest {
|
| PolicyMap policies;
|
| policies.Set(key::kSystemTimezoneAutomaticDetection, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_MACHINE, POLICY_SOURCE_CLOUD,
|
| - base::MakeUnique<base::FundamentalValue>(policy_value),
|
| - nullptr);
|
| + base::MakeUnique<base::Value>(policy_value), nullptr);
|
| UpdateProviderPolicy(policies);
|
|
|
| PrefService* local_state = g_browser_process->local_state();
|
|
|