Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(157)

Side by Side Diff: remoting/host/policy_watcher_unittest.cc

Issue 2682473003: Add support for multiple allowed domains (Closed)
Patch Set: Created 3 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "remoting/host/policy_watcher.h" 5 #include "remoting/host/policy_watcher.h"
6 6
7 #include "base/bind.h" 7 #include "base/bind.h"
8 #include "base/json/json_writer.h" 8 #include "base/json/json_writer.h"
9 #include "base/macros.h" 9 #include "base/macros.h"
10 #include "base/memory/ptr_util.h" 10 #include "base/memory/ptr_util.h"
(...skipping 233 matching lines...) Expand 10 before | Expand all | Expand 10 after
244 base::DictionaryValue third_party_auth_cert_empty_; 244 base::DictionaryValue third_party_auth_cert_empty_;
245 base::DictionaryValue remote_assistance_uiaccess_true_; 245 base::DictionaryValue remote_assistance_uiaccess_true_;
246 base::DictionaryValue remote_assistance_uiaccess_false_; 246 base::DictionaryValue remote_assistance_uiaccess_false_;
247 247
248 private: 248 private:
249 void SetDefaults(base::DictionaryValue& dict) { 249 void SetDefaults(base::DictionaryValue& dict) {
250 dict.SetBoolean(key::kRemoteAccessHostFirewallTraversal, true); 250 dict.SetBoolean(key::kRemoteAccessHostFirewallTraversal, true);
251 dict.SetBoolean(key::kRemoteAccessHostAllowRelayedConnection, true); 251 dict.SetBoolean(key::kRemoteAccessHostAllowRelayedConnection, true);
252 dict.SetString(key::kRemoteAccessHostUdpPortRange, ""); 252 dict.SetString(key::kRemoteAccessHostUdpPortRange, "");
253 dict.SetString(key::kRemoteAccessHostClientDomain, std::string()); 253 dict.SetString(key::kRemoteAccessHostClientDomain, std::string());
254 dict.Set(key::kRemoteAccessHostClientDomainList,
255 base::MakeUnique<base::ListValue>());
254 dict.SetString(key::kRemoteAccessHostDomain, std::string()); 256 dict.SetString(key::kRemoteAccessHostDomain, std::string());
257 dict.Set(key::kRemoteAccessHostDomainList,
258 base::MakeUnique<base::ListValue>());
255 dict.SetBoolean(key::kRemoteAccessHostMatchUsername, false); 259 dict.SetBoolean(key::kRemoteAccessHostMatchUsername, false);
256 dict.SetString(key::kRemoteAccessHostTalkGadgetPrefix, 260 dict.SetString(key::kRemoteAccessHostTalkGadgetPrefix,
257 kDefaultHostTalkGadgetPrefix); 261 kDefaultHostTalkGadgetPrefix);
258 dict.SetBoolean(key::kRemoteAccessHostRequireCurtain, false); 262 dict.SetBoolean(key::kRemoteAccessHostRequireCurtain, false);
259 dict.SetString(key::kRemoteAccessHostTokenUrl, ""); 263 dict.SetString(key::kRemoteAccessHostTokenUrl, "");
260 dict.SetString(key::kRemoteAccessHostTokenValidationUrl, ""); 264 dict.SetString(key::kRemoteAccessHostTokenValidationUrl, "");
261 dict.SetString(key::kRemoteAccessHostTokenValidationCertificateIssuer, ""); 265 dict.SetString(key::kRemoteAccessHostTokenValidationCertificateIssuer, "");
262 dict.SetBoolean(key::kRemoteAccessHostAllowClientPairing, true); 266 dict.SetBoolean(key::kRemoteAccessHostAllowClientPairing, true);
263 dict.SetBoolean(key::kRemoteAccessHostAllowGnubbyAuth, true); 267 dict.SetBoolean(key::kRemoteAccessHostAllowGnubbyAuth, true);
264 dict.SetBoolean(key::kRemoteAccessHostAllowUiAccessForRemoteAssistance, 268 dict.SetBoolean(key::kRemoteAccessHostAllowUiAccessForRemoteAssistance,
(...skipping 413 matching lines...) Expand 10 before | Expand all | Expand 10 after
678 682
679 // And check one, random "boolean" policy to see if the type propagated 683 // And check one, random "boolean" policy to see if the type propagated
680 // correctly from policy_templates.json file. 684 // correctly from policy_templates.json file.
681 const policy::Schema boolean_schema = 685 const policy::Schema boolean_schema =
682 schema->GetKnownProperty("RemoteAccessHostRequireCurtain"); 686 schema->GetKnownProperty("RemoteAccessHostRequireCurtain");
683 EXPECT_TRUE(boolean_schema.valid()); 687 EXPECT_TRUE(boolean_schema.valid());
684 EXPECT_EQ(boolean_schema.type(), base::Value::Type::BOOLEAN); 688 EXPECT_EQ(boolean_schema.type(), base::Value::Type::BOOLEAN);
685 } 689 }
686 690
687 } // namespace remoting 691 } // namespace remoting
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698