| Index: remoting/host/policy_watcher_unittest.cc
|
| diff --git a/remoting/host/policy_watcher_unittest.cc b/remoting/host/policy_watcher_unittest.cc
|
| index ccbdf6d8f46dc993d2bcc1188270a4120a3ebea2..74f676977ef681d156947a10c624bbeea43aa7d2 100644
|
| --- a/remoting/host/policy_watcher_unittest.cc
|
| +++ b/remoting/host/policy_watcher_unittest.cc
|
| @@ -74,13 +74,19 @@ class PolicyWatcherTest : public testing::Test {
|
| policy_watcher_ = PolicyWatcher::CreateFromPolicyLoaderForTesting(
|
| base::WrapUnique(policy_loader_));
|
|
|
| + base::ListValue host_domain;
|
| + host_domain.AppendString(kHostDomain);
|
| +
|
| nat_true_.SetBoolean(key::kRemoteAccessHostFirewallTraversal, true);
|
| nat_false_.SetBoolean(key::kRemoteAccessHostFirewallTraversal, false);
|
| nat_one_.SetInteger(key::kRemoteAccessHostFirewallTraversal, 1);
|
| nat_one_domain_full_.SetInteger(key::kRemoteAccessHostFirewallTraversal, 1);
|
| - nat_one_domain_full_.SetString(key::kRemoteAccessHostDomain, kHostDomain);
|
| - domain_empty_.SetString(key::kRemoteAccessHostDomain, std::string());
|
| - domain_full_.SetString(key::kRemoteAccessHostDomain, kHostDomain);
|
| + nat_one_domain_full_.Set(key::kRemoteAccessHostDomainList,
|
| + host_domain.CreateDeepCopy());
|
| + domain_empty_.Set(key::kRemoteAccessHostDomainList,
|
| + base::MakeUnique<base::ListValue>());
|
| + domain_full_.Set(key::kRemoteAccessHostDomainList,
|
| + host_domain.CreateDeepCopy());
|
| SetDefaults(nat_true_others_default_);
|
| nat_true_others_default_.SetBoolean(key::kRemoteAccessHostFirewallTraversal,
|
| true);
|
| @@ -88,30 +94,32 @@ class PolicyWatcherTest : public testing::Test {
|
| nat_false_others_default_.SetBoolean(
|
| key::kRemoteAccessHostFirewallTraversal, false);
|
| SetDefaults(domain_empty_others_default_);
|
| - domain_empty_others_default_.SetString(key::kRemoteAccessHostDomain,
|
| - std::string());
|
| + domain_empty_others_default_.Set(key::kRemoteAccessHostDomainList,
|
| + base::MakeUnique<base::ListValue>());
|
| SetDefaults(domain_full_others_default_);
|
| - domain_full_others_default_.SetString(key::kRemoteAccessHostDomain,
|
| - kHostDomain);
|
| + domain_full_others_default_.Set(key::kRemoteAccessHostDomainList,
|
| + host_domain.CreateDeepCopy());
|
| nat_true_domain_empty_.SetBoolean(key::kRemoteAccessHostFirewallTraversal,
|
| true);
|
| - nat_true_domain_empty_.SetString(key::kRemoteAccessHostDomain,
|
| - std::string());
|
| + nat_true_domain_empty_.Set(key::kRemoteAccessHostDomainList,
|
| + base::MakeUnique<base::ListValue>());
|
| nat_true_domain_full_.SetBoolean(key::kRemoteAccessHostFirewallTraversal,
|
| true);
|
| - nat_true_domain_full_.SetString(key::kRemoteAccessHostDomain, kHostDomain);
|
| + nat_true_domain_full_.Set(key::kRemoteAccessHostDomainList,
|
| + host_domain.CreateDeepCopy());
|
| nat_false_domain_empty_.SetBoolean(key::kRemoteAccessHostFirewallTraversal,
|
| false);
|
| - nat_false_domain_empty_.SetString(key::kRemoteAccessHostDomain,
|
| - std::string());
|
| + nat_false_domain_empty_.Set(key::kRemoteAccessHostDomainList,
|
| + base::MakeUnique<base::ListValue>());
|
| nat_false_domain_full_.SetBoolean(key::kRemoteAccessHostFirewallTraversal,
|
| false);
|
| - nat_false_domain_full_.SetString(key::kRemoteAccessHostDomain, kHostDomain);
|
| + nat_false_domain_full_.Set(key::kRemoteAccessHostDomainList,
|
| + host_domain.CreateDeepCopy());
|
| SetDefaults(nat_true_domain_empty_others_default_);
|
| nat_true_domain_empty_others_default_.SetBoolean(
|
| key::kRemoteAccessHostFirewallTraversal, true);
|
| - nat_true_domain_empty_others_default_.SetString(
|
| - key::kRemoteAccessHostDomain, std::string());
|
| + nat_true_domain_empty_others_default_.Set(
|
| + key::kRemoteAccessHostDomainList, base::MakeUnique<base::ListValue>());
|
| unknown_policies_.SetString("UnknownPolicyOne", std::string());
|
| unknown_policies_.SetString("UnknownPolicyTwo", std::string());
|
| unknown_policies_.SetBoolean("RemoteAccessHostUnknownPolicyThree", true);
|
| @@ -129,8 +137,8 @@ class PolicyWatcherTest : public testing::Test {
|
| port_range_malformed_.SetString(key::kRemoteAccessHostUdpPortRange,
|
| "malformed");
|
| port_range_malformed_domain_full_.MergeDictionary(&port_range_malformed_);
|
| - port_range_malformed_domain_full_.SetString(key::kRemoteAccessHostDomain,
|
| - kHostDomain);
|
| + port_range_malformed_domain_full_.Set(key::kRemoteAccessHostDomainList,
|
| + host_domain.CreateDeepCopy());
|
|
|
| curtain_true_.SetBoolean(key::kRemoteAccessHostRequireCurtain, true);
|
| curtain_false_.SetBoolean(key::kRemoteAccessHostRequireCurtain, false);
|
| @@ -250,8 +258,10 @@ class PolicyWatcherTest : public testing::Test {
|
| dict.SetBoolean(key::kRemoteAccessHostFirewallTraversal, true);
|
| dict.SetBoolean(key::kRemoteAccessHostAllowRelayedConnection, true);
|
| dict.SetString(key::kRemoteAccessHostUdpPortRange, "");
|
| - dict.SetString(key::kRemoteAccessHostClientDomain, std::string());
|
| - dict.SetString(key::kRemoteAccessHostDomain, std::string());
|
| + dict.Set(key::kRemoteAccessHostClientDomainList,
|
| + base::MakeUnique<base::ListValue>());
|
| + dict.Set(key::kRemoteAccessHostDomainList,
|
| + base::MakeUnique<base::ListValue>());
|
| dict.SetBoolean(key::kRemoteAccessHostMatchUsername, false);
|
| dict.SetString(key::kRemoteAccessHostTalkGadgetPrefix,
|
| kDefaultHostTalkGadgetPrefix);
|
| @@ -659,6 +669,11 @@ TEST_F(PolicyWatcherTest, PolicySchemaAndPolicyWatcherShouldBeInSync) {
|
| // policies, so we have to skip them here.
|
| continue;
|
| }
|
| + if (key == policy::key::kRemoteAccessHostDomain ||
|
| + key == policy::key::kRemoteAccessHostClientDomain) {
|
| + // These policies are deprecated and get removed during normalization
|
| + continue;
|
| + }
|
| actual_schema[key] = it.schema().type();
|
| }
|
|
|
|
|