Index: trunk/src/remoting/host/policy_hack/policy_watcher_unittest.cc |
=================================================================== |
--- trunk/src/remoting/host/policy_hack/policy_watcher_unittest.cc (revision 267240) |
+++ trunk/src/remoting/host/policy_hack/policy_watcher_unittest.cc (working copy) |
@@ -75,13 +75,6 @@ |
true); |
gnubby_auth_false_.SetBoolean(PolicyWatcher::kHostAllowGnubbyAuthPolicyName, |
false); |
- relay_true_.SetBoolean(PolicyWatcher::kRelayPolicyName, true); |
- relay_false_.SetBoolean(PolicyWatcher::kRelayPolicyName, false); |
- port_range_full_.SetString(PolicyWatcher::kUdpPortRangePolicyName, |
- kPortRange); |
- port_range_empty_.SetString(PolicyWatcher::kUdpPortRangePolicyName, |
- std::string()); |
- |
#if !defined(NDEBUG) |
SetDefaults(nat_false_overridden_others_default_); |
nat_false_overridden_others_default_.SetBoolean( |
@@ -106,7 +99,6 @@ |
} |
static const char* kHostDomain; |
- static const char* kPortRange; |
base::MessageLoop message_loop_; |
scoped_refptr<base::MessageLoopProxy> message_loop_proxy_; |
MockPolicyCallback mock_policy_callback_; |
@@ -134,16 +126,10 @@ |
base::DictionaryValue pairing_false_; |
base::DictionaryValue gnubby_auth_true_; |
base::DictionaryValue gnubby_auth_false_; |
- base::DictionaryValue relay_true_; |
- base::DictionaryValue relay_false_; |
- base::DictionaryValue port_range_full_; |
- base::DictionaryValue port_range_empty_; |
private: |
void SetDefaults(base::DictionaryValue& dict) { |
dict.SetBoolean(PolicyWatcher::kNatPolicyName, true); |
- dict.SetBoolean(PolicyWatcher::kRelayPolicyName, true); |
- dict.SetString(PolicyWatcher::kUdpPortRangePolicyName, ""); |
dict.SetBoolean(PolicyWatcher::kHostRequireTwoFactorPolicyName, false); |
dict.SetString(PolicyWatcher::kHostDomainPolicyName, std::string()); |
dict.SetBoolean(PolicyWatcher::kHostMatchUsernamePolicyName, false); |
@@ -164,7 +150,6 @@ |
}; |
const char* PolicyWatcherTest::kHostDomain = "google.com"; |
-const char* PolicyWatcherTest::kPortRange = "12400-12409"; |
MATCHER_P(IsPolicies, dict, "") { |
return arg->Equals(dict); |
@@ -370,37 +355,5 @@ |
StopWatching(); |
} |
-TEST_F(PolicyWatcherTest, Relay) { |
- testing::InSequence sequence; |
- EXPECT_CALL(mock_policy_callback_, |
- OnPolicyUpdatePtr(IsPolicies(&nat_true_others_default_))); |
- EXPECT_CALL(mock_policy_callback_, |
- OnPolicyUpdatePtr(IsPolicies(&relay_false_))); |
- EXPECT_CALL(mock_policy_callback_, |
- OnPolicyUpdatePtr(IsPolicies(&relay_true_))); |
- |
- StartWatching(); |
- policy_watcher_->SetPolicies(&empty_); |
- policy_watcher_->SetPolicies(&relay_false_); |
- policy_watcher_->SetPolicies(&relay_true_); |
- StopWatching(); |
-} |
- |
-TEST_F(PolicyWatcherTest, UdpPortRange) { |
- testing::InSequence sequence; |
- EXPECT_CALL(mock_policy_callback_, |
- OnPolicyUpdatePtr(IsPolicies(&nat_true_others_default_))); |
- EXPECT_CALL(mock_policy_callback_, |
- OnPolicyUpdatePtr(IsPolicies(&port_range_full_))); |
- EXPECT_CALL(mock_policy_callback_, |
- OnPolicyUpdatePtr(IsPolicies(&port_range_empty_))); |
- |
- StartWatching(); |
- policy_watcher_->SetPolicies(&empty_); |
- policy_watcher_->SetPolicies(&port_range_full_); |
- policy_watcher_->SetPolicies(&port_range_empty_); |
- StopWatching(); |
-} |
- |
} // namespace policy_hack |
} // namespace remoting |