Index: chrome/browser/extensions/api/networking_private/networking_private_chromeos_apitest.cc |
diff --git a/chrome/browser/extensions/api/networking_private/networking_private_chromeos_apitest.cc b/chrome/browser/extensions/api/networking_private/networking_private_chromeos_apitest.cc |
index ae542c1ab470c78eaf1578c3cd9a5e59b1ab1407..384521c1b1a939350d88c652927d4b7269877659 100644 |
--- a/chrome/browser/extensions/api/networking_private/networking_private_chromeos_apitest.cc |
+++ b/chrome/browser/extensions/api/networking_private/networking_private_chromeos_apitest.cc |
@@ -725,6 +725,36 @@ IN_PROC_BROWSER_TEST_F(NetworkingPrivateChromeOSApiTest, GetGlobalPolicy) { |
EXPECT_TRUE(RunNetworkingSubtest("getGlobalPolicy")) << message_; |
} |
+IN_PROC_BROWSER_TEST_F(NetworkingPrivateChromeOSApiTest, |
+ CreateConfigForPolicyControlledNetwork) { |
+ const std::string user_policy_blob = |
+ "{ \"NetworkConfigurations\": [" |
+ " { \"GUID\": \"stub_wifi2\"," |
+ " \"Type\": \"WiFi\"," |
+ " \"Name\": \"My WiFi Network\"," |
+ " \"WiFi\": {" |
+ " \"HexSSID\": \"77696669325F50534B\"," // "wifi2_PSK" |
+ " \"Passphrase\": \"passphrase\"," |
+ " \"Recommended\": [ \"AutoConnect\", \"Passphrase\" ]," |
+ " \"Security\": \"WPA-PSK\" }" |
+ " }" |
+ " ]," |
+ " \"Certificates\": []," |
+ " \"Type\": \"UnencryptedConfiguration\"" |
+ "}"; |
+ |
+ policy::PolicyMap policy; |
+ policy.Set(policy::key::kOpenNetworkConfiguration, |
+ policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_USER, |
+ policy::POLICY_SOURCE_CLOUD, |
+ base::WrapUnique(new base::Value(user_policy_blob)), nullptr); |
+ provider_.UpdateChromePolicy(policy); |
+ |
+ content::RunAllPendingInMessageLoop(); |
+ |
+ EXPECT_TRUE(RunNetworkingSubtest("createConfigForPolicyControlledNetwork")); |
+} |
+ |
// Tests subset of networking API for the networking API alias - to verify that |
// using API methods and event does not cause access exceptions (due to |
// missing permissions). |