| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <algorithm> | 5 #include <algorithm> |
| 6 #include <string> | 6 #include <string> |
| 7 #include <vector> | 7 #include <vector> |
| 8 | 8 |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/bind_helpers.h" | 10 #include "base/bind_helpers.h" |
| (...skipping 922 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 933 LocationBar* location_bar = browser()->window()->GetLocationBar(); | 933 LocationBar* location_bar = browser()->window()->GetLocationBar(); |
| 934 ui_test_utils::SendToOmniboxAndSubmit(location_bar, "stuff to search for"); | 934 ui_test_utils::SendToOmniboxAndSubmit(location_bar, "stuff to search for"); |
| 935 OmniboxEditModel* model = location_bar->GetOmniboxView()->model(); | 935 OmniboxEditModel* model = location_bar->GetOmniboxView()->model(); |
| 936 EXPECT_TRUE(model->CurrentMatch(NULL).destination_url.is_valid()); | 936 EXPECT_TRUE(model->CurrentMatch(NULL).destination_url.is_valid()); |
| 937 content::WebContents* web_contents = | 937 content::WebContents* web_contents = |
| 938 browser()->tab_strip_model()->GetActiveWebContents(); | 938 browser()->tab_strip_model()->GetActiveWebContents(); |
| 939 GURL expected("http://search.example/search?q=stuff+to+search+for"); | 939 GURL expected("http://search.example/search?q=stuff+to+search+for"); |
| 940 EXPECT_EQ(expected, web_contents->GetURL()); | 940 EXPECT_EQ(expected, web_contents->GetURL()); |
| 941 | 941 |
| 942 // Verify that searching from the omnibox can be disabled. | 942 // Verify that searching from the omnibox can be disabled. |
| 943 ui_test_utils::NavigateToURL(browser(), GURL(content::kAboutBlankURL)); | 943 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); |
| 944 policies.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, | 944 policies.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, |
| 945 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false), NULL); | 945 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false), NULL); |
| 946 EXPECT_TRUE(service->GetDefaultSearchProvider()); | 946 EXPECT_TRUE(service->GetDefaultSearchProvider()); |
| 947 UpdateProviderPolicy(policies); | 947 UpdateProviderPolicy(policies); |
| 948 EXPECT_FALSE(service->GetDefaultSearchProvider()); | 948 EXPECT_FALSE(service->GetDefaultSearchProvider()); |
| 949 ui_test_utils::SendToOmniboxAndSubmit(location_bar, "should not work"); | 949 ui_test_utils::SendToOmniboxAndSubmit(location_bar, "should not work"); |
| 950 // This means that submitting won't trigger any action. | 950 // This means that submitting won't trigger any action. |
| 951 EXPECT_FALSE(model->CurrentMatch(NULL).destination_url.is_valid()); | 951 EXPECT_FALSE(model->CurrentMatch(NULL).destination_url.is_valid()); |
| 952 EXPECT_EQ(GURL(content::kAboutBlankURL), web_contents->GetURL()); | 952 EXPECT_EQ(GURL(url::kAboutBlankURL), web_contents->GetURL()); |
| 953 } | 953 } |
| 954 | 954 |
| 955 IN_PROC_BROWSER_TEST_F(PolicyTest, PolicyPreprocessing) { | 955 IN_PROC_BROWSER_TEST_F(PolicyTest, PolicyPreprocessing) { |
| 956 // Add an individual proxy policy value. | 956 // Add an individual proxy policy value. |
| 957 PolicyMap policies; | 957 PolicyMap policies; |
| 958 policies.Set(key::kProxyServerMode, | 958 policies.Set(key::kProxyServerMode, |
| 959 POLICY_LEVEL_MANDATORY, | 959 POLICY_LEVEL_MANDATORY, |
| 960 POLICY_SCOPE_USER, | 960 POLICY_SCOPE_USER, |
| 961 base::Value::CreateIntegerValue(3), | 961 base::Value::CreateIntegerValue(3), |
| 962 NULL); | 962 NULL); |
| (...skipping 189 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1152 EXPECT_TRUE( | 1152 EXPECT_TRUE( |
| 1153 browser()->toolbar_model()->WouldPerformSearchTermReplacement(false)); | 1153 browser()->toolbar_model()->WouldPerformSearchTermReplacement(false)); |
| 1154 EXPECT_EQ(base::ASCIIToUTF16("foobar"), omnibox_view->GetText()); | 1154 EXPECT_EQ(base::ASCIIToUTF16("foobar"), omnibox_view->GetText()); |
| 1155 } | 1155 } |
| 1156 | 1156 |
| 1157 IN_PROC_BROWSER_TEST_F(PolicyTest, Disable3DAPIs) { | 1157 IN_PROC_BROWSER_TEST_F(PolicyTest, Disable3DAPIs) { |
| 1158 // This test assumes Gpu access. | 1158 // This test assumes Gpu access. |
| 1159 if (!content::GpuDataManager::GetInstance()->GpuAccessAllowed(NULL)) | 1159 if (!content::GpuDataManager::GetInstance()->GpuAccessAllowed(NULL)) |
| 1160 return; | 1160 return; |
| 1161 | 1161 |
| 1162 ui_test_utils::NavigateToURL(browser(), GURL(content::kAboutBlankURL)); | 1162 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); |
| 1163 // WebGL is enabled by default. | 1163 // WebGL is enabled by default. |
| 1164 content::WebContents* contents = | 1164 content::WebContents* contents = |
| 1165 browser()->tab_strip_model()->GetActiveWebContents(); | 1165 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1166 EXPECT_TRUE(IsWebGLEnabled(contents)); | 1166 EXPECT_TRUE(IsWebGLEnabled(contents)); |
| 1167 // Disable with a policy. | 1167 // Disable with a policy. |
| 1168 PolicyMap policies; | 1168 PolicyMap policies; |
| 1169 policies.Set(key::kDisable3DAPIs, POLICY_LEVEL_MANDATORY, | 1169 policies.Set(key::kDisable3DAPIs, POLICY_LEVEL_MANDATORY, |
| 1170 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 1170 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); |
| 1171 UpdateProviderPolicy(policies); | 1171 UpdateProviderPolicy(policies); |
| 1172 // Crash and reload the tab to get a new renderer. | 1172 // Crash and reload the tab to get a new renderer. |
| (...skipping 571 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1744 // Verifies that the homepage can be configured with policies. | 1744 // Verifies that the homepage can be configured with policies. |
| 1745 // Set a default, and check that the home button navigates there. | 1745 // Set a default, and check that the home button navigates there. |
| 1746 browser()->profile()->GetPrefs()->SetString( | 1746 browser()->profile()->GetPrefs()->SetString( |
| 1747 prefs::kHomePage, chrome::kChromeUIPolicyURL); | 1747 prefs::kHomePage, chrome::kChromeUIPolicyURL); |
| 1748 browser()->profile()->GetPrefs()->SetBoolean( | 1748 browser()->profile()->GetPrefs()->SetBoolean( |
| 1749 prefs::kHomePageIsNewTabPage, false); | 1749 prefs::kHomePageIsNewTabPage, false); |
| 1750 EXPECT_EQ(GURL(chrome::kChromeUIPolicyURL), | 1750 EXPECT_EQ(GURL(chrome::kChromeUIPolicyURL), |
| 1751 browser()->profile()->GetHomePage()); | 1751 browser()->profile()->GetHomePage()); |
| 1752 content::WebContents* contents = | 1752 content::WebContents* contents = |
| 1753 browser()->tab_strip_model()->GetActiveWebContents(); | 1753 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1754 EXPECT_EQ(GURL(content::kAboutBlankURL), contents->GetURL()); | 1754 EXPECT_EQ(GURL(url::kAboutBlankURL), contents->GetURL()); |
| 1755 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_HOME)); | 1755 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_HOME)); |
| 1756 EXPECT_EQ(GURL(chrome::kChromeUIPolicyURL), contents->GetURL()); | 1756 EXPECT_EQ(GURL(chrome::kChromeUIPolicyURL), contents->GetURL()); |
| 1757 | 1757 |
| 1758 // Now override with policy. | 1758 // Now override with policy. |
| 1759 PolicyMap policies; | 1759 PolicyMap policies; |
| 1760 policies.Set(key::kHomepageLocation, POLICY_LEVEL_MANDATORY, | 1760 policies.Set(key::kHomepageLocation, POLICY_LEVEL_MANDATORY, |
| 1761 POLICY_SCOPE_USER, | 1761 POLICY_SCOPE_USER, |
| 1762 base::Value::CreateStringValue(chrome::kChromeUICreditsURL), | 1762 base::Value::CreateStringValue(chrome::kChromeUICreditsURL), |
| 1763 NULL); | 1763 NULL); |
| 1764 UpdateProviderPolicy(policies); | 1764 UpdateProviderPolicy(policies); |
| (...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1809 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS)); | 1809 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS)); |
| 1810 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_CONSOLE)); | 1810 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_CONSOLE)); |
| 1811 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_DEVICES)); | 1811 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_DEVICES)); |
| 1812 | 1812 |
| 1813 // Disable Javascript via policy. | 1813 // Disable Javascript via policy. |
| 1814 PolicyMap policies; | 1814 PolicyMap policies; |
| 1815 policies.Set(key::kJavascriptEnabled, POLICY_LEVEL_MANDATORY, | 1815 policies.Set(key::kJavascriptEnabled, POLICY_LEVEL_MANDATORY, |
| 1816 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false), NULL); | 1816 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false), NULL); |
| 1817 UpdateProviderPolicy(policies); | 1817 UpdateProviderPolicy(policies); |
| 1818 // Reload the page. | 1818 // Reload the page. |
| 1819 ui_test_utils::NavigateToURL(browser(), GURL(content::kAboutBlankURL)); | 1819 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); |
| 1820 EXPECT_FALSE(IsJavascriptEnabled(contents)); | 1820 EXPECT_FALSE(IsJavascriptEnabled(contents)); |
| 1821 // Developer tools still work when javascript is disabled. | 1821 // Developer tools still work when javascript is disabled. |
| 1822 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS)); | 1822 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS)); |
| 1823 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_CONSOLE)); | 1823 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_CONSOLE)); |
| 1824 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_DEVICES)); | 1824 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_DEVICES)); |
| 1825 // Javascript is always enabled for the internal pages. | 1825 // Javascript is always enabled for the internal pages. |
| 1826 ui_test_utils::NavigateToURL(browser(), GURL(chrome::kChromeUIAboutURL)); | 1826 ui_test_utils::NavigateToURL(browser(), GURL(chrome::kChromeUIAboutURL)); |
| 1827 EXPECT_TRUE(IsJavascriptEnabled(contents)); | 1827 EXPECT_TRUE(IsJavascriptEnabled(contents)); |
| 1828 | 1828 |
| 1829 // The javascript content setting policy overrides the javascript policy. | 1829 // The javascript content setting policy overrides the javascript policy. |
| 1830 ui_test_utils::NavigateToURL(browser(), GURL(content::kAboutBlankURL)); | 1830 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); |
| 1831 EXPECT_FALSE(IsJavascriptEnabled(contents)); | 1831 EXPECT_FALSE(IsJavascriptEnabled(contents)); |
| 1832 policies.Set(key::kDefaultJavaScriptSetting, POLICY_LEVEL_MANDATORY, | 1832 policies.Set(key::kDefaultJavaScriptSetting, POLICY_LEVEL_MANDATORY, |
| 1833 POLICY_SCOPE_USER, | 1833 POLICY_SCOPE_USER, |
| 1834 base::Value::CreateIntegerValue(CONTENT_SETTING_ALLOW), NULL); | 1834 base::Value::CreateIntegerValue(CONTENT_SETTING_ALLOW), NULL); |
| 1835 UpdateProviderPolicy(policies); | 1835 UpdateProviderPolicy(policies); |
| 1836 ui_test_utils::NavigateToURL(browser(), GURL(content::kAboutBlankURL)); | 1836 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); |
| 1837 EXPECT_TRUE(IsJavascriptEnabled(contents)); | 1837 EXPECT_TRUE(IsJavascriptEnabled(contents)); |
| 1838 } | 1838 } |
| 1839 | 1839 |
| 1840 IN_PROC_BROWSER_TEST_F(PolicyTest, SavingBrowserHistoryDisabled) { | 1840 IN_PROC_BROWSER_TEST_F(PolicyTest, SavingBrowserHistoryDisabled) { |
| 1841 // Verifies that browsing history is not saved. | 1841 // Verifies that browsing history is not saved. |
| 1842 PolicyMap policies; | 1842 PolicyMap policies; |
| 1843 policies.Set(key::kSavingBrowserHistoryDisabled, POLICY_LEVEL_MANDATORY, | 1843 policies.Set(key::kSavingBrowserHistoryDisabled, POLICY_LEVEL_MANDATORY, |
| 1844 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 1844 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); |
| 1845 UpdateProviderPolicy(policies); | 1845 UpdateProviderPolicy(policies); |
| 1846 GURL url = ui_test_utils::GetTestUrl( | 1846 GURL url = ui_test_utils::GetTestUrl( |
| (...skipping 787 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2634 } | 2634 } |
| 2635 }; | 2635 }; |
| 2636 | 2636 |
| 2637 IN_PROC_BROWSER_TEST_F(PolicyStatisticsCollectorTest, Startup) { | 2637 IN_PROC_BROWSER_TEST_F(PolicyStatisticsCollectorTest, Startup) { |
| 2638 // Verifies that policy usage histograms are collected at startup. | 2638 // Verifies that policy usage histograms are collected at startup. |
| 2639 | 2639 |
| 2640 // BrowserPolicyConnector::Init() has already been called. Make sure the | 2640 // BrowserPolicyConnector::Init() has already been called. Make sure the |
| 2641 // CompleteInitialization() task has executed as well. | 2641 // CompleteInitialization() task has executed as well. |
| 2642 content::RunAllPendingInMessageLoop(); | 2642 content::RunAllPendingInMessageLoop(); |
| 2643 | 2643 |
| 2644 GURL kAboutHistograms = GURL(std::string(content::kAboutScheme) + | 2644 GURL kAboutHistograms = GURL(std::string(url::kAboutScheme) + |
| 2645 std::string(url::kStandardSchemeSeparator) + | 2645 std::string(url::kStandardSchemeSeparator) + |
| 2646 std::string(content::kChromeUIHistogramHost)); | 2646 std::string(content::kChromeUIHistogramHost)); |
| 2647 ui_test_utils::NavigateToURL(browser(), kAboutHistograms); | 2647 ui_test_utils::NavigateToURL(browser(), kAboutHistograms); |
| 2648 content::WebContents* contents = | 2648 content::WebContents* contents = |
| 2649 browser()->tab_strip_model()->GetActiveWebContents(); | 2649 browser()->tab_strip_model()->GetActiveWebContents(); |
| 2650 std::string text; | 2650 std::string text; |
| 2651 ASSERT_TRUE(content::ExecuteScriptAndExtractString( | 2651 ASSERT_TRUE(content::ExecuteScriptAndExtractString( |
| 2652 contents, | 2652 contents, |
| 2653 "var nodes = document.querySelectorAll('body > pre');" | 2653 "var nodes = document.querySelectorAll('body > pre');" |
| 2654 "var result = '';" | 2654 "var result = '';" |
| (...skipping 316 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2971 PrefService* prefs = browser()->profile()->GetPrefs(); | 2971 PrefService* prefs = browser()->profile()->GetPrefs(); |
| 2972 EXPECT_TRUE(extensions::NativeMessageProcessHost::IsHostAllowed( | 2972 EXPECT_TRUE(extensions::NativeMessageProcessHost::IsHostAllowed( |
| 2973 prefs, "host.name")); | 2973 prefs, "host.name")); |
| 2974 EXPECT_FALSE(extensions::NativeMessageProcessHost::IsHostAllowed( | 2974 EXPECT_FALSE(extensions::NativeMessageProcessHost::IsHostAllowed( |
| 2975 prefs, "other.host.name")); | 2975 prefs, "other.host.name")); |
| 2976 } | 2976 } |
| 2977 | 2977 |
| 2978 #endif // !defined(CHROME_OS) | 2978 #endif // !defined(CHROME_OS) |
| 2979 | 2979 |
| 2980 } // namespace policy | 2980 } // namespace policy |
| OLD | NEW |