| Index: chrome/browser/policy/policy_browsertest.cc
|
| diff --git a/chrome/browser/policy/policy_browsertest.cc b/chrome/browser/policy/policy_browsertest.cc
|
| index f1471600aa010ff7a25397186f500e332611ff4b..637dd68191e9429cb1abfa65f864f55ca777d8f7 100644
|
| --- a/chrome/browser/policy/policy_browsertest.cc
|
| +++ b/chrome/browser/policy/policy_browsertest.cc
|
| @@ -751,9 +751,11 @@ class LocalePolicyTest : public PolicyTest {
|
| virtual void SetUpInProcessBrowserTestFixture() OVERRIDE {
|
| PolicyTest::SetUpInProcessBrowserTestFixture();
|
| PolicyMap policies;
|
| - policies.Set(
|
| - key::kApplicationLocaleValue, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue("fr"), NULL);
|
| + policies.Set(key::kApplicationLocaleValue,
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue("fr"),
|
| + NULL);
|
| provider_.UpdateChromePolicy(policies);
|
| // The "en-US" ResourceBundle is always loaded before this step for tests,
|
| // but in this test we want the browser to load the bundle as it
|
| @@ -891,31 +893,39 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DefaultSearchProvider) {
|
| policies.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL);
|
| policies.Set(key::kDefaultSearchProviderKeyword,
|
| - POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue(kKeyword), NULL);
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue(kKeyword),
|
| + NULL);
|
| policies.Set(key::kDefaultSearchProviderSearchURL,
|
| - POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue(kSearchURL), NULL);
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue(kSearchURL),
|
| + NULL);
|
| base::ListValue* alternate_urls = new base::ListValue();
|
| alternate_urls->AppendString(kAlternateURL0);
|
| alternate_urls->AppendString(kAlternateURL1);
|
| policies.Set(key::kDefaultSearchProviderAlternateURLs, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, alternate_urls, NULL);
|
| policies.Set(key::kDefaultSearchProviderSearchTermsReplacementKey,
|
| - POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue(kSearchTermsReplacementKey),
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue(kSearchTermsReplacementKey),
|
| NULL);
|
| policies.Set(key::kDefaultSearchProviderImageURL,
|
| - POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue(kImageURL),
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue(kImageURL),
|
| NULL);
|
| policies.Set(key::kDefaultSearchProviderImageURLPostParams,
|
| - POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue(kImageURLPostParams),
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue(kImageURLPostParams),
|
| NULL);
|
| policies.Set(key::kDefaultSearchProviderNewTabURL,
|
| - POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue(kNewTabURL),
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue(kNewTabURL),
|
| NULL);
|
| UpdateProviderPolicy(policies);
|
| default_search = service->GetDefaultSearchProvider();
|
| @@ -1076,22 +1086,29 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, ReplaceSearchTerms) {
|
| policies.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL);
|
| policies.Set(key::kDefaultSearchProviderKeyword,
|
| - POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue(kKeyword), NULL);
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue(kKeyword),
|
| + NULL);
|
| policies.Set(key::kDefaultSearchProviderSearchURL,
|
| - POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue(kSearchURL), NULL);
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue(kSearchURL),
|
| + NULL);
|
| policies.Set(key::kDefaultSearchProviderInstantURL,
|
| - POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue(kInstantURL), NULL);
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue(kInstantURL),
|
| + NULL);
|
| base::ListValue* alternate_urls = new base::ListValue();
|
| alternate_urls->AppendString(kAlternateURL0);
|
| alternate_urls->AppendString(kAlternateURL1);
|
| policies.Set(key::kDefaultSearchProviderAlternateURLs, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, alternate_urls, NULL);
|
| policies.Set(key::kDefaultSearchProviderSearchTermsReplacementKey,
|
| - POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue(kSearchTermsReplacementKey),
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue(kSearchTermsReplacementKey),
|
| NULL);
|
| UpdateProviderPolicy(policies);
|
| default_search = service->GetDefaultSearchProvider();
|
| @@ -1223,7 +1240,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DisabledPlugins) {
|
|
|
| // Now disable it with a policy.
|
| base::ListValue disabled_plugins;
|
| - disabled_plugins.Append(base::Value::CreateStringValue("*Flash*"));
|
| + disabled_plugins.Append(new base::StringValue("*Flash*"));
|
| PolicyMap policies;
|
| policies.Set(key::kDisabledPlugins, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, disabled_plugins.DeepCopy(), NULL);
|
| @@ -1250,7 +1267,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DisabledPluginsExceptions) {
|
|
|
| // Disable all plugins.
|
| base::ListValue disabled_plugins;
|
| - disabled_plugins.Append(base::Value::CreateStringValue("*"));
|
| + disabled_plugins.Append(new base::StringValue("*"));
|
| PolicyMap policies;
|
| policies.Set(key::kDisabledPlugins, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, disabled_plugins.DeepCopy(), NULL);
|
| @@ -1262,8 +1279,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DisabledPluginsExceptions) {
|
|
|
| // Now open an exception for flash.
|
| base::ListValue disabled_plugins_exceptions;
|
| - disabled_plugins_exceptions.Append(
|
| - base::Value::CreateStringValue("*Flash*"));
|
| + disabled_plugins_exceptions.Append(new base::StringValue("*Flash*"));
|
| policies.Set(key::kDisabledPluginsExceptions, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, disabled_plugins_exceptions.DeepCopy(), NULL);
|
| UpdateProviderPolicy(policies);
|
| @@ -1291,7 +1307,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, EnabledPlugins) {
|
| EXPECT_TRUE(SetPluginEnabled(plugin_prefs, flash, false));
|
| EXPECT_FALSE(plugin_prefs->IsPluginEnabled(*flash));
|
| base::ListValue plugin_list;
|
| - plugin_list.Append(base::Value::CreateStringValue(content::kFlashPluginName));
|
| + plugin_list.Append(new base::StringValue(content::kFlashPluginName));
|
| PolicyMap policies;
|
| policies.Set(key::kEnabledPlugins, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, plugin_list.DeepCopy(), NULL);
|
| @@ -1443,9 +1459,11 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DownloadDirectory) {
|
| base::ScopedTempDir forced_dir;
|
| ASSERT_TRUE(forced_dir.CreateUniqueTempDir());
|
| PolicyMap policies;
|
| - policies.Set(key::kDownloadDirectory, POLICY_LEVEL_MANDATORY,
|
| + policies.Set(key::kDownloadDirectory,
|
| + POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue(forced_dir.path().value()), NULL);
|
| + new base::StringValue(forced_dir.path().value()),
|
| + NULL);
|
| UpdateProviderPolicy(policies);
|
| DownloadAndVerifyFile(browser(), forced_dir.path(), file);
|
| // Verify that the first download location wasn't affected.
|
| @@ -1460,7 +1478,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest,
|
| ASSERT_FALSE(service->GetExtensionById(kGoodCrxId, true));
|
| ASSERT_FALSE(service->GetExtensionById(kAdBlockCrxId, true));
|
| base::ListValue blacklist;
|
| - blacklist.Append(base::Value::CreateStringValue(kGoodCrxId));
|
| + blacklist.Append(new base::StringValue(kGoodCrxId));
|
| PolicyMap policies;
|
| policies.Set(key::kExtensionInstallBlacklist, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, blacklist.DeepCopy(), NULL);
|
| @@ -1491,7 +1509,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_ExtensionInstallBlacklistWildcard) {
|
| ASSERT_FALSE(service->GetExtensionById(kGoodCrxId, true));
|
| ASSERT_TRUE(service->GetExtensionById(kAdBlockCrxId, true));
|
| base::ListValue blacklist;
|
| - blacklist.Append(base::Value::CreateStringValue("*"));
|
| + blacklist.Append(new base::StringValue("*"));
|
| PolicyMap policies;
|
| policies.Set(key::kExtensionInstallBlacklist, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, blacklist.DeepCopy(), NULL);
|
| @@ -1513,9 +1531,9 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, ExtensionInstallWhitelist) {
|
| ASSERT_FALSE(service->GetExtensionById(kGoodCrxId, true));
|
| ASSERT_FALSE(service->GetExtensionById(kAdBlockCrxId, true));
|
| base::ListValue blacklist;
|
| - blacklist.Append(base::Value::CreateStringValue("*"));
|
| + blacklist.Append(new base::StringValue("*"));
|
| base::ListValue whitelist;
|
| - whitelist.Append(base::Value::CreateStringValue(kGoodCrxId));
|
| + whitelist.Append(new base::StringValue(kGoodCrxId));
|
| PolicyMap policies;
|
| policies.Set(key::kExtensionInstallBlacklist, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, blacklist.DeepCopy(), NULL);
|
| @@ -1549,8 +1567,8 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, ExtensionInstallForcelist) {
|
|
|
| // Setting the forcelist extension should install "good_v1.crx".
|
| base::ListValue forcelist;
|
| - forcelist.Append(base::Value::CreateStringValue(base::StringPrintf(
|
| - "%s;%s", kGoodCrxId, url.spec().c_str())));
|
| + forcelist.Append(new base::StringValue(
|
| + base::StringPrintf("%s;%s", kGoodCrxId, url.spec().c_str())));
|
| PolicyMap policies;
|
| policies.Set(key::kExtensionInstallForcelist, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, forcelist.DeepCopy(), NULL);
|
| @@ -1759,9 +1777,10 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, HomepageLocation) {
|
|
|
| // Now override with policy.
|
| PolicyMap policies;
|
| - policies.Set(key::kHomepageLocation, POLICY_LEVEL_MANDATORY,
|
| + policies.Set(key::kHomepageLocation,
|
| + POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue(chrome::kChromeUICreditsURL),
|
| + new base::StringValue(chrome::kChromeUICreditsURL),
|
| NULL);
|
| UpdateProviderPolicy(policies);
|
| EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_HOME));
|
| @@ -1965,7 +1984,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklist) {
|
|
|
| // Set a blacklist.
|
| base::ListValue blacklist;
|
| - blacklist.Append(base::Value::CreateStringValue("bbb.com"));
|
| + blacklist.Append(new base::StringValue("bbb.com"));
|
| PolicyMap policies;
|
| policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, blacklist.DeepCopy(), NULL);
|
| @@ -1978,8 +1997,8 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklist) {
|
|
|
| // Whitelist some sites of bbb.com.
|
| base::ListValue whitelist;
|
| - whitelist.Append(base::Value::CreateStringValue("sub.bbb.com"));
|
| - whitelist.Append(base::Value::CreateStringValue("bbb.com/policy"));
|
| + whitelist.Append(new base::StringValue("sub.bbb.com"));
|
| + whitelist.Append(new base::StringValue("bbb.com/policy"));
|
| policies.Set(key::kURLWhitelist, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, whitelist.DeepCopy(), NULL);
|
| UpdateProviderPolicy(policies);
|
| @@ -2015,7 +2034,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DISABLED_FileURLBlacklist) {
|
|
|
| // Set a blacklist for all the files.
|
| base::ListValue blacklist;
|
| - blacklist.Append(base::Value::CreateStringValue("file://*"));
|
| + blacklist.Append(new base::StringValue("file://*"));
|
| PolicyMap policies;
|
| policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, blacklist.DeepCopy(), NULL);
|
| @@ -2038,7 +2057,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DISABLED_FileURLBlacklist) {
|
| list_url->end());
|
|
|
| base::ListValue disabledscheme;
|
| - disabledscheme.Append(base::Value::CreateStringValue("file"));
|
| + disabledscheme.Append(new base::StringValue("file"));
|
| policies.Set(key::kDisabledSchemes, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, disabledscheme.DeepCopy(), NULL);
|
| UpdateProviderPolicy(policies);
|
| @@ -2050,10 +2069,10 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, DISABLED_FileURLBlacklist) {
|
|
|
| // Whitelist one folder and blacklist an another just inside.
|
| base::ListValue whitelist;
|
| - whitelist.Append(base::Value::CreateStringValue(base_path));
|
| + whitelist.Append(new base::StringValue(base_path));
|
| policies.Set(key::kURLWhitelist, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, whitelist.DeepCopy(), NULL);
|
| - blacklist.Append(base::Value::CreateStringValue(folder_path));
|
| + blacklist.Append(new base::StringValue(folder_path));
|
| policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, blacklist.DeepCopy(), NULL);
|
| UpdateProviderPolicy(policies);
|
| @@ -2543,9 +2562,11 @@ class RestoreOnStartupPolicyTest
|
| policies.Set(
|
| key::kHomepageIsNewTabPage, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| base::Value::CreateBooleanValue(false), NULL);
|
| - policies.Set(
|
| - key::kHomepageLocation, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue(kRestoredURLs[1]), NULL);
|
| + policies.Set(key::kHomepageLocation,
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue(kRestoredURLs[1]),
|
| + NULL);
|
| provider_.UpdateChromePolicy(policies);
|
|
|
| expected_urls_.push_back(GURL(kRestoredURLs[1]));
|
| @@ -2572,7 +2593,7 @@ class RestoreOnStartupPolicyTest
|
| // Verifies that policy can set the startup pages to a list of URLs.
|
| base::ListValue urls;
|
| for (size_t i = 0; i < arraysize(kRestoredURLs); ++i) {
|
| - urls.Append(base::Value::CreateStringValue(kRestoredURLs[i]));
|
| + urls.Append(new base::StringValue(kRestoredURLs[i]));
|
| expected_urls_.push_back(GURL(kRestoredURLs[i]));
|
| }
|
| PolicyMap policies;
|
| @@ -2668,9 +2689,11 @@ class PolicyStatisticsCollectorTest : public PolicyTest {
|
| policies.Set(
|
| key::kBookmarkBarEnabled, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| base::Value::CreateBooleanValue(false), NULL);
|
| - policies.Set(
|
| - key::kHomepageLocation, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue("http://chromium.org"), NULL);
|
| + policies.Set(key::kHomepageLocation,
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue("http://chromium.org"),
|
| + NULL);
|
| provider_.UpdateChromePolicy(policies);
|
| }
|
| };
|
| @@ -2943,12 +2966,11 @@ class PolicyVariationsServiceTest : public PolicyTest {
|
| virtual void SetUpInProcessBrowserTestFixture() OVERRIDE {
|
| PolicyTest::SetUpInProcessBrowserTestFixture();
|
| PolicyMap policies;
|
| - policies.Set(
|
| - key::kVariationsRestrictParameter,
|
| - POLICY_LEVEL_MANDATORY,
|
| - POLICY_SCOPE_USER,
|
| - base::Value::CreateStringValue("restricted"),
|
| - NULL);
|
| + policies.Set(key::kVariationsRestrictParameter,
|
| + POLICY_LEVEL_MANDATORY,
|
| + POLICY_SCOPE_USER,
|
| + new base::StringValue("restricted"),
|
| + NULL);
|
| provider_.UpdateChromePolicy(policies);
|
| }
|
| };
|
| @@ -2969,7 +2991,7 @@ IN_PROC_BROWSER_TEST_F(PolicyVariationsServiceTest, VariationsURLIsValid) {
|
|
|
| IN_PROC_BROWSER_TEST_F(PolicyTest, NativeMessagingBlacklistSelective) {
|
| base::ListValue blacklist;
|
| - blacklist.Append(base::Value::CreateStringValue("host.name"));
|
| + blacklist.Append(new base::StringValue("host.name"));
|
| PolicyMap policies;
|
| policies.Set(key::kNativeMessagingBlacklist, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, blacklist.DeepCopy(), NULL);
|
| @@ -2984,7 +3006,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, NativeMessagingBlacklistSelective) {
|
|
|
| IN_PROC_BROWSER_TEST_F(PolicyTest, NativeMessagingBlacklistWildcard) {
|
| base::ListValue blacklist;
|
| - blacklist.Append(base::Value::CreateStringValue("*"));
|
| + blacklist.Append(new base::StringValue("*"));
|
| PolicyMap policies;
|
| policies.Set(key::kNativeMessagingBlacklist, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, blacklist.DeepCopy(), NULL);
|
| @@ -2999,9 +3021,9 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, NativeMessagingBlacklistWildcard) {
|
|
|
| IN_PROC_BROWSER_TEST_F(PolicyTest, NativeMessagingWhitelist) {
|
| base::ListValue blacklist;
|
| - blacklist.Append(base::Value::CreateStringValue("*"));
|
| + blacklist.Append(new base::StringValue("*"));
|
| base::ListValue whitelist;
|
| - whitelist.Append(base::Value::CreateStringValue("host.name"));
|
| + whitelist.Append(new base::StringValue("host.name"));
|
| PolicyMap policies;
|
| policies.Set(key::kNativeMessagingBlacklist, POLICY_LEVEL_MANDATORY,
|
| POLICY_SCOPE_USER, blacklist.DeepCopy(), NULL);
|
|
|