| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <algorithm> | 5 #include <algorithm> |
| 6 #include <string> | 6 #include <string> |
| 7 #include <vector> | 7 #include <vector> |
| 8 | 8 |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/bind_helpers.h" | 10 #include "base/bind_helpers.h" |
| (...skipping 596 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 607 BrowserThread::PostTaskAndReply( | 607 BrowserThread::PostTaskAndReply( |
| 608 BrowserThread::IO, FROM_HERE, | 608 BrowserThread::IO, FROM_HERE, |
| 609 base::Bind(URLRequestMockHTTPJob::AddUrlHandler, root_http), | 609 base::Bind(URLRequestMockHTTPJob::AddUrlHandler, root_http), |
| 610 base::MessageLoop::current()->QuitWhenIdleClosure()); | 610 base::MessageLoop::current()->QuitWhenIdleClosure()); |
| 611 content::RunMessageLoop(); | 611 content::RunMessageLoop(); |
| 612 } | 612 } |
| 613 | 613 |
| 614 void SetScreenshotPolicy(bool enabled) { | 614 void SetScreenshotPolicy(bool enabled) { |
| 615 PolicyMap policies; | 615 PolicyMap policies; |
| 616 policies.Set(key::kDisableScreenshots, | 616 policies.Set(key::kDisableScreenshots, |
| 617 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 617 POLICY_LEVEL_MANDATORY, |
| 618 base::Value::CreateBooleanValue(!enabled), NULL); | 618 POLICY_SCOPE_USER, |
| 619 new base::FundamentalValue(!enabled), |
| 620 NULL); |
| 619 UpdateProviderPolicy(policies); | 621 UpdateProviderPolicy(policies); |
| 620 } | 622 } |
| 621 | 623 |
| 622 #if defined(OS_CHROMEOS) | 624 #if defined(OS_CHROMEOS) |
| 623 class QuitMessageLoopAfterScreenshot : public ScreenshotTakerObserver { | 625 class QuitMessageLoopAfterScreenshot : public ScreenshotTakerObserver { |
| 624 public: | 626 public: |
| 625 virtual void OnScreenshotCompleted( | 627 virtual void OnScreenshotCompleted( |
| 626 ScreenshotTakerObserver::Result screenshot_result, | 628 ScreenshotTakerObserver::Result screenshot_result, |
| 627 const base::FilePath& screenshot_path) OVERRIDE { | 629 const base::FilePath& screenshot_path) OVERRIDE { |
| 628 BrowserThread::PostTaskAndReply(BrowserThread::IO, | 630 BrowserThread::PostTaskAndReply(BrowserThread::IO, |
| (...skipping 160 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 789 | 791 |
| 790 // Verifies that the bookmarks bar can be forced to always or never show up. | 792 // Verifies that the bookmarks bar can be forced to always or never show up. |
| 791 | 793 |
| 792 // Test starts in about:blank. | 794 // Test starts in about:blank. |
| 793 PrefService* prefs = browser()->profile()->GetPrefs(); | 795 PrefService* prefs = browser()->profile()->GetPrefs(); |
| 794 EXPECT_FALSE(prefs->IsManagedPreference(prefs::kShowBookmarkBar)); | 796 EXPECT_FALSE(prefs->IsManagedPreference(prefs::kShowBookmarkBar)); |
| 795 EXPECT_FALSE(prefs->GetBoolean(prefs::kShowBookmarkBar)); | 797 EXPECT_FALSE(prefs->GetBoolean(prefs::kShowBookmarkBar)); |
| 796 EXPECT_EQ(BookmarkBar::HIDDEN, browser()->bookmark_bar_state()); | 798 EXPECT_EQ(BookmarkBar::HIDDEN, browser()->bookmark_bar_state()); |
| 797 | 799 |
| 798 PolicyMap policies; | 800 PolicyMap policies; |
| 799 policies.Set(key::kBookmarkBarEnabled, POLICY_LEVEL_MANDATORY, | 801 policies.Set(key::kBookmarkBarEnabled, |
| 800 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 802 POLICY_LEVEL_MANDATORY, |
| 803 POLICY_SCOPE_USER, |
| 804 new base::FundamentalValue(true), |
| 805 NULL); |
| 801 UpdateProviderPolicy(policies); | 806 UpdateProviderPolicy(policies); |
| 802 EXPECT_TRUE(prefs->IsManagedPreference(prefs::kShowBookmarkBar)); | 807 EXPECT_TRUE(prefs->IsManagedPreference(prefs::kShowBookmarkBar)); |
| 803 EXPECT_TRUE(prefs->GetBoolean(prefs::kShowBookmarkBar)); | 808 EXPECT_TRUE(prefs->GetBoolean(prefs::kShowBookmarkBar)); |
| 804 EXPECT_EQ(BookmarkBar::SHOW, browser()->bookmark_bar_state()); | 809 EXPECT_EQ(BookmarkBar::SHOW, browser()->bookmark_bar_state()); |
| 805 | 810 |
| 806 // The NTP has special handling of the bookmark bar. | 811 // The NTP has special handling of the bookmark bar. |
| 807 ui_test_utils::NavigateToURL(browser(), GURL(chrome::kChromeUINewTabURL)); | 812 ui_test_utils::NavigateToURL(browser(), GURL(chrome::kChromeUINewTabURL)); |
| 808 EXPECT_EQ(BookmarkBar::SHOW, browser()->bookmark_bar_state()); | 813 EXPECT_EQ(BookmarkBar::SHOW, browser()->bookmark_bar_state()); |
| 809 | 814 |
| 810 policies.Set(key::kBookmarkBarEnabled, POLICY_LEVEL_MANDATORY, | 815 policies.Set(key::kBookmarkBarEnabled, |
| 811 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false), NULL); | 816 POLICY_LEVEL_MANDATORY, |
| 817 POLICY_SCOPE_USER, |
| 818 new base::FundamentalValue(false), |
| 819 NULL); |
| 812 UpdateProviderPolicy(policies); | 820 UpdateProviderPolicy(policies); |
| 813 EXPECT_TRUE(prefs->IsManagedPreference(prefs::kShowBookmarkBar)); | 821 EXPECT_TRUE(prefs->IsManagedPreference(prefs::kShowBookmarkBar)); |
| 814 EXPECT_FALSE(prefs->GetBoolean(prefs::kShowBookmarkBar)); | 822 EXPECT_FALSE(prefs->GetBoolean(prefs::kShowBookmarkBar)); |
| 815 // The bookmark bar is hidden in the NTP when disabled by policy. | 823 // The bookmark bar is hidden in the NTP when disabled by policy. |
| 816 EXPECT_EQ(BookmarkBar::HIDDEN, browser()->bookmark_bar_state()); | 824 EXPECT_EQ(BookmarkBar::HIDDEN, browser()->bookmark_bar_state()); |
| 817 | 825 |
| 818 policies.Clear(); | 826 policies.Clear(); |
| 819 UpdateProviderPolicy(policies); | 827 UpdateProviderPolicy(policies); |
| 820 EXPECT_FALSE(prefs->IsManagedPreference(prefs::kShowBookmarkBar)); | 828 EXPECT_FALSE(prefs->IsManagedPreference(prefs::kShowBookmarkBar)); |
| 821 EXPECT_FALSE(prefs->GetBoolean(prefs::kShowBookmarkBar)); | 829 EXPECT_FALSE(prefs->GetBoolean(prefs::kShowBookmarkBar)); |
| (...skipping 59 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 881 default_search->alternate_urls()[0] == kAlternateURL0 && | 889 default_search->alternate_urls()[0] == kAlternateURL0 && |
| 882 default_search->alternate_urls()[1] == kAlternateURL1 && | 890 default_search->alternate_urls()[1] == kAlternateURL1 && |
| 883 default_search->search_terms_replacement_key() == | 891 default_search->search_terms_replacement_key() == |
| 884 kSearchTermsReplacementKey && | 892 kSearchTermsReplacementKey && |
| 885 default_search->image_url() == kImageURL && | 893 default_search->image_url() == kImageURL && |
| 886 default_search->image_url_post_params() == kImageURLPostParams && | 894 default_search->image_url_post_params() == kImageURLPostParams && |
| 887 default_search->new_tab_url() == kNewTabURL); | 895 default_search->new_tab_url() == kNewTabURL); |
| 888 | 896 |
| 889 // Override the default search provider using policies. | 897 // Override the default search provider using policies. |
| 890 PolicyMap policies; | 898 PolicyMap policies; |
| 891 policies.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, | 899 policies.Set(key::kDefaultSearchProviderEnabled, |
| 892 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 900 POLICY_LEVEL_MANDATORY, |
| 901 POLICY_SCOPE_USER, |
| 902 new base::FundamentalValue(true), |
| 903 NULL); |
| 893 policies.Set(key::kDefaultSearchProviderKeyword, | 904 policies.Set(key::kDefaultSearchProviderKeyword, |
| 894 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 905 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
| 895 base::Value::CreateStringValue(kKeyword), NULL); | 906 base::Value::CreateStringValue(kKeyword), NULL); |
| 896 policies.Set(key::kDefaultSearchProviderSearchURL, | 907 policies.Set(key::kDefaultSearchProviderSearchURL, |
| 897 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 908 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
| 898 base::Value::CreateStringValue(kSearchURL), NULL); | 909 base::Value::CreateStringValue(kSearchURL), NULL); |
| 899 base::ListValue* alternate_urls = new base::ListValue(); | 910 base::ListValue* alternate_urls = new base::ListValue(); |
| 900 alternate_urls->AppendString(kAlternateURL0); | 911 alternate_urls->AppendString(kAlternateURL0); |
| 901 alternate_urls->AppendString(kAlternateURL1); | 912 alternate_urls->AppendString(kAlternateURL1); |
| 902 policies.Set(key::kDefaultSearchProviderAlternateURLs, POLICY_LEVEL_MANDATORY, | 913 policies.Set(key::kDefaultSearchProviderAlternateURLs, POLICY_LEVEL_MANDATORY, |
| (...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 937 ui_test_utils::SendToOmniboxAndSubmit(location_bar, "stuff to search for"); | 948 ui_test_utils::SendToOmniboxAndSubmit(location_bar, "stuff to search for"); |
| 938 OmniboxEditModel* model = location_bar->GetOmniboxView()->model(); | 949 OmniboxEditModel* model = location_bar->GetOmniboxView()->model(); |
| 939 EXPECT_TRUE(model->CurrentMatch(NULL).destination_url.is_valid()); | 950 EXPECT_TRUE(model->CurrentMatch(NULL).destination_url.is_valid()); |
| 940 content::WebContents* web_contents = | 951 content::WebContents* web_contents = |
| 941 browser()->tab_strip_model()->GetActiveWebContents(); | 952 browser()->tab_strip_model()->GetActiveWebContents(); |
| 942 GURL expected("http://search.example/search?q=stuff+to+search+for"); | 953 GURL expected("http://search.example/search?q=stuff+to+search+for"); |
| 943 EXPECT_EQ(expected, web_contents->GetURL()); | 954 EXPECT_EQ(expected, web_contents->GetURL()); |
| 944 | 955 |
| 945 // Verify that searching from the omnibox can be disabled. | 956 // Verify that searching from the omnibox can be disabled. |
| 946 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); | 957 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); |
| 947 policies.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, | 958 policies.Set(key::kDefaultSearchProviderEnabled, |
| 948 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false), NULL); | 959 POLICY_LEVEL_MANDATORY, |
| 960 POLICY_SCOPE_USER, |
| 961 new base::FundamentalValue(false), |
| 962 NULL); |
| 949 EXPECT_TRUE(service->GetDefaultSearchProvider()); | 963 EXPECT_TRUE(service->GetDefaultSearchProvider()); |
| 950 UpdateProviderPolicy(policies); | 964 UpdateProviderPolicy(policies); |
| 951 EXPECT_FALSE(service->GetDefaultSearchProvider()); | 965 EXPECT_FALSE(service->GetDefaultSearchProvider()); |
| 952 ui_test_utils::SendToOmniboxAndSubmit(location_bar, "should not work"); | 966 ui_test_utils::SendToOmniboxAndSubmit(location_bar, "should not work"); |
| 953 // This means that submitting won't trigger any action. | 967 // This means that submitting won't trigger any action. |
| 954 EXPECT_FALSE(model->CurrentMatch(NULL).destination_url.is_valid()); | 968 EXPECT_FALSE(model->CurrentMatch(NULL).destination_url.is_valid()); |
| 955 EXPECT_EQ(GURL(url::kAboutBlankURL), web_contents->GetURL()); | 969 EXPECT_EQ(GURL(url::kAboutBlankURL), web_contents->GetURL()); |
| 956 } | 970 } |
| 957 | 971 |
| 958 IN_PROC_BROWSER_TEST_F(PolicyTest, PolicyPreprocessing) { | 972 IN_PROC_BROWSER_TEST_F(PolicyTest, PolicyPreprocessing) { |
| (...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1012 browser()->tab_strip_model()->GetActiveWebContents(); | 1026 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1013 GURL expected_without("http://google.com/"); | 1027 GURL expected_without("http://google.com/"); |
| 1014 EXPECT_EQ(expected_without, web_contents->GetURL()); | 1028 EXPECT_EQ(expected_without, web_contents->GetURL()); |
| 1015 | 1029 |
| 1016 PrefService* prefs = browser()->profile()->GetPrefs(); | 1030 PrefService* prefs = browser()->profile()->GetPrefs(); |
| 1017 EXPECT_FALSE(prefs->IsManagedPreference(prefs::kForceSafeSearch)); | 1031 EXPECT_FALSE(prefs->IsManagedPreference(prefs::kForceSafeSearch)); |
| 1018 EXPECT_FALSE(prefs->GetBoolean(prefs::kForceSafeSearch)); | 1032 EXPECT_FALSE(prefs->GetBoolean(prefs::kForceSafeSearch)); |
| 1019 | 1033 |
| 1020 // Override the default SafeSearch setting using policies. | 1034 // Override the default SafeSearch setting using policies. |
| 1021 PolicyMap policies; | 1035 PolicyMap policies; |
| 1022 policies.Set(key::kForceSafeSearch, POLICY_LEVEL_MANDATORY, | 1036 policies.Set(key::kForceSafeSearch, |
| 1023 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 1037 POLICY_LEVEL_MANDATORY, |
| 1038 POLICY_SCOPE_USER, |
| 1039 new base::FundamentalValue(true), |
| 1040 NULL); |
| 1024 UpdateProviderPolicy(policies); | 1041 UpdateProviderPolicy(policies); |
| 1025 | 1042 |
| 1026 EXPECT_TRUE(prefs->IsManagedPreference(prefs::kForceSafeSearch)); | 1043 EXPECT_TRUE(prefs->IsManagedPreference(prefs::kForceSafeSearch)); |
| 1027 EXPECT_TRUE(prefs->GetBoolean(prefs::kForceSafeSearch)); | 1044 EXPECT_TRUE(prefs->GetBoolean(prefs::kForceSafeSearch)); |
| 1028 | 1045 |
| 1029 content::TestNavigationObserver safesearch_observer( | 1046 content::TestNavigationObserver safesearch_observer( |
| 1030 browser()->tab_strip_model()->GetActiveWebContents()); | 1047 browser()->tab_strip_model()->GetActiveWebContents()); |
| 1031 | 1048 |
| 1032 // Verify that searching from google.com works. | 1049 // Verify that searching from google.com works. |
| 1033 chrome::FocusLocationBar(browser()); | 1050 chrome::FocusLocationBar(browser()); |
| (...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1066 EXPECT_NE(kKeyword, default_search->keyword()); | 1083 EXPECT_NE(kKeyword, default_search->keyword()); |
| 1067 EXPECT_NE(kSearchURL, default_search->url()); | 1084 EXPECT_NE(kSearchURL, default_search->url()); |
| 1068 EXPECT_NE(kInstantURL, default_search->instant_url()); | 1085 EXPECT_NE(kInstantURL, default_search->instant_url()); |
| 1069 EXPECT_FALSE( | 1086 EXPECT_FALSE( |
| 1070 default_search->alternate_urls().size() == 2 && | 1087 default_search->alternate_urls().size() == 2 && |
| 1071 default_search->alternate_urls()[0] == kAlternateURL0 && | 1088 default_search->alternate_urls()[0] == kAlternateURL0 && |
| 1072 default_search->alternate_urls()[1] == kAlternateURL1); | 1089 default_search->alternate_urls()[1] == kAlternateURL1); |
| 1073 | 1090 |
| 1074 // Override the default search provider using policies. | 1091 // Override the default search provider using policies. |
| 1075 PolicyMap policies; | 1092 PolicyMap policies; |
| 1076 policies.Set(key::kDefaultSearchProviderEnabled, POLICY_LEVEL_MANDATORY, | 1093 policies.Set(key::kDefaultSearchProviderEnabled, |
| 1077 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 1094 POLICY_LEVEL_MANDATORY, |
| 1095 POLICY_SCOPE_USER, |
| 1096 new base::FundamentalValue(true), |
| 1097 NULL); |
| 1078 policies.Set(key::kDefaultSearchProviderKeyword, | 1098 policies.Set(key::kDefaultSearchProviderKeyword, |
| 1079 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 1099 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
| 1080 base::Value::CreateStringValue(kKeyword), NULL); | 1100 base::Value::CreateStringValue(kKeyword), NULL); |
| 1081 policies.Set(key::kDefaultSearchProviderSearchURL, | 1101 policies.Set(key::kDefaultSearchProviderSearchURL, |
| 1082 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 1102 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
| 1083 base::Value::CreateStringValue(kSearchURL), NULL); | 1103 base::Value::CreateStringValue(kSearchURL), NULL); |
| 1084 policies.Set(key::kDefaultSearchProviderInstantURL, | 1104 policies.Set(key::kDefaultSearchProviderInstantURL, |
| 1085 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 1105 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
| 1086 base::Value::CreateStringValue(kInstantURL), NULL); | 1106 base::Value::CreateStringValue(kInstantURL), NULL); |
| 1087 base::ListValue* alternate_urls = new base::ListValue(); | 1107 base::ListValue* alternate_urls = new base::ListValue(); |
| (...skipping 74 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1162 if (!content::GpuDataManager::GetInstance()->GpuAccessAllowed(NULL)) | 1182 if (!content::GpuDataManager::GetInstance()->GpuAccessAllowed(NULL)) |
| 1163 return; | 1183 return; |
| 1164 | 1184 |
| 1165 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); | 1185 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); |
| 1166 // WebGL is enabled by default. | 1186 // WebGL is enabled by default. |
| 1167 content::WebContents* contents = | 1187 content::WebContents* contents = |
| 1168 browser()->tab_strip_model()->GetActiveWebContents(); | 1188 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1169 EXPECT_TRUE(IsWebGLEnabled(contents)); | 1189 EXPECT_TRUE(IsWebGLEnabled(contents)); |
| 1170 // Disable with a policy. | 1190 // Disable with a policy. |
| 1171 PolicyMap policies; | 1191 PolicyMap policies; |
| 1172 policies.Set(key::kDisable3DAPIs, POLICY_LEVEL_MANDATORY, | 1192 policies.Set(key::kDisable3DAPIs, |
| 1173 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 1193 POLICY_LEVEL_MANDATORY, |
| 1194 POLICY_SCOPE_USER, |
| 1195 new base::FundamentalValue(true), |
| 1196 NULL); |
| 1174 UpdateProviderPolicy(policies); | 1197 UpdateProviderPolicy(policies); |
| 1175 // Crash and reload the tab to get a new renderer. | 1198 // Crash and reload the tab to get a new renderer. |
| 1176 content::CrashTab(contents); | 1199 content::CrashTab(contents); |
| 1177 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_RELOAD)); | 1200 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_RELOAD)); |
| 1178 EXPECT_FALSE(IsWebGLEnabled(contents)); | 1201 EXPECT_FALSE(IsWebGLEnabled(contents)); |
| 1179 // Enable with a policy. | 1202 // Enable with a policy. |
| 1180 policies.Set(key::kDisable3DAPIs, POLICY_LEVEL_MANDATORY, | 1203 policies.Set(key::kDisable3DAPIs, |
| 1181 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false), NULL); | 1204 POLICY_LEVEL_MANDATORY, |
| 1205 POLICY_SCOPE_USER, |
| 1206 new base::FundamentalValue(false), |
| 1207 NULL); |
| 1182 UpdateProviderPolicy(policies); | 1208 UpdateProviderPolicy(policies); |
| 1183 content::CrashTab(contents); | 1209 content::CrashTab(contents); |
| 1184 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_RELOAD)); | 1210 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_RELOAD)); |
| 1185 EXPECT_TRUE(IsWebGLEnabled(contents)); | 1211 EXPECT_TRUE(IsWebGLEnabled(contents)); |
| 1186 } | 1212 } |
| 1187 | 1213 |
| 1188 IN_PROC_BROWSER_TEST_F(PolicyTest, DisableSpdy) { | 1214 IN_PROC_BROWSER_TEST_F(PolicyTest, DisableSpdy) { |
| 1189 // Verifies that SPDY can be disable by policy. | 1215 // Verifies that SPDY can be disable by policy. |
| 1190 EXPECT_TRUE(net::HttpStreamFactory::spdy_enabled()); | 1216 EXPECT_TRUE(net::HttpStreamFactory::spdy_enabled()); |
| 1191 PolicyMap policies; | 1217 PolicyMap policies; |
| 1192 policies.Set(key::kDisableSpdy, POLICY_LEVEL_MANDATORY, | 1218 policies.Set(key::kDisableSpdy, |
| 1193 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 1219 POLICY_LEVEL_MANDATORY, |
| 1220 POLICY_SCOPE_USER, |
| 1221 new base::FundamentalValue(true), |
| 1222 NULL); |
| 1194 UpdateProviderPolicy(policies); | 1223 UpdateProviderPolicy(policies); |
| 1195 content::RunAllPendingInMessageLoop(); | 1224 content::RunAllPendingInMessageLoop(); |
| 1196 EXPECT_FALSE(net::HttpStreamFactory::spdy_enabled()); | 1225 EXPECT_FALSE(net::HttpStreamFactory::spdy_enabled()); |
| 1197 // Verify that it can be force-enabled too. | 1226 // Verify that it can be force-enabled too. |
| 1198 browser()->profile()->GetPrefs()->SetBoolean(prefs::kDisableSpdy, true); | 1227 browser()->profile()->GetPrefs()->SetBoolean(prefs::kDisableSpdy, true); |
| 1199 policies.Set(key::kDisableSpdy, POLICY_LEVEL_MANDATORY, | 1228 policies.Set(key::kDisableSpdy, |
| 1200 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false), NULL); | 1229 POLICY_LEVEL_MANDATORY, |
| 1230 POLICY_SCOPE_USER, |
| 1231 new base::FundamentalValue(false), |
| 1232 NULL); |
| 1201 UpdateProviderPolicy(policies); | 1233 UpdateProviderPolicy(policies); |
| 1202 content::RunAllPendingInMessageLoop(); | 1234 content::RunAllPendingInMessageLoop(); |
| 1203 EXPECT_TRUE(net::HttpStreamFactory::spdy_enabled()); | 1235 EXPECT_TRUE(net::HttpStreamFactory::spdy_enabled()); |
| 1204 } | 1236 } |
| 1205 | 1237 |
| 1206 IN_PROC_BROWSER_TEST_F(PolicyTest, DisabledPlugins) { | 1238 IN_PROC_BROWSER_TEST_F(PolicyTest, DisabledPlugins) { |
| 1207 // Verifies that plugins can be forced to be disabled by policy. | 1239 // Verifies that plugins can be forced to be disabled by policy. |
| 1208 | 1240 |
| 1209 // Verify that the Flash plugin exists and that it can be enabled and disabled | 1241 // Verify that the Flash plugin exists and that it can be enabled and disabled |
| 1210 // by the user. | 1242 // by the user. |
| (...skipping 127 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1338 ui_test_utils::NavigateToURL(browser(), url); | 1370 ui_test_utils::NavigateToURL(browser(), url); |
| 1339 // This should have triggered the dangerous plugin infobar. | 1371 // This should have triggered the dangerous plugin infobar. |
| 1340 ASSERT_EQ(1u, infobar_service->infobar_count()); | 1372 ASSERT_EQ(1u, infobar_service->infobar_count()); |
| 1341 EXPECT_TRUE( | 1373 EXPECT_TRUE( |
| 1342 infobar_service->infobar_at(0)->delegate()->AsConfirmInfoBarDelegate()); | 1374 infobar_service->infobar_at(0)->delegate()->AsConfirmInfoBarDelegate()); |
| 1343 // And the plugin isn't running. | 1375 // And the plugin isn't running. |
| 1344 EXPECT_EQ(0, CountPlugins()); | 1376 EXPECT_EQ(0, CountPlugins()); |
| 1345 | 1377 |
| 1346 // Now set a policy to always authorize this. | 1378 // Now set a policy to always authorize this. |
| 1347 PolicyMap policies; | 1379 PolicyMap policies; |
| 1348 policies.Set(key::kAlwaysAuthorizePlugins, POLICY_LEVEL_MANDATORY, | 1380 policies.Set(key::kAlwaysAuthorizePlugins, |
| 1349 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 1381 POLICY_LEVEL_MANDATORY, |
| 1382 POLICY_SCOPE_USER, |
| 1383 new base::FundamentalValue(true), |
| 1384 NULL); |
| 1350 UpdateProviderPolicy(policies); | 1385 UpdateProviderPolicy(policies); |
| 1351 // Reloading the page shouldn't trigger the infobar this time. | 1386 // Reloading the page shouldn't trigger the infobar this time. |
| 1352 ui_test_utils::NavigateToURL(browser(), url); | 1387 ui_test_utils::NavigateToURL(browser(), url); |
| 1353 EXPECT_EQ(0u, infobar_service->infobar_count()); | 1388 EXPECT_EQ(0u, infobar_service->infobar_count()); |
| 1354 // And the plugin started automatically. | 1389 // And the plugin started automatically. |
| 1355 EXPECT_EQ(1, CountPlugins()); | 1390 EXPECT_EQ(1, CountPlugins()); |
| 1356 } | 1391 } |
| 1357 | 1392 |
| 1358 IN_PROC_BROWSER_TEST_F(PolicyTest, DeveloperToolsDisabled) { | 1393 IN_PROC_BROWSER_TEST_F(PolicyTest, DeveloperToolsDisabled) { |
| 1359 // Verifies that access to the developer tools can be disabled. | 1394 // Verifies that access to the developer tools can be disabled. |
| 1360 | 1395 |
| 1361 // Open devtools. | 1396 // Open devtools. |
| 1362 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_DEV_TOOLS)); | 1397 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_DEV_TOOLS)); |
| 1363 content::WebContents* contents = | 1398 content::WebContents* contents = |
| 1364 browser()->tab_strip_model()->GetActiveWebContents(); | 1399 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1365 DevToolsWindow *devtools_window = | 1400 DevToolsWindow *devtools_window = |
| 1366 DevToolsWindow::GetInstanceForInspectedWebContents(contents); | 1401 DevToolsWindow::GetInstanceForInspectedWebContents(contents); |
| 1367 EXPECT_TRUE(devtools_window); | 1402 EXPECT_TRUE(devtools_window); |
| 1368 | 1403 |
| 1369 // Disable devtools via policy. | 1404 // Disable devtools via policy. |
| 1370 PolicyMap policies; | 1405 PolicyMap policies; |
| 1371 policies.Set(key::kDeveloperToolsDisabled, POLICY_LEVEL_MANDATORY, | 1406 policies.Set(key::kDeveloperToolsDisabled, |
| 1372 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 1407 POLICY_LEVEL_MANDATORY, |
| 1408 POLICY_SCOPE_USER, |
| 1409 new base::FundamentalValue(true), |
| 1410 NULL); |
| 1373 content::WindowedNotificationObserver close_observer( | 1411 content::WindowedNotificationObserver close_observer( |
| 1374 content::NOTIFICATION_WEB_CONTENTS_DESTROYED, | 1412 content::NOTIFICATION_WEB_CONTENTS_DESTROYED, |
| 1375 content::Source<content::WebContents>( | 1413 content::Source<content::WebContents>( |
| 1376 devtools_window->web_contents_for_test())); | 1414 devtools_window->web_contents_for_test())); |
| 1377 UpdateProviderPolicy(policies); | 1415 UpdateProviderPolicy(policies); |
| 1378 // wait for devtools close | 1416 // wait for devtools close |
| 1379 close_observer.Wait(); | 1417 close_observer.Wait(); |
| 1380 // The existing devtools window should have closed. | 1418 // The existing devtools window should have closed. |
| 1381 EXPECT_FALSE(DevToolsWindow::GetInstanceForInspectedWebContents(contents)); | 1419 EXPECT_FALSE(DevToolsWindow::GetInstanceForInspectedWebContents(contents)); |
| 1382 // And it's not possible to open it again. | 1420 // And it's not possible to open it again. |
| (...skipping 21 matching lines...) Expand all Loading... |
| 1404 EXPECT_TRUE(ContainsVisibleElement(contents, | 1442 EXPECT_TRUE(ContainsVisibleElement(contents, |
| 1405 "ahfgeienlihckogmohjhadlkjgocpleb")); | 1443 "ahfgeienlihckogmohjhadlkjgocpleb")); |
| 1406 #endif | 1444 #endif |
| 1407 | 1445 |
| 1408 // The next NTP has no footer. | 1446 // The next NTP has no footer. |
| 1409 if (ContainsVisibleElement(contents, "footer")) | 1447 if (ContainsVisibleElement(contents, "footer")) |
| 1410 EXPECT_TRUE(ContainsVisibleElement(contents, "chrome-web-store-link")); | 1448 EXPECT_TRUE(ContainsVisibleElement(contents, "chrome-web-store-link")); |
| 1411 | 1449 |
| 1412 // Turn off the web store icons. | 1450 // Turn off the web store icons. |
| 1413 PolicyMap policies; | 1451 PolicyMap policies; |
| 1414 policies.Set(key::kHideWebStoreIcon, POLICY_LEVEL_MANDATORY, | 1452 policies.Set(key::kHideWebStoreIcon, |
| 1415 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 1453 POLICY_LEVEL_MANDATORY, |
| 1454 POLICY_SCOPE_USER, |
| 1455 new base::FundamentalValue(true), |
| 1456 NULL); |
| 1416 UpdateProviderPolicy(policies); | 1457 UpdateProviderPolicy(policies); |
| 1417 | 1458 |
| 1418 // The web store icons should now be hidden. | 1459 // The web store icons should now be hidden. |
| 1419 ui_test_utils::NavigateToURL(browser(), GURL(chrome::kChromeUINewTabURL)); | 1460 ui_test_utils::NavigateToURL(browser(), GURL(chrome::kChromeUINewTabURL)); |
| 1420 EXPECT_FALSE(ContainsVisibleElement(contents, | 1461 EXPECT_FALSE(ContainsVisibleElement(contents, |
| 1421 "ahfgeienlihckogmohjhadlkjgocpleb")); | 1462 "ahfgeienlihckogmohjhadlkjgocpleb")); |
| 1422 EXPECT_FALSE(ContainsVisibleElement(contents, "chrome-web-store-link")); | 1463 EXPECT_FALSE(ContainsVisibleElement(contents, "chrome-web-store-link")); |
| 1423 } | 1464 } |
| 1424 | 1465 |
| 1425 IN_PROC_BROWSER_TEST_F(PolicyTest, DownloadDirectory) { | 1466 IN_PROC_BROWSER_TEST_F(PolicyTest, DownloadDirectory) { |
| (...skipping 335 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1761 PolicyMap policies; | 1802 PolicyMap policies; |
| 1762 policies.Set(key::kHomepageLocation, POLICY_LEVEL_MANDATORY, | 1803 policies.Set(key::kHomepageLocation, POLICY_LEVEL_MANDATORY, |
| 1763 POLICY_SCOPE_USER, | 1804 POLICY_SCOPE_USER, |
| 1764 base::Value::CreateStringValue(chrome::kChromeUICreditsURL), | 1805 base::Value::CreateStringValue(chrome::kChromeUICreditsURL), |
| 1765 NULL); | 1806 NULL); |
| 1766 UpdateProviderPolicy(policies); | 1807 UpdateProviderPolicy(policies); |
| 1767 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_HOME)); | 1808 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_HOME)); |
| 1768 content::WaitForLoadStop(contents); | 1809 content::WaitForLoadStop(contents); |
| 1769 EXPECT_EQ(GURL(chrome::kChromeUICreditsURL), contents->GetURL()); | 1810 EXPECT_EQ(GURL(chrome::kChromeUICreditsURL), contents->GetURL()); |
| 1770 | 1811 |
| 1771 policies.Set(key::kHomepageIsNewTabPage, POLICY_LEVEL_MANDATORY, | 1812 policies.Set(key::kHomepageIsNewTabPage, |
| 1772 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 1813 POLICY_LEVEL_MANDATORY, |
| 1814 POLICY_SCOPE_USER, |
| 1815 new base::FundamentalValue(true), |
| 1816 NULL); |
| 1773 UpdateProviderPolicy(policies); | 1817 UpdateProviderPolicy(policies); |
| 1774 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_HOME)); | 1818 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_HOME)); |
| 1775 content::WaitForLoadStop(contents); | 1819 content::WaitForLoadStop(contents); |
| 1776 EXPECT_EQ(GURL(chrome::kChromeUINewTabURL), contents->GetURL()); | 1820 EXPECT_EQ(GURL(chrome::kChromeUINewTabURL), contents->GetURL()); |
| 1777 } | 1821 } |
| 1778 | 1822 |
| 1779 IN_PROC_BROWSER_TEST_F(PolicyTest, IncognitoEnabled) { | 1823 IN_PROC_BROWSER_TEST_F(PolicyTest, IncognitoEnabled) { |
| 1780 // Verifies that incognito windows can't be opened when disabled by policy. | 1824 // Verifies that incognito windows can't be opened when disabled by policy. |
| 1781 | 1825 |
| 1782 const BrowserList* active_browser_list = | 1826 const BrowserList* active_browser_list = |
| 1783 BrowserList::GetInstance(chrome::GetActiveDesktop()); | 1827 BrowserList::GetInstance(chrome::GetActiveDesktop()); |
| 1784 | 1828 |
| 1785 // Disable incognito via policy and verify that incognito windows can't be | 1829 // Disable incognito via policy and verify that incognito windows can't be |
| 1786 // opened. | 1830 // opened. |
| 1787 EXPECT_EQ(1u, active_browser_list->size()); | 1831 EXPECT_EQ(1u, active_browser_list->size()); |
| 1788 EXPECT_FALSE(BrowserList::IsOffTheRecordSessionActive()); | 1832 EXPECT_FALSE(BrowserList::IsOffTheRecordSessionActive()); |
| 1789 PolicyMap policies; | 1833 PolicyMap policies; |
| 1790 policies.Set(key::kIncognitoEnabled, POLICY_LEVEL_MANDATORY, | 1834 policies.Set(key::kIncognitoEnabled, |
| 1791 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false), NULL); | 1835 POLICY_LEVEL_MANDATORY, |
| 1836 POLICY_SCOPE_USER, |
| 1837 new base::FundamentalValue(false), |
| 1838 NULL); |
| 1792 UpdateProviderPolicy(policies); | 1839 UpdateProviderPolicy(policies); |
| 1793 EXPECT_FALSE(chrome::ExecuteCommand(browser(), IDC_NEW_INCOGNITO_WINDOW)); | 1840 EXPECT_FALSE(chrome::ExecuteCommand(browser(), IDC_NEW_INCOGNITO_WINDOW)); |
| 1794 EXPECT_EQ(1u, active_browser_list->size()); | 1841 EXPECT_EQ(1u, active_browser_list->size()); |
| 1795 EXPECT_FALSE(BrowserList::IsOffTheRecordSessionActive()); | 1842 EXPECT_FALSE(BrowserList::IsOffTheRecordSessionActive()); |
| 1796 | 1843 |
| 1797 // Enable via policy and verify that incognito windows can be opened. | 1844 // Enable via policy and verify that incognito windows can be opened. |
| 1798 policies.Set(key::kIncognitoEnabled, POLICY_LEVEL_MANDATORY, | 1845 policies.Set(key::kIncognitoEnabled, |
| 1799 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 1846 POLICY_LEVEL_MANDATORY, |
| 1847 POLICY_SCOPE_USER, |
| 1848 new base::FundamentalValue(true), |
| 1849 NULL); |
| 1800 UpdateProviderPolicy(policies); | 1850 UpdateProviderPolicy(policies); |
| 1801 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_NEW_INCOGNITO_WINDOW)); | 1851 EXPECT_TRUE(chrome::ExecuteCommand(browser(), IDC_NEW_INCOGNITO_WINDOW)); |
| 1802 EXPECT_EQ(2u, active_browser_list->size()); | 1852 EXPECT_EQ(2u, active_browser_list->size()); |
| 1803 EXPECT_TRUE(BrowserList::IsOffTheRecordSessionActive()); | 1853 EXPECT_TRUE(BrowserList::IsOffTheRecordSessionActive()); |
| 1804 } | 1854 } |
| 1805 | 1855 |
| 1806 IN_PROC_BROWSER_TEST_F(PolicyTest, Javascript) { | 1856 IN_PROC_BROWSER_TEST_F(PolicyTest, Javascript) { |
| 1807 // Verifies that Javascript can be disabled. | 1857 // Verifies that Javascript can be disabled. |
| 1808 content::WebContents* contents = | 1858 content::WebContents* contents = |
| 1809 browser()->tab_strip_model()->GetActiveWebContents(); | 1859 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1810 EXPECT_TRUE(IsJavascriptEnabled(contents)); | 1860 EXPECT_TRUE(IsJavascriptEnabled(contents)); |
| 1811 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS)); | 1861 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS)); |
| 1812 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_CONSOLE)); | 1862 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_CONSOLE)); |
| 1813 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_DEVICES)); | 1863 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_DEVICES)); |
| 1814 | 1864 |
| 1815 // Disable Javascript via policy. | 1865 // Disable Javascript via policy. |
| 1816 PolicyMap policies; | 1866 PolicyMap policies; |
| 1817 policies.Set(key::kJavascriptEnabled, POLICY_LEVEL_MANDATORY, | 1867 policies.Set(key::kJavascriptEnabled, |
| 1818 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false), NULL); | 1868 POLICY_LEVEL_MANDATORY, |
| 1869 POLICY_SCOPE_USER, |
| 1870 new base::FundamentalValue(false), |
| 1871 NULL); |
| 1819 UpdateProviderPolicy(policies); | 1872 UpdateProviderPolicy(policies); |
| 1820 // Reload the page. | 1873 // Reload the page. |
| 1821 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); | 1874 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); |
| 1822 EXPECT_FALSE(IsJavascriptEnabled(contents)); | 1875 EXPECT_FALSE(IsJavascriptEnabled(contents)); |
| 1823 // Developer tools still work when javascript is disabled. | 1876 // Developer tools still work when javascript is disabled. |
| 1824 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS)); | 1877 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS)); |
| 1825 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_CONSOLE)); | 1878 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_CONSOLE)); |
| 1826 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_DEVICES)); | 1879 EXPECT_TRUE(chrome::IsCommandEnabled(browser(), IDC_DEV_TOOLS_DEVICES)); |
| 1827 // Javascript is always enabled for the internal pages. | 1880 // Javascript is always enabled for the internal pages. |
| 1828 ui_test_utils::NavigateToURL(browser(), GURL(chrome::kChromeUIAboutURL)); | 1881 ui_test_utils::NavigateToURL(browser(), GURL(chrome::kChromeUIAboutURL)); |
| 1829 EXPECT_TRUE(IsJavascriptEnabled(contents)); | 1882 EXPECT_TRUE(IsJavascriptEnabled(contents)); |
| 1830 | 1883 |
| 1831 // The javascript content setting policy overrides the javascript policy. | 1884 // The javascript content setting policy overrides the javascript policy. |
| 1832 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); | 1885 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); |
| 1833 EXPECT_FALSE(IsJavascriptEnabled(contents)); | 1886 EXPECT_FALSE(IsJavascriptEnabled(contents)); |
| 1834 policies.Set(key::kDefaultJavaScriptSetting, POLICY_LEVEL_MANDATORY, | 1887 policies.Set(key::kDefaultJavaScriptSetting, POLICY_LEVEL_MANDATORY, |
| 1835 POLICY_SCOPE_USER, | 1888 POLICY_SCOPE_USER, |
| 1836 base::Value::CreateIntegerValue(CONTENT_SETTING_ALLOW), NULL); | 1889 base::Value::CreateIntegerValue(CONTENT_SETTING_ALLOW), NULL); |
| 1837 UpdateProviderPolicy(policies); | 1890 UpdateProviderPolicy(policies); |
| 1838 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); | 1891 ui_test_utils::NavigateToURL(browser(), GURL(url::kAboutBlankURL)); |
| 1839 EXPECT_TRUE(IsJavascriptEnabled(contents)); | 1892 EXPECT_TRUE(IsJavascriptEnabled(contents)); |
| 1840 } | 1893 } |
| 1841 | 1894 |
| 1842 IN_PROC_BROWSER_TEST_F(PolicyTest, SavingBrowserHistoryDisabled) { | 1895 IN_PROC_BROWSER_TEST_F(PolicyTest, SavingBrowserHistoryDisabled) { |
| 1843 // Verifies that browsing history is not saved. | 1896 // Verifies that browsing history is not saved. |
| 1844 PolicyMap policies; | 1897 PolicyMap policies; |
| 1845 policies.Set(key::kSavingBrowserHistoryDisabled, POLICY_LEVEL_MANDATORY, | 1898 policies.Set(key::kSavingBrowserHistoryDisabled, |
| 1846 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 1899 POLICY_LEVEL_MANDATORY, |
| 1900 POLICY_SCOPE_USER, |
| 1901 new base::FundamentalValue(true), |
| 1902 NULL); |
| 1847 UpdateProviderPolicy(policies); | 1903 UpdateProviderPolicy(policies); |
| 1848 GURL url = ui_test_utils::GetTestUrl( | 1904 GURL url = ui_test_utils::GetTestUrl( |
| 1849 base::FilePath(base::FilePath::kCurrentDirectory), | 1905 base::FilePath(base::FilePath::kCurrentDirectory), |
| 1850 base::FilePath(FILE_PATH_LITERAL("empty.html"))); | 1906 base::FilePath(FILE_PATH_LITERAL("empty.html"))); |
| 1851 ui_test_utils::NavigateToURL(browser(), url); | 1907 ui_test_utils::NavigateToURL(browser(), url); |
| 1852 // Verify that the navigation wasn't saved in the history. | 1908 // Verify that the navigation wasn't saved in the history. |
| 1853 ui_test_utils::HistoryEnumerator enumerator1(browser()->profile()); | 1909 ui_test_utils::HistoryEnumerator enumerator1(browser()->profile()); |
| 1854 EXPECT_EQ(0u, enumerator1.urls().size()); | 1910 EXPECT_EQ(0u, enumerator1.urls().size()); |
| 1855 | 1911 |
| 1856 // Now flip the policy and try again. | 1912 // Now flip the policy and try again. |
| 1857 policies.Set(key::kSavingBrowserHistoryDisabled, POLICY_LEVEL_MANDATORY, | 1913 policies.Set(key::kSavingBrowserHistoryDisabled, |
| 1858 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false), NULL); | 1914 POLICY_LEVEL_MANDATORY, |
| 1915 POLICY_SCOPE_USER, |
| 1916 new base::FundamentalValue(false), |
| 1917 NULL); |
| 1859 UpdateProviderPolicy(policies); | 1918 UpdateProviderPolicy(policies); |
| 1860 ui_test_utils::NavigateToURL(browser(), url); | 1919 ui_test_utils::NavigateToURL(browser(), url); |
| 1861 // Verify that the navigation was saved in the history. | 1920 // Verify that the navigation was saved in the history. |
| 1862 ui_test_utils::HistoryEnumerator enumerator2(browser()->profile()); | 1921 ui_test_utils::HistoryEnumerator enumerator2(browser()->profile()); |
| 1863 ASSERT_EQ(1u, enumerator2.urls().size()); | 1922 ASSERT_EQ(1u, enumerator2.urls().size()); |
| 1864 EXPECT_EQ(url, enumerator2.urls()[0]); | 1923 EXPECT_EQ(url, enumerator2.urls()[0]); |
| 1865 } | 1924 } |
| 1866 | 1925 |
| 1867 // http://crbug.com/241691 PolicyTest.TranslateEnabled is failing regularly. | 1926 // http://crbug.com/241691 PolicyTest.TranslateEnabled is failing regularly. |
| 1868 IN_PROC_BROWSER_TEST_F(PolicyTest, DISABLED_TranslateEnabled) { | 1927 IN_PROC_BROWSER_TEST_F(PolicyTest, DISABLED_TranslateEnabled) { |
| (...skipping 10 matching lines...) Expand all Loading... |
| 1879 // Get the InfoBarService, and verify that there are no infobars on startup. | 1938 // Get the InfoBarService, and verify that there are no infobars on startup. |
| 1880 content::WebContents* contents = | 1939 content::WebContents* contents = |
| 1881 browser()->tab_strip_model()->GetActiveWebContents(); | 1940 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1882 ASSERT_TRUE(contents); | 1941 ASSERT_TRUE(contents); |
| 1883 InfoBarService* infobar_service = InfoBarService::FromWebContents(contents); | 1942 InfoBarService* infobar_service = InfoBarService::FromWebContents(contents); |
| 1884 ASSERT_TRUE(infobar_service); | 1943 ASSERT_TRUE(infobar_service); |
| 1885 EXPECT_EQ(0u, infobar_service->infobar_count()); | 1944 EXPECT_EQ(0u, infobar_service->infobar_count()); |
| 1886 | 1945 |
| 1887 // Force enable the translate feature. | 1946 // Force enable the translate feature. |
| 1888 PolicyMap policies; | 1947 PolicyMap policies; |
| 1889 policies.Set(key::kTranslateEnabled, POLICY_LEVEL_MANDATORY, | 1948 policies.Set(key::kTranslateEnabled, |
| 1890 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 1949 POLICY_LEVEL_MANDATORY, |
| 1950 POLICY_SCOPE_USER, |
| 1951 new base::FundamentalValue(true), |
| 1952 NULL); |
| 1891 UpdateProviderPolicy(policies); | 1953 UpdateProviderPolicy(policies); |
| 1892 // Instead of waiting for NOTIFICATION_TAB_CONTENTS_INFOBAR_ADDED, this test | 1954 // Instead of waiting for NOTIFICATION_TAB_CONTENTS_INFOBAR_ADDED, this test |
| 1893 // waits for NOTIFICATION_TAB_LANGUAGE_DETERMINED because that's what the | 1955 // waits for NOTIFICATION_TAB_LANGUAGE_DETERMINED because that's what the |
| 1894 // TranslateManager observes. This allows checking that an infobar is NOT | 1956 // TranslateManager observes. This allows checking that an infobar is NOT |
| 1895 // shown below, without polling for infobars for some indeterminate amount | 1957 // shown below, without polling for infobars for some indeterminate amount |
| 1896 // of time. | 1958 // of time. |
| 1897 GURL url = ui_test_utils::GetTestUrl( | 1959 GURL url = ui_test_utils::GetTestUrl( |
| 1898 base::FilePath(), | 1960 base::FilePath(), |
| 1899 base::FilePath(FILE_PATH_LITERAL("translate/fr_test.html"))); | 1961 base::FilePath(FILE_PATH_LITERAL("translate/fr_test.html"))); |
| 1900 content::WindowedNotificationObserver language_observer1( | 1962 content::WindowedNotificationObserver language_observer1( |
| (...skipping 19 matching lines...) Expand all Loading... |
| 1920 TranslateInfoBarDelegate* translate_infobar_delegate = | 1982 TranslateInfoBarDelegate* translate_infobar_delegate = |
| 1921 infobar->delegate()->AsTranslateInfoBarDelegate(); | 1983 infobar->delegate()->AsTranslateInfoBarDelegate(); |
| 1922 ASSERT_TRUE(translate_infobar_delegate); | 1984 ASSERT_TRUE(translate_infobar_delegate); |
| 1923 EXPECT_EQ(translate::TRANSLATE_STEP_BEFORE_TRANSLATE, | 1985 EXPECT_EQ(translate::TRANSLATE_STEP_BEFORE_TRANSLATE, |
| 1924 translate_infobar_delegate->translate_step()); | 1986 translate_infobar_delegate->translate_step()); |
| 1925 EXPECT_EQ("fr", translate_infobar_delegate->original_language_code()); | 1987 EXPECT_EQ("fr", translate_infobar_delegate->original_language_code()); |
| 1926 | 1988 |
| 1927 // Now force disable translate. | 1989 // Now force disable translate. |
| 1928 infobar_service->RemoveInfoBar(infobar); | 1990 infobar_service->RemoveInfoBar(infobar); |
| 1929 EXPECT_EQ(0u, infobar_service->infobar_count()); | 1991 EXPECT_EQ(0u, infobar_service->infobar_count()); |
| 1930 policies.Set(key::kTranslateEnabled, POLICY_LEVEL_MANDATORY, | 1992 policies.Set(key::kTranslateEnabled, |
| 1931 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false), NULL); | 1993 POLICY_LEVEL_MANDATORY, |
| 1994 POLICY_SCOPE_USER, |
| 1995 new base::FundamentalValue(false), |
| 1996 NULL); |
| 1932 UpdateProviderPolicy(policies); | 1997 UpdateProviderPolicy(policies); |
| 1933 // Navigating to the same URL now doesn't trigger an infobar. | 1998 // Navigating to the same URL now doesn't trigger an infobar. |
| 1934 content::WindowedNotificationObserver language_observer2( | 1999 content::WindowedNotificationObserver language_observer2( |
| 1935 chrome::NOTIFICATION_TAB_LANGUAGE_DETERMINED, | 2000 chrome::NOTIFICATION_TAB_LANGUAGE_DETERMINED, |
| 1936 content::NotificationService::AllSources()); | 2001 content::NotificationService::AllSources()); |
| 1937 ui_test_utils::NavigateToURL(browser(), url); | 2002 ui_test_utils::NavigateToURL(browser(), url); |
| 1938 language_observer2.Wait(); | 2003 language_observer2.Wait(); |
| 1939 EXPECT_EQ(0u, infobar_service->infobar_count()); | 2004 EXPECT_EQ(0u, infobar_service->infobar_count()); |
| 1940 } | 2005 } |
| 1941 | 2006 |
| (...skipping 118 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2060 FlushBlacklistPolicy(); | 2125 FlushBlacklistPolicy(); |
| 2061 | 2126 |
| 2062 CheckCanOpenURL(browser(), file_path1.c_str()); | 2127 CheckCanOpenURL(browser(), file_path1.c_str()); |
| 2063 CheckURLIsBlocked(browser(), file_path2.c_str()); | 2128 CheckURLIsBlocked(browser(), file_path2.c_str()); |
| 2064 } | 2129 } |
| 2065 | 2130 |
| 2066 #if !defined(OS_MACOSX) | 2131 #if !defined(OS_MACOSX) |
| 2067 IN_PROC_BROWSER_TEST_F(PolicyTest, FullscreenAllowedBrowser) { | 2132 IN_PROC_BROWSER_TEST_F(PolicyTest, FullscreenAllowedBrowser) { |
| 2068 PolicyMap policies; | 2133 PolicyMap policies; |
| 2069 policies.Set(key::kFullscreenAllowed, | 2134 policies.Set(key::kFullscreenAllowed, |
| 2070 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 2135 POLICY_LEVEL_MANDATORY, |
| 2071 base::Value::CreateBooleanValue(false), NULL); | 2136 POLICY_SCOPE_USER, |
| 2137 new base::FundamentalValue(false), |
| 2138 NULL); |
| 2072 UpdateProviderPolicy(policies); | 2139 UpdateProviderPolicy(policies); |
| 2073 | 2140 |
| 2074 BrowserWindow* browser_window = browser()->window(); | 2141 BrowserWindow* browser_window = browser()->window(); |
| 2075 ASSERT_TRUE(browser_window); | 2142 ASSERT_TRUE(browser_window); |
| 2076 | 2143 |
| 2077 EXPECT_FALSE(browser_window->IsFullscreen()); | 2144 EXPECT_FALSE(browser_window->IsFullscreen()); |
| 2078 chrome::ToggleFullscreenMode(browser()); | 2145 chrome::ToggleFullscreenMode(browser()); |
| 2079 EXPECT_FALSE(browser_window->IsFullscreen()); | 2146 EXPECT_FALSE(browser_window->IsFullscreen()); |
| 2080 } | 2147 } |
| 2081 | 2148 |
| 2082 IN_PROC_BROWSER_TEST_F(PolicyTest, FullscreenAllowedApp) { | 2149 IN_PROC_BROWSER_TEST_F(PolicyTest, FullscreenAllowedApp) { |
| 2083 PolicyMap policies; | 2150 PolicyMap policies; |
| 2084 policies.Set(key::kFullscreenAllowed, | 2151 policies.Set(key::kFullscreenAllowed, |
| 2085 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 2152 POLICY_LEVEL_MANDATORY, |
| 2086 base::Value::CreateBooleanValue(false), NULL); | 2153 POLICY_SCOPE_USER, |
| 2154 new base::FundamentalValue(false), |
| 2155 NULL); |
| 2087 UpdateProviderPolicy(policies); | 2156 UpdateProviderPolicy(policies); |
| 2088 | 2157 |
| 2089 const extensions::Extension* extension = | 2158 const extensions::Extension* extension = |
| 2090 LoadUnpackedExtension(kUnpackedFullscreenAppName, true); | 2159 LoadUnpackedExtension(kUnpackedFullscreenAppName, true); |
| 2091 ASSERT_TRUE(extension); | 2160 ASSERT_TRUE(extension); |
| 2092 | 2161 |
| 2093 // Launch an app that tries to open a fullscreen window. | 2162 // Launch an app that tries to open a fullscreen window. |
| 2094 TestAddAppWindowObserver add_window_observer( | 2163 TestAddAppWindowObserver add_window_observer( |
| 2095 apps::AppWindowRegistry::Get(browser()->profile())); | 2164 apps::AppWindowRegistry::Get(browser()->profile())); |
| 2096 OpenApplication(AppLaunchParams(browser()->profile(), | 2165 OpenApplication(AppLaunchParams(browser()->profile(), |
| (...skipping 39 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2136 scoped_ptr<TestAudioObserver> test_observer(new TestAudioObserver); | 2205 scoped_ptr<TestAudioObserver> test_observer(new TestAudioObserver); |
| 2137 audio_handler->AddAudioObserver(test_observer.get()); | 2206 audio_handler->AddAudioObserver(test_observer.get()); |
| 2138 | 2207 |
| 2139 bool prior_state = audio_handler->IsOutputMuted(); | 2208 bool prior_state = audio_handler->IsOutputMuted(); |
| 2140 // Make sure the audio is not muted and then toggle the policy and observe | 2209 // Make sure the audio is not muted and then toggle the policy and observe |
| 2141 // if the output mute changed event is fired. | 2210 // if the output mute changed event is fired. |
| 2142 audio_handler->SetOutputMute(false); | 2211 audio_handler->SetOutputMute(false); |
| 2143 EXPECT_FALSE(audio_handler->IsOutputMuted()); | 2212 EXPECT_FALSE(audio_handler->IsOutputMuted()); |
| 2144 EXPECT_EQ(1, test_observer->output_mute_changed_count()); | 2213 EXPECT_EQ(1, test_observer->output_mute_changed_count()); |
| 2145 PolicyMap policies; | 2214 PolicyMap policies; |
| 2146 policies.Set(key::kAudioOutputAllowed, POLICY_LEVEL_MANDATORY, | 2215 policies.Set(key::kAudioOutputAllowed, |
| 2147 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(false), NULL); | 2216 POLICY_LEVEL_MANDATORY, |
| 2217 POLICY_SCOPE_USER, |
| 2218 new base::FundamentalValue(false), |
| 2219 NULL); |
| 2148 UpdateProviderPolicy(policies); | 2220 UpdateProviderPolicy(policies); |
| 2149 EXPECT_TRUE(audio_handler->IsOutputMuted()); | 2221 EXPECT_TRUE(audio_handler->IsOutputMuted()); |
| 2150 // This should not change the state now and should not trigger output mute | 2222 // This should not change the state now and should not trigger output mute |
| 2151 // changed event. | 2223 // changed event. |
| 2152 audio_handler->SetOutputMute(false); | 2224 audio_handler->SetOutputMute(false); |
| 2153 EXPECT_TRUE(audio_handler->IsOutputMuted()); | 2225 EXPECT_TRUE(audio_handler->IsOutputMuted()); |
| 2154 EXPECT_EQ(1, test_observer->output_mute_changed_count()); | 2226 EXPECT_EQ(1, test_observer->output_mute_changed_count()); |
| 2155 | 2227 |
| 2156 // Toggle back and observe if the output mute changed event is fired. | 2228 // Toggle back and observe if the output mute changed event is fired. |
| 2157 policies.Set(key::kAudioOutputAllowed, POLICY_LEVEL_MANDATORY, | 2229 policies.Set(key::kAudioOutputAllowed, |
| 2158 POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); | 2230 POLICY_LEVEL_MANDATORY, |
| 2231 POLICY_SCOPE_USER, |
| 2232 new base::FundamentalValue(true), |
| 2233 NULL); |
| 2159 UpdateProviderPolicy(policies); | 2234 UpdateProviderPolicy(policies); |
| 2160 EXPECT_FALSE(audio_handler->IsOutputMuted()); | 2235 EXPECT_FALSE(audio_handler->IsOutputMuted()); |
| 2161 EXPECT_EQ(1, test_observer->output_mute_changed_count()); | 2236 EXPECT_EQ(1, test_observer->output_mute_changed_count()); |
| 2162 audio_handler->SetOutputMute(true); | 2237 audio_handler->SetOutputMute(true); |
| 2163 EXPECT_TRUE(audio_handler->IsOutputMuted()); | 2238 EXPECT_TRUE(audio_handler->IsOutputMuted()); |
| 2164 EXPECT_EQ(2, test_observer->output_mute_changed_count()); | 2239 EXPECT_EQ(2, test_observer->output_mute_changed_count()); |
| 2165 // Revert the prior state. | 2240 // Revert the prior state. |
| 2166 audio_handler->SetOutputMute(prior_state); | 2241 audio_handler->SetOutputMute(prior_state); |
| 2167 audio_handler->RemoveAudioObserver(test_observer.get()); | 2242 audio_handler->RemoveAudioObserver(test_observer.get()); |
| 2168 } | 2243 } |
| (...skipping 139 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2308 // through policy. | 2383 // through policy. |
| 2309 chromeos::AccessibilityManager* accessibility_manager = | 2384 chromeos::AccessibilityManager* accessibility_manager = |
| 2310 chromeos::AccessibilityManager::Get(); | 2385 chromeos::AccessibilityManager::Get(); |
| 2311 | 2386 |
| 2312 // Manually enable the large cursor. | 2387 // Manually enable the large cursor. |
| 2313 accessibility_manager->EnableLargeCursor(true); | 2388 accessibility_manager->EnableLargeCursor(true); |
| 2314 EXPECT_TRUE(accessibility_manager->IsLargeCursorEnabled()); | 2389 EXPECT_TRUE(accessibility_manager->IsLargeCursorEnabled()); |
| 2315 | 2390 |
| 2316 // Verify that policy overrides the manual setting. | 2391 // Verify that policy overrides the manual setting. |
| 2317 PolicyMap policies; | 2392 PolicyMap policies; |
| 2318 policies.Set(key::kLargeCursorEnabled, POLICY_LEVEL_MANDATORY, | 2393 policies.Set(key::kLargeCursorEnabled, |
| 2394 POLICY_LEVEL_MANDATORY, |
| 2319 POLICY_SCOPE_USER, | 2395 POLICY_SCOPE_USER, |
| 2320 base::Value::CreateBooleanValue(false), NULL); | 2396 new base::FundamentalValue(false), |
| 2397 NULL); |
| 2321 UpdateProviderPolicy(policies); | 2398 UpdateProviderPolicy(policies); |
| 2322 EXPECT_FALSE(accessibility_manager->IsLargeCursorEnabled()); | 2399 EXPECT_FALSE(accessibility_manager->IsLargeCursorEnabled()); |
| 2323 | 2400 |
| 2324 // Verify that the large cursor cannot be enabled manually anymore. | 2401 // Verify that the large cursor cannot be enabled manually anymore. |
| 2325 accessibility_manager->EnableLargeCursor(true); | 2402 accessibility_manager->EnableLargeCursor(true); |
| 2326 EXPECT_FALSE(accessibility_manager->IsLargeCursorEnabled()); | 2403 EXPECT_FALSE(accessibility_manager->IsLargeCursorEnabled()); |
| 2327 } | 2404 } |
| 2328 | 2405 |
| 2329 IN_PROC_BROWSER_TEST_F(PolicyTest, SpokenFeedbackEnabled) { | 2406 IN_PROC_BROWSER_TEST_F(PolicyTest, SpokenFeedbackEnabled) { |
| 2330 // Verifies that the spoken feedback accessibility feature can be controlled | 2407 // Verifies that the spoken feedback accessibility feature can be controlled |
| 2331 // through policy. | 2408 // through policy. |
| 2332 chromeos::AccessibilityManager* accessibility_manager = | 2409 chromeos::AccessibilityManager* accessibility_manager = |
| 2333 chromeos::AccessibilityManager::Get(); | 2410 chromeos::AccessibilityManager::Get(); |
| 2334 | 2411 |
| 2335 // Manually enable spoken feedback. | 2412 // Manually enable spoken feedback. |
| 2336 accessibility_manager->EnableSpokenFeedback( | 2413 accessibility_manager->EnableSpokenFeedback( |
| 2337 true, ash::A11Y_NOTIFICATION_NONE); | 2414 true, ash::A11Y_NOTIFICATION_NONE); |
| 2338 EXPECT_TRUE(accessibility_manager->IsSpokenFeedbackEnabled()); | 2415 EXPECT_TRUE(accessibility_manager->IsSpokenFeedbackEnabled()); |
| 2339 | 2416 |
| 2340 // Verify that policy overrides the manual setting. | 2417 // Verify that policy overrides the manual setting. |
| 2341 PolicyMap policies; | 2418 PolicyMap policies; |
| 2342 policies.Set(key::kSpokenFeedbackEnabled, POLICY_LEVEL_MANDATORY, | 2419 policies.Set(key::kSpokenFeedbackEnabled, |
| 2420 POLICY_LEVEL_MANDATORY, |
| 2343 POLICY_SCOPE_USER, | 2421 POLICY_SCOPE_USER, |
| 2344 base::Value::CreateBooleanValue(false), NULL); | 2422 new base::FundamentalValue(false), |
| 2423 NULL); |
| 2345 UpdateProviderPolicy(policies); | 2424 UpdateProviderPolicy(policies); |
| 2346 EXPECT_FALSE(accessibility_manager->IsSpokenFeedbackEnabled()); | 2425 EXPECT_FALSE(accessibility_manager->IsSpokenFeedbackEnabled()); |
| 2347 | 2426 |
| 2348 // Verify that spoken feedback cannot be enabled manually anymore. | 2427 // Verify that spoken feedback cannot be enabled manually anymore. |
| 2349 accessibility_manager->EnableSpokenFeedback( | 2428 accessibility_manager->EnableSpokenFeedback( |
| 2350 true, ash::A11Y_NOTIFICATION_NONE); | 2429 true, ash::A11Y_NOTIFICATION_NONE); |
| 2351 EXPECT_FALSE(accessibility_manager->IsSpokenFeedbackEnabled()); | 2430 EXPECT_FALSE(accessibility_manager->IsSpokenFeedbackEnabled()); |
| 2352 } | 2431 } |
| 2353 | 2432 |
| 2354 IN_PROC_BROWSER_TEST_F(PolicyTest, HighContrastEnabled) { | 2433 IN_PROC_BROWSER_TEST_F(PolicyTest, HighContrastEnabled) { |
| 2355 // Verifies that the high contrast mode accessibility feature can be | 2434 // Verifies that the high contrast mode accessibility feature can be |
| 2356 // controlled through policy. | 2435 // controlled through policy. |
| 2357 chromeos::AccessibilityManager* accessibility_manager = | 2436 chromeos::AccessibilityManager* accessibility_manager = |
| 2358 chromeos::AccessibilityManager::Get(); | 2437 chromeos::AccessibilityManager::Get(); |
| 2359 | 2438 |
| 2360 // Manually enable high contrast mode. | 2439 // Manually enable high contrast mode. |
| 2361 accessibility_manager->EnableHighContrast(true); | 2440 accessibility_manager->EnableHighContrast(true); |
| 2362 EXPECT_TRUE(accessibility_manager->IsHighContrastEnabled()); | 2441 EXPECT_TRUE(accessibility_manager->IsHighContrastEnabled()); |
| 2363 | 2442 |
| 2364 // Verify that policy overrides the manual setting. | 2443 // Verify that policy overrides the manual setting. |
| 2365 PolicyMap policies; | 2444 PolicyMap policies; |
| 2366 policies.Set(key::kHighContrastEnabled, POLICY_LEVEL_MANDATORY, | 2445 policies.Set(key::kHighContrastEnabled, |
| 2446 POLICY_LEVEL_MANDATORY, |
| 2367 POLICY_SCOPE_USER, | 2447 POLICY_SCOPE_USER, |
| 2368 base::Value::CreateBooleanValue(false), NULL); | 2448 new base::FundamentalValue(false), |
| 2449 NULL); |
| 2369 UpdateProviderPolicy(policies); | 2450 UpdateProviderPolicy(policies); |
| 2370 EXPECT_FALSE(accessibility_manager->IsHighContrastEnabled()); | 2451 EXPECT_FALSE(accessibility_manager->IsHighContrastEnabled()); |
| 2371 | 2452 |
| 2372 // Verify that high contrast mode cannot be enabled manually anymore. | 2453 // Verify that high contrast mode cannot be enabled manually anymore. |
| 2373 accessibility_manager->EnableHighContrast(true); | 2454 accessibility_manager->EnableHighContrast(true); |
| 2374 EXPECT_FALSE(accessibility_manager->IsHighContrastEnabled()); | 2455 EXPECT_FALSE(accessibility_manager->IsHighContrastEnabled()); |
| 2375 } | 2456 } |
| 2376 | 2457 |
| 2377 IN_PROC_BROWSER_TEST_F(PolicyTest, ScreenMagnifierTypeNone) { | 2458 IN_PROC_BROWSER_TEST_F(PolicyTest, ScreenMagnifierTypeNone) { |
| 2378 // Verifies that the screen magnifier can be disabled through policy. | 2459 // Verifies that the screen magnifier can be disabled through policy. |
| (...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2425 // controlled through policy. | 2506 // controlled through policy. |
| 2426 chromeos::AccessibilityManager* accessibility_manager = | 2507 chromeos::AccessibilityManager* accessibility_manager = |
| 2427 chromeos::AccessibilityManager::Get(); | 2508 chromeos::AccessibilityManager::Get(); |
| 2428 | 2509 |
| 2429 // Manually enable the on-screen keyboard. | 2510 // Manually enable the on-screen keyboard. |
| 2430 accessibility_manager->EnableVirtualKeyboard(true); | 2511 accessibility_manager->EnableVirtualKeyboard(true); |
| 2431 EXPECT_TRUE(accessibility_manager->IsVirtualKeyboardEnabled()); | 2512 EXPECT_TRUE(accessibility_manager->IsVirtualKeyboardEnabled()); |
| 2432 | 2513 |
| 2433 // Verify that policy overrides the manual setting. | 2514 // Verify that policy overrides the manual setting. |
| 2434 PolicyMap policies; | 2515 PolicyMap policies; |
| 2435 policies.Set(key::kVirtualKeyboardEnabled, POLICY_LEVEL_MANDATORY, | 2516 policies.Set(key::kVirtualKeyboardEnabled, |
| 2517 POLICY_LEVEL_MANDATORY, |
| 2436 POLICY_SCOPE_USER, | 2518 POLICY_SCOPE_USER, |
| 2437 base::Value::CreateBooleanValue(false), NULL); | 2519 new base::FundamentalValue(false), |
| 2520 NULL); |
| 2438 UpdateProviderPolicy(policies); | 2521 UpdateProviderPolicy(policies); |
| 2439 EXPECT_FALSE(accessibility_manager->IsVirtualKeyboardEnabled()); | 2522 EXPECT_FALSE(accessibility_manager->IsVirtualKeyboardEnabled()); |
| 2440 | 2523 |
| 2441 // Verify that the on-screen keyboard cannot be enabled manually anymore. | 2524 // Verify that the on-screen keyboard cannot be enabled manually anymore. |
| 2442 accessibility_manager->EnableVirtualKeyboard(true); | 2525 accessibility_manager->EnableVirtualKeyboard(true); |
| 2443 EXPECT_FALSE(accessibility_manager->IsVirtualKeyboardEnabled()); | 2526 EXPECT_FALSE(accessibility_manager->IsVirtualKeyboardEnabled()); |
| 2444 } | 2527 } |
| 2445 | 2528 |
| 2446 IN_PROC_BROWSER_TEST_F(PolicyTest, VirtualKeyboardEnabled) { | 2529 IN_PROC_BROWSER_TEST_F(PolicyTest, VirtualKeyboardEnabled) { |
| 2447 // Verify keyboard disabled by default. | 2530 // Verify keyboard disabled by default. |
| 2448 EXPECT_FALSE(keyboard::IsKeyboardEnabled()); | 2531 EXPECT_FALSE(keyboard::IsKeyboardEnabled()); |
| 2449 // Verify keyboard can be toggled by default. | 2532 // Verify keyboard can be toggled by default. |
| 2450 keyboard::SetTouchKeyboardEnabled(true); | 2533 keyboard::SetTouchKeyboardEnabled(true); |
| 2451 EXPECT_TRUE(keyboard::IsKeyboardEnabled()); | 2534 EXPECT_TRUE(keyboard::IsKeyboardEnabled()); |
| 2452 keyboard::SetTouchKeyboardEnabled(false); | 2535 keyboard::SetTouchKeyboardEnabled(false); |
| 2453 EXPECT_FALSE(keyboard::IsKeyboardEnabled()); | 2536 EXPECT_FALSE(keyboard::IsKeyboardEnabled()); |
| 2454 | 2537 |
| 2455 // Verify enabling the policy takes effect immediately and that that user | 2538 // Verify enabling the policy takes effect immediately and that that user |
| 2456 // cannot disable the keyboard.. | 2539 // cannot disable the keyboard.. |
| 2457 PolicyMap policies; | 2540 PolicyMap policies; |
| 2458 policies.Set(key::kTouchVirtualKeyboardEnabled, | 2541 policies.Set(key::kTouchVirtualKeyboardEnabled, |
| 2459 POLICY_LEVEL_MANDATORY, | 2542 POLICY_LEVEL_MANDATORY, |
| 2460 POLICY_SCOPE_USER, | 2543 POLICY_SCOPE_USER, |
| 2461 base::Value::CreateBooleanValue(true), | 2544 new base::FundamentalValue(true), |
| 2462 NULL); | 2545 NULL); |
| 2463 UpdateProviderPolicy(policies); | 2546 UpdateProviderPolicy(policies); |
| 2464 EXPECT_TRUE(keyboard::IsKeyboardEnabled()); | 2547 EXPECT_TRUE(keyboard::IsKeyboardEnabled()); |
| 2465 keyboard::SetTouchKeyboardEnabled(false); | 2548 keyboard::SetTouchKeyboardEnabled(false); |
| 2466 EXPECT_TRUE(keyboard::IsKeyboardEnabled()); | 2549 EXPECT_TRUE(keyboard::IsKeyboardEnabled()); |
| 2467 | 2550 |
| 2468 // Verify that disabling the policy takes effect immediately and that the user | 2551 // Verify that disabling the policy takes effect immediately and that the user |
| 2469 // cannot enable the keyboard. | 2552 // cannot enable the keyboard. |
| 2470 policies.Set(key::kTouchVirtualKeyboardEnabled, | 2553 policies.Set(key::kTouchVirtualKeyboardEnabled, |
| 2471 POLICY_LEVEL_MANDATORY, | 2554 POLICY_LEVEL_MANDATORY, |
| 2472 POLICY_SCOPE_USER, | 2555 POLICY_SCOPE_USER, |
| 2473 base::Value::CreateBooleanValue(false), | 2556 new base::FundamentalValue(false), |
| 2474 NULL); | 2557 NULL); |
| 2475 UpdateProviderPolicy(policies); | 2558 UpdateProviderPolicy(policies); |
| 2476 EXPECT_FALSE(keyboard::IsKeyboardEnabled()); | 2559 EXPECT_FALSE(keyboard::IsKeyboardEnabled()); |
| 2477 keyboard::SetTouchKeyboardEnabled(true); | 2560 keyboard::SetTouchKeyboardEnabled(true); |
| 2478 EXPECT_FALSE(keyboard::IsKeyboardEnabled()); | 2561 EXPECT_FALSE(keyboard::IsKeyboardEnabled()); |
| 2479 } | 2562 } |
| 2480 | 2563 |
| 2481 #endif | 2564 #endif |
| 2482 | 2565 |
| 2483 namespace { | 2566 namespace { |
| (...skipping 49 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2533 | 2616 |
| 2534 void HomepageIsNotNTP() { | 2617 void HomepageIsNotNTP() { |
| 2535 // Verifies that policy can set the startup pages to the homepage, when | 2618 // Verifies that policy can set the startup pages to the homepage, when |
| 2536 // the homepage is not the NTP. | 2619 // the homepage is not the NTP. |
| 2537 PolicyMap policies; | 2620 PolicyMap policies; |
| 2538 policies.Set( | 2621 policies.Set( |
| 2539 key::kRestoreOnStartup, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 2622 key::kRestoreOnStartup, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
| 2540 base::Value::CreateIntegerValue( | 2623 base::Value::CreateIntegerValue( |
| 2541 SessionStartupPref::kPrefValueHomePage), | 2624 SessionStartupPref::kPrefValueHomePage), |
| 2542 NULL); | 2625 NULL); |
| 2543 policies.Set( | 2626 policies.Set(key::kHomepageIsNewTabPage, |
| 2544 key::kHomepageIsNewTabPage, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 2627 POLICY_LEVEL_MANDATORY, |
| 2545 base::Value::CreateBooleanValue(false), NULL); | 2628 POLICY_SCOPE_USER, |
| 2629 new base::FundamentalValue(false), |
| 2630 NULL); |
| 2546 policies.Set( | 2631 policies.Set( |
| 2547 key::kHomepageLocation, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 2632 key::kHomepageLocation, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
| 2548 base::Value::CreateStringValue(kRestoredURLs[1]), NULL); | 2633 base::Value::CreateStringValue(kRestoredURLs[1]), NULL); |
| 2549 provider_.UpdateChromePolicy(policies); | 2634 provider_.UpdateChromePolicy(policies); |
| 2550 | 2635 |
| 2551 expected_urls_.push_back(GURL(kRestoredURLs[1])); | 2636 expected_urls_.push_back(GURL(kRestoredURLs[1])); |
| 2552 } | 2637 } |
| 2553 | 2638 |
| 2554 void HomepageIsNTP() { | 2639 void HomepageIsNTP() { |
| 2555 // Verifies that policy can set the startup pages to the homepage, when | 2640 // Verifies that policy can set the startup pages to the homepage, when |
| 2556 // the homepage is the NTP. | 2641 // the homepage is the NTP. |
| 2557 PolicyMap policies; | 2642 PolicyMap policies; |
| 2558 policies.Set( | 2643 policies.Set( |
| 2559 key::kRestoreOnStartup, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 2644 key::kRestoreOnStartup, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
| 2560 base::Value::CreateIntegerValue( | 2645 base::Value::CreateIntegerValue( |
| 2561 SessionStartupPref::kPrefValueHomePage), | 2646 SessionStartupPref::kPrefValueHomePage), |
| 2562 NULL); | 2647 NULL); |
| 2563 policies.Set( | 2648 policies.Set(key::kHomepageIsNewTabPage, |
| 2564 key::kHomepageIsNewTabPage, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 2649 POLICY_LEVEL_MANDATORY, |
| 2565 base::Value::CreateBooleanValue(true), NULL); | 2650 POLICY_SCOPE_USER, |
| 2651 new base::FundamentalValue(true), |
| 2652 NULL); |
| 2566 provider_.UpdateChromePolicy(policies); | 2653 provider_.UpdateChromePolicy(policies); |
| 2567 | 2654 |
| 2568 expected_urls_.push_back(GURL(chrome::kChromeUINewTabURL)); | 2655 expected_urls_.push_back(GURL(chrome::kChromeUINewTabURL)); |
| 2569 } | 2656 } |
| 2570 | 2657 |
| 2571 void ListOfURLs() { | 2658 void ListOfURLs() { |
| 2572 // Verifies that policy can set the startup pages to a list of URLs. | 2659 // Verifies that policy can set the startup pages to a list of URLs. |
| 2573 base::ListValue urls; | 2660 base::ListValue urls; |
| 2574 for (size_t i = 0; i < arraysize(kRestoredURLs); ++i) { | 2661 for (size_t i = 0; i < arraysize(kRestoredURLs); ++i) { |
| 2575 urls.Append(base::Value::CreateStringValue(kRestoredURLs[i])); | 2662 urls.Append(base::Value::CreateStringValue(kRestoredURLs[i])); |
| (...skipping 79 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2655 // Similar to PolicyTest but sets a couple of policies before the browser is | 2742 // Similar to PolicyTest but sets a couple of policies before the browser is |
| 2656 // started. | 2743 // started. |
| 2657 class PolicyStatisticsCollectorTest : public PolicyTest { | 2744 class PolicyStatisticsCollectorTest : public PolicyTest { |
| 2658 public: | 2745 public: |
| 2659 PolicyStatisticsCollectorTest() {} | 2746 PolicyStatisticsCollectorTest() {} |
| 2660 virtual ~PolicyStatisticsCollectorTest() {} | 2747 virtual ~PolicyStatisticsCollectorTest() {} |
| 2661 | 2748 |
| 2662 virtual void SetUpInProcessBrowserTestFixture() OVERRIDE { | 2749 virtual void SetUpInProcessBrowserTestFixture() OVERRIDE { |
| 2663 PolicyTest::SetUpInProcessBrowserTestFixture(); | 2750 PolicyTest::SetUpInProcessBrowserTestFixture(); |
| 2664 PolicyMap policies; | 2751 PolicyMap policies; |
| 2665 policies.Set( | 2752 policies.Set(key::kShowHomeButton, |
| 2666 key::kShowHomeButton, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 2753 POLICY_LEVEL_MANDATORY, |
| 2667 base::Value::CreateBooleanValue(true), NULL); | 2754 POLICY_SCOPE_USER, |
| 2668 policies.Set( | 2755 new base::FundamentalValue(true), |
| 2669 key::kBookmarkBarEnabled, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 2756 NULL); |
| 2670 base::Value::CreateBooleanValue(false), NULL); | 2757 policies.Set(key::kBookmarkBarEnabled, |
| 2758 POLICY_LEVEL_MANDATORY, |
| 2759 POLICY_SCOPE_USER, |
| 2760 new base::FundamentalValue(false), |
| 2761 NULL); |
| 2671 policies.Set( | 2762 policies.Set( |
| 2672 key::kHomepageLocation, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 2763 key::kHomepageLocation, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
| 2673 base::Value::CreateStringValue("http://chromium.org"), NULL); | 2764 base::Value::CreateStringValue("http://chromium.org"), NULL); |
| 2674 provider_.UpdateChromePolicy(policies); | 2765 provider_.UpdateChromePolicy(policies); |
| 2675 } | 2766 } |
| 2676 }; | 2767 }; |
| 2677 | 2768 |
| 2678 IN_PROC_BROWSER_TEST_F(PolicyStatisticsCollectorTest, Startup) { | 2769 IN_PROC_BROWSER_TEST_F(PolicyStatisticsCollectorTest, Startup) { |
| 2679 // Verifies that policy usage histograms are collected at startup. | 2770 // Verifies that policy usage histograms are collected at startup. |
| 2680 | 2771 |
| (...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2727 // Configure a given policy map. | 2818 // Configure a given policy map. |
| 2728 // The |policy_name| is the name of either the audio or video capture allow | 2819 // The |policy_name| is the name of either the audio or video capture allow |
| 2729 // policy and must never be NULL. | 2820 // policy and must never be NULL. |
| 2730 // |whitelist_policy| and |allow_rule| are optional. If NULL, no whitelist | 2821 // |whitelist_policy| and |allow_rule| are optional. If NULL, no whitelist |
| 2731 // policy is set. If non-NULL, the request_url_ will be set to be non empty | 2822 // policy is set. If non-NULL, the request_url_ will be set to be non empty |
| 2732 // and the whitelist policy is set to contain either the |allow_rule| (if | 2823 // and the whitelist policy is set to contain either the |allow_rule| (if |
| 2733 // non-NULL) or an "allow all" wildcard. | 2824 // non-NULL) or an "allow all" wildcard. |
| 2734 void ConfigurePolicyMap(PolicyMap* policies, const char* policy_name, | 2825 void ConfigurePolicyMap(PolicyMap* policies, const char* policy_name, |
| 2735 const char* whitelist_policy, | 2826 const char* whitelist_policy, |
| 2736 const char* allow_rule) { | 2827 const char* allow_rule) { |
| 2737 policies->Set(policy_name, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 2828 policies->Set(policy_name, |
| 2738 base::Value::CreateBooleanValue(policy_value_), NULL); | 2829 POLICY_LEVEL_MANDATORY, |
| 2830 POLICY_SCOPE_USER, |
| 2831 new base::FundamentalValue(policy_value_), |
| 2832 NULL); |
| 2739 | 2833 |
| 2740 if (whitelist_policy) { | 2834 if (whitelist_policy) { |
| 2741 // TODO(tommi): Remove the kiosk mode flag when the whitelist is visible | 2835 // TODO(tommi): Remove the kiosk mode flag when the whitelist is visible |
| 2742 // in the media exceptions UI. | 2836 // in the media exceptions UI. |
| 2743 // See discussion here: https://codereview.chromium.org/15738004/ | 2837 // See discussion here: https://codereview.chromium.org/15738004/ |
| 2744 CommandLine::ForCurrentProcess()->AppendSwitch(switches::kKioskMode); | 2838 CommandLine::ForCurrentProcess()->AppendSwitch(switches::kKioskMode); |
| 2745 | 2839 |
| 2746 // Add an entry to the whitelist that allows the specified URL regardless | 2840 // Add an entry to the whitelist that allows the specified URL regardless |
| 2747 // of the setting of kAudioCapturedAllowed. | 2841 // of the setting of kAudioCapturedAllowed. |
| 2748 request_url_ = GURL("http://www.example.com/foo"); | 2842 request_url_ = GURL("http://www.example.com/foo"); |
| (...skipping 288 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 3037 EXPECT_TRUE(content::ExecuteScriptAndExtractBool( | 3131 EXPECT_TRUE(content::ExecuteScriptAndExtractBool( |
| 3038 browser2->tab_strip_model()->GetActiveWebContents(), | 3132 browser2->tab_strip_model()->GetActiveWebContents(), |
| 3039 "domAutomationController.send(window.showModalDialog !== undefined);", | 3133 "domAutomationController.send(window.showModalDialog !== undefined);", |
| 3040 &result)); | 3134 &result)); |
| 3041 EXPECT_TRUE(result); | 3135 EXPECT_TRUE(result); |
| 3042 } | 3136 } |
| 3043 | 3137 |
| 3044 #endif // !defined(CHROME_OS) | 3138 #endif // !defined(CHROME_OS) |
| 3045 | 3139 |
| 3046 } // namespace policy | 3140 } // namespace policy |
| OLD | NEW |