| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/bind.h" | 5 #include "base/bind.h" |
| 6 #include "base/bind_helpers.h" | 6 #include "base/bind_helpers.h" |
| 7 #include "base/callback.h" | 7 #include "base/callback.h" |
| 8 #include "base/files/file_path.h" | 8 #include "base/files/file_path.h" |
| 9 #include "base/memory/scoped_ptr.h" | 9 #include "base/memory/scoped_ptr.h" |
| 10 #include "base/run_loop.h" | 10 #include "base/run_loop.h" |
| 11 #include "base/values.h" | 11 #include "base/values.h" |
| 12 #include "chrome/browser/chromeos/policy/device_network_configuration_updater.h" | 12 #include "chrome/browser/chromeos/policy/device_network_configuration_updater.h" |
| 13 #include "chrome/browser/chromeos/policy/user_network_configuration_updater.h" | 13 #include "chrome/browser/chromeos/policy/user_network_configuration_updater.h" |
| 14 #include "chrome/browser/chromeos/settings/cros_settings.h" | 14 #include "chrome/browser/chromeos/settings/cros_settings.h" |
| 15 #include "chrome/browser/chromeos/settings/device_settings_service.h" | 15 #include "chrome/browser/chromeos/settings/device_settings_service.h" |
| 16 #include "chrome/browser/chromeos/settings/stub_cros_settings_provider.h" | 16 #include "chrome/browser/chromeos/settings/stub_cros_settings_provider.h" |
| 17 #include "chrome/test/base/testing_profile.h" | |
| 18 #include "chromeos/network/fake_network_device_handler.h" | 17 #include "chromeos/network/fake_network_device_handler.h" |
| 19 #include "chromeos/network/mock_managed_network_configuration_handler.h" | 18 #include "chromeos/network/mock_managed_network_configuration_handler.h" |
| 20 #include "chromeos/network/onc/onc_certificate_importer.h" | 19 #include "chromeos/network/onc/onc_certificate_importer.h" |
| 21 #include "chromeos/network/onc/onc_test_utils.h" | 20 #include "chromeos/network/onc/onc_test_utils.h" |
| 22 #include "chromeos/network/onc/onc_utils.h" | 21 #include "chromeos/network/onc/onc_utils.h" |
| 23 #include "components/onc/onc_constants.h" | 22 #include "components/onc/onc_constants.h" |
| 24 #include "components/policy/core/common/external_data_fetcher.h" | 23 #include "components/policy/core/common/external_data_fetcher.h" |
| 25 #include "components/policy/core/common/mock_configuration_policy_provider.h" | 24 #include "components/policy/core/common/mock_configuration_policy_provider.h" |
| 26 #include "components/policy/core/common/policy_map.h" | 25 #include "components/policy/core/common/policy_map.h" |
| 27 #include "components/policy/core/common/policy_service_impl.h" | 26 #include "components/policy/core/common/policy_service_impl.h" |
| (...skipping 219 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 247 base::RunLoop().RunUntilIdle(); | 246 base::RunLoop().RunUntilIdle(); |
| 248 } | 247 } |
| 249 | 248 |
| 250 void UpdateProviderPolicy(const PolicyMap& policy) { | 249 void UpdateProviderPolicy(const PolicyMap& policy) { |
| 251 provider_.UpdateChromePolicy(policy); | 250 provider_.UpdateChromePolicy(policy); |
| 252 base::RunLoop().RunUntilIdle(); | 251 base::RunLoop().RunUntilIdle(); |
| 253 } | 252 } |
| 254 | 253 |
| 255 UserNetworkConfigurationUpdater* | 254 UserNetworkConfigurationUpdater* |
| 256 CreateNetworkConfigurationUpdaterForUserPolicy( | 255 CreateNetworkConfigurationUpdaterForUserPolicy( |
| 257 bool allow_trusted_certs_from_policy, | 256 bool allow_trusted_certs_from_policy) { |
| 258 bool set_cert_importer) { | |
| 259 UserNetworkConfigurationUpdater* updater = | 257 UserNetworkConfigurationUpdater* updater = |
| 260 UserNetworkConfigurationUpdater::CreateForUserPolicy( | 258 UserNetworkConfigurationUpdater::CreateForUserPolicy( |
| 261 &profile_, | |
| 262 allow_trusted_certs_from_policy, | 259 allow_trusted_certs_from_policy, |
| 263 fake_user_, | 260 fake_user_, |
| 264 policy_service_.get(), | 261 policy_service_.get(), |
| 262 certificate_importer_owned_.Pass(), |
| 265 &network_config_handler_).release(); | 263 &network_config_handler_).release(); |
| 266 if (set_cert_importer) { | |
| 267 EXPECT_TRUE(certificate_importer_owned_); | |
| 268 updater->SetCertificateImporterForTest( | |
| 269 certificate_importer_owned_.Pass()); | |
| 270 } | |
| 271 network_configuration_updater_.reset(updater); | 264 network_configuration_updater_.reset(updater); |
| 272 return updater; | 265 return updater; |
| 273 } | 266 } |
| 274 | 267 |
| 275 void CreateNetworkConfigurationUpdaterForDevicePolicy() { | 268 void CreateNetworkConfigurationUpdaterForDevicePolicy() { |
| 276 network_configuration_updater_ = | 269 network_configuration_updater_ = |
| 277 DeviceNetworkConfigurationUpdater::CreateForDevicePolicy( | 270 DeviceNetworkConfigurationUpdater::CreateForDevicePolicy( |
| 278 policy_service_.get(), | 271 policy_service_.get(), |
| 279 &network_config_handler_, | 272 &network_config_handler_, |
| 280 &network_device_handler_, | 273 &network_device_handler_, |
| 281 chromeos::CrosSettings::Get()); | 274 chromeos::CrosSettings::Get()); |
| 282 } | 275 } |
| 283 | 276 |
| 284 base::ListValue fake_network_configs_; | 277 base::ListValue fake_network_configs_; |
| 285 base::DictionaryValue fake_global_network_config_; | 278 base::DictionaryValue fake_global_network_config_; |
| 286 base::ListValue fake_certificates_; | 279 base::ListValue fake_certificates_; |
| 287 StrictMock<chromeos::MockManagedNetworkConfigurationHandler> | 280 StrictMock<chromeos::MockManagedNetworkConfigurationHandler> |
| 288 network_config_handler_; | 281 network_config_handler_; |
| 289 FakeNetworkDeviceHandler network_device_handler_; | 282 FakeNetworkDeviceHandler network_device_handler_; |
| 290 | 283 |
| 291 // Not used directly. Required for CrosSettings. | 284 // Not used directly. Required for CrosSettings. |
| 292 chromeos::ScopedTestDeviceSettingsService scoped_device_settings_service_; | 285 chromeos::ScopedTestDeviceSettingsService scoped_device_settings_service_; |
| 293 chromeos::ScopedTestCrosSettings scoped_cros_settings_; | 286 chromeos::ScopedTestCrosSettings scoped_cros_settings_; |
| 294 | 287 |
| 295 // Ownership of certificate_importer_owned_ is passed to the | |
| 296 // NetworkConfigurationUpdater. When that happens, |certificate_importer_| | |
| 297 // continues to point to that instance but |certificate_importer_owned_| is | |
| 298 // released. | |
| 299 FakeCertificateImporter* certificate_importer_; | 288 FakeCertificateImporter* certificate_importer_; |
| 300 scoped_ptr<chromeos::onc::CertificateImporter> certificate_importer_owned_; | 289 scoped_ptr<chromeos::onc::CertificateImporter> certificate_importer_owned_; |
| 301 | 290 |
| 302 StrictMock<MockConfigurationPolicyProvider> provider_; | 291 StrictMock<MockConfigurationPolicyProvider> provider_; |
| 303 scoped_ptr<PolicyServiceImpl> policy_service_; | 292 scoped_ptr<PolicyServiceImpl> policy_service_; |
| 304 FakeUser fake_user_; | 293 FakeUser fake_user_; |
| 305 | 294 |
| 306 TestingProfile profile_; | |
| 307 | |
| 308 scoped_ptr<NetworkConfigurationUpdater> network_configuration_updater_; | 295 scoped_ptr<NetworkConfigurationUpdater> network_configuration_updater_; |
| 309 content::TestBrowserThreadBundle thread_bundle_; | 296 content::TestBrowserThreadBundle thread_bundle_; |
| 310 }; | 297 }; |
| 311 | 298 |
| 312 TEST_F(NetworkConfigurationUpdaterTest, CellularAllowRoaming) { | 299 TEST_F(NetworkConfigurationUpdaterTest, CellularAllowRoaming) { |
| 313 // Ignore network config updates. | 300 // Ignore network config updates. |
| 314 EXPECT_CALL(network_config_handler_, SetPolicy(_, _, _, _)).Times(AtLeast(1)); | 301 EXPECT_CALL(network_config_handler_, SetPolicy(_, _, _, _)).Times(AtLeast(1)); |
| 315 | 302 |
| 316 // Setup the DataRoaming device setting. | 303 // Setup the DataRoaming device setting. |
| 317 chromeos::CrosSettings* cros_settings = chromeos::CrosSettings::Get(); | 304 chromeos::CrosSettings* cros_settings = chromeos::CrosSettings::Get(); |
| (...skipping 47 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 365 UpdateProviderPolicy(policy); | 352 UpdateProviderPolicy(policy); |
| 366 | 353 |
| 367 EXPECT_CALL(network_config_handler_, | 354 EXPECT_CALL(network_config_handler_, |
| 368 SetPolicy(onc::ONC_SOURCE_USER_POLICY, | 355 SetPolicy(onc::ONC_SOURCE_USER_POLICY, |
| 369 _, | 356 _, |
| 370 IsEqualTo(network_configs_repaired), | 357 IsEqualTo(network_configs_repaired), |
| 371 IsEqualTo(global_config_repaired))); | 358 IsEqualTo(global_config_repaired))); |
| 372 certificate_importer_->SetExpectedONCSource(onc::ONC_SOURCE_USER_POLICY); | 359 certificate_importer_->SetExpectedONCSource(onc::ONC_SOURCE_USER_POLICY); |
| 373 | 360 |
| 374 CreateNetworkConfigurationUpdaterForUserPolicy( | 361 CreateNetworkConfigurationUpdaterForUserPolicy( |
| 375 false /* do not allow trusted certs from policy */, | 362 false /* do not allow trusted certs from policy */); |
| 376 true /* set certificate importer */); | |
| 377 MarkPolicyProviderInitialized(); | 363 MarkPolicyProviderInitialized(); |
| 378 EXPECT_EQ(1u, certificate_importer_->GetAndResetImportCount()); | 364 EXPECT_EQ(1u, certificate_importer_->GetAndResetImportCount()); |
| 379 } | 365 } |
| 380 | 366 |
| 381 TEST_F(NetworkConfigurationUpdaterTest, | 367 TEST_F(NetworkConfigurationUpdaterTest, |
| 382 DoNotAllowTrustedCertificatesFromPolicy) { | 368 DoNotAllowTrustedCertificatesFromPolicy) { |
| 383 net::CertificateList cert_list; | 369 net::CertificateList cert_list; |
| 384 cert_list = | 370 cert_list = |
| 385 net::CreateCertificateListFromFile(net::GetTestCertsDirectory(), | 371 net::CreateCertificateListFromFile(net::GetTestCertsDirectory(), |
| 386 "ok_cert.pem", | 372 "ok_cert.pem", |
| 387 net::X509Certificate::FORMAT_AUTO); | 373 net::X509Certificate::FORMAT_AUTO); |
| 388 ASSERT_EQ(1u, cert_list.size()); | 374 ASSERT_EQ(1u, cert_list.size()); |
| 389 | 375 |
| 390 EXPECT_CALL(network_config_handler_, | 376 EXPECT_CALL(network_config_handler_, |
| 391 SetPolicy(onc::ONC_SOURCE_USER_POLICY, _, _, _)); | 377 SetPolicy(onc::ONC_SOURCE_USER_POLICY, _, _, _)); |
| 392 certificate_importer_->SetTrustedCertificatesResult(cert_list); | 378 certificate_importer_->SetTrustedCertificatesResult(cert_list); |
| 393 | 379 |
| 394 UserNetworkConfigurationUpdater* updater = | 380 UserNetworkConfigurationUpdater* updater = |
| 395 CreateNetworkConfigurationUpdaterForUserPolicy( | 381 CreateNetworkConfigurationUpdaterForUserPolicy( |
| 396 false /* do not allow trusted certs from policy */, | 382 false /* do not allow trusted certs from policy */); |
| 397 true /* set certificate importer */); | |
| 398 MarkPolicyProviderInitialized(); | 383 MarkPolicyProviderInitialized(); |
| 399 | 384 |
| 400 // Certificates with the "Web" trust flag set should not be forwarded to | 385 // Certificates with the "Web" trust flag set should not be forwarded to |
| 401 // observers. | 386 // observers. |
| 402 FakeWebTrustedCertsObserver observer; | 387 FakeWebTrustedCertsObserver observer; |
| 403 updater->AddTrustedCertsObserver(&observer); | 388 updater->AddTrustedCertsObserver(&observer); |
| 404 | 389 |
| 405 base::RunLoop().RunUntilIdle(); | 390 base::RunLoop().RunUntilIdle(); |
| 406 | 391 |
| 407 net::CertificateList trust_anchors; | 392 net::CertificateList trust_anchors; |
| (...skipping 15 matching lines...) Expand all Loading... |
| 423 net::CreateCertificateListFromFile(net::GetTestCertsDirectory(), | 408 net::CreateCertificateListFromFile(net::GetTestCertsDirectory(), |
| 424 "ok_cert.pem", | 409 "ok_cert.pem", |
| 425 net::X509Certificate::FORMAT_AUTO); | 410 net::X509Certificate::FORMAT_AUTO); |
| 426 ASSERT_EQ(1u, cert_list.size()); | 411 ASSERT_EQ(1u, cert_list.size()); |
| 427 | 412 |
| 428 certificate_importer_->SetExpectedONCSource(onc::ONC_SOURCE_USER_POLICY); | 413 certificate_importer_->SetExpectedONCSource(onc::ONC_SOURCE_USER_POLICY); |
| 429 certificate_importer_->SetTrustedCertificatesResult(cert_list); | 414 certificate_importer_->SetTrustedCertificatesResult(cert_list); |
| 430 | 415 |
| 431 UserNetworkConfigurationUpdater* updater = | 416 UserNetworkConfigurationUpdater* updater = |
| 432 CreateNetworkConfigurationUpdaterForUserPolicy( | 417 CreateNetworkConfigurationUpdaterForUserPolicy( |
| 433 true /* allow trusted certs from policy */, | 418 true /* allow trusted certs from policy */); |
| 434 true /* set certificate importer */); | |
| 435 MarkPolicyProviderInitialized(); | 419 MarkPolicyProviderInitialized(); |
| 436 | 420 |
| 437 base::RunLoop().RunUntilIdle(); | 421 base::RunLoop().RunUntilIdle(); |
| 438 | 422 |
| 439 // Certificates with the "Web" trust flag set will be returned. | 423 // Certificates with the "Web" trust flag set will be returned. |
| 440 net::CertificateList trust_anchors; | 424 net::CertificateList trust_anchors; |
| 441 updater->GetWebTrustedCertificates(&trust_anchors); | 425 updater->GetWebTrustedCertificates(&trust_anchors); |
| 442 EXPECT_EQ(1u, trust_anchors.size()); | 426 EXPECT_EQ(1u, trust_anchors.size()); |
| 443 } | 427 } |
| 444 | 428 |
| 445 TEST_F(NetworkConfigurationUpdaterTest, | 429 TEST_F(NetworkConfigurationUpdaterTest, |
| 446 AllowTrustedCertificatesFromPolicyOnUpdate) { | 430 AllowTrustedCertificatesFromPolicyOnUpdate) { |
| 447 // Ignore network configuration changes. | 431 // Ignore network configuration changes. |
| 448 EXPECT_CALL(network_config_handler_, SetPolicy(_, _, _, _)) | 432 EXPECT_CALL(network_config_handler_, SetPolicy(_, _, _, _)) |
| 449 .Times(AnyNumber()); | 433 .Times(AnyNumber()); |
| 450 | 434 |
| 451 // Start with an empty certificate list. | 435 // Start with an empty certificate list. |
| 452 UserNetworkConfigurationUpdater* updater = | 436 UserNetworkConfigurationUpdater* updater = |
| 453 CreateNetworkConfigurationUpdaterForUserPolicy( | 437 CreateNetworkConfigurationUpdaterForUserPolicy( |
| 454 true /* allow trusted certs from policy */, | 438 true /* allow trusted certs from policy */); |
| 455 true /* set certificate importer */); | |
| 456 MarkPolicyProviderInitialized(); | 439 MarkPolicyProviderInitialized(); |
| 457 | 440 |
| 458 FakeWebTrustedCertsObserver observer; | 441 FakeWebTrustedCertsObserver observer; |
| 459 updater->AddTrustedCertsObserver(&observer); | 442 updater->AddTrustedCertsObserver(&observer); |
| 460 | 443 |
| 461 base::RunLoop().RunUntilIdle(); | 444 base::RunLoop().RunUntilIdle(); |
| 462 | 445 |
| 463 // Verify that the returned certificate list is empty. | 446 // Verify that the returned certificate list is empty. |
| 464 { | 447 { |
| 465 net::CertificateList trust_anchors; | 448 net::CertificateList trust_anchors; |
| (...skipping 27 matching lines...) Expand all Loading... |
| 493 { | 476 { |
| 494 net::CertificateList trust_anchors; | 477 net::CertificateList trust_anchors; |
| 495 updater->GetWebTrustedCertificates(&trust_anchors); | 478 updater->GetWebTrustedCertificates(&trust_anchors); |
| 496 EXPECT_EQ(1u, trust_anchors.size()); | 479 EXPECT_EQ(1u, trust_anchors.size()); |
| 497 } | 480 } |
| 498 EXPECT_EQ(1u, observer.trust_anchors_.size()); | 481 EXPECT_EQ(1u, observer.trust_anchors_.size()); |
| 499 | 482 |
| 500 updater->RemoveTrustedCertsObserver(&observer); | 483 updater->RemoveTrustedCertsObserver(&observer); |
| 501 } | 484 } |
| 502 | 485 |
| 503 TEST_F(NetworkConfigurationUpdaterTest, | |
| 504 DontImportCertificateBeforeCertificateImporterSet) { | |
| 505 PolicyMap policy; | |
| 506 policy.Set(key::kOpenNetworkConfiguration, POLICY_LEVEL_MANDATORY, | |
| 507 POLICY_SCOPE_USER, new base::StringValue(kFakeONC), NULL); | |
| 508 UpdateProviderPolicy(policy); | |
| 509 | |
| 510 EXPECT_CALL(network_config_handler_, | |
| 511 SetPolicy(onc::ONC_SOURCE_USER_POLICY, | |
| 512 kFakeUsernameHash, | |
| 513 IsEqualTo(&fake_network_configs_), | |
| 514 IsEqualTo(&fake_global_network_config_))); | |
| 515 | |
| 516 UserNetworkConfigurationUpdater* updater = | |
| 517 CreateNetworkConfigurationUpdaterForUserPolicy( | |
| 518 true /* allow trusted certs from policy */, | |
| 519 false /* do not set certificate importer */); | |
| 520 MarkPolicyProviderInitialized(); | |
| 521 | |
| 522 Mock::VerifyAndClearExpectations(&network_config_handler_); | |
| 523 EXPECT_EQ(0u, certificate_importer_->GetAndResetImportCount()); | |
| 524 | |
| 525 certificate_importer_->SetExpectedONCCertificates(fake_certificates_); | |
| 526 certificate_importer_->SetExpectedONCSource(onc::ONC_SOURCE_USER_POLICY); | |
| 527 | |
| 528 ASSERT_TRUE(certificate_importer_owned_); | |
| 529 updater->SetCertificateImporterForTest(certificate_importer_owned_.Pass()); | |
| 530 EXPECT_EQ(1u, certificate_importer_->GetAndResetImportCount()); | |
| 531 } | |
| 532 | |
| 533 class NetworkConfigurationUpdaterTestWithParam | 486 class NetworkConfigurationUpdaterTestWithParam |
| 534 : public NetworkConfigurationUpdaterTest, | 487 : public NetworkConfigurationUpdaterTest, |
| 535 public testing::WithParamInterface<const char*> { | 488 public testing::WithParamInterface<const char*> { |
| 536 protected: | 489 protected: |
| 537 // Returns the currently tested ONC source. | 490 // Returns the currently tested ONC source. |
| 538 onc::ONCSource CurrentONCSource() { | 491 onc::ONCSource CurrentONCSource() { |
| 539 if (GetParam() == key::kOpenNetworkConfiguration) | 492 if (GetParam() == key::kOpenNetworkConfiguration) |
| 540 return onc::ONC_SOURCE_USER_POLICY; | 493 return onc::ONC_SOURCE_USER_POLICY; |
| 541 DCHECK(GetParam() == key::kDeviceOpenNetworkConfiguration); | 494 DCHECK(GetParam() == key::kDeviceOpenNetworkConfiguration); |
| 542 return onc::ONC_SOURCE_DEVICE_POLICY; | 495 return onc::ONC_SOURCE_DEVICE_POLICY; |
| 543 } | 496 } |
| 544 | 497 |
| 545 // Returns the expected username hash to push policies to | 498 // Returns the expected username hash to push policies to |
| 546 // ManagedNetworkConfigurationHandler. | 499 // ManagedNetworkConfigurationHandler. |
| 547 std::string ExpectedUsernameHash() { | 500 std::string ExpectedUsernameHash() { |
| 548 if (GetParam() == key::kOpenNetworkConfiguration) | 501 if (GetParam() == key::kOpenNetworkConfiguration) |
| 549 return kFakeUsernameHash; | 502 return kFakeUsernameHash; |
| 550 return std::string(); | 503 return std::string(); |
| 551 } | 504 } |
| 552 | 505 |
| 553 size_t ExpectedImportCertificatesCallCount() { | 506 size_t ExpectedImportCertificatesCallCount() { |
| 554 if (GetParam() == key::kOpenNetworkConfiguration) | 507 if (GetParam() == key::kOpenNetworkConfiguration) |
| 555 return 1u; | 508 return 1u; |
| 556 return 0u; | 509 return 0u; |
| 557 } | 510 } |
| 558 | 511 |
| 559 void CreateNetworkConfigurationUpdater() { | 512 void CreateNetworkConfigurationUpdater() { |
| 560 if (GetParam() == key::kOpenNetworkConfiguration) { | 513 if (GetParam() == key::kOpenNetworkConfiguration) { |
| 561 CreateNetworkConfigurationUpdaterForUserPolicy( | 514 CreateNetworkConfigurationUpdaterForUserPolicy( |
| 562 false /* do not allow trusted certs from policy */, | 515 false /* do not allow trusted certs from policy */); |
| 563 true /* set certificate importer */); | |
| 564 } else { | 516 } else { |
| 565 CreateNetworkConfigurationUpdaterForDevicePolicy(); | 517 CreateNetworkConfigurationUpdaterForDevicePolicy(); |
| 566 } | 518 } |
| 567 } | 519 } |
| 568 }; | 520 }; |
| 569 | 521 |
| 570 TEST_P(NetworkConfigurationUpdaterTestWithParam, InitialUpdates) { | 522 TEST_P(NetworkConfigurationUpdaterTestWithParam, InitialUpdates) { |
| 571 PolicyMap policy; | 523 PolicyMap policy; |
| 572 policy.Set(GetParam(), POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 524 policy.Set(GetParam(), POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
| 573 new base::StringValue(kFakeONC), NULL); | 525 new base::StringValue(kFakeONC), NULL); |
| (...skipping 99 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 673 EXPECT_EQ(ExpectedImportCertificatesCallCount(), | 625 EXPECT_EQ(ExpectedImportCertificatesCallCount(), |
| 674 certificate_importer_->GetAndResetImportCount()); | 626 certificate_importer_->GetAndResetImportCount()); |
| 675 } | 627 } |
| 676 | 628 |
| 677 INSTANTIATE_TEST_CASE_P(NetworkConfigurationUpdaterTestWithParamInstance, | 629 INSTANTIATE_TEST_CASE_P(NetworkConfigurationUpdaterTestWithParamInstance, |
| 678 NetworkConfigurationUpdaterTestWithParam, | 630 NetworkConfigurationUpdaterTestWithParam, |
| 679 testing::Values(key::kDeviceOpenNetworkConfiguration, | 631 testing::Values(key::kDeviceOpenNetworkConfiguration, |
| 680 key::kOpenNetworkConfiguration)); | 632 key::kOpenNetworkConfiguration)); |
| 681 | 633 |
| 682 } // namespace policy | 634 } // namespace policy |
| OLD | NEW |