Index: components/policy/core/common/cloud/cloud_policy_client_unittest.cc |
diff --git a/components/policy/core/common/cloud/cloud_policy_client_unittest.cc b/components/policy/core/common/cloud/cloud_policy_client_unittest.cc |
index 852a45c53d934aa8425a377ff72666163c24e819..73e8472631c7dd5da8f6a75b3b88d5979fb860bf 100644 |
--- a/components/policy/core/common/cloud/cloud_policy_client_unittest.cc |
+++ b/components/policy/core/common/cloud/cloud_policy_client_unittest.cc |
@@ -73,7 +73,7 @@ class CloudPolicyClientTest : public testing::Test { |
protected: |
CloudPolicyClientTest() |
: client_id_(kClientID), |
- policy_ns_key_(dm_protocol::kChromeUserPolicyType, std::string()) { |
+ policy_type_(dm_protocol::kChromeUserPolicyType) { |
em::DeviceRegisterRequest* register_request = |
registration_request_.mutable_register_request(); |
register_request->set_type(em::DeviceRegisterRequest::USER); |
@@ -125,7 +125,7 @@ class CloudPolicyClientTest : public testing::Test { |
user_affiliation, &status_provider_, |
&service_, |
request_context_)); |
- client_->AddNamespaceToFetch(policy_ns_key_); |
+ client_->AddPolicyTypeToFetch(policy_type_, ""); |
client_->AddObserver(&observer_); |
} |
@@ -173,8 +173,8 @@ class CloudPolicyClientTest : public testing::Test { |
} |
void CheckPolicyResponse() { |
- ASSERT_TRUE(client_->GetPolicyFor(policy_ns_key_)); |
- EXPECT_THAT(*client_->GetPolicyFor(policy_ns_key_), |
+ ASSERT_TRUE(client_->GetPolicyFor(policy_type_, "")); |
+ EXPECT_THAT(*client_->GetPolicyFor(policy_type_, ""), |
MatchProto(policy_response_.policy_response().response(0))); |
} |
@@ -199,7 +199,7 @@ class CloudPolicyClientTest : public testing::Test { |
base::MessageLoop loop_; |
std::string client_id_; |
- PolicyNamespaceKey policy_ns_key_; |
+ std::string policy_type_; |
MockDeviceManagementService service_; |
StrictMock<MockStatusProvider> status_provider_; |
StrictMock<MockCloudPolicyClientObserver> observer_; |
@@ -212,7 +212,7 @@ class CloudPolicyClientTest : public testing::Test { |
TEST_F(CloudPolicyClientTest, Init) { |
EXPECT_CALL(service_, CreateJob(_, _)).Times(0); |
EXPECT_FALSE(client_->is_registered()); |
- EXPECT_FALSE(client_->GetPolicyFor(policy_ns_key_)); |
+ EXPECT_FALSE(client_->GetPolicyFor(policy_type_, "")); |
EXPECT_EQ(0, client_->fetched_invalidation_version()); |
} |
@@ -221,7 +221,7 @@ TEST_F(CloudPolicyClientTest, SetupRegistrationAndPolicyFetch) { |
EXPECT_CALL(observer_, OnRegistrationStateChanged(_)); |
client_->SetupRegistration(kDMToken, client_id_); |
EXPECT_TRUE(client_->is_registered()); |
- EXPECT_FALSE(client_->GetPolicyFor(policy_ns_key_)); |
+ EXPECT_FALSE(client_->GetPolicyFor(policy_type_, "")); |
ExpectPolicyFetch(kDMToken, dm_protocol::kValueUserAffiliationNone); |
EXPECT_CALL(observer_, OnPolicyFetched(_)); |
@@ -237,7 +237,7 @@ TEST_F(CloudPolicyClientTest, RegistrationAndPolicyFetch) { |
client_->Register(em::DeviceRegisterRequest::USER, kOAuthToken, std::string(), |
false, std::string(), std::string()); |
EXPECT_TRUE(client_->is_registered()); |
- EXPECT_FALSE(client_->GetPolicyFor(policy_ns_key_)); |
+ EXPECT_FALSE(client_->GetPolicyFor(policy_type_, "")); |
EXPECT_EQ(DM_STATUS_SUCCESS, client_->status()); |
ExpectPolicyFetch(kDMToken, dm_protocol::kValueUserAffiliationNone); |
@@ -270,7 +270,7 @@ TEST_F(CloudPolicyClientTest, RegistrationNoToken) { |
client_->Register(em::DeviceRegisterRequest::USER, kOAuthToken, std::string(), |
false, std::string(), std::string()); |
EXPECT_FALSE(client_->is_registered()); |
- EXPECT_FALSE(client_->GetPolicyFor(policy_ns_key_)); |
+ EXPECT_FALSE(client_->GetPolicyFor(policy_type_, "")); |
EXPECT_EQ(DM_STATUS_RESPONSE_DECODING_ERROR, client_->status()); |
} |
@@ -284,7 +284,7 @@ TEST_F(CloudPolicyClientTest, RegistrationFailure) { |
client_->Register(em::DeviceRegisterRequest::USER, kOAuthToken, std::string(), |
false, std::string(), std::string()); |
EXPECT_FALSE(client_->is_registered()); |
- EXPECT_FALSE(client_->GetPolicyFor(policy_ns_key_)); |
+ EXPECT_FALSE(client_->GetPolicyFor(policy_type_, "")); |
EXPECT_EQ(DM_STATUS_REQUEST_FAILED, client_->status()); |
} |
@@ -404,7 +404,7 @@ TEST_F(CloudPolicyClientTest, BadPolicyResponse) { |
ExpectPolicyFetch(kDMToken, dm_protocol::kValueUserAffiliationNone); |
EXPECT_CALL(observer_, OnClientError(_)); |
client_->FetchPolicy(); |
- EXPECT_FALSE(client_->GetPolicyFor(policy_ns_key_)); |
+ EXPECT_FALSE(client_->GetPolicyFor(policy_type_, "")); |
EXPECT_EQ(DM_STATUS_RESPONSE_DECODING_ERROR, client_->status()); |
policy_response_.mutable_policy_response()->add_response()->set_policy_data( |
@@ -431,7 +431,7 @@ TEST_F(CloudPolicyClientTest, PolicyRequestFailure) { |
EXPECT_CALL(status_provider_, OnSubmittedSuccessfully()).Times(0); |
client_->FetchPolicy(); |
EXPECT_EQ(DM_STATUS_REQUEST_FAILED, client_->status()); |
- EXPECT_FALSE(client_->GetPolicyFor(policy_ns_key_)); |
+ EXPECT_FALSE(client_->GetPolicyFor(policy_type_, "")); |
} |
TEST_F(CloudPolicyClientTest, Unregister) { |
@@ -482,10 +482,12 @@ TEST_F(CloudPolicyClientTest, PolicyFetchWithExtensionPolicy) { |
"bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb", |
"cccccccccccccccccccccccccccccccc", |
}; |
- typedef std::map<PolicyNamespaceKey, em::PolicyFetchResponse> ResponseMap; |
+ typedef std::map<std::pair<std::string, std::string>, em::PolicyFetchResponse> |
+ ResponseMap; |
ResponseMap expected_responses; |
- std::set<PolicyNamespaceKey> expected_namespaces; |
- PolicyNamespaceKey key(dm_protocol::kChromeUserPolicyType, std::string()); |
+ std::set<std::pair<std::string, std::string>> expected_namespaces; |
+ std::pair<std::string, std::string> key(dm_protocol::kChromeUserPolicyType, |
+ ""); |
// Copy the user policy fetch request. |
expected_responses[key].CopyFrom( |
policy_response_.policy_response().response(0)); |
@@ -515,8 +517,8 @@ TEST_F(CloudPolicyClientTest, PolicyFetchWithExtensionPolicy) { |
EXPECT_CALL(observer_, OnPolicyFetched(_)); |
EXPECT_CALL(status_provider_, OnSubmittedSuccessfully()); |
for (size_t i = 0; i < arraysize(kExtensions); ++i) { |
- client_->AddNamespaceToFetch(PolicyNamespaceKey( |
- dm_protocol::kChromeExtensionPolicyType, kExtensions[i])); |
+ client_->AddPolicyTypeToFetch(dm_protocol::kChromeExtensionPolicyType, |
+ kExtensions[i]); |
} |
client_->FetchPolicy(); |
@@ -532,7 +534,8 @@ TEST_F(CloudPolicyClientTest, PolicyFetchWithExtensionPolicy) { |
std::string entity_id; |
if (fetch_request.has_settings_entity_id()) |
entity_id = fetch_request.settings_entity_id(); |
- PolicyNamespaceKey key(fetch_request.policy_type(), entity_id); |
+ std::pair<std::string, std::string> key(fetch_request.policy_type(), |
+ entity_id); |
EXPECT_EQ(1u, expected_namespaces.erase(key)); |
} |
EXPECT_TRUE(expected_namespaces.empty()); |
@@ -540,7 +543,8 @@ TEST_F(CloudPolicyClientTest, PolicyFetchWithExtensionPolicy) { |
// Verify that the client got all the responses mapped to their namespaces. |
for (ResponseMap::iterator it = expected_responses.begin(); |
it != expected_responses.end(); ++it) { |
- const em::PolicyFetchResponse* response = client_->GetPolicyFor(it->first); |
+ const em::PolicyFetchResponse* response = |
+ client_->GetPolicyFor(it->first.first, it->first.second); |
ASSERT_TRUE(response); |
EXPECT_EQ(it->second.SerializeAsString(), response->SerializeAsString()); |
} |