Commit 37252098 authored by Aya ElAttar's avatar Aya ElAttar Committed by Commit Bot

Migrate PolicyMap::Set to use base::Value

Changed PolicyMap::Set to pass value as base::Value
instead of unique_ptr.

Bug: 2270317
Change-Id: I67f48019310bff57c485bc551da74739df4198f5
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2297560
Auto-Submit: Aya Elsayed <ayaelattar@google.com>
Commit-Queue: Avi Drissman <avi@chromium.org>
Reviewed-by: default avatarAvi Drissman <avi@chromium.org>
Reviewed-by: default avatarMaksim Ivanov <emaxx@chromium.org>
Cr-Commit-Position: refs/heads/master@{#788318}
parent 64ecc629
...@@ -42,7 +42,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest, ...@@ -42,7 +42,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest,
PolicyMap policies; PolicyMap policies;
policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY, policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
protocol_origins_map.CreateDeepCopy(), nullptr); protocol_origins_map.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
block_state = ExternalProtocolHandler::GetBlockState( block_state = ExternalProtocolHandler::GetBlockState(
...@@ -74,7 +74,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest, ...@@ -74,7 +74,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest,
PolicyMap policies; PolicyMap policies;
policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY, policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
protocol_origins_map_list.CreateDeepCopy(), nullptr); protocol_origins_map_list.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
block_state = ExternalProtocolHandler::GetBlockState( block_state = ExternalProtocolHandler::GetBlockState(
...@@ -102,7 +102,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest, ...@@ -102,7 +102,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest,
PolicyMap policies; PolicyMap policies;
policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY, policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
protocol_origins_map_list.CreateDeepCopy(), nullptr); protocol_origins_map_list.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
url::Origin test_origin = url::Origin::Create(GURL("https://example.test")); url::Origin test_origin = url::Origin::Create(GURL("https://example.test"));
...@@ -155,7 +155,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest, ...@@ -155,7 +155,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest,
PolicyMap policies; PolicyMap policies;
policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY, policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
protocol_origins_map_list.CreateDeepCopy(), nullptr); protocol_origins_map_list.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
url::Origin test_origin = url::Origin::Create(GURL("https://example.test")); url::Origin test_origin = url::Origin::Create(GURL("https://example.test"));
...@@ -186,7 +186,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest, ...@@ -186,7 +186,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest,
PolicyMap policies; PolicyMap policies;
policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY, policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
protocol_origins_map_list.CreateDeepCopy(), nullptr); protocol_origins_map_list.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
// Test that secure origin matches. // Test that secure origin matches.
...@@ -231,7 +231,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest, ...@@ -231,7 +231,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest,
PolicyMap policies; PolicyMap policies;
policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY, policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
protocol_origins_map_list.CreateDeepCopy(), nullptr); protocol_origins_map_list.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
// Test that secure origin matches. // Test that secure origin matches.
...@@ -276,7 +276,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest, ...@@ -276,7 +276,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest,
PolicyMap policies; PolicyMap policies;
policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY, policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
protocol_origins_map_list.CreateDeepCopy(), nullptr); protocol_origins_map_list.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
// Test that a subdomain matches. // Test that a subdomain matches.
...@@ -309,7 +309,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest, ...@@ -309,7 +309,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest,
PolicyMap policies; PolicyMap policies;
policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY, policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
protocol_origins_map_list.CreateDeepCopy(), nullptr); protocol_origins_map_list.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
// Test that secure origin matches. // Test that secure origin matches.
...@@ -348,7 +348,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest, ...@@ -348,7 +348,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest,
PolicyMap policies; PolicyMap policies;
policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY, policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
protocol_origins_map_list.CreateDeepCopy(), nullptr); protocol_origins_map_list.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
// Test that default HTTPS port 443 matches. // Test that default HTTPS port 443 matches.
...@@ -393,7 +393,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest, ...@@ -393,7 +393,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest,
PolicyMap policies; PolicyMap policies;
policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY, policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
protocol_origins_map_list.CreateDeepCopy(), nullptr); protocol_origins_map_list.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
url::Origin test_origin = url::Origin test_origin =
...@@ -425,7 +425,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest, ...@@ -425,7 +425,7 @@ IN_PROC_BROWSER_TEST_F(ExternalProtocolPolicyBrowserTest,
PolicyMap policies; PolicyMap policies;
policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY, policies.Set(key::kAutoLaunchProtocolsFromOrigins, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
protocol_origins_map_list.CreateDeepCopy(), nullptr); protocol_origins_map_list.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
url::Origin test_origin = url::Origin::Create(GURL(kFullUrlWithPath)); url::Origin test_origin = url::Origin::Create(GURL(kFullUrlWithPath));
......
...@@ -51,7 +51,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SafeBrowsingExtendedReportingPolicyManaged) { ...@@ -51,7 +51,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SafeBrowsingExtendedReportingPolicyManaged) {
PolicyMap policies; PolicyMap policies;
policies.Set(key::kSafeBrowsingExtendedReportingEnabled, policies.Set(key::kSafeBrowsingExtendedReportingEnabled,
POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
base::WrapUnique(new base::Value(false)), nullptr); base::Value(false), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
// Policy should have overwritten the pref, and it should be managed. // Policy should have overwritten the pref, and it should be managed.
EXPECT_FALSE(prefs->GetBoolean(prefs::kSafeBrowsingScoutReportingEnabled)); EXPECT_FALSE(prefs->GetBoolean(prefs::kSafeBrowsingScoutReportingEnabled));
...@@ -93,7 +93,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SafeBrowsingWhitelistDomains) { ...@@ -93,7 +93,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SafeBrowsingWhitelistDomains) {
whitelist_domains.AppendString("mydomain.net"); whitelist_domains.AppendString("mydomain.net");
policies.Set(key::kSafeBrowsingWhitelistDomains, POLICY_LEVEL_MANDATORY, policies.Set(key::kSafeBrowsingWhitelistDomains, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
whitelist_domains.CreateDeepCopy(), nullptr); whitelist_domains.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
EXPECT_TRUE( EXPECT_TRUE(
prefs->FindPreference(prefs::kSafeBrowsingWhitelistDomains)->IsManaged()); prefs->FindPreference(prefs::kSafeBrowsingWhitelistDomains)->IsManaged());
...@@ -108,7 +108,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SafeBrowsingWhitelistDomains) { ...@@ -108,7 +108,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, SafeBrowsingWhitelistDomains) {
whitelist_domains.AppendString(std::string("%EF%BF%BDzyx.com")); whitelist_domains.AppendString(std::string("%EF%BF%BDzyx.com"));
policies.Set(key::kSafeBrowsingWhitelistDomains, POLICY_LEVEL_MANDATORY, policies.Set(key::kSafeBrowsingWhitelistDomains, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
whitelist_domains.CreateDeepCopy(), nullptr); whitelist_domains.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
EXPECT_TRUE( EXPECT_TRUE(
prefs->FindPreference(prefs::kSafeBrowsingWhitelistDomains)->IsManaged()); prefs->FindPreference(prefs::kSafeBrowsingWhitelistDomains)->IsManaged());
...@@ -136,8 +136,8 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionLoginURLs) { ...@@ -136,8 +136,8 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionLoginURLs) {
login_url_values.AppendString("https://login.mydomain.com"); login_url_values.AppendString("https://login.mydomain.com");
login_url_values.AppendString("https://mydomian.com/login.html"); login_url_values.AppendString("https://mydomian.com/login.html");
policies.Set(key::kPasswordProtectionLoginURLs, POLICY_LEVEL_MANDATORY, policies.Set(key::kPasswordProtectionLoginURLs, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, login_url_values.Clone(),
login_url_values.CreateDeepCopy(), nullptr); nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
EXPECT_TRUE( EXPECT_TRUE(
prefs->FindPreference(prefs::kPasswordProtectionLoginURLs)->IsManaged()); prefs->FindPreference(prefs::kPasswordProtectionLoginURLs)->IsManaged());
...@@ -151,8 +151,8 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionLoginURLs) { ...@@ -151,8 +151,8 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionLoginURLs) {
login_url_values.AppendString(std::string("invalid")); login_url_values.AppendString(std::string("invalid"));
login_url_values.AppendString(std::string("ftp://login.mydomain.com")); login_url_values.AppendString(std::string("ftp://login.mydomain.com"));
policies.Set(key::kPasswordProtectionLoginURLs, POLICY_LEVEL_MANDATORY, policies.Set(key::kPasswordProtectionLoginURLs, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, login_url_values.Clone(),
login_url_values.CreateDeepCopy(), nullptr); nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
EXPECT_TRUE( EXPECT_TRUE(
prefs->FindPreference(prefs::kPasswordProtectionLoginURLs)->IsManaged()); prefs->FindPreference(prefs::kPasswordProtectionLoginURLs)->IsManaged());
...@@ -180,11 +180,9 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionChangePasswordURL) { ...@@ -180,11 +180,9 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionChangePasswordURL) {
// Add change password URL to this enterprise policy . // Add change password URL to this enterprise policy .
PolicyMap policies; PolicyMap policies;
policies.Set( policies.Set(key::kPasswordProtectionChangePasswordURL,
key::kPasswordProtectionChangePasswordURL, POLICY_LEVEL_MANDATORY, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, base::Value("https://changepassword.mydomain.com"), nullptr);
base::WrapUnique(new base::Value("https://changepassword.mydomain.com")),
nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
EXPECT_TRUE(prefs->FindPreference(prefs::kPasswordProtectionChangePasswordURL) EXPECT_TRUE(prefs->FindPreference(prefs::kPasswordProtectionChangePasswordURL)
->IsManaged()); ->IsManaged());
...@@ -194,8 +192,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionChangePasswordURL) { ...@@ -194,8 +192,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionChangePasswordURL) {
// Verify non-http/https change password URL will be skipped. // Verify non-http/https change password URL will be skipped.
policies.Set(key::kPasswordProtectionChangePasswordURL, policies.Set(key::kPasswordProtectionChangePasswordURL,
POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD,
base::WrapUnique(new base::Value("data:text/html,login page")), base::Value("data:text/html,login page"), nullptr);
nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
EXPECT_TRUE(prefs->FindPreference(prefs::kPasswordProtectionChangePasswordURL) EXPECT_TRUE(prefs->FindPreference(prefs::kPasswordProtectionChangePasswordURL)
->IsManaged()); ->IsManaged());
...@@ -239,8 +236,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, ...@@ -239,8 +236,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest,
// Sets the enterprise policy to 1 (a.k.a PASSWORD_REUSE). // Sets the enterprise policy to 1 (a.k.a PASSWORD_REUSE).
PolicyMap policies; PolicyMap policies;
policies.Set(key::kPasswordProtectionWarningTrigger, POLICY_LEVEL_MANDATORY, policies.Set(key::kPasswordProtectionWarningTrigger, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, base::Value(1), nullptr);
std::make_unique<base::Value>(1), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
EXPECT_TRUE(prefs->FindPreference(prefs::kPasswordProtectionWarningTrigger) EXPECT_TRUE(prefs->FindPreference(prefs::kPasswordProtectionWarningTrigger)
->IsManaged()); ->IsManaged());
...@@ -249,8 +245,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, ...@@ -249,8 +245,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest,
ReusedPasswordAccountType())); ReusedPasswordAccountType()));
// Sets the enterprise policy to 2 (a.k.a PHISHING_REUSE). // Sets the enterprise policy to 2 (a.k.a PHISHING_REUSE).
policies.Set(key::kPasswordProtectionWarningTrigger, POLICY_LEVEL_MANDATORY, policies.Set(key::kPasswordProtectionWarningTrigger, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, base::Value(2), nullptr);
std::make_unique<base::Value>(2), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
EXPECT_EQ(safe_browsing::PHISHING_REUSE, EXPECT_EQ(safe_browsing::PHISHING_REUSE,
mock_service.GetPasswordProtectionWarningTriggerPref( mock_service.GetPasswordProtectionWarningTriggerPref(
...@@ -281,8 +276,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionWarningTriggerGmail) { ...@@ -281,8 +276,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionWarningTriggerGmail) {
// to. // to.
PolicyMap policies; PolicyMap policies;
policies.Set(key::kPasswordProtectionWarningTrigger, POLICY_LEVEL_MANDATORY, policies.Set(key::kPasswordProtectionWarningTrigger, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, base::Value(1), nullptr);
std::make_unique<base::Value>(1), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
EXPECT_TRUE(prefs->FindPreference(prefs::kPasswordProtectionWarningTrigger) EXPECT_TRUE(prefs->FindPreference(prefs::kPasswordProtectionWarningTrigger)
->IsManaged()); ->IsManaged());
...@@ -290,8 +284,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionWarningTriggerGmail) { ...@@ -290,8 +284,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionWarningTriggerGmail) {
mock_service.GetPasswordProtectionWarningTriggerPref(account_type)); mock_service.GetPasswordProtectionWarningTriggerPref(account_type));
// Sets the enterprise policy to 2 (a.k.a PHISHING_REUSE). // Sets the enterprise policy to 2 (a.k.a PHISHING_REUSE).
policies.Set(key::kPasswordProtectionWarningTrigger, POLICY_LEVEL_MANDATORY, policies.Set(key::kPasswordProtectionWarningTrigger, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, base::Value(2), nullptr);
std::make_unique<base::Value>(2), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
EXPECT_EQ(safe_browsing::PHISHING_REUSE, EXPECT_EQ(safe_browsing::PHISHING_REUSE,
mock_service.GetPasswordProtectionWarningTriggerPref(account_type)); mock_service.GetPasswordProtectionWarningTriggerPref(account_type));
...@@ -314,8 +307,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionWarningTriggerGSuite) { ...@@ -314,8 +307,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionWarningTriggerGSuite) {
ReusedPasswordAccountType())); ReusedPasswordAccountType()));
// Sets the enterprise policy to 1 (a.k.a PASSWORD_REUSE). // Sets the enterprise policy to 1 (a.k.a PASSWORD_REUSE).
policies.Set(key::kPasswordProtectionWarningTrigger, POLICY_LEVEL_MANDATORY, policies.Set(key::kPasswordProtectionWarningTrigger, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, base::Value(1), nullptr);
std::make_unique<base::Value>(1), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
EXPECT_TRUE(prefs->FindPreference(prefs::kPasswordProtectionWarningTrigger) EXPECT_TRUE(prefs->FindPreference(prefs::kPasswordProtectionWarningTrigger)
->IsManaged()); ->IsManaged());
...@@ -324,8 +316,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionWarningTriggerGSuite) { ...@@ -324,8 +316,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, PasswordProtectionWarningTriggerGSuite) {
ReusedPasswordAccountType())); ReusedPasswordAccountType()));
// Sets the enterprise policy to 2 (a.k.a PHISHING_REUSE). // Sets the enterprise policy to 2 (a.k.a PHISHING_REUSE).
policies.Set(key::kPasswordProtectionWarningTrigger, POLICY_LEVEL_MANDATORY, policies.Set(key::kPasswordProtectionWarningTrigger, POLICY_LEVEL_MANDATORY,
POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, base::Value(2), nullptr);
std::make_unique<base::Value>(2), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
EXPECT_EQ(safe_browsing::PHISHING_REUSE, EXPECT_EQ(safe_browsing::PHISHING_REUSE,
mock_service.GetPasswordProtectionWarningTriggerPref( mock_service.GetPasswordProtectionWarningTriggerPref(
......
...@@ -77,7 +77,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklist) { ...@@ -77,7 +77,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklist) {
blacklist.AppendString("bbb.com"); blacklist.AppendString("bbb.com");
PolicyMap policies; PolicyMap policies;
policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, blacklist.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, blacklist.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
FlushBlacklistPolicy(); FlushBlacklistPolicy();
// All bbb.com URLs are blocked, and "aaa.com" is still unblocked. // All bbb.com URLs are blocked, and "aaa.com" is still unblocked.
...@@ -90,7 +90,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklist) { ...@@ -90,7 +90,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklist) {
whitelist.AppendString("sub.bbb.com"); whitelist.AppendString("sub.bbb.com");
whitelist.AppendString("bbb.com/policy"); whitelist.AppendString("bbb.com/policy");
policies.Set(key::kURLWhitelist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kURLWhitelist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, whitelist.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, whitelist.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
FlushBlacklistPolicy(); FlushBlacklistPolicy();
CheckURLIsBlocked(browser(), kURLS[1]); CheckURLIsBlocked(browser(), kURLS[1]);
...@@ -124,7 +124,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistIncognito) { ...@@ -124,7 +124,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistIncognito) {
blacklist.AppendString("bbb.com"); blacklist.AppendString("bbb.com");
PolicyMap policies; PolicyMap policies;
policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, blacklist.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, blacklist.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
FlushBlacklistPolicy(); FlushBlacklistPolicy();
// All bbb.com URLs are blocked, and "aaa.com" is still unblocked. // All bbb.com URLs are blocked, and "aaa.com" is still unblocked.
...@@ -137,7 +137,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistIncognito) { ...@@ -137,7 +137,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistIncognito) {
whitelist.AppendString("sub.bbb.com"); whitelist.AppendString("sub.bbb.com");
whitelist.AppendString("bbb.com/policy"); whitelist.AppendString("bbb.com/policy");
policies.Set(key::kURLWhitelist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kURLWhitelist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, whitelist.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, whitelist.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
FlushBlacklistPolicy(); FlushBlacklistPolicy();
CheckURLIsBlocked(incognito_browser, kURLS[1]); CheckURLIsBlocked(incognito_browser, kURLS[1]);
...@@ -156,12 +156,12 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistAndWhitelist) { ...@@ -156,12 +156,12 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistAndWhitelist) {
blacklist.AppendString("*"); blacklist.AppendString("*");
PolicyMap policies; PolicyMap policies;
policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, blacklist.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, blacklist.Clone(), nullptr);
base::ListValue whitelist; base::ListValue whitelist;
whitelist.AppendString("aaa.com"); whitelist.AppendString("aaa.com");
policies.Set(key::kURLWhitelist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kURLWhitelist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, whitelist.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, whitelist.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
FlushBlacklistPolicy(); FlushBlacklistPolicy();
CheckCanOpenURL( CheckCanOpenURL(
...@@ -187,7 +187,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistSubresources) { ...@@ -187,7 +187,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistSubresources) {
blacklist.AppendString(subframe_url.spec().c_str()); blacklist.AppendString(subframe_url.spec().c_str());
PolicyMap policies; PolicyMap policies;
policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, blacklist.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, blacklist.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
FlushBlacklistPolicy(); FlushBlacklistPolicy();
...@@ -228,7 +228,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistClientRedirect) { ...@@ -228,7 +228,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistClientRedirect) {
blacklist.AppendString(redirected_url.spec().c_str()); blacklist.AppendString(redirected_url.spec().c_str());
PolicyMap policies; PolicyMap policies;
policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, blacklist.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, blacklist.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
FlushBlacklistPolicy(); FlushBlacklistPolicy();
...@@ -258,7 +258,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistServerRedirect) { ...@@ -258,7 +258,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistServerRedirect) {
blacklist.AppendString(redirected_url.spec().c_str()); blacklist.AppendString(redirected_url.spec().c_str());
PolicyMap policies; PolicyMap policies;
policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, blacklist.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, blacklist.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
FlushBlacklistPolicy(); FlushBlacklistPolicy();
...@@ -294,7 +294,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_FileURLBlacklist) { ...@@ -294,7 +294,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_FileURLBlacklist) {
blacklist.AppendString("file://*"); blacklist.AppendString("file://*");
PolicyMap policies; PolicyMap policies;
policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, blacklist.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, blacklist.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
FlushBlacklistPolicy(); FlushBlacklistPolicy();
...@@ -304,7 +304,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_FileURLBlacklist) { ...@@ -304,7 +304,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_FileURLBlacklist) {
// Replace the URLblacklist with disabling the file scheme. // Replace the URLblacklist with disabling the file scheme.
blacklist.Remove(base::Value("file://*"), nullptr); blacklist.Remove(base::Value("file://*"), nullptr);
policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, blacklist.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, blacklist.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
FlushBlacklistPolicy(); FlushBlacklistPolicy();
...@@ -315,7 +315,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_FileURLBlacklist) { ...@@ -315,7 +315,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_FileURLBlacklist) {
base::ListValue disabledscheme; base::ListValue disabledscheme;
disabledscheme.AppendString("file"); disabledscheme.AppendString("file");
policies.Set(key::kDisabledSchemes, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kDisabledSchemes, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, disabledscheme.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, disabledscheme.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
FlushBlacklistPolicy(); FlushBlacklistPolicy();
...@@ -326,10 +326,10 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_FileURLBlacklist) { ...@@ -326,10 +326,10 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_FileURLBlacklist) {
base::ListValue whitelist; base::ListValue whitelist;
whitelist.AppendString(base_path); whitelist.AppendString(base_path);
policies.Set(key::kURLWhitelist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kURLWhitelist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, whitelist.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, whitelist.Clone(), nullptr);
blacklist.AppendString(folder_path); blacklist.AppendString(folder_path);
policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
POLICY_SOURCE_CLOUD, blacklist.CreateDeepCopy(), nullptr); POLICY_SOURCE_CLOUD, blacklist.Clone(), nullptr);
UpdateProviderPolicy(policies); UpdateProviderPolicy(policies);
FlushBlacklistPolicy(); FlushBlacklistPolicy();
......
...@@ -400,14 +400,14 @@ IN_PROC_BROWSER_TEST_F(PolicyUITest, WritePoliciesToJSONFile) { ...@@ -400,14 +400,14 @@ IN_PROC_BROWSER_TEST_F(PolicyUITest, WritePoliciesToJSONFile) {
popups_blocked_for_urls.AppendString("ccc"); popups_blocked_for_urls.AppendString("ccc");
values.Set(policy::key::kPopupsBlockedForUrls, policy::POLICY_LEVEL_MANDATORY, values.Set(policy::key::kPopupsBlockedForUrls, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_PLATFORM, policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_PLATFORM,
popups_blocked_for_urls.CreateDeepCopy(), nullptr); popups_blocked_for_urls.Clone(), nullptr);
SetExpectedPolicy(&expected_values, policy::key::kPopupsBlockedForUrls, SetExpectedPolicy(&expected_values, policy::key::kPopupsBlockedForUrls,
"mandatory", "machine", "platform", std::string(), "mandatory", "machine", "platform", std::string(),
std::string(), false, popups_blocked_for_urls); std::string(), false, popups_blocked_for_urls);
values.Set(policy::key::kDefaultImagesSetting, policy::POLICY_LEVEL_MANDATORY, values.Set(policy::key::kDefaultImagesSetting, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_CLOUD, policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_CLOUD,
std::make_unique<base::Value>(2), nullptr); base::Value(2), nullptr);
SetExpectedPolicy(&expected_values, policy::key::kDefaultImagesSetting, SetExpectedPolicy(&expected_values, policy::key::kDefaultImagesSetting,
"mandatory", "machine", "cloud", std::string(), "mandatory", "machine", "cloud", std::string(),
std::string(), false, base::Value(2)); std::string(), false, base::Value(2));
...@@ -422,7 +422,7 @@ IN_PROC_BROWSER_TEST_F(PolicyUITest, WritePoliciesToJSONFile) { ...@@ -422,7 +422,7 @@ IN_PROC_BROWSER_TEST_F(PolicyUITest, WritePoliciesToJSONFile) {
const std::string kUnknownPolicy = "NoSuchThing"; const std::string kUnknownPolicy = "NoSuchThing";
values.Set(kUnknownPolicy, policy::POLICY_LEVEL_RECOMMENDED, values.Set(kUnknownPolicy, policy::POLICY_LEVEL_RECOMMENDED,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
unknown_policy.CreateDeepCopy(), nullptr); unknown_policy.Clone(), nullptr);
SetExpectedPolicy(&expected_values, kUnknownPolicy, "recommended", "user", SetExpectedPolicy(&expected_values, kUnknownPolicy, "recommended", "user",
"cloud", l10n_util::GetStringUTF8(IDS_POLICY_UNKNOWN), "cloud", l10n_util::GetStringUTF8(IDS_POLICY_UNKNOWN),
std::string(), false, unknown_policy); std::string(), false, unknown_policy);
...@@ -453,7 +453,7 @@ IN_PROC_BROWSER_TEST_F(PolicyUITest, WritePoliciesToJSONFile) { ...@@ -453,7 +453,7 @@ IN_PROC_BROWSER_TEST_F(PolicyUITest, WritePoliciesToJSONFile) {
popups_blocked_for_urls.AppendString("ddd"); popups_blocked_for_urls.AppendString("ddd");
values.Set(policy::key::kPopupsBlockedForUrls, policy::POLICY_LEVEL_MANDATORY, values.Set(policy::key::kPopupsBlockedForUrls, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_PLATFORM, policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_PLATFORM,
popups_blocked_for_urls.CreateDeepCopy(), nullptr); popups_blocked_for_urls.Clone(), nullptr);
SetExpectedPolicy(&expected_values, policy::key::kPopupsBlockedForUrls, SetExpectedPolicy(&expected_values, policy::key::kPopupsBlockedForUrls,
"mandatory", "machine", "platform", std::string(), "mandatory", "machine", "platform", std::string(),
std::string(), false, popups_blocked_for_urls); std::string(), false, popups_blocked_for_urls);
...@@ -469,12 +469,11 @@ IN_PROC_BROWSER_TEST_F(PolicyUITest, WritePoliciesToJSONFile) { ...@@ -469,12 +469,11 @@ IN_PROC_BROWSER_TEST_F(PolicyUITest, WritePoliciesToJSONFile) {
// selection dialogs. This is a desktop only policy. // selection dialogs. This is a desktop only policy.
values.Set(policy::key::kAllowFileSelectionDialogs, values.Set(policy::key::kAllowFileSelectionDialogs,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_MACHINE, policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_MACHINE,
policy::POLICY_SOURCE_PLATFORM, policy::POLICY_SOURCE_PLATFORM, base::Value(false), nullptr);
std::make_unique<base::Value>(false), nullptr);
popups_blocked_for_urls.AppendString("eeeeee"); popups_blocked_for_urls.AppendString("eeeeee");
values.Set(policy::key::kPopupsBlockedForUrls, policy::POLICY_LEVEL_MANDATORY, values.Set(policy::key::kPopupsBlockedForUrls, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_PLATFORM, policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_PLATFORM,
popups_blocked_for_urls.CreateDeepCopy(), nullptr); popups_blocked_for_urls.Clone(), nullptr);
provider_.UpdateChromePolicy(values); provider_.UpdateChromePolicy(values);
// Check writing changed policies did not overwrite the exported policies // Check writing changed policies did not overwrite the exported policies
...@@ -514,36 +513,36 @@ IN_PROC_BROWSER_TEST_F(PolicyUITest, SendPolicyValues) { ...@@ -514,36 +513,36 @@ IN_PROC_BROWSER_TEST_F(PolicyUITest, SendPolicyValues) {
std::map<std::string, std::string> expected_values; std::map<std::string, std::string> expected_values;
// Set the values of four existing policies. // Set the values of four existing policies.
std::unique_ptr<base::ListValue> restore_on_startup_urls(new base::ListValue); base::Value restore_on_startup_urls(base::Value::Type::LIST);
restore_on_startup_urls->AppendString("aaa"); restore_on_startup_urls.Append("aaa");
restore_on_startup_urls->AppendString("bbb"); restore_on_startup_urls.Append("bbb");
restore_on_startup_urls->AppendString("ccc"); restore_on_startup_urls.Append("ccc");
values.Set(policy::key::kRestoreOnStartupURLs, policy::POLICY_LEVEL_MANDATORY, values.Set(policy::key::kRestoreOnStartupURLs, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::move(restore_on_startup_urls), nullptr); std::move(restore_on_startup_urls), nullptr);
expected_values[policy::key::kRestoreOnStartupURLs] = "aaa,bbb,ccc"; expected_values[policy::key::kRestoreOnStartupURLs] = "aaa,bbb,ccc";
values.Set(policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY, values.Set(policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_CLOUD, policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_CLOUD,
std::make_unique<base::Value>("http://google.com"), nullptr); base::Value("http://google.com"), nullptr);
expected_values[policy::key::kHomepageLocation] = "http://google.com"; expected_values[policy::key::kHomepageLocation] = "http://google.com";
values.Set(policy::key::kRestoreOnStartup, policy::POLICY_LEVEL_RECOMMENDED, values.Set(policy::key::kRestoreOnStartup, policy::POLICY_LEVEL_RECOMMENDED,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::make_unique<base::Value>(4), nullptr); base::Value(4), nullptr);
expected_values[policy::key::kRestoreOnStartup] = "4"; expected_values[policy::key::kRestoreOnStartup] = "4";
values.Set(policy::key::kShowHomeButton, policy::POLICY_LEVEL_RECOMMENDED, values.Set(policy::key::kShowHomeButton, policy::POLICY_LEVEL_RECOMMENDED,
policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_CLOUD, policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_CLOUD,
std::make_unique<base::Value>(true), nullptr); base::Value(true), nullptr);
expected_values[policy::key::kShowHomeButton] = "true"; expected_values[policy::key::kShowHomeButton] = "true";
// Set the value of a policy that does not exist. // Set the value of a policy that does not exist.
const std::string kUnknownPolicy = "NoSuchThing"; const std::string kUnknownPolicy = "NoSuchThing";
values.Set(kUnknownPolicy, policy::POLICY_LEVEL_MANDATORY, values.Set(kUnknownPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_PLATFORM, policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_PLATFORM,
std::make_unique<base::Value>(true), nullptr); base::Value(true), nullptr);
expected_values[kUnknownPolicy] = "true"; expected_values[kUnknownPolicy] = "true";
const std::string kUnknownPolicyWithDots = "no.such.thing"; const std::string kUnknownPolicyWithDots = "no.such.thing";
values.Set(kUnknownPolicyWithDots, policy::POLICY_LEVEL_MANDATORY, values.Set(kUnknownPolicyWithDots, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_PLATFORM, policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_PLATFORM,
std::make_unique<base::Value>("blub"), nullptr); base::Value("blub"), nullptr);
expected_values[kUnknownPolicyWithDots] = "blub"; expected_values[kUnknownPolicyWithDots] = "blub";
provider_.UpdateChromePolicy(values); provider_.UpdateChromePolicy(values);
...@@ -737,33 +736,33 @@ IN_PROC_BROWSER_TEST_P(ExtensionPolicyUITest, ...@@ -737,33 +736,33 @@ IN_PROC_BROWSER_TEST_P(ExtensionPolicyUITest,
// Verify if policy UI includes policy that extension have. // Verify if policy UI includes policy that extension have.
VerifyPolicies(expected_policies); VerifyPolicies(expected_policies);
auto object_value = std::make_unique<base::DictionaryValue>(); base::Value object_value(base::Value::Type::DICTIONARY);
object_value->SetKey("objectProperty", base::Value(true)); object_value.SetBoolKey("objectProperty", true);
auto array_value = std::make_unique<base::ListValue>(); base::Value array_value(base::Value::Type::LIST);
array_value->Append(base::Value(true)); array_value.Append(true);
policy::PolicyMap values; policy::PolicyMap values;
values.Set(kNormalBooleanPolicy, policy::POLICY_LEVEL_MANDATORY, values.Set(kNormalBooleanPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::make_unique<base::Value>(true), nullptr); base::Value(true), nullptr);
values.Set(kSensitiveArrayPolicy, policy::POLICY_LEVEL_MANDATORY, values.Set(kSensitiveArrayPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::move(array_value), nullptr); std::move(array_value), nullptr);
values.Set(kSensitiveBooleanPolicy, policy::POLICY_LEVEL_MANDATORY, values.Set(kSensitiveBooleanPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::make_unique<base::Value>(true), nullptr); base::Value(true), nullptr);
values.Set(kSensitiveIntegerPolicy, policy::POLICY_LEVEL_MANDATORY, values.Set(kSensitiveIntegerPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::make_unique<base::Value>(42), nullptr); base::Value(42), nullptr);
values.Set(kSensitiveNumberPolicy, policy::POLICY_LEVEL_MANDATORY, values.Set(kSensitiveNumberPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::make_unique<base::Value>(3.141), nullptr); base::Value(3.141), nullptr);
values.Set(kSensitiveObjectPolicy, policy::POLICY_LEVEL_MANDATORY, values.Set(kSensitiveObjectPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::move(object_value), nullptr); std::move(object_value), nullptr);
values.Set(kSensitiveStringPolicy, policy::POLICY_LEVEL_MANDATORY, values.Set(kSensitiveStringPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD, policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::make_unique<base::Value>("value"), nullptr); base::Value("value"), nullptr);
UpdateProviderPolicyForNamespace(extension_policy_namespace, values); UpdateProviderPolicyForNamespace(extension_policy_namespace, values);
// Add extension policy with values to expected policy list. // Add extension policy with values to expected policy list.
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment