Lines Matching refs:Policy
80 // No device policy loaded by default.
103 // Sets up a default device policy that does not impose any restrictions
122 // Configures the UpdateCheckAllowed policy to return a desired value by
182 // Runs the passed |policy_method| policy and expects it to return the
267 // Policy honors the server provided check poll interval.
312 // We get the next update_check timestamp from the policy's private method
326 // Check that the policy blocks until the next_update_check is reached.
333 &Policy::UpdateCheckAllowed, &result);
341 &Policy::UpdateCheckAllowed, &result);
369 &Policy::UpdateCheckAllowed, &result);
378 &Policy::UpdateCheckAllowed, &result);
388 // Override specific device policy attributes.
398 &Policy::UpdateCheckAllowed, &result);
415 &Policy::UpdateCheckAllowed, &result);
427 &Policy::UpdateCheckAllowed, &result);
432 // UpdateCheckAllowed should return kAskMeAgainLater because a device policy
441 &Policy::UpdateCheckAllowed, &result);
455 &Policy::UpdateCheckAllowed, &result);
470 &Policy::UpdateCheckAllowed, &result);
476 // The UpdateCanStart policy fails, not being able to query
479 // Configure the UpdateCheckAllowed policy to fail.
486 &Policy::UpdateCanStart, &result, update_state);
490 // The UpdateCanStart policy returns false because we are due for another
499 &Policy::UpdateCanStart, &result, update_state);
507 // The UpdateCanStart policy returns true; no device policy is loaded.
517 &Policy::UpdateCanStart, &result, update_state);
528 // The UpdateCanStart policy returns true; device policy is loaded but imposes
537 &Policy::UpdateCanStart, &result, update_state);
549 // The UpdateCanStart policy returns false; failures are reported and a new
567 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
577 // The UpdateCanStart policy returns false; a previously enacted backoff
597 ExpectPolicyStatus(EvalStatus::kAskMeAgainLater, &Policy::UpdateCanStart,
606 // The UpdateCanStart policy returns true; a previously enacted backoff period
626 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart,
638 // The UpdateCanStart policy returns false; failures are reported but backoff
657 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
669 // The UpdateCanStart policy returns false; failures are reported but this is
688 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
700 // The UpdateCanStart policy returns false; failures are reported but this is
719 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
731 // The UpdateCanStart policy returns false; failures are reported but this is
752 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
764 // The UpdateCanStart policy fails because the UpdateScattering policy it
769 // Override the default seed variable with a null value so that the policy
780 &Policy::UpdateCanStart, &result, update_state);
785 // The UpdateCanStart policy returns false; device policy is loaded and
799 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
809 // The UpdateCanStart policy returns false w/ kAskMeAgainLater; device policy
823 Policy::UpdateCanStart,
833 // The UpdateCanStart policy returns false; device policy is loaded and
849 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
859 // The UpdateCanStart policy returns false; device policy is loaded and
873 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
881 // The UpdateCanStart policy returns true; device policy is loaded and
898 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
911 // The UpdateCanStart policy returns true; device policy is loaded and
927 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
940 // The UpdateCanStart policy returns true; device policy is loaded and
957 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
969 // The UpdateCanStart policy returns true; device policy permits both HTTP and
974 // Override specific device policy attributes.
983 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
995 // The UpdateCanStart policy returns true; device policy forbids both HTTP and
1001 // Override specific device policy attributes.
1007 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1020 // The UpdateCanStart policy returns true; device policy permits HTTP, but
1021 // policy blocks P2P downloading because Omaha forbids it. P2P sharing is
1026 // Override specific device policy attributes.
1036 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1045 // The UpdateCanStart policy returns true; device policy permits HTTP, but
1046 // policy blocks P2P sharing because Omaha forbids it. P2P downloading is
1051 // Override specific device policy attributes.
1061 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1070 // The UpdateCanStart policy returns true; device policy permits HTTP but
1076 // Override specific device policy attributes.
1086 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1095 // The UpdateCanStart policy returns true; device policy permits HTTP but
1101 // Override specific device policy attributes.
1115 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1124 // The UpdateCanStart policy returns true; device policy forbids both HTTP and
1130 // Override specific device policy attributes.
1139 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1149 // The UpdateCanStart policy returns true; device policy forbids both HTTP and
1154 // Override specific device policy attributes.
1164 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1174 // The UpdateCanStart policy returns true; the first URL has download errors
1194 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1204 // The UpdateCanStart policy returns true; the first URL exceeded the maximum
1223 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1233 // The UpdateCanStart policy returns true; the first URL fails with a hard
1249 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1259 // The UpdateCanStart policy returns true; URL search properly wraps around
1277 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1287 // The UpdateCanStart policy returns false; there's a single HTTP URL but its
1288 // use is forbidden by policy.
1290 // Note: In the case where no usable URLs are found, the policy should not
1297 // Override specific device policy attributes.
1304 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1313 // The UpdateCanStart policy returns true; there's a single HTTP URL but its
1314 // use is forbidden by policy, however P2P is enabled. The result indicates
1322 // Override specific device policy attributes.
1331 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1344 // The UpdateCanStart policy returns true; there's a single HTTP URL but its
1345 // use is forbidden by policy, and P2P is unset on the policy, however the
1354 // Override specific device policy attributes.
1363 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1382 &Policy::UpdateDownloadAllowed, &result);
1394 &Policy::UpdateDownloadAllowed, &result);
1409 &Policy::UpdateDownloadAllowed, &result);
1414 // Tethered wifi can be allowed by policy.
1428 &Policy::UpdateDownloadAllowed, &result);
1440 &Policy::UpdateDownloadAllowed, &result);
1453 &Policy::UpdateDownloadAllowed, &result);
1458 // Bluetooth cannot be allowed even by policy.
1470 &Policy::UpdateDownloadAllowed, &result);
1481 &Policy::UpdateDownloadAllowed, &result);
1486 // Update over cellular can be enabled by policy.
1498 &Policy::UpdateDownloadAllowed, &result);
1504 // Update over cellular can be enabled by user settings, but only if policy
1516 &Policy::UpdateDownloadAllowed, &result);
1522 // The UpdateCanStart policy returns true; scattering should have applied, but
1535 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart,
1550 // The UpdateCanStart policy returns true; backoff should have applied, but
1568 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1582 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::P2PEnabled, &result);
1591 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::P2PEnabled, &result);
1599 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::P2PEnabled, &result);
1608 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::P2PEnabled, &result);
1614 ExpectPolicyStatus(EvalStatus::kAskMeAgainLater, &Policy::P2PEnabledChanged,