Lines Matching refs:Policy
82 // No device policy loaded by default.
105 // Sets up a default device policy that does not impose any restrictions
124 // Configures the UpdateCheckAllowed policy to return a desired value by
184 // Runs the passed |policy_method| policy and expects it to return the
269 // Policy honors the server provided check poll interval.
314 // We get the next update_check timestamp from the policy's private method
328 // Check that the policy blocks until the next_update_check is reached.
335 &Policy::UpdateCheckAllowed, &result);
343 &Policy::UpdateCheckAllowed, &result);
371 &Policy::UpdateCheckAllowed, &result);
380 &Policy::UpdateCheckAllowed, &result);
390 // Override specific device policy attributes.
400 &Policy::UpdateCheckAllowed, &result);
417 &Policy::UpdateCheckAllowed, &result);
429 &Policy::UpdateCheckAllowed, &result);
434 // UpdateCheckAllowed should return kAskMeAgainLater because a device policy
443 &Policy::UpdateCheckAllowed, &result);
457 &Policy::UpdateCheckAllowed, &result);
472 &Policy::UpdateCheckAllowed, &result);
481 // A typical setup for kiosk pin policy: AU disabled, allow kiosk to pin
493 &Policy::UpdateCheckAllowed, &result);
503 // Disable AU policy is set but kiosk pin policy is set to false. Update is
513 &Policy::UpdateCheckAllowed, &result);
533 &Policy::UpdateCheckAllowed, &result);
553 &Policy::UpdateCheckAllowed, &result);
557 // The UpdateCanStart policy fails, not being able to query
560 // Configure the UpdateCheckAllowed policy to fail.
567 &Policy::UpdateCanStart, &result, update_state);
571 // The UpdateCanStart policy returns false because we are due for another
580 &Policy::UpdateCanStart, &result, update_state);
588 // The UpdateCanStart policy returns true; no device policy is loaded.
598 &Policy::UpdateCanStart, &result, update_state);
609 // The UpdateCanStart policy returns true; device policy is loaded but imposes
618 &Policy::UpdateCanStart, &result, update_state);
630 // The UpdateCanStart policy returns false; failures are reported and a new
648 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
658 // The UpdateCanStart policy returns false; a previously enacted backoff
678 ExpectPolicyStatus(EvalStatus::kAskMeAgainLater, &Policy::UpdateCanStart,
687 // The UpdateCanStart policy returns true; a previously enacted backoff period
707 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart,
719 // The UpdateCanStart policy returns false; failures are reported but backoff
738 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
750 // The UpdateCanStart policy returns false; failures are reported but this is
769 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
781 // The UpdateCanStart policy returns false; failures are reported but this is
800 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
812 // The UpdateCanStart policy returns false; failures are reported but this is
833 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
845 // The UpdateCanStart policy fails because the UpdateScattering policy it
850 // Override the default seed variable with a null value so that the policy
861 &Policy::UpdateCanStart, &result, update_state);
866 // The UpdateCanStart policy returns false; device policy is loaded and
880 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
890 // The UpdateCanStart policy returns false w/ kAskMeAgainLater; device policy
904 ExpectPolicyStatus(EvalStatus::kAskMeAgainLater, &Policy::UpdateCanStart,
914 // The UpdateCanStart policy returns false; device policy is loaded and
930 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
940 // The UpdateCanStart policy returns false; device policy is loaded and
954 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
962 // The UpdateCanStart policy returns true; device policy is loaded and
979 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
992 // The UpdateCanStart policy returns true; device policy is loaded and
1008 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1021 // The UpdateCanStart policy returns true; device policy is loaded and
1038 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1050 // The UpdateCanStart policy returns true; device policy permits both HTTP and
1055 // Override specific device policy attributes.
1064 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1076 // The UpdateCanStart policy returns true; device policy forbids both HTTP and
1082 // Override specific device policy attributes.
1088 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1101 // The UpdateCanStart policy returns true; device policy permits HTTP, but
1102 // policy blocks P2P downloading because Omaha forbids it. P2P sharing is
1107 // Override specific device policy attributes.
1117 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1126 // The UpdateCanStart policy returns true; device policy permits HTTP, but
1127 // policy blocks P2P sharing because Omaha forbids it. P2P downloading is
1132 // Override specific device policy attributes.
1142 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1151 // The UpdateCanStart policy returns true; device policy permits HTTP but
1157 // Override specific device policy attributes.
1167 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1176 // The UpdateCanStart policy returns true; device policy permits HTTP but
1182 // Override specific device policy attributes.
1196 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1205 // The UpdateCanStart policy returns true; device policy forbids both HTTP and
1211 // Override specific device policy attributes.
1220 Policy::UpdateCanStart, &result,
1230 // The UpdateCanStart policy returns true; device policy forbids both HTTP and
1235 // Override specific device policy attributes.
1245 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1255 // The UpdateCanStart policy returns true; the first URL has download errors
1275 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1285 // The UpdateCanStart policy returns true; the first URL exceeded the maximum
1304 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1314 // The UpdateCanStart policy returns true; the first URL fails with a hard
1330 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1340 // The UpdateCanStart policy returns true; URL search properly wraps around
1358 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1368 // The UpdateCanStart policy returns false; there's a single HTTP URL but its
1369 // use is forbidden by policy.
1371 // Note: In the case where no usable URLs are found, the policy should not
1378 // Override specific device policy attributes.
1385 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1394 // The UpdateCanStart policy returns true; there's a single HTTP URL but its
1395 // use is forbidden by policy, however P2P is enabled. The result indicates
1403 // Override specific device policy attributes.
1412 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1425 // The UpdateCanStart policy returns true; there's a single HTTP URL but its
1426 // use is forbidden by policy, and P2P is unset on the policy, however the
1435 // Override specific device policy attributes.
1444 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1463 &Policy::UpdateDownloadAllowed, &result);
1475 &Policy::UpdateDownloadAllowed, &result);
1490 &Policy::UpdateDownloadAllowed, &result);
1495 // Tethered wifi can be allowed by policy.
1509 &Policy::UpdateDownloadAllowed, &result);
1521 &Policy::UpdateDownloadAllowed, &result);
1534 &Policy::UpdateDownloadAllowed, &result);
1539 // Bluetooth cannot be allowed even by policy.
1551 &Policy::UpdateDownloadAllowed, &result);
1562 &Policy::UpdateDownloadAllowed, &result);
1567 // Update over cellular can be enabled by policy.
1579 &Policy::UpdateDownloadAllowed, &result);
1585 // Update over cellular can be enabled by user settings, but only if policy
1597 &Policy::UpdateDownloadAllowed, &result);
1603 // The UpdateCanStart policy returns true; scattering should have applied, but
1616 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart,
1631 // The UpdateCanStart policy returns true; backoff should have applied, but
1649 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::UpdateCanStart, &result,
1663 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::P2PEnabled, &result);
1672 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::P2PEnabled, &result);
1680 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::P2PEnabled, &result);
1689 ExpectPolicyStatus(EvalStatus::kSucceeded, &Policy::P2PEnabled, &result);
1695 ExpectPolicyStatus(EvalStatus::kAskMeAgainLater, &Policy::P2PEnabledChanged,