| Index: chrome/browser/policy/configuration_policy_handler_chromeos_unittest.cc
|
| diff --git a/chrome/browser/policy/configuration_policy_handler_chromeos_unittest.cc b/chrome/browser/policy/configuration_policy_handler_chromeos_unittest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..882a1057bd3b756da6cd5cad45daee141a3dafde
|
| --- /dev/null
|
| +++ b/chrome/browser/policy/configuration_policy_handler_chromeos_unittest.cc
|
| @@ -0,0 +1,93 @@
|
| +// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "chrome/browser/policy/configuration_policy_handler_chromeos.h"
|
| +
|
| +#include "chrome/browser/policy/policy_error_map.h"
|
| +#include "chrome/browser/policy/policy_map.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +namespace policy {
|
| +
|
| +TEST(NetworkConfigurationPolicyHandlerTest, Empty) {
|
| + PolicyMap policy_map;
|
| + NetworkConfigurationPolicyHandler handler(kPolicyOpenNetworkConfiguration);
|
| + PolicyErrorMap errors;
|
| + EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors));
|
| + EXPECT_TRUE(errors.GetErrors(kPolicyOpenNetworkConfiguration).empty());
|
| +}
|
| +
|
| +TEST(NetworkConfigurationPolicyHandlerTest, ValidONC) {
|
| + const std::string kTestONC(
|
| + "{"
|
| + " \"NetworkConfigurations\": [{"
|
| + " \"GUID\": \"{485d6076-dd44-6b6d-69787465725f5045}\","
|
| + " \"Type\": \"WiFi\","
|
| + " \"WiFi\": {"
|
| + " \"Security\": \"WEP\","
|
| + " \"SSID\": \"ssid\","
|
| + " \"Passphrase\": \"pass\","
|
| + " }"
|
| + " }]"
|
| + "}");
|
| +
|
| + PolicyMap policy_map;
|
| + policy_map.Set(kPolicyOpenNetworkConfiguration,
|
| + Value::CreateStringValue(kTestONC));
|
| + NetworkConfigurationPolicyHandler handler(kPolicyOpenNetworkConfiguration);
|
| + PolicyErrorMap errors;
|
| + EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors));
|
| + EXPECT_TRUE(errors.GetErrors(kPolicyOpenNetworkConfiguration).empty());
|
| +}
|
| +
|
| +TEST(NetworkConfigurationPolicyHandlerTest, WrongType) {
|
| + PolicyMap policy_map;
|
| + policy_map.Set(kPolicyOpenNetworkConfiguration,
|
| + Value::CreateBooleanValue(false));
|
| + NetworkConfigurationPolicyHandler handler(kPolicyOpenNetworkConfiguration);
|
| + PolicyErrorMap errors;
|
| + EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors));
|
| + EXPECT_FALSE(errors.GetErrors(kPolicyOpenNetworkConfiguration).empty());
|
| +}
|
| +
|
| +TEST(NetworkConfigurationPolicyHandlerTest, JSONParseError) {
|
| + const std::string kTestONC("I'm not proper JSON!");
|
| + PolicyMap policy_map;
|
| + policy_map.Set(kPolicyOpenNetworkConfiguration,
|
| + Value::CreateStringValue(kTestONC));
|
| + NetworkConfigurationPolicyHandler handler(kPolicyOpenNetworkConfiguration);
|
| + PolicyErrorMap errors;
|
| + EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors));
|
| + EXPECT_FALSE(errors.GetErrors(kPolicyOpenNetworkConfiguration).empty());
|
| +}
|
| +
|
| +TEST(NetworkConfigurationPolicyHandlerTest, Sanitization) {
|
| + const std::string kTestONC(
|
| + "{"
|
| + " \"NetworkConfigurations\": [{"
|
| + " \"GUID\": \"{485d6076-dd44-6b6d-69787465725f5045}\","
|
| + " \"Type\": \"WiFi\","
|
| + " \"WiFi\": {"
|
| + " \"Security\": \"WEP\","
|
| + " \"SSID\": \"ssid\","
|
| + " \"Passphrase\": \"pass\","
|
| + " }"
|
| + " }]"
|
| + "}");
|
| +
|
| + PolicyMap policy_map;
|
| + policy_map.Set(kPolicyOpenNetworkConfiguration,
|
| + Value::CreateStringValue(kTestONC));
|
| + NetworkConfigurationPolicyHandler handler(kPolicyOpenNetworkConfiguration);
|
| + PolicyErrorMap errors;
|
| + handler.PrepareForDisplaying(&policy_map);
|
| + const Value* sanitized = policy_map.Get(kPolicyOpenNetworkConfiguration);
|
| + ASSERT_TRUE(sanitized);
|
| + std::string sanitized_onc;
|
| + EXPECT_TRUE(sanitized->GetAsString(&sanitized_onc));
|
| + EXPECT_FALSE(sanitized_onc.empty());
|
| + EXPECT_EQ(std::string::npos, sanitized_onc.find("pass"));
|
| +}
|
| +
|
| +} // namespace policy
|
|
|