Index: chrome/browser/chromeos/cros_settings_unittest.cc |
diff --git a/chrome/browser/chromeos/cros_settings_unittest.cc b/chrome/browser/chromeos/cros_settings_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..4cc22e59003a69c00febeceab474e1c7bab48b45 |
--- /dev/null |
+++ b/chrome/browser/chromeos/cros_settings_unittest.cc |
@@ -0,0 +1,251 @@ |
+// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chrome/browser/chromeos/login/signed_settings.h" |
+ |
+#include <vector> |
+ |
+#include "base/bind.h" |
+#include "base/memory/weak_ptr.h" |
+#include "base/message_loop.h" |
+#include "base/values.h" |
+#include "chrome/browser/chromeos/cros_settings.h" |
+#include "chrome/browser/chromeos/cros_settings_names.h" |
+#include "chrome/browser/chromeos/cros/cros_library.h" |
+#include "chrome/browser/chromeos/login/signed_settings_cache.h" |
+#include "chrome/browser/policy/proto/chrome_device_policy.pb.h" |
+#include "chrome/browser/policy/proto/device_management_backend.pb.h" |
+#include "chrome/test/base/testing_browser_process.h" |
+#include "chrome/test/base/testing_pref_service.h" |
+#include "content/test/test_browser_thread.h" |
+#include "testing/gtest/include/gtest/gtest.h" |
+ |
+namespace em = enterprise_management; |
+namespace chromeos { |
+ |
+class CrosSettingsTest : public testing::Test { |
+ protected: |
+ CrosSettingsTest() |
+ : message_loop_(MessageLoop::TYPE_UI), |
+ ui_thread_(content::BrowserThread::UI, &message_loop_), |
+ file_thread_(content::BrowserThread::FILE, &message_loop_), |
+ pointer_factory_(this), |
+ local_state_(static_cast<TestingBrowserProcess*>(g_browser_process)) { |
+ } |
+ |
+ virtual ~CrosSettingsTest() { |
+ } |
+ |
+ virtual void TearDown() { |
+ // Reset the cache between tests. |
+ em::PolicyData fake_pol; |
+ PrepareEmptyPolicy(&fake_pol); |
+ signed_settings_cache::Store(fake_pol, local_state_.Get()); |
+ CrosSettings::Get()->ReloadProviders(); |
+ } |
+ |
+ void FetchPref(const std::string& pref) { |
+ content::BrowserThread::PostTask( |
+ content::BrowserThread::UI, FROM_HERE, |
+ base::Bind(&CrosSettingsTest::FetchPrefOnUIThread, |
+ pointer_factory_.GetWeakPtr(), pref)); |
+ } |
+ |
+ void SetPref(const std::string& pref_name, const base::Value* value) { |
+ // TODO(pastarmovj): Use the new base::Owned here to wrap |value|. |
+ content::BrowserThread::PostTask( |
+ content::BrowserThread::UI, FROM_HERE, |
+ base::Bind(&CrosSettingsTest::SetPrefOnUIThread, |
+ pointer_factory_.GetWeakPtr(), pref_name, value)); |
+ } |
+ |
+ void FetchPrefOnUIThread(const std::string& pref) { |
+ DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::UI)); |
+ if (expected_props_.find(pref) == expected_props_.end()) |
+ return; |
+ |
+ if (CrosSettings::Get()->GetTrusted(pref, |
+ base::Bind(&CrosSettingsTest::FetchPrefOnUIThread, |
+ pointer_factory_.GetWeakPtr(), pref))) { |
+ scoped_ptr<base::Value> expected_value( |
+ expected_props_.find(pref)->second); |
+ const base::Value* pref_value = CrosSettings::Get()->GetPref(pref); |
+ if (expected_value.get()) { |
+ ASSERT_TRUE(pref_value); |
+ ASSERT_TRUE(expected_value->Equals(pref_value)); |
+ } else { |
+ ASSERT_FALSE(pref_value); |
+ } |
+ expected_props_.erase(pref); |
+ } |
+ } |
+ |
+ void SetPrefOnUIThread(const std::string& pref_name, |
+ const base::Value* value) { |
+ DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::UI)); |
+ CrosSettings::Get()->Set(pref_name, *value); |
+ } |
+ |
+ void AddExpectation(const std::string& pref_name, base::Value* value) { |
+ expected_props_[pref_name] = value; |
+ } |
+ |
+ void PrepareEmptyPolicy(em::PolicyData* policy) { |
+ // Prepare some policy blob. |
+ em::PolicyFetchResponse response; |
+ em::ChromeDeviceSettingsProto pol; |
+ policy->set_policy_type(chromeos::kDevicePolicyType); |
+ policy->set_username("me@owner"); |
+ policy->set_policy_value(pol.SerializeAsString()); |
+ // Wipe the signed settings store. |
+ response.set_policy_data(policy->SerializeAsString()); |
+ response.set_policy_data_signature("false"); |
+ } |
+ |
+ std::map<std::string, base::Value*> expected_props_; |
+ |
+ MessageLoop message_loop_; |
+ content::TestBrowserThread ui_thread_; |
+ content::TestBrowserThread file_thread_; |
+ |
+ base::WeakPtrFactory<CrosSettingsTest> pointer_factory_; |
+ |
+ ScopedTestingLocalState local_state_; |
+ |
+ ScopedStubCrosEnabler stub_cros_enabler_; |
+}; |
+ |
+TEST_F(CrosSettingsTest, SetPref) { |
+ // Change to something that is not the default. |
+ AddExpectation(kAccountsPrefAllowGuest, |
+ base::Value::CreateBooleanValue(false)); |
+ SetPref(kAccountsPrefAllowGuest, expected_props_[kAccountsPrefAllowGuest]); |
+ FetchPref(kAccountsPrefAllowGuest); |
+ message_loop_.RunAllPending(); |
+ ASSERT_TRUE(expected_props_.empty()); |
+} |
+ |
+TEST_F(CrosSettingsTest, GetPref) { |
+ // We didn't change the default so look for it. |
+ AddExpectation(kAccountsPrefAllowGuest, |
+ base::Value::CreateBooleanValue(true)); |
+ FetchPref(kAccountsPrefAllowGuest); |
+ message_loop_.RunAllPending(); |
+ ASSERT_TRUE(expected_props_.empty()); |
+} |
+ |
+TEST_F(CrosSettingsTest, SetWhitelist) { |
+ // Setting the whitelist should also switch the value of |
+ // kAccountsPrefAllowNewUser to false. |
+ scoped_ptr<base::ListValue> whitelist(new base::ListValue); |
+ whitelist->Append(base::Value::CreateStringValue("me@owner")); |
+ AddExpectation(kAccountsPrefAllowNewUser, |
+ base::Value::CreateBooleanValue(false)); |
+ AddExpectation(kAccountsPrefUsers, whitelist->DeepCopy()); |
+ SetPref(kAccountsPrefUsers, whitelist.get()); |
+ FetchPref(kAccountsPrefAllowNewUser); |
+ FetchPref(kAccountsPrefUsers); |
+ message_loop_.RunAllPending(); |
+ ASSERT_TRUE(expected_props_.empty()); |
+} |
+ |
+TEST_F(CrosSettingsTest, SetWhitelistWithListOps) { |
+ base::ListValue* whitelist = new base::ListValue(); |
+ scoped_ptr<base::Value> hacky_user(base::Value::CreateStringValue("h@xxor")); |
+ whitelist->Append(hacky_user->DeepCopy()); |
+ AddExpectation(kAccountsPrefAllowNewUser, |
+ base::Value::CreateBooleanValue(false)); |
+ AddExpectation(kAccountsPrefUsers, whitelist); |
+ // Add some user to the whitelist. |
+ content::BrowserThread::PostTask( |
+ content::BrowserThread::UI, FROM_HERE, |
+ base::Bind(&CrosSettings::AppendToList, |
+ base::Unretained(CrosSettings::Get()), |
+ kAccountsPrefUsers, hacky_user.get())); |
+ FetchPref(kAccountsPrefAllowNewUser); |
+ FetchPref(kAccountsPrefUsers); |
+ message_loop_.RunAllPending(); |
+ ASSERT_TRUE(expected_props_.empty()); |
+} |
+ |
+TEST_F(CrosSettingsTest, SetWhitelistWithListOps2) { |
+ scoped_ptr<base::ListValue> whitelist(new base::ListValue); |
+ scoped_ptr<base::Value> hacky_user(base::Value::CreateStringValue("h@xxor")); |
+ scoped_ptr<base::Value> lamy_user(base::Value::CreateStringValue("l@mer")); |
+ whitelist->Append(hacky_user->DeepCopy()); |
+ base::ListValue* expected_list = whitelist->DeepCopy(); |
+ whitelist->Append(lamy_user->DeepCopy()); |
+ AddExpectation(kAccountsPrefAllowNewUser, |
+ base::Value::CreateBooleanValue(false)); |
+ AddExpectation(kAccountsPrefUsers, whitelist->DeepCopy()); |
+ SetPref(kAccountsPrefUsers, whitelist.get()); |
+ FetchPref(kAccountsPrefAllowNewUser); |
+ FetchPref(kAccountsPrefUsers); |
+ message_loop_.RunAllPending(); |
+ // Now try to remove one element from that list. |
+ AddExpectation(kAccountsPrefUsers, expected_list); |
+ content::BrowserThread::PostTask( |
+ content::BrowserThread::UI, FROM_HERE, |
+ base::Bind(&CrosSettings::RemoveFromList, |
+ base::Unretained(CrosSettings::Get()), |
+ kAccountsPrefUsers, lamy_user.get())); |
+ FetchPref(kAccountsPrefAllowNewUser); |
+ FetchPref(kAccountsPrefUsers); |
+ message_loop_.RunAllPending(); |
+ ASSERT_TRUE(expected_props_.empty()); |
+} |
+ |
+TEST_F(CrosSettingsTest, SetEmptyWhitelist) { |
+ // Setting the whitelist empty should switch the value of |
+ // kAccountsPrefAllowNewUser to true. |
+ scoped_ptr<base::ListValue> whitelist(new base::ListValue); |
+ scoped_ptr<base::Value> disallow_new(base::Value::CreateBooleanValue(false)); |
+ AddExpectation(kAccountsPrefAllowNewUser, |
+ base::Value::CreateBooleanValue(true)); |
+ SetPref(kAccountsPrefUsers, whitelist.get()); |
+ SetPref(kAccountsPrefAllowNewUser, disallow_new.get()); |
+ FetchPref(kAccountsPrefAllowNewUser); |
+ FetchPref(kAccountsPrefUsers); |
+ message_loop_.RunAllPending(); |
+ ASSERT_TRUE(expected_props_.empty()); |
+} |
+ |
+TEST_F(CrosSettingsTest, SetWhitelistAndNoNewUsers) { |
+ // Setting the whitelist should allow us to set kAccountsPrefAllowNewUser to |
+ // false (which is the implicit value too). |
+ scoped_ptr<base::ListValue> whitelist(new base::ListValue); |
+ whitelist->Append(base::Value::CreateStringValue("me@owner")); |
+ AddExpectation(kAccountsPrefUsers, whitelist->DeepCopy()); |
+ AddExpectation(kAccountsPrefAllowNewUser, |
+ base::Value::CreateBooleanValue(false)); |
+ SetPref(kAccountsPrefUsers, whitelist.get()); |
+ SetPref(kAccountsPrefAllowNewUser, |
+ expected_props_[kAccountsPrefAllowNewUser]); |
+ FetchPref(kAccountsPrefAllowNewUser); |
+ FetchPref(kAccountsPrefUsers); |
+ message_loop_.RunAllPending(); |
+ ASSERT_TRUE(expected_props_.empty()); |
+} |
+ |
+TEST_F(CrosSettingsTest, SetAllowNewUsers) { |
+ // Setting kAccountsPrefAllowNewUser to true with no whitelist should be ok. |
+ AddExpectation(kAccountsPrefAllowNewUser, |
+ base::Value::CreateBooleanValue(true)); |
+ SetPref(kAccountsPrefAllowNewUser, |
+ expected_props_[kAccountsPrefAllowNewUser]); |
+ FetchPref(kAccountsPrefAllowNewUser); |
+ message_loop_.RunAllPending(); |
+ ASSERT_TRUE(expected_props_.empty()); |
+} |
+ |
+TEST_F(CrosSettingsTest, SetOwner) { |
+ scoped_ptr<base::Value> hacky_owner(base::Value::CreateStringValue("h@xxor")); |
+ AddExpectation(kDeviceOwner, base::Value::CreateStringValue("h@xxor")); |
+ SetPref(kDeviceOwner, hacky_owner.get()); |
+ FetchPref(kDeviceOwner); |
+ message_loop_.RunAllPending(); |
+ ASSERT_TRUE(expected_props_.empty()); |
+} |
+ |
+} // namespace chromeos |