Index: chrome/browser/chromeos/cros_settings_unittest.cc |
diff --git a/chrome/browser/chromeos/cros_settings_unittest.cc b/chrome/browser/chromeos/cros_settings_unittest.cc |
deleted file mode 100644 |
index 7cf10796c502722e4abad85a695426bcc3b9424d..0000000000000000000000000000000000000000 |
--- a/chrome/browser/chromeos/cros_settings_unittest.cc |
+++ /dev/null |
@@ -1,276 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/browser/chromeos/login/signed_settings.h" |
- |
-#include <map> |
-#include <string> |
- |
-#include "base/bind.h" |
-#include "base/memory/weak_ptr.h" |
-#include "base/message_loop.h" |
-#include "base/stl_util.h" |
-#include "base/values.h" |
-#include "chrome/browser/chromeos/cros/cros_library.h" |
-#include "chrome/browser/chromeos/cros_settings.h" |
-#include "chrome/browser/chromeos/cros_settings_names.h" |
-#include "chrome/browser/chromeos/login/mock_user_manager.h" |
-#include "chrome/browser/chromeos/login/signed_settings_cache.h" |
-#include "chrome/browser/policy/proto/chrome_device_policy.pb.h" |
-#include "chrome/browser/policy/proto/device_management_backend.pb.h" |
-#include "chrome/test/base/testing_browser_process.h" |
-#include "chrome/test/base/testing_pref_service.h" |
-#include "content/public/test/test_browser_thread.h" |
-#include "testing/gtest/include/gtest/gtest.h" |
- |
-using ::testing::AnyNumber; |
-using ::testing::Return; |
- |
-namespace em = enterprise_management; |
-namespace chromeos { |
- |
-class CrosSettingsTest : public testing::Test { |
- protected: |
- CrosSettingsTest() |
- : message_loop_(MessageLoop::TYPE_UI), |
- ui_thread_(content::BrowserThread::UI, &message_loop_), |
- file_thread_(content::BrowserThread::FILE, &message_loop_), |
- pointer_factory_(this), |
- local_state_(static_cast<TestingBrowserProcess*>(g_browser_process)) { |
- } |
- |
- virtual ~CrosSettingsTest() { |
- } |
- |
- virtual void SetUp() { |
- EXPECT_CALL(*mock_user_manager_.user_manager(), IsCurrentUserOwner()) |
- .Times(AnyNumber()) |
- .WillRepeatedly(Return(true)); |
- // Reset the cache between tests. |
- ApplyEmptyPolicy(); |
- } |
- |
- virtual void TearDown() { |
- message_loop_.RunAllPending(); |
- ASSERT_TRUE(expected_props_.empty()); |
- // Reset the cache between tests. |
- ApplyEmptyPolicy(); |
- STLDeleteValues(&expected_props_); |
- } |
- |
- void FetchPref(const std::string& pref) { |
- DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::UI)); |
- if (expected_props_.find(pref) == expected_props_.end()) |
- return; |
- |
- if (CrosSettingsProvider::TRUSTED == |
- CrosSettings::Get()->PrepareTrustedValues( |
- base::Bind(&CrosSettingsTest::FetchPref, |
- pointer_factory_.GetWeakPtr(), pref))) { |
- scoped_ptr<base::Value> expected_value( |
- expected_props_.find(pref)->second); |
- const base::Value* pref_value = CrosSettings::Get()->GetPref(pref); |
- if (expected_value.get()) { |
- ASSERT_TRUE(pref_value); |
- ASSERT_TRUE(expected_value->Equals(pref_value)); |
- } else { |
- ASSERT_FALSE(pref_value); |
- } |
- expected_props_.erase(pref); |
- } |
- } |
- |
- void SetPref(const std::string& pref_name, const base::Value* value) { |
- DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::UI)); |
- CrosSettings::Get()->Set(pref_name, *value); |
- } |
- |
- void AddExpectation(const std::string& pref_name, base::Value* value) { |
- base::Value*& entry = expected_props_[pref_name]; |
- delete entry; |
- entry = value; |
- } |
- |
- void PrepareEmptyPolicy(em::PolicyData* policy) { |
- // Prepare some policy blob. |
- em::PolicyFetchResponse response; |
- em::ChromeDeviceSettingsProto pol; |
- policy->set_policy_type(chromeos::kDevicePolicyType); |
- policy->set_username("me@owner"); |
- policy->set_policy_value(pol.SerializeAsString()); |
- // Wipe the signed settings store. |
- response.set_policy_data(policy->SerializeAsString()); |
- response.set_policy_data_signature("false"); |
- } |
- |
- void ApplyEmptyPolicy() { |
- em::PolicyData fake_pol; |
- PrepareEmptyPolicy(&fake_pol); |
- signed_settings_cache::Store(fake_pol, local_state_.Get()); |
- CrosSettings::Get()->ReloadProviders(); |
- } |
- |
- std::map<std::string, base::Value*> expected_props_; |
- |
- MessageLoop message_loop_; |
- content::TestBrowserThread ui_thread_; |
- content::TestBrowserThread file_thread_; |
- |
- base::WeakPtrFactory<CrosSettingsTest> pointer_factory_; |
- |
- ScopedTestingLocalState local_state_; |
- |
- ScopedMockUserManagerEnabler mock_user_manager_; |
- ScopedStubCrosEnabler stub_cros_enabler_; |
-}; |
- |
-TEST_F(CrosSettingsTest, SetPref) { |
- // Change to something that is not the default. |
- AddExpectation(kAccountsPrefAllowGuest, |
- base::Value::CreateBooleanValue(false)); |
- SetPref(kAccountsPrefAllowGuest, expected_props_[kAccountsPrefAllowGuest]); |
- FetchPref(kAccountsPrefAllowGuest); |
- message_loop_.RunAllPending(); |
- ASSERT_TRUE(expected_props_.empty()); |
-} |
- |
-TEST_F(CrosSettingsTest, GetPref) { |
- // We didn't change the default so look for it. |
- AddExpectation(kAccountsPrefAllowGuest, |
- base::Value::CreateBooleanValue(true)); |
- FetchPref(kAccountsPrefAllowGuest); |
-} |
- |
-TEST_F(CrosSettingsTest, SetWhitelist) { |
- // Setting the whitelist should also switch the value of |
- // kAccountsPrefAllowNewUser to false. |
- base::ListValue whitelist; |
- whitelist.Append(base::Value::CreateStringValue("me@owner")); |
- AddExpectation(kAccountsPrefAllowNewUser, |
- base::Value::CreateBooleanValue(false)); |
- AddExpectation(kAccountsPrefUsers, whitelist.DeepCopy()); |
- SetPref(kAccountsPrefUsers, &whitelist); |
- FetchPref(kAccountsPrefAllowNewUser); |
- FetchPref(kAccountsPrefUsers); |
-} |
- |
-TEST_F(CrosSettingsTest, SetWhitelistWithListOps) { |
- base::ListValue* whitelist = new base::ListValue(); |
- base::StringValue hacky_user("h@xxor"); |
- whitelist->Append(hacky_user.DeepCopy()); |
- AddExpectation(kAccountsPrefAllowNewUser, |
- base::Value::CreateBooleanValue(false)); |
- AddExpectation(kAccountsPrefUsers, whitelist); |
- // Add some user to the whitelist. |
- CrosSettings::Get()->AppendToList(kAccountsPrefUsers, &hacky_user); |
- FetchPref(kAccountsPrefAllowNewUser); |
- FetchPref(kAccountsPrefUsers); |
-} |
- |
-TEST_F(CrosSettingsTest, SetWhitelistWithListOps2) { |
- base::ListValue whitelist; |
- base::StringValue hacky_user("h@xxor"); |
- base::StringValue lamy_user("l@mer"); |
- whitelist.Append(hacky_user.DeepCopy()); |
- base::ListValue* expected_list = whitelist.DeepCopy(); |
- whitelist.Append(lamy_user.DeepCopy()); |
- AddExpectation(kAccountsPrefAllowNewUser, |
- base::Value::CreateBooleanValue(false)); |
- AddExpectation(kAccountsPrefUsers, whitelist.DeepCopy()); |
- SetPref(kAccountsPrefUsers, &whitelist); |
- FetchPref(kAccountsPrefAllowNewUser); |
- FetchPref(kAccountsPrefUsers); |
- message_loop_.RunAllPending(); |
- ASSERT_TRUE(expected_props_.empty()); |
- // Now try to remove one element from that list. |
- AddExpectation(kAccountsPrefUsers, expected_list); |
- CrosSettings::Get()->RemoveFromList(kAccountsPrefUsers, &lamy_user); |
- FetchPref(kAccountsPrefAllowNewUser); |
- FetchPref(kAccountsPrefUsers); |
-} |
- |
-TEST_F(CrosSettingsTest, SetEmptyWhitelist) { |
- // Setting the whitelist empty should switch the value of |
- // kAccountsPrefAllowNewUser to true. |
- base::ListValue whitelist; |
- base::FundamentalValue disallow_new(false); |
- AddExpectation(kAccountsPrefAllowNewUser, |
- base::Value::CreateBooleanValue(true)); |
- SetPref(kAccountsPrefUsers, &whitelist); |
- SetPref(kAccountsPrefAllowNewUser, &disallow_new); |
- FetchPref(kAccountsPrefAllowNewUser); |
- FetchPref(kAccountsPrefUsers); |
-} |
- |
-TEST_F(CrosSettingsTest, SetWhitelistAndNoNewUsers) { |
- // Setting the whitelist should allow us to set kAccountsPrefAllowNewUser to |
- // false (which is the implicit value too). |
- base::ListValue whitelist; |
- whitelist.Append(base::Value::CreateStringValue("me@owner")); |
- AddExpectation(kAccountsPrefUsers, whitelist.DeepCopy()); |
- AddExpectation(kAccountsPrefAllowNewUser, |
- base::Value::CreateBooleanValue(false)); |
- SetPref(kAccountsPrefUsers, &whitelist); |
- SetPref(kAccountsPrefAllowNewUser, |
- expected_props_[kAccountsPrefAllowNewUser]); |
- FetchPref(kAccountsPrefAllowNewUser); |
- FetchPref(kAccountsPrefUsers); |
-} |
- |
-TEST_F(CrosSettingsTest, SetAllowNewUsers) { |
- // Setting kAccountsPrefAllowNewUser to true with no whitelist should be ok. |
- AddExpectation(kAccountsPrefAllowNewUser, |
- base::Value::CreateBooleanValue(true)); |
- SetPref(kAccountsPrefAllowNewUser, |
- expected_props_[kAccountsPrefAllowNewUser]); |
- FetchPref(kAccountsPrefAllowNewUser); |
-} |
- |
-TEST_F(CrosSettingsTest, SetOwner) { |
- base::StringValue hacky_owner("h@xxor"); |
- AddExpectation(kDeviceOwner, base::Value::CreateStringValue("h@xxor")); |
- SetPref(kDeviceOwner, &hacky_owner); |
- FetchPref(kDeviceOwner); |
-} |
- |
-TEST_F(CrosSettingsTest, SetEphemeralUsersEnabled) { |
- base::FundamentalValue ephemeral_users_enabled(true); |
- AddExpectation(kAccountsPrefEphemeralUsersEnabled, |
- base::Value::CreateBooleanValue(true)); |
- SetPref(kAccountsPrefEphemeralUsersEnabled, &ephemeral_users_enabled); |
- FetchPref(kAccountsPrefEphemeralUsersEnabled); |
-} |
- |
-TEST_F(CrosSettingsTest, FindEmailInList) { |
- base::ListValue list; |
- list.Append(base::Value::CreateStringValue("user@example.com")); |
- list.Append(base::Value::CreateStringValue("nodomain")); |
- list.Append(base::Value::CreateStringValue("with.dots@gmail.com")); |
- list.Append(base::Value::CreateStringValue("Upper@example.com")); |
- |
- CrosSettings* cs = CrosSettings::Get(); |
- cs->Set(kAccountsPrefUsers, list); |
- |
- EXPECT_TRUE(cs->FindEmailInList(kAccountsPrefUsers, "user@example.com")); |
- EXPECT_FALSE(cs->FindEmailInList(kAccountsPrefUsers, "us.er@example.com")); |
- EXPECT_TRUE(cs->FindEmailInList(kAccountsPrefUsers, "USER@example.com")); |
- EXPECT_FALSE(cs->FindEmailInList(kAccountsPrefUsers, "user")); |
- |
- EXPECT_TRUE(cs->FindEmailInList(kAccountsPrefUsers, "nodomain")); |
- EXPECT_TRUE(cs->FindEmailInList(kAccountsPrefUsers, "nodomain@gmail.com")); |
- EXPECT_TRUE(cs->FindEmailInList(kAccountsPrefUsers, "no.domain@gmail.com")); |
- EXPECT_TRUE(cs->FindEmailInList(kAccountsPrefUsers, "NO.DOMAIN")); |
- |
- EXPECT_TRUE(cs->FindEmailInList(kAccountsPrefUsers, "with.dots@gmail.com")); |
- EXPECT_TRUE(cs->FindEmailInList(kAccountsPrefUsers, "withdots@gmail.com")); |
- EXPECT_TRUE(cs->FindEmailInList(kAccountsPrefUsers, "WITH.DOTS@gmail.com")); |
- EXPECT_TRUE(cs->FindEmailInList(kAccountsPrefUsers, "WITHDOTS")); |
- |
- EXPECT_TRUE(cs->FindEmailInList(kAccountsPrefUsers, "Upper@example.com")); |
- EXPECT_FALSE(cs->FindEmailInList(kAccountsPrefUsers, "U.pper@example.com")); |
- EXPECT_FALSE(cs->FindEmailInList(kAccountsPrefUsers, "Upper")); |
- EXPECT_TRUE(cs->FindEmailInList(kAccountsPrefUsers, "upper@example.com")); |
-} |
- |
-} // namespace chromeos |