| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/chromeos/network_settings/onc_validator.h" | |
| 6 | |
| 7 #include <string> | |
| 8 | |
| 9 #include "base/memory/scoped_ptr.h" | |
| 10 #include "base/values.h" | |
| 11 #include "chrome/browser/chromeos/cros/onc_constants.h" | |
| 12 #include "chrome/browser/chromeos/network_settings/onc_signature.h" | |
| 13 #include "chrome/browser/chromeos/network_settings/onc_test_utils.h" | |
| 14 #include "testing/gtest/include/gtest/gtest.h" | |
| 15 | |
| 16 namespace chromeos { | |
| 17 namespace onc { | |
| 18 namespace { | |
| 19 | |
| 20 // Create a strict validator that complains about every error. | |
| 21 scoped_ptr<Validator> CreateStrictValidator(bool managed_onc) { | |
| 22 return make_scoped_ptr(new Validator(true, true, true, managed_onc)); | |
| 23 } | |
| 24 | |
| 25 // Create a liberal validator that ignores or repairs non-critical errors. | |
| 26 scoped_ptr<Validator> CreateLiberalValidator(bool managed_onc) { | |
| 27 return make_scoped_ptr(new Validator(false, false, false, managed_onc)); | |
| 28 } | |
| 29 } // namespace | |
| 30 | |
| 31 // This test case is about validating valid ONC objects. | |
| 32 TEST(ONCValidatorValidTest, ValidPolicyOnc) { | |
| 33 scoped_ptr<Validator> validator(CreateStrictValidator(true)); | |
| 34 scoped_ptr<const base::DictionaryValue> network; | |
| 35 scoped_ptr<base::DictionaryValue> repaired; | |
| 36 | |
| 37 network = test_utils::ReadTestDictionary("policy.onc"); | |
| 38 repaired = validator->ValidateAndRepairObject( | |
| 39 &kNetworkConfigurationSignature, | |
| 40 *network); | |
| 41 EXPECT_TRUE(test_utils::Equals(network.get(), repaired.get())); | |
| 42 | |
| 43 network = test_utils::ReadTestDictionary("valid.onc"); | |
| 44 repaired = validator->ValidateAndRepairObject( | |
| 45 &kNetworkConfigurationSignature, | |
| 46 *network); | |
| 47 EXPECT_TRUE(test_utils::Equals(network.get(), repaired.get())); | |
| 48 } | |
| 49 | |
| 50 // Validate invalid ONC objects and check the resulting repaired object. This | |
| 51 // test fixture loads a test json file into |invalid_| containing several test | |
| 52 // objects which can be accessed by their path. The test boolean parameter | |
| 53 // determines wether to use the strict or the liberal validator. | |
| 54 class ONCValidatorInvalidTest : public ::testing::TestWithParam<bool> { | |
| 55 public: | |
| 56 // Validate the entry at |path_to_object| with the given | |
| 57 // |signature|. Depending on |managed_onc| the object is interpreted as a | |
| 58 // managed onc (with recommended fields) or not. The resulting repaired object | |
| 59 // must match the entry at |path_to_repaired| if the liberal validator is | |
| 60 // used. | |
| 61 void ValidateInvalid(const std::string& path_to_object, | |
| 62 const std::string& path_to_repaired, | |
| 63 const OncValueSignature* signature, | |
| 64 bool managed_onc) { | |
| 65 scoped_ptr<Validator> validator; | |
| 66 if (GetParam()) | |
| 67 validator = CreateStrictValidator(managed_onc); | |
| 68 else | |
| 69 validator = CreateLiberalValidator(managed_onc); | |
| 70 | |
| 71 const base::DictionaryValue* object = NULL; | |
| 72 ASSERT_TRUE(invalid_->GetDictionary(path_to_object, &object)); | |
| 73 | |
| 74 scoped_ptr<base::DictionaryValue> actual_repaired = | |
| 75 validator->ValidateAndRepairObject(signature, *object); | |
| 76 if (GetParam() || path_to_repaired == "") { | |
| 77 EXPECT_EQ(NULL, actual_repaired.get()); | |
| 78 } else { | |
| 79 const base::DictionaryValue* expected_repaired = NULL; | |
| 80 invalid_->GetDictionary(path_to_repaired, &expected_repaired); | |
| 81 EXPECT_TRUE(test_utils::Equals(expected_repaired, actual_repaired.get())); | |
| 82 } | |
| 83 } | |
| 84 | |
| 85 virtual void SetUp() { | |
| 86 invalid_ = | |
| 87 test_utils::ReadTestDictionary("invalid_settings_with_repairs.json"); | |
| 88 } | |
| 89 | |
| 90 scoped_ptr<const base::DictionaryValue> invalid_; | |
| 91 }; | |
| 92 | |
| 93 TEST_P(ONCValidatorInvalidTest, UnknownFieldName) { | |
| 94 ValidateInvalid("network-unknown-fieldname", | |
| 95 "network-repaired", | |
| 96 &kNetworkConfigurationSignature, false); | |
| 97 ValidateInvalid("managed-network-unknown-fieldname", | |
| 98 "managed-network-repaired", | |
| 99 &kNetworkConfigurationSignature, true); | |
| 100 } | |
| 101 | |
| 102 TEST_P(ONCValidatorInvalidTest, UnknownType) { | |
| 103 ValidateInvalid("network-unknown-type", | |
| 104 "", | |
| 105 &kNetworkConfigurationSignature, false); | |
| 106 ValidateInvalid("managed-network-unknown-type", | |
| 107 "", | |
| 108 &kNetworkConfigurationSignature, true); | |
| 109 } | |
| 110 | |
| 111 TEST_P(ONCValidatorInvalidTest, UnknownRecommendedFieldName) { | |
| 112 ValidateInvalid("managed-network-unknown-recommended", | |
| 113 "managed-network-repaired", | |
| 114 &kNetworkConfigurationSignature, true); | |
| 115 } | |
| 116 | |
| 117 TEST_P(ONCValidatorInvalidTest, DictionaryRecommended) { | |
| 118 ValidateInvalid("managed-network-dict-recommended", | |
| 119 "managed-network-repaired", | |
| 120 &kNetworkConfigurationSignature, true); | |
| 121 } | |
| 122 | |
| 123 TEST_P(ONCValidatorInvalidTest, MissingRequiredField) { | |
| 124 ValidateInvalid("network-missing-required", | |
| 125 "network-missing-required", | |
| 126 &kNetworkConfigurationSignature, false); | |
| 127 ValidateInvalid("managed-network-missing-required", | |
| 128 "managed-network-missing-required", | |
| 129 &kNetworkConfigurationSignature, true); | |
| 130 } | |
| 131 | |
| 132 TEST_P(ONCValidatorInvalidTest, RecommendedInUnmanaged) { | |
| 133 ValidateInvalid("network-illegal-recommended", | |
| 134 "network-repaired", | |
| 135 &kNetworkConfigurationSignature, false); | |
| 136 } | |
| 137 | |
| 138 INSTANTIATE_TEST_CASE_P(ONCValidatorInvalidTest, | |
| 139 ONCValidatorInvalidTest, | |
| 140 ::testing::Bool()); | |
| 141 | |
| 142 } // namespace onc | |
| 143 } // namespace chromeos | |
| OLD | NEW |