| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/policy/configuration_policy_handler_chromeos.h" | 5 #include "chrome/browser/policy/configuration_policy_handler_chromeos.h" |
| 6 | 6 |
| 7 #include "base/prefs/pref_value_map.h" | 7 #include "base/prefs/pref_value_map.h" |
| 8 #include "chrome/browser/policy/policy_error_map.h" | 8 #include "chrome/browser/policy/policy_error_map.h" |
| 9 #include "chrome/browser/policy/policy_map.h" | 9 #include "chrome/browser/policy/policy_map.h" |
| 10 #include "chrome/browser/ui/ash/chrome_launcher_prefs.h" | 10 #include "chrome/browser/ui/ash/chrome_launcher_prefs.h" |
| 11 #include "chrome/common/pref_names.h" | 11 #include "chrome/common/pref_names.h" |
| 12 #include "policy/policy_constants.h" | 12 #include "policy/policy_constants.h" |
| 13 #include "testing/gtest/include/gtest/gtest.h" | 13 #include "testing/gtest/include/gtest/gtest.h" |
| 14 | 14 |
| 15 namespace policy { | 15 namespace policy { |
| 16 | 16 |
| 17 TEST(NetworkConfigurationPolicyHandlerTest, Empty) { | 17 TEST(NetworkConfigurationPolicyHandlerTest, Empty) { |
| 18 PolicyMap policy_map; | 18 PolicyMap policy_map; |
| 19 NetworkConfigurationPolicyHandler handler( | 19 NetworkConfigurationPolicyHandler handler( |
| 20 key::kOpenNetworkConfiguration, | 20 key::kOpenNetworkConfiguration, |
| 21 chromeos::NetworkUIData::ONC_SOURCE_USER_POLICY); | 21 chromeos::onc::ONC_SOURCE_USER_POLICY); |
| 22 PolicyErrorMap errors; | 22 PolicyErrorMap errors; |
| 23 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); | 23 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); |
| 24 EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); | 24 EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); |
| 25 } | 25 } |
| 26 | 26 |
| 27 TEST(NetworkConfigurationPolicyHandlerTest, ValidONC) { | 27 TEST(NetworkConfigurationPolicyHandlerTest, ValidONC) { |
| 28 const std::string kTestONC( | 28 const std::string kTestONC( |
| 29 "{" | 29 "{" |
| 30 " \"NetworkConfigurations\": [{" | 30 " \"NetworkConfigurations\": [{" |
| 31 " \"GUID\": \"{485d6076-dd44-6b6d-69787465725f5045}\"," | 31 " \"GUID\": \"{485d6076-dd44-6b6d-69787465725f5045}\"," |
| 32 " \"Type\": \"WiFi\"," | 32 " \"Type\": \"WiFi\"," |
| 33 " \"Name\": \"some name\"," | 33 " \"Name\": \"some name\"," |
| 34 " \"WiFi\": {" | 34 " \"WiFi\": {" |
| 35 " \"Security\": \"WEP-PSK\"," | 35 " \"Security\": \"WEP-PSK\"," |
| 36 " \"SSID\": \"ssid\"," | 36 " \"SSID\": \"ssid\"," |
| 37 " \"Passphrase\": \"pass\"," | 37 " \"Passphrase\": \"pass\"," |
| 38 " }" | 38 " }" |
| 39 " }]" | 39 " }]" |
| 40 "}"); | 40 "}"); |
| 41 | 41 |
| 42 PolicyMap policy_map; | 42 PolicyMap policy_map; |
| 43 policy_map.Set(key::kOpenNetworkConfiguration, | 43 policy_map.Set(key::kOpenNetworkConfiguration, |
| 44 POLICY_LEVEL_MANDATORY, | 44 POLICY_LEVEL_MANDATORY, |
| 45 POLICY_SCOPE_USER, | 45 POLICY_SCOPE_USER, |
| 46 Value::CreateStringValue(kTestONC)); | 46 Value::CreateStringValue(kTestONC)); |
| 47 NetworkConfigurationPolicyHandler handler( | 47 NetworkConfigurationPolicyHandler handler( |
| 48 key::kOpenNetworkConfiguration, | 48 key::kOpenNetworkConfiguration, |
| 49 chromeos::NetworkUIData::ONC_SOURCE_USER_POLICY); | 49 chromeos::onc::ONC_SOURCE_USER_POLICY); |
| 50 PolicyErrorMap errors; | 50 PolicyErrorMap errors; |
| 51 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); | 51 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); |
| 52 EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); | 52 EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); |
| 53 } | 53 } |
| 54 | 54 |
| 55 TEST(NetworkConfigurationPolicyHandlerTest, WrongType) { | 55 TEST(NetworkConfigurationPolicyHandlerTest, WrongType) { |
| 56 PolicyMap policy_map; | 56 PolicyMap policy_map; |
| 57 policy_map.Set(key::kOpenNetworkConfiguration, | 57 policy_map.Set(key::kOpenNetworkConfiguration, |
| 58 POLICY_LEVEL_MANDATORY, | 58 POLICY_LEVEL_MANDATORY, |
| 59 POLICY_SCOPE_USER, | 59 POLICY_SCOPE_USER, |
| 60 Value::CreateBooleanValue(false)); | 60 Value::CreateBooleanValue(false)); |
| 61 NetworkConfigurationPolicyHandler handler( | 61 NetworkConfigurationPolicyHandler handler( |
| 62 key::kOpenNetworkConfiguration, | 62 key::kOpenNetworkConfiguration, |
| 63 chromeos::NetworkUIData::ONC_SOURCE_USER_POLICY); | 63 chromeos::onc::ONC_SOURCE_USER_POLICY); |
| 64 PolicyErrorMap errors; | 64 PolicyErrorMap errors; |
| 65 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); | 65 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); |
| 66 EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); | 66 EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); |
| 67 } | 67 } |
| 68 | 68 |
| 69 TEST(NetworkConfigurationPolicyHandlerTest, JSONParseError) { | 69 TEST(NetworkConfigurationPolicyHandlerTest, JSONParseError) { |
| 70 const std::string kTestONC("I'm not proper JSON!"); | 70 const std::string kTestONC("I'm not proper JSON!"); |
| 71 PolicyMap policy_map; | 71 PolicyMap policy_map; |
| 72 policy_map.Set(key::kOpenNetworkConfiguration, | 72 policy_map.Set(key::kOpenNetworkConfiguration, |
| 73 POLICY_LEVEL_MANDATORY, | 73 POLICY_LEVEL_MANDATORY, |
| 74 POLICY_SCOPE_USER, | 74 POLICY_SCOPE_USER, |
| 75 Value::CreateStringValue(kTestONC)); | 75 Value::CreateStringValue(kTestONC)); |
| 76 NetworkConfigurationPolicyHandler handler( | 76 NetworkConfigurationPolicyHandler handler( |
| 77 key::kOpenNetworkConfiguration, | 77 key::kOpenNetworkConfiguration, |
| 78 chromeos::NetworkUIData::ONC_SOURCE_USER_POLICY); | 78 chromeos::onc::ONC_SOURCE_USER_POLICY); |
| 79 PolicyErrorMap errors; | 79 PolicyErrorMap errors; |
| 80 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); | 80 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); |
| 81 EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); | 81 EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); |
| 82 } | 82 } |
| 83 | 83 |
| 84 TEST(NetworkConfigurationPolicyHandlerTest, Sanitization) { | 84 TEST(NetworkConfigurationPolicyHandlerTest, Sanitization) { |
| 85 const std::string kTestONC( | 85 const std::string kTestONC( |
| 86 "{" | 86 "{" |
| 87 " \"NetworkConfigurations\": [{" | 87 " \"NetworkConfigurations\": [{" |
| 88 " \"GUID\": \"{485d6076-dd44-6b6d-69787465725f5045}\"," | 88 " \"GUID\": \"{485d6076-dd44-6b6d-69787465725f5045}\"," |
| 89 " \"Type\": \"WiFi\"," | 89 " \"Type\": \"WiFi\"," |
| 90 " \"Name\": \"some name\"," | 90 " \"Name\": \"some name\"," |
| 91 " \"WiFi\": {" | 91 " \"WiFi\": {" |
| 92 " \"Security\": \"WEP-PSK\"," | 92 " \"Security\": \"WEP-PSK\"," |
| 93 " \"SSID\": \"ssid\"," | 93 " \"SSID\": \"ssid\"," |
| 94 " \"Passphrase\": \"pass\"," | 94 " \"Passphrase\": \"pass\"," |
| 95 " }" | 95 " }" |
| 96 " }]" | 96 " }]" |
| 97 "}"); | 97 "}"); |
| 98 | 98 |
| 99 PolicyMap policy_map; | 99 PolicyMap policy_map; |
| 100 policy_map.Set(key::kOpenNetworkConfiguration, | 100 policy_map.Set(key::kOpenNetworkConfiguration, |
| 101 POLICY_LEVEL_MANDATORY, | 101 POLICY_LEVEL_MANDATORY, |
| 102 POLICY_SCOPE_USER, | 102 POLICY_SCOPE_USER, |
| 103 Value::CreateStringValue(kTestONC)); | 103 Value::CreateStringValue(kTestONC)); |
| 104 NetworkConfigurationPolicyHandler handler( | 104 NetworkConfigurationPolicyHandler handler( |
| 105 key::kOpenNetworkConfiguration, | 105 key::kOpenNetworkConfiguration, |
| 106 chromeos::NetworkUIData::ONC_SOURCE_USER_POLICY); | 106 chromeos::onc::ONC_SOURCE_USER_POLICY); |
| 107 PolicyErrorMap errors; | 107 PolicyErrorMap errors; |
| 108 handler.PrepareForDisplaying(&policy_map); | 108 handler.PrepareForDisplaying(&policy_map); |
| 109 const Value* sanitized = policy_map.GetValue(key::kOpenNetworkConfiguration); | 109 const Value* sanitized = policy_map.GetValue(key::kOpenNetworkConfiguration); |
| 110 ASSERT_TRUE(sanitized); | 110 ASSERT_TRUE(sanitized); |
| 111 std::string sanitized_onc; | 111 std::string sanitized_onc; |
| 112 EXPECT_TRUE(sanitized->GetAsString(&sanitized_onc)); | 112 EXPECT_TRUE(sanitized->GetAsString(&sanitized_onc)); |
| 113 EXPECT_FALSE(sanitized_onc.empty()); | 113 EXPECT_FALSE(sanitized_onc.empty()); |
| 114 EXPECT_EQ(std::string::npos, sanitized_onc.find("pass")); | 114 EXPECT_EQ(std::string::npos, sanitized_onc.find("pass")); |
| 115 } | 115 } |
| 116 | 116 |
| (...skipping 18 matching lines...) Expand all Loading... |
| 135 list.Append(entry1.DeepCopy()); | 135 list.Append(entry1.DeepCopy()); |
| 136 policy_map.Set(key::kPinnedLauncherApps, POLICY_LEVEL_MANDATORY, | 136 policy_map.Set(key::kPinnedLauncherApps, POLICY_LEVEL_MANDATORY, |
| 137 POLICY_SCOPE_USER, list.DeepCopy()); | 137 POLICY_SCOPE_USER, list.DeepCopy()); |
| 138 prefs.Clear(); | 138 prefs.Clear(); |
| 139 handler.ApplyPolicySettings(policy_map, &prefs); | 139 handler.ApplyPolicySettings(policy_map, &prefs); |
| 140 EXPECT_TRUE(prefs.GetValue(prefs::kPinnedLauncherApps, &value)); | 140 EXPECT_TRUE(prefs.GetValue(prefs::kPinnedLauncherApps, &value)); |
| 141 EXPECT_TRUE(base::Value::Equals(&expected_pinned_apps, value)); | 141 EXPECT_TRUE(base::Value::Equals(&expected_pinned_apps, value)); |
| 142 } | 142 } |
| 143 | 143 |
| 144 } // namespace policy | 144 } // namespace policy |
| OLD | NEW |