Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(447)

Side by Side Diff: chrome/browser/policy/generate_policy_source_unittest.cc

Issue 113813003: Cleanup the policy code after the recent moves into the component. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: rebase Created 7 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include <string>
6
7 #include "base/memory/scoped_ptr.h"
8 #include "base/values.h"
9 #include "build/build_config.h"
10 #include "components/policy/core/common/policy_details.h"
11 #include "components/policy/core/common/schema.h"
12 #include "policy/policy_constants.h"
13 #include "testing/gtest/include/gtest/gtest.h"
14
15 // This unittest tests the code generated by
16 // chrome/tools/build/generate_policy_source.py.
17
18 namespace policy {
19
20 TEST(GeneratePolicySource, ChromeSchemaData) {
21 Schema schema = Schema::Wrap(GetChromeSchemaData());
22 ASSERT_TRUE(schema.valid());
23 EXPECT_EQ(base::Value::TYPE_DICTIONARY, schema.type());
24
25 Schema subschema = schema.GetAdditionalProperties();
26 EXPECT_FALSE(subschema.valid());
27
28 subschema = schema.GetProperty("no such policy exists");
29 EXPECT_FALSE(subschema.valid());
30
31 subschema = schema.GetProperty(key::kAlternateErrorPagesEnabled);
32 ASSERT_TRUE(subschema.valid());
33 EXPECT_EQ(base::Value::TYPE_BOOLEAN, subschema.type());
34
35 subschema = schema.GetProperty(key::kIncognitoModeAvailability);
36 ASSERT_TRUE(subschema.valid());
37 EXPECT_EQ(base::Value::TYPE_INTEGER, subschema.type());
38
39 subschema = schema.GetProperty(key::kProxyMode);
40 ASSERT_TRUE(subschema.valid());
41 EXPECT_EQ(base::Value::TYPE_STRING, subschema.type());
42
43 subschema = schema.GetProperty(key::kCookiesAllowedForUrls);
44 ASSERT_TRUE(subschema.valid());
45 EXPECT_EQ(base::Value::TYPE_LIST, subschema.type());
46 ASSERT_TRUE(subschema.GetItems().valid());
47 EXPECT_EQ(base::Value::TYPE_STRING, subschema.GetItems().type());
48
49 subschema = schema.GetProperty(key::kProxySettings);
50 ASSERT_TRUE(subschema.valid());
51 EXPECT_EQ(base::Value::TYPE_DICTIONARY, subschema.type());
52 EXPECT_FALSE(subschema.GetAdditionalProperties().valid());
53 EXPECT_FALSE(subschema.GetProperty("no such proxy key exists").valid());
54 ASSERT_TRUE(subschema.GetProperty(key::kProxyMode).valid());
55 ASSERT_TRUE(subschema.GetProperty(key::kProxyServer).valid());
56 ASSERT_TRUE(subschema.GetProperty(key::kProxyServerMode).valid());
57 ASSERT_TRUE(subschema.GetProperty(key::kProxyPacUrl).valid());
58 ASSERT_TRUE(subschema.GetProperty(key::kProxyBypassList).valid());
59
60 // Verify that all the Chrome policies are there.
61 for (Schema::Iterator it = schema.GetPropertiesIterator();
62 !it.IsAtEnd(); it.Advance()) {
63 EXPECT_TRUE(it.key());
64 EXPECT_FALSE(std::string(it.key()).empty());
65 EXPECT_TRUE(GetChromePolicyDetails(it.key()));
66 }
67
68 // The properties are iterated in order.
69 const char* kExpectedProperties[] = {
70 key::kProxyBypassList,
71 key::kProxyMode,
72 key::kProxyPacUrl,
73 key::kProxyServer,
74 key::kProxyServerMode,
75 NULL,
76 };
77 const char** next = kExpectedProperties;
78 for (Schema::Iterator it(subschema.GetPropertiesIterator());
79 !it.IsAtEnd(); it.Advance(), ++next) {
80 ASSERT_TRUE(*next != NULL);
81 EXPECT_STREQ(*next, it.key());
82 ASSERT_TRUE(it.schema().valid());
83 EXPECT_EQ(base::Value::TYPE_STRING, it.schema().type());
84 }
85 EXPECT_TRUE(*next == NULL);
86 }
87
88 TEST(GeneratePolicySource, PolicyDetails) {
89 EXPECT_FALSE(GetChromePolicyDetails(""));
90 EXPECT_FALSE(GetChromePolicyDetails("no such policy"));
91 EXPECT_FALSE(GetChromePolicyDetails("AlternateErrorPagesEnable"));
92 EXPECT_FALSE(GetChromePolicyDetails("alternateErrorPagesEnabled"));
93 EXPECT_FALSE(GetChromePolicyDetails("AAlternateErrorPagesEnabled"));
94
95 const PolicyDetails* details =
96 GetChromePolicyDetails(key::kAlternateErrorPagesEnabled);
97 ASSERT_TRUE(details);
98 EXPECT_FALSE(details->is_deprecated);
99 EXPECT_FALSE(details->is_device_policy);
100 EXPECT_EQ(5, details->id);
101 EXPECT_EQ(0u, details->max_external_data_size);
102
103 details = GetChromePolicyDetails(key::kJavascriptEnabled);
104 ASSERT_TRUE(details);
105 EXPECT_TRUE(details->is_deprecated);
106 EXPECT_FALSE(details->is_device_policy);
107 EXPECT_EQ(9, details->id);
108 EXPECT_EQ(0u, details->max_external_data_size);
109
110 #if defined(OS_CHROMEOS)
111 details = GetChromePolicyDetails(key::kDevicePolicyRefreshRate);
112 ASSERT_TRUE(details);
113 EXPECT_FALSE(details->is_deprecated);
114 EXPECT_TRUE(details->is_device_policy);
115 EXPECT_EQ(90, details->id);
116 EXPECT_EQ(0u, details->max_external_data_size);
117 #endif
118
119 // TODO(bartfab): add a test that verifies a max_external_data_size larger
120 // than 0, once a type 'external' policy is added.
121 }
122
123 } // namespace policy
OLDNEW
« no previous file with comments | « chrome/browser/policy/configuration_policy_pref_store_test.cc ('k') | chrome/browser/policy/policy_transformations.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698