OLD | NEW |
| (Empty) |
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include <string> | |
6 | |
7 #include "base/memory/scoped_ptr.h" | |
8 #include "base/values.h" | |
9 #include "build/build_config.h" | |
10 #include "components/policy/core/common/policy_details.h" | |
11 #include "components/policy/core/common/schema.h" | |
12 #include "policy/policy_constants.h" | |
13 #include "testing/gtest/include/gtest/gtest.h" | |
14 | |
15 // This unittest tests the code generated by | |
16 // chrome/tools/build/generate_policy_source.py. | |
17 | |
18 namespace policy { | |
19 | |
20 TEST(GeneratePolicySource, ChromeSchemaData) { | |
21 Schema schema = Schema::Wrap(GetChromeSchemaData()); | |
22 ASSERT_TRUE(schema.valid()); | |
23 EXPECT_EQ(base::Value::TYPE_DICTIONARY, schema.type()); | |
24 | |
25 Schema subschema = schema.GetAdditionalProperties(); | |
26 EXPECT_FALSE(subschema.valid()); | |
27 | |
28 subschema = schema.GetProperty("no such policy exists"); | |
29 EXPECT_FALSE(subschema.valid()); | |
30 | |
31 subschema = schema.GetProperty(key::kAlternateErrorPagesEnabled); | |
32 ASSERT_TRUE(subschema.valid()); | |
33 EXPECT_EQ(base::Value::TYPE_BOOLEAN, subschema.type()); | |
34 | |
35 subschema = schema.GetProperty(key::kIncognitoModeAvailability); | |
36 ASSERT_TRUE(subschema.valid()); | |
37 EXPECT_EQ(base::Value::TYPE_INTEGER, subschema.type()); | |
38 | |
39 subschema = schema.GetProperty(key::kProxyMode); | |
40 ASSERT_TRUE(subschema.valid()); | |
41 EXPECT_EQ(base::Value::TYPE_STRING, subschema.type()); | |
42 | |
43 subschema = schema.GetProperty(key::kCookiesAllowedForUrls); | |
44 ASSERT_TRUE(subschema.valid()); | |
45 EXPECT_EQ(base::Value::TYPE_LIST, subschema.type()); | |
46 ASSERT_TRUE(subschema.GetItems().valid()); | |
47 EXPECT_EQ(base::Value::TYPE_STRING, subschema.GetItems().type()); | |
48 | |
49 subschema = schema.GetProperty(key::kProxySettings); | |
50 ASSERT_TRUE(subschema.valid()); | |
51 EXPECT_EQ(base::Value::TYPE_DICTIONARY, subschema.type()); | |
52 EXPECT_FALSE(subschema.GetAdditionalProperties().valid()); | |
53 EXPECT_FALSE(subschema.GetProperty("no such proxy key exists").valid()); | |
54 ASSERT_TRUE(subschema.GetProperty(key::kProxyMode).valid()); | |
55 ASSERT_TRUE(subschema.GetProperty(key::kProxyServer).valid()); | |
56 ASSERT_TRUE(subschema.GetProperty(key::kProxyServerMode).valid()); | |
57 ASSERT_TRUE(subschema.GetProperty(key::kProxyPacUrl).valid()); | |
58 ASSERT_TRUE(subschema.GetProperty(key::kProxyBypassList).valid()); | |
59 | |
60 // Verify that all the Chrome policies are there. | |
61 for (Schema::Iterator it = schema.GetPropertiesIterator(); | |
62 !it.IsAtEnd(); it.Advance()) { | |
63 EXPECT_TRUE(it.key()); | |
64 EXPECT_FALSE(std::string(it.key()).empty()); | |
65 EXPECT_TRUE(GetChromePolicyDetails(it.key())); | |
66 } | |
67 | |
68 // The properties are iterated in order. | |
69 const char* kExpectedProperties[] = { | |
70 key::kProxyBypassList, | |
71 key::kProxyMode, | |
72 key::kProxyPacUrl, | |
73 key::kProxyServer, | |
74 key::kProxyServerMode, | |
75 NULL, | |
76 }; | |
77 const char** next = kExpectedProperties; | |
78 for (Schema::Iterator it(subschema.GetPropertiesIterator()); | |
79 !it.IsAtEnd(); it.Advance(), ++next) { | |
80 ASSERT_TRUE(*next != NULL); | |
81 EXPECT_STREQ(*next, it.key()); | |
82 ASSERT_TRUE(it.schema().valid()); | |
83 EXPECT_EQ(base::Value::TYPE_STRING, it.schema().type()); | |
84 } | |
85 EXPECT_TRUE(*next == NULL); | |
86 } | |
87 | |
88 TEST(GeneratePolicySource, PolicyDetails) { | |
89 EXPECT_FALSE(GetChromePolicyDetails("")); | |
90 EXPECT_FALSE(GetChromePolicyDetails("no such policy")); | |
91 EXPECT_FALSE(GetChromePolicyDetails("AlternateErrorPagesEnable")); | |
92 EXPECT_FALSE(GetChromePolicyDetails("alternateErrorPagesEnabled")); | |
93 EXPECT_FALSE(GetChromePolicyDetails("AAlternateErrorPagesEnabled")); | |
94 | |
95 const PolicyDetails* details = | |
96 GetChromePolicyDetails(key::kAlternateErrorPagesEnabled); | |
97 ASSERT_TRUE(details); | |
98 EXPECT_FALSE(details->is_deprecated); | |
99 EXPECT_FALSE(details->is_device_policy); | |
100 EXPECT_EQ(5, details->id); | |
101 EXPECT_EQ(0u, details->max_external_data_size); | |
102 | |
103 details = GetChromePolicyDetails(key::kJavascriptEnabled); | |
104 ASSERT_TRUE(details); | |
105 EXPECT_TRUE(details->is_deprecated); | |
106 EXPECT_FALSE(details->is_device_policy); | |
107 EXPECT_EQ(9, details->id); | |
108 EXPECT_EQ(0u, details->max_external_data_size); | |
109 | |
110 #if defined(OS_CHROMEOS) | |
111 details = GetChromePolicyDetails(key::kDevicePolicyRefreshRate); | |
112 ASSERT_TRUE(details); | |
113 EXPECT_FALSE(details->is_deprecated); | |
114 EXPECT_TRUE(details->is_device_policy); | |
115 EXPECT_EQ(90, details->id); | |
116 EXPECT_EQ(0u, details->max_external_data_size); | |
117 #endif | |
118 | |
119 // TODO(bartfab): add a test that verifies a max_external_data_size larger | |
120 // than 0, once a type 'external' policy is added. | |
121 } | |
122 | |
123 } // namespace policy | |
OLD | NEW |