| Index: chrome/browser/policy/generate_policy_source_unittest.cc
|
| diff --git a/chrome/browser/policy/generate_policy_source_unittest.cc b/chrome/browser/policy/generate_policy_source_unittest.cc
|
| deleted file mode 100644
|
| index e0e5ee44c462072b41bd88a15b81421a3ad63766..0000000000000000000000000000000000000000
|
| --- a/chrome/browser/policy/generate_policy_source_unittest.cc
|
| +++ /dev/null
|
| @@ -1,123 +0,0 @@
|
| -// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include <string>
|
| -
|
| -#include "base/memory/scoped_ptr.h"
|
| -#include "base/values.h"
|
| -#include "build/build_config.h"
|
| -#include "components/policy/core/common/policy_details.h"
|
| -#include "components/policy/core/common/schema.h"
|
| -#include "policy/policy_constants.h"
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -
|
| -// This unittest tests the code generated by
|
| -// chrome/tools/build/generate_policy_source.py.
|
| -
|
| -namespace policy {
|
| -
|
| -TEST(GeneratePolicySource, ChromeSchemaData) {
|
| - Schema schema = Schema::Wrap(GetChromeSchemaData());
|
| - ASSERT_TRUE(schema.valid());
|
| - EXPECT_EQ(base::Value::TYPE_DICTIONARY, schema.type());
|
| -
|
| - Schema subschema = schema.GetAdditionalProperties();
|
| - EXPECT_FALSE(subschema.valid());
|
| -
|
| - subschema = schema.GetProperty("no such policy exists");
|
| - EXPECT_FALSE(subschema.valid());
|
| -
|
| - subschema = schema.GetProperty(key::kAlternateErrorPagesEnabled);
|
| - ASSERT_TRUE(subschema.valid());
|
| - EXPECT_EQ(base::Value::TYPE_BOOLEAN, subschema.type());
|
| -
|
| - subschema = schema.GetProperty(key::kIncognitoModeAvailability);
|
| - ASSERT_TRUE(subschema.valid());
|
| - EXPECT_EQ(base::Value::TYPE_INTEGER, subschema.type());
|
| -
|
| - subschema = schema.GetProperty(key::kProxyMode);
|
| - ASSERT_TRUE(subschema.valid());
|
| - EXPECT_EQ(base::Value::TYPE_STRING, subschema.type());
|
| -
|
| - subschema = schema.GetProperty(key::kCookiesAllowedForUrls);
|
| - ASSERT_TRUE(subschema.valid());
|
| - EXPECT_EQ(base::Value::TYPE_LIST, subschema.type());
|
| - ASSERT_TRUE(subschema.GetItems().valid());
|
| - EXPECT_EQ(base::Value::TYPE_STRING, subschema.GetItems().type());
|
| -
|
| - subschema = schema.GetProperty(key::kProxySettings);
|
| - ASSERT_TRUE(subschema.valid());
|
| - EXPECT_EQ(base::Value::TYPE_DICTIONARY, subschema.type());
|
| - EXPECT_FALSE(subschema.GetAdditionalProperties().valid());
|
| - EXPECT_FALSE(subschema.GetProperty("no such proxy key exists").valid());
|
| - ASSERT_TRUE(subschema.GetProperty(key::kProxyMode).valid());
|
| - ASSERT_TRUE(subschema.GetProperty(key::kProxyServer).valid());
|
| - ASSERT_TRUE(subschema.GetProperty(key::kProxyServerMode).valid());
|
| - ASSERT_TRUE(subschema.GetProperty(key::kProxyPacUrl).valid());
|
| - ASSERT_TRUE(subschema.GetProperty(key::kProxyBypassList).valid());
|
| -
|
| - // Verify that all the Chrome policies are there.
|
| - for (Schema::Iterator it = schema.GetPropertiesIterator();
|
| - !it.IsAtEnd(); it.Advance()) {
|
| - EXPECT_TRUE(it.key());
|
| - EXPECT_FALSE(std::string(it.key()).empty());
|
| - EXPECT_TRUE(GetChromePolicyDetails(it.key()));
|
| - }
|
| -
|
| - // The properties are iterated in order.
|
| - const char* kExpectedProperties[] = {
|
| - key::kProxyBypassList,
|
| - key::kProxyMode,
|
| - key::kProxyPacUrl,
|
| - key::kProxyServer,
|
| - key::kProxyServerMode,
|
| - NULL,
|
| - };
|
| - const char** next = kExpectedProperties;
|
| - for (Schema::Iterator it(subschema.GetPropertiesIterator());
|
| - !it.IsAtEnd(); it.Advance(), ++next) {
|
| - ASSERT_TRUE(*next != NULL);
|
| - EXPECT_STREQ(*next, it.key());
|
| - ASSERT_TRUE(it.schema().valid());
|
| - EXPECT_EQ(base::Value::TYPE_STRING, it.schema().type());
|
| - }
|
| - EXPECT_TRUE(*next == NULL);
|
| -}
|
| -
|
| -TEST(GeneratePolicySource, PolicyDetails) {
|
| - EXPECT_FALSE(GetChromePolicyDetails(""));
|
| - EXPECT_FALSE(GetChromePolicyDetails("no such policy"));
|
| - EXPECT_FALSE(GetChromePolicyDetails("AlternateErrorPagesEnable"));
|
| - EXPECT_FALSE(GetChromePolicyDetails("alternateErrorPagesEnabled"));
|
| - EXPECT_FALSE(GetChromePolicyDetails("AAlternateErrorPagesEnabled"));
|
| -
|
| - const PolicyDetails* details =
|
| - GetChromePolicyDetails(key::kAlternateErrorPagesEnabled);
|
| - ASSERT_TRUE(details);
|
| - EXPECT_FALSE(details->is_deprecated);
|
| - EXPECT_FALSE(details->is_device_policy);
|
| - EXPECT_EQ(5, details->id);
|
| - EXPECT_EQ(0u, details->max_external_data_size);
|
| -
|
| - details = GetChromePolicyDetails(key::kJavascriptEnabled);
|
| - ASSERT_TRUE(details);
|
| - EXPECT_TRUE(details->is_deprecated);
|
| - EXPECT_FALSE(details->is_device_policy);
|
| - EXPECT_EQ(9, details->id);
|
| - EXPECT_EQ(0u, details->max_external_data_size);
|
| -
|
| -#if defined(OS_CHROMEOS)
|
| - details = GetChromePolicyDetails(key::kDevicePolicyRefreshRate);
|
| - ASSERT_TRUE(details);
|
| - EXPECT_FALSE(details->is_deprecated);
|
| - EXPECT_TRUE(details->is_device_policy);
|
| - EXPECT_EQ(90, details->id);
|
| - EXPECT_EQ(0u, details->max_external_data_size);
|
| -#endif
|
| -
|
| - // TODO(bartfab): add a test that verifies a max_external_data_size larger
|
| - // than 0, once a type 'external' policy is added.
|
| -}
|
| -
|
| -} // namespace policy
|
|
|