| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/policy/configuration_policy_handler_chromeos.h" | |
| 6 | |
| 7 #include "base/prefs/pref_value_map.h" | |
| 8 #include "chrome/browser/policy/policy_error_map.h" | |
| 9 #include "chrome/browser/policy/policy_map.h" | |
| 10 #include "chrome/browser/ui/ash/chrome_launcher_prefs.h" | |
| 11 #include "chrome/common/pref_names.h" | |
| 12 #include "policy/policy_constants.h" | |
| 13 #include "testing/gtest/include/gtest/gtest.h" | |
| 14 | |
| 15 namespace policy { | |
| 16 | |
| 17 TEST(NetworkConfigurationPolicyHandlerTest, Empty) { | |
| 18 PolicyMap policy_map; | |
| 19 NetworkConfigurationPolicyHandler handler( | |
| 20 key::kOpenNetworkConfiguration, | |
| 21 chromeos::onc::ONC_SOURCE_USER_POLICY); | |
| 22 PolicyErrorMap errors; | |
| 23 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); | |
| 24 EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); | |
| 25 } | |
| 26 | |
| 27 TEST(NetworkConfigurationPolicyHandlerTest, ValidONC) { | |
| 28 const std::string kTestONC( | |
| 29 "{" | |
| 30 " \"NetworkConfigurations\": [{" | |
| 31 " \"GUID\": \"{485d6076-dd44-6b6d-69787465725f5045}\"," | |
| 32 " \"Type\": \"WiFi\"," | |
| 33 " \"Name\": \"some name\"," | |
| 34 " \"WiFi\": {" | |
| 35 " \"Security\": \"WEP-PSK\"," | |
| 36 " \"SSID\": \"ssid\"," | |
| 37 " \"Passphrase\": \"pass\"," | |
| 38 " }" | |
| 39 " }]" | |
| 40 "}"); | |
| 41 | |
| 42 PolicyMap policy_map; | |
| 43 policy_map.Set(key::kOpenNetworkConfiguration, | |
| 44 POLICY_LEVEL_MANDATORY, | |
| 45 POLICY_SCOPE_USER, | |
| 46 Value::CreateStringValue(kTestONC)); | |
| 47 NetworkConfigurationPolicyHandler handler( | |
| 48 key::kOpenNetworkConfiguration, | |
| 49 chromeos::onc::ONC_SOURCE_USER_POLICY); | |
| 50 PolicyErrorMap errors; | |
| 51 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); | |
| 52 EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); | |
| 53 } | |
| 54 | |
| 55 TEST(NetworkConfigurationPolicyHandlerTest, WrongType) { | |
| 56 PolicyMap policy_map; | |
| 57 policy_map.Set(key::kOpenNetworkConfiguration, | |
| 58 POLICY_LEVEL_MANDATORY, | |
| 59 POLICY_SCOPE_USER, | |
| 60 Value::CreateBooleanValue(false)); | |
| 61 NetworkConfigurationPolicyHandler handler( | |
| 62 key::kOpenNetworkConfiguration, | |
| 63 chromeos::onc::ONC_SOURCE_USER_POLICY); | |
| 64 PolicyErrorMap errors; | |
| 65 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); | |
| 66 EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); | |
| 67 } | |
| 68 | |
| 69 TEST(NetworkConfigurationPolicyHandlerTest, JSONParseError) { | |
| 70 const std::string kTestONC("I'm not proper JSON!"); | |
| 71 PolicyMap policy_map; | |
| 72 policy_map.Set(key::kOpenNetworkConfiguration, | |
| 73 POLICY_LEVEL_MANDATORY, | |
| 74 POLICY_SCOPE_USER, | |
| 75 Value::CreateStringValue(kTestONC)); | |
| 76 NetworkConfigurationPolicyHandler handler( | |
| 77 key::kOpenNetworkConfiguration, | |
| 78 chromeos::onc::ONC_SOURCE_USER_POLICY); | |
| 79 PolicyErrorMap errors; | |
| 80 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); | |
| 81 EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); | |
| 82 } | |
| 83 | |
| 84 TEST(NetworkConfigurationPolicyHandlerTest, Sanitization) { | |
| 85 const std::string kTestONC( | |
| 86 "{" | |
| 87 " \"NetworkConfigurations\": [{" | |
| 88 " \"GUID\": \"{485d6076-dd44-6b6d-69787465725f5045}\"," | |
| 89 " \"Type\": \"WiFi\"," | |
| 90 " \"Name\": \"some name\"," | |
| 91 " \"WiFi\": {" | |
| 92 " \"Security\": \"WEP-PSK\"," | |
| 93 " \"SSID\": \"ssid\"," | |
| 94 " \"Passphrase\": \"pass\"," | |
| 95 " }" | |
| 96 " }]" | |
| 97 "}"); | |
| 98 | |
| 99 PolicyMap policy_map; | |
| 100 policy_map.Set(key::kOpenNetworkConfiguration, | |
| 101 POLICY_LEVEL_MANDATORY, | |
| 102 POLICY_SCOPE_USER, | |
| 103 Value::CreateStringValue(kTestONC)); | |
| 104 NetworkConfigurationPolicyHandler handler( | |
| 105 key::kOpenNetworkConfiguration, | |
| 106 chromeos::onc::ONC_SOURCE_USER_POLICY); | |
| 107 PolicyErrorMap errors; | |
| 108 handler.PrepareForDisplaying(&policy_map); | |
| 109 const Value* sanitized = policy_map.GetValue(key::kOpenNetworkConfiguration); | |
| 110 ASSERT_TRUE(sanitized); | |
| 111 std::string sanitized_onc; | |
| 112 EXPECT_TRUE(sanitized->GetAsString(&sanitized_onc)); | |
| 113 EXPECT_FALSE(sanitized_onc.empty()); | |
| 114 EXPECT_EQ(std::string::npos, sanitized_onc.find("pass")); | |
| 115 } | |
| 116 | |
| 117 TEST(PinnedLauncherAppsPolicyHandler, PrefTranslation) { | |
| 118 base::ListValue list; | |
| 119 PolicyMap policy_map; | |
| 120 PrefValueMap prefs; | |
| 121 base::ListValue expected_pinned_apps; | |
| 122 base::Value* value = NULL; | |
| 123 PinnedLauncherAppsPolicyHandler handler; | |
| 124 | |
| 125 policy_map.Set(key::kPinnedLauncherApps, POLICY_LEVEL_MANDATORY, | |
| 126 POLICY_SCOPE_USER, list.DeepCopy()); | |
| 127 handler.ApplyPolicySettings(policy_map, &prefs); | |
| 128 EXPECT_TRUE(prefs.GetValue(prefs::kPinnedLauncherApps, &value)); | |
| 129 EXPECT_TRUE(base::Value::Equals(&expected_pinned_apps, value)); | |
| 130 | |
| 131 base::StringValue entry1("abcdefghijklmnopabcdefghijklmnop"); | |
| 132 base::DictionaryValue* entry1_dict = new base::DictionaryValue(); | |
| 133 entry1_dict->Set(ash::kPinnedAppsPrefAppIDPath, entry1.DeepCopy()); | |
| 134 expected_pinned_apps.Append(entry1_dict); | |
| 135 list.Append(entry1.DeepCopy()); | |
| 136 policy_map.Set(key::kPinnedLauncherApps, POLICY_LEVEL_MANDATORY, | |
| 137 POLICY_SCOPE_USER, list.DeepCopy()); | |
| 138 prefs.Clear(); | |
| 139 handler.ApplyPolicySettings(policy_map, &prefs); | |
| 140 EXPECT_TRUE(prefs.GetValue(prefs::kPinnedLauncherApps, &value)); | |
| 141 EXPECT_TRUE(base::Value::Equals(&expected_pinned_apps, value)); | |
| 142 } | |
| 143 | |
| 144 } // namespace policy | |
| OLD | NEW |