Index: chrome/browser/policy/configuration_policy_handler_chromeos_unittest.cc |
diff --git a/chrome/browser/policy/configuration_policy_handler_chromeos_unittest.cc b/chrome/browser/policy/configuration_policy_handler_chromeos_unittest.cc |
deleted file mode 100644 |
index cd0244987a3aba344301c7340e81070cc6c33f9c..0000000000000000000000000000000000000000 |
--- a/chrome/browser/policy/configuration_policy_handler_chromeos_unittest.cc |
+++ /dev/null |
@@ -1,144 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/browser/policy/configuration_policy_handler_chromeos.h" |
- |
-#include "base/prefs/pref_value_map.h" |
-#include "chrome/browser/policy/policy_error_map.h" |
-#include "chrome/browser/policy/policy_map.h" |
-#include "chrome/browser/ui/ash/chrome_launcher_prefs.h" |
-#include "chrome/common/pref_names.h" |
-#include "policy/policy_constants.h" |
-#include "testing/gtest/include/gtest/gtest.h" |
- |
-namespace policy { |
- |
-TEST(NetworkConfigurationPolicyHandlerTest, Empty) { |
- PolicyMap policy_map; |
- NetworkConfigurationPolicyHandler handler( |
- key::kOpenNetworkConfiguration, |
- chromeos::onc::ONC_SOURCE_USER_POLICY); |
- PolicyErrorMap errors; |
- EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); |
- EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); |
-} |
- |
-TEST(NetworkConfigurationPolicyHandlerTest, ValidONC) { |
- const std::string kTestONC( |
- "{" |
- " \"NetworkConfigurations\": [{" |
- " \"GUID\": \"{485d6076-dd44-6b6d-69787465725f5045}\"," |
- " \"Type\": \"WiFi\"," |
- " \"Name\": \"some name\"," |
- " \"WiFi\": {" |
- " \"Security\": \"WEP-PSK\"," |
- " \"SSID\": \"ssid\"," |
- " \"Passphrase\": \"pass\"," |
- " }" |
- " }]" |
- "}"); |
- |
- PolicyMap policy_map; |
- policy_map.Set(key::kOpenNetworkConfiguration, |
- POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, |
- Value::CreateStringValue(kTestONC)); |
- NetworkConfigurationPolicyHandler handler( |
- key::kOpenNetworkConfiguration, |
- chromeos::onc::ONC_SOURCE_USER_POLICY); |
- PolicyErrorMap errors; |
- EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); |
- EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); |
-} |
- |
-TEST(NetworkConfigurationPolicyHandlerTest, WrongType) { |
- PolicyMap policy_map; |
- policy_map.Set(key::kOpenNetworkConfiguration, |
- POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, |
- Value::CreateBooleanValue(false)); |
- NetworkConfigurationPolicyHandler handler( |
- key::kOpenNetworkConfiguration, |
- chromeos::onc::ONC_SOURCE_USER_POLICY); |
- PolicyErrorMap errors; |
- EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); |
- EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); |
-} |
- |
-TEST(NetworkConfigurationPolicyHandlerTest, JSONParseError) { |
- const std::string kTestONC("I'm not proper JSON!"); |
- PolicyMap policy_map; |
- policy_map.Set(key::kOpenNetworkConfiguration, |
- POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, |
- Value::CreateStringValue(kTestONC)); |
- NetworkConfigurationPolicyHandler handler( |
- key::kOpenNetworkConfiguration, |
- chromeos::onc::ONC_SOURCE_USER_POLICY); |
- PolicyErrorMap errors; |
- EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); |
- EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); |
-} |
- |
-TEST(NetworkConfigurationPolicyHandlerTest, Sanitization) { |
- const std::string kTestONC( |
- "{" |
- " \"NetworkConfigurations\": [{" |
- " \"GUID\": \"{485d6076-dd44-6b6d-69787465725f5045}\"," |
- " \"Type\": \"WiFi\"," |
- " \"Name\": \"some name\"," |
- " \"WiFi\": {" |
- " \"Security\": \"WEP-PSK\"," |
- " \"SSID\": \"ssid\"," |
- " \"Passphrase\": \"pass\"," |
- " }" |
- " }]" |
- "}"); |
- |
- PolicyMap policy_map; |
- policy_map.Set(key::kOpenNetworkConfiguration, |
- POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, |
- Value::CreateStringValue(kTestONC)); |
- NetworkConfigurationPolicyHandler handler( |
- key::kOpenNetworkConfiguration, |
- chromeos::onc::ONC_SOURCE_USER_POLICY); |
- PolicyErrorMap errors; |
- handler.PrepareForDisplaying(&policy_map); |
- const Value* sanitized = policy_map.GetValue(key::kOpenNetworkConfiguration); |
- ASSERT_TRUE(sanitized); |
- std::string sanitized_onc; |
- EXPECT_TRUE(sanitized->GetAsString(&sanitized_onc)); |
- EXPECT_FALSE(sanitized_onc.empty()); |
- EXPECT_EQ(std::string::npos, sanitized_onc.find("pass")); |
-} |
- |
-TEST(PinnedLauncherAppsPolicyHandler, PrefTranslation) { |
- base::ListValue list; |
- PolicyMap policy_map; |
- PrefValueMap prefs; |
- base::ListValue expected_pinned_apps; |
- base::Value* value = NULL; |
- PinnedLauncherAppsPolicyHandler handler; |
- |
- policy_map.Set(key::kPinnedLauncherApps, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, list.DeepCopy()); |
- handler.ApplyPolicySettings(policy_map, &prefs); |
- EXPECT_TRUE(prefs.GetValue(prefs::kPinnedLauncherApps, &value)); |
- EXPECT_TRUE(base::Value::Equals(&expected_pinned_apps, value)); |
- |
- base::StringValue entry1("abcdefghijklmnopabcdefghijklmnop"); |
- base::DictionaryValue* entry1_dict = new base::DictionaryValue(); |
- entry1_dict->Set(ash::kPinnedAppsPrefAppIDPath, entry1.DeepCopy()); |
- expected_pinned_apps.Append(entry1_dict); |
- list.Append(entry1.DeepCopy()); |
- policy_map.Set(key::kPinnedLauncherApps, POLICY_LEVEL_MANDATORY, |
- POLICY_SCOPE_USER, list.DeepCopy()); |
- prefs.Clear(); |
- handler.ApplyPolicySettings(policy_map, &prefs); |
- EXPECT_TRUE(prefs.GetValue(prefs::kPinnedLauncherApps, &value)); |
- EXPECT_TRUE(base::Value::Equals(&expected_pinned_apps, value)); |
-} |
- |
-} // namespace policy |