Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(6657)

Unified Diff: chrome/browser/policy/configuration_policy_handler_chromeos_unittest.cc

Issue 12189011: Split up chrome/browser/policy subdirectory (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebase, add chrome/browser/chromeos/policy/OWNERS Created 7 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/policy/configuration_policy_handler_chromeos_unittest.cc
diff --git a/chrome/browser/policy/configuration_policy_handler_chromeos_unittest.cc b/chrome/browser/policy/configuration_policy_handler_chromeos_unittest.cc
deleted file mode 100644
index cd0244987a3aba344301c7340e81070cc6c33f9c..0000000000000000000000000000000000000000
--- a/chrome/browser/policy/configuration_policy_handler_chromeos_unittest.cc
+++ /dev/null
@@ -1,144 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "chrome/browser/policy/configuration_policy_handler_chromeos.h"
-
-#include "base/prefs/pref_value_map.h"
-#include "chrome/browser/policy/policy_error_map.h"
-#include "chrome/browser/policy/policy_map.h"
-#include "chrome/browser/ui/ash/chrome_launcher_prefs.h"
-#include "chrome/common/pref_names.h"
-#include "policy/policy_constants.h"
-#include "testing/gtest/include/gtest/gtest.h"
-
-namespace policy {
-
-TEST(NetworkConfigurationPolicyHandlerTest, Empty) {
- PolicyMap policy_map;
- NetworkConfigurationPolicyHandler handler(
- key::kOpenNetworkConfiguration,
- chromeos::onc::ONC_SOURCE_USER_POLICY);
- PolicyErrorMap errors;
- EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors));
- EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty());
-}
-
-TEST(NetworkConfigurationPolicyHandlerTest, ValidONC) {
- const std::string kTestONC(
- "{"
- " \"NetworkConfigurations\": [{"
- " \"GUID\": \"{485d6076-dd44-6b6d-69787465725f5045}\","
- " \"Type\": \"WiFi\","
- " \"Name\": \"some name\","
- " \"WiFi\": {"
- " \"Security\": \"WEP-PSK\","
- " \"SSID\": \"ssid\","
- " \"Passphrase\": \"pass\","
- " }"
- " }]"
- "}");
-
- PolicyMap policy_map;
- policy_map.Set(key::kOpenNetworkConfiguration,
- POLICY_LEVEL_MANDATORY,
- POLICY_SCOPE_USER,
- Value::CreateStringValue(kTestONC));
- NetworkConfigurationPolicyHandler handler(
- key::kOpenNetworkConfiguration,
- chromeos::onc::ONC_SOURCE_USER_POLICY);
- PolicyErrorMap errors;
- EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors));
- EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty());
-}
-
-TEST(NetworkConfigurationPolicyHandlerTest, WrongType) {
- PolicyMap policy_map;
- policy_map.Set(key::kOpenNetworkConfiguration,
- POLICY_LEVEL_MANDATORY,
- POLICY_SCOPE_USER,
- Value::CreateBooleanValue(false));
- NetworkConfigurationPolicyHandler handler(
- key::kOpenNetworkConfiguration,
- chromeos::onc::ONC_SOURCE_USER_POLICY);
- PolicyErrorMap errors;
- EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors));
- EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty());
-}
-
-TEST(NetworkConfigurationPolicyHandlerTest, JSONParseError) {
- const std::string kTestONC("I'm not proper JSON!");
- PolicyMap policy_map;
- policy_map.Set(key::kOpenNetworkConfiguration,
- POLICY_LEVEL_MANDATORY,
- POLICY_SCOPE_USER,
- Value::CreateStringValue(kTestONC));
- NetworkConfigurationPolicyHandler handler(
- key::kOpenNetworkConfiguration,
- chromeos::onc::ONC_SOURCE_USER_POLICY);
- PolicyErrorMap errors;
- EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors));
- EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty());
-}
-
-TEST(NetworkConfigurationPolicyHandlerTest, Sanitization) {
- const std::string kTestONC(
- "{"
- " \"NetworkConfigurations\": [{"
- " \"GUID\": \"{485d6076-dd44-6b6d-69787465725f5045}\","
- " \"Type\": \"WiFi\","
- " \"Name\": \"some name\","
- " \"WiFi\": {"
- " \"Security\": \"WEP-PSK\","
- " \"SSID\": \"ssid\","
- " \"Passphrase\": \"pass\","
- " }"
- " }]"
- "}");
-
- PolicyMap policy_map;
- policy_map.Set(key::kOpenNetworkConfiguration,
- POLICY_LEVEL_MANDATORY,
- POLICY_SCOPE_USER,
- Value::CreateStringValue(kTestONC));
- NetworkConfigurationPolicyHandler handler(
- key::kOpenNetworkConfiguration,
- chromeos::onc::ONC_SOURCE_USER_POLICY);
- PolicyErrorMap errors;
- handler.PrepareForDisplaying(&policy_map);
- const Value* sanitized = policy_map.GetValue(key::kOpenNetworkConfiguration);
- ASSERT_TRUE(sanitized);
- std::string sanitized_onc;
- EXPECT_TRUE(sanitized->GetAsString(&sanitized_onc));
- EXPECT_FALSE(sanitized_onc.empty());
- EXPECT_EQ(std::string::npos, sanitized_onc.find("pass"));
-}
-
-TEST(PinnedLauncherAppsPolicyHandler, PrefTranslation) {
- base::ListValue list;
- PolicyMap policy_map;
- PrefValueMap prefs;
- base::ListValue expected_pinned_apps;
- base::Value* value = NULL;
- PinnedLauncherAppsPolicyHandler handler;
-
- policy_map.Set(key::kPinnedLauncherApps, POLICY_LEVEL_MANDATORY,
- POLICY_SCOPE_USER, list.DeepCopy());
- handler.ApplyPolicySettings(policy_map, &prefs);
- EXPECT_TRUE(prefs.GetValue(prefs::kPinnedLauncherApps, &value));
- EXPECT_TRUE(base::Value::Equals(&expected_pinned_apps, value));
-
- base::StringValue entry1("abcdefghijklmnopabcdefghijklmnop");
- base::DictionaryValue* entry1_dict = new base::DictionaryValue();
- entry1_dict->Set(ash::kPinnedAppsPrefAppIDPath, entry1.DeepCopy());
- expected_pinned_apps.Append(entry1_dict);
- list.Append(entry1.DeepCopy());
- policy_map.Set(key::kPinnedLauncherApps, POLICY_LEVEL_MANDATORY,
- POLICY_SCOPE_USER, list.DeepCopy());
- prefs.Clear();
- handler.ApplyPolicySettings(policy_map, &prefs);
- EXPECT_TRUE(prefs.GetValue(prefs::kPinnedLauncherApps, &value));
- EXPECT_TRUE(base::Value::Equals(&expected_pinned_apps, value));
-}
-
-} // namespace policy

Powered by Google App Engine
This is Rietveld 408576698