| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <string> | 5 #include <string> |
| 6 | 6 |
| 7 #include "base/memory/scoped_ptr.h" | 7 #include "base/memory/scoped_ptr.h" |
| 8 #include "base/values.h" | 8 #include "base/values.h" |
| 9 #include "build/build_config.h" | 9 #include "build/build_config.h" |
| 10 #include "components/policy/core/common/policy_details.h" | 10 #include "components/policy/core/common/policy_details.h" |
| (...skipping 10 matching lines...) Expand all Loading... |
| 21 Schema schema = Schema::Wrap(GetChromeSchemaData()); | 21 Schema schema = Schema::Wrap(GetChromeSchemaData()); |
| 22 ASSERT_TRUE(schema.valid()); | 22 ASSERT_TRUE(schema.valid()); |
| 23 EXPECT_EQ(base::Value::TYPE_DICTIONARY, schema.type()); | 23 EXPECT_EQ(base::Value::TYPE_DICTIONARY, schema.type()); |
| 24 | 24 |
| 25 Schema subschema = schema.GetAdditionalProperties(); | 25 Schema subschema = schema.GetAdditionalProperties(); |
| 26 EXPECT_FALSE(subschema.valid()); | 26 EXPECT_FALSE(subschema.valid()); |
| 27 | 27 |
| 28 subschema = schema.GetProperty("no such policy exists"); | 28 subschema = schema.GetProperty("no such policy exists"); |
| 29 EXPECT_FALSE(subschema.valid()); | 29 EXPECT_FALSE(subschema.valid()); |
| 30 | 30 |
| 31 subschema = schema.GetProperty(key::kAlternateErrorPagesEnabled); | 31 subschema = schema.GetProperty(key::kSearchSuggestEnabled); |
| 32 ASSERT_TRUE(subschema.valid()); | 32 ASSERT_TRUE(subschema.valid()); |
| 33 EXPECT_EQ(base::Value::TYPE_BOOLEAN, subschema.type()); | 33 EXPECT_EQ(base::Value::TYPE_BOOLEAN, subschema.type()); |
| 34 | 34 |
| 35 subschema = schema.GetProperty(key::kIncognitoModeAvailability); | 35 subschema = schema.GetProperty(key::kDefaultCookiesSetting); |
| 36 ASSERT_TRUE(subschema.valid()); | 36 ASSERT_TRUE(subschema.valid()); |
| 37 EXPECT_EQ(base::Value::TYPE_INTEGER, subschema.type()); | 37 EXPECT_EQ(base::Value::TYPE_INTEGER, subschema.type()); |
| 38 | 38 |
| 39 subschema = schema.GetProperty(key::kProxyMode); | 39 subschema = schema.GetProperty(key::kProxyMode); |
| 40 ASSERT_TRUE(subschema.valid()); | 40 ASSERT_TRUE(subschema.valid()); |
| 41 EXPECT_EQ(base::Value::TYPE_STRING, subschema.type()); | 41 EXPECT_EQ(base::Value::TYPE_STRING, subschema.type()); |
| 42 | 42 |
| 43 subschema = schema.GetProperty(key::kURLBlacklist); | 43 subschema = schema.GetProperty(key::kURLBlacklist); |
| 44 ASSERT_TRUE(subschema.valid()); | 44 ASSERT_TRUE(subschema.valid()); |
| 45 EXPECT_EQ(base::Value::TYPE_LIST, subschema.type()); | 45 EXPECT_EQ(base::Value::TYPE_LIST, subschema.type()); |
| (...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 81 EXPECT_STREQ(*next, it.key()); | 81 EXPECT_STREQ(*next, it.key()); |
| 82 ASSERT_TRUE(it.schema().valid()); | 82 ASSERT_TRUE(it.schema().valid()); |
| 83 EXPECT_EQ(base::Value::TYPE_STRING, it.schema().type()); | 83 EXPECT_EQ(base::Value::TYPE_STRING, it.schema().type()); |
| 84 } | 84 } |
| 85 EXPECT_TRUE(*next == NULL); | 85 EXPECT_TRUE(*next == NULL); |
| 86 } | 86 } |
| 87 | 87 |
| 88 TEST(GeneratePolicySource, PolicyDetails) { | 88 TEST(GeneratePolicySource, PolicyDetails) { |
| 89 EXPECT_FALSE(GetChromePolicyDetails("")); | 89 EXPECT_FALSE(GetChromePolicyDetails("")); |
| 90 EXPECT_FALSE(GetChromePolicyDetails("no such policy")); | 90 EXPECT_FALSE(GetChromePolicyDetails("no such policy")); |
| 91 EXPECT_FALSE(GetChromePolicyDetails("AlternateErrorPagesEnable")); | 91 EXPECT_FALSE(GetChromePolicyDetails("SearchSuggestEnable")); |
| 92 EXPECT_FALSE(GetChromePolicyDetails("alternateErrorPagesEnabled")); | 92 EXPECT_FALSE(GetChromePolicyDetails("searchSuggestEnabled")); |
| 93 EXPECT_FALSE(GetChromePolicyDetails("AAlternateErrorPagesEnabled")); | 93 EXPECT_FALSE(GetChromePolicyDetails("SSearchSuggestEnabled")); |
| 94 | 94 |
| 95 const PolicyDetails* details = | 95 const PolicyDetails* details = |
| 96 GetChromePolicyDetails(key::kAlternateErrorPagesEnabled); | 96 GetChromePolicyDetails(key::kSearchSuggestEnabled); |
| 97 ASSERT_TRUE(details); | 97 ASSERT_TRUE(details); |
| 98 EXPECT_FALSE(details->is_deprecated); | 98 EXPECT_FALSE(details->is_deprecated); |
| 99 EXPECT_FALSE(details->is_device_policy); | 99 EXPECT_FALSE(details->is_device_policy); |
| 100 EXPECT_EQ(5, details->id); | 100 EXPECT_EQ(6, details->id); |
| 101 EXPECT_EQ(0u, details->max_external_data_size); | 101 EXPECT_EQ(0u, details->max_external_data_size); |
| 102 | 102 |
| 103 #if !defined(OS_IOS) | 103 #if !defined(OS_IOS) |
| 104 details = GetChromePolicyDetails(key::kJavascriptEnabled); | 104 details = GetChromePolicyDetails(key::kJavascriptEnabled); |
| 105 ASSERT_TRUE(details); | 105 ASSERT_TRUE(details); |
| 106 EXPECT_TRUE(details->is_deprecated); | 106 EXPECT_TRUE(details->is_deprecated); |
| 107 EXPECT_FALSE(details->is_device_policy); | 107 EXPECT_FALSE(details->is_device_policy); |
| 108 EXPECT_EQ(9, details->id); | 108 EXPECT_EQ(9, details->id); |
| 109 EXPECT_EQ(0u, details->max_external_data_size); | 109 EXPECT_EQ(0u, details->max_external_data_size); |
| 110 #endif | 110 #endif |
| 111 | 111 |
| 112 #if defined(OS_CHROMEOS) | 112 #if defined(OS_CHROMEOS) |
| 113 details = GetChromePolicyDetails(key::kDevicePolicyRefreshRate); | 113 details = GetChromePolicyDetails(key::kDevicePolicyRefreshRate); |
| 114 ASSERT_TRUE(details); | 114 ASSERT_TRUE(details); |
| 115 EXPECT_FALSE(details->is_deprecated); | 115 EXPECT_FALSE(details->is_deprecated); |
| 116 EXPECT_TRUE(details->is_device_policy); | 116 EXPECT_TRUE(details->is_device_policy); |
| 117 EXPECT_EQ(90, details->id); | 117 EXPECT_EQ(90, details->id); |
| 118 EXPECT_EQ(0u, details->max_external_data_size); | 118 EXPECT_EQ(0u, details->max_external_data_size); |
| 119 #endif | 119 #endif |
| 120 | 120 |
| 121 // TODO(bartfab): add a test that verifies a max_external_data_size larger | 121 // TODO(bartfab): add a test that verifies a max_external_data_size larger |
| 122 // than 0, once a type 'external' policy is added. | 122 // than 0, once a type 'external' policy is added. |
| 123 } | 123 } |
| 124 | 124 |
| 125 } // namespace policy | 125 } // namespace policy |
| OLD | NEW |