| Index: chrome/browser/policy/url_blacklist_policy_handler_unittest.cc
|
| diff --git a/chrome/browser/policy/url_blacklist_policy_handler_unittest.cc b/chrome/browser/policy/url_blacklist_policy_handler_unittest.cc
|
| deleted file mode 100644
|
| index 500f358bd654ac66349c06ea3bfe101b4b538403..0000000000000000000000000000000000000000
|
| --- a/chrome/browser/policy/url_blacklist_policy_handler_unittest.cc
|
| +++ /dev/null
|
| @@ -1,219 +0,0 @@
|
| -// Copyright 2013 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "base/memory/scoped_ptr.h"
|
| -#include "base/prefs/pref_value_map.h"
|
| -#include "base/values.h"
|
| -#include "components/policy/core/browser/policy_error_map.h"
|
| -#include "components/policy/core/browser/url_blacklist_policy_handler.h"
|
| -#include "components/policy/core/common/policy_map.h"
|
| -#include "components/policy/core/common/policy_pref_names.h"
|
| -#include "policy/policy_constants.h"
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -
|
| -// Note: this file should move to components/policy/core/browser, but the
|
| -// components_unittests runner does not load the ResourceBundle as
|
| -// ChromeTestSuite::Initialize does, which leads to failures using
|
| -// PolicyErrorMap.
|
| -
|
| -namespace policy {
|
| -
|
| -namespace {
|
| -
|
| -const char kTestDisabledScheme[] = "kTestDisabledScheme";
|
| -const char kTestBlacklistValue[] = "kTestBlacklistValue";
|
| -
|
| -} // namespace
|
| -
|
| -class URLBlacklistPolicyHandlerTest : public testing::Test {
|
| - protected:
|
| - void SetPolicy(const std::string& key, base::Value* value) {
|
| - policies_.Set(key, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, value, NULL);
|
| - }
|
| - bool CheckPolicy(const std::string& key, base::Value* value) {
|
| - SetPolicy(key, value);
|
| - return handler_.CheckPolicySettings(policies_, &errors_);
|
| - }
|
| - void ApplyPolicies() {
|
| - handler_.ApplyPolicySettings(policies_, &prefs_);
|
| - }
|
| -
|
| - URLBlacklistPolicyHandler handler_;
|
| - PolicyErrorMap errors_;
|
| - PolicyMap policies_;
|
| - PrefValueMap prefs_;
|
| -};
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest,
|
| - CheckPolicySettings_DisabledSchemesUnspecified) {
|
| - EXPECT_TRUE(CheckPolicy(key::kURLBlacklist, new base::ListValue));
|
| - EXPECT_EQ(0U, errors_.size());
|
| -}
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest,
|
| - CheckPolicySettings_URLBlacklistUnspecified) {
|
| - EXPECT_TRUE(CheckPolicy(key::kDisabledSchemes, new base::ListValue));
|
| - EXPECT_EQ(0U, errors_.size());
|
| -}
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest,
|
| - CheckPolicySettings_DisabledSchemesWrongType) {
|
| - // The policy expects a list. Give it a boolean.
|
| - EXPECT_TRUE(CheckPolicy(key::kDisabledSchemes,
|
| - base::Value::CreateBooleanValue(false)));
|
| - EXPECT_EQ(1U, errors_.size());
|
| - const std::string expected = key::kDisabledSchemes;
|
| - const std::string actual = errors_.begin()->first;
|
| - EXPECT_EQ(expected, actual);
|
| -}
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest,
|
| - CheckPolicySettings_URLBlacklistWrongType) {
|
| - // The policy expects a list. Give it a boolean.
|
| - EXPECT_TRUE(CheckPolicy(key::kURLBlacklist,
|
| - base::Value::CreateBooleanValue(false)));
|
| - EXPECT_EQ(1U, errors_.size());
|
| - const std::string expected = key::kURLBlacklist;
|
| - const std::string actual = errors_.begin()->first;
|
| - EXPECT_EQ(expected, actual);
|
| -}
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest, ApplyPolicySettings_NothingSpecified) {
|
| - ApplyPolicies();
|
| - EXPECT_FALSE(prefs_.GetValue(policy_prefs::kUrlBlacklist, NULL));
|
| -}
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest,
|
| - ApplyPolicySettings_DisabledSchemesWrongType) {
|
| - // The policy expects a list. Give it a boolean.
|
| - SetPolicy(key::kDisabledSchemes, base::Value::CreateBooleanValue(false));
|
| - ApplyPolicies();
|
| - EXPECT_FALSE(prefs_.GetValue(policy_prefs::kUrlBlacklist, NULL));
|
| -}
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest,
|
| - ApplyPolicySettings_URLBlacklistWrongType) {
|
| - // The policy expects a list. Give it a boolean.
|
| - SetPolicy(key::kURLBlacklist, base::Value::CreateBooleanValue(false));
|
| - ApplyPolicies();
|
| - EXPECT_FALSE(prefs_.GetValue(policy_prefs::kUrlBlacklist, NULL));
|
| -}
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest,
|
| - ApplyPolicySettings_DisabledSchemesEmpty) {
|
| - SetPolicy(key::kDisabledSchemes, new base::ListValue);
|
| - ApplyPolicies();
|
| - base::Value* out;
|
| - EXPECT_TRUE(prefs_.GetValue(policy_prefs::kUrlBlacklist, &out));
|
| - base::ListValue* out_list;
|
| - EXPECT_TRUE(out->GetAsList(&out_list));
|
| - EXPECT_EQ(0U, out_list->GetSize());
|
| -}
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest,
|
| - ApplyPolicySettings_URLBlacklistEmpty) {
|
| - SetPolicy(key::kURLBlacklist, new base::ListValue);
|
| - ApplyPolicies();
|
| - base::Value* out;
|
| - EXPECT_TRUE(prefs_.GetValue(policy_prefs::kUrlBlacklist, &out));
|
| - base::ListValue* out_list;
|
| - EXPECT_TRUE(out->GetAsList(&out_list));
|
| - EXPECT_EQ(0U, out_list->GetSize());
|
| -}
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest,
|
| - ApplyPolicySettings_DisabledSchemesWrongElementType) {
|
| - // The policy expects string-valued elements. Give it booleans.
|
| - scoped_ptr<base::ListValue> in(new base::ListValue);
|
| - in->AppendBoolean(false);
|
| - SetPolicy(key::kDisabledSchemes, in.release());
|
| - ApplyPolicies();
|
| -
|
| - // The element should be skipped.
|
| - base::Value* out;
|
| - EXPECT_TRUE(prefs_.GetValue(policy_prefs::kUrlBlacklist, &out));
|
| - base::ListValue* out_list;
|
| - EXPECT_TRUE(out->GetAsList(&out_list));
|
| - EXPECT_EQ(0U, out_list->GetSize());
|
| -}
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest,
|
| - ApplyPolicySettings_URLBlacklistWrongElementType) {
|
| - // The policy expects string-valued elements. Give it booleans.
|
| - scoped_ptr<base::ListValue> in(new base::ListValue);
|
| - in->AppendBoolean(false);
|
| - SetPolicy(key::kURLBlacklist, in.release());
|
| - ApplyPolicies();
|
| -
|
| - // The element should be skipped.
|
| - base::Value* out;
|
| - EXPECT_TRUE(prefs_.GetValue(policy_prefs::kUrlBlacklist, &out));
|
| - base::ListValue* out_list;
|
| - EXPECT_TRUE(out->GetAsList(&out_list));
|
| - EXPECT_EQ(0U, out_list->GetSize());
|
| -}
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest,
|
| - ApplyPolicySettings_DisabledSchemesSuccessful) {
|
| - scoped_ptr<base::ListValue> in_disabled_schemes(new base::ListValue);
|
| - in_disabled_schemes->AppendString(kTestDisabledScheme);
|
| - SetPolicy(key::kDisabledSchemes, in_disabled_schemes.release());
|
| - ApplyPolicies();
|
| -
|
| - base::Value* out;
|
| - EXPECT_TRUE(prefs_.GetValue(policy_prefs::kUrlBlacklist, &out));
|
| - base::ListValue* out_list;
|
| - EXPECT_TRUE(out->GetAsList(&out_list));
|
| - EXPECT_EQ(1U, out_list->GetSize());
|
| -
|
| - std::string out_string;
|
| - EXPECT_TRUE(out_list->GetString(0U, &out_string));
|
| - EXPECT_EQ(kTestDisabledScheme + std::string("://*"), out_string);
|
| -}
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest,
|
| - ApplyPolicySettings_URLBlacklistSuccessful) {
|
| - scoped_ptr<base::ListValue> in_url_blacklist(new base::ListValue);
|
| - in_url_blacklist->AppendString(kTestBlacklistValue);
|
| - SetPolicy(key::kURLBlacklist, in_url_blacklist.release());
|
| - ApplyPolicies();
|
| -
|
| - base::Value* out;
|
| - EXPECT_TRUE(prefs_.GetValue(policy_prefs::kUrlBlacklist, &out));
|
| - base::ListValue* out_list;
|
| - EXPECT_TRUE(out->GetAsList(&out_list));
|
| - EXPECT_EQ(1U, out_list->GetSize());
|
| -
|
| - std::string out_string;
|
| - EXPECT_TRUE(out_list->GetString(0U, &out_string));
|
| - EXPECT_EQ(kTestBlacklistValue, out_string);
|
| -}
|
| -
|
| -TEST_F(URLBlacklistPolicyHandlerTest, ApplyPolicySettings_MergeSuccessful) {
|
| - scoped_ptr<base::ListValue> in_disabled_schemes(new base::ListValue);
|
| - in_disabled_schemes->AppendString(kTestDisabledScheme);
|
| - SetPolicy(key::kDisabledSchemes, in_disabled_schemes.release());
|
| -
|
| - scoped_ptr<base::ListValue> in_url_blacklist(new base::ListValue);
|
| - in_url_blacklist->AppendString(kTestBlacklistValue);
|
| - SetPolicy(key::kURLBlacklist, in_url_blacklist.release());
|
| -
|
| - ApplyPolicies();
|
| -
|
| - base::Value* out;
|
| - EXPECT_TRUE(prefs_.GetValue(policy_prefs::kUrlBlacklist, &out));
|
| - base::ListValue* out_list;
|
| - EXPECT_TRUE(out->GetAsList(&out_list));
|
| - EXPECT_EQ(2U, out_list->GetSize());
|
| -
|
| - std::string out1;
|
| - EXPECT_TRUE(out_list->GetString(0U, &out1));
|
| - EXPECT_EQ(kTestDisabledScheme + std::string("://*"), out1);
|
| -
|
| - std::string out2;
|
| - EXPECT_TRUE(out_list->GetString(1U, &out2));
|
| - EXPECT_EQ(kTestBlacklistValue, out2);
|
| -}
|
| -
|
| -} // namespace policy
|
|
|