| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/chromeos/policy/configuration_policy_handler_chromeos.h
" | 5 #include "chrome/browser/chromeos/policy/configuration_policy_handler_chromeos.h
" |
| 6 | 6 |
| 7 #include <memory> | 7 #include <memory> |
| 8 #include <utility> | 8 #include <utility> |
| 9 | 9 |
| 10 #include "base/callback.h" | 10 #include "base/callback.h" |
| (...skipping 47 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 58 TEST_F(ScreenMagnifierPolicyHandlerTest, Default) { | 58 TEST_F(ScreenMagnifierPolicyHandlerTest, Default) { |
| 59 handler_.ApplyPolicySettings(policy_, &prefs_); | 59 handler_.ApplyPolicySettings(policy_, &prefs_); |
| 60 EXPECT_FALSE( | 60 EXPECT_FALSE( |
| 61 prefs_.GetValue(prefs::kAccessibilityScreenMagnifierEnabled, NULL)); | 61 prefs_.GetValue(prefs::kAccessibilityScreenMagnifierEnabled, NULL)); |
| 62 EXPECT_FALSE(prefs_.GetValue(prefs::kAccessibilityScreenMagnifierType, NULL)); | 62 EXPECT_FALSE(prefs_.GetValue(prefs::kAccessibilityScreenMagnifierType, NULL)); |
| 63 } | 63 } |
| 64 | 64 |
| 65 TEST_F(ScreenMagnifierPolicyHandlerTest, Disabled) { | 65 TEST_F(ScreenMagnifierPolicyHandlerTest, Disabled) { |
| 66 policy_.Set(key::kScreenMagnifierType, POLICY_LEVEL_MANDATORY, | 66 policy_.Set(key::kScreenMagnifierType, POLICY_LEVEL_MANDATORY, |
| 67 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, | 67 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, |
| 68 base::MakeUnique<base::FundamentalValue>(0), nullptr); | 68 base::MakeUnique<base::Value>(0), nullptr); |
| 69 handler_.ApplyPolicySettings(policy_, &prefs_); | 69 handler_.ApplyPolicySettings(policy_, &prefs_); |
| 70 | 70 |
| 71 const base::Value* enabled = NULL; | 71 const base::Value* enabled = NULL; |
| 72 EXPECT_TRUE( | 72 EXPECT_TRUE( |
| 73 prefs_.GetValue(prefs::kAccessibilityScreenMagnifierEnabled, &enabled)); | 73 prefs_.GetValue(prefs::kAccessibilityScreenMagnifierEnabled, &enabled)); |
| 74 ASSERT_TRUE(enabled); | 74 ASSERT_TRUE(enabled); |
| 75 EXPECT_TRUE(base::FundamentalValue(false).Equals(enabled)); | 75 EXPECT_TRUE(base::Value(false).Equals(enabled)); |
| 76 | 76 |
| 77 const base::Value* type = NULL; | 77 const base::Value* type = NULL; |
| 78 EXPECT_TRUE(prefs_.GetValue(prefs::kAccessibilityScreenMagnifierType, &type)); | 78 EXPECT_TRUE(prefs_.GetValue(prefs::kAccessibilityScreenMagnifierType, &type)); |
| 79 ASSERT_TRUE(type); | 79 ASSERT_TRUE(type); |
| 80 EXPECT_TRUE(base::FundamentalValue(0).Equals(type)); | 80 EXPECT_TRUE(base::Value(0).Equals(type)); |
| 81 } | 81 } |
| 82 | 82 |
| 83 TEST_F(ScreenMagnifierPolicyHandlerTest, Enabled) { | 83 TEST_F(ScreenMagnifierPolicyHandlerTest, Enabled) { |
| 84 policy_.Set(key::kScreenMagnifierType, POLICY_LEVEL_MANDATORY, | 84 policy_.Set(key::kScreenMagnifierType, POLICY_LEVEL_MANDATORY, |
| 85 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, | 85 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, |
| 86 base::MakeUnique<base::FundamentalValue>(1), nullptr); | 86 base::MakeUnique<base::Value>(1), nullptr); |
| 87 handler_.ApplyPolicySettings(policy_, &prefs_); | 87 handler_.ApplyPolicySettings(policy_, &prefs_); |
| 88 | 88 |
| 89 const base::Value* enabled = NULL; | 89 const base::Value* enabled = NULL; |
| 90 EXPECT_TRUE( | 90 EXPECT_TRUE( |
| 91 prefs_.GetValue(prefs::kAccessibilityScreenMagnifierEnabled, &enabled)); | 91 prefs_.GetValue(prefs::kAccessibilityScreenMagnifierEnabled, &enabled)); |
| 92 ASSERT_TRUE(enabled); | 92 ASSERT_TRUE(enabled); |
| 93 EXPECT_TRUE(base::FundamentalValue(true).Equals(enabled)); | 93 EXPECT_TRUE(base::Value(true).Equals(enabled)); |
| 94 | 94 |
| 95 const base::Value* type = NULL; | 95 const base::Value* type = NULL; |
| 96 EXPECT_TRUE(prefs_.GetValue(prefs::kAccessibilityScreenMagnifierType, &type)); | 96 EXPECT_TRUE(prefs_.GetValue(prefs::kAccessibilityScreenMagnifierType, &type)); |
| 97 ASSERT_TRUE(type); | 97 ASSERT_TRUE(type); |
| 98 EXPECT_TRUE(base::FundamentalValue(1).Equals(type)); | 98 EXPECT_TRUE(base::Value(1).Equals(type)); |
| 99 } | 99 } |
| 100 | 100 |
| 101 TEST(ExternalDataPolicyHandlerTest, Empty) { | 101 TEST(ExternalDataPolicyHandlerTest, Empty) { |
| 102 PolicyErrorMap errors; | 102 PolicyErrorMap errors; |
| 103 EXPECT_TRUE(ExternalDataPolicyHandler(key::kUserAvatarImage) | 103 EXPECT_TRUE(ExternalDataPolicyHandler(key::kUserAvatarImage) |
| 104 .CheckPolicySettings(PolicyMap(), &errors)); | 104 .CheckPolicySettings(PolicyMap(), &errors)); |
| 105 EXPECT_TRUE(errors.GetErrors(key::kUserAvatarImage).empty()); | 105 EXPECT_TRUE(errors.GetErrors(key::kUserAvatarImage).empty()); |
| 106 } | 106 } |
| 107 | 107 |
| 108 TEST(ExternalDataPolicyHandlerTest, WrongType) { | 108 TEST(ExternalDataPolicyHandlerTest, WrongType) { |
| 109 PolicyMap policy_map; | 109 PolicyMap policy_map; |
| 110 policy_map.Set(key::kUserAvatarImage, POLICY_LEVEL_MANDATORY, | 110 policy_map.Set(key::kUserAvatarImage, POLICY_LEVEL_MANDATORY, |
| 111 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, | 111 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, |
| 112 base::MakeUnique<base::FundamentalValue>(false), nullptr); | 112 base::MakeUnique<base::Value>(false), nullptr); |
| 113 PolicyErrorMap errors; | 113 PolicyErrorMap errors; |
| 114 EXPECT_FALSE(ExternalDataPolicyHandler(key::kUserAvatarImage) | 114 EXPECT_FALSE(ExternalDataPolicyHandler(key::kUserAvatarImage) |
| 115 .CheckPolicySettings(policy_map, &errors)); | 115 .CheckPolicySettings(policy_map, &errors)); |
| 116 EXPECT_FALSE(errors.GetErrors(key::kUserAvatarImage).empty()); | 116 EXPECT_FALSE(errors.GetErrors(key::kUserAvatarImage).empty()); |
| 117 } | 117 } |
| 118 | 118 |
| 119 TEST(ExternalDataPolicyHandlerTest, MissingURL) { | 119 TEST(ExternalDataPolicyHandlerTest, MissingURL) { |
| 120 std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue); | 120 std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue); |
| 121 dict->SetString("hash", "1234567890123456789012345678901234567890"); | 121 dict->SetString("hash", "1234567890123456789012345678901234567890"); |
| 122 PolicyMap policy_map; | 122 PolicyMap policy_map; |
| (...skipping 119 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 242 NetworkConfigurationPolicyHandler::CreateForUserPolicy()); | 242 NetworkConfigurationPolicyHandler::CreateForUserPolicy()); |
| 243 PolicyErrorMap errors; | 243 PolicyErrorMap errors; |
| 244 EXPECT_TRUE(handler->CheckPolicySettings(policy_map, &errors)); | 244 EXPECT_TRUE(handler->CheckPolicySettings(policy_map, &errors)); |
| 245 EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); | 245 EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); |
| 246 } | 246 } |
| 247 | 247 |
| 248 TEST(NetworkConfigurationPolicyHandlerTest, WrongType) { | 248 TEST(NetworkConfigurationPolicyHandlerTest, WrongType) { |
| 249 PolicyMap policy_map; | 249 PolicyMap policy_map; |
| 250 policy_map.Set(key::kOpenNetworkConfiguration, POLICY_LEVEL_MANDATORY, | 250 policy_map.Set(key::kOpenNetworkConfiguration, POLICY_LEVEL_MANDATORY, |
| 251 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, | 251 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, |
| 252 base::MakeUnique<base::FundamentalValue>(false), nullptr); | 252 base::MakeUnique<base::Value>(false), nullptr); |
| 253 std::unique_ptr<NetworkConfigurationPolicyHandler> handler( | 253 std::unique_ptr<NetworkConfigurationPolicyHandler> handler( |
| 254 NetworkConfigurationPolicyHandler::CreateForUserPolicy()); | 254 NetworkConfigurationPolicyHandler::CreateForUserPolicy()); |
| 255 PolicyErrorMap errors; | 255 PolicyErrorMap errors; |
| 256 EXPECT_FALSE(handler->CheckPolicySettings(policy_map, &errors)); | 256 EXPECT_FALSE(handler->CheckPolicySettings(policy_map, &errors)); |
| 257 EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); | 257 EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); |
| 258 } | 258 } |
| 259 | 259 |
| 260 TEST(NetworkConfigurationPolicyHandlerTest, JSONParseError) { | 260 TEST(NetworkConfigurationPolicyHandlerTest, JSONParseError) { |
| 261 const std::string kTestONC("I'm not proper JSON!"); | 261 const std::string kTestONC("I'm not proper JSON!"); |
| 262 PolicyMap policy_map; | 262 PolicyMap policy_map; |
| (...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 348 LoginScreenPowerManagementPolicyHandler handler(chrome_schema_); | 348 LoginScreenPowerManagementPolicyHandler handler(chrome_schema_); |
| 349 PolicyErrorMap errors; | 349 PolicyErrorMap errors; |
| 350 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); | 350 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); |
| 351 EXPECT_TRUE(errors.GetErrors(key::kDeviceLoginScreenPowerManagement).empty()); | 351 EXPECT_TRUE(errors.GetErrors(key::kDeviceLoginScreenPowerManagement).empty()); |
| 352 } | 352 } |
| 353 | 353 |
| 354 TEST_F(LoginScreenPowerManagementPolicyHandlerTest, WrongType) { | 354 TEST_F(LoginScreenPowerManagementPolicyHandlerTest, WrongType) { |
| 355 PolicyMap policy_map; | 355 PolicyMap policy_map; |
| 356 policy_map.Set(key::kDeviceLoginScreenPowerManagement, POLICY_LEVEL_MANDATORY, | 356 policy_map.Set(key::kDeviceLoginScreenPowerManagement, POLICY_LEVEL_MANDATORY, |
| 357 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, | 357 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, |
| 358 base::MakeUnique<base::FundamentalValue>(false), nullptr); | 358 base::MakeUnique<base::Value>(false), nullptr); |
| 359 LoginScreenPowerManagementPolicyHandler handler(chrome_schema_); | 359 LoginScreenPowerManagementPolicyHandler handler(chrome_schema_); |
| 360 PolicyErrorMap errors; | 360 PolicyErrorMap errors; |
| 361 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); | 361 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); |
| 362 EXPECT_FALSE( | 362 EXPECT_FALSE( |
| 363 errors.GetErrors(key::kDeviceLoginScreenPowerManagement).empty()); | 363 errors.GetErrors(key::kDeviceLoginScreenPowerManagement).empty()); |
| 364 } | 364 } |
| 365 | 365 |
| 366 } // namespace policy | 366 } // namespace policy |
| OLD | NEW |