| OLD | NEW | 
|    1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |    1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 
|    2 // Use of this source code is governed by a BSD-style license that can be |    2 // Use of this source code is governed by a BSD-style license that can be | 
|    3 // found in the LICENSE file. |    3 // found in the LICENSE file. | 
|    4  |    4  | 
|    5 #include "chrome/browser/chromeos/policy/configuration_policy_handler_chromeos.h
     " |    5 #include "chrome/browser/chromeos/policy/configuration_policy_handler_chromeos.h
     " | 
|    6  |    6  | 
|    7 #include <memory> |    7 #include <memory> | 
|    8 #include <utility> |    8 #include <utility> | 
|    9  |    9  | 
|   10 #include "base/callback.h" |   10 #include "base/callback.h" | 
| (...skipping 47 matching lines...) Expand 10 before | Expand all | Expand 10 after  Loading... | 
|   58 TEST_F(ScreenMagnifierPolicyHandlerTest, Default) { |   58 TEST_F(ScreenMagnifierPolicyHandlerTest, Default) { | 
|   59   handler_.ApplyPolicySettings(policy_, &prefs_); |   59   handler_.ApplyPolicySettings(policy_, &prefs_); | 
|   60   EXPECT_FALSE( |   60   EXPECT_FALSE( | 
|   61       prefs_.GetValue(prefs::kAccessibilityScreenMagnifierEnabled, NULL)); |   61       prefs_.GetValue(prefs::kAccessibilityScreenMagnifierEnabled, NULL)); | 
|   62   EXPECT_FALSE(prefs_.GetValue(prefs::kAccessibilityScreenMagnifierType, NULL)); |   62   EXPECT_FALSE(prefs_.GetValue(prefs::kAccessibilityScreenMagnifierType, NULL)); | 
|   63 } |   63 } | 
|   64  |   64  | 
|   65 TEST_F(ScreenMagnifierPolicyHandlerTest, Disabled) { |   65 TEST_F(ScreenMagnifierPolicyHandlerTest, Disabled) { | 
|   66   policy_.Set(key::kScreenMagnifierType, POLICY_LEVEL_MANDATORY, |   66   policy_.Set(key::kScreenMagnifierType, POLICY_LEVEL_MANDATORY, | 
|   67               POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, |   67               POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, | 
|   68               base::MakeUnique<base::FundamentalValue>(0), nullptr); |   68               base::MakeUnique<base::Value>(0), nullptr); | 
|   69   handler_.ApplyPolicySettings(policy_, &prefs_); |   69   handler_.ApplyPolicySettings(policy_, &prefs_); | 
|   70  |   70  | 
|   71   const base::Value* enabled = NULL; |   71   const base::Value* enabled = NULL; | 
|   72   EXPECT_TRUE( |   72   EXPECT_TRUE( | 
|   73       prefs_.GetValue(prefs::kAccessibilityScreenMagnifierEnabled, &enabled)); |   73       prefs_.GetValue(prefs::kAccessibilityScreenMagnifierEnabled, &enabled)); | 
|   74   ASSERT_TRUE(enabled); |   74   ASSERT_TRUE(enabled); | 
|   75   EXPECT_TRUE(base::FundamentalValue(false).Equals(enabled)); |   75   EXPECT_TRUE(base::Value(false).Equals(enabled)); | 
|   76  |   76  | 
|   77   const base::Value* type = NULL; |   77   const base::Value* type = NULL; | 
|   78   EXPECT_TRUE(prefs_.GetValue(prefs::kAccessibilityScreenMagnifierType, &type)); |   78   EXPECT_TRUE(prefs_.GetValue(prefs::kAccessibilityScreenMagnifierType, &type)); | 
|   79   ASSERT_TRUE(type); |   79   ASSERT_TRUE(type); | 
|   80   EXPECT_TRUE(base::FundamentalValue(0).Equals(type)); |   80   EXPECT_TRUE(base::Value(0).Equals(type)); | 
|   81 } |   81 } | 
|   82  |   82  | 
|   83 TEST_F(ScreenMagnifierPolicyHandlerTest, Enabled) { |   83 TEST_F(ScreenMagnifierPolicyHandlerTest, Enabled) { | 
|   84   policy_.Set(key::kScreenMagnifierType, POLICY_LEVEL_MANDATORY, |   84   policy_.Set(key::kScreenMagnifierType, POLICY_LEVEL_MANDATORY, | 
|   85               POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, |   85               POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, | 
|   86               base::MakeUnique<base::FundamentalValue>(1), nullptr); |   86               base::MakeUnique<base::Value>(1), nullptr); | 
|   87   handler_.ApplyPolicySettings(policy_, &prefs_); |   87   handler_.ApplyPolicySettings(policy_, &prefs_); | 
|   88  |   88  | 
|   89   const base::Value* enabled = NULL; |   89   const base::Value* enabled = NULL; | 
|   90   EXPECT_TRUE( |   90   EXPECT_TRUE( | 
|   91       prefs_.GetValue(prefs::kAccessibilityScreenMagnifierEnabled, &enabled)); |   91       prefs_.GetValue(prefs::kAccessibilityScreenMagnifierEnabled, &enabled)); | 
|   92   ASSERT_TRUE(enabled); |   92   ASSERT_TRUE(enabled); | 
|   93   EXPECT_TRUE(base::FundamentalValue(true).Equals(enabled)); |   93   EXPECT_TRUE(base::Value(true).Equals(enabled)); | 
|   94  |   94  | 
|   95   const base::Value* type = NULL; |   95   const base::Value* type = NULL; | 
|   96   EXPECT_TRUE(prefs_.GetValue(prefs::kAccessibilityScreenMagnifierType, &type)); |   96   EXPECT_TRUE(prefs_.GetValue(prefs::kAccessibilityScreenMagnifierType, &type)); | 
|   97   ASSERT_TRUE(type); |   97   ASSERT_TRUE(type); | 
|   98   EXPECT_TRUE(base::FundamentalValue(1).Equals(type)); |   98   EXPECT_TRUE(base::Value(1).Equals(type)); | 
|   99 } |   99 } | 
|  100  |  100  | 
|  101 TEST(ExternalDataPolicyHandlerTest, Empty) { |  101 TEST(ExternalDataPolicyHandlerTest, Empty) { | 
|  102   PolicyErrorMap errors; |  102   PolicyErrorMap errors; | 
|  103   EXPECT_TRUE(ExternalDataPolicyHandler(key::kUserAvatarImage) |  103   EXPECT_TRUE(ExternalDataPolicyHandler(key::kUserAvatarImage) | 
|  104                   .CheckPolicySettings(PolicyMap(), &errors)); |  104                   .CheckPolicySettings(PolicyMap(), &errors)); | 
|  105   EXPECT_TRUE(errors.GetErrors(key::kUserAvatarImage).empty()); |  105   EXPECT_TRUE(errors.GetErrors(key::kUserAvatarImage).empty()); | 
|  106 } |  106 } | 
|  107  |  107  | 
|  108 TEST(ExternalDataPolicyHandlerTest, WrongType) { |  108 TEST(ExternalDataPolicyHandlerTest, WrongType) { | 
|  109   PolicyMap policy_map; |  109   PolicyMap policy_map; | 
|  110   policy_map.Set(key::kUserAvatarImage, POLICY_LEVEL_MANDATORY, |  110   policy_map.Set(key::kUserAvatarImage, POLICY_LEVEL_MANDATORY, | 
|  111                  POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, |  111                  POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, | 
|  112                  base::MakeUnique<base::FundamentalValue>(false), nullptr); |  112                  base::MakeUnique<base::Value>(false), nullptr); | 
|  113   PolicyErrorMap errors; |  113   PolicyErrorMap errors; | 
|  114   EXPECT_FALSE(ExternalDataPolicyHandler(key::kUserAvatarImage) |  114   EXPECT_FALSE(ExternalDataPolicyHandler(key::kUserAvatarImage) | 
|  115                    .CheckPolicySettings(policy_map, &errors)); |  115                    .CheckPolicySettings(policy_map, &errors)); | 
|  116   EXPECT_FALSE(errors.GetErrors(key::kUserAvatarImage).empty()); |  116   EXPECT_FALSE(errors.GetErrors(key::kUserAvatarImage).empty()); | 
|  117 } |  117 } | 
|  118  |  118  | 
|  119 TEST(ExternalDataPolicyHandlerTest, MissingURL) { |  119 TEST(ExternalDataPolicyHandlerTest, MissingURL) { | 
|  120   std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue); |  120   std::unique_ptr<base::DictionaryValue> dict(new base::DictionaryValue); | 
|  121   dict->SetString("hash", "1234567890123456789012345678901234567890"); |  121   dict->SetString("hash", "1234567890123456789012345678901234567890"); | 
|  122   PolicyMap policy_map; |  122   PolicyMap policy_map; | 
| (...skipping 119 matching lines...) Expand 10 before | Expand all | Expand 10 after  Loading... | 
|  242       NetworkConfigurationPolicyHandler::CreateForUserPolicy()); |  242       NetworkConfigurationPolicyHandler::CreateForUserPolicy()); | 
|  243   PolicyErrorMap errors; |  243   PolicyErrorMap errors; | 
|  244   EXPECT_TRUE(handler->CheckPolicySettings(policy_map, &errors)); |  244   EXPECT_TRUE(handler->CheckPolicySettings(policy_map, &errors)); | 
|  245   EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); |  245   EXPECT_TRUE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); | 
|  246 } |  246 } | 
|  247  |  247  | 
|  248 TEST(NetworkConfigurationPolicyHandlerTest, WrongType) { |  248 TEST(NetworkConfigurationPolicyHandlerTest, WrongType) { | 
|  249   PolicyMap policy_map; |  249   PolicyMap policy_map; | 
|  250   policy_map.Set(key::kOpenNetworkConfiguration, POLICY_LEVEL_MANDATORY, |  250   policy_map.Set(key::kOpenNetworkConfiguration, POLICY_LEVEL_MANDATORY, | 
|  251                  POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, |  251                  POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, | 
|  252                  base::MakeUnique<base::FundamentalValue>(false), nullptr); |  252                  base::MakeUnique<base::Value>(false), nullptr); | 
|  253   std::unique_ptr<NetworkConfigurationPolicyHandler> handler( |  253   std::unique_ptr<NetworkConfigurationPolicyHandler> handler( | 
|  254       NetworkConfigurationPolicyHandler::CreateForUserPolicy()); |  254       NetworkConfigurationPolicyHandler::CreateForUserPolicy()); | 
|  255   PolicyErrorMap errors; |  255   PolicyErrorMap errors; | 
|  256   EXPECT_FALSE(handler->CheckPolicySettings(policy_map, &errors)); |  256   EXPECT_FALSE(handler->CheckPolicySettings(policy_map, &errors)); | 
|  257   EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); |  257   EXPECT_FALSE(errors.GetErrors(key::kOpenNetworkConfiguration).empty()); | 
|  258 } |  258 } | 
|  259  |  259  | 
|  260 TEST(NetworkConfigurationPolicyHandlerTest, JSONParseError) { |  260 TEST(NetworkConfigurationPolicyHandlerTest, JSONParseError) { | 
|  261   const std::string kTestONC("I'm not proper JSON!"); |  261   const std::string kTestONC("I'm not proper JSON!"); | 
|  262   PolicyMap policy_map; |  262   PolicyMap policy_map; | 
| (...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after  Loading... | 
|  348   LoginScreenPowerManagementPolicyHandler handler(chrome_schema_); |  348   LoginScreenPowerManagementPolicyHandler handler(chrome_schema_); | 
|  349   PolicyErrorMap errors; |  349   PolicyErrorMap errors; | 
|  350   EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); |  350   EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); | 
|  351   EXPECT_TRUE(errors.GetErrors(key::kDeviceLoginScreenPowerManagement).empty()); |  351   EXPECT_TRUE(errors.GetErrors(key::kDeviceLoginScreenPowerManagement).empty()); | 
|  352 } |  352 } | 
|  353  |  353  | 
|  354 TEST_F(LoginScreenPowerManagementPolicyHandlerTest, WrongType) { |  354 TEST_F(LoginScreenPowerManagementPolicyHandlerTest, WrongType) { | 
|  355   PolicyMap policy_map; |  355   PolicyMap policy_map; | 
|  356   policy_map.Set(key::kDeviceLoginScreenPowerManagement, POLICY_LEVEL_MANDATORY, |  356   policy_map.Set(key::kDeviceLoginScreenPowerManagement, POLICY_LEVEL_MANDATORY, | 
|  357                  POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, |  357                  POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, | 
|  358                  base::MakeUnique<base::FundamentalValue>(false), nullptr); |  358                  base::MakeUnique<base::Value>(false), nullptr); | 
|  359   LoginScreenPowerManagementPolicyHandler handler(chrome_schema_); |  359   LoginScreenPowerManagementPolicyHandler handler(chrome_schema_); | 
|  360   PolicyErrorMap errors; |  360   PolicyErrorMap errors; | 
|  361   EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); |  361   EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); | 
|  362   EXPECT_FALSE( |  362   EXPECT_FALSE( | 
|  363       errors.GetErrors(key::kDeviceLoginScreenPowerManagement).empty()); |  363       errors.GetErrors(key::kDeviceLoginScreenPowerManagement).empty()); | 
|  364 } |  364 } | 
|  365  |  365  | 
|  366 }  // namespace policy |  366 }  // namespace policy | 
| OLD | NEW |