| OLD | NEW |
| 1 // Copyright (c) 2014 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/bind.h" | 5 #include "base/bind.h" |
| 6 #include "base/callback.h" | 6 #include "base/callback.h" |
| 7 #include "base/json/json_reader.h" | 7 #include "base/json/json_reader.h" |
| 8 #include "base/memory/scoped_ptr.h" | 8 #include "base/memory/scoped_ptr.h" |
| 9 #include "base/prefs/pref_value_map.h" | 9 #include "base/prefs/pref_value_map.h" |
| 10 #include "base/values.h" | 10 #include "base/values.h" |
| (...skipping 61 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 72 EXPECT_TRUE(errors.empty()); | 72 EXPECT_TRUE(errors.empty()); |
| 73 | 73 |
| 74 list.AppendString("invalid"); | 74 list.AppendString("invalid"); |
| 75 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, | 75 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, |
| 76 POLICY_SCOPE_USER, list.DeepCopy(), NULL); | 76 POLICY_SCOPE_USER, list.DeepCopy(), NULL); |
| 77 errors.Clear(); | 77 errors.Clear(); |
| 78 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); | 78 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); |
| 79 EXPECT_FALSE(errors.empty()); | 79 EXPECT_FALSE(errors.empty()); |
| 80 EXPECT_FALSE(errors.GetErrors(kTestPolicy).empty()); | 80 EXPECT_FALSE(errors.GetErrors(kTestPolicy).empty()); |
| 81 | 81 |
| 82 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, | 82 policy_map.Set(kTestPolicy, |
| 83 POLICY_LEVEL_MANDATORY, |
| 83 POLICY_SCOPE_USER, | 84 POLICY_SCOPE_USER, |
| 84 base::Value::CreateStringValue("no list"), NULL); | 85 new base::StringValue("no list"), |
| 86 NULL); |
| 85 errors.Clear(); | 87 errors.Clear(); |
| 86 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); | 88 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); |
| 87 EXPECT_FALSE(errors.empty()); | 89 EXPECT_FALSE(errors.empty()); |
| 88 EXPECT_FALSE(errors.GetErrors(kTestPolicy).empty()); | 90 EXPECT_FALSE(errors.GetErrors(kTestPolicy).empty()); |
| 89 } | 91 } |
| 90 | 92 |
| 91 TEST(StringMappingListPolicyHandlerTest, ApplyPolicySettings) { | 93 TEST(StringMappingListPolicyHandlerTest, ApplyPolicySettings) { |
| 92 base::ListValue list; | 94 base::ListValue list; |
| 93 base::ListValue expected; | 95 base::ListValue expected; |
| 94 PolicyMap policy_map; | 96 PolicyMap policy_map; |
| (...skipping 63 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 158 | 160 |
| 159 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, | 161 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, |
| 160 POLICY_SCOPE_USER, base::Value::CreateIntegerValue(15), NULL); | 162 POLICY_SCOPE_USER, base::Value::CreateIntegerValue(15), NULL); |
| 161 errors.Clear(); | 163 errors.Clear(); |
| 162 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); | 164 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); |
| 163 EXPECT_FALSE(errors.empty()); | 165 EXPECT_FALSE(errors.empty()); |
| 164 | 166 |
| 165 // Check that an entirely invalid value is rejected and yields an error | 167 // Check that an entirely invalid value is rejected and yields an error |
| 166 // message. | 168 // message. |
| 167 policy_map.Set(kTestPolicy, | 169 policy_map.Set(kTestPolicy, |
| 168 POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 170 POLICY_LEVEL_MANDATORY, |
| 169 base::Value::CreateStringValue("invalid"), NULL); | 171 POLICY_SCOPE_USER, |
| 172 new base::StringValue("invalid"), |
| 173 NULL); |
| 170 errors.Clear(); | 174 errors.Clear(); |
| 171 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); | 175 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); |
| 172 EXPECT_FALSE(errors.empty()); | 176 EXPECT_FALSE(errors.empty()); |
| 173 } | 177 } |
| 174 | 178 |
| 175 TEST(IntRangePolicyHandler, CheckPolicySettingsDontClamp) { | 179 TEST(IntRangePolicyHandler, CheckPolicySettingsDontClamp) { |
| 176 PolicyMap policy_map; | 180 PolicyMap policy_map; |
| 177 PolicyErrorMap errors; | 181 PolicyErrorMap errors; |
| 178 | 182 |
| 179 // This tests needs to modify an int policy. The exact policy used and its | 183 // This tests needs to modify an int policy. The exact policy used and its |
| (...skipping 28 matching lines...) Expand all Loading... |
| 208 EXPECT_FALSE(errors.empty()); | 212 EXPECT_FALSE(errors.empty()); |
| 209 | 213 |
| 210 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, | 214 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, |
| 211 POLICY_SCOPE_USER, base::Value::CreateIntegerValue(15), NULL); | 215 POLICY_SCOPE_USER, base::Value::CreateIntegerValue(15), NULL); |
| 212 errors.Clear(); | 216 errors.Clear(); |
| 213 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); | 217 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); |
| 214 EXPECT_FALSE(errors.empty()); | 218 EXPECT_FALSE(errors.empty()); |
| 215 | 219 |
| 216 // Check that an entirely invalid value is rejected and yields an error | 220 // Check that an entirely invalid value is rejected and yields an error |
| 217 // message. | 221 // message. |
| 218 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 222 policy_map.Set(kTestPolicy, |
| 219 base::Value::CreateStringValue("invalid"), NULL); | 223 POLICY_LEVEL_MANDATORY, |
| 224 POLICY_SCOPE_USER, |
| 225 new base::StringValue("invalid"), |
| 226 NULL); |
| 220 errors.Clear(); | 227 errors.Clear(); |
| 221 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); | 228 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); |
| 222 EXPECT_FALSE(errors.empty()); | 229 EXPECT_FALSE(errors.empty()); |
| 223 } | 230 } |
| 224 | 231 |
| 225 TEST(IntRangePolicyHandler, ApplyPolicySettingsClamp) { | 232 TEST(IntRangePolicyHandler, ApplyPolicySettingsClamp) { |
| 226 PolicyMap policy_map; | 233 PolicyMap policy_map; |
| 227 PrefValueMap prefs; | 234 PrefValueMap prefs; |
| 228 scoped_ptr<base::Value> expected; | 235 scoped_ptr<base::Value> expected; |
| 229 const base::Value* value; | 236 const base::Value* value; |
| (...skipping 119 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 349 EXPECT_FALSE(errors.empty()); | 356 EXPECT_FALSE(errors.empty()); |
| 350 | 357 |
| 351 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, | 358 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, |
| 352 POLICY_SCOPE_USER, base::Value::CreateIntegerValue(15), NULL); | 359 POLICY_SCOPE_USER, base::Value::CreateIntegerValue(15), NULL); |
| 353 errors.Clear(); | 360 errors.Clear(); |
| 354 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); | 361 EXPECT_TRUE(handler.CheckPolicySettings(policy_map, &errors)); |
| 355 EXPECT_FALSE(errors.empty()); | 362 EXPECT_FALSE(errors.empty()); |
| 356 | 363 |
| 357 // Check that an entirely invalid value is rejected and yields an error | 364 // Check that an entirely invalid value is rejected and yields an error |
| 358 // message. | 365 // message. |
| 359 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 366 policy_map.Set(kTestPolicy, |
| 360 base::Value::CreateStringValue("invalid"), NULL); | 367 POLICY_LEVEL_MANDATORY, |
| 368 POLICY_SCOPE_USER, |
| 369 new base::StringValue("invalid"), |
| 370 NULL); |
| 361 errors.Clear(); | 371 errors.Clear(); |
| 362 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); | 372 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); |
| 363 EXPECT_FALSE(errors.empty()); | 373 EXPECT_FALSE(errors.empty()); |
| 364 } | 374 } |
| 365 | 375 |
| 366 TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsDontClamp) { | 376 TEST(IntPercentageToDoublePolicyHandler, CheckPolicySettingsDontClamp) { |
| 367 PolicyMap policy_map; | 377 PolicyMap policy_map; |
| 368 PolicyErrorMap errors; | 378 PolicyErrorMap errors; |
| 369 | 379 |
| 370 // This tests needs to modify an int policy. The exact policy used and its | 380 // This tests needs to modify an int policy. The exact policy used and its |
| (...skipping 29 matching lines...) Expand all Loading... |
| 400 EXPECT_FALSE(errors.empty()); | 410 EXPECT_FALSE(errors.empty()); |
| 401 | 411 |
| 402 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, | 412 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, |
| 403 POLICY_SCOPE_USER, base::Value::CreateIntegerValue(15), NULL); | 413 POLICY_SCOPE_USER, base::Value::CreateIntegerValue(15), NULL); |
| 404 errors.Clear(); | 414 errors.Clear(); |
| 405 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); | 415 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); |
| 406 EXPECT_FALSE(errors.empty()); | 416 EXPECT_FALSE(errors.empty()); |
| 407 | 417 |
| 408 // Check that an entirely invalid value is rejected and yields an error | 418 // Check that an entirely invalid value is rejected and yields an error |
| 409 // message. | 419 // message. |
| 410 policy_map.Set(kTestPolicy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, | 420 policy_map.Set(kTestPolicy, |
| 411 base::Value::CreateStringValue("invalid"), NULL); | 421 POLICY_LEVEL_MANDATORY, |
| 422 POLICY_SCOPE_USER, |
| 423 new base::StringValue("invalid"), |
| 424 NULL); |
| 412 errors.Clear(); | 425 errors.Clear(); |
| 413 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); | 426 EXPECT_FALSE(handler.CheckPolicySettings(policy_map, &errors)); |
| 414 EXPECT_FALSE(errors.empty()); | 427 EXPECT_FALSE(errors.empty()); |
| 415 } | 428 } |
| 416 | 429 |
| 417 TEST(IntPercentageToDoublePolicyHandler, ApplyPolicySettingsClamp) { | 430 TEST(IntPercentageToDoublePolicyHandler, ApplyPolicySettingsClamp) { |
| 418 PolicyMap policy_map; | 431 PolicyMap policy_map; |
| 419 PrefValueMap prefs; | 432 PrefValueMap prefs; |
| 420 scoped_ptr<base::Value> expected; | 433 scoped_ptr<base::Value> expected; |
| 421 const base::Value* value; | 434 const base::Value* value; |
| (...skipping 267 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 689 handler_recommended.ApplyPolicySettings(policy_map_mandatory, &prefs); | 702 handler_recommended.ApplyPolicySettings(policy_map_mandatory, &prefs); |
| 690 EXPECT_TRUE(prefs.GetValue(kTestPref, &value_set_in_pref)); | 703 EXPECT_TRUE(prefs.GetValue(kTestPref, &value_set_in_pref)); |
| 691 EXPECT_TRUE(value_expected_in_pref->Equals(value_set_in_pref)); | 704 EXPECT_TRUE(value_expected_in_pref->Equals(value_set_in_pref)); |
| 692 | 705 |
| 693 EXPECT_FALSE( | 706 EXPECT_FALSE( |
| 694 handler_none.CheckPolicySettings(policy_map_recommended, &errors)); | 707 handler_none.CheckPolicySettings(policy_map_recommended, &errors)); |
| 695 EXPECT_FALSE(errors.empty()); | 708 EXPECT_FALSE(errors.empty()); |
| 696 } | 709 } |
| 697 | 710 |
| 698 } // namespace policy | 711 } // namespace policy |
| OLD | NEW |