| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/chromeos/extensions/device_local_account_management_pol
icy_provider.h" | 5 #include "chrome/browser/chromeos/extensions/device_local_account_management_pol
icy_provider.h" |
| 6 | 6 |
| 7 #include <string> | 7 #include <string> |
| 8 | 8 |
| 9 #include "base/files/file_path.h" | 9 #include "base/files/file_path.h" |
| 10 #include "base/memory/ref_counted.h" | 10 #include "base/memory/ref_counted.h" |
| (...skipping 61 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 72 } // namespace | 72 } // namespace |
| 73 | 73 |
| 74 TEST(DeviceLocalAccountManagementPolicyProviderTest, PublicSession) { | 74 TEST(DeviceLocalAccountManagementPolicyProviderTest, PublicSession) { |
| 75 DeviceLocalAccountManagementPolicyProvider | 75 DeviceLocalAccountManagementPolicyProvider |
| 76 provider(policy::DeviceLocalAccount::TYPE_PUBLIC_SESSION); | 76 provider(policy::DeviceLocalAccount::TYPE_PUBLIC_SESSION); |
| 77 | 77 |
| 78 // Verify that if an extension's location has been whitelisted for use in | 78 // Verify that if an extension's location has been whitelisted for use in |
| 79 // public sessions, the extension can be installed. | 79 // public sessions, the extension can be installed. |
| 80 scoped_refptr<const extensions::Extension> extension = | 80 scoped_refptr<const extensions::Extension> extension = |
| 81 CreateExternalComponentExtension(); | 81 CreateExternalComponentExtension(); |
| 82 ASSERT_TRUE(extension); | 82 ASSERT_TRUE(extension.get()); |
| 83 base::string16 error; | 83 base::string16 error; |
| 84 EXPECT_TRUE(provider.UserMayLoad(extension.get(), &error)); | 84 EXPECT_TRUE(provider.UserMayLoad(extension.get(), &error)); |
| 85 EXPECT_EQ(base::string16(), error); | 85 EXPECT_EQ(base::string16(), error); |
| 86 error.clear(); | 86 error.clear(); |
| 87 | 87 |
| 88 // Verify that if an extension's type has been whitelisted for use in | 88 // Verify that if an extension's type has been whitelisted for use in |
| 89 // device-local accounts, the extension can be installed. | 89 // device-local accounts, the extension can be installed. |
| 90 extension = CreateHostedApp(); | 90 extension = CreateHostedApp(); |
| 91 ASSERT_TRUE(extension); | 91 ASSERT_TRUE(extension.get()); |
| 92 EXPECT_TRUE(provider.UserMayLoad(extension.get(), &error)); | 92 EXPECT_TRUE(provider.UserMayLoad(extension.get(), &error)); |
| 93 EXPECT_EQ(base::string16(), error); | 93 EXPECT_EQ(base::string16(), error); |
| 94 error.clear(); | 94 error.clear(); |
| 95 | 95 |
| 96 // Verify that if an extension's ID has been explicitly whitelisted for use in | 96 // Verify that if an extension's ID has been explicitly whitelisted for use in |
| 97 // device-local accounts, the extension can be installed. | 97 // device-local accounts, the extension can be installed. |
| 98 extension = CreateRegularExtension(kWhitelistedId); | 98 extension = CreateRegularExtension(kWhitelistedId); |
| 99 ASSERT_TRUE(extension); | 99 ASSERT_TRUE(extension.get()); |
| 100 EXPECT_TRUE(provider.UserMayLoad(extension.get(), &error)); | 100 EXPECT_TRUE(provider.UserMayLoad(extension.get(), &error)); |
| 101 EXPECT_EQ(base::string16(), error); | 101 EXPECT_EQ(base::string16(), error); |
| 102 error.clear(); | 102 error.clear(); |
| 103 | 103 |
| 104 // Verify that if neither the location, type nor the ID of an extension have | 104 // Verify that if neither the location, type nor the ID of an extension have |
| 105 // been whitelisted for use in public sessions, the extension cannot be | 105 // been whitelisted for use in public sessions, the extension cannot be |
| 106 // installed. | 106 // installed. |
| 107 extension = CreateRegularExtension(std::string()); | 107 extension = CreateRegularExtension(std::string()); |
| 108 ASSERT_TRUE(extension); | 108 ASSERT_TRUE(extension.get()); |
| 109 EXPECT_FALSE(provider.UserMayLoad(extension.get(), &error)); | 109 EXPECT_FALSE(provider.UserMayLoad(extension.get(), &error)); |
| 110 EXPECT_NE(base::string16(), error); | 110 EXPECT_NE(base::string16(), error); |
| 111 error.clear(); | 111 error.clear(); |
| 112 } | 112 } |
| 113 | 113 |
| 114 TEST(DeviceLocalAccountManagementPolicyProviderTest, KioskAppSession) { | 114 TEST(DeviceLocalAccountManagementPolicyProviderTest, KioskAppSession) { |
| 115 DeviceLocalAccountManagementPolicyProvider | 115 DeviceLocalAccountManagementPolicyProvider |
| 116 provider(policy::DeviceLocalAccount::TYPE_KIOSK_APP); | 116 provider(policy::DeviceLocalAccount::TYPE_KIOSK_APP); |
| 117 | 117 |
| 118 // Verify that a platform app can be installed. | 118 // Verify that a platform app can be installed. |
| 119 scoped_refptr<const extensions::Extension> extension = CreatePlatformApp(); | 119 scoped_refptr<const extensions::Extension> extension = CreatePlatformApp(); |
| 120 ASSERT_TRUE(extension); | 120 ASSERT_TRUE(extension.get()); |
| 121 base::string16 error; | 121 base::string16 error; |
| 122 EXPECT_TRUE(provider.UserMayLoad(extension.get(), &error)); | 122 EXPECT_TRUE(provider.UserMayLoad(extension.get(), &error)); |
| 123 EXPECT_EQ(base::string16(), error); | 123 EXPECT_EQ(base::string16(), error); |
| 124 error.clear(); | 124 error.clear(); |
| 125 | 125 |
| 126 // Verify that an extension whose location has been whitelisted for use in | 126 // Verify that an extension whose location has been whitelisted for use in |
| 127 // other types of device-local accounts cannot be installed in a single-app | 127 // other types of device-local accounts cannot be installed in a single-app |
| 128 // kiosk session. | 128 // kiosk session. |
| 129 extension = CreateExternalComponentExtension(); | 129 extension = CreateExternalComponentExtension(); |
| 130 ASSERT_TRUE(extension); | 130 ASSERT_TRUE(extension.get()); |
| 131 EXPECT_FALSE(provider.UserMayLoad(extension.get(), &error)); | 131 EXPECT_FALSE(provider.UserMayLoad(extension.get(), &error)); |
| 132 EXPECT_NE(base::string16(), error); | 132 EXPECT_NE(base::string16(), error); |
| 133 error.clear(); | 133 error.clear(); |
| 134 | 134 |
| 135 // Verify that an extension whose type has been whitelisted for use in other | 135 // Verify that an extension whose type has been whitelisted for use in other |
| 136 // types of device-local accounts cannot be installed in a single-app kiosk | 136 // types of device-local accounts cannot be installed in a single-app kiosk |
| 137 // session. | 137 // session. |
| 138 extension = CreateHostedApp(); | 138 extension = CreateHostedApp(); |
| 139 ASSERT_TRUE(extension); | 139 ASSERT_TRUE(extension.get()); |
| 140 EXPECT_FALSE(provider.UserMayLoad(extension.get(), &error)); | 140 EXPECT_FALSE(provider.UserMayLoad(extension.get(), &error)); |
| 141 EXPECT_NE(base::string16(), error); | 141 EXPECT_NE(base::string16(), error); |
| 142 error.clear(); | 142 error.clear(); |
| 143 | 143 |
| 144 // Verify that an extension whose ID has been whitelisted for use in other | 144 // Verify that an extension whose ID has been whitelisted for use in other |
| 145 // types of device-local accounts cannot be installed in a single-app kiosk | 145 // types of device-local accounts cannot be installed in a single-app kiosk |
| 146 // session. | 146 // session. |
| 147 extension = CreateRegularExtension(kWhitelistedId); | 147 extension = CreateRegularExtension(kWhitelistedId); |
| 148 ASSERT_TRUE(extension); | 148 ASSERT_TRUE(extension.get()); |
| 149 EXPECT_FALSE(provider.UserMayLoad(extension.get(), &error)); | 149 EXPECT_FALSE(provider.UserMayLoad(extension.get(), &error)); |
| 150 EXPECT_NE(base::string16(), error); | 150 EXPECT_NE(base::string16(), error); |
| 151 error.clear(); | 151 error.clear(); |
| 152 } | 152 } |
| 153 | 153 |
| 154 } // namespace chromeos | 154 } // namespace chromeos |
| OLD | NEW |