blob: 1eca86eee0adda45f6d29990ef07270cd3885b03 [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <string>
#include "base/memory/scoped_ptr.h"
#include "base/values.h"
#include "build/build_config.h"
#include "components/policy/core/common/policy_details.h"
#include "components/policy/core/common/schema.h"
#include "policy/policy_constants.h"
#include "testing/gtest/include/gtest/gtest.h"
// This unittest tests the code generated by
// chrome/tools/build/generate_policy_source.py.
namespace policy {
TEST(GeneratePolicySource, ChromeSchemaData) {
Schema schema = Schema::Wrap(GetChromeSchemaData());
ASSERT_TRUE(schema.valid());
EXPECT_EQ(base::Value::TYPE_DICTIONARY, schema.type());
Schema subschema = schema.GetAdditionalProperties();
EXPECT_FALSE(subschema.valid());
subschema = schema.GetProperty("no such policy exists");
EXPECT_FALSE(subschema.valid());
subschema = schema.GetProperty(key::kAlternateErrorPagesEnabled);
ASSERT_TRUE(subschema.valid());
EXPECT_EQ(base::Value::TYPE_BOOLEAN, subschema.type());
subschema = schema.GetProperty(key::kIncognitoModeAvailability);
ASSERT_TRUE(subschema.valid());
EXPECT_EQ(base::Value::TYPE_INTEGER, subschema.type());
subschema = schema.GetProperty(key::kProxyMode);
ASSERT_TRUE(subschema.valid());
EXPECT_EQ(base::Value::TYPE_STRING, subschema.type());
subschema = schema.GetProperty(key::kCookiesAllowedForUrls);
ASSERT_TRUE(subschema.valid());
EXPECT_EQ(base::Value::TYPE_LIST, subschema.type());
ASSERT_TRUE(subschema.GetItems().valid());
EXPECT_EQ(base::Value::TYPE_STRING, subschema.GetItems().type());
subschema = schema.GetProperty(key::kProxySettings);
ASSERT_TRUE(subschema.valid());
EXPECT_EQ(base::Value::TYPE_DICTIONARY, subschema.type());
EXPECT_FALSE(subschema.GetAdditionalProperties().valid());
EXPECT_FALSE(subschema.GetProperty("no such proxy key exists").valid());
ASSERT_TRUE(subschema.GetProperty(key::kProxyMode).valid());
ASSERT_TRUE(subschema.GetProperty(key::kProxyServer).valid());
ASSERT_TRUE(subschema.GetProperty(key::kProxyServerMode).valid());
ASSERT_TRUE(subschema.GetProperty(key::kProxyPacUrl).valid());
ASSERT_TRUE(subschema.GetProperty(key::kProxyBypassList).valid());
// Verify that all the Chrome policies are there.
for (Schema::Iterator it = schema.GetPropertiesIterator();
!it.IsAtEnd(); it.Advance()) {
EXPECT_TRUE(it.key());
EXPECT_FALSE(std::string(it.key()).empty());
EXPECT_TRUE(GetChromePolicyDetails(it.key()));
}
// The properties are iterated in order.
const char* kExpectedProperties[] = {
key::kProxyBypassList,
key::kProxyMode,
key::kProxyPacUrl,
key::kProxyServer,
key::kProxyServerMode,
NULL,
};
const char** next = kExpectedProperties;
for (Schema::Iterator it(subschema.GetPropertiesIterator());
!it.IsAtEnd(); it.Advance(), ++next) {
ASSERT_TRUE(*next != NULL);
EXPECT_STREQ(*next, it.key());
ASSERT_TRUE(it.schema().valid());
EXPECT_EQ(base::Value::TYPE_STRING, it.schema().type());
}
EXPECT_TRUE(*next == NULL);
}
TEST(GeneratePolicySource, PolicyDetails) {
EXPECT_FALSE(GetChromePolicyDetails(""));
EXPECT_FALSE(GetChromePolicyDetails("no such policy"));
EXPECT_FALSE(GetChromePolicyDetails("AlternateErrorPagesEnable"));
EXPECT_FALSE(GetChromePolicyDetails("alternateErrorPagesEnabled"));
EXPECT_FALSE(GetChromePolicyDetails("AAlternateErrorPagesEnabled"));
const PolicyDetails* details =
GetChromePolicyDetails(key::kAlternateErrorPagesEnabled);
ASSERT_TRUE(details);
EXPECT_FALSE(details->is_deprecated);
EXPECT_FALSE(details->is_device_policy);
EXPECT_EQ(5, details->id);
EXPECT_EQ(0u, details->max_external_data_size);
details = GetChromePolicyDetails(key::kJavascriptEnabled);
ASSERT_TRUE(details);
EXPECT_TRUE(details->is_deprecated);
EXPECT_FALSE(details->is_device_policy);
EXPECT_EQ(9, details->id);
EXPECT_EQ(0u, details->max_external_data_size);
#if defined(OS_CHROMEOS)
details = GetChromePolicyDetails(key::kDevicePolicyRefreshRate);
ASSERT_TRUE(details);
EXPECT_FALSE(details->is_deprecated);
EXPECT_TRUE(details->is_device_policy);
EXPECT_EQ(90, details->id);
EXPECT_EQ(0u, details->max_external_data_size);
#endif
// TODO(bartfab): add a test that verifies a max_external_data_size larger
// than 0, once a type 'external' policy is added.
}
} // namespace policy