diff options
author | benwells@chromium.org <benwells@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-11-26 10:37:45 +0000 |
---|---|---|
committer | benwells@chromium.org <benwells@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-11-26 10:37:45 +0000 |
commit | 301116c6aec4483ffbecf0d288c7ed6379078666 (patch) | |
tree | 748e1816ac71857f30d2a068b4e16fe73a367c0b /extensions/browser/management_policy_unittest.cc | |
parent | 97b710df4d390e865ed2abacebf4448ea5d74fe9 (diff) | |
download | chromium_src-301116c6aec4483ffbecf0d288c7ed6379078666.zip chromium_src-301116c6aec4483ffbecf0d288c7ed6379078666.tar.gz chromium_src-301116c6aec4483ffbecf0d288c7ed6379078666.tar.bz2 |
Move some dependencies of ExtensionService down to extensions.
These files do not have any dependencies to the rest of chrome so can
move down immediately.
TBR=miket, sky
BUG=298537
Review URL: https://codereview.chromium.org/82773002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@237299 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'extensions/browser/management_policy_unittest.cc')
-rw-r--r-- | extensions/browser/management_policy_unittest.cc | 211 |
1 files changed, 211 insertions, 0 deletions
diff --git a/extensions/browser/management_policy_unittest.cc b/extensions/browser/management_policy_unittest.cc new file mode 100644 index 0000000..595ba29 --- /dev/null +++ b/extensions/browser/management_policy_unittest.cc @@ -0,0 +1,211 @@ +// Copyright 2013 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "base/strings/utf_string_conversions.h" +#include "extensions/browser/management_policy.h" +#include "extensions/browser/test_management_policy.h" +#include "testing/gtest/include/gtest/gtest.h" + +typedef extensions::TestManagementPolicyProvider TestProvider; +using extensions::Extension; + +class ManagementPolicyTest : public testing::Test { + public: + virtual void SetUp() { + allow_all_.SetProhibitedActions(TestProvider::ALLOW_ALL); + no_modify_status_.SetProhibitedActions( + TestProvider::PROHIBIT_MODIFY_STATUS); + no_load_.SetProhibitedActions(TestProvider::PROHIBIT_LOAD); + must_remain_enabled_.SetProhibitedActions( + TestProvider::MUST_REMAIN_ENABLED); + must_remain_disabled_.SetProhibitedActions( + TestProvider::MUST_REMAIN_DISABLED); + must_remain_disabled_.SetDisableReason(Extension::DISABLE_SIDELOAD_WIPEOUT); + restrict_all_.SetProhibitedActions(TestProvider::PROHIBIT_MODIFY_STATUS | + TestProvider::PROHIBIT_LOAD | + TestProvider::MUST_REMAIN_ENABLED); + } + + protected: + extensions::ManagementPolicy policy_; + + TestProvider allow_all_; + TestProvider no_modify_status_; + TestProvider no_load_; + TestProvider must_remain_enabled_; + TestProvider must_remain_disabled_; + TestProvider restrict_all_; +}; + +TEST_F(ManagementPolicyTest, RegisterAndUnregister) { + EXPECT_EQ(0, policy_.GetNumProviders()); + policy_.RegisterProvider(&allow_all_); + EXPECT_EQ(1, policy_.GetNumProviders()); + policy_.RegisterProvider(&allow_all_); + EXPECT_EQ(1, policy_.GetNumProviders()); + + policy_.RegisterProvider(&no_modify_status_); + EXPECT_EQ(2, policy_.GetNumProviders()); + policy_.UnregisterProvider(&allow_all_); + EXPECT_EQ(1, policy_.GetNumProviders()); + policy_.UnregisterProvider(&allow_all_); + EXPECT_EQ(1, policy_.GetNumProviders()); + policy_.UnregisterProvider(&no_modify_status_); + EXPECT_EQ(0, policy_.GetNumProviders()); + + policy_.RegisterProvider(&allow_all_); + policy_.RegisterProvider(&no_modify_status_); + EXPECT_EQ(2, policy_.GetNumProviders()); + policy_.UnregisterAllProviders(); + EXPECT_EQ(0, policy_.GetNumProviders()); +} + +TEST_F(ManagementPolicyTest, UserMayLoad) { + // No providers registered. + string16 error; + // The extension and location are irrelevant to the + // TestManagementPolicyProviders. + EXPECT_TRUE(policy_.UserMayLoad(NULL, &error)); + EXPECT_TRUE(error.empty()); + + // One provider, no relevant restriction. + policy_.RegisterProvider(&no_modify_status_); + EXPECT_TRUE(policy_.UserMayLoad(NULL, &error)); + EXPECT_TRUE(error.empty()); + + // Two providers, no relevant restrictions. + policy_.RegisterProvider(&must_remain_enabled_); + EXPECT_TRUE(policy_.UserMayLoad(NULL, &error)); + EXPECT_TRUE(error.empty()); + + // Three providers, one with a relevant restriction. + policy_.RegisterProvider(&no_load_); + EXPECT_FALSE(policy_.UserMayLoad(NULL, &error)); + EXPECT_FALSE(error.empty()); + + // Remove the restriction. + policy_.UnregisterProvider(&no_load_); + error.clear(); + EXPECT_TRUE(policy_.UserMayLoad(NULL, &error)); + EXPECT_TRUE(error.empty()); +} +TEST_F(ManagementPolicyTest, UserMayModifySettings) { + // No providers registered. + string16 error; + EXPECT_TRUE(policy_.UserMayModifySettings(NULL, &error)); + EXPECT_TRUE(error.empty()); + + // One provider, no relevant restriction. + policy_.RegisterProvider(&allow_all_); + EXPECT_TRUE(policy_.UserMayModifySettings(NULL, &error)); + EXPECT_TRUE(error.empty()); + + // Two providers, no relevant restrictions. + policy_.RegisterProvider(&no_load_); + EXPECT_TRUE(policy_.UserMayModifySettings(NULL, &error)); + EXPECT_TRUE(error.empty()); + + // Three providers, one with a relevant restriction. + policy_.RegisterProvider(&no_modify_status_); + EXPECT_FALSE(policy_.UserMayModifySettings(NULL, &error)); + EXPECT_FALSE(error.empty()); + + // Remove the restriction. + policy_.UnregisterProvider(&no_modify_status_); + error.clear(); + EXPECT_TRUE(policy_.UserMayModifySettings(NULL, &error)); + EXPECT_TRUE(error.empty()); +} + +TEST_F(ManagementPolicyTest, MustRemainEnabled) { + // No providers registered. + string16 error; + EXPECT_FALSE(policy_.MustRemainEnabled(NULL, &error)); + EXPECT_TRUE(error.empty()); + + // One provider, no relevant restriction. + policy_.RegisterProvider(&allow_all_); + EXPECT_FALSE(policy_.MustRemainEnabled(NULL, &error)); + EXPECT_TRUE(error.empty()); + + // Two providers, no relevant restrictions. + policy_.RegisterProvider(&no_modify_status_); + EXPECT_FALSE(policy_.MustRemainEnabled(NULL, &error)); + EXPECT_TRUE(error.empty()); + + // Three providers, one with a relevant restriction. + policy_.RegisterProvider(&must_remain_enabled_); + EXPECT_TRUE(policy_.MustRemainEnabled(NULL, &error)); + EXPECT_FALSE(error.empty()); + + // Remove the restriction. + policy_.UnregisterProvider(&must_remain_enabled_); + error.clear(); + EXPECT_FALSE(policy_.MustRemainEnabled(NULL, &error)); + EXPECT_TRUE(error.empty()); +} + +TEST_F(ManagementPolicyTest, MustRemainDisabled) { + // No providers registered. + string16 error; + EXPECT_FALSE(policy_.MustRemainDisabled(NULL, NULL, &error)); + EXPECT_TRUE(error.empty()); + + // One provider, no relevant restriction. + policy_.RegisterProvider(&allow_all_); + EXPECT_FALSE(policy_.MustRemainDisabled(NULL, NULL, &error)); + EXPECT_TRUE(error.empty()); + + // Two providers, no relevant restrictions. + policy_.RegisterProvider(&no_modify_status_); + EXPECT_FALSE(policy_.MustRemainDisabled(NULL, NULL, &error)); + EXPECT_TRUE(error.empty()); + + // Three providers, one with a relevant restriction. + Extension::DisableReason reason = Extension::DISABLE_NONE; + policy_.RegisterProvider(&must_remain_disabled_); + EXPECT_TRUE(policy_.MustRemainDisabled(NULL, &reason, &error)); + EXPECT_FALSE(error.empty()); + EXPECT_EQ(Extension::DISABLE_SIDELOAD_WIPEOUT, reason); + + // Remove the restriction. + policy_.UnregisterProvider(&must_remain_disabled_); + error.clear(); + EXPECT_FALSE(policy_.MustRemainDisabled(NULL, NULL, &error)); + EXPECT_TRUE(error.empty()); +} + +// Tests error handling in the ManagementPolicy. +TEST_F(ManagementPolicyTest, ErrorHandling) { + // The error parameter should be unchanged if no restriction was found. + std::string original_error = "Ceci est en effet une erreur."; + string16 original_error16 = UTF8ToUTF16(original_error); + string16 error = original_error16; + EXPECT_TRUE(policy_.UserMayLoad(NULL, &error)); + EXPECT_EQ(original_error, UTF16ToUTF8(error)); + EXPECT_TRUE(policy_.UserMayModifySettings(NULL, &error)); + EXPECT_EQ(original_error, UTF16ToUTF8(error)); + EXPECT_FALSE(policy_.MustRemainEnabled(NULL, &error)); + EXPECT_EQ(original_error, UTF16ToUTF8(error)); + + // Ensure no crashes if no error message was requested. + EXPECT_TRUE(policy_.UserMayLoad(NULL, NULL)); + EXPECT_TRUE(policy_.UserMayModifySettings(NULL, NULL)); + EXPECT_FALSE(policy_.MustRemainEnabled(NULL, NULL)); + policy_.RegisterProvider(&restrict_all_); + EXPECT_FALSE(policy_.UserMayLoad(NULL, NULL)); + EXPECT_FALSE(policy_.UserMayModifySettings(NULL, NULL)); + EXPECT_TRUE(policy_.MustRemainEnabled(NULL, NULL)); + + // Make sure returned error is correct. + error = original_error16; + EXPECT_FALSE(policy_.UserMayLoad(NULL, &error)); + EXPECT_EQ(UTF8ToUTF16(TestProvider::expected_error()), error); + error = original_error16; + EXPECT_FALSE(policy_.UserMayModifySettings(NULL, &error)); + EXPECT_EQ(UTF8ToUTF16(TestProvider::expected_error()), error); + error = original_error16; + EXPECT_TRUE(policy_.MustRemainEnabled(NULL, &error)); + EXPECT_EQ(UTF8ToUTF16(TestProvider::expected_error()), error); +} |