summaryrefslogtreecommitdiffstats
path: root/extensions/browser/management_policy_unittest.cc
diff options
context:
space:
mode:
authorbenwells@chromium.org <benwells@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-11-26 10:37:45 +0000
committerbenwells@chromium.org <benwells@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-11-26 10:37:45 +0000
commit301116c6aec4483ffbecf0d288c7ed6379078666 (patch)
tree748e1816ac71857f30d2a068b4e16fe73a367c0b /extensions/browser/management_policy_unittest.cc
parent97b710df4d390e865ed2abacebf4448ea5d74fe9 (diff)
downloadchromium_src-301116c6aec4483ffbecf0d288c7ed6379078666.zip
chromium_src-301116c6aec4483ffbecf0d288c7ed6379078666.tar.gz
chromium_src-301116c6aec4483ffbecf0d288c7ed6379078666.tar.bz2
Move some dependencies of ExtensionService down to extensions.
These files do not have any dependencies to the rest of chrome so can move down immediately. TBR=miket, sky BUG=298537 Review URL: https://codereview.chromium.org/82773002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@237299 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'extensions/browser/management_policy_unittest.cc')
-rw-r--r--extensions/browser/management_policy_unittest.cc211
1 files changed, 211 insertions, 0 deletions
diff --git a/extensions/browser/management_policy_unittest.cc b/extensions/browser/management_policy_unittest.cc
new file mode 100644
index 0000000..595ba29
--- /dev/null
+++ b/extensions/browser/management_policy_unittest.cc
@@ -0,0 +1,211 @@
+// Copyright 2013 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "base/strings/utf_string_conversions.h"
+#include "extensions/browser/management_policy.h"
+#include "extensions/browser/test_management_policy.h"
+#include "testing/gtest/include/gtest/gtest.h"
+
+typedef extensions::TestManagementPolicyProvider TestProvider;
+using extensions::Extension;
+
+class ManagementPolicyTest : public testing::Test {
+ public:
+ virtual void SetUp() {
+ allow_all_.SetProhibitedActions(TestProvider::ALLOW_ALL);
+ no_modify_status_.SetProhibitedActions(
+ TestProvider::PROHIBIT_MODIFY_STATUS);
+ no_load_.SetProhibitedActions(TestProvider::PROHIBIT_LOAD);
+ must_remain_enabled_.SetProhibitedActions(
+ TestProvider::MUST_REMAIN_ENABLED);
+ must_remain_disabled_.SetProhibitedActions(
+ TestProvider::MUST_REMAIN_DISABLED);
+ must_remain_disabled_.SetDisableReason(Extension::DISABLE_SIDELOAD_WIPEOUT);
+ restrict_all_.SetProhibitedActions(TestProvider::PROHIBIT_MODIFY_STATUS |
+ TestProvider::PROHIBIT_LOAD |
+ TestProvider::MUST_REMAIN_ENABLED);
+ }
+
+ protected:
+ extensions::ManagementPolicy policy_;
+
+ TestProvider allow_all_;
+ TestProvider no_modify_status_;
+ TestProvider no_load_;
+ TestProvider must_remain_enabled_;
+ TestProvider must_remain_disabled_;
+ TestProvider restrict_all_;
+};
+
+TEST_F(ManagementPolicyTest, RegisterAndUnregister) {
+ EXPECT_EQ(0, policy_.GetNumProviders());
+ policy_.RegisterProvider(&allow_all_);
+ EXPECT_EQ(1, policy_.GetNumProviders());
+ policy_.RegisterProvider(&allow_all_);
+ EXPECT_EQ(1, policy_.GetNumProviders());
+
+ policy_.RegisterProvider(&no_modify_status_);
+ EXPECT_EQ(2, policy_.GetNumProviders());
+ policy_.UnregisterProvider(&allow_all_);
+ EXPECT_EQ(1, policy_.GetNumProviders());
+ policy_.UnregisterProvider(&allow_all_);
+ EXPECT_EQ(1, policy_.GetNumProviders());
+ policy_.UnregisterProvider(&no_modify_status_);
+ EXPECT_EQ(0, policy_.GetNumProviders());
+
+ policy_.RegisterProvider(&allow_all_);
+ policy_.RegisterProvider(&no_modify_status_);
+ EXPECT_EQ(2, policy_.GetNumProviders());
+ policy_.UnregisterAllProviders();
+ EXPECT_EQ(0, policy_.GetNumProviders());
+}
+
+TEST_F(ManagementPolicyTest, UserMayLoad) {
+ // No providers registered.
+ string16 error;
+ // The extension and location are irrelevant to the
+ // TestManagementPolicyProviders.
+ EXPECT_TRUE(policy_.UserMayLoad(NULL, &error));
+ EXPECT_TRUE(error.empty());
+
+ // One provider, no relevant restriction.
+ policy_.RegisterProvider(&no_modify_status_);
+ EXPECT_TRUE(policy_.UserMayLoad(NULL, &error));
+ EXPECT_TRUE(error.empty());
+
+ // Two providers, no relevant restrictions.
+ policy_.RegisterProvider(&must_remain_enabled_);
+ EXPECT_TRUE(policy_.UserMayLoad(NULL, &error));
+ EXPECT_TRUE(error.empty());
+
+ // Three providers, one with a relevant restriction.
+ policy_.RegisterProvider(&no_load_);
+ EXPECT_FALSE(policy_.UserMayLoad(NULL, &error));
+ EXPECT_FALSE(error.empty());
+
+ // Remove the restriction.
+ policy_.UnregisterProvider(&no_load_);
+ error.clear();
+ EXPECT_TRUE(policy_.UserMayLoad(NULL, &error));
+ EXPECT_TRUE(error.empty());
+}
+TEST_F(ManagementPolicyTest, UserMayModifySettings) {
+ // No providers registered.
+ string16 error;
+ EXPECT_TRUE(policy_.UserMayModifySettings(NULL, &error));
+ EXPECT_TRUE(error.empty());
+
+ // One provider, no relevant restriction.
+ policy_.RegisterProvider(&allow_all_);
+ EXPECT_TRUE(policy_.UserMayModifySettings(NULL, &error));
+ EXPECT_TRUE(error.empty());
+
+ // Two providers, no relevant restrictions.
+ policy_.RegisterProvider(&no_load_);
+ EXPECT_TRUE(policy_.UserMayModifySettings(NULL, &error));
+ EXPECT_TRUE(error.empty());
+
+ // Three providers, one with a relevant restriction.
+ policy_.RegisterProvider(&no_modify_status_);
+ EXPECT_FALSE(policy_.UserMayModifySettings(NULL, &error));
+ EXPECT_FALSE(error.empty());
+
+ // Remove the restriction.
+ policy_.UnregisterProvider(&no_modify_status_);
+ error.clear();
+ EXPECT_TRUE(policy_.UserMayModifySettings(NULL, &error));
+ EXPECT_TRUE(error.empty());
+}
+
+TEST_F(ManagementPolicyTest, MustRemainEnabled) {
+ // No providers registered.
+ string16 error;
+ EXPECT_FALSE(policy_.MustRemainEnabled(NULL, &error));
+ EXPECT_TRUE(error.empty());
+
+ // One provider, no relevant restriction.
+ policy_.RegisterProvider(&allow_all_);
+ EXPECT_FALSE(policy_.MustRemainEnabled(NULL, &error));
+ EXPECT_TRUE(error.empty());
+
+ // Two providers, no relevant restrictions.
+ policy_.RegisterProvider(&no_modify_status_);
+ EXPECT_FALSE(policy_.MustRemainEnabled(NULL, &error));
+ EXPECT_TRUE(error.empty());
+
+ // Three providers, one with a relevant restriction.
+ policy_.RegisterProvider(&must_remain_enabled_);
+ EXPECT_TRUE(policy_.MustRemainEnabled(NULL, &error));
+ EXPECT_FALSE(error.empty());
+
+ // Remove the restriction.
+ policy_.UnregisterProvider(&must_remain_enabled_);
+ error.clear();
+ EXPECT_FALSE(policy_.MustRemainEnabled(NULL, &error));
+ EXPECT_TRUE(error.empty());
+}
+
+TEST_F(ManagementPolicyTest, MustRemainDisabled) {
+ // No providers registered.
+ string16 error;
+ EXPECT_FALSE(policy_.MustRemainDisabled(NULL, NULL, &error));
+ EXPECT_TRUE(error.empty());
+
+ // One provider, no relevant restriction.
+ policy_.RegisterProvider(&allow_all_);
+ EXPECT_FALSE(policy_.MustRemainDisabled(NULL, NULL, &error));
+ EXPECT_TRUE(error.empty());
+
+ // Two providers, no relevant restrictions.
+ policy_.RegisterProvider(&no_modify_status_);
+ EXPECT_FALSE(policy_.MustRemainDisabled(NULL, NULL, &error));
+ EXPECT_TRUE(error.empty());
+
+ // Three providers, one with a relevant restriction.
+ Extension::DisableReason reason = Extension::DISABLE_NONE;
+ policy_.RegisterProvider(&must_remain_disabled_);
+ EXPECT_TRUE(policy_.MustRemainDisabled(NULL, &reason, &error));
+ EXPECT_FALSE(error.empty());
+ EXPECT_EQ(Extension::DISABLE_SIDELOAD_WIPEOUT, reason);
+
+ // Remove the restriction.
+ policy_.UnregisterProvider(&must_remain_disabled_);
+ error.clear();
+ EXPECT_FALSE(policy_.MustRemainDisabled(NULL, NULL, &error));
+ EXPECT_TRUE(error.empty());
+}
+
+// Tests error handling in the ManagementPolicy.
+TEST_F(ManagementPolicyTest, ErrorHandling) {
+ // The error parameter should be unchanged if no restriction was found.
+ std::string original_error = "Ceci est en effet une erreur.";
+ string16 original_error16 = UTF8ToUTF16(original_error);
+ string16 error = original_error16;
+ EXPECT_TRUE(policy_.UserMayLoad(NULL, &error));
+ EXPECT_EQ(original_error, UTF16ToUTF8(error));
+ EXPECT_TRUE(policy_.UserMayModifySettings(NULL, &error));
+ EXPECT_EQ(original_error, UTF16ToUTF8(error));
+ EXPECT_FALSE(policy_.MustRemainEnabled(NULL, &error));
+ EXPECT_EQ(original_error, UTF16ToUTF8(error));
+
+ // Ensure no crashes if no error message was requested.
+ EXPECT_TRUE(policy_.UserMayLoad(NULL, NULL));
+ EXPECT_TRUE(policy_.UserMayModifySettings(NULL, NULL));
+ EXPECT_FALSE(policy_.MustRemainEnabled(NULL, NULL));
+ policy_.RegisterProvider(&restrict_all_);
+ EXPECT_FALSE(policy_.UserMayLoad(NULL, NULL));
+ EXPECT_FALSE(policy_.UserMayModifySettings(NULL, NULL));
+ EXPECT_TRUE(policy_.MustRemainEnabled(NULL, NULL));
+
+ // Make sure returned error is correct.
+ error = original_error16;
+ EXPECT_FALSE(policy_.UserMayLoad(NULL, &error));
+ EXPECT_EQ(UTF8ToUTF16(TestProvider::expected_error()), error);
+ error = original_error16;
+ EXPECT_FALSE(policy_.UserMayModifySettings(NULL, &error));
+ EXPECT_EQ(UTF8ToUTF16(TestProvider::expected_error()), error);
+ error = original_error16;
+ EXPECT_TRUE(policy_.MustRemainEnabled(NULL, &error));
+ EXPECT_EQ(UTF8ToUTF16(TestProvider::expected_error()), error);
+}