Index: chrome/browser/chromeos/cros/onc_network_parser_unittest.cc |
diff --git a/chrome/browser/chromeos/cros/onc_network_parser_unittest.cc b/chrome/browser/chromeos/cros/onc_network_parser_unittest.cc |
index 664a1ab346316f54d43c40bbfca942001feebf6e..291f3794c7029151559c50f13ac51ad4a9e473fd 100644 |
--- a/chrome/browser/chromeos/cros/onc_network_parser_unittest.cc |
+++ b/chrome/browser/chromeos/cros/onc_network_parser_unittest.cc |
@@ -331,6 +331,32 @@ TEST_F(OncNetworkParserTest, TestLoadVPNCertificatePattern) { |
vpn->client_cert_pattern().enrollment_uri_list()[1]); |
} |
+TEST_F(OncNetworkParserTest, TestNoCertificatePatternForDevicePolicy) { |
+ std::string test_blob; |
+ GetTestData("cert-pattern.onc", &test_blob); |
+ OncNetworkParser parser(test_blob, "", |
+ NetworkUIData::ONC_SOURCE_DEVICE_POLICY); |
+ |
+ // Make sure we fail when parsing a certificate pattern from a device policy |
+ // ONC file. |
+ ASSERT_TRUE(parser.parse_error().empty()); |
+ EXPECT_EQ(1, parser.GetNetworkConfigsSize()); |
+ EXPECT_EQ(2, parser.GetCertificatesSize()); |
+ scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); |
+ ASSERT_TRUE(network.get()); |
+ |
+ EXPECT_EQ(chromeos::TYPE_WIFI, network->type()); |
+ WifiNetwork* wifi = static_cast<WifiNetwork*>(network.get()); |
+ EXPECT_EQ(chromeos::SECURITY_8021X, wifi->encryption()); |
+ EXPECT_EQ("WirelessNetwork", wifi->name()); |
+ EXPECT_FALSE(wifi->auto_connect()); |
+ EXPECT_EQ("", wifi->passphrase()); |
+ EXPECT_EQ(chromeos::EAP_METHOD_TLS, wifi->eap_method()); |
+ EXPECT_EQ(chromeos::CLIENT_CERT_TYPE_PATTERN, wifi->client_cert_type()); |
+ EXPECT_EQ("", wifi->client_cert_pattern().issuer().organization()); |
+ ASSERT_EQ(0ul, wifi->client_cert_pattern().enrollment_uri_list().size()); |
+} |
+ |
TEST_F(OncNetworkParserTest, TestCreateNetworkWifiEAP1) { |
std::string test_blob; |
GetTestData("network-wifi-eap1.onc", &test_blob); |