docs/enterprise/policy_pref_mapping_test.md
Usually, incoming policy values from the management server are mapped into a preference, which is then used by Chrome to control the behavior influenced by that policy/preference. Mapping is typically done by a policy handler (see configuration_policy_handler_list_factory.cc). This mapping can be very simple by directly mapping a policy value to pref (see kSimplePolicyMap) or more complex by a custom policy handler that performs validation / re-mapping / cross-checking with other policies etc.
In order to test these policy to preference mappings, we have a range of tests. With these tests, you can specify 0...N policies and their values and then check 1...M affected preferences and their expected values or state. This allows to easily test:
Each policy must have such a preference mapping test or provide a reason for why
such a test is missing (see reason_for_missing_test).
The simplest way to run preference mapping tests is to use tools/autotest.py
and list the files you want to test. For example:
$ testing/xvfb.py tools/autotest.py -C out/Default \
components/policy/test/data/pref_mapping/CrostiniAllowed.json \
components/policy/test/data/pref_mapping/CrostiniPortForwardingAllowed.json
To do the same manually, build and run browser_tests with --gtest_filter
set to one of the following:
PolicyPrefsTestCoverageTest.AllPoliciesHaveATestCase*ChunkedPolicyPrefsTest.PolicyToPrefsMapping*SigninPolicyPrefsTest.PolicyToPrefsMapping (CrOS only)Individual policies in ChunkedPolicyPrefsTest can be filtered with the
--test_policy_to_pref_mappings_filter flag. The flag accepts policy names
(with the .optionalTestNameSuffix) separated by colon.
$ autoninja -C out/Default browser_tests
$ testing/xvfb.py out/Default/browser_tests \
--gtest_filter="*ChunkedPolicyPrefsTest.PolicyToPrefsMapping*" \
--test_policy_to_pref_mappings_filter="CrostiniAllowed:CrostiniPortForwardingAllowed"
There are also iOS only policy pref mapping unit_tests. To run them, execute
the test binary with the --gtest_filter set to one of:
PolicyTest.AllPoliciesHaveATestCasePolicyTest.PolicyToPrefMappingsThe following example tests the IdleAction policy, i.e. its mapping to two
separate preferences, their default values, and that either IdleActionAC or
IdleActionBattery take precedence.
{
...
"IdleAction": {
"os": ["chromeos"],
"policy_pref_mapping_tests": [
{
"note": "Check default values (no policies set)",
"policies": { },
"prefs": {
"power.ac_idle_action": {
"location": "user_profile",
"default_value": 0,
},
"power.battery_idle_action": {
"location": "user_profile",
"default_value": 0
}
}
},
{
"note": "Check simple policy value",
"policies": { "IdleAction": 2 },
"prefs": {
"power.ac_idle_action": {
"location": "user_profile",
"value": 2,
},
"power.battery_idle_action": {
"location": "user_profile",
"value": 2
}
}
},
{
"note": "Check IdleActionAC and IdleActionBattery take precedence",
"policies": {
"IdleAction": 0,
"IdleActionAC": 1,
"IdleActionBattery": 2
},
"prefs": {
"power.ac_idle_action": {
"location": "user_profile",
"value": 1,
},
"power.battery_idle_action": {
"location": "user_profile",
"value": 2
}
}
},
]
},
...
}
The test cases per policy are defined in //components/policy/test/data/pref_mapping/[PolicyName].json (for iOS, see separate //ios/chrome/test/data/policy/pref_mapping/[PolicyName].json).
These files are JSON files with a list of PolicyTestCases (see below) as
value). Each policy must have at least one meaningful test case per supported
operating system (see reason_for_missing_test to bypass), otherwise the coverage browser test
PolicyPrefsTestCoverageTest.AllPoliciesHaveATestCase or the
CheckPolicyTestCases presubmit check will fail.
If your policy to pref mapping is the same on all platforms, you would typically
have one PolicyTestCase. Otherwise, you would have one PolicyTestCase per
group of platforms where it differs.
Since the JSON format does not allow comments, you can use the note field
anywhere to add further documentation.
The os field should be a list of strings representing the operating systems
the test case should be run on. Each supported operating system (indicated by
supported_on in PolicyName.yaml)
needs to have at least one test case. Valid values are:
winlinuxmacchromeosandroidfuchsiaios (tested via separate //ios/chrome/test/data/policy/pref_mapping/[PolicyName].json)Each PolicyTestCase needs to either have a list of policy_pref_mapping_tests
(see PolicyPrefMappingTest below) or a simple_policy_pref_mapping_test (see
SimplePolicyPrefMappingTest below). For simple policy to pref mappings (one
policy maps to one pref), you should use SimplePolicyPrefMappingTest, if you
need more fancy stuff (interactions between multiple policies and prefs), you
should use PolicyPrefMappingTests instead.
The boolean official_only field indicates whether this policy is only
supported in official builds. Defaults to false if not specified.
The boolean can_be_recommended field indicates whether the policy values
should be checked with recommended values as well. Defaults to false if not
specified, which means that the policy values are being set as mandatory values
only, which in turn checks that the preference is marked as managed and not
modifiable by the user. If this field is true, the policy values are also set as
recommended values and the preference(s) are checked to still be modifiable by
the user. Use check_for_mandatory and check_for_recommended (see below) to
trigger certain preference(s) to only be checked for certain policy levels. If
the policy is recommendable (indicated by can_be_recommended in
PolicyName.yaml then the preference mapping test should also check recommended
values.
In case the policy's preference mapping can not be tested, the PolicyTestCase
should just define a single reason_for_missing_test_case with a description on
why this policy should be skipped. Adding such a reason also bypasses the "all
policies need a pref mapping test" requirement. Possible reasons for a missing
tests could be:
external, i.e. the policy will trigger download of a
resource, which will then be set as preference. This is currently not
supported via preference mapping tests. Please mention
crbug.com/1213475 in your reasoning.In most cases each PolicyPrefMappingTest will consist of two fields:
policies: a dictionary with 0...N entries, where the key is a policy name
and the value is the policy value that should be set.prefs: a dictionary with 1...N entries, where the key is a preference name
and the value is a PrefTestCaseAdditionally, each PolicyPrefMappingTest can also have an optional
policies_settings field to customize how or from where the policy applies. The
field's value is a dictionary, where the key is a policy name (should be one of
the policies set in policies) and the value is a dictionary with scope
(possible values are [user, machine], defaults to user) and source
(possible values are [enterprise_default, command_line, cloud,
active_directory, platform, merged, cloud_from_ash], defaults to
cloud).
Each PolicyPrefMappingTest can also have a required_buildflags,
which defines a list of required buildflags for the test to run.
Possible values are [USE_CUPS]. Defaults to an empty list if not specified. If
any of the specified buildflags is not defined in the current build, the test case
is skipped.
Each PrefTestCase can define a location field, where the preference is
registered. The test will fail if the preference is not registered in said
location. Possible values are:
user_profile (default value)local_statesignin_profile (CrOS only, use when a device policy is mapped into the
sign-in screen profile using
login_profile_policy_provider.cc)Policies that map into CrosSettings can not be tested at the moment (see
reason_for_missing_test).
Each preference is also checked for its expected value. The expected value the preference should take on can be defined by exactly one of two ways:
value field. Use this to specify an explicit value the preference should
take on when the policies are set. This also checks that the preference is
managed by policy.default_value field. Use this to specify an explicit value the preference
should take on when either no policies are set or to indicate that the
preference should be unaffected by the policies.For each preference, you can also specify check_for_mandatory and
check_for_recommended (in combination with can_be_recommended from above)
booleans. Both default to true if not specified. This allows to test custom
behavior, e.g. setting a different preference when a policy is set as
recommended compared to set as mandatory. In most cases, you will just need to
use the PolicyTestCase's can_be_recommended though.
For most policies, which have a simple direct mapping from policy value to pref
value, you can use SimplePolicyPrefMappingTest instead of defining multiple
PolicyPrefMappingTests. A SimplePolicyPrefMappingTest would then generate
one PolicyPrefMappingTest for the pref's default value and one
PolicyPrefMappingTest for each value in values_to_test.
[
{
"os": array<string>, // subset of ["win", "linux", "mac", "chromeos", "android", "ios"]
"official_only": boolean, // optional, defaults to false
"can_be_recommended": boolean, // optional, defaults to false
"reason_for_missing_test": string // optional, should be only field then
"policy_pref_mapping_tests": [
{
"policies": {
"${policy_name_1}": ${policy_value_1},
"${policy_name_2}": ${policy_value_2},
"${policy_name_3}": ${policy_value_3},
... // 0...N policies
},
"policies_settings": {
"${policy_name_1}": {
"scope": string, // optional, one of [user, machine], defaults to "user"
"source": string, // optional, one of [enterprise_default, command_line, cloud, active_directory, local_account_override, platform, merged, cloud_from_ash], defaults to "cloud"
},
... // 0...N policies
}, // optional
"required_buildflags": array<string> // optional, subset of ["USE_CUPS"], defaults to empty list
"prefs": {
${pref_name_1}: {
"location": string, // optional, one of [user_profile, local_state, signin_profile], defaults to "user_profile"
"value": ${expected_pref_value_1}, // This or |default_value| must be set
"default_value": ${expected_pref_value_1}, // This or |value| must be set
"check_for_mandatory": boolean, // optional, defaults to true
"check_for_recommended": boolean // optional, defaults to true
},
... // 1...M prefs
}
}
],
"simple_policy_pref_mapping_test": {
"pref_name": string,
"pref_location": string, // optional, one of [user_profile, local_state, signin_profile], defaults to "user_profile"
"policy_settings": { // optional
"scope": string, // optional, one of [user, machine], defaults to "user"
"source": string, // optional, one of [enterprise_default, command_line, cloud, active_directory, local_account_override, platform, merged, cloud_from_ash], defaults to "cloud"
},
"default_value": ${expected_default_value}, // Expected pref value when policy is unset
"values_to_test": [
${value_1},
${value_2},
... // 1...N values
]
}
},
... // test cases for other policies
]