Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/file_util.h" | |
| 5 #include "base/message_loop.h" | 6 #include "base/message_loop.h" |
| 6 #include "base/scoped_temp_dir.h" | 7 #include "base/scoped_temp_dir.h" |
| 7 #include "chrome/browser/browser_thread.h" | 8 #include "chrome/browser/browser_thread.h" |
| 8 #include "chrome/browser/net/gaia/token_service.h" | 9 #include "chrome/browser/net/gaia/token_service.h" |
| 9 #include "chrome/browser/policy/configuration_policy_pref_store.h" | 10 #include "chrome/browser/policy/configuration_policy_pref_store.h" |
| 10 #include "chrome/browser/policy/device_management_policy_provider.h" | 11 #include "chrome/browser/policy/device_management_policy_provider.h" |
| 11 #include "chrome/browser/policy/mock_configuration_policy_store.h" | 12 #include "chrome/browser/policy/mock_configuration_policy_store.h" |
| 12 #include "chrome/browser/policy/mock_device_management_backend.h" | 13 #include "chrome/browser/policy/mock_device_management_backend.h" |
| 13 #include "chrome/common/net/gaia/gaia_constants.h" | 14 #include "chrome/common/net/gaia/gaia_constants.h" |
| 14 #include "chrome/common/notification_service.h" | 15 #include "chrome/common/notification_service.h" |
| (...skipping 11 matching lines...) Expand all Loading... | |
| 26 using ::testing::InSequence; | 27 using ::testing::InSequence; |
| 27 using ::testing::Mock; | 28 using ::testing::Mock; |
| 28 | 29 |
| 29 class DeviceManagementPolicyProviderTest : public testing::Test { | 30 class DeviceManagementPolicyProviderTest : public testing::Test { |
| 30 public: | 31 public: |
| 31 DeviceManagementPolicyProviderTest() | 32 DeviceManagementPolicyProviderTest() |
| 32 : ui_thread_(BrowserThread::UI, &loop_), | 33 : ui_thread_(BrowserThread::UI, &loop_), |
| 33 file_thread_(BrowserThread::FILE, &loop_) {} | 34 file_thread_(BrowserThread::FILE, &loop_) {} |
| 34 | 35 |
| 35 virtual ~DeviceManagementPolicyProviderTest() {} | 36 virtual ~DeviceManagementPolicyProviderTest() {} |
| 36 | |
| 37 virtual void SetUp() { | 37 virtual void SetUp() { |
| 38 profile_.reset(new TestingProfile); | 38 profile_.reset(new TestingProfile); |
| 39 CreateNewBackend(); | 39 CreateNewBackend(); |
| 40 CreateNewProvider(); | 40 CreateNewProvider(); |
| 41 } | 41 } |
| 42 | 42 |
| 43 void CreateNewBackend() { | 43 void CreateNewBackend() { |
| 44 backend_ = new MockDeviceManagementBackend; | 44 backend_ = new MockDeviceManagementBackend; |
| 45 } | 45 } |
| 46 | 46 |
| 47 void CreateNewProvider() { | 47 void CreateNewProvider() { |
| 48 provider_.reset(new DeviceManagementPolicyProvider( | 48 provider_.reset(new DeviceManagementPolicyProvider( |
| 49 ConfigurationPolicyPrefStore::GetChromePolicyDefinitionList(), | 49 ConfigurationPolicyPrefStore::GetChromePolicyDefinitionList(), |
| 50 backend_, | 50 backend_, |
| 51 profile_.get())); | 51 profile_.get())); |
| 52 provider_->SetDeviceTokenFetcher( | 52 provider_->SetDeviceTokenFetcher( |
| 53 new TestingDeviceTokenFetcher(backend_, | 53 new TestingDeviceTokenFetcher(backend_, |
| 54 profile_.get(), | 54 profile_.get(), |
| 55 provider_->GetTokenPath())); | 55 provider_->GetTokenPath())); |
| 56 loop_.RunAllPending(); | 56 loop_.RunAllPending(); |
| 57 } | 57 } |
| 58 | 58 |
| 59 FilePath GetTokenPath() const { | |
|
markusheintz_
2010/11/29 09:01:43
Why was this introduced? It looks like it is only
| |
| 60 return provider_->GetTokenPath(); | |
| 61 } | |
| 62 | |
| 59 void SimulateSuccessfulLoginAndRunPending() { | 63 void SimulateSuccessfulLoginAndRunPending() { |
| 60 loop_.RunAllPending(); | 64 loop_.RunAllPending(); |
| 61 profile_->GetTokenService()->IssueAuthTokenForTest( | 65 profile_->GetTokenService()->IssueAuthTokenForTest( |
| 62 GaiaConstants::kDeviceManagementService, kTestToken); | 66 GaiaConstants::kDeviceManagementService, kTestToken); |
| 63 TestingDeviceTokenFetcher* fetcher = | 67 TestingDeviceTokenFetcher* fetcher = |
| 64 static_cast<TestingDeviceTokenFetcher*>( | 68 static_cast<TestingDeviceTokenFetcher*>( |
| 65 provider_->token_fetcher_.get()); | 69 provider_->token_fetcher_.get()); |
| 66 fetcher->SimulateLogin(kTestManagedDomainUsername); | 70 fetcher->SimulateLogin(kTestManagedDomainUsername); |
| 67 loop_.RunAllPending(); | 71 loop_.RunAllPending(); |
| 68 } | 72 } |
| (...skipping 173 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 242 EXPECT_CALL(*backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( | 246 EXPECT_CALL(*backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( |
| 243 MockDeviceManagementBackendFailPolicy( | 247 MockDeviceManagementBackendFailPolicy( |
| 244 DeviceManagementBackend::kErrorServiceManagementTokenInvalid)); | 248 DeviceManagementBackend::kErrorServiceManagementTokenInvalid)); |
| 245 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).WillOnce( | 249 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).WillOnce( |
| 246 MockDeviceManagementBackendSucceedRegister()); | 250 MockDeviceManagementBackendSucceedRegister()); |
| 247 EXPECT_CALL(*backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( | 251 EXPECT_CALL(*backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( |
| 248 MockDeviceManagementBackendSucceedBooleanPolicy(key::kDisableSpdy, true)); | 252 MockDeviceManagementBackendSucceedBooleanPolicy(key::kDisableSpdy, true)); |
| 249 SimulateSuccessfulLoginAndRunPending(); | 253 SimulateSuccessfulLoginAndRunPending(); |
| 250 } | 254 } |
| 251 | 255 |
| 256 // If the client is successfully managed, but the admin stops managing the | |
| 257 // device, the client should notice and throw away the device token and id. | |
| 258 TEST_F(DeviceManagementPolicyProviderTest, DeviceNoLongerManaged) { | |
| 259 InSequence s; | |
| 260 SetRefreshDelays(provider_.get(), 0, 0, 1000 * 1000, 1000); | |
| 261 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).WillOnce( | |
| 262 MockDeviceManagementBackendSucceedRegister()); | |
| 263 EXPECT_CALL(*backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( | |
| 264 MockDeviceManagementBackendSucceedBooleanPolicy(key::kDisableSpdy, true)); | |
| 265 EXPECT_CALL(*backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( | |
| 266 MockDeviceManagementBackendSucceedBooleanPolicy(key::kDisableSpdy, true)); | |
| 267 EXPECT_CALL(*backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( | |
| 268 MockDeviceManagementBackendFailPolicy( | |
| 269 DeviceManagementBackend::kErrorServiceManagementNotSupported)); | |
| 270 EXPECT_CALL(*backend_, ProcessRegisterRequest(_, _, _, _)).WillOnce( | |
| 271 MockDeviceManagementBackendFailRegister( | |
| 272 DeviceManagementBackend::kErrorServiceManagementNotSupported)); | |
| 273 SimulateSuccessfulLoginAndRunPending(); | |
| 274 FilePath token_path(GetTokenPath()); | |
| 275 EXPECT_FALSE(file_util::PathExists(token_path)); | |
| 276 } | |
| 277 | |
| 252 } // namespace policy | 278 } // namespace policy |
| OLD | NEW |