OLD | NEW |
---|---|
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/policy/cloud_policy_controller.h" | 5 #include "chrome/browser/policy/cloud_policy_controller.h" |
6 | 6 |
7 #include "base/message_loop.h" | 7 #include "base/message_loop.h" |
8 #include "base/scoped_temp_dir.h" | 8 #include "base/scoped_temp_dir.h" |
9 #include "chrome/browser/policy/cloud_policy_provider.h" | |
10 #include "chrome/browser/policy/configuration_policy_pref_store.h" | |
9 #include "chrome/browser/policy/device_management_service.h" | 11 #include "chrome/browser/policy/device_management_service.h" |
10 #include "chrome/browser/policy/device_token_fetcher.h" | 12 #include "chrome/browser/policy/device_token_fetcher.h" |
11 #include "chrome/browser/policy/mock_configuration_policy_store.h" | 13 #include "chrome/browser/policy/mock_configuration_policy_store.h" |
12 #include "chrome/browser/policy/mock_device_management_backend.h" | 14 #include "chrome/browser/policy/mock_device_management_backend.h" |
13 #include "chrome/browser/policy/mock_device_management_service.h" | 15 #include "chrome/browser/policy/mock_device_management_service.h" |
14 #include "chrome/browser/policy/policy_notifier.h" | 16 #include "chrome/browser/policy/policy_notifier.h" |
15 #include "chrome/browser/policy/proto/device_management_backend.pb.h" | 17 #include "chrome/browser/policy/proto/device_management_backend.pb.h" |
16 #include "chrome/browser/policy/user_policy_cache.h" | 18 #include "chrome/browser/policy/user_policy_cache.h" |
17 #include "content/browser/browser_thread.h" | 19 #include "content/browser/browser_thread.h" |
18 #include "policy/policy_constants.h" | 20 #include "policy/policy_constants.h" |
(...skipping 59 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
78 CloudPolicyControllerTest() | 80 CloudPolicyControllerTest() |
79 : ui_thread_(BrowserThread::UI, &loop_), | 81 : ui_thread_(BrowserThread::UI, &loop_), |
80 file_thread_(BrowserThread::FILE, &loop_) {} | 82 file_thread_(BrowserThread::FILE, &loop_) {} |
81 | 83 |
82 virtual ~CloudPolicyControllerTest() {} | 84 virtual ~CloudPolicyControllerTest() {} |
83 | 85 |
84 virtual void SetUp() { | 86 virtual void SetUp() { |
85 ASSERT_TRUE(temp_user_data_dir_.CreateUniqueTempDir()); | 87 ASSERT_TRUE(temp_user_data_dir_.CreateUniqueTempDir()); |
86 cache_.reset(new UserPolicyCache( | 88 cache_.reset(new UserPolicyCache( |
87 temp_user_data_dir_.path().AppendASCII("CloudPolicyControllerTest"))); | 89 temp_user_data_dir_.path().AppendASCII("CloudPolicyControllerTest"))); |
90 mandatory_cloud_provider_.reset(new CloudPolicyProvider( | |
91 policy::ConfigurationPolicyPrefStore::GetChromePolicyDefinitionList(), | |
92 CloudPolicyCacheBase::POLICY_LEVEL_MANDATORY)); | |
93 recommended_cloud_provider_.reset(new CloudPolicyProvider( | |
94 policy::ConfigurationPolicyPrefStore::GetChromePolicyDefinitionList(), | |
95 CloudPolicyCacheBase::POLICY_LEVEL_RECOMMENDED)); | |
96 mandatory_cloud_provider_->AppendCache(cache_.get()); | |
97 recommended_cloud_provider_->AppendCache(cache_.get()); | |
88 token_fetcher_.reset(new MockDeviceTokenFetcher(cache_.get())); | 98 token_fetcher_.reset(new MockDeviceTokenFetcher(cache_.get())); |
89 service_.set_backend(&backend_); | 99 service_.set_backend(&backend_); |
90 } | 100 } |
91 | 101 |
92 virtual void TearDown() { | 102 virtual void TearDown() { |
93 controller_.reset(); // Unregisters observers. | 103 controller_.reset(); // Unregisters observers. |
94 } | 104 } |
95 | 105 |
96 // Takes ownership of |backend|. | 106 // Takes ownership of |backend|. |
97 void CreateNewController() { | 107 void CreateNewController() { |
(...skipping 11 matching lines...) Expand all Loading... | |
109 ¬ifier_, | 119 ¬ifier_, |
110 policy_refresh_rate_ms, | 120 policy_refresh_rate_ms, |
111 policy_refresh_deviation_factor_percent, | 121 policy_refresh_deviation_factor_percent, |
112 policy_refresh_deviation_max_ms, | 122 policy_refresh_deviation_max_ms, |
113 policy_refresh_error_delay_ms)); | 123 policy_refresh_error_delay_ms)); |
114 } | 124 } |
115 | 125 |
116 void ExpectHasSpdyPolicy() { | 126 void ExpectHasSpdyPolicy() { |
117 MockConfigurationPolicyStore store; | 127 MockConfigurationPolicyStore store; |
118 EXPECT_CALL(store, Apply(_, _)).Times(AtLeast(1)); | 128 EXPECT_CALL(store, Apply(_, _)).Times(AtLeast(1)); |
119 cache_->GetManagedPolicyProvider()->Provide(&store); | 129 mandatory_cloud_provider_.get()->Provide(&store); |
Mattias Nissler (ping if slow)
2011/06/09 14:36:26
Why can't we just check the policy map directly no
sfeuz
2011/06/13 06:53:53
Done.
| |
120 FundamentalValue expected(true); | 130 FundamentalValue expected(true); |
121 ASSERT_TRUE(store.Get(kPolicyDisableSpdy) != NULL); | 131 ASSERT_TRUE(store.Get(kPolicyDisableSpdy) != NULL); |
122 EXPECT_TRUE(store.Get(kPolicyDisableSpdy)->Equals(&expected)); | 132 EXPECT_TRUE(store.Get(kPolicyDisableSpdy)->Equals(&expected)); |
123 } | 133 } |
124 | 134 |
125 void SetupIdentityStrategy( | 135 void SetupIdentityStrategy( |
126 const std::string& device_token, | 136 const std::string& device_token, |
127 const std::string& device_id, | 137 const std::string& device_id, |
128 const std::string& machine_id, | 138 const std::string& machine_id, |
129 const std::string& machine_model, | 139 const std::string& machine_model, |
(...skipping 14 matching lines...) Expand all Loading... | |
144 EXPECT_CALL(identity_strategy_, GetPolicyRegisterType()).WillRepeatedly( | 154 EXPECT_CALL(identity_strategy_, GetPolicyRegisterType()).WillRepeatedly( |
145 Return(policy_register_type)); | 155 Return(policy_register_type)); |
146 if (!user_name.empty()) { | 156 if (!user_name.empty()) { |
147 EXPECT_CALL(identity_strategy_, GetCredentials(_, _)).WillRepeatedly( | 157 EXPECT_CALL(identity_strategy_, GetCredentials(_, _)).WillRepeatedly( |
148 MockCloudPolicyIdentityStrategyGetCredentials(user_name, auth_token)); | 158 MockCloudPolicyIdentityStrategyGetCredentials(user_name, auth_token)); |
149 } | 159 } |
150 } | 160 } |
151 | 161 |
152 protected: | 162 protected: |
153 scoped_ptr<CloudPolicyCacheBase> cache_; | 163 scoped_ptr<CloudPolicyCacheBase> cache_; |
164 scoped_ptr<CloudPolicyProvider> recommended_cloud_provider_; | |
165 scoped_ptr<CloudPolicyProvider> mandatory_cloud_provider_; | |
154 scoped_ptr<CloudPolicyController> controller_; | 166 scoped_ptr<CloudPolicyController> controller_; |
155 scoped_ptr<MockDeviceTokenFetcher> token_fetcher_; | 167 scoped_ptr<MockDeviceTokenFetcher> token_fetcher_; |
156 MockCloudPolicyIdentityStrategy identity_strategy_; | 168 MockCloudPolicyIdentityStrategy identity_strategy_; |
157 MockDeviceManagementBackend backend_; | 169 MockDeviceManagementBackend backend_; |
158 MockDeviceManagementService service_; | 170 MockDeviceManagementService service_; |
159 PolicyNotifier notifier_; | 171 PolicyNotifier notifier_; |
160 ScopedTempDir temp_user_data_dir_; | 172 ScopedTempDir temp_user_data_dir_; |
161 MessageLoop loop_; | 173 MessageLoop loop_; |
162 | 174 |
163 private: | 175 private: |
(...skipping 109 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
273 "who@what.com", "auth"); | 285 "who@what.com", "auth"); |
274 EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( | 286 EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( |
275 MockDeviceManagementBackendFailPolicy( | 287 MockDeviceManagementBackendFailPolicy( |
276 DeviceManagementBackend::kErrorServiceManagementNotSupported)); | 288 DeviceManagementBackend::kErrorServiceManagementNotSupported)); |
277 EXPECT_CALL(*token_fetcher_.get(), SetUnmanagedState()).Times(1); | 289 EXPECT_CALL(*token_fetcher_.get(), SetUnmanagedState()).Times(1); |
278 CreateNewController(0, 0, 0, 1000 * 1000); | 290 CreateNewController(0, 0, 0, 1000 * 1000); |
279 loop_.RunAllPending(); | 291 loop_.RunAllPending(); |
280 } | 292 } |
281 | 293 |
282 } // namespace policy | 294 } // namespace policy |
OLD | NEW |