OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/policy/cloud_policy_controller.h" | 5 #include "chrome/browser/policy/cloud_policy_controller.h" |
6 | 6 |
7 #include "base/message_loop.h" | 7 #include "base/message_loop.h" |
8 #include "base/scoped_temp_dir.h" | 8 #include "base/scoped_temp_dir.h" |
| 9 #include "chrome/browser/policy/cloud_policy_provider.h" |
| 10 #include "chrome/browser/policy/configuration_policy_pref_store.h" |
9 #include "chrome/browser/policy/device_management_service.h" | 11 #include "chrome/browser/policy/device_management_service.h" |
10 #include "chrome/browser/policy/device_token_fetcher.h" | 12 #include "chrome/browser/policy/device_token_fetcher.h" |
11 #include "chrome/browser/policy/mock_configuration_policy_store.h" | 13 #include "chrome/browser/policy/mock_configuration_policy_store.h" |
12 #include "chrome/browser/policy/mock_device_management_backend.h" | 14 #include "chrome/browser/policy/mock_device_management_backend.h" |
13 #include "chrome/browser/policy/mock_device_management_service.h" | 15 #include "chrome/browser/policy/mock_device_management_service.h" |
14 #include "chrome/browser/policy/policy_notifier.h" | 16 #include "chrome/browser/policy/policy_notifier.h" |
15 #include "chrome/browser/policy/proto/device_management_backend.pb.h" | 17 #include "chrome/browser/policy/proto/device_management_backend.pb.h" |
16 #include "chrome/browser/policy/user_policy_cache.h" | 18 #include "chrome/browser/policy/user_policy_cache.h" |
17 #include "content/browser/browser_thread.h" | 19 #include "content/browser/browser_thread.h" |
18 #include "policy/policy_constants.h" | 20 #include "policy/policy_constants.h" |
(...skipping 59 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
78 CloudPolicyControllerTest() | 80 CloudPolicyControllerTest() |
79 : ui_thread_(BrowserThread::UI, &loop_), | 81 : ui_thread_(BrowserThread::UI, &loop_), |
80 file_thread_(BrowserThread::FILE, &loop_) {} | 82 file_thread_(BrowserThread::FILE, &loop_) {} |
81 | 83 |
82 virtual ~CloudPolicyControllerTest() {} | 84 virtual ~CloudPolicyControllerTest() {} |
83 | 85 |
84 virtual void SetUp() { | 86 virtual void SetUp() { |
85 ASSERT_TRUE(temp_user_data_dir_.CreateUniqueTempDir()); | 87 ASSERT_TRUE(temp_user_data_dir_.CreateUniqueTempDir()); |
86 cache_.reset(new UserPolicyCache( | 88 cache_.reset(new UserPolicyCache( |
87 temp_user_data_dir_.path().AppendASCII("CloudPolicyControllerTest"))); | 89 temp_user_data_dir_.path().AppendASCII("CloudPolicyControllerTest"))); |
| 90 mandatory_cloud_provider_.reset(new CloudPolicyProvider( |
| 91 policy::ConfigurationPolicyPrefStore::GetChromePolicyDefinitionList(), |
| 92 CloudPolicyCacheBase::POLICY_LEVEL_MANDATORY)); |
| 93 recommended_cloud_provider_.reset(new CloudPolicyProvider( |
| 94 policy::ConfigurationPolicyPrefStore::GetChromePolicyDefinitionList(), |
| 95 CloudPolicyCacheBase::POLICY_LEVEL_RECOMMENDED)); |
| 96 mandatory_cloud_provider_->AppendCache(cache_.get()); |
| 97 recommended_cloud_provider_->AppendCache(cache_.get()); |
88 token_fetcher_.reset(new MockDeviceTokenFetcher(cache_.get())); | 98 token_fetcher_.reset(new MockDeviceTokenFetcher(cache_.get())); |
89 service_.set_backend(&backend_); | 99 service_.set_backend(&backend_); |
90 } | 100 } |
91 | 101 |
92 virtual void TearDown() { | 102 virtual void TearDown() { |
93 controller_.reset(); // Unregisters observers. | 103 controller_.reset(); // Unregisters observers. |
94 } | 104 } |
95 | 105 |
96 // Takes ownership of |backend|. | 106 // Takes ownership of |backend|. |
97 void CreateNewController() { | 107 void CreateNewController() { |
(...skipping 11 matching lines...) Expand all Loading... |
109 ¬ifier_, | 119 ¬ifier_, |
110 policy_refresh_rate_ms, | 120 policy_refresh_rate_ms, |
111 policy_refresh_deviation_factor_percent, | 121 policy_refresh_deviation_factor_percent, |
112 policy_refresh_deviation_max_ms, | 122 policy_refresh_deviation_max_ms, |
113 policy_refresh_error_delay_ms)); | 123 policy_refresh_error_delay_ms)); |
114 } | 124 } |
115 | 125 |
116 void ExpectHasSpdyPolicy() { | 126 void ExpectHasSpdyPolicy() { |
117 MockConfigurationPolicyStore store; | 127 MockConfigurationPolicyStore store; |
118 EXPECT_CALL(store, Apply(_, _)).Times(AtLeast(1)); | 128 EXPECT_CALL(store, Apply(_, _)).Times(AtLeast(1)); |
119 cache_->GetManagedPolicyProvider()->Provide(&store); | 129 mandatory_cloud_provider_.get()->Provide(&store); |
120 FundamentalValue expected(true); | 130 FundamentalValue expected(true); |
121 ASSERT_TRUE(store.Get(kPolicyDisableSpdy) != NULL); | 131 const PolicyMap* policy_map = cache_->policy( |
122 EXPECT_TRUE(store.Get(kPolicyDisableSpdy)->Equals(&expected)); | 132 CloudPolicyCacheBase::POLICY_LEVEL_MANDATORY); |
| 133 ASSERT_TRUE(policy_map->Get(kPolicyDisableSpdy)); |
| 134 EXPECT_TRUE(policy_map->Get(kPolicyDisableSpdy)->Equals(&expected)); |
123 } | 135 } |
124 | 136 |
125 void SetupIdentityStrategy( | 137 void SetupIdentityStrategy( |
126 const std::string& device_token, | 138 const std::string& device_token, |
127 const std::string& device_id, | 139 const std::string& device_id, |
128 const std::string& machine_id, | 140 const std::string& machine_id, |
129 const std::string& machine_model, | 141 const std::string& machine_model, |
130 const std::string& policy_type, | 142 const std::string& policy_type, |
131 const em::DeviceRegisterRequest_Type& policy_register_type, | 143 const em::DeviceRegisterRequest_Type& policy_register_type, |
132 const std::string& user_name, | 144 const std::string& user_name, |
(...skipping 11 matching lines...) Expand all Loading... |
144 EXPECT_CALL(identity_strategy_, GetPolicyRegisterType()).WillRepeatedly( | 156 EXPECT_CALL(identity_strategy_, GetPolicyRegisterType()).WillRepeatedly( |
145 Return(policy_register_type)); | 157 Return(policy_register_type)); |
146 if (!user_name.empty()) { | 158 if (!user_name.empty()) { |
147 EXPECT_CALL(identity_strategy_, GetCredentials(_, _)).WillRepeatedly( | 159 EXPECT_CALL(identity_strategy_, GetCredentials(_, _)).WillRepeatedly( |
148 MockCloudPolicyIdentityStrategyGetCredentials(user_name, auth_token)); | 160 MockCloudPolicyIdentityStrategyGetCredentials(user_name, auth_token)); |
149 } | 161 } |
150 } | 162 } |
151 | 163 |
152 protected: | 164 protected: |
153 scoped_ptr<CloudPolicyCacheBase> cache_; | 165 scoped_ptr<CloudPolicyCacheBase> cache_; |
| 166 scoped_ptr<CloudPolicyProvider> recommended_cloud_provider_; |
| 167 scoped_ptr<CloudPolicyProvider> mandatory_cloud_provider_; |
154 scoped_ptr<CloudPolicyController> controller_; | 168 scoped_ptr<CloudPolicyController> controller_; |
155 scoped_ptr<MockDeviceTokenFetcher> token_fetcher_; | 169 scoped_ptr<MockDeviceTokenFetcher> token_fetcher_; |
156 MockCloudPolicyIdentityStrategy identity_strategy_; | 170 MockCloudPolicyIdentityStrategy identity_strategy_; |
157 MockDeviceManagementBackend backend_; | 171 MockDeviceManagementBackend backend_; |
158 MockDeviceManagementService service_; | 172 MockDeviceManagementService service_; |
159 PolicyNotifier notifier_; | 173 PolicyNotifier notifier_; |
160 ScopedTempDir temp_user_data_dir_; | 174 ScopedTempDir temp_user_data_dir_; |
161 MessageLoop loop_; | 175 MessageLoop loop_; |
162 | 176 |
163 private: | 177 private: |
(...skipping 109 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
273 "who@what.com", "auth"); | 287 "who@what.com", "auth"); |
274 EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( | 288 EXPECT_CALL(backend_, ProcessPolicyRequest(_, _, _, _)).WillOnce( |
275 MockDeviceManagementBackendFailPolicy( | 289 MockDeviceManagementBackendFailPolicy( |
276 DeviceManagementBackend::kErrorServiceManagementNotSupported)); | 290 DeviceManagementBackend::kErrorServiceManagementNotSupported)); |
277 EXPECT_CALL(*token_fetcher_.get(), SetUnmanagedState()).Times(1); | 291 EXPECT_CALL(*token_fetcher_.get(), SetUnmanagedState()).Times(1); |
278 CreateNewController(0, 0, 0, 1000 * 1000); | 292 CreateNewController(0, 0, 0, 1000 * 1000); |
279 loop_.RunAllPending(); | 293 loop_.RunAllPending(); |
280 } | 294 } |
281 | 295 |
282 } // namespace policy | 296 } // namespace policy |
OLD | NEW |