Index: chrome/browser/policy/cros_user_policy_cache_unittest.cc |
diff --git a/chrome/browser/policy/cros_user_policy_cache_unittest.cc b/chrome/browser/policy/cros_user_policy_cache_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..afff4995a28ceaceba7ba1f6f2c0dd24ca50a900 |
--- /dev/null |
+++ b/chrome/browser/policy/cros_user_policy_cache_unittest.cc |
@@ -0,0 +1,190 @@ |
+// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "base/bind.h" |
+#include "base/file_path.h" |
+#include "base/file_util.h" |
+#include "base/memory/scoped_ptr.h" |
+#include "base/message_loop.h" |
+#include "base/scoped_temp_dir.h" |
+#include "base/time.h" |
+#include "chrome/browser/policy/cloud_policy_data_store.h" |
+#include "chrome/browser/policy/cros_user_policy_cache.h" |
+#include "chrome/browser/policy/proto/cloud_policy.pb.h" |
+#include "chrome/browser/policy/proto/device_management_backend.pb.h" |
+#include "chrome/browser/policy/proto/device_management_local.pb.h" |
+#include "chromeos/dbus/mock_session_manager_client.h" |
+#include "content/test/test_browser_thread.h" |
+#include "policy/policy_constants.h" |
+#include "testing/gmock/include/gmock/gmock.h" |
+#include "testing/gtest/include/gtest/gtest.h" |
+ |
+using testing::InvokeArgument; |
+using testing::_; |
+ |
+namespace em = enterprise_management; |
+ |
+// These should probably be moved to a more central place. |
+ACTION_TEMPLATE(InvokeCallbackArgument, |
+ HAS_1_TEMPLATE_PARAMS(int, k), |
+ AND_1_VALUE_PARAMS(p1)) { |
+ MessageLoop::current()->PostTask( |
+ FROM_HERE, |
+ base::Bind(::std::tr1::get<k>(args), p1)); |
+} |
+ACTION_TEMPLATE(InvokeCallbackArgument, |
+ HAS_1_TEMPLATE_PARAMS(int, k), |
+ AND_2_VALUE_PARAMS(p1, p2)) { |
+ MessageLoop::current()->PostTask( |
+ FROM_HERE, |
+ base::Bind(::std::tr1::get<k>(args), p1, p2)); |
+} |
+ |
+namespace policy { |
+namespace { |
+ |
+const char kFakeToken[] = "token"; |
+const char kFakeSignature[] = "signature"; |
+const char kFakeMachineName[] = "machine-name"; |
+const char kFakeUsername[] = "username"; |
+const int kFakePublicKeyVersion = 17; |
+const char kFakeDeviceId[] = "device-id"; |
+ |
+class CrosUserPolicyCacheTest : public testing::Test { |
+ protected: |
+ CrosUserPolicyCacheTest() |
+ : loop_(MessageLoop::TYPE_UI), |
+ data_store_(CloudPolicyDataStore::CreateForUserPolicies()), |
+ ui_thread_(content::BrowserThread::UI, &loop_), |
+ file_thread_(content::BrowserThread::FILE, &loop_) {} |
+ |
+ virtual void SetUp() { |
+ ASSERT_TRUE(tmp_dir_.CreateUniqueTempDir()); |
+ } |
+ |
+ void CreatePolicyResponse(em::PolicyFetchResponse* response) { |
+ em::CloudPolicySettings policy_settings; |
+ policy_settings.mutable_showhomebutton()->set_showhomebutton(true); |
+ |
+ em::PolicyData policy_data; |
+ policy_data.set_policy_type(dm_protocol::kChromeUserPolicyType); |
+ policy_data.set_timestamp((base::Time::NowFromSystemTime() - |
+ base::Time::UnixEpoch()).InMilliseconds()); |
+ policy_data.set_request_token(kFakeToken); |
+ ASSERT_TRUE( |
+ policy_settings.SerializeToString(policy_data.mutable_policy_value())); |
+ policy_data.set_machine_name(kFakeMachineName); |
+ policy_data.set_public_key_version(kFakePublicKeyVersion); |
+ policy_data.set_username(kFakeUsername); |
+ policy_data.set_device_id(kFakeDeviceId); |
+ policy_data.set_state(em::PolicyData::ACTIVE); |
+ |
+ ASSERT_TRUE(policy_data.SerializeToString(response->mutable_policy_data())); |
+ response->set_policy_data_signature(kFakeSignature); |
+ } |
+ |
+ FilePath token_file() { |
+ return tmp_dir_.path().Append(FILE_PATH_LITERAL("token")); |
+ } |
+ |
+ FilePath policy_file() { |
+ return tmp_dir_.path().Append(FILE_PATH_LITERAL("policy")); |
+ } |
+ |
+ MessageLoop loop_; |
+ |
+ chromeos::MockSessionManagerClient session_manager_client_; |
+ scoped_ptr<CloudPolicyDataStore> data_store_; |
+ |
+ private: |
+ content::TestBrowserThread ui_thread_; |
+ content::TestBrowserThread file_thread_; |
+ ScopedTempDir tmp_dir_; |
+ |
+ DISALLOW_COPY_AND_ASSIGN(CrosUserPolicyCacheTest); |
+}; |
+ |
+TEST_F(CrosUserPolicyCacheTest, InitAndSetPolicy) { |
+ CrosUserPolicyCache cache(&session_manager_client_, |
+ data_store_.get(), |
+ false, |
+ token_file(), |
+ policy_file()); |
+ EXPECT_FALSE(cache.IsReady()); |
+ EXPECT_FALSE(data_store_->token_cache_loaded()); |
+ |
+ // Initialize the cache. |
+ EXPECT_CALL(session_manager_client_, RetrieveUserPolicy(_)) |
+ .WillOnce(InvokeCallbackArgument<0>(std::string())); |
+ |
+ cache.Load(); |
+ loop_.RunAllPending(); |
+ |
+ EXPECT_TRUE(cache.IsReady()); |
+ EXPECT_TRUE(data_store_->token_cache_loaded()); |
+ EXPECT_EQ(0U, cache.policy()->size()); |
+ |
+ // Set policy. |
+ em::PolicyFetchResponse response; |
+ CreatePolicyResponse(&response); |
+ std::string serialized_response; |
+ ASSERT_TRUE(response.SerializeToString(&serialized_response)); |
+ testing::Sequence seq; |
+ EXPECT_CALL(session_manager_client_, StoreUserPolicy(serialized_response, _)) |
+ .InSequence(seq) |
+ .WillOnce(InvokeCallbackArgument<1>(true)); |
+ EXPECT_CALL(session_manager_client_, RetrieveUserPolicy(_)) |
+ .InSequence(seq) |
+ .WillOnce(InvokeCallbackArgument<0>(serialized_response)); |
+ |
+ EXPECT_TRUE(cache.SetPolicy(response)); |
+ loop_.RunAllPending(); |
+ |
+ EXPECT_EQ(1U, cache.policy()->size()); |
+ const PolicyMap::Entry* entry = cache.policy()->Get(key::kShowHomeButton); |
+ ASSERT_TRUE(entry); |
+ EXPECT_TRUE(base::FundamentalValue(true).Equals(entry->value)); |
+}; |
+ |
+TEST_F(CrosUserPolicyCacheTest, Migration) { |
+ std::string data; |
+ |
+ em::DeviceCredentials credentials; |
+ credentials.set_device_token(kFakeToken); |
+ credentials.set_device_id(kFakeDeviceId); |
+ ASSERT_TRUE(credentials.SerializeToString(&data)); |
+ ASSERT_NE(-1, file_util::WriteFile(token_file(), data.c_str(), data.size())); |
+ |
+ em::CachedCloudPolicyResponse policy; |
+ CreatePolicyResponse(policy.mutable_cloud_policy()); |
+ ASSERT_TRUE(policy.SerializeToString(&data)); |
+ ASSERT_NE(-1, file_util::WriteFile(policy_file(), data.c_str(), data.size())); |
+ |
+ CrosUserPolicyCache cache(&session_manager_client_, |
+ data_store_.get(), |
+ false, |
+ token_file(), |
+ policy_file()); |
+ EXPECT_FALSE(cache.IsReady()); |
+ EXPECT_FALSE(data_store_->token_cache_loaded()); |
+ |
+ // Initialize the cache. |
+ EXPECT_CALL(session_manager_client_, RetrieveUserPolicy(_)) |
+ .WillOnce(InvokeCallbackArgument<0>(std::string())); |
+ |
+ cache.Load(); |
+ loop_.RunAllPending(); |
+ |
+ EXPECT_TRUE(cache.IsReady()); |
+ EXPECT_TRUE(data_store_->token_cache_loaded()); |
+ EXPECT_EQ(kFakeDeviceId, data_store_->device_id()); |
+ EXPECT_EQ(kFakeToken, data_store_->device_token()); |
+ EXPECT_EQ(1U, cache.policy()->size()); |
+ const PolicyMap::Entry* entry = cache.policy()->Get(key::kShowHomeButton); |
+ ASSERT_TRUE(entry); |
+ EXPECT_TRUE(base::FundamentalValue(true).Equals(entry->value)); |
+}; |
+ |
+} // namespace |
+} // namespace policy |