OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/login/auth/chrome_cryptohome_authenticator.h" | 5 #include "chrome/browser/chromeos/login/auth/chrome_cryptohome_authenticator.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 #include <vector> | 8 #include <vector> |
9 | 9 |
10 #include "base/basictypes.h" | 10 #include "base/basictypes.h" |
11 #include "base/command_line.h" | 11 #include "base/command_line.h" |
12 #include "base/files/file_path.h" | 12 #include "base/files/file_path.h" |
13 #include "base/files/file_util.h" | 13 #include "base/files/file_util.h" |
14 #include "base/memory/scoped_ptr.h" | 14 #include "base/memory/scoped_ptr.h" |
15 #include "base/message_loop/message_loop.h" | 15 #include "base/message_loop/message_loop.h" |
16 #include "base/run_loop.h" | 16 #include "base/run_loop.h" |
17 #include "base/strings/string_util.h" | 17 #include "base/strings/string_util.h" |
18 #include "base/strings/stringprintf.h" | 18 #include "base/strings/stringprintf.h" |
19 #include "chrome/browser/chromeos/login/users/scoped_user_manager_enabler.h" | 19 #include "chrome/browser/chromeos/login/users/scoped_user_manager_enabler.h" |
20 #include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos.h" | 20 #include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos.h" |
21 #include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos_fact
ory.h" | 21 #include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos_fact
ory.h" |
22 #include "chrome/browser/chromeos/profiles/profile_helper.h" | 22 #include "chrome/browser/chromeos/profiles/profile_helper.h" |
23 #include "chrome/browser/chromeos/settings/cros_settings.h" | 23 #include "chrome/browser/chromeos/settings/cros_settings.h" |
24 #include "chrome/browser/chromeos/settings/device_settings_test_helper.h" | 24 #include "chrome/browser/chromeos/settings/device_settings_test_helper.h" |
25 #include "chrome/browser/chromeos/settings/stub_cros_settings_provider.h" | 25 #include "chrome/browser/chromeos/settings/scoped_cros_settings_test_helper.h" |
26 #include "chrome/test/base/testing_browser_process.h" | 26 #include "chrome/test/base/testing_browser_process.h" |
27 #include "chrome/test/base/testing_profile.h" | 27 #include "chrome/test/base/testing_profile.h" |
28 #include "chrome/test/base/testing_profile_manager.h" | 28 #include "chrome/test/base/testing_profile_manager.h" |
29 #include "chromeos/chromeos_switches.h" | 29 #include "chromeos/chromeos_switches.h" |
30 #include "chromeos/cryptohome/cryptohome_parameters.h" | 30 #include "chromeos/cryptohome/cryptohome_parameters.h" |
31 #include "chromeos/cryptohome/homedir_methods.h" | 31 #include "chromeos/cryptohome/homedir_methods.h" |
32 #include "chromeos/cryptohome/mock_async_method_caller.h" | 32 #include "chromeos/cryptohome/mock_async_method_caller.h" |
33 #include "chromeos/cryptohome/mock_homedir_methods.h" | 33 #include "chromeos/cryptohome/mock_homedir_methods.h" |
34 #include "chromeos/cryptohome/system_salt_getter.h" | 34 #include "chromeos/cryptohome/system_salt_getter.h" |
35 #include "chromeos/dbus/cros_disks_client.h" | 35 #include "chromeos/dbus/cros_disks_client.h" |
(...skipping 391 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
427 ASSERT_TRUE(profile_manager_->SetUp()); | 427 ASSERT_TRUE(profile_manager_->SetUp()); |
428 | 428 |
429 FailOnLoginSuccess(); // Set failing on success as the default... | 429 FailOnLoginSuccess(); // Set failing on success as the default... |
430 AuthFailure failure = AuthFailure(AuthFailure::OWNER_REQUIRED); | 430 AuthFailure failure = AuthFailure(AuthFailure::OWNER_REQUIRED); |
431 ExpectLoginFailure(failure); | 431 ExpectLoginFailure(failure); |
432 | 432 |
433 // Set up state as though a cryptohome mount attempt has occurred | 433 // Set up state as though a cryptohome mount attempt has occurred |
434 // and succeeded but we are in safe mode and the current user is not owner. | 434 // and succeeded but we are in safe mode and the current user is not owner. |
435 state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE); | 435 state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE); |
436 SetOwnerState(false, false); | 436 SetOwnerState(false, false); |
437 // Remove the real DeviceSettingsProvider and replace it with a stub. | 437 ScopedCrosSettingsTestHelper settings_helper(false); |
438 CrosSettingsProvider* device_settings_provider = | 438 settings_helper.ReplaceProvider(kPolicyMissingMitigationMode); |
439 CrosSettings::Get()->GetProvider(chromeos::kReportDeviceVersionInfo); | 439 settings_helper.SetBoolean(kPolicyMissingMitigationMode, true); |
440 EXPECT_TRUE(device_settings_provider != NULL); | |
441 EXPECT_TRUE( | |
442 CrosSettings::Get()->RemoveSettingsProvider(device_settings_provider)); | |
443 StubCrosSettingsProvider stub_settings_provider; | |
444 CrosSettings::Get()->AddSettingsProvider(&stub_settings_provider); | |
445 CrosSettings::Get()->SetBoolean(kPolicyMissingMitigationMode, true); | |
446 | 440 |
447 // Initialize login state for this test to verify the login state is changed | 441 // Initialize login state for this test to verify the login state is changed |
448 // to SAFE_MODE. | 442 // to SAFE_MODE. |
449 LoginState::Initialize(); | 443 LoginState::Initialize(); |
450 | 444 |
451 EXPECT_EQ(CryptohomeAuthenticator::CONTINUE, | 445 EXPECT_EQ(CryptohomeAuthenticator::CONTINUE, |
452 SetAndResolveState(auth_.get(), state_.release())); | 446 SetAndResolveState(auth_.get(), state_.release())); |
453 EXPECT_TRUE(LoginState::Get()->IsInSafeMode()); | 447 EXPECT_TRUE(LoginState::Get()->IsInSafeMode()); |
454 | 448 |
455 // Flush all the pending operations. The operations should induce an owner | 449 // Flush all the pending operations. The operations should induce an owner |
456 // verification. | 450 // verification. |
457 device_settings_test_helper_.Flush(); | 451 device_settings_test_helper_.Flush(); |
458 | 452 |
459 state_.reset(new TestAttemptState(user_context_, false)); | 453 state_.reset(new TestAttemptState(user_context_, false)); |
460 state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE); | 454 state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE); |
461 | 455 |
462 // The owner key util should not have found the owner key, so login should | 456 // The owner key util should not have found the owner key, so login should |
463 // not be allowed. | 457 // not be allowed. |
464 EXPECT_EQ(CryptohomeAuthenticator::OWNER_REQUIRED, | 458 EXPECT_EQ(CryptohomeAuthenticator::OWNER_REQUIRED, |
465 SetAndResolveState(auth_.get(), state_.release())); | 459 SetAndResolveState(auth_.get(), state_.release())); |
466 EXPECT_TRUE(LoginState::Get()->IsInSafeMode()); | 460 EXPECT_TRUE(LoginState::Get()->IsInSafeMode()); |
467 | 461 |
468 // Unset global objects used by this test. | 462 // Unset global objects used by this test. |
469 fake_cryptohome_client_->set_unmount_result(true); | 463 fake_cryptohome_client_->set_unmount_result(true); |
470 LoginState::Shutdown(); | 464 LoginState::Shutdown(); |
471 EXPECT_TRUE( | |
472 CrosSettings::Get()->RemoveSettingsProvider(&stub_settings_provider)); | |
473 CrosSettings::Get()->AddSettingsProvider(device_settings_provider); | |
474 } | 465 } |
475 | 466 |
476 // Test the case that login switches to SafeMode and the Owner logs in, which | 467 // Test the case that login switches to SafeMode and the Owner logs in, which |
477 // should lead to a successful login. | 468 // should lead to a successful login. |
478 TEST_F(CryptohomeAuthenticatorTest, ResolveOwnerNeededSuccess) { | 469 TEST_F(CryptohomeAuthenticatorTest, ResolveOwnerNeededSuccess) { |
479 crypto::ScopedTestNSSChromeOSUser test_user_db(user_context_.GetUserIDHash()); | 470 crypto::ScopedTestNSSChromeOSUser test_user_db(user_context_.GetUserIDHash()); |
480 owner_key_util_->SetPublicKey(GetOwnerPublicKey()); | 471 owner_key_util_->SetPublicKey(GetOwnerPublicKey()); |
481 | 472 |
482 crypto::ScopedPK11Slot user_slot( | 473 crypto::ScopedPK11Slot user_slot( |
483 crypto::GetPublicSlotForChromeOSUser(user_context_.GetUserIDHash())); | 474 crypto::GetPublicSlotForChromeOSUser(user_context_.GetUserIDHash())); |
484 CreateOwnerKeyInSlot(user_slot.get()); | 475 CreateOwnerKeyInSlot(user_slot.get()); |
485 | 476 |
486 profile_manager_.reset( | 477 profile_manager_.reset( |
487 new TestingProfileManager(TestingBrowserProcess::GetGlobal())); | 478 new TestingProfileManager(TestingBrowserProcess::GetGlobal())); |
488 ASSERT_TRUE(profile_manager_->SetUp()); | 479 ASSERT_TRUE(profile_manager_->SetUp()); |
489 | 480 |
490 ExpectLoginSuccess(user_context_); | 481 ExpectLoginSuccess(user_context_); |
491 | 482 |
492 // Set up state as though a cryptohome mount attempt has occurred | 483 // Set up state as though a cryptohome mount attempt has occurred |
493 // and succeeded but we are in safe mode and the current user is not owner. | 484 // and succeeded but we are in safe mode and the current user is not owner. |
494 state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE); | 485 state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE); |
495 SetOwnerState(false, false); | 486 SetOwnerState(false, false); |
496 // Remove the real DeviceSettingsProvider and replace it with a stub. | 487 ScopedCrosSettingsTestHelper settings_helper(false); |
497 CrosSettingsProvider* device_settings_provider = | 488 settings_helper.ReplaceProvider(kPolicyMissingMitigationMode); |
498 CrosSettings::Get()->GetProvider(chromeos::kReportDeviceVersionInfo); | 489 settings_helper.SetBoolean(kPolicyMissingMitigationMode, true); |
499 EXPECT_TRUE(device_settings_provider != NULL); | |
500 EXPECT_TRUE( | |
501 CrosSettings::Get()->RemoveSettingsProvider(device_settings_provider)); | |
502 StubCrosSettingsProvider stub_settings_provider; | |
503 CrosSettings::Get()->AddSettingsProvider(&stub_settings_provider); | |
504 CrosSettings::Get()->SetBoolean(kPolicyMissingMitigationMode, true); | |
505 | 490 |
506 // Initialize login state for this test to verify the login state is changed | 491 // Initialize login state for this test to verify the login state is changed |
507 // to SAFE_MODE. | 492 // to SAFE_MODE. |
508 LoginState::Initialize(); | 493 LoginState::Initialize(); |
509 | 494 |
510 EXPECT_EQ(CryptohomeAuthenticator::CONTINUE, | 495 EXPECT_EQ(CryptohomeAuthenticator::CONTINUE, |
511 SetAndResolveState(auth_.get(), state_.release())); | 496 SetAndResolveState(auth_.get(), state_.release())); |
512 EXPECT_TRUE(LoginState::Get()->IsInSafeMode()); | 497 EXPECT_TRUE(LoginState::Get()->IsInSafeMode()); |
513 | 498 |
514 // Flush all the pending operations. The operations should induce an owner | 499 // Flush all the pending operations. The operations should induce an owner |
515 // verification. | 500 // verification. |
516 device_settings_test_helper_.Flush(); | 501 device_settings_test_helper_.Flush(); |
517 | 502 |
518 state_.reset(new TestAttemptState(user_context_, false)); | 503 state_.reset(new TestAttemptState(user_context_, false)); |
519 state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE); | 504 state_->PresetCryptohomeStatus(true, cryptohome::MOUNT_ERROR_NONE); |
520 | 505 |
521 // The owner key util should find the owner key, so login should succeed. | 506 // The owner key util should find the owner key, so login should succeed. |
522 EXPECT_EQ(CryptohomeAuthenticator::OFFLINE_LOGIN, | 507 EXPECT_EQ(CryptohomeAuthenticator::OFFLINE_LOGIN, |
523 SetAndResolveState(auth_.get(), state_.release())); | 508 SetAndResolveState(auth_.get(), state_.release())); |
524 EXPECT_TRUE(LoginState::Get()->IsInSafeMode()); | 509 EXPECT_TRUE(LoginState::Get()->IsInSafeMode()); |
525 | 510 |
526 // Unset global objects used by this test. | 511 // Unset global objects used by this test. |
527 fake_cryptohome_client_->set_unmount_result(true); | 512 fake_cryptohome_client_->set_unmount_result(true); |
528 LoginState::Shutdown(); | 513 LoginState::Shutdown(); |
529 EXPECT_TRUE( | |
530 CrosSettings::Get()->RemoveSettingsProvider(&stub_settings_provider)); | |
531 CrosSettings::Get()->AddSettingsProvider(device_settings_provider); | |
532 } | 514 } |
533 | 515 |
534 TEST_F(CryptohomeAuthenticatorTest, DriveFailedMount) { | 516 TEST_F(CryptohomeAuthenticatorTest, DriveFailedMount) { |
535 FailOnLoginSuccess(); | 517 FailOnLoginSuccess(); |
536 ExpectLoginFailure(AuthFailure(AuthFailure::COULD_NOT_MOUNT_CRYPTOHOME)); | 518 ExpectLoginFailure(AuthFailure(AuthFailure::COULD_NOT_MOUNT_CRYPTOHOME)); |
537 | 519 |
538 // Set up state as though a cryptohome mount attempt has occurred | 520 // Set up state as though a cryptohome mount attempt has occurred |
539 // and failed. | 521 // and failed. |
540 state_->PresetCryptohomeStatus(false, cryptohome::MOUNT_ERROR_NONE); | 522 state_->PresetCryptohomeStatus(false, cryptohome::MOUNT_ERROR_NONE); |
541 SetAttemptState(auth_.get(), state_.release()); | 523 SetAttemptState(auth_.get(), state_.release()); |
(...skipping 248 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
790 // salt. | 772 // salt. |
791 ExpectGetKeyDataExCall( | 773 ExpectGetKeyDataExCall( |
792 make_scoped_ptr(new int64(Key::KEY_TYPE_SALTED_SHA256)), | 774 make_scoped_ptr(new int64(Key::KEY_TYPE_SALTED_SHA256)), |
793 scoped_ptr<std::string>()); | 775 scoped_ptr<std::string>()); |
794 | 776 |
795 auth_->AuthenticateToLogin(NULL, user_context_); | 777 auth_->AuthenticateToLogin(NULL, user_context_); |
796 base::RunLoop().Run(); | 778 base::RunLoop().Run(); |
797 } | 779 } |
798 | 780 |
799 } // namespace chromeos | 781 } // namespace chromeos |
OLD | NEW |