OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <string> | 5 #include <string> |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/message_loop/message_loop.h" | 8 #include "base/message_loop/message_loop.h" |
9 #include "base/prefs/pref_registry_simple.h" | |
10 #include "base/prefs/testing_pref_service.h" | |
11 #include "base/run_loop.h" | 9 #include "base/run_loop.h" |
12 #include "chrome/browser/chromeos/attestation/attestation_signed_data.pb.h" | 10 #include "chrome/browser/chromeos/attestation/attestation_signed_data.pb.h" |
13 #include "chrome/browser/chromeos/attestation/fake_certificate.h" | 11 #include "chrome/browser/chromeos/attestation/fake_certificate.h" |
14 #include "chrome/browser/chromeos/attestation/platform_verification_flow.h" | 12 #include "chrome/browser/chromeos/attestation/platform_verification_flow.h" |
15 #include "chrome/browser/chromeos/login/mock_user_manager.h" | 13 #include "chrome/browser/chromeos/login/mock_user_manager.h" |
16 #include "chrome/browser/chromeos/settings/cros_settings.h" | 14 #include "chrome/browser/chromeos/settings/cros_settings.h" |
17 #include "chrome/browser/chromeos/settings/device_settings_service.h" | 15 #include "chrome/browser/chromeos/settings/device_settings_service.h" |
18 #include "chrome/browser/chromeos/settings/stub_cros_settings_provider.h" | 16 #include "chrome/browser/chromeos/settings/stub_cros_settings_provider.h" |
19 #include "chrome/browser/content_settings/host_content_settings_map.h" | 17 #include "chrome/browser/content_settings/host_content_settings_map.h" |
| 18 #include "chrome/browser/profiles/profile_impl.h" |
| 19 #include "chrome/browser/renderer_host/pepper/device_id_fetcher.h" |
20 #include "chrome/common/content_settings_pattern.h" | 20 #include "chrome/common/content_settings_pattern.h" |
21 #include "chrome/common/pref_names.h" | 21 #include "chrome/common/pref_names.h" |
| 22 #include "chrome/test/base/testing_pref_service_syncable.h" |
22 #include "chromeos/attestation/mock_attestation_flow.h" | 23 #include "chromeos/attestation/mock_attestation_flow.h" |
23 #include "chromeos/cryptohome/mock_async_method_caller.h" | 24 #include "chromeos/cryptohome/mock_async_method_caller.h" |
24 #include "chromeos/dbus/fake_cryptohome_client.h" | 25 #include "chromeos/dbus/fake_cryptohome_client.h" |
25 #include "chromeos/settings/cros_settings_names.h" | 26 #include "chromeos/settings/cros_settings_names.h" |
26 #include "content/public/test/test_browser_thread.h" | 27 #include "content/public/test/test_browser_thread.h" |
27 #include "testing/gtest/include/gtest/gtest.h" | 28 #include "testing/gtest/include/gtest/gtest.h" |
28 | 29 |
29 using testing::_; | 30 using testing::_; |
30 using testing::DoAll; | 31 using testing::DoAll; |
31 using testing::Invoke; | 32 using testing::Invoke; |
(...skipping 12 matching lines...) Expand all Loading... |
44 const char kTestSignedData[] = "test_challenge_with_salt"; | 45 const char kTestSignedData[] = "test_challenge_with_salt"; |
45 const char kTestSignature[] = "test_signature"; | 46 const char kTestSignature[] = "test_signature"; |
46 const char kTestCertificate[] = "test_certificate"; | 47 const char kTestCertificate[] = "test_certificate"; |
47 const char kTestEmail[] = "test_email@chromium.org"; | 48 const char kTestEmail[] = "test_email@chromium.org"; |
48 const char kTestURL[] = "http://mytestdomain/test"; | 49 const char kTestURL[] = "http://mytestdomain/test"; |
49 const char kTestURLSecure[] = "https://mytestdomain/test"; | 50 const char kTestURLSecure[] = "https://mytestdomain/test"; |
50 | 51 |
51 class FakeDelegate : public PlatformVerificationFlow::Delegate { | 52 class FakeDelegate : public PlatformVerificationFlow::Delegate { |
52 public: | 53 public: |
53 FakeDelegate() : response_(PlatformVerificationFlow::CONSENT_RESPONSE_ALLOW), | 54 FakeDelegate() : response_(PlatformVerificationFlow::CONSENT_RESPONSE_ALLOW), |
54 num_consent_calls_(0) {} | 55 num_consent_calls_(0), |
| 56 url_(kTestURL), |
| 57 is_incognito_(false) { |
| 58 // Configure a user for the mock user manager. |
| 59 mock_user_manager_.SetActiveUser(kTestEmail); |
| 60 } |
55 virtual ~FakeDelegate() {} | 61 virtual ~FakeDelegate() {} |
56 | 62 |
| 63 void SetUp() { |
| 64 ProfileImpl::RegisterProfilePrefs(pref_service_.registry()); |
| 65 chrome::DeviceIDFetcher::RegisterProfilePrefs(pref_service_.registry()); |
| 66 PlatformVerificationFlow::RegisterProfilePrefs(pref_service_.registry()); |
| 67 HostContentSettingsMap::RegisterProfilePrefs(pref_service_.registry()); |
| 68 content_settings_ = new HostContentSettingsMap(&pref_service_, false); |
| 69 } |
| 70 |
| 71 void TearDown() { |
| 72 content_settings_->ShutdownOnUIThread(); |
| 73 } |
| 74 |
57 virtual void ShowConsentPrompt( | 75 virtual void ShowConsentPrompt( |
58 content::WebContents* web_contents, | 76 content::WebContents* web_contents, |
59 const PlatformVerificationFlow::Delegate::ConsentCallback& callback) | 77 const PlatformVerificationFlow::Delegate::ConsentCallback& callback) |
60 OVERRIDE { | 78 OVERRIDE { |
61 num_consent_calls_++; | 79 num_consent_calls_++; |
62 callback.Run(response_); | 80 callback.Run(response_); |
63 } | 81 } |
64 | 82 |
| 83 virtual PrefService* GetPrefs(content::WebContents* web_contents) OVERRIDE { |
| 84 return &pref_service_; |
| 85 } |
| 86 |
| 87 virtual const GURL& GetURL(content::WebContents* web_contents) OVERRIDE { |
| 88 return url_; |
| 89 } |
| 90 |
| 91 virtual User* GetUser(content::WebContents* web_contents) OVERRIDE { |
| 92 return mock_user_manager_.GetActiveUser(); |
| 93 } |
| 94 |
| 95 virtual HostContentSettingsMap* GetContentSettings( |
| 96 content::WebContents* web_contents) OVERRIDE { |
| 97 return content_settings_; |
| 98 } |
| 99 |
| 100 virtual bool IsGuestOrIncognito(content::WebContents* web_contents) OVERRIDE { |
| 101 return is_incognito_; |
| 102 } |
| 103 |
65 void set_response(PlatformVerificationFlow::ConsentResponse response) { | 104 void set_response(PlatformVerificationFlow::ConsentResponse response) { |
66 response_ = response; | 105 response_ = response; |
67 } | 106 } |
68 | 107 |
69 int num_consent_calls() { | 108 int num_consent_calls() { |
70 return num_consent_calls_; | 109 return num_consent_calls_; |
71 } | 110 } |
72 | 111 |
| 112 TestingPrefServiceSyncable& pref_service() { |
| 113 return pref_service_; |
| 114 } |
| 115 |
| 116 void set_url(const GURL& url) { |
| 117 url_ = url; |
| 118 } |
| 119 |
| 120 void set_is_incognito(bool is_incognito) { |
| 121 is_incognito_ = is_incognito; |
| 122 } |
| 123 |
73 private: | 124 private: |
74 PlatformVerificationFlow::ConsentResponse response_; | 125 PlatformVerificationFlow::ConsentResponse response_; |
75 int num_consent_calls_; | 126 int num_consent_calls_; |
| 127 TestingPrefServiceSyncable pref_service_; |
| 128 MockUserManager mock_user_manager_; |
| 129 GURL url_; |
| 130 scoped_refptr<HostContentSettingsMap> content_settings_; |
| 131 bool is_incognito_; |
76 | 132 |
77 DISALLOW_COPY_AND_ASSIGN(FakeDelegate); | 133 DISALLOW_COPY_AND_ASSIGN(FakeDelegate); |
78 }; | 134 }; |
79 | 135 |
80 class CustomFakeCryptohomeClient : public FakeCryptohomeClient { | 136 class CustomFakeCryptohomeClient : public FakeCryptohomeClient { |
81 public: | 137 public: |
82 CustomFakeCryptohomeClient() : call_status_(DBUS_METHOD_CALL_SUCCESS), | 138 CustomFakeCryptohomeClient() : call_status_(DBUS_METHOD_CALL_SUCCESS), |
83 attestation_enrolled_(true), | 139 attestation_enrolled_(true), |
84 attestation_prepared_(true) {} | 140 attestation_prepared_(true) {} |
85 virtual void TpmAttestationIsEnrolled( | 141 virtual void TpmAttestationIsEnrolled( |
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
122 public: | 178 public: |
123 PlatformVerificationFlowTest() | 179 PlatformVerificationFlowTest() |
124 : message_loop_(base::MessageLoop::TYPE_UI), | 180 : message_loop_(base::MessageLoop::TYPE_UI), |
125 ui_thread_(content::BrowserThread::UI, &message_loop_), | 181 ui_thread_(content::BrowserThread::UI, &message_loop_), |
126 certificate_success_(true), | 182 certificate_success_(true), |
127 fake_certificate_index_(0), | 183 fake_certificate_index_(0), |
128 sign_challenge_success_(true), | 184 sign_challenge_success_(true), |
129 result_(PlatformVerificationFlow::INTERNAL_ERROR) {} | 185 result_(PlatformVerificationFlow::INTERNAL_ERROR) {} |
130 | 186 |
131 void SetUp() { | 187 void SetUp() { |
132 // Configure a user for the mock user manager. | 188 fake_delegate_.SetUp(); |
133 mock_user_manager_.SetActiveUser(kTestEmail); | |
134 | 189 |
135 // Create a verifier for tests to call. | 190 // Create a verifier for tests to call. |
136 verifier_ = new PlatformVerificationFlow(&mock_attestation_flow_, | 191 verifier_ = new PlatformVerificationFlow(&mock_attestation_flow_, |
137 &mock_async_caller_, | 192 &mock_async_caller_, |
138 &fake_cryptohome_client_, | 193 &fake_cryptohome_client_, |
139 &mock_user_manager_, | |
140 &fake_delegate_); | 194 &fake_delegate_); |
141 | 195 |
142 // Create callbacks for tests to use with verifier_. | 196 // Create callbacks for tests to use with verifier_. |
143 callback_ = base::Bind(&PlatformVerificationFlowTest::FakeChallengeCallback, | 197 callback_ = base::Bind(&PlatformVerificationFlowTest::FakeChallengeCallback, |
144 base::Unretained(this)); | 198 base::Unretained(this)); |
145 | 199 |
146 // Configure the test pref service. | |
147 pref_service_.registry()->RegisterBooleanPref(prefs::kEnableDRM, true); | |
148 pref_service_.registry()->RegisterBooleanPref(prefs::kRAConsentFirstTime, | |
149 true); | |
150 RegisterHostContentSettingsPrefs(pref_service_.registry()); | |
151 verifier_->set_testing_prefs(&pref_service_); | |
152 test_content_settings_ = new HostContentSettingsMap(&pref_service_, false); | |
153 verifier_->set_testing_content_settings(test_content_settings_); | |
154 | |
155 // Configure the global cros_settings. | 200 // Configure the global cros_settings. |
156 CrosSettings* cros_settings = CrosSettings::Get(); | 201 CrosSettings* cros_settings = CrosSettings::Get(); |
157 device_settings_provider_ = | 202 device_settings_provider_ = |
158 cros_settings->GetProvider(kAttestationForContentProtectionEnabled); | 203 cros_settings->GetProvider(kAttestationForContentProtectionEnabled); |
159 cros_settings->RemoveSettingsProvider(device_settings_provider_); | 204 cros_settings->RemoveSettingsProvider(device_settings_provider_); |
160 cros_settings->AddSettingsProvider(&stub_settings_provider_); | 205 cros_settings->AddSettingsProvider(&stub_settings_provider_); |
161 cros_settings->SetBoolean(kAttestationForContentProtectionEnabled, true); | 206 cros_settings->SetBoolean(kAttestationForContentProtectionEnabled, true); |
162 | 207 |
163 // Configure a test URL to shortcut the dependency on WebContents. | 208 // Start with the first-time setting set since most tests want this. |
164 verifier_->set_testing_url(GURL(kTestURL)); | 209 fake_delegate_.pref_service().SetUserPref(prefs::kRAConsentFirstTime, |
165 } | 210 new base::FundamentalValue(true)); |
166 | 211 |
167 void RegisterHostContentSettingsPrefs(PrefRegistrySimple* registry) { | |
168 registry->RegisterIntegerPref( | |
169 prefs::kContentSettingsWindowLastTabIndex, | |
170 0); | |
171 registry->RegisterIntegerPref( | |
172 prefs::kContentSettingsDefaultWhitelistVersion, | |
173 0); | |
174 registry->RegisterBooleanPref( | |
175 prefs::kContentSettingsClearOnExitMigrated, | |
176 false); | |
177 DictionaryValue* default_content_settings = new DictionaryValue(); | |
178 registry->RegisterDictionaryPref( | |
179 prefs::kDefaultContentSettings, | |
180 default_content_settings); | |
181 registry->RegisterIntegerPref( | |
182 prefs::kContentSettingsVersion, | |
183 ContentSettingsPattern::kContentSettingsPatternVersion); | |
184 registry->RegisterDictionaryPref( | |
185 prefs::kContentSettingsPatternPairs); | |
186 registry->RegisterListPref(prefs::kManagedAutoSelectCertificateForUrls); | |
187 registry->RegisterListPref(prefs::kManagedCookiesAllowedForUrls); | |
188 registry->RegisterListPref(prefs::kManagedCookiesBlockedForUrls); | |
189 registry->RegisterListPref(prefs::kManagedCookiesSessionOnlyForUrls); | |
190 registry->RegisterListPref(prefs::kManagedImagesAllowedForUrls); | |
191 registry->RegisterListPref(prefs::kManagedImagesBlockedForUrls); | |
192 registry->RegisterListPref(prefs::kManagedJavaScriptAllowedForUrls); | |
193 registry->RegisterListPref(prefs::kManagedJavaScriptBlockedForUrls); | |
194 registry->RegisterListPref(prefs::kManagedPluginsAllowedForUrls); | |
195 registry->RegisterListPref(prefs::kManagedPluginsBlockedForUrls); | |
196 registry->RegisterListPref(prefs::kManagedPopupsAllowedForUrls); | |
197 registry->RegisterListPref(prefs::kManagedPopupsBlockedForUrls); | |
198 registry->RegisterListPref(prefs::kManagedNotificationsAllowedForUrls); | |
199 registry->RegisterListPref(prefs::kManagedNotificationsBlockedForUrls); | |
200 registry->RegisterIntegerPref( | |
201 prefs::kManagedDefaultCookiesSetting, | |
202 CONTENT_SETTING_DEFAULT); | |
203 registry->RegisterIntegerPref( | |
204 prefs::kManagedDefaultImagesSetting, | |
205 CONTENT_SETTING_DEFAULT); | |
206 registry->RegisterIntegerPref( | |
207 prefs::kManagedDefaultJavaScriptSetting, | |
208 CONTENT_SETTING_DEFAULT); | |
209 registry->RegisterIntegerPref( | |
210 prefs::kManagedDefaultPluginsSetting, | |
211 CONTENT_SETTING_DEFAULT); | |
212 registry->RegisterIntegerPref( | |
213 prefs::kManagedDefaultPopupsSetting, | |
214 CONTENT_SETTING_DEFAULT); | |
215 registry->RegisterIntegerPref( | |
216 prefs::kManagedDefaultGeolocationSetting, | |
217 CONTENT_SETTING_DEFAULT); | |
218 registry->RegisterIntegerPref( | |
219 prefs::kManagedDefaultNotificationsSetting, | |
220 CONTENT_SETTING_DEFAULT); | |
221 registry->RegisterIntegerPref( | |
222 prefs::kManagedDefaultMediaStreamSetting, | |
223 CONTENT_SETTING_DEFAULT); | |
224 registry->RegisterBooleanPref( | |
225 prefs::kClearSiteDataOnExit, | |
226 false); | |
227 } | 212 } |
228 | 213 |
229 void TearDown() { | 214 void TearDown() { |
230 // Restore the real DeviceSettingsProvider. | 215 // Restore the real DeviceSettingsProvider. |
231 CrosSettings* cros_settings = CrosSettings::Get(); | 216 CrosSettings* cros_settings = CrosSettings::Get(); |
232 cros_settings->RemoveSettingsProvider(&stub_settings_provider_); | 217 cros_settings->RemoveSettingsProvider(&stub_settings_provider_); |
233 cros_settings->AddSettingsProvider(device_settings_provider_); | 218 cros_settings->AddSettingsProvider(device_settings_provider_); |
234 test_content_settings_->ShutdownOnUIThread(); | 219 fake_delegate_.TearDown(); |
235 } | 220 } |
236 | 221 |
237 void ExpectAttestationFlow() { | 222 void ExpectAttestationFlow() { |
238 // When consent is not given or the feature is disabled, it is important | 223 // When consent is not given or the feature is disabled, it is important |
239 // that there are no calls to the attestation service. Thus, a test must | 224 // that there are no calls to the attestation service. Thus, a test must |
240 // explicitly expect these calls or the mocks will fail the test. | 225 // explicitly expect these calls or the mocks will fail the test. |
241 | 226 |
242 // Configure the mock AttestationFlow to call FakeGetCertificate. | 227 // Configure the mock AttestationFlow to call FakeGetCertificate. |
243 EXPECT_CALL(mock_attestation_flow_, | 228 EXPECT_CALL(mock_attestation_flow_, |
244 GetCertificate(PROFILE_CONTENT_PROTECTION_CERTIFICATE, | 229 GetCertificate(PROFILE_CONTENT_PROTECTION_CERTIFICATE, |
245 kTestEmail, kTestID, _, _)) | 230 kTestEmail, kTestID, _, _)) |
246 .WillRepeatedly(WithArgs<4>(Invoke( | 231 .WillRepeatedly(WithArgs<4>(Invoke( |
247 this, &PlatformVerificationFlowTest::FakeGetCertificate))); | 232 this, &PlatformVerificationFlowTest::FakeGetCertificate))); |
248 | 233 |
249 // Configure the mock AsyncMethodCaller to call FakeSignChallenge. | 234 // Configure the mock AsyncMethodCaller to call FakeSignChallenge. |
250 std::string expected_key_name = std::string(kContentProtectionKeyPrefix) + | 235 std::string expected_key_name = std::string(kContentProtectionKeyPrefix) + |
251 std::string(kTestID); | 236 std::string(kTestID); |
252 EXPECT_CALL(mock_async_caller_, | 237 EXPECT_CALL(mock_async_caller_, |
253 TpmAttestationSignSimpleChallenge(KEY_USER, kTestEmail, | 238 TpmAttestationSignSimpleChallenge(KEY_USER, kTestEmail, |
254 expected_key_name, | 239 expected_key_name, |
255 kTestChallenge, _)) | 240 kTestChallenge, _)) |
256 .WillRepeatedly(WithArgs<4>(Invoke( | 241 .WillRepeatedly(WithArgs<4>(Invoke( |
257 this, &PlatformVerificationFlowTest::FakeSignChallenge))); | 242 this, &PlatformVerificationFlowTest::FakeSignChallenge))); |
258 } | 243 } |
259 | 244 |
260 void SetUserConsent(const GURL& url, bool allow) { | 245 void SetUserConsent(const GURL& url, bool allow) { |
261 verifier_->RecordDomainConsent(test_content_settings_, url, allow); | 246 verifier_->RecordDomainConsent(fake_delegate_.GetContentSettings(NULL), |
262 } | 247 url, |
263 | 248 allow); |
264 void SetURL(const GURL& url) { | |
265 verifier_->set_testing_url(url); | |
266 } | 249 } |
267 | 250 |
268 void FakeGetCertificate( | 251 void FakeGetCertificate( |
269 const AttestationFlow::CertificateCallback& callback) { | 252 const AttestationFlow::CertificateCallback& callback) { |
270 std::string certificate = | 253 std::string certificate = |
271 (fake_certificate_index_ < fake_certificate_list_.size()) ? | 254 (fake_certificate_index_ < fake_certificate_list_.size()) ? |
272 fake_certificate_list_[fake_certificate_index_] : kTestCertificate; | 255 fake_certificate_list_[fake_certificate_index_] : kTestCertificate; |
273 base::MessageLoop::current()->PostTask(FROM_HERE, | 256 base::MessageLoop::current()->PostTask(FROM_HERE, |
274 base::Bind(callback, | 257 base::Bind(callback, |
275 certificate_success_, | 258 certificate_success_, |
(...skipping 28 matching lines...) Expand all Loading... |
304 CHECK(pb.SerializeToString(&serial)); | 287 CHECK(pb.SerializeToString(&serial)); |
305 return serial; | 288 return serial; |
306 } | 289 } |
307 | 290 |
308 protected: | 291 protected: |
309 base::MessageLoop message_loop_; | 292 base::MessageLoop message_loop_; |
310 content::TestBrowserThread ui_thread_; | 293 content::TestBrowserThread ui_thread_; |
311 StrictMock<MockAttestationFlow> mock_attestation_flow_; | 294 StrictMock<MockAttestationFlow> mock_attestation_flow_; |
312 cryptohome::MockAsyncMethodCaller mock_async_caller_; | 295 cryptohome::MockAsyncMethodCaller mock_async_caller_; |
313 CustomFakeCryptohomeClient fake_cryptohome_client_; | 296 CustomFakeCryptohomeClient fake_cryptohome_client_; |
314 MockUserManager mock_user_manager_; | |
315 FakeDelegate fake_delegate_; | 297 FakeDelegate fake_delegate_; |
316 TestingPrefServiceSimple pref_service_; | |
317 CrosSettingsProvider* device_settings_provider_; | 298 CrosSettingsProvider* device_settings_provider_; |
318 StubCrosSettingsProvider stub_settings_provider_; | 299 StubCrosSettingsProvider stub_settings_provider_; |
319 ScopedTestDeviceSettingsService test_device_settings_service_; | 300 ScopedTestDeviceSettingsService test_device_settings_service_; |
320 ScopedTestCrosSettings test_cros_settings_; | 301 ScopedTestCrosSettings test_cros_settings_; |
321 scoped_refptr<HostContentSettingsMap> test_content_settings_; | |
322 scoped_refptr<PlatformVerificationFlow> verifier_; | 302 scoped_refptr<PlatformVerificationFlow> verifier_; |
323 | 303 |
324 // Controls result of FakeGetCertificate. | 304 // Controls result of FakeGetCertificate. |
325 bool certificate_success_; | 305 bool certificate_success_; |
326 std::vector<std::string> fake_certificate_list_; | 306 std::vector<std::string> fake_certificate_list_; |
327 size_t fake_certificate_index_; | 307 size_t fake_certificate_index_; |
328 | 308 |
329 // Controls result of FakeSignChallenge. | 309 // Controls result of FakeSignChallenge. |
330 bool sign_challenge_success_; | 310 bool sign_challenge_success_; |
331 | 311 |
(...skipping 27 matching lines...) Expand all Loading... |
359 base::RunLoop().RunUntilIdle(); | 339 base::RunLoop().RunUntilIdle(); |
360 EXPECT_EQ(PlatformVerificationFlow::SUCCESS, result_); | 340 EXPECT_EQ(PlatformVerificationFlow::SUCCESS, result_); |
361 EXPECT_EQ(kTestSignedData, challenge_salt_); | 341 EXPECT_EQ(kTestSignedData, challenge_salt_); |
362 EXPECT_EQ(kTestSignature, challenge_signature_); | 342 EXPECT_EQ(kTestSignature, challenge_signature_); |
363 EXPECT_EQ(kTestCertificate, certificate_); | 343 EXPECT_EQ(kTestCertificate, certificate_); |
364 EXPECT_EQ(1, fake_delegate_.num_consent_calls()); | 344 EXPECT_EQ(1, fake_delegate_.num_consent_calls()); |
365 } | 345 } |
366 | 346 |
367 TEST_F(PlatformVerificationFlowTest, SuccessWithFirstTimeConsent) { | 347 TEST_F(PlatformVerificationFlowTest, SuccessWithFirstTimeConsent) { |
368 SetUserConsent(GURL(kTestURL), true); | 348 SetUserConsent(GURL(kTestURL), true); |
369 pref_service_.SetUserPref(prefs::kRAConsentFirstTime, | 349 fake_delegate_.pref_service().SetUserPref(prefs::kRAConsentFirstTime, |
370 new base::FundamentalValue(false)); | 350 new base::FundamentalValue(false)); |
371 ExpectAttestationFlow(); | 351 ExpectAttestationFlow(); |
372 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); | 352 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); |
373 base::RunLoop().RunUntilIdle(); | 353 base::RunLoop().RunUntilIdle(); |
374 EXPECT_EQ(PlatformVerificationFlow::SUCCESS, result_); | 354 EXPECT_EQ(PlatformVerificationFlow::SUCCESS, result_); |
375 EXPECT_EQ(kTestSignedData, challenge_salt_); | 355 EXPECT_EQ(kTestSignedData, challenge_salt_); |
376 EXPECT_EQ(kTestSignature, challenge_signature_); | 356 EXPECT_EQ(kTestSignature, challenge_signature_); |
377 EXPECT_EQ(kTestCertificate, certificate_); | 357 EXPECT_EQ(kTestCertificate, certificate_); |
378 EXPECT_EQ(1, fake_delegate_.num_consent_calls()); | 358 EXPECT_EQ(1, fake_delegate_.num_consent_calls()); |
379 } | 359 } |
380 | 360 |
381 TEST_F(PlatformVerificationFlowTest, ConsentRejected) { | 361 TEST_F(PlatformVerificationFlowTest, ConsentRejected) { |
382 fake_delegate_.set_response(PlatformVerificationFlow::CONSENT_RESPONSE_DENY); | 362 fake_delegate_.set_response(PlatformVerificationFlow::CONSENT_RESPONSE_DENY); |
383 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); | 363 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); |
384 base::RunLoop().RunUntilIdle(); | 364 base::RunLoop().RunUntilIdle(); |
385 EXPECT_EQ(PlatformVerificationFlow::USER_REJECTED, result_); | 365 EXPECT_EQ(PlatformVerificationFlow::USER_REJECTED, result_); |
386 EXPECT_EQ(1, fake_delegate_.num_consent_calls()); | 366 EXPECT_EQ(1, fake_delegate_.num_consent_calls()); |
387 } | 367 } |
388 | 368 |
389 TEST_F(PlatformVerificationFlowTest, FeatureDisabled) { | 369 TEST_F(PlatformVerificationFlowTest, FeatureDisabled) { |
390 CrosSettings::Get()->SetBoolean(kAttestationForContentProtectionEnabled, | 370 CrosSettings::Get()->SetBoolean(kAttestationForContentProtectionEnabled, |
391 false); | 371 false); |
392 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); | 372 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); |
393 base::RunLoop().RunUntilIdle(); | 373 base::RunLoop().RunUntilIdle(); |
394 EXPECT_EQ(PlatformVerificationFlow::POLICY_REJECTED, result_); | 374 EXPECT_EQ(PlatformVerificationFlow::POLICY_REJECTED, result_); |
395 EXPECT_EQ(0, fake_delegate_.num_consent_calls()); | 375 EXPECT_EQ(0, fake_delegate_.num_consent_calls()); |
396 } | 376 } |
397 | 377 |
398 TEST_F(PlatformVerificationFlowTest, FeatureDisabledByUser) { | 378 TEST_F(PlatformVerificationFlowTest, FeatureDisabledByUser) { |
399 pref_service_.SetUserPref(prefs::kEnableDRM, | 379 fake_delegate_.pref_service().SetUserPref(prefs::kEnableDRM, |
400 new base::FundamentalValue(false)); | 380 new base::FundamentalValue(false)); |
401 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); | 381 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); |
402 base::RunLoop().RunUntilIdle(); | 382 base::RunLoop().RunUntilIdle(); |
403 EXPECT_EQ(PlatformVerificationFlow::POLICY_REJECTED, result_); | 383 EXPECT_EQ(PlatformVerificationFlow::POLICY_REJECTED, result_); |
404 EXPECT_EQ(0, fake_delegate_.num_consent_calls()); | 384 EXPECT_EQ(0, fake_delegate_.num_consent_calls()); |
405 } | 385 } |
406 | 386 |
407 TEST_F(PlatformVerificationFlowTest, FeatureDisabledByUserForDomain) { | 387 TEST_F(PlatformVerificationFlowTest, FeatureDisabledByUserForDomain) { |
408 SetUserConsent(GURL(kTestURL), false); | 388 SetUserConsent(GURL(kTestURL), false); |
409 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); | 389 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); |
410 base::RunLoop().RunUntilIdle(); | 390 base::RunLoop().RunUntilIdle(); |
(...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
445 TEST_F(PlatformVerificationFlowTest, ConsentPerScheme) { | 425 TEST_F(PlatformVerificationFlowTest, ConsentPerScheme) { |
446 fake_delegate_.set_response(PlatformVerificationFlow::CONSENT_RESPONSE_DENY); | 426 fake_delegate_.set_response(PlatformVerificationFlow::CONSENT_RESPONSE_DENY); |
447 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); | 427 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); |
448 base::RunLoop().RunUntilIdle(); | 428 base::RunLoop().RunUntilIdle(); |
449 EXPECT_EQ(PlatformVerificationFlow::USER_REJECTED, result_); | 429 EXPECT_EQ(PlatformVerificationFlow::USER_REJECTED, result_); |
450 // Call again and expect denial based on previous response. | 430 // Call again and expect denial based on previous response. |
451 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); | 431 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); |
452 base::RunLoop().RunUntilIdle(); | 432 base::RunLoop().RunUntilIdle(); |
453 EXPECT_EQ(PlatformVerificationFlow::POLICY_REJECTED, result_); | 433 EXPECT_EQ(PlatformVerificationFlow::POLICY_REJECTED, result_); |
454 // Call with a different scheme and expect another consent prompt. | 434 // Call with a different scheme and expect another consent prompt. |
455 SetURL(GURL(kTestURLSecure)); | 435 fake_delegate_.set_url(GURL(kTestURLSecure)); |
456 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); | 436 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); |
457 base::RunLoop().RunUntilIdle(); | 437 base::RunLoop().RunUntilIdle(); |
458 EXPECT_EQ(PlatformVerificationFlow::USER_REJECTED, result_); | 438 EXPECT_EQ(PlatformVerificationFlow::USER_REJECTED, result_); |
459 EXPECT_EQ(2, fake_delegate_.num_consent_calls()); | 439 EXPECT_EQ(2, fake_delegate_.num_consent_calls()); |
460 } | 440 } |
461 | 441 |
462 TEST_F(PlatformVerificationFlowTest, Timeout) { | 442 TEST_F(PlatformVerificationFlowTest, Timeout) { |
463 verifier_->set_timeout_delay(base::TimeDelta::FromSeconds(0)); | 443 verifier_->set_timeout_delay(base::TimeDelta::FromSeconds(0)); |
464 ExpectAttestationFlow(); | 444 ExpectAttestationFlow(); |
465 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); | 445 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); |
466 base::RunLoop().RunUntilIdle(); | 446 base::RunLoop().RunUntilIdle(); |
467 EXPECT_EQ(PlatformVerificationFlow::TIMEOUT, result_); | 447 EXPECT_EQ(PlatformVerificationFlow::TIMEOUT, result_); |
468 } | 448 } |
469 | 449 |
470 TEST_F(PlatformVerificationFlowTest, ExpiredCert) { | 450 TEST_F(PlatformVerificationFlowTest, ExpiredCert) { |
471 ExpectAttestationFlow(); | 451 ExpectAttestationFlow(); |
472 fake_certificate_list_.resize(2); | 452 fake_certificate_list_.resize(2); |
473 ASSERT_TRUE(GetFakeCertificate(base::TimeDelta::FromDays(-1), | 453 ASSERT_TRUE(GetFakeCertificate(base::TimeDelta::FromDays(-1), |
474 &fake_certificate_list_[0])); | 454 &fake_certificate_list_[0])); |
475 ASSERT_TRUE(GetFakeCertificate(base::TimeDelta::FromDays(1), | 455 ASSERT_TRUE(GetFakeCertificate(base::TimeDelta::FromDays(1), |
476 &fake_certificate_list_[1])); | 456 &fake_certificate_list_[1])); |
477 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); | 457 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); |
478 base::RunLoop().RunUntilIdle(); | 458 base::RunLoop().RunUntilIdle(); |
479 EXPECT_EQ(PlatformVerificationFlow::SUCCESS, result_); | 459 EXPECT_EQ(PlatformVerificationFlow::SUCCESS, result_); |
480 EXPECT_EQ(certificate_, fake_certificate_list_[1]); | 460 EXPECT_EQ(certificate_, fake_certificate_list_[1]); |
481 } | 461 } |
482 | 462 |
| 463 TEST_F(PlatformVerificationFlowTest, IncognitoMode) { |
| 464 fake_delegate_.set_is_incognito(true); |
| 465 verifier_->ChallengePlatformKey(NULL, kTestID, kTestChallenge, callback_); |
| 466 base::RunLoop().RunUntilIdle(); |
| 467 EXPECT_EQ(PlatformVerificationFlow::PLATFORM_NOT_VERIFIED, result_); |
| 468 } |
| 469 |
483 } // namespace attestation | 470 } // namespace attestation |
484 } // namespace chromeos | 471 } // namespace chromeos |
OLD | NEW |