OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/browser/chromeos/login/signed_settings.h" | |
6 | |
7 #include "base/logging.h" | |
8 #include "base/message_loop.h" | |
9 #include "base/values.h" | |
10 #include "chrome/browser/chromeos/cros/cros_library.h" | |
11 #include "chrome/browser/chromeos/cros_settings_names.h" | |
12 #include "chrome/browser/chromeos/login/mock_owner_key_utils.h" | |
13 #include "chrome/browser/chromeos/login/mock_ownership_service.h" | |
14 #include "chrome/browser/chromeos/login/owner_manager_unittest.h" | |
15 #include "chrome/browser/policy/proto/chrome_device_policy.pb.h" | |
16 #include "chrome/browser/policy/proto/device_management_backend.pb.h" | |
17 #include "chromeos/dbus/mock_dbus_thread_manager.h" | |
18 #include "chromeos/dbus/mock_session_manager_client.h" | |
19 #include "content/public/test/test_browser_thread.h" | |
20 #include "testing/gmock/include/gmock/gmock.h" | |
21 #include "testing/gtest/include/gtest/gtest.h" | |
22 | |
23 using ::testing::A; | |
24 using ::testing::AnyNumber; | |
25 using ::testing::Return; | |
26 using ::testing::ReturnRef; | |
27 using ::testing::SaveArg; | |
28 using ::testing::StrEq; | |
29 using ::testing::WithArg; | |
30 using ::testing::_; | |
31 using content::BrowserThread; | |
32 using google::protobuf::RepeatedPtrField; | |
33 | |
34 namespace em = enterprise_management; | |
35 namespace chromeos { | |
36 | |
37 namespace { | |
38 template <class T> | |
39 class DummyDelegate : public SignedSettings::Delegate<T> { | |
40 public: | |
41 explicit DummyDelegate(T to_expect) | |
42 : expect_success_(false), | |
43 expected_failure_(SignedSettings::SUCCESS), | |
44 expected_(to_expect), | |
45 run_(false) {} | |
46 virtual ~DummyDelegate() { EXPECT_TRUE(run_); } | |
47 virtual void OnSettingsOpCompleted(SignedSettings::ReturnCode code, | |
48 T value) { | |
49 run_ = true; | |
50 if (expect_success_) | |
51 compare_expected(value); | |
52 EXPECT_EQ(expected_failure_, code); | |
53 } | |
54 virtual void expect_success() { | |
55 expect_success_ = true; | |
56 expected_failure_ = SignedSettings::SUCCESS; | |
57 } | |
58 virtual void expect_failure(SignedSettings::ReturnCode code) { | |
59 expect_success_ = false; | |
60 expected_failure_ = code; | |
61 } | |
62 | |
63 protected: | |
64 bool expect_success_; | |
65 SignedSettings::ReturnCode expected_failure_; | |
66 T expected_; | |
67 bool run_; | |
68 virtual void compare_expected(T to_compare) = 0; | |
69 }; | |
70 | |
71 template <class T> | |
72 class NormalDelegate : public DummyDelegate<T> { | |
73 public: | |
74 explicit NormalDelegate(T to_expect) : DummyDelegate<T>(to_expect) {} | |
75 virtual ~NormalDelegate() {} | |
76 protected: | |
77 virtual void compare_expected(T to_compare) { | |
78 // without this-> this won't build. | |
79 EXPECT_EQ(this->expected_, to_compare); | |
80 } | |
81 }; | |
82 | |
83 class ProtoDelegate : public DummyDelegate<const em::PolicyFetchResponse&> { | |
84 public: | |
85 explicit ProtoDelegate(const em::PolicyFetchResponse& e) | |
86 : DummyDelegate<const em::PolicyFetchResponse&>(e) { | |
87 } | |
88 virtual ~ProtoDelegate() {} | |
89 protected: | |
90 virtual void compare_expected(const em::PolicyFetchResponse& to_compare) { | |
91 std::string ex_string, comp_string; | |
92 EXPECT_TRUE(expected_.SerializeToString(&ex_string)); | |
93 EXPECT_TRUE(to_compare.SerializeToString(&comp_string)); | |
94 EXPECT_EQ(ex_string, comp_string); | |
95 } | |
96 }; | |
97 | |
98 } // anonymous namespace | |
99 | |
100 class SignedSettingsTest : public testing::Test { | |
101 public: | |
102 SignedSettingsTest() | |
103 : fake_prop_(kAccountsPrefAllowGuest), | |
104 fake_signature_("false"), | |
105 fake_value_(false), | |
106 fake_value_signature_( | |
107 fake_signature_.c_str(), | |
108 fake_signature_.c_str() + fake_signature_.length()), | |
109 message_loop_(MessageLoop::TYPE_UI), | |
110 ui_thread_(BrowserThread::UI, &message_loop_), | |
111 file_thread_(BrowserThread::FILE), | |
112 mock_(new MockKeyUtils), | |
113 injector_(mock_) /* injector_ takes ownership of mock_ */, | |
114 mock_dbus_thread_manager_(new MockDBusThreadManager) { | |
115 } | |
116 | |
117 virtual ~SignedSettingsTest() {} | |
118 | |
119 virtual void SetUp() { | |
120 file_thread_.Start(); | |
121 DBusThreadManager::InitializeForTesting(mock_dbus_thread_manager_); | |
122 } | |
123 | |
124 virtual void TearDown() { | |
125 OwnerKeyUtils::set_factory(NULL); | |
126 DBusThreadManager::Shutdown(); | |
127 } | |
128 | |
129 void mock_service(SignedSettings* s, MockOwnershipService* m) { | |
130 s->set_service(m); | |
131 } | |
132 | |
133 void FailingStorePolicyOp(const OwnerManager::KeyOpCode return_code) { | |
134 NormalDelegate<bool> d(false); | |
135 d.expect_failure(SignedSettings::MapKeyOpCode(return_code)); | |
136 | |
137 em::PolicyFetchResponse fake_policy; | |
138 fake_policy.set_policy_data(fake_prop_); | |
139 std::string serialized; | |
140 ASSERT_TRUE(fake_policy.SerializeToString(&serialized)); | |
141 | |
142 scoped_refptr<SignedSettings> s( | |
143 SignedSettings::CreateStorePolicyOp(&fake_policy, &d)); | |
144 | |
145 mock_service(s.get(), &m_); | |
146 EXPECT_CALL(m_, StartSigningAttempt(StrEq(fake_prop_), _)) | |
147 .Times(1); | |
148 | |
149 s->Execute(); | |
150 s->OnKeyOpComplete(return_code, std::vector<uint8>()); | |
151 message_loop_.RunAllPending(); | |
152 } | |
153 | |
154 em::PolicyData BuildPolicyData(std::vector<std::string> whitelist) { | |
155 em::PolicyData to_return; | |
156 em::ChromeDeviceSettingsProto pol; | |
157 em::GuestModeEnabledProto* allow = pol.mutable_guest_mode_enabled(); | |
158 allow->set_guest_mode_enabled(false); | |
159 pol.mutable_device_proxy_settings()->set_proxy_mode("direct"); | |
160 | |
161 if (!whitelist.empty()) { | |
162 em::UserWhitelistProto* whitelist_proto = pol.mutable_user_whitelist(); | |
163 for (std::vector<std::string>::const_iterator it = whitelist.begin(); | |
164 it != whitelist.end(); | |
165 ++it) { | |
166 whitelist_proto->add_user_whitelist(*it); | |
167 } | |
168 } | |
169 | |
170 to_return.set_policy_type(chromeos::kDevicePolicyType); | |
171 to_return.set_policy_value(pol.SerializeAsString()); | |
172 return to_return; | |
173 } | |
174 | |
175 em::PolicyFetchResponse BuildProto(const std::string& data, | |
176 const std::string& sig, | |
177 std::string* out_serialized) { | |
178 em::PolicyFetchResponse fake_policy; | |
179 if (!data.empty()) | |
180 fake_policy.set_policy_data(data); | |
181 if (!sig.empty()) | |
182 fake_policy.set_policy_data_signature(sig); | |
183 EXPECT_TRUE(fake_policy.SerializeToString(out_serialized)); | |
184 return fake_policy; | |
185 } | |
186 | |
187 const std::string fake_prop_; | |
188 const std::string fake_signature_; | |
189 const base::FundamentalValue fake_value_; | |
190 const std::vector<uint8> fake_value_signature_; | |
191 MockOwnershipService m_; | |
192 | |
193 MessageLoop message_loop_; | |
194 content::TestBrowserThread ui_thread_; | |
195 content::TestBrowserThread file_thread_; | |
196 | |
197 MockKeyUtils* mock_; | |
198 MockInjector injector_; | |
199 MockDBusThreadManager* mock_dbus_thread_manager_; | |
200 | |
201 ScopedStubCrosEnabler stub_cros_enabler_; | |
202 }; | |
203 | |
204 ACTION_P(Retrieve, policy_blob) { arg0.Run(policy_blob); } | |
205 ACTION_P(Store, success) { arg1.Run(success); } | |
206 | |
207 TEST_F(SignedSettingsTest, SignAndStorePolicy) { | |
208 NormalDelegate<bool> d(true); | |
209 d.expect_success(); | |
210 | |
211 em::PolicyData in_pol = BuildPolicyData(std::vector<std::string>()); | |
212 std::string data_serialized = in_pol.SerializeAsString(); | |
213 std::string serialized; | |
214 em::PolicyFetchResponse fake_policy = BuildProto(data_serialized, | |
215 std::string(), | |
216 &serialized); | |
217 scoped_refptr<SignedSettings> s( | |
218 SignedSettings::CreateStorePolicyOp(&fake_policy, &d)); | |
219 | |
220 mock_service(s.get(), &m_); | |
221 EXPECT_CALL(m_, StartSigningAttempt(StrEq(data_serialized), _)) | |
222 .Times(1); | |
223 em::PolicyData out_pol; | |
224 | |
225 // Ask for signature over unsigned policy. | |
226 s->Execute(); | |
227 message_loop_.RunAllPending(); | |
228 | |
229 // Fake out a successful signing. | |
230 std::string signed_serialized; | |
231 em::PolicyFetchResponse signed_policy = BuildProto(data_serialized, | |
232 fake_signature_, | |
233 &signed_serialized); | |
234 MockSessionManagerClient* client = | |
235 mock_dbus_thread_manager_->mock_session_manager_client(); | |
236 EXPECT_CALL(*client, StoreDevicePolicy(signed_serialized, _)) | |
237 .WillOnce(Store(true)) | |
238 .RetiresOnSaturation(); | |
239 s->OnKeyOpComplete(OwnerManager::SUCCESS, fake_value_signature_); | |
240 message_loop_.RunAllPending(); | |
241 } | |
242 | |
243 TEST_F(SignedSettingsTest, StoreSignedPolicy) { | |
244 NormalDelegate<bool> d(true); | |
245 d.expect_success(); | |
246 | |
247 em::PolicyData in_pol = BuildPolicyData(std::vector<std::string>()); | |
248 std::string serialized = in_pol.SerializeAsString(); | |
249 std::string signed_serialized; | |
250 em::PolicyFetchResponse signed_policy = BuildProto(serialized, | |
251 fake_signature_, | |
252 &signed_serialized); | |
253 scoped_refptr<SignedSettings> s( | |
254 SignedSettings::CreateStorePolicyOp(&signed_policy, &d)); | |
255 MockSessionManagerClient* client = | |
256 mock_dbus_thread_manager_->mock_session_manager_client(); | |
257 EXPECT_CALL(*client, StoreDevicePolicy(signed_serialized, _)) | |
258 .WillOnce(Store(true)) | |
259 .RetiresOnSaturation(); | |
260 | |
261 mock_service(s.get(), &m_); | |
262 em::PolicyData out_pol; | |
263 | |
264 s->Execute(); | |
265 message_loop_.RunAllPending(); | |
266 } | |
267 | |
268 TEST_F(SignedSettingsTest, StorePolicyNoKey) { | |
269 FailingStorePolicyOp(OwnerManager::KEY_UNAVAILABLE); | |
270 } | |
271 | |
272 TEST_F(SignedSettingsTest, StorePolicyFailed) { | |
273 FailingStorePolicyOp(OwnerManager::OPERATION_FAILED); | |
274 } | |
275 | |
276 TEST_F(SignedSettingsTest, StorePolicyNoPolicyData) { | |
277 NormalDelegate<bool> d(false); | |
278 d.expect_failure(SignedSettings::OPERATION_FAILED); | |
279 | |
280 std::string serialized; | |
281 em::PolicyFetchResponse fake_policy = BuildProto(std::string(), | |
282 std::string(), | |
283 &serialized); | |
284 scoped_refptr<SignedSettings> s( | |
285 SignedSettings::CreateStorePolicyOp(&fake_policy, &d)); | |
286 | |
287 s->Execute(); | |
288 message_loop_.RunAllPending(); | |
289 } | |
290 | |
291 TEST_F(SignedSettingsTest, RetrievePolicy) { | |
292 em::PolicyData in_pol = BuildPolicyData(std::vector<std::string>()); | |
293 std::string serialized = in_pol.SerializeAsString(); | |
294 std::string signed_serialized; | |
295 em::PolicyFetchResponse signed_policy = BuildProto(serialized, | |
296 fake_signature_, | |
297 &signed_serialized); | |
298 ProtoDelegate d(signed_policy); | |
299 d.expect_success(); | |
300 scoped_refptr<SignedSettings> s(SignedSettings::CreateRetrievePolicyOp(&d)); | |
301 | |
302 MockSessionManagerClient* client = | |
303 mock_dbus_thread_manager_->mock_session_manager_client(); | |
304 EXPECT_CALL(*client, RetrieveDevicePolicy(_)) | |
305 .WillOnce(Retrieve(signed_serialized)) | |
306 .RetiresOnSaturation(); | |
307 | |
308 mock_service(s.get(), &m_); | |
309 EXPECT_CALL(m_, StartVerifyAttempt(serialized, fake_value_signature_, _)) | |
310 .Times(1); | |
311 em::PolicyData out_pol; | |
312 | |
313 s->Execute(); | |
314 message_loop_.RunAllPending(); | |
315 | |
316 s->OnKeyOpComplete(OwnerManager::SUCCESS, std::vector<uint8>()); | |
317 message_loop_.RunAllPending(); | |
318 } | |
319 | |
320 TEST_F(SignedSettingsTest, RetrieveNullPolicy) { | |
321 em::PolicyFetchResponse policy; | |
322 ProtoDelegate d(policy); | |
323 d.expect_failure(SignedSettings::NOT_FOUND); | |
324 scoped_refptr<SignedSettings> s(SignedSettings::CreateRetrievePolicyOp(&d)); | |
325 | |
326 MockSessionManagerClient* client = | |
327 mock_dbus_thread_manager_->mock_session_manager_client(); | |
328 EXPECT_CALL(*client, RetrieveDevicePolicy(_)) | |
329 .WillOnce(Retrieve("")) | |
330 .RetiresOnSaturation(); | |
331 | |
332 s->Execute(); | |
333 message_loop_.RunAllPending(); | |
334 } | |
335 | |
336 TEST_F(SignedSettingsTest, RetrieveEmptyPolicy) { | |
337 std::string serialized; | |
338 em::PolicyFetchResponse policy = BuildProto("", "", &serialized); | |
339 ProtoDelegate d(policy); | |
340 d.expect_failure(SignedSettings::NOT_FOUND); | |
341 scoped_refptr<SignedSettings> s(SignedSettings::CreateRetrievePolicyOp(&d)); | |
342 | |
343 MockSessionManagerClient* client = | |
344 mock_dbus_thread_manager_->mock_session_manager_client(); | |
345 EXPECT_CALL(*client, RetrieveDevicePolicy(_)) | |
346 .WillOnce(Retrieve("")) | |
347 .RetiresOnSaturation(); | |
348 | |
349 s->Execute(); | |
350 message_loop_.RunAllPending(); | |
351 } | |
352 | |
353 TEST_F(SignedSettingsTest, RetrieveUnsignedPolicy) { | |
354 std::string serialized; | |
355 em::PolicyFetchResponse policy = BuildProto(fake_prop_, | |
356 std::string(), | |
357 &serialized); | |
358 ProtoDelegate d(policy); | |
359 d.expect_failure(SignedSettings::BAD_SIGNATURE); | |
360 scoped_refptr<SignedSettings> s(SignedSettings::CreateRetrievePolicyOp(&d)); | |
361 | |
362 MockSessionManagerClient* client = | |
363 mock_dbus_thread_manager_->mock_session_manager_client(); | |
364 EXPECT_CALL(*client, RetrieveDevicePolicy(_)) | |
365 .WillOnce(Retrieve(serialized)) | |
366 .RetiresOnSaturation(); | |
367 | |
368 s->Execute(); | |
369 message_loop_.RunAllPending(); | |
370 } | |
371 | |
372 TEST_F(SignedSettingsTest, RetrieveMalsignedPolicy) { | |
373 std::string signed_serialized; | |
374 em::PolicyFetchResponse signed_policy = BuildProto(fake_prop_, | |
375 fake_signature_, | |
376 &signed_serialized); | |
377 ProtoDelegate d(signed_policy); | |
378 d.expect_failure(SignedSettings::BAD_SIGNATURE); | |
379 scoped_refptr<SignedSettings> s(SignedSettings::CreateRetrievePolicyOp(&d)); | |
380 | |
381 MockSessionManagerClient* client = | |
382 mock_dbus_thread_manager_->mock_session_manager_client(); | |
383 EXPECT_CALL(*client, RetrieveDevicePolicy(_)) | |
384 .WillOnce(Retrieve(signed_serialized)) | |
385 .RetiresOnSaturation(); | |
386 | |
387 mock_service(s.get(), &m_); | |
388 EXPECT_CALL(m_, StartVerifyAttempt(fake_prop_, fake_value_signature_, _)) | |
389 .Times(1); | |
390 | |
391 s->Execute(); | |
392 message_loop_.RunAllPending(); | |
393 | |
394 s->OnKeyOpComplete(OwnerManager::OPERATION_FAILED, std::vector<uint8>()); | |
395 message_loop_.RunAllPending(); | |
396 } | |
397 | |
398 } // namespace chromeos | |
OLD | NEW |