| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <cstring> | 5 #include <cstring> |
| 6 #include <string> | 6 #include <string> |
| 7 | 7 |
| 8 #include "base/bind.h" | 8 #include "base/bind.h" |
| 9 #include "base/bind_helpers.h" | 9 #include "base/bind_helpers.h" |
| 10 #include "base/callback.h" | 10 #include "base/callback.h" |
| (...skipping 13 matching lines...) Expand all Loading... |
| 24 #include "base/strings/utf_string_conversions.h" | 24 #include "base/strings/utf_string_conversions.h" |
| 25 #include "base/values.h" | 25 #include "base/values.h" |
| 26 #include "chrome/browser/chrome_notification_types.h" | 26 #include "chrome/browser/chrome_notification_types.h" |
| 27 #include "chrome/browser/chromeos/login/existing_user_controller.h" | 27 #include "chrome/browser/chromeos/login/existing_user_controller.h" |
| 28 #include "chrome/browser/chromeos/login/startup_utils.h" | 28 #include "chrome/browser/chromeos/login/startup_utils.h" |
| 29 #include "chrome/browser/chromeos/login/test/https_forwarder.h" | 29 #include "chrome/browser/chromeos/login/test/https_forwarder.h" |
| 30 #include "chrome/browser/chromeos/login/test/oobe_base_test.h" | 30 #include "chrome/browser/chromeos/login/test/oobe_base_test.h" |
| 31 #include "chrome/browser/chromeos/login/test/oobe_screen_waiter.h" | 31 #include "chrome/browser/chromeos/login/test/oobe_screen_waiter.h" |
| 32 #include "chrome/browser/chromeos/login/ui/login_display_host_impl.h" | 32 #include "chrome/browser/chromeos/login/ui/login_display_host_impl.h" |
| 33 #include "chrome/browser/chromeos/login/ui/webui_login_display.h" | 33 #include "chrome/browser/chromeos/login/ui/webui_login_display.h" |
| 34 #include "chrome/browser/chromeos/login/users/chrome_user_manager.h" |
| 34 #include "chrome/browser/chromeos/login/wizard_controller.h" | 35 #include "chrome/browser/chromeos/login/wizard_controller.h" |
| 36 #include "chrome/browser/chromeos/policy/affiliation_test_helper.h" |
| 35 #include "chrome/browser/chromeos/policy/device_policy_builder.h" | 37 #include "chrome/browser/chromeos/policy/device_policy_builder.h" |
| 36 #include "chrome/browser/chromeos/policy/device_policy_cros_browser_test.h" | 38 #include "chrome/browser/chromeos/policy/device_policy_cros_browser_test.h" |
| 37 #include "chrome/browser/chromeos/policy/proto/chrome_device_policy.pb.h" | 39 #include "chrome/browser/chromeos/policy/proto/chrome_device_policy.pb.h" |
| 38 #include "chrome/browser/chromeos/profiles/profile_helper.h" | 40 #include "chrome/browser/chromeos/profiles/profile_helper.h" |
| 39 #include "chrome/browser/chromeos/settings/cros_settings.h" | 41 #include "chrome/browser/chromeos/settings/cros_settings.h" |
| 40 #include "chrome/browser/policy/test/local_policy_test_server.h" | 42 #include "chrome/browser/policy/test/local_policy_test_server.h" |
| 41 #include "chrome/browser/profiles/profile.h" | 43 #include "chrome/browser/profiles/profile.h" |
| 42 #include "chrome/browser/ui/webui/signin/inline_login_ui.h" | 44 #include "chrome/browser/ui/webui/signin/inline_login_ui.h" |
| 43 #include "chrome/common/chrome_constants.h" | 45 #include "chrome/common/chrome_constants.h" |
| 44 #include "chrome/common/chrome_paths.h" | 46 #include "chrome/common/chrome_paths.h" |
| (...skipping 81 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 126 const char kSAMLIdPCookieName[] = "saml"; | 128 const char kSAMLIdPCookieName[] = "saml"; |
| 127 const char kSAMLIdPCookieValue1[] = "value-1"; | 129 const char kSAMLIdPCookieValue1[] = "value-1"; |
| 128 const char kSAMLIdPCookieValue2[] = "value-2"; | 130 const char kSAMLIdPCookieValue2[] = "value-2"; |
| 129 | 131 |
| 130 const char kRelayState[] = "RelayState"; | 132 const char kRelayState[] = "RelayState"; |
| 131 | 133 |
| 132 const char kTestUserinfoToken[] = "fake-userinfo-token"; | 134 const char kTestUserinfoToken[] = "fake-userinfo-token"; |
| 133 const char kTestRefreshToken[] = "fake-refresh-token"; | 135 const char kTestRefreshToken[] = "fake-refresh-token"; |
| 134 const char kPolicy[] = "{\"managed_users\": [\"*\"]}"; | 136 const char kPolicy[] = "{\"managed_users\": [\"*\"]}"; |
| 135 | 137 |
| 138 const char kAffiliationID[] = "some-affiliation-id"; |
| 139 |
| 136 // FakeSamlIdp serves IdP auth form and the form submission. The form is | 140 // FakeSamlIdp serves IdP auth form and the form submission. The form is |
| 137 // served with the template's RelayState placeholder expanded to the real | 141 // served with the template's RelayState placeholder expanded to the real |
| 138 // RelayState parameter from request. The form submission redirects back to | 142 // RelayState parameter from request. The form submission redirects back to |
| 139 // FakeGaia with the same RelayState. | 143 // FakeGaia with the same RelayState. |
| 140 class FakeSamlIdp { | 144 class FakeSamlIdp { |
| 141 public: | 145 public: |
| 142 FakeSamlIdp(); | 146 FakeSamlIdp(); |
| 143 ~FakeSamlIdp(); | 147 ~FakeSamlIdp(); |
| 144 | 148 |
| 145 void SetUp(const std::string& base_path, const GURL& gaia_url); | 149 void SetUp(const std::string& base_path, const GURL& gaia_url); |
| (...skipping 797 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 943 SAMLPolicyTest::~SAMLPolicyTest() { | 947 SAMLPolicyTest::~SAMLPolicyTest() { |
| 944 } | 948 } |
| 945 | 949 |
| 946 void SAMLPolicyTest::SetUpInProcessBrowserTestFixture() { | 950 void SAMLPolicyTest::SetUpInProcessBrowserTestFixture() { |
| 947 DBusThreadManager::GetSetterForTesting()->SetSessionManagerClient( | 951 DBusThreadManager::GetSetterForTesting()->SetSessionManagerClient( |
| 948 scoped_ptr<SessionManagerClient>(fake_session_manager_client_)); | 952 scoped_ptr<SessionManagerClient>(fake_session_manager_client_)); |
| 949 | 953 |
| 950 SamlTest::SetUpInProcessBrowserTestFixture(); | 954 SamlTest::SetUpInProcessBrowserTestFixture(); |
| 951 | 955 |
| 952 // Initialize device policy. | 956 // Initialize device policy. |
| 953 test_helper_.InstallOwnerKey(); | 957 std::set<std::string> device_affiliation_ids; |
| 954 test_helper_.MarkAsEnterpriseOwned(); | 958 device_affiliation_ids.insert(kAffiliationID); |
| 955 device_policy_->SetDefaultSigningKey(); | 959 affiliation_test_helper::SetDeviceAffiliationID( |
| 956 device_policy_->Build(); | 960 &test_helper_, fake_session_manager_client_, device_affiliation_ids); |
| 957 fake_session_manager_client_->set_device_policy(device_policy_->GetBlob()); | |
| 958 fake_session_manager_client_->OnPropertyChangeComplete(true); | |
| 959 | 961 |
| 960 // Initialize user policy. | 962 // Initialize user policy. |
| 961 EXPECT_CALL(provider_, IsInitializationComplete(_)) | 963 EXPECT_CALL(provider_, IsInitializationComplete(_)) |
| 962 .WillRepeatedly(Return(true)); | 964 .WillRepeatedly(Return(true)); |
| 963 policy::BrowserPolicyConnector::SetPolicyProviderForTesting(&provider_); | 965 policy::BrowserPolicyConnector::SetPolicyProviderForTesting(&provider_); |
| 964 } | 966 } |
| 965 | 967 |
| 966 void SAMLPolicyTest::SetUpOnMainThread() { | 968 void SAMLPolicyTest::SetUpOnMainThread() { |
| 967 SamlTest::SetUpOnMainThread(); | 969 SamlTest::SetUpOnMainThread(); |
| 968 | 970 |
| 969 // Pretend that the test users' OAuth tokens are valid. | 971 // Pretend that the test users' OAuth tokens are valid. |
| 970 user_manager::UserManager::Get()->SaveUserOAuthStatus( | 972 user_manager::UserManager::Get()->SaveUserOAuthStatus( |
| 971 kFirstSAMLUserEmail, user_manager::User::OAUTH2_TOKEN_STATUS_VALID); | 973 kFirstSAMLUserEmail, user_manager::User::OAUTH2_TOKEN_STATUS_VALID); |
| 972 user_manager::UserManager::Get()->SaveUserOAuthStatus( | 974 user_manager::UserManager::Get()->SaveUserOAuthStatus( |
| 973 kNonSAMLUserEmail, user_manager::User::OAUTH2_TOKEN_STATUS_VALID); | 975 kNonSAMLUserEmail, user_manager::User::OAUTH2_TOKEN_STATUS_VALID); |
| 974 user_manager::UserManager::Get()->SaveUserOAuthStatus( | 976 user_manager::UserManager::Get()->SaveUserOAuthStatus( |
| 975 kDifferentDomainSAMLUserEmail, | 977 kDifferentDomainSAMLUserEmail, |
| 976 user_manager::User::OAUTH2_TOKEN_STATUS_VALID); | 978 user_manager::User::OAUTH2_TOKEN_STATUS_VALID); |
| 977 | 979 |
| 980 // Give affiliated users appropriate affiliation IDs. |
| 981 std::set<std::string> user_affiliation_ids; |
| 982 user_affiliation_ids.insert(kAffiliationID); |
| 983 chromeos::ChromeUserManager::Get()->SetUserAffiliation(kFirstSAMLUserEmail, |
| 984 user_affiliation_ids); |
| 985 chromeos::ChromeUserManager::Get()->SetUserAffiliation(kSecondSAMLUserEmail, |
| 986 user_affiliation_ids); |
| 987 chromeos::ChromeUserManager::Get()->SetUserAffiliation(kHTTPSAMLUserEmail, |
| 988 user_affiliation_ids); |
| 989 chromeos::ChromeUserManager::Get()->SetUserAffiliation(kNonSAMLUserEmail, |
| 990 user_affiliation_ids); |
| 991 |
| 978 // Set up fake networks. | 992 // Set up fake networks. |
| 979 DBusThreadManager::Get() | 993 DBusThreadManager::Get() |
| 980 ->GetShillManagerClient() | 994 ->GetShillManagerClient() |
| 981 ->GetTestInterface() | 995 ->GetTestInterface() |
| 982 ->SetupDefaultEnvironment(); | 996 ->SetupDefaultEnvironment(); |
| 983 } | 997 } |
| 984 | 998 |
| 985 void SAMLPolicyTest::SetSAMLOfflineSigninTimeLimitPolicy(int limit) { | 999 void SAMLPolicyTest::SetSAMLOfflineSigninTimeLimitPolicy(int limit) { |
| 986 policy::PolicyMap user_policy; | 1000 policy::PolicyMap user_policy; |
| 987 user_policy.Set(policy::key::kSAMLOfflineSigninTimeLimit, | 1001 user_policy.Set(policy::key::kSAMLOfflineSigninTimeLimit, |
| (...skipping 230 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1218 kTestAuthLSIDCookie1); | 1232 kTestAuthLSIDCookie1); |
| 1219 | 1233 |
| 1220 GetCookies(); | 1234 GetCookies(); |
| 1221 EXPECT_EQ(kTestAuthSIDCookie1, GetCookieValue(kGAIASIDCookieName)); | 1235 EXPECT_EQ(kTestAuthSIDCookie1, GetCookieValue(kGAIASIDCookieName)); |
| 1222 EXPECT_EQ(kTestAuthLSIDCookie1, GetCookieValue(kGAIALSIDCookieName)); | 1236 EXPECT_EQ(kTestAuthLSIDCookie1, GetCookieValue(kGAIALSIDCookieName)); |
| 1223 EXPECT_EQ(kSAMLIdPCookieValue1, GetCookieValue(kSAMLIdPCookieName)); | 1237 EXPECT_EQ(kSAMLIdPCookieValue1, GetCookieValue(kSAMLIdPCookieName)); |
| 1224 } | 1238 } |
| 1225 | 1239 |
| 1226 | 1240 |
| 1227 } // namespace chromeos | 1241 } // namespace chromeos |
| OLD | NEW |