Chromium Code Reviews| Index: chrome/browser/chromeos/policy/variations_service_policy_browsertest.cc |
| diff --git a/chrome/browser/chromeos/policy/variations_service_policy_browsertest.cc b/chrome/browser/chromeos/policy/variations_service_policy_browsertest.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..33c69aa6ae0362e03e6d262c468f587944e6c616 |
| --- /dev/null |
| +++ b/chrome/browser/chromeos/policy/variations_service_policy_browsertest.cc |
| @@ -0,0 +1,123 @@ |
| +// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include <vector> |
| + |
| +#include "base/file_util.h" |
| +#include "base/files/file_path.h" |
| +#include "base/files/scoped_temp_dir.h" |
| +#include "base/path_service.h" |
| +#include "base/stl_util.h" |
| +#include "chrome/browser/chromeos/cros/cros_in_process_browser_test.h" |
| +#include "chrome/browser/chromeos/policy/device_policy_builder.h" |
| +#include "chrome/browser/chromeos/policy/proto/chrome_device_policy.pb.h" |
| +#include "chrome/browser/metrics/variations/variations_service.h" |
| +#include "chrome/common/chrome_paths.h" |
| +#include "chrome/test/base/testing_browser_process.h" |
| +#include "chromeos/dbus/fake_session_manager_client.h" |
| +#include "chromeos/dbus/mock_dbus_thread_manager.h" |
| +#include "chromeos/dbus/mock_image_burner_client.h" |
| +#include "crypto/rsa_private_key.h" |
| +#include "testing/gmock/include/gmock/gmock.h" |
| +#include "testing/gtest/include/gtest/gtest.h" |
| + |
| +using ::testing::_; |
| +using ::testing::AnyNumber; |
| +using ::testing::Return; |
| + |
| +namespace policy { |
| + |
| +class DeviceVariationsServicePolicyTest : |
| + public chromeos::CrosInProcessBrowserTest { |
| + protected: |
| + DeviceVariationsServicePolicyTest() {}; |
| + |
| + virtual void SetUpInProcessBrowserTestFixture() OVERRIDE { |
| + chromeos::MockDBusThreadManager* mock_dbus_thread_manager = |
| + new chromeos::MockDBusThreadManager; |
| + |
| + EXPECT_CALL(*mock_dbus_thread_manager->mock_image_burner_client(), |
| + ResetEventHandlers()) |
| + .Times(AnyNumber()); |
| + EXPECT_CALL(*mock_dbus_thread_manager->mock_image_burner_client(), |
| + SetEventHandlers(_, _)) |
| + .Times(AnyNumber()); |
|
Mattias Nissler (ping if slow)
2013/04/19 10:37:00
I think these are just for silencing gmock? I don'
satorux1
2013/04/19 11:46:20
We are in the process of removing gmock from chrom
satorux1
2013/04/19 12:04:13
Sorry. my previous comment didn't answer your ques
Mathieu
2013/04/19 17:58:25
Fakes won't work for this browsertest. Seems like
Mathieu
2013/04/19 17:58:25
It doesn't seem used, let me know if you want me t
satorux1
2013/04/22 01:04:35
That's fine. haruki@ will be removing unused mocks
|
| + |
| + SetUpSessionManager(mock_dbus_thread_manager); |
| + |
| + chromeos::DBusThreadManager::InitializeForTesting(mock_dbus_thread_manager); |
| + CrosInProcessBrowserTest::SetUpInProcessBrowserTestFixture(); |
| + } |
| + |
| + void SetUpSessionManager( |
| + chromeos::MockDBusThreadManager* mock_dbus_thread_manager) { |
| + EXPECT_CALL(*mock_dbus_thread_manager, GetSessionManagerClient()) |
| + .WillRepeatedly(Return(&session_manager_client_)); |
| + |
| + // Install the owner key. |
| + ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); |
| + base::FilePath owner_key_file = temp_dir_.path().AppendASCII("owner.key"); |
| + std::vector<uint8> owner_key_bits; |
| + ASSERT_TRUE(device_policy_.signing_key()->ExportPublicKey(&owner_key_bits)); |
| + ASSERT_EQ( |
| + file_util::WriteFile( |
| + owner_key_file, |
| + reinterpret_cast<const char*>(vector_as_array(&owner_key_bits)), |
| + owner_key_bits.size()), |
| + static_cast<int>(owner_key_bits.size())); |
| + ASSERT_TRUE(PathService::Override(chrome::FILE_OWNER_KEY, owner_key_file)); |
| + |
| + // Setup the device policy DeviceVariationsRestrictParameter. |
| + enterprise_management::ChromeDeviceSettingsProto& proto( |
| + device_policy_.payload()); |
| + proto.mutable_variations_parameter()->set_parameter("restricted"); |
| + RefreshDevicePolicy(); |
| + } |
| + |
| + void RefreshDevicePolicy() { |
| + // Reset the key to its original state. |
| + device_policy_.set_signing_key( |
| + policy::PolicyBuilder::CreateTestSigningKey()); |
| + device_policy_.Build(); |
| + // Trick the device into thinking it's enterprise-enrolled by |
| + // removing the local private key. This will allow it to accept |
| + // cloud policy for device owner settings. |
|
Mattias Nissler (ping if slow)
2013/04/19 10:37:00
Not sure who wrote that comment, but it's a bit un
Mathieu
2013/04/19 17:58:25
Done.
|
| + device_policy_.set_signing_key( |
| + make_scoped_ptr<crypto::RSAPrivateKey>(NULL)); |
| + device_policy_.set_new_signing_key( |
| + make_scoped_ptr<crypto::RSAPrivateKey>(NULL)); |
| + session_manager_client_.set_device_policy(device_policy_.GetBlob()); |
| + session_manager_client_.OnPropertyChangeComplete(true); |
| + } |
| + |
| + virtual void TearDownInProcessBrowserTestFixture() OVERRIDE { |
| + CrosInProcessBrowserTest::TearDownInProcessBrowserTestFixture(); |
| + chromeos::DBusThreadManager::Shutdown(); |
| + } |
| + |
| + private: |
| + // Mock out policy loads/stores from/to the device. |
| + chromeos::FakeSessionManagerClient session_manager_client_; |
| + |
| + // Stores the device owner key. |
| + base::ScopedTempDir temp_dir_; |
| + |
| + // Carries Chrome OS device policies for tests. |
| + DevicePolicyBuilder device_policy_; |
| + |
| + DISALLOW_COPY_AND_ASSIGN(DeviceVariationsServicePolicyTest); |
| +}; |
| + |
| +IN_PROC_BROWSER_TEST_F(DeviceVariationsServicePolicyTest, VariationsURLValid) { |
| + const std::string default_variations_url = |
| + chrome_variations::VariationsService:: |
| + GetDefaultVariationsServerURLForTesting(); |
| + |
| + // Device policy has updated the cros settings. |
| + EXPECT_EQ(default_variations_url + "?restrict=restricted", |
| + chrome_variations::VariationsService::GetVariationsServerURL( |
| + g_browser_process->local_state()).spec()); |
| +} |
| + |
| +} // namespace policy |