| OLD | NEW |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <map> | 5 #include <map> |
| 6 #include <string> | 6 #include <string> |
| 7 | 7 |
| 8 #include "base/basictypes.h" | 8 #include "base/basictypes.h" |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/callback.h" | 10 #include "base/callback.h" |
| 11 #include "base/command_line.h" | 11 #include "base/command_line.h" |
| 12 #include "base/file_util.h" | 12 #include "base/file_util.h" |
| 13 #include "base/files/file_path.h" | 13 #include "base/files/file_path.h" |
| 14 #include "base/files/scoped_temp_dir.h" | 14 #include "base/files/scoped_temp_dir.h" |
| 15 #include "base/message_loop.h" | 15 #include "base/message_loop.h" |
| 16 #include "base/path_service.h" | 16 #include "base/path_service.h" |
| 17 #include "base/run_loop.h" | 17 #include "base/run_loop.h" |
| 18 #include "base/stl_util.h" | 18 #include "base/stl_util.h" |
| 19 #include "base/string_util.h" | 19 #include "base/string_util.h" |
| 20 #include "base/utf_string_conversions.h" | 20 #include "base/utf_string_conversions.h" |
| 21 #include "chrome/browser/browser_process.h" | 21 #include "chrome/browser/browser_process.h" |
| 22 #include "chrome/browser/chromeos/login/existing_user_controller.h" | 22 #include "chrome/browser/chromeos/login/existing_user_controller.h" |
| 23 #include "chrome/browser/chromeos/login/user.h" | 23 #include "chrome/browser/chromeos/login/user.h" |
| 24 #include "chrome/browser/chromeos/login/user_manager.h" | 24 #include "chrome/browser/chromeos/login/user_manager.h" |
| 25 #include "chrome/browser/chromeos/login/wizard_controller.h" | 25 #include "chrome/browser/chromeos/login/wizard_controller.h" |
| 26 #include "chrome/browser/chromeos/policy/device_local_account.h" |
| 26 #include "chrome/browser/chromeos/policy/device_policy_builder.h" | 27 #include "chrome/browser/chromeos/policy/device_policy_builder.h" |
| 27 #include "chrome/browser/chromeos/policy/enterprise_install_attributes.h" | 28 #include "chrome/browser/chromeos/policy/enterprise_install_attributes.h" |
| 28 #include "chrome/browser/lifetime/application_lifetime.h" | 29 #include "chrome/browser/lifetime/application_lifetime.h" |
| 29 #include "chrome/browser/policy/cloud/cloud_policy_constants.h" | 30 #include "chrome/browser/policy/cloud/cloud_policy_constants.h" |
| 30 #include "chrome/browser/policy/cloud/policy_builder.h" | 31 #include "chrome/browser/policy/cloud/policy_builder.h" |
| 31 #include "chrome/browser/policy/policy_service.h" | 32 #include "chrome/browser/policy/policy_service.h" |
| 32 #include "chrome/browser/policy/proto/chromeos/chrome_device_policy.pb.h" | 33 #include "chrome/browser/policy/proto/chromeos/chrome_device_policy.pb.h" |
| 33 #include "chrome/browser/policy/proto/chromeos/install_attributes.pb.h" | 34 #include "chrome/browser/policy/proto/chromeos/install_attributes.pb.h" |
| 34 #include "chrome/browser/policy/test/local_policy_test_server.h" | 35 #include "chrome/browser/policy/test/local_policy_test_server.h" |
| 35 #include "chrome/browser/prefs/session_startup_pref.h" | 36 #include "chrome/browser/prefs/session_startup_pref.h" |
| (...skipping 72 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 108 ConditionTestCallback callback_; | 109 ConditionTestCallback callback_; |
| 109 base::RunLoop run_loop_; | 110 base::RunLoop run_loop_; |
| 110 | 111 |
| 111 DISALLOW_COPY_AND_ASSIGN(NotificationWatcher); | 112 DISALLOW_COPY_AND_ASSIGN(NotificationWatcher); |
| 112 }; | 113 }; |
| 113 | 114 |
| 114 } // namespace | 115 } // namespace |
| 115 | 116 |
| 116 class DeviceLocalAccountTest : public InProcessBrowserTest { | 117 class DeviceLocalAccountTest : public InProcessBrowserTest { |
| 117 protected: | 118 protected: |
| 118 DeviceLocalAccountTest() {} | 119 DeviceLocalAccountTest() |
| 120 : user_id_1_(GenerateDeviceLocalAccountUserId( |
| 121 kAccountId1, DeviceLocalAccount::TYPE_PUBLIC_SESSION)), |
| 122 user_id_2_(GenerateDeviceLocalAccountUserId( |
| 123 kAccountId2, DeviceLocalAccount::TYPE_PUBLIC_SESSION)) {} |
| 124 |
| 119 virtual ~DeviceLocalAccountTest() {} | 125 virtual ~DeviceLocalAccountTest() {} |
| 120 | 126 |
| 121 virtual void SetUp() OVERRIDE { | 127 virtual void SetUp() OVERRIDE { |
| 122 // Configure and start the test server. | 128 // Configure and start the test server. |
| 123 scoped_ptr<crypto::RSAPrivateKey> signing_key( | 129 scoped_ptr<crypto::RSAPrivateKey> signing_key( |
| 124 PolicyBuilder::CreateTestSigningKey()); | 130 PolicyBuilder::CreateTestSigningKey()); |
| 125 ASSERT_TRUE(test_server_.SetSigningKey(signing_key.get())); | 131 ASSERT_TRUE(test_server_.SetSigningKey(signing_key.get())); |
| 126 signing_key.reset(); | 132 signing_key.reset(); |
| 127 test_server_.RegisterClient(PolicyBuilder::kFakeToken, | 133 test_server_.RegisterClient(PolicyBuilder::kFakeToken, |
| 128 PolicyBuilder::kFakeDeviceId); | 134 PolicyBuilder::kFakeDeviceId); |
| (...skipping 138 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 267 kAccountId2).empty()); | 273 kAccountId2).empty()); |
| 268 } | 274 } |
| 269 | 275 |
| 270 void CheckPublicSessionPresent(const std::string& id) { | 276 void CheckPublicSessionPresent(const std::string& id) { |
| 271 const chromeos::User* user = chromeos::UserManager::Get()->FindUser(id); | 277 const chromeos::User* user = chromeos::UserManager::Get()->FindUser(id); |
| 272 ASSERT_TRUE(user); | 278 ASSERT_TRUE(user); |
| 273 EXPECT_EQ(id, user->email()); | 279 EXPECT_EQ(id, user->email()); |
| 274 EXPECT_EQ(chromeos::User::USER_TYPE_PUBLIC_ACCOUNT, user->GetType()); | 280 EXPECT_EQ(chromeos::User::USER_TYPE_PUBLIC_ACCOUNT, user->GetType()); |
| 275 } | 281 } |
| 276 | 282 |
| 283 const std::string user_id_1_; |
| 284 const std::string user_id_2_; |
| 285 |
| 277 LocalPolicyTestServer test_server_; | 286 LocalPolicyTestServer test_server_; |
| 278 base::ScopedTempDir temp_dir_; | 287 base::ScopedTempDir temp_dir_; |
| 279 | 288 |
| 280 chromeos::FakeSessionManagerClient* session_manager_client_; | 289 chromeos::FakeSessionManagerClient* session_manager_client_; |
| 281 }; | 290 }; |
| 282 | 291 |
| 283 static bool IsKnownUser(const std::string& account_id) { | 292 static bool IsKnownUser(const std::string& account_id) { |
| 284 return chromeos::UserManager::Get()->IsKnownUser(account_id); | 293 return chromeos::UserManager::Get()->IsKnownUser(account_id); |
| 285 } | 294 } |
| 286 | 295 |
| 287 IN_PROC_BROWSER_TEST_F(DeviceLocalAccountTest, LoginScreen) { | 296 IN_PROC_BROWSER_TEST_F(DeviceLocalAccountTest, LoginScreen) { |
| 288 NotificationWatcher(chrome::NOTIFICATION_USER_LIST_CHANGED, | 297 NotificationWatcher(chrome::NOTIFICATION_USER_LIST_CHANGED, |
| 289 base::Bind(&IsKnownUser, kAccountId1)).Run(); | 298 base::Bind(&IsKnownUser, user_id_1_)).Run(); |
| 290 NotificationWatcher(chrome::NOTIFICATION_USER_LIST_CHANGED, | 299 NotificationWatcher(chrome::NOTIFICATION_USER_LIST_CHANGED, |
| 291 base::Bind(&IsKnownUser, kAccountId2)).Run(); | 300 base::Bind(&IsKnownUser, user_id_2_)).Run(); |
| 292 | 301 |
| 293 CheckPublicSessionPresent(kAccountId1); | 302 CheckPublicSessionPresent(user_id_1_); |
| 294 CheckPublicSessionPresent(kAccountId2); | 303 CheckPublicSessionPresent(user_id_2_); |
| 295 } | 304 } |
| 296 | 305 |
| 297 static bool DisplayNameMatches(const std::string& account_id, | 306 static bool DisplayNameMatches(const std::string& account_id, |
| 298 const std::string& display_name) { | 307 const std::string& display_name) { |
| 299 const chromeos::User* user = | 308 const chromeos::User* user = |
| 300 chromeos::UserManager::Get()->FindUser(account_id); | 309 chromeos::UserManager::Get()->FindUser(account_id); |
| 301 if (!user || user->display_name().empty()) | 310 if (!user || user->display_name().empty()) |
| 302 return false; | 311 return false; |
| 303 EXPECT_EQ(UTF8ToUTF16(display_name), user->display_name()); | 312 EXPECT_EQ(UTF8ToUTF16(display_name), user->display_name()); |
| 304 return true; | 313 return true; |
| 305 } | 314 } |
| 306 | 315 |
| 307 IN_PROC_BROWSER_TEST_F(DeviceLocalAccountTest, DisplayName) { | 316 IN_PROC_BROWSER_TEST_F(DeviceLocalAccountTest, DisplayName) { |
| 308 NotificationWatcher( | 317 NotificationWatcher( |
| 309 chrome::NOTIFICATION_USER_LIST_CHANGED, | 318 chrome::NOTIFICATION_USER_LIST_CHANGED, |
| 310 base::Bind(&DisplayNameMatches, kAccountId1, kDisplayName1)).Run(); | 319 base::Bind(&DisplayNameMatches, user_id_1_, kDisplayName1)).Run(); |
| 311 } | 320 } |
| 312 | 321 |
| 313 IN_PROC_BROWSER_TEST_F(DeviceLocalAccountTest, PolicyDownload) { | 322 IN_PROC_BROWSER_TEST_F(DeviceLocalAccountTest, PolicyDownload) { |
| 314 // Policy for kAccountId2 is not installed in session_manager_client, make | 323 // Policy for kAccountId2 is not installed in session_manager_client, make |
| 315 // sure it gets fetched from the server. Note that the test setup doesn't set | 324 // sure it gets fetched from the server. Note that the test setup doesn't set |
| 316 // up policy for kAccountId2, so the presence of the display name can be used | 325 // up policy for kAccountId2, so the presence of the display name can be used |
| 317 // as signal to indicate successful policy download. | 326 // as signal to indicate successful policy download. |
| 318 NotificationWatcher( | 327 NotificationWatcher( |
| 319 chrome::NOTIFICATION_USER_LIST_CHANGED, | 328 chrome::NOTIFICATION_USER_LIST_CHANGED, |
| 320 base::Bind(&DisplayNameMatches, kAccountId2, kDisplayName2)).Run(); | 329 base::Bind(&DisplayNameMatches, user_id_2_, kDisplayName2)).Run(); |
| 321 | 330 |
| 322 // Sanity check: The policy should be present now. | 331 // Sanity check: The policy should be present now. |
| 323 ASSERT_FALSE(session_manager_client_->device_local_account_policy( | 332 ASSERT_FALSE(session_manager_client_->device_local_account_policy( |
| 324 kAccountId2).empty()); | 333 kAccountId2).empty()); |
| 325 } | 334 } |
| 326 | 335 |
| 327 static bool IsNotKnownUser(const std::string& account_id) { | 336 static bool IsNotKnownUser(const std::string& account_id) { |
| 328 return !IsKnownUser(account_id); | 337 return !IsKnownUser(account_id); |
| 329 } | 338 } |
| 330 | 339 |
| 331 IN_PROC_BROWSER_TEST_F(DeviceLocalAccountTest, DevicePolicyChange) { | 340 IN_PROC_BROWSER_TEST_F(DeviceLocalAccountTest, DevicePolicyChange) { |
| 332 // Wait until the login screen is up. | 341 // Wait until the login screen is up. |
| 333 NotificationWatcher(chrome::NOTIFICATION_USER_LIST_CHANGED, | 342 NotificationWatcher(chrome::NOTIFICATION_USER_LIST_CHANGED, |
| 334 base::Bind(&IsKnownUser, kAccountId1)).Run(); | 343 base::Bind(&IsKnownUser, user_id_1_)).Run(); |
| 335 NotificationWatcher(chrome::NOTIFICATION_USER_LIST_CHANGED, | 344 NotificationWatcher(chrome::NOTIFICATION_USER_LIST_CHANGED, |
| 336 base::Bind(&IsKnownUser, kAccountId2)).Run(); | 345 base::Bind(&IsKnownUser, user_id_2_)).Run(); |
| 337 | 346 |
| 338 // Update policy to remove kAccountId2. | 347 // Update policy to remove kAccountId2. |
| 339 em::ChromeDeviceSettingsProto policy; | 348 em::ChromeDeviceSettingsProto policy; |
| 340 policy.mutable_show_user_names()->set_show_user_names(true); | 349 policy.mutable_show_user_names()->set_show_user_names(true); |
| 341 em::DeviceLocalAccountInfoProto* account1 = | 350 em::DeviceLocalAccountInfoProto* account1 = |
| 342 policy.mutable_device_local_accounts()->add_account(); | 351 policy.mutable_device_local_accounts()->add_account(); |
| 343 account1->set_account_id(kAccountId1); | 352 account1->set_account_id(kAccountId1); |
| 344 account1->set_type( | 353 account1->set_type( |
| 345 em::DeviceLocalAccountInfoProto::ACCOUNT_TYPE_PUBLIC_SESSION); | 354 em::DeviceLocalAccountInfoProto::ACCOUNT_TYPE_PUBLIC_SESSION); |
| 346 | 355 |
| 347 test_server_.UpdatePolicy(dm_protocol::kChromeDevicePolicyType, std::string(), | 356 test_server_.UpdatePolicy(dm_protocol::kChromeDevicePolicyType, std::string(), |
| 348 policy.SerializeAsString()); | 357 policy.SerializeAsString()); |
| 349 g_browser_process->policy_service()->RefreshPolicies(base::Closure()); | 358 g_browser_process->policy_service()->RefreshPolicies(base::Closure()); |
| 350 | 359 |
| 351 // Make sure the second device-local account disappears. | 360 // Make sure the second device-local account disappears. |
| 352 NotificationWatcher(chrome::NOTIFICATION_USER_LIST_CHANGED, | 361 NotificationWatcher(chrome::NOTIFICATION_USER_LIST_CHANGED, |
| 353 base::Bind(&IsNotKnownUser, kAccountId2)).Run(); | 362 base::Bind(&IsNotKnownUser, user_id_2_)).Run(); |
| 354 } | 363 } |
| 355 | 364 |
| 356 static bool IsSessionStarted() { | 365 static bool IsSessionStarted() { |
| 357 return chromeos::UserManager::Get()->IsSessionStarted(); | 366 return chromeos::UserManager::Get()->IsSessionStarted(); |
| 358 } | 367 } |
| 359 | 368 |
| 360 IN_PROC_BROWSER_TEST_F(DeviceLocalAccountTest, StartSession) { | 369 IN_PROC_BROWSER_TEST_F(DeviceLocalAccountTest, StartSession) { |
| 361 // This observes the display name becoming available as this indicates | 370 // This observes the display name becoming available as this indicates |
| 362 // device-local account policy is fully loaded, which is a prerequisite for | 371 // device-local account policy is fully loaded, which is a prerequisite for |
| 363 // successful login. | 372 // successful login. |
| 364 NotificationWatcher( | 373 NotificationWatcher( |
| 365 chrome::NOTIFICATION_USER_LIST_CHANGED, | 374 chrome::NOTIFICATION_USER_LIST_CHANGED, |
| 366 base::Bind(&DisplayNameMatches, kAccountId1, kDisplayName1)).Run(); | 375 base::Bind(&DisplayNameMatches, user_id_1_, kDisplayName1)).Run(); |
| 367 | 376 |
| 368 chromeos::ExistingUserController* controller = | 377 chromeos::ExistingUserController* controller = |
| 369 chromeos::ExistingUserController::current_controller(); | 378 chromeos::ExistingUserController::current_controller(); |
| 370 ASSERT_TRUE(controller); | 379 ASSERT_TRUE(controller); |
| 371 controller->LoginAsPublicAccount(kAccountId1); | 380 controller->LoginAsPublicAccount(user_id_1_); |
| 372 | 381 |
| 373 // Wait for the session to start. | 382 // Wait for the session to start. |
| 374 NotificationWatcher(chrome::NOTIFICATION_SESSION_STARTED, | 383 NotificationWatcher(chrome::NOTIFICATION_SESSION_STARTED, |
| 375 base::Bind(IsSessionStarted)).Run(); | 384 base::Bind(IsSessionStarted)).Run(); |
| 376 | 385 |
| 377 // Check that the startup pages specified in policy were opened. | 386 // Check that the startup pages specified in policy were opened. |
| 378 EXPECT_EQ(1U, chrome::GetTotalBrowserCount()); | 387 EXPECT_EQ(1U, chrome::GetTotalBrowserCount()); |
| 379 Browser* browser = | 388 Browser* browser = |
| 380 chrome::FindLastActiveWithHostDesktopType(chrome::HOST_DESKTOP_TYPE_ASH); | 389 chrome::FindLastActiveWithHostDesktopType(chrome::HOST_DESKTOP_TYPE_ASH); |
| 381 ASSERT_TRUE(browser); | 390 ASSERT_TRUE(browser); |
| 382 | 391 |
| 383 TabStripModel* tabs = browser->tab_strip_model(); | 392 TabStripModel* tabs = browser->tab_strip_model(); |
| 384 ASSERT_TRUE(tabs); | 393 ASSERT_TRUE(tabs); |
| 385 int expected_tab_count = static_cast<int>(arraysize(kStartupURLs)); | 394 int expected_tab_count = static_cast<int>(arraysize(kStartupURLs)); |
| 386 EXPECT_EQ(expected_tab_count, tabs->count()); | 395 EXPECT_EQ(expected_tab_count, tabs->count()); |
| 387 for (int i = 0; i < expected_tab_count && i < tabs->count(); ++i) | 396 for (int i = 0; i < expected_tab_count && i < tabs->count(); ++i) |
| 388 EXPECT_EQ(GURL(kStartupURLs[i]), tabs->GetWebContentsAt(i)->GetURL()); | 397 EXPECT_EQ(GURL(kStartupURLs[i]), tabs->GetWebContentsAt(i)->GetURL()); |
| 389 } | 398 } |
| 390 | 399 |
| 391 } // namespace policy | 400 } // namespace policy |
| OLD | NEW |