Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(209)

Side by Side Diff: chrome/browser/chromeos/policy/enterprise_install_attributes_unittest.cc

Issue 2382833002: Rename policy::EnterpriseInstallAttributes to chromeos::InstallAttributes. (Closed)
Patch Set: Add missing #includes. Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "chrome/browser/chromeos/policy/enterprise_install_attributes.h"
6
7 #include <memory>
8
9 #include "base/bind.h"
10 #include "base/bind_helpers.h"
11 #include "base/files/file_util.h"
12 #include "base/files/scoped_temp_dir.h"
13 #include "base/path_service.h"
14 #include "base/run_loop.h"
15 #include "chrome/browser/chromeos/policy/proto/install_attributes.pb.h"
16 #include "chromeos/chromeos_paths.h"
17 #include "chromeos/cryptohome/cryptohome_util.h"
18 #include "chromeos/dbus/cryptohome_client.h"
19 #include "chromeos/dbus/dbus_thread_manager.h"
20 #include "google_apis/gaia/gaia_auth_util.h"
21 #include "testing/gtest/include/gtest/gtest.h"
22
23 namespace policy {
24
25 namespace cryptohome_util = chromeos::cryptohome_util;
26
27 namespace {
28
29 void CopyLockResult(base::RunLoop* loop,
30 EnterpriseInstallAttributes::LockResult* out,
31 EnterpriseInstallAttributes::LockResult result) {
32 *out = result;
33 loop->Quit();
34 }
35
36 } // namespace
37
38 static const char kTestUser[] = "test@example.com";
39 static const char kTestUserCanonicalize[] = "UPPER.CASE@example.com";
40 static const char kTestDomain[] = "example.com";
41 static const char kTestDeviceId[] = "133750519";
42
43 class EnterpriseInstallAttributesTest : public testing::Test {
44 protected:
45 EnterpriseInstallAttributesTest() {}
46
47 void SetUp() override {
48 ASSERT_TRUE(temp_dir_.CreateUniqueTempDir());
49 ASSERT_TRUE(PathService::OverrideAndCreateIfNeeded(
50 chromeos::FILE_INSTALL_ATTRIBUTES, GetTempPath(), true, false));
51 chromeos::DBusThreadManager::Initialize();
52 install_attributes_.reset(new EnterpriseInstallAttributes(
53 chromeos::DBusThreadManager::Get()->GetCryptohomeClient()));
54 }
55
56 void TearDown() override { chromeos::DBusThreadManager::Shutdown(); }
57
58 base::FilePath GetTempPath() const {
59 base::FilePath temp_path = base::MakeAbsoluteFilePath(temp_dir_.GetPath());
60 return temp_path.Append("install_attrs_test");
61 }
62
63 void SetAttribute(
64 cryptohome::SerializedInstallAttributes* install_attrs_proto,
65 const std::string& name,
66 const std::string& value) {
67 cryptohome::SerializedInstallAttributes::Attribute* attribute;
68 attribute = install_attrs_proto->add_attributes();
69 attribute->set_name(name);
70 attribute->set_value(value);
71 }
72
73 base::MessageLoopForUI message_loop_;
74 base::ScopedTempDir temp_dir_;
75 std::unique_ptr<EnterpriseInstallAttributes> install_attributes_;
76
77 EnterpriseInstallAttributes::LockResult LockDeviceAndWaitForResult(
78 const std::string& user,
79 DeviceMode device_mode,
80 const std::string& device_id) {
81 base::RunLoop loop;
82 EnterpriseInstallAttributes::LockResult result;
83 install_attributes_->LockDevice(
84 user,
85 device_mode,
86 device_id,
87 base::Bind(&CopyLockResult, &loop, &result));
88 loop.Run();
89 return result;
90 }
91 };
92
93 TEST_F(EnterpriseInstallAttributesTest, Lock) {
94 EXPECT_EQ(EnterpriseInstallAttributes::LOCK_SUCCESS,
95 LockDeviceAndWaitForResult(kTestUser, DEVICE_MODE_ENTERPRISE,
96 kTestDeviceId));
97
98 // Locking an already locked device should succeed if the parameters match.
99 EXPECT_EQ(EnterpriseInstallAttributes::LOCK_SUCCESS,
100 LockDeviceAndWaitForResult(kTestUser, DEVICE_MODE_ENTERPRISE,
101 kTestDeviceId));
102
103 // Another user from the same domain should also succeed.
104 EXPECT_EQ(EnterpriseInstallAttributes::LOCK_SUCCESS,
105 LockDeviceAndWaitForResult("test1@example.com",
106 DEVICE_MODE_ENTERPRISE, kTestDeviceId));
107
108 // But another domain should fail.
109 EXPECT_EQ(EnterpriseInstallAttributes::LOCK_WRONG_DOMAIN,
110 LockDeviceAndWaitForResult("test@bluebears.com",
111 DEVICE_MODE_ENTERPRISE, kTestDeviceId));
112
113 // A non-matching mode should fail as well.
114 EXPECT_EQ(EnterpriseInstallAttributes::LOCK_WRONG_MODE,
115 LockDeviceAndWaitForResult(kTestUser, DEVICE_MODE_CONSUMER,
116 kTestDeviceId));
117 }
118
119 TEST_F(EnterpriseInstallAttributesTest, LockCanonicalize) {
120 EXPECT_EQ(EnterpriseInstallAttributes::LOCK_SUCCESS,
121 LockDeviceAndWaitForResult(
122 kTestUserCanonicalize,
123 DEVICE_MODE_ENTERPRISE,
124 kTestDeviceId));
125 EXPECT_EQ(gaia::CanonicalizeEmail(kTestUserCanonicalize),
126 install_attributes_->GetRegistrationUser());
127 }
128
129 TEST_F(EnterpriseInstallAttributesTest, IsEnterpriseDevice) {
130 install_attributes_->Init(GetTempPath());
131 EXPECT_FALSE(install_attributes_->IsEnterpriseDevice());
132 ASSERT_EQ(EnterpriseInstallAttributes::LOCK_SUCCESS,
133 LockDeviceAndWaitForResult(
134 kTestUser,
135 DEVICE_MODE_ENTERPRISE,
136 kTestDeviceId));
137 EXPECT_TRUE(install_attributes_->IsEnterpriseDevice());
138 }
139
140 TEST_F(EnterpriseInstallAttributesTest, GetDomain) {
141 install_attributes_->Init(GetTempPath());
142 EXPECT_EQ(std::string(), install_attributes_->GetDomain());
143 ASSERT_EQ(EnterpriseInstallAttributes::LOCK_SUCCESS,
144 LockDeviceAndWaitForResult(
145 kTestUser,
146 DEVICE_MODE_ENTERPRISE,
147 kTestDeviceId));
148 EXPECT_EQ(kTestDomain, install_attributes_->GetDomain());
149 }
150
151 TEST_F(EnterpriseInstallAttributesTest, GetRegistrationUser) {
152 install_attributes_->Init(GetTempPath());
153 EXPECT_EQ(std::string(), install_attributes_->GetRegistrationUser());
154 ASSERT_EQ(EnterpriseInstallAttributes::LOCK_SUCCESS,
155 LockDeviceAndWaitForResult(
156 kTestUser,
157 DEVICE_MODE_ENTERPRISE,
158 kTestDeviceId));
159 EXPECT_EQ(kTestUser, install_attributes_->GetRegistrationUser());
160 }
161
162 TEST_F(EnterpriseInstallAttributesTest, GetDeviceId) {
163 install_attributes_->Init(GetTempPath());
164 EXPECT_EQ(std::string(), install_attributes_->GetDeviceId());
165 ASSERT_EQ(EnterpriseInstallAttributes::LOCK_SUCCESS,
166 LockDeviceAndWaitForResult(
167 kTestUser,
168 DEVICE_MODE_ENTERPRISE,
169 kTestDeviceId));
170 EXPECT_EQ(kTestDeviceId, install_attributes_->GetDeviceId());
171 }
172
173 TEST_F(EnterpriseInstallAttributesTest, GetMode) {
174 install_attributes_->Init(GetTempPath());
175 EXPECT_EQ(DEVICE_MODE_PENDING, install_attributes_->GetMode());
176 ASSERT_EQ(EnterpriseInstallAttributes::LOCK_SUCCESS,
177 LockDeviceAndWaitForResult(kTestUser, DEVICE_MODE_ENTERPRISE,
178 kTestDeviceId));
179 EXPECT_EQ(DEVICE_MODE_ENTERPRISE, install_attributes_->GetMode());
180 }
181
182 TEST_F(EnterpriseInstallAttributesTest, ConsumerDevice) {
183 install_attributes_->Init(GetTempPath());
184 EXPECT_EQ(DEVICE_MODE_PENDING, install_attributes_->GetMode());
185 // Lock the attributes empty.
186 ASSERT_TRUE(cryptohome_util::InstallAttributesFinalize());
187 base::RunLoop loop;
188 install_attributes_->ReadImmutableAttributes(loop.QuitClosure());
189 loop.Run();
190
191 ASSERT_FALSE(cryptohome_util::InstallAttributesIsFirstInstall());
192 EXPECT_EQ(DEVICE_MODE_CONSUMER, install_attributes_->GetMode());
193 }
194
195 TEST_F(EnterpriseInstallAttributesTest, ConsumerKioskDevice) {
196 install_attributes_->Init(GetTempPath());
197 EXPECT_EQ(DEVICE_MODE_PENDING, install_attributes_->GetMode());
198 // Lock the attributes for consumer kiosk.
199 ASSERT_EQ(EnterpriseInstallAttributes::LOCK_SUCCESS,
200 LockDeviceAndWaitForResult(
201 std::string(),
202 DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH,
203 std::string()));
204
205 ASSERT_FALSE(cryptohome_util::InstallAttributesIsFirstInstall());
206 EXPECT_EQ(DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH,
207 install_attributes_->GetMode());
208 ASSERT_TRUE(install_attributes_->IsConsumerKioskDeviceWithAutoLaunch());
209 }
210
211 TEST_F(EnterpriseInstallAttributesTest, DeviceLockedFromOlderVersion) {
212 install_attributes_->Init(GetTempPath());
213 EXPECT_EQ(DEVICE_MODE_PENDING, install_attributes_->GetMode());
214 // Lock the attributes as if it was done from older Chrome version.
215 ASSERT_TRUE(cryptohome_util::InstallAttributesSet(
216 EnterpriseInstallAttributes::kAttrEnterpriseOwned, "true"));
217 ASSERT_TRUE(cryptohome_util::InstallAttributesSet(
218 EnterpriseInstallAttributes::kAttrEnterpriseUser, kTestUser));
219 ASSERT_TRUE(cryptohome_util::InstallAttributesFinalize());
220 base::RunLoop loop;
221 install_attributes_->ReadImmutableAttributes(loop.QuitClosure());
222 loop.Run();
223
224 ASSERT_FALSE(cryptohome_util::InstallAttributesIsFirstInstall());
225 EXPECT_EQ(DEVICE_MODE_ENTERPRISE, install_attributes_->GetMode());
226 EXPECT_EQ(kTestDomain, install_attributes_->GetDomain());
227 EXPECT_EQ(kTestUser, install_attributes_->GetRegistrationUser());
228 EXPECT_EQ("", install_attributes_->GetDeviceId());
229 }
230
231 TEST_F(EnterpriseInstallAttributesTest, Init) {
232 cryptohome::SerializedInstallAttributes install_attrs_proto;
233 SetAttribute(&install_attrs_proto,
234 EnterpriseInstallAttributes::kAttrEnterpriseOwned, "true");
235 SetAttribute(&install_attrs_proto,
236 EnterpriseInstallAttributes::kAttrEnterpriseUser, kTestUser);
237 const std::string blob(install_attrs_proto.SerializeAsString());
238 ASSERT_EQ(static_cast<int>(blob.size()),
239 base::WriteFile(GetTempPath(), blob.c_str(), blob.size()));
240 install_attributes_->Init(GetTempPath());
241 EXPECT_EQ(DEVICE_MODE_ENTERPRISE, install_attributes_->GetMode());
242 EXPECT_EQ(kTestDomain, install_attributes_->GetDomain());
243 EXPECT_EQ(kTestUser, install_attributes_->GetRegistrationUser());
244 EXPECT_EQ("", install_attributes_->GetDeviceId());
245 }
246
247 TEST_F(EnterpriseInstallAttributesTest, InitForConsumerKiosk) {
248 cryptohome::SerializedInstallAttributes install_attrs_proto;
249 SetAttribute(&install_attrs_proto,
250 EnterpriseInstallAttributes::kAttrConsumerKioskEnabled, "true");
251 const std::string blob(install_attrs_proto.SerializeAsString());
252 ASSERT_EQ(static_cast<int>(blob.size()),
253 base::WriteFile(GetTempPath(), blob.c_str(), blob.size()));
254 install_attributes_->Init(GetTempPath());
255 EXPECT_EQ(DEVICE_MODE_CONSUMER_KIOSK_AUTOLAUNCH,
256 install_attributes_->GetMode());
257 EXPECT_EQ("", install_attributes_->GetDomain());
258 EXPECT_EQ("", install_attributes_->GetRegistrationUser());
259 EXPECT_EQ("", install_attributes_->GetDeviceId());
260 }
261
262 TEST_F(EnterpriseInstallAttributesTest, VerifyFakeInstallAttributesCache) {
263 // This test verifies that FakeCryptohomeClient::InstallAttributesFinalize
264 // writes a cache that EnterpriseInstallAttributes::Init accepts.
265
266 // Verify that no attributes are initially set.
267 install_attributes_->Init(GetTempPath());
268 EXPECT_EQ("", install_attributes_->GetRegistrationUser());
269
270 // Write test values.
271 ASSERT_TRUE(cryptohome_util::InstallAttributesSet(
272 EnterpriseInstallAttributes::kAttrEnterpriseOwned, "true"));
273 ASSERT_TRUE(cryptohome_util::InstallAttributesSet(
274 EnterpriseInstallAttributes::kAttrEnterpriseUser, kTestUser));
275 ASSERT_TRUE(cryptohome_util::InstallAttributesFinalize());
276
277 // Verify that EnterpriseInstallAttributes correctly decodes the stub
278 // cache file.
279 install_attributes_->Init(GetTempPath());
280 EXPECT_EQ(kTestUser, install_attributes_->GetRegistrationUser());
281 }
282
283 } // namespace policy
OLDNEW
« no previous file with comments | « chrome/browser/chromeos/policy/enterprise_install_attributes.cc ('k') | chrome/browser/chromeos/policy/heartbeat_scheduler.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698