| OLD | NEW |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/chromeos/policy/device_policy_cros_browser_test.h" | 5 #include "chrome/browser/chromeos/policy/device_policy_cros_browser_test.h" |
| 6 | 6 |
| 7 #include <string> | 7 #include <string> |
| 8 #include <vector> | 8 #include <vector> |
| 9 | 9 |
| 10 #include "base/file_util.h" | 10 #include "base/file_util.h" |
| 11 #include "base/files/file_path.h" | 11 #include "base/files/file_path.h" |
| 12 #include "base/path_service.h" | 12 #include "base/path_service.h" |
| 13 #include "base/stl_util.h" | 13 #include "base/stl_util.h" |
| 14 #include "chrome/browser/chromeos/policy/device_policy_builder.h" | 14 #include "chrome/browser/chromeos/policy/device_policy_builder.h" |
| 15 #include "chrome/browser/chromeos/policy/enterprise_install_attributes.h" | 15 #include "chrome/browser/chromeos/policy/enterprise_install_attributes.h" |
| 16 #include "chrome/browser/chromeos/policy/proto/install_attributes.pb.h" | 16 #include "chrome/browser/chromeos/policy/proto/install_attributes.pb.h" |
| 17 #include "chrome/common/chrome_paths.h" |
| 17 #include "chromeos/chromeos_paths.h" | 18 #include "chromeos/chromeos_paths.h" |
| 18 #include "chromeos/dbus/fake_dbus_thread_manager.h" | 19 #include "chromeos/dbus/fake_dbus_thread_manager.h" |
| 19 #include "chromeos/dbus/fake_session_manager_client.h" | 20 #include "chromeos/dbus/fake_session_manager_client.h" |
| 20 #include "crypto/rsa_private_key.h" | 21 #include "crypto/rsa_private_key.h" |
| 21 #include "testing/gmock/include/gmock/gmock.h" | 22 #include "testing/gmock/include/gmock/gmock.h" |
| 22 #include "testing/gtest/include/gtest/gtest.h" | 23 #include "testing/gtest/include/gtest/gtest.h" |
| 23 | 24 |
| 24 using ::testing::_; | 25 using ::testing::_; |
| 25 using ::testing::AnyNumber; | 26 using ::testing::AnyNumber; |
| 26 using ::testing::Return; | 27 using ::testing::Return; |
| 27 | 28 |
| 28 namespace policy { | 29 namespace policy { |
| 29 | 30 |
| 30 DevicePolicyCrosTestHelper::DevicePolicyCrosTestHelper() { | 31 DevicePolicyCrosTestHelper::DevicePolicyCrosTestHelper() {} |
| 31 CHECK(temp_dir_.CreateUniqueTempDir()); | |
| 32 } | |
| 33 | 32 |
| 34 DevicePolicyCrosTestHelper::~DevicePolicyCrosTestHelper() {} | 33 DevicePolicyCrosTestHelper::~DevicePolicyCrosTestHelper() {} |
| 35 | 34 |
| 36 void DevicePolicyCrosTestHelper::MarkAsEnterpriseOwned() { | 35 void DevicePolicyCrosTestHelper::MarkAsEnterpriseOwned() { |
| 36 OverridePaths(); |
| 37 |
| 37 cryptohome::SerializedInstallAttributes install_attrs_proto; | 38 cryptohome::SerializedInstallAttributes install_attrs_proto; |
| 38 cryptohome::SerializedInstallAttributes::Attribute* attribute = NULL; | 39 cryptohome::SerializedInstallAttributes::Attribute* attribute = NULL; |
| 39 | 40 |
| 40 attribute = install_attrs_proto.add_attributes(); | 41 attribute = install_attrs_proto.add_attributes(); |
| 41 attribute->set_name(EnterpriseInstallAttributes::kAttrEnterpriseOwned); | 42 attribute->set_name(EnterpriseInstallAttributes::kAttrEnterpriseOwned); |
| 42 attribute->set_value("true"); | 43 attribute->set_value("true"); |
| 43 | 44 |
| 44 attribute = install_attrs_proto.add_attributes(); | 45 attribute = install_attrs_proto.add_attributes(); |
| 45 attribute->set_name(EnterpriseInstallAttributes::kAttrEnterpriseUser); | 46 attribute->set_name(EnterpriseInstallAttributes::kAttrEnterpriseUser); |
| 46 attribute->set_value(device_policy_.policy_data().username()); | 47 attribute->set_value(device_policy_.policy_data().username()); |
| 47 | 48 |
| 48 base::FilePath install_attrs_file = | 49 base::FilePath install_attrs_file; |
| 49 temp_dir_.path().AppendASCII("install_attributes.pb"); | 50 ASSERT_TRUE( |
| 51 PathService::Get(chromeos::FILE_INSTALL_ATTRIBUTES, &install_attrs_file)); |
| 50 const std::string install_attrs_blob( | 52 const std::string install_attrs_blob( |
| 51 install_attrs_proto.SerializeAsString()); | 53 install_attrs_proto.SerializeAsString()); |
| 52 ASSERT_EQ(static_cast<int>(install_attrs_blob.size()), | 54 ASSERT_EQ(static_cast<int>(install_attrs_blob.size()), |
| 53 base::WriteFile(install_attrs_file, | 55 base::WriteFile(install_attrs_file, |
| 54 install_attrs_blob.c_str(), | 56 install_attrs_blob.c_str(), |
| 55 install_attrs_blob.size())); | 57 install_attrs_blob.size())); |
| 56 ASSERT_TRUE(PathService::Override(chromeos::FILE_INSTALL_ATTRIBUTES, | |
| 57 install_attrs_file)); | |
| 58 } | 58 } |
| 59 | 59 |
| 60 void DevicePolicyCrosTestHelper::InstallOwnerKey() { | 60 void DevicePolicyCrosTestHelper::InstallOwnerKey() { |
| 61 base::FilePath owner_key_file = temp_dir_.path().AppendASCII("owner.key"); | 61 OverridePaths(); |
| 62 |
| 63 base::FilePath owner_key_file; |
| 64 ASSERT_TRUE(PathService::Get(chromeos::FILE_OWNER_KEY, &owner_key_file)); |
| 62 std::vector<uint8> owner_key_bits; | 65 std::vector<uint8> owner_key_bits; |
| 63 ASSERT_TRUE( | 66 ASSERT_TRUE( |
| 64 device_policy()->GetSigningKey()->ExportPublicKey(&owner_key_bits)); | 67 device_policy()->GetSigningKey()->ExportPublicKey(&owner_key_bits)); |
| 65 ASSERT_EQ(base::WriteFile( | 68 ASSERT_EQ(base::WriteFile( |
| 66 owner_key_file, | 69 owner_key_file, |
| 67 reinterpret_cast<const char*>(vector_as_array(&owner_key_bits)), | 70 reinterpret_cast<const char*>(vector_as_array(&owner_key_bits)), |
| 68 owner_key_bits.size()), | 71 owner_key_bits.size()), |
| 69 static_cast<int>(owner_key_bits.size())); | 72 static_cast<int>(owner_key_bits.size())); |
| 70 ASSERT_TRUE(PathService::Override(chromeos::FILE_OWNER_KEY, owner_key_file)); | 73 } |
| 74 |
| 75 void DevicePolicyCrosTestHelper::OverridePaths() { |
| 76 // This is usually done by ChromeBrowserMainChromeOS, but some tests |
| 77 // use the overridden paths before ChromeBrowserMain starts. Make sure that |
| 78 // the paths are overridden before using them. |
| 79 base::FilePath user_data_dir; |
| 80 ASSERT_TRUE(PathService::Get(chrome::DIR_USER_DATA, &user_data_dir)); |
| 81 chromeos::RegisterStubPathOverrides(user_data_dir); |
| 71 } | 82 } |
| 72 | 83 |
| 73 DevicePolicyCrosBrowserTest::DevicePolicyCrosBrowserTest() | 84 DevicePolicyCrosBrowserTest::DevicePolicyCrosBrowserTest() |
| 74 : fake_dbus_thread_manager_(new chromeos::FakeDBusThreadManager), | 85 : fake_dbus_thread_manager_(new chromeos::FakeDBusThreadManager), |
| 75 fake_session_manager_client_(new chromeos::FakeSessionManagerClient) { | 86 fake_session_manager_client_(new chromeos::FakeSessionManagerClient) { |
| 76 fake_dbus_thread_manager_->SetFakeClients(); | 87 fake_dbus_thread_manager_->SetFakeClients(); |
| 77 fake_dbus_thread_manager_->SetSessionManagerClient( | 88 fake_dbus_thread_manager_->SetSessionManagerClient( |
| 78 scoped_ptr<chromeos::SessionManagerClient>(fake_session_manager_client_)); | 89 scoped_ptr<chromeos::SessionManagerClient>(fake_session_manager_client_)); |
| 79 } | 90 } |
| 80 | 91 |
| (...skipping 19 matching lines...) Expand all Loading... |
| 100 | 111 |
| 101 void DevicePolicyCrosBrowserTest::RefreshDevicePolicy() { | 112 void DevicePolicyCrosBrowserTest::RefreshDevicePolicy() { |
| 102 // Reset the key to its original state. | 113 // Reset the key to its original state. |
| 103 device_policy()->SetDefaultSigningKey(); | 114 device_policy()->SetDefaultSigningKey(); |
| 104 device_policy()->Build(); | 115 device_policy()->Build(); |
| 105 session_manager_client()->set_device_policy(device_policy()->GetBlob()); | 116 session_manager_client()->set_device_policy(device_policy()->GetBlob()); |
| 106 session_manager_client()->OnPropertyChangeComplete(true); | 117 session_manager_client()->OnPropertyChangeComplete(true); |
| 107 } | 118 } |
| 108 | 119 |
| 109 } // namespace policy | 120 } // namespace policy |
| OLD | NEW |