| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/policy/core/common/cloud/cloud_policy_validator.h" | 5 #include "components/policy/core/common/cloud/cloud_policy_validator.h" |
| 6 | 6 |
| 7 #include <stdint.h> | 7 #include <stdint.h> |
| 8 | 8 |
| 9 #include <memory> | 9 #include <memory> |
| 10 #include <string> | 10 #include <string> |
| (...skipping 25 matching lines...) Expand all Loading... |
| 36 | 36 |
| 37 namespace { | 37 namespace { |
| 38 | 38 |
| 39 ACTION_P(CheckStatus, expected_status) { | 39 ACTION_P(CheckStatus, expected_status) { |
| 40 EXPECT_EQ(expected_status, arg0->status()); | 40 EXPECT_EQ(expected_status, arg0->status()); |
| 41 }; | 41 }; |
| 42 | 42 |
| 43 class CloudPolicyValidatorTest : public testing::Test { | 43 class CloudPolicyValidatorTest : public testing::Test { |
| 44 public: | 44 public: |
| 45 CloudPolicyValidatorTest() | 45 CloudPolicyValidatorTest() |
| 46 : timestamp_( | 46 : timestamp_(base::Time::FromJavaTime(PolicyBuilder::kFakeTimestamp)), |
| 47 base::Time::UnixEpoch() + | |
| 48 base::TimeDelta::FromMilliseconds(PolicyBuilder::kFakeTimestamp)), | |
| 49 timestamp_option_(CloudPolicyValidatorBase::TIMESTAMP_VALIDATED), | 47 timestamp_option_(CloudPolicyValidatorBase::TIMESTAMP_VALIDATED), |
| 50 dm_token_option_(CloudPolicyValidatorBase::DM_TOKEN_REQUIRED), | 48 dm_token_option_(CloudPolicyValidatorBase::DM_TOKEN_REQUIRED), |
| 51 device_id_option_(CloudPolicyValidatorBase::DEVICE_ID_REQUIRED), | 49 device_id_option_(CloudPolicyValidatorBase::DEVICE_ID_REQUIRED), |
| 52 allow_key_rotation_(true), | 50 allow_key_rotation_(true), |
| 53 existing_dm_token_(PolicyBuilder::kFakeToken), | 51 existing_dm_token_(PolicyBuilder::kFakeToken), |
| 54 existing_device_id_(PolicyBuilder::kFakeDeviceId), | 52 existing_device_id_(PolicyBuilder::kFakeDeviceId), |
| 55 owning_domain_(PolicyBuilder::kFakeDomain), | 53 owning_domain_(PolicyBuilder::kFakeDomain), |
| 56 cached_key_signature_(PolicyBuilder::GetTestSigningKeySignature()) { | 54 cached_key_signature_(PolicyBuilder::GetTestSigningKeySignature()) { |
| 57 policy_.SetDefaultNewSigningKey(); | 55 policy_.SetDefaultNewSigningKey(); |
| 58 } | 56 } |
| (...skipping 148 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 207 } | 205 } |
| 208 | 206 |
| 209 TEST_F(CloudPolicyValidatorTest, IgnoreMissingTimestamp) { | 207 TEST_F(CloudPolicyValidatorTest, IgnoreMissingTimestamp) { |
| 210 timestamp_option_ = CloudPolicyValidatorBase::TIMESTAMP_NOT_VALIDATED; | 208 timestamp_option_ = CloudPolicyValidatorBase::TIMESTAMP_NOT_VALIDATED; |
| 211 policy_.policy_data().clear_timestamp(); | 209 policy_.policy_data().clear_timestamp(); |
| 212 Validate(CheckStatus(CloudPolicyValidatorBase::VALIDATION_OK)); | 210 Validate(CheckStatus(CloudPolicyValidatorBase::VALIDATION_OK)); |
| 213 } | 211 } |
| 214 | 212 |
| 215 TEST_F(CloudPolicyValidatorTest, ErrorOldTimestamp) { | 213 TEST_F(CloudPolicyValidatorTest, ErrorOldTimestamp) { |
| 216 base::Time timestamp(timestamp_ - base::TimeDelta::FromMinutes(5)); | 214 base::Time timestamp(timestamp_ - base::TimeDelta::FromMinutes(5)); |
| 217 policy_.policy_data().set_timestamp( | 215 policy_.policy_data().set_timestamp(timestamp.ToJavaTime()); |
| 218 (timestamp - base::Time::UnixEpoch()).InMilliseconds()); | |
| 219 Validate(CheckStatus(CloudPolicyValidatorBase::VALIDATION_BAD_TIMESTAMP)); | 216 Validate(CheckStatus(CloudPolicyValidatorBase::VALIDATION_BAD_TIMESTAMP)); |
| 220 } | 217 } |
| 221 | 218 |
| 222 TEST_F(CloudPolicyValidatorTest, ErrorNoDMToken) { | 219 TEST_F(CloudPolicyValidatorTest, ErrorNoDMToken) { |
| 223 policy_.policy_data().clear_request_token(); | 220 policy_.policy_data().clear_request_token(); |
| 224 Validate(CheckStatus(CloudPolicyValidatorBase::VALIDATION_BAD_DM_TOKEN)); | 221 Validate(CheckStatus(CloudPolicyValidatorBase::VALIDATION_BAD_DM_TOKEN)); |
| 225 } | 222 } |
| 226 | 223 |
| 227 TEST_F(CloudPolicyValidatorTest, ErrorNoDMTokenNotRequired) { | 224 TEST_F(CloudPolicyValidatorTest, ErrorNoDMTokenNotRequired) { |
| 228 // Even though DM tokens are not required, if the existing policy has a token, | 225 // Even though DM tokens are not required, if the existing policy has a token, |
| (...skipping 186 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 415 | 412 |
| 416 TEST_F(CloudPolicyValidatorTest, NoRotation) { | 413 TEST_F(CloudPolicyValidatorTest, NoRotation) { |
| 417 allow_key_rotation_ = false; | 414 allow_key_rotation_ = false; |
| 418 policy_.UnsetNewSigningKey(); | 415 policy_.UnsetNewSigningKey(); |
| 419 Validate(CheckStatus(CloudPolicyValidatorBase::VALIDATION_OK)); | 416 Validate(CheckStatus(CloudPolicyValidatorBase::VALIDATION_OK)); |
| 420 } | 417 } |
| 421 | 418 |
| 422 } // namespace | 419 } // namespace |
| 423 | 420 |
| 424 } // namespace policy | 421 } // namespace policy |
| OLD | NEW |