OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/policy/user_cloud_policy_store_chromeos.h" | 5 #include "chrome/browser/chromeos/policy/user_cloud_policy_store_chromeos.h" |
6 | 6 |
7 #include <stdint.h> | 7 #include <stdint.h> |
8 | 8 |
9 #include <memory> | 9 #include <memory> |
10 #include <string> | 10 #include <string> |
(...skipping 17 matching lines...) Expand all Loading... |
28 #include "components/policy/core/common/policy_types.h" | 28 #include "components/policy/core/common/policy_types.h" |
29 #include "components/policy/policy_constants.h" | 29 #include "components/policy/policy_constants.h" |
30 #include "components/policy/proto/cloud_policy.pb.h" | 30 #include "components/policy/proto/cloud_policy.pb.h" |
31 #include "components/policy/proto/device_management_local.pb.h" | 31 #include "components/policy/proto/device_management_local.pb.h" |
32 #include "crypto/rsa_private_key.h" | 32 #include "crypto/rsa_private_key.h" |
33 #include "testing/gmock/include/gmock/gmock.h" | 33 #include "testing/gmock/include/gmock/gmock.h" |
34 #include "testing/gtest/include/gtest/gtest.h" | 34 #include "testing/gtest/include/gtest/gtest.h" |
35 | 35 |
36 namespace em = enterprise_management; | 36 namespace em = enterprise_management; |
37 | 37 |
| 38 using RetrievePolicyResponseType = |
| 39 chromeos::SessionManagerClient::RetrievePolicyResponseType; |
| 40 |
38 using testing::AllOf; | 41 using testing::AllOf; |
39 using testing::AnyNumber; | 42 using testing::AnyNumber; |
40 using testing::Eq; | 43 using testing::Eq; |
41 using testing::Mock; | 44 using testing::Mock; |
42 using testing::Property; | 45 using testing::Property; |
43 using testing::Return; | 46 using testing::Return; |
44 using testing::SaveArg; | 47 using testing::SaveArg; |
| 48 using testing::SetArgPointee; |
45 using testing::_; | 49 using testing::_; |
46 | 50 |
47 namespace policy { | 51 namespace policy { |
48 | 52 |
49 namespace { | 53 namespace { |
50 | 54 |
51 const char kSanitizedUsername[] = | 55 const char kSanitizedUsername[] = |
52 "0123456789ABCDEF0123456789ABCDEF012345678@example.com"; | 56 "0123456789ABCDEF0123456789ABCDEF012345678@example.com"; |
53 const char kDefaultHomepage[] = "http://chromium.org"; | 57 const char kDefaultHomepage[] = "http://chromium.org"; |
54 | 58 |
(...skipping 49 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
104 chromeos::SessionManagerClient::RetrievePolicyCallback retrieve_callback; | 108 chromeos::SessionManagerClient::RetrievePolicyCallback retrieve_callback; |
105 EXPECT_CALL(session_manager_client_, | 109 EXPECT_CALL(session_manager_client_, |
106 RetrievePolicyForUser(cryptohome_id_, _)) | 110 RetrievePolicyForUser(cryptohome_id_, _)) |
107 .WillOnce(SaveArg<1>(&retrieve_callback)); | 111 .WillOnce(SaveArg<1>(&retrieve_callback)); |
108 store_->Load(); | 112 store_->Load(); |
109 base::RunLoop().RunUntilIdle(); | 113 base::RunLoop().RunUntilIdle(); |
110 Mock::VerifyAndClearExpectations(&session_manager_client_); | 114 Mock::VerifyAndClearExpectations(&session_manager_client_); |
111 ASSERT_FALSE(retrieve_callback.is_null()); | 115 ASSERT_FALSE(retrieve_callback.is_null()); |
112 | 116 |
113 // Run the callback. | 117 // Run the callback. |
114 retrieve_callback.Run(response); | 118 retrieve_callback.Run(response, RetrievePolicyResponseType::SUCCESS); |
115 base::RunLoop().RunUntilIdle(); | 119 base::RunLoop().RunUntilIdle(); |
116 } | 120 } |
117 | 121 |
118 // Verifies that store_->policy_map() has the HomepageLocation entry with | 122 // Verifies that store_->policy_map() has the HomepageLocation entry with |
119 // the |expected_value|. | 123 // the |expected_value|. |
120 void VerifyPolicyMap(const char* expected_value) { | 124 void VerifyPolicyMap(const char* expected_value) { |
121 EXPECT_EQ(1U, store_->policy_map().size()); | 125 EXPECT_EQ(1U, store_->policy_map().size()); |
122 const PolicyMap::Entry* entry = | 126 const PolicyMap::Entry* entry = |
123 store_->policy_map().Get(key::kHomepageLocation); | 127 store_->policy_map().Get(key::kHomepageLocation); |
124 ASSERT_TRUE(entry); | 128 ASSERT_TRUE(entry); |
(...skipping 52 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
177 .WillOnce(SaveArg<1>(&retrieve_callback)); | 181 .WillOnce(SaveArg<1>(&retrieve_callback)); |
178 store_callback.Run(true); | 182 store_callback.Run(true); |
179 base::RunLoop().RunUntilIdle(); | 183 base::RunLoop().RunUntilIdle(); |
180 EXPECT_TRUE(previous_policy.Equals(store_->policy_map())); | 184 EXPECT_TRUE(previous_policy.Equals(store_->policy_map())); |
181 EXPECT_EQ(initial_status, store_->status()); | 185 EXPECT_EQ(initial_status, store_->status()); |
182 Mock::VerifyAndClearExpectations(&session_manager_client_); | 186 Mock::VerifyAndClearExpectations(&session_manager_client_); |
183 ASSERT_FALSE(retrieve_callback.is_null()); | 187 ASSERT_FALSE(retrieve_callback.is_null()); |
184 | 188 |
185 // Finish the retrieve callback. | 189 // Finish the retrieve callback. |
186 EXPECT_CALL(observer_, OnStoreLoaded(store_.get())); | 190 EXPECT_CALL(observer_, OnStoreLoaded(store_.get())); |
187 retrieve_callback.Run(policy_.GetBlob()); | 191 retrieve_callback.Run(policy_.GetBlob(), |
| 192 RetrievePolicyResponseType::SUCCESS); |
188 base::RunLoop().RunUntilIdle(); | 193 base::RunLoop().RunUntilIdle(); |
189 ASSERT_TRUE(store_->policy()); | 194 ASSERT_TRUE(store_->policy()); |
190 EXPECT_EQ(policy_.policy_data().SerializeAsString(), | 195 EXPECT_EQ(policy_.policy_data().SerializeAsString(), |
191 store_->policy()->SerializeAsString()); | 196 store_->policy()->SerializeAsString()); |
192 VerifyPolicyMap(new_value); | 197 VerifyPolicyMap(new_value); |
193 EXPECT_EQ(CloudPolicyStore::STATUS_OK, store_->status()); | 198 EXPECT_EQ(CloudPolicyStore::STATUS_OK, store_->status()); |
194 } | 199 } |
195 | 200 |
196 void VerifyStoreHasValidationError() { | 201 void VerifyStoreHasValidationError() { |
197 EXPECT_FALSE(store_->policy()); | 202 EXPECT_FALSE(store_->policy()); |
(...skipping 288 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
486 policy_.policy().mutable_policy_data_signature()->append("garbage"); | 491 policy_.policy().mutable_policy_data_signature()->append("garbage"); |
487 ExpectError(CloudPolicyStore::STATUS_VALIDATION_ERROR); | 492 ExpectError(CloudPolicyStore::STATUS_VALIDATION_ERROR); |
488 ASSERT_NO_FATAL_FAILURE(PerformPolicyLoad(policy_.GetBlob())); | 493 ASSERT_NO_FATAL_FAILURE(PerformPolicyLoad(policy_.GetBlob())); |
489 VerifyStoreHasValidationError(); | 494 VerifyStoreHasValidationError(); |
490 EXPECT_EQ(std::string(), store_->policy_signature_public_key()); | 495 EXPECT_EQ(std::string(), store_->policy_signature_public_key()); |
491 } | 496 } |
492 | 497 |
493 TEST_F(UserCloudPolicyStoreChromeOSTest, LoadImmediately) { | 498 TEST_F(UserCloudPolicyStoreChromeOSTest, LoadImmediately) { |
494 EXPECT_CALL(observer_, OnStoreLoaded(store_.get())); | 499 EXPECT_CALL(observer_, OnStoreLoaded(store_.get())); |
495 EXPECT_CALL(session_manager_client_, | 500 EXPECT_CALL(session_manager_client_, |
496 BlockingRetrievePolicyForUser(cryptohome_id_)) | 501 BlockingRetrievePolicyForUser(cryptohome_id_, _)) |
497 .WillOnce(Return(policy_.GetBlob())); | 502 .WillOnce(DoAll(SetArgPointee<1>(policy_.GetBlob()), |
| 503 Return(RetrievePolicyResponseType::SUCCESS))); |
498 EXPECT_CALL(cryptohome_client_, BlockingGetSanitizedUsername(cryptohome_id_)) | 504 EXPECT_CALL(cryptohome_client_, BlockingGetSanitizedUsername(cryptohome_id_)) |
499 .WillOnce(Return(kSanitizedUsername)); | 505 .WillOnce(Return(kSanitizedUsername)); |
500 | 506 |
501 EXPECT_FALSE(store_->policy()); | 507 EXPECT_FALSE(store_->policy()); |
502 store_->LoadImmediately(); | 508 store_->LoadImmediately(); |
503 // Note: verify that the |observer_| got notified synchronously, without | 509 // Note: verify that the |observer_| got notified synchronously, without |
504 // having to spin the current loop. TearDown() will flush the loop so this | 510 // having to spin the current loop. TearDown() will flush the loop so this |
505 // must be done within the test. | 511 // must be done within the test. |
506 Mock::VerifyAndClearExpectations(&observer_); | 512 Mock::VerifyAndClearExpectations(&observer_); |
507 Mock::VerifyAndClearExpectations(&session_manager_client_); | 513 Mock::VerifyAndClearExpectations(&session_manager_client_); |
508 Mock::VerifyAndClearExpectations(&cryptohome_client_); | 514 Mock::VerifyAndClearExpectations(&cryptohome_client_); |
509 | 515 |
510 // The policy should become available without having to spin any loops. | 516 // The policy should become available without having to spin any loops. |
511 ASSERT_TRUE(store_->policy()); | 517 ASSERT_TRUE(store_->policy()); |
512 EXPECT_EQ(policy_.policy_data().SerializeAsString(), | 518 EXPECT_EQ(policy_.policy_data().SerializeAsString(), |
513 store_->policy()->SerializeAsString()); | 519 store_->policy()->SerializeAsString()); |
514 VerifyPolicyMap(kDefaultHomepage); | 520 VerifyPolicyMap(kDefaultHomepage); |
515 EXPECT_EQ(CloudPolicyStore::STATUS_OK, store_->status()); | 521 EXPECT_EQ(CloudPolicyStore::STATUS_OK, store_->status()); |
516 EXPECT_EQ(policy_.GetPublicSigningKeyAsString(), | 522 EXPECT_EQ(policy_.GetPublicSigningKeyAsString(), |
517 store_->policy_signature_public_key()); | 523 store_->policy_signature_public_key()); |
518 } | 524 } |
519 | 525 |
520 TEST_F(UserCloudPolicyStoreChromeOSTest, LoadImmediatelyNoPolicy) { | 526 TEST_F(UserCloudPolicyStoreChromeOSTest, LoadImmediatelyNoPolicy) { |
521 EXPECT_CALL(observer_, OnStoreLoaded(store_.get())); | 527 EXPECT_CALL(observer_, OnStoreLoaded(store_.get())); |
522 EXPECT_CALL(session_manager_client_, | 528 EXPECT_CALL(session_manager_client_, |
523 BlockingRetrievePolicyForUser(cryptohome_id_)) | 529 BlockingRetrievePolicyForUser(cryptohome_id_, _)) |
524 .WillOnce(Return("")); | 530 .WillOnce(DoAll(SetArgPointee<1>(""), |
| 531 Return(RetrievePolicyResponseType::SUCCESS))); |
525 | 532 |
526 EXPECT_FALSE(store_->policy()); | 533 EXPECT_FALSE(store_->policy()); |
527 store_->LoadImmediately(); | 534 store_->LoadImmediately(); |
528 Mock::VerifyAndClearExpectations(&observer_); | 535 Mock::VerifyAndClearExpectations(&observer_); |
529 Mock::VerifyAndClearExpectations(&session_manager_client_); | 536 Mock::VerifyAndClearExpectations(&session_manager_client_); |
530 | 537 |
531 EXPECT_FALSE(store_->policy()); | 538 EXPECT_FALSE(store_->policy()); |
532 EXPECT_TRUE(store_->policy_map().empty()); | 539 EXPECT_TRUE(store_->policy_map().empty()); |
533 EXPECT_EQ(CloudPolicyStore::STATUS_OK, store_->status()); | 540 EXPECT_EQ(CloudPolicyStore::STATUS_OK, store_->status()); |
534 EXPECT_EQ(std::string(), store_->policy_signature_public_key()); | 541 EXPECT_EQ(std::string(), store_->policy_signature_public_key()); |
535 } | 542 } |
536 | 543 |
537 TEST_F(UserCloudPolicyStoreChromeOSTest, LoadImmediatelyInvalidBlob) { | 544 TEST_F(UserCloudPolicyStoreChromeOSTest, LoadImmediatelyInvalidBlob) { |
538 EXPECT_CALL(observer_, OnStoreError(store_.get())); | 545 EXPECT_CALL(observer_, OnStoreError(store_.get())); |
539 EXPECT_CALL(session_manager_client_, | 546 EXPECT_CALL(session_manager_client_, |
540 BlockingRetrievePolicyForUser(cryptohome_id_)) | 547 BlockingRetrievePolicyForUser(cryptohome_id_, _)) |
541 .WillOnce(Return("le blob")); | 548 .WillOnce(DoAll(SetArgPointee<1>("le blob"), |
| 549 Return(RetrievePolicyResponseType::SUCCESS))); |
542 | 550 |
543 EXPECT_FALSE(store_->policy()); | 551 EXPECT_FALSE(store_->policy()); |
544 store_->LoadImmediately(); | 552 store_->LoadImmediately(); |
545 Mock::VerifyAndClearExpectations(&observer_); | 553 Mock::VerifyAndClearExpectations(&observer_); |
546 Mock::VerifyAndClearExpectations(&session_manager_client_); | 554 Mock::VerifyAndClearExpectations(&session_manager_client_); |
547 | 555 |
548 EXPECT_FALSE(store_->policy()); | 556 EXPECT_FALSE(store_->policy()); |
549 EXPECT_TRUE(store_->policy_map().empty()); | 557 EXPECT_TRUE(store_->policy_map().empty()); |
550 EXPECT_EQ(CloudPolicyStore::STATUS_PARSE_ERROR, store_->status()); | 558 EXPECT_EQ(CloudPolicyStore::STATUS_PARSE_ERROR, store_->status()); |
551 EXPECT_EQ(std::string(), store_->policy_signature_public_key()); | 559 EXPECT_EQ(std::string(), store_->policy_signature_public_key()); |
552 } | 560 } |
553 | 561 |
554 TEST_F(UserCloudPolicyStoreChromeOSTest, LoadImmediatelyDBusFailure) { | 562 TEST_F(UserCloudPolicyStoreChromeOSTest, LoadImmediatelyDBusFailure) { |
555 EXPECT_CALL(observer_, OnStoreError(store_.get())); | 563 EXPECT_CALL(observer_, OnStoreError(store_.get())); |
556 EXPECT_CALL(session_manager_client_, | 564 EXPECT_CALL(session_manager_client_, |
557 BlockingRetrievePolicyForUser(cryptohome_id_)) | 565 BlockingRetrievePolicyForUser(cryptohome_id_, _)) |
558 .WillOnce(Return(policy_.GetBlob())); | 566 .WillOnce(DoAll(SetArgPointee<1>(policy_.GetBlob()), |
| 567 Return(RetrievePolicyResponseType::SUCCESS))); |
559 EXPECT_CALL(cryptohome_client_, BlockingGetSanitizedUsername(cryptohome_id_)) | 568 EXPECT_CALL(cryptohome_client_, BlockingGetSanitizedUsername(cryptohome_id_)) |
560 .WillOnce(Return("")); | 569 .WillOnce(Return("")); |
561 | 570 |
562 EXPECT_FALSE(store_->policy()); | 571 EXPECT_FALSE(store_->policy()); |
563 store_->LoadImmediately(); | 572 store_->LoadImmediately(); |
564 Mock::VerifyAndClearExpectations(&observer_); | 573 Mock::VerifyAndClearExpectations(&observer_); |
565 Mock::VerifyAndClearExpectations(&session_manager_client_); | 574 Mock::VerifyAndClearExpectations(&session_manager_client_); |
566 Mock::VerifyAndClearExpectations(&cryptohome_client_); | 575 Mock::VerifyAndClearExpectations(&cryptohome_client_); |
567 | 576 |
568 EXPECT_FALSE(store_->policy()); | 577 EXPECT_FALSE(store_->policy()); |
569 EXPECT_TRUE(store_->policy_map().empty()); | 578 EXPECT_TRUE(store_->policy_map().empty()); |
570 EXPECT_EQ(CloudPolicyStore::STATUS_LOAD_ERROR, store_->status()); | 579 EXPECT_EQ(CloudPolicyStore::STATUS_LOAD_ERROR, store_->status()); |
571 EXPECT_EQ(std::string(), store_->policy_signature_public_key()); | 580 EXPECT_EQ(std::string(), store_->policy_signature_public_key()); |
572 } | 581 } |
573 | 582 |
574 TEST_F(UserCloudPolicyStoreChromeOSTest, LoadImmediatelyNoUserPolicyKey) { | 583 TEST_F(UserCloudPolicyStoreChromeOSTest, LoadImmediatelyNoUserPolicyKey) { |
575 EXPECT_CALL(observer_, OnStoreError(store_.get())); | 584 EXPECT_CALL(observer_, OnStoreError(store_.get())); |
576 EXPECT_CALL(session_manager_client_, | 585 EXPECT_CALL(session_manager_client_, |
577 BlockingRetrievePolicyForUser(cryptohome_id_)) | 586 BlockingRetrievePolicyForUser(cryptohome_id_, _)) |
578 .WillOnce(Return(policy_.GetBlob())); | 587 .WillOnce(DoAll(SetArgPointee<1>(policy_.GetBlob()), |
| 588 Return(RetrievePolicyResponseType::SUCCESS))); |
579 EXPECT_CALL(cryptohome_client_, BlockingGetSanitizedUsername(cryptohome_id_)) | 589 EXPECT_CALL(cryptohome_client_, BlockingGetSanitizedUsername(cryptohome_id_)) |
580 .WillOnce(Return("wrong@example.com")); | 590 .WillOnce(Return("wrong@example.com")); |
581 | 591 |
582 EXPECT_FALSE(store_->policy()); | 592 EXPECT_FALSE(store_->policy()); |
583 store_->LoadImmediately(); | 593 store_->LoadImmediately(); |
584 Mock::VerifyAndClearExpectations(&observer_); | 594 Mock::VerifyAndClearExpectations(&observer_); |
585 Mock::VerifyAndClearExpectations(&session_manager_client_); | 595 Mock::VerifyAndClearExpectations(&session_manager_client_); |
586 Mock::VerifyAndClearExpectations(&cryptohome_client_); | 596 Mock::VerifyAndClearExpectations(&cryptohome_client_); |
587 | 597 |
588 EXPECT_FALSE(store_->policy()); | 598 EXPECT_FALSE(store_->policy()); |
589 EXPECT_TRUE(store_->policy_map().empty()); | 599 EXPECT_TRUE(store_->policy_map().empty()); |
590 EXPECT_EQ(CloudPolicyStore::STATUS_VALIDATION_ERROR, store_->status()); | 600 EXPECT_EQ(CloudPolicyStore::STATUS_VALIDATION_ERROR, store_->status()); |
591 EXPECT_EQ(std::string(), store_->policy_signature_public_key()); | 601 EXPECT_EQ(std::string(), store_->policy_signature_public_key()); |
592 } | 602 } |
593 | 603 |
594 } // namespace | 604 } // namespace |
595 | 605 |
596 } // namespace policy | 606 } // namespace policy |
OLD | NEW |