Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/chromeos/policy/device_cloud_policy_invalidator.h" | 5 #include "chrome/browser/chromeos/policy/device_cloud_policy_invalidator.h" |
| 6 | 6 |
| 7 #include <string> | 7 #include <string> |
| 8 | 8 |
| 9 #include "base/memory/ref_counted.h" | 9 #include "base/memory/ref_counted.h" |
| 10 #include "base/message_loop/message_loop_proxy.h" | 10 #include "base/message_loop/message_loop_proxy.h" |
| 11 #include "base/run_loop.h" | 11 #include "base/run_loop.h" |
| 12 #include "chrome/browser/browser_process_platform_part.h" | 12 #include "chrome/browser/browser_process_platform_part.h" |
| 13 #include "chrome/browser/chrome_notification_types.h" | 13 #include "chrome/browser/chrome_notification_types.h" |
| 14 #include "chrome/browser/chromeos/login/users/fake_user_manager.h" | |
| 15 #include "chrome/browser/chromeos/login/users/scoped_user_manager_enabler.h" | |
| 14 #include "chrome/browser/chromeos/policy/browser_policy_connector_chromeos.h" | 16 #include "chrome/browser/chromeos/policy/browser_policy_connector_chromeos.h" |
| 15 #include "chrome/browser/chromeos/policy/device_cloud_policy_manager_chromeos.h" | 17 #include "chrome/browser/chromeos/policy/device_cloud_policy_manager_chromeos.h" |
| 16 #include "chrome/browser/chromeos/policy/device_cloud_policy_store_chromeos.h" | 18 #include "chrome/browser/chromeos/policy/device_cloud_policy_store_chromeos.h" |
| 17 #include "chrome/browser/chromeos/policy/device_policy_builder.h" | 19 #include "chrome/browser/chromeos/policy/device_policy_builder.h" |
| 18 #include "chrome/browser/chromeos/policy/stub_enterprise_install_attributes.h" | 20 #include "chrome/browser/chromeos/policy/stub_enterprise_install_attributes.h" |
| 19 #include "chrome/browser/chromeos/settings/cros_settings.h" | 21 #include "chrome/browser/chromeos/settings/cros_settings.h" |
| 20 #include "chrome/browser/chromeos/settings/device_oauth2_token_service_factory.h " | 22 #include "chrome/browser/chromeos/settings/device_oauth2_token_service_factory.h " |
| 21 #include "chrome/browser/chromeos/settings/device_settings_service.h" | 23 #include "chrome/browser/chromeos/settings/device_settings_service.h" |
| 22 #include "chrome/browser/chromeos/settings/device_settings_test_helper.h" | 24 #include "chrome/browser/chromeos/settings/device_settings_test_helper.h" |
| 23 #include "chrome/browser/invalidation/fake_invalidation_service.h" | 25 #include "chrome/browser/invalidation/fake_invalidation_service.h" |
| (...skipping 21 matching lines...) Expand all Loading... | |
| 45 #include "net/url_request/url_request_context_getter.h" | 47 #include "net/url_request/url_request_context_getter.h" |
| 46 #include "net/url_request/url_request_test_util.h" | 48 #include "net/url_request/url_request_test_util.h" |
| 47 #include "policy/proto/device_management_backend.pb.h" | 49 #include "policy/proto/device_management_backend.pb.h" |
| 48 #include "testing/gmock/include/gmock/gmock.h" | 50 #include "testing/gmock/include/gmock/gmock.h" |
| 49 #include "testing/gtest/include/gtest/gtest.h" | 51 #include "testing/gtest/include/gtest/gtest.h" |
| 50 | 52 |
| 51 namespace policy { | 53 namespace policy { |
| 52 | 54 |
| 53 namespace { | 55 namespace { |
| 54 | 56 |
| 57 const char kAffiliatedUserID1[] = "test_1@example.com"; | |
| 58 const char kAffiliatedUserID2[] = "test_2@example.com"; | |
| 59 const char kUnaffiliatedUserID[] = "test_2@other_domain.test"; | |
| 60 | |
| 55 KeyedService* BuildProfileInvalidationProvider( | 61 KeyedService* BuildProfileInvalidationProvider( |
| 56 content::BrowserContext* context) { | 62 content::BrowserContext* context) { |
| 57 scoped_ptr<invalidation::FakeInvalidationService> invalidation_service( | 63 scoped_ptr<invalidation::FakeInvalidationService> invalidation_service( |
| 58 new invalidation::FakeInvalidationService); | 64 new invalidation::FakeInvalidationService); |
| 59 invalidation_service->SetInvalidatorState( | 65 invalidation_service->SetInvalidatorState( |
| 60 syncer::TRANSIENT_INVALIDATION_ERROR); | 66 syncer::TRANSIENT_INVALIDATION_ERROR); |
| 61 return new invalidation::ProfileInvalidationProvider( | 67 return new invalidation::ProfileInvalidationProvider( |
| 62 invalidation_service.PassAs<invalidation::InvalidationService>()); | 68 invalidation_service.PassAs<invalidation::InvalidationService>()); |
| 63 } | 69 } |
| 64 | 70 |
| 65 } // namespace | 71 } // namespace |
| 66 | 72 |
| 67 class DeviceCloudPolicyInvalidatorTest : public testing::Test { | 73 class DeviceCloudPolicyInvalidatorTest : public testing::Test { |
| 68 public: | 74 public: |
| 69 DeviceCloudPolicyInvalidatorTest(); | 75 DeviceCloudPolicyInvalidatorTest(); |
| 70 virtual ~DeviceCloudPolicyInvalidatorTest(); | 76 virtual ~DeviceCloudPolicyInvalidatorTest(); |
| 71 | 77 |
| 72 // testing::Test: | 78 // testing::Test: |
| 73 virtual void SetUp() OVERRIDE; | 79 virtual void SetUp() OVERRIDE; |
| 74 virtual void TearDown() OVERRIDE; | 80 virtual void TearDown() OVERRIDE; |
| 75 | 81 |
| 76 // Ownership is not passed. The Profile is owned by the global ProfileManager. | 82 // Ownership is not passed. The Profile is owned by the global ProfileManager. |
| 77 Profile *CreateProfile(const std::string& profile_name); | 83 Profile *LogInAndReturnProfile(const std::string& user_id); |
| 78 | 84 |
| 79 invalidation::TiclInvalidationService* GetDeviceInvalidationService(); | 85 invalidation::TiclInvalidationService* GetDeviceInvalidationService(); |
| 80 bool HasDeviceInvalidationServiceObserver() const; | 86 bool HasDeviceInvalidationServiceObserver() const; |
| 81 | 87 |
| 82 invalidation::FakeInvalidationService* GetProfileInvalidationService( | 88 invalidation::FakeInvalidationService* GetProfileInvalidationService( |
| 83 Profile* profile); | 89 Profile* profile); |
| 84 int GetProfileInvalidationServiceObserverCount() const; | 90 int GetProfileInvalidationServiceObserverCount() const; |
| 85 | 91 |
| 86 const invalidation::InvalidationService* GetInvalidationService() const; | 92 const invalidation::InvalidationService* GetInvalidationService() const; |
| 87 CloudPolicyInvalidator* GetCloudPolicyInvalidator() const; | 93 CloudPolicyInvalidator* GetCloudPolicyInvalidator() const; |
| 88 | 94 |
| 89 void ConnectDeviceInvalidationService(); | 95 void ConnectDeviceInvalidationService(); |
| 90 | 96 |
| 91 protected: | 97 protected: |
| 92 DevicePolicyBuilder device_policy_; | 98 DevicePolicyBuilder device_policy_; |
| 93 | 99 |
| 94 private: | 100 private: |
| 95 content::TestBrowserThreadBundle thread_bundle_; | 101 content::TestBrowserThreadBundle thread_bundle_; |
| 96 scoped_refptr<net::URLRequestContextGetter> system_request_context_; | 102 scoped_refptr<net::URLRequestContextGetter> system_request_context_; |
| 97 TestingProfileManager profile_manager_; | 103 TestingProfileManager profile_manager_; |
| 104 chromeos::FakeUserManager* fake_user_manager_; | |
| 105 chromeos::ScopedUserManagerEnabler user_manager_enabler_; | |
| 98 ScopedStubEnterpriseInstallAttributes install_attributes_; | 106 ScopedStubEnterpriseInstallAttributes install_attributes_; |
| 99 scoped_ptr<chromeos::ScopedTestDeviceSettingsService> | 107 scoped_ptr<chromeos::ScopedTestDeviceSettingsService> |
| 100 test_device_settings_service_; | 108 test_device_settings_service_; |
| 101 scoped_ptr<chromeos::ScopedTestCrosSettings> test_cros_settings_; | 109 scoped_ptr<chromeos::ScopedTestCrosSettings> test_cros_settings_; |
| 102 chromeos::DeviceSettingsTestHelper device_settings_test_helper_; | 110 chromeos::DeviceSettingsTestHelper device_settings_test_helper_; |
| 103 | 111 |
| 104 scoped_ptr<DeviceCloudPolicyInvalidator> invalidator_; | 112 scoped_ptr<DeviceCloudPolicyInvalidator> invalidator_; |
| 105 }; | 113 }; |
| 106 | 114 |
| 107 DeviceCloudPolicyInvalidatorTest::DeviceCloudPolicyInvalidatorTest() | 115 DeviceCloudPolicyInvalidatorTest::DeviceCloudPolicyInvalidatorTest() |
| 108 : thread_bundle_(content::TestBrowserThreadBundle::IO_MAINLOOP), | 116 : thread_bundle_(content::TestBrowserThreadBundle::IO_MAINLOOP), |
| 109 system_request_context_(new net::TestURLRequestContextGetter( | 117 system_request_context_(new net::TestURLRequestContextGetter( |
| 110 base::MessageLoopProxy::current())), | 118 base::MessageLoopProxy::current())), |
| 111 profile_manager_(TestingBrowserProcess::GetGlobal()), | 119 profile_manager_(TestingBrowserProcess::GetGlobal()), |
| 120 fake_user_manager_(new chromeos::FakeUserManager), | |
| 121 user_manager_enabler_(fake_user_manager_), | |
| 112 install_attributes_("example.com", | 122 install_attributes_("example.com", |
| 113 "user@example.com", | 123 "user@example.com", |
| 114 "device_id", | 124 "device_id", |
| 115 DEVICE_MODE_ENTERPRISE) { | 125 DEVICE_MODE_ENTERPRISE) { |
| 116 } | 126 } |
| 117 | 127 |
| 118 DeviceCloudPolicyInvalidatorTest::~DeviceCloudPolicyInvalidatorTest() { | 128 DeviceCloudPolicyInvalidatorTest::~DeviceCloudPolicyInvalidatorTest() { |
| 119 } | 129 } |
| 120 | 130 |
| 121 void DeviceCloudPolicyInvalidatorTest::SetUp() { | 131 void DeviceCloudPolicyInvalidatorTest::SetUp() { |
| (...skipping 41 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 163 | 173 |
| 164 invalidation::ProfileInvalidationProviderFactory::GetInstance()-> | 174 invalidation::ProfileInvalidationProviderFactory::GetInstance()-> |
| 165 RegisterTestingFactory(NULL); | 175 RegisterTestingFactory(NULL); |
| 166 chromeos::DeviceSettingsService::Get()->UnsetSessionManager(); | 176 chromeos::DeviceSettingsService::Get()->UnsetSessionManager(); |
| 167 TestingBrowserProcess::GetGlobal()->SetBrowserPolicyConnector(NULL); | 177 TestingBrowserProcess::GetGlobal()->SetBrowserPolicyConnector(NULL); |
| 168 chromeos::DeviceOAuth2TokenServiceFactory::Shutdown(); | 178 chromeos::DeviceOAuth2TokenServiceFactory::Shutdown(); |
| 169 chromeos::DBusThreadManager::Shutdown(); | 179 chromeos::DBusThreadManager::Shutdown(); |
| 170 chromeos::SystemSaltGetter::Shutdown(); | 180 chromeos::SystemSaltGetter::Shutdown(); |
| 171 } | 181 } |
| 172 | 182 |
| 173 Profile *DeviceCloudPolicyInvalidatorTest::CreateProfile( | 183 Profile *DeviceCloudPolicyInvalidatorTest::LogInAndReturnProfile( |
| 174 const std::string& profile_name) { | 184 const std::string& user_id) { |
| 175 Profile* profile = profile_manager_.CreateTestingProfile(profile_name); | 185 fake_user_manager_->AddUser(user_id); |
| 186 Profile* profile = profile_manager_.CreateTestingProfile(user_id); | |
| 176 content::NotificationService::current()->Notify( | 187 content::NotificationService::current()->Notify( |
| 177 chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED, | 188 chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED, |
| 178 content::NotificationService::AllSources(), | 189 content::NotificationService::AllSources(), |
| 179 content::Details<Profile>(profile)); | 190 content::Details<Profile>(profile)); |
| 180 return profile; | 191 return profile; |
| 181 } | 192 } |
| 182 | 193 |
| 183 invalidation::TiclInvalidationService* | 194 invalidation::TiclInvalidationService* |
| 184 DeviceCloudPolicyInvalidatorTest::GetDeviceInvalidationService() { | 195 DeviceCloudPolicyInvalidatorTest::GetDeviceInvalidationService() { |
| 185 return invalidator_->device_invalidation_service_.get(); | 196 return invalidator_->device_invalidation_service_.get(); |
| (...skipping 76 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 262 | 273 |
| 263 // Verify that the device-global invalidation service still exists. | 274 // Verify that the device-global invalidation service still exists. |
| 264 EXPECT_TRUE(GetDeviceInvalidationService()); | 275 EXPECT_TRUE(GetDeviceInvalidationService()); |
| 265 EXPECT_TRUE(HasDeviceInvalidationServiceObserver()); | 276 EXPECT_TRUE(HasDeviceInvalidationServiceObserver()); |
| 266 | 277 |
| 267 // Verify that the invalidator has been destroyed. | 278 // Verify that the invalidator has been destroyed. |
| 268 EXPECT_FALSE(GetCloudPolicyInvalidator()); | 279 EXPECT_FALSE(GetCloudPolicyInvalidator()); |
| 269 EXPECT_FALSE(GetInvalidationService()); | 280 EXPECT_FALSE(GetInvalidationService()); |
| 270 } | 281 } |
| 271 | 282 |
| 272 // Verifies that a DeviceCloudPolicyInvalidator backed by a per-profile | 283 // Verifies that when the per-profile invalidation service for an affiliated |
| 273 // invalidation service is created/destroyed as the service | 284 // user connect/disconnects, a DeviceCloudPolicyInvalidator backed by it is |
| 274 // connects/disconnects. | 285 // created/destroyed. |
| 275 TEST_F(DeviceCloudPolicyInvalidatorTest, UseProfileInvalidationService) { | 286 TEST_F(DeviceCloudPolicyInvalidatorTest, |
| 276 // Create a user profile. | 287 UseAffiliatedProfileInvalidationService) { |
| 277 Profile* profile = CreateProfile("test"); | 288 // Log in as an affiliated user. |
| 289 Profile* profile = LogInAndReturnProfile(kAffiliatedUserID1); | |
| 278 ASSERT_TRUE(profile); | 290 ASSERT_TRUE(profile); |
| 279 | 291 |
| 280 // Verify that a device-global invalidation service has been created. | 292 // Verify that a device-global invalidation service has been created. |
| 281 EXPECT_TRUE(GetDeviceInvalidationService()); | 293 EXPECT_TRUE(GetDeviceInvalidationService()); |
| 282 EXPECT_TRUE(HasDeviceInvalidationServiceObserver()); | 294 EXPECT_TRUE(HasDeviceInvalidationServiceObserver()); |
| 283 | 295 |
| 284 // Verify that a per-profile invalidation service has been created. | 296 // Verify that a per-profile invalidation service has been created. |
| 285 invalidation::FakeInvalidationService* profile_invalidation_service = | 297 invalidation::FakeInvalidationService* profile_invalidation_service = |
| 286 GetProfileInvalidationService(profile); | 298 GetProfileInvalidationService(profile); |
| 287 ASSERT_TRUE(profile_invalidation_service); | 299 ASSERT_TRUE(profile_invalidation_service); |
| 288 EXPECT_EQ(1, GetProfileInvalidationServiceObserverCount()); | 300 EXPECT_EQ(1, GetProfileInvalidationServiceObserverCount()); |
| 289 | 301 |
| 290 // Verify that no invalidator exists yet | 302 // Verify that no invalidator exists yet. |
| 291 EXPECT_FALSE(GetCloudPolicyInvalidator()); | 303 EXPECT_FALSE(GetCloudPolicyInvalidator()); |
| 292 EXPECT_FALSE(GetInvalidationService()); | 304 EXPECT_FALSE(GetInvalidationService()); |
| 293 | 305 |
| 294 // Indicate that the per-profile invalidation service has connected. | 306 // Indicate that the per-profile invalidation service has connected. |
| 295 profile_invalidation_service->SetInvalidatorState( | 307 profile_invalidation_service->SetInvalidatorState( |
| 296 syncer::INVALIDATIONS_ENABLED); | 308 syncer::INVALIDATIONS_ENABLED); |
| 297 | 309 |
| 298 // Verify that the device-global invalidator has been destroyed. | 310 // Verify that the device-global invalidator has been destroyed. |
| 299 EXPECT_FALSE(GetDeviceInvalidationService()); | 311 EXPECT_FALSE(GetDeviceInvalidationService()); |
| 300 EXPECT_FALSE(HasDeviceInvalidationServiceObserver()); | 312 EXPECT_FALSE(HasDeviceInvalidationServiceObserver()); |
| (...skipping 19 matching lines...) Expand all Loading... | |
| 320 // Verify that a per-profile invalidation service still exists. | 332 // Verify that a per-profile invalidation service still exists. |
| 321 profile_invalidation_service = GetProfileInvalidationService(profile); | 333 profile_invalidation_service = GetProfileInvalidationService(profile); |
| 322 EXPECT_TRUE(profile_invalidation_service); | 334 EXPECT_TRUE(profile_invalidation_service); |
| 323 EXPECT_EQ(1, GetProfileInvalidationServiceObserverCount()); | 335 EXPECT_EQ(1, GetProfileInvalidationServiceObserverCount()); |
| 324 | 336 |
| 325 // Verify that the invalidator has been destroyed. | 337 // Verify that the invalidator has been destroyed. |
| 326 EXPECT_FALSE(GetCloudPolicyInvalidator()); | 338 EXPECT_FALSE(GetCloudPolicyInvalidator()); |
| 327 EXPECT_FALSE(GetInvalidationService()); | 339 EXPECT_FALSE(GetInvalidationService()); |
| 328 } | 340 } |
| 329 | 341 |
| 342 // Verifies that even if the per-profile invalidation service for an | |
| 343 // unaffiliated user connects, no DeviceCloudPolicyInvalidator backed by it is | |
| 344 // created. | |
| 345 TEST_F(DeviceCloudPolicyInvalidatorTest, | |
| 346 DoNotUseUnaffiliatedProfileInvalidationService) { | |
| 347 // Log in as an unaffiliated user. | |
| 348 Profile* profile = LogInAndReturnProfile(kUnaffiliatedUserID); | |
| 349 ASSERT_TRUE(profile); | |
| 350 | |
| 351 // Verify that a device-global invalidation service has been created. | |
| 352 EXPECT_TRUE(GetDeviceInvalidationService()); | |
| 353 EXPECT_TRUE(HasDeviceInvalidationServiceObserver()); | |
| 354 | |
| 355 // Verify that a per-profile invalidation service has been created. | |
| 356 invalidation::FakeInvalidationService* profile_invalidation_service = | |
| 357 GetProfileInvalidationService(profile); | |
| 358 ASSERT_TRUE(profile_invalidation_service); | |
| 359 EXPECT_EQ(0, GetProfileInvalidationServiceObserverCount()); | |
| 360 | |
| 361 // Verify that no invalidator exists yet. | |
| 362 EXPECT_FALSE(GetCloudPolicyInvalidator()); | |
| 363 EXPECT_FALSE(GetInvalidationService()); | |
| 364 | |
| 365 // Indicate that the per-profile invalidation service has connected. | |
| 366 profile_invalidation_service->SetInvalidatorState( | |
| 367 syncer::INVALIDATIONS_ENABLED); | |
| 368 | |
| 369 // Verify that the device-global invalidator still exists. | |
| 370 EXPECT_TRUE(GetDeviceInvalidationService()); | |
| 371 EXPECT_TRUE(HasDeviceInvalidationServiceObserver()); | |
| 372 | |
| 373 // Verify that a per-profile invalidation service still exists. | |
| 374 profile_invalidation_service = GetProfileInvalidationService(profile); | |
| 375 EXPECT_TRUE(profile_invalidation_service); | |
| 376 EXPECT_EQ(0, GetProfileInvalidationServiceObserverCount()); | |
| 377 | |
| 378 // Verify that no invalidator has been created. | |
| 379 EXPECT_FALSE(GetCloudPolicyInvalidator()); | |
| 380 EXPECT_FALSE(GetInvalidationService()); | |
| 381 } | |
| 382 | |
| 330 // Verifies that a DeviceCloudPolicyInvalidator exists whenever a connected | 383 // Verifies that a DeviceCloudPolicyInvalidator exists whenever a connected |
| 331 // invalidation service is available, automatically switching between | 384 // invalidation service is available, automatically switching between |
| 332 // device-global and per-profile invalidation services as they | 385 // device-global and per-profile invalidation services as they |
| 333 // connect/disconnect, giving priority to per-profile invalidation services. | 386 // connect/disconnect, giving priority to per-profile invalidation services. |
| 334 // Also verifies that the highest handled invalidation version is preserved when | 387 // Also verifies that the highest handled invalidation version is preserved when |
| 335 // switching invalidation services. | 388 // switching invalidation services. |
| 336 TEST_F(DeviceCloudPolicyInvalidatorTest, SwitchInvalidationServices) { | 389 TEST_F(DeviceCloudPolicyInvalidatorTest, SwitchInvalidationServices) { |
|
pastarmovj
2014/09/17 16:04:57
nit: This is a GIANT test. Is there any chance you
| |
| 337 CloudPolicyStore* store = static_cast<CloudPolicyStore*>( | 390 CloudPolicyStore* store = static_cast<CloudPolicyStore*>( |
| 338 TestingBrowserProcess::GetGlobal()->platform_part()-> | 391 TestingBrowserProcess::GetGlobal()->platform_part()-> |
| 339 browser_policy_connector_chromeos()->GetDeviceCloudPolicyManager()-> | 392 browser_policy_connector_chromeos()->GetDeviceCloudPolicyManager()-> |
| 340 device_store()); | 393 device_store()); |
| 341 ASSERT_TRUE(store); | 394 ASSERT_TRUE(store); |
| 342 | 395 |
| 343 // Verify that an invalidator backed by the device-global invalidation service | 396 // Verify that an invalidator backed by the device-global invalidation service |
| 344 // is created when the service connects. | 397 // is created when the service connects. |
| 345 ConnectDeviceInvalidationService(); | 398 ConnectDeviceInvalidationService(); |
| 346 CloudPolicyInvalidator* invalidator = GetCloudPolicyInvalidator(); | 399 CloudPolicyInvalidator* invalidator = GetCloudPolicyInvalidator(); |
| 347 ASSERT_TRUE(invalidator); | 400 ASSERT_TRUE(invalidator); |
| 348 ASSERT_TRUE(GetDeviceInvalidationService()); | 401 ASSERT_TRUE(GetDeviceInvalidationService()); |
| 349 | 402 |
| 350 // Verify that the invalidator's highest handled invalidation version starts | 403 // Verify that the invalidator's highest handled invalidation version starts |
| 351 // out as zero. | 404 // out as zero. |
| 352 EXPECT_EQ(0, invalidator->highest_handled_invalidation_version()); | 405 EXPECT_EQ(0, invalidator->highest_handled_invalidation_version()); |
| 353 | 406 |
| 354 // Create a first user profile. | 407 // Log in as a first affiliated user. |
| 355 Profile* profile_1 = CreateProfile("test_1"); | 408 Profile* profile_1 = LogInAndReturnProfile(kAffiliatedUserID1); |
| 356 ASSERT_TRUE(profile_1); | 409 ASSERT_TRUE(profile_1); |
| 357 | 410 |
| 358 // Verify that the device-global invalidation service still exists. | 411 // Verify that the device-global invalidation service still exists. |
| 359 EXPECT_TRUE(GetDeviceInvalidationService()); | 412 EXPECT_TRUE(GetDeviceInvalidationService()); |
| 360 EXPECT_TRUE(HasDeviceInvalidationServiceObserver()); | 413 EXPECT_TRUE(HasDeviceInvalidationServiceObserver()); |
| 361 | 414 |
| 362 // Verify that a per-profile invalidation service has been created for the | 415 // Verify that a per-profile invalidation service has been created for the |
| 363 // first user profile. | 416 // first user. |
| 364 invalidation::FakeInvalidationService* profile_1_invalidation_service = | 417 invalidation::FakeInvalidationService* profile_1_invalidation_service = |
| 365 GetProfileInvalidationService(profile_1); | 418 GetProfileInvalidationService(profile_1); |
| 366 ASSERT_TRUE(profile_1_invalidation_service); | 419 ASSERT_TRUE(profile_1_invalidation_service); |
| 367 EXPECT_EQ(1, GetProfileInvalidationServiceObserverCount()); | 420 EXPECT_EQ(1, GetProfileInvalidationServiceObserverCount()); |
| 368 | 421 |
| 369 // Verify that an invalidator backed by the device-global invalidation service | 422 // Verify that an invalidator backed by the device-global invalidation service |
| 370 // still exists. | 423 // still exists. |
| 371 EXPECT_TRUE(GetCloudPolicyInvalidator()); | 424 EXPECT_TRUE(GetCloudPolicyInvalidator()); |
| 372 EXPECT_EQ(GetDeviceInvalidationService(), GetInvalidationService()); | 425 EXPECT_EQ(GetDeviceInvalidationService(), GetInvalidationService()); |
| 373 | 426 |
| 374 // Indicate that the first user profile's per-profile invalidation service has | 427 // Indicate that the first user's per-profile invalidation service has |
| 375 // connected. | 428 // connected. |
| 376 profile_1_invalidation_service->SetInvalidatorState( | 429 profile_1_invalidation_service->SetInvalidatorState( |
| 377 syncer::INVALIDATIONS_ENABLED); | 430 syncer::INVALIDATIONS_ENABLED); |
| 378 | 431 |
| 379 // Verify that the device-global invalidator has been destroyed. | 432 // Verify that the device-global invalidator has been destroyed. |
| 380 EXPECT_FALSE(GetDeviceInvalidationService()); | 433 EXPECT_FALSE(GetDeviceInvalidationService()); |
| 381 EXPECT_FALSE(HasDeviceInvalidationServiceObserver()); | 434 EXPECT_FALSE(HasDeviceInvalidationServiceObserver()); |
| 382 | 435 |
| 383 // Verify that a per-profile invalidation service still exists for the first | 436 // Verify that a per-profile invalidation service still exists for the first |
| 384 // user profile. | 437 // user. |
| 385 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); | 438 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); |
| 386 EXPECT_TRUE(profile_1_invalidation_service); | 439 EXPECT_TRUE(profile_1_invalidation_service); |
| 387 EXPECT_EQ(1, GetProfileInvalidationServiceObserverCount()); | 440 EXPECT_EQ(1, GetProfileInvalidationServiceObserverCount()); |
| 388 | 441 |
| 389 // Verify that an invalidator backed by the per-profile invalidation service | 442 // Verify that an invalidator backed by the per-profile invalidation service |
| 390 // for the first user profile has been created. | 443 // for the first user has been created. |
| 391 invalidator = GetCloudPolicyInvalidator(); | 444 invalidator = GetCloudPolicyInvalidator(); |
| 392 ASSERT_TRUE(invalidator); | 445 ASSERT_TRUE(invalidator); |
| 393 EXPECT_EQ(profile_1_invalidation_service, GetInvalidationService()); | 446 EXPECT_EQ(profile_1_invalidation_service, GetInvalidationService()); |
| 394 | 447 |
| 395 // Verify that the invalidator's highest handled invalidation version starts | 448 // Verify that the invalidator's highest handled invalidation version starts |
| 396 // out as zero. | 449 // out as zero. |
| 397 EXPECT_EQ(0, invalidator->highest_handled_invalidation_version()); | 450 EXPECT_EQ(0, invalidator->highest_handled_invalidation_version()); |
| 398 | 451 |
| 399 // Handle an invalidation with version 1. Verify that the invalidator's | 452 // Handle an invalidation with version 1. Verify that the invalidator's |
| 400 // highest handled invalidation version is updated accordingly. | 453 // highest handled invalidation version is updated accordingly. |
| 401 store->Store(device_policy_.policy(), 1); | 454 store->Store(device_policy_.policy(), 1); |
| 402 invalidator->OnStoreLoaded(store); | 455 invalidator->OnStoreLoaded(store); |
| 403 EXPECT_EQ(1, invalidator->highest_handled_invalidation_version()); | 456 EXPECT_EQ(1, invalidator->highest_handled_invalidation_version()); |
| 404 | 457 |
| 405 // Create a second user profile. | 458 // Log in as a second affiliated user. |
| 406 Profile* profile_2 = CreateProfile("test_2"); | 459 Profile* profile_2 = LogInAndReturnProfile(kAffiliatedUserID2); |
| 407 ASSERT_TRUE(profile_2); | 460 ASSERT_TRUE(profile_2); |
| 408 | 461 |
| 409 // Verify that the device-global invalidator still does not exist. | 462 // Verify that the device-global invalidator still does not exist. |
| 410 EXPECT_FALSE(GetDeviceInvalidationService()); | 463 EXPECT_FALSE(GetDeviceInvalidationService()); |
| 411 EXPECT_FALSE(HasDeviceInvalidationServiceObserver()); | 464 EXPECT_FALSE(HasDeviceInvalidationServiceObserver()); |
| 412 | 465 |
| 413 // Verify that a per-profile invalidation service still exists for the first | 466 // Verify that a per-profile invalidation service still exists for the first |
| 414 // user profile and one has been created for the second user profile. | 467 // user and one has been created for the second user. |
| 415 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); | 468 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); |
| 416 EXPECT_TRUE(profile_1_invalidation_service); | 469 EXPECT_TRUE(profile_1_invalidation_service); |
| 417 invalidation::FakeInvalidationService* profile_2_invalidation_service = | 470 invalidation::FakeInvalidationService* profile_2_invalidation_service = |
| 418 GetProfileInvalidationService(profile_2); | 471 GetProfileInvalidationService(profile_2); |
| 419 ASSERT_TRUE(profile_2_invalidation_service); | 472 ASSERT_TRUE(profile_2_invalidation_service); |
| 420 EXPECT_EQ(2, GetProfileInvalidationServiceObserverCount()); | 473 EXPECT_EQ(2, GetProfileInvalidationServiceObserverCount()); |
| 421 | 474 |
| 422 // Verify that an invalidator backed by the per-profile invalidation service | 475 // Verify that an invalidator backed by the per-profile invalidation service |
| 423 // for the first user profile still exists. | 476 // for the first user still exists. |
| 424 EXPECT_TRUE(GetCloudPolicyInvalidator()); | 477 EXPECT_TRUE(GetCloudPolicyInvalidator()); |
| 425 EXPECT_EQ(profile_1_invalidation_service, GetInvalidationService()); | 478 EXPECT_EQ(profile_1_invalidation_service, GetInvalidationService()); |
| 426 | 479 |
| 427 // Indicate that the second user profile's per-profile invalidation service | 480 // Indicate that the second user's per-profile invalidation service has |
| 428 // has connected. | 481 // connected. |
| 429 profile_2_invalidation_service->SetInvalidatorState( | 482 profile_2_invalidation_service->SetInvalidatorState( |
| 430 syncer::INVALIDATIONS_ENABLED); | 483 syncer::INVALIDATIONS_ENABLED); |
| 431 | 484 |
| 432 // Verify that the device-global invalidator still does not exist. | 485 // Verify that the device-global invalidator still does not exist. |
| 433 EXPECT_FALSE(GetDeviceInvalidationService()); | 486 EXPECT_FALSE(GetDeviceInvalidationService()); |
| 434 EXPECT_FALSE(HasDeviceInvalidationServiceObserver()); | 487 EXPECT_FALSE(HasDeviceInvalidationServiceObserver()); |
| 435 | 488 |
| 436 // Verify that per-profile invalidation services still exist for both user | 489 // Verify that per-profile invalidation services still exist for both users. |
| 437 // profiles. | |
| 438 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); | 490 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); |
| 439 ASSERT_TRUE(profile_1_invalidation_service); | 491 ASSERT_TRUE(profile_1_invalidation_service); |
| 440 profile_2_invalidation_service = GetProfileInvalidationService(profile_2); | 492 profile_2_invalidation_service = GetProfileInvalidationService(profile_2); |
| 441 EXPECT_TRUE(profile_2_invalidation_service); | 493 EXPECT_TRUE(profile_2_invalidation_service); |
| 442 EXPECT_EQ(2, GetProfileInvalidationServiceObserverCount()); | 494 EXPECT_EQ(2, GetProfileInvalidationServiceObserverCount()); |
| 443 | 495 |
| 444 // Verify that an invalidator backed by the per-profile invalidation service | 496 // Verify that an invalidator backed by the per-profile invalidation service |
| 445 // for the first user profile still exists. | 497 // for the first user still exists. |
| 446 EXPECT_TRUE(GetCloudPolicyInvalidator()); | 498 EXPECT_TRUE(GetCloudPolicyInvalidator()); |
| 447 EXPECT_EQ(profile_1_invalidation_service, GetInvalidationService()); | 499 EXPECT_EQ(profile_1_invalidation_service, GetInvalidationService()); |
| 448 | 500 |
| 449 // Indicate that the per-profile invalidation service for the first user | 501 // Indicate that the per-profile invalidation service for the first user has |
| 450 // profile has disconnected. | 502 // disconnected. |
| 451 profile_1_invalidation_service->SetInvalidatorState( | 503 profile_1_invalidation_service->SetInvalidatorState( |
| 452 syncer::INVALIDATION_CREDENTIALS_REJECTED); | 504 syncer::INVALIDATION_CREDENTIALS_REJECTED); |
| 453 | 505 |
| 454 // Verify that the device-global invalidator still does not exist. | 506 // Verify that the device-global invalidator still does not exist. |
| 455 EXPECT_FALSE(GetDeviceInvalidationService()); | 507 EXPECT_FALSE(GetDeviceInvalidationService()); |
| 456 EXPECT_FALSE(HasDeviceInvalidationServiceObserver()); | 508 EXPECT_FALSE(HasDeviceInvalidationServiceObserver()); |
| 457 | 509 |
| 458 // Verify that per-profile invalidation services still exist for both user | 510 // Verify that per-profile invalidation services still exist for both users. |
| 459 // profiles. | |
| 460 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); | 511 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); |
| 461 EXPECT_TRUE(profile_1_invalidation_service); | 512 EXPECT_TRUE(profile_1_invalidation_service); |
| 462 profile_2_invalidation_service = GetProfileInvalidationService(profile_2); | 513 profile_2_invalidation_service = GetProfileInvalidationService(profile_2); |
| 463 ASSERT_TRUE(profile_2_invalidation_service); | 514 ASSERT_TRUE(profile_2_invalidation_service); |
| 464 EXPECT_EQ(2, GetProfileInvalidationServiceObserverCount()); | 515 EXPECT_EQ(2, GetProfileInvalidationServiceObserverCount()); |
| 465 | 516 |
| 466 // Verify that an invalidator backed by the per-profile invalidation service | 517 // Verify that an invalidator backed by the per-profile invalidation service |
| 467 // for the second user profile has been created. | 518 // for the second user has been created. |
| 468 invalidator = GetCloudPolicyInvalidator(); | 519 invalidator = GetCloudPolicyInvalidator(); |
| 469 ASSERT_TRUE(invalidator); | 520 ASSERT_TRUE(invalidator); |
| 470 EXPECT_EQ(profile_2_invalidation_service, GetInvalidationService()); | 521 EXPECT_EQ(profile_2_invalidation_service, GetInvalidationService()); |
| 471 | 522 |
| 472 // Verify that the invalidator's highest handled invalidation version starts | 523 // Verify that the invalidator's highest handled invalidation version starts |
| 473 // out as 1. | 524 // out as 1. |
| 474 EXPECT_EQ(1, invalidator->highest_handled_invalidation_version()); | 525 EXPECT_EQ(1, invalidator->highest_handled_invalidation_version()); |
| 475 | 526 |
| 476 // Handle an invalidation with version 2. Verify that the invalidator's | 527 // Handle an invalidation with version 2. Verify that the invalidator's |
| 477 // highest handled invalidation version is updated accordingly. | 528 // highest handled invalidation version is updated accordingly. |
| 478 store->Store(device_policy_.policy(), 2); | 529 store->Store(device_policy_.policy(), 2); |
| 479 invalidator->OnStoreLoaded(store); | 530 invalidator->OnStoreLoaded(store); |
| 480 EXPECT_EQ(2, invalidator->highest_handled_invalidation_version()); | 531 EXPECT_EQ(2, invalidator->highest_handled_invalidation_version()); |
| 481 | 532 |
| 533 // Log in as an unaffiliated user. | |
| 534 Profile* profile_3 = LogInAndReturnProfile(kUnaffiliatedUserID); | |
| 535 ASSERT_TRUE(profile_3); | |
| 536 | |
| 537 // Verify that the device-global invalidator still does not exist. | |
| 538 EXPECT_FALSE(GetDeviceInvalidationService()); | |
| 539 EXPECT_FALSE(HasDeviceInvalidationServiceObserver()); | |
| 540 | |
| 541 // Verify that a per-profile invalidation service still exists for the two | |
| 542 // affiliated user sand one has been created for the unaffiliated user. | |
| 543 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); | |
| 544 EXPECT_TRUE(profile_1_invalidation_service); | |
| 545 profile_2_invalidation_service = GetProfileInvalidationService(profile_2); | |
| 546 ASSERT_TRUE(profile_2_invalidation_service); | |
| 547 invalidation::FakeInvalidationService* profile_3_invalidation_service = | |
| 548 GetProfileInvalidationService(profile_3); | |
| 549 EXPECT_EQ(2, GetProfileInvalidationServiceObserverCount()); | |
| 550 | |
| 551 // Verify that an invalidator backed by the per-profile invalidation service | |
| 552 // for the second affiliated user still exists. | |
| 553 EXPECT_TRUE(GetCloudPolicyInvalidator()); | |
| 554 EXPECT_EQ(profile_2_invalidation_service, GetInvalidationService()); | |
| 555 | |
| 556 // Indicate that the unaffiliated user's per-profile invalidation service has | |
| 557 // connected. | |
| 558 profile_3_invalidation_service->SetInvalidatorState( | |
| 559 syncer::INVALIDATIONS_ENABLED); | |
| 560 | |
| 561 // Verify that the device-global invalidator still does not exist. | |
| 562 EXPECT_FALSE(GetDeviceInvalidationService()); | |
| 563 EXPECT_FALSE(HasDeviceInvalidationServiceObserver()); | |
| 564 | |
| 565 // Verify that per-profile invalidation services still exist for all three | |
| 566 // users. | |
| 567 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); | |
| 568 ASSERT_TRUE(profile_1_invalidation_service); | |
| 569 profile_2_invalidation_service = GetProfileInvalidationService(profile_2); | |
| 570 EXPECT_TRUE(profile_2_invalidation_service); | |
| 571 profile_3_invalidation_service = GetProfileInvalidationService(profile_3); | |
| 572 EXPECT_TRUE(profile_3_invalidation_service); | |
| 573 EXPECT_EQ(2, GetProfileInvalidationServiceObserverCount()); | |
| 574 | |
| 575 // Verify that an invalidator backed by the per-profile invalidation service | |
| 576 // for the second affiliated user still exists. | |
| 577 EXPECT_TRUE(GetCloudPolicyInvalidator()); | |
| 578 | |
| 482 // Indicate that the per-profile invalidation service for the second user | 579 // Indicate that the per-profile invalidation service for the second user |
| 483 // profile has disconnected. | 580 // profile has disconnected. |
| 484 profile_2_invalidation_service->SetInvalidatorState( | 581 profile_2_invalidation_service->SetInvalidatorState( |
| 485 syncer::INVALIDATION_CREDENTIALS_REJECTED); | 582 syncer::INVALIDATION_CREDENTIALS_REJECTED); |
| 486 | 583 |
| 487 // Verify that a device-global invalidation service has been created. | 584 // Verify that a device-global invalidation service has been created. |
| 488 ASSERT_TRUE(GetDeviceInvalidationService()); | 585 ASSERT_TRUE(GetDeviceInvalidationService()); |
| 489 EXPECT_TRUE(HasDeviceInvalidationServiceObserver()); | 586 EXPECT_TRUE(HasDeviceInvalidationServiceObserver()); |
| 490 | 587 |
| 491 // Verify that per-profile invalidation services still exist for both user | 588 // Verify that per-profile invalidation services still exist for all three |
| 492 // profiles. | 589 // users. |
| 493 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); | 590 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); |
| 494 EXPECT_TRUE(profile_1_invalidation_service); | 591 ASSERT_TRUE(profile_1_invalidation_service); |
| 495 profile_2_invalidation_service = GetProfileInvalidationService(profile_2); | 592 profile_2_invalidation_service = GetProfileInvalidationService(profile_2); |
| 496 EXPECT_TRUE(profile_2_invalidation_service); | 593 EXPECT_TRUE(profile_2_invalidation_service); |
| 594 profile_3_invalidation_service = GetProfileInvalidationService(profile_3); | |
| 595 EXPECT_TRUE(profile_3_invalidation_service); | |
| 497 EXPECT_EQ(2, GetProfileInvalidationServiceObserverCount()); | 596 EXPECT_EQ(2, GetProfileInvalidationServiceObserverCount()); |
| 498 | 597 |
| 499 // Verify that the invalidator has been destroyed. | 598 // Verify that the invalidator has been destroyed. |
| 500 EXPECT_FALSE(GetCloudPolicyInvalidator()); | 599 EXPECT_FALSE(GetCloudPolicyInvalidator()); |
| 501 EXPECT_FALSE(GetInvalidationService()); | 600 EXPECT_FALSE(GetInvalidationService()); |
| 502 | 601 |
| 503 // Indicate that the device-global invalidation service has connected. | 602 // Indicate that the device-global invalidation service has connected. |
| 504 GetDeviceInvalidationService()->OnInvalidatorStateChange( | 603 GetDeviceInvalidationService()->OnInvalidatorStateChange( |
| 505 syncer::INVALIDATIONS_ENABLED); | 604 syncer::INVALIDATIONS_ENABLED); |
| 506 base::RunLoop().RunUntilIdle(); | 605 base::RunLoop().RunUntilIdle(); |
| 507 | 606 |
| 508 // Verify that the device-global invalidation service still exists. | 607 // Verify that the device-global invalidation service still exists. |
| 509 EXPECT_TRUE(GetDeviceInvalidationService()); | 608 EXPECT_TRUE(GetDeviceInvalidationService()); |
| 510 EXPECT_TRUE(HasDeviceInvalidationServiceObserver()); | 609 EXPECT_TRUE(HasDeviceInvalidationServiceObserver()); |
| 511 | 610 |
| 512 // Verify that per-profile invalidation services still exist for both user | 611 // Verify that per-profile invalidation services still exist for all three |
| 513 // profiles. | 612 // users. |
| 514 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); | 613 profile_1_invalidation_service = GetProfileInvalidationService(profile_1); |
| 515 EXPECT_TRUE(profile_1_invalidation_service); | 614 ASSERT_TRUE(profile_1_invalidation_service); |
| 516 profile_2_invalidation_service = GetProfileInvalidationService(profile_2); | 615 profile_2_invalidation_service = GetProfileInvalidationService(profile_2); |
| 517 EXPECT_TRUE(profile_2_invalidation_service); | 616 EXPECT_TRUE(profile_2_invalidation_service); |
| 617 profile_3_invalidation_service = GetProfileInvalidationService(profile_3); | |
| 618 EXPECT_TRUE(profile_3_invalidation_service); | |
| 518 EXPECT_EQ(2, GetProfileInvalidationServiceObserverCount()); | 619 EXPECT_EQ(2, GetProfileInvalidationServiceObserverCount()); |
| 519 | 620 |
| 520 // Verify that an invalidator backed by the device-global invalidation service | 621 // Verify that an invalidator backed by the device-global invalidation service |
| 521 // has been created. | 622 // has been created. |
| 522 invalidator = GetCloudPolicyInvalidator(); | 623 invalidator = GetCloudPolicyInvalidator(); |
| 523 ASSERT_TRUE(invalidator); | 624 ASSERT_TRUE(invalidator); |
| 524 EXPECT_EQ(GetDeviceInvalidationService(), GetInvalidationService()); | 625 EXPECT_EQ(GetDeviceInvalidationService(), GetInvalidationService()); |
| 525 | 626 |
| 526 // Verify that the invalidator's highest handled invalidation version starts | 627 // Verify that the invalidator's highest handled invalidation version starts |
| 527 // out as 2. | 628 // out as 2. |
| 528 EXPECT_EQ(2, invalidator->highest_handled_invalidation_version()); | 629 EXPECT_EQ(2, invalidator->highest_handled_invalidation_version()); |
| 529 } | 630 } |
| 530 | 631 |
| 531 } // namespace policy | 632 } // namespace policy |
| OLD | NEW |