| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/chromeos/settings/device_settings_service.h" | 5 #include "chrome/browser/chromeos/settings/device_settings_service.h" |
| 6 | 6 |
| 7 #include "base/basictypes.h" | 7 #include "base/basictypes.h" |
| 8 #include "base/bind.h" | 8 #include "base/bind.h" |
| 9 #include "base/bind_helpers.h" | 9 #include "base/bind_helpers.h" |
| 10 #include "base/compiler_specific.h" | 10 #include "base/compiler_specific.h" |
| 11 #include "base/time/time.h" | 11 #include "base/time/time.h" |
| 12 #include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos.h" | 12 #include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos.h" |
| 13 #include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos.h" |
| 14 #include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos_fact
ory.h" |
| 13 #include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos_fact
ory.h" | 15 #include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos_fact
ory.h" |
| 14 #include "chrome/browser/chromeos/policy/proto/chrome_device_policy.pb.h" | 16 #include "chrome/browser/chromeos/policy/proto/chrome_device_policy.pb.h" |
| 15 #include "chrome/browser/chromeos/settings/device_settings_test_helper.h" | 17 #include "chrome/browser/chromeos/settings/device_settings_test_helper.h" |
| 16 #include "chrome/test/base/testing_profile.h" | 18 #include "chrome/test/base/testing_profile.h" |
| 17 #include "components/policy/core/common/cloud/cloud_policy_constants.h" | 19 #include "components/policy/core/common/cloud/cloud_policy_constants.h" |
| 18 #include "policy/proto/device_management_backend.pb.h" | 20 #include "policy/proto/device_management_backend.pb.h" |
| 19 #include "testing/gmock/include/gmock/gmock.h" | 21 #include "testing/gmock/include/gmock/gmock.h" |
| 20 #include "testing/gtest/include/gtest/gtest.h" | 22 #include "testing/gtest/include/gtest/gtest.h" |
| 21 | 23 |
| 22 namespace em = enterprise_management; | 24 namespace em = enterprise_management; |
| (...skipping 112 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 135 } | 137 } |
| 136 | 138 |
| 137 TEST_F(DeviceSettingsServiceTest, LoadSuccess) { | 139 TEST_F(DeviceSettingsServiceTest, LoadSuccess) { |
| 138 ReloadDeviceSettings(); | 140 ReloadDeviceSettings(); |
| 139 | 141 |
| 140 EXPECT_EQ(DeviceSettingsService::STORE_SUCCESS, | 142 EXPECT_EQ(DeviceSettingsService::STORE_SUCCESS, |
| 141 device_settings_service_.status()); | 143 device_settings_service_.status()); |
| 142 CheckPolicy(); | 144 CheckPolicy(); |
| 143 } | 145 } |
| 144 | 146 |
| 145 TEST_F(DeviceSettingsServiceTest, SetManagementSettingsModeTransition) { | |
| 146 ReloadDeviceSettings(); | |
| 147 EXPECT_EQ(DeviceSettingsService::STORE_SUCCESS, | |
| 148 device_settings_service_.status()); | |
| 149 | |
| 150 owner_key_util_->SetPrivateKey(device_policy_.GetSigningKey()); | |
| 151 InitOwner(device_policy_.policy_data().username(), true); | |
| 152 FlushDeviceSettings(); | |
| 153 | |
| 154 // The initial management mode should be LOCAL_OWNER. | |
| 155 EXPECT_EQ(em::PolicyData::LOCAL_OWNER, | |
| 156 device_settings_service_.policy_data()->management_mode()); | |
| 157 | |
| 158 // LOCAL_OWNER -> CONSUMER_MANAGED: Okay. | |
| 159 device_settings_service_.SetManagementSettings( | |
| 160 em::PolicyData::CONSUMER_MANAGED, | |
| 161 "fake_request_token", | |
| 162 "fake_device_id", | |
| 163 base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted, | |
| 164 base::Unretained(this))); | |
| 165 FlushDeviceSettings(); | |
| 166 | |
| 167 EXPECT_TRUE(operation_completed_); | |
| 168 EXPECT_EQ(DeviceSettingsService::STORE_SUCCESS, | |
| 169 device_settings_service_.status()); | |
| 170 EXPECT_EQ(em::PolicyData::CONSUMER_MANAGED, | |
| 171 device_settings_service_.policy_data()->management_mode()); | |
| 172 | |
| 173 // CONSUMER_MANAGED -> ENTERPRISE_MANAGED: Invalid. | |
| 174 device_settings_service_.SetManagementSettings( | |
| 175 em::PolicyData::ENTERPRISE_MANAGED, | |
| 176 "fake_request_token", | |
| 177 "fake_device_id", | |
| 178 base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted, | |
| 179 base::Unretained(this))); | |
| 180 FlushDeviceSettings(); | |
| 181 | |
| 182 EXPECT_TRUE(operation_completed_); | |
| 183 EXPECT_EQ(DeviceSettingsService::STORE_POLICY_ERROR, | |
| 184 device_settings_service_.status()); | |
| 185 EXPECT_EQ(em::PolicyData::CONSUMER_MANAGED, | |
| 186 device_settings_service_.policy_data()->management_mode()); | |
| 187 | |
| 188 // CONSUMER_MANAGED -> LOCAL_OWNER: Okay. | |
| 189 device_settings_service_.SetManagementSettings( | |
| 190 em::PolicyData::LOCAL_OWNER, | |
| 191 "fake_request_token", | |
| 192 "fake_device_id", | |
| 193 base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted, | |
| 194 base::Unretained(this))); | |
| 195 FlushDeviceSettings(); | |
| 196 | |
| 197 EXPECT_TRUE(operation_completed_); | |
| 198 EXPECT_EQ(DeviceSettingsService::STORE_SUCCESS, | |
| 199 device_settings_service_.status()); | |
| 200 EXPECT_EQ(em::PolicyData::LOCAL_OWNER, | |
| 201 device_settings_service_.policy_data()->management_mode()); | |
| 202 | |
| 203 // LOCAL_OWNER -> ENTERPRISE_MANAGED: Invalid. | |
| 204 device_settings_service_.SetManagementSettings( | |
| 205 em::PolicyData::ENTERPRISE_MANAGED, | |
| 206 "fake_request_token", | |
| 207 "fake_device_id", | |
| 208 base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted, | |
| 209 base::Unretained(this))); | |
| 210 FlushDeviceSettings(); | |
| 211 | |
| 212 EXPECT_TRUE(operation_completed_); | |
| 213 EXPECT_EQ(DeviceSettingsService::STORE_POLICY_ERROR, | |
| 214 device_settings_service_.status()); | |
| 215 EXPECT_EQ(em::PolicyData::LOCAL_OWNER, | |
| 216 device_settings_service_.policy_data()->management_mode()); | |
| 217 | |
| 218 // Inject a policy data with management mode set to ENTERPRISE_MANAGED. | |
| 219 device_policy_.policy_data().set_management_mode( | |
| 220 em::PolicyData::ENTERPRISE_MANAGED); | |
| 221 device_policy_.Build(); | |
| 222 device_settings_test_helper_.set_policy_blob(device_policy_.GetBlob()); | |
| 223 ReloadDeviceSettings(); | |
| 224 EXPECT_EQ(em::PolicyData::ENTERPRISE_MANAGED, | |
| 225 device_settings_service_.policy_data()->management_mode()); | |
| 226 | |
| 227 // ENTERPRISE_MANAGED -> LOCAL_OWNER: Invalid. | |
| 228 device_settings_service_.SetManagementSettings( | |
| 229 em::PolicyData::LOCAL_OWNER, | |
| 230 "fake_request_token", | |
| 231 "fake_device_id", | |
| 232 base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted, | |
| 233 base::Unretained(this))); | |
| 234 FlushDeviceSettings(); | |
| 235 | |
| 236 EXPECT_TRUE(operation_completed_); | |
| 237 EXPECT_EQ(DeviceSettingsService::STORE_POLICY_ERROR, | |
| 238 device_settings_service_.status()); | |
| 239 EXPECT_EQ(em::PolicyData::ENTERPRISE_MANAGED, | |
| 240 device_settings_service_.policy_data()->management_mode()); | |
| 241 | |
| 242 // ENTERPRISE_MANAGED -> CONSUMER_MANAGED: Invalid. | |
| 243 device_settings_service_.SetManagementSettings( | |
| 244 em::PolicyData::CONSUMER_MANAGED, | |
| 245 "fake_request_token", | |
| 246 "fake_device_id", | |
| 247 base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted, | |
| 248 base::Unretained(this))); | |
| 249 FlushDeviceSettings(); | |
| 250 | |
| 251 EXPECT_TRUE(operation_completed_); | |
| 252 EXPECT_EQ(DeviceSettingsService::STORE_POLICY_ERROR, | |
| 253 device_settings_service_.status()); | |
| 254 EXPECT_EQ(em::PolicyData::ENTERPRISE_MANAGED, | |
| 255 device_settings_service_.policy_data()->management_mode()); | |
| 256 | |
| 257 } | |
| 258 | |
| 259 TEST_F(DeviceSettingsServiceTest, SetManagementSettingsSuccess) { | |
| 260 ReloadDeviceSettings(); | |
| 261 EXPECT_EQ(DeviceSettingsService::STORE_SUCCESS, | |
| 262 device_settings_service_.status()); | |
| 263 | |
| 264 owner_key_util_->SetPrivateKey(device_policy_.GetSigningKey()); | |
| 265 InitOwner(device_policy_.policy_data().username(), true); | |
| 266 FlushDeviceSettings(); | |
| 267 | |
| 268 device_settings_service_.SetManagementSettings( | |
| 269 em::PolicyData::CONSUMER_MANAGED, | |
| 270 "fake_request_token", | |
| 271 "fake_device_id", | |
| 272 base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted, | |
| 273 base::Unretained(this))); | |
| 274 FlushDeviceSettings(); | |
| 275 | |
| 276 EXPECT_TRUE(operation_completed_); | |
| 277 EXPECT_EQ(DeviceSettingsService::STORE_SUCCESS, | |
| 278 device_settings_service_.status()); | |
| 279 ASSERT_TRUE(device_settings_service_.device_settings()); | |
| 280 | |
| 281 // Check that the loaded policy_data contains the expected values. | |
| 282 const em::PolicyData* policy_data = device_settings_service_.policy_data(); | |
| 283 EXPECT_EQ(policy::dm_protocol::kChromeDevicePolicyType, | |
| 284 policy_data->policy_type()); | |
| 285 EXPECT_EQ(device_settings_service_.GetUsername(), | |
| 286 policy_data->username()); | |
| 287 EXPECT_EQ(em::PolicyData::CONSUMER_MANAGED, policy_data->management_mode()); | |
| 288 EXPECT_EQ("fake_request_token", policy_data->request_token()); | |
| 289 EXPECT_EQ("fake_device_id", policy_data->device_id()); | |
| 290 } | |
| 291 | |
| 292 TEST_F(DeviceSettingsServiceTest, StoreFailure) { | 147 TEST_F(DeviceSettingsServiceTest, StoreFailure) { |
| 293 owner_key_util_->Clear(); | 148 owner_key_util_->Clear(); |
| 294 device_settings_test_helper_.set_policy_blob(std::string()); | 149 device_settings_test_helper_.set_policy_blob(std::string()); |
| 295 ReloadDeviceSettings(); | 150 ReloadDeviceSettings(); |
| 296 EXPECT_EQ(DeviceSettingsService::STORE_KEY_UNAVAILABLE, | 151 EXPECT_EQ(DeviceSettingsService::STORE_KEY_UNAVAILABLE, |
| 297 device_settings_service_.status()); | 152 device_settings_service_.status()); |
| 298 | 153 |
| 299 device_settings_test_helper_.set_store_result(false); | 154 device_settings_test_helper_.set_store_result(false); |
| 300 device_settings_service_.Store( | 155 device_settings_service_.Store( |
| 301 device_policy_.GetCopy(), | 156 device_policy_.GetCopy(), |
| (...skipping 294 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 596 EXPECT_CALL(observer_, OwnershipStatusChanged()).Times(0); | 451 EXPECT_CALL(observer_, OwnershipStatusChanged()).Times(0); |
| 597 EXPECT_CALL(observer_, DeviceSettingsUpdated()).Times(1); | 452 EXPECT_CALL(observer_, DeviceSettingsUpdated()).Times(1); |
| 598 device_settings_service_.PropertyChangeComplete(true); | 453 device_settings_service_.PropertyChangeComplete(true); |
| 599 FlushDeviceSettings(); | 454 FlushDeviceSettings(); |
| 600 Mock::VerifyAndClearExpectations(&observer_); | 455 Mock::VerifyAndClearExpectations(&observer_); |
| 601 | 456 |
| 602 device_settings_service_.RemoveObserver(&observer_); | 457 device_settings_service_.RemoveObserver(&observer_); |
| 603 } | 458 } |
| 604 | 459 |
| 605 } // namespace chromeos | 460 } // namespace chromeos |
| OLD | NEW |