| Index: chrome/browser/chromeos/settings/device_settings_service_unittest.cc
|
| diff --git a/chrome/browser/chromeos/settings/device_settings_service_unittest.cc b/chrome/browser/chromeos/settings/device_settings_service_unittest.cc
|
| index e0b4b79bfa87eb57eac22f1cf4fcec10763bd8c1..dfc9b92a506d4f63fabdd05b7761cfb7d1244499 100644
|
| --- a/chrome/browser/chromeos/settings/device_settings_service_unittest.cc
|
| +++ b/chrome/browser/chromeos/settings/device_settings_service_unittest.cc
|
| @@ -10,6 +10,8 @@
|
| #include "base/compiler_specific.h"
|
| #include "base/time/time.h"
|
| #include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos.h"
|
| +#include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos.h"
|
| +#include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos_factory.h"
|
| #include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos_factory.h"
|
| #include "chrome/browser/chromeos/policy/proto/chrome_device_policy.pb.h"
|
| #include "chrome/browser/chromeos/settings/device_settings_test_helper.h"
|
| @@ -142,153 +144,6 @@ TEST_F(DeviceSettingsServiceTest, LoadSuccess) {
|
| CheckPolicy();
|
| }
|
|
|
| -TEST_F(DeviceSettingsServiceTest, SetManagementSettingsModeTransition) {
|
| - ReloadDeviceSettings();
|
| - EXPECT_EQ(DeviceSettingsService::STORE_SUCCESS,
|
| - device_settings_service_.status());
|
| -
|
| - owner_key_util_->SetPrivateKey(device_policy_.GetSigningKey());
|
| - InitOwner(device_policy_.policy_data().username(), true);
|
| - FlushDeviceSettings();
|
| -
|
| - // The initial management mode should be LOCAL_OWNER.
|
| - EXPECT_EQ(em::PolicyData::LOCAL_OWNER,
|
| - device_settings_service_.policy_data()->management_mode());
|
| -
|
| - // LOCAL_OWNER -> CONSUMER_MANAGED: Okay.
|
| - device_settings_service_.SetManagementSettings(
|
| - em::PolicyData::CONSUMER_MANAGED,
|
| - "fake_request_token",
|
| - "fake_device_id",
|
| - base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted,
|
| - base::Unretained(this)));
|
| - FlushDeviceSettings();
|
| -
|
| - EXPECT_TRUE(operation_completed_);
|
| - EXPECT_EQ(DeviceSettingsService::STORE_SUCCESS,
|
| - device_settings_service_.status());
|
| - EXPECT_EQ(em::PolicyData::CONSUMER_MANAGED,
|
| - device_settings_service_.policy_data()->management_mode());
|
| -
|
| - // CONSUMER_MANAGED -> ENTERPRISE_MANAGED: Invalid.
|
| - device_settings_service_.SetManagementSettings(
|
| - em::PolicyData::ENTERPRISE_MANAGED,
|
| - "fake_request_token",
|
| - "fake_device_id",
|
| - base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted,
|
| - base::Unretained(this)));
|
| - FlushDeviceSettings();
|
| -
|
| - EXPECT_TRUE(operation_completed_);
|
| - EXPECT_EQ(DeviceSettingsService::STORE_POLICY_ERROR,
|
| - device_settings_service_.status());
|
| - EXPECT_EQ(em::PolicyData::CONSUMER_MANAGED,
|
| - device_settings_service_.policy_data()->management_mode());
|
| -
|
| - // CONSUMER_MANAGED -> LOCAL_OWNER: Okay.
|
| - device_settings_service_.SetManagementSettings(
|
| - em::PolicyData::LOCAL_OWNER,
|
| - "fake_request_token",
|
| - "fake_device_id",
|
| - base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted,
|
| - base::Unretained(this)));
|
| - FlushDeviceSettings();
|
| -
|
| - EXPECT_TRUE(operation_completed_);
|
| - EXPECT_EQ(DeviceSettingsService::STORE_SUCCESS,
|
| - device_settings_service_.status());
|
| - EXPECT_EQ(em::PolicyData::LOCAL_OWNER,
|
| - device_settings_service_.policy_data()->management_mode());
|
| -
|
| - // LOCAL_OWNER -> ENTERPRISE_MANAGED: Invalid.
|
| - device_settings_service_.SetManagementSettings(
|
| - em::PolicyData::ENTERPRISE_MANAGED,
|
| - "fake_request_token",
|
| - "fake_device_id",
|
| - base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted,
|
| - base::Unretained(this)));
|
| - FlushDeviceSettings();
|
| -
|
| - EXPECT_TRUE(operation_completed_);
|
| - EXPECT_EQ(DeviceSettingsService::STORE_POLICY_ERROR,
|
| - device_settings_service_.status());
|
| - EXPECT_EQ(em::PolicyData::LOCAL_OWNER,
|
| - device_settings_service_.policy_data()->management_mode());
|
| -
|
| - // Inject a policy data with management mode set to ENTERPRISE_MANAGED.
|
| - device_policy_.policy_data().set_management_mode(
|
| - em::PolicyData::ENTERPRISE_MANAGED);
|
| - device_policy_.Build();
|
| - device_settings_test_helper_.set_policy_blob(device_policy_.GetBlob());
|
| - ReloadDeviceSettings();
|
| - EXPECT_EQ(em::PolicyData::ENTERPRISE_MANAGED,
|
| - device_settings_service_.policy_data()->management_mode());
|
| -
|
| - // ENTERPRISE_MANAGED -> LOCAL_OWNER: Invalid.
|
| - device_settings_service_.SetManagementSettings(
|
| - em::PolicyData::LOCAL_OWNER,
|
| - "fake_request_token",
|
| - "fake_device_id",
|
| - base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted,
|
| - base::Unretained(this)));
|
| - FlushDeviceSettings();
|
| -
|
| - EXPECT_TRUE(operation_completed_);
|
| - EXPECT_EQ(DeviceSettingsService::STORE_POLICY_ERROR,
|
| - device_settings_service_.status());
|
| - EXPECT_EQ(em::PolicyData::ENTERPRISE_MANAGED,
|
| - device_settings_service_.policy_data()->management_mode());
|
| -
|
| - // ENTERPRISE_MANAGED -> CONSUMER_MANAGED: Invalid.
|
| - device_settings_service_.SetManagementSettings(
|
| - em::PolicyData::CONSUMER_MANAGED,
|
| - "fake_request_token",
|
| - "fake_device_id",
|
| - base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted,
|
| - base::Unretained(this)));
|
| - FlushDeviceSettings();
|
| -
|
| - EXPECT_TRUE(operation_completed_);
|
| - EXPECT_EQ(DeviceSettingsService::STORE_POLICY_ERROR,
|
| - device_settings_service_.status());
|
| - EXPECT_EQ(em::PolicyData::ENTERPRISE_MANAGED,
|
| - device_settings_service_.policy_data()->management_mode());
|
| -
|
| -}
|
| -
|
| -TEST_F(DeviceSettingsServiceTest, SetManagementSettingsSuccess) {
|
| - ReloadDeviceSettings();
|
| - EXPECT_EQ(DeviceSettingsService::STORE_SUCCESS,
|
| - device_settings_service_.status());
|
| -
|
| - owner_key_util_->SetPrivateKey(device_policy_.GetSigningKey());
|
| - InitOwner(device_policy_.policy_data().username(), true);
|
| - FlushDeviceSettings();
|
| -
|
| - device_settings_service_.SetManagementSettings(
|
| - em::PolicyData::CONSUMER_MANAGED,
|
| - "fake_request_token",
|
| - "fake_device_id",
|
| - base::Bind(&DeviceSettingsServiceTest::SetOperationCompleted,
|
| - base::Unretained(this)));
|
| - FlushDeviceSettings();
|
| -
|
| - EXPECT_TRUE(operation_completed_);
|
| - EXPECT_EQ(DeviceSettingsService::STORE_SUCCESS,
|
| - device_settings_service_.status());
|
| - ASSERT_TRUE(device_settings_service_.device_settings());
|
| -
|
| - // Check that the loaded policy_data contains the expected values.
|
| - const em::PolicyData* policy_data = device_settings_service_.policy_data();
|
| - EXPECT_EQ(policy::dm_protocol::kChromeDevicePolicyType,
|
| - policy_data->policy_type());
|
| - EXPECT_EQ(device_settings_service_.GetUsername(),
|
| - policy_data->username());
|
| - EXPECT_EQ(em::PolicyData::CONSUMER_MANAGED, policy_data->management_mode());
|
| - EXPECT_EQ("fake_request_token", policy_data->request_token());
|
| - EXPECT_EQ("fake_device_id", policy_data->device_id());
|
| -}
|
| -
|
| TEST_F(DeviceSettingsServiceTest, StoreFailure) {
|
| owner_key_util_->Clear();
|
| device_settings_test_helper_.set_policy_blob(std::string());
|
|
|