Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(391)

Side by Side Diff: chrome/browser/chromeos/device_settings_provider_unittest.cc

Issue 10824112: Move Chrome OS device settings stuff to chrome/browser/chromeos/settings. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebase. Created 8 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "chrome/browser/chromeos/device_settings_provider.h"
6
7 #include <string>
8
9 #include "base/bind.h"
10 #include "base/message_loop.h"
11 #include "base/values.h"
12 #include "chrome/browser/chromeos/cros/cros_library.h"
13 #include "chrome/browser/chromeos/cros_settings_names.h"
14 #include "chrome/browser/chromeos/login/mock_signed_settings_helper.h"
15 #include "chrome/browser/chromeos/login/mock_user_manager.h"
16 #include "chrome/browser/chromeos/login/ownership_service.h"
17 #include "chrome/browser/policy/proto/chrome_device_policy.pb.h"
18 #include "chrome/browser/policy/proto/device_management_backend.pb.h"
19 #include "chrome/test/base/testing_browser_process.h"
20 #include "chrome/test/base/testing_pref_service.h"
21 #include "content/public/test/test_browser_thread.h"
22 #include "testing/gmock/include/gmock/gmock.h"
23 #include "testing/gtest/include/gtest/gtest.h"
24
25 namespace em = enterprise_management;
26 namespace chromeos {
27
28 using ::testing::_;
29 using ::testing::AnyNumber;
30 using ::testing::Mock;
31 using ::testing::Return;
32 using ::testing::SaveArg;
33
34 class DeviceSettingsProviderTest: public testing::Test {
35 public:
36 MOCK_METHOD1(SettingChanged, void(const std::string&));
37 MOCK_METHOD0(GetTrustedCallback, void(void));
38
39 protected:
40 DeviceSettingsProviderTest()
41 : message_loop_(MessageLoop::TYPE_UI),
42 ui_thread_(content::BrowserThread::UI, &message_loop_),
43 file_thread_(content::BrowserThread::FILE, &message_loop_),
44 local_state_(static_cast<TestingBrowserProcess*>(g_browser_process)) {
45 }
46
47 virtual ~DeviceSettingsProviderTest() {
48 }
49
50 virtual void SetUp() OVERRIDE {
51 PrepareEmptyPolicy();
52
53 EXPECT_CALL(*this, SettingChanged(_))
54 .Times(AnyNumber());
55
56 EXPECT_CALL(signed_settings_helper_, StartRetrievePolicyOp(_))
57 .WillRepeatedly(
58 MockSignedSettingsHelperRetrievePolicy(SignedSettings::SUCCESS,
59 policy_blob_));
60 EXPECT_CALL(signed_settings_helper_, StartStorePolicyOp(_,_))
61 .WillRepeatedly(DoAll(
62 SaveArg<0>(&policy_blob_),
63 MockSignedSettingsHelperStorePolicy(SignedSettings::SUCCESS)));
64
65 EXPECT_CALL(*mock_user_manager_.user_manager(), IsCurrentUserOwner())
66 .WillRepeatedly(Return(true));
67
68 provider_.reset(
69 new DeviceSettingsProvider(
70 base::Bind(&DeviceSettingsProviderTest::SettingChanged,
71 base::Unretained(this)),
72 &signed_settings_helper_));
73 provider_->set_ownership_status(OwnershipService::OWNERSHIP_TAKEN);
74 // To prevent flooding the logs.
75 provider_->set_retries_left(1);
76 provider_->Reload();
77 }
78
79 void PrepareEmptyPolicy() {
80 em::PolicyData policy;
81 em::ChromeDeviceSettingsProto pol;
82 // Set metrics to disabled to prevent us from running into code that is not
83 // mocked.
84 pol.mutable_metrics_enabled()->set_metrics_enabled(false);
85 policy.set_policy_type(chromeos::kDevicePolicyType);
86 policy.set_username("me@owner");
87 policy.set_policy_value(pol.SerializeAsString());
88 // Wipe the signed settings store.
89 policy_blob_.set_policy_data(policy.SerializeAsString());
90 policy_blob_.set_policy_data_signature("false");
91 }
92
93 em::PolicyFetchResponse policy_blob_;
94
95 scoped_ptr<DeviceSettingsProvider> provider_;
96
97 MessageLoop message_loop_;
98 content::TestBrowserThread ui_thread_;
99 content::TestBrowserThread file_thread_;
100
101 ScopedTestingLocalState local_state_;
102
103 MockSignedSettingsHelper signed_settings_helper_;
104
105 ScopedStubCrosEnabler stub_cros_enabler_;
106 ScopedMockUserManagerEnabler mock_user_manager_;
107 };
108
109 TEST_F(DeviceSettingsProviderTest, InitializationTest) {
110 // Verify that the policy blob has been correctly parsed and trusted.
111 // The trusted flag should be set before the call to PrepareTrustedValues.
112 EXPECT_EQ(CrosSettingsProvider::TRUSTED,
113 provider_->PrepareTrustedValues(
114 base::Bind(&DeviceSettingsProviderTest::GetTrustedCallback,
115 base::Unretained(this))));
116 const base::Value* value = provider_->Get(kStatsReportingPref);
117 ASSERT_TRUE(value);
118 bool bool_value;
119 EXPECT_TRUE(value->GetAsBoolean(&bool_value));
120 EXPECT_FALSE(bool_value);
121 }
122
123 TEST_F(DeviceSettingsProviderTest, InitializationTestUnowned) {
124 // No calls to the SignedSettingsHelper should occur in this case!
125 Mock::VerifyAndClear(&signed_settings_helper_);
126
127 provider_->set_ownership_status(OwnershipService::OWNERSHIP_NONE);
128 provider_->Reload();
129 // The trusted flag should be set before the call to PrepareTrustedValues.
130 EXPECT_EQ(CrosSettingsProvider::TRUSTED,
131 provider_->PrepareTrustedValues(
132 base::Bind(&DeviceSettingsProviderTest::GetTrustedCallback,
133 base::Unretained(this))));
134 const base::Value* value = provider_->Get(kReleaseChannel);
135 ASSERT_TRUE(value);
136 std::string string_value;
137 EXPECT_TRUE(value->GetAsString(&string_value));
138 EXPECT_TRUE(string_value.empty());
139
140 // Sets should succeed though and be readable from the cache.
141 base::StringValue new_value("stable-channel");
142 provider_->Set(kReleaseChannel, new_value);
143 // Do one more reload here to make sure we don't flip randomly between stores.
144 provider_->Reload();
145 // Verify the change has not been applied.
146 const base::Value* saved_value = provider_->Get(kReleaseChannel);
147 ASSERT_TRUE(saved_value);
148 EXPECT_TRUE(saved_value->GetAsString(&string_value));
149 ASSERT_EQ("stable-channel", string_value);
150 }
151
152 TEST_F(DeviceSettingsProviderTest, SetPrefFailed) {
153 // If we are not the owner no sets should work.
154 EXPECT_CALL(*mock_user_manager_.user_manager(), IsCurrentUserOwner())
155 .WillOnce(Return(false));
156 base::FundamentalValue value(true);
157 provider_->Set(kStatsReportingPref, value);
158 // Verify the change has not been applied.
159 const base::Value* saved_value = provider_->Get(kStatsReportingPref);
160 ASSERT_TRUE(saved_value);
161 bool bool_value;
162 EXPECT_TRUE(saved_value->GetAsBoolean(&bool_value));
163 EXPECT_FALSE(bool_value);
164 }
165
166 TEST_F(DeviceSettingsProviderTest, SetPrefSucceed) {
167 base::FundamentalValue value(true);
168 provider_->Set(kStatsReportingPref, value);
169 // Verify the change has not been applied.
170 const base::Value* saved_value = provider_->Get(kStatsReportingPref);
171 ASSERT_TRUE(saved_value);
172 bool bool_value;
173 EXPECT_TRUE(saved_value->GetAsBoolean(&bool_value));
174 EXPECT_TRUE(bool_value);
175 }
176
177 TEST_F(DeviceSettingsProviderTest, PolicyRetrievalFailedBadSingature) {
178 // No calls to the SignedSettingsHelper should occur in this case!
179 Mock::VerifyAndClear(&signed_settings_helper_);
180 EXPECT_CALL(signed_settings_helper_, StartRetrievePolicyOp(_))
181 .WillRepeatedly(
182 MockSignedSettingsHelperRetrievePolicy(
183 SignedSettings::BAD_SIGNATURE,
184 policy_blob_));
185 provider_->Reload();
186 // Verify that the cache policy blob is not "trusted".
187 EXPECT_EQ(CrosSettingsProvider::PERMANENTLY_UNTRUSTED,
188 provider_->PrepareTrustedValues(
189 base::Bind(&DeviceSettingsProviderTest::GetTrustedCallback,
190 base::Unretained(this))));
191 }
192
193 TEST_F(DeviceSettingsProviderTest, PolicyRetrievalOperationFailedPermanently) {
194 // No calls to the SignedSettingsHelper should occur in this case!
195 Mock::VerifyAndClear(&signed_settings_helper_);
196 EXPECT_CALL(signed_settings_helper_, StartRetrievePolicyOp(_))
197 .WillRepeatedly(
198 MockSignedSettingsHelperRetrievePolicy(
199 SignedSettings::OPERATION_FAILED,
200 policy_blob_));
201 provider_->Reload();
202 // Verify that the cache policy blob is not "trusted".
203 EXPECT_EQ(CrosSettingsProvider::PERMANENTLY_UNTRUSTED,
204 provider_->PrepareTrustedValues(
205 base::Bind(&DeviceSettingsProviderTest::GetTrustedCallback,
206 base::Unretained(this))));
207 }
208
209 TEST_F(DeviceSettingsProviderTest, PolicyRetrievalOperationFailedOnce) {
210 // No calls to the SignedSettingsHelper should occur in this case!
211 Mock::VerifyAndClear(&signed_settings_helper_);
212 EXPECT_CALL(signed_settings_helper_, StartRetrievePolicyOp(_))
213 .WillOnce(
214 MockSignedSettingsHelperRetrievePolicy(
215 SignedSettings::OPERATION_FAILED,
216 policy_blob_))
217 .WillRepeatedly(
218 MockSignedSettingsHelperRetrievePolicy(
219 SignedSettings::SUCCESS,
220 policy_blob_));
221 // Should be trusted after an automatic reload.
222 provider_->Reload();
223 // Verify that the cache policy blob is not "trusted".
224 EXPECT_EQ(CrosSettingsProvider::TRUSTED,
225 provider_->PrepareTrustedValues(
226 base::Bind(&DeviceSettingsProviderTest::GetTrustedCallback,
227 base::Unretained(this))));
228 }
229
230 TEST_F(DeviceSettingsProviderTest, PolicyFailedPermanentlyNotification) {
231 Mock::VerifyAndClear(&signed_settings_helper_);
232 EXPECT_CALL(signed_settings_helper_, StartRetrievePolicyOp(_))
233 .WillRepeatedly(
234 MockSignedSettingsHelperRetrievePolicy(
235 SignedSettings::OPERATION_FAILED,
236 policy_blob_));
237
238 provider_->set_trusted_status(CrosSettingsProvider::TEMPORARILY_UNTRUSTED);
239 EXPECT_CALL(*this, GetTrustedCallback());
240 EXPECT_EQ(CrosSettingsProvider::TEMPORARILY_UNTRUSTED,
241 provider_->PrepareTrustedValues(
242 base::Bind(&DeviceSettingsProviderTest::GetTrustedCallback,
243 base::Unretained(this))));
244 provider_->Reload();
245 }
246
247 TEST_F(DeviceSettingsProviderTest, PolicyLoadNotification) {
248 provider_->set_trusted_status(CrosSettingsProvider::TEMPORARILY_UNTRUSTED);
249 EXPECT_CALL(*this, GetTrustedCallback());
250 EXPECT_EQ(CrosSettingsProvider::TEMPORARILY_UNTRUSTED,
251 provider_->PrepareTrustedValues(
252 base::Bind(&DeviceSettingsProviderTest::GetTrustedCallback,
253 base::Unretained(this))));
254 provider_->Reload();
255 }
256
257 } // namespace chromeos
OLDNEW
« no previous file with comments | « chrome/browser/chromeos/device_settings_provider.cc ('k') | chrome/browser/chromeos/kiosk_mode/kiosk_mode_settings.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698