fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 1 | // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #include "chromeos/network/prohibited_technologies_handler.h" |
| 6 | |
dcheng | 0a6e80c | 2016-04-08 18:37:38 | [diff] [blame] | 7 | #include <memory> |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 8 | #include <string> |
dcheng | 7df85ba | 2015-12-31 04:56:39 | [diff] [blame] | 9 | #include <utility> |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 10 | |
| 11 | #include "base/bind.h" |
| 12 | #include "base/callback.h" |
| 13 | #include "base/json/json_reader.h" |
avi | 6e1a22d | 2015-12-21 03:43:20 | [diff] [blame] | 14 | #include "base/macros.h" |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 15 | #include "base/run_loop.h" |
fdoray | 822e6b2 | 2017-04-27 20:47:03 | [diff] [blame] | 16 | #include "base/test/scoped_task_environment.h" |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 17 | #include "chromeos/network/managed_network_configuration_handler_impl.h" |
| 18 | #include "chromeos/network/network_configuration_handler.h" |
| 19 | #include "chromeos/network/network_profile_handler.h" |
Steven Bennetts | f13e1e4 | 2019-05-15 00:26:31 | [diff] [blame] | 20 | #include "chromeos/network/network_state_handler.h" |
Steven Bennetts | 200d061 | 2019-02-08 02:17:12 | [diff] [blame] | 21 | #include "chromeos/network/network_state_test_helper.h" |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 22 | #include "chromeos/network/onc/onc_utils.h" |
| 23 | #include "testing/gtest/include/gtest/gtest.h" |
| 24 | #include "third_party/cros_system_api/dbus/service_constants.h" |
| 25 | |
| 26 | namespace chromeos { |
| 27 | |
Steven Bennetts | 200d061 | 2019-02-08 02:17:12 | [diff] [blame] | 28 | class ProhibitedTechnologiesHandlerTest : public testing::Test { |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 29 | public: |
fdoray | 822e6b2 | 2017-04-27 20:47:03 | [diff] [blame] | 30 | ProhibitedTechnologiesHandlerTest() |
| 31 | : scoped_task_environment_( |
| 32 | base::test::ScopedTaskEnvironment::MainThreadType::UI) {} |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 33 | |
| 34 | void SetUp() override { |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 35 | LoginState::Initialize(); |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 36 | |
Steven Bennetts | 200d061 | 2019-02-08 02:17:12 | [diff] [blame] | 37 | helper_.manager_test()->AddTechnology(shill::kTypeCellular, |
| 38 | true /* enabled */); |
stevenjb | 888a70ed | 2017-03-29 22:17:17 | [diff] [blame] | 39 | |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 40 | network_config_handler_.reset( |
| 41 | NetworkConfigurationHandler::InitializeForTest( |
Steven Bennetts | 200d061 | 2019-02-08 02:17:12 | [diff] [blame] | 42 | helper_.network_state_handler(), |
| 43 | nullptr /* network_device_handler */)); |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 44 | |
| 45 | network_profile_handler_.reset(new NetworkProfileHandler()); |
| 46 | network_profile_handler_->Init(); |
| 47 | |
| 48 | managed_config_handler_.reset(new ManagedNetworkConfigurationHandlerImpl()); |
| 49 | prohibited_technologies_handler_.reset(new ProhibitedTechnologiesHandler()); |
| 50 | |
| 51 | managed_config_handler_->Init( |
Steven Bennetts | 200d061 | 2019-02-08 02:17:12 | [diff] [blame] | 52 | helper_.network_state_handler(), network_profile_handler_.get(), |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 53 | network_config_handler_.get(), nullptr /* network_device_handler */, |
| 54 | prohibited_technologies_handler_.get()); |
| 55 | |
| 56 | prohibited_technologies_handler_->Init(managed_config_handler_.get(), |
Steven Bennetts | 200d061 | 2019-02-08 02:17:12 | [diff] [blame] | 57 | helper_.network_state_handler()); |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 58 | |
| 59 | base::RunLoop().RunUntilIdle(); |
| 60 | |
| 61 | PreparePolicies(); |
| 62 | } |
| 63 | |
| 64 | void PreparePolicies() { |
dcheng | 0a6e80c | 2016-04-08 18:37:38 | [diff] [blame] | 65 | std::unique_ptr<base::ListValue> val(new base::ListValue()); |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 66 | val->AppendString("WiFi"); |
dcheng | 7df85ba | 2015-12-31 04:56:39 | [diff] [blame] | 67 | global_config_disable_wifi.Set("DisableNetworkTypes", std::move(val)); |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 68 | val.reset(new base::ListValue()); |
| 69 | val->AppendString("WiFi"); |
| 70 | val->AppendString("Cellular"); |
dcheng | 7df85ba | 2015-12-31 04:56:39 | [diff] [blame] | 71 | global_config_disable_wifi_and_cell.Set("DisableNetworkTypes", |
| 72 | std::move(val)); |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 73 | } |
| 74 | |
| 75 | void TearDown() override { |
| 76 | prohibited_technologies_handler_.reset(); |
| 77 | managed_config_handler_.reset(); |
| 78 | network_profile_handler_.reset(); |
| 79 | network_config_handler_.reset(); |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 80 | LoginState::Shutdown(); |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 81 | } |
| 82 | |
| 83 | protected: |
| 84 | void LoginToRegularUser() { |
| 85 | LoginState::Get()->SetLoggedInState(LoginState::LOGGED_IN_ACTIVE, |
| 86 | LoginState::LOGGED_IN_USER_REGULAR); |
| 87 | base::RunLoop().RunUntilIdle(); |
| 88 | } |
| 89 | |
| 90 | void SetupPolicy(const base::DictionaryValue& global_config, |
| 91 | bool user_policy) { |
| 92 | if (user_policy) { |
| 93 | managed_config_handler_->SetPolicy(::onc::ONC_SOURCE_USER_POLICY, |
Steven Bennetts | 200d061 | 2019-02-08 02:17:12 | [diff] [blame] | 94 | helper_.UserHash(), base::ListValue(), |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 95 | global_config); |
| 96 | } else { |
| 97 | managed_config_handler_->SetPolicy(::onc::ONC_SOURCE_DEVICE_POLICY, |
| 98 | std::string(), // no username hash |
| 99 | base::ListValue(), global_config); |
| 100 | } |
| 101 | base::RunLoop().RunUntilIdle(); |
| 102 | } |
| 103 | |
Steven Bennetts | 200d061 | 2019-02-08 02:17:12 | [diff] [blame] | 104 | NetworkStateHandler* network_state_handler() { |
| 105 | return helper_.network_state_handler(); |
| 106 | } |
| 107 | |
| 108 | base::DictionaryValue global_config_disable_wifi; |
| 109 | base::DictionaryValue global_config_disable_wifi_and_cell; |
Anatoliy Potapchuk | 7912da4 | 2019-03-14 14:25:23 | [diff] [blame] | 110 | std::unique_ptr<ProhibitedTechnologiesHandler> |
| 111 | prohibited_technologies_handler_; |
Steven Bennetts | 200d061 | 2019-02-08 02:17:12 | [diff] [blame] | 112 | |
| 113 | private: |
| 114 | base::test::ScopedTaskEnvironment scoped_task_environment_; |
| 115 | NetworkStateTestHelper helper_{false /* use_default_devices_and_services */}; |
Anatoliy Potapchuk | 7912da4 | 2019-03-14 14:25:23 | [diff] [blame] | 116 | |
dcheng | 0a6e80c | 2016-04-08 18:37:38 | [diff] [blame] | 117 | std::unique_ptr<NetworkConfigurationHandler> network_config_handler_; |
| 118 | std::unique_ptr<ManagedNetworkConfigurationHandlerImpl> |
| 119 | managed_config_handler_; |
| 120 | std::unique_ptr<NetworkProfileHandler> network_profile_handler_; |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 121 | |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 122 | DISALLOW_COPY_AND_ASSIGN(ProhibitedTechnologiesHandlerTest); |
| 123 | }; |
| 124 | |
| 125 | TEST_F(ProhibitedTechnologiesHandlerTest, |
| 126 | ProhibitedTechnologiesAllowedLoginScreen) { |
| 127 | EXPECT_TRUE( |
stevenjb | 888a70ed | 2017-03-29 22:17:17 | [diff] [blame] | 128 | network_state_handler()->IsTechnologyEnabled(NetworkTypePattern::WiFi())); |
| 129 | EXPECT_TRUE(network_state_handler()->IsTechnologyEnabled( |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 130 | NetworkTypePattern::Cellular())); |
| 131 | SetupPolicy(global_config_disable_wifi_and_cell, false); |
| 132 | EXPECT_TRUE( |
stevenjb | 888a70ed | 2017-03-29 22:17:17 | [diff] [blame] | 133 | network_state_handler()->IsTechnologyEnabled(NetworkTypePattern::WiFi())); |
| 134 | EXPECT_TRUE(network_state_handler()->IsTechnologyEnabled( |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 135 | NetworkTypePattern::Cellular())); |
fdoray | f5b47fd1 | 2016-09-13 14:12:36 | [diff] [blame] | 136 | } |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 137 | |
| 138 | TEST_F(ProhibitedTechnologiesHandlerTest, |
| 139 | ProhibitedTechnologiesNotAllowedUserSession) { |
| 140 | EXPECT_TRUE( |
stevenjb | 888a70ed | 2017-03-29 22:17:17 | [diff] [blame] | 141 | network_state_handler()->IsTechnologyEnabled(NetworkTypePattern::WiFi())); |
| 142 | EXPECT_TRUE(network_state_handler()->IsTechnologyEnabled( |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 143 | NetworkTypePattern::Cellular())); |
| 144 | SetupPolicy(global_config_disable_wifi_and_cell, false); |
| 145 | |
| 146 | LoginToRegularUser(); |
| 147 | EXPECT_TRUE( |
stevenjb | 888a70ed | 2017-03-29 22:17:17 | [diff] [blame] | 148 | network_state_handler()->IsTechnologyEnabled(NetworkTypePattern::WiFi())); |
| 149 | EXPECT_TRUE(network_state_handler()->IsTechnologyEnabled( |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 150 | NetworkTypePattern::Cellular())); |
| 151 | |
| 152 | SetupPolicy(base::DictionaryValue(), true); // wait for user policy |
| 153 | |
| 154 | // Should be disabled after logged in |
| 155 | EXPECT_FALSE( |
stevenjb | 888a70ed | 2017-03-29 22:17:17 | [diff] [blame] | 156 | network_state_handler()->IsTechnologyEnabled(NetworkTypePattern::WiFi())); |
| 157 | EXPECT_FALSE(network_state_handler()->IsTechnologyEnabled( |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 158 | NetworkTypePattern::Cellular())); |
| 159 | |
| 160 | // Can not enable it back |
stevenjb | 888a70ed | 2017-03-29 22:17:17 | [diff] [blame] | 161 | network_state_handler()->SetTechnologyEnabled( |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 162 | NetworkTypePattern::WiFi(), true, network_handler::ErrorCallback()); |
stevenjb | 888a70ed | 2017-03-29 22:17:17 | [diff] [blame] | 163 | network_state_handler()->SetTechnologyEnabled( |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 164 | NetworkTypePattern::Cellular(), true, network_handler::ErrorCallback()); |
fdoray | f5b47fd1 | 2016-09-13 14:12:36 | [diff] [blame] | 165 | base::RunLoop().RunUntilIdle(); |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 166 | EXPECT_FALSE( |
stevenjb | 888a70ed | 2017-03-29 22:17:17 | [diff] [blame] | 167 | network_state_handler()->IsTechnologyEnabled(NetworkTypePattern::WiFi())); |
| 168 | EXPECT_FALSE(network_state_handler()->IsTechnologyEnabled( |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 169 | NetworkTypePattern::Cellular())); |
| 170 | |
| 171 | // Can enable Cellular back after modifying policy |
| 172 | SetupPolicy(global_config_disable_wifi, false); |
stevenjb | 888a70ed | 2017-03-29 22:17:17 | [diff] [blame] | 173 | network_state_handler()->SetTechnologyEnabled( |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 174 | NetworkTypePattern::WiFi(), true, network_handler::ErrorCallback()); |
stevenjb | 888a70ed | 2017-03-29 22:17:17 | [diff] [blame] | 175 | network_state_handler()->SetTechnologyEnabled( |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 176 | NetworkTypePattern::Cellular(), true, network_handler::ErrorCallback()); |
fdoray | f5b47fd1 | 2016-09-13 14:12:36 | [diff] [blame] | 177 | base::RunLoop().RunUntilIdle(); |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 178 | EXPECT_FALSE( |
stevenjb | 888a70ed | 2017-03-29 22:17:17 | [diff] [blame] | 179 | network_state_handler()->IsTechnologyEnabled(NetworkTypePattern::WiFi())); |
| 180 | EXPECT_TRUE(network_state_handler()->IsTechnologyEnabled( |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 181 | NetworkTypePattern::Cellular())); |
fdoray | f5b47fd1 | 2016-09-13 14:12:36 | [diff] [blame] | 182 | } |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 183 | |
Anatoliy Potapchuk | 7912da4 | 2019-03-14 14:25:23 | [diff] [blame] | 184 | TEST_F(ProhibitedTechnologiesHandlerTest, |
| 185 | IsGloballyProhibitedTechnologyWorksAfterReenabling) { |
| 186 | LoginToRegularUser(); |
| 187 | SetupPolicy(base::DictionaryValue(), true); // wait for user policy |
| 188 | |
| 189 | EXPECT_TRUE( |
| 190 | network_state_handler()->IsTechnologyEnabled(NetworkTypePattern::WiFi())); |
| 191 | prohibited_technologies_handler_->AddGloballyProhibitedTechnology( |
| 192 | shill::kTypeWifi); |
| 193 | EXPECT_FALSE( |
| 194 | network_state_handler()->IsTechnologyEnabled(NetworkTypePattern::WiFi())); |
| 195 | |
| 196 | // Enabling it back |
| 197 | prohibited_technologies_handler_->RemoveGloballyProhibitedTechnology( |
| 198 | shill::kTypeWifi); |
| 199 | network_state_handler()->SetTechnologyEnabled( |
| 200 | NetworkTypePattern::WiFi(), true, network_handler::ErrorCallback()); |
| 201 | base::RunLoop().RunUntilIdle(); |
| 202 | EXPECT_TRUE( |
| 203 | network_state_handler()->IsTechnologyEnabled(NetworkTypePattern::WiFi())); |
| 204 | } |
| 205 | |
| 206 | TEST_F(ProhibitedTechnologiesHandlerTest, |
| 207 | InteractionBetweenGloballyAndSessionsProhibitedTechnologies) { |
| 208 | // Set session prohibiting of Cellular, should not prohibit on login screen |
| 209 | SetupPolicy(global_config_disable_wifi_and_cell, false); |
| 210 | EXPECT_TRUE(network_state_handler()->IsTechnologyEnabled( |
| 211 | NetworkTypePattern::Cellular())); |
| 212 | |
| 213 | LoginToRegularUser(); |
| 214 | SetupPolicy(base::DictionaryValue(), true); // receive user policy |
| 215 | // Cellular should be prohibited |
| 216 | EXPECT_FALSE(network_state_handler()->IsTechnologyEnabled( |
| 217 | NetworkTypePattern::Cellular())); |
| 218 | |
| 219 | // Should be prohibited after adding to globally prohibited list |
| 220 | prohibited_technologies_handler_->AddGloballyProhibitedTechnology( |
| 221 | shill::kTypeCellular); |
| 222 | network_state_handler()->SetTechnologyEnabled( |
| 223 | NetworkTypePattern::Cellular(), true, network_handler::ErrorCallback()); |
| 224 | base::RunLoop().RunUntilIdle(); |
| 225 | EXPECT_FALSE(network_state_handler()->IsTechnologyEnabled( |
| 226 | NetworkTypePattern::Cellular())); |
| 227 | |
| 228 | // Should be prohibited after removing from globally prohibited list |
| 229 | prohibited_technologies_handler_->RemoveGloballyProhibitedTechnology( |
| 230 | shill::kTypeCellular); |
| 231 | network_state_handler()->SetTechnologyEnabled( |
| 232 | NetworkTypePattern::Cellular(), true, network_handler::ErrorCallback()); |
| 233 | base::RunLoop().RunUntilIdle(); |
| 234 | EXPECT_FALSE(network_state_handler()->IsTechnologyEnabled( |
| 235 | NetworkTypePattern::Cellular())); |
| 236 | |
| 237 | // Should not be prohibited after updating session prohibited list. |
| 238 | SetupPolicy(global_config_disable_wifi, false); |
| 239 | network_state_handler()->SetTechnologyEnabled( |
| 240 | NetworkTypePattern::Cellular(), true, network_handler::ErrorCallback()); |
| 241 | base::RunLoop().RunUntilIdle(); |
| 242 | EXPECT_TRUE(network_state_handler()->IsTechnologyEnabled( |
| 243 | NetworkTypePattern::Cellular())); |
| 244 | } |
| 245 | |
fqj | fee5067a | 2015-11-13 20:12:59 | [diff] [blame] | 246 | } // namespace chromeos |