blob: 7088da3e25f29ef67c77cc208a888f3a82364b61 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <memory>
#include <utility>
#include "base/bind.h"
#include "base/logging.h"
#include "base/memory/ptr_util.h"
#include "base/run_loop.h"
#include "base/single_thread_task_runner.h"
#include "base/test/task_environment.h"
#include "base/time/tick_clock.h"
#include "base/timer/timer.h"
#include "chromeos/attestation/attestation_flow_factory.h"
#include "chromeos/attestation/attestation_flow_integrated.h"
#include "chromeos/attestation/attestation_flow_utils.h"
#include "chromeos/attestation/mock_attestation_flow.h"
#include "chromeos/cryptohome/cryptohome_parameters.h"
#include "chromeos/dbus/attestation/attestation_client.h"
#include "components/account_id/account_id.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "testing/gtest/include/gtest/gtest.h"
using testing::_;
using testing::AtLeast;
using testing::DoDefault;
using testing::Invoke;
using testing::NiceMock;
using testing::Return;
using testing::Sequence;
using testing::StrictMock;
using testing::WithArgs;
namespace chromeos {
namespace attestation {
namespace {
constexpr char kFakeUserEmail[] = "fake@test.com";
} // namespace
class AttestationFlowTest : public testing::Test {
public:
AttestationFlowTest() { chromeos::AttestationClient::InitializeFake(); }
~AttestationFlowTest() override { chromeos::AttestationClient::Shutdown(); }
void QuitRunLoopCertificateCallback(
AttestationFlow::CertificateCallback callback,
AttestationStatus status,
const std::string& cert) {
LOG(WARNING) << "Quitting run loop.";
run_loop_->Quit();
if (callback)
std::move(callback).Run(status, cert);
}
protected:
void RunUntilIdle() {
base::RunLoop run_loop;
run_loop_ = &run_loop;
run_loop_->RunUntilIdle();
}
void Run() {
base::RunLoop run_loop;
run_loop_ = &run_loop;
run_loop_->Run();
}
base::test::SingleThreadTaskEnvironment task_environment_;
base::RunLoop* run_loop_;
};
TEST_F(AttestationFlowTest, GetCertificate) {
// Verify the order of calls in a sequence.
Sequence flow_order;
// Set the enrollment status as `false` so the full enrollment flow is
// triggered.
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(false);
chromeos::AttestationClient::Get()
->GetTestInterface()
->ConfigureEnrollmentPreparations(true);
// Use StrictMock when we want to verify invocation frequency.
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
proxy->DeferToFake(true);
proxy->fake()->set_enroll_response(
AttestationClient::Get()->GetTestInterface()->GetFakePcaEnrollResponse());
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
EXPECT_CALL(*proxy, SendEnrollRequest(AttestationClient::Get()
->GetTestInterface()
->GetFakePcaEnrollRequest(),
_))
.Times(1)
.InSequence(flow_order);
const AccountId account_id = AccountId::FromUserEmail(kFakeUserEmail);
chromeos::AttestationClient::Get()
->GetTestInterface()
->AllowlistLegacyCreateCertificateRequest(
kFakeUserEmail, "fake_origin",
::attestation::ENTERPRISE_USER_CERTIFICATE,
::attestation::KEY_TYPE_RSA);
proxy->fake()->set_cert_response(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertResponse());
EXPECT_CALL(
*proxy,
SendCertificateRequest(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertRequest(),
_))
.Times(1)
.InSequence(flow_order);
StrictMock<MockObserver> observer;
EXPECT_CALL(
observer,
MockCertificateCallback(
ATTESTATION_SUCCESS,
AttestationClient::Get()->GetTestInterface()->GetFakeCertificate()))
.Times(1)
.InSequence(flow_order);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, account_id,
"fake_origin", true, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
EXPECT_EQ(AttestationClient::Get()->GetTestInterface()->GetFakeCertificate(),
AttestationClient::Get()
->GetTestInterface()
->GetMutableKeyInfoReply(
kFakeUserEmail,
GetKeyNameForProfile(PROFILE_ENTERPRISE_USER_CERTIFICATE,
"fake_origin"))
->certificate());
}
// This is pretty much identical to `GetCertificate` while the flow under test
// is created by the factory function to make sure that the factory function
// instantiates an object of the intended type.
TEST_F(AttestationFlowTest, GetCertificateCreatedByFactory) {
// Verify the order of calls in a sequence.
Sequence flow_order;
// Set the enrollment status as `false` so the full enrollment flow is
// triggered.
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(false);
chromeos::AttestationClient::Get()
->GetTestInterface()
->ConfigureEnrollmentPreparations(true);
// Use StrictMock when we want to verify invocation frequency.
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
proxy->DeferToFake(true);
proxy->fake()->set_enroll_response(
AttestationClient::Get()->GetTestInterface()->GetFakePcaEnrollResponse());
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
EXPECT_CALL(*proxy, SendEnrollRequest(AttestationClient::Get()
->GetTestInterface()
->GetFakePcaEnrollRequest(),
_))
.Times(1)
.InSequence(flow_order);
const AccountId account_id = AccountId::FromUserEmail(kFakeUserEmail);
chromeos::AttestationClient::Get()
->GetTestInterface()
->AllowlistLegacyCreateCertificateRequest(
kFakeUserEmail, "fake_origin",
::attestation::ENTERPRISE_USER_CERTIFICATE,
::attestation::KEY_TYPE_RSA);
proxy->fake()->set_cert_response(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertResponse());
EXPECT_CALL(
*proxy,
SendCertificateRequest(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertRequest(),
_))
.Times(1)
.InSequence(flow_order);
StrictMock<MockObserver> observer;
EXPECT_CALL(
observer,
MockCertificateCallback(
ATTESTATION_SUCCESS,
AttestationClient::Get()->GetTestInterface()->GetFakeCertificate()))
.Times(1)
.InSequence(flow_order);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlowFactory attestation_flow_factory;
attestation_flow_factory.Initialize(std::move(proxy_interface));
attestation_flow_factory.GetFallback()->GetCertificate(
PROFILE_ENTERPRISE_USER_CERTIFICATE, account_id, "fake_origin", true,
std::string() /* key_name */, std::move(mock_callback));
RunUntilIdle();
EXPECT_EQ(AttestationClient::Get()->GetTestInterface()->GetFakeCertificate(),
AttestationClient::Get()
->GetTestInterface()
->GetMutableKeyInfoReply(
kFakeUserEmail,
GetKeyNameForProfile(PROFILE_ENTERPRISE_USER_CERTIFICATE,
"fake_origin"))
->certificate());
}
// This is pretty much identical to |GetCertificate| item but during
// construction the ecc key type is specified.
TEST_F(AttestationFlowTest, GetCertificate_Ecc) {
// Verify the order of calls in a sequence.
Sequence flow_order;
// Set the enrollment status as `false` so the full enrollment flow is
// triggered.
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(false);
chromeos::AttestationClient::Get()
->GetTestInterface()
->ConfigureEnrollmentPreparations(true);
// Use StrictMock when we want to verify invocation frequency.
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
proxy->DeferToFake(true);
proxy->fake()->set_enroll_response(
AttestationClient::Get()->GetTestInterface()->GetFakePcaEnrollResponse());
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
EXPECT_CALL(*proxy, SendEnrollRequest(AttestationClient::Get()
->GetTestInterface()
->GetFakePcaEnrollRequest(),
_))
.Times(1)
.InSequence(flow_order);
const AccountId account_id = AccountId::FromUserEmail(kFakeUserEmail);
chromeos::AttestationClient::Get()
->GetTestInterface()
->AllowlistLegacyCreateCertificateRequest(
kFakeUserEmail, "fake_origin",
::attestation::ENTERPRISE_USER_CERTIFICATE,
::attestation::KEY_TYPE_ECC);
proxy->fake()->set_cert_response(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertResponse());
EXPECT_CALL(
*proxy,
SendCertificateRequest(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertRequest(),
_))
.Times(1)
.InSequence(flow_order);
StrictMock<MockObserver> observer;
EXPECT_CALL(
observer,
MockCertificateCallback(
ATTESTATION_SUCCESS,
AttestationClient::Get()->GetTestInterface()->GetFakeCertificate()))
.Times(1)
.InSequence(flow_order);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface), ::attestation::KEY_TYPE_ECC);
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, account_id,
"fake_origin", true, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
EXPECT_EQ(AttestationClient::Get()->GetTestInterface()->GetFakeCertificate(),
AttestationClient::Get()
->GetTestInterface()
->GetMutableKeyInfoReply(
kFakeUserEmail,
GetKeyNameForProfile(PROFILE_ENTERPRISE_USER_CERTIFICATE,
"fake_origin"))
->certificate());
}
TEST_F(AttestationFlowTest, GetCertificate_Attestation_Not_Prepared) {
// Verify the order of calls in a sequence.
Sequence flow_order;
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(false);
chromeos::AttestationClient::Get()
->GetTestInterface()
->ConfigureEnrollmentPreparationsSequence({false, true});
// Use StrictMock when we want to verify invocation frequency.
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
proxy->DeferToFake(true);
proxy->fake()->set_enroll_response(
AttestationClient::Get()->GetTestInterface()->GetFakePcaEnrollResponse());
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
EXPECT_CALL(*proxy, SendEnrollRequest(AttestationClient::Get()
->GetTestInterface()
->GetFakePcaEnrollRequest(),
_))
.Times(1)
.InSequence(flow_order);
const AccountId account_id = AccountId::FromUserEmail(kFakeUserEmail);
chromeos::AttestationClient::Get()
->GetTestInterface()
->AllowlistLegacyCreateCertificateRequest(
kFakeUserEmail, "fake_origin",
::attestation::ENTERPRISE_USER_CERTIFICATE,
::attestation::KEY_TYPE_RSA);
proxy->fake()->set_cert_response(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertResponse());
EXPECT_CALL(
*proxy,
SendCertificateRequest(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertRequest(),
_))
.Times(1)
.InSequence(flow_order);
StrictMock<MockObserver> observer;
EXPECT_CALL(
observer,
MockCertificateCallback(
ATTESTATION_SUCCESS,
AttestationClient::Get()->GetTestInterface()->GetFakeCertificate()))
.Times(1)
.InSequence(flow_order);
AttestationFlow::CertificateCallback callback =
base::BindOnce(&AttestationFlowTest::QuitRunLoopCertificateCallback,
base::Unretained(this),
base::BindOnce(&MockObserver::MockCertificateCallback,
base::Unretained(&observer)));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.set_retry_delay(base::TimeDelta::FromMilliseconds(30));
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, account_id,
"fake_origin", true, std::string() /* key_name */,
std::move(callback));
Run();
EXPECT_EQ(AttestationClient::Get()->GetTestInterface()->GetFakeCertificate(),
AttestationClient::Get()
->GetTestInterface()
->GetMutableKeyInfoReply(
kFakeUserEmail,
GetKeyNameForProfile(PROFILE_ENTERPRISE_USER_CERTIFICATE,
"fake_origin"))
->certificate());
}
TEST_F(AttestationFlowTest, GetCertificate_Attestation_Never_Prepared) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(false);
chromeos::AttestationClient::Get()
->GetTestInterface()
->ConfigureEnrollmentPreparations(false);
// We're not expecting any server calls in this case; StrictMock will verify.
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
StrictMock<MockObserver> observer;
EXPECT_CALL(observer,
MockCertificateCallback(ATTESTATION_UNSPECIFIED_FAILURE, ""))
.Times(1);
AttestationFlow::CertificateCallback callback =
base::BindOnce(&AttestationFlowTest::QuitRunLoopCertificateCallback,
base::Unretained(this),
base::BindOnce(&MockObserver::MockCertificateCallback,
base::Unretained(&observer)));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.set_ready_timeout(base::TimeDelta::FromMilliseconds(20));
flow.set_retry_delay(base::TimeDelta::FromMilliseconds(6));
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(),
"fake_origin", true, std::string() /* key_name */,
std::move(callback));
Run();
}
TEST_F(AttestationFlowTest, GetCertificate_Attestation_Never_Confirm_Prepared) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(false);
chromeos::AttestationClient::Get()
->GetTestInterface()
->ConfigureEnrollmentPreparationsStatus(
::attestation::STATUS_NOT_AVAILABLE);
// We're not expecting any server calls in this case; StrictMock will verify.
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
StrictMock<MockObserver> observer;
EXPECT_CALL(observer,
MockCertificateCallback(ATTESTATION_UNSPECIFIED_FAILURE, ""))
.Times(1);
AttestationFlow::CertificateCallback callback =
base::BindOnce(&AttestationFlowTest::QuitRunLoopCertificateCallback,
base::Unretained(this),
base::BindOnce(&MockObserver::MockCertificateCallback,
base::Unretained(&observer)));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.set_ready_timeout(base::TimeDelta::FromMilliseconds(20));
flow.set_retry_delay(base::TimeDelta::FromMilliseconds(6));
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(),
"fake_origin", true, std::string() /* key_name */,
std::move(callback));
Run();
}
TEST_F(AttestationFlowTest, GetCertificate_NoEK) {
AttestationClient::Get()->GetTestInterface()->set_enroll_request_status(
::attestation::STATUS_UNEXPECTED_DEVICE_ERROR);
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(false);
chromeos::AttestationClient::Get()
->GetTestInterface()
->ConfigureEnrollmentPreparations(true);
// We're not expecting any server calls in this case; StrictMock will verify.
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
StrictMock<MockObserver> observer;
EXPECT_CALL(observer,
MockCertificateCallback(ATTESTATION_UNSPECIFIED_FAILURE, ""))
.Times(1);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(), "",
true, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
}
TEST_F(AttestationFlowTest, GetCertificate_EKRejected) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(false);
chromeos::AttestationClient::Get()
->GetTestInterface()
->ConfigureEnrollmentPreparations(true);
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
proxy->DeferToFake(false);
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
EXPECT_CALL(*proxy, SendEnrollRequest(AttestationClient::Get()
->GetTestInterface()
->GetFakePcaEnrollRequest(),
_))
.Times(1);
StrictMock<MockObserver> observer;
EXPECT_CALL(observer,
MockCertificateCallback(ATTESTATION_UNSPECIFIED_FAILURE, ""))
.Times(1);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(), "",
true, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
}
TEST_F(AttestationFlowTest, GetCertificate_FailEnroll) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(false);
chromeos::AttestationClient::Get()
->GetTestInterface()
->ConfigureEnrollmentPreparations(true);
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
proxy->DeferToFake(true);
proxy->fake()->set_enroll_response(
"bad " +
AttestationClient::Get()->GetTestInterface()->GetFakePcaEnrollResponse());
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
EXPECT_CALL(*proxy, SendEnrollRequest(AttestationClient::Get()
->GetTestInterface()
->GetFakePcaEnrollRequest(),
_))
.Times(1);
StrictMock<MockObserver> observer;
EXPECT_CALL(observer,
MockCertificateCallback(ATTESTATION_UNSPECIFIED_FAILURE, ""))
.Times(1);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(), "",
true, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
}
TEST_F(AttestationFlowTest, GetMachineCertificateAlreadyEnrolled) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(true);
chromeos::AttestationClient::Get()
->GetTestInterface()
->AllowlistLegacyCreateCertificateRequest(
/*username=*/"", /*request_origin=*/"",
::attestation::ENTERPRISE_MACHINE_CERTIFICATE,
::attestation::KEY_TYPE_RSA);
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
proxy->DeferToFake(true);
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
proxy->fake()->set_cert_response(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertResponse());
EXPECT_CALL(
*proxy,
SendCertificateRequest(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertRequest(),
_))
.Times(1);
StrictMock<MockObserver> observer;
EXPECT_CALL(
observer,
MockCertificateCallback(
ATTESTATION_SUCCESS,
AttestationClient::Get()->GetTestInterface()->GetFakeCertificate()))
.Times(1);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_MACHINE_CERTIFICATE, EmptyAccountId(),
"", true, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
EXPECT_EQ(AttestationClient::Get()->GetTestInterface()->GetFakeCertificate(),
AttestationClient::Get()
->GetTestInterface()
->GetMutableKeyInfoReply(
/*username=*/"",
GetKeyNameForProfile(PROFILE_ENTERPRISE_MACHINE_CERTIFICATE,
/*request_origin=*/""))
->certificate());
}
// There used to be an incidence that a non-empty username are sent when
// requesting a device key certificate, and we remove the username in the
// attestation flow process though it is not considered a valid input.
// TODO(b/179364923): Develop a better API design along with strict assertion
// instead of silently removing the username.
TEST_F(AttestationFlowTest, GetMachineCertificateWithUsername) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(true);
chromeos::AttestationClient::Get()
->GetTestInterface()
->AllowlistLegacyCreateCertificateRequest(
/*username=*/"", /*request_origin=*/"",
::attestation::ENTERPRISE_MACHINE_CERTIFICATE,
::attestation::KEY_TYPE_RSA);
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
proxy->DeferToFake(true);
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
proxy->fake()->set_cert_response(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertResponse());
EXPECT_CALL(
*proxy,
SendCertificateRequest(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertRequest(),
_));
StrictMock<MockObserver> observer;
const AccountId account_id = AccountId::FromUserEmail(kFakeUserEmail);
EXPECT_CALL(
observer,
MockCertificateCallback(
ATTESTATION_SUCCESS,
AttestationClient::Get()->GetTestInterface()->GetFakeCertificate()))
.Times(1);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_MACHINE_CERTIFICATE, account_id, "",
true, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
// The certificate should be stored as a machine key instead of a user key.
EXPECT_EQ(AttestationClient::Get()->GetTestInterface()->GetFakeCertificate(),
AttestationClient::Get()
->GetTestInterface()
->GetMutableKeyInfoReply(
/*username=*/"",
GetKeyNameForProfile(PROFILE_ENTERPRISE_MACHINE_CERTIFICATE,
/*request_origin=*/""))
->certificate());
}
TEST_F(AttestationFlowTest, GetEnrollmentCertificateAlreadyEnrolled) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(true);
chromeos::AttestationClient::Get()
->GetTestInterface()
->AllowlistLegacyCreateCertificateRequest(
/*username=*/"", /*request_origin=*/"",
::attestation::ENTERPRISE_ENROLLMENT_CERTIFICATE,
::attestation::KEY_TYPE_RSA);
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
proxy->DeferToFake(true);
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
proxy->fake()->set_cert_response(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertResponse());
EXPECT_CALL(
*proxy,
SendCertificateRequest(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertRequest(),
_))
.Times(1);
StrictMock<MockObserver> observer;
EXPECT_CALL(
observer,
MockCertificateCallback(
ATTESTATION_SUCCESS,
AttestationClient::Get()->GetTestInterface()->GetFakeCertificate()))
.Times(1);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_ENROLLMENT_CERTIFICATE,
EmptyAccountId(), "", true, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
EXPECT_EQ(
AttestationClient::Get()->GetTestInterface()->GetFakeCertificate(),
AttestationClient::Get()
->GetTestInterface()
->GetMutableKeyInfoReply(
/*username=*/"",
GetKeyNameForProfile(PROFILE_ENTERPRISE_ENROLLMENT_CERTIFICATE,
/*request_origin=*/""))
->certificate());
}
TEST_F(AttestationFlowTest, GetCertificate_FailCreateCertRequest) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(true);
chromeos::AttestationClient::Get()
->GetTestInterface()
->AllowlistLegacyCreateCertificateRequest(
kFakeUserEmail, "fake_origin",
::attestation::ENTERPRISE_USER_CERTIFICATE,
::attestation::KEY_TYPE_RSA);
// We're not expecting any server calls in this case; StrictMock will verify.
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
StrictMock<MockObserver> observer;
EXPECT_CALL(observer,
MockCertificateCallback(ATTESTATION_UNSPECIFIED_FAILURE, ""))
.Times(1);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(), "",
true, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
}
TEST_F(AttestationFlowTest, GetCertificate_CertRequestRejected) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(true);
chromeos::AttestationClient::Get()
->GetTestInterface()
->AllowlistLegacyCreateCertificateRequest(
/*username=*/"", /*request_origin=*/"",
::attestation::ENTERPRISE_USER_CERTIFICATE,
::attestation::KEY_TYPE_RSA);
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
proxy->DeferToFake(false);
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
EXPECT_CALL(
*proxy,
SendCertificateRequest(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertRequest(),
_))
.Times(1);
StrictMock<MockObserver> observer;
EXPECT_CALL(observer,
MockCertificateCallback(ATTESTATION_UNSPECIFIED_FAILURE, ""))
.Times(1);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(), "",
true, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
}
TEST_F(AttestationFlowTest, GetCertificate_CertRequestBadRequest) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(true);
chromeos::AttestationClient::Get()
->GetTestInterface()
->AllowlistLegacyCreateCertificateRequest(
/*username=*/"", /*request_origin=*/"",
::attestation::ENTERPRISE_USER_CERTIFICATE,
::attestation::KEY_TYPE_RSA);
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
proxy->DeferToFake(true);
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
// Add a random suffix so the fake attestation client fails to finish
// certificate.
proxy->fake()->set_cert_response(
"bad " +
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertResponse());
EXPECT_CALL(
*proxy,
SendCertificateRequest(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertRequest(),
_))
.Times(1);
StrictMock<MockObserver> observer;
EXPECT_CALL(observer, MockCertificateCallback(
ATTESTATION_SERVER_BAD_REQUEST_FAILURE, ""))
.Times(1);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(), "",
true, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
}
TEST_F(AttestationFlowTest, GetCertificate_FailIsEnrolled) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_status(::attestation::STATUS_DBUS_ERROR);
// We're not expecting any server calls in this case; StrictMock will verify.
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
StrictMock<MockObserver> observer;
EXPECT_CALL(observer,
MockCertificateCallback(ATTESTATION_UNSPECIFIED_FAILURE, ""))
.Times(1);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(), "",
true, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
}
TEST_F(AttestationFlowTest, GetCertificate_CheckExisting) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(true);
chromeos::AttestationClient::Get()
->GetTestInterface()
->AllowlistLegacyCreateCertificateRequest(
/*username=*/"", /*request_origin=*/"",
::attestation::ENTERPRISE_USER_CERTIFICATE,
::attestation::KEY_TYPE_RSA);
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
proxy->DeferToFake(true);
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
proxy->fake()->set_cert_response(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertResponse());
EXPECT_CALL(
*proxy,
SendCertificateRequest(
AttestationClient::Get()->GetTestInterface()->GetFakePcaCertRequest(),
_))
.Times(1);
StrictMock<MockObserver> observer;
EXPECT_CALL(
observer,
MockCertificateCallback(
ATTESTATION_SUCCESS,
AttestationClient::Get()->GetTestInterface()->GetFakeCertificate()))
.Times(1);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(), "",
false, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
EXPECT_EQ(AttestationClient::Get()->GetTestInterface()->GetFakeCertificate(),
AttestationClient::Get()
->GetTestInterface()
->GetMutableKeyInfoReply(
/*username=*/"",
GetKeyNameForProfile(PROFILE_ENTERPRISE_USER_CERTIFICATE,
/*request_origin=*/""))
->certificate());
}
TEST_F(AttestationFlowTest, GetCertificate_AlreadyExists) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(true);
chromeos::AttestationClient::Get()
->GetTestInterface()
->GetMutableKeyInfoReply("", kEnterpriseUserKey)
->set_certificate("fake_cert");
// We're not expecting any server calls in this case; StrictMock will verify.
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
StrictMock<MockObserver> observer;
EXPECT_CALL(observer,
MockCertificateCallback(ATTESTATION_SUCCESS, "fake_cert"))
.Times(1);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_USER_CERTIFICATE, EmptyAccountId(), "",
false, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
}
// There used to be an incidence that a non-empty username are sent when
// requesting a device key certificate, and we remove the username in the
// attestation flow process though it is not considered a valid input.
// TODO(b/179364923): Develop a better API design along with strict assertion
// instead of silently removing the username.
TEST_F(AttestationFlowTest, GetCertificate_LookupMachineKeyWithAccountId) {
chromeos::AttestationClient::Get()
->GetTestInterface()
->mutable_status_reply()
->set_enrolled(true);
chromeos::AttestationClient::Get()
->GetTestInterface()
->GetMutableKeyInfoReply("", kEnterpriseMachineKey)
->set_certificate("fake_cert");
// We're not expecting any server calls in this case; StrictMock will verify.
std::unique_ptr<MockServerProxy> proxy(new StrictMock<MockServerProxy>());
EXPECT_CALL(*proxy, GetType()).WillRepeatedly(DoDefault());
StrictMock<MockObserver> observer;
EXPECT_CALL(observer,
MockCertificateCallback(ATTESTATION_SUCCESS, "fake_cert"))
.Times(1);
AttestationFlow::CertificateCallback mock_callback = base::BindOnce(
&MockObserver::MockCertificateCallback, base::Unretained(&observer));
std::unique_ptr<ServerProxy> proxy_interface(proxy.release());
const AccountId account_id = AccountId::FromUserEmail(kFakeUserEmail);
AttestationFlow flow(std::move(proxy_interface));
flow.GetCertificate(PROFILE_ENTERPRISE_MACHINE_CERTIFICATE, account_id, "",
false, std::string() /* key_name */,
std::move(mock_callback));
RunUntilIdle();
}
} // namespace attestation
} // namespace chromeos