|
11 | 11 | #include "base/location.h"
|
12 | 12 | #include "base/run_loop.h"
|
13 | 13 | #include "base/single_thread_task_runner.h"
|
| 14 | +#include "base/strings/string_number_conversions.h" |
14 | 15 | #include "base/threading/thread_task_runner_handle.h"
|
15 | 16 | #include "chrome/browser/chromeos/attestation/enrollment_policy_observer.h"
|
16 | 17 | #include "chrome/browser/chromeos/settings/device_settings_test_helper.h"
|
@@ -61,17 +62,18 @@ class EnrollmentPolicyObserverTest : public DeviceSettingsTestBase {
|
61 | 62 | public:
|
62 | 63 | EnrollmentPolicyObserverTest() {
|
63 | 64 | policy_client_.SetDMToken("fake_dm_token");
|
| 65 | + |
| 66 | + std::vector<uint8_t> eid; |
| 67 | + EXPECT_TRUE(base::HexStringToBytes(kEnrollmentId, &eid)); |
| 68 | + enrollment_id_.assign(reinterpret_cast<const char*>(eid.data()), |
| 69 | + eid.size()); |
| 70 | + cryptohome_client_.set_tpm_attestation_enrollment_id( |
| 71 | + true /* ignore_cache */, enrollment_id_); |
64 | 72 | }
|
65 | 73 |
|
66 | 74 | protected:
|
67 | 75 | static constexpr char kEnrollmentId[] =
|
68 |
| - "6fcc0ebddec3db95cdcf82476d594f4d60db934c5b47fa6085c707b2a93e205b"; |
69 |
| - |
70 |
| - void SetUp() override { |
71 |
| - DeviceSettingsTestBase::SetUp(); |
72 |
| - cryptohome_client_.set_tpm_attestation_enrollment_id( |
73 |
| - true /* ignore_cache */, kEnrollmentId); |
74 |
| - } |
| 76 | + "6fcc0ebddec3db9500cf82476d594f4d60db934c5b47fa6085c707b2a93e205b"; |
75 | 77 |
|
76 | 78 | void SetUpEnrollmentIdNeeded(bool enrollment_id_needed) {
|
77 | 79 | if (enrollment_id_needed) {
|
@@ -103,6 +105,7 @@ class EnrollmentPolicyObserverTest : public DeviceSettingsTestBase {
|
103 | 105 | FakeCryptohomeClient cryptohome_client_;
|
104 | 106 | StrictMock<MockAttestationFlow> attestation_flow_;
|
105 | 107 | StrictMock<policy::MockCloudPolicyClient> policy_client_;
|
| 108 | + std::string enrollment_id_; |
106 | 109 | };
|
107 | 110 |
|
108 | 111 | constexpr char EnrollmentPolicyObserverTest::kEnrollmentId[];
|
@@ -132,7 +135,7 @@ TEST_F(EnrollmentPolicyObserverTest, GetCertificateUnspecifiedFailure) {
|
132 | 135 | TEST_F(EnrollmentPolicyObserverTest, GetCertificateBadRequestFailure) {
|
133 | 136 | EXPECT_CALL(attestation_flow_, GetCertificate(_, _, _, _, _))
|
134 | 137 | .WillOnce(WithArgs<4>(Invoke(CertCallbackBadRequestFailure)));
|
135 |
| - EXPECT_CALL(policy_client_, UploadEnterpriseEnrollmentId(kEnrollmentId, _)) |
| 138 | + EXPECT_CALL(policy_client_, UploadEnterpriseEnrollmentId(enrollment_id_, _)) |
136 | 139 | .WillOnce(WithArgs<1>(Invoke(StatusCallbackSuccess)));
|
137 | 140 | SetUpDevicePolicy(true);
|
138 | 141 | Run();
|
|
0 commit comments