blob: b6deb4171e6fdc28adb60a66bcb8c03cfc514509 [file] [log] [blame]
// Copyright (c) 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <string>
#include "base/base64.h"
#include "base/command_line.h"
#include "base/file_util.h"
#include "base/files/file_path.h"
#include "base/memory/ref_counted.h"
#include "base/path_service.h"
#include "base/run_loop.h"
#include "base/strings/string_util.h"
#include "chrome/browser/browser_process.h"
#include "chrome/browser/extensions/extension_browsertest.h"
#include "chrome/browser/extensions/extension_test_message_listener.h"
#include "chrome/browser/policy/profile_policy_connector.h"
#include "chrome/browser/policy/profile_policy_connector_factory.h"
#include "chrome/browser/policy/test/local_policy_test_server.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/ui/browser.h"
#include "chrome/common/chrome_paths.h"
#include "components/policy/core/browser/browser_policy_connector.h"
#include "components/policy/core/common/cloud/cloud_policy_constants.h"
#include "components/policy/core/common/cloud/mock_cloud_policy_client.h"
#include "components/policy/core/common/policy_service.h"
#include "components/policy/core/common/policy_switches.h"
#include "components/policy/core/common/policy_test_utils.h"
#include "extensions/common/extension.h"
#include "net/url_request/url_request_context_getter.h"
#include "policy/proto/chrome_extension_policy.pb.h"
#include "policy/proto/cloud_policy.pb.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "testing/gtest/include/gtest/gtest.h"
#if defined(OS_CHROMEOS)
#include "chrome/browser/chromeos/policy/user_cloud_policy_manager_chromeos.h"
#include "chrome/browser/chromeos/policy/user_cloud_policy_manager_factory_chromeos.h"
#include "chromeos/chromeos_switches.h"
#else
#include "chrome/browser/policy/cloud/user_cloud_policy_manager_factory.h"
#include "chrome/browser/signin/signin_manager_factory.h"
#include "components/policy/core/common/cloud/user_cloud_policy_manager.h"
#include "components/signin/core/browser/signin_manager.h"
#endif
using testing::InvokeWithoutArgs;
using testing::Mock;
using testing::Return;
using testing::_;
namespace em = enterprise_management;
namespace policy {
namespace {
const char kDMToken[] = "dmtoken";
const char kDeviceID[] = "deviceid";
const char kTestExtension[] = "kjmkgkdkpedkejedfhmfcenooemhbpbo";
const base::FilePath::CharType kTestExtensionPath[] =
FILE_PATH_LITERAL("extensions/managed_extension");
const char kTestPolicy[] =
"{"
" \"Name\": {"
" \"Value\": \"disable_all_the_things\""
" }"
"}";
const char kTestExtension2[] = "behllobkkfkfnphdnhnkndlbkcpglgmj";
const base::FilePath::CharType kTestExtension2Path[] =
FILE_PATH_LITERAL("extensions/managed_extension2");
const char kTestPolicyJSON[] = "{\"Name\":\"disable_all_the_things\"}";
const char kTestPolicy2[] =
"{"
" \"Another\": {"
" \"Value\": \"turn_it_off\""
" }"
"}";
const char kTestPolicy2JSON[] = "{\"Another\":\"turn_it_off\"}";
#if !defined(OS_CHROMEOS)
// Same encoding as ResourceCache does for its keys.
bool Base64UrlEncode(const std::string& value, std::string* encoded) {
if (value.empty())
return false;
base::Base64Encode(value, encoded);
base::ReplaceChars(*encoded, "+", "-", encoded);
base::ReplaceChars(*encoded, "/", "_", encoded);
return true;
}
#endif
} // namespace
class ComponentCloudPolicyTest : public ExtensionBrowserTest {
protected:
ComponentCloudPolicyTest() {}
virtual ~ComponentCloudPolicyTest() {}
virtual void SetUpCommandLine(CommandLine* command_line) OVERRIDE {
ExtensionBrowserTest::SetUpCommandLine(command_line);
#if defined(OS_CHROMEOS)
// ExtensionBrowserTest sets the login users to a non-managed value;
// replace it. This is the default username sent in policy blobs from the
// testserver.
command_line->AppendSwitchASCII(
::chromeos::switches::kLoginUser, "user@example.com");
#endif
}
virtual void SetUpInProcessBrowserTestFixture() OVERRIDE {
test_server_.RegisterClient(kDMToken, kDeviceID);
EXPECT_TRUE(test_server_.UpdatePolicyData(
dm_protocol::kChromeExtensionPolicyType, kTestExtension, kTestPolicy));
ASSERT_TRUE(test_server_.Start());
std::string url = test_server_.GetServiceURL().spec();
CommandLine* command_line = CommandLine::ForCurrentProcess();
command_line->AppendSwitchASCII(switches::kDeviceManagementUrl, url);
ExtensionBrowserTest::SetUpInProcessBrowserTestFixture();
}
virtual void SetUpOnMainThread() OVERRIDE {
ASSERT_TRUE(PolicyServiceIsEmpty(g_browser_process->policy_service()))
<< "Pre-existing policies in this machine will make this test fail.";
// Install the initial extension.
ExtensionTestMessageListener ready_listener("ready", true);
event_listener_.reset(new ExtensionTestMessageListener("event", true));
extension_ = LoadExtension(kTestExtensionPath);
ASSERT_TRUE(extension_.get());
ASSERT_EQ(kTestExtension, extension_->id());
EXPECT_TRUE(ready_listener.WaitUntilSatisfied());
// And start with a signed-in user.
SignInAndRegister();
// The extension will receive an update event.
EXPECT_TRUE(event_listener_->WaitUntilSatisfied());
ExtensionBrowserTest::SetUpOnMainThread();
}
scoped_refptr<const extensions::Extension> LoadExtension(
const base::FilePath::CharType* path) {
base::FilePath full_path;
if (!PathService::Get(chrome::DIR_TEST_DATA, &full_path)) {
ADD_FAILURE();
return NULL;
}
scoped_refptr<const extensions::Extension> extension(
ExtensionBrowserTest::LoadExtension(full_path.Append(path)));
if (!extension.get()) {
ADD_FAILURE();
return NULL;
}
return extension;
}
void SignInAndRegister() {
BrowserPolicyConnector* connector =
g_browser_process->browser_policy_connector();
connector->ScheduleServiceInitialization(0);
#if defined(OS_CHROMEOS)
UserCloudPolicyManagerChromeOS* policy_manager =
UserCloudPolicyManagerFactoryChromeOS::GetForProfile(
browser()->profile());
ASSERT_TRUE(policy_manager);
#else
// Mock a signed-in user. This is used by the UserCloudPolicyStore to pass
// the username to the UserCloudPolicyValidator.
SigninManager* signin_manager =
SigninManagerFactory::GetForProfile(browser()->profile());
ASSERT_TRUE(signin_manager);
signin_manager->SetAuthenticatedUsername("user@example.com");
UserCloudPolicyManager* policy_manager =
UserCloudPolicyManagerFactory::GetForBrowserContext(
browser()->profile());
ASSERT_TRUE(policy_manager);
policy_manager->Connect(
g_browser_process->local_state(),
g_browser_process->system_request_context(),
UserCloudPolicyManager::CreateCloudPolicyClient(
connector->device_management_service(),
g_browser_process->system_request_context()).Pass());
#endif // defined(OS_CHROMEOS)
// Register the cloud policy client.
ASSERT_TRUE(policy_manager->core()->client());
base::RunLoop run_loop;
MockCloudPolicyClientObserver observer;
EXPECT_CALL(observer, OnRegistrationStateChanged(_))
.WillOnce(InvokeWithoutArgs(&run_loop, &base::RunLoop::Quit));
policy_manager->core()->client()->AddObserver(&observer);
policy_manager->core()->client()->SetupRegistration(kDMToken, kDeviceID);
run_loop.Run();
Mock::VerifyAndClearExpectations(&observer);
policy_manager->core()->client()->RemoveObserver(&observer);
}
#if !defined(OS_CHROMEOS)
void SignOut() {
SigninManager* signin_manager =
SigninManagerFactory::GetForProfile(browser()->profile());
ASSERT_TRUE(signin_manager);
signin_manager->SignOut();
}
#endif
void RefreshPolicies() {
ProfilePolicyConnector* profile_connector =
ProfilePolicyConnectorFactory::GetForProfile(browser()->profile());
PolicyService* policy_service = profile_connector->policy_service();
base::RunLoop run_loop;
policy_service->RefreshPolicies(run_loop.QuitClosure());
run_loop.Run();
}
LocalPolicyTestServer test_server_;
scoped_refptr<const extensions::Extension> extension_;
scoped_ptr<ExtensionTestMessageListener> event_listener_;
};
IN_PROC_BROWSER_TEST_F(ComponentCloudPolicyTest, FetchExtensionPolicy) {
// Read the initial policy.
ExtensionTestMessageListener policy_listener(kTestPolicyJSON, true);
event_listener_->Reply("get-policy-Name");
EXPECT_TRUE(policy_listener.WaitUntilSatisfied());
}
IN_PROC_BROWSER_TEST_F(ComponentCloudPolicyTest, UpdateExtensionPolicy) {
// Read the initial policy.
ExtensionTestMessageListener policy_listener(kTestPolicyJSON, true);
event_listener_->Reply("get-policy-Name");
EXPECT_TRUE(policy_listener.WaitUntilSatisfied());
// Update the policy at the server and reload policy.
event_listener_.reset(new ExtensionTestMessageListener("event", true));
policy_listener.Reply("idle");
EXPECT_TRUE(test_server_.UpdatePolicyData(
dm_protocol::kChromeExtensionPolicyType, kTestExtension, kTestPolicy2));
RefreshPolicies();
// Check that the update event was received, and verify the new policy
// values.
EXPECT_TRUE(event_listener_->WaitUntilSatisfied());
// This policy was removed.
ExtensionTestMessageListener policy_listener1("{}", true);
event_listener_->Reply("get-policy-Name");
EXPECT_TRUE(policy_listener1.WaitUntilSatisfied());
ExtensionTestMessageListener policy_listener2(kTestPolicy2JSON, true);
policy_listener1.Reply("get-policy-Another");
EXPECT_TRUE(policy_listener2.WaitUntilSatisfied());
}
IN_PROC_BROWSER_TEST_F(ComponentCloudPolicyTest, InstallNewExtension) {
EXPECT_TRUE(test_server_.UpdatePolicyData(
dm_protocol::kChromeExtensionPolicyType, kTestExtension2, kTestPolicy2));
// Installing a new extension doesn't trigger another policy fetch because
// the server always sends down the list of all extensions that have policy.
// Fetch now that the configuration has been updated and before installing
// the extension.
RefreshPolicies();
ExtensionTestMessageListener result_listener("ok", true);
result_listener.set_failure_message("fail");
scoped_refptr<const extensions::Extension> extension2 =
LoadExtension(kTestExtension2Path);
ASSERT_TRUE(extension2.get());
ASSERT_EQ(kTestExtension2, extension2->id());
// This extension only sends the 'policy' signal once it receives the policy,
// and after verifying it has the expected value. Otherwise it sends 'fail'.
EXPECT_TRUE(result_listener.WaitUntilSatisfied());
}
// Signing out on Chrome OS is a different process from signing out on the
// Desktop platforms. On Chrome OS the session is ended, and the user goes back
// to the sign-in screen; the Profile data is not affected. On the Desktop the
// session goes on though, and all the signed-in services are disconnected;
// in particular, the policy caches are dropped if the user signs out.
// This test verifies that when the user signs out then any existing component
// policy caches are dropped, and that it's still possible to sign back in and
// get policy for components working again.
#if !defined(OS_CHROMEOS)
IN_PROC_BROWSER_TEST_F(ComponentCloudPolicyTest, SignOutAndBackIn) {
// Read the initial policy.
ExtensionTestMessageListener initial_policy_listener(kTestPolicyJSON, true);
event_listener_->Reply("get-policy-Name");
EXPECT_TRUE(initial_policy_listener.WaitUntilSatisfied());
// Verify that the policy cache exists.
std::string cache_key;
ASSERT_TRUE(Base64UrlEncode("extension-policy", &cache_key));
std::string cache_subkey;
ASSERT_TRUE(Base64UrlEncode(kTestExtension, &cache_subkey));
base::FilePath cache_path = browser()->profile()->GetPath()
.Append(FILE_PATH_LITERAL("Policy"))
.Append(FILE_PATH_LITERAL("Components"))
.AppendASCII(cache_key)
.AppendASCII(cache_subkey);
EXPECT_TRUE(base::PathExists(cache_path));
// Now sign-out. The policy cache should be removed, and the extension should
// get an empty policy update.
ExtensionTestMessageListener event_listener("event", true);
initial_policy_listener.Reply("idle");
SignOut();
EXPECT_TRUE(event_listener.WaitUntilSatisfied());
// The extension got an update event; verify that the policy was empty.
ExtensionTestMessageListener signout_policy_listener("{}", true);
event_listener.Reply("get-policy-Name");
EXPECT_TRUE(signout_policy_listener.WaitUntilSatisfied());
// Verify that the cache is gone.
EXPECT_FALSE(base::PathExists(cache_path));
// Verify that the policy is fetched again if the user signs back in.
ExtensionTestMessageListener event_listener2("event", true);
SignInAndRegister();
EXPECT_TRUE(event_listener2.WaitUntilSatisfied());
// The extension got updated policy; verify it.
ExtensionTestMessageListener signin_policy_listener(kTestPolicyJSON, true);
event_listener2.Reply("get-policy-Name");
EXPECT_TRUE(signin_policy_listener.WaitUntilSatisfied());
// And the cache is back.
EXPECT_TRUE(base::PathExists(cache_path));
}
#endif
} // namespace policy