blob: 716ff5af141ce5ba168eb7f3330b7bda11463012 [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/memory/scoped_ptr.h"
#include "base/path_service.h"
#include "base/prefs/pref_service.h"
#include "base/prefs/scoped_user_pref_update.h"
#include "base/strings/utf_string_conversions.h"
#include "base/thread_task_runner_handle.h"
#include "chrome/browser/chrome_notification_types.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/signin/fake_profile_oauth2_token_service_builder.h"
#include "chrome/browser/signin/profile_oauth2_token_service_factory.h"
#include "chrome/browser/signin/signin_manager_factory.h"
#include "chrome/browser/supervised_user/legacy/custodian_profile_downloader_service.h"
#include "chrome/browser/supervised_user/legacy/custodian_profile_downloader_service_factory.h"
#include "chrome/browser/supervised_user/permission_request_creator.h"
#include "chrome/browser/supervised_user/supervised_user_service.h"
#include "chrome/browser/supervised_user/supervised_user_service_factory.h"
#include "chrome/browser/supervised_user/supervised_user_whitelist_service.h"
#include "chrome/browser/ui/browser_list.h"
#include "chrome/common/chrome_paths.h"
#include "chrome/common/pref_names.h"
#include "chrome/test/base/testing_profile.h"
#include "components/signin/core/browser/fake_profile_oauth2_token_service.h"
#include "components/signin/core/browser/signin_manager.h"
#include "components/version_info/version_info.h"
#include "content/public/test/test_browser_thread_bundle.h"
#include "content/public/test/test_utils.h"
#include "testing/gtest/include/gtest/gtest.h"
#if defined(ENABLE_EXTENSIONS)
#include "chrome/browser/extensions/extension_service.h"
#include "chrome/browser/extensions/extension_service_test_base.h"
#include "chrome/browser/extensions/unpacked_installer.h"
#include "chrome/common/extensions/features/feature_channel.h"
#include "extensions/common/extension.h"
#include "extensions/common/extension_builder.h"
#include "extensions/common/manifest_constants.h"
#endif
using content::MessageLoopRunner;
namespace {
#if !defined(OS_ANDROID) && !defined(OS_IOS)
void OnProfileDownloadedFail(const base::string16& full_name) {
ASSERT_TRUE(false) << "Profile download should not have succeeded.";
}
#endif
// Base class for helper objects that wait for certain events to happen.
// This class will ensure that calls to QuitRunLoop() (triggered by a subclass)
// are balanced with Wait() calls.
class AsyncTestHelper {
public:
void Wait() {
run_loop_->Run();
Reset();
}
protected:
AsyncTestHelper() {
// |quit_called_| will be initialized in Reset().
Reset();
}
~AsyncTestHelper() {
EXPECT_FALSE(quit_called_);
}
void QuitRunLoop() {
// QuitRunLoop() can not be called more than once between calls to Wait().
ASSERT_FALSE(quit_called_);
quit_called_ = true;
run_loop_->Quit();
}
private:
void Reset() {
quit_called_ = false;
run_loop_.reset(new base::RunLoop);
}
scoped_ptr<base::RunLoop> run_loop_;
bool quit_called_;
DISALLOW_COPY_AND_ASSIGN(AsyncTestHelper);
};
class SupervisedUserURLFilterObserver
: public AsyncTestHelper,
public SupervisedUserURLFilter::Observer {
public:
SupervisedUserURLFilterObserver() : scoped_observer_(this) {}
~SupervisedUserURLFilterObserver() {}
void Init(SupervisedUserURLFilter* url_filter) {
scoped_observer_.Add(url_filter);
}
// SupervisedUserURLFilter::Observer
void OnSiteListUpdated() override {
QuitRunLoop();
}
private:
ScopedObserver<SupervisedUserURLFilter, SupervisedUserURLFilter::Observer>
scoped_observer_;
DISALLOW_COPY_AND_ASSIGN(SupervisedUserURLFilterObserver);
};
class SiteListObserver : public AsyncTestHelper {
public:
SiteListObserver() {}
~SiteListObserver() {}
void Init(SupervisedUserWhitelistService* service) {
service->AddSiteListsChangedCallback(base::Bind(
&SiteListObserver::OnSiteListsChanged, base::Unretained(this)));
// The initial call to AddSiteListsChangedCallback will call
// OnSiteListsChanged(), so we balance it out by calling Wait().
Wait();
}
const std::vector<scoped_refptr<SupervisedUserSiteList>>& site_lists() {
return site_lists_;
}
private:
void OnSiteListsChanged(
const std::vector<scoped_refptr<SupervisedUserSiteList>>& site_lists) {
site_lists_ = site_lists;
QuitRunLoop();
}
std::vector<scoped_refptr<SupervisedUserSiteList>> site_lists_;
DISALLOW_COPY_AND_ASSIGN(SiteListObserver);
};
class AsyncResultHolder {
public:
AsyncResultHolder() : result_(false) {}
~AsyncResultHolder() {}
void SetResult(bool result) {
result_ = result;
run_loop_.Quit();
}
bool GetResult() {
run_loop_.Run();
return result_;
}
private:
base::RunLoop run_loop_;
bool result_;
DISALLOW_COPY_AND_ASSIGN(AsyncResultHolder);
};
class SupervisedUserServiceTest : public ::testing::Test {
public:
SupervisedUserServiceTest() {}
void SetUp() override {
TestingProfile::Builder builder;
builder.AddTestingFactory(ProfileOAuth2TokenServiceFactory::GetInstance(),
BuildFakeProfileOAuth2TokenService);
profile_ = builder.Build();
supervised_user_service_ =
SupervisedUserServiceFactory::GetForProfile(profile_.get());
}
void TearDown() override { profile_.reset(); }
~SupervisedUserServiceTest() override {}
protected:
void AddURLAccessRequest(const GURL& url, AsyncResultHolder* result_holder) {
supervised_user_service_->AddURLAccessRequest(
url, base::Bind(&AsyncResultHolder::SetResult,
base::Unretained(result_holder)));
}
content::TestBrowserThreadBundle thread_bundle_;
scoped_ptr<TestingProfile> profile_;
SupervisedUserService* supervised_user_service_;
};
} // namespace
TEST_F(SupervisedUserServiceTest, ChangesIncludedSessionOnChangedSettings) {
supervised_user_service_->Init();
EXPECT_TRUE(supervised_user_service_->IncludesSyncSessionsType());
profile_->GetPrefs()->SetBoolean(prefs::kRecordHistory, false);
EXPECT_FALSE(supervised_user_service_->IncludesSyncSessionsType());
}
#if !defined(OS_ANDROID) && !defined(OS_IOS)
// Ensure that the CustodianProfileDownloaderService shuts down cleanly. If no
// DCHECK is hit when the service is destroyed, this test passed.
TEST_F(SupervisedUserServiceTest, ShutDownCustodianProfileDownloader) {
CustodianProfileDownloaderService* downloader_service =
CustodianProfileDownloaderServiceFactory::GetForProfile(profile_.get());
// Emulate being logged in, then start to download a profile so a
// ProfileDownloader gets created.
SigninManagerFactory::GetForProfile(profile_.get())->
SetAuthenticatedAccountInfo("12345", "Logged In");
downloader_service->DownloadProfile(base::Bind(&OnProfileDownloadedFail));
}
#endif
namespace {
class MockPermissionRequestCreator : public PermissionRequestCreator {
public:
MockPermissionRequestCreator() : enabled_(false) {}
~MockPermissionRequestCreator() override {}
void set_enabled(bool enabled) {
enabled_ = enabled;
}
const std::vector<GURL>& requested_urls() const {
return requested_urls_;
}
void AnswerRequest(size_t index, bool result) {
ASSERT_LT(index, requested_urls_.size());
callbacks_[index].Run(result);
callbacks_.erase(callbacks_.begin() + index);
requested_urls_.erase(requested_urls_.begin() + index);
}
private:
// PermissionRequestCreator:
bool IsEnabled() const override { return enabled_; }
void CreateURLAccessRequest(const GURL& url_requested,
const SuccessCallback& callback) override {
ASSERT_TRUE(enabled_);
requested_urls_.push_back(url_requested);
callbacks_.push_back(callback);
}
void CreateExtensionUpdateRequest(const std::string& id,
const SuccessCallback& callback) override {
FAIL();
}
bool enabled_;
std::vector<GURL> requested_urls_;
std::vector<SuccessCallback> callbacks_;
DISALLOW_COPY_AND_ASSIGN(MockPermissionRequestCreator);
};
} // namespace
TEST_F(SupervisedUserServiceTest, CreatePermissionRequest) {
GURL url("http://www.example.com");
// Without any permission request creators, it should be disabled, and any
// AddURLAccessRequest() calls should fail.
EXPECT_FALSE(supervised_user_service_->AccessRequestsEnabled());
{
AsyncResultHolder result_holder;
AddURLAccessRequest(url, &result_holder);
EXPECT_FALSE(result_holder.GetResult());
}
// Add a disabled permission request creator. This should not change anything.
MockPermissionRequestCreator* creator = new MockPermissionRequestCreator;
supervised_user_service_->AddPermissionRequestCreator(
make_scoped_ptr(creator));
EXPECT_FALSE(supervised_user_service_->AccessRequestsEnabled());
{
AsyncResultHolder result_holder;
AddURLAccessRequest(url, &result_holder);
EXPECT_FALSE(result_holder.GetResult());
}
// Enable the permission request creator. This should enable permission
// requests and queue them up.
creator->set_enabled(true);
EXPECT_TRUE(supervised_user_service_->AccessRequestsEnabled());
{
AsyncResultHolder result_holder;
AddURLAccessRequest(url, &result_holder);
ASSERT_EQ(1u, creator->requested_urls().size());
EXPECT_EQ(url.spec(), creator->requested_urls()[0].spec());
creator->AnswerRequest(0, true);
EXPECT_TRUE(result_holder.GetResult());
}
{
AsyncResultHolder result_holder;
AddURLAccessRequest(url, &result_holder);
ASSERT_EQ(1u, creator->requested_urls().size());
EXPECT_EQ(url.spec(), creator->requested_urls()[0].spec());
creator->AnswerRequest(0, false);
EXPECT_FALSE(result_holder.GetResult());
}
// Add a second permission request creator.
MockPermissionRequestCreator* creator_2 = new MockPermissionRequestCreator;
creator_2->set_enabled(true);
supervised_user_service_->AddPermissionRequestCreator(
make_scoped_ptr(creator_2));
{
AsyncResultHolder result_holder;
AddURLAccessRequest(url, &result_holder);
ASSERT_EQ(1u, creator->requested_urls().size());
EXPECT_EQ(url.spec(), creator->requested_urls()[0].spec());
// Make the first creator succeed. This should make the whole thing succeed.
creator->AnswerRequest(0, true);
EXPECT_TRUE(result_holder.GetResult());
}
{
AsyncResultHolder result_holder;
AddURLAccessRequest(url, &result_holder);
ASSERT_EQ(1u, creator->requested_urls().size());
EXPECT_EQ(url.spec(), creator->requested_urls()[0].spec());
// Make the first creator fail. This should fall back to the second one.
creator->AnswerRequest(0, false);
ASSERT_EQ(1u, creator_2->requested_urls().size());
EXPECT_EQ(url.spec(), creator_2->requested_urls()[0].spec());
// Make the second creator succeed, which will make the whole thing succeed.
creator_2->AnswerRequest(0, true);
EXPECT_TRUE(result_holder.GetResult());
}
}
#if defined(ENABLE_EXTENSIONS)
class SupervisedUserServiceExtensionTestBase
: public extensions::ExtensionServiceTestBase {
public:
explicit SupervisedUserServiceExtensionTestBase(bool is_supervised)
: is_supervised_(is_supervised),
channel_(version_info::Channel::DEV) {}
~SupervisedUserServiceExtensionTestBase() override {}
void SetUp() override {
ExtensionServiceTestBase::SetUp();
ExtensionServiceTestBase::ExtensionServiceInitParams params =
CreateDefaultInitParams();
params.profile_is_supervised = is_supervised_;
InitializeExtensionService(params);
SupervisedUserService* service =
SupervisedUserServiceFactory::GetForProfile(profile_.get());
service->Init();
site_list_observer_.Init(service->GetWhitelistService());
SupervisedUserURLFilter* url_filter = service->GetURLFilterForUIThread();
url_filter->SetBlockingTaskRunnerForTesting(
base::ThreadTaskRunnerHandle::Get());
url_filter_observer_.Init(url_filter);
// Wait for the initial update to finish.
url_filter_observer_.Wait();
}
void TearDown() override {
// Flush the message loop, to ensure all posted tasks run.
base::RunLoop().RunUntilIdle();
}
protected:
scoped_refptr<extensions::Extension> MakeThemeExtension() {
scoped_ptr<base::DictionaryValue> source(new base::DictionaryValue());
source->SetString(extensions::manifest_keys::kName, "Theme");
source->Set(extensions::manifest_keys::kTheme, new base::DictionaryValue());
source->SetString(extensions::manifest_keys::kVersion, "1.0");
extensions::ExtensionBuilder builder;
scoped_refptr<extensions::Extension> extension =
builder.SetManifest(source.Pass()).Build();
return extension;
}
scoped_refptr<extensions::Extension> MakeExtension(bool by_custodian) {
scoped_ptr<base::DictionaryValue> manifest = extensions::DictionaryBuilder()
.Set(extensions::manifest_keys::kName, "Extension")
.Set(extensions::manifest_keys::kVersion, "1.0")
.Build();
int creation_flags = extensions::Extension::NO_FLAGS;
if (by_custodian)
creation_flags |= extensions::Extension::WAS_INSTALLED_BY_CUSTODIAN;
extensions::ExtensionBuilder builder;
scoped_refptr<extensions::Extension> extension =
builder.SetManifest(manifest.Pass()).AddFlags(creation_flags).Build();
return extension;
}
bool is_supervised_;
extensions::ScopedCurrentChannel channel_;
SiteListObserver site_list_observer_;
SupervisedUserURLFilterObserver url_filter_observer_;
};
class SupervisedUserServiceExtensionTestUnsupervised
: public SupervisedUserServiceExtensionTestBase {
public:
SupervisedUserServiceExtensionTestUnsupervised()
: SupervisedUserServiceExtensionTestBase(false) {}
};
class SupervisedUserServiceExtensionTest
: public SupervisedUserServiceExtensionTestBase {
public:
SupervisedUserServiceExtensionTest()
: SupervisedUserServiceExtensionTestBase(true) {}
};
TEST_F(SupervisedUserServiceExtensionTest, ExtensionManagementPolicyProvider) {
SupervisedUserService* supervised_user_service =
SupervisedUserServiceFactory::GetForProfile(profile_.get());
ASSERT_TRUE(profile_->IsSupervised());
// Check that a supervised user can install and uninstall a theme.
{
scoped_refptr<extensions::Extension> theme = MakeThemeExtension();
base::string16 error_1;
EXPECT_TRUE(supervised_user_service->UserMayLoad(theme.get(), &error_1));
EXPECT_TRUE(error_1.empty());
base::string16 error_2;
EXPECT_FALSE(
supervised_user_service->MustRemainInstalled(theme.get(), &error_2));
EXPECT_TRUE(error_2.empty());
}
// Now check a different kind of extension; the supervised user should not be
// able to load it.
{
scoped_refptr<extensions::Extension> extension = MakeExtension(false);
base::string16 error;
EXPECT_FALSE(supervised_user_service->UserMayLoad(extension.get(), &error));
EXPECT_FALSE(error.empty());
}
{
// Check that a custodian-installed extension may be loaded, but not
// uninstalled.
scoped_refptr<extensions::Extension> extension = MakeExtension(true);
base::string16 error_1;
EXPECT_TRUE(
supervised_user_service->UserMayLoad(extension.get(), &error_1));
EXPECT_TRUE(error_1.empty());
base::string16 error_2;
EXPECT_TRUE(
supervised_user_service->MustRemainInstalled(extension.get(),
&error_2));
EXPECT_FALSE(error_2.empty());
}
#ifndef NDEBUG
EXPECT_FALSE(supervised_user_service->GetDebugPolicyProviderName().empty());
#endif
}
TEST_F(SupervisedUserServiceExtensionTest, NoContentPacks) {
SupervisedUserService* supervised_user_service =
SupervisedUserServiceFactory::GetForProfile(profile_.get());
SupervisedUserURLFilter* url_filter =
supervised_user_service->GetURLFilterForUIThread();
// ASSERT_EQ instead of ASSERT_TRUE([...].empty()) so that the error
// message contains the size in case of failure.
ASSERT_EQ(0u, site_list_observer_.site_lists().size());
GURL url("http://youtube.com");
EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
url_filter->GetFilteringBehaviorForURL(url));
}
TEST_F(SupervisedUserServiceExtensionTest, InstallContentPacks) {
SupervisedUserService* supervised_user_service =
SupervisedUserServiceFactory::GetForProfile(profile_.get());
SupervisedUserURLFilter* url_filter =
supervised_user_service->GetURLFilterForUIThread();
const base::string16 title1 = base::ASCIIToUTF16("Title 1");
const base::string16 title2 = base::ASCIIToUTF16("Title 2");
GURL youtube_url("http://www.youtube.com");
GURL moose_url("http://moose.org");
EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
url_filter->GetFilteringBehaviorForURL(youtube_url));
profile_->GetPrefs()->SetInteger(
prefs::kDefaultSupervisedUserFilteringBehavior,
SupervisedUserURLFilter::BLOCK);
EXPECT_EQ(SupervisedUserURLFilter::BLOCK,
url_filter->GetFilteringBehaviorForURL(youtube_url));
profile_->GetPrefs()->SetInteger(
prefs::kDefaultSupervisedUserFilteringBehavior,
SupervisedUserURLFilter::WARN);
EXPECT_EQ(SupervisedUserURLFilter::WARN,
url_filter->GetFilteringBehaviorForURL(youtube_url));
// Load a whitelist.
base::FilePath test_data_dir;
ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &test_data_dir));
SupervisedUserWhitelistService* whitelist_service =
supervised_user_service->GetWhitelistService();
base::FilePath whitelist_path =
test_data_dir.AppendASCII("whitelists/content_pack/site_list.json");
whitelist_service->LoadWhitelistForTesting("aaaa", title1, whitelist_path);
site_list_observer_.Wait();
ASSERT_EQ(1u, site_list_observer_.site_lists().size());
EXPECT_EQ(title1, site_list_observer_.site_lists()[0]->title());
EXPECT_EQ(youtube_url, site_list_observer_.site_lists()[0]->entry_point());
url_filter_observer_.Wait();
EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
url_filter->GetFilteringBehaviorForURL(youtube_url));
EXPECT_EQ(SupervisedUserURLFilter::WARN,
url_filter->GetFilteringBehaviorForURL(moose_url));
// Load a second whitelist.
whitelist_path =
test_data_dir.AppendASCII("whitelists/content_pack_2/site_list.json");
whitelist_service->LoadWhitelistForTesting("bbbb", title2, whitelist_path);
site_list_observer_.Wait();
ASSERT_EQ(2u, site_list_observer_.site_lists().size());
EXPECT_EQ(title1, site_list_observer_.site_lists()[0]->title());
EXPECT_EQ(youtube_url, site_list_observer_.site_lists()[0]->entry_point());
EXPECT_EQ(title2, site_list_observer_.site_lists()[1]->title());
EXPECT_TRUE(site_list_observer_.site_lists()[1]->entry_point().is_empty());
url_filter_observer_.Wait();
EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
url_filter->GetFilteringBehaviorForURL(youtube_url));
EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
url_filter->GetFilteringBehaviorForURL(moose_url));
// Unload the first whitelist.
whitelist_service->UnloadWhitelist("aaaa");
site_list_observer_.Wait();
ASSERT_EQ(1u, site_list_observer_.site_lists().size());
EXPECT_EQ(title2, site_list_observer_.site_lists()[0]->title());
EXPECT_TRUE(site_list_observer_.site_lists()[0]->entry_point().is_empty());
url_filter_observer_.Wait();
EXPECT_EQ(SupervisedUserURLFilter::WARN,
url_filter->GetFilteringBehaviorForURL(youtube_url));
EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
url_filter->GetFilteringBehaviorForURL(moose_url));
}
#endif // defined(ENABLE_EXTENSIONS)