blob: 18d11413d8b9bfafbadb6cae6880eebf83b08380 [file] [log] [blame]
// Copyright (c) 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <stddef.h>
#include <memory>
#include <utility>
#include <vector>
#include "base/callback.h"
#include "base/files/file_util.h"
#include "base/files/scoped_temp_dir.h"
#include "base/json/json_reader.h"
#include "base/json/json_writer.h"
#include "base/memory/raw_ptr.h"
#include "base/run_loop.h"
#include "base/task/thread_pool/thread_pool_instance.h"
#include "base/threading/thread_restrictions.h"
#include "base/values.h"
#include "build/build_config.h"
#include "build/chromeos_buildflags.h"
#include "chrome/browser/extensions/extension_service.h"
#include "chrome/browser/extensions/install_verifier.h"
#include "chrome/browser/extensions/test_extension_system.h"
#include "chrome/browser/policy/profile_policy_connector_builder.h"
#include "chrome/browser/policy/schema_registry_service.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/ui/browser.h"
#include "chrome/browser/ui/tabs/tab_strip_model.h"
#include "chrome/common/url_constants.h"
#include "chrome/test/base/in_process_browser_test.h"
#include "chrome/test/base/ui_test_utils.h"
#include "components/policy/core/browser/browser_policy_connector.h"
#include "components/policy/core/common/external_data_fetcher.h"
#include "components/policy/core/common/mock_configuration_policy_provider.h"
#include "components/policy/core/common/policy_map.h"
#include "components/policy/core/common/policy_namespace.h"
#include "components/policy/core/common/policy_types.h"
#include "components/policy/core/common/schema.h"
#include "components/policy/policy_constants.h"
#include "components/strings/grit/components_strings.h"
#include "content/public/browser/web_contents.h"
#include "content/public/test/browser_test.h"
#include "content/public/test/browser_test_utils.h"
#include "extensions/common/extension_builder.h"
#include "extensions/common/features/simple_feature.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "ui/base/l10n/l10n_util.h"
#include "ui/shell_dialogs/select_file_dialog.h"
#include "ui/shell_dialogs/select_file_dialog_factory.h"
#include "ui/shell_dialogs/select_file_policy.h"
#include "url/gurl.h"
#if BUILDFLAG(IS_CHROMEOS_ASH)
#include "chrome/browser/ash/profiles/profile_helper.h"
#endif // BUILDFLAG(IS_CHROMEOS_ASH)
using testing::_;
using testing::Return;
namespace {
// Allows waiting until the policy schema for a |PolicyNamespace| has been made
// available by a |Profile|'s |SchemaRegistry|.
class PolicySchemaAvailableWaiter : public policy::SchemaRegistry::Observer {
public:
PolicySchemaAvailableWaiter(Profile* profile,
const policy::PolicyNamespace& policy_namespace)
: registry_(profile->GetPolicySchemaRegistryService()->registry()),
policy_namespace_(policy_namespace) {}
PolicySchemaAvailableWaiter(const PolicySchemaAvailableWaiter&) = delete;
PolicySchemaAvailableWaiter& operator=(const PolicySchemaAvailableWaiter&) =
delete;
~PolicySchemaAvailableWaiter() override { registry_->RemoveObserver(this); }
// Starts waiting for a policy schema to be available for the
// |policy_namespace_| that has been passed to the constructor. Returns
// immediately if the policy schema is already available.
void Wait() {
if (RegistryHasSchemaForNamespace())
return;
registry_->AddObserver(this);
run_loop_.Run();
}
private:
bool RegistryHasSchemaForNamespace() {
const policy::ComponentMap* map =
registry_->schema_map()->GetComponents(policy_namespace_.domain);
if (!map)
return false;
return map->find(policy_namespace_.component_id) != map->end();
}
// policy::SchemaRegistry::Observer:
void OnSchemaRegistryUpdated(bool has_new_schemas) override {
if (RegistryHasSchemaForNamespace())
run_loop_.Quit();
}
const raw_ptr<policy::SchemaRegistry> registry_;
const policy::PolicyNamespace policy_namespace_;
base::RunLoop run_loop_;
};
std::vector<std::string> PopulateExpectedPolicy(
const std::string& name,
const std::string& value,
const std::string& source,
const policy::PolicyMap::Entry* policy_map_entry,
bool unknown) {
std::vector<std::string> expected_policy;
// Populate expected policy name.
expected_policy.push_back(name);
// Populate expected policy value.
expected_policy.push_back(value);
// Populate expected source name.
expected_policy.push_back(source);
// Populate expected scope.
if (policy_map_entry) {
expected_policy.push_back(l10n_util::GetStringUTF8(
policy_map_entry->scope == policy::POLICY_SCOPE_MACHINE
? IDS_POLICY_SCOPE_DEVICE
: IDS_POLICY_SCOPE_USER));
} else {
expected_policy.emplace_back();
}
// Populate expected level.
if (policy_map_entry) {
expected_policy.push_back(l10n_util::GetStringUTF8(
policy_map_entry->level == policy::POLICY_LEVEL_RECOMMENDED
? IDS_POLICY_LEVEL_RECOMMENDED
: IDS_POLICY_LEVEL_MANDATORY));
} else {
expected_policy.emplace_back();
}
// Populate expected status.
if (unknown)
expected_policy.push_back(l10n_util::GetStringUTF8(IDS_POLICY_LABEL_ERROR));
else if (!policy_map_entry)
expected_policy.push_back(l10n_util::GetStringUTF8(IDS_POLICY_UNSET));
else
expected_policy.push_back(l10n_util::GetStringUTF8(IDS_POLICY_OK));
return expected_policy;
}
void SetChromeMetaData(base::DictionaryValue* expected) {
// Only set the expected keys and types and not the values since
// these can vary greatly on the platform, OS, architecture
// that is running.
constexpr char prefix[] = "chromeMetadata";
expected->SetPath({prefix, "application"}, base::Value(""));
expected->SetPath({prefix, "version"}, base::Value(""));
expected->SetPath({prefix, "revision"}, base::Value(""));
#if BUILDFLAG(IS_CHROMEOS_ASH)
expected->SetPath({prefix, "platform"}, base::Value(""));
#else
expected->SetPath({prefix, "OS"}, base::Value(""));
#endif
}
void SetExpectedPolicy(base::DictionaryValue* expected,
const std::string& name,
const std::string& level,
const std::string& scope,
const std::string& source,
const std::string& error,
const std::string& warning,
bool ignored,
const base::Value& value) {
const char prefix[] = "chromePolicies";
expected->SetPath({prefix, name.c_str(), "level"}, base::Value(level));
expected->SetPath({prefix, name.c_str(), "scope"}, base::Value(scope));
expected->SetPath({prefix, name.c_str(), "source"}, base::Value(source));
if (!error.empty())
expected->SetPath({prefix, name.c_str(), "error"}, base::Value(error));
if (!warning.empty())
expected->SetPath({prefix, name.c_str(), "warning"}, base::Value(warning));
if (ignored)
expected->SetPath({prefix, name.c_str(), "ignored"}, base::Value(ignored));
expected->SetPath({prefix, name.c_str(), "value"}, value.Clone());
}
// The temporary directory and file paths for policy saving.
base::ScopedTempDir export_policies_test_dir;
base::FilePath export_policies_test_file_path;
} // namespace
class PolicyUITest : public InProcessBrowserTest {
public:
PolicyUITest();
PolicyUITest(const PolicyUITest&) = delete;
PolicyUITest& operator=(const PolicyUITest&) = delete;
~PolicyUITest() override;
protected:
// InProcessBrowserTest implementation.
void SetUpInProcessBrowserTestFixture() override;
// Uses the |MockConfiguratonPolicyProvider| installed for testing to publish
// |policy| for |policy_namespace|.
void UpdateProviderPolicyForNamespace(
const policy::PolicyNamespace& policy_namespace,
const policy::PolicyMap& policy);
void VerifyPolicies(const std::vector<std::vector<std::string>>& expected);
void VerifyExportingPolicies(const base::DictionaryValue& expected);
protected:
testing::NiceMock<policy::MockConfigurationPolicyProvider> provider_;
};
// An artificial SelectFileDialog that immediately returns the location of test
// file instead of showing the UI file picker.
class TestSelectFileDialog : public ui::SelectFileDialog {
public:
TestSelectFileDialog(ui::SelectFileDialog::Listener* listener,
std::unique_ptr<ui::SelectFilePolicy> policy)
: ui::SelectFileDialog(listener, std::move(policy)) {}
void SelectFileImpl(Type type,
const std::u16string& title,
const base::FilePath& default_path,
const FileTypeInfo* file_types,
int file_type_index,
const base::FilePath::StringType& default_extension,
gfx::NativeWindow owning_window,
void* params) override {
listener_->FileSelected(export_policies_test_file_path, 0, nullptr);
}
bool IsRunning(gfx::NativeWindow owning_window) const override {
return false;
}
void ListenerDestroyed() override {}
bool HasMultipleFileTypeChoicesImpl() override { return false; }
private:
~TestSelectFileDialog() override = default;
};
// A factory associated with the artificial file picker.
class TestSelectFileDialogFactory : public ui::SelectFileDialogFactory {
private:
ui::SelectFileDialog* Create(
ui::SelectFileDialog::Listener* listener,
std::unique_ptr<ui::SelectFilePolicy> policy) override {
return new TestSelectFileDialog(listener, std::move(policy));
}
};
PolicyUITest::PolicyUITest() = default;
PolicyUITest::~PolicyUITest() = default;
void PolicyUITest::SetUpInProcessBrowserTestFixture() {
provider_.SetDefaultReturns(/*is_initialization_complete_return=*/true,
/*is_first_policy_load_complete_return=*/true);
policy::BrowserPolicyConnector::SetPolicyProviderForTesting(&provider_);
policy::PushProfilePolicyConnectorProviderForTesting(&provider_);
// Create a directory for testing exporting policies.
ASSERT_TRUE(export_policies_test_dir.CreateUniqueTempDir());
const std::string filename = "policy.json";
export_policies_test_file_path =
export_policies_test_dir.GetPath().AppendASCII(filename);
}
void PolicyUITest::UpdateProviderPolicyForNamespace(
const policy::PolicyNamespace& policy_namespace,
const policy::PolicyMap& policy) {
std::unique_ptr<policy::PolicyBundle> bundle =
std::make_unique<policy::PolicyBundle>();
bundle->Get(policy_namespace) = policy.Clone();
provider_.UpdatePolicy(std::move(bundle));
}
void PolicyUITest::VerifyPolicies(
const std::vector<std::vector<std::string>>& expected_policies) {
ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(),
GURL(chrome::kChromeUIPolicyURL)));
// Retrieve the text contents of the policy table cells for all policies.
const std::string javascript =
"var entries = document.getElementById('policy-ui')"
" .querySelectorAll('.policy-table');"
"var policies = [];"
"for (var i = 0; i < entries.length; ++i) {"
" var items = entries[i].querySelectorAll('.policy.row');"
" for (var j = 0; j < items.length; ++j) {"
" var children = items[j].querySelectorAll('div');"
" var values = [];"
" for(var k = 0; k < children.length - 1; ++k) {"
" values.push(children[k].textContent.trim());"
" }"
" policies.push(values);"
" }"
"}"
"domAutomationController.send(JSON.stringify(policies));";
content::WebContents* contents =
browser()->tab_strip_model()->GetActiveWebContents();
std::string json;
ASSERT_TRUE(
content::ExecuteScriptAndExtractString(contents, javascript, &json));
absl::optional<base::Value> value_ptr = base::JSONReader::Read(json);
ASSERT_TRUE(value_ptr);
ASSERT_TRUE(value_ptr->is_list());
base::Value::ConstListView actual_policies = value_ptr->GetList();
// Verify that the cells contain the expected strings for all policies.
ASSERT_EQ(expected_policies.size(), actual_policies.size());
for (size_t i = 0; i < expected_policies.size(); ++i) {
const std::vector<std::string> expected_policy = expected_policies[i];
ASSERT_TRUE(actual_policies[i].is_list());
base::Value::ConstListView actual_policy = actual_policies[i].GetList();
ASSERT_EQ(expected_policy.size(), actual_policy.size());
for (size_t j = 0; j < expected_policy.size(); ++j) {
const std::string* value = actual_policy[j].GetIfString();
ASSERT_TRUE(value);
if (expected_policy[j] != *value)
EXPECT_EQ(expected_policy[j], *value);
}
}
}
void PolicyUITest::VerifyExportingPolicies(
const base::DictionaryValue& expected) {
// Set SelectFileDialog to use our factory.
ui::SelectFileDialog::SetFactory(new TestSelectFileDialogFactory());
// Navigate to the about:policy page.
ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(),
GURL(chrome::kChromeUIPolicyURL)));
// Click on 'save policies' button.
const std::string javascript =
"document.getElementById('export-policies').click()";
content::WebContents* contents =
browser()->tab_strip_model()->GetActiveWebContents();
EXPECT_TRUE(content::ExecuteScript(contents, javascript));
base::ThreadPoolInstance::Get()->FlushForTesting();
// Open the created file.
base::ScopedAllowBlockingForTesting allow_blocking;
std::string file_contents;
EXPECT_TRUE(
base::ReadFileToString(export_policies_test_file_path, &file_contents));
absl::optional<base::Value> value_ptr = base::JSONReader::Read(file_contents);
// Check that the file contains a valid dictionary.
EXPECT_TRUE(value_ptr);
EXPECT_TRUE(value_ptr->is_dict());
// Since Chrome Metadata has a lot of variations based on platform, OS,
// architecture and version, it is difficult to test for exact values. Test
// instead that the same keys exist in the meta data and also that the type of
// all the keys is a string. The incoming |expected| value should already be
// filled with the expected keys.
base::Value* chrome_metadata =
value_ptr->FindKeyOfType("chromeMetadata", base::Value::Type::DICTIONARY);
EXPECT_NE(chrome_metadata, nullptr);
EXPECT_TRUE(chrome_metadata->is_dict());
// The |chrome_metadata| we compare against will have the actual values so
// those will be cleared to empty values so that the equals comparison below
// will just compare key existence and value types.
for (auto key_value : chrome_metadata->DictItems())
key_value.second = base::Value(key_value.second.type());
// Since policy management status can have variable information based on the
// test bot(e.g., AD joined bot can have updater domain information), it is
// difficult to test for exact values. Test instead that the same key,
// "status" exist and also that the type of it is a dictionary. The incoming
// |expected| value should already have a "status" key with an empty
// dictionary value.
base::Value* status =
value_ptr->FindKeyOfType("status", base::Value::Type::DICTIONARY);
EXPECT_NE(status, nullptr);
status->DictClear();
// Check that this dictionary is the same as expected.
EXPECT_EQ(expected, *value_ptr);
}
IN_PROC_BROWSER_TEST_F(PolicyUITest, WritePoliciesToJSONFile) {
// Set policy values and generate expected dictionary.
policy::PolicyMap values;
base::DictionaryValue expected_values;
SetChromeMetaData(&expected_values);
base::ListValue popups_blocked_for_urls;
popups_blocked_for_urls.Append("aaa");
popups_blocked_for_urls.Append("bbb");
popups_blocked_for_urls.Append("ccc");
values.Set(policy::key::kPopupsBlockedForUrls, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_PLATFORM,
popups_blocked_for_urls.Clone(), nullptr);
SetExpectedPolicy(&expected_values, policy::key::kPopupsBlockedForUrls,
"mandatory", "machine", "platform", std::string(),
std::string(), false, popups_blocked_for_urls);
values.Set(policy::key::kDefaultImagesSetting, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_CLOUD,
base::Value(2), nullptr);
SetExpectedPolicy(&expected_values, policy::key::kDefaultImagesSetting,
"mandatory", "machine", "cloud", std::string(),
std::string(), false, base::Value(2));
// This also checks that we save complex policies correctly.
base::Value unknown_policy(base::Value::Type::DICTIONARY);
base::Value* body =
unknown_policy.SetKey("body", base::Value(base::Value::Type::DICTIONARY));
body->SetIntKey("first", 0);
body->SetBoolKey("second", true);
unknown_policy.SetIntKey("head", 12);
const std::string kUnknownPolicy = "NoSuchThing";
values.Set(kUnknownPolicy, policy::POLICY_LEVEL_RECOMMENDED,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
unknown_policy.Clone(), nullptr);
SetExpectedPolicy(&expected_values, kUnknownPolicy, "recommended", "user",
"cloud", l10n_util::GetStringUTF8(IDS_POLICY_UNKNOWN),
std::string(), false, unknown_policy);
// Set the extension policies to an empty dictionary as we haven't added any
// such policies.
expected_values.SetKey("extensionPolicies",
base::Value(base::Value::Type::DICTIONARY));
expected_values.SetKey("status", base::Value(base::Value::Type::DICTIONARY));
#if BUILDFLAG(IS_CHROMEOS_ASH)
expected_values.SetKey("loginScreenExtensionPolicies",
base::Value(base::Value::Type::DICTIONARY));
expected_values.SetKey("deviceLocalAccountPolicies",
base::Value(base::Value::Type::DICTIONARY));
#endif // BUILDFLAG(IS_CHROMEOS_ASH)
provider_.UpdateChromePolicy(values);
// Check writing those policies to a newly created file.
VerifyExportingPolicies(expected_values);
// Change policy values.
values.Erase(policy::key::kDefaultImagesSetting);
expected_values.RemovePath(std::string("chromePolicies.") +
std::string(policy::key::kDefaultImagesSetting));
popups_blocked_for_urls.Append("ddd");
values.Set(policy::key::kPopupsBlockedForUrls, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_PLATFORM,
popups_blocked_for_urls.Clone(), nullptr);
SetExpectedPolicy(&expected_values, policy::key::kPopupsBlockedForUrls,
"mandatory", "machine", "platform", std::string(),
std::string(), false, popups_blocked_for_urls);
provider_.UpdateChromePolicy(values);
// Check writing changed policies to the same file (should overwrite the
// contents).
VerifyExportingPolicies(expected_values);
#if !BUILDFLAG(IS_CHROMEOS_ASH)
// This also checks that we do not bypass the policy that blocks file
// selection dialogs. This is a desktop only policy.
values.Set(policy::key::kAllowFileSelectionDialogs,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_MACHINE,
policy::POLICY_SOURCE_PLATFORM, base::Value(false), nullptr);
popups_blocked_for_urls.Append("eeeeee");
values.Set(policy::key::kPopupsBlockedForUrls, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_PLATFORM,
popups_blocked_for_urls.Clone(), nullptr);
provider_.UpdateChromePolicy(values);
// Check writing changed policies did not overwrite the exported policies
// because the file selection dialog is not allowed.
VerifyExportingPolicies(expected_values);
#endif
}
IN_PROC_BROWSER_TEST_F(PolicyUITest, SendPolicyNames) {
// Verifies that the names of known policies are sent to the UI and processed
// there correctly by checking that the policy table contains all policies in
// the correct order.
// Expect that the policy table contains all known policies in alphabetical
// order and none of the policies have a set value.
std::vector<std::vector<std::string>> expected_policies;
policy::Schema chrome_schema =
policy::Schema::Wrap(policy::GetChromeSchemaData());
ASSERT_TRUE(chrome_schema.valid());
for (policy::Schema::Iterator it = chrome_schema.GetPropertiesIterator();
!it.IsAtEnd(); it.Advance()) {
expected_policies.push_back(PopulateExpectedPolicy(
it.key(), std::string(), std::string(), nullptr, false));
}
#if !BUILDFLAG(IS_CHROMEOS)
// Add policies found in the Policy Precedence table.
for (auto* policy : policy::metapolicy::kPrecedence) {
expected_policies.push_back(PopulateExpectedPolicy(
policy, std::string(), std::string(), nullptr, false));
}
#endif // !BUILDFLAG(IS_CHROMEOS)
// Retrieve the contents of the policy table from the UI and verify that it
// matches the expectation.
VerifyPolicies(expected_policies);
}
IN_PROC_BROWSER_TEST_F(PolicyUITest, SendPolicyValues) {
// Verifies that policy values are sent to the UI and processed there
// correctly by setting the values of four known and one unknown policy and
// checking that the policy table contains the policy names, values and
// metadata in the correct order.
policy::PolicyMap values;
std::map<std::string, std::string> expected_values;
// Set the values of four existing policies.
base::Value restore_on_startup_urls(base::Value::Type::LIST);
restore_on_startup_urls.Append("aaa");
restore_on_startup_urls.Append("bbb");
restore_on_startup_urls.Append("ccc");
values.Set(policy::key::kRestoreOnStartupURLs, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::move(restore_on_startup_urls), nullptr);
expected_values[policy::key::kRestoreOnStartupURLs] = "aaa,bbb,ccc";
values.Set(policy::key::kHomepageLocation, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_CLOUD,
base::Value("http://google.com"), nullptr);
expected_values[policy::key::kHomepageLocation] = "http://google.com";
values.Set(policy::key::kRestoreOnStartup, policy::POLICY_LEVEL_RECOMMENDED,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
base::Value(4), nullptr);
expected_values[policy::key::kRestoreOnStartup] = "4";
values.Set(policy::key::kShowHomeButton, policy::POLICY_LEVEL_RECOMMENDED,
policy::POLICY_SCOPE_MACHINE, policy::POLICY_SOURCE_CLOUD,
base::Value(true), nullptr);
expected_values[policy::key::kShowHomeButton] = "true";
// Set the value of a policy that does not exist.
const std::string kUnknownPolicy = "NoSuchThing";
values.Set(kUnknownPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_PLATFORM,
base::Value(true), nullptr);
expected_values[kUnknownPolicy] = "true";
const std::string kUnknownPolicyWithDots = "no.such.thing";
values.Set(kUnknownPolicyWithDots, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_PLATFORM,
base::Value("blub"), nullptr);
expected_values[kUnknownPolicyWithDots] = "blub";
provider_.UpdateChromePolicy(values);
// Expect that the policy table contains, in order:
// * All known policies whose value has been set, in alphabetical order.
// * The unknown policy.
// * All known policies whose value has not been set, in alphabetical order.
std::vector<std::vector<std::string>> expected_policies;
size_t first_unset_position = 0;
policy::Schema chrome_schema =
policy::Schema::Wrap(policy::GetChromeSchemaData());
ASSERT_TRUE(chrome_schema.valid());
for (policy::Schema::Iterator props = chrome_schema.GetPropertiesIterator();
!props.IsAtEnd(); props.Advance()) {
std::map<std::string, std::string>::const_iterator it =
expected_values.find(props.key());
const std::string value =
it == expected_values.end() ? std::string() : it->second;
const std::string source =
it == expected_values.end() ? std::string() : "Cloud";
const policy::PolicyMap::Entry* metadata = values.Get(props.key());
expected_policies.insert(
metadata ? expected_policies.begin() + first_unset_position++
: expected_policies.end(),
PopulateExpectedPolicy(props.key(), value, source, metadata, false));
}
expected_policies.insert(
expected_policies.begin() + first_unset_position++,
PopulateExpectedPolicy(kUnknownPolicy, expected_values[kUnknownPolicy],
"Platform", values.Get(kUnknownPolicy), true));
expected_policies.insert(
expected_policies.begin() + first_unset_position++,
PopulateExpectedPolicy(
kUnknownPolicyWithDots, expected_values[kUnknownPolicyWithDots],
"Platform", values.Get(kUnknownPolicyWithDots), true));
#if !BUILDFLAG(IS_CHROMEOS)
// Add policies found in the Policy Precedence table.
for (auto* policy : policy::metapolicy::kPrecedence) {
expected_policies.push_back(PopulateExpectedPolicy(
policy, std::string(), std::string(), values.Get(policy), false));
}
#endif // !BUILDFLAG(IS_CHROMEOS)
// Retrieve the contents of the policy table from the UI and verify that it
// matches the expectation.
VerifyPolicies(expected_policies);
}
#if !BUILDFLAG(IS_CHROMEOS)
class PolicyPrecedenceUITest
: public PolicyUITest,
public ::testing::WithParamInterface<std::tuple<
/*cloud_policy_overrides_platform_policy=*/bool,
/*cloud_user_policy_overrides_cloud_machine_policy=*/bool,
/*is_user_affiliated=*/bool>> {
public:
bool CloudPolicyOverridesPlatformPolicy() { return std::get<0>(GetParam()); }
bool CloudUserPolicyOverridesCloudMachinePolicy() {
return std::get<1>(GetParam());
}
bool IsUserAffiliated() { return std::get<2>(GetParam()); }
void ValidatePrecedenceValue(const std::string& precedence_row_value) {
if (CloudPolicyOverridesPlatformPolicy() &&
CloudUserPolicyOverridesCloudMachinePolicy() && IsUserAffiliated()) {
EXPECT_EQ(precedence_row_value,
"Cloud user > Cloud machine > Platform machine > "
"Platform user");
} else if (CloudPolicyOverridesPlatformPolicy()) {
EXPECT_EQ(precedence_row_value,
"Cloud machine > Platform machine > Platform user > "
"Cloud user");
} else if (CloudUserPolicyOverridesCloudMachinePolicy() &&
IsUserAffiliated()) {
EXPECT_EQ(precedence_row_value,
"Platform machine > Cloud user > Cloud machine > "
"Platform user");
} else {
EXPECT_EQ(precedence_row_value,
"Platform machine > Cloud machine > Platform user > "
"Cloud user");
}
}
// Used to retrieve the contents of the policy precedence rows.
const std::string kJavaScript =
"var precedence_row = document.getElementById('policy-ui')"
" .querySelector('.policy-table .precedence.row > .value');"
"domAutomationController.send(precedence_row.textContent);";
};
// Verify that the precedence order displayed in the Policy Precedence table is
// correct.
IN_PROC_BROWSER_TEST_P(PolicyPrecedenceUITest, PrecedenceOrder) {
// Set precedence policies.
policy::PolicyMap policy_map;
if (IsUserAffiliated()) {
base::flat_set<std::string> affiliation_ids;
affiliation_ids.insert("12345");
// Treat user as affiliated by setting identical user and device IDs.
policy_map.SetUserAffiliationIds(affiliation_ids);
policy_map.SetDeviceAffiliationIds(affiliation_ids);
}
policy_map.Set(policy::key::kCloudPolicyOverridesPlatformPolicy,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_MACHINE,
policy::POLICY_SOURCE_PLATFORM,
base::Value(CloudPolicyOverridesPlatformPolicy()), nullptr);
policy_map.Set(policy::key::kCloudUserPolicyOverridesCloudMachinePolicy,
policy::POLICY_LEVEL_MANDATORY, policy::POLICY_SCOPE_MACHINE,
policy::POLICY_SOURCE_PLATFORM,
base::Value(CloudUserPolicyOverridesCloudMachinePolicy()),
nullptr);
provider_.UpdateChromePolicy(policy_map);
// Retrieve the contents of the policy precedence rows.
ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(),
GURL(chrome::kChromeUIPolicyURL)));
content::WebContents* contents =
browser()->tab_strip_model()->GetActiveWebContents();
std::string precedence_row_value;
ASSERT_TRUE(content::ExecuteScriptAndExtractString(contents, kJavaScript,
&precedence_row_value));
ValidatePrecedenceValue(precedence_row_value);
}
INSTANTIATE_TEST_SUITE_P(PolicyPrecedenceUITestInstance,
PolicyPrecedenceUITest,
testing::Combine(testing::Values(false, true),
testing::Values(false, true),
testing::Values(false, true)));
#endif // !BUILDFLAG(IS_CHROMEOS)
// TODO(https://crbug.com/1027135) Add tests to verify extension policies are
// exported correctly.
class ExtensionPolicyUITest : public PolicyUITest,
public ::testing::WithParamInterface<bool> {
public:
ExtensionPolicyUITest() = default;
bool UseSigninProfile() const { return GetParam(); }
Profile* extension_profile() const {
#if BUILDFLAG(IS_CHROMEOS_ASH)
if (UseSigninProfile()) {
return ash::ProfileHelper::GetSigninProfile();
}
#endif // BUILDFLAG(IS_CHROMEOS_ASH)
return browser()->profile();
}
};
// TODO(https://crbug.com/911661) Flaky time outs on Linux Chromium OS ASan
// LSan bot.
#if defined(ADDRESS_SANITIZER)
#define MAYBE_ExtensionLoadAndSendPolicy DISABLED_ExtensionLoadAndSendPolicy
#else
#define MAYBE_ExtensionLoadAndSendPolicy ExtensionLoadAndSendPolicy
#endif
IN_PROC_BROWSER_TEST_P(ExtensionPolicyUITest,
MAYBE_ExtensionLoadAndSendPolicy) {
base::ScopedAllowBlockingForTesting allow_blocking;
base::ScopedTempDir temp_dir_;
ASSERT_TRUE(temp_dir_.CreateUniqueTempDir());
const std::string kNormalBooleanPolicy = "normal_boolean";
const std::string kSensitiveBooleanPolicy = "sensitive_boolean";
const std::string kSensitiveStringPolicy = "sensitive_string";
const std::string kSensitiveObjectPolicy = "sensitive_object";
const std::string kSensitiveArrayPolicy = "sensitive_array";
const std::string kSensitiveIntegerPolicy = "sensitive_integer";
const std::string kSensitiveNumberPolicy = "sensitive_number";
std::string json_data = R"({
"type": "object",
"properties": {
"normal_boolean": {
"type": "boolean"
},
"sensitive_boolean": {
"type": "boolean",
"sensitiveValue": true
},
"sensitive_string": {
"type": "string",
"sensitiveValue": true
},
"sensitive_object": {
"type": "object",
"additionalProperties": {
"type": "boolean"
},
"sensitiveValue": true
},
"sensitive_array": {
"type": "array",
"items": {
"type": "boolean"
},
"sensitiveValue": true
},
"sensitive_integer": {
"type": "integer",
"sensitiveValue": true
},
"sensitive_number": {
"type": "number",
"sensitiveValue": true
}
}
})";
const std::string schema_file = "schema.json";
base::FilePath schema_path = temp_dir_.GetPath().AppendASCII(schema_file);
base::WriteFile(schema_path, json_data);
// Build extension that contains the policy schema.
extensions::DictionaryBuilder storage;
storage.Set("managed_schema", schema_file);
extensions::DictionaryBuilder manifest;
manifest.Set("name", "test")
.Set("version", "1")
.Set("manifest_version", 2)
.Set("storage", storage.Build());
extensions::ExtensionBuilder builder;
builder.SetPath(temp_dir_.GetPath());
builder.SetManifest(manifest.Build());
builder.SetLocation(
extensions::mojom::ManifestLocation::kExternalPolicyDownload);
// Install extension.
extensions::ExtensionService* service =
extensions::ExtensionSystem::Get(extension_profile())
->extension_service();
scoped_refptr<const extensions::Extension> extension = builder.Build();
// Bypass "signin_screen" feature only enabled for allowlisted extensions.
extensions::SimpleFeature::ScopedThreadUnsafeAllowlistForTest allowlist(
extension->id());
// Disable extension install verification.
extensions::ScopedInstallVerifierBypassForTest ignore_install_verification_;
service->OnExtensionInstalled(extension.get(), syncer::StringOrdinal(), 0);
policy::PolicyDomain policy_domain =
UseSigninProfile() ? policy::POLICY_DOMAIN_SIGNIN_EXTENSIONS
: policy::POLICY_DOMAIN_EXTENSIONS;
const policy::PolicyNamespace extension_policy_namespace(policy_domain,
extension->id());
PolicySchemaAvailableWaiter(extension_profile()->GetOriginalProfile(),
extension_policy_namespace)
.Wait();
std::vector<std::vector<std::string>> expected_chrome_policies;
policy::Schema chrome_schema =
policy::Schema::Wrap(policy::GetChromeSchemaData());
ASSERT_TRUE(chrome_schema.valid());
for (policy::Schema::Iterator it = chrome_schema.GetPropertiesIterator();
!it.IsAtEnd(); it.Advance()) {
expected_chrome_policies.push_back(PopulateExpectedPolicy(
it.key(), std::string(), std::string(), nullptr, false));
}
#if !BUILDFLAG(IS_CHROMEOS)
// Add policies found in the precedence policy table.
for (auto* policy : policy::metapolicy::kPrecedence) {
expected_chrome_policies.push_back(PopulateExpectedPolicy(
policy, std::string(), std::string(), nullptr, false));
}
#endif // !BUILDFLAG(IS_CHROMEOS)
// Add extension policy to expected policy list.
std::vector<std::vector<std::string>> expected_policies =
expected_chrome_policies;
expected_policies.push_back(PopulateExpectedPolicy(
kNormalBooleanPolicy, std::string(), std::string(), nullptr, false));
expected_policies.push_back(PopulateExpectedPolicy(
kSensitiveArrayPolicy, std::string(), std::string(), nullptr, false));
expected_policies.push_back(PopulateExpectedPolicy(
kSensitiveBooleanPolicy, std::string(), std::string(), nullptr, false));
expected_policies.push_back(PopulateExpectedPolicy(
kSensitiveIntegerPolicy, std::string(), std::string(), nullptr, false));
expected_policies.push_back(PopulateExpectedPolicy(
kSensitiveNumberPolicy, std::string(), std::string(), nullptr, false));
expected_policies.push_back(PopulateExpectedPolicy(
kSensitiveObjectPolicy, std::string(), std::string(), nullptr, false));
expected_policies.push_back(PopulateExpectedPolicy(
kSensitiveStringPolicy, std::string(), std::string(), nullptr, false));
// Verify if policy UI includes policy that extension have.
VerifyPolicies(expected_policies);
base::Value object_value(base::Value::Type::DICTIONARY);
object_value.SetBoolKey("objectProperty", true);
base::Value array_value(base::Value::Type::LIST);
array_value.Append(true);
policy::PolicyMap values;
values.Set(kNormalBooleanPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
base::Value(true), nullptr);
values.Set(kSensitiveArrayPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::move(array_value), nullptr);
values.Set(kSensitiveBooleanPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
base::Value(true), nullptr);
values.Set(kSensitiveIntegerPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
base::Value(42), nullptr);
values.Set(kSensitiveNumberPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
base::Value(3.141), nullptr);
values.Set(kSensitiveObjectPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
std::move(object_value), nullptr);
values.Set(kSensitiveStringPolicy, policy::POLICY_LEVEL_MANDATORY,
policy::POLICY_SCOPE_USER, policy::POLICY_SOURCE_CLOUD,
base::Value("value"), nullptr);
UpdateProviderPolicyForNamespace(extension_policy_namespace, values);
// Add extension policy with values to expected policy list.
const std::string mask_value = "********";
std::vector<std::vector<std::string>> expected_policies_with_values =
expected_chrome_policies;
expected_policies_with_values.push_back(
PopulateExpectedPolicy(kNormalBooleanPolicy, "true", "Cloud",
values.Get(kNormalBooleanPolicy), false));
expected_policies_with_values.push_back(
PopulateExpectedPolicy(kSensitiveArrayPolicy, mask_value, "Cloud",
values.Get(kSensitiveArrayPolicy), false));
expected_policies_with_values.push_back(
PopulateExpectedPolicy(kSensitiveBooleanPolicy, mask_value, "Cloud",
values.Get(kSensitiveBooleanPolicy), false));
expected_policies_with_values.push_back(
PopulateExpectedPolicy(kSensitiveIntegerPolicy, mask_value, "Cloud",
values.Get(kSensitiveIntegerPolicy), false));
expected_policies_with_values.push_back(
PopulateExpectedPolicy(kSensitiveNumberPolicy, mask_value, "Cloud",
values.Get(kSensitiveNumberPolicy), false));
expected_policies_with_values.push_back(
PopulateExpectedPolicy(kSensitiveObjectPolicy, mask_value, "Cloud",
values.Get(kSensitiveObjectPolicy), false));
expected_policies_with_values.push_back(
PopulateExpectedPolicy(kSensitiveStringPolicy, mask_value, "Cloud",
values.Get(kSensitiveStringPolicy), false));
VerifyPolicies(expected_policies_with_values);
}
INSTANTIATE_TEST_SUITE_P(All,
ExtensionPolicyUITest,
#if BUILDFLAG(IS_CHROMEOS_ASH)
::testing::Values(false, true)
#else // BUILDFLAG(IS_CHROMEOS_ASH)
::testing::Values(false)
#endif // BUILDFLAG(IS_CHROMEOS_ASH)
);