blob: 441f73665707f1f8dbc3bddc08729fb3ef70f91c [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/chrome_elf_init_win.h"
#include "base/basictypes.h"
#include "base/memory/scoped_ptr.h"
#include "base/metrics/field_trial.h"
#include "base/strings/string16.h"
#include "base/strings/string_util.h"
#include "base/strings/utf_string_conversions.h"
#include "base/test/test_reg_util_win.h"
#include "chrome/common/chrome_version_info.h"
#include "chrome_elf/chrome_elf_constants.h"
#include "components/variations/entropy_provider.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "version.h" // NOLINT
class ChromeBlacklistTrialTest : public testing::Test {
protected:
ChromeBlacklistTrialTest() {}
virtual ~ChromeBlacklistTrialTest() {}
virtual void SetUp() OVERRIDE {
testing::Test::SetUp();
override_manager_.OverrideRegistry(HKEY_CURRENT_USER,
L"browser_blacklist_test");
blacklist_registry_key_.reset(
new base::win::RegKey(HKEY_CURRENT_USER,
blacklist::kRegistryBeaconPath,
KEY_QUERY_VALUE | KEY_SET_VALUE));
}
DWORD GetBlacklistState() {
DWORD blacklist_state = blacklist::BLACKLIST_STATE_MAX;
blacklist_registry_key_->ReadValueDW(blacklist::kBeaconState,
&blacklist_state);
return blacklist_state;
}
base::string16 GetBlacklistVersion() {
base::string16 blacklist_version;
blacklist_registry_key_->ReadValue(blacklist::kBeaconVersion,
&blacklist_version);
return blacklist_version;
}
scoped_ptr<base::win::RegKey> blacklist_registry_key_;
registry_util::RegistryOverrideManager override_manager_;
private:
DISALLOW_COPY_AND_ASSIGN(ChromeBlacklistTrialTest);
};
// Ensure that the default trial sets up the blacklist beacons.
TEST_F(ChromeBlacklistTrialTest, DefaultRun) {
// Set some dummy values as beacons.
blacklist_registry_key_->WriteValue(blacklist::kBeaconState,
blacklist::BLACKLIST_DISABLED);
blacklist_registry_key_->WriteValue(blacklist::kBeaconVersion, L"Data");
// This setup code should result in the default group, which should have
// the blacklist set up.
InitializeChromeElf();
// Ensure the beacon values are now correct, indicating the
// blacklist beacon was setup.
ASSERT_EQ(blacklist::BLACKLIST_ENABLED, GetBlacklistState());
chrome::VersionInfo version_info;
base::string16 version(base::UTF8ToUTF16(version_info.Version()));
ASSERT_EQ(version, GetBlacklistVersion());
}
// Ensure that the blacklist is disabled for any users in the
// "BlacklistDisabled" finch group.
TEST_F(ChromeBlacklistTrialTest, BlacklistDisabledRun) {
// Set the beacons to enabled values.
blacklist_registry_key_->WriteValue(blacklist::kBeaconState,
blacklist::BLACKLIST_ENABLED);
blacklist_registry_key_->WriteValue(blacklist::kBeaconVersion, L"Data");
// Create the field trial with the blacklist disabled group.
base::FieldTrialList field_trial_list(
new metrics::SHA1EntropyProvider("test"));
scoped_refptr<base::FieldTrial> trial(
base::FieldTrialList::CreateFieldTrial(
kBrowserBlacklistTrialName, kBrowserBlacklistTrialDisabledGroupName));
// This setup code should now delete any existing blacklist beacons.
InitializeChromeElf();
// Ensure invalid values are returned to indicate that the beacon
// values are indeed gone.
ASSERT_EQ(blacklist::BLACKLIST_STATE_MAX, GetBlacklistState());
ASSERT_EQ(base::string16(), GetBlacklistVersion());
}
TEST_F(ChromeBlacklistTrialTest, VerifyFirstRun) {
BrowserBlacklistBeaconSetup();
// Verify the state is properly set after the first run.
ASSERT_EQ(blacklist::BLACKLIST_ENABLED, GetBlacklistState());
chrome::VersionInfo version_info;
base::string16 version(base::UTF8ToUTF16(version_info.Version()));
ASSERT_EQ(version, GetBlacklistVersion());
}
TEST_F(ChromeBlacklistTrialTest, SetupFailed) {
// Set the registry to indicate that the blacklist setup is running,
// which means it failed to run correctly last time for this version.
blacklist_registry_key_->WriteValue(blacklist::kBeaconVersion,
TEXT(CHROME_VERSION_STRING));
blacklist_registry_key_->WriteValue(blacklist::kBeaconState,
blacklist::BLACKLIST_SETUP_RUNNING);
BrowserBlacklistBeaconSetup();
// Since the blacklist setup failed, it should now be disabled.
ASSERT_EQ(blacklist::BLACKLIST_DISABLED, GetBlacklistState());
}
TEST_F(ChromeBlacklistTrialTest, ThunkSetupFailed) {
// Set the registry to indicate that the blacklist thunk setup is running,
// which means it failed to run correctly last time for this version.
blacklist_registry_key_->WriteValue(blacklist::kBeaconVersion,
TEXT(CHROME_VERSION_STRING));
blacklist_registry_key_->WriteValue(blacklist::kBeaconState,
blacklist::BLACKLIST_THUNK_SETUP);
BrowserBlacklistBeaconSetup();
// Since the blacklist thunk setup failed, it should now be disabled.
ASSERT_EQ(blacklist::BLACKLIST_DISABLED, GetBlacklistState());
}
TEST_F(ChromeBlacklistTrialTest, InterceptionFailed) {
// Set the registry to indicate that an interception is running,
// which means it failed to run correctly last time for this version.
blacklist_registry_key_->WriteValue(blacklist::kBeaconVersion,
TEXT(CHROME_VERSION_STRING));
blacklist_registry_key_->WriteValue(blacklist::kBeaconState,
blacklist::BLACKLIST_INTERCEPTING);
BrowserBlacklistBeaconSetup();
// Since an interception failed, the blacklist should now be disabled.
ASSERT_EQ(blacklist::BLACKLIST_DISABLED, GetBlacklistState());
}
TEST_F(ChromeBlacklistTrialTest, VersionChanged) {
// Mark the blacklist as disabled for an older version, so it should
// get enabled for this new version.
blacklist_registry_key_->WriteValue(blacklist::kBeaconVersion,
L"old_version");
blacklist_registry_key_->WriteValue(blacklist::kBeaconState,
blacklist::BLACKLIST_DISABLED);
BrowserBlacklistBeaconSetup();
// The beacon should now be marked as enabled for the current version.
ASSERT_EQ(blacklist::BLACKLIST_ENABLED, GetBlacklistState());
chrome::VersionInfo version_info;
base::string16 expected_version(base::UTF8ToUTF16(version_info.Version()));
ASSERT_EQ(expected_version, GetBlacklistVersion());
}