| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include <windows.h> |
| |
| #include <string> |
| |
| #include "base/file_util.h" |
| #include "base/path_service.h" |
| #include "base/scoped_temp_dir.h" |
| #include "base/time.h" |
| #include "base/memory/scoped_ptr.h" |
| #include "base/threading/platform_thread.h" |
| #include "base/win/scoped_handle.h" |
| #include "chrome/common/chrome_paths.h" |
| #include "chrome/installer/setup/setup_util.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| |
| namespace { |
| |
| class SetupUtilTestWithDir : public testing::Test { |
| protected: |
| virtual void SetUp() { |
| ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &data_dir_)); |
| data_dir_ = data_dir_.AppendASCII("installer"); |
| ASSERT_TRUE(file_util::PathExists(data_dir_)); |
| |
| // Create a temp directory for testing. |
| ASSERT_TRUE(test_dir_.CreateUniqueTempDir()); |
| } |
| |
| virtual void TearDown() { |
| // Clean up test directory manually so we can fail if it leaks. |
| ASSERT_TRUE(test_dir_.Delete()); |
| } |
| |
| // The temporary directory used to contain the test operations. |
| ScopedTempDir test_dir_; |
| |
| // The path to input data used in tests. |
| FilePath data_dir_; |
| }; |
| |
| // The privilege tested in ScopeTokenPrivilege tests below. |
| // Use SE_RESTORE_NAME as it is one of the many privileges that is available, |
| // but not enabled by default on processes running at high integrity. |
| static const wchar_t kTestedPrivilege[] = SE_RESTORE_NAME; |
| |
| // Returns true if the current process' token has privilege |privilege_name| |
| // enabled. |
| bool CurrentProcessHasPrivilege(const wchar_t* privilege_name) { |
| base::win::ScopedHandle token; |
| if (!::OpenProcessToken(::GetCurrentProcess(), TOKEN_QUERY, |
| token.Receive())) { |
| ADD_FAILURE(); |
| return false; |
| } |
| |
| // First get the size of the buffer needed for |privileges| below. |
| DWORD size; |
| EXPECT_FALSE(::GetTokenInformation(token, TokenPrivileges, NULL, 0, &size)); |
| |
| scoped_array<BYTE> privileges_bytes(new BYTE[size]); |
| TOKEN_PRIVILEGES* privileges = |
| reinterpret_cast<TOKEN_PRIVILEGES*>(privileges_bytes.get()); |
| |
| if (!::GetTokenInformation(token, TokenPrivileges, privileges, size, &size)) { |
| ADD_FAILURE(); |
| return false; |
| } |
| |
| // There is no point getting a buffer to store more than |privilege_name|\0 as |
| // anything longer will obviously not be equal to |privilege_name|. |
| const DWORD desired_size = wcslen(privilege_name); |
| const DWORD buffer_size = desired_size + 1; |
| scoped_array<wchar_t> name_buffer(new wchar_t[buffer_size]); |
| for (int i = privileges->PrivilegeCount - 1; i >= 0 ; --i) { |
| LUID_AND_ATTRIBUTES& luid_and_att = privileges->Privileges[i]; |
| DWORD size = buffer_size; |
| ::LookupPrivilegeName(NULL, &luid_and_att.Luid, name_buffer.get(), &size); |
| if (size == desired_size && |
| wcscmp(name_buffer.get(), privilege_name) == 0) { |
| return luid_and_att.Attributes == SE_PRIVILEGE_ENABLED; |
| } |
| } |
| return false; |
| } |
| |
| } // namespace |
| |
| // Test that we are parsing Chrome version correctly. |
| TEST_F(SetupUtilTestWithDir, ApplyDiffPatchTest) { |
| FilePath work_dir(test_dir_.path()); |
| work_dir = work_dir.AppendASCII("ApplyDiffPatchTest"); |
| ASSERT_FALSE(file_util::PathExists(work_dir)); |
| EXPECT_TRUE(file_util::CreateDirectory(work_dir)); |
| ASSERT_TRUE(file_util::PathExists(work_dir)); |
| |
| FilePath src = data_dir_.AppendASCII("archive1.7z"); |
| FilePath patch = data_dir_.AppendASCII("archive.diff"); |
| FilePath dest = work_dir.AppendASCII("archive2.7z"); |
| EXPECT_EQ(installer::ApplyDiffPatch(src, patch, dest, NULL), 0); |
| FilePath base = data_dir_.AppendASCII("archive2.7z"); |
| EXPECT_TRUE(file_util::ContentsEqual(dest, base)); |
| |
| EXPECT_EQ(installer::ApplyDiffPatch(FilePath(), FilePath(), FilePath(), NULL), |
| 6); |
| } |
| |
| // Test that we are parsing Chrome version correctly. |
| TEST_F(SetupUtilTestWithDir, GetMaxVersionFromArchiveDirTest) { |
| // Create a version dir |
| FilePath chrome_dir = test_dir_.path().AppendASCII("1.0.0.0"); |
| file_util::CreateDirectory(chrome_dir); |
| ASSERT_TRUE(file_util::PathExists(chrome_dir)); |
| scoped_ptr<Version> version( |
| installer::GetMaxVersionFromArchiveDir(test_dir_.path())); |
| ASSERT_EQ(version->GetString(), "1.0.0.0"); |
| |
| file_util::Delete(chrome_dir, true); |
| ASSERT_FALSE(file_util::PathExists(chrome_dir)); |
| ASSERT_TRUE(installer::GetMaxVersionFromArchiveDir(test_dir_.path()) == NULL); |
| |
| chrome_dir = test_dir_.path().AppendASCII("ABC"); |
| file_util::CreateDirectory(chrome_dir); |
| ASSERT_TRUE(file_util::PathExists(chrome_dir)); |
| ASSERT_TRUE(installer::GetMaxVersionFromArchiveDir(test_dir_.path()) == NULL); |
| |
| chrome_dir = test_dir_.path().AppendASCII("2.3.4.5"); |
| file_util::CreateDirectory(chrome_dir); |
| ASSERT_TRUE(file_util::PathExists(chrome_dir)); |
| version.reset(installer::GetMaxVersionFromArchiveDir(test_dir_.path())); |
| ASSERT_EQ(version->GetString(), "2.3.4.5"); |
| |
| // Create multiple version dirs, ensure that we select the greatest. |
| chrome_dir = test_dir_.path().AppendASCII("9.9.9.9"); |
| file_util::CreateDirectory(chrome_dir); |
| ASSERT_TRUE(file_util::PathExists(chrome_dir)); |
| chrome_dir = test_dir_.path().AppendASCII("1.1.1.1"); |
| file_util::CreateDirectory(chrome_dir); |
| ASSERT_TRUE(file_util::PathExists(chrome_dir)); |
| |
| version.reset(installer::GetMaxVersionFromArchiveDir(test_dir_.path())); |
| ASSERT_EQ(version->GetString(), "9.9.9.9"); |
| } |
| |
| TEST_F(SetupUtilTestWithDir, DeleteFileFromTempProcess) { |
| FilePath test_file; |
| file_util::CreateTemporaryFileInDir(test_dir_.path(), &test_file); |
| ASSERT_TRUE(file_util::PathExists(test_file)); |
| file_util::WriteFile(test_file, "foo", 3); |
| EXPECT_TRUE(installer::DeleteFileFromTempProcess(test_file, 0)); |
| base::PlatformThread::Sleep(base::TimeDelta::FromMilliseconds(200)); |
| EXPECT_FALSE(file_util::PathExists(test_file)); |
| } |
| |
| // Note: This test is only valid when run at high integrity (i.e. it will fail |
| // at medium integrity). |
| TEST(SetupUtilTest, ScopedTokenPrivilegeBasic) { |
| ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
| |
| { |
| installer::ScopedTokenPrivilege test_scoped_privilege(kTestedPrivilege); |
| ASSERT_TRUE(test_scoped_privilege.is_enabled()); |
| ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
| } |
| |
| ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
| } |
| |
| // Note: This test is only valid when run at high integrity (i.e. it will fail |
| // at medium integrity). |
| TEST(SetupUtilTest, ScopedTokenPrivilegeAlreadyEnabled) { |
| ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
| |
| { |
| installer::ScopedTokenPrivilege test_scoped_privilege(kTestedPrivilege); |
| ASSERT_TRUE(test_scoped_privilege.is_enabled()); |
| ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
| { |
| installer::ScopedTokenPrivilege dup_scoped_privilege(kTestedPrivilege); |
| ASSERT_TRUE(dup_scoped_privilege.is_enabled()); |
| ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
| } |
| ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
| } |
| |
| ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
| } |