1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
7 #include "base/command_line.h"
8 #include "base/files/file_path.h"
9 #include "base/memory/ref_counted.h"
10 #include "base/path_service.h"
11 #include "base/run_loop.h"
12 #include "chrome/browser/browser_process.h"
13 #include "chrome/browser/extensions/extension_browsertest.h"
14 #include "chrome/browser/extensions/extension_test_message_listener.h"
15 #include "chrome/browser/policy/browser_policy_connector.h"
16 #include "chrome/browser/policy/cloud/cloud_policy_constants.h"
17 #include "chrome/browser/policy/cloud/mock_cloud_policy_client.h"
18 #include "chrome/browser/policy/policy_service.h"
19 #include "chrome/browser/policy/policy_test_utils.h"
20 #include "chrome/browser/policy/profile_policy_connector.h"
21 #include "chrome/browser/policy/profile_policy_connector_factory.h"
22 #include "chrome/browser/policy/proto/cloud/chrome_extension_policy.pb.h"
23 #include "chrome/browser/policy/test/local_policy_test_server.h"
24 #include "chrome/browser/profiles/profile.h"
25 #include "chrome/common/chrome_paths.h"
26 #include "chrome/common/chrome_switches.h"
27 #include "chrome/common/extensions/extension.h"
28 #include "net/url_request/url_request_context_getter.h"
29 #include "policy/proto/cloud_policy.pb.h"
30 #include "testing/gmock/include/gmock/gmock.h"
31 #include "testing/gtest/include/gtest/gtest.h"
33 #if defined(OS_CHROMEOS)
34 #include "chrome/browser/chromeos/policy/user_cloud_policy_manager_chromeos.h"
35 #include "chrome/browser/chromeos/policy/user_cloud_policy_manager_factory_chromeos.h"
36 #include "chrome/common/chrome_paths.h"
37 #include "chromeos/chromeos_switches.h"
39 #include "chrome/browser/policy/cloud/user_cloud_policy_manager.h"
40 #include "chrome/browser/policy/cloud/user_cloud_policy_manager_factory.h"
41 #include "chrome/browser/signin/signin_manager.h"
42 #include "chrome/browser/signin/signin_manager_factory.h"
45 using testing::InvokeWithoutArgs;
47 using testing::Return;
50 namespace em = enterprise_management;
54 const char kDMToken[] = "dmtoken";
55 const char kDeviceID[] = "deviceid";
57 const char kTestExtension[] = "kjmkgkdkpedkejedfhmfcenooemhbpbo";
59 const base::FilePath::CharType kTestExtensionPath[] =
60 FILE_PATH_LITERAL("extensions/managed_extension");
62 const char kTestPolicy[] =
65 " \"Value\": \"disable_all_the_things\""
69 #if defined(OS_CHROMEOS)
70 const char kTestExtension2[] = "behllobkkfkfnphdnhnkndlbkcpglgmj";
71 const base::FilePath::CharType kTestExtension2Path[] =
72 FILE_PATH_LITERAL("extensions/managed_extension2");
74 const char kTestPolicyJSON[] = "{\"Name\":\"disable_all_the_things\"}";
76 const char kTestPolicy2[] =
79 " \"Value\": \"turn_it_off\""
83 const char kTestPolicy2JSON[] = "{\"Another\":\"turn_it_off\"}";
84 #endif // defined(OS_CHROMEOS)
86 class ComponentCloudPolicyTest : public ExtensionBrowserTest {
88 ComponentCloudPolicyTest() {}
89 virtual ~ComponentCloudPolicyTest() {}
91 virtual void SetUpCommandLine(CommandLine* command_line) OVERRIDE {
92 ExtensionBrowserTest::SetUpCommandLine(command_line);
93 #if defined(OS_CHROMEOS)
94 // ExtensionBrowserTest sets the login users to a non-managed value;
95 // replace it. This is the default username sent in policy blobs from the
97 command_line->AppendSwitchASCII(
98 chromeos::switches::kLoginUser, "user@example.com");
102 virtual void SetUpInProcessBrowserTestFixture() OVERRIDE {
103 test_server_.RegisterClient(kDMToken, kDeviceID);
104 EXPECT_TRUE(test_server_.UpdatePolicyData(
105 dm_protocol::kChromeExtensionPolicyType, kTestExtension, kTestPolicy));
106 ASSERT_TRUE(test_server_.Start());
108 std::string url = test_server_.GetServiceURL().spec();
109 CommandLine* command_line = CommandLine::ForCurrentProcess();
110 command_line->AppendSwitchASCII(switches::kDeviceManagementUrl, url);
111 command_line->AppendSwitch(switches::kEnableComponentCloudPolicy);
113 ExtensionBrowserTest::SetUpInProcessBrowserTestFixture();
116 virtual void SetUpOnMainThread() OVERRIDE {
117 ASSERT_TRUE(PolicyServiceIsEmpty(g_browser_process->policy_service()))
118 << "Pre-existing policies in this machine will make this test fail.";
120 // Install the initial extension.
121 ExtensionTestMessageListener ready_listener("ready", true);
122 event_listener_.reset(new ExtensionTestMessageListener("event", true));
123 extension_ = LoadExtension(kTestExtensionPath);
124 ASSERT_TRUE(extension_.get());
125 ASSERT_EQ(kTestExtension, extension_->id());
126 EXPECT_TRUE(ready_listener.WaitUntilSatisfied());
128 BrowserPolicyConnector* connector =
129 g_browser_process->browser_policy_connector();
130 connector->ScheduleServiceInitialization(0);
132 #if defined(OS_CHROMEOS)
133 UserCloudPolicyManagerChromeOS* policy_manager =
134 UserCloudPolicyManagerFactoryChromeOS::GetForProfile(
135 browser()->profile());
136 ASSERT_TRUE(policy_manager);
138 // Mock a signed-in user. This is used by the UserCloudPolicyStore to pass
139 // the username to the UserCloudPolicyValidator.
140 SigninManager* signin_manager =
141 SigninManagerFactory::GetForProfile(browser()->profile());
142 ASSERT_TRUE(signin_manager);
143 signin_manager->SetAuthenticatedUsername("user@example.com");
145 UserCloudPolicyManager* policy_manager =
146 UserCloudPolicyManagerFactory::GetForProfile(browser()->profile());
147 ASSERT_TRUE(policy_manager);
148 policy_manager->Connect(g_browser_process->local_state(),
149 g_browser_process->system_request_context(),
150 UserCloudPolicyManager::CreateCloudPolicyClient(
151 connector->device_management_service()).Pass());
152 #endif // defined(OS_CHROMEOS)
154 // Register the cloud policy client.
155 ASSERT_TRUE(policy_manager->core()->client());
156 base::RunLoop run_loop;
157 MockCloudPolicyClientObserver observer;
158 EXPECT_CALL(observer, OnRegistrationStateChanged(_))
159 .WillOnce(InvokeWithoutArgs(&run_loop, &base::RunLoop::Quit));
160 policy_manager->core()->client()->AddObserver(&observer);
161 policy_manager->core()->client()->SetupRegistration(kDMToken, kDeviceID);
163 Mock::VerifyAndClearExpectations(&observer);
164 policy_manager->core()->client()->RemoveObserver(&observer);
166 // The extension will receive an update event.
167 EXPECT_TRUE(event_listener_->WaitUntilSatisfied());
169 ExtensionBrowserTest::SetUpOnMainThread();
172 scoped_refptr<const extensions::Extension> LoadExtension(
173 const base::FilePath::CharType* path) {
174 base::FilePath full_path;
175 if (!PathService::Get(chrome::DIR_TEST_DATA, &full_path)) {
179 scoped_refptr<const extensions::Extension> extension(
180 ExtensionBrowserTest::LoadExtension(full_path.Append(path)));
181 if (!extension.get()) {
188 void RefreshPolicies() {
189 ProfilePolicyConnector* profile_connector =
190 ProfilePolicyConnectorFactory::GetForProfile(browser()->profile());
191 PolicyService* policy_service = profile_connector->policy_service();
192 base::RunLoop run_loop;
193 policy_service->RefreshPolicies(run_loop.QuitClosure());
197 LocalPolicyTestServer test_server_;
198 scoped_refptr<const extensions::Extension> extension_;
199 scoped_ptr<ExtensionTestMessageListener> event_listener_;
202 // TODO(joaodasilva): enable these for other platforms once ready.
203 #if defined(OS_CHROMEOS)
205 IN_PROC_BROWSER_TEST_F(ComponentCloudPolicyTest, FetchExtensionPolicy) {
206 // Read the initial policy.
207 ExtensionTestMessageListener policy_listener(kTestPolicyJSON, true);
208 event_listener_->Reply("get-policy-Name");
209 EXPECT_TRUE(policy_listener.WaitUntilSatisfied());
212 IN_PROC_BROWSER_TEST_F(ComponentCloudPolicyTest, UpdateExtensionPolicy) {
213 // Read the initial policy.
214 ExtensionTestMessageListener policy_listener(kTestPolicyJSON, true);
215 event_listener_->Reply("get-policy-Name");
216 EXPECT_TRUE(policy_listener.WaitUntilSatisfied());
218 // Update the policy at the server and reload policy.
219 event_listener_.reset(new ExtensionTestMessageListener("event", true));
220 policy_listener.Reply("idle");
221 EXPECT_TRUE(test_server_.UpdatePolicyData(
222 dm_protocol::kChromeExtensionPolicyType, kTestExtension, kTestPolicy2));
225 // Check that the update event was received, and verify the new policy
227 EXPECT_TRUE(event_listener_->WaitUntilSatisfied());
229 // This policy was removed.
230 ExtensionTestMessageListener policy_listener1("{}", true);
231 event_listener_->Reply("get-policy-Name");
232 EXPECT_TRUE(policy_listener1.WaitUntilSatisfied());
234 ExtensionTestMessageListener policy_listener2(kTestPolicy2JSON, true);
235 policy_listener1.Reply("get-policy-Another");
236 EXPECT_TRUE(policy_listener2.WaitUntilSatisfied());
239 IN_PROC_BROWSER_TEST_F(ComponentCloudPolicyTest, InstallNewExtension) {
240 EXPECT_TRUE(test_server_.UpdatePolicyData(
241 dm_protocol::kChromeExtensionPolicyType, kTestExtension2, kTestPolicy2));
243 ExtensionTestMessageListener result_listener("ok", true);
244 result_listener.AlsoListenForFailureMessage("fail");
245 scoped_refptr<const extensions::Extension> extension2 =
246 LoadExtension(kTestExtension2Path);
247 ASSERT_TRUE(extension2.get());
248 ASSERT_EQ(kTestExtension2, extension2->id());
250 // This extension only sends the 'policy' signal once it receives the policy,
251 // and after verifying it has the expected value. Otherwise it sends 'fail'.
252 EXPECT_TRUE(result_listener.WaitUntilSatisfied());
255 #endif // OS_CHROMEOS
257 } // namespace policy