// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "base/callback.h" #include "base/command_line.h" #include "base/file_util.h" #include "base/files/file_path.h" #include "base/files/scoped_temp_dir.h" #include "base/memory/scoped_ptr.h" #include "base/path_service.h" #include "base/prefs/pref_service.h" #include "base/run_loop.h" #include "base/strings/stringprintf.h" #include "base/time/time.h" #include "chrome/browser/browser_process.h" #include "chrome/browser/chrome_notification_types.h" #include "chrome/browser/invalidation/fake_invalidation_service.h" #include "chrome/browser/invalidation/invalidation_service_factory.h" #include "chrome/browser/policy/profile_policy_connector.h" #include "chrome/browser/policy/profile_policy_connector_factory.h" #include "chrome/browser/policy/test/local_policy_test_server.h" #include "chrome/browser/profiles/profile.h" #include "chrome/browser/ui/browser.h" #include "chrome/test/base/in_process_browser_test.h" #include "components/policy/core/browser/browser_policy_connector.h" #include "components/policy/core/common/cloud/cloud_policy_client.h" #include "components/policy/core/common/cloud/cloud_policy_constants.h" #include "components/policy/core/common/cloud/mock_cloud_policy_client.h" #include "components/policy/core/common/external_data_fetcher.h" #include "components/policy/core/common/policy_map.h" #include "components/policy/core/common/policy_service.h" #include "components/policy/core/common/policy_switches.h" #include "components/policy/core/common/policy_test_utils.h" #include "content/public/browser/notification_service.h" #include "content/public/browser/notification_source.h" #include "content/public/test/test_utils.h" #include "net/url_request/url_request_context_getter.h" #include "policy/policy_constants.h" #include "policy/proto/chrome_settings.pb.h" #include "policy/proto/cloud_policy.pb.h" #include "sync/internal_api/public/base/invalidation.h" #include "testing/gmock/include/gmock/gmock.h" #include "testing/gtest/include/gtest/gtest.h" #include "url/gurl.h" #if defined(OS_CHROMEOS) #include "chrome/browser/chromeos/login/users/user_manager.h" #include "chrome/browser/chromeos/policy/user_cloud_policy_manager_chromeos.h" #include "chrome/browser/chromeos/policy/user_cloud_policy_manager_factory_chromeos.h" #include "chromeos/chromeos_paths.h" #include "chromeos/dbus/cryptohome_client.h" #else #include "chrome/browser/policy/cloud/user_cloud_policy_manager_factory.h" #include "chrome/browser/signin/signin_manager_factory.h" #include "components/policy/core/common/cloud/user_cloud_policy_manager.h" #include "components/signin/core/browser/signin_manager.h" #endif using testing::AnyNumber; using testing::InvokeWithoutArgs; using testing::Mock; using testing::Return; using testing::_; namespace em = enterprise_management; namespace policy { namespace { const char* GetTestUser() { #if defined(OS_CHROMEOS) return chromeos::UserManager::kStubUser; #else return "user@example.com"; #endif } std::string GetEmptyPolicy() { const char kEmptyPolicy[] = "{" " \"%s\": {" " \"mandatory\": {}," " \"recommended\": {}" " }," " \"managed_users\": [ \"*\" ]," " \"policy_user\": \"%s\"," " \"current_key_index\": 0" "}"; return base::StringPrintf( kEmptyPolicy, dm_protocol::kChromeUserPolicyType, GetTestUser()); } std::string GetTestPolicy(const char* homepage, int key_version) { const char kTestPolicy[] = "{" " \"%s\": {" " \"mandatory\": {" " \"ShowHomeButton\": true," " \"RestoreOnStartup\": 4," " \"URLBlacklist\": [ \"dev.chromium.org\", \"youtube.com\" ]," " \"MaxInvalidationFetchDelay\": 1000" " }," " \"recommended\": {" " \"HomepageLocation\": \"%s\"" " }" " }," " \"managed_users\": [ \"*\" ]," " \"policy_user\": \"%s\"," " \"current_key_index\": %d," " \"invalidation_source\": 16," " \"invalidation_name\": \"test_policy\"" "}"; return base::StringPrintf(kTestPolicy, dm_protocol::kChromeUserPolicyType, homepage, GetTestUser(), key_version); } void GetExpectedDefaultPolicy(PolicyMap* policy_map) { #if defined(OS_CHROMEOS) policy_map->Set( key::kChromeOsMultiProfileUserBehavior, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, base::Value::CreateStringValue("primary-only"), NULL); #endif } void GetExpectedTestPolicy(PolicyMap* expected, const char* homepage) { expected->Set(key::kShowHomeButton, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, base::Value::CreateBooleanValue(true), NULL); expected->Set(key::kRestoreOnStartup, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, base::Value::CreateIntegerValue(4), NULL); base::ListValue list; list.AppendString("dev.chromium.org"); list.AppendString("youtube.com"); expected->Set( key::kURLBlacklist, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, list.DeepCopy(), NULL); expected->Set( key::kMaxInvalidationFetchDelay, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, base::Value::CreateIntegerValue(1000), NULL); expected->Set( key::kHomepageLocation, POLICY_LEVEL_RECOMMENDED, POLICY_SCOPE_USER, base::Value::CreateStringValue(homepage), NULL); #if defined(OS_CHROMEOS) expected->Set( key::kChromeOsMultiProfileUserBehavior, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, base::Value::CreateStringValue("primary-only"), NULL); #endif } } // namespace // Tests the cloud policy stack(s). class CloudPolicyTest : public InProcessBrowserTest, public PolicyService::Observer { protected: CloudPolicyTest() {} virtual ~CloudPolicyTest() {} virtual void SetUpInProcessBrowserTestFixture() OVERRIDE { ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); ASSERT_NO_FATAL_FAILURE(SetServerPolicy(GetEmptyPolicy())); test_server_.reset(new LocalPolicyTestServer(policy_file_path())); ASSERT_TRUE(test_server_->Start()); std::string url = test_server_->GetServiceURL().spec(); CommandLine* command_line = CommandLine::ForCurrentProcess(); command_line->AppendSwitchASCII(switches::kDeviceManagementUrl, url); invalidation::InvalidationServiceFactory::GetInstance()-> RegisterTestingFactory(invalidation::FakeInvalidationService::Build); } virtual void SetUpOnMainThread() OVERRIDE { ASSERT_TRUE(PolicyServiceIsEmpty(g_browser_process->policy_service())) << "Pre-existing policies in this machine will make this test fail."; BrowserPolicyConnector* connector = g_browser_process->browser_policy_connector(); connector->ScheduleServiceInitialization(0); #if defined(OS_CHROMEOS) UserCloudPolicyManagerChromeOS* policy_manager = UserCloudPolicyManagerFactoryChromeOS::GetForProfile( browser()->profile()); ASSERT_TRUE(policy_manager); #else // Mock a signed-in user. This is used by the UserCloudPolicyStore to pass // the username to the UserCloudPolicyValidator. SigninManager* signin_manager = SigninManagerFactory::GetForProfile(browser()->profile()); ASSERT_TRUE(signin_manager); signin_manager->SetAuthenticatedUsername(GetTestUser()); UserCloudPolicyManager* policy_manager = UserCloudPolicyManagerFactory::GetForBrowserContext( browser()->profile()); ASSERT_TRUE(policy_manager); policy_manager->Connect( g_browser_process->local_state(), g_browser_process->system_request_context(), UserCloudPolicyManager::CreateCloudPolicyClient( connector->device_management_service(), g_browser_process->system_request_context()).Pass()); #endif // defined(OS_CHROMEOS) ASSERT_TRUE(policy_manager->core()->client()); base::RunLoop run_loop; MockCloudPolicyClientObserver observer; EXPECT_CALL(observer, OnRegistrationStateChanged(_)).WillOnce( InvokeWithoutArgs(&run_loop, &base::RunLoop::Quit)); policy_manager->core()->client()->AddObserver(&observer); // Give a bogus OAuth token to the |policy_manager|. This should make its // CloudPolicyClient fetch the DMToken. ASSERT_FALSE(policy_manager->core()->client()->is_registered()); em::DeviceRegisterRequest::Type registration_type = #if defined(OS_CHROMEOS) em::DeviceRegisterRequest::USER; #else em::DeviceRegisterRequest::BROWSER; #endif policy_manager->core()->client()->Register( registration_type, "bogus", std::string(), false, std::string(), std::string()); run_loop.Run(); Mock::VerifyAndClearExpectations(&observer); policy_manager->core()->client()->RemoveObserver(&observer); EXPECT_TRUE(policy_manager->core()->client()->is_registered()); #if defined(OS_CHROMEOS) // Get the path to the user policy key file. base::FilePath user_policy_key_dir; ASSERT_TRUE( PathService::Get(chromeos::DIR_USER_POLICY_KEYS, &user_policy_key_dir)); std::string sanitized_username = chromeos::CryptohomeClient::GetStubSanitizedUsername(GetTestUser()); user_policy_key_file_ = user_policy_key_dir.AppendASCII(sanitized_username) .AppendASCII("policy.pub"); #endif } PolicyService* GetPolicyService() { ProfilePolicyConnector* profile_connector = ProfilePolicyConnectorFactory::GetForProfile(browser()->profile()); return profile_connector->policy_service(); } invalidation::FakeInvalidationService* GetInvalidationService() { return static_cast<invalidation::FakeInvalidationService*>( invalidation::InvalidationServiceFactory::GetForProfile( browser()->profile())); } void SetServerPolicy(const std::string& policy) { int result = base::WriteFile(policy_file_path(), policy.data(), policy.size()); ASSERT_EQ(static_cast<int>(policy.size()), result); } base::FilePath policy_file_path() const { return temp_dir_.path().AppendASCII("policy.json"); } virtual void OnPolicyUpdated(const PolicyNamespace& ns, const PolicyMap& previous, const PolicyMap& current) OVERRIDE { if (!on_policy_updated_.is_null()) { on_policy_updated_.Run(); on_policy_updated_.Reset(); } } virtual void OnPolicyServiceInitialized(PolicyDomain domain) OVERRIDE {} base::ScopedTempDir temp_dir_; scoped_ptr<LocalPolicyTestServer> test_server_; base::FilePath user_policy_key_file_; base::Closure on_policy_updated_; }; IN_PROC_BROWSER_TEST_F(CloudPolicyTest, FetchPolicy) { PolicyService* policy_service = GetPolicyService(); { base::RunLoop run_loop; // This does the initial fetch and stores the initial key. policy_service->RefreshPolicies(run_loop.QuitClosure()); run_loop.Run(); } PolicyMap default_policy; GetExpectedDefaultPolicy(&default_policy); EXPECT_TRUE(default_policy.Equals(policy_service->GetPolicies( PolicyNamespace(POLICY_DOMAIN_CHROME, std::string())))); ASSERT_NO_FATAL_FAILURE(SetServerPolicy(GetTestPolicy("google.com", 0))); PolicyMap expected; GetExpectedTestPolicy(&expected, "google.com"); { base::RunLoop run_loop; // This fetches the new policies, using the same key. policy_service->RefreshPolicies(run_loop.QuitClosure()); run_loop.Run(); } EXPECT_TRUE(expected.Equals(policy_service->GetPolicies( PolicyNamespace(POLICY_DOMAIN_CHROME, std::string())))); } IN_PROC_BROWSER_TEST_F(CloudPolicyTest, InvalidatePolicy) { PolicyService* policy_service = GetPolicyService(); policy_service->AddObserver(POLICY_DOMAIN_CHROME, this); // Perform the initial fetch. ASSERT_NO_FATAL_FAILURE(SetServerPolicy(GetTestPolicy("google.com", 0))); { base::RunLoop run_loop; policy_service->RefreshPolicies(run_loop.QuitClosure()); run_loop.Run(); } // Update the homepage in the policy and trigger an invalidation. ASSERT_NO_FATAL_FAILURE(SetServerPolicy(GetTestPolicy("youtube.com", 0))); base::TimeDelta now = base::Time::NowFromSystemTime() - base::Time::UnixEpoch(); GetInvalidationService()->EmitInvalidationForTest( syncer::Invalidation::Init( invalidation::ObjectId(16, "test_policy"), now.InMicroseconds() /* version */, "payload")); { base::RunLoop run_loop; on_policy_updated_ = run_loop.QuitClosure(); run_loop.Run(); } // Check that the updated policy was fetched. PolicyMap expected; GetExpectedTestPolicy(&expected, "youtube.com"); EXPECT_TRUE(expected.Equals(policy_service->GetPolicies( PolicyNamespace(POLICY_DOMAIN_CHROME, std::string())))); policy_service->RemoveObserver(POLICY_DOMAIN_CHROME, this); } #if defined(OS_CHROMEOS) IN_PROC_BROWSER_TEST_F(CloudPolicyTest, FetchPolicyWithRotatedKey) { PolicyService* policy_service = GetPolicyService(); { base::RunLoop run_loop; // This does the initial fetch and stores the initial key. policy_service->RefreshPolicies(run_loop.QuitClosure()); run_loop.Run(); } // Read the initial key. std::string initial_key; ASSERT_TRUE(base::ReadFileToString(user_policy_key_file_, &initial_key)); PolicyMap default_policy; GetExpectedDefaultPolicy(&default_policy); EXPECT_TRUE(default_policy.Equals(policy_service->GetPolicies( PolicyNamespace(POLICY_DOMAIN_CHROME, std::string())))); // Set the new policies and a new key at the server. ASSERT_NO_FATAL_FAILURE(SetServerPolicy(GetTestPolicy("google.com", 1))); PolicyMap expected; GetExpectedTestPolicy(&expected, "google.com"); { base::RunLoop run_loop; // This fetches the new policies and does a key rotation. policy_service->RefreshPolicies(run_loop.QuitClosure()); run_loop.Run(); } EXPECT_TRUE(expected.Equals(policy_service->GetPolicies( PolicyNamespace(POLICY_DOMAIN_CHROME, std::string())))); // Verify that the key was rotated. std::string rotated_key; ASSERT_TRUE(base::ReadFileToString(user_policy_key_file_, &rotated_key)); EXPECT_NE(rotated_key, initial_key); // Another refresh using the same key won't rotate it again. { base::RunLoop run_loop; policy_service->RefreshPolicies(run_loop.QuitClosure()); run_loop.Run(); } EXPECT_TRUE(expected.Equals(policy_service->GetPolicies( PolicyNamespace(POLICY_DOMAIN_CHROME, std::string())))); std::string current_key; ASSERT_TRUE(base::ReadFileToString(user_policy_key_file_, ¤t_key)); EXPECT_EQ(rotated_key, current_key); } #endif TEST(CloudPolicyProtoTest, VerifyProtobufEquivalence) { // There are 2 protobufs that can be used for user cloud policy: // cloud_policy.proto and chrome_settings.proto. chrome_settings.proto is the // version used by the server, but generates one proto message per policy; to // save binary size on the client, the other version shares proto messages for // policies of the same type. They generate the same bytes on the wire though, // so they are compatible. This test verifies that that stays true. // Build a ChromeSettingsProto message with one policy of each supported type. em::ChromeSettingsProto chrome_settings; chrome_settings.mutable_homepagelocation()->set_homepagelocation( "chromium.org"); chrome_settings.mutable_showhomebutton()->set_showhomebutton(true); chrome_settings.mutable_restoreonstartup()->set_restoreonstartup(4); em::StringList* list = chrome_settings.mutable_disabledschemes()->mutable_disabledschemes(); list->add_entries("ftp"); list->add_entries("mailto"); // Try explicitly setting a policy mode too. chrome_settings.mutable_disablespdy()->set_disablespdy(false); chrome_settings.mutable_disablespdy()->mutable_policy_options()->set_mode( em::PolicyOptions::MANDATORY); chrome_settings.mutable_syncdisabled()->set_syncdisabled(true); chrome_settings.mutable_syncdisabled()->mutable_policy_options()->set_mode( em::PolicyOptions::RECOMMENDED); // Build an equivalent CloudPolicySettings message. em::CloudPolicySettings cloud_policy; cloud_policy.mutable_homepagelocation()->set_value("chromium.org"); cloud_policy.mutable_showhomebutton()->set_value(true); cloud_policy.mutable_restoreonstartup()->set_value(4); list = cloud_policy.mutable_disabledschemes()->mutable_value(); list->add_entries("ftp"); list->add_entries("mailto"); cloud_policy.mutable_disablespdy()->set_value(false); cloud_policy.mutable_disablespdy()->mutable_policy_options()->set_mode( em::PolicyOptions::MANDATORY); cloud_policy.mutable_syncdisabled()->set_value(true); cloud_policy.mutable_syncdisabled()->mutable_policy_options()->set_mode( em::PolicyOptions::RECOMMENDED); // They should now serialize to the same bytes. std::string chrome_settings_serialized; std::string cloud_policy_serialized; ASSERT_TRUE(chrome_settings.SerializeToString(&chrome_settings_serialized)); ASSERT_TRUE(cloud_policy.SerializeToString(&cloud_policy_serialized)); EXPECT_EQ(chrome_settings_serialized, cloud_policy_serialized); } } // namespace policy