blob: cc1fc28b66cf7888475cfb57ed87fd1188ed4002 [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/supervised_user/supervised_user_service.h"
#include <stddef.h>
#include <memory>
#include <utility>
#include "base/macros.h"
#include "base/memory/ptr_util.h"
#include "base/path_service.h"
#include "base/run_loop.h"
#include "base/strings/utf_string_conversions.h"
#include "base/test/scoped_feature_list.h"
#include "base/threading/thread_task_runner_handle.h"
#include "base/values.h"
#include "build/build_config.h"
#include "chrome/browser/chrome_notification_types.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/signin/fake_profile_oauth2_token_service_builder.h"
#include "chrome/browser/signin/profile_oauth2_token_service_factory.h"
#include "chrome/browser/signin/signin_manager_factory.h"
#include "chrome/browser/supervised_user/legacy/custodian_profile_downloader_service.h"
#include "chrome/browser/supervised_user/legacy/custodian_profile_downloader_service_factory.h"
#include "chrome/browser/supervised_user/permission_request_creator.h"
#include "chrome/browser/supervised_user/supervised_user_features.h"
#include "chrome/browser/supervised_user/supervised_user_service_factory.h"
#include "chrome/browser/supervised_user/supervised_user_whitelist_service.h"
#include "chrome/browser/ui/browser_list.h"
#include "chrome/common/chrome_paths.h"
#include "chrome/common/pref_names.h"
#include "chrome/test/base/testing_profile.h"
#include "components/prefs/pref_service.h"
#include "components/prefs/scoped_user_pref_update.h"
#include "components/signin/core/browser/fake_profile_oauth2_token_service.h"
#include "components/signin/core/browser/signin_manager.h"
#include "components/version_info/version_info.h"
#include "content/public/test/test_browser_thread_bundle.h"
#include "content/public/test/test_utils.h"
#include "extensions/buildflags/buildflags.h"
#include "testing/gtest/include/gtest/gtest.h"
#if BUILDFLAG(ENABLE_EXTENSIONS)
#include "chrome/browser/extensions/extension_service.h"
#include "chrome/browser/extensions/extension_service_test_base.h"
#include "chrome/browser/extensions/extension_util.h"
#include "chrome/browser/extensions/unpacked_installer.h"
#include "extensions/common/extension.h"
#include "extensions/common/extension_builder.h"
#include "extensions/common/features/feature_channel.h"
#include "extensions/common/manifest_constants.h"
using extensions::Extension;
#endif
using content::MessageLoopRunner;
namespace {
#if !defined(OS_ANDROID)
void OnProfileDownloadedFail(const base::string16& full_name) {
ASSERT_TRUE(false) << "Profile download should not have succeeded.";
}
#endif
// Base class for helper objects that wait for certain events to happen.
// This class will ensure that calls to QuitRunLoop() (triggered by a subclass)
// are balanced with Wait() calls.
class AsyncTestHelper {
public:
void Wait() {
run_loop_->Run();
Reset();
}
protected:
AsyncTestHelper() {
// |quit_called_| will be initialized in Reset().
Reset();
}
~AsyncTestHelper() {
EXPECT_FALSE(quit_called_);
}
void QuitRunLoop() {
// QuitRunLoop() can not be called more than once between calls to Wait().
ASSERT_FALSE(quit_called_);
quit_called_ = true;
run_loop_->Quit();
}
private:
void Reset() {
quit_called_ = false;
run_loop_.reset(new base::RunLoop);
}
std::unique_ptr<base::RunLoop> run_loop_;
bool quit_called_;
DISALLOW_COPY_AND_ASSIGN(AsyncTestHelper);
};
class SupervisedUserURLFilterObserver
: public AsyncTestHelper,
public SupervisedUserURLFilter::Observer {
public:
SupervisedUserURLFilterObserver() : scoped_observer_(this) {}
~SupervisedUserURLFilterObserver() {}
void Init(SupervisedUserURLFilter* url_filter) {
scoped_observer_.Add(url_filter);
}
// SupervisedUserURLFilter::Observer
void OnSiteListUpdated() override {
QuitRunLoop();
}
private:
ScopedObserver<SupervisedUserURLFilter, SupervisedUserURLFilter::Observer>
scoped_observer_;
DISALLOW_COPY_AND_ASSIGN(SupervisedUserURLFilterObserver);
};
class SiteListObserver : public AsyncTestHelper {
public:
SiteListObserver() {}
~SiteListObserver() {}
void Init(SupervisedUserWhitelistService* service) {
service->AddSiteListsChangedCallback(base::Bind(
&SiteListObserver::OnSiteListsChanged, base::Unretained(this)));
// The initial call to AddSiteListsChangedCallback will call
// OnSiteListsChanged(), so we balance it out by calling Wait().
Wait();
}
const std::vector<scoped_refptr<SupervisedUserSiteList>>& site_lists() {
return site_lists_;
}
private:
void OnSiteListsChanged(
const std::vector<scoped_refptr<SupervisedUserSiteList>>& site_lists) {
site_lists_ = site_lists;
QuitRunLoop();
}
std::vector<scoped_refptr<SupervisedUserSiteList>> site_lists_;
DISALLOW_COPY_AND_ASSIGN(SiteListObserver);
};
class AsyncResultHolder {
public:
AsyncResultHolder() : result_(false) {}
~AsyncResultHolder() {}
void SetResult(bool result) {
result_ = result;
run_loop_.Quit();
}
bool GetResult() {
run_loop_.Run();
return result_;
}
private:
base::RunLoop run_loop_;
bool result_;
DISALLOW_COPY_AND_ASSIGN(AsyncResultHolder);
};
class SupervisedUserServiceTest : public ::testing::Test {
public:
SupervisedUserServiceTest() {}
void SetUp() override {
TestingProfile::Builder builder;
builder.AddTestingFactory(ProfileOAuth2TokenServiceFactory::GetInstance(),
BuildFakeProfileOAuth2TokenService);
profile_ = builder.Build();
supervised_user_service_ =
SupervisedUserServiceFactory::GetForProfile(profile_.get());
}
void TearDown() override { profile_.reset(); }
~SupervisedUserServiceTest() override {}
protected:
void AddURLAccessRequest(const GURL& url, AsyncResultHolder* result_holder) {
supervised_user_service_->AddURLAccessRequest(
url, base::Bind(&AsyncResultHolder::SetResult,
base::Unretained(result_holder)));
}
content::TestBrowserThreadBundle thread_bundle_;
std::unique_ptr<TestingProfile> profile_;
SupervisedUserService* supervised_user_service_;
};
} // namespace
TEST_F(SupervisedUserServiceTest, ChangesIncludedSessionOnChangedSettings) {
supervised_user_service_->Init();
EXPECT_TRUE(supervised_user_service_->IncludesSyncSessionsType());
profile_->GetPrefs()->SetBoolean(prefs::kForceSessionSync, false);
EXPECT_FALSE(supervised_user_service_->IncludesSyncSessionsType());
}
#if !defined(OS_ANDROID)
// Ensure that the CustodianProfileDownloaderService shuts down cleanly. If no
// DCHECK is hit when the service is destroyed, this test passed.
TEST_F(SupervisedUserServiceTest, ShutDownCustodianProfileDownloader) {
CustodianProfileDownloaderService* downloader_service =
CustodianProfileDownloaderServiceFactory::GetForProfile(profile_.get());
// Emulate being logged in, then start to download a profile so a
// ProfileDownloader gets created.
SigninManagerFactory::GetForProfile(profile_.get())->
SetAuthenticatedAccountInfo("12345", "Logged In");
downloader_service->DownloadProfile(base::Bind(&OnProfileDownloadedFail));
}
#endif
namespace {
class MockPermissionRequestCreator : public PermissionRequestCreator {
public:
MockPermissionRequestCreator() : enabled_(false) {}
~MockPermissionRequestCreator() override {}
void set_enabled(bool enabled) {
enabled_ = enabled;
}
const std::vector<GURL>& requested_urls() const {
return requested_urls_;
}
void AnswerRequest(size_t index, bool result) {
ASSERT_LT(index, requested_urls_.size());
std::move(callbacks_[index]).Run(result);
callbacks_.erase(callbacks_.begin() + index);
requested_urls_.erase(requested_urls_.begin() + index);
}
private:
// PermissionRequestCreator:
bool IsEnabled() const override { return enabled_; }
void CreateURLAccessRequest(const GURL& url_requested,
SuccessCallback callback) override {
ASSERT_TRUE(enabled_);
requested_urls_.push_back(url_requested);
callbacks_.push_back(std::move(callback));
}
void CreateExtensionInstallRequest(const std::string& extension_id,
SuccessCallback callback) override {
FAIL();
}
void CreateExtensionUpdateRequest(const std::string& id,
SuccessCallback callback) override {
FAIL();
}
bool enabled_;
std::vector<GURL> requested_urls_;
std::vector<SuccessCallback> callbacks_;
DISALLOW_COPY_AND_ASSIGN(MockPermissionRequestCreator);
};
} // namespace
TEST_F(SupervisedUserServiceTest, CreatePermissionRequest) {
GURL url("http://www.example.com");
// Without any permission request creators, it should be disabled, and any
// AddURLAccessRequest() calls should fail.
EXPECT_FALSE(supervised_user_service_->AccessRequestsEnabled());
{
AsyncResultHolder result_holder;
AddURLAccessRequest(url, &result_holder);
EXPECT_FALSE(result_holder.GetResult());
}
// Add a disabled permission request creator. This should not change anything.
MockPermissionRequestCreator* creator = new MockPermissionRequestCreator;
supervised_user_service_->AddPermissionRequestCreator(
base::WrapUnique(creator));
EXPECT_FALSE(supervised_user_service_->AccessRequestsEnabled());
{
AsyncResultHolder result_holder;
AddURLAccessRequest(url, &result_holder);
EXPECT_FALSE(result_holder.GetResult());
}
// Enable the permission request creator. This should enable permission
// requests and queue them up.
creator->set_enabled(true);
EXPECT_TRUE(supervised_user_service_->AccessRequestsEnabled());
{
AsyncResultHolder result_holder;
AddURLAccessRequest(url, &result_holder);
ASSERT_EQ(1u, creator->requested_urls().size());
EXPECT_EQ(url.spec(), creator->requested_urls()[0].spec());
creator->AnswerRequest(0, true);
EXPECT_TRUE(result_holder.GetResult());
}
{
AsyncResultHolder result_holder;
AddURLAccessRequest(url, &result_holder);
ASSERT_EQ(1u, creator->requested_urls().size());
EXPECT_EQ(url.spec(), creator->requested_urls()[0].spec());
creator->AnswerRequest(0, false);
EXPECT_FALSE(result_holder.GetResult());
}
// Add a second permission request creator.
MockPermissionRequestCreator* creator_2 = new MockPermissionRequestCreator;
creator_2->set_enabled(true);
supervised_user_service_->AddPermissionRequestCreator(
base::WrapUnique(creator_2));
{
AsyncResultHolder result_holder;
AddURLAccessRequest(url, &result_holder);
ASSERT_EQ(1u, creator->requested_urls().size());
EXPECT_EQ(url.spec(), creator->requested_urls()[0].spec());
// Make the first creator succeed. This should make the whole thing succeed.
creator->AnswerRequest(0, true);
EXPECT_TRUE(result_holder.GetResult());
}
{
AsyncResultHolder result_holder;
AddURLAccessRequest(url, &result_holder);
ASSERT_EQ(1u, creator->requested_urls().size());
EXPECT_EQ(url.spec(), creator->requested_urls()[0].spec());
// Make the first creator fail. This should fall back to the second one.
creator->AnswerRequest(0, false);
ASSERT_EQ(1u, creator_2->requested_urls().size());
EXPECT_EQ(url.spec(), creator_2->requested_urls()[0].spec());
// Make the second creator succeed, which will make the whole thing succeed.
creator_2->AnswerRequest(0, true);
EXPECT_TRUE(result_holder.GetResult());
}
}
#if BUILDFLAG(ENABLE_EXTENSIONS)
class SupervisedUserServiceExtensionTestBase
: public extensions::ExtensionServiceTestBase {
public:
explicit SupervisedUserServiceExtensionTestBase(bool is_supervised)
: is_supervised_(is_supervised),
channel_(version_info::Channel::DEV) {}
~SupervisedUserServiceExtensionTestBase() override {}
void SetUp() override {
ExtensionServiceTestBase::SetUp();
ExtensionServiceTestBase::ExtensionServiceInitParams params =
CreateDefaultInitParams();
params.profile_is_supervised = is_supervised_;
InitializeExtensionService(params);
SupervisedUserService* service =
SupervisedUserServiceFactory::GetForProfile(profile_.get());
service->Init();
site_list_observer_.Init(service->GetWhitelistService());
SupervisedUserURLFilter* url_filter = service->GetURLFilter();
url_filter->SetBlockingTaskRunnerForTesting(
base::ThreadTaskRunnerHandle::Get());
url_filter_observer_.Init(url_filter);
// Wait for the initial update to finish.
url_filter_observer_.Wait();
}
void TearDown() override {
// Flush the message loop, to ensure all posted tasks run.
base::RunLoop().RunUntilIdle();
}
protected:
scoped_refptr<extensions::Extension> MakeThemeExtension() {
std::unique_ptr<base::DictionaryValue> source(new base::DictionaryValue());
source->SetString(extensions::manifest_keys::kName, "Theme");
source->Set(extensions::manifest_keys::kTheme,
std::make_unique<base::DictionaryValue>());
source->SetString(extensions::manifest_keys::kVersion, "1.0");
extensions::ExtensionBuilder builder;
scoped_refptr<extensions::Extension> extension =
builder.SetManifest(std::move(source)).Build();
return extension;
}
scoped_refptr<extensions::Extension> MakeExtension(bool by_custodian) {
scoped_refptr<extensions::Extension> extension =
extensions::ExtensionBuilder("Extension").Build();
extensions::util::SetWasInstalledByCustodian(extension->id(),
profile_.get(), by_custodian);
return extension;
}
bool is_supervised_;
extensions::ScopedCurrentChannel channel_;
SiteListObserver site_list_observer_;
SupervisedUserURLFilterObserver url_filter_observer_;
};
class SupervisedUserServiceExtensionTestUnsupervised
: public SupervisedUserServiceExtensionTestBase {
public:
SupervisedUserServiceExtensionTestUnsupervised()
: SupervisedUserServiceExtensionTestBase(false) {}
};
class SupervisedUserServiceExtensionTest
: public SupervisedUserServiceExtensionTestBase {
public:
SupervisedUserServiceExtensionTest()
: SupervisedUserServiceExtensionTestBase(true) {}
protected:
void InitSupervisedUserInitiatedExtensionInstallFeature(bool enabled) {
if (enabled) {
scoped_feature_list_.InitAndEnableFeature(
supervised_users::kSupervisedUserInitiatedExtensionInstall);
}
}
base::test::ScopedFeatureList scoped_feature_list_;
};
TEST_F(SupervisedUserServiceExtensionTest,
ExtensionManagementPolicyProviderWithoutSUInitiatedInstalls) {
SupervisedUserService* supervised_user_service =
SupervisedUserServiceFactory::GetForProfile(profile_.get());
ASSERT_TRUE(profile_->IsSupervised());
// Disable supervised user initiated installs.
InitSupervisedUserInitiatedExtensionInstallFeature(false);
// Check that a supervised user can install and uninstall a theme even if
// they are not allowed to install extensions.
{
scoped_refptr<extensions::Extension> theme = MakeThemeExtension();
base::string16 error_1;
EXPECT_TRUE(supervised_user_service->UserMayLoad(theme.get(), &error_1));
EXPECT_TRUE(error_1.empty());
base::string16 error_2;
EXPECT_FALSE(
supervised_user_service->MustRemainInstalled(theme.get(), &error_2));
EXPECT_TRUE(error_2.empty());
}
// Now check a different kind of extension; the supervised user should not be
// able to load it.
{
scoped_refptr<extensions::Extension> extension = MakeExtension(false);
base::string16 error;
EXPECT_FALSE(supervised_user_service->UserMayLoad(extension.get(), &error));
EXPECT_FALSE(error.empty());
}
{
// Check that a custodian-installed extension may be loaded, but not
// uninstalled.
scoped_refptr<extensions::Extension> extension = MakeExtension(true);
base::string16 error_1;
EXPECT_TRUE(
supervised_user_service->UserMayLoad(extension.get(), &error_1));
EXPECT_TRUE(error_1.empty());
base::string16 error_2;
EXPECT_TRUE(
supervised_user_service->MustRemainInstalled(extension.get(),
&error_2));
EXPECT_FALSE(error_2.empty());
}
#ifndef NDEBUG
EXPECT_FALSE(supervised_user_service->GetDebugPolicyProviderName().empty());
#endif
}
TEST_F(SupervisedUserServiceExtensionTest,
ExtensionManagementPolicyProviderWithSUInitiatedInstalls) {
SupervisedUserService* supervised_user_service =
SupervisedUserServiceFactory::GetForProfile(profile_.get());
ASSERT_TRUE(profile_->IsSupervised());
// Enable supervised user initiated installs.
InitSupervisedUserInitiatedExtensionInstallFeature(true);
// The supervised user should be able to load and uninstall the extensions
// they install.
{
scoped_refptr<extensions::Extension> extension = MakeExtension(false);
base::string16 error;
EXPECT_TRUE(supervised_user_service->UserMayLoad(extension.get(), &error));
EXPECT_TRUE(error.empty());
base::string16 error_2;
EXPECT_FALSE(supervised_user_service->MustRemainInstalled(extension.get(),
&error_2));
EXPECT_TRUE(error_2.empty());
base::string16 error_3;
extensions::disable_reason::DisableReason reason =
extensions::disable_reason::DISABLE_NONE;
EXPECT_TRUE(supervised_user_service->MustRemainDisabled(extension.get(),
&reason,
&error_3));
EXPECT_EQ(extensions::disable_reason::DISABLE_CUSTODIAN_APPROVAL_REQUIRED,
reason);
EXPECT_FALSE(error_3.empty());
base::string16 error_4;
EXPECT_TRUE(supervised_user_service->UserMayModifySettings(extension.get(),
&error_4));
EXPECT_TRUE(error_4.empty());
}
{
// A custodian-installed extension may be loaded, but not uninstalled.
scoped_refptr<extensions::Extension> extension = MakeExtension(true);
base::string16 error_1;
EXPECT_TRUE(
supervised_user_service->UserMayLoad(extension.get(), &error_1));
EXPECT_TRUE(error_1.empty());
base::string16 error_2;
EXPECT_TRUE(supervised_user_service->MustRemainInstalled(extension.get(),
&error_2));
EXPECT_FALSE(error_2.empty());
base::string16 error_3;
extensions::disable_reason::DisableReason reason =
extensions::disable_reason::DISABLE_NONE;
EXPECT_FALSE(supervised_user_service->MustRemainDisabled(extension.get(),
&reason,
&error_3));
EXPECT_EQ(extensions::disable_reason::DISABLE_NONE, reason);
EXPECT_TRUE(error_3.empty());
base::string16 error_4;
EXPECT_FALSE(supervised_user_service->UserMayModifySettings(extension.get(),
&error_4));
EXPECT_FALSE(error_4.empty());
}
#ifndef NDEBUG
EXPECT_FALSE(supervised_user_service->GetDebugPolicyProviderName().empty());
#endif
}
TEST_F(SupervisedUserServiceExtensionTest, NoContentPacks) {
SupervisedUserService* supervised_user_service =
SupervisedUserServiceFactory::GetForProfile(profile_.get());
SupervisedUserURLFilter* url_filter = supervised_user_service->GetURLFilter();
// ASSERT_EQ instead of ASSERT_TRUE([...].empty()) so that the error
// message contains the size in case of failure.
ASSERT_EQ(0u, site_list_observer_.site_lists().size());
GURL url("http://youtube.com");
EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
url_filter->GetFilteringBehaviorForURL(url));
}
TEST_F(SupervisedUserServiceExtensionTest, InstallContentPacks) {
SupervisedUserService* supervised_user_service =
SupervisedUserServiceFactory::GetForProfile(profile_.get());
SupervisedUserURLFilter* url_filter = supervised_user_service->GetURLFilter();
const std::string id1 = "ID 1";
const base::string16 title1 = base::ASCIIToUTF16("Title 1");
const std::string id2 = "ID 2";
const base::string16 title2 = base::ASCIIToUTF16("Title 2");
GURL youtube_url("http://www.youtube.com");
GURL moose_url("http://moose.org");
EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
url_filter->GetFilteringBehaviorForURL(youtube_url));
profile_->GetPrefs()->SetInteger(
prefs::kDefaultSupervisedUserFilteringBehavior,
SupervisedUserURLFilter::BLOCK);
EXPECT_EQ(SupervisedUserURLFilter::BLOCK,
url_filter->GetFilteringBehaviorForURL(youtube_url));
profile_->GetPrefs()->SetInteger(
prefs::kDefaultSupervisedUserFilteringBehavior,
SupervisedUserURLFilter::WARN);
EXPECT_EQ(SupervisedUserURLFilter::WARN,
url_filter->GetFilteringBehaviorForURL(youtube_url));
// Load a whitelist.
base::FilePath test_data_dir;
ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &test_data_dir));
SupervisedUserWhitelistService* whitelist_service =
supervised_user_service->GetWhitelistService();
base::FilePath whitelist_path =
test_data_dir.AppendASCII("whitelists/content_pack/site_list.json");
whitelist_service->LoadWhitelistForTesting(id1, title1, whitelist_path);
site_list_observer_.Wait();
ASSERT_EQ(1u, site_list_observer_.site_lists().size());
EXPECT_EQ(id1, site_list_observer_.site_lists()[0]->id());
EXPECT_EQ(title1, site_list_observer_.site_lists()[0]->title());
EXPECT_EQ(youtube_url, site_list_observer_.site_lists()[0]->entry_point());
url_filter_observer_.Wait();
EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
url_filter->GetFilteringBehaviorForURL(youtube_url));
EXPECT_EQ(SupervisedUserURLFilter::WARN,
url_filter->GetFilteringBehaviorForURL(moose_url));
// Load a second whitelist.
whitelist_path =
test_data_dir.AppendASCII("whitelists/content_pack_2/site_list.json");
whitelist_service->LoadWhitelistForTesting(id2, title2, whitelist_path);
site_list_observer_.Wait();
ASSERT_EQ(2u, site_list_observer_.site_lists().size());
EXPECT_EQ(id1, site_list_observer_.site_lists()[0]->id());
EXPECT_EQ(title1, site_list_observer_.site_lists()[0]->title());
EXPECT_EQ(youtube_url, site_list_observer_.site_lists()[0]->entry_point());
EXPECT_EQ(id2, site_list_observer_.site_lists()[1]->id());
EXPECT_EQ(title2, site_list_observer_.site_lists()[1]->title());
EXPECT_TRUE(site_list_observer_.site_lists()[1]->entry_point().is_empty());
url_filter_observer_.Wait();
EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
url_filter->GetFilteringBehaviorForURL(youtube_url));
EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
url_filter->GetFilteringBehaviorForURL(moose_url));
// Unload the first whitelist.
whitelist_service->UnloadWhitelist(id1);
site_list_observer_.Wait();
ASSERT_EQ(1u, site_list_observer_.site_lists().size());
EXPECT_EQ(id2, site_list_observer_.site_lists()[0]->id());
EXPECT_EQ(title2, site_list_observer_.site_lists()[0]->title());
EXPECT_TRUE(site_list_observer_.site_lists()[0]->entry_point().is_empty());
url_filter_observer_.Wait();
EXPECT_EQ(SupervisedUserURLFilter::WARN,
url_filter->GetFilteringBehaviorForURL(youtube_url));
EXPECT_EQ(SupervisedUserURLFilter::ALLOW,
url_filter->GetFilteringBehaviorForURL(moose_url));
}
#endif // BUILDFLAG(ENABLE_EXTENSIONS)