blob: ac643fd5591b6d0a1e29eb914067fe013230e5fe [file] [log] [blame]
// Copyright 2018 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/chrome_cleaner/test/test_util.h"
#include <stdint.h>
#include <windows.h>
#include <algorithm>
#include <iterator>
#include <set>
#include <utility>
#include "base/base_paths.h"
#include "base/command_line.h"
#include "base/files/file_path.h"
#include "base/files/file_util.h"
#include "base/logging.h"
#include "base/path_service.h"
#include "base/strings/string_util.h"
#include "base/strings/utf_string_conversions.h"
#include "chrome/chrome_cleaner/constants/chrome_cleaner_switches.h"
#include "chrome/chrome_cleaner/os/disk_util.h"
#include "chrome/chrome_cleaner/os/initializer.h"
#include "chrome/chrome_cleaner/os/post_reboot_registration.h"
#include "chrome/chrome_cleaner/os/pre_fetched_paths.h"
#include "chrome/chrome_cleaner/os/scoped_disable_wow64_redirection.h"
#include "chrome/chrome_cleaner/os/system_util_cleaner.h"
#include "chrome/chrome_cleaner/os/whitelisted_directory.h"
#include "chrome/chrome_cleaner/proto/shared_pup_enums.pb.h"
#include "chrome/chrome_cleaner/strings/string_util.h"
#include "chrome/chrome_cleaner/test/test_file_util.h"
#include "chrome/chrome_cleaner/test/test_strings.h"
#include "chrome/chrome_cleaner/test/test_uws_catalog.h"
#include "sandbox/win/src/sandbox_factory.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace chrome_cleaner {
bool SetupTestConfigs() {
return SetupTestConfigsWithCatalogs({&TestUwSCatalog::GetInstance()});
}
bool SetupTestConfigsWithCatalogs(const PUPData::UwSCatalogs& catalogs) {
if (!InitializeOSUtils())
return false;
PUPData::InitializePUPData(catalogs);
PreFetchedPaths::GetInstance()->DisableForTesting();
base::PathService::DisableCache();
WhitelistedDirectory::GetInstance()->DisableCache();
return true;
}
ScopedIsPostReboot::ScopedIsPostReboot() {
// This switch will be removed by scoped_command_line_'s destructor when it
// goes out of scope.
scoped_command_line_.GetProcessCommandLine()->AppendSwitch(kPostRebootSwitch);
}
bool RunOnceCommandLineContains(const base::string16& product_shortname,
const wchar_t* sub_string) {
DCHECK(sub_string);
PostRebootRegistration post_reboot(product_shortname);
base::string16 run_once_value = post_reboot.RunOnceOnRestartRegisteredValue();
return String16ContainsCaseInsensitive(run_once_value, sub_string);
}
bool RunOnceOverrideCommandLineContains(const std::string& cleanup_id,
const wchar_t* sub_string) {
DCHECK(sub_string);
base::string16 reg_value;
base::win::RegKey run_once_key(
HKEY_CURRENT_USER,
PostRebootRegistration::GetPostRebootSwitchKeyPath().c_str(), KEY_READ);
if (run_once_key.Valid()) {
// There is no need to check the return value, since ReadValue will leave
// |reg_value| empty on error.
run_once_key.ReadValue(base::UTF8ToUTF16(cleanup_id).c_str(), &reg_value);
}
return String16ContainsCaseInsensitive(reg_value, sub_string);
}
bool RegisterTestTask(TaskScheduler* task_scheduler,
TaskScheduler::TaskInfo* task_info) {
const wchar_t name[] = L"Chrome Cleaner Test task";
const wchar_t description[] =
L"Chrome Cleaner Test Task Used Just For Testing";
const base::FilePath exe_path =
PreFetchedPaths::GetInstance()->GetExecutablePath();
TaskScheduler::TaskExecAction action{
exe_path, base::FilePath(), L"argument",
};
base::CommandLine command_line(action.application_path);
command_line.AppendArgNative(action.arguments);
if (!task_scheduler->RegisterTask(
name, description, command_line,
chrome_cleaner::TaskScheduler::TRIGGER_TYPE_HOURLY, false)) {
LOG(ERROR) << "Failed to register test task";
return false;
}
task_info->name = name;
task_info->description = description;
task_info->exec_actions.push_back(action);
return true;
}
void AppendTestSwitches(base::CommandLine* command_line) {
command_line->AppendSwitch(kNoRecoveryComponentSwitch);
command_line->AppendSwitch(kNoCrashUploadSwitch);
command_line->AppendSwitch(kNoReportUploadSwitch);
command_line->AppendSwitch(kNoSelfDeleteSwitch);
}
void ExpectDiskFootprint(const PUPData::PUP& pup,
const base::FilePath& expected_path) {
for (const auto& path : pup.expanded_disk_footprints.file_paths()) {
if (PathEqual(expected_path, path))
return;
}
ADD_FAILURE() << "Expected file: " << expected_path.value();
}
// Expect the scheduled task footprint to be found in |pup|.
void ExpectScheduledTaskFootprint(const PUPData::PUP& pup,
const wchar_t* task_name) {
DCHECK(task_name);
for (const auto& footprint : pup.expanded_scheduled_tasks) {
if (footprint == task_name)
return;
}
ADD_FAILURE() << "Expected schedule task not found: '" << task_name << "'.";
}
bool StringContainsCaseInsensitive(const std::string& value,
const std::string& substring) {
return std::search(
value.begin(), value.end(), substring.begin(), substring.end(),
base::CaseInsensitiveCompareASCII<std::string::value_type>()) !=
value.end();
}
LoggingOverride::LoggingOverride() {
DCHECK(!active_logging_messages_);
active_logging_messages_ = &logging_messages_;
logging::SetLogMessageHandler(&LogMessageHandler);
}
LoggingOverride::~LoggingOverride() {
logging::SetLogMessageHandler(nullptr);
logging_messages_.clear();
DCHECK_EQ(active_logging_messages_, &logging_messages_);
active_logging_messages_ = nullptr;
}
bool LoggingOverride::LoggingMessagesContain(const std::string& sub_string) {
for (const auto& line : logging_messages_) {
if (StringContainsCaseInsensitive(line, sub_string))
return true;
}
return false;
}
bool LoggingOverride::LoggingMessagesContain(const std::string& sub_string1,
const std::string& sub_string2) {
for (const auto& line : logging_messages_) {
if (StringContainsCaseInsensitive(line, sub_string1) &&
StringContainsCaseInsensitive(line, sub_string2))
return true;
}
return false;
}
std::vector<std::string>* LoggingOverride::active_logging_messages_ = nullptr;
bool IsSubsetOf(const FilePathSet& set1,
const FilePathSet& set2,
const std::string& unexpected_path_log_message) {
bool is_subset = true;
for (const base::FilePath& file_path : set1.file_paths()) {
if (!set2.Contains(file_path)) {
LOG(ERROR) << unexpected_path_log_message << ": '" << file_path.value()
<< "'";
is_subset = false;
}
}
return is_subset;
}
void ExpectEqualFilePathSets(const FilePathSet& matched_files,
const FilePathSet& expected_files) {
EXPECT_TRUE(IsSubsetOf(matched_files, expected_files,
"Unexpected file in matched footprints"));
EXPECT_TRUE(
IsSubsetOf(expected_files, matched_files, "Missing expected footprint"));
}
base::FilePath GetWow64RedirectedSystemPath() {
std::vector<wchar_t> buffer;
size_t size_needed = MAX_PATH;
while (size_needed > buffer.size()) {
buffer.resize(size_needed);
size_needed = ::GetSystemWow64DirectoryW(buffer.data(), buffer.size());
if (size_needed == 0) {
PLOG(ERROR) << "Could not get system Wow64 directory";
return base::FilePath();
}
}
buffer.push_back(L'\0');
return base::FilePath(buffer.data());
}
base::FilePath GetSampleDLLPath() {
// The sample DLL should be next to the executable because it is generated at
// build time.
base::FilePath exe_dir;
base::PathService::Get(base::DIR_EXE, &exe_dir);
return exe_dir.Append(L"empty_dll.dll");
}
base::FilePath GetSignedSampleDLLPath() {
// The signed sample DLL should be next to the executable because it's copied
// there at build time.
base::FilePath exe_dir;
base::PathService::Get(base::DIR_EXE, &exe_dir);
return exe_dir.Append(L"signed_empty_dll.dll");
}
ScopedTempDirNoWow64::ScopedTempDirNoWow64() = default;
ScopedTempDirNoWow64::~ScopedTempDirNoWow64() {
// Since the temp dir was created with Wow64 disabled, it must be deleted
// with Wow64 disabled.
ScopedDisableWow64Redirection disable_wow64_redirection;
ANALYZER_ALLOW_UNUSED(Delete());
// The parent's destructor will call Delete again, without disabling Wow64,
// which could delete a directory with the same name in SysWOW64. So make
// sure the path is cleared even if the Delete call above failed.
Take();
}
bool ScopedTempDirNoWow64::CreateUniqueSystem32TempDir() {
ScopedDisableWow64Redirection disable_wow64_redirection;
base::FilePath system_path;
if (!base::PathService::Get(base::DIR_SYSTEM, &system_path)) {
PLOG(ERROR) << "Unable to get system32 path";
return false;
}
// Note that on 32-bit Windows this check will always succeed because
// GetWow64RedirectedSystemPath returns an empty string. This is correct
// because Wow64 redirection isn't supported on 32-bit Windows, so the system
// path is guaranteed not to be redirected.
DCHECK(system_path != GetWow64RedirectedSystemPath());
return CreateUniqueTempDirUnderPath(system_path);
}
bool ScopedTempDirNoWow64::CreateEmptyFileInUniqueSystem32TempDir(
const base::string16& file_name) {
if (!CreateUniqueSystem32TempDir())
return false;
ScopedDisableWow64Redirection disable_wow64_redirection;
return CreateEmptyFile(GetPath().Append(file_name));
}
std::unique_ptr<base::WaitableEvent> CreateInheritableEvent(
base::WaitableEvent::ResetPolicy reset_policy,
base::WaitableEvent::InitialState initial_state) {
SECURITY_ATTRIBUTES attributes = {sizeof(SECURITY_ATTRIBUTES)};
attributes.bInheritHandle = true;
HANDLE handle = ::CreateEvent(
&attributes, reset_policy == base::WaitableEvent::ResetPolicy::MANUAL,
initial_state == base::WaitableEvent::InitialState::SIGNALED, nullptr);
if (handle == nullptr || handle == INVALID_HANDLE_VALUE) {
PLOG(ERROR) << "Could not create inheritable event";
return std::unique_ptr<base::WaitableEvent>();
}
base::win::ScopedHandle event_handle(handle);
return std::make_unique<base::WaitableEvent>(std::move(event_handle));
}
bool CheckTestPrivileges() {
// Check for administrator privileges, unless running in the sandbox.
const bool is_sandboxed_process =
(sandbox::SandboxFactory::GetTargetServices() != nullptr);
if (!is_sandboxed_process && !chrome_cleaner::HasAdminRights()) {
LOG(ERROR) << "Some Chrome Cleanup tests need administrator privileges.";
return false;
}
// All programs run under the msys git shell have debug privileges (!), which
// breaks the assumptions of some of the tests. So drop that privilege unless
// actually running under a debugger.
if (!::IsDebuggerPresent() &&
!chrome_cleaner::ReleaseDebugRightsPrivileges()) {
PLOG(ERROR) << "Failed to release debug privileges";
return false;
}
return true;
}
} // namespace chrome_cleaner