[email protected] | fd3df778 | 2014-05-08 23:54:27 | [diff] [blame] | 1 | // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
asargent | 678123d2 | 2015-07-31 23:24:10 | [diff] [blame] | 5 | #include <list> |
Jinho Bang | b5216cec | 2018-01-17 19:43:11 | [diff] [blame] | 6 | #include <memory> |
asargent | 678123d2 | 2015-07-31 23:24:10 | [diff] [blame] | 7 | #include <set> |
| 8 | #include <string> |
| 9 | |
asargent | 6014bdf | 2016-11-30 21:50:16 | [diff] [blame] | 10 | #include "base/bind_helpers.h" |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 11 | #include "base/callback_helpers.h" |
avi | a2f4804a | 2015-12-24 23:11:13 | [diff] [blame] | 12 | #include "base/macros.h" |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 13 | #include "base/strings/string_split.h" |
Minh X. Nguyen | 5c8322610 | 2018-04-19 16:10:25 | [diff] [blame] | 14 | #include "base/test/scoped_feature_list.h" |
jam | 3f2d393 | 2017-04-26 20:28:51 | [diff] [blame] | 15 | #include "base/threading/thread_restrictions.h" |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 16 | #include "base/threading/thread_task_runner_handle.h" |
asargent | 0de8a8bc | 2016-11-22 22:58:02 | [diff] [blame] | 17 | #include "chrome/browser/extensions/browsertest_util.h" |
asargent | 6014bdf | 2016-11-30 21:50:16 | [diff] [blame] | 18 | #include "chrome/browser/extensions/chrome_content_verifier_delegate.h" |
Minh X. Nguyen | 5c8322610 | 2018-04-19 16:10:25 | [diff] [blame] | 19 | #include "chrome/browser/extensions/content_verifier_test_utils.h" |
[email protected] | fd3df778 | 2014-05-08 23:54:27 | [diff] [blame] | 20 | #include "chrome/browser/extensions/extension_browsertest.h" |
asargent | 0de8a8bc | 2016-11-22 22:58:02 | [diff] [blame] | 21 | #include "chrome/browser/extensions/extension_management_test_util.h" |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 22 | #include "chrome/browser/extensions/extension_service.h" |
lazyboy | 77214d3c | 2017-04-04 16:46:12 | [diff] [blame] | 23 | #include "chrome/browser/extensions/policy_extension_reinstaller.h" |
Istiaque Ahmed | 195fd5c | 2018-01-31 19:24:13 | [diff] [blame] | 24 | #include "chrome/test/base/ui_test_utils.h" |
asargent | 0de8a8bc | 2016-11-22 22:58:02 | [diff] [blame] | 25 | #include "components/policy/core/browser/browser_policy_connector.h" |
| 26 | #include "components/policy/core/common/mock_configuration_policy_provider.h" |
Justin Donnelly | 5ce949f | 2017-05-12 22:03:38 | [diff] [blame] | 27 | #include "content/public/common/browser_side_navigation_policy.h" |
[email protected] | fd3df778 | 2014-05-08 23:54:27 | [diff] [blame] | 28 | #include "content/public/test/test_utils.h" |
asargent | 678123d2 | 2015-07-31 23:24:10 | [diff] [blame] | 29 | #include "extensions/browser/content_verifier.h" |
Istiaque Ahmed | 584fe14 | 2018-03-13 09:19:04 | [diff] [blame] | 30 | #include "extensions/browser/content_verifier/test_utils.h" |
[email protected] | fd3df778 | 2014-05-08 23:54:27 | [diff] [blame] | 31 | #include "extensions/browser/content_verify_job.h" |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 32 | #include "extensions/browser/crx_file_info.h" |
[email protected] | fd3df778 | 2014-05-08 23:54:27 | [diff] [blame] | 33 | #include "extensions/browser/extension_prefs.h" |
| 34 | #include "extensions/browser/extension_registry.h" |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 35 | #include "extensions/browser/external_install_info.h" |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 36 | #include "extensions/browser/management_policy.h" |
Minh X. Nguyen | 5c8322610 | 2018-04-19 16:10:25 | [diff] [blame] | 37 | #include "extensions/browser/mock_external_provider.h" |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 38 | #include "extensions/browser/test_extension_registry_observer.h" |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 39 | #include "extensions/browser/updater/extension_downloader.h" |
| 40 | #include "extensions/browser/updater/extension_downloader_test_delegate.h" |
| 41 | #include "extensions/browser/updater/manifest_fetch_data.h" |
Minh X. Nguyen | 5c8322610 | 2018-04-19 16:10:25 | [diff] [blame] | 42 | #include "extensions/common/extension_features.h" |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 43 | #include "extensions/common/extension_urls.h" |
[email protected] | fd3df778 | 2014-05-08 23:54:27 | [diff] [blame] | 44 | |
| 45 | namespace extensions { |
| 46 | |
[email protected] | fd3df778 | 2014-05-08 23:54:27 | [diff] [blame] | 47 | class ContentVerifierTest : public ExtensionBrowserTest { |
| 48 | public: |
| 49 | ContentVerifierTest() {} |
dcheng | 7219181 | 2014-10-28 20:49:56 | [diff] [blame] | 50 | ~ContentVerifierTest() override {} |
[email protected] | fd3df778 | 2014-05-08 23:54:27 | [diff] [blame] | 51 | |
Istiaque Ahmed | 4c7b9d2 | 2018-03-20 02:13:38 | [diff] [blame] | 52 | void SetUp() override { |
Minh X. Nguyen | 5c8322610 | 2018-04-19 16:10:25 | [diff] [blame] | 53 | scoped_feature_list_.InitAndDisableFeature( |
Mostyn Bramley-Moore | b6a37c6 | 2018-09-04 21:43:35 | [diff] [blame] | 54 | extensions_features::kNewExtensionUpdaterService); |
Istiaque Ahmed | 4c7b9d2 | 2018-03-20 02:13:38 | [diff] [blame] | 55 | // Override content verification mode before ExtensionSystemImpl initializes |
| 56 | // ChromeContentVerifierDelegate. |
| 57 | ChromeContentVerifierDelegate::SetDefaultModeForTesting( |
| 58 | ContentVerifierDelegate::ENFORCE); |
| 59 | |
| 60 | ExtensionBrowserTest::SetUp(); |
| 61 | } |
| 62 | |
| 63 | void TearDown() override { |
| 64 | ExtensionBrowserTest::TearDown(); |
| 65 | ChromeContentVerifierDelegate::SetDefaultModeForTesting(base::nullopt); |
[email protected] | fd3df778 | 2014-05-08 23:54:27 | [diff] [blame] | 66 | } |
| 67 | |
proberge | e8f8c750 | 2017-10-03 22:19:33 | [diff] [blame] | 68 | bool ShouldEnableContentVerification() override { return true; } |
| 69 | |
lazyboy | d05d1e8 | 2017-04-24 21:20:42 | [diff] [blame] | 70 | void TestContentScriptExtension(const std::string& crx_relpath, |
| 71 | const std::string& id, |
| 72 | const std::string& script_relpath) { |
| 73 | VerifierObserver verifier_observer; |
| 74 | |
| 75 | // Install the extension with content scripts. The initial read of the |
| 76 | // content scripts will fail verification because they are read before the |
| 77 | // content verification system has completed a one-time processing of the |
| 78 | // expected hashes. (The extension only contains the root level hashes of |
| 79 | // the merkle tree, but the content verification system builds the entire |
| 80 | // tree and caches it in the extension install directory - see |
| 81 | // ContentHashFetcher for more details). |
| 82 | const Extension* extension = InstallExtensionFromWebstore( |
| 83 | test_data_dir_.AppendASCII(crx_relpath), 1); |
| 84 | ASSERT_TRUE(extension); |
| 85 | EXPECT_EQ(id, extension->id()); |
| 86 | |
| 87 | // Wait for the content verification code to finish processing the hashes. |
| 88 | if (!base::ContainsKey(verifier_observer.completed_fetches(), id)) |
| 89 | verifier_observer.WaitForFetchComplete(id); |
| 90 | |
| 91 | // Now disable the extension, since content scripts are read at enable time, |
| 92 | // set up our job observer, and re-enable, expecting a success this time. |
| 93 | DisableExtension(id); |
Istiaque Ahmed | 584fe14 | 2018-03-13 09:19:04 | [diff] [blame] | 94 | using Result = TestContentVerifyJobObserver::Result; |
| 95 | TestContentVerifyJobObserver job_observer; |
lazyboy | d05d1e8 | 2017-04-24 21:20:42 | [diff] [blame] | 96 | base::FilePath script_relfilepath = |
| 97 | base::FilePath().AppendASCII(script_relpath); |
Istiaque Ahmed | 584fe14 | 2018-03-13 09:19:04 | [diff] [blame] | 98 | job_observer.ExpectJobResult(id, script_relfilepath, Result::SUCCESS); |
lazyboy | d05d1e8 | 2017-04-24 21:20:42 | [diff] [blame] | 99 | EnableExtension(id); |
| 100 | EXPECT_TRUE(job_observer.WaitForExpectedJobs()); |
| 101 | |
| 102 | // Now alter the contents of the content script, reload the extension, and |
| 103 | // expect to see a job failure due to the content script content hash not |
| 104 | // being what was signed by the webstore. |
| 105 | base::FilePath scriptfile = extension->path().AppendASCII(script_relpath); |
| 106 | std::string extra = "some_extra_function_call();"; |
jam | 3f2d393 | 2017-04-26 20:28:51 | [diff] [blame] | 107 | { |
Francois Doray | e6fb2d0 | 2017-10-18 21:29:13 | [diff] [blame] | 108 | base::ScopedAllowBlockingForTesting allow_blocking; |
jam | 3f2d393 | 2017-04-26 20:28:51 | [diff] [blame] | 109 | ASSERT_TRUE(base::AppendToFile(scriptfile, extra.data(), extra.size())); |
| 110 | } |
lazyboy | d05d1e8 | 2017-04-24 21:20:42 | [diff] [blame] | 111 | DisableExtension(id); |
Istiaque Ahmed | 584fe14 | 2018-03-13 09:19:04 | [diff] [blame] | 112 | job_observer.ExpectJobResult(id, script_relfilepath, Result::FAILURE); |
lazyboy | d05d1e8 | 2017-04-24 21:20:42 | [diff] [blame] | 113 | EnableExtension(id); |
| 114 | EXPECT_TRUE(job_observer.WaitForExpectedJobs()); |
| 115 | } |
Minh X. Nguyen | 5c8322610 | 2018-04-19 16:10:25 | [diff] [blame] | 116 | |
| 117 | protected: |
| 118 | base::test::ScopedFeatureList scoped_feature_list_; |
[email protected] | fd3df778 | 2014-05-08 23:54:27 | [diff] [blame] | 119 | }; |
| 120 | |
Istiaque Ahmed | 231c6bd | 2018-03-29 05:31:58 | [diff] [blame] | 121 | IN_PROC_BROWSER_TEST_F(ContentVerifierTest, DotSlashPaths) { |
Istiaque Ahmed | 584fe14 | 2018-03-13 09:19:04 | [diff] [blame] | 122 | TestContentVerifyJobObserver job_observer; |
asargent | 7cc29ce3 | 2014-10-09 21:27:57 | [diff] [blame] | 123 | std::string id = "hoipipabpcoomfapcecilckodldhmpgl"; |
| 124 | |
Istiaque Ahmed | 584fe14 | 2018-03-13 09:19:04 | [diff] [blame] | 125 | using Result = TestContentVerifyJobObserver::Result; |
asargent | 7cc29ce3 | 2014-10-09 21:27:57 | [diff] [blame] | 126 | job_observer.ExpectJobResult( |
Istiaque Ahmed | 584fe14 | 2018-03-13 09:19:04 | [diff] [blame] | 127 | id, base::FilePath(FILE_PATH_LITERAL("background.js")), Result::SUCCESS); |
| 128 | job_observer.ExpectJobResult( |
| 129 | id, base::FilePath(FILE_PATH_LITERAL("page.html")), Result::SUCCESS); |
asargent | 678123d2 | 2015-07-31 23:24:10 | [diff] [blame] | 130 | job_observer.ExpectJobResult(id, base::FilePath(FILE_PATH_LITERAL("page.js")), |
Istiaque Ahmed | 584fe14 | 2018-03-13 09:19:04 | [diff] [blame] | 131 | Result::SUCCESS); |
asargent | 7cc29ce3 | 2014-10-09 21:27:57 | [diff] [blame] | 132 | job_observer.ExpectJobResult( |
Istiaque Ahmed | 584fe14 | 2018-03-13 09:19:04 | [diff] [blame] | 133 | id, base::FilePath(FILE_PATH_LITERAL("dir/page2.html")), Result::SUCCESS); |
| 134 | job_observer.ExpectJobResult( |
| 135 | id, base::FilePath(FILE_PATH_LITERAL("page2.js")), Result::SUCCESS); |
asargent | 73d92c7 | 2015-09-10 19:20:12 | [diff] [blame] | 136 | job_observer.ExpectJobResult(id, base::FilePath(FILE_PATH_LITERAL("cs1.js")), |
Istiaque Ahmed | 584fe14 | 2018-03-13 09:19:04 | [diff] [blame] | 137 | Result::SUCCESS); |
asargent | 73d92c7 | 2015-09-10 19:20:12 | [diff] [blame] | 138 | job_observer.ExpectJobResult(id, base::FilePath(FILE_PATH_LITERAL("cs2.js")), |
Istiaque Ahmed | 584fe14 | 2018-03-13 09:19:04 | [diff] [blame] | 139 | Result::SUCCESS); |
asargent | 73d92c7 | 2015-09-10 19:20:12 | [diff] [blame] | 140 | |
Istiaque Ahmed | 3641f523a | 2018-03-23 23:27:41 | [diff] [blame] | 141 | auto verifier_observer = std::make_unique<VerifierObserver>(); |
asargent | 7cc29ce3 | 2014-10-09 21:27:57 | [diff] [blame] | 142 | |
| 143 | // Install a test extension we copied from the webstore that has actual |
asargent | 73d92c7 | 2015-09-10 19:20:12 | [diff] [blame] | 144 | // signatures, and contains paths with a leading "./" in various places. |
asargent | 7cc29ce3 | 2014-10-09 21:27:57 | [diff] [blame] | 145 | const Extension* extension = InstallExtensionFromWebstore( |
| 146 | test_data_dir_.AppendASCII("content_verifier/dot_slash_paths.crx"), 1); |
| 147 | |
| 148 | ASSERT_TRUE(extension); |
| 149 | ASSERT_EQ(extension->id(), id); |
| 150 | |
asargent | 73d92c7 | 2015-09-10 19:20:12 | [diff] [blame] | 151 | // The content scripts might fail verification the first time since the |
| 152 | // one-time processing might not be finished yet - if that's the case then |
| 153 | // we want to wait until that work is done. |
Istiaque Ahmed | 3641f523a | 2018-03-23 23:27:41 | [diff] [blame] | 154 | if (!base::ContainsKey(verifier_observer->completed_fetches(), id)) |
| 155 | verifier_observer->WaitForFetchComplete(id); |
| 156 | |
| 157 | // It is important to destroy |verifier_observer| here so that it doesn't see |
| 158 | // any fetch from EnableExtension call below (the observer pointer in |
| 159 | // content_verifier.cc isn't thread safe, so it might asynchronously call |
| 160 | // OnFetchComplete after this test's body executes). |
| 161 | verifier_observer.reset(); |
asargent | 73d92c7 | 2015-09-10 19:20:12 | [diff] [blame] | 162 | |
Istiaque Ahmed | 231c6bd | 2018-03-29 05:31:58 | [diff] [blame] | 163 | EXPECT_TRUE(job_observer.WaitForExpectedJobs()); |
| 164 | |
| 165 | // Set expectations for extension enablement below. |
| 166 | job_observer.ExpectJobResult(id, base::FilePath(FILE_PATH_LITERAL("cs1.js")), |
| 167 | Result::SUCCESS); |
| 168 | job_observer.ExpectJobResult(id, base::FilePath(FILE_PATH_LITERAL("cs2.js")), |
| 169 | Result::SUCCESS); |
| 170 | |
asargent | 73d92c7 | 2015-09-10 19:20:12 | [diff] [blame] | 171 | // Now disable/re-enable the extension to cause the content scripts to be |
| 172 | // read again. |
| 173 | DisableExtension(id); |
| 174 | EnableExtension(id); |
| 175 | |
asargent | 7cc29ce3 | 2014-10-09 21:27:57 | [diff] [blame] | 176 | EXPECT_TRUE(job_observer.WaitForExpectedJobs()); |
asargent | 7cc29ce3 | 2014-10-09 21:27:57 | [diff] [blame] | 177 | } |
| 178 | |
asargent | 678123d2 | 2015-07-31 23:24:10 | [diff] [blame] | 179 | IN_PROC_BROWSER_TEST_F(ContentVerifierTest, ContentScripts) { |
lazyboy | d05d1e8 | 2017-04-24 21:20:42 | [diff] [blame] | 180 | TestContentScriptExtension("content_verifier/content_script.crx", |
| 181 | "jmllhlobpjcnnomjlipadejplhmheiif", "script.js"); |
| 182 | } |
asargent | 678123d2 | 2015-07-31 23:24:10 | [diff] [blame] | 183 | |
lazyboy | d05d1e8 | 2017-04-24 21:20:42 | [diff] [blame] | 184 | IN_PROC_BROWSER_TEST_F(ContentVerifierTest, ContentScriptsInLocales) { |
| 185 | TestContentScriptExtension("content_verifier/content_script_locales.crx", |
| 186 | "jaghonccckpcikmliipifpoodmeofoon", |
| 187 | "_locales/en/content_script.js"); |
asargent | 678123d2 | 2015-07-31 23:24:10 | [diff] [blame] | 188 | } |
| 189 | |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 190 | // Tests the case of a corrupt extension that is force-installed by policy and |
| 191 | // should not be allowed to be manually uninstalled/disabled by the user. |
| 192 | IN_PROC_BROWSER_TEST_F(ContentVerifierTest, PolicyCorrupted) { |
| 193 | ExtensionSystem* system = ExtensionSystem::Get(profile()); |
| 194 | ExtensionService* service = system->extension_service(); |
| 195 | |
| 196 | // The id of our test extension. |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 197 | ExtensionId kExtensionId("npnbmohejbjohgpjnmjagbafnjhkmgko"); |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 198 | |
| 199 | // Setup fake policy and update check objects. |
Minh X. Nguyen | 5c8322610 | 2018-04-19 16:10:25 | [diff] [blame] | 200 | content_verifier_test::ForceInstallProvider policy(kExtensionId); |
| 201 | content_verifier_test::DownloaderTestDelegate downloader; |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 202 | system->management_policy()->RegisterProvider(&policy); |
| 203 | ExtensionDownloader::set_test_delegate(&downloader); |
Minh X. Nguyen | 5c8322610 | 2018-04-19 16:10:25 | [diff] [blame] | 204 | auto external_provider = std::make_unique<MockExternalProvider>( |
| 205 | service, Manifest::EXTERNAL_POLICY_DOWNLOAD); |
| 206 | external_provider->UpdateOrAddExtension( |
| 207 | std::make_unique<ExternalInstallInfoUpdateUrl>( |
| 208 | kExtensionId, std::string() /* install_parameter */, |
| 209 | extension_urls::GetWebstoreUpdateUrl(), |
| 210 | Manifest::EXTERNAL_POLICY_DOWNLOAD, 0 /* creation_flags */, |
| 211 | true /* mark_acknowldged */)); |
| 212 | service->AddProviderForTesting(std::move(external_provider)); |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 213 | |
| 214 | base::FilePath crx_path = |
| 215 | test_data_dir_.AppendASCII("content_verifier/v1.crx"); |
| 216 | const Extension* extension = |
| 217 | InstallExtension(crx_path, 1, Manifest::EXTERNAL_POLICY_DOWNLOAD); |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 218 | ASSERT_TRUE(extension); |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 219 | |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 220 | downloader.AddResponse(kExtensionId, extension->VersionString(), crx_path); |
| 221 | EXPECT_EQ(kExtensionId, extension->id()); |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 222 | |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 223 | TestExtensionRegistryObserver registry_observer( |
| 224 | ExtensionRegistry::Get(profile()), kExtensionId); |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 225 | ContentVerifier* verifier = system->content_verifier(); |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 226 | verifier->VerifyFailed(kExtensionId, ContentVerifyJob::HASH_MISMATCH); |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 227 | |
| 228 | // Make sure the extension first got disabled due to corruption. |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 229 | EXPECT_TRUE(registry_observer.WaitForExtensionUnloaded()); |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 230 | ExtensionPrefs* prefs = ExtensionPrefs::Get(profile()); |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 231 | int reasons = prefs->GetDisableReasons(kExtensionId); |
Minh X. Nguyen | 4547901 | 2017-08-18 21:35:36 | [diff] [blame] | 232 | EXPECT_TRUE(reasons & disable_reason::DISABLE_CORRUPTED); |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 233 | |
| 234 | // Make sure the extension then got re-installed, and that after reinstall it |
| 235 | // is no longer disabled due to corruption. |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 236 | EXPECT_TRUE(registry_observer.WaitForExtensionInstalled()); |
| 237 | |
| 238 | reasons = prefs->GetDisableReasons(kExtensionId); |
Minh X. Nguyen | 4547901 | 2017-08-18 21:35:36 | [diff] [blame] | 239 | EXPECT_FALSE(reasons & disable_reason::DISABLE_CORRUPTED); |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 240 | |
| 241 | // Make sure that the update check request properly included a parameter |
| 242 | // indicating that this was a corrupt policy reinstall. |
| 243 | bool found = false; |
| 244 | for (const auto& request : downloader.requests()) { |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 245 | if (request->Includes(kExtensionId)) { |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 246 | std::string query = request->full_url().query(); |
| 247 | for (const auto& part : base::SplitString( |
| 248 | query, "&", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL)) { |
| 249 | if (base::StartsWith(part, "x=", base::CompareCase::SENSITIVE) && |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 250 | part.find(std::string("id%3D") + kExtensionId) != |
| 251 | std::string::npos) { |
asargent | 56282ab7 | 2016-09-09 16:58:03 | [diff] [blame] | 252 | found = true; |
| 253 | EXPECT_NE(std::string::npos, part.find("installsource%3Dreinstall")); |
| 254 | } |
| 255 | } |
| 256 | } |
| 257 | } |
| 258 | EXPECT_TRUE(found); |
| 259 | } |
| 260 | |
Istiaque Ahmed | 195fd5c | 2018-01-31 19:24:13 | [diff] [blame] | 261 | // Tests that verification failure during navigating to an extension resource |
| 262 | // correctly disables the extension. |
| 263 | IN_PROC_BROWSER_TEST_F(ContentVerifierTest, VerificationFailureOnNavigate) { |
Istiaque Ahmed | 195fd5c | 2018-01-31 19:24:13 | [diff] [blame] | 264 | const Extension* extension = InstallExtensionFromWebstore( |
| 265 | test_data_dir_.AppendASCII("content_verifier/dot_slash_paths.crx"), 1); |
| 266 | ASSERT_TRUE(extension); |
| 267 | const ExtensionId kExtensionId = extension->id(); |
| 268 | const base::FilePath::CharType kResource[] = FILE_PATH_LITERAL("page.html"); |
| 269 | { |
| 270 | // Modify content so that content verification fails. |
| 271 | base::ScopedAllowBlockingForTesting allow_blocking; |
| 272 | base::FilePath real_path = extension->path().Append(kResource); |
| 273 | std::string extra = "some_extra_function_call();"; |
| 274 | ASSERT_TRUE(base::AppendToFile(real_path, extra.data(), extra.size())); |
| 275 | } |
| 276 | |
| 277 | GURL page_url = extension->GetResourceURL("page.html"); |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 278 | TestExtensionRegistryObserver unload_observer( |
| 279 | ExtensionRegistry::Get(profile()), kExtensionId); |
Istiaque Ahmed | 195fd5c | 2018-01-31 19:24:13 | [diff] [blame] | 280 | // Wait for 0 navigations to complete because with PlzNavigate it's racy |
| 281 | // when the didstop IPC arrives relative to the tab being closed. The |
| 282 | // wait call below is what the tests care about. |
| 283 | ui_test_utils::NavigateToURLWithDispositionBlockUntilNavigationsComplete( |
| 284 | browser(), page_url, 0, WindowOpenDisposition::NEW_FOREGROUND_TAB, |
| 285 | ui_test_utils::BROWSER_TEST_NONE); |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 286 | EXPECT_TRUE(unload_observer.WaitForExtensionUnloaded()); |
Istiaque Ahmed | 195fd5c | 2018-01-31 19:24:13 | [diff] [blame] | 287 | ExtensionPrefs* prefs = ExtensionPrefs::Get(profile()); |
| 288 | int reasons = prefs->GetDisableReasons(kExtensionId); |
| 289 | EXPECT_TRUE(reasons & disable_reason::DISABLE_CORRUPTED); |
| 290 | } |
| 291 | |
asargent | 0de8a8bc | 2016-11-22 22:58:02 | [diff] [blame] | 292 | class ContentVerifierPolicyTest : public ContentVerifierTest { |
| 293 | public: |
| 294 | // We need to do this work here because the force-install policy values are |
| 295 | // checked pretty early on in the startup of the ExtensionService, which |
| 296 | // happens between SetUpInProcessBrowserTestFixture and SetUpOnMainThread. |
| 297 | void SetUpInProcessBrowserTestFixture() override { |
| 298 | ContentVerifierTest::SetUpInProcessBrowserTestFixture(); |
| 299 | |
| 300 | EXPECT_CALL(policy_provider_, IsInitializationComplete(testing::_)) |
| 301 | .WillRepeatedly(testing::Return(true)); |
| 302 | |
| 303 | policy::BrowserPolicyConnector::SetPolicyProviderForTesting( |
| 304 | &policy_provider_); |
| 305 | ExtensionManagementPolicyUpdater management_policy(&policy_provider_); |
| 306 | management_policy.SetIndividualExtensionAutoInstalled( |
| 307 | id_, extension_urls::kChromeWebstoreUpdateURL, true /* forced */); |
| 308 | |
| 309 | ExtensionDownloader::set_test_delegate(&downloader_); |
| 310 | base::FilePath crx_path = |
| 311 | test_data_dir_.AppendASCII("content_verifier/v1.crx"); |
| 312 | std::string version = "2"; |
| 313 | downloader_.AddResponse(id_, version, crx_path); |
| 314 | } |
| 315 | |
| 316 | void SetUpOnMainThread() override { |
| 317 | extensions::browsertest_util::CreateAndInitializeLocalCache(); |
| 318 | } |
| 319 | |
| 320 | protected: |
| 321 | // The id of the extension we want to have force-installed. |
| 322 | std::string id_ = "npnbmohejbjohgpjnmjagbafnjhkmgko"; |
| 323 | |
| 324 | private: |
| 325 | policy::MockConfigurationPolicyProvider policy_provider_; |
Minh X. Nguyen | 5c8322610 | 2018-04-19 16:10:25 | [diff] [blame] | 326 | content_verifier_test::DownloaderTestDelegate downloader_; |
asargent | 0de8a8bc | 2016-11-22 22:58:02 | [diff] [blame] | 327 | }; |
| 328 | |
| 329 | // We want to test what happens at startup with a corroption-disabled policy |
| 330 | // force installed extension. So we set that up in the PRE test here. |
| 331 | IN_PROC_BROWSER_TEST_F(ContentVerifierPolicyTest, |
asargent | ba52f32 | 2016-11-30 18:26:06 | [diff] [blame] | 332 | PRE_PolicyCorruptedOnStartup) { |
asargent | 0de8a8bc | 2016-11-22 22:58:02 | [diff] [blame] | 333 | ExtensionRegistry* registry = ExtensionRegistry::Get(profile()); |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 334 | TestExtensionRegistryObserver registry_observer(registry, id_); |
asargent | 0de8a8bc | 2016-11-22 22:58:02 | [diff] [blame] | 335 | |
| 336 | // Wait for the extension to be installed by policy we set up in |
| 337 | // SetUpInProcessBrowserTestFixture. |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 338 | if (!registry->GetInstalledExtension(id_)) |
| 339 | EXPECT_TRUE(registry_observer.WaitForExtensionInstalled()); |
asargent | 0de8a8bc | 2016-11-22 22:58:02 | [diff] [blame] | 340 | |
| 341 | // Simulate corruption of the extension so that we can test what happens |
| 342 | // at startup in the non-PRE test. |
| 343 | ExtensionSystem* system = ExtensionSystem::Get(profile()); |
| 344 | ContentVerifier* verifier = system->content_verifier(); |
| 345 | verifier->VerifyFailed(id_, ContentVerifyJob::HASH_MISMATCH); |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 346 | EXPECT_TRUE(registry_observer.WaitForExtensionUnloaded()); |
asargent | 0de8a8bc | 2016-11-22 22:58:02 | [diff] [blame] | 347 | ExtensionPrefs* prefs = ExtensionPrefs::Get(profile()); |
| 348 | int reasons = prefs->GetDisableReasons(id_); |
Minh X. Nguyen | 4547901 | 2017-08-18 21:35:36 | [diff] [blame] | 349 | EXPECT_TRUE(reasons & disable_reason::DISABLE_CORRUPTED); |
asargent | 0de8a8bc | 2016-11-22 22:58:02 | [diff] [blame] | 350 | } |
| 351 | |
| 352 | // Now actually test what happens on the next startup after the PRE test above. |
asargent | ba52f32 | 2016-11-30 18:26:06 | [diff] [blame] | 353 | IN_PROC_BROWSER_TEST_F(ContentVerifierPolicyTest, PolicyCorruptedOnStartup) { |
| 354 | // Depdending on timing, the extension may have already been reinstalled |
| 355 | // between SetUpInProcessBrowserTestFixture and now (usually not during local |
| 356 | // testing on a developer machine, but sometimes on a heavily loaded system |
| 357 | // such as the build waterfall / trybots). If the reinstall didn't already |
| 358 | // happen, wait for it. |
asargent | 0de8a8bc | 2016-11-22 22:58:02 | [diff] [blame] | 359 | ExtensionPrefs* prefs = ExtensionPrefs::Get(profile()); |
asargent | 0de8a8bc | 2016-11-22 22:58:02 | [diff] [blame] | 360 | ExtensionRegistry* registry = ExtensionRegistry::Get(profile()); |
asargent | ba52f32 | 2016-11-30 18:26:06 | [diff] [blame] | 361 | int disable_reasons = prefs->GetDisableReasons(id_); |
Minh X. Nguyen | 4547901 | 2017-08-18 21:35:36 | [diff] [blame] | 362 | if (disable_reasons & disable_reason::DISABLE_CORRUPTED) { |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 363 | TestExtensionRegistryObserver registry_observer(registry, id_); |
| 364 | EXPECT_TRUE(registry_observer.WaitForExtensionInstalled()); |
asargent | ba52f32 | 2016-11-30 18:26:06 | [diff] [blame] | 365 | disable_reasons = prefs->GetDisableReasons(id_); |
| 366 | } |
Minh X. Nguyen | 4547901 | 2017-08-18 21:35:36 | [diff] [blame] | 367 | EXPECT_FALSE(disable_reasons & disable_reason::DISABLE_CORRUPTED); |
asargent | ba52f32 | 2016-11-30 18:26:06 | [diff] [blame] | 368 | EXPECT_TRUE(registry->enabled_extensions().Contains(id_)); |
asargent | 0de8a8bc | 2016-11-22 22:58:02 | [diff] [blame] | 369 | } |
| 370 | |
asargent | 6014bdf | 2016-11-30 21:50:16 | [diff] [blame] | 371 | IN_PROC_BROWSER_TEST_F(ContentVerifierPolicyTest, Backoff) { |
| 372 | ExtensionRegistry* registry = ExtensionRegistry::Get(profile()); |
| 373 | ExtensionSystem* system = ExtensionSystem::Get(profile()); |
asargent | 6014bdf | 2016-11-30 21:50:16 | [diff] [blame] | 374 | ContentVerifier* verifier = system->content_verifier(); |
| 375 | |
| 376 | // Wait for the extension to be installed by the policy we set up in |
| 377 | // SetUpInProcessBrowserTestFixture. |
| 378 | if (!registry->GetInstalledExtension(id_)) { |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 379 | TestExtensionRegistryObserver registry_observer(registry, id_); |
| 380 | EXPECT_TRUE(registry_observer.WaitForExtensionInstalled()); |
asargent | 6014bdf | 2016-11-30 21:50:16 | [diff] [blame] | 381 | } |
| 382 | |
| 383 | // Setup to intercept reinstall action, so we can see what the delay would |
| 384 | // have been for the real action. |
Minh X. Nguyen | 5c8322610 | 2018-04-19 16:10:25 | [diff] [blame] | 385 | content_verifier_test::DelayTracker delay_tracker; |
asargent | 6014bdf | 2016-11-30 21:50:16 | [diff] [blame] | 386 | |
| 387 | // Do 4 iterations of disabling followed by reinstall. |
| 388 | const size_t iterations = 4; |
| 389 | for (size_t i = 0; i < iterations; i++) { |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 390 | TestExtensionRegistryObserver registry_observer(registry, id_); |
asargent | 6014bdf | 2016-11-30 21:50:16 | [diff] [blame] | 391 | verifier->VerifyFailed(id_, ContentVerifyJob::HASH_MISMATCH); |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 392 | EXPECT_TRUE(registry_observer.WaitForExtensionUnloaded()); |
lazyboy | 77214d3c | 2017-04-04 16:46:12 | [diff] [blame] | 393 | // Resolve the request to |delay_tracker|, so the reinstallation can |
| 394 | // proceed. |
| 395 | delay_tracker.Proceed(); |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 396 | EXPECT_TRUE(registry_observer.WaitForExtensionInstalled()); |
asargent | 6014bdf | 2016-11-30 21:50:16 | [diff] [blame] | 397 | } |
| 398 | const std::vector<base::TimeDelta>& calls = delay_tracker.calls(); |
| 399 | |
lazyboy | 77214d3c | 2017-04-04 16:46:12 | [diff] [blame] | 400 | // After |delay_tracker| resolves the 4 (|iterations|) reinstallation |
| 401 | // requests, it will get an additional request (right away) for retrying |
| 402 | // reinstallation. |
| 403 | // Note: the additional request in non-test environment will arrive with |
| 404 | // a (backoff) delay. But during test, |delay_tracker| issues the request |
| 405 | // immediately. |
| 406 | ASSERT_EQ(iterations, calls.size() - 1); |
asargent | 6014bdf | 2016-11-30 21:50:16 | [diff] [blame] | 407 | // Assert that the first reinstall action happened with a delay of 0, and |
| 408 | // then kept growing each additional time. |
asargent | 6014bdf | 2016-11-30 21:50:16 | [diff] [blame] | 409 | EXPECT_EQ(base::TimeDelta(), delay_tracker.calls()[0]); |
| 410 | for (size_t i = 1; i < delay_tracker.calls().size(); i++) { |
| 411 | EXPECT_LT(calls[i - 1], calls[i]); |
| 412 | } |
| 413 | } |
| 414 | |
lazyboy | 77214d3c | 2017-04-04 16:46:12 | [diff] [blame] | 415 | // Tests that if CheckForExternalUpdates() fails, then we retry reinstalling |
| 416 | // corrupted policy extensions. For example: if network is unavailable, |
| 417 | // CheckForExternalUpdates() will fail. |
| 418 | IN_PROC_BROWSER_TEST_F(ContentVerifierPolicyTest, FailedUpdateRetries) { |
| 419 | ExtensionRegistry* registry = ExtensionRegistry::Get(profile()); |
| 420 | ExtensionSystem* system = ExtensionSystem::Get(profile()); |
| 421 | ExtensionService* service = system->extension_service(); |
| 422 | ContentVerifier* verifier = system->content_verifier(); |
| 423 | |
| 424 | // Wait for the extension to be installed by the policy we set up in |
| 425 | // SetUpInProcessBrowserTestFixture. |
| 426 | if (!registry->GetInstalledExtension(id_)) { |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 427 | TestExtensionRegistryObserver registry_observer(registry, id_); |
| 428 | EXPECT_TRUE(registry_observer.WaitForExtensionInstalled()); |
lazyboy | 77214d3c | 2017-04-04 16:46:12 | [diff] [blame] | 429 | } |
| 430 | |
Minh X. Nguyen | 5c8322610 | 2018-04-19 16:10:25 | [diff] [blame] | 431 | content_verifier_test::DelayTracker delay_tracker; |
lazyboy | 77214d3c | 2017-04-04 16:46:12 | [diff] [blame] | 432 | service->set_external_updates_disabled_for_test(true); |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 433 | TestExtensionRegistryObserver registry_observer(registry, id_); |
lazyboy | 77214d3c | 2017-04-04 16:46:12 | [diff] [blame] | 434 | verifier->VerifyFailed(id_, ContentVerifyJob::HASH_MISMATCH); |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 435 | EXPECT_TRUE(registry_observer.WaitForExtensionUnloaded()); |
lazyboy | 77214d3c | 2017-04-04 16:46:12 | [diff] [blame] | 436 | |
| 437 | const std::vector<base::TimeDelta>& calls = delay_tracker.calls(); |
| 438 | ASSERT_EQ(1u, calls.size()); |
| 439 | EXPECT_EQ(base::TimeDelta(), delay_tracker.calls()[0]); |
| 440 | |
| 441 | delay_tracker.Proceed(); |
| 442 | |
| 443 | // Remove the override and set ExtensionService to update again. The extension |
| 444 | // should be now installed. |
| 445 | PolicyExtensionReinstaller::set_policy_reinstall_action_for_test(nullptr); |
| 446 | service->set_external_updates_disabled_for_test(false); |
| 447 | delay_tracker.Proceed(); |
| 448 | |
Istiaque Ahmed | 9308190 | 2018-02-02 05:36:29 | [diff] [blame] | 449 | EXPECT_TRUE(registry_observer.WaitForExtensionInstalled()); |
lazyboy | 77214d3c | 2017-04-04 16:46:12 | [diff] [blame] | 450 | } |
| 451 | |
[email protected] | fd3df778 | 2014-05-08 23:54:27 | [diff] [blame] | 452 | } // namespace extensions |