Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/policy/policy_loader_win.h" | 5 #include "chrome/browser/policy/policy_loader_win.h" |
| 6 | 6 |
| 7 #include <userenv.h> | 7 #include <userenv.h> |
| 8 #include <windows.h> | 8 #include <windows.h> |
| 9 | 9 |
| 10 #include <algorithm> | |
| 11 #include <iterator> | |
| 12 #include <vector> | |
| 10 #include <cstring> | 13 #include <cstring> |
|
Joao da Silva
2013/04/16 10:46:25
nit: order
Mattias Nissler (ping if slow)
2013/04/16 13:00:05
Done.
| |
| 11 | 14 |
| 12 #include "base/file_util.h" | 15 #include "base/file_util.h" |
| 13 #include "base/files/file_path.h" | 16 #include "base/files/file_path.h" |
| 14 #include "base/json/json_writer.h" | 17 #include "base/json/json_writer.h" |
| 18 #include "base/strings/string_number_conversions.h" | |
|
Joao da Silva
2013/04/16 10:46:25
nit: already included
Mattias Nissler (ping if slow)
2013/04/16 13:00:05
Done.
| |
| 15 #include "base/path_service.h" | 19 #include "base/path_service.h" |
| 20 #include "base/sys_byteorder.h" | |
|
Joao da Silva
2013/04/16 10:46:25
nit: order
Mattias Nissler (ping if slow)
2013/04/16 13:00:05
Done.
| |
| 16 #include "base/process.h" | 21 #include "base/process.h" |
| 17 #include "base/string16.h" | 22 #include "base/string16.h" |
| 18 #include "base/string_util.h" | 23 #include "base/string_util.h" |
| 19 #include "base/stringprintf.h" | 24 #include "base/stringprintf.h" |
| 25 #include "base/files/scoped_temp_dir.h" | |
|
Joao da Silva
2013/04/16 10:46:25
nit: order
Mattias Nissler (ping if slow)
2013/04/16 13:00:05
Done.
| |
| 20 #include "base/strings/string_number_conversions.h" | 26 #include "base/strings/string_number_conversions.h" |
| 21 #include "base/utf_string_conversions.h" | 27 #include "base/utf_string_conversions.h" |
| 22 #include "base/win/registry.h" | 28 #include "base/win/registry.h" |
| 23 #include "chrome/browser/policy/async_policy_provider.h" | 29 #include "chrome/browser/policy/async_policy_provider.h" |
| 30 #include "chrome/browser/policy/preg_parser_win.h" | |
|
Joao da Silva
2013/04/16 10:46:25
nit: order
Mattias Nissler (ping if slow)
2013/04/16 13:00:05
Done.
| |
| 24 #include "chrome/browser/policy/configuration_policy_provider_test.h" | 31 #include "chrome/browser/policy/configuration_policy_provider_test.h" |
| 25 #include "chrome/browser/policy/policy_bundle.h" | 32 #include "chrome/browser/policy/policy_bundle.h" |
| 26 #include "chrome/browser/policy/policy_map.h" | 33 #include "chrome/browser/policy/policy_map.h" |
| 27 #include "chrome/common/chrome_paths.h" | 34 #include "chrome/common/chrome_paths.h" |
| 28 #include "chrome/common/json_schema/json_schema_constants.h" | 35 #include "chrome/common/json_schema/json_schema_constants.h" |
| 29 #include "policy/policy_constants.h" | 36 #include "policy/policy_constants.h" |
| 30 #include "testing/gtest/include/gtest/gtest.h" | 37 #include "testing/gtest/include/gtest/gtest.h" |
| 31 | 38 |
| 32 namespace schema = json_schema_constants; | 39 namespace schema = json_schema_constants; |
| 33 | 40 |
| (...skipping 191 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 225 std::wstring key_name_; | 232 std::wstring key_name_; |
| 226 | 233 |
| 227 // Keys are created for the lifetime of a test to contain | 234 // Keys are created for the lifetime of a test to contain |
| 228 // the sandboxed HKCU and HKLM hives, respectively. | 235 // the sandboxed HKCU and HKLM hives, respectively. |
| 229 RegKey temp_hkcu_hive_key_; | 236 RegKey temp_hkcu_hive_key_; |
| 230 RegKey temp_hklm_hive_key_; | 237 RegKey temp_hklm_hive_key_; |
| 231 | 238 |
| 232 DISALLOW_COPY_AND_ASSIGN(ScopedGroupPolicyRegistrySandbox); | 239 DISALLOW_COPY_AND_ASSIGN(ScopedGroupPolicyRegistrySandbox); |
| 233 }; | 240 }; |
| 234 | 241 |
| 235 class TestHarness : public PolicyProviderTestHarness, | 242 // A test harness that feeds policy via the Chrome GPO registry subtree. |
| 236 public AppliedGPOListProvider { | 243 class RegistryTestHarness : public PolicyProviderTestHarness, |
| 244 public AppliedGPOListProvider { | |
| 237 public: | 245 public: |
| 238 explicit TestHarness(HKEY hive, PolicyScope scope); | 246 explicit RegistryTestHarness(HKEY hive, PolicyScope scope); |
|
Joao da Silva
2013/04/16 10:46:25
Doesn't have to be explicit.
Mattias Nissler (ping if slow)
2013/04/16 13:00:05
Done.
| |
| 239 virtual ~TestHarness(); | 247 virtual ~RegistryTestHarness(); |
| 240 | 248 |
| 249 // PolicyProviderTestHarness: | |
| 241 virtual void SetUp() OVERRIDE; | 250 virtual void SetUp() OVERRIDE; |
| 242 | 251 |
| 243 // PolicyProviderTestHarness: | |
| 244 virtual ConfigurationPolicyProvider* CreateProvider( | 252 virtual ConfigurationPolicyProvider* CreateProvider( |
| 245 const PolicyDefinitionList* policy_definition_list) OVERRIDE; | 253 const PolicyDefinitionList* policy_list) OVERRIDE; |
| 246 | 254 |
| 247 virtual void InstallEmptyPolicy() OVERRIDE; | 255 virtual void InstallEmptyPolicy() OVERRIDE; |
| 248 virtual void InstallStringPolicy(const std::string& policy_name, | 256 virtual void InstallStringPolicy(const std::string& policy_name, |
| 249 const std::string& policy_value) OVERRIDE; | 257 const std::string& policy_value) OVERRIDE; |
| 250 virtual void InstallIntegerPolicy(const std::string& policy_name, | 258 virtual void InstallIntegerPolicy(const std::string& policy_name, |
| 251 int policy_value) OVERRIDE; | 259 int policy_value) OVERRIDE; |
| 252 virtual void InstallBooleanPolicy(const std::string& policy_name, | 260 virtual void InstallBooleanPolicy(const std::string& policy_name, |
| 253 bool policy_value) OVERRIDE; | 261 bool policy_value) OVERRIDE; |
| 254 virtual void InstallStringListPolicy( | 262 virtual void InstallStringListPolicy( |
| 255 const std::string& policy_name, | 263 const std::string& policy_name, |
| (...skipping 15 matching lines...) Expand all Loading... | |
| 271 // Creates a harness instance that will install policy in HKCU or HKLM, | 279 // Creates a harness instance that will install policy in HKCU or HKLM, |
| 272 // respectively. | 280 // respectively. |
| 273 static PolicyProviderTestHarness* CreateHKCU(); | 281 static PolicyProviderTestHarness* CreateHKCU(); |
| 274 static PolicyProviderTestHarness* CreateHKLM(); | 282 static PolicyProviderTestHarness* CreateHKLM(); |
| 275 | 283 |
| 276 private: | 284 private: |
| 277 HKEY hive_; | 285 HKEY hive_; |
| 278 | 286 |
| 279 ScopedGroupPolicyRegistrySandbox registry_sandbox_; | 287 ScopedGroupPolicyRegistrySandbox registry_sandbox_; |
| 280 | 288 |
| 281 DISALLOW_COPY_AND_ASSIGN(TestHarness); | 289 DISALLOW_COPY_AND_ASSIGN(RegistryTestHarness); |
| 290 }; | |
| 291 | |
| 292 // A test harness that generates PReg files for the provider to read. | |
| 293 class PRegTestHarness : public PolicyProviderTestHarness, | |
| 294 public AppliedGPOListProvider { | |
| 295 public: | |
| 296 explicit PRegTestHarness(); | |
|
Joao da Silva
2013/04/16 10:46:25
Doesn't have to be explicit.
Mattias Nissler (ping if slow)
2013/04/16 13:00:05
Done.
| |
| 297 virtual ~PRegTestHarness(); | |
| 298 | |
| 299 // PolicyProviderTestHarness: | |
| 300 virtual void SetUp() OVERRIDE; | |
| 301 | |
| 302 virtual ConfigurationPolicyProvider* CreateProvider( | |
| 303 const PolicyDefinitionList* policy_list) OVERRIDE; | |
| 304 | |
| 305 virtual void InstallEmptyPolicy() OVERRIDE; | |
| 306 virtual void InstallStringPolicy(const std::string& policy_name, | |
| 307 const std::string& policy_value) OVERRIDE; | |
| 308 virtual void InstallIntegerPolicy(const std::string& policy_name, | |
| 309 int policy_value) OVERRIDE; | |
| 310 virtual void InstallBooleanPolicy(const std::string& policy_name, | |
| 311 bool policy_value) OVERRIDE; | |
| 312 virtual void InstallStringListPolicy( | |
| 313 const std::string& policy_name, | |
| 314 const base::ListValue* policy_value) OVERRIDE; | |
| 315 virtual void InstallDictionaryPolicy( | |
| 316 const std::string& policy_name, | |
| 317 const base::DictionaryValue* policy_value) OVERRIDE; | |
| 318 virtual void Install3rdPartyPolicy( | |
| 319 const base::DictionaryValue* policies) OVERRIDE; | |
| 320 | |
| 321 // AppliedGPOListProvider: | |
| 322 virtual DWORD GetAppliedGPOList(DWORD flags, | |
| 323 LPCTSTR machine_name, | |
| 324 PSID sid_user, | |
| 325 GUID* extension_guid, | |
| 326 PGROUP_POLICY_OBJECT* gpo_list) OVERRIDE; | |
| 327 virtual BOOL FreeGPOList(PGROUP_POLICY_OBJECT gpo_list) OVERRIDE; | |
| 328 | |
| 329 // Creates a harness instance. | |
| 330 static PolicyProviderTestHarness* Create(); | |
| 331 | |
| 332 private: | |
| 333 // Helper to append a string16 to an uint8 buffer. | |
| 334 static void AppendChars(std::vector<uint8>* buffer, const string16& chars); | |
| 335 | |
| 336 // Appends a record with the given fields to the PReg file. | |
| 337 void AppendRecordToPRegFile(const string16& path, | |
| 338 const std::string& key, | |
| 339 DWORD type, | |
| 340 DWORD size, | |
| 341 uint8* data); | |
| 342 | |
| 343 // Appends the given DWORD |value| for |path| + |key| to the PReg file. | |
| 344 void AppendDWORDToPRegFile(const string16& path, | |
| 345 const std::string& key, | |
| 346 DWORD value); | |
| 347 | |
| 348 // Appends the given string |value| for |path| + |key| to the PReg file. | |
| 349 void AppendStringToPRegFile(const string16& path, | |
| 350 const std::string& key, | |
| 351 const std::string& value); | |
| 352 | |
| 353 // Appends the given policy |value| for |path| + |key| to the PReg file, | |
| 354 // converting and recursing as necessary. | |
| 355 void AppendPolicyToPRegFile(const string16& path, | |
| 356 const std::string& key, | |
| 357 const base::Value* value); | |
| 358 | |
| 359 PolicyScope scope_; | |
|
Joao da Silva
2013/04/16 10:46:25
This isn't used.
Mattias Nissler (ping if slow)
2013/04/16 13:00:05
Done.
| |
| 360 base::ScopedTempDir temp_dir_; | |
| 361 base::FilePath preg_file_path_; | |
| 362 GROUP_POLICY_OBJECT gpo_; | |
| 363 | |
| 364 DISALLOW_COPY_AND_ASSIGN(PRegTestHarness); | |
| 282 }; | 365 }; |
| 283 | 366 |
| 284 ScopedGroupPolicyRegistrySandbox::ScopedGroupPolicyRegistrySandbox() { | 367 ScopedGroupPolicyRegistrySandbox::ScopedGroupPolicyRegistrySandbox() { |
| 285 // Generate a unique registry key for the override for each test. This | 368 // Generate a unique registry key for the override for each test. This |
| 286 // makes sure that tests executing in parallel won't delete each other's | 369 // makes sure that tests executing in parallel won't delete each other's |
| 287 // key, at DeleteKeys(). | 370 // key, at DeleteKeys(). |
| 288 key_name_ = ASCIIToWide(base::StringPrintf( | 371 key_name_ = ASCIIToWide(base::StringPrintf( |
| 289 "SOFTWARE\\chromium unittest %d", | 372 "SOFTWARE\\chromium unittest %d", |
| 290 base::Process::Current().pid())); | 373 base::Process::Current().pid())); |
| 291 std::wstring hklm_key_name = key_name_ + L"\\HKLM"; | 374 std::wstring hklm_key_name = key_name_ + L"\\HKLM"; |
| (...skipping 27 matching lines...) Expand all Loading... | |
| 319 ASSERT_HRESULT_SUCCEEDED(RegOverridePredefKey(HKEY_LOCAL_MACHINE, 0)); | 402 ASSERT_HRESULT_SUCCEEDED(RegOverridePredefKey(HKEY_LOCAL_MACHINE, 0)); |
| 320 ASSERT_HRESULT_SUCCEEDED(RegOverridePredefKey(HKEY_CURRENT_USER, 0)); | 403 ASSERT_HRESULT_SUCCEEDED(RegOverridePredefKey(HKEY_CURRENT_USER, 0)); |
| 321 } | 404 } |
| 322 | 405 |
| 323 void ScopedGroupPolicyRegistrySandbox::DeleteKeys() { | 406 void ScopedGroupPolicyRegistrySandbox::DeleteKeys() { |
| 324 RegKey key(HKEY_CURRENT_USER, key_name_.c_str(), KEY_ALL_ACCESS); | 407 RegKey key(HKEY_CURRENT_USER, key_name_.c_str(), KEY_ALL_ACCESS); |
| 325 ASSERT_TRUE(key.Valid()); | 408 ASSERT_TRUE(key.Valid()); |
| 326 key.DeleteKey(L""); | 409 key.DeleteKey(L""); |
| 327 } | 410 } |
| 328 | 411 |
| 329 TestHarness::TestHarness(HKEY hive, PolicyScope scope) | 412 RegistryTestHarness::RegistryTestHarness(HKEY hive, PolicyScope scope) |
| 330 : PolicyProviderTestHarness(POLICY_LEVEL_MANDATORY, scope), hive_(hive) {} | 413 : PolicyProviderTestHarness(POLICY_LEVEL_MANDATORY, scope), hive_(hive) {} |
| 331 | 414 |
| 332 TestHarness::~TestHarness() {} | 415 RegistryTestHarness::~RegistryTestHarness() {} |
| 333 | 416 |
| 334 void TestHarness::SetUp() {} | 417 void RegistryTestHarness::SetUp() {} |
| 335 | 418 |
| 336 DWORD TestHarness::GetAppliedGPOList(DWORD flags, | 419 ConfigurationPolicyProvider* RegistryTestHarness::CreateProvider( |
| 337 LPCTSTR machine_name, | |
| 338 PSID sid_user, | |
| 339 GUID* extension_guid, | |
| 340 PGROUP_POLICY_OBJECT* gpo_list) { | |
| 341 *gpo_list = NULL; | |
| 342 return ERROR_ACCESS_DENIED; | |
| 343 } | |
| 344 | |
| 345 BOOL TestHarness::FreeGPOList(PGROUP_POLICY_OBJECT gpo_list) { | |
| 346 return TRUE; | |
| 347 } | |
| 348 | |
| 349 ConfigurationPolicyProvider* TestHarness::CreateProvider( | |
| 350 const PolicyDefinitionList* policy_list) { | 420 const PolicyDefinitionList* policy_list) { |
| 351 scoped_ptr<AsyncPolicyLoader> loader( | 421 scoped_ptr<AsyncPolicyLoader> loader( |
| 352 new PolicyLoaderWin(policy_list, kRegistryChromePolicyKey, this)); | 422 new PolicyLoaderWin(policy_list, kRegistryChromePolicyKey, this)); |
| 353 return new AsyncPolicyProvider(loader.Pass()); | 423 return new AsyncPolicyProvider(loader.Pass()); |
| 354 } | 424 } |
| 355 | 425 |
| 356 void TestHarness::InstallEmptyPolicy() {} | 426 void RegistryTestHarness::InstallEmptyPolicy() {} |
| 357 | 427 |
| 358 void TestHarness::InstallStringPolicy(const std::string& policy_name, | 428 void RegistryTestHarness::InstallStringPolicy( |
| 359 const std::string& policy_value) { | 429 const std::string& policy_name, |
| 430 const std::string& policy_value) { | |
| 360 RegKey key(hive_, kRegistryChromePolicyKey, KEY_ALL_ACCESS); | 431 RegKey key(hive_, kRegistryChromePolicyKey, KEY_ALL_ACCESS); |
| 361 ASSERT_TRUE(key.Valid()); | 432 ASSERT_TRUE(key.Valid()); |
| 362 ASSERT_HRESULT_SUCCEEDED(key.WriteValue(UTF8ToUTF16(policy_name).c_str(), | 433 ASSERT_HRESULT_SUCCEEDED(key.WriteValue(UTF8ToUTF16(policy_name).c_str(), |
| 363 UTF8ToUTF16(policy_value).c_str())); | 434 UTF8ToUTF16(policy_value).c_str())); |
| 364 } | 435 } |
| 365 | 436 |
| 366 void TestHarness::InstallIntegerPolicy(const std::string& policy_name, | 437 void RegistryTestHarness::InstallIntegerPolicy( |
| 367 int policy_value) { | 438 const std::string& policy_name, |
| 439 int policy_value) { | |
| 368 RegKey key(hive_, kRegistryChromePolicyKey, KEY_ALL_ACCESS); | 440 RegKey key(hive_, kRegistryChromePolicyKey, KEY_ALL_ACCESS); |
| 369 ASSERT_TRUE(key.Valid()); | 441 ASSERT_TRUE(key.Valid()); |
| 370 key.WriteValue(UTF8ToUTF16(policy_name).c_str(), | 442 key.WriteValue(UTF8ToUTF16(policy_name).c_str(), |
| 371 static_cast<DWORD>(policy_value)); | 443 static_cast<DWORD>(policy_value)); |
| 372 } | 444 } |
| 373 | 445 |
| 374 void TestHarness::InstallBooleanPolicy(const std::string& policy_name, | 446 void RegistryTestHarness::InstallBooleanPolicy( |
| 375 bool policy_value) { | 447 const std::string& policy_name, |
| 448 bool policy_value) { | |
| 376 RegKey key(hive_, kRegistryChromePolicyKey, KEY_ALL_ACCESS); | 449 RegKey key(hive_, kRegistryChromePolicyKey, KEY_ALL_ACCESS); |
| 377 ASSERT_TRUE(key.Valid()); | 450 ASSERT_TRUE(key.Valid()); |
| 378 key.WriteValue(UTF8ToUTF16(policy_name).c_str(), | 451 key.WriteValue(UTF8ToUTF16(policy_name).c_str(), |
| 379 static_cast<DWORD>(policy_value)); | 452 static_cast<DWORD>(policy_value)); |
| 380 } | 453 } |
| 381 | 454 |
| 382 void TestHarness::InstallStringListPolicy(const std::string& policy_name, | 455 void RegistryTestHarness::InstallStringListPolicy( |
| 383 const base::ListValue* policy_value) { | 456 const std::string& policy_name, |
| 457 const base::ListValue* policy_value) { | |
| 384 RegKey key(hive_, | 458 RegKey key(hive_, |
| 385 (string16(kRegistryChromePolicyKey) + ASCIIToUTF16("\\") + | 459 (string16(kRegistryChromePolicyKey) + ASCIIToUTF16("\\") + |
| 386 UTF8ToUTF16(policy_name)).c_str(), | 460 UTF8ToUTF16(policy_name)).c_str(), |
| 387 KEY_ALL_ACCESS); | 461 KEY_ALL_ACCESS); |
| 388 ASSERT_TRUE(key.Valid()); | 462 ASSERT_TRUE(key.Valid()); |
| 389 int index = 1; | 463 int index = 1; |
| 390 for (base::ListValue::const_iterator element(policy_value->begin()); | 464 for (base::ListValue::const_iterator element(policy_value->begin()); |
| 391 element != policy_value->end(); | 465 element != policy_value->end(); |
| 392 ++element) { | 466 ++element) { |
| 393 std::string element_value; | 467 std::string element_value; |
| 394 if (!(*element)->GetAsString(&element_value)) | 468 if (!(*element)->GetAsString(&element_value)) |
| 395 continue; | 469 continue; |
| 396 std::string name(base::IntToString(index++)); | 470 std::string name(base::IntToString(index++)); |
| 397 key.WriteValue(UTF8ToUTF16(name).c_str(), | 471 key.WriteValue(UTF8ToUTF16(name).c_str(), |
| 398 UTF8ToUTF16(element_value).c_str()); | 472 UTF8ToUTF16(element_value).c_str()); |
| 399 } | 473 } |
| 400 } | 474 } |
| 401 | 475 |
| 402 void TestHarness::InstallDictionaryPolicy( | 476 void RegistryTestHarness::InstallDictionaryPolicy( |
| 403 const std::string& policy_name, | 477 const std::string& policy_name, |
| 404 const base::DictionaryValue* policy_value) { | 478 const base::DictionaryValue* policy_value) { |
| 405 std::string json; | 479 std::string json; |
| 406 base::JSONWriter::Write(policy_value, &json); | 480 base::JSONWriter::Write(policy_value, &json); |
| 407 RegKey key(hive_, kRegistryChromePolicyKey, KEY_ALL_ACCESS); | 481 RegKey key(hive_, kRegistryChromePolicyKey, KEY_ALL_ACCESS); |
| 408 ASSERT_TRUE(key.Valid()); | 482 ASSERT_TRUE(key.Valid()); |
| 409 key.WriteValue(UTF8ToUTF16(policy_name).c_str(), | 483 key.WriteValue(UTF8ToUTF16(policy_name).c_str(), |
| 410 UTF8ToUTF16(json).c_str()); | 484 UTF8ToUTF16(json).c_str()); |
| 411 } | 485 } |
| 412 | 486 |
| 413 void TestHarness::Install3rdPartyPolicy(const base::DictionaryValue* policies) { | 487 void RegistryTestHarness::Install3rdPartyPolicy( |
| 488 const base::DictionaryValue* policies) { | |
| 414 // The first level entries are domains, and the second level entries map | 489 // The first level entries are domains, and the second level entries map |
| 415 // components to their policy. | 490 // components to their policy. |
| 416 const string16 kPathPrefix = string16(kRegistryChromePolicyKey) + kPathSep + | 491 const string16 kPathPrefix = string16(kRegistryChromePolicyKey) + kPathSep + |
| 417 kThirdParty + kPathSep; | 492 kThirdParty + kPathSep; |
| 418 for (base::DictionaryValue::Iterator domain(*policies); | 493 for (base::DictionaryValue::Iterator domain(*policies); |
| 419 !domain.IsAtEnd(); domain.Advance()) { | 494 !domain.IsAtEnd(); domain.Advance()) { |
| 420 const base::DictionaryValue* components = NULL; | 495 const base::DictionaryValue* components = NULL; |
| 421 if (!domain.value().GetAsDictionary(&components)) { | 496 if (!domain.value().GetAsDictionary(&components)) { |
| 422 ADD_FAILURE(); | 497 ADD_FAILURE(); |
| 423 continue; | 498 continue; |
| 424 } | 499 } |
| 425 for (base::DictionaryValue::Iterator component(*components); | 500 for (base::DictionaryValue::Iterator component(*components); |
| 426 !component.IsAtEnd(); component.Advance()) { | 501 !component.IsAtEnd(); component.Advance()) { |
| 427 const string16 path = string16(kRegistryChromePolicyKey) + kPathSep + | 502 const string16 path = kPathPrefix + |
| 428 kThirdParty + kPathSep + | |
| 429 UTF8ToUTF16(domain.key()) + kPathSep + | 503 UTF8ToUTF16(domain.key()) + kPathSep + |
| 430 UTF8ToUTF16(component.key()); | 504 UTF8ToUTF16(component.key()); |
| 431 InstallValue(component.value(), hive_, path, kMandatory); | 505 InstallValue(component.value(), hive_, path, kMandatory); |
| 432 EXPECT_TRUE(InstallSchema(component.value(), hive_, path, kSchema)); | 506 EXPECT_TRUE(InstallSchema(component.value(), hive_, path, kSchema)); |
| 433 } | 507 } |
| 434 } | 508 } |
| 435 } | 509 } |
| 436 | 510 |
| 437 // static | 511 DWORD RegistryTestHarness::GetAppliedGPOList(DWORD flags, |
| 438 PolicyProviderTestHarness* TestHarness::CreateHKCU() { | 512 LPCTSTR machine_name, |
| 439 return new TestHarness(HKEY_CURRENT_USER, POLICY_SCOPE_USER); | 513 PSID sid_user, |
| 440 } | 514 GUID* extension_guid, |
| 441 | 515 PGROUP_POLICY_OBJECT* gpo_list) { |
|
Joao da Silva
2013/04/16 10:46:25
nit: indent
Mattias Nissler (ping if slow)
2013/04/16 13:00:05
Done.
| |
| 442 // static | 516 *gpo_list = NULL; |
| 443 PolicyProviderTestHarness* TestHarness::CreateHKLM() { | 517 return ERROR_ACCESS_DENIED; |
| 444 return new TestHarness(HKEY_LOCAL_MACHINE, POLICY_SCOPE_MACHINE); | 518 } |
| 519 | |
| 520 BOOL RegistryTestHarness::FreeGPOList(PGROUP_POLICY_OBJECT gpo_list) { | |
| 521 return TRUE; | |
| 522 } | |
| 523 | |
| 524 // static | |
| 525 PolicyProviderTestHarness* RegistryTestHarness::CreateHKCU() { | |
| 526 return new RegistryTestHarness(HKEY_CURRENT_USER, POLICY_SCOPE_USER); | |
| 527 } | |
| 528 | |
| 529 // static | |
| 530 PolicyProviderTestHarness* RegistryTestHarness::CreateHKLM() { | |
| 531 return new RegistryTestHarness(HKEY_LOCAL_MACHINE, POLICY_SCOPE_MACHINE); | |
| 532 } | |
| 533 | |
| 534 PRegTestHarness::PRegTestHarness() | |
| 535 : PolicyProviderTestHarness(POLICY_LEVEL_MANDATORY, POLICY_SCOPE_MACHINE) {} | |
| 536 | |
| 537 PRegTestHarness::~PRegTestHarness() { | |
| 538 temp_dir_.Take(); | |
|
Joao da Silva
2013/04/16 10:46:25
Why? Did you intend to remove this before uploadin
Mattias Nissler (ping if slow)
2013/04/16 13:00:05
This happens if you only get to work on a given th
| |
| 539 } | |
| 540 | |
| 541 void PRegTestHarness::SetUp() { | |
| 542 ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); | |
| 543 preg_file_path_ = temp_dir_.path().Append(PolicyLoaderWin::kPRegFileName); | |
| 544 ASSERT_TRUE(file_util::WriteFile(preg_file_path_, | |
| 545 preg_parser::kPRegFileHeader, | |
| 546 arraysize(preg_parser::kPRegFileHeader))); | |
| 547 | |
| 548 memset(&gpo_, 0, sizeof(GROUP_POLICY_OBJECT)); | |
| 549 gpo_.lpFileSysPath = const_cast<wchar_t*>(temp_dir_.path().value().c_str()); | |
| 550 } | |
| 551 | |
| 552 ConfigurationPolicyProvider* PRegTestHarness::CreateProvider( | |
| 553 const PolicyDefinitionList* policy_list) { | |
| 554 scoped_ptr<AsyncPolicyLoader> loader( | |
| 555 new PolicyLoaderWin(policy_list, kRegistryChromePolicyKey, this)); | |
| 556 return new AsyncPolicyProvider(loader.Pass()); | |
| 557 } | |
| 558 | |
| 559 void PRegTestHarness::InstallEmptyPolicy() {} | |
| 560 | |
| 561 void PRegTestHarness::InstallStringPolicy(const std::string& policy_name, | |
| 562 const std::string& policy_value) { | |
| 563 AppendStringToPRegFile(kRegistryChromePolicyKey, policy_name, policy_value); | |
| 564 } | |
| 565 | |
| 566 void PRegTestHarness::InstallIntegerPolicy(const std::string& policy_name, | |
| 567 int policy_value) { | |
| 568 AppendDWORDToPRegFile(kRegistryChromePolicyKey, policy_name, policy_value); | |
| 569 } | |
| 570 | |
| 571 void PRegTestHarness::InstallBooleanPolicy(const std::string& policy_name, | |
| 572 bool policy_value) { | |
| 573 AppendDWORDToPRegFile(kRegistryChromePolicyKey, policy_name, policy_value); | |
| 574 } | |
| 575 | |
| 576 void PRegTestHarness::InstallStringListPolicy( | |
| 577 const std::string& policy_name, | |
| 578 const base::ListValue* policy_value) { | |
| 579 AppendPolicyToPRegFile(kRegistryChromePolicyKey, policy_name, policy_value); | |
| 580 } | |
| 581 | |
| 582 void PRegTestHarness::InstallDictionaryPolicy( | |
| 583 const std::string& policy_name, | |
| 584 const base::DictionaryValue* policy_value) { | |
| 585 std::string json; | |
| 586 base::JSONWriter::Write(policy_value, &json); | |
| 587 AppendStringToPRegFile(kRegistryChromePolicyKey, policy_name, json); | |
| 588 } | |
| 589 | |
| 590 void PRegTestHarness::Install3rdPartyPolicy( | |
| 591 const base::DictionaryValue* policies) { | |
| 592 // The first level entries are domains, and the second level entries map | |
| 593 // components to their policy. | |
| 594 const string16 kPathPrefix = string16(kRegistryChromePolicyKey) + kPathSep + | |
| 595 kThirdParty + kPathSep; | |
| 596 for (base::DictionaryValue::Iterator domain(*policies); | |
| 597 !domain.IsAtEnd(); domain.Advance()) { | |
| 598 const base::DictionaryValue* components = NULL; | |
| 599 if (!domain.value().GetAsDictionary(&components)) { | |
| 600 ADD_FAILURE(); | |
| 601 continue; | |
| 602 } | |
| 603 const string16 domain_path = kPathPrefix + UTF8ToUTF16(domain.key()); | |
| 604 for (base::DictionaryValue::Iterator component(*components); | |
| 605 !component.IsAtEnd(); component.Advance()) { | |
| 606 const string16 component_path = | |
| 607 domain_path + kPathSep + UTF8ToUTF16(component.key()); | |
| 608 AppendPolicyToPRegFile(component_path, UTF16ToUTF8(kMandatory), | |
| 609 &component.value()); | |
| 610 | |
| 611 scoped_ptr<base::DictionaryValue> schema_dict( | |
| 612 BuildSchema(component.value())); | |
| 613 std::string schema_json; | |
| 614 base::JSONWriter::Write(schema_dict.get(), &schema_json); | |
| 615 if (!schema_json.empty()) { | |
| 616 AppendStringToPRegFile(component_path, UTF16ToUTF8(kSchema), | |
| 617 schema_json); | |
| 618 } | |
| 619 } | |
| 620 } | |
| 621 } | |
| 622 | |
| 623 DWORD PRegTestHarness::GetAppliedGPOList(DWORD flags, | |
| 624 LPCTSTR machine_name, | |
| 625 PSID sid_user, | |
| 626 GUID* extension_guid, | |
| 627 PGROUP_POLICY_OBJECT* gpo_list) { | |
| 628 *gpo_list = flags & GPO_LIST_FLAG_MACHINE ? &gpo_ : NULL; | |
| 629 return ERROR_SUCCESS; | |
| 630 } | |
| 631 | |
| 632 BOOL PRegTestHarness::FreeGPOList(PGROUP_POLICY_OBJECT gpo_list) { | |
| 633 return TRUE; | |
| 634 } | |
| 635 | |
| 636 // static | |
| 637 PolicyProviderTestHarness* PRegTestHarness::Create() { | |
| 638 return new PRegTestHarness(); | |
| 639 } | |
| 640 | |
| 641 // static | |
| 642 void PRegTestHarness::AppendChars(std::vector<uint8>* buffer, | |
| 643 const string16& chars) { | |
| 644 for (string16::const_iterator c(chars.begin()); c != chars.end(); ++c) { | |
| 645 buffer->push_back(*c & 0xff); | |
| 646 buffer->push_back((*c >> 8) & 0xff); | |
| 647 } | |
| 648 } | |
| 649 | |
| 650 void PRegTestHarness::AppendRecordToPRegFile(const string16& path, | |
| 651 const std::string& key, | |
| 652 DWORD type, | |
| 653 DWORD size, | |
| 654 uint8* data) { | |
| 655 std::vector<uint8> buffer; | |
| 656 AppendChars(&buffer, L"["); | |
| 657 AppendChars(&buffer, path); | |
| 658 AppendChars(&buffer, string16(L"\0;", 2)); | |
| 659 AppendChars(&buffer, UTF8ToUTF16(key)); | |
| 660 AppendChars(&buffer, string16(L"\0;", 2)); | |
| 661 uint8* type_data = reinterpret_cast<uint8*>(&type); | |
| 662 buffer.insert(buffer.end(), type_data, type_data + sizeof(DWORD)); | |
| 663 AppendChars(&buffer, L";"); | |
| 664 uint8* size_data = reinterpret_cast<uint8*>(&size); | |
| 665 buffer.insert(buffer.end(), size_data, size_data + sizeof(DWORD)); | |
| 666 AppendChars(&buffer, L";"); | |
| 667 buffer.insert(buffer.end(), data, data + size); | |
| 668 AppendChars(&buffer, L"]"); | |
| 669 | |
| 670 ASSERT_EQ(buffer.size(), | |
| 671 file_util::AppendToFile( | |
| 672 preg_file_path_, | |
| 673 reinterpret_cast<const char*>(vector_as_array(&buffer)), | |
| 674 buffer.size())); | |
| 675 } | |
| 676 | |
| 677 void PRegTestHarness::AppendDWORDToPRegFile(const string16& path, | |
| 678 const std::string& key, | |
| 679 DWORD value) { | |
| 680 AppendRecordToPRegFile(path, key, REG_DWORD, sizeof(DWORD), | |
| 681 reinterpret_cast<uint8*>(&value)); | |
| 682 } | |
| 683 | |
| 684 void PRegTestHarness::AppendStringToPRegFile(const string16& path, | |
| 685 const std::string& key, | |
| 686 const std::string& value) { | |
| 687 string16 string16_value(UTF8ToUTF16(value)); | |
| 688 std::vector<char16> data; | |
| 689 std::transform(string16_value.begin(), string16_value.end(), | |
| 690 std::back_inserter(data), std::ptr_fun(base::ByteSwapToLE16)); | |
|
Joao da Silva
2013/04/16 10:46:25
#include <functional>
Mattias Nissler (ping if slow)
2013/04/16 13:00:05
Done.
| |
| 691 data.push_back(base::ByteSwapToLE16(L'\0')); | |
| 692 | |
| 693 AppendRecordToPRegFile(path, key, REG_SZ, data.size() * sizeof(char16), | |
| 694 reinterpret_cast<uint8*>(vector_as_array(&data))); | |
| 695 } | |
| 696 | |
| 697 void PRegTestHarness::AppendPolicyToPRegFile(const string16& path, | |
| 698 const std::string& key, | |
| 699 const base::Value* value) { | |
| 700 switch (value->GetType()) { | |
| 701 case base::Value::TYPE_BOOLEAN: { | |
| 702 bool boolean_value = false; | |
| 703 ASSERT_TRUE(value->GetAsBoolean(&boolean_value)); | |
| 704 AppendDWORDToPRegFile(path, key, boolean_value); | |
| 705 break; | |
| 706 } | |
| 707 case base::Value::TYPE_INTEGER: { | |
| 708 int int_value = 0; | |
| 709 ASSERT_TRUE(value->GetAsInteger(&int_value)); | |
| 710 AppendDWORDToPRegFile(path, key, int_value); | |
| 711 break; | |
| 712 } | |
| 713 case base::Value::TYPE_DOUBLE: { | |
| 714 double double_value = 0; | |
| 715 std::string string_value; | |
| 716 ASSERT_TRUE(value->GetAsDouble(&double_value)); | |
| 717 AppendStringToPRegFile(path, key, base::DoubleToString(double_value)); | |
| 718 break; | |
| 719 } | |
| 720 case base::Value::TYPE_STRING: { | |
| 721 std::string string_value; | |
| 722 ASSERT_TRUE(value->GetAsString(&string_value)); | |
| 723 AppendStringToPRegFile(path, key, string_value); | |
| 724 break; | |
| 725 } | |
| 726 case base::Value::TYPE_DICTIONARY: { | |
| 727 string16 subpath = path + kPathSep + UTF8ToUTF16(key); | |
| 728 const base::DictionaryValue* dict = NULL; | |
| 729 ASSERT_TRUE(value->GetAsDictionary(&dict)); | |
| 730 for (base::DictionaryValue::Iterator entry(*dict); !entry.IsAtEnd(); | |
| 731 entry.Advance()) { | |
| 732 AppendPolicyToPRegFile(subpath, entry.key(), &entry.value()); | |
| 733 } | |
| 734 break; | |
| 735 } | |
| 736 case base::Value::TYPE_LIST: { | |
| 737 string16 subpath = path + kPathSep + UTF8ToUTF16(key); | |
| 738 const base::ListValue* list = NULL; | |
| 739 ASSERT_TRUE(value->GetAsList(&list)); | |
| 740 for (size_t i = 0; i < list->GetSize(); ++i) { | |
| 741 const base::Value* entry = NULL; | |
| 742 ASSERT_TRUE(list->Get(i, &entry)); | |
| 743 AppendPolicyToPRegFile(subpath, base::IntToString(i + 1), entry); | |
| 744 } | |
| 745 break; | |
| 746 } | |
| 747 case base::Value::TYPE_BINARY: | |
| 748 case base::Value::TYPE_NULL: { | |
| 749 ADD_FAILURE(); | |
| 750 break; | |
| 751 } | |
| 752 } | |
| 445 } | 753 } |
| 446 | 754 |
| 447 } // namespace | 755 } // namespace |
| 448 | 756 |
| 449 // Instantiate abstract test case for basic policy reading tests. | 757 // Instantiate abstract test case for basic policy reading tests. |
| 450 INSTANTIATE_TEST_CASE_P( | 758 INSTANTIATE_TEST_CASE_P( |
| 451 PolicyProviderWinTest, | 759 PolicyProviderWinTest, |
| 452 ConfigurationPolicyProviderTest, | 760 ConfigurationPolicyProviderTest, |
| 453 testing::Values(TestHarness::CreateHKCU, TestHarness::CreateHKLM)); | 761 testing::Values(RegistryTestHarness::CreateHKCU, |
| 762 RegistryTestHarness::CreateHKLM, | |
| 763 PRegTestHarness::Create)); | |
| 454 | 764 |
| 455 // Instantiate abstract test case for 3rd party policy reading tests. | 765 // Instantiate abstract test case for 3rd party policy reading tests. |
| 456 INSTANTIATE_TEST_CASE_P( | 766 INSTANTIATE_TEST_CASE_P( |
| 457 ThirdPartyPolicyProviderWinTest, | 767 ThirdPartyPolicyProviderWinTest, |
| 458 Configuration3rdPartyPolicyProviderTest, | 768 Configuration3rdPartyPolicyProviderTest, |
| 459 testing::Values(TestHarness::CreateHKCU, TestHarness::CreateHKLM)); | 769 testing::Values(RegistryTestHarness::CreateHKCU, |
| 770 RegistryTestHarness::CreateHKLM, | |
| 771 PRegTestHarness::Create)); | |
| 460 | 772 |
| 461 // Test cases for windows policy provider specific functionality. | 773 // Test cases for windows policy provider specific functionality. |
| 462 class PolicyLoaderWinTest : public PolicyTestBase, | 774 class PolicyLoaderWinTest : public PolicyTestBase, |
| 463 public AppliedGPOListProvider { | 775 public AppliedGPOListProvider { |
| 464 protected: | 776 protected: |
| 465 // The policy key this tests places data under. This must match the data | 777 // The policy key this tests places data under. This must match the data |
| 466 // files in chrome/test/data/policy/gpo. | 778 // files in chrome/test/data/policy/gpo. |
| 467 static const char16 kTestPolicyKey[]; | 779 static const char16 kTestPolicyKey[]; |
| 468 | 780 |
| 469 PolicyLoaderWinTest() | 781 PolicyLoaderWinTest() |
| (...skipping 381 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 851 GROUP_POLICY_OBJECT gpo2; | 1163 GROUP_POLICY_OBJECT gpo2; |
| 852 InitGPO(&gpo1, 0, gpo_dir, &gpo2, NULL); | 1164 InitGPO(&gpo1, 0, gpo_dir, &gpo2, NULL); |
| 853 InitGPO(&gpo2, 0, unc_path, NULL, &gpo1); | 1165 InitGPO(&gpo2, 0, unc_path, NULL, &gpo1); |
| 854 gpo_list_ = &gpo1; | 1166 gpo_list_ = &gpo1; |
| 855 gpo_list_status_ = ERROR_SUCCESS; | 1167 gpo_list_status_ = ERROR_SUCCESS; |
| 856 | 1168 |
| 857 EXPECT_TRUE(MatchesRegistrySentinel()); | 1169 EXPECT_TRUE(MatchesRegistrySentinel()); |
| 858 } | 1170 } |
| 859 | 1171 |
| 860 } // namespace policy | 1172 } // namespace policy |
| OLD | NEW |