OLD | NEW |
---|---|
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/prefs/profile_pref_store_manager.h" | 5 #include "chrome/browser/prefs/profile_pref_store_manager.h" |
6 | 6 |
7 #include <vector> | 7 #include <vector> |
8 | 8 |
9 #include "base/compiler_specific.h" | 9 #include "base/compiler_specific.h" |
10 #include "base/file_util.h" | 10 #include "base/file_util.h" |
11 #include "base/files/file_enumerator.h" | |
11 #include "base/files/scoped_temp_dir.h" | 12 #include "base/files/scoped_temp_dir.h" |
12 #include "base/memory/ref_counted.h" | 13 #include "base/memory/ref_counted.h" |
13 #include "base/memory/scoped_ptr.h" | 14 #include "base/memory/scoped_ptr.h" |
14 #include "base/message_loop/message_loop.h" | 15 #include "base/message_loop/message_loop.h" |
15 #include "base/prefs/json_pref_store.h" | 16 #include "base/prefs/json_pref_store.h" |
16 #include "base/prefs/persistent_pref_store.h" | 17 #include "base/prefs/persistent_pref_store.h" |
17 #include "base/prefs/pref_service.h" | 18 #include "base/prefs/pref_service.h" |
19 #include "base/prefs/pref_service_factory.h" | |
18 #include "base/prefs/pref_store.h" | 20 #include "base/prefs/pref_store.h" |
19 #include "base/prefs/testing_pref_service.h" | 21 #include "base/prefs/testing_pref_service.h" |
20 #include "base/run_loop.h" | 22 #include "base/run_loop.h" |
21 #include "base/strings/string_util.h" | 23 #include "base/strings/string_util.h" |
22 #include "base/values.h" | 24 #include "base/values.h" |
23 #include "chrome/browser/prefs/pref_hash_filter.h" | 25 #include "chrome/browser/prefs/pref_hash_filter.h" |
24 #include "components/user_prefs/pref_registry_syncable.h" | 26 #include "components/user_prefs/pref_registry_syncable.h" |
25 #include "testing/gtest/include/gtest/gtest.h" | 27 #include "testing/gtest/include/gtest/gtest.h" |
26 | 28 |
27 namespace { | 29 namespace { |
(...skipping 25 matching lines...) Expand all Loading... | |
53 FirstEqualsPredicate(key))) | 55 FirstEqualsPredicate(key))) |
54 << "Unregistered key " << key << " was changed."; | 56 << "Unregistered key " << key << " was changed."; |
55 } | 57 } |
56 | 58 |
57 virtual void OnInitializationCompleted(bool succeeded) OVERRIDE {} | 59 virtual void OnInitializationCompleted(bool succeeded) OVERRIDE {} |
58 | 60 |
59 private: | 61 private: |
60 scoped_refptr<PrefRegistry> pref_registry_; | 62 scoped_refptr<PrefRegistry> pref_registry_; |
61 }; | 63 }; |
62 | 64 |
65 const char kUnprotectedAtomic[] = "unprotected_atomic"; | |
gab
2014/04/03 15:38:49
nit: s/unprotected_atomic/unprotected_pref
"atomi
| |
63 const char kTrackedAtomic[] = "tracked_atomic"; | 66 const char kTrackedAtomic[] = "tracked_atomic"; |
64 const char kProtectedAtomic[] = "protected_atomic"; | 67 const char kProtectedAtomic[] = "protected_atomic"; |
65 const char kProtectedSplit[] = "protected_split"; | |
66 | 68 |
67 const char kFoobar[] = "FOOBAR"; | 69 const char kFoobar[] = "FOOBAR"; |
68 const char kBarfoo[] = "BARFOO"; | 70 const char kBarfoo[] = "BARFOO"; |
69 const char kHelloWorld[] = "HELLOWORLD"; | 71 const char kHelloWorld[] = "HELLOWORLD"; |
70 const char kGoodbyeWorld[] = "GOODBYEWORLD"; | 72 const char kGoodbyeWorld[] = "GOODBYEWORLD"; |
71 | 73 |
72 const PrefHashFilter::TrackedPreferenceMetadata kConfiguration[] = { | 74 const PrefHashFilter::TrackedPreferenceMetadata kConfiguration[] = { |
73 {0, kTrackedAtomic, PrefHashFilter::NO_ENFORCEMENT, | 75 {0u, kTrackedAtomic, PrefHashFilter::NO_ENFORCEMENT, |
74 PrefHashFilter::TRACKING_STRATEGY_ATOMIC}, | 76 PrefHashFilter::TRACKING_STRATEGY_ATOMIC}, |
75 {1, kProtectedAtomic, PrefHashFilter::ENFORCE_ON_LOAD, | 77 {1u, kProtectedAtomic, PrefHashFilter::ENFORCE_ON_LOAD, |
76 PrefHashFilter::TRACKING_STRATEGY_ATOMIC}, | 78 PrefHashFilter::TRACKING_STRATEGY_ATOMIC}}; |
77 {2, kProtectedSplit, PrefHashFilter::ENFORCE_ON_LOAD, | 79 |
78 PrefHashFilter::TRACKING_STRATEGY_SPLIT}}; | 80 const size_t kExtraReportingId = 2u; |
81 const size_t kReportingIdCount = 3u; | |
79 | 82 |
80 } // namespace | 83 } // namespace |
81 | 84 |
82 class ProfilePrefStoreManagerTest : public testing::Test { | 85 class ProfilePrefStoreManagerTest : public testing::Test { |
83 public: | 86 public: |
84 ProfilePrefStoreManagerTest() | 87 ProfilePrefStoreManagerTest() |
85 : configuration_(kConfiguration, | 88 : configuration_(kConfiguration, |
86 kConfiguration + arraysize(kConfiguration)), | 89 kConfiguration + arraysize(kConfiguration)), |
87 profile_pref_registry_(new user_prefs::PrefRegistrySyncable), | 90 profile_pref_registry_(new user_prefs::PrefRegistrySyncable), |
88 registry_verifier_(profile_pref_registry_) {} | 91 registry_verifier_(profile_pref_registry_) {} |
89 | 92 |
90 virtual void SetUp() OVERRIDE { | 93 virtual void SetUp() OVERRIDE { |
91 ProfilePrefStoreManager::RegisterPrefs(local_state_.registry()); | 94 ProfilePrefStoreManager::RegisterPrefs(local_state_.registry()); |
92 ProfilePrefStoreManager::RegisterProfilePrefs(profile_pref_registry_); | 95 ProfilePrefStoreManager::RegisterProfilePrefs(profile_pref_registry_); |
93 for (const PrefHashFilter::TrackedPreferenceMetadata* it = kConfiguration; | 96 for (const PrefHashFilter::TrackedPreferenceMetadata* it = kConfiguration; |
94 it != kConfiguration + arraysize(kConfiguration); | 97 it != kConfiguration + arraysize(kConfiguration); |
95 ++it) { | 98 ++it) { |
96 if (it->strategy == PrefHashFilter::TRACKING_STRATEGY_ATOMIC) { | 99 if (it->strategy == PrefHashFilter::TRACKING_STRATEGY_ATOMIC) { |
97 profile_pref_registry_->RegisterStringPref( | 100 profile_pref_registry_->RegisterStringPref( |
98 it->name, "", user_prefs::PrefRegistrySyncable::UNSYNCABLE_PREF); | 101 it->name, "", user_prefs::PrefRegistrySyncable::UNSYNCABLE_PREF); |
gab
2014/04/03 15:38:49
nit: s/""/std::string()
| |
99 } else { | 102 } else { |
100 profile_pref_registry_->RegisterDictionaryPref( | 103 profile_pref_registry_->RegisterDictionaryPref( |
101 it->name, user_prefs::PrefRegistrySyncable::UNSYNCABLE_PREF); | 104 it->name, user_prefs::PrefRegistrySyncable::UNSYNCABLE_PREF); |
102 } | 105 } |
103 } | 106 } |
107 profile_pref_registry_->RegisterStringPref( | |
108 kUnprotectedAtomic, | |
109 std::string(), | |
110 user_prefs::PrefRegistrySyncable::UNSYNCABLE_PREF); | |
111 | |
104 ASSERT_TRUE(profile_dir_.CreateUniqueTempDir()); | 112 ASSERT_TRUE(profile_dir_.CreateUniqueTempDir()); |
113 ReloadConfiguration(); | |
114 } | |
105 | 115 |
116 void ReloadConfiguration() { | |
106 manager_.reset(new ProfilePrefStoreManager(profile_dir_.path(), | 117 manager_.reset(new ProfilePrefStoreManager(profile_dir_.path(), |
107 configuration_, | 118 configuration_, |
108 configuration_.size(), | 119 kReportingIdCount, |
109 "seed", | 120 "seed", |
110 "device_id", | 121 "device_id", |
111 &local_state_)); | 122 &local_state_)); |
112 } | 123 } |
113 | 124 |
114 virtual void TearDown() OVERRIDE { | 125 virtual void TearDown() OVERRIDE { DestroyPrefStore(); } |
126 | |
127 protected: | |
128 bool WasResetRecorded() { | |
129 base::PrefServiceFactory pref_service_factory; | |
130 pref_service_factory.set_user_prefs(pref_store_); | |
131 | |
132 scoped_ptr<PrefService> pref_service( | |
133 pref_service_factory.Create(profile_pref_registry_)); | |
134 | |
135 return !ProfilePrefStoreManager::GetResetTime(pref_service.get()).is_null(); | |
136 } | |
137 | |
138 void InitializePrefs() { | |
139 // According to the implementation of ProfilePrefStoreManager, this is | |
140 // actually a SegregatedPrefStore backed by two underlying pref stores. | |
141 scoped_refptr<PersistentPrefStore> pref_store = | |
142 manager_->CreateProfilePrefStore( | |
143 main_message_loop_.message_loop_proxy()); | |
144 InitializePrefStore(pref_store); | |
145 pref_store = NULL; | |
146 base::RunLoop().RunUntilIdle(); | |
147 } | |
148 | |
149 void DestroyPrefStore() { | |
115 if (pref_store_) { | 150 if (pref_store_) { |
116 // Force everything to be written to disk, triggering the PrefHashFilter | 151 // Force everything to be written to disk, triggering the PrefHashFilter |
117 // while our RegistryVerifier is watching. | 152 // while our RegistryVerifier is watching. |
118 pref_store_->CommitPendingWrite(); | 153 pref_store_->CommitPendingWrite(); |
119 base::RunLoop().RunUntilIdle(); | 154 base::RunLoop().RunUntilIdle(); |
120 | 155 |
121 pref_store_->RemoveObserver(®istry_verifier_); | 156 pref_store_->RemoveObserver(®istry_verifier_); |
122 pref_store_ = NULL; | 157 pref_store_ = NULL; |
123 // Nothing should have to happen on the background threads, but just in | 158 // Nothing should have to happen on the background threads, but just in |
124 // case... | 159 // case... |
125 base::RunLoop().RunUntilIdle(); | 160 base::RunLoop().RunUntilIdle(); |
126 } | 161 } |
127 } | 162 } |
128 | 163 |
129 protected: | 164 void InitializeDeprecatedCombinedProfilePrefStore() { |
130 void InitializePrefs() { | |
131 scoped_refptr<PersistentPrefStore> pref_store = | 165 scoped_refptr<PersistentPrefStore> pref_store = |
132 manager_->CreateProfilePrefStore( | 166 manager_->CreateDeprecatedCombinedProfilePrefStore( |
133 main_message_loop_.message_loop_proxy()); | 167 main_message_loop_.message_loop_proxy()); |
134 pref_store->AddObserver(®istry_verifier_); | 168 InitializePrefStore(pref_store); |
135 PersistentPrefStore::PrefReadError error = pref_store->ReadPrefs(); | |
136 ASSERT_EQ(PersistentPrefStore::PREF_READ_ERROR_NO_FILE, error); | |
137 pref_store->SetValue(kTrackedAtomic, new base::StringValue(kFoobar)); | |
138 pref_store->SetValue(kProtectedAtomic, new base::StringValue(kHelloWorld)); | |
139 pref_store->RemoveObserver(®istry_verifier_); | |
140 pref_store = NULL; | 169 pref_store = NULL; |
141 base::RunLoop().RunUntilIdle(); | 170 base::RunLoop().RunUntilIdle(); |
142 } | 171 } |
143 | 172 |
173 void InitializePrefStore(PersistentPrefStore* pref_store) { | |
174 pref_store->AddObserver(®istry_verifier_); | |
175 PersistentPrefStore::PrefReadError error = pref_store->ReadPrefs(); | |
176 EXPECT_EQ(PersistentPrefStore::PREF_READ_ERROR_NO_FILE, error); | |
177 pref_store->SetValue(kTrackedAtomic, new base::StringValue(kFoobar)); | |
178 pref_store->SetValue(kProtectedAtomic, new base::StringValue(kHelloWorld)); | |
179 pref_store->SetValue(kUnprotectedAtomic, new base::StringValue(kFoobar)); | |
180 pref_store->RemoveObserver(®istry_verifier_); | |
181 pref_store->CommitPendingWrite(); | |
182 base::RunLoop().RunUntilIdle(); | |
183 } | |
184 | |
144 void LoadExistingPrefs() { | 185 void LoadExistingPrefs() { |
186 DestroyPrefStore(); | |
145 pref_store_ = manager_->CreateProfilePrefStore( | 187 pref_store_ = manager_->CreateProfilePrefStore( |
146 main_message_loop_.message_loop_proxy()); | 188 main_message_loop_.message_loop_proxy()); |
147 pref_store_->AddObserver(®istry_verifier_); | 189 pref_store_->AddObserver(®istry_verifier_); |
148 EXPECT_EQ(PersistentPrefStore::PREF_READ_ERROR_NONE, | 190 pref_store_->ReadPrefs(); |
149 pref_store_->ReadPrefs()); | |
150 } | 191 } |
151 | 192 |
152 void ReplaceStringInPrefs(const std::string& find, | 193 void ReplaceStringInPrefs(const std::string& find, |
153 const std::string& replace) { | 194 const std::string& replace) { |
154 // Tamper with the file's contents | 195 base::FileEnumerator file_enum( |
155 base::FilePath pref_file_path = | 196 profile_dir_.path(), true, base::FileEnumerator::FILES); |
156 ProfilePrefStoreManager::GetPrefFilePathFromProfilePath( | 197 |
157 profile_dir_.path()); | 198 for (base::FilePath path = file_enum.Next(); !path.empty(); |
158 std::string pref_file_contents; | 199 path = file_enum.Next()) { |
159 EXPECT_TRUE(base::ReadFileToString(pref_file_path, &pref_file_contents)); | 200 // Tamper with the file's contents |
160 ReplaceSubstringsAfterOffset(&pref_file_contents, 0u, find, replace); | 201 std::string contents; |
161 EXPECT_EQ(static_cast<int>(pref_file_contents.length()), | 202 EXPECT_TRUE(base::ReadFileToString(path, &contents)); |
162 base::WriteFile(pref_file_path, | 203 ReplaceSubstringsAfterOffset(&contents, 0u, find, replace); |
163 pref_file_contents.c_str(), | 204 EXPECT_EQ(static_cast<int>(contents.length()), |
164 pref_file_contents.length())); | 205 base::WriteFile(path, contents.c_str(), contents.length())); |
206 } | |
165 } | 207 } |
166 | 208 |
167 void ExpectStringValueEquals(const std::string& name, | 209 void ExpectStringValueEquals(const std::string& name, |
168 const std::string& expected) { | 210 const std::string& expected) { |
169 const base::Value* value = NULL; | 211 const base::Value* value = NULL; |
170 std::string as_string; | 212 std::string as_string; |
171 if (!pref_store_->GetValue(name, &value)) { | 213 if (!pref_store_->GetValue(name, &value)) { |
172 ADD_FAILURE() << name << " is not a defined value."; | 214 ADD_FAILURE() << name << " is not a defined value."; |
173 } else if (!value->GetAsString(&as_string)) { | 215 } else if (!value->GetAsString(&as_string)) { |
174 ADD_FAILURE() << name << " could not be coerced to a string."; | 216 ADD_FAILURE() << name << " could not be coerced to a string."; |
(...skipping 12 matching lines...) Expand all Loading... | |
187 scoped_refptr<PersistentPrefStore> pref_store_; | 229 scoped_refptr<PersistentPrefStore> pref_store_; |
188 }; | 230 }; |
189 | 231 |
190 TEST_F(ProfilePrefStoreManagerTest, StoreValues) { | 232 TEST_F(ProfilePrefStoreManagerTest, StoreValues) { |
191 InitializePrefs(); | 233 InitializePrefs(); |
192 | 234 |
193 LoadExistingPrefs(); | 235 LoadExistingPrefs(); |
194 | 236 |
195 ExpectStringValueEquals(kTrackedAtomic, kFoobar); | 237 ExpectStringValueEquals(kTrackedAtomic, kFoobar); |
196 ExpectStringValueEquals(kProtectedAtomic, kHelloWorld); | 238 ExpectStringValueEquals(kProtectedAtomic, kHelloWorld); |
239 EXPECT_FALSE(WasResetRecorded()); | |
197 } | 240 } |
198 | 241 |
199 TEST_F(ProfilePrefStoreManagerTest, GetPrefFilePathFromProfilePath) { | 242 TEST_F(ProfilePrefStoreManagerTest, GetPrefFilePathFromProfilePath) { |
200 base::FilePath pref_file_path = | 243 base::FilePath pref_file_path = |
201 ProfilePrefStoreManager::GetPrefFilePathFromProfilePath( | 244 ProfilePrefStoreManager::GetPrefFilePathFromProfilePath( |
202 profile_dir_.path()); | 245 profile_dir_.path()); |
203 | 246 |
204 ASSERT_FALSE(base::PathExists(pref_file_path)); | 247 EXPECT_FALSE(base::PathExists(pref_file_path)); |
205 | 248 |
206 InitializePrefs(); | 249 InitializePrefs(); |
207 | 250 |
208 ASSERT_TRUE(base::PathExists(pref_file_path)); | 251 EXPECT_TRUE(base::PathExists(pref_file_path)); |
209 } | 252 } |
210 | 253 |
211 TEST_F(ProfilePrefStoreManagerTest, ProtectValues) { | 254 TEST_F(ProfilePrefStoreManagerTest, ProtectValues) { |
212 InitializePrefs(); | 255 InitializePrefs(); |
213 | 256 |
214 ReplaceStringInPrefs(kFoobar, kBarfoo); | 257 ReplaceStringInPrefs(kFoobar, kBarfoo); |
215 ReplaceStringInPrefs(kHelloWorld, kGoodbyeWorld); | 258 ReplaceStringInPrefs(kHelloWorld, kGoodbyeWorld); |
216 | 259 |
217 LoadExistingPrefs(); | 260 LoadExistingPrefs(); |
218 | 261 |
219 // kTrackedAtomic is unprotected and thus will be loaded as it appears on | 262 // kTrackedAtomic is unprotected and thus will be loaded as it appears on |
220 // disk. | 263 // disk. |
221 ExpectStringValueEquals(kTrackedAtomic, kBarfoo); | 264 ExpectStringValueEquals(kTrackedAtomic, kBarfoo); |
222 | 265 |
223 // If preference tracking is supported, the tampered value of kProtectedAtomic | 266 // If preference tracking is supported, the tampered value of kProtectedAtomic |
224 // will be discarded at load time, leaving this preference undefined. | 267 // will be discarded at load time, leaving this preference undefined. |
225 EXPECT_EQ(!ProfilePrefStoreManager::kPlatformSupportsPreferenceTracking, | 268 EXPECT_NE(ProfilePrefStoreManager::kPlatformSupportsPreferenceTracking, |
226 pref_store_->GetValue(kProtectedAtomic, NULL)); | 269 pref_store_->GetValue(kProtectedAtomic, NULL)); |
270 EXPECT_EQ(ProfilePrefStoreManager::kPlatformSupportsPreferenceTracking, | |
271 WasResetRecorded()); | |
227 } | 272 } |
228 | 273 |
229 TEST_F(ProfilePrefStoreManagerTest, ResetPrefHashStore) { | 274 TEST_F(ProfilePrefStoreManagerTest, ResetPrefHashStore) { |
230 InitializePrefs(); | 275 InitializePrefs(); |
231 | 276 |
232 manager_->ResetPrefHashStore(); | 277 manager_->ResetPrefHashStore(); |
233 | 278 |
234 LoadExistingPrefs(); | 279 LoadExistingPrefs(); |
235 | 280 |
236 // kTrackedAtomic is loaded as it appears on disk. | 281 // kTrackedAtomic is loaded as it appears on disk. |
237 ExpectStringValueEquals(kTrackedAtomic, kFoobar); | 282 ExpectStringValueEquals(kTrackedAtomic, kFoobar); |
238 // If preference tracking is supported, the tampered value of kProtectedAtomic | 283 // If preference tracking is supported, the tampered value of kProtectedAtomic |
239 // will be discarded at load time, leaving this preference undefined. | 284 // will be discarded at load time, leaving this preference undefined. |
240 EXPECT_EQ(!ProfilePrefStoreManager::kPlatformSupportsPreferenceTracking, | 285 EXPECT_NE(ProfilePrefStoreManager::kPlatformSupportsPreferenceTracking, |
241 pref_store_->GetValue(kProtectedAtomic, NULL)); | 286 pref_store_->GetValue(kProtectedAtomic, NULL)); |
287 EXPECT_EQ(ProfilePrefStoreManager::kPlatformSupportsPreferenceTracking, | |
288 WasResetRecorded()); | |
242 } | 289 } |
243 | 290 |
244 TEST_F(ProfilePrefStoreManagerTest, ResetAllPrefHashStores) { | 291 TEST_F(ProfilePrefStoreManagerTest, ResetAllPrefHashStores) { |
245 InitializePrefs(); | 292 InitializePrefs(); |
246 | 293 |
247 ProfilePrefStoreManager::ResetAllPrefHashStores(&local_state_); | 294 ProfilePrefStoreManager::ResetAllPrefHashStores(&local_state_); |
248 | 295 |
249 LoadExistingPrefs(); | 296 LoadExistingPrefs(); |
250 | 297 |
251 // kTrackedAtomic is loaded as it appears on disk. | 298 // kTrackedAtomic is loaded as it appears on disk. |
252 ExpectStringValueEquals(kTrackedAtomic, kFoobar); | 299 ExpectStringValueEquals(kTrackedAtomic, kFoobar); |
253 // If preference tracking is supported, kProtectedAtomic will be undefined | 300 // If preference tracking is supported, kProtectedAtomic will be undefined |
254 // because the value was discarded due to loss of the hash store contents. | 301 // because the value was discarded due to loss of the hash store contents. |
255 EXPECT_EQ(!ProfilePrefStoreManager::kPlatformSupportsPreferenceTracking, | 302 EXPECT_NE(ProfilePrefStoreManager::kPlatformSupportsPreferenceTracking, |
256 pref_store_->GetValue(kProtectedAtomic, NULL)); | 303 pref_store_->GetValue(kProtectedAtomic, NULL)); |
304 EXPECT_EQ(ProfilePrefStoreManager::kPlatformSupportsPreferenceTracking, | |
305 WasResetRecorded()); | |
306 } | |
307 | |
308 TEST_F(ProfilePrefStoreManagerTest, MigrateFromOneFile) { | |
309 InitializeDeprecatedCombinedProfilePrefStore(); | |
310 | |
311 LoadExistingPrefs(); | |
312 | |
313 ExpectStringValueEquals(kTrackedAtomic, kFoobar); | |
314 ExpectStringValueEquals(kProtectedAtomic, kHelloWorld); | |
315 EXPECT_FALSE(WasResetRecorded()); | |
257 } | 316 } |
258 | 317 |
259 TEST_F(ProfilePrefStoreManagerTest, UpdateProfileHashStoreIfRequired) { | 318 TEST_F(ProfilePrefStoreManagerTest, UpdateProfileHashStoreIfRequired) { |
260 InitializePrefs(); | 319 scoped_refptr<JsonPrefStore> legacy_prefs( |
261 | 320 new JsonPrefStore(ProfilePrefStoreManager::GetPrefFilePathFromProfilePath( |
262 manager_->ResetPrefHashStore(); | 321 profile_dir_.path()), |
322 main_message_loop_.message_loop_proxy(), | |
323 scoped_ptr<PrefFilter>())); | |
324 legacy_prefs->SetValue(kTrackedAtomic, new base::StringValue(kFoobar)); | |
325 legacy_prefs->SetValue(kProtectedAtomic, new base::StringValue(kHelloWorld)); | |
326 legacy_prefs = NULL; | |
327 base::RunLoop().RunUntilIdle(); | |
263 | 328 |
264 // This is a no-op if !kPlatformSupportsPreferenceTracking. | 329 // This is a no-op if !kPlatformSupportsPreferenceTracking. |
265 manager_->UpdateProfileHashStoreIfRequired( | 330 manager_->UpdateProfileHashStoreIfRequired( |
266 main_message_loop_.message_loop_proxy()); | 331 main_message_loop_.message_loop_proxy()); |
267 base::RunLoop().RunUntilIdle(); | 332 base::RunLoop().RunUntilIdle(); |
268 | 333 |
269 // At the moment, UpdateProfileHashStoreIfRequired will accept existing | 334 // At the moment, UpdateProfileHashStoreIfRequired will accept existing |
270 // values. | 335 // values. |
271 LoadExistingPrefs(); | 336 LoadExistingPrefs(); |
272 | 337 |
273 // These expectations hold whether or not tracking is supported. | 338 // These expectations hold whether or not tracking is supported. |
274 ExpectStringValueEquals(kTrackedAtomic, kFoobar); | 339 ExpectStringValueEquals(kTrackedAtomic, kFoobar); |
275 ExpectStringValueEquals(kProtectedAtomic, kHelloWorld); | 340 ExpectStringValueEquals(kProtectedAtomic, kHelloWorld); |
341 EXPECT_FALSE(WasResetRecorded()); | |
276 } | 342 } |
277 | 343 |
278 TEST_F(ProfilePrefStoreManagerTest, InitializePrefsFromMasterPrefs) { | 344 TEST_F(ProfilePrefStoreManagerTest, InitializePrefsFromMasterPrefs) { |
279 scoped_ptr<base::DictionaryValue> master_prefs( | 345 scoped_ptr<base::DictionaryValue> master_prefs( |
280 new base::DictionaryValue); | 346 new base::DictionaryValue); |
281 master_prefs->Set(kTrackedAtomic, new base::StringValue(kFoobar)); | 347 master_prefs->Set(kTrackedAtomic, new base::StringValue(kFoobar)); |
282 master_prefs->Set(kProtectedAtomic, new base::StringValue(kHelloWorld)); | 348 master_prefs->Set(kProtectedAtomic, new base::StringValue(kHelloWorld)); |
283 ASSERT_TRUE( | 349 EXPECT_TRUE( |
284 manager_->InitializePrefsFromMasterPrefs(*master_prefs)); | 350 manager_->InitializePrefsFromMasterPrefs(*master_prefs)); |
285 | 351 |
286 LoadExistingPrefs(); | 352 LoadExistingPrefs(); |
287 | 353 |
288 // Verify that InitializePrefsFromMasterPrefs correctly applied the MACs | 354 // Verify that InitializePrefsFromMasterPrefs correctly applied the MACs |
289 // necessary to authenticate these values. | 355 // necessary to authenticate these values. |
290 ExpectStringValueEquals(kTrackedAtomic, kFoobar); | 356 ExpectStringValueEquals(kTrackedAtomic, kFoobar); |
291 ExpectStringValueEquals(kProtectedAtomic, kHelloWorld); | 357 ExpectStringValueEquals(kProtectedAtomic, kHelloWorld); |
358 EXPECT_FALSE(WasResetRecorded()); | |
292 } | 359 } |
360 | |
361 TEST_F(ProfilePrefStoreManagerTest, UnprotectedToProtected) { | |
362 InitializePrefs(); | |
363 LoadExistingPrefs(); | |
364 ExpectStringValueEquals(kUnprotectedAtomic, kFoobar); | |
365 | |
366 // Ensure everything is written out to disk. | |
367 DestroyPrefStore(); | |
368 | |
369 ReplaceStringInPrefs(kFoobar, kBarfoo); | |
370 | |
371 // It's unprotected, so we can load the modified value. | |
372 LoadExistingPrefs(); | |
373 ExpectStringValueEquals(kUnprotectedAtomic, kBarfoo); | |
374 | |
375 // Now update the configuration to protect it. | |
376 PrefHashFilter::TrackedPreferenceMetadata new_protected = { | |
377 kExtraReportingId, kUnprotectedAtomic, PrefHashFilter::ENFORCE_ON_LOAD, | |
378 PrefHashFilter::TRACKING_STRATEGY_ATOMIC}; | |
379 configuration_.push_back(new_protected); | |
380 ReloadConfiguration(); | |
381 | |
382 // And try loading with the new configuration. | |
383 LoadExistingPrefs(); | |
384 | |
385 // Since there was a valid super MAC we were able to extend the existing trust | |
386 // to the newly proteted preference. | |
387 ExpectStringValueEquals(kUnprotectedAtomic, kBarfoo); | |
388 EXPECT_FALSE(WasResetRecorded()); | |
389 | |
390 // Ensure everything is written out to disk. | |
391 DestroyPrefStore(); | |
392 | |
393 // It's protected now, so (if the platform supports it) any tampering should | |
394 // lead to a reset. | |
395 ReplaceStringInPrefs(kBarfoo, kFoobar); | |
396 LoadExistingPrefs(); | |
397 EXPECT_NE(ProfilePrefStoreManager::kPlatformSupportsPreferenceTracking, | |
398 pref_store_->GetValue(kUnprotectedAtomic, NULL)); | |
399 EXPECT_EQ(ProfilePrefStoreManager::kPlatformSupportsPreferenceTracking, | |
400 WasResetRecorded()); | |
401 } | |
402 | |
403 TEST_F(ProfilePrefStoreManagerTest, UnprotectedToProtectedWithoutTrust) { | |
404 InitializePrefs(); | |
405 | |
406 // Now update the configuration to protect it. | |
407 PrefHashFilter::TrackedPreferenceMetadata new_protected = { | |
408 kExtraReportingId, kUnprotectedAtomic, PrefHashFilter::ENFORCE_ON_LOAD, | |
409 PrefHashFilter::TRACKING_STRATEGY_ATOMIC}; | |
410 configuration_.push_back(new_protected); | |
411 ReloadConfiguration(); | |
412 ProfilePrefStoreManager::ResetAllPrefHashStores(&local_state_); | |
413 | |
414 // And try loading with the new configuration. | |
415 LoadExistingPrefs(); | |
416 | |
417 // If preference tracking is supported, kUnprotectedAtomic will have been | |
418 // discarded because new values are not accepted without a valid super MAC. | |
419 EXPECT_NE(ProfilePrefStoreManager::kPlatformSupportsPreferenceTracking, | |
420 pref_store_->GetValue(kUnprotectedAtomic, NULL)); | |
421 EXPECT_EQ(ProfilePrefStoreManager::kPlatformSupportsPreferenceTracking, | |
422 WasResetRecorded()); | |
423 } | |
424 | |
425 // This test does not directly verify that the values are moved from one pref | |
426 // store to the other. segregated_pref_store_unittest.cc _does_ verify that | |
427 // functionality. | |
428 // | |
429 // _This_ test verifies that preference values are correctly maintained when a | |
430 // preference's protection state changes from protected to unprotected. | |
431 TEST_F(ProfilePrefStoreManagerTest, ProtectedToUnprotected) { | |
432 InitializePrefs(); | |
433 DestroyPrefStore(); | |
434 | |
435 // Unconfigure protection for kProtectedAtomic | |
436 for (std::vector<PrefHashFilter::TrackedPreferenceMetadata>::iterator it = | |
437 configuration_.begin(); | |
438 it != configuration_.end(); | |
439 ++it) { | |
440 if (it->name == kProtectedAtomic) { | |
441 configuration_.erase(it); | |
442 break; | |
443 } | |
444 } | |
445 ReloadConfiguration(); | |
446 | |
447 // Reset the hash stores and then try loading the prefs. | |
448 ProfilePrefStoreManager::ResetAllPrefHashStores(&local_state_); | |
449 LoadExistingPrefs(); | |
450 | |
451 // Verify that the value was not reset. | |
452 ExpectStringValueEquals(kProtectedAtomic, kHelloWorld); | |
453 EXPECT_FALSE(WasResetRecorded()); | |
454 | |
455 // Accessing the value of the previously protected pref didn't trigger its | |
456 // move to the unprotected preferences file, though the loading of the pref | |
457 // store should still have caused the MAC store to be recalculated. | |
458 LoadExistingPrefs(); | |
459 ExpectStringValueEquals(kProtectedAtomic, kHelloWorld); | |
460 | |
461 // Trigger the logic that migrates it back to the unprotected preferences | |
462 // file. | |
463 pref_store_->SetValue(kProtectedAtomic, new base::StringValue(kGoodbyeWorld)); | |
464 LoadExistingPrefs(); | |
465 ExpectStringValueEquals(kProtectedAtomic, kGoodbyeWorld); | |
466 EXPECT_FALSE(WasResetRecorded()); | |
467 } | |
OLD | NEW |