Index: chrome/browser/chromeos/login/auto_launched_kiosk_browsertest.cc |
diff --git a/chrome/browser/chromeos/login/auto_launched_kiosk_browsertest.cc b/chrome/browser/chromeos/login/auto_launched_kiosk_browsertest.cc |
deleted file mode 100644 |
index 9b5f8c63f6f9f37384f950db314c539934464265..0000000000000000000000000000000000000000 |
--- a/chrome/browser/chromeos/login/auto_launched_kiosk_browsertest.cc |
+++ /dev/null |
@@ -1,470 +0,0 @@ |
-// Copyright 2014 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include <memory> |
-#include <string> |
-#include <vector> |
- |
-#include "apps/test/app_window_waiter.h" |
-#include "base/base64.h" |
-#include "base/command_line.h" |
-#include "base/files/file_path.h" |
-#include "base/json/json_file_value_serializer.h" |
-#include "base/logging.h" |
-#include "base/path_service.h" |
-#include "base/run_loop.h" |
-#include "base/values.h" |
-#include "chrome/browser/chrome_notification_types.h" |
-#include "chrome/browser/chromeos/app_mode/fake_cws.h" |
-#include "chrome/browser/chromeos/app_mode/kiosk_app_manager.h" |
-#include "chrome/browser/chromeos/login/app_launch_controller.h" |
-#include "chrome/browser/chromeos/ownership/owner_settings_service_chromeos_factory.h" |
-#include "chrome/browser/chromeos/policy/device_local_account.h" |
-#include "chrome/browser/chromeos/policy/device_policy_builder.h" |
-#include "chrome/browser/chromeos/settings/stub_install_attributes.h" |
-#include "chrome/browser/extensions/browsertest_util.h" |
-#include "chrome/browser/extensions/extension_apitest.h" |
-#include "chrome/browser/profiles/profile_manager.h" |
-#include "chrome/common/chrome_constants.h" |
-#include "chrome/common/chrome_paths.h" |
-#include "chrome/common/pref_names.h" |
-#include "chromeos/dbus/cryptohome_client.h" |
-#include "chromeos/dbus/dbus_thread_manager.h" |
-#include "chromeos/dbus/fake_session_manager_client.h" |
-#include "chromeos/dbus/shill_manager_client.h" |
-#include "components/ownership/mock_owner_key_util.h" |
-#include "content/public/browser/notification_observer.h" |
-#include "content/public/browser/notification_registrar.h" |
-#include "content/public/browser/notification_service.h" |
-#include "extensions/browser/app_window/app_window.h" |
-#include "extensions/browser/app_window/app_window_registry.h" |
-#include "extensions/browser/app_window/native_app_window.h" |
-#include "extensions/common/value_builder.h" |
-#include "extensions/test/extension_test_message_listener.h" |
-#include "net/dns/mock_host_resolver.h" |
-#include "third_party/cros_system_api/switches/chrome_switches.h" |
- |
-namespace em = enterprise_management; |
- |
-namespace chromeos { |
- |
-namespace { |
- |
-// This is a simple test app that creates an app window and immediately closes |
-// it again. Webstore data json is in |
-// chrome/test/data/chromeos/app_mode/webstore/inlineinstall/ |
-// detail/ggbflgnkafappblpkiflbgpmkfdpnhhe |
-const char kTestKioskApp[] = "ggbflgnkafappblpkiflbgpmkfdpnhhe"; |
- |
-const char kTestAccountId[] = "enterprise-kiosk-app@localhost"; |
- |
-const char kSessionManagerStateCache[] = "test_session_manager_state.json"; |
- |
-// Keys for values in dictionary used to preserve session manager state. |
-const char kLoginArgsKey[] = "login_args"; |
-const char kExtraArgsKey[] = "extra_args"; |
-const char kArgNameKey[] = "name"; |
-const char kArgValueKey[] = "value"; |
- |
-// Default set policy switches. |
-const struct { |
- const char* name; |
- const char* value; |
-} kDefaultPolicySwitches[] = {{"test_switch_1", ""}, |
- {"test_switch_2", "test_switch_2_value"}}; |
- |
-// Fake session manager implementation that persists its state in local file. |
-// It can be used to preserve session state in PRE_ browser tests. |
-// Primarily used for testing user/login switches. |
-class PersistentSessionManagerClient : public FakeSessionManagerClient { |
- public: |
- PersistentSessionManagerClient() {} |
- |
- ~PersistentSessionManagerClient() override { |
- PersistFlagsToFile(backing_file_); |
- } |
- |
- // Initializes session state (primarily session flags)- if |backing_file| |
- // exists, the session state is restored from the file value. Otherwise it's |
- // set to the default session state. |
- void Initialize(const base::FilePath& backing_file) { |
- backing_file_ = backing_file; |
- |
- if (ExtractFlagsFromFile(backing_file_)) |
- return; |
- |
- // Failed to extract ached flags - set the default values. |
- login_args_ = {{"login-manager", ""}}; |
- |
- extra_args_ = {{switches::kPolicySwitchesBegin, ""}}; |
- for (size_t i = 0; i < arraysize(kDefaultPolicySwitches); ++i) { |
- extra_args_.push_back( |
- {kDefaultPolicySwitches[i].name, kDefaultPolicySwitches[i].value}); |
- } |
- extra_args_.push_back({switches::kPolicySwitchesEnd, ""}); |
- } |
- |
- void AppendSwitchesToCommandLine(base::CommandLine* command_line) { |
- for (const auto& flag : login_args_) |
- command_line->AppendSwitchASCII(flag.name, flag.value); |
- for (const auto& flag : extra_args_) |
- command_line->AppendSwitchASCII(flag.name, flag.value); |
- } |
- |
- void StartSession(const cryptohome::Identification& cryptohome_id) override { |
- FakeSessionManagerClient::StartSession(cryptohome_id); |
- |
- std::string user_id_hash = |
- CryptohomeClient::GetStubSanitizedUsername(cryptohome_id); |
- login_args_ = {{"login-user", cryptohome_id.id()}, |
- {"login-profile", user_id_hash}}; |
- } |
- |
- void StopSession() override { |
- FakeSessionManagerClient::StopSession(); |
- |
- login_args_ = {{"login-manager", ""}}; |
- } |
- |
- bool SupportsRestartToApplyUserFlags() const override { return true; } |
- |
- void SetFlagsForUser(const cryptohome::Identification& identification, |
- const std::vector<std::string>& flags) override { |
- extra_args_.clear(); |
- FakeSessionManagerClient::SetFlagsForUser(identification, flags); |
- |
- std::vector<std::string> argv = {"" /* Empty program */}; |
- argv.insert(argv.end(), flags.begin(), flags.end()); |
- |
- // Parse flag name-value pairs using command line initialization. |
- base::CommandLine cmd_line(base::CommandLine::NO_PROGRAM); |
- cmd_line.InitFromArgv(argv); |
- |
- for (const auto& flag : cmd_line.GetSwitches()) |
- extra_args_.push_back({flag.first, flag.second}); |
- } |
- |
- private: |
- // Keeps information about a switch - its name and value. |
- struct Switch { |
- std::string name; |
- std::string value; |
- }; |
- |
- bool ExtractFlagsFromFile(const base::FilePath& backing_file) { |
- JSONFileValueDeserializer deserializer(backing_file); |
- |
- int error_code = 0; |
- std::unique_ptr<base::Value> value = |
- deserializer.Deserialize(&error_code, nullptr); |
- if (error_code != JSONFileValueDeserializer::JSON_NO_ERROR) |
- return false; |
- |
- std::unique_ptr<base::DictionaryValue> value_dict = |
- base::DictionaryValue::From(std::move(value)); |
- DCHECK(value_dict); |
- |
- CHECK(InitArgListFromCachedValue(*value_dict, kLoginArgsKey, &login_args_)); |
- CHECK(InitArgListFromCachedValue(*value_dict, kExtraArgsKey, &extra_args_)); |
- return true; |
- } |
- |
- bool PersistFlagsToFile(const base::FilePath& backing_file) { |
- base::DictionaryValue cached_state; |
- cached_state.Set(kLoginArgsKey, GetArgListValue(login_args_)); |
- cached_state.Set(kExtraArgsKey, GetArgListValue(extra_args_)); |
- |
- JSONFileValueSerializer serializer(backing_file); |
- return serializer.Serialize(cached_state); |
- } |
- |
- std::unique_ptr<base::ListValue> GetArgListValue( |
- const std::vector<Switch>& args) { |
- std::unique_ptr<base::ListValue> result(new base::ListValue()); |
- for (const auto& arg : args) { |
- result->Append(extensions::DictionaryBuilder() |
- .Set(kArgNameKey, arg.name) |
- .Set(kArgValueKey, arg.value) |
- .Build()); |
- } |
- return result; |
- } |
- |
- bool InitArgListFromCachedValue(const base::DictionaryValue& cache_value, |
- const std::string& list_key, |
- std::vector<Switch>* arg_list_out) { |
- arg_list_out->clear(); |
- const base::ListValue* arg_list_value; |
- if (!cache_value.GetList(list_key, &arg_list_value)) |
- return false; |
- for (size_t i = 0; i < arg_list_value->GetSize(); ++i) { |
- const base::DictionaryValue* arg_value; |
- if (!arg_list_value->GetDictionary(i, &arg_value)) |
- return false; |
- Switch arg; |
- if (!arg_value->GetStringASCII(kArgNameKey, &arg.name) || |
- !arg_value->GetStringASCII(kArgValueKey, &arg.value)) { |
- return false; |
- } |
- arg_list_out->push_back(arg); |
- } |
- return true; |
- } |
- |
- std::vector<Switch> login_args_; |
- std::vector<Switch> extra_args_; |
- |
- base::FilePath backing_file_; |
- |
- DISALLOW_COPY_AND_ASSIGN(PersistentSessionManagerClient); |
-}; |
- |
-// Used to listen for app termination notification. |
-class TerminationObserver : public content::NotificationObserver { |
- public: |
- TerminationObserver() { |
- registrar_.Add(this, chrome::NOTIFICATION_APP_TERMINATING, |
- content::NotificationService::AllSources()); |
- } |
- ~TerminationObserver() override = default; |
- |
- // Whether app has been terminated - i.e. whether app termination notification |
- // has been observed. |
- bool terminated() const { return notification_seen_; } |
- |
- private: |
- void Observe(int type, |
- const content::NotificationSource& source, |
- const content::NotificationDetails& details) override { |
- ASSERT_EQ(chrome::NOTIFICATION_APP_TERMINATING, type); |
- notification_seen_ = true; |
- } |
- |
- bool notification_seen_ = false; |
- content::NotificationRegistrar registrar_; |
- |
- DISALLOW_COPY_AND_ASSIGN(TerminationObserver); |
-}; |
- |
-} // namespace |
- |
-class AutoLaunchedKioskTest : public ExtensionApiTest { |
- public: |
- AutoLaunchedKioskTest() |
- : install_attributes_( |
- chromeos::ScopedStubInstallAttributes::CreateEnterprise( |
- "domain.com", |
- "device_id")), |
- owner_key_util_(new ownership::MockOwnerKeyUtil()), |
- fake_session_manager_(new PersistentSessionManagerClient()), |
- fake_cws_(new FakeCWS) { |
- set_chromeos_user_ = false; |
- } |
- |
- ~AutoLaunchedKioskTest() override = default; |
- |
- void SetUp() override { |
- ASSERT_TRUE(embedded_test_server()->InitializeAndListen()); |
- AppLaunchController::SkipSplashWaitForTesting(); |
- |
- ExtensionApiTest::SetUp(); |
- } |
- |
- void SetUpCommandLine(base::CommandLine* command_line) override { |
- fake_cws_->Init(embedded_test_server()); |
- fake_cws_->SetUpdateCrx(kTestKioskApp, std::string(kTestKioskApp) + ".crx", |
- "1.0.0"); |
- ExtensionApiTest::SetUpCommandLine(command_line); |
- } |
- |
- bool SetUpUserDataDirectory() override { |
- InitDevicePolicy(); |
- |
- base::FilePath user_data_path; |
- CHECK(PathService::Get(chrome::DIR_USER_DATA, &user_data_path)); |
- CacheDevicePolicyToLocalState(user_data_path); |
- |
- // Restore session_manager state and ensure session manager flags are |
- // applied. |
- fake_session_manager_->Initialize( |
- user_data_path.Append(kSessionManagerStateCache)); |
- fake_session_manager_->AppendSwitchesToCommandLine( |
- base::CommandLine::ForCurrentProcess()); |
- |
- return true; |
- } |
- |
- void SetUpInProcessBrowserTestFixture() override { |
- host_resolver()->AddRule("*", "127.0.0.1"); |
- |
- OwnerSettingsServiceChromeOSFactory::GetInstance() |
- ->SetOwnerKeyUtilForTesting(owner_key_util_); |
- owner_key_util_->SetPublicKeyFromPrivateKey( |
- *device_policy_.GetSigningKey()); |
- |
- fake_session_manager_->set_device_policy(device_policy_.GetBlob()); |
- DBusThreadManager::GetSetterForTesting()->SetSessionManagerClient( |
- std::move(fake_session_manager_)); |
- |
- ExtensionApiTest::SetUpInProcessBrowserTestFixture(); |
- } |
- |
- void SetUpOnMainThread() override { |
- extensions::browsertest_util::CreateAndInitializeLocalCache(); |
- |
- embedded_test_server()->StartAcceptingConnections(); |
- |
- ExtensionApiTest::SetUpOnMainThread(); |
- } |
- |
- void RunTestOnMainThreadLoop() override { |
- termination_observer_.reset(new TerminationObserver()); |
- |
- ExtensionApiTest::RunTestOnMainThreadLoop(); |
- } |
- |
- void TearDownOnMainThread() override { |
- termination_observer_.reset(); |
- |
- ExtensionApiTest::TearDownOnMainThread(); |
- } |
- |
- void InitDevicePolicy() { |
- // Create device policy, and cache it to local state. |
- em::DeviceLocalAccountsProto* const device_local_accounts = |
- device_policy_.payload().mutable_device_local_accounts(); |
- |
- em::DeviceLocalAccountInfoProto* const account = |
- device_local_accounts->add_account(); |
- account->set_account_id(kTestAccountId); |
- account->set_type(em::DeviceLocalAccountInfoProto::ACCOUNT_TYPE_KIOSK_APP); |
- account->mutable_kiosk_app()->set_app_id(kTestKioskApp); |
- |
- device_local_accounts->set_auto_login_id(kTestAccountId); |
- |
- device_policy_.Build(); |
- } |
- |
- void CacheDevicePolicyToLocalState(const base::FilePath& user_data_path) { |
- em::PolicyData policy_data; |
- DCHECK(device_policy_.payload().SerializeToString( |
- policy_data.mutable_policy_value())); |
- const std::string policy_data_str = policy_data.SerializeAsString(); |
- std::string policy_data_encoded; |
- base::Base64Encode(policy_data_str, &policy_data_encoded); |
- |
- std::unique_ptr<base::DictionaryValue> local_state = |
- extensions::DictionaryBuilder() |
- .Set(prefs::kDeviceSettingsCache, policy_data_encoded) |
- .Set("PublicAccounts", |
- extensions::ListBuilder().Append(GetTestAppUserId()).Build()) |
- .Build(); |
- |
- JSONFileValueSerializer serializer( |
- user_data_path.Append(chrome::kLocalStateFilename)); |
- CHECK(serializer.Serialize(*local_state)); |
- } |
- |
- const std::string GetTestAppUserId() const { |
- return policy::GenerateDeviceLocalAccountUserId( |
- kTestAccountId, policy::DeviceLocalAccount::TYPE_KIOSK_APP); |
- } |
- |
- bool CloseAppWindow(const std::string& app_id) { |
- Profile* const app_profile = ProfileManager::GetPrimaryUserProfile(); |
- if (!app_profile) { |
- ADD_FAILURE() << "No primary (app) profile."; |
- return false; |
- } |
- |
- extensions::AppWindowRegistry* const app_window_registry = |
- extensions::AppWindowRegistry::Get(app_profile); |
- extensions::AppWindow* const window = |
- apps::AppWindowWaiter(app_window_registry, app_id).Wait(); |
- if (!window) { |
- ADD_FAILURE() << "No app window found for " << app_id << "."; |
- return false; |
- } |
- |
- window->GetBaseWindow()->Close(); |
- |
- // Wait until the app terminates if it is still running. |
- if (!app_window_registry->GetAppWindowsForApp(app_id).empty()) |
- base::RunLoop().Run(); |
- return true; |
- } |
- |
- bool IsKioskAppAutoLaunched(const std::string& app_id) { |
- KioskAppManager::App app; |
- if (!KioskAppManager::Get()->GetApp(app_id, &app)) { |
- ADD_FAILURE() << "App " << app_id << " not found."; |
- return false; |
- } |
- return app.was_auto_launched_with_zero_delay; |
- } |
- |
- void ExpectCommandLineHasDefaultPolicySwitches( |
- const base::CommandLine& cmd_line) { |
- for (size_t i = 0u; i < arraysize(kDefaultPolicySwitches); ++i) { |
- EXPECT_TRUE(cmd_line.HasSwitch(kDefaultPolicySwitches[i].name)) |
- << "Missing flag " << kDefaultPolicySwitches[i].name; |
- EXPECT_EQ(kDefaultPolicySwitches[i].value, |
- cmd_line.GetSwitchValueASCII(kDefaultPolicySwitches[i].name)) |
- << "Invalid value for switch " << kDefaultPolicySwitches[i].name; |
- } |
- } |
- |
- protected: |
- std::unique_ptr<TerminationObserver> termination_observer_; |
- |
- private: |
- chromeos::ScopedStubInstallAttributes install_attributes_; |
- policy::DevicePolicyBuilder device_policy_; |
- scoped_refptr<ownership::MockOwnerKeyUtil> owner_key_util_; |
- std::unique_ptr<PersistentSessionManagerClient> fake_session_manager_; |
- std::unique_ptr<FakeCWS> fake_cws_; |
- |
- DISALLOW_COPY_AND_ASSIGN(AutoLaunchedKioskTest); |
-}; |
- |
-IN_PROC_BROWSER_TEST_F(AutoLaunchedKioskTest, PRE_CrashRestore) { |
- // Verify that Chrome hasn't already exited, e.g. in order to apply user |
- // session flags. |
- ASSERT_FALSE(termination_observer_->terminated()); |
- |
- // Set up default network connections, so tests think the device is online. |
- DBusThreadManager::Get() |
- ->GetShillManagerClient() |
- ->GetTestInterface() |
- ->SetupDefaultEnvironment(); |
- |
- // Check that policy flags have not been lost. |
- ExpectCommandLineHasDefaultPolicySwitches( |
- *base::CommandLine::ForCurrentProcess()); |
- |
- ExtensionTestMessageListener listener("appWindowLoaded", false); |
- EXPECT_TRUE(listener.WaitUntilSatisfied()); |
- |
- EXPECT_TRUE(IsKioskAppAutoLaunched(kTestKioskApp)); |
- |
- ASSERT_TRUE(CloseAppWindow(kTestKioskApp)); |
-} |
- |
-IN_PROC_BROWSER_TEST_F(AutoLaunchedKioskTest, CrashRestore) { |
- // Verify that Chrome hasn't already exited, e.g. in order to apply user |
- // session flags. |
- ASSERT_FALSE(termination_observer_->terminated()); |
- |
- ExpectCommandLineHasDefaultPolicySwitches( |
- *base::CommandLine::ForCurrentProcess()); |
- |
- ExtensionTestMessageListener listener("appWindowLoaded", false); |
- EXPECT_TRUE(listener.WaitUntilSatisfied()); |
- |
- EXPECT_TRUE(IsKioskAppAutoLaunched(kTestKioskApp)); |
- |
- ASSERT_TRUE(CloseAppWindow(kTestKioskApp)); |
-} |
- |
-} // namespace chromeos |