| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/bind.h" | 5 #include "base/bind.h" |
| 6 #include "base/location.h" | 6 #include "base/location.h" |
| 7 #include "base/run_loop.h" | 7 #include "base/run_loop.h" |
| 8 #include "base/single_thread_task_runner.h" | 8 #include "base/single_thread_task_runner.h" |
| 9 #include "base/threading/thread_task_runner_handle.h" | 9 #include "base/threading/thread_task_runner_handle.h" |
| 10 #include "chrome/browser/extensions/extension_install_checker.h" | 10 #include "chrome/browser/extensions/extension_install_checker.h" |
| 11 #include "testing/gtest/include/gtest/gtest.h" | 11 #include "testing/gtest/include/gtest/gtest.h" |
| 12 | 12 |
| 13 namespace extensions { | 13 namespace extensions { |
| 14 | 14 |
| 15 namespace { | 15 namespace { |
| 16 | 16 |
| 17 const BlacklistState kBlacklistStateError = BLACKLISTED_MALWARE; | 17 const BlacklistState kBlacklistStateError = BLACKLISTED_MALWARE; |
| 18 const char kDummyRequirementsError[] = "Requirements error"; | 18 const char kDummyRequirementsError[] = "Requirements error"; |
| 19 const char kDummyPolicyError[] = "Cannot install extension"; | 19 const char kDummyPolicyError[] = "Cannot install extension"; |
| 20 | 20 |
| 21 const char kDummyPolicyError2[] = "Another policy error"; | |
| 22 const char kDummyRequirementsError2[] = "Another requirements error"; | |
| 23 const BlacklistState kBlacklistState2 = BLACKLISTED_SECURITY_VULNERABILITY; | |
| 24 | |
| 25 } // namespace | 21 } // namespace |
| 26 | 22 |
| 27 // Stubs most of the checks since we are interested in validating the logic in | 23 // Stubs most of the checks since we are interested in validating the logic in |
| 28 // the install checker. This class implements a synchronous version of all | 24 // the install checker. This class implements a synchronous version of all |
| 29 // checks. | 25 // checks. |
| 30 class ExtensionInstallCheckerForTest : public ExtensionInstallChecker { | 26 class ExtensionInstallCheckerForTest : public ExtensionInstallChecker { |
| 31 public: | 27 public: |
| 32 ExtensionInstallCheckerForTest() | 28 ExtensionInstallCheckerForTest(int enabled_checks, bool fail_fast) |
| 33 : ExtensionInstallChecker(NULL), | 29 : ExtensionInstallChecker(nullptr, nullptr, enabled_checks, fail_fast), |
| 34 requirements_check_called_(false), | 30 requirements_check_called_(false), |
| 35 blacklist_check_called_(false), | 31 blacklist_check_called_(false), |
| 36 policy_check_called_(false), | 32 policy_check_called_(false), |
| 37 blacklist_state_(NOT_BLACKLISTED) {} | 33 blacklist_state_(NOT_BLACKLISTED) {} |
| 38 | 34 |
| 39 ~ExtensionInstallCheckerForTest() override {} | 35 ~ExtensionInstallCheckerForTest() override {} |
| 40 | 36 |
| 41 void set_requirements_error(const std::string& error) { | 37 void set_requirements_error(const std::string& error) { |
| 42 requirements_error_ = error; | 38 requirements_error_ = error; |
| 43 } | 39 } |
| 44 void set_policy_check_error(const std::string& error) { | 40 void set_policy_check_error(const std::string& error) { |
| 45 policy_check_error_ = error; | 41 policy_check_error_ = error; |
| 46 } | 42 } |
| 47 void set_blacklist_state(BlacklistState state) { blacklist_state_ = state; } | 43 void set_blacklist_state(BlacklistState state) { blacklist_state_ = state; } |
| 48 | 44 |
| 49 bool requirements_check_called() const { return requirements_check_called_; } | 45 bool requirements_check_called() const { return requirements_check_called_; } |
| 50 bool blacklist_check_called() const { return blacklist_check_called_; } | 46 bool blacklist_check_called() const { return blacklist_check_called_; } |
| 51 bool policy_check_called() const { return policy_check_called_; } | 47 bool policy_check_called() const { return policy_check_called_; } |
| 52 | 48 |
| 53 void MockCheckRequirements(int sequence_number) { | 49 void MockCheckRequirements() { |
| 50 if (!is_running()) |
| 51 return; |
| 54 std::vector<std::string> errors; | 52 std::vector<std::string> errors; |
| 55 if (!requirements_error_.empty()) | 53 if (!requirements_error_.empty()) |
| 56 errors.push_back(requirements_error_); | 54 errors.push_back(requirements_error_); |
| 57 OnRequirementsCheckDone(sequence_number, errors); | 55 OnRequirementsCheckDone(errors); |
| 58 } | 56 } |
| 59 | 57 |
| 60 void MockCheckBlacklistState(int sequence_number) { | 58 void MockCheckBlacklistState() { |
| 61 OnBlacklistStateCheckDone(sequence_number, blacklist_state_); | 59 if (!is_running()) |
| 60 return; |
| 61 OnBlacklistStateCheckDone(blacklist_state_); |
| 62 } | 62 } |
| 63 | 63 |
| 64 protected: | 64 protected: |
| 65 void CheckRequirements() override { | 65 void CheckRequirements() override { |
| 66 requirements_check_called_ = true; | 66 requirements_check_called_ = true; |
| 67 MockCheckRequirements(current_sequence_number()); | 67 MockCheckRequirements(); |
| 68 } | 68 } |
| 69 | 69 |
| 70 void CheckManagementPolicy() override { | 70 void CheckManagementPolicy() override { |
| 71 policy_check_called_ = true; | 71 policy_check_called_ = true; |
| 72 OnManagementPolicyCheckDone(policy_check_error_.empty(), | 72 OnManagementPolicyCheckDone(policy_check_error_.empty(), |
| 73 policy_check_error_); | 73 policy_check_error_); |
| 74 } | 74 } |
| 75 | 75 |
| 76 void CheckBlacklistState() override { | 76 void CheckBlacklistState() override { |
| 77 blacklist_check_called_ = true; | 77 blacklist_check_called_ = true; |
| 78 MockCheckBlacklistState(current_sequence_number()); | 78 MockCheckBlacklistState(); |
| 79 } | |
| 80 | |
| 81 void ResetResults() override { | |
| 82 ExtensionInstallChecker::ResetResults(); | |
| 83 | |
| 84 requirements_check_called_ = false; | |
| 85 blacklist_check_called_ = false; | |
| 86 policy_check_called_ = false; | |
| 87 } | 79 } |
| 88 | 80 |
| 89 bool requirements_check_called_; | 81 bool requirements_check_called_; |
| 90 bool blacklist_check_called_; | 82 bool blacklist_check_called_; |
| 91 bool policy_check_called_; | 83 bool policy_check_called_; |
| 92 | 84 |
| 93 // Dummy errors for testing. | 85 // Dummy errors for testing. |
| 94 std::string requirements_error_; | 86 std::string requirements_error_; |
| 95 std::string policy_check_error_; | 87 std::string policy_check_error_; |
| 96 BlacklistState blacklist_state_; | 88 BlacklistState blacklist_state_; |
| 97 }; | 89 }; |
| 98 | 90 |
| 99 // This class implements asynchronous mocks of the requirements and blacklist | 91 // This class implements asynchronous mocks of the requirements and blacklist |
| 100 // checks. | 92 // checks. |
| 101 class ExtensionInstallCheckerAsync : public ExtensionInstallCheckerForTest { | 93 class ExtensionInstallCheckerAsync : public ExtensionInstallCheckerForTest { |
| 94 public: |
| 95 ExtensionInstallCheckerAsync(int enabled_checks, bool fail_fast) |
| 96 : ExtensionInstallCheckerForTest(enabled_checks, fail_fast) {} |
| 97 |
| 102 protected: | 98 protected: |
| 103 void CheckRequirements() override { | 99 void CheckRequirements() override { |
| 104 requirements_check_called_ = true; | 100 requirements_check_called_ = true; |
| 105 | 101 |
| 106 base::ThreadTaskRunnerHandle::Get()->PostTask( | 102 base::ThreadTaskRunnerHandle::Get()->PostTask( |
| 107 FROM_HERE, | 103 FROM_HERE, |
| 108 base::Bind(&ExtensionInstallCheckerForTest::MockCheckRequirements, | 104 base::Bind(&ExtensionInstallCheckerForTest::MockCheckRequirements, |
| 109 base::Unretained(this), current_sequence_number())); | 105 base::Unretained(this))); |
| 110 } | 106 } |
| 111 | 107 |
| 112 void CheckBlacklistState() override { | 108 void CheckBlacklistState() override { |
| 113 blacklist_check_called_ = true; | 109 blacklist_check_called_ = true; |
| 114 | 110 |
| 115 base::ThreadTaskRunnerHandle::Get()->PostTask( | 111 base::ThreadTaskRunnerHandle::Get()->PostTask( |
| 116 FROM_HERE, | 112 FROM_HERE, |
| 117 base::Bind(&ExtensionInstallCheckerForTest::MockCheckBlacklistState, | 113 base::Bind(&ExtensionInstallCheckerForTest::MockCheckBlacklistState, |
| 118 base::Unretained(this), current_sequence_number())); | 114 base::Unretained(this))); |
| 119 } | 115 } |
| 120 }; | 116 }; |
| 121 | 117 |
| 122 class CheckObserver { | 118 class CheckObserver { |
| 123 public: | 119 public: |
| 124 CheckObserver() : result_(0), call_count_(0) {} | 120 CheckObserver() : result_(0), call_count_(0) {} |
| 125 | 121 |
| 126 int result() const { return result_; } | 122 int result() const { return result_; } |
| 127 int call_count() const { return call_count_; } | 123 int call_count() const { return call_count_; } |
| 128 | 124 |
| (...skipping 12 matching lines...) Expand all Loading... |
| 141 private: | 137 private: |
| 142 int result_; | 138 int result_; |
| 143 int call_count_; | 139 int call_count_; |
| 144 }; | 140 }; |
| 145 | 141 |
| 146 class ExtensionInstallCheckerTest : public testing::Test { | 142 class ExtensionInstallCheckerTest : public testing::Test { |
| 147 public: | 143 public: |
| 148 ExtensionInstallCheckerTest() {} | 144 ExtensionInstallCheckerTest() {} |
| 149 ~ExtensionInstallCheckerTest() override {} | 145 ~ExtensionInstallCheckerTest() override {} |
| 150 | 146 |
| 151 void RunSecondInvocation(ExtensionInstallCheckerForTest* checker, | |
| 152 int checks_failed) { | |
| 153 EXPECT_GT(checks_failed, 0); | |
| 154 EXPECT_FALSE(checker->is_running()); | |
| 155 ValidateExpectedCalls(ExtensionInstallChecker::CHECK_ALL, *checker); | |
| 156 | |
| 157 // Set up different return values. | |
| 158 checker->set_blacklist_state(kBlacklistState2); | |
| 159 checker->set_policy_check_error(kDummyPolicyError2); | |
| 160 checker->set_requirements_error(kDummyRequirementsError2); | |
| 161 | |
| 162 // Run the install checker again and ensure the second set of return values | |
| 163 // is received. | |
| 164 checker->Start( | |
| 165 ExtensionInstallChecker::CHECK_ALL, | |
| 166 false /* fail fast */, | |
| 167 base::Bind(&ExtensionInstallCheckerTest::ValidateSecondInvocation, | |
| 168 base::Unretained(this), | |
| 169 checker)); | |
| 170 } | |
| 171 | |
| 172 void ValidateSecondInvocation(ExtensionInstallCheckerForTest* checker, | |
| 173 int checks_failed) { | |
| 174 EXPECT_FALSE(checker->is_running()); | |
| 175 EXPECT_EQ(ExtensionInstallChecker::CHECK_REQUIREMENTS | | |
| 176 ExtensionInstallChecker::CHECK_MANAGEMENT_POLICY, | |
| 177 checks_failed); | |
| 178 ValidateExpectedCalls(ExtensionInstallChecker::CHECK_ALL, *checker); | |
| 179 | |
| 180 EXPECT_EQ(kBlacklistState2, checker->blacklist_state()); | |
| 181 ExpectPolicyError(kDummyPolicyError2, *checker); | |
| 182 ExpectRequirementsError(kDummyRequirementsError2, *checker); | |
| 183 } | |
| 184 | |
| 185 protected: | 147 protected: |
| 186 void SetAllErrors(ExtensionInstallCheckerForTest* checker) { | 148 void SetAllErrors(ExtensionInstallCheckerForTest* checker) { |
| 187 checker->set_blacklist_state(kBlacklistStateError); | 149 checker->set_blacklist_state(kBlacklistStateError); |
| 188 checker->set_policy_check_error(kDummyPolicyError); | 150 checker->set_policy_check_error(kDummyPolicyError); |
| 189 checker->set_requirements_error(kDummyRequirementsError); | 151 checker->set_requirements_error(kDummyRequirementsError); |
| 190 } | 152 } |
| 191 | 153 |
| 192 void ValidateExpectedCalls(int call_mask, | 154 void ValidateExpectedCalls(int call_mask, |
| 193 const ExtensionInstallCheckerForTest& checker) { | 155 const ExtensionInstallCheckerForTest& checker) { |
| 194 bool expect_blacklist_checked = | 156 bool expect_blacklist_checked = |
| (...skipping 40 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 235 EXPECT_FALSE(checker.policy_allows_load()); | 197 EXPECT_FALSE(checker.policy_allows_load()); |
| 236 EXPECT_FALSE(checker.policy_error().empty()); | 198 EXPECT_FALSE(checker.policy_error().empty()); |
| 237 EXPECT_EQ(std::string(expected_error), checker.policy_error()); | 199 EXPECT_EQ(std::string(expected_error), checker.policy_error()); |
| 238 } | 200 } |
| 239 | 201 |
| 240 void ExpectPolicyError(const ExtensionInstallCheckerForTest& checker) { | 202 void ExpectPolicyError(const ExtensionInstallCheckerForTest& checker) { |
| 241 ExpectPolicyError(kDummyPolicyError, checker); | 203 ExpectPolicyError(kDummyPolicyError, checker); |
| 242 } | 204 } |
| 243 | 205 |
| 244 void RunChecker(ExtensionInstallCheckerForTest* checker, | 206 void RunChecker(ExtensionInstallCheckerForTest* checker, |
| 245 bool fail_fast, | |
| 246 int checks_to_run, | |
| 247 int expected_checks_run, | 207 int expected_checks_run, |
| 248 int expected_result) { | 208 int expected_result) { |
| 249 CheckObserver observer; | 209 CheckObserver observer; |
| 250 checker->Start(checks_to_run, | 210 checker->Start(base::Bind(&CheckObserver::OnChecksComplete, |
| 251 fail_fast, | |
| 252 base::Bind(&CheckObserver::OnChecksComplete, | |
| 253 base::Unretained(&observer))); | 211 base::Unretained(&observer))); |
| 254 observer.Wait(); | 212 observer.Wait(); |
| 255 | 213 |
| 256 EXPECT_FALSE(checker->is_running()); | 214 EXPECT_FALSE(checker->is_running()); |
| 257 EXPECT_EQ(expected_result, observer.result()); | 215 EXPECT_EQ(expected_result, observer.result()); |
| 258 EXPECT_EQ(1, observer.call_count()); | 216 EXPECT_EQ(1, observer.call_count()); |
| 259 ValidateExpectedCalls(expected_checks_run, *checker); | 217 ValidateExpectedCalls(expected_checks_run, *checker); |
| 260 } | 218 } |
| 261 | 219 |
| 262 void DoRunAllChecksPass(ExtensionInstallCheckerForTest* checker) { | 220 void DoRunAllChecksPass(ExtensionInstallCheckerForTest* checker) { |
| 263 RunChecker(checker, | 221 RunChecker(checker, |
| 264 false /* fail fast */, | |
| 265 ExtensionInstallChecker::CHECK_ALL, | |
| 266 ExtensionInstallChecker::CHECK_ALL, | 222 ExtensionInstallChecker::CHECK_ALL, |
| 267 0); | 223 0); |
| 268 | 224 |
| 269 ExpectRequirementsPass(*checker); | 225 ExpectRequirementsPass(*checker); |
| 270 ExpectPolicyPass(*checker); | 226 ExpectPolicyPass(*checker); |
| 271 ExpectBlacklistPass(*checker); | 227 ExpectBlacklistPass(*checker); |
| 272 } | 228 } |
| 273 | 229 |
| 274 void DoRunAllChecksFail(ExtensionInstallCheckerForTest* checker) { | 230 void DoRunAllChecksFail(ExtensionInstallCheckerForTest* checker) { |
| 275 SetAllErrors(checker); | 231 SetAllErrors(checker); |
| 276 RunChecker(checker, | 232 RunChecker(checker, |
| 277 false /* fail fast */, | |
| 278 ExtensionInstallChecker::CHECK_ALL, | |
| 279 ExtensionInstallChecker::CHECK_ALL, | 233 ExtensionInstallChecker::CHECK_ALL, |
| 280 ExtensionInstallChecker::CHECK_ALL); | 234 ExtensionInstallChecker::CHECK_ALL); |
| 281 | 235 |
| 282 ExpectRequirementsError(*checker); | 236 ExpectRequirementsError(*checker); |
| 283 ExpectPolicyError(*checker); | 237 ExpectPolicyError(*checker); |
| 284 ExpectBlacklistError(*checker); | 238 ExpectBlacklistError(*checker); |
| 285 } | 239 } |
| 286 | 240 |
| 287 void DoRunSubsetOfChecks(ExtensionInstallCheckerForTest* checker) { | 241 void DoRunSubsetOfChecks(int checks_to_run) { |
| 288 // Test check set 1. | 242 ExtensionInstallCheckerForTest sync_checker(checks_to_run, |
| 289 int tests_to_run = ExtensionInstallChecker::CHECK_MANAGEMENT_POLICY | | 243 /*fail_fast=*/false); |
| 290 ExtensionInstallChecker::CHECK_REQUIREMENTS; | 244 ExtensionInstallCheckerAsync async_checker(checks_to_run, |
| 291 SetAllErrors(checker); | 245 /*fail_fast=*/false); |
| 292 RunChecker(checker, false, tests_to_run, tests_to_run, tests_to_run); | 246 ExtensionInstallCheckerForTest* checkers[] = { |
| 247 &sync_checker, &async_checker, |
| 248 }; |
| 293 | 249 |
| 294 ExpectRequirementsError(*checker); | 250 for (auto* checker : checkers) { |
| 295 ExpectPolicyError(*checker); | 251 SetAllErrors(checker); |
| 296 ExpectBlacklistPass(*checker); | 252 RunChecker(checker, checks_to_run, checks_to_run); |
| 297 | 253 |
| 298 // Test check set 2. | 254 if (checks_to_run & ExtensionInstallChecker::CHECK_REQUIREMENTS) |
| 299 tests_to_run = ExtensionInstallChecker::CHECK_BLACKLIST | | 255 ExpectRequirementsError(*checker); |
| 300 ExtensionInstallChecker::CHECK_REQUIREMENTS; | 256 else |
| 301 SetAllErrors(checker); | 257 ExpectRequirementsPass(*checker); |
| 302 RunChecker(checker, false, tests_to_run, tests_to_run, tests_to_run); | |
| 303 | 258 |
| 304 ExpectRequirementsError(*checker); | 259 if (checks_to_run & ExtensionInstallChecker::CHECK_MANAGEMENT_POLICY) |
| 305 ExpectPolicyPass(*checker); | 260 ExpectPolicyError(*checker); |
| 306 ExpectBlacklistError(*checker); | 261 else |
| 262 ExpectPolicyPass(*checker); |
| 307 | 263 |
| 308 // Test a single check. | 264 if (checks_to_run & ExtensionInstallChecker::CHECK_BLACKLIST) |
| 309 tests_to_run = ExtensionInstallChecker::CHECK_BLACKLIST; | 265 ExpectBlacklistError(*checker); |
| 310 SetAllErrors(checker); | 266 else |
| 311 RunChecker(checker, false, tests_to_run, tests_to_run, tests_to_run); | 267 ExpectBlacklistPass(*checker); |
| 312 | 268 } |
| 313 ExpectRequirementsPass(*checker); | |
| 314 ExpectPolicyPass(*checker); | |
| 315 ExpectBlacklistError(*checker); | |
| 316 } | 269 } |
| 317 | 270 |
| 318 private: | 271 private: |
| 319 // A message loop is required for the asynchronous tests. | 272 // A message loop is required for the asynchronous tests. |
| 320 base::MessageLoop message_loop; | 273 base::MessageLoop message_loop; |
| 321 }; | 274 }; |
| 322 | 275 |
| 323 class ExtensionInstallCheckerMultipleInvocationTest | |
| 324 : public ExtensionInstallCheckerTest { | |
| 325 public: | |
| 326 ExtensionInstallCheckerMultipleInvocationTest() : callback_count_(0) {} | |
| 327 ~ExtensionInstallCheckerMultipleInvocationTest() override {} | |
| 328 | |
| 329 void RunSecondInvocation(ExtensionInstallCheckerForTest* checker, | |
| 330 int checks_failed) { | |
| 331 ASSERT_EQ(0, callback_count_); | |
| 332 ++callback_count_; | |
| 333 EXPECT_FALSE(checker->is_running()); | |
| 334 EXPECT_GT(checks_failed, 0); | |
| 335 ValidateExpectedCalls(ExtensionInstallChecker::CHECK_ALL, *checker); | |
| 336 | |
| 337 // Set up different return values. | |
| 338 checker->set_blacklist_state(kBlacklistState2); | |
| 339 checker->set_policy_check_error(kDummyPolicyError2); | |
| 340 checker->set_requirements_error(kDummyRequirementsError2); | |
| 341 | |
| 342 // Run the install checker again and ensure the second set of return values | |
| 343 // is received. | |
| 344 checker->Start(ExtensionInstallChecker::CHECK_ALL, | |
| 345 false /* fail fast */, | |
| 346 base::Bind(&ExtensionInstallCheckerMultipleInvocationTest:: | |
| 347 ValidateSecondInvocation, | |
| 348 base::Unretained(this), | |
| 349 checker)); | |
| 350 } | |
| 351 | |
| 352 void ValidateSecondInvocation(ExtensionInstallCheckerForTest* checker, | |
| 353 int checks_failed) { | |
| 354 ASSERT_EQ(1, callback_count_); | |
| 355 EXPECT_FALSE(checker->is_running()); | |
| 356 EXPECT_EQ(ExtensionInstallChecker::CHECK_REQUIREMENTS | | |
| 357 ExtensionInstallChecker::CHECK_MANAGEMENT_POLICY, | |
| 358 checks_failed); | |
| 359 ValidateExpectedCalls(ExtensionInstallChecker::CHECK_ALL, *checker); | |
| 360 | |
| 361 EXPECT_EQ(kBlacklistState2, checker->blacklist_state()); | |
| 362 ExpectPolicyError(kDummyPolicyError2, *checker); | |
| 363 ExpectRequirementsError(kDummyRequirementsError2, *checker); | |
| 364 } | |
| 365 | |
| 366 private: | |
| 367 int callback_count_; | |
| 368 }; | |
| 369 | |
| 370 // Test the case where all tests pass. | 276 // Test the case where all tests pass. |
| 371 TEST_F(ExtensionInstallCheckerTest, AllSucceeded) { | 277 TEST_F(ExtensionInstallCheckerTest, AllSucceeded) { |
| 372 ExtensionInstallCheckerForTest sync_checker; | 278 ExtensionInstallCheckerForTest sync_checker( |
| 279 ExtensionInstallChecker::CHECK_ALL, /*fail_fast=*/false); |
| 373 DoRunAllChecksPass(&sync_checker); | 280 DoRunAllChecksPass(&sync_checker); |
| 374 | 281 |
| 375 ExtensionInstallCheckerAsync async_checker; | 282 ExtensionInstallCheckerAsync async_checker(ExtensionInstallChecker::CHECK_ALL, |
| 283 /*fail_fast=*/false); |
| 376 DoRunAllChecksPass(&async_checker); | 284 DoRunAllChecksPass(&async_checker); |
| 377 } | 285 } |
| 378 | 286 |
| 379 // Test the case where all tests fail. | 287 // Test the case where all tests fail. |
| 380 TEST_F(ExtensionInstallCheckerTest, AllFailed) { | 288 TEST_F(ExtensionInstallCheckerTest, AllFailed) { |
| 381 ExtensionInstallCheckerForTest sync_checker; | 289 ExtensionInstallCheckerForTest sync_checker( |
| 290 ExtensionInstallChecker::CHECK_ALL, /*fail_fast=*/false); |
| 382 DoRunAllChecksFail(&sync_checker); | 291 DoRunAllChecksFail(&sync_checker); |
| 383 | 292 |
| 384 ExtensionInstallCheckerAsync async_checker; | 293 ExtensionInstallCheckerAsync async_checker(ExtensionInstallChecker::CHECK_ALL, |
| 294 /*fail_fast=*/false); |
| 385 DoRunAllChecksFail(&async_checker); | 295 DoRunAllChecksFail(&async_checker); |
| 386 } | 296 } |
| 387 | 297 |
| 388 // Test running only a subset of tests. | 298 // Test running only a subset of tests. |
| 389 TEST_F(ExtensionInstallCheckerTest, RunSubsetOfChecks) { | 299 TEST_F(ExtensionInstallCheckerTest, RunSubsetOfChecks) { |
| 390 ExtensionInstallCheckerForTest sync_checker; | 300 DoRunSubsetOfChecks(ExtensionInstallChecker::CHECK_MANAGEMENT_POLICY | |
| 391 ExtensionInstallCheckerAsync async_checker; | 301 ExtensionInstallChecker::CHECK_REQUIREMENTS); |
| 392 DoRunSubsetOfChecks(&sync_checker); | 302 DoRunSubsetOfChecks(ExtensionInstallChecker::CHECK_BLACKLIST | |
| 393 DoRunSubsetOfChecks(&async_checker); | 303 ExtensionInstallChecker::CHECK_REQUIREMENTS); |
| 304 DoRunSubsetOfChecks(ExtensionInstallChecker::CHECK_BLACKLIST); |
| 394 } | 305 } |
| 395 | 306 |
| 396 // Test fail fast with synchronous callbacks. | 307 // Test fail fast with synchronous callbacks. |
| 397 TEST_F(ExtensionInstallCheckerTest, FailFastSync) { | 308 TEST_F(ExtensionInstallCheckerTest, FailFastSync) { |
| 398 // This test assumes some internal knowledge of the implementation - that | 309 // This test assumes some internal knowledge of the implementation - that |
| 399 // the policy check runs first. | 310 // the policy check runs first. |
| 400 ExtensionInstallCheckerForTest checker; | 311 { |
| 401 SetAllErrors(&checker); | 312 ExtensionInstallCheckerForTest checker(ExtensionInstallChecker::CHECK_ALL, |
| 402 RunChecker(&checker, | 313 /*fail_fast=*/true); |
| 403 true /* fail fast */, | 314 SetAllErrors(&checker); |
| 404 ExtensionInstallChecker::CHECK_ALL, | 315 RunChecker(&checker, ExtensionInstallChecker::CHECK_MANAGEMENT_POLICY, |
| 405 ExtensionInstallChecker::CHECK_MANAGEMENT_POLICY, | 316 ExtensionInstallChecker::CHECK_MANAGEMENT_POLICY); |
| 406 ExtensionInstallChecker::CHECK_MANAGEMENT_POLICY); | |
| 407 | 317 |
| 408 ExpectRequirementsPass(checker); | 318 ExpectRequirementsPass(checker); |
| 409 ExpectPolicyError(checker); | 319 ExpectPolicyError(checker); |
| 410 ExpectBlacklistPass(checker); | 320 ExpectBlacklistPass(checker); |
| 321 } |
| 411 | 322 |
| 412 // This test assumes some internal knowledge of the implementation - that | 323 { |
| 413 // the requirements check runs before the blacklist check. | 324 ExtensionInstallCheckerForTest checker( |
| 414 SetAllErrors(&checker); | 325 ExtensionInstallChecker::CHECK_REQUIREMENTS | |
| 415 RunChecker(&checker, | 326 ExtensionInstallChecker::CHECK_BLACKLIST, |
| 416 true /* fail fast */, | 327 /*fail_fast=*/true); |
| 417 ExtensionInstallChecker::CHECK_REQUIREMENTS | | 328 SetAllErrors(&checker); |
| 418 ExtensionInstallChecker::CHECK_BLACKLIST, | 329 RunChecker(&checker, ExtensionInstallChecker::CHECK_REQUIREMENTS, |
| 419 ExtensionInstallChecker::CHECK_REQUIREMENTS, | 330 ExtensionInstallChecker::CHECK_REQUIREMENTS); |
| 420 ExtensionInstallChecker::CHECK_REQUIREMENTS); | |
| 421 | 331 |
| 422 ExpectRequirementsError(checker); | 332 ExpectRequirementsError(checker); |
| 423 ExpectPolicyPass(checker); | 333 ExpectPolicyPass(checker); |
| 424 ExpectBlacklistPass(checker); | 334 ExpectBlacklistPass(checker); |
| 335 } |
| 425 } | 336 } |
| 426 | 337 |
| 427 // Test fail fast with asynchronous callbacks. | 338 // Test fail fast with asynchronous callbacks. |
| 428 TEST_F(ExtensionInstallCheckerTest, FailFastAsync) { | 339 TEST_F(ExtensionInstallCheckerTest, FailFastAsync) { |
| 429 // This test assumes some internal knowledge of the implementation - that | 340 // This test assumes some internal knowledge of the implementation - that |
| 430 // the requirements check runs before the blacklist check. Both checks should | 341 // the requirements check runs before the blacklist check. Both checks should |
| 431 // be called, but the requirements check callback arrives first and the | 342 // be called, but the requirements check callback arrives first and the |
| 432 // blacklist result will be discarded. | 343 // blacklist result will be discarded. |
| 433 ExtensionInstallCheckerAsync checker; | 344 ExtensionInstallCheckerAsync checker(ExtensionInstallChecker::CHECK_ALL, |
| 345 /*fail_fast=*/true); |
| 346 |
| 434 SetAllErrors(&checker); | 347 SetAllErrors(&checker); |
| 435 | 348 |
| 436 // The policy check is synchronous and needs to pass for the other tests to | 349 // The policy check is synchronous and needs to pass for the other tests to |
| 437 // run. | 350 // run. |
| 438 checker.set_policy_check_error(std::string()); | 351 checker.set_policy_check_error(std::string()); |
| 439 | 352 |
| 440 RunChecker(&checker, | 353 RunChecker(&checker, |
| 441 true /* fail fast */, | |
| 442 ExtensionInstallChecker::CHECK_ALL, | |
| 443 ExtensionInstallChecker::CHECK_ALL, | 354 ExtensionInstallChecker::CHECK_ALL, |
| 444 ExtensionInstallChecker::CHECK_REQUIREMENTS); | 355 ExtensionInstallChecker::CHECK_REQUIREMENTS); |
| 445 | 356 |
| 446 ExpectRequirementsError(checker); | 357 ExpectRequirementsError(checker); |
| 447 ExpectPolicyPass(checker); | 358 ExpectPolicyPass(checker); |
| 448 ExpectBlacklistPass(checker); | 359 ExpectBlacklistPass(checker); |
| 449 } | 360 } |
| 450 | 361 |
| 451 // Test multiple invocations of the install checker. Wait for all checks to | |
| 452 // complete. | |
| 453 TEST_F(ExtensionInstallCheckerMultipleInvocationTest, CompleteAll) { | |
| 454 ExtensionInstallCheckerAsync checker; | |
| 455 SetAllErrors(&checker); | |
| 456 | |
| 457 // Start the second check as soon as the callback of the first run is invoked. | |
| 458 checker.Start( | |
| 459 ExtensionInstallChecker::CHECK_ALL, | |
| 460 false /* fail fast */, | |
| 461 base::Bind( | |
| 462 &ExtensionInstallCheckerMultipleInvocationTest::RunSecondInvocation, | |
| 463 base::Unretained(this), | |
| 464 &checker)); | |
| 465 base::RunLoop().RunUntilIdle(); | |
| 466 } | |
| 467 | |
| 468 // Test multiple invocations of the install checker and fail fast. | |
| 469 TEST_F(ExtensionInstallCheckerMultipleInvocationTest, FailFast) { | |
| 470 ExtensionInstallCheckerAsync checker; | |
| 471 SetAllErrors(&checker); | |
| 472 | |
| 473 // The policy check is synchronous and needs to pass for the other tests to | |
| 474 // run. | |
| 475 checker.set_policy_check_error(std::string()); | |
| 476 | |
| 477 // Start the second check as soon as the callback of the first run is invoked. | |
| 478 checker.Start( | |
| 479 ExtensionInstallChecker::CHECK_ALL, | |
| 480 true /* fail fast */, | |
| 481 base::Bind( | |
| 482 &ExtensionInstallCheckerMultipleInvocationTest::RunSecondInvocation, | |
| 483 base::Unretained(this), | |
| 484 &checker)); | |
| 485 base::RunLoop().RunUntilIdle(); | |
| 486 } | |
| 487 | |
| 488 } // namespace extensions | 362 } // namespace extensions |
| OLD | NEW |