1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "base/files/file_path.h"
6 #include "base/files/scoped_temp_dir.h"
7 #include "base/run_loop.h"
8 #include "base/threading/sequenced_worker_pool.h"
9 #include "chrome/app/chrome_command_ids.h"
10 #include "chrome/browser/extensions/extension_browsertest.h"
11 #include "chrome/browser/extensions/extension_prefs.h"
12 #include "chrome/browser/extensions/extension_service.h"
13 #include "chrome/browser/extensions/extension_sync_service.h"
14 #include "chrome/browser/extensions/updater/extension_updater.h"
15 #include "chrome/browser/profiles/profile.h"
16 #include "chrome/browser/ui/browser.h"
17 #include "chrome/browser/ui/global_error/global_error.h"
18 #include "chrome/browser/ui/global_error/global_error_service.h"
19 #include "chrome/browser/ui/global_error/global_error_service_factory.h"
20 #include "chrome/common/chrome_switches.h"
21 #include "content/public/browser/browser_thread.h"
22 #include "content/public/test/test_utils.h"
23 #include "content/test/net/url_request_prepackaged_interceptor.h"
24 #include "extensions/common/extension.h"
25 #include "net/url_request/url_fetcher.h"
27 using extensions::Extension
;
29 class ExtensionDisabledGlobalErrorTest
: public ExtensionBrowserTest
{
31 virtual void SetUpCommandLine(CommandLine
* command_line
) OVERRIDE
{
32 ExtensionBrowserTest::SetUpCommandLine(command_line
);
33 command_line
->AppendSwitchASCII(switches::kAppsGalleryUpdateURL
,
34 "http://localhost/autoupdate/updates.xml");
37 virtual void SetUpOnMainThread() OVERRIDE
{
38 EXPECT_TRUE(scoped_temp_dir_
.CreateUniqueTempDir());
39 service_
= browser()->profile()->GetExtensionService();
40 base::FilePath pem_path
= test_data_dir_
.
41 AppendASCII("permissions_increase").AppendASCII("permissions.pem");
42 path_v1_
= PackExtensionWithOptions(
43 test_data_dir_
.AppendASCII("permissions_increase").AppendASCII("v1"),
44 scoped_temp_dir_
.path().AppendASCII("permissions1.crx"),
47 path_v2_
= PackExtensionWithOptions(
48 test_data_dir_
.AppendASCII("permissions_increase").AppendASCII("v2"),
49 scoped_temp_dir_
.path().AppendASCII("permissions2.crx"),
52 path_v3_
= PackExtensionWithOptions(
53 test_data_dir_
.AppendASCII("permissions_increase").AppendASCII("v3"),
54 scoped_temp_dir_
.path().AppendASCII("permissions3.crx"),
59 // Returns the ExtensionDisabledGlobalError, if present.
60 // Caution: currently only supports one error at a time.
61 GlobalError
* GetExtensionDisabledGlobalError() {
62 return GlobalErrorServiceFactory::GetForProfile(browser()->profile())->
63 GetGlobalErrorByMenuItemCommandID(IDC_EXTENSION_DISABLED_FIRST
);
66 // Install the initial version, which should happen just fine.
67 const Extension
* InstallIncreasingPermissionExtensionV1() {
68 size_t size_before
= service_
->extensions()->size();
69 const Extension
* extension
= InstallExtension(path_v1_
, 1);
72 if (service_
->extensions()->size() != size_before
+ 1)
77 // Upgrade to a version that wants more permissions. We should disable the
78 // extension and prompt the user to reenable.
79 const Extension
* UpdateIncreasingPermissionExtension(
80 const Extension
* extension
,
81 const base::FilePath
& crx_path
,
82 int expected_change
) {
83 size_t size_before
= service_
->extensions()->size();
84 if (UpdateExtension(extension
->id(), crx_path
, expected_change
))
86 content::BrowserThread::GetBlockingPool()->FlushForTesting();
87 base::RunLoop().RunUntilIdle();
88 EXPECT_EQ(size_before
+ expected_change
, service_
->extensions()->size());
89 if (service_
->disabled_extensions()->size() != 1u)
92 return service_
->disabled_extensions()->begin()->get();
95 // Helper function to install an extension and upgrade it to a version
96 // requiring additional permissions. Returns the new disabled Extension.
97 const Extension
* InstallAndUpdateIncreasingPermissionsExtension() {
98 const Extension
* extension
= InstallIncreasingPermissionExtensionV1();
99 extension
= UpdateIncreasingPermissionExtension(extension
, path_v2_
, -1);
103 ExtensionService
* service_
;
104 base::ScopedTempDir scoped_temp_dir_
;
105 base::FilePath path_v1_
;
106 base::FilePath path_v2_
;
107 base::FilePath path_v3_
;
110 // Tests the process of updating an extension to one that requires higher
111 // permissions, and accepting the permissions.
112 IN_PROC_BROWSER_TEST_F(ExtensionDisabledGlobalErrorTest
, AcceptPermissions
) {
113 const Extension
* extension
= InstallAndUpdateIncreasingPermissionsExtension();
114 ASSERT_TRUE(extension
);
115 ASSERT_TRUE(GetExtensionDisabledGlobalError());
116 const size_t size_before
= service_
->extensions()->size();
118 service_
->GrantPermissionsAndEnableExtension(extension
);
119 EXPECT_EQ(size_before
+ 1, service_
->extensions()->size());
120 EXPECT_EQ(0u, service_
->disabled_extensions()->size());
121 ASSERT_FALSE(GetExtensionDisabledGlobalError());
124 // Tests uninstalling an extension that was disabled due to higher permissions.
125 IN_PROC_BROWSER_TEST_F(ExtensionDisabledGlobalErrorTest
, Uninstall
) {
126 const Extension
* extension
= InstallAndUpdateIncreasingPermissionsExtension();
127 ASSERT_TRUE(extension
);
128 ASSERT_TRUE(GetExtensionDisabledGlobalError());
129 const size_t size_before
= service_
->extensions()->size();
131 UninstallExtension(extension
->id());
132 EXPECT_EQ(size_before
, service_
->extensions()->size());
133 EXPECT_EQ(0u, service_
->disabled_extensions()->size());
134 ASSERT_FALSE(GetExtensionDisabledGlobalError());
137 // Tests that no error appears if the user disabled the extension.
138 IN_PROC_BROWSER_TEST_F(ExtensionDisabledGlobalErrorTest
, UserDisabled
) {
139 const Extension
* extension
= InstallIncreasingPermissionExtensionV1();
140 DisableExtension(extension
->id());
141 extension
= UpdateIncreasingPermissionExtension(extension
, path_v2_
, 0);
142 ASSERT_FALSE(GetExtensionDisabledGlobalError());
145 // Test that no error appears if the disable reason is unknown
146 // (but probably was by the user).
147 IN_PROC_BROWSER_TEST_F(ExtensionDisabledGlobalErrorTest
,
148 UnknownReasonSamePermissions
) {
149 const Extension
* extension
= InstallIncreasingPermissionExtensionV1();
150 DisableExtension(extension
->id());
151 // Clear disable reason to simulate legacy disables.
152 service_
->extension_prefs()->ClearDisableReasons(extension
->id());
153 // Upgrade to version 2. Infer from version 1 having the same permissions
154 // granted by the user that it was disabled by the user.
155 extension
= UpdateIncreasingPermissionExtension(extension
, path_v2_
, 0);
156 ASSERT_TRUE(extension
);
157 ASSERT_FALSE(GetExtensionDisabledGlobalError());
160 // Test that an error appears if the disable reason is unknown
161 // (but probably was for increased permissions).
162 IN_PROC_BROWSER_TEST_F(ExtensionDisabledGlobalErrorTest
,
163 UnknownReasonHigherPermissions
) {
164 const Extension
* extension
= InstallAndUpdateIncreasingPermissionsExtension();
165 // Clear disable reason to simulate legacy disables.
166 service_
->extension_prefs()->ClearDisableReasons(extension
->id());
167 // We now have version 2 but only accepted permissions for version 1.
168 GlobalError
* error
= GetExtensionDisabledGlobalError();
170 // Also, remove the upgrade error for version 2.
171 GlobalErrorServiceFactory::GetForProfile(browser()->profile())->
172 RemoveGlobalError(error
);
174 // Upgrade to version 3, with even higher permissions. Infer from
175 // version 2 having higher-than-granted permissions that it was disabled
176 // for permissions increase.
177 extension
= UpdateIncreasingPermissionExtension(extension
, path_v3_
, 0);
178 ASSERT_TRUE(extension
);
179 ASSERT_TRUE(GetExtensionDisabledGlobalError());
182 // Test that an error appears if the extension gets disabled because a
183 // version with higher permissions was installed by sync.
184 IN_PROC_BROWSER_TEST_F(ExtensionDisabledGlobalErrorTest
,
185 HigherPermissionsFromSync
) {
186 // Get data for extension v2 (disabled) into sync.
187 const Extension
* extension
= InstallAndUpdateIncreasingPermissionsExtension();
188 std::string extension_id
= extension
->id();
189 ExtensionSyncService
* sync_service
= ExtensionSyncService::Get(
190 browser()->profile());
191 extensions::ExtensionSyncData sync_data
=
192 sync_service
->GetExtensionSyncData(*extension
);
193 UninstallExtension(extension_id
);
196 // Install extension v1.
197 InstallIncreasingPermissionExtensionV1();
199 // Note: This interceptor gets requests on the IO thread.
200 content::URLLocalHostRequestPrepackagedInterceptor interceptor
;
201 net::URLFetcher::SetEnableInterceptionForTests(true);
202 interceptor
.SetResponseIgnoreQuery(
203 GURL("http://localhost/autoupdate/updates.xml"),
204 test_data_dir_
.AppendASCII("permissions_increase")
205 .AppendASCII("updates.xml"));
206 interceptor
.SetResponseIgnoreQuery(
207 GURL("http://localhost/autoupdate/v2.crx"),
208 scoped_temp_dir_
.path().AppendASCII("permissions2.crx"));
210 extensions::ExtensionUpdater::CheckParams params
;
211 service_
->updater()->set_default_check_params(params
);
213 // Sync is replacing an older version, so it pends.
214 EXPECT_FALSE(sync_service
->ProcessExtensionSyncData(sync_data
));
216 WaitForExtensionInstall();
217 content::BrowserThread::GetBlockingPool()->FlushForTesting();
218 base::RunLoop().RunUntilIdle();
220 extension
= service_
->GetExtensionById(extension_id
, true);
221 ASSERT_TRUE(extension
);
222 EXPECT_EQ("2", extension
->VersionString());
223 EXPECT_EQ(1u, service_
->disabled_extensions()->size());
224 EXPECT_EQ(Extension::DISABLE_PERMISSIONS_INCREASE
,
225 service_
->extension_prefs()->GetDisableReasons(extension_id
));
226 EXPECT_TRUE(GetExtensionDisabledGlobalError());