Avi Drissman | 60039d4 | 2022-09-13 21:49:05 | [diff] [blame] | 1 | // Copyright 2012 The Chromium Authors |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
noel | c8702c4 | 2017-03-16 08:51:19 | [diff] [blame] | 5 | #include "extensions/browser/sandboxed_unpacker.h" |
Giovanni Ortuño Urquidi | 42d04f9 | 2022-07-28 07:40:39 | [diff] [blame] | 6 | #include "build/build_config.h" |
noel | c8702c4 | 2017-03-16 08:51:19 | [diff] [blame] | 7 | |
Peter Boström | 5effa32 | 2021-04-02 22:39:39 | [diff] [blame] | 8 | #include <memory> |
Avi Drissman | 2907147 | 2022-01-11 19:43:51 | [diff] [blame] | 9 | #include <tuple> |
Peter Boström | 5effa32 | 2021-04-02 22:39:39 | [diff] [blame] | 10 | |
asargent | c4fdad2 | 2015-08-28 22:44:39 | [diff] [blame] | 11 | #include "base/base64.h" |
[email protected] | 43c05d90 | 2013-07-10 21:27:00 | [diff] [blame] | 12 | #include "base/bind.h" |
danakj | db9ae794 | 2020-11-11 16:01:35 | [diff] [blame] | 13 | #include "base/callback_helpers.h" |
ginkage | 553af320 | 2015-02-04 12:39:09 | [diff] [blame] | 14 | #include "base/command_line.h" |
thestig | 18dfb7a5 | 2014-08-26 10:44:04 | [diff] [blame] | 15 | #include "base/files/file_util.h" |
Keishi Hattori | 0e45c02 | 2021-11-27 09:25:52 | [diff] [blame] | 16 | #include "base/memory/raw_ptr.h" |
[email protected] | 3b63f8f4 | 2011-03-28 01:54:15 | [diff] [blame] | 17 | #include "base/memory/ref_counted.h" |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 18 | #include "base/path_service.h" |
[email protected] | 43c05d90 | 2013-07-10 21:27:00 | [diff] [blame] | 19 | #include "base/run_loop.h" |
Jay Civelli | 6d0e68e | 2018-01-24 16:42:53 | [diff] [blame] | 20 | #include "base/strings/pattern.h" |
[email protected] | 46acbf1 | 2013-06-10 18:43:42 | [diff] [blame] | 21 | #include "base/strings/string_util.h" |
Jay Civelli | ea8f3df | 2018-01-24 05:17:32 | [diff] [blame] | 22 | #include "base/strings/utf_string_conversions.h" |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 23 | #include "base/threading/thread.h" |
gab | 273138e | 2016-05-11 18:09:39 | [diff] [blame] | 24 | #include "base/threading/thread_task_runner_handle.h" |
[email protected] | f3a1c64 | 2011-07-12 19:15:03 | [diff] [blame] | 25 | #include "base/values.h" |
asargent | c4fdad2 | 2015-08-28 22:44:39 | [diff] [blame] | 26 | #include "components/crx_file/id_util.h" |
Ken Rockot | 61df041 | 2019-07-26 17:12:19 | [diff] [blame] | 27 | #include "components/services/unzip/content/unzip_service.h" |
| 28 | #include "components/services/unzip/in_process_unzipper.h" |
Alex Kalugin | a34f8c0 | 2017-07-27 11:33:03 | [diff] [blame] | 29 | #include "content/public/browser/browser_thread.h" |
Gabriel Charette | c710874 | 2019-08-23 03:31:40 | [diff] [blame] | 30 | #include "content/public/test/browser_task_environment.h" |
[email protected] | 43c05d90 | 2013-07-10 21:27:00 | [diff] [blame] | 31 | #include "content/public/test/test_utils.h" |
asargent | 275faaa | 2015-01-27 23:43:29 | [diff] [blame] | 32 | #include "extensions/browser/extensions_test.h" |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 33 | #include "extensions/browser/install/crx_install_error.h" |
| 34 | #include "extensions/browser/install/sandboxed_unpacker_failure_reason.h" |
[email protected] | 993da5e | 2013-03-23 21:25:16 | [diff] [blame] | 35 | #include "extensions/common/constants.h" |
[email protected] | e4452d3 | 2013-11-15 23:07:41 | [diff] [blame] | 36 | #include "extensions/common/extension.h" |
asargent | 12a9cab7 | 2015-01-16 21:34:16 | [diff] [blame] | 37 | #include "extensions/common/extension_paths.h" |
Oleg Davydov | 795d1b60 | 2020-01-02 09:44:27 | [diff] [blame] | 38 | #include "extensions/common/file_util.h" |
Jay Civelli | 6d0e68e | 2018-01-24 16:42:53 | [diff] [blame] | 39 | #include "extensions/common/manifest_constants.h" |
ginkage | 553af320 | 2015-02-04 12:39:09 | [diff] [blame] | 40 | #include "extensions/common/switches.h" |
Joshua Pawlicki | 735b92d | 2019-11-13 22:39:17 | [diff] [blame] | 41 | #include "extensions/common/value_builder.h" |
Joshua Pawlicki | fd01b7c | 2019-01-17 16:18:34 | [diff] [blame] | 42 | #include "extensions/common/verifier_formats.h" |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 43 | #include "extensions/strings/grit/extensions_strings.h" |
Jay Civelli | ea8f3df | 2018-01-24 05:17:32 | [diff] [blame] | 44 | #include "extensions/test/test_extensions_client.h" |
Ken Rockot | dc32df89 | 2019-11-01 06:32:10 | [diff] [blame] | 45 | #include "services/data_decoder/public/cpp/test_support/in_process_data_decoder.h" |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 46 | #include "testing/gmock/include/gmock/gmock.h" |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 47 | #include "testing/gtest/include/gtest/gtest.h" |
| 48 | #include "third_party/skia/include/core/SkBitmap.h" |
asargent | c4fdad2 | 2015-08-28 22:44:39 | [diff] [blame] | 49 | #include "third_party/zlib/google/zip.h" |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 50 | #include "ui/base/l10n/l10n_util.h" |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 51 | |
[email protected] | f5ac274 | 2012-07-02 17:50:58 | [diff] [blame] | 52 | namespace extensions { |
| 53 | |
Jay Civelli | ea8f3df | 2018-01-24 05:17:32 | [diff] [blame] | 54 | namespace { |
| 55 | |
| 56 | // Inserts an illegal path into the browser images returned by |
| 57 | // TestExtensionsClient for any extension. |
| 58 | class IllegalImagePathInserter |
| 59 | : public TestExtensionsClient::BrowserImagePathsFilter { |
| 60 | public: |
| 61 | IllegalImagePathInserter(TestExtensionsClient* client) : client_(client) { |
| 62 | client_->AddBrowserImagePathsFilter(this); |
| 63 | } |
| 64 | |
| 65 | virtual ~IllegalImagePathInserter() { |
| 66 | client_->RemoveBrowserImagePathsFilter(this); |
| 67 | } |
| 68 | |
| 69 | void Filter(const Extension* extension, |
| 70 | std::set<base::FilePath>* paths) override { |
| 71 | base::FilePath illegal_path = |
| 72 | base::FilePath(base::FilePath::kParentDirectory) |
| 73 | .AppendASCII(kTempExtensionName) |
| 74 | .AppendASCII("product_logo_128.png"); |
| 75 | paths->insert(illegal_path); |
| 76 | } |
| 77 | |
| 78 | private: |
Keishi Hattori | 0e45c02 | 2021-11-27 09:25:52 | [diff] [blame] | 79 | raw_ptr<TestExtensionsClient> client_; |
Jay Civelli | ea8f3df | 2018-01-24 05:17:32 | [diff] [blame] | 80 | }; |
| 81 | |
| 82 | } // namespace |
| 83 | |
[email protected] | f5ac274 | 2012-07-02 17:50:58 | [diff] [blame] | 84 | class MockSandboxedUnpackerClient : public SandboxedUnpackerClient { |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 85 | public: |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 86 | explicit MockSandboxedUnpackerClient( |
| 87 | scoped_refptr<base::SequencedTaskRunner> callback_runner) |
| 88 | : callback_runner_(callback_runner) {} |
[email protected] | 5f2a475 | 2012-04-27 22:18:58 | [diff] [blame] | 89 | |
[email protected] | 43c05d90 | 2013-07-10 21:27:00 | [diff] [blame] | 90 | base::FilePath temp_dir() const { return temp_dir_; } |
Jan Wilken Dörrie | 85285b0 | 2021-03-11 23:38:47 | [diff] [blame] | 91 | std::u16string unpack_error_message() const { |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 92 | if (error_) |
| 93 | return error_->message(); |
Jan Wilken Dörrie | 85285b0 | 2021-03-11 23:38:47 | [diff] [blame] | 94 | return std::u16string(); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 95 | } |
| 96 | CrxInstallErrorType unpack_error_type() const { |
| 97 | if (error_) |
| 98 | return error_->type(); |
| 99 | return CrxInstallErrorType::NONE; |
| 100 | } |
| 101 | int unpack_error_detail() const { |
| 102 | if (error_) { |
| 103 | return error_->type() == CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE |
| 104 | ? static_cast<int>(error_->sandbox_failure_detail()) |
| 105 | : static_cast<int>(error_->detail()); |
| 106 | } |
| 107 | return 0; |
| 108 | } |
[email protected] | 43c05d90 | 2013-07-10 21:27:00 | [diff] [blame] | 109 | |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 110 | void set_deleted_tracker(bool* deleted_tracker) { |
| 111 | deleted_tracker_ = deleted_tracker; |
| 112 | } |
| 113 | |
Oleg Davydov | 795d1b60 | 2020-01-02 09:44:27 | [diff] [blame] | 114 | void set_should_compute_hashes(bool should_compute_hashes) { |
| 115 | should_compute_hashes_ = should_compute_hashes; |
| 116 | } |
| 117 | |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 118 | void SetQuitClosure(base::OnceClosure quit_closure) { |
| 119 | quit_closure_ = std::move(quit_closure); |
| 120 | } |
| 121 | |
[email protected] | 43c05d90 | 2013-07-10 21:27:00 | [diff] [blame] | 122 | private: |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 123 | ~MockSandboxedUnpackerClient() override { |
| 124 | if (deleted_tracker_) |
| 125 | *deleted_tracker_ = true; |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 126 | if (quit_closure_) |
| 127 | std::move(quit_closure_).Run(); |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 128 | } |
[email protected] | 43c05d90 | 2013-07-10 21:27:00 | [diff] [blame] | 129 | |
Oleg Davydov | 795d1b60 | 2020-01-02 09:44:27 | [diff] [blame] | 130 | void ShouldComputeHashesForOffWebstoreExtension( |
| 131 | scoped_refptr<const Extension> extension, |
| 132 | base::OnceCallback<void(bool)> callback) override { |
| 133 | std::move(callback).Run(should_compute_hashes_); |
| 134 | } |
| 135 | |
Kelvin Jiang | 3c2bf33c | 2020-08-25 00:32:30 | [diff] [blame] | 136 | void OnUnpackSuccess(const base::FilePath& temp_dir, |
| 137 | const base::FilePath& extension_root, |
| 138 | std::unique_ptr<base::DictionaryValue> original_manifest, |
| 139 | const Extension* extension, |
| 140 | const SkBitmap& install_icon, |
| 141 | declarative_net_request::RulesetInstallPrefs |
| 142 | ruleset_install_prefs) override { |
[email protected] | 43c05d90 | 2013-07-10 21:27:00 | [diff] [blame] | 143 | temp_dir_ = temp_dir; |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 144 | callback_runner_->PostTask(FROM_HERE, std::move(quit_closure_)); |
[email protected] | 43c05d90 | 2013-07-10 21:27:00 | [diff] [blame] | 145 | } |
| 146 | |
ginkage | 47e603e | 2015-02-27 08:42:41 | [diff] [blame] | 147 | void OnUnpackFailure(const CrxInstallError& error) override { |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 148 | error_ = error; |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 149 | callback_runner_->PostTask(FROM_HERE, std::move(quit_closure_)); |
[email protected] | 43c05d90 | 2013-07-10 21:27:00 | [diff] [blame] | 150 | } |
| 151 | |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 152 | scoped_refptr<base::SequencedTaskRunner> callback_runner_; |
Anton Bikineev | 6d67847 | 2021-05-15 18:48:51 | [diff] [blame] | 153 | absl::optional<CrxInstallError> error_; |
danakj | 166a3912 | 2019-11-29 16:05:26 | [diff] [blame] | 154 | base::OnceClosure quit_closure_; |
[email protected] | 43c05d90 | 2013-07-10 21:27:00 | [diff] [blame] | 155 | base::FilePath temp_dir_; |
Keishi Hattori | 0e45c02 | 2021-11-27 09:25:52 | [diff] [blame] | 156 | raw_ptr<bool> deleted_tracker_ = nullptr; |
Oleg Davydov | 795d1b60 | 2020-01-02 09:44:27 | [diff] [blame] | 157 | bool should_compute_hashes_ = false; |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 158 | }; |
| 159 | |
asargent | 275faaa | 2015-01-27 23:43:29 | [diff] [blame] | 160 | class SandboxedUnpackerTest : public ExtensionsTest { |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 161 | public: |
danakj | aee6717 | 2017-06-13 16:37:02 | [diff] [blame] | 162 | SandboxedUnpackerTest() |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 163 | : ExtensionsTest(content::BrowserTaskEnvironment::IO_MAINLOOP), |
| 164 | unpacker_thread_("Unpacker Thread") {} |
Alex Kalugin | a34f8c0 | 2017-07-27 11:33:03 | [diff] [blame] | 165 | |
dcheng | 7219181 | 2014-10-28 20:49:56 | [diff] [blame] | 166 | void SetUp() override { |
asargent | 275faaa | 2015-01-27 23:43:29 | [diff] [blame] | 167 | ExtensionsTest::SetUp(); |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 168 | |
| 169 | unpacker_thread_.Start(); |
| 170 | unpacker_task_runner_ = unpacker_thread_.task_runner(); |
| 171 | |
asargent | 275faaa | 2015-01-27 23:43:29 | [diff] [blame] | 172 | ASSERT_TRUE(extensions_dir_.CreateUniqueTempDir()); |
Peter Boström | 5effa32 | 2021-04-02 22:39:39 | [diff] [blame] | 173 | in_process_utility_thread_helper_ = |
| 174 | std::make_unique<content::InProcessUtilityThreadHelper>(); |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 175 | // It will delete itself. |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 176 | client_ = new MockSandboxedUnpackerClient( |
| 177 | task_environment()->GetMainThreadTaskRunner()); |
asargent | c4fdad2 | 2015-08-28 22:44:39 | [diff] [blame] | 178 | |
Ken Rockot | dc32df89 | 2019-11-01 06:32:10 | [diff] [blame] | 179 | InitSandboxedUnpacker(); |
Ken Rockot | 61df041 | 2019-07-26 17:12:19 | [diff] [blame] | 180 | |
| 181 | // By default, we host an in-process UnzipperImpl to support any service |
| 182 | // clients. Tests may explicitly override the launch callback to prevent |
| 183 | // this. |
| 184 | unzip::SetUnzipperLaunchOverrideForTesting( |
| 185 | base::BindRepeating(&unzip::LaunchInProcessUnzipper)); |
Jay Civelli | b6f2cc9c | 2018-03-10 01:13:57 | [diff] [blame] | 186 | } |
| 187 | |
Ken Rockot | dc32df89 | 2019-11-01 06:32:10 | [diff] [blame] | 188 | void InitSandboxedUnpacker() { |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 189 | sandboxed_unpacker_ = new SandboxedUnpacker( |
| 190 | mojom::ManifestLocation::kInternal, Extension::NO_FLAGS, |
| 191 | extensions_dir_.GetPath(), unpacker_task_runner_, client_); |
Ken Rockot | a373add | 2018-10-30 23:22:42 | [diff] [blame] | 192 | } |
| 193 | |
dcheng | 7219181 | 2014-10-28 20:49:56 | [diff] [blame] | 194 | void TearDown() override { |
Ken Rockot | 61df041 | 2019-07-26 17:12:19 | [diff] [blame] | 195 | unzip::SetUnzipperLaunchOverrideForTesting(base::NullCallback()); |
[email protected] | f5ac274 | 2012-07-02 17:50:58 | [diff] [blame] | 196 | // Need to destruct SandboxedUnpacker before the message loop since |
[email protected] | 38f285a5 | 2010-11-05 21:02:28 | [diff] [blame] | 197 | // it posts a task to it. |
danakj | aee6717 | 2017-06-13 16:37:02 | [diff] [blame] | 198 | sandboxed_unpacker_ = nullptr; |
[email protected] | 43c05d90 | 2013-07-10 21:27:00 | [diff] [blame] | 199 | base::RunLoop().RunUntilIdle(); |
asargent | 275faaa | 2015-01-27 23:43:29 | [diff] [blame] | 200 | ExtensionsTest::TearDown(); |
danakj | aee6717 | 2017-06-13 16:37:02 | [diff] [blame] | 201 | in_process_utility_thread_helper_.reset(); |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 202 | |
| 203 | unpacker_thread_.Stop(); |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 204 | } |
| 205 | |
asargent | c4fdad2 | 2015-08-28 22:44:39 | [diff] [blame] | 206 | base::FilePath GetCrxFullPath(const std::string& crx_name) { |
| 207 | base::FilePath full_path; |
Avi Drissman | 210441b7 | 2018-05-01 15:51:00 | [diff] [blame] | 208 | EXPECT_TRUE(base::PathService::Get(extensions::DIR_TEST_DATA, &full_path)); |
asargent | c4fdad2 | 2015-08-28 22:44:39 | [diff] [blame] | 209 | full_path = full_path.AppendASCII("unpacker").AppendASCII(crx_name); |
| 210 | EXPECT_TRUE(base::PathExists(full_path)) << full_path.value(); |
| 211 | return full_path; |
| 212 | } |
| 213 | |
ginkage | 553af320 | 2015-02-04 12:39:09 | [diff] [blame] | 214 | void SetupUnpacker(const std::string& crx_name, |
| 215 | const std::string& package_hash) { |
asargent | c4fdad2 | 2015-08-28 22:44:39 | [diff] [blame] | 216 | base::FilePath crx_path = GetCrxFullPath(crx_name); |
Saurabh Nijhara | 156c9dd | 2020-04-29 20:44:19 | [diff] [blame] | 217 | extensions::CRXFileInfo crx_info(crx_path, GetTestVerifierFormat()); |
| 218 | crx_info.expected_hash = package_hash; |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 219 | |
| 220 | base::RunLoop run_loop; |
| 221 | client_->SetQuitClosure(run_loop.QuitClosure()); |
| 222 | |
| 223 | unpacker_task_runner_->PostTask( |
Saurabh Nijhara | 156c9dd | 2020-04-29 20:44:19 | [diff] [blame] | 224 | FROM_HERE, base::BindOnce(&SandboxedUnpacker::StartWithCrx, |
| 225 | sandboxed_unpacker_, crx_info)); |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 226 | // Wait for unpack |
| 227 | run_loop.Run(); |
asargent | c4fdad2 | 2015-08-28 22:44:39 | [diff] [blame] | 228 | } |
| 229 | |
| 230 | void SetupUnpackerWithDirectory(const std::string& crx_name) { |
| 231 | base::ScopedTempDir temp_dir; |
| 232 | ASSERT_TRUE(temp_dir.CreateUniqueTempDir()); |
| 233 | base::FilePath crx_path = GetCrxFullPath(crx_name); |
vabr | 9142fe2 | 2016-09-08 13:19:22 | [diff] [blame] | 234 | ASSERT_TRUE(zip::Unzip(crx_path, temp_dir.GetPath())); |
asargent | c4fdad2 | 2015-08-28 22:44:39 | [diff] [blame] | 235 | |
| 236 | std::string fake_id = crx_file::id_util::GenerateId(crx_name); |
| 237 | std::string fake_public_key; |
| 238 | base::Base64Encode(std::string(2048, 'k'), &fake_public_key); |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 239 | |
| 240 | base::RunLoop run_loop; |
| 241 | client_->SetQuitClosure(run_loop.QuitClosure()); |
| 242 | |
| 243 | unpacker_task_runner_->PostTask( |
kylechar | 0686a523 | 2019-02-19 14:10:29 | [diff] [blame] | 244 | FROM_HERE, base::BindOnce(&SandboxedUnpacker::StartWithDirectory, |
| 245 | sandboxed_unpacker_, fake_id, fake_public_key, |
| 246 | temp_dir.Take())); |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 247 | |
| 248 | // Wait for unpack |
| 249 | run_loop.Run(); |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 250 | } |
| 251 | |
Jay Civelli | ea8f3df | 2018-01-24 05:17:32 | [diff] [blame] | 252 | bool InstallSucceeded() const { return !client_->temp_dir().empty(); } |
| 253 | |
| 254 | base::FilePath GetInstallPath() const { |
[email protected] | b22c8af6 | 2013-07-23 23:17:02 | [diff] [blame] | 255 | return client_->temp_dir().AppendASCII(kTempExtensionName); |
[email protected] | b0b3abd9 | 2010-04-30 17:00:09 | [diff] [blame] | 256 | } |
| 257 | |
Jan Wilken Dörrie | 85285b0 | 2021-03-11 23:38:47 | [diff] [blame] | 258 | std::u16string GetInstallErrorMessage() const { |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 259 | return client_->unpack_error_message(); |
| 260 | } |
| 261 | |
| 262 | CrxInstallErrorType GetInstallErrorType() const { |
| 263 | return client_->unpack_error_type(); |
| 264 | } |
| 265 | |
| 266 | int GetInstallErrorDetail() const { return client_->unpack_error_detail(); } |
ginkage | 553af320 | 2015-02-04 12:39:09 | [diff] [blame] | 267 | |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 268 | void ExpectInstallErrorContains(const std::string& error) { |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 269 | std::string full_error = base::UTF16ToUTF8(client_->unpack_error_message()); |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 270 | EXPECT_TRUE(full_error.find(error) != std::string::npos) |
| 271 | << "Error message " << full_error << " does not contain " << error; |
| 272 | } |
| 273 | |
| 274 | // Unpacks the package |package_name| and checks that |sandboxed_unpacker_| |
| 275 | // gets deleted. |
| 276 | void TestSandboxedUnpackerDeleted(const std::string& package_name, |
| 277 | bool expect_success) { |
| 278 | bool client_deleted = false; |
| 279 | client_->set_deleted_tracker(&client_deleted); |
| 280 | SetupUnpacker(package_name, ""); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 281 | EXPECT_EQ(GetInstallErrorMessage().empty(), expect_success); |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 282 | |
| 283 | base::RunLoop run_loop; |
| 284 | client_->SetQuitClosure(run_loop.QuitClosure()); |
| 285 | |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 286 | // Remove our reference to |sandboxed_unpacker_|, it should get deleted |
| 287 | // since/ it's the last reference. |
| 288 | sandboxed_unpacker_ = nullptr; |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 289 | |
| 290 | // Wait for |client_| dtor. |
| 291 | run_loop.Run(); |
| 292 | |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 293 | // The SandboxedUnpacker should have been deleted and deleted the client. |
| 294 | EXPECT_TRUE(client_deleted); |
| 295 | } |
| 296 | |
Joshua Pawlicki | 735b92d | 2019-11-13 22:39:17 | [diff] [blame] | 297 | void SetPublicKey(const std::string& key) { |
| 298 | sandboxed_unpacker_->public_key_ = key; |
| 299 | } |
| 300 | |
| 301 | void SetExtensionRoot(const base::FilePath& path) { |
| 302 | sandboxed_unpacker_->extension_root_ = path; |
| 303 | } |
| 304 | |
Anton Bikineev | 6d67847 | 2021-05-15 18:48:51 | [diff] [blame] | 305 | absl::optional<base::Value> RewriteManifestFile(const base::Value& manifest) { |
Joshua Pawlicki | 735b92d | 2019-11-13 22:39:17 | [diff] [blame] | 306 | return sandboxed_unpacker_->RewriteManifestFile(manifest); |
| 307 | } |
| 308 | |
Ken Rockot | dc32df89 | 2019-11-01 06:32:10 | [diff] [blame] | 309 | data_decoder::test::InProcessDataDecoder& in_process_data_decoder() { |
| 310 | return in_process_data_decoder_; |
| 311 | } |
| 312 | |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 313 | protected: |
[email protected] | ea1a3f6 | 2012-11-16 20:34:23 | [diff] [blame] | 314 | base::ScopedTempDir extensions_dir_; |
Keishi Hattori | 0e45c02 | 2021-11-27 09:25:52 | [diff] [blame] | 315 | raw_ptr<MockSandboxedUnpackerClient> client_; |
[email protected] | f5ac274 | 2012-07-02 17:50:58 | [diff] [blame] | 316 | scoped_refptr<SandboxedUnpacker> sandboxed_unpacker_; |
dcheng | f5d24108 | 2016-04-21 03:43:11 | [diff] [blame] | 317 | std::unique_ptr<content::InProcessUtilityThreadHelper> |
[email protected] | c514acf | 2014-01-09 07:16:52 | [diff] [blame] | 318 | in_process_utility_thread_helper_; |
Ken Rockot | a373add | 2018-10-30 23:22:42 | [diff] [blame] | 319 | |
Ken Rockot | dc32df89 | 2019-11-01 06:32:10 | [diff] [blame] | 320 | data_decoder::test::InProcessDataDecoder in_process_data_decoder_; |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 321 | |
| 322 | private: |
| 323 | // The thread where the sandboxed unpacker runs. This provides test coverage |
| 324 | // in an environment similar to what we use in production. |
| 325 | base::Thread unpacker_thread_; |
| 326 | |
| 327 | scoped_refptr<base::SequencedTaskRunner> unpacker_task_runner_; |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 328 | }; |
| 329 | |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 330 | TEST_F(SandboxedUnpackerTest, EmptyDefaultLocale) { |
| 331 | SetupUnpacker("empty_default_locale.crx", ""); |
| 332 | ExpectInstallErrorContains(manifest_errors::kInvalidDefaultLocale); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 333 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 334 | GetInstallErrorType()); |
| 335 | EXPECT_EQ( |
| 336 | static_cast<int>(SandboxedUnpackerFailureReason::UNPACKER_CLIENT_FAILED), |
| 337 | GetInstallErrorDetail()); |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 338 | } |
| 339 | |
| 340 | TEST_F(SandboxedUnpackerTest, HasDefaultLocaleMissingLocalesFolder) { |
| 341 | SetupUnpacker("has_default_missing_locales.crx", ""); |
| 342 | ExpectInstallErrorContains(manifest_errors::kLocalesTreeMissing); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 343 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 344 | GetInstallErrorType()); |
| 345 | EXPECT_EQ( |
| 346 | static_cast<int>(SandboxedUnpackerFailureReason::UNPACKER_CLIENT_FAILED), |
| 347 | GetInstallErrorDetail()); |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 348 | } |
| 349 | |
| 350 | TEST_F(SandboxedUnpackerTest, InvalidDefaultLocale) { |
| 351 | SetupUnpacker("invalid_default_locale.crx", ""); |
| 352 | ExpectInstallErrorContains(manifest_errors::kInvalidDefaultLocale); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 353 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 354 | GetInstallErrorType()); |
| 355 | EXPECT_EQ( |
| 356 | static_cast<int>(SandboxedUnpackerFailureReason::UNPACKER_CLIENT_FAILED), |
| 357 | GetInstallErrorDetail()); |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 358 | } |
| 359 | |
| 360 | TEST_F(SandboxedUnpackerTest, MissingDefaultData) { |
| 361 | SetupUnpacker("missing_default_data.crx", ""); |
| 362 | ExpectInstallErrorContains(manifest_errors::kLocalesNoDefaultMessages); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 363 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 364 | GetInstallErrorType()); |
| 365 | EXPECT_EQ( |
| 366 | static_cast<int>(SandboxedUnpackerFailureReason::UNPACKER_CLIENT_FAILED), |
| 367 | GetInstallErrorDetail()); |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 368 | } |
| 369 | |
| 370 | TEST_F(SandboxedUnpackerTest, MissingDefaultLocaleHasLocalesFolder) { |
| 371 | SetupUnpacker("missing_default_has_locales.crx", ""); |
| 372 | ExpectInstallErrorContains(l10n_util::GetStringUTF8( |
| 373 | IDS_EXTENSION_LOCALES_NO_DEFAULT_LOCALE_SPECIFIED)); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 374 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 375 | GetInstallErrorType()); |
| 376 | EXPECT_EQ( |
| 377 | static_cast<int>(SandboxedUnpackerFailureReason::UNPACKER_CLIENT_FAILED), |
| 378 | GetInstallErrorDetail()); |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 379 | } |
| 380 | |
| 381 | TEST_F(SandboxedUnpackerTest, MissingMessagesFile) { |
| 382 | SetupUnpacker("missing_messages_file.crx", ""); |
| 383 | EXPECT_TRUE(base::MatchPattern( |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 384 | GetInstallErrorMessage(), |
Peter Varga | 3b99c26 | 2021-12-01 22:24:06 | [diff] [blame] | 385 | u"*" + std::u16string(manifest_errors::kLocalesMessagesFileMissing) + |
Jan Wilken Dörrie | c92a6d724 | 2021-03-23 17:43:48 | [diff] [blame] | 386 | u"*_locales?en_US?messages.json'.")) |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 387 | << GetInstallErrorMessage(); |
| 388 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 389 | GetInstallErrorType()); |
| 390 | EXPECT_EQ( |
| 391 | static_cast<int>(SandboxedUnpackerFailureReason::UNPACKER_CLIENT_FAILED), |
| 392 | GetInstallErrorDetail()); |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 393 | } |
| 394 | |
| 395 | TEST_F(SandboxedUnpackerTest, NoLocaleData) { |
| 396 | SetupUnpacker("no_locale_data.crx", ""); |
| 397 | ExpectInstallErrorContains(manifest_errors::kLocalesNoDefaultMessages); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 398 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 399 | GetInstallErrorType()); |
| 400 | EXPECT_EQ( |
| 401 | static_cast<int>(SandboxedUnpackerFailureReason::UNPACKER_CLIENT_FAILED), |
| 402 | GetInstallErrorDetail()); |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 403 | } |
| 404 | |
Jay Civelli | ea8f3df | 2018-01-24 05:17:32 | [diff] [blame] | 405 | TEST_F(SandboxedUnpackerTest, ImageDecodingError) { |
Peter Kasting | aae6db93 | 2021-05-04 12:02:11 | [diff] [blame] | 406 | const char16_t kExpected[] = u"Could not decode image: "; |
Jay Civelli | ea8f3df | 2018-01-24 05:17:32 | [diff] [blame] | 407 | SetupUnpacker("bad_image.crx", ""); |
Peter Kasting | aae6db93 | 2021-05-04 12:02:11 | [diff] [blame] | 408 | EXPECT_TRUE(base::StartsWith(GetInstallErrorMessage(), kExpected, |
Jay Civelli | ea8f3df | 2018-01-24 05:17:32 | [diff] [blame] | 409 | base::CompareCase::INSENSITIVE_ASCII)) |
| 410 | << "Expected prefix: \"" << kExpected << "\", actual error: \"" |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 411 | << GetInstallErrorMessage() << "\""; |
| 412 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 413 | GetInstallErrorType()); |
| 414 | EXPECT_EQ( |
| 415 | static_cast<int>(SandboxedUnpackerFailureReason::UNPACKER_CLIENT_FAILED), |
| 416 | GetInstallErrorDetail()); |
Jay Civelli | ea8f3df | 2018-01-24 05:17:32 | [diff] [blame] | 417 | } |
| 418 | |
| 419 | TEST_F(SandboxedUnpackerTest, BadPathError) { |
| 420 | IllegalImagePathInserter inserter( |
| 421 | static_cast<TestExtensionsClient*>(ExtensionsClient::Get())); |
| 422 | SetupUnpacker("good_package.crx", ""); |
| 423 | // Install should have failed with an error. |
| 424 | EXPECT_FALSE(InstallSucceeded()); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 425 | EXPECT_FALSE(GetInstallErrorMessage().empty()); |
| 426 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 427 | GetInstallErrorType()); |
| 428 | EXPECT_EQ(static_cast<int>( |
| 429 | SandboxedUnpackerFailureReason::INVALID_PATH_FOR_BROWSER_IMAGE), |
| 430 | GetInstallErrorDetail()); |
Jay Civelli | ea8f3df | 2018-01-24 05:17:32 | [diff] [blame] | 431 | } |
| 432 | |
[email protected] | f5ac274 | 2012-07-02 17:50:58 | [diff] [blame] | 433 | TEST_F(SandboxedUnpackerTest, NoCatalogsSuccess) { |
ginkage | 553af320 | 2015-02-04 12:39:09 | [diff] [blame] | 434 | SetupUnpacker("no_l10n.crx", ""); |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 435 | // Check that there is no _locales folder. |
asargent | 275faaa | 2015-01-27 23:43:29 | [diff] [blame] | 436 | base::FilePath install_path = GetInstallPath().Append(kLocaleFolder); |
[email protected] | 756748414 | 2013-07-11 17:36:07 | [diff] [blame] | 437 | EXPECT_FALSE(base::PathExists(install_path)); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 438 | EXPECT_EQ(CrxInstallErrorType::NONE, GetInstallErrorType()); |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 439 | } |
| 440 | |
asargent | c4fdad2 | 2015-08-28 22:44:39 | [diff] [blame] | 441 | TEST_F(SandboxedUnpackerTest, FromDirNoCatalogsSuccess) { |
| 442 | SetupUnpackerWithDirectory("no_l10n.crx"); |
| 443 | // Check that there is no _locales folder. |
| 444 | base::FilePath install_path = GetInstallPath().Append(kLocaleFolder); |
| 445 | EXPECT_FALSE(base::PathExists(install_path)); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 446 | EXPECT_EQ(CrxInstallErrorType::NONE, GetInstallErrorType()); |
asargent | c4fdad2 | 2015-08-28 22:44:39 | [diff] [blame] | 447 | } |
| 448 | |
[email protected] | 11170a77 | 2013-12-13 11:38:32 | [diff] [blame] | 449 | TEST_F(SandboxedUnpackerTest, WithCatalogsSuccess) { |
ginkage | 553af320 | 2015-02-04 12:39:09 | [diff] [blame] | 450 | SetupUnpacker("good_l10n.crx", ""); |
[email protected] | 43c05d90 | 2013-07-10 21:27:00 | [diff] [blame] | 451 | // Check that there is _locales folder. |
asargent | 275faaa | 2015-01-27 23:43:29 | [diff] [blame] | 452 | base::FilePath install_path = GetInstallPath().Append(kLocaleFolder); |
[email protected] | 756748414 | 2013-07-11 17:36:07 | [diff] [blame] | 453 | EXPECT_TRUE(base::PathExists(install_path)); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 454 | EXPECT_EQ(CrxInstallErrorType::NONE, GetInstallErrorType()); |
[email protected] | 9428edc | 2009-11-18 18:02:47 | [diff] [blame] | 455 | } |
[email protected] | f5ac274 | 2012-07-02 17:50:58 | [diff] [blame] | 456 | |
asargent | c4fdad2 | 2015-08-28 22:44:39 | [diff] [blame] | 457 | TEST_F(SandboxedUnpackerTest, FromDirWithCatalogsSuccess) { |
| 458 | SetupUnpackerWithDirectory("good_l10n.crx"); |
| 459 | // Check that there is _locales folder. |
| 460 | base::FilePath install_path = GetInstallPath().Append(kLocaleFolder); |
| 461 | EXPECT_TRUE(base::PathExists(install_path)); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 462 | EXPECT_EQ(CrxInstallErrorType::NONE, GetInstallErrorType()); |
asargent | c4fdad2 | 2015-08-28 22:44:39 | [diff] [blame] | 463 | } |
| 464 | |
Miyoung Shin | 3a9de44 | 2022-08-04 02:17:35 | [diff] [blame] | 465 | TEST_F(SandboxedUnpackerTest, FailHashCheck) { |
ginkage | 553af320 | 2015-02-04 12:39:09 | [diff] [blame] | 466 | base::CommandLine::ForCurrentProcess()->AppendSwitch( |
| 467 | extensions::switches::kEnableCrxHashCheck); |
waffles | 5918d5f | 2017-05-23 01:45:28 | [diff] [blame] | 468 | SetupUnpacker("good_l10n.crx", std::string(64, '0')); |
ginkage | 553af320 | 2015-02-04 12:39:09 | [diff] [blame] | 469 | // Check that there is an error message. |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 470 | EXPECT_FALSE(GetInstallErrorMessage().empty()); |
| 471 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 472 | GetInstallErrorType()); |
| 473 | EXPECT_EQ(static_cast<int>( |
| 474 | SandboxedUnpackerFailureReason::CRX_HASH_VERIFICATION_FAILED), |
| 475 | GetInstallErrorDetail()); |
ginkage | 553af320 | 2015-02-04 12:39:09 | [diff] [blame] | 476 | } |
| 477 | |
Joshua Pawlicki | 735b92d | 2019-11-13 22:39:17 | [diff] [blame] | 478 | TEST_F(SandboxedUnpackerTest, TestRewriteManifestInjections) { |
| 479 | constexpr char kTestKey[] = "test_key"; |
| 480 | constexpr char kTestVersion[] = "1.2.3"; |
| 481 | constexpr char kVersionStr[] = "version"; |
| 482 | SetPublicKey(kTestKey); |
| 483 | SetExtensionRoot(extensions_dir_.GetPath()); |
| 484 | std::string fingerprint = "1.0123456789abcdef"; |
| 485 | base::WriteFile(extensions_dir_.GetPath().Append( |
| 486 | FILE_PATH_LITERAL("manifest.fingerprint")), |
| 487 | fingerprint.c_str(), |
| 488 | base::checked_cast<int>(fingerprint.size())); |
Anton Bikineev | 6d67847 | 2021-05-15 18:48:51 | [diff] [blame] | 489 | absl::optional<base::Value> manifest(RewriteManifestFile( |
Joshua Pawlicki | 735b92d | 2019-11-13 22:39:17 | [diff] [blame] | 490 | *DictionaryBuilder().Set(kVersionStr, kTestVersion).Build())); |
| 491 | auto* key = manifest->FindStringKey("key"); |
| 492 | auto* version = manifest->FindStringKey(kVersionStr); |
| 493 | auto* differential_fingerprint = |
| 494 | manifest->FindStringKey("differential_fingerprint"); |
| 495 | ASSERT_NE(nullptr, key); |
| 496 | ASSERT_NE(nullptr, version); |
| 497 | ASSERT_NE(nullptr, differential_fingerprint); |
| 498 | EXPECT_EQ(kTestKey, *key); |
| 499 | EXPECT_EQ(kTestVersion, *version); |
| 500 | EXPECT_EQ(fingerprint, *differential_fingerprint); |
| 501 | } |
| 502 | |
Jay Civelli | 6d0e68e | 2018-01-24 16:42:53 | [diff] [blame] | 503 | TEST_F(SandboxedUnpackerTest, InvalidMessagesFile) { |
| 504 | SetupUnpackerWithDirectory("invalid_messages_file.crx"); |
| 505 | // Check that there is no _locales folder. |
| 506 | base::FilePath install_path = GetInstallPath().Append(kLocaleFolder); |
| 507 | EXPECT_FALSE(base::PathExists(install_path)); |
| 508 | EXPECT_TRUE(base::MatchPattern( |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 509 | GetInstallErrorMessage(), |
Jan Wilken Dörrie | 782626b | 2021-04-14 18:22:14 | [diff] [blame] | 510 | u"*_locales?en_US?messages.json': Line: 4, column: 1,*")) |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 511 | << GetInstallErrorMessage(); |
| 512 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 513 | GetInstallErrorType()); |
| 514 | EXPECT_EQ(static_cast<int>( |
| 515 | SandboxedUnpackerFailureReason::COULD_NOT_LOCALIZE_EXTENSION), |
| 516 | GetInstallErrorDetail()); |
Jay Civelli | 6d0e68e | 2018-01-24 16:42:53 | [diff] [blame] | 517 | } |
| 518 | |
ginkage | 553af320 | 2015-02-04 12:39:09 | [diff] [blame] | 519 | TEST_F(SandboxedUnpackerTest, PassHashCheck) { |
| 520 | base::CommandLine::ForCurrentProcess()->AppendSwitch( |
| 521 | extensions::switches::kEnableCrxHashCheck); |
| 522 | SetupUnpacker( |
| 523 | "good_l10n.crx", |
Devlin Cronin | 1de93897 | 2018-04-24 19:17:15 | [diff] [blame] | 524 | "614AE3D608F4C2185E9173293AB3F93EE7C7C79C9A2C3CF71F633386A3296A6C"); |
ginkage | 553af320 | 2015-02-04 12:39:09 | [diff] [blame] | 525 | // Check that there is no error message. |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 526 | EXPECT_THAT(GetInstallErrorMessage(), testing::IsEmpty()); |
| 527 | EXPECT_EQ(CrxInstallErrorType::NONE, GetInstallErrorType()); |
ginkage | 553af320 | 2015-02-04 12:39:09 | [diff] [blame] | 528 | } |
| 529 | |
| 530 | TEST_F(SandboxedUnpackerTest, SkipHashCheck) { |
| 531 | SetupUnpacker("good_l10n.crx", "badhash"); |
| 532 | // Check that there is no error message. |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 533 | EXPECT_THAT(GetInstallErrorMessage(), testing::IsEmpty()); |
| 534 | EXPECT_EQ(CrxInstallErrorType::NONE, GetInstallErrorType()); |
ginkage | 553af320 | 2015-02-04 12:39:09 | [diff] [blame] | 535 | } |
| 536 | |
Jay Civelli | b6f2cc9c | 2018-03-10 01:13:57 | [diff] [blame] | 537 | // The following tests simulate the utility services failling. |
| 538 | TEST_F(SandboxedUnpackerTest, UnzipperServiceFails) { |
Ken Rockot | 61df041 | 2019-07-26 17:12:19 | [diff] [blame] | 539 | // We override the Unzipper's launching behavior to drop the interface |
| 540 | // receiver, effectively simulating a crashy service process. |
| 541 | unzip::SetUnzipperLaunchOverrideForTesting(base::BindRepeating([]() -> auto { |
| 542 | mojo::PendingRemote<unzip::mojom::Unzipper> remote; |
Avi Drissman | 2907147 | 2022-01-11 19:43:51 | [diff] [blame] | 543 | std::ignore = remote.InitWithNewPipeAndPassReceiver(); |
Ken Rockot | 61df041 | 2019-07-26 17:12:19 | [diff] [blame] | 544 | return remote; |
| 545 | })); |
| 546 | |
Ken Rockot | dc32df89 | 2019-11-01 06:32:10 | [diff] [blame] | 547 | InitSandboxedUnpacker(); |
Jay Civelli | b6f2cc9c | 2018-03-10 01:13:57 | [diff] [blame] | 548 | SetupUnpacker("good_package.crx", ""); |
| 549 | EXPECT_FALSE(InstallSucceeded()); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 550 | EXPECT_FALSE(GetInstallErrorMessage().empty()); |
| 551 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 552 | GetInstallErrorType()); |
| 553 | EXPECT_EQ(static_cast<int>(SandboxedUnpackerFailureReason::UNZIP_FAILED), |
| 554 | GetInstallErrorDetail()); |
Jay Civelli | b6f2cc9c | 2018-03-10 01:13:57 | [diff] [blame] | 555 | } |
| 556 | |
| 557 | TEST_F(SandboxedUnpackerTest, JsonParserFails) { |
Ken Rockot | dc32df89 | 2019-11-01 06:32:10 | [diff] [blame] | 558 | in_process_data_decoder().service().SimulateJsonParserCrashForTesting(true); |
| 559 | InitSandboxedUnpacker(); |
| 560 | |
Jay Civelli | b6f2cc9c | 2018-03-10 01:13:57 | [diff] [blame] | 561 | SetupUnpacker("good_package.crx", ""); |
| 562 | EXPECT_FALSE(InstallSucceeded()); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 563 | EXPECT_FALSE(GetInstallErrorMessage().empty()); |
| 564 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 565 | GetInstallErrorType()); |
Jay Civelli | b6f2cc9c | 2018-03-10 01:13:57 | [diff] [blame] | 566 | } |
| 567 | |
| 568 | TEST_F(SandboxedUnpackerTest, ImageDecoderFails) { |
Ken Rockot | dc32df89 | 2019-11-01 06:32:10 | [diff] [blame] | 569 | in_process_data_decoder().service().SimulateImageDecoderCrashForTesting(true); |
| 570 | InitSandboxedUnpacker(); |
Jay Civelli | b6f2cc9c | 2018-03-10 01:13:57 | [diff] [blame] | 571 | SetupUnpacker("good_package.crx", ""); |
| 572 | EXPECT_FALSE(InstallSucceeded()); |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 573 | EXPECT_FALSE(GetInstallErrorMessage().empty()); |
| 574 | ASSERT_EQ(CrxInstallErrorType::SANDBOXED_UNPACKER_FAILURE, |
| 575 | GetInstallErrorType()); |
| 576 | EXPECT_EQ( |
Lukasz Anforowicz | 4136a049 | 2021-10-20 00:56:21 | [diff] [blame] | 577 | static_cast<int>(SandboxedUnpackerFailureReason::UNPACKER_CLIENT_FAILED), |
Minh X. Nguyen | 8803f4e | 2018-05-25 01:03:10 | [diff] [blame] | 578 | GetInstallErrorDetail()); |
Jay Civelli | b6f2cc9c | 2018-03-10 01:13:57 | [diff] [blame] | 579 | } |
| 580 | |
Oleg Davydov | 795d1b60 | 2020-01-02 09:44:27 | [diff] [blame] | 581 | TEST_F(SandboxedUnpackerTest, NoComputeHashes) { |
| 582 | client_->set_should_compute_hashes(false); |
| 583 | SetupUnpacker("good_package.crx", ""); |
| 584 | EXPECT_TRUE(InstallSucceeded()); |
| 585 | EXPECT_TRUE(GetInstallErrorMessage().empty()); |
| 586 | EXPECT_FALSE( |
| 587 | base::PathExists(file_util::GetComputedHashesPath(GetInstallPath()))); |
| 588 | } |
| 589 | |
| 590 | TEST_F(SandboxedUnpackerTest, ComputeHashes) { |
| 591 | client_->set_should_compute_hashes(true); |
| 592 | SetupUnpacker("good_package.crx", ""); |
| 593 | EXPECT_TRUE(InstallSucceeded()); |
| 594 | EXPECT_TRUE(GetInstallErrorMessage().empty()); |
| 595 | EXPECT_TRUE( |
| 596 | base::PathExists(file_util::GetComputedHashesPath(GetInstallPath()))); |
| 597 | } |
| 598 | |
Jay Civelli | 26a8564 | 2018-01-26 21:29:39 | [diff] [blame] | 599 | // SandboxedUnpacker is ref counted and is reference by callbacks and |
| 600 | // InterfacePtrs. This tests that it gets deleted as expected (so that no extra |
| 601 | // refs are left). |
| 602 | TEST_F(SandboxedUnpackerTest, DeletedOnSuccess) { |
| 603 | TestSandboxedUnpackerDeleted("good_l10n.crx", /*expect_success=*/true); |
| 604 | } |
| 605 | |
| 606 | TEST_F(SandboxedUnpackerTest, DeletedOnFailure) { |
| 607 | TestSandboxedUnpackerDeleted("bad_image.crx", /*expect_success=*/false); |
| 608 | } |
| 609 | |
[email protected] | f5ac274 | 2012-07-02 17:50:58 | [diff] [blame] | 610 | } // namespace extensions |