// Copyright 2020 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/ash/policy/handlers/minimum_version_policy_handler.h"
#include <memory>
#include "ash/constants/ash_features.h"
#include "base/memory/raw_ptr.h"
#include "base/run_loop.h"
#include "base/test/bind.h"
#include "base/test/scoped_feature_list.h"
#include "base/test/task_environment.h"
#include "base/time/default_clock.h"
#include "base/values.h"
#include "chrome/browser/ash/policy/handlers/minimum_version_policy_test_helpers.h"
#include "chrome/browser/ash/settings/scoped_cros_settings_test_helper.h"
#include "chrome/browser/ash/settings/scoped_testing_cros_settings.h"
#include "chrome/common/pref_names.h"
#include "chrome/test/base/scoped_testing_local_state.h"
#include "chrome/test/base/testing_browser_process.h"
#include "chromeos/ash/components/dbus/shill/shill_service_client.h"
#include "chromeos/ash/components/dbus/update_engine/fake_update_engine_client.h"
#include "chromeos/ash/components/dbus/update_engine/update_engine_client.h"
#include "chromeos/ash/components/install_attributes/stub_install_attributes.h"
#include "chromeos/ash/components/network/network_handler_test_helper.h"
#include "chromeos/ash/components/settings/cros_settings_names.h"
#include "components/prefs/pref_service.h"
#include "content/public/test/browser_task_environment.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "third_party/cros_system_api/dbus/service_constants.h"
namespace policy {
namespace {
using MinimumVersionRequirement =
MinimumVersionPolicyHandler::MinimumVersionRequirement;
const char kFakeCurrentVersion[] = "13305.20.0";
const char kNewVersion[] = "13305.25.0";
const char kNewerVersion[] = "13310.0.0";
const char kNewestVersion[] = "13320.10.0";
const char kOldVersion[] = "13301.0.0";
const int kLongWarning = 10;
const int kShortWarning = 2;
const int kNoWarning = 0;
} // namespace
class MinimumVersionPolicyHandlerTest
: public testing::Test,
public MinimumVersionPolicyHandler::Delegate {
public:
MinimumVersionPolicyHandlerTest();
void SetUp() override;
void TearDown() override;
// MinimumVersionPolicyHandler::Delegate:
bool IsKioskMode() const override;
bool IsDeviceEnterpriseManaged() const override;
base::Version GetCurrentVersion() const override;
bool IsUserEnterpriseManaged() const override;
bool IsUserLoggedIn() const override;
bool IsLoginInProgress() const override;
MOCK_METHOD0(ShowUpdateRequiredScreen, void());
MOCK_METHOD0(RestartToLoginScreen, void());
MOCK_METHOD0(HideUpdateRequiredScreenIfShown, void());
MOCK_CONST_METHOD0(IsLoginSessionState, bool());
void SetCurrentVersionString(std::string version);
void CreateMinimumVersionHandler();
const MinimumVersionPolicyHandler::MinimumVersionRequirement* GetState()
const;
// Set new value for policy pref.
void SetPolicyPref(base::Value::Dict value);
MinimumVersionPolicyHandler* GetMinimumVersionPolicyHandler() {
return minimum_version_policy_handler_.get();
}
void SetUserManaged(bool managed) { user_managed_ = managed; }
content::BrowserTaskEnvironment task_environment{
base::test::TaskEnvironment::TimeSource::MOCK_TIME};
private:
bool user_managed_ = true;
ScopedTestingLocalState local_state_;
base::test::ScopedFeatureList feature_list_;
ash::ScopedTestingCrosSettings scoped_testing_cros_settings_;
ash::ScopedStubInstallAttributes scoped_stub_install_attributes_;
raw_ptr<ash::FakeUpdateEngineClient, DanglingUntriaged>
fake_update_engine_client_;
std::unique_ptr<ash::NetworkHandlerTestHelper> network_handler_test_helper_;
std::unique_ptr<base::Version> current_version_;
std::unique_ptr<MinimumVersionPolicyHandler> minimum_version_policy_handler_;
};
MinimumVersionPolicyHandlerTest::MinimumVersionPolicyHandlerTest()
: local_state_(TestingBrowserProcess::GetGlobal()) {
feature_list_.InitAndEnableFeature(ash::features::kMinimumChromeVersion);
}
void MinimumVersionPolicyHandlerTest::SetUp() {
fake_update_engine_client_ = ash::UpdateEngineClient::InitializeFakeForTest();
network_handler_test_helper_ =
std::make_unique<ash::NetworkHandlerTestHelper>();
ash::ShillServiceClient::TestInterface* service_test =
network_handler_test_helper_->service_test();
service_test->ClearServices();
service_test->AddService("/service/eth", "eth" /* guid */, "eth",
shill::kTypeEthernet, shill::kStateOnline,
true /* visible */);
base::RunLoop().RunUntilIdle();
scoped_stub_install_attributes_.Get()->SetCloudManaged("managed.com",
"device_id");
CreateMinimumVersionHandler();
SetCurrentVersionString(kFakeCurrentVersion);
}
void MinimumVersionPolicyHandlerTest::TearDown() {
minimum_version_policy_handler_.reset();
network_handler_test_helper_.reset();
ash::UpdateEngineClient::Shutdown();
}
void MinimumVersionPolicyHandlerTest::CreateMinimumVersionHandler() {
minimum_version_policy_handler_ =
std::make_unique<MinimumVersionPolicyHandler>(this,
ash::CrosSettings::Get());
}
const MinimumVersionRequirement* MinimumVersionPolicyHandlerTest::GetState()
const {
return minimum_version_policy_handler_->GetState();
}
void MinimumVersionPolicyHandlerTest::SetCurrentVersionString(
std::string version) {
current_version_ = std::make_unique<base::Version>(version);
ASSERT_TRUE(current_version_->IsValid());
}
bool MinimumVersionPolicyHandlerTest::IsKioskMode() const {
return false;
}
bool MinimumVersionPolicyHandlerTest::IsDeviceEnterpriseManaged() const {
return true;
}
bool MinimumVersionPolicyHandlerTest::IsUserEnterpriseManaged() const {
return user_managed_;
}
bool MinimumVersionPolicyHandlerTest::IsUserLoggedIn() const {
return true;
}
bool MinimumVersionPolicyHandlerTest::IsLoginInProgress() const {
return false;
}
base::Version MinimumVersionPolicyHandlerTest::GetCurrentVersion() const {
return *current_version_;
}
void MinimumVersionPolicyHandlerTest::SetPolicyPref(base::Value::Dict value) {
scoped_testing_cros_settings_.device_settings()->Set(
ash::kDeviceMinimumVersion, base::Value(std::move(value)));
}
TEST_F(MinimumVersionPolicyHandlerTest, RequirementsNotMetState) {
// No policy applied yet. Check requirements are satisfied.
EXPECT_TRUE(GetMinimumVersionPolicyHandler()->RequirementsAreSatisfied());
EXPECT_FALSE(GetState());
EXPECT_FALSE(GetMinimumVersionPolicyHandler()->GetTimeRemainingInDays());
// This is needed to wait till EOL status is fetched from the update_engine.
base::RunLoop run_loop;
GetMinimumVersionPolicyHandler()->set_fetch_eol_callback_for_testing(
run_loop.QuitClosure());
// Create policy value as a list of requirements.
base::Value::List requirement_list;
base::Value::Dict new_version_short_warning =
CreateMinimumVersionPolicyRequirement(kNewVersion, kShortWarning,
kNoWarning);
auto strongest_requirement = MinimumVersionRequirement::CreateInstanceIfValid(
new_version_short_warning);
requirement_list.Append(std::move(new_version_short_warning));
requirement_list.Append(CreateMinimumVersionPolicyRequirement(
kNewerVersion, kLongWarning, kNoWarning));
requirement_list.Append(CreateMinimumVersionPolicyRequirement(
kNewestVersion, kNoWarning, kNoWarning));
// Set new value for pref and check that requirements are not satisfied.
// The state in |MinimumVersionPolicyHandler| should be equal to the strongest
// requirement as defined in the policy description.
SetPolicyPref(CreateMinimumVersionPolicyValue(
std::move(requirement_list), false /* unmanaged_user_restricted */));
run_loop.Run();
EXPECT_FALSE(GetMinimumVersionPolicyHandler()->RequirementsAreSatisfied());
EXPECT_TRUE(GetState());
EXPECT_TRUE(strongest_requirement);
EXPECT_EQ(GetState()->Compare(strongest_requirement.get()), 0);
EXPECT_TRUE(GetMinimumVersionPolicyHandler()->GetTimeRemainingInDays());
EXPECT_EQ(GetMinimumVersionPolicyHandler()->GetTimeRemainingInDays().value(),
kShortWarning);
// Reset the pref to empty list and verify state is reset.
SetPolicyPref(base::Value::Dict());
EXPECT_TRUE(GetMinimumVersionPolicyHandler()->RequirementsAreSatisfied());
EXPECT_FALSE(GetState());
EXPECT_FALSE(GetMinimumVersionPolicyHandler()->GetTimeRemainingInDays());
}
TEST_F(MinimumVersionPolicyHandlerTest, CriticalUpdates) {
// No policy applied yet. Check requirements are satisfied.
EXPECT_TRUE(GetMinimumVersionPolicyHandler()->RequirementsAreSatisfied());
EXPECT_FALSE(GetState());
base::RunLoop run_loop;
// Expect calls to make sure that user is logged out.
EXPECT_CALL(*this, RestartToLoginScreen())
.Times(1)
.WillOnce(testing::Invoke([&run_loop]() {
run_loop.Quit();
return false;
}));
EXPECT_CALL(*this, ShowUpdateRequiredScreen()).Times(0);
EXPECT_CALL(*this, HideUpdateRequiredScreenIfShown()).Times(0);
EXPECT_CALL(*this, IsLoginSessionState())
.Times(1)
.WillOnce(testing::Return(false));
// Set new value for pref and check that requirements are not satisfied.
// As the warning time is set to zero, the user should be logged out of the
// session.
SetPolicyPref(CreateMinimumVersionSingleRequirementPolicyValue(
kNewVersion, kNoWarning, kLongWarning,
false /* unmanaged_user_restricted */));
// Start the run loop to wait for EOL status fetch.
run_loop.Run();
EXPECT_FALSE(GetMinimumVersionPolicyHandler()->RequirementsAreSatisfied());
EXPECT_TRUE(GetState());
}
TEST_F(MinimumVersionPolicyHandlerTest, CriticalUpdatesUnmanagedUser) {
// No policy applied yet. Check requirements are satisfied.
EXPECT_TRUE(GetMinimumVersionPolicyHandler()->RequirementsAreSatisfied());
EXPECT_FALSE(GetState());
base::RunLoop run_loop;
// Expect calls to make sure that user is not logged out.
EXPECT_CALL(*this, RestartToLoginScreen()).Times(0);
EXPECT_CALL(*this, ShowUpdateRequiredScreen()).Times(0);
EXPECT_CALL(*this, HideUpdateRequiredScreenIfShown()).Times(0);
// Unmanaged user is not logged out of the session. The run loop is quit on
// reaching IsLoginSessionState() because that implies we have fetched the
// EOL status and reached the end of the policy handler code flow.
EXPECT_CALL(*this, IsLoginSessionState())
.Times(1)
.WillOnce(testing::Invoke([&run_loop]() {
run_loop.Quit();
return false;
}));
// Set user as unmanaged.
SetUserManaged(false);
// Set new value for pref and check that requirements are not satisfied.
// Unmanaged user should not be logged out of the session.
SetPolicyPref(CreateMinimumVersionSingleRequirementPolicyValue(
kNewVersion, kNoWarning, kLongWarning,
false /* unmanaged_user_restricted */));
// Start the run loop to wait for EOL status fetch.
run_loop.Run();
EXPECT_FALSE(GetMinimumVersionPolicyHandler()->RequirementsAreSatisfied());
EXPECT_TRUE(GetState());
}
TEST_F(MinimumVersionPolicyHandlerTest, RequirementsMetState) {
// No policy applied yet. Check requirements are satisfied.
EXPECT_TRUE(GetMinimumVersionPolicyHandler()->RequirementsAreSatisfied());
EXPECT_FALSE(GetState());
// Create policy value as a list of requirements.
base::Value::List requirement_list;
auto current_version_no_warning = CreateMinimumVersionPolicyRequirement(
kFakeCurrentVersion, kNoWarning, kNoWarning);
auto old_version_long_warning = CreateMinimumVersionPolicyRequirement(
kOldVersion, kLongWarning, kNoWarning);
requirement_list.Append(std::move(current_version_no_warning));
requirement_list.Append(std::move(old_version_long_warning));
// Set new value for pref and check that requirements are still satisfied
// as none of the requirements has version greater than current version.
SetPolicyPref(CreateMinimumVersionPolicyValue(
std::move(requirement_list), false /* unmanaged_user_restricted */));
EXPECT_TRUE(GetMinimumVersionPolicyHandler()->RequirementsAreSatisfied());
EXPECT_FALSE(GetState());
}
TEST_F(MinimumVersionPolicyHandlerTest, DeadlineTimerExpired) {
// Checks the user is logged out of the session when the deadline is reached.
EXPECT_TRUE(GetMinimumVersionPolicyHandler()->RequirementsAreSatisfied());
// This is needed to wait till EOL status is fetched from the update_engine.
base::RunLoop run_loop;
GetMinimumVersionPolicyHandler()->set_fetch_eol_callback_for_testing(
run_loop.QuitClosure());
// Expect calls to make sure that user is not logged out.
EXPECT_CALL(*this, RestartToLoginScreen()).Times(0);
EXPECT_CALL(*this, ShowUpdateRequiredScreen()).Times(0);
// Create and set pref value to invoke policy handler such that update is
// required with a long warning time.
SetPolicyPref(CreateMinimumVersionSingleRequirementPolicyValue(
kNewVersion, kLongWarning, kLongWarning,
false /* unmanaged_user_restricted */));
run_loop.Run();
EXPECT_TRUE(
GetMinimumVersionPolicyHandler()->IsDeadlineTimerRunningForTesting());
EXPECT_FALSE(GetMinimumVersionPolicyHandler()->RequirementsAreSatisfied());
testing::Mock::VerifyAndClearExpectations(this);
// Expire the timer and check that user is logged out of the session.
EXPECT_CALL(*this, IsLoginSessionState()).Times(1);
EXPECT_CALL(*this, RestartToLoginScreen()).Times(1);
const base::TimeDelta warning = base::Days(kLongWarning);
task_environment.FastForwardBy(warning);
EXPECT_FALSE(
GetMinimumVersionPolicyHandler()->IsDeadlineTimerRunningForTesting());
EXPECT_FALSE(GetMinimumVersionPolicyHandler()->RequirementsAreSatisfied());
}
} // namespace policy