setup_util_unittest.cc revision 5821806d5e7f356e8fa4b058a389a808ea183019
1// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include <windows.h>
6
7#include <string>
8
9#include "base/file_util.h"
10#include "base/path_service.h"
11#include "base/scoped_temp_dir.h"
12#include "base/time.h"
13#include "base/memory/scoped_ptr.h"
14#include "base/threading/platform_thread.h"
15#include "base/win/scoped_handle.h"
16#include "chrome/common/chrome_paths.h"
17#include "chrome/installer/setup/setup_util.h"
18#include "testing/gtest/include/gtest/gtest.h"
19
20namespace {
21
22class SetupUtilTestWithDir : public testing::Test {
23 protected:
24  virtual void SetUp() {
25    ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &data_dir_));
26    data_dir_ = data_dir_.AppendASCII("installer");
27    ASSERT_TRUE(file_util::PathExists(data_dir_));
28
29    // Create a temp directory for testing.
30    ASSERT_TRUE(test_dir_.CreateUniqueTempDir());
31  }
32
33  virtual void TearDown() {
34    // Clean up test directory manually so we can fail if it leaks.
35    ASSERT_TRUE(test_dir_.Delete());
36  }
37
38  // The temporary directory used to contain the test operations.
39  ScopedTempDir test_dir_;
40
41  // The path to input data used in tests.
42  FilePath data_dir_;
43};
44
45// The privilege tested in ScopeTokenPrivilege tests below.
46// Use SE_RESTORE_NAME as it is one of the many privileges that is available,
47// but not enabled by default on processes running at high integrity.
48static const wchar_t kTestedPrivilege[] = SE_RESTORE_NAME;
49
50// Returns true if the current process' token has privilege |privilege_name|
51// enabled.
52bool CurrentProcessHasPrivilege(const wchar_t* privilege_name) {
53  base::win::ScopedHandle token;
54  if (!::OpenProcessToken(::GetCurrentProcess(), TOKEN_QUERY,
55                          token.Receive())) {
56    ADD_FAILURE();
57    return false;
58  }
59
60  // First get the size of the buffer needed for |privileges| below.
61  DWORD size;
62  EXPECT_FALSE(::GetTokenInformation(token, TokenPrivileges, NULL, 0, &size));
63
64  scoped_array<BYTE> privileges_bytes(new BYTE[size]);
65  TOKEN_PRIVILEGES* privileges =
66      reinterpret_cast<TOKEN_PRIVILEGES*>(privileges_bytes.get());
67
68  if (!::GetTokenInformation(token, TokenPrivileges, privileges, size, &size)) {
69    ADD_FAILURE();
70    return false;
71  }
72
73  // There is no point getting a buffer to store more than |privilege_name|\0 as
74  // anything longer will obviously not be equal to |privilege_name|.
75  const DWORD desired_size = wcslen(privilege_name);
76  const DWORD buffer_size = desired_size + 1;
77  scoped_array<wchar_t> name_buffer(new wchar_t[buffer_size]);
78  for (int i = privileges->PrivilegeCount - 1; i >= 0 ; --i) {
79    LUID_AND_ATTRIBUTES& luid_and_att = privileges->Privileges[i];
80    DWORD size = buffer_size;
81    ::LookupPrivilegeName(NULL, &luid_and_att.Luid, name_buffer.get(), &size);
82    if (size == desired_size &&
83        wcscmp(name_buffer.get(), privilege_name) == 0) {
84      return luid_and_att.Attributes == SE_PRIVILEGE_ENABLED;
85    }
86  }
87  return false;
88}
89
90}  // namespace
91
92// Test that we are parsing Chrome version correctly.
93TEST_F(SetupUtilTestWithDir, ApplyDiffPatchTest) {
94  FilePath work_dir(test_dir_.path());
95  work_dir = work_dir.AppendASCII("ApplyDiffPatchTest");
96  ASSERT_FALSE(file_util::PathExists(work_dir));
97  EXPECT_TRUE(file_util::CreateDirectory(work_dir));
98  ASSERT_TRUE(file_util::PathExists(work_dir));
99
100  FilePath src = data_dir_.AppendASCII("archive1.7z");
101  FilePath patch = data_dir_.AppendASCII("archive.diff");
102  FilePath dest = work_dir.AppendASCII("archive2.7z");
103  EXPECT_EQ(installer::ApplyDiffPatch(src, patch, dest, NULL), 0);
104  FilePath base = data_dir_.AppendASCII("archive2.7z");
105  EXPECT_TRUE(file_util::ContentsEqual(dest, base));
106
107  EXPECT_EQ(installer::ApplyDiffPatch(FilePath(), FilePath(), FilePath(), NULL),
108            6);
109}
110
111// Test that we are parsing Chrome version correctly.
112TEST_F(SetupUtilTestWithDir, GetMaxVersionFromArchiveDirTest) {
113  // Create a version dir
114  FilePath chrome_dir = test_dir_.path().AppendASCII("1.0.0.0");
115  file_util::CreateDirectory(chrome_dir);
116  ASSERT_TRUE(file_util::PathExists(chrome_dir));
117  scoped_ptr<Version> version(
118      installer::GetMaxVersionFromArchiveDir(test_dir_.path()));
119  ASSERT_EQ(version->GetString(), "1.0.0.0");
120
121  file_util::Delete(chrome_dir, true);
122  ASSERT_FALSE(file_util::PathExists(chrome_dir));
123  ASSERT_TRUE(installer::GetMaxVersionFromArchiveDir(test_dir_.path()) == NULL);
124
125  chrome_dir = test_dir_.path().AppendASCII("ABC");
126  file_util::CreateDirectory(chrome_dir);
127  ASSERT_TRUE(file_util::PathExists(chrome_dir));
128  ASSERT_TRUE(installer::GetMaxVersionFromArchiveDir(test_dir_.path()) == NULL);
129
130  chrome_dir = test_dir_.path().AppendASCII("2.3.4.5");
131  file_util::CreateDirectory(chrome_dir);
132  ASSERT_TRUE(file_util::PathExists(chrome_dir));
133  version.reset(installer::GetMaxVersionFromArchiveDir(test_dir_.path()));
134  ASSERT_EQ(version->GetString(), "2.3.4.5");
135
136  // Create multiple version dirs, ensure that we select the greatest.
137  chrome_dir = test_dir_.path().AppendASCII("9.9.9.9");
138  file_util::CreateDirectory(chrome_dir);
139  ASSERT_TRUE(file_util::PathExists(chrome_dir));
140  chrome_dir = test_dir_.path().AppendASCII("1.1.1.1");
141  file_util::CreateDirectory(chrome_dir);
142  ASSERT_TRUE(file_util::PathExists(chrome_dir));
143
144  version.reset(installer::GetMaxVersionFromArchiveDir(test_dir_.path()));
145  ASSERT_EQ(version->GetString(), "9.9.9.9");
146}
147
148TEST_F(SetupUtilTestWithDir, DeleteFileFromTempProcess) {
149  FilePath test_file;
150  file_util::CreateTemporaryFileInDir(test_dir_.path(), &test_file);
151  ASSERT_TRUE(file_util::PathExists(test_file));
152  file_util::WriteFile(test_file, "foo", 3);
153  EXPECT_TRUE(installer::DeleteFileFromTempProcess(test_file, 0));
154  base::PlatformThread::Sleep(base::TimeDelta::FromMilliseconds(200));
155  EXPECT_FALSE(file_util::PathExists(test_file));
156}
157
158// Note: This test is only valid when run at high integrity (i.e. it will fail
159// at medium integrity).
160TEST(SetupUtilTest, ScopedTokenPrivilegeBasic) {
161  ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege));
162
163  {
164    installer::ScopedTokenPrivilege test_scoped_privilege(kTestedPrivilege);
165    ASSERT_TRUE(test_scoped_privilege.is_enabled());
166    ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege));
167  }
168
169  ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege));
170}
171
172// Note: This test is only valid when run at high integrity (i.e. it will fail
173// at medium integrity).
174TEST(SetupUtilTest, ScopedTokenPrivilegeAlreadyEnabled) {
175  ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege));
176
177  {
178    installer::ScopedTokenPrivilege test_scoped_privilege(kTestedPrivilege);
179    ASSERT_TRUE(test_scoped_privilege.is_enabled());
180    ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege));
181    {
182      installer::ScopedTokenPrivilege dup_scoped_privilege(kTestedPrivilege);
183      ASSERT_TRUE(dup_scoped_privilege.is_enabled());
184      ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege));
185    }
186    ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege));
187  }
188
189  ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege));
190}
191