diff options
Diffstat (limited to '')
-rw-r--r-- | toolkit/modules/tests/xpcshell/test_GMPInstallManager.js | 1672 |
1 files changed, 1672 insertions, 0 deletions
diff --git a/toolkit/modules/tests/xpcshell/test_GMPInstallManager.js b/toolkit/modules/tests/xpcshell/test_GMPInstallManager.js new file mode 100644 index 0000000000..87de57efaf --- /dev/null +++ b/toolkit/modules/tests/xpcshell/test_GMPInstallManager.js @@ -0,0 +1,1672 @@ +/* Any copyright is dedicated to the Public Domain. + * http://creativecommons.org/publicdomain/zero/1.0/ */ +/* eslint-disable mozilla/no-arbitrary-setTimeout */ + +const URL_HOST = "http://localhost"; +const PR_USEC_PER_MSEC = 1000; + +const { GMPExtractor, GMPInstallManager } = ChromeUtils.importESModule( + "resource://gre/modules/GMPInstallManager.sys.mjs" +); +const { setTimeout } = ChromeUtils.importESModule( + "resource://gre/modules/Timer.sys.mjs" +); +const { FileUtils } = ChromeUtils.importESModule( + "resource://gre/modules/FileUtils.sys.mjs" +); +const { HttpServer } = ChromeUtils.import("resource://testing-common/httpd.js"); +const { Preferences } = ChromeUtils.importESModule( + "resource://gre/modules/Preferences.sys.mjs" +); +const { TelemetryTestUtils } = ChromeUtils.importESModule( + "resource://testing-common/TelemetryTestUtils.sys.mjs" +); +const { UpdateUtils } = ChromeUtils.importESModule( + "resource://gre/modules/UpdateUtils.sys.mjs" +); +const { GMPPrefs, OPEN_H264_ID } = ChromeUtils.importESModule( + "resource://gre/modules/GMPUtils.sys.mjs" +); +const { ProductAddonCheckerTestUtils } = ChromeUtils.importESModule( + "resource://gre/modules/addons/ProductAddonChecker.sys.mjs" +); +const { AppConstants } = ChromeUtils.importESModule( + "resource://gre/modules/AppConstants.sys.mjs" +); + +Services.prefs.setBoolPref("security.allow_eval_with_system_principal", true); +Services.prefs.setBoolPref("media.gmp-manager.updateEnabled", true); +// Gather the telemetry even where the probes don't exist (i.e. Thunderbird). +Services.prefs.setBoolPref( + "toolkit.telemetry.testing.overrideProductsCheck", + true +); +registerCleanupFunction(() => { + Services.prefs.clearUserPref("security.allow_eval_with_system_principal"); + Services.prefs.clearUserPref("media.gmp-manager.updateEnabled"); + Services.prefs.clearUserPref( + "toolkit.telemetry.testing.overrideProductsCheck" + ); +}); +// Most tests do no handle the machinery for content signatures, so let +// specific tests that need it turn it on as needed. +Preferences.set("media.gmp-manager.checkContentSignature", false); + +do_get_profile(); + +add_task(function test_setup() { + // We should already have a profile from `do_get_profile`, but also need + // FOG to be setup for tests that touch it/Glean. + Services.fog.initializeFOG(); +}); + +function run_test() { + Preferences.set("media.gmp.log.dump", true); + Preferences.set("media.gmp.log.level", 0); + run_next_test(); +} + +/** + * Tests that the helper used for preferences works correctly + */ +add_task(async function test_prefs() { + let addon1 = "addon1", + addon2 = "addon2"; + + GMPPrefs.setString(GMPPrefs.KEY_URL, "http://not-really-used"); + GMPPrefs.setString(GMPPrefs.KEY_URL_OVERRIDE, "http://not-really-used-2"); + GMPPrefs.setInt(GMPPrefs.KEY_PLUGIN_LAST_UPDATE, 1, addon1); + GMPPrefs.setString(GMPPrefs.KEY_PLUGIN_VERSION, "2", addon1); + GMPPrefs.setInt(GMPPrefs.KEY_PLUGIN_LAST_UPDATE, 3, addon2); + GMPPrefs.setInt(GMPPrefs.KEY_PLUGIN_VERSION, 4, addon2); + GMPPrefs.setBool(GMPPrefs.KEY_PLUGIN_AUTOUPDATE, false, addon2); + GMPPrefs.setBool(GMPPrefs.KEY_CERT_CHECKATTRS, true); + GMPPrefs.setString(GMPPrefs.KEY_PLUGIN_HASHVALUE, "5", addon1); + + Assert.equal(GMPPrefs.getString(GMPPrefs.KEY_URL), "http://not-really-used"); + Assert.equal( + GMPPrefs.getString(GMPPrefs.KEY_URL_OVERRIDE), + "http://not-really-used-2" + ); + Assert.equal(GMPPrefs.getInt(GMPPrefs.KEY_PLUGIN_LAST_UPDATE, "", addon1), 1); + Assert.equal( + GMPPrefs.getString(GMPPrefs.KEY_PLUGIN_VERSION, "", addon1), + "2" + ); + Assert.equal(GMPPrefs.getInt(GMPPrefs.KEY_PLUGIN_LAST_UPDATE, "", addon2), 3); + Assert.equal(GMPPrefs.getInt(GMPPrefs.KEY_PLUGIN_VERSION, "", addon2), 4); + Assert.equal( + GMPPrefs.getBool(GMPPrefs.KEY_PLUGIN_AUTOUPDATE, undefined, addon2), + false + ); + Assert.ok(GMPPrefs.getBool(GMPPrefs.KEY_CERT_CHECKATTRS)); + GMPPrefs.setBool(GMPPrefs.KEY_PLUGIN_AUTOUPDATE, true, addon2); + Assert.equal( + GMPPrefs.getString(GMPPrefs.KEY_PLUGIN_HASHVALUE, "", addon1), + "5" + ); +}); + +/** + * Tests that an uninit without a check works fine + */ +add_task(async function test_checkForAddons_uninitWithoutCheck() { + let installManager = new GMPInstallManager(); + installManager.uninit(); +}); + +/** + * Tests that an uninit without an install works fine + */ +add_test(function test_checkForAddons_uninitWithoutInstall() { + let myRequest = new mockRequest(200, ""); + let installManager = new GMPInstallManager(); + let promise = ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + promise.then(res => { + Assert.ok(res.usedFallback); + installManager.uninit(); + run_next_test(); + }); +}); + +/** + * Tests that no response returned rejects + */ +add_test(function test_checkForAddons_noResponse() { + let myRequest = new mockRequest(200, ""); + let installManager = new GMPInstallManager(); + let promise = ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + promise.then(res => { + Assert.ok(res.usedFallback); + installManager.uninit(); + run_next_test(); + }); +}); + +/** + * Tests that no addons element returned resolves with no addons + */ +add_task(async function test_checkForAddons_noAddonsElement() { + let myRequest = new mockRequest(200, "<updates></updates>"); + let installManager = new GMPInstallManager(); + let res = await ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + Assert.equal(res.addons.length, 0); + installManager.uninit(); +}); + +/** + * Tests that empty addons element returned resolves with no addons + */ +add_task(async function test_checkForAddons_emptyAddonsElement() { + let myRequest = new mockRequest(200, "<updates><addons/></updates>"); + let installManager = new GMPInstallManager(); + let res = await ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + Assert.equal(res.addons.length, 0); + installManager.uninit(); +}); + +/** + * Tests that a response with the wrong root element rejects + */ +add_test(function test_checkForAddons_wrongResponseXML() { + let myRequest = new mockRequest( + 200, + "<digits_of_pi>3.141592653589793....</digits_of_pi>" + ); + let installManager = new GMPInstallManager(); + let promise = ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + promise.then(res => { + Assert.ok(res.usedFallback); + installManager.uninit(); + run_next_test(); + }); +}); + +/** + * Tests that a 404 error works as expected + */ +add_test(function test_checkForAddons_404Error() { + let myRequest = new mockRequest(404, ""); + let installManager = new GMPInstallManager(); + let promise = ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + promise.then(res => { + Assert.ok(res.usedFallback); + installManager.uninit(); + run_next_test(); + }); +}); + +/** + * Tests that a xhr/ServiceRequest abort() works as expected + */ +add_test(function test_checkForAddons_abort() { + let overriddenServiceRequest = new mockRequest(200, "", { + dropRequest: true, + }); + let installManager = new GMPInstallManager(); + let promise = ProductAddonCheckerTestUtils.overrideServiceRequest( + overriddenServiceRequest, + () => installManager.checkForAddons() + ); + + // Since the ServiceRequest is created in checkForAddons asynchronously, + // we need to delay aborting till the request is running. + // Since checkForAddons returns a Promise already only after + // the abort is triggered, we can't use that, and instead + // we'll use a fake timer. + setTimeout(() => { + overriddenServiceRequest.abort(); + }, 100); + + promise.then(res => { + Assert.ok(res.usedFallback); + installManager.uninit(); + run_next_test(); + }); +}); + +/** + * Tests that a defensive timeout works as expected + */ +add_test(function test_checkForAddons_timeout() { + let myRequest = new mockRequest(200, "", { + dropRequest: true, + timeout: true, + }); + let installManager = new GMPInstallManager(); + let promise = ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + promise.then(res => { + Assert.ok(res.usedFallback); + installManager.uninit(); + run_next_test(); + }); +}); + +/** + * Tests that we throw correctly in case of ssl certification error. + */ +add_test(function test_checkForAddons_bad_ssl() { + // + // Add random stuff that cause CertUtil to require https. + // + let PREF_KEY_URL_OVERRIDE_BACKUP = Preferences.get( + GMPPrefs.KEY_URL_OVERRIDE, + "" + ); + Preferences.reset(GMPPrefs.KEY_URL_OVERRIDE); + + let CERTS_BRANCH_DOT_ONE = GMPPrefs.KEY_CERTS_BRANCH + ".1"; + let PREF_CERTS_BRANCH_DOT_ONE_BACKUP = Preferences.get( + CERTS_BRANCH_DOT_ONE, + "" + ); + Services.prefs.setCharPref(CERTS_BRANCH_DOT_ONE, "funky value"); + + let myRequest = new mockRequest(200, ""); + let installManager = new GMPInstallManager(); + let promise = ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + promise.then(res => { + Assert.ok(res.usedFallback); + installManager.uninit(); + if (PREF_KEY_URL_OVERRIDE_BACKUP) { + Preferences.set(GMPPrefs.KEY_URL_OVERRIDE, PREF_KEY_URL_OVERRIDE_BACKUP); + } + if (PREF_CERTS_BRANCH_DOT_ONE_BACKUP) { + Preferences.set(CERTS_BRANCH_DOT_ONE, PREF_CERTS_BRANCH_DOT_ONE_BACKUP); + } + run_next_test(); + }); +}); + +/** + * Tests that gettinga a funky non XML response works as expected + */ +add_test(function test_checkForAddons_notXML() { + let myRequest = new mockRequest(200, "3.141592653589793...."); + let installManager = new GMPInstallManager(); + let promise = ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + + promise.then(res => { + Assert.ok(res.usedFallback); + installManager.uninit(); + run_next_test(); + }); +}); + +/** + * Tests that getting a response with a single addon works as expected + */ +add_task(async function test_checkForAddons_singleAddon() { + let responseXML = + '<?xml version="1.0"?>' + + "<updates>" + + " <addons>" + + ' <addon id="gmp-gmpopenh264"' + + ' URL="http://127.0.0.1:8011/gmp-gmpopenh264-1.1.zip"' + + ' hashFunction="sha256"' + + ' hashValue="1118b90d6f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee"' + + ' version="1.1"/>' + + " </addons>" + + "</updates>"; + let myRequest = new mockRequest(200, responseXML); + let installManager = new GMPInstallManager(); + let res = await ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + Assert.equal(res.addons.length, 1); + let gmpAddon = res.addons[0]; + Assert.equal(gmpAddon.id, "gmp-gmpopenh264"); + Assert.equal(gmpAddon.URL, "http://127.0.0.1:8011/gmp-gmpopenh264-1.1.zip"); + Assert.equal(gmpAddon.hashFunction, "sha256"); + Assert.equal( + gmpAddon.hashValue, + "1118b90d6f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee" + ); + Assert.equal(gmpAddon.version, "1.1"); + Assert.ok(gmpAddon.isValid); + Assert.ok(!gmpAddon.isInstalled); + installManager.uninit(); +}); + +/** + * Tests that getting a response with a single addon with the optional size + * attribute parses as expected. + */ +add_task(async function test_checkForAddons_singleAddonWithSize() { + let responseXML = + '<?xml version="1.0"?>' + + "<updates>" + + " <addons>" + + ' <addon id="openh264-plugin-no-at-symbol"' + + ' URL="http://127.0.0.1:8011/gmp-gmpopenh264-1.1.zip"' + + ' hashFunction="sha256"' + + ' size="42"' + + ' hashValue="1118b90d6f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee"' + + ' version="1.1"/>' + + " </addons>" + + "</updates>"; + let myRequest = new mockRequest(200, responseXML); + let installManager = new GMPInstallManager(); + let res = await ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + Assert.equal(res.addons.length, 1); + let gmpAddon = res.addons[0]; + Assert.equal(gmpAddon.id, "openh264-plugin-no-at-symbol"); + Assert.equal(gmpAddon.URL, "http://127.0.0.1:8011/gmp-gmpopenh264-1.1.zip"); + Assert.equal(gmpAddon.hashFunction, "sha256"); + Assert.equal( + gmpAddon.hashValue, + "1118b90d6f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee" + ); + Assert.equal(gmpAddon.size, 42); + Assert.equal(gmpAddon.version, "1.1"); + Assert.ok(gmpAddon.isValid); + Assert.ok(!gmpAddon.isInstalled); + installManager.uninit(); +}); + +/** + * Tests that checking for multiple addons work correctly. + * Also tests that invalid addons work correctly. + */ +add_task( + async function test_checkForAddons_multipleAddonNoUpdatesSomeInvalid() { + let responseXML = + '<?xml version="1.0"?>' + + "<updates>" + + " <addons>" + + // valid openh264 + ' <addon id="gmp-gmpopenh264"' + + ' URL="http://127.0.0.1:8011/gmp-gmpopenh264-1.1.zip"' + + ' hashFunction="sha256"' + + ' hashValue="1118b90d6f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee"' + + ' version="1.1"/>' + + // valid not openh264 + ' <addon id="NOT-gmp-gmpopenh264"' + + ' URL="http://127.0.0.1:8011/NOT-gmp-gmpopenh264-1.1.zip"' + + ' hashFunction="sha512"' + + ' hashValue="141592656f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee"' + + ' version="9.1"/>' + + // noid + ' <addon notid="NOT-gmp-gmpopenh264"' + + ' URL="http://127.0.0.1:8011/NOT-gmp-gmpopenh264-1.1.zip"' + + ' hashFunction="sha512"' + + ' hashValue="141592656f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee"' + + ' version="9.1"/>' + + // no URL + ' <addon id="NOT-gmp-gmpopenh264"' + + ' notURL="http://127.0.0.1:8011/NOT-gmp-gmpopenh264-1.1.zip"' + + ' hashFunction="sha512"' + + ' hashValue="141592656f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee"' + + ' version="9.1"/>' + + // no hash function + ' <addon id="NOT-gmp-gmpopenh264"' + + ' URL="http://127.0.0.1:8011/NOT-gmp-gmpopenh264-1.1.zip"' + + ' nothashFunction="sha512"' + + ' hashValue="141592656f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee"' + + ' version="9.1"/>' + + // no hash function + ' <addon id="NOT-gmp-gmpopenh264"' + + ' URL="http://127.0.0.1:8011/NOT-gmp-gmpopenh264-1.1.zip"' + + ' hashFunction="sha512"' + + ' nothashValue="141592656f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee"' + + ' version="9.1"/>' + + // not version + ' <addon id="NOT-gmp-gmpopenh264"' + + ' URL="http://127.0.0.1:8011/NOT-gmp-gmpopenh264-1.1.zip"' + + ' hashFunction="sha512"' + + ' hashValue="141592656f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee"' + + ' notversion="9.1"/>' + + " </addons>" + + "</updates>"; + let myRequest = new mockRequest(200, responseXML); + let installManager = new GMPInstallManager(); + let res = await ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + Assert.equal(res.addons.length, 7); + let gmpAddon = res.addons[0]; + Assert.equal(gmpAddon.id, "gmp-gmpopenh264"); + Assert.equal(gmpAddon.URL, "http://127.0.0.1:8011/gmp-gmpopenh264-1.1.zip"); + Assert.equal(gmpAddon.hashFunction, "sha256"); + Assert.equal( + gmpAddon.hashValue, + "1118b90d6f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee" + ); + Assert.equal(gmpAddon.version, "1.1"); + Assert.ok(gmpAddon.isValid); + Assert.ok(!gmpAddon.isInstalled); + + gmpAddon = res.addons[1]; + Assert.equal(gmpAddon.id, "NOT-gmp-gmpopenh264"); + Assert.equal( + gmpAddon.URL, + "http://127.0.0.1:8011/NOT-gmp-gmpopenh264-1.1.zip" + ); + Assert.equal(gmpAddon.hashFunction, "sha512"); + Assert.equal( + gmpAddon.hashValue, + "141592656f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee" + ); + Assert.equal(gmpAddon.version, "9.1"); + Assert.ok(gmpAddon.isValid); + Assert.ok(!gmpAddon.isInstalled); + + for (let i = 2; i < res.addons.length; i++) { + Assert.ok(!res.addons[i].isValid); + Assert.ok(!res.addons[i].isInstalled); + } + installManager.uninit(); + } +); + +/** + * Tests that checking for addons when there are also updates available + * works as expected. + */ +add_task(async function test_checkForAddons_updatesWithAddons() { + let responseXML = + '<?xml version="1.0"?>' + + " <updates>" + + ' <update type="minor" displayVersion="33.0a1" appVersion="33.0a1" platformVersion="33.0a1" buildID="20140628030201">' + + ' <patch type="complete" URL="http://ftp.mozilla.org/pub/mozilla.org/firefox/nightly/2014/06/2014-06-28-03-02-01-mozilla-central/firefox-33.0a1.en-US.mac.complete.mar" hashFunction="sha512" hashValue="f3f90d71dff03ae81def80e64bba3e4569da99c9e15269f731c2b167c4fc30b3aed9f5fee81c19614120230ca333e73a5e7def1b8e45d03135b2069c26736219" size="85249896"/>' + + " </update>" + + " <addons>" + + ' <addon id="gmp-gmpopenh264"' + + ' URL="http://127.0.0.1:8011/gmp-gmpopenh264-1.1.zip"' + + ' hashFunction="sha256"' + + ' hashValue="1118b90d6f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee"' + + ' version="1.1"/>' + + " </addons>" + + "</updates>"; + let myRequest = new mockRequest(200, responseXML); + let installManager = new GMPInstallManager(); + let res = await ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + Assert.equal(res.addons.length, 1); + let gmpAddon = res.addons[0]; + Assert.equal(gmpAddon.id, "gmp-gmpopenh264"); + Assert.equal(gmpAddon.URL, "http://127.0.0.1:8011/gmp-gmpopenh264-1.1.zip"); + Assert.equal(gmpAddon.hashFunction, "sha256"); + Assert.equal( + gmpAddon.hashValue, + "1118b90d6f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee" + ); + Assert.equal(gmpAddon.version, "1.1"); + Assert.ok(gmpAddon.isValid); + Assert.ok(!gmpAddon.isInstalled); + installManager.uninit(); +}); + +/** + * Tests that checkForAddons() works as expected when content signature + * checking is enabled and the signature check passes. + */ +add_task(async function test_checkForAddons_contentSignatureSuccess() { + const previousUrlOverride = setupContentSigTestPrefs(); + + const xmlFetchResultHistogram = resetGmpTelemetryAndGetHistogram(); + + const testServerInfo = getTestServerForContentSignatureTests(); + Preferences.set(GMPPrefs.KEY_URL_OVERRIDE, testServerInfo.validUpdateUri); + + let installManager = new GMPInstallManager(); + try { + let res = await installManager.checkForAddons(); + Assert.ok(true, "checkForAddons should succeed"); + + // Smoke test the results are as expected. + // If the checkForAddons fails we'll get a fallback config, + // so we'll get incorrect addons and these asserts will fail. + Assert.equal(res.usedFallback, false); + Assert.equal(res.addons.length, 5); + Assert.equal(res.addons[0].id, "test1"); + Assert.equal(res.addons[1].id, "test2"); + Assert.equal(res.addons[2].id, "test3"); + Assert.equal(res.addons[3].id, "test4"); + Assert.equal(res.addons[4].id, undefined); + } catch (e) { + Assert.ok(false, "checkForAddons should succeed"); + } + + // # Ok content sig fetches should be 1, all others should be 0. + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 2, 1); + // Test that glean has 1 success for content sig and no other metrics. + const expectedGleanValues = { + cert_pin_success: 0, + cert_pin_net_request_error: 0, + cert_pin_net_timeout: 0, + cert_pin_abort: 0, + cert_pin_missing_data: 0, + cert_pin_failed: 0, + cert_pin_invalid: 0, + cert_pin_unknown_error: 0, + content_sig_success: 1, + content_sig_net_request_error: 0, + content_sig_net_timeout: 0, + content_sig_abort: 0, + content_sig_missing_data: 0, + content_sig_failed: 0, + content_sig_invalid: 0, + content_sig_unknown_error: 0, + }; + checkGleanMetricCounts(expectedGleanValues); + + revertContentSigTestPrefs(previousUrlOverride); +}); + +/** + * Tests that checkForAddons() works as expected when content signature + * checking is enabled and the check fails. + */ +add_task(async function test_checkForAddons_contentSignatureFailure() { + const previousUrlOverride = setupContentSigTestPrefs(); + + const xmlFetchResultHistogram = resetGmpTelemetryAndGetHistogram(); + + const testServerInfo = getTestServerForContentSignatureTests(); + Preferences.set( + GMPPrefs.KEY_URL_OVERRIDE, + testServerInfo.missingContentSigUri + ); + + let installManager = new GMPInstallManager(); + try { + let res = await installManager.checkForAddons(); + Assert.ok(true, "checkForAddons should succeed"); + + // Smoke test the results are as expected. + // Check addons will succeed above, but it will have fallen back to local + // config. So the results will not be those from the HTTP server. + Assert.equal(res.usedFallback, true); + // Some platforms don't have fallback config for all GMPs, but we should + // always get at least 1. + Assert.greaterOrEqual(res.addons.length, 1); + if (res.addons.length == 1) { + Assert.equal(res.addons[0].id, "gmp-widevinecdm"); + } else { + Assert.equal(res.addons[0].id, "gmp-gmpopenh264"); + Assert.equal(res.addons[1].id, "gmp-widevinecdm"); + } + } catch (e) { + Assert.ok(false, "checkForAddons should succeed"); + } + + // # Failed content sig fetches should be 1, all others should be 0. + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 3, 1); + // Glean values should reflect the content sig algo failed. + Assert.equal( + Glean.gmp.updateXmlFetchResult.content_sig_missing_data.testGetValue(), + 1 + ); + + // Check further failure cases. We've already smoke tested the results above, + // don't bother doing so again. + + // Fail due to bad content signature. + Preferences.set(GMPPrefs.KEY_URL_OVERRIDE, testServerInfo.badContentSigUri); + await installManager.checkForAddons(); + // Should have another failure... + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 3, 2); + // ... and it should be due to the signature being bad, which causes + // verification to fail. + Assert.equal( + Glean.gmp.updateXmlFetchResult.content_sig_failed.testGetValue(), + 1 + ); + + // Fail due to bad invalid content signature. + Preferences.set( + GMPPrefs.KEY_URL_OVERRIDE, + testServerInfo.invalidContentSigUri + ); + await installManager.checkForAddons(); + // Should have another failure... + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 3, 3); + // ... and it should be due to the signature being invalid. + Assert.equal( + Glean.gmp.updateXmlFetchResult.content_sig_invalid.testGetValue(), + 1 + ); + + // Fail by pointing to a bad URL. + Preferences.set( + GMPPrefs.KEY_URL_OVERRIDE, + "https://this.url.doesnt/go/anywhere" + ); + await installManager.checkForAddons(); + // Should have another failure... + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 3, 4); + // ... and it should be due to a bad request. + Assert.equal( + Glean.gmp.updateXmlFetchResult.content_sig_net_request_error.testGetValue(), + 1 + ); + + // Fail via timeout. This case uses our mock machinery in order to abort the + // request, as I (:bryce) couldn't figure out a nice way to do it with the + // HttpServer. + let overriddenServiceRequest = new mockRequest(200, "", { + dropRequest: true, + timeout: true, + }); + await ProductAddonCheckerTestUtils.overrideServiceRequest( + overriddenServiceRequest, + () => installManager.checkForAddons() + ); + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 3, 5); + // ... and it should be due to a timeout. + Assert.equal( + Glean.gmp.updateXmlFetchResult.content_sig_net_timeout.testGetValue(), + 1 + ); + + // Fail via abort. This case uses our mock machinery in order to abort the + // request, as I (:bryce) couldn't figure out a nice way to do it with the + // HttpServer. + overriddenServiceRequest = new mockRequest(200, "", { + dropRequest: true, + }); + let promise = ProductAddonCheckerTestUtils.overrideServiceRequest( + overriddenServiceRequest, + () => installManager.checkForAddons() + ); + setTimeout(() => { + overriddenServiceRequest.abort(); + }, 100); + await promise; + // Should have another failure... + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 3, 6); + // ... and it should be due to an abort. + Assert.equal( + Glean.gmp.updateXmlFetchResult.content_sig_abort.testGetValue(), + 1 + ); + + Preferences.set(GMPPrefs.KEY_URL_OVERRIDE, testServerInfo.badXmlUri); + await installManager.checkForAddons(); + // Should have another failure... + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 3, 7); + // ... and it should be due to the xml response being unrecognized. + Assert.equal( + Glean.gmp.updateXmlFetchResult.content_sig_xml_parse_error.testGetValue(), + 1 + ); + + // Fail via bad request during the x5u look up. + Preferences.set(GMPPrefs.KEY_URL_OVERRIDE, testServerInfo.badX5uRequestUri); + await installManager.checkForAddons(); + // Should have another failure... + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 3, 8); + // ... and it should be due to a bad request. + Assert.equal( + Glean.gmp.updateXmlFetchResult.content_sig_net_request_error.testGetValue(), + 2 + ); + + // Fail by timing out during the x5u look up. + Preferences.set(GMPPrefs.KEY_URL_OVERRIDE, testServerInfo.x5uTimeoutUri); + // We need to expose this promise back to the server so it can handle + // setting up a mock request in the middle of checking for addons. + testServerInfo.promiseHolder.installPromise = installManager.checkForAddons(); + await testServerInfo.promiseHolder.installPromise; + // We wait sequentially because serverPromise won't be set until the server + // receives our request. + await testServerInfo.promiseHolder.serverPromise; + delete testServerInfo.promiseHolder.installPromise; + delete testServerInfo.promiseHolder.serverPromise; + // Should have another failure... + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 3, 9); + // ... and it should be due to a timeout. + Assert.equal( + Glean.gmp.updateXmlFetchResult.content_sig_net_timeout.testGetValue(), + 2 + ); + + // Fail by aborting during the x5u look up. + Preferences.set(GMPPrefs.KEY_URL_OVERRIDE, testServerInfo.x5uAbortUri); + // We need to expose this promise back to the server so it can handle + // setting up a mock request in the middle of checking for addons. + testServerInfo.promiseHolder.installPromise = installManager.checkForAddons(); + await testServerInfo.promiseHolder.installPromise; + // We wait sequentially because serverPromise won't be set until the server + // receives our request. + await testServerInfo.promiseHolder.serverPromise; + delete testServerInfo.promiseHolder.installPromise; + delete testServerInfo.promiseHolder.serverPromise; + // Should have another failure... + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 3, 10); + // ... and it should be due to an abort. + Assert.equal( + Glean.gmp.updateXmlFetchResult.content_sig_abort.testGetValue(), + 2 + ); + + // Check all glean metrics have expected values at test end. + const expectedGleanValues = { + cert_pin_success: 0, + cert_pin_net_request_error: 0, + cert_pin_net_timeout: 0, + cert_pin_abort: 0, + cert_pin_missing_data: 0, + cert_pin_failed: 0, + cert_pin_invalid: 0, + cert_pin_xml_parse_error: 0, + cert_pin_unknown_error: 0, + content_sig_success: 0, + content_sig_net_request_error: 2, + content_sig_net_timeout: 2, + content_sig_abort: 2, + content_sig_missing_data: 1, + content_sig_failed: 1, + content_sig_invalid: 1, + content_sig_xml_parse_error: 1, + content_sig_unknown_error: 0, + }; + checkGleanMetricCounts(expectedGleanValues); + + revertContentSigTestPrefs(previousUrlOverride); +}); + +/** + * Tests that checkForAddons() works as expected when certificate pinning + * checking is enabled. We plan to move away from cert pinning in favor of + * content signature checks, but part of doing this is comparing the telemetry + * from both methods. We want test coverage to ensure the telemetry is being + * gathered for cert pinning failures correctly before we remove the code. + */ +add_task(async function test_checkForAddons_telemetry_certPinning() { + // Grab state so we can restore it at the end of the test. + const previousUrlOverride = Preferences.get(GMPPrefs.KEY_URL_OVERRIDE, ""); + + let xmlFetchResultHistogram = resetGmpTelemetryAndGetHistogram(); + + // Re-use the content-sig test server config. We're not going to need any of + // the content signature specific config but this gives us a server to get + // update.xml files from, and also tests that cert pinning doesn't break even + // if we're getting content sig headers sent. + const testServerInfo = getTestServerForContentSignatureTests(); + + Preferences.set(GMPPrefs.KEY_URL_OVERRIDE, testServerInfo.validUpdateUri); + + let installManager = new GMPInstallManager(); + try { + // This should work because once we override the GMP URL, no cert pin + // checks are actually done. I.e. we don't need to do any pinning in + // the test, just use a valid URL. + await installManager.checkForAddons(); + Assert.ok(true, "checkForAddons should succeed"); + } catch (e) { + Assert.ok(false, "checkForAddons should succeed"); + } + + // # Ok cert pin fetches should be 1, all others should be 0. + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 0, 1); + // Glean values should reflect the same. + Assert.equal( + Glean.gmp.updateXmlFetchResult.cert_pin_success.testGetValue(), + 1 + ); + + // Reset the histogram because we want to check a different index. + xmlFetchResultHistogram = TelemetryTestUtils.getAndClearHistogram( + "MEDIA_GMP_UPDATE_XML_FETCH_RESULT" + ); + // Fail by pointing to a bad URL. + Preferences.set( + GMPPrefs.KEY_URL_OVERRIDE, + "https://this.url.doesnt/go/anywhere" + ); + await installManager.checkForAddons(); + // Should have another failure... + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 1, 1); + // ... and it should be due to a bad request. + Assert.equal( + Glean.gmp.updateXmlFetchResult.cert_pin_net_request_error.testGetValue(), + 1 + ); + + // Fail via timeout. This case uses our mock machinery in order to abort the + // request, as I (:bryce) couldn't figure out a nice way to do it with the + // HttpServer. + let overriddenServiceRequest = new mockRequest(200, "", { + dropRequest: true, + timeout: true, + }); + await ProductAddonCheckerTestUtils.overrideServiceRequest( + overriddenServiceRequest, + () => installManager.checkForAddons() + ); + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 1, 2); + // ... and it should be due to a timeout. + Assert.equal( + Glean.gmp.updateXmlFetchResult.cert_pin_net_timeout.testGetValue(), + 1 + ); + + // Fail via abort. This case uses our mock machinery in order to abort the + // request, as I (:bryce) couldn't figure out a nice way to do it with the + // HttpServer. + overriddenServiceRequest = new mockRequest(200, "", { + dropRequest: true, + }); + let promise = ProductAddonCheckerTestUtils.overrideServiceRequest( + overriddenServiceRequest, + () => installManager.checkForAddons() + ); + setTimeout(() => { + overriddenServiceRequest.abort(); + }, 100); + await promise; + // Should have another failure... + TelemetryTestUtils.assertHistogram(xmlFetchResultHistogram, 1, 3); + // ... and it should be due to an abort. + Assert.equal(Glean.gmp.updateXmlFetchResult.cert_pin_abort.testGetValue(), 1); + + // Check all glean metrics have expected values at test end. + const expectedGleanValues = { + cert_pin_success: 1, + cert_pin_net_request_error: 1, + cert_pin_net_timeout: 1, + cert_pin_abort: 1, + cert_pin_missing_data: 0, + cert_pin_failed: 0, + cert_pin_invalid: 0, + cert_pin_unknown_error: 0, + content_sig_success: 0, + content_sig_net_request_error: 0, + content_sig_net_timeout: 0, + content_sig_abort: 0, + content_sig_missing_data: 0, + content_sig_failed: 0, + content_sig_invalid: 0, + content_sig_unknown_error: 0, + }; + checkGleanMetricCounts(expectedGleanValues); + + // Restore the URL override now that we're done. + if (previousUrlOverride) { + Preferences.set(GMPPrefs.KEY_URL_OVERRIDE, previousUrlOverride); + } else { + Preferences.reset(GMPPrefs.KEY_URL_OVERRIDE); + } +}); + +/** + * Tests that installing found addons works as expected + */ +async function test_checkForAddons_installAddon( + id, + includeSize, + wantInstallReject +) { + info( + "Running installAddon for id: " + + id + + ", includeSize: " + + includeSize + + " and wantInstallReject: " + + wantInstallReject + ); + let httpServer = new HttpServer(); + let dir = FileUtils.getDir("TmpD", [], true); + httpServer.registerDirectory("/", dir); + httpServer.start(-1); + let testserverPort = httpServer.identity.primaryPort; + let zipFileName = "test_" + id + "_GMP.zip"; + + let zipURL = URL_HOST + ":" + testserverPort + "/" + zipFileName; + info("zipURL: " + zipURL); + + let data = "e~=0.5772156649"; + let zipFile = createNewZipFile(zipFileName, data); + let hashFunc = "sha256"; + let expectedDigest = await IOUtils.computeHexDigest(zipFile.path, hashFunc); + let fileSize = zipFile.fileSize; + if (wantInstallReject) { + fileSize = 1; + } + + let responseXML = + '<?xml version="1.0"?>' + + "<updates>" + + " <addons>" + + ' <addon id="' + + id + + '-gmp-gmpopenh264"' + + ' URL="' + + zipURL + + '"' + + ' hashFunction="' + + hashFunc + + '"' + + ' hashValue="' + + expectedDigest + + '"' + + (includeSize ? ' size="' + fileSize + '"' : "") + + ' version="1.1"/>' + + " </addons>" + + "</updates>"; + + let myRequest = new mockRequest(200, responseXML); + let installManager = new GMPInstallManager(); + let res = await ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + Assert.equal(res.addons.length, 1); + let gmpAddon = res.addons[0]; + Assert.ok(!gmpAddon.isInstalled); + + try { + let extractedPaths = await installManager.installAddon(gmpAddon); + if (wantInstallReject) { + Assert.ok(false); // installAddon() should have thrown. + } + Assert.equal(extractedPaths.length, 1); + let extractedPath = extractedPaths[0]; + + info("Extracted path: " + extractedPath); + + let extractedFile = Cc["@mozilla.org/file/local;1"].createInstance( + Ci.nsIFile + ); + + extractedFile.initWithPath(extractedPath); + Assert.ok(extractedFile.exists()); + let readData = readStringFromFile(extractedFile); + Assert.equal(readData, data); + + // Make sure the prefs are set correctly + Assert.ok( + !!GMPPrefs.getInt(GMPPrefs.KEY_PLUGIN_LAST_UPDATE, "", gmpAddon.id) + ); + Assert.equal( + GMPPrefs.getString(GMPPrefs.KEY_PLUGIN_HASHVALUE, "", gmpAddon.id), + expectedDigest + ); + Assert.equal( + GMPPrefs.getString(GMPPrefs.KEY_PLUGIN_VERSION, "", gmpAddon.id), + "1.1" + ); + Assert.equal( + GMPPrefs.getString(GMPPrefs.KEY_PLUGIN_ABI, "", gmpAddon.id), + UpdateUtils.ABI + ); + // Make sure it reports as being installed + Assert.ok(gmpAddon.isInstalled); + + // Cleanup + extractedFile.parent.remove(true); + zipFile.remove(false); + httpServer.stop(function () {}); + installManager.uninit(); + } catch (ex) { + zipFile.remove(false); + if (!wantInstallReject) { + do_throw("install update should not reject " + ex.message); + } + } +} + +add_task(test_checkForAddons_installAddon.bind(null, "1", true, false)); +add_task(test_checkForAddons_installAddon.bind(null, "2", false, false)); +add_task(test_checkForAddons_installAddon.bind(null, "3", true, true)); + +/** + * Tests simpleCheckAndInstall when autoupdate is disabled for a GMP + */ +add_task(async function test_simpleCheckAndInstall_autoUpdateDisabled() { + GMPPrefs.setBool(GMPPrefs.KEY_PLUGIN_AUTOUPDATE, false, OPEN_H264_ID); + let responseXML = + '<?xml version="1.0"?>' + + "<updates>" + + " <addons>" + + // valid openh264 + ' <addon id="gmp-gmpopenh264"' + + ' URL="http://127.0.0.1:8011/gmp-gmpopenh264-1.1.zip"' + + ' hashFunction="sha256"' + + ' hashValue="1118b90d6f645eefc2b99af17bae396636ace1e33d079c88de715177584e2aee"' + + ' version="1.1"/>' + + " </addons>" + + "</updates>"; + + let myRequest = new mockRequest(200, responseXML); + let installManager = new GMPInstallManager(); + let result = await ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.simpleCheckAndInstall() + ); + Assert.equal(result.status, "nothing-new-to-install"); + Preferences.reset(GMPPrefs.KEY_UPDATE_LAST_CHECK); + GMPPrefs.setBool(GMPPrefs.KEY_PLUGIN_AUTOUPDATE, true, OPEN_H264_ID); +}); + +/** + * Tests simpleCheckAndInstall nothing to install + */ +add_task(async function test_simpleCheckAndInstall_nothingToInstall() { + let responseXML = '<?xml version="1.0"?><updates></updates>'; + + let myRequest = new mockRequest(200, responseXML); + let installManager = new GMPInstallManager(); + let result = await ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.simpleCheckAndInstall() + ); + Assert.equal(result.status, "nothing-new-to-install"); +}); + +/** + * Tests simpleCheckAndInstall too frequent + */ +add_task(async function test_simpleCheckAndInstall_tooFrequent() { + let responseXML = '<?xml version="1.0"?><updates></updates>'; + + let myRequest = new mockRequest(200, responseXML); + let installManager = new GMPInstallManager(); + let result = await ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.simpleCheckAndInstall() + ); + Assert.equal(result.status, "too-frequent-no-check"); +}); + +/** + * Tests that installing addons when there is no server works as expected + */ +add_test(function test_installAddon_noServer() { + let zipFileName = "test_GMP.zip"; + let zipURL = URL_HOST + ":0/" + zipFileName; + + let responseXML = + '<?xml version="1.0"?>' + + "<updates>" + + " <addons>" + + ' <addon id="gmp-gmpopenh264"' + + ' URL="' + + zipURL + + '"' + + ' hashFunction="sha256"' + + ' hashValue="11221cbda000347b054028b527a60e578f919cb10f322ef8077d3491c6fcb474"' + + ' version="1.1"/>' + + " </addons>" + + "</updates>"; + + let myRequest = new mockRequest(200, responseXML); + let installManager = new GMPInstallManager(); + let checkPromise = ProductAddonCheckerTestUtils.overrideServiceRequest( + myRequest, + () => installManager.checkForAddons() + ); + checkPromise.then( + res => { + Assert.equal(res.addons.length, 1); + let gmpAddon = res.addons[0]; + + GMPInstallManager.overrideLeaveDownloadedZip = true; + let installPromise = installManager.installAddon(gmpAddon); + installPromise.then( + extractedPaths => { + do_throw("No server for install should reject"); + }, + err => { + Assert.ok(!!err); + installManager.uninit(); + run_next_test(); + } + ); + }, + () => { + do_throw("check should not reject for install no server"); + } + ); +}); + +/*** + * Tests GMPExtractor (an internal component of GMPInstallManager) to ensure + * it handles paths with certain characters. + * + * On Mac, test that the com.apple.quarantine extended attribute is removed + * from installed plugin files. + */ + +add_task(async function test_GMPExtractor_paths() { + registerCleanupFunction(async function () { + // Must stop holding on to the zip file using the JAR cache: + let zipFile = new FileUtils.File( + PathUtils.join(tempDir.path, "dummy_gmp.zip") + ); + Services.obs.notifyObservers(zipFile, "flush-cache-entry"); + await IOUtils.remove(extractedDir, { recursive: true }); + await IOUtils.remove(tempDir.path, { recursive: true }); + }); + // Create a dir with the following in the name + // - # -- this is used to delimit URI fragments and tests that + // we escape any internal URIs appropriately. + // - 猫 -- ensure we handle non-ascii characters appropriately. + const srcPath = PathUtils.join( + Services.dirsvc.get("CurWorkD", Ci.nsIFile).path, + "zips", + "dummy_gmp.zip" + ); + let tempDirName = "TmpDir#猫"; + let tempDir = FileUtils.getDir("TmpD", [tempDirName], true); + let zipPath = PathUtils.join(tempDir.path, "dummy_gmp.zip"); + await IOUtils.copy(srcPath, zipPath); + // The path inside the profile dir we'll extract to. Make sure we handle + // the characters there too. + let relativeExtractPath = "extracted#猫"; + let extractor = new GMPExtractor(zipPath, [relativeExtractPath]); + let extractedPaths = await extractor.install(); + // extractedPaths should contain the files extracted. In this case we + // should have a single file extracted to our profile dir -- the zip + // contains two files, but one should be skipped by the extraction logic. + Assert.equal(extractedPaths.length, 1, "One file should be extracted"); + Assert.ok( + extractedPaths[0].includes("dummy_file.txt"), + "dummy_file.txt should be on extracted path" + ); + Assert.ok( + !extractedPaths[0].includes("verified_contents.json"), + "verified_contents.json should not be on extracted path" + ); + let extractedDir = PathUtils.join(PathUtils.profileDir, relativeExtractPath); + Assert.ok( + await IOUtils.exists(extractedDir), + "Extraction should have created a directory" + ); + let extractedFile = PathUtils.join( + PathUtils.profileDir, + relativeExtractPath, + "dummy_file.txt" + ); + Assert.ok( + await IOUtils.exists(extractedFile), + "Extraction should have created dummy_file.txt" + ); + if (AppConstants.platform == "macosx") { + await Assert.rejects( + IOUtils.getMacXAttr(extractedFile, "com.apple.quarantine"), + /NotFoundError: The file `.+' does not have an extended attribute `com.apple.quarantine'/, + "The 'com.apple.quarantine' attribute should not be present" + ); + } + let unextractedFile = PathUtils.join( + PathUtils.profileDir, + relativeExtractPath, + "verified_contents.json" + ); + Assert.ok( + !(await IOUtils.exists(unextractedFile)), + "Extraction should not have created verified_contents.json" + ); +}); + +/** + * Returns the read stream into a string + */ +function readStringFromInputStream(inputStream) { + let sis = Cc["@mozilla.org/scriptableinputstream;1"].createInstance( + Ci.nsIScriptableInputStream + ); + sis.init(inputStream); + let text = sis.read(sis.available()); + sis.close(); + return text; +} + +/** + * Reads a string of text from a file. + * This function only works with ASCII text. + */ +function readStringFromFile(file) { + if (!file.exists()) { + info("readStringFromFile - file doesn't exist: " + file.path); + return null; + } + let fis = Cc["@mozilla.org/network/file-input-stream;1"].createInstance( + Ci.nsIFileInputStream + ); + fis.init(file, FileUtils.MODE_RDONLY, FileUtils.PERMS_FILE, 0); + return readStringFromInputStream(fis); +} + +/** + * Constructs a mock xhr/ServiceRequest which is used for testing different + * aspects of responses. + */ +function mockRequest(inputStatus, inputResponse, options) { + this.inputStatus = inputStatus; + this.inputResponse = inputResponse; + this.status = 0; + this.responseXML = null; + this._aborted = false; + this._onabort = null; + this._onprogress = null; + this._onerror = null; + this._onload = null; + this._onloadend = null; + this._ontimeout = null; + this._url = null; + this._method = null; + this._timeout = 0; + this._notified = false; + this._options = options || {}; +} +mockRequest.prototype = { + overrideMimeType(aMimetype) {}, + setRequestHeader(aHeader, aValue) {}, + status: null, + channel: { set notificationCallbacks(aVal) {} }, + open(aMethod, aUrl) { + this.channel.originalURI = Services.io.newURI(aUrl); + this._method = aMethod; + this._url = aUrl; + }, + abort() { + this._dropRequest = true; + this._notify(["abort", "loadend"]); + }, + responseXML: null, + responseText: null, + send(aBody) { + executeSoon(() => { + try { + if (this._options.dropRequest) { + if (this._timeout > 0 && this._options.timeout) { + this._notify(["timeout", "loadend"]); + } + return; + } + this.status = this.inputStatus; + this.responseText = this.inputResponse; + try { + let parser = new DOMParser(); + this.responseXML = parser.parseFromString( + this.inputResponse, + "application/xml" + ); + } catch (e) { + this.responseXML = null; + } + if (this.inputStatus === 200) { + this._notify(["load", "loadend"]); + } else { + this._notify(["error", "loadend"]); + } + } catch (ex) { + do_throw(ex); + } + }); + }, + set onabort(aValue) { + this._onabort = aValue; + }, + get onabort() { + return this._onabort; + }, + set onprogress(aValue) { + this._onprogress = aValue; + }, + get onprogress() { + return this._onprogress; + }, + set onerror(aValue) { + this._onerror = aValue; + }, + get onerror() { + return this._onerror; + }, + set onload(aValue) { + this._onload = aValue; + }, + get onload() { + return this._onload; + }, + set onloadend(aValue) { + this._onloadend = aValue; + }, + get onloadend() { + return this._onloadend; + }, + set ontimeout(aValue) { + this._ontimeout = aValue; + }, + get ontimeout() { + return this._ontimeout; + }, + set timeout(aValue) { + this._timeout = aValue; + }, + _notify(events) { + if (this._notified) { + return; + } + this._notified = true; + for (let item of events) { + let k = "on" + item; + if (this[k]) { + info("Notifying " + item); + let e = { + target: this, + type: item, + }; + this[k](e); + } else { + info("Notifying " + item + ", but there are no listeners"); + } + } + }, + addEventListener(aEvent, aValue, aCapturing) { + // eslint-disable-next-line no-eval + eval("this._on" + aEvent + " = aValue"); + }, + get wrappedJSObject() { + return this; + }, +}; + +/** + * Creates a new zip file containing a file with the specified data + * @param zipName The name of the zip file + * @param data The data to go inside the zip for the filename entry1.info + */ +function createNewZipFile(zipName, data) { + // Create a zip file which will be used for extracting + let stream = Cc["@mozilla.org/io/string-input-stream;1"].createInstance( + Ci.nsIStringInputStream + ); + stream.setData(data, data.length); + let zipWriter = Cc["@mozilla.org/zipwriter;1"].createInstance( + Ci.nsIZipWriter + ); + let zipFile = FileUtils.getFile("TmpD", [zipName]); + if (zipFile.exists()) { + zipFile.remove(false); + } + // From prio.h + const PR_RDWR = 0x04; + const PR_CREATE_FILE = 0x08; + const PR_TRUNCATE = 0x20; + zipWriter.open(zipFile, PR_RDWR | PR_CREATE_FILE | PR_TRUNCATE); + zipWriter.addEntryStream( + "entry1.info", + Date.now() * PR_USEC_PER_MSEC, + Ci.nsIZipWriter.COMPRESSION_BEST, + stream, + false + ); + zipWriter.close(); + stream.close(); + info("zip file created on disk at: " + zipFile.path); + return zipFile; +} + +/*** + * Set up pref(s) as appropriate for content sig tests. Return the value of our + * current GMP url override so it can be restored at test teardown. + */ + +function setupContentSigTestPrefs() { + Preferences.set("media.gmp-manager.checkContentSignature", true); + + // Return the URL override so tests can restore it to its previous value + // once they're done. + return Preferences.get(GMPPrefs.KEY_URL_OVERRIDE, ""); +} + +/*** + * Revert prefs used for content signature tests. + * + * @param previousUrlOverride - The GMP URL override value prior to test being + * run. The function will revert the URL back to this, or reset the URL if no + * value is passed. + */ +function revertContentSigTestPrefs(previousUrlOverride) { + if (previousUrlOverride) { + Preferences.set(GMPPrefs.KEY_URL_OVERRIDE, previousUrlOverride); + } else { + Preferences.reset(GMPPrefs.KEY_URL_OVERRIDE); + } + Preferences.set("media.gmp-manager.checkContentSignature", false); +} + +/*** + * Reset telemetry data related to gmp updates, and get the histogram + * associated with MEDIA_GMP_UPDATE_XML_FETCH_RESULT. + * + * @returns The freshly cleared MEDIA_GMP_UPDATE_XML_FETCH_RESULT histogram. + */ +function resetGmpTelemetryAndGetHistogram() { + Services.fog.testResetFOG(); + return TelemetryTestUtils.getAndClearHistogram( + "MEDIA_GMP_UPDATE_XML_FETCH_RESULT" + ); +} + +/*** + * A helper to check that glean metrics have expected counts. + * @param expectedGleanValues a object that has properties with names set to glean metrics to be checked + * and the values are the expected count. Eg { cert_pin_success: 1 }. + */ +function checkGleanMetricCounts(expectedGleanValues) { + for (const property in expectedGleanValues) { + if (Glean.gmp.updateXmlFetchResult[property].testGetValue()) { + Assert.equal( + Glean.gmp.updateXmlFetchResult[property].testGetValue(), + expectedGleanValues[property], + `${property} should have been recorded ${expectedGleanValues[property]} times` + ); + } else { + Assert.equal( + expectedGleanValues[property], + 0, + "testGetValue() being undefined should mean we expect a metric to not have been gathered" + ); + } + } +} + +/*** + * Sets up a `HttpServer` for use in content singature checking tests. This + * server will expose different endpoints that can be used to simulate different + * pass and failure scenarios when fetching an update.xml file. + * + * @returns An object that has the following properties + * - testServer - the HttpServer itself. + * - promiseHolder - an object used to hold promises as properties. More complex test cases need this to sync different steps. + * - validUpdateUri - a URI that should return a valid update xml + content sig. + * - missingContentSigUri - a URI that returns a valid update xml, but misses the content sig header. + * - badContentSigUri - a URI that returns a valid update xml, but provides data that is not a content sig in the header. + * - invalidContentSigUri - a URI that returns a valid update xml, but provides an incorrect content sig. + * - badXmlUri - a URI that returns an invalid update xml, but provides a correct content sig. + * - x5uAbortUri - a URI that returns a valid update xml, but timesout the x5u request. Requires the caller to set + * `promiseHolder.installPromise` to the `checkForAddons()` promise` before hitting the endpoint. The server will set + * `promiseHolder.serverPromise` once it has started servicing the initial update request, and the caller should + * await that promise to ensure the server has restored state. + * - x5uAbortUri - a URI that returns a valid update xml, but aborts the x5u request. Requires the caller to set + * `promiseHolder.installPromise` to the `checkForAddons()` promise` before hitting the endpoint. The server will set + * `promiseHolder.serverPromise` once it has started servicing the initial update request, and the caller should + * await that promise to ensure the server has restored state. + */ +function getTestServerForContentSignatureTests() { + const testServer = new HttpServer(); + // Start the server so we can grab the identity. We need to know this so the + // server can reference itself in the handlers that will be set up. + testServer.start(); + const baseUri = + testServer.identity.primaryScheme + + "://" + + testServer.identity.primaryHost + + ":" + + testServer.identity.primaryPort; + + // The promise holder has no properties by default. Different endpoints and + // tests will set its properties as needed. + let promiseHolder = {}; + + const goodXml = readStringFromFile(do_get_file("good.xml")); + // This sig is generated using the following command at mozilla-central root + // `cat toolkit/mozapps/extensions/test/xpcshell/data/productaddons/good.xml | ./mach python security/manager/ssl/tests/unit/test_content_signing/pysign.py` + // If test certificates are regenerated, this signature must also be. + const goodXmlContentSignature = + "7QYnPqFoOlS02BpDdIRIljzmPr6BFwPs1z1y8KJUBlnU7EVG6FbnXmVVt5Op9wDzgvhXX7th8qFJvpPOZs_B_tHRDNJ8SK0HN95BAN15z3ZW2r95SSHmU-fP2JgoNOR3"; + + // Setup endpoint to handle x5u lookups correctly. + const validX5uPath = "/valid_x5u"; + const validCertChain = [ + readStringFromFile(do_get_file("content_signing_aus_ee.pem")), + readStringFromFile(do_get_file("content_signing_int.pem")), + ]; + testServer.registerPathHandler(validX5uPath, (req, res) => { + res.write(validCertChain.join("\n")); + }); + const validX5uUrl = baseUri + validX5uPath; + + // Handler for path that serves valid xml with valid signature. + const validUpdatePath = "/valid_update.xml"; + testServer.registerPathHandler(validUpdatePath, (req, res) => { + const validContentSignatureHeader = `x5u=${validX5uUrl}; p384ecdsa=${goodXmlContentSignature}`; + res.setHeader("content-signature", validContentSignatureHeader); + res.write(goodXml); + }); + + const missingContentSigPath = "/update_missing_content_sig.xml"; + testServer.registerPathHandler(missingContentSigPath, (req, res) => { + // Content signature header omitted. + res.write(goodXml); + }); + + const badContentSigPath = "/update_bad_content_sig.xml"; + testServer.registerPathHandler(badContentSigPath, (req, res) => { + res.setHeader( + "content-signature", + `x5u=${validX5uUrl}; p384ecdsa=I'm a bad content signature` + ); + res.write(goodXml); + }); + + // Make an invalid signature by change first char. + const invalidXmlContentSignature = "Z" + goodXmlContentSignature.slice(1); + const invalidContentSigPath = "/update_invalid_content_sig.xml"; + testServer.registerPathHandler(invalidContentSigPath, (req, res) => { + res.setHeader( + "content-signature", + `x5u=${validX5uUrl}; p384ecdsa=${invalidXmlContentSignature}` + ); + res.write(goodXml); + }); + + const badXml = readStringFromFile(do_get_file("bad.xml")); + // This sig is generated using the following command at mozilla-central root + // `cat toolkit/mozapps/extensions/test/xpcshell/data/productaddons/bad.xml | ./mach python security/manager/ssl/tests/unit/test_content_signing/pysign.py` + // If test certificates are regenerated, this signature must also be. + const badXmlContentSignature = + "7QYnPqFoOlS02BpDdIRIljzmPr6BFwPs1z1y8KJUBlnU7EVG6FbnXmVVt5Op9wDz8YoQ_b-3i9rWpj40s8QZsMgo2eImx83LW9JE0d0z6sSAnwRb4lHFPpJXC_hv7wi7"; + const badXmlPath = "/bad.xml"; + testServer.registerPathHandler(badXmlPath, (req, res) => { + const validContentSignatureHeader = `x5u=${validX5uUrl}; p384ecdsa=${badXmlContentSignature}`; + res.setHeader("content-signature", validContentSignatureHeader); + res.write(badXml); + }); + + const badX5uRequestPath = "/bad_x5u_request.xml"; + testServer.registerPathHandler(badX5uRequestPath, (req, res) => { + const badX5uUrlHeader = `x5u=https://this.is.a/bad/url; p384ecdsa=${goodXmlContentSignature}`; + res.setHeader("content-signature", badX5uUrlHeader); + res.write(badXml); + }); + + const x5uTimeoutPath = "/x5u_timeout.xml"; + testServer.registerPathHandler(x5uTimeoutPath, (req, res) => { + const validContentSignatureHeader = `x5u=${validX5uUrl}; p384ecdsa=${goodXmlContentSignature}`; + // Write the correct header and xml, but setup the next request to timeout. + // This should cause the request for the x5u URL to fail via timeout. + let overriddenServiceRequest = new mockRequest(200, "", { + dropRequest: true, + timeout: true, + }); + // We expose this promise so that tests can wait until the server has + // reverted the overridden request (to avoid double overrides). + promiseHolder.serverPromise = + ProductAddonCheckerTestUtils.overrideServiceRequest( + overriddenServiceRequest, + () => { + res.setHeader("content-signature", validContentSignatureHeader); + res.write(goodXml); + return promiseHolder.installPromise; + } + ); + }); + + const x5uAbortPath = "/x5u_abort.xml"; + testServer.registerPathHandler(x5uAbortPath, (req, res) => { + const validContentSignatureHeader = `x5u=${validX5uUrl}; p384ecdsa=${goodXmlContentSignature}`; + // Write the correct header and xml, but setup the next request to fail. + // This should cause the request for the x5u URL to fail via abort. + let overriddenServiceRequest = new mockRequest(200, "", { + dropRequest: true, + }); + // We expose this promise so that tests can wait until the server has + // reverted the overridden request (to avoid double overrides). + promiseHolder.serverPromise = + ProductAddonCheckerTestUtils.overrideServiceRequest( + overriddenServiceRequest, + () => { + res.setHeader("content-signature", validContentSignatureHeader); + res.write(goodXml); + return promiseHolder.installPromise; + } + ); + setTimeout(() => { + overriddenServiceRequest.abort(); + }, 100); + }); + + return { + testServer, + promiseHolder, + validUpdateUri: baseUri + validUpdatePath, + missingContentSigUri: baseUri + missingContentSigPath, + badContentSigUri: baseUri + badContentSigPath, + invalidContentSigUri: baseUri + invalidContentSigPath, + badXmlUri: baseUri + badXmlPath, + badX5uRequestUri: baseUri + badX5uRequestPath, + x5uTimeoutUri: baseUri + x5uTimeoutPath, + x5uAbortUri: baseUri + x5uAbortPath, + }; +} |