1 # Copyright 2015 The Chromium OS Authors. All rights reserved. 2 # Use of this source code is governed by a BSD-style license that can be 3 # found in the LICENSE file. 4 5 import logging 6 import time 7 import utils 8 9 from autotest_lib.client.common_lib import error 10 from autotest_lib.client.cros import enterprise_policy_base 11 12 13 class policy_JavaScriptBlockedForUrls( 14 enterprise_policy_base.EnterprisePolicyTest): 15 """Test JavaScriptBlockedForUrls policy effect on CrOS look & feel. 16 17 This test verifies the behavior of Chrome OS with a range of valid values 18 for the JavaScriptBlockedForUrls user policy, covered by four named test 19 cases: NotSet_AllowJS, SingleUrl_BlockJS, MultipleUrls_AllowJS, and 20 MultipleUrls_BlockJS. 21 22 When the policy value is None (as in test case=NotSet_AllowJS), then 23 JavaScript execution be allowed on any page. When the policy value is set 24 to a single URL pattern (as in test case=SingleUrl_BlockJS), then 25 JavaScript execution will be blocked on any page that matches that 26 pattern. When set to multiple URL patterns (as case=MultipleUrls_AllowJS 27 and MultipleUrls_BlockJS) then JavaScript execution will be blocked on any 28 page with an URL that matches any of the listed patterns. 29 30 Two test cases (NotSet_AllowJS, MultipleUrls_AllowJS) are designed to 31 allow JavaScript execution the test page. The other two test cases 32 (NotSet_AllowJS, MultipleUrls_BlockJS) are designed to block JavaScript 33 execution on the test page. 34 35 Note this test has a dependency on the DefaultJavaScriptSetting user 36 policy, which is tested partially herein and in the test 37 policy_JavaScriptAllowedForUrls. For this test, we set 38 DefaultJavaScriptSetting=1. This allows JavaScript execution on all pages 39 except those with a URL matching a pattern in JavaScriptBlockedForUrls. 40 In the test policy_JavaScriptAllowedForUrls, we set 41 DefaultJavaScriptSetting=2. That test blocks JavaScript execution on all 42 pages except those with an URL matching a pattern in 43 JavaScriptAllowedForUrls. 44 45 """ 46 version = 1 47 48 POLICY_NAME = 'JavaScriptBlockedForUrls' 49 URL_HOST = 'http://localhost' 50 URL_PORT = 8080 51 URL_BASE = '%s:%d' % (URL_HOST, URL_PORT) 52 URL_PAGE = '/js_test.html' 53 TEST_URL = URL_BASE + URL_PAGE 54 55 TEST_CASES = { 56 'NotSet_AllowJS': None, 57 'SingleUrl_BlockJS': [URL_BASE], 58 'MultipleUrls_AllowJS': ['http://www.bing.com', 59 'https://www.yahoo.com'], 60 'MultipleUrls_BlockJS': ['http://www.bing.com', 61 TEST_URL, 62 'https://www.yahoo.com'] 63 } 64 65 STARTUP_URLS = ['chrome://policy', 'chrome://settings'] 66 SUPPORTING_POLICIES = { 67 'DefaultJavaScriptSetting': 1, 68 'BookmarkBarEnabled': False, 69 'RestoreOnStartupURLs': STARTUP_URLS, 70 'RestoreOnStartup': 4 71 } 72 73 def initialize(self, args=()): 74 super(policy_JavaScriptBlockedForUrls, self).initialize(args) 75 self.start_webserver(self.URL_PORT) 76 77 def _can_execute_javascript(self, tab): 78 """Determine whether JavaScript is allowed to run on the given page. 79 80 @param tab: browser tab containing JavaScript to run. 81 82 """ 83 try: 84 utils.poll_for_condition( 85 lambda: tab.EvaluateJavaScript('jsAllowed', timeout=2), 86 exception=error.TestError('Test page is not ready.')) 87 return True 88 except: 89 return False 90 91 def _test_javascript_blocked_for_urls(self, policy_value, policies_json): 92 """Verify CrOS enforces the JavaScriptBlockedForUrls policy. 93 94 When JavaScriptBlockedForUrls is undefined, JavaScript execution shall 95 be allowed on all pages. When JavaScriptBlockedForUrls contains one or 96 more URL patterns, JavaScript execution shall be allowed only on the 97 pages whose URL matches any of the listed patterns. 98 99 @param policy_value: policy value expected on chrome://policy page. 100 @param policies_json: policy JSON data to send to the fake DM server. 101 102 """ 103 self.setup_case(self.POLICY_NAME, policy_value, policies_json) 104 logging.info('Running _test_javascript_blocked_for_urls(%s, %s)', 105 policy_value, policies_json) 106 107 tab = self.cr.browser.tabs.New() 108 tab.Activate() 109 tab.Navigate(self.TEST_URL) 110 utils.poll_for_condition( 111 lambda: tab.url == self.TEST_URL, 112 exception=error.TestError('Test page is not ready.')) 113 time.sleep(1) 114 115 javascript_is_allowed = self._can_execute_javascript(tab) 116 if policy_value is not None and self.URL_HOST in policy_value: 117 # If |URL_HOST| is in |policy_value|, then JavaScript execution 118 # should be blocked. If execution is allowed, raise an error. 119 if javascript_is_allowed: 120 raise error.TestFail('JavaScript should be blocked.') 121 else: 122 if not javascript_is_allowed: 123 raise error.TestFail('JavaScript should be allowed.') 124 tab.Close() 125 126 def _run_test_case(self, case): 127 """Setup and run the test configured for the specified test case. 128 129 Set the expected |policy_value| string and |policies_json| data based 130 on the test |case|. If the user specified an expected |value| in the 131 command line args, then use it to set the |policy_value| and blank out 132 the |policies_json|. 133 134 @param case: Name of the test case to run. 135 136 """ 137 if self.is_value_given: 138 # If |value| was given in the command line args, then set expected 139 # |policy_value| to the given value, and |policies_json| to None. 140 policy_value = self.value 141 policies_json = None 142 else: 143 # Otherwise, set expected |policy_value| and setup |policies_json| 144 # data to the values required by the specified test |case|. 145 if not self.TEST_CASES[case]: 146 policy_value = None 147 else: 148 policy_value = ','.join(self.TEST_CASES[case]) 149 policy_json = {'JavaScriptBlockedForUrls': self.TEST_CASES[case]} 150 policies_json = self.SUPPORTING_POLICIES.copy() 151 policies_json.update(policy_json) 152 153 # Run test using the values configured for the test |case|. 154 self._test_javascript_blocked_for_urls(policy_value, policies_json) 155 156 def run_once(self): 157 self.run_once_impl(self._run_test_case) 158