OLD | NEW |
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
| 5 #include "base/at_exit.h" |
5 #include "base/process_util.h" | 6 #include "base/process_util.h" |
6 #include "base/string_util.h" | 7 #include "base/string_util.h" |
7 #include "chrome/common/chrome_version_info.h" | 8 #include "chrome/common/chrome_version_info.h" |
8 #include "chrome/common/service_process_util.h" | 9 #include "chrome/common/service_process_util.h" |
9 #include "testing/gtest/include/gtest/gtest.h" | 10 #include "testing/gtest/include/gtest/gtest.h" |
10 | 11 |
11 | 12 |
12 TEST(ServiceProcessUtilTest, ScopedVersionedName) { | 13 TEST(ServiceProcessUtilTest, ScopedVersionedName) { |
13 std::string test_str = "test"; | 14 std::string test_str = "test"; |
14 std::string scoped_name = GetServiceProcessScopedVersionedName(test_str); | 15 std::string scoped_name = GetServiceProcessScopedVersionedName(test_str); |
15 chrome::VersionInfo version_info; | 16 chrome::VersionInfo version_info; |
16 DCHECK(version_info.is_valid()); | 17 DCHECK(version_info.is_valid()); |
17 EXPECT_TRUE(EndsWith(scoped_name, test_str, true)); | 18 EXPECT_TRUE(EndsWith(scoped_name, test_str, true)); |
18 EXPECT_NE(std::string::npos, scoped_name.find(version_info.Version())); | 19 EXPECT_NE(std::string::npos, scoped_name.find(version_info.Version())); |
19 } | 20 } |
20 | 21 |
| 22 class ServiceProcessStateTest : public testing::Test { |
| 23 private: |
| 24 // This is used to release the ServiceProcessState singleton after each test. |
| 25 base::ShadowingAtExitManager at_exit_manager_; |
| 26 }; |
| 27 |
21 #if defined(OS_WIN) | 28 #if defined(OS_WIN) |
22 // Singleton-ness is only implemented on Windows. | 29 // Singleton-ness is only implemented on Windows. |
23 TEST(ServiceProcessStateTest, Singleton) { | 30 // TODO(sanjeev): Rewrite this test to spawn a new process and test using the |
| 31 // ServiceProcessState singleton across processes. |
| 32 /* |
| 33 TEST_F(ServiceProcessStateTest, Singleton) { |
24 ServiceProcessState state; | 34 ServiceProcessState state; |
25 EXPECT_TRUE(state.Initialize()); | 35 EXPECT_TRUE(state.Initialize()); |
26 // The second instance should fail to Initialize. | 36 // The second instance should fail to Initialize. |
27 ServiceProcessState another_state; | 37 ServiceProcessState another_state; |
28 EXPECT_FALSE(another_state.Initialize()); | 38 EXPECT_FALSE(another_state.Initialize()); |
29 } | 39 } |
| 40 */ |
30 #endif // defined(OS_WIN) | 41 #endif // defined(OS_WIN) |
31 | 42 |
32 TEST(ServiceProcessStateTest, ReadyState) { | 43 TEST_F(ServiceProcessStateTest, ReadyState) { |
33 #if defined(OS_WIN) | 44 #if defined(OS_WIN) |
34 // On Posix, we use a lock file on disk to signal readiness. This lock file | 45 // On Posix, we use a lock file on disk to signal readiness. This lock file |
35 // could be lying around from previous crashes which could cause | 46 // could be lying around from previous crashes which could cause |
36 // CheckServiceProcessReady to lie. On Windows, we use a named event so we | 47 // CheckServiceProcessReady to lie. On Windows, we use a named event so we |
37 // don't have this issue. Until we have a more stable signalling mechanism on | 48 // don't have this issue. Until we have a more stable signalling mechanism on |
38 // Posix, this check will only execute on Windows. | 49 // Posix, this check will only execute on Windows. |
39 EXPECT_FALSE(CheckServiceProcessReady()); | 50 EXPECT_FALSE(CheckServiceProcessReady()); |
40 #endif // defined(OS_WIN) | 51 #endif // defined(OS_WIN) |
41 ServiceProcessState state; | 52 ServiceProcessState* state = ServiceProcessState::GetInstance(); |
42 EXPECT_TRUE(state.Initialize()); | 53 EXPECT_TRUE(state->Initialize()); |
43 state.SignalReady(NULL); | 54 state->SignalReady(NULL); |
44 EXPECT_TRUE(CheckServiceProcessReady()); | 55 EXPECT_TRUE(CheckServiceProcessReady()); |
45 state.SignalStopped(); | 56 state->SignalStopped(); |
46 EXPECT_FALSE(CheckServiceProcessReady()); | 57 EXPECT_FALSE(CheckServiceProcessReady()); |
47 } | 58 } |
48 | 59 |
49 TEST(ServiceProcessStateTest, SharedMem) { | 60 TEST_F(ServiceProcessStateTest, SharedMem) { |
50 #if defined(OS_WIN) | 61 #if defined(OS_WIN) |
51 // On Posix, named shared memory uses a file on disk. This file | 62 // On Posix, named shared memory uses a file on disk. This file |
52 // could be lying around from previous crashes which could cause | 63 // could be lying around from previous crashes which could cause |
53 // GetServiceProcessPid to lie. On Windows, we use a named event so we | 64 // GetServiceProcessPid to lie. On Windows, we use a named event so we |
54 // don't have this issue. Until we have a more stable shared memory | 65 // don't have this issue. Until we have a more stable shared memory |
55 // implementation on Posix, this check will only execute on Windows. | 66 // implementation on Posix, this check will only execute on Windows. |
56 EXPECT_EQ(0, GetServiceProcessPid()); | 67 EXPECT_EQ(0, GetServiceProcessPid()); |
57 #endif // defined(OS_WIN) | 68 #endif // defined(OS_WIN) |
58 ServiceProcessState state; | 69 ServiceProcessState* state = ServiceProcessState::GetInstance(); |
59 EXPECT_TRUE(state.Initialize()); | 70 EXPECT_TRUE(state->Initialize()); |
60 EXPECT_EQ(base::GetCurrentProcId(), GetServiceProcessPid()); | 71 EXPECT_EQ(base::GetCurrentProcId(), GetServiceProcessPid()); |
61 } | 72 } |
62 | 73 |
OLD | NEW |