Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(701)

Side by Side Diff: chromeos/network/firewall_hole_unittest.cc

Issue 1034333002: Check USB device path access when prompting users to select a device. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Move MockPermissionBrokerClient into its own header. Created 5 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « chromeos/dbus/permission_broker_client.cc ('k') | device/usb/BUILD.gn » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/bind.h" 5 #include "base/bind.h"
6 #include "base/run_loop.h" 6 #include "base/run_loop.h"
7 #include "chromeos/dbus/dbus_thread_manager.h" 7 #include "chromeos/dbus/dbus_thread_manager.h"
8 #include "chromeos/dbus/fake_permission_broker_client.h" 8 #include "chromeos/dbus/mock_permission_broker_client.h"
9 #include "chromeos/network/firewall_hole.h" 9 #include "chromeos/network/firewall_hole.h"
10 #include "dbus/file_descriptor.h" 10 #include "dbus/file_descriptor.h"
11 #include "testing/gmock/include/gmock/gmock.h" 11 #include "testing/gmock/include/gmock/gmock.h"
12 #include "testing/gtest/include/gtest/gtest.h" 12 #include "testing/gtest/include/gtest/gtest.h"
13 13
14 using chromeos::DBusThreadManager; 14 using chromeos::DBusThreadManager;
15 using chromeos::FirewallHole; 15 using chromeos::FirewallHole;
16 using chromeos::MockPermissionBrokerClient;
16 using testing::_; 17 using testing::_;
17 18
18 namespace { 19 namespace {
19 20
20 ACTION_TEMPLATE(InvokeCallback, 21 ACTION_TEMPLATE(InvokeCallback,
21 HAS_1_TEMPLATE_PARAMS(int, k), 22 HAS_1_TEMPLATE_PARAMS(int, k),
22 AND_1_VALUE_PARAMS(p1)) { 23 AND_1_VALUE_PARAMS(p1)) {
23 ::std::tr1::get<k>(args).Run(p1); 24 ::std::tr1::get<k>(args).Run(p1);
24 } 25 }
25 26
26 class MockPermissionsBrokerClient : public chromeos::PermissionBrokerClient {
27 public:
28 MockPermissionsBrokerClient() {}
29 ~MockPermissionsBrokerClient() override {}
30
31 MOCK_METHOD1(Init, void(dbus::Bus* bus));
32 MOCK_METHOD3(RequestPathAccess,
33 void(const std::string& path,
34 int interface_id,
35 const ResultCallback& callback));
36 MOCK_METHOD4(RequestTcpPortAccess,
37 void(uint16 port,
38 const std::string& interface,
39 const dbus::FileDescriptor& lifeline_fd,
40 const ResultCallback& callback));
41 MOCK_METHOD4(RequestUdpPortAccess,
42 void(uint16 port,
43 const std::string& interface,
44 const dbus::FileDescriptor& lifeline_fd,
45 const ResultCallback& callback));
46 MOCK_METHOD3(ReleaseTcpPort,
47 void(uint16 port,
48 const std::string& interface,
49 const ResultCallback& callback));
50 MOCK_METHOD3(ReleaseUdpPort,
51 void(uint16 port,
52 const std::string& interface,
53 const ResultCallback& callback));
54 };
55
56 } // namespace 27 } // namespace
57 28
58 class FirewallHoleTest : public testing::Test { 29 class FirewallHoleTest : public testing::Test {
59 public: 30 public:
60 FirewallHoleTest() {} 31 FirewallHoleTest() {}
61 ~FirewallHoleTest() override {} 32 ~FirewallHoleTest() override {}
62 33
63 void SetUp() override { 34 void SetUp() override {
64 mock_permissions_broker_client_ = new MockPermissionsBrokerClient(); 35 mock_permission_broker_client_ = new MockPermissionBrokerClient();
65 DBusThreadManager::GetSetterForTesting()->SetPermissionBrokerClient( 36 DBusThreadManager::GetSetterForTesting()->SetPermissionBrokerClient(
66 make_scoped_ptr(mock_permissions_broker_client_)); 37 make_scoped_ptr(mock_permission_broker_client_));
67 } 38 }
68 39
69 void TearDown() override { DBusThreadManager::Shutdown(); } 40 void TearDown() override { DBusThreadManager::Shutdown(); }
70 41
71 void AssertOpenSuccess(scoped_ptr<FirewallHole> hole) { 42 void AssertOpenSuccess(scoped_ptr<FirewallHole> hole) {
72 EXPECT_TRUE(hole.get() != nullptr); 43 EXPECT_TRUE(hole.get() != nullptr);
73 run_loop_.Quit(); 44 run_loop_.Quit();
74 } 45 }
75 46
76 void AssertOpenFailure(scoped_ptr<FirewallHole> hole) { 47 void AssertOpenFailure(scoped_ptr<FirewallHole> hole) {
77 EXPECT_TRUE(hole.get() == nullptr); 48 EXPECT_TRUE(hole.get() == nullptr);
78 run_loop_.Quit(); 49 run_loop_.Quit();
79 } 50 }
80 51
81 private: 52 private:
82 base::MessageLoopForUI message_loop_; 53 base::MessageLoopForUI message_loop_;
83 54
84 protected: 55 protected:
85 base::RunLoop run_loop_; 56 base::RunLoop run_loop_;
86 MockPermissionsBrokerClient* mock_permissions_broker_client_ = nullptr; 57 MockPermissionBrokerClient* mock_permission_broker_client_ = nullptr;
87 }; 58 };
88 59
89 TEST_F(FirewallHoleTest, GrantTcpPortAccess) { 60 TEST_F(FirewallHoleTest, GrantTcpPortAccess) {
90 EXPECT_CALL(*mock_permissions_broker_client_, 61 EXPECT_CALL(*mock_permission_broker_client_,
91 RequestTcpPortAccess(1234, "foo0", _, _)) 62 RequestTcpPortAccess(1234, "foo0", _, _))
92 .WillOnce(InvokeCallback<3>(true)); 63 .WillOnce(InvokeCallback<3>(true));
93 EXPECT_CALL(*mock_permissions_broker_client_, ReleaseTcpPort(1234, "foo0", _)) 64 EXPECT_CALL(*mock_permission_broker_client_, ReleaseTcpPort(1234, "foo0", _))
94 .WillOnce(InvokeCallback<2>(true)); 65 .WillOnce(InvokeCallback<2>(true));
95 66
96 FirewallHole::Open( 67 FirewallHole::Open(
97 FirewallHole::PortType::TCP, 1234, "foo0", 68 FirewallHole::PortType::TCP, 1234, "foo0",
98 base::Bind(&FirewallHoleTest::AssertOpenSuccess, base::Unretained(this))); 69 base::Bind(&FirewallHoleTest::AssertOpenSuccess, base::Unretained(this)));
99 run_loop_.Run(); 70 run_loop_.Run();
100 } 71 }
101 72
102 TEST_F(FirewallHoleTest, DenyTcpPortAccess) { 73 TEST_F(FirewallHoleTest, DenyTcpPortAccess) {
103 EXPECT_CALL(*mock_permissions_broker_client_, 74 EXPECT_CALL(*mock_permission_broker_client_,
104 RequestTcpPortAccess(1234, "foo0", _, _)) 75 RequestTcpPortAccess(1234, "foo0", _, _))
105 .WillOnce(InvokeCallback<3>(false)); 76 .WillOnce(InvokeCallback<3>(false));
106 77
107 FirewallHole::Open( 78 FirewallHole::Open(
108 FirewallHole::PortType::TCP, 1234, "foo0", 79 FirewallHole::PortType::TCP, 1234, "foo0",
109 base::Bind(&FirewallHoleTest::AssertOpenFailure, base::Unretained(this))); 80 base::Bind(&FirewallHoleTest::AssertOpenFailure, base::Unretained(this)));
110 run_loop_.Run(); 81 run_loop_.Run();
111 } 82 }
112 83
113 TEST_F(FirewallHoleTest, GrantUdpPortAccess) { 84 TEST_F(FirewallHoleTest, GrantUdpPortAccess) {
114 EXPECT_CALL(*mock_permissions_broker_client_, 85 EXPECT_CALL(*mock_permission_broker_client_,
115 RequestUdpPortAccess(1234, "foo0", _, _)) 86 RequestUdpPortAccess(1234, "foo0", _, _))
116 .WillOnce(InvokeCallback<3>(true)); 87 .WillOnce(InvokeCallback<3>(true));
117 EXPECT_CALL(*mock_permissions_broker_client_, ReleaseUdpPort(1234, "foo0", _)) 88 EXPECT_CALL(*mock_permission_broker_client_, ReleaseUdpPort(1234, "foo0", _))
118 .WillOnce(InvokeCallback<2>(true)); 89 .WillOnce(InvokeCallback<2>(true));
119 90
120 FirewallHole::Open( 91 FirewallHole::Open(
121 FirewallHole::PortType::UDP, 1234, "foo0", 92 FirewallHole::PortType::UDP, 1234, "foo0",
122 base::Bind(&FirewallHoleTest::AssertOpenSuccess, base::Unretained(this))); 93 base::Bind(&FirewallHoleTest::AssertOpenSuccess, base::Unretained(this)));
123 run_loop_.Run(); 94 run_loop_.Run();
124 } 95 }
125 96
126 TEST_F(FirewallHoleTest, DenyUdpPortAccess) { 97 TEST_F(FirewallHoleTest, DenyUdpPortAccess) {
127 EXPECT_CALL(*mock_permissions_broker_client_, 98 EXPECT_CALL(*mock_permission_broker_client_,
128 RequestUdpPortAccess(1234, "foo0", _, _)) 99 RequestUdpPortAccess(1234, "foo0", _, _))
129 .WillOnce(InvokeCallback<3>(false)); 100 .WillOnce(InvokeCallback<3>(false));
130 101
131 FirewallHole::Open( 102 FirewallHole::Open(
132 FirewallHole::PortType::UDP, 1234, "foo0", 103 FirewallHole::PortType::UDP, 1234, "foo0",
133 base::Bind(&FirewallHoleTest::AssertOpenFailure, base::Unretained(this))); 104 base::Bind(&FirewallHoleTest::AssertOpenFailure, base::Unretained(this)));
134 run_loop_.Run(); 105 run_loop_.Run();
135 } 106 }
OLDNEW
« no previous file with comments | « chromeos/dbus/permission_broker_client.cc ('k') | device/usb/BUILD.gn » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698