| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "remoting/host/setup/me2me_native_messaging_host.h" | 5 #include "remoting/host/setup/me2me_native_messaging_host.h" |
| 6 | 6 |
| 7 #include "base/basictypes.h" | 7 #include "base/basictypes.h" |
| 8 #include "base/compiler_specific.h" | 8 #include "base/compiler_specific.h" |
| 9 #include "base/json/json_reader.h" | 9 #include "base/json/json_reader.h" |
| 10 #include "base/json/json_writer.h" | 10 #include "base/json/json_writer.h" |
| 11 #include "base/message_loop/message_loop.h" | 11 #include "base/message_loop/message_loop.h" |
| 12 #include "base/run_loop.h" | 12 #include "base/run_loop.h" |
| 13 #include "base/stl_util.h" | 13 #include "base/stl_util.h" |
| 14 #include "base/strings/stringize_macros.h" | 14 #include "base/strings/stringize_macros.h" |
| 15 #include "base/values.h" | 15 #include "base/values.h" |
| 16 #include "google_apis/gaia/gaia_oauth_client.h" | 16 #include "google_apis/gaia/gaia_oauth_client.h" |
| 17 #include "net/base/file_stream.h" | 17 #include "net/base/file_stream.h" |
| 18 #include "net/base/net_util.h" | 18 #include "net/base/net_util.h" |
| 19 #include "remoting/base/auto_thread_task_runner.h" | 19 #include "remoting/base/auto_thread_task_runner.h" |
| 20 #include "remoting/host/native_messaging/pipe_messaging_channel.h" | 20 #include "remoting/host/native_messaging/pipe_messaging_channel.h" |
| 21 #include "remoting/host/pin_hash.h" | 21 #include "remoting/host/pin_hash.h" |
| 22 #include "remoting/host/setup/mock_oauth_client.h" |
| 22 #include "remoting/host/setup/test_util.h" | 23 #include "remoting/host/setup/test_util.h" |
| 23 #include "remoting/protocol/pairing_registry.h" | 24 #include "remoting/protocol/pairing_registry.h" |
| 24 #include "remoting/protocol/protocol_mock_objects.h" | 25 #include "remoting/protocol/protocol_mock_objects.h" |
| 25 #include "testing/gtest/include/gtest/gtest.h" | 26 #include "testing/gtest/include/gtest/gtest.h" |
| 26 | 27 |
| 27 using remoting::protocol::MockPairingRegistryDelegate; | 28 using remoting::protocol::MockPairingRegistryDelegate; |
| 28 using remoting::protocol::PairingRegistry; | 29 using remoting::protocol::PairingRegistry; |
| 29 using remoting::protocol::SynchronousPairingRegistry; | 30 using remoting::protocol::SynchronousPairingRegistry; |
| 30 | 31 |
| 31 namespace { | 32 namespace { |
| (...skipping 95 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 127 | 128 |
| 128 void VerifyStartDaemonResponse(scoped_ptr<base::DictionaryValue> response) { | 129 void VerifyStartDaemonResponse(scoped_ptr<base::DictionaryValue> response) { |
| 129 ASSERT_TRUE(response); | 130 ASSERT_TRUE(response); |
| 130 std::string value; | 131 std::string value; |
| 131 EXPECT_TRUE(response->GetString("type", &value)); | 132 EXPECT_TRUE(response->GetString("type", &value)); |
| 132 EXPECT_EQ("startDaemonResponse", value); | 133 EXPECT_EQ("startDaemonResponse", value); |
| 133 EXPECT_TRUE(response->GetString("result", &value)); | 134 EXPECT_TRUE(response->GetString("result", &value)); |
| 134 EXPECT_EQ("OK", value); | 135 EXPECT_EQ("OK", value); |
| 135 } | 136 } |
| 136 | 137 |
| 138 void VerifyGetCredentialsFromAuthCodeResponse( |
| 139 scoped_ptr<base::DictionaryValue> response) { |
| 140 ASSERT_TRUE(response); |
| 141 std::string value; |
| 142 EXPECT_TRUE(response->GetString("type", &value)); |
| 143 EXPECT_EQ("getCredentialsFromAuthCodeResponse", value); |
| 144 EXPECT_TRUE(response->GetString("userEmail", &value)); |
| 145 EXPECT_EQ("fake_user_email", value); |
| 146 EXPECT_TRUE(response->GetString("refreshToken", &value)); |
| 147 EXPECT_EQ("fake_refresh_token", value); |
| 148 } |
| 149 |
| 137 } // namespace | 150 } // namespace |
| 138 | 151 |
| 139 namespace remoting { | 152 namespace remoting { |
| 140 | 153 |
| 141 class MockDaemonControllerDelegate : public DaemonController::Delegate { | 154 class MockDaemonControllerDelegate : public DaemonController::Delegate { |
| 142 public: | 155 public: |
| 143 MockDaemonControllerDelegate(); | 156 MockDaemonControllerDelegate(); |
| 144 ~MockDaemonControllerDelegate() override; | 157 ~MockDaemonControllerDelegate() override; |
| 145 | 158 |
| 146 // DaemonController::Delegate interface. | 159 // DaemonController::Delegate interface. |
| (...skipping 159 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 306 new DaemonController(make_scoped_ptr(daemon_controller_delegate_))); | 319 new DaemonController(make_scoped_ptr(daemon_controller_delegate_))); |
| 307 | 320 |
| 308 scoped_refptr<PairingRegistry> pairing_registry = | 321 scoped_refptr<PairingRegistry> pairing_registry = |
| 309 new SynchronousPairingRegistry( | 322 new SynchronousPairingRegistry( |
| 310 make_scoped_ptr(new MockPairingRegistryDelegate())); | 323 make_scoped_ptr(new MockPairingRegistryDelegate())); |
| 311 | 324 |
| 312 scoped_ptr<extensions::NativeMessagingChannel> channel( | 325 scoped_ptr<extensions::NativeMessagingChannel> channel( |
| 313 new PipeMessagingChannel(input_read_file.Pass(), | 326 new PipeMessagingChannel(input_read_file.Pass(), |
| 314 output_write_file.Pass())); | 327 output_write_file.Pass())); |
| 315 | 328 |
| 329 scoped_ptr<OAuthClient> oauth_client(new MockOAuthClient( |
| 330 "fake_user_email", "fake_refresh_token")); |
| 331 |
| 316 host_.reset(new Me2MeNativeMessagingHost( | 332 host_.reset(new Me2MeNativeMessagingHost( |
| 317 false, 0, channel.Pass(), daemon_controller, pairing_registry, nullptr)); | 333 false, 0, channel.Pass(), daemon_controller, pairing_registry, |
| 334 oauth_client.Pass())); |
| 318 host_->Start(base::Bind(&Me2MeNativeMessagingHostTest::StopHost, | 335 host_->Start(base::Bind(&Me2MeNativeMessagingHostTest::StopHost, |
| 319 base::Unretained(this))); | 336 base::Unretained(this))); |
| 320 | 337 |
| 321 // Notify the test that the host has finished starting up. | 338 // Notify the test that the host has finished starting up. |
| 322 test_message_loop_->message_loop_proxy()->PostTask( | 339 test_message_loop_->message_loop_proxy()->PostTask( |
| 323 FROM_HERE, test_run_loop_->QuitClosure()); | 340 FROM_HERE, test_run_loop_->QuitClosure()); |
| 324 } | 341 } |
| 325 | 342 |
| 326 void Me2MeNativeMessagingHostTest::StopHost() { | 343 void Me2MeNativeMessagingHostTest::StopHost() { |
| 327 DCHECK(host_task_runner_->RunsTasksOnCurrentThread()); | 344 DCHECK(host_task_runner_->RunsTasksOnCurrentThread()); |
| (...skipping 139 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 467 WriteMessageToInputPipe(message); | 484 WriteMessageToInputPipe(message); |
| 468 | 485 |
| 469 config.Clear(); | 486 config.Clear(); |
| 470 config.SetBoolean("start", true); | 487 config.SetBoolean("start", true); |
| 471 message.Set("config", config.DeepCopy()); | 488 message.Set("config", config.DeepCopy()); |
| 472 message.SetBoolean("consent", true); | 489 message.SetBoolean("consent", true); |
| 473 message.SetInteger("id", next_id++); | 490 message.SetInteger("id", next_id++); |
| 474 message.SetString("type", "startDaemon"); | 491 message.SetString("type", "startDaemon"); |
| 475 WriteMessageToInputPipe(message); | 492 WriteMessageToInputPipe(message); |
| 476 | 493 |
| 494 message.SetInteger("id", next_id++); |
| 495 message.SetString("type", "getCredentialsFromAuthCode"); |
| 496 message.SetString("authorizationCode", "fake_auth_code"); |
| 497 WriteMessageToInputPipe(message); |
| 498 |
| 477 void (*verify_routines[])(scoped_ptr<base::DictionaryValue>) = { | 499 void (*verify_routines[])(scoped_ptr<base::DictionaryValue>) = { |
| 478 &VerifyHelloResponse, | 500 &VerifyHelloResponse, |
| 479 &VerifyGetHostNameResponse, | 501 &VerifyGetHostNameResponse, |
| 480 &VerifyGetPinHashResponse, | 502 &VerifyGetPinHashResponse, |
| 481 &VerifyGenerateKeyPairResponse, | 503 &VerifyGenerateKeyPairResponse, |
| 482 &VerifyGetDaemonConfigResponse, | 504 &VerifyGetDaemonConfigResponse, |
| 483 &VerifyGetUsageStatsConsentResponse, | 505 &VerifyGetUsageStatsConsentResponse, |
| 484 &VerifyStopDaemonResponse, | 506 &VerifyStopDaemonResponse, |
| 485 &VerifyGetDaemonStateResponse, | 507 &VerifyGetDaemonStateResponse, |
| 486 &VerifyUpdateDaemonConfigResponse, | 508 &VerifyUpdateDaemonConfigResponse, |
| 487 &VerifyStartDaemonResponse, | 509 &VerifyStartDaemonResponse, |
| 510 &VerifyGetCredentialsFromAuthCodeResponse, |
| 488 }; | 511 }; |
| 489 ASSERT_EQ(arraysize(verify_routines), static_cast<size_t>(next_id)); | 512 ASSERT_EQ(arraysize(verify_routines), static_cast<size_t>(next_id)); |
| 490 | 513 |
| 491 // Read all responses from output pipe, and verify them. | 514 // Read all responses from output pipe, and verify them. |
| 492 for (int i = 0; i < next_id; ++i) { | 515 for (int i = 0; i < next_id; ++i) { |
| 493 scoped_ptr<base::DictionaryValue> response = ReadMessageFromOutputPipe(); | 516 scoped_ptr<base::DictionaryValue> response = ReadMessageFromOutputPipe(); |
| 494 | 517 |
| 495 // Make sure that id is available and is in the range. | 518 // Make sure that id is available and is in the range. |
| 496 int id; | 519 int id; |
| 497 ASSERT_TRUE(response->GetInteger("id", &id)); | 520 ASSERT_TRUE(response->GetInteger("id", &id)); |
| (...skipping 80 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 578 } | 601 } |
| 579 | 602 |
| 580 // Verify rejection if startDaemon request has no "consent" parameter. | 603 // Verify rejection if startDaemon request has no "consent" parameter. |
| 581 TEST_F(Me2MeNativeMessagingHostTest, StartDaemonNoConsent) { | 604 TEST_F(Me2MeNativeMessagingHostTest, StartDaemonNoConsent) { |
| 582 base::DictionaryValue message; | 605 base::DictionaryValue message; |
| 583 message.SetString("type", "startDaemon"); | 606 message.SetString("type", "startDaemon"); |
| 584 message.Set("config", base::DictionaryValue().DeepCopy()); | 607 message.Set("config", base::DictionaryValue().DeepCopy()); |
| 585 TestBadRequest(message); | 608 TestBadRequest(message); |
| 586 } | 609 } |
| 587 | 610 |
| 611 // Verify rejection if getCredentialsFromAuthCode has no auth code. |
| 612 TEST_F(Me2MeNativeMessagingHostTest, GetCredentialsFromAuthCodeNoAuthCode) { |
| 613 base::DictionaryValue message; |
| 614 message.SetString("type", "getCredentialsFromAuthCode"); |
| 615 TestBadRequest(message); |
| 616 } |
| 617 |
| 588 } // namespace remoting | 618 } // namespace remoting |
| OLD | NEW |