| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <windows.h> | 5 #include <windows.h> |
| 6 | 6 |
| 7 #include <string> | 7 #include <string> |
| 8 | 8 |
| 9 #include "base/file_util.h" | 9 #include "base/file_util.h" |
| 10 #include "base/files/scoped_temp_dir.h" |
| 11 #include "base/memory/scoped_ptr.h" |
| 10 #include "base/path_service.h" | 12 #include "base/path_service.h" |
| 11 #include "base/scoped_temp_dir.h" | 13 #include "base/threading/platform_thread.h" |
| 12 #include "base/time.h" | 14 #include "base/time.h" |
| 13 #include "base/memory/scoped_ptr.h" | |
| 14 #include "base/threading/platform_thread.h" | |
| 15 #include "base/win/scoped_handle.h" | 15 #include "base/win/scoped_handle.h" |
| 16 #include "chrome/common/chrome_paths.h" | 16 #include "chrome/common/chrome_paths.h" |
| 17 #include "chrome/installer/setup/setup_util.h" | 17 #include "chrome/installer/setup/setup_util.h" |
| 18 #include "testing/gtest/include/gtest/gtest.h" | 18 #include "testing/gtest/include/gtest/gtest.h" |
| 19 | 19 |
| 20 namespace { | 20 namespace { |
| 21 | 21 |
| 22 class SetupUtilTestWithDir : public testing::Test { | 22 class SetupUtilTestWithDir : public testing::Test { |
| 23 protected: | 23 protected: |
| 24 virtual void SetUp() { | 24 virtual void SetUp() { |
| 25 ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &data_dir_)); | 25 ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &data_dir_)); |
| 26 data_dir_ = data_dir_.AppendASCII("installer"); | 26 data_dir_ = data_dir_.AppendASCII("installer"); |
| 27 ASSERT_TRUE(file_util::PathExists(data_dir_)); | 27 ASSERT_TRUE(file_util::PathExists(data_dir_)); |
| 28 | 28 |
| 29 // Create a temp directory for testing. | 29 // Create a temp directory for testing. |
| 30 ASSERT_TRUE(test_dir_.CreateUniqueTempDir()); | 30 ASSERT_TRUE(test_dir_.CreateUniqueTempDir()); |
| 31 } | 31 } |
| 32 | 32 |
| 33 virtual void TearDown() { | 33 virtual void TearDown() { |
| 34 // Clean up test directory manually so we can fail if it leaks. | 34 // Clean up test directory manually so we can fail if it leaks. |
| 35 ASSERT_TRUE(test_dir_.Delete()); | 35 ASSERT_TRUE(test_dir_.Delete()); |
| 36 } | 36 } |
| 37 | 37 |
| 38 // The temporary directory used to contain the test operations. | 38 // The temporary directory used to contain the test operations. |
| 39 ScopedTempDir test_dir_; | 39 base::ScopedTempDir test_dir_; |
| 40 | 40 |
| 41 // The path to input data used in tests. | 41 // The path to input data used in tests. |
| 42 FilePath data_dir_; | 42 FilePath data_dir_; |
| 43 }; | 43 }; |
| 44 | 44 |
| 45 // The privilege tested in ScopeTokenPrivilege tests below. | 45 // The privilege tested in ScopeTokenPrivilege tests below. |
| 46 // Use SE_RESTORE_NAME as it is one of the many privileges that is available, | 46 // Use SE_RESTORE_NAME as it is one of the many privileges that is available, |
| 47 // but not enabled by default on processes running at high integrity. | 47 // but not enabled by default on processes running at high integrity. |
| 48 static const wchar_t kTestedPrivilege[] = SE_RESTORE_NAME; | 48 static const wchar_t kTestedPrivilege[] = SE_RESTORE_NAME; |
| 49 | 49 |
| (...skipping 131 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 181 { | 181 { |
| 182 installer::ScopedTokenPrivilege dup_scoped_privilege(kTestedPrivilege); | 182 installer::ScopedTokenPrivilege dup_scoped_privilege(kTestedPrivilege); |
| 183 ASSERT_TRUE(dup_scoped_privilege.is_enabled()); | 183 ASSERT_TRUE(dup_scoped_privilege.is_enabled()); |
| 184 ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege)); | 184 ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
| 185 } | 185 } |
| 186 ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege)); | 186 ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
| 187 } | 187 } |
| 188 | 188 |
| 189 ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege)); | 189 ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
| 190 } | 190 } |
| OLD | NEW |