OLD | NEW |
| (Empty) |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "base/win/registry.h" | |
6 | |
7 #include <cstring> | |
8 #include <vector> | |
9 | |
10 #include "base/bind.h" | |
11 #include "base/compiler_specific.h" | |
12 #include "base/message_loop/message_loop.h" | |
13 #include "base/run_loop.h" | |
14 #include "base/stl_util.h" | |
15 #include "base/win/windows_version.h" | |
16 #include "testing/gtest/include/gtest/gtest.h" | |
17 | |
18 namespace base { | |
19 namespace win { | |
20 | |
21 namespace { | |
22 | |
23 class RegistryTest : public testing::Test { | |
24 protected: | |
25 #if defined(_WIN64) | |
26 static const REGSAM kNativeViewMask = KEY_WOW64_64KEY; | |
27 static const REGSAM kRedirectedViewMask = KEY_WOW64_32KEY; | |
28 #else | |
29 static const REGSAM kNativeViewMask = KEY_WOW64_32KEY; | |
30 static const REGSAM kRedirectedViewMask = KEY_WOW64_64KEY; | |
31 #endif // _WIN64 | |
32 | |
33 RegistryTest() {} | |
34 void SetUp() override { | |
35 // Create a temporary key. | |
36 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); | |
37 key.DeleteKey(kRootKey); | |
38 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | |
39 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | |
40 foo_software_key_ = L"Software\\"; | |
41 foo_software_key_ += kRootKey; | |
42 foo_software_key_ += L"\\Foo"; | |
43 } | |
44 | |
45 void TearDown() override { | |
46 // Clean up the temporary key. | |
47 RegKey key(HKEY_CURRENT_USER, L"", KEY_SET_VALUE); | |
48 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
49 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | |
50 } | |
51 | |
52 static bool IsRedirectorPresent() { | |
53 #if defined(_WIN64) | |
54 return true; | |
55 #else | |
56 return OSInfo::GetInstance()->wow64_status() == OSInfo::WOW64_ENABLED; | |
57 #endif | |
58 } | |
59 | |
60 const wchar_t* const kRootKey = L"Base_Registry_Unittest"; | |
61 std::wstring foo_software_key_; | |
62 | |
63 private: | |
64 DISALLOW_COPY_AND_ASSIGN(RegistryTest); | |
65 }; | |
66 | |
67 // static | |
68 const REGSAM RegistryTest::kNativeViewMask; | |
69 const REGSAM RegistryTest::kRedirectedViewMask; | |
70 | |
71 TEST_F(RegistryTest, ValueTest) { | |
72 RegKey key; | |
73 | |
74 std::wstring foo_key(kRootKey); | |
75 foo_key += L"\\Foo"; | |
76 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, foo_key.c_str(), | |
77 KEY_READ)); | |
78 | |
79 { | |
80 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, foo_key.c_str(), | |
81 KEY_READ | KEY_SET_VALUE)); | |
82 ASSERT_TRUE(key.Valid()); | |
83 | |
84 const wchar_t kStringValueName[] = L"StringValue"; | |
85 const wchar_t kDWORDValueName[] = L"DWORDValue"; | |
86 const wchar_t kInt64ValueName[] = L"Int64Value"; | |
87 const wchar_t kStringData[] = L"string data"; | |
88 const DWORD kDWORDData = 0xdeadbabe; | |
89 const int64 kInt64Data = 0xdeadbabedeadbabeLL; | |
90 | |
91 // Test value creation | |
92 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(kStringValueName, kStringData)); | |
93 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(kDWORDValueName, kDWORDData)); | |
94 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(kInt64ValueName, &kInt64Data, | |
95 sizeof(kInt64Data), REG_QWORD)); | |
96 EXPECT_EQ(3U, key.GetValueCount()); | |
97 EXPECT_TRUE(key.HasValue(kStringValueName)); | |
98 EXPECT_TRUE(key.HasValue(kDWORDValueName)); | |
99 EXPECT_TRUE(key.HasValue(kInt64ValueName)); | |
100 | |
101 // Test Read | |
102 std::wstring string_value; | |
103 DWORD dword_value = 0; | |
104 int64 int64_value = 0; | |
105 ASSERT_EQ(ERROR_SUCCESS, key.ReadValue(kStringValueName, &string_value)); | |
106 ASSERT_EQ(ERROR_SUCCESS, key.ReadValueDW(kDWORDValueName, &dword_value)); | |
107 ASSERT_EQ(ERROR_SUCCESS, key.ReadInt64(kInt64ValueName, &int64_value)); | |
108 EXPECT_STREQ(kStringData, string_value.c_str()); | |
109 EXPECT_EQ(kDWORDData, dword_value); | |
110 EXPECT_EQ(kInt64Data, int64_value); | |
111 | |
112 // Make sure out args are not touched if ReadValue fails | |
113 const wchar_t* kNonExistent = L"NonExistent"; | |
114 ASSERT_NE(ERROR_SUCCESS, key.ReadValue(kNonExistent, &string_value)); | |
115 ASSERT_NE(ERROR_SUCCESS, key.ReadValueDW(kNonExistent, &dword_value)); | |
116 ASSERT_NE(ERROR_SUCCESS, key.ReadInt64(kNonExistent, &int64_value)); | |
117 EXPECT_STREQ(kStringData, string_value.c_str()); | |
118 EXPECT_EQ(kDWORDData, dword_value); | |
119 EXPECT_EQ(kInt64Data, int64_value); | |
120 | |
121 // Test delete | |
122 ASSERT_EQ(ERROR_SUCCESS, key.DeleteValue(kStringValueName)); | |
123 ASSERT_EQ(ERROR_SUCCESS, key.DeleteValue(kDWORDValueName)); | |
124 ASSERT_EQ(ERROR_SUCCESS, key.DeleteValue(kInt64ValueName)); | |
125 EXPECT_EQ(0U, key.GetValueCount()); | |
126 EXPECT_FALSE(key.HasValue(kStringValueName)); | |
127 EXPECT_FALSE(key.HasValue(kDWORDValueName)); | |
128 EXPECT_FALSE(key.HasValue(kInt64ValueName)); | |
129 } | |
130 } | |
131 | |
132 TEST_F(RegistryTest, BigValueIteratorTest) { | |
133 RegKey key; | |
134 std::wstring foo_key(kRootKey); | |
135 foo_key += L"\\Foo"; | |
136 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, foo_key.c_str(), | |
137 KEY_READ)); | |
138 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, foo_key.c_str(), | |
139 KEY_READ | KEY_SET_VALUE)); | |
140 ASSERT_TRUE(key.Valid()); | |
141 | |
142 // Create a test value that is larger than MAX_PATH. | |
143 std::wstring data(MAX_PATH * 2, L'a'); | |
144 | |
145 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(data.c_str(), data.c_str())); | |
146 | |
147 RegistryValueIterator iterator(HKEY_CURRENT_USER, foo_key.c_str()); | |
148 ASSERT_TRUE(iterator.Valid()); | |
149 EXPECT_STREQ(data.c_str(), iterator.Name()); | |
150 EXPECT_STREQ(data.c_str(), iterator.Value()); | |
151 // ValueSize() is in bytes, including NUL. | |
152 EXPECT_EQ((MAX_PATH * 2 + 1) * sizeof(wchar_t), iterator.ValueSize()); | |
153 ++iterator; | |
154 EXPECT_FALSE(iterator.Valid()); | |
155 } | |
156 | |
157 TEST_F(RegistryTest, TruncatedCharTest) { | |
158 RegKey key; | |
159 std::wstring foo_key(kRootKey); | |
160 foo_key += L"\\Foo"; | |
161 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, foo_key.c_str(), | |
162 KEY_READ)); | |
163 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, foo_key.c_str(), | |
164 KEY_READ | KEY_SET_VALUE)); | |
165 ASSERT_TRUE(key.Valid()); | |
166 | |
167 const wchar_t kName[] = L"name"; | |
168 // kData size is not a multiple of sizeof(wchar_t). | |
169 const uint8 kData[] = { 1, 2, 3, 4, 5 }; | |
170 EXPECT_EQ(5, arraysize(kData)); | |
171 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(kName, kData, | |
172 arraysize(kData), REG_BINARY)); | |
173 | |
174 RegistryValueIterator iterator(HKEY_CURRENT_USER, foo_key.c_str()); | |
175 ASSERT_TRUE(iterator.Valid()); | |
176 EXPECT_STREQ(kName, iterator.Name()); | |
177 // ValueSize() is in bytes. | |
178 ASSERT_EQ(arraysize(kData), iterator.ValueSize()); | |
179 // Value() is NUL terminated. | |
180 int end = (iterator.ValueSize() + sizeof(wchar_t) - 1) / sizeof(wchar_t); | |
181 EXPECT_NE(L'\0', iterator.Value()[end-1]); | |
182 EXPECT_EQ(L'\0', iterator.Value()[end]); | |
183 EXPECT_EQ(0, std::memcmp(kData, iterator.Value(), arraysize(kData))); | |
184 ++iterator; | |
185 EXPECT_FALSE(iterator.Valid()); | |
186 } | |
187 | |
188 TEST_F(RegistryTest, RecursiveDelete) { | |
189 RegKey key; | |
190 // Create kRootKey->Foo | |
191 // \->Bar (TestValue) | |
192 // \->Foo (TestValue) | |
193 // \->Bar | |
194 // \->Foo | |
195 // \->Moo | |
196 // \->Foo | |
197 // and delete kRootKey->Foo | |
198 std::wstring foo_key(kRootKey); | |
199 foo_key += L"\\Foo"; | |
200 ASSERT_EQ(ERROR_SUCCESS, | |
201 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
202 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Bar", KEY_WRITE)); | |
203 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(L"TestValue", L"TestData")); | |
204 ASSERT_EQ(ERROR_SUCCESS, | |
205 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
206 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Moo", KEY_WRITE)); | |
207 ASSERT_EQ(ERROR_SUCCESS, | |
208 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
209 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_WRITE)); | |
210 foo_key += L"\\Bar"; | |
211 ASSERT_EQ(ERROR_SUCCESS, | |
212 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
213 foo_key += L"\\Foo"; | |
214 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_WRITE)); | |
215 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(L"TestValue", L"TestData")); | |
216 ASSERT_EQ(ERROR_SUCCESS, | |
217 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); | |
218 | |
219 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_WRITE)); | |
220 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(L"Bar")); | |
221 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo")); | |
222 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Bar\\Foo")); | |
223 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Bar")); | |
224 ASSERT_EQ(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Foo")); | |
225 | |
226 ASSERT_EQ(ERROR_SUCCESS, | |
227 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
228 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Bar", KEY_WRITE)); | |
229 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_WRITE)); | |
230 ASSERT_EQ(ERROR_SUCCESS, | |
231 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
232 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(L"")); | |
233 ASSERT_NE(ERROR_SUCCESS, | |
234 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); | |
235 | |
236 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_WRITE)); | |
237 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(L"Foo")); | |
238 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(L"Foo")); | |
239 ASSERT_NE(ERROR_SUCCESS, | |
240 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); | |
241 } | |
242 | |
243 // This test requires running as an Administrator as it tests redirected | |
244 // registry writes to HKLM\Software | |
245 // http://msdn.microsoft.com/en-us/library/windows/desktop/aa384253.aspx | |
246 // TODO(wfh): flaky test on Vista. See http://crbug.com/377917 | |
247 TEST_F(RegistryTest, DISABLED_Wow64RedirectedFromNative) { | |
248 if (!IsRedirectorPresent()) | |
249 return; | |
250 | |
251 RegKey key; | |
252 | |
253 // Test redirected key access from non-redirected. | |
254 ASSERT_EQ(ERROR_SUCCESS, | |
255 key.Create(HKEY_LOCAL_MACHINE, | |
256 foo_software_key_.c_str(), | |
257 KEY_WRITE | kRedirectedViewMask)); | |
258 ASSERT_NE(ERROR_SUCCESS, | |
259 key.Open(HKEY_LOCAL_MACHINE, foo_software_key_.c_str(), KEY_READ)); | |
260 ASSERT_NE(ERROR_SUCCESS, | |
261 key.Open(HKEY_LOCAL_MACHINE, | |
262 foo_software_key_.c_str(), | |
263 KEY_READ | kNativeViewMask)); | |
264 | |
265 // Open the non-redirected view of the parent and try to delete the test key. | |
266 ASSERT_EQ(ERROR_SUCCESS, | |
267 key.Open(HKEY_LOCAL_MACHINE, L"Software", KEY_SET_VALUE)); | |
268 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
269 ASSERT_EQ(ERROR_SUCCESS, | |
270 key.Open(HKEY_LOCAL_MACHINE, | |
271 L"Software", | |
272 KEY_SET_VALUE | kNativeViewMask)); | |
273 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
274 | |
275 // Open the redirected view and delete the key created above. | |
276 ASSERT_EQ(ERROR_SUCCESS, | |
277 key.Open(HKEY_LOCAL_MACHINE, | |
278 L"Software", | |
279 KEY_SET_VALUE | kRedirectedViewMask)); | |
280 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
281 } | |
282 | |
283 // Test for the issue found in http://crbug.com/384587 where OpenKey would call | |
284 // Close() and reset wow64_access_ flag to 0 and cause a NOTREACHED to hit on a | |
285 // subsequent OpenKey call. | |
286 TEST_F(RegistryTest, SameWowFlags) { | |
287 RegKey key; | |
288 | |
289 ASSERT_EQ(ERROR_SUCCESS, | |
290 key.Open(HKEY_LOCAL_MACHINE, | |
291 L"Software", | |
292 KEY_READ | KEY_WOW64_64KEY)); | |
293 ASSERT_EQ(ERROR_SUCCESS, | |
294 key.OpenKey(L"Microsoft", | |
295 KEY_READ | KEY_WOW64_64KEY)); | |
296 ASSERT_EQ(ERROR_SUCCESS, | |
297 key.OpenKey(L"Windows", | |
298 KEY_READ | KEY_WOW64_64KEY)); | |
299 } | |
300 | |
301 // TODO(wfh): flaky test on Vista. See http://crbug.com/377917 | |
302 TEST_F(RegistryTest, DISABLED_Wow64NativeFromRedirected) { | |
303 if (!IsRedirectorPresent()) | |
304 return; | |
305 RegKey key; | |
306 | |
307 // Test non-redirected key access from redirected. | |
308 ASSERT_EQ(ERROR_SUCCESS, | |
309 key.Create(HKEY_LOCAL_MACHINE, | |
310 foo_software_key_.c_str(), | |
311 KEY_WRITE | kNativeViewMask)); | |
312 ASSERT_EQ(ERROR_SUCCESS, | |
313 key.Open(HKEY_LOCAL_MACHINE, foo_software_key_.c_str(), KEY_READ)); | |
314 ASSERT_NE(ERROR_SUCCESS, | |
315 key.Open(HKEY_LOCAL_MACHINE, | |
316 foo_software_key_.c_str(), | |
317 KEY_READ | kRedirectedViewMask)); | |
318 | |
319 // Open the redirected view of the parent and try to delete the test key | |
320 // from the non-redirected view. | |
321 ASSERT_EQ(ERROR_SUCCESS, | |
322 key.Open(HKEY_LOCAL_MACHINE, | |
323 L"Software", | |
324 KEY_SET_VALUE | kRedirectedViewMask)); | |
325 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
326 | |
327 ASSERT_EQ(ERROR_SUCCESS, | |
328 key.Open(HKEY_LOCAL_MACHINE, | |
329 L"Software", | |
330 KEY_SET_VALUE | kNativeViewMask)); | |
331 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
332 } | |
333 | |
334 TEST_F(RegistryTest, OpenSubKey) { | |
335 RegKey key; | |
336 ASSERT_EQ(ERROR_SUCCESS, | |
337 key.Open(HKEY_CURRENT_USER, | |
338 kRootKey, | |
339 KEY_READ | KEY_CREATE_SUB_KEY)); | |
340 | |
341 ASSERT_NE(ERROR_SUCCESS, key.OpenKey(L"foo", KEY_READ)); | |
342 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"foo", KEY_READ)); | |
343 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | |
344 ASSERT_EQ(ERROR_SUCCESS, key.OpenKey(L"foo", KEY_READ)); | |
345 | |
346 std::wstring foo_key(kRootKey); | |
347 foo_key += L"\\Foo"; | |
348 ASSERT_EQ(ERROR_SUCCESS, | |
349 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); | |
350 | |
351 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_WRITE)); | |
352 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(L"foo")); | |
353 } | |
354 | |
355 class TestChangeDelegate { | |
356 public: | |
357 TestChangeDelegate() : called_(false) {} | |
358 ~TestChangeDelegate() {} | |
359 | |
360 void OnKeyChanged() { | |
361 MessageLoop::current()->QuitWhenIdle(); | |
362 called_ = true; | |
363 } | |
364 | |
365 bool WasCalled() { | |
366 bool was_called = called_; | |
367 called_ = false; | |
368 return was_called; | |
369 } | |
370 | |
371 private: | |
372 bool called_; | |
373 }; | |
374 | |
375 TEST_F(RegistryTest, ChangeCallback) { | |
376 RegKey key; | |
377 TestChangeDelegate delegate; | |
378 MessageLoop message_loop; | |
379 | |
380 std::wstring foo_key(kRootKey); | |
381 foo_key += L"\\Foo"; | |
382 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, foo_key.c_str(), | |
383 KEY_READ)); | |
384 | |
385 ASSERT_TRUE(key.StartWatching(Bind(&TestChangeDelegate::OnKeyChanged, | |
386 Unretained(&delegate)))); | |
387 EXPECT_FALSE(delegate.WasCalled()); | |
388 | |
389 // Make some change. | |
390 RegKey key2; | |
391 ASSERT_EQ(ERROR_SUCCESS, key2.Open(HKEY_CURRENT_USER, foo_key.c_str(), | |
392 KEY_READ | KEY_SET_VALUE)); | |
393 ASSERT_TRUE(key2.Valid()); | |
394 EXPECT_EQ(ERROR_SUCCESS, key2.WriteValue(L"name", L"data")); | |
395 | |
396 // Allow delivery of the notification. | |
397 EXPECT_FALSE(delegate.WasCalled()); | |
398 base::RunLoop().Run(); | |
399 | |
400 ASSERT_TRUE(delegate.WasCalled()); | |
401 EXPECT_FALSE(delegate.WasCalled()); | |
402 | |
403 ASSERT_TRUE(key.StartWatching(Bind(&TestChangeDelegate::OnKeyChanged, | |
404 Unretained(&delegate)))); | |
405 | |
406 // Change something else. | |
407 EXPECT_EQ(ERROR_SUCCESS, key2.WriteValue(L"name2", L"data2")); | |
408 base::RunLoop().Run(); | |
409 ASSERT_TRUE(delegate.WasCalled()); | |
410 | |
411 ASSERT_TRUE(key.StartWatching(Bind(&TestChangeDelegate::OnKeyChanged, | |
412 Unretained(&delegate)))); | |
413 base::RunLoop().RunUntilIdle(); | |
414 EXPECT_FALSE(delegate.WasCalled()); | |
415 } | |
416 | |
417 } // namespace | |
418 | |
419 } // namespace win | |
420 } // namespace base | |
OLD | NEW |