Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "base/compiler_specific.h" | |
| 6 #include "base/file_util.h" | |
| 7 #include "base/json/json_reader.h" | |
| 8 #include "base/json/json_writer.h" | |
| 9 #include "base/message_loop.h" | |
| 10 #include "base/run_loop.h" | |
| 11 #include "base/stl_util.h" | |
| 12 #include "base/strings/stringize_macros.h" | |
| 13 #include "base/values.h" | |
| 14 #include "net/base/file_stream.h" | |
| 15 #include "net/base/net_util.h" | |
| 16 #include "remoting/host/pin_hash.h" | |
| 17 #include "remoting/host/setup/mock_daemon_controller.h" | |
| 18 #include "remoting/host/setup/native_messaging_host.h" | |
|
Sergey Ulanov
2013/05/18 01:59:31
nit: this should be first include for this file.
Lambros
2013/05/22 21:42:18
Done.
| |
| 19 #include "testing/gtest/include/gtest/gtest.h" | |
| 20 | |
| 21 namespace { | |
| 22 | |
| 23 void VerifyHelloResponse(const base::DictionaryValue* response) { | |
| 24 EXPECT_TRUE(response); | |
| 25 std::string value; | |
| 26 EXPECT_TRUE(response->GetString("type", &value)); | |
| 27 EXPECT_EQ(value, "helloResponse"); | |
| 28 EXPECT_TRUE(response->GetString("version", &value)); | |
| 29 EXPECT_EQ(value, STRINGIZE(VERSION)); | |
| 30 } | |
| 31 | |
| 32 void VerifyGetHostNameResponse(const base::DictionaryValue* response) { | |
| 33 EXPECT_TRUE(response); | |
| 34 std::string value; | |
| 35 EXPECT_TRUE(response->GetString("type", &value)); | |
| 36 EXPECT_EQ(value, "getHostNameResponse"); | |
| 37 EXPECT_TRUE(response->GetString("hostname", &value)); | |
| 38 EXPECT_EQ(value, net::GetHostName()); | |
| 39 } | |
| 40 | |
| 41 void VerifyGetPinHashResponse(const base::DictionaryValue* response) { | |
| 42 EXPECT_TRUE(response); | |
| 43 std::string value; | |
| 44 EXPECT_TRUE(response->GetString("type", &value)); | |
| 45 EXPECT_EQ(value, "getPinHashResponse"); | |
| 46 EXPECT_TRUE(response->GetString("hash", &value)); | |
| 47 EXPECT_EQ(value, remoting::MakeHostPinHash("my_host", "1234")); | |
| 48 } | |
| 49 | |
| 50 void VerifyGenerateKeyPairResponse(const base::DictionaryValue* response) { | |
| 51 EXPECT_TRUE(response); | |
| 52 std::string value; | |
| 53 EXPECT_TRUE(response->GetString("type", &value)); | |
| 54 EXPECT_EQ(value, "generateKeyPairResponse"); | |
| 55 EXPECT_TRUE(response->GetString("private_key", &value)); | |
| 56 EXPECT_TRUE(response->GetString("public_key", &value)); | |
| 57 } | |
| 58 | |
| 59 void VerifyGetDaemonConfigResponse(const base::DictionaryValue* response) { | |
| 60 EXPECT_TRUE(response); | |
| 61 std::string value; | |
| 62 EXPECT_TRUE(response->GetString("type", &value)); | |
| 63 EXPECT_EQ(value, "getDaemonConfigResponse"); | |
| 64 EXPECT_TRUE(response->GetString("config", &value)); | |
| 65 EXPECT_EQ(value, "{}"); | |
| 66 } | |
| 67 | |
| 68 void VerifyGetUsageStatsConsentResponse(const base::DictionaryValue* response) { | |
| 69 EXPECT_TRUE(response); | |
| 70 std::string value; | |
| 71 EXPECT_TRUE(response->GetString("type", &value)); | |
| 72 EXPECT_EQ(value, "getUsageStatsConsentResponse"); | |
| 73 bool supported, allowed, set_by_policy; | |
| 74 EXPECT_TRUE(response->GetBoolean("supported", &supported)); | |
| 75 EXPECT_TRUE(response->GetBoolean("allowed", &allowed)); | |
| 76 EXPECT_TRUE(response->GetBoolean("set_by_policy", &set_by_policy)); | |
| 77 EXPECT_TRUE(supported); | |
| 78 EXPECT_TRUE(allowed); | |
| 79 EXPECT_TRUE(set_by_policy); | |
| 80 } | |
| 81 | |
| 82 void VerifyStopDaemonResponse(const base::DictionaryValue* response) { | |
| 83 EXPECT_TRUE(response); | |
| 84 std::string value; | |
| 85 EXPECT_TRUE(response->GetString("type", &value)); | |
| 86 EXPECT_EQ(value, "stopDaemonResponse"); | |
| 87 int result; | |
| 88 EXPECT_TRUE(response->GetInteger("result", &result)); | |
| 89 EXPECT_EQ(result, 0); | |
| 90 } | |
| 91 | |
| 92 void VerifyGetDaemonStateResponse(const base::DictionaryValue* response) { | |
| 93 EXPECT_TRUE(response); | |
| 94 std::string value; | |
| 95 EXPECT_TRUE(response->GetString("type", &value)); | |
| 96 EXPECT_EQ(value, "getDaemonStateResponse"); | |
| 97 int result; | |
| 98 EXPECT_TRUE(response->GetInteger("state", &result)); | |
| 99 EXPECT_EQ(result, 4); | |
| 100 } | |
| 101 | |
| 102 void VerifyUpdateDaemonConfigResponse(const base::DictionaryValue* response) { | |
| 103 EXPECT_TRUE(response); | |
| 104 std::string value; | |
| 105 EXPECT_TRUE(response->GetString("type", &value)); | |
| 106 EXPECT_EQ(value, "updateDaemonConfigResponse"); | |
| 107 int result; | |
| 108 EXPECT_TRUE(response->GetInteger("result", &result)); | |
| 109 EXPECT_EQ(result, 0); | |
| 110 } | |
| 111 | |
| 112 void VerifyStartDaemonResponse(const base::DictionaryValue* response) { | |
| 113 EXPECT_TRUE(response); | |
| 114 std::string value; | |
| 115 EXPECT_TRUE(response->GetString("type", &value)); | |
| 116 EXPECT_EQ(value, "startDaemonResponse"); | |
| 117 int result; | |
| 118 EXPECT_TRUE(response->GetInteger("result", &result)); | |
| 119 EXPECT_EQ(result, 0); | |
| 120 } | |
| 121 | |
| 122 scoped_ptr<base::DictionaryValue> ReadMessageFromFile( | |
|
Sergey Ulanov
2013/05/18 01:59:31
Can you use FileStreams to read from files?
Lambros
2013/05/22 21:42:18
Probably, but not sure if there's any advantage, o
| |
| 123 base::PlatformFile handle) { | |
| 124 uint32 length; | |
| 125 int read_result = base::ReadPlatformFileAtCurrentPos( | |
| 126 handle, reinterpret_cast<char*>(&length), sizeof(length)); | |
| 127 if (read_result != sizeof(length)) { | |
| 128 return scoped_ptr<base::DictionaryValue>(); | |
| 129 } | |
| 130 | |
| 131 std::string message_json(length, '\0'); | |
| 132 read_result = base::ReadPlatformFileAtCurrentPos( | |
| 133 handle, string_as_array(&message_json), length); | |
| 134 if (read_result != static_cast<int>(length)) { | |
| 135 return scoped_ptr<base::DictionaryValue>(); | |
| 136 } | |
| 137 | |
| 138 scoped_ptr<base::Value> message(base::JSONReader::Read(message_json)); | |
| 139 if (!message || !message->IsType(base::Value::TYPE_DICTIONARY)) { | |
| 140 return scoped_ptr<base::DictionaryValue>(); | |
| 141 } | |
| 142 | |
| 143 return scoped_ptr<base::DictionaryValue>( | |
| 144 static_cast<base::DictionaryValue*>(message.release())); | |
| 145 } | |
| 146 | |
| 147 } // namespace | |
| 148 | |
| 149 namespace remoting { | |
| 150 | |
| 151 class NativeMessagingHostTest : public testing::Test { | |
| 152 public: | |
| 153 NativeMessagingHostTest(); | |
| 154 virtual ~NativeMessagingHostTest(); | |
| 155 | |
| 156 virtual void SetUp() OVERRIDE; | |
| 157 virtual void TearDown() OVERRIDE; | |
| 158 | |
| 159 void Run(); | |
| 160 | |
| 161 void WriteMessageToInputFile(const base::Value& message); | |
| 162 | |
| 163 // The Host process should shut down when it receives a malformed request. | |
| 164 // This is tested by sending a known-good request, followed by |message|, | |
| 165 // followed by the known-good request again. The response file should only | |
| 166 // contain a single response from the first good request. | |
| 167 void TestBadRequest(const base::Value& message); | |
| 168 | |
| 169 base::FilePath output_path() const { return output_path_; } | |
| 170 | |
| 171 private: | |
| 172 base::FilePath input_path_; | |
| 173 base::PlatformFile input_handle_; | |
| 174 base::FilePath output_path_; | |
| 175 base::PlatformFile output_handle_; | |
| 176 | |
| 177 base::MessageLoop message_loop_; | |
| 178 base::RunLoop run_loop_; | |
| 179 scoped_ptr<remoting::NativeMessagingHost> host_; | |
| 180 }; | |
| 181 | |
| 182 NativeMessagingHostTest::NativeMessagingHostTest() | |
| 183 : message_loop_(base::MessageLoop::TYPE_IO) {} | |
| 184 | |
| 185 NativeMessagingHostTest::~NativeMessagingHostTest() {} | |
| 186 | |
| 187 void NativeMessagingHostTest::SetUp() { | |
| 188 file_util::CreateTemporaryFile(&input_path_); | |
| 189 input_handle_ = base::CreatePlatformFile( | |
| 190 input_path_, base::PLATFORM_FILE_OPEN | base::PLATFORM_FILE_READ, NULL, | |
| 191 NULL); | |
| 192 | |
| 193 file_util::CreateTemporaryFile(&output_path_); | |
| 194 output_handle_ = base::CreatePlatformFile( | |
| 195 output_path_, base::PLATFORM_FILE_OPEN | base::PLATFORM_FILE_WRITE, NULL, | |
| 196 NULL); | |
| 197 | |
| 198 host_.reset(new NativeMessagingHost(input_handle_, output_handle_, | |
| 199 message_loop_.message_loop_proxy(), | |
| 200 run_loop_.QuitClosure())); | |
| 201 host_->SetDaemonControllerForTest( | |
| 202 scoped_ptr<DaemonController>(new MockDaemonController())); | |
| 203 } | |
| 204 | |
| 205 void NativeMessagingHostTest::TearDown() { | |
| 206 base::ClosePlatformFile(input_handle_); | |
| 207 base::ClosePlatformFile(output_handle_); | |
| 208 EXPECT_TRUE(file_util::Delete(input_path_, false)); | |
| 209 EXPECT_TRUE(file_util::Delete(output_path_, false)); | |
| 210 } | |
| 211 | |
| 212 void NativeMessagingHostTest::Run() { | |
| 213 host_->Start(); | |
| 214 run_loop_.Run(); | |
| 215 } | |
| 216 | |
| 217 void NativeMessagingHostTest::WriteMessageToInputFile( | |
| 218 const base::Value& message) { | |
| 219 std::string message_json; | |
| 220 base::JSONWriter::Write(&message, &message_json); | |
| 221 | |
| 222 uint32 length = message_json.length(); | |
| 223 file_util::AppendToFile(input_path_, reinterpret_cast<char*>(&length), | |
| 224 sizeof(length)); | |
| 225 file_util::AppendToFile(input_path_, message_json.data(), length); | |
| 226 } | |
| 227 | |
| 228 void NativeMessagingHostTest::TestBadRequest(const base::Value& message) { | |
| 229 base::DictionaryValue good_message; | |
| 230 good_message.SetString("type", "hello"); | |
| 231 | |
| 232 WriteMessageToInputFile(good_message); | |
| 233 WriteMessageToInputFile(message); | |
| 234 WriteMessageToInputFile(good_message); | |
| 235 | |
| 236 Run(); | |
| 237 | |
| 238 // Read from output file, and verify responses. | |
| 239 base::PlatformFile handle = base::CreatePlatformFile( | |
| 240 output_path(), base::PLATFORM_FILE_OPEN | base::PLATFORM_FILE_READ, NULL, | |
| 241 NULL); | |
| 242 | |
| 243 scoped_ptr<base::DictionaryValue> response = ReadMessageFromFile(handle); | |
| 244 VerifyHelloResponse(response.get()); | |
| 245 | |
| 246 response = ReadMessageFromFile(handle); | |
| 247 EXPECT_FALSE(response); | |
| 248 } | |
| 249 | |
| 250 TEST_F(NativeMessagingHostTest, All) { | |
| 251 base::DictionaryValue message; | |
| 252 message.SetString("type", "hello"); | |
| 253 WriteMessageToInputFile(message); | |
| 254 | |
| 255 message.SetString("type", "getHostName"); | |
| 256 WriteMessageToInputFile(message); | |
| 257 | |
| 258 message.SetString("type", "getPinHash"); | |
| 259 message.SetString("hostId", "my_host"); | |
| 260 message.SetString("pin", "1234"); | |
| 261 WriteMessageToInputFile(message); | |
| 262 | |
| 263 message.Clear(); | |
| 264 message.SetString("type", "generateKeyPair"); | |
| 265 WriteMessageToInputFile(message); | |
| 266 | |
| 267 message.SetString("type", "getDaemonConfig"); | |
| 268 WriteMessageToInputFile(message); | |
| 269 | |
| 270 message.SetString("type", "getUsageStatsConsent"); | |
| 271 WriteMessageToInputFile(message); | |
| 272 | |
| 273 message.SetString("type", "stopDaemon"); | |
| 274 WriteMessageToInputFile(message); | |
| 275 | |
| 276 message.SetString("type", "getDaemonState"); | |
| 277 WriteMessageToInputFile(message); | |
| 278 | |
| 279 // Following messages require a "config" dictionary. | |
| 280 message.SetString("config", "{}"); | |
| 281 message.SetString("type", "updateDaemonConfig"); | |
| 282 WriteMessageToInputFile(message); | |
| 283 | |
| 284 message.SetBoolean("consent", true); | |
| 285 message.SetString("type", "startDaemon"); | |
| 286 WriteMessageToInputFile(message); | |
| 287 | |
| 288 Run(); | |
| 289 | |
| 290 // Read from output file, and verify responses. | |
| 291 base::PlatformFile handle = base::CreatePlatformFile( | |
| 292 output_path(), base::PLATFORM_FILE_OPEN | base::PLATFORM_FILE_READ, NULL, | |
| 293 NULL); | |
| 294 | |
| 295 scoped_ptr<base::DictionaryValue> response = ReadMessageFromFile(handle); | |
| 296 VerifyHelloResponse(response.get()); | |
| 297 | |
| 298 response = ReadMessageFromFile(handle); | |
| 299 VerifyGetHostNameResponse(response.get()); | |
| 300 | |
| 301 response = ReadMessageFromFile(handle); | |
| 302 VerifyGetPinHashResponse(response.get()); | |
| 303 | |
| 304 response = ReadMessageFromFile(handle); | |
| 305 VerifyGenerateKeyPairResponse(response.get()); | |
| 306 | |
| 307 response = ReadMessageFromFile(handle); | |
| 308 VerifyGetDaemonConfigResponse(response.get()); | |
| 309 | |
| 310 response = ReadMessageFromFile(handle); | |
| 311 VerifyGetUsageStatsConsentResponse(response.get()); | |
| 312 | |
| 313 response = ReadMessageFromFile(handle); | |
| 314 VerifyStopDaemonResponse(response.get()); | |
|
Sergey Ulanov
2013/05/18 01:59:31
This doesn't really verify that daemon controller
Lambros
2013/05/22 21:42:18
I've improved the mock object to try to address th
| |
| 315 | |
| 316 response = ReadMessageFromFile(handle); | |
| 317 VerifyGetDaemonStateResponse(response.get()); | |
| 318 | |
| 319 response = ReadMessageFromFile(handle); | |
| 320 VerifyUpdateDaemonConfigResponse(response.get()); | |
| 321 | |
| 322 response = ReadMessageFromFile(handle); | |
| 323 VerifyStartDaemonResponse(response.get()); | |
| 324 | |
| 325 base::ClosePlatformFile(handle); | |
| 326 } | |
| 327 | |
| 328 TEST_F(NativeMessagingHostTest, Id) { | |
|
Sergey Ulanov
2013/05/18 01:59:31
Please add short description for each test, e.g.
Lambros
2013/05/22 21:42:18
Done.
| |
| 329 base::DictionaryValue message; | |
| 330 message.SetString("type", "hello"); | |
| 331 WriteMessageToInputFile(message); | |
| 332 message.SetString("id", "42"); | |
| 333 WriteMessageToInputFile(message); | |
| 334 | |
| 335 Run(); | |
| 336 | |
| 337 base::PlatformFile handle = base::CreatePlatformFile( | |
| 338 output_path(), base::PLATFORM_FILE_OPEN | base::PLATFORM_FILE_READ, NULL, | |
| 339 NULL); | |
| 340 scoped_ptr<base::DictionaryValue> response = ReadMessageFromFile(handle); | |
| 341 EXPECT_TRUE(response); | |
| 342 std::string value; | |
| 343 EXPECT_FALSE(response->GetString("id", &value)); | |
| 344 | |
| 345 response = ReadMessageFromFile(handle); | |
| 346 EXPECT_TRUE(response); | |
| 347 EXPECT_TRUE(response->GetString("id", &value)); | |
| 348 EXPECT_EQ(value, "42"); | |
| 349 } | |
| 350 | |
| 351 TEST_F(NativeMessagingHostTest, WrongFormat) { | |
| 352 // Request should be a Dictionary. | |
| 353 base::ListValue message; | |
| 354 TestBadRequest(message); | |
| 355 } | |
| 356 | |
| 357 TEST_F(NativeMessagingHostTest, MissingType) { | |
| 358 base::DictionaryValue message; | |
| 359 TestBadRequest(message); | |
| 360 } | |
| 361 | |
| 362 TEST_F(NativeMessagingHostTest, InvalidType) { | |
| 363 base::DictionaryValue message; | |
| 364 message.SetString("type", "xxx"); | |
| 365 TestBadRequest(message); | |
| 366 } | |
| 367 | |
| 368 TEST_F(NativeMessagingHostTest, GetPinHashNoHostId) { | |
| 369 base::DictionaryValue message; | |
| 370 message.SetString("type", "getPinHash"); | |
| 371 message.SetString("pin", "1234"); | |
| 372 TestBadRequest(message); | |
| 373 } | |
| 374 | |
| 375 TEST_F(NativeMessagingHostTest, GetPinHashNoPin) { | |
| 376 base::DictionaryValue message; | |
| 377 message.SetString("type", "getPinHash"); | |
| 378 message.SetString("hostId", "my_host"); | |
| 379 TestBadRequest(message); | |
| 380 } | |
| 381 | |
| 382 TEST_F(NativeMessagingHostTest, UpdateDaemonConfigInvalidConfig) { | |
| 383 base::DictionaryValue message; | |
| 384 message.SetString("type", "updateDaemonConfig"); | |
| 385 message.SetString("config", "xxx"); | |
| 386 TestBadRequest(message); | |
| 387 } | |
| 388 | |
| 389 TEST_F(NativeMessagingHostTest, StartDaemonInvalidConfig) { | |
| 390 base::DictionaryValue message; | |
| 391 message.SetString("type", "startDaemon"); | |
| 392 message.SetString("config", "xxx"); | |
| 393 message.SetBoolean("consent", true); | |
| 394 TestBadRequest(message); | |
| 395 } | |
| 396 | |
| 397 TEST_F(NativeMessagingHostTest, StartDaemonNoConsent) { | |
| 398 base::DictionaryValue message; | |
| 399 message.SetString("type", "startDaemon"); | |
| 400 message.SetString("config", "{}"); | |
| 401 TestBadRequest(message); | |
| 402 } | |
| 403 | |
| 404 } // namespace remoting | |
| OLD | NEW |