Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1249)

Unified Diff: remoting/host/security_key/remote_security_key_message_reader_impl_unittest.cc

Issue 1844423002: Fixing a Dr. memory failure in the remoting unit tests. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Merging in the file changes to the reader tests. Created 4 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « remoting/host/security_key/remote_security_key_message_reader_impl.cc ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: remoting/host/security_key/remote_security_key_message_reader_impl_unittest.cc
diff --git a/remoting/host/security_key/remote_security_key_message_reader_impl_unittest.cc b/remoting/host/security_key/remote_security_key_message_reader_impl_unittest.cc
index bac8980ac3c80de0ab172e6c303387c8f9ad3b93..166a01731c1969d2d1d8618d00dc17df466f27e1 100644
--- a/remoting/host/security_key/remote_security_key_message_reader_impl_unittest.cc
+++ b/remoting/host/security_key/remote_security_key_message_reader_impl_unittest.cc
@@ -34,12 +34,15 @@ class RemoteSecurityKeyMessageReaderImplTest : public testing::Test {
// be verified by tests.
void OnMessage(scoped_ptr<SecurityKeyMessage> message);
+ // Used as a callback to signal completion.
+ void OperationComplete();
+
protected:
// testing::Test interface.
void SetUp() override;
// Runs the MessageLoop until the reader has completed and called back.
- void Run();
+ void Run(bool close_file);
// Writes a message (header+code+body) to the write-end of the pipe.
void WriteMessage(RemoteSecurityKeyMessageType message_type,
@@ -56,13 +59,13 @@ class RemoteSecurityKeyMessageReaderImplTest : public testing::Test {
private:
base::MessageLoopForIO message_loop_;
- base::RunLoop run_loop_;
+ scoped_ptr<base::RunLoop> run_loop_;
DISALLOW_COPY_AND_ASSIGN(RemoteSecurityKeyMessageReaderImplTest);
};
-RemoteSecurityKeyMessageReaderImplTest::
- RemoteSecurityKeyMessageReaderImplTest() {}
+RemoteSecurityKeyMessageReaderImplTest::RemoteSecurityKeyMessageReaderImplTest()
+ : run_loop_(new base::RunLoop()) {}
RemoteSecurityKeyMessageReaderImplTest::
~RemoteSecurityKeyMessageReaderImplTest() {}
@@ -73,20 +76,30 @@ void RemoteSecurityKeyMessageReaderImplTest::SetUp() {
// base::Unretained is safe since no further tasks can run after
// RunLoop::Run() returns.
- reader_->Start(base::Bind(&RemoteSecurityKeyMessageReaderImplTest::OnMessage,
- base::Unretained(this)),
- run_loop_.QuitClosure());
+ reader_->Start(
+ base::Bind(&RemoteSecurityKeyMessageReaderImplTest::OnMessage,
+ base::Unretained(this)),
+ base::Bind(&RemoteSecurityKeyMessageReaderImplTest::OperationComplete,
+ base::Unretained(this)));
}
-void RemoteSecurityKeyMessageReaderImplTest::Run() {
- // Close the write-end, so the reader doesn't block waiting for more data.
- write_file_.Close();
- run_loop_.Run();
+void RemoteSecurityKeyMessageReaderImplTest::Run(bool close_file) {
+ if (close_file) {
+ write_file_.Close();
+ }
+
+ run_loop_->Run();
+ run_loop_.reset(new base::RunLoop());
}
void RemoteSecurityKeyMessageReaderImplTest::OnMessage(
scoped_ptr<SecurityKeyMessage> message) {
messages_received_.push_back(std::move(message));
+ OperationComplete();
+}
+
+void RemoteSecurityKeyMessageReaderImplTest::OperationComplete() {
+ run_loop_->Quit();
}
void RemoteSecurityKeyMessageReaderImplTest::WriteMessage(
@@ -109,29 +122,25 @@ void RemoteSecurityKeyMessageReaderImplTest::WriteData(const char* data,
ASSERT_EQ(length, written);
}
-TEST_F(RemoteSecurityKeyMessageReaderImplTest, EnsureReaderTornDownCleanly) {
- // This test is different from the others as the files used for reading and
- // writing are still open when the reader instance is destroyed. This test is
- // meant to ensure that no asserts/exceptions/hangs occur during shutdown.
- WriteMessage(kTestMessageType, std::string());
- reader_.reset();
-}
-
TEST_F(RemoteSecurityKeyMessageReaderImplTest, SingleMessageWithNoPayload) {
WriteMessage(kTestMessageType, std::string());
- Run();
+ Run(/*close_file=*/false);
ASSERT_EQ(1u, messages_received_.size());
ASSERT_EQ(kTestMessageType, messages_received_[0]->type());
ASSERT_EQ("", messages_received_[0]->payload());
+
+ Run(/*close_file=*/true);
}
TEST_F(RemoteSecurityKeyMessageReaderImplTest, SingleMessageWithPayload) {
std::string payload("I AM A VALID MESSAGE PAYLOAD!!!!!!!!!!!!!!!!!!!!!!");
WriteMessage(kTestMessageType, payload);
- Run();
+ Run(/*close_file=*/false);
ASSERT_EQ(1u, messages_received_.size());
ASSERT_EQ(kTestMessageType, messages_received_[0]->type());
ASSERT_EQ(payload, messages_received_[0]->payload());
+
+ Run(/*close_file=*/true);
}
TEST_F(RemoteSecurityKeyMessageReaderImplTest, SingleMessageWithLargePayload) {
@@ -139,14 +148,16 @@ TEST_F(RemoteSecurityKeyMessageReaderImplTest, SingleMessageWithLargePayload) {
SecurityKeyMessage::kMessageTypeSizeBytes,
'Y');
WriteMessage(kTestMessageType, payload);
- Run();
+ Run(/*close_file=*/false);
ASSERT_EQ(1u, messages_received_.size());
ASSERT_EQ(kTestMessageType, messages_received_[0]->type());
ASSERT_EQ(payload, messages_received_[0]->payload());
+
+ Run(/*close_file=*/true);
}
TEST_F(RemoteSecurityKeyMessageReaderImplTest, EmptyFile) {
- Run();
+ Run(/*close_file=*/true);
ASSERT_EQ(0u, messages_received_.size());
}
@@ -154,28 +165,28 @@ TEST_F(RemoteSecurityKeyMessageReaderImplTest, InvalidMessageLength) {
uint32_t length = kMaxSecurityKeyMessageByteCount + 1;
ASSERT_FALSE(SecurityKeyMessage::IsValidMessageSize(length));
WriteData(reinterpret_cast<char*>(&length), sizeof(length));
- Run();
+ Run(/*close_file=*/true);
ASSERT_EQ(0u, messages_received_.size());
}
TEST_F(RemoteSecurityKeyMessageReaderImplTest, ShortHeader) {
// Write only 3 bytes - the message length header is supposed to be 4 bytes.
WriteData("xxx", SecurityKeyMessage::kHeaderSizeBytes - 1);
- Run();
+ Run(/*close_file=*/true);
ASSERT_EQ(0u, messages_received_.size());
}
TEST_F(RemoteSecurityKeyMessageReaderImplTest, ZeroLengthMessage) {
uint32_t length = 0;
WriteData(reinterpret_cast<char*>(&length), sizeof(length));
- Run();
+ Run(/*close_file=*/true);
ASSERT_EQ(0u, messages_received_.size());
}
TEST_F(RemoteSecurityKeyMessageReaderImplTest, MissingControlCode) {
uint32_t length = 1;
WriteData(reinterpret_cast<char*>(&length), sizeof(length));
- Run();
+ Run(/*close_file=*/true);
ASSERT_EQ(0u, messages_received_.size());
}
@@ -185,7 +196,7 @@ TEST_F(RemoteSecurityKeyMessageReaderImplTest, MissingPayload) {
char test_control_code = static_cast<char>(kTestMessageType);
WriteData(&test_control_code, sizeof(test_control_code));
- Run();
+ Run(/*close_file=*/true);
ASSERT_EQ(0u, messages_received_.size());
}
@@ -197,10 +208,11 @@ TEST_F(RemoteSecurityKeyMessageReaderImplTest, MultipleMessages) {
for (auto& payload : payloads) {
WriteMessage(kTestMessageType, payload);
+ Run(/*close_file=*/false);
}
- Run();
ASSERT_EQ(payloads.size(), messages_received_.size());
+ Run(/*close_file=*/true);
for (size_t i = 0; i < payloads.size(); i++) {
ASSERT_EQ(kTestMessageType, messages_received_[i]->type());
« no previous file with comments | « remoting/host/security_key/remote_security_key_message_reader_impl.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698