Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(29)

Side by Side Diff: remoting/host/security_key/security_key_ipc_server_unittest.cc

Issue 2162083003: Renaming Gnubby and RemoteSecurityKey files/classes/members (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fixing a GYP build error Created 4 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2016 The Chromium Authors. All rights reserved. 1 // Copyright 2016 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "remoting/host/security_key/remote_security_key_ipc_server.h" 5 #include "remoting/host/security_key/security_key_ipc_server.h"
6 6
7 #include <memory> 7 #include <memory>
8 #include <string> 8 #include <string>
9 9
10 #include "base/bind.h" 10 #include "base/bind.h"
11 #include "base/bind_helpers.h" 11 #include "base/bind_helpers.h"
12 #include "base/callback.h" 12 #include "base/callback.h"
13 #include "base/macros.h" 13 #include "base/macros.h"
14 #include "base/message_loop/message_loop.h" 14 #include "base/message_loop/message_loop.h"
15 #include "base/run_loop.h" 15 #include "base/run_loop.h"
16 #include "ipc/ipc_channel.h" 16 #include "ipc/ipc_channel.h"
17 #include "remoting/host/security_key/fake_remote_security_key_ipc_client.h" 17 #include "remoting/host/security_key/fake_security_key_ipc_client.h"
18 #include "remoting/host/security_key/remote_security_key_ipc_constants.h" 18 #include "remoting/host/security_key/security_key_ipc_constants.h"
19 #include "testing/gtest/include/gtest/gtest.h" 19 #include "testing/gtest/include/gtest/gtest.h"
20 20
21 namespace { 21 namespace {
22 const int kTestConnectionId = 42; 22 const int kTestConnectionId = 42;
23 const int kInitialConnectTimeoutMs = 250; 23 const int kInitialConnectTimeoutMs = 250;
24 const int kConnectionTimeoutErrorDeltaMs = 100; 24 const int kConnectionTimeoutErrorDeltaMs = 100;
25 const int kLargeMessageSizeBytes = 256 * 1024; 25 const int kLargeMessageSizeBytes = 256 * 1024;
26 } // namespace 26 } // namespace
27 27
28 namespace remoting { 28 namespace remoting {
29 29
30 class RemoteSecurityKeyIpcServerTest : public testing::Test { 30 class SecurityKeyIpcServerTest : public testing::Test {
31 public: 31 public:
32 RemoteSecurityKeyIpcServerTest(); 32 SecurityKeyIpcServerTest();
33 ~RemoteSecurityKeyIpcServerTest() override; 33 ~SecurityKeyIpcServerTest() override;
34 34
35 // Passed to the object used for testing to be called back to signal 35 // Passed to the object used for testing to be called back to signal
36 // completion of an IPC channel state change or reception of an IPC message. 36 // completion of an IPC channel state change or reception of an IPC message.
37 void OperationComplete(); 37 void OperationComplete();
38 38
39 // Used as a callback to signal receipt of a security key request message. 39 // Used as a callback to signal receipt of a security key request message.
40 void SendRequestToClient(int connection_id, const std::string& data); 40 void SendRequestToClient(int connection_id, const std::string& data);
41 41
42 protected: 42 protected:
43 // Returns a unique IPC channel name which prevents conflicts when running 43 // Returns a unique IPC channel name which prevents conflicts when running
44 // tests concurrently. 44 // tests concurrently.
45 std::string GetUniqueTestChannelName(); 45 std::string GetUniqueTestChannelName();
46 46
47 // Waits until the current |run_loop_| instance is signaled, then resets it. 47 // Waits until the current |run_loop_| instance is signaled, then resets it.
48 void WaitForOperationComplete(); 48 void WaitForOperationComplete();
49 49
50 // IPC tests require a valid MessageLoop to run. 50 // IPC tests require a valid MessageLoop to run.
51 base::MessageLoopForIO message_loop_; 51 base::MessageLoopForIO message_loop_;
52 52
53 // Used to allow |message_loop_| to run during tests. The instance is reset 53 // Used to allow |message_loop_| to run during tests. The instance is reset
54 // after each stage of the tests has been completed. 54 // after each stage of the tests has been completed.
55 std::unique_ptr<base::RunLoop> run_loop_; 55 std::unique_ptr<base::RunLoop> run_loop_;
56 56
57 // The object under test. 57 // The object under test.
58 std::unique_ptr<RemoteSecurityKeyIpcServer> remote_security_key_ipc_server_; 58 std::unique_ptr<SecurityKeyIpcServer> security_key_ipc_server_;
59 59
60 // Used to validate the object under test uses the correct ID when 60 // Used to validate the object under test uses the correct ID when
61 // communicating over the IPC channel. 61 // communicating over the IPC channel.
62 int last_connection_id_received_ = -1; 62 int last_connection_id_received_ = -1;
63 63
64 // Stores the contents of the last IPC message received for validation. 64 // Stores the contents of the last IPC message received for validation.
65 std::string last_message_received_; 65 std::string last_message_received_;
66 66
67 private: 67 private:
68 DISALLOW_COPY_AND_ASSIGN(RemoteSecurityKeyIpcServerTest); 68 DISALLOW_COPY_AND_ASSIGN(SecurityKeyIpcServerTest);
69 }; 69 };
70 70
71 RemoteSecurityKeyIpcServerTest::RemoteSecurityKeyIpcServerTest() 71 SecurityKeyIpcServerTest::SecurityKeyIpcServerTest()
72 : run_loop_(new base::RunLoop()) { 72 : run_loop_(new base::RunLoop()) {
73 uint32_t peer_session_id = UINT32_MAX; 73 uint32_t peer_session_id = UINT32_MAX;
74 #if defined(OS_WIN) 74 #if defined(OS_WIN)
75 EXPECT_TRUE(ProcessIdToSessionId(GetCurrentProcessId(), 75 EXPECT_TRUE(ProcessIdToSessionId(GetCurrentProcessId(),
76 reinterpret_cast<DWORD*>(&peer_session_id))); 76 reinterpret_cast<DWORD*>(&peer_session_id)));
77 #endif // defined(OS_WIN) 77 #endif // defined(OS_WIN)
78 78
79 remote_security_key_ipc_server_ = 79 security_key_ipc_server_ = remoting::SecurityKeyIpcServer::Create(
80 remoting::RemoteSecurityKeyIpcServer::Create( 80 kTestConnectionId, peer_session_id,
81 kTestConnectionId, peer_session_id, 81 base::TimeDelta::FromMilliseconds(kInitialConnectTimeoutMs),
82 base::TimeDelta::FromMilliseconds(kInitialConnectTimeoutMs), 82 base::Bind(&SecurityKeyIpcServerTest::SendRequestToClient,
83 base::Bind(&RemoteSecurityKeyIpcServerTest::SendRequestToClient, 83 base::Unretained(this)),
84 base::Unretained(this)), 84 base::Bind(&SecurityKeyIpcServerTest::OperationComplete,
85 base::Bind(&RemoteSecurityKeyIpcServerTest::OperationComplete, 85 base::Unretained(this)));
86 base::Unretained(this)));
87 } 86 }
88 87
89 RemoteSecurityKeyIpcServerTest::~RemoteSecurityKeyIpcServerTest() {} 88 SecurityKeyIpcServerTest::~SecurityKeyIpcServerTest() {}
90 89
91 void RemoteSecurityKeyIpcServerTest::OperationComplete() { 90 void SecurityKeyIpcServerTest::OperationComplete() {
92 run_loop_->Quit(); 91 run_loop_->Quit();
93 } 92 }
94 93
95 void RemoteSecurityKeyIpcServerTest::WaitForOperationComplete() { 94 void SecurityKeyIpcServerTest::WaitForOperationComplete() {
96 run_loop_->Run(); 95 run_loop_->Run();
97 run_loop_.reset(new base::RunLoop()); 96 run_loop_.reset(new base::RunLoop());
98 } 97 }
99 98
100 void RemoteSecurityKeyIpcServerTest::SendRequestToClient( 99 void SecurityKeyIpcServerTest::SendRequestToClient(int connection_id,
101 int connection_id, 100 const std::string& data) {
102 const std::string& data) {
103 last_connection_id_received_ = connection_id; 101 last_connection_id_received_ = connection_id;
104 last_message_received_ = data; 102 last_message_received_ = data;
105 OperationComplete(); 103 OperationComplete();
106 } 104 }
107 105
108 std::string RemoteSecurityKeyIpcServerTest::GetUniqueTestChannelName() { 106 std::string SecurityKeyIpcServerTest::GetUniqueTestChannelName() {
109 return GetChannelNamePathPrefixForTest() + "Super_Awesome_Test_Channel." + 107 return GetChannelNamePathPrefixForTest() + "Super_Awesome_Test_Channel." +
110 IPC::Channel::GenerateUniqueRandomChannelID(); 108 IPC::Channel::GenerateUniqueRandomChannelID();
111 } 109 }
112 110
113 TEST_F(RemoteSecurityKeyIpcServerTest, HandleSingleGnubbyRequest) { 111 TEST_F(SecurityKeyIpcServerTest, HandleSingleSecurityKeyRequest) {
114 std::string channel_name(GetUniqueTestChannelName()); 112 std::string channel_name(GetUniqueTestChannelName());
115 ASSERT_TRUE(remote_security_key_ipc_server_->CreateChannel( 113 ASSERT_TRUE(security_key_ipc_server_->CreateChannel(
116 channel_name, 114 channel_name,
117 /*request_timeout=*/base::TimeDelta::FromMilliseconds(500))); 115 /*request_timeout=*/base::TimeDelta::FromMilliseconds(500)));
118 116
119 // Create a fake client and connect to the IPC server channel. 117 // Create a fake client and connect to the IPC server channel.
120 FakeRemoteSecurityKeyIpcClient fake_ipc_client( 118 FakeSecurityKeyIpcClient fake_ipc_client(base::Bind(
121 base::Bind(&RemoteSecurityKeyIpcServerTest::OperationComplete, 119 &SecurityKeyIpcServerTest::OperationComplete, base::Unretained(this)));
122 base::Unretained(this)));
123 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name)); 120 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name));
124 WaitForOperationComplete(); 121 WaitForOperationComplete();
125 122
126 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected()); 123 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected());
127 124
128 // Send a request from the IPC client to the IPC server. 125 // Send a request from the IPC client to the IPC server.
129 std::string request_data("Blergh!"); 126 std::string request_data("Blergh!");
130 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data); 127 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data);
131 WaitForOperationComplete(); 128 WaitForOperationComplete();
132 129
133 // Verify the request was received. 130 // Verify the request was received.
134 ASSERT_EQ(kTestConnectionId, last_connection_id_received_); 131 ASSERT_EQ(kTestConnectionId, last_connection_id_received_);
135 ASSERT_EQ(request_data, last_message_received_); 132 ASSERT_EQ(request_data, last_message_received_);
136 133
137 // Send a response from the IPC server to the IPC client. 134 // Send a response from the IPC server to the IPC client.
138 std::string response_data("Blargh!"); 135 std::string response_data("Blargh!");
139 ASSERT_TRUE(remote_security_key_ipc_server_->SendResponse(response_data)); 136 ASSERT_TRUE(security_key_ipc_server_->SendResponse(response_data));
140 WaitForOperationComplete(); 137 WaitForOperationComplete();
141 138
142 // Verify the request was received. 139 // Verify the request was received.
143 ASSERT_EQ(response_data, fake_ipc_client.last_message_received()); 140 ASSERT_EQ(response_data, fake_ipc_client.last_message_received());
144 141
145 // Typically the client will be the one to close the connection. 142 // Typically the client will be the one to close the connection.
146 fake_ipc_client.CloseIpcConnection(); 143 fake_ipc_client.CloseIpcConnection();
147 } 144 }
148 145
149 TEST_F(RemoteSecurityKeyIpcServerTest, HandleLargeGnubbyRequest) { 146 TEST_F(SecurityKeyIpcServerTest, HandleLargeSecurityKeyRequest) {
150 std::string channel_name(GetUniqueTestChannelName()); 147 std::string channel_name(GetUniqueTestChannelName());
151 ASSERT_TRUE(remote_security_key_ipc_server_->CreateChannel( 148 ASSERT_TRUE(security_key_ipc_server_->CreateChannel(
152 channel_name, 149 channel_name,
153 /*request_timeout=*/base::TimeDelta::FromMilliseconds(500))); 150 /*request_timeout=*/base::TimeDelta::FromMilliseconds(500)));
154 151
155 // Create a fake client and connect to the IPC server channel. 152 // Create a fake client and connect to the IPC server channel.
156 FakeRemoteSecurityKeyIpcClient fake_ipc_client( 153 FakeSecurityKeyIpcClient fake_ipc_client(base::Bind(
157 base::Bind(&RemoteSecurityKeyIpcServerTest::OperationComplete, 154 &SecurityKeyIpcServerTest::OperationComplete, base::Unretained(this)));
158 base::Unretained(this)));
159 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name)); 155 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name));
160 WaitForOperationComplete(); 156 WaitForOperationComplete();
161 157
162 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected()); 158 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected());
163 159
164 // Send a request from the IPC client to the IPC server. 160 // Send a request from the IPC client to the IPC server.
165 std::string request_data(kLargeMessageSizeBytes, 'Y'); 161 std::string request_data(kLargeMessageSizeBytes, 'Y');
166 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data); 162 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data);
167 WaitForOperationComplete(); 163 WaitForOperationComplete();
168 164
169 // Verify the request was received. 165 // Verify the request was received.
170 ASSERT_EQ(kTestConnectionId, last_connection_id_received_); 166 ASSERT_EQ(kTestConnectionId, last_connection_id_received_);
171 ASSERT_EQ(request_data, last_message_received_); 167 ASSERT_EQ(request_data, last_message_received_);
172 168
173 // Send a response from the IPC server to the IPC client. 169 // Send a response from the IPC server to the IPC client.
174 std::string response_data(kLargeMessageSizeBytes, 'Z'); 170 std::string response_data(kLargeMessageSizeBytes, 'Z');
175 ASSERT_TRUE(remote_security_key_ipc_server_->SendResponse(response_data)); 171 ASSERT_TRUE(security_key_ipc_server_->SendResponse(response_data));
176 WaitForOperationComplete(); 172 WaitForOperationComplete();
177 173
178 // Verify the request was received. 174 // Verify the request was received.
179 ASSERT_EQ(response_data, fake_ipc_client.last_message_received()); 175 ASSERT_EQ(response_data, fake_ipc_client.last_message_received());
180 176
181 // Typically the client will be the one to close the connection. 177 // Typically the client will be the one to close the connection.
182 fake_ipc_client.CloseIpcConnection(); 178 fake_ipc_client.CloseIpcConnection();
183 } 179 }
184 180
185 TEST_F(RemoteSecurityKeyIpcServerTest, HandleReallyLargeGnubbyRequest) { 181 TEST_F(SecurityKeyIpcServerTest, HandleReallyLargeSecurityKeyRequest) {
186 std::string channel_name(GetUniqueTestChannelName()); 182 std::string channel_name(GetUniqueTestChannelName());
187 ASSERT_TRUE(remote_security_key_ipc_server_->CreateChannel( 183 ASSERT_TRUE(security_key_ipc_server_->CreateChannel(
188 channel_name, 184 channel_name,
189 /*request_timeout=*/base::TimeDelta::FromMilliseconds(500))); 185 /*request_timeout=*/base::TimeDelta::FromMilliseconds(500)));
190 186
191 // Create a fake client and connect to the IPC server channel. 187 // Create a fake client and connect to the IPC server channel.
192 FakeRemoteSecurityKeyIpcClient fake_ipc_client( 188 FakeSecurityKeyIpcClient fake_ipc_client(base::Bind(
193 base::Bind(&RemoteSecurityKeyIpcServerTest::OperationComplete, 189 &SecurityKeyIpcServerTest::OperationComplete, base::Unretained(this)));
194 base::Unretained(this)));
195 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name)); 190 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name));
196 WaitForOperationComplete(); 191 WaitForOperationComplete();
197 192
198 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected()); 193 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected());
199 194
200 // Send a request from the IPC client to the IPC server. 195 // Send a request from the IPC client to the IPC server.
201 std::string request_data(kLargeMessageSizeBytes * 2, 'Y'); 196 std::string request_data(kLargeMessageSizeBytes * 2, 'Y');
202 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data); 197 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data);
203 WaitForOperationComplete(); 198 WaitForOperationComplete();
204 199
205 // Verify the request was received. 200 // Verify the request was received.
206 ASSERT_EQ(kTestConnectionId, last_connection_id_received_); 201 ASSERT_EQ(kTestConnectionId, last_connection_id_received_);
207 ASSERT_EQ(request_data, last_message_received_); 202 ASSERT_EQ(request_data, last_message_received_);
208 203
209 // Send a response from the IPC server to the IPC client. 204 // Send a response from the IPC server to the IPC client.
210 std::string response_data(kLargeMessageSizeBytes * 2, 'Z'); 205 std::string response_data(kLargeMessageSizeBytes * 2, 'Z');
211 ASSERT_TRUE(remote_security_key_ipc_server_->SendResponse(response_data)); 206 ASSERT_TRUE(security_key_ipc_server_->SendResponse(response_data));
212 WaitForOperationComplete(); 207 WaitForOperationComplete();
213 208
214 // Verify the request was received. 209 // Verify the request was received.
215 ASSERT_EQ(response_data, fake_ipc_client.last_message_received()); 210 ASSERT_EQ(response_data, fake_ipc_client.last_message_received());
216 211
217 // Typically the client will be the one to close the connection. 212 // Typically the client will be the one to close the connection.
218 fake_ipc_client.CloseIpcConnection(); 213 fake_ipc_client.CloseIpcConnection();
219 } 214 }
220 215
221 TEST_F(RemoteSecurityKeyIpcServerTest, HandleMultipleGnubbyRequests) { 216 TEST_F(SecurityKeyIpcServerTest, HandleMultipleSecurityKeyRequests) {
222 std::string channel_name(GetUniqueTestChannelName()); 217 std::string channel_name(GetUniqueTestChannelName());
223 ASSERT_TRUE(remote_security_key_ipc_server_->CreateChannel( 218 ASSERT_TRUE(security_key_ipc_server_->CreateChannel(
224 channel_name, 219 channel_name,
225 /*request_timeout=*/base::TimeDelta::FromMilliseconds(500))); 220 /*request_timeout=*/base::TimeDelta::FromMilliseconds(500)));
226 221
227 // Create a fake client and connect to the IPC server channel. 222 // Create a fake client and connect to the IPC server channel.
228 FakeRemoteSecurityKeyIpcClient fake_ipc_client( 223 FakeSecurityKeyIpcClient fake_ipc_client(base::Bind(
229 base::Bind(&RemoteSecurityKeyIpcServerTest::OperationComplete, 224 &SecurityKeyIpcServerTest::OperationComplete, base::Unretained(this)));
230 base::Unretained(this)));
231 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name)); 225 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name));
232 WaitForOperationComplete(); 226 WaitForOperationComplete();
233 227
234 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected()); 228 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected());
235 229
236 // Send a request from the IPC client to the IPC server. 230 // Send a request from the IPC client to the IPC server.
237 std::string request_data_1("Blergh!"); 231 std::string request_data_1("Blergh!");
238 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data_1); 232 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data_1);
239 WaitForOperationComplete(); 233 WaitForOperationComplete();
240 234
241 // Verify the request was received. 235 // Verify the request was received.
242 ASSERT_EQ(kTestConnectionId, last_connection_id_received_); 236 ASSERT_EQ(kTestConnectionId, last_connection_id_received_);
243 ASSERT_EQ(request_data_1, last_message_received_); 237 ASSERT_EQ(request_data_1, last_message_received_);
244 238
245 // Send a response from the IPC server to the IPC client. 239 // Send a response from the IPC server to the IPC client.
246 std::string response_data_1("Blargh!"); 240 std::string response_data_1("Blargh!");
247 ASSERT_TRUE(remote_security_key_ipc_server_->SendResponse(response_data_1)); 241 ASSERT_TRUE(security_key_ipc_server_->SendResponse(response_data_1));
248 WaitForOperationComplete(); 242 WaitForOperationComplete();
249 243
250 // Verify the response was received. 244 // Verify the response was received.
251 ASSERT_EQ(response_data_1, fake_ipc_client.last_message_received()); 245 ASSERT_EQ(response_data_1, fake_ipc_client.last_message_received());
252 246
253 // Send a request from the IPC client to the IPC server. 247 // Send a request from the IPC client to the IPC server.
254 std::string request_data_2("Bleh!"); 248 std::string request_data_2("Bleh!");
255 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data_2); 249 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data_2);
256 WaitForOperationComplete(); 250 WaitForOperationComplete();
257 251
258 // Verify the request was received. 252 // Verify the request was received.
259 ASSERT_EQ(kTestConnectionId, last_connection_id_received_); 253 ASSERT_EQ(kTestConnectionId, last_connection_id_received_);
260 ASSERT_EQ(request_data_2, last_message_received_); 254 ASSERT_EQ(request_data_2, last_message_received_);
261 255
262 // Send a response from the IPC server to the IPC client. 256 // Send a response from the IPC server to the IPC client.
263 std::string response_data_2("Meh!"); 257 std::string response_data_2("Meh!");
264 ASSERT_TRUE(remote_security_key_ipc_server_->SendResponse(response_data_2)); 258 ASSERT_TRUE(security_key_ipc_server_->SendResponse(response_data_2));
265 WaitForOperationComplete(); 259 WaitForOperationComplete();
266 260
267 // Verify the response was received. 261 // Verify the response was received.
268 ASSERT_EQ(response_data_2, fake_ipc_client.last_message_received()); 262 ASSERT_EQ(response_data_2, fake_ipc_client.last_message_received());
269 263
270 // Typically the client will be the one to close the connection. 264 // Typically the client will be the one to close the connection.
271 fake_ipc_client.CloseIpcConnection(); 265 fake_ipc_client.CloseIpcConnection();
272 } 266 }
273 267
274 TEST_F(RemoteSecurityKeyIpcServerTest, InitialIpcConnectionTimeout) { 268 TEST_F(SecurityKeyIpcServerTest, InitialIpcConnectionTimeout) {
275 // Create a channel, then wait for the done callback to be called indicating 269 // Create a channel, then wait for the done callback to be called indicating
276 // the connection was closed. This test simulates the IPC Server being 270 // the connection was closed. This test simulates the IPC Server being
277 // created but the client failing to connect to it. 271 // created but the client failing to connect to it.
278 std::string channel_name(GetUniqueTestChannelName()); 272 std::string channel_name(GetUniqueTestChannelName());
279 ASSERT_TRUE(remote_security_key_ipc_server_->CreateChannel( 273 ASSERT_TRUE(security_key_ipc_server_->CreateChannel(
280 channel_name, 274 channel_name,
281 /*request_timeout=*/base::TimeDelta::FromMilliseconds(500))); 275 /*request_timeout=*/base::TimeDelta::FromMilliseconds(500)));
282 base::Time start_time(base::Time::NowFromSystemTime()); 276 base::Time start_time(base::Time::NowFromSystemTime());
283 WaitForOperationComplete(); 277 WaitForOperationComplete();
284 base::TimeDelta elapsed_time = base::Time::NowFromSystemTime() - start_time; 278 base::TimeDelta elapsed_time = base::Time::NowFromSystemTime() - start_time;
285 279
286 ASSERT_NEAR(elapsed_time.InMilliseconds(), kInitialConnectTimeoutMs, 280 ASSERT_NEAR(elapsed_time.InMilliseconds(), kInitialConnectTimeoutMs,
287 kConnectionTimeoutErrorDeltaMs); 281 kConnectionTimeoutErrorDeltaMs);
288 } 282 }
289 283
290 TEST_F(RemoteSecurityKeyIpcServerTest, NoGnubbyRequestTimeout) { 284 TEST_F(SecurityKeyIpcServerTest, NoSecurityKeyRequestTimeout) {
291 // Create a channel and connect to it via IPC but do not send a request. 285 // Create a channel and connect to it via IPC but do not send a request.
292 // The channel should be closed and cleaned up if the IPC client does not 286 // The channel should be closed and cleaned up if the IPC client does not
293 // issue a request within the specified timeout period. 287 // issue a request within the specified timeout period.
294 std::string channel_name(GetUniqueTestChannelName()); 288 std::string channel_name(GetUniqueTestChannelName());
295 ASSERT_TRUE(remote_security_key_ipc_server_->CreateChannel( 289 ASSERT_TRUE(security_key_ipc_server_->CreateChannel(
296 channel_name, 290 channel_name,
297 /*request_timeout=*/base::TimeDelta::FromMilliseconds(500))); 291 /*request_timeout=*/base::TimeDelta::FromMilliseconds(500)));
298 292
299 // Create a fake client and connect to the IPC server channel. 293 // Create a fake client and connect to the IPC server channel.
300 FakeRemoteSecurityKeyIpcClient fake_ipc_client( 294 FakeSecurityKeyIpcClient fake_ipc_client(base::Bind(
301 base::Bind(&RemoteSecurityKeyIpcServerTest::OperationComplete, 295 &SecurityKeyIpcServerTest::OperationComplete, base::Unretained(this)));
302 base::Unretained(this)));
303 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name)); 296 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name));
304 WaitForOperationComplete(); 297 WaitForOperationComplete();
305 298
306 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected()); 299 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected());
307 300
308 // Now that a connection has been established, we wait for the timeout. 301 // Now that a connection has been established, we wait for the timeout.
309 base::Time start_time(base::Time::NowFromSystemTime()); 302 base::Time start_time(base::Time::NowFromSystemTime());
310 WaitForOperationComplete(); 303 WaitForOperationComplete();
311 base::TimeDelta elapsed_time = base::Time::NowFromSystemTime() - start_time; 304 base::TimeDelta elapsed_time = base::Time::NowFromSystemTime() - start_time;
312 305
313 ASSERT_NEAR(elapsed_time.InMilliseconds(), kInitialConnectTimeoutMs, 306 ASSERT_NEAR(elapsed_time.InMilliseconds(), kInitialConnectTimeoutMs,
314 kConnectionTimeoutErrorDeltaMs); 307 kConnectionTimeoutErrorDeltaMs);
315 } 308 }
316 309
317 TEST_F(RemoteSecurityKeyIpcServerTest, GnubbyResponseTimeout) { 310 TEST_F(SecurityKeyIpcServerTest, SecurityKeyResponseTimeout) {
318 // Create a channel, connect to it via IPC, and issue a request, but do 311 // Create a channel, connect to it via IPC, and issue a request, but do
319 // not send a response. This simulates a client-side timeout. 312 // not send a response. This simulates a client-side timeout.
320 base::TimeDelta request_timeout(base::TimeDelta::FromMilliseconds(50)); 313 base::TimeDelta request_timeout(base::TimeDelta::FromMilliseconds(50));
321 std::string channel_name(GetUniqueTestChannelName()); 314 std::string channel_name(GetUniqueTestChannelName());
322 ASSERT_TRUE(remote_security_key_ipc_server_->CreateChannel(channel_name, 315 ASSERT_TRUE(
323 request_timeout)); 316 security_key_ipc_server_->CreateChannel(channel_name, request_timeout));
324 317
325 // Create a fake client and connect to the IPC server channel. 318 // Create a fake client and connect to the IPC server channel.
326 FakeRemoteSecurityKeyIpcClient fake_ipc_client( 319 FakeSecurityKeyIpcClient fake_ipc_client(base::Bind(
327 base::Bind(&RemoteSecurityKeyIpcServerTest::OperationComplete, 320 &SecurityKeyIpcServerTest::OperationComplete, base::Unretained(this)));
328 base::Unretained(this)));
329 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name)); 321 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name));
330 WaitForOperationComplete(); 322 WaitForOperationComplete();
331 323
332 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected()); 324 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected());
333 325
334 // Now that a connection has been established, we issue a request and 326 // Now that a connection has been established, we issue a request and
335 // then wait for the timeout. 327 // then wait for the timeout.
336 std::string request_data("I can haz Auth?"); 328 std::string request_data("I can haz Auth?");
337 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data); 329 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data);
338 WaitForOperationComplete(); 330 WaitForOperationComplete();
339 331
340 // Leave the request hanging until it times out... 332 // Leave the request hanging until it times out...
341 base::Time start_time(base::Time::NowFromSystemTime()); 333 base::Time start_time(base::Time::NowFromSystemTime());
342 WaitForOperationComplete(); 334 WaitForOperationComplete();
343 base::TimeDelta elapsed_time = base::Time::NowFromSystemTime() - start_time; 335 base::TimeDelta elapsed_time = base::Time::NowFromSystemTime() - start_time;
344 336
345 ASSERT_NEAR(elapsed_time.InMilliseconds(), request_timeout.InMilliseconds(), 337 ASSERT_NEAR(elapsed_time.InMilliseconds(), request_timeout.InMilliseconds(),
346 kConnectionTimeoutErrorDeltaMs); 338 kConnectionTimeoutErrorDeltaMs);
347 } 339 }
348 340
349 TEST_F(RemoteSecurityKeyIpcServerTest, SendResponseTimeout) { 341 TEST_F(SecurityKeyIpcServerTest, SendResponseTimeout) {
350 // Create a channel, connect to it via IPC, issue a request, and send 342 // Create a channel, connect to it via IPC, issue a request, and send
351 // a response, but do not close the channel after that. The connection 343 // a response, but do not close the channel after that. The connection
352 // should be terminated after the initial timeout period has elapsed. 344 // should be terminated after the initial timeout period has elapsed.
353 base::TimeDelta request_timeout(base::TimeDelta::FromMilliseconds(500)); 345 base::TimeDelta request_timeout(base::TimeDelta::FromMilliseconds(500));
354 std::string channel_name(GetUniqueTestChannelName()); 346 std::string channel_name(GetUniqueTestChannelName());
355 ASSERT_TRUE(remote_security_key_ipc_server_->CreateChannel( 347 ASSERT_TRUE(
356 channel_name, request_timeout)); 348 security_key_ipc_server_->CreateChannel(channel_name, request_timeout));
357 349
358 // Create a fake client and connect to the IPC server channel. 350 // Create a fake client and connect to the IPC server channel.
359 FakeRemoteSecurityKeyIpcClient fake_ipc_client( 351 FakeSecurityKeyIpcClient fake_ipc_client(base::Bind(
360 base::Bind(&RemoteSecurityKeyIpcServerTest::OperationComplete, 352 &SecurityKeyIpcServerTest::OperationComplete, base::Unretained(this)));
361 base::Unretained(this)));
362 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name)); 353 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name));
363 WaitForOperationComplete(); 354 WaitForOperationComplete();
364 355
365 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected()); 356 ASSERT_TRUE(fake_ipc_client.ipc_channel_connected());
366 357
367 // Issue a request. 358 // Issue a request.
368 std::string request_data("Auth me yo!"); 359 std::string request_data("Auth me yo!");
369 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data); 360 fake_ipc_client.SendSecurityKeyRequestViaIpc(request_data);
370 WaitForOperationComplete(); 361 WaitForOperationComplete();
371 362
372 // Send a response from the IPC server to the IPC client. 363 // Send a response from the IPC server to the IPC client.
373 std::string response_data("OK, the secret code is 1-2-3-4-5"); 364 std::string response_data("OK, the secret code is 1-2-3-4-5");
374 ASSERT_TRUE(remote_security_key_ipc_server_->SendResponse(response_data)); 365 ASSERT_TRUE(security_key_ipc_server_->SendResponse(response_data));
375 WaitForOperationComplete(); 366 WaitForOperationComplete();
376 367
377 // Now wait for the timeout period for the connection to be torn down. 368 // Now wait for the timeout period for the connection to be torn down.
378 base::Time start_time(base::Time::NowFromSystemTime()); 369 base::Time start_time(base::Time::NowFromSystemTime());
379 WaitForOperationComplete(); 370 WaitForOperationComplete();
380 base::TimeDelta elapsed_time = base::Time::NowFromSystemTime() - start_time; 371 base::TimeDelta elapsed_time = base::Time::NowFromSystemTime() - start_time;
381 372
382 ASSERT_NEAR(elapsed_time.InMilliseconds(), request_timeout.InMilliseconds(), 373 ASSERT_NEAR(elapsed_time.InMilliseconds(), request_timeout.InMilliseconds(),
383 kConnectionTimeoutErrorDeltaMs); 374 kConnectionTimeoutErrorDeltaMs);
384 } 375 }
385 376
386 #if defined(OS_WIN) 377 #if defined(OS_WIN)
387 TEST_F(RemoteSecurityKeyIpcServerTest, IpcConnectionFailsFromInvalidSession) { 378 TEST_F(SecurityKeyIpcServerTest, IpcConnectionFailsFromInvalidSession) {
388 uint32_t peer_session_id = UINT32_MAX; 379 uint32_t peer_session_id = UINT32_MAX;
389 ASSERT_TRUE(ProcessIdToSessionId(GetCurrentProcessId(), 380 ASSERT_TRUE(ProcessIdToSessionId(GetCurrentProcessId(),
390 reinterpret_cast<DWORD*>(&peer_session_id))); 381 reinterpret_cast<DWORD*>(&peer_session_id)));
391 peer_session_id++; 382 peer_session_id++;
392 383
393 // Reinitialize the object under test. 384 // Reinitialize the object under test.
394 remote_security_key_ipc_server_ = 385 security_key_ipc_server_ = remoting::SecurityKeyIpcServer::Create(
395 remoting::RemoteSecurityKeyIpcServer::Create( 386 kTestConnectionId, peer_session_id,
396 kTestConnectionId, peer_session_id, 387 base::TimeDelta::FromMilliseconds(kInitialConnectTimeoutMs),
397 base::TimeDelta::FromMilliseconds(kInitialConnectTimeoutMs), 388 base::Bind(&SecurityKeyIpcServerTest::SendRequestToClient,
398 base::Bind(&RemoteSecurityKeyIpcServerTest::SendRequestToClient, 389 base::Unretained(this)),
399 base::Unretained(this)), 390 base::Bind(&base::DoNothing));
400 base::Bind(&base::DoNothing));
401 391
402 base::TimeDelta request_timeout(base::TimeDelta::FromMilliseconds(500)); 392 base::TimeDelta request_timeout(base::TimeDelta::FromMilliseconds(500));
403 std::string channel_name(GetUniqueTestChannelName()); 393 std::string channel_name(GetUniqueTestChannelName());
404 ASSERT_TRUE(remote_security_key_ipc_server_->CreateChannel(channel_name, 394 ASSERT_TRUE(
405 request_timeout)); 395 security_key_ipc_server_->CreateChannel(channel_name, request_timeout));
406 396
407 // Create a fake client and attempt to connect to the IPC server channel. 397 // Create a fake client and attempt to connect to the IPC server channel.
408 FakeRemoteSecurityKeyIpcClient fake_ipc_client( 398 FakeSecurityKeyIpcClient fake_ipc_client(base::Bind(
409 base::Bind(&RemoteSecurityKeyIpcServerTest::OperationComplete, 399 &SecurityKeyIpcServerTest::OperationComplete, base::Unretained(this)));
410 base::Unretained(this)));
411 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name)); 400 ASSERT_TRUE(fake_ipc_client.ConnectViaIpc(channel_name));
412 WaitForOperationComplete(); 401 WaitForOperationComplete();
413 WaitForOperationComplete(); 402 WaitForOperationComplete();
414 403
415 // Verify the connection failed. 404 // Verify the connection failed.
416 ASSERT_FALSE(fake_ipc_client.ipc_channel_connected()); 405 ASSERT_FALSE(fake_ipc_client.ipc_channel_connected());
417 } 406 }
418 #endif // defined(OS_WIN) 407 #endif // defined(OS_WIN)
419 408
420 } // namespace remoting 409 } // namespace remoting
OLDNEW
« no previous file with comments | « remoting/host/security_key/security_key_ipc_server_impl.cc ('k') | remoting/host/security_key/security_key_message.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698