| OLD | NEW |
| (Empty) |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "remoting/host/security_key/remote_security_key_ipc_client.h" | |
| 6 | |
| 7 #include <memory> | |
| 8 #include <string> | |
| 9 | |
| 10 #include "base/bind.h" | |
| 11 #include "base/macros.h" | |
| 12 #include "base/message_loop/message_loop.h" | |
| 13 #include "base/run_loop.h" | |
| 14 #include "ipc/ipc_channel.h" | |
| 15 #include "remoting/host/security_key/fake_ipc_gnubby_auth_handler.h" | |
| 16 #include "remoting/host/security_key/fake_remote_security_key_ipc_server.h" | |
| 17 #include "remoting/host/security_key/remote_security_key_ipc_constants.h" | |
| 18 #include "testing/gtest/include/gtest/gtest.h" | |
| 19 | |
| 20 namespace { | |
| 21 const int kTestConnectionId = 1; | |
| 22 const char kNonexistentIpcChannelName[] = "Nonexistent_IPC_Channel"; | |
| 23 const char kValidIpcChannelName[] = | |
| 24 "Remote_Security_Key_Ipc_Client_Test_Channel."; | |
| 25 const int kLargeMessageSizeBytes = 256 * 1024; | |
| 26 } // namespace | |
| 27 | |
| 28 namespace remoting { | |
| 29 | |
| 30 class RemoteSecurityKeyIpcClientTest : public testing::Test { | |
| 31 public: | |
| 32 RemoteSecurityKeyIpcClientTest(); | |
| 33 ~RemoteSecurityKeyIpcClientTest() override; | |
| 34 | |
| 35 // Passed to the object used for testing to be called back to signal | |
| 36 // completion of an IPC channel state change or reception of an IPC message. | |
| 37 void OperationComplete(bool failed); | |
| 38 | |
| 39 // Used as a callback given to the object under test, expected to be called | |
| 40 // back when a security key request is received by it. | |
| 41 void SendMessageToClient(int connection_id, const std::string& data); | |
| 42 | |
| 43 // Used as a callback given to the object under test, expected to be called | |
| 44 // back when a security key response is sent. | |
| 45 void ClientMessageReceived(const std::string& response_payload); | |
| 46 | |
| 47 protected: | |
| 48 // testing::Test interface. | |
| 49 void SetUp() override; | |
| 50 | |
| 51 // Waits until the current |run_loop_| instance is signaled, then resets it. | |
| 52 void WaitForOperationComplete(); | |
| 53 | |
| 54 // Sets up an active IPC connection between |remote_security_key_ipc_client_| | |
| 55 // and |fake_ipc_server_|. |expect_success| defines whether the operation | |
| 56 // is expected to succeed or fail. | |
| 57 void EstablishConnection(bool expect_success); | |
| 58 | |
| 59 // Sends a security key request from |remote_security_key_ipc_client_| and | |
| 60 // a response from |fake_ipc_server_| and verifies the payloads for both. | |
| 61 void SendRequestAndResponse(const std::string& request_data, | |
| 62 const std::string& response_data); | |
| 63 | |
| 64 // Creates a unique IPC channel name to use for testing. | |
| 65 std::string GenerateUniqueTestChannelName(); | |
| 66 | |
| 67 // IPC tests require a valid MessageLoop to run. | |
| 68 base::MessageLoopForIO message_loop_; | |
| 69 | |
| 70 // Used to allow |message_loop_| to run during tests. The instance is reset | |
| 71 // after each stage of the tests has been completed. | |
| 72 std::unique_ptr<base::RunLoop> run_loop_; | |
| 73 | |
| 74 // The object under test. | |
| 75 RemoteSecurityKeyIpcClient remote_security_key_ipc_client_; | |
| 76 | |
| 77 // Provides a connection details message to |remote_security_key_ipc_client_| | |
| 78 // for testing. | |
| 79 FakeIpcGnubbyAuthHandler fake_gnubby_auth_handler_; | |
| 80 | |
| 81 // Used to send/receive security key IPC messages for testing. | |
| 82 FakeRemoteSecurityKeyIpcServer fake_ipc_server_; | |
| 83 | |
| 84 // Stores the current session ID on supported platforms. | |
| 85 uint32_t session_id_ = 0; | |
| 86 | |
| 87 // Tracks the success/failure of the last async operation. | |
| 88 bool operation_failed_ = false; | |
| 89 | |
| 90 // Used to validate the object under test uses the correct ID when | |
| 91 // communicating over the IPC channel. | |
| 92 int last_connection_id_received_ = -1; | |
| 93 | |
| 94 // Stores the contents of the last IPC message received for validation. | |
| 95 std::string last_message_received_; | |
| 96 | |
| 97 private: | |
| 98 DISALLOW_COPY_AND_ASSIGN(RemoteSecurityKeyIpcClientTest); | |
| 99 }; | |
| 100 | |
| 101 RemoteSecurityKeyIpcClientTest::RemoteSecurityKeyIpcClientTest() | |
| 102 : run_loop_(new base::RunLoop()), | |
| 103 fake_ipc_server_( | |
| 104 kTestConnectionId, | |
| 105 /*peer_session_id=*/UINT32_MAX, | |
| 106 /*initial_connect_timeout=*/base::TimeDelta::FromMilliseconds(500), | |
| 107 base::Bind(&RemoteSecurityKeyIpcClientTest::SendMessageToClient, | |
| 108 base::Unretained(this)), | |
| 109 base::Bind(&RemoteSecurityKeyIpcClientTest::OperationComplete, | |
| 110 base::Unretained(this), | |
| 111 /*failed=*/false)) {} | |
| 112 | |
| 113 RemoteSecurityKeyIpcClientTest::~RemoteSecurityKeyIpcClientTest() {} | |
| 114 | |
| 115 void RemoteSecurityKeyIpcClientTest::SetUp() { | |
| 116 #if defined(OS_WIN) | |
| 117 DWORD session_id = 0; | |
| 118 // If we are on Windows, then we need to set the correct session ID or the | |
| 119 // IPC connection will not be created successfully. | |
| 120 ASSERT_TRUE(ProcessIdToSessionId(GetCurrentProcessId(), &session_id)); | |
| 121 session_id_ = session_id; | |
| 122 remote_security_key_ipc_client_.SetExpectedIpcServerSessionIdForTest( | |
| 123 session_id_); | |
| 124 #endif // defined(OS_WIN) | |
| 125 } | |
| 126 | |
| 127 void RemoteSecurityKeyIpcClientTest::OperationComplete(bool failed) { | |
| 128 operation_failed_ |= failed; | |
| 129 run_loop_->Quit(); | |
| 130 } | |
| 131 | |
| 132 void RemoteSecurityKeyIpcClientTest::WaitForOperationComplete() { | |
| 133 run_loop_->Run(); | |
| 134 run_loop_.reset(new base::RunLoop()); | |
| 135 } | |
| 136 | |
| 137 void RemoteSecurityKeyIpcClientTest::SendMessageToClient( | |
| 138 int connection_id, | |
| 139 const std::string& data) { | |
| 140 last_connection_id_received_ = connection_id; | |
| 141 last_message_received_ = data; | |
| 142 OperationComplete(/*failed=*/false); | |
| 143 } | |
| 144 | |
| 145 void RemoteSecurityKeyIpcClientTest::ClientMessageReceived( | |
| 146 const std::string& response_payload) { | |
| 147 last_message_received_ = response_payload; | |
| 148 OperationComplete(/*failed=*/false); | |
| 149 } | |
| 150 | |
| 151 std::string RemoteSecurityKeyIpcClientTest::GenerateUniqueTestChannelName() { | |
| 152 return GetChannelNamePathPrefixForTest() + kValidIpcChannelName + | |
| 153 IPC::Channel::GenerateUniqueRandomChannelID(); | |
| 154 } | |
| 155 | |
| 156 void RemoteSecurityKeyIpcClientTest::EstablishConnection(bool expect_success) { | |
| 157 // Start up the security key forwarding session IPC channel first, that way | |
| 158 // we can provide the channel using the fake GnubbyAuthHandler later on. | |
| 159 std::string ipc_session_channel_name = GenerateUniqueTestChannelName(); | |
| 160 ASSERT_TRUE(fake_ipc_server_.CreateChannel( | |
| 161 ipc_session_channel_name, | |
| 162 /*request_timeout=*/base::TimeDelta::FromMilliseconds(500))); | |
| 163 ASSERT_TRUE(IPC::Channel::IsNamedServerInitialized(ipc_session_channel_name)); | |
| 164 fake_gnubby_auth_handler_.set_ipc_security_key_channel_name( | |
| 165 ipc_session_channel_name); | |
| 166 | |
| 167 // Set up the channel name for the initial IPC channel. | |
| 168 std::string ipc_server_channel_name = GenerateUniqueTestChannelName(); | |
| 169 fake_gnubby_auth_handler_.set_ipc_server_channel_name( | |
| 170 ipc_server_channel_name); | |
| 171 remote_security_key_ipc_client_.SetInitialIpcChannelNameForTest( | |
| 172 ipc_server_channel_name); | |
| 173 | |
| 174 // Create the initial IPC channel and verify it was set up correctly. | |
| 175 ASSERT_FALSE( | |
| 176 remote_security_key_ipc_client_.WaitForSecurityKeyIpcServerChannel()); | |
| 177 fake_gnubby_auth_handler_.CreateGnubbyConnection(); | |
| 178 ASSERT_TRUE(IPC::Channel::IsNamedServerInitialized(ipc_server_channel_name)); | |
| 179 ASSERT_TRUE( | |
| 180 remote_security_key_ipc_client_.WaitForSecurityKeyIpcServerChannel()); | |
| 181 | |
| 182 // Establish the IPC channel so we can begin sending and receiving security | |
| 183 // key messages. | |
| 184 remote_security_key_ipc_client_.EstablishIpcConnection( | |
| 185 base::Bind(&RemoteSecurityKeyIpcClientTest::OperationComplete, | |
| 186 base::Unretained(this), /*failed=*/false), | |
| 187 base::Bind(&RemoteSecurityKeyIpcClientTest::OperationComplete, | |
| 188 base::Unretained(this), /*failed=*/true)); | |
| 189 WaitForOperationComplete(); | |
| 190 ASSERT_NE(operation_failed_, expect_success); | |
| 191 } | |
| 192 | |
| 193 void RemoteSecurityKeyIpcClientTest::SendRequestAndResponse( | |
| 194 const std::string& request_data, | |
| 195 const std::string& response_data) { | |
| 196 ASSERT_TRUE(remote_security_key_ipc_client_.SendSecurityKeyRequest( | |
| 197 request_data, | |
| 198 base::Bind(&RemoteSecurityKeyIpcClientTest::ClientMessageReceived, | |
| 199 base::Unretained(this)))); | |
| 200 WaitForOperationComplete(); | |
| 201 ASSERT_FALSE(operation_failed_); | |
| 202 ASSERT_EQ(last_connection_id_received_, kTestConnectionId); | |
| 203 ASSERT_EQ(last_message_received_, request_data); | |
| 204 | |
| 205 ASSERT_TRUE(fake_ipc_server_.SendResponse(response_data)); | |
| 206 WaitForOperationComplete(); | |
| 207 ASSERT_FALSE(operation_failed_); | |
| 208 ASSERT_EQ(last_message_received_, response_data); | |
| 209 } | |
| 210 | |
| 211 TEST_F(RemoteSecurityKeyIpcClientTest, GenerateSingleGnubbyRequest) { | |
| 212 EstablishConnection(/*expect_success=*/true); | |
| 213 | |
| 214 SendRequestAndResponse("Auth me!", "You've been authed!"); | |
| 215 | |
| 216 remote_security_key_ipc_client_.CloseIpcConnection(); | |
| 217 } | |
| 218 | |
| 219 TEST_F(RemoteSecurityKeyIpcClientTest, GenerateLargeGnubbyRequest) { | |
| 220 EstablishConnection(/*expect_success=*/true); | |
| 221 | |
| 222 SendRequestAndResponse(std::string(kLargeMessageSizeBytes, 'Y'), | |
| 223 std::string(kLargeMessageSizeBytes, 'Z')); | |
| 224 | |
| 225 remote_security_key_ipc_client_.CloseIpcConnection(); | |
| 226 } | |
| 227 | |
| 228 TEST_F(RemoteSecurityKeyIpcClientTest, GenerateReallyLargeGnubbyRequest) { | |
| 229 EstablishConnection(/*expect_success=*/true); | |
| 230 | |
| 231 SendRequestAndResponse(std::string(kLargeMessageSizeBytes * 2, 'Y'), | |
| 232 std::string(kLargeMessageSizeBytes * 2, 'Z')); | |
| 233 | |
| 234 remote_security_key_ipc_client_.CloseIpcConnection(); | |
| 235 } | |
| 236 | |
| 237 TEST_F(RemoteSecurityKeyIpcClientTest, GenerateMultipleGnubbyRequest) { | |
| 238 EstablishConnection(/*expect_success=*/true); | |
| 239 | |
| 240 SendRequestAndResponse("Auth me 1!", "You've been authed once!"); | |
| 241 SendRequestAndResponse("Auth me 2!", "You've been authed twice!"); | |
| 242 SendRequestAndResponse("Auth me 3!", "You've been authed thrice!"); | |
| 243 | |
| 244 remote_security_key_ipc_client_.CloseIpcConnection(); | |
| 245 } | |
| 246 | |
| 247 TEST_F(RemoteSecurityKeyIpcClientTest, | |
| 248 ServerClosesConnectionAfterRequestTimeout) { | |
| 249 EstablishConnection(/*expect_success=*/true); | |
| 250 fake_ipc_server_.CloseChannel(); | |
| 251 WaitForOperationComplete(); | |
| 252 ASSERT_FALSE(operation_failed_); | |
| 253 } | |
| 254 | |
| 255 TEST_F(RemoteSecurityKeyIpcClientTest, | |
| 256 SecondGnubbyRequestBeforeFirstResponseReceived) { | |
| 257 EstablishConnection(/*expect_success=*/true); | |
| 258 | |
| 259 ASSERT_TRUE(remote_security_key_ipc_client_.SendSecurityKeyRequest( | |
| 260 "First Request", | |
| 261 base::Bind(&RemoteSecurityKeyIpcClientTest::ClientMessageReceived, | |
| 262 base::Unretained(this)))); | |
| 263 WaitForOperationComplete(); | |
| 264 ASSERT_FALSE(operation_failed_); | |
| 265 | |
| 266 ASSERT_FALSE(remote_security_key_ipc_client_.SendSecurityKeyRequest( | |
| 267 "Second Request", | |
| 268 base::Bind(&RemoteSecurityKeyIpcClientTest::ClientMessageReceived, | |
| 269 base::Unretained(this)))); | |
| 270 } | |
| 271 | |
| 272 TEST_F(RemoteSecurityKeyIpcClientTest, ReceiveGnubbyResponseWithEmptyPayload) { | |
| 273 EstablishConnection(/*expect_success=*/true); | |
| 274 | |
| 275 ASSERT_TRUE(remote_security_key_ipc_client_.SendSecurityKeyRequest( | |
| 276 "Valid request", | |
| 277 base::Bind(&RemoteSecurityKeyIpcClientTest::ClientMessageReceived, | |
| 278 base::Unretained(this)))); | |
| 279 WaitForOperationComplete(); | |
| 280 ASSERT_FALSE(operation_failed_); | |
| 281 | |
| 282 ASSERT_TRUE(fake_ipc_server_.SendResponse("")); | |
| 283 WaitForOperationComplete(); | |
| 284 ASSERT_TRUE(operation_failed_); | |
| 285 } | |
| 286 | |
| 287 TEST_F(RemoteSecurityKeyIpcClientTest, | |
| 288 SendRequestBeforeEstablishingConnection) { | |
| 289 // Sending a request will fail since the IPC connection has not been | |
| 290 // established. | |
| 291 ASSERT_FALSE(remote_security_key_ipc_client_.SendSecurityKeyRequest( | |
| 292 "Too soon!!", | |
| 293 base::Bind(&RemoteSecurityKeyIpcClientTest::ClientMessageReceived, | |
| 294 base::Unretained(this)))); | |
| 295 } | |
| 296 | |
| 297 TEST_F(RemoteSecurityKeyIpcClientTest, NonExistentMainIpcServerChannel) { | |
| 298 std::string ipc_server_channel_name(kNonexistentIpcChannelName); | |
| 299 remote_security_key_ipc_client_.SetInitialIpcChannelNameForTest( | |
| 300 ipc_server_channel_name); | |
| 301 | |
| 302 // Attempt to establish the conection (should fail since the IPC channel does | |
| 303 // not exist). | |
| 304 remote_security_key_ipc_client_.EstablishIpcConnection( | |
| 305 base::Bind(&RemoteSecurityKeyIpcClientTest::OperationComplete, | |
| 306 base::Unretained(this), /*failed=*/false), | |
| 307 base::Bind(&RemoteSecurityKeyIpcClientTest::OperationComplete, | |
| 308 base::Unretained(this), /*failed=*/true)); | |
| 309 WaitForOperationComplete(); | |
| 310 ASSERT_TRUE(operation_failed_); | |
| 311 } | |
| 312 | |
| 313 TEST_F(RemoteSecurityKeyIpcClientTest, NonExistentIpcSessionChannel) { | |
| 314 fake_gnubby_auth_handler_.set_ipc_security_key_channel_name( | |
| 315 kNonexistentIpcChannelName); | |
| 316 | |
| 317 // Set up the channel name for the initial IPC channel. | |
| 318 std::string ipc_server_channel_name = GenerateUniqueTestChannelName(); | |
| 319 fake_gnubby_auth_handler_.set_ipc_server_channel_name( | |
| 320 ipc_server_channel_name); | |
| 321 remote_security_key_ipc_client_.SetInitialIpcChannelNameForTest( | |
| 322 ipc_server_channel_name); | |
| 323 | |
| 324 // Create the initial IPC channel and verify it was set up correctly. | |
| 325 ASSERT_FALSE( | |
| 326 remote_security_key_ipc_client_.WaitForSecurityKeyIpcServerChannel()); | |
| 327 fake_gnubby_auth_handler_.CreateGnubbyConnection(); | |
| 328 ASSERT_TRUE(IPC::Channel::IsNamedServerInitialized(ipc_server_channel_name)); | |
| 329 ASSERT_TRUE( | |
| 330 remote_security_key_ipc_client_.WaitForSecurityKeyIpcServerChannel()); | |
| 331 | |
| 332 // Attempt to establish the conection (should fail since the IPC channel does | |
| 333 // not exist). | |
| 334 remote_security_key_ipc_client_.EstablishIpcConnection( | |
| 335 base::Bind(&RemoteSecurityKeyIpcClientTest::OperationComplete, | |
| 336 base::Unretained(this), /*failed=*/false), | |
| 337 base::Bind(&RemoteSecurityKeyIpcClientTest::OperationComplete, | |
| 338 base::Unretained(this), /*failed=*/true)); | |
| 339 WaitForOperationComplete(); | |
| 340 ASSERT_TRUE(operation_failed_); | |
| 341 } | |
| 342 | |
| 343 #if defined(OS_WIN) | |
| 344 TEST_F(RemoteSecurityKeyIpcClientTest, GnubbyIpcServerRunningInWrongSession) { | |
| 345 // Set the expected session Id to a different session than we are running in. | |
| 346 remote_security_key_ipc_client_.SetExpectedIpcServerSessionIdForTest( | |
| 347 session_id_ + 1); | |
| 348 | |
| 349 // Attempting to establish a connection should fail here since the IPC Server | |
| 350 // is 'running' in a different session than expected. | |
| 351 EstablishConnection(/*expect_success=*/false); | |
| 352 } | |
| 353 #endif // defined(OS_WIN) | |
| 354 | |
| 355 } // namespace remoting | |
| OLD | NEW |