OLD | NEW |
(Empty) | |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "remoting/host/security_key/remote_security_key_message_writer_impl.h" |
| 6 |
| 7 #include <cstdint> |
| 8 #include <memory> |
| 9 #include <utility> |
| 10 |
| 11 #include "base/bind.h" |
| 12 #include "base/message_loop/message_loop.h" |
| 13 #include "base/run_loop.h" |
| 14 #include "base/stl_util.h" |
| 15 #include "base/task_runner_util.h" |
| 16 #include "base/threading/thread.h" |
| 17 #include "base/time/time.h" |
| 18 #include "remoting/host/security_key/security_key_message.h" |
| 19 #include "remoting/host/setup/test_util.h" |
| 20 #include "testing/gtest/include/gtest/gtest.h" |
| 21 |
| 22 namespace { |
| 23 const remoting::RemoteSecurityKeyMessageType kTestMessageType = |
| 24 remoting::RemoteSecurityKeyMessageType::CONNECT; |
| 25 const unsigned int kLargeMessageSizeBytes = 200000; |
| 26 } // namespace |
| 27 |
| 28 namespace remoting { |
| 29 |
| 30 class RemoteSecurityKeyMessageWriterImplTest : public testing::Test { |
| 31 public: |
| 32 RemoteSecurityKeyMessageWriterImplTest(); |
| 33 ~RemoteSecurityKeyMessageWriterImplTest() override; |
| 34 |
| 35 // Run on a separate thread, this method reads the message written to the |
| 36 // output stream and returns the result. |
| 37 std::string ReadMessage(int payload_length_bytes); |
| 38 |
| 39 // Called back once the read operation has completed. |
| 40 void OnReadComplete(const base::Closure& done_callback, |
| 41 const std::string& result); |
| 42 |
| 43 protected: |
| 44 // testing::Test interface. |
| 45 void SetUp() override; |
| 46 |
| 47 // Writes |kTestMessageType| and |payload| to the output stream and verifies |
| 48 // they were written correctly. |
| 49 void WriteMessageToOutput(const std::string& payload); |
| 50 |
| 51 std::unique_ptr<RemoteSecurityKeyMessageWriter> writer_; |
| 52 base::File read_file_; |
| 53 base::File write_file_; |
| 54 |
| 55 // Stores the result of the last read operation. |
| 56 std::string message_result_; |
| 57 |
| 58 private: |
| 59 DISALLOW_COPY_AND_ASSIGN(RemoteSecurityKeyMessageWriterImplTest); |
| 60 }; |
| 61 |
| 62 RemoteSecurityKeyMessageWriterImplTest:: |
| 63 RemoteSecurityKeyMessageWriterImplTest() {} |
| 64 |
| 65 RemoteSecurityKeyMessageWriterImplTest:: |
| 66 ~RemoteSecurityKeyMessageWriterImplTest() {} |
| 67 |
| 68 std::string RemoteSecurityKeyMessageWriterImplTest::ReadMessage( |
| 69 int payload_length_bytes) { |
| 70 std::string message_header(SecurityKeyMessage::kHeaderSizeBytes, '\0'); |
| 71 read_file_.ReadAtCurrentPos(string_as_array(&message_header), |
| 72 SecurityKeyMessage::kHeaderSizeBytes); |
| 73 |
| 74 std::string message_type(SecurityKeyMessage::kMessageTypeSizeBytes, '\0'); |
| 75 read_file_.ReadAtCurrentPos(string_as_array(&message_type), |
| 76 SecurityKeyMessage::kMessageTypeSizeBytes); |
| 77 |
| 78 std::string message_data(payload_length_bytes, '\0'); |
| 79 if (payload_length_bytes) { |
| 80 read_file_.ReadAtCurrentPos(string_as_array(&message_data), |
| 81 payload_length_bytes); |
| 82 } |
| 83 |
| 84 return message_header + message_type + message_data; |
| 85 } |
| 86 |
| 87 void RemoteSecurityKeyMessageWriterImplTest::OnReadComplete( |
| 88 const base::Closure& done_callback, |
| 89 const std::string& result) { |
| 90 message_result_ = result; |
| 91 done_callback.Run(); |
| 92 } |
| 93 |
| 94 void RemoteSecurityKeyMessageWriterImplTest::SetUp() { |
| 95 ASSERT_TRUE(MakePipe(&read_file_, &write_file_)); |
| 96 writer_.reset(new RemoteSecurityKeyMessageWriterImpl(std::move(write_file_))); |
| 97 } |
| 98 |
| 99 void RemoteSecurityKeyMessageWriterImplTest::WriteMessageToOutput( |
| 100 const std::string& payload) { |
| 101 // Thread used for blocking IO operations. |
| 102 base::Thread reader_thread("ReaderThread"); |
| 103 |
| 104 base::Thread::Options options; |
| 105 options.message_loop_type = base::MessageLoop::TYPE_IO; |
| 106 reader_thread.StartWithOptions(options); |
| 107 |
| 108 // Used to block until the read complete callback is triggered. |
| 109 base::MessageLoopForIO message_loop; |
| 110 base::RunLoop run_loop; |
| 111 |
| 112 ASSERT_TRUE(base::PostTaskAndReplyWithResult( |
| 113 reader_thread.task_runner().get(), FROM_HERE, |
| 114 base::Bind(&RemoteSecurityKeyMessageWriterImplTest::ReadMessage, |
| 115 base::Unretained(this), payload.size()), |
| 116 base::Bind(&RemoteSecurityKeyMessageWriterImplTest::OnReadComplete, |
| 117 base::Unretained(this), run_loop.QuitClosure()))); |
| 118 |
| 119 if (payload.size()) { |
| 120 ASSERT_TRUE(writer_->WriteMessageWithPayload(kTestMessageType, payload)); |
| 121 } else { |
| 122 ASSERT_TRUE(writer_->WriteMessage(kTestMessageType)); |
| 123 } |
| 124 |
| 125 run_loop.Run(); |
| 126 |
| 127 size_t total_size = SecurityKeyMessage::kHeaderSizeBytes + |
| 128 SecurityKeyMessage::kMessageTypeSizeBytes + |
| 129 payload.size(); |
| 130 ASSERT_EQ(message_result_.size(), total_size); |
| 131 |
| 132 RemoteSecurityKeyMessageType type = |
| 133 SecurityKeyMessage::MessageTypeFromValue(message_result_[4]); |
| 134 ASSERT_EQ(kTestMessageType, type); |
| 135 |
| 136 if (payload.size()) { |
| 137 ASSERT_EQ(message_result_.substr(5), payload); |
| 138 } |
| 139 |
| 140 // Destroy the writer and verify the other end of the pipe is clean. |
| 141 writer_.reset(); |
| 142 char unused; |
| 143 ASSERT_LE(read_file_.ReadAtCurrentPos(&unused, 1), 0); |
| 144 } |
| 145 |
| 146 TEST_F(RemoteSecurityKeyMessageWriterImplTest, WriteMessageWithoutPayload) { |
| 147 std::string empty_payload; |
| 148 WriteMessageToOutput(empty_payload); |
| 149 } |
| 150 |
| 151 TEST_F(RemoteSecurityKeyMessageWriterImplTest, WriteMessageWithPayload) { |
| 152 WriteMessageToOutput("Super-test-payload!"); |
| 153 } |
| 154 |
| 155 TEST_F(RemoteSecurityKeyMessageWriterImplTest, WriteMessageWithLargePayload) { |
| 156 WriteMessageToOutput(std::string(kLargeMessageSizeBytes, 'Y')); |
| 157 } |
| 158 |
| 159 TEST_F(RemoteSecurityKeyMessageWriterImplTest, WriteMultipleMessages) { |
| 160 int total_messages_to_write = 10; |
| 161 for (int i = 0; i < total_messages_to_write; i++) { |
| 162 if (i % 2 == 0) { |
| 163 ASSERT_TRUE(writer_->WriteMessage(RemoteSecurityKeyMessageType::CONNECT)); |
| 164 } else { |
| 165 ASSERT_TRUE(writer_->WriteMessage(RemoteSecurityKeyMessageType::REQUEST)); |
| 166 } |
| 167 } |
| 168 |
| 169 for (int i = 0; i < total_messages_to_write; i++) { |
| 170 // Retrieve and verify the message header. |
| 171 int length; |
| 172 ASSERT_EQ(SecurityKeyMessage::kHeaderSizeBytes, |
| 173 read_file_.ReadAtCurrentPos(reinterpret_cast<char*>(&length), 4)); |
| 174 ASSERT_EQ(SecurityKeyMessage::kMessageTypeSizeBytes, length); |
| 175 |
| 176 // Retrieve and verify the message type. |
| 177 std::string message_type(length, '\0'); |
| 178 int bytes_read = |
| 179 read_file_.ReadAtCurrentPos(string_as_array(&message_type), length); |
| 180 ASSERT_EQ(length, bytes_read); |
| 181 |
| 182 RemoteSecurityKeyMessageType type = |
| 183 SecurityKeyMessage::MessageTypeFromValue(message_type[0]); |
| 184 if (i % 2 == 0) { |
| 185 ASSERT_EQ(RemoteSecurityKeyMessageType::CONNECT, type); |
| 186 } else { |
| 187 ASSERT_EQ(RemoteSecurityKeyMessageType::REQUEST, type); |
| 188 } |
| 189 } |
| 190 |
| 191 // Destroy the writer and verify the other end of the pipe is clean. |
| 192 writer_.reset(); |
| 193 char unused; |
| 194 ASSERT_LE(read_file_.ReadAtCurrentPos(&unused, 1), 0); |
| 195 } |
| 196 |
| 197 TEST_F(RemoteSecurityKeyMessageWriterImplTest, EnsureWriteFailsWhenPipeClosed) { |
| 198 // Close the read end so that writing fails immediately. |
| 199 read_file_.Close(); |
| 200 |
| 201 EXPECT_FALSE(writer_->WriteMessage(kTestMessageType)); |
| 202 } |
| 203 |
| 204 } // namespace remoting |
OLD | NEW |