| Index: content/browser/mojo_sandbox_browsertest.cc
|
| diff --git a/content/browser/mojo_sandbox_browsertest.cc b/content/browser/mojo_sandbox_browsertest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..19aefa6492baa749f2d767772c9d99a2232f64c4
|
| --- /dev/null
|
| +++ b/content/browser/mojo_sandbox_browsertest.cc
|
| @@ -0,0 +1,92 @@
|
| +// Copyright 2016 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include <stdint.h>
|
| +#include <memory>
|
| +#include <utility>
|
| +
|
| +#include "base/bind.h"
|
| +#include "base/macros.h"
|
| +#include "base/run_loop.h"
|
| +#include "content/browser/utility_process_host_impl.h"
|
| +#include "content/public/browser/browser_thread.h"
|
| +#include "content/public/browser/utility_process_host_client.h"
|
| +#include "content/public/test/content_browser_test.h"
|
| +#include "content/public/test/test_mojo_service.mojom.h"
|
| +#include "services/shell/public/cpp/interface_provider.h"
|
| +
|
| +namespace content {
|
| +namespace {
|
| +
|
| +const std::string kTestMessage = "My hovercraft is full of eels!";
|
| +
|
| +class MojoSandboxTest : public ContentBrowserTest {
|
| + public:
|
| + MojoSandboxTest() {}
|
| +
|
| + void SetUpOnMainThread() override {
|
| + base::RunLoop run_loop;
|
| + BrowserThread::PostTaskAndReply(
|
| + BrowserThread::IO, FROM_HERE,
|
| + base::Bind(&MojoSandboxTest::StartUtilityProcessOnIoThread,
|
| + base::Unretained(this)),
|
| + run_loop.QuitClosure());
|
| + run_loop.Run();
|
| + }
|
| +
|
| + void TearDownOnMainThread() override {
|
| + base::RunLoop run_loop;
|
| + BrowserThread::PostTaskAndReply(
|
| + BrowserThread::IO, FROM_HERE,
|
| + base::Bind(&MojoSandboxTest::StopUtilityProcessOnIoThread,
|
| + base::Unretained(this)),
|
| + run_loop.QuitClosure());
|
| + run_loop.Run();
|
| + }
|
| +
|
| + protected:
|
| + std::unique_ptr<UtilityProcessHostImpl> host_;
|
| +
|
| + private:
|
| + void StartUtilityProcessOnIoThread() {
|
| + host_.reset(new UtilityProcessHostImpl(nullptr, nullptr));
|
| + ASSERT_TRUE(host_->Start());
|
| + }
|
| +
|
| + void StopUtilityProcessOnIoThread() { host_.reset(); }
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(MojoSandboxTest);
|
| +};
|
| +
|
| +IN_PROC_BROWSER_TEST_F(MojoSandboxTest, SubprocessSharedBuffer) {
|
| + // Ensures that a shared buffer can be created within a sandboxed process.
|
| +
|
| + mojom::TestMojoServicePtr test_service;
|
| + host_->GetRemoteInterfaces()->GetInterface(&test_service);
|
| +
|
| + bool got_response = false;
|
| + base::RunLoop run_loop;
|
| + test_service.set_connection_error_handler(run_loop.QuitClosure());
|
| + test_service->CreateSharedBuffer(
|
| + kTestMessage,
|
| + base::Bind(
|
| + [](const base::Closure& quit_closure, bool* got_response,
|
| + mojo::ScopedSharedBufferHandle buffer) {
|
| + ASSERT_TRUE(buffer.is_valid());
|
| + mojo::ScopedSharedBufferMapping mapping =
|
| + buffer->Map(kTestMessage.size());
|
| + ASSERT_TRUE(mapping);
|
| + std::string contents(static_cast<const char*>(mapping.get()),
|
| + kTestMessage.size());
|
| + EXPECT_EQ(kTestMessage, contents);
|
| + *got_response = true;
|
| + quit_closure.Run();
|
| + },
|
| + run_loop.QuitClosure(), &got_response));
|
| + run_loop.Run();
|
| + EXPECT_TRUE(got_response);
|
| +}
|
| +
|
| +} // namespace
|
| +} // namespace content
|
|
|