Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(192)

Side by Side Diff: base/win/registry_unittest.cc

Issue 275103012: Add WOW64 support and DeleteEmptyKey to base::win::registry. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: moar code review changes Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« base/win/registry.cc ('K') | « base/win/registry.cc ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/win/registry.h" 5 #include "base/win/registry.h"
6 6
7 #include <cstring> 7 #include <cstring>
8 #include <vector> 8 #include <vector>
9 9
10 #include "base/compiler_specific.h" 10 #include "base/compiler_specific.h"
11 #include "base/stl_util.h" 11 #include "base/stl_util.h"
12 #include "base/win/windows_version.h"
12 #include "testing/gtest/include/gtest/gtest.h" 13 #include "testing/gtest/include/gtest/gtest.h"
13 14
14 namespace base { 15 namespace base {
15 namespace win { 16 namespace win {
16 17
17 namespace { 18 namespace {
18 19
19 const wchar_t kRootKey[] = L"Base_Registry_Unittest"; 20 class RegistryTest : public testing::Test {
21 protected:
22 static const REGSAM kNativeViewMask;
23 static const REGSAM kRedirectedViewMask;
20 24
21 class RegistryTest : public testing::Test {
22 public:
23 RegistryTest() {} 25 RegistryTest() {}
24
25 protected:
26 virtual void SetUp() OVERRIDE { 26 virtual void SetUp() OVERRIDE {
27 // Create a temporary key. 27 // Create a temporary key.
28 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); 28 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS);
29 key.DeleteKey(kRootKey); 29 key.DeleteKey(kRootKey);
30 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); 30 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ));
31 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, kRootKey, KEY_READ)); 31 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, kRootKey, KEY_READ));
32 foo_software_key_ = L"Software\\";
33 foo_software_key_ += kRootKey;
34 foo_software_key_ += L"\\Foo";
35 foo_software_wow64_key_ = L"Software\\Wow6432Node\\";
36 foo_software_wow64_key_ += kRootKey;
37 foo_software_wow64_key_ += L"\\Foo";
32 } 38 }
33 39
34 virtual void TearDown() OVERRIDE { 40 virtual void TearDown() OVERRIDE {
35 // Clean up the temporary key. 41 // Clean up the temporary key.
36 RegKey key(HKEY_CURRENT_USER, L"", KEY_SET_VALUE); 42 RegKey key(HKEY_CURRENT_USER, L"", KEY_SET_VALUE);
37 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); 43 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey));
44 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ));
38 } 45 }
39 46
47 static bool IsRedirectorPresent() {
48 #if defined(_WIN64)
49 return true;
50 #else
51 return OSInfo::GetInstance()->wow64_status() == OSInfo::WOW64_ENABLED;
52 #endif
53 }
54
55 const wchar_t* const kRootKey = L"Base_Registry_Unittest";
56 std::wstring foo_software_key_;
57 std::wstring foo_software_wow64_key_;
58
40 private: 59 private:
41 DISALLOW_COPY_AND_ASSIGN(RegistryTest); 60 DISALLOW_COPY_AND_ASSIGN(RegistryTest);
42 }; 61 };
43 62
63 // static
64 #if defined(_WIN64)
65 const REGSAM RegistryTest::kNativeViewMask = KEY_WOW64_64KEY;
66 const REGSAM RegistryTest::kRedirectedViewMask = KEY_WOW64_32KEY;
67 #else
68 const REGSAM RegistryTest::kNativeViewMask = KEY_WOW64_32KEY;
69 const REGSAM RegistryTest::kRedirectedViewMask = KEY_WOW64_64KEY;
70 #endif // _WIN64
71
44 TEST_F(RegistryTest, ValueTest) { 72 TEST_F(RegistryTest, ValueTest) {
45 RegKey key; 73 RegKey key;
46 74
47 std::wstring foo_key(kRootKey); 75 std::wstring foo_key(kRootKey);
48 foo_key += L"\\Foo"; 76 foo_key += L"\\Foo";
49 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, foo_key.c_str(), 77 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, foo_key.c_str(),
50 KEY_READ)); 78 KEY_READ));
51 79
52 { 80 {
53 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, foo_key.c_str(), 81 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, foo_key.c_str(),
(...skipping 97 matching lines...) Expand 10 before | Expand all | Expand 10 after
151 ASSERT_EQ(arraysize(kData), iterator.ValueSize()); 179 ASSERT_EQ(arraysize(kData), iterator.ValueSize());
152 // Value() is NUL terminated. 180 // Value() is NUL terminated.
153 int end = (iterator.ValueSize() + sizeof(wchar_t) - 1) / sizeof(wchar_t); 181 int end = (iterator.ValueSize() + sizeof(wchar_t) - 1) / sizeof(wchar_t);
154 EXPECT_NE(L'\0', iterator.Value()[end-1]); 182 EXPECT_NE(L'\0', iterator.Value()[end-1]);
155 EXPECT_EQ(L'\0', iterator.Value()[end]); 183 EXPECT_EQ(L'\0', iterator.Value()[end]);
156 EXPECT_EQ(0, std::memcmp(kData, iterator.Value(), arraysize(kData))); 184 EXPECT_EQ(0, std::memcmp(kData, iterator.Value(), arraysize(kData)));
157 ++iterator; 185 ++iterator;
158 EXPECT_FALSE(iterator.Valid()); 186 EXPECT_FALSE(iterator.Valid());
159 } 187 }
160 188
189 TEST_F(RegistryTest, RecursiveDelete) {
190 RegKey key;
191 // Create kRootKey->Foo
192 // \->Bar (TestValue)
193 // \->Foo (TestValue)
194 // \->Moo
195 // \->Foo
196 // and delete kRootKey->Foo
197 std::wstring foo_key(kRootKey);
198 foo_key += L"\\Foo";
199 ASSERT_EQ(ERROR_SUCCESS,
200 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE));
201 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Bar", KEY_WRITE));
202 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(L"TestValue", L"TestData"));
203 ASSERT_EQ(ERROR_SUCCESS,
204 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE));
205 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Moo", KEY_WRITE));
206 ASSERT_EQ(ERROR_SUCCESS,
207 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE));
208 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_WRITE));
209 foo_key += L"\\Bar";
210 ASSERT_EQ(ERROR_SUCCESS,
211 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE));
212 foo_key += L"\\Foo";
213 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_WRITE));
214 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(L"TestValue", L"TestData"));
215 ASSERT_EQ(ERROR_SUCCESS,
216 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ));
217
218 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_WRITE));
219 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(L"Bar"));
220 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo"));
221 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Bar\\Foo"));
222 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Bar"));
223 ASSERT_EQ(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Foo"));
224 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(L"Foo"));
225 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(L"Foo"));
226 ASSERT_NE(ERROR_SUCCESS,
227 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ));
228 }
229
230 // This test requires running as an Administrator as it tests redirected
231 // registry writes to HKLM\Software
232 // http://msdn.microsoft.com/en-us/library/windows/desktop/aa384253.aspx
233 TEST_F(RegistryTest, Wow64RedirectedFromNative) {
234 if (!IsRedirectorPresent())
235 return;
236
237 RegKey key;
238
239 // Test redirected key access from non-redirected.
240 ASSERT_EQ(ERROR_SUCCESS,
241 key.Create(HKEY_LOCAL_MACHINE,
242 foo_software_key_.c_str(),
243 KEY_WRITE | kRedirectedViewMask));
244 ASSERT_NE(ERROR_SUCCESS,
245 key.Open(HKEY_LOCAL_MACHINE, foo_software_key_.c_str(), KEY_READ));
246 ASSERT_NE(ERROR_SUCCESS,
247 key.Open(HKEY_LOCAL_MACHINE,
248 foo_software_key_.c_str(),
249 KEY_READ | kNativeViewMask));
250
251 // Open the non-redirected view of the parent and try to delete the test key.
252 ASSERT_EQ(ERROR_SUCCESS,
253 key.Open(HKEY_LOCAL_MACHINE, L"Software", KEY_SET_VALUE));
254 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey));
255 ASSERT_EQ(ERROR_SUCCESS,
256 key.Open(HKEY_LOCAL_MACHINE,
257 L"Software",
258 KEY_SET_VALUE | kNativeViewMask));
259 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey));
260
261 // Open the redirected view and delete the key created above.
262 ASSERT_EQ(ERROR_SUCCESS,
263 key.Open(HKEY_LOCAL_MACHINE,
264 L"Software",
265 KEY_SET_VALUE | kRedirectedViewMask));
266 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey));
267 }
268
269 TEST_F(RegistryTest, Wow64NativeFromRedirected) {
270 if (!IsRedirectorPresent())
271 return;
272 RegKey key;
273
274 // Test non-redirected key access from redirected.
275 ASSERT_EQ(ERROR_SUCCESS,
276 key.Create(HKEY_LOCAL_MACHINE,
277 foo_software_key_.c_str(),
278 KEY_WRITE | kNativeViewMask));
279 ASSERT_EQ(ERROR_SUCCESS,
280 key.Open(HKEY_LOCAL_MACHINE, foo_software_key_.c_str(), KEY_READ));
281 ASSERT_NE(ERROR_SUCCESS,
282 key.Open(HKEY_LOCAL_MACHINE,
283 foo_software_key_.c_str(),
284 KEY_READ | kRedirectedViewMask));
285
286 // Open the redirected view of the parent and try to delete the test key
287 // from the non-redirected view.
288 ASSERT_EQ(ERROR_SUCCESS,
289 key.Open(HKEY_LOCAL_MACHINE,
290 L"Software",
291 KEY_SET_VALUE | kRedirectedViewMask));
292 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey));
293
294 ASSERT_EQ(ERROR_SUCCESS,
295 key.Open(HKEY_LOCAL_MACHINE,
296 L"Software",
297 KEY_SET_VALUE | kNativeViewMask));
298 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey));
299 }
300
301 TEST_F(RegistryTest, Wow6432NodeFromRedirected) {
302 if (!IsRedirectorPresent())
303 return;
304
305 RegKey key;
306 // Test access to 32-bit values on 64-bit via the Wow6432Node key.
307 ASSERT_EQ(ERROR_SUCCESS,
308 key.Create(HKEY_LOCAL_MACHINE,
309 foo_software_key_.c_str(),
310 KEY_WRITE | KEY_WOW64_32KEY));
311 ASSERT_EQ(ERROR_SUCCESS,
312 key.Open(HKEY_LOCAL_MACHINE,
313 foo_software_wow64_key_.c_str(),
314 KEY_READ));
315 ASSERT_EQ(ERROR_SUCCESS,
316 key.Open(HKEY_LOCAL_MACHINE,
317 foo_software_wow64_key_.c_str(),
318 KEY_READ | KEY_WOW64_64KEY));
319 ASSERT_EQ(ERROR_SUCCESS,
320 key.Open(HKEY_LOCAL_MACHINE,
321 foo_software_wow64_key_.c_str(),
322 KEY_READ | KEY_WOW64_32KEY));
323 ASSERT_EQ(ERROR_SUCCESS,
324 key.Open(HKEY_LOCAL_MACHINE,
325 L"Software",
326 KEY_SET_VALUE | KEY_WOW64_32KEY));
327 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey));
328 }
329
330 TEST_F(RegistryTest, Wow64ConflictingViews) {
331 RegKey key;
332 // Test that conflicting WOW64 access flags are always rejected.
333 ASSERT_EQ(ERROR_SUCCESS,
334 key.Create(HKEY_LOCAL_MACHINE,
335 foo_software_key_.c_str(),
336 KEY_WRITE | KEY_WOW64_32KEY));
337 ASSERT_NE(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_READ | KEY_WOW64_64KEY));
338 ASSERT_NE(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_READ));
339 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_READ | KEY_WOW64_32KEY));
340 ASSERT_EQ(ERROR_SUCCESS,
341 key.Open(HKEY_LOCAL_MACHINE,
342 L"Software",
343 KEY_WRITE | KEY_WOW64_32KEY));
344 ASSERT_NE(ERROR_SUCCESS, key.OpenKey(L"Foo", KEY_READ | KEY_WOW64_64KEY));
345 ASSERT_NE(ERROR_SUCCESS, key.OpenKey(L"Foo", KEY_READ));
346 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey));
347 }
348
349 TEST_F(RegistryTest, OpenSubKey) {
350 RegKey key;
351 ASSERT_EQ(ERROR_SUCCESS,
352 key.Open(HKEY_CURRENT_USER,
353 kRootKey,
354 KEY_READ | KEY_CREATE_SUB_KEY));
355
356 ASSERT_NE(ERROR_SUCCESS, key.OpenKey(L"foo", KEY_READ));
357 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"foo", KEY_READ));
358 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ));
359 ASSERT_EQ(ERROR_SUCCESS, key.OpenKey(L"foo", KEY_READ));
360
361 std::wstring foo_key(kRootKey);
362 foo_key += L"\\Foo";
363 ASSERT_EQ(ERROR_SUCCESS,
364 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ));
365
366 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_WRITE));
367 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(L"foo"));
368 }
369
161 } // namespace 370 } // namespace
162 371
163 } // namespace win 372 } // namespace win
164 } // namespace base 373 } // namespace base
OLDNEW
« base/win/registry.cc ('K') | « base/win/registry.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698