Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/win/registry.h" | 5 #include "base/win/registry.h" |
| 6 | 6 |
| 7 #include <cstring> | 7 #include <cstring> |
| 8 #include <vector> | 8 #include <vector> |
| 9 | 9 |
| 10 #include "base/compiler_specific.h" | 10 #include "base/compiler_specific.h" |
| 11 #include "base/stl_util.h" | 11 #include "base/stl_util.h" |
| 12 #include "base/win/windows_version.h" | |
| 12 #include "testing/gtest/include/gtest/gtest.h" | 13 #include "testing/gtest/include/gtest/gtest.h" |
| 13 | 14 |
| 14 namespace base { | 15 namespace base { |
| 15 namespace win { | 16 namespace win { |
| 16 | 17 |
| 17 namespace { | 18 namespace { |
| 18 | 19 |
| 19 const wchar_t kRootKey[] = L"Base_Registry_Unittest"; | 20 class RegistryTest : public testing::Test { |
| 21 protected: | |
| 22 #if defined(_WIN64) | |
| 23 static const REGSAM kNativeViewMask = KEY_WOW64_64KEY; | |
| 24 static const REGSAM kRedirectedViewMask = KEY_WOW64_32KEY; | |
| 25 #else | |
| 26 static const REGSAM kNativeViewMask = KEY_WOW64_32KEY; | |
| 27 static const REGSAM kRedirectedViewMask = KEY_WOW64_64KEY; | |
| 28 #endif // _WIN64 | |
| 20 | 29 |
| 21 class RegistryTest : public testing::Test { | |
| 22 public: | |
| 23 RegistryTest() {} | 30 RegistryTest() {} |
| 24 | |
| 25 protected: | |
| 26 virtual void SetUp() OVERRIDE { | 31 virtual void SetUp() OVERRIDE { |
| 27 // Create a temporary key. | 32 // Create a temporary key. |
| 28 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); | 33 RegKey key(HKEY_CURRENT_USER, L"", KEY_ALL_ACCESS); |
| 29 key.DeleteKey(kRootKey); | 34 key.DeleteKey(kRootKey); |
| 30 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | 35 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); |
| 31 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | 36 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, kRootKey, KEY_READ)); |
| 37 foo_software_key_ = L"Software\\"; | |
| 38 foo_software_key_ += kRootKey; | |
| 39 foo_software_key_ += L"\\Foo"; | |
| 40 foo_software_wow64_key_ = L"Software\\Wow6432Node\\"; | |
| 41 foo_software_wow64_key_ += kRootKey; | |
| 42 foo_software_wow64_key_ += L"\\Foo"; | |
| 32 } | 43 } |
| 33 | 44 |
| 34 virtual void TearDown() OVERRIDE { | 45 virtual void TearDown() OVERRIDE { |
| 35 // Clean up the temporary key. | 46 // Clean up the temporary key. |
| 36 RegKey key(HKEY_CURRENT_USER, L"", KEY_SET_VALUE); | 47 RegKey key(HKEY_CURRENT_USER, L"", KEY_SET_VALUE); |
| 37 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | 48 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); |
| 49 ASSERT_NE(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | |
| 38 } | 50 } |
| 39 | 51 |
| 52 static bool IsRedirectorPresent() { | |
| 53 #if defined(_WIN64) | |
| 54 return true; | |
| 55 #else | |
| 56 return OSInfo::GetInstance()->wow64_status() == OSInfo::WOW64_ENABLED; | |
| 57 #endif | |
| 58 } | |
| 59 | |
| 60 const wchar_t* const kRootKey = L"Base_Registry_Unittest"; | |
| 61 std::wstring foo_software_key_; | |
| 62 std::wstring foo_software_wow64_key_; | |
| 63 | |
| 40 private: | 64 private: |
| 41 DISALLOW_COPY_AND_ASSIGN(RegistryTest); | 65 DISALLOW_COPY_AND_ASSIGN(RegistryTest); |
| 42 }; | 66 }; |
| 43 | 67 |
| 68 // static | |
| 69 const REGSAM RegistryTest::kNativeViewMask; | |
| 70 const REGSAM RegistryTest::kRedirectedViewMask; | |
| 71 | |
| 44 TEST_F(RegistryTest, ValueTest) { | 72 TEST_F(RegistryTest, ValueTest) { |
| 45 RegKey key; | 73 RegKey key; |
| 46 | 74 |
| 47 std::wstring foo_key(kRootKey); | 75 std::wstring foo_key(kRootKey); |
| 48 foo_key += L"\\Foo"; | 76 foo_key += L"\\Foo"; |
| 49 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, foo_key.c_str(), | 77 ASSERT_EQ(ERROR_SUCCESS, key.Create(HKEY_CURRENT_USER, foo_key.c_str(), |
| 50 KEY_READ)); | 78 KEY_READ)); |
| 51 | 79 |
| 52 { | 80 { |
| 53 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, foo_key.c_str(), | 81 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, foo_key.c_str(), |
| (...skipping 97 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 151 ASSERT_EQ(arraysize(kData), iterator.ValueSize()); | 179 ASSERT_EQ(arraysize(kData), iterator.ValueSize()); |
| 152 // Value() is NUL terminated. | 180 // Value() is NUL terminated. |
| 153 int end = (iterator.ValueSize() + sizeof(wchar_t) - 1) / sizeof(wchar_t); | 181 int end = (iterator.ValueSize() + sizeof(wchar_t) - 1) / sizeof(wchar_t); |
| 154 EXPECT_NE(L'\0', iterator.Value()[end-1]); | 182 EXPECT_NE(L'\0', iterator.Value()[end-1]); |
| 155 EXPECT_EQ(L'\0', iterator.Value()[end]); | 183 EXPECT_EQ(L'\0', iterator.Value()[end]); |
| 156 EXPECT_EQ(0, std::memcmp(kData, iterator.Value(), arraysize(kData))); | 184 EXPECT_EQ(0, std::memcmp(kData, iterator.Value(), arraysize(kData))); |
| 157 ++iterator; | 185 ++iterator; |
| 158 EXPECT_FALSE(iterator.Valid()); | 186 EXPECT_FALSE(iterator.Valid()); |
| 159 } | 187 } |
| 160 | 188 |
| 189 TEST_F(RegistryTest, RecursiveDelete) { | |
| 190 RegKey key; | |
| 191 // Create kRootKey->Foo | |
| 192 // \->Bar (TestValue) | |
| 193 // \->Foo (TestValue) | |
| 194 // \->Bar | |
| 195 // \->Foo | |
| 196 // \->Moo | |
| 197 // \->Foo | |
| 198 // and delete kRootKey->Foo | |
| 199 std::wstring foo_key(kRootKey); | |
| 200 foo_key += L"\\Foo"; | |
| 201 ASSERT_EQ(ERROR_SUCCESS, | |
| 202 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
| 203 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Bar", KEY_WRITE)); | |
| 204 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(L"TestValue", L"TestData")); | |
| 205 ASSERT_EQ(ERROR_SUCCESS, | |
| 206 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
| 207 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Moo", KEY_WRITE)); | |
| 208 ASSERT_EQ(ERROR_SUCCESS, | |
| 209 key.Create(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
| 210 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_WRITE)); | |
| 211 foo_key += L"\\Bar"; | |
| 212 ASSERT_EQ(ERROR_SUCCESS, | |
| 213 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
| 214 foo_key += L"\\Foo"; | |
| 215 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_WRITE)); | |
| 216 ASSERT_EQ(ERROR_SUCCESS, key.WriteValue(L"TestValue", L"TestData")); | |
| 217 ASSERT_EQ(ERROR_SUCCESS, | |
| 218 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); | |
| 219 | |
| 220 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_WRITE)); | |
| 221 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(L"Bar")); | |
| 222 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo")); | |
| 223 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Bar\\Foo")); | |
| 224 ASSERT_NE(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Bar")); | |
| 225 ASSERT_EQ(ERROR_SUCCESS, key.DeleteEmptyKey(L"Foo\\Foo")); | |
| 226 | |
| 227 ASSERT_EQ(ERROR_SUCCESS, | |
| 228 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
| 229 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Bar", KEY_WRITE)); | |
| 230 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"Foo", KEY_WRITE)); | |
| 231 ASSERT_EQ(ERROR_SUCCESS, | |
| 232 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_WRITE)); | |
| 233 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(L"")); | |
| 234 ASSERT_NE(ERROR_SUCCESS, | |
| 235 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); | |
| 236 | |
| 237 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_WRITE)); | |
| 238 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(L"Foo")); | |
| 239 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(L"Foo")); | |
| 240 ASSERT_NE(ERROR_SUCCESS, | |
| 241 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); | |
| 242 } | |
| 243 | |
| 244 // This test requires running as an Administrator as it tests redirected | |
| 245 // registry writes to HKLM\Software | |
| 246 // http://msdn.microsoft.com/en-us/library/windows/desktop/aa384253.aspx | |
| 247 TEST_F(RegistryTest, Wow64RedirectedFromNative) { | |
| 248 if (!IsRedirectorPresent()) | |
| 249 return; | |
| 250 | |
| 251 RegKey key; | |
| 252 | |
| 253 // Test redirected key access from non-redirected. | |
| 254 ASSERT_EQ(ERROR_SUCCESS, | |
| 255 key.Create(HKEY_LOCAL_MACHINE, | |
| 256 foo_software_key_.c_str(), | |
| 257 KEY_WRITE | kRedirectedViewMask)); | |
| 258 ASSERT_NE(ERROR_SUCCESS, | |
| 259 key.Open(HKEY_LOCAL_MACHINE, foo_software_key_.c_str(), KEY_READ)); | |
| 260 ASSERT_NE(ERROR_SUCCESS, | |
| 261 key.Open(HKEY_LOCAL_MACHINE, | |
| 262 foo_software_key_.c_str(), | |
| 263 KEY_READ | kNativeViewMask)); | |
| 264 | |
| 265 // Open the non-redirected view of the parent and try to delete the test key. | |
| 266 ASSERT_EQ(ERROR_SUCCESS, | |
| 267 key.Open(HKEY_LOCAL_MACHINE, L"Software", KEY_SET_VALUE)); | |
| 268 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
| 269 ASSERT_EQ(ERROR_SUCCESS, | |
| 270 key.Open(HKEY_LOCAL_MACHINE, | |
| 271 L"Software", | |
| 272 KEY_SET_VALUE | kNativeViewMask)); | |
| 273 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
| 274 | |
| 275 // Open the redirected view and delete the key created above. | |
| 276 ASSERT_EQ(ERROR_SUCCESS, | |
| 277 key.Open(HKEY_LOCAL_MACHINE, | |
| 278 L"Software", | |
| 279 KEY_SET_VALUE | kRedirectedViewMask)); | |
| 280 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
| 281 } | |
| 282 | |
| 283 TEST_F(RegistryTest, Wow64NativeFromRedirected) { | |
| 284 if (!IsRedirectorPresent()) | |
| 285 return; | |
| 286 RegKey key; | |
| 287 | |
| 288 // Test non-redirected key access from redirected. | |
| 289 ASSERT_EQ(ERROR_SUCCESS, | |
| 290 key.Create(HKEY_LOCAL_MACHINE, | |
| 291 foo_software_key_.c_str(), | |
| 292 KEY_WRITE | kNativeViewMask)); | |
| 293 ASSERT_EQ(ERROR_SUCCESS, | |
| 294 key.Open(HKEY_LOCAL_MACHINE, foo_software_key_.c_str(), KEY_READ)); | |
| 295 ASSERT_NE(ERROR_SUCCESS, | |
| 296 key.Open(HKEY_LOCAL_MACHINE, | |
| 297 foo_software_key_.c_str(), | |
| 298 KEY_READ | kRedirectedViewMask)); | |
| 299 | |
| 300 // Open the redirected view of the parent and try to delete the test key | |
| 301 // from the non-redirected view. | |
| 302 ASSERT_EQ(ERROR_SUCCESS, | |
| 303 key.Open(HKEY_LOCAL_MACHINE, | |
| 304 L"Software", | |
| 305 KEY_SET_VALUE | kRedirectedViewMask)); | |
| 306 ASSERT_NE(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
| 307 | |
| 308 ASSERT_EQ(ERROR_SUCCESS, | |
| 309 key.Open(HKEY_LOCAL_MACHINE, | |
| 310 L"Software", | |
| 311 KEY_SET_VALUE | kNativeViewMask)); | |
| 312 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
| 313 } | |
| 314 | |
| 315 TEST_F(RegistryTest, Wow6432NodeFromRedirected) { | |
| 316 if (!IsRedirectorPresent()) | |
| 317 return; | |
| 318 | |
| 319 RegKey key; | |
| 320 // Test access to 32-bit values on 64-bit via the Wow6432Node key. | |
| 321 ASSERT_EQ(ERROR_SUCCESS, | |
| 322 key.Create(HKEY_LOCAL_MACHINE, | |
| 323 foo_software_key_.c_str(), | |
| 324 KEY_WRITE | KEY_WOW64_32KEY)); | |
| 325 ASSERT_EQ(ERROR_SUCCESS, | |
| 326 key.Open(HKEY_LOCAL_MACHINE, | |
| 327 foo_software_wow64_key_.c_str(), | |
| 328 KEY_READ)); | |
| 329 ASSERT_EQ(ERROR_SUCCESS, | |
| 330 key.Open(HKEY_LOCAL_MACHINE, | |
| 331 foo_software_wow64_key_.c_str(), | |
| 332 KEY_READ | KEY_WOW64_64KEY)); | |
| 333 ASSERT_EQ(ERROR_SUCCESS, | |
| 334 key.Open(HKEY_LOCAL_MACHINE, | |
| 335 foo_software_wow64_key_.c_str(), | |
|
grt (UTC plus 2)
2014/05/21 13:52:19
This reinforces my previous comment that you're te
grt (UTC plus 2)
2014/05/21 13:53:17
Where by "this" I mean the fact that you had to ch
| |
| 336 KEY_READ | KEY_WOW64_32KEY)); | |
| 337 ASSERT_EQ(ERROR_SUCCESS, | |
| 338 key.Open(HKEY_LOCAL_MACHINE, | |
| 339 L"Software", | |
| 340 KEY_SET_VALUE | KEY_WOW64_32KEY)); | |
| 341 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(kRootKey)); | |
| 342 } | |
| 343 | |
| 344 TEST_F(RegistryTest, OpenSubKey) { | |
| 345 RegKey key; | |
| 346 ASSERT_EQ(ERROR_SUCCESS, | |
| 347 key.Open(HKEY_CURRENT_USER, | |
| 348 kRootKey, | |
| 349 KEY_READ | KEY_CREATE_SUB_KEY)); | |
| 350 | |
| 351 ASSERT_NE(ERROR_SUCCESS, key.OpenKey(L"foo", KEY_READ)); | |
| 352 ASSERT_EQ(ERROR_SUCCESS, key.CreateKey(L"foo", KEY_READ)); | |
| 353 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_READ)); | |
| 354 ASSERT_EQ(ERROR_SUCCESS, key.OpenKey(L"foo", KEY_READ)); | |
| 355 | |
| 356 std::wstring foo_key(kRootKey); | |
| 357 foo_key += L"\\Foo"; | |
| 358 ASSERT_EQ(ERROR_SUCCESS, | |
| 359 key.Open(HKEY_CURRENT_USER, foo_key.c_str(), KEY_READ)); | |
| 360 | |
| 361 ASSERT_EQ(ERROR_SUCCESS, key.Open(HKEY_CURRENT_USER, kRootKey, KEY_WRITE)); | |
| 362 ASSERT_EQ(ERROR_SUCCESS, key.DeleteKey(L"foo")); | |
| 363 } | |
| 364 | |
| 161 } // namespace | 365 } // namespace |
| 162 | 366 |
| 163 } // namespace win | 367 } // namespace win |
| 164 } // namespace base | 368 } // namespace base |
| OLD | NEW |