OLD | NEW |
| (Empty) |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "remoting/host/setup/native_messaging_host.h" | |
6 | |
7 #include "base/basictypes.h" | |
8 #include "base/compiler_specific.h" | |
9 #include "base/json/json_reader.h" | |
10 #include "base/json/json_writer.h" | |
11 #include "base/message_loop/message_loop.h" | |
12 #include "base/run_loop.h" | |
13 #include "base/stl_util.h" | |
14 #include "base/strings/stringize_macros.h" | |
15 #include "base/values.h" | |
16 #include "google_apis/gaia/gaia_oauth_client.h" | |
17 #include "net/base/file_stream.h" | |
18 #include "net/base/net_util.h" | |
19 #include "remoting/base/auto_thread_task_runner.h" | |
20 #include "remoting/host/pin_hash.h" | |
21 #include "remoting/host/setup/native_messaging_channel.h" | |
22 #include "remoting/host/setup/test_util.h" | |
23 #include "remoting/protocol/pairing_registry.h" | |
24 #include "remoting/protocol/protocol_mock_objects.h" | |
25 #include "testing/gtest/include/gtest/gtest.h" | |
26 | |
27 using remoting::protocol::MockPairingRegistryDelegate; | |
28 using remoting::protocol::PairingRegistry; | |
29 using remoting::protocol::SynchronousPairingRegistry; | |
30 | |
31 namespace { | |
32 | |
33 void VerifyHelloResponse(scoped_ptr<base::DictionaryValue> response) { | |
34 ASSERT_TRUE(response); | |
35 std::string value; | |
36 EXPECT_TRUE(response->GetString("type", &value)); | |
37 EXPECT_EQ("helloResponse", value); | |
38 EXPECT_TRUE(response->GetString("version", &value)); | |
39 EXPECT_EQ(STRINGIZE(VERSION), value); | |
40 } | |
41 | |
42 void VerifyGetHostNameResponse(scoped_ptr<base::DictionaryValue> response) { | |
43 ASSERT_TRUE(response); | |
44 std::string value; | |
45 EXPECT_TRUE(response->GetString("type", &value)); | |
46 EXPECT_EQ("getHostNameResponse", value); | |
47 EXPECT_TRUE(response->GetString("hostname", &value)); | |
48 EXPECT_EQ(net::GetHostName(), value); | |
49 } | |
50 | |
51 void VerifyGetPinHashResponse(scoped_ptr<base::DictionaryValue> response) { | |
52 ASSERT_TRUE(response); | |
53 std::string value; | |
54 EXPECT_TRUE(response->GetString("type", &value)); | |
55 EXPECT_EQ("getPinHashResponse", value); | |
56 EXPECT_TRUE(response->GetString("hash", &value)); | |
57 EXPECT_EQ(remoting::MakeHostPinHash("my_host", "1234"), value); | |
58 } | |
59 | |
60 void VerifyGenerateKeyPairResponse(scoped_ptr<base::DictionaryValue> response) { | |
61 ASSERT_TRUE(response); | |
62 std::string value; | |
63 EXPECT_TRUE(response->GetString("type", &value)); | |
64 EXPECT_EQ("generateKeyPairResponse", value); | |
65 EXPECT_TRUE(response->GetString("privateKey", &value)); | |
66 EXPECT_TRUE(response->GetString("publicKey", &value)); | |
67 } | |
68 | |
69 void VerifyGetDaemonConfigResponse(scoped_ptr<base::DictionaryValue> response) { | |
70 ASSERT_TRUE(response); | |
71 std::string value; | |
72 EXPECT_TRUE(response->GetString("type", &value)); | |
73 EXPECT_EQ("getDaemonConfigResponse", value); | |
74 const base::DictionaryValue* config = NULL; | |
75 EXPECT_TRUE(response->GetDictionary("config", &config)); | |
76 EXPECT_TRUE(base::DictionaryValue().Equals(config)); | |
77 } | |
78 | |
79 void VerifyGetUsageStatsConsentResponse( | |
80 scoped_ptr<base::DictionaryValue> response) { | |
81 ASSERT_TRUE(response); | |
82 std::string value; | |
83 EXPECT_TRUE(response->GetString("type", &value)); | |
84 EXPECT_EQ("getUsageStatsConsentResponse", value); | |
85 bool supported, allowed, set_by_policy; | |
86 EXPECT_TRUE(response->GetBoolean("supported", &supported)); | |
87 EXPECT_TRUE(response->GetBoolean("allowed", &allowed)); | |
88 EXPECT_TRUE(response->GetBoolean("setByPolicy", &set_by_policy)); | |
89 EXPECT_TRUE(supported); | |
90 EXPECT_TRUE(allowed); | |
91 EXPECT_TRUE(set_by_policy); | |
92 } | |
93 | |
94 void VerifyStopDaemonResponse(scoped_ptr<base::DictionaryValue> response) { | |
95 ASSERT_TRUE(response); | |
96 std::string value; | |
97 EXPECT_TRUE(response->GetString("type", &value)); | |
98 EXPECT_EQ("stopDaemonResponse", value); | |
99 EXPECT_TRUE(response->GetString("result", &value)); | |
100 EXPECT_EQ("OK", value); | |
101 } | |
102 | |
103 void VerifyGetDaemonStateResponse(scoped_ptr<base::DictionaryValue> response) { | |
104 ASSERT_TRUE(response); | |
105 std::string value; | |
106 EXPECT_TRUE(response->GetString("type", &value)); | |
107 EXPECT_EQ("getDaemonStateResponse", value); | |
108 EXPECT_TRUE(response->GetString("state", &value)); | |
109 EXPECT_EQ("STARTED", value); | |
110 } | |
111 | |
112 void VerifyUpdateDaemonConfigResponse( | |
113 scoped_ptr<base::DictionaryValue> response) { | |
114 ASSERT_TRUE(response); | |
115 std::string value; | |
116 EXPECT_TRUE(response->GetString("type", &value)); | |
117 EXPECT_EQ("updateDaemonConfigResponse", value); | |
118 EXPECT_TRUE(response->GetString("result", &value)); | |
119 EXPECT_EQ("OK", value); | |
120 } | |
121 | |
122 void VerifyStartDaemonResponse(scoped_ptr<base::DictionaryValue> response) { | |
123 ASSERT_TRUE(response); | |
124 std::string value; | |
125 EXPECT_TRUE(response->GetString("type", &value)); | |
126 EXPECT_EQ("startDaemonResponse", value); | |
127 EXPECT_TRUE(response->GetString("result", &value)); | |
128 EXPECT_EQ("OK", value); | |
129 } | |
130 | |
131 } // namespace | |
132 | |
133 namespace remoting { | |
134 | |
135 class MockDaemonControllerDelegate : public DaemonController::Delegate { | |
136 public: | |
137 MockDaemonControllerDelegate(); | |
138 virtual ~MockDaemonControllerDelegate(); | |
139 | |
140 // DaemonController::Delegate interface. | |
141 virtual DaemonController::State GetState() OVERRIDE; | |
142 virtual scoped_ptr<base::DictionaryValue> GetConfig() OVERRIDE; | |
143 virtual void SetConfigAndStart( | |
144 scoped_ptr<base::DictionaryValue> config, | |
145 bool consent, | |
146 const DaemonController::CompletionCallback& done) OVERRIDE; | |
147 virtual void UpdateConfig( | |
148 scoped_ptr<base::DictionaryValue> config, | |
149 const DaemonController::CompletionCallback& done) OVERRIDE; | |
150 virtual void Stop(const DaemonController::CompletionCallback& done) OVERRIDE; | |
151 virtual void SetWindow(void* window_handle) OVERRIDE; | |
152 virtual std::string GetVersion() OVERRIDE; | |
153 virtual DaemonController::UsageStatsConsent GetUsageStatsConsent() OVERRIDE; | |
154 | |
155 private: | |
156 DISALLOW_COPY_AND_ASSIGN(MockDaemonControllerDelegate); | |
157 }; | |
158 | |
159 MockDaemonControllerDelegate::MockDaemonControllerDelegate() {} | |
160 | |
161 MockDaemonControllerDelegate::~MockDaemonControllerDelegate() {} | |
162 | |
163 DaemonController::State MockDaemonControllerDelegate::GetState() { | |
164 return DaemonController::STATE_STARTED; | |
165 } | |
166 | |
167 scoped_ptr<base::DictionaryValue> MockDaemonControllerDelegate::GetConfig() { | |
168 return scoped_ptr<base::DictionaryValue>(new base::DictionaryValue()); | |
169 } | |
170 | |
171 void MockDaemonControllerDelegate::SetConfigAndStart( | |
172 scoped_ptr<base::DictionaryValue> config, | |
173 bool consent, | |
174 const DaemonController::CompletionCallback& done) { | |
175 | |
176 // Verify parameters passed in. | |
177 if (consent && config && config->HasKey("start")) { | |
178 done.Run(DaemonController::RESULT_OK); | |
179 } else { | |
180 done.Run(DaemonController::RESULT_FAILED); | |
181 } | |
182 } | |
183 | |
184 void MockDaemonControllerDelegate::UpdateConfig( | |
185 scoped_ptr<base::DictionaryValue> config, | |
186 const DaemonController::CompletionCallback& done) { | |
187 if (config && config->HasKey("update")) { | |
188 done.Run(DaemonController::RESULT_OK); | |
189 } else { | |
190 done.Run(DaemonController::RESULT_FAILED); | |
191 } | |
192 } | |
193 | |
194 void MockDaemonControllerDelegate::Stop( | |
195 const DaemonController::CompletionCallback& done) { | |
196 done.Run(DaemonController::RESULT_OK); | |
197 } | |
198 | |
199 void MockDaemonControllerDelegate::SetWindow(void* window_handle) {} | |
200 | |
201 std::string MockDaemonControllerDelegate::GetVersion() { | |
202 // Unused - NativeMessagingHost returns the compiled-in version string | |
203 // instead of calling this method. | |
204 NOTREACHED(); | |
205 return std::string(); | |
206 } | |
207 | |
208 DaemonController::UsageStatsConsent | |
209 MockDaemonControllerDelegate::GetUsageStatsConsent() { | |
210 DaemonController::UsageStatsConsent consent; | |
211 consent.supported = true; | |
212 consent.allowed = true; | |
213 consent.set_by_policy = true; | |
214 return consent; | |
215 } | |
216 | |
217 class NativeMessagingHostTest : public testing::Test { | |
218 public: | |
219 NativeMessagingHostTest(); | |
220 virtual ~NativeMessagingHostTest(); | |
221 | |
222 virtual void SetUp() OVERRIDE; | |
223 virtual void TearDown() OVERRIDE; | |
224 | |
225 void Run(); | |
226 | |
227 // Deletes |host_|. | |
228 void DeleteHost(); | |
229 | |
230 scoped_ptr<base::DictionaryValue> ReadMessageFromOutputPipe(); | |
231 | |
232 void WriteMessageToInputPipe(const base::Value& message); | |
233 | |
234 // The Host process should shut down when it receives a malformed request. | |
235 // This is tested by sending a known-good request, followed by |message|, | |
236 // followed by the known-good request again. The response file should only | |
237 // contain a single response from the first good request. | |
238 void TestBadRequest(const base::Value& message); | |
239 | |
240 protected: | |
241 // Reference to the MockDaemonControllerDelegate, which is owned by | |
242 // |channel_|. | |
243 MockDaemonControllerDelegate* daemon_controller_delegate_; | |
244 | |
245 private: | |
246 // Each test creates two unidirectional pipes: "input" and "output". | |
247 // NativeMessagingHost reads from input_read_handle and writes to | |
248 // output_write_handle. The unittest supplies data to input_write_handle, and | |
249 // verifies output from output_read_handle. | |
250 // | |
251 // unittest -> [input] -> NativeMessagingHost -> [output] -> unittest | |
252 base::PlatformFile input_write_handle_; | |
253 base::PlatformFile output_read_handle_; | |
254 | |
255 base::MessageLoop message_loop_; | |
256 base::RunLoop run_loop_; | |
257 scoped_refptr<AutoThreadTaskRunner> task_runner_; | |
258 scoped_ptr<remoting::NativeMessagingChannel> channel_; | |
259 | |
260 DISALLOW_COPY_AND_ASSIGN(NativeMessagingHostTest); | |
261 }; | |
262 | |
263 NativeMessagingHostTest::NativeMessagingHostTest() | |
264 : message_loop_(base::MessageLoop::TYPE_IO) {} | |
265 | |
266 NativeMessagingHostTest::~NativeMessagingHostTest() {} | |
267 | |
268 void NativeMessagingHostTest::SetUp() { | |
269 base::PlatformFile input_read_handle; | |
270 base::PlatformFile output_write_handle; | |
271 | |
272 ASSERT_TRUE(MakePipe(&input_read_handle, &input_write_handle_)); | |
273 ASSERT_TRUE(MakePipe(&output_read_handle_, &output_write_handle)); | |
274 | |
275 // Arrange to run |message_loop_| until no components depend on it. | |
276 task_runner_ = new AutoThreadTaskRunner( | |
277 message_loop_.message_loop_proxy(), run_loop_.QuitClosure()); | |
278 | |
279 daemon_controller_delegate_ = new MockDaemonControllerDelegate(); | |
280 scoped_refptr<DaemonController> daemon_controller( | |
281 new DaemonController( | |
282 scoped_ptr<DaemonController::Delegate>(daemon_controller_delegate_))); | |
283 | |
284 scoped_refptr<PairingRegistry> pairing_registry = | |
285 new SynchronousPairingRegistry(scoped_ptr<PairingRegistry::Delegate>( | |
286 new MockPairingRegistryDelegate())); | |
287 scoped_ptr<NativeMessagingChannel::Delegate> host( | |
288 new NativeMessagingHost(daemon_controller, | |
289 pairing_registry, | |
290 scoped_ptr<remoting::OAuthClient>())); | |
291 channel_.reset( | |
292 new NativeMessagingChannel(host.Pass(), | |
293 input_read_handle, | |
294 output_write_handle)); | |
295 } | |
296 | |
297 void NativeMessagingHostTest::TearDown() { | |
298 // DaemonController destroys its internals asynchronously. Let these and any | |
299 // other pending tasks run to make sure we don't leak the memory owned by | |
300 // them. | |
301 message_loop_.RunUntilIdle(); | |
302 | |
303 // The NativeMessagingHost dtor closes the handles that are passed to it. | |
304 // |input_write_handle_| gets closed just before starting the host. So the | |
305 // only handle left to close is |output_read_handle_|. | |
306 base::ClosePlatformFile(output_read_handle_); | |
307 } | |
308 | |
309 void NativeMessagingHostTest::Run() { | |
310 // Close the write-end of input, so that the host sees EOF after reading | |
311 // messages and won't block waiting for more input. | |
312 base::ClosePlatformFile(input_write_handle_); | |
313 channel_->Start(base::Bind(&NativeMessagingHostTest::DeleteHost, | |
314 base::Unretained(this))); | |
315 run_loop_.Run(); | |
316 } | |
317 | |
318 void NativeMessagingHostTest::DeleteHost() { | |
319 // Destroy |channel_| so that it closes its end of the output pipe, so that | |
320 // TestBadRequest() will see EOF and won't block waiting for more data. | |
321 channel_.reset(); | |
322 task_runner_ = NULL; | |
323 } | |
324 | |
325 scoped_ptr<base::DictionaryValue> | |
326 NativeMessagingHostTest::ReadMessageFromOutputPipe() { | |
327 uint32 length; | |
328 int read_result = base::ReadPlatformFileAtCurrentPos( | |
329 output_read_handle_, reinterpret_cast<char*>(&length), sizeof(length)); | |
330 if (read_result != sizeof(length)) { | |
331 return scoped_ptr<base::DictionaryValue>(); | |
332 } | |
333 | |
334 std::string message_json(length, '\0'); | |
335 read_result = base::ReadPlatformFileAtCurrentPos( | |
336 output_read_handle_, string_as_array(&message_json), length); | |
337 if (read_result != static_cast<int>(length)) { | |
338 return scoped_ptr<base::DictionaryValue>(); | |
339 } | |
340 | |
341 scoped_ptr<base::Value> message(base::JSONReader::Read(message_json)); | |
342 if (!message || !message->IsType(base::Value::TYPE_DICTIONARY)) { | |
343 return scoped_ptr<base::DictionaryValue>(); | |
344 } | |
345 | |
346 return scoped_ptr<base::DictionaryValue>( | |
347 static_cast<base::DictionaryValue*>(message.release())); | |
348 } | |
349 | |
350 void NativeMessagingHostTest::WriteMessageToInputPipe( | |
351 const base::Value& message) { | |
352 std::string message_json; | |
353 base::JSONWriter::Write(&message, &message_json); | |
354 | |
355 uint32 length = message_json.length(); | |
356 base::WritePlatformFileAtCurrentPos(input_write_handle_, | |
357 reinterpret_cast<char*>(&length), | |
358 sizeof(length)); | |
359 base::WritePlatformFileAtCurrentPos(input_write_handle_, message_json.data(), | |
360 length); | |
361 } | |
362 | |
363 void NativeMessagingHostTest::TestBadRequest(const base::Value& message) { | |
364 base::DictionaryValue good_message; | |
365 good_message.SetString("type", "hello"); | |
366 | |
367 // This test currently relies on synchronous processing of hello messages and | |
368 // message parameters verification. | |
369 WriteMessageToInputPipe(good_message); | |
370 WriteMessageToInputPipe(message); | |
371 WriteMessageToInputPipe(good_message); | |
372 | |
373 Run(); | |
374 | |
375 // Read from output pipe, and verify responses. | |
376 scoped_ptr<base::DictionaryValue> response = | |
377 ReadMessageFromOutputPipe(); | |
378 VerifyHelloResponse(response.Pass()); | |
379 | |
380 response = ReadMessageFromOutputPipe(); | |
381 EXPECT_FALSE(response); | |
382 } | |
383 | |
384 // Test all valid request-types. | |
385 TEST_F(NativeMessagingHostTest, All) { | |
386 int next_id = 0; | |
387 base::DictionaryValue message; | |
388 message.SetInteger("id", next_id++); | |
389 message.SetString("type", "hello"); | |
390 WriteMessageToInputPipe(message); | |
391 | |
392 message.SetInteger("id", next_id++); | |
393 message.SetString("type", "getHostName"); | |
394 WriteMessageToInputPipe(message); | |
395 | |
396 message.SetInteger("id", next_id++); | |
397 message.SetString("type", "getPinHash"); | |
398 message.SetString("hostId", "my_host"); | |
399 message.SetString("pin", "1234"); | |
400 WriteMessageToInputPipe(message); | |
401 | |
402 message.Clear(); | |
403 message.SetInteger("id", next_id++); | |
404 message.SetString("type", "generateKeyPair"); | |
405 WriteMessageToInputPipe(message); | |
406 | |
407 message.SetInteger("id", next_id++); | |
408 message.SetString("type", "getDaemonConfig"); | |
409 WriteMessageToInputPipe(message); | |
410 | |
411 message.SetInteger("id", next_id++); | |
412 message.SetString("type", "getUsageStatsConsent"); | |
413 WriteMessageToInputPipe(message); | |
414 | |
415 message.SetInteger("id", next_id++); | |
416 message.SetString("type", "stopDaemon"); | |
417 WriteMessageToInputPipe(message); | |
418 | |
419 message.SetInteger("id", next_id++); | |
420 message.SetString("type", "getDaemonState"); | |
421 WriteMessageToInputPipe(message); | |
422 | |
423 // Following messages require a "config" dictionary. | |
424 base::DictionaryValue config; | |
425 config.SetBoolean("update", true); | |
426 message.Set("config", config.DeepCopy()); | |
427 message.SetInteger("id", next_id++); | |
428 message.SetString("type", "updateDaemonConfig"); | |
429 WriteMessageToInputPipe(message); | |
430 | |
431 config.Clear(); | |
432 config.SetBoolean("start", true); | |
433 message.Set("config", config.DeepCopy()); | |
434 message.SetBoolean("consent", true); | |
435 message.SetInteger("id", next_id++); | |
436 message.SetString("type", "startDaemon"); | |
437 WriteMessageToInputPipe(message); | |
438 | |
439 Run(); | |
440 | |
441 void (*verify_routines[])(scoped_ptr<base::DictionaryValue>) = { | |
442 &VerifyHelloResponse, | |
443 &VerifyGetHostNameResponse, | |
444 &VerifyGetPinHashResponse, | |
445 &VerifyGenerateKeyPairResponse, | |
446 &VerifyGetDaemonConfigResponse, | |
447 &VerifyGetUsageStatsConsentResponse, | |
448 &VerifyStopDaemonResponse, | |
449 &VerifyGetDaemonStateResponse, | |
450 &VerifyUpdateDaemonConfigResponse, | |
451 &VerifyStartDaemonResponse, | |
452 }; | |
453 ASSERT_EQ(arraysize(verify_routines), static_cast<size_t>(next_id)); | |
454 | |
455 // Read all responses from output pipe, and verify them. | |
456 for (int i = 0; i < next_id; ++i) { | |
457 scoped_ptr<base::DictionaryValue> response = ReadMessageFromOutputPipe(); | |
458 | |
459 // Make sure that id is available and is in the range. | |
460 int id; | |
461 ASSERT_TRUE(response->GetInteger("id", &id)); | |
462 ASSERT_TRUE(0 <= id && id < next_id); | |
463 | |
464 // Call the verification routine corresponding to the message id. | |
465 ASSERT_TRUE(verify_routines[id]); | |
466 verify_routines[id](response.Pass()); | |
467 | |
468 // Clear the pointer so that the routine cannot be called the second time. | |
469 verify_routines[id] = NULL; | |
470 } | |
471 } | |
472 | |
473 // Verify that response ID matches request ID. | |
474 TEST_F(NativeMessagingHostTest, Id) { | |
475 base::DictionaryValue message; | |
476 message.SetString("type", "hello"); | |
477 WriteMessageToInputPipe(message); | |
478 message.SetString("id", "42"); | |
479 WriteMessageToInputPipe(message); | |
480 | |
481 Run(); | |
482 | |
483 scoped_ptr<base::DictionaryValue> response = | |
484 ReadMessageFromOutputPipe(); | |
485 EXPECT_TRUE(response); | |
486 std::string value; | |
487 EXPECT_FALSE(response->GetString("id", &value)); | |
488 | |
489 response = ReadMessageFromOutputPipe(); | |
490 EXPECT_TRUE(response); | |
491 EXPECT_TRUE(response->GetString("id", &value)); | |
492 EXPECT_EQ("42", value); | |
493 } | |
494 | |
495 // Verify non-Dictionary requests are rejected. | |
496 TEST_F(NativeMessagingHostTest, WrongFormat) { | |
497 base::ListValue message; | |
498 TestBadRequest(message); | |
499 } | |
500 | |
501 // Verify requests with no type are rejected. | |
502 TEST_F(NativeMessagingHostTest, MissingType) { | |
503 base::DictionaryValue message; | |
504 TestBadRequest(message); | |
505 } | |
506 | |
507 // Verify rejection if type is unrecognized. | |
508 TEST_F(NativeMessagingHostTest, InvalidType) { | |
509 base::DictionaryValue message; | |
510 message.SetString("type", "xxx"); | |
511 TestBadRequest(message); | |
512 } | |
513 | |
514 // Verify rejection if getPinHash request has no hostId. | |
515 TEST_F(NativeMessagingHostTest, GetPinHashNoHostId) { | |
516 base::DictionaryValue message; | |
517 message.SetString("type", "getPinHash"); | |
518 message.SetString("pin", "1234"); | |
519 TestBadRequest(message); | |
520 } | |
521 | |
522 // Verify rejection if getPinHash request has no pin. | |
523 TEST_F(NativeMessagingHostTest, GetPinHashNoPin) { | |
524 base::DictionaryValue message; | |
525 message.SetString("type", "getPinHash"); | |
526 message.SetString("hostId", "my_host"); | |
527 TestBadRequest(message); | |
528 } | |
529 | |
530 // Verify rejection if updateDaemonConfig request has invalid config. | |
531 TEST_F(NativeMessagingHostTest, UpdateDaemonConfigInvalidConfig) { | |
532 base::DictionaryValue message; | |
533 message.SetString("type", "updateDaemonConfig"); | |
534 message.SetString("config", "xxx"); | |
535 TestBadRequest(message); | |
536 } | |
537 | |
538 // Verify rejection if startDaemon request has invalid config. | |
539 TEST_F(NativeMessagingHostTest, StartDaemonInvalidConfig) { | |
540 base::DictionaryValue message; | |
541 message.SetString("type", "startDaemon"); | |
542 message.SetString("config", "xxx"); | |
543 message.SetBoolean("consent", true); | |
544 TestBadRequest(message); | |
545 } | |
546 | |
547 // Verify rejection if startDaemon request has no "consent" parameter. | |
548 TEST_F(NativeMessagingHostTest, StartDaemonNoConsent) { | |
549 base::DictionaryValue message; | |
550 message.SetString("type", "startDaemon"); | |
551 message.Set("config", base::DictionaryValue().DeepCopy()); | |
552 TestBadRequest(message); | |
553 } | |
554 | |
555 } // namespace remoting | |
OLD | NEW |