| Index: chromeos/cryptohome/homedir_methods_unittest.cc
|
| diff --git a/chromeos/cryptohome/homedir_methods_unittest.cc b/chromeos/cryptohome/homedir_methods_unittest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..bbebf95900d8904c48b92cf7ef2c7497e3841e91
|
| --- /dev/null
|
| +++ b/chromeos/cryptohome/homedir_methods_unittest.cc
|
| @@ -0,0 +1,188 @@
|
| +// Copyright 2014 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "chromeos/cryptohome/homedir_methods.h"
|
| +
|
| +#include "base/bind.h"
|
| +#include "base/bind_helpers.h"
|
| +#include "base/compiler_specific.h"
|
| +#include "base/memory/scoped_ptr.h"
|
| +#include "chromeos/dbus/cryptohome/rpc.pb.h"
|
| +#include "chromeos/dbus/cryptohome_client.h"
|
| +#include "chromeos/dbus/dbus_method_call_status.h"
|
| +#include "chromeos/dbus/dbus_thread_manager.h"
|
| +#include "chromeos/dbus/fake_dbus_thread_manager.h"
|
| +#include "chromeos/dbus/mock_cryptohome_client.h"
|
| +#include "testing/gmock/include/gmock/gmock.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +using testing::_;
|
| +using testing::Invoke;
|
| +using testing::WithArg;
|
| +
|
| +namespace cryptohome {
|
| +
|
| +namespace {
|
| +
|
| +MATCHER_P(EqualsProto, expected_proto, "") {
|
| + std::string expected_value;
|
| + expected_proto.SerializeToString(&expected_value);
|
| + std::string actual_value;
|
| + arg.SerializeToString(&actual_value);
|
| + return actual_value == expected_value;
|
| +}
|
| +
|
| +} // namespace
|
| +
|
| +const char kUserID[] = "user@example.com";
|
| +const char kKeyLabel[] = "key_label";
|
| +
|
| +const int64 kKeyRevision = 123;
|
| +const char kProviderData1Name[] = "data_1";
|
| +const int64 kProviderData1Number = 12345;
|
| +const char kProviderData2Name[] = "data_2";
|
| +const char kProviderData2Bytes[] = "data_2 bytes";
|
| +
|
| +class HomedirMethodsTest : public testing::Test {
|
| + public:
|
| + HomedirMethodsTest();
|
| + virtual ~HomedirMethodsTest();
|
| +
|
| + // testing::Test:
|
| + virtual void SetUp() OVERRIDE;
|
| + virtual void TearDown() OVERRIDE;
|
| +
|
| + void RunProtobufMethodCallback(
|
| + const chromeos::CryptohomeClient::ProtobufMethodCallback& callback);
|
| +
|
| + void StoreGetKeyDataExResult(bool success,
|
| + MountError return_code,
|
| + ScopedVector<RetrievedKeyData> key_data);
|
| +
|
| + protected:
|
| + chromeos::MockCryptohomeClient* cryptohome_client_;
|
| +
|
| + // The reply that |cryptohome_client_| will make.
|
| + cryptohome::BaseReply cryptohome_reply_;
|
| +
|
| + // The results of the most recent |HomedirMethods| method call.
|
| + bool success_;
|
| + MountError return_code_;
|
| + ScopedVector<RetrievedKeyData> key_data_;
|
| +
|
| + private:
|
| + DISALLOW_COPY_AND_ASSIGN(HomedirMethodsTest);
|
| +};
|
| +
|
| +HomedirMethodsTest::HomedirMethodsTest() : cryptohome_client_(NULL),
|
| + success_(false),
|
| + return_code_(MOUNT_ERROR_FATAL) {
|
| +}
|
| +
|
| +HomedirMethodsTest::~HomedirMethodsTest() {
|
| +}
|
| +
|
| +void HomedirMethodsTest::SetUp() {
|
| + scoped_ptr<chromeos::MockCryptohomeClient> cryptohome_client(
|
| + new chromeos::MockCryptohomeClient);
|
| + cryptohome_client_ = cryptohome_client.get();
|
| + scoped_ptr<chromeos::FakeDBusThreadManager> dbus_manager(
|
| + new chromeos::FakeDBusThreadManager);
|
| + dbus_manager->SetCryptohomeClient(
|
| + cryptohome_client.PassAs<chromeos::CryptohomeClient>());
|
| + chromeos::DBusThreadManager::InitializeForTesting(dbus_manager.release());
|
| + HomedirMethods::Initialize();
|
| +}
|
| +
|
| +void HomedirMethodsTest::TearDown() {
|
| + HomedirMethods::Shutdown();
|
| + chromeos::DBusThreadManager::Shutdown();
|
| +}
|
| +
|
| +void HomedirMethodsTest::RunProtobufMethodCallback(
|
| + const chromeos::CryptohomeClient::ProtobufMethodCallback& callback) {
|
| + callback.Run(chromeos::DBUS_METHOD_CALL_SUCCESS,
|
| + true,
|
| + cryptohome_reply_);
|
| +}
|
| +
|
| +void HomedirMethodsTest::StoreGetKeyDataExResult(
|
| + bool success,
|
| + MountError return_code,
|
| + ScopedVector<RetrievedKeyData> key_data) {
|
| + success_ = success;
|
| + return_code_ = return_code;
|
| + key_data_.swap(key_data);
|
| +}
|
| +
|
| +// Verifies that the result of a GetKeyDataEx() call is correctly parsed.
|
| +TEST_F(HomedirMethodsTest, GetKeyDataEx) {
|
| + AccountIdentifier expected_id;
|
| + expected_id.set_email(kUserID);
|
| + const cryptohome::AuthorizationRequest expected_auth;
|
| + cryptohome::GetKeyDataRequest expected_request;
|
| + expected_request.mutable_key()->mutable_data()->set_label(kKeyLabel);
|
| +
|
| + EXPECT_CALL(*cryptohome_client_,
|
| + GetKeyDataEx(EqualsProto(expected_id),
|
| + EqualsProto(expected_auth),
|
| + EqualsProto(expected_request),
|
| + _))
|
| + .Times(1)
|
| + .WillOnce(WithArg<3>(Invoke(
|
| + this,
|
| + &HomedirMethodsTest::RunProtobufMethodCallback)));
|
| +
|
| + // Set up the reply that |cryptohome_client_| will make.
|
| + cryptohome::GetKeyDataReply* reply =
|
| + cryptohome_reply_.MutableExtension(cryptohome::GetKeyDataReply::reply);
|
| + KeyData* key_data = reply->add_key_data();
|
| + key_data->set_type(KeyData::KEY_TYPE_PASSWORD);
|
| + key_data->set_label(kKeyLabel);
|
| + key_data->mutable_privileges()->set_update(false);
|
| + key_data->set_revision(kKeyRevision);
|
| + key_data->add_authorization_data()->set_type(
|
| + KeyAuthorizationData::KEY_AUTHORIZATION_TYPE_HMACSHA256);
|
| + KeyProviderData* data = key_data->mutable_provider_data();
|
| + KeyProviderData::Entry* entry = data->add_entry();
|
| + entry->set_name(kProviderData1Name);
|
| + entry->set_number(kProviderData1Number);
|
| + entry = data->add_entry();
|
| + entry->set_name(kProviderData2Name);
|
| + entry->set_bytes(kProviderData2Bytes);
|
| +
|
| + // Call GetKeyDataEx().
|
| + HomedirMethods::GetInstance()->GetKeyDataEx(
|
| + Identification(kUserID),
|
| + kKeyLabel,
|
| + base::Bind(&HomedirMethodsTest::StoreGetKeyDataExResult,
|
| + base::Unretained(this)));
|
| +
|
| + // Verify that the call was successful and the result was correctly parsed.
|
| + EXPECT_TRUE(success_);
|
| + EXPECT_EQ(MOUNT_ERROR_NONE, return_code_);
|
| + ASSERT_EQ(1u, key_data_.size());
|
| + const RetrievedKeyData* retrieved_key_data = key_data_.front();
|
| + EXPECT_EQ(RetrievedKeyData::TYPE_PASSWORD, retrieved_key_data->type);
|
| + EXPECT_EQ(PRIV_MOUNT | PRIV_ADD | PRIV_REMOVE,
|
| + retrieved_key_data->privileges);
|
| + EXPECT_EQ(kKeyRevision, retrieved_key_data->revision);
|
| + ASSERT_EQ(1u, retrieved_key_data->authorization_types.size());
|
| + EXPECT_EQ(RetrievedKeyData::AUTHORIZATION_TYPE_HMACSHA256,
|
| + retrieved_key_data->authorization_types.front());
|
| + ASSERT_EQ(2u, retrieved_key_data->provider_data.size());
|
| + const RetrievedKeyData::ProviderData* provider_data =
|
| + retrieved_key_data->provider_data[0];
|
| + EXPECT_EQ(kProviderData1Name, provider_data->name);
|
| + ASSERT_TRUE(provider_data->number);
|
| + EXPECT_EQ(kProviderData1Number, *provider_data->number.get());
|
| + EXPECT_FALSE(provider_data->bytes);
|
| + provider_data = retrieved_key_data->provider_data[1];
|
| + EXPECT_EQ(kProviderData2Name, provider_data->name);
|
| + EXPECT_FALSE(provider_data->number);
|
| + ASSERT_TRUE(provider_data->bytes);
|
| + EXPECT_EQ(kProviderData2Bytes, *provider_data->bytes.get());
|
| +}
|
| +
|
| +} // namespace cryptohome
|
|
|