| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/run_loop.h" | 5 #include "base/run_loop.h" |
| 6 #include "base/strings/utf_string_conversions.h" | 6 #include "base/strings/utf_string_conversions.h" |
| 7 #include "base/test/values_test_util.h" | 7 #include "base/test/values_test_util.h" |
| 8 #include "chrome/browser/extensions/test_extension_environment.h" | 8 #include "chrome/browser/extensions/test_extension_environment.h" |
| 9 #include "chrome/test/base/testing_profile.h" | 9 #include "chrome/test/base/testing_profile.h" |
| 10 #include "device/core/device_client.h" |
| 10 #include "device/usb/usb_device.h" | 11 #include "device/usb/usb_device.h" |
| 11 #include "device/usb/usb_device_handle.h" | 12 #include "device/usb/usb_device_handle.h" |
| 12 #include "extensions/browser/api/device_permissions_manager.h" | 13 #include "extensions/browser/api/device_permissions_manager.h" |
| 13 #include "extensions/browser/extension_prefs.h" | 14 #include "extensions/browser/extension_prefs.h" |
| 14 #include "extensions/common/extension.h" | 15 #include "extensions/common/extension.h" |
| 15 #include "testing/gmock/include/gmock/gmock.h" | 16 #include "testing/gmock/include/gmock/gmock.h" |
| 16 #include "testing/gtest/include/gtest/gtest.h" | 17 #include "testing/gtest/include/gtest/gtest.h" |
| 17 | 18 |
| 18 namespace extensions { | 19 namespace extensions { |
| 19 | 20 |
| 20 namespace { | 21 namespace { |
| 21 | 22 |
| 22 using device::UsbDevice; | 23 using device::UsbDevice; |
| 23 using device::UsbDeviceHandle; | 24 using device::UsbDeviceHandle; |
| 25 using device::UsbService; |
| 24 using testing::Return; | 26 using testing::Return; |
| 25 | 27 |
| 28 class MockUsbService : public UsbService { |
| 29 public: |
| 30 MockUsbService() : mock_device_client(this) {} |
| 31 |
| 32 MOCK_METHOD1(GetDeviceById, scoped_refptr<UsbDevice>(uint32)); |
| 33 MOCK_METHOD1(GetDevices, void(std::vector<scoped_refptr<UsbDevice>>*)); |
| 34 |
| 35 // Public wrapper for the protected NotifyDeviceRemove function. |
| 36 void NotifyDeviceRemoved(scoped_refptr<UsbDevice> device) { |
| 37 UsbService::NotifyDeviceRemoved(device); |
| 38 } |
| 39 |
| 40 private: |
| 41 class MockDeviceClient : device::DeviceClient { |
| 42 public: |
| 43 explicit MockDeviceClient(UsbService* usb_service) |
| 44 : usb_service_(usb_service) {} |
| 45 |
| 46 UsbService* GetUsbService() override { return usb_service_; } |
| 47 |
| 48 private: |
| 49 UsbService* usb_service_; |
| 50 }; |
| 51 |
| 52 MockDeviceClient mock_device_client; |
| 53 }; |
| 54 |
| 26 class MockUsbDevice : public UsbDevice { | 55 class MockUsbDevice : public UsbDevice { |
| 27 public: | 56 public: |
| 28 MockUsbDevice(const std::string& serial_number, uint32 unique_id) | 57 MockUsbDevice(const std::string& serial_number, uint32 unique_id) |
| 29 : UsbDevice(0, 0, unique_id), serial_number_(serial_number) {} | 58 : UsbDevice(0, 0, unique_id), serial_number_(serial_number) {} |
| 30 | 59 |
| 31 MOCK_METHOD0(Open, scoped_refptr<UsbDeviceHandle>()); | 60 MOCK_METHOD0(Open, scoped_refptr<UsbDeviceHandle>()); |
| 32 MOCK_METHOD1(Close, bool(scoped_refptr<UsbDeviceHandle>)); | 61 MOCK_METHOD1(Close, bool(scoped_refptr<UsbDeviceHandle>)); |
| 33 #if defined(OS_CHROMEOS) | 62 #if defined(OS_CHROMEOS) |
| 34 MOCK_METHOD2(RequestUsbAccess, void(int, const base::Callback<void(bool)>&)); | 63 MOCK_METHOD2(RequestUsbAccess, void(int, const base::Callback<void(bool)>&)); |
| 35 #endif | 64 #endif |
| (...skipping 13 matching lines...) Expand all Loading... |
| 49 if (serial_number_.empty()) { | 78 if (serial_number_.empty()) { |
| 50 // Return false as if the device does not have or failed to return its | 79 // Return false as if the device does not have or failed to return its |
| 51 // serial number. | 80 // serial number. |
| 52 return false; | 81 return false; |
| 53 } | 82 } |
| 54 | 83 |
| 55 *serial_number = base::UTF8ToUTF16(serial_number_); | 84 *serial_number = base::UTF8ToUTF16(serial_number_); |
| 56 return true; | 85 return true; |
| 57 } | 86 } |
| 58 | 87 |
| 59 void NotifyDisconnect() { UsbDevice::NotifyDisconnect(); } | |
| 60 | |
| 61 private: | 88 private: |
| 62 virtual ~MockUsbDevice() {} | 89 virtual ~MockUsbDevice() {} |
| 63 | 90 |
| 64 const std::string serial_number_; | 91 const std::string serial_number_; |
| 65 }; | 92 }; |
| 66 | 93 |
| 67 void AllowUsbDevice(DevicePermissionsManager* manager, | 94 void AllowUsbDevice(DevicePermissionsManager* manager, |
| 68 const Extension* extension, | 95 const Extension* extension, |
| 69 scoped_refptr<UsbDevice> device) { | 96 scoped_refptr<UsbDevice> device) { |
| 70 // If the device cannot provide any of these strings they will simply by | 97 // If the device cannot provide any of these strings they will simply by |
| 71 // empty. | 98 // empty. |
| 72 base::string16 product; | 99 base::string16 product; |
| 73 device->GetProduct(&product); | 100 device->GetProduct(&product); |
| 74 base::string16 manufacturer; | 101 base::string16 manufacturer; |
| 75 device->GetManufacturer(&manufacturer); | 102 device->GetManufacturer(&manufacturer); |
| 76 base::string16 serial_number; | 103 base::string16 serial_number; |
| 77 device->GetSerialNumber(&serial_number); | 104 device->GetSerialNumber(&serial_number); |
| 78 | 105 |
| 79 manager->AllowUsbDevice( | 106 manager->AllowUsbDevice( |
| 80 extension->id(), device, product, manufacturer, serial_number); | 107 extension->id(), device, product, manufacturer, serial_number); |
| 81 } | 108 } |
| 82 | 109 |
| 83 } // namespace | 110 } // namespace |
| 84 | 111 |
| 85 class DevicePermissionsManagerTest : public testing::Test { | 112 class DevicePermissionsManagerTest : public testing::Test { |
| 86 protected: | 113 protected: |
| 87 void SetUp() override { | 114 void SetUp() override { |
| 88 testing::Test::SetUp(); | 115 testing::Test::SetUp(); |
| 89 env_.GetExtensionPrefs(); // Force creation before adding extensions. | 116 env_.reset(new TestExtensionEnvironment()); |
| 90 extension_ = env_.MakeExtension(*base::test::ParseJson( | 117 env_->GetExtensionPrefs(); // Force creation before adding extensions. |
| 91 "{" | 118 extension_ = |
| 92 " \"app\": {" | 119 env_->MakeExtension(*base::test::ParseJson( |
| 93 " \"background\": {" | 120 "{" |
| 94 " \"scripts\": [\"background.js\"]" | 121 " \"app\": {" |
| 95 " }" | 122 " \"background\": {" |
| 96 " }," | 123 " \"scripts\": [\"background.js\"]" |
| 97 " \"permissions\": [" | 124 " }" |
| 98 " \"usb\"" | 125 " }," |
| 99 " ]" | 126 " \"permissions\": [" |
| 100 "}")); | 127 " \"usb\"" |
| 128 " ]" |
| 129 "}")); |
| 101 device0 = new MockUsbDevice("ABCDE", 0); | 130 device0 = new MockUsbDevice("ABCDE", 0); |
| 102 device1 = new MockUsbDevice("", 1); | 131 device1 = new MockUsbDevice("", 1); |
| 103 device2 = new MockUsbDevice("12345", 2); | 132 device2 = new MockUsbDevice("12345", 2); |
| 104 device3 = new MockUsbDevice("", 3); | 133 device3 = new MockUsbDevice("", 3); |
| 134 usb_service_ = new MockUsbService(); |
| 135 UsbService::SetInstanceForTest(usb_service_); |
| 105 } | 136 } |
| 106 | 137 |
| 107 extensions::TestExtensionEnvironment env_; | 138 void TearDown() override { |
| 139 env_.reset(nullptr); |
| 140 UsbService::SetInstanceForTest(nullptr); |
| 141 } |
| 142 |
| 143 scoped_ptr<extensions::TestExtensionEnvironment> env_; |
| 108 const extensions::Extension* extension_; | 144 const extensions::Extension* extension_; |
| 145 MockUsbService* usb_service_; |
| 109 scoped_refptr<MockUsbDevice> device0; | 146 scoped_refptr<MockUsbDevice> device0; |
| 110 scoped_refptr<MockUsbDevice> device1; | 147 scoped_refptr<MockUsbDevice> device1; |
| 111 scoped_refptr<MockUsbDevice> device2; | 148 scoped_refptr<MockUsbDevice> device2; |
| 112 scoped_refptr<MockUsbDevice> device3; | 149 scoped_refptr<MockUsbDevice> device3; |
| 113 }; | 150 }; |
| 114 | 151 |
| 115 TEST_F(DevicePermissionsManagerTest, AllowAndClearDevices) { | 152 TEST_F(DevicePermissionsManagerTest, AllowAndClearDevices) { |
| 116 DevicePermissionsManager* manager = | 153 DevicePermissionsManager* manager = |
| 117 DevicePermissionsManager::Get(env_.profile()); | 154 DevicePermissionsManager::Get(env_->profile()); |
| 118 AllowUsbDevice(manager, extension_, device0); | 155 AllowUsbDevice(manager, extension_, device0); |
| 119 AllowUsbDevice(manager, extension_, device1); | 156 AllowUsbDevice(manager, extension_, device1); |
| 120 | 157 |
| 121 scoped_ptr<DevicePermissions> device_permissions = | 158 scoped_ptr<DevicePermissions> device_permissions = |
| 122 manager->GetForExtension(extension_->id()); | 159 manager->GetForExtension(extension_->id()); |
| 123 scoped_refptr<DevicePermissionEntry> device0_entry = | 160 scoped_refptr<DevicePermissionEntry> device0_entry = |
| 124 device_permissions->FindEntry(device0); | 161 device_permissions->FindEntry(device0); |
| 125 ASSERT_TRUE(device0_entry.get()); | 162 ASSERT_TRUE(device0_entry.get()); |
| 126 scoped_refptr<DevicePermissionEntry> device1_entry = | 163 scoped_refptr<DevicePermissionEntry> device1_entry = |
| 127 device_permissions->FindEntry(device1); | 164 device_permissions->FindEntry(device1); |
| (...skipping 23 matching lines...) Expand all Loading... |
| 151 | 188 |
| 152 device_permissions = manager->GetForExtension(extension_->id()); | 189 device_permissions = manager->GetForExtension(extension_->id()); |
| 153 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); | 190 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); |
| 154 ASSERT_TRUE(device_permissions->FindEntry(device1).get()); | 191 ASSERT_TRUE(device_permissions->FindEntry(device1).get()); |
| 155 ASSERT_FALSE(device_permissions->FindEntry(device2).get()); | 192 ASSERT_FALSE(device_permissions->FindEntry(device2).get()); |
| 156 ASSERT_FALSE(device_permissions->FindEntry(device3).get()); | 193 ASSERT_FALSE(device_permissions->FindEntry(device3).get()); |
| 157 } | 194 } |
| 158 | 195 |
| 159 TEST_F(DevicePermissionsManagerTest, SuspendExtension) { | 196 TEST_F(DevicePermissionsManagerTest, SuspendExtension) { |
| 160 DevicePermissionsManager* manager = | 197 DevicePermissionsManager* manager = |
| 161 DevicePermissionsManager::Get(env_.profile()); | 198 DevicePermissionsManager::Get(env_->profile()); |
| 162 AllowUsbDevice(manager, extension_, device0); | 199 AllowUsbDevice(manager, extension_, device0); |
| 163 AllowUsbDevice(manager, extension_, device1); | 200 AllowUsbDevice(manager, extension_, device1); |
| 164 | 201 |
| 165 scoped_ptr<DevicePermissions> device_permissions = | 202 scoped_ptr<DevicePermissions> device_permissions = |
| 166 manager->GetForExtension(extension_->id()); | 203 manager->GetForExtension(extension_->id()); |
| 167 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); | 204 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); |
| 168 ASSERT_TRUE(device_permissions->FindEntry(device1).get()); | 205 ASSERT_TRUE(device_permissions->FindEntry(device1).get()); |
| 169 ASSERT_FALSE(device_permissions->FindEntry(device2).get()); | 206 ASSERT_FALSE(device_permissions->FindEntry(device2).get()); |
| 170 ASSERT_FALSE(device_permissions->FindEntry(device3).get()); | 207 ASSERT_FALSE(device_permissions->FindEntry(device3).get()); |
| 171 | 208 |
| 172 manager->OnBackgroundHostClose(extension_->id()); | 209 manager->OnBackgroundHostClose(extension_->id()); |
| 173 | 210 |
| 174 device_permissions = manager->GetForExtension(extension_->id()); | 211 device_permissions = manager->GetForExtension(extension_->id()); |
| 175 // Device 0 is still registered because its serial number has been stored in | 212 // Device 0 is still registered because its serial number has been stored in |
| 176 // ExtensionPrefs, it is "persistent". | 213 // ExtensionPrefs, it is "persistent". |
| 177 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); | 214 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); |
| 178 // Device 1 does not have uniquely identifying traits and so permission to | 215 // Device 1 does not have uniquely identifying traits and so permission to |
| 179 // open it has been dropped when the app's windows have closed and the | 216 // open it has been dropped when the app's windows have closed and the |
| 180 // background page has been suspended. | 217 // background page has been suspended. |
| 181 ASSERT_FALSE(device_permissions->FindEntry(device1).get()); | 218 ASSERT_FALSE(device_permissions->FindEntry(device1).get()); |
| 182 ASSERT_FALSE(device_permissions->FindEntry(device2).get()); | 219 ASSERT_FALSE(device_permissions->FindEntry(device2).get()); |
| 183 ASSERT_FALSE(device_permissions->FindEntry(device3).get()); | 220 ASSERT_FALSE(device_permissions->FindEntry(device3).get()); |
| 184 } | 221 } |
| 185 | 222 |
| 186 TEST_F(DevicePermissionsManagerTest, DisconnectDevice) { | 223 TEST_F(DevicePermissionsManagerTest, DisconnectDevice) { |
| 187 DevicePermissionsManager* manager = | 224 DevicePermissionsManager* manager = |
| 188 DevicePermissionsManager::Get(env_.profile()); | 225 DevicePermissionsManager::Get(env_->profile()); |
| 189 AllowUsbDevice(manager, extension_, device0); | 226 AllowUsbDevice(manager, extension_, device0); |
| 190 AllowUsbDevice(manager, extension_, device1); | 227 AllowUsbDevice(manager, extension_, device1); |
| 191 | 228 |
| 192 scoped_ptr<DevicePermissions> device_permissions = | 229 scoped_ptr<DevicePermissions> device_permissions = |
| 193 manager->GetForExtension(extension_->id()); | 230 manager->GetForExtension(extension_->id()); |
| 194 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); | 231 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); |
| 195 ASSERT_TRUE(device_permissions->FindEntry(device1).get()); | 232 ASSERT_TRUE(device_permissions->FindEntry(device1).get()); |
| 196 ASSERT_FALSE(device_permissions->FindEntry(device2).get()); | 233 ASSERT_FALSE(device_permissions->FindEntry(device2).get()); |
| 197 ASSERT_FALSE(device_permissions->FindEntry(device3).get()); | 234 ASSERT_FALSE(device_permissions->FindEntry(device3).get()); |
| 198 | 235 |
| 199 device0->NotifyDisconnect(); | 236 usb_service_->NotifyDeviceRemoved(device0); |
| 200 device1->NotifyDisconnect(); | 237 usb_service_->NotifyDeviceRemoved(device1); |
| 201 | 238 |
| 202 device_permissions = manager->GetForExtension(extension_->id()); | 239 device_permissions = manager->GetForExtension(extension_->id()); |
| 203 // Device 0 will be accessible when it is reconnected because it can be | 240 // Device 0 will be accessible when it is reconnected because it can be |
| 204 // recognized by its serial number. | 241 // recognized by its serial number. |
| 205 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); | 242 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); |
| 206 // Device 1 does not have a serial number and cannot be distinguished from | 243 // Device 1 does not have a serial number and cannot be distinguished from |
| 207 // any other device of the same model so the app must request permission again | 244 // any other device of the same model so the app must request permission again |
| 208 // when it is reconnected. | 245 // when it is reconnected. |
| 209 ASSERT_FALSE(device_permissions->FindEntry(device1).get()); | 246 ASSERT_FALSE(device_permissions->FindEntry(device1).get()); |
| 210 ASSERT_FALSE(device_permissions->FindEntry(device2).get()); | 247 ASSERT_FALSE(device_permissions->FindEntry(device2).get()); |
| 211 ASSERT_FALSE(device_permissions->FindEntry(device3).get()); | 248 ASSERT_FALSE(device_permissions->FindEntry(device3).get()); |
| 212 } | 249 } |
| 213 | 250 |
| 214 TEST_F(DevicePermissionsManagerTest, RevokeAndRegrantAccess) { | 251 TEST_F(DevicePermissionsManagerTest, RevokeAndRegrantAccess) { |
| 215 DevicePermissionsManager* manager = | 252 DevicePermissionsManager* manager = |
| 216 DevicePermissionsManager::Get(env_.profile()); | 253 DevicePermissionsManager::Get(env_->profile()); |
| 217 AllowUsbDevice(manager, extension_, device0); | 254 AllowUsbDevice(manager, extension_, device0); |
| 218 AllowUsbDevice(manager, extension_, device1); | 255 AllowUsbDevice(manager, extension_, device1); |
| 219 | 256 |
| 220 scoped_ptr<DevicePermissions> device_permissions = | 257 scoped_ptr<DevicePermissions> device_permissions = |
| 221 manager->GetForExtension(extension_->id()); | 258 manager->GetForExtension(extension_->id()); |
| 222 scoped_refptr<DevicePermissionEntry> device0_entry = | 259 scoped_refptr<DevicePermissionEntry> device0_entry = |
| 223 device_permissions->FindEntry(device0); | 260 device_permissions->FindEntry(device0); |
| 224 ASSERT_TRUE(device0_entry.get()); | 261 ASSERT_TRUE(device0_entry.get()); |
| 225 scoped_refptr<DevicePermissionEntry> device1_entry = | 262 scoped_refptr<DevicePermissionEntry> device1_entry = |
| 226 device_permissions->FindEntry(device1); | 263 device_permissions->FindEntry(device1); |
| (...skipping 15 matching lines...) Expand all Loading... |
| 242 ASSERT_FALSE(device_permissions->FindEntry(device1).get()); | 279 ASSERT_FALSE(device_permissions->FindEntry(device1).get()); |
| 243 | 280 |
| 244 AllowUsbDevice(manager, extension_, device1); | 281 AllowUsbDevice(manager, extension_, device1); |
| 245 device_permissions = manager->GetForExtension(extension_->id()); | 282 device_permissions = manager->GetForExtension(extension_->id()); |
| 246 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); | 283 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); |
| 247 ASSERT_TRUE(device_permissions->FindEntry(device1).get()); | 284 ASSERT_TRUE(device_permissions->FindEntry(device1).get()); |
| 248 } | 285 } |
| 249 | 286 |
| 250 TEST_F(DevicePermissionsManagerTest, UpdateLastUsed) { | 287 TEST_F(DevicePermissionsManagerTest, UpdateLastUsed) { |
| 251 DevicePermissionsManager* manager = | 288 DevicePermissionsManager* manager = |
| 252 DevicePermissionsManager::Get(env_.profile()); | 289 DevicePermissionsManager::Get(env_->profile()); |
| 253 AllowUsbDevice(manager, extension_, device0); | 290 AllowUsbDevice(manager, extension_, device0); |
| 254 | 291 |
| 255 scoped_ptr<DevicePermissions> device_permissions = | 292 scoped_ptr<DevicePermissions> device_permissions = |
| 256 manager->GetForExtension(extension_->id()); | 293 manager->GetForExtension(extension_->id()); |
| 257 scoped_refptr<DevicePermissionEntry> device0_entry = | 294 scoped_refptr<DevicePermissionEntry> device0_entry = |
| 258 device_permissions->FindEntry(device0); | 295 device_permissions->FindEntry(device0); |
| 259 ASSERT_TRUE(device0_entry->last_used().is_null()); | 296 ASSERT_TRUE(device0_entry->last_used().is_null()); |
| 260 | 297 |
| 261 manager->UpdateLastUsed(extension_->id(), device0_entry); | 298 manager->UpdateLastUsed(extension_->id(), device0_entry); |
| 262 device_permissions = manager->GetForExtension(extension_->id()); | 299 device_permissions = manager->GetForExtension(extension_->id()); |
| 263 device0_entry = device_permissions->FindEntry(device0); | 300 device0_entry = device_permissions->FindEntry(device0); |
| 264 ASSERT_FALSE(device0_entry->last_used().is_null()); | 301 ASSERT_FALSE(device0_entry->last_used().is_null()); |
| 265 } | 302 } |
| 266 | 303 |
| 267 TEST_F(DevicePermissionsManagerTest, LoadPrefs) { | 304 TEST_F(DevicePermissionsManagerTest, LoadPrefs) { |
| 268 scoped_ptr<base::Value> prefs_value = base::test::ParseJson( | 305 scoped_ptr<base::Value> prefs_value = base::test::ParseJson( |
| 269 "[" | 306 "[" |
| 270 " {" | 307 " {" |
| 271 " \"product_id\": 0," | 308 " \"product_id\": 0," |
| 272 " \"serial_number\": \"ABCDE\"," | 309 " \"serial_number\": \"ABCDE\"," |
| 273 " \"type\": \"usb\"," | 310 " \"type\": \"usb\"," |
| 274 " \"vendor_id\": 0" | 311 " \"vendor_id\": 0" |
| 275 " }" | 312 " }" |
| 276 "]"); | 313 "]"); |
| 277 env_.GetExtensionPrefs()->UpdateExtensionPref( | 314 env_->GetExtensionPrefs()->UpdateExtensionPref(extension_->id(), "devices", |
| 278 extension_->id(), "devices", prefs_value.release()); | 315 prefs_value.release()); |
| 279 | 316 |
| 280 DevicePermissionsManager* manager = | 317 DevicePermissionsManager* manager = |
| 281 DevicePermissionsManager::Get(env_.profile()); | 318 DevicePermissionsManager::Get(env_->profile()); |
| 282 scoped_ptr<DevicePermissions> device_permissions = | 319 scoped_ptr<DevicePermissions> device_permissions = |
| 283 manager->GetForExtension(extension_->id()); | 320 manager->GetForExtension(extension_->id()); |
| 284 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); | 321 ASSERT_TRUE(device_permissions->FindEntry(device0).get()); |
| 285 ASSERT_FALSE(device_permissions->FindEntry(device1).get()); | 322 ASSERT_FALSE(device_permissions->FindEntry(device1).get()); |
| 286 ASSERT_FALSE(device_permissions->FindEntry(device2).get()); | 323 ASSERT_FALSE(device_permissions->FindEntry(device2).get()); |
| 287 ASSERT_FALSE(device_permissions->FindEntry(device3).get()); | 324 ASSERT_FALSE(device_permissions->FindEntry(device3).get()); |
| 288 } | 325 } |
| 289 | 326 |
| 290 } // namespace extensions | 327 } // namespace extensions |
| OLD | NEW |