Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(773)

Side by Side Diff: chrome/browser/extensions/api/device_permissions_manager_unittest.cc

Issue 826283002: Add support for sending a USB SET_CONFIGURATION request. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Rebased. Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « chrome/browser/devtools/device/usb/android_usb_device.cc ('k') | device/usb/usb_device.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/run_loop.h" 5 #include "base/run_loop.h"
6 #include "base/strings/utf_string_conversions.h" 6 #include "base/strings/utf_string_conversions.h"
7 #include "base/test/values_test_util.h" 7 #include "base/test/values_test_util.h"
8 #include "chrome/browser/extensions/test_extension_environment.h" 8 #include "chrome/browser/extensions/test_extension_environment.h"
9 #include "chrome/test/base/testing_profile.h" 9 #include "chrome/test/base/testing_profile.h"
10 #include "device/core/device_client.h" 10 #include "device/core/device_client.h"
11 #include "device/usb/usb_device.h" 11 #include "device/usb/usb_device.h"
12 #include "device/usb/usb_device_handle.h" 12 #include "device/usb/usb_device_handle.h"
13 #include "extensions/browser/api/device_permissions_manager.h" 13 #include "extensions/browser/api/device_permissions_manager.h"
14 #include "extensions/browser/extension_prefs.h" 14 #include "extensions/browser/extension_prefs.h"
15 #include "extensions/common/extension.h" 15 #include "extensions/common/extension.h"
16 #include "testing/gmock/include/gmock/gmock.h" 16 #include "testing/gmock/include/gmock/gmock.h"
17 #include "testing/gtest/include/gtest/gtest.h" 17 #include "testing/gtest/include/gtest/gtest.h"
18 18
19 namespace extensions { 19 namespace extensions {
20 20
21 namespace { 21 namespace {
22 22
23 using device::UsbDevice; 23 using device::UsbDevice;
24 using device::UsbDeviceHandle; 24 using device::UsbDeviceHandle;
25 using device::UsbService; 25 using device::UsbService;
26 using testing::_;
27 using testing::DoAll;
26 using testing::Return; 28 using testing::Return;
29 using testing::SetArgPointee;
30
31 int next_id;
27 32
28 class MockUsbService : public UsbService { 33 class MockUsbService : public UsbService {
29 public: 34 public:
30 MockUsbService() : mock_device_client(this) {} 35 MockUsbService() : mock_device_client(this) {}
31 36
32 MOCK_METHOD1(GetDeviceById, scoped_refptr<UsbDevice>(uint32)); 37 MOCK_METHOD1(GetDeviceById, scoped_refptr<UsbDevice>(uint32));
33 MOCK_METHOD1(GetDevices, void(std::vector<scoped_refptr<UsbDevice>>*)); 38 MOCK_METHOD1(GetDevices, void(std::vector<scoped_refptr<UsbDevice>>*));
34 39
35 // Public wrapper for the protected NotifyDeviceRemove function. 40 // Public wrapper for the protected NotifyDeviceRemove function.
36 void NotifyDeviceRemoved(scoped_refptr<UsbDevice> device) { 41 void NotifyDeviceRemoved(scoped_refptr<UsbDevice> device) {
(...skipping 10 matching lines...) Expand all
47 52
48 private: 53 private:
49 UsbService* usb_service_; 54 UsbService* usb_service_;
50 }; 55 };
51 56
52 MockDeviceClient mock_device_client; 57 MockDeviceClient mock_device_client;
53 }; 58 };
54 59
55 class MockUsbDevice : public UsbDevice { 60 class MockUsbDevice : public UsbDevice {
56 public: 61 public:
57 MockUsbDevice(const std::string& serial_number, uint32 unique_id) 62 explicit MockUsbDevice(const std::string& serial_number)
58 : UsbDevice(0, 0, unique_id), serial_number_(serial_number) {} 63 : UsbDevice(0, 0, next_id++) {
64 if (serial_number.empty()) {
65 EXPECT_CALL(*this, GetSerialNumber(_)).WillRepeatedly(Return(false));
66 } else {
67 EXPECT_CALL(*this, GetSerialNumber(_))
68 .WillRepeatedly(
69 DoAll(SetArgPointee<0>(base::ASCIIToUTF16(serial_number)),
70 Return(true)));
71 }
59 72
73 EXPECT_CALL(*this, GetProduct(_))
74 .WillRepeatedly(
75 DoAll(SetArgPointee<0>(base::ASCIIToUTF16("Test Product")),
76 Return(true)));
77 EXPECT_CALL(*this, GetManufacturer(_))
78 .WillRepeatedly(
79 DoAll(SetArgPointee<0>(base::ASCIIToUTF16("Test Manufacturer")),
80 Return(true)));
81 }
82
83 MOCK_METHOD2(RequestUsbAccess, void(int, const base::Callback<void(bool)>&));
60 MOCK_METHOD0(Open, scoped_refptr<UsbDeviceHandle>()); 84 MOCK_METHOD0(Open, scoped_refptr<UsbDeviceHandle>());
61 MOCK_METHOD1(Close, bool(scoped_refptr<UsbDeviceHandle>)); 85 MOCK_METHOD1(Close, bool(scoped_refptr<UsbDeviceHandle>));
62 #if defined(OS_CHROMEOS) 86 MOCK_METHOD0(GetConfiguration, const device::UsbConfigDescriptor*());
63 MOCK_METHOD2(RequestUsbAccess, void(int, const base::Callback<void(bool)>&)); 87 MOCK_METHOD1(GetManufacturer, bool(base::string16*));
64 #endif 88 MOCK_METHOD1(GetProduct, bool(base::string16*));
65 MOCK_METHOD0(GetConfiguration, const device::UsbConfigDescriptor&()); 89 MOCK_METHOD1(GetSerialNumber, bool(base::string16*));
66
67 virtual bool GetManufacturer(base::string16* manufacturer) {
68 *manufacturer = base::ASCIIToUTF16("Test Manufacturer");
69 return true;
70 }
71
72 virtual bool GetProduct(base::string16* product) {
73 *product = base::ASCIIToUTF16("Test Product");
74 return true;
75 }
76
77 virtual bool GetSerialNumber(base::string16* serial_number) override {
78 if (serial_number_.empty()) {
79 // Return false as if the device does not have or failed to return its
80 // serial number.
81 return false;
82 }
83
84 *serial_number = base::UTF8ToUTF16(serial_number_);
85 return true;
86 }
87 90
88 private: 91 private:
89 virtual ~MockUsbDevice() {} 92 virtual ~MockUsbDevice() {}
90
91 const std::string serial_number_;
92 }; 93 };
93 94
94 void AllowUsbDevice(DevicePermissionsManager* manager, 95 void AllowUsbDevice(DevicePermissionsManager* manager,
95 const Extension* extension, 96 const Extension* extension,
96 scoped_refptr<UsbDevice> device) { 97 scoped_refptr<UsbDevice> device) {
97 // If the device cannot provide any of these strings they will simply by 98 // If the device cannot provide any of these strings they will simply by
98 // empty. 99 // empty.
99 base::string16 product; 100 base::string16 product;
100 device->GetProduct(&product); 101 device->GetProduct(&product);
101 base::string16 manufacturer; 102 base::string16 manufacturer;
(...skipping 27 matching lines...) Expand all
129 "{" 130 "{"
130 " \"app\": {" 131 " \"app\": {"
131 " \"background\": {" 132 " \"background\": {"
132 " \"scripts\": [\"background.js\"]" 133 " \"scripts\": [\"background.js\"]"
133 " }" 134 " }"
134 " }," 135 " },"
135 " \"permissions\": [" 136 " \"permissions\": ["
136 " \"usb\"" 137 " \"usb\""
137 " ]" 138 " ]"
138 "}")); 139 "}"));
139 device0 = new MockUsbDevice("ABCDE", 0); 140 device0_ = new MockUsbDevice("ABCDE");
140 device1 = new MockUsbDevice("", 1); 141 device1_ = new MockUsbDevice("");
141 device2 = new MockUsbDevice("12345", 2); 142 device2_ = new MockUsbDevice("12345");
142 device3 = new MockUsbDevice("", 3); 143 device3_ = new MockUsbDevice("");
143 usb_service_ = new MockUsbService(); 144 usb_service_ = new MockUsbService();
144 UsbService::SetInstanceForTest(usb_service_); 145 UsbService::SetInstanceForTest(usb_service_);
145 } 146 }
146 147
147 void TearDown() override { 148 void TearDown() override {
148 env_.reset(nullptr); 149 env_.reset(nullptr);
149 UsbService::SetInstanceForTest(nullptr); 150 UsbService::SetInstanceForTest(nullptr);
150 } 151 }
151 152
152 scoped_ptr<extensions::TestExtensionEnvironment> env_; 153 scoped_ptr<extensions::TestExtensionEnvironment> env_;
153 const extensions::Extension* extension_; 154 const extensions::Extension* extension_;
154 MockUsbService* usb_service_; 155 MockUsbService* usb_service_;
155 scoped_refptr<MockUsbDevice> device0; 156 scoped_refptr<MockUsbDevice> device0_;
156 scoped_refptr<MockUsbDevice> device1; 157 scoped_refptr<MockUsbDevice> device1_;
157 scoped_refptr<MockUsbDevice> device2; 158 scoped_refptr<MockUsbDevice> device2_;
158 scoped_refptr<MockUsbDevice> device3; 159 scoped_refptr<MockUsbDevice> device3_;
159 }; 160 };
160 161
161 TEST_F(DevicePermissionsManagerTest, AllowAndClearDevices) { 162 TEST_F(DevicePermissionsManagerTest, AllowAndClearDevices) {
162 DevicePermissionsManager* manager = 163 DevicePermissionsManager* manager =
163 DevicePermissionsManager::Get(env_->profile()); 164 DevicePermissionsManager::Get(env_->profile());
164 AllowUsbDevice(manager, extension_, device0); 165 AllowUsbDevice(manager, extension_, device0_);
165 AllowUsbDevice(manager, extension_, device1); 166 AllowUsbDevice(manager, extension_, device1_);
166 167
167 scoped_ptr<DevicePermissions> device_permissions = 168 scoped_ptr<DevicePermissions> device_permissions =
168 manager->GetForExtension(extension_->id()); 169 manager->GetForExtension(extension_->id());
169 scoped_refptr<DevicePermissionEntry> device0_entry = 170 scoped_refptr<DevicePermissionEntry> device0_entry =
170 FindEntry(device_permissions.get(), device0); 171 FindEntry(device_permissions.get(), device0_);
171 ASSERT_TRUE(device0_entry.get()); 172 ASSERT_TRUE(device0_entry.get());
172 scoped_refptr<DevicePermissionEntry> device1_entry = 173 scoped_refptr<DevicePermissionEntry> device1_entry =
173 FindEntry(device_permissions.get(), device1); 174 FindEntry(device_permissions.get(), device1_);
174 ASSERT_TRUE(device1_entry.get()); 175 ASSERT_TRUE(device1_entry.get());
175 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); 176 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get());
176 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); 177 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get());
177 ASSERT_EQ(2U, device_permissions->entries().size()); 178 ASSERT_EQ(2U, device_permissions->entries().size());
178 179
179 ASSERT_EQ(base::ASCIIToUTF16( 180 ASSERT_EQ(base::ASCIIToUTF16(
180 "Test Product from Test Manufacturer (serial number ABCDE)"), 181 "Test Product from Test Manufacturer (serial number ABCDE)"),
181 device0_entry->GetPermissionMessageString()); 182 device0_entry->GetPermissionMessageString());
182 ASSERT_EQ(base::ASCIIToUTF16("Test Product from Test Manufacturer"), 183 ASSERT_EQ(base::ASCIIToUTF16("Test Product from Test Manufacturer"),
183 device1_entry->GetPermissionMessageString()); 184 device1_entry->GetPermissionMessageString());
184 185
185 manager->Clear(extension_->id()); 186 manager->Clear(extension_->id());
186 187
187 device_permissions = manager->GetForExtension(extension_->id()); 188 device_permissions = manager->GetForExtension(extension_->id());
188 ASSERT_FALSE(FindEntry(device_permissions.get(), device0).get()); 189 ASSERT_FALSE(FindEntry(device_permissions.get(), device0_).get());
189 ASSERT_FALSE(FindEntry(device_permissions.get(), device1).get()); 190 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get());
190 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); 191 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get());
191 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); 192 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get());
192 ASSERT_EQ(0U, device_permissions->entries().size()); 193 ASSERT_EQ(0U, device_permissions->entries().size());
193 194
194 // After clearing device it should be possible to grant permission again. 195 // After clearing device it should be possible to grant permission again.
195 AllowUsbDevice(manager, extension_, device0); 196 AllowUsbDevice(manager, extension_, device0_);
196 AllowUsbDevice(manager, extension_, device1); 197 AllowUsbDevice(manager, extension_, device1_);
197 198
198 device_permissions = manager->GetForExtension(extension_->id()); 199 device_permissions = manager->GetForExtension(extension_->id());
199 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); 200 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get());
200 ASSERT_TRUE(FindEntry(device_permissions.get(), device1).get()); 201 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get());
201 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); 202 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get());
202 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); 203 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get());
203 } 204 }
204 205
205 TEST_F(DevicePermissionsManagerTest, SuspendExtension) { 206 TEST_F(DevicePermissionsManagerTest, SuspendExtension) {
206 DevicePermissionsManager* manager = 207 DevicePermissionsManager* manager =
207 DevicePermissionsManager::Get(env_->profile()); 208 DevicePermissionsManager::Get(env_->profile());
208 AllowUsbDevice(manager, extension_, device0); 209 AllowUsbDevice(manager, extension_, device0_);
209 AllowUsbDevice(manager, extension_, device1); 210 AllowUsbDevice(manager, extension_, device1_);
210 211
211 scoped_ptr<DevicePermissions> device_permissions = 212 scoped_ptr<DevicePermissions> device_permissions =
212 manager->GetForExtension(extension_->id()); 213 manager->GetForExtension(extension_->id());
213 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); 214 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get());
214 ASSERT_TRUE(FindEntry(device_permissions.get(), device1).get()); 215 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get());
215 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); 216 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get());
216 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); 217 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get());
217 218
218 manager->OnBackgroundHostClose(extension_->id()); 219 manager->OnBackgroundHostClose(extension_->id());
219 220
220 device_permissions = manager->GetForExtension(extension_->id()); 221 device_permissions = manager->GetForExtension(extension_->id());
221 // Device 0 is still registered because its serial number has been stored in 222 // Device 0 is still registered because its serial number has been stored in
222 // ExtensionPrefs, it is "persistent". 223 // ExtensionPrefs, it is "persistent".
223 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); 224 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get());
224 // Device 1 does not have uniquely identifying traits and so permission to 225 // Device 1 does not have uniquely identifying traits and so permission to
225 // open it has been dropped when the app's windows have closed and the 226 // open it has been dropped when the app's windows have closed and the
226 // background page has been suspended. 227 // background page has been suspended.
227 ASSERT_FALSE(FindEntry(device_permissions.get(), device1).get()); 228 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get());
228 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); 229 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get());
229 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); 230 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get());
230 } 231 }
231 232
232 TEST_F(DevicePermissionsManagerTest, DisconnectDevice) { 233 TEST_F(DevicePermissionsManagerTest, DisconnectDevice) {
233 DevicePermissionsManager* manager = 234 DevicePermissionsManager* manager =
234 DevicePermissionsManager::Get(env_->profile()); 235 DevicePermissionsManager::Get(env_->profile());
235 AllowUsbDevice(manager, extension_, device0); 236 AllowUsbDevice(manager, extension_, device0_);
236 AllowUsbDevice(manager, extension_, device1); 237 AllowUsbDevice(manager, extension_, device1_);
237 238
238 scoped_ptr<DevicePermissions> device_permissions = 239 scoped_ptr<DevicePermissions> device_permissions =
239 manager->GetForExtension(extension_->id()); 240 manager->GetForExtension(extension_->id());
240 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); 241 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get());
241 ASSERT_TRUE(FindEntry(device_permissions.get(), device1).get()); 242 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get());
242 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); 243 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get());
243 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); 244 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get());
244 245
245 usb_service_->NotifyDeviceRemoved(device0); 246 usb_service_->NotifyDeviceRemoved(device0_);
246 usb_service_->NotifyDeviceRemoved(device1); 247 usb_service_->NotifyDeviceRemoved(device1_);
247 248
248 device_permissions = manager->GetForExtension(extension_->id()); 249 device_permissions = manager->GetForExtension(extension_->id());
249 // Device 0 will be accessible when it is reconnected because it can be 250 // Device 0 will be accessible when it is reconnected because it can be
250 // recognized by its serial number. 251 // recognized by its serial number.
251 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); 252 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get());
252 // Device 1 does not have a serial number and cannot be distinguished from 253 // Device 1 does not have a serial number and cannot be distinguished from
253 // any other device of the same model so the app must request permission again 254 // any other device of the same model so the app must request permission again
254 // when it is reconnected. 255 // when it is reconnected.
255 ASSERT_FALSE(FindEntry(device_permissions.get(), device1).get()); 256 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get());
256 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); 257 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get());
257 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); 258 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get());
258 } 259 }
259 260
260 TEST_F(DevicePermissionsManagerTest, RevokeAndRegrantAccess) { 261 TEST_F(DevicePermissionsManagerTest, RevokeAndRegrantAccess) {
261 DevicePermissionsManager* manager = 262 DevicePermissionsManager* manager =
262 DevicePermissionsManager::Get(env_->profile()); 263 DevicePermissionsManager::Get(env_->profile());
263 AllowUsbDevice(manager, extension_, device0); 264 AllowUsbDevice(manager, extension_, device0_);
264 AllowUsbDevice(manager, extension_, device1); 265 AllowUsbDevice(manager, extension_, device1_);
265 266
266 scoped_ptr<DevicePermissions> device_permissions = 267 scoped_ptr<DevicePermissions> device_permissions =
267 manager->GetForExtension(extension_->id()); 268 manager->GetForExtension(extension_->id());
268 scoped_refptr<DevicePermissionEntry> device0_entry = 269 scoped_refptr<DevicePermissionEntry> device0_entry =
269 FindEntry(device_permissions.get(), device0); 270 FindEntry(device_permissions.get(), device0_);
270 ASSERT_TRUE(device0_entry.get()); 271 ASSERT_TRUE(device0_entry.get());
271 scoped_refptr<DevicePermissionEntry> device1_entry = 272 scoped_refptr<DevicePermissionEntry> device1_entry =
272 FindEntry(device_permissions.get(), device1); 273 FindEntry(device_permissions.get(), device1_);
273 ASSERT_TRUE(device1_entry.get()); 274 ASSERT_TRUE(device1_entry.get());
274 275
275 manager->RemoveEntry(extension_->id(), device0_entry); 276 manager->RemoveEntry(extension_->id(), device0_entry);
276 device_permissions = manager->GetForExtension(extension_->id()); 277 device_permissions = manager->GetForExtension(extension_->id());
277 ASSERT_FALSE(FindEntry(device_permissions.get(), device0).get()); 278 ASSERT_FALSE(FindEntry(device_permissions.get(), device0_).get());
278 ASSERT_TRUE(FindEntry(device_permissions.get(), device1).get()); 279 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get());
279 280
280 AllowUsbDevice(manager, extension_, device0); 281 AllowUsbDevice(manager, extension_, device0_);
281 device_permissions = manager->GetForExtension(extension_->id()); 282 device_permissions = manager->GetForExtension(extension_->id());
282 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); 283 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get());
283 ASSERT_TRUE(FindEntry(device_permissions.get(), device1).get()); 284 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get());
284 285
285 manager->RemoveEntry(extension_->id(), device1_entry); 286 manager->RemoveEntry(extension_->id(), device1_entry);
286 device_permissions = manager->GetForExtension(extension_->id()); 287 device_permissions = manager->GetForExtension(extension_->id());
287 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); 288 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get());
288 ASSERT_FALSE(FindEntry(device_permissions.get(), device1).get()); 289 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get());
289 290
290 AllowUsbDevice(manager, extension_, device1); 291 AllowUsbDevice(manager, extension_, device1_);
291 device_permissions = manager->GetForExtension(extension_->id()); 292 device_permissions = manager->GetForExtension(extension_->id());
292 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); 293 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get());
293 ASSERT_TRUE(FindEntry(device_permissions.get(), device1).get()); 294 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get());
294 } 295 }
295 296
296 TEST_F(DevicePermissionsManagerTest, UpdateLastUsed) { 297 TEST_F(DevicePermissionsManagerTest, UpdateLastUsed) {
297 DevicePermissionsManager* manager = 298 DevicePermissionsManager* manager =
298 DevicePermissionsManager::Get(env_->profile()); 299 DevicePermissionsManager::Get(env_->profile());
299 AllowUsbDevice(manager, extension_, device0); 300 AllowUsbDevice(manager, extension_, device0_);
300 301
301 scoped_ptr<DevicePermissions> device_permissions = 302 scoped_ptr<DevicePermissions> device_permissions =
302 manager->GetForExtension(extension_->id()); 303 manager->GetForExtension(extension_->id());
303 scoped_refptr<DevicePermissionEntry> device0_entry = 304 scoped_refptr<DevicePermissionEntry> device0_entry =
304 FindEntry(device_permissions.get(), device0); 305 FindEntry(device_permissions.get(), device0_);
305 ASSERT_TRUE(device0_entry->last_used().is_null()); 306 ASSERT_TRUE(device0_entry->last_used().is_null());
306 307
307 manager->UpdateLastUsed(extension_->id(), device0_entry); 308 manager->UpdateLastUsed(extension_->id(), device0_entry);
308 device_permissions = manager->GetForExtension(extension_->id()); 309 device_permissions = manager->GetForExtension(extension_->id());
309 device0_entry = FindEntry(device_permissions.get(), device0); 310 device0_entry = FindEntry(device_permissions.get(), device0_);
310 ASSERT_FALSE(device0_entry->last_used().is_null()); 311 ASSERT_FALSE(device0_entry->last_used().is_null());
311 } 312 }
312 313
313 TEST_F(DevicePermissionsManagerTest, LoadPrefs) { 314 TEST_F(DevicePermissionsManagerTest, LoadPrefs) {
314 scoped_ptr<base::Value> prefs_value = base::test::ParseJson( 315 scoped_ptr<base::Value> prefs_value = base::test::ParseJson(
315 "[" 316 "["
316 " {" 317 " {"
317 " \"product_id\": 0," 318 " \"product_id\": 0,"
318 " \"serial_number\": \"ABCDE\"," 319 " \"serial_number\": \"ABCDE\","
319 " \"type\": \"usb\"," 320 " \"type\": \"usb\","
320 " \"vendor_id\": 0" 321 " \"vendor_id\": 0"
321 " }" 322 " }"
322 "]"); 323 "]");
323 env_->GetExtensionPrefs()->UpdateExtensionPref(extension_->id(), "devices", 324 env_->GetExtensionPrefs()->UpdateExtensionPref(extension_->id(), "devices",
324 prefs_value.release()); 325 prefs_value.release());
325 326
326 DevicePermissionsManager* manager = 327 DevicePermissionsManager* manager =
327 DevicePermissionsManager::Get(env_->profile()); 328 DevicePermissionsManager::Get(env_->profile());
328 scoped_ptr<DevicePermissions> device_permissions = 329 scoped_ptr<DevicePermissions> device_permissions =
329 manager->GetForExtension(extension_->id()); 330 manager->GetForExtension(extension_->id());
330 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); 331 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get());
331 ASSERT_FALSE(FindEntry(device_permissions.get(), device1).get()); 332 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get());
332 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); 333 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get());
333 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); 334 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get());
334 } 335 }
335 336
336 } // namespace extensions 337 } // namespace extensions
OLDNEW
« no previous file with comments | « chrome/browser/devtools/device/usb/android_usb_device.cc ('k') | device/usb/usb_device.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698