OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "base/run_loop.h" | 5 #include "base/run_loop.h" |
6 #include "base/strings/utf_string_conversions.h" | 6 #include "base/strings/utf_string_conversions.h" |
7 #include "base/test/values_test_util.h" | 7 #include "base/test/values_test_util.h" |
8 #include "chrome/browser/extensions/test_extension_environment.h" | 8 #include "chrome/browser/extensions/test_extension_environment.h" |
9 #include "chrome/test/base/testing_profile.h" | 9 #include "chrome/test/base/testing_profile.h" |
10 #include "device/core/device_client.h" | 10 #include "device/core/device_client.h" |
11 #include "device/usb/usb_device.h" | 11 #include "device/usb/usb_device.h" |
12 #include "device/usb/usb_device_handle.h" | 12 #include "device/usb/usb_device_handle.h" |
13 #include "extensions/browser/api/device_permissions_manager.h" | 13 #include "extensions/browser/api/device_permissions_manager.h" |
14 #include "extensions/browser/extension_prefs.h" | 14 #include "extensions/browser/extension_prefs.h" |
15 #include "extensions/common/extension.h" | 15 #include "extensions/common/extension.h" |
16 #include "testing/gmock/include/gmock/gmock.h" | 16 #include "testing/gmock/include/gmock/gmock.h" |
17 #include "testing/gtest/include/gtest/gtest.h" | 17 #include "testing/gtest/include/gtest/gtest.h" |
18 | 18 |
19 namespace extensions { | 19 namespace extensions { |
20 | 20 |
21 namespace { | 21 namespace { |
22 | 22 |
23 using device::UsbDevice; | 23 using device::UsbDevice; |
24 using device::UsbDeviceHandle; | 24 using device::UsbDeviceHandle; |
25 using device::UsbService; | 25 using device::UsbService; |
| 26 using testing::_; |
| 27 using testing::DoAll; |
26 using testing::Return; | 28 using testing::Return; |
| 29 using testing::SetArgPointee; |
| 30 |
| 31 int next_id; |
27 | 32 |
28 class MockUsbService : public UsbService { | 33 class MockUsbService : public UsbService { |
29 public: | 34 public: |
30 MockUsbService() : mock_device_client(this) {} | 35 MockUsbService() : mock_device_client(this) {} |
31 | 36 |
32 MOCK_METHOD1(GetDeviceById, scoped_refptr<UsbDevice>(uint32)); | 37 MOCK_METHOD1(GetDeviceById, scoped_refptr<UsbDevice>(uint32)); |
33 MOCK_METHOD1(GetDevices, void(std::vector<scoped_refptr<UsbDevice>>*)); | 38 MOCK_METHOD1(GetDevices, void(std::vector<scoped_refptr<UsbDevice>>*)); |
34 | 39 |
35 // Public wrapper for the protected NotifyDeviceRemove function. | 40 // Public wrapper for the protected NotifyDeviceRemove function. |
36 void NotifyDeviceRemoved(scoped_refptr<UsbDevice> device) { | 41 void NotifyDeviceRemoved(scoped_refptr<UsbDevice> device) { |
(...skipping 10 matching lines...) Expand all Loading... |
47 | 52 |
48 private: | 53 private: |
49 UsbService* usb_service_; | 54 UsbService* usb_service_; |
50 }; | 55 }; |
51 | 56 |
52 MockDeviceClient mock_device_client; | 57 MockDeviceClient mock_device_client; |
53 }; | 58 }; |
54 | 59 |
55 class MockUsbDevice : public UsbDevice { | 60 class MockUsbDevice : public UsbDevice { |
56 public: | 61 public: |
57 MockUsbDevice(const std::string& serial_number, uint32 unique_id) | 62 explicit MockUsbDevice(const std::string& serial_number) |
58 : UsbDevice(0, 0, unique_id), serial_number_(serial_number) {} | 63 : UsbDevice(0, 0, next_id++) { |
| 64 if (serial_number.empty()) { |
| 65 EXPECT_CALL(*this, GetSerialNumber(_)).WillRepeatedly(Return(false)); |
| 66 } else { |
| 67 EXPECT_CALL(*this, GetSerialNumber(_)) |
| 68 .WillRepeatedly( |
| 69 DoAll(SetArgPointee<0>(base::ASCIIToUTF16(serial_number)), |
| 70 Return(true))); |
| 71 } |
59 | 72 |
| 73 EXPECT_CALL(*this, GetProduct(_)) |
| 74 .WillRepeatedly( |
| 75 DoAll(SetArgPointee<0>(base::ASCIIToUTF16("Test Product")), |
| 76 Return(true))); |
| 77 EXPECT_CALL(*this, GetManufacturer(_)) |
| 78 .WillRepeatedly( |
| 79 DoAll(SetArgPointee<0>(base::ASCIIToUTF16("Test Manufacturer")), |
| 80 Return(true))); |
| 81 } |
| 82 |
| 83 MOCK_METHOD2(RequestUsbAccess, void(int, const base::Callback<void(bool)>&)); |
60 MOCK_METHOD0(Open, scoped_refptr<UsbDeviceHandle>()); | 84 MOCK_METHOD0(Open, scoped_refptr<UsbDeviceHandle>()); |
61 MOCK_METHOD1(Close, bool(scoped_refptr<UsbDeviceHandle>)); | 85 MOCK_METHOD1(Close, bool(scoped_refptr<UsbDeviceHandle>)); |
62 #if defined(OS_CHROMEOS) | 86 MOCK_METHOD0(GetConfiguration, const device::UsbConfigDescriptor*()); |
63 MOCK_METHOD2(RequestUsbAccess, void(int, const base::Callback<void(bool)>&)); | 87 MOCK_METHOD1(GetManufacturer, bool(base::string16*)); |
64 #endif | 88 MOCK_METHOD1(GetProduct, bool(base::string16*)); |
65 MOCK_METHOD0(GetConfiguration, const device::UsbConfigDescriptor&()); | 89 MOCK_METHOD1(GetSerialNumber, bool(base::string16*)); |
66 | |
67 virtual bool GetManufacturer(base::string16* manufacturer) { | |
68 *manufacturer = base::ASCIIToUTF16("Test Manufacturer"); | |
69 return true; | |
70 } | |
71 | |
72 virtual bool GetProduct(base::string16* product) { | |
73 *product = base::ASCIIToUTF16("Test Product"); | |
74 return true; | |
75 } | |
76 | |
77 virtual bool GetSerialNumber(base::string16* serial_number) override { | |
78 if (serial_number_.empty()) { | |
79 // Return false as if the device does not have or failed to return its | |
80 // serial number. | |
81 return false; | |
82 } | |
83 | |
84 *serial_number = base::UTF8ToUTF16(serial_number_); | |
85 return true; | |
86 } | |
87 | 90 |
88 private: | 91 private: |
89 virtual ~MockUsbDevice() {} | 92 virtual ~MockUsbDevice() {} |
90 | |
91 const std::string serial_number_; | |
92 }; | 93 }; |
93 | 94 |
94 void AllowUsbDevice(DevicePermissionsManager* manager, | 95 void AllowUsbDevice(DevicePermissionsManager* manager, |
95 const Extension* extension, | 96 const Extension* extension, |
96 scoped_refptr<UsbDevice> device) { | 97 scoped_refptr<UsbDevice> device) { |
97 // If the device cannot provide any of these strings they will simply by | 98 // If the device cannot provide any of these strings they will simply by |
98 // empty. | 99 // empty. |
99 base::string16 product; | 100 base::string16 product; |
100 device->GetProduct(&product); | 101 device->GetProduct(&product); |
101 base::string16 manufacturer; | 102 base::string16 manufacturer; |
(...skipping 27 matching lines...) Expand all Loading... |
129 "{" | 130 "{" |
130 " \"app\": {" | 131 " \"app\": {" |
131 " \"background\": {" | 132 " \"background\": {" |
132 " \"scripts\": [\"background.js\"]" | 133 " \"scripts\": [\"background.js\"]" |
133 " }" | 134 " }" |
134 " }," | 135 " }," |
135 " \"permissions\": [" | 136 " \"permissions\": [" |
136 " \"usb\"" | 137 " \"usb\"" |
137 " ]" | 138 " ]" |
138 "}")); | 139 "}")); |
139 device0 = new MockUsbDevice("ABCDE", 0); | 140 device0_ = new MockUsbDevice("ABCDE"); |
140 device1 = new MockUsbDevice("", 1); | 141 device1_ = new MockUsbDevice(""); |
141 device2 = new MockUsbDevice("12345", 2); | 142 device2_ = new MockUsbDevice("12345"); |
142 device3 = new MockUsbDevice("", 3); | 143 device3_ = new MockUsbDevice(""); |
143 usb_service_ = new MockUsbService(); | 144 usb_service_ = new MockUsbService(); |
144 UsbService::SetInstanceForTest(usb_service_); | 145 UsbService::SetInstanceForTest(usb_service_); |
145 } | 146 } |
146 | 147 |
147 void TearDown() override { | 148 void TearDown() override { |
148 env_.reset(nullptr); | 149 env_.reset(nullptr); |
149 UsbService::SetInstanceForTest(nullptr); | 150 UsbService::SetInstanceForTest(nullptr); |
150 } | 151 } |
151 | 152 |
152 scoped_ptr<extensions::TestExtensionEnvironment> env_; | 153 scoped_ptr<extensions::TestExtensionEnvironment> env_; |
153 const extensions::Extension* extension_; | 154 const extensions::Extension* extension_; |
154 MockUsbService* usb_service_; | 155 MockUsbService* usb_service_; |
155 scoped_refptr<MockUsbDevice> device0; | 156 scoped_refptr<MockUsbDevice> device0_; |
156 scoped_refptr<MockUsbDevice> device1; | 157 scoped_refptr<MockUsbDevice> device1_; |
157 scoped_refptr<MockUsbDevice> device2; | 158 scoped_refptr<MockUsbDevice> device2_; |
158 scoped_refptr<MockUsbDevice> device3; | 159 scoped_refptr<MockUsbDevice> device3_; |
159 }; | 160 }; |
160 | 161 |
161 TEST_F(DevicePermissionsManagerTest, AllowAndClearDevices) { | 162 TEST_F(DevicePermissionsManagerTest, AllowAndClearDevices) { |
162 DevicePermissionsManager* manager = | 163 DevicePermissionsManager* manager = |
163 DevicePermissionsManager::Get(env_->profile()); | 164 DevicePermissionsManager::Get(env_->profile()); |
164 AllowUsbDevice(manager, extension_, device0); | 165 AllowUsbDevice(manager, extension_, device0_); |
165 AllowUsbDevice(manager, extension_, device1); | 166 AllowUsbDevice(manager, extension_, device1_); |
166 | 167 |
167 scoped_ptr<DevicePermissions> device_permissions = | 168 scoped_ptr<DevicePermissions> device_permissions = |
168 manager->GetForExtension(extension_->id()); | 169 manager->GetForExtension(extension_->id()); |
169 scoped_refptr<DevicePermissionEntry> device0_entry = | 170 scoped_refptr<DevicePermissionEntry> device0_entry = |
170 FindEntry(device_permissions.get(), device0); | 171 FindEntry(device_permissions.get(), device0_); |
171 ASSERT_TRUE(device0_entry.get()); | 172 ASSERT_TRUE(device0_entry.get()); |
172 scoped_refptr<DevicePermissionEntry> device1_entry = | 173 scoped_refptr<DevicePermissionEntry> device1_entry = |
173 FindEntry(device_permissions.get(), device1); | 174 FindEntry(device_permissions.get(), device1_); |
174 ASSERT_TRUE(device1_entry.get()); | 175 ASSERT_TRUE(device1_entry.get()); |
175 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); | 176 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); |
176 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); | 177 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); |
177 ASSERT_EQ(2U, device_permissions->entries().size()); | 178 ASSERT_EQ(2U, device_permissions->entries().size()); |
178 | 179 |
179 ASSERT_EQ(base::ASCIIToUTF16( | 180 ASSERT_EQ(base::ASCIIToUTF16( |
180 "Test Product from Test Manufacturer (serial number ABCDE)"), | 181 "Test Product from Test Manufacturer (serial number ABCDE)"), |
181 device0_entry->GetPermissionMessageString()); | 182 device0_entry->GetPermissionMessageString()); |
182 ASSERT_EQ(base::ASCIIToUTF16("Test Product from Test Manufacturer"), | 183 ASSERT_EQ(base::ASCIIToUTF16("Test Product from Test Manufacturer"), |
183 device1_entry->GetPermissionMessageString()); | 184 device1_entry->GetPermissionMessageString()); |
184 | 185 |
185 manager->Clear(extension_->id()); | 186 manager->Clear(extension_->id()); |
186 | 187 |
187 device_permissions = manager->GetForExtension(extension_->id()); | 188 device_permissions = manager->GetForExtension(extension_->id()); |
188 ASSERT_FALSE(FindEntry(device_permissions.get(), device0).get()); | 189 ASSERT_FALSE(FindEntry(device_permissions.get(), device0_).get()); |
189 ASSERT_FALSE(FindEntry(device_permissions.get(), device1).get()); | 190 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); |
190 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); | 191 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); |
191 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); | 192 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); |
192 ASSERT_EQ(0U, device_permissions->entries().size()); | 193 ASSERT_EQ(0U, device_permissions->entries().size()); |
193 | 194 |
194 // After clearing device it should be possible to grant permission again. | 195 // After clearing device it should be possible to grant permission again. |
195 AllowUsbDevice(manager, extension_, device0); | 196 AllowUsbDevice(manager, extension_, device0_); |
196 AllowUsbDevice(manager, extension_, device1); | 197 AllowUsbDevice(manager, extension_, device1_); |
197 | 198 |
198 device_permissions = manager->GetForExtension(extension_->id()); | 199 device_permissions = manager->GetForExtension(extension_->id()); |
199 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); | 200 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); |
200 ASSERT_TRUE(FindEntry(device_permissions.get(), device1).get()); | 201 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); |
201 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); | 202 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); |
202 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); | 203 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); |
203 } | 204 } |
204 | 205 |
205 TEST_F(DevicePermissionsManagerTest, SuspendExtension) { | 206 TEST_F(DevicePermissionsManagerTest, SuspendExtension) { |
206 DevicePermissionsManager* manager = | 207 DevicePermissionsManager* manager = |
207 DevicePermissionsManager::Get(env_->profile()); | 208 DevicePermissionsManager::Get(env_->profile()); |
208 AllowUsbDevice(manager, extension_, device0); | 209 AllowUsbDevice(manager, extension_, device0_); |
209 AllowUsbDevice(manager, extension_, device1); | 210 AllowUsbDevice(manager, extension_, device1_); |
210 | 211 |
211 scoped_ptr<DevicePermissions> device_permissions = | 212 scoped_ptr<DevicePermissions> device_permissions = |
212 manager->GetForExtension(extension_->id()); | 213 manager->GetForExtension(extension_->id()); |
213 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); | 214 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); |
214 ASSERT_TRUE(FindEntry(device_permissions.get(), device1).get()); | 215 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); |
215 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); | 216 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); |
216 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); | 217 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); |
217 | 218 |
218 manager->OnBackgroundHostClose(extension_->id()); | 219 manager->OnBackgroundHostClose(extension_->id()); |
219 | 220 |
220 device_permissions = manager->GetForExtension(extension_->id()); | 221 device_permissions = manager->GetForExtension(extension_->id()); |
221 // Device 0 is still registered because its serial number has been stored in | 222 // Device 0 is still registered because its serial number has been stored in |
222 // ExtensionPrefs, it is "persistent". | 223 // ExtensionPrefs, it is "persistent". |
223 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); | 224 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); |
224 // Device 1 does not have uniquely identifying traits and so permission to | 225 // Device 1 does not have uniquely identifying traits and so permission to |
225 // open it has been dropped when the app's windows have closed and the | 226 // open it has been dropped when the app's windows have closed and the |
226 // background page has been suspended. | 227 // background page has been suspended. |
227 ASSERT_FALSE(FindEntry(device_permissions.get(), device1).get()); | 228 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); |
228 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); | 229 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); |
229 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); | 230 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); |
230 } | 231 } |
231 | 232 |
232 TEST_F(DevicePermissionsManagerTest, DisconnectDevice) { | 233 TEST_F(DevicePermissionsManagerTest, DisconnectDevice) { |
233 DevicePermissionsManager* manager = | 234 DevicePermissionsManager* manager = |
234 DevicePermissionsManager::Get(env_->profile()); | 235 DevicePermissionsManager::Get(env_->profile()); |
235 AllowUsbDevice(manager, extension_, device0); | 236 AllowUsbDevice(manager, extension_, device0_); |
236 AllowUsbDevice(manager, extension_, device1); | 237 AllowUsbDevice(manager, extension_, device1_); |
237 | 238 |
238 scoped_ptr<DevicePermissions> device_permissions = | 239 scoped_ptr<DevicePermissions> device_permissions = |
239 manager->GetForExtension(extension_->id()); | 240 manager->GetForExtension(extension_->id()); |
240 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); | 241 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); |
241 ASSERT_TRUE(FindEntry(device_permissions.get(), device1).get()); | 242 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); |
242 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); | 243 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); |
243 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); | 244 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); |
244 | 245 |
245 usb_service_->NotifyDeviceRemoved(device0); | 246 usb_service_->NotifyDeviceRemoved(device0_); |
246 usb_service_->NotifyDeviceRemoved(device1); | 247 usb_service_->NotifyDeviceRemoved(device1_); |
247 | 248 |
248 device_permissions = manager->GetForExtension(extension_->id()); | 249 device_permissions = manager->GetForExtension(extension_->id()); |
249 // Device 0 will be accessible when it is reconnected because it can be | 250 // Device 0 will be accessible when it is reconnected because it can be |
250 // recognized by its serial number. | 251 // recognized by its serial number. |
251 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); | 252 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); |
252 // Device 1 does not have a serial number and cannot be distinguished from | 253 // Device 1 does not have a serial number and cannot be distinguished from |
253 // any other device of the same model so the app must request permission again | 254 // any other device of the same model so the app must request permission again |
254 // when it is reconnected. | 255 // when it is reconnected. |
255 ASSERT_FALSE(FindEntry(device_permissions.get(), device1).get()); | 256 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); |
256 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); | 257 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); |
257 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); | 258 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); |
258 } | 259 } |
259 | 260 |
260 TEST_F(DevicePermissionsManagerTest, RevokeAndRegrantAccess) { | 261 TEST_F(DevicePermissionsManagerTest, RevokeAndRegrantAccess) { |
261 DevicePermissionsManager* manager = | 262 DevicePermissionsManager* manager = |
262 DevicePermissionsManager::Get(env_->profile()); | 263 DevicePermissionsManager::Get(env_->profile()); |
263 AllowUsbDevice(manager, extension_, device0); | 264 AllowUsbDevice(manager, extension_, device0_); |
264 AllowUsbDevice(manager, extension_, device1); | 265 AllowUsbDevice(manager, extension_, device1_); |
265 | 266 |
266 scoped_ptr<DevicePermissions> device_permissions = | 267 scoped_ptr<DevicePermissions> device_permissions = |
267 manager->GetForExtension(extension_->id()); | 268 manager->GetForExtension(extension_->id()); |
268 scoped_refptr<DevicePermissionEntry> device0_entry = | 269 scoped_refptr<DevicePermissionEntry> device0_entry = |
269 FindEntry(device_permissions.get(), device0); | 270 FindEntry(device_permissions.get(), device0_); |
270 ASSERT_TRUE(device0_entry.get()); | 271 ASSERT_TRUE(device0_entry.get()); |
271 scoped_refptr<DevicePermissionEntry> device1_entry = | 272 scoped_refptr<DevicePermissionEntry> device1_entry = |
272 FindEntry(device_permissions.get(), device1); | 273 FindEntry(device_permissions.get(), device1_); |
273 ASSERT_TRUE(device1_entry.get()); | 274 ASSERT_TRUE(device1_entry.get()); |
274 | 275 |
275 manager->RemoveEntry(extension_->id(), device0_entry); | 276 manager->RemoveEntry(extension_->id(), device0_entry); |
276 device_permissions = manager->GetForExtension(extension_->id()); | 277 device_permissions = manager->GetForExtension(extension_->id()); |
277 ASSERT_FALSE(FindEntry(device_permissions.get(), device0).get()); | 278 ASSERT_FALSE(FindEntry(device_permissions.get(), device0_).get()); |
278 ASSERT_TRUE(FindEntry(device_permissions.get(), device1).get()); | 279 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); |
279 | 280 |
280 AllowUsbDevice(manager, extension_, device0); | 281 AllowUsbDevice(manager, extension_, device0_); |
281 device_permissions = manager->GetForExtension(extension_->id()); | 282 device_permissions = manager->GetForExtension(extension_->id()); |
282 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); | 283 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); |
283 ASSERT_TRUE(FindEntry(device_permissions.get(), device1).get()); | 284 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); |
284 | 285 |
285 manager->RemoveEntry(extension_->id(), device1_entry); | 286 manager->RemoveEntry(extension_->id(), device1_entry); |
286 device_permissions = manager->GetForExtension(extension_->id()); | 287 device_permissions = manager->GetForExtension(extension_->id()); |
287 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); | 288 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); |
288 ASSERT_FALSE(FindEntry(device_permissions.get(), device1).get()); | 289 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); |
289 | 290 |
290 AllowUsbDevice(manager, extension_, device1); | 291 AllowUsbDevice(manager, extension_, device1_); |
291 device_permissions = manager->GetForExtension(extension_->id()); | 292 device_permissions = manager->GetForExtension(extension_->id()); |
292 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); | 293 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); |
293 ASSERT_TRUE(FindEntry(device_permissions.get(), device1).get()); | 294 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); |
294 } | 295 } |
295 | 296 |
296 TEST_F(DevicePermissionsManagerTest, UpdateLastUsed) { | 297 TEST_F(DevicePermissionsManagerTest, UpdateLastUsed) { |
297 DevicePermissionsManager* manager = | 298 DevicePermissionsManager* manager = |
298 DevicePermissionsManager::Get(env_->profile()); | 299 DevicePermissionsManager::Get(env_->profile()); |
299 AllowUsbDevice(manager, extension_, device0); | 300 AllowUsbDevice(manager, extension_, device0_); |
300 | 301 |
301 scoped_ptr<DevicePermissions> device_permissions = | 302 scoped_ptr<DevicePermissions> device_permissions = |
302 manager->GetForExtension(extension_->id()); | 303 manager->GetForExtension(extension_->id()); |
303 scoped_refptr<DevicePermissionEntry> device0_entry = | 304 scoped_refptr<DevicePermissionEntry> device0_entry = |
304 FindEntry(device_permissions.get(), device0); | 305 FindEntry(device_permissions.get(), device0_); |
305 ASSERT_TRUE(device0_entry->last_used().is_null()); | 306 ASSERT_TRUE(device0_entry->last_used().is_null()); |
306 | 307 |
307 manager->UpdateLastUsed(extension_->id(), device0_entry); | 308 manager->UpdateLastUsed(extension_->id(), device0_entry); |
308 device_permissions = manager->GetForExtension(extension_->id()); | 309 device_permissions = manager->GetForExtension(extension_->id()); |
309 device0_entry = FindEntry(device_permissions.get(), device0); | 310 device0_entry = FindEntry(device_permissions.get(), device0_); |
310 ASSERT_FALSE(device0_entry->last_used().is_null()); | 311 ASSERT_FALSE(device0_entry->last_used().is_null()); |
311 } | 312 } |
312 | 313 |
313 TEST_F(DevicePermissionsManagerTest, LoadPrefs) { | 314 TEST_F(DevicePermissionsManagerTest, LoadPrefs) { |
314 scoped_ptr<base::Value> prefs_value = base::test::ParseJson( | 315 scoped_ptr<base::Value> prefs_value = base::test::ParseJson( |
315 "[" | 316 "[" |
316 " {" | 317 " {" |
317 " \"product_id\": 0," | 318 " \"product_id\": 0," |
318 " \"serial_number\": \"ABCDE\"," | 319 " \"serial_number\": \"ABCDE\"," |
319 " \"type\": \"usb\"," | 320 " \"type\": \"usb\"," |
320 " \"vendor_id\": 0" | 321 " \"vendor_id\": 0" |
321 " }" | 322 " }" |
322 "]"); | 323 "]"); |
323 env_->GetExtensionPrefs()->UpdateExtensionPref(extension_->id(), "devices", | 324 env_->GetExtensionPrefs()->UpdateExtensionPref(extension_->id(), "devices", |
324 prefs_value.release()); | 325 prefs_value.release()); |
325 | 326 |
326 DevicePermissionsManager* manager = | 327 DevicePermissionsManager* manager = |
327 DevicePermissionsManager::Get(env_->profile()); | 328 DevicePermissionsManager::Get(env_->profile()); |
328 scoped_ptr<DevicePermissions> device_permissions = | 329 scoped_ptr<DevicePermissions> device_permissions = |
329 manager->GetForExtension(extension_->id()); | 330 manager->GetForExtension(extension_->id()); |
330 ASSERT_TRUE(FindEntry(device_permissions.get(), device0).get()); | 331 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); |
331 ASSERT_FALSE(FindEntry(device_permissions.get(), device1).get()); | 332 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); |
332 ASSERT_FALSE(FindEntry(device_permissions.get(), device2).get()); | 333 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); |
333 ASSERT_FALSE(FindEntry(device_permissions.get(), device3).get()); | 334 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); |
334 } | 335 } |
335 | 336 |
336 } // namespace extensions | 337 } // namespace extensions |
OLD | NEW |