OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/installer/setup/setup_util_unittest.h" | 5 #include "chrome/installer/setup/setup_util_unittest.h" |
6 | 6 |
7 #include <windows.h> | 7 #include <windows.h> |
8 | 8 |
9 #include <string> | 9 #include <string> |
10 | 10 |
(...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
48 }; | 48 }; |
49 | 49 |
50 // The privilege tested in ScopeTokenPrivilege tests below. | 50 // The privilege tested in ScopeTokenPrivilege tests below. |
51 // Use SE_RESTORE_NAME as it is one of the many privileges that is available, | 51 // Use SE_RESTORE_NAME as it is one of the many privileges that is available, |
52 // but not enabled by default on processes running at high integrity. | 52 // but not enabled by default on processes running at high integrity. |
53 static const wchar_t kTestedPrivilege[] = SE_RESTORE_NAME; | 53 static const wchar_t kTestedPrivilege[] = SE_RESTORE_NAME; |
54 | 54 |
55 // Returns true if the current process' token has privilege |privilege_name| | 55 // Returns true if the current process' token has privilege |privilege_name| |
56 // enabled. | 56 // enabled. |
57 bool CurrentProcessHasPrivilege(const wchar_t* privilege_name) { | 57 bool CurrentProcessHasPrivilege(const wchar_t* privilege_name) { |
58 HANDLE temp_handle; | 58 base::win::ScopedHandle token; |
59 if (!::OpenProcessToken(::GetCurrentProcess(), TOKEN_QUERY, | 59 if (!::OpenProcessToken(::GetCurrentProcess(), TOKEN_QUERY, |
60 &temp_handle)) { | 60 token.Receive())) { |
61 ADD_FAILURE(); | 61 ADD_FAILURE(); |
62 return false; | 62 return false; |
63 } | 63 } |
64 | 64 |
65 base::win::ScopedHandle token(temp_handle); | |
66 | |
67 // First get the size of the buffer needed for |privileges| below. | 65 // First get the size of the buffer needed for |privileges| below. |
68 DWORD size; | 66 DWORD size; |
69 EXPECT_FALSE(::GetTokenInformation(token, TokenPrivileges, NULL, 0, &size)); | 67 EXPECT_FALSE(::GetTokenInformation(token, TokenPrivileges, NULL, 0, &size)); |
70 | 68 |
71 scoped_ptr<BYTE[]> privileges_bytes(new BYTE[size]); | 69 scoped_ptr<BYTE[]> privileges_bytes(new BYTE[size]); |
72 TOKEN_PRIVILEGES* privileges = | 70 TOKEN_PRIVILEGES* privileges = |
73 reinterpret_cast<TOKEN_PRIVILEGES*>(privileges_bytes.get()); | 71 reinterpret_cast<TOKEN_PRIVILEGES*>(privileges_bytes.get()); |
74 | 72 |
75 if (!::GetTokenInformation(token, TokenPrivileges, privileges, size, &size)) { | 73 if (!::GetTokenInformation(token, TokenPrivileges, privileges, size, &size)) { |
76 ADD_FAILURE(); | 74 ADD_FAILURE(); |
(...skipping 401 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
478 BrowserDistribution::CHROME_FRAME)); | 476 BrowserDistribution::CHROME_FRAME)); |
479 EXPECT_TRUE(chrome_frame.GetUsageStats(&usagestats)); | 477 EXPECT_TRUE(chrome_frame.GetUsageStats(&usagestats)); |
480 EXPECT_EQ(1U, usagestats); | 478 EXPECT_EQ(1U, usagestats); |
481 EXPECT_EQ(L"2.0-dev", chrome_frame.channel().value()); | 479 EXPECT_EQ(L"2.0-dev", chrome_frame.channel().value()); |
482 | 480 |
483 // Confirm that the binaries' channel no longer contains GCF. | 481 // Confirm that the binaries' channel no longer contains GCF. |
484 ASSERT_TRUE(binaries.Initialize(kSystemLevel, | 482 ASSERT_TRUE(binaries.Initialize(kSystemLevel, |
485 BrowserDistribution::CHROME_BINARIES)); | 483 BrowserDistribution::CHROME_BINARIES)); |
486 EXPECT_EQ(L"2.0-dev-multi", binaries.channel().value()); | 484 EXPECT_EQ(L"2.0-dev-multi", binaries.channel().value()); |
487 } | 485 } |
OLD | NEW |