Chromium Code Reviews| Index: chromeos/network/firewall_hole_unittest.cc |
| diff --git a/chromeos/network/firewall_hole_unittest.cc b/chromeos/network/firewall_hole_unittest.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..9019532692239745d54ade88a33aba864c2e8103 |
| --- /dev/null |
| +++ b/chromeos/network/firewall_hole_unittest.cc |
| @@ -0,0 +1,131 @@ |
| +// Copyright 2015 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "base/bind.h" |
| +#include "base/run_loop.h" |
| +#include "chromeos/dbus/dbus_thread_manager.h" |
| +#include "chromeos/dbus/fake_permission_broker_client.h" |
| +#include "chromeos/network/firewall_hole.h" |
| +#include "dbus/file_descriptor.h" |
| +#include "testing/gmock/include/gmock/gmock.h" |
| +#include "testing/gtest/include/gtest/gtest.h" |
| + |
| +using chromeos::DBusThreadManager; |
| +using chromeos::FirewallHole; |
| +using testing::_; |
| + |
| +ACTION_TEMPLATE(InvokeCallback, |
| + HAS_1_TEMPLATE_PARAMS(int, k), |
| + AND_1_VALUE_PARAMS(p1)) { |
| + ::std::tr1::get<k>(args).Run(p1); |
| +} |
| + |
| +class MockPermissionsBrokerClient : public chromeos::PermissionBrokerClient { |
|
pneubeck (no reviews)
2015/03/10 08:49:21
this and the template above should be wrapped in a
Reilly Grant (use Gerrit)
2015/03/10 20:15:17
Done.
|
| + public: |
| + MockPermissionsBrokerClient() {} |
| + ~MockPermissionsBrokerClient() override {} |
| + |
| + MOCK_METHOD1(Init, void(dbus::Bus* bus)); |
| + MOCK_METHOD3(RequestPathAccess, |
| + void(const std::string& path, |
| + int interface_id, |
| + const ResultCallback& callback)); |
| + MOCK_METHOD4(RequestTcpPortAccess, |
| + void(uint16 port, |
| + const std::string& interface, |
| + const dbus::FileDescriptor& lifeline_fd, |
| + const ResultCallback& callback)); |
| + MOCK_METHOD4(RequestUdpPortAccess, |
| + void(uint16 port, |
| + const std::string& interface, |
| + const dbus::FileDescriptor& lifeline_fd, |
| + const ResultCallback& callback)); |
| + MOCK_METHOD3(ReleaseTcpPort, |
| + void(uint16 port, |
| + const std::string& interface, |
| + const ResultCallback& callback)); |
| + MOCK_METHOD3(ReleaseUdpPort, |
| + void(uint16 port, |
| + const std::string& interface, |
| + const ResultCallback& callback)); |
| +}; |
| + |
| +class FirewallHoleTest : public testing::Test { |
| + public: |
| + FirewallHoleTest() {} |
| + ~FirewallHoleTest() override {} |
| + |
| + void SetUp() override { |
| + mock_permissions_broker_client_ = new MockPermissionsBrokerClient(); |
| + DBusThreadManager::GetSetterForTesting()->SetPermissionBrokerClient( |
| + make_scoped_ptr(mock_permissions_broker_client_)); |
| + } |
| + |
| + void TearDown() override { DBusThreadManager::Shutdown(); } |
| + |
| + void AssertOpenSuccess(scoped_ptr<FirewallHole> hole) { |
| + EXPECT_TRUE(hole.get() != nullptr); |
| + run_loop_.Quit(); |
| + } |
| + |
| + void AssertOpenFailure(scoped_ptr<FirewallHole> hole) { |
| + EXPECT_TRUE(hole.get() == nullptr); |
| + run_loop_.Quit(); |
| + } |
| + |
| + private: |
| + base::MessageLoopForUI message_loop_; |
| + |
| + protected: |
| + base::RunLoop run_loop_; |
| + MockPermissionsBrokerClient* mock_permissions_broker_client_; |
|
pneubeck (no reviews)
2015/03/10 08:49:21
= null;
Reilly Grant (use Gerrit)
2015/03/10 20:15:17
Done.
|
| +}; |
| + |
| +TEST_F(FirewallHoleTest, GrantTcpPortAccess) { |
| + EXPECT_CALL(*mock_permissions_broker_client_, |
| + RequestTcpPortAccess(1234, "foo0", _, _)) |
| + .WillOnce(InvokeCallback<3>(true)); |
| + EXPECT_CALL(*mock_permissions_broker_client_, ReleaseTcpPort(1234, "foo0", _)) |
| + .WillOnce(InvokeCallback<2>(true)); |
| + |
| + FirewallHole::Open( |
| + FirewallHole::PortType::TCP, 1234, "foo0", |
| + base::Bind(&FirewallHoleTest::AssertOpenSuccess, base::Unretained(this))); |
| + run_loop_.Run(); |
| +} |
| + |
| +TEST_F(FirewallHoleTest, DenyTcpPortAccess) { |
| + EXPECT_CALL(*mock_permissions_broker_client_, |
| + RequestTcpPortAccess(1234, "foo0", _, _)) |
| + .WillOnce(InvokeCallback<3>(false)); |
| + |
| + FirewallHole::Open( |
| + FirewallHole::PortType::TCP, 1234, "foo0", |
| + base::Bind(&FirewallHoleTest::AssertOpenFailure, base::Unretained(this))); |
| + run_loop_.Run(); |
| +} |
| + |
| +TEST_F(FirewallHoleTest, GrantUdpPortAccess) { |
| + EXPECT_CALL(*mock_permissions_broker_client_, |
| + RequestUdpPortAccess(1234, "foo0", _, _)) |
| + .WillOnce(InvokeCallback<3>(true)); |
| + EXPECT_CALL(*mock_permissions_broker_client_, ReleaseUdpPort(1234, "foo0", _)) |
| + .WillOnce(InvokeCallback<2>(true)); |
| + |
| + FirewallHole::Open( |
| + FirewallHole::PortType::UDP, 1234, "foo0", |
| + base::Bind(&FirewallHoleTest::AssertOpenSuccess, base::Unretained(this))); |
| + run_loop_.Run(); |
| +} |
| + |
| +TEST_F(FirewallHoleTest, DenyUdpPortAccess) { |
| + EXPECT_CALL(*mock_permissions_broker_client_, |
| + RequestUdpPortAccess(1234, "foo0", _, _)) |
| + .WillOnce(InvokeCallback<3>(false)); |
| + |
| + FirewallHole::Open( |
| + FirewallHole::PortType::UDP, 1234, "foo0", |
| + base::Bind(&FirewallHoleTest::AssertOpenFailure, base::Unretained(this))); |
| + run_loop_.Run(); |
| +} |