Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(481)

Side by Side Diff: chrome/browser/extensions/api/device_permissions_manager_unittest.cc

Issue 980023002: Move device/usb classes from the FILE thread to UI thread. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Allow USB transfer calls from any thread again. Created 5 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/run_loop.h" 5 #include "base/run_loop.h"
6 #include "base/strings/utf_string_conversions.h" 6 #include "base/strings/utf_string_conversions.h"
7 #include "base/test/values_test_util.h" 7 #include "base/test/values_test_util.h"
8 #include "chrome/browser/extensions/test_extension_environment.h" 8 #include "chrome/browser/extensions/test_extension_environment.h"
9 #include "chrome/test/base/testing_profile.h" 9 #include "chrome/test/base/testing_profile.h"
10 #include "device/core/device_client.h" 10 #include "device/core/device_client.h"
(...skipping 12 matching lines...) Expand all
23 using device::UsbDevice; 23 using device::UsbDevice;
24 using device::UsbDeviceHandle; 24 using device::UsbDeviceHandle;
25 using device::UsbService; 25 using device::UsbService;
26 using testing::_; 26 using testing::_;
27 using testing::DoAll; 27 using testing::DoAll;
28 using testing::Return; 28 using testing::Return;
29 using testing::SetArgPointee; 29 using testing::SetArgPointee;
30 30
31 int next_id; 31 int next_id;
32 32
33 class MockDeviceClient : device::DeviceClient {
34 public:
35 MockDeviceClient() {}
36
37 // device::DeviceClient implementation:
38 UsbService* GetUsbService() override {
39 DCHECK(usb_service_);
40 return usb_service_;
41 }
42
43 void set_usb_service(UsbService* service) { usb_service_ = service; }
44
45 private:
46 UsbService* usb_service_ = nullptr;
47 };
48
33 class MockUsbService : public UsbService { 49 class MockUsbService : public UsbService {
34 public: 50 public:
35 MockUsbService() : mock_device_client(this) {} 51 MockUsbService() {}
36 52
37 MOCK_METHOD1(GetDeviceById, scoped_refptr<UsbDevice>(uint32)); 53 MOCK_METHOD1(GetDeviceById, scoped_refptr<UsbDevice>(uint32));
38 MOCK_METHOD1(GetDevices, void(std::vector<scoped_refptr<UsbDevice>>*)); 54 MOCK_METHOD1(GetDevices, void(const GetDevicesCallback& callback));
39 55
40 // Public wrapper for the protected NotifyDeviceRemove function. 56 // Public wrapper for the protected NotifyDeviceRemove function.
41 void NotifyDeviceRemoved(scoped_refptr<UsbDevice> device) { 57 void NotifyDeviceRemoved(scoped_refptr<UsbDevice> device) {
42 UsbService::NotifyDeviceRemoved(device); 58 UsbService::NotifyDeviceRemoved(device);
43 } 59 }
44
45 private:
46 class MockDeviceClient : device::DeviceClient {
47 public:
48 explicit MockDeviceClient(UsbService* usb_service)
49 : usb_service_(usb_service) {}
50
51 UsbService* GetUsbService() override { return usb_service_; }
52
53 private:
54 UsbService* usb_service_;
55 };
56
57 MockDeviceClient mock_device_client;
58 }; 60 };
59 61
60 class MockUsbDevice : public UsbDevice { 62 class MockUsbDevice : public UsbDevice {
61 public: 63 public:
62 explicit MockUsbDevice(const std::string& serial_number) 64 explicit MockUsbDevice(const std::string& serial_number)
63 : UsbDevice(0, 0, next_id++) { 65 : UsbDevice(0,
64 if (serial_number.empty()) { 66 0,
65 EXPECT_CALL(*this, GetSerialNumber(_)).WillRepeatedly(Return(false)); 67 next_id++,
66 } else { 68 base::ASCIIToUTF16("Test Manufacturer"),
67 EXPECT_CALL(*this, GetSerialNumber(_)) 69 base::ASCIIToUTF16("Test Product"),
68 .WillRepeatedly( 70 base::ASCIIToUTF16(serial_number)) {}
69 DoAll(SetArgPointee<0>(base::ASCIIToUTF16(serial_number)),
70 Return(true)));
71 }
72 71
73 EXPECT_CALL(*this, GetProduct(_)) 72 MOCK_METHOD1(Open, void(const OpenCallback&));
74 .WillRepeatedly(
75 DoAll(SetArgPointee<0>(base::ASCIIToUTF16("Test Product")),
76 Return(true)));
77 EXPECT_CALL(*this, GetManufacturer(_))
78 .WillRepeatedly(
79 DoAll(SetArgPointee<0>(base::ASCIIToUTF16("Test Manufacturer")),
80 Return(true)));
81 }
82
83 MOCK_METHOD0(Open, scoped_refptr<UsbDeviceHandle>());
84 MOCK_METHOD1(Close, bool(scoped_refptr<UsbDeviceHandle>)); 73 MOCK_METHOD1(Close, bool(scoped_refptr<UsbDeviceHandle>));
85 MOCK_METHOD0(GetConfiguration, const device::UsbConfigDescriptor*()); 74 MOCK_METHOD0(GetConfiguration, const device::UsbConfigDescriptor*());
86 MOCK_METHOD1(GetManufacturer, bool(base::string16*));
87 MOCK_METHOD1(GetProduct, bool(base::string16*));
88 MOCK_METHOD1(GetSerialNumber, bool(base::string16*));
89 75
90 private: 76 private:
91 virtual ~MockUsbDevice() {} 77 virtual ~MockUsbDevice() {}
92 }; 78 };
93 79
94 void AllowUsbDevice(DevicePermissionsManager* manager,
95 const Extension* extension,
96 scoped_refptr<UsbDevice> device) {
97 // If the device cannot provide any of these strings they will simply by
98 // empty.
99 base::string16 product;
100 device->GetProduct(&product);
101 base::string16 manufacturer;
102 device->GetManufacturer(&manufacturer);
103 base::string16 serial_number;
104 device->GetSerialNumber(&serial_number);
105
106 manager->AllowUsbDevice(
107 extension->id(), device, product, manufacturer, serial_number);
108 }
109
110 scoped_refptr<DevicePermissionEntry> FindEntry(
111 DevicePermissions* device_permissions,
112 scoped_refptr<UsbDevice> device) {
113 base::string16 serial_number;
114 device->GetSerialNumber(&serial_number);
115
116 return device_permissions->FindEntry(device, serial_number);
117 }
118
119 } // namespace 80 } // namespace
120 81
121 class DevicePermissionsManagerTest : public testing::Test { 82 class DevicePermissionsManagerTest : public testing::Test {
122 protected: 83 protected:
123 void SetUp() override { 84 void SetUp() override {
124 testing::Test::SetUp(); 85 testing::Test::SetUp();
125 env_.GetExtensionPrefs(); // Force creation before adding extensions. 86 env_.reset(new extensions::TestExtensionEnvironment());
126 extension_ = env_.MakeExtension(*base::test::ParseJson( 87 env_->GetExtensionPrefs(); // Force creation before adding extensions.
127 "{" 88 extension_ =
128 " \"app\": {" 89 env_->MakeExtension(*base::test::ParseJson(
129 " \"background\": {" 90 "{"
130 " \"scripts\": [\"background.js\"]" 91 " \"app\": {"
131 " }" 92 " \"background\": {"
132 " }," 93 " \"scripts\": [\"background.js\"]"
133 " \"permissions\": [" 94 " }"
134 " \"usb\"" 95 " },"
135 " ]" 96 " \"permissions\": ["
136 "}")); 97 " \"usb\""
98 " ]"
99 "}"));
137 device0_ = new MockUsbDevice("ABCDE"); 100 device0_ = new MockUsbDevice("ABCDE");
138 device1_ = new MockUsbDevice(""); 101 device1_ = new MockUsbDevice("");
139 device2_ = new MockUsbDevice("12345"); 102 device2_ = new MockUsbDevice("12345");
140 device3_ = new MockUsbDevice(""); 103 device3_ = new MockUsbDevice("");
141 usb_service_ = new MockUsbService(); 104 mock_device_client_.set_usb_service(&usb_service_);
142 UsbService::SetInstanceForTest(usb_service_);
143 } 105 }
144 106
145 extensions::TestExtensionEnvironment env_; 107 void TearDown() override { env_.reset(nullptr); }
108
109 scoped_ptr<extensions::TestExtensionEnvironment> env_;
146 const extensions::Extension* extension_; 110 const extensions::Extension* extension_;
147 MockUsbService* usb_service_; 111 MockDeviceClient mock_device_client_;
112 MockUsbService usb_service_;
148 scoped_refptr<MockUsbDevice> device0_; 113 scoped_refptr<MockUsbDevice> device0_;
149 scoped_refptr<MockUsbDevice> device1_; 114 scoped_refptr<MockUsbDevice> device1_;
150 scoped_refptr<MockUsbDevice> device2_; 115 scoped_refptr<MockUsbDevice> device2_;
151 scoped_refptr<MockUsbDevice> device3_; 116 scoped_refptr<MockUsbDevice> device3_;
152 }; 117 };
153 118
154 TEST_F(DevicePermissionsManagerTest, AllowAndClearDevices) { 119 TEST_F(DevicePermissionsManagerTest, AllowAndClearDevices) {
155 DevicePermissionsManager* manager = 120 DevicePermissionsManager* manager =
156 DevicePermissionsManager::Get(env_.profile()); 121 DevicePermissionsManager::Get(env_->profile());
157 AllowUsbDevice(manager, extension_, device0_); 122 manager->AllowUsbDevice(extension_->id(), device0_);
158 AllowUsbDevice(manager, extension_, device1_); 123 manager->AllowUsbDevice(extension_->id(), device1_);
159 124
160 scoped_ptr<DevicePermissions> device_permissions = 125 DevicePermissions* device_permissions =
161 manager->GetForExtension(extension_->id()); 126 manager->GetForExtension(extension_->id());
162 scoped_refptr<DevicePermissionEntry> device0_entry = 127 scoped_refptr<DevicePermissionEntry> device0_entry =
163 FindEntry(device_permissions.get(), device0_); 128 device_permissions->FindEntry(device0_);
164 ASSERT_TRUE(device0_entry.get()); 129 ASSERT_TRUE(device0_entry.get());
165 scoped_refptr<DevicePermissionEntry> device1_entry = 130 scoped_refptr<DevicePermissionEntry> device1_entry =
166 FindEntry(device_permissions.get(), device1_); 131 device_permissions->FindEntry(device1_);
167 ASSERT_TRUE(device1_entry.get()); 132 ASSERT_TRUE(device1_entry.get());
168 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); 133 ASSERT_FALSE(device_permissions->FindEntry(device2_).get());
169 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); 134 ASSERT_FALSE(device_permissions->FindEntry(device3_).get());
170 ASSERT_EQ(2U, device_permissions->entries().size()); 135 ASSERT_EQ(2U, device_permissions->entries().size());
171 136
172 ASSERT_EQ(base::ASCIIToUTF16( 137 ASSERT_EQ(base::ASCIIToUTF16(
173 "Test Product from Test Manufacturer (serial number ABCDE)"), 138 "Test Product from Test Manufacturer (serial number ABCDE)"),
174 device0_entry->GetPermissionMessageString()); 139 device0_entry->GetPermissionMessageString());
175 ASSERT_EQ(base::ASCIIToUTF16("Test Product from Test Manufacturer"), 140 ASSERT_EQ(base::ASCIIToUTF16("Test Product from Test Manufacturer"),
176 device1_entry->GetPermissionMessageString()); 141 device1_entry->GetPermissionMessageString());
177 142
178 manager->Clear(extension_->id()); 143 manager->Clear(extension_->id());
144 // The device_permissions object is deleted by Clear.
145 device_permissions = manager->GetForExtension(extension_->id());
179 146
180 device_permissions = manager->GetForExtension(extension_->id()); 147 ASSERT_FALSE(device_permissions->FindEntry(device0_).get());
181 ASSERT_FALSE(FindEntry(device_permissions.get(), device0_).get()); 148 ASSERT_FALSE(device_permissions->FindEntry(device1_).get());
182 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); 149 ASSERT_FALSE(device_permissions->FindEntry(device2_).get());
183 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); 150 ASSERT_FALSE(device_permissions->FindEntry(device3_).get());
184 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get());
185 ASSERT_EQ(0U, device_permissions->entries().size()); 151 ASSERT_EQ(0U, device_permissions->entries().size());
186 152
187 // After clearing device it should be possible to grant permission again. 153 // After clearing device it should be possible to grant permission again.
188 AllowUsbDevice(manager, extension_, device0_); 154 manager->AllowUsbDevice(extension_->id(), device0_);
189 AllowUsbDevice(manager, extension_, device1_); 155 manager->AllowUsbDevice(extension_->id(), device1_);
190 156
191 device_permissions = manager->GetForExtension(extension_->id()); 157 ASSERT_TRUE(device_permissions->FindEntry(device0_).get());
192 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); 158 ASSERT_TRUE(device_permissions->FindEntry(device1_).get());
193 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); 159 ASSERT_FALSE(device_permissions->FindEntry(device2_).get());
194 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); 160 ASSERT_FALSE(device_permissions->FindEntry(device3_).get());
195 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get());
196 } 161 }
197 162
198 TEST_F(DevicePermissionsManagerTest, SuspendExtension) { 163 TEST_F(DevicePermissionsManagerTest, SuspendExtension) {
199 DevicePermissionsManager* manager = 164 DevicePermissionsManager* manager =
200 DevicePermissionsManager::Get(env_.profile()); 165 DevicePermissionsManager::Get(env_->profile());
201 AllowUsbDevice(manager, extension_, device0_); 166 manager->AllowUsbDevice(extension_->id(), device0_);
202 AllowUsbDevice(manager, extension_, device1_); 167 manager->AllowUsbDevice(extension_->id(), device1_);
203 168
204 scoped_ptr<DevicePermissions> device_permissions = 169 DevicePermissions* device_permissions =
205 manager->GetForExtension(extension_->id()); 170 manager->GetForExtension(extension_->id());
206 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); 171 ASSERT_TRUE(device_permissions->FindEntry(device0_).get());
207 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); 172 ASSERT_TRUE(device_permissions->FindEntry(device1_).get());
208 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); 173 ASSERT_FALSE(device_permissions->FindEntry(device2_).get());
209 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); 174 ASSERT_FALSE(device_permissions->FindEntry(device3_).get());
210 175
211 manager->OnBackgroundHostClose(extension_->id()); 176 manager->OnBackgroundHostClose(extension_->id());
212 177
213 device_permissions = manager->GetForExtension(extension_->id());
214 // Device 0 is still registered because its serial number has been stored in 178 // Device 0 is still registered because its serial number has been stored in
215 // ExtensionPrefs, it is "persistent". 179 // ExtensionPrefs, it is "persistent".
216 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); 180 ASSERT_TRUE(device_permissions->FindEntry(device0_).get());
217 // Device 1 does not have uniquely identifying traits and so permission to 181 // Device 1 does not have uniquely identifying traits and so permission to
218 // open it has been dropped when the app's windows have closed and the 182 // open it has been dropped when the app's windows have closed and the
219 // background page has been suspended. 183 // background page has been suspended.
220 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); 184 ASSERT_FALSE(device_permissions->FindEntry(device1_).get());
221 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); 185 ASSERT_FALSE(device_permissions->FindEntry(device2_).get());
222 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); 186 ASSERT_FALSE(device_permissions->FindEntry(device3_).get());
223 } 187 }
224 188
225 // TODO(reillyg): Until crbug.com/427985 is resolved device removal 189 TEST_F(DevicePermissionsManagerTest, DisconnectDevice) {
226 // notifications are delivered asynchronously and so this test must be disabled.
227 TEST_F(DevicePermissionsManagerTest, DISABLED_DisconnectDevice) {
228 DevicePermissionsManager* manager = 190 DevicePermissionsManager* manager =
229 DevicePermissionsManager::Get(env_.profile()); 191 DevicePermissionsManager::Get(env_->profile());
230 AllowUsbDevice(manager, extension_, device0_); 192 manager->AllowUsbDevice(extension_->id(), device0_);
231 AllowUsbDevice(manager, extension_, device1_); 193 manager->AllowUsbDevice(extension_->id(), device1_);
232 194
233 scoped_ptr<DevicePermissions> device_permissions = 195 DevicePermissions* device_permissions =
234 manager->GetForExtension(extension_->id()); 196 manager->GetForExtension(extension_->id());
235 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); 197 ASSERT_TRUE(device_permissions->FindEntry(device0_).get());
236 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); 198 ASSERT_TRUE(device_permissions->FindEntry(device1_).get());
237 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); 199 ASSERT_FALSE(device_permissions->FindEntry(device2_).get());
238 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); 200 ASSERT_FALSE(device_permissions->FindEntry(device3_).get());
239 201
240 usb_service_->NotifyDeviceRemoved(device0_); 202 usb_service_.NotifyDeviceRemoved(device0_);
241 usb_service_->NotifyDeviceRemoved(device1_); 203 usb_service_.NotifyDeviceRemoved(device1_);
242 204
243 device_permissions = manager->GetForExtension(extension_->id());
244 // Device 0 will be accessible when it is reconnected because it can be 205 // Device 0 will be accessible when it is reconnected because it can be
245 // recognized by its serial number. 206 // recognized by its serial number.
246 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); 207 ASSERT_TRUE(device_permissions->FindEntry(device0_).get());
247 // Device 1 does not have a serial number and cannot be distinguished from 208 // Device 1 does not have a serial number and cannot be distinguished from
248 // any other device of the same model so the app must request permission again 209 // any other device of the same model so the app must request permission again
249 // when it is reconnected. 210 // when it is reconnected.
250 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); 211 ASSERT_FALSE(device_permissions->FindEntry(device1_).get());
251 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); 212 ASSERT_FALSE(device_permissions->FindEntry(device2_).get());
252 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); 213 ASSERT_FALSE(device_permissions->FindEntry(device3_).get());
253 } 214 }
254 215
255 TEST_F(DevicePermissionsManagerTest, RevokeAndRegrantAccess) { 216 TEST_F(DevicePermissionsManagerTest, RevokeAndRegrantAccess) {
256 DevicePermissionsManager* manager = 217 DevicePermissionsManager* manager =
257 DevicePermissionsManager::Get(env_.profile()); 218 DevicePermissionsManager::Get(env_->profile());
258 AllowUsbDevice(manager, extension_, device0_); 219 manager->AllowUsbDevice(extension_->id(), device0_);
259 AllowUsbDevice(manager, extension_, device1_); 220 manager->AllowUsbDevice(extension_->id(), device1_);
260 221
261 scoped_ptr<DevicePermissions> device_permissions = 222 DevicePermissions* device_permissions =
262 manager->GetForExtension(extension_->id()); 223 manager->GetForExtension(extension_->id());
263 scoped_refptr<DevicePermissionEntry> device0_entry = 224 scoped_refptr<DevicePermissionEntry> device0_entry =
264 FindEntry(device_permissions.get(), device0_); 225 device_permissions->FindEntry(device0_);
265 ASSERT_TRUE(device0_entry.get()); 226 ASSERT_TRUE(device0_entry.get());
266 scoped_refptr<DevicePermissionEntry> device1_entry = 227 scoped_refptr<DevicePermissionEntry> device1_entry =
267 FindEntry(device_permissions.get(), device1_); 228 device_permissions->FindEntry(device1_);
268 ASSERT_TRUE(device1_entry.get()); 229 ASSERT_TRUE(device1_entry.get());
269 230
270 manager->RemoveEntry(extension_->id(), device0_entry); 231 manager->RemoveEntry(extension_->id(), device0_entry);
271 device_permissions = manager->GetForExtension(extension_->id()); 232 ASSERT_FALSE(device_permissions->FindEntry(device0_).get());
272 ASSERT_FALSE(FindEntry(device_permissions.get(), device0_).get()); 233 ASSERT_TRUE(device_permissions->FindEntry(device1_).get());
273 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get());
274 234
275 AllowUsbDevice(manager, extension_, device0_); 235 manager->AllowUsbDevice(extension_->id(), device0_);
276 device_permissions = manager->GetForExtension(extension_->id()); 236 ASSERT_TRUE(device_permissions->FindEntry(device0_).get());
277 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); 237 ASSERT_TRUE(device_permissions->FindEntry(device1_).get());
278 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get());
279 238
280 manager->RemoveEntry(extension_->id(), device1_entry); 239 manager->RemoveEntry(extension_->id(), device1_entry);
281 device_permissions = manager->GetForExtension(extension_->id()); 240 ASSERT_TRUE(device_permissions->FindEntry(device0_).get());
282 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); 241 ASSERT_FALSE(device_permissions->FindEntry(device1_).get());
283 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get());
284 242
285 AllowUsbDevice(manager, extension_, device1_); 243 manager->AllowUsbDevice(extension_->id(), device1_);
286 device_permissions = manager->GetForExtension(extension_->id()); 244 ASSERT_TRUE(device_permissions->FindEntry(device0_).get());
287 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); 245 ASSERT_TRUE(device_permissions->FindEntry(device1_).get());
288 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get());
289 } 246 }
290 247
291 TEST_F(DevicePermissionsManagerTest, UpdateLastUsed) { 248 TEST_F(DevicePermissionsManagerTest, UpdateLastUsed) {
292 DevicePermissionsManager* manager = 249 DevicePermissionsManager* manager =
293 DevicePermissionsManager::Get(env_.profile()); 250 DevicePermissionsManager::Get(env_->profile());
294 AllowUsbDevice(manager, extension_, device0_); 251 manager->AllowUsbDevice(extension_->id(), device0_);
295 252
296 scoped_ptr<DevicePermissions> device_permissions = 253 DevicePermissions* device_permissions =
297 manager->GetForExtension(extension_->id()); 254 manager->GetForExtension(extension_->id());
298 scoped_refptr<DevicePermissionEntry> device0_entry = 255 scoped_refptr<DevicePermissionEntry> device0_entry =
299 FindEntry(device_permissions.get(), device0_); 256 device_permissions->FindEntry(device0_);
300 ASSERT_TRUE(device0_entry->last_used().is_null()); 257 ASSERT_TRUE(device0_entry->last_used().is_null());
301 258
302 manager->UpdateLastUsed(extension_->id(), device0_entry); 259 manager->UpdateLastUsed(extension_->id(), device0_entry);
303 device_permissions = manager->GetForExtension(extension_->id()); 260 device0_entry = device_permissions->FindEntry(device0_);
304 device0_entry = FindEntry(device_permissions.get(), device0_);
305 ASSERT_FALSE(device0_entry->last_used().is_null()); 261 ASSERT_FALSE(device0_entry->last_used().is_null());
306 } 262 }
307 263
308 TEST_F(DevicePermissionsManagerTest, LoadPrefs) { 264 TEST_F(DevicePermissionsManagerTest, LoadPrefs) {
309 scoped_ptr<base::Value> prefs_value = base::test::ParseJson( 265 scoped_ptr<base::Value> prefs_value = base::test::ParseJson(
310 "[" 266 "["
311 " {" 267 " {"
312 " \"product_id\": 0," 268 " \"product_id\": 0,"
313 " \"serial_number\": \"ABCDE\"," 269 " \"serial_number\": \"ABCDE\","
314 " \"type\": \"usb\"," 270 " \"type\": \"usb\","
315 " \"vendor_id\": 0" 271 " \"vendor_id\": 0"
316 " }" 272 " }"
317 "]"); 273 "]");
318 env_.GetExtensionPrefs()->UpdateExtensionPref(extension_->id(), "devices", 274 env_->GetExtensionPrefs()->UpdateExtensionPref(extension_->id(), "devices",
319 prefs_value.release()); 275 prefs_value.release());
320 276
321 DevicePermissionsManager* manager = 277 DevicePermissionsManager* manager =
322 DevicePermissionsManager::Get(env_.profile()); 278 DevicePermissionsManager::Get(env_->profile());
323 scoped_ptr<DevicePermissions> device_permissions = 279 DevicePermissions* device_permissions =
324 manager->GetForExtension(extension_->id()); 280 manager->GetForExtension(extension_->id());
325 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); 281 ASSERT_TRUE(device_permissions->FindEntry(device0_).get());
326 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); 282 ASSERT_FALSE(device_permissions->FindEntry(device1_).get());
327 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); 283 ASSERT_FALSE(device_permissions->FindEntry(device2_).get());
328 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); 284 ASSERT_FALSE(device_permissions->FindEntry(device3_).get());
329 } 285 }
330 286
331 } // namespace extensions 287 } // namespace extensions
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698