| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/run_loop.h" | 5 #include "base/run_loop.h" |
| 6 #include "base/strings/utf_string_conversions.h" | 6 #include "base/strings/utf_string_conversions.h" |
| 7 #include "base/test/values_test_util.h" | 7 #include "base/test/values_test_util.h" |
| 8 #include "chrome/browser/extensions/test_extension_environment.h" | 8 #include "chrome/browser/extensions/test_extension_environment.h" |
| 9 #include "chrome/test/base/testing_profile.h" | 9 #include "chrome/test/base/testing_profile.h" |
| 10 #include "device/core/device_client.h" | 10 #include "device/core/device_client.h" |
| (...skipping 12 matching lines...) Expand all Loading... |
| 23 using device::UsbDevice; | 23 using device::UsbDevice; |
| 24 using device::UsbDeviceHandle; | 24 using device::UsbDeviceHandle; |
| 25 using device::UsbService; | 25 using device::UsbService; |
| 26 using testing::_; | 26 using testing::_; |
| 27 using testing::DoAll; | 27 using testing::DoAll; |
| 28 using testing::Return; | 28 using testing::Return; |
| 29 using testing::SetArgPointee; | 29 using testing::SetArgPointee; |
| 30 | 30 |
| 31 int next_id; | 31 int next_id; |
| 32 | 32 |
| 33 class MockDeviceClient : device::DeviceClient { |
| 34 public: |
| 35 MockDeviceClient() {} |
| 36 |
| 37 // device::DeviceClient implementation: |
| 38 UsbService* GetUsbService() override { |
| 39 DCHECK(usb_service_); |
| 40 return usb_service_; |
| 41 } |
| 42 |
| 43 void set_usb_service(UsbService* service) { usb_service_ = service; } |
| 44 |
| 45 private: |
| 46 UsbService* usb_service_ = nullptr; |
| 47 }; |
| 48 |
| 33 class MockUsbService : public UsbService { | 49 class MockUsbService : public UsbService { |
| 34 public: | 50 public: |
| 35 MockUsbService() : mock_device_client(this) {} | 51 MockUsbService() {} |
| 36 | 52 |
| 37 MOCK_METHOD1(GetDeviceById, scoped_refptr<UsbDevice>(uint32)); | 53 MOCK_METHOD1(GetDeviceById, scoped_refptr<UsbDevice>(uint32)); |
| 38 MOCK_METHOD1(GetDevices, void(std::vector<scoped_refptr<UsbDevice>>*)); | 54 MOCK_METHOD1(GetDevices, void(const GetDevicesCallback& callback)); |
| 39 | 55 |
| 40 // Public wrapper for the protected NotifyDeviceRemove function. | 56 // Public wrapper for the protected NotifyDeviceRemove function. |
| 41 void NotifyDeviceRemoved(scoped_refptr<UsbDevice> device) { | 57 void NotifyDeviceRemoved(scoped_refptr<UsbDevice> device) { |
| 42 UsbService::NotifyDeviceRemoved(device); | 58 UsbService::NotifyDeviceRemoved(device); |
| 43 } | 59 } |
| 44 | |
| 45 private: | |
| 46 class MockDeviceClient : device::DeviceClient { | |
| 47 public: | |
| 48 explicit MockDeviceClient(UsbService* usb_service) | |
| 49 : usb_service_(usb_service) {} | |
| 50 | |
| 51 UsbService* GetUsbService() override { return usb_service_; } | |
| 52 | |
| 53 private: | |
| 54 UsbService* usb_service_; | |
| 55 }; | |
| 56 | |
| 57 MockDeviceClient mock_device_client; | |
| 58 }; | 60 }; |
| 59 | 61 |
| 60 class MockUsbDevice : public UsbDevice { | 62 class MockUsbDevice : public UsbDevice { |
| 61 public: | 63 public: |
| 62 explicit MockUsbDevice(const std::string& serial_number) | 64 explicit MockUsbDevice(const std::string& serial_number) |
| 63 : UsbDevice(0, 0, next_id++) { | 65 : UsbDevice(0, |
| 64 if (serial_number.empty()) { | 66 0, |
| 65 EXPECT_CALL(*this, GetSerialNumber(_)).WillRepeatedly(Return(false)); | 67 next_id++, |
| 66 } else { | 68 base::ASCIIToUTF16("Test Manufacturer"), |
| 67 EXPECT_CALL(*this, GetSerialNumber(_)) | 69 base::ASCIIToUTF16("Test Product"), |
| 68 .WillRepeatedly( | 70 base::ASCIIToUTF16(serial_number)) {} |
| 69 DoAll(SetArgPointee<0>(base::ASCIIToUTF16(serial_number)), | |
| 70 Return(true))); | |
| 71 } | |
| 72 | 71 |
| 73 EXPECT_CALL(*this, GetProduct(_)) | 72 MOCK_METHOD1(Open, void(const OpenCallback&)); |
| 74 .WillRepeatedly( | |
| 75 DoAll(SetArgPointee<0>(base::ASCIIToUTF16("Test Product")), | |
| 76 Return(true))); | |
| 77 EXPECT_CALL(*this, GetManufacturer(_)) | |
| 78 .WillRepeatedly( | |
| 79 DoAll(SetArgPointee<0>(base::ASCIIToUTF16("Test Manufacturer")), | |
| 80 Return(true))); | |
| 81 } | |
| 82 | |
| 83 MOCK_METHOD0(Open, scoped_refptr<UsbDeviceHandle>()); | |
| 84 MOCK_METHOD1(Close, bool(scoped_refptr<UsbDeviceHandle>)); | 73 MOCK_METHOD1(Close, bool(scoped_refptr<UsbDeviceHandle>)); |
| 85 MOCK_METHOD0(GetConfiguration, const device::UsbConfigDescriptor*()); | 74 MOCK_METHOD0(GetConfiguration, const device::UsbConfigDescriptor*()); |
| 86 MOCK_METHOD1(GetManufacturer, bool(base::string16*)); | |
| 87 MOCK_METHOD1(GetProduct, bool(base::string16*)); | |
| 88 MOCK_METHOD1(GetSerialNumber, bool(base::string16*)); | |
| 89 | 75 |
| 90 private: | 76 private: |
| 91 virtual ~MockUsbDevice() {} | 77 virtual ~MockUsbDevice() {} |
| 92 }; | 78 }; |
| 93 | 79 |
| 94 void AllowUsbDevice(DevicePermissionsManager* manager, | |
| 95 const Extension* extension, | |
| 96 scoped_refptr<UsbDevice> device) { | |
| 97 // If the device cannot provide any of these strings they will simply by | |
| 98 // empty. | |
| 99 base::string16 product; | |
| 100 device->GetProduct(&product); | |
| 101 base::string16 manufacturer; | |
| 102 device->GetManufacturer(&manufacturer); | |
| 103 base::string16 serial_number; | |
| 104 device->GetSerialNumber(&serial_number); | |
| 105 | |
| 106 manager->AllowUsbDevice( | |
| 107 extension->id(), device, product, manufacturer, serial_number); | |
| 108 } | |
| 109 | |
| 110 scoped_refptr<DevicePermissionEntry> FindEntry( | |
| 111 DevicePermissions* device_permissions, | |
| 112 scoped_refptr<UsbDevice> device) { | |
| 113 base::string16 serial_number; | |
| 114 device->GetSerialNumber(&serial_number); | |
| 115 | |
| 116 return device_permissions->FindEntry(device, serial_number); | |
| 117 } | |
| 118 | |
| 119 } // namespace | 80 } // namespace |
| 120 | 81 |
| 121 class DevicePermissionsManagerTest : public testing::Test { | 82 class DevicePermissionsManagerTest : public testing::Test { |
| 122 protected: | 83 protected: |
| 123 void SetUp() override { | 84 void SetUp() override { |
| 124 testing::Test::SetUp(); | 85 testing::Test::SetUp(); |
| 125 env_.GetExtensionPrefs(); // Force creation before adding extensions. | 86 env_.reset(new extensions::TestExtensionEnvironment()); |
| 126 extension_ = env_.MakeExtension(*base::test::ParseJson( | 87 env_->GetExtensionPrefs(); // Force creation before adding extensions. |
| 127 "{" | 88 extension_ = |
| 128 " \"app\": {" | 89 env_->MakeExtension(*base::test::ParseJson( |
| 129 " \"background\": {" | 90 "{" |
| 130 " \"scripts\": [\"background.js\"]" | 91 " \"app\": {" |
| 131 " }" | 92 " \"background\": {" |
| 132 " }," | 93 " \"scripts\": [\"background.js\"]" |
| 133 " \"permissions\": [" | 94 " }" |
| 134 " \"usb\"" | 95 " }," |
| 135 " ]" | 96 " \"permissions\": [" |
| 136 "}")); | 97 " \"usb\"" |
| 98 " ]" |
| 99 "}")); |
| 137 device0_ = new MockUsbDevice("ABCDE"); | 100 device0_ = new MockUsbDevice("ABCDE"); |
| 138 device1_ = new MockUsbDevice(""); | 101 device1_ = new MockUsbDevice(""); |
| 139 device2_ = new MockUsbDevice("12345"); | 102 device2_ = new MockUsbDevice("12345"); |
| 140 device3_ = new MockUsbDevice(""); | 103 device3_ = new MockUsbDevice(""); |
| 141 usb_service_ = new MockUsbService(); | 104 mock_device_client_.set_usb_service(&usb_service_); |
| 142 UsbService::SetInstanceForTest(usb_service_); | |
| 143 } | 105 } |
| 144 | 106 |
| 145 extensions::TestExtensionEnvironment env_; | 107 void TearDown() override { env_.reset(nullptr); } |
| 108 |
| 109 scoped_ptr<extensions::TestExtensionEnvironment> env_; |
| 146 const extensions::Extension* extension_; | 110 const extensions::Extension* extension_; |
| 147 MockUsbService* usb_service_; | 111 MockDeviceClient mock_device_client_; |
| 112 MockUsbService usb_service_; |
| 148 scoped_refptr<MockUsbDevice> device0_; | 113 scoped_refptr<MockUsbDevice> device0_; |
| 149 scoped_refptr<MockUsbDevice> device1_; | 114 scoped_refptr<MockUsbDevice> device1_; |
| 150 scoped_refptr<MockUsbDevice> device2_; | 115 scoped_refptr<MockUsbDevice> device2_; |
| 151 scoped_refptr<MockUsbDevice> device3_; | 116 scoped_refptr<MockUsbDevice> device3_; |
| 152 }; | 117 }; |
| 153 | 118 |
| 154 TEST_F(DevicePermissionsManagerTest, AllowAndClearDevices) { | 119 TEST_F(DevicePermissionsManagerTest, AllowAndClearDevices) { |
| 155 DevicePermissionsManager* manager = | 120 DevicePermissionsManager* manager = |
| 156 DevicePermissionsManager::Get(env_.profile()); | 121 DevicePermissionsManager::Get(env_->profile()); |
| 157 AllowUsbDevice(manager, extension_, device0_); | 122 manager->AllowUsbDevice(extension_->id(), device0_); |
| 158 AllowUsbDevice(manager, extension_, device1_); | 123 manager->AllowUsbDevice(extension_->id(), device1_); |
| 159 | 124 |
| 160 scoped_ptr<DevicePermissions> device_permissions = | 125 DevicePermissions* device_permissions = |
| 161 manager->GetForExtension(extension_->id()); | 126 manager->GetForExtension(extension_->id()); |
| 162 scoped_refptr<DevicePermissionEntry> device0_entry = | 127 scoped_refptr<DevicePermissionEntry> device0_entry = |
| 163 FindEntry(device_permissions.get(), device0_); | 128 device_permissions->FindEntry(device0_); |
| 164 ASSERT_TRUE(device0_entry.get()); | 129 ASSERT_TRUE(device0_entry.get()); |
| 165 scoped_refptr<DevicePermissionEntry> device1_entry = | 130 scoped_refptr<DevicePermissionEntry> device1_entry = |
| 166 FindEntry(device_permissions.get(), device1_); | 131 device_permissions->FindEntry(device1_); |
| 167 ASSERT_TRUE(device1_entry.get()); | 132 ASSERT_TRUE(device1_entry.get()); |
| 168 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); | 133 ASSERT_FALSE(device_permissions->FindEntry(device2_).get()); |
| 169 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); | 134 ASSERT_FALSE(device_permissions->FindEntry(device3_).get()); |
| 170 ASSERT_EQ(2U, device_permissions->entries().size()); | 135 ASSERT_EQ(2U, device_permissions->entries().size()); |
| 171 | 136 |
| 172 ASSERT_EQ(base::ASCIIToUTF16( | 137 ASSERT_EQ(base::ASCIIToUTF16( |
| 173 "Test Product from Test Manufacturer (serial number ABCDE)"), | 138 "Test Product from Test Manufacturer (serial number ABCDE)"), |
| 174 device0_entry->GetPermissionMessageString()); | 139 device0_entry->GetPermissionMessageString()); |
| 175 ASSERT_EQ(base::ASCIIToUTF16("Test Product from Test Manufacturer"), | 140 ASSERT_EQ(base::ASCIIToUTF16("Test Product from Test Manufacturer"), |
| 176 device1_entry->GetPermissionMessageString()); | 141 device1_entry->GetPermissionMessageString()); |
| 177 | 142 |
| 178 manager->Clear(extension_->id()); | 143 manager->Clear(extension_->id()); |
| 144 // The device_permissions object is deleted by Clear. |
| 145 device_permissions = manager->GetForExtension(extension_->id()); |
| 179 | 146 |
| 180 device_permissions = manager->GetForExtension(extension_->id()); | 147 ASSERT_FALSE(device_permissions->FindEntry(device0_).get()); |
| 181 ASSERT_FALSE(FindEntry(device_permissions.get(), device0_).get()); | 148 ASSERT_FALSE(device_permissions->FindEntry(device1_).get()); |
| 182 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); | 149 ASSERT_FALSE(device_permissions->FindEntry(device2_).get()); |
| 183 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); | 150 ASSERT_FALSE(device_permissions->FindEntry(device3_).get()); |
| 184 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); | |
| 185 ASSERT_EQ(0U, device_permissions->entries().size()); | 151 ASSERT_EQ(0U, device_permissions->entries().size()); |
| 186 | 152 |
| 187 // After clearing device it should be possible to grant permission again. | 153 // After clearing device it should be possible to grant permission again. |
| 188 AllowUsbDevice(manager, extension_, device0_); | 154 manager->AllowUsbDevice(extension_->id(), device0_); |
| 189 AllowUsbDevice(manager, extension_, device1_); | 155 manager->AllowUsbDevice(extension_->id(), device1_); |
| 190 | 156 |
| 191 device_permissions = manager->GetForExtension(extension_->id()); | 157 ASSERT_TRUE(device_permissions->FindEntry(device0_).get()); |
| 192 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); | 158 ASSERT_TRUE(device_permissions->FindEntry(device1_).get()); |
| 193 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); | 159 ASSERT_FALSE(device_permissions->FindEntry(device2_).get()); |
| 194 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); | 160 ASSERT_FALSE(device_permissions->FindEntry(device3_).get()); |
| 195 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); | |
| 196 } | 161 } |
| 197 | 162 |
| 198 TEST_F(DevicePermissionsManagerTest, SuspendExtension) { | 163 TEST_F(DevicePermissionsManagerTest, SuspendExtension) { |
| 199 DevicePermissionsManager* manager = | 164 DevicePermissionsManager* manager = |
| 200 DevicePermissionsManager::Get(env_.profile()); | 165 DevicePermissionsManager::Get(env_->profile()); |
| 201 AllowUsbDevice(manager, extension_, device0_); | 166 manager->AllowUsbDevice(extension_->id(), device0_); |
| 202 AllowUsbDevice(manager, extension_, device1_); | 167 manager->AllowUsbDevice(extension_->id(), device1_); |
| 203 | 168 |
| 204 scoped_ptr<DevicePermissions> device_permissions = | 169 DevicePermissions* device_permissions = |
| 205 manager->GetForExtension(extension_->id()); | 170 manager->GetForExtension(extension_->id()); |
| 206 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); | 171 ASSERT_TRUE(device_permissions->FindEntry(device0_).get()); |
| 207 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); | 172 ASSERT_TRUE(device_permissions->FindEntry(device1_).get()); |
| 208 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); | 173 ASSERT_FALSE(device_permissions->FindEntry(device2_).get()); |
| 209 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); | 174 ASSERT_FALSE(device_permissions->FindEntry(device3_).get()); |
| 210 | 175 |
| 211 manager->OnBackgroundHostClose(extension_->id()); | 176 manager->OnBackgroundHostClose(extension_->id()); |
| 212 | 177 |
| 213 device_permissions = manager->GetForExtension(extension_->id()); | |
| 214 // Device 0 is still registered because its serial number has been stored in | 178 // Device 0 is still registered because its serial number has been stored in |
| 215 // ExtensionPrefs, it is "persistent". | 179 // ExtensionPrefs, it is "persistent". |
| 216 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); | 180 ASSERT_TRUE(device_permissions->FindEntry(device0_).get()); |
| 217 // Device 1 does not have uniquely identifying traits and so permission to | 181 // Device 1 does not have uniquely identifying traits and so permission to |
| 218 // open it has been dropped when the app's windows have closed and the | 182 // open it has been dropped when the app's windows have closed and the |
| 219 // background page has been suspended. | 183 // background page has been suspended. |
| 220 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); | 184 ASSERT_FALSE(device_permissions->FindEntry(device1_).get()); |
| 221 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); | 185 ASSERT_FALSE(device_permissions->FindEntry(device2_).get()); |
| 222 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); | 186 ASSERT_FALSE(device_permissions->FindEntry(device3_).get()); |
| 223 } | 187 } |
| 224 | 188 |
| 225 // TODO(reillyg): Until crbug.com/427985 is resolved device removal | 189 TEST_F(DevicePermissionsManagerTest, DisconnectDevice) { |
| 226 // notifications are delivered asynchronously and so this test must be disabled. | |
| 227 TEST_F(DevicePermissionsManagerTest, DISABLED_DisconnectDevice) { | |
| 228 DevicePermissionsManager* manager = | 190 DevicePermissionsManager* manager = |
| 229 DevicePermissionsManager::Get(env_.profile()); | 191 DevicePermissionsManager::Get(env_->profile()); |
| 230 AllowUsbDevice(manager, extension_, device0_); | 192 manager->AllowUsbDevice(extension_->id(), device0_); |
| 231 AllowUsbDevice(manager, extension_, device1_); | 193 manager->AllowUsbDevice(extension_->id(), device1_); |
| 232 | 194 |
| 233 scoped_ptr<DevicePermissions> device_permissions = | 195 DevicePermissions* device_permissions = |
| 234 manager->GetForExtension(extension_->id()); | 196 manager->GetForExtension(extension_->id()); |
| 235 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); | 197 ASSERT_TRUE(device_permissions->FindEntry(device0_).get()); |
| 236 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); | 198 ASSERT_TRUE(device_permissions->FindEntry(device1_).get()); |
| 237 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); | 199 ASSERT_FALSE(device_permissions->FindEntry(device2_).get()); |
| 238 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); | 200 ASSERT_FALSE(device_permissions->FindEntry(device3_).get()); |
| 239 | 201 |
| 240 usb_service_->NotifyDeviceRemoved(device0_); | 202 usb_service_.NotifyDeviceRemoved(device0_); |
| 241 usb_service_->NotifyDeviceRemoved(device1_); | 203 usb_service_.NotifyDeviceRemoved(device1_); |
| 242 | 204 |
| 243 device_permissions = manager->GetForExtension(extension_->id()); | |
| 244 // Device 0 will be accessible when it is reconnected because it can be | 205 // Device 0 will be accessible when it is reconnected because it can be |
| 245 // recognized by its serial number. | 206 // recognized by its serial number. |
| 246 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); | 207 ASSERT_TRUE(device_permissions->FindEntry(device0_).get()); |
| 247 // Device 1 does not have a serial number and cannot be distinguished from | 208 // Device 1 does not have a serial number and cannot be distinguished from |
| 248 // any other device of the same model so the app must request permission again | 209 // any other device of the same model so the app must request permission again |
| 249 // when it is reconnected. | 210 // when it is reconnected. |
| 250 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); | 211 ASSERT_FALSE(device_permissions->FindEntry(device1_).get()); |
| 251 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); | 212 ASSERT_FALSE(device_permissions->FindEntry(device2_).get()); |
| 252 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); | 213 ASSERT_FALSE(device_permissions->FindEntry(device3_).get()); |
| 253 } | 214 } |
| 254 | 215 |
| 255 TEST_F(DevicePermissionsManagerTest, RevokeAndRegrantAccess) { | 216 TEST_F(DevicePermissionsManagerTest, RevokeAndRegrantAccess) { |
| 256 DevicePermissionsManager* manager = | 217 DevicePermissionsManager* manager = |
| 257 DevicePermissionsManager::Get(env_.profile()); | 218 DevicePermissionsManager::Get(env_->profile()); |
| 258 AllowUsbDevice(manager, extension_, device0_); | 219 manager->AllowUsbDevice(extension_->id(), device0_); |
| 259 AllowUsbDevice(manager, extension_, device1_); | 220 manager->AllowUsbDevice(extension_->id(), device1_); |
| 260 | 221 |
| 261 scoped_ptr<DevicePermissions> device_permissions = | 222 DevicePermissions* device_permissions = |
| 262 manager->GetForExtension(extension_->id()); | 223 manager->GetForExtension(extension_->id()); |
| 263 scoped_refptr<DevicePermissionEntry> device0_entry = | 224 scoped_refptr<DevicePermissionEntry> device0_entry = |
| 264 FindEntry(device_permissions.get(), device0_); | 225 device_permissions->FindEntry(device0_); |
| 265 ASSERT_TRUE(device0_entry.get()); | 226 ASSERT_TRUE(device0_entry.get()); |
| 266 scoped_refptr<DevicePermissionEntry> device1_entry = | 227 scoped_refptr<DevicePermissionEntry> device1_entry = |
| 267 FindEntry(device_permissions.get(), device1_); | 228 device_permissions->FindEntry(device1_); |
| 268 ASSERT_TRUE(device1_entry.get()); | 229 ASSERT_TRUE(device1_entry.get()); |
| 269 | 230 |
| 270 manager->RemoveEntry(extension_->id(), device0_entry); | 231 manager->RemoveEntry(extension_->id(), device0_entry); |
| 271 device_permissions = manager->GetForExtension(extension_->id()); | 232 ASSERT_FALSE(device_permissions->FindEntry(device0_).get()); |
| 272 ASSERT_FALSE(FindEntry(device_permissions.get(), device0_).get()); | 233 ASSERT_TRUE(device_permissions->FindEntry(device1_).get()); |
| 273 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); | |
| 274 | 234 |
| 275 AllowUsbDevice(manager, extension_, device0_); | 235 manager->AllowUsbDevice(extension_->id(), device0_); |
| 276 device_permissions = manager->GetForExtension(extension_->id()); | 236 ASSERT_TRUE(device_permissions->FindEntry(device0_).get()); |
| 277 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); | 237 ASSERT_TRUE(device_permissions->FindEntry(device1_).get()); |
| 278 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); | |
| 279 | 238 |
| 280 manager->RemoveEntry(extension_->id(), device1_entry); | 239 manager->RemoveEntry(extension_->id(), device1_entry); |
| 281 device_permissions = manager->GetForExtension(extension_->id()); | 240 ASSERT_TRUE(device_permissions->FindEntry(device0_).get()); |
| 282 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); | 241 ASSERT_FALSE(device_permissions->FindEntry(device1_).get()); |
| 283 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); | |
| 284 | 242 |
| 285 AllowUsbDevice(manager, extension_, device1_); | 243 manager->AllowUsbDevice(extension_->id(), device1_); |
| 286 device_permissions = manager->GetForExtension(extension_->id()); | 244 ASSERT_TRUE(device_permissions->FindEntry(device0_).get()); |
| 287 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); | 245 ASSERT_TRUE(device_permissions->FindEntry(device1_).get()); |
| 288 ASSERT_TRUE(FindEntry(device_permissions.get(), device1_).get()); | |
| 289 } | 246 } |
| 290 | 247 |
| 291 TEST_F(DevicePermissionsManagerTest, UpdateLastUsed) { | 248 TEST_F(DevicePermissionsManagerTest, UpdateLastUsed) { |
| 292 DevicePermissionsManager* manager = | 249 DevicePermissionsManager* manager = |
| 293 DevicePermissionsManager::Get(env_.profile()); | 250 DevicePermissionsManager::Get(env_->profile()); |
| 294 AllowUsbDevice(manager, extension_, device0_); | 251 manager->AllowUsbDevice(extension_->id(), device0_); |
| 295 | 252 |
| 296 scoped_ptr<DevicePermissions> device_permissions = | 253 DevicePermissions* device_permissions = |
| 297 manager->GetForExtension(extension_->id()); | 254 manager->GetForExtension(extension_->id()); |
| 298 scoped_refptr<DevicePermissionEntry> device0_entry = | 255 scoped_refptr<DevicePermissionEntry> device0_entry = |
| 299 FindEntry(device_permissions.get(), device0_); | 256 device_permissions->FindEntry(device0_); |
| 300 ASSERT_TRUE(device0_entry->last_used().is_null()); | 257 ASSERT_TRUE(device0_entry->last_used().is_null()); |
| 301 | 258 |
| 302 manager->UpdateLastUsed(extension_->id(), device0_entry); | 259 manager->UpdateLastUsed(extension_->id(), device0_entry); |
| 303 device_permissions = manager->GetForExtension(extension_->id()); | 260 device0_entry = device_permissions->FindEntry(device0_); |
| 304 device0_entry = FindEntry(device_permissions.get(), device0_); | |
| 305 ASSERT_FALSE(device0_entry->last_used().is_null()); | 261 ASSERT_FALSE(device0_entry->last_used().is_null()); |
| 306 } | 262 } |
| 307 | 263 |
| 308 TEST_F(DevicePermissionsManagerTest, LoadPrefs) { | 264 TEST_F(DevicePermissionsManagerTest, LoadPrefs) { |
| 309 scoped_ptr<base::Value> prefs_value = base::test::ParseJson( | 265 scoped_ptr<base::Value> prefs_value = base::test::ParseJson( |
| 310 "[" | 266 "[" |
| 311 " {" | 267 " {" |
| 312 " \"product_id\": 0," | 268 " \"product_id\": 0," |
| 313 " \"serial_number\": \"ABCDE\"," | 269 " \"serial_number\": \"ABCDE\"," |
| 314 " \"type\": \"usb\"," | 270 " \"type\": \"usb\"," |
| 315 " \"vendor_id\": 0" | 271 " \"vendor_id\": 0" |
| 316 " }" | 272 " }" |
| 317 "]"); | 273 "]"); |
| 318 env_.GetExtensionPrefs()->UpdateExtensionPref(extension_->id(), "devices", | 274 env_->GetExtensionPrefs()->UpdateExtensionPref(extension_->id(), "devices", |
| 319 prefs_value.release()); | 275 prefs_value.release()); |
| 320 | 276 |
| 321 DevicePermissionsManager* manager = | 277 DevicePermissionsManager* manager = |
| 322 DevicePermissionsManager::Get(env_.profile()); | 278 DevicePermissionsManager::Get(env_->profile()); |
| 323 scoped_ptr<DevicePermissions> device_permissions = | 279 DevicePermissions* device_permissions = |
| 324 manager->GetForExtension(extension_->id()); | 280 manager->GetForExtension(extension_->id()); |
| 325 ASSERT_TRUE(FindEntry(device_permissions.get(), device0_).get()); | 281 ASSERT_TRUE(device_permissions->FindEntry(device0_).get()); |
| 326 ASSERT_FALSE(FindEntry(device_permissions.get(), device1_).get()); | 282 ASSERT_FALSE(device_permissions->FindEntry(device1_).get()); |
| 327 ASSERT_FALSE(FindEntry(device_permissions.get(), device2_).get()); | 283 ASSERT_FALSE(device_permissions->FindEntry(device2_).get()); |
| 328 ASSERT_FALSE(FindEntry(device_permissions.get(), device3_).get()); | 284 ASSERT_FALSE(device_permissions->FindEntry(device3_).get()); |
| 329 } | 285 } |
| 330 | 286 |
| 331 } // namespace extensions | 287 } // namespace extensions |
| OLD | NEW |