File: service_unittest.cc

package info (click to toggle)
chromium 139.0.7258.127-1
  • links: PTS, VCS
  • area: main
  • in suites:
  • size: 6,122,068 kB
  • sloc: cpp: 35,100,771; ansic: 7,163,530; javascript: 4,103,002; python: 1,436,920; asm: 946,517; xml: 746,709; pascal: 187,653; perl: 88,691; sh: 88,436; objc: 79,953; sql: 51,488; cs: 44,583; fortran: 24,137; makefile: 22,147; tcl: 15,277; php: 13,980; yacc: 8,984; ruby: 7,485; awk: 3,720; lisp: 3,096; lex: 1,327; ada: 727; jsp: 228; sed: 36
file content (98 lines) | stat: -rw-r--r-- 3,004 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
// Copyright 2020 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "chrome/credential_provider/extension/service.h"

#include <windows.h>

#include "base/files/file_path.h"
#include "base/threading/thread.h"
#include "chrome/credential_provider/extension/scoped_handle.h"
#include "chrome/credential_provider/test/gcp_fakes.h"
#include "testing/gtest/include/gtest/gtest.h"

namespace credential_provider {

namespace testing {

class GCPWServiceTest : public ::testing::Test {
 public:
  // Start the service as if SCM is starting it. Note that this will be started
  // in a new thread which simulates the main thread when service process
  // starts.
  void StartServiceMainThread() {
    main_thread->Start();
    main_thread->task_runner()->PostTask(
        FROM_HERE,
        base::BindOnce(&GCPWServiceTest::RunService, base::Unretained(this)));
    // Give some time so that service starts running and accpeting control
    // requests.
    ::Sleep(1000);
  }

  void CheckServiceStatus(DWORD status) {
    SERVICE_STATUS service_status;
    fake_os_service_manager_.GetServiceStatus(&service_status);
    ASSERT_EQ(service_status.dwCurrentState, status);
  }

  void SendControlRequest(DWORD control_request) {
    fake_os_service_manager_.SendControlRequestForTesting(control_request);
    // Give some time for control to be processed by the service control
    // handler.
    ::Sleep(1000);
  }

  FakeOSServiceManager* fake_os_service_manager() {
    return &fake_os_service_manager_;
  }

 protected:
  void SetUp() override {
    main_thread = std::make_unique<base::Thread>("ProcessMain Thread");
  }

  void TearDown() override {
    SendControlRequest(SERVICE_CONTROL_STOP);
    main_thread->Stop();
  }

 private:
  void RunService() {
    ASSERT_TRUE(credential_provider::extension::Service::Get()->Run() ==
                ERROR_SUCCESS);
  }

  std::unique_ptr<base::Thread> main_thread;
  FakeOSServiceManager fake_os_service_manager_;
};

TEST_F(GCPWServiceTest, StartSuccess) {
  // Install service into SCM database.
  credential_provider::extension::ScopedScHandle sc_handle;
  ASSERT_TRUE(ERROR_SUCCESS == fake_os_service_manager()->InstallService(
                                   base::FilePath(L"test"), &sc_handle));

  StartServiceMainThread();
  CheckServiceStatus(SERVICE_RUNNING);

  SendControlRequest(SERVICE_CONTROL_STOP);
  CheckServiceStatus(SERVICE_STOPPED);
}

TEST_F(GCPWServiceTest, NoOpControlRequest) {
  // Install service into SCM database.
  credential_provider::extension::ScopedScHandle sc_handle;
  ASSERT_TRUE(ERROR_SUCCESS == fake_os_service_manager()->InstallService(
                                   base::FilePath(L"test"), &sc_handle));

  StartServiceMainThread();
  CheckServiceStatus(SERVICE_RUNNING);

  SendControlRequest(SERVICE_CONTROL_PAUSE);
  CheckServiceStatus(SERVICE_RUNNING);
}

}  // namespace testing
}  // namespace credential_provider