summaryrefslogtreecommitdiffstats
path: root/remoting/host/self_access_verifier_unittest.cc
blob: f0fd1798b6cd3dbfc9ea9c3b9c26fcc4c125298f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "base/memory/ref_counted.h"
#include "base/task.h"
#include "remoting/host/in_memory_host_config.h"
#include "remoting/host/self_access_verifier.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "testing/gtest/include/gtest/gtest.h"

namespace remoting {

namespace {
const char kTestJid[] = "host@domain.com";
}  // namespace

class SelfAccessVerifierTest : public testing::Test {
 protected:
  virtual void SetUp() {
    config_ = new InMemoryHostConfig();
  }

  void InitConfig() {
    config_->SetString(kXmppLoginConfigPath, kTestJid);
  }

  scoped_refptr<InMemoryHostConfig> config_;
};

TEST_F(SelfAccessVerifierTest, InvalidConfig) {
  SelfAccessVerifier target;
  EXPECT_FALSE(target.Init(config_));
}

TEST_F(SelfAccessVerifierTest, VerifyPermissions) {
  SelfAccessVerifier target;
  InitConfig();
  ASSERT_TRUE(target.Init(config_));
  EXPECT_TRUE(target.VerifyPermissions("host@domain.com/123123", ""));
  EXPECT_TRUE(target.VerifyPermissions("hOsT@domain.com/123123", ""));
  EXPECT_FALSE(target.VerifyPermissions("host@domain.com", ""));
  EXPECT_FALSE(target.VerifyPermissions("otherhost@domain.com/123123", ""));
  EXPECT_FALSE(target.VerifyPermissions("host@otherdomain.com/123123", ""));
  EXPECT_FALSE(target.VerifyPermissions("", ""));
  EXPECT_FALSE(target.VerifyPermissions("host@domain.co/saf", ""));
  EXPECT_FALSE(target.VerifyPermissions("host@domain.com.other/blah", ""));

  // Non ASCII string.
  EXPECT_FALSE(target.VerifyPermissions("абв@domain.com/saf", ""));
}

}  // namespace remoting