blob: f0fd1798b6cd3dbfc9ea9c3b9c26fcc4c125298f (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
|
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/memory/ref_counted.h"
#include "base/task.h"
#include "remoting/host/in_memory_host_config.h"
#include "remoting/host/self_access_verifier.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace remoting {
namespace {
const char kTestJid[] = "host@domain.com";
} // namespace
class SelfAccessVerifierTest : public testing::Test {
protected:
virtual void SetUp() {
config_ = new InMemoryHostConfig();
}
void InitConfig() {
config_->SetString(kXmppLoginConfigPath, kTestJid);
}
scoped_refptr<InMemoryHostConfig> config_;
};
TEST_F(SelfAccessVerifierTest, InvalidConfig) {
SelfAccessVerifier target;
EXPECT_FALSE(target.Init(config_));
}
TEST_F(SelfAccessVerifierTest, VerifyPermissions) {
SelfAccessVerifier target;
InitConfig();
ASSERT_TRUE(target.Init(config_));
EXPECT_TRUE(target.VerifyPermissions("host@domain.com/123123", ""));
EXPECT_TRUE(target.VerifyPermissions("hOsT@domain.com/123123", ""));
EXPECT_FALSE(target.VerifyPermissions("host@domain.com", ""));
EXPECT_FALSE(target.VerifyPermissions("otherhost@domain.com/123123", ""));
EXPECT_FALSE(target.VerifyPermissions("host@otherdomain.com/123123", ""));
EXPECT_FALSE(target.VerifyPermissions("", ""));
EXPECT_FALSE(target.VerifyPermissions("host@domain.co/saf", ""));
EXPECT_FALSE(target.VerifyPermissions("host@domain.com.other/blah", ""));
// Non ASCII string.
EXPECT_FALSE(target.VerifyPermissions("абв@domain.com/saf", ""));
}
} // namespace remoting
|