service_main_unittest.cc 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141
  1. // Copyright 2018 The Chromium Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style license that can be
  3. // found in the LICENSE file.
  4. #include "chrome/elevation_service/service_main.h"
  5. #include <wrl/client.h>
  6. #include <string>
  7. #include <utility>
  8. #include "base/files/file_path.h"
  9. #include "base/memory/raw_ptr.h"
  10. #include "base/path_service.h"
  11. #include "base/win/scoped_bstr.h"
  12. #include "base/win/scoped_com_initializer.h"
  13. #include "chrome/elevation_service/elevation_service_idl.h"
  14. #include "chrome/elevation_service/scoped_mock_context.h"
  15. #include "chrome/install_static/install_util.h"
  16. #include "testing/gtest/include/gtest/gtest.h"
  17. namespace {
  18. const base::FilePath TestFile(const std::string& file) {
  19. base::FilePath path;
  20. base::PathService::Get(base::DIR_MODULE, &path);
  21. return path.AppendASCII("elevated_recovery_unittest").AppendASCII(file);
  22. }
  23. } // namespace
  24. class ServiceMainTest : public testing::Test {
  25. protected:
  26. ServiceMainTest() = default;
  27. void SetUp() override {
  28. ASSERT_TRUE(com_initializer_.Succeeded());
  29. auto* service_main = elevation_service::ServiceMain::GetInstance();
  30. ASSERT_HRESULT_SUCCEEDED(service_main->RegisterClassObject());
  31. service_main_ = service_main;
  32. service_main_->ResetExitSignaled();
  33. }
  34. void TearDown() override {
  35. if (service_main_)
  36. std::exchange(service_main_, nullptr)->UnregisterClassObject();
  37. }
  38. elevation_service::ServiceMain* service_main() { return service_main_; }
  39. private:
  40. base::win::ScopedCOMInitializer com_initializer_;
  41. raw_ptr<elevation_service::ServiceMain> service_main_ = nullptr;
  42. };
  43. TEST_F(ServiceMainTest, ExitSignalTest) {
  44. // The waitable event starts unsignaled.
  45. ASSERT_FALSE(service_main()->IsExitSignaled());
  46. {
  47. elevation_service::ScopedMockContext mock_context;
  48. ASSERT_TRUE(mock_context.Succeeded());
  49. Microsoft::WRL::ComPtr<IUnknown> unknown;
  50. ASSERT_HRESULT_SUCCEEDED(
  51. ::CoCreateInstance(install_static::GetElevatorClsid(), nullptr,
  52. CLSCTX_LOCAL_SERVER, IID_PPV_ARGS(&unknown)));
  53. Microsoft::WRL::ComPtr<IElevator> elevator;
  54. ASSERT_HRESULT_SUCCEEDED(unknown.As(&elevator));
  55. unknown.Reset();
  56. ULONG_PTR proc_handle = 0;
  57. EXPECT_EQ(CRYPT_E_NO_MATCH,
  58. elevator->RunRecoveryCRXElevated(
  59. TestFile("ChromeRecovery.crx3").value().c_str(),
  60. L"{c49ab053-2387-4809-b188-1902648802e1}", L"57.8.0.1",
  61. L"{c49ab053-2387-4809-b188-1902648802e1}",
  62. ::GetCurrentProcessId(), &proc_handle));
  63. // An object instance has been created upon the request, and is held by the
  64. // server module. Therefore, the waitable event remains unsignaled.
  65. ASSERT_FALSE(service_main()->IsExitSignaled());
  66. // Release the instance object. Now that the last (and the only) instance
  67. // object of the module is released, the event becomes signaled.
  68. elevator.Reset();
  69. }
  70. ASSERT_TRUE(service_main()->IsExitSignaled());
  71. }
  72. TEST_F(ServiceMainTest, EncryptDecryptTest) {
  73. elevation_service::ScopedMockContext mock_context;
  74. ASSERT_TRUE(mock_context.Succeeded());
  75. Microsoft::WRL::ComPtr<IUnknown> unknown;
  76. ASSERT_HRESULT_SUCCEEDED(
  77. ::CoCreateInstance(install_static::GetElevatorClsid(), nullptr,
  78. CLSCTX_LOCAL_SERVER, IID_PPV_ARGS(&unknown)));
  79. Microsoft::WRL::ComPtr<IElevator> elevator;
  80. ASSERT_HRESULT_SUCCEEDED(unknown.As(&elevator));
  81. unknown.Reset();
  82. std::string plaintext("hello world");
  83. BSTR input = ::SysAllocStringByteLen(nullptr, plaintext.length());
  84. ASSERT_TRUE(input);
  85. memcpy(input, plaintext.data(), plaintext.length());
  86. base::win::ScopedBstr output;
  87. DWORD last_error;
  88. HRESULT hr = elevator->EncryptData(ProtectionLevel::PATH_VALIDATION, input,
  89. output.Receive(), &last_error);
  90. ::SysFreeString(input);
  91. ASSERT_HRESULT_SUCCEEDED(hr);
  92. std::string encrypted;
  93. encrypted.assign(reinterpret_cast<const char*>(output.Get()),
  94. output.ByteLength());
  95. BSTR input2 = ::SysAllocStringByteLen(nullptr, encrypted.length());
  96. memcpy(input2, encrypted.data(), encrypted.length());
  97. base::win::ScopedBstr original;
  98. hr = elevator->DecryptData(input2, original.Receive(), &last_error);
  99. ::SysFreeString(input);
  100. ASSERT_HRESULT_SUCCEEDED(hr);
  101. elevator.Reset();
  102. std::string original_string;
  103. original_string.assign(reinterpret_cast<const char*>(original.Get()),
  104. original.ByteLength());
  105. ASSERT_EQ(plaintext.length(), original_string.length());
  106. ASSERT_EQ(plaintext, original_string);
  107. }