1f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org/* 2f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org * Copyright 2010 The WebRTC Project Authors. All rights reserved. 3f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org * 4f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org * Use of this source code is governed by a BSD-style license 5f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org * that can be found in the LICENSE file in the root of the source 6f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org * tree. An additional intellectual property rights grant can be found 7f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org * in the file PATENTS. All contributing project authors may 8f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org * be found in the AUTHORS file in the root of the source tree. 9f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org */ 10f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org 11f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org#include "webrtc/base/gunit.h" 12f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org#include "webrtc/base/winfirewall.h" 13f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org 14f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org#include <objbase.h> 15f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org 16f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.orgnamespace rtc { 17f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org 18f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.orgTEST(WinFirewallTest, ReadStatus) { 19f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org ::CoInitialize(NULL); 20f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org WinFirewall fw; 21f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org HRESULT hr; 22f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org bool authorized; 23f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org 24f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized)); 25f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org EXPECT_TRUE(fw.Initialize(&hr)); 26f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org EXPECT_EQ(S_OK, hr); 27f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org 28f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org EXPECT_TRUE(fw.QueryAuthorized("bogus.exe", &authorized)); 29f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org 30f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org // Unless we mock out INetFwMgr we can't really have an expectation either way 31f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org // about whether we're authorized. It will depend on the settings of the 32f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org // machine running the test. Same goes for AddApplication. 33f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org 34f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org fw.Shutdown(); 35f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized)); 36f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org 37f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org ::CoUninitialize(); 38f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org} 39f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org 40f048872e915a3ee229044ec4bc541f6cbf9e4de1henrike@webrtc.org} // namespace rtc 41