OLD | NEW |
---|---|
(Empty) | |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include <string> | |
6 | |
7 #include "base/pickle.h" | |
8 #include "base/values.h" | |
9 #include "chrome/common/extensions/permissions/permissions_info.h" | |
10 #include "chrome/common/extensions/permissions/socket_permission.h" | |
11 #include "chrome/common/extensions/permissions/socket_permission_data.h" | |
12 #include "ipc/ipc_message.h" | |
13 #include "testing/gtest/include/gtest/gtest.h" | |
14 | |
15 using extensions::SocketPermissionData; | |
16 | |
17 namespace { | |
18 | |
19 std::string Parse(const std::string& permission) { | |
20 SocketPermissionData data; | |
21 CHECK(data.Parse(permission)) << "Parse permission \"" << permission | |
22 << "\" failed."; | |
23 return data.GetAsString(); | |
24 } | |
25 | |
26 } // namespace | |
27 | |
28 namespace extensions { | |
29 | |
30 class SocketPermissionTest : public testing::Test { | |
31 }; | |
32 | |
33 TEST(SocketPermissionTest, General) { | |
34 SocketPermissionData data1, data2; | |
35 | |
36 CHECK(data1.Parse("tcp-connect")); | |
37 CHECK(data2.Parse("tcp-connect")); | |
38 | |
39 EXPECT_TRUE(data1 == data2); | |
40 EXPECT_FALSE(data1 < data2); | |
41 | |
42 CHECK(data1.Parse("tcp-connect")); | |
43 CHECK(data2.Parse("tcp-connect:www.example.com")); | |
44 | |
45 EXPECT_FALSE(data1 == data2); | |
46 EXPECT_TRUE(data1 < data2); | |
47 } | |
48 | |
49 TEST(SocketPermissionTest, Parse) { | |
50 SocketPermissionData data; | |
51 | |
52 EXPECT_FALSE(data.Parse("")); | |
53 EXPECT_FALSE(data.Parse("*")); | |
54 EXPECT_FALSE(data.Parse("\00\00*")); | |
55 EXPECT_FALSE(data.Parse("\01*")); | |
56 EXPECT_FALSE(data.Parse("tcp-connect:www.example.com:-1")); | |
57 EXPECT_FALSE(data.Parse("tcp-connect:www.example.com:65536")); | |
58 EXPECT_FALSE(data.Parse("tcp-connect:::")); | |
59 | |
60 EXPECT_EQ(Parse("tcp-connect"), "tcp-connect:*:*"); | |
61 EXPECT_EQ(Parse("tcp-listen"), "tcp-listen:*:*"); | |
62 EXPECT_EQ(Parse("udp-bind"), "udp-bind:*:*"); | |
63 EXPECT_EQ(Parse("udp-send-to"), "udp-send-to:*:*"); | |
64 | |
65 EXPECT_EQ(Parse(" tcp-connect "), "tcp-connect:*:*"); | |
66 EXPECT_EQ(Parse(" tcp-listen "), "tcp-listen:*:*"); | |
67 EXPECT_EQ(Parse(" udp-bind "), "udp-bind:*:*"); | |
68 EXPECT_EQ(Parse(" udp-send-to "), "udp-send-to:*:*"); | |
69 | |
70 EXPECT_EQ(Parse("tcp-connect:"), "tcp-connect:*:*"); | |
71 EXPECT_EQ(Parse("tcp-listen:"), "tcp-listen:*:*"); | |
72 EXPECT_EQ(Parse("udp-bind:"), "udp-bind:*:*"); | |
73 EXPECT_EQ(Parse("udp-send-to:"), "udp-send-to:*:*"); | |
74 | |
75 EXPECT_EQ(Parse("tcp-connect::"), "tcp-connect:*:*"); | |
76 EXPECT_EQ(Parse("tcp-listen::"), "tcp-listen:*:*"); | |
77 EXPECT_EQ(Parse("udp-bind::"), "udp-bind:*:*"); | |
78 EXPECT_EQ(Parse("udp-send-to::"), "udp-send-to:*:*"); | |
79 | |
80 EXPECT_EQ(Parse("tcp-connect:*"), "tcp-connect:*:*"); | |
81 EXPECT_EQ(Parse("tcp-listen:*"), "tcp-listen:*:*"); | |
82 EXPECT_EQ(Parse("udp-bind:*"), "udp-bind:*:*"); | |
83 EXPECT_EQ(Parse("udp-send-to:*"), "udp-send-to:*:*"); | |
84 | |
85 EXPECT_EQ(Parse("tcp-connect:*:"), "tcp-connect:*:*"); | |
86 EXPECT_EQ(Parse("tcp-listen:*:"), "tcp-listen:*:*"); | |
87 EXPECT_EQ(Parse("udp-bind:*:"), "udp-bind:*:*"); | |
88 EXPECT_EQ(Parse("udp-send-to:*:"), "udp-send-to:*:*"); | |
89 | |
90 EXPECT_EQ(Parse("tcp-connect::*"), "tcp-connect:*:*"); | |
91 EXPECT_EQ(Parse("tcp-listen::*"), "tcp-listen:*:*"); | |
92 EXPECT_EQ(Parse("udp-bind::*"), "udp-bind:*:*"); | |
93 EXPECT_EQ(Parse("udp-send-to::*"), "udp-send-to:*:*"); | |
94 | |
95 EXPECT_EQ(Parse("tcp-connect:www.example.com"), | |
96 "tcp-connect:www.example.com:*"); | |
97 EXPECT_EQ(Parse("tcp-listen:www.example.com"), | |
98 "tcp-listen:www.example.com:*"); | |
99 EXPECT_EQ(Parse("udp-bind:www.example.com"), | |
100 "udp-bind:www.example.com:*"); | |
101 EXPECT_EQ(Parse("udp-send-to:www.example.com"), | |
102 "udp-send-to:www.example.com:*"); | |
103 EXPECT_EQ(Parse("udp-send-to:wWW.ExAmPlE.cOm"), | |
104 "udp-send-to:www.example.com:*"); | |
105 | |
106 EXPECT_EQ(Parse("tcp-connect : www.example.com "), | |
107 "tcp-connect:www.example.com:*"); | |
108 EXPECT_EQ(Parse("tcp-listen : www.example.com "), | |
109 "tcp-listen:www.example.com:*"); | |
110 EXPECT_EQ(Parse("udp-bind : www.example.com "), | |
111 "udp-bind:www.example.com:*"); | |
112 EXPECT_EQ(Parse("udp-send-to : www.example.com "), | |
113 "udp-send-to:www.example.com:*"); | |
114 EXPECT_EQ(Parse("udp-send-to : wWW.ExAmPlE.cOm"), | |
115 "udp-send-to:www.example.com:*"); | |
116 | |
117 EXPECT_EQ(Parse("tcp-connect:.example.com"), | |
118 "tcp-connect:*.example.com:*"); | |
119 EXPECT_EQ(Parse("tcp-listen:.example.com"), | |
120 "tcp-listen:*.example.com:*"); | |
121 EXPECT_EQ(Parse("udp-bind:.example.com"), | |
122 "udp-bind:*.example.com:*"); | |
123 EXPECT_EQ(Parse("udp-send-to:.example.com"), | |
124 "udp-send-to:*.example.com:*"); | |
125 | |
126 EXPECT_EQ(Parse("tcp-connect:*.example.com"), | |
127 "tcp-connect:*.example.com:*"); | |
128 EXPECT_EQ(Parse("tcp-listen:*.example.com"), | |
129 "tcp-listen:*.example.com:*"); | |
130 EXPECT_EQ(Parse("udp-bind:*.example.com"), | |
131 "udp-bind:*.example.com:*"); | |
132 EXPECT_EQ(Parse("udp-send-to:*.example.com"), | |
133 "udp-send-to:*.example.com:*"); | |
134 | |
135 EXPECT_EQ(Parse("tcp-connect::0"), "tcp-connect:*:*"); | |
136 EXPECT_EQ(Parse("tcp-listen::0"), "tcp-listen:*:*"); | |
137 EXPECT_EQ(Parse("udp-bind::0"), "udp-bind:*:*"); | |
138 EXPECT_EQ(Parse("udp-send-to::0"), "udp-send-to:*:*"); | |
139 | |
140 EXPECT_EQ(Parse("tcp-connect::99"), "tcp-connect:*:99"); | |
141 EXPECT_EQ(Parse("tcp-listen::99"), "tcp-listen:*:99"); | |
142 EXPECT_EQ(Parse("udp-bind::99"), "udp-bind:*:99"); | |
143 EXPECT_EQ(Parse("udp-send-to::99"), "udp-send-to:*:99"); | |
144 | |
145 EXPECT_EQ(Parse("tcp-connect : : 99 "), "tcp-connect:*:99"); | |
miket_OOO
2012/08/07 23:02:47
Consider that if you accept these kinds of weird s
Peng
2012/08/08 15:40:07
A good advice. Done.
| |
146 EXPECT_EQ(Parse("tcp-listen : : 99 "), "tcp-listen:*:99"); | |
147 EXPECT_EQ(Parse("udp-bind : : 99 "), "udp-bind:*:99"); | |
148 EXPECT_EQ(Parse("udp-send-to : : 99"), "udp-send-to:*:99"); | |
149 | |
150 EXPECT_EQ(Parse("tcp-connect:www.example.com"), | |
151 "tcp-connect:www.example.com:*"); | |
152 | |
153 EXPECT_EQ(Parse("tcp-connect:*.example.com:99"), | |
154 "tcp-connect:*.example.com:99"); | |
155 } | |
156 | |
157 TEST(SocketPermissionTest, Match) { | |
158 SocketPermissionData data; | |
159 | |
160 CHECK(data.Parse("tcp-connect")); | |
161 EXPECT_TRUE(data.Match( | |
162 SocketPermissionData::TCP_CONNECT, "www.example.com", 80)); | |
163 EXPECT_FALSE(data.Match( | |
164 SocketPermissionData::UDP_SEND_TO, "www.example.com", 80)); | |
165 | |
166 CHECK(data.Parse("udp-send-to::8800")); | |
167 EXPECT_TRUE(data.Match( | |
168 SocketPermissionData::UDP_SEND_TO, "www.example.com", 8800)); | |
169 EXPECT_TRUE(data.Match( | |
170 SocketPermissionData::UDP_SEND_TO, "smtp.example.com", 8800)); | |
171 EXPECT_FALSE(data.Match( | |
172 SocketPermissionData::TCP_CONNECT, "www.example.com", 80)); | |
173 | |
174 CHECK(data.Parse("udp-send-to:*.example.com:8800")); | |
175 EXPECT_TRUE(data.Match( | |
176 SocketPermissionData::UDP_SEND_TO, "www.example.com", 8800)); | |
177 EXPECT_TRUE(data.Match( | |
178 SocketPermissionData::UDP_SEND_TO, "smtp.example.com", 8800)); | |
179 EXPECT_TRUE(data.Match( | |
180 SocketPermissionData::UDP_SEND_TO, "SMTP.example.com", 8800)); | |
181 EXPECT_FALSE(data.Match( | |
182 SocketPermissionData::TCP_CONNECT, "www.example.com", 80)); | |
183 EXPECT_FALSE(data.Match( | |
184 SocketPermissionData::UDP_SEND_TO, "www.google.com", 8800)); | |
185 | |
186 CHECK(data.Parse("udp-send-to:*.ExAmPlE.cOm:8800")); | |
187 EXPECT_TRUE(data.Match( | |
188 SocketPermissionData::UDP_SEND_TO, "www.example.com", 8800)); | |
189 EXPECT_TRUE(data.Match( | |
190 SocketPermissionData::UDP_SEND_TO, "smtp.example.com", 8800)); | |
191 EXPECT_TRUE(data.Match( | |
192 SocketPermissionData::UDP_SEND_TO, "SMTP.example.com", 8800)); | |
193 EXPECT_FALSE(data.Match( | |
194 SocketPermissionData::TCP_CONNECT, "www.example.com", 80)); | |
195 EXPECT_FALSE(data.Match( | |
196 SocketPermissionData::UDP_SEND_TO, "www.google.com", 8800)); | |
197 | |
198 CHECK(data.Parse("udp-bind::8800")); | |
199 EXPECT_TRUE(data.Match( | |
200 SocketPermissionData::UDP_BIND, "127.0.0.1", 8800)); | |
201 EXPECT_FALSE(data.Match( | |
202 SocketPermissionData::UDP_BIND, "127.0.0.1", 8888)); | |
203 EXPECT_FALSE(data.Match( | |
204 SocketPermissionData::TCP_CONNECT, "www.example.com", 80)); | |
205 EXPECT_FALSE(data.Match( | |
206 SocketPermissionData::UDP_SEND_TO, "www.google.com", 8800)); | |
207 } | |
208 | |
209 TEST(SocketPermissionTest, IPC) { | |
210 scoped_refptr<APIPermissionDetail> detail1; | |
211 scoped_refptr<APIPermissionDetail> detail2; | |
212 | |
213 const APIPermission* permission = | |
214 PermissionsInfo::GetInstance()->GetByID(APIPermission::kSocket); | |
215 | |
216 { | |
217 IPC::Message m; | |
218 | |
219 detail1 = permission->CreateDetail(); | |
220 detail2 = permission->CreateDetail(); | |
221 | |
222 detail1->Write(&m); | |
223 PickleIterator iter(m); | |
224 detail2->Read(&m, &iter); | |
225 | |
226 EXPECT_TRUE(detail1->Equal(detail2)); | |
227 } | |
228 | |
229 | |
230 { | |
231 IPC::Message m; | |
232 | |
233 detail1 = permission->CreateDetail(); | |
234 detail2 = permission->CreateDetail(); | |
235 | |
236 scoped_ptr<ListValue> value(new ListValue()); | |
237 value->Append(Value::CreateStringValue("tcp-connect:*.example.com:80")); | |
238 value->Append(Value::CreateStringValue("udp-bind::8080")); | |
239 value->Append(Value::CreateStringValue("udp-send-to::8888")); | |
240 CHECK(detail1->FromValue(value.get())); | |
241 | |
242 EXPECT_FALSE(detail1->Equal(detail2)); | |
243 | |
244 detail1->Write(&m); | |
245 PickleIterator iter(m); | |
246 detail2->Read(&m, &iter); | |
247 EXPECT_TRUE(detail1->Equal(detail2)); | |
248 } | |
249 } | |
250 | |
251 TEST(SocketPermissionTest, Value) { | |
252 scoped_refptr<APIPermissionDetail> detail1; | |
253 scoped_refptr<APIPermissionDetail> detail2; | |
254 | |
255 const APIPermission* permission = | |
256 PermissionsInfo::GetInstance()->GetByID(APIPermission::kSocket); | |
257 | |
258 detail1 = permission->CreateDetail(); | |
259 detail2 = permission->CreateDetail(); | |
260 | |
261 scoped_ptr<ListValue> value(new ListValue()); | |
262 value->Append(Value::CreateStringValue("tcp-connect:*.example.com:80")); | |
263 value->Append(Value::CreateStringValue("udp-bind::8080")); | |
264 value->Append(Value::CreateStringValue("udp-send-to::8888")); | |
265 CHECK(detail1->FromValue(value.get())); | |
266 | |
267 EXPECT_FALSE(detail1->Equal(detail2)); | |
268 | |
269 base::Value* vtmp = NULL; | |
270 detail1->ToValue(&vtmp); | |
271 CHECK(vtmp); | |
272 CHECK(detail2->FromValue(vtmp)); | |
273 EXPECT_TRUE(detail1->Equal(detail2)); | |
274 | |
275 delete vtmp; | |
276 } | |
miket_OOO
2012/08/07 23:02:47
Great! This is nice because it's a programmatic ex
| |
277 | |
278 } // namespace extensions | |
OLD | NEW |