| Index: chrome/common/extensions/permissions/permissions_data_unittest.cc
|
| diff --git a/chrome/common/extensions/permissions/permissions_data_unittest.cc b/chrome/common/extensions/permissions/permissions_data_unittest.cc
|
| index 82de2727611f5a65df3eb60e284dbf79be00cbb6..493ef923734856c7b762d54c6b4a975a4f38f886 100644
|
| --- a/chrome/common/extensions/permissions/permissions_data_unittest.cc
|
| +++ b/chrome/common/extensions/permissions/permissions_data_unittest.cc
|
| @@ -88,7 +88,6 @@ void CheckRestrictedUrls(const Extension* extension,
|
| EXPECT_EQ(block_chrome_urls,
|
| PermissionsData::IsRestrictedUrl(
|
| chrome_settings_url,
|
| - chrome_settings_url,
|
| extension,
|
| &error)) << name;
|
| if (block_chrome_urls)
|
| @@ -100,7 +99,6 @@ void CheckRestrictedUrls(const Extension* extension,
|
| EXPECT_EQ(block_chrome_urls,
|
| PermissionsData::IsRestrictedUrl(
|
| chrome_extension_url,
|
| - chrome_extension_url,
|
| extension,
|
| &error)) << name;
|
| if (block_chrome_urls)
|
| @@ -111,13 +109,13 @@ void CheckRestrictedUrls(const Extension* extension,
|
| // Google should never be a restricted url.
|
| error.clear();
|
| EXPECT_FALSE(PermissionsData::IsRestrictedUrl(
|
| - google_url, google_url, extension, &error)) << name;
|
| + google_url, extension, &error)) << name;
|
| EXPECT_TRUE(error.empty()) << name;
|
|
|
| // We should always be able to access our own extension pages.
|
| error.clear();
|
| EXPECT_FALSE(PermissionsData::IsRestrictedUrl(
|
| - self_url, self_url, extension, &error)) << name;
|
| + self_url, extension, &error)) << name;
|
| EXPECT_TRUE(error.empty()) << name;
|
|
|
| // We should only allow other schemes for extensions when it's a whitelisted
|
| @@ -127,7 +125,7 @@ void CheckRestrictedUrls(const Extension* extension,
|
| PermissionsData::CanExecuteScriptEverywhere(extension);
|
| EXPECT_EQ(!allow_on_other_schemes,
|
| PermissionsData::IsRestrictedUrl(
|
| - invalid_url, invalid_url, extension, &error)) << name;
|
| + invalid_url, extension, &error)) << name;
|
| if (!allow_on_other_schemes) {
|
| EXPECT_EQ(ErrorUtils::FormatErrorMessage(
|
| manifest_errors::kCannotAccessPage,
|
| @@ -413,21 +411,18 @@ class ExtensionScriptAndCaptureVisibleTest : public testing::Test {
|
| PermissionsData::SetPolicyDelegate(NULL);
|
| }
|
|
|
| - bool AllowedScript(const Extension* extension, const GURL& url,
|
| - const GURL& top_url) {
|
| - return AllowedScript(extension, url, top_url, -1);
|
| + bool AllowedScript(const Extension* extension, const GURL& url) {
|
| + return AllowedScript(extension, url, -1);
|
| }
|
|
|
| - bool AllowedScript(const Extension* extension, const GURL& url,
|
| - const GURL& top_url, int tab_id) {
|
| + bool AllowedScript(const Extension* extension, const GURL& url, int tab_id) {
|
| return extension->permissions_data()->CanAccessPage(
|
| - extension, url, top_url, tab_id, -1, NULL);
|
| + extension, url, tab_id, -1, NULL);
|
| }
|
|
|
| - bool BlockedScript(const Extension* extension, const GURL& url,
|
| - const GURL& top_url) {
|
| + bool BlockedScript(const Extension* extension, const GURL& url) {
|
| return !extension->permissions_data()->CanAccessPage(
|
| - extension, url, top_url, -1, -1, NULL);
|
| + extension, url, -1, -1, NULL);
|
| }
|
|
|
| bool Allowed(const Extension* extension, const GURL& url) {
|
| @@ -436,7 +431,7 @@ class ExtensionScriptAndCaptureVisibleTest : public testing::Test {
|
|
|
| bool Allowed(const Extension* extension, const GURL& url, int tab_id) {
|
| return (extension->permissions_data()->CanAccessPage(
|
| - extension, url, url, tab_id, -1, NULL) &&
|
| + extension, url, tab_id, -1, NULL) &&
|
| extension->permissions_data()->CanCaptureVisiblePage(tab_id, NULL));
|
| }
|
|
|
| @@ -446,18 +441,16 @@ class ExtensionScriptAndCaptureVisibleTest : public testing::Test {
|
|
|
| bool CaptureOnly(const Extension* extension, const GURL& url, int tab_id) {
|
| return !extension->permissions_data()->CanAccessPage(
|
| - extension, url, url, tab_id, -1, NULL) &&
|
| + extension, url, tab_id, -1, NULL) &&
|
| extension->permissions_data()->CanCaptureVisiblePage(tab_id, NULL);
|
| }
|
|
|
| - bool ScriptOnly(const Extension* extension, const GURL& url,
|
| - const GURL& top_url) {
|
| - return ScriptOnly(extension, url, top_url, -1);
|
| + bool ScriptOnly(const Extension* extension, const GURL& url) {
|
| + return ScriptOnly(extension, url, -1);
|
| }
|
|
|
| - bool ScriptOnly(const Extension* extension, const GURL& url,
|
| - const GURL& top_url, int tab_id) {
|
| - return AllowedScript(extension, url, top_url, tab_id) &&
|
| + bool ScriptOnly(const Extension* extension, const GURL& url, int tab_id) {
|
| + return AllowedScript(extension, url, tab_id) &&
|
| !extension->permissions_data()->CanCaptureVisiblePage(tab_id, NULL);
|
| }
|
|
|
| @@ -467,7 +460,7 @@ class ExtensionScriptAndCaptureVisibleTest : public testing::Test {
|
|
|
| bool Blocked(const Extension* extension, const GURL& url, int tab_id) {
|
| return !(extension->permissions_data()->CanAccessPage(
|
| - extension, url, url, tab_id, -1, NULL) ||
|
| + extension, url, tab_id, -1, NULL) ||
|
| extension->permissions_data()->CanCaptureVisiblePage(tab_id,
|
| NULL));
|
| }
|
| @@ -480,7 +473,7 @@ class ExtensionScriptAndCaptureVisibleTest : public testing::Test {
|
| for (std::set<GURL>::iterator it = urls_.begin(); it != urls_.end(); ++it) {
|
| const GURL& url = *it;
|
| if (allowed_urls.count(url))
|
| - result &= AllowedScript(extension, url, url, tab_id);
|
| + result &= AllowedScript(extension, url, tab_id);
|
| else
|
| result &= Blocked(extension, url, tab_id);
|
| }
|
| @@ -523,12 +516,11 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, Permissions) {
|
|
|
| // Test access to iframed content.
|
| GURL within_extension_url = extension->GetResourceURL("page.html");
|
| - EXPECT_TRUE(AllowedScript(extension.get(), http_url, http_url_with_path));
|
| - EXPECT_TRUE(AllowedScript(extension.get(), https_url, http_url_with_path));
|
| - EXPECT_TRUE(AllowedScript(extension.get(), http_url, within_extension_url));
|
| - EXPECT_TRUE(AllowedScript(extension.get(), https_url, within_extension_url));
|
| - EXPECT_TRUE(BlockedScript(extension.get(), http_url, extension_url));
|
| - EXPECT_TRUE(BlockedScript(extension.get(), https_url, extension_url));
|
| + EXPECT_TRUE(AllowedScript(extension.get(), http_url));
|
| + EXPECT_TRUE(AllowedScript(extension.get(), http_url_with_path));
|
| + EXPECT_TRUE(AllowedScript(extension.get(), https_url));
|
| + EXPECT_TRUE(BlockedScript(extension.get(), within_extension_url));
|
| + EXPECT_TRUE(BlockedScript(extension.get(), extension_url));
|
|
|
| EXPECT_FALSE(extension->permissions_data()->HasHostPermission(settings_url));
|
| EXPECT_FALSE(extension->permissions_data()->HasHostPermission(about_url));
|
| @@ -537,8 +529,8 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, Permissions) {
|
| // Test * for scheme, which implies just the http/https schemes.
|
| extension = LoadManifestStrict("script_and_capture",
|
| "extension_wildcard.json");
|
| - EXPECT_TRUE(ScriptOnly(extension.get(), http_url, http_url));
|
| - EXPECT_TRUE(ScriptOnly(extension.get(), https_url, https_url));
|
| + EXPECT_TRUE(ScriptOnly(extension.get(), http_url));
|
| + EXPECT_TRUE(ScriptOnly(extension.get(), https_url));
|
| EXPECT_TRUE(Blocked(extension.get(), settings_url));
|
| EXPECT_TRUE(Blocked(extension.get(), about_url));
|
| EXPECT_TRUE(Blocked(extension.get(), file_url));
|
| @@ -592,7 +584,7 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, Permissions) {
|
| extension = LoadManifest("script_and_capture",
|
| "extension_component_google.json", Manifest::COMPONENT,
|
| Extension::NO_FLAGS);
|
| - EXPECT_TRUE(ScriptOnly(extension.get(), http_url, http_url));
|
| + EXPECT_TRUE(ScriptOnly(extension.get(), http_url));
|
| EXPECT_TRUE(Blocked(extension.get(), https_url));
|
| EXPECT_TRUE(Blocked(extension.get(), file_url));
|
| EXPECT_TRUE(Blocked(extension.get(), settings_url));
|
| @@ -621,12 +613,11 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, PermissionsWithChromeURLsEnabled) {
|
|
|
| // Test access to iframed content.
|
| GURL within_extension_url = extension->GetResourceURL("page.html");
|
| - EXPECT_TRUE(AllowedScript(extension.get(), http_url, http_url_with_path));
|
| - EXPECT_TRUE(AllowedScript(extension.get(), https_url, http_url_with_path));
|
| - EXPECT_TRUE(AllowedScript(extension.get(), http_url, within_extension_url));
|
| - EXPECT_TRUE(AllowedScript(extension.get(), https_url, within_extension_url));
|
| - EXPECT_TRUE(AllowedScript(extension.get(), http_url, extension_url));
|
| - EXPECT_TRUE(AllowedScript(extension.get(), https_url, extension_url));
|
| + EXPECT_TRUE(AllowedScript(extension.get(), http_url));
|
| + EXPECT_TRUE(AllowedScript(extension.get(), http_url_with_path));
|
| + EXPECT_TRUE(AllowedScript(extension.get(), https_url));
|
| + EXPECT_TRUE(BlockedScript(extension.get(), within_extension_url));
|
| + EXPECT_TRUE(BlockedScript(extension.get(), extension_url));
|
|
|
| const PermissionsData* permissions_data = extension->permissions_data();
|
| EXPECT_FALSE(permissions_data->HasHostPermission(settings_url));
|
| @@ -636,8 +627,8 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, PermissionsWithChromeURLsEnabled) {
|
| // Test * for scheme, which implies just the http/https schemes.
|
| extension = LoadManifestStrict("script_and_capture",
|
| "extension_wildcard.json");
|
| - EXPECT_TRUE(ScriptOnly(extension.get(), http_url, http_url));
|
| - EXPECT_TRUE(ScriptOnly(extension.get(), https_url, https_url));
|
| + EXPECT_TRUE(ScriptOnly(extension.get(), http_url));
|
| + EXPECT_TRUE(ScriptOnly(extension.get(), https_url));
|
| EXPECT_TRUE(Blocked(extension.get(), settings_url));
|
| EXPECT_TRUE(Blocked(extension.get(), about_url));
|
| EXPECT_TRUE(Blocked(extension.get(), file_url));
|
| @@ -656,16 +647,16 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, PermissionsWithChromeURLsEnabled) {
|
| EXPECT_FALSE(extension.get() == NULL);
|
| EXPECT_TRUE(Blocked(extension.get(), http_url));
|
| EXPECT_TRUE(Blocked(extension.get(), https_url));
|
| - EXPECT_TRUE(ScriptOnly(extension.get(), settings_url, settings_url));
|
| + EXPECT_TRUE(ScriptOnly(extension.get(), settings_url));
|
| EXPECT_TRUE(Blocked(extension.get(), about_url));
|
| EXPECT_TRUE(Blocked(extension.get(), file_url));
|
| - EXPECT_TRUE(ScriptOnly(extension.get(), favicon_url, favicon_url));
|
| + EXPECT_TRUE(ScriptOnly(extension.get(), favicon_url));
|
|
|
| // Having chrome://favicon/* should not give you chrome://*
|
| extension = LoadManifestStrict("script_and_capture",
|
| "extension_chrome_favicon_wildcard.json");
|
| EXPECT_TRUE(Blocked(extension.get(), settings_url));
|
| - EXPECT_TRUE(ScriptOnly(extension.get(), favicon_url, favicon_url));
|
| + EXPECT_TRUE(ScriptOnly(extension.get(), favicon_url));
|
| EXPECT_TRUE(Blocked(extension.get(), about_url));
|
| EXPECT_TRUE(extension->permissions_data()->HasHostPermission(favicon_url));
|
|
|
| @@ -689,7 +680,7 @@ TEST_F(ExtensionScriptAndCaptureVisibleTest, PermissionsWithChromeURLsEnabled) {
|
| extension = LoadManifest("script_and_capture",
|
| "extension_component_google.json", Manifest::COMPONENT,
|
| Extension::NO_FLAGS);
|
| - EXPECT_TRUE(ScriptOnly(extension.get(), http_url, http_url));
|
| + EXPECT_TRUE(ScriptOnly(extension.get(), http_url));
|
| EXPECT_TRUE(Blocked(extension.get(), https_url));
|
| EXPECT_TRUE(Blocked(extension.get(), file_url));
|
| EXPECT_TRUE(Blocked(extension.get(), settings_url));
|
|
|