| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <string> | 5 #include <string> |
| 6 | 6 |
| 7 #include "base/pickle.h" | 7 #include "base/pickle.h" |
| 8 #include "base/values.h" | 8 #include "base/values.h" |
| 9 #include "chrome/common/extensions/extension_unittest.h" | 9 #include "chrome/common/extensions/extension_unittest.h" |
| 10 #include "chrome/common/extensions/permissions/socket_permission.h" | 10 #include "chrome/common/extensions/permissions/socket_permission.h" |
| (...skipping 180 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 191 EXPECT_FALSE(data.Check(param.get())); | 191 EXPECT_FALSE(data.Check(param.get())); |
| 192 param.reset(new SocketPermission::CheckParam( | 192 param.reset(new SocketPermission::CheckParam( |
| 193 SocketPermissionRequest::UDP_SEND_TO, "www.google.com", 8800)); | 193 SocketPermissionRequest::UDP_SEND_TO, "www.google.com", 8800)); |
| 194 EXPECT_FALSE(data.Check(param.get())); | 194 EXPECT_FALSE(data.Check(param.get())); |
| 195 | 195 |
| 196 // Do not wildcard part of ip address. | 196 // Do not wildcard part of ip address. |
| 197 ASSERT_TRUE(data.ParseForTest("tcp-connect:*.168.0.1:8800")); | 197 ASSERT_TRUE(data.ParseForTest("tcp-connect:*.168.0.1:8800")); |
| 198 param.reset(new SocketPermission::CheckParam( | 198 param.reset(new SocketPermission::CheckParam( |
| 199 SocketPermissionRequest::TCP_CONNECT, "192.168.0.1", 8800)); | 199 SocketPermissionRequest::TCP_CONNECT, "192.168.0.1", 8800)); |
| 200 EXPECT_FALSE(data.Check(param.get())); | 200 EXPECT_FALSE(data.Check(param.get())); |
| 201 |
| 202 ASSERT_FALSE(data.ParseForTest("udp-multicast-membership:*")); |
| 203 ASSERT_FALSE(data.ParseForTest("udp-multicast-membership:*:*")); |
| 204 ASSERT_TRUE(data.ParseForTest("udp-multicast-membership")); |
| 205 param.reset(new SocketPermission::CheckParam( |
| 206 SocketPermissionRequest::UDP_BIND, "127.0.0.1", 8800)); |
| 207 EXPECT_FALSE(data.Check(param.get())); |
| 208 param.reset(new SocketPermission::CheckParam( |
| 209 SocketPermissionRequest::UDP_BIND, "127.0.0.1", 8888)); |
| 210 EXPECT_FALSE(data.Check(param.get())); |
| 211 param.reset(new SocketPermission::CheckParam( |
| 212 SocketPermissionRequest::TCP_CONNECT, "www.example.com", 80)); |
| 213 EXPECT_FALSE(data.Check(param.get())); |
| 214 param.reset(new SocketPermission::CheckParam( |
| 215 SocketPermissionRequest::UDP_SEND_TO, "www.google.com", 8800)); |
| 216 EXPECT_FALSE(data.Check(param.get())); |
| 217 param.reset(new SocketPermission::CheckParam( |
| 218 SocketPermissionRequest::UDP_MULTICAST_MEMBERSHIP, "127.0.0.1", 35)); |
| 219 EXPECT_TRUE(data.Check(param.get())); |
| 201 } | 220 } |
| 202 | 221 |
| 203 TEST_F(SocketPermissionTest, IPC) { | 222 TEST_F(SocketPermissionTest, IPC) { |
| 204 const APIPermissionInfo* permission_info = | 223 const APIPermissionInfo* permission_info = |
| 205 PermissionsInfo::GetInstance()->GetByID(APIPermission::kSocket); | 224 PermissionsInfo::GetInstance()->GetByID(APIPermission::kSocket); |
| 206 | 225 |
| 207 { | 226 { |
| 208 IPC::Message m; | 227 IPC::Message m; |
| 209 | 228 |
| 210 scoped_ptr<APIPermission> permission1( | 229 scoped_ptr<APIPermission> permission1( |
| (...skipping 50 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 261 | 280 |
| 262 scoped_ptr<base::Value> vtmp(permission1->ToValue()); | 281 scoped_ptr<base::Value> vtmp(permission1->ToValue()); |
| 263 ASSERT_TRUE(vtmp); | 282 ASSERT_TRUE(vtmp); |
| 264 ASSERT_TRUE(permission2->FromValue(vtmp.get())); | 283 ASSERT_TRUE(permission2->FromValue(vtmp.get())); |
| 265 EXPECT_TRUE(permission1->Equal(permission2.get())); | 284 EXPECT_TRUE(permission1->Equal(permission2.get())); |
| 266 } | 285 } |
| 267 | 286 |
| 268 } // namespace | 287 } // namespace |
| 269 | 288 |
| 270 } // namespace extensions | 289 } // namespace extensions |
| OLD | NEW |