| Index: chrome/common/extensions/permissions/permission_set_unittest.cc
|
| diff --git a/chrome/common/extensions/permissions/permission_set_unittest.cc b/chrome/common/extensions/permissions/permission_set_unittest.cc
|
| index 2b9918780656a2dc36e9fd57d0dd74857d56923e..80b6e57000240684719be20b5b2ce8aca5a79366 100644
|
| --- a/chrome/common/extensions/permissions/permission_set_unittest.cc
|
| +++ b/chrome/common/extensions/permissions/permission_set_unittest.cc
|
| @@ -9,12 +9,9 @@
|
| #include "base/utf_string_conversions.h"
|
| #include "chrome/common/chrome_paths.h"
|
| #include "chrome/common/chrome_switches.h"
|
| -#include "chrome/common/extensions/api/plugins/plugins_handler.h"
|
| #include "chrome/common/extensions/extension.h"
|
| #include "chrome/common/extensions/extension_test_util.h"
|
| -#include "chrome/common/extensions/extension_unittest.h"
|
| #include "chrome/common/extensions/features/feature.h"
|
| -#include "chrome/common/extensions/manifest_handlers/content_scripts_handler.h"
|
| #include "chrome/common/extensions/permissions/permission_set.h"
|
| #include "chrome/common/extensions/permissions/permissions_info.h"
|
| #include "chrome/common/extensions/permissions/socket_permission.h"
|
| @@ -49,21 +46,8 @@ bool Contains(const std::vector<string16>& warnings,
|
|
|
| } // namespace
|
|
|
| -class PermissionsTest : public ExtensionTest {
|
| - protected:
|
| - virtual void SetUp() OVERRIDE {
|
| - ExtensionTest::SetUp();
|
| - (new ContentScriptsHandler)->Register();
|
| - (new PluginsHandler)->Register();
|
| - }
|
| -
|
| - virtual void TearDown() OVERRIDE {
|
| - ExtensionTest::TearDown();
|
| - }
|
| -};
|
| -
|
| // Tests GetByID.
|
| -TEST_F(PermissionsTest, GetByID) {
|
| +TEST(PermissionsTest, GetByID) {
|
| PermissionsInfo* info = PermissionsInfo::GetInstance();
|
| APIPermissionSet apis = info->GetAll();
|
| for (APIPermissionSet::const_iterator i = apis.begin();
|
| @@ -73,7 +57,7 @@ TEST_F(PermissionsTest, GetByID) {
|
| }
|
|
|
| // Tests that GetByName works with normal permission names and aliases.
|
| -TEST_F(PermissionsTest, GetByName) {
|
| +TEST(PermissionsTest, GetByName) {
|
| PermissionsInfo* info = PermissionsInfo::GetInstance();
|
| EXPECT_EQ(APIPermission::kTab, info->GetByName("tabs")->id());
|
| EXPECT_EQ(APIPermission::kManagement,
|
| @@ -81,7 +65,7 @@ TEST_F(PermissionsTest, GetByName) {
|
| EXPECT_FALSE(info->GetByName("alsdkfjasldkfj"));
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetAll) {
|
| +TEST(PermissionsTest, GetAll) {
|
| size_t count = 0;
|
| PermissionsInfo* info = PermissionsInfo::GetInstance();
|
| APIPermissionSet apis = info->GetAll();
|
| @@ -95,7 +79,7 @@ TEST_F(PermissionsTest, GetAll) {
|
| EXPECT_EQ(count, info->get_permission_count());
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetAllByName) {
|
| +TEST(PermissionsTest, GetAllByName) {
|
| std::set<std::string> names;
|
| names.insert("background");
|
| names.insert("management");
|
| @@ -116,7 +100,7 @@ TEST_F(PermissionsTest, GetAllByName) {
|
| }
|
|
|
| // Tests that the aliases are properly mapped.
|
| -TEST_F(PermissionsTest, Aliases) {
|
| +TEST(PermissionsTest, Aliases) {
|
| PermissionsInfo* info = PermissionsInfo::GetInstance();
|
| // tabs: tabs, windows
|
| std::string tabs_name = "tabs";
|
| @@ -134,7 +118,7 @@ TEST_F(PermissionsTest, Aliases) {
|
| info->GetByName("unlimited_storage")->id());
|
| }
|
|
|
| -TEST_F(PermissionsTest, EffectiveHostPermissions) {
|
| +TEST(PermissionsTest, EffectiveHostPermissions) {
|
| scoped_refptr<Extension> extension;
|
| scoped_refptr<const PermissionSet> permissions;
|
|
|
| @@ -210,7 +194,7 @@ TEST_F(PermissionsTest, EffectiveHostPermissions) {
|
| EXPECT_TRUE(permissions->HasEffectiveAccessToAllHosts());
|
| }
|
|
|
| -TEST_F(PermissionsTest, ExplicitAccessToOrigin) {
|
| +TEST(PermissionsTest, ExplicitAccessToOrigin) {
|
| APIPermissionSet apis;
|
| URLPatternSet explicit_hosts;
|
| URLPatternSet scriptable_hosts;
|
| @@ -233,7 +217,7 @@ TEST_F(PermissionsTest, ExplicitAccessToOrigin) {
|
| GURL("http://test.example.com")));
|
| }
|
|
|
| -TEST_F(PermissionsTest, CreateUnion) {
|
| +TEST(PermissionsTest, CreateUnion) {
|
| APIPermission* permission = NULL;
|
|
|
| APIPermissionSet apis1;
|
| @@ -357,7 +341,7 @@ TEST_F(PermissionsTest, CreateUnion) {
|
| EXPECT_EQ(effective_hosts, union_set->effective_hosts());
|
| }
|
|
|
| -TEST_F(PermissionsTest, CreateIntersection) {
|
| +TEST(PermissionsTest, CreateIntersection) {
|
| APIPermission* permission = NULL;
|
|
|
| APIPermissionSet apis1;
|
| @@ -471,7 +455,7 @@ TEST_F(PermissionsTest, CreateIntersection) {
|
| EXPECT_EQ(effective_hosts, new_set->effective_hosts());
|
| }
|
|
|
| -TEST_F(PermissionsTest, CreateDifference) {
|
| +TEST(PermissionsTest, CreateDifference) {
|
| APIPermission* permission = NULL;
|
|
|
| APIPermissionSet apis1;
|
| @@ -572,7 +556,7 @@ TEST_F(PermissionsTest, CreateDifference) {
|
| EXPECT_TRUE(set1->IsEmpty());
|
| }
|
|
|
| -TEST_F(PermissionsTest, HasLessPrivilegesThan) {
|
| +TEST(PermissionsTest, HasLessPrivilegesThan) {
|
| const struct {
|
| const char* base_name;
|
| bool expect_increase;
|
| @@ -623,7 +607,7 @@ TEST_F(PermissionsTest, HasLessPrivilegesThan) {
|
| }
|
| }
|
|
|
| -TEST_F(PermissionsTest, PermissionMessages) {
|
| +TEST(PermissionsTest, PermissionMessages) {
|
| // Ensure that all permissions that needs to show install UI actually have
|
| // strings associated with them.
|
| APIPermissionSet skip;
|
| @@ -745,7 +729,7 @@ TEST_F(PermissionsTest, PermissionMessages) {
|
| }
|
|
|
| // Tests the default permissions (empty API permission set).
|
| -TEST_F(PermissionsTest, DefaultFunctionAccess) {
|
| +TEST(PermissionsTest, DefaultFunctionAccess) {
|
| const struct {
|
| const char* permission_name;
|
| bool expect_success;
|
| @@ -784,7 +768,7 @@ TEST_F(PermissionsTest, DefaultFunctionAccess) {
|
| }
|
|
|
| // Tests the default permissions (empty API permission set).
|
| -TEST_F(PermissionsTest, DefaultAnyAPIAccess) {
|
| +TEST(PermissionsTest, DefaultAnyAPIAccess) {
|
| const struct {
|
| const char* api_name;
|
| bool expect_success;
|
| @@ -815,7 +799,7 @@ TEST_F(PermissionsTest, DefaultAnyAPIAccess) {
|
| }
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetWarningMessages_ManyHosts) {
|
| +TEST(PermissionsTest, GetWarningMessages_ManyHosts) {
|
| scoped_refptr<Extension> extension;
|
|
|
| extension = LoadManifest("permissions", "many-hosts.json");
|
| @@ -825,7 +809,7 @@ TEST_F(PermissionsTest, GetWarningMessages_ManyHosts) {
|
| UTF16ToUTF8(warnings[0]));
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetWarningMessages_Plugins) {
|
| +TEST(PermissionsTest, GetWarningMessages_Plugins) {
|
| scoped_refptr<Extension> extension;
|
| scoped_refptr<PermissionSet> permissions;
|
|
|
| @@ -842,7 +826,7 @@ TEST_F(PermissionsTest, GetWarningMessages_Plugins) {
|
| #endif
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetWarningMessages_AudioVideo) {
|
| +TEST(PermissionsTest, GetWarningMessages_AudioVideo) {
|
| // Both audio and video present.
|
| scoped_refptr<Extension> extension =
|
| LoadManifest("permissions", "audio-video.json");
|
| @@ -875,7 +859,7 @@ TEST_F(PermissionsTest, GetWarningMessages_AudioVideo) {
|
| EXPECT_TRUE(Contains(warnings, "Use your camera"));
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetWarningMessages_Serial) {
|
| +TEST(PermissionsTest, GetWarningMessages_Serial) {
|
| scoped_refptr<Extension> extension =
|
| LoadManifest("permissions", "serial.json");
|
|
|
| @@ -887,7 +871,7 @@ TEST_F(PermissionsTest, GetWarningMessages_Serial) {
|
| ASSERT_EQ(1u, warnings.size());
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetWarningMessages_Socket_AnyHost) {
|
| +TEST(PermissionsTest, GetWarningMessages_Socket_AnyHost) {
|
| Feature::ScopedCurrentChannel channel(chrome::VersionInfo::CHANNEL_DEV);
|
|
|
| scoped_refptr<Extension> extension =
|
| @@ -900,7 +884,7 @@ TEST_F(PermissionsTest, GetWarningMessages_Socket_AnyHost) {
|
| "on the local network or internet"));
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetWarningMessages_Socket_OneDomainTwoHostnames) {
|
| +TEST(PermissionsTest, GetWarningMessages_Socket_OneDomainTwoHostnames) {
|
| Feature::ScopedCurrentChannel channel(chrome::VersionInfo::CHANNEL_DEV);
|
|
|
| scoped_refptr<Extension> extension =
|
| @@ -925,7 +909,7 @@ TEST_F(PermissionsTest, GetWarningMessages_Socket_OneDomainTwoHostnames) {
|
| // "\xC3\xA5" = UTF-8 for lowercase A with ring above
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetWarningMessages_Socket_TwoDomainsOneHostname) {
|
| +TEST(PermissionsTest, GetWarningMessages_Socket_TwoDomainsOneHostname) {
|
| Feature::ScopedCurrentChannel channel(chrome::VersionInfo::CHANNEL_DEV);
|
|
|
| scoped_refptr<Extension> extension =
|
| @@ -948,7 +932,7 @@ TEST_F(PermissionsTest, GetWarningMessages_Socket_TwoDomainsOneHostname) {
|
| "bar.example.org"));
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetWarningMessages_PlatformApppHosts) {
|
| +TEST(PermissionsTest, GetWarningMessages_PlatformApppHosts) {
|
| scoped_refptr<Extension> extension;
|
|
|
| extension = LoadManifest("permissions", "platform_app_hosts.json");
|
| @@ -962,7 +946,7 @@ TEST_F(PermissionsTest, GetWarningMessages_PlatformApppHosts) {
|
| ASSERT_EQ(0u, warnings.size());
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetDistinctHostsForDisplay) {
|
| +TEST(PermissionsTest, GetDistinctHostsForDisplay) {
|
| scoped_refptr<PermissionSet> perm_set;
|
| APIPermissionSet empty_perms;
|
| std::set<std::string> expected;
|
| @@ -1118,7 +1102,7 @@ TEST_F(PermissionsTest, GetDistinctHostsForDisplay) {
|
| }
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetDistinctHostsForDisplay_ComIsBestRcd) {
|
| +TEST(PermissionsTest, GetDistinctHostsForDisplay_ComIsBestRcd) {
|
| scoped_refptr<PermissionSet> perm_set;
|
| APIPermissionSet empty_perms;
|
| URLPatternSet explicit_hosts;
|
| @@ -1143,7 +1127,7 @@ TEST_F(PermissionsTest, GetDistinctHostsForDisplay_ComIsBestRcd) {
|
| EXPECT_EQ(expected, perm_set->GetDistinctHostsForDisplay());
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetDistinctHostsForDisplay_NetIs2ndBestRcd) {
|
| +TEST(PermissionsTest, GetDistinctHostsForDisplay_NetIs2ndBestRcd) {
|
| scoped_refptr<PermissionSet> perm_set;
|
| APIPermissionSet empty_perms;
|
| URLPatternSet explicit_hosts;
|
| @@ -1167,7 +1151,7 @@ TEST_F(PermissionsTest, GetDistinctHostsForDisplay_NetIs2ndBestRcd) {
|
| EXPECT_EQ(expected, perm_set->GetDistinctHostsForDisplay());
|
| }
|
|
|
| -TEST_F(PermissionsTest,
|
| +TEST(PermissionsTest,
|
| GetDistinctHostsForDisplay_OrgIs3rdBestRcd) {
|
| scoped_refptr<PermissionSet> perm_set;
|
| APIPermissionSet empty_perms;
|
| @@ -1191,7 +1175,7 @@ TEST_F(PermissionsTest,
|
| EXPECT_EQ(expected, perm_set->GetDistinctHostsForDisplay());
|
| }
|
|
|
| -TEST_F(PermissionsTest,
|
| +TEST(PermissionsTest,
|
| GetDistinctHostsForDisplay_FirstInListIs4thBestRcd) {
|
| scoped_refptr<PermissionSet> perm_set;
|
| APIPermissionSet empty_perms;
|
| @@ -1214,7 +1198,7 @@ TEST_F(PermissionsTest,
|
| EXPECT_EQ(expected, perm_set->GetDistinctHostsForDisplay());
|
| }
|
|
|
| -TEST_F(PermissionsTest, HasLessHostPrivilegesThan) {
|
| +TEST(PermissionsTest, HasLessHostPrivilegesThan) {
|
| URLPatternSet elist1;
|
| URLPatternSet elist2;
|
| URLPatternSet slist1;
|
| @@ -1283,7 +1267,7 @@ TEST_F(PermissionsTest, HasLessHostPrivilegesThan) {
|
| EXPECT_TRUE(set2->HasLessHostPrivilegesThan(set1.get()));
|
| }
|
|
|
| -TEST_F(PermissionsTest, GetAPIsAsStrings) {
|
| +TEST(PermissionsTest, GetAPIsAsStrings) {
|
| APIPermissionSet apis;
|
| URLPatternSet empty_set;
|
|
|
| @@ -1303,7 +1287,7 @@ TEST_F(PermissionsTest, GetAPIsAsStrings) {
|
| PermissionsInfo::GetInstance()->GetAllByName(api_names));
|
| }
|
|
|
| -TEST_F(PermissionsTest, IsEmpty) {
|
| +TEST(PermissionsTest, IsEmpty) {
|
| APIPermissionSet empty_apis;
|
| URLPatternSet empty_extent;
|
|
|
| @@ -1333,7 +1317,7 @@ TEST_F(PermissionsTest, IsEmpty) {
|
| EXPECT_FALSE(perm_set->IsEmpty());
|
| }
|
|
|
| -TEST_F(PermissionsTest, ImpliedPermissions) {
|
| +TEST(PermissionsTest, ImpliedPermissions) {
|
| URLPatternSet empty_extent;
|
| APIPermissionSet apis;
|
| apis.insert(APIPermission::kWebRequest);
|
| @@ -1345,7 +1329,7 @@ TEST_F(PermissionsTest, ImpliedPermissions) {
|
| EXPECT_EQ(4U, perm_set->apis().size());
|
| }
|
|
|
| -TEST_F(PermissionsTest, SyncFileSystemPermission) {
|
| +TEST(PermissionsTest, SyncFileSystemPermission) {
|
| scoped_refptr<Extension> extension = LoadManifest(
|
| "permissions", "sync_file_system.json");
|
| APIPermissionSet apis;
|
|
|