Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(52)

Unified Diff: chrome/common/extensions/permissions/permission_set_unittest.cc

Issue 14694010: Consolidate manifest handler registration. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 7 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/common/extensions/permissions/permission_set_unittest.cc
diff --git a/chrome/common/extensions/permissions/permission_set_unittest.cc b/chrome/common/extensions/permissions/permission_set_unittest.cc
index 2b9918780656a2dc36e9fd57d0dd74857d56923e..80b6e57000240684719be20b5b2ce8aca5a79366 100644
--- a/chrome/common/extensions/permissions/permission_set_unittest.cc
+++ b/chrome/common/extensions/permissions/permission_set_unittest.cc
@@ -9,12 +9,9 @@
#include "base/utf_string_conversions.h"
#include "chrome/common/chrome_paths.h"
#include "chrome/common/chrome_switches.h"
-#include "chrome/common/extensions/api/plugins/plugins_handler.h"
#include "chrome/common/extensions/extension.h"
#include "chrome/common/extensions/extension_test_util.h"
-#include "chrome/common/extensions/extension_unittest.h"
#include "chrome/common/extensions/features/feature.h"
-#include "chrome/common/extensions/manifest_handlers/content_scripts_handler.h"
#include "chrome/common/extensions/permissions/permission_set.h"
#include "chrome/common/extensions/permissions/permissions_info.h"
#include "chrome/common/extensions/permissions/socket_permission.h"
@@ -49,21 +46,8 @@ bool Contains(const std::vector<string16>& warnings,
} // namespace
-class PermissionsTest : public ExtensionTest {
- protected:
- virtual void SetUp() OVERRIDE {
- ExtensionTest::SetUp();
- (new ContentScriptsHandler)->Register();
- (new PluginsHandler)->Register();
- }
-
- virtual void TearDown() OVERRIDE {
- ExtensionTest::TearDown();
- }
-};
-
// Tests GetByID.
-TEST_F(PermissionsTest, GetByID) {
+TEST(PermissionsTest, GetByID) {
PermissionsInfo* info = PermissionsInfo::GetInstance();
APIPermissionSet apis = info->GetAll();
for (APIPermissionSet::const_iterator i = apis.begin();
@@ -73,7 +57,7 @@ TEST_F(PermissionsTest, GetByID) {
}
// Tests that GetByName works with normal permission names and aliases.
-TEST_F(PermissionsTest, GetByName) {
+TEST(PermissionsTest, GetByName) {
PermissionsInfo* info = PermissionsInfo::GetInstance();
EXPECT_EQ(APIPermission::kTab, info->GetByName("tabs")->id());
EXPECT_EQ(APIPermission::kManagement,
@@ -81,7 +65,7 @@ TEST_F(PermissionsTest, GetByName) {
EXPECT_FALSE(info->GetByName("alsdkfjasldkfj"));
}
-TEST_F(PermissionsTest, GetAll) {
+TEST(PermissionsTest, GetAll) {
size_t count = 0;
PermissionsInfo* info = PermissionsInfo::GetInstance();
APIPermissionSet apis = info->GetAll();
@@ -95,7 +79,7 @@ TEST_F(PermissionsTest, GetAll) {
EXPECT_EQ(count, info->get_permission_count());
}
-TEST_F(PermissionsTest, GetAllByName) {
+TEST(PermissionsTest, GetAllByName) {
std::set<std::string> names;
names.insert("background");
names.insert("management");
@@ -116,7 +100,7 @@ TEST_F(PermissionsTest, GetAllByName) {
}
// Tests that the aliases are properly mapped.
-TEST_F(PermissionsTest, Aliases) {
+TEST(PermissionsTest, Aliases) {
PermissionsInfo* info = PermissionsInfo::GetInstance();
// tabs: tabs, windows
std::string tabs_name = "tabs";
@@ -134,7 +118,7 @@ TEST_F(PermissionsTest, Aliases) {
info->GetByName("unlimited_storage")->id());
}
-TEST_F(PermissionsTest, EffectiveHostPermissions) {
+TEST(PermissionsTest, EffectiveHostPermissions) {
scoped_refptr<Extension> extension;
scoped_refptr<const PermissionSet> permissions;
@@ -210,7 +194,7 @@ TEST_F(PermissionsTest, EffectiveHostPermissions) {
EXPECT_TRUE(permissions->HasEffectiveAccessToAllHosts());
}
-TEST_F(PermissionsTest, ExplicitAccessToOrigin) {
+TEST(PermissionsTest, ExplicitAccessToOrigin) {
APIPermissionSet apis;
URLPatternSet explicit_hosts;
URLPatternSet scriptable_hosts;
@@ -233,7 +217,7 @@ TEST_F(PermissionsTest, ExplicitAccessToOrigin) {
GURL("http://test.example.com")));
}
-TEST_F(PermissionsTest, CreateUnion) {
+TEST(PermissionsTest, CreateUnion) {
APIPermission* permission = NULL;
APIPermissionSet apis1;
@@ -357,7 +341,7 @@ TEST_F(PermissionsTest, CreateUnion) {
EXPECT_EQ(effective_hosts, union_set->effective_hosts());
}
-TEST_F(PermissionsTest, CreateIntersection) {
+TEST(PermissionsTest, CreateIntersection) {
APIPermission* permission = NULL;
APIPermissionSet apis1;
@@ -471,7 +455,7 @@ TEST_F(PermissionsTest, CreateIntersection) {
EXPECT_EQ(effective_hosts, new_set->effective_hosts());
}
-TEST_F(PermissionsTest, CreateDifference) {
+TEST(PermissionsTest, CreateDifference) {
APIPermission* permission = NULL;
APIPermissionSet apis1;
@@ -572,7 +556,7 @@ TEST_F(PermissionsTest, CreateDifference) {
EXPECT_TRUE(set1->IsEmpty());
}
-TEST_F(PermissionsTest, HasLessPrivilegesThan) {
+TEST(PermissionsTest, HasLessPrivilegesThan) {
const struct {
const char* base_name;
bool expect_increase;
@@ -623,7 +607,7 @@ TEST_F(PermissionsTest, HasLessPrivilegesThan) {
}
}
-TEST_F(PermissionsTest, PermissionMessages) {
+TEST(PermissionsTest, PermissionMessages) {
// Ensure that all permissions that needs to show install UI actually have
// strings associated with them.
APIPermissionSet skip;
@@ -745,7 +729,7 @@ TEST_F(PermissionsTest, PermissionMessages) {
}
// Tests the default permissions (empty API permission set).
-TEST_F(PermissionsTest, DefaultFunctionAccess) {
+TEST(PermissionsTest, DefaultFunctionAccess) {
const struct {
const char* permission_name;
bool expect_success;
@@ -784,7 +768,7 @@ TEST_F(PermissionsTest, DefaultFunctionAccess) {
}
// Tests the default permissions (empty API permission set).
-TEST_F(PermissionsTest, DefaultAnyAPIAccess) {
+TEST(PermissionsTest, DefaultAnyAPIAccess) {
const struct {
const char* api_name;
bool expect_success;
@@ -815,7 +799,7 @@ TEST_F(PermissionsTest, DefaultAnyAPIAccess) {
}
}
-TEST_F(PermissionsTest, GetWarningMessages_ManyHosts) {
+TEST(PermissionsTest, GetWarningMessages_ManyHosts) {
scoped_refptr<Extension> extension;
extension = LoadManifest("permissions", "many-hosts.json");
@@ -825,7 +809,7 @@ TEST_F(PermissionsTest, GetWarningMessages_ManyHosts) {
UTF16ToUTF8(warnings[0]));
}
-TEST_F(PermissionsTest, GetWarningMessages_Plugins) {
+TEST(PermissionsTest, GetWarningMessages_Plugins) {
scoped_refptr<Extension> extension;
scoped_refptr<PermissionSet> permissions;
@@ -842,7 +826,7 @@ TEST_F(PermissionsTest, GetWarningMessages_Plugins) {
#endif
}
-TEST_F(PermissionsTest, GetWarningMessages_AudioVideo) {
+TEST(PermissionsTest, GetWarningMessages_AudioVideo) {
// Both audio and video present.
scoped_refptr<Extension> extension =
LoadManifest("permissions", "audio-video.json");
@@ -875,7 +859,7 @@ TEST_F(PermissionsTest, GetWarningMessages_AudioVideo) {
EXPECT_TRUE(Contains(warnings, "Use your camera"));
}
-TEST_F(PermissionsTest, GetWarningMessages_Serial) {
+TEST(PermissionsTest, GetWarningMessages_Serial) {
scoped_refptr<Extension> extension =
LoadManifest("permissions", "serial.json");
@@ -887,7 +871,7 @@ TEST_F(PermissionsTest, GetWarningMessages_Serial) {
ASSERT_EQ(1u, warnings.size());
}
-TEST_F(PermissionsTest, GetWarningMessages_Socket_AnyHost) {
+TEST(PermissionsTest, GetWarningMessages_Socket_AnyHost) {
Feature::ScopedCurrentChannel channel(chrome::VersionInfo::CHANNEL_DEV);
scoped_refptr<Extension> extension =
@@ -900,7 +884,7 @@ TEST_F(PermissionsTest, GetWarningMessages_Socket_AnyHost) {
"on the local network or internet"));
}
-TEST_F(PermissionsTest, GetWarningMessages_Socket_OneDomainTwoHostnames) {
+TEST(PermissionsTest, GetWarningMessages_Socket_OneDomainTwoHostnames) {
Feature::ScopedCurrentChannel channel(chrome::VersionInfo::CHANNEL_DEV);
scoped_refptr<Extension> extension =
@@ -925,7 +909,7 @@ TEST_F(PermissionsTest, GetWarningMessages_Socket_OneDomainTwoHostnames) {
// "\xC3\xA5" = UTF-8 for lowercase A with ring above
}
-TEST_F(PermissionsTest, GetWarningMessages_Socket_TwoDomainsOneHostname) {
+TEST(PermissionsTest, GetWarningMessages_Socket_TwoDomainsOneHostname) {
Feature::ScopedCurrentChannel channel(chrome::VersionInfo::CHANNEL_DEV);
scoped_refptr<Extension> extension =
@@ -948,7 +932,7 @@ TEST_F(PermissionsTest, GetWarningMessages_Socket_TwoDomainsOneHostname) {
"bar.example.org"));
}
-TEST_F(PermissionsTest, GetWarningMessages_PlatformApppHosts) {
+TEST(PermissionsTest, GetWarningMessages_PlatformApppHosts) {
scoped_refptr<Extension> extension;
extension = LoadManifest("permissions", "platform_app_hosts.json");
@@ -962,7 +946,7 @@ TEST_F(PermissionsTest, GetWarningMessages_PlatformApppHosts) {
ASSERT_EQ(0u, warnings.size());
}
-TEST_F(PermissionsTest, GetDistinctHostsForDisplay) {
+TEST(PermissionsTest, GetDistinctHostsForDisplay) {
scoped_refptr<PermissionSet> perm_set;
APIPermissionSet empty_perms;
std::set<std::string> expected;
@@ -1118,7 +1102,7 @@ TEST_F(PermissionsTest, GetDistinctHostsForDisplay) {
}
}
-TEST_F(PermissionsTest, GetDistinctHostsForDisplay_ComIsBestRcd) {
+TEST(PermissionsTest, GetDistinctHostsForDisplay_ComIsBestRcd) {
scoped_refptr<PermissionSet> perm_set;
APIPermissionSet empty_perms;
URLPatternSet explicit_hosts;
@@ -1143,7 +1127,7 @@ TEST_F(PermissionsTest, GetDistinctHostsForDisplay_ComIsBestRcd) {
EXPECT_EQ(expected, perm_set->GetDistinctHostsForDisplay());
}
-TEST_F(PermissionsTest, GetDistinctHostsForDisplay_NetIs2ndBestRcd) {
+TEST(PermissionsTest, GetDistinctHostsForDisplay_NetIs2ndBestRcd) {
scoped_refptr<PermissionSet> perm_set;
APIPermissionSet empty_perms;
URLPatternSet explicit_hosts;
@@ -1167,7 +1151,7 @@ TEST_F(PermissionsTest, GetDistinctHostsForDisplay_NetIs2ndBestRcd) {
EXPECT_EQ(expected, perm_set->GetDistinctHostsForDisplay());
}
-TEST_F(PermissionsTest,
+TEST(PermissionsTest,
GetDistinctHostsForDisplay_OrgIs3rdBestRcd) {
scoped_refptr<PermissionSet> perm_set;
APIPermissionSet empty_perms;
@@ -1191,7 +1175,7 @@ TEST_F(PermissionsTest,
EXPECT_EQ(expected, perm_set->GetDistinctHostsForDisplay());
}
-TEST_F(PermissionsTest,
+TEST(PermissionsTest,
GetDistinctHostsForDisplay_FirstInListIs4thBestRcd) {
scoped_refptr<PermissionSet> perm_set;
APIPermissionSet empty_perms;
@@ -1214,7 +1198,7 @@ TEST_F(PermissionsTest,
EXPECT_EQ(expected, perm_set->GetDistinctHostsForDisplay());
}
-TEST_F(PermissionsTest, HasLessHostPrivilegesThan) {
+TEST(PermissionsTest, HasLessHostPrivilegesThan) {
URLPatternSet elist1;
URLPatternSet elist2;
URLPatternSet slist1;
@@ -1283,7 +1267,7 @@ TEST_F(PermissionsTest, HasLessHostPrivilegesThan) {
EXPECT_TRUE(set2->HasLessHostPrivilegesThan(set1.get()));
}
-TEST_F(PermissionsTest, GetAPIsAsStrings) {
+TEST(PermissionsTest, GetAPIsAsStrings) {
APIPermissionSet apis;
URLPatternSet empty_set;
@@ -1303,7 +1287,7 @@ TEST_F(PermissionsTest, GetAPIsAsStrings) {
PermissionsInfo::GetInstance()->GetAllByName(api_names));
}
-TEST_F(PermissionsTest, IsEmpty) {
+TEST(PermissionsTest, IsEmpty) {
APIPermissionSet empty_apis;
URLPatternSet empty_extent;
@@ -1333,7 +1317,7 @@ TEST_F(PermissionsTest, IsEmpty) {
EXPECT_FALSE(perm_set->IsEmpty());
}
-TEST_F(PermissionsTest, ImpliedPermissions) {
+TEST(PermissionsTest, ImpliedPermissions) {
URLPatternSet empty_extent;
APIPermissionSet apis;
apis.insert(APIPermission::kWebRequest);
@@ -1345,7 +1329,7 @@ TEST_F(PermissionsTest, ImpliedPermissions) {
EXPECT_EQ(4U, perm_set->apis().size());
}
-TEST_F(PermissionsTest, SyncFileSystemPermission) {
+TEST(PermissionsTest, SyncFileSystemPermission) {
scoped_refptr<Extension> extension = LoadManifest(
"permissions", "sync_file_system.json");
APIPermissionSet apis;

Powered by Google App Engine
This is Rietveld 408576698