OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include <algorithm> | |
6 | |
7 #include "base/file_util.h" | |
8 #include "base/files/scoped_temp_dir.h" | |
9 #include "base/json/json_reader.h" | |
10 #include "base/message_loop/message_loop.h" | |
11 #include "base/prefs/pref_service.h" | |
12 #include "base/stl_util.h" | |
13 #include "base/strings/stringprintf.h" | |
14 #include "chrome/browser/chrome_notification_types.h" | |
15 #include "chrome/browser/download/download_file_icon_extractor.h" | |
16 #include "chrome/browser/download/download_service.h" | |
17 #include "chrome/browser/download/download_service_factory.h" | |
18 #include "chrome/browser/download/download_test_file_activity_observer.h" | |
19 #include "chrome/browser/extensions/api/downloads/downloads_api.h" | |
20 #include "chrome/browser/extensions/event_names.h" | |
21 #include "chrome/browser/extensions/extension_apitest.h" | |
22 #include "chrome/browser/extensions/extension_function_test_utils.h" | |
23 #include "chrome/browser/extensions/extension_service.h" | |
24 #include "chrome/browser/history/download_row.h" | |
25 #include "chrome/browser/net/url_request_mock_util.h" | |
26 #include "chrome/browser/profiles/profile.h" | |
27 #include "chrome/browser/ui/browser.h" | |
28 #include "chrome/browser/ui/browser_tabstrip.h" | |
29 #include "chrome/common/pref_names.h" | |
30 #include "chrome/test/base/in_process_browser_test.h" | |
31 #include "chrome/test/base/ui_test_utils.h" | |
32 #include "content/public/browser/browser_context.h" | |
33 #include "content/public/browser/browser_thread.h" | |
34 #include "content/public/browser/download_item.h" | |
35 #include "content/public/browser/download_manager.h" | |
36 #include "content/public/browser/notification_service.h" | |
37 #include "content/public/browser/storage_partition.h" | |
38 #include "content/public/browser/web_contents.h" | |
39 #include "content/public/common/content_switches.h" | |
40 #include "content/public/common/page_transition_types.h" | |
41 #include "content/public/test/download_test_observer.h" | |
42 #include "content/test/net/url_request_slow_download_job.h" | |
43 #include "net/base/data_url.h" | |
44 #include "net/base/net_util.h" | |
45 #include "net/url_request/url_request.h" | |
46 #include "net/url_request/url_request_context.h" | |
47 #include "net/url_request/url_request_job.h" | |
48 #include "net/url_request/url_request_job_factory.h" | |
49 #include "net/url_request/url_request_job_factory_impl.h" | |
50 #include "webkit/browser/blob/blob_storage_controller.h" | |
51 #include "webkit/browser/blob/blob_url_request_job.h" | |
52 #include "webkit/browser/fileapi/file_system_context.h" | |
53 #include "webkit/browser/fileapi/file_system_operation_runner.h" | |
54 #include "webkit/browser/fileapi/file_system_url.h" | |
55 #include "webkit/common/blob/blob_data.h" | |
56 | |
57 using content::BrowserContext; | |
58 using content::BrowserThread; | |
59 using content::DownloadItem; | |
60 using content::DownloadManager; | |
61 using content::URLRequestSlowDownloadJob; | |
62 | |
63 namespace events = extensions::event_names; | |
64 | |
65 namespace { | |
66 | |
67 // Comparator that orders download items by their ID. Can be used with | |
68 // std::sort. | |
69 struct DownloadIdComparator { | |
70 bool operator() (DownloadItem* first, DownloadItem* second) { | |
71 return first->GetId() < second->GetId(); | |
72 } | |
73 }; | |
74 | |
75 class DownloadsEventsListener : public content::NotificationObserver { | |
76 public: | |
77 DownloadsEventsListener() | |
78 : waiting_(false) { | |
79 registrar_.Add(this, chrome::NOTIFICATION_EXTENSION_DOWNLOADS_EVENT, | |
80 content::NotificationService::AllSources()); | |
81 } | |
82 | |
83 virtual ~DownloadsEventsListener() { | |
84 registrar_.Remove(this, chrome::NOTIFICATION_EXTENSION_DOWNLOADS_EVENT, | |
85 content::NotificationService::AllSources()); | |
86 STLDeleteElements(&events_); | |
87 } | |
88 | |
89 void ClearEvents() { | |
90 STLDeleteElements(&events_); | |
91 events_.clear(); | |
92 } | |
93 | |
94 class Event { | |
95 public: | |
96 Event(Profile* profile, | |
97 const std::string& event_name, | |
98 const std::string& json_args, | |
99 base::Time caught) | |
100 : profile_(profile), | |
101 event_name_(event_name), | |
102 json_args_(json_args), | |
103 args_(base::JSONReader::Read(json_args)), | |
104 caught_(caught) { | |
105 } | |
106 | |
107 const base::Time& caught() { return caught_; } | |
108 | |
109 bool Satisfies(const Event& other) const { | |
110 return other.SatisfiedBy(*this); | |
111 } | |
112 | |
113 bool SatisfiedBy(const Event& other) const { | |
114 if ((profile_ != other.profile_) || | |
115 (event_name_ != other.event_name_)) | |
116 return false; | |
117 if (((event_name_ == events::kOnDownloadDeterminingFilename) || | |
118 (event_name_ == events::kOnDownloadCreated) || | |
119 (event_name_ == events::kOnDownloadChanged)) && | |
120 args_.get() && | |
121 other.args_.get()) { | |
122 base::ListValue* left_list = NULL; | |
123 base::DictionaryValue* left_dict = NULL; | |
124 base::ListValue* right_list = NULL; | |
125 base::DictionaryValue* right_dict = NULL; | |
126 if (!args_->GetAsList(&left_list) || | |
127 !other.args_->GetAsList(&right_list) || | |
128 !left_list->GetDictionary(0, &left_dict) || | |
129 !right_list->GetDictionary(0, &right_dict)) | |
130 return false; | |
131 for (base::DictionaryValue::Iterator iter(*left_dict); | |
132 !iter.IsAtEnd(); iter.Advance()) { | |
133 base::Value* right_value = NULL; | |
134 if (!right_dict->HasKey(iter.key()) || | |
135 (right_dict->Get(iter.key(), &right_value) && | |
136 !iter.value().Equals(right_value))) { | |
137 return false; | |
138 } | |
139 } | |
140 return true; | |
141 } else if ((event_name_ == events::kOnDownloadErased) && | |
142 args_.get() && | |
143 other.args_.get()) { | |
144 int my_id = -1, other_id = -1; | |
145 return (args_->GetAsInteger(&my_id) && | |
146 other.args_->GetAsInteger(&other_id) && | |
147 my_id == other_id); | |
148 } | |
149 return json_args_ == other.json_args_; | |
150 } | |
151 | |
152 std::string Debug() { | |
153 return base::StringPrintf("Event(%p, %s, %s, %f)", | |
154 profile_, | |
155 event_name_.c_str(), | |
156 json_args_.c_str(), | |
157 caught_.ToJsTime()); | |
158 } | |
159 | |
160 private: | |
161 Profile* profile_; | |
162 std::string event_name_; | |
163 std::string json_args_; | |
164 scoped_ptr<base::Value> args_; | |
165 base::Time caught_; | |
166 | |
167 DISALLOW_COPY_AND_ASSIGN(Event); | |
168 }; | |
169 | |
170 typedef ExtensionDownloadsEventRouter::DownloadsNotificationSource | |
171 DownloadsNotificationSource; | |
172 | |
173 virtual void Observe(int type, | |
174 const content::NotificationSource& source, | |
175 const content::NotificationDetails& details) OVERRIDE { | |
176 switch (type) { | |
177 case chrome::NOTIFICATION_EXTENSION_DOWNLOADS_EVENT: | |
178 { | |
179 DownloadsNotificationSource* dns = | |
180 content::Source<DownloadsNotificationSource>(source).ptr(); | |
181 Event* new_event = new Event( | |
182 dns->profile, | |
183 dns->event_name, | |
184 *content::Details<std::string>(details).ptr(), base::Time::Now()); | |
185 events_.push_back(new_event); | |
186 if (waiting_ && | |
187 waiting_for_.get() && | |
188 new_event->Satisfies(*waiting_for_)) { | |
189 waiting_ = false; | |
190 base::MessageLoopForUI::current()->Quit(); | |
191 } | |
192 break; | |
193 } | |
194 default: | |
195 NOTREACHED(); | |
196 } | |
197 } | |
198 | |
199 bool WaitFor(Profile* profile, | |
200 const std::string& event_name, | |
201 const std::string& json_args) { | |
202 waiting_for_.reset(new Event(profile, event_name, json_args, base::Time())); | |
203 for (std::deque<Event*>::const_iterator iter = events_.begin(); | |
204 iter != events_.end(); ++iter) { | |
205 if ((*iter)->Satisfies(*waiting_for_.get())) { | |
206 return true; | |
207 } | |
208 } | |
209 waiting_ = true; | |
210 content::RunMessageLoop(); | |
211 bool success = !waiting_; | |
212 if (waiting_) { | |
213 // Print the events that were caught since the last WaitFor() call to help | |
214 // find the erroneous event. | |
215 // TODO(benjhayden) Fuzzy-match and highlight the erroneous event. | |
216 for (std::deque<Event*>::const_iterator iter = events_.begin(); | |
217 iter != events_.end(); ++iter) { | |
218 if ((*iter)->caught() > last_wait_) { | |
219 LOG(INFO) << "Caught " << (*iter)->Debug(); | |
220 } | |
221 } | |
222 if (waiting_for_.get()) { | |
223 LOG(INFO) << "Timed out waiting for " << waiting_for_->Debug(); | |
224 } | |
225 waiting_ = false; | |
226 } | |
227 waiting_for_.reset(); | |
228 last_wait_ = base::Time::Now(); | |
229 return success; | |
230 } | |
231 | |
232 private: | |
233 bool waiting_; | |
234 base::Time last_wait_; | |
235 scoped_ptr<Event> waiting_for_; | |
236 content::NotificationRegistrar registrar_; | |
237 std::deque<Event*> events_; | |
238 | |
239 DISALLOW_COPY_AND_ASSIGN(DownloadsEventsListener); | |
240 }; | |
241 | |
242 class DownloadExtensionTest : public ExtensionApiTest { | |
243 public: | |
244 DownloadExtensionTest() | |
245 : extension_(NULL), | |
246 incognito_browser_(NULL), | |
247 current_browser_(NULL) { | |
248 } | |
249 | |
250 protected: | |
251 // Used with CreateHistoryDownloads | |
252 struct HistoryDownloadInfo { | |
253 // Filename to use. CreateHistoryDownloads will append this filename to the | |
254 // temporary downloads directory specified by downloads_directory(). | |
255 const base::FilePath::CharType* filename; | |
256 | |
257 // State for the download. Note that IN_PROGRESS downloads will be created | |
258 // as CANCELLED. | |
259 DownloadItem::DownloadState state; | |
260 | |
261 // Danger type for the download. Only use DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS | |
262 // and DOWNLOAD_DANGER_TYPE_DANGEROUS_CONTENT. | |
263 content::DownloadDangerType danger_type; | |
264 }; | |
265 | |
266 void LoadExtension(const char* name) { | |
267 // Store the created Extension object so that we can attach it to | |
268 // ExtensionFunctions. Also load the extension in incognito profiles for | |
269 // testing incognito. | |
270 extension_ = LoadExtensionIncognito(test_data_dir_.AppendASCII(name)); | |
271 CHECK(extension_); | |
272 content::WebContents* tab = chrome::AddSelectedTabWithURL( | |
273 current_browser(), | |
274 extension_->GetResourceURL("empty.html"), | |
275 content::PAGE_TRANSITION_LINK); | |
276 extensions::ExtensionSystem::Get(current_browser()->profile())-> | |
277 event_router()->AddEventListener( | |
278 extensions::event_names::kOnDownloadCreated, | |
279 tab->GetRenderProcessHost(), | |
280 GetExtensionId()); | |
281 extensions::ExtensionSystem::Get(current_browser()->profile())-> | |
282 event_router()->AddEventListener( | |
283 extensions::event_names::kOnDownloadChanged, | |
284 tab->GetRenderProcessHost(), | |
285 GetExtensionId()); | |
286 extensions::ExtensionSystem::Get(current_browser()->profile())-> | |
287 event_router()->AddEventListener( | |
288 extensions::event_names::kOnDownloadErased, | |
289 tab->GetRenderProcessHost(), | |
290 GetExtensionId()); | |
291 } | |
292 | |
293 content::RenderProcessHost* AddFilenameDeterminer() { | |
294 content::WebContents* tab = chrome::AddSelectedTabWithURL( | |
295 current_browser(), | |
296 extension_->GetResourceURL("empty.html"), | |
297 content::PAGE_TRANSITION_LINK); | |
298 extensions::ExtensionSystem::Get(current_browser()->profile())-> | |
299 event_router()->AddEventListener( | |
300 extensions::event_names::kOnDownloadDeterminingFilename, | |
301 tab->GetRenderProcessHost(), | |
302 GetExtensionId()); | |
303 return tab->GetRenderProcessHost(); | |
304 } | |
305 | |
306 void RemoveFilenameDeterminer(content::RenderProcessHost* host) { | |
307 extensions::ExtensionSystem::Get(current_browser()->profile())-> | |
308 event_router()->RemoveEventListener( | |
309 extensions::event_names::kOnDownloadDeterminingFilename, | |
310 host, | |
311 GetExtensionId()); | |
312 } | |
313 | |
314 Browser* current_browser() { return current_browser_; } | |
315 | |
316 // InProcessBrowserTest | |
317 virtual void SetUpOnMainThread() OVERRIDE { | |
318 ExtensionApiTest::SetUpOnMainThread(); | |
319 BrowserThread::PostTask( | |
320 BrowserThread::IO, FROM_HERE, | |
321 base::Bind(&chrome_browser_net::SetUrlRequestMocksEnabled, true)); | |
322 InProcessBrowserTest::SetUpOnMainThread(); | |
323 GoOnTheRecord(); | |
324 CreateAndSetDownloadsDirectory(); | |
325 current_browser()->profile()->GetPrefs()->SetBoolean( | |
326 prefs::kPromptForDownload, false); | |
327 GetOnRecordManager()->RemoveAllDownloads(); | |
328 events_listener_.reset(new DownloadsEventsListener()); | |
329 // Disable file chooser for current profile. | |
330 DownloadTestFileActivityObserver observer(current_browser()->profile()); | |
331 observer.EnableFileChooser(false); | |
332 } | |
333 | |
334 void GoOnTheRecord() { current_browser_ = browser(); } | |
335 | |
336 void GoOffTheRecord() { | |
337 if (!incognito_browser_) { | |
338 incognito_browser_ = CreateIncognitoBrowser(); | |
339 GetOffRecordManager()->RemoveAllDownloads(); | |
340 // Disable file chooser for incognito profile. | |
341 DownloadTestFileActivityObserver observer(incognito_browser_->profile()); | |
342 observer.EnableFileChooser(false); | |
343 } | |
344 current_browser_ = incognito_browser_; | |
345 } | |
346 | |
347 bool WaitFor(const std::string& event_name, const std::string& json_args) { | |
348 return events_listener_->WaitFor( | |
349 current_browser()->profile(), event_name, json_args); | |
350 } | |
351 | |
352 bool WaitForInterruption(DownloadItem* item, int expected_error, | |
353 const std::string& on_created_event) { | |
354 if (!WaitFor(events::kOnDownloadCreated, on_created_event)) | |
355 return false; | |
356 // Now, onCreated is always fired before interruption. | |
357 return WaitFor(events::kOnDownloadChanged, | |
358 base::StringPrintf("[{\"id\": %d," | |
359 " \"error\": {\"current\": %d}," | |
360 " \"state\": {" | |
361 " \"previous\": \"in_progress\"," | |
362 " \"current\": \"interrupted\"}}]", | |
363 item->GetId(), | |
364 expected_error)); | |
365 } | |
366 | |
367 void ClearEvents() { | |
368 events_listener_->ClearEvents(); | |
369 } | |
370 | |
371 std::string GetExtensionURL() { | |
372 return extension_->url().spec(); | |
373 } | |
374 std::string GetExtensionId() { | |
375 return extension_->id(); | |
376 } | |
377 | |
378 std::string GetFilename(const char* path) { | |
379 std::string result = | |
380 downloads_directory_.path().AppendASCII(path).AsUTF8Unsafe(); | |
381 #if defined(OS_WIN) | |
382 for (std::string::size_type next = result.find("\\"); | |
383 next != std::string::npos; | |
384 next = result.find("\\", next)) { | |
385 result.replace(next, 1, "\\\\"); | |
386 next += 2; | |
387 } | |
388 #endif | |
389 return result; | |
390 } | |
391 | |
392 DownloadManager* GetOnRecordManager() { | |
393 return BrowserContext::GetDownloadManager(browser()->profile()); | |
394 } | |
395 DownloadManager* GetOffRecordManager() { | |
396 return BrowserContext::GetDownloadManager( | |
397 browser()->profile()->GetOffTheRecordProfile()); | |
398 } | |
399 DownloadManager* GetCurrentManager() { | |
400 return (current_browser_ == incognito_browser_) ? | |
401 GetOffRecordManager() : GetOnRecordManager(); | |
402 } | |
403 | |
404 // Creates a set of history downloads based on the provided |history_info| | |
405 // array. |count| is the number of elements in |history_info|. On success, | |
406 // |items| will contain |count| DownloadItems in the order that they were | |
407 // specified in |history_info|. Returns true on success and false otherwise. | |
408 bool CreateHistoryDownloads(const HistoryDownloadInfo* history_info, | |
409 size_t count, | |
410 DownloadManager::DownloadVector* items) { | |
411 DownloadIdComparator download_id_comparator; | |
412 base::Time current = base::Time::Now(); | |
413 items->clear(); | |
414 GetOnRecordManager()->GetAllDownloads(items); | |
415 CHECK_EQ(0, static_cast<int>(items->size())); | |
416 std::vector<GURL> url_chain; | |
417 url_chain.push_back(GURL()); | |
418 for (size_t i = 0; i < count; ++i) { | |
419 DownloadItem* item = GetOnRecordManager()->CreateDownloadItem( | |
420 content::DownloadItem::kInvalidId + 1 + i, | |
421 downloads_directory().Append(history_info[i].filename), | |
422 downloads_directory().Append(history_info[i].filename), | |
423 url_chain, GURL(), // URL Chain, referrer | |
424 current, current, // start_time, end_time | |
425 1, 1, // received_bytes, total_bytes | |
426 history_info[i].state, // state | |
427 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS, | |
428 content::DOWNLOAD_INTERRUPT_REASON_NONE, | |
429 false); // opened | |
430 items->push_back(item); | |
431 } | |
432 | |
433 // Order by ID so that they are in the order that we created them. | |
434 std::sort(items->begin(), items->end(), download_id_comparator); | |
435 // Set the danger type if necessary. | |
436 for (size_t i = 0; i < count; ++i) { | |
437 if (history_info[i].danger_type != | |
438 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS) { | |
439 EXPECT_EQ(content::DOWNLOAD_DANGER_TYPE_DANGEROUS_CONTENT, | |
440 history_info[i].danger_type); | |
441 items->at(i)->OnContentCheckCompleted(history_info[i].danger_type); | |
442 } | |
443 } | |
444 return true; | |
445 } | |
446 | |
447 void CreateSlowTestDownloads( | |
448 size_t count, DownloadManager::DownloadVector* items) { | |
449 for (size_t i = 0; i < count; ++i) { | |
450 scoped_ptr<content::DownloadTestObserver> observer( | |
451 CreateInProgressDownloadObserver(1)); | |
452 GURL slow_download_url(URLRequestSlowDownloadJob::kUnknownSizeUrl); | |
453 ui_test_utils::NavigateToURLWithDisposition( | |
454 current_browser(), slow_download_url, CURRENT_TAB, | |
455 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION); | |
456 observer->WaitForFinished(); | |
457 EXPECT_EQ( | |
458 1u, observer->NumDownloadsSeenInState(DownloadItem::IN_PROGRESS)); | |
459 } | |
460 GetCurrentManager()->GetAllDownloads(items); | |
461 ASSERT_EQ(count, items->size()); | |
462 } | |
463 | |
464 DownloadItem* CreateSlowTestDownload() { | |
465 scoped_ptr<content::DownloadTestObserver> observer( | |
466 CreateInProgressDownloadObserver(1)); | |
467 GURL slow_download_url(URLRequestSlowDownloadJob::kUnknownSizeUrl); | |
468 DownloadManager* manager = GetCurrentManager(); | |
469 | |
470 EXPECT_EQ(0, manager->InProgressCount()); | |
471 if (manager->InProgressCount() != 0) | |
472 return NULL; | |
473 | |
474 ui_test_utils::NavigateToURLWithDisposition( | |
475 current_browser(), slow_download_url, CURRENT_TAB, | |
476 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION); | |
477 | |
478 observer->WaitForFinished(); | |
479 EXPECT_EQ(1u, observer->NumDownloadsSeenInState(DownloadItem::IN_PROGRESS)); | |
480 | |
481 DownloadManager::DownloadVector items; | |
482 manager->GetAllDownloads(&items); | |
483 | |
484 DownloadItem* new_item = NULL; | |
485 for (DownloadManager::DownloadVector::iterator iter = items.begin(); | |
486 iter != items.end(); ++iter) { | |
487 if ((*iter)->GetState() == DownloadItem::IN_PROGRESS) { | |
488 // There should be only one IN_PROGRESS item. | |
489 EXPECT_EQ(NULL, new_item); | |
490 new_item = *iter; | |
491 } | |
492 } | |
493 return new_item; | |
494 } | |
495 | |
496 void FinishPendingSlowDownloads() { | |
497 scoped_ptr<content::DownloadTestObserver> observer( | |
498 CreateDownloadObserver(1)); | |
499 GURL finish_url(URLRequestSlowDownloadJob::kFinishDownloadUrl); | |
500 ui_test_utils::NavigateToURLWithDisposition( | |
501 current_browser(), finish_url, NEW_FOREGROUND_TAB, | |
502 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION); | |
503 observer->WaitForFinished(); | |
504 EXPECT_EQ(1u, observer->NumDownloadsSeenInState(DownloadItem::COMPLETE)); | |
505 } | |
506 | |
507 content::DownloadTestObserver* CreateDownloadObserver(size_t download_count) { | |
508 return new content::DownloadTestObserverTerminal( | |
509 GetCurrentManager(), download_count, | |
510 content::DownloadTestObserver::ON_DANGEROUS_DOWNLOAD_FAIL); | |
511 } | |
512 | |
513 content::DownloadTestObserver* CreateInProgressDownloadObserver( | |
514 size_t download_count) { | |
515 return new content::DownloadTestObserverInProgress( | |
516 GetCurrentManager(), download_count); | |
517 } | |
518 | |
519 bool RunFunction(UIThreadExtensionFunction* function, | |
520 const std::string& args) { | |
521 scoped_refptr<UIThreadExtensionFunction> delete_function(function); | |
522 SetUpExtensionFunction(function); | |
523 return extension_function_test_utils::RunFunction( | |
524 function, args, browser(), GetFlags()); | |
525 } | |
526 | |
527 extension_function_test_utils::RunFunctionFlags GetFlags() { | |
528 return current_browser()->profile()->IsOffTheRecord() ? | |
529 extension_function_test_utils::INCLUDE_INCOGNITO : | |
530 extension_function_test_utils::NONE; | |
531 } | |
532 | |
533 // extension_function_test_utils::RunFunction*() only uses browser for its | |
534 // profile(), so pass it the on-record browser so that it always uses the | |
535 // on-record profile to match real-life behavior. | |
536 | |
537 base::Value* RunFunctionAndReturnResult( | |
538 scoped_refptr<UIThreadExtensionFunction> function, | |
539 const std::string& args) { | |
540 SetUpExtensionFunction(function.get()); | |
541 return extension_function_test_utils::RunFunctionAndReturnSingleResult( | |
542 function.get(), args, browser(), GetFlags()); | |
543 } | |
544 | |
545 std::string RunFunctionAndReturnError( | |
546 scoped_refptr<UIThreadExtensionFunction> function, | |
547 const std::string& args) { | |
548 SetUpExtensionFunction(function.get()); | |
549 return extension_function_test_utils::RunFunctionAndReturnError( | |
550 function.get(), args, browser(), GetFlags()); | |
551 } | |
552 | |
553 bool RunFunctionAndReturnString( | |
554 scoped_refptr<UIThreadExtensionFunction> function, | |
555 const std::string& args, | |
556 std::string* result_string) { | |
557 SetUpExtensionFunction(function.get()); | |
558 scoped_ptr<base::Value> result(RunFunctionAndReturnResult(function, args)); | |
559 EXPECT_TRUE(result.get()); | |
560 return result.get() && result->GetAsString(result_string); | |
561 } | |
562 | |
563 std::string DownloadItemIdAsArgList(const DownloadItem* download_item) { | |
564 return base::StringPrintf("[%d]", download_item->GetId()); | |
565 } | |
566 | |
567 const base::FilePath& downloads_directory() { | |
568 return downloads_directory_.path(); | |
569 } | |
570 | |
571 DownloadsEventsListener* events_listener() { return events_listener_.get(); } | |
572 | |
573 private: | |
574 void SetUpExtensionFunction(UIThreadExtensionFunction* function) { | |
575 if (extension_) { | |
576 // Recreate the tab each time for insulation. | |
577 content::WebContents* tab = chrome::AddSelectedTabWithURL( | |
578 current_browser(), | |
579 extension_->GetResourceURL("empty.html"), | |
580 content::PAGE_TRANSITION_LINK); | |
581 function->set_extension(extension_); | |
582 function->SetRenderViewHost(tab->GetRenderViewHost()); | |
583 } | |
584 } | |
585 | |
586 void CreateAndSetDownloadsDirectory() { | |
587 ASSERT_TRUE(downloads_directory_.CreateUniqueTempDir()); | |
588 current_browser()->profile()->GetPrefs()->SetFilePath( | |
589 prefs::kDownloadDefaultDirectory, | |
590 downloads_directory_.path()); | |
591 } | |
592 | |
593 base::ScopedTempDir downloads_directory_; | |
594 const extensions::Extension* extension_; | |
595 Browser* incognito_browser_; | |
596 Browser* current_browser_; | |
597 scoped_ptr<DownloadsEventsListener> events_listener_; | |
598 | |
599 DISALLOW_COPY_AND_ASSIGN(DownloadExtensionTest); | |
600 }; | |
601 | |
602 class MockIconExtractorImpl : public DownloadFileIconExtractor { | |
603 public: | |
604 MockIconExtractorImpl(const base::FilePath& path, | |
605 IconLoader::IconSize icon_size, | |
606 const std::string& response) | |
607 : expected_path_(path), | |
608 expected_icon_size_(icon_size), | |
609 response_(response) { | |
610 } | |
611 virtual ~MockIconExtractorImpl() {} | |
612 | |
613 virtual bool ExtractIconURLForPath(const base::FilePath& path, | |
614 IconLoader::IconSize icon_size, | |
615 IconURLCallback callback) OVERRIDE { | |
616 EXPECT_STREQ(expected_path_.value().c_str(), path.value().c_str()); | |
617 EXPECT_EQ(expected_icon_size_, icon_size); | |
618 if (expected_path_ == path && | |
619 expected_icon_size_ == icon_size) { | |
620 callback_ = callback; | |
621 BrowserThread::PostTask( | |
622 BrowserThread::UI, FROM_HERE, | |
623 base::Bind(&MockIconExtractorImpl::RunCallback, | |
624 base::Unretained(this))); | |
625 return true; | |
626 } else { | |
627 return false; | |
628 } | |
629 } | |
630 | |
631 private: | |
632 void RunCallback() { | |
633 callback_.Run(response_); | |
634 } | |
635 | |
636 base::FilePath expected_path_; | |
637 IconLoader::IconSize expected_icon_size_; | |
638 std::string response_; | |
639 IconURLCallback callback_; | |
640 }; | |
641 | |
642 bool ItemNotInProgress(DownloadItem* item) { | |
643 return item->GetState() != DownloadItem::IN_PROGRESS; | |
644 } | |
645 | |
646 // Cancels the underlying DownloadItem when the ScopedCancellingItem goes out of | |
647 // scope. Like a scoped_ptr, but for DownloadItems. | |
648 class ScopedCancellingItem { | |
649 public: | |
650 explicit ScopedCancellingItem(DownloadItem* item) : item_(item) {} | |
651 ~ScopedCancellingItem() { | |
652 item_->Cancel(true); | |
653 content::DownloadUpdatedObserver observer( | |
654 item_, base::Bind(&ItemNotInProgress)); | |
655 observer.WaitForEvent(); | |
656 } | |
657 DownloadItem* get() { return item_; } | |
658 private: | |
659 DownloadItem* item_; | |
660 DISALLOW_COPY_AND_ASSIGN(ScopedCancellingItem); | |
661 }; | |
662 | |
663 // Cancels all the underlying DownloadItems when the ScopedItemVectorCanceller | |
664 // goes out of scope. Generalization of ScopedCancellingItem to many | |
665 // DownloadItems. | |
666 class ScopedItemVectorCanceller { | |
667 public: | |
668 explicit ScopedItemVectorCanceller(DownloadManager::DownloadVector* items) | |
669 : items_(items) { | |
670 } | |
671 ~ScopedItemVectorCanceller() { | |
672 for (DownloadManager::DownloadVector::const_iterator item = items_->begin(); | |
673 item != items_->end(); ++item) { | |
674 if ((*item)->GetState() == DownloadItem::IN_PROGRESS) | |
675 (*item)->Cancel(true); | |
676 content::DownloadUpdatedObserver observer( | |
677 (*item), base::Bind(&ItemNotInProgress)); | |
678 observer.WaitForEvent(); | |
679 } | |
680 } | |
681 | |
682 private: | |
683 DownloadManager::DownloadVector* items_; | |
684 DISALLOW_COPY_AND_ASSIGN(ScopedItemVectorCanceller); | |
685 }; | |
686 | |
687 class TestProtocolHandler : public net::URLRequestJobFactory::ProtocolHandler { | |
688 public: | |
689 explicit TestProtocolHandler( | |
690 webkit_blob::BlobStorageController* blob_storage_controller, | |
691 fileapi::FileSystemContext* file_system_context) | |
692 : blob_storage_controller_(blob_storage_controller), | |
693 file_system_context_(file_system_context) {} | |
694 | |
695 virtual ~TestProtocolHandler() {} | |
696 | |
697 virtual net::URLRequestJob* MaybeCreateJob( | |
698 net::URLRequest* request, | |
699 net::NetworkDelegate* network_delegate) const OVERRIDE { | |
700 return new webkit_blob::BlobURLRequestJob( | |
701 request, | |
702 network_delegate, | |
703 blob_storage_controller_->GetBlobDataFromUrl(request->url()), | |
704 file_system_context_, | |
705 base::MessageLoopProxy::current().get()); | |
706 } | |
707 | |
708 private: | |
709 webkit_blob::BlobStorageController* const blob_storage_controller_; | |
710 fileapi::FileSystemContext* const file_system_context_; | |
711 | |
712 DISALLOW_COPY_AND_ASSIGN(TestProtocolHandler); | |
713 }; | |
714 | |
715 class TestURLRequestContext : public net::URLRequestContext { | |
716 public: | |
717 explicit TestURLRequestContext( | |
718 fileapi::FileSystemContext* file_system_context) | |
719 : blob_storage_controller_(new webkit_blob::BlobStorageController) { | |
720 // Job factory owns the protocol handler. | |
721 job_factory_.SetProtocolHandler( | |
722 "blob", new TestProtocolHandler(blob_storage_controller_.get(), | |
723 file_system_context)); | |
724 set_job_factory(&job_factory_); | |
725 } | |
726 | |
727 virtual ~TestURLRequestContext() {} | |
728 | |
729 webkit_blob::BlobStorageController* blob_storage_controller() const { | |
730 return blob_storage_controller_.get(); | |
731 } | |
732 | |
733 private: | |
734 net::URLRequestJobFactoryImpl job_factory_; | |
735 scoped_ptr<webkit_blob::BlobStorageController> blob_storage_controller_; | |
736 | |
737 DISALLOW_COPY_AND_ASSIGN(TestURLRequestContext); | |
738 }; | |
739 | |
740 // Writes an HTML5 file so that it can be downloaded. | |
741 class HTML5FileWriter { | |
742 public: | |
743 HTML5FileWriter( | |
744 Profile* profile, | |
745 const std::string& filename, | |
746 const std::string& origin, | |
747 DownloadsEventsListener* events_listener, | |
748 const std::string& payload) | |
749 : profile_(profile), | |
750 filename_(filename), | |
751 origin_(origin), | |
752 events_listener_(events_listener), | |
753 blob_data_(new webkit_blob::BlobData()), | |
754 payload_(payload), | |
755 fs_(BrowserContext::GetDefaultStoragePartition(profile_)-> | |
756 GetFileSystemContext()) { | |
757 CHECK(profile_); | |
758 CHECK(events_listener_); | |
759 CHECK(fs_); | |
760 } | |
761 | |
762 ~HTML5FileWriter() { | |
763 CHECK(BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, base::Bind( | |
764 &HTML5FileWriter::TearDownURLRequestContext, base::Unretained(this)))); | |
765 events_listener_->WaitFor( | |
766 profile_, kURLRequestContextToreDown, std::string()); | |
767 } | |
768 | |
769 bool WriteFile() { | |
770 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
771 fs_->OpenFileSystem( | |
772 GURL(origin_), | |
773 fileapi::kFileSystemTypeTemporary, | |
774 fileapi::OPEN_FILE_SYSTEM_CREATE_IF_NONEXISTENT, | |
775 base::Bind(&HTML5FileWriter::OpenFileSystemCallback, | |
776 base::Unretained(this))); | |
777 return events_listener_->WaitFor(profile_, kHTML5FileWritten, filename_); | |
778 } | |
779 | |
780 private: | |
781 static const char kHTML5FileWritten[]; | |
782 static const char kURLRequestContextToreDown[]; | |
783 static const bool kExclusive = true; | |
784 | |
785 GURL blob_url() const { return GURL("blob:" + filename_); } | |
786 | |
787 void OpenFileSystemCallback( | |
788 base::PlatformFileError result, | |
789 const std::string& fs_name, | |
790 const GURL& root) { | |
791 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
792 root_ = root.spec(); | |
793 CHECK(BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, base::Bind( | |
794 &HTML5FileWriter::CreateFile, base::Unretained(this)))); | |
795 } | |
796 | |
797 fileapi::FileSystemOperationRunner* operation_runner() { | |
798 return fs_->operation_runner(); | |
799 } | |
800 | |
801 void CreateFile() { | |
802 CHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | |
803 operation_runner()->CreateFile(fs_->CrackURL(GURL(root_ + filename_)), | |
804 kExclusive, base::Bind( | |
805 &HTML5FileWriter::CreateFileCallback, base::Unretained(this))); | |
806 } | |
807 | |
808 void CreateFileCallback(base::PlatformFileError result) { | |
809 CHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | |
810 CHECK_EQ(base::PLATFORM_FILE_OK, result); | |
811 blob_data_->AppendData(payload_); | |
812 url_request_context_.reset(new TestURLRequestContext(fs_)); | |
813 url_request_context_->blob_storage_controller() | |
814 ->AddFinishedBlob(blob_url(), blob_data_.get()); | |
815 operation_runner()->Write( | |
816 url_request_context_.get(), | |
817 fs_->CrackURL(GURL(root_ + filename_)), | |
818 blob_url(), | |
819 0, // offset | |
820 base::Bind(&HTML5FileWriter::WriteCallback, base::Unretained(this))); | |
821 } | |
822 | |
823 void WriteCallback( | |
824 base::PlatformFileError result, | |
825 int64 bytes, | |
826 bool complete) { | |
827 CHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | |
828 CHECK_EQ(base::PLATFORM_FILE_OK, result); | |
829 CHECK(BrowserThread::PostTask(BrowserThread::UI, FROM_HERE, base::Bind( | |
830 &HTML5FileWriter::NotifyWritten, base::Unretained(this)))); | |
831 } | |
832 | |
833 void NotifyWritten() { | |
834 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
835 DownloadsEventsListener::DownloadsNotificationSource notification_source; | |
836 notification_source.event_name = kHTML5FileWritten; | |
837 notification_source.profile = profile_; | |
838 content::NotificationService::current()->Notify( | |
839 chrome::NOTIFICATION_EXTENSION_DOWNLOADS_EVENT, | |
840 content::Source<DownloadsEventsListener::DownloadsNotificationSource>( | |
841 ¬ification_source), | |
842 content::Details<std::string>(&filename_)); | |
843 } | |
844 | |
845 void TearDownURLRequestContext() { | |
846 CHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | |
847 url_request_context_->blob_storage_controller()->RemoveBlob(blob_url()); | |
848 url_request_context_.reset(); | |
849 CHECK(BrowserThread::PostTask(BrowserThread::UI, FROM_HERE, base::Bind( | |
850 &HTML5FileWriter::NotifyURLRequestContextToreDown, | |
851 base::Unretained(this)))); | |
852 } | |
853 | |
854 void NotifyURLRequestContextToreDown() { | |
855 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
856 DownloadsEventsListener::DownloadsNotificationSource notification_source; | |
857 notification_source.event_name = kURLRequestContextToreDown; | |
858 notification_source.profile = profile_; | |
859 std::string empty_args; | |
860 content::NotificationService::current()->Notify( | |
861 chrome::NOTIFICATION_EXTENSION_DOWNLOADS_EVENT, | |
862 content::Source<DownloadsEventsListener::DownloadsNotificationSource>( | |
863 ¬ification_source), | |
864 content::Details<std::string>(&empty_args)); | |
865 } | |
866 | |
867 Profile* profile_; | |
868 std::string filename_; | |
869 std::string origin_; | |
870 std::string root_; | |
871 DownloadsEventsListener* events_listener_; | |
872 scoped_refptr<webkit_blob::BlobData> blob_data_; | |
873 std::string payload_; | |
874 scoped_ptr<TestURLRequestContext> url_request_context_; | |
875 fileapi::FileSystemContext* fs_; | |
876 | |
877 DISALLOW_COPY_AND_ASSIGN(HTML5FileWriter); | |
878 }; | |
879 | |
880 const char HTML5FileWriter::kHTML5FileWritten[] = "html5_file_written"; | |
881 const char HTML5FileWriter::kURLRequestContextToreDown[] = | |
882 "url_request_context_tore_down"; | |
883 | |
884 // TODO(benjhayden) Merge this with the other TestObservers. | |
885 class JustInProgressDownloadObserver | |
886 : public content::DownloadTestObserverInProgress { | |
887 public: | |
888 JustInProgressDownloadObserver( | |
889 DownloadManager* download_manager, size_t wait_count) | |
890 : content::DownloadTestObserverInProgress(download_manager, wait_count) { | |
891 } | |
892 | |
893 virtual ~JustInProgressDownloadObserver() {} | |
894 | |
895 private: | |
896 virtual bool IsDownloadInFinalState(DownloadItem* item) OVERRIDE { | |
897 return item->GetState() == DownloadItem::IN_PROGRESS; | |
898 } | |
899 | |
900 DISALLOW_COPY_AND_ASSIGN(JustInProgressDownloadObserver); | |
901 }; | |
902 | |
903 bool ItemIsInterrupted(DownloadItem* item) { | |
904 return item->GetState() == DownloadItem::INTERRUPTED; | |
905 } | |
906 | |
907 } // namespace | |
908 | |
909 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
910 DownloadExtensionTest_Open) { | |
911 LoadExtension("downloads_split"); | |
912 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
913 RunFunctionAndReturnError( | |
914 new DownloadsOpenFunction(), | |
915 "[-42]").c_str()); | |
916 | |
917 DownloadItem* download_item = CreateSlowTestDownload(); | |
918 ASSERT_TRUE(download_item); | |
919 EXPECT_FALSE(download_item->GetOpened()); | |
920 EXPECT_FALSE(download_item->GetOpenWhenComplete()); | |
921 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
922 base::StringPrintf("[{\"danger\": \"safe\"," | |
923 " \"incognito\": false," | |
924 " \"mime\": \"application/octet-stream\"," | |
925 " \"paused\": false," | |
926 " \"url\": \"%s\"}]", | |
927 download_item->GetURL().spec().c_str()))); | |
928 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
929 RunFunctionAndReturnError( | |
930 new DownloadsOpenFunction(), | |
931 DownloadItemIdAsArgList(download_item)).c_str()); | |
932 | |
933 FinishPendingSlowDownloads(); | |
934 EXPECT_FALSE(download_item->GetOpened()); | |
935 EXPECT_TRUE(RunFunction(new DownloadsOpenFunction(), | |
936 DownloadItemIdAsArgList(download_item))); | |
937 EXPECT_TRUE(download_item->GetOpened()); | |
938 } | |
939 | |
940 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
941 DownloadExtensionTest_PauseResumeCancelErase) { | |
942 DownloadItem* download_item = CreateSlowTestDownload(); | |
943 ASSERT_TRUE(download_item); | |
944 | |
945 // Call pause(). It should succeed and the download should be paused on | |
946 // return. | |
947 EXPECT_TRUE(RunFunction(new DownloadsPauseFunction(), | |
948 DownloadItemIdAsArgList(download_item))); | |
949 EXPECT_TRUE(download_item->IsPaused()); | |
950 | |
951 // Calling pause() twice shouldn't be an error. | |
952 EXPECT_TRUE(RunFunction(new DownloadsPauseFunction(), | |
953 DownloadItemIdAsArgList(download_item))); | |
954 EXPECT_TRUE(download_item->IsPaused()); | |
955 | |
956 // Now try resuming this download. It should succeed. | |
957 EXPECT_TRUE(RunFunction(new DownloadsResumeFunction(), | |
958 DownloadItemIdAsArgList(download_item))); | |
959 EXPECT_FALSE(download_item->IsPaused()); | |
960 | |
961 // Resume again. Resuming a download that wasn't paused is not an error. | |
962 EXPECT_TRUE(RunFunction(new DownloadsResumeFunction(), | |
963 DownloadItemIdAsArgList(download_item))); | |
964 EXPECT_FALSE(download_item->IsPaused()); | |
965 | |
966 // Pause again. | |
967 EXPECT_TRUE(RunFunction(new DownloadsPauseFunction(), | |
968 DownloadItemIdAsArgList(download_item))); | |
969 EXPECT_TRUE(download_item->IsPaused()); | |
970 | |
971 // And now cancel. | |
972 EXPECT_TRUE(RunFunction(new DownloadsCancelFunction(), | |
973 DownloadItemIdAsArgList(download_item))); | |
974 EXPECT_EQ(DownloadItem::CANCELLED, download_item->GetState()); | |
975 | |
976 // Cancel again. Shouldn't have any effect. | |
977 EXPECT_TRUE(RunFunction(new DownloadsCancelFunction(), | |
978 DownloadItemIdAsArgList(download_item))); | |
979 EXPECT_EQ(DownloadItem::CANCELLED, download_item->GetState()); | |
980 | |
981 // Calling paused on a non-active download yields kInvalidOperationError. | |
982 std::string error = RunFunctionAndReturnError( | |
983 new DownloadsPauseFunction(), DownloadItemIdAsArgList(download_item)); | |
984 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
985 error.c_str()); | |
986 | |
987 // Calling resume on a non-active download yields kInvalidOperationError | |
988 error = RunFunctionAndReturnError( | |
989 new DownloadsResumeFunction(), DownloadItemIdAsArgList(download_item)); | |
990 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
991 error.c_str()); | |
992 | |
993 // Calling paused on a non-existent download yields kInvalidOperationError. | |
994 error = RunFunctionAndReturnError( | |
995 new DownloadsPauseFunction(), "[-42]"); | |
996 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
997 error.c_str()); | |
998 | |
999 // Calling resume on a non-existent download yields kInvalidOperationError | |
1000 error = RunFunctionAndReturnError( | |
1001 new DownloadsResumeFunction(), "[-42]"); | |
1002 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
1003 error.c_str()); | |
1004 | |
1005 int id = download_item->GetId(); | |
1006 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1007 new DownloadsEraseFunction(), | |
1008 base::StringPrintf("[{\"id\": %d}]", id))); | |
1009 DownloadManager::DownloadVector items; | |
1010 GetCurrentManager()->GetAllDownloads(&items); | |
1011 EXPECT_EQ(0UL, items.size()); | |
1012 ASSERT_TRUE(result); | |
1013 download_item = NULL; | |
1014 base::ListValue* result_list = NULL; | |
1015 ASSERT_TRUE(result->GetAsList(&result_list)); | |
1016 ASSERT_EQ(1UL, result_list->GetSize()); | |
1017 int element = -1; | |
1018 ASSERT_TRUE(result_list->GetInteger(0, &element)); | |
1019 EXPECT_EQ(id, element); | |
1020 } | |
1021 | |
1022 scoped_refptr<UIThreadExtensionFunction> MockedGetFileIconFunction( | |
1023 const base::FilePath& expected_path, | |
1024 IconLoader::IconSize icon_size, | |
1025 const std::string& response) { | |
1026 scoped_refptr<DownloadsGetFileIconFunction> function( | |
1027 new DownloadsGetFileIconFunction()); | |
1028 function->SetIconExtractorForTesting(new MockIconExtractorImpl( | |
1029 expected_path, icon_size, response)); | |
1030 return function; | |
1031 } | |
1032 | |
1033 // Test downloads.getFileIcon() on in-progress, finished, cancelled and deleted | |
1034 // download items. | |
1035 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1036 DownloadExtensionTest_FileIcon_Active) { | |
1037 DownloadItem* download_item = CreateSlowTestDownload(); | |
1038 ASSERT_TRUE(download_item); | |
1039 ASSERT_FALSE(download_item->GetTargetFilePath().empty()); | |
1040 std::string args32(base::StringPrintf("[%d, {\"size\": 32}]", | |
1041 download_item->GetId())); | |
1042 std::string result_string; | |
1043 | |
1044 // Get the icon for the in-progress download. This call should succeed even | |
1045 // if the file type isn't registered. | |
1046 // Test whether the correct path is being pased into the icon extractor. | |
1047 EXPECT_TRUE(RunFunctionAndReturnString(MockedGetFileIconFunction( | |
1048 download_item->GetTargetFilePath(), IconLoader::NORMAL, "foo"), | |
1049 base::StringPrintf("[%d, {}]", download_item->GetId()), &result_string)); | |
1050 | |
1051 // Now try a 16x16 icon. | |
1052 EXPECT_TRUE(RunFunctionAndReturnString(MockedGetFileIconFunction( | |
1053 download_item->GetTargetFilePath(), IconLoader::SMALL, "foo"), | |
1054 base::StringPrintf("[%d, {\"size\": 16}]", download_item->GetId()), | |
1055 &result_string)); | |
1056 | |
1057 // Explicitly asking for 32x32 should give us a 32x32 icon. | |
1058 EXPECT_TRUE(RunFunctionAndReturnString(MockedGetFileIconFunction( | |
1059 download_item->GetTargetFilePath(), IconLoader::NORMAL, "foo"), | |
1060 args32, &result_string)); | |
1061 | |
1062 // Finish the download and try again. | |
1063 FinishPendingSlowDownloads(); | |
1064 EXPECT_EQ(DownloadItem::COMPLETE, download_item->GetState()); | |
1065 EXPECT_TRUE(RunFunctionAndReturnString(MockedGetFileIconFunction( | |
1066 download_item->GetTargetFilePath(), IconLoader::NORMAL, "foo"), | |
1067 args32, &result_string)); | |
1068 | |
1069 // Check the path passed to the icon extractor post-completion. | |
1070 EXPECT_TRUE(RunFunctionAndReturnString(MockedGetFileIconFunction( | |
1071 download_item->GetTargetFilePath(), IconLoader::NORMAL, "foo"), | |
1072 args32, &result_string)); | |
1073 | |
1074 // Now create another download. | |
1075 download_item = CreateSlowTestDownload(); | |
1076 ASSERT_TRUE(download_item); | |
1077 ASSERT_FALSE(download_item->GetTargetFilePath().empty()); | |
1078 args32 = base::StringPrintf("[%d, {\"size\": 32}]", download_item->GetId()); | |
1079 | |
1080 // Cancel the download. As long as the download has a target path, we should | |
1081 // be able to query the file icon. | |
1082 download_item->Cancel(true); | |
1083 ASSERT_FALSE(download_item->GetTargetFilePath().empty()); | |
1084 // Let cleanup complete on the FILE thread. | |
1085 content::RunAllPendingInMessageLoop(BrowserThread::FILE); | |
1086 // Check the path passed to the icon extractor post-cancellation. | |
1087 EXPECT_TRUE(RunFunctionAndReturnString(MockedGetFileIconFunction( | |
1088 download_item->GetTargetFilePath(), IconLoader::NORMAL, "foo"), | |
1089 args32, | |
1090 &result_string)); | |
1091 | |
1092 // Simulate an error during icon load by invoking the mock with an empty | |
1093 // result string. | |
1094 std::string error = RunFunctionAndReturnError( | |
1095 MockedGetFileIconFunction(download_item->GetTargetFilePath(), | |
1096 IconLoader::NORMAL, | |
1097 std::string()), | |
1098 args32); | |
1099 EXPECT_STREQ(download_extension_errors::kIconNotFoundError, error.c_str()); | |
1100 | |
1101 // Once the download item is deleted, we should return kInvalidOperationError. | |
1102 int id = download_item->GetId(); | |
1103 download_item->Remove(); | |
1104 download_item = NULL; | |
1105 EXPECT_EQ(static_cast<DownloadItem*>(NULL), | |
1106 GetCurrentManager()->GetDownload(id)); | |
1107 error = RunFunctionAndReturnError(new DownloadsGetFileIconFunction(), args32); | |
1108 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
1109 error.c_str()); | |
1110 } | |
1111 | |
1112 // Test that we can acquire file icons for history downloads regardless of | |
1113 // whether they exist or not. If the file doesn't exist we should receive a | |
1114 // generic icon from the OS/toolkit that may or may not be specific to the file | |
1115 // type. | |
1116 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1117 DownloadExtensionTest_FileIcon_History) { | |
1118 const HistoryDownloadInfo kHistoryInfo[] = { | |
1119 { FILE_PATH_LITERAL("real.txt"), | |
1120 DownloadItem::COMPLETE, | |
1121 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS }, | |
1122 { FILE_PATH_LITERAL("fake.txt"), | |
1123 DownloadItem::COMPLETE, | |
1124 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS } | |
1125 }; | |
1126 DownloadManager::DownloadVector all_downloads; | |
1127 ASSERT_TRUE(CreateHistoryDownloads(kHistoryInfo, arraysize(kHistoryInfo), | |
1128 &all_downloads)); | |
1129 | |
1130 base::FilePath real_path = all_downloads[0]->GetTargetFilePath(); | |
1131 base::FilePath fake_path = all_downloads[1]->GetTargetFilePath(); | |
1132 | |
1133 EXPECT_EQ(0, file_util::WriteFile(real_path, "", 0)); | |
1134 ASSERT_TRUE(base::PathExists(real_path)); | |
1135 ASSERT_FALSE(base::PathExists(fake_path)); | |
1136 | |
1137 for (DownloadManager::DownloadVector::iterator iter = all_downloads.begin(); | |
1138 iter != all_downloads.end(); | |
1139 ++iter) { | |
1140 std::string result_string; | |
1141 // Use a MockIconExtractorImpl to test if the correct path is being passed | |
1142 // into the DownloadFileIconExtractor. | |
1143 EXPECT_TRUE(RunFunctionAndReturnString(MockedGetFileIconFunction( | |
1144 (*iter)->GetTargetFilePath(), IconLoader::NORMAL, "hello"), | |
1145 base::StringPrintf("[%d, {\"size\": 32}]", (*iter)->GetId()), | |
1146 &result_string)); | |
1147 EXPECT_STREQ("hello", result_string.c_str()); | |
1148 } | |
1149 | |
1150 // The temporary files should be cleaned up when the base::ScopedTempDir is re
moved. | |
1151 } | |
1152 | |
1153 // Test passing the empty query to search(). | |
1154 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1155 DownloadExtensionTest_SearchEmptyQuery) { | |
1156 ScopedCancellingItem item(CreateSlowTestDownload()); | |
1157 ASSERT_TRUE(item.get()); | |
1158 | |
1159 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1160 new DownloadsSearchFunction(), "[{}]")); | |
1161 ASSERT_TRUE(result.get()); | |
1162 base::ListValue* result_list = NULL; | |
1163 ASSERT_TRUE(result->GetAsList(&result_list)); | |
1164 ASSERT_EQ(1UL, result_list->GetSize()); | |
1165 } | |
1166 | |
1167 // Test the |filenameRegex| parameter for search(). | |
1168 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1169 DownloadExtensionTest_SearchFilenameRegex) { | |
1170 const HistoryDownloadInfo kHistoryInfo[] = { | |
1171 { FILE_PATH_LITERAL("foobar"), | |
1172 DownloadItem::COMPLETE, | |
1173 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS }, | |
1174 { FILE_PATH_LITERAL("baz"), | |
1175 DownloadItem::COMPLETE, | |
1176 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS } | |
1177 }; | |
1178 DownloadManager::DownloadVector all_downloads; | |
1179 ASSERT_TRUE(CreateHistoryDownloads(kHistoryInfo, arraysize(kHistoryInfo), | |
1180 &all_downloads)); | |
1181 | |
1182 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1183 new DownloadsSearchFunction(), "[{\"filenameRegex\": \"foobar\"}]")); | |
1184 ASSERT_TRUE(result.get()); | |
1185 base::ListValue* result_list = NULL; | |
1186 ASSERT_TRUE(result->GetAsList(&result_list)); | |
1187 ASSERT_EQ(1UL, result_list->GetSize()); | |
1188 base::DictionaryValue* item_value = NULL; | |
1189 ASSERT_TRUE(result_list->GetDictionary(0, &item_value)); | |
1190 int item_id = -1; | |
1191 ASSERT_TRUE(item_value->GetInteger("id", &item_id)); | |
1192 ASSERT_EQ(all_downloads[0]->GetId(), static_cast<uint32>(item_id)); | |
1193 } | |
1194 | |
1195 // Test the |id| parameter for search(). | |
1196 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, DownloadExtensionTest_SearchId) { | |
1197 DownloadManager::DownloadVector items; | |
1198 CreateSlowTestDownloads(2, &items); | |
1199 ScopedItemVectorCanceller delete_items(&items); | |
1200 | |
1201 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1202 new DownloadsSearchFunction(), base::StringPrintf( | |
1203 "[{\"id\": %u}]", items[0]->GetId()))); | |
1204 ASSERT_TRUE(result.get()); | |
1205 base::ListValue* result_list = NULL; | |
1206 ASSERT_TRUE(result->GetAsList(&result_list)); | |
1207 ASSERT_EQ(1UL, result_list->GetSize()); | |
1208 base::DictionaryValue* item_value = NULL; | |
1209 ASSERT_TRUE(result_list->GetDictionary(0, &item_value)); | |
1210 int item_id = -1; | |
1211 ASSERT_TRUE(item_value->GetInteger("id", &item_id)); | |
1212 ASSERT_EQ(items[0]->GetId(), static_cast<uint32>(item_id)); | |
1213 } | |
1214 | |
1215 // Test specifying both the |id| and |filename| parameters for search(). | |
1216 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1217 DownloadExtensionTest_SearchIdAndFilename) { | |
1218 DownloadManager::DownloadVector items; | |
1219 CreateSlowTestDownloads(2, &items); | |
1220 ScopedItemVectorCanceller delete_items(&items); | |
1221 | |
1222 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1223 new DownloadsSearchFunction(), | |
1224 "[{\"id\": 0, \"filename\": \"foobar\"}]")); | |
1225 ASSERT_TRUE(result.get()); | |
1226 base::ListValue* result_list = NULL; | |
1227 ASSERT_TRUE(result->GetAsList(&result_list)); | |
1228 ASSERT_EQ(0UL, result_list->GetSize()); | |
1229 } | |
1230 | |
1231 // Test a single |orderBy| parameter for search(). | |
1232 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1233 DownloadExtensionTest_SearchOrderBy) { | |
1234 const HistoryDownloadInfo kHistoryInfo[] = { | |
1235 { FILE_PATH_LITERAL("zzz"), | |
1236 DownloadItem::COMPLETE, | |
1237 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS }, | |
1238 { FILE_PATH_LITERAL("baz"), | |
1239 DownloadItem::COMPLETE, | |
1240 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS } | |
1241 }; | |
1242 DownloadManager::DownloadVector items; | |
1243 ASSERT_TRUE(CreateHistoryDownloads(kHistoryInfo, arraysize(kHistoryInfo), | |
1244 &items)); | |
1245 | |
1246 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1247 new DownloadsSearchFunction(), "[{\"orderBy\": \"filename\"}]")); | |
1248 ASSERT_TRUE(result.get()); | |
1249 base::ListValue* result_list = NULL; | |
1250 ASSERT_TRUE(result->GetAsList(&result_list)); | |
1251 ASSERT_EQ(2UL, result_list->GetSize()); | |
1252 base::DictionaryValue* item0_value = NULL; | |
1253 base::DictionaryValue* item1_value = NULL; | |
1254 ASSERT_TRUE(result_list->GetDictionary(0, &item0_value)); | |
1255 ASSERT_TRUE(result_list->GetDictionary(1, &item1_value)); | |
1256 std::string item0_name, item1_name; | |
1257 ASSERT_TRUE(item0_value->GetString("filename", &item0_name)); | |
1258 ASSERT_TRUE(item1_value->GetString("filename", &item1_name)); | |
1259 ASSERT_GT(items[0]->GetTargetFilePath().value(), | |
1260 items[1]->GetTargetFilePath().value()); | |
1261 ASSERT_LT(item0_name, item1_name); | |
1262 } | |
1263 | |
1264 // Test specifying an empty |orderBy| parameter for search(). | |
1265 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1266 DownloadExtensionTest_SearchOrderByEmpty) { | |
1267 const HistoryDownloadInfo kHistoryInfo[] = { | |
1268 { FILE_PATH_LITERAL("zzz"), | |
1269 DownloadItem::COMPLETE, | |
1270 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS }, | |
1271 { FILE_PATH_LITERAL("baz"), | |
1272 DownloadItem::COMPLETE, | |
1273 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS } | |
1274 }; | |
1275 DownloadManager::DownloadVector items; | |
1276 ASSERT_TRUE(CreateHistoryDownloads(kHistoryInfo, arraysize(kHistoryInfo), | |
1277 &items)); | |
1278 | |
1279 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1280 new DownloadsSearchFunction(), "[{\"orderBy\": \"\"}]")); | |
1281 ASSERT_TRUE(result.get()); | |
1282 base::ListValue* result_list = NULL; | |
1283 ASSERT_TRUE(result->GetAsList(&result_list)); | |
1284 ASSERT_EQ(2UL, result_list->GetSize()); | |
1285 base::DictionaryValue* item0_value = NULL; | |
1286 base::DictionaryValue* item1_value = NULL; | |
1287 ASSERT_TRUE(result_list->GetDictionary(0, &item0_value)); | |
1288 ASSERT_TRUE(result_list->GetDictionary(1, &item1_value)); | |
1289 std::string item0_name, item1_name; | |
1290 ASSERT_TRUE(item0_value->GetString("filename", &item0_name)); | |
1291 ASSERT_TRUE(item1_value->GetString("filename", &item1_name)); | |
1292 ASSERT_GT(items[0]->GetTargetFilePath().value(), | |
1293 items[1]->GetTargetFilePath().value()); | |
1294 ASSERT_GT(item0_name, item1_name); | |
1295 } | |
1296 | |
1297 // Test the |danger| option for search(). | |
1298 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1299 DownloadExtensionTest_SearchDanger) { | |
1300 const HistoryDownloadInfo kHistoryInfo[] = { | |
1301 { FILE_PATH_LITERAL("zzz"), | |
1302 DownloadItem::COMPLETE, | |
1303 content::DOWNLOAD_DANGER_TYPE_DANGEROUS_CONTENT }, | |
1304 { FILE_PATH_LITERAL("baz"), | |
1305 DownloadItem::COMPLETE, | |
1306 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS } | |
1307 }; | |
1308 DownloadManager::DownloadVector items; | |
1309 ASSERT_TRUE(CreateHistoryDownloads(kHistoryInfo, arraysize(kHistoryInfo), | |
1310 &items)); | |
1311 | |
1312 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1313 new DownloadsSearchFunction(), "[{\"danger\": \"content\"}]")); | |
1314 ASSERT_TRUE(result.get()); | |
1315 base::ListValue* result_list = NULL; | |
1316 ASSERT_TRUE(result->GetAsList(&result_list)); | |
1317 ASSERT_EQ(1UL, result_list->GetSize()); | |
1318 } | |
1319 | |
1320 // Test the |state| option for search(). | |
1321 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1322 DownloadExtensionTest_SearchState) { | |
1323 DownloadManager::DownloadVector items; | |
1324 CreateSlowTestDownloads(2, &items); | |
1325 ScopedItemVectorCanceller delete_items(&items); | |
1326 | |
1327 items[0]->Cancel(true); | |
1328 | |
1329 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1330 new DownloadsSearchFunction(), "[{\"state\": \"in_progress\"}]")); | |
1331 ASSERT_TRUE(result.get()); | |
1332 base::ListValue* result_list = NULL; | |
1333 ASSERT_TRUE(result->GetAsList(&result_list)); | |
1334 ASSERT_EQ(1UL, result_list->GetSize()); | |
1335 } | |
1336 | |
1337 // Test the |limit| option for search(). | |
1338 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1339 DownloadExtensionTest_SearchLimit) { | |
1340 DownloadManager::DownloadVector items; | |
1341 CreateSlowTestDownloads(2, &items); | |
1342 ScopedItemVectorCanceller delete_items(&items); | |
1343 | |
1344 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1345 new DownloadsSearchFunction(), "[{\"limit\": 1}]")); | |
1346 ASSERT_TRUE(result.get()); | |
1347 base::ListValue* result_list = NULL; | |
1348 ASSERT_TRUE(result->GetAsList(&result_list)); | |
1349 ASSERT_EQ(1UL, result_list->GetSize()); | |
1350 } | |
1351 | |
1352 // Test invalid search parameters. | |
1353 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1354 DownloadExtensionTest_SearchInvalid) { | |
1355 std::string error = RunFunctionAndReturnError( | |
1356 new DownloadsSearchFunction(), "[{\"filenameRegex\": \"(\"}]"); | |
1357 EXPECT_STREQ(download_extension_errors::kInvalidFilterError, | |
1358 error.c_str()); | |
1359 error = RunFunctionAndReturnError( | |
1360 new DownloadsSearchFunction(), "[{\"orderBy\": \"goat\"}]"); | |
1361 EXPECT_STREQ(download_extension_errors::kInvalidOrderByError, | |
1362 error.c_str()); | |
1363 error = RunFunctionAndReturnError( | |
1364 new DownloadsSearchFunction(), "[{\"limit\": -1}]"); | |
1365 EXPECT_STREQ(download_extension_errors::kInvalidQueryLimit, | |
1366 error.c_str()); | |
1367 } | |
1368 | |
1369 // Test searching using multiple conditions through multiple downloads. | |
1370 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1371 DownloadExtensionTest_SearchPlural) { | |
1372 const HistoryDownloadInfo kHistoryInfo[] = { | |
1373 { FILE_PATH_LITERAL("aaa"), | |
1374 DownloadItem::CANCELLED, | |
1375 content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS }, | |
1376 { FILE_PATH_LITERAL("zzz"), | |
1377 DownloadItem::COMPLETE, | |
1378 content::DOWNLOAD_DANGER_TYPE_DANGEROUS_CONTENT }, | |
1379 { FILE_PATH_LITERAL("baz"), | |
1380 DownloadItem::COMPLETE, | |
1381 content::DOWNLOAD_DANGER_TYPE_DANGEROUS_CONTENT }, | |
1382 }; | |
1383 DownloadManager::DownloadVector items; | |
1384 ASSERT_TRUE(CreateHistoryDownloads(kHistoryInfo, arraysize(kHistoryInfo), | |
1385 &items)); | |
1386 | |
1387 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1388 new DownloadsSearchFunction(), "[{" | |
1389 "\"state\": \"complete\", " | |
1390 "\"danger\": \"content\", " | |
1391 "\"orderBy\": \"filename\", " | |
1392 "\"limit\": 1}]")); | |
1393 ASSERT_TRUE(result.get()); | |
1394 base::ListValue* result_list = NULL; | |
1395 ASSERT_TRUE(result->GetAsList(&result_list)); | |
1396 ASSERT_EQ(1UL, result_list->GetSize()); | |
1397 base::DictionaryValue* item_value = NULL; | |
1398 ASSERT_TRUE(result_list->GetDictionary(0, &item_value)); | |
1399 base::FilePath::StringType item_name; | |
1400 ASSERT_TRUE(item_value->GetString("filename", &item_name)); | |
1401 ASSERT_EQ(items[2]->GetTargetFilePath().value(), item_name); | |
1402 } | |
1403 | |
1404 // Test that incognito downloads are only visible in incognito contexts, and | |
1405 // test that on-record downloads are visible in both incognito and on-record | |
1406 // contexts, for DownloadsSearchFunction, DownloadsPauseFunction, | |
1407 // DownloadsResumeFunction, and DownloadsCancelFunction. | |
1408 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1409 DownloadExtensionTest_SearchPauseResumeCancelGetFileIconIncognito) { | |
1410 scoped_ptr<base::Value> result_value; | |
1411 base::ListValue* result_list = NULL; | |
1412 base::DictionaryValue* result_dict = NULL; | |
1413 base::FilePath::StringType filename; | |
1414 bool is_incognito = false; | |
1415 std::string error; | |
1416 std::string on_item_arg; | |
1417 std::string off_item_arg; | |
1418 std::string result_string; | |
1419 | |
1420 // Set up one on-record item and one off-record item. | |
1421 // Set up the off-record item first because otherwise there are mysteriously 3 | |
1422 // items total instead of 2. | |
1423 // TODO(benjhayden): Figure out where the third item comes from. | |
1424 GoOffTheRecord(); | |
1425 DownloadItem* off_item = CreateSlowTestDownload(); | |
1426 ASSERT_TRUE(off_item); | |
1427 off_item_arg = DownloadItemIdAsArgList(off_item); | |
1428 | |
1429 GoOnTheRecord(); | |
1430 DownloadItem* on_item = CreateSlowTestDownload(); | |
1431 ASSERT_TRUE(on_item); | |
1432 on_item_arg = DownloadItemIdAsArgList(on_item); | |
1433 ASSERT_TRUE(on_item->GetTargetFilePath() != off_item->GetTargetFilePath()); | |
1434 | |
1435 // Extensions running in the incognito window should have access to both | |
1436 // items because the Test extension is in spanning mode. | |
1437 GoOffTheRecord(); | |
1438 result_value.reset(RunFunctionAndReturnResult( | |
1439 new DownloadsSearchFunction(), "[{}]")); | |
1440 ASSERT_TRUE(result_value.get()); | |
1441 ASSERT_TRUE(result_value->GetAsList(&result_list)); | |
1442 ASSERT_EQ(2UL, result_list->GetSize()); | |
1443 ASSERT_TRUE(result_list->GetDictionary(0, &result_dict)); | |
1444 ASSERT_TRUE(result_dict->GetString("filename", &filename)); | |
1445 ASSERT_TRUE(result_dict->GetBoolean("incognito", &is_incognito)); | |
1446 EXPECT_TRUE(on_item->GetTargetFilePath() == base::FilePath(filename)); | |
1447 EXPECT_FALSE(is_incognito); | |
1448 ASSERT_TRUE(result_list->GetDictionary(1, &result_dict)); | |
1449 ASSERT_TRUE(result_dict->GetString("filename", &filename)); | |
1450 ASSERT_TRUE(result_dict->GetBoolean("incognito", &is_incognito)); | |
1451 EXPECT_TRUE(off_item->GetTargetFilePath() == base::FilePath(filename)); | |
1452 EXPECT_TRUE(is_incognito); | |
1453 | |
1454 // Extensions running in the on-record window should have access only to the | |
1455 // on-record item. | |
1456 GoOnTheRecord(); | |
1457 result_value.reset(RunFunctionAndReturnResult( | |
1458 new DownloadsSearchFunction(), "[{}]")); | |
1459 ASSERT_TRUE(result_value.get()); | |
1460 ASSERT_TRUE(result_value->GetAsList(&result_list)); | |
1461 ASSERT_EQ(1UL, result_list->GetSize()); | |
1462 ASSERT_TRUE(result_list->GetDictionary(0, &result_dict)); | |
1463 ASSERT_TRUE(result_dict->GetString("filename", &filename)); | |
1464 EXPECT_TRUE(on_item->GetTargetFilePath() == base::FilePath(filename)); | |
1465 ASSERT_TRUE(result_dict->GetBoolean("incognito", &is_incognito)); | |
1466 EXPECT_FALSE(is_incognito); | |
1467 | |
1468 // Pausing/Resuming the off-record item while on the record should return an | |
1469 // error. Cancelling "non-existent" downloads is not an error. | |
1470 error = RunFunctionAndReturnError(new DownloadsPauseFunction(), off_item_arg); | |
1471 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
1472 error.c_str()); | |
1473 error = RunFunctionAndReturnError(new DownloadsResumeFunction(), | |
1474 off_item_arg); | |
1475 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
1476 error.c_str()); | |
1477 error = RunFunctionAndReturnError( | |
1478 new DownloadsGetFileIconFunction(), | |
1479 base::StringPrintf("[%d, {}]", off_item->GetId())); | |
1480 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
1481 error.c_str()); | |
1482 | |
1483 GoOffTheRecord(); | |
1484 | |
1485 // Do the FileIcon test for both the on- and off-items while off the record. | |
1486 // NOTE(benjhayden): This does not include the FileIcon test from history, | |
1487 // just active downloads. This shouldn't be a problem. | |
1488 EXPECT_TRUE(RunFunctionAndReturnString(MockedGetFileIconFunction( | |
1489 on_item->GetTargetFilePath(), IconLoader::NORMAL, "foo"), | |
1490 base::StringPrintf("[%d, {}]", on_item->GetId()), &result_string)); | |
1491 EXPECT_TRUE(RunFunctionAndReturnString(MockedGetFileIconFunction( | |
1492 off_item->GetTargetFilePath(), IconLoader::NORMAL, "foo"), | |
1493 base::StringPrintf("[%d, {}]", off_item->GetId()), &result_string)); | |
1494 | |
1495 // Do the pause/resume/cancel test for both the on- and off-items while off | |
1496 // the record. | |
1497 EXPECT_TRUE(RunFunction(new DownloadsPauseFunction(), on_item_arg)); | |
1498 EXPECT_TRUE(on_item->IsPaused()); | |
1499 EXPECT_TRUE(RunFunction(new DownloadsPauseFunction(), on_item_arg)); | |
1500 EXPECT_TRUE(on_item->IsPaused()); | |
1501 EXPECT_TRUE(RunFunction(new DownloadsResumeFunction(), on_item_arg)); | |
1502 EXPECT_FALSE(on_item->IsPaused()); | |
1503 EXPECT_TRUE(RunFunction(new DownloadsResumeFunction(), on_item_arg)); | |
1504 EXPECT_FALSE(on_item->IsPaused()); | |
1505 EXPECT_TRUE(RunFunction(new DownloadsPauseFunction(), on_item_arg)); | |
1506 EXPECT_TRUE(on_item->IsPaused()); | |
1507 EXPECT_TRUE(RunFunction(new DownloadsCancelFunction(), on_item_arg)); | |
1508 EXPECT_EQ(DownloadItem::CANCELLED, on_item->GetState()); | |
1509 EXPECT_TRUE(RunFunction(new DownloadsCancelFunction(), on_item_arg)); | |
1510 EXPECT_EQ(DownloadItem::CANCELLED, on_item->GetState()); | |
1511 error = RunFunctionAndReturnError(new DownloadsPauseFunction(), on_item_arg); | |
1512 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
1513 error.c_str()); | |
1514 error = RunFunctionAndReturnError(new DownloadsResumeFunction(), on_item_arg); | |
1515 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
1516 error.c_str()); | |
1517 EXPECT_TRUE(RunFunction(new DownloadsPauseFunction(), off_item_arg)); | |
1518 EXPECT_TRUE(off_item->IsPaused()); | |
1519 EXPECT_TRUE(RunFunction(new DownloadsPauseFunction(), off_item_arg)); | |
1520 EXPECT_TRUE(off_item->IsPaused()); | |
1521 EXPECT_TRUE(RunFunction(new DownloadsResumeFunction(), off_item_arg)); | |
1522 EXPECT_FALSE(off_item->IsPaused()); | |
1523 EXPECT_TRUE(RunFunction(new DownloadsResumeFunction(), off_item_arg)); | |
1524 EXPECT_FALSE(off_item->IsPaused()); | |
1525 EXPECT_TRUE(RunFunction(new DownloadsPauseFunction(), off_item_arg)); | |
1526 EXPECT_TRUE(off_item->IsPaused()); | |
1527 EXPECT_TRUE(RunFunction(new DownloadsCancelFunction(), off_item_arg)); | |
1528 EXPECT_EQ(DownloadItem::CANCELLED, off_item->GetState()); | |
1529 EXPECT_TRUE(RunFunction(new DownloadsCancelFunction(), off_item_arg)); | |
1530 EXPECT_EQ(DownloadItem::CANCELLED, off_item->GetState()); | |
1531 error = RunFunctionAndReturnError(new DownloadsPauseFunction(), | |
1532 off_item_arg); | |
1533 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
1534 error.c_str()); | |
1535 error = RunFunctionAndReturnError(new DownloadsResumeFunction(), | |
1536 off_item_arg); | |
1537 EXPECT_STREQ(download_extension_errors::kInvalidOperationError, | |
1538 error.c_str()); | |
1539 } | |
1540 | |
1541 // Test that we can start a download and that the correct sequence of events is | |
1542 // fired for it. | |
1543 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1544 DownloadExtensionTest_Download_Basic) { | |
1545 LoadExtension("downloads_split"); | |
1546 ASSERT_TRUE(StartEmbeddedTestServer()); | |
1547 ASSERT_TRUE(test_server()->Start()); | |
1548 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
1549 GoOnTheRecord(); | |
1550 | |
1551 // Start downloading a file. | |
1552 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1553 new DownloadsDownloadFunction(), base::StringPrintf( | |
1554 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
1555 ASSERT_TRUE(result.get()); | |
1556 int result_id = -1; | |
1557 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
1558 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
1559 ASSERT_TRUE(item); | |
1560 ScopedCancellingItem canceller(item); | |
1561 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
1562 | |
1563 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
1564 base::StringPrintf("[{\"danger\": \"safe\"," | |
1565 " \"incognito\": false," | |
1566 " \"mime\": \"text/plain\"," | |
1567 " \"paused\": false," | |
1568 " \"url\": \"%s\"}]", | |
1569 download_url.c_str()))); | |
1570 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
1571 base::StringPrintf("[{\"id\": %d," | |
1572 " \"filename\": {" | |
1573 " \"previous\": \"\"," | |
1574 " \"current\": \"%s\"}}]", | |
1575 result_id, | |
1576 GetFilename("slow.txt").c_str()))); | |
1577 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
1578 base::StringPrintf("[{\"id\": %d," | |
1579 " \"state\": {" | |
1580 " \"previous\": \"in_progress\"," | |
1581 " \"current\": \"complete\"}}]", | |
1582 result_id))); | |
1583 } | |
1584 | |
1585 // Test that we can start a download from an incognito context, and that the | |
1586 // download knows that it's incognito. | |
1587 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1588 DownloadExtensionTest_Download_Incognito) { | |
1589 LoadExtension("downloads_split"); | |
1590 ASSERT_TRUE(StartEmbeddedTestServer()); | |
1591 ASSERT_TRUE(test_server()->Start()); | |
1592 GoOffTheRecord(); | |
1593 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
1594 | |
1595 // Start downloading a file. | |
1596 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1597 new DownloadsDownloadFunction(), base::StringPrintf( | |
1598 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
1599 ASSERT_TRUE(result.get()); | |
1600 int result_id = -1; | |
1601 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
1602 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
1603 ASSERT_TRUE(item); | |
1604 ScopedCancellingItem canceller(item); | |
1605 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
1606 | |
1607 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
1608 base::StringPrintf("[{\"danger\": \"safe\"," | |
1609 " \"incognito\": true," | |
1610 " \"mime\": \"text/plain\"," | |
1611 " \"paused\": false," | |
1612 " \"url\": \"%s\"}]", | |
1613 download_url.c_str()))); | |
1614 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
1615 base::StringPrintf("[{\"id\":%d," | |
1616 " \"filename\": {" | |
1617 " \"previous\": \"\"," | |
1618 " \"current\": \"%s\"}}]", | |
1619 result_id, | |
1620 GetFilename("slow.txt").c_str()))); | |
1621 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
1622 base::StringPrintf("[{\"id\":%d," | |
1623 " \"state\": {" | |
1624 " \"current\": \"complete\"," | |
1625 " \"previous\": \"in_progress\"}}]", | |
1626 result_id))); | |
1627 } | |
1628 | |
1629 #if defined(OS_WIN) && defined(USE_AURA) | |
1630 // This test is very flaky on Win Aura. http://crbug.com/248438 | |
1631 #define MAYBE_DownloadExtensionTest_Download_UnsafeHeaders \ | |
1632 DISABLED_DownloadExtensionTest_Download_UnsafeHeaders | |
1633 #else | |
1634 #define MAYBE_DownloadExtensionTest_Download_UnsafeHeaders \ | |
1635 DownloadExtensionTest_Download_UnsafeHeaders | |
1636 #endif | |
1637 | |
1638 // Test that we disallow certain headers case-insensitively. | |
1639 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1640 MAYBE_DownloadExtensionTest_Download_UnsafeHeaders) { | |
1641 LoadExtension("downloads_split"); | |
1642 ASSERT_TRUE(StartEmbeddedTestServer()); | |
1643 ASSERT_TRUE(test_server()->Start()); | |
1644 GoOnTheRecord(); | |
1645 | |
1646 static const char* kUnsafeHeaders[] = { | |
1647 "Accept-chArsEt", | |
1648 "accept-eNcoding", | |
1649 "coNNection", | |
1650 "coNteNt-leNgth", | |
1651 "cooKIE", | |
1652 "cOOkie2", | |
1653 "coNteNt-traNsfer-eNcodiNg", | |
1654 "dAtE", | |
1655 "ExpEcT", | |
1656 "hOsT", | |
1657 "kEEp-aLivE", | |
1658 "rEfErEr", | |
1659 "tE", | |
1660 "trAilER", | |
1661 "trANsfer-eNcodiNg", | |
1662 "upGRAde", | |
1663 "usER-agENt", | |
1664 "viA", | |
1665 "pRoxY-", | |
1666 "sEc-", | |
1667 "pRoxY-probably-not-evil", | |
1668 "sEc-probably-not-evil", | |
1669 "oRiGiN", | |
1670 "Access-Control-Request-Headers", | |
1671 "Access-Control-Request-Method", | |
1672 }; | |
1673 | |
1674 for (size_t index = 0; index < arraysize(kUnsafeHeaders); ++index) { | |
1675 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
1676 EXPECT_STREQ(download_extension_errors::kGenericError, | |
1677 RunFunctionAndReturnError(new DownloadsDownloadFunction(), | |
1678 base::StringPrintf( | |
1679 "[{\"url\": \"%s\"," | |
1680 " \"filename\": \"unsafe-header-%d.txt\"," | |
1681 " \"headers\": [{" | |
1682 " \"name\": \"%s\"," | |
1683 " \"value\": \"unsafe\"}]}]", | |
1684 download_url.c_str(), | |
1685 static_cast<int>(index), | |
1686 kUnsafeHeaders[index])).c_str()); | |
1687 } | |
1688 } | |
1689 | |
1690 // Test that subdirectories (slashes) are disallowed in filenames. | |
1691 // TODO(benjhayden) Update this when subdirectories are supported. | |
1692 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1693 DownloadExtensionTest_Download_Subdirectory) { | |
1694 LoadExtension("downloads_split"); | |
1695 ASSERT_TRUE(StartEmbeddedTestServer()); | |
1696 ASSERT_TRUE(test_server()->Start()); | |
1697 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
1698 GoOnTheRecord(); | |
1699 | |
1700 EXPECT_STREQ(download_extension_errors::kInvalidFilenameError, | |
1701 RunFunctionAndReturnError(new DownloadsDownloadFunction(), | |
1702 base::StringPrintf( | |
1703 "[{\"url\": \"%s\"," | |
1704 " \"filename\": \"sub/dir/ect/ory.txt\"}]", | |
1705 download_url.c_str())).c_str()); | |
1706 } | |
1707 | |
1708 // Test that invalid filenames are disallowed. | |
1709 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1710 DownloadExtensionTest_Download_InvalidFilename) { | |
1711 LoadExtension("downloads_split"); | |
1712 ASSERT_TRUE(StartEmbeddedTestServer()); | |
1713 ASSERT_TRUE(test_server()->Start()); | |
1714 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
1715 GoOnTheRecord(); | |
1716 | |
1717 EXPECT_STREQ(download_extension_errors::kInvalidFilenameError, | |
1718 RunFunctionAndReturnError(new DownloadsDownloadFunction(), | |
1719 base::StringPrintf( | |
1720 "[{\"url\": \"%s\"," | |
1721 " \"filename\": \"../../../../../etc/passwd\"}]", | |
1722 download_url.c_str())).c_str()); | |
1723 } | |
1724 | |
1725 // Test that downloading invalid URLs immediately returns kInvalidURLError. | |
1726 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1727 DownloadExtensionTest_Download_InvalidURLs) { | |
1728 LoadExtension("downloads_split"); | |
1729 GoOnTheRecord(); | |
1730 | |
1731 static const char* kInvalidURLs[] = { | |
1732 "foo bar", | |
1733 "../hello", | |
1734 "/hello", | |
1735 "google.com/", | |
1736 "http://", | |
1737 "#frag", | |
1738 "foo/bar.html#frag", | |
1739 }; | |
1740 | |
1741 for (size_t index = 0; index < arraysize(kInvalidURLs); ++index) { | |
1742 EXPECT_STREQ(download_extension_errors::kInvalidURLError, | |
1743 RunFunctionAndReturnError(new DownloadsDownloadFunction(), | |
1744 base::StringPrintf( | |
1745 "[{\"url\": \"%s\"}]", kInvalidURLs[index])).c_str()) | |
1746 << kInvalidURLs[index]; | |
1747 } | |
1748 | |
1749 EXPECT_STREQ("net::ERR_ACCESS_DENIED", RunFunctionAndReturnError( | |
1750 new DownloadsDownloadFunction(), | |
1751 "[{\"url\": \"javascript:document.write(\\\"hello\\\");\"}]").c_str()); | |
1752 EXPECT_STREQ("net::ERR_ACCESS_DENIED", RunFunctionAndReturnError( | |
1753 new DownloadsDownloadFunction(), | |
1754 "[{\"url\": \"javascript:return false;\"}]").c_str()); | |
1755 EXPECT_STREQ("net::ERR_NOT_IMPLEMENTED", RunFunctionAndReturnError( | |
1756 new DownloadsDownloadFunction(), | |
1757 "[{\"url\": \"ftp://example.com/example.txt\"}]").c_str()); | |
1758 } | |
1759 | |
1760 // TODO(benjhayden): Set up a test ftp server, add ftp://localhost* to | |
1761 // permissions, test downloading from ftp. | |
1762 | |
1763 // Valid URLs plus fragments are still valid URLs. | |
1764 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1765 DownloadExtensionTest_Download_URLFragment) { | |
1766 LoadExtension("downloads_split"); | |
1767 ASSERT_TRUE(StartEmbeddedTestServer()); | |
1768 ASSERT_TRUE(test_server()->Start()); | |
1769 std::string download_url = test_server()->GetURL("slow?0#fragment").spec(); | |
1770 GoOnTheRecord(); | |
1771 | |
1772 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1773 new DownloadsDownloadFunction(), base::StringPrintf( | |
1774 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
1775 ASSERT_TRUE(result.get()); | |
1776 int result_id = -1; | |
1777 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
1778 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
1779 ASSERT_TRUE(item); | |
1780 ScopedCancellingItem canceller(item); | |
1781 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
1782 | |
1783 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
1784 base::StringPrintf("[{\"danger\": \"safe\"," | |
1785 " \"incognito\": false," | |
1786 " \"mime\": \"text/plain\"," | |
1787 " \"paused\": false," | |
1788 " \"url\": \"%s\"}]", | |
1789 download_url.c_str()))); | |
1790 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
1791 base::StringPrintf("[{\"id\": %d," | |
1792 " \"filename\": {" | |
1793 " \"previous\": \"\"," | |
1794 " \"current\": \"%s\"}}]", | |
1795 result_id, | |
1796 GetFilename("slow.txt").c_str()))); | |
1797 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
1798 base::StringPrintf("[{\"id\": %d," | |
1799 " \"state\": {" | |
1800 " \"previous\": \"in_progress\"," | |
1801 " \"current\": \"complete\"}}]", | |
1802 result_id))); | |
1803 } | |
1804 | |
1805 // Valid data URLs are valid URLs. | |
1806 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1807 DownloadExtensionTest_Download_DataURL) { | |
1808 LoadExtension("downloads_split"); | |
1809 std::string download_url = "data:text/plain,hello"; | |
1810 GoOnTheRecord(); | |
1811 | |
1812 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1813 new DownloadsDownloadFunction(), base::StringPrintf( | |
1814 "[{\"url\": \"%s\"," | |
1815 " \"filename\": \"data.txt\"}]", download_url.c_str()))); | |
1816 ASSERT_TRUE(result.get()); | |
1817 int result_id = -1; | |
1818 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
1819 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
1820 ASSERT_TRUE(item); | |
1821 ScopedCancellingItem canceller(item); | |
1822 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
1823 | |
1824 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
1825 base::StringPrintf("[{\"danger\": \"safe\"," | |
1826 " \"incognito\": false," | |
1827 " \"mime\": \"text/plain\"," | |
1828 " \"paused\": false," | |
1829 " \"url\": \"%s\"}]", | |
1830 download_url.c_str()))); | |
1831 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
1832 base::StringPrintf("[{\"id\": %d," | |
1833 " \"filename\": {" | |
1834 " \"previous\": \"\"," | |
1835 " \"current\": \"%s\"}}]", | |
1836 result_id, | |
1837 GetFilename("data.txt").c_str()))); | |
1838 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
1839 base::StringPrintf("[{\"id\": %d," | |
1840 " \"state\": {" | |
1841 " \"previous\": \"in_progress\"," | |
1842 " \"current\": \"complete\"}}]", | |
1843 result_id))); | |
1844 } | |
1845 | |
1846 // Valid file URLs are valid URLs. | |
1847 #if defined(OS_WIN) && defined(USE_AURA) | |
1848 // Disabled due to crbug.com/175711 | |
1849 #define MAYBE_DownloadExtensionTest_Download_File \ | |
1850 DISABLED_DownloadExtensionTest_Download_File | |
1851 #else | |
1852 #define MAYBE_DownloadExtensionTest_Download_File \ | |
1853 DownloadExtensionTest_Download_File | |
1854 #endif | |
1855 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1856 MAYBE_DownloadExtensionTest_Download_File) { | |
1857 GoOnTheRecord(); | |
1858 LoadExtension("downloads_split"); | |
1859 std::string download_url = "file:///"; | |
1860 #if defined(OS_WIN) | |
1861 download_url += "C:/"; | |
1862 #endif | |
1863 | |
1864 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1865 new DownloadsDownloadFunction(), base::StringPrintf( | |
1866 "[{\"url\": \"%s\"," | |
1867 " \"filename\": \"file.txt\"}]", download_url.c_str()))); | |
1868 ASSERT_TRUE(result.get()); | |
1869 int result_id = -1; | |
1870 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
1871 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
1872 ASSERT_TRUE(item); | |
1873 ScopedCancellingItem canceller(item); | |
1874 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
1875 | |
1876 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
1877 base::StringPrintf("[{\"danger\": \"safe\"," | |
1878 " \"incognito\": false," | |
1879 " \"mime\": \"text/html\"," | |
1880 " \"paused\": false," | |
1881 " \"url\": \"%s\"}]", | |
1882 download_url.c_str()))); | |
1883 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
1884 base::StringPrintf("[{\"id\": %d," | |
1885 " \"filename\": {" | |
1886 " \"previous\": \"\"," | |
1887 " \"current\": \"%s\"}}]", | |
1888 result_id, | |
1889 GetFilename("file.txt").c_str()))); | |
1890 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
1891 base::StringPrintf("[{\"id\": %d," | |
1892 " \"state\": {" | |
1893 " \"previous\": \"in_progress\"," | |
1894 " \"current\": \"complete\"}}]", | |
1895 result_id))); | |
1896 } | |
1897 | |
1898 // Test that auth-basic-succeed would fail if the resource requires the | |
1899 // Authorization header and chrome fails to propagate it back to the server. | |
1900 // This tests both that testserver.py does not succeed when it should fail as | |
1901 // well as how the downloads extension API exposes the failure to extensions. | |
1902 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1903 DownloadExtensionTest_Download_AuthBasic_Fail) { | |
1904 LoadExtension("downloads_split"); | |
1905 ASSERT_TRUE(StartEmbeddedTestServer()); | |
1906 ASSERT_TRUE(test_server()->Start()); | |
1907 std::string download_url = test_server()->GetURL("auth-basic").spec(); | |
1908 GoOnTheRecord(); | |
1909 | |
1910 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1911 new DownloadsDownloadFunction(), base::StringPrintf( | |
1912 "[{\"url\": \"%s\"," | |
1913 " \"filename\": \"auth-basic-fail.txt\"}]", | |
1914 download_url.c_str()))); | |
1915 ASSERT_TRUE(result.get()); | |
1916 int result_id = -1; | |
1917 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
1918 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
1919 ASSERT_TRUE(item); | |
1920 ScopedCancellingItem canceller(item); | |
1921 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
1922 | |
1923 ASSERT_TRUE(WaitForInterruption(item, 30, base::StringPrintf( | |
1924 "[{\"danger\": \"safe\"," | |
1925 " \"incognito\": false," | |
1926 " \"mime\": \"text/html\"," | |
1927 " \"paused\": false," | |
1928 " \"url\": \"%s\"}]", | |
1929 download_url.c_str()))); | |
1930 } | |
1931 | |
1932 // Test that DownloadsDownloadFunction propagates |headers| to the URLRequest. | |
1933 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1934 DownloadExtensionTest_Download_Headers) { | |
1935 LoadExtension("downloads_split"); | |
1936 ASSERT_TRUE(StartEmbeddedTestServer()); | |
1937 ASSERT_TRUE(test_server()->Start()); | |
1938 std::string download_url = test_server()->GetURL("files/downloads/" | |
1939 "a_zip_file.zip?expected_headers=Foo:bar&expected_headers=Qx:yo").spec(); | |
1940 GoOnTheRecord(); | |
1941 | |
1942 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1943 new DownloadsDownloadFunction(), base::StringPrintf( | |
1944 "[{\"url\": \"%s\"," | |
1945 " \"filename\": \"headers-succeed.txt\"," | |
1946 " \"headers\": [" | |
1947 " {\"name\": \"Foo\", \"value\": \"bar\"}," | |
1948 " {\"name\": \"Qx\", \"value\":\"yo\"}]}]", | |
1949 download_url.c_str()))); | |
1950 ASSERT_TRUE(result.get()); | |
1951 int result_id = -1; | |
1952 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
1953 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
1954 ASSERT_TRUE(item); | |
1955 ScopedCancellingItem canceller(item); | |
1956 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
1957 | |
1958 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
1959 base::StringPrintf("[{\"danger\": \"safe\"," | |
1960 " \"incognito\": false," | |
1961 " \"mime\": \"application/octet-stream\"," | |
1962 " \"paused\": false," | |
1963 " \"url\": \"%s\"}]", | |
1964 download_url.c_str()))); | |
1965 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
1966 base::StringPrintf("[{\"id\": %d," | |
1967 " \"filename\": {" | |
1968 " \"previous\": \"\"," | |
1969 " \"current\": \"%s\"}}]", | |
1970 result_id, | |
1971 GetFilename("headers-succeed.txt").c_str()))); | |
1972 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
1973 base::StringPrintf("[{\"id\": %d," | |
1974 " \"state\": {" | |
1975 " \"previous\": \"in_progress\"," | |
1976 " \"current\": \"complete\"}}]", | |
1977 result_id))); | |
1978 } | |
1979 | |
1980 // Test that headers-succeed would fail if the resource requires the headers and | |
1981 // chrome fails to propagate them back to the server. This tests both that | |
1982 // testserver.py does not succeed when it should fail as well as how the | |
1983 // downloads extension api exposes the failure to extensions. | |
1984 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
1985 DownloadExtensionTest_Download_Headers_Fail) { | |
1986 LoadExtension("downloads_split"); | |
1987 ASSERT_TRUE(StartEmbeddedTestServer()); | |
1988 ASSERT_TRUE(test_server()->Start()); | |
1989 std::string download_url = test_server()->GetURL("files/downloads/" | |
1990 "a_zip_file.zip?expected_headers=Foo:bar&expected_headers=Qx:yo").spec(); | |
1991 GoOnTheRecord(); | |
1992 | |
1993 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
1994 new DownloadsDownloadFunction(), base::StringPrintf( | |
1995 "[{\"url\": \"%s\"," | |
1996 " \"filename\": \"headers-fail.txt\"}]", | |
1997 download_url.c_str()))); | |
1998 ASSERT_TRUE(result.get()); | |
1999 int result_id = -1; | |
2000 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2001 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2002 ASSERT_TRUE(item); | |
2003 ScopedCancellingItem canceller(item); | |
2004 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2005 | |
2006 ASSERT_TRUE(WaitForInterruption(item, 33, base::StringPrintf( | |
2007 "[{\"danger\": \"safe\"," | |
2008 " \"incognito\": false," | |
2009 " \"bytesReceived\": 0," | |
2010 " \"mime\": \"\"," | |
2011 " \"paused\": false," | |
2012 " \"url\": \"%s\"}]", | |
2013 download_url.c_str()))); | |
2014 } | |
2015 | |
2016 // Test that DownloadsDownloadFunction propagates the Authorization header | |
2017 // correctly. | |
2018 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
2019 DownloadExtensionTest_Download_AuthBasic) { | |
2020 LoadExtension("downloads_split"); | |
2021 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2022 ASSERT_TRUE(test_server()->Start()); | |
2023 std::string download_url = test_server()->GetURL("auth-basic").spec(); | |
2024 // This is just base64 of 'username:secret'. | |
2025 static const char* kAuthorization = "dXNlcm5hbWU6c2VjcmV0"; | |
2026 GoOnTheRecord(); | |
2027 | |
2028 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2029 new DownloadsDownloadFunction(), base::StringPrintf( | |
2030 "[{\"url\": \"%s\"," | |
2031 " \"filename\": \"auth-basic-succeed.txt\"," | |
2032 " \"headers\": [{" | |
2033 " \"name\": \"Authorization\"," | |
2034 " \"value\": \"Basic %s\"}]}]", | |
2035 download_url.c_str(), kAuthorization))); | |
2036 ASSERT_TRUE(result.get()); | |
2037 int result_id = -1; | |
2038 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2039 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2040 ASSERT_TRUE(item); | |
2041 ScopedCancellingItem canceller(item); | |
2042 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2043 | |
2044 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2045 base::StringPrintf("[{\"danger\": \"safe\"," | |
2046 " \"incognito\": false," | |
2047 " \"mime\": \"text/html\"," | |
2048 " \"paused\": false," | |
2049 " \"url\": \"%s\"}]", download_url.c_str()))); | |
2050 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2051 base::StringPrintf("[{\"id\": %d," | |
2052 " \"state\": {" | |
2053 " \"previous\": \"in_progress\"," | |
2054 " \"current\": \"complete\"}}]", result_id))); | |
2055 } | |
2056 | |
2057 // Test that DownloadsDownloadFunction propagates the |method| and |body| | |
2058 // parameters to the URLRequest. | |
2059 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
2060 DownloadExtensionTest_Download_Post) { | |
2061 LoadExtension("downloads_split"); | |
2062 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2063 ASSERT_TRUE(test_server()->Start()); | |
2064 std::string download_url = test_server()->GetURL("files/post/downloads/" | |
2065 "a_zip_file.zip?expected_body=BODY").spec(); | |
2066 GoOnTheRecord(); | |
2067 | |
2068 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2069 new DownloadsDownloadFunction(), base::StringPrintf( | |
2070 "[{\"url\": \"%s\"," | |
2071 " \"filename\": \"post-succeed.txt\"," | |
2072 " \"method\": \"POST\"," | |
2073 " \"body\": \"BODY\"}]", | |
2074 download_url.c_str()))); | |
2075 ASSERT_TRUE(result.get()); | |
2076 int result_id = -1; | |
2077 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2078 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2079 ASSERT_TRUE(item); | |
2080 ScopedCancellingItem canceller(item); | |
2081 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2082 | |
2083 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2084 base::StringPrintf("[{\"danger\": \"safe\"," | |
2085 " \"incognito\": false," | |
2086 " \"mime\": \"application/octet-stream\"," | |
2087 " \"paused\": false," | |
2088 " \"url\": \"%s\"}]", download_url.c_str()))); | |
2089 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2090 base::StringPrintf("[{\"id\": %d," | |
2091 " \"filename\": {" | |
2092 " \"previous\": \"\"," | |
2093 " \"current\": \"%s\"}}]", | |
2094 result_id, | |
2095 GetFilename("post-succeed.txt").c_str()))); | |
2096 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2097 base::StringPrintf("[{\"id\": %d," | |
2098 " \"state\": {" | |
2099 " \"previous\": \"in_progress\"," | |
2100 " \"current\": \"complete\"}}]", | |
2101 result_id))); | |
2102 } | |
2103 | |
2104 // Test that downloadPostSuccess would fail if the resource requires the POST | |
2105 // method, and chrome fails to propagate the |method| parameter back to the | |
2106 // server. This tests both that testserver.py does not succeed when it should | |
2107 // fail, and this tests how the downloads extension api exposes the failure to | |
2108 // extensions. | |
2109 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
2110 DownloadExtensionTest_Download_Post_Get) { | |
2111 LoadExtension("downloads_split"); | |
2112 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2113 ASSERT_TRUE(test_server()->Start()); | |
2114 std::string download_url = test_server()->GetURL("files/post/downloads/" | |
2115 "a_zip_file.zip?expected_body=BODY").spec(); | |
2116 GoOnTheRecord(); | |
2117 | |
2118 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2119 new DownloadsDownloadFunction(), base::StringPrintf( | |
2120 "[{\"url\": \"%s\"," | |
2121 " \"body\": \"BODY\"," | |
2122 " \"filename\": \"post-get.txt\"}]", | |
2123 download_url.c_str()))); | |
2124 ASSERT_TRUE(result.get()); | |
2125 int result_id = -1; | |
2126 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2127 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2128 ASSERT_TRUE(item); | |
2129 ScopedCancellingItem canceller(item); | |
2130 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2131 | |
2132 ASSERT_TRUE(WaitForInterruption(item, 33, base::StringPrintf( | |
2133 "[{\"danger\": \"safe\"," | |
2134 " \"incognito\": false," | |
2135 " \"mime\": \"\"," | |
2136 " \"paused\": false," | |
2137 " \"id\": %d," | |
2138 " \"url\": \"%s\"}]", | |
2139 result_id, | |
2140 download_url.c_str()))); | |
2141 } | |
2142 | |
2143 // Test that downloadPostSuccess would fail if the resource requires the POST | |
2144 // method, and chrome fails to propagate the |body| parameter back to the | |
2145 // server. This tests both that testserver.py does not succeed when it should | |
2146 // fail, and this tests how the downloads extension api exposes the failure to | |
2147 // extensions. | |
2148 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
2149 DownloadExtensionTest_Download_Post_NoBody) { | |
2150 LoadExtension("downloads_split"); | |
2151 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2152 ASSERT_TRUE(test_server()->Start()); | |
2153 std::string download_url = test_server()->GetURL("files/post/downloads/" | |
2154 "a_zip_file.zip?expected_body=BODY").spec(); | |
2155 GoOnTheRecord(); | |
2156 | |
2157 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2158 new DownloadsDownloadFunction(), base::StringPrintf( | |
2159 "[{\"url\": \"%s\"," | |
2160 " \"method\": \"POST\"," | |
2161 " \"filename\": \"post-nobody.txt\"}]", | |
2162 download_url.c_str()))); | |
2163 ASSERT_TRUE(result.get()); | |
2164 int result_id = -1; | |
2165 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2166 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2167 ASSERT_TRUE(item); | |
2168 ScopedCancellingItem canceller(item); | |
2169 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2170 | |
2171 ASSERT_TRUE(WaitForInterruption(item, 33, base::StringPrintf( | |
2172 "[{\"danger\": \"safe\"," | |
2173 " \"incognito\": false," | |
2174 " \"mime\": \"\"," | |
2175 " \"paused\": false," | |
2176 " \"id\": %d," | |
2177 " \"url\": \"%s\"}]", | |
2178 result_id, | |
2179 download_url.c_str()))); | |
2180 } | |
2181 | |
2182 // Test that cancel()ing an in-progress download causes its state to transition | |
2183 // to interrupted, and test that that state transition is detectable by an | |
2184 // onChanged event listener. TODO(benjhayden): Test other sources of | |
2185 // interruptions such as server death. | |
2186 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
2187 DownloadExtensionTest_Download_Cancel) { | |
2188 LoadExtension("downloads_split"); | |
2189 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2190 ASSERT_TRUE(test_server()->Start()); | |
2191 std::string download_url = test_server()->GetURL( | |
2192 "download-known-size").spec(); | |
2193 GoOnTheRecord(); | |
2194 | |
2195 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2196 new DownloadsDownloadFunction(), base::StringPrintf( | |
2197 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
2198 ASSERT_TRUE(result.get()); | |
2199 int result_id = -1; | |
2200 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2201 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2202 ASSERT_TRUE(item); | |
2203 ScopedCancellingItem canceller(item); | |
2204 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2205 | |
2206 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2207 base::StringPrintf("[{\"danger\": \"safe\"," | |
2208 " \"incognito\": false," | |
2209 " \"mime\": \"application/octet-stream\"," | |
2210 " \"paused\": false," | |
2211 " \"id\": %d," | |
2212 " \"url\": \"%s\"}]", | |
2213 result_id, | |
2214 download_url.c_str()))); | |
2215 item->Cancel(true); | |
2216 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2217 base::StringPrintf("[{\"id\": %d," | |
2218 " \"error\": {\"current\": 40}," | |
2219 " \"state\": {" | |
2220 " \"previous\": \"in_progress\"," | |
2221 " \"current\": \"interrupted\"}}]", | |
2222 result_id))); | |
2223 } | |
2224 | |
2225 // Test downloading filesystem: URLs. | |
2226 // NOTE: chrome disallows creating HTML5 FileSystem Files in incognito. | |
2227 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
2228 DownloadExtensionTest_Download_FileSystemURL) { | |
2229 static const char* kPayloadData = "on the record\ndata"; | |
2230 GoOnTheRecord(); | |
2231 LoadExtension("downloads_split"); | |
2232 HTML5FileWriter html5_file_writer( | |
2233 browser()->profile(), | |
2234 "on_record.txt", | |
2235 GetExtensionURL(), | |
2236 events_listener(), | |
2237 kPayloadData); | |
2238 ASSERT_TRUE(html5_file_writer.WriteFile()); | |
2239 | |
2240 std::string download_url = "filesystem:" + GetExtensionURL() + | |
2241 "temporary/on_record.txt"; | |
2242 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2243 new DownloadsDownloadFunction(), base::StringPrintf( | |
2244 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
2245 ASSERT_TRUE(result.get()); | |
2246 int result_id = -1; | |
2247 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2248 | |
2249 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2250 ASSERT_TRUE(item); | |
2251 ScopedCancellingItem canceller(item); | |
2252 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2253 | |
2254 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2255 base::StringPrintf("[{\"danger\": \"safe\"," | |
2256 " \"incognito\": false," | |
2257 " \"mime\": \"text/plain\"," | |
2258 " \"paused\": false," | |
2259 " \"url\": \"%s\"}]", | |
2260 download_url.c_str()))); | |
2261 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2262 base::StringPrintf("[{\"id\": %d," | |
2263 " \"filename\": {" | |
2264 " \"previous\": \"\"," | |
2265 " \"current\": \"%s\"}}]", | |
2266 result_id, | |
2267 GetFilename("on_record.txt").c_str()))); | |
2268 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2269 base::StringPrintf("[{\"id\": %d," | |
2270 " \"state\": {" | |
2271 " \"previous\": \"in_progress\"," | |
2272 " \"current\": \"complete\"}}]", | |
2273 result_id))); | |
2274 std::string disk_data; | |
2275 EXPECT_TRUE(file_util::ReadFileToString(item->GetTargetFilePath(), | |
2276 &disk_data)); | |
2277 EXPECT_STREQ(kPayloadData, disk_data.c_str()); | |
2278 } | |
2279 | |
2280 IN_PROC_BROWSER_TEST_F(DownloadExtensionTest, | |
2281 DownloadExtensionTest_OnDeterminingFilename_NoChange) { | |
2282 GoOnTheRecord(); | |
2283 LoadExtension("downloads_split"); | |
2284 AddFilenameDeterminer(); | |
2285 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2286 ASSERT_TRUE(test_server()->Start()); | |
2287 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
2288 | |
2289 // Start downloading a file. | |
2290 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2291 new DownloadsDownloadFunction(), base::StringPrintf( | |
2292 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
2293 ASSERT_TRUE(result.get()); | |
2294 int result_id = -1; | |
2295 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2296 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2297 ASSERT_TRUE(item); | |
2298 ScopedCancellingItem canceller(item); | |
2299 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2300 | |
2301 // Wait for the onCreated and onDeterminingFilename events. | |
2302 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2303 base::StringPrintf("[{\"danger\": \"safe\"," | |
2304 " \"incognito\": false," | |
2305 " \"id\": %d," | |
2306 " \"mime\": \"text/plain\"," | |
2307 " \"paused\": false," | |
2308 " \"url\": \"%s\"}]", | |
2309 result_id, | |
2310 download_url.c_str()))); | |
2311 ASSERT_TRUE(WaitFor( | |
2312 events::kOnDownloadDeterminingFilename, | |
2313 base::StringPrintf("[{\"id\": %d," | |
2314 " \"filename\":\"slow.txt\"}]", | |
2315 result_id))); | |
2316 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
2317 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
2318 | |
2319 // Respond to the onDeterminingFilename. | |
2320 std::string error; | |
2321 ASSERT_TRUE(ExtensionDownloadsEventRouter::DetermineFilename( | |
2322 browser()->profile(), | |
2323 false, | |
2324 GetExtensionId(), | |
2325 result_id, | |
2326 base::FilePath(), | |
2327 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
2328 &error)); | |
2329 EXPECT_EQ("", error); | |
2330 | |
2331 // The download should complete successfully. | |
2332 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2333 base::StringPrintf("[{\"id\": %d," | |
2334 " \"filename\": {" | |
2335 " \"previous\": \"\"," | |
2336 " \"current\": \"%s\"}}]", | |
2337 result_id, | |
2338 GetFilename("slow.txt").c_str()))); | |
2339 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2340 base::StringPrintf("[{\"id\": %d," | |
2341 " \"state\": {" | |
2342 " \"previous\": \"in_progress\"," | |
2343 " \"current\": \"complete\"}}]", | |
2344 result_id))); | |
2345 } | |
2346 | |
2347 IN_PROC_BROWSER_TEST_F( | |
2348 DownloadExtensionTest, | |
2349 DownloadExtensionTest_OnDeterminingFilename_DangerousOverride) { | |
2350 GoOnTheRecord(); | |
2351 LoadExtension("downloads_split"); | |
2352 AddFilenameDeterminer(); | |
2353 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2354 ASSERT_TRUE(test_server()->Start()); | |
2355 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
2356 | |
2357 // Start downloading a file. | |
2358 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2359 new DownloadsDownloadFunction(), base::StringPrintf( | |
2360 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
2361 ASSERT_TRUE(result.get()); | |
2362 int result_id = -1; | |
2363 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2364 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2365 ASSERT_TRUE(item); | |
2366 ScopedCancellingItem canceller(item); | |
2367 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2368 | |
2369 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2370 base::StringPrintf("[{\"danger\": \"safe\"," | |
2371 " \"incognito\": false," | |
2372 " \"id\": %d," | |
2373 " \"mime\": \"text/plain\"," | |
2374 " \"paused\": false," | |
2375 " \"url\": \"%s\"}]", | |
2376 result_id, | |
2377 download_url.c_str()))); | |
2378 ASSERT_TRUE(WaitFor( | |
2379 events::kOnDownloadDeterminingFilename, | |
2380 base::StringPrintf("[{\"id\": %d," | |
2381 " \"filename\":\"slow.txt\"}]", | |
2382 result_id))); | |
2383 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
2384 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
2385 | |
2386 // Respond to the onDeterminingFilename. | |
2387 std::string error; | |
2388 ASSERT_TRUE(ExtensionDownloadsEventRouter::DetermineFilename( | |
2389 browser()->profile(), | |
2390 false, | |
2391 GetExtensionId(), | |
2392 result_id, | |
2393 base::FilePath(FILE_PATH_LITERAL("overridden.swf")), | |
2394 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
2395 &error)); | |
2396 EXPECT_EQ("", error); | |
2397 | |
2398 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2399 base::StringPrintf("[{\"id\": %d," | |
2400 " \"danger\": {" | |
2401 " \"previous\":\"safe\"," | |
2402 " \"current\":\"file\"}," | |
2403 " \"dangerAccepted\": {" | |
2404 " \"current\":false}}]", | |
2405 result_id))); | |
2406 | |
2407 item->ValidateDangerousDownload(); | |
2408 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2409 base::StringPrintf("[{\"id\": %d," | |
2410 " \"dangerAccepted\": {" | |
2411 " \"previous\":false," | |
2412 " \"current\":true}}]", | |
2413 result_id))); | |
2414 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2415 base::StringPrintf("[{\"id\": %d," | |
2416 " \"state\": {" | |
2417 " \"previous\": \"in_progress\"," | |
2418 " \"current\": \"complete\"}}]", | |
2419 result_id))); | |
2420 EXPECT_EQ(downloads_directory().AppendASCII("overridden.swf"), | |
2421 item->GetTargetFilePath()); | |
2422 } | |
2423 | |
2424 IN_PROC_BROWSER_TEST_F( | |
2425 DownloadExtensionTest, | |
2426 DownloadExtensionTest_OnDeterminingFilename_ReferencesParentInvalid) { | |
2427 GoOnTheRecord(); | |
2428 LoadExtension("downloads_split"); | |
2429 AddFilenameDeterminer(); | |
2430 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2431 ASSERT_TRUE(test_server()->Start()); | |
2432 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
2433 | |
2434 // Start downloading a file. | |
2435 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2436 new DownloadsDownloadFunction(), base::StringPrintf( | |
2437 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
2438 ASSERT_TRUE(result.get()); | |
2439 int result_id = -1; | |
2440 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2441 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2442 ASSERT_TRUE(item); | |
2443 ScopedCancellingItem canceller(item); | |
2444 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2445 | |
2446 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2447 base::StringPrintf("[{\"danger\": \"safe\"," | |
2448 " \"incognito\": false," | |
2449 " \"id\": %d," | |
2450 " \"mime\": \"text/plain\"," | |
2451 " \"paused\": false," | |
2452 " \"url\": \"%s\"}]", | |
2453 result_id, | |
2454 download_url.c_str()))); | |
2455 ASSERT_TRUE(WaitFor( | |
2456 events::kOnDownloadDeterminingFilename, | |
2457 base::StringPrintf("[{\"id\": %d," | |
2458 " \"filename\":\"slow.txt\"}]", | |
2459 result_id))); | |
2460 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
2461 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
2462 | |
2463 // Respond to the onDeterminingFilename. | |
2464 std::string error; | |
2465 ASSERT_FALSE(ExtensionDownloadsEventRouter::DetermineFilename( | |
2466 browser()->profile(), | |
2467 false, | |
2468 GetExtensionId(), | |
2469 result_id, | |
2470 base::FilePath(FILE_PATH_LITERAL("sneaky/../../sneaky.txt")), | |
2471 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
2472 &error)); | |
2473 EXPECT_STREQ(download_extension_errors::kInvalidFilenameError, error.c_str()); | |
2474 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2475 base::StringPrintf("[{\"id\": %d," | |
2476 " \"filename\": {" | |
2477 " \"previous\": \"\"," | |
2478 " \"current\": \"%s\"}}]", | |
2479 result_id, | |
2480 GetFilename("slow.txt").c_str()))); | |
2481 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2482 base::StringPrintf("[{\"id\": %d," | |
2483 " \"state\": {" | |
2484 " \"previous\": \"in_progress\"," | |
2485 " \"current\": \"complete\"}}]", | |
2486 result_id))); | |
2487 } | |
2488 | |
2489 IN_PROC_BROWSER_TEST_F( | |
2490 DownloadExtensionTest, | |
2491 DownloadExtensionTest_OnDeterminingFilename_IllegalFilename) { | |
2492 GoOnTheRecord(); | |
2493 LoadExtension("downloads_split"); | |
2494 AddFilenameDeterminer(); | |
2495 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2496 ASSERT_TRUE(test_server()->Start()); | |
2497 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
2498 | |
2499 // Start downloading a file. | |
2500 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2501 new DownloadsDownloadFunction(), base::StringPrintf( | |
2502 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
2503 ASSERT_TRUE(result.get()); | |
2504 int result_id = -1; | |
2505 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2506 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2507 ASSERT_TRUE(item); | |
2508 ScopedCancellingItem canceller(item); | |
2509 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2510 | |
2511 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2512 base::StringPrintf("[{\"danger\": \"safe\"," | |
2513 " \"incognito\": false," | |
2514 " \"id\": %d," | |
2515 " \"mime\": \"text/plain\"," | |
2516 " \"paused\": false," | |
2517 " \"url\": \"%s\"}]", | |
2518 result_id, | |
2519 download_url.c_str()))); | |
2520 ASSERT_TRUE(WaitFor( | |
2521 events::kOnDownloadDeterminingFilename, | |
2522 base::StringPrintf("[{\"id\": %d," | |
2523 " \"filename\":\"slow.txt\"}]", | |
2524 result_id))); | |
2525 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
2526 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
2527 | |
2528 // Respond to the onDeterminingFilename. | |
2529 std::string error; | |
2530 ASSERT_FALSE(ExtensionDownloadsEventRouter::DetermineFilename( | |
2531 browser()->profile(), | |
2532 false, | |
2533 GetExtensionId(), | |
2534 result_id, | |
2535 base::FilePath(FILE_PATH_LITERAL("<")), | |
2536 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
2537 &error)); | |
2538 EXPECT_STREQ(download_extension_errors::kInvalidFilenameError, error.c_str()); | |
2539 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, base::StringPrintf( | |
2540 "[{\"id\": %d," | |
2541 " \"filename\": {" | |
2542 " \"previous\": \"\"," | |
2543 " \"current\": \"%s\"}}]", | |
2544 result_id, | |
2545 GetFilename("slow.txt").c_str()))); | |
2546 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, base::StringPrintf( | |
2547 "[{\"id\": %d," | |
2548 " \"state\": {" | |
2549 " \"previous\": \"in_progress\"," | |
2550 " \"current\": \"complete\"}}]", | |
2551 result_id))); | |
2552 } | |
2553 | |
2554 IN_PROC_BROWSER_TEST_F( | |
2555 DownloadExtensionTest, | |
2556 DownloadExtensionTest_OnDeterminingFilename_IllegalFilenameExtension) { | |
2557 GoOnTheRecord(); | |
2558 LoadExtension("downloads_split"); | |
2559 AddFilenameDeterminer(); | |
2560 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2561 ASSERT_TRUE(test_server()->Start()); | |
2562 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
2563 | |
2564 // Start downloading a file. | |
2565 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2566 new DownloadsDownloadFunction(), base::StringPrintf( | |
2567 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
2568 ASSERT_TRUE(result.get()); | |
2569 int result_id = -1; | |
2570 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2571 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2572 ASSERT_TRUE(item); | |
2573 ScopedCancellingItem canceller(item); | |
2574 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2575 | |
2576 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2577 base::StringPrintf("[{\"danger\": \"safe\"," | |
2578 " \"incognito\": false," | |
2579 " \"id\": %d," | |
2580 " \"mime\": \"text/plain\"," | |
2581 " \"paused\": false," | |
2582 " \"url\": \"%s\"}]", | |
2583 result_id, | |
2584 download_url.c_str()))); | |
2585 ASSERT_TRUE(WaitFor( | |
2586 events::kOnDownloadDeterminingFilename, | |
2587 base::StringPrintf("[{\"id\": %d," | |
2588 " \"filename\":\"slow.txt\"}]", | |
2589 result_id))); | |
2590 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
2591 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
2592 | |
2593 // Respond to the onDeterminingFilename. | |
2594 std::string error; | |
2595 ASSERT_FALSE(ExtensionDownloadsEventRouter::DetermineFilename( | |
2596 browser()->profile(), | |
2597 false, | |
2598 GetExtensionId(), | |
2599 result_id, | |
2600 base::FilePath(FILE_PATH_LITERAL( | |
2601 "My Computer.{20D04FE0-3AEA-1069-A2D8-08002B30309D}/foo")), | |
2602 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
2603 &error)); | |
2604 EXPECT_STREQ(download_extension_errors::kInvalidFilenameError, error.c_str()); | |
2605 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, base::StringPrintf( | |
2606 "[{\"id\": %d," | |
2607 " \"filename\": {" | |
2608 " \"previous\": \"\"," | |
2609 " \"current\": \"%s\"}}]", | |
2610 result_id, | |
2611 GetFilename("slow.txt").c_str()))); | |
2612 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, base::StringPrintf( | |
2613 "[{\"id\": %d," | |
2614 " \"state\": {" | |
2615 " \"previous\": \"in_progress\"," | |
2616 " \"current\": \"complete\"}}]", | |
2617 result_id))); | |
2618 } | |
2619 | |
2620 IN_PROC_BROWSER_TEST_F( | |
2621 DownloadExtensionTest, | |
2622 DownloadExtensionTest_OnDeterminingFilename_ReservedFilename) { | |
2623 GoOnTheRecord(); | |
2624 LoadExtension("downloads_split"); | |
2625 AddFilenameDeterminer(); | |
2626 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2627 ASSERT_TRUE(test_server()->Start()); | |
2628 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
2629 | |
2630 // Start downloading a file. | |
2631 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2632 new DownloadsDownloadFunction(), base::StringPrintf( | |
2633 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
2634 ASSERT_TRUE(result.get()); | |
2635 int result_id = -1; | |
2636 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2637 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2638 ASSERT_TRUE(item); | |
2639 ScopedCancellingItem canceller(item); | |
2640 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2641 | |
2642 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2643 base::StringPrintf("[{\"danger\": \"safe\"," | |
2644 " \"incognito\": false," | |
2645 " \"id\": %d," | |
2646 " \"mime\": \"text/plain\"," | |
2647 " \"paused\": false," | |
2648 " \"url\": \"%s\"}]", | |
2649 result_id, | |
2650 download_url.c_str()))); | |
2651 ASSERT_TRUE(WaitFor( | |
2652 events::kOnDownloadDeterminingFilename, | |
2653 base::StringPrintf("[{\"id\": %d," | |
2654 " \"filename\":\"slow.txt\"}]", | |
2655 result_id))); | |
2656 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
2657 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
2658 | |
2659 // Respond to the onDeterminingFilename. | |
2660 std::string error; | |
2661 ASSERT_FALSE(ExtensionDownloadsEventRouter::DetermineFilename( | |
2662 browser()->profile(), | |
2663 false, | |
2664 GetExtensionId(), | |
2665 result_id, | |
2666 base::FilePath(FILE_PATH_LITERAL("con.foo")), | |
2667 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
2668 &error)); | |
2669 EXPECT_STREQ(download_extension_errors::kInvalidFilenameError, error.c_str()); | |
2670 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, base::StringPrintf( | |
2671 "[{\"id\": %d," | |
2672 " \"filename\": {" | |
2673 " \"previous\": \"\"," | |
2674 " \"current\": \"%s\"}}]", | |
2675 result_id, | |
2676 GetFilename("slow.txt").c_str()))); | |
2677 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, base::StringPrintf( | |
2678 "[{\"id\": %d," | |
2679 " \"state\": {" | |
2680 " \"previous\": \"in_progress\"," | |
2681 " \"current\": \"complete\"}}]", | |
2682 result_id))); | |
2683 } | |
2684 | |
2685 IN_PROC_BROWSER_TEST_F( | |
2686 DownloadExtensionTest, | |
2687 DownloadExtensionTest_OnDeterminingFilename_CurDirInvalid) { | |
2688 GoOnTheRecord(); | |
2689 LoadExtension("downloads_split"); | |
2690 AddFilenameDeterminer(); | |
2691 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2692 ASSERT_TRUE(test_server()->Start()); | |
2693 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
2694 | |
2695 // Start downloading a file. | |
2696 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2697 new DownloadsDownloadFunction(), base::StringPrintf( | |
2698 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
2699 ASSERT_TRUE(result.get()); | |
2700 int result_id = -1; | |
2701 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2702 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2703 ASSERT_TRUE(item); | |
2704 ScopedCancellingItem canceller(item); | |
2705 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2706 | |
2707 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2708 base::StringPrintf("[{\"danger\": \"safe\"," | |
2709 " \"incognito\": false," | |
2710 " \"id\": %d," | |
2711 " \"mime\": \"text/plain\"," | |
2712 " \"paused\": false," | |
2713 " \"url\": \"%s\"}]", | |
2714 result_id, | |
2715 download_url.c_str()))); | |
2716 ASSERT_TRUE(WaitFor( | |
2717 events::kOnDownloadDeterminingFilename, | |
2718 base::StringPrintf("[{\"id\": %d," | |
2719 " \"filename\":\"slow.txt\"}]", | |
2720 result_id))); | |
2721 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
2722 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
2723 | |
2724 // Respond to the onDeterminingFilename. | |
2725 std::string error; | |
2726 ASSERT_FALSE(ExtensionDownloadsEventRouter::DetermineFilename( | |
2727 browser()->profile(), | |
2728 false, | |
2729 GetExtensionId(), | |
2730 result_id, | |
2731 base::FilePath(FILE_PATH_LITERAL(".")), | |
2732 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
2733 &error)); | |
2734 EXPECT_STREQ(download_extension_errors::kInvalidFilenameError, error.c_str()); | |
2735 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2736 base::StringPrintf("[{\"id\": %d," | |
2737 " \"filename\": {" | |
2738 " \"previous\": \"\"," | |
2739 " \"current\": \"%s\"}}]", | |
2740 result_id, | |
2741 GetFilename("slow.txt").c_str()))); | |
2742 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2743 base::StringPrintf("[{\"id\": %d," | |
2744 " \"state\": {" | |
2745 " \"previous\": \"in_progress\"," | |
2746 " \"current\": \"complete\"}}]", | |
2747 result_id))); | |
2748 } | |
2749 | |
2750 IN_PROC_BROWSER_TEST_F( | |
2751 DownloadExtensionTest, | |
2752 DownloadExtensionTest_OnDeterminingFilename_ParentDirInvalid) { | |
2753 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2754 ASSERT_TRUE(test_server()->Start()); | |
2755 GoOnTheRecord(); | |
2756 LoadExtension("downloads_split"); | |
2757 AddFilenameDeterminer(); | |
2758 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
2759 | |
2760 // Start downloading a file. | |
2761 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2762 new DownloadsDownloadFunction(), base::StringPrintf( | |
2763 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
2764 ASSERT_TRUE(result.get()); | |
2765 int result_id = -1; | |
2766 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2767 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2768 ASSERT_TRUE(item); | |
2769 ScopedCancellingItem canceller(item); | |
2770 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2771 | |
2772 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2773 base::StringPrintf("[{\"danger\": \"safe\"," | |
2774 " \"incognito\": false," | |
2775 " \"id\": %d," | |
2776 " \"mime\": \"text/plain\"," | |
2777 " \"paused\": false," | |
2778 " \"url\": \"%s\"}]", | |
2779 result_id, | |
2780 download_url.c_str()))); | |
2781 ASSERT_TRUE(WaitFor( | |
2782 events::kOnDownloadDeterminingFilename, | |
2783 base::StringPrintf("[{\"id\": %d," | |
2784 " \"filename\":\"slow.txt\"}]", | |
2785 result_id))); | |
2786 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
2787 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
2788 | |
2789 // Respond to the onDeterminingFilename. | |
2790 std::string error; | |
2791 ASSERT_FALSE(ExtensionDownloadsEventRouter::DetermineFilename( | |
2792 browser()->profile(), | |
2793 false, | |
2794 GetExtensionId(), | |
2795 result_id, | |
2796 base::FilePath(FILE_PATH_LITERAL("..")), | |
2797 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
2798 &error)); | |
2799 EXPECT_STREQ(download_extension_errors::kInvalidFilenameError, error.c_str()); | |
2800 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2801 base::StringPrintf("[{\"id\": %d," | |
2802 " \"filename\": {" | |
2803 " \"previous\": \"\"," | |
2804 " \"current\": \"%s\"}}]", | |
2805 result_id, | |
2806 GetFilename("slow.txt").c_str()))); | |
2807 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2808 base::StringPrintf("[{\"id\": %d," | |
2809 " \"state\": {" | |
2810 " \"previous\": \"in_progress\"," | |
2811 " \"current\": \"complete\"}}]", | |
2812 result_id))); | |
2813 } | |
2814 | |
2815 IN_PROC_BROWSER_TEST_F( | |
2816 DownloadExtensionTest, | |
2817 DownloadExtensionTest_OnDeterminingFilename_AbsPathInvalid) { | |
2818 GoOnTheRecord(); | |
2819 LoadExtension("downloads_split"); | |
2820 AddFilenameDeterminer(); | |
2821 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2822 ASSERT_TRUE(test_server()->Start()); | |
2823 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
2824 | |
2825 // Start downloading a file. | |
2826 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2827 new DownloadsDownloadFunction(), base::StringPrintf( | |
2828 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
2829 ASSERT_TRUE(result.get()); | |
2830 int result_id = -1; | |
2831 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2832 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2833 ASSERT_TRUE(item); | |
2834 ScopedCancellingItem canceller(item); | |
2835 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2836 | |
2837 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2838 base::StringPrintf("[{\"danger\": \"safe\"," | |
2839 " \"incognito\": false," | |
2840 " \"id\": %d," | |
2841 " \"mime\": \"text/plain\"," | |
2842 " \"paused\": false," | |
2843 " \"url\": \"%s\"}]", | |
2844 result_id, | |
2845 download_url.c_str()))); | |
2846 ASSERT_TRUE(WaitFor( | |
2847 events::kOnDownloadDeterminingFilename, | |
2848 base::StringPrintf("[{\"id\": %d," | |
2849 " \"filename\":\"slow.txt\"}]", | |
2850 result_id))); | |
2851 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
2852 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
2853 | |
2854 // Respond to the onDeterminingFilename. Absolute paths should be rejected. | |
2855 std::string error; | |
2856 ASSERT_FALSE(ExtensionDownloadsEventRouter::DetermineFilename( | |
2857 browser()->profile(), | |
2858 false, | |
2859 GetExtensionId(), | |
2860 result_id, | |
2861 downloads_directory().Append(FILE_PATH_LITERAL("sneaky.txt")), | |
2862 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
2863 &error)); | |
2864 EXPECT_STREQ(download_extension_errors::kInvalidFilenameError, error.c_str()); | |
2865 | |
2866 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2867 base::StringPrintf("[{\"id\": %d," | |
2868 " \"filename\": {" | |
2869 " \"previous\": \"\"," | |
2870 " \"current\": \"%s\"}}]", | |
2871 result_id, | |
2872 GetFilename("slow.txt").c_str()))); | |
2873 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2874 base::StringPrintf("[{\"id\": %d," | |
2875 " \"state\": {" | |
2876 " \"previous\": \"in_progress\"," | |
2877 " \"current\": \"complete\"}}]", | |
2878 result_id))); | |
2879 } | |
2880 | |
2881 IN_PROC_BROWSER_TEST_F( | |
2882 DownloadExtensionTest, | |
2883 DownloadExtensionTest_OnDeterminingFilename_EmptyBasenameInvalid) { | |
2884 GoOnTheRecord(); | |
2885 LoadExtension("downloads_split"); | |
2886 AddFilenameDeterminer(); | |
2887 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2888 ASSERT_TRUE(test_server()->Start()); | |
2889 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
2890 | |
2891 // Start downloading a file. | |
2892 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2893 new DownloadsDownloadFunction(), base::StringPrintf( | |
2894 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
2895 ASSERT_TRUE(result.get()); | |
2896 int result_id = -1; | |
2897 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2898 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2899 ASSERT_TRUE(item); | |
2900 ScopedCancellingItem canceller(item); | |
2901 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2902 | |
2903 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2904 base::StringPrintf("[{\"danger\": \"safe\"," | |
2905 " \"incognito\": false," | |
2906 " \"id\": %d," | |
2907 " \"mime\": \"text/plain\"," | |
2908 " \"paused\": false," | |
2909 " \"url\": \"%s\"}]", | |
2910 result_id, | |
2911 download_url.c_str()))); | |
2912 ASSERT_TRUE(WaitFor( | |
2913 events::kOnDownloadDeterminingFilename, | |
2914 base::StringPrintf("[{\"id\": %d," | |
2915 " \"filename\":\"slow.txt\"}]", | |
2916 result_id))); | |
2917 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
2918 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
2919 | |
2920 // Respond to the onDeterminingFilename. Empty basenames should be rejected. | |
2921 std::string error; | |
2922 ASSERT_FALSE(ExtensionDownloadsEventRouter::DetermineFilename( | |
2923 browser()->profile(), | |
2924 false, | |
2925 GetExtensionId(), | |
2926 result_id, | |
2927 base::FilePath(FILE_PATH_LITERAL("foo/")), | |
2928 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
2929 &error)); | |
2930 EXPECT_STREQ(download_extension_errors::kInvalidFilenameError, error.c_str()); | |
2931 | |
2932 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2933 base::StringPrintf("[{\"id\": %d," | |
2934 " \"filename\": {" | |
2935 " \"previous\": \"\"," | |
2936 " \"current\": \"%s\"}}]", | |
2937 result_id, | |
2938 GetFilename("slow.txt").c_str()))); | |
2939 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2940 base::StringPrintf("[{\"id\": %d," | |
2941 " \"state\": {" | |
2942 " \"previous\": \"in_progress\"," | |
2943 " \"current\": \"complete\"}}]", | |
2944 result_id))); | |
2945 } | |
2946 | |
2947 IN_PROC_BROWSER_TEST_F( | |
2948 DownloadExtensionTest, | |
2949 DownloadExtensionTest_OnDeterminingFilename_Override) { | |
2950 GoOnTheRecord(); | |
2951 LoadExtension("downloads_split"); | |
2952 AddFilenameDeterminer(); | |
2953 ASSERT_TRUE(StartEmbeddedTestServer()); | |
2954 ASSERT_TRUE(test_server()->Start()); | |
2955 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
2956 | |
2957 // Start downloading a file. | |
2958 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
2959 new DownloadsDownloadFunction(), base::StringPrintf( | |
2960 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
2961 ASSERT_TRUE(result.get()); | |
2962 int result_id = -1; | |
2963 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
2964 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
2965 ASSERT_TRUE(item); | |
2966 ScopedCancellingItem canceller(item); | |
2967 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
2968 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
2969 base::StringPrintf("[{\"danger\": \"safe\"," | |
2970 " \"incognito\": false," | |
2971 " \"id\": %d," | |
2972 " \"mime\": \"text/plain\"," | |
2973 " \"paused\": false," | |
2974 " \"url\": \"%s\"}]", | |
2975 result_id, | |
2976 download_url.c_str()))); | |
2977 ASSERT_TRUE(WaitFor( | |
2978 events::kOnDownloadDeterminingFilename, | |
2979 base::StringPrintf("[{\"id\": %d," | |
2980 " \"filename\":\"slow.txt\"}]", | |
2981 result_id))); | |
2982 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
2983 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
2984 | |
2985 // Respond to the onDeterminingFilename. | |
2986 std::string error; | |
2987 ASSERT_TRUE(ExtensionDownloadsEventRouter::DetermineFilename( | |
2988 browser()->profile(), | |
2989 false, | |
2990 GetExtensionId(), | |
2991 result_id, | |
2992 base::FilePath(), | |
2993 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
2994 &error)); | |
2995 EXPECT_EQ("", error); | |
2996 | |
2997 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
2998 base::StringPrintf("[{\"id\": %d," | |
2999 " \"filename\": {" | |
3000 " \"previous\": \"\"," | |
3001 " \"current\": \"%s\"}}]", | |
3002 result_id, | |
3003 GetFilename("slow.txt").c_str()))); | |
3004 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3005 base::StringPrintf("[{\"id\": %d," | |
3006 " \"state\": {" | |
3007 " \"previous\": \"in_progress\"," | |
3008 " \"current\": \"complete\"}}]", | |
3009 result_id))); | |
3010 | |
3011 // Start downloading a file. | |
3012 result.reset(RunFunctionAndReturnResult( | |
3013 new DownloadsDownloadFunction(), base::StringPrintf( | |
3014 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
3015 ASSERT_TRUE(result.get()); | |
3016 result_id = -1; | |
3017 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
3018 item = GetCurrentManager()->GetDownload(result_id); | |
3019 ASSERT_TRUE(item); | |
3020 ScopedCancellingItem canceller2(item); | |
3021 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
3022 | |
3023 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
3024 base::StringPrintf("[{\"danger\": \"safe\"," | |
3025 " \"incognito\": false," | |
3026 " \"id\": %d," | |
3027 " \"mime\": \"text/plain\"," | |
3028 " \"paused\": false," | |
3029 " \"url\": \"%s\"}]", | |
3030 result_id, | |
3031 download_url.c_str()))); | |
3032 ASSERT_TRUE(WaitFor( | |
3033 events::kOnDownloadDeterminingFilename, | |
3034 base::StringPrintf("[{\"id\": %d," | |
3035 " \"filename\":\"slow.txt\"}]", | |
3036 result_id))); | |
3037 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
3038 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
3039 | |
3040 // Respond to the onDeterminingFilename. | |
3041 // Also test that DetermineFilename allows (chrome) extensions to set | |
3042 // filenames without (filename) extensions. (Don't ask about v8 extensions or | |
3043 // python extensions or kernel extensions or firefox extensions...) | |
3044 error = ""; | |
3045 ASSERT_TRUE(ExtensionDownloadsEventRouter::DetermineFilename( | |
3046 browser()->profile(), | |
3047 false, | |
3048 GetExtensionId(), | |
3049 result_id, | |
3050 base::FilePath(FILE_PATH_LITERAL("foo")), | |
3051 extensions::api::downloads::FILENAME_CONFLICT_ACTION_OVERWRITE, | |
3052 &error)); | |
3053 EXPECT_EQ("", error); | |
3054 | |
3055 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3056 base::StringPrintf("[{\"id\": %d," | |
3057 " \"filename\": {" | |
3058 " \"previous\": \"\"," | |
3059 " \"current\": \"%s\"}}]", | |
3060 result_id, | |
3061 GetFilename("foo").c_str()))); | |
3062 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3063 base::StringPrintf("[{\"id\": %d," | |
3064 " \"state\": {" | |
3065 " \"previous\": \"in_progress\"," | |
3066 " \"current\": \"complete\"}}]", | |
3067 result_id))); | |
3068 } | |
3069 | |
3070 // TODO test precedence rules: install_time | |
3071 | |
3072 IN_PROC_BROWSER_TEST_F( | |
3073 DownloadExtensionTest, | |
3074 DownloadExtensionTest_OnDeterminingFilename_RemoveFilenameDeterminer) { | |
3075 ASSERT_TRUE(StartEmbeddedTestServer()); | |
3076 ASSERT_TRUE(test_server()->Start()); | |
3077 GoOnTheRecord(); | |
3078 LoadExtension("downloads_split"); | |
3079 content::RenderProcessHost* host = AddFilenameDeterminer(); | |
3080 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
3081 | |
3082 // Start downloading a file. | |
3083 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
3084 new DownloadsDownloadFunction(), base::StringPrintf( | |
3085 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
3086 ASSERT_TRUE(result.get()); | |
3087 int result_id = -1; | |
3088 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
3089 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
3090 ASSERT_TRUE(item); | |
3091 ScopedCancellingItem canceller(item); | |
3092 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
3093 | |
3094 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
3095 base::StringPrintf("[{\"danger\": \"safe\"," | |
3096 " \"incognito\": false," | |
3097 " \"id\": %d," | |
3098 " \"mime\": \"text/plain\"," | |
3099 " \"paused\": false," | |
3100 " \"url\": \"%s\"}]", | |
3101 result_id, | |
3102 download_url.c_str()))); | |
3103 ASSERT_TRUE(WaitFor( | |
3104 events::kOnDownloadDeterminingFilename, | |
3105 base::StringPrintf("[{\"id\": %d," | |
3106 " \"filename\":\"slow.txt\"}]", | |
3107 result_id))); | |
3108 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
3109 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
3110 | |
3111 // Remove a determiner while waiting for it. | |
3112 RemoveFilenameDeterminer(host); | |
3113 | |
3114 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3115 base::StringPrintf("[{\"id\": %d," | |
3116 " \"state\": {" | |
3117 " \"previous\": \"in_progress\"," | |
3118 " \"current\": \"complete\"}}]", | |
3119 result_id))); | |
3120 } | |
3121 | |
3122 IN_PROC_BROWSER_TEST_F( | |
3123 DownloadExtensionTest, | |
3124 DownloadExtensionTest_OnDeterminingFilename_IncognitoSplit) { | |
3125 LoadExtension("downloads_split"); | |
3126 ASSERT_TRUE(StartEmbeddedTestServer()); | |
3127 ASSERT_TRUE(test_server()->Start()); | |
3128 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
3129 | |
3130 GoOnTheRecord(); | |
3131 AddFilenameDeterminer(); | |
3132 | |
3133 GoOffTheRecord(); | |
3134 AddFilenameDeterminer(); | |
3135 | |
3136 // Start an on-record download. | |
3137 GoOnTheRecord(); | |
3138 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
3139 new DownloadsDownloadFunction(), base::StringPrintf( | |
3140 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
3141 ASSERT_TRUE(result.get()); | |
3142 int result_id = -1; | |
3143 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
3144 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
3145 ASSERT_TRUE(item); | |
3146 ScopedCancellingItem canceller(item); | |
3147 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
3148 | |
3149 // Wait for the onCreated and onDeterminingFilename events. | |
3150 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
3151 base::StringPrintf("[{\"danger\": \"safe\"," | |
3152 " \"incognito\": false," | |
3153 " \"id\": %d," | |
3154 " \"mime\": \"text/plain\"," | |
3155 " \"paused\": false," | |
3156 " \"url\": \"%s\"}]", | |
3157 result_id, | |
3158 download_url.c_str()))); | |
3159 ASSERT_TRUE(WaitFor( | |
3160 events::kOnDownloadDeterminingFilename, | |
3161 base::StringPrintf("[{\"id\": %d," | |
3162 " \"incognito\": false," | |
3163 " \"filename\":\"slow.txt\"}]", | |
3164 result_id))); | |
3165 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
3166 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
3167 | |
3168 // Respond to the onDeterminingFilename events. | |
3169 std::string error; | |
3170 ASSERT_TRUE(ExtensionDownloadsEventRouter::DetermineFilename( | |
3171 current_browser()->profile(), | |
3172 false, | |
3173 GetExtensionId(), | |
3174 result_id, | |
3175 base::FilePath(FILE_PATH_LITERAL("42.txt")), | |
3176 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
3177 &error)); | |
3178 EXPECT_EQ("", error); | |
3179 | |
3180 // The download should complete successfully. | |
3181 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3182 base::StringPrintf("[{\"id\": %d," | |
3183 " \"filename\": {" | |
3184 " \"previous\": \"\"," | |
3185 " \"current\": \"%s\"}}]", | |
3186 result_id, | |
3187 GetFilename("42.txt").c_str()))); | |
3188 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3189 base::StringPrintf("[{\"id\": %d," | |
3190 " \"state\": {" | |
3191 " \"previous\": \"in_progress\"," | |
3192 " \"current\": \"complete\"}}]", | |
3193 result_id))); | |
3194 | |
3195 // Start an incognito download for comparison. | |
3196 GoOffTheRecord(); | |
3197 result.reset(RunFunctionAndReturnResult( | |
3198 new DownloadsDownloadFunction(), base::StringPrintf( | |
3199 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
3200 ASSERT_TRUE(result.get()); | |
3201 result_id = -1; | |
3202 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
3203 item = GetCurrentManager()->GetDownload(result_id); | |
3204 ASSERT_TRUE(item); | |
3205 ScopedCancellingItem canceller2(item); | |
3206 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
3207 | |
3208 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
3209 base::StringPrintf("[{\"danger\": \"safe\"," | |
3210 " \"incognito\": true," | |
3211 " \"id\": %d," | |
3212 " \"mime\": \"text/plain\"," | |
3213 " \"paused\": false," | |
3214 " \"url\": \"%s\"}]", | |
3215 result_id, | |
3216 download_url.c_str()))); | |
3217 // On-Record renderers should not see events for off-record items. | |
3218 ASSERT_TRUE(WaitFor( | |
3219 events::kOnDownloadDeterminingFilename, | |
3220 base::StringPrintf("[{\"id\": %d," | |
3221 " \"incognito\": true," | |
3222 " \"filename\":\"slow.txt\"}]", | |
3223 result_id))); | |
3224 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
3225 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
3226 | |
3227 // Respond to the onDeterminingFilename. | |
3228 error = ""; | |
3229 ASSERT_TRUE(ExtensionDownloadsEventRouter::DetermineFilename( | |
3230 current_browser()->profile(), | |
3231 false, | |
3232 GetExtensionId(), | |
3233 result_id, | |
3234 base::FilePath(FILE_PATH_LITERAL("5.txt")), | |
3235 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
3236 &error)); | |
3237 EXPECT_EQ("", error); | |
3238 | |
3239 // The download should complete successfully. | |
3240 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3241 base::StringPrintf("[{\"id\": %d," | |
3242 " \"filename\": {" | |
3243 " \"previous\": \"\"," | |
3244 " \"current\": \"%s\"}}]", | |
3245 result_id, | |
3246 GetFilename("5.txt").c_str()))); | |
3247 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3248 base::StringPrintf("[{\"id\": %d," | |
3249 " \"state\": {" | |
3250 " \"previous\": \"in_progress\"," | |
3251 " \"current\": \"complete\"}}]", | |
3252 result_id))); | |
3253 } | |
3254 | |
3255 IN_PROC_BROWSER_TEST_F( | |
3256 DownloadExtensionTest, | |
3257 DownloadExtensionTest_OnDeterminingFilename_IncognitoSpanning) { | |
3258 LoadExtension("downloads_spanning"); | |
3259 ASSERT_TRUE(StartEmbeddedTestServer()); | |
3260 ASSERT_TRUE(test_server()->Start()); | |
3261 std::string download_url = test_server()->GetURL("slow?0").spec(); | |
3262 | |
3263 GoOnTheRecord(); | |
3264 AddFilenameDeterminer(); | |
3265 | |
3266 // There is a single extension renderer that sees both on-record and | |
3267 // off-record events. The extension functions see the on-record profile with | |
3268 // include_incognito=true. | |
3269 | |
3270 // Start an on-record download. | |
3271 GoOnTheRecord(); | |
3272 scoped_ptr<base::Value> result(RunFunctionAndReturnResult( | |
3273 new DownloadsDownloadFunction(), base::StringPrintf( | |
3274 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
3275 ASSERT_TRUE(result.get()); | |
3276 int result_id = -1; | |
3277 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
3278 DownloadItem* item = GetCurrentManager()->GetDownload(result_id); | |
3279 ASSERT_TRUE(item); | |
3280 ScopedCancellingItem canceller(item); | |
3281 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
3282 | |
3283 // Wait for the onCreated and onDeterminingFilename events. | |
3284 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
3285 base::StringPrintf("[{\"danger\": \"safe\"," | |
3286 " \"incognito\": false," | |
3287 " \"id\": %d," | |
3288 " \"mime\": \"text/plain\"," | |
3289 " \"paused\": false," | |
3290 " \"url\": \"%s\"}]", | |
3291 result_id, | |
3292 download_url.c_str()))); | |
3293 ASSERT_TRUE(WaitFor( | |
3294 events::kOnDownloadDeterminingFilename, | |
3295 base::StringPrintf("[{\"id\": %d," | |
3296 " \"incognito\": false," | |
3297 " \"filename\":\"slow.txt\"}]", | |
3298 result_id))); | |
3299 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
3300 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
3301 | |
3302 // Respond to the onDeterminingFilename events. | |
3303 std::string error; | |
3304 ASSERT_TRUE(ExtensionDownloadsEventRouter::DetermineFilename( | |
3305 current_browser()->profile(), | |
3306 true, | |
3307 GetExtensionId(), | |
3308 result_id, | |
3309 base::FilePath(FILE_PATH_LITERAL("42.txt")), | |
3310 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
3311 &error)); | |
3312 EXPECT_EQ("", error); | |
3313 | |
3314 // The download should complete successfully. | |
3315 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3316 base::StringPrintf("[{\"id\": %d," | |
3317 " \"filename\": {" | |
3318 " \"previous\": \"\"," | |
3319 " \"current\": \"%s\"}}]", | |
3320 result_id, | |
3321 GetFilename("42.txt").c_str()))); | |
3322 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3323 base::StringPrintf("[{\"id\": %d," | |
3324 " \"state\": {" | |
3325 " \"previous\": \"in_progress\"," | |
3326 " \"current\": \"complete\"}}]", | |
3327 result_id))); | |
3328 | |
3329 // Start an incognito download for comparison. | |
3330 GoOffTheRecord(); | |
3331 result.reset(RunFunctionAndReturnResult( | |
3332 new DownloadsDownloadFunction(), base::StringPrintf( | |
3333 "[{\"url\": \"%s\"}]", download_url.c_str()))); | |
3334 ASSERT_TRUE(result.get()); | |
3335 result_id = -1; | |
3336 ASSERT_TRUE(result->GetAsInteger(&result_id)); | |
3337 item = GetCurrentManager()->GetDownload(result_id); | |
3338 ASSERT_TRUE(item); | |
3339 ScopedCancellingItem canceller2(item); | |
3340 ASSERT_EQ(download_url, item->GetOriginalUrl().spec()); | |
3341 | |
3342 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
3343 base::StringPrintf("[{\"danger\": \"safe\"," | |
3344 " \"incognito\": true," | |
3345 " \"id\": %d," | |
3346 " \"mime\": \"text/plain\"," | |
3347 " \"paused\": false," | |
3348 " \"url\": \"%s\"}]", | |
3349 result_id, | |
3350 download_url.c_str()))); | |
3351 ASSERT_TRUE(WaitFor( | |
3352 events::kOnDownloadDeterminingFilename, | |
3353 base::StringPrintf("[{\"id\": %d," | |
3354 " \"incognito\": true," | |
3355 " \"filename\":\"slow.txt\"}]", | |
3356 result_id))); | |
3357 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
3358 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
3359 | |
3360 // Respond to the onDeterminingFilename. | |
3361 error = ""; | |
3362 ASSERT_TRUE(ExtensionDownloadsEventRouter::DetermineFilename( | |
3363 current_browser()->profile(), | |
3364 true, | |
3365 GetExtensionId(), | |
3366 result_id, | |
3367 base::FilePath(FILE_PATH_LITERAL("42.txt")), | |
3368 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
3369 &error)); | |
3370 EXPECT_EQ("", error); | |
3371 | |
3372 // The download should complete successfully. | |
3373 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3374 base::StringPrintf("[{\"id\": %d," | |
3375 " \"filename\": {" | |
3376 " \"previous\": \"\"," | |
3377 " \"current\": \"%s\"}}]", | |
3378 result_id, | |
3379 GetFilename("42 (1).txt").c_str()))); | |
3380 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3381 base::StringPrintf("[{\"id\": %d," | |
3382 " \"state\": {" | |
3383 " \"previous\": \"in_progress\"," | |
3384 " \"current\": \"complete\"}}]", | |
3385 result_id))); | |
3386 } | |
3387 | |
3388 #if defined(OS_WIN) | |
3389 // This test is very flaky on Win XP and Aura. http://crbug.com/248438 | |
3390 #define MAYBE_DownloadExtensionTest_OnDeterminingFilename_InterruptedResume \ | |
3391 DISABLED_DownloadExtensionTest_OnDeterminingFilename_InterruptedResume | |
3392 #else | |
3393 #define MAYBE_DownloadExtensionTest_OnDeterminingFilename_InterruptedResume \ | |
3394 DownloadExtensionTest_OnDeterminingFilename_InterruptedResume | |
3395 #endif | |
3396 | |
3397 // Test download interruption while extensions determining filename. Should not | |
3398 // re-dispatch onDeterminingFilename. | |
3399 IN_PROC_BROWSER_TEST_F( | |
3400 DownloadExtensionTest, | |
3401 MAYBE_DownloadExtensionTest_OnDeterminingFilename_InterruptedResume) { | |
3402 CommandLine::ForCurrentProcess()->AppendSwitch( | |
3403 switches::kEnableDownloadResumption); | |
3404 LoadExtension("downloads_split"); | |
3405 ASSERT_TRUE(StartEmbeddedTestServer()); | |
3406 ASSERT_TRUE(test_server()->Start()); | |
3407 GoOnTheRecord(); | |
3408 content::RenderProcessHost* host = AddFilenameDeterminer(); | |
3409 | |
3410 // Start a download. | |
3411 DownloadItem* item = NULL; | |
3412 { | |
3413 DownloadManager* manager = GetCurrentManager(); | |
3414 scoped_ptr<content::DownloadTestObserver> observer( | |
3415 new JustInProgressDownloadObserver(manager, 1)); | |
3416 ASSERT_EQ(0, manager->InProgressCount()); | |
3417 // Tabs created just for a download are automatically closed, invalidating | |
3418 // the download's WebContents. Downloads without WebContents cannot be | |
3419 // resumed. http://crbug.com/225901 | |
3420 ui_test_utils::NavigateToURLWithDisposition( | |
3421 current_browser(), | |
3422 GURL(URLRequestSlowDownloadJob::kUnknownSizeUrl), | |
3423 CURRENT_TAB, | |
3424 ui_test_utils::BROWSER_TEST_NONE); | |
3425 observer->WaitForFinished(); | |
3426 EXPECT_EQ(1u, observer->NumDownloadsSeenInState(DownloadItem::IN_PROGRESS)); | |
3427 DownloadManager::DownloadVector items; | |
3428 manager->GetAllDownloads(&items); | |
3429 for (DownloadManager::DownloadVector::iterator iter = items.begin(); | |
3430 iter != items.end(); ++iter) { | |
3431 if ((*iter)->GetState() == DownloadItem::IN_PROGRESS) { | |
3432 // There should be only one IN_PROGRESS item. | |
3433 EXPECT_EQ(NULL, item); | |
3434 item = *iter; | |
3435 } | |
3436 } | |
3437 ASSERT_TRUE(item); | |
3438 } | |
3439 ScopedCancellingItem canceller(item); | |
3440 | |
3441 // Wait for the onCreated and onDeterminingFilename event. | |
3442 ASSERT_TRUE(WaitFor(events::kOnDownloadCreated, | |
3443 base::StringPrintf("[{\"danger\": \"safe\"," | |
3444 " \"incognito\": false," | |
3445 " \"id\": %d," | |
3446 " \"mime\": \"application/octet-stream\"," | |
3447 " \"paused\": false}]", | |
3448 item->GetId()))); | |
3449 ASSERT_TRUE(WaitFor( | |
3450 events::kOnDownloadDeterminingFilename, | |
3451 base::StringPrintf("[{\"id\": %d," | |
3452 " \"incognito\": false," | |
3453 " \"filename\":\"download-unknown-size\"}]", | |
3454 item->GetId()))); | |
3455 ASSERT_TRUE(item->GetTargetFilePath().empty()); | |
3456 ASSERT_EQ(DownloadItem::IN_PROGRESS, item->GetState()); | |
3457 | |
3458 ClearEvents(); | |
3459 ui_test_utils::NavigateToURLWithDisposition( | |
3460 current_browser(), | |
3461 GURL(URLRequestSlowDownloadJob::kErrorDownloadUrl), | |
3462 NEW_BACKGROUND_TAB, | |
3463 ui_test_utils::BROWSER_TEST_WAIT_FOR_NAVIGATION); | |
3464 | |
3465 // Errors caught before filename determination are delayed until after | |
3466 // filename determination. | |
3467 std::string error; | |
3468 ASSERT_TRUE(ExtensionDownloadsEventRouter::DetermineFilename( | |
3469 current_browser()->profile(), | |
3470 false, | |
3471 GetExtensionId(), | |
3472 item->GetId(), | |
3473 base::FilePath(FILE_PATH_LITERAL("42.txt")), | |
3474 extensions::api::downloads::FILENAME_CONFLICT_ACTION_UNIQUIFY, | |
3475 &error)) << error; | |
3476 EXPECT_EQ("", error); | |
3477 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3478 base::StringPrintf("[{\"id\": %d," | |
3479 " \"filename\": {" | |
3480 " \"previous\": \"\"," | |
3481 " \"current\": \"%s\"}}]", | |
3482 item->GetId(), | |
3483 GetFilename("42.txt").c_str()))); | |
3484 | |
3485 content::DownloadUpdatedObserver interrupted(item, base::Bind( | |
3486 ItemIsInterrupted)); | |
3487 ASSERT_TRUE(interrupted.WaitForEvent()); | |
3488 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3489 base::StringPrintf("[{\"id\": %d," | |
3490 " \"error\":{\"current\":20}," | |
3491 " \"state\":{" | |
3492 " \"previous\":\"in_progress\"," | |
3493 " \"current\":\"interrupted\"}}]", | |
3494 item->GetId()))); | |
3495 | |
3496 ClearEvents(); | |
3497 // Downloads that are restarted on resumption trigger another download target | |
3498 // determination. | |
3499 RemoveFilenameDeterminer(host); | |
3500 item->Resume(); | |
3501 | |
3502 // Errors caught before filename determination is complete are delayed until | |
3503 // after filename determination so that, on resumption, filename determination | |
3504 // does not need to be re-done. So, there will not be a second | |
3505 // onDeterminingFilename event. | |
3506 | |
3507 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3508 base::StringPrintf("[{\"id\": %d," | |
3509 " \"error\":{\"previous\":20}," | |
3510 " \"state\":{" | |
3511 " \"previous\":\"interrupted\"," | |
3512 " \"current\":\"in_progress\"}}]", | |
3513 item->GetId()))); | |
3514 | |
3515 ClearEvents(); | |
3516 FinishPendingSlowDownloads(); | |
3517 | |
3518 // The download should complete successfully. | |
3519 ASSERT_TRUE(WaitFor(events::kOnDownloadChanged, | |
3520 base::StringPrintf("[{\"id\": %d," | |
3521 " \"state\": {" | |
3522 " \"previous\": \"in_progress\"," | |
3523 " \"current\": \"complete\"}}]", | |
3524 item->GetId()))); | |
3525 } | |
3526 | |
3527 // TODO(benjhayden) Figure out why DisableExtension() does not fire | |
3528 // OnListenerRemoved. | |
3529 | |
3530 // TODO(benjhayden) Test that the shelf is shown for download() both with and | |
3531 // without a WebContents. | |
3532 | |
3533 class DownloadsApiTest : public ExtensionApiTest { | |
3534 public: | |
3535 DownloadsApiTest() {} | |
3536 virtual ~DownloadsApiTest() {} | |
3537 private: | |
3538 DISALLOW_COPY_AND_ASSIGN(DownloadsApiTest); | |
3539 }; | |
3540 | |
3541 | |
3542 IN_PROC_BROWSER_TEST_F(DownloadsApiTest, DownloadsApiTest) { | |
3543 ASSERT_TRUE(RunExtensionTest("downloads")) << message_; | |
3544 } | |
OLD | NEW |