Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 /* | 1 /* |
| 2 * Copyright (c) 2014, Google Inc. All rights reserved. | 2 * Copyright (c) 2014, Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 19 matching lines...) Expand all Loading... | |
| 30 | 30 |
| 31 #include "core/dom/Document.h" | 31 #include "core/dom/Document.h" |
| 32 | 32 |
| 33 #include "core/dom/DocumentVisibilityObserver.h" | 33 #include "core/dom/DocumentVisibilityObserver.h" |
| 34 #include "core/frame/FrameView.h" | 34 #include "core/frame/FrameView.h" |
| 35 #include "core/html/HTMLHeadElement.h" | 35 #include "core/html/HTMLHeadElement.h" |
| 36 #include "core/html/HTMLLinkElement.h" | 36 #include "core/html/HTMLLinkElement.h" |
| 37 #include "core/testing/DummyPageHolder.h" | 37 #include "core/testing/DummyPageHolder.h" |
| 38 #include "platform/heap/Handle.h" | 38 #include "platform/heap/Handle.h" |
| 39 #include "platform/weborigin/ReferrerPolicy.h" | 39 #include "platform/weborigin/ReferrerPolicy.h" |
| 40 #include "platform/weborigin/SchemeRegistry.h" | |
| 40 #include "platform/weborigin/SecurityOrigin.h" | 41 #include "platform/weborigin/SecurityOrigin.h" |
| 41 #include "testing/gmock/include/gmock/gmock.h" | 42 #include "testing/gmock/include/gmock/gmock.h" |
| 42 #include "testing/gtest/include/gtest/gtest.h" | 43 #include "testing/gtest/include/gtest/gtest.h" |
| 43 | 44 |
| 44 namespace blink { | 45 namespace blink { |
| 45 | 46 |
| 46 class DocumentTest : public ::testing::Test { | 47 class DocumentTest : public ::testing::Test { |
| 47 protected: | 48 protected: |
| 48 void SetUp() override; | 49 void SetUp() override; |
| 49 | 50 |
| (...skipping 296 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 346 element->setAttribute(blink::HTMLNames::classAttr, "a"); | 347 element->setAttribute(blink::HTMLNames::classAttr, "a"); |
| 347 EXPECT_NE(previousStyleVersion, document().styleVersion()); | 348 EXPECT_NE(previousStyleVersion, document().styleVersion()); |
| 348 | 349 |
| 349 document().view()->updateAllLifecyclePhases(); | 350 document().view()->updateAllLifecyclePhases(); |
| 350 | 351 |
| 351 previousStyleVersion = document().styleVersion(); | 352 previousStyleVersion = document().styleVersion(); |
| 352 element->setAttribute(blink::HTMLNames::classAttr, "a b"); | 353 element->setAttribute(blink::HTMLNames::classAttr, "a b"); |
| 353 EXPECT_NE(previousStyleVersion, document().styleVersion()); | 354 EXPECT_NE(previousStyleVersion, document().styleVersion()); |
| 354 } | 355 } |
| 355 | 356 |
| 357 TEST_F(DocumentTest, EnforceSandboxFlags) | |
| 358 { | |
| 359 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromString("http://exa mple.test"); | |
| 360 document().setSecurityOrigin(origin); | |
| 361 SandboxFlags mask = SandboxNavigation; | |
| 362 document().enforceSandboxFlags(mask); | |
| 363 EXPECT_EQ(origin, document().securityOrigin()); | |
| 364 EXPECT_FALSE(document().securityOrigin()->isPotentiallyTrustworthy()); | |
| 365 EXPECT_FALSE(document().securityOrigin()->bypassSecureContextCheck()); | |
| 366 | |
| 367 mask |= SandboxOrigin; | |
| 368 document().enforceSandboxFlags(mask); | |
| 369 EXPECT_TRUE(document().securityOrigin()->isUnique()); | |
| 370 EXPECT_FALSE(document().securityOrigin()->isPotentiallyTrustworthy()); | |
| 371 EXPECT_FALSE(document().securityOrigin()->bypassSecureContextCheck()); | |
| 372 | |
| 373 SchemeRegistry::registerURLSchemeBypassingSecureContextCheck("special-scheme "); | |
| 374 // A unique origin does not bypass secure context checks unless it is also p otentially trustworthy. | |
| 375 origin = SecurityOrigin::createFromString("special-scheme://example.test"); | |
| 376 document().setSecurityOrigin(origin); | |
| 377 document().enforceSandboxFlags(mask); | |
| 378 EXPECT_TRUE(document().securityOrigin()->isUnique()); | |
| 379 EXPECT_FALSE(document().securityOrigin()->isPotentiallyTrustworthy()); | |
|
alexmos
2016/03/09 18:45:06
It seems this part of the test still might have be
estark
2016/03/10 00:53:44
Done.
| |
| 380 EXPECT_FALSE(document().securityOrigin()->bypassSecureContextCheck()); | |
| 381 | |
| 382 SchemeRegistry::registerURLSchemeBypassingSecureContextCheck("very-special-s cheme"); | |
| 383 SchemeRegistry::registerURLSchemeAsSecure("very-special-scheme"); | |
| 384 origin = SecurityOrigin::createFromString("very-special-scheme://example.tes t"); | |
| 385 document().setSecurityOrigin(origin); | |
| 386 document().enforceSandboxFlags(mask); | |
| 387 EXPECT_TRUE(document().securityOrigin()->isUnique()); | |
| 388 EXPECT_TRUE(document().securityOrigin()->isPotentiallyTrustworthy()); | |
| 389 EXPECT_TRUE(document().securityOrigin()->bypassSecureContextCheck()); | |
| 390 | |
| 391 origin = SecurityOrigin::createFromString("https://example.test"); | |
| 392 document().setSecurityOrigin(origin); | |
| 393 document().enforceSandboxFlags(mask); | |
| 394 EXPECT_TRUE(document().securityOrigin()->isUnique()); | |
| 395 EXPECT_TRUE(document().securityOrigin()->isPotentiallyTrustworthy()); | |
| 396 EXPECT_FALSE(document().securityOrigin()->bypassSecureContextCheck()); | |
| 397 } | |
| 398 | |
| 356 } // namespace blink | 399 } // namespace blink |
| OLD | NEW |