Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1217)

Side by Side Diff: third_party/WebKit/Source/core/dom/DocumentTest.cpp

Issue 1723753002: Make Document::isSecureContext() work for OOPIFs (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: more rebase fixups Created 4 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright (c) 2014, Google Inc. All rights reserved. 2 * Copyright (c) 2014, Google Inc. All rights reserved.
3 * 3 *
4 * Redistribution and use in source and binary forms, with or without 4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are 5 * modification, are permitted provided that the following conditions are
6 * met: 6 * met:
7 * 7 *
8 * * Redistributions of source code must retain the above copyright 8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer. 9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above 10 * * Redistributions in binary form must reproduce the above
(...skipping 19 matching lines...) Expand all
30 30
31 #include "core/dom/Document.h" 31 #include "core/dom/Document.h"
32 32
33 #include "core/dom/DocumentVisibilityObserver.h" 33 #include "core/dom/DocumentVisibilityObserver.h"
34 #include "core/frame/FrameView.h" 34 #include "core/frame/FrameView.h"
35 #include "core/html/HTMLHeadElement.h" 35 #include "core/html/HTMLHeadElement.h"
36 #include "core/html/HTMLLinkElement.h" 36 #include "core/html/HTMLLinkElement.h"
37 #include "core/testing/DummyPageHolder.h" 37 #include "core/testing/DummyPageHolder.h"
38 #include "platform/heap/Handle.h" 38 #include "platform/heap/Handle.h"
39 #include "platform/weborigin/ReferrerPolicy.h" 39 #include "platform/weborigin/ReferrerPolicy.h"
40 #include "platform/weborigin/SchemeRegistry.h"
40 #include "platform/weborigin/SecurityOrigin.h" 41 #include "platform/weborigin/SecurityOrigin.h"
41 #include "testing/gmock/include/gmock/gmock.h" 42 #include "testing/gmock/include/gmock/gmock.h"
42 #include "testing/gtest/include/gtest/gtest.h" 43 #include "testing/gtest/include/gtest/gtest.h"
43 44
44 namespace blink { 45 namespace blink {
45 46
46 class DocumentTest : public ::testing::Test { 47 class DocumentTest : public ::testing::Test {
47 protected: 48 protected:
48 void SetUp() override; 49 void SetUp() override;
49 50
(...skipping 296 matching lines...) Expand 10 before | Expand all | Expand 10 after
346 element->setAttribute(blink::HTMLNames::classAttr, "a"); 347 element->setAttribute(blink::HTMLNames::classAttr, "a");
347 EXPECT_NE(previousStyleVersion, document().styleVersion()); 348 EXPECT_NE(previousStyleVersion, document().styleVersion());
348 349
349 document().view()->updateAllLifecyclePhases(); 350 document().view()->updateAllLifecyclePhases();
350 351
351 previousStyleVersion = document().styleVersion(); 352 previousStyleVersion = document().styleVersion();
352 element->setAttribute(blink::HTMLNames::classAttr, "a b"); 353 element->setAttribute(blink::HTMLNames::classAttr, "a b");
353 EXPECT_NE(previousStyleVersion, document().styleVersion()); 354 EXPECT_NE(previousStyleVersion, document().styleVersion());
354 } 355 }
355 356
357 TEST_F(DocumentTest, EnforceSandboxFlags)
358 {
359 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromString("http://exa mple.test");
360 document().setSecurityOrigin(origin);
361 SandboxFlags mask = SandboxNavigation;
362 document().enforceSandboxFlags(mask);
363 EXPECT_EQ(origin, document().getSecurityOrigin());
364 EXPECT_FALSE(document().getSecurityOrigin()->isPotentiallyTrustworthy());
365
366 mask |= SandboxOrigin;
367 document().enforceSandboxFlags(mask);
368 EXPECT_TRUE(document().getSecurityOrigin()->isUnique());
369 EXPECT_FALSE(document().getSecurityOrigin()->isPotentiallyTrustworthy());
370
371 // A unique origin does not bypass secure context checks unless it
372 // is also potentially trustworthy.
373 SchemeRegistry::registerURLSchemeBypassingSecureContextCheck("very-special-s cheme");
374 origin = SecurityOrigin::createFromString("very-special-scheme://example.tes t");
375 document().setSecurityOrigin(origin);
376 document().enforceSandboxFlags(mask);
377 EXPECT_TRUE(document().getSecurityOrigin()->isUnique());
378 EXPECT_FALSE(document().getSecurityOrigin()->isPotentiallyTrustworthy());
379
380 SchemeRegistry::registerURLSchemeAsSecure("very-special-scheme");
381 document().setSecurityOrigin(origin);
382 document().enforceSandboxFlags(mask);
383 EXPECT_TRUE(document().getSecurityOrigin()->isUnique());
384 EXPECT_TRUE(document().getSecurityOrigin()->isPotentiallyTrustworthy());
385
386 origin = SecurityOrigin::createFromString("https://example.test");
387 document().setSecurityOrigin(origin);
388 document().enforceSandboxFlags(mask);
389 EXPECT_TRUE(document().getSecurityOrigin()->isUnique());
390 EXPECT_TRUE(document().getSecurityOrigin()->isPotentiallyTrustworthy());
391 }
392
356 } // namespace blink 393 } // namespace blink
OLDNEW
« no previous file with comments | « third_party/WebKit/Source/core/dom/Document.cpp ('k') | third_party/WebKit/Source/core/dom/SecurityContext.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698