Chromium Code Reviews| Index: third_party/WebKit/Source/web/tests/WebFrameTest.cpp |
| diff --git a/third_party/WebKit/Source/web/tests/WebFrameTest.cpp b/third_party/WebKit/Source/web/tests/WebFrameTest.cpp |
| index 0651c10139c5e73148a425565337cce38caaf789..08d7690a21cc3f3a3796c78488a9258a80dad086 100644 |
| --- a/third_party/WebKit/Source/web/tests/WebFrameTest.cpp |
| +++ b/third_party/WebKit/Source/web/tests/WebFrameTest.cpp |
| @@ -90,7 +90,9 @@ |
| #include "platform/weborigin/SecurityOrigin.h" |
| #include "public/platform/Platform.h" |
| #include "public/platform/WebCachePolicy.h" |
| +#include "public/platform/WebClipboard.h" |
| #include "public/platform/WebFloatRect.h" |
| +#include "public/platform/WebMockClipboard.h" |
| #include "public/platform/WebSecurityOrigin.h" |
| #include "public/platform/WebThread.h" |
| #include "public/platform/WebURL.h" |
| @@ -8669,4 +8671,214 @@ TEST(WebFrameGlobalReuseTest, ReuseForMainFrameIfEnabled) |
| EXPECT_EQ("world", toCoreString(result->ToString(mainFrame->mainWorldScriptContext()).ToLocalChecked())); |
| } |
| +static void setSecurityOrigin(WebFrame* frame, PassRefPtr<SecurityOrigin> securityOrigin) |
|
dcheng
2016/06/12 05:58:34
Lines 8674 through 8731 look like they're from cod
|
| +{ |
| + Document* document = frame->document(); |
| + document->setSecurityOrigin(securityOrigin); |
| +} |
| + |
| +TEST_F(WebFrameTest, CanHaveSecureChild) |
| +{ |
| + FrameTestHelpers::WebViewHelper helper; |
| + FrameTestHelpers::TestWebFrameClient client; |
| + helper.initialize(true, &client, nullptr, nullptr); |
| + WebFrame* mainFrame = helper.webView()->mainFrame(); |
| + RefPtr<SecurityOrigin> secureOrigin = SecurityOrigin::createFromString("https://example.com"); |
| + RefPtr<SecurityOrigin> insecureOrigin = SecurityOrigin::createFromString("http://example.com"); |
| + |
| + // Secure frame. |
| + setSecurityOrigin(mainFrame, secureOrigin); |
| + ASSERT_TRUE(mainFrame->canHaveSecureChild()); |
| + |
| + // Insecure frame. |
| + setSecurityOrigin(mainFrame, insecureOrigin); |
| + ASSERT_FALSE(mainFrame->canHaveSecureChild()); |
| + |
| + // Create a chain of frames. |
| + FrameTestHelpers::loadFrame(mainFrame, "data:text/html,<iframe></iframe>"); |
| + WebFrame* childFrame = mainFrame->firstChild(); |
| + FrameTestHelpers::loadFrame(childFrame, "data:text/html,<iframe></iframe>"); |
| + WebFrame* grandchildFrame = childFrame->firstChild(); |
| + |
| + // Secure -> insecure -> secure frame. |
| + setSecurityOrigin(mainFrame, secureOrigin); |
| + setSecurityOrigin(childFrame, insecureOrigin); |
| + setSecurityOrigin(grandchildFrame, secureOrigin); |
| + ASSERT_TRUE(mainFrame->canHaveSecureChild()); |
| + ASSERT_FALSE(childFrame->canHaveSecureChild()); |
| + ASSERT_FALSE(grandchildFrame->canHaveSecureChild()); |
| + |
| + // A document in an insecure context can be considered secure if it has a |
| + // scheme that bypasses the secure context check. But the exception doesn't |
| + // apply to children of that document's frame. |
| + SchemeRegistry::registerURLSchemeBypassingSecureContextCheck("very-special-scheme"); |
| + SchemeRegistry::registerURLSchemeAsSecure("very-special-scheme"); |
| + RefPtr<SecurityOrigin> specialOrigin = SecurityOrigin::createFromString("very-special-scheme://example.com"); |
| + |
| + setSecurityOrigin(mainFrame, insecureOrigin); |
| + setSecurityOrigin(childFrame, specialOrigin); |
| + setSecurityOrigin(grandchildFrame, secureOrigin); |
| + ASSERT_FALSE(mainFrame->canHaveSecureChild()); |
| + ASSERT_FALSE(childFrame->canHaveSecureChild()); |
| + ASSERT_FALSE(grandchildFrame->canHaveSecureChild()); |
| + Document* mainDocument = mainFrame->document(); |
| + Document* childDocument = childFrame->document(); |
| + Document* grandchildDocument = grandchildFrame->document(); |
| + ASSERT_FALSE(mainDocument->isSecureContext()); |
| + ASSERT_TRUE(childDocument->isSecureContext()); |
| + ASSERT_FALSE(grandchildDocument->isSecureContext()); |
| +} |
| + |
| +class SaveImageFromDataURLWebFrameClient : public FrameTestHelpers::TestWebFrameClient { |
| +public: |
| + // WebFrameClient methods |
| + void saveImageFromDataURL(const WebString& dataURL) override { m_dataURL = dataURL; } |
| + |
| + // Local methods |
| + const WebString& result() const { return m_dataURL; } |
| + void reset() { m_dataURL = WebString(); } |
| + |
| +private: |
| + WebString m_dataURL; |
| +}; |
| + |
| +TEST_F(WebFrameTest, SaveImageAt) |
| +{ |
| + std::string url = m_baseURL + "image-with-data-url.html"; |
| + URLTestHelpers::registerMockedURLLoad(toKURL(url), "image-with-data-url.html"); |
| + URLTestHelpers::registerMockedURLLoad(toKURL("http://test"), "white-1x1.png"); |
| + |
| + FrameTestHelpers::WebViewHelper helper; |
| + SaveImageFromDataURLWebFrameClient client; |
| + WebViewImpl* webView = helper.initializeAndLoad(url, true, &client); |
| + webView->resize(WebSize(400, 400)); |
| + webView->updateAllLifecyclePhases(); |
| + |
| + WebLocalFrame* localFrame = webView->mainFrame()->toWebLocalFrame(); |
| + |
| + client.reset(); |
| + localFrame->saveImageAt(WebPoint(1, 1)); |
| + EXPECT_EQ(WebString::fromUTF8("data:image/gif;base64" |
| + ",R0lGODlhAQABAIAAAAUEBAAAACwAAAAAAQABAAACAkQBADs="), client.result()); |
| + |
| + client.reset(); |
| + localFrame->saveImageAt(WebPoint(1, 2)); |
| + EXPECT_EQ(WebString(), client.result()); |
| + |
| + webView->setPageScaleFactor(4); |
| + webView->setVisualViewportOffset(WebFloatPoint(1, 1)); |
| + |
| + client.reset(); |
| + localFrame->saveImageAt(WebPoint(3, 3)); |
| + EXPECT_EQ(WebString::fromUTF8("data:image/gif;base64" |
| + ",R0lGODlhAQABAIAAAAUEBAAAACwAAAAAAQABAAACAkQBADs="), client.result()); |
| + |
| + helper.reset(); // Explicitly reset to break dependency on locally scoped client. |
| +} |
| + |
| +TEST_F(WebFrameTest, SaveImageWithImageMap) |
| +{ |
| + std::string url = m_baseURL + "image-map.html"; |
| + URLTestHelpers::registerMockedURLLoad(toKURL(url), "image-map.html"); |
| + |
| + FrameTestHelpers::WebViewHelper helper; |
| + SaveImageFromDataURLWebFrameClient client; |
| + WebView* webView = helper.initializeAndLoad(url, true, &client); |
| + webView->resize(WebSize(400, 400)); |
| + |
| + WebLocalFrame* localFrame = webView->mainFrame()->toWebLocalFrame(); |
| + |
| + client.reset(); |
| + localFrame->saveImageAt(WebPoint(25, 25)); |
| + EXPECT_EQ(WebString::fromUTF8("data:image/gif;base64" |
| + ",R0lGODlhAQABAIAAAAUEBAAAACwAAAAAAQABAAACAkQBADs="), client.result()); |
| + |
| + client.reset(); |
| + localFrame->saveImageAt(WebPoint(75, 25)); |
| + EXPECT_EQ(WebString::fromUTF8("data:image/gif;base64" |
| + ",R0lGODlhAQABAIAAAAUEBAAAACwAAAAAAQABAAACAkQBADs="), client.result()); |
| + |
| + client.reset(); |
| + localFrame->saveImageAt(WebPoint(125, 25)); |
| + EXPECT_EQ(WebString(), client.result()); |
| + |
| + helper.reset(); // Explicitly reset to break dependency on locally scoped client. |
| +} |
| + |
| +TEST_F(WebFrameTest, CopyImageAt) |
| +{ |
| + std::string url = m_baseURL + "canvas-copy-image.html"; |
| + URLTestHelpers::registerMockedURLLoad(toKURL(url), "canvas-copy-image.html"); |
| + |
| + FrameTestHelpers::WebViewHelper helper; |
| + WebView* webView = helper.initializeAndLoad(url, true, 0); |
| + webView->resize(WebSize(400, 400)); |
| + |
| + uint64_t sequence = Platform::current()->clipboard()->sequenceNumber(WebClipboard::BufferStandard); |
| + |
| + WebLocalFrame* localFrame = webView->mainFrame()->toWebLocalFrame(); |
| + localFrame->copyImageAt(WebPoint(50, 50)); |
| + |
| + EXPECT_NE(sequence, Platform::current()->clipboard()->sequenceNumber(WebClipboard::BufferStandard)); |
| + |
| + WebImage image = static_cast<WebMockClipboard*>(Platform::current()->clipboard())->readRawImage(WebClipboard::Buffer()); |
| + |
| + SkAutoLockPixels autoLock(image.getSkBitmap()); |
| + EXPECT_EQ(SkColorSetARGB(255, 255, 0, 0), image.getSkBitmap().getColor(0, 0)); |
| +}; |
| + |
| +TEST_F(WebFrameTest, CopyImageAtWithPinchZoom) |
| +{ |
| + std::string url = m_baseURL + "canvas-copy-image.html"; |
| + URLTestHelpers::registerMockedURLLoad(toKURL(url), "canvas-copy-image.html"); |
| + |
| + FrameTestHelpers::WebViewHelper helper; |
| + WebViewImpl* webView = helper.initializeAndLoad(url, true, 0); |
| + webView->resize(WebSize(400, 400)); |
| + webView->updateAllLifecyclePhases(); |
| + webView->setPageScaleFactor(2); |
| + webView->setVisualViewportOffset(WebFloatPoint(200, 200)); |
| + |
| + uint64_t sequence = Platform::current()->clipboard()->sequenceNumber(WebClipboard::BufferStandard); |
| + |
| + WebLocalFrame* localFrame = webView->mainFrame()->toWebLocalFrame(); |
| + localFrame->copyImageAt(WebPoint(0, 0)); |
| + |
| + EXPECT_NE(sequence, Platform::current()->clipboard()->sequenceNumber(WebClipboard::BufferStandard)); |
| + |
| + WebImage image = static_cast<WebMockClipboard*>(Platform::current()->clipboard())->readRawImage(WebClipboard::Buffer()); |
| + |
| + SkAutoLockPixels autoLock(image.getSkBitmap()); |
| + EXPECT_EQ(SkColorSetARGB(255, 255, 0, 0), image.getSkBitmap().getColor(0, 0)); |
| +}; |
| + |
| +TEST_F(WebFrameTest, CopyImageWithImageMap) |
| +{ |
| + SaveImageFromDataURLWebFrameClient client; |
| + |
| + std::string url = m_baseURL + "image-map.html"; |
| + URLTestHelpers::registerMockedURLLoad(toKURL(url), "image-map.html"); |
| + |
| + FrameTestHelpers::WebViewHelper helper; |
| + WebView* webView = helper.initializeAndLoad(url, true, &client); |
| + webView->resize(WebSize(400, 400)); |
| + |
| + client.reset(); |
| + WebLocalFrame* localFrame = webView->mainFrame()->toWebLocalFrame(); |
| + localFrame->saveImageAt(WebPoint(25, 25)); |
| + EXPECT_EQ(WebString::fromUTF8("data:image/gif;base64" |
| + ",R0lGODlhAQABAIAAAAUEBAAAACwAAAAAAQABAAACAkQBADs="), client.result()); |
| + |
| + client.reset(); |
| + localFrame->saveImageAt(WebPoint(75, 25)); |
| + EXPECT_EQ(WebString::fromUTF8("data:image/gif;base64" |
| + ",R0lGODlhAQABAIAAAAUEBAAAACwAAAAAAQABAAACAkQBADs="), client.result()); |
| + |
| + client.reset(); |
| + localFrame->saveImageAt(WebPoint(125, 25)); |
| + EXPECT_EQ(WebString(), client.result()); |
| + |
| + helper.reset(); // Explicitly reset to break dependency on locally scoped client. |
| +} |
| + |
| } // namespace blink |