Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1259)

Unified Diff: third_party/WebKit/Source/web/tests/WebFrameTest.cpp

Issue 1836973003: Move download messages from Renderer to Frame filter. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/WebKit/Source/web/tests/WebFrameTest.cpp
diff --git a/third_party/WebKit/Source/web/tests/WebFrameTest.cpp b/third_party/WebKit/Source/web/tests/WebFrameTest.cpp
index 0651c10139c5e73148a425565337cce38caaf789..08d7690a21cc3f3a3796c78488a9258a80dad086 100644
--- a/third_party/WebKit/Source/web/tests/WebFrameTest.cpp
+++ b/third_party/WebKit/Source/web/tests/WebFrameTest.cpp
@@ -90,7 +90,9 @@
#include "platform/weborigin/SecurityOrigin.h"
#include "public/platform/Platform.h"
#include "public/platform/WebCachePolicy.h"
+#include "public/platform/WebClipboard.h"
#include "public/platform/WebFloatRect.h"
+#include "public/platform/WebMockClipboard.h"
#include "public/platform/WebSecurityOrigin.h"
#include "public/platform/WebThread.h"
#include "public/platform/WebURL.h"
@@ -8669,4 +8671,214 @@ TEST(WebFrameGlobalReuseTest, ReuseForMainFrameIfEnabled)
EXPECT_EQ("world", toCoreString(result->ToString(mainFrame->mainWorldScriptContext()).ToLocalChecked()));
}
+static void setSecurityOrigin(WebFrame* frame, PassRefPtr<SecurityOrigin> securityOrigin)
dcheng 2016/06/12 05:58:34 Lines 8674 through 8731 look like they're from cod
+{
+ Document* document = frame->document();
+ document->setSecurityOrigin(securityOrigin);
+}
+
+TEST_F(WebFrameTest, CanHaveSecureChild)
+{
+ FrameTestHelpers::WebViewHelper helper;
+ FrameTestHelpers::TestWebFrameClient client;
+ helper.initialize(true, &client, nullptr, nullptr);
+ WebFrame* mainFrame = helper.webView()->mainFrame();
+ RefPtr<SecurityOrigin> secureOrigin = SecurityOrigin::createFromString("https://example.com");
+ RefPtr<SecurityOrigin> insecureOrigin = SecurityOrigin::createFromString("http://example.com");
+
+ // Secure frame.
+ setSecurityOrigin(mainFrame, secureOrigin);
+ ASSERT_TRUE(mainFrame->canHaveSecureChild());
+
+ // Insecure frame.
+ setSecurityOrigin(mainFrame, insecureOrigin);
+ ASSERT_FALSE(mainFrame->canHaveSecureChild());
+
+ // Create a chain of frames.
+ FrameTestHelpers::loadFrame(mainFrame, "data:text/html,<iframe></iframe>");
+ WebFrame* childFrame = mainFrame->firstChild();
+ FrameTestHelpers::loadFrame(childFrame, "data:text/html,<iframe></iframe>");
+ WebFrame* grandchildFrame = childFrame->firstChild();
+
+ // Secure -> insecure -> secure frame.
+ setSecurityOrigin(mainFrame, secureOrigin);
+ setSecurityOrigin(childFrame, insecureOrigin);
+ setSecurityOrigin(grandchildFrame, secureOrigin);
+ ASSERT_TRUE(mainFrame->canHaveSecureChild());
+ ASSERT_FALSE(childFrame->canHaveSecureChild());
+ ASSERT_FALSE(grandchildFrame->canHaveSecureChild());
+
+ // A document in an insecure context can be considered secure if it has a
+ // scheme that bypasses the secure context check. But the exception doesn't
+ // apply to children of that document's frame.
+ SchemeRegistry::registerURLSchemeBypassingSecureContextCheck("very-special-scheme");
+ SchemeRegistry::registerURLSchemeAsSecure("very-special-scheme");
+ RefPtr<SecurityOrigin> specialOrigin = SecurityOrigin::createFromString("very-special-scheme://example.com");
+
+ setSecurityOrigin(mainFrame, insecureOrigin);
+ setSecurityOrigin(childFrame, specialOrigin);
+ setSecurityOrigin(grandchildFrame, secureOrigin);
+ ASSERT_FALSE(mainFrame->canHaveSecureChild());
+ ASSERT_FALSE(childFrame->canHaveSecureChild());
+ ASSERT_FALSE(grandchildFrame->canHaveSecureChild());
+ Document* mainDocument = mainFrame->document();
+ Document* childDocument = childFrame->document();
+ Document* grandchildDocument = grandchildFrame->document();
+ ASSERT_FALSE(mainDocument->isSecureContext());
+ ASSERT_TRUE(childDocument->isSecureContext());
+ ASSERT_FALSE(grandchildDocument->isSecureContext());
+}
+
+class SaveImageFromDataURLWebFrameClient : public FrameTestHelpers::TestWebFrameClient {
+public:
+ // WebFrameClient methods
+ void saveImageFromDataURL(const WebString& dataURL) override { m_dataURL = dataURL; }
+
+ // Local methods
+ const WebString& result() const { return m_dataURL; }
+ void reset() { m_dataURL = WebString(); }
+
+private:
+ WebString m_dataURL;
+};
+
+TEST_F(WebFrameTest, SaveImageAt)
+{
+ std::string url = m_baseURL + "image-with-data-url.html";
+ URLTestHelpers::registerMockedURLLoad(toKURL(url), "image-with-data-url.html");
+ URLTestHelpers::registerMockedURLLoad(toKURL("http://test"), "white-1x1.png");
+
+ FrameTestHelpers::WebViewHelper helper;
+ SaveImageFromDataURLWebFrameClient client;
+ WebViewImpl* webView = helper.initializeAndLoad(url, true, &client);
+ webView->resize(WebSize(400, 400));
+ webView->updateAllLifecyclePhases();
+
+ WebLocalFrame* localFrame = webView->mainFrame()->toWebLocalFrame();
+
+ client.reset();
+ localFrame->saveImageAt(WebPoint(1, 1));
+ EXPECT_EQ(WebString::fromUTF8("data:image/gif;base64"
+ ",R0lGODlhAQABAIAAAAUEBAAAACwAAAAAAQABAAACAkQBADs="), client.result());
+
+ client.reset();
+ localFrame->saveImageAt(WebPoint(1, 2));
+ EXPECT_EQ(WebString(), client.result());
+
+ webView->setPageScaleFactor(4);
+ webView->setVisualViewportOffset(WebFloatPoint(1, 1));
+
+ client.reset();
+ localFrame->saveImageAt(WebPoint(3, 3));
+ EXPECT_EQ(WebString::fromUTF8("data:image/gif;base64"
+ ",R0lGODlhAQABAIAAAAUEBAAAACwAAAAAAQABAAACAkQBADs="), client.result());
+
+ helper.reset(); // Explicitly reset to break dependency on locally scoped client.
+}
+
+TEST_F(WebFrameTest, SaveImageWithImageMap)
+{
+ std::string url = m_baseURL + "image-map.html";
+ URLTestHelpers::registerMockedURLLoad(toKURL(url), "image-map.html");
+
+ FrameTestHelpers::WebViewHelper helper;
+ SaveImageFromDataURLWebFrameClient client;
+ WebView* webView = helper.initializeAndLoad(url, true, &client);
+ webView->resize(WebSize(400, 400));
+
+ WebLocalFrame* localFrame = webView->mainFrame()->toWebLocalFrame();
+
+ client.reset();
+ localFrame->saveImageAt(WebPoint(25, 25));
+ EXPECT_EQ(WebString::fromUTF8("data:image/gif;base64"
+ ",R0lGODlhAQABAIAAAAUEBAAAACwAAAAAAQABAAACAkQBADs="), client.result());
+
+ client.reset();
+ localFrame->saveImageAt(WebPoint(75, 25));
+ EXPECT_EQ(WebString::fromUTF8("data:image/gif;base64"
+ ",R0lGODlhAQABAIAAAAUEBAAAACwAAAAAAQABAAACAkQBADs="), client.result());
+
+ client.reset();
+ localFrame->saveImageAt(WebPoint(125, 25));
+ EXPECT_EQ(WebString(), client.result());
+
+ helper.reset(); // Explicitly reset to break dependency on locally scoped client.
+}
+
+TEST_F(WebFrameTest, CopyImageAt)
+{
+ std::string url = m_baseURL + "canvas-copy-image.html";
+ URLTestHelpers::registerMockedURLLoad(toKURL(url), "canvas-copy-image.html");
+
+ FrameTestHelpers::WebViewHelper helper;
+ WebView* webView = helper.initializeAndLoad(url, true, 0);
+ webView->resize(WebSize(400, 400));
+
+ uint64_t sequence = Platform::current()->clipboard()->sequenceNumber(WebClipboard::BufferStandard);
+
+ WebLocalFrame* localFrame = webView->mainFrame()->toWebLocalFrame();
+ localFrame->copyImageAt(WebPoint(50, 50));
+
+ EXPECT_NE(sequence, Platform::current()->clipboard()->sequenceNumber(WebClipboard::BufferStandard));
+
+ WebImage image = static_cast<WebMockClipboard*>(Platform::current()->clipboard())->readRawImage(WebClipboard::Buffer());
+
+ SkAutoLockPixels autoLock(image.getSkBitmap());
+ EXPECT_EQ(SkColorSetARGB(255, 255, 0, 0), image.getSkBitmap().getColor(0, 0));
+};
+
+TEST_F(WebFrameTest, CopyImageAtWithPinchZoom)
+{
+ std::string url = m_baseURL + "canvas-copy-image.html";
+ URLTestHelpers::registerMockedURLLoad(toKURL(url), "canvas-copy-image.html");
+
+ FrameTestHelpers::WebViewHelper helper;
+ WebViewImpl* webView = helper.initializeAndLoad(url, true, 0);
+ webView->resize(WebSize(400, 400));
+ webView->updateAllLifecyclePhases();
+ webView->setPageScaleFactor(2);
+ webView->setVisualViewportOffset(WebFloatPoint(200, 200));
+
+ uint64_t sequence = Platform::current()->clipboard()->sequenceNumber(WebClipboard::BufferStandard);
+
+ WebLocalFrame* localFrame = webView->mainFrame()->toWebLocalFrame();
+ localFrame->copyImageAt(WebPoint(0, 0));
+
+ EXPECT_NE(sequence, Platform::current()->clipboard()->sequenceNumber(WebClipboard::BufferStandard));
+
+ WebImage image = static_cast<WebMockClipboard*>(Platform::current()->clipboard())->readRawImage(WebClipboard::Buffer());
+
+ SkAutoLockPixels autoLock(image.getSkBitmap());
+ EXPECT_EQ(SkColorSetARGB(255, 255, 0, 0), image.getSkBitmap().getColor(0, 0));
+};
+
+TEST_F(WebFrameTest, CopyImageWithImageMap)
+{
+ SaveImageFromDataURLWebFrameClient client;
+
+ std::string url = m_baseURL + "image-map.html";
+ URLTestHelpers::registerMockedURLLoad(toKURL(url), "image-map.html");
+
+ FrameTestHelpers::WebViewHelper helper;
+ WebView* webView = helper.initializeAndLoad(url, true, &client);
+ webView->resize(WebSize(400, 400));
+
+ client.reset();
+ WebLocalFrame* localFrame = webView->mainFrame()->toWebLocalFrame();
+ localFrame->saveImageAt(WebPoint(25, 25));
+ EXPECT_EQ(WebString::fromUTF8("data:image/gif;base64"
+ ",R0lGODlhAQABAIAAAAUEBAAAACwAAAAAAQABAAACAkQBADs="), client.result());
+
+ client.reset();
+ localFrame->saveImageAt(WebPoint(75, 25));
+ EXPECT_EQ(WebString::fromUTF8("data:image/gif;base64"
+ ",R0lGODlhAQABAIAAAAUEBAAAACwAAAAAAQABAAACAkQBADs="), client.result());
+
+ client.reset();
+ localFrame->saveImageAt(WebPoint(125, 25));
+ EXPECT_EQ(WebString(), client.result());
+
+ helper.reset(); // Explicitly reset to break dependency on locally scoped client.
+}
+
} // namespace blink

Powered by Google App Engine
This is Rietveld 408576698