Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(166)

Side by Side Diff: third_party/WebKit/Source/core/frame/SubresourceIntegrityTest.cpp

Issue 1854543002: Oilpan: Remove WillBe types (part 7) (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "core/frame/SubresourceIntegrity.h" 5 #include "core/frame/SubresourceIntegrity.h"
6 6
7 #include "core/HTMLNames.h" 7 #include "core/HTMLNames.h"
8 #include "core/dom/Document.h" 8 #include "core/dom/Document.h"
9 #include "core/fetch/IntegrityMetadata.h" 9 #include "core/fetch/IntegrityMetadata.h"
10 #include "core/fetch/Resource.h" 10 #include "core/fetch/Resource.h"
(...skipping 141 matching lines...) Expand 10 before | Expand all | Expand 10 after
152 scriptElement->setAttribute(HTMLNames::integrityAttr, integrity); 152 scriptElement->setAttribute(HTMLNames::integrityAttr, integrity);
153 EXPECT_TRUE(SubresourceIntegrity::CheckSubresourceIntegrity(*scriptEleme nt, script, size, url, *createTestResource(url, requestorUrl, corsStatus).get()) ); 153 EXPECT_TRUE(SubresourceIntegrity::CheckSubresourceIntegrity(*scriptEleme nt, script, size, url, *createTestResource(url, requestorUrl, corsStatus).get()) );
154 } 154 }
155 155
156 void expectIntegrityFailure(const char* integrity, const char* script, size_ t size, const KURL& url, const KURL& requestorUrl, CorsStatus corsStatus = WithC ors) 156 void expectIntegrityFailure(const char* integrity, const char* script, size_ t size, const KURL& url, const KURL& requestorUrl, CorsStatus corsStatus = WithC ors)
157 { 157 {
158 scriptElement->setAttribute(HTMLNames::integrityAttr, integrity); 158 scriptElement->setAttribute(HTMLNames::integrityAttr, integrity);
159 EXPECT_FALSE(SubresourceIntegrity::CheckSubresourceIntegrity(*scriptElem ent, script, size, url, *createTestResource(url, requestorUrl, corsStatus).get() )); 159 EXPECT_FALSE(SubresourceIntegrity::CheckSubresourceIntegrity(*scriptElem ent, script, size, url, *createTestResource(url, requestorUrl, corsStatus).get() ));
160 } 160 }
161 161
162 PassRefPtrWillBeRawPtr<Resource> createTestResource(const KURL& url, const K URL& allowOriginUrl, CorsStatus corsStatus) 162 RawPtr<Resource> createTestResource(const KURL& url, const KURL& allowOrigin Url, CorsStatus corsStatus)
163 { 163 {
164 ResourceResponse response; 164 ResourceResponse response;
165 response.setURL(url); 165 response.setURL(url);
166 response.setHTTPStatusCode(200); 166 response.setHTTPStatusCode(200);
167 if (corsStatus == WithCors) { 167 if (corsStatus == WithCors) {
168 response.setHTTPHeaderField("access-control-allow-origin", SecurityO rigin::create(allowOriginUrl)->toAtomicString()); 168 response.setHTTPHeaderField("access-control-allow-origin", SecurityO rigin::create(allowOriginUrl)->toAtomicString());
169 response.setHTTPHeaderField("access-control-allow-credentials", "tru e"); 169 response.setHTTPHeaderField("access-control-allow-credentials", "tru e");
170 } 170 }
171 RefPtrWillBeRawPtr<Resource> resource = Resource::create(ResourceRequest (response.url()), Resource::Raw); 171 RawPtr<Resource> resource = Resource::create(ResourceRequest(response.ur l()), Resource::Raw);
172 resource->setResponse(response); 172 resource->setResponse(response);
173 return resource; 173 return resource;
174 } 174 }
175 175
176 KURL secureURL; 176 KURL secureURL;
177 KURL insecureURL; 177 KURL insecureURL;
178 RefPtr<SecurityOrigin> secureOrigin; 178 RefPtr<SecurityOrigin> secureOrigin;
179 RefPtr<SecurityOrigin> insecureOrigin; 179 RefPtr<SecurityOrigin> insecureOrigin;
180 180
181 RefPtrWillBePersistent<Document> document; 181 Persistent<Document> document;
182 RefPtrWillBePersistent<HTMLScriptElement> scriptElement; 182 Persistent<HTMLScriptElement> scriptElement;
183 }; 183 };
184 184
185 TEST_F(SubresourceIntegrityTest, Prioritization) 185 TEST_F(SubresourceIntegrityTest, Prioritization)
186 { 186 {
187 EXPECT_EQ(HashAlgorithmSha256, SubresourceIntegrity::getPrioritizedHashFunct ion(HashAlgorithmSha256, HashAlgorithmSha256)); 187 EXPECT_EQ(HashAlgorithmSha256, SubresourceIntegrity::getPrioritizedHashFunct ion(HashAlgorithmSha256, HashAlgorithmSha256));
188 EXPECT_EQ(HashAlgorithmSha384, SubresourceIntegrity::getPrioritizedHashFunct ion(HashAlgorithmSha384, HashAlgorithmSha384)); 188 EXPECT_EQ(HashAlgorithmSha384, SubresourceIntegrity::getPrioritizedHashFunct ion(HashAlgorithmSha384, HashAlgorithmSha384));
189 EXPECT_EQ(HashAlgorithmSha512, SubresourceIntegrity::getPrioritizedHashFunct ion(HashAlgorithmSha512, HashAlgorithmSha512)); 189 EXPECT_EQ(HashAlgorithmSha512, SubresourceIntegrity::getPrioritizedHashFunct ion(HashAlgorithmSha512, HashAlgorithmSha512));
190 190
191 EXPECT_EQ(HashAlgorithmSha384, SubresourceIntegrity::getPrioritizedHashFunct ion(HashAlgorithmSha384, HashAlgorithmSha256)); 191 EXPECT_EQ(HashAlgorithmSha384, SubresourceIntegrity::getPrioritizedHashFunct ion(HashAlgorithmSha384, HashAlgorithmSha256));
192 EXPECT_EQ(HashAlgorithmSha512, SubresourceIntegrity::getPrioritizedHashFunct ion(HashAlgorithmSha512, HashAlgorithmSha256)); 192 EXPECT_EQ(HashAlgorithmSha512, SubresourceIntegrity::getPrioritizedHashFunct ion(HashAlgorithmSha512, HashAlgorithmSha256));
(...skipping 240 matching lines...) Expand 10 before | Expand all | Expand 10 after
433 expectIntegrity(kUnsupportedHashFunctionIntegrity, kBasicScript, strlen(kBas icScript), secureURL, insecureURL); 433 expectIntegrity(kUnsupportedHashFunctionIntegrity, kBasicScript, strlen(kBas icScript), secureURL, insecureURL);
434 434
435 expectIntegrity(kSha256AndSha384Integrities, kBasicScript, strlen(kBasicScri pt), secureURL, insecureURL); 435 expectIntegrity(kSha256AndSha384Integrities, kBasicScript, strlen(kBasicScri pt), secureURL, insecureURL);
436 expectIntegrity(kBadSha256AndGoodSha384Integrities, kBasicScript, strlen(kBa sicScript), secureURL, insecureURL); 436 expectIntegrity(kBadSha256AndGoodSha384Integrities, kBasicScript, strlen(kBa sicScript), secureURL, insecureURL);
437 437
438 expectIntegrityFailure(kSha256Integrity, kBasicScript, strlen(kBasicScript), secureURL, insecureURL, NoCors); 438 expectIntegrityFailure(kSha256Integrity, kBasicScript, strlen(kBasicScript), secureURL, insecureURL, NoCors);
439 expectIntegrityFailure(kGoodSha256AndBadSha384Integrities, kBasicScript, str len(kBasicScript), secureURL, insecureURL); 439 expectIntegrityFailure(kGoodSha256AndBadSha384Integrities, kBasicScript, str len(kBasicScript), secureURL, insecureURL);
440 } 440 }
441 441
442 } // namespace blink 442 } // namespace blink
OLDNEW
« no previous file with comments | « third_party/WebKit/Source/core/frame/SmartClip.cpp ('k') | third_party/WebKit/Source/core/frame/TopControls.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698