Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(6449)

Unified Diff: chrome/browser/push_messaging/push_messaging_permission_context_unittest.cc

Issue 2149883002: Use the same codepath for NOTIFICATIONS and PUSH_MESSAGING permissions (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: . Created 4 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/push_messaging/push_messaging_permission_context_unittest.cc
diff --git a/chrome/browser/push_messaging/push_messaging_permission_context_unittest.cc b/chrome/browser/push_messaging/push_messaging_permission_context_unittest.cc
deleted file mode 100644
index f063f638257513a4e69fc23f6b26508e742c0a7b..0000000000000000000000000000000000000000
--- a/chrome/browser/push_messaging/push_messaging_permission_context_unittest.cc
+++ /dev/null
@@ -1,314 +0,0 @@
-// Copyright 2014 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "chrome/browser/push_messaging/push_messaging_permission_context.h"
-
-#include "chrome/browser/content_settings/host_content_settings_map_factory.h"
-#include "chrome/browser/permissions/permission_request_id.h"
-#include "chrome/test/base/chrome_render_view_host_test_harness.h"
-#include "chrome/test/base/testing_profile.h"
-#include "components/content_settings/core/browser/host_content_settings_map.h"
-#include "components/content_settings/core/common/content_settings.h"
-#include "components/content_settings/core/common/content_settings_types.h"
-#include "content/public/browser/web_contents.h"
-#include "testing/gtest/include/gtest/gtest.h"
-
-namespace {
-
-const char kOriginA[] = "https://origina.org";
-const char kOriginB[] = "https://originb.org";
-const char kInsecureOrigin[] = "http://insecureorigin.org";
-
-void DoNothing(ContentSetting content_setting) {}
-
-class TestPushMessagingPermissionContext
- : public PushMessagingPermissionContext {
- public:
- explicit TestPushMessagingPermissionContext(Profile* profile)
- : PushMessagingPermissionContext(profile),
- was_persisted_(false),
- permission_granted_(false) {}
-
- bool was_persisted() const { return was_persisted_; }
- bool was_granted() const { return permission_granted_; }
-
- private:
- // PushMessagingPermissionContext:
- void NotifyPermissionSet(const PermissionRequestID& id,
- const GURL& requesting_origin,
- const GURL& embedder_origin,
- const BrowserPermissionCallback& callback,
- bool persist,
- ContentSetting content_setting) override {
- was_persisted_ = persist;
- permission_granted_ = content_setting == CONTENT_SETTING_ALLOW;
- PushMessagingPermissionContext::NotifyPermissionSet(
- id, requesting_origin, embedder_origin, callback, persist,
- content_setting);
- }
-
- bool was_persisted_;
- bool permission_granted_;
-};
-
-class PushMessagingPermissionContextTest
- : public ChromeRenderViewHostTestHarness {
- public:
- PushMessagingPermissionContextTest() {}
-
- protected:
- void SetContentSetting(Profile* profile,
- ContentSettingsType setting,
- ContentSetting value) {
- // These urls must match those in
- // PermissionContextBase::UpdateContentSetting, since the tests below use
- // this method to overwrite urls set as a result of
- // PushMessagingPermissionContext::NotifyPermissionSet.
- GURL url_a = GURL(kOriginA);
- GURL insecure_url = GURL(kInsecureOrigin);
- HostContentSettingsMap* host_content_settings_map =
- HostContentSettingsMapFactory::GetForProfile(profile);
-
- host_content_settings_map->SetContentSettingDefaultScope(
- url_a, url_a, setting, std::string(), value);
- host_content_settings_map->SetContentSettingDefaultScope(
- insecure_url, insecure_url, setting, std::string(), value);
- }
-};
-
-} // namespace
-
-TEST_F(PushMessagingPermissionContextTest, HasPermissionPrompt) {
- TestingProfile profile;
- PushMessagingPermissionContext context(&profile);
- EXPECT_EQ(CONTENT_SETTING_ASK,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
-
- // Just granting push messaging permission should still prompt.
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- CONTENT_SETTING_ALLOW);
-
- EXPECT_EQ(CONTENT_SETTING_ASK,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
-
- // Just granting notifications should allow if push messaging is not blocked.
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_NOTIFICATIONS,
- CONTENT_SETTING_ASK);
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- CONTENT_SETTING_ALLOW);
-
- EXPECT_EQ(CONTENT_SETTING_ASK,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
-
- // Granting allow notifications but explicitly denying push messaging should
- // block.
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_NOTIFICATIONS,
- CONTENT_SETTING_ALLOW);
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- CONTENT_SETTING_BLOCK);
-
- EXPECT_EQ(CONTENT_SETTING_BLOCK,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
-}
-
-TEST_F(PushMessagingPermissionContextTest, HasPermissionDenySettingsMismatch) {
- TestingProfile profile;
- PushMessagingPermissionContext context(&profile);
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_NOTIFICATIONS,
- CONTENT_SETTING_BLOCK);
- EXPECT_EQ(CONTENT_SETTING_BLOCK,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_NOTIFICATIONS,
- CONTENT_SETTING_ASK);
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- CONTENT_SETTING_BLOCK);
- EXPECT_EQ(CONTENT_SETTING_BLOCK,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_NOTIFICATIONS,
- CONTENT_SETTING_ALLOW);
- EXPECT_EQ(CONTENT_SETTING_BLOCK,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
-
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_NOTIFICATIONS,
- CONTENT_SETTING_ASK);
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- CONTENT_SETTING_BLOCK);
- EXPECT_EQ(CONTENT_SETTING_BLOCK,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
-}
-
-TEST_F(PushMessagingPermissionContextTest, HasPermissionDenyDifferentOrigins) {
- TestingProfile profile;
- PushMessagingPermissionContext context(&profile);
- EXPECT_EQ(CONTENT_SETTING_BLOCK,
- context.GetPermissionStatus(GURL(kOriginB), GURL(kOriginA)));
-}
-
-TEST_F(PushMessagingPermissionContextTest, HasPermissionAccept) {
- TestingProfile profile;
- PushMessagingPermissionContext context(&profile);
-
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_NOTIFICATIONS,
- CONTENT_SETTING_ALLOW);
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- CONTENT_SETTING_ALLOW);
- EXPECT_EQ(CONTENT_SETTING_ALLOW,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
-}
-
-TEST_F(PushMessagingPermissionContextTest, DecidePushPermission) {
- TestingProfile profile;
- TestPushMessagingPermissionContext context(&profile);
- PermissionRequestID request_id(-1, -1, -1);
- BrowserPermissionCallback callback = base::Bind(DoNothing);
-
- context.DecidePushPermission(request_id, GURL(kOriginA), GURL(kOriginA),
- callback,
- blink::mojom::PermissionStatus::DENIED);
- EXPECT_FALSE(context.was_persisted());
- EXPECT_FALSE(context.was_granted());
-
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- CONTENT_SETTING_ALLOW);
- context.DecidePushPermission(request_id, GURL(kOriginA), GURL(kOriginA),
- callback,
- blink::mojom::PermissionStatus::GRANTED);
- EXPECT_TRUE(context.was_persisted());
- EXPECT_TRUE(context.was_granted());
-
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- CONTENT_SETTING_BLOCK);
- context.DecidePushPermission(request_id, GURL(kOriginA), GURL(kOriginA),
- callback,
- blink::mojom::PermissionStatus::GRANTED);
- EXPECT_TRUE(context.was_persisted());
- EXPECT_FALSE(context.was_granted());
-
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- CONTENT_SETTING_ASK);
- context.DecidePushPermission(request_id, GURL(kOriginA), GURL(kOriginA),
- callback,
- blink::mojom::PermissionStatus::GRANTED);
- EXPECT_TRUE(context.was_persisted());
- EXPECT_TRUE(context.was_granted());
-}
-
-TEST_F(PushMessagingPermissionContextTest, DecidePermission) {
- TestingProfile profile;
- TestPushMessagingPermissionContext context(&profile);
- PermissionRequestID request_id(-1, -1, -1);
- BrowserPermissionCallback callback = base::Bind(DoNothing);
-
- // Requesting and embedding origin are different.
- context.DecidePermission(NULL, request_id, GURL(kOriginA), GURL(kOriginB),
- true /* user_gesture */, callback);
- EXPECT_FALSE(context.was_persisted());
- EXPECT_FALSE(context.was_granted());
-
- // Insecure origin
- NavigateAndCommit(GURL(kInsecureOrigin));
- context.RequestPermission(web_contents(), request_id, GURL(kInsecureOrigin),
- true /* user_gesture */, callback);
- EXPECT_FALSE(context.was_persisted());
- EXPECT_FALSE(context.was_granted());
-}
-
-TEST_F(PushMessagingPermissionContextTest, RequestPermission) {
- TestingProfile profile;
- TestPushMessagingPermissionContext context(&profile);
- PermissionRequestID request_id(-1, -1, -1);
- BrowserPermissionCallback callback = base::Bind(DoNothing);
-
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_NOTIFICATIONS,
- CONTENT_SETTING_ALLOW);
-
- EXPECT_EQ(
- CONTENT_SETTING_ASK,
- HostContentSettingsMapFactory::GetForProfile(&profile)->GetContentSetting(
- GURL(kOriginA), GURL(kOriginA), CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- std::string()));
- EXPECT_EQ(CONTENT_SETTING_ALLOW,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
-
- // If a website already has notifications permission, push permission is
- // silently assumed to be granted.
- NavigateAndCommit(GURL(kOriginA));
- context.RequestPermission(web_contents(), request_id, GURL(kOriginA),
- true /* user_gesture */, callback);
-
- // Although the permission check goes through, the push message permission
- // isn't actually updated.
- EXPECT_TRUE(context.was_granted());
- EXPECT_EQ(
- CONTENT_SETTING_ASK,
- HostContentSettingsMapFactory::GetForProfile(&profile)->GetContentSetting(
- GURL(kOriginA), GURL(kOriginA), CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- std::string()));
- EXPECT_EQ(CONTENT_SETTING_ALLOW,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
-}
-
-TEST_F(PushMessagingPermissionContextTest, RequestAfterRevokingNotifications) {
- TestingProfile profile;
- TestPushMessagingPermissionContext context(&profile);
- PermissionRequestID request_id(-1, -1, -1);
- BrowserPermissionCallback callback = base::Bind(DoNothing);
-
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_NOTIFICATIONS,
- CONTENT_SETTING_ALLOW);
-
- NavigateAndCommit(GURL(kOriginA));
- context.RequestPermission(web_contents(), request_id, GURL(kOriginA),
- true /* user_gesture */, callback);
- EXPECT_TRUE(context.was_granted());
-
- EXPECT_EQ(CONTENT_SETTING_ALLOW,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
-
- // Revoke notifications permission. This should revoke push, and prevent
- // future requests for push from succeeding.
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_NOTIFICATIONS,
- CONTENT_SETTING_BLOCK);
-
- EXPECT_EQ(CONTENT_SETTING_BLOCK,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
-
- context.RequestPermission(web_contents(), request_id, GURL(kOriginA),
- true /* user_gesture */, callback);
- EXPECT_FALSE(context.was_persisted());
- EXPECT_FALSE(context.was_granted());
- EXPECT_EQ(CONTENT_SETTING_BLOCK,
- context.GetPermissionStatus(GURL(kOriginA), GURL(kOriginA)));
-}
-
-TEST_F(PushMessagingPermissionContextTest, GetPermissionStatusInsecureOrigin) {
- TestingProfile profile;
- TestPushMessagingPermissionContext context(&profile);
-
- // The status should be blocked for an insecure origin, regardless of the
- // content setting value.
- EXPECT_EQ(CONTENT_SETTING_BLOCK,
- context.GetPermissionStatus(GURL(kInsecureOrigin),
- GURL(kInsecureOrigin)));
-
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- CONTENT_SETTING_ALLOW);
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_NOTIFICATIONS,
- CONTENT_SETTING_ALLOW);
- EXPECT_EQ(CONTENT_SETTING_BLOCK,
- context.GetPermissionStatus(GURL(kInsecureOrigin),
- GURL(kInsecureOrigin)));
-
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- CONTENT_SETTING_BLOCK);
- EXPECT_EQ(CONTENT_SETTING_BLOCK,
- context.GetPermissionStatus(GURL(kInsecureOrigin),
- GURL(kInsecureOrigin)));
-
- SetContentSetting(&profile, CONTENT_SETTINGS_TYPE_PUSH_MESSAGING,
- CONTENT_SETTING_ASK);
- EXPECT_EQ(CONTENT_SETTING_BLOCK,
- context.GetPermissionStatus(GURL(kInsecureOrigin),
- GURL(kInsecureOrigin)));
-}

Powered by Google App Engine
This is Rietveld 408576698