Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 /* | 1 /* |
| 2 * Copyright (c) 2015, Google Inc. All rights reserved. | 2 * Copyright (c) 2015, Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 19 matching lines...) Expand all Loading... | |
| 30 | 30 |
| 31 #include "core/loader/FrameFetchContext.h" | 31 #include "core/loader/FrameFetchContext.h" |
| 32 | 32 |
| 33 #include "core/dom/Document.h" | 33 #include "core/dom/Document.h" |
| 34 #include "core/fetch/FetchInitiatorInfo.h" | 34 #include "core/fetch/FetchInitiatorInfo.h" |
| 35 #include "core/fetch/UniqueIdentifier.h" | 35 #include "core/fetch/UniqueIdentifier.h" |
| 36 #include "core/frame/FrameHost.h" | 36 #include "core/frame/FrameHost.h" |
| 37 #include "core/frame/FrameOwner.h" | 37 #include "core/frame/FrameOwner.h" |
| 38 #include "core/frame/FrameView.h" | 38 #include "core/frame/FrameView.h" |
| 39 #include "core/frame/Settings.h" | 39 #include "core/frame/Settings.h" |
| 40 #include "core/html/HTMLIFrameElement.h" | |
| 40 #include "core/loader/DocumentLoader.h" | 41 #include "core/loader/DocumentLoader.h" |
| 41 #include "core/loader/EmptyClients.h" | 42 #include "core/loader/EmptyClients.h" |
| 42 #include "core/page/Page.h" | 43 #include "core/page/Page.h" |
| 43 #include "core/testing/DummyPageHolder.h" | 44 #include "core/testing/DummyPageHolder.h" |
| 44 #include "platform/network/ResourceRequest.h" | 45 #include "platform/network/ResourceRequest.h" |
| 45 #include "platform/weborigin/KURL.h" | 46 #include "platform/weborigin/KURL.h" |
| 46 #include "public/platform/WebAddressSpace.h" | 47 #include "public/platform/WebAddressSpace.h" |
| 47 #include "public/platform/WebCachePolicy.h" | 48 #include "public/platform/WebCachePolicy.h" |
| 48 #include "public/platform/WebInsecureRequestPolicy.h" | 49 #include "public/platform/WebInsecureRequestPolicy.h" |
| 49 #include "testing/gmock/include/gmock/gmock-generated-function-mockers.h" | 50 #include "testing/gmock/include/gmock/gmock-generated-function-mockers.h" |
| (...skipping 106 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 156 fetchContext = | 157 fetchContext = |
| 157 static_cast<FrameFetchContext*>(&documentLoader->fetcher()->context()); | 158 static_cast<FrameFetchContext*>(&documentLoader->fetcher()->context()); |
| 158 owner = DummyFrameOwner::create(); | 159 owner = DummyFrameOwner::create(); |
| 159 FrameFetchContext::provideDocumentToContext(*fetchContext, document.get()); | 160 FrameFetchContext::provideDocumentToContext(*fetchContext, document.get()); |
| 160 } | 161 } |
| 161 | 162 |
| 162 KURL url; | 163 KURL url; |
| 163 KURL mainResourceUrl; | 164 KURL mainResourceUrl; |
| 164 }; | 165 }; |
| 165 | 166 |
| 166 class FrameFetchContextUpgradeTest : public FrameFetchContextTest { | 167 class FrameFetchContextModifyRequestTest : public FrameFetchContextTest { |
|
Mike West
2016/10/06 13:30:21
I would have expected you to need to set the runti
amalika
2016/10/06 18:54:57
From my understanding this might be because site_p
| |
| 167 public: | 168 public: |
| 168 FrameFetchContextUpgradeTest() | 169 FrameFetchContextModifyRequestTest() |
| 169 : exampleOrigin(SecurityOrigin::create( | 170 : exampleOrigin(SecurityOrigin::create( |
| 170 KURL(ParsedURLString, "https://example.test/"))), | 171 KURL(ParsedURLString, "https://example.test/"))), |
| 171 secureOrigin(SecurityOrigin::create( | 172 secureOrigin(SecurityOrigin::create( |
| 172 KURL(ParsedURLString, "https://secureorigin.test/image.png"))) {} | 173 KURL(ParsedURLString, "https://secureorigin.test/image.png"))) {} |
| 173 | 174 |
| 174 protected: | 175 protected: |
| 175 void expectUpgrade(const char* input, const char* expected) { | 176 void expectUpgrade(const char* input, const char* expected) { |
| 176 expectUpgrade(input, WebURLRequest::RequestContextScript, | 177 expectUpgrade(input, WebURLRequest::RequestContextScript, |
| 177 WebURLRequest::FrameTypeNone, expected); | 178 WebURLRequest::FrameTypeNone, expected); |
| 178 } | 179 } |
| 179 | 180 |
| 180 void expectUpgrade(const char* input, | 181 void expectUpgrade(const char* input, |
| 181 WebURLRequest::RequestContext requestContext, | 182 WebURLRequest::RequestContext requestContext, |
| 182 WebURLRequest::FrameType frameType, | 183 WebURLRequest::FrameType frameType, |
| 183 const char* expected) { | 184 const char* expected) { |
| 184 KURL inputURL(ParsedURLString, input); | 185 KURL inputURL(ParsedURLString, input); |
| 185 KURL expectedURL(ParsedURLString, expected); | 186 KURL expectedURL(ParsedURLString, expected); |
| 186 | 187 |
| 187 FetchRequest fetchRequest = | 188 FetchRequest fetchRequest = |
| 188 FetchRequest(ResourceRequest(inputURL), FetchInitiatorInfo()); | 189 FetchRequest(ResourceRequest(inputURL), FetchInitiatorInfo()); |
| 189 fetchRequest.mutableResourceRequest().setRequestContext(requestContext); | 190 fetchRequest.mutableResourceRequest().setRequestContext(requestContext); |
| 190 fetchRequest.mutableResourceRequest().setFrameType(frameType); | 191 fetchRequest.mutableResourceRequest().setFrameType(frameType); |
| 191 | 192 |
| 192 fetchContext->upgradeInsecureRequest(fetchRequest.mutableResourceRequest()); | 193 fetchContext->modifyRequestForCSP(fetchRequest.mutableResourceRequest()); |
| 193 | 194 |
| 194 EXPECT_EQ(expectedURL.getString(), | 195 EXPECT_EQ(expectedURL.getString(), |
| 195 fetchRequest.resourceRequest().url().getString()); | 196 fetchRequest.resourceRequest().url().getString()); |
| 196 EXPECT_EQ(expectedURL.protocol(), | 197 EXPECT_EQ(expectedURL.protocol(), |
| 197 fetchRequest.resourceRequest().url().protocol()); | 198 fetchRequest.resourceRequest().url().protocol()); |
| 198 EXPECT_EQ(expectedURL.host(), fetchRequest.resourceRequest().url().host()); | 199 EXPECT_EQ(expectedURL.host(), fetchRequest.resourceRequest().url().host()); |
| 199 EXPECT_EQ(expectedURL.port(), fetchRequest.resourceRequest().url().port()); | 200 EXPECT_EQ(expectedURL.port(), fetchRequest.resourceRequest().url().port()); |
| 200 EXPECT_EQ(expectedURL.hasPort(), | 201 EXPECT_EQ(expectedURL.hasPort(), |
| 201 fetchRequest.resourceRequest().url().hasPort()); | 202 fetchRequest.resourceRequest().url().hasPort()); |
| 202 EXPECT_EQ(expectedURL.path(), fetchRequest.resourceRequest().url().path()); | 203 EXPECT_EQ(expectedURL.path(), fetchRequest.resourceRequest().url().path()); |
| 203 } | 204 } |
| 204 | 205 |
| 205 void expectHTTPSHeader(const char* input, | 206 void expectUpgradeInsecureRequestHeader(const char* input, |
| 206 WebURLRequest::FrameType frameType, | 207 WebURLRequest::FrameType frameType, |
| 207 bool shouldPrefer) { | 208 bool shouldPrefer) { |
| 208 KURL inputURL(ParsedURLString, input); | 209 KURL inputURL(ParsedURLString, input); |
| 209 | 210 |
| 210 FetchRequest fetchRequest = | 211 FetchRequest fetchRequest = |
| 211 FetchRequest(ResourceRequest(inputURL), FetchInitiatorInfo()); | 212 FetchRequest(ResourceRequest(inputURL), FetchInitiatorInfo()); |
| 212 fetchRequest.mutableResourceRequest().setRequestContext( | 213 fetchRequest.mutableResourceRequest().setRequestContext( |
| 213 WebURLRequest::RequestContextScript); | 214 WebURLRequest::RequestContextScript); |
| 214 fetchRequest.mutableResourceRequest().setFrameType(frameType); | 215 fetchRequest.mutableResourceRequest().setFrameType(frameType); |
| 215 | 216 |
| 216 fetchContext->upgradeInsecureRequest(fetchRequest.mutableResourceRequest()); | 217 fetchContext->modifyRequestForCSP(fetchRequest.mutableResourceRequest()); |
| 217 | 218 |
| 218 EXPECT_EQ(shouldPrefer ? String("1") : String(), | 219 EXPECT_EQ(shouldPrefer ? String("1") : String(), |
| 219 fetchRequest.resourceRequest().httpHeaderField( | 220 fetchRequest.resourceRequest().httpHeaderField( |
| 220 HTTPNames::Upgrade_Insecure_Requests)); | 221 HTTPNames::Upgrade_Insecure_Requests)); |
| 221 | 222 |
| 222 // Calling upgradeInsecureRequest more than once shouldn't affect the | 223 // Calling modifyRequestForCSP more than once shouldn't affect the |
| 223 // header. | 224 // header. |
| 224 if (shouldPrefer) { | 225 if (shouldPrefer) { |
| 225 fetchContext->upgradeInsecureRequest( | 226 fetchContext->modifyRequestForCSP(fetchRequest.mutableResourceRequest()); |
| 226 fetchRequest.mutableResourceRequest()); | |
| 227 EXPECT_EQ("1", fetchRequest.resourceRequest().httpHeaderField( | 227 EXPECT_EQ("1", fetchRequest.resourceRequest().httpHeaderField( |
| 228 HTTPNames::Upgrade_Insecure_Requests)); | 228 HTTPNames::Upgrade_Insecure_Requests)); |
| 229 } | 229 } |
| 230 } | 230 } |
| 231 | 231 |
| 232 void expectSetEmbeddingCSPRequestHeader( | |
| 233 const char* input, | |
| 234 WebURLRequest::FrameType frameType, | |
| 235 const AtomicString& expectedEmbeddingCSP) { | |
| 236 KURL inputURL(ParsedURLString, input); | |
| 237 | |
| 238 FetchRequest fetchRequest = | |
| 239 FetchRequest(ResourceRequest(inputURL), FetchInitiatorInfo()); | |
| 240 fetchRequest.mutableResourceRequest().setRequestContext( | |
| 241 WebURLRequest::RequestContextScript); | |
| 242 fetchRequest.mutableResourceRequest().setFrameType(frameType); | |
| 243 | |
| 244 fetchContext->modifyRequestForCSP(fetchRequest.mutableResourceRequest()); | |
| 245 | |
| 246 EXPECT_EQ(expectedEmbeddingCSP, | |
| 247 fetchRequest.resourceRequest().httpHeaderField( | |
| 248 HTTPNames::Embedding_CSP)); | |
| 249 } | |
| 250 | |
| 251 const AtomicString& setFrameOwnerBasedOnFrameType( | |
| 252 WebURLRequest::FrameType frameType, | |
| 253 HTMLIFrameElement* iframe, | |
| 254 const AtomicString& potentialValue) { | |
| 255 if (frameType == WebURLRequest::FrameTypeNested) { | |
|
Mike West
2016/10/06 13:30:21
Nit: We generally try to do the quick exit first.
| |
| 256 iframe->setAttribute(HTMLNames::cspAttr, potentialValue); | |
| 257 document->frame()->setOwner(iframe); | |
| 258 return potentialValue; | |
| 259 } | |
| 260 | |
| 261 document->frame()->setOwner(0); | |
|
Mike West
2016/10/06 13:30:21
Nit: s/0/nullptr/
| |
| 262 return nullAtom; | |
| 263 } | |
| 264 | |
| 232 RefPtr<SecurityOrigin> exampleOrigin; | 265 RefPtr<SecurityOrigin> exampleOrigin; |
| 233 RefPtr<SecurityOrigin> secureOrigin; | 266 RefPtr<SecurityOrigin> secureOrigin; |
| 234 }; | 267 }; |
| 235 | 268 |
| 236 TEST_F(FrameFetchContextUpgradeTest, UpgradeInsecureResourceRequests) { | 269 TEST_F(FrameFetchContextModifyRequestTest, UpgradeInsecureResourceRequests) { |
| 237 struct TestCase { | 270 struct TestCase { |
| 238 const char* original; | 271 const char* original; |
| 239 const char* upgraded; | 272 const char* upgraded; |
| 240 } tests[] = { | 273 } tests[] = { |
| 241 {"http://example.test/image.png", "https://example.test/image.png"}, | 274 {"http://example.test/image.png", "https://example.test/image.png"}, |
| 242 {"http://example.test:80/image.png", | 275 {"http://example.test:80/image.png", |
| 243 "https://example.test:443/image.png"}, | 276 "https://example.test:443/image.png"}, |
| 244 {"http://example.test:1212/image.png", | 277 {"http://example.test:1212/image.png", |
| 245 "https://example.test:1212/image.png"}, | 278 "https://example.test:1212/image.png"}, |
| 246 | 279 |
| (...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 284 // InsecureNavigationsSet: | 317 // InsecureNavigationsSet: |
| 285 document->addInsecureNavigationUpgrade( | 318 document->addInsecureNavigationUpgrade( |
| 286 exampleOrigin->host().impl()->hash()); | 319 exampleOrigin->host().impl()->hash()); |
| 287 expectUpgrade(test.original, WebURLRequest::RequestContextScript, | 320 expectUpgrade(test.original, WebURLRequest::RequestContextScript, |
| 288 WebURLRequest::FrameTypeTopLevel, test.upgraded); | 321 WebURLRequest::FrameTypeTopLevel, test.upgraded); |
| 289 expectUpgrade(test.original, WebURLRequest::RequestContextScript, | 322 expectUpgrade(test.original, WebURLRequest::RequestContextScript, |
| 290 WebURLRequest::FrameTypeAuxiliary, test.upgraded); | 323 WebURLRequest::FrameTypeAuxiliary, test.upgraded); |
| 291 } | 324 } |
| 292 } | 325 } |
| 293 | 326 |
| 294 TEST_F(FrameFetchContextUpgradeTest, DoNotUpgradeInsecureResourceRequests) { | 327 TEST_F(FrameFetchContextModifyRequestTest, |
| 328 DoNotUpgradeInsecureResourceRequests) { | |
| 295 FrameFetchContext::provideDocumentToContext(*fetchContext, document.get()); | 329 FrameFetchContext::provideDocumentToContext(*fetchContext, document.get()); |
| 296 document->setSecurityOrigin(secureOrigin); | 330 document->setSecurityOrigin(secureOrigin); |
| 297 document->setInsecureRequestPolicy(kLeaveInsecureRequestsAlone); | 331 document->setInsecureRequestPolicy(kLeaveInsecureRequestsAlone); |
| 298 | 332 |
| 299 expectUpgrade("http://example.test/image.png", | 333 expectUpgrade("http://example.test/image.png", |
| 300 "http://example.test/image.png"); | 334 "http://example.test/image.png"); |
| 301 expectUpgrade("http://example.test:80/image.png", | 335 expectUpgrade("http://example.test:80/image.png", |
| 302 "http://example.test:80/image.png"); | 336 "http://example.test:80/image.png"); |
| 303 expectUpgrade("http://example.test:1212/image.png", | 337 expectUpgrade("http://example.test:1212/image.png", |
| 304 "http://example.test:1212/image.png"); | 338 "http://example.test:1212/image.png"); |
| 305 | 339 |
| 306 expectUpgrade("https://example.test/image.png", | 340 expectUpgrade("https://example.test/image.png", |
| 307 "https://example.test/image.png"); | 341 "https://example.test/image.png"); |
| 308 expectUpgrade("https://example.test:80/image.png", | 342 expectUpgrade("https://example.test:80/image.png", |
| 309 "https://example.test:80/image.png"); | 343 "https://example.test:80/image.png"); |
| 310 expectUpgrade("https://example.test:1212/image.png", | 344 expectUpgrade("https://example.test:1212/image.png", |
| 311 "https://example.test:1212/image.png"); | 345 "https://example.test:1212/image.png"); |
| 312 | 346 |
| 313 expectUpgrade("ftp://example.test/image.png", "ftp://example.test/image.png"); | 347 expectUpgrade("ftp://example.test/image.png", "ftp://example.test/image.png"); |
| 314 expectUpgrade("ftp://example.test:21/image.png", | 348 expectUpgrade("ftp://example.test:21/image.png", |
| 315 "ftp://example.test:21/image.png"); | 349 "ftp://example.test:21/image.png"); |
| 316 expectUpgrade("ftp://example.test:1212/image.png", | 350 expectUpgrade("ftp://example.test:1212/image.png", |
| 317 "ftp://example.test:1212/image.png"); | 351 "ftp://example.test:1212/image.png"); |
| 318 } | 352 } |
| 319 | 353 |
| 320 TEST_F(FrameFetchContextUpgradeTest, SendHTTPSHeader) { | 354 TEST_F(FrameFetchContextModifyRequestTest, SendUpgradeInsecureRequestHeader) { |
| 321 struct TestCase { | 355 struct TestCase { |
| 322 const char* toRequest; | 356 const char* toRequest; |
| 323 WebURLRequest::FrameType frameType; | 357 WebURLRequest::FrameType frameType; |
| 324 bool shouldPrefer; | 358 bool shouldPrefer; |
| 325 } tests[] = { | 359 } tests[] = { |
| 326 {"http://example.test/page.html", WebURLRequest::FrameTypeAuxiliary, | 360 {"http://example.test/page.html", WebURLRequest::FrameTypeAuxiliary, |
| 327 true}, | 361 true}, |
| 328 {"http://example.test/page.html", WebURLRequest::FrameTypeNested, true}, | 362 {"http://example.test/page.html", WebURLRequest::FrameTypeNested, true}, |
| 329 {"http://example.test/page.html", WebURLRequest::FrameTypeNone, false}, | 363 {"http://example.test/page.html", WebURLRequest::FrameTypeNone, false}, |
| 330 {"http://example.test/page.html", WebURLRequest::FrameTypeTopLevel, true}, | 364 {"http://example.test/page.html", WebURLRequest::FrameTypeTopLevel, true}, |
| 331 {"https://example.test/page.html", WebURLRequest::FrameTypeAuxiliary, | 365 {"https://example.test/page.html", WebURLRequest::FrameTypeAuxiliary, |
| 332 true}, | 366 true}, |
| 333 {"https://example.test/page.html", WebURLRequest::FrameTypeNested, true}, | 367 {"https://example.test/page.html", WebURLRequest::FrameTypeNested, true}, |
| 334 {"https://example.test/page.html", WebURLRequest::FrameTypeNone, false}, | 368 {"https://example.test/page.html", WebURLRequest::FrameTypeNone, false}, |
| 335 {"https://example.test/page.html", WebURLRequest::FrameTypeTopLevel, | 369 {"https://example.test/page.html", WebURLRequest::FrameTypeTopLevel, |
| 336 true}}; | 370 true}}; |
| 337 | 371 |
| 338 // This should work correctly both when the FrameFetchContext has a Document, | 372 // This should work correctly both when the FrameFetchContext has a Document, |
| 339 // and when it doesn't (e.g. during main frame navigations), so run through | 373 // and when it doesn't (e.g. during main frame navigations), so run through |
| 340 // the tests both before and after providing a document to the context. | 374 // the tests both before and after providing a document to the context. |
| 341 for (const auto& test : tests) { | 375 for (const auto& test : tests) { |
| 342 document->setInsecureRequestPolicy(kLeaveInsecureRequestsAlone); | 376 document->setInsecureRequestPolicy(kLeaveInsecureRequestsAlone); |
| 343 expectHTTPSHeader(test.toRequest, test.frameType, test.shouldPrefer); | 377 expectUpgradeInsecureRequestHeader(test.toRequest, test.frameType, |
| 378 test.shouldPrefer); | |
| 344 | 379 |
| 345 document->setInsecureRequestPolicy(kUpgradeInsecureRequests); | 380 document->setInsecureRequestPolicy(kUpgradeInsecureRequests); |
| 346 expectHTTPSHeader(test.toRequest, test.frameType, test.shouldPrefer); | 381 expectUpgradeInsecureRequestHeader(test.toRequest, test.frameType, |
| 382 test.shouldPrefer); | |
| 347 } | 383 } |
| 348 | 384 |
| 349 FrameFetchContext::provideDocumentToContext(*fetchContext, document.get()); | 385 FrameFetchContext::provideDocumentToContext(*fetchContext, document.get()); |
| 350 | 386 |
| 351 for (const auto& test : tests) { | 387 for (const auto& test : tests) { |
| 352 document->setInsecureRequestPolicy(kLeaveInsecureRequestsAlone); | 388 document->setInsecureRequestPolicy(kLeaveInsecureRequestsAlone); |
| 353 expectHTTPSHeader(test.toRequest, test.frameType, test.shouldPrefer); | 389 expectUpgradeInsecureRequestHeader(test.toRequest, test.frameType, |
| 390 test.shouldPrefer); | |
| 354 | 391 |
| 355 document->setInsecureRequestPolicy(kUpgradeInsecureRequests); | 392 document->setInsecureRequestPolicy(kUpgradeInsecureRequests); |
| 356 expectHTTPSHeader(test.toRequest, test.frameType, test.shouldPrefer); | 393 expectUpgradeInsecureRequestHeader(test.toRequest, test.frameType, |
| 394 test.shouldPrefer); | |
| 357 } | 395 } |
| 358 } | 396 } |
| 359 | 397 |
| 398 TEST_F(FrameFetchContextModifyRequestTest, SendExpectedEmbeddingCSPHeader) { | |
| 399 struct TestCase { | |
| 400 const char* toRequest; | |
| 401 WebURLRequest::FrameType frameType; | |
| 402 } tests[] = { | |
| 403 {"https://example.test/page.html", WebURLRequest::FrameTypeAuxiliary}, | |
| 404 {"https://example.test/page.html", WebURLRequest::FrameTypeNested}, | |
| 405 {"https://example.test/page.html", WebURLRequest::FrameTypeNone}, | |
| 406 {"https://example.test/page.html", WebURLRequest::FrameTypeTopLevel}}; | |
| 407 | |
| 408 HTMLIFrameElement* iframe = HTMLIFrameElement::create(*document); | |
| 409 const AtomicString& requiredCSP = AtomicString("default-src 'none'"); | |
| 410 const AtomicString& anotherRequiredCSP = AtomicString("default-src 'self'"); | |
| 411 | |
| 412 // This should work correctly both when the FrameFetchContext has a Document, | |
| 413 // and when it doesn't (e.g. during main frame navigations), so run through | |
| 414 // the tests both before and after providing a document to the context. | |
|
Mike West
2016/10/06 13:30:21
I don't think this comment is accurate for this he
| |
| 415 for (const auto& test : tests) { | |
| 416 AtomicString expectedRequiredCSP = | |
| 417 setFrameOwnerBasedOnFrameType(test.frameType, iframe, requiredCSP); | |
| 418 expectSetEmbeddingCSPRequestHeader(test.toRequest, test.frameType, | |
|
Mike West
2016/10/06 13:30:21
Using the return value to set the expectation is s
| |
| 419 expectedRequiredCSP); | |
| 420 | |
| 421 expectedRequiredCSP = setFrameOwnerBasedOnFrameType(test.frameType, iframe, | |
| 422 anotherRequiredCSP); | |
| 423 expectSetEmbeddingCSPRequestHeader(test.toRequest, test.frameType, | |
| 424 expectedRequiredCSP); | |
| 425 } | |
| 426 | |
| 427 FrameFetchContext::provideDocumentToContext(*fetchContext, document.get()); | |
| 428 | |
| 429 for (const auto& test : tests) { | |
| 430 AtomicString expectedRequiredCSP = | |
| 431 setFrameOwnerBasedOnFrameType(test.frameType, iframe, requiredCSP); | |
| 432 expectSetEmbeddingCSPRequestHeader(test.toRequest, test.frameType, | |
| 433 expectedRequiredCSP); | |
| 434 | |
| 435 expectedRequiredCSP = setFrameOwnerBasedOnFrameType(test.frameType, iframe, | |
| 436 anotherRequiredCSP); | |
| 437 expectSetEmbeddingCSPRequestHeader(test.toRequest, test.frameType, | |
| 438 expectedRequiredCSP); | |
| 439 } | |
| 440 } | |
| 441 | |
| 360 class FrameFetchContextHintsTest : public FrameFetchContextTest { | 442 class FrameFetchContextHintsTest : public FrameFetchContextTest { |
| 361 public: | 443 public: |
| 362 FrameFetchContextHintsTest() {} | 444 FrameFetchContextHintsTest() {} |
| 363 | 445 |
| 364 protected: | 446 protected: |
| 365 void expectHeader(const char* input, | 447 void expectHeader(const char* input, |
| 366 const char* headerName, | 448 const char* headerName, |
| 367 bool isPresent, | 449 bool isPresent, |
| 368 const char* headerValue, | 450 const char* headerValue, |
| 369 float width = 0) { | 451 float width = 0) { |
| (...skipping 368 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 738 fetchContext->addAdditionalRequestHeaders(mainRequest, FetchMainResource); | 820 fetchContext->addAdditionalRequestHeaders(mainRequest, FetchMainResource); |
| 739 EXPECT_EQ(test.isExternalExpectation, mainRequest.isExternalRequest()); | 821 EXPECT_EQ(test.isExternalExpectation, mainRequest.isExternalRequest()); |
| 740 | 822 |
| 741 ResourceRequest subRequest(test.url); | 823 ResourceRequest subRequest(test.url); |
| 742 fetchContext->addAdditionalRequestHeaders(subRequest, FetchSubresource); | 824 fetchContext->addAdditionalRequestHeaders(subRequest, FetchSubresource); |
| 743 EXPECT_EQ(test.isExternalExpectation, subRequest.isExternalRequest()); | 825 EXPECT_EQ(test.isExternalExpectation, subRequest.isExternalRequest()); |
| 744 } | 826 } |
| 745 } | 827 } |
| 746 | 828 |
| 747 } // namespace blink | 829 } // namespace blink |
| OLD | NEW |