Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(80)

Side by Side Diff: chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc

Issue 2455393002: PS - Adjusting webRequest API for use in Public Sessions (Closed)
Patch Set: Drew's nits Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | extensions/browser/api/web_request/web_request_api.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <stddef.h> 5 #include <stddef.h>
6 6
7 #include <memory> 7 #include <memory>
8 8
9 #include "base/macros.h" 9 #include "base/macros.h"
10 #include "base/message_loop/message_loop.h" 10 #include "base/message_loop/message_loop.h"
11 #include "chrome/common/extensions/extension_test_util.h" 11 #include "chrome/common/extensions/extension_test_util.h"
12 #include "chromeos/login/login_state.h"
12 #include "content/public/browser/resource_request_info.h" 13 #include "content/public/browser/resource_request_info.h"
13 #include "content/public/test/test_browser_thread_bundle.h" 14 #include "content/public/test/test_browser_thread_bundle.h"
14 #include "extensions/browser/api/web_request/web_request_permissions.h" 15 #include "extensions/browser/api/web_request/web_request_permissions.h"
15 #include "extensions/browser/info_map.h" 16 #include "extensions/browser/info_map.h"
16 #include "extensions/common/constants.h" 17 #include "extensions/common/constants.h"
17 #include "extensions/common/permissions/permissions_data.h" 18 #include "extensions/common/permissions/permissions_data.h"
18 #include "ipc/ipc_message.h" 19 #include "ipc/ipc_message.h"
19 #include "net/base/request_priority.h" 20 #include "net/base/request_priority.h"
20 #include "net/url_request/url_request.h" 21 #include "net/url_request/url_request.h"
21 #include "net/url_request/url_request_test_util.h" 22 #include "net/url_request/url_request_test_util.h"
(...skipping 17 matching lines...) Expand all
39 private: 40 private:
40 content::TestBrowserThreadBundle thread_bundle_; 41 content::TestBrowserThreadBundle thread_bundle_;
41 42
42 protected: 43 protected:
43 net::TestURLRequestContext context; 44 net::TestURLRequestContext context;
44 45
45 // This extension has Web Request permissions, but no host permission. 46 // This extension has Web Request permissions, but no host permission.
46 scoped_refptr<Extension> permissionless_extension_; 47 scoped_refptr<Extension> permissionless_extension_;
47 // This extension has Web Request permissions, and *.com a host permission. 48 // This extension has Web Request permissions, and *.com a host permission.
48 scoped_refptr<Extension> com_extension_; 49 scoped_refptr<Extension> com_extension_;
50 // This extension is the same as com_extension, except it's installed from
51 // Manifest::EXTERNAL_POLICY_DOWNLOAD.
52 scoped_refptr<Extension> com_policy_extension_;
49 scoped_refptr<extensions::InfoMap> extension_info_map_; 53 scoped_refptr<extensions::InfoMap> extension_info_map_;
50 }; 54 };
51 55
52 void ExtensionWebRequestHelpersTestWithThreadsTest::SetUp() { 56 void ExtensionWebRequestHelpersTestWithThreadsTest::SetUp() {
53 testing::Test::SetUp(); 57 testing::Test::SetUp();
54 58
55 std::string error; 59 std::string error;
56 permissionless_extension_ = LoadManifestUnchecked("permissions", 60 permissionless_extension_ = LoadManifestUnchecked("permissions",
57 "web_request_no_host.json", 61 "web_request_no_host.json",
58 Manifest::INVALID_LOCATION, 62 Manifest::INVALID_LOCATION,
59 Extension::NO_FLAGS, 63 Extension::NO_FLAGS,
60 "ext_id_1", 64 "ext_id_1",
61 &error); 65 &error);
62 ASSERT_TRUE(permissionless_extension_.get()) << error; 66 ASSERT_TRUE(permissionless_extension_.get()) << error;
63 com_extension_ = 67 com_extension_ =
64 LoadManifestUnchecked("permissions", 68 LoadManifestUnchecked("permissions",
65 "web_request_com_host_permissions.json", 69 "web_request_com_host_permissions.json",
66 Manifest::INVALID_LOCATION, 70 Manifest::INVALID_LOCATION,
67 Extension::NO_FLAGS, 71 Extension::NO_FLAGS,
68 "ext_id_2", 72 "ext_id_2",
69 &error); 73 &error);
70 ASSERT_TRUE(com_extension_.get()) << error; 74 ASSERT_TRUE(com_extension_.get()) << error;
75 com_policy_extension_ =
76 LoadManifestUnchecked("permissions",
77 "web_request_com_host_permissions.json",
78 Manifest::EXTERNAL_POLICY_DOWNLOAD,
79 Extension::NO_FLAGS,
80 "ext_id_3",
81 &error);
82 ASSERT_TRUE(com_policy_extension_.get()) << error;
71 extension_info_map_ = new extensions::InfoMap; 83 extension_info_map_ = new extensions::InfoMap;
72 extension_info_map_->AddExtension(permissionless_extension_.get(), 84 extension_info_map_->AddExtension(permissionless_extension_.get(),
73 base::Time::Now(), 85 base::Time::Now(),
74 false /*incognito_enabled*/, 86 false, // incognito_enabled
75 false /*notifications_disabled*/); 87 false); // notifications_disabled
76 extension_info_map_->AddExtension( 88 extension_info_map_->AddExtension(
77 com_extension_.get(), 89 com_extension_.get(),
78 base::Time::Now(), 90 base::Time::Now(),
79 false /*incognito_enabled*/, 91 false, // incognito_enabled
80 false /*notifications_disabled*/); 92 false); // notifications_disabled
93 extension_info_map_->AddExtension(
94 com_policy_extension_.get(),
95 base::Time::Now(),
96 false, // incognito_enabled
97 false); // notifications_disabled
81 } 98 }
82 99
83 TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) { 100 TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) {
84 net::TestURLRequestContext context; 101 net::TestURLRequestContext context;
85 const char* const sensitive_urls[] = { 102 const char* const sensitive_urls[] = {
86 "http://clients2.google.com", 103 "http://clients2.google.com",
87 "http://clients22.google.com", 104 "http://clients22.google.com",
88 "https://clients2.google.com", 105 "https://clients2.google.com",
89 "http://clients2.google.com/service/update2/crx", 106 "http://clients2.google.com/service/update2/crx",
90 "https://clients.google.com", 107 "https://clients.google.com",
(...skipping 65 matching lines...) Expand 10 before | Expand all | Expand 10 after
156 TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, 173 TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest,
157 TestCanExtensionAccessURL_HostPermissions) { 174 TestCanExtensionAccessURL_HostPermissions) {
158 std::unique_ptr<net::URLRequest> request(context.CreateRequest( 175 std::unique_ptr<net::URLRequest> request(context.CreateRequest(
159 GURL("http://example.com"), net::DEFAULT_PRIORITY, NULL)); 176 GURL("http://example.com"), net::DEFAULT_PRIORITY, NULL));
160 177
161 EXPECT_EQ(PermissionsData::ACCESS_ALLOWED, 178 EXPECT_EQ(PermissionsData::ACCESS_ALLOWED,
162 WebRequestPermissions::CanExtensionAccessURL( 179 WebRequestPermissions::CanExtensionAccessURL(
163 extension_info_map_.get(), permissionless_extension_->id(), 180 extension_info_map_.get(), permissionless_extension_->id(),
164 request->url(), 181 request->url(),
165 -1, // No tab id. 182 -1, // No tab id.
166 false /*crosses_incognito*/, 183 false, // crosses_incognito
167 WebRequestPermissions::DO_NOT_CHECK_HOST)); 184 WebRequestPermissions::DO_NOT_CHECK_HOST));
168 EXPECT_EQ(PermissionsData::ACCESS_DENIED, 185 EXPECT_EQ(PermissionsData::ACCESS_DENIED,
169 WebRequestPermissions::CanExtensionAccessURL( 186 WebRequestPermissions::CanExtensionAccessURL(
170 extension_info_map_.get(), permissionless_extension_->id(), 187 extension_info_map_.get(), permissionless_extension_->id(),
171 request->url(), 188 request->url(),
172 -1, // No tab id. 189 -1, // No tab id.
173 false /*crosses_incognito*/, 190 false, // crosses_incognito
174 WebRequestPermissions::REQUIRE_HOST_PERMISSION)); 191 WebRequestPermissions::REQUIRE_HOST_PERMISSION));
175 EXPECT_EQ(PermissionsData::ACCESS_ALLOWED, 192 EXPECT_EQ(PermissionsData::ACCESS_ALLOWED,
176 WebRequestPermissions::CanExtensionAccessURL( 193 WebRequestPermissions::CanExtensionAccessURL(
177 extension_info_map_.get(), com_extension_->id(), request->url(), 194 extension_info_map_.get(), com_extension_->id(), request->url(),
178 -1, // No tab id. 195 -1, // No tab id.
179 false /*crosses_incognito*/, 196 false, // crosses_incognito
180 WebRequestPermissions::REQUIRE_HOST_PERMISSION)); 197 WebRequestPermissions::REQUIRE_HOST_PERMISSION));
181 EXPECT_EQ(PermissionsData::ACCESS_DENIED, 198 EXPECT_EQ(PermissionsData::ACCESS_DENIED,
182 WebRequestPermissions::CanExtensionAccessURL( 199 WebRequestPermissions::CanExtensionAccessURL(
183 extension_info_map_.get(), com_extension_->id(), request->url(), 200 extension_info_map_.get(), com_extension_->id(), request->url(),
184 -1, // No tab id. 201 -1, // No tab id.
185 false /*crosses_incognito*/, 202 false, // crosses_incognito
186 WebRequestPermissions::REQUIRE_ALL_URLS)); 203 WebRequestPermissions::REQUIRE_ALL_URLS));
204
205 // Public Sessions tests.
206 #if defined(OS_CHROMEOS)
207 std::unique_ptr<net::URLRequest> org_request(context.CreateRequest(
208 GURL("http://example.org"), net::DEFAULT_PRIORITY, NULL));
209
210 // com_extension_ doesn't have host permission for .org URL's.
211 EXPECT_EQ(PermissionsData::ACCESS_DENIED,
212 WebRequestPermissions::CanExtensionAccessURL(
213 extension_info_map_.get(), com_policy_extension_->id(),
214 org_request->url(),
215 -1, // No tab id.
216 false, // crosses_incognito
217 WebRequestPermissions::REQUIRE_HOST_PERMISSION));
218
219 // Set Public Session state.
220 chromeos::LoginState::Initialize();
221 chromeos::LoginState::Get()->SetLoggedInState(
222 chromeos::LoginState::LOGGED_IN_ACTIVE,
223 chromeos::LoginState::LOGGED_IN_USER_PUBLIC_ACCOUNT);
224
225 // Host permission checks are disabled in Public Sessions, instead all URL's
Devlin 2016/11/10 16:04:58 What's the motivation for granting access beyond w
Ivan Šandrk 2016/11/10 17:56:19 The host permissions were deemed to be inherently
226 // are whitelisted.
227 EXPECT_EQ(PermissionsData::ACCESS_ALLOWED,
228 WebRequestPermissions::CanExtensionAccessURL(
229 extension_info_map_.get(), com_policy_extension_->id(),
230 org_request->url(),
231 -1, // No tab id.
232 false, // crosses_incognito
233 WebRequestPermissions::REQUIRE_HOST_PERMISSION));
234
235 EXPECT_EQ(PermissionsData::ACCESS_ALLOWED,
236 WebRequestPermissions::CanExtensionAccessURL(
237 extension_info_map_.get(), com_policy_extension_->id(),
238 org_request->url(),
239 -1, // No tab id.
240 false, // crosses_incognito
241 WebRequestPermissions::REQUIRE_ALL_URLS));
242 #endif
187 } 243 }
OLDNEW
« no previous file with comments | « no previous file | extensions/browser/api/web_request/web_request_api.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698