Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <stddef.h> | 5 #include <stddef.h> |
| 6 | 6 |
| 7 #include <memory> | 7 #include <memory> |
| 8 | 8 |
| 9 #include "base/macros.h" | 9 #include "base/macros.h" |
| 10 #include "base/message_loop/message_loop.h" | 10 #include "base/message_loop/message_loop.h" |
| 11 #include "chrome/common/extensions/extension_test_util.h" | 11 #include "chrome/common/extensions/extension_test_util.h" |
| 12 #include "chromeos/login/login_state.h" | |
| 12 #include "content/public/browser/resource_request_info.h" | 13 #include "content/public/browser/resource_request_info.h" |
| 13 #include "content/public/test/test_browser_thread_bundle.h" | 14 #include "content/public/test/test_browser_thread_bundle.h" |
| 14 #include "extensions/browser/api/web_request/web_request_permissions.h" | 15 #include "extensions/browser/api/web_request/web_request_permissions.h" |
| 15 #include "extensions/browser/info_map.h" | 16 #include "extensions/browser/info_map.h" |
| 16 #include "extensions/common/constants.h" | 17 #include "extensions/common/constants.h" |
| 17 #include "extensions/common/permissions/permissions_data.h" | 18 #include "extensions/common/permissions/permissions_data.h" |
| 18 #include "ipc/ipc_message.h" | 19 #include "ipc/ipc_message.h" |
| 19 #include "net/base/request_priority.h" | 20 #include "net/base/request_priority.h" |
| 20 #include "net/url_request/url_request.h" | 21 #include "net/url_request/url_request.h" |
| 21 #include "net/url_request/url_request_test_util.h" | 22 #include "net/url_request/url_request_test_util.h" |
| (...skipping 17 matching lines...) Expand all Loading... | |
| 39 private: | 40 private: |
| 40 content::TestBrowserThreadBundle thread_bundle_; | 41 content::TestBrowserThreadBundle thread_bundle_; |
| 41 | 42 |
| 42 protected: | 43 protected: |
| 43 net::TestURLRequestContext context; | 44 net::TestURLRequestContext context; |
| 44 | 45 |
| 45 // This extension has Web Request permissions, but no host permission. | 46 // This extension has Web Request permissions, but no host permission. |
| 46 scoped_refptr<Extension> permissionless_extension_; | 47 scoped_refptr<Extension> permissionless_extension_; |
| 47 // This extension has Web Request permissions, and *.com a host permission. | 48 // This extension has Web Request permissions, and *.com a host permission. |
| 48 scoped_refptr<Extension> com_extension_; | 49 scoped_refptr<Extension> com_extension_; |
| 50 // This extension is the same as com_extension, except it's installed from | |
| 51 // Manifest::EXTERNAL_POLICY_DOWNLOAD. | |
| 52 scoped_refptr<Extension> com_policy_extension_; | |
| 49 scoped_refptr<extensions::InfoMap> extension_info_map_; | 53 scoped_refptr<extensions::InfoMap> extension_info_map_; |
| 50 }; | 54 }; |
| 51 | 55 |
| 52 void ExtensionWebRequestHelpersTestWithThreadsTest::SetUp() { | 56 void ExtensionWebRequestHelpersTestWithThreadsTest::SetUp() { |
| 53 testing::Test::SetUp(); | 57 testing::Test::SetUp(); |
| 54 | 58 |
| 55 std::string error; | 59 std::string error; |
| 56 permissionless_extension_ = LoadManifestUnchecked("permissions", | 60 permissionless_extension_ = LoadManifestUnchecked("permissions", |
| 57 "web_request_no_host.json", | 61 "web_request_no_host.json", |
| 58 Manifest::INVALID_LOCATION, | 62 Manifest::INVALID_LOCATION, |
| 59 Extension::NO_FLAGS, | 63 Extension::NO_FLAGS, |
| 60 "ext_id_1", | 64 "ext_id_1", |
| 61 &error); | 65 &error); |
| 62 ASSERT_TRUE(permissionless_extension_.get()) << error; | 66 ASSERT_TRUE(permissionless_extension_.get()) << error; |
| 63 com_extension_ = | 67 com_extension_ = |
| 64 LoadManifestUnchecked("permissions", | 68 LoadManifestUnchecked("permissions", |
| 65 "web_request_com_host_permissions.json", | 69 "web_request_com_host_permissions.json", |
| 66 Manifest::INVALID_LOCATION, | 70 Manifest::INVALID_LOCATION, |
| 67 Extension::NO_FLAGS, | 71 Extension::NO_FLAGS, |
| 68 "ext_id_2", | 72 "ext_id_2", |
| 69 &error); | 73 &error); |
| 70 ASSERT_TRUE(com_extension_.get()) << error; | 74 ASSERT_TRUE(com_extension_.get()) << error; |
| 75 com_policy_extension_ = | |
| 76 LoadManifestUnchecked("permissions", | |
| 77 "web_request_com_host_permissions.json", | |
| 78 Manifest::EXTERNAL_POLICY_DOWNLOAD, | |
| 79 Extension::NO_FLAGS, | |
| 80 "ext_id_3", | |
| 81 &error); | |
| 82 ASSERT_TRUE(com_policy_extension_.get()) << error; | |
| 71 extension_info_map_ = new extensions::InfoMap; | 83 extension_info_map_ = new extensions::InfoMap; |
| 72 extension_info_map_->AddExtension(permissionless_extension_.get(), | 84 extension_info_map_->AddExtension(permissionless_extension_.get(), |
| 73 base::Time::Now(), | 85 base::Time::Now(), |
| 74 false /*incognito_enabled*/, | 86 false, // incognito_enabled |
| 75 false /*notifications_disabled*/); | 87 false); // notifications_disabled |
| 76 extension_info_map_->AddExtension( | 88 extension_info_map_->AddExtension( |
| 77 com_extension_.get(), | 89 com_extension_.get(), |
| 78 base::Time::Now(), | 90 base::Time::Now(), |
| 79 false /*incognito_enabled*/, | 91 false, // incognito_enabled |
| 80 false /*notifications_disabled*/); | 92 false); // notifications_disabled |
| 93 extension_info_map_->AddExtension( | |
| 94 com_policy_extension_.get(), | |
| 95 base::Time::Now(), | |
| 96 false, // incognito_enabled | |
| 97 false); // notifications_disabled | |
| 81 } | 98 } |
| 82 | 99 |
| 83 TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) { | 100 TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) { |
| 84 net::TestURLRequestContext context; | 101 net::TestURLRequestContext context; |
| 85 const char* const sensitive_urls[] = { | 102 const char* const sensitive_urls[] = { |
| 86 "http://clients2.google.com", | 103 "http://clients2.google.com", |
| 87 "http://clients22.google.com", | 104 "http://clients22.google.com", |
| 88 "https://clients2.google.com", | 105 "https://clients2.google.com", |
| 89 "http://clients2.google.com/service/update2/crx", | 106 "http://clients2.google.com/service/update2/crx", |
| 90 "https://clients.google.com", | 107 "https://clients.google.com", |
| (...skipping 65 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 156 TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, | 173 TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, |
| 157 TestCanExtensionAccessURL_HostPermissions) { | 174 TestCanExtensionAccessURL_HostPermissions) { |
| 158 std::unique_ptr<net::URLRequest> request(context.CreateRequest( | 175 std::unique_ptr<net::URLRequest> request(context.CreateRequest( |
| 159 GURL("http://example.com"), net::DEFAULT_PRIORITY, NULL)); | 176 GURL("http://example.com"), net::DEFAULT_PRIORITY, NULL)); |
| 160 | 177 |
| 161 EXPECT_EQ(PermissionsData::ACCESS_ALLOWED, | 178 EXPECT_EQ(PermissionsData::ACCESS_ALLOWED, |
| 162 WebRequestPermissions::CanExtensionAccessURL( | 179 WebRequestPermissions::CanExtensionAccessURL( |
| 163 extension_info_map_.get(), permissionless_extension_->id(), | 180 extension_info_map_.get(), permissionless_extension_->id(), |
| 164 request->url(), | 181 request->url(), |
| 165 -1, // No tab id. | 182 -1, // No tab id. |
| 166 false /*crosses_incognito*/, | 183 false, // crosses_incognito |
| 167 WebRequestPermissions::DO_NOT_CHECK_HOST)); | 184 WebRequestPermissions::DO_NOT_CHECK_HOST)); |
| 168 EXPECT_EQ(PermissionsData::ACCESS_DENIED, | 185 EXPECT_EQ(PermissionsData::ACCESS_DENIED, |
| 169 WebRequestPermissions::CanExtensionAccessURL( | 186 WebRequestPermissions::CanExtensionAccessURL( |
| 170 extension_info_map_.get(), permissionless_extension_->id(), | 187 extension_info_map_.get(), permissionless_extension_->id(), |
| 171 request->url(), | 188 request->url(), |
| 172 -1, // No tab id. | 189 -1, // No tab id. |
| 173 false /*crosses_incognito*/, | 190 false, // crosses_incognito |
| 174 WebRequestPermissions::REQUIRE_HOST_PERMISSION)); | 191 WebRequestPermissions::REQUIRE_HOST_PERMISSION)); |
| 175 EXPECT_EQ(PermissionsData::ACCESS_ALLOWED, | 192 EXPECT_EQ(PermissionsData::ACCESS_ALLOWED, |
| 176 WebRequestPermissions::CanExtensionAccessURL( | 193 WebRequestPermissions::CanExtensionAccessURL( |
| 177 extension_info_map_.get(), com_extension_->id(), request->url(), | 194 extension_info_map_.get(), com_extension_->id(), request->url(), |
| 178 -1, // No tab id. | 195 -1, // No tab id. |
| 179 false /*crosses_incognito*/, | 196 false, // crosses_incognito |
| 180 WebRequestPermissions::REQUIRE_HOST_PERMISSION)); | 197 WebRequestPermissions::REQUIRE_HOST_PERMISSION)); |
| 181 EXPECT_EQ(PermissionsData::ACCESS_DENIED, | 198 EXPECT_EQ(PermissionsData::ACCESS_DENIED, |
| 182 WebRequestPermissions::CanExtensionAccessURL( | 199 WebRequestPermissions::CanExtensionAccessURL( |
| 183 extension_info_map_.get(), com_extension_->id(), request->url(), | 200 extension_info_map_.get(), com_extension_->id(), request->url(), |
| 184 -1, // No tab id. | 201 -1, // No tab id. |
| 185 false /*crosses_incognito*/, | 202 false, // crosses_incognito |
| 186 WebRequestPermissions::REQUIRE_ALL_URLS)); | 203 WebRequestPermissions::REQUIRE_ALL_URLS)); |
| 204 | |
| 205 // Public Sessions tests. | |
| 206 #if defined(OS_CHROMEOS) | |
| 207 std::unique_ptr<net::URLRequest> org_request(context.CreateRequest( | |
| 208 GURL("http://example.org"), net::DEFAULT_PRIORITY, NULL)); | |
| 209 | |
| 210 // com_extension_ doesn't have host permission for .org URL's. | |
| 211 EXPECT_EQ(PermissionsData::ACCESS_DENIED, | |
| 212 WebRequestPermissions::CanExtensionAccessURL( | |
| 213 extension_info_map_.get(), com_policy_extension_->id(), | |
| 214 org_request->url(), | |
| 215 -1, // No tab id. | |
| 216 false, // crosses_incognito | |
| 217 WebRequestPermissions::REQUIRE_HOST_PERMISSION)); | |
| 218 | |
| 219 // Set Public Session state. | |
| 220 chromeos::LoginState::Initialize(); | |
| 221 chromeos::LoginState::Get()->SetLoggedInState( | |
| 222 chromeos::LoginState::LOGGED_IN_ACTIVE, | |
| 223 chromeos::LoginState::LOGGED_IN_USER_PUBLIC_ACCOUNT); | |
| 224 | |
| 225 // Host permission checks are disabled in Public Sessions, instead all URL's | |
|
Devlin
2016/11/10 16:04:58
What's the motivation for granting access beyond w
Ivan Šandrk
2016/11/10 17:56:19
The host permissions were deemed to be inherently
| |
| 226 // are whitelisted. | |
| 227 EXPECT_EQ(PermissionsData::ACCESS_ALLOWED, | |
| 228 WebRequestPermissions::CanExtensionAccessURL( | |
| 229 extension_info_map_.get(), com_policy_extension_->id(), | |
| 230 org_request->url(), | |
| 231 -1, // No tab id. | |
| 232 false, // crosses_incognito | |
| 233 WebRequestPermissions::REQUIRE_HOST_PERMISSION)); | |
| 234 | |
| 235 EXPECT_EQ(PermissionsData::ACCESS_ALLOWED, | |
| 236 WebRequestPermissions::CanExtensionAccessURL( | |
| 237 extension_info_map_.get(), com_policy_extension_->id(), | |
| 238 org_request->url(), | |
| 239 -1, // No tab id. | |
| 240 false, // crosses_incognito | |
| 241 WebRequestPermissions::REQUIRE_ALL_URLS)); | |
| 242 #endif | |
| 187 } | 243 } |
| OLD | NEW |