Index: chrome/browser/sensor/sensor_permission_context_unittest.cc |
diff --git a/chrome/browser/sensor/sensor_permission_context_unittest.cc b/chrome/browser/sensor/sensor_permission_context_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..c692a6193c4fc6ef57d35bc7aa4e9027237ab23e |
--- /dev/null |
+++ b/chrome/browser/sensor/sensor_permission_context_unittest.cc |
@@ -0,0 +1,136 @@ |
+// Copyright 2016 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chrome/browser/sensor/sensor_permission_context.h" |
+ |
+#include "base/bind.h" |
+#include "base/macros.h" |
+#include "build/build_config.h" |
+#include "chrome/browser/content_settings/host_content_settings_map_factory.h" |
+#include "chrome/browser/permissions/permission_request_id.h" |
+#include "chrome/test/base/chrome_render_view_host_test_harness.h" |
+#include "chrome/test/base/testing_profile.h" |
+#include "components/content_settings/core/browser/host_content_settings_map.h" |
+#include "components/content_settings/core/common/content_settings.h" |
+#include "components/content_settings/core/common/content_settings_types.h" |
+#include "content/public/browser/web_contents.h" |
+#include "content/public/test/mock_render_process_host.h" |
+#include "content/public/test/web_contents_tester.h" |
+#include "testing/gtest/include/gtest/gtest.h" |
+ |
+#if defined(OS_ANDROID) |
+#include "chrome/browser/infobars/infobar_service.h" |
+#else |
+#include "chrome/browser/permissions/permission_request_manager.h" |
+#endif |
+ |
+namespace { |
+ |
+class TestSensorPermissionContext : public SensorPermissionContext { |
+ public: |
+ explicit TestSensorPermissionContext(Profile* profile) |
+ : SensorPermissionContext(profile), |
+ permission_set_(false), |
+ permission_granted_(false), |
+ tab_context_updated_(false) {} |
+ |
+ ~TestSensorPermissionContext() override {} |
+ |
+ bool permission_granted() { return permission_granted_; } |
+ |
+ bool permission_set() { return permission_set_; } |
+ |
+ bool tab_context_updated() { return tab_context_updated_; } |
+ |
+ void TrackPermissionDecision(ContentSetting content_setting) { |
+ permission_set_ = true; |
+ permission_granted_ = content_setting == CONTENT_SETTING_ALLOW; |
+ } |
+ |
+ protected: |
+ void UpdateTabContext(const PermissionRequestID& id, |
+ const GURL& requesting_origin, |
+ bool allowed) override { |
+ tab_context_updated_ = true; |
+ } |
+ |
+ private: |
+ bool permission_set_; |
+ bool permission_granted_; |
+ bool tab_context_updated_; |
+}; |
+ |
+} // anonymous namespace |
+ |
+class SensorPermissionContextTests : public ChromeRenderViewHostTestHarness { |
+ protected: |
+ SensorPermissionContextTests() = default; |
+ |
+ private: |
+ // ChromeRenderViewHostTestHarness: |
+ void SetUp() override { |
+ ChromeRenderViewHostTestHarness::SetUp(); |
+#if defined(OS_ANDROID) |
+ InfoBarService::CreateForWebContents(web_contents()); |
+#else |
+ PermissionRequestManager::CreateForWebContents(web_contents()); |
+#endif |
+ } |
+ |
+ DISALLOW_COPY_AND_ASSIGN(SensorPermissionContextTests); |
+}; |
+ |
+// Sensor permission should be denied for insecure origin. |
+TEST_F(SensorPermissionContextTests, TestInsecureRequestingUrl) { |
+ TestSensorPermissionContext permission_context(profile()); |
+ GURL url("http://www.example.com"); |
+ content::WebContentsTester::For(web_contents())->NavigateAndCommit(url); |
+ |
+ const PermissionRequestID id(web_contents()->GetRenderProcessHost()->GetID(), |
+ web_contents()->GetMainFrame()->GetRoutingID(), |
+ -1); |
+ permission_context.RequestPermission( |
+ web_contents(), id, url, true, |
+ base::Bind(&TestSensorPermissionContext::TrackPermissionDecision, |
+ base::Unretained(&permission_context))); |
+ |
+ EXPECT_TRUE(permission_context.permission_set()); |
+ EXPECT_FALSE(permission_context.permission_granted()); |
+ EXPECT_TRUE(permission_context.tab_context_updated()); |
+ |
+ ContentSetting setting = |
+ HostContentSettingsMapFactory::GetForProfile(profile()) |
+ ->GetContentSetting(url.GetOrigin(), url.GetOrigin(), |
+ CONTENT_SETTINGS_TYPE_SENSORS, std::string()); |
+ EXPECT_EQ(CONTENT_SETTING_ASK, setting); |
+} |
+ |
+// Sensor permission status should be denied for insecure origin. |
+TEST_F(SensorPermissionContextTests, TestInsecureQueryingUrl) { |
+ TestSensorPermissionContext permission_context(profile()); |
+ GURL insecure_url("http://www.example.com"); |
+ GURL secure_url("https://www.example.com"); |
+ |
+ // Check that there is no saved content settings. |
+ EXPECT_EQ(CONTENT_SETTING_ASK, |
+ HostContentSettingsMapFactory::GetForProfile(profile()) |
+ ->GetContentSetting( |
+ insecure_url.GetOrigin(), insecure_url.GetOrigin(), |
+ CONTENT_SETTINGS_TYPE_SENSORS, std::string())); |
+ EXPECT_EQ( |
+ CONTENT_SETTING_ASK, |
+ HostContentSettingsMapFactory::GetForProfile(profile()) |
+ ->GetContentSetting(secure_url.GetOrigin(), insecure_url.GetOrigin(), |
+ CONTENT_SETTINGS_TYPE_SENSORS, std::string())); |
+ EXPECT_EQ( |
+ CONTENT_SETTING_ASK, |
+ HostContentSettingsMapFactory::GetForProfile(profile()) |
+ ->GetContentSetting(insecure_url.GetOrigin(), secure_url.GetOrigin(), |
+ CONTENT_SETTINGS_TYPE_SENSORS, std::string())); |
+ |
+ EXPECT_EQ(CONTENT_SETTING_BLOCK, |
+ permission_context.GetPermissionStatus(insecure_url, insecure_url)); |
+ EXPECT_EQ(CONTENT_SETTING_BLOCK, |
+ permission_context.GetPermissionStatus(insecure_url, secure_url)); |
+} |