| OLD | NEW |
| 1 // Copyright 2017 The Chromium Authors. All rights reserved. | 1 // Copyright 2017 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/browsing_data/chrome_browsing_data_remover_delegate.h" | 5 #include "chrome/browser/browsing_data/chrome_browsing_data_remover_delegate.h" |
| 6 | 6 |
| 7 #include "base/guid.h" | 7 #include "base/guid.h" |
| 8 #include "base/run_loop.h" | 8 #include "base/run_loop.h" |
| 9 #include "base/strings/string_number_conversions.h" | 9 #include "base/strings/string_number_conversions.h" |
| 10 #include "base/strings/utf_string_conversions.h" | 10 #include "base/strings/utf_string_conversions.h" |
| (...skipping 1547 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1558 host_settings[0].primary_pattern) | 1558 host_settings[0].primary_pattern) |
| 1559 << host_settings[0].primary_pattern.ToString(); | 1559 << host_settings[0].primary_pattern.ToString(); |
| 1560 EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard(kOrigin4), | 1560 EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard(kOrigin4), |
| 1561 host_settings[1].primary_pattern) | 1561 host_settings[1].primary_pattern) |
| 1562 << host_settings[1].primary_pattern.ToString(); | 1562 << host_settings[1].primary_pattern.ToString(); |
| 1563 EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard(kOrigin3), | 1563 EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard(kOrigin3), |
| 1564 host_settings[2].primary_pattern) | 1564 host_settings[2].primary_pattern) |
| 1565 << host_settings[2].primary_pattern.ToString(); | 1565 << host_settings[2].primary_pattern.ToString(); |
| 1566 } | 1566 } |
| 1567 | 1567 |
| 1568 TEST_F(ChromeBrowsingDataRemoverDelegateTest, RemoveAllContentSettings) { |
| 1569 auto* map = HostContentSettingsMapFactory::GetForProfile(GetProfile()); |
| 1570 map->SetContentSettingDefaultScope(kOrigin1, kOrigin1, |
| 1571 CONTENT_SETTINGS_TYPE_GEOLOCATION, "", |
| 1572 CONTENT_SETTING_ALLOW); |
| 1573 map->SetContentSettingDefaultScope(kOrigin2, kOrigin2, |
| 1574 CONTENT_SETTINGS_TYPE_GEOLOCATION, "", |
| 1575 CONTENT_SETTING_ALLOW); |
| 1576 |
| 1577 // Clear all except for origin1 and origin3. |
| 1578 std::unique_ptr<BrowsingDataFilterBuilder> filter( |
| 1579 BrowsingDataFilterBuilder::Create(BrowsingDataFilterBuilder::BLACKLIST)); |
| 1580 filter->AddRegisterableDomain(kTestRegisterableDomain1); |
| 1581 filter->AddRegisterableDomain(kTestRegisterableDomain3); |
| 1582 BlockUntilOriginDataRemoved( |
| 1583 AnHourAgo(), base::Time::Max(), |
| 1584 ChromeBrowsingDataRemoverDelegate::DATA_TYPE_CONTENT_SETTINGS, |
| 1585 std::move(filter)); |
| 1586 |
| 1587 EXPECT_EQ(ChromeBrowsingDataRemoverDelegate::DATA_TYPE_CONTENT_SETTINGS, |
| 1588 GetRemovalMask()); |
| 1589 EXPECT_EQ(BrowsingDataRemover::ORIGIN_TYPE_UNPROTECTED_WEB, |
| 1590 GetOriginTypeMask()); |
| 1591 |
| 1592 // Verify we only have allow for the first origin. |
| 1593 ContentSettingsForOneType host_settings; |
| 1594 map->GetSettingsForOneType(CONTENT_SETTINGS_TYPE_GEOLOCATION, std::string(), |
| 1595 &host_settings); |
| 1596 |
| 1597 ASSERT_EQ(2u, host_settings.size()); |
| 1598 // Only the first should should have a setting. |
| 1599 EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard(kOrigin1), |
| 1600 host_settings[0].primary_pattern) |
| 1601 << host_settings[0].primary_pattern.ToString(); |
| 1602 EXPECT_EQ(CONTENT_SETTING_ALLOW, host_settings[0].setting); |
| 1603 |
| 1604 // And our wildcard. |
| 1605 EXPECT_EQ(ContentSettingsPattern::Wildcard(), |
| 1606 host_settings[1].primary_pattern) |
| 1607 << host_settings[1].primary_pattern.ToString(); |
| 1608 EXPECT_EQ(CONTENT_SETTING_ASK, host_settings[1].setting); |
| 1609 } |
| 1610 |
| 1568 TEST_F(ChromeBrowsingDataRemoverDelegateTest, RemoveDurablePermission) { | 1611 TEST_F(ChromeBrowsingDataRemoverDelegateTest, RemoveDurablePermission) { |
| 1569 // Add our settings. | 1612 // Add our settings. |
| 1570 HostContentSettingsMap* host_content_settings_map = | 1613 HostContentSettingsMap* host_content_settings_map = |
| 1571 HostContentSettingsMapFactory::GetForProfile(GetProfile()); | 1614 HostContentSettingsMapFactory::GetForProfile(GetProfile()); |
| 1572 | 1615 |
| 1573 DurableStoragePermissionContext durable_permission(GetProfile()); | 1616 DurableStoragePermissionContext durable_permission(GetProfile()); |
| 1574 durable_permission.UpdateContentSetting(kOrigin1, GURL(), | 1617 durable_permission.UpdateContentSetting(kOrigin1, GURL(), |
| 1575 CONTENT_SETTING_ALLOW); | 1618 CONTENT_SETTING_ALLOW); |
| 1576 durable_permission.UpdateContentSetting(kOrigin2, GURL(), | 1619 durable_permission.UpdateContentSetting(kOrigin2, GURL(), |
| 1577 CONTENT_SETTING_ALLOW); | 1620 CONTENT_SETTING_ALLOW); |
| (...skipping 410 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1988 EXPECT_FALSE(Match(kOrigin1, kProtected, nullptr)); | 2031 EXPECT_FALSE(Match(kOrigin1, kProtected, nullptr)); |
| 1989 EXPECT_FALSE(Match(kOriginExt, kProtected, nullptr)); | 2032 EXPECT_FALSE(Match(kOriginExt, kProtected, nullptr)); |
| 1990 EXPECT_FALSE(Match(kOriginDevTools, kProtected, nullptr)); | 2033 EXPECT_FALSE(Match(kOriginDevTools, kProtected, nullptr)); |
| 1991 | 2034 |
| 1992 #if BUILDFLAG(ENABLE_EXTENSIONS) | 2035 #if BUILDFLAG(ENABLE_EXTENSIONS) |
| 1993 EXPECT_FALSE(Match(kOrigin1, kExtension, nullptr)); | 2036 EXPECT_FALSE(Match(kOrigin1, kExtension, nullptr)); |
| 1994 EXPECT_TRUE(Match(kOriginExt, kExtension, nullptr)); | 2037 EXPECT_TRUE(Match(kOriginExt, kExtension, nullptr)); |
| 1995 EXPECT_FALSE(Match(kOriginDevTools, kExtension, nullptr)); | 2038 EXPECT_FALSE(Match(kOriginDevTools, kExtension, nullptr)); |
| 1996 #endif | 2039 #endif |
| 1997 } | 2040 } |
| OLD | NEW |