Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2017 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/media/protected_media_identifier_whitelist.h" | |
| 6 #include "base/test/scoped_command_line.h" | |
| 7 #include "chrome/common/chrome_switches.h" | |
| 8 #include "media/base/media_switches.h" | |
| 9 #include "testing/gtest/include/gtest/gtest.h" | |
| 10 #include "url/gurl.h" | |
| 11 | |
| 12 class ProtectedMediaIdentifierWhitelistTest : public testing::Test {}; | |
| 13 | |
| 14 TEST_F(ProtectedMediaIdentifierWhitelistTest, NoEffect) { | |
| 15 const GURL requesting("https://example.com"); | |
| 16 const ProtectedMediaIdentifierWhitelist whitelist; | |
| 17 | |
| 18 // The request should need to ask for permission | |
|
Joey Parrish
2017/05/04 17:06:14
I don't understand this comment in context of the
Vaage
2017/05/04 17:42:30
Done.
| |
| 19 EXPECT_EQ(CONTENT_SETTING_ALLOW, | |
| 20 whitelist.modifySettingFor(CONTENT_SETTING_ALLOW, requesting)); | |
| 21 EXPECT_EQ(CONTENT_SETTING_ASK, | |
| 22 whitelist.modifySettingFor(CONTENT_SETTING_ASK, requesting)); | |
| 23 EXPECT_EQ(CONTENT_SETTING_BLOCK, | |
| 24 whitelist.modifySettingFor(CONTENT_SETTING_BLOCK, requesting)); | |
| 25 | |
| 26 // Add the switch value that the whitelist reads from | |
| 27 base::test::ScopedCommandLine scoped_command_line; | |
| 28 base::CommandLine* command_line = scoped_command_line.GetProcessCommandLine(); | |
| 29 command_line->AppendSwitch(switches::kUserDataDir); | |
| 30 command_line->AppendSwitchASCII( | |
| 31 switches::kDisableInfobarForProtectedMediaIdentifierForDomain, | |
| 32 "example.ca,example.edu"); | |
| 33 | |
| 34 // The request should not be affected as it was not added to the whitelist | |
| 35 EXPECT_EQ(CONTENT_SETTING_ALLOW, | |
| 36 whitelist.modifySettingFor(CONTENT_SETTING_ALLOW, requesting)); | |
| 37 EXPECT_EQ(CONTENT_SETTING_ASK, | |
| 38 whitelist.modifySettingFor(CONTENT_SETTING_ASK, requesting)); | |
| 39 EXPECT_EQ(CONTENT_SETTING_BLOCK, | |
| 40 whitelist.modifySettingFor(CONTENT_SETTING_BLOCK, requesting)); | |
| 41 } | |
| 42 | |
| 43 TEST_F(ProtectedMediaIdentifierWhitelistTest, IgnoresNonAsk) { | |
| 44 const GURL requesting("https://example.com"); | |
| 45 const ProtectedMediaIdentifierWhitelist whitelist; | |
| 46 | |
| 47 // Add the switch value that the whitelist reads from | |
| 48 base::test::ScopedCommandLine scoped_command_line; | |
| 49 base::CommandLine* command_line = scoped_command_line.GetProcessCommandLine(); | |
| 50 command_line->AppendSwitch(switches::kUserDataDir); | |
| 51 command_line->AppendSwitchASCII( | |
| 52 switches::kDisableInfobarForProtectedMediaIdentifierForDomain, | |
| 53 "example.com"); | |
| 54 | |
| 55 // The whilelist should not change the settings for any non-ask settings | |
| 56 EXPECT_EQ(CONTENT_SETTING_ALLOW, | |
| 57 whitelist.modifySettingFor(CONTENT_SETTING_ALLOW, requesting)); | |
| 58 EXPECT_EQ(CONTENT_SETTING_BLOCK, | |
| 59 whitelist.modifySettingFor(CONTENT_SETTING_BLOCK, requesting)); | |
| 60 } | |
| 61 | |
| 62 TEST_F(ProtectedMediaIdentifierWhitelistTest, BypassRequiresUserDataDir) { | |
| 63 const GURL requesting("https://example.com"); | |
| 64 const ProtectedMediaIdentifierWhitelist whitelist; | |
| 65 | |
| 66 // The request should need to ask for permission | |
| 67 EXPECT_EQ(CONTENT_SETTING_ASK, | |
| 68 whitelist.modifySettingFor(CONTENT_SETTING_ASK, requesting)); | |
| 69 | |
| 70 // Add the switch value that the whitelist reads from | |
| 71 base::test::ScopedCommandLine scoped_command_line; | |
| 72 base::CommandLine* command_line = scoped_command_line.GetProcessCommandLine(); | |
| 73 command_line->AppendSwitchASCII( | |
| 74 switches::kDisableInfobarForProtectedMediaIdentifierForDomain, | |
| 75 "example.ca,example.com,example.edu"); | |
| 76 | |
| 77 // The request should still need to ask for permission | |
| 78 EXPECT_EQ(CONTENT_SETTING_ASK, | |
| 79 whitelist.modifySettingFor(CONTENT_SETTING_ASK, requesting)); | |
| 80 | |
| 81 // Set the user data dir so the request should no longer need to ask for | |
| 82 // permission | |
| 83 command_line->AppendSwitch(switches::kUserDataDir); | |
| 84 | |
| 85 EXPECT_EQ(CONTENT_SETTING_ALLOW, | |
| 86 whitelist.modifySettingFor(CONTENT_SETTING_ASK, requesting)); | |
| 87 } | |
| 88 | |
| 89 TEST_F(ProtectedMediaIdentifierWhitelistTest, BypassWithFlag) { | |
|
Joey Parrish
2017/05/04 17:06:14
From reading the test, I don't understand the purp
Vaage
2017/05/04 17:42:29
Done.
| |
| 90 const GURL requesting("https://example.com"); | |
| 91 const ProtectedMediaIdentifierWhitelist whitelist; | |
| 92 | |
| 93 // The request should need to ask for permission | |
| 94 EXPECT_EQ(CONTENT_SETTING_ASK, | |
| 95 whitelist.modifySettingFor(CONTENT_SETTING_ASK, requesting)); | |
| 96 | |
| 97 // Add the switch value that the whitelist reads from | |
| 98 base::test::ScopedCommandLine scoped_command_line; | |
| 99 base::CommandLine* command_line = scoped_command_line.GetProcessCommandLine(); | |
| 100 command_line->AppendSwitch(switches::kUserDataDir); | |
| 101 command_line->AppendSwitchASCII( | |
| 102 switches::kDisableInfobarForProtectedMediaIdentifierForDomain, | |
| 103 "example.ca,example.com,example.edu"); | |
| 104 | |
| 105 // The request should no longer need to ask for permission | |
| 106 EXPECT_EQ(CONTENT_SETTING_ALLOW, | |
| 107 whitelist.modifySettingFor(CONTENT_SETTING_ASK, requesting)); | |
| 108 } | |
| 109 | |
| 110 TEST_F(ProtectedMediaIdentifierWhitelistTest, BypassWithFlagAndSubdomain) { | |
|
Joey Parrish
2017/05/04 17:06:14
I would love to have Xiaohan's feedback on this pa
Vaage
2017/05/04 17:42:29
I found it easier to work with if I use the domain
| |
| 111 const GURL requesting("https://subdomain.example.com"); | |
| 112 const ProtectedMediaIdentifierWhitelist whitelist; | |
| 113 | |
| 114 // The request should need to ask for permission | |
| 115 EXPECT_EQ(CONTENT_SETTING_ASK, | |
| 116 whitelist.modifySettingFor(CONTENT_SETTING_ASK, requesting)); | |
| 117 | |
| 118 // Add the switch value that the whitelist reads from | |
| 119 base::test::ScopedCommandLine scoped_command_line; | |
| 120 base::CommandLine* command_line = scoped_command_line.GetProcessCommandLine(); | |
| 121 command_line->AppendSwitch(switches::kUserDataDir); | |
| 122 command_line->AppendSwitchASCII( | |
| 123 switches::kDisableInfobarForProtectedMediaIdentifierForDomain, | |
| 124 "example.com"); | |
| 125 | |
| 126 // The request should no longer need to ask for permission | |
| 127 EXPECT_EQ(CONTENT_SETTING_ALLOW, | |
| 128 whitelist.modifySettingFor(CONTENT_SETTING_ASK, requesting)); | |
| 129 } | |
| OLD | NEW |