Index: chrome/browser/media/protected_media_identifier_permission_context_unittest.cc |
diff --git a/chrome/browser/media/protected_media_identifier_permission_context_unittest.cc b/chrome/browser/media/protected_media_identifier_permission_context_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..409949351c6a1e53c50e55c5cd4197cb299d7c29 |
--- /dev/null |
+++ b/chrome/browser/media/protected_media_identifier_permission_context_unittest.cc |
@@ -0,0 +1,105 @@ |
+// Copyright 2017 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chrome/browser/media/protected_media_identifier_permission_context.h" |
+ |
+#include "base/test/scoped_command_line.h" |
+#include "chrome/common/chrome_switches.h" |
+#include "media/base/media_switches.h" |
+#include "testing/gtest/include/gtest/gtest.h" |
+#include "url/gurl.h" |
+ |
+class ProtectedMediaIdentifierPermissionContextTest : public testing::Test { |
+ public: |
+ ProtectedMediaIdentifierPermissionContextTest() |
+ : requesting_origin_("https://example.com"), |
+ requesting_sub_domain_origin_("https://subdomain.example.com") { |
+ command_line_ = scoped_command_line_.GetProcessCommandLine(); |
+ } |
+ |
+ bool IsOriginWhitelisted(const GURL& origin) { |
+ return ProtectedMediaIdentifierPermissionContext::IsOriginWhitelisted( |
+ origin); |
+ } |
+ |
+ GURL requesting_origin_; |
+ GURL requesting_sub_domain_origin_; |
+ |
+ base::test::ScopedCommandLine scoped_command_line_; |
+ base::CommandLine* command_line_; |
+}; |
+ |
+TEST_F(ProtectedMediaIdentifierPermissionContextTest, |
+ BypassWithFlagWithSingleDomain) { |
+ // The request should need to ask for permission |
+ ASSERT_FALSE(IsOriginWhitelisted(requesting_origin_)); |
+ |
+ // Add the switch value that the |
+ // ProtectedMediaIdentifierPermissionContext::reads from |
+ command_line_->AppendSwitchASCII(switches::kUserDataDir, "/dir/for/testing"); |
+ command_line_->AppendSwitchASCII( |
+ switches::kUnsafelyAllowProtectedMediaIdentifierForDomain, "example.com"); |
+ |
+ // The request should no longer need to ask for permission |
+ ASSERT_TRUE(IsOriginWhitelisted(requesting_origin_)); |
+} |
+ |
+TEST_F(ProtectedMediaIdentifierPermissionContextTest, |
+ BypassWithFlagWithDomainList) { |
+ // The request should need to ask for permission |
+ ASSERT_FALSE(IsOriginWhitelisted(requesting_origin_)); |
+ |
+ // Add the switch value that the |
+ // ProtectedMediaIdentifierPermissionContext::reads from |
+ command_line_->AppendSwitchASCII(switches::kUserDataDir, "/dir/for/testing"); |
+ command_line_->AppendSwitchASCII( |
+ switches::kUnsafelyAllowProtectedMediaIdentifierForDomain, |
+ "example.ca,example.com,example.edu"); |
+ |
+ // The request should no longer need to ask for permission |
+ ASSERT_TRUE(IsOriginWhitelisted(requesting_origin_)); |
+} |
+ |
+TEST_F(ProtectedMediaIdentifierPermissionContextTest, |
+ BypassWithFlagAndSubdomain) { |
+ // The request should need to ask for permission |
+ ASSERT_FALSE(IsOriginWhitelisted(requesting_sub_domain_origin_)); |
+ |
+ // Add the switch value that the |
+ // ProtectedMediaIdentifierPermissionContext::reads from |
+ command_line_->AppendSwitchASCII(switches::kUserDataDir, "/dir/for/testing"); |
+ command_line_->AppendSwitchASCII( |
+ switches::kUnsafelyAllowProtectedMediaIdentifierForDomain, "example.com"); |
+ |
+ // The request should no longer need to ask for permission |
+ ASSERT_TRUE(IsOriginWhitelisted(requesting_sub_domain_origin_)); |
+} |
+ |
+TEST_F(ProtectedMediaIdentifierPermissionContextTest, |
+ BypassRequiresUserDataDir) { |
+ // The request should need to ask for permission |
+ ASSERT_FALSE(IsOriginWhitelisted(requesting_origin_)); |
+ |
+ // Add the switch value that the |
+ // ProtectedMediaIdentifierPermissionContext::reads from |
+ command_line_->AppendSwitchASCII( |
+ switches::kUnsafelyAllowProtectedMediaIdentifierForDomain, "example.com"); |
+ |
+ // The request should still need to ask for permission |
+ ASSERT_FALSE(IsOriginWhitelisted(requesting_origin_)); |
+ |
+ // Set the user data dir switch but do not give it a value, this should still |
+ // require the request to ask for permission. |
+ command_line_->AppendSwitch(switches::kUserDataDir); |
+ |
+ // The request should still need to ask for permission |
+ ASSERT_FALSE(IsOriginWhitelisted(requesting_origin_)); |
+ |
+ // Set the user data dir so the request should no longer need to ask for |
+ // permission |
+ command_line_->AppendSwitchASCII(switches::kUserDataDir, "/dir/for/testing"); |
+ |
+ // The request should no longer need to ask for permission |
+ ASSERT_TRUE(IsOriginWhitelisted(requesting_origin_)); |
+} |