Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(533)

Unified Diff: content/browser/permissions/permission_service_impl_unittest.cc

Issue 2874053003: Add checks for Feature Policy to the mojo Permission Service (Closed)
Patch Set: Add checks for Feature Policy to the mojo Permission Service Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « content/browser/permissions/permission_service_impl.cc ('k') | content/test/BUILD.gn » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: content/browser/permissions/permission_service_impl_unittest.cc
diff --git a/content/browser/permissions/permission_service_impl_unittest.cc b/content/browser/permissions/permission_service_impl_unittest.cc
new file mode 100644
index 0000000000000000000000000000000000000000..33f59d2a6e4ac1f54246aa50e3b3629d6ed608df
--- /dev/null
+++ b/content/browser/permissions/permission_service_impl_unittest.cc
@@ -0,0 +1,189 @@
+// Copyright 2017 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "content/browser/permissions/permission_service_impl.h"
+
+#include "base/run_loop.h"
+#include "base/test/scoped_feature_list.h"
+#include "content/browser/permissions/permission_service_context.h"
+#include "content/public/browser/web_contents.h"
+#include "content/public/common/content_features.h"
+#include "content/public/test/test_browser_context.h"
+#include "content/public/test/test_renderer_host.h"
+#include "content/test/mock_permission_manager.h"
+#include "mojo/public/cpp/bindings/interface_request.h"
+#include "third_party/WebKit/public/platform/WebFeaturePolicy.h"
+#include "third_party/WebKit/public/platform/modules/permissions/permission.mojom.h"
+#include "url/origin.h"
+
+using blink::mojom::PermissionStatus;
+using blink::mojom::PermissionName;
+
+namespace content {
+
+namespace {
+
+blink::mojom::PermissionDescriptorPtr CreatePermissionDescriptor(
+ PermissionName name) {
+ auto descriptor = blink::mojom::PermissionDescriptor::New();
+ descriptor->name = name;
+ return descriptor;
+}
+
+class TestPermissionManager : public MockPermissionManager {
+ public:
+ ~TestPermissionManager() override = default;
+
+ PermissionStatus GetPermissionStatus(PermissionType permission,
+ const GURL& requesting_origin,
+ const GURL& embedding_origin) override {
+ // Always return granted.
+ return PermissionStatus::GRANTED;
+ }
+
+ int RequestPermissions(
+ const std::vector<PermissionType>& permissions,
+ RenderFrameHost* render_frame_host,
+ const GURL& requesting_origin,
+ bool user_gesture,
+ const base::Callback<void(const std::vector<PermissionStatus>&)>&
+ callback) override {
+ callback.Run(std::vector<PermissionStatus>(permissions.size(),
+ PermissionStatus::GRANTED));
+ return 0;
+ }
+};
+
+} // namespace
+
+class PermissionServiceImplTest : public RenderViewHostTestHarness {
+ public:
+ PermissionServiceImplTest() : origin_(GURL("https://www.google.com")) {}
+
+ void SetUp() override {
+ RenderViewHostTestHarness::SetUp();
+ static_cast<TestBrowserContext*>(browser_context())
+ ->SetPermissionManager(base::MakeUnique<TestPermissionManager>());
+ NavigateAndCommit(origin_.GetURL());
+ service_context_.reset(new PermissionServiceContext(main_rfh()));
+ service_impl_.reset(new PermissionServiceImpl(service_context_.get()));
+ }
+
+ void TearDown() override {
+ service_impl_.reset();
+ service_context_.reset();
+ RenderViewHostTestHarness::TearDown();
+ }
+
+ protected:
+ // The header policy should only be set once on page load, so we refresh the
+ // page to simulate that.
+ void RefreshPageAndSetHeaderPolicy(blink::WebFeaturePolicyFeature feature,
+ bool enabled) {
+ NavigateAndCommit(origin_.GetURL());
+ std::vector<url::Origin> whitelist;
+ if (enabled)
+ whitelist.push_back(origin_);
+ RenderFrameHostTester::For(main_rfh())
+ ->SimulateFeaturePolicyHeader(feature, whitelist);
+ }
+
+ PermissionStatus HasPermission(PermissionName permission) {
+ base::Callback<void(PermissionStatus)> callback =
+ base::Bind(&PermissionServiceImplTest::PermissionStatusCallback,
+ base::Unretained(this));
+ service_impl_->HasPermission(CreatePermissionDescriptor(permission),
+ origin_, callback);
+ EXPECT_EQ(1u, last_permission_statuses_.size());
+ return last_permission_statuses_[0];
+ }
+
+ std::vector<PermissionStatus> RequestPermissions(
+ const std::vector<PermissionName>& permissions) {
+ std::vector<blink::mojom::PermissionDescriptorPtr> descriptors;
+ for (PermissionName name : permissions)
+ descriptors.push_back(CreatePermissionDescriptor(name));
+ base::Callback<void(const std::vector<PermissionStatus>&)> callback =
+ base::Bind(&PermissionServiceImplTest::RequestPermissionsCallback,
+ base::Unretained(this));
+ service_impl_->RequestPermissions(std::move(descriptors), origin_,
+ /*user_gesture=*/false, callback);
+ EXPECT_EQ(permissions.size(), last_permission_statuses_.size());
+ return last_permission_statuses_;
+ }
+
+ private:
+ void PermissionStatusCallback(blink::mojom::PermissionStatus status) {
+ last_permission_statuses_ = std::vector<PermissionStatus>{status};
+ }
+
+ void RequestPermissionsCallback(
+ const std::vector<PermissionStatus>& statuses) {
+ last_permission_statuses_ = statuses;
+ }
+
+ url::Origin origin_;
+
+ base::Closure quit_closure_;
+
+ std::vector<PermissionStatus> last_permission_statuses_;
+
+ std::unique_ptr<PermissionServiceImpl> service_impl_;
+ std::unique_ptr<PermissionServiceContext> service_context_;
+};
+
+// Basic tests for feature policy checks through the PermissionService. These
+// tests are not meant to cover every edge case as the FeaturePolicy class
+// itself is tested thoroughly in feature_policy_unittest.cc and in
+// render_frame_host_feature_policy_unittest.cc.
+TEST_F(PermissionServiceImplTest, HasPermissionWithFeaturePolicy) {
+ base::test::ScopedFeatureList feature_list;
+ feature_list.InitAndEnableFeature(features::kUseFeaturePolicyForPermissions);
+ // Geolocation should be enabled by default for a frame (if permission is
+ // granted).
+ EXPECT_EQ(PermissionStatus::GRANTED,
+ HasPermission(PermissionName::GEOLOCATION));
+
+ RefreshPageAndSetHeaderPolicy(blink::WebFeaturePolicyFeature::kGeolocation,
+ /*enabled=*/false);
+ EXPECT_EQ(PermissionStatus::DENIED,
+ HasPermission(PermissionName::GEOLOCATION));
+
+ // Midi should be allowed even though geolocation was disabled.
+ EXPECT_EQ(PermissionStatus::GRANTED, HasPermission(PermissionName::MIDI));
+
+ // Now block midi.
+ RefreshPageAndSetHeaderPolicy(blink::WebFeaturePolicyFeature::kMidiFeature,
+ /*enabled=*/false);
+ EXPECT_EQ(PermissionStatus::DENIED, HasPermission(PermissionName::MIDI));
+
+ // Ensure that the policy is ignored if kUseFeaturePolicyForPermissions is
+ // disabled.
+ base::test::ScopedFeatureList empty_feature_list;
+ empty_feature_list.Init();
+ EXPECT_EQ(PermissionStatus::GRANTED, HasPermission(PermissionName::MIDI));
+}
+
+TEST_F(PermissionServiceImplTest, RequestPermissionsWithFeaturePolicy) {
+ base::test::ScopedFeatureList feature_list;
+ feature_list.InitAndEnableFeature(features::kUseFeaturePolicyForPermissions);
+
+ // Disable midi.
+ RefreshPageAndSetHeaderPolicy(blink::WebFeaturePolicyFeature::kMidiFeature,
+ /*enabled=*/false);
+
+ std::vector<PermissionStatus> result =
+ RequestPermissions(std::vector<PermissionName>{PermissionName::MIDI});
+ EXPECT_EQ(1u, result.size());
+ EXPECT_EQ(PermissionStatus::DENIED, result[0]);
+
+ // Request midi along with geolocation. Geolocation should be granted.
+ result = RequestPermissions(std::vector<PermissionName>{
+ PermissionName::MIDI, PermissionName::GEOLOCATION});
+ EXPECT_EQ(2u, result.size());
+ EXPECT_EQ(PermissionStatus::DENIED, result[0]);
+ EXPECT_EQ(PermissionStatus::GRANTED, result[1]);
+}
+
+} // namespace
« no previous file with comments | « content/browser/permissions/permission_service_impl.cc ('k') | content/test/BUILD.gn » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698