| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/extensions/api/web_request/web_request_permissions.h" | 5 #include "chrome/browser/extensions/api/web_request/web_request_permissions.h" |
| 6 | 6 |
| 7 #include "base/memory/scoped_ptr.h" |
| 7 #include "base/message_loop/message_loop.h" | 8 #include "base/message_loop/message_loop.h" |
| 8 #include "chrome/common/extensions/extension_test_util.h" | 9 #include "chrome/common/extensions/extension_test_util.h" |
| 9 #include "content/public/browser/resource_request_info.h" | 10 #include "content/public/browser/resource_request_info.h" |
| 10 #include "content/public/test/test_browser_thread_bundle.h" | 11 #include "content/public/test/test_browser_thread_bundle.h" |
| 11 #include "extensions/browser/info_map.h" | 12 #include "extensions/browser/info_map.h" |
| 12 #include "extensions/common/constants.h" | 13 #include "extensions/common/constants.h" |
| 13 #include "ipc/ipc_message.h" | 14 #include "ipc/ipc_message.h" |
| 14 #include "net/base/request_priority.h" | 15 #include "net/base/request_priority.h" |
| 16 #include "net/url_request/url_request.h" |
| 15 #include "net/url_request/url_request_test_util.h" | 17 #include "net/url_request/url_request_test_util.h" |
| 16 #include "testing/gtest/include/gtest/gtest.h" | 18 #include "testing/gtest/include/gtest/gtest.h" |
| 17 | 19 |
| 18 using content::ResourceRequestInfo; | 20 using content::ResourceRequestInfo; |
| 19 using content::ResourceType; | 21 using content::ResourceType; |
| 20 using extensions::Extension; | 22 using extensions::Extension; |
| 21 using extensions::Manifest; | 23 using extensions::Manifest; |
| 22 using extension_test_util::LoadManifestUnchecked; | 24 using extension_test_util::LoadManifestUnchecked; |
| 23 | 25 |
| 24 class ExtensionWebRequestHelpersTestWithThreadsTest : public testing::Test { | 26 class ExtensionWebRequestHelpersTestWithThreadsTest : public testing::Test { |
| (...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 92 }; | 94 }; |
| 93 const char* non_sensitive_urls[] = { | 95 const char* non_sensitive_urls[] = { |
| 94 "http://www.google.com/" | 96 "http://www.google.com/" |
| 95 }; | 97 }; |
| 96 const int kSigninProcessId = 99; | 98 const int kSigninProcessId = 99; |
| 97 extension_info_map_->SetSigninProcess(kSigninProcessId); | 99 extension_info_map_->SetSigninProcess(kSigninProcessId); |
| 98 | 100 |
| 99 // Check that requests are rejected based on the destination | 101 // Check that requests are rejected based on the destination |
| 100 for (size_t i = 0; i < arraysize(sensitive_urls); ++i) { | 102 for (size_t i = 0; i < arraysize(sensitive_urls); ++i) { |
| 101 GURL sensitive_url(sensitive_urls[i]); | 103 GURL sensitive_url(sensitive_urls[i]); |
| 102 net::TestURLRequest request( | 104 scoped_ptr<net::URLRequest> request(context.CreateRequest( |
| 103 sensitive_url, net::DEFAULT_PRIORITY, NULL, &context); | 105 sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL)); |
| 104 EXPECT_TRUE( | 106 EXPECT_TRUE(WebRequestPermissions::HideRequest( |
| 105 WebRequestPermissions::HideRequest(extension_info_map_.get(), &request)) | 107 extension_info_map_.get(), request.get())) << sensitive_urls[i]; |
| 106 << sensitive_urls[i]; | |
| 107 } | 108 } |
| 108 // Check that requests are accepted if they don't touch sensitive urls. | 109 // Check that requests are accepted if they don't touch sensitive urls. |
| 109 for (size_t i = 0; i < arraysize(non_sensitive_urls); ++i) { | 110 for (size_t i = 0; i < arraysize(non_sensitive_urls); ++i) { |
| 110 GURL non_sensitive_url(non_sensitive_urls[i]); | 111 GURL non_sensitive_url(non_sensitive_urls[i]); |
| 111 net::TestURLRequest request( | 112 scoped_ptr<net::URLRequest> request(context.CreateRequest( |
| 112 non_sensitive_url, net::DEFAULT_PRIORITY, NULL, &context); | 113 non_sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL)); |
| 113 EXPECT_FALSE( | 114 EXPECT_FALSE(WebRequestPermissions::HideRequest( |
| 114 WebRequestPermissions::HideRequest(extension_info_map_.get(), &request)) | 115 extension_info_map_.get(), request.get())) << non_sensitive_urls[i]; |
| 115 << non_sensitive_urls[i]; | |
| 116 } | 116 } |
| 117 | 117 |
| 118 // Check protection of requests originating from the frame showing the Chrome | 118 // Check protection of requests originating from the frame showing the Chrome |
| 119 // WebStore. | 119 // WebStore. |
| 120 // Normally this request is not protected: | 120 // Normally this request is not protected: |
| 121 GURL non_sensitive_url("http://www.google.com/test.js"); | 121 GURL non_sensitive_url("http://www.google.com/test.js"); |
| 122 net::TestURLRequest non_sensitive_request( | 122 scoped_ptr<net::URLRequest> non_sensitive_request(context.CreateRequest( |
| 123 non_sensitive_url, net::DEFAULT_PRIORITY, NULL, &context); | 123 non_sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL)); |
| 124 EXPECT_FALSE(WebRequestPermissions::HideRequest(extension_info_map_.get(), | 124 EXPECT_FALSE(WebRequestPermissions::HideRequest( |
| 125 &non_sensitive_request)); | 125 extension_info_map_.get(), non_sensitive_request.get())); |
| 126 // If the origin is labeled by the WebStoreAppId, it becomes protected. | 126 // If the origin is labeled by the WebStoreAppId, it becomes protected. |
| 127 { | 127 { |
| 128 int process_id = 42; | 128 int process_id = 42; |
| 129 int site_instance_id = 23; | 129 int site_instance_id = 23; |
| 130 int view_id = 17; | 130 int view_id = 17; |
| 131 net::TestURLRequest sensitive_request( | 131 scoped_ptr<net::URLRequest> sensitive_request(context.CreateRequest( |
| 132 non_sensitive_url, net::DEFAULT_PRIORITY, NULL, &context); | 132 non_sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL)); |
| 133 ResourceRequestInfo::AllocateForTesting(&sensitive_request, | 133 ResourceRequestInfo::AllocateForTesting(sensitive_request.get(), |
| 134 content::RESOURCE_TYPE_SCRIPT, | 134 content::RESOURCE_TYPE_SCRIPT, |
| 135 NULL, | 135 NULL, |
| 136 process_id, | 136 process_id, |
| 137 view_id, | 137 view_id, |
| 138 MSG_ROUTING_NONE, | 138 MSG_ROUTING_NONE, |
| 139 false); | 139 false); |
| 140 extension_info_map_->RegisterExtensionProcess( | 140 extension_info_map_->RegisterExtensionProcess( |
| 141 extensions::kWebStoreAppId, process_id, site_instance_id); | 141 extensions::kWebStoreAppId, process_id, site_instance_id); |
| 142 EXPECT_TRUE(WebRequestPermissions::HideRequest(extension_info_map_.get(), | 142 EXPECT_TRUE(WebRequestPermissions::HideRequest( |
| 143 &sensitive_request)); | 143 extension_info_map_.get(), sensitive_request.get())); |
| 144 } | 144 } |
| 145 // If the process is the signin process, it becomes protected. | 145 // If the process is the signin process, it becomes protected. |
| 146 { | 146 { |
| 147 int process_id = kSigninProcessId; | 147 int process_id = kSigninProcessId; |
| 148 int view_id = 19; | 148 int view_id = 19; |
| 149 net::TestURLRequest sensitive_request( | 149 scoped_ptr<net::URLRequest> sensitive_request(context.CreateRequest( |
| 150 non_sensitive_url, net::DEFAULT_PRIORITY, NULL, &context); | 150 non_sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL)); |
| 151 ResourceRequestInfo::AllocateForTesting(&sensitive_request, | 151 ResourceRequestInfo::AllocateForTesting(sensitive_request.get(), |
| 152 content::RESOURCE_TYPE_SCRIPT, | 152 content::RESOURCE_TYPE_SCRIPT, |
| 153 NULL, | 153 NULL, |
| 154 process_id, | 154 process_id, |
| 155 view_id, | 155 view_id, |
| 156 MSG_ROUTING_NONE, | 156 MSG_ROUTING_NONE, |
| 157 false); | 157 false); |
| 158 EXPECT_TRUE(WebRequestPermissions::HideRequest(extension_info_map_.get(), | 158 EXPECT_TRUE(WebRequestPermissions::HideRequest( |
| 159 &sensitive_request)); | 159 extension_info_map_.get(), sensitive_request.get())); |
| 160 } | 160 } |
| 161 } | 161 } |
| 162 | 162 |
| 163 TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, | 163 TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, |
| 164 TestCanExtensionAccessURL_HostPermissions) { | 164 TestCanExtensionAccessURL_HostPermissions) { |
| 165 net::TestURLRequest request( | 165 scoped_ptr<net::URLRequest> request(context.CreateRequest( |
| 166 GURL("http://example.com"), net::DEFAULT_PRIORITY, NULL, &context); | 166 GURL("http://example.com"), net::DEFAULT_PRIORITY, NULL, NULL)); |
| 167 | 167 |
| 168 EXPECT_TRUE(WebRequestPermissions::CanExtensionAccessURL( | 168 EXPECT_TRUE(WebRequestPermissions::CanExtensionAccessURL( |
| 169 extension_info_map_.get(), | 169 extension_info_map_.get(), |
| 170 permissionless_extension_->id(), | 170 permissionless_extension_->id(), |
| 171 request.url(), | 171 request->url(), |
| 172 false /*crosses_incognito*/, | 172 false /*crosses_incognito*/, |
| 173 WebRequestPermissions::DO_NOT_CHECK_HOST)); | 173 WebRequestPermissions::DO_NOT_CHECK_HOST)); |
| 174 EXPECT_FALSE(WebRequestPermissions::CanExtensionAccessURL( | 174 EXPECT_FALSE(WebRequestPermissions::CanExtensionAccessURL( |
| 175 extension_info_map_.get(), | 175 extension_info_map_.get(), |
| 176 permissionless_extension_->id(), | 176 permissionless_extension_->id(), |
| 177 request.url(), | 177 request->url(), |
| 178 false /*crosses_incognito*/, | 178 false /*crosses_incognito*/, |
| 179 WebRequestPermissions::REQUIRE_HOST_PERMISSION)); | 179 WebRequestPermissions::REQUIRE_HOST_PERMISSION)); |
| 180 EXPECT_TRUE(WebRequestPermissions::CanExtensionAccessURL( | 180 EXPECT_TRUE(WebRequestPermissions::CanExtensionAccessURL( |
| 181 extension_info_map_.get(), | 181 extension_info_map_.get(), |
| 182 com_extension_->id(), | 182 com_extension_->id(), |
| 183 request.url(), | 183 request->url(), |
| 184 false /*crosses_incognito*/, | 184 false /*crosses_incognito*/, |
| 185 WebRequestPermissions::REQUIRE_HOST_PERMISSION)); | 185 WebRequestPermissions::REQUIRE_HOST_PERMISSION)); |
| 186 EXPECT_FALSE(WebRequestPermissions::CanExtensionAccessURL( | 186 EXPECT_FALSE(WebRequestPermissions::CanExtensionAccessURL( |
| 187 extension_info_map_.get(), | 187 extension_info_map_.get(), |
| 188 com_extension_->id(), | 188 com_extension_->id(), |
| 189 request.url(), | 189 request->url(), |
| 190 false /*crosses_incognito*/, | 190 false /*crosses_incognito*/, |
| 191 WebRequestPermissions::REQUIRE_ALL_URLS)); | 191 WebRequestPermissions::REQUIRE_ALL_URLS)); |
| 192 } | 192 } |
| OLD | NEW |