Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(945)

Unified Diff: chrome/common/extensions/api/sockets/sockets_manifest_permission_unittest.cc

Issue 51433002: Enable permission warnings from ManifestHandlers. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fix unit test and clang presubmit errors. Created 7 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/common/extensions/api/sockets/sockets_manifest_permission_unittest.cc
diff --git a/chrome/common/extensions/api/sockets/sockets_manifest_permission_unittest.cc b/chrome/common/extensions/api/sockets/sockets_manifest_permission_unittest.cc
new file mode 100644
index 0000000000000000000000000000000000000000..67ece8539dddaace95d29c4495f0ac151179ea5d
--- /dev/null
+++ b/chrome/common/extensions/api/sockets/sockets_manifest_permission_unittest.cc
@@ -0,0 +1,186 @@
+// Copyright 2013 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "base/json/json_reader.h"
+#include "base/pickle.h"
+#include "base/values.h"
+#include "chrome/common/extensions/api/sockets/sockets_manifest_permission.h"
+#include "chrome/common/extensions/extension_messages.h"
+#include "extensions/common/manifest_constants.h"
+#include "ipc/ipc_message.h"
+#include "testing/gtest/include/gtest/gtest.h"
+
+namespace extensions {
+
+namespace {
+
+static void AssertEmptyPermission(const SocketsManifestPermission* permission) {
+ EXPECT_TRUE(permission);
+ EXPECT_EQ(std::string(extensions::manifest_keys::kSockets), permission->id());
+ EXPECT_EQ(permission->id(), permission->name());
+ EXPECT_FALSE(permission->HasMessages());
+ EXPECT_EQ(0u, permission->entries().size());
+}
+
+} // namespace
+
+TEST(SocketsManifestPermissionTest, Empty) {
+ // Construction
+ scoped_ptr<SocketsManifestPermission> permission(
+ new SocketsManifestPermission());
+ AssertEmptyPermission(permission.get());
+
+ // Clone()/Equal()
+ scoped_ptr<SocketsManifestPermission> clone(
+ static_cast<SocketsManifestPermission*>(permission->Clone()));
+ AssertEmptyPermission(clone.get());
+
+ EXPECT_TRUE(permission->Equal(clone.get()));
+
+ // ToValue()/FromValue()
+ scoped_ptr<const base::Value> value(permission->ToValue());
+ EXPECT_TRUE(value.get());
+
+ scoped_ptr<SocketsManifestPermission> permission2(
+ new SocketsManifestPermission());
+ EXPECT_TRUE(permission2->FromValue(value.get()));
+ AssertEmptyPermission(permission2.get());
+
+ // Union/Diff/Intersection
+ scoped_ptr<SocketsManifestPermission> diff_perm(
+ static_cast<SocketsManifestPermission*>(permission->Diff(clone.get())));
+ AssertEmptyPermission(diff_perm.get());
+
+ scoped_ptr<SocketsManifestPermission> union_perm(
+ static_cast<SocketsManifestPermission*>(permission->Union(clone.get())));
+ AssertEmptyPermission(union_perm.get());
+
+ scoped_ptr<SocketsManifestPermission> intersect_perm(
+ static_cast<SocketsManifestPermission*>(
+ permission->Intersect(clone.get())));
+ AssertEmptyPermission(intersect_perm.get());
+
+ // IPC
+ scoped_ptr<SocketsManifestPermission> ipc_perm(
+ new SocketsManifestPermission());
+ scoped_ptr<SocketsManifestPermission> ipc_perm2(
+ new SocketsManifestPermission());
+
+ IPC::Message m;
+ ipc_perm->Write(&m);
+ PickleIterator iter(m);
+ EXPECT_TRUE(ipc_perm2->Read(&m, &iter));
+ AssertEmptyPermission(ipc_perm2.get());
+}
+
+TEST(SocketsManifestPermissionTest, General) {
+ std::string udp_send_string = "{ \"udp\": { \"send\": \"\" } }";
+ scoped_ptr<base::Value> udp_send(base::JSONReader::Read(udp_send_string));
+ EXPECT_TRUE(udp_send);
+
+ std::string udp_bind_string = "{ \"udp\": { \"bind\": \"127.0.0.1:3007\" } }";
+ scoped_ptr<base::Value> udp_bind(base::JSONReader::Read(udp_bind_string));
+ EXPECT_TRUE(udp_bind);
+
+ std::string tcp_connect_string =
+ "{ \"tcp\": { \"connect\": \"127.0.0.1:80\" } }";
+ scoped_ptr<base::Value> tcp_connect(
+ base::JSONReader::Read(tcp_connect_string));
+ EXPECT_TRUE(tcp_connect);
+
+ std::string tcp_server_listen_string =
+ "{ \"tcpServer\": { \"listen\": \"127.0.0.1:80\" } }";
+ scoped_ptr<base::Value> tcp_server_listen(
+ base::JSONReader::Read(tcp_server_listen_string));
+ EXPECT_TRUE(tcp_server_listen);
+
+ // FromValue()
+ scoped_ptr<SocketsManifestPermission> permission1(
+ new SocketsManifestPermission());
+ EXPECT_TRUE(permission1->FromValue(udp_send.get()));
+ EXPECT_EQ(1u, permission1->entries().size());
+
+ scoped_ptr<SocketsManifestPermission> permission2(
+ new SocketsManifestPermission());
+ EXPECT_TRUE(permission2->FromValue(udp_bind.get()));
+ EXPECT_EQ(1u, permission2->entries().size());
+
+ scoped_ptr<SocketsManifestPermission> permission3(
+ new SocketsManifestPermission());
+ EXPECT_TRUE(permission3->FromValue(tcp_connect.get()));
+ EXPECT_EQ(1u, permission3->entries().size());
+
+ scoped_ptr<SocketsManifestPermission> permission4(
+ new SocketsManifestPermission());
+ EXPECT_TRUE(permission4->FromValue(tcp_server_listen.get()));
+ EXPECT_EQ(1u, permission4->entries().size());
+
+ // ToValue()
+ scoped_ptr<base::Value> value1 = permission1->ToValue();
+ EXPECT_TRUE(value1);
+ scoped_ptr<SocketsManifestPermission> permission1_1(
+ new SocketsManifestPermission());
+ EXPECT_TRUE(permission1_1->FromValue(value1.get()));
+ EXPECT_TRUE(permission1->Equal(permission1_1.get()));
+
+ scoped_ptr<base::Value> value2 = permission2->ToValue();
+ EXPECT_TRUE(value2);
+ scoped_ptr<SocketsManifestPermission> permission2_1(
+ new SocketsManifestPermission());
+ EXPECT_TRUE(permission2_1->FromValue(value2.get()));
+ EXPECT_TRUE(permission2->Equal(permission2_1.get()));
+
+ scoped_ptr<base::Value> value3 = permission3->ToValue();
+ EXPECT_TRUE(value3);
+ scoped_ptr<SocketsManifestPermission> permission3_1(
+ new SocketsManifestPermission());
+ EXPECT_TRUE(permission3_1->FromValue(value3.get()));
+ EXPECT_TRUE(permission3->Equal(permission3_1.get()));
+
+ scoped_ptr<base::Value> value4 = permission4->ToValue();
+ EXPECT_TRUE(value4);
+ scoped_ptr<SocketsManifestPermission> permission4_1(
+ new SocketsManifestPermission());
+ EXPECT_TRUE(permission4_1->FromValue(value4.get()));
+ EXPECT_TRUE(permission4->Equal(permission4_1.get()));
+
+ // Union/Diff/Intersection
+ scoped_ptr<SocketsManifestPermission> union_perm(
+ static_cast<SocketsManifestPermission*>(
+ permission1->Union(permission2.get())));
+ EXPECT_TRUE(union_perm);
+ EXPECT_EQ(2u, union_perm->entries().size());
+
+ EXPECT_TRUE(union_perm->Contains(permission1.get()));
+ EXPECT_TRUE(union_perm->Contains(permission2.get()));
+ EXPECT_FALSE(union_perm->Contains(permission3.get()));
+ EXPECT_FALSE(union_perm->Contains(permission4.get()));
+
+ scoped_ptr<SocketsManifestPermission> diff_perm1(
+ static_cast<SocketsManifestPermission*>(
+ permission1->Diff(permission2.get())));
+ EXPECT_TRUE(diff_perm1);
+ EXPECT_EQ(1u, diff_perm1->entries().size());
+
+ EXPECT_TRUE(permission1->Equal(diff_perm1.get()));
+ EXPECT_TRUE(diff_perm1->Equal(permission1.get()));
+
+ scoped_ptr<SocketsManifestPermission> diff_perm2(
+ static_cast<SocketsManifestPermission*>(
+ permission1->Diff(union_perm.get())));
+ EXPECT_TRUE(diff_perm2);
+ AssertEmptyPermission(diff_perm2.get());
+
+ scoped_ptr<SocketsManifestPermission> intersect_perm1(
+ static_cast<SocketsManifestPermission*>(
+ union_perm->Intersect(permission1.get())));
+ EXPECT_TRUE(intersect_perm1);
+ EXPECT_EQ(1u, intersect_perm1->entries().size());
+
+ EXPECT_TRUE(permission1->Equal(intersect_perm1.get()));
+ EXPECT_TRUE(intersect_perm1->Equal(permission1.get()));
+
+}
+
+} // namespace extensions

Powered by Google App Engine
This is Rietveld 408576698