Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(241)

Side by Side Diff: chrome/common/extensions/permissions/permission_set_unittest.cc

Issue 553153005: Move extensions APIPermissionSet tests to extensions_unittests (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: (api-permissions) cleanup Created 6 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/command_line.h" 5 #include "base/command_line.h"
6 #include "base/json/json_file_value_serializer.h" 6 #include "base/json/json_file_value_serializer.h"
7 #include "base/logging.h" 7 #include "base/logging.h"
8 #include "base/path_service.h" 8 #include "base/path_service.h"
9 #include "base/strings/utf_string_conversions.h" 9 #include "base/strings/utf_string_conversions.h"
10 #include "chrome/common/chrome_paths.h" 10 #include "chrome/common/chrome_paths.h"
(...skipping 788 matching lines...) Expand 10 before | Expand all | Expand 10 after
799 ASSERT_EQ(1u, messages.size()); 799 ASSERT_EQ(1u, messages.size());
800 std::sort(messages.begin(), messages.end()); 800 std::sort(messages.begin(), messages.end());
801 std::set<PermissionMessage::ID> ids; 801 std::set<PermissionMessage::ID> ids;
802 for (PermissionMessages::const_iterator it = messages.begin(); 802 for (PermissionMessages::const_iterator it = messages.begin();
803 it != messages.end(); ++it) { 803 it != messages.end(); ++it) {
804 ids.insert(it->id()); 804 ids.insert(it->id());
805 } 805 }
806 EXPECT_TRUE(ContainsKey(ids, PermissionMessage::kFileSystemDirectory)); 806 EXPECT_TRUE(ContainsKey(ids, PermissionMessage::kFileSystemDirectory));
807 } 807 }
808 808
809 // The file system permissions have a special-case hack to show a warning for
James Cook 2014/09/09 23:19:20 I moved this here because src/extensions doesn't h
810 // write and directory at the same time.
811 // TODO(sammc): Remove this. See http://crbug.com/284849.
812 TEST(PermissionsTest, FileSystemImplicitPermissions) {
813 APIPermissionSet apis;
814 apis.insert(APIPermission::kFileSystemWrite);
815 apis.AddImpliedPermissions();
816
817 EXPECT_EQ(apis.find(APIPermission::kFileSystemWrite)->id(),
818 APIPermission::kFileSystemWrite);
819 EXPECT_EQ(apis.size(), 1u);
820
821 apis.erase(APIPermission::kFileSystemWrite);
822 apis.insert(APIPermission::kFileSystemDirectory);
823 apis.AddImpliedPermissions();
824
825 EXPECT_EQ(apis.find(APIPermission::kFileSystemDirectory)->id(),
826 APIPermission::kFileSystemDirectory);
827 EXPECT_EQ(apis.size(), 1u);
828
829 apis.insert(APIPermission::kFileSystemWrite);
830 apis.AddImpliedPermissions();
831
832 EXPECT_EQ(apis.find(APIPermission::kFileSystemWrite)->id(),
833 APIPermission::kFileSystemWrite);
834 EXPECT_EQ(apis.find(APIPermission::kFileSystemDirectory)->id(),
835 APIPermission::kFileSystemDirectory);
836 EXPECT_EQ(apis.find(APIPermission::kFileSystemWriteDirectory)->id(),
837 APIPermission::kFileSystemWriteDirectory);
838 EXPECT_EQ(apis.size(), 3u);
839 }
840
809 TEST(PermissionsTest, HiddenFileSystemPermissionMessages) { 841 TEST(PermissionsTest, HiddenFileSystemPermissionMessages) {
810 APIPermissionSet api_permissions; 842 APIPermissionSet api_permissions;
811 api_permissions.insert(APIPermission::kFileSystemWrite); 843 api_permissions.insert(APIPermission::kFileSystemWrite);
812 api_permissions.insert(APIPermission::kFileSystemDirectory); 844 api_permissions.insert(APIPermission::kFileSystemDirectory);
813 api_permissions.insert(APIPermission::kFileSystemWriteDirectory); 845 api_permissions.insert(APIPermission::kFileSystemWriteDirectory);
814 scoped_refptr<PermissionSet> permissions( 846 scoped_refptr<PermissionSet> permissions(
815 new PermissionSet(api_permissions, ManifestPermissionSet(), 847 new PermissionSet(api_permissions, ManifestPermissionSet(),
816 URLPatternSet(), URLPatternSet())); 848 URLPatternSet(), URLPatternSet()));
817 PermissionMessages messages = 849 PermissionMessages messages =
818 PermissionMessageProvider::Get()->GetPermissionMessages( 850 PermissionMessageProvider::Get()->GetPermissionMessages(
(...skipping 994 matching lines...) Expand 10 before | Expand all | Expand 10 after
1813 scoped_refptr<const PermissionSet> permissions_dwr( 1845 scoped_refptr<const PermissionSet> permissions_dwr(
1814 extension_dwr->permissions_data()->active_permissions()); 1846 extension_dwr->permissions_data()->active_permissions());
1815 1847
1816 EXPECT_FALSE(PermissionMessageProvider::Get()-> 1848 EXPECT_FALSE(PermissionMessageProvider::Get()->
1817 IsPrivilegeIncrease(permissions.get(), 1849 IsPrivilegeIncrease(permissions.get(),
1818 permissions_dwr.get(), 1850 permissions_dwr.get(),
1819 extension->GetType())); 1851 extension->GetType()));
1820 } 1852 }
1821 1853
1822 } // namespace extensions 1854 } // namespace extensions
OLDNEW
« no previous file with comments | « chrome/chrome_tests_unit.gypi ('k') | extensions/common/permissions/api_permission_set_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698