Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(751)

Unified Diff: chrome/common/extensions/permissions/permission_set_unittest.cc

Issue 10692160: Support socket endpoint permissions for AppsV2 Socket API. (Closed) Base URL: http://git.chromium.org/chromium/src.git@master
Patch Set: Rebase and fix a unit test Created 8 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/common/extensions/permissions/permission_set_unittest.cc
diff --git a/chrome/common/extensions/permissions/permission_set_unittest.cc b/chrome/common/extensions/permissions/permission_set_unittest.cc
index 9a5e80e946b53c239483402d4e68ceeaa5005a21..e43d35126964ac32d5d991031ad243c797b537cb 100644
--- a/chrome/common/extensions/permissions/permission_set_unittest.cc
+++ b/chrome/common/extensions/permissions/permission_set_unittest.cc
@@ -14,6 +14,7 @@
#include "chrome/common/extensions/extension_error_utils.h"
#include "chrome/common/extensions/permissions/permission_set.h"
#include "chrome/common/extensions/permissions/permissions_info.h"
+#include "chrome/common/extensions/permissions/socket_permission.h"
#include "testing/gtest/include/gtest/gtest.h"
using extensions::Extension;
@@ -91,10 +92,10 @@ class PermissionsTest : public testing::Test {
// Tests GetByID.
TEST(PermissionsTest, GetByID) {
PermissionsInfo* info = PermissionsInfo::GetInstance();
- APIPermissionSet ids = info->GetAll();
- for (APIPermissionSet::iterator i = ids.begin();
- i != ids.end(); ++i) {
- EXPECT_EQ(*i, info->GetByID(*i)->id());
+ APIPermissionSet apis = info->GetAll();
+ for (APIPermissionSet::const_iterator i = apis.begin();
+ i != apis.end(); ++i) {
+ EXPECT_EQ(i->id(), i->permission()->id());
}
}
@@ -111,11 +112,11 @@ TEST(PermissionsTest, GetAll) {
size_t count = 0;
PermissionsInfo* info = PermissionsInfo::GetInstance();
APIPermissionSet apis = info->GetAll();
- for (APIPermissionSet::iterator api = apis.begin();
+ for (APIPermissionSet::const_iterator api = apis.begin();
api != apis.end(); ++api) {
// Make sure only the valid permission IDs get returned.
- EXPECT_NE(APIPermission::kInvalid, *api);
- EXPECT_NE(APIPermission::kUnknown, *api);
+ EXPECT_NE(APIPermission::kInvalid, api->id());
+ EXPECT_NE(APIPermission::kUnknown, api->id());
count++;
}
EXPECT_EQ(count, info->get_permission_count());
@@ -260,6 +261,8 @@ TEST(PermissionsTest, ExplicitAccessToOrigin) {
}
TEST(PermissionsTest, CreateUnion) {
+ scoped_refptr<APIPermissionDetail> detail;
+
APIPermissionSet apis1;
APIPermissionSet apis2;
APIPermissionSet expected_apis;
@@ -278,11 +281,26 @@ TEST(PermissionsTest, CreateUnion) {
scoped_refptr<PermissionSet> set2;
scoped_refptr<PermissionSet> union_set;
+ APIPermission* permission =
+ PermissionsInfo::GetInstance()->GetByID(APIPermission::kSocket);
+ detail = permission->CreateDetail();
+ {
+ scoped_ptr<ListValue> value(new ListValue());
+ value->Append(Value::CreateStringValue("tcp-connect:*.example.com:80"));
+ value->Append(Value::CreateStringValue("udp-bind::8080"));
+ value->Append(Value::CreateStringValue("udp-send-to::8888"));
+ if (!detail->FromValue(value.get())) {
+ NOTREACHED();
+ }
+ }
+
// Union with an empty set.
apis1.insert(APIPermission::kTab);
apis1.insert(APIPermission::kBackground);
+ apis1.insert(detail);
expected_apis.insert(APIPermission::kTab);
expected_apis.insert(APIPermission::kBackground);
+ expected_apis.insert(detail);
AddPattern(&explicit_hosts1, "http://*.google.com/*");
AddPattern(&expected_explicit_hosts, "http://*.google.com/*");
@@ -309,11 +327,37 @@ TEST(PermissionsTest, CreateUnion) {
apis2.insert(APIPermission::kProxy);
apis2.insert(APIPermission::kClipboardWrite);
apis2.insert(APIPermission::kPlugin);
+
+ detail = permission->CreateDetail();
+ {
+ scoped_ptr<ListValue> value(new ListValue());
+ value->Append(Value::CreateStringValue("tcp-connect:*.example.com:80"));
+ value->Append(Value::CreateStringValue("udp-send-to::8899"));
+ if (!detail->FromValue(value.get())) {
+ NOTREACHED();
+ }
+ }
+ apis2.insert(detail);
+
expected_apis.insert(APIPermission::kTab);
expected_apis.insert(APIPermission::kProxy);
expected_apis.insert(APIPermission::kClipboardWrite);
expected_apis.insert(APIPermission::kPlugin);
+ detail = permission->CreateDetail();
+ {
+ scoped_ptr<ListValue> value(new ListValue());
+ value->Append(Value::CreateStringValue("tcp-connect:*.example.com:80"));
+ value->Append(Value::CreateStringValue("udp-bind::8080"));
+ value->Append(Value::CreateStringValue("udp-send-to::8888"));
+ value->Append(Value::CreateStringValue("udp-send-to::8899"));
+ if (!detail->FromValue(value.get())) {
+ NOTREACHED();
+ }
+ }
+ // Insert a new detail socket permisssion which will replace the old one.
+ expected_apis.insert(detail);
+
AddPattern(&explicit_hosts2, "http://*.example.com/*");
AddPattern(&scriptable_hosts2, "http://*.google.com/*");
AddPattern(&expected_explicit_hosts, "http://*.example.com/*");
@@ -341,6 +385,8 @@ TEST(PermissionsTest, CreateUnion) {
}
TEST(PermissionsTest, CreateIntersection) {
+ scoped_refptr<APIPermissionDetail> detail;
+
APIPermissionSet apis1;
APIPermissionSet apis2;
APIPermissionSet expected_apis;
@@ -359,9 +405,23 @@ TEST(PermissionsTest, CreateIntersection) {
scoped_refptr<PermissionSet> set2;
scoped_refptr<PermissionSet> new_set;
+ APIPermission* permission =
+ PermissionsInfo::GetInstance()->GetByID(APIPermission::kSocket);
+
// Intersection with an empty set.
apis1.insert(APIPermission::kTab);
apis1.insert(APIPermission::kBackground);
+ detail = permission->CreateDetail();
+ {
+ scoped_ptr<ListValue> value(new ListValue());
+ value->Append(Value::CreateStringValue("tcp-connect:*.example.com:80"));
+ value->Append(Value::CreateStringValue("udp-bind::8080"));
+ value->Append(Value::CreateStringValue("udp-send-to::8888"));
+ if (!detail->FromValue(value.get())) {
+ NOTREACHED();
+ }
+ }
+ apis1.insert(detail);
AddPattern(&explicit_hosts1, "http://*.google.com/*");
AddPattern(&scriptable_hosts1, "http://www.reddit.com/*");
@@ -388,7 +448,29 @@ TEST(PermissionsTest, CreateIntersection) {
apis2.insert(APIPermission::kProxy);
apis2.insert(APIPermission::kClipboardWrite);
apis2.insert(APIPermission::kPlugin);
+ detail = permission->CreateDetail();
+ {
+ scoped_ptr<ListValue> value(new ListValue());
+ value->Append(Value::CreateStringValue("udp-bind::8080"));
+ value->Append(Value::CreateStringValue("udp-send-to::8888"));
+ value->Append(Value::CreateStringValue("udp-send-to::8899"));
+ if (!detail->FromValue(value.get())) {
+ NOTREACHED();
+ }
+ }
+ apis2.insert(detail);
+
expected_apis.insert(APIPermission::kTab);
+ detail = permission->CreateDetail();
+ {
+ scoped_ptr<ListValue> value(new ListValue());
+ value->Append(Value::CreateStringValue("udp-bind::8080"));
+ value->Append(Value::CreateStringValue("udp-send-to::8888"));
+ if (!detail->FromValue(value.get())) {
+ NOTREACHED();
+ }
+ }
+ expected_apis.insert(detail);
AddPattern(&explicit_hosts2, "http://*.example.com/*");
AddPattern(&explicit_hosts2, "http://*.google.com/*");
@@ -417,6 +499,8 @@ TEST(PermissionsTest, CreateIntersection) {
}
TEST(PermissionsTest, CreateDifference) {
+ scoped_refptr<APIPermissionDetail> detail;
+
APIPermissionSet apis1;
APIPermissionSet apis2;
APIPermissionSet expected_apis;
@@ -435,9 +519,23 @@ TEST(PermissionsTest, CreateDifference) {
scoped_refptr<PermissionSet> set2;
scoped_refptr<PermissionSet> new_set;
+ APIPermission* permission =
+ PermissionsInfo::GetInstance()->GetByID(APIPermission::kSocket);
+
// Difference with an empty set.
apis1.insert(APIPermission::kTab);
apis1.insert(APIPermission::kBackground);
+ detail = permission->CreateDetail();
+ {
+ scoped_ptr<ListValue> value(new ListValue());
+ value->Append(Value::CreateStringValue("tcp-connect:*.example.com:80"));
+ value->Append(Value::CreateStringValue("udp-bind::8080"));
+ value->Append(Value::CreateStringValue("udp-send-to::8888"));
+ if (!detail->FromValue(value.get())) {
+ NOTREACHED();
+ }
+ }
+ apis1.insert(detail);
AddPattern(&explicit_hosts1, "http://*.google.com/*");
AddPattern(&scriptable_hosts1, "http://www.reddit.com/*");
@@ -452,7 +550,28 @@ TEST(PermissionsTest, CreateDifference) {
apis2.insert(APIPermission::kProxy);
apis2.insert(APIPermission::kClipboardWrite);
apis2.insert(APIPermission::kPlugin);
+ detail = permission->CreateDetail();
+ {
+ scoped_ptr<ListValue> value(new ListValue());
+ value->Append(Value::CreateStringValue("tcp-connect:*.example.com:80"));
+ value->Append(Value::CreateStringValue("udp-send-to::8899"));
+ if (!detail->FromValue(value.get())) {
+ NOTREACHED();
+ }
+ }
+ apis2.insert(detail);
+
expected_apis.insert(APIPermission::kBackground);
+ detail = permission->CreateDetail();
+ {
+ scoped_ptr<ListValue> value(new ListValue());
+ value->Append(Value::CreateStringValue("udp-bind::8080"));
+ value->Append(Value::CreateStringValue("udp-send-to::8888"));
+ if (!detail->FromValue(value.get())) {
+ NOTREACHED();
+ }
+ }
+ expected_apis.insert(detail);
AddPattern(&explicit_hosts2, "http://*.example.com/*");
AddPattern(&explicit_hosts2, "http://*.google.com/*");
@@ -569,7 +688,6 @@ TEST(PermissionsTest, PermissionMessages) {
skip.insert(APIPermission::kWebRequestBlocking);
skip.insert(APIPermission::kDeclarativeWebRequest);
-
// This permission requires explicit user action (context menu handler)
// so we won't prompt for it for now.
skip.insert(APIPermission::kFileBrowserHandler);
@@ -616,9 +734,9 @@ TEST(PermissionsTest, PermissionMessages) {
APIPermissionSet permissions = info->GetAll();
for (APIPermissionSet::const_iterator i = permissions.begin();
i != permissions.end(); ++i) {
- APIPermission* permission = info->GetByID(*i);
+ const APIPermission* permission = i->permission();
EXPECT_TRUE(permission);
- if (skip.count(*i)) {
+ if (skip.count(i->id())) {
EXPECT_EQ(PermissionMessage::kNone, permission->message_id())
<< "unexpected message_id for " << permission->name();
} else {
« no previous file with comments | « chrome/common/extensions/permissions/permission_set.cc ('k') | chrome/common/extensions/permissions/permissions_info.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698