| Index: chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc
|
| diff --git a/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc b/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..7a83e58eb030c2e8a19f61b1b37826c2d543bb99
|
| --- /dev/null
|
| +++ b/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc
|
| @@ -0,0 +1,59 @@
|
| +// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "chrome/browser/extensions/api/web_request/web_request_permissions.h"
|
| +
|
| +#include "base/message_loop.h"
|
| +#include "chrome/test/base/testing_profile.h"
|
| +#include "net/url_request/url_request_test_util.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +TEST(ExtensionWebRequestHelpersTest, TestHideRequestForURL) {
|
| + MessageLoopForIO message_loop;
|
| + TestURLRequestContext context;
|
| + const char* sensitive_urls[] = {
|
| + "http://www.google.com/chrome",
|
| + "https://www.google.com/chrome",
|
| + "http://www.google.com/chrome/foobar",
|
| + "https://www.google.com/chrome/foobar",
|
| + "http://chrome.google.com",
|
| + "https://chrome.google.com",
|
| + "http://client2.google.com",
|
| + "https://client2.google.com",
|
| + // No http version of webstore.
|
| + "https://chrome.google.com/webstore",
|
| + "http://clients2.google.com/service/update2/crx",
|
| + "https://clients2.google.com/service/update2/crx",
|
| + "http://www.gstatic.com/chrome/extensions/blacklist",
|
| + "https://www.gstatic.com/chrome/extensions/blacklist",
|
| + "notregisteredscheme://www.foobar.com"
|
| + };
|
| + const char* non_sensitive_urls[] = {
|
| + "http://www.google.com/"
|
| + };
|
| + // Check that requests are rejected based on the destination
|
| + for (size_t i = 0; i < arraysize(sensitive_urls); ++i) {
|
| + GURL sensitive_url(sensitive_urls[i]);
|
| + TestURLRequest request(sensitive_url, NULL, &context);
|
| + EXPECT_TRUE(WebRequestPermissions::HideRequest(&request))
|
| + << sensitive_urls[i];
|
| + }
|
| + // Check that requests are accepted if they don't touch sensitive urls.
|
| + for (size_t i = 0; i < arraysize(non_sensitive_urls); ++i) {
|
| + GURL non_sensitive_url(non_sensitive_urls[i]);
|
| + TestURLRequest request(non_sensitive_url, NULL, &context);
|
| + EXPECT_FALSE(WebRequestPermissions::HideRequest(&request))
|
| + << non_sensitive_urls[i];
|
| + }
|
| + // Check that requests are rejected if their first party url is sensitive.
|
| + ASSERT_GE(arraysize(non_sensitive_urls), 1u);
|
| + GURL non_sensitive_url(non_sensitive_urls[0]);
|
| + for (size_t i = 0; i < arraysize(sensitive_urls); ++i) {
|
| + TestURLRequest request(non_sensitive_url, NULL, &context);
|
| + GURL sensitive_url(sensitive_urls[i]);
|
| + request.set_first_party_for_cookies(sensitive_url);
|
| + EXPECT_TRUE(WebRequestPermissions::HideRequest(&request))
|
| + << sensitive_urls[i];
|
| + }
|
| +}
|
|
|