| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <string> | 5 #include <string> |
| 6 | 6 |
| 7 #include "base/pickle.h" | 7 #include "base/pickle.h" |
| 8 #include "base/values.h" | 8 #include "base/values.h" |
| 9 #include "chrome/common/extensions/permissions/permissions_info.h" | 9 #include "chrome/common/extensions/permissions/permissions_info.h" |
| 10 #include "chrome/common/extensions/permissions/socket_permission.h" | 10 #include "chrome/common/extensions/permissions/socket_permission.h" |
| 11 #include "chrome/common/extensions/permissions/socket_permission_data.h" | 11 #include "chrome/common/extensions/permissions/socket_permission_data.h" |
| 12 #include "ipc/ipc_message.h" | 12 #include "ipc/ipc_message.h" |
| 13 #include "testing/gtest/include/gtest/gtest.h" | 13 #include "testing/gtest/include/gtest/gtest.h" |
| 14 | 14 |
| 15 using content::SocketPermissionRequest; |
| 15 using extensions::SocketPermissionData; | 16 using extensions::SocketPermissionData; |
| 16 | 17 |
| 17 namespace { | 18 namespace { |
| 18 | 19 |
| 19 std::string Parse(const std::string& permission) { | 20 std::string Parse(const std::string& permission) { |
| 20 SocketPermissionData data; | 21 SocketPermissionData data; |
| 21 CHECK(data.Parse(permission)) << "Parse permission \"" << permission | 22 CHECK(data.Parse(permission)) << "Parse permission \"" << permission |
| 22 << "\" failed."; | 23 << "\" failed."; |
| 23 return data.GetAsString(); | 24 return data.GetAsString(); |
| 24 } | 25 } |
| (...skipping 107 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 132 "tcp-connect:www.example.com:*"); | 133 "tcp-connect:www.example.com:*"); |
| 133 | 134 |
| 134 EXPECT_EQ(Parse("tcp-connect:*.example.com:99"), | 135 EXPECT_EQ(Parse("tcp-connect:*.example.com:99"), |
| 135 "tcp-connect:*.example.com:99"); | 136 "tcp-connect:*.example.com:99"); |
| 136 } | 137 } |
| 137 | 138 |
| 138 TEST(SocketPermissionTest, Match) { | 139 TEST(SocketPermissionTest, Match) { |
| 139 SocketPermissionData data; | 140 SocketPermissionData data; |
| 140 | 141 |
| 141 CHECK(data.Parse("tcp-connect")); | 142 CHECK(data.Parse("tcp-connect")); |
| 142 EXPECT_TRUE(data.Match( | 143 EXPECT_TRUE(data.Match(SocketPermissionRequest( |
| 143 SocketPermissionData::TCP_CONNECT, "www.example.com", 80)); | 144 SocketPermissionRequest::TCP_CONNECT, "www.example.com", 80))); |
| 144 EXPECT_FALSE(data.Match( | 145 EXPECT_FALSE(data.Match(SocketPermissionRequest( |
| 145 SocketPermissionData::UDP_SEND_TO, "www.example.com", 80)); | 146 SocketPermissionRequest::UDP_SEND_TO, "www.example.com", 80))); |
| 146 | 147 |
| 147 CHECK(data.Parse("udp-send-to::8800")); | 148 CHECK(data.Parse("udp-send-to::8800")); |
| 148 EXPECT_TRUE(data.Match( | 149 EXPECT_TRUE(data.Match(SocketPermissionRequest( |
| 149 SocketPermissionData::UDP_SEND_TO, "www.example.com", 8800)); | 150 SocketPermissionRequest::UDP_SEND_TO, "www.example.com", 8800))); |
| 150 EXPECT_TRUE(data.Match( | 151 EXPECT_TRUE(data.Match(SocketPermissionRequest( |
| 151 SocketPermissionData::UDP_SEND_TO, "smtp.example.com", 8800)); | 152 SocketPermissionRequest::UDP_SEND_TO, "smtp.example.com", 8800))); |
| 152 EXPECT_FALSE(data.Match( | 153 EXPECT_FALSE(data.Match(SocketPermissionRequest( |
| 153 SocketPermissionData::TCP_CONNECT, "www.example.com", 80)); | 154 SocketPermissionRequest::TCP_CONNECT, "www.example.com", 80))); |
| 154 | 155 |
| 155 CHECK(data.Parse("udp-send-to:*.example.com:8800")); | 156 CHECK(data.Parse("udp-send-to:*.example.com:8800")); |
| 156 EXPECT_TRUE(data.Match( | 157 EXPECT_TRUE(data.Match(SocketPermissionRequest( |
| 157 SocketPermissionData::UDP_SEND_TO, "www.example.com", 8800)); | 158 SocketPermissionRequest::UDP_SEND_TO, "www.example.com", 8800))); |
| 158 EXPECT_TRUE(data.Match( | 159 EXPECT_TRUE(data.Match(SocketPermissionRequest( |
| 159 SocketPermissionData::UDP_SEND_TO, "smtp.example.com", 8800)); | 160 SocketPermissionRequest::UDP_SEND_TO, "smtp.example.com", 8800))); |
| 160 EXPECT_TRUE(data.Match( | 161 EXPECT_TRUE(data.Match(SocketPermissionRequest( |
| 161 SocketPermissionData::UDP_SEND_TO, "SMTP.example.com", 8800)); | 162 SocketPermissionRequest::UDP_SEND_TO, "SMTP.example.com", 8800))); |
| 162 EXPECT_FALSE(data.Match( | 163 EXPECT_FALSE(data.Match(SocketPermissionRequest( |
| 163 SocketPermissionData::TCP_CONNECT, "www.example.com", 80)); | 164 SocketPermissionRequest::TCP_CONNECT, "www.example.com", 80))); |
| 164 EXPECT_FALSE(data.Match( | 165 EXPECT_FALSE(data.Match(SocketPermissionRequest( |
| 165 SocketPermissionData::UDP_SEND_TO, "www.google.com", 8800)); | 166 SocketPermissionRequest::UDP_SEND_TO, "www.google.com", 8800))); |
| 166 EXPECT_FALSE(data.Match( | 167 EXPECT_FALSE(data.Match(SocketPermissionRequest( |
| 167 SocketPermissionData::UDP_SEND_TO, "wwwexample.com", 8800)); | 168 SocketPermissionRequest::UDP_SEND_TO, "wwwexample.com", 8800))); |
| 168 | 169 |
| 169 CHECK(data.Parse("udp-send-to:*.ExAmPlE.cOm:8800")); | 170 CHECK(data.Parse("udp-send-to:*.ExAmPlE.cOm:8800")); |
| 170 EXPECT_TRUE(data.Match( | 171 EXPECT_TRUE(data.Match(SocketPermissionRequest( |
| 171 SocketPermissionData::UDP_SEND_TO, "www.example.com", 8800)); | 172 SocketPermissionRequest::UDP_SEND_TO, "www.example.com", 8800))); |
| 172 EXPECT_TRUE(data.Match( | 173 EXPECT_TRUE(data.Match(SocketPermissionRequest( |
| 173 SocketPermissionData::UDP_SEND_TO, "smtp.example.com", 8800)); | 174 SocketPermissionRequest::UDP_SEND_TO, "smtp.example.com", 8800))); |
| 174 EXPECT_TRUE(data.Match( | 175 EXPECT_TRUE(data.Match(SocketPermissionRequest( |
| 175 SocketPermissionData::UDP_SEND_TO, "SMTP.example.com", 8800)); | 176 SocketPermissionRequest::UDP_SEND_TO, "SMTP.example.com", 8800))); |
| 176 EXPECT_FALSE(data.Match( | 177 EXPECT_FALSE(data.Match(SocketPermissionRequest( |
| 177 SocketPermissionData::TCP_CONNECT, "www.example.com", 80)); | 178 SocketPermissionRequest::TCP_CONNECT, "www.example.com", 80))); |
| 178 EXPECT_FALSE(data.Match( | 179 EXPECT_FALSE(data.Match(SocketPermissionRequest( |
| 179 SocketPermissionData::UDP_SEND_TO, "www.google.com", 8800)); | 180 SocketPermissionRequest::UDP_SEND_TO, "www.google.com", 8800))); |
| 180 | 181 |
| 181 CHECK(data.Parse("udp-bind::8800")); | 182 CHECK(data.Parse("udp-bind::8800")); |
| 182 EXPECT_TRUE(data.Match( | 183 EXPECT_TRUE(data.Match(SocketPermissionRequest( |
| 183 SocketPermissionData::UDP_BIND, "127.0.0.1", 8800)); | 184 SocketPermissionRequest::UDP_BIND, "127.0.0.1", 8800))); |
| 184 EXPECT_FALSE(data.Match( | 185 EXPECT_FALSE(data.Match(SocketPermissionRequest( |
| 185 SocketPermissionData::UDP_BIND, "127.0.0.1", 8888)); | 186 SocketPermissionRequest::UDP_BIND, "127.0.0.1", 8888))); |
| 186 EXPECT_FALSE(data.Match( | 187 EXPECT_FALSE(data.Match(SocketPermissionRequest( |
| 187 SocketPermissionData::TCP_CONNECT, "www.example.com", 80)); | 188 SocketPermissionRequest::TCP_CONNECT, "www.example.com", 80))); |
| 188 EXPECT_FALSE(data.Match( | 189 EXPECT_FALSE(data.Match(SocketPermissionRequest( |
| 189 SocketPermissionData::UDP_SEND_TO, "www.google.com", 8800)); | 190 SocketPermissionRequest::UDP_SEND_TO, "www.google.com", 8800))); |
| 190 | 191 |
| 191 // Do not wildcard part of ip address. | 192 // Do not wildcard part of ip address. |
| 192 CHECK(data.Parse("tcp-connect:*.168.0.1:8800")); | 193 CHECK(data.Parse("tcp-connect:*.168.0.1:8800")); |
| 193 EXPECT_FALSE(data.Match( | 194 EXPECT_FALSE(data.Match(SocketPermissionRequest( |
| 194 SocketPermissionData::TCP_CONNECT, "192.168.0.1", 8800)); | 195 SocketPermissionRequest::TCP_CONNECT, "192.168.0.1", 8800))); |
| 195 } | 196 } |
| 196 | 197 |
| 197 TEST(SocketPermissionTest, IPC) { | 198 TEST(SocketPermissionTest, IPC) { |
| 198 const APIPermissionInfo* permission_info = | 199 const APIPermissionInfo* permission_info = |
| 199 PermissionsInfo::GetInstance()->GetByID(APIPermission::kSocket); | 200 PermissionsInfo::GetInstance()->GetByID(APIPermission::kSocket); |
| 200 | 201 |
| 201 { | 202 { |
| 202 IPC::Message m; | 203 IPC::Message m; |
| 203 | 204 |
| 204 scoped_ptr<APIPermission> permission1( | 205 scoped_ptr<APIPermission> permission1( |
| (...skipping 52 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 257 base::Value* vtmp = NULL; | 258 base::Value* vtmp = NULL; |
| 258 permission1->ToValue(&vtmp); | 259 permission1->ToValue(&vtmp); |
| 259 CHECK(vtmp); | 260 CHECK(vtmp); |
| 260 CHECK(permission2->FromValue(vtmp)); | 261 CHECK(permission2->FromValue(vtmp)); |
| 261 EXPECT_TRUE(permission1->Equal(permission2.get())); | 262 EXPECT_TRUE(permission1->Equal(permission2.get())); |
| 262 | 263 |
| 263 delete vtmp; | 264 delete vtmp; |
| 264 } | 265 } |
| 265 | 266 |
| 266 } // namespace extensions | 267 } // namespace extensions |
| OLD | NEW |