OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/common/extensions/csp_handler.h" | 5 #include "chrome/common/extensions/csp_handler.h" |
6 #include "chrome/common/extensions/extension_manifest_constants.h" | 6 #include "chrome/common/extensions/extension_manifest_constants.h" |
7 #include "chrome/common/extensions/manifest_tests/extension_manifest_test.h" | 7 #include "chrome/common/extensions/manifest_tests/extension_manifest_test.h" |
8 #include "testing/gtest/include/gtest/gtest.h" | 8 #include "testing/gtest/include/gtest/gtest.h" |
9 | 9 |
10 namespace errors = extension_manifest_errors; | 10 namespace errors = extension_manifest_errors; |
(...skipping 23 matching lines...) Expand all Loading... |
34 // Sandboxed pages specified with filename wildcard, no custom CSP value. | 34 // Sandboxed pages specified with filename wildcard, no custom CSP value. |
35 scoped_refptr<Extension> extension5( | 35 scoped_refptr<Extension> extension5( |
36 LoadAndExpectSuccess("sandboxed_pages_valid_5.json")); | 36 LoadAndExpectSuccess("sandboxed_pages_valid_5.json")); |
37 | 37 |
38 const char kSandboxedCSP[] = "sandbox allow-scripts allow-forms allow-popups"; | 38 const char kSandboxedCSP[] = "sandbox allow-scripts allow-forms allow-popups"; |
39 const char kDefaultCSP[] = | 39 const char kDefaultCSP[] = |
40 "script-src 'self' chrome-extension-resource:; object-src 'self'"; | 40 "script-src 'self' chrome-extension-resource:; object-src 'self'"; |
41 const char kCustomSandboxedCSP[] = | 41 const char kCustomSandboxedCSP[] = |
42 "sandbox; script-src: https://www.google.com"; | 42 "sandbox; script-src: https://www.google.com"; |
43 | 43 |
44 EXPECT_EQ(kSandboxedCSP, | |
45 CSPInfo::GetResourceContentSecurityPolicy(extension1, "/test")); | |
46 EXPECT_EQ(kDefaultCSP, | |
47 CSPInfo::GetResourceContentSecurityPolicy(extension1, "/none")); | |
48 EXPECT_EQ(kDefaultCSP, | |
49 CSPInfo::GetResourceContentSecurityPolicy(extension2, "/test")); | |
50 EXPECT_EQ(kCustomSandboxedCSP, | |
51 CSPInfo::GetResourceContentSecurityPolicy(extension3, "/test")); | |
52 EXPECT_EQ(kDefaultCSP, | |
53 CSPInfo::GetResourceContentSecurityPolicy(extension3, "/none")); | |
54 EXPECT_EQ(kSandboxedCSP, | |
55 CSPInfo::GetResourceContentSecurityPolicy(extension4, "/test")); | |
56 EXPECT_EQ( | 44 EXPECT_EQ( |
57 kSandboxedCSP, | 45 kSandboxedCSP, |
58 CSPInfo::GetResourceContentSecurityPolicy(extension5, "/path/test.ext")); | 46 CSPInfo::GetResourceContentSecurityPolicy(extension1.get(), "/test")); |
59 EXPECT_EQ(kDefaultCSP, | 47 EXPECT_EQ( |
60 CSPInfo::GetResourceContentSecurityPolicy(extension5, "/test")); | 48 kDefaultCSP, |
| 49 CSPInfo::GetResourceContentSecurityPolicy(extension1.get(), "/none")); |
| 50 EXPECT_EQ( |
| 51 kDefaultCSP, |
| 52 CSPInfo::GetResourceContentSecurityPolicy(extension2.get(), "/test")); |
| 53 EXPECT_EQ( |
| 54 kCustomSandboxedCSP, |
| 55 CSPInfo::GetResourceContentSecurityPolicy(extension3.get(), "/test")); |
| 56 EXPECT_EQ( |
| 57 kDefaultCSP, |
| 58 CSPInfo::GetResourceContentSecurityPolicy(extension3.get(), "/none")); |
| 59 EXPECT_EQ( |
| 60 kSandboxedCSP, |
| 61 CSPInfo::GetResourceContentSecurityPolicy(extension4.get(), "/test")); |
| 62 EXPECT_EQ(kSandboxedCSP, |
| 63 CSPInfo::GetResourceContentSecurityPolicy(extension5.get(), |
| 64 "/path/test.ext")); |
| 65 EXPECT_EQ( |
| 66 kDefaultCSP, |
| 67 CSPInfo::GetResourceContentSecurityPolicy(extension5.get(), "/test")); |
61 | 68 |
62 Testcase testcases[] = { | 69 Testcase testcases[] = { |
63 Testcase("sandboxed_pages_invalid_1.json", | 70 Testcase("sandboxed_pages_invalid_1.json", |
64 errors::kInvalidSandboxedPagesList), | 71 errors::kInvalidSandboxedPagesList), |
65 Testcase("sandboxed_pages_invalid_2.json", | 72 Testcase("sandboxed_pages_invalid_2.json", |
66 errors::kInvalidSandboxedPage), | 73 errors::kInvalidSandboxedPage), |
67 Testcase("sandboxed_pages_invalid_3.json", | 74 Testcase("sandboxed_pages_invalid_3.json", |
68 errors::kInvalidSandboxedPagesCSP), | 75 errors::kInvalidSandboxedPagesCSP), |
69 Testcase("sandboxed_pages_invalid_4.json", | 76 Testcase("sandboxed_pages_invalid_4.json", |
70 errors::kInvalidSandboxedPagesCSP), | 77 errors::kInvalidSandboxedPagesCSP), |
71 Testcase("sandboxed_pages_invalid_5.json", | 78 Testcase("sandboxed_pages_invalid_5.json", |
72 errors::kInvalidSandboxedPagesCSP) | 79 errors::kInvalidSandboxedPagesCSP) |
73 }; | 80 }; |
74 RunTestcases(testcases, arraysize(testcases), | 81 RunTestcases(testcases, arraysize(testcases), |
75 EXPECT_TYPE_ERROR); | 82 EXPECT_TYPE_ERROR); |
76 } | 83 } |
77 | 84 |
78 } // namespace extensions | 85 } // namespace extensions |
OLD | NEW |