Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(127)

Side by Side Diff: chrome/common/extensions/manifest_tests/extension_manifests_sandboxed_unittest.cc

Issue 15836003: Update chrome/ to use scoped_refptr<T>::get() rather than implicit "operator T*" (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebased Created 7 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/common/extensions/csp_handler.h" 5 #include "chrome/common/extensions/csp_handler.h"
6 #include "chrome/common/extensions/extension_manifest_constants.h" 6 #include "chrome/common/extensions/extension_manifest_constants.h"
7 #include "chrome/common/extensions/manifest_tests/extension_manifest_test.h" 7 #include "chrome/common/extensions/manifest_tests/extension_manifest_test.h"
8 #include "testing/gtest/include/gtest/gtest.h" 8 #include "testing/gtest/include/gtest/gtest.h"
9 9
10 namespace errors = extension_manifest_errors; 10 namespace errors = extension_manifest_errors;
(...skipping 23 matching lines...) Expand all
34 // Sandboxed pages specified with filename wildcard, no custom CSP value. 34 // Sandboxed pages specified with filename wildcard, no custom CSP value.
35 scoped_refptr<Extension> extension5( 35 scoped_refptr<Extension> extension5(
36 LoadAndExpectSuccess("sandboxed_pages_valid_5.json")); 36 LoadAndExpectSuccess("sandboxed_pages_valid_5.json"));
37 37
38 const char kSandboxedCSP[] = "sandbox allow-scripts allow-forms allow-popups"; 38 const char kSandboxedCSP[] = "sandbox allow-scripts allow-forms allow-popups";
39 const char kDefaultCSP[] = 39 const char kDefaultCSP[] =
40 "script-src 'self' chrome-extension-resource:; object-src 'self'"; 40 "script-src 'self' chrome-extension-resource:; object-src 'self'";
41 const char kCustomSandboxedCSP[] = 41 const char kCustomSandboxedCSP[] =
42 "sandbox; script-src: https://www.google.com"; 42 "sandbox; script-src: https://www.google.com";
43 43
44 EXPECT_EQ(kSandboxedCSP,
45 CSPInfo::GetResourceContentSecurityPolicy(extension1, "/test"));
46 EXPECT_EQ(kDefaultCSP,
47 CSPInfo::GetResourceContentSecurityPolicy(extension1, "/none"));
48 EXPECT_EQ(kDefaultCSP,
49 CSPInfo::GetResourceContentSecurityPolicy(extension2, "/test"));
50 EXPECT_EQ(kCustomSandboxedCSP,
51 CSPInfo::GetResourceContentSecurityPolicy(extension3, "/test"));
52 EXPECT_EQ(kDefaultCSP,
53 CSPInfo::GetResourceContentSecurityPolicy(extension3, "/none"));
54 EXPECT_EQ(kSandboxedCSP,
55 CSPInfo::GetResourceContentSecurityPolicy(extension4, "/test"));
56 EXPECT_EQ( 44 EXPECT_EQ(
57 kSandboxedCSP, 45 kSandboxedCSP,
58 CSPInfo::GetResourceContentSecurityPolicy(extension5, "/path/test.ext")); 46 CSPInfo::GetResourceContentSecurityPolicy(extension1.get(), "/test"));
59 EXPECT_EQ(kDefaultCSP, 47 EXPECT_EQ(
60 CSPInfo::GetResourceContentSecurityPolicy(extension5, "/test")); 48 kDefaultCSP,
49 CSPInfo::GetResourceContentSecurityPolicy(extension1.get(), "/none"));
50 EXPECT_EQ(
51 kDefaultCSP,
52 CSPInfo::GetResourceContentSecurityPolicy(extension2.get(), "/test"));
53 EXPECT_EQ(
54 kCustomSandboxedCSP,
55 CSPInfo::GetResourceContentSecurityPolicy(extension3.get(), "/test"));
56 EXPECT_EQ(
57 kDefaultCSP,
58 CSPInfo::GetResourceContentSecurityPolicy(extension3.get(), "/none"));
59 EXPECT_EQ(
60 kSandboxedCSP,
61 CSPInfo::GetResourceContentSecurityPolicy(extension4.get(), "/test"));
62 EXPECT_EQ(kSandboxedCSP,
63 CSPInfo::GetResourceContentSecurityPolicy(extension5.get(),
64 "/path/test.ext"));
65 EXPECT_EQ(
66 kDefaultCSP,
67 CSPInfo::GetResourceContentSecurityPolicy(extension5.get(), "/test"));
61 68
62 Testcase testcases[] = { 69 Testcase testcases[] = {
63 Testcase("sandboxed_pages_invalid_1.json", 70 Testcase("sandboxed_pages_invalid_1.json",
64 errors::kInvalidSandboxedPagesList), 71 errors::kInvalidSandboxedPagesList),
65 Testcase("sandboxed_pages_invalid_2.json", 72 Testcase("sandboxed_pages_invalid_2.json",
66 errors::kInvalidSandboxedPage), 73 errors::kInvalidSandboxedPage),
67 Testcase("sandboxed_pages_invalid_3.json", 74 Testcase("sandboxed_pages_invalid_3.json",
68 errors::kInvalidSandboxedPagesCSP), 75 errors::kInvalidSandboxedPagesCSP),
69 Testcase("sandboxed_pages_invalid_4.json", 76 Testcase("sandboxed_pages_invalid_4.json",
70 errors::kInvalidSandboxedPagesCSP), 77 errors::kInvalidSandboxedPagesCSP),
71 Testcase("sandboxed_pages_invalid_5.json", 78 Testcase("sandboxed_pages_invalid_5.json",
72 errors::kInvalidSandboxedPagesCSP) 79 errors::kInvalidSandboxedPagesCSP)
73 }; 80 };
74 RunTestcases(testcases, arraysize(testcases), 81 RunTestcases(testcases, arraysize(testcases),
75 EXPECT_TYPE_ERROR); 82 EXPECT_TYPE_ERROR);
76 } 83 }
77 84
78 } // namespace extensions 85 } // namespace extensions
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698