OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include <string> | |
6 | |
7 #include "base/file_util.h" | |
8 #include "base/message_loop/message_loop.h" | |
9 #include "base/strings/string_number_conversions.h" | |
10 #include "base/strings/string_util.h" | |
11 #include "base/values.h" | |
12 #include "chrome/browser/extensions/extension_protocols.h" | |
13 #include "chrome/common/chrome_paths.h" | |
14 #include "chrome/common/url_constants.h" | |
15 #include "content/public/browser/resource_request_info.h" | |
16 #include "content/public/test/mock_resource_context.h" | |
17 #include "content/public/test/test_browser_thread_bundle.h" | |
18 #include "extensions/browser/info_map.h" | |
19 #include "extensions/common/constants.h" | |
20 #include "extensions/common/extension.h" | |
21 #include "net/base/request_priority.h" | |
22 #include "net/url_request/url_request.h" | |
23 #include "net/url_request/url_request_job_factory_impl.h" | |
24 #include "net/url_request/url_request_status.h" | |
25 #include "net/url_request/url_request_test_util.h" | |
26 #include "testing/gtest/include/gtest/gtest.h" | |
27 | |
28 namespace extensions { | |
29 | |
30 scoped_refptr<Extension> CreateTestExtension(const std::string& name, | |
31 bool incognito_split_mode) { | |
32 base::DictionaryValue manifest; | |
33 manifest.SetString("name", name); | |
34 manifest.SetString("version", "1"); | |
35 manifest.SetInteger("manifest_version", 2); | |
36 manifest.SetString("incognito", incognito_split_mode ? "split" : "spanning"); | |
37 | |
38 base::FilePath path; | |
39 EXPECT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &path)); | |
40 path = path.AppendASCII("extensions").AppendASCII("response_headers"); | |
41 | |
42 std::string error; | |
43 scoped_refptr<Extension> extension( | |
44 Extension::Create(path, Manifest::INTERNAL, manifest, | |
45 Extension::NO_FLAGS, &error)); | |
46 EXPECT_TRUE(extension.get()) << error; | |
47 return extension; | |
48 } | |
49 | |
50 scoped_refptr<Extension> CreateWebStoreExtension() { | |
51 base::DictionaryValue manifest; | |
52 manifest.SetString("name", "WebStore"); | |
53 manifest.SetString("version", "1"); | |
54 manifest.SetString("icons.16", "webstore_icon_16.png"); | |
55 | |
56 base::FilePath path; | |
57 EXPECT_TRUE(PathService::Get(chrome::DIR_RESOURCES, &path)); | |
58 path = path.AppendASCII("web_store"); | |
59 | |
60 std::string error; | |
61 scoped_refptr<Extension> extension( | |
62 Extension::Create(path, Manifest::COMPONENT, manifest, | |
63 Extension::NO_FLAGS, &error)); | |
64 EXPECT_TRUE(extension.get()) << error; | |
65 return extension; | |
66 } | |
67 | |
68 scoped_refptr<Extension> CreateTestResponseHeaderExtension() { | |
69 base::DictionaryValue manifest; | |
70 manifest.SetString("name", "An extension with web-accessible resources"); | |
71 manifest.SetString("version", "2"); | |
72 | |
73 base::ListValue* web_accessible_list = new base::ListValue(); | |
74 web_accessible_list->AppendString("test.dat"); | |
75 manifest.Set("web_accessible_resources", web_accessible_list); | |
76 | |
77 base::FilePath path; | |
78 EXPECT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &path)); | |
79 path = path.AppendASCII("extensions").AppendASCII("response_headers"); | |
80 | |
81 std::string error; | |
82 scoped_refptr<Extension> extension( | |
83 Extension::Create(path, Manifest::UNPACKED, manifest, | |
84 Extension::NO_FLAGS, &error)); | |
85 EXPECT_TRUE(extension.get()) << error; | |
86 return extension; | |
87 } | |
88 | |
89 class ExtensionProtocolTest : public testing::Test { | |
90 public: | |
91 ExtensionProtocolTest() | |
92 : thread_bundle_(content::TestBrowserThreadBundle::IO_MAINLOOP), | |
93 resource_context_(&test_url_request_context_) {} | |
94 | |
95 virtual void SetUp() OVERRIDE { | |
96 testing::Test::SetUp(); | |
97 extension_info_map_ = new InfoMap(); | |
98 net::URLRequestContext* request_context = | |
99 resource_context_.GetRequestContext(); | |
100 old_factory_ = request_context->job_factory(); | |
101 } | |
102 | |
103 virtual void TearDown() { | |
104 net::URLRequestContext* request_context = | |
105 resource_context_.GetRequestContext(); | |
106 request_context->set_job_factory(old_factory_); | |
107 } | |
108 | |
109 void SetProtocolHandler(Profile::ProfileType profile_type) { | |
110 net::URLRequestContext* request_context = | |
111 resource_context_.GetRequestContext(); | |
112 job_factory_.SetProtocolHandler( | |
113 kExtensionScheme, | |
114 CreateExtensionProtocolHandler(profile_type, | |
115 extension_info_map_.get())); | |
116 request_context->set_job_factory(&job_factory_); | |
117 } | |
118 | |
119 void StartRequest(net::URLRequest* request, | |
120 ResourceType::Type resource_type) { | |
121 content::ResourceRequestInfo::AllocateForTesting(request, | |
122 resource_type, | |
123 &resource_context_, | |
124 -1, | |
125 -1, | |
126 -1, | |
127 false); | |
128 request->Start(); | |
129 base::MessageLoop::current()->Run(); | |
130 } | |
131 | |
132 protected: | |
133 content::TestBrowserThreadBundle thread_bundle_; | |
134 scoped_refptr<InfoMap> extension_info_map_; | |
135 net::URLRequestJobFactoryImpl job_factory_; | |
136 const net::URLRequestJobFactory* old_factory_; | |
137 net::TestDelegate test_delegate_; | |
138 net::TestURLRequestContext test_url_request_context_; | |
139 content::MockResourceContext resource_context_; | |
140 }; | |
141 | |
142 // Tests that making a chrome-extension request in an incognito context is | |
143 // only allowed under the right circumstances (if the extension is allowed | |
144 // in incognito, and it's either a non-main-frame request or a split-mode | |
145 // extension). | |
146 TEST_F(ExtensionProtocolTest, IncognitoRequest) { | |
147 // Register an incognito extension protocol handler. | |
148 SetProtocolHandler(Profile::INCOGNITO_PROFILE); | |
149 | |
150 struct TestCase { | |
151 // Inputs. | |
152 std::string name; | |
153 bool incognito_split_mode; | |
154 bool incognito_enabled; | |
155 | |
156 // Expected results. | |
157 bool should_allow_main_frame_load; | |
158 bool should_allow_sub_frame_load; | |
159 } cases[] = { | |
160 {"spanning disabled", false, false, false, false}, | |
161 {"split disabled", true, false, false, false}, | |
162 {"spanning enabled", false, true, false, true}, | |
163 {"split enabled", true, true, true, true}, | |
164 }; | |
165 | |
166 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(cases); ++i) { | |
167 scoped_refptr<Extension> extension = | |
168 CreateTestExtension(cases[i].name, cases[i].incognito_split_mode); | |
169 extension_info_map_->AddExtension( | |
170 extension.get(), base::Time::Now(), cases[i].incognito_enabled, false); | |
171 | |
172 // First test a main frame request. | |
173 { | |
174 // It doesn't matter that the resource doesn't exist. If the resource | |
175 // is blocked, we should see ADDRESS_UNREACHABLE. Otherwise, the request | |
176 // should just fail because the file doesn't exist. | |
177 net::URLRequest request(extension->GetResourceURL("404.html"), | |
178 net::DEFAULT_PRIORITY, | |
179 &test_delegate_, | |
180 resource_context_.GetRequestContext()); | |
181 StartRequest(&request, ResourceType::MAIN_FRAME); | |
182 EXPECT_EQ(net::URLRequestStatus::FAILED, request.status().status()); | |
183 | |
184 if (cases[i].should_allow_main_frame_load) { | |
185 EXPECT_EQ(net::ERR_FILE_NOT_FOUND, request.status().error()) << | |
186 cases[i].name; | |
187 } else { | |
188 EXPECT_EQ(net::ERR_ADDRESS_UNREACHABLE, request.status().error()) << | |
189 cases[i].name; | |
190 } | |
191 } | |
192 | |
193 // Now do a subframe request. | |
194 { | |
195 net::URLRequest request(extension->GetResourceURL("404.html"), | |
196 net::DEFAULT_PRIORITY, | |
197 &test_delegate_, | |
198 resource_context_.GetRequestContext()); | |
199 StartRequest(&request, ResourceType::SUB_FRAME); | |
200 EXPECT_EQ(net::URLRequestStatus::FAILED, request.status().status()); | |
201 | |
202 if (cases[i].should_allow_sub_frame_load) { | |
203 EXPECT_EQ(net::ERR_FILE_NOT_FOUND, request.status().error()) << | |
204 cases[i].name; | |
205 } else { | |
206 EXPECT_EQ(net::ERR_ADDRESS_UNREACHABLE, request.status().error()) << | |
207 cases[i].name; | |
208 } | |
209 } | |
210 } | |
211 } | |
212 | |
213 void CheckForContentLengthHeader(net::URLRequest* request) { | |
214 std::string content_length; | |
215 request->GetResponseHeaderByName(net::HttpRequestHeaders::kContentLength, | |
216 &content_length); | |
217 EXPECT_FALSE(content_length.empty()); | |
218 int length_value = 0; | |
219 EXPECT_TRUE(base::StringToInt(content_length, &length_value)); | |
220 EXPECT_GT(length_value, 0); | |
221 } | |
222 | |
223 // Tests getting a resource for a component extension works correctly, both when | |
224 // the extension is enabled and when it is disabled. | |
225 TEST_F(ExtensionProtocolTest, ComponentResourceRequest) { | |
226 // Register a non-incognito extension protocol handler. | |
227 SetProtocolHandler(Profile::REGULAR_PROFILE); | |
228 | |
229 scoped_refptr<Extension> extension = CreateWebStoreExtension(); | |
230 extension_info_map_->AddExtension(extension.get(), | |
231 base::Time::Now(), | |
232 false, | |
233 false); | |
234 | |
235 // First test it with the extension enabled. | |
236 { | |
237 net::URLRequest request(extension->GetResourceURL("webstore_icon_16.png"), | |
238 net::DEFAULT_PRIORITY, | |
239 &test_delegate_, | |
240 resource_context_.GetRequestContext()); | |
241 StartRequest(&request, ResourceType::MEDIA); | |
242 EXPECT_EQ(net::URLRequestStatus::SUCCESS, request.status().status()); | |
243 CheckForContentLengthHeader(&request); | |
244 } | |
245 | |
246 // And then test it with the extension disabled. | |
247 extension_info_map_->RemoveExtension(extension->id(), | |
248 UnloadedExtensionInfo::REASON_DISABLE); | |
249 { | |
250 net::URLRequest request(extension->GetResourceURL("webstore_icon_16.png"), | |
251 net::DEFAULT_PRIORITY, | |
252 &test_delegate_, | |
253 resource_context_.GetRequestContext()); | |
254 StartRequest(&request, ResourceType::MEDIA); | |
255 EXPECT_EQ(net::URLRequestStatus::SUCCESS, request.status().status()); | |
256 CheckForContentLengthHeader(&request); | |
257 } | |
258 } | |
259 | |
260 // Tests that a URL request for resource from an extension returns a few | |
261 // expected response headers. | |
262 TEST_F(ExtensionProtocolTest, ResourceRequestResponseHeaders) { | |
263 // Register a non-incognito extension protocol handler. | |
264 SetProtocolHandler(Profile::REGULAR_PROFILE); | |
265 | |
266 scoped_refptr<Extension> extension = CreateTestResponseHeaderExtension(); | |
267 extension_info_map_->AddExtension(extension.get(), | |
268 base::Time::Now(), | |
269 false, | |
270 false); | |
271 | |
272 { | |
273 net::URLRequest request(extension->GetResourceURL("test.dat"), | |
274 net::DEFAULT_PRIORITY, | |
275 &test_delegate_, | |
276 resource_context_.GetRequestContext()); | |
277 StartRequest(&request, ResourceType::MEDIA); | |
278 EXPECT_EQ(net::URLRequestStatus::SUCCESS, request.status().status()); | |
279 | |
280 // Check that cache-related headers are set. | |
281 std::string etag; | |
282 request.GetResponseHeaderByName("ETag", &etag); | |
283 EXPECT_TRUE(StartsWithASCII(etag, "\"", false)); | |
284 EXPECT_TRUE(EndsWith(etag, "\"", false)); | |
285 | |
286 std::string revalidation_header; | |
287 request.GetResponseHeaderByName("cache-control", &revalidation_header); | |
288 EXPECT_EQ("no-cache", revalidation_header); | |
289 | |
290 // We set test.dat as web-accessible, so it should have a CORS header. | |
291 std::string access_control; | |
292 request.GetResponseHeaderByName("Access-Control-Allow-Origin", | |
293 &access_control); | |
294 EXPECT_EQ("*", access_control); | |
295 } | |
296 } | |
297 | |
298 // Tests that a URL request for main frame or subframe from an extension | |
299 // succeeds, but subresources fail. See http://crbug.com/312269. | |
300 TEST_F(ExtensionProtocolTest, AllowFrameRequests) { | |
301 // Register a non-incognito extension protocol handler. | |
302 SetProtocolHandler(Profile::REGULAR_PROFILE); | |
303 | |
304 scoped_refptr<Extension> extension = CreateTestExtension("foo", false); | |
305 extension_info_map_->AddExtension(extension.get(), | |
306 base::Time::Now(), | |
307 false, | |
308 false); | |
309 | |
310 // All MAIN_FRAME and SUB_FRAME requests should succeed. | |
311 { | |
312 net::URLRequest request(extension->GetResourceURL("test.dat"), | |
313 net::DEFAULT_PRIORITY, | |
314 &test_delegate_, | |
315 resource_context_.GetRequestContext()); | |
316 StartRequest(&request, ResourceType::MAIN_FRAME); | |
317 EXPECT_EQ(net::URLRequestStatus::SUCCESS, request.status().status()); | |
318 } | |
319 { | |
320 net::URLRequest request(extension->GetResourceURL("test.dat"), | |
321 net::DEFAULT_PRIORITY, | |
322 &test_delegate_, | |
323 resource_context_.GetRequestContext()); | |
324 StartRequest(&request, ResourceType::SUB_FRAME); | |
325 EXPECT_EQ(net::URLRequestStatus::SUCCESS, request.status().status()); | |
326 } | |
327 | |
328 // And subresource types, such as media, should fail. | |
329 { | |
330 net::URLRequest request(extension->GetResourceURL("test.dat"), | |
331 net::DEFAULT_PRIORITY, | |
332 &test_delegate_, | |
333 resource_context_.GetRequestContext()); | |
334 StartRequest(&request, ResourceType::MEDIA); | |
335 EXPECT_EQ(net::URLRequestStatus::FAILED, request.status().status()); | |
336 } | |
337 } | |
338 | |
339 } // namespace extensions | |
OLD | NEW |