blob: d493672a3cf027e0b4fa6a2f6a6828d46f72e942 [file] [log] [blame]
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/common/extensions/extension.h"
#if defined(TOOLKIT_GTK)
#include <gtk/gtk.h>
#endif
#include "base/format_macros.h"
#include "base/file_path.h"
#include "base/file_util.h"
#include "base/i18n/rtl.h"
#include "base/path_service.h"
#include "base/string_number_conversions.h"
#include "base/string_util.h"
#include "base/utf_string_conversions.h"
#include "chrome/common/chrome_paths.h"
#include "chrome/common/extensions/extension_action.h"
#include "chrome/common/extensions/extension_constants.h"
#include "chrome/common/extensions/extension_error_utils.h"
#include "chrome/common/extensions/extension_resource.h"
#include "chrome/common/url_constants.h"
#include "content/common/json_value_serializer.h"
#include "googleurl/src/gurl.h"
#include "net/base/mime_sniffer.h"
#include "skia/ext/image_operations.h"
#include "chrome/test/ui_test_utils.h"
#include "net/base/mock_host_resolver.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "third_party/skia/include/core/SkBitmap.h"
#include "ui/base/l10n/l10n_util.h"
#include "ui/gfx/codec/png_codec.h"
namespace keys = extension_manifest_keys;
namespace values = extension_manifest_values;
namespace errors = extension_manifest_errors;
namespace {
void CompareLists(const std::vector<std::string>& expected,
const std::vector<std::string>& actual) {
ASSERT_EQ(expected.size(), actual.size());
for (size_t i = 0; i < expected.size(); ++i) {
EXPECT_EQ(expected[i], actual[i]);
}
}
static void AddPattern(ExtensionExtent* extent, const std::string& pattern) {
int schemes = URLPattern::SCHEME_ALL;
extent->AddPattern(URLPattern(schemes, pattern));
}
}
class ExtensionTest : public testing::Test {
};
// We persist location values in the preferences, so this is a sanity test that
// someone doesn't accidentally change them.
TEST(ExtensionTest, LocationValuesTest) {
ASSERT_EQ(0, Extension::INVALID);
ASSERT_EQ(1, Extension::INTERNAL);
ASSERT_EQ(2, Extension::EXTERNAL_PREF);
ASSERT_EQ(3, Extension::EXTERNAL_REGISTRY);
ASSERT_EQ(4, Extension::LOAD);
ASSERT_EQ(5, Extension::COMPONENT);
ASSERT_EQ(6, Extension::EXTERNAL_PREF_DOWNLOAD);
ASSERT_EQ(7, Extension::EXTERNAL_POLICY_DOWNLOAD);
}
TEST(ExtensionTest, LocationPriorityTest) {
for (int i = 0; i < Extension::NUM_LOCATIONS; i++) {
Extension::Location loc = static_cast<Extension::Location>(i);
// INVALID is not a valid location.
if (loc == Extension::INVALID)
continue;
// Comparing a location that has no rank will hit a CHECK. Do a
// compare with every valid location, to be sure each one is covered.
// Check that no install source can override a componenet extension.
ASSERT_EQ(Extension::COMPONENT,
Extension::GetHigherPriorityLocation(Extension::COMPONENT, loc));
ASSERT_EQ(Extension::COMPONENT,
Extension::GetHigherPriorityLocation(loc, Extension::COMPONENT));
// Check that any source can override a user install. This might change
// in the future, in which case this test should be updated.
ASSERT_EQ(loc,
Extension::GetHigherPriorityLocation(Extension::INTERNAL, loc));
ASSERT_EQ(loc,
Extension::GetHigherPriorityLocation(loc, Extension::INTERNAL));
}
// Check a few interesting cases that we know can happen:
ASSERT_EQ(Extension::EXTERNAL_POLICY_DOWNLOAD,
Extension::GetHigherPriorityLocation(
Extension::EXTERNAL_POLICY_DOWNLOAD,
Extension::EXTERNAL_PREF));
ASSERT_EQ(Extension::EXTERNAL_PREF,
Extension::GetHigherPriorityLocation(
Extension::INTERNAL,
Extension::EXTERNAL_PREF));
}
// Please don't put any more manifest tests here!!
// Move them to extension_manifest_unittest.cc instead and make them use the
// more data-driven style there instead.
// Bug: http://crbug.com/38462
TEST(ExtensionTest, InitFromValueInvalid) {
#if defined(OS_WIN)
FilePath path(FILE_PATH_LITERAL("c:\\foo"));
#elif defined(OS_POSIX)
FilePath path(FILE_PATH_LITERAL("/foo"));
#endif
scoped_refptr<Extension> extension_ptr(new Extension(path,
Extension::INVALID));
Extension& extension = *extension_ptr;
int error_code = 0;
std::string error;
// Start with a valid extension manifest
FilePath extensions_path;
ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &extensions_path));
extensions_path = extensions_path.AppendASCII("extensions")
.AppendASCII("good")
.AppendASCII("Extensions")
.AppendASCII("behllobkkfkfnphdnhnkndlbkcpglgmj")
.AppendASCII("1.0.0.0")
.Append(Extension::kManifestFilename);
JSONFileValueSerializer serializer(extensions_path);
scoped_ptr<DictionaryValue> valid_value(
static_cast<DictionaryValue*>(serializer.Deserialize(&error_code,
&error)));
EXPECT_EQ("", error);
EXPECT_EQ(0, error_code);
ASSERT_TRUE(valid_value.get());
ASSERT_TRUE(extension.InitFromValue(*valid_value, Extension::REQUIRE_KEY,
&error));
ASSERT_EQ("", error);
EXPECT_EQ("en_US", extension.default_locale());
scoped_ptr<DictionaryValue> input_value;
// Test missing and invalid versions
input_value.reset(valid_value->DeepCopy());
input_value->Remove(keys::kVersion, NULL);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_EQ(errors::kInvalidVersion, error);
input_value->SetInteger(keys::kVersion, 42);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_EQ(errors::kInvalidVersion, error);
// Test missing and invalid names.
input_value.reset(valid_value->DeepCopy());
input_value->Remove(keys::kName, NULL);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_EQ(errors::kInvalidName, error);
input_value->SetInteger(keys::kName, 42);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_EQ(errors::kInvalidName, error);
// Test invalid description
input_value.reset(valid_value->DeepCopy());
input_value->SetInteger(keys::kDescription, 42);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_EQ(errors::kInvalidDescription, error);
// Test invalid icons
input_value.reset(valid_value->DeepCopy());
input_value->SetInteger(keys::kIcons, 42);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_EQ(errors::kInvalidIcons, error);
// Test invalid icon paths
input_value.reset(valid_value->DeepCopy());
DictionaryValue* icons = NULL;
input_value->GetDictionary(keys::kIcons, &icons);
ASSERT_FALSE(NULL == icons);
icons->SetInteger(base::IntToString(128), 42);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidIconPath));
// Test invalid user scripts list
input_value.reset(valid_value->DeepCopy());
input_value->SetInteger(keys::kContentScripts, 42);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_EQ(errors::kInvalidContentScriptsList, error);
// Test invalid user script item
input_value.reset(valid_value->DeepCopy());
ListValue* content_scripts = NULL;
input_value->GetList(keys::kContentScripts, &content_scripts);
ASSERT_FALSE(NULL == content_scripts);
content_scripts->Set(0, Value::CreateIntegerValue(42));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidContentScript));
// Test missing and invalid matches array
input_value.reset(valid_value->DeepCopy());
input_value->GetList(keys::kContentScripts, &content_scripts);
DictionaryValue* user_script = NULL;
content_scripts->GetDictionary(0, &user_script);
user_script->Remove(keys::kMatches, NULL);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidMatches));
user_script->Set(keys::kMatches, Value::CreateIntegerValue(42));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidMatches));
ListValue* matches = new ListValue;
user_script->Set(keys::kMatches, matches);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidMatchCount));
// Test invalid match element
matches->Set(0, Value::CreateIntegerValue(42));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidMatch));
matches->Set(0, Value::CreateStringValue("chrome://*/*"));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidMatch));
// Test missing and invalid files array
input_value.reset(valid_value->DeepCopy());
input_value->GetList(keys::kContentScripts, &content_scripts);
content_scripts->GetDictionary(0, &user_script);
user_script->Remove(keys::kJs, NULL);
user_script->Remove(keys::kCss, NULL);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kMissingFile));
user_script->Set(keys::kJs, Value::CreateIntegerValue(42));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidJsList));
user_script->Set(keys::kCss, new ListValue);
user_script->Set(keys::kJs, new ListValue);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kMissingFile));
user_script->Remove(keys::kCss, NULL);
ListValue* files = new ListValue;
user_script->Set(keys::kJs, files);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kMissingFile));
// Test invalid file element
files->Set(0, Value::CreateIntegerValue(42));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidJs));
user_script->Remove(keys::kJs, NULL);
// Test the css element
user_script->Set(keys::kCss, Value::CreateIntegerValue(42));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidCssList));
// Test invalid file element
ListValue* css_files = new ListValue;
user_script->Set(keys::kCss, css_files);
css_files->Set(0, Value::CreateIntegerValue(42));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidCss));
// Test missing and invalid permissions array
input_value.reset(valid_value->DeepCopy());
EXPECT_TRUE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
ListValue* permissions = NULL;
input_value->GetList(keys::kPermissions, &permissions);
ASSERT_FALSE(NULL == permissions);
permissions = new ListValue;
input_value->Set(keys::kPermissions, permissions);
EXPECT_TRUE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
input_value->Set(keys::kPermissions, Value::CreateIntegerValue(9));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidPermissions));
input_value.reset(valid_value->DeepCopy());
input_value->GetList(keys::kPermissions, &permissions);
permissions->Set(0, Value::CreateIntegerValue(24));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidPermission));
// We allow unknown API permissions, so this will be valid until we better
// distinguish between API and host permissions.
permissions->Set(0, Value::CreateStringValue("www.google.com"));
EXPECT_TRUE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
// Multiple page actions are not allowed.
input_value.reset(valid_value->DeepCopy());
DictionaryValue* action = new DictionaryValue;
action->SetString(keys::kPageActionId, "MyExtensionActionId");
action->SetString(keys::kName, "MyExtensionActionName");
ListValue* action_list = new ListValue;
action_list->Append(action->DeepCopy());
action_list->Append(action);
input_value->Set(keys::kPageActions, action_list);
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_STREQ(errors::kInvalidPageActionsListSize, error.c_str());
// Test invalid options page url.
input_value.reset(valid_value->DeepCopy());
input_value->Set(keys::kOptionsPage, Value::CreateNullValue());
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidOptionsPage));
// Test invalid/empty default locale.
input_value.reset(valid_value->DeepCopy());
input_value->Set(keys::kDefaultLocale, Value::CreateIntegerValue(5));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidDefaultLocale));
input_value->Set(keys::kDefaultLocale, Value::CreateStringValue(""));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidDefaultLocale));
// Test invalid minimum_chrome_version.
input_value.reset(valid_value->DeepCopy());
input_value->Set(keys::kMinimumChromeVersion, Value::CreateIntegerValue(42));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kInvalidMinimumChromeVersion));
#if !defined(OS_MACOSX)
// TODO(aa): The version isn't stamped into the unit test binary on mac.
input_value->Set(keys::kMinimumChromeVersion,
Value::CreateStringValue("88.8"));
EXPECT_FALSE(extension.InitFromValue(*input_value, Extension::REQUIRE_KEY,
&error));
EXPECT_TRUE(MatchPattern(error, errors::kChromeVersionTooLow));
#endif
}
TEST(ExtensionTest, InitFromValueValid) {
#if defined(OS_WIN)
FilePath path(FILE_PATH_LITERAL("C:\\foo"));
#elif defined(OS_POSIX)
FilePath path(FILE_PATH_LITERAL("/foo"));
#endif
scoped_refptr<Extension> extension_ptr(new Extension(path,
Extension::INVALID));
Extension& extension = *extension_ptr;
std::string error;
DictionaryValue input_value;
// Test minimal extension
input_value.SetString(keys::kVersion, "1.0.0.0");
input_value.SetString(keys::kName, "my extension");
EXPECT_TRUE(extension.InitFromValue(input_value, Extension::NO_FLAGS,
&error));
EXPECT_EQ("", error);
EXPECT_TRUE(Extension::IdIsValid(extension.id()));
EXPECT_EQ("1.0.0.0", extension.VersionString());
EXPECT_EQ("my extension", extension.name());
EXPECT_EQ(extension.id(), extension.url().host());
EXPECT_EQ(path.value(), extension.path().value());
// Test permissions scheme.
ListValue* permissions = new ListValue;
permissions->Set(0, Value::CreateStringValue("file:///C:/foo.txt"));
input_value.Set(keys::kPermissions, permissions);
// We allow unknown API permissions, so this will be valid until we better
// distinguish between API and host permissions.
EXPECT_TRUE(extension.InitFromValue(input_value, Extension::NO_FLAGS,
&error));
input_value.Remove(keys::kPermissions, NULL);
// Test with an options page.
input_value.SetString(keys::kOptionsPage, "options.html");
EXPECT_TRUE(extension.InitFromValue(input_value, Extension::NO_FLAGS,
&error));
EXPECT_EQ("", error);
EXPECT_EQ("chrome-extension", extension.options_url().scheme());
EXPECT_EQ("/options.html", extension.options_url().path());
// Test that an empty list of page actions does not stop a browser action
// from being loaded.
ListValue* empty_list = new ListValue;
input_value.Set(keys::kPageActions, empty_list);
EXPECT_TRUE(extension.InitFromValue(input_value, Extension::NO_FLAGS,
&error));
EXPECT_EQ("", error);
#if !defined(OS_MACOSX)
// TODO(aa): The version isn't stamped into the unit test binary on mac.
// Test with a minimum_chrome_version.
input_value.SetString(keys::kMinimumChromeVersion, "1.0");
EXPECT_TRUE(extension.InitFromValue(input_value, Extension::NO_FLAGS,
&error));
EXPECT_EQ("", error);
// The minimum chrome version is not stored in the Extension object.
#endif
}
TEST(ExtensionTest, InitFromValueValidNameInRTL) {
#if defined(TOOLKIT_GTK)
GtkTextDirection gtk_dir = gtk_widget_get_default_direction();
gtk_widget_set_default_direction(GTK_TEXT_DIR_RTL);
#else
std::string locale = l10n_util::GetApplicationLocale("");
base::i18n::SetICUDefaultLocale("he");
#endif
#if defined(OS_WIN)
FilePath path(FILE_PATH_LITERAL("C:\\foo"));
#elif defined(OS_POSIX)
FilePath path(FILE_PATH_LITERAL("/foo"));
#endif
scoped_refptr<Extension> extension_ptr(new Extension(path,
Extension::INVALID));
Extension& extension = *extension_ptr;
std::string error;
DictionaryValue input_value;
input_value.SetString(keys::kVersion, "1.0.0.0");
// No strong RTL characters in name.
std::wstring name(L"Dictionary (by Google)");
input_value.SetString(keys::kName, WideToUTF16Hack(name));
EXPECT_TRUE(extension.InitFromValue(input_value, Extension::NO_FLAGS,
&error));
EXPECT_EQ("", error);
std::wstring localized_name(name);
base::i18n::AdjustStringForLocaleDirection(&localized_name);
EXPECT_EQ(localized_name, UTF8ToWide(extension.name()));
// Strong RTL characters in name.
name = L"Dictionary (\x05D1\x05D2"L" Google)";
input_value.SetString(keys::kName, WideToUTF16Hack(name));
EXPECT_TRUE(extension.InitFromValue(input_value, Extension::NO_FLAGS,
&error));
EXPECT_EQ("", error);
localized_name = name;
base::i18n::AdjustStringForLocaleDirection(&localized_name);
EXPECT_EQ(localized_name, UTF8ToWide(extension.name()));
// Reset locale.
#if defined(TOOLKIT_GTK)
gtk_widget_set_default_direction(gtk_dir);
#else
base::i18n::SetICUDefaultLocale(locale);
#endif
}
TEST(ExtensionTest, GetResourceURLAndPath) {
#if defined(OS_WIN)
FilePath path(FILE_PATH_LITERAL("C:\\foo"));
#elif defined(OS_POSIX)
FilePath path(FILE_PATH_LITERAL("/foo"));
#endif
DictionaryValue input_value;
input_value.SetString(keys::kVersion, "1.0.0.0");
input_value.SetString(keys::kName, "my extension");
scoped_refptr<Extension> extension(Extension::Create(path,
Extension::INVALID, input_value, Extension::STRICT_ERROR_CHECKS, NULL));
EXPECT_TRUE(extension.get());
EXPECT_EQ(extension->url().spec() + "bar/baz.js",
Extension::GetResourceURL(extension->url(), "bar/baz.js").spec());
EXPECT_EQ(extension->url().spec() + "baz.js",
Extension::GetResourceURL(extension->url(),
"bar/../baz.js").spec());
EXPECT_EQ(extension->url().spec() + "baz.js",
Extension::GetResourceURL(extension->url(), "../baz.js").spec());
}
TEST(ExtensionTest, LoadPageActionHelper) {
#if defined(OS_WIN)
FilePath path(base::StringPrintf(L"c:\\extension"));
#else
FilePath path(base::StringPrintf("/extension"));
#endif
scoped_refptr<Extension> extension_ptr(new Extension(path,
Extension::INVALID));
Extension& extension = *extension_ptr;
std::string error_msg;
scoped_ptr<ExtensionAction> action;
DictionaryValue input;
// First try with an empty dictionary.
action.reset(extension.LoadExtensionActionHelper(&input, &error_msg));
ASSERT_TRUE(action != NULL);
ASSERT_TRUE(error_msg.empty());
// Now setup some values to use in the action.
const std::string id("MyExtensionActionId");
const std::string name("MyExtensionActionName");
std::string img1("image1.png");
std::string img2("image2.png");
// Add the dictionary for the contextual action.
input.SetString(keys::kPageActionId, id);
input.SetString(keys::kName, name);
ListValue* icons = new ListValue;
icons->Set(0, Value::CreateStringValue(img1));
icons->Set(1, Value::CreateStringValue(img2));
input.Set(keys::kPageActionIcons, icons);
// Parse and read back the values from the object.
action.reset(extension.LoadExtensionActionHelper(&input, &error_msg));
ASSERT_TRUE(NULL != action.get());
ASSERT_TRUE(error_msg.empty());
ASSERT_EQ(id, action->id());
// No title, so fall back to name.
ASSERT_EQ(name, action->GetTitle(1));
ASSERT_EQ(2u, action->icon_paths()->size());
ASSERT_EQ(img1, (*action->icon_paths())[0]);
ASSERT_EQ(img2, (*action->icon_paths())[1]);
// Explicitly set the same type and parse again.
input.SetString(keys::kType, values::kPageActionTypeTab);
action.reset(extension.LoadExtensionActionHelper(&input, &error_msg));
ASSERT_TRUE(NULL != action.get());
ASSERT_TRUE(error_msg.empty());
// Make a deep copy of the input and remove one key at a time and see if we
// get the right error.
scoped_ptr<DictionaryValue> copy;
// First remove id key.
copy.reset(input.DeepCopy());
copy->Remove(keys::kPageActionId, NULL);
action.reset(extension.LoadExtensionActionHelper(copy.get(), &error_msg));
ASSERT_TRUE(NULL != action.get());
// Then remove the name key. It's optional, so no error.
copy.reset(input.DeepCopy());
copy->Remove(keys::kName, NULL);
action.reset(extension.LoadExtensionActionHelper(copy.get(), &error_msg));
ASSERT_TRUE(NULL != action.get());
ASSERT_TRUE(action->GetTitle(1).empty());
ASSERT_TRUE(error_msg.empty());
// Then remove the icon paths key.
copy.reset(input.DeepCopy());
copy->Remove(keys::kPageActionIcons, NULL);
action.reset(extension.LoadExtensionActionHelper(copy.get(), &error_msg));
ASSERT_TRUE(NULL != action.get());
error_msg = "";
// Now test that we can parse the new format for page actions.
// Now setup some values to use in the page action.
const std::string kTitle("MyExtensionActionTitle");
const std::string kIcon("image1.png");
const std::string kPopupHtmlFile("a_popup.html");
// Add the dictionary for the contextual action.
input.Clear();
input.SetString(keys::kPageActionDefaultTitle, kTitle);
input.SetString(keys::kPageActionDefaultIcon, kIcon);
// Parse and read back the values from the object.
action.reset(extension.LoadExtensionActionHelper(&input, &error_msg));
ASSERT_TRUE(action.get());
ASSERT_TRUE(error_msg.empty());
ASSERT_EQ(kTitle, action->GetTitle(1));
ASSERT_EQ(0u, action->icon_paths()->size());
// Invalid title should give an error even with a valid name.
input.Clear();
input.SetInteger(keys::kPageActionDefaultTitle, 42);
input.SetString(keys::kName, name);
action.reset(extension.LoadExtensionActionHelper(&input, &error_msg));
ASSERT_TRUE(NULL == action.get());
ASSERT_STREQ(errors::kInvalidPageActionDefaultTitle, error_msg.c_str());
error_msg = "";
// Invalid name should give an error only with no title.
input.SetString(keys::kPageActionDefaultTitle, kTitle);
input.SetInteger(keys::kName, 123);
action.reset(extension.LoadExtensionActionHelper(&input, &error_msg));
ASSERT_TRUE(NULL != action.get());
ASSERT_EQ(kTitle, action->GetTitle(1));
ASSERT_TRUE(error_msg.empty());
input.Remove(keys::kPageActionDefaultTitle, NULL);
action.reset(extension.LoadExtensionActionHelper(&input, &error_msg));
ASSERT_TRUE(NULL == action.get());
ASSERT_STREQ(errors::kInvalidPageActionName, error_msg.c_str());
error_msg = "";
// Test that keys "popup" and "default_popup" both work, but can not
// be used at the same time.
input.Clear();
input.SetString(keys::kPageActionDefaultTitle, kTitle);
input.SetString(keys::kPageActionDefaultIcon, kIcon);
// LoadExtensionActionHelper expects the extension member |extension_url|
// to be set.
extension.extension_url_ =
GURL(std::string(chrome::kExtensionScheme) +
chrome::kStandardSchemeSeparator +
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/");
// Add key "popup", expect success.
input.SetString(keys::kPageActionPopup, kPopupHtmlFile);
action.reset(extension.LoadExtensionActionHelper(&input, &error_msg));
ASSERT_TRUE(NULL != action.get());
ASSERT_TRUE(error_msg.empty());
ASSERT_STREQ(
extension.url().Resolve(kPopupHtmlFile).spec().c_str(),
action->GetPopupUrl(ExtensionAction::kDefaultTabId).spec().c_str());
// Add key "default_popup", expect failure.
input.SetString(keys::kPageActionDefaultPopup, kPopupHtmlFile);
action.reset(extension.LoadExtensionActionHelper(&input, &error_msg));
ASSERT_TRUE(NULL == action.get());
ASSERT_STREQ(
ExtensionErrorUtils::FormatErrorMessage(
errors::kInvalidPageActionOldAndNewKeys,
keys::kPageActionDefaultPopup,
keys::kPageActionPopup).c_str(),
error_msg.c_str());
error_msg = "";
// Remove key "popup", expect success.
input.Remove(keys::kPageActionPopup, NULL);
action.reset(extension.LoadExtensionActionHelper(&input, &error_msg));
ASSERT_TRUE(NULL != action.get());
ASSERT_TRUE(error_msg.empty());
ASSERT_STREQ(
extension.url().Resolve(kPopupHtmlFile).spec().c_str(),
action->GetPopupUrl(ExtensionAction::kDefaultTabId).spec().c_str());
// Setting default_popup to "" is the same as having no popup.
input.Remove(keys::kPageActionDefaultPopup, NULL);
input.SetString(keys::kPageActionDefaultPopup, "");
action.reset(extension.LoadExtensionActionHelper(&input, &error_msg));
ASSERT_TRUE(NULL != action.get());
ASSERT_TRUE(error_msg.empty());
EXPECT_FALSE(action->HasPopup(ExtensionAction::kDefaultTabId));
ASSERT_STREQ(
"",
action->GetPopupUrl(ExtensionAction::kDefaultTabId).spec().c_str());
// Setting popup to "" is the same as having no popup.
input.Remove(keys::kPageActionDefaultPopup, NULL);
input.SetString(keys::kPageActionPopup, "");
action.reset(extension.LoadExtensionActionHelper(&input, &error_msg));
ASSERT_TRUE(NULL != action.get());
ASSERT_TRUE(error_msg.empty());
EXPECT_FALSE(action->HasPopup(ExtensionAction::kDefaultTabId));
ASSERT_STREQ(
"",
action->GetPopupUrl(ExtensionAction::kDefaultTabId).spec().c_str());
}
TEST(ExtensionTest, IdIsValid) {
EXPECT_TRUE(Extension::IdIsValid("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"));
EXPECT_TRUE(Extension::IdIsValid("pppppppppppppppppppppppppppppppp"));
EXPECT_TRUE(Extension::IdIsValid("abcdefghijklmnopabcdefghijklmnop"));
EXPECT_TRUE(Extension::IdIsValid("ABCDEFGHIJKLMNOPABCDEFGHIJKLMNOP"));
EXPECT_FALSE(Extension::IdIsValid("abcdefghijklmnopabcdefghijklmno"));
EXPECT_FALSE(Extension::IdIsValid("abcdefghijklmnopabcdefghijklmnopa"));
EXPECT_FALSE(Extension::IdIsValid("0123456789abcdef0123456789abcdef"));
EXPECT_FALSE(Extension::IdIsValid("abcdefghijklmnopabcdefghijklmnoq"));
EXPECT_FALSE(Extension::IdIsValid("abcdefghijklmnopabcdefghijklmno0"));
}
TEST(ExtensionTest, GenerateID) {
const uint8 public_key_info[] = {
0x30, 0x81, 0x9f, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7,
0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x03, 0x81, 0x8d, 0x00, 0x30, 0x81,
0x89, 0x02, 0x81, 0x81, 0x00, 0xb8, 0x7f, 0x2b, 0x20, 0xdc, 0x7c, 0x9b,
0x0c, 0xdc, 0x51, 0x61, 0x99, 0x0d, 0x36, 0x0f, 0xd4, 0x66, 0x88, 0x08,
0x55, 0x84, 0xd5, 0x3a, 0xbf, 0x2b, 0xa4, 0x64, 0x85, 0x7b, 0x0c, 0x04,
0x13, 0x3f, 0x8d, 0xf4, 0xbc, 0x38, 0x0d, 0x49, 0xfe, 0x6b, 0xc4, 0x5a,
0xb0, 0x40, 0x53, 0x3a, 0xd7, 0x66, 0x09, 0x0f, 0x9e, 0x36, 0x74, 0x30,
0xda, 0x8a, 0x31, 0x4f, 0x1f, 0x14, 0x50, 0xd7, 0xc7, 0x20, 0x94, 0x17,
0xde, 0x4e, 0xb9, 0x57, 0x5e, 0x7e, 0x0a, 0xe5, 0xb2, 0x65, 0x7a, 0x89,
0x4e, 0xb6, 0x47, 0xff, 0x1c, 0xbd, 0xb7, 0x38, 0x13, 0xaf, 0x47, 0x85,
0x84, 0x32, 0x33, 0xf3, 0x17, 0x49, 0xbf, 0xe9, 0x96, 0xd0, 0xd6, 0x14,
0x6f, 0x13, 0x8d, 0xc5, 0xfc, 0x2c, 0x72, 0xba, 0xac, 0xea, 0x7e, 0x18,
0x53, 0x56, 0xa6, 0x83, 0xa2, 0xce, 0x93, 0x93, 0xe7, 0x1f, 0x0f, 0xe6,
0x0f, 0x02, 0x03, 0x01, 0x00, 0x01
};
std::string extension_id;
EXPECT_TRUE(
Extension::GenerateId(
std::string(reinterpret_cast<const char*>(&public_key_info[0]),
arraysize(public_key_info)),
&extension_id));
EXPECT_EQ("melddjfinppjdikinhbgehiennejpfhp", extension_id);
}
TEST(ExtensionTest, UpdateUrls) {
// Test several valid update urls
std::vector<std::string> valid;
valid.push_back("http://test.com");
valid.push_back("http://test.com/");
valid.push_back("http://test.com/update");
valid.push_back("http://test.com/update?check=true");
for (size_t i = 0; i < valid.size(); i++) {
GURL url(valid[i]);
EXPECT_TRUE(url.is_valid());
DictionaryValue input_value;
#if defined(OS_WIN)
// (Why %Iu below? This is the single file in the whole code base that
// might make use of a WidePRIuS; let's not encourage any more.)
FilePath path(base::StringPrintf(L"c:\\extension%Iu", i));
#else
FilePath path(base::StringPrintf("/extension%" PRIuS, i));
#endif
std::string error;
input_value.SetString(keys::kVersion, "1.0");
input_value.SetString(keys::kName, "Test");
input_value.SetString(keys::kUpdateURL, url.spec());
scoped_refptr<Extension> extension(Extension::Create(
path, Extension::INVALID, input_value, Extension::STRICT_ERROR_CHECKS,
&error));
EXPECT_TRUE(extension.get()) << error;
}
// Test some invalid update urls
std::vector<std::string> invalid;
invalid.push_back("");
invalid.push_back("test.com");
valid.push_back("http://test.com/update#whatever");
for (size_t i = 0; i < invalid.size(); i++) {
DictionaryValue input_value;
#if defined(OS_WIN)
// (Why %Iu below? This is the single file in the whole code base that
// might make use of a WidePRIuS; let's not encourage any more.)
FilePath path(base::StringPrintf(L"c:\\extension%Iu", i));
#else
FilePath path(base::StringPrintf("/extension%" PRIuS, i));
#endif
std::string error;
input_value.SetString(keys::kVersion, "1.0");
input_value.SetString(keys::kName, "Test");
input_value.SetString(keys::kUpdateURL, invalid[i]);
scoped_refptr<Extension> extension(Extension::Create(
path, Extension::INVALID, input_value, Extension::STRICT_ERROR_CHECKS,
&error));
EXPECT_FALSE(extension.get());
EXPECT_TRUE(MatchPattern(error, errors::kInvalidUpdateURL));
}
}
// This test ensures that the mimetype sniffing code stays in sync with the
// actual crx files that we test other parts of the system with.
TEST(ExtensionTest, MimeTypeSniffing) {
FilePath path;
ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &path));
path = path.AppendASCII("extensions").AppendASCII("good.crx");
std::string data;
ASSERT_TRUE(file_util::ReadFileToString(path, &data));
std::string result;
EXPECT_TRUE(net::SniffMimeType(data.c_str(), data.size(),
GURL("http://www.example.com/foo.crx"), "", &result));
EXPECT_EQ(std::string(Extension::kMimeType), result);
data.clear();
result.clear();
path = path.DirName().AppendASCII("bad_magic.crx");
ASSERT_TRUE(file_util::ReadFileToString(path, &data));
EXPECT_TRUE(net::SniffMimeType(data.c_str(), data.size(),
GURL("http://www.example.com/foo.crx"), "", &result));
EXPECT_EQ("application/octet-stream", result);
}
static scoped_refptr<Extension> LoadManifest(const std::string& dir,
const std::string& test_file,
int extra_flags) {
FilePath path;
PathService::Get(chrome::DIR_TEST_DATA, &path);
path = path.AppendASCII("extensions")
.AppendASCII(dir)
.AppendASCII(test_file);
JSONFileValueSerializer serializer(path);
std::string error;
scoped_ptr<Value> result(serializer.Deserialize(NULL, &error));
if (!result.get()) {
EXPECT_EQ("", error);
return NULL;
}
scoped_refptr<Extension> extension = Extension::Create(
path.DirName(), Extension::INVALID,
*static_cast<DictionaryValue*>(result.get()),
Extension::STRICT_ERROR_CHECKS | extra_flags, &error);
EXPECT_TRUE(extension) << error;
return extension;
}
static scoped_refptr<Extension> LoadManifest(const std::string& dir,
const std::string& test_file) {
return LoadManifest(dir, test_file, Extension::NO_FLAGS);
}
TEST(ExtensionTest, EffectiveHostPermissions) {
scoped_refptr<Extension> extension;
ExtensionExtent hosts;
extension = LoadManifest("effective_host_permissions", "empty.json");
EXPECT_EQ(0u, extension->GetEffectiveHostPermissions().patterns().size());
EXPECT_FALSE(hosts.ContainsURL(GURL("http://www.google.com")));
EXPECT_FALSE(extension->HasEffectiveAccessToAllHosts());
extension = LoadManifest("effective_host_permissions", "one_host.json");
hosts = extension->GetEffectiveHostPermissions();
EXPECT_TRUE(hosts.ContainsURL(GURL("http://www.google.com")));
EXPECT_FALSE(hosts.ContainsURL(GURL("https://www.google.com")));
EXPECT_FALSE(extension->HasEffectiveAccessToAllHosts());
extension = LoadManifest("effective_host_permissions",
"one_host_wildcard.json");
hosts = extension->GetEffectiveHostPermissions();
EXPECT_TRUE(hosts.ContainsURL(GURL("http://google.com")));
EXPECT_TRUE(hosts.ContainsURL(GURL("http://foo.google.com")));
EXPECT_FALSE(extension->HasEffectiveAccessToAllHosts());
extension = LoadManifest("effective_host_permissions", "two_hosts.json");
hosts = extension->GetEffectiveHostPermissions();
EXPECT_TRUE(hosts.ContainsURL(GURL("http://www.google.com")));
EXPECT_TRUE(hosts.ContainsURL(GURL("http://www.reddit.com")));
EXPECT_FALSE(extension->HasEffectiveAccessToAllHosts());
extension = LoadManifest("effective_host_permissions",
"https_not_considered.json");
hosts = extension->GetEffectiveHostPermissions();
EXPECT_TRUE(hosts.ContainsURL(GURL("http://google.com")));
EXPECT_TRUE(hosts.ContainsURL(GURL("https://google.com")));
EXPECT_FALSE(extension->HasEffectiveAccessToAllHosts());
extension = LoadManifest("effective_host_permissions",
"two_content_scripts.json");
hosts = extension->GetEffectiveHostPermissions();
EXPECT_TRUE(hosts.ContainsURL(GURL("http://google.com")));
EXPECT_TRUE(hosts.ContainsURL(GURL("http://www.reddit.com")));
EXPECT_TRUE(hosts.ContainsURL(GURL("http://news.ycombinator.com")));
EXPECT_FALSE(extension->HasEffectiveAccessToAllHosts());
extension = LoadManifest("effective_host_permissions", "all_hosts.json");
hosts = extension->GetEffectiveHostPermissions();
EXPECT_TRUE(hosts.ContainsURL(GURL("http://test/")));
EXPECT_FALSE(hosts.ContainsURL(GURL("https://test/")));
EXPECT_TRUE(hosts.ContainsURL(GURL("http://www.google.com")));
EXPECT_TRUE(extension->HasEffectiveAccessToAllHosts());
extension = LoadManifest("effective_host_permissions", "all_hosts2.json");
hosts = extension->GetEffectiveHostPermissions();
EXPECT_TRUE(hosts.ContainsURL(GURL("http://test/")));
EXPECT_TRUE(hosts.ContainsURL(GURL("http://www.google.com")));
EXPECT_TRUE(extension->HasEffectiveAccessToAllHosts());
extension = LoadManifest("effective_host_permissions", "all_hosts3.json");
hosts = extension->GetEffectiveHostPermissions();
EXPECT_FALSE(hosts.ContainsURL(GURL("http://test/")));
EXPECT_TRUE(hosts.ContainsURL(GURL("https://test/")));
EXPECT_TRUE(hosts.ContainsURL(GURL("http://www.google.com")));
EXPECT_TRUE(extension->HasEffectiveAccessToAllHosts());
}
TEST(ExtensionTest, IsPrivilegeIncrease) {
const struct {
const char* base_name;
// Increase these sizes if you have more than 10.
const char* granted_apis[10];
const char* granted_hosts[10];
bool full_access;
bool expect_increase;
} kTests[] = {
{ "allhosts1", {NULL}, {"http://*/", NULL}, false,
false }, // all -> all
{ "allhosts2", {NULL}, {"http://*/", NULL}, false,
false }, // all -> one
{ "allhosts3", {NULL}, {NULL}, false, true }, // one -> all
{ "hosts1", {NULL},
{"http://www.google.com/", "http://www.reddit.com/", NULL}, false,
false }, // http://a,http://b -> http://a,http://b
{ "hosts2", {NULL},
{"http://www.google.com/", "http://www.reddit.com/", NULL}, false,
true }, // http://a,http://b -> https://a,http://*.b
{ "hosts3", {NULL},
{"http://www.google.com/", "http://www.reddit.com/", NULL}, false,
false }, // http://a,http://b -> http://a
{ "hosts4", {NULL},
{"http://www.google.com/", NULL}, false,
true }, // http://a -> http://a,http://b
{ "hosts5", {"tabs", "notifications", NULL},
{"http://*.example.com/", "http://*.example.com/*",
"http://*.example.co.uk/*", "http://*.example.com.au/*",
NULL}, false,
false }, // http://a,b,c -> http://a,b,c + https://a,b,c
{ "hosts6", {"tabs", "notifications", NULL},
{"http://*.example.com/", "http://*.example.com/*", NULL}, false,
false }, // http://a.com -> http://a.com + http://a.co.uk
{ "permissions1", {"tabs", NULL},
{NULL}, false, false }, // tabs -> tabs
{ "permissions2", {"tabs", NULL},
{NULL}, false, true }, // tabs -> tabs,bookmarks
{ "permissions3", {NULL},
{"http://*/*", NULL},
false, true }, // http://a -> http://a,tabs
{ "permissions5", {"bookmarks", NULL},
{NULL}, false, true }, // bookmarks -> bookmarks,history
#if !defined(OS_CHROMEOS) // plugins aren't allowed in ChromeOS
{ "permissions4", {NULL},
{NULL}, true, false }, // plugin -> plugin,tabs
{ "plugin1", {NULL},
{NULL}, true, false }, // plugin -> plugin
{ "plugin2", {NULL},
{NULL}, true, false }, // plugin -> none
{ "plugin3", {NULL},
{NULL}, false, true }, // none -> plugin
#endif
{ "storage", {NULL},
{NULL}, false, false }, // none -> storage
{ "notifications", {NULL},
{NULL}, false, false } // none -> notifications
};
for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTests); ++i) {
scoped_refptr<Extension> old_extension(
LoadManifest("allow_silent_upgrade",
std::string(kTests[i].base_name) + "_old.json"));
scoped_refptr<Extension> new_extension(
LoadManifest("allow_silent_upgrade",
std::string(kTests[i].base_name) + "_new.json"));
std::set<std::string> granted_apis;
for (size_t j = 0; kTests[i].granted_apis[j] != NULL; ++j)
granted_apis.insert(kTests[i].granted_apis[j]);
ExtensionExtent granted_hosts;
for (size_t j = 0; kTests[i].granted_hosts[j] != NULL; ++j)
AddPattern(&granted_hosts, kTests[i].granted_hosts[j]);
EXPECT_TRUE(new_extension.get()) << kTests[i].base_name << "_new.json";
if (!new_extension.get())
continue;
EXPECT_EQ(kTests[i].expect_increase,
Extension::IsPrivilegeIncrease(kTests[i].full_access,
granted_apis,
granted_hosts,
new_extension.get()))
<< kTests[i].base_name;
}
}
TEST(ExtensionTest, PermissionMessages) {
// Ensure that all permissions that needs to show install UI actually have
// strings associated with them.
std::set<std::string> skip;
// These are considered "nuisance" or "trivial" permissions that don't need
// a prompt.
skip.insert(Extension::kContextMenusPermission);
skip.insert(Extension::kIdlePermission);
skip.insert(Extension::kNotificationPermission);
skip.insert(Extension::kUnlimitedStoragePermission);
skip.insert(Extension::kContentSettingsPermission);
// TODO(erikkay) add a string for this permission.
skip.insert(Extension::kBackgroundPermission);
// The cookie permission does nothing unless you have associated host
// permissions.
skip.insert(Extension::kCookiePermission);
// The proxy permission is warned as part of host permission checks.
skip.insert(Extension::kProxyPermission);
// This permission requires explicit user action (context menu handler)
// so we won't prompt for it for now.
skip.insert(Extension::kFileBrowserHandlerPermission);
// If you've turned on the experimental command-line flag, we don't need
// to warn you further.
skip.insert(Extension::kExperimentalPermission);
// These are only usable by component extensions.
skip.insert(Extension::kWebstorePrivatePermission);
skip.insert(Extension::kFileBrowserPrivatePermission);
skip.insert(Extension::kChromeosInfoPrivatePermissions);
const Extension::PermissionMessage::MessageId ID_NONE =
Extension::PermissionMessage::ID_NONE;
for (size_t i = 0; i < Extension::kNumPermissions; ++i) {
Extension::Permission permission = Extension::kPermissions[i];
if (skip.count(permission.name)) {
EXPECT_EQ(ID_NONE, permission.message_id)
<< "unexpected message_id for " << permission.name;
} else {
EXPECT_NE(ID_NONE, permission.message_id)
<< "missing message_id for " << permission.name;
}
}
}
// Returns a copy of |source| resized to |size| x |size|.
static SkBitmap ResizedCopy(const SkBitmap& source, int size) {
return skia::ImageOperations::Resize(source,
skia::ImageOperations::RESIZE_LANCZOS3,
size,
size);
}
static bool SizeEquals(const SkBitmap& bitmap, const gfx::Size& size) {
return bitmap.width() == size.width() && bitmap.height() == size.height();
}
TEST(ExtensionTest, ImageCaching) {
FilePath path;
ASSERT_TRUE(PathService::Get(chrome::DIR_TEST_DATA, &path));
path = path.AppendASCII("extensions");
// Initialize the Extension.
std::string errors;
DictionaryValue values;
values.SetString(keys::kName, "test");
values.SetString(keys::kVersion, "0.1");
scoped_refptr<Extension> extension(Extension::Create(
path, Extension::INVALID, values, Extension::STRICT_ERROR_CHECKS,
&errors));
ASSERT_TRUE(extension.get());
// Create an ExtensionResource pointing at an icon.
FilePath icon_relative_path(FILE_PATH_LITERAL("icon3.png"));
ExtensionResource resource(extension->id(),
extension->path(),
icon_relative_path);
// Read in the icon file.
FilePath icon_absolute_path = extension->path().Append(icon_relative_path);
std::string raw_png;
ASSERT_TRUE(file_util::ReadFileToString(icon_absolute_path, &raw_png));
SkBitmap image;
ASSERT_TRUE(gfx::PNGCodec::Decode(
reinterpret_cast<const unsigned char*>(raw_png.data()),
raw_png.length(),
&image));
// Make sure the icon file is the size we expect.
gfx::Size original_size(66, 66);
ASSERT_EQ(image.width(), original_size.width());
ASSERT_EQ(image.height(), original_size.height());
// Create two resized versions at size 16x16 and 24x24.
SkBitmap image16 = ResizedCopy(image, 16);
SkBitmap image24 = ResizedCopy(image, 24);
gfx::Size size16(16, 16);
gfx::Size size24(24, 24);
// Cache the 16x16 copy.
EXPECT_FALSE(extension->HasCachedImage(resource, size16));
extension->SetCachedImage(resource, image16, original_size);
EXPECT_TRUE(extension->HasCachedImage(resource, size16));
EXPECT_TRUE(SizeEquals(extension->GetCachedImage(resource, size16), size16));
EXPECT_FALSE(extension->HasCachedImage(resource, size24));
EXPECT_FALSE(extension->HasCachedImage(resource, original_size));
// Cache the 24x24 copy.
extension->SetCachedImage(resource, image24, original_size);
EXPECT_TRUE(extension->HasCachedImage(resource, size24));
EXPECT_TRUE(SizeEquals(extension->GetCachedImage(resource, size24), size24));
EXPECT_FALSE(extension->HasCachedImage(resource, original_size));
// Cache the original, and verify that it gets returned when we ask for a
// max_size that is larger than the original.
gfx::Size size128(128, 128);
EXPECT_TRUE(image.width() < size128.width() &&
image.height() < size128.height());
extension->SetCachedImage(resource, image, original_size);
EXPECT_TRUE(extension->HasCachedImage(resource, original_size));
EXPECT_TRUE(extension->HasCachedImage(resource, size128));
EXPECT_TRUE(SizeEquals(extension->GetCachedImage(resource, original_size),
original_size));
EXPECT_TRUE(SizeEquals(extension->GetCachedImage(resource, size128),
original_size));
EXPECT_EQ(extension->GetCachedImage(resource, original_size).getPixels(),
extension->GetCachedImage(resource, size128).getPixels());
}
// Tests that the old permission name "unlimited_storage" still works for
// backwards compatibility (we renamed it to "unlimitedStorage").
TEST(ExtensionTest, OldUnlimitedStoragePermission) {
ScopedTempDir directory;
ASSERT_TRUE(directory.CreateUniqueTempDir());
FilePath extension_path = directory.path();
DictionaryValue dictionary;
// The two required keys.
dictionary.SetString(extension_manifest_keys::kName, "test");
dictionary.SetString(extension_manifest_keys::kVersion, "0.1");
// Create a permissions list containing "unlimited_storage" and add it.
ListValue* permissions = new ListValue();
const char* old_unlimited = "unlimited_storage";
EXPECT_STREQ(old_unlimited, Extension::kOldUnlimitedStoragePermission);
permissions->Append(Value::CreateStringValue(old_unlimited));
dictionary.Set(extension_manifest_keys::kPermissions, permissions);
// Initialize the extension and make sure the permission for unlimited storage
// is present.
std::string errors;
scoped_refptr<Extension> extension(Extension::Create(
extension_path, Extension::INVALID, dictionary,
Extension::STRICT_ERROR_CHECKS, &errors));
EXPECT_TRUE(extension.get());
EXPECT_TRUE(extension->HasApiPermission(
Extension::kUnlimitedStoragePermission));
}
// This tests the API permissions with an empty manifest (one that just
// specifies a name and a version and nothing else).
TEST(ExtensionTest, ApiPermissions) {
const struct {
const char* permission_name;
bool expect_success;
} kTests[] = {
// Negative test.
{ "non_existing_permission", false },
// Test default module/package permission.
{ "browserAction", true },
{ "browserActions", true },
{ "devtools", true },
{ "extension", true },
{ "i18n", true },
{ "pageAction", true },
{ "pageActions", true },
{ "test", true },
// Some negative tests.
{ "bookmarks", false },
{ "cookies", false },
{ "history", false },
{ "tabs.onUpdated", false },
// Make sure we find the module name after stripping '.' and '/'.
{ "browserAction/abcd/onClick", true },
{ "browserAction.abcd.onClick", true },
// Test Tabs functions.
{ "tabs.create", true},
{ "tabs.update", true},
{ "tabs.getSelected", false},
};
scoped_refptr<Extension> extension;
extension = LoadManifest("empty_manifest", "empty.json");
for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTests); ++i) {
EXPECT_EQ(kTests[i].expect_success,
extension->HasApiPermission(kTests[i].permission_name))
<< "Permission being tested: " << kTests[i].permission_name;
}
}
TEST(ExtensionTest, GetHostPermissionMessages_ManyHosts) {
scoped_refptr<Extension> extension;
extension = LoadManifest("permissions", "many-hosts.json");
std::vector<string16> warnings = extension->GetPermissionMessageStrings();
ASSERT_EQ(1u, warnings.size());
EXPECT_EQ("Your data on www.google.com and encrypted.google.com",
UTF16ToUTF8(warnings[0]));
}
TEST(ExtensionTest, GetPermissionMessages_Plugins) {
scoped_refptr<Extension> extension;
extension = LoadManifest("permissions", "plugins.json");
std::vector<string16> warnings = extension->GetPermissionMessageStrings();
// We don't parse the plugins key on Chrome OS, so it should not ask for any
// permissions.
#if defined(OS_CHROMEOS)
ASSERT_EQ(0u, warnings.size());
#else
ASSERT_EQ(1u, warnings.size());
EXPECT_EQ("All data on your computer and the websites you visit",
UTF16ToUTF8(warnings[0]));
#endif
}
TEST(ExtensionTest, WantsFileAccess) {
scoped_refptr<Extension> extension;
GURL file_url("file:///etc/passwd");
// <all_urls> permission
extension = LoadManifest("permissions", "permissions_all_urls.json");
EXPECT_TRUE(extension->wants_file_access());
EXPECT_FALSE(extension->CanExecuteScriptOnPage(file_url, NULL, NULL));
extension = LoadManifest(
"permissions", "permissions_all_urls.json", Extension::ALLOW_FILE_ACCESS);
EXPECT_TRUE(extension->wants_file_access());
EXPECT_TRUE(extension->CanExecuteScriptOnPage(file_url, NULL, NULL));
// file:///* permission
extension = LoadManifest("permissions", "permissions_file_scheme.json");
EXPECT_TRUE(extension->wants_file_access());
EXPECT_FALSE(extension->CanExecuteScriptOnPage(file_url, NULL, NULL));
extension = LoadManifest("permissions", "permissions_file_scheme.json",
Extension::ALLOW_FILE_ACCESS);
EXPECT_TRUE(extension->wants_file_access());
EXPECT_TRUE(extension->CanExecuteScriptOnPage(file_url, NULL, NULL));
// http://* permission
extension = LoadManifest("permissions", "permissions_http_scheme.json");
EXPECT_FALSE(extension->wants_file_access());
EXPECT_FALSE(extension->CanExecuteScriptOnPage(file_url, NULL, NULL));
extension = LoadManifest("permissions", "permissions_http_scheme.json",
Extension::ALLOW_FILE_ACCESS);
EXPECT_FALSE(extension->wants_file_access());
EXPECT_FALSE(extension->CanExecuteScriptOnPage(file_url, NULL, NULL));
// <all_urls> content script match
extension = LoadManifest("permissions", "content_script_all_urls.json");
EXPECT_TRUE(extension->wants_file_access());
EXPECT_FALSE(extension->CanExecuteScriptOnPage(
file_url, &extension->content_scripts()[0], NULL));
extension = LoadManifest("permissions", "content_script_all_urls.json",
Extension::ALLOW_FILE_ACCESS);
EXPECT_TRUE(extension->wants_file_access());
EXPECT_TRUE(extension->CanExecuteScriptOnPage(
file_url, &extension->content_scripts()[0], NULL));
// file:///* content script match
extension = LoadManifest("permissions", "content_script_file_scheme.json");
EXPECT_TRUE(extension->wants_file_access());
EXPECT_FALSE(extension->CanExecuteScriptOnPage(
file_url, &extension->content_scripts()[0], NULL));
extension = LoadManifest("permissions", "content_script_file_scheme.json",
Extension::ALLOW_FILE_ACCESS);
EXPECT_TRUE(extension->wants_file_access());
EXPECT_TRUE(extension->CanExecuteScriptOnPage(
file_url, &extension->content_scripts()[0], NULL));
// http://* content script match
extension = LoadManifest("permissions", "content_script_http_scheme.json");
EXPECT_FALSE(extension->wants_file_access());
EXPECT_FALSE(extension->CanExecuteScriptOnPage(
file_url, &extension->content_scripts()[0], NULL));
extension = LoadManifest("permissions", "content_script_http_scheme.json",
Extension::ALLOW_FILE_ACCESS);
EXPECT_FALSE(extension->wants_file_access());
EXPECT_FALSE(extension->CanExecuteScriptOnPage(
file_url, &extension->content_scripts()[0], NULL));
}
// Base class for testing the CanExecuteScriptOnPage and CanCaptureVisiblePage
// methods of Extension for extensions with various permissions.
class ExtensionScriptAndCaptureVisibleTest : public testing::Test {
public:
ExtensionScriptAndCaptureVisibleTest() {
PathService::Get(chrome::DIR_TEST_DATA, &dirpath_);
}
scoped_refptr<Extension> MakeExtension(const std::string& permissions,
Extension::Location location) {
// Replace single-quotes with double-quotes in permissions, since JSON
// mandates double-quotes.
std::string munged_permissions = permissions;
ReplaceSubstringsAfterOffset(&munged_permissions, 0, "'", "\"");
DictionaryValue dictionary;
dictionary.SetString(keys::kName, "permission test");
dictionary.SetString(keys::kVersion, "1");
std::string error;
JSONStringValueSerializer serializer(munged_permissions);
scoped_ptr<Value> permission_value(serializer.Deserialize(NULL, &error));
EXPECT_EQ("", error);
if (!permission_value.get())
return NULL;
EXPECT_TRUE(permission_value->IsType(Value::TYPE_LIST));
dictionary.Set(keys::kPermissions, permission_value.release());
FilePath dirpath;
PathService::Get(chrome::DIR_TEST_DATA, &dirpath);
dirpath = dirpath.AppendASCII("extensions").AppendASCII("permissions");
scoped_refptr<Extension> extension = Extension::Create(
dirpath,
location,
dictionary,
Extension::STRICT_ERROR_CHECKS,
&error);
if (!extension)
VLOG(1) << error;
return extension;
}
bool Allowed(const Extension* extension, const GURL& url) {
return (extension->CanExecuteScriptOnPage(url, NULL, NULL) &&
extension->CanCaptureVisiblePage(url, NULL));
}
bool CaptureOnly(const Extension* extension, const GURL& url) {
return !extension->CanExecuteScriptOnPage(url, NULL, NULL) &&
extension->CanCaptureVisiblePage(url, NULL);
}
bool Blocked(const Extension* extension, const GURL& url) {
return !(extension->CanExecuteScriptOnPage(url, NULL, NULL) ||
extension->CanCaptureVisiblePage(url, NULL));
}
protected:
FilePath dirpath_;
};
TEST_F(ExtensionScriptAndCaptureVisibleTest, Permissions) {
scoped_refptr<Extension> extension;
// URLs that are "safe" to provide scripting and capture visible tab access
// to if the permissions allow it.
GURL http_url("http://www.google.com");
GURL https_url("https://www.google.com");
GURL file_url("file:///foo/bar");
// We should allow host permission but not scripting permission for favicon
// urls.
GURL favicon_url("chrome://favicon/http://www.google.com");
std::string dummy_id =
Extension::GenerateIdForPath(FilePath(FILE_PATH_LITERAL("whatever")));
// URLs that regular extensions should never get access to.
GURL extension_url("chrome-extension://" + dummy_id);
GURL settings_url("chrome://settings");
GURL about_url("about:flags");
// Test <all_urls> for regular extensions.
extension = MakeExtension("['tabs','<all_urls>']", Extension::INTERNAL);
EXPECT_TRUE(Allowed(extension, http_url));
EXPECT_TRUE(Allowed(extension, https_url));
EXPECT_TRUE(Blocked(extension, file_url));
EXPECT_TRUE(Blocked(extension, settings_url));
EXPECT_TRUE(CaptureOnly(extension, favicon_url));
EXPECT_TRUE(Blocked(extension, about_url));
EXPECT_TRUE(Blocked(extension, extension_url));
EXPECT_FALSE(extension->HasHostPermission(settings_url));
EXPECT_FALSE(extension->HasHostPermission(about_url));
EXPECT_TRUE(extension->HasHostPermission(favicon_url));
// Test * for scheme, which implies just the http/https schemes.
extension = MakeExtension("['tabs','*://*/']", Extension::INTERNAL);
EXPECT_TRUE(Allowed(extension, http_url));
EXPECT_TRUE(Allowed(extension, https_url));
EXPECT_TRUE(Blocked(extension, settings_url));
EXPECT_TRUE(Blocked(extension, about_url));
EXPECT_TRUE(Blocked(extension, file_url));
EXPECT_TRUE(Blocked(extension, favicon_url));
extension = MakeExtension("['tabs','*://settings/*']", Extension::INTERNAL);
EXPECT_TRUE(Blocked(extension, settings_url));
// Having chrome://*/ should not work for regular extensions. Note that
// for favicon access, we require the explicit pattern chrome://favicon/*.
extension = MakeExtension("['tabs','chrome://*/']",
Extension::INTERNAL);
EXPECT_TRUE(extension == NULL);
// Having chrome://favicon/* should not give you chrome://*
extension = MakeExtension("['tabs','chrome://favicon/*']",
Extension::INTERNAL);
EXPECT_TRUE(Blocked(extension, settings_url));
EXPECT_TRUE(CaptureOnly(extension, favicon_url));
EXPECT_TRUE(Blocked(extension, about_url));
EXPECT_TRUE(extension->HasHostPermission(favicon_url));
// Having http://favicon should not give you chrome://favicon
extension = MakeExtension("['tabs', 'http://favicon/']", Extension::INTERNAL);
EXPECT_TRUE(Blocked(extension, settings_url));
EXPECT_TRUE(Blocked(extension, favicon_url));
// Component extensions with <all_urls> should get everything.
extension = MakeExtension("['tabs','<all_urls>']", Extension::COMPONENT);
EXPECT_TRUE(Allowed(extension, http_url));
EXPECT_TRUE(Allowed(extension, https_url));
EXPECT_TRUE(Allowed(extension, settings_url));
EXPECT_TRUE(Allowed(extension, about_url));
EXPECT_TRUE(Allowed(extension, favicon_url));
EXPECT_TRUE(extension->HasHostPermission(favicon_url));
// Component extensions should only get access to what they ask for.
extension = MakeExtension("['tabs', 'http://www.google.com/']",
Extension::COMPONENT);
EXPECT_TRUE(Allowed(extension, http_url));
EXPECT_TRUE(Blocked(extension, https_url));
EXPECT_TRUE(Blocked(extension, file_url));
EXPECT_TRUE(Blocked(extension, settings_url));
EXPECT_TRUE(Blocked(extension, favicon_url));
EXPECT_TRUE(Blocked(extension, about_url));
EXPECT_TRUE(Blocked(extension, extension_url));
EXPECT_FALSE(extension->HasHostPermission(settings_url));
}
TEST(ExtensionTest, GetDistinctHostsForDisplay) {
std::vector<std::string> expected;
expected.push_back("www.foo.com");
expected.push_back("www.bar.com");
expected.push_back("www.baz.com");
URLPatternList actual;
{
SCOPED_TRACE("no dupes");
// Simple list with no dupes.
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.com/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.bar.com/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.baz.com/path"));
CompareLists(expected,
Extension::GetDistinctHostsForDisplay(actual));
}
{
SCOPED_TRACE("two dupes");
// Add some dupes.
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.com/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.baz.com/path"));
CompareLists(expected,
Extension::GetDistinctHostsForDisplay(actual));
}
{
SCOPED_TRACE("schemes differ");
// Add a pattern that differs only by scheme. This should be filtered out.
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTPS, "https://www.bar.com/path"));
CompareLists(expected,
Extension::GetDistinctHostsForDisplay(actual));
}
{
SCOPED_TRACE("paths differ");
// Add some dupes by path.
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.bar.com/pathypath"));
CompareLists(expected,
Extension::GetDistinctHostsForDisplay(actual));
}
{
SCOPED_TRACE("subdomains differ");
// We don't do anything special for subdomains.
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://monkey.www.bar.com/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://bar.com/path"));
expected.push_back("monkey.www.bar.com");
expected.push_back("bar.com");
CompareLists(expected,
Extension::GetDistinctHostsForDisplay(actual));
}
{
SCOPED_TRACE("RCDs differ");
// Now test for RCD uniquing.
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.com/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.co.uk/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.de/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.ca.us/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.net/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.com.my/path"));
// This is an unknown RCD, which shouldn't be uniqued out.
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.xyzzy/path"));
// But it should only occur once.
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.xyzzy/path"));
expected.push_back("www.foo.xyzzy");
CompareLists(expected,
Extension::GetDistinctHostsForDisplay(actual));
}
{
SCOPED_TRACE("wildcards");
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://*.google.com/*"));
expected.push_back("*.google.com");
CompareLists(expected,
Extension::GetDistinctHostsForDisplay(actual));
}
}
TEST(ExtensionTest, GetDistinctHostsForDisplay_ComIsBestRcd) {
URLPatternList actual;
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.ca/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.org/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.co.uk/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.net/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.jp/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.com/path"));
std::vector<std::string> expected;
expected.push_back("www.foo.com");
CompareLists(expected,
Extension::GetDistinctHostsForDisplay(actual));
}
TEST(ExtensionTest, GetDistinctHostsForDisplay_NetIs2ndBestRcd) {
URLPatternList actual;
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.ca/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.org/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.co.uk/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.net/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.jp/path"));
// No http://www.foo.com/path
std::vector<std::string> expected;
expected.push_back("www.foo.net");
CompareLists(expected,
Extension::GetDistinctHostsForDisplay(actual));
}
TEST(ExtensionTest, GetDistinctHostsForDisplay_OrgIs3rdBestRcd) {
URLPatternList actual;
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.ca/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.org/path"));
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.co.uk/path"));
// No http://www.foo.net/path
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.jp/path"));
// No http://www.foo.com/path
std::vector<std::string> expected;
expected.push_back("www.foo.org");
CompareLists(expected,
Extension::GetDistinctHostsForDisplay(actual));
}
TEST(ExtensionTest, GetDistinctHostsForDisplay_FirstInListIs4thBestRcd) {
URLPatternList actual;
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.ca/path"));
// No http://www.foo.org/path
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.co.uk/path"));
// No http://www.foo.net/path
actual.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.foo.jp/path"));
// No http://www.foo.com/path
std::vector<std::string> expected;
expected.push_back("www.foo.ca");
CompareLists(expected,
Extension::GetDistinctHostsForDisplay(actual));
}
TEST(ExtensionTest, IsElevatedHostList) {
URLPatternList list1;
URLPatternList list2;
list1.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.google.com.hk/path"));
list1.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.google.com/path"));
// Test that the host order does not matter.
list2.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.google.com/path"));
list2.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.google.com.hk/path"));
EXPECT_FALSE(Extension::IsElevatedHostList(list1, list2));
EXPECT_FALSE(Extension::IsElevatedHostList(list2, list1));
// Test that paths are ignored.
list2.clear();
list2.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.google.com/*"));
EXPECT_FALSE(Extension::IsElevatedHostList(list1, list2));
EXPECT_FALSE(Extension::IsElevatedHostList(list2, list1));
// Test that RCDs are ignored.
list2.clear();
list2.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.google.com.hk/*"));
EXPECT_FALSE(Extension::IsElevatedHostList(list1, list2));
EXPECT_FALSE(Extension::IsElevatedHostList(list2, list1));
// Test that subdomain wildcards are handled properly.
list2.clear();
list2.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://*.google.com.hk/*"));
EXPECT_TRUE(Extension::IsElevatedHostList(list1, list2));
//TODO(jstritar): Does not match subdomains properly. http://crbug.com/65337
//EXPECT_FALSE(Extension::IsElevatedHostList(list2, list1));
// Test that different domains count as different hosts.
list2.clear();
list2.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.google.com/path"));
list2.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://www.example.org/path"));
EXPECT_TRUE(Extension::IsElevatedHostList(list1, list2));
EXPECT_FALSE(Extension::IsElevatedHostList(list2, list1));
// Test that different subdomains count as different hosts.
list2.clear();
list2.push_back(
URLPattern(URLPattern::SCHEME_HTTP, "http://mail.google.com/*"));
EXPECT_TRUE(Extension::IsElevatedHostList(list1, list2));
EXPECT_TRUE(Extension::IsElevatedHostList(list2, list1));
}
TEST(ExtensionTest, GenerateId) {
std::string result;
EXPECT_TRUE(Extension::GenerateId("", &result));
EXPECT_TRUE(Extension::GenerateId("test", &result));
EXPECT_EQ(result, "jpignaibiiemhngfjkcpokkamffknabf");
EXPECT_TRUE(Extension::GenerateId("_", &result));
EXPECT_EQ(result, "ncocknphbhhlhkikpnnlmbcnbgdempcd");
EXPECT_TRUE(Extension::GenerateId(
"this_string_is_longer_than_a_single_sha256_hash_digest", &result));
EXPECT_EQ(result, "jimneklojkjdibfkgiiophfhjhbdgcfi");
}