blob: 72d9e13781a1f924b80c28b0b4b4a175c5b8fbea [file] [log] [blame]
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/notifications/desktop_notification_service.h"
#include "base/bind.h"
#include "base/memory/scoped_ptr.h"
#include "base/message_loop.h"
#include "base/synchronization/waitable_event.h"
#include "chrome/browser/notifications/desktop_notification_service_factory.h"
#include "chrome/test/base/chrome_render_view_host_test_harness.h"
#include "chrome/test/base/testing_profile.h"
#include "content/test/test_browser_thread.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "third_party/WebKit/Source/WebKit/chromium/public/WebNotificationPresenter.h"
using content::BrowserThread;
namespace {
// The HasPermission method of the DesktopNotificationService wants to be called
// on the IO thread. This class routes calls to the cache on the IO thread.
class ThreadProxy : public base::RefCountedThreadSafe<ThreadProxy> {
public:
ThreadProxy()
: io_event_(false, false),
ui_event_(false, false),
permission_(WebKit::WebNotificationPresenter::PermissionAllowed) {
// The current message loop was already initalized by the test superclass.
ui_thread_.reset(
new content::TestBrowserThread(BrowserThread::UI,
MessageLoop::current()));
// Create IO thread, start its message loop.
io_thread_.reset(new content::TestBrowserThread(BrowserThread::IO));
io_thread_->Start();
// Calling PauseIOThread() here isn't safe, because the runnable method
// could complete before the constructor is done, deleting |this|.
}
// Call the HasPermission method of the DesktopNotificationService on the IO
// thread and returns the permission setting.
WebKit::WebNotificationPresenter::Permission ServiceHasPermission(
DesktopNotificationService* service,
const GURL& url) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
base::Bind(&ThreadProxy::ServiceHasPermissionIO, this, service, url));
io_event_.Signal();
ui_event_.Wait(); // Wait for IO thread to be done.
BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
base::Bind(&ThreadProxy::PauseIOThreadIO, this));
return permission_;
}
void PauseIOThread() {
BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
base::Bind(&ThreadProxy::PauseIOThreadIO, this));
}
void DrainIOThread() {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
io_event_.Signal();
io_thread_->Stop();
}
private:
friend class base::RefCountedThreadSafe<ThreadProxy>;
~ThreadProxy() {
DrainIOThread();
}
void PauseIOThreadIO() {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
io_event_.Wait();
}
void ServiceHasPermissionIO(DesktopNotificationService* service,
const GURL& url) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
permission_ = service->HasPermission(url);
ui_event_.Signal();
}
base::WaitableEvent io_event_;
base::WaitableEvent ui_event_;
scoped_ptr<content::TestBrowserThread> ui_thread_;
scoped_ptr<content::TestBrowserThread> io_thread_;
WebKit::WebNotificationPresenter::Permission permission_;
};
} // namespace
class DesktopNotificationServiceTest : public ChromeRenderViewHostTestHarness {
public:
DesktopNotificationServiceTest() {
}
virtual void SetUp() {
ChromeRenderViewHostTestHarness::SetUp();
proxy_ = new ThreadProxy;
proxy_->PauseIOThread();
// Creates the destop notification service.
service_ = DesktopNotificationServiceFactory::GetForProfile(profile());
}
virtual void TearDown() {
// The io thread's waiting on the io_event_ might hold a ref to |proxy_|,
// preventing its destruction. Clear that ref.
proxy_->DrainIOThread();
ChromeRenderViewHostTestHarness::TearDown();
}
DesktopNotificationService* service_;
scoped_refptr<ThreadProxy> proxy_;
};
TEST_F(DesktopNotificationServiceTest, SettingsForSchemes) {
GURL url("file:///html/test.html");
EXPECT_EQ(CONTENT_SETTING_ASK,
service_->GetDefaultContentSetting(NULL));
EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed,
proxy_->ServiceHasPermission(service_, url));
service_->GrantPermission(url);
EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed,
proxy_->ServiceHasPermission(service_, url));
service_->DenyPermission(url);
EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionDenied,
proxy_->ServiceHasPermission(service_, url));
GURL https_url("https://testurl");
GURL http_url("http://testurl");
EXPECT_EQ(CONTENT_SETTING_ASK,
service_->GetDefaultContentSetting(NULL));
EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed,
proxy_->ServiceHasPermission(service_, http_url));
EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed,
proxy_->ServiceHasPermission(service_, https_url));
service_->GrantPermission(https_url);
EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed,
proxy_->ServiceHasPermission(service_, http_url));
EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed,
proxy_->ServiceHasPermission(service_, https_url));
service_->DenyPermission(http_url);
EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionDenied,
proxy_->ServiceHasPermission(service_, http_url));
EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed,
proxy_->ServiceHasPermission(service_, https_url));
}
TEST_F(DesktopNotificationServiceTest, GetNotificationsSettings) {
service_->GrantPermission(GURL("http://allowed2.com"));
service_->GrantPermission(GURL("http://allowed.com"));
service_->DenyPermission(GURL("http://denied2.com"));
service_->DenyPermission(GURL("http://denied.com"));
ContentSettingsForOneType settings;
service_->GetNotificationsSettings(&settings);
// |settings| contains the default setting and 4 exceptions.
ASSERT_EQ(5u, settings.size());
EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard(
GURL("http://allowed.com")),
settings[0].primary_pattern);
EXPECT_EQ(CONTENT_SETTING_ALLOW,
settings[0].setting);
EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard(
GURL("http://allowed2.com")),
settings[1].primary_pattern);
EXPECT_EQ(CONTENT_SETTING_ALLOW,
settings[1].setting);
EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard(
GURL("http://denied.com")),
settings[2].primary_pattern);
EXPECT_EQ(CONTENT_SETTING_BLOCK,
settings[2].setting);
EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard(
GURL("http://denied2.com")),
settings[3].primary_pattern);
EXPECT_EQ(CONTENT_SETTING_BLOCK,
settings[3].setting);
EXPECT_EQ(ContentSettingsPattern::Wildcard(),
settings[4].primary_pattern);
EXPECT_EQ(CONTENT_SETTING_ASK,
settings[4].setting);
}