blob: 2f4470f9d0d999430e896083a2d1c1e58fc94a13 [file] [log] [blame]
[email protected]c333e792012-01-06 16:57:391// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
[email protected]57999812013-02-24 05:40:525#include "base/files/file_path.h"
[email protected]ffbec692012-02-26 20:26:426#include "base/json/json_file_value_serializer.h"
[email protected]c333e792012-01-06 16:57:397#include "base/memory/ref_counted.h"
[email protected]78089f02012-07-19 06:11:288#include "base/run_loop.h"
[email protected]23a85362014-07-07 23:26:199#include "base/strings/stringprintf.h"
[email protected]c333e792012-01-06 16:57:3910#include "base/values.h"
[email protected]49a01e642013-07-12 00:29:4511#include "chrome/browser/chrome_notification_types.h"
[email protected]c333e792012-01-06 16:57:3912#include "chrome/browser/extensions/extension_service.h"
[email protected]f484f8d52014-06-12 08:38:1813#include "chrome/browser/extensions/extension_service_test_base.h"
rdevlin.croninb8dffe52015-02-07 00:58:0114#include "chrome/browser/extensions/extension_util.h"
[email protected]c333e792012-01-06 16:57:3915#include "chrome/browser/extensions/permissions_updater.h"
[email protected]c333e792012-01-06 16:57:3916#include "chrome/common/chrome_paths.h"
[email protected]04e4bbe2013-04-27 07:44:2417#include "chrome/common/extensions/extension_test_util.h"
[email protected]c333e792012-01-06 16:57:3918#include "chrome/test/base/testing_profile.h"
rdevlin.croninb8dffe52015-02-07 00:58:0119#include "components/crx_file/id_util.h"
[email protected]c333e792012-01-06 16:57:3920#include "content/public/browser/notification_observer.h"
21#include "content/public/browser/notification_registrar.h"
22#include "content/public/browser/notification_service.h"
[email protected]dccba4f82014-05-29 00:52:5623#include "extensions/browser/extension_prefs.h"
[email protected]e4452d32013-11-15 23:07:4124#include "extensions/common/extension.h"
[email protected]23a85362014-07-07 23:26:1925#include "extensions/common/extension_builder.h"
26#include "extensions/common/feature_switch.h"
[email protected]5a55f3f2013-10-29 01:08:2927#include "extensions/common/permissions/permission_set.h"
[email protected]076ebeda2014-06-06 21:47:2628#include "extensions/common/permissions/permissions_data.h"
[email protected]23a85362014-07-07 23:26:1929#include "extensions/common/value_builder.h"
[email protected]c333e792012-01-06 16:57:3930#include "testing/gtest/include/gtest/gtest.h"
31
[email protected]04e4bbe2013-04-27 07:44:2432using extension_test_util::LoadManifest;
33
[email protected]c333e792012-01-06 16:57:3934namespace extensions {
35
36namespace {
37
rdevlin.cronin77cb0ef2015-09-16 17:03:4838scoped_refptr<const Extension> CreateExtensionWithOptionalPermissions(
39 scoped_ptr<base::Value> optional_permissions,
40 scoped_ptr<base::Value> permissions,
41 const std::string& name) {
42 return ExtensionBuilder()
43 .SetLocation(Manifest::INTERNAL)
44 .SetManifest(
45 DictionaryBuilder()
46 .Set("name", name)
47 .Set("description", "foo")
48 .Set("manifest_version", 2)
49 .Set("version", "0.1.2.3")
50 .Set("permissions", permissions.Pass())
51 .Set("optional_permissions", optional_permissions.Pass()))
52 .SetID(crx_file::id_util::GenerateId(name))
53 .Build();
54}
55
[email protected]23a85362014-07-07 23:26:1956scoped_refptr<const Extension> CreateExtensionWithPermissions(
57 const std::set<URLPattern>& scriptable_hosts,
58 const std::set<URLPattern>& explicit_hosts,
rdevlin.croninb8dffe52015-02-07 00:58:0159 Manifest::Location location,
60 const std::string& name) {
[email protected]23a85362014-07-07 23:26:1961 ListBuilder scriptable_host_list;
62 for (std::set<URLPattern>::const_iterator pattern = scriptable_hosts.begin();
63 pattern != scriptable_hosts.end();
64 ++pattern) {
65 scriptable_host_list.Append(pattern->GetAsString());
66 }
67
68 ListBuilder explicit_host_list;
69 for (std::set<URLPattern>::const_iterator pattern = explicit_hosts.begin();
70 pattern != explicit_hosts.end();
71 ++pattern) {
72 explicit_host_list.Append(pattern->GetAsString());
73 }
74
75 DictionaryBuilder script;
76 script.Set("matches", scriptable_host_list.Pass())
77 .Set("js", ListBuilder().Append("foo.js"));
78
79 return ExtensionBuilder()
80 .SetLocation(location)
81 .SetManifest(
82 DictionaryBuilder()
rdevlin.croninb8dffe52015-02-07 00:58:0183 .Set("name", name)
[email protected]23a85362014-07-07 23:26:1984 .Set("description", "foo")
85 .Set("manifest_version", 2)
86 .Set("version", "0.1.2.3")
87 .Set("content_scripts", ListBuilder().Append(script.Pass()))
88 .Set("permissions", explicit_host_list.Pass()))
rdevlin.croninb8dffe52015-02-07 00:58:0189 .SetID(crx_file::id_util::GenerateId(name))
[email protected]23a85362014-07-07 23:26:1990 .Build();
91}
92
93testing::AssertionResult SetsAreEqual(const std::set<URLPattern>& set1,
94 const std::set<URLPattern>& set2) {
95 // Take the (set1 - set2) U (set2 - set1). This is then the set of all
96 // elements which are in either set1 or set2, but not both.
97 // If the sets are equal, this is none.
98 std::set<URLPattern> difference = base::STLSetUnion<std::set<URLPattern> >(
99 base::STLSetDifference<std::set<URLPattern> >(set1, set2),
100 base::STLSetDifference<std::set<URLPattern> >(set2, set1));
101
102 std::string error;
103 for (std::set<URLPattern>::const_iterator iter = difference.begin();
104 iter != difference.end();
105 ++iter) {
106 if (iter->GetAsString() == "chrome://favicon/*")
107 continue; // Grr... This is auto-added for extensions with <all_urls>
108 error = base::StringPrintf("%s\n%s contains %s and the other does not.",
109 error.c_str(),
110 (set1.count(*iter) ? "Set1" : "Set2"),
111 iter->GetAsString().c_str());
112 }
113
114 if (!error.empty())
115 return testing::AssertionFailure() << error;
116 return testing::AssertionSuccess();
117}
118
[email protected]c333e792012-01-06 16:57:39119// A helper class that listens for NOTIFICATION_EXTENSION_PERMISSIONS_UPDATED.
120class PermissionsUpdaterListener : public content::NotificationObserver {
121 public:
122 PermissionsUpdaterListener()
123 : received_notification_(false), waiting_(false) {
124 registrar_.Add(this,
[email protected]adf5a102014-07-31 12:44:06125 extensions::NOTIFICATION_EXTENSION_PERMISSIONS_UPDATED,
[email protected]c333e792012-01-06 16:57:39126 content::NotificationService::AllSources());
127 }
128
129 void Reset() {
130 received_notification_ = false;
131 waiting_ = false;
132 extension_ = NULL;
133 permissions_ = NULL;
134 }
135
136 void Wait() {
137 if (received_notification_)
138 return;
139
140 waiting_ = true;
[email protected]78089f02012-07-19 06:11:28141 base::RunLoop run_loop;
142 run_loop.Run();
[email protected]c333e792012-01-06 16:57:39143 }
144
145 bool received_notification() const { return received_notification_; }
[email protected]dc24976f2013-06-02 21:15:09146 const Extension* extension() const { return extension_.get(); }
147 const PermissionSet* permissions() const { return permissions_.get(); }
148 UpdatedExtensionPermissionsInfo::Reason reason() const { return reason_; }
[email protected]c333e792012-01-06 16:57:39149
150 private:
dchengae36a4a2014-10-21 12:36:36151 void Observe(int type,
152 const content::NotificationSource& source,
153 const content::NotificationDetails& details) override {
[email protected]c333e792012-01-06 16:57:39154 received_notification_ = true;
155 UpdatedExtensionPermissionsInfo* info =
156 content::Details<UpdatedExtensionPermissionsInfo>(details).ptr();
157
158 extension_ = info->extension;
rdevlin.cronine2d0fd02015-09-24 22:35:49159 permissions_ = info->permissions.Clone();
[email protected]c333e792012-01-06 16:57:39160 reason_ = info->reason;
161
162 if (waiting_) {
163 waiting_ = false;
ki.stfuc4f8e242015-10-09 20:40:20164 base::MessageLoopForUI::current()->QuitWhenIdle();
[email protected]c333e792012-01-06 16:57:39165 }
166 }
167
168 bool received_notification_;
169 bool waiting_;
170 content::NotificationRegistrar registrar_;
171 scoped_refptr<const Extension> extension_;
rdevlin.cronine2d0fd02015-09-24 22:35:49172 scoped_ptr<const PermissionSet> permissions_;
[email protected]c333e792012-01-06 16:57:39173 UpdatedExtensionPermissionsInfo::Reason reason_;
174};
175
176class PermissionsUpdaterTest : public ExtensionServiceTestBase {
177};
178
[email protected]04e4bbe2013-04-27 07:44:24179scoped_refptr<Extension> LoadOurManifest() {
[email protected]650b2d52013-02-10 03:41:45180 base::FilePath path;
[email protected]04e4bbe2013-04-27 07:44:24181 path = path.AppendASCII("api_test")
[email protected]c333e792012-01-06 16:57:39182 .AppendASCII("permissions")
[email protected]04e4bbe2013-04-27 07:44:24183 .AppendASCII("optional");
184 return LoadManifest(path.AsUTF8Unsafe(),
185 "manifest.json",
186 Manifest::INTERNAL,
187 Extension::NO_FLAGS);
[email protected]c333e792012-01-06 16:57:39188}
189
190void AddPattern(URLPatternSet* extent, const std::string& pattern) {
191 int schemes = URLPattern::SCHEME_ALL;
192 extent->AddPattern(URLPattern(schemes, pattern));
193}
194
195} // namespace
196
197// Test that the PermissionUpdater can correctly add and remove active
198// permissions. This tests all of PermissionsUpdater's public methods because
[email protected]23a85362014-07-07 23:26:19199// GrantActivePermissions and SetPermissions are used by AddPermissions.
[email protected]c333e792012-01-06 16:57:39200TEST_F(PermissionsUpdaterTest, AddAndRemovePermissions) {
201 InitializeEmptyExtensionService();
202
203 // Load the test extension.
[email protected]04e4bbe2013-04-27 07:44:24204 scoped_refptr<Extension> extension = LoadOurManifest();
205 ASSERT_TRUE(extension.get());
[email protected]c333e792012-01-06 16:57:39206
[email protected]c2e66e12012-06-27 06:27:06207 APIPermissionSet default_apis;
208 default_apis.insert(APIPermission::kManagement);
[email protected]e737c442013-11-15 15:55:24209 ManifestPermissionSet empty_manifest_permissions;
210
[email protected]c333e792012-01-06 16:57:39211 URLPatternSet default_hosts;
212 AddPattern(&default_hosts, "http://a.com/*");
rdevlin.cronine2d0fd02015-09-24 22:35:49213 PermissionSet default_permissions(default_apis, empty_manifest_permissions,
214 default_hosts, URLPatternSet());
[email protected]c333e792012-01-06 16:57:39215
216 // Make sure it loaded properly.
rdevlin.cronine2d0fd02015-09-24 22:35:49217 ASSERT_EQ(default_permissions,
rdevlin.cronind630c302015-09-30 20:19:33218 extension->permissions_data()->active_permissions());
rdevlin.cronine2d0fd02015-09-24 22:35:49219
220 ExtensionPrefs* prefs = ExtensionPrefs::Get(profile_.get());
221 scoped_ptr<const PermissionSet> active_permissions;
222 scoped_ptr<const PermissionSet> granted_permissions;
[email protected]c333e792012-01-06 16:57:39223
224 // Add a few permissions.
[email protected]c2e66e12012-06-27 06:27:06225 APIPermissionSet apis;
[email protected]81327f12014-07-29 04:24:11226 apis.insert(APIPermission::kNotifications);
[email protected]c333e792012-01-06 16:57:39227 URLPatternSet hosts;
228 AddPattern(&hosts, "http://*.c.com/*");
229
rdevlin.cronine2d0fd02015-09-24 22:35:49230 {
231 PermissionSet delta(apis, empty_manifest_permissions, hosts,
232 URLPatternSet());
[email protected]c333e792012-01-06 16:57:39233
234 PermissionsUpdaterListener listener;
rdevlin.cronind630c302015-09-30 20:19:33235 PermissionsUpdater(profile_.get()).AddPermissions(extension.get(), delta);
[email protected]c333e792012-01-06 16:57:39236
237 listener.Wait();
238
239 // Verify that the permission notification was sent correctly.
240 ASSERT_TRUE(listener.received_notification());
dchengc7047942014-08-26 05:05:31241 ASSERT_EQ(extension.get(), listener.extension());
[email protected]c333e792012-01-06 16:57:39242 ASSERT_EQ(UpdatedExtensionPermissionsInfo::ADDED, listener.reason());
rdevlin.cronine2d0fd02015-09-24 22:35:49243 ASSERT_EQ(delta, *listener.permissions());
[email protected]c333e792012-01-06 16:57:39244
245 // Make sure the extension's active permissions reflect the change.
rdevlin.cronine2d0fd02015-09-24 22:35:49246 active_permissions = PermissionSet::CreateUnion(default_permissions, delta);
[email protected]cadac622013-06-11 16:46:36247 ASSERT_EQ(*active_permissions.get(),
rdevlin.cronind630c302015-09-30 20:19:33248 extension->permissions_data()->active_permissions());
[email protected]c333e792012-01-06 16:57:39249
250 // Verify that the new granted and active permissions were also stored
251 // in the extension preferences. In this case, the granted permissions should
252 // be equal to the active permissions.
rdevlin.cronine2d0fd02015-09-24 22:35:49253 ASSERT_EQ(*active_permissions.get(),
254 *prefs->GetActivePermissions(extension->id()));
255 granted_permissions = active_permissions->Clone();
256 ASSERT_EQ(*granted_permissions,
257 *prefs->GetGrantedPermissions(extension->id()));
258 }
[email protected]c333e792012-01-06 16:57:39259
rdevlin.cronine2d0fd02015-09-24 22:35:49260 {
[email protected]c333e792012-01-06 16:57:39261 // In the second part of the test, we'll remove the permissions that we
[email protected]81327f12014-07-29 04:24:11262 // just added except for 'notifications'.
263 apis.erase(APIPermission::kNotifications);
rdevlin.cronine2d0fd02015-09-24 22:35:49264 PermissionSet delta(apis, empty_manifest_permissions, hosts, URLPatternSet());
[email protected]c333e792012-01-06 16:57:39265
rdevlin.cronine2d0fd02015-09-24 22:35:49266 PermissionsUpdaterListener listener;
267 PermissionsUpdater(profile_.get())
rdevlin.cronind630c302015-09-30 20:19:33268 .RemovePermissions(extension.get(), delta,
rdevlin.cronine2d0fd02015-09-24 22:35:49269 PermissionsUpdater::REMOVE_SOFT);
[email protected]c333e792012-01-06 16:57:39270 listener.Wait();
271
272 // Verify that the notification was correct.
273 ASSERT_TRUE(listener.received_notification());
dchengc7047942014-08-26 05:05:31274 ASSERT_EQ(extension.get(), listener.extension());
[email protected]c333e792012-01-06 16:57:39275 ASSERT_EQ(UpdatedExtensionPermissionsInfo::REMOVED, listener.reason());
rdevlin.cronine2d0fd02015-09-24 22:35:49276 ASSERT_EQ(delta, *listener.permissions());
[email protected]c333e792012-01-06 16:57:39277
278 // Make sure the extension's active permissions reflect the change.
279 active_permissions =
rdevlin.cronine2d0fd02015-09-24 22:35:49280 PermissionSet::CreateDifference(*active_permissions, delta);
rdevlin.cronind630c302015-09-30 20:19:33281 ASSERT_EQ(*active_permissions,
282 extension->permissions_data()->active_permissions());
[email protected]c333e792012-01-06 16:57:39283
284 // Verify that the extension prefs hold the new active permissions and the
285 // same granted permissions.
rdevlin.cronine2d0fd02015-09-24 22:35:49286 ASSERT_EQ(*active_permissions, *prefs->GetActivePermissions(extension->id()));
[email protected]c333e792012-01-06 16:57:39287
rdevlin.cronine2d0fd02015-09-24 22:35:49288 ASSERT_EQ(*granted_permissions,
289 *prefs->GetGrantedPermissions(extension->id()));
290 }
[email protected]c333e792012-01-06 16:57:39291}
292
[email protected]23a85362014-07-07 23:26:19293TEST_F(PermissionsUpdaterTest, WithholdAllHosts) {
294 InitializeEmptyExtensionService();
295
296 // Permissions are only withheld with the appropriate switch turned on.
297 scoped_ptr<FeatureSwitch::ScopedOverride> switch_override(
298 new FeatureSwitch::ScopedOverride(FeatureSwitch::scripts_require_action(),
299 FeatureSwitch::OVERRIDE_ENABLED));
300
301 URLPattern google(URLPattern::SCHEME_ALL, "http://www.google.com/*");
302 URLPattern sub_google(URLPattern::SCHEME_ALL, "http://*.google.com/*");
303 URLPattern all_http(URLPattern::SCHEME_ALL, "http://*/*");
304 URLPattern all_hosts(URLPattern::SCHEME_ALL, "<all_urls>");
305 URLPattern all_com(URLPattern::SCHEME_ALL, "http://*.com/*");
306
307 std::set<URLPattern> all_host_patterns;
308 std::set<URLPattern> safe_patterns;
309
310 all_host_patterns.insert(all_http);
311 all_host_patterns.insert(all_hosts);
312 all_host_patterns.insert(all_com);
313
314 safe_patterns.insert(google);
315 safe_patterns.insert(sub_google);
316
317 std::set<URLPattern> all_patterns = base::STLSetUnion<std::set<URLPattern> >(
318 all_host_patterns, safe_patterns);
319
320 scoped_refptr<const Extension> extension = CreateExtensionWithPermissions(
rdevlin.croninb8dffe52015-02-07 00:58:01321 all_patterns, all_patterns, Manifest::INTERNAL, "a");
[email protected]23a85362014-07-07 23:26:19322 const PermissionsData* permissions_data = extension->permissions_data();
323 PermissionsUpdater updater(profile_.get());
dchengc7047942014-08-26 05:05:31324 updater.InitializePermissions(extension.get());
[email protected]23a85362014-07-07 23:26:19325
326 // At first, the active permissions should have only the safe patterns and
327 // the withheld permissions should have only the all host patterns.
328 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33329 permissions_data->active_permissions().scriptable_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19330 safe_patterns));
331 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33332 permissions_data->active_permissions().explicit_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19333 safe_patterns));
334 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33335 permissions_data->withheld_permissions().scriptable_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19336 all_host_patterns));
337 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33338 permissions_data->withheld_permissions().explicit_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19339 all_host_patterns));
340
341 // Then, we grant the withheld all-hosts permissions.
dchengc7047942014-08-26 05:05:31342 updater.GrantWithheldImpliedAllHosts(extension.get());
[email protected]23a85362014-07-07 23:26:19343 // Now, active permissions should have all patterns, and withheld permissions
344 // should have none.
345 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33346 permissions_data->active_permissions().scriptable_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19347 all_patterns));
348 EXPECT_TRUE(permissions_data->withheld_permissions()
rdevlin.cronind630c302015-09-30 20:19:33349 .scriptable_hosts()
[email protected]23a85362014-07-07 23:26:19350 .patterns()
351 .empty());
352 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33353 permissions_data->active_permissions().explicit_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19354 all_patterns));
355 EXPECT_TRUE(permissions_data->withheld_permissions()
rdevlin.cronind630c302015-09-30 20:19:33356 .explicit_hosts()
[email protected]23a85362014-07-07 23:26:19357 .patterns()
358 .empty());
359
360 // Finally, we revoke the all hosts permissions.
dchengc7047942014-08-26 05:05:31361 updater.WithholdImpliedAllHosts(extension.get());
[email protected]23a85362014-07-07 23:26:19362
363 // We should be back to our initial state - all_hosts should be withheld, and
364 // the safe patterns should be granted.
365 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33366 permissions_data->active_permissions().scriptable_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19367 safe_patterns));
368 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33369 permissions_data->active_permissions().explicit_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19370 safe_patterns));
371 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33372 permissions_data->withheld_permissions().scriptable_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19373 all_host_patterns));
374 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33375 permissions_data->withheld_permissions().explicit_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19376 all_host_patterns));
377
378 // Creating a component extension should result in no withheld permissions.
379 extension = CreateExtensionWithPermissions(
rdevlin.croninb8dffe52015-02-07 00:58:01380 all_patterns, all_patterns, Manifest::COMPONENT, "b");
[email protected]23a85362014-07-07 23:26:19381 permissions_data = extension->permissions_data();
dchengc7047942014-08-26 05:05:31382 updater.InitializePermissions(extension.get());
[email protected]23a85362014-07-07 23:26:19383 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33384 permissions_data->active_permissions().scriptable_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19385 all_patterns));
386 EXPECT_TRUE(permissions_data->withheld_permissions()
rdevlin.cronind630c302015-09-30 20:19:33387 .scriptable_hosts()
[email protected]23a85362014-07-07 23:26:19388 .patterns()
389 .empty());
390 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33391 permissions_data->active_permissions().explicit_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19392 all_patterns));
393 EXPECT_TRUE(permissions_data->withheld_permissions()
rdevlin.cronind630c302015-09-30 20:19:33394 .explicit_hosts()
[email protected]23a85362014-07-07 23:26:19395 .patterns()
396 .empty());
397
398 // Without the switch, we shouldn't withhold anything.
399 switch_override.reset();
400 extension = CreateExtensionWithPermissions(
rdevlin.croninb8dffe52015-02-07 00:58:01401 all_patterns, all_patterns, Manifest::INTERNAL, "c");
[email protected]23a85362014-07-07 23:26:19402 permissions_data = extension->permissions_data();
dchengc7047942014-08-26 05:05:31403 updater.InitializePermissions(extension.get());
[email protected]23a85362014-07-07 23:26:19404 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33405 permissions_data->active_permissions().scriptable_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19406 all_patterns));
407 EXPECT_TRUE(permissions_data->withheld_permissions()
rdevlin.cronind630c302015-09-30 20:19:33408 .scriptable_hosts()
[email protected]23a85362014-07-07 23:26:19409 .patterns()
410 .empty());
411 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33412 permissions_data->active_permissions().explicit_hosts().patterns(),
[email protected]23a85362014-07-07 23:26:19413 all_patterns));
414 EXPECT_TRUE(permissions_data->withheld_permissions()
rdevlin.cronind630c302015-09-30 20:19:33415 .explicit_hosts()
[email protected]23a85362014-07-07 23:26:19416 .patterns()
417 .empty());
418}
419
rdevlin.croninb8dffe52015-02-07 00:58:01420// Tests that withholding all hosts behaves properly with extensions installed
421// when the switch is turned on and off.
422TEST_F(PermissionsUpdaterTest, WithholdAllHostsWithTransientSwitch) {
423 InitializeEmptyExtensionService();
424
425 URLPattern all_hosts(URLPattern::SCHEME_ALL, "<all_urls>");
426 std::set<URLPattern> all_host_patterns;
427 all_host_patterns.insert(all_hosts);
428
429 scoped_refptr<const Extension> extension_a = CreateExtensionWithPermissions(
430 all_host_patterns, all_host_patterns, Manifest::INTERNAL, "a");
431 PermissionsUpdater updater(profile());
432 updater.InitializePermissions(extension_a.get());
433 const PermissionsData* permissions_data = extension_a->permissions_data();
434
435 // Since the extension was created without the switch on, it should default
436 // to having all urls access.
437 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33438 permissions_data->active_permissions().scriptable_hosts().patterns(),
rdevlin.croninb8dffe52015-02-07 00:58:01439 all_host_patterns));
440 EXPECT_TRUE(
rdevlin.cronind630c302015-09-30 20:19:33441 permissions_data->withheld_permissions().scriptable_hosts().is_empty());
rdevlin.croninb8dffe52015-02-07 00:58:01442 EXPECT_TRUE(util::AllowedScriptingOnAllUrls(extension_a->id(), profile()));
443
444 // Enable the switch, and re-init permission for the extension.
445 scoped_ptr<FeatureSwitch::ScopedOverride> switch_override(
446 new FeatureSwitch::ScopedOverride(FeatureSwitch::scripts_require_action(),
447 FeatureSwitch::OVERRIDE_ENABLED));
448 updater.InitializePermissions(extension_a.get());
449
450 // Since the extension was installed when the switch was off, it should still
451 // have the all urls pref.
452 permissions_data = extension_a->permissions_data();
453 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33454 permissions_data->active_permissions().scriptable_hosts().patterns(),
rdevlin.croninb8dffe52015-02-07 00:58:01455 all_host_patterns));
456 EXPECT_TRUE(
rdevlin.cronind630c302015-09-30 20:19:33457 permissions_data->withheld_permissions().scriptable_hosts().is_empty());
rdevlin.croninb8dffe52015-02-07 00:58:01458 EXPECT_TRUE(util::AllowedScriptingOnAllUrls(extension_a->id(), profile()));
459
460 // Load a new extension, which also has all urls. Since the switch is now on,
461 // the permissions should be withheld.
462 scoped_refptr<const Extension> extension_b = CreateExtensionWithPermissions(
463 all_host_patterns, all_host_patterns, Manifest::INTERNAL, "b");
464 updater.InitializePermissions(extension_b.get());
465 permissions_data = extension_b->permissions_data();
466
467 EXPECT_TRUE(
rdevlin.cronind630c302015-09-30 20:19:33468 permissions_data->active_permissions().scriptable_hosts().is_empty());
rdevlin.croninb8dffe52015-02-07 00:58:01469 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33470 permissions_data->withheld_permissions().scriptable_hosts().patterns(),
rdevlin.croninb8dffe52015-02-07 00:58:01471 all_host_patterns));
472 EXPECT_FALSE(util::AllowedScriptingOnAllUrls(extension_b->id(), profile()));
473
474 // Disable the switch, and reload the extension.
475 switch_override.reset();
476 updater.InitializePermissions(extension_b.get());
477
478 // Since the extension was installed with the switch on, it should still be
479 // restricted with the switch off.
480 permissions_data = extension_b->permissions_data();
481 EXPECT_TRUE(
rdevlin.cronind630c302015-09-30 20:19:33482 permissions_data->active_permissions().scriptable_hosts().is_empty());
rdevlin.croninb8dffe52015-02-07 00:58:01483 EXPECT_TRUE(SetsAreEqual(
rdevlin.cronind630c302015-09-30 20:19:33484 permissions_data->withheld_permissions().scriptable_hosts().patterns(),
rdevlin.croninb8dffe52015-02-07 00:58:01485 all_host_patterns));
486 EXPECT_FALSE(util::AllowedScriptingOnAllUrls(extension_b->id(), profile()));
487}
488
rdevlin.cronin77cb0ef2015-09-16 17:03:48489TEST_F(PermissionsUpdaterTest, RevokingPermissions) {
490 InitializeEmptyExtensionService();
491
492 ExtensionPrefs* prefs = ExtensionPrefs::Get(profile());
493
494 auto api_permission_set = [](APIPermission::ID id) {
495 APIPermissionSet apis;
496 apis.insert(id);
rdevlin.cronine2d0fd02015-09-24 22:35:49497 return make_scoped_ptr(new PermissionSet(apis, ManifestPermissionSet(),
498 URLPatternSet(), URLPatternSet()));
rdevlin.cronin77cb0ef2015-09-16 17:03:48499 };
500
501 auto url_permission_set = [](const GURL& url) {
502 URLPatternSet set;
503 URLPattern pattern(URLPattern::SCHEME_ALL, url.spec());
504 set.AddPattern(pattern);
rdevlin.cronine2d0fd02015-09-24 22:35:49505 return make_scoped_ptr(new PermissionSet(
rdevlin.cronin77cb0ef2015-09-16 17:03:48506 APIPermissionSet(), ManifestPermissionSet(), set, URLPatternSet()));
507 };
508
509 {
510 // Test revoking optional permissions.
511 ListBuilder optional_permissions;
512 optional_permissions.Append("tabs").Append("cookies").Append("management");
513 ListBuilder required_permissions;
514 required_permissions.Append("topSites");
515 scoped_refptr<const Extension> extension =
516 CreateExtensionWithOptionalPermissions(optional_permissions.Build(),
517 required_permissions.Build(),
518 "My Extension");
519
520 PermissionsUpdater updater(profile());
521 EXPECT_TRUE(updater.GetRevokablePermissions(extension.get())->IsEmpty());
522
523 // Add the optional "cookies" permission.
524 updater.AddPermissions(extension.get(),
rdevlin.cronind630c302015-09-30 20:19:33525 *api_permission_set(APIPermission::kCookie));
rdevlin.cronin77cb0ef2015-09-16 17:03:48526 const PermissionsData* permissions = extension->permissions_data();
527 // The extension should have the permission in its active permissions and
528 // its granted permissions (stored in prefs). And, the permission should
529 // be revokable.
530 EXPECT_TRUE(permissions->HasAPIPermission(APIPermission::kCookie));
rdevlin.cronine2d0fd02015-09-24 22:35:49531 scoped_ptr<const PermissionSet> granted_permissions =
rdevlin.cronin77cb0ef2015-09-16 17:03:48532 prefs->GetGrantedPermissions(extension->id());
533 EXPECT_TRUE(granted_permissions->HasAPIPermission(APIPermission::kCookie));
534 EXPECT_TRUE(updater.GetRevokablePermissions(extension.get())
535 ->HasAPIPermission(APIPermission::kCookie));
536
537 // Repeat with "tabs".
538 updater.AddPermissions(extension.get(),
rdevlin.cronind630c302015-09-30 20:19:33539 *api_permission_set(APIPermission::kTab));
rdevlin.cronin77cb0ef2015-09-16 17:03:48540 EXPECT_TRUE(permissions->HasAPIPermission(APIPermission::kTab));
541 granted_permissions = prefs->GetGrantedPermissions(extension->id());
542 EXPECT_TRUE(granted_permissions->HasAPIPermission(APIPermission::kTab));
543 EXPECT_TRUE(updater.GetRevokablePermissions(extension.get())
544 ->HasAPIPermission(APIPermission::kTab));
545
546 // Remove the "tabs" permission. The extension should no longer have it
547 // in its active or granted permissions, and it shouldn't be revokable.
548 // The extension should still have the "cookies" permission.
549 updater.RemovePermissions(extension.get(),
rdevlin.cronind630c302015-09-30 20:19:33550 *api_permission_set(APIPermission::kTab),
rdevlin.cronin77cb0ef2015-09-16 17:03:48551 PermissionsUpdater::REMOVE_HARD);
552 EXPECT_FALSE(permissions->HasAPIPermission(APIPermission::kTab));
553 granted_permissions = prefs->GetGrantedPermissions(extension->id());
554 EXPECT_FALSE(granted_permissions->HasAPIPermission(APIPermission::kTab));
555 EXPECT_FALSE(updater.GetRevokablePermissions(extension.get())
556 ->HasAPIPermission(APIPermission::kTab));
557 EXPECT_TRUE(permissions->HasAPIPermission(APIPermission::kCookie));
558 granted_permissions = prefs->GetGrantedPermissions(extension->id());
559 EXPECT_TRUE(granted_permissions->HasAPIPermission(APIPermission::kCookie));
560 EXPECT_TRUE(updater.GetRevokablePermissions(extension.get())
561 ->HasAPIPermission(APIPermission::kCookie));
562 }
563
564 {
565 // Test revoking non-optional host permissions with click-to-script.
566 FeatureSwitch::ScopedOverride scoped_override(
567 FeatureSwitch::scripts_require_action(), true);
568 ListBuilder optional_permissions;
569 optional_permissions.Append("tabs");
570 ListBuilder required_permissions;
571 required_permissions.Append("topSites")
572 .Append("http://*/*")
573 .Append("http://*.google.com/*");
574 scoped_refptr<const Extension> extension =
575 CreateExtensionWithOptionalPermissions(optional_permissions.Build(),
576 required_permissions.Build(),
577 "My Extension");
578 PermissionsUpdater updater(profile());
579 updater.InitializePermissions(extension.get());
580
581 // By default, all-hosts was withheld, so the extension shouldn't have
582 // access to any site (like foo.com).
583 const GURL kOrigin("http://foo.com");
584 EXPECT_FALSE(extension->permissions_data()
585 ->active_permissions()
rdevlin.cronind630c302015-09-30 20:19:33586 .HasExplicitAccessToOrigin(kOrigin));
rdevlin.cronin77cb0ef2015-09-16 17:03:48587 EXPECT_TRUE(extension->permissions_data()
588 ->withheld_permissions()
rdevlin.cronind630c302015-09-30 20:19:33589 .HasExplicitAccessToOrigin(kOrigin));
rdevlin.cronin77cb0ef2015-09-16 17:03:48590
591 const GURL kRequiredOrigin("http://www.google.com/");
592 EXPECT_TRUE(extension->permissions_data()
593 ->active_permissions()
rdevlin.cronind630c302015-09-30 20:19:33594 .HasExplicitAccessToOrigin(kRequiredOrigin));
rdevlin.cronin77cb0ef2015-09-16 17:03:48595 EXPECT_FALSE(updater.GetRevokablePermissions(extension.get())
596 ->HasExplicitAccessToOrigin(kRequiredOrigin));
597
598 // Give the extension access to foo.com. Now, the foo.com permission should
599 // be revokable.
rdevlin.cronind630c302015-09-30 20:19:33600 updater.AddPermissions(extension.get(), *url_permission_set(kOrigin));
rdevlin.cronin77cb0ef2015-09-16 17:03:48601 EXPECT_TRUE(extension->permissions_data()
602 ->active_permissions()
rdevlin.cronind630c302015-09-30 20:19:33603 .HasExplicitAccessToOrigin(kOrigin));
rdevlin.cronin77cb0ef2015-09-16 17:03:48604 EXPECT_TRUE(updater.GetRevokablePermissions(extension.get())
605 ->HasExplicitAccessToOrigin(kOrigin));
606
607 // Revoke the foo.com permission. The extension should no longer have
608 // access to foo.com, and the revokable permissions should be empty.
rdevlin.cronind630c302015-09-30 20:19:33609 updater.RemovePermissions(extension.get(), *url_permission_set(kOrigin),
rdevlin.cronin77cb0ef2015-09-16 17:03:48610 PermissionsUpdater::REMOVE_HARD);
611 EXPECT_FALSE(extension->permissions_data()
612 ->active_permissions()
rdevlin.cronind630c302015-09-30 20:19:33613 .HasExplicitAccessToOrigin(kOrigin));
rdevlin.cronin77cb0ef2015-09-16 17:03:48614 EXPECT_TRUE(extension->permissions_data()
615 ->withheld_permissions()
rdevlin.cronind630c302015-09-30 20:19:33616 .HasExplicitAccessToOrigin(kOrigin));
rdevlin.cronin77cb0ef2015-09-16 17:03:48617 EXPECT_TRUE(updater.GetRevokablePermissions(extension.get())->IsEmpty());
618 }
619}
620
[email protected]c333e792012-01-06 16:57:39621} // namespace extensions