[go: nahoru, domu]

blob: 16ade2b3d89b0fd3ff6525a60d9ed42b419481a1 [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/test/base/chrome_render_view_test.h"
#include "content/public/renderer/render_frame.h"
#include "content/public/test/frame_load_waiter.h"
#include "extensions/common/script_constants.h"
#include "extensions/renderer/script_context.h"
#include "extensions/renderer/script_context_set.h"
#include "third_party/blink/public/platform/web_runtime_features.h"
#include "third_party/blink/public/web/web_document.h"
#include "third_party/blink/public/web/web_local_frame.h"
#include "url/gurl.h"
using blink::WebLocalFrame;
namespace extensions {
namespace {
class ScriptContextTest : public ChromeRenderViewTest {
protected:
GURL GetEffectiveDocumentURLForContext(WebLocalFrame* frame) {
return ScriptContext::GetEffectiveDocumentURLForContext(
frame, frame->GetDocument().Url(), /*match_about_blank=*/true);
}
GURL GetEffectiveDocumentURLForInjection(
WebLocalFrame* frame,
MatchOriginAsFallbackBehavior match_origin_as_fallback =
MatchOriginAsFallbackBehavior::kAlways) {
return ScriptContext::GetEffectiveDocumentURLForInjection(
frame, frame->GetDocument().Url(), match_origin_as_fallback);
}
};
TEST_F(ScriptContextTest, GetEffectiveDocumentURL) {
GURL top_url("http://example.com/");
GURL different_url("http://example.net/");
GURL blank_url("about:blank");
GURL srcdoc_url("about:srcdoc");
GURL data_url("data:text/html,<html>Hi</html>");
const char frame_html[] =
R"(<iframe name='frame1' srcdoc="
<iframe name='frame1_1'></iframe>
<iframe name='frame1_2' sandbox=''></iframe>
"></iframe>
<iframe name='frame2' sandbox='' srcdoc="
<iframe name='frame2_1'></iframe>
"></iframe>
<iframe name='frame3'></iframe>
<iframe name='frame4' src="data:text/html,<html>Hi</html>"></iframe>
<iframe name='frame5'
src="data:text/html,<html>Hi</html>"
sandbox=''></iframe>)";
const char frame3_html[] =
R"(<iframe name='frame3_1'></iframe>
<iframe name='frame3_2' sandbox=''></iframe>
<iframe name='frame3_3'
src="data:text/html,<html>Hi</html>"></iframe>)";
WebLocalFrame* frame = GetMainFrame();
ASSERT_TRUE(frame);
content::RenderFrame::FromWebFrame(frame)->LoadHTMLStringForTesting(
frame_html, top_url, "UTF-8", GURL(), false /* replace_current_item */);
content::FrameLoadWaiter(content::RenderFrame::FromWebFrame(frame)).Wait();
WebLocalFrame* frame1 = frame->FirstChild()->ToWebLocalFrame();
ASSERT_TRUE(frame1);
ASSERT_EQ("frame1", frame1->AssignedName());
WebLocalFrame* frame1_1 = frame1->FirstChild()->ToWebLocalFrame();
ASSERT_TRUE(frame1_1);
ASSERT_EQ("frame1_1", frame1_1->AssignedName());
WebLocalFrame* frame1_2 = frame1_1->NextSibling()->ToWebLocalFrame();
ASSERT_TRUE(frame1_2);
ASSERT_EQ("frame1_2", frame1_2->AssignedName());
WebLocalFrame* frame2 = frame1->NextSibling()->ToWebLocalFrame();
ASSERT_TRUE(frame2);
ASSERT_EQ("frame2", frame2->AssignedName());
WebLocalFrame* frame2_1 = frame2->FirstChild()->ToWebLocalFrame();
ASSERT_TRUE(frame2_1);
ASSERT_EQ("frame2_1", frame2_1->AssignedName());
WebLocalFrame* frame3 = frame2->NextSibling()->ToWebLocalFrame();
ASSERT_TRUE(frame3);
ASSERT_EQ("frame3", frame3->AssignedName());
WebLocalFrame* frame4 = frame3->NextSibling()->ToWebLocalFrame();
ASSERT_TRUE(frame4);
ASSERT_EQ("frame4", frame4->AssignedName());
WebLocalFrame* frame5 = frame4->NextSibling()->ToWebLocalFrame();
ASSERT_TRUE(frame5);
ASSERT_EQ("frame5", frame5->AssignedName());
// Load a blank document in a frame from a different origin.
content::RenderFrame::FromWebFrame(frame3)->LoadHTMLStringForTesting(
frame3_html, different_url, "UTF-8", GURL(),
false /* replace_current_item */);
content::FrameLoadWaiter(content::RenderFrame::FromWebFrame(frame3)).Wait();
WebLocalFrame* frame3_1 = frame3->FirstChild()->ToWebLocalFrame();
ASSERT_TRUE(frame3_1);
ASSERT_EQ("frame3_1", frame3_1->AssignedName());
WebLocalFrame* frame3_2 = frame3_1->NextSibling()->ToWebLocalFrame();
ASSERT_TRUE(frame3_2);
ASSERT_EQ("frame3_2", frame3_2->AssignedName());
WebLocalFrame* frame3_3 = frame3_2->NextSibling()->ToWebLocalFrame();
ASSERT_TRUE(frame3_3);
ASSERT_EQ("frame3_3", frame3_3->AssignedName());
// Top-level frame
EXPECT_EQ(top_url, GetEffectiveDocumentURLForContext(frame));
EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame));
// top -> srcdoc = inherit
EXPECT_EQ(top_url, GetEffectiveDocumentURLForContext(frame1));
EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame1));
// top -> srcdoc -> about:blank = inherit
EXPECT_EQ(top_url, GetEffectiveDocumentURLForContext(frame1_1));
EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame1_1));
// top -> srcdoc -> about:blank sandboxed = same URL when classifying
// contexts, but inherited url when injecting scripts.
EXPECT_EQ(blank_url, GetEffectiveDocumentURLForContext(frame1_2));
EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame1_2));
// top -> srcdoc [sandboxed] = same URL when classifying contexts,
// but inherited url when injecting scripts.
EXPECT_EQ(srcdoc_url, GetEffectiveDocumentURLForContext(frame2));
EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame2));
// top -> srcdoc [sandboxed] -> about:blank = same URL when classifying
// contexts, but inherited url when injecting scripts.
EXPECT_EQ(blank_url, GetEffectiveDocumentURLForContext(frame2_1));
EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame2_1));
// top -> data URL = same URL when classifying contexts, but inherited when
// injecting scripts.
EXPECT_EQ(data_url, GetEffectiveDocumentURLForContext(frame4));
EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame4));
// Sanity-check: if we only match about: schemes, the original URL should be
// returned.
EXPECT_EQ(
data_url,
GetEffectiveDocumentURLForInjection(
frame4,
MatchOriginAsFallbackBehavior::kMatchForAboutSchemeAndClimbTree));
// top -> sandboxed data URL = same URL when classifying contexts, but
// inherited when injecting scripts.
EXPECT_EQ(data_url, GetEffectiveDocumentURLForContext(frame5));
EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame5));
// Sanity-check: if we only match about: schemes, the original URL should be
// returned.
EXPECT_EQ(
data_url,
GetEffectiveDocumentURLForInjection(
frame5,
MatchOriginAsFallbackBehavior::kMatchForAboutSchemeAndClimbTree));
// top -> different origin = different origin
EXPECT_EQ(different_url, GetEffectiveDocumentURLForContext(frame3));
EXPECT_EQ(different_url, GetEffectiveDocumentURLForInjection(frame3));
// top -> different origin -> about:blank = inherit (from different origin)
EXPECT_EQ(different_url, GetEffectiveDocumentURLForContext(frame3_1));
EXPECT_EQ(different_url, GetEffectiveDocumentURLForInjection(frame3_1));
// top -> different origin -> about:blank sandboxed = same URL when
// classifying contexts, but inherited (from different origin) url when
// injecting scripts.
EXPECT_EQ(blank_url, GetEffectiveDocumentURLForContext(frame3_2));
EXPECT_EQ(different_url, GetEffectiveDocumentURLForInjection(frame3_2));
// top -> different origin -> data URL = same URL when classifying contexts,
// but inherited (from different origin) url when injecting scripts.
EXPECT_EQ(data_url, GetEffectiveDocumentURLForContext(frame3_3));
EXPECT_EQ(different_url, GetEffectiveDocumentURLForInjection(frame3_3));
}
TEST_F(ScriptContextTest, GetMainWorldContextForFrame) {
// ScriptContextSet::GetMainWorldContextForFrame should work, even without an
// existing v8::HandleScope.
content::RenderFrame* render_frame =
content::RenderFrame::FromWebFrame(GetMainFrame());
ScriptContext* script_context =
ScriptContextSet::GetMainWorldContextForFrame(render_frame);
ASSERT_TRUE(script_context);
EXPECT_EQ(render_frame, script_context->GetRenderFrame());
}
} // namespace
} // namespace extensions