• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include "base/strings/string_piece.h"
6 #include "base/strings/utf_string_conversions.h"
7 #include "content/child/site_isolation_policy.h"
8 #include "content/public/common/context_menu_params.h"
9 #include "testing/gtest/include/gtest/gtest.h"
10 #include "third_party/WebKit/public/platform/WebURLResponse.h"
11 #include "ui/gfx/range/range.h"
12 
13 using base::StringPiece;
14 
15 namespace content {
16 
TEST(SiteIsolationPolicyTest,IsBlockableScheme)17 TEST(SiteIsolationPolicyTest, IsBlockableScheme) {
18   GURL data_url("data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAA==");
19   GURL ftp_url("ftp://google.com");
20   GURL mailto_url("mailto:google@google.com");
21   GURL about_url("about:chrome");
22   GURL http_url("http://google.com");
23   GURL https_url("https://google.com");
24 
25   EXPECT_FALSE(SiteIsolationPolicy::IsBlockableScheme(data_url));
26   EXPECT_FALSE(SiteIsolationPolicy::IsBlockableScheme(ftp_url));
27   EXPECT_FALSE(SiteIsolationPolicy::IsBlockableScheme(mailto_url));
28   EXPECT_FALSE(SiteIsolationPolicy::IsBlockableScheme(about_url));
29   EXPECT_TRUE(SiteIsolationPolicy::IsBlockableScheme(http_url));
30   EXPECT_TRUE(SiteIsolationPolicy::IsBlockableScheme(https_url));
31 }
32 
TEST(SiteIsolationPolicyTest,IsSameSite)33 TEST(SiteIsolationPolicyTest, IsSameSite) {
34   GURL a_com_url0("https://mock1.a.com:8080/page1.html");
35   GURL a_com_url1("https://mock2.a.com:9090/page2.html");
36   GURL a_com_url2("https://a.com/page3.html");
37   EXPECT_TRUE(SiteIsolationPolicy::IsSameSite(a_com_url0, a_com_url1));
38   EXPECT_TRUE(SiteIsolationPolicy::IsSameSite(a_com_url1, a_com_url2));
39   EXPECT_TRUE(SiteIsolationPolicy::IsSameSite(a_com_url2, a_com_url0));
40 
41   GURL b_com_url0("https://mock1.b.com/index.html");
42   EXPECT_FALSE(SiteIsolationPolicy::IsSameSite(a_com_url0, b_com_url0));
43 
44   GURL about_blank_url("about:blank");
45   EXPECT_FALSE(SiteIsolationPolicy::IsSameSite(a_com_url0, about_blank_url));
46 
47   GURL chrome_url("chrome://extension");
48   EXPECT_FALSE(SiteIsolationPolicy::IsSameSite(a_com_url0, chrome_url));
49 
50   GURL empty_url("");
51   EXPECT_FALSE(SiteIsolationPolicy::IsSameSite(a_com_url0, empty_url));
52 }
53 
TEST(SiteIsolationPolicyTest,IsValidCorsHeaderSet)54 TEST(SiteIsolationPolicyTest, IsValidCorsHeaderSet) {
55   GURL frame_origin("http://www.google.com");
56   GURL site_origin("http://www.yahoo.com");
57 
58   EXPECT_TRUE(SiteIsolationPolicy::IsValidCorsHeaderSet(
59       frame_origin, site_origin, "*"));
60   EXPECT_FALSE(SiteIsolationPolicy::IsValidCorsHeaderSet(
61       frame_origin, site_origin, "\"*\""));
62   EXPECT_TRUE(SiteIsolationPolicy::IsValidCorsHeaderSet(
63       frame_origin, site_origin, "http://mail.google.com"));
64   EXPECT_FALSE(SiteIsolationPolicy::IsValidCorsHeaderSet(
65       frame_origin, site_origin, "https://mail.google.com"));
66   EXPECT_FALSE(SiteIsolationPolicy::IsValidCorsHeaderSet(
67       frame_origin, site_origin, "http://yahoo.com"));
68   EXPECT_FALSE(SiteIsolationPolicy::IsValidCorsHeaderSet(
69       frame_origin, site_origin, "www.google.com"));
70 }
71 
TEST(SiteIsolationPolicyTest,SniffForHTML)72 TEST(SiteIsolationPolicyTest, SniffForHTML) {
73   StringPiece html_data("  \t\r\n    <HtMladfokadfkado");
74   StringPiece comment_html_data(" <!-- this is comment --> <html><body>");
75   StringPiece two_comments_html_data(
76       "<!-- this is comment -->\n<!-- this is comment --><html><body>");
77   StringPiece mixed_comments_html_data(
78       "<!-- this is comment <!-- --> <script></script>");
79   StringPiece non_html_data("        var name=window.location;\nadfadf");
80   StringPiece comment_js_data(" <!-- this is comment -> document.write(1); ");
81   StringPiece empty_data("");
82 
83   EXPECT_TRUE(SiteIsolationPolicy::SniffForHTML(html_data));
84   EXPECT_TRUE(SiteIsolationPolicy::SniffForHTML(comment_html_data));
85   EXPECT_TRUE(SiteIsolationPolicy::SniffForHTML(two_comments_html_data));
86   EXPECT_TRUE(SiteIsolationPolicy::SniffForHTML(mixed_comments_html_data));
87   EXPECT_FALSE(SiteIsolationPolicy::SniffForHTML(non_html_data));
88   EXPECT_FALSE(SiteIsolationPolicy::SniffForHTML(comment_js_data));
89 
90   // Basic bounds check.
91   EXPECT_FALSE(SiteIsolationPolicy::SniffForHTML(empty_data));
92 }
93 
TEST(SiteIsolationPolicyTest,SniffForXML)94 TEST(SiteIsolationPolicyTest, SniffForXML) {
95   StringPiece xml_data("   \t \r \n     <?xml version=\"1.0\"?>\n <catalog");
96   StringPiece non_xml_data("        var name=window.location;\nadfadf");
97   StringPiece empty_data("");
98 
99   EXPECT_TRUE(SiteIsolationPolicy::SniffForXML(xml_data));
100   EXPECT_FALSE(SiteIsolationPolicy::SniffForXML(non_xml_data));
101 
102   // Basic bounds check.
103   EXPECT_FALSE(SiteIsolationPolicy::SniffForXML(empty_data));
104 }
105 
TEST(SiteIsolationPolicyTest,SniffForJSON)106 TEST(SiteIsolationPolicyTest, SniffForJSON) {
107   StringPiece json_data("\t\t\r\n   { \"name\" : \"chrome\", ");
108   StringPiece non_json_data0("\t\t\r\n   { name : \"chrome\", ");
109   StringPiece non_json_data1("\t\t\r\n   foo({ \"name\" : \"chrome\", ");
110   StringPiece empty_data("");
111 
112   EXPECT_TRUE(
113               SiteIsolationPolicy::SniffForJSON(json_data));
114   EXPECT_FALSE(SiteIsolationPolicy::SniffForJSON(non_json_data0));
115   EXPECT_FALSE(SiteIsolationPolicy::SniffForJSON(non_json_data1));
116 
117   // Basic bounds check.
118   EXPECT_FALSE(SiteIsolationPolicy::SniffForJSON(empty_data));
119 }
120 
TEST(SiteIsolationPolicyTest,SniffForJS)121 TEST(SiteIsolationPolicyTest, SniffForJS) {
122   StringPiece basic_js_data("var a = 4");
123   StringPiece js_data("\t\t\r\n var a = 4");
124   StringPiece json_data("\t\t\r\n   { \"name\" : \"chrome\", ");
125   StringPiece empty_data("");
126 
127   EXPECT_TRUE(SiteIsolationPolicy::SniffForJS(js_data));
128   EXPECT_FALSE(SiteIsolationPolicy::SniffForJS(json_data));
129 
130   // Basic bounds check.
131   EXPECT_FALSE(SiteIsolationPolicy::SniffForJS(empty_data));
132 }
133 
134 }  // namespace content
135