// Copyright (c) 2011 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "chrome/browser/notifications/desktop_notification_service.h" #include "base/bind.h" #include "base/memory/scoped_ptr.h" #include "base/message_loop.h" #include "base/synchronization/waitable_event.h" #include "chrome/browser/notifications/desktop_notification_service_factory.h" #include "chrome/test/base/chrome_render_view_host_test_harness.h" #include "chrome/test/base/testing_profile.h" #include "content/test/test_browser_thread.h" #include "testing/gtest/include/gtest/gtest.h" #include "third_party/WebKit/Source/WebKit/chromium/public/WebNotificationPresenter.h" using content::BrowserThread; namespace { // The HasPermission method of the DesktopNotificationService wants to be called // on the IO thread. This class routes calls to the cache on the IO thread. class ThreadProxy : public base::RefCountedThreadSafe { public: ThreadProxy() : io_event_(false, false), ui_event_(false, false), permission_(WebKit::WebNotificationPresenter::PermissionAllowed) { // The current message loop was already initalized by the test superclass. ui_thread_.reset( new content::TestBrowserThread(BrowserThread::UI, MessageLoop::current())); // Create IO thread, start its message loop. io_thread_.reset(new content::TestBrowserThread(BrowserThread::IO)); io_thread_->Start(); // Calling PauseIOThread() here isn't safe, because the runnable method // could complete before the constructor is done, deleting |this|. } // Call the HasPermission method of the DesktopNotificationService on the IO // thread and returns the permission setting. WebKit::WebNotificationPresenter::Permission ServiceHasPermission( DesktopNotificationService* service, const GURL& url) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, base::Bind(&ThreadProxy::ServiceHasPermissionIO, this, service, url)); io_event_.Signal(); ui_event_.Wait(); // Wait for IO thread to be done. BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, base::Bind(&ThreadProxy::PauseIOThreadIO, this)); return permission_; } void PauseIOThread() { BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, base::Bind(&ThreadProxy::PauseIOThreadIO, this)); } void DrainIOThread() { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); io_event_.Signal(); io_thread_->Stop(); } private: friend class base::RefCountedThreadSafe; ~ThreadProxy() { DrainIOThread(); } void PauseIOThreadIO() { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); io_event_.Wait(); } void ServiceHasPermissionIO(DesktopNotificationService* service, const GURL& url) { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); permission_ = service->HasPermission(url); ui_event_.Signal(); } base::WaitableEvent io_event_; base::WaitableEvent ui_event_; scoped_ptr ui_thread_; scoped_ptr io_thread_; WebKit::WebNotificationPresenter::Permission permission_; }; } // namespace class DesktopNotificationServiceTest : public ChromeRenderViewHostTestHarness { public: DesktopNotificationServiceTest() { } virtual void SetUp() { ChromeRenderViewHostTestHarness::SetUp(); proxy_ = new ThreadProxy; proxy_->PauseIOThread(); // Creates the destop notification service. service_ = DesktopNotificationServiceFactory::GetForProfile(profile()); } virtual void TearDown() { // The io thread's waiting on the io_event_ might hold a ref to |proxy_|, // preventing its destruction. Clear that ref. proxy_->DrainIOThread(); ChromeRenderViewHostTestHarness::TearDown(); } DesktopNotificationService* service_; scoped_refptr proxy_; }; TEST_F(DesktopNotificationServiceTest, SettingsForSchemes) { GURL url("file:///html/test.html"); EXPECT_EQ(CONTENT_SETTING_ASK, service_->GetDefaultContentSetting(NULL)); EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed, proxy_->ServiceHasPermission(service_, url)); service_->GrantPermission(url); EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed, proxy_->ServiceHasPermission(service_, url)); service_->DenyPermission(url); EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionDenied, proxy_->ServiceHasPermission(service_, url)); GURL https_url("https://testurl"); GURL http_url("http://testurl"); EXPECT_EQ(CONTENT_SETTING_ASK, service_->GetDefaultContentSetting(NULL)); EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed, proxy_->ServiceHasPermission(service_, http_url)); EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed, proxy_->ServiceHasPermission(service_, https_url)); service_->GrantPermission(https_url); EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed, proxy_->ServiceHasPermission(service_, http_url)); EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed, proxy_->ServiceHasPermission(service_, https_url)); service_->DenyPermission(http_url); EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionDenied, proxy_->ServiceHasPermission(service_, http_url)); EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed, proxy_->ServiceHasPermission(service_, https_url)); } TEST_F(DesktopNotificationServiceTest, GetNotificationsSettings) { service_->GrantPermission(GURL("http://allowed2.com")); service_->GrantPermission(GURL("http://allowed.com")); service_->DenyPermission(GURL("http://denied2.com")); service_->DenyPermission(GURL("http://denied.com")); ContentSettingsForOneType settings; service_->GetNotificationsSettings(&settings); // |settings| contains the default setting and 4 exceptions. ASSERT_EQ(5u, settings.size()); EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard( GURL("http://allowed.com")), settings[0].primary_pattern); EXPECT_EQ(CONTENT_SETTING_ALLOW, settings[0].setting); EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard( GURL("http://allowed2.com")), settings[1].primary_pattern); EXPECT_EQ(CONTENT_SETTING_ALLOW, settings[1].setting); EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard( GURL("http://denied.com")), settings[2].primary_pattern); EXPECT_EQ(CONTENT_SETTING_BLOCK, settings[2].setting); EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard( GURL("http://denied2.com")), settings[3].primary_pattern); EXPECT_EQ(CONTENT_SETTING_BLOCK, settings[3].setting); EXPECT_EQ(ContentSettingsPattern::Wildcard(), settings[4].primary_pattern); EXPECT_EQ(CONTENT_SETTING_ASK, settings[4].setting); }