// Copyright 2014 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "chrome/test/base/chrome_render_view_test.h" #include "content/public/renderer/render_frame.h" #include "content/public/test/frame_load_waiter.h" #include "extensions/common/script_constants.h" #include "extensions/renderer/script_context.h" #include "extensions/renderer/script_context_set.h" #include "third_party/blink/public/platform/web_runtime_features.h" #include "third_party/blink/public/web/web_document.h" #include "third_party/blink/public/web/web_local_frame.h" #include "url/gurl.h" using blink::WebLocalFrame; namespace extensions { namespace { class ScriptContextTest : public ChromeRenderViewTest { protected: GURL GetEffectiveDocumentURLForContext(WebLocalFrame* frame) { return ScriptContext::GetEffectiveDocumentURLForContext( frame, frame->GetDocument().Url(), /*match_about_blank=*/true); } GURL GetEffectiveDocumentURLForInjection( WebLocalFrame* frame, MatchOriginAsFallbackBehavior match_origin_as_fallback = MatchOriginAsFallbackBehavior::kAlways) { return ScriptContext::GetEffectiveDocumentURLForInjection( frame, frame->GetDocument().Url(), match_origin_as_fallback); } }; TEST_F(ScriptContextTest, GetEffectiveDocumentURL) { GURL top_url("http://example.com/"); GURL different_url("http://example.net/"); GURL blank_url("about:blank"); GURL srcdoc_url("about:srcdoc"); GURL data_url("data:text/html,Hi"); const char frame_html[] = R"( )"; const char frame3_html[] = R"( )"; WebLocalFrame* frame = GetMainFrame(); ASSERT_TRUE(frame); content::RenderFrame::FromWebFrame(frame)->LoadHTMLStringForTesting( frame_html, top_url, "UTF-8", GURL(), false /* replace_current_item */); content::FrameLoadWaiter(content::RenderFrame::FromWebFrame(frame)).Wait(); WebLocalFrame* frame1 = frame->FirstChild()->ToWebLocalFrame(); ASSERT_TRUE(frame1); ASSERT_EQ("frame1", frame1->AssignedName()); WebLocalFrame* frame1_1 = frame1->FirstChild()->ToWebLocalFrame(); ASSERT_TRUE(frame1_1); ASSERT_EQ("frame1_1", frame1_1->AssignedName()); WebLocalFrame* frame1_2 = frame1_1->NextSibling()->ToWebLocalFrame(); ASSERT_TRUE(frame1_2); ASSERT_EQ("frame1_2", frame1_2->AssignedName()); WebLocalFrame* frame2 = frame1->NextSibling()->ToWebLocalFrame(); ASSERT_TRUE(frame2); ASSERT_EQ("frame2", frame2->AssignedName()); WebLocalFrame* frame2_1 = frame2->FirstChild()->ToWebLocalFrame(); ASSERT_TRUE(frame2_1); ASSERT_EQ("frame2_1", frame2_1->AssignedName()); WebLocalFrame* frame3 = frame2->NextSibling()->ToWebLocalFrame(); ASSERT_TRUE(frame3); ASSERT_EQ("frame3", frame3->AssignedName()); WebLocalFrame* frame4 = frame3->NextSibling()->ToWebLocalFrame(); ASSERT_TRUE(frame4); ASSERT_EQ("frame4", frame4->AssignedName()); WebLocalFrame* frame5 = frame4->NextSibling()->ToWebLocalFrame(); ASSERT_TRUE(frame5); ASSERT_EQ("frame5", frame5->AssignedName()); // Load a blank document in a frame from a different origin. content::RenderFrame::FromWebFrame(frame3)->LoadHTMLStringForTesting( frame3_html, different_url, "UTF-8", GURL(), false /* replace_current_item */); content::FrameLoadWaiter(content::RenderFrame::FromWebFrame(frame3)).Wait(); WebLocalFrame* frame3_1 = frame3->FirstChild()->ToWebLocalFrame(); ASSERT_TRUE(frame3_1); ASSERT_EQ("frame3_1", frame3_1->AssignedName()); WebLocalFrame* frame3_2 = frame3_1->NextSibling()->ToWebLocalFrame(); ASSERT_TRUE(frame3_2); ASSERT_EQ("frame3_2", frame3_2->AssignedName()); WebLocalFrame* frame3_3 = frame3_2->NextSibling()->ToWebLocalFrame(); ASSERT_TRUE(frame3_3); ASSERT_EQ("frame3_3", frame3_3->AssignedName()); // Top-level frame EXPECT_EQ(top_url, GetEffectiveDocumentURLForContext(frame)); EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame)); // top -> srcdoc = inherit EXPECT_EQ(top_url, GetEffectiveDocumentURLForContext(frame1)); EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame1)); // top -> srcdoc -> about:blank = inherit EXPECT_EQ(top_url, GetEffectiveDocumentURLForContext(frame1_1)); EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame1_1)); // top -> srcdoc -> about:blank sandboxed = same URL when classifying // contexts, but inherited url when injecting scripts. EXPECT_EQ(blank_url, GetEffectiveDocumentURLForContext(frame1_2)); EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame1_2)); // top -> srcdoc [sandboxed] = same URL when classifying contexts, // but inherited url when injecting scripts. EXPECT_EQ(srcdoc_url, GetEffectiveDocumentURLForContext(frame2)); EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame2)); // top -> srcdoc [sandboxed] -> about:blank = same URL when classifying // contexts, but inherited url when injecting scripts. EXPECT_EQ(blank_url, GetEffectiveDocumentURLForContext(frame2_1)); EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame2_1)); // top -> data URL = same URL when classifying contexts, but inherited when // injecting scripts. EXPECT_EQ(data_url, GetEffectiveDocumentURLForContext(frame4)); EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame4)); // Sanity-check: if we only match about: schemes, the original URL should be // returned. EXPECT_EQ( data_url, GetEffectiveDocumentURLForInjection( frame4, MatchOriginAsFallbackBehavior::kMatchForAboutSchemeAndClimbTree)); // top -> sandboxed data URL = same URL when classifying contexts, but // inherited when injecting scripts. EXPECT_EQ(data_url, GetEffectiveDocumentURLForContext(frame5)); EXPECT_EQ(top_url, GetEffectiveDocumentURLForInjection(frame5)); // Sanity-check: if we only match about: schemes, the original URL should be // returned. EXPECT_EQ( data_url, GetEffectiveDocumentURLForInjection( frame5, MatchOriginAsFallbackBehavior::kMatchForAboutSchemeAndClimbTree)); // top -> different origin = different origin EXPECT_EQ(different_url, GetEffectiveDocumentURLForContext(frame3)); EXPECT_EQ(different_url, GetEffectiveDocumentURLForInjection(frame3)); // top -> different origin -> about:blank = inherit (from different origin) EXPECT_EQ(different_url, GetEffectiveDocumentURLForContext(frame3_1)); EXPECT_EQ(different_url, GetEffectiveDocumentURLForInjection(frame3_1)); // top -> different origin -> about:blank sandboxed = same URL when // classifying contexts, but inherited (from different origin) url when // injecting scripts. EXPECT_EQ(blank_url, GetEffectiveDocumentURLForContext(frame3_2)); EXPECT_EQ(different_url, GetEffectiveDocumentURLForInjection(frame3_2)); // top -> different origin -> data URL = same URL when classifying contexts, // but inherited (from different origin) url when injecting scripts. EXPECT_EQ(data_url, GetEffectiveDocumentURLForContext(frame3_3)); EXPECT_EQ(different_url, GetEffectiveDocumentURLForInjection(frame3_3)); } TEST_F(ScriptContextTest, GetMainWorldContextForFrame) { // ScriptContextSet::GetMainWorldContextForFrame should work, even without an // existing v8::HandleScope. content::RenderFrame* render_frame = content::RenderFrame::FromWebFrame(GetMainFrame()); ScriptContext* script_context = ScriptContextSet::GetMainWorldContextForFrame(render_frame); ASSERT_TRUE(script_context); EXPECT_EQ(render_frame, script_context->GetRenderFrame()); } } // namespace } // namespace extensions