desktop_notification_service_unittest.cc revision 21d179b334e59e9a3bfcaed4c4430bef1bc5759d
1// Copyright (c) 2010 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "chrome/browser/notifications/desktop_notification_service.h"
6
7#include "base/message_loop.h"
8#include "base/ref_counted.h"
9#include "base/waitable_event.h"
10#include "chrome/browser/browser_thread.h"
11#include "chrome/browser/notifications/notifications_prefs_cache.h"
12#include "chrome/browser/prefs/pref_service.h"
13#include "chrome/browser/prefs/scoped_pref_update.h"
14#include "chrome/browser/renderer_host/test/test_render_view_host.h"
15#include "chrome/common/pref_names.h"
16#include "chrome/test/testing_profile.h"
17#include "grit/generated_resources.h"
18#include "testing/gtest/include/gtest/gtest.h"
19#include "third_party/WebKit/WebKit/chromium/public/WebNotificationPresenter.h"
20
21namespace {
22
23// NotificationsPrefsCache wants to be called on the IO thread. This class
24// routes calls to the cache on the IO thread.
25class ThreadProxy : public base::RefCountedThreadSafe<ThreadProxy> {
26 public:
27  ThreadProxy()
28      : io_event_(false, false),
29        ui_event_(false, false),
30        permission_(0) {
31    // The current message loop was already initalized by the test superclass.
32    ui_thread_.reset(
33        new BrowserThread(BrowserThread::UI, MessageLoop::current()));
34
35    // Create IO thread, start its message loop.
36    io_thread_.reset(new BrowserThread(BrowserThread::IO));
37    io_thread_->Start();
38
39    // Calling PauseIOThread() here isn't safe, because the runnable method
40    // could complete before the constructor is done, deleting |this|.
41  }
42
43  int CacheHasPermission(NotificationsPrefsCache* cache, const GURL& url) {
44    DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
45    BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
46        NewRunnableMethod(this, &ThreadProxy::CacheHasPermissionIO,
47                          make_scoped_refptr(cache), url));
48    io_event_.Signal();
49    ui_event_.Wait();  // Wait for IO thread to be done.
50    BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
51        NewRunnableMethod(this, &ThreadProxy::PauseIOThreadIO));
52
53    return permission_;
54  }
55
56  void PauseIOThread() {
57    BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
58        NewRunnableMethod(this, &ThreadProxy::PauseIOThreadIO));
59  }
60
61  void DrainIOThread() {
62    DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
63    io_event_.Signal();
64    io_thread_->Stop();
65  }
66
67 private:
68  friend class base::RefCountedThreadSafe<ThreadProxy>;
69  ~ThreadProxy() {
70     DrainIOThread();
71  }
72
73  void PauseIOThreadIO() {
74    DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
75    io_event_.Wait();
76  }
77
78  void CacheHasPermissionIO(NotificationsPrefsCache* cache, const GURL& url) {
79    DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
80    permission_ = cache->HasPermission(url);
81    ui_event_.Signal();
82  }
83
84  base::WaitableEvent io_event_;
85  base::WaitableEvent ui_event_;
86  scoped_ptr<BrowserThread> ui_thread_;
87  scoped_ptr<BrowserThread> io_thread_;
88
89  int permission_;
90};
91
92
93class DesktopNotificationServiceTest : public RenderViewHostTestHarness {
94 public:
95  DesktopNotificationServiceTest() {
96  }
97
98  virtual void SetUp() {
99    RenderViewHostTestHarness::SetUp();
100    proxy_ = new ThreadProxy;
101    proxy_->PauseIOThread();
102
103    // Creates the service, calls InitPrefs() on it which loads data from the
104    // profile into the cache and then puts the cache in io thread mode.
105    service_ = profile()->GetDesktopNotificationService();
106    cache_ = service_->prefs_cache();
107  }
108
109  virtual void TearDown() {
110    // The io thread's waiting on the io_event_ might hold a ref to |proxy_|,
111    // preventing its destruction. Clear that ref.
112    proxy_->DrainIOThread();
113    RenderViewHostTestHarness::TearDown();
114  }
115
116  DesktopNotificationService* service_;
117  NotificationsPrefsCache* cache_;
118  scoped_refptr<ThreadProxy> proxy_;
119};
120
121TEST_F(DesktopNotificationServiceTest, DefaultContentSettingSentToCache) {
122  // The default pref registered in DesktopNotificationService is "ask",
123  // and that's what sent to the cache.
124  EXPECT_EQ(CONTENT_SETTING_ASK, cache_->CachedDefaultContentSetting());
125
126  // Change the default content setting. This will post a task on the IO thread
127  // to update the cache.
128  service_->SetDefaultContentSetting(CONTENT_SETTING_BLOCK);
129
130  // The updated pref shouldn't be sent to the cache immediately.
131  EXPECT_EQ(CONTENT_SETTING_ASK, cache_->CachedDefaultContentSetting());
132
133  // Run IO thread tasks.
134  proxy_->DrainIOThread();
135
136  // Now that IO thread events have been processed, it should be there.
137  EXPECT_EQ(CONTENT_SETTING_BLOCK, cache_->CachedDefaultContentSetting());
138}
139
140TEST_F(DesktopNotificationServiceTest, GrantPermissionSentToCache) {
141  GURL url("http://allowed.com");
142  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed,
143            proxy_->CacheHasPermission(cache_, url));
144
145  service_->GrantPermission(url);
146
147  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed,
148            proxy_->CacheHasPermission(cache_, url));
149}
150
151TEST_F(DesktopNotificationServiceTest, DenyPermissionSentToCache) {
152  GURL url("http://denied.com");
153  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed,
154            proxy_->CacheHasPermission(cache_, url));
155
156  service_->DenyPermission(url);
157
158  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionDenied,
159            proxy_->CacheHasPermission(cache_, url));
160}
161
162TEST_F(DesktopNotificationServiceTest, PrefChangesSentToCache) {
163  PrefService* prefs = profile()->GetPrefs();
164
165  ListValue* allowed_sites =
166      prefs->GetMutableList(prefs::kDesktopNotificationAllowedOrigins);
167  {
168    allowed_sites->Append(new StringValue(GURL("http://allowed.com").spec()));
169    ScopedPrefUpdate updateAllowed(
170        prefs, prefs::kDesktopNotificationAllowedOrigins);
171  }
172
173  ListValue* denied_sites =
174      prefs->GetMutableList(prefs::kDesktopNotificationDeniedOrigins);
175  {
176    denied_sites->Append(new StringValue(GURL("http://denied.com").spec()));
177    ScopedPrefUpdate updateDenied(
178        prefs, prefs::kDesktopNotificationDeniedOrigins);
179  }
180
181  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed,
182            proxy_->CacheHasPermission(cache_, GURL("http://allowed.com")));
183  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionDenied,
184            proxy_->CacheHasPermission(cache_, GURL("http://denied.com")));
185}
186
187TEST_F(DesktopNotificationServiceTest, GetAllowedOrigins) {
188  service_->GrantPermission(GURL("http://allowed2.com"));
189  service_->GrantPermission(GURL("http://allowed.com"));
190
191  std::vector<GURL> allowed_origins(service_->GetAllowedOrigins());
192  ASSERT_EQ(2u, allowed_origins.size());
193  EXPECT_EQ(GURL("http://allowed2.com"), allowed_origins[0]);
194  EXPECT_EQ(GURL("http://allowed.com"), allowed_origins[1]);
195}
196
197TEST_F(DesktopNotificationServiceTest, GetBlockedOrigins) {
198  service_->DenyPermission(GURL("http://denied2.com"));
199  service_->DenyPermission(GURL("http://denied.com"));
200
201  std::vector<GURL> denied_origins(service_->GetBlockedOrigins());
202  ASSERT_EQ(2u, denied_origins.size());
203  EXPECT_EQ(GURL("http://denied2.com"), denied_origins[0]);
204  EXPECT_EQ(GURL("http://denied.com"), denied_origins[1]);
205}
206
207TEST_F(DesktopNotificationServiceTest, ResetAllSentToCache) {
208  GURL allowed_url("http://allowed.com");
209  service_->GrantPermission(allowed_url);
210  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed,
211            proxy_->CacheHasPermission(cache_, allowed_url));
212  GURL denied_url("http://denied.com");
213  service_->DenyPermission(denied_url);
214  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionDenied,
215            proxy_->CacheHasPermission(cache_, denied_url));
216
217  service_->ResetAllOrigins();
218
219  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed,
220            proxy_->CacheHasPermission(cache_, allowed_url));
221  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed,
222            proxy_->CacheHasPermission(cache_, denied_url));
223}
224
225TEST_F(DesktopNotificationServiceTest, ResetAllowedSentToCache) {
226  GURL allowed_url("http://allowed.com");
227  service_->GrantPermission(allowed_url);
228  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed,
229            proxy_->CacheHasPermission(cache_, allowed_url));
230
231  service_->ResetAllowedOrigin(allowed_url);
232
233  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed,
234            proxy_->CacheHasPermission(cache_, allowed_url));
235}
236
237TEST_F(DesktopNotificationServiceTest, ResetBlockedSentToCache) {
238  GURL denied_url("http://denied.com");
239  service_->DenyPermission(denied_url);
240  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionDenied,
241            proxy_->CacheHasPermission(cache_, denied_url));
242
243  service_->ResetBlockedOrigin(denied_url);
244
245  EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed,
246            proxy_->CacheHasPermission(cache_, denied_url));
247}
248
249}  // namespace
250