desktop_notification_service_unittest.cc revision 21d179b334e59e9a3bfcaed4c4430bef1bc5759d
1// Copyright (c) 2010 The Chromium Authors. All rights reserved. 2// Use of this source code is governed by a BSD-style license that can be 3// found in the LICENSE file. 4 5#include "chrome/browser/notifications/desktop_notification_service.h" 6 7#include "base/message_loop.h" 8#include "base/ref_counted.h" 9#include "base/waitable_event.h" 10#include "chrome/browser/browser_thread.h" 11#include "chrome/browser/notifications/notifications_prefs_cache.h" 12#include "chrome/browser/prefs/pref_service.h" 13#include "chrome/browser/prefs/scoped_pref_update.h" 14#include "chrome/browser/renderer_host/test/test_render_view_host.h" 15#include "chrome/common/pref_names.h" 16#include "chrome/test/testing_profile.h" 17#include "grit/generated_resources.h" 18#include "testing/gtest/include/gtest/gtest.h" 19#include "third_party/WebKit/WebKit/chromium/public/WebNotificationPresenter.h" 20 21namespace { 22 23// NotificationsPrefsCache wants to be called on the IO thread. This class 24// routes calls to the cache on the IO thread. 25class ThreadProxy : public base::RefCountedThreadSafe<ThreadProxy> { 26 public: 27 ThreadProxy() 28 : io_event_(false, false), 29 ui_event_(false, false), 30 permission_(0) { 31 // The current message loop was already initalized by the test superclass. 32 ui_thread_.reset( 33 new BrowserThread(BrowserThread::UI, MessageLoop::current())); 34 35 // Create IO thread, start its message loop. 36 io_thread_.reset(new BrowserThread(BrowserThread::IO)); 37 io_thread_->Start(); 38 39 // Calling PauseIOThread() here isn't safe, because the runnable method 40 // could complete before the constructor is done, deleting |this|. 41 } 42 43 int CacheHasPermission(NotificationsPrefsCache* cache, const GURL& url) { 44 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); 45 BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, 46 NewRunnableMethod(this, &ThreadProxy::CacheHasPermissionIO, 47 make_scoped_refptr(cache), url)); 48 io_event_.Signal(); 49 ui_event_.Wait(); // Wait for IO thread to be done. 50 BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, 51 NewRunnableMethod(this, &ThreadProxy::PauseIOThreadIO)); 52 53 return permission_; 54 } 55 56 void PauseIOThread() { 57 BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, 58 NewRunnableMethod(this, &ThreadProxy::PauseIOThreadIO)); 59 } 60 61 void DrainIOThread() { 62 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); 63 io_event_.Signal(); 64 io_thread_->Stop(); 65 } 66 67 private: 68 friend class base::RefCountedThreadSafe<ThreadProxy>; 69 ~ThreadProxy() { 70 DrainIOThread(); 71 } 72 73 void PauseIOThreadIO() { 74 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); 75 io_event_.Wait(); 76 } 77 78 void CacheHasPermissionIO(NotificationsPrefsCache* cache, const GURL& url) { 79 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); 80 permission_ = cache->HasPermission(url); 81 ui_event_.Signal(); 82 } 83 84 base::WaitableEvent io_event_; 85 base::WaitableEvent ui_event_; 86 scoped_ptr<BrowserThread> ui_thread_; 87 scoped_ptr<BrowserThread> io_thread_; 88 89 int permission_; 90}; 91 92 93class DesktopNotificationServiceTest : public RenderViewHostTestHarness { 94 public: 95 DesktopNotificationServiceTest() { 96 } 97 98 virtual void SetUp() { 99 RenderViewHostTestHarness::SetUp(); 100 proxy_ = new ThreadProxy; 101 proxy_->PauseIOThread(); 102 103 // Creates the service, calls InitPrefs() on it which loads data from the 104 // profile into the cache and then puts the cache in io thread mode. 105 service_ = profile()->GetDesktopNotificationService(); 106 cache_ = service_->prefs_cache(); 107 } 108 109 virtual void TearDown() { 110 // The io thread's waiting on the io_event_ might hold a ref to |proxy_|, 111 // preventing its destruction. Clear that ref. 112 proxy_->DrainIOThread(); 113 RenderViewHostTestHarness::TearDown(); 114 } 115 116 DesktopNotificationService* service_; 117 NotificationsPrefsCache* cache_; 118 scoped_refptr<ThreadProxy> proxy_; 119}; 120 121TEST_F(DesktopNotificationServiceTest, DefaultContentSettingSentToCache) { 122 // The default pref registered in DesktopNotificationService is "ask", 123 // and that's what sent to the cache. 124 EXPECT_EQ(CONTENT_SETTING_ASK, cache_->CachedDefaultContentSetting()); 125 126 // Change the default content setting. This will post a task on the IO thread 127 // to update the cache. 128 service_->SetDefaultContentSetting(CONTENT_SETTING_BLOCK); 129 130 // The updated pref shouldn't be sent to the cache immediately. 131 EXPECT_EQ(CONTENT_SETTING_ASK, cache_->CachedDefaultContentSetting()); 132 133 // Run IO thread tasks. 134 proxy_->DrainIOThread(); 135 136 // Now that IO thread events have been processed, it should be there. 137 EXPECT_EQ(CONTENT_SETTING_BLOCK, cache_->CachedDefaultContentSetting()); 138} 139 140TEST_F(DesktopNotificationServiceTest, GrantPermissionSentToCache) { 141 GURL url("http://allowed.com"); 142 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed, 143 proxy_->CacheHasPermission(cache_, url)); 144 145 service_->GrantPermission(url); 146 147 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed, 148 proxy_->CacheHasPermission(cache_, url)); 149} 150 151TEST_F(DesktopNotificationServiceTest, DenyPermissionSentToCache) { 152 GURL url("http://denied.com"); 153 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed, 154 proxy_->CacheHasPermission(cache_, url)); 155 156 service_->DenyPermission(url); 157 158 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionDenied, 159 proxy_->CacheHasPermission(cache_, url)); 160} 161 162TEST_F(DesktopNotificationServiceTest, PrefChangesSentToCache) { 163 PrefService* prefs = profile()->GetPrefs(); 164 165 ListValue* allowed_sites = 166 prefs->GetMutableList(prefs::kDesktopNotificationAllowedOrigins); 167 { 168 allowed_sites->Append(new StringValue(GURL("http://allowed.com").spec())); 169 ScopedPrefUpdate updateAllowed( 170 prefs, prefs::kDesktopNotificationAllowedOrigins); 171 } 172 173 ListValue* denied_sites = 174 prefs->GetMutableList(prefs::kDesktopNotificationDeniedOrigins); 175 { 176 denied_sites->Append(new StringValue(GURL("http://denied.com").spec())); 177 ScopedPrefUpdate updateDenied( 178 prefs, prefs::kDesktopNotificationDeniedOrigins); 179 } 180 181 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed, 182 proxy_->CacheHasPermission(cache_, GURL("http://allowed.com"))); 183 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionDenied, 184 proxy_->CacheHasPermission(cache_, GURL("http://denied.com"))); 185} 186 187TEST_F(DesktopNotificationServiceTest, GetAllowedOrigins) { 188 service_->GrantPermission(GURL("http://allowed2.com")); 189 service_->GrantPermission(GURL("http://allowed.com")); 190 191 std::vector<GURL> allowed_origins(service_->GetAllowedOrigins()); 192 ASSERT_EQ(2u, allowed_origins.size()); 193 EXPECT_EQ(GURL("http://allowed2.com"), allowed_origins[0]); 194 EXPECT_EQ(GURL("http://allowed.com"), allowed_origins[1]); 195} 196 197TEST_F(DesktopNotificationServiceTest, GetBlockedOrigins) { 198 service_->DenyPermission(GURL("http://denied2.com")); 199 service_->DenyPermission(GURL("http://denied.com")); 200 201 std::vector<GURL> denied_origins(service_->GetBlockedOrigins()); 202 ASSERT_EQ(2u, denied_origins.size()); 203 EXPECT_EQ(GURL("http://denied2.com"), denied_origins[0]); 204 EXPECT_EQ(GURL("http://denied.com"), denied_origins[1]); 205} 206 207TEST_F(DesktopNotificationServiceTest, ResetAllSentToCache) { 208 GURL allowed_url("http://allowed.com"); 209 service_->GrantPermission(allowed_url); 210 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed, 211 proxy_->CacheHasPermission(cache_, allowed_url)); 212 GURL denied_url("http://denied.com"); 213 service_->DenyPermission(denied_url); 214 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionDenied, 215 proxy_->CacheHasPermission(cache_, denied_url)); 216 217 service_->ResetAllOrigins(); 218 219 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed, 220 proxy_->CacheHasPermission(cache_, allowed_url)); 221 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed, 222 proxy_->CacheHasPermission(cache_, denied_url)); 223} 224 225TEST_F(DesktopNotificationServiceTest, ResetAllowedSentToCache) { 226 GURL allowed_url("http://allowed.com"); 227 service_->GrantPermission(allowed_url); 228 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionAllowed, 229 proxy_->CacheHasPermission(cache_, allowed_url)); 230 231 service_->ResetAllowedOrigin(allowed_url); 232 233 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed, 234 proxy_->CacheHasPermission(cache_, allowed_url)); 235} 236 237TEST_F(DesktopNotificationServiceTest, ResetBlockedSentToCache) { 238 GURL denied_url("http://denied.com"); 239 service_->DenyPermission(denied_url); 240 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionDenied, 241 proxy_->CacheHasPermission(cache_, denied_url)); 242 243 service_->ResetBlockedOrigin(denied_url); 244 245 EXPECT_EQ(WebKit::WebNotificationPresenter::PermissionNotAllowed, 246 proxy_->CacheHasPermission(cache_, denied_url)); 247} 248 249} // namespace 250