| // Copyright 2012 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include <stddef.h> |
| |
| #include <algorithm> |
| #include <string> |
| #include <utility> |
| |
| #include "base/command_line.h" |
| #include "base/containers/to_vector.h" |
| #include "base/memory/raw_ptr.h" |
| #include "base/memory/ref_counted.h" |
| #include "base/path_service.h" |
| #include "base/strings/stringprintf.h" |
| #include "base/task/single_thread_task_runner.h" |
| #include "base/test/metrics/histogram_tester.h" |
| #include "base/test/scoped_mock_time_message_loop_task_runner.h" |
| #include "base/test/simple_test_tick_clock.h" |
| #include "base/test/values_test_util.h" |
| #include "base/values.h" |
| #include "build/chromeos_buildflags.h" |
| #include "chrome/browser/extensions/api/debugger/debugger_api.h" |
| #include "chrome/browser/extensions/api/debugger/extension_dev_tools_infobar_delegate.h" |
| #include "chrome/browser/extensions/extension_apitest.h" |
| #include "chrome/browser/extensions/extension_management_test_util.h" |
| #include "chrome/browser/extensions/profile_util.h" |
| #include "chrome/browser/profiles/profile.h" |
| #include "chrome/browser/profiles/profile_destroyer.h" |
| #include "chrome/browser/profiles/profile_manager.h" |
| #include "chrome/browser/profiles/profile_test_util.h" |
| #include "chrome/common/chrome_paths.h" |
| #include "chrome/common/chrome_switches.h" |
| #include "chrome/common/pref_names.h" |
| #include "chrome/test/base/testing_profile.h" |
| #include "components/infobars/content/content_infobar_manager.h" |
| #include "components/infobars/core/infobar.h" |
| #include "components/infobars/core/infobar_delegate.h" |
| #include "components/policy/core/common/mock_configuration_policy_provider.h" |
| #include "components/prefs/pref_service.h" |
| #include "components/security_interstitials/content/security_interstitial_controller_client.h" |
| #include "components/security_interstitials/content/security_interstitial_page.h" |
| #include "components/security_interstitials/content/security_interstitial_tab_helper.h" |
| #include "components/security_interstitials/content/settings_page_helper.h" |
| #include "components/security_interstitials/core/metrics_helper.h" |
| #include "components/sessions/content/session_tab_helper.h" |
| #include "content/public/test/browser_test.h" |
| #include "content/public/test/browser_test_utils.h" |
| #include "content/public/test/mock_navigation_handle.h" |
| #include "content/public/test/no_renderer_crashes_assertion.h" |
| #include "extensions/browser/api_test_utils.h" |
| #include "extensions/browser/extension_function.h" |
| #include "extensions/browser/extension_util.h" |
| #include "extensions/buildflags/buildflags.h" |
| #include "extensions/common/extension.h" |
| #include "extensions/common/extension_builder.h" |
| #include "extensions/common/manifest_constants.h" |
| #include "extensions/common/permissions/permissions_data.h" |
| #include "extensions/common/switches.h" |
| #include "extensions/test/test_extension_dir.h" |
| #include "net/dns/mock_host_resolver.h" |
| #include "pdf/buildflags.h" |
| |
| #if BUILDFLAG(ENABLE_EXTENSIONS) |
| #include "chrome/browser/ui/browser.h" |
| #include "chrome/browser/ui/tabs/tab_strip_model.h" |
| #include "chrome/test/base/ui_test_utils.h" |
| #endif |
| |
| #if BUILDFLAG(ENABLE_PDF) |
| #include "base/test/scoped_feature_list.h" |
| #include "base/test/with_feature_override.h" |
| #include "chrome/browser/pdf/pdf_extension_test_util.h" |
| #include "chrome/browser/pdf/test_pdf_viewer_stream_manager.h" |
| #include "pdf/pdf_features.h" |
| #endif // BUILDFLAG(ENABLE_PDF) |
| |
| #if BUILDFLAG(IS_CHROMEOS) |
| #include "chrome/browser/ash/profiles/profile_helper.h" |
| #endif // BUILDFLAG(IS_CHROMEOS) |
| |
| namespace extensions { |
| |
| namespace { |
| |
| #if BUILDFLAG(ENABLE_EXTENSIONS) |
| // Gets all URLs from the list of targets, with the ports removed. |
| std::vector<std::string> GetTargetUrlsWithoutPorts( |
| const base::Value::List& targets) { |
| return base::ToVector(targets, [](const base::Value& value) { |
| GURL::Replacements remove_port; |
| remove_port.ClearPort(); |
| const std::string* url = value.GetDict().FindString("url"); |
| return url ? GURL(*url).ReplaceComponents(remove_port).spec() |
| : "<missing field>"; |
| }); |
| } |
| #endif // BUILDFLAG(ENABLE_EXTENSIONS) |
| |
| } // namespace |
| |
| using testing::ElementsAre; |
| using testing::Eq; |
| |
| class DebuggerApiTest : public ExtensionApiTest { |
| protected: |
| ~DebuggerApiTest() override = default; |
| |
| void SetUpCommandLine(base::CommandLine* command_line) override; |
| void SetUpOnMainThread() override; |
| |
| // Run the attach function. If |expected_error| is not empty, then the |
| // function should fail with the error. Otherwise, the function is expected |
| // to succeed. If `ignore_navigation_errors` then navigation errors will be |
| // ignored. |
| testing::AssertionResult RunAttachFunction( |
| const GURL& url, |
| const std::string& expected_error, |
| bool ignore_navigation_errors = false); |
| testing::AssertionResult RunAttachFunction( |
| const content::WebContents* web_contents, |
| const std::string& expected_error); |
| |
| const Extension* extension() const { return extension_.get(); } |
| base::CommandLine* command_line() const { return command_line_; } |
| |
| void AdvanceClock(base::TimeDelta time) { clock_.Advance(time); } |
| |
| private: |
| testing::AssertionResult RunAttachFunctionOnTarget( |
| const std::string& debuggee_target, const std::string& expected_error); |
| |
| // The command-line for the test process, preserved in order to modify |
| // mid-test. |
| raw_ptr<base::CommandLine> command_line_; |
| |
| // A basic extension with the debugger permission. |
| scoped_refptr<const Extension> extension_; |
| |
| // A temporary directory in which to create and load from the |
| // |extension_|. |
| TestExtensionDir test_extension_dir_; |
| base::SimpleTestTickClock clock_; |
| }; |
| |
| void DebuggerApiTest::SetUpCommandLine(base::CommandLine* command_line) { |
| ExtensionApiTest::SetUpCommandLine(command_line); |
| // We need to hold onto |command_line| in order to modify it during the test. |
| command_line_ = command_line; |
| } |
| |
| void DebuggerApiTest::SetUpOnMainThread() { |
| ExtensionApiTest::SetUpOnMainThread(); |
| |
| host_resolver()->AddRule("*", "127.0.0.1"); |
| ASSERT_TRUE(embedded_test_server()->Start()); |
| |
| test_extension_dir_.WriteManifest( |
| R"({ |
| "name": "debugger", |
| "version": "0.1", |
| "manifest_version": 2, |
| "permissions": ["debugger"] |
| })"); |
| test_extension_dir_.WriteFile(FILE_PATH_LITERAL("test_file.html"), |
| "<html>Hello world!</html>"); |
| extension_ = LoadExtension(test_extension_dir_.UnpackedPath()); |
| ASSERT_TRUE(extension_); |
| } |
| |
| testing::AssertionResult DebuggerApiTest::RunAttachFunction( |
| const GURL& url, |
| const std::string& expected_error, |
| bool ignore_navigation_errors) { |
| auto* web_contents = GetActiveWebContents(); |
| bool navigation_result = NavigateToURL(web_contents, url); |
| // Most navigations should succeed, but some are allowed to fail. |
| if (!ignore_navigation_errors) { |
| EXPECT_TRUE(navigation_result); |
| } |
| return RunAttachFunction(web_contents, expected_error); |
| } |
| |
| testing::AssertionResult DebuggerApiTest::RunAttachFunction( |
| const content::WebContents* web_contents, |
| const std::string& expected_error) { |
| // Attach by tabId. |
| int tab_id = sessions::SessionTabHelper::IdForTab(web_contents).id(); |
| std::string debugee_by_tab = base::StringPrintf("{\"tabId\": %d}", tab_id); |
| testing::AssertionResult result = |
| RunAttachFunctionOnTarget(debugee_by_tab, expected_error); |
| if (!result) { |
| return result; |
| } |
| |
| // Attach by targetId. |
| scoped_refptr<DebuggerGetTargetsFunction> get_targets_function = |
| new DebuggerGetTargetsFunction(); |
| std::optional<base::Value> value( |
| api_test_utils::RunFunctionAndReturnSingleResult( |
| get_targets_function.get(), "[]", profile())); |
| EXPECT_TRUE(value->is_list()); |
| |
| std::string debugger_target_id; |
| for (const base::Value& target_value : value->GetList()) { |
| EXPECT_TRUE(target_value.is_dict()); |
| std::optional<int> id = target_value.GetDict().FindInt("tabId"); |
| if (id == tab_id) { |
| const std::string* id_str = target_value.GetDict().FindString("id"); |
| EXPECT_TRUE(id_str); |
| debugger_target_id = *id_str; |
| break; |
| } |
| } |
| EXPECT_TRUE(!debugger_target_id.empty()); |
| |
| std::string debugee_by_target_id = |
| base::StringPrintf("{\"targetId\": \"%s\"}", debugger_target_id.c_str()); |
| return RunAttachFunctionOnTarget(debugee_by_target_id, expected_error); |
| } |
| |
| testing::AssertionResult DebuggerApiTest::RunAttachFunctionOnTarget( |
| const std::string& debuggee_target, const std::string& expected_error) { |
| scoped_refptr<DebuggerAttachFunction> attach_function = |
| new DebuggerAttachFunction(); |
| attach_function->set_extension(extension_.get()); |
| |
| std::string actual_error; |
| if (!api_test_utils::RunFunction( |
| attach_function.get(), |
| base::StringPrintf("[%s, \"1.1\"]", debuggee_target.c_str()), |
| profile())) { |
| actual_error = attach_function->GetError(); |
| } else { |
| // Clean up and detach. |
| scoped_refptr<DebuggerDetachFunction> detach_function = |
| new DebuggerDetachFunction(); |
| detach_function->set_extension(extension_.get()); |
| if (!api_test_utils::RunFunction( |
| detach_function.get(), |
| base::StringPrintf("[%s]", debuggee_target.c_str()), profile())) { |
| return testing::AssertionFailure() << "Could not detach from " |
| << debuggee_target << " : " << detach_function->GetError(); |
| } |
| } |
| |
| if (expected_error.empty() && !actual_error.empty()) { |
| return testing::AssertionFailure() << "Could not attach to " |
| << debuggee_target << " : " << actual_error; |
| } else if (actual_error != expected_error) { |
| return testing::AssertionFailure() << "Did not get correct error upon " |
| << "attach to " << debuggee_target << " : " |
| << "expected: " << expected_error << ", found: " << actual_error; |
| } |
| return testing::AssertionSuccess(); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(DebuggerApiTest, |
| DebuggerNotAllowedOnOtherExtensionPages) { |
| // Load another arbitrary extension with an associated resource (popup.html). |
| base::FilePath path; |
| ASSERT_TRUE(base::PathService::Get(chrome::DIR_TEST_DATA, &path)); |
| path = path.AppendASCII("extensions").AppendASCII("simple_with_popup"); |
| const Extension* another_extension = LoadExtension(path); |
| ASSERT_TRUE(another_extension); |
| |
| GURL other_ext_url = another_extension->GetResourceURL("popup.html"); |
| |
| // This extension should not be able to access another extension. |
| EXPECT_TRUE(RunAttachFunction( |
| other_ext_url, manifest_errors::kCannotAccessExtensionUrl)); |
| |
| // This extension *should* be able to debug itself. |
| EXPECT_TRUE(RunAttachFunction(extension()->GetResourceURL("test_file.html"), |
| std::string())); |
| |
| // Append extensions on chrome urls switch. The extension should now be able |
| // to debug any extension. |
| command_line()->AppendSwitch(switches::kExtensionsOnChromeURLs); |
| EXPECT_TRUE(RunAttachFunction(other_ext_url, std::string())); |
| } |
| |
| #if BUILDFLAG(ENABLE_EXTENSIONS) |
| // TODO(crbug.com/371432155): Port to desktop Android when the chrome.tabs API |
| // is supported. |
| IN_PROC_BROWSER_TEST_F(DebuggerApiTest, |
| DebuggerAllowedOnFileUrlsWithFileAccess) { |
| EXPECT_TRUE(RunExtensionTest("debugger_file_access", |
| {.custom_arg = "enabled"}, |
| {.allow_file_access = true})) |
| << message_; |
| } |
| |
| // TODO(crbug.com/371432155): Port to desktop Android when the chrome.tabs API |
| // is supported. |
| IN_PROC_BROWSER_TEST_F(DebuggerApiTest, |
| DebuggerNotAllowedOnFileUrlsWithoutAccess) { |
| EXPECT_TRUE(RunExtensionTest("debugger_file_access")) << message_; |
| } |
| #endif // BUILDFLAG(ENABLE_EXTENSIONS) |
| |
| class TestInterstitialPage |
| : public security_interstitials::SecurityInterstitialPage { |
| public: |
| TestInterstitialPage(content::WebContents* web_contents, |
| const GURL& request_url) |
| : SecurityInterstitialPage( |
| web_contents, |
| request_url, |
| std::make_unique< |
| security_interstitials::SecurityInterstitialControllerClient>( |
| web_contents, |
| CreateTestMetricsHelper(web_contents), |
| nullptr, |
| base::i18n::GetConfiguredLocale(), |
| GURL(), |
| /* settings_page_helper*/ nullptr)) {} |
| |
| ~TestInterstitialPage() override = default; |
| void OnInterstitialClosing() override {} |
| |
| protected: |
| void PopulateInterstitialStrings(base::Value::Dict& load_time_data) override { |
| } |
| |
| std::unique_ptr<security_interstitials::MetricsHelper> |
| CreateTestMetricsHelper(content::WebContents* web_contents) { |
| security_interstitials::MetricsHelper::ReportDetails report_details; |
| report_details.metric_prefix = "test_blocking_page"; |
| return std::make_unique<security_interstitials::MetricsHelper>( |
| GURL(), report_details, nullptr); |
| } |
| }; |
| |
| IN_PROC_BROWSER_TEST_F(DebuggerApiTest, |
| DebuggerNotAllowedOnRestrictedBlobUrls) { |
| content::WebContents* web_contents = GetActiveWebContents(); |
| // Use chrome://version because it is webui on Win/Mac/Linux and Android. |
| EXPECT_TRUE(content::NavigateToURL(web_contents, GURL("chrome://version"))); |
| EXPECT_TRUE(content::WaitForLoadStop(web_contents)); |
| ASSERT_TRUE(content::ExecJs(web_contents, R"( |
| var blob = new Blob([JSON.stringify({foo: 'bar'})], { |
| type: "application/json", |
| }); |
| var burl = URL.createObjectURL(blob, 'application/json'); |
| window.open(burl); |
| )")); |
| content::WebContents* blob_web_contents = GetActiveWebContents(); |
| EXPECT_NE(blob_web_contents, web_contents); |
| EXPECT_TRUE(content::WaitForLoadStop(blob_web_contents)); |
| EXPECT_EQ("{\"foo\":\"bar\"}", |
| content::EvalJs(blob_web_contents, "document.body.innerText")); |
| EXPECT_TRUE( |
| RunAttachFunction(blob_web_contents, "Cannot access a chrome:// URL")); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(DebuggerApiTest, |
| DebuggerNotAllowedOnPolicyRestrictedBlobUrls) { |
| GURL url(embedded_test_server()->GetURL("a.com", "/simple.html")); |
| content::WebContents* web_contents = GetActiveWebContents(); |
| EXPECT_TRUE(content::NavigateToURL(web_contents, url)); |
| EXPECT_TRUE(content::WaitForLoadStop(web_contents)); |
| ASSERT_TRUE(content::ExecJs(web_contents, R"( |
| var blob = new Blob([JSON.stringify({foo: 'bar'})], { |
| type: "application/json", |
| }); |
| window.open(URL.createObjectURL(blob, 'application/json')); |
| )")); |
| content::WebContents* blob_web_contents = GetActiveWebContents(); |
| EXPECT_NE(blob_web_contents, web_contents); |
| EXPECT_TRUE(content::WaitForLoadStop(blob_web_contents)); |
| EXPECT_EQ("{\"foo\":\"bar\"}", |
| content::EvalJs(blob_web_contents, "document.body.innerText")); |
| base::RunLoop run_loop; |
| URLPatternSet default_blocked_hosts; |
| default_blocked_hosts.AddPattern( |
| URLPattern(URLPattern::SCHEME_HTTP, "http://a.com/*")); |
| PermissionsData::SetDefaultPolicyHostRestrictions( |
| util::GetBrowserContextId(profile()), default_blocked_hosts, |
| URLPatternSet()); |
| EXPECT_TRUE( |
| RunAttachFunction(blob_web_contents, "Cannot attach to this target.")); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(DebuggerApiTest, |
| DebuggerNotAllowedOnSecurityInterstitials) { |
| content::WebContents* web_contents = GetActiveWebContents(); |
| std::unique_ptr<content::MockNavigationHandle> navigation_handle = |
| std::make_unique<content::MockNavigationHandle>( |
| GURL("https://google.com/"), web_contents->GetPrimaryMainFrame()); |
| navigation_handle->set_has_committed(true); |
| navigation_handle->set_is_same_document(false); |
| EXPECT_TRUE(RunAttachFunction(web_contents, "")); |
| |
| security_interstitials::SecurityInterstitialTabHelper::AssociateBlockingPage( |
| navigation_handle.get(), |
| std::make_unique<TestInterstitialPage>(web_contents, GURL())); |
| security_interstitials::SecurityInterstitialTabHelper::FromWebContents( |
| web_contents) |
| ->DidFinishNavigation(navigation_handle.get()); |
| |
| EXPECT_TRUE(RunAttachFunction(web_contents, "Cannot attach to this target.")); |
| } |
| |
| #if BUILDFLAG(ENABLE_EXTENSIONS) |
| // TODO(crbug.com/405218860): Port this test to desktop Android when we have |
| // better test control over windows and tabs. |
| IN_PROC_BROWSER_TEST_F(DebuggerApiTest, InfoBar) { |
| int tab_id = |
| sessions::SessionTabHelper::IdForTab(GetActiveWebContents()).id(); |
| scoped_refptr<DebuggerAttachFunction> attach_function; |
| scoped_refptr<DebuggerDetachFunction> detach_function; |
| |
| Browser* another_browser = |
| Browser::Create(Browser::CreateParams(profile(), true)); |
| AddBlankTabAndShow(another_browser); |
| AddBlankTabAndShow(another_browser); |
| int tab_id2 = sessions::SessionTabHelper::IdForTab( |
| another_browser->tab_strip_model()->GetActiveWebContents()) |
| .id(); |
| |
| infobars::ContentInfoBarManager* manager1 = |
| infobars::ContentInfoBarManager::FromWebContents(GetActiveWebContents()); |
| infobars::ContentInfoBarManager* manager2 = |
| infobars::ContentInfoBarManager::FromWebContents( |
| another_browser->tab_strip_model()->GetWebContentsAt(0)); |
| infobars::ContentInfoBarManager* manager3 = |
| infobars::ContentInfoBarManager::FromWebContents( |
| another_browser->tab_strip_model()->GetWebContentsAt(1)); |
| |
| // Attaching to one tab should create infobars in both browsers. |
| attach_function = new DebuggerAttachFunction(); |
| attach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| attach_function.get(), |
| base::StringPrintf("[{\"tabId\": %d}, \"1.1\"]", tab_id), profile())); |
| EXPECT_EQ(1u, manager1->infobars().size()); |
| EXPECT_EQ(1u, manager2->infobars().size()); |
| EXPECT_EQ(1u, manager3->infobars().size()); |
| |
| // Attaching to another tab should not create more infobars. |
| attach_function = new DebuggerAttachFunction(); |
| attach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| attach_function.get(), |
| base::StringPrintf("[{\"tabId\": %d}, \"1.1\"]", tab_id2), profile())); |
| EXPECT_EQ(1u, manager1->infobars().size()); |
| EXPECT_EQ(1u, manager2->infobars().size()); |
| EXPECT_EQ(1u, manager3->infobars().size()); |
| |
| // Detaching from one of the tabs should not remove infobars. |
| detach_function = new DebuggerDetachFunction(); |
| detach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| detach_function.get(), base::StringPrintf("[{\"tabId\": %d}]", tab_id2), |
| profile())); |
| EXPECT_EQ(1u, manager1->infobars().size()); |
| EXPECT_EQ(1u, manager2->infobars().size()); |
| EXPECT_EQ(1u, manager3->infobars().size()); |
| |
| // Detaching from the other tab also should not remove infobars, since even |
| // though there is no longer an extension attached, the infobar can only be |
| // dismissed by explicit user action. |
| detach_function = new DebuggerDetachFunction(); |
| detach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| detach_function.get(), base::StringPrintf("[{\"tabId\": %d}]", tab_id), |
| profile())); |
| EXPECT_EQ(1u, manager1->infobars().size()); |
| EXPECT_EQ(1u, manager2->infobars().size()); |
| EXPECT_EQ(1u, manager3->infobars().size()); |
| |
| // Attach again; should not create infobars. |
| attach_function = new DebuggerAttachFunction(); |
| attach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| attach_function.get(), |
| base::StringPrintf("[{\"tabId\": %d}, \"1.1\"]", tab_id), profile())); |
| EXPECT_EQ(1u, manager1->infobars().size()); |
| EXPECT_EQ(1u, manager2->infobars().size()); |
| EXPECT_EQ(1u, manager3->infobars().size()); |
| |
| // Remove the global infobar by simulating what happens when the user clicks |
| // the close button (see InfoBarView::ButtonPressed()). The |
| // InfoBarDismissed() call will remove the infobars everywhere except on |
| // |manager2| itself; the RemoveSelf() call removes that one. |
| manager2->infobars()[0]->delegate()->InfoBarDismissed(); |
| manager2->infobars()[0]->RemoveSelf(); |
| EXPECT_EQ(0u, manager1->infobars().size()); |
| EXPECT_EQ(0u, manager2->infobars().size()); |
| EXPECT_EQ(0u, manager3->infobars().size()); |
| detach_function = new DebuggerDetachFunction(); |
| detach_function->set_extension(extension()); |
| // Cannot detach again. |
| ASSERT_FALSE(api_test_utils::RunFunction( |
| detach_function.get(), base::StringPrintf("[{\"tabId\": %d}]", tab_id), |
| profile())); |
| |
| // Attaching once again should create a new infobar. |
| attach_function = new DebuggerAttachFunction(); |
| attach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| attach_function.get(), |
| base::StringPrintf("[{\"tabId\": %d}, \"1.1\"]", tab_id), profile())); |
| EXPECT_EQ(1u, manager1->infobars().size()); |
| EXPECT_EQ(1u, manager2->infobars().size()); |
| EXPECT_EQ(1u, manager3->infobars().size()); |
| |
| // Closing tab should not affect anything. |
| EXPECT_EQ(2, another_browser->tab_strip_model()->count()); |
| another_browser->tab_strip_model()->CloseWebContentsAt(1, 0); |
| EXPECT_EQ(1, another_browser->tab_strip_model()->count()); |
| manager3 = nullptr; |
| EXPECT_EQ(1u, manager1->infobars().size()); |
| EXPECT_EQ(1u, manager2->infobars().size()); |
| |
| // Closing browser should not affect anything. |
| CloseBrowserSynchronously(another_browser); |
| manager2 = nullptr; |
| another_browser = nullptr; |
| EXPECT_EQ(1u, manager1->infobars().size()); |
| |
| // Detach should not affect anything. |
| detach_function = new DebuggerDetachFunction(); |
| detach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| detach_function.get(), base::StringPrintf("[{\"tabId\": %d}]", tab_id), |
| profile())); |
| EXPECT_EQ(1u, manager1->infobars().size()); |
| } |
| #endif // BUILDFLAG(ENABLE_EXTENSIONS) |
| |
| IN_PROC_BROWSER_TEST_F(DebuggerApiTest, InfoBarIsRemovedAfterFiveSeconds) { |
| int tab_id = |
| sessions::SessionTabHelper::IdForTab(GetActiveWebContents()).id(); |
| infobars::ContentInfoBarManager* manager = |
| infobars::ContentInfoBarManager::FromWebContents(GetActiveWebContents()); |
| |
| // Attaching to the tab should create an infobar. |
| auto attach_function = base::MakeRefCounted<DebuggerAttachFunction>(); |
| attach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| attach_function.get(), |
| base::StringPrintf("[{\"tabId\": %d}, \"1.1\"]", tab_id), profile())); |
| EXPECT_EQ(1u, manager->infobars().size()); |
| |
| // Detaching from the tab should remove the infobar after 5 seconds. |
| auto detach_function = base::MakeRefCounted<DebuggerDetachFunction>(); |
| detach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| detach_function.get(), base::StringPrintf("[{\"tabId\": %d}]", tab_id), |
| profile())); |
| |
| // Even though the extension detached, the infobar should not detach |
| // immediately, and should remain visible for 5 seconds to ensure the user |
| // has an opportunity to see it. |
| base::RunLoop run_loop; |
| base::SingleThreadTaskRunner::GetCurrentDefault()->PostDelayedTask( |
| FROM_HERE, run_loop.QuitClosure(), |
| ExtensionDevToolsInfoBarDelegate::kAutoCloseDelay); |
| EXPECT_EQ(1u, manager->infobars().size()); // Infobar is still shown. |
| |
| // Advance the clock by 5 seconds, and verify the infobar is removed. |
| AdvanceClock(ExtensionDevToolsInfoBarDelegate::kAutoCloseDelay); |
| run_loop.Run(); |
| |
| EXPECT_EQ(0u, manager->infobars().size()); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(DebuggerApiTest, |
| InfoBarIsNotRemovedWhenAnotherDebuggerAttached) { |
| const int tab_id1 = |
| sessions::SessionTabHelper::IdForTab(GetActiveWebContents()).id(); |
| infobars::ContentInfoBarManager* manager = |
| infobars::ContentInfoBarManager::FromWebContents(GetActiveWebContents()); |
| |
| ASSERT_TRUE(embedded_test_server()->Started()); |
| ASSERT_TRUE( |
| NavigateToURLInNewTab(embedded_test_server()->GetURL("/simple.html"))); |
| const int tab_id2 = |
| sessions::SessionTabHelper::IdForTab(GetActiveWebContents()).id(); |
| |
| // Attaching to a tab should create an infobar. |
| { |
| auto attach_function = base::MakeRefCounted<DebuggerAttachFunction>(); |
| attach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| attach_function.get(), |
| base::StringPrintf("[{\"tabId\": %d}, \"1.1\"]", tab_id1), profile())); |
| } |
| |
| EXPECT_EQ(1u, manager->infobars().size()); |
| |
| // Attaching to a 2nd tab, to have another attached debugger. |
| { |
| auto attach_function = base::MakeRefCounted<DebuggerAttachFunction>(); |
| attach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| attach_function.get(), |
| base::StringPrintf("[{\"tabId\": %d}, \"1.1\"]", tab_id2), profile())); |
| } |
| |
| EXPECT_EQ(1u, manager->infobars().size()); |
| |
| // Detaching from the tab should not remove the infobar after 5 seconds, as |
| // another debugger is still attached. |
| { |
| auto detach_function = base::MakeRefCounted<DebuggerDetachFunction>(); |
| detach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| detach_function.get(), base::StringPrintf("[{\"tabId\": %d}]", tab_id1), |
| profile())); |
| } |
| |
| // Advance the clock by 5 seconds. |
| { |
| base::RunLoop run_loop; |
| base::SingleThreadTaskRunner::GetCurrentDefault()->PostDelayedTask( |
| FROM_HERE, run_loop.QuitClosure(), |
| ExtensionDevToolsInfoBarDelegate::kAutoCloseDelay); |
| AdvanceClock(ExtensionDevToolsInfoBarDelegate::kAutoCloseDelay); |
| run_loop.Run(); |
| } |
| |
| // Verify inforbar not removed. |
| EXPECT_EQ(1u, manager->infobars().size()); |
| |
| // Now detach the last debugger. |
| { |
| auto detach_function = base::MakeRefCounted<DebuggerDetachFunction>(); |
| detach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| detach_function.get(), base::StringPrintf("[{\"tabId\": %d}]", tab_id2), |
| profile())); |
| } |
| |
| // Advance the clock by 5 seconds, once again. |
| { |
| base::RunLoop run_loop; |
| base::SingleThreadTaskRunner::GetCurrentDefault()->PostDelayedTask( |
| FROM_HERE, run_loop.QuitClosure(), |
| ExtensionDevToolsInfoBarDelegate::kAutoCloseDelay); |
| AdvanceClock(ExtensionDevToolsInfoBarDelegate::kAutoCloseDelay); |
| run_loop.Run(); |
| } |
| |
| // Verify inforbar removed. |
| EXPECT_EQ(0u, manager->infobars().size()); |
| } |
| |
| #if !BUILDFLAG(IS_ANDROID) |
| // Android does not support multiple profiles in Chrome. User switching is |
| // handled at the OS level. |
| class CrossProfileDebuggerApiTest : public DebuggerApiTest { |
| protected: |
| Profile* other_profile() { return other_profile_; } |
| Profile* otr_profile() { return otr_profile_; } |
| |
| std::unique_ptr<content::WebContents> CreateTabWithProfileAndNavigate( |
| Profile* profile, |
| const GURL& url) { |
| auto wc = content::WebContents::Create( |
| content::WebContents::CreateParams(profile)); |
| EXPECT_TRUE(content::NavigateToURL(wc.get(), url)); |
| return wc; |
| } |
| |
| private: |
| void SetUpOnMainThread() override { |
| #if BUILDFLAG(IS_CHROMEOS) |
| ash::ProfileHelper::SetAlwaysReturnPrimaryUserForTesting(true); |
| #endif // BUILDFLAG(IS_CHROMEOS) |
| DebuggerApiTest::SetUpOnMainThread(); |
| ProfileManager* const profile_manager = profile_util::GetProfileManager(); |
| |
| other_profile_ = &profiles::testing::CreateProfileSync( |
| profile_manager, profile_manager->GenerateNextProfileDirectoryPath()); |
| otr_profile_ = profile()->GetPrimaryOTRProfile(true); |
| } |
| |
| void TearDownOnMainThread() override { |
| ProfileDestroyer::DestroyOTRProfileWhenAppropriate(otr_profile_); |
| DebuggerApiTest::TearDownOnMainThread(); |
| } |
| |
| raw_ptr<Profile, DanglingUntriaged> other_profile_ = nullptr; |
| raw_ptr<Profile, DanglingUntriaged> otr_profile_ = nullptr; |
| }; |
| |
| IN_PROC_BROWSER_TEST_F(CrossProfileDebuggerApiTest, GetTargets) { |
| auto wc1 = CreateTabWithProfileAndNavigate( |
| other_profile(), |
| embedded_test_server()->GetURL("/simple.html?other_profile")); |
| auto wc2 = CreateTabWithProfileAndNavigate( |
| otr_profile(), |
| embedded_test_server()->GetURL("/simple.html?off_the_record")); |
| |
| { |
| auto get_targets_function = |
| base::MakeRefCounted<DebuggerGetTargetsFunction>(); |
| base::Value value = |
| std::move(*api_test_utils::RunFunctionAndReturnSingleResult( |
| get_targets_function.get(), "[]", profile())); |
| |
| ASSERT_TRUE(value.is_list()); |
| EXPECT_THAT(std::move(value).TakeList(), |
| ElementsAre(base::test::DictionaryHasValue( |
| "url", base::Value("about:blank")))); |
| } |
| |
| { |
| auto get_targets_function = |
| base::MakeRefCounted<DebuggerGetTargetsFunction>(); |
| base::Value value = |
| std::move(*api_test_utils::RunFunctionAndReturnSingleResult( |
| get_targets_function.get(), "[]", profile(), |
| api_test_utils::FunctionMode::kIncognito)); |
| |
| ASSERT_TRUE(value.is_list()); |
| const base::Value::List targets = std::move(value).TakeList(); |
| std::vector<std::string> urls = GetTargetUrlsWithoutPorts(targets); |
| EXPECT_THAT(urls, testing::UnorderedElementsAre( |
| "about:blank", |
| "http://127.0.0.1/simple.html?off_the_record")); |
| } |
| } |
| |
| IN_PROC_BROWSER_TEST_F(CrossProfileDebuggerApiTest, Attach) { |
| auto wc1 = CreateTabWithProfileAndNavigate( |
| other_profile(), |
| embedded_test_server()->GetURL("/simple.html?other_profile")); |
| std::string target_in_other_profile = base::StringPrintf( |
| "[{\"targetId\": \"%s\"}, \"1.1\"]", |
| content::DevToolsAgentHost::GetOrCreateFor(wc1.get())->GetId().c_str()); |
| |
| { |
| auto debugger_attach_function = |
| base::MakeRefCounted<DebuggerAttachFunction>(); |
| debugger_attach_function->set_extension(extension()); |
| EXPECT_FALSE(api_test_utils::RunFunction( |
| debugger_attach_function.get(), target_in_other_profile, profile())); |
| } |
| { |
| auto debugger_attach_function = |
| base::MakeRefCounted<DebuggerAttachFunction>(); |
| debugger_attach_function->set_extension(extension()); |
| EXPECT_FALSE(api_test_utils::RunFunction( |
| debugger_attach_function.get(), target_in_other_profile.c_str(), |
| profile(), api_test_utils::FunctionMode::kIncognito)); |
| } |
| |
| auto wc2 = CreateTabWithProfileAndNavigate( |
| otr_profile(), |
| embedded_test_server()->GetURL("/simple.html?off_the_record")); |
| std::string target_in_otr_profile = base::StringPrintf( |
| "[{\"targetId\": \"%s\"}, \"1.1\"]", |
| content::DevToolsAgentHost::GetOrCreateFor(wc2.get())->GetId().c_str()); |
| |
| { |
| auto debugger_attach_function = |
| base::MakeRefCounted<DebuggerAttachFunction>(); |
| debugger_attach_function->set_extension(extension()); |
| EXPECT_FALSE(api_test_utils::RunFunction(debugger_attach_function.get(), |
| target_in_otr_profile.c_str(), |
| profile())); |
| } |
| { |
| auto debugger_attach_function = |
| base::MakeRefCounted<DebuggerAttachFunction>(); |
| debugger_attach_function->set_extension(extension()); |
| EXPECT_TRUE(api_test_utils::RunFunction( |
| debugger_attach_function.get(), target_in_otr_profile.c_str(), |
| profile(), api_test_utils::FunctionMode::kIncognito)); |
| } |
| } |
| #endif // !BUILDFLAG(IS_ANDROID) |
| |
| IN_PROC_BROWSER_TEST_F(DebuggerApiTest, |
| InfoBarIsNotRemovedIfAttachAgainBeforeFiveSeconds) { |
| int tab_id = |
| sessions::SessionTabHelper::IdForTab(GetActiveWebContents()).id(); |
| infobars::ContentInfoBarManager* manager = |
| infobars::ContentInfoBarManager::FromWebContents(GetActiveWebContents()); |
| |
| // Attaching to the tab should create an infobar. |
| auto attach_function = base::MakeRefCounted<DebuggerAttachFunction>(); |
| attach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| attach_function.get(), |
| base::StringPrintf("[{\"tabId\": %d}, \"1.1\"]", tab_id), profile())); |
| EXPECT_EQ(1u, manager->infobars().size()); |
| |
| // Detaching from the tab and attaching it again before 5 seconds should not |
| // remove the infobar. |
| auto detach_function = base::MakeRefCounted<DebuggerDetachFunction>(); |
| detach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| detach_function.get(), base::StringPrintf("[{\"tabId\": %d}]", tab_id), |
| profile())); |
| EXPECT_EQ(1u, manager->infobars().size()); |
| |
| attach_function = base::MakeRefCounted<DebuggerAttachFunction>(); |
| attach_function->set_extension(extension()); |
| ASSERT_TRUE(api_test_utils::RunFunction( |
| attach_function.get(), |
| base::StringPrintf("[{\"tabId\": %d}, \"1.1\"]", tab_id), profile())); |
| // Verify that only one infobar is created. |
| EXPECT_EQ(1u, manager->infobars().size()); |
| |
| // Verify that infobar is not closed after 5 seconds. |
| base::RunLoop run_loop; |
| base::SingleThreadTaskRunner::GetCurrentDefault()->PostDelayedTask( |
| FROM_HERE, run_loop.QuitClosure(), |
| ExtensionDevToolsInfoBarDelegate::kAutoCloseDelay); |
| AdvanceClock(ExtensionDevToolsInfoBarDelegate::kAutoCloseDelay); |
| run_loop.Run(); |
| |
| EXPECT_EQ(1u, manager->infobars().size()); |
| } |
| |
| // Tests that policy blocked hosts supersede the `debugger` |
| // permission. Regression test for crbug.com/1139156. |
| IN_PROC_BROWSER_TEST_F(DebuggerApiTest, TestDefaultPolicyBlockedHosts) { |
| ASSERT_TRUE(embedded_test_server()->Started()); |
| GURL url("https://example.com/test"); |
| // The file does not exist so ignore navigation errors. |
| EXPECT_TRUE( |
| RunAttachFunction(url, std::string(), /*ignore_navigation_errors=*/true)); |
| URLPatternSet default_blocked_hosts; |
| default_blocked_hosts.AddPattern( |
| URLPattern(URLPattern::SCHEME_HTTPS, "https://example.com/*")); |
| PermissionsData::SetDefaultPolicyHostRestrictions( |
| util::GetBrowserContextId(profile()), default_blocked_hosts, |
| URLPatternSet()); |
| |
| EXPECT_TRUE(RunAttachFunction(url, "Cannot attach to this target.", |
| /*ignore_navigation_errors=*/true)); |
| } |
| |
| class DebuggerExtensionApiTest : public ExtensionApiTest { |
| public: |
| void SetUpOnMainThread() override { |
| ExtensionApiTest::SetUpOnMainThread(); |
| host_resolver()->AddRule("*", "127.0.0.1"); |
| embedded_test_server()->ServeFilesFromSourceDirectory("chrome/test/data"); |
| ASSERT_TRUE(StartEmbeddedTestServer()); |
| } |
| }; |
| |
| #if !BUILDFLAG(IS_ANDROID) |
| // TODO(crbug.com/371432155): Port to desktop Android when the chrome.tabs API |
| // is supported. |
| IN_PROC_BROWSER_TEST_F(DebuggerExtensionApiTest, Debugger) { |
| ASSERT_TRUE(RunExtensionTest("debugger")) << message_; |
| } |
| #endif |
| |
| // TODO(crbug.com/40276609): Reenable this test once the |
| // OptimizeServiceWorkerStartRequests feature is re-enabled. |
| IN_PROC_BROWSER_TEST_F(DebuggerExtensionApiTest, DISABLED_DebuggerMv3) { |
| ASSERT_TRUE(RunExtensionTest("debugger_mv3")) << message_; |
| } |
| |
| IN_PROC_BROWSER_TEST_F(DebuggerExtensionApiTest, ParentTargetPermissions) { |
| // Run test with file access disabled. |
| ASSERT_TRUE(RunExtensionTest("parent_target_permissions")) << message_; |
| } |
| |
| IN_PROC_BROWSER_TEST_F(DebuggerExtensionApiTest, ReloadAndResetHistory) { |
| // Run test with file access disabled. |
| ASSERT_TRUE(RunExtensionTest("debugger_reload_and_reset_history")) |
| << message_; |
| } |
| |
| // Tests that an extension is not allowed to inspect a worker through the |
| // inspectWorker debugger command. |
| // Regression test for https://crbug.com/1059577. |
| IN_PROC_BROWSER_TEST_F(DebuggerExtensionApiTest, |
| DebuggerNotAllowedToInvokeInspectWorker) { |
| GURL url(embedded_test_server()->GetURL( |
| "/extensions/api_test/debugger_inspect_worker/inspected_page.html")); |
| |
| EXPECT_TRUE(RunExtensionTest("debugger_inspect_worker", |
| {.custom_arg = url.spec().c_str()})) |
| << message_; |
| } |
| |
| IN_PROC_BROWSER_TEST_F(DebuggerExtensionApiTest, AttachToEmptyUrls) { |
| ASSERT_TRUE(RunExtensionTest("debugger_attach_to_empty_urls")) << message_; |
| } |
| |
| #if BUILDFLAG(ENABLE_PDF) |
| class DebuggerExtensionApiPdfTest : public base::test::WithFeatureOverride, |
| public DebuggerExtensionApiTest { |
| public: |
| DebuggerExtensionApiPdfTest() |
| : base::test::WithFeatureOverride(chrome_pdf::features::kPdfOopif) {} |
| }; |
| |
| // Test that the debuggers can attach to the PDF embedder frame. |
| IN_PROC_BROWSER_TEST_P(DebuggerExtensionApiPdfTest, AttachToPdf) { |
| ASSERT_TRUE(RunExtensionTest("debugger_attach_to_pdf")) << message_; |
| } |
| |
| // TODO(crbug.com/40268279): Stop testing both modes after OOPIF PDF viewer |
| // launches. |
| INSTANTIATE_FEATURE_OVERRIDE_TEST_SUITE(DebuggerExtensionApiPdfTest); |
| |
| class DebuggerExtensionApiOopifPdfTest : public DebuggerExtensionApiTest { |
| public: |
| DebuggerExtensionApiOopifPdfTest() { |
| feature_list_.InitAndEnableFeature(chrome_pdf::features::kPdfOopif); |
| } |
| |
| pdf::TestPdfViewerStreamManager* GetTestPdfViewerStreamManager() { |
| return factory_.GetTestPdfViewerStreamManager(GetActiveWebContents()); |
| } |
| |
| private: |
| base::test::ScopedFeatureList feature_list_; |
| pdf::TestPdfViewerStreamManagerFactory factory_; |
| }; |
| |
| // Test that the inner PDF frames, i.e. the PDF extension frame and the PDF |
| // content frame, aren't visible targets, while the PDF embedder frame is. |
| IN_PROC_BROWSER_TEST_F(DebuggerExtensionApiOopifPdfTest, GetTargets) { |
| GURL pdf_url(embedded_test_server()->GetURL("/pdf/test.pdf")); |
| |
| // Load a full-page PDF. |
| ASSERT_TRUE(ui_test_utils::NavigateToURL(browser(), pdf_url)); |
| content::WebContents* web_contents = GetActiveWebContents(); |
| ASSERT_TRUE(GetTestPdfViewerStreamManager()->WaitUntilPdfLoaded( |
| web_contents->GetPrimaryMainFrame())); |
| |
| // Get targets. |
| auto get_targets_function = |
| base::MakeRefCounted<DebuggerGetTargetsFunction>(); |
| base::Value get_targets_result = |
| std::move(*api_test_utils::RunFunctionAndReturnSingleResult( |
| get_targets_function.get(), "[]", profile())); |
| ASSERT_TRUE(get_targets_result.is_list()); |
| |
| // Verify that the inner PDF frames aren't targets in the list. Only the PDF |
| // embedder frame (the main frame) should be a target. |
| const base::Value::List targets = std::move(get_targets_result).TakeList(); |
| ASSERT_THAT(targets, testing::SizeIs(1)); |
| |
| // Verify that the target is the PDF embedder frame. |
| std::vector<std::string> urls = GetTargetUrlsWithoutPorts(targets); |
| ASSERT_THAT(urls, testing::SizeIs(1)); |
| EXPECT_EQ(urls[0], "http://127.0.0.1/pdf/test.pdf"); |
| } |
| #endif // BUILDFLAG(ENABLE_PDF) |
| |
| #if BUILDFLAG(ENABLE_EXTENSIONS) |
| // TODO(crbug.com/371432155): Port to desktop Android when the chrome.tabs API |
| // is supported. |
| IN_PROC_BROWSER_TEST_F(DebuggerExtensionApiTest, AttachToBlob) { |
| ASSERT_TRUE(RunExtensionTest("debugger_attach_to_blob_urls")) << message_; |
| } |
| #endif // BUILDFLAG(ENABLE_EXTENSIONS) |
| |
| // Tests that navigation to a forbidden URL is properly denied and |
| // does not cause a crash. |
| // This is a regression test for https://crbug.com/1188889. |
| // TODO(crbug.com/41483732): Re-enable this test. |
| #if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || \ |
| BUILDFLAG(IS_ANDROID) |
| #define MAYBE_NavigateToForbiddenUrl DISABLED_NavigateToForbiddenUrl |
| #else |
| #define MAYBE_NavigateToForbiddenUrl NavigateToForbiddenUrl |
| #endif |
| IN_PROC_BROWSER_TEST_F(DebuggerExtensionApiTest, MAYBE_NavigateToForbiddenUrl) { |
| content::ScopedAllowRendererCrashes scoped_allow_renderer_crashes; |
| ASSERT_TRUE(RunExtensionTest("debugger_navigate_to_forbidden_url")) |
| << message_; |
| } |
| |
| IN_PROC_BROWSER_TEST_F(DebuggerExtensionApiTest, NavigateToUntrustedWebUIUrl) { |
| ASSERT_TRUE(RunExtensionTest("debugger_navigate_to_untrusted_webui_url")) |
| << message_; |
| } |
| |
| #if BUILDFLAG(ENABLE_EXTENSIONS) |
| // TODO(crbug.com/371432155): Port to desktop Android when the chrome.tabs API |
| // is supported. |
| // Tests that Target.createTarget to WebUI origins are blocked. |
| IN_PROC_BROWSER_TEST_F(DebuggerExtensionApiTest, CreateTargetToUntrustedWebUI) { |
| ASSERT_TRUE(RunExtensionTest("debugger_create_target_to_untrusted_webui")) |
| << message_; |
| } |
| #endif // BUILDFLAG(ENABLE_EXTENSIONS) |
| |
| IN_PROC_BROWSER_TEST_F(DebuggerExtensionApiTest, IsDeveloperModeTrueHistogram) { |
| profile()->GetPrefs()->SetBoolean(prefs::kExtensionsUIDeveloperMode, true); |
| base::HistogramTester histograms; |
| const char* histogram_name = "Extensions.Debugger.UserIsInDeveloperMode"; |
| |
| ASSERT_TRUE(RunExtensionTest("debugger_is_developer_mode")) << message_; |
| |
| histograms.ExpectBucketCount(histogram_name, true, 1); |
| } |
| |
| IN_PROC_BROWSER_TEST_F(DebuggerExtensionApiTest, |
| IsDeveloperModeFalseHistogram) { |
| profile()->GetPrefs()->SetBoolean(prefs::kExtensionsUIDeveloperMode, false); |
| base::HistogramTester histograms; |
| const char* histogram_name = "Extensions.Debugger.UserIsInDeveloperMode"; |
| |
| ASSERT_TRUE(RunExtensionTest("debugger_is_developer_mode")) << message_; |
| |
| histograms.ExpectBucketCount(histogram_name, false, 1); |
| } |
| |
| class SitePerProcessDebuggerExtensionApiTest : public DebuggerExtensionApiTest { |
| public: |
| void SetUpCommandLine(base::CommandLine* command_line) override { |
| DebuggerExtensionApiTest::SetUpCommandLine(command_line); |
| content::IsolateAllSitesForTesting(command_line); |
| } |
| }; |
| |
| #if BUILDFLAG(ENABLE_EXTENSIONS) |
| // TODO(crbug.com/371432155): Port to desktop Android when the chrome.tabs API |
| // is supported. |
| IN_PROC_BROWSER_TEST_F(SitePerProcessDebuggerExtensionApiTest, Debugger) { |
| GURL url(embedded_test_server()->GetURL( |
| "a.com", "/extensions/api_test/debugger/oopif.html")); |
| GURL iframe_url(embedded_test_server()->GetURL( |
| "b.com", "/extensions/api_test/debugger/oopif_frame.html")); |
| content::WebContents* tab = GetActiveWebContents(); |
| content::TestNavigationManager navigation_manager(tab, url); |
| content::TestNavigationManager navigation_manager_iframe(tab, iframe_url); |
| tab->GetController().LoadURL(url, content::Referrer(), |
| ui::PAGE_TRANSITION_LINK, std::string()); |
| ASSERT_TRUE(navigation_manager.WaitForNavigationFinished()); |
| ASSERT_TRUE(navigation_manager_iframe.WaitForNavigationFinished()); |
| EXPECT_TRUE(content::WaitForLoadStop(tab)); |
| |
| ASSERT_TRUE(RunExtensionTest("debugger", |
| {.custom_arg = "oopif.html;oopif_frame.html"})) |
| << message_; |
| } |
| #endif // BUILDFLAG(ENABLE_EXTENSIONS) |
| |
| IN_PROC_BROWSER_TEST_F(SitePerProcessDebuggerExtensionApiTest, |
| NavigateSubframe) { |
| GURL url(embedded_test_server()->GetURL( |
| "a.com", |
| "/extensions/api_test/debugger_navigate_subframe/inspected_page.html")); |
| ASSERT_TRUE(RunExtensionTest("debugger_navigate_subframe", |
| {.custom_arg = url.spec().c_str()})) |
| << message_; |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SitePerProcessDebuggerExtensionApiTest, |
| NavigateSubframePolicyRestriction) { |
| URLPatternSet default_blocked_hosts; |
| default_blocked_hosts.AddPattern( |
| URLPattern(URLPattern::SCHEME_HTTP, "http://c.com/*")); |
| PermissionsData::SetDefaultPolicyHostRestrictions( |
| util::GetBrowserContextId(profile()), default_blocked_hosts, |
| URLPatternSet()); |
| |
| GURL url(embedded_test_server()->GetURL( |
| "a.com", |
| "/extensions/api_test/debugger_navigate_subframe_policy_restriction/" |
| "inspected_page.html")); |
| ASSERT_TRUE(RunExtensionTest("debugger_navigate_subframe", |
| {.custom_arg = url.spec().c_str()})) |
| << message_; |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SitePerProcessDebuggerExtensionApiTest, |
| AutoAttachPermissions) { |
| GURL url(embedded_test_server()->GetURL( |
| "a.com", |
| "/extensions/api_test/debugger_auto_attach_permissions/page.html")); |
| ASSERT_TRUE(RunExtensionTest("debugger_auto_attach_permissions", |
| {.custom_arg = url.spec().c_str()})) |
| << message_; |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SitePerProcessDebuggerExtensionApiTest, |
| AutoAttachFlatModePermissions) { |
| GURL url(embedded_test_server()->GetURL( |
| "a.com", |
| "/extensions/api_test/debugger_auto_attach_flat_mode_permissions/" |
| "page.html")); |
| ASSERT_TRUE(RunExtensionTest("debugger_auto_attach_flat_mode_permissions", |
| {.custom_arg = url.spec().c_str()})) |
| << message_; |
| } |
| |
| IN_PROC_BROWSER_TEST_F(SitePerProcessDebuggerExtensionApiTest, |
| DebuggerCheckInnerUrl) { |
| ASSERT_TRUE(RunExtensionTest("debugger_check_inner_url")) << message_; |
| } |
| |
| } // namespace extensions |