File: chrome_api_permissions_unittest.cc

package info (click to toggle)
chromium 139.0.7258.127-1
  • links: PTS, VCS
  • area: main
  • in suites:
  • size: 6,122,068 kB
  • sloc: cpp: 35,100,771; ansic: 7,163,530; javascript: 4,103,002; python: 1,436,920; asm: 946,517; xml: 746,709; pascal: 187,653; perl: 88,691; sh: 88,436; objc: 79,953; sql: 51,488; cs: 44,583; fortran: 24,137; makefile: 22,147; tcl: 15,277; php: 13,980; yacc: 8,984; ruby: 7,485; awk: 3,720; lisp: 3,096; lex: 1,327; ada: 727; jsp: 228; sed: 36
file content (49 lines) | stat: -rw-r--r-- 2,112 bytes parent folder | download | duplicates (9)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
// Copyright 2023 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "base/containers/contains.h"
#include "extensions/common/features/feature_provider.h"
#include "extensions/common/mojom/api_permission_id.mojom.h"
#include "extensions/common/permissions/api_permission.h"
#include "extensions/common/permissions/permissions_info.h"
#include "testing/gtest/include/gtest/gtest.h"

namespace extensions {

TEST(ChromeAPIPermissionsUnitTest, AllApiPermissionsHaveACorrespondingFeature) {
  APIPermissionSet all_api_permissions =
      PermissionsInfo::GetInstance()->GetAllForTest();
  ASSERT_FALSE(all_api_permissions.empty());

  // Sanity check that the returned API permissions include both those from
  // the //chrome layer and the //extensions layer. This is important because
  // the dependency in this test on the //chrome layer is subtle (the fact that
  // this runs as part of `unit_tests` means the chrome-layer permissions are
  // added as part of the environment setup).
  // `downloads` is a chrome-layer permission.
  // `storage` is an extensions-layer permission.
  ASSERT_EQ(1u, all_api_permissions.count(mojom::APIPermissionID::kDownloads));
  ASSERT_EQ(1u, all_api_permissions.count(mojom::APIPermissionID::kStorage));

  const FeatureProvider* permission_features =
      FeatureProvider::GetPermissionFeatures();
  // Iterate over every API permission and ensure each has an entry in
  // _permission_features.json.
  for (const auto* permission : all_api_permissions) {
    // Internal-only permissions (which are generally used as implementation
    // details) do not need to have a separate features entry.
    if (permission->info()->is_internal()) {
      continue;
    }

    const Feature* feature =
        permission_features->GetFeature(permission->name());
    EXPECT_TRUE(feature)
        << "Missing _permission_features.json entry for permission '"
        << permission->name()
        << "'. Add a new entry in _permission_features.json to fix this.";
  }
}

}  // namespace extensions