OLD | NEW |
| (Empty) |
1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include <string> | |
6 | |
7 #include "base/basictypes.h" | |
8 #include "base/file_path.h" | |
9 #include "chrome/browser/renderer_host/renderer_security_policy.h" | |
10 #include "chrome/common/url_constants.h" | |
11 #include "net/url_request/url_request.h" | |
12 #include "net/url_request/url_request_test_job.h" | |
13 #include "testing/gtest/include/gtest/gtest.h" | |
14 | |
15 class RendererSecurityPolicyTest : public testing::Test { | |
16 protected: | |
17 // testing::Test | |
18 virtual void SetUp() { | |
19 // In the real world, "chrome:" is a handled scheme. | |
20 URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, | |
21 &URLRequestTestJob::Factory); | |
22 } | |
23 virtual void TearDown() { | |
24 URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, NULL); | |
25 } | |
26 }; | |
27 | |
28 static int kRendererID = 42; | |
29 | |
30 TEST_F(RendererSecurityPolicyTest, IsWebSafeSchemeTest) { | |
31 RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance(); | |
32 | |
33 EXPECT_TRUE(p->IsWebSafeScheme("http")); | |
34 EXPECT_TRUE(p->IsWebSafeScheme("https")); | |
35 EXPECT_TRUE(p->IsWebSafeScheme("ftp")); | |
36 EXPECT_TRUE(p->IsWebSafeScheme("data")); | |
37 EXPECT_TRUE(p->IsWebSafeScheme("feed")); | |
38 EXPECT_TRUE(p->IsWebSafeScheme("chrome-extension")); | |
39 | |
40 EXPECT_FALSE(p->IsWebSafeScheme("registered-web-safe-scheme")); | |
41 p->RegisterWebSafeScheme("registered-web-safe-scheme"); | |
42 EXPECT_TRUE(p->IsWebSafeScheme("registered-web-safe-scheme")); | |
43 } | |
44 | |
45 TEST_F(RendererSecurityPolicyTest, IsPseudoSchemeTest) { | |
46 RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance(); | |
47 | |
48 EXPECT_TRUE(p->IsPseudoScheme("about")); | |
49 EXPECT_TRUE(p->IsPseudoScheme("javascript")); | |
50 EXPECT_TRUE(p->IsPseudoScheme("view-source")); | |
51 | |
52 EXPECT_FALSE(p->IsPseudoScheme("registered-psuedo-scheme")); | |
53 p->RegisterPseudoScheme("registered-psuedo-scheme"); | |
54 EXPECT_TRUE(p->IsPseudoScheme("registered-psuedo-scheme")); | |
55 } | |
56 | |
57 TEST_F(RendererSecurityPolicyTest, StandardSchemesTest) { | |
58 RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance(); | |
59 | |
60 p->Add(kRendererID); | |
61 | |
62 // Safe | |
63 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("http://www.google.com/"))); | |
64 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("https://www.paypal.com/"))); | |
65 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("ftp://ftp.gnu.org/"))); | |
66 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("data:text/html,<b>Hi</b>"))); | |
67 EXPECT_TRUE(p->CanRequestURL(kRendererID, | |
68 GURL("view-source:http://www.google.com/"))); | |
69 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("chrome-extension://xy/z"))); | |
70 | |
71 // Dangerous | |
72 EXPECT_FALSE(p->CanRequestURL(kRendererID, | |
73 GURL("file:///etc/passwd"))); | |
74 EXPECT_FALSE(p->CanRequestURL(kRendererID, | |
75 GURL("view-cache:http://www.google.com/"))); | |
76 EXPECT_FALSE(p->CanRequestURL(kRendererID, | |
77 GURL("chrome://foo/bar"))); | |
78 | |
79 p->Remove(kRendererID); | |
80 } | |
81 | |
82 TEST_F(RendererSecurityPolicyTest, AboutTest) { | |
83 RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance(); | |
84 | |
85 p->Add(kRendererID); | |
86 | |
87 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("about:blank"))); | |
88 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("about:BlAnK"))); | |
89 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("aBouT:BlAnK"))); | |
90 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("aBouT:blank"))); | |
91 | |
92 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:memory"))); | |
93 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:crash"))); | |
94 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:cache"))); | |
95 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:hang"))); | |
96 | |
97 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("aBoUt:memory"))); | |
98 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:CrASh"))); | |
99 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("abOuT:cAChe"))); | |
100 | |
101 p->GrantRequestURL(kRendererID, GURL("about:memory")); | |
102 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:memory"))); | |
103 | |
104 p->GrantRequestURL(kRendererID, GURL("about:crash")); | |
105 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:crash"))); | |
106 | |
107 p->GrantRequestURL(kRendererID, GURL("about:cache")); | |
108 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:cache"))); | |
109 | |
110 p->GrantRequestURL(kRendererID, GURL("about:hang")); | |
111 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:hang"))); | |
112 | |
113 p->Remove(kRendererID); | |
114 } | |
115 | |
116 TEST_F(RendererSecurityPolicyTest, JavaScriptTest) { | |
117 RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance(); | |
118 | |
119 p->Add(kRendererID); | |
120 | |
121 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("javascript:alert('xss')"))); | |
122 p->GrantRequestURL(kRendererID, GURL("javascript:alert('xss')")); | |
123 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("javascript:alert('xss')"))); | |
124 | |
125 p->Remove(kRendererID); | |
126 } | |
127 | |
128 TEST_F(RendererSecurityPolicyTest, RegisterWebSafeSchemeTest) { | |
129 RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance(); | |
130 | |
131 p->Add(kRendererID); | |
132 | |
133 // Currently, "asdf" is destined for ShellExecute, so it is allowed. | |
134 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); | |
135 | |
136 // Once we register a ProtocolFactory for "asdf", we default to deny. | |
137 URLRequest::RegisterProtocolFactory("asdf", &URLRequestTestJob::Factory); | |
138 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); | |
139 | |
140 // We can allow new schemes by adding them to the whitelist. | |
141 p->RegisterWebSafeScheme("asdf"); | |
142 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); | |
143 | |
144 // Cleanup. | |
145 URLRequest::RegisterProtocolFactory("asdf", NULL); | |
146 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); | |
147 | |
148 p->Remove(kRendererID); | |
149 } | |
150 | |
151 TEST_F(RendererSecurityPolicyTest, CanServiceCommandsTest) { | |
152 RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance(); | |
153 | |
154 p->Add(kRendererID); | |
155 | |
156 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("file:///etc/passwd"))); | |
157 p->GrantRequestURL(kRendererID, GURL("file:///etc/passwd")); | |
158 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("file:///etc/passwd"))); | |
159 | |
160 // We should forget our state if we repeat a renderer id. | |
161 p->Remove(kRendererID); | |
162 p->Add(kRendererID); | |
163 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("file:///etc/passwd"))); | |
164 p->Remove(kRendererID); | |
165 } | |
166 | |
167 TEST_F(RendererSecurityPolicyTest, ViewSource) { | |
168 RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance(); | |
169 | |
170 p->Add(kRendererID); | |
171 | |
172 // View source is determined by the embedded scheme. | |
173 EXPECT_TRUE(p->CanRequestURL(kRendererID, | |
174 GURL("view-source:http://www.google.com/"))); | |
175 EXPECT_FALSE(p->CanRequestURL(kRendererID, | |
176 GURL("view-source:file:///etc/passwd"))); | |
177 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("file:///etc/passwd"))); | |
178 | |
179 p->GrantRequestURL(kRendererID, GURL("view-source:file:///etc/passwd")); | |
180 // View source needs to be able to request the embedded scheme. | |
181 EXPECT_TRUE(p->CanRequestURL(kRendererID, | |
182 GURL("view-source:file:///etc/passwd"))); | |
183 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("file:///etc/passwd"))); | |
184 | |
185 p->Remove(kRendererID); | |
186 } | |
187 | |
188 TEST_F(RendererSecurityPolicyTest, CanUploadFiles) { | |
189 RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance(); | |
190 | |
191 p->Add(kRendererID); | |
192 | |
193 EXPECT_FALSE(p->CanUploadFile(kRendererID, | |
194 FilePath(FILE_PATH_LITERAL("/etc/passwd")))); | |
195 p->GrantUploadFile(kRendererID, FilePath(FILE_PATH_LITERAL("/etc/passwd"))); | |
196 EXPECT_TRUE(p->CanUploadFile(kRendererID, | |
197 FilePath(FILE_PATH_LITERAL("/etc/passwd")))); | |
198 EXPECT_FALSE(p->CanUploadFile(kRendererID, | |
199 FilePath(FILE_PATH_LITERAL("/etc/shadow")))); | |
200 | |
201 p->Remove(kRendererID); | |
202 p->Add(kRendererID); | |
203 | |
204 EXPECT_FALSE(p->CanUploadFile(kRendererID, | |
205 FilePath(FILE_PATH_LITERAL("/etc/passwd")))); | |
206 EXPECT_FALSE(p->CanUploadFile(kRendererID, | |
207 FilePath(FILE_PATH_LITERAL("/etc/shadow")))); | |
208 | |
209 p->Remove(kRendererID); | |
210 } | |
211 | |
212 TEST_F(RendererSecurityPolicyTest, CanServiceInspectElement) { | |
213 RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance(); | |
214 | |
215 GURL url("chrome://inspector/inspector.html"); | |
216 | |
217 p->Add(kRendererID); | |
218 | |
219 EXPECT_FALSE(p->CanRequestURL(kRendererID, url)); | |
220 p->GrantInspectElement(kRendererID); | |
221 EXPECT_TRUE(p->CanRequestURL(kRendererID, url)); | |
222 | |
223 p->Remove(kRendererID); | |
224 } | |
225 | |
226 TEST_F(RendererSecurityPolicyTest, CanServiceDOMUIBindings) { | |
227 RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance(); | |
228 | |
229 GURL url("chrome://thumb/http://www.google.com/"); | |
230 | |
231 p->Add(kRendererID); | |
232 | |
233 EXPECT_FALSE(p->HasDOMUIBindings(kRendererID)); | |
234 EXPECT_FALSE(p->CanRequestURL(kRendererID, url)); | |
235 p->GrantDOMUIBindings(kRendererID); | |
236 EXPECT_TRUE(p->HasDOMUIBindings(kRendererID)); | |
237 EXPECT_TRUE(p->CanRequestURL(kRendererID, url)); | |
238 | |
239 p->Remove(kRendererID); | |
240 } | |
241 | |
242 TEST_F(RendererSecurityPolicyTest, RemoveRace) { | |
243 RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance(); | |
244 | |
245 GURL url("file:///etc/passwd"); | |
246 FilePath file(FILE_PATH_LITERAL("/etc/passwd")); | |
247 | |
248 p->Add(kRendererID); | |
249 | |
250 p->GrantRequestURL(kRendererID, url); | |
251 p->GrantUploadFile(kRendererID, file); | |
252 p->GrantDOMUIBindings(kRendererID); | |
253 | |
254 EXPECT_TRUE(p->CanRequestURL(kRendererID, url)); | |
255 EXPECT_TRUE(p->CanUploadFile(kRendererID, file)); | |
256 EXPECT_TRUE(p->HasDOMUIBindings(kRendererID)); | |
257 | |
258 p->Remove(kRendererID); | |
259 | |
260 // Renderers are added and removed on the UI thread, but the policy can be | |
261 // queried on the IO thread. The RendererSecurityPolicy needs to be prepared | |
262 // to answer policy questions about renderers who no longer exist. | |
263 | |
264 // In this case, we default to secure behavior. | |
265 EXPECT_FALSE(p->CanRequestURL(kRendererID, url)); | |
266 EXPECT_FALSE(p->CanUploadFile(kRendererID, file)); | |
267 EXPECT_FALSE(p->HasDOMUIBindings(kRendererID)); | |
268 } | |
OLD | NEW |