| OLD | NEW |
| 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <string> | 5 #include <string> |
| 6 | 6 |
| 7 #include "base/basictypes.h" | 7 #include "base/basictypes.h" |
| 8 #include "base/file_path.h" | 8 #include "base/file_path.h" |
| 9 #include "chrome/browser/child_process_security_policy.h" | 9 #include "chrome/browser/child_process_security_policy.h" |
| 10 #include "chrome/common/url_constants.h" | 10 #include "chrome/common/url_constants.h" |
| (...skipping 12 matching lines...) Expand all Loading... |
| 23 virtual void TearDown() { | 23 virtual void TearDown() { |
| 24 URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, NULL); | 24 URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, NULL); |
| 25 } | 25 } |
| 26 }; | 26 }; |
| 27 | 27 |
| 28 static int kRendererID = 42; | 28 static int kRendererID = 42; |
| 29 | 29 |
| 30 TEST_F(ChildProcessSecurityPolicyTest, IsWebSafeSchemeTest) { | 30 TEST_F(ChildProcessSecurityPolicyTest, IsWebSafeSchemeTest) { |
| 31 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); | 31 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); |
| 32 | 32 |
| 33 EXPECT_TRUE(p->IsWebSafeScheme("http")); | 33 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kHttpScheme)); |
| 34 EXPECT_TRUE(p->IsWebSafeScheme("https")); | 34 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kHttpsScheme)); |
| 35 EXPECT_TRUE(p->IsWebSafeScheme("ftp")); | 35 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kFtpScheme)); |
| 36 EXPECT_TRUE(p->IsWebSafeScheme("data")); | 36 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kDataScheme)); |
| 37 EXPECT_TRUE(p->IsWebSafeScheme("feed")); | 37 EXPECT_TRUE(p->IsWebSafeScheme("feed")); |
| 38 EXPECT_TRUE(p->IsWebSafeScheme("chrome-extension")); | 38 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kExtensionScheme)); |
| 39 | 39 |
| 40 EXPECT_FALSE(p->IsWebSafeScheme("registered-web-safe-scheme")); | 40 EXPECT_FALSE(p->IsWebSafeScheme("registered-web-safe-scheme")); |
| 41 p->RegisterWebSafeScheme("registered-web-safe-scheme"); | 41 p->RegisterWebSafeScheme("registered-web-safe-scheme"); |
| 42 EXPECT_TRUE(p->IsWebSafeScheme("registered-web-safe-scheme")); | 42 EXPECT_TRUE(p->IsWebSafeScheme("registered-web-safe-scheme")); |
| 43 } | 43 } |
| 44 | 44 |
| 45 TEST_F(ChildProcessSecurityPolicyTest, IsPseudoSchemeTest) { | 45 TEST_F(ChildProcessSecurityPolicyTest, IsPseudoSchemeTest) { |
| 46 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); | 46 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); |
| 47 | 47 |
| 48 EXPECT_TRUE(p->IsPseudoScheme("about")); | 48 EXPECT_TRUE(p->IsPseudoScheme(chrome::kAboutScheme)); |
| 49 EXPECT_TRUE(p->IsPseudoScheme("javascript")); | 49 EXPECT_TRUE(p->IsPseudoScheme(chrome::kJavaScriptScheme)); |
| 50 EXPECT_TRUE(p->IsPseudoScheme("view-source")); | 50 EXPECT_TRUE(p->IsPseudoScheme(chrome::kViewSourceScheme)); |
| 51 | 51 |
| 52 EXPECT_FALSE(p->IsPseudoScheme("registered-psuedo-scheme")); | 52 EXPECT_FALSE(p->IsPseudoScheme("registered-psuedo-scheme")); |
| 53 p->RegisterPseudoScheme("registered-psuedo-scheme"); | 53 p->RegisterPseudoScheme("registered-psuedo-scheme"); |
| 54 EXPECT_TRUE(p->IsPseudoScheme("registered-psuedo-scheme")); | 54 EXPECT_TRUE(p->IsPseudoScheme("registered-psuedo-scheme")); |
| 55 } | 55 } |
| 56 | 56 |
| 57 TEST_F(ChildProcessSecurityPolicyTest, StandardSchemesTest) { | 57 TEST_F(ChildProcessSecurityPolicyTest, StandardSchemesTest) { |
| 58 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); | 58 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); |
| 59 | 59 |
| 60 p->Add(kRendererID); | 60 p->Add(kRendererID); |
| (...skipping 30 matching lines...) Expand all Loading... |
| 91 | 91 |
| 92 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:memory"))); | 92 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:memory"))); |
| 93 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:crash"))); | 93 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:crash"))); |
| 94 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:cache"))); | 94 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:cache"))); |
| 95 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:hang"))); | 95 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:hang"))); |
| 96 | 96 |
| 97 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("aBoUt:memory"))); | 97 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("aBoUt:memory"))); |
| 98 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:CrASh"))); | 98 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:CrASh"))); |
| 99 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("abOuT:cAChe"))); | 99 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("abOuT:cAChe"))); |
| 100 | 100 |
| 101 p->GrantRequestURL(kRendererID, GURL("about:memory")); | 101 p->GrantRequestURL(kRendererID, GURL(chrome::kAboutMemoryURL)); |
| 102 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:memory"))); | 102 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL(chrome::kAboutMemoryURL))); |
| 103 | 103 |
| 104 p->GrantRequestURL(kRendererID, GURL("about:crash")); | 104 p->GrantRequestURL(kRendererID, GURL(chrome::kAboutCrashURL)); |
| 105 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:crash"))); | 105 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL(chrome::kAboutCrashURL))); |
| 106 | 106 |
| 107 p->GrantRequestURL(kRendererID, GURL("about:cache")); | 107 p->GrantRequestURL(kRendererID, GURL(chrome::kAboutCacheURL)); |
| 108 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:cache"))); | 108 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL(chrome::kAboutCacheURL))); |
| 109 | 109 |
| 110 p->GrantRequestURL(kRendererID, GURL("about:hang")); | 110 p->GrantRequestURL(kRendererID, GURL(chrome::kAboutHangURL)); |
| 111 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:hang"))); | 111 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL(chrome::kAboutHangURL))); |
| 112 | 112 |
| 113 p->Remove(kRendererID); | 113 p->Remove(kRendererID); |
| 114 } | 114 } |
| 115 | 115 |
| 116 TEST_F(ChildProcessSecurityPolicyTest, JavaScriptTest) { | 116 TEST_F(ChildProcessSecurityPolicyTest, JavaScriptTest) { |
| 117 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); | 117 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); |
| 118 | 118 |
| 119 p->Add(kRendererID); | 119 p->Add(kRendererID); |
| 120 | 120 |
| 121 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("javascript:alert('xss')"))); | 121 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("javascript:alert('xss')"))); |
| (...skipping 137 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 259 | 259 |
| 260 // Renderers are added and removed on the UI thread, but the policy can be | 260 // Renderers are added and removed on the UI thread, but the policy can be |
| 261 // queried on the IO thread. The ChildProcessSecurityPolicy needs to be | 261 // queried on the IO thread. The ChildProcessSecurityPolicy needs to be |
| 262 // prepared to answer policy questions about renderers who no longer exist. | 262 // prepared to answer policy questions about renderers who no longer exist. |
| 263 | 263 |
| 264 // In this case, we default to secure behavior. | 264 // In this case, we default to secure behavior. |
| 265 EXPECT_FALSE(p->CanRequestURL(kRendererID, url)); | 265 EXPECT_FALSE(p->CanRequestURL(kRendererID, url)); |
| 266 EXPECT_FALSE(p->CanUploadFile(kRendererID, file)); | 266 EXPECT_FALSE(p->CanUploadFile(kRendererID, file)); |
| 267 EXPECT_FALSE(p->HasDOMUIBindings(kRendererID)); | 267 EXPECT_FALSE(p->HasDOMUIBindings(kRendererID)); |
| 268 } | 268 } |
| OLD | NEW |