| OLD | NEW |
| 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <string> | 5 #include <string> |
| 6 | 6 |
| 7 #include "base/basictypes.h" | 7 #include "base/basictypes.h" |
| 8 #include "base/file_path.h" | 8 #include "base/file_path.h" |
| 9 #include "base/platform_file.h" | 9 #include "base/platform_file.h" |
| 10 #include "chrome/browser/child_process_security_policy.h" | 10 #include "chrome/browser/child_process_security_policy.h" |
| 11 #include "chrome/common/url_constants.h" | 11 #include "chrome/common/url_constants.h" |
| 12 #include "net/url_request/url_request.h" | 12 #include "net/url_request/url_request.h" |
| 13 #include "net/url_request/url_request_test_job.h" | 13 #include "net/url_request/url_request_test_job.h" |
| 14 #include "testing/gtest/include/gtest/gtest.h" | 14 #include "testing/gtest/include/gtest/gtest.h" |
| 15 | 15 |
| 16 class ChildProcessSecurityPolicyTest : public testing::Test { | 16 class ChildProcessSecurityPolicyTest : public testing::Test { |
| 17 protected: | 17 protected: |
| 18 // testing::Test | 18 // testing::Test |
| 19 virtual void SetUp() { | 19 virtual void SetUp() { |
| 20 // In the real world, "chrome:" is a handled scheme. | 20 // In the real world, "chrome:" is a handled scheme. |
| 21 URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, | 21 net::URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, |
| 22 &URLRequestTestJob::Factory); | 22 &URLRequestTestJob::Factory); |
| 23 } | 23 } |
| 24 virtual void TearDown() { | 24 virtual void TearDown() { |
| 25 URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, NULL); | 25 net::URLRequest::RegisterProtocolFactory(chrome::kChromeUIScheme, NULL); |
| 26 } | 26 } |
| 27 }; | 27 }; |
| 28 | 28 |
| 29 static int kRendererID = 42; | 29 static int kRendererID = 42; |
| 30 | 30 |
| 31 TEST_F(ChildProcessSecurityPolicyTest, IsWebSafeSchemeTest) { | 31 TEST_F(ChildProcessSecurityPolicyTest, IsWebSafeSchemeTest) { |
| 32 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); | 32 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); |
| 33 | 33 |
| 34 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kHttpScheme)); | 34 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kHttpScheme)); |
| 35 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kHttpsScheme)); | 35 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kHttpsScheme)); |
| (...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 126 | 126 |
| 127 TEST_F(ChildProcessSecurityPolicyTest, RegisterWebSafeSchemeTest) { | 127 TEST_F(ChildProcessSecurityPolicyTest, RegisterWebSafeSchemeTest) { |
| 128 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); | 128 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); |
| 129 | 129 |
| 130 p->Add(kRendererID); | 130 p->Add(kRendererID); |
| 131 | 131 |
| 132 // Currently, "asdf" is destined for ShellExecute, so it is allowed. | 132 // Currently, "asdf" is destined for ShellExecute, so it is allowed. |
| 133 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); | 133 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); |
| 134 | 134 |
| 135 // Once we register a ProtocolFactory for "asdf", we default to deny. | 135 // Once we register a ProtocolFactory for "asdf", we default to deny. |
| 136 URLRequest::RegisterProtocolFactory("asdf", &URLRequestTestJob::Factory); | 136 net::URLRequest::RegisterProtocolFactory("asdf", &URLRequestTestJob::Factory); |
| 137 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); | 137 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); |
| 138 | 138 |
| 139 // We can allow new schemes by adding them to the whitelist. | 139 // We can allow new schemes by adding them to the whitelist. |
| 140 p->RegisterWebSafeScheme("asdf"); | 140 p->RegisterWebSafeScheme("asdf"); |
| 141 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); | 141 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); |
| 142 | 142 |
| 143 // Cleanup. | 143 // Cleanup. |
| 144 URLRequest::RegisterProtocolFactory("asdf", NULL); | 144 net::URLRequest::RegisterProtocolFactory("asdf", NULL); |
| 145 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); | 145 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers"))); |
| 146 | 146 |
| 147 p->Remove(kRendererID); | 147 p->Remove(kRendererID); |
| 148 } | 148 } |
| 149 | 149 |
| 150 TEST_F(ChildProcessSecurityPolicyTest, CanServiceCommandsTest) { | 150 TEST_F(ChildProcessSecurityPolicyTest, CanServiceCommandsTest) { |
| 151 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); | 151 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); |
| 152 | 152 |
| 153 p->Add(kRendererID); | 153 p->Add(kRendererID); |
| 154 | 154 |
| (...skipping 168 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 323 | 323 |
| 324 // Renderers are added and removed on the UI thread, but the policy can be | 324 // Renderers are added and removed on the UI thread, but the policy can be |
| 325 // queried on the IO thread. The ChildProcessSecurityPolicy needs to be | 325 // queried on the IO thread. The ChildProcessSecurityPolicy needs to be |
| 326 // prepared to answer policy questions about renderers who no longer exist. | 326 // prepared to answer policy questions about renderers who no longer exist. |
| 327 | 327 |
| 328 // In this case, we default to secure behavior. | 328 // In this case, we default to secure behavior. |
| 329 EXPECT_FALSE(p->CanRequestURL(kRendererID, url)); | 329 EXPECT_FALSE(p->CanRequestURL(kRendererID, url)); |
| 330 EXPECT_FALSE(p->CanReadFile(kRendererID, file)); | 330 EXPECT_FALSE(p->CanReadFile(kRendererID, file)); |
| 331 EXPECT_FALSE(p->HasDOMUIBindings(kRendererID)); | 331 EXPECT_FALSE(p->HasDOMUIBindings(kRendererID)); |
| 332 } | 332 } |
| OLD | NEW |