| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <string> | 5 #include <string> |
| 6 | 6 |
| 7 #include "base/basictypes.h" | 7 #include "base/basictypes.h" |
| 8 #include "base/file_path.h" | 8 #include "base/file_path.h" |
| 9 #include "base/platform_file.h" | 9 #include "base/platform_file.h" |
| 10 #include "content/browser/child_process_security_policy.h" | 10 #include "content/browser/child_process_security_policy.h" |
| (...skipping 27 matching lines...) Expand all Loading... |
| 38 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kFtpScheme)); | 38 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kFtpScheme)); |
| 39 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kDataScheme)); | 39 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kDataScheme)); |
| 40 EXPECT_TRUE(p->IsWebSafeScheme("feed")); | 40 EXPECT_TRUE(p->IsWebSafeScheme("feed")); |
| 41 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kExtensionScheme)); | 41 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kExtensionScheme)); |
| 42 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kBlobScheme)); | 42 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kBlobScheme)); |
| 43 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kFileSystemScheme)); | 43 EXPECT_TRUE(p->IsWebSafeScheme(chrome::kFileSystemScheme)); |
| 44 | 44 |
| 45 EXPECT_FALSE(p->IsWebSafeScheme("registered-web-safe-scheme")); | 45 EXPECT_FALSE(p->IsWebSafeScheme("registered-web-safe-scheme")); |
| 46 p->RegisterWebSafeScheme("registered-web-safe-scheme"); | 46 p->RegisterWebSafeScheme("registered-web-safe-scheme"); |
| 47 EXPECT_TRUE(p->IsWebSafeScheme("registered-web-safe-scheme")); | 47 EXPECT_TRUE(p->IsWebSafeScheme("registered-web-safe-scheme")); |
| 48 |
| 49 EXPECT_FALSE(p->IsWebSafeScheme(chrome::kChromeUIScheme)); |
| 48 } | 50 } |
| 49 | 51 |
| 50 TEST_F(ChildProcessSecurityPolicyTest, IsPseudoSchemeTest) { | 52 TEST_F(ChildProcessSecurityPolicyTest, IsPseudoSchemeTest) { |
| 51 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); | 53 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); |
| 52 | 54 |
| 53 EXPECT_TRUE(p->IsPseudoScheme(chrome::kAboutScheme)); | 55 EXPECT_TRUE(p->IsPseudoScheme(chrome::kAboutScheme)); |
| 54 EXPECT_TRUE(p->IsPseudoScheme(chrome::kJavaScriptScheme)); | 56 EXPECT_TRUE(p->IsPseudoScheme(chrome::kJavaScriptScheme)); |
| 55 EXPECT_TRUE(p->IsPseudoScheme(chrome::kViewSourceScheme)); | 57 EXPECT_TRUE(p->IsPseudoScheme(chrome::kViewSourceScheme)); |
| 56 | 58 |
| 57 EXPECT_FALSE(p->IsPseudoScheme("registered-pseudo-scheme")); | 59 EXPECT_FALSE(p->IsPseudoScheme("registered-pseudo-scheme")); |
| 58 p->RegisterPseudoScheme("registered-pseudo-scheme"); | 60 p->RegisterPseudoScheme("registered-pseudo-scheme"); |
| 59 EXPECT_TRUE(p->IsPseudoScheme("registered-pseudo-scheme")); | 61 EXPECT_TRUE(p->IsPseudoScheme("registered-pseudo-scheme")); |
| 62 |
| 63 EXPECT_FALSE(p->IsPseudoScheme(chrome::kChromeUIScheme)); |
| 60 } | 64 } |
| 61 | 65 |
| 62 TEST_F(ChildProcessSecurityPolicyTest, IsDisabledSchemeTest) { | 66 TEST_F(ChildProcessSecurityPolicyTest, IsDisabledSchemeTest) { |
| 63 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); | 67 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); |
| 64 | 68 |
| 65 EXPECT_FALSE(p->IsDisabledScheme("evil-scheme")); | 69 EXPECT_FALSE(p->IsDisabledScheme("evil-scheme")); |
| 66 std::set<std::string> disabled_set; | 70 std::set<std::string> disabled_set; |
| 67 disabled_set.insert("evil-scheme"); | 71 disabled_set.insert("evil-scheme"); |
| 68 p->RegisterDisabledSchemes(disabled_set); | 72 p->RegisterDisabledSchemes(disabled_set); |
| 69 EXPECT_TRUE(p->IsDisabledScheme("evil-scheme")); | 73 EXPECT_TRUE(p->IsDisabledScheme("evil-scheme")); |
| (...skipping 42 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 112 | 116 |
| 113 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:memory"))); | 117 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:memory"))); |
| 114 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:crash"))); | 118 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:crash"))); |
| 115 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:cache"))); | 119 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:cache"))); |
| 116 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:hang"))); | 120 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:hang"))); |
| 117 | 121 |
| 118 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("aBoUt:memory"))); | 122 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("aBoUt:memory"))); |
| 119 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:CrASh"))); | 123 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:CrASh"))); |
| 120 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("abOuT:cAChe"))); | 124 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("abOuT:cAChe"))); |
| 121 | 125 |
| 126 // These requests for about: pages should be denied. |
| 122 p->GrantRequestURL(kRendererID, GURL(chrome::kTestMemoryURL)); | 127 p->GrantRequestURL(kRendererID, GURL(chrome::kTestMemoryURL)); |
| 123 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL(chrome::kTestMemoryURL))); | 128 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL(chrome::kTestMemoryURL))); |
| 124 | 129 |
| 125 p->GrantRequestURL(kRendererID, GURL(chrome::kAboutCrashURL)); | 130 p->GrantRequestURL(kRendererID, GURL(chrome::kAboutCrashURL)); |
| 126 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL(chrome::kAboutCrashURL))); | 131 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL(chrome::kAboutCrashURL))); |
| 127 | 132 |
| 128 p->GrantRequestURL(kRendererID, GURL(chrome::kTestCacheURL)); | 133 p->GrantRequestURL(kRendererID, GURL(chrome::kTestCacheURL)); |
| 129 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL(chrome::kTestCacheURL))); | 134 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL(chrome::kTestCacheURL))); |
| 130 | 135 |
| 131 p->GrantRequestURL(kRendererID, GURL(chrome::kTestHangURL)); | 136 p->GrantRequestURL(kRendererID, GURL(chrome::kTestHangURL)); |
| 132 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL(chrome::kTestHangURL))); | 137 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL(chrome::kTestHangURL))); |
| 133 | 138 |
| 139 // These requests for chrome:// pages should be granted. |
| 140 p->GrantRequestURL(kRendererID, GURL(chrome::kTestNewTabURL)); |
| 141 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL(chrome::kTestNewTabURL))); |
| 142 |
| 143 p->GrantRequestURL(kRendererID, GURL(chrome::kTestHistoryURL)); |
| 144 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL(chrome::kTestHistoryURL))); |
| 145 |
| 146 p->GrantRequestURL(kRendererID, GURL(chrome::kTestBookmarksURL)); |
| 147 EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL(chrome::kTestBookmarksURL))); |
| 148 |
| 134 p->Remove(kRendererID); | 149 p->Remove(kRendererID); |
| 135 } | 150 } |
| 136 | 151 |
| 137 TEST_F(ChildProcessSecurityPolicyTest, JavaScriptTest) { | 152 TEST_F(ChildProcessSecurityPolicyTest, JavaScriptTest) { |
| 138 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); | 153 ChildProcessSecurityPolicy* p = ChildProcessSecurityPolicy::GetInstance(); |
| 139 | 154 |
| 140 p->Add(kRendererID); | 155 p->Add(kRendererID); |
| 141 | 156 |
| 142 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("javascript:alert('xss')"))); | 157 EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("javascript:alert('xss')"))); |
| 143 p->GrantRequestURL(kRendererID, GURL("javascript:alert('xss')")); | 158 p->GrantRequestURL(kRendererID, GURL("javascript:alert('xss')")); |
| (...skipping 267 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 411 | 426 |
| 412 // Renderers are added and removed on the UI thread, but the policy can be | 427 // Renderers are added and removed on the UI thread, but the policy can be |
| 413 // queried on the IO thread. The ChildProcessSecurityPolicy needs to be | 428 // queried on the IO thread. The ChildProcessSecurityPolicy needs to be |
| 414 // prepared to answer policy questions about renderers who no longer exist. | 429 // prepared to answer policy questions about renderers who no longer exist. |
| 415 | 430 |
| 416 // In this case, we default to secure behavior. | 431 // In this case, we default to secure behavior. |
| 417 EXPECT_FALSE(p->CanRequestURL(kRendererID, url)); | 432 EXPECT_FALSE(p->CanRequestURL(kRendererID, url)); |
| 418 EXPECT_FALSE(p->CanReadFile(kRendererID, file)); | 433 EXPECT_FALSE(p->CanReadFile(kRendererID, file)); |
| 419 EXPECT_FALSE(p->HasWebUIBindings(kRendererID)); | 434 EXPECT_FALSE(p->HasWebUIBindings(kRendererID)); |
| 420 } | 435 } |
| OLD | NEW |