Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "webkit/chromeos/fileapi/cros_mount_point_provider.h" | |
| 6 | |
| 7 #include "base/file_path.h" | |
| 8 #include "googleurl/src/url_util.h" | |
| 9 #include "testing/gtest/include/gtest/gtest.h" | |
| 10 #include "webkit/fileapi/external_mount_points.h" | |
| 11 #include "webkit/fileapi/file_system_url.h" | |
| 12 #include "webkit/fileapi/isolated_context.h" | |
| 13 #include "webkit/quota/mock_special_storage_policy.h" | |
| 14 | |
| 15 namespace { | |
| 16 | |
| 17 #define FPL(x) FILE_PATH_LITERAL(x) | |
|
kinuko
2013/01/11 08:20:52
tiny nit: this is totally fine but having #define
tbarzic
2013/01/11 09:13:16
Done.
| |
| 18 | |
| 19 fileapi::FileSystemURL CreateFileSystemURL(const std::string& extension, | |
| 20 const FilePath::CharType* path) { | |
| 21 return fileapi::FileSystemURL(GURL("chrome-extension://" + extension + "/"), | |
| 22 fileapi::kFileSystemTypeNativeLocal, | |
| 23 FilePath(path)); | |
|
kinuko
2013/01/11 08:20:52
Alternatively you can just take const char* (so yo
tbarzic
2013/01/11 09:13:16
Done.
| |
| 24 } | |
| 25 | |
| 26 bool VectorHasPath(const std::vector<FilePath>& path_vector, | |
| 27 const FilePath& path) { | |
| 28 for (size_t i = 0; i < path_vector.size(); ++i) { | |
| 29 if (path_vector[i] == path) | |
| 30 return true; | |
| 31 } | |
| 32 return false; | |
| 33 } | |
| 34 | |
| 35 TEST(CrosMountPointProviderTest, DefaultMountPoints) { | |
| 36 scoped_refptr<quota::SpecialStoragePolicy> storage_policy = | |
| 37 new quota::MockSpecialStoragePolicy(); | |
| 38 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | |
| 39 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 40 chromeos::CrosMountPointProvider provider( | |
| 41 storage_policy, | |
| 42 mount_points.get(), | |
| 43 fileapi::ExternalMountPoints::GetSystemInstance()); | |
| 44 // By default there should be 4 mount points. | |
| 45 std::vector<FilePath> root_dirs = provider.GetRootDirectories(); | |
| 46 EXPECT_EQ(4u, root_dirs.size()); | |
| 47 EXPECT_TRUE(VectorHasPath(root_dirs, FilePath(FPL("/media/removable")))); | |
| 48 EXPECT_TRUE(VectorHasPath(root_dirs, FilePath(FPL("/media/archive")))); | |
| 49 EXPECT_TRUE(VectorHasPath(root_dirs, FilePath(FPL("/usr/share/oem")))); | |
|
kinuko
2013/01/11 08:20:52
Well, maybe... using std::set like following might
tbarzic
2013/01/11 09:13:16
Done.
| |
| 50 // Fourth mount point is Downloads, but its local path is device specific. | |
| 51 } | |
| 52 | |
| 53 TEST(CrosMountPointProviderTest, GetRootDirectories) { | |
| 54 scoped_refptr<quota::SpecialStoragePolicy> storage_policy = | |
| 55 new quota::MockSpecialStoragePolicy(); | |
| 56 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | |
| 57 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 58 | |
| 59 scoped_refptr<fileapi::ExternalMountPoints> system_mount_points( | |
| 60 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 61 | |
| 62 chromeos::CrosMountPointProvider provider( | |
| 63 storage_policy, | |
| 64 mount_points.get(), | |
| 65 system_mount_points.get()); | |
| 66 | |
| 67 // Register 'local' test mount points. | |
| 68 mount_points->RegisterFileSystem("c", | |
| 69 fileapi::kFileSystemTypeNativeLocal, | |
| 70 FilePath(FPL("/a/b/c"))); | |
| 71 mount_points->RegisterFileSystem("d", | |
| 72 fileapi::kFileSystemTypeNativeLocal, | |
| 73 FilePath(FPL("/b/c/d"))); | |
| 74 | |
| 75 // Register system test mount points. | |
| 76 system_mount_points->RegisterFileSystem("d", | |
| 77 fileapi::kFileSystemTypeNativeLocal, | |
| 78 FilePath(FPL("/g/c/d"))); | |
| 79 system_mount_points->RegisterFileSystem("e", | |
| 80 fileapi::kFileSystemTypeNativeLocal, | |
| 81 FilePath(FPL("/g/d/e"))); | |
| 82 | |
| 83 std::vector<FilePath> root_dirs = provider.GetRootDirectories(); | |
| 84 EXPECT_EQ(4u, root_dirs.size()); | |
| 85 EXPECT_TRUE(VectorHasPath(root_dirs, FilePath(FPL("/a/b/c")))); | |
| 86 EXPECT_TRUE(VectorHasPath(root_dirs, FilePath(FPL("/b/c/d")))); | |
| 87 EXPECT_TRUE(VectorHasPath(root_dirs, FilePath(FPL("/g/c/d")))); | |
| 88 EXPECT_TRUE(VectorHasPath(root_dirs, FilePath(FPL("/g/d/e")))); | |
| 89 } | |
| 90 | |
| 91 TEST(CrosMountPointProviderTest, MountPointsVisibility) { | |
| 92 scoped_refptr<quota::SpecialStoragePolicy> storage_policy = | |
| 93 new quota::MockSpecialStoragePolicy(); | |
| 94 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | |
| 95 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 96 scoped_refptr<fileapi::ExternalMountPoints> sibling_mount_points( | |
| 97 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 98 | |
| 99 scoped_refptr<fileapi::ExternalMountPoints> system_mount_points( | |
| 100 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 101 | |
| 102 chromeos::CrosMountPointProvider provider( | |
| 103 storage_policy, | |
| 104 mount_points.get(), | |
| 105 system_mount_points.get()); | |
| 106 | |
| 107 // A provider that shares system_mount_points with |provider|. | |
| 108 chromeos::CrosMountPointProvider sibling_provider( | |
| 109 storage_policy, | |
| 110 sibling_mount_points.get(), | |
| 111 system_mount_points.get()); | |
| 112 | |
| 113 FilePath ignored; | |
| 114 | |
| 115 // Adding empty mount point should fail. | |
| 116 EXPECT_FALSE(provider.AddLocalMountPoint(FilePath())); | |
| 117 | |
| 118 // Add mount point to the provider. | |
| 119 EXPECT_TRUE(provider.AddLocalMountPoint(FilePath(FPL("/a/b/c")))); | |
| 120 | |
| 121 EXPECT_TRUE(provider.HasMountPoint(FilePath(FPL("/a/b/c")))); | |
| 122 // The mount point with the same name exists, but path is different. | |
| 123 EXPECT_FALSE(provider.HasMountPoint(FilePath(FPL("/x/a/b/c")))); | |
| 124 EXPECT_FALSE(sibling_provider.HasMountPoint(FilePath(FPL("/a/b/c")))); | |
| 125 EXPECT_TRUE(mount_points->GetRegisteredPath("c", &ignored)); | |
| 126 EXPECT_FALSE(system_mount_points->GetRegisteredPath("c", &ignored)); | |
| 127 | |
| 128 // Add mount point directly to |mount_points|. It should be seen by | |
| 129 // |provider|. | |
| 130 EXPECT_TRUE(mount_points->RegisterFileSystem( | |
| 131 "d", fileapi::kFileSystemTypeNativeLocal, FilePath(FPL("/b/c/d")))); | |
| 132 | |
| 133 EXPECT_TRUE(provider.HasMountPoint(FilePath(FPL("/b/c/d")))); | |
| 134 EXPECT_FALSE(sibling_provider.HasMountPoint(FilePath(FPL("/b/c/d")))); | |
| 135 | |
| 136 // Add mount point to system mount points. | |
| 137 EXPECT_TRUE(system_mount_points->RegisterFileSystem( | |
| 138 "e", fileapi::kFileSystemTypeNativeLocal, FilePath(FPL("/g/c/d/e")))); | |
| 139 | |
| 140 EXPECT_FALSE(provider.HasMountPoint(FilePath(FPL("/g/c/d/e")))); | |
| 141 EXPECT_FALSE(sibling_provider.HasMountPoint(FilePath(FPL("/g/c/d/e")))); | |
| 142 | |
| 143 // Can't remove system mount point. | |
| 144 provider.RemoveMountPoint(FilePath(FPL("/g/c/d/e"))); | |
| 145 EXPECT_TRUE(system_mount_points->GetRegisteredPath("e", &ignored)); | |
| 146 | |
| 147 // Add a mount points whose paths overlap with the system one's. | |
| 148 // The same path: | |
| 149 EXPECT_TRUE(provider.AddLocalMountPoint(FilePath(FPL("/g/c/d/e")))); | |
| 150 EXPECT_TRUE(provider.HasMountPoint(FilePath(FPL("/g/c/d/e")))); | |
| 151 provider.RemoveMountPoint(FilePath(FPL("/g/c/d/e"))); | |
| 152 // Parent path: | |
| 153 EXPECT_TRUE(provider.AddLocalMountPoint(FilePath(FPL("/g")))); | |
| 154 EXPECT_TRUE(provider.HasMountPoint(FilePath(FPL("/g")))); | |
| 155 provider.RemoveMountPoint(FilePath(FPL("/g"))); | |
| 156 // Child path: | |
| 157 EXPECT_TRUE(provider.AddLocalMountPoint(FilePath(FPL("/g/c/d/e/f/g")))); | |
| 158 EXPECT_TRUE(provider.HasMountPoint(FilePath(FPL("/g/c/d/e/f/g")))); | |
| 159 provider.RemoveMountPoint(FilePath(FPL("/g/c/d/e/f/g"))); | |
| 160 | |
| 161 // Add mount point with the same name as a global one. Should succeed. | |
| 162 EXPECT_TRUE(provider.AddLocalMountPoint(FilePath(FPL("/d/e")))); | |
| 163 | |
| 164 EXPECT_TRUE(provider.HasMountPoint(FilePath(FPL("/d/e")))); | |
| 165 | |
| 166 // Remove system mount point with the same name as the added one. | |
| 167 // Should fail. | |
| 168 provider.RemoveMountPoint(FilePath(FPL("/g/c/d/e"))); | |
| 169 | |
| 170 EXPECT_TRUE(provider.HasMountPoint(FilePath(FPL("/d/e")))); | |
| 171 EXPECT_TRUE(system_mount_points->GetRegisteredPath("e", &ignored)); | |
| 172 | |
| 173 // Remove mount point. | |
| 174 provider.RemoveMountPoint(FilePath(FPL("/d/e"))); | |
| 175 | |
| 176 EXPECT_FALSE(provider.HasMountPoint(FilePath(FPL("/d/e")))); | |
| 177 } | |
| 178 | |
| 179 TEST(CrosMountPointProviderTest, AccessPermissions) { | |
| 180 url_util::AddStandardScheme("chrome-extension"); | |
| 181 | |
| 182 scoped_refptr<quota::MockSpecialStoragePolicy> storage_policy = | |
| 183 new quota::MockSpecialStoragePolicy(); | |
| 184 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | |
| 185 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 186 scoped_refptr<fileapi::ExternalMountPoints> system_mount_points( | |
| 187 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 188 chromeos::CrosMountPointProvider provider( | |
| 189 storage_policy, | |
| 190 mount_points.get(), | |
| 191 system_mount_points.get()); | |
| 192 | |
| 193 std::string extension("ddammdhioacbehjngdmkjcjbnfginlla"); | |
| 194 | |
| 195 storage_policy->AddFileHandler(extension); | |
| 196 | |
| 197 // Initialize mount points. | |
| 198 system_mount_points->RegisterFileSystem("system", | |
| 199 fileapi::kFileSystemTypeNativeLocal, | |
| 200 FilePath(FPL("/g/system"))); | |
| 201 ASSERT_TRUE(provider.AddLocalMountPoint(FilePath(FPL("/media/removable")))); | |
| 202 ASSERT_TRUE(provider.AddRestrictedLocalMountPoint( | |
| 203 FilePath(FPL("/usr/share/oem")))); | |
| 204 | |
| 205 // Provider specific mount point access. | |
| 206 EXPECT_FALSE(provider.IsAccessAllowed( | |
| 207 CreateFileSystemURL(extension, FPL("removable/foo")))); | |
| 208 | |
| 209 provider.GrantFileAccessToExtension(extension, | |
| 210 FilePath(FPL("removable/foo"))); | |
| 211 EXPECT_TRUE(provider.IsAccessAllowed( | |
| 212 CreateFileSystemURL(extension, FPL("removable/foo")))); | |
| 213 EXPECT_FALSE(provider.IsAccessAllowed( | |
| 214 CreateFileSystemURL(extension, FPL("removable/foo1")))); | |
| 215 | |
| 216 // System mount point access. | |
| 217 EXPECT_FALSE(provider.IsAccessAllowed( | |
| 218 CreateFileSystemURL(extension, FPL("system/foo")))); | |
| 219 | |
| 220 provider.GrantFileAccessToExtension(extension, FilePath(FPL("system/foo"))); | |
| 221 EXPECT_TRUE(provider.IsAccessAllowed( | |
| 222 CreateFileSystemURL(extension, FPL("system/foo")))); | |
| 223 EXPECT_FALSE(provider.IsAccessAllowed( | |
| 224 CreateFileSystemURL(extension, FPL("system/foo1")))); | |
| 225 | |
| 226 // oem is restricted file system. | |
| 227 provider.GrantFileAccessToExtension(extension, FilePath(FPL("oem/foo"))); | |
| 228 // The extension should not be able to access the file even if | |
| 229 // GrantFileAccessToExtension was called. | |
| 230 EXPECT_FALSE(provider.IsAccessAllowed( | |
| 231 CreateFileSystemURL(extension, FPL("oem/foo")))); | |
| 232 | |
| 233 provider.GrantFullAccessToExtension(extension); | |
| 234 // The extension should be able to access restricted file system after it was | |
| 235 // granted full access. | |
| 236 EXPECT_TRUE(provider.IsAccessAllowed( | |
| 237 CreateFileSystemURL(extension, FPL("oem/foo")))); | |
| 238 // The extension which was granted full access should be able to access any | |
| 239 // path on current file systems. | |
| 240 EXPECT_TRUE(provider.IsAccessAllowed( | |
| 241 CreateFileSystemURL(extension, FPL("removable/foo1")))); | |
| 242 EXPECT_TRUE(provider.IsAccessAllowed( | |
| 243 CreateFileSystemURL(extension, FPL("system/foo1")))); | |
| 244 | |
| 245 // The extension still cannot access new mount points. | |
| 246 ASSERT_TRUE(provider.AddLocalMountPoint(FilePath(FPL("/foo/test")))); | |
| 247 EXPECT_FALSE(provider.IsAccessAllowed( | |
| 248 CreateFileSystemURL(extension, FPL("test_/foo")))); | |
| 249 | |
| 250 provider.RevokeAccessForExtension(extension); | |
| 251 EXPECT_FALSE(provider.IsAccessAllowed( | |
| 252 CreateFileSystemURL(extension, FPL("removable/foo")))); | |
| 253 | |
| 254 fileapi::FileSystemURL internal_url(GURL("chrome://foo"), | |
| 255 fileapi::kFileSystemTypeExternal, | |
| 256 FilePath(FPL("removable/"))); | |
| 257 // Internal WebUI should have full access. | |
| 258 EXPECT_TRUE(provider.IsAccessAllowed(internal_url)); | |
| 259 } | |
| 260 | |
| 261 TEST(CrosMountPointProvider, GetVirtualPathConflictWithSystemPoints) { | |
| 262 scoped_refptr<quota::MockSpecialStoragePolicy> storage_policy = | |
| 263 new quota::MockSpecialStoragePolicy(); | |
| 264 scoped_refptr<fileapi::ExternalMountPoints> mount_points( | |
| 265 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 266 scoped_refptr<fileapi::ExternalMountPoints> system_mount_points( | |
| 267 fileapi::ExternalMountPoints::CreateRefCounted()); | |
| 268 chromeos::CrosMountPointProvider provider(storage_policy, | |
| 269 mount_points.get(), | |
| 270 system_mount_points.get()); | |
| 271 | |
| 272 const fileapi::FileSystemType type = fileapi::kFileSystemTypeNativeLocal; | |
| 273 | |
| 274 // Provider specific mount points. | |
| 275 ASSERT_TRUE( | |
| 276 mount_points->RegisterFileSystem("b", type, FilePath(FPL("/a/b")))); | |
| 277 ASSERT_TRUE( | |
| 278 mount_points->RegisterFileSystem("y", type, FilePath(FPL("/z/y")))); | |
| 279 ASSERT_TRUE( | |
| 280 mount_points->RegisterFileSystem("n", type, FilePath(FPL("/m/n")))); | |
| 281 | |
| 282 // System mount points | |
| 283 ASSERT_TRUE(system_mount_points->RegisterFileSystem( | |
| 284 "gb", type, FilePath(FPL("/a/b")))); | |
| 285 ASSERT_TRUE( | |
| 286 system_mount_points->RegisterFileSystem("gz", type, FilePath(FPL("/z")))); | |
| 287 ASSERT_TRUE(system_mount_points->RegisterFileSystem( | |
| 288 "gp", type, FilePath(FPL("/m/n/o/p")))); | |
| 289 | |
| 290 struct TestCase { | |
| 291 const FilePath::CharType* const local_path; | |
| 292 bool success; | |
| 293 const FilePath::CharType* const virtual_path; | |
| 294 }; | |
| 295 | |
| 296 const TestCase kTestCases[] = { | |
| 297 // Same paths in both mount points. | |
| 298 { FPL("/a/b/c/d"), true, FPL("b/c/d") }, | |
| 299 // System mount points path more specific. | |
| 300 { FPL("/m/n/o/p/r/s"), true, FPL("n/o/p/r/s") }, | |
| 301 // System mount points path less specific. | |
| 302 { FPL("/z/y/x"), true, FPL("y/x") }, | |
| 303 // Only system mount points path matches. | |
| 304 { FPL("/z/q/r/s"), true, FPL("gz/q/r/s") }, | |
| 305 // No match. | |
| 306 { FPL("/foo/xxx"), false, FPL("") }, | |
| 307 }; | |
| 308 | |
| 309 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { | |
| 310 // Initialize virtual path with a value. | |
| 311 FilePath virtual_path(FPL("/mount")); | |
| 312 FilePath local_path(kTestCases[i].local_path); | |
| 313 EXPECT_EQ(kTestCases[i].success, | |
| 314 provider.GetVirtualPath(local_path, &virtual_path)) | |
| 315 << "Resolving " << kTestCases[i].local_path; | |
| 316 | |
| 317 // There are no guarantees for |virtual_path| value if |GetVirtualPath| | |
| 318 // fails. | |
| 319 if (!kTestCases[i].success) | |
| 320 continue; | |
| 321 | |
| 322 FilePath expected_virtual_path(kTestCases[i].virtual_path); | |
| 323 EXPECT_EQ(expected_virtual_path, virtual_path) | |
| 324 << "Resolving " << kTestCases[i].local_path; | |
| 325 } | |
| 326 } | |
| 327 | |
| 328 } // namespace | |
| 329 | |
| OLD | NEW |