Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(117)

Side by Side Diff: chrome/browser/chromeos/fileapi/file_access_permissions_unittest.cc

Issue 17644006: Move files under webkit/browser/fileapi/... to chrome/browser/chromeos/fileapi/... (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: address review comments. Created 7 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/chromeos/fileapi/file_access_permissions.h"
6
5 #include "testing/gtest/include/gtest/gtest.h" 7 #include "testing/gtest/include/gtest/gtest.h"
6 #include "webkit/browser/chromeos/fileapi/file_access_permissions.h"
7 8
9 namespace chromeos {
8 10
9 class FileAccessPermissionsTest : public testing::Test { 11 TEST(FileAccessPermissionsTest, FileAccessChecks) {
10 };
11
12 TEST_F(FileAccessPermissionsTest, FileAccessChecks) {
13 #if defined(OS_WIN)
14 base::FilePath good_dir(FILE_PATH_LITERAL("c:\\root\\dir"));
15 base::FilePath bad_dir(FILE_PATH_LITERAL("c:\\root"));
16 base::FilePath good_file(FILE_PATH_LITERAL("c:\\root\\dir\\good_file.txt"));
17 base::FilePath bad_file(FILE_PATH_LITERAL("c:\\root\\dir\\bad_file.txt"));
18 #elif defined(OS_POSIX)
19 base::FilePath good_dir(FILE_PATH_LITERAL("/root/dir")); 12 base::FilePath good_dir(FILE_PATH_LITERAL("/root/dir"));
20 base::FilePath bad_dir(FILE_PATH_LITERAL("/root")); 13 base::FilePath bad_dir(FILE_PATH_LITERAL("/root"));
21 base::FilePath good_file(FILE_PATH_LITERAL("/root/dir/good_file.txt")); 14 base::FilePath good_file(FILE_PATH_LITERAL("/root/dir/good_file.txt"));
22 base::FilePath bad_file(FILE_PATH_LITERAL("/root/dir/bad_file.txt")); 15 base::FilePath bad_file(FILE_PATH_LITERAL("/root/dir/bad_file.txt"));
23 #endif 16
24 std::string extension1("ddammdhioacbehjngdmkjcjbnfginlla"); 17 std::string extension1("ddammdhioacbehjngdmkjcjbnfginlla");
25 std::string extension2("jkhdjkhkhsdkfhsdkhrterwmtermeter"); 18 std::string extension2("jkhdjkhkhsdkfhsdkhrterwmtermeter");
26 19
27 chromeos::FileAccessPermissions permissions; 20 FileAccessPermissions permissions;
28 // By default extension have no access to any local file. 21 // By default extension have no access to any local file.
29 EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_dir)); 22 EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_dir));
30 EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_file)); 23 EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_file));
31 EXPECT_FALSE(permissions.HasAccessPermission(extension1, bad_file)); 24 EXPECT_FALSE(permissions.HasAccessPermission(extension1, bad_file));
32 EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_dir)); 25 EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_dir));
33 EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_file)); 26 EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_file));
34 EXPECT_FALSE(permissions.HasAccessPermission(extension2, bad_file)); 27 EXPECT_FALSE(permissions.HasAccessPermission(extension2, bad_file));
35 28
36 // After granting file access to the handler extension for a given file, it 29 // After granting file access to the handler extension for a given file, it
37 // can only access that file an nothing else. 30 // can only access that file an nothing else.
(...skipping 20 matching lines...) Expand all
58 // any file system element anymore. 51 // any file system element anymore.
59 permissions.RevokePermissions(extension1); 52 permissions.RevokePermissions(extension1);
60 permissions.RevokePermissions(extension2); 53 permissions.RevokePermissions(extension2);
61 EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_dir)); 54 EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_dir));
62 EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_file)); 55 EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_file));
63 EXPECT_FALSE(permissions.HasAccessPermission(extension1, bad_file)); 56 EXPECT_FALSE(permissions.HasAccessPermission(extension1, bad_file));
64 EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_dir)); 57 EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_dir));
65 EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_file)); 58 EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_file));
66 EXPECT_FALSE(permissions.HasAccessPermission(extension2, bad_file)); 59 EXPECT_FALSE(permissions.HasAccessPermission(extension2, bad_file));
67 } 60 }
61
62 } // namespace chromeos
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698