Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(194)

Unified Diff: webkit/browser/chromeos/fileapi/file_access_permissions_unittest.cc

Issue 17644006: Move files under webkit/browser/fileapi/... to chrome/browser/chromeos/fileapi/... (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: address review comments. Created 7 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: webkit/browser/chromeos/fileapi/file_access_permissions_unittest.cc
diff --git a/webkit/browser/chromeos/fileapi/file_access_permissions_unittest.cc b/webkit/browser/chromeos/fileapi/file_access_permissions_unittest.cc
deleted file mode 100644
index 3b6875d84bb7f580abe49a736a3af32814378a4e..0000000000000000000000000000000000000000
--- a/webkit/browser/chromeos/fileapi/file_access_permissions_unittest.cc
+++ /dev/null
@@ -1,67 +0,0 @@
-// Copyright (c) 2011 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "testing/gtest/include/gtest/gtest.h"
-#include "webkit/browser/chromeos/fileapi/file_access_permissions.h"
-
-
-class FileAccessPermissionsTest : public testing::Test {
-};
-
-TEST_F(FileAccessPermissionsTest, FileAccessChecks) {
-#if defined(OS_WIN)
- base::FilePath good_dir(FILE_PATH_LITERAL("c:\\root\\dir"));
- base::FilePath bad_dir(FILE_PATH_LITERAL("c:\\root"));
- base::FilePath good_file(FILE_PATH_LITERAL("c:\\root\\dir\\good_file.txt"));
- base::FilePath bad_file(FILE_PATH_LITERAL("c:\\root\\dir\\bad_file.txt"));
-#elif defined(OS_POSIX)
- base::FilePath good_dir(FILE_PATH_LITERAL("/root/dir"));
- base::FilePath bad_dir(FILE_PATH_LITERAL("/root"));
- base::FilePath good_file(FILE_PATH_LITERAL("/root/dir/good_file.txt"));
- base::FilePath bad_file(FILE_PATH_LITERAL("/root/dir/bad_file.txt"));
-#endif
- std::string extension1("ddammdhioacbehjngdmkjcjbnfginlla");
- std::string extension2("jkhdjkhkhsdkfhsdkhrterwmtermeter");
-
- chromeos::FileAccessPermissions permissions;
- // By default extension have no access to any local file.
- EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_dir));
- EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_file));
- EXPECT_FALSE(permissions.HasAccessPermission(extension1, bad_file));
- EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_dir));
- EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_file));
- EXPECT_FALSE(permissions.HasAccessPermission(extension2, bad_file));
-
- // After granting file access to the handler extension for a given file, it
- // can only access that file an nothing else.
- permissions.GrantAccessPermission(extension1, good_file);
- EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_dir));
- EXPECT_TRUE(permissions.HasAccessPermission(extension1, good_file));
- EXPECT_FALSE(permissions.HasAccessPermission(extension1, bad_file));
- EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_dir));
- EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_file));
- EXPECT_FALSE(permissions.HasAccessPermission(extension2, bad_file));
-
-
- // After granting file access to the handler extension for a given directory,
- // it can access that directory and all files within it.
- permissions.GrantAccessPermission(extension2, good_dir);
- EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_dir));
- EXPECT_TRUE(permissions.HasAccessPermission(extension1, good_file));
- EXPECT_FALSE(permissions.HasAccessPermission(extension1, bad_file));
- EXPECT_TRUE(permissions.HasAccessPermission(extension2, good_dir));
- EXPECT_TRUE(permissions.HasAccessPermission(extension2, good_file));
- EXPECT_TRUE(permissions.HasAccessPermission(extension2, bad_file));
-
- // After revoking rights for extensions, they should not be able to access
- // any file system element anymore.
- permissions.RevokePermissions(extension1);
- permissions.RevokePermissions(extension2);
- EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_dir));
- EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_file));
- EXPECT_FALSE(permissions.HasAccessPermission(extension1, bad_file));
- EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_dir));
- EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_file));
- EXPECT_FALSE(permissions.HasAccessPermission(extension2, bad_file));
-}

Powered by Google App Engine
This is Rietveld 408576698