Index: base/file_util_unittest.cc |
diff --git a/base/file_util_unittest.cc b/base/file_util_unittest.cc |
index 5b8684fcef814b33f6a554a0d0eb4e040e82df5a..96b585826ed4533388b95f13bd6637188c134fca 100644 |
--- a/base/file_util_unittest.cc |
+++ b/base/file_util_unittest.cc |
@@ -2127,23 +2127,23 @@ TEST_F(VerifyPathControlledByUserTest, BadPaths) { |
.AppendASCII("not") |
.AppendASCII("exist"); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, does_not_exist, uid_, ok_gids_)); |
// |base| not a subpath of |path|. |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, base_dir_, uid_, ok_gids_)); |
// An empty base path will fail to be a prefix for any path. |
FilePath empty; |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
empty, base_dir_, uid_, ok_gids_)); |
// Finding that a bad call fails proves nothing unless a good call succeeds. |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, ok_gids_)); |
} |
@@ -2156,10 +2156,10 @@ TEST_F(VerifyPathControlledByUserTest, Symlinks) { |
<< "Failed to create symlink."; |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, file_link, uid_, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
file_link, file_link, uid_, ok_gids_)); |
// Symlink from one directory to another within the path. |
@@ -2171,16 +2171,16 @@ TEST_F(VerifyPathControlledByUserTest, Symlinks) { |
ASSERT_TRUE(PathExists(file_path_with_link)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, file_path_with_link, uid_, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
link_to_sub_dir, file_path_with_link, uid_, ok_gids_)); |
// Symlinks in parents of base path are allowed. |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
file_path_with_link, file_path_with_link, uid_, ok_gids_)); |
} |
@@ -2198,35 +2198,35 @@ TEST_F(VerifyPathControlledByUserTest, OwnershipChecks) { |
// We control these paths. |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, ok_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, ok_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, ok_gids_)); |
// Another user does not control these paths. |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, bad_uid, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, bad_uid, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, bad_uid, ok_gids_)); |
// Another group does not control the paths. |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, bad_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, bad_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, bad_gids_)); |
} |
@@ -2241,36 +2241,36 @@ TEST_F(VerifyPathControlledByUserTest, GroupWriteTest) { |
// Any group is okay because the path is not group-writable. |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, ok_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, ok_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, ok_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, bad_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, bad_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, bad_gids_)); |
// No group is okay, because we don't check the group |
// if no group can write. |
std::set<gid_t> no_gids; // Empty set of gids. |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, no_gids)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, no_gids)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, no_gids)); |
@@ -2284,23 +2284,23 @@ TEST_F(VerifyPathControlledByUserTest, GroupWriteTest) { |
// Now |ok_gids_| works, but |bad_gids_| fails. |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, ok_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, ok_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, bad_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, bad_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, bad_gids_)); |
// Because any group in the group set is allowed, |
@@ -2313,13 +2313,13 @@ TEST_F(VerifyPathControlledByUserTest, GroupWriteTest) { |
std::inserter(multiple_gids, multiple_gids.begin())); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, multiple_gids)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, multiple_gids)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, multiple_gids)); |
} |
@@ -2334,78 +2334,78 @@ TEST_F(VerifyPathControlledByUserTest, WriteBitChecks) { |
// Initialy, we control all parts of the path. |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, ok_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, ok_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, ok_gids_)); |
// Make base_dir_ world-writable. |
ASSERT_NO_FATAL_FAILURE( |
ChangePosixFilePermissions(base_dir_, S_IWOTH, 0u)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, ok_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, ok_gids_)); |
// Make sub_dir_ world writable. |
ASSERT_NO_FATAL_FAILURE( |
ChangePosixFilePermissions(sub_dir_, S_IWOTH, 0u)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, ok_gids_)); |
// Make text_file_ world writable. |
ASSERT_NO_FATAL_FAILURE( |
ChangePosixFilePermissions(text_file_, S_IWOTH, 0u)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, ok_gids_)); |
// Make sub_dir_ non-world writable. |
ASSERT_NO_FATAL_FAILURE( |
ChangePosixFilePermissions(sub_dir_, 0u, S_IWOTH)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, ok_gids_)); |
// Make base_dir_ non-world-writable. |
ASSERT_NO_FATAL_FAILURE( |
ChangePosixFilePermissions(base_dir_, 0u, S_IWOTH)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, ok_gids_)); |
EXPECT_FALSE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, ok_gids_)); |
// Back to the initial state: Nothing is writable, so every path |
@@ -2413,13 +2413,13 @@ TEST_F(VerifyPathControlledByUserTest, WriteBitChecks) { |
ASSERT_NO_FATAL_FAILURE( |
ChangePosixFilePermissions(text_file_, 0u, S_IWOTH)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, sub_dir_, uid_, ok_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
base_dir_, text_file_, uid_, ok_gids_)); |
EXPECT_TRUE( |
- file_util::VerifyPathControlledByUser( |
+ base::VerifyPathControlledByUser( |
sub_dir_, text_file_, uid_, ok_gids_)); |
} |