OLD | NEW |
(Empty) | |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "webkit/browser/fileapi/sandbox_context.h" |
| 6 |
| 7 #include "base/basictypes.h" |
| 8 #include "base/file_util.h" |
| 9 #include "base/files/scoped_temp_dir.h" |
| 10 #include "base/memory/scoped_ptr.h" |
| 11 #include "base/message_loop/message_loop.h" |
| 12 #include "base/message_loop/message_loop_proxy.h" |
| 13 #include "testing/gtest/include/gtest/gtest.h" |
| 14 #include "url/gurl.h" |
| 15 #include "webkit/browser/fileapi/file_system_url.h" |
| 16 #include "webkit/browser/fileapi/mock_file_system_options.h" |
| 17 |
| 18 namespace fileapi { |
| 19 |
| 20 namespace { |
| 21 |
| 22 FileSystemURL CreateFileSystemURL(const char* path) { |
| 23 const GURL kOrigin("http://foo/"); |
| 24 return FileSystemURL::CreateForTest( |
| 25 kOrigin, kFileSystemTypeTemporary, base::FilePath::FromUTF8Unsafe(path)); |
| 26 } |
| 27 |
| 28 } // namespace |
| 29 |
| 30 class SandboxContextTest : public testing::Test { |
| 31 protected: |
| 32 virtual void SetUp() { |
| 33 ASSERT_TRUE(data_dir_.CreateUniqueTempDir()); |
| 34 context_.reset(new SandboxContext( |
| 35 NULL /* quota_manager_proxy */, |
| 36 base::MessageLoopProxy::current().get(), |
| 37 data_dir_.path(), |
| 38 NULL /* special_storage_policy */, |
| 39 CreateAllowFileAccessOptions())); |
| 40 } |
| 41 |
| 42 base::ScopedTempDir data_dir_; |
| 43 base::MessageLoop message_loop_; |
| 44 scoped_ptr<SandboxContext> context_; |
| 45 }; |
| 46 |
| 47 TEST_F(SandboxContextTest, IsAccessValid) { |
| 48 // Normal case. |
| 49 EXPECT_TRUE(context_->IsAccessValid(CreateFileSystemURL("a"))); |
| 50 |
| 51 // Access to a path with parent references ('..') should be disallowed. |
| 52 EXPECT_FALSE(context_->IsAccessValid(CreateFileSystemURL("a/../b"))); |
| 53 |
| 54 // Access from non-allowed scheme should be disallowed. |
| 55 EXPECT_FALSE(context_->IsAccessValid( |
| 56 FileSystemURL::CreateForTest( |
| 57 GURL("unknown://bar"), kFileSystemTypeTemporary, |
| 58 base::FilePath::FromUTF8Unsafe("foo")))); |
| 59 |
| 60 // Access with restricted name should be disallowed. |
| 61 EXPECT_FALSE(context_->IsAccessValid(CreateFileSystemURL("."))); |
| 62 EXPECT_FALSE(context_->IsAccessValid(CreateFileSystemURL(".."))); |
| 63 |
| 64 // This is also disallowed due to Windows XP parent path handling. |
| 65 EXPECT_FALSE(context_->IsAccessValid(CreateFileSystemURL("..."))); |
| 66 |
| 67 // These are identified as unsafe cases due to weird path handling |
| 68 // on Windows. |
| 69 EXPECT_FALSE(context_->IsAccessValid(CreateFileSystemURL(" .."))); |
| 70 EXPECT_FALSE(context_->IsAccessValid(CreateFileSystemURL(".. "))); |
| 71 |
| 72 // Similar but safe cases. |
| 73 EXPECT_TRUE(context_->IsAccessValid(CreateFileSystemURL(" ."))); |
| 74 EXPECT_TRUE(context_->IsAccessValid(CreateFileSystemURL(". "))); |
| 75 EXPECT_TRUE(context_->IsAccessValid(CreateFileSystemURL("b."))); |
| 76 EXPECT_TRUE(context_->IsAccessValid(CreateFileSystemURL(".b"))); |
| 77 |
| 78 // A path that looks like a drive letter. |
| 79 EXPECT_TRUE(context_->IsAccessValid(CreateFileSystemURL("c:"))); |
| 80 } |
| 81 |
| 82 } // namespace fileapi |
OLD | NEW |