| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "storage/browser/fileapi/sandbox_file_system_backend_delegate.h" | 5 #include "storage/browser/fileapi/sandbox_file_system_backend_delegate.h" |
| 6 | 6 |
| 7 #include <memory> | 7 #include <memory> |
| 8 | 8 |
| 9 #include "base/files/file_util.h" | 9 #include "base/files/file_util.h" |
| 10 #include "base/files/scoped_temp_dir.h" | 10 #include "base/files/scoped_temp_dir.h" |
| 11 #include "base/test/scoped_task_environment.h" |
| 11 #include "base/threading/thread_task_runner_handle.h" | 12 #include "base/threading/thread_task_runner_handle.h" |
| 12 #include "content/public/test/test_file_system_options.h" | 13 #include "content/public/test/test_file_system_options.h" |
| 13 #include "storage/browser/fileapi/file_system_url.h" | 14 #include "storage/browser/fileapi/file_system_url.h" |
| 14 #include "testing/gtest/include/gtest/gtest.h" | 15 #include "testing/gtest/include/gtest/gtest.h" |
| 15 #include "url/gurl.h" | 16 #include "url/gurl.h" |
| 16 | 17 |
| 17 using storage::FileSystemURL; | 18 using storage::FileSystemURL; |
| 18 | 19 |
| 19 namespace content { | 20 namespace content { |
| 20 | 21 |
| (...skipping 17 matching lines...) Expand all Loading... |
| 38 NULL /* quota_manager_proxy */, | 39 NULL /* quota_manager_proxy */, |
| 39 base::ThreadTaskRunnerHandle::Get().get(), data_dir_.GetPath(), | 40 base::ThreadTaskRunnerHandle::Get().get(), data_dir_.GetPath(), |
| 40 NULL /* special_storage_policy */, CreateAllowFileAccessOptions())); | 41 NULL /* special_storage_policy */, CreateAllowFileAccessOptions())); |
| 41 } | 42 } |
| 42 | 43 |
| 43 bool IsAccessValid(const FileSystemURL& url) const { | 44 bool IsAccessValid(const FileSystemURL& url) const { |
| 44 return delegate_->IsAccessValid(url); | 45 return delegate_->IsAccessValid(url); |
| 45 } | 46 } |
| 46 | 47 |
| 47 base::ScopedTempDir data_dir_; | 48 base::ScopedTempDir data_dir_; |
| 48 base::MessageLoop message_loop_; | 49 base::test::ScopedTaskEnvironment scoped_task_environment_; |
| 49 std::unique_ptr<storage::SandboxFileSystemBackendDelegate> delegate_; | 50 std::unique_ptr<storage::SandboxFileSystemBackendDelegate> delegate_; |
| 50 }; | 51 }; |
| 51 | 52 |
| 52 TEST_F(SandboxFileSystemBackendDelegateTest, IsAccessValid) { | 53 TEST_F(SandboxFileSystemBackendDelegateTest, IsAccessValid) { |
| 53 // Normal case. | 54 // Normal case. |
| 54 EXPECT_TRUE(IsAccessValid(CreateFileSystemURL("a"))); | 55 EXPECT_TRUE(IsAccessValid(CreateFileSystemURL("a"))); |
| 55 | 56 |
| 56 // Access to a path with parent references ('..') should be disallowed. | 57 // Access to a path with parent references ('..') should be disallowed. |
| 57 EXPECT_FALSE(IsAccessValid(CreateFileSystemURL("a/../b"))); | 58 EXPECT_FALSE(IsAccessValid(CreateFileSystemURL("a/../b"))); |
| 58 | 59 |
| (...skipping 19 matching lines...) Expand all Loading... |
| 78 EXPECT_TRUE(IsAccessValid(CreateFileSystemURL(" ."))); | 79 EXPECT_TRUE(IsAccessValid(CreateFileSystemURL(" ."))); |
| 79 EXPECT_TRUE(IsAccessValid(CreateFileSystemURL(". "))); | 80 EXPECT_TRUE(IsAccessValid(CreateFileSystemURL(". "))); |
| 80 EXPECT_TRUE(IsAccessValid(CreateFileSystemURL("b."))); | 81 EXPECT_TRUE(IsAccessValid(CreateFileSystemURL("b."))); |
| 81 EXPECT_TRUE(IsAccessValid(CreateFileSystemURL(".b"))); | 82 EXPECT_TRUE(IsAccessValid(CreateFileSystemURL(".b"))); |
| 82 | 83 |
| 83 // A path that looks like a drive letter. | 84 // A path that looks like a drive letter. |
| 84 EXPECT_TRUE(IsAccessValid(CreateFileSystemURL("c:"))); | 85 EXPECT_TRUE(IsAccessValid(CreateFileSystemURL("c:"))); |
| 85 } | 86 } |
| 86 | 87 |
| 87 } // namespace content | 88 } // namespace content |
| OLD | NEW |