OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "base/path_service.h" | 5 #include "base/path_service.h" |
6 #include "base/strings/utf_string_conversions.h" | 6 #include "base/strings/utf_string_conversions.h" |
7 #include "content/browser/child_process_security_policy_impl.h" | 7 #include "content/browser/child_process_security_policy_impl.h" |
8 #include "content/browser/frame_host/render_frame_host_impl.h" | 8 #include "content/browser/frame_host/render_frame_host_impl.h" |
9 #include "content/browser/renderer_host/render_view_host_delegate_view.h" | 9 #include "content/browser/renderer_host/render_view_host_delegate_view.h" |
10 #include "content/common/input_messages.h" | 10 #include "content/common/input_messages.h" |
(...skipping 189 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
200 ChildProcessSecurityPolicyImpl* policy = | 200 ChildProcessSecurityPolicyImpl* policy = |
201 ChildProcessSecurityPolicyImpl::GetInstance(); | 201 ChildProcessSecurityPolicyImpl::GetInstance(); |
202 | 202 |
203 EXPECT_FALSE(policy->CanRequestURL(id, highlighted_file_url)); | 203 EXPECT_FALSE(policy->CanRequestURL(id, highlighted_file_url)); |
204 EXPECT_FALSE(policy->CanReadFile(id, highlighted_file_path)); | 204 EXPECT_FALSE(policy->CanReadFile(id, highlighted_file_path)); |
205 EXPECT_TRUE(policy->CanRequestURL(id, dragged_file_url)); | 205 EXPECT_TRUE(policy->CanRequestURL(id, dragged_file_url)); |
206 EXPECT_TRUE(policy->CanReadFile(id, dragged_file_path)); | 206 EXPECT_TRUE(policy->CanReadFile(id, dragged_file_path)); |
207 EXPECT_FALSE(policy->CanRequestURL(id, sensitive_file_url)); | 207 EXPECT_FALSE(policy->CanRequestURL(id, sensitive_file_url)); |
208 EXPECT_FALSE(policy->CanReadFile(id, sensitive_file_path)); | 208 EXPECT_FALSE(policy->CanReadFile(id, sensitive_file_path)); |
209 } | 209 } |
210 /* TODO(jam) | |
211 // The test that follow trigger DCHECKS in debug build. | |
212 #if defined(NDEBUG) && !defined(DCHECK_ALWAYS_ON) | |
213 | |
214 // Test that when we fail to de-serialize a message, RenderViewHost calls the | |
215 // ReceivedBadMessage() handler. | |
216 TEST_F(RenderViewHostTest, BadMessageHandlerRenderViewHost) { | |
217 EXPECT_EQ(0, process()->bad_msg_count()); | |
218 // craft an incorrect ViewHostMsg_UpdateTargetURL message. The real one has | |
219 // two payload items but the one we construct has none. | |
220 IPC::Message message(0, ViewHostMsg_UpdateTargetURL::ID, | |
221 IPC::Message::PRIORITY_NORMAL); | |
222 test_rvh()->OnMessageReceived(message); | |
223 EXPECT_EQ(1, process()->bad_msg_count()); | |
224 } | |
225 | |
226 // Test that when we fail to de-serialize a message, RenderWidgetHost calls the | |
227 // ReceivedBadMessage() handler. | |
228 TEST_F(RenderViewHostTest, BadMessageHandlerRenderWidgetHost) { | |
229 EXPECT_EQ(0, process()->bad_msg_count()); | |
230 // craft an incorrect ViewHostMsg_UpdateRect message. The real one has | |
231 // one payload item but the one we construct has none. | |
232 IPC::Message message(0, ViewHostMsg_UpdateRect::ID, | |
233 IPC::Message::PRIORITY_NORMAL); | |
234 test_rvh()->OnMessageReceived(message); | |
235 EXPECT_EQ(1, process()->bad_msg_count()); | |
236 } | |
237 | |
238 // Test that OnInputEventAck() detects bad messages. | |
239 TEST_F(RenderViewHostTest, BadMessageHandlerInputEventAck) { | |
240 EXPECT_EQ(0, process()->bad_msg_count()); | |
241 // InputHostMsg_HandleInputEvent_ACK is defined taking 0 params but | |
242 // the code actually expects it to have at least one int para, this this | |
243 // bogus message will not fail at de-serialization but should fail in | |
244 // OnInputEventAck() processing. | |
245 IPC::Message message(0, InputHostMsg_HandleInputEvent_ACK::ID, | |
246 IPC::Message::PRIORITY_NORMAL); | |
247 test_rvh()->OnMessageReceived(message); | |
248 EXPECT_EQ(1, process()->bad_msg_count()); | |
249 } | |
250 #endif | |
251 */ | |
252 | 210 |
253 TEST_F(RenderViewHostTest, MessageWithBadHistoryItemFiles) { | 211 TEST_F(RenderViewHostTest, MessageWithBadHistoryItemFiles) { |
254 base::FilePath file_path; | 212 base::FilePath file_path; |
255 EXPECT_TRUE(PathService::Get(base::DIR_TEMP, &file_path)); | 213 EXPECT_TRUE(PathService::Get(base::DIR_TEMP, &file_path)); |
256 file_path = file_path.AppendASCII("foo"); | 214 file_path = file_path.AppendASCII("foo"); |
257 EXPECT_EQ(0, process()->bad_msg_count()); | 215 EXPECT_EQ(0, process()->bad_msg_count()); |
258 test_rvh()->TestOnUpdateStateWithFile(process()->GetID(), file_path); | 216 test_rvh()->TestOnUpdateStateWithFile(process()->GetID(), file_path); |
259 EXPECT_EQ(1, process()->bad_msg_count()); | 217 EXPECT_EQ(1, process()->bad_msg_count()); |
260 | 218 |
261 ChildProcessSecurityPolicyImpl::GetInstance()->GrantReadFile( | 219 ChildProcessSecurityPolicyImpl::GetInstance()->GrantReadFile( |
(...skipping 18 matching lines...) Expand all Loading... |
280 } | 238 } |
281 | 239 |
282 TEST_F(RenderViewHostTest, RoutingIdSane) { | 240 TEST_F(RenderViewHostTest, RoutingIdSane) { |
283 RenderFrameHostImpl* root_rfh = | 241 RenderFrameHostImpl* root_rfh = |
284 contents()->GetFrameTree()->root()->current_frame_host(); | 242 contents()->GetFrameTree()->root()->current_frame_host(); |
285 EXPECT_EQ(test_rvh()->GetProcess(), root_rfh->GetProcess()); | 243 EXPECT_EQ(test_rvh()->GetProcess(), root_rfh->GetProcess()); |
286 EXPECT_NE(test_rvh()->GetRoutingID(), root_rfh->routing_id()); | 244 EXPECT_NE(test_rvh()->GetRoutingID(), root_rfh->routing_id()); |
287 } | 245 } |
288 | 246 |
289 } // namespace content | 247 } // namespace content |
OLD | NEW |