Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(322)

Unified Diff: content/browser/fileapi/browser_file_system_helper_unittest.cc

Issue 2830743004: Extracting and unittesting PrepareDropDataForChildProcess function. (Closed)
Patch Set: Self-review. Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: content/browser/fileapi/browser_file_system_helper_unittest.cc
diff --git a/content/browser/fileapi/browser_file_system_helper_unittest.cc b/content/browser/fileapi/browser_file_system_helper_unittest.cc
new file mode 100644
index 0000000000000000000000000000000000000000..6ee2e756bf591ebf7e2b8ece39a2cbfcc9f0be7d
--- /dev/null
+++ b/content/browser/fileapi/browser_file_system_helper_unittest.cc
@@ -0,0 +1,179 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include <memory>
+#include <string>
+#include <vector>
+
+#include "base/files/file_path.h"
+#include "base/test/null_task_runner.h"
+#include "content/browser/child_process_security_policy_impl.h"
+#include "content/browser/fileapi/browser_file_system_helper.h"
+#include "content/public/common/drop_data.h"
+#include "net/base/filename_util.h"
+#include "storage/browser/fileapi/external_mount_points.h"
+#include "storage/browser/fileapi/file_system_options.h"
+#include "storage/browser/fileapi/file_system_url.h"
+#include "storage/browser/fileapi/isolated_context.h"
+#include "storage/common/fileapi/file_system_types.h"
+#include "testing/gtest/include/gtest/gtest.h"
+#include "url/gurl.h"
+#include "url/origin.h"
+
+namespace content {
+namespace {
+
+const int kRendererID = 42;
+
+} // namespace
+
+TEST(BrowserFileSystemHelperTest,
+ PrepareDropDataForChildProcess_FileSystemFiles) {
+ ChildProcessSecurityPolicyImpl* p =
+ ChildProcessSecurityPolicyImpl::GetInstance();
+ p->Add(kRendererID);
+
+ // Prepare |original_file| FileSystemURL that comes from a |sensitive_origin|.
+ // This attempts to simulate for unit testing the drive URL from
+ // https://crbug.com/705295#c23.
+ const GURL kSensitiveOrigin("chrome://hhaomjibdihmijegdhdafkllkbggdgoj/");
+ const char kMountName[] = "drive-testuser%40gmail.com-hash";
+ const base::FilePath kTestPath(FILE_PATH_LITERAL("root/dir/testfile.jpg"));
+ scoped_refptr<storage::ExternalMountPoints> external_mount_points =
+ storage::ExternalMountPoints::CreateRefCounted();
+ external_mount_points->RegisterFileSystem(
+ kMountName, storage::FileSystemType::kFileSystemTypeTest,
+ storage::FileSystemMountOption(),
+ base::FilePath(FILE_PATH_LITERAL("/test")).AppendASCII(kMountName));
+ storage::FileSystemURL original_file =
+ external_mount_points->CreateExternalFileSystemURL(kSensitiveOrigin,
+ kMountName, kTestPath);
+ EXPECT_TRUE(original_file.is_valid());
+ EXPECT_EQ(kSensitiveOrigin, original_file.origin());
+
+ // Prepare fake FileSystemContext to use in the test.
+ scoped_refptr<base::SingleThreadTaskRunner> io_task_runner(
+ new base::NullTaskRunner);
+ scoped_refptr<base::SequencedTaskRunner> file_task_runner(
+ new base::NullTaskRunner);
+ storage::FileSystemOptions file_system_options(
+ storage::FileSystemOptions::PROFILE_MODE_NORMAL,
+ std::vector<std::string>(), nullptr);
+ scoped_refptr<storage::FileSystemContext> test_file_system_context(
+ new storage::FileSystemContext(
+ io_task_runner.get(), file_task_runner.get(),
+ external_mount_points.get(),
+ nullptr, // special_storage_policy
+ nullptr, // quota_manager_proxy,
+ std::vector<std::unique_ptr<storage::FileSystemBackend>>(),
+ std::vector<storage::URLRequestAutoMountHandler>(),
+ base::FilePath(), // partition_path
+ file_system_options));
+
+ // Prepare content::DropData containing |file_system_url|.
+ DropData::FileSystemFileInfo filesystem_file_info;
+ filesystem_file_info.url = original_file.ToGURL();
+ filesystem_file_info.size = 123;
+ filesystem_file_info.filesystem_id = original_file.filesystem_id();
+ DropData drop_data;
+ drop_data.file_system_files.push_back(filesystem_file_info);
+
+ // Verify that initially no access is be granted to the |kSensitiveOrigin|.
+ EXPECT_FALSE(p->CanCommitURL(kRendererID, kSensitiveOrigin));
+
+ // Verify that initially no access is granted to the |original_file|.
+ EXPECT_FALSE(p->CanReadFileSystemFile(kRendererID, original_file));
+ EXPECT_FALSE(p->CanWriteFileSystemFile(kRendererID, original_file));
+ EXPECT_FALSE(p->CanCreateFileSystemFile(kRendererID, original_file));
+ EXPECT_FALSE(p->CanCopyIntoFileSystemFile(kRendererID, original_file));
+ EXPECT_FALSE(p->CanDeleteFileSystemFile(kRendererID, original_file));
+
+ // Invoke the API under test to grant access to |drop_data|.
+ PrepareDropDataForChildProcess(&drop_data, p, kRendererID,
+ test_file_system_context.get());
+
+ // Verify that |drop_data| is mostly unchanged.
+ EXPECT_EQ(0u, drop_data.filenames.size());
+ EXPECT_EQ(1u, drop_data.file_system_files.size());
+ EXPECT_EQ(123, drop_data.file_system_files[0].size);
+ // It is okay if |drop_data.file_system_files[0].url| and
+ // |drop_data.file_system_files[0].filesystem_id| change (to aid in enforcing
+ // proper access patterns that are verified below).
+
+ // Verify that the URL didn't change *too* much.
+ storage::FileSystemURL dropped_file =
+ test_file_system_context->CrackURL(drop_data.file_system_files[0].url);
+ EXPECT_TRUE(dropped_file.is_valid());
+ EXPECT_EQ(original_file.origin(), dropped_file.origin());
+ EXPECT_EQ(original_file.path().BaseName(), dropped_file.path().BaseName());
+
+ // Verify that there is still no access to |kSensitiveOrigin|.
+ EXPECT_FALSE(p->CanCommitURL(kRendererID, kSensitiveOrigin));
+
+ // Verify that there is still no access to |original_file|.
+ EXPECT_FALSE(p->CanReadFileSystemFile(kRendererID, original_file));
+ EXPECT_FALSE(p->CanWriteFileSystemFile(kRendererID, original_file));
+ EXPECT_FALSE(p->CanCreateFileSystemFile(kRendererID, original_file));
+ EXPECT_FALSE(p->CanCopyIntoFileSystemFile(kRendererID, original_file));
+ EXPECT_FALSE(p->CanDeleteFileSystemFile(kRendererID, original_file));
+
+ // Verify that read access (and no other access) is granted for
+ // |dropped_file|.
+ EXPECT_TRUE(p->CanReadFileSystemFile(kRendererID, dropped_file));
+ EXPECT_FALSE(p->CanWriteFileSystemFile(kRendererID, dropped_file));
+ EXPECT_FALSE(p->CanCreateFileSystemFile(kRendererID, dropped_file));
+ EXPECT_FALSE(p->CanCopyIntoFileSystemFile(kRendererID, dropped_file));
+ EXPECT_FALSE(p->CanDeleteFileSystemFile(kRendererID, dropped_file));
+
+ p->Remove(kRendererID);
+}
+
+TEST(BrowserFileSystemHelperTest, PrepareDropDataForChildProcess_LocalFiles) {
+ ChildProcessSecurityPolicyImpl* p =
+ ChildProcessSecurityPolicyImpl::GetInstance();
+ p->Add(kRendererID);
+
+ // Prepare content::DropData containing some local files.
+ const base::FilePath kDraggedFile(
+ FILE_PATH_LITERAL("/test/dragged_file.txt"));
+ const base::FilePath kOtherFile(FILE_PATH_LITERAL("/test/other_file.txt"));
+ DropData drop_data;
+ drop_data.filenames.push_back(ui::FileInfo(kDraggedFile, base::FilePath()));
+
+ // Verify that initially no access is granted to both |kDraggedFile| and
+ // |kOtherFile|.
+ EXPECT_FALSE(p->CanReadFile(kRendererID, kDraggedFile));
+ EXPECT_FALSE(p->CanReadFile(kRendererID, kOtherFile));
+ EXPECT_FALSE(
+ p->CanCommitURL(kRendererID, net::FilePathToFileURL(kDraggedFile)));
+ EXPECT_FALSE(p->CanCreateReadWriteFile(kRendererID, kDraggedFile));
+ EXPECT_FALSE(p->CanCreateReadWriteFile(kRendererID, kOtherFile));
+ EXPECT_FALSE(
+ p->CanCommitURL(kRendererID, net::FilePathToFileURL(kOtherFile)));
+
+ // Invoke the API under test to grant access to |drop_data|.
+ PrepareDropDataForChildProcess(&drop_data, p, kRendererID, nullptr);
+
+ // Verify that |drop_data| is unchanged.
+ EXPECT_EQ(0u, drop_data.file_system_files.size());
+ EXPECT_EQ(1u, drop_data.filenames.size());
+ EXPECT_EQ(kDraggedFile, drop_data.filenames[0].path);
+
+ // Verify that read access (and no other access) is granted for
+ // |kDraggedFile|.
+ EXPECT_TRUE(p->CanReadFile(kRendererID, kDraggedFile));
+ EXPECT_FALSE(p->CanCreateReadWriteFile(kRendererID, kDraggedFile));
+ EXPECT_TRUE(
+ p->CanCommitURL(kRendererID, net::FilePathToFileURL(kDraggedFile)));
+
+ // Verify that there is still no access for |kOtherFile|.
+ EXPECT_FALSE(p->CanReadFile(kRendererID, kOtherFile));
+ EXPECT_FALSE(p->CanCreateReadWriteFile(kRendererID, kOtherFile));
+ EXPECT_FALSE(
+ p->CanCommitURL(kRendererID, net::FilePathToFileURL(kOtherFile)));
+
+ p->Remove(kRendererID);
+}
+
+} // namespace content

Powered by Google App Engine
This is Rietveld 408576698