| Index: content/browser/child_process_security_policy_unittest.cc
|
| diff --git a/content/browser/child_process_security_policy_unittest.cc b/content/browser/child_process_security_policy_unittest.cc
|
| index d5115ebe25575cd694059d506742f4fa72d1d0bf..f25adfc480d116ca4fce572c019bcefb4d086f36 100644
|
| --- a/content/browser/child_process_security_policy_unittest.cc
|
| +++ b/content/browser/child_process_security_policy_unittest.cc
|
| @@ -7,7 +7,6 @@
|
|
|
| #include "base/basictypes.h"
|
| #include "base/files/file_path.h"
|
| -#include "base/platform_file.h"
|
| #include "content/browser/child_process_security_policy_impl.h"
|
| #include "content/public/common/url_constants.h"
|
| #include "content/test/test_content_browser_client.h"
|
| @@ -467,130 +466,130 @@ TEST_F(ChildProcessSecurityPolicyTest, FilePermissions) {
|
| // Grant permissions for a file.
|
| p->Add(kRendererID);
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN));
|
| + base::File::FLAG_OPEN));
|
|
|
| GrantPermissionsForFile(p, kRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_OPEN_TRUNCATED |
|
| - base::PLATFORM_FILE_READ |
|
| - base::PLATFORM_FILE_WRITE);
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_OPEN_TRUNCATED |
|
| + base::File::FLAG_READ |
|
| + base::File::FLAG_WRITE);
|
| EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_OPEN_TRUNCATED |
|
| - base::PLATFORM_FILE_READ |
|
| - base::PLATFORM_FILE_WRITE));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_OPEN_TRUNCATED |
|
| + base::File::FLAG_READ |
|
| + base::File::FLAG_WRITE));
|
| EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ));
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_CREATE));
|
| + base::File::FLAG_CREATE));
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file, 0));
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_CREATE |
|
| - base::PLATFORM_FILE_OPEN_TRUNCATED |
|
| - base::PLATFORM_FILE_READ |
|
| - base::PLATFORM_FILE_WRITE));
|
| + base::File::FLAG_CREATE |
|
| + base::File::FLAG_OPEN_TRUNCATED |
|
| + base::File::FLAG_READ |
|
| + base::File::FLAG_WRITE));
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, sibling_file,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ));
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, parent_file,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ));
|
| EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, child_file,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ));
|
| EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, child_traversal1,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ));
|
| EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, child_traversal2,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ));
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, evil_traversal1,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ));
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, evil_traversal2,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ));
|
| // CPSP doesn't allow this case for the sake of simplicity.
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, self_traversal,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ));
|
| p->Remove(kRendererID);
|
|
|
| // Grant permissions for the directory the file is in.
|
| p->Add(kRendererID);
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN));
|
| + base::File::FLAG_OPEN));
|
| GrantPermissionsForFile(p, kRendererID, parent_file,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ);
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ);
|
| EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN));
|
| + base::File::FLAG_OPEN));
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_READ |
|
| - base::PLATFORM_FILE_WRITE));
|
| + base::File::FLAG_READ |
|
| + base::File::FLAG_WRITE));
|
| p->Remove(kRendererID);
|
|
|
| // Grant permissions for the directory the file is in (with trailing '/').
|
| p->Add(kRendererID);
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN));
|
| + base::File::FLAG_OPEN));
|
| GrantPermissionsForFile(p, kRendererID, parent_slash_file,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ);
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ);
|
| EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN));
|
| + base::File::FLAG_OPEN));
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_READ |
|
| - base::PLATFORM_FILE_WRITE));
|
| + base::File::FLAG_READ |
|
| + base::File::FLAG_WRITE));
|
|
|
| // Grant permissions for the file (should overwrite the permissions granted
|
| // for the directory).
|
| GrantPermissionsForFile(p, kRendererID, granted_file,
|
| - base::PLATFORM_FILE_TEMPORARY);
|
| + base::File::FLAG_TEMPORARY);
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN));
|
| + base::File::FLAG_OPEN));
|
| EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_TEMPORARY));
|
| + base::File::FLAG_TEMPORARY));
|
|
|
| // Revoke all permissions for the file (it should inherit its permissions
|
| // from the directory again).
|
| p->RevokeAllPermissionsForFile(kRendererID, granted_file);
|
| EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ));
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_TEMPORARY));
|
| + base::File::FLAG_TEMPORARY));
|
| p->Remove(kRendererID);
|
|
|
| // Grant file permissions for the file to main thread renderer process,
|
| // make sure its worker thread renderer process inherits those.
|
| p->Add(kRendererID);
|
| GrantPermissionsForFile(p, kRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ);
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ);
|
| EXPECT_TRUE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ));
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, granted_file,
|
| - base::PLATFORM_FILE_WRITE));
|
| + base::File::FLAG_WRITE));
|
| p->AddWorker(kWorkerRendererID, kRendererID);
|
| EXPECT_TRUE(p->HasPermissionsForFile(kWorkerRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ));
|
| EXPECT_FALSE(p->HasPermissionsForFile(kWorkerRendererID, granted_file,
|
| - base::PLATFORM_FILE_WRITE));
|
| + base::File::FLAG_WRITE));
|
| p->Remove(kRendererID);
|
| EXPECT_FALSE(p->HasPermissionsForFile(kWorkerRendererID, granted_file,
|
| - base::PLATFORM_FILE_OPEN |
|
| - base::PLATFORM_FILE_READ));
|
| + base::File::FLAG_OPEN |
|
| + base::File::FLAG_READ));
|
| p->Remove(kWorkerRendererID);
|
|
|
| p->Add(kRendererID);
|
| GrantPermissionsForFile(p, kRendererID, relative_file,
|
| - base::PLATFORM_FILE_OPEN);
|
| + base::File::FLAG_OPEN);
|
| EXPECT_FALSE(p->HasPermissionsForFile(kRendererID, relative_file,
|
| - base::PLATFORM_FILE_OPEN));
|
| + base::File::FLAG_OPEN));
|
| p->Remove(kRendererID);
|
| }
|
|
|
|
|