Index: base/i18n/file_util_icu_unittest.cc |
diff --git a/base/i18n/file_util_icu_unittest.cc b/base/i18n/file_util_icu_unittest.cc |
index 369345b6add77eed0c500ec7318fae598b47a0d1..8fa7f6a261dc460f2165034911bf06a9e2e95872 100644 |
--- a/base/i18n/file_util_icu_unittest.cc |
+++ b/base/i18n/file_util_icu_unittest.cc |
@@ -20,24 +20,28 @@ class FileUtilICUTest : public PlatformTest { |
#if defined(OS_POSIX) && !defined(OS_MACOSX) |
// Linux disallows some evil ASCII characters, but passes all non-ASCII. |
-static const struct goodbad_pair { |
+static const struct GoodBadPairLinux { |
const char* bad_name; |
const char* good_name; |
-} kIllegalCharacterCases[] = { |
- {"bad*file:name?.jpg", "bad-file-name-.jpg"}, |
+} kLinuxIllegalCharacterCases[] = { |
+ {"bad*\\/file:name?.jpg", "bad---file-name-.jpg"}, |
{"**********::::.txt", "--------------.txt"}, |
{"\xe9\xf0zzzz.\xff", "\xe9\xf0zzzz.\xff"}, |
+ {" _ ", "-_-"}, |
+ {".", "-"}, |
+ {" .( ). ", "-.( ).-"}, |
+ {" ", "- -"}, |
}; |
TEST_F(FileUtilICUTest, ReplaceIllegalCharacersInPathLinuxTest) { |
- for (size_t i = 0; i < arraysize(kIllegalCharacterCases); ++i) { |
- std::string bad_name(kIllegalCharacterCases[i].bad_name); |
+ for (size_t i = 0; i < arraysize(kLinuxIllegalCharacterCases); ++i) { |
+ std::string bad_name(kLinuxIllegalCharacterCases[i].bad_name); |
ReplaceIllegalCharactersInPath(&bad_name, '-'); |
- EXPECT_EQ(kIllegalCharacterCases[i].good_name, bad_name); |
+ EXPECT_EQ(kLinuxIllegalCharacterCases[i].good_name, bad_name); |
} |
} |
-#else |
+#endif |
// For Mac & Windows, which both do Unicode validation on filenames. These |
// characters are given as wide strings since its more convenient to specify |
@@ -46,29 +50,36 @@ static const struct goodbad_pair { |
const wchar_t* bad_name; |
const wchar_t* good_name; |
} kIllegalCharacterCases[] = { |
- {L"bad*file:name?.jpg", L"bad-file-name-.jpg"}, |
- {L"**********::::.txt", L"--------------.txt"}, |
- // We can't use UCNs (universal character names) for C0/C1 characters and |
- // U+007F, but \x escape is interpreted by MSVC and gcc as we intend. |
- {L"bad\x0003\x0091 file\u200E\u200Fname.png", L"bad-- file--name.png"}, |
-#if defined(OS_WIN) |
- {L"bad*file\\name.jpg", L"bad-file-name.jpg"}, |
- {L"\t bad*file\\name/.jpg ", L"bad-file-name-.jpg"}, |
-#elif defined(OS_MACOSX) |
- {L"bad*file?name.jpg", L"bad-file-name.jpg"}, |
- {L"\t bad*file?name/.jpg ", L"bad-file-name-.jpg"}, |
-#endif |
- {L"this_file_name is okay!.mp3", L"this_file_name is okay!.mp3"}, |
- {L"\u4E00\uAC00.mp3", L"\u4E00\uAC00.mp3"}, |
- {L"\u0635\u200C\u0644.mp3", L"\u0635\u200C\u0644.mp3"}, |
- {L"\U00010330\U00010331.mp3", L"\U00010330\U00010331.mp3"}, |
- // Unassigned codepoints are ok. |
- {L"\u0378\U00040001.mp3", L"\u0378\U00040001.mp3"}, |
- // Non-characters are not allowed. |
- {L"bad\uFFFFfile\U0010FFFEname.jpg ", L"bad-file-name.jpg"}, |
- {L"bad\uFDD0file\uFDEFname.jpg ", L"bad-file-name.jpg"}, |
+ {L"bad*file:name?.jpg", L"bad-file-name-.jpg"}, |
+ {L"**********::::.txt", L"--------------.txt"}, |
+ // We can't use UCNs (universal character names) for C0/C1 characters and |
+ // U+007F, but \x escape is interpreted by MSVC and gcc as we intend. |
+ {L"bad\x0003\x0091 file\u200E\u200Fname.png", L"bad-- file--name.png"}, |
+ {L"bad*file\\?name.jpg", L"bad-file--name.jpg"}, |
+ {L"\t bad*file\\name/.jpg", L"- bad-file-name-.jpg"}, |
+ {L"this_file_name is okay!.mp3", L"this_file_name is okay!.mp3"}, |
+ {L"\u4E00\uAC00.mp3", L"\u4E00\uAC00.mp3"}, |
+ {L"\u0635\u200C\u0644.mp3", L"\u0635-\u0644.mp3"}, |
+ {L"\U00010330\U00010331.mp3", L"\U00010330\U00010331.mp3"}, |
+ // Unassigned codepoints are ok. |
+ {L"\u0378\U00040001.mp3", L"\u0378\U00040001.mp3"}, |
+ // Non-characters are not allowed. |
+ {L"bad\uFFFFfile\U0010FFFEname.jpg", L"bad-file-name.jpg"}, |
+ {L"bad\uFDD0file\uFDEFname.jpg", L"bad-file-name.jpg"}, |
+ // CVE-2014-9390 |
+ {L"(\u200C.\u200D.\u200E.\u200F.\u202A.\u202B.\u202C.\u202D.\u202E.\u206A." |
+ L"\u206B.\u206C.\u206D.\u206F.\uFEFF)", |
+ L"(-.-.-.-.-.-.-.-.-.-.-.-.-.-.-)"}, |
+ {L"config~1", L"config-1"}, |
+ {L" _ ", L"-_-"}, |
+ {L" ", L"-"}, |
+ {L"\u2008.(\u2007).\u3000", L"-.(\u2007).-"}, |
+ {L" ", L"- -"}, |
+ {L". ", L"- -"} |
}; |
+#if defined(OS_WIN) || defined(OS_MACOSX) |
+ |
TEST_F(FileUtilICUTest, ReplaceIllegalCharactersInPathTest) { |
for (size_t i = 0; i < arraysize(kIllegalCharacterCases); ++i) { |
#if defined(OS_WIN) |
@@ -85,6 +96,19 @@ TEST_F(FileUtilICUTest, ReplaceIllegalCharactersInPathTest) { |
#endif |
+TEST_F(FileUtilICUTest, IsFilenameLegalTest) { |
+ EXPECT_TRUE(IsFilenameLegal(string16())); |
+ |
+ for (const auto& test_case : kIllegalCharacterCases) { |
+ string16 bad_name = WideToUTF16(test_case.bad_name); |
+ string16 good_name = WideToUTF16(test_case.good_name); |
+ |
+ EXPECT_TRUE(IsFilenameLegal(good_name)) << good_name; |
+ if (good_name != bad_name) |
+ EXPECT_FALSE(IsFilenameLegal(bad_name)) << bad_name; |
+ } |
+} |
+ |
#if defined(OS_CHROMEOS) |
static const struct normalize_name_encoding_test_cases { |
const char* original_path; |