| Index: base/i18n/file_util_icu_unittest.cc
|
| diff --git a/base/i18n/file_util_icu_unittest.cc b/base/i18n/file_util_icu_unittest.cc
|
| index 369345b6add77eed0c500ec7318fae598b47a0d1..8fa7f6a261dc460f2165034911bf06a9e2e95872 100644
|
| --- a/base/i18n/file_util_icu_unittest.cc
|
| +++ b/base/i18n/file_util_icu_unittest.cc
|
| @@ -20,24 +20,28 @@ class FileUtilICUTest : public PlatformTest {
|
| #if defined(OS_POSIX) && !defined(OS_MACOSX)
|
|
|
| // Linux disallows some evil ASCII characters, but passes all non-ASCII.
|
| -static const struct goodbad_pair {
|
| +static const struct GoodBadPairLinux {
|
| const char* bad_name;
|
| const char* good_name;
|
| -} kIllegalCharacterCases[] = {
|
| - {"bad*file:name?.jpg", "bad-file-name-.jpg"},
|
| +} kLinuxIllegalCharacterCases[] = {
|
| + {"bad*\\/file:name?.jpg", "bad---file-name-.jpg"},
|
| {"**********::::.txt", "--------------.txt"},
|
| {"\xe9\xf0zzzz.\xff", "\xe9\xf0zzzz.\xff"},
|
| + {" _ ", "-_-"},
|
| + {".", "-"},
|
| + {" .( ). ", "-.( ).-"},
|
| + {" ", "- -"},
|
| };
|
|
|
| TEST_F(FileUtilICUTest, ReplaceIllegalCharacersInPathLinuxTest) {
|
| - for (size_t i = 0; i < arraysize(kIllegalCharacterCases); ++i) {
|
| - std::string bad_name(kIllegalCharacterCases[i].bad_name);
|
| + for (size_t i = 0; i < arraysize(kLinuxIllegalCharacterCases); ++i) {
|
| + std::string bad_name(kLinuxIllegalCharacterCases[i].bad_name);
|
| ReplaceIllegalCharactersInPath(&bad_name, '-');
|
| - EXPECT_EQ(kIllegalCharacterCases[i].good_name, bad_name);
|
| + EXPECT_EQ(kLinuxIllegalCharacterCases[i].good_name, bad_name);
|
| }
|
| }
|
|
|
| -#else
|
| +#endif
|
|
|
| // For Mac & Windows, which both do Unicode validation on filenames. These
|
| // characters are given as wide strings since its more convenient to specify
|
| @@ -46,29 +50,36 @@ static const struct goodbad_pair {
|
| const wchar_t* bad_name;
|
| const wchar_t* good_name;
|
| } kIllegalCharacterCases[] = {
|
| - {L"bad*file:name?.jpg", L"bad-file-name-.jpg"},
|
| - {L"**********::::.txt", L"--------------.txt"},
|
| - // We can't use UCNs (universal character names) for C0/C1 characters and
|
| - // U+007F, but \x escape is interpreted by MSVC and gcc as we intend.
|
| - {L"bad\x0003\x0091 file\u200E\u200Fname.png", L"bad-- file--name.png"},
|
| -#if defined(OS_WIN)
|
| - {L"bad*file\\name.jpg", L"bad-file-name.jpg"},
|
| - {L"\t bad*file\\name/.jpg ", L"bad-file-name-.jpg"},
|
| -#elif defined(OS_MACOSX)
|
| - {L"bad*file?name.jpg", L"bad-file-name.jpg"},
|
| - {L"\t bad*file?name/.jpg ", L"bad-file-name-.jpg"},
|
| -#endif
|
| - {L"this_file_name is okay!.mp3", L"this_file_name is okay!.mp3"},
|
| - {L"\u4E00\uAC00.mp3", L"\u4E00\uAC00.mp3"},
|
| - {L"\u0635\u200C\u0644.mp3", L"\u0635\u200C\u0644.mp3"},
|
| - {L"\U00010330\U00010331.mp3", L"\U00010330\U00010331.mp3"},
|
| - // Unassigned codepoints are ok.
|
| - {L"\u0378\U00040001.mp3", L"\u0378\U00040001.mp3"},
|
| - // Non-characters are not allowed.
|
| - {L"bad\uFFFFfile\U0010FFFEname.jpg ", L"bad-file-name.jpg"},
|
| - {L"bad\uFDD0file\uFDEFname.jpg ", L"bad-file-name.jpg"},
|
| + {L"bad*file:name?.jpg", L"bad-file-name-.jpg"},
|
| + {L"**********::::.txt", L"--------------.txt"},
|
| + // We can't use UCNs (universal character names) for C0/C1 characters and
|
| + // U+007F, but \x escape is interpreted by MSVC and gcc as we intend.
|
| + {L"bad\x0003\x0091 file\u200E\u200Fname.png", L"bad-- file--name.png"},
|
| + {L"bad*file\\?name.jpg", L"bad-file--name.jpg"},
|
| + {L"\t bad*file\\name/.jpg", L"- bad-file-name-.jpg"},
|
| + {L"this_file_name is okay!.mp3", L"this_file_name is okay!.mp3"},
|
| + {L"\u4E00\uAC00.mp3", L"\u4E00\uAC00.mp3"},
|
| + {L"\u0635\u200C\u0644.mp3", L"\u0635-\u0644.mp3"},
|
| + {L"\U00010330\U00010331.mp3", L"\U00010330\U00010331.mp3"},
|
| + // Unassigned codepoints are ok.
|
| + {L"\u0378\U00040001.mp3", L"\u0378\U00040001.mp3"},
|
| + // Non-characters are not allowed.
|
| + {L"bad\uFFFFfile\U0010FFFEname.jpg", L"bad-file-name.jpg"},
|
| + {L"bad\uFDD0file\uFDEFname.jpg", L"bad-file-name.jpg"},
|
| + // CVE-2014-9390
|
| + {L"(\u200C.\u200D.\u200E.\u200F.\u202A.\u202B.\u202C.\u202D.\u202E.\u206A."
|
| + L"\u206B.\u206C.\u206D.\u206F.\uFEFF)",
|
| + L"(-.-.-.-.-.-.-.-.-.-.-.-.-.-.-)"},
|
| + {L"config~1", L"config-1"},
|
| + {L" _ ", L"-_-"},
|
| + {L" ", L"-"},
|
| + {L"\u2008.(\u2007).\u3000", L"-.(\u2007).-"},
|
| + {L" ", L"- -"},
|
| + {L". ", L"- -"}
|
| };
|
|
|
| +#if defined(OS_WIN) || defined(OS_MACOSX)
|
| +
|
| TEST_F(FileUtilICUTest, ReplaceIllegalCharactersInPathTest) {
|
| for (size_t i = 0; i < arraysize(kIllegalCharacterCases); ++i) {
|
| #if defined(OS_WIN)
|
| @@ -85,6 +96,19 @@ TEST_F(FileUtilICUTest, ReplaceIllegalCharactersInPathTest) {
|
|
|
| #endif
|
|
|
| +TEST_F(FileUtilICUTest, IsFilenameLegalTest) {
|
| + EXPECT_TRUE(IsFilenameLegal(string16()));
|
| +
|
| + for (const auto& test_case : kIllegalCharacterCases) {
|
| + string16 bad_name = WideToUTF16(test_case.bad_name);
|
| + string16 good_name = WideToUTF16(test_case.good_name);
|
| +
|
| + EXPECT_TRUE(IsFilenameLegal(good_name)) << good_name;
|
| + if (good_name != bad_name)
|
| + EXPECT_FALSE(IsFilenameLegal(bad_name)) << bad_name;
|
| + }
|
| +}
|
| +
|
| #if defined(OS_CHROMEOS)
|
| static const struct normalize_name_encoding_test_cases {
|
| const char* original_path;
|
|
|