// Copyright 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "storage/browser/fileapi/file_system_url_request_job.h" #include #include "base/bind.h" #include "base/files/file_path.h" #include "base/files/file_util.h" #include "base/files/scoped_temp_dir.h" #include "base/format_macros.h" #include "base/location.h" #include "base/memory/scoped_vector.h" #include "base/memory/weak_ptr.h" #include "base/rand_util.h" #include "base/run_loop.h" #include "base/strings/string_piece.h" #include "base/strings/stringprintf.h" #include "base/strings/utf_string_conversions.h" #include "base/thread_task_runner_handle.h" #include "content/public/test/async_file_test_helper.h" #include "content/public/test/test_file_system_backend.h" #include "content/public/test/test_file_system_context.h" #include "net/base/load_flags.h" #include "net/base/mime_util.h" #include "net/base/net_errors.h" #include "net/base/net_util.h" #include "net/base/request_priority.h" #include "net/http/http_byte_range.h" #include "net/http/http_request_headers.h" #include "net/url_request/url_request.h" #include "net/url_request/url_request_context.h" #include "net/url_request/url_request_test_util.h" #include "storage/browser/fileapi/external_mount_points.h" #include "storage/browser/fileapi/file_system_context.h" #include "storage/browser/fileapi/file_system_file_util.h" #include "testing/gtest/include/gtest/gtest.h" using content::AsyncFileTestHelper; using storage::FileSystemContext; using storage::FileSystemURL; using storage::FileSystemURLRequestJob; namespace content { namespace { // We always use the TEMPORARY FileSystem in this test. const char kFileSystemURLPrefix[] = "filesystem:http://remote/temporary/"; const char kTestFileData[] = "0123456789"; void FillBuffer(char* buffer, size_t len) { base::RandBytes(buffer, len); } const char kValidExternalMountPoint[] = "mnt_name"; // An auto mounter that will try to mount anything for |storage_domain| = // "automount", but will only succeed for the mount point "mnt_name". bool TestAutoMountForURLRequest( const net::URLRequest* /*url_request*/, const storage::FileSystemURL& filesystem_url, const std::string& storage_domain, const base::Callback& callback) { if (storage_domain != "automount") return false; std::vector components; filesystem_url.path().GetComponents(&components); std::string mount_point = base::FilePath(components[0]).AsUTF8Unsafe(); if (mount_point == kValidExternalMountPoint) { storage::ExternalMountPoints::GetSystemInstance()->RegisterFileSystem( kValidExternalMountPoint, storage::kFileSystemTypeTest, storage::FileSystemMountOption(), base::FilePath()); callback.Run(base::File::FILE_OK); } else { callback.Run(base::File::FILE_ERROR_NOT_FOUND); } return true; } class FileSystemURLRequestJobFactory : public net::URLRequestJobFactory { public: FileSystemURLRequestJobFactory(const std::string& storage_domain, FileSystemContext* context) : storage_domain_(storage_domain), file_system_context_(context) { } net::URLRequestJob* MaybeCreateJobWithProtocolHandler( const std::string& scheme, net::URLRequest* request, net::NetworkDelegate* network_delegate) const override { return new storage::FileSystemURLRequestJob( request, network_delegate, storage_domain_, file_system_context_); } net::URLRequestJob* MaybeInterceptRedirect( net::URLRequest* request, net::NetworkDelegate* network_delegate, const GURL& location) const override { return nullptr; } net::URLRequestJob* MaybeInterceptResponse( net::URLRequest* request, net::NetworkDelegate* network_delegate) const override { return nullptr; } bool IsHandledProtocol(const std::string& scheme) const override { return true; } bool IsHandledURL(const GURL& url) const override { return true; } bool IsSafeRedirectTarget(const GURL& location) const override { return false; } private: std::string storage_domain_; FileSystemContext* file_system_context_; }; } // namespace class FileSystemURLRequestJobTest : public testing::Test { protected: FileSystemURLRequestJobTest() : weak_factory_(this) { } void SetUp() override { ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); // We use the main thread so that we can get the root path synchronously. // TODO(adamk): Run this on the FILE thread we've created as well. file_system_context_ = CreateFileSystemContextForTesting(NULL, temp_dir_.path()); file_system_context_->OpenFileSystem( GURL("http://remote/"), storage::kFileSystemTypeTemporary, storage::OPEN_FILE_SYSTEM_CREATE_IF_NONEXISTENT, base::Bind(&FileSystemURLRequestJobTest::OnOpenFileSystem, weak_factory_.GetWeakPtr())); base::RunLoop().RunUntilIdle(); } void TearDown() override { // FileReader posts a task to close the file in destructor. base::RunLoop().RunUntilIdle(); } void SetUpAutoMountContext() { base::FilePath mnt_point = temp_dir_.path().AppendASCII("auto_mount_dir"); ASSERT_TRUE(base::CreateDirectory(mnt_point)); ScopedVector additional_providers; additional_providers.push_back(new TestFileSystemBackend( base::ThreadTaskRunnerHandle::Get().get(), mnt_point)); std::vector handlers; handlers.push_back(base::Bind(&TestAutoMountForURLRequest)); file_system_context_ = CreateFileSystemContextWithAutoMountersForTesting( NULL, additional_providers.Pass(), handlers, temp_dir_.path()); ASSERT_EQ(static_cast(sizeof(kTestFileData)) - 1, base::WriteFile(mnt_point.AppendASCII("foo"), kTestFileData, sizeof(kTestFileData) - 1)); } void OnOpenFileSystem(const GURL& root_url, const std::string& name, base::File::Error result) { ASSERT_EQ(base::File::FILE_OK, result); } void TestRequestHelper(const GURL& url, const net::HttpRequestHeaders* headers, bool run_to_completion, FileSystemContext* file_system_context) { delegate_.reset(new net::TestDelegate()); // Make delegate_ exit the MessageLoop when the request is done. delegate_->set_quit_on_complete(true); delegate_->set_quit_on_redirect(true); job_factory_.reset(new FileSystemURLRequestJobFactory( url.GetOrigin().host(), file_system_context)); empty_context_.set_job_factory(job_factory_.get()); request_ = empty_context_.CreateRequest( url, net::DEFAULT_PRIORITY, delegate_.get()); if (headers) request_->SetExtraRequestHeaders(*headers); request_->Start(); ASSERT_TRUE(request_->is_pending()); // verify that we're starting async if (run_to_completion) base::MessageLoop::current()->Run(); } void TestRequest(const GURL& url) { TestRequestHelper(url, NULL, true, file_system_context_.get()); } void TestRequestWithContext(const GURL& url, FileSystemContext* file_system_context) { TestRequestHelper(url, NULL, true, file_system_context); } void TestRequestWithHeaders(const GURL& url, const net::HttpRequestHeaders* headers) { TestRequestHelper(url, headers, true, file_system_context_.get()); } void TestRequestNoRun(const GURL& url) { TestRequestHelper(url, NULL, false, file_system_context_.get()); } void CreateDirectory(const base::StringPiece& dir_name) { FileSystemURL url = file_system_context_->CreateCrackedFileSystemURL( GURL("http://remote"), storage::kFileSystemTypeTemporary, base::FilePath().AppendASCII(dir_name)); ASSERT_EQ( base::File::FILE_OK, AsyncFileTestHelper::CreateDirectory(file_system_context_.get(), url)); } void WriteFile(const base::StringPiece& file_name, const char* buf, int buf_size) { FileSystemURL url = file_system_context_->CreateCrackedFileSystemURL( GURL("http://remote"), storage::kFileSystemTypeTemporary, base::FilePath().AppendASCII(file_name)); ASSERT_EQ(base::File::FILE_OK, AsyncFileTestHelper::CreateFileWithData( file_system_context_.get(), url, buf, buf_size)); } GURL CreateFileSystemURL(const std::string& path) { return GURL(kFileSystemURLPrefix + path); } // Temp directory is at the top because it must be deleted last. base::ScopedTempDir temp_dir_; // The message loop must be deleted second to last. base::MessageLoopForIO message_loop_; scoped_refptr file_system_context_; net::URLRequestContext empty_context_; scoped_ptr job_factory_; // NOTE: order matters, request must die before delegate scoped_ptr delegate_; scoped_ptr request_; base::WeakPtrFactory weak_factory_; }; namespace { TEST_F(FileSystemURLRequestJobTest, FileTest) { WriteFile("file1.dat", kTestFileData, arraysize(kTestFileData) - 1); TestRequest(CreateFileSystemURL("file1.dat")); ASSERT_FALSE(request_->is_pending()); EXPECT_EQ(1, delegate_->response_started_count()); EXPECT_FALSE(delegate_->received_data_before_response()); EXPECT_EQ(kTestFileData, delegate_->data_received()); EXPECT_EQ(200, request_->GetResponseCode()); std::string cache_control; request_->GetResponseHeaderByName("cache-control", &cache_control); EXPECT_EQ("no-cache", cache_control); } TEST_F(FileSystemURLRequestJobTest, FileTestFullSpecifiedRange) { const size_t buffer_size = 4000; scoped_ptr buffer(new char[buffer_size]); FillBuffer(buffer.get(), buffer_size); WriteFile("bigfile", buffer.get(), buffer_size); const size_t first_byte_position = 500; const size_t last_byte_position = buffer_size - first_byte_position; std::string partial_buffer_string(buffer.get() + first_byte_position, buffer.get() + last_byte_position + 1); net::HttpRequestHeaders headers; headers.SetHeader( net::HttpRequestHeaders::kRange, net::HttpByteRange::Bounded( first_byte_position, last_byte_position).GetHeaderValue()); TestRequestWithHeaders(CreateFileSystemURL("bigfile"), &headers); ASSERT_FALSE(request_->is_pending()); EXPECT_EQ(1, delegate_->response_started_count()); EXPECT_FALSE(delegate_->received_data_before_response()); EXPECT_TRUE(partial_buffer_string == delegate_->data_received()); } TEST_F(FileSystemURLRequestJobTest, FileTestHalfSpecifiedRange) { const size_t buffer_size = 4000; scoped_ptr buffer(new char[buffer_size]); FillBuffer(buffer.get(), buffer_size); WriteFile("bigfile", buffer.get(), buffer_size); const size_t first_byte_position = 500; std::string partial_buffer_string(buffer.get() + first_byte_position, buffer.get() + buffer_size); net::HttpRequestHeaders headers; headers.SetHeader( net::HttpRequestHeaders::kRange, net::HttpByteRange::RightUnbounded(first_byte_position).GetHeaderValue()); TestRequestWithHeaders(CreateFileSystemURL("bigfile"), &headers); ASSERT_FALSE(request_->is_pending()); EXPECT_EQ(1, delegate_->response_started_count()); EXPECT_FALSE(delegate_->received_data_before_response()); // Don't use EXPECT_EQ, it will print out a lot of garbage if check failed. EXPECT_TRUE(partial_buffer_string == delegate_->data_received()); } TEST_F(FileSystemURLRequestJobTest, FileTestMultipleRangesNotSupported) { WriteFile("file1.dat", kTestFileData, arraysize(kTestFileData) - 1); net::HttpRequestHeaders headers; headers.SetHeader(net::HttpRequestHeaders::kRange, "bytes=0-5,10-200,200-300"); TestRequestWithHeaders(CreateFileSystemURL("file1.dat"), &headers); EXPECT_TRUE(delegate_->request_failed()); EXPECT_EQ(net::ERR_REQUEST_RANGE_NOT_SATISFIABLE, request_->status().error()); } TEST_F(FileSystemURLRequestJobTest, RangeOutOfBounds) { WriteFile("file1.dat", kTestFileData, arraysize(kTestFileData) - 1); net::HttpRequestHeaders headers; headers.SetHeader( net::HttpRequestHeaders::kRange, net::HttpByteRange::Bounded(500, 1000).GetHeaderValue()); TestRequestWithHeaders(CreateFileSystemURL("file1.dat"), &headers); ASSERT_FALSE(request_->is_pending()); EXPECT_TRUE(delegate_->request_failed()); EXPECT_EQ(net::ERR_REQUEST_RANGE_NOT_SATISFIABLE, request_->status().error()); } TEST_F(FileSystemURLRequestJobTest, FileDirRedirect) { CreateDirectory("dir"); TestRequest(CreateFileSystemURL("dir")); EXPECT_EQ(1, delegate_->received_redirect_count()); EXPECT_TRUE(request_->status().is_success()); EXPECT_FALSE(delegate_->request_failed()); // We've deferred the redirect; now cancel the request to avoid following it. request_->Cancel(); base::MessageLoop::current()->Run(); } TEST_F(FileSystemURLRequestJobTest, InvalidURL) { TestRequest(GURL("filesystem:/foo/bar/baz")); ASSERT_FALSE(request_->is_pending()); EXPECT_TRUE(delegate_->request_failed()); EXPECT_EQ(net::ERR_INVALID_URL, request_->status().error()); } TEST_F(FileSystemURLRequestJobTest, NoSuchRoot) { TestRequest(GURL("filesystem:http://remote/persistent/somefile")); ASSERT_FALSE(request_->is_pending()); EXPECT_TRUE(delegate_->request_failed()); EXPECT_EQ(net::ERR_FILE_NOT_FOUND, request_->status().error()); } TEST_F(FileSystemURLRequestJobTest, NoSuchFile) { TestRequest(CreateFileSystemURL("somefile")); ASSERT_FALSE(request_->is_pending()); EXPECT_TRUE(delegate_->request_failed()); EXPECT_EQ(net::ERR_FILE_NOT_FOUND, request_->status().error()); } TEST_F(FileSystemURLRequestJobTest, Cancel) { WriteFile("file1.dat", kTestFileData, arraysize(kTestFileData) - 1); TestRequestNoRun(CreateFileSystemURL("file1.dat")); // Run StartAsync() and only StartAsync(). base::MessageLoop::current()->DeleteSoon(FROM_HERE, request_.release()); base::RunLoop().RunUntilIdle(); // If we get here, success! we didn't crash! } TEST_F(FileSystemURLRequestJobTest, GetMimeType) { const char kFilename[] = "hoge.html"; std::string mime_type_direct; base::FilePath::StringType extension = base::FilePath().AppendASCII(kFilename).Extension(); if (!extension.empty()) extension = extension.substr(1); EXPECT_TRUE(net::GetWellKnownMimeTypeFromExtension( extension, &mime_type_direct)); TestRequest(CreateFileSystemURL(kFilename)); std::string mime_type_from_job; request_->GetMimeType(&mime_type_from_job); EXPECT_EQ(mime_type_direct, mime_type_from_job); } TEST_F(FileSystemURLRequestJobTest, Incognito) { WriteFile("file", kTestFileData, arraysize(kTestFileData) - 1); // Creates a new filesystem context for incognito mode. scoped_refptr file_system_context = CreateIncognitoFileSystemContextForTesting(NULL, temp_dir_.path()); // The request should return NOT_FOUND error if it's in incognito mode. TestRequestWithContext(CreateFileSystemURL("file"), file_system_context.get()); ASSERT_FALSE(request_->is_pending()); EXPECT_TRUE(delegate_->request_failed()); EXPECT_EQ(net::ERR_FILE_NOT_FOUND, request_->status().error()); // Make sure it returns success with regular (non-incognito) context. TestRequest(CreateFileSystemURL("file")); ASSERT_FALSE(request_->is_pending()); EXPECT_EQ(kTestFileData, delegate_->data_received()); EXPECT_EQ(200, request_->GetResponseCode()); } TEST_F(FileSystemURLRequestJobTest, AutoMountFileTest) { SetUpAutoMountContext(); TestRequest(GURL("filesystem:http://automount/external/mnt_name/foo")); ASSERT_FALSE(request_->is_pending()); EXPECT_EQ(1, delegate_->response_started_count()); EXPECT_FALSE(delegate_->received_data_before_response()); EXPECT_EQ(kTestFileData, delegate_->data_received()); EXPECT_EQ(200, request_->GetResponseCode()); std::string cache_control; request_->GetResponseHeaderByName("cache-control", &cache_control); EXPECT_EQ("no-cache", cache_control); ASSERT_TRUE( storage::ExternalMountPoints::GetSystemInstance()->RevokeFileSystem( kValidExternalMountPoint)); } TEST_F(FileSystemURLRequestJobTest, AutoMountInvalidRoot) { SetUpAutoMountContext(); TestRequest(GURL("filesystem:http://automount/external/invalid/foo")); ASSERT_FALSE(request_->is_pending()); EXPECT_TRUE(delegate_->request_failed()); EXPECT_EQ(net::ERR_FILE_NOT_FOUND, request_->status().error()); ASSERT_FALSE( storage::ExternalMountPoints::GetSystemInstance()->RevokeFileSystem( "invalid")); } TEST_F(FileSystemURLRequestJobTest, AutoMountNoHandler) { SetUpAutoMountContext(); TestRequest(GURL("filesystem:http://noauto/external/mnt_name/foo")); ASSERT_FALSE(request_->is_pending()); EXPECT_TRUE(delegate_->request_failed()); EXPECT_EQ(net::ERR_FILE_NOT_FOUND, request_->status().error()); ASSERT_FALSE( storage::ExternalMountPoints::GetSystemInstance()->RevokeFileSystem( kValidExternalMountPoint)); } } // namespace } // namespace content