// Copyright 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "storage/browser/fileapi/sandbox_file_system_backend.h" #include <set> #include "base/basictypes.h" #include "base/files/file_util.h" #include "base/files/scoped_temp_dir.h" #include "base/memory/scoped_ptr.h" #include "base/message_loop/message_loop_proxy.h" #include "base/run_loop.h" #include "content/public/test/test_file_system_options.h" #include "storage/browser/fileapi/file_system_backend.h" #include "storage/browser/fileapi/file_system_url.h" #include "storage/browser/fileapi/sandbox_file_system_backend_delegate.h" #include "storage/common/fileapi/file_system_util.h" #include "testing/gtest/include/gtest/gtest.h" #include "url/gurl.h" using storage::FileSystemURL; using storage::SandboxFileSystemBackend; using storage::SandboxFileSystemBackendDelegate; // PS stands for path separator. #if defined(FILE_PATH_USES_WIN_SEPARATORS) #define PS "\\" #else #define PS "/" #endif namespace content { namespace { const struct RootPathTest { storage::FileSystemType type; const char* origin_url; const char* expected_path; } kRootPathTestCases[] = { {storage::kFileSystemTypeTemporary, "http://foo:1/", "000" PS "t"}, {storage::kFileSystemTypePersistent, "http://foo:1/", "000" PS "p"}, {storage::kFileSystemTypeTemporary, "http://bar.com/", "001" PS "t"}, {storage::kFileSystemTypePersistent, "http://bar.com/", "001" PS "p"}, {storage::kFileSystemTypeTemporary, "https://foo:2/", "002" PS "t"}, {storage::kFileSystemTypePersistent, "https://foo:2/", "002" PS "p"}, {storage::kFileSystemTypeTemporary, "https://bar.com/", "003" PS "t"}, {storage::kFileSystemTypePersistent, "https://bar.com/", "003" PS "p"}, }; const struct RootPathFileURITest { storage::FileSystemType type; const char* origin_url; const char* expected_path; const char* virtual_path; } kRootPathFileURITestCases[] = { {storage::kFileSystemTypeTemporary, "file:///", "000" PS "t", NULL}, {storage::kFileSystemTypePersistent, "file:///", "000" PS "p", NULL}, }; void DidOpenFileSystem(base::File::Error* error_out, const GURL& origin_url, const std::string& name, base::File::Error error) { *error_out = error; } } // namespace class SandboxFileSystemBackendTest : public testing::Test { protected: virtual void SetUp() { ASSERT_TRUE(data_dir_.CreateUniqueTempDir()); SetUpNewDelegate(CreateAllowFileAccessOptions()); } void SetUpNewDelegate(const storage::FileSystemOptions& options) { delegate_.reset(new SandboxFileSystemBackendDelegate( NULL /* quota_manager_proxy */, base::MessageLoopProxy::current().get(), data_dir_.path(), NULL /* special_storage_policy */, options)); } void SetUpNewBackend(const storage::FileSystemOptions& options) { SetUpNewDelegate(options); backend_.reset(new SandboxFileSystemBackend(delegate_.get())); } storage::SandboxFileSystemBackendDelegate::OriginEnumerator* CreateOriginEnumerator() const { return backend_->CreateOriginEnumerator(); } void CreateOriginTypeDirectory(const GURL& origin, storage::FileSystemType type) { base::FilePath target = delegate_-> GetBaseDirectoryForOriginAndType(origin, type, true); ASSERT_TRUE(!target.empty()); ASSERT_TRUE(base::DirectoryExists(target)); } bool GetRootPath(const GURL& origin_url, storage::FileSystemType type, storage::OpenFileSystemMode mode, base::FilePath* root_path) { base::File::Error error = base::File::FILE_OK; backend_->ResolveURL( FileSystemURL::CreateForTest(origin_url, type, base::FilePath()), mode, base::Bind(&DidOpenFileSystem, &error)); base::RunLoop().RunUntilIdle(); if (error != base::File::FILE_OK) return false; base::FilePath returned_root_path = delegate_->GetBaseDirectoryForOriginAndType( origin_url, type, false /* create */); if (root_path) *root_path = returned_root_path; return !returned_root_path.empty(); } base::FilePath file_system_path() const { return data_dir_.path().Append( SandboxFileSystemBackendDelegate::kFileSystemDirectory); } base::ScopedTempDir data_dir_; base::MessageLoop message_loop_; scoped_ptr<storage::SandboxFileSystemBackendDelegate> delegate_; scoped_ptr<storage::SandboxFileSystemBackend> backend_; }; TEST_F(SandboxFileSystemBackendTest, Empty) { SetUpNewBackend(CreateAllowFileAccessOptions()); scoped_ptr<SandboxFileSystemBackendDelegate::OriginEnumerator> enumerator( CreateOriginEnumerator()); ASSERT_TRUE(enumerator->Next().is_empty()); } TEST_F(SandboxFileSystemBackendTest, EnumerateOrigins) { SetUpNewBackend(CreateAllowFileAccessOptions()); const char* temporary_origins[] = { "http://www.bar.com/", "http://www.foo.com/", "http://www.foo.com:1/", "http://www.example.com:8080/", "http://www.google.com:80/", }; const char* persistent_origins[] = { "http://www.bar.com/", "http://www.foo.com:8080/", "http://www.foo.com:80/", }; size_t temporary_size = ARRAYSIZE_UNSAFE(temporary_origins); size_t persistent_size = ARRAYSIZE_UNSAFE(persistent_origins); std::set<GURL> temporary_set, persistent_set; for (size_t i = 0; i < temporary_size; ++i) { CreateOriginTypeDirectory(GURL(temporary_origins[i]), storage::kFileSystemTypeTemporary); temporary_set.insert(GURL(temporary_origins[i])); } for (size_t i = 0; i < persistent_size; ++i) { CreateOriginTypeDirectory(GURL(persistent_origins[i]), storage::kFileSystemTypePersistent); persistent_set.insert(GURL(persistent_origins[i])); } scoped_ptr<SandboxFileSystemBackendDelegate::OriginEnumerator> enumerator( CreateOriginEnumerator()); size_t temporary_actual_size = 0; size_t persistent_actual_size = 0; GURL current; while (!(current = enumerator->Next()).is_empty()) { SCOPED_TRACE(testing::Message() << "EnumerateOrigin " << current.spec()); if (enumerator->HasFileSystemType(storage::kFileSystemTypeTemporary)) { ASSERT_TRUE(temporary_set.find(current) != temporary_set.end()); ++temporary_actual_size; } if (enumerator->HasFileSystemType(storage::kFileSystemTypePersistent)) { ASSERT_TRUE(persistent_set.find(current) != persistent_set.end()); ++persistent_actual_size; } } EXPECT_EQ(temporary_size, temporary_actual_size); EXPECT_EQ(persistent_size, persistent_actual_size); } TEST_F(SandboxFileSystemBackendTest, GetRootPathCreateAndExamine) { std::vector<base::FilePath> returned_root_path( ARRAYSIZE_UNSAFE(kRootPathTestCases)); SetUpNewBackend(CreateAllowFileAccessOptions()); // Create a new root directory. for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathTestCases); ++i) { SCOPED_TRACE(testing::Message() << "RootPath (create) #" << i << " " << kRootPathTestCases[i].expected_path); base::FilePath root_path; EXPECT_TRUE(GetRootPath(GURL(kRootPathTestCases[i].origin_url), kRootPathTestCases[i].type, storage::OPEN_FILE_SYSTEM_CREATE_IF_NONEXISTENT, &root_path)); base::FilePath expected = file_system_path().AppendASCII( kRootPathTestCases[i].expected_path); EXPECT_EQ(expected.value(), root_path.value()); EXPECT_TRUE(base::DirectoryExists(root_path)); ASSERT_TRUE(returned_root_path.size() > i); returned_root_path[i] = root_path; } // Get the root directory with create=false and see if we get the // same directory. for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathTestCases); ++i) { SCOPED_TRACE(testing::Message() << "RootPath (get) #" << i << " " << kRootPathTestCases[i].expected_path); base::FilePath root_path; EXPECT_TRUE(GetRootPath(GURL(kRootPathTestCases[i].origin_url), kRootPathTestCases[i].type, storage::OPEN_FILE_SYSTEM_FAIL_IF_NONEXISTENT, &root_path)); ASSERT_TRUE(returned_root_path.size() > i); EXPECT_EQ(returned_root_path[i].value(), root_path.value()); } } TEST_F(SandboxFileSystemBackendTest, GetRootPathCreateAndExamineWithNewBackend) { std::vector<base::FilePath> returned_root_path( ARRAYSIZE_UNSAFE(kRootPathTestCases)); SetUpNewBackend(CreateAllowFileAccessOptions()); GURL origin_url("http://foo.com:1/"); base::FilePath root_path1; EXPECT_TRUE(GetRootPath(origin_url, storage::kFileSystemTypeTemporary, storage::OPEN_FILE_SYSTEM_CREATE_IF_NONEXISTENT, &root_path1)); SetUpNewBackend(CreateDisallowFileAccessOptions()); base::FilePath root_path2; EXPECT_TRUE(GetRootPath(origin_url, storage::kFileSystemTypeTemporary, storage::OPEN_FILE_SYSTEM_FAIL_IF_NONEXISTENT, &root_path2)); EXPECT_EQ(root_path1.value(), root_path2.value()); } TEST_F(SandboxFileSystemBackendTest, GetRootPathGetWithoutCreate) { SetUpNewBackend(CreateDisallowFileAccessOptions()); // Try to get a root directory without creating. for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathTestCases); ++i) { SCOPED_TRACE(testing::Message() << "RootPath (create=false) #" << i << " " << kRootPathTestCases[i].expected_path); EXPECT_FALSE(GetRootPath(GURL(kRootPathTestCases[i].origin_url), kRootPathTestCases[i].type, storage::OPEN_FILE_SYSTEM_FAIL_IF_NONEXISTENT, NULL)); } } TEST_F(SandboxFileSystemBackendTest, GetRootPathInIncognito) { SetUpNewBackend(CreateIncognitoFileSystemOptions()); // Try to get a root directory. for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathTestCases); ++i) { SCOPED_TRACE(testing::Message() << "RootPath (incognito) #" << i << " " << kRootPathTestCases[i].expected_path); EXPECT_FALSE(GetRootPath(GURL(kRootPathTestCases[i].origin_url), kRootPathTestCases[i].type, storage::OPEN_FILE_SYSTEM_CREATE_IF_NONEXISTENT, NULL)); } } TEST_F(SandboxFileSystemBackendTest, GetRootPathFileURI) { SetUpNewBackend(CreateDisallowFileAccessOptions()); for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathFileURITestCases); ++i) { SCOPED_TRACE(testing::Message() << "RootPathFileURI (disallow) #" << i << " " << kRootPathFileURITestCases[i].expected_path); EXPECT_FALSE(GetRootPath(GURL(kRootPathFileURITestCases[i].origin_url), kRootPathFileURITestCases[i].type, storage::OPEN_FILE_SYSTEM_CREATE_IF_NONEXISTENT, NULL)); } } TEST_F(SandboxFileSystemBackendTest, GetRootPathFileURIWithAllowFlag) { SetUpNewBackend(CreateAllowFileAccessOptions()); for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathFileURITestCases); ++i) { SCOPED_TRACE(testing::Message() << "RootPathFileURI (allow) #" << i << " " << kRootPathFileURITestCases[i].expected_path); base::FilePath root_path; EXPECT_TRUE(GetRootPath(GURL(kRootPathFileURITestCases[i].origin_url), kRootPathFileURITestCases[i].type, storage::OPEN_FILE_SYSTEM_CREATE_IF_NONEXISTENT, &root_path)); base::FilePath expected = file_system_path().AppendASCII( kRootPathFileURITestCases[i].expected_path); EXPECT_EQ(expected.value(), root_path.value()); EXPECT_TRUE(base::DirectoryExists(root_path)); } } } // namespace content