blob: 87e05cb07d0a35fd2d31f57f75fb481235d66232 [file] [log] [blame]
// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <string>
#include "base/basictypes.h"
#include "chrome/browser/renderer_security_policy.h"
#include "net/url_request/url_request.h"
#include "net/url_request/url_request_test_job.h"
#include "testing/gtest/include/gtest/gtest.h"
class RendererSecurityPolicyTest : public testing::Test {
protected:
// testing::Test
virtual void SetUp() {
// In the real world, "chrome-resource" is a handled scheme.
URLRequest::RegisterProtocolFactory("chrome-resource",
&URLRequestTestJob::Factory);
}
virtual void TearDown() {
URLRequest::RegisterProtocolFactory("chrome-resource", NULL);
}
};
static int kRendererID = 42;
TEST_F(RendererSecurityPolicyTest, IsWebSafeSchemeTest) {
RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance();
EXPECT_TRUE(p->IsWebSafeScheme("http"));
EXPECT_TRUE(p->IsWebSafeScheme("https"));
EXPECT_TRUE(p->IsWebSafeScheme("ftp"));
EXPECT_TRUE(p->IsWebSafeScheme("data"));
EXPECT_TRUE(p->IsWebSafeScheme("feed"));
EXPECT_FALSE(p->IsWebSafeScheme("registered-web-safe-scheme"));
p->RegisterWebSafeScheme("registered-web-safe-scheme");
EXPECT_TRUE(p->IsWebSafeScheme("registered-web-safe-scheme"));
}
TEST_F(RendererSecurityPolicyTest, IsPseudoSchemeTest) {
RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance();
EXPECT_TRUE(p->IsPseudoScheme("about"));
EXPECT_TRUE(p->IsPseudoScheme("javascript"));
EXPECT_TRUE(p->IsPseudoScheme("view-source"));
EXPECT_FALSE(p->IsPseudoScheme("registered-psuedo-scheme"));
p->RegisterPseudoScheme("registered-psuedo-scheme");
EXPECT_TRUE(p->IsPseudoScheme("registered-psuedo-scheme"));
}
TEST_F(RendererSecurityPolicyTest, StandardSchemesTest) {
RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance();
p->Add(kRendererID);
// Safe
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("http://www.google.com/")));
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("https://www.paypal.com/")));
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("ftp://ftp.gnu.org/")));
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("data:text/html,<b>Hi</b>")));
EXPECT_TRUE(p->CanRequestURL(kRendererID,
GURL("view-source:http://www.google.com/")));
// Dangerous
EXPECT_FALSE(p->CanRequestURL(kRendererID,
GURL("file:///etc/passwd")));
EXPECT_FALSE(p->CanRequestURL(kRendererID,
GURL("view-cache:http://www.google.com/")));
EXPECT_FALSE(p->CanRequestURL(kRendererID,
GURL("chrome-resource://foo/bar")));
p->Remove(kRendererID);
}
TEST_F(RendererSecurityPolicyTest, AboutTest) {
RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance();
p->Add(kRendererID);
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("about:blank")));
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("about:BlAnK")));
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("aBouT:BlAnK")));
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("aBouT:blank")));
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:memory")));
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:crash")));
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:cache")));
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:hang")));
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("aBoUt:memory")));
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:CrASh")));
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("abOuT:cAChe")));
p->GrantRequestURL(kRendererID, GURL("about:memory"));
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:memory")));
p->GrantRequestURL(kRendererID, GURL("about:crash"));
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:crash")));
p->GrantRequestURL(kRendererID, GURL("about:cache"));
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:cache")));
p->GrantRequestURL(kRendererID, GURL("about:hang"));
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("about:hang")));
p->Remove(kRendererID);
}
TEST_F(RendererSecurityPolicyTest, JavaScriptTest) {
RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance();
p->Add(kRendererID);
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("javascript:alert('xss')")));
p->GrantRequestURL(kRendererID, GURL("javascript:alert('xss')"));
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("javascript:alert('xss')")));
p->Remove(kRendererID);
}
TEST_F(RendererSecurityPolicyTest, RegisterWebSafeSchemeTest) {
RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance();
p->Add(kRendererID);
// Currently, "asdf" is destined for ShellExecute, so it is allowed.
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers")));
// Once we register a ProtocolFactory for "asdf", we default to deny.
URLRequest::RegisterProtocolFactory("asdf", &URLRequestTestJob::Factory);
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("asdf:rockers")));
// We can allow new schemes by adding them to the whitelist.
p->RegisterWebSafeScheme("asdf");
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers")));
// Cleanup.
URLRequest::RegisterProtocolFactory("asdf", NULL);
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("asdf:rockers")));
p->Remove(kRendererID);
}
TEST_F(RendererSecurityPolicyTest, CanServiceCommandsTest) {
RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance();
p->Add(kRendererID);
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("file:///etc/passwd")));
p->GrantRequestURL(kRendererID, GURL("file:///etc/passwd"));
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("file:///etc/passwd")));
// We should forget our state if we repeat a renderer id.
p->Remove(kRendererID);
p->Add(kRendererID);
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("file:///etc/passwd")));
p->Remove(kRendererID);
}
TEST_F(RendererSecurityPolicyTest, ViewSource) {
RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance();
p->Add(kRendererID);
// View source is determined by the embedded scheme.
EXPECT_TRUE(p->CanRequestURL(kRendererID,
GURL("view-source:http://www.google.com/")));
EXPECT_FALSE(p->CanRequestURL(kRendererID,
GURL("view-source:file:///etc/passwd")));
EXPECT_FALSE(p->CanRequestURL(kRendererID, GURL("file:///etc/passwd")));
p->GrantRequestURL(kRendererID, GURL("view-source:file:///etc/passwd"));
// View source needs to be able to request the embedded scheme.
EXPECT_TRUE(p->CanRequestURL(kRendererID,
GURL("view-source:file:///etc/passwd")));
EXPECT_TRUE(p->CanRequestURL(kRendererID, GURL("file:///etc/passwd")));
p->Remove(kRendererID);
}
TEST_F(RendererSecurityPolicyTest, CanUploadFiles) {
RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance();
p->Add(kRendererID);
EXPECT_FALSE(p->CanUploadFile(kRendererID, L"/etc/passwd"));
p->GrantUploadFile(kRendererID, L"/etc/passwd");
EXPECT_TRUE(p->CanUploadFile(kRendererID, L"/etc/passwd"));
EXPECT_FALSE(p->CanUploadFile(kRendererID, L"/etc/shadow"));
p->Remove(kRendererID);
p->Add(kRendererID);
EXPECT_FALSE(p->CanUploadFile(kRendererID, L"/etc/passwd"));
EXPECT_FALSE(p->CanUploadFile(kRendererID, L"/etc/shadow"));
p->Remove(kRendererID);
}
TEST_F(RendererSecurityPolicyTest, CanServiceInspectElement) {
RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance();
GURL url("chrome-resource://inspector/inspector.html");
p->Add(kRendererID);
EXPECT_FALSE(p->CanRequestURL(kRendererID, url));
p->GrantInspectElement(kRendererID);
EXPECT_TRUE(p->CanRequestURL(kRendererID, url));
p->Remove(kRendererID);
}
TEST_F(RendererSecurityPolicyTest, CanServiceDOMUIBindings) {
RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance();
GURL url("chrome-resource://thumb/http://www.google.com/");
p->Add(kRendererID);
EXPECT_FALSE(p->HasDOMUIBindings(kRendererID));
EXPECT_FALSE(p->CanRequestURL(kRendererID, url));
p->GrantDOMUIBindings(kRendererID);
EXPECT_TRUE(p->HasDOMUIBindings(kRendererID));
EXPECT_TRUE(p->CanRequestURL(kRendererID, url));
p->Remove(kRendererID);
}
TEST_F(RendererSecurityPolicyTest, RemoveRace) {
RendererSecurityPolicy* p = RendererSecurityPolicy::GetInstance();
GURL url("file:///etc/passwd");
std::wstring file(L"/etc/passwd");
p->Add(kRendererID);
p->GrantRequestURL(kRendererID, url);
p->GrantUploadFile(kRendererID, file);
p->GrantDOMUIBindings(kRendererID);
EXPECT_TRUE(p->CanRequestURL(kRendererID, url));
EXPECT_TRUE(p->CanUploadFile(kRendererID, file));
EXPECT_TRUE(p->HasDOMUIBindings(kRendererID));
p->Remove(kRendererID);
// Renderers are added and removed on the UI thread, but the policy can be
// queried on the IO thread. The RendererSecurityPolicy needs to be prepared
// to answer policy questions about renderers who no longer exist.
// In this case, we default to secure behavior.
EXPECT_FALSE(p->CanRequestURL(kRendererID, url));
EXPECT_FALSE(p->CanUploadFile(kRendererID, file));
EXPECT_FALSE(p->HasDOMUIBindings(kRendererID));
}