blob: 00e3ccd89ff74699279d21a78acf562fbdfd89f2 [file] [log] [blame]
// Copyright 2018 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/renderer_host/web_database_host_impl.h"
#include "base/run_loop.h"
#include "base/strings/utf_string_conversions.h"
#include "base/test/bind_test_util.h"
#include "content/browser/child_process_security_policy_impl.h"
#include "content/browser/isolation_context.h"
#include "content/public/test/mock_render_process_host.h"
#include "content/public/test/test_browser_context.h"
#include "content/public/test/test_browser_thread_bundle.h"
#include "mojo/core/embedder/embedder.h"
#include "mojo/public/cpp/test_support/test_utils.h"
#include "storage/common/database/database_identifier.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace content {
namespace {
base::string16 ConstructVfsFileName(const url::Origin& origin,
const base::string16& name,
const base::string16& suffix) {
std::string identifier = storage::GetIdentifierFromOrigin(origin);
return base::UTF8ToUTF16(identifier) + base::ASCIIToUTF16("/") + name +
base::ASCIIToUTF16("#") + suffix;
}
class FakeMojoMessageDispatchContext {
public:
FakeMojoMessageDispatchContext()
: dummy_message_(0, 0, 0, 0, nullptr), context_(&dummy_message_) {}
private:
mojo::Message dummy_message_;
mojo::internal::MessageDispatchContext context_;
DISALLOW_COPY_AND_ASSIGN(FakeMojoMessageDispatchContext);
};
} // namespace
class WebDatabaseHostImplTest : public ::testing::Test {
protected:
WebDatabaseHostImplTest() = default;
~WebDatabaseHostImplTest() override = default;
void SetUp() override {
render_process_host_ =
std::make_unique<MockRenderProcessHost>(&browser_context_);
scoped_refptr<storage::DatabaseTracker> db_tracker =
base::MakeRefCounted<storage::DatabaseTracker>(
base::FilePath(), /*is_incognito=*/false,
/*special_storage_policy=*/nullptr,
/*quota_manager_proxy=*/nullptr);
db_tracker->set_task_runner_for_testing(
base::ThreadTaskRunnerHandle::Get());
host_ = std::make_unique<WebDatabaseHostImpl>(process_id(),
std::move(db_tracker));
}
template <typename Callable>
void CheckUnauthorizedOrigin(const Callable& func) {
FakeMojoMessageDispatchContext fake_dispatch_context;
mojo::test::BadMessageObserver bad_message_observer;
func();
EXPECT_EQ("Unauthorized origin.", bad_message_observer.WaitForBadMessage());
}
template <typename Callable>
void CheckInvalidOrigin(const Callable& func) {
FakeMojoMessageDispatchContext fake_dispatch_context;
mojo::test::BadMessageObserver bad_message_observer;
func();
EXPECT_EQ("Invalid origin.", bad_message_observer.WaitForBadMessage());
}
void CallRenderProcessHostCleanup() {
render_process_host_->Cleanup();
// Releasing our handle on this object because Cleanup() posts a task
// to delete the object and we need to avoid a double delete.
render_process_host_.release();
}
WebDatabaseHostImpl* host() { return host_.get(); }
int process_id() const { return render_process_host_->GetID(); }
private:
TestBrowserThreadBundle thread_bundle_;
TestBrowserContext browser_context_;
std::unique_ptr<MockRenderProcessHost> render_process_host_;
std::unique_ptr<WebDatabaseHostImpl> host_;
DISALLOW_COPY_AND_ASSIGN(WebDatabaseHostImplTest);
};
TEST_F(WebDatabaseHostImplTest, BadMessagesUnauthorized) {
const url::Origin correct_origin =
url::Origin::Create(GURL("http://correct.com"));
const url::Origin incorrect_origin =
url::Origin::Create(GURL("http://incorrect.net"));
const base::string16 db_name(base::ASCIIToUTF16("db_name"));
const base::string16 suffix(base::ASCIIToUTF16("suffix"));
const base::string16 bad_vfs_file_name =
ConstructVfsFileName(incorrect_origin, db_name, suffix);
auto* security_policy = ChildProcessSecurityPolicyImpl::GetInstance();
security_policy->AddIsolatedOrigins({correct_origin, incorrect_origin});
security_policy->LockToOrigin(IsolationContext(), process_id(),
correct_origin.GetURL());
ASSERT_TRUE(security_policy->CanAccessDataForOrigin(process_id(),
correct_origin.GetURL()));
ASSERT_FALSE(security_policy->CanAccessDataForOrigin(
process_id(), incorrect_origin.GetURL()));
CheckUnauthorizedOrigin([&]() {
host()->OpenFile(bad_vfs_file_name,
/*desired_flags=*/0, base::BindOnce([](base::File) {}));
});
CheckUnauthorizedOrigin([&]() {
host()->DeleteFile(bad_vfs_file_name,
/*sync_dir=*/false, base::BindOnce([](int32_t) {}));
});
CheckUnauthorizedOrigin([&]() {
host()->GetFileAttributes(bad_vfs_file_name,
base::BindOnce([](int32_t) {}));
});
CheckUnauthorizedOrigin([&]() {
host()->GetFileSize(bad_vfs_file_name, base::BindOnce([](int64_t) {}));
});
CheckUnauthorizedOrigin([&]() {
host()->SetFileSize(bad_vfs_file_name, /*expected_size=*/0,
base::BindOnce([](bool) {}));
});
CheckUnauthorizedOrigin([&]() {
host()->GetSpaceAvailable(incorrect_origin, base::BindOnce([](int64_t) {}));
});
CheckUnauthorizedOrigin([&]() {
host()->Opened(incorrect_origin, db_name, base::ASCIIToUTF16("description"),
/*estimated_size=*/0);
});
CheckUnauthorizedOrigin(
[&]() { host()->Modified(incorrect_origin, db_name); });
CheckUnauthorizedOrigin([&]() { host()->Closed(incorrect_origin, db_name); });
CheckUnauthorizedOrigin([&]() {
host()->HandleSqliteError(incorrect_origin, db_name, /*error=*/0);
});
}
TEST_F(WebDatabaseHostImplTest, BadMessagesInvalid) {
const url::Origin opaque_origin;
const base::string16 db_name(base::ASCIIToUTF16("db_name"));
CheckInvalidOrigin([&]() {
host()->GetSpaceAvailable(opaque_origin, base::BindOnce([](int64_t) {}));
});
CheckInvalidOrigin([&]() {
host()->Opened(opaque_origin, db_name, base::ASCIIToUTF16("description"),
/*estimated_size=*/0);
});
CheckInvalidOrigin([&]() { host()->Modified(opaque_origin, db_name); });
CheckInvalidOrigin([&]() { host()->Closed(opaque_origin, db_name); });
CheckInvalidOrigin([&]() {
host()->HandleSqliteError(opaque_origin, db_name, /*error=*/0);
});
}
TEST_F(WebDatabaseHostImplTest, ProcessShutdown) {
const url::Origin correct_origin =
url::Origin::Create(GURL("http://correct.com"));
const url::Origin incorrect_origin =
url::Origin::Create(GURL("http://incorrect.net"));
const base::string16 db_name(base::ASCIIToUTF16("db_name"));
const base::string16 suffix(base::ASCIIToUTF16("suffix"));
const base::string16 bad_vfs_file_name =
ConstructVfsFileName(incorrect_origin, db_name, suffix);
auto* security_policy = ChildProcessSecurityPolicyImpl::GetInstance();
security_policy->AddIsolatedOrigins({correct_origin, incorrect_origin});
security_policy->LockToOrigin(IsolationContext(), process_id(),
correct_origin.GetURL());
bool success_callback_was_called = false;
auto success_callback = base::BindLambdaForTesting(
[&](base::File) { success_callback_was_called = true; });
base::Optional<std::string> error_callback_message;
mojo::core::SetDefaultProcessErrorCallback(base::BindLambdaForTesting(
[&](const std::string& message) { error_callback_message = message; }));
// Verify that an error occurs with OpenFile() call before process shutdown.
{
FakeMojoMessageDispatchContext fake_dispatch_context;
host()->OpenFile(bad_vfs_file_name,
/*desired_flags=*/0, success_callback);
base::RunLoop().RunUntilIdle();
EXPECT_FALSE(success_callback_was_called);
EXPECT_TRUE(error_callback_message.has_value());
EXPECT_EQ("Unauthorized origin.", error_callback_message.value());
}
success_callback_was_called = false;
error_callback_message.reset();
// Start cleanup of the RenderProcessHost. This causes
// RenderProcessHost::FromID() to return nullptr for the process_id.
CallRenderProcessHostCleanup();
// Attempt the call again and verify that no callbacks were called.
{
FakeMojoMessageDispatchContext fake_dispatch_context;
host()->OpenFile(bad_vfs_file_name,
/*desired_flags=*/0, success_callback);
base::RunLoop().RunUntilIdle();
// Verify none of the callbacks were called.
EXPECT_FALSE(success_callback_was_called);
EXPECT_FALSE(error_callback_message.has_value());
}
mojo::core::SetDefaultProcessErrorCallback(
mojo::core::ProcessErrorCallback());
}
} // namespace content