Thu, 22 Jan 2015 13:21:57 +0100
Incorporate requested changes from Mozilla in review:
https://bugzilla.mozilla.org/show_bug.cgi?id=1123480#c6
michael@0 | 1 | // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
michael@0 | 2 | // Use of this source code is governed by a BSD-style license that can be |
michael@0 | 3 | // found in the LICENSE file. |
michael@0 | 4 | |
michael@0 | 5 | #include "sandbox/win/src/sync_policy_test.h" |
michael@0 | 6 | |
michael@0 | 7 | #include "base/win/scoped_handle.h" |
michael@0 | 8 | #include "sandbox/win/src/sandbox.h" |
michael@0 | 9 | #include "sandbox/win/src/sandbox_policy.h" |
michael@0 | 10 | #include "sandbox/win/src/sandbox_factory.h" |
michael@0 | 11 | #include "sandbox/win/src/nt_internals.h" |
michael@0 | 12 | #include "testing/gtest/include/gtest/gtest.h" |
michael@0 | 13 | |
michael@0 | 14 | namespace sandbox { |
michael@0 | 15 | |
michael@0 | 16 | SBOX_TESTS_COMMAND int Event_Open(int argc, wchar_t **argv) { |
michael@0 | 17 | if (argc != 2) |
michael@0 | 18 | return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; |
michael@0 | 19 | |
michael@0 | 20 | DWORD desired_access = SYNCHRONIZE; |
michael@0 | 21 | if (L'f' == argv[0][0]) |
michael@0 | 22 | desired_access = EVENT_ALL_ACCESS; |
michael@0 | 23 | |
michael@0 | 24 | base::win::ScopedHandle event_open(::OpenEvent( |
michael@0 | 25 | desired_access, FALSE, argv[1])); |
michael@0 | 26 | DWORD error_open = ::GetLastError(); |
michael@0 | 27 | |
michael@0 | 28 | if (event_open.Get()) |
michael@0 | 29 | return SBOX_TEST_SUCCEEDED; |
michael@0 | 30 | |
michael@0 | 31 | if (ERROR_ACCESS_DENIED == error_open || |
michael@0 | 32 | ERROR_BAD_PATHNAME == error_open) |
michael@0 | 33 | return SBOX_TEST_DENIED; |
michael@0 | 34 | |
michael@0 | 35 | return SBOX_TEST_FAILED; |
michael@0 | 36 | } |
michael@0 | 37 | |
michael@0 | 38 | SBOX_TESTS_COMMAND int Event_CreateOpen(int argc, wchar_t **argv) { |
michael@0 | 39 | if (argc < 2 || argc > 3) |
michael@0 | 40 | return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; |
michael@0 | 41 | |
michael@0 | 42 | wchar_t *event_name = NULL; |
michael@0 | 43 | if (3 == argc) |
michael@0 | 44 | event_name = argv[2]; |
michael@0 | 45 | |
michael@0 | 46 | BOOL manual_reset = FALSE; |
michael@0 | 47 | BOOL initial_state = FALSE; |
michael@0 | 48 | if (L't' == argv[0][0]) |
michael@0 | 49 | manual_reset = TRUE; |
michael@0 | 50 | if (L't' == argv[1][0]) |
michael@0 | 51 | initial_state = TRUE; |
michael@0 | 52 | |
michael@0 | 53 | base::win::ScopedHandle event_create(::CreateEvent( |
michael@0 | 54 | NULL, manual_reset, initial_state, event_name)); |
michael@0 | 55 | DWORD error_create = ::GetLastError(); |
michael@0 | 56 | base::win::ScopedHandle event_open; |
michael@0 | 57 | if (event_name) |
michael@0 | 58 | event_open.Set(::OpenEvent(EVENT_ALL_ACCESS, FALSE, event_name)); |
michael@0 | 59 | |
michael@0 | 60 | if (event_create.Get()) { |
michael@0 | 61 | DWORD wait = ::WaitForSingleObject(event_create.Get(), 0); |
michael@0 | 62 | if (initial_state && WAIT_OBJECT_0 != wait) |
michael@0 | 63 | return SBOX_TEST_FAILED; |
michael@0 | 64 | |
michael@0 | 65 | if (!initial_state && WAIT_TIMEOUT != wait) |
michael@0 | 66 | return SBOX_TEST_FAILED; |
michael@0 | 67 | } |
michael@0 | 68 | |
michael@0 | 69 | if (event_name) { |
michael@0 | 70 | // Both event_open and event_create have to be valid. |
michael@0 | 71 | if (event_open.Get() && event_create) |
michael@0 | 72 | return SBOX_TEST_SUCCEEDED; |
michael@0 | 73 | |
michael@0 | 74 | if (event_open.Get() && !event_create || !event_open.Get() && event_create) |
michael@0 | 75 | return SBOX_TEST_FAILED; |
michael@0 | 76 | } else { |
michael@0 | 77 | // Only event_create has to be valid. |
michael@0 | 78 | if (event_create.Get()) |
michael@0 | 79 | return SBOX_TEST_SUCCEEDED; |
michael@0 | 80 | } |
michael@0 | 81 | |
michael@0 | 82 | if (ERROR_ACCESS_DENIED == error_create || |
michael@0 | 83 | ERROR_BAD_PATHNAME == error_create) |
michael@0 | 84 | return SBOX_TEST_DENIED; |
michael@0 | 85 | |
michael@0 | 86 | return SBOX_TEST_FAILED; |
michael@0 | 87 | } |
michael@0 | 88 | |
michael@0 | 89 | // Tests the creation of events using all the possible combinations. |
michael@0 | 90 | TEST(SyncPolicyTest, TestEvent) { |
michael@0 | 91 | TestRunner runner; |
michael@0 | 92 | EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, |
michael@0 | 93 | TargetPolicy::EVENTS_ALLOW_ANY, |
michael@0 | 94 | L"test1")); |
michael@0 | 95 | EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, |
michael@0 | 96 | TargetPolicy::EVENTS_ALLOW_ANY, |
michael@0 | 97 | L"test2")); |
michael@0 | 98 | |
michael@0 | 99 | EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f")); |
michael@0 | 100 | EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f")); |
michael@0 | 101 | EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t")); |
michael@0 | 102 | EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t")); |
michael@0 | 103 | EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f test1")); |
michael@0 | 104 | EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f test2")); |
michael@0 | 105 | EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t test1")); |
michael@0 | 106 | EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t test2")); |
michael@0 | 107 | EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test3")); |
michael@0 | 108 | EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test4")); |
michael@0 | 109 | EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test3")); |
michael@0 | 110 | EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test4")); |
michael@0 | 111 | } |
michael@0 | 112 | |
michael@0 | 113 | // Tests opening events with read only access. |
michael@0 | 114 | TEST(SyncPolicyTest, TestEventReadOnly) { |
michael@0 | 115 | TestRunner runner; |
michael@0 | 116 | EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, |
michael@0 | 117 | TargetPolicy::EVENTS_ALLOW_READONLY, |
michael@0 | 118 | L"test1")); |
michael@0 | 119 | EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, |
michael@0 | 120 | TargetPolicy::EVENTS_ALLOW_READONLY, |
michael@0 | 121 | L"test2")); |
michael@0 | 122 | EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, |
michael@0 | 123 | TargetPolicy::EVENTS_ALLOW_READONLY, |
michael@0 | 124 | L"test5")); |
michael@0 | 125 | EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, |
michael@0 | 126 | TargetPolicy::EVENTS_ALLOW_READONLY, |
michael@0 | 127 | L"test6")); |
michael@0 | 128 | |
michael@0 | 129 | base::win::ScopedHandle handle1(::CreateEvent(NULL, FALSE, FALSE, L"test1")); |
michael@0 | 130 | base::win::ScopedHandle handle2(::CreateEvent(NULL, FALSE, FALSE, L"test2")); |
michael@0 | 131 | base::win::ScopedHandle handle3(::CreateEvent(NULL, FALSE, FALSE, L"test3")); |
michael@0 | 132 | base::win::ScopedHandle handle4(::CreateEvent(NULL, FALSE, FALSE, L"test4")); |
michael@0 | 133 | |
michael@0 | 134 | EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f")); |
michael@0 | 135 | EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f")); |
michael@0 | 136 | EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test1")); |
michael@0 | 137 | EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_Open s test2")); |
michael@0 | 138 | EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test3")); |
michael@0 | 139 | EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open s test4")); |
michael@0 | 140 | EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test5")); |
michael@0 | 141 | EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test6")); |
michael@0 | 142 | EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test5")); |
michael@0 | 143 | EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test6")); |
michael@0 | 144 | } |
michael@0 | 145 | |
michael@0 | 146 | } // namespace sandbox |