security/sandbox/win/src/sync_policy_test.cc

Thu, 22 Jan 2015 13:21:57 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Thu, 22 Jan 2015 13:21:57 +0100
branch
TOR_BUG_9701
changeset 15
b8a032363ba2
permissions
-rw-r--r--

Incorporate requested changes from Mozilla in review:
https://bugzilla.mozilla.org/show_bug.cgi?id=1123480#c6

michael@0 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
michael@0 2 // Use of this source code is governed by a BSD-style license that can be
michael@0 3 // found in the LICENSE file.
michael@0 4
michael@0 5 #include "sandbox/win/src/sync_policy_test.h"
michael@0 6
michael@0 7 #include "base/win/scoped_handle.h"
michael@0 8 #include "sandbox/win/src/sandbox.h"
michael@0 9 #include "sandbox/win/src/sandbox_policy.h"
michael@0 10 #include "sandbox/win/src/sandbox_factory.h"
michael@0 11 #include "sandbox/win/src/nt_internals.h"
michael@0 12 #include "testing/gtest/include/gtest/gtest.h"
michael@0 13
michael@0 14 namespace sandbox {
michael@0 15
michael@0 16 SBOX_TESTS_COMMAND int Event_Open(int argc, wchar_t **argv) {
michael@0 17 if (argc != 2)
michael@0 18 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
michael@0 19
michael@0 20 DWORD desired_access = SYNCHRONIZE;
michael@0 21 if (L'f' == argv[0][0])
michael@0 22 desired_access = EVENT_ALL_ACCESS;
michael@0 23
michael@0 24 base::win::ScopedHandle event_open(::OpenEvent(
michael@0 25 desired_access, FALSE, argv[1]));
michael@0 26 DWORD error_open = ::GetLastError();
michael@0 27
michael@0 28 if (event_open.Get())
michael@0 29 return SBOX_TEST_SUCCEEDED;
michael@0 30
michael@0 31 if (ERROR_ACCESS_DENIED == error_open ||
michael@0 32 ERROR_BAD_PATHNAME == error_open)
michael@0 33 return SBOX_TEST_DENIED;
michael@0 34
michael@0 35 return SBOX_TEST_FAILED;
michael@0 36 }
michael@0 37
michael@0 38 SBOX_TESTS_COMMAND int Event_CreateOpen(int argc, wchar_t **argv) {
michael@0 39 if (argc < 2 || argc > 3)
michael@0 40 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
michael@0 41
michael@0 42 wchar_t *event_name = NULL;
michael@0 43 if (3 == argc)
michael@0 44 event_name = argv[2];
michael@0 45
michael@0 46 BOOL manual_reset = FALSE;
michael@0 47 BOOL initial_state = FALSE;
michael@0 48 if (L't' == argv[0][0])
michael@0 49 manual_reset = TRUE;
michael@0 50 if (L't' == argv[1][0])
michael@0 51 initial_state = TRUE;
michael@0 52
michael@0 53 base::win::ScopedHandle event_create(::CreateEvent(
michael@0 54 NULL, manual_reset, initial_state, event_name));
michael@0 55 DWORD error_create = ::GetLastError();
michael@0 56 base::win::ScopedHandle event_open;
michael@0 57 if (event_name)
michael@0 58 event_open.Set(::OpenEvent(EVENT_ALL_ACCESS, FALSE, event_name));
michael@0 59
michael@0 60 if (event_create.Get()) {
michael@0 61 DWORD wait = ::WaitForSingleObject(event_create.Get(), 0);
michael@0 62 if (initial_state && WAIT_OBJECT_0 != wait)
michael@0 63 return SBOX_TEST_FAILED;
michael@0 64
michael@0 65 if (!initial_state && WAIT_TIMEOUT != wait)
michael@0 66 return SBOX_TEST_FAILED;
michael@0 67 }
michael@0 68
michael@0 69 if (event_name) {
michael@0 70 // Both event_open and event_create have to be valid.
michael@0 71 if (event_open.Get() && event_create)
michael@0 72 return SBOX_TEST_SUCCEEDED;
michael@0 73
michael@0 74 if (event_open.Get() && !event_create || !event_open.Get() && event_create)
michael@0 75 return SBOX_TEST_FAILED;
michael@0 76 } else {
michael@0 77 // Only event_create has to be valid.
michael@0 78 if (event_create.Get())
michael@0 79 return SBOX_TEST_SUCCEEDED;
michael@0 80 }
michael@0 81
michael@0 82 if (ERROR_ACCESS_DENIED == error_create ||
michael@0 83 ERROR_BAD_PATHNAME == error_create)
michael@0 84 return SBOX_TEST_DENIED;
michael@0 85
michael@0 86 return SBOX_TEST_FAILED;
michael@0 87 }
michael@0 88
michael@0 89 // Tests the creation of events using all the possible combinations.
michael@0 90 TEST(SyncPolicyTest, TestEvent) {
michael@0 91 TestRunner runner;
michael@0 92 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
michael@0 93 TargetPolicy::EVENTS_ALLOW_ANY,
michael@0 94 L"test1"));
michael@0 95 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
michael@0 96 TargetPolicy::EVENTS_ALLOW_ANY,
michael@0 97 L"test2"));
michael@0 98
michael@0 99 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f"));
michael@0 100 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f"));
michael@0 101 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t"));
michael@0 102 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t"));
michael@0 103 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f test1"));
michael@0 104 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f test2"));
michael@0 105 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t test1"));
michael@0 106 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t test2"));
michael@0 107 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test3"));
michael@0 108 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test4"));
michael@0 109 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test3"));
michael@0 110 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test4"));
michael@0 111 }
michael@0 112
michael@0 113 // Tests opening events with read only access.
michael@0 114 TEST(SyncPolicyTest, TestEventReadOnly) {
michael@0 115 TestRunner runner;
michael@0 116 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
michael@0 117 TargetPolicy::EVENTS_ALLOW_READONLY,
michael@0 118 L"test1"));
michael@0 119 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
michael@0 120 TargetPolicy::EVENTS_ALLOW_READONLY,
michael@0 121 L"test2"));
michael@0 122 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
michael@0 123 TargetPolicy::EVENTS_ALLOW_READONLY,
michael@0 124 L"test5"));
michael@0 125 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
michael@0 126 TargetPolicy::EVENTS_ALLOW_READONLY,
michael@0 127 L"test6"));
michael@0 128
michael@0 129 base::win::ScopedHandle handle1(::CreateEvent(NULL, FALSE, FALSE, L"test1"));
michael@0 130 base::win::ScopedHandle handle2(::CreateEvent(NULL, FALSE, FALSE, L"test2"));
michael@0 131 base::win::ScopedHandle handle3(::CreateEvent(NULL, FALSE, FALSE, L"test3"));
michael@0 132 base::win::ScopedHandle handle4(::CreateEvent(NULL, FALSE, FALSE, L"test4"));
michael@0 133
michael@0 134 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f"));
michael@0 135 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f"));
michael@0 136 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test1"));
michael@0 137 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_Open s test2"));
michael@0 138 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test3"));
michael@0 139 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open s test4"));
michael@0 140 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test5"));
michael@0 141 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test6"));
michael@0 142 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test5"));
michael@0 143 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test6"));
michael@0 144 }
michael@0 145
michael@0 146 } // namespace sandbox

mercurial