michael@0: // Copyright (c) 2011 The Chromium Authors. All rights reserved. michael@0: // Use of this source code is governed by a BSD-style license that can be michael@0: // found in the LICENSE file. michael@0: michael@0: #include "sandbox/win/src/sync_policy_test.h" michael@0: michael@0: #include "base/win/scoped_handle.h" michael@0: #include "sandbox/win/src/sandbox.h" michael@0: #include "sandbox/win/src/sandbox_policy.h" michael@0: #include "sandbox/win/src/sandbox_factory.h" michael@0: #include "sandbox/win/src/nt_internals.h" michael@0: #include "testing/gtest/include/gtest/gtest.h" michael@0: michael@0: namespace sandbox { michael@0: michael@0: SBOX_TESTS_COMMAND int Event_Open(int argc, wchar_t **argv) { michael@0: if (argc != 2) michael@0: return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; michael@0: michael@0: DWORD desired_access = SYNCHRONIZE; michael@0: if (L'f' == argv[0][0]) michael@0: desired_access = EVENT_ALL_ACCESS; michael@0: michael@0: base::win::ScopedHandle event_open(::OpenEvent( michael@0: desired_access, FALSE, argv[1])); michael@0: DWORD error_open = ::GetLastError(); michael@0: michael@0: if (event_open.Get()) michael@0: return SBOX_TEST_SUCCEEDED; michael@0: michael@0: if (ERROR_ACCESS_DENIED == error_open || michael@0: ERROR_BAD_PATHNAME == error_open) michael@0: return SBOX_TEST_DENIED; michael@0: michael@0: return SBOX_TEST_FAILED; michael@0: } michael@0: michael@0: SBOX_TESTS_COMMAND int Event_CreateOpen(int argc, wchar_t **argv) { michael@0: if (argc < 2 || argc > 3) michael@0: return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; michael@0: michael@0: wchar_t *event_name = NULL; michael@0: if (3 == argc) michael@0: event_name = argv[2]; michael@0: michael@0: BOOL manual_reset = FALSE; michael@0: BOOL initial_state = FALSE; michael@0: if (L't' == argv[0][0]) michael@0: manual_reset = TRUE; michael@0: if (L't' == argv[1][0]) michael@0: initial_state = TRUE; michael@0: michael@0: base::win::ScopedHandle event_create(::CreateEvent( michael@0: NULL, manual_reset, initial_state, event_name)); michael@0: DWORD error_create = ::GetLastError(); michael@0: base::win::ScopedHandle event_open; michael@0: if (event_name) michael@0: event_open.Set(::OpenEvent(EVENT_ALL_ACCESS, FALSE, event_name)); michael@0: michael@0: if (event_create.Get()) { michael@0: DWORD wait = ::WaitForSingleObject(event_create.Get(), 0); michael@0: if (initial_state && WAIT_OBJECT_0 != wait) michael@0: return SBOX_TEST_FAILED; michael@0: michael@0: if (!initial_state && WAIT_TIMEOUT != wait) michael@0: return SBOX_TEST_FAILED; michael@0: } michael@0: michael@0: if (event_name) { michael@0: // Both event_open and event_create have to be valid. michael@0: if (event_open.Get() && event_create) michael@0: return SBOX_TEST_SUCCEEDED; michael@0: michael@0: if (event_open.Get() && !event_create || !event_open.Get() && event_create) michael@0: return SBOX_TEST_FAILED; michael@0: } else { michael@0: // Only event_create has to be valid. michael@0: if (event_create.Get()) michael@0: return SBOX_TEST_SUCCEEDED; michael@0: } michael@0: michael@0: if (ERROR_ACCESS_DENIED == error_create || michael@0: ERROR_BAD_PATHNAME == error_create) michael@0: return SBOX_TEST_DENIED; michael@0: michael@0: return SBOX_TEST_FAILED; michael@0: } michael@0: michael@0: // Tests the creation of events using all the possible combinations. michael@0: TEST(SyncPolicyTest, TestEvent) { michael@0: TestRunner runner; michael@0: EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, michael@0: TargetPolicy::EVENTS_ALLOW_ANY, michael@0: L"test1")); michael@0: EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, michael@0: TargetPolicy::EVENTS_ALLOW_ANY, michael@0: L"test2")); michael@0: michael@0: EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f")); michael@0: EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f")); michael@0: EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t")); michael@0: EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t")); michael@0: EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f test1")); michael@0: EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f test2")); michael@0: EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t test1")); michael@0: EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t test2")); michael@0: EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test3")); michael@0: EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test4")); michael@0: EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test3")); michael@0: EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test4")); michael@0: } michael@0: michael@0: // Tests opening events with read only access. michael@0: TEST(SyncPolicyTest, TestEventReadOnly) { michael@0: TestRunner runner; michael@0: EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, michael@0: TargetPolicy::EVENTS_ALLOW_READONLY, michael@0: L"test1")); michael@0: EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, michael@0: TargetPolicy::EVENTS_ALLOW_READONLY, michael@0: L"test2")); michael@0: EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, michael@0: TargetPolicy::EVENTS_ALLOW_READONLY, michael@0: L"test5")); michael@0: EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, michael@0: TargetPolicy::EVENTS_ALLOW_READONLY, michael@0: L"test6")); michael@0: michael@0: base::win::ScopedHandle handle1(::CreateEvent(NULL, FALSE, FALSE, L"test1")); michael@0: base::win::ScopedHandle handle2(::CreateEvent(NULL, FALSE, FALSE, L"test2")); michael@0: base::win::ScopedHandle handle3(::CreateEvent(NULL, FALSE, FALSE, L"test3")); michael@0: base::win::ScopedHandle handle4(::CreateEvent(NULL, FALSE, FALSE, L"test4")); michael@0: michael@0: EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f")); michael@0: EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f")); michael@0: EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test1")); michael@0: EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_Open s test2")); michael@0: EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test3")); michael@0: EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open s test4")); michael@0: EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test5")); michael@0: EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test6")); michael@0: EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test5")); michael@0: EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test6")); michael@0: } michael@0: michael@0: } // namespace sandbox