OLD | NEW |
| (Empty) |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "base/win/scoped_handle.h" | |
6 #include "sandbox/src/sandbox.h" | |
7 #include "sandbox/src/sandbox_policy.h" | |
8 #include "sandbox/src/sandbox_factory.h" | |
9 #include "sandbox/src/nt_internals.h" | |
10 #include "sandbox/tests/common/controller.h" | |
11 #include "testing/gtest/include/gtest/gtest.h" | |
12 | |
13 namespace sandbox { | |
14 | |
15 SBOX_TESTS_COMMAND int Event_Open(int argc, wchar_t **argv) { | |
16 if (argc != 2) | |
17 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; | |
18 | |
19 DWORD desired_access = SYNCHRONIZE; | |
20 if (L'f' == argv[0][0]) | |
21 desired_access = EVENT_ALL_ACCESS; | |
22 | |
23 base::win::ScopedHandle event_open(::OpenEvent( | |
24 desired_access, FALSE, argv[1])); | |
25 DWORD error_open = ::GetLastError(); | |
26 | |
27 if (event_open.Get()) | |
28 return SBOX_TEST_SUCCEEDED; | |
29 | |
30 if (ERROR_ACCESS_DENIED == error_open || | |
31 ERROR_BAD_PATHNAME == error_open) | |
32 return SBOX_TEST_DENIED; | |
33 | |
34 return SBOX_TEST_FAILED; | |
35 } | |
36 | |
37 SBOX_TESTS_COMMAND int Event_CreateOpen(int argc, wchar_t **argv) { | |
38 if (argc < 2 || argc > 3) | |
39 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; | |
40 | |
41 wchar_t *event_name = NULL; | |
42 if (3 == argc) | |
43 event_name = argv[2]; | |
44 | |
45 BOOL manual_reset = FALSE; | |
46 BOOL initial_state = FALSE; | |
47 if (L't' == argv[0][0]) | |
48 manual_reset = TRUE; | |
49 if (L't' == argv[1][0]) | |
50 initial_state = TRUE; | |
51 | |
52 base::win::ScopedHandle event_create(::CreateEvent( | |
53 NULL, manual_reset, initial_state, event_name)); | |
54 DWORD error_create = ::GetLastError(); | |
55 base::win::ScopedHandle event_open; | |
56 if (event_name) | |
57 event_open.Set(::OpenEvent(EVENT_ALL_ACCESS, FALSE, event_name)); | |
58 | |
59 if (event_create.Get()) { | |
60 DWORD wait = ::WaitForSingleObject(event_create.Get(), 0); | |
61 if (initial_state && WAIT_OBJECT_0 != wait) | |
62 return SBOX_TEST_FAILED; | |
63 | |
64 if (!initial_state && WAIT_TIMEOUT != wait) | |
65 return SBOX_TEST_FAILED; | |
66 } | |
67 | |
68 if (event_name) { | |
69 // Both event_open and event_create have to be valid. | |
70 if (event_open.Get() && event_create) | |
71 return SBOX_TEST_SUCCEEDED; | |
72 | |
73 if (event_open.Get() && !event_create || !event_open.Get() && event_create) | |
74 return SBOX_TEST_FAILED; | |
75 } else { | |
76 // Only event_create has to be valid. | |
77 if (event_create.Get()) | |
78 return SBOX_TEST_SUCCEEDED; | |
79 } | |
80 | |
81 if (ERROR_ACCESS_DENIED == error_create || | |
82 ERROR_BAD_PATHNAME == error_create) | |
83 return SBOX_TEST_DENIED; | |
84 | |
85 return SBOX_TEST_FAILED; | |
86 } | |
87 | |
88 // Tests the creation of events using all the possible combinations. | |
89 TEST(SyncPolicyTest, TestEvent) { | |
90 TestRunner runner; | |
91 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, | |
92 TargetPolicy::EVENTS_ALLOW_ANY, | |
93 L"test1")); | |
94 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, | |
95 TargetPolicy::EVENTS_ALLOW_ANY, | |
96 L"test2")); | |
97 | |
98 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f")); | |
99 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f")); | |
100 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t")); | |
101 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t")); | |
102 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f test1")); | |
103 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f test2")); | |
104 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t test1")); | |
105 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t test2")); | |
106 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test3")); | |
107 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test4")); | |
108 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test3")); | |
109 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test4")); | |
110 } | |
111 | |
112 // Tests opening events with read only access. | |
113 TEST(SyncPolicyTest, TestEventReadOnly) { | |
114 TestRunner runner; | |
115 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, | |
116 TargetPolicy::EVENTS_ALLOW_READONLY, | |
117 L"test1")); | |
118 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, | |
119 TargetPolicy::EVENTS_ALLOW_READONLY, | |
120 L"test2")); | |
121 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, | |
122 TargetPolicy::EVENTS_ALLOW_READONLY, | |
123 L"test5")); | |
124 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, | |
125 TargetPolicy::EVENTS_ALLOW_READONLY, | |
126 L"test6")); | |
127 | |
128 base::win::ScopedHandle handle1(::CreateEvent(NULL, FALSE, FALSE, L"test1")); | |
129 base::win::ScopedHandle handle2(::CreateEvent(NULL, FALSE, FALSE, L"test2")); | |
130 base::win::ScopedHandle handle3(::CreateEvent(NULL, FALSE, FALSE, L"test3")); | |
131 base::win::ScopedHandle handle4(::CreateEvent(NULL, FALSE, FALSE, L"test4")); | |
132 | |
133 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f")); | |
134 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f")); | |
135 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test1")); | |
136 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_Open s test2")); | |
137 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test3")); | |
138 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open s test4")); | |
139 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test5")); | |
140 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test6")); | |
141 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test5")); | |
142 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test6")); | |
143 } | |
144 | |
145 } // namespace sandbox | |
OLD | NEW |