95 lines
3.7 KiB
C++
95 lines
3.7 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "gtest/gtest.h"
|
|
|
|
#include "broker/SandboxBroker.h"
|
|
|
|
namespace mozilla {
|
|
|
|
static const int MAY_ACCESS = SandboxBroker::MAY_ACCESS;
|
|
static const int MAY_READ = SandboxBroker::MAY_READ;
|
|
static const int MAY_WRITE = SandboxBroker::MAY_WRITE;
|
|
// static const int MAY_CREATE = SandboxBroker::MAY_CREATE;
|
|
// static const int RECURSIVE = SandboxBroker::RECURSIVE;
|
|
static const auto AddAlways = SandboxBroker::Policy::AddAlways;
|
|
|
|
TEST(SandboxBrokerPolicyLookup, Simple)
|
|
{
|
|
SandboxBroker::Policy p;
|
|
p.AddPath(MAY_READ, "/dev/urandom", AddAlways);
|
|
|
|
EXPECT_NE(0, p.Lookup("/dev/urandom")) << "Added path not found.";
|
|
EXPECT_EQ(MAY_ACCESS | MAY_READ, p.Lookup("/dev/urandom"))
|
|
<< "Added path found with wrong perms.";
|
|
EXPECT_EQ(0, p.Lookup("/etc/passwd")) << "Non-added path was found.";
|
|
}
|
|
|
|
TEST(SandboxBrokerPolicyLookup, CopyCtor)
|
|
{
|
|
SandboxBroker::Policy psrc;
|
|
psrc.AddPath(MAY_READ | MAY_WRITE, "/dev/null", AddAlways);
|
|
SandboxBroker::Policy pdst(psrc);
|
|
psrc.AddPath(MAY_READ, "/dev/zero", AddAlways);
|
|
pdst.AddPath(MAY_READ, "/dev/urandom", AddAlways);
|
|
|
|
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup("/dev/null"))
|
|
<< "Common path absent in copy source.";
|
|
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, pdst.Lookup("/dev/null"))
|
|
<< "Common path absent in copy destination.";
|
|
|
|
EXPECT_EQ(MAY_ACCESS | MAY_READ, psrc.Lookup("/dev/zero"))
|
|
<< "Source-only path is absent.";
|
|
EXPECT_EQ(0, pdst.Lookup("/dev/zero"))
|
|
<< "Source-only path is present in copy destination.";
|
|
|
|
EXPECT_EQ(0, psrc.Lookup("/dev/urandom"))
|
|
<< "Destination-only path is present in copy source.";
|
|
EXPECT_EQ(MAY_ACCESS | MAY_READ, pdst.Lookup("/dev/urandom"))
|
|
<< "Destination-only path is absent.";
|
|
|
|
EXPECT_EQ(0, psrc.Lookup("/etc/passwd"))
|
|
<< "Non-added path is present in copy source.";
|
|
EXPECT_EQ(0, pdst.Lookup("/etc/passwd"))
|
|
<< "Non-added path is present in copy source.";
|
|
}
|
|
|
|
TEST(SandboxBrokerPolicyLookup, Recursive)
|
|
{
|
|
SandboxBroker::Policy psrc;
|
|
psrc.AddPath(MAY_READ | MAY_WRITE, "/dev/null", AddAlways);
|
|
psrc.AddPath(MAY_READ, "/dev/zero", AddAlways);
|
|
psrc.AddPath(MAY_READ, "/dev/urandom", AddAlways);
|
|
|
|
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup("/dev/null"))
|
|
<< "Basic path is present.";
|
|
EXPECT_EQ(MAY_ACCESS | MAY_READ, psrc.Lookup("/dev/zero"))
|
|
<< "Basic path has no extra flags";
|
|
|
|
psrc.AddTree(MAY_READ | MAY_WRITE, "/dev/");
|
|
|
|
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup("/dev/random"))
|
|
<< "Permission via recursive dir.";
|
|
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup("/dev/sd/0"))
|
|
<< "Permission via recursive dir, nested deeper";
|
|
EXPECT_EQ(0, psrc.Lookup("/dev/sd/0/")) << "Invalid path format.";
|
|
EXPECT_EQ(0, psrc.Lookup("/usr/dev/sd")) << "Match must be a prefix.";
|
|
|
|
psrc.AddTree(MAY_READ, "/dev/sd/");
|
|
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup("/dev/sd/0"))
|
|
<< "Extra permissions from parent path granted.";
|
|
EXPECT_EQ(0, psrc.Lookup("/dev/..")) << "Refuse attempted subdir escape.";
|
|
|
|
psrc.AddTree(MAY_READ, "/tmp");
|
|
EXPECT_EQ(MAY_ACCESS | MAY_READ, psrc.Lookup("/tmp/good/a"))
|
|
<< "Check whether dir add with no trailing / was sucessful.";
|
|
EXPECT_EQ(0, psrc.Lookup("/tmp_good_but_bad"))
|
|
<< "Enforce terminator on directories.";
|
|
EXPECT_EQ(0, psrc.Lookup("/tmp/."))
|
|
<< "Do not allow opening a directory handle.";
|
|
}
|
|
|
|
} // namespace mozilla
|