/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
* You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "gtest/gtest.h"
#include "broker/SandboxBroker.h"
namespace mozilla {
static const int MAY_ACCESS = SandboxBroker::MAY_ACCESS;
static const int MAY_READ = SandboxBroker::MAY_READ;
static const int MAY_WRITE = SandboxBroker::MAY_WRITE;
// static const int MAY_CREATE = SandboxBroker::MAY_CREATE;
// static const int RECURSIVE = SandboxBroker::RECURSIVE;
static const auto AddAlways = SandboxBroker::Policy::AddAlways;
TEST(SandboxBrokerPolicyLookup, Simple)
{
SandboxBroker::Policy p;
p.AddPath(MAY_READ,
"/dev/urandom", AddAlways);
EXPECT_NE(0, p.Lookup(
"/dev/urandom")) <<
"Added path not found.";
EXPECT_EQ(MAY_ACCESS | MAY_READ, p.Lookup(
"/dev/urandom"))
<<
"Added path found with wrong perms.";
EXPECT_EQ(0, p.Lookup(
"/etc/passwd")) <<
"Non-added path was found.";
}
TEST(SandboxBrokerPolicyLookup, CopyCtor)
{
SandboxBroker::Policy psrc;
psrc.AddPath(MAY_READ | MAY_WRITE,
"/dev/null", AddAlways);
SandboxBroker::Policy pdst(psrc);
psrc.AddPath(MAY_READ,
"/dev/zero", AddAlways);
pdst.AddPath(MAY_READ,
"/dev/urandom", AddAlways);
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup(
"/dev/null"))
<<
"Common path absent in copy source.";
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, pdst.Lookup(
"/dev/null"))
<<
"Common path absent in copy destination.";
EXPECT_EQ(MAY_ACCESS | MAY_READ, psrc.Lookup(
"/dev/zero"))
<<
"Source-only path is absent.";
EXPECT_EQ(0, pdst.Lookup(
"/dev/zero"))
<<
"Source-only path is present in copy destination.";
EXPECT_EQ(0, psrc.Lookup(
"/dev/urandom"))
<<
"Destination-only path is present in copy source.";
EXPECT_EQ(MAY_ACCESS | MAY_READ, pdst.Lookup(
"/dev/urandom"))
<<
"Destination-only path is absent.";
EXPECT_EQ(0, psrc.Lookup(
"/etc/passwd"))
<<
"Non-added path is present in copy source.";
EXPECT_EQ(0, pdst.Lookup(
"/etc/passwd"))
<<
"Non-added path is present in copy source.";
}
TEST(SandboxBrokerPolicyLookup, Recursive)
{
SandboxBroker::Policy psrc;
psrc.AddPath(MAY_READ | MAY_WRITE,
"/dev/null", AddAlways);
psrc.AddPath(MAY_READ,
"/dev/zero", AddAlways);
psrc.AddPath(MAY_READ,
"/dev/urandom", AddAlways);
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup(
"/dev/null"))
<<
"Basic path is present.";
EXPECT_EQ(MAY_ACCESS | MAY_READ, psrc.Lookup(
"/dev/zero"))
<<
"Basic path has no extra flags";
psrc.AddTree(MAY_READ | MAY_WRITE,
"/dev/");
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup(
"/dev/random"))
<<
"Permission via recursive dir.";
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup(
"/dev/sd/0"))
<<
"Permission via recursive dir, nested deeper";
EXPECT_EQ(0, psrc.Lookup(
"/dev/sd/0/")) <<
"Invalid path format.";
EXPECT_EQ(0, psrc.Lookup(
"/usr/dev/sd")) <<
"Match must be a prefix.";
psrc.AddTree(MAY_READ,
"/dev/sd/");
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup(
"/dev/sd/0"))
<<
"Extra permissions from parent path granted.";
EXPECT_EQ(0, psrc.Lookup(
"/dev/..")) <<
"Refuse attempted subdir escape.";
psrc.AddTree(MAY_READ,
"/tmp");
EXPECT_EQ(MAY_ACCESS | MAY_READ, psrc.Lookup(
"/tmp/good/a"))
<<
"Check whether dir add with no trailing / was sucessful.";
EXPECT_EQ(0, psrc.Lookup(
"/tmp_good_but_bad"))
<<
"Enforce terminator on directories.";
EXPECT_EQ(0, psrc.Lookup(
"/tmp/."))
<<
"Do not allow opening a directory handle.";
}
}
// namespace mozilla