1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
* You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "gtest/gtest.h"
#include "broker/SandboxBroker.h"
namespace mozilla {
static const int MAY_ACCESS = SandboxBroker::MAY_ACCESS;
static const int MAY_READ = SandboxBroker::MAY_READ;
static const int MAY_WRITE = SandboxBroker::MAY_WRITE;
//static const int MAY_CREATE = SandboxBroker::MAY_CREATE;
//static const int RECURSIVE = SandboxBroker::RECURSIVE;
static const auto AddAlways = SandboxBroker::Policy::AddAlways;
TEST(SandboxBrokerPolicyLookup, Simple)
{
SandboxBroker::Policy p;
p.AddPath(MAY_READ, "/dev/urandom", AddAlways);
EXPECT_NE(0, p.Lookup("/dev/urandom")) << "Added path not found.";
EXPECT_EQ(MAY_ACCESS | MAY_READ, p.Lookup("/dev/urandom"))
<< "Added path found with wrong perms.";
EXPECT_EQ(0, p.Lookup("/etc/passwd")) << "Non-added path was found.";
}
TEST(SandboxBrokerPolicyLookup, CopyCtor)
{
SandboxBroker::Policy psrc;
psrc.AddPath(MAY_READ | MAY_WRITE, "/dev/null", AddAlways);
SandboxBroker::Policy pdst(psrc);
psrc.AddPath(MAY_READ, "/dev/zero", AddAlways);
pdst.AddPath(MAY_READ, "/dev/urandom", AddAlways);
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup("/dev/null"))
<< "Common path absent in copy source.";
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, pdst.Lookup("/dev/null"))
<< "Common path absent in copy destination.";
EXPECT_EQ(MAY_ACCESS | MAY_READ, psrc.Lookup("/dev/zero"))
<< "Source-only path is absent.";
EXPECT_EQ(0, pdst.Lookup("/dev/zero"))
<< "Source-only path is present in copy destination.";
EXPECT_EQ(0, psrc.Lookup("/dev/urandom"))
<< "Destination-only path is present in copy source.";
EXPECT_EQ(MAY_ACCESS | MAY_READ, pdst.Lookup("/dev/urandom"))
<< "Destination-only path is absent.";
EXPECT_EQ(0, psrc.Lookup("/etc/passwd"))
<< "Non-added path is present in copy source.";
EXPECT_EQ(0, pdst.Lookup("/etc/passwd"))
<< "Non-added path is present in copy source.";
}
TEST(SandboxBrokerPolicyLookup, Recursive)
{
SandboxBroker::Policy psrc;
psrc.AddPath(MAY_READ | MAY_WRITE, "/dev/null", AddAlways);
psrc.AddPath(MAY_READ, "/dev/zero", AddAlways);
psrc.AddPath(MAY_READ, "/dev/urandom", AddAlways);
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup("/dev/null"))
<< "Basic path is present.";
EXPECT_EQ(MAY_ACCESS | MAY_READ, psrc.Lookup("/dev/zero"))
<< "Basic path has no extra flags";
psrc.AddDir(MAY_READ | MAY_WRITE, "/dev/");
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup("/dev/random"))
<< "Permission via recursive dir.";
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup("/dev/sd/0"))
<< "Permission via recursive dir, nested deeper";
EXPECT_EQ(0, psrc.Lookup("/dev/sd/0/"))
<< "Invalid path format.";
EXPECT_EQ(0, psrc.Lookup("/usr/dev/sd"))
<< "Match must be a prefix.";
psrc.AddDir(MAY_READ, "/dev/sd/");
EXPECT_EQ(MAY_ACCESS | MAY_READ | MAY_WRITE, psrc.Lookup("/dev/sd/0"))
<< "Extra permissions from parent path granted.";
EXPECT_EQ(0, psrc.Lookup("/dev/.."))
<< "Refuse attempted subdir escape.";
psrc.AddDir(MAY_READ, "/tmp");
EXPECT_EQ(MAY_ACCESS | MAY_READ, psrc.Lookup("/tmp/good/a"))
<< "Check whether dir add with no trailing / was sucessful.";
EXPECT_EQ(0, psrc.Lookup("/tmp_good_but_bad"))
<< "Enforce terminator on directories.";
EXPECT_EQ(0, psrc.Lookup("/tmp/."))
<< "Do not allow opening a directory handle.";
}
} // namespace mozilla
|