| OLD | NEW |
| 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #import <Cocoa/Cocoa.h> | 5 #import <Cocoa/Cocoa.h> |
| 6 #include <dirent.h> | 6 #include <dirent.h> |
| 7 | 7 |
| 8 extern "C" { | 8 extern "C" { |
| 9 #include <sandbox.h> | 9 #include <sandbox.h> |
| 10 } | 10 } |
| 11 | 11 |
| 12 #include "base/file_util.h" | 12 #include "base/file_util.h" |
| 13 #include "base/file_path.h" | 13 #include "base/file_path.h" |
| 14 #include "base/hash_tables.h" | |
| 15 #include "base/test/multiprocess_test.h" | 14 #include "base/test/multiprocess_test.h" |
| 16 #include "base/sys_string_conversions.h" | 15 #include "base/sys_string_conversions.h" |
| 17 #include "base/utf_string_conversions.h" | 16 #include "base/utf_string_conversions.h" |
| 18 #include "chrome/common/sandbox_mac.h" | 17 #include "chrome/common/sandbox_mac.h" |
| 19 #include "testing/gtest/include/gtest/gtest.h" | 18 #include "testing/gtest/include/gtest/gtest.h" |
| 20 #include "testing/multiprocess_func_list.h" | 19 #include "testing/multiprocess_func_list.h" |
| 21 | 20 |
| 22 // Tests to exercise directory-access-related restrictions of Mac sandbox. | |
| 23 | |
| 24 namespace sandbox { | |
| 25 | |
| 26 typedef base::hash_map<std::string, SandboxSubstring> | |
| 27 SandboxVariableSubstitions; | |
| 28 | |
| 29 bool QuotePlainString(const std::string& str_utf8, std::string* dst); | |
| 30 bool QuoteStringForRegex(const std::string& str_utf8, std::string* dst); | |
| 31 NSString* BuildAllowDirectoryAccessSandboxString( | |
| 32 const FilePath& allowed_dir, | |
| 33 SandboxVariableSubstitions* substitutions); | |
| 34 bool PostProcessSandboxProfile(NSString* in_sandbox_data, | |
| 35 NSArray* comments_to_remove, | |
| 36 SandboxVariableSubstitions& substitutions, | |
| 37 std::string *final_sandbox_profile_str); | |
| 38 | |
| 39 } // namespace sandbox | |
| 40 | |
| 41 namespace { | 21 namespace { |
| 42 | 22 |
| 43 static const char* kSandboxAccessPathKey = "sandbox_dir"; | 23 static const char* kSandboxAccessPathKey = "sandbox_dir"; |
| 44 static const char* kDeniedSuffix = "_denied"; | 24 static const char* kDeniedSuffix = "_denied"; |
| 45 | 25 |
| 26 } // namespace |
| 27 |
| 28 // Tests need to be in the same namespace as the sandbox::Sandbox class to be |
| 29 // useable with FRIEND_TEST() declaration. |
| 30 namespace sandbox { |
| 31 |
| 46 class MacDirAccessSandboxTest : public base::MultiProcessTest { | 32 class MacDirAccessSandboxTest : public base::MultiProcessTest { |
| 47 public: | 33 public: |
| 48 bool CheckSandbox(const std::string& directory_to_try) { | 34 bool CheckSandbox(const std::string& directory_to_try) { |
| 49 setenv(kSandboxAccessPathKey, directory_to_try.c_str(), 1); | 35 setenv(kSandboxAccessPathKey, directory_to_try.c_str(), 1); |
| 50 base::ProcessHandle child_process = SpawnChild("mac_sandbox_path_access", | 36 base::ProcessHandle child_process = SpawnChild("mac_sandbox_path_access", |
| 51 false); | 37 false); |
| 52 int code = -1; | 38 int code = -1; |
| 53 if (!base::WaitForExitCode(child_process, &code)) { | 39 if (!base::WaitForExitCode(child_process, &code)) { |
| 54 LOG(WARNING) << "base::WaitForExitCode failed"; | 40 LOG(WARNING) << "base::WaitForExitCode failed"; |
| 55 return false; | 41 return false; |
| 56 } | 42 } |
| 57 return code == 0; | 43 return code == 0; |
| 58 } | 44 } |
| 59 }; | 45 }; |
| 60 | 46 |
| 61 TEST_F(MacDirAccessSandboxTest, StringEscape) { | 47 TEST_F(MacDirAccessSandboxTest, StringEscape) { |
| 62 using sandbox::QuotePlainString; | |
| 63 | |
| 64 const struct string_escape_test_data { | 48 const struct string_escape_test_data { |
| 65 const char* to_escape; | 49 const char* to_escape; |
| 66 const char* escaped; | 50 const char* escaped; |
| 67 } string_escape_cases[] = { | 51 } string_escape_cases[] = { |
| 68 {"", ""}, | 52 {"", ""}, |
| 69 {"\b\f\n\r\t\\\"", "\\b\\f\\n\\r\\t\\\\\\\""}, | 53 {"\b\f\n\r\t\\\"", "\\b\\f\\n\\r\\t\\\\\\\""}, |
| 70 {"/'", "/'"}, | 54 {"/'", "/'"}, |
| 71 {"sandwich", "sandwich"}, | 55 {"sandwich", "sandwich"}, |
| 72 {"(sandwich)", "(sandwich)"}, | 56 {"(sandwich)", "(sandwich)"}, |
| 73 {"^\u2135.\u2136$", "^\\u2135.\\u2136$"}, | 57 {"^\u2135.\u2136$", "^\\u2135.\\u2136$"}, |
| 74 }; | 58 }; |
| 75 | 59 |
| 76 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(string_escape_cases); ++i) { | 60 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(string_escape_cases); ++i) { |
| 77 std::string out; | 61 std::string out; |
| 78 std::string in(string_escape_cases[i].to_escape); | 62 std::string in(string_escape_cases[i].to_escape); |
| 79 EXPECT_TRUE(QuotePlainString(in, &out)); | 63 EXPECT_TRUE(Sandbox::QuotePlainString(in, &out)); |
| 80 EXPECT_EQ(string_escape_cases[i].escaped, out); | 64 EXPECT_EQ(string_escape_cases[i].escaped, out); |
| 81 } | 65 } |
| 82 } | 66 } |
| 83 | 67 |
| 84 TEST_F(MacDirAccessSandboxTest, RegexEscape) { | 68 TEST_F(MacDirAccessSandboxTest, RegexEscape) { |
| 85 using sandbox::QuoteStringForRegex; | |
| 86 | |
| 87 const std::string kSandboxEscapeSuffix("(/|$)"); | 69 const std::string kSandboxEscapeSuffix("(/|$)"); |
| 88 const struct regex_test_data { | 70 const struct regex_test_data { |
| 89 const wchar_t *to_escape; | 71 const wchar_t *to_escape; |
| 90 const char* escaped; | 72 const char* escaped; |
| 91 } regex_cases[] = { | 73 } regex_cases[] = { |
| 92 {L"", ""}, | 74 {L"", ""}, |
| 93 {L"/'", "/'"}, // / & ' characters don't need escaping. | 75 {L"/'", "/'"}, // / & ' characters don't need escaping. |
| 94 {L"sandwich", "sandwich"}, | 76 {L"sandwich", "sandwich"}, |
| 95 {L"(sandwich)", "\\(sandwich\\)"}, | 77 {L"(sandwich)", "\\(sandwich\\)"}, |
| 96 }; | 78 }; |
| 97 | 79 |
| 98 // Check that all characters whose values are smaller than 32 [1F] are | 80 // Check that all characters whose values are smaller than 32 [1F] are |
| 99 // rejected by the regex escaping code. | 81 // rejected by the regex escaping code. |
| 100 { | 82 { |
| 101 std::string out; | 83 std::string out; |
| 102 char fail_string[] = {31, 0}; | 84 char fail_string[] = {31, 0}; |
| 103 char ok_string[] = {32, 0}; | 85 char ok_string[] = {32, 0}; |
| 104 EXPECT_FALSE(QuoteStringForRegex(fail_string, &out)); | 86 EXPECT_FALSE(Sandbox::QuoteStringForRegex(fail_string, &out)); |
| 105 EXPECT_TRUE(QuoteStringForRegex(ok_string, &out)); | 87 EXPECT_TRUE(Sandbox::QuoteStringForRegex(ok_string, &out)); |
| 106 } | 88 } |
| 107 | 89 |
| 108 // Check that all characters whose values are larger than 126 [7E] are | 90 // Check that all characters whose values are larger than 126 [7E] are |
| 109 // rejected by the regex escaping code. | 91 // rejected by the regex escaping code. |
| 110 { | 92 { |
| 111 std::string out; | 93 std::string out; |
| 112 EXPECT_TRUE(QuoteStringForRegex("}", &out)); // } == 0x7D == 125 | 94 EXPECT_TRUE(Sandbox::QuoteStringForRegex("}", &out)); // } == 0x7D == 125 |
| 113 EXPECT_FALSE(QuoteStringForRegex("~", &out)); // ~ == 0x7E == 126 | 95 EXPECT_FALSE(Sandbox::QuoteStringForRegex("~", &out)); // ~ == 0x7E == 126 |
| 114 EXPECT_FALSE(QuoteStringForRegex(WideToUTF8(L"^\u2135.\u2136$"), &out)); | 96 EXPECT_FALSE( |
| 97 Sandbox::QuoteStringForRegex(WideToUTF8(L"^\u2135.\u2136$"), &out)); |
| 115 } | 98 } |
| 116 | 99 |
| 117 { | 100 { |
| 118 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(regex_cases); ++i) { | 101 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(regex_cases); ++i) { |
| 119 std::string out; | 102 std::string out; |
| 120 std::string in = WideToUTF8(regex_cases[i].to_escape); | 103 std::string in = WideToUTF8(regex_cases[i].to_escape); |
| 121 EXPECT_TRUE(QuoteStringForRegex(in, &out)); | 104 EXPECT_TRUE(Sandbox::QuoteStringForRegex(in, &out)); |
| 122 std::string expected("^"); | 105 std::string expected("^"); |
| 123 expected.append(regex_cases[i].escaped); | 106 expected.append(regex_cases[i].escaped); |
| 124 expected.append(kSandboxEscapeSuffix); | 107 expected.append(kSandboxEscapeSuffix); |
| 125 EXPECT_EQ(expected, out); | 108 EXPECT_EQ(expected, out); |
| 126 } | 109 } |
| 127 } | 110 } |
| 128 | 111 |
| 129 { | 112 { |
| 130 std::string in_utf8("\\^.$|()[]*+?{}"); | 113 std::string in_utf8("\\^.$|()[]*+?{}"); |
| 131 std::string expected; | 114 std::string expected; |
| 132 expected.push_back('^'); | 115 expected.push_back('^'); |
| 133 for (size_t i = 0; i < in_utf8.length(); ++i) { | 116 for (size_t i = 0; i < in_utf8.length(); ++i) { |
| 134 expected.push_back('\\'); | 117 expected.push_back('\\'); |
| 135 expected.push_back(in_utf8[i]); | 118 expected.push_back(in_utf8[i]); |
| 136 } | 119 } |
| 137 expected.append(kSandboxEscapeSuffix); | 120 expected.append(kSandboxEscapeSuffix); |
| 138 | 121 |
| 139 std::string out; | 122 std::string out; |
| 140 EXPECT_TRUE(QuoteStringForRegex(in_utf8, &out)); | 123 EXPECT_TRUE(Sandbox::QuoteStringForRegex(in_utf8, &out)); |
| 141 EXPECT_EQ(expected, out); | 124 EXPECT_EQ(expected, out); |
| 142 | 125 |
| 143 } | 126 } |
| 144 } | 127 } |
| 145 | 128 |
| 146 // A class to handle auto-deleting a directory. | 129 // A class to handle auto-deleting a directory. |
| 147 class ScopedDirectoryDelete { | 130 class ScopedDirectoryDelete { |
| 148 public: | 131 public: |
| 149 inline void operator()(FilePath* x) const { | 132 inline void operator()(FilePath* x) const { |
| 150 if (x) { | 133 if (x) { |
| 151 file_util::Delete(*x, true); | 134 file_util::Delete(*x, true); |
| 152 } | 135 } |
| 153 } | 136 } |
| 154 }; | 137 }; |
| 155 | 138 |
| 156 typedef scoped_ptr_malloc<FilePath, ScopedDirectoryDelete> ScopedDirectory; | 139 typedef scoped_ptr_malloc<FilePath, ScopedDirectoryDelete> ScopedDirectory; |
| 157 | 140 |
| 158 TEST_F(MacDirAccessSandboxTest, SandboxAccess) { | 141 TEST_F(MacDirAccessSandboxTest, SandboxAccess) { |
| 159 using file_util::CreateDirectory; | 142 using file_util::CreateDirectory; |
| 160 | 143 |
| 161 FilePath tmp_dir; | 144 FilePath tmp_dir; |
| 162 ASSERT_TRUE(file_util::CreateNewTempDirectory("", &tmp_dir)); | 145 ASSERT_TRUE(file_util::CreateNewTempDirectory("", &tmp_dir)); |
| 163 // This step is important on OS X since the sandbox only understands "real" | 146 // This step is important on OS X since the sandbox only understands "real" |
| 164 // paths and the paths CreateNewTempDirectory() returns are empirically in | 147 // paths and the paths CreateNewTempDirectory() returns are empirically in |
| 165 // /var which is a symlink to /private/var . | 148 // /var which is a symlink to /private/var . |
| 166 sandbox::GetCanonicalSandboxPath(&tmp_dir); | 149 Sandbox::GetCanonicalSandboxPath(&tmp_dir); |
| 167 ScopedDirectory cleanup(&tmp_dir); | 150 ScopedDirectory cleanup(&tmp_dir); |
| 168 | 151 |
| 169 const char* sandbox_dir_cases[] = { | 152 const char* sandbox_dir_cases[] = { |
| 170 "simple_dir_name", | 153 "simple_dir_name", |
| 171 "^hello++ $", // Regex. | 154 "^hello++ $", // Regex. |
| 172 "\\^.$|()[]*+?{}", // All regex characters. | 155 "\\^.$|()[]*+?{}", // All regex characters. |
| 173 }; | 156 }; |
| 174 | 157 |
| 175 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(sandbox_dir_cases); ++i) { | 158 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(sandbox_dir_cases); ++i) { |
| 176 const char* sandbox_dir_name = sandbox_dir_cases[i]; | 159 const char* sandbox_dir_name = sandbox_dir_cases[i]; |
| (...skipping 21 matching lines...) Expand all Loading... |
| 198 | 181 |
| 199 // Build up a sandbox profile that only allows access to a single directory. | 182 // Build up a sandbox profile that only allows access to a single directory. |
| 200 NSString *sandbox_profile = | 183 NSString *sandbox_profile = |
| 201 @"(version 1)" \ | 184 @"(version 1)" \ |
| 202 "(deny default)" \ | 185 "(deny default)" \ |
| 203 "(allow signal (target self))" \ | 186 "(allow signal (target self))" \ |
| 204 "(allow sysctl-read)" \ | 187 "(allow sysctl-read)" \ |
| 205 ";ENABLE_DIRECTORY_ACCESS"; | 188 ";ENABLE_DIRECTORY_ACCESS"; |
| 206 | 189 |
| 207 std::string allowed_dir(sandbox_allowed_dir); | 190 std::string allowed_dir(sandbox_allowed_dir); |
| 208 sandbox::SandboxVariableSubstitions substitutions; | 191 Sandbox::SandboxVariableSubstitions substitutions; |
| 209 NSString* allow_dir_sandbox_code = | 192 NSString* allow_dir_sandbox_code = |
| 210 sandbox::BuildAllowDirectoryAccessSandboxString( | 193 Sandbox::BuildAllowDirectoryAccessSandboxString( |
| 211 FilePath(sandbox_allowed_dir), | 194 FilePath(sandbox_allowed_dir), |
| 212 &substitutions); | 195 &substitutions); |
| 213 sandbox_profile = [sandbox_profile | 196 sandbox_profile = [sandbox_profile |
| 214 stringByReplacingOccurrencesOfString:@";ENABLE_DIRECTORY_ACCESS" | 197 stringByReplacingOccurrencesOfString:@";ENABLE_DIRECTORY_ACCESS" |
| 215 withString:allow_dir_sandbox_code]; | 198 withString:allow_dir_sandbox_code]; |
| 216 | 199 |
| 217 std::string final_sandbox_profile_str; | 200 std::string final_sandbox_profile_str; |
| 218 if (!PostProcessSandboxProfile(sandbox_profile, | 201 if (!Sandbox::PostProcessSandboxProfile(sandbox_profile, |
| 219 [NSArray array], | 202 [NSArray array], |
| 220 substitutions, | 203 substitutions, |
| 221 &final_sandbox_profile_str)) { | 204 &final_sandbox_profile_str)) { |
| 222 LOG(ERROR) << "Call to PostProcessSandboxProfile() failed"; | 205 LOG(ERROR) << "Call to PostProcessSandboxProfile() failed"; |
| 223 return -1; | 206 return -1; |
| 224 } | 207 } |
| 225 | 208 |
| 226 | |
| 227 // Enable Sandbox. | 209 // Enable Sandbox. |
| 228 char* error_buff = NULL; | 210 char* error_buff = NULL; |
| 229 int error = sandbox_init(final_sandbox_profile_str.c_str(), 0, &error_buff); | 211 int error = sandbox_init(final_sandbox_profile_str.c_str(), 0, &error_buff); |
| 230 if (error == -1) { | 212 if (error == -1) { |
| 231 LOG(ERROR) << "Failed to Initialize Sandbox: " << error_buff; | 213 LOG(ERROR) << "Failed to Initialize Sandbox: " << error_buff; |
| 232 return -1; | 214 return -1; |
| 233 } | 215 } |
| 234 sandbox_free_error(error_buff); | 216 sandbox_free_error(error_buff); |
| 235 | 217 |
| 236 // Test Sandbox. | 218 // Test Sandbox. |
| (...skipping 75 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 312 if (open(denied_file2.value().c_str(), O_WRONLY | O_CREAT) > 0) { | 294 if (open(denied_file2.value().c_str(), O_WRONLY | O_CREAT) > 0) { |
| 313 PLOG(ERROR) << "Sandbox breach: was able to write (" | 295 PLOG(ERROR) << "Sandbox breach: was able to write (" |
| 314 << denied_file2.value() | 296 << denied_file2.value() |
| 315 << ")"; | 297 << ")"; |
| 316 return -1; | 298 return -1; |
| 317 } | 299 } |
| 318 | 300 |
| 319 return 0; | 301 return 0; |
| 320 } | 302 } |
| 321 | 303 |
| 322 } // namespace | 304 } // namespace sandbox |
| OLD | NEW |