Index: sandbox/win/src/handle_policy_test.cc |
diff --git a/sandbox/win/src/handle_policy_test.cc b/sandbox/win/src/handle_policy_test.cc |
deleted file mode 100644 |
index 11382da811f7e2fec1b3223148b6755f4a63e870..0000000000000000000000000000000000000000 |
--- a/sandbox/win/src/handle_policy_test.cc |
+++ /dev/null |
@@ -1,114 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "base/strings/stringprintf.h" |
-#include "sandbox/win/src/handle_policy.h" |
-#include "sandbox/win/src/nt_internals.h" |
-#include "sandbox/win/src/sandbox.h" |
-#include "sandbox/win/src/sandbox_factory.h" |
-#include "sandbox/win/src/sandbox_policy.h" |
-#include "sandbox/win/src/win_utils.h" |
-#include "sandbox/win/tests/common/controller.h" |
-#include "testing/gtest/include/gtest/gtest.h" |
- |
-namespace sandbox { |
- |
-// Just waits for the supplied number of milliseconds. |
-SBOX_TESTS_COMMAND int Handle_WaitProcess(int argc, wchar_t **argv) { |
- if (argc != 1) |
- return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; |
- |
- ::Sleep(::wcstoul(argv[0], NULL, 10)); |
- return SBOX_TEST_TIMED_OUT; |
-} |
- |
-// Attempts to duplicate an event handle into the target process. |
-SBOX_TESTS_COMMAND int Handle_DuplicateEvent(int argc, wchar_t **argv) { |
- if (argc != 1) |
- return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; |
- |
- // Create a test event to use as a handle. |
- base::win::ScopedHandle test_event; |
- test_event.Set(::CreateEvent(NULL, TRUE, TRUE, NULL)); |
- if (!test_event.IsValid()) |
- return SBOX_TEST_FIRST_ERROR; |
- |
- // Get the target process ID. |
- DWORD target_process_id = ::wcstoul(argv[0], NULL, 10); |
- |
- HANDLE handle = NULL; |
- ResultCode result = SandboxFactory::GetTargetServices()->DuplicateHandle( |
- test_event.Get(), target_process_id, &handle, 0, DUPLICATE_SAME_ACCESS); |
- |
- return (result == SBOX_ALL_OK) ? SBOX_TEST_SUCCEEDED : SBOX_TEST_DENIED; |
-} |
- |
-// Tests that duplicating an object works only when the policy allows it. |
-TEST(HandlePolicyTest, DuplicateHandle) { |
- TestRunner target; |
- TestRunner runner; |
- |
- // Kick off an asynchronous target process for testing. |
- target.SetAsynchronous(true); |
- EXPECT_EQ(SBOX_TEST_SUCCEEDED, target.RunTest(L"Handle_WaitProcess 30000")); |
- |
- // First test that we fail to open the event. |
- base::string16 cmd_line = base::StringPrintf(L"Handle_DuplicateEvent %d", |
- target.process_id()); |
- EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(cmd_line.c_str())); |
- |
- // Now successfully open the event after adding a duplicate handle rule. |
- EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, |
- TargetPolicy::HANDLES_DUP_ANY, |
- L"Event")); |
- EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(cmd_line.c_str())); |
-} |
- |
-// Tests that duplicating an object works only when the policy allows it. |
-TEST(HandlePolicyTest, DuplicatePeerHandle) { |
- TestRunner target; |
- TestRunner runner; |
- |
- // Kick off an asynchronous target process for testing. |
- target.SetAsynchronous(true); |
- target.SetUnsandboxed(true); |
- EXPECT_EQ(SBOX_TEST_SUCCEEDED, target.RunTest(L"Handle_WaitProcess 30000")); |
- |
- // First test that we fail to open the event. |
- base::string16 cmd_line = base::StringPrintf(L"Handle_DuplicateEvent %d", |
- target.process_id()); |
- EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(cmd_line.c_str())); |
- |
- // Now successfully open the event after adding a duplicate handle rule. |
- EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, |
- TargetPolicy::HANDLES_DUP_ANY, |
- L"Event")); |
- EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(cmd_line.c_str())); |
-} |
- |
-// Tests that duplicating an object works only when the policy allows it. |
-TEST(HandlePolicyTest, DuplicateBrokerHandle) { |
- TestRunner runner; |
- |
- // First test that we fail to open the event. |
- base::string16 cmd_line = base::StringPrintf(L"Handle_DuplicateEvent %d", |
- ::GetCurrentProcessId()); |
- EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(cmd_line.c_str())); |
- |
- // Add the peer rule and make sure we fail again. |
- EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, |
- TargetPolicy::HANDLES_DUP_ANY, |
- L"Event")); |
- EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(cmd_line.c_str())); |
- |
- |
- // Now successfully open the event after adding a broker handle rule. |
- EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES, |
- TargetPolicy::HANDLES_DUP_BROKER, |
- L"Event")); |
- EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(cmd_line.c_str())); |
-} |
- |
-} // namespace sandbox |
- |