| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 /** | 5 /** |
| 6 * TestFixture for SUID Sandbox testing. | 6 * TestFixture for SUID Sandbox testing. |
| 7 * @extends {testing.Test} | 7 * @extends {testing.Test} |
| 8 * @constructor | 8 * @constructor |
| 9 */ | 9 */ |
| 10 function SandboxStatusUITest() {} | 10 function SandboxStatusUITest() {} |
| 11 | 11 |
| 12 SandboxStatusUITest.prototype = { | 12 SandboxStatusUITest.prototype = { |
| 13 __proto__: testing.Test.prototype, | 13 __proto__: testing.Test.prototype, |
| 14 /** | 14 /** |
| 15 * Browse to the options page & call our preLoad(). | 15 * Browse to the options page & call our preLoad(). |
| 16 */ | 16 */ |
| 17 browsePreload: 'chrome://sandbox', | 17 browsePreload: 'chrome://sandbox', |
| 18 | 18 |
| 19 }; | 19 }; |
| 20 | 20 |
| 21 // This test is for Linux only. | 21 // This test is for Linux only. |
| 22 // PLEASE READ: | 22 // PLEASE READ: |
| 23 // - If failures of this test are a problem on a bot under your care, | 23 // - If failures of this test are a problem on a bot under your care, |
| 24 // the proper way to address such failures is to install the SUID | 24 // the proper way to address such failures is to install the SUID |
| 25 // sandbox. See: | 25 // sandbox. See: |
| 26 // https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_s
andbox_development.md | 26 // https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_s
andbox_development.md |
| 27 // - PLEASE DO NOT GLOBALLY DISABLE THIS TEST. | 27 // - PLEASE DO NOT GLOBALLY DISABLE THIS TEST. |
| 28 GEN('#if defined(OS_LINUX)'); | 28 // SUID sandbox is currently incompatible with AddressSanitizer, |
| 29 // see http://crbug.com/137653. |
| 30 GEN('#if defined(OS_LINUX) && !defined(ADDRESS_SANITIZER)'); |
| 29 GEN('# define MAYBE_testSUIDorNamespaceSandboxEnabled \\'); | 31 GEN('# define MAYBE_testSUIDorNamespaceSandboxEnabled \\'); |
| 30 GEN(' testSUIDorNamespaceSandboxEnabled'); | 32 GEN(' testSUIDorNamespaceSandboxEnabled'); |
| 31 GEN('#else'); | 33 GEN('#else'); |
| 32 GEN('# define MAYBE_testSUIDorNamespaceSandboxEnabled \\'); | 34 GEN('# define MAYBE_testSUIDorNamespaceSandboxEnabled \\'); |
| 33 GEN(' DISABLED_testSUIDorNamespaceSandboxEnabled'); | 35 GEN(' DISABLED_testSUIDorNamespaceSandboxEnabled'); |
| 34 GEN('#endif'); | 36 GEN('#endif'); |
| 35 | 37 |
| 36 /** | 38 /** |
| 37 * Test if the SUID sandbox is enabled. | 39 * Test if the SUID sandbox is enabled. |
| 38 */ | 40 */ |
| (...skipping 18 matching lines...) Expand all Loading... |
| 57 expectEquals(namespaceyesstring, namespaceyes[0]); | 59 expectEquals(namespaceyesstring, namespaceyes[0]); |
| 58 } | 60 } |
| 59 | 61 |
| 60 if (suidyes !== null) { | 62 if (suidyes !== null) { |
| 61 expectEquals(null, suidno); | 63 expectEquals(null, suidno); |
| 62 expectEquals(suidyesstring, suidyes[0]); | 64 expectEquals(suidyesstring, suidyes[0]); |
| 63 } | 65 } |
| 64 }); | 66 }); |
| 65 | 67 |
| 66 // The seccomp-bpf sandbox is also not compatible with ASAN. | 68 // The seccomp-bpf sandbox is also not compatible with ASAN. |
| 67 GEN('#if !defined(OS_LINUX)'); | 69 GEN('#if !defined(OS_LINUX) || defined(ADDRESS_SANITIZER)'); |
| 68 GEN('# define MAYBE_testBPFSandboxEnabled \\'); | 70 GEN('# define MAYBE_testBPFSandboxEnabled \\'); |
| 69 GEN(' DISABLED_testBPFSandboxEnabled'); | 71 GEN(' DISABLED_testBPFSandboxEnabled'); |
| 70 GEN('#else'); | 72 GEN('#else'); |
| 71 GEN('# define MAYBE_testBPFSandboxEnabled \\'); | 73 GEN('# define MAYBE_testBPFSandboxEnabled \\'); |
| 72 GEN(' testBPFSandboxEnabled'); | 74 GEN(' testBPFSandboxEnabled'); |
| 73 GEN('#endif'); | 75 GEN('#endif'); |
| 74 | 76 |
| 75 /** | 77 /** |
| 76 * Test if the seccomp-bpf sandbox is enabled. | 78 * Test if the seccomp-bpf sandbox is enabled. |
| 77 */ | 79 */ |
| (...skipping 50 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 128 if (gpuyes || gpuno) { | 130 if (gpuyes || gpuno) { |
| 129 expectEquals(null, gpuno); | 131 expectEquals(null, gpuno); |
| 130 expectTrue(gpuyes && (gpuyes[0] == gpuyesstring)); | 132 expectTrue(gpuyes && (gpuyes[0] == gpuyesstring)); |
| 131 testDone(); | 133 testDone(); |
| 132 } | 134 } |
| 133 } | 135 } |
| 134 }) | 136 }) |
| 135 }); | 137 }); |
| 136 observer.observe(document.getElementById('basic-info'), {childList: true}); | 138 observer.observe(document.getElementById('basic-info'), {childList: true}); |
| 137 }); | 139 }); |
| OLD | NEW |