Index: chrome/installer/util/scoped_token_privilege_unittest.cc |
diff --git a/chrome/installer/util/scoped_token_privilege_unittest.cc b/chrome/installer/util/scoped_token_privilege_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..cbd75388940f0666a30588bb38dff54a4eb975ca |
--- /dev/null |
+++ b/chrome/installer/util/scoped_token_privilege_unittest.cc |
@@ -0,0 +1,111 @@ |
+// Copyright 2017 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chrome/installer/util/scoped_token_privilege.h" |
+ |
+#include <shlobj.h> |
+#include <memory> |
+ |
+#include "testing/gtest/include/gtest/gtest.h" |
+ |
+namespace installer { |
+namespace { |
+ |
+// The privilege tested in ScopeTokenPrivilege tests below. |
+// Use SE_RESTORE_NAME as it is one of the many privileges that is available, |
+// but not enabled by default on processes running at high integrity. |
+constexpr wchar_t kTestedPrivilege[] = SE_RESTORE_NAME; |
+ |
+// Returns true if the current process' token has privilege |privilege_name| |
+// enabled. |
+bool CurrentProcessHasPrivilege(const wchar_t* privilege_name) { |
+ HANDLE temp_handle; |
+ if (!::OpenProcessToken(::GetCurrentProcess(), TOKEN_QUERY, &temp_handle)) { |
+ ADD_FAILURE(); |
+ return false; |
+ } |
+ |
+ base::win::ScopedHandle token(temp_handle); |
+ |
+ // First get the size of the buffer needed for |privileges| below. |
+ DWORD size; |
+ EXPECT_FALSE( |
+ ::GetTokenInformation(token.Get(), TokenPrivileges, NULL, 0, &size)); |
+ |
+ std::unique_ptr<BYTE[]> privileges_bytes(new BYTE[size]); |
+ TOKEN_PRIVILEGES* privileges = |
+ reinterpret_cast<TOKEN_PRIVILEGES*>(privileges_bytes.get()); |
+ |
+ if (!::GetTokenInformation(token.Get(), TokenPrivileges, privileges, size, |
+ &size)) { |
+ ADD_FAILURE(); |
+ return false; |
+ } |
+ |
+ // There is no point getting a buffer to store more than |privilege_name|\0 as |
+ // anything longer will obviously not be equal to |privilege_name|. |
+ const DWORD desired_size = static_cast<DWORD>(wcslen(privilege_name)); |
+ const DWORD buffer_size = desired_size + 1; |
+ std::unique_ptr<wchar_t[]> name_buffer(new wchar_t[buffer_size]); |
+ for (int i = privileges->PrivilegeCount - 1; i >= 0; --i) { |
+ LUID_AND_ATTRIBUTES& luid_and_att = privileges->Privileges[i]; |
+ DWORD size = buffer_size; |
+ ::LookupPrivilegeName(NULL, &luid_and_att.Luid, name_buffer.get(), &size); |
+ if (size == desired_size && |
+ wcscmp(name_buffer.get(), privilege_name) == 0) { |
+ return luid_and_att.Attributes == SE_PRIVILEGE_ENABLED; |
+ } |
+ } |
+ return false; |
+} |
+ |
+} // namespace |
+ |
+// Note: This test is only valid when run at high integrity (i.e. it will fail |
+// at medium integrity). |
+TEST(ScopedTokenPrivilegeTest, Basic) { |
+ ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
+ |
+ if (!::IsUserAnAdmin()) { |
+ LOG(WARNING) << "Skipping SetupUtilTest.ScopedTokenPrivilegeBasic due to " |
+ "not running as admin."; |
+ return; |
+ } |
+ |
+ { |
+ ScopedTokenPrivilege test_scoped_privilege(kTestedPrivilege); |
+ ASSERT_TRUE(test_scoped_privilege.is_enabled()); |
+ ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
+ } |
+ |
+ ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
+} |
+ |
+// Note: This test is only valid when run at high integrity (i.e. it will fail |
+// at medium integrity). |
+TEST(ScopedTokenPrivilegeTest, AlreadyEnabled) { |
+ ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
+ |
+ if (!::IsUserAnAdmin()) { |
+ LOG(WARNING) << "Skipping SetupUtilTest.ScopedTokenPrivilegeAlreadyEnabled " |
+ "due to not running as admin."; |
+ return; |
+ } |
+ |
+ { |
+ ScopedTokenPrivilege test_scoped_privilege(kTestedPrivilege); |
+ ASSERT_TRUE(test_scoped_privilege.is_enabled()); |
+ ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
+ { |
+ ScopedTokenPrivilege dup_scoped_privilege(kTestedPrivilege); |
+ ASSERT_TRUE(dup_scoped_privilege.is_enabled()); |
+ ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
+ } |
+ ASSERT_TRUE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
+ } |
+ |
+ ASSERT_FALSE(CurrentProcessHasPrivilege(kTestedPrivilege)); |
+} |
+ |
+} // namespace installer |