| Index: sandbox/linux/suid/client/setuid_sandbox_host_unittest.cc
|
| diff --git a/sandbox/linux/suid/client/setuid_sandbox_client_unittest.cc b/sandbox/linux/suid/client/setuid_sandbox_host_unittest.cc
|
| similarity index 52%
|
| copy from sandbox/linux/suid/client/setuid_sandbox_client_unittest.cc
|
| copy to sandbox/linux/suid/client/setuid_sandbox_host_unittest.cc
|
| index d4f7dfef32508518a99f1c22d258f59da80c4558..8415abb0643e82c7d409382f8194053f13b09630 100644
|
| --- a/sandbox/linux/suid/client/setuid_sandbox_client_unittest.cc
|
| +++ b/sandbox/linux/suid/client/setuid_sandbox_host_unittest.cc
|
| @@ -1,18 +1,21 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| +// Copyright 2015 The Chromium Authors. All rights reserved.
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| +#include "sandbox/linux/suid/client/setuid_sandbox_host.h"
|
| +
|
| +#include <string>
|
| +
|
| #include "base/environment.h"
|
| #include "base/logging.h"
|
| #include "base/memory/scoped_ptr.h"
|
| #include "base/strings/string_number_conversions.h"
|
| -#include "sandbox/linux/suid/client/setuid_sandbox_client.h"
|
| #include "sandbox/linux/suid/common/sandbox.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
|
|
| namespace sandbox {
|
|
|
| -TEST(SetuidSandboxClient, SetupLaunchEnvironment) {
|
| +TEST(SetuidSandboxHost, SetupLaunchEnvironment) {
|
| const char kTestValue[] = "This is a test";
|
| scoped_ptr<base::Environment> env(base::Environment::Create());
|
| EXPECT_TRUE(env != NULL);
|
| @@ -25,15 +28,14 @@ TEST(SetuidSandboxClient, SetupLaunchEnvironment) {
|
| EXPECT_TRUE(env->SetVar("LD_PRELOAD", kTestValue));
|
| EXPECT_TRUE(env->UnSetVar("LD_ORIGIN_PATH"));
|
|
|
| - scoped_ptr<SetuidSandboxClient>
|
| - sandbox_client(SetuidSandboxClient::Create());
|
| - EXPECT_TRUE(sandbox_client != NULL);
|
| + scoped_ptr<SetuidSandboxHost> sandbox_host(SetuidSandboxHost::Create());
|
| + EXPECT_TRUE(sandbox_host != NULL);
|
|
|
| // Make sure the environment is clean.
|
| EXPECT_TRUE(env->UnSetVar(kSandboxEnvironmentApiRequest));
|
| EXPECT_TRUE(env->UnSetVar(kSandboxEnvironmentApiProvides));
|
|
|
| - sandbox_client->SetupLaunchEnvironment();
|
| + sandbox_host->SetupLaunchEnvironment();
|
|
|
| // Check if the requested API environment was set.
|
| std::string api_request;
|
| @@ -59,43 +61,12 @@ TEST(SetuidSandboxClient, SetupLaunchEnvironment) {
|
| }
|
| }
|
|
|
| -TEST(SetuidSandboxClient, SandboxedClientAPI) {
|
| - scoped_ptr<base::Environment> env(base::Environment::Create());
|
| - EXPECT_TRUE(env != NULL);
|
| -
|
| - scoped_ptr<SetuidSandboxClient>
|
| - sandbox_client(SetuidSandboxClient::Create());
|
| - EXPECT_TRUE(sandbox_client != NULL);
|
| -
|
| - // Set-up a fake environment as if we went through the setuid sandbox.
|
| - EXPECT_TRUE(env->SetVar(kSandboxEnvironmentApiProvides,
|
| - base::IntToString(kSUIDSandboxApiNumber)));
|
| - EXPECT_TRUE(env->SetVar(kSandboxDescriptorEnvironmentVarName, "1"));
|
| - EXPECT_TRUE(env->SetVar(kSandboxPIDNSEnvironmentVarName, "1"));
|
| - EXPECT_TRUE(env->UnSetVar(kSandboxNETNSEnvironmentVarName));
|
| -
|
| - // Check the API.
|
| - EXPECT_TRUE(sandbox_client->IsSuidSandboxUpToDate());
|
| - EXPECT_TRUE(sandbox_client->IsSuidSandboxChild());
|
| - EXPECT_TRUE(sandbox_client->IsInNewPIDNamespace());
|
| - EXPECT_FALSE(sandbox_client->IsInNewNETNamespace());
|
| -
|
| - // Forge an incorrect API version and check.
|
| - EXPECT_TRUE(env->SetVar(kSandboxEnvironmentApiProvides,
|
| - base::IntToString(kSUIDSandboxApiNumber + 1)));
|
| - EXPECT_FALSE(sandbox_client->IsSuidSandboxUpToDate());
|
| - // We didn't go through the actual sandboxing mechanism as it is
|
| - // very hard in a unit test.
|
| - EXPECT_FALSE(sandbox_client->IsSandboxed());
|
| -}
|
| -
|
| // This test doesn't accomplish much, but will make sure that analysis tools
|
| // will run this codepath.
|
| -TEST(SetuidSandboxClient, GetSandboxBinaryPath) {
|
| - scoped_ptr<SetuidSandboxClient> setuid_sandbox_client(
|
| - SetuidSandboxClient::Create());
|
| - ignore_result(setuid_sandbox_client->GetSandboxBinaryPath());
|
| +TEST(SetuidSandboxHost, GetSandboxBinaryPath) {
|
| + scoped_ptr<SetuidSandboxHost> setuid_sandbox_host(
|
| + SetuidSandboxHost::Create());
|
| + ignore_result(setuid_sandbox_host->GetSandboxBinaryPath());
|
| }
|
|
|
| } // namespace sandbox
|
| -
|
|
|