diff options
author | cpu@chromium.org <cpu@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-08-07 03:10:12 +0000 |
---|---|---|
committer | cpu@chromium.org <cpu@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-08-07 03:10:12 +0000 |
commit | a7cab943cd84df541a4f290a431f39942f3934bf (patch) | |
tree | ae28a35b76b2d6676b0bcb1115ddfd8b51c03117 /sandbox/src/file_policy_test.cc | |
parent | b78804c8b2abe1ea162383795e612af1a09e273f (diff) | |
download | chromium_src-a7cab943cd84df541a4f290a431f39942f3934bf.zip chromium_src-a7cab943cd84df541a4f290a431f39942f3934bf.tar.gz chromium_src-a7cab943cd84df541a4f290a431f39942f3934bf.tar.bz2 |
Allow native (nt-style) paths to be used for sandbox policy specification
1- bypass fixup when adding the path into the policy
2- make SameObject() do case-insensitive perfect match
BUG=50774
TEST= unit test included
Review URL: http://codereview.chromium.org/3092014
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@55329 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/src/file_policy_test.cc')
-rw-r--r-- | sandbox/src/file_policy_test.cc | 24 |
1 files changed, 23 insertions, 1 deletions
diff --git a/sandbox/src/file_policy_test.cc b/sandbox/src/file_policy_test.cc index 01a8383..2abf6e2 100644 --- a/sandbox/src/file_policy_test.cc +++ b/sandbox/src/file_policy_test.cc @@ -1,6 +1,8 @@ // Copyright (c) 2010 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. +#include <algorithm> +#include <cctype> #include <windows.h> #include <winioctl.h> @@ -10,6 +12,7 @@ #include "sandbox/src/sandbox.h" #include "sandbox/src/sandbox_factory.h" #include "sandbox/src/sandbox_policy.h" +#include "sandbox/src/win_utils.h" #include "sandbox/tests/common/controller.h" #include "sandbox/tests/common/test_utils.h" #include "testing/gtest/include/gtest/gtest.h" @@ -89,7 +92,10 @@ SBOX_TESTS_COMMAND int File_CreateSys32(int argc, wchar_t **argv) { if (argc != 1) return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; - std::wstring file = MakePathToSys(argv[0], true); + std::wstring file(argv[0]); + if (0 != _wcsnicmp(file.c_str(), kNTObjManPrefix, kNTObjManPrefixLen)) + file = MakePathToSys(argv[0], true); + UNICODE_STRING object_name; RtlInitUnicodeString(&object_name, file.c_str()); @@ -256,6 +262,22 @@ TEST(FilePolicyTest, AllowNtCreateCalc) { EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"File_CreateSys32 calc.exe")); } +TEST(FilePolicyTest, AllowNtCreateWithNativePath) { + std::wstring calc = MakePathToSys(L"calc.exe", false); + std::wstring nt_path; + ASSERT_TRUE(GetNtPathFromWin32Path(calc, &nt_path)); + TestRunner runner; + runner.AddFsRule(TargetPolicy::FILES_ALLOW_READONLY, nt_path.c_str()); + + wchar_t buff[MAX_PATH]; + ::wsprintfW(buff, L"File_CreateSys32 %s", nt_path.c_str()); + EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(buff)); + + std::transform(nt_path.begin(), nt_path.end(), nt_path.begin(), std::tolower); + ::wsprintfW(buff, L"File_CreateSys32 %s", nt_path.c_str()); + EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(buff)); +} + TEST(FilePolicyTest, AllowReadOnly) { TestRunner runner; |