summaryrefslogtreecommitdiffstats
path: root/sandbox/src/handle_policy_test.cc
diff options
context:
space:
mode:
authorjschuh@chromium.org <jschuh@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-04-12 06:01:01 +0000
committerjschuh@chromium.org <jschuh@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-04-12 06:01:01 +0000
commit9543d58e5cb98e601ab8df5fa7d0d8826743b3d0 (patch)
tree0f465cc50362f50e28a0ac580c603957bb50b77d /sandbox/src/handle_policy_test.cc
parent26cc34ddcdb9fcec36931303171985a2f378396b (diff)
downloadchromium_src-9543d58e5cb98e601ab8df5fa7d0d8826743b3d0.zip
chromium_src-9543d58e5cb98e601ab8df5fa7d0d8826743b3d0.tar.gz
chromium_src-9543d58e5cb98e601ab8df5fa7d0d8826743b3d0.tar.bz2
Add sandbox support for associating peer processes
TEST=HandlePolicyTest.DuplicatePeerHandle Review URL: http://codereview.chromium.org/9960045 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@131940 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/src/handle_policy_test.cc')
-rw-r--r--sandbox/src/handle_policy_test.cc22
1 files changed, 22 insertions, 0 deletions
diff --git a/sandbox/src/handle_policy_test.cc b/sandbox/src/handle_policy_test.cc
index bccca67..bb08b86 100644
--- a/sandbox/src/handle_policy_test.cc
+++ b/sandbox/src/handle_policy_test.cc
@@ -65,5 +65,27 @@ TEST(HandlePolicyTest, DuplicateHandle) {
EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(cmd_line.c_str()));
}
+// Tests that duplicating an object works only when the policy allows it.
+TEST(HandlePolicyTest, DuplicatePeerHandle) {
+ TestRunner target;
+ TestRunner runner;
+
+ // Kick off an asynchronous target process for testing.
+ target.SetAsynchronous(true);
+ target.SetUnsandboxed(true);
+ EXPECT_EQ(SBOX_TEST_SUCCEEDED, target.RunTest(L"Handle_WaitProcess 30000"));
+
+ // First test that we fail to open the event.
+ std::wstring cmd_line = base::StringPrintf(L"Handle_DuplicateEvent %d",
+ target.process_id());
+ EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(cmd_line.c_str()));
+
+ // Now successfully open the event after adding a duplicate handle rule.
+ EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES,
+ TargetPolicy::HANDLES_DUP_ANY,
+ L"Event"));
+ EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(cmd_line.c_str()));
+}
+
} // namespace sandbox