2020-01-17 21:05:03 +08:00
|
|
|
// Copyright 2019 Google LLC
|
2019-03-19 00:21:48 +08:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
2022-01-28 17:38:27 +08:00
|
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
2019-03-19 00:21:48 +08:00
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2021-01-14 01:25:25 +08:00
|
|
|
#include "sandboxed_api/testing.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
|
2023-03-03 00:45:23 +08:00
|
|
|
#include <cstdlib>
|
2023-08-24 21:23:03 +08:00
|
|
|
#include <string>
|
2023-03-03 00:45:23 +08:00
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
#include "absl/strings/string_view.h"
|
2023-03-03 00:45:23 +08:00
|
|
|
#include "sandboxed_api/config.h"
|
|
|
|
#include "sandboxed_api/sandbox2/allow_all_syscalls.h"
|
2023-08-31 15:43:30 +08:00
|
|
|
#include "sandboxed_api/sandbox2/policybuilder.h"
|
2021-01-14 01:25:25 +08:00
|
|
|
#include "sandboxed_api/util/path.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
|
2021-01-14 01:25:25 +08:00
|
|
|
namespace sapi {
|
2019-03-19 00:21:48 +08:00
|
|
|
|
2023-03-03 00:45:23 +08:00
|
|
|
sandbox2::PolicyBuilder CreateDefaultPermissiveTestPolicy(
|
|
|
|
absl::string_view bin_path) {
|
|
|
|
sandbox2::PolicyBuilder builder;
|
|
|
|
// Don't restrict the syscalls at all.
|
|
|
|
builder.DefaultAction(sandbox2::AllowAllSyscalls());
|
|
|
|
if (sapi::host_os::IsAndroid()) {
|
|
|
|
builder.DisableNamespaces();
|
2023-08-31 15:43:30 +08:00
|
|
|
return builder;
|
2023-03-03 00:45:23 +08:00
|
|
|
}
|
|
|
|
if (IsCoverageRun()) {
|
|
|
|
builder.AddDirectory(getenv("COVERAGE_DIR"), /*is_ro=*/false);
|
|
|
|
}
|
|
|
|
if constexpr (sapi::sanitizers::IsAny()) {
|
|
|
|
builder.AddLibrariesForBinary(bin_path);
|
|
|
|
}
|
|
|
|
if constexpr (sapi::sanitizers::IsAny()) {
|
|
|
|
builder.AddDirectory("/proc");
|
|
|
|
}
|
|
|
|
return builder;
|
|
|
|
}
|
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
std::string GetTestTempPath(absl::string_view name) {
|
|
|
|
// When using Bazel, the environment variable TEST_TMPDIR is guaranteed to be
|
|
|
|
// set.
|
2022-04-20 19:45:41 +08:00
|
|
|
// See https://bazel.build/reference/test-encyclopedia#initial-conditions for
|
2019-03-19 00:21:48 +08:00
|
|
|
// details.
|
2020-05-29 20:40:31 +08:00
|
|
|
const char* test_tmpdir = getenv("TEST_TMPDIR");
|
|
|
|
return file::JoinPath(test_tmpdir ? test_tmpdir : ".", name);
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
std::string GetTestSourcePath(absl::string_view name) {
|
|
|
|
// Like in GetTestTempPath(), when using Bazel, the environment variable
|
|
|
|
// TEST_SRCDIR is guaranteed to be set.
|
2020-05-29 20:40:31 +08:00
|
|
|
const char* test_srcdir = getenv("TEST_SRCDIR");
|
|
|
|
return file::JoinPath(test_srcdir ? test_srcdir : ".",
|
2019-03-19 00:21:48 +08:00
|
|
|
"com_google_sandboxed_api/sandboxed_api", name);
|
|
|
|
}
|
|
|
|
|
2021-01-14 01:25:25 +08:00
|
|
|
} // namespace sapi
|