2020-01-17 21:05:03 +08:00
|
|
|
// Copyright 2019 Google LLC
|
2019-03-19 00:21:48 +08:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
2022-01-28 17:38:27 +08:00
|
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
2019-03-19 00:21:48 +08:00
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
// Unit tests for crc4sandbox example.
|
|
|
|
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include <string>
|
|
|
|
|
|
|
|
#include "gmock/gmock.h"
|
|
|
|
#include "gtest/gtest.h"
|
2022-10-20 21:48:06 +08:00
|
|
|
#include "absl/log/log.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
#include "sandboxed_api/sandbox2/util.h"
|
2021-01-14 01:25:25 +08:00
|
|
|
#include "sandboxed_api/testing.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
#include "sandboxed_api/util/status_matchers.h"
|
|
|
|
|
|
|
|
namespace sandbox2 {
|
|
|
|
namespace {
|
|
|
|
|
2021-01-14 01:25:25 +08:00
|
|
|
using ::sapi::GetTestSourcePath;
|
|
|
|
using ::testing::Eq;
|
2022-04-19 21:15:04 +08:00
|
|
|
using ::testing::HasSubstr;
|
2021-01-14 01:25:25 +08:00
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
class CRC4Test : public ::testing::Test {
|
|
|
|
protected:
|
|
|
|
void SetUp() override {
|
|
|
|
path_ = GetTestSourcePath("sandbox2/examples/crc4/crc4sandbox");
|
2022-01-20 20:39:48 +08:00
|
|
|
env_ = util::CharPtrArray(environ).ToStringVector();
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
std::string path_;
|
|
|
|
std::vector<std::string> env_;
|
|
|
|
};
|
|
|
|
|
|
|
|
// Test that crc4sandbox works.
|
|
|
|
TEST_F(CRC4Test, TestNormalOperation) {
|
|
|
|
SKIP_SANITIZERS_AND_COVERAGE;
|
|
|
|
std::string output;
|
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(
|
|
|
|
int exit_code,
|
|
|
|
util::Communicate({path_, "-input", "ABCD"}, env_, &output));
|
|
|
|
|
2022-04-19 21:15:04 +08:00
|
|
|
EXPECT_THAT(output, HasSubstr("0x44434241\n"));
|
2019-03-19 00:21:48 +08:00
|
|
|
EXPECT_THAT(exit_code, Eq(0));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test that crc4sandbox protects against bugs, because only the sandboxee
|
|
|
|
// will crash and break its communication with executor.
|
|
|
|
TEST_F(CRC4Test, TestExploitAttempt) {
|
|
|
|
SKIP_SANITIZERS_AND_COVERAGE;
|
|
|
|
|
|
|
|
std::string output;
|
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(
|
2019-03-26 22:27:53 +08:00
|
|
|
int exit_code, util::Communicate({path_, "-input", std::string(128, 'A')},
|
|
|
|
env_, &output));
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
LOG(INFO) << "Output: " << output;
|
|
|
|
EXPECT_THAT(exit_code, Eq(3));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test that if sandboxee calls a syscall that is not allowed by the policy,
|
|
|
|
// it triggers a policy violation for the executor.
|
|
|
|
TEST_F(CRC4Test, TestSyscallViolation) {
|
|
|
|
SKIP_SANITIZERS_AND_COVERAGE;
|
|
|
|
|
|
|
|
std::string output;
|
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(
|
|
|
|
int exit_code,
|
|
|
|
util::Communicate({path_, "-input", "x", "-call_syscall_not_allowed"},
|
|
|
|
env_, &output));
|
|
|
|
|
|
|
|
LOG(INFO) << "Output: " << output;
|
|
|
|
EXPECT_THAT(exit_code, Eq(3));
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
} // namespace sandbox2
|