[go: nahoru, domu]

blob: 5a3d385d507ad5b526254303fa8b0ef7ca74da88 [file] [log] [blame]
// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "sandbox/policy/win/sandbox_policy_feature_test.h"
namespace sandbox {
namespace policy {
SandboxFeatureTest::SandboxFeatureTest() {
std::vector<base::Feature> enabled_features;
std::vector<base::Feature> disabled_features;
if (::testing::get<TestParameter::kEnableRendererAppContainer>(GetParam()))
enabled_features.push_back(features::kRendererAppContainer);
else
disabled_features.push_back(features::kRendererAppContainer);
if (::testing::get<TestParameter::kEnableKtmMitigation>(GetParam()))
enabled_features.push_back(features::kWinSboxDisableKtmComponent);
else
disabled_features.push_back(features::kWinSboxDisableKtmComponent);
feature_list_.InitWithFeatures(enabled_features, disabled_features);
}
IntegrityLevel SandboxFeatureTest::GetExpectedIntegrityLevel() {
return IntegrityLevel::INTEGRITY_LEVEL_LOW;
}
TokenLevel SandboxFeatureTest::GetExpectedLockdownTokenLevel() {
return TokenLevel::USER_LOCKDOWN;
}
TokenLevel SandboxFeatureTest::GetExpectedInitialTokenLevel() {
return TokenLevel::USER_RESTRICTED_SAME_ACCESS;
}
MitigationFlags SandboxFeatureTest::GetExpectedMitigationFlags() {
// Mitigation flags are set on the policy regardless of the OS version
::sandbox::MitigationFlags flags =
::sandbox::MITIGATION_HEAP_TERMINATE |
::sandbox::MITIGATION_BOTTOM_UP_ASLR | ::sandbox::MITIGATION_DEP |
::sandbox::MITIGATION_DEP_NO_ATL_THUNK |
::sandbox::MITIGATION_EXTENSION_POINT_DISABLE |
::sandbox::MITIGATION_SEHOP |
::sandbox::MITIGATION_NONSYSTEM_FONT_DISABLE |
::sandbox::MITIGATION_IMAGE_LOAD_NO_REMOTE |
::sandbox::MITIGATION_IMAGE_LOAD_NO_LOW_LABEL |
::sandbox::MITIGATION_RESTRICT_INDIRECT_BRANCH_PREDICTION;
#if !defined(NACL_WIN64)
// Win32k mitigation is only set on the operating systems it's available on
if (base::win::GetVersion() >= base::win::Version::WIN8)
flags = flags | ::sandbox::MITIGATION_WIN32K_DISABLE;
#endif
if (::testing::get<TestParameter::kEnableKtmMitigation>(GetParam()))
flags = flags | ::sandbox::MITIGATION_KTM_COMPONENT;
return flags;
}
MitigationFlags SandboxFeatureTest::GetExpectedDelayedMitigationFlags() {
return ::sandbox::MITIGATION_DLL_SEARCH_ORDER |
::sandbox::MITIGATION_FORCE_MS_SIGNED_BINS;
}
AppContainerType SandboxFeatureTest::GetExpectedAppContainerType() {
return AppContainerType::kNone;
}
std::vector<base::win::Sid> SandboxFeatureTest::GetExpectedCapabilities() {
return {};
}
void SandboxFeatureTest::ValidateSecurityLevels(TargetConfig* config) {
EXPECT_EQ(config->GetIntegrityLevel(), GetExpectedIntegrityLevel());
EXPECT_EQ(config->GetLockdownTokenLevel(), GetExpectedLockdownTokenLevel());
EXPECT_EQ(config->GetInitialTokenLevel(), GetExpectedInitialTokenLevel());
}
void SandboxFeatureTest::ValidatePolicyFlagSettings(TargetConfig* config) {
EXPECT_EQ(config->GetProcessMitigations(), GetExpectedMitigationFlags());
EXPECT_EQ(config->GetDelayedProcessMitigations(),
GetExpectedDelayedMitigationFlags());
}
void SandboxFeatureTest::ValidateAppContainerSettings(TargetConfig* config) {
if (GetExpectedAppContainerType() == ::sandbox::AppContainerType::kLowbox) {
EXPECT_EQ(GetExpectedAppContainerType(),
config->GetAppContainer()->GetAppContainerType());
EqualSidList(config->GetAppContainer()->GetCapabilities(),
GetExpectedCapabilities());
} else {
EXPECT_EQ(config->GetAppContainer().get(), nullptr);
}
}
} // namespace policy
} // namespace sandbox