Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(271)

Unified Diff: sandbox/win/src/policy_engine_unittest.cc

Issue 1851213002: Remove sandbox on Windows. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: fix nacl compile issues Created 4 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « sandbox/win/src/policy_engine_processor.cc ('k') | sandbox/win/src/policy_low_level.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: sandbox/win/src/policy_engine_unittest.cc
diff --git a/sandbox/win/src/policy_engine_unittest.cc b/sandbox/win/src/policy_engine_unittest.cc
deleted file mode 100644
index 5572bdcd300ae522bea0c3e50acd783cf3922625..0000000000000000000000000000000000000000
--- a/sandbox/win/src/policy_engine_unittest.cc
+++ /dev/null
@@ -1,105 +0,0 @@
-// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include <stddef.h>
-#include <stdint.h>
-
-#include "sandbox/win/src/policy_engine_params.h"
-#include "sandbox/win/src/policy_engine_processor.h"
-#include "testing/gtest/include/gtest/gtest.h"
-
-#define POLPARAMS_BEGIN(x) sandbox::ParameterSet x[] = {
-#define POLPARAM(p) sandbox::ParamPickerMake(p),
-#define POLPARAMS_END }
-
-namespace sandbox {
-
-bool SetupNtdllImports();
-
-TEST(PolicyEngineTest, Rules1) {
- SetupNtdllImports();
-
- // Construct two policy rules that say:
- //
- // #1
- // If the path is c:\\documents and settings\\* AND
- // If the creation mode is 'open existing' AND
- // If the security descriptor is null THEN
- // Ask the broker.
- //
- // #2
- // If the security descriptor is null AND
- // If the path ends with *.txt AND
- // If the creation mode is not 'create new' THEN
- // return Access Denied.
-
- enum FileCreateArgs {
- FileNameArg,
- CreationDispositionArg,
- FlagsAndAttributesArg,
- SecurityAttributes
- };
-
- const size_t policy_sz = 1024;
- PolicyBuffer* policy = reinterpret_cast<PolicyBuffer*>(new char[policy_sz]);
- OpcodeFactory opcode_maker(policy, policy_sz - 0x40);
-
- // Add rule set #1
- opcode_maker.MakeOpWStringMatch(FileNameArg,
- L"c:\\documents and settings\\",
- 0, CASE_INSENSITIVE, kPolNone);
- opcode_maker.MakeOpNumberMatch(CreationDispositionArg, OPEN_EXISTING,
- kPolNone);
- opcode_maker.MakeOpVoidPtrMatch(SecurityAttributes, (void*)NULL,
- kPolNone);
- opcode_maker.MakeOpAction(ASK_BROKER, kPolNone);
-
- // Add rule set #2
- opcode_maker.MakeOpWStringMatch(FileNameArg, L".TXT",
- kSeekToEnd, CASE_INSENSITIVE, kPolNone);
- opcode_maker.MakeOpNumberMatch(CreationDispositionArg, CREATE_NEW,
- kPolNegateEval);
- opcode_maker.MakeOpAction(FAKE_ACCESS_DENIED, kPolNone);
- policy->opcode_count = 7;
-
- const wchar_t* filename = L"c:\\Documents and Settings\\Microsoft\\BLAH.txt";
- uint32_t creation_mode = OPEN_EXISTING;
- uint32_t flags = FILE_ATTRIBUTE_NORMAL;
- void* security_descriptor = NULL;
-
- POLPARAMS_BEGIN(eval_params)
- POLPARAM(filename)
- POLPARAM(creation_mode)
- POLPARAM(flags)
- POLPARAM(security_descriptor)
- POLPARAMS_END;
-
- PolicyResult pr;
- PolicyProcessor pol_ev(policy);
-
- // Test should match the first rule set.
- pr = pol_ev.Evaluate(kShortEval, eval_params, _countof(eval_params));
- EXPECT_EQ(POLICY_MATCH, pr);
- EXPECT_EQ(ASK_BROKER, pol_ev.GetAction());
-
- // Test should still match the first rule set.
- pr = pol_ev.Evaluate(kShortEval, eval_params, _countof(eval_params));
- EXPECT_EQ(POLICY_MATCH, pr);
- EXPECT_EQ(ASK_BROKER, pol_ev.GetAction());
-
- // Changing creation_mode such that evaluation should not match any rule.
- creation_mode = CREATE_NEW;
- pr = pol_ev.Evaluate(kShortEval, eval_params, _countof(eval_params));
- EXPECT_EQ(NO_POLICY_MATCH, pr);
-
- // Changing creation_mode such that evaluation should match rule #2.
- creation_mode = OPEN_ALWAYS;
- pr = pol_ev.Evaluate(kShortEval, eval_params, _countof(eval_params));
- EXPECT_EQ(POLICY_MATCH, pr);
- EXPECT_EQ(FAKE_ACCESS_DENIED, pol_ev.GetAction());
-
- delete [] reinterpret_cast<char*>(policy);
-}
-
-} // namespace sandbox
« no previous file with comments | « sandbox/win/src/policy_engine_processor.cc ('k') | sandbox/win/src/policy_low_level.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698