| Index: sandbox/mac/policy_unittest.cc
|
| diff --git a/sandbox/mac/policy_unittest.cc b/sandbox/mac/policy_unittest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..cbfce1e4c70fe5e4ce4aa9ae67242c87219bfb6e
|
| --- /dev/null
|
| +++ b/sandbox/mac/policy_unittest.cc
|
| @@ -0,0 +1,62 @@
|
| +// Copyright 2014 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "sandbox/mac/policy.h"
|
| +
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +namespace sandbox {
|
| +
|
| +TEST(PolicyTest, ValidEmptyPolicy) {
|
| + EXPECT_TRUE(IsPolicyValid(BootstrapSandboxPolicy()));
|
| +}
|
| +
|
| +TEST(PolicyTest, ValidPolicy) {
|
| + BootstrapSandboxPolicy policy;
|
| + policy["allow"] = Rule(POLICY_ALLOW);
|
| + policy["deny_error"] = Rule(POLICY_DENY_ERROR);
|
| + policy["deny_dummy"] = Rule(POLICY_DENY_DUMMY_PORT);
|
| + policy["substitue"] = Rule(mach_task_self());
|
| + EXPECT_TRUE(IsPolicyValid(policy));
|
| +}
|
| +
|
| +TEST(PolicyTest, InvalidPolicyEmptyRule) {
|
| + Rule rule;
|
| + BootstrapSandboxPolicy policy;
|
| + policy["test"] = rule;
|
| + EXPECT_FALSE(IsPolicyValid(policy));
|
| +}
|
| +
|
| +TEST(PolicyTest, InvalidPolicySubstitue) {
|
| + Rule rule(POLICY_SUBSTITUE_PORT);
|
| + BootstrapSandboxPolicy policy;
|
| + policy["test"] = rule;
|
| + EXPECT_FALSE(IsPolicyValid(policy));
|
| +}
|
| +
|
| +TEST(PolicyTest, InvalidPolicyWithPortAllow) {
|
| + Rule rule(POLICY_ALLOW);
|
| + rule.substitute_port = mach_task_self();
|
| + BootstrapSandboxPolicy policy;
|
| + policy["allow"] = rule;
|
| + EXPECT_FALSE(IsPolicyValid(policy));
|
| +}
|
| +
|
| +TEST(PolicyTest, InvalidPolicyWithPortDenyError) {
|
| + Rule rule(POLICY_DENY_ERROR);
|
| + rule.substitute_port = mach_task_self();
|
| + BootstrapSandboxPolicy policy;
|
| + policy["deny_error"] = rule;
|
| + EXPECT_FALSE(IsPolicyValid(policy));
|
| +}
|
| +
|
| +TEST(PolicyTest, InvalidPolicyWithPortDummy) {
|
| + Rule rule(POLICY_DENY_DUMMY_PORT);
|
| + rule.substitute_port = mach_task_self();
|
| + BootstrapSandboxPolicy policy;
|
| + policy["deny_dummy"] = rule;
|
| + EXPECT_FALSE(IsPolicyValid(policy));
|
| +}
|
| +
|
| +} // namespace sandbox
|
|
|