Index: sandbox/mac/policy_unittest.cc |
diff --git a/sandbox/mac/policy_unittest.cc b/sandbox/mac/policy_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..d019fdd0647869b70ba094d43291057b18d17e08 |
--- /dev/null |
+++ b/sandbox/mac/policy_unittest.cc |
@@ -0,0 +1,62 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "sandbox/mac/policy.h" |
+ |
+#include "testing/gtest/include/gtest/gtest.h" |
+ |
+namespace sandbox { |
+ |
+TEST(PolicyTest, ValidEmptyPolicy) { |
+ EXPECT_TRUE(IsPolicyValid(BootstrapSandboxPolicy())); |
+} |
+ |
+TEST(PolicyTest, ValidPolicy) { |
+ BootstrapSandboxPolicy policy; |
+ policy["allow"] = Rule(POLICY_ALLOW); |
+ policy["deny_error"] = Rule(POLICY_DENY_ERROR); |
+ policy["deny_dummy"] = Rule(POLICY_DENY_DUMMY_PORT); |
+ policy["substitue"] = Rule(mach_task_self()); |
+ EXPECT_TRUE(IsPolicyValid(policy)); |
+} |
+ |
+TEST(PolicyTest, InvalidPolicyEmptyRule) { |
+ Rule rule; |
+ BootstrapSandboxPolicy policy; |
+ policy["test"] = rule; |
+ EXPECT_FALSE(IsPolicyValid(policy)); |
+} |
+ |
+TEST(PolicyTest, InvalidPolicySubstitue) { |
+ Rule rule(POLICY_SUBSTITUTE_PORT); |
+ BootstrapSandboxPolicy policy; |
+ policy["test"] = rule; |
+ EXPECT_FALSE(IsPolicyValid(policy)); |
+} |
+ |
+TEST(PolicyTest, InvalidPolicyWithPortAllow) { |
+ Rule rule(POLICY_ALLOW); |
+ rule.substitute_port = mach_task_self(); |
+ BootstrapSandboxPolicy policy; |
+ policy["allow"] = rule; |
+ EXPECT_FALSE(IsPolicyValid(policy)); |
+} |
+ |
+TEST(PolicyTest, InvalidPolicyWithPortDenyError) { |
+ Rule rule(POLICY_DENY_ERROR); |
+ rule.substitute_port = mach_task_self(); |
+ BootstrapSandboxPolicy policy; |
+ policy["deny_error"] = rule; |
+ EXPECT_FALSE(IsPolicyValid(policy)); |
+} |
+ |
+TEST(PolicyTest, InvalidPolicyWithPortDummy) { |
+ Rule rule(POLICY_DENY_DUMMY_PORT); |
+ rule.substitute_port = mach_task_self(); |
+ BootstrapSandboxPolicy policy; |
+ policy["deny_dummy"] = rule; |
+ EXPECT_FALSE(IsPolicyValid(policy)); |
+} |
+ |
+} // namespace sandbox |