Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(767)

Unified Diff: sandbox/mac/sandbox_mac_seatbelt_exec_unittest.cc

Issue 2891933005: Plumb sandbox rules through the helper executable. (Closed)
Patch Set: Rebase patch Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « chrome/app/chrome_exe_main_mac.cc ('k') | sandbox/mac/seatbelt_exec.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: sandbox/mac/sandbox_mac_seatbelt_exec_unittest.cc
diff --git a/sandbox/mac/sandbox_mac_seatbelt_exec_unittest.cc b/sandbox/mac/sandbox_mac_seatbelt_exec_unittest.cc
index 86ae8153e4b7e75d40fe575ca5d905cede97ac31..9d8b8b573aac9184ac12b603839f2c6f41cd6986 100644
--- a/sandbox/mac/sandbox_mac_seatbelt_exec_unittest.cc
+++ b/sandbox/mac/sandbox_mac_seatbelt_exec_unittest.cc
@@ -31,12 +31,10 @@ MULTIPROCESS_TEST_MAIN(ServerTest) {
mac::SandboxPolicy policy;
google::protobuf::MapPair<std::string, std::string> allowed_pair(
"ALLOWED_READ_DIR", allowed_path);
- google::protobuf::MapPair<std::string, std::string> exec_pair(
- "EXECUTABLE_PATH", exec_path);
CHECK(policy.mutable_params()->insert(allowed_pair).second);
- CHECK(policy.mutable_params()->insert(exec_pair).second);
policy.set_profile(profile);
+ CHECK(exec_server.SetParameter("EXECUTABLE_PATH", exec_path));
CHECK(exec_server.ApplySandboxProfile(policy));
// Test that the sandbox profile is actually applied.
« no previous file with comments | « chrome/app/chrome_exe_main_mac.cc ('k') | sandbox/mac/seatbelt_exec.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698