Index: sandbox/mac/policy_unittest.cc |
diff --git a/sandbox/mac/policy_unittest.cc b/sandbox/mac/policy_unittest.cc |
index d019fdd0647869b70ba094d43291057b18d17e08..54e0e7489518b540b602abaaa1e368f43b87050e 100644 |
--- a/sandbox/mac/policy_unittest.cc |
+++ b/sandbox/mac/policy_unittest.cc |
@@ -14,24 +14,24 @@ TEST(PolicyTest, ValidEmptyPolicy) { |
TEST(PolicyTest, ValidPolicy) { |
BootstrapSandboxPolicy policy; |
- policy["allow"] = Rule(POLICY_ALLOW); |
- policy["deny_error"] = Rule(POLICY_DENY_ERROR); |
- policy["deny_dummy"] = Rule(POLICY_DENY_DUMMY_PORT); |
- policy["substitue"] = Rule(mach_task_self()); |
+ policy.rules["allow"] = Rule(POLICY_ALLOW); |
+ policy.rules["deny_error"] = Rule(POLICY_DENY_ERROR); |
+ policy.rules["deny_dummy"] = Rule(POLICY_DENY_DUMMY_PORT); |
+ policy.rules["substitue"] = Rule(mach_task_self()); |
EXPECT_TRUE(IsPolicyValid(policy)); |
} |
TEST(PolicyTest, InvalidPolicyEmptyRule) { |
Rule rule; |
BootstrapSandboxPolicy policy; |
- policy["test"] = rule; |
+ policy.rules["test"] = rule; |
EXPECT_FALSE(IsPolicyValid(policy)); |
} |
TEST(PolicyTest, InvalidPolicySubstitue) { |
Rule rule(POLICY_SUBSTITUTE_PORT); |
BootstrapSandboxPolicy policy; |
- policy["test"] = rule; |
+ policy.rules["test"] = rule; |
EXPECT_FALSE(IsPolicyValid(policy)); |
} |
@@ -39,7 +39,7 @@ TEST(PolicyTest, InvalidPolicyWithPortAllow) { |
Rule rule(POLICY_ALLOW); |
rule.substitute_port = mach_task_self(); |
BootstrapSandboxPolicy policy; |
- policy["allow"] = rule; |
+ policy.rules["allow"] = rule; |
EXPECT_FALSE(IsPolicyValid(policy)); |
} |
@@ -47,7 +47,7 @@ TEST(PolicyTest, InvalidPolicyWithPortDenyError) { |
Rule rule(POLICY_DENY_ERROR); |
rule.substitute_port = mach_task_self(); |
BootstrapSandboxPolicy policy; |
- policy["deny_error"] = rule; |
+ policy.rules["deny_error"] = rule; |
EXPECT_FALSE(IsPolicyValid(policy)); |
} |
@@ -55,7 +55,43 @@ TEST(PolicyTest, InvalidPolicyWithPortDummy) { |
Rule rule(POLICY_DENY_DUMMY_PORT); |
rule.substitute_port = mach_task_self(); |
BootstrapSandboxPolicy policy; |
- policy["deny_dummy"] = rule; |
+ policy.rules["deny_dummy"] = rule; |
+ EXPECT_FALSE(IsPolicyValid(policy)); |
+} |
+ |
+TEST(PolicyTest, InvalidPolicyDefaultRule) { |
+ BootstrapSandboxPolicy policy; |
+ policy.default_rule = Rule(); |
+ EXPECT_FALSE(IsPolicyValid(policy)); |
+} |
+ |
+TEST(PolicyTest, InvalidPolicyDefaultRuleSubstitue) { |
+ BootstrapSandboxPolicy policy; |
+ policy.default_rule = Rule(POLICY_SUBSTITUTE_PORT); |
+ EXPECT_FALSE(IsPolicyValid(policy)); |
+} |
+ |
+TEST(PolicyTest, InvalidPolicyDefaultRuleWithPortAllow) { |
+ Rule rule(POLICY_ALLOW); |
+ rule.substitute_port = mach_task_self(); |
+ BootstrapSandboxPolicy policy; |
+ policy.default_rule = rule; |
+ EXPECT_FALSE(IsPolicyValid(policy)); |
+} |
+ |
+TEST(PolicyTest, InvalidPolicyDefaultRuleWithPortDenyError) { |
+ Rule rule(POLICY_DENY_ERROR); |
+ rule.substitute_port = mach_task_self(); |
+ BootstrapSandboxPolicy policy; |
+ policy.default_rule = rule; |
+ EXPECT_FALSE(IsPolicyValid(policy)); |
+} |
+ |
+TEST(PolicyTest, InvalidPolicyDefaultRuleWithPortDummy) { |
+ Rule rule(POLICY_DENY_DUMMY_PORT); |
+ rule.substitute_port = mach_task_self(); |
+ BootstrapSandboxPolicy policy; |
+ policy.default_rule = rule; |
EXPECT_FALSE(IsPolicyValid(policy)); |
} |