| Index: trunk/src/content/common/sandbox_mac_diraccess_unittest.mm
|
| ===================================================================
|
| --- trunk/src/content/common/sandbox_mac_diraccess_unittest.mm (revision 289539)
|
| +++ trunk/src/content/common/sandbox_mac_diraccess_unittest.mm (working copy)
|
| @@ -127,6 +127,7 @@
|
| std::string out;
|
| EXPECT_TRUE(Sandbox::QuoteStringForRegex(in_utf8, &out));
|
| EXPECT_EQ(expected, out);
|
| +
|
| }
|
| }
|
|
|
| @@ -177,18 +178,6 @@
|
| }
|
| }
|
|
|
| -TEST_F(MacDirAccessSandboxTest, AllowMetadataForPath) {
|
| - {
|
| - std::string expected(
|
| - "(allow file-read-metadata (literal \"/\")(literal \"/System\")"
|
| - "(literal \"/System/Library\")"
|
| - "(literal \"/System/Library/Frameworks\"))");
|
| - NSString* sandbox_command = Sandbox::AllowMetadataForPath(
|
| - base::FilePath("/System/Library/Frameworks"));
|
| - EXPECT_EQ(base::SysNSStringToUTF8(sandbox_command), expected);
|
| - }
|
| -}
|
| -
|
| MULTIPROCESS_TEST_MAIN(mac_sandbox_path_access) {
|
| char *sandbox_allowed_dir = getenv(kSandboxAccessPathKey);
|
| if (!sandbox_allowed_dir)
|
|
|