Index: content/common/sandbox_mac_diraccess_unittest.mm |
diff --git a/content/common/sandbox_mac_diraccess_unittest.mm b/content/common/sandbox_mac_diraccess_unittest.mm |
index 06a5442b2556383f5121243fb90e10927977b5a8..7fb7d45ce6d8e5335e2f11acb78288bc5932dd83 100644 |
--- a/content/common/sandbox_mac_diraccess_unittest.mm |
+++ b/content/common/sandbox_mac_diraccess_unittest.mm |
@@ -127,7 +127,6 @@ TEST_F(MacDirAccessSandboxTest, RegexEscape) { |
std::string out; |
EXPECT_TRUE(Sandbox::QuoteStringForRegex(in_utf8, &out)); |
EXPECT_EQ(expected, out); |
- |
} |
} |
@@ -178,6 +177,18 @@ TEST_F(MacDirAccessSandboxTest, SandboxAccess) { |
} |
} |
+TEST_F(MacDirAccessSandboxTest, AllowMetadataForPath) { |
+ { |
+ std::string expected( |
+ "(allow file-read-metadata (literal \"/\")(literal \"/System\")" |
+ "(literal \"/System/Library\")" |
+ "(literal \"/System/Library/Frameworks\"))"); |
+ NSString* sandbox_command = Sandbox::AllowMetadataForPath( |
+ base::FilePath("/System/Library/Frameworks")); |
+ EXPECT_EQ(base::SysNSStringToUTF8(sandbox_command), expected); |
+ } |
+} |
+ |
MULTIPROCESS_TEST_MAIN(mac_sandbox_path_access) { |
char *sandbox_allowed_dir = getenv(kSandboxAccessPathKey); |
if (!sandbox_allowed_dir) |