Index: content/common/sandbox_mac_diraccess_unittest.mm |
diff --git a/content/common/sandbox_mac_diraccess_unittest.mm b/content/common/sandbox_mac_diraccess_unittest.mm |
index 7fb7d45ce6d8e5335e2f11acb78288bc5932dd83..06a5442b2556383f5121243fb90e10927977b5a8 100644 |
--- a/content/common/sandbox_mac_diraccess_unittest.mm |
+++ b/content/common/sandbox_mac_diraccess_unittest.mm |
@@ -127,6 +127,7 @@ |
std::string out; |
EXPECT_TRUE(Sandbox::QuoteStringForRegex(in_utf8, &out)); |
EXPECT_EQ(expected, out); |
+ |
} |
} |
@@ -174,18 +175,6 @@ |
ScopedDirectory cleanup_sandbox_sibling(&sibling_sandbox_dir); |
EXPECT_TRUE(CheckSandbox(sandbox_dir.value())); |
- } |
-} |
- |
-TEST_F(MacDirAccessSandboxTest, AllowMetadataForPath) { |
- { |
- std::string expected( |
- "(allow file-read-metadata (literal \"/\")(literal \"/System\")" |
- "(literal \"/System/Library\")" |
- "(literal \"/System/Library/Frameworks\"))"); |
- NSString* sandbox_command = Sandbox::AllowMetadataForPath( |
- base::FilePath("/System/Library/Frameworks")); |
- EXPECT_EQ(base::SysNSStringToUTF8(sandbox_command), expected); |
} |
} |