diff options
Diffstat (limited to 'sandbox/mac/policy_unittest.cc')
-rw-r--r-- | sandbox/mac/policy_unittest.cc | 98 |
1 files changed, 0 insertions, 98 deletions
diff --git a/sandbox/mac/policy_unittest.cc b/sandbox/mac/policy_unittest.cc deleted file mode 100644 index 54e0e74895..0000000000 --- a/sandbox/mac/policy_unittest.cc +++ /dev/null @@ -1,98 +0,0 @@ -// Copyright 2014 The Chromium Authors. All rights reserved. -// Use of this source code is governed by a BSD-style license that can be -// found in the LICENSE file. - -#include "sandbox/mac/policy.h" - -#include "testing/gtest/include/gtest/gtest.h" - -namespace sandbox { - -TEST(PolicyTest, ValidEmptyPolicy) { - EXPECT_TRUE(IsPolicyValid(BootstrapSandboxPolicy())); -} - -TEST(PolicyTest, ValidPolicy) { - BootstrapSandboxPolicy policy; - policy.rules["allow"] = Rule(POLICY_ALLOW); - policy.rules["deny_error"] = Rule(POLICY_DENY_ERROR); - policy.rules["deny_dummy"] = Rule(POLICY_DENY_DUMMY_PORT); - policy.rules["substitue"] = Rule(mach_task_self()); - EXPECT_TRUE(IsPolicyValid(policy)); -} - -TEST(PolicyTest, InvalidPolicyEmptyRule) { - Rule rule; - BootstrapSandboxPolicy policy; - policy.rules["test"] = rule; - EXPECT_FALSE(IsPolicyValid(policy)); -} - -TEST(PolicyTest, InvalidPolicySubstitue) { - Rule rule(POLICY_SUBSTITUTE_PORT); - BootstrapSandboxPolicy policy; - policy.rules["test"] = rule; - EXPECT_FALSE(IsPolicyValid(policy)); -} - -TEST(PolicyTest, InvalidPolicyWithPortAllow) { - Rule rule(POLICY_ALLOW); - rule.substitute_port = mach_task_self(); - BootstrapSandboxPolicy policy; - policy.rules["allow"] = rule; - EXPECT_FALSE(IsPolicyValid(policy)); -} - -TEST(PolicyTest, InvalidPolicyWithPortDenyError) { - Rule rule(POLICY_DENY_ERROR); - rule.substitute_port = mach_task_self(); - BootstrapSandboxPolicy policy; - policy.rules["deny_error"] = rule; - EXPECT_FALSE(IsPolicyValid(policy)); -} - -TEST(PolicyTest, InvalidPolicyWithPortDummy) { - Rule rule(POLICY_DENY_DUMMY_PORT); - rule.substitute_port = mach_task_self(); - BootstrapSandboxPolicy policy; - policy.rules["deny_dummy"] = rule; - EXPECT_FALSE(IsPolicyValid(policy)); -} - -TEST(PolicyTest, InvalidPolicyDefaultRule) { - BootstrapSandboxPolicy policy; - policy.default_rule = Rule(); - EXPECT_FALSE(IsPolicyValid(policy)); -} - -TEST(PolicyTest, InvalidPolicyDefaultRuleSubstitue) { - BootstrapSandboxPolicy policy; - policy.default_rule = Rule(POLICY_SUBSTITUTE_PORT); - EXPECT_FALSE(IsPolicyValid(policy)); -} - -TEST(PolicyTest, InvalidPolicyDefaultRuleWithPortAllow) { - Rule rule(POLICY_ALLOW); - rule.substitute_port = mach_task_self(); - BootstrapSandboxPolicy policy; - policy.default_rule = rule; - EXPECT_FALSE(IsPolicyValid(policy)); -} - -TEST(PolicyTest, InvalidPolicyDefaultRuleWithPortDenyError) { - Rule rule(POLICY_DENY_ERROR); - rule.substitute_port = mach_task_self(); - BootstrapSandboxPolicy policy; - policy.default_rule = rule; - EXPECT_FALSE(IsPolicyValid(policy)); -} - -TEST(PolicyTest, InvalidPolicyDefaultRuleWithPortDummy) { - Rule rule(POLICY_DENY_DUMMY_PORT); - rule.substitute_port = mach_task_self(); - BootstrapSandboxPolicy policy; - policy.default_rule = rule; - EXPECT_FALSE(IsPolicyValid(policy)); -} - -} // namespace sandbox |