summaryrefslogtreecommitdiff
path: root/sandbox/mac/policy_unittest.cc
diff options
context:
space:
mode:
Diffstat (limited to 'sandbox/mac/policy_unittest.cc')
-rw-r--r--sandbox/mac/policy_unittest.cc98
1 files changed, 0 insertions, 98 deletions
diff --git a/sandbox/mac/policy_unittest.cc b/sandbox/mac/policy_unittest.cc
deleted file mode 100644
index 54e0e74895..0000000000
--- a/sandbox/mac/policy_unittest.cc
+++ /dev/null
@@ -1,98 +0,0 @@
-// Copyright 2014 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "sandbox/mac/policy.h"
-
-#include "testing/gtest/include/gtest/gtest.h"
-
-namespace sandbox {
-
-TEST(PolicyTest, ValidEmptyPolicy) {
- EXPECT_TRUE(IsPolicyValid(BootstrapSandboxPolicy()));
-}
-
-TEST(PolicyTest, ValidPolicy) {
- BootstrapSandboxPolicy policy;
- policy.rules["allow"] = Rule(POLICY_ALLOW);
- policy.rules["deny_error"] = Rule(POLICY_DENY_ERROR);
- policy.rules["deny_dummy"] = Rule(POLICY_DENY_DUMMY_PORT);
- policy.rules["substitue"] = Rule(mach_task_self());
- EXPECT_TRUE(IsPolicyValid(policy));
-}
-
-TEST(PolicyTest, InvalidPolicyEmptyRule) {
- Rule rule;
- BootstrapSandboxPolicy policy;
- policy.rules["test"] = rule;
- EXPECT_FALSE(IsPolicyValid(policy));
-}
-
-TEST(PolicyTest, InvalidPolicySubstitue) {
- Rule rule(POLICY_SUBSTITUTE_PORT);
- BootstrapSandboxPolicy policy;
- policy.rules["test"] = rule;
- EXPECT_FALSE(IsPolicyValid(policy));
-}
-
-TEST(PolicyTest, InvalidPolicyWithPortAllow) {
- Rule rule(POLICY_ALLOW);
- rule.substitute_port = mach_task_self();
- BootstrapSandboxPolicy policy;
- policy.rules["allow"] = rule;
- EXPECT_FALSE(IsPolicyValid(policy));
-}
-
-TEST(PolicyTest, InvalidPolicyWithPortDenyError) {
- Rule rule(POLICY_DENY_ERROR);
- rule.substitute_port = mach_task_self();
- BootstrapSandboxPolicy policy;
- policy.rules["deny_error"] = rule;
- EXPECT_FALSE(IsPolicyValid(policy));
-}
-
-TEST(PolicyTest, InvalidPolicyWithPortDummy) {
- Rule rule(POLICY_DENY_DUMMY_PORT);
- rule.substitute_port = mach_task_self();
- BootstrapSandboxPolicy policy;
- policy.rules["deny_dummy"] = rule;
- EXPECT_FALSE(IsPolicyValid(policy));
-}
-
-TEST(PolicyTest, InvalidPolicyDefaultRule) {
- BootstrapSandboxPolicy policy;
- policy.default_rule = Rule();
- EXPECT_FALSE(IsPolicyValid(policy));
-}
-
-TEST(PolicyTest, InvalidPolicyDefaultRuleSubstitue) {
- BootstrapSandboxPolicy policy;
- policy.default_rule = Rule(POLICY_SUBSTITUTE_PORT);
- EXPECT_FALSE(IsPolicyValid(policy));
-}
-
-TEST(PolicyTest, InvalidPolicyDefaultRuleWithPortAllow) {
- Rule rule(POLICY_ALLOW);
- rule.substitute_port = mach_task_self();
- BootstrapSandboxPolicy policy;
- policy.default_rule = rule;
- EXPECT_FALSE(IsPolicyValid(policy));
-}
-
-TEST(PolicyTest, InvalidPolicyDefaultRuleWithPortDenyError) {
- Rule rule(POLICY_DENY_ERROR);
- rule.substitute_port = mach_task_self();
- BootstrapSandboxPolicy policy;
- policy.default_rule = rule;
- EXPECT_FALSE(IsPolicyValid(policy));
-}
-
-TEST(PolicyTest, InvalidPolicyDefaultRuleWithPortDummy) {
- Rule rule(POLICY_DENY_DUMMY_PORT);
- rule.substitute_port = mach_task_self();
- BootstrapSandboxPolicy policy;
- policy.default_rule = rule;
- EXPECT_FALSE(IsPolicyValid(policy));
-}
-
-} // namespace sandbox