| Index: sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc
|
| diff --git a/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc b/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc
|
| index b3d9126bdb90700698f6c69bc775508f50b73caa..76c1ce5092f08d0a8d0f608609abb9341305d1ac 100644
|
| --- a/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc
|
| +++ b/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc
|
| @@ -41,6 +41,7 @@
|
| #include "sandbox/linux/seccomp-bpf/syscall.h"
|
| #include "sandbox/linux/seccomp-bpf/trap.h"
|
| #include "sandbox/linux/services/linux_syscalls.h"
|
| +#include "sandbox/linux/syscall_broker/broker_file_permission.h"
|
| #include "sandbox/linux/syscall_broker/broker_process.h"
|
| #include "sandbox/linux/tests/scoped_temporary_file.h"
|
| #include "sandbox/linux/tests/unit_tests.h"
|
| @@ -755,12 +756,14 @@ bool NoOpCallback() {
|
| class InitializedOpenBroker {
|
| public:
|
| InitializedOpenBroker() : initialized_(false) {
|
| - std::vector<std::string> allowed_files;
|
| - allowed_files.push_back("/proc/allowed");
|
| - allowed_files.push_back("/proc/cpuinfo");
|
| -
|
| - broker_process_.reset(new syscall_broker::BrokerProcess(
|
| - EPERM, allowed_files, std::vector<std::string>()));
|
| + std::vector<syscall_broker::BrokerFilePermission> permissions;
|
| + permissions.push_back(
|
| + syscall_broker::BrokerFilePermission::ReadOnly("/proc/allowed"));
|
| + permissions.push_back(
|
| + syscall_broker::BrokerFilePermission::ReadOnly("/proc/cpuinfo"));
|
| +
|
| + broker_process_.reset(
|
| + new syscall_broker::BrokerProcess(EPERM, permissions));
|
| BPF_ASSERT(broker_process() != NULL);
|
| BPF_ASSERT(broker_process_->Init(base::Bind(&NoOpCallback)));
|
|
|
|
|