chromium/chrome/services/file_util/public/cpp/sandboxed_seven_zip_analyzer_unittest.cc

// Copyright 2022 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "chrome/services/file_util/public/cpp/sandboxed_seven_zip_analyzer.h"

#include <string>
#include <utility>

#include "base/base_paths.h"
#include "base/files/file_util.h"
#include "base/path_service.h"
#include "base/strings/string_number_conversions.h"
#include "chrome/common/safe_browsing/archive_analyzer_results.h"
#include "chrome/services/file_util/fake_file_util_service.h"
#include "chrome/services/file_util/file_util_service.h"
#include "content/public/test/browser_task_environment.h"
#include "testing/gtest/include/gtest/gtest.h"

namespace safe_browsing {

namespace {

_;

}  // namespace

class SandboxedSevenZipAnalyzerTest : public ::testing::Test {};

TEST_F(SandboxedSevenZipAnalyzerTest, NoBinaries) {}

TEST_F(SandboxedSevenZipAnalyzerTest, OneBinary) {}

TEST_F(SandboxedSevenZipAnalyzerTest, TwoBinariesAndFolder) {}

TEST_F(SandboxedSevenZipAnalyzerTest, NestedArchive) {}

TEST_F(SandboxedSevenZipAnalyzerTest, Encrypted) {}

TEST_F(SandboxedSevenZipAnalyzerTest, NotASevenZip) {}

TEST_F(SandboxedSevenZipAnalyzerTest, CanDeleteDuringExecution) {}

TEST_F(SandboxedSevenZipAnalyzerTest, InvalidPath) {}

}  // namespace safe_browsing