X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=test%2Fcommon%2Ftypes%2Fpolicybucket.cpp;h=983a0409ac8a97136eee5b8788c5c33c7bd4081e;hb=94c676f6a67966566072093dadf217ddd20849a1;hp=255efeac2b233b78e73f879f950c178055b763de;hpb=8d462038cc6547e2e8d65792eaf410850cc91f9c;p=platform%2Fcore%2Fsecurity%2Fcynara.git diff --git a/test/common/types/policybucket.cpp b/test/common/types/policybucket.cpp index 255efea..983a040 100644 --- a/test/common/types/policybucket.cpp +++ b/test/common/types/policybucket.cpp @@ -14,8 +14,8 @@ * limitations under the License. */ /** - * @file policybucket.cpp - * @author Aleksander Zdyb + * @file test/common/types/policybucket.cpp + * @author Aleksander Zdyb * @version 1.0 * @brief Tests for Cynara::PolicyBucket */ @@ -62,7 +62,7 @@ protected: TEST_F(PolicyBucketFixture, filtered) { using ::testing::UnorderedElementsAre; - PolicyBucket bucket(pkPolicies); + PolicyBucket bucket("filtered", pkPolicies); bucket.setDefaultPolicy(PredefinedPolicyType::DENY); auto filtered = bucket.filtered(pk1); @@ -76,7 +76,7 @@ TEST_F(PolicyBucketFixture, filtered) { TEST_F(PolicyBucketFixture, filtered_other) { using ::testing::IsEmpty; - PolicyBucket bucket(pkPolicies); + PolicyBucket bucket("filtered_other", pkPolicies); bucket.setDefaultPolicy(PredefinedPolicyType::DENY); auto filtered = bucket.filtered(otherPk); @@ -93,7 +93,7 @@ TEST_F(PolicyBucketFixture, filtered_wildcard_1) { // Leave policies with given client, given user and any privilege auto policiesToStay = Helpers::pickFromCollection(wildcardPolicies, { 0, 1, 3 }); - PolicyBucket bucket(wildcardPolicies); + PolicyBucket bucket("filtered_wildcard_1", wildcardPolicies); auto filtered = bucket.filtered(PolicyKey("c1", "u1", "p2")); ASSERT_THAT(filtered, UnorderedElementsAreArray(policiesToStay)); } @@ -104,7 +104,7 @@ TEST_F(PolicyBucketFixture, filtered_wildcard_2) { // Leave policies with given client, given user and any privilege auto policiesToStay = Helpers::pickFromCollection(wildcardPolicies, { 2, 3 }); - PolicyBucket bucket(wildcardPolicies); + PolicyBucket bucket("filtered_wildcard_2", wildcardPolicies); auto filtered = bucket.filtered(PolicyKey("cccc", "u1", "p1")); ASSERT_THAT(filtered, UnorderedElementsAreArray(policiesToStay)); @@ -116,7 +116,7 @@ TEST_F(PolicyBucketFixture, filtered_wildcard_3) { // Leave policies with given client, given user and any privilege auto policiesToStay = Helpers::pickFromCollection(wildcardPolicies, { 0, 3 }); - PolicyBucket bucket(wildcardPolicies); + PolicyBucket bucket("filtered_wildcard_3", wildcardPolicies); auto filtered = bucket.filtered(PolicyKey("c1", "u1", "pppp")); ASSERT_THAT(filtered, UnorderedElementsAreArray(policiesToStay)); } @@ -127,7 +127,7 @@ TEST_F(PolicyBucketFixture, filtered_wildcard_4) { // Leave policies with given client, given user and any privilege auto policiesToStay = Helpers::pickFromCollection(wildcardPolicies, { 3 }); - PolicyBucket bucket(wildcardPolicies); + PolicyBucket bucket("filtered_wildcard_4", wildcardPolicies); auto filtered = bucket.filtered(PolicyKey("cccc", "uuuu", "pppp")); ASSERT_THAT(filtered, UnorderedElementsAreArray(policiesToStay)); } @@ -135,7 +135,9 @@ TEST_F(PolicyBucketFixture, filtered_wildcard_4) { TEST_F(PolicyBucketFixture, filtered_wildcard_none) { using ::testing::IsEmpty; - PolicyBucket bucket({ wildcardPolicies.begin(), wildcardPolicies.begin() + 3 }); + PolicyBucket bucket("filtered_wildcard_none", + PolicyCollection({ wildcardPolicies.begin(), + wildcardPolicies.begin() + 3 })); auto filtered = bucket.filtered(PolicyKey("cccc", "uuuu", "pppp")); ASSERT_THAT(filtered, IsEmpty()); }