Add admin API draft TC 06/61506/1
authorKyungwook Tak <k.tak@samsung.com>
Tue, 8 Mar 2016 09:21:05 +0000 (18:21 +0900)
committerKyungwook Tak <k.tak@samsung.com>
Tue, 8 Mar 2016 09:21:05 +0000 (18:21 +0900)
Change-Id: I9f8e4fd6145c3d4a16eaf64f7365584013183b6d
Signed-off-by: Kyungwook Tak <k.tak@samsung.com>
src/auth-fw-passwd/CMakeLists.txt
src/auth-fw-passwd/auth-passwd-admin.cpp
src/auth-fw-passwd/auth-passwd.cpp

index 16fd7d6e6d475d36e2e9c63b208124ac50a91b01..116f42dcd19b2fd092174cfc46571d86d5dea72b 100644 (file)
@@ -26,7 +26,7 @@ PKG_CHECK_MODULES(AFP_DEP
 SET(AFP_SOURCES
        main.cpp
        auth-passwd.cpp
-#      auth-passwd-admin.cpp # TODO: write TC for admin APIs
+       auth-passwd-admin.cpp
 )
 
 INCLUDE_DIRECTORIES(
index cc600054d60db704441ba54d5d9275d36571dc91..694807b0ab7454686ea792088c76a5c3aae96101 100644 (file)
  */
 #include <auth-passwd-admin.h>
 
+#include <unistd.h>
+
 #include <dpl/test/test_runner.h>
 
+namespace {
+
+const char *default_pass = "test-password";
+
+}
+
 RUNNER_TEST_GROUP_INIT(T0020_AUTH_FW_PASSWD_ADMIN);
 
-RUNNER_TEST(T00201_init)
+RUNNER_TEST(T00200_init)
+{
+       int ret = auth_passwd_reset_passwd(
+                       AUTH_PWD_NORMAL,
+                       getuid(),
+                       default_pass);
+
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to reset passwd of user: " << getuid() << " with ret: " << ret);
+}
+
+RUNNER_TEST(T00201_set_policy_params)
+{
+       policy_h *policy = nullptr;
+
+       int ret = auth_passwd_new_policy(&policy);
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS && policy != nullptr,
+               "Failed to make new policy. ret: " << ret);
+
+       ret = auth_passwd_set_user(policy, getuid());
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to auth_passwd_set_user. ret: " << ret);
+
+       ret = auth_passwd_set_max_attempts(policy, 10);
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to set max attempts to policy handle. ret: " << ret);
+
+       ret = auth_passwd_set_validity(policy, 1);
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to set validity days to policy handle. ret: " << ret);
+
+       ret = auth_passwd_set_history_size(policy, 5);
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to set history size to policy handle. ret: " << ret);
+
+       ret = auth_passwd_set_min_length(policy, 8);
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to set min length to policy handle. ret: " << ret);
+
+       ret = auth_passwd_set_minComplexCharNumber(policy, 2);
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to set min complex char number to policy handle. ret: " << ret);
+
+       ret = auth_passwd_set_maxCharOccurrences(policy, 2);
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to set max char occurrence number to policy handle. ret: " << ret);
+
+       ret = auth_passwd_set_maxNumSeqLength(policy, 2);
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to set max num sequence length to policy handle. ret: " << ret);
+
+       ret = auth_passwd_set_quality(policy, AUTH_PWD_QUALITY_SOMETHING);
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to set quality to policy handle. ret: " << ret);
+
+       ret = auth_passwd_set_quality(policy, AUTH_PWD_QUALITY_NUMERIC);
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to set quality to policy handle. ret: " << ret);
+
+       ret = auth_passwd_set_quality(policy, AUTH_PWD_QUALITY_ALPHABETIC);
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to set quality to policy handle. ret: " << ret);
+
+       ret = auth_passwd_set_quality(policy, AUTH_PWD_QUALITY_ALPHANUMERIC);
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to set quality to policy handle. ret: " << ret);
+
+       ret = auth_passwd_set_forbiddenPasswd(policy, "a1b2c3d4");
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to set forbidden passwd to policy handle. ret: " << ret);
+
+       ret = auth_passwd_set_policy(policy);
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to set policy. ret: " << ret);
+
+       auth_passwd_free_policy(policy);
+}
+
+RUNNER_TEST(T00202_disable_policy)
 {
+       int ret = auth_passwd_disable_policy(getuid());
+       RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
+               "Failed to disable policy for uid: " << getuid() << " ret: " << ret);
 }
index 63f1d5aa6a79927f5d9d8f79d5370a2e9bac36a3..8af817e11a2050eefac66bf843661e6e36247f8d 100644 (file)
@@ -30,7 +30,6 @@
 
 namespace {
 const char *default_pass = "test-password";
-const uid_t default_user = 5001; /* owner */
 
 struct Policy {
        unsigned int current_attempts;
@@ -112,7 +111,7 @@ RUNNER_TEST(T00110_init)
                        default_pass);
 
        RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
-               "Failed to reset passwd of user: " << default_user << " with ret: " << ret);
+               "Failed to reset passwd of user: " << getuid() << " with ret: " << ret);
 }
 
 RUNNER_TEST(T00111_check)
@@ -166,7 +165,7 @@ RUNNER_TEST(T00120_init)
                        default_pass);
 
        RUNNER_ASSERT_MSG(ret == AUTH_PASSWD_API_SUCCESS,
-               "Failed to reset passwd of user: " << default_user);
+               "Failed to reset passwd of user: " << getuid() << " with ret: " << ret);
 }
 
 RUNNER_TEST(T00121_check)