Fix typo 02/319602/4
authorKrzysztof Malysa <k.malysa@samsung.com>
Thu, 13 Feb 2025 09:59:36 +0000 (10:59 +0100)
committerKrzysztof Malysa <k.malysa@samsung.com>
Thu, 13 Feb 2025 11:27:23 +0000 (12:27 +0100)
Change-Id: I75cdbd481ae0e2241f73679c0124c580a9c63969

src/security-manager-tests/test_cases_prepare_app.cpp

index 7e4f7a33f44fa3752d38fe78fb12248488878ca5..9d34968b523e972ea60c5e9e758692f40179e564 100644 (file)
@@ -326,7 +326,7 @@ RUNNER_CHILD_TEST(security_manager_101_create_namespace_test_p)
     pid_t pid = fork();
     RUNNER_ASSERT_ERRNO_MSG(pid >= 0, "Fork failed");
     if (pid == 0) {
-        synchPipe.claimParentEp();
+        synchPipe.claimChildEp();
         RUNNER_ASSERT_ERRNO_MSG(setLauncherSecurityAttributes(tmpUser) == 0, "launcher failed");
         Api::prepareAppCandidate();
         Api::prepareApp(app.getAppId());
@@ -335,7 +335,7 @@ RUNNER_CHILD_TEST(security_manager_101_create_namespace_test_p)
 
         exit(0);
     } else {
-        synchPipe.claimChildEp();
+        synchPipe.claimParentEp();
         synchPipe.wait();
 
         std::string appBindPath = std::string("/var/run/user/") + tmpUser.getUidString()
@@ -373,7 +373,7 @@ RUNNER_CHILD_TEST(security_manager_102_check_propagation_test)
     pid_t pid = fork();
     RUNNER_ASSERT_ERRNO_MSG(pid >= 0, "Fork failed");
     if (pid == 0) {
-        synchPipe.claimParentEp();
+        synchPipe.claimChildEp();
         RUNNER_ASSERT_ERRNO_MSG(setLauncherSecurityAttributes(tmpUser) == 0, "launcher failed");
         Api::prepareAppCandidate();
         Api::prepareApp(app.getAppId());
@@ -382,7 +382,7 @@ RUNNER_CHILD_TEST(security_manager_102_check_propagation_test)
 
         exit(0);
     } else {
-        synchPipe.claimChildEp();
+        synchPipe.claimParentEp();
         synchPipe.wait();
 
         bool result = isPathBound(ACCESS_DENIED_DIR_PATH, EXTERNAL_STORAGE_DIR_PATH, pid);
@@ -418,7 +418,7 @@ RUNNER_CHILD_TEST(security_manager_103_policy_change_test)
     pid_t pid = fork();
     RUNNER_ASSERT_ERRNO_MSG(pid >= 0, "Fork failed");
     if (pid == 0) {
-        synchPipe.claimParentEp();
+        synchPipe.claimChildEp();
         RUNNER_ASSERT_ERRNO_MSG(setLauncherSecurityAttributes(tmpUser) == 0, "launcher failed");
         Api::prepareAppCandidate();
         Api::prepareApp(app.getAppId());
@@ -427,7 +427,7 @@ RUNNER_CHILD_TEST(security_manager_103_policy_change_test)
 
         exit(0);
     } else {
-        synchPipe.claimChildEp();
+        synchPipe.claimParentEp();
         synchPipe.wait();
 
         bool result = isPathBound(ACCESS_DENIED_DIR_PATH, EXTERNAL_STORAGE_DIR_PATH, pid);
@@ -489,7 +489,7 @@ RUNNER_CHILD_TEST(security_manager_104_policy_change_kill_app_test)
     pid_t pid = fork();
     RUNNER_ASSERT_ERRNO_MSG(pid >= 0, "Fork failed");
     if (pid == 0) {
-        synchPipe.claimParentEp();
+        synchPipe.claimChildEp();
         try {
             RUNNER_ASSERT_ERRNO_MSG(setLauncherSecurityAttributes(tmpUser) == 0, "launcher failed");
             Api::prepareAppCandidate();
@@ -501,7 +501,7 @@ RUNNER_CHILD_TEST(security_manager_104_policy_change_kill_app_test)
         synchPipe.post();
         exit(0);
     } else {
-        synchPipe.claimChildEp();
+        synchPipe.claimParentEp();
         synchPipe.wait();
 
         PolicyRequest policyRequest;