Fix security-server server tests 00/18400/3
authorZofia Abramowska <z.abramowska@samsung.com>
Fri, 21 Mar 2014 16:40:49 +0000 (17:40 +0100)
committerMarcin Niesluchowski <m.niesluchow@samsung.com>
Wed, 26 Mar 2014 12:59:41 +0000 (05:59 -0700)
Some of test expect to receive access denied when trying to
access security server sockets. Now these sockets are labeled
"_" so access always is granted.
Setting ignore on those test cases, which expect access denial.

Change-Id: Ibd8ec5c8b3b85ac829650f9c080983be7154b8a0

tests/security-server-tests/cookie_api.cpp
tests/security-server-tests/server.cpp

index b0751cc02b6e877e1cc41a9677f6df33c48b1a26..cc1530a874672cd82d4d00d2b41270ffb91bee8d 100644 (file)
@@ -209,6 +209,7 @@ RUNNER_CHILD_TEST(tc_unit_03_01_security_server_check_privilege)
 //privileges drop and no smack rule
 RUNNER_CHILD_TEST_SMACK(tc_unit_03_02_security_server_check_privilege)
 {
+    RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
     Cookie cookie = getCookieFromSS();
 
     SecurityServer::AccessProvider provider("selflabel_03_02");
@@ -292,6 +293,7 @@ RUNNER_CHILD_TEST(tc_unit_05_01_security_server_get_cookie_pid)
 //privileges drop and no smack rule
 RUNNER_CHILD_TEST_SMACK(tc_unit_05_02_security_server_get_cookie_pid)
 {
+    RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
     Cookie cookie = getCookieFromSS();
 
     SecurityServer::AccessProvider provider("selflabel_05_02");
@@ -335,6 +337,7 @@ RUNNER_CHILD_TEST(tc_unit_06_01_security_server_get_smacklabel_cookie)
 //privileges drop and no smack rule
 RUNNER_CHILD_TEST_SMACK(tc_unit_06_02_security_server_get_smacklabel_cookie)
 {
+    RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
     Cookie cookie = getCookieFromSS();
 
     SecurityServer::AccessProvider provider("selflabel_06_02");
@@ -401,6 +404,7 @@ RUNNER_CHILD_TEST_SMACK(tc_unit_09_01_cookie_API_access_allow)
 // disable access and drop privileges
 RUNNER_CHILD_TEST(tc_unit_09_02_cookie_API_access_deny)
 {
+    RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
     SecurityServer::AccessProvider provider("subject_1d414140");
     provider.applyAndSwithToUser(APP_UID, APP_GID);
 
index 021cd8d2566d4c10d50078582b374d2be3863fbd..c6cb45595898bd95450c5202eefbc20cba7ef9a1 100644 (file)
@@ -149,6 +149,7 @@ RUNNER_CHILD_TEST_SMACK(tc01a_security_server_app_give_access)
 
 RUNNER_CHILD_TEST_SMACK(tc01c_security_server_app_give_access_no_access)
 {
+    RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
     const char *subject = "xxx45v34sfa";
     const char *object = "yyy78x2lkjz";
 
@@ -224,6 +225,7 @@ RUNNER_CHILD_TEST_SMACK(tc03_check_API_passwd_allow)
 
 RUNNER_CHILD_TEST(tc04_check_API_passwd_denied)
 {
+    RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
     int ret = -1;
     unsigned int attempt, max_attempt, expire_sec;
 
@@ -285,6 +287,7 @@ RUNNER_CHILD_TEST_SMACK(tc07_check_API_data_share_allow)
 
 RUNNER_CHILD_TEST_SMACK(tc08_check_API_data_share_denied)
 {
+    RUNNER_IGNORED_MSG("Security-server sockets are not labeled.");
     SecurityServer::AccessProvider provider(TEST08_SUBJECT);
     provider.applyAndSwithToUser(APP_UID, APP_GID);