admin.setBucket(bucket, CYNARA_ADMIN_ALLOW, extra);
- cynara.check(client, session, user, privilege, CYNARA_API_SUCCESS);
+ cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_ALLOWED);
admin.setBucket(bucket, CYNARA_ADMIN_DENY, extra);
cp.add(bucket, data[0][0], data[0][1], data[0][2], resultAllow, resultExtra);
admin.setPolicies(cp);
}
- cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_SUCCESS);
+ cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_ACCESS_ALLOWED);
cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_ACCESS_DENIED);
// allow second policy
cp.add(bucket, data[1][0], data[1][1], data[1][2], resultAllow, resultExtra);
admin.setPolicies(cp);
}
- cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_SUCCESS);
- cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_SUCCESS);
+ cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_ACCESS_ALLOWED);
+ cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_ACCESS_ALLOWED);
// delete first policy
{
admin.setPolicies(cp);
}
cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_ACCESS_DENIED);
- cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_SUCCESS);
+ cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_ACCESS_ALLOWED);
// delete second policy
{
cp.add(bucket, data[0][0], data[0][1], data[0][2], resultAllow, resultExtra);
admin.setPolicies(cp);
}
- cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_SUCCESS);
+ cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_ACCESS_ALLOWED);
cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_ACCESS_DENIED);
// delete first, allow second policy
admin.setPolicies(cp);
}
cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_ACCESS_DENIED);
- cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_SUCCESS);
+ cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_ACCESS_ALLOWED);
// delete second policy
{
cp.add(bucket, data[1][0], data[1][1], data[1][2], resultAllow, resultExtra);
admin.setPolicies(cp);
}
- cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_SUCCESS);
- cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_SUCCESS);
+ cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_ACCESS_ALLOWED);
+ cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_ACCESS_ALLOWED);
// delete first and second policy
{
if ((u == 0 && p == 0)
|| (c == 1 && p == 1)
|| (c == 2 && u == 2)) {
- cynara.check(data[c][0], session, data[u][1], data[p][2], CYNARA_API_SUCCESS);
+ cynara.check(data[c][0], session, data[u][1], data[p][2], CYNARA_API_ACCESS_ALLOWED);
} else {
cynara.check(data[c][0], session, data[u][1], data[p][2], CYNARA_API_ACCESS_DENIED);
}
admin.setPolicies(cp);
}
- cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_SUCCESS);
+ cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_ACCESS_ALLOWED);
cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_ACCESS_DENIED);
admin.setBucket(bucket, CYNARA_ADMIN_DENY, extra);
admin.setBucket(bucket, CYNARA_ADMIN_ALLOW, extra);
- cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_SUCCESS);
+ cynara.check(data[0][0], session, data[0][1], data[0][2], CYNARA_API_ACCESS_ALLOWED);
cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_ACCESS_DENIED);
{
CYNARA_ADMIN_BUCKET, bucket);
admin.setPolicies(cp);
}
- cynara.check(client, session, user, privilege, CYNARA_API_SUCCESS);
+ cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_ALLOWED);
admin.setBucket(bucket, CYNARA_ADMIN_DELETE, extra);
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
CYNARA_ADMIN_ALLOW, extraResult);
admin.setPolicies(cp);
}
- cynara.check(client, session, user, privilege, CYNARA_API_SUCCESS);
+ cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_ALLOWED);
admin.setBucket(bucket, CYNARA_ADMIN_DELETE, extra);
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
CYNARA_ADMIN_ALLOW, extraResult);
admin.setPolicies(cp);
}
- cynara.check(client, session, user, privilege, CYNARA_API_SUCCESS);
+ cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_ALLOWED);
}
void tc15_admin_set_bucket_admin_none2_func()
CYNARA_ADMIN_ALLOW, extraResult);
admin.setPolicies(cp);
}
- cynara.check(client, session, user, privilege, CYNARA_API_SUCCESS);
+ cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_ALLOWED);
}
void tc16_admin_check_single_bucket_func()