From: Krzysztof Malysa Date: Thu, 13 Feb 2025 09:59:36 +0000 (+0100) Subject: Fix typo X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=d9f22a15e6b8aeb609af0df82d65bc59c7f71b67;p=platform%2Fcore%2Ftest%2Fsecurity-tests.git Fix typo Change-Id: I75cdbd481ae0e2241f73679c0124c580a9c63969 --- diff --git a/src/security-manager-tests/test_cases_prepare_app.cpp b/src/security-manager-tests/test_cases_prepare_app.cpp index 7e4f7a33..9d34968b 100644 --- a/src/security-manager-tests/test_cases_prepare_app.cpp +++ b/src/security-manager-tests/test_cases_prepare_app.cpp @@ -326,7 +326,7 @@ RUNNER_CHILD_TEST(security_manager_101_create_namespace_test_p) pid_t pid = fork(); RUNNER_ASSERT_ERRNO_MSG(pid >= 0, "Fork failed"); if (pid == 0) { - synchPipe.claimParentEp(); + synchPipe.claimChildEp(); RUNNER_ASSERT_ERRNO_MSG(setLauncherSecurityAttributes(tmpUser) == 0, "launcher failed"); Api::prepareAppCandidate(); Api::prepareApp(app.getAppId()); @@ -335,7 +335,7 @@ RUNNER_CHILD_TEST(security_manager_101_create_namespace_test_p) exit(0); } else { - synchPipe.claimChildEp(); + synchPipe.claimParentEp(); synchPipe.wait(); std::string appBindPath = std::string("/var/run/user/") + tmpUser.getUidString() @@ -373,7 +373,7 @@ RUNNER_CHILD_TEST(security_manager_102_check_propagation_test) pid_t pid = fork(); RUNNER_ASSERT_ERRNO_MSG(pid >= 0, "Fork failed"); if (pid == 0) { - synchPipe.claimParentEp(); + synchPipe.claimChildEp(); RUNNER_ASSERT_ERRNO_MSG(setLauncherSecurityAttributes(tmpUser) == 0, "launcher failed"); Api::prepareAppCandidate(); Api::prepareApp(app.getAppId()); @@ -382,7 +382,7 @@ RUNNER_CHILD_TEST(security_manager_102_check_propagation_test) exit(0); } else { - synchPipe.claimChildEp(); + synchPipe.claimParentEp(); synchPipe.wait(); bool result = isPathBound(ACCESS_DENIED_DIR_PATH, EXTERNAL_STORAGE_DIR_PATH, pid); @@ -418,7 +418,7 @@ RUNNER_CHILD_TEST(security_manager_103_policy_change_test) pid_t pid = fork(); RUNNER_ASSERT_ERRNO_MSG(pid >= 0, "Fork failed"); if (pid == 0) { - synchPipe.claimParentEp(); + synchPipe.claimChildEp(); RUNNER_ASSERT_ERRNO_MSG(setLauncherSecurityAttributes(tmpUser) == 0, "launcher failed"); Api::prepareAppCandidate(); Api::prepareApp(app.getAppId()); @@ -427,7 +427,7 @@ RUNNER_CHILD_TEST(security_manager_103_policy_change_test) exit(0); } else { - synchPipe.claimChildEp(); + synchPipe.claimParentEp(); synchPipe.wait(); bool result = isPathBound(ACCESS_DENIED_DIR_PATH, EXTERNAL_STORAGE_DIR_PATH, pid); @@ -489,7 +489,7 @@ RUNNER_CHILD_TEST(security_manager_104_policy_change_kill_app_test) pid_t pid = fork(); RUNNER_ASSERT_ERRNO_MSG(pid >= 0, "Fork failed"); if (pid == 0) { - synchPipe.claimParentEp(); + synchPipe.claimChildEp(); try { RUNNER_ASSERT_ERRNO_MSG(setLauncherSecurityAttributes(tmpUser) == 0, "launcher failed"); Api::prepareAppCandidate(); @@ -501,7 +501,7 @@ RUNNER_CHILD_TEST(security_manager_104_policy_change_kill_app_test) synchPipe.post(); exit(0); } else { - synchPipe.claimChildEp(); + synchPipe.claimParentEp(); synchPipe.wait(); PolicyRequest policyRequest;