From: Zofia Abramowska Date: Fri, 21 Mar 2014 16:40:49 +0000 (+0100) Subject: Fix security-server server tests X-Git-Tag: security-manager_5.5_testing~272 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=df5967df7e0c2d61ca4829c3add727a1696cd058;p=platform%2Fcore%2Ftest%2Fsecurity-tests.git Fix security-server server tests Some of test expect to receive access denied when trying to access security server sockets. Now these sockets are labeled "_" so access always is granted. Setting ignore on those test cases, which expect access denial. Change-Id: Ibd8ec5c8b3b85ac829650f9c080983be7154b8a0 --- diff --git a/tests/security-server-tests/cookie_api.cpp b/tests/security-server-tests/cookie_api.cpp index b0751cc0..cc1530a8 100644 --- a/tests/security-server-tests/cookie_api.cpp +++ b/tests/security-server-tests/cookie_api.cpp @@ -209,6 +209,7 @@ RUNNER_CHILD_TEST(tc_unit_03_01_security_server_check_privilege) //privileges drop and no smack rule RUNNER_CHILD_TEST_SMACK(tc_unit_03_02_security_server_check_privilege) { + RUNNER_IGNORED_MSG("Security-server sockets are not labeled."); Cookie cookie = getCookieFromSS(); SecurityServer::AccessProvider provider("selflabel_03_02"); @@ -292,6 +293,7 @@ RUNNER_CHILD_TEST(tc_unit_05_01_security_server_get_cookie_pid) //privileges drop and no smack rule RUNNER_CHILD_TEST_SMACK(tc_unit_05_02_security_server_get_cookie_pid) { + RUNNER_IGNORED_MSG("Security-server sockets are not labeled."); Cookie cookie = getCookieFromSS(); SecurityServer::AccessProvider provider("selflabel_05_02"); @@ -335,6 +337,7 @@ RUNNER_CHILD_TEST(tc_unit_06_01_security_server_get_smacklabel_cookie) //privileges drop and no smack rule RUNNER_CHILD_TEST_SMACK(tc_unit_06_02_security_server_get_smacklabel_cookie) { + RUNNER_IGNORED_MSG("Security-server sockets are not labeled."); Cookie cookie = getCookieFromSS(); SecurityServer::AccessProvider provider("selflabel_06_02"); @@ -401,6 +404,7 @@ RUNNER_CHILD_TEST_SMACK(tc_unit_09_01_cookie_API_access_allow) // disable access and drop privileges RUNNER_CHILD_TEST(tc_unit_09_02_cookie_API_access_deny) { + RUNNER_IGNORED_MSG("Security-server sockets are not labeled."); SecurityServer::AccessProvider provider("subject_1d414140"); provider.applyAndSwithToUser(APP_UID, APP_GID); diff --git a/tests/security-server-tests/server.cpp b/tests/security-server-tests/server.cpp index 021cd8d2..c6cb4559 100644 --- a/tests/security-server-tests/server.cpp +++ b/tests/security-server-tests/server.cpp @@ -149,6 +149,7 @@ RUNNER_CHILD_TEST_SMACK(tc01a_security_server_app_give_access) RUNNER_CHILD_TEST_SMACK(tc01c_security_server_app_give_access_no_access) { + RUNNER_IGNORED_MSG("Security-server sockets are not labeled."); const char *subject = "xxx45v34sfa"; const char *object = "yyy78x2lkjz"; @@ -224,6 +225,7 @@ RUNNER_CHILD_TEST_SMACK(tc03_check_API_passwd_allow) RUNNER_CHILD_TEST(tc04_check_API_passwd_denied) { + RUNNER_IGNORED_MSG("Security-server sockets are not labeled."); int ret = -1; unsigned int attempt, max_attempt, expire_sec; @@ -285,6 +287,7 @@ RUNNER_CHILD_TEST_SMACK(tc07_check_API_data_share_allow) RUNNER_CHILD_TEST_SMACK(tc08_check_API_data_share_denied) { + RUNNER_IGNORED_MSG("Security-server sockets are not labeled."); SecurityServer::AccessProvider provider(TEST08_SUBJECT); provider.applyAndSwithToUser(APP_UID, APP_GID);