From 2f9aa4f5347a2731fed352d5acf6c8b460525ec5 Mon Sep 17 00:00:00 2001 From: Rafal Krypa Date: Fri, 27 Feb 2015 15:48:50 +0100 Subject: [PATCH 1/1] Invoke test cases that fork with RUNNER_MULTIPROCESS_TEST Change-Id: Ic4b83d3e96b2d987a9b4efd00c69861e5003861a --- tests/security-manager-tests/security_manager_tests.cpp | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tests/security-manager-tests/security_manager_tests.cpp b/tests/security-manager-tests/security_manager_tests.cpp index 9234d03..9849296 100644 --- a/tests/security-manager-tests/security_manager_tests.cpp +++ b/tests/security-manager-tests/security_manager_tests.cpp @@ -912,7 +912,7 @@ RUNNER_CHILD_TEST(security_manager_09_add_user_offline) check_app_after_uninstall(app_id, pkg_id, true); } -RUNNER_TEST(security_manager_10_privacy_manager_fetch_whole_policy_for_self) +RUNNER_MULTIPROCESS_TEST(security_manager_10_privacy_manager_fetch_whole_policy_for_self) { //TEST DATA const std::string username("sm_test_10_user_name"); @@ -1014,7 +1014,7 @@ RUNNER_TEST(security_manager_10_privacy_manager_fetch_whole_policy_for_self) }; } -RUNNER_TEST(security_manager_11_privacy_manager_fetch_whole_policy_for_admin_unprivileged) +RUNNER_MULTIPROCESS_TEST(security_manager_11_privacy_manager_fetch_whole_policy_for_admin_unprivileged) { //TEST DATA const std::vector usernames = {"sm_test_11_user_name_1", "sm_test_11_user_name_2"}; @@ -1133,7 +1133,7 @@ RUNNER_TEST(security_manager_11_privacy_manager_fetch_whole_policy_for_admin_unp }; } -RUNNER_TEST(security_manager_12_privacy_manager_fetch_whole_policy_for_admin_privileged) +RUNNER_MULTIPROCESS_TEST(security_manager_12_privacy_manager_fetch_whole_policy_for_admin_privileged) { //TEST DATA const std::vector usernames = {"sm_test_12_user_name_1", "sm_test_12_user_name_2"}; @@ -1251,7 +1251,7 @@ RUNNER_TEST(security_manager_12_privacy_manager_fetch_whole_policy_for_admin_pri }; } -RUNNER_TEST(security_manager_13_privacy_manager_fetch_policy_after_update_unprivileged) +RUNNER_MULTIPROCESS_TEST(security_manager_13_privacy_manager_fetch_policy_after_update_unprivileged) { //TEST DATA const std::vector usernames = {"sm_test_13_user_name_1", "sm_test_13_user_name_2"}; @@ -1426,7 +1426,7 @@ RUNNER_TEST(security_manager_13_privacy_manager_fetch_policy_after_update_unpriv }; } -RUNNER_TEST(security_manager_14_privacy_manager_fetch_and_update_policy_for_admin) +RUNNER_MULTIPROCESS_TEST(security_manager_14_privacy_manager_fetch_and_update_policy_for_admin) { //TEST DATA const std::vector usernames = {"sm_test_14_user_name_1", "sm_test_14_user_name_2"}; @@ -1861,7 +1861,7 @@ RUNNER_MULTIPROCESS_TEST(security_manager_16_policy_levels_get) } } -RUNNER_CHILD_TEST(security_manager_17_privacy_manager_delete_policy_for_self) +RUNNER_MULTIPROCESS_TEST(security_manager_17_privacy_manager_delete_policy_for_self) { const char *const update_app_id = "security_manager_17_update_app_id"; const char *const update_privilege = "http://tizen.org/privilege/led"; @@ -1978,7 +1978,7 @@ RUNNER_CHILD_TEST(security_manager_17_privacy_manager_delete_policy_for_self) } } -RUNNER_CHILD_TEST(security_manager_17_privacy_manager_fetch_whole_policy_for_self_filtered) +RUNNER_MULTIPROCESS_TEST(security_manager_17_privacy_manager_fetch_whole_policy_for_self_filtered) { const std::string username("sm_test_17_user_name"); -- 2.7.4