using namespace CynaraTestAdmin;
using namespace CynaraTestClient;
-void tc01_cynara_initialize_func()
+RUNNER_TEST_GROUP_INIT(cynara_tests)
+
+RUN_CYNARA_TEST(tc01_cynara_initialize)
{
Client();
}
-void tc02_admin_initialize_func()
+RUN_CYNARA_TEST(tc02_admin_initialize)
{
Admin admin;
}
-void tc03_cynara_check_invalid_params_func()
+RUN_CYNARA_TEST(tc03_cynara_check_invalid_params)
{
Client cynara;
admin.setPolicies(cp, CYNARA_API_INVALID_PARAM);
}
-void tc04_admin_set_policies_invalid_params_func()
+RUN_CYNARA_TEST(tc04_admin_set_policies_invalid_params)
{
Admin admin;
checkInvalidPolicy(admin, bucket, client, user, privilege, resultNone, resultExtra);
}
-void tc05_admin_set_bucket_invalid_params_func()
+RUN_CYNARA_TEST(tc05_admin_set_bucket_invalid_params)
{
Admin admin;
admin.setBucket(bucket, operationNone, extra, CYNARA_API_OPERATION_NOT_ALLOWED);
}
-void tc06_cynara_check_empty_admin1_func()
+RUN_CYNARA_TEST(tc06_cynara_check_empty_admin1)
{
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc06_cynara_check_empty_admin2_func()
+RUN_CYNARA_TEST(tc06_cynara_check_empty_admin2)
{
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc07_admin_set_bucket_admin_allow_deny_func()
+RUN_CYNARA_TEST(tc07_admin_set_bucket_admin_allow_deny)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc08_admin_set_policies_allow_remove1_func()
+RUN_CYNARA_TEST(tc08_admin_set_policies_allow_remove1)
{
Admin admin;
Client cynara;
cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_ACCESS_DENIED);
}
-void tc08_admin_set_policies_allow_remove2_func()
+RUN_CYNARA_TEST(tc08_admin_set_policies_allow_remove2)
{
Admin admin;
Client cynara;
cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_ACCESS_DENIED);
}
-void tc08_admin_set_policies_allow_remove3_func()
+RUN_CYNARA_TEST(tc08_admin_set_policies_allow_remove3)
{
Admin admin;
Client cynara;
admin.setPolicies(cp);
}
-void tc09_admin_set_policies_wildcard_accesses_func()
+RUN_CYNARA_TEST(tc09_admin_set_policies_wildcard_accesses)
{
const char *bucket = CYNARA_ADMIN_DEFAULT_BUCKET;
const char *session = "session09";
checkAllDeny(data, session);
}
-void tc10_admin_change_extra_bucket_func()
+RUN_CYNARA_TEST(tc10_admin_change_extra_bucket)
{
Admin admin;
Client cynara;
admin.setBucket(bucket, CYNARA_ADMIN_DELETE, extra);
}
-void tc11_admin_bucket_not_found_func()
+RUN_CYNARA_TEST(tc11_admin_bucket_not_found)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc12_admin_delete_bucket_with_policies_pointing_to_it_func()
+RUN_CYNARA_TEST(tc12_admin_delete_bucket_with_policies_pointing_to_it)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc13_admin_set_policies_to_extra_bucket_func()
+RUN_CYNARA_TEST(tc13_admin_set_policies_to_extra_bucket)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc14_admin_set_policies_integrity_func()
+RUN_CYNARA_TEST(tc14_admin_set_policies_integrity)
{
const char *bucketDefault = CYNARA_ADMIN_DEFAULT_BUCKET;
const char *bucket = "bucket14";
}
}
-void tc15_admin_set_bucket_admin_none1_func()
+RUN_CYNARA_TEST(tc15_admin_set_bucket_admin_none1)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_ALLOWED);
}
-void tc15_admin_set_bucket_admin_none2_func()
+RUN_CYNARA_TEST(tc15_admin_set_bucket_admin_none2)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc15_admin_set_bucket_admin_none3_func()
+RUN_CYNARA_TEST(tc15_admin_set_bucket_admin_none3)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_ALLOWED);
}
-void tc16_admin_check_single_bucket_func()
+RUN_CYNARA_TEST(tc16_admin_check_single_bucket)
{
const char *bucketDefault = CYNARA_ADMIN_DEFAULT_BUCKET;
const char *client = "client16";
CYNARA_ADMIN_ALLOW, nullptr, CYNARA_API_SUCCESS);
}
-void tc17_admin_check_nested_bucket_func()
+RUN_CYNARA_TEST(tc17_admin_check_nested_bucket)
{
const char *bucketDefault = CYNARA_ADMIN_DEFAULT_BUCKET;
const char *bucket = "bucket17";
CYNARA_ADMIN_ALLOW, nullptr, CYNARA_API_SUCCESS);
}
-void tc18_admin_check_multiple_matches_func()
+RUN_CYNARA_TEST(tc18_admin_check_multiple_matches)
{
const char *bucketDefault = CYNARA_ADMIN_DEFAULT_BUCKET;
const char *client = "client18";
check(CYNARA_ADMIN_ALLOW);
}
-void tc19_admin_check_none_bucket_func()
+RUN_CYNARA_TEST(tc19_admin_check_none_bucket)
{
const char *bucketDefault = CYNARA_ADMIN_DEFAULT_BUCKET;
const char *bucket1 = "bucket19_a";
CYNARA_ADMIN_ALLOW, nullptr, CYNARA_API_SUCCESS);
}
-void tc20_admin_list_empty_bucket_func()
+RUN_CYNARA_TEST(tc20_admin_list_empty_bucket)
{
const char *emptyBucket = "empty_bucket20";
const char *client = "client20";
admin.listPolicies(emptyBucket, client, user, privilege, emptyPolicies);
}
-void tc21_admin_list_no_bucket_func()
+RUN_CYNARA_TEST(tc21_admin_list_no_bucket)
{
const char *emptyBucket = "empty_bucket21";
const char *notExistingBucket = "not_existing_bucket21";
CYNARA_API_BUCKET_NOT_FOUND);
}
-void tc22_admin_list_bucket_func()
+RUN_CYNARA_TEST(tc22_admin_list_bucket)
{
const char *bucket = "bucket22";
const char *emptyBucket = "empty_bucket22";
admin.listPolicies(bucket, client, wildcard, any, expectedPolicies);
}
-void tc23_admin_erase_empty_bucket_func()
+RUN_CYNARA_TEST(tc23_admin_erase_empty_bucket)
{
const char *emptyBucket = "empty_bucket23";
const char *client = "client23";
admin.erasePolicies(emptyBucket, recursive, client, user, privilege);
}
-void tc24_admin_erase_no_bucket_func()
+RUN_CYNARA_TEST(tc24_admin_erase_no_bucket)
{
const char *emptyBucket = "empty_bucket24";
const char *notExistingBucket = "not_existing_bucket24";
CYNARA_API_BUCKET_NOT_FOUND);
}
-void tc25_admin_erase_single_bucket_func()
+RUN_CYNARA_TEST(tc25_admin_erase_single_bucket)
{
const char *bucket = "bucket25";
const char *emptyBucket = "empty_bucket25";
}
}
-void tc26_admin_erase_recursive_not_linked_buckets_func()
+RUN_CYNARA_TEST(tc26_admin_erase_recursive_not_linked_buckets)
{
const char *bucket = "bucket26";
const char *subBucket = "sub_bucket26";
}
}
-void tc27_admin_erase_recursive_linked_buckets_func()
+RUN_CYNARA_TEST(tc27_admin_erase_recursive_linked_buckets)
{
const char *bucket = "bucket27";
const char *subBucket = "sub_bucket27";
}
}
-void tc28_admin_erase_non_recursive_linked_buckets_func()
+RUN_CYNARA_TEST(tc28_admin_erase_non_recursive_linked_buckets)
{
const char *bucket = "bucket28";
const char *subBucket = "sub_bucket28";
}
}
-void tc29_admin_erase_recursive_from_sub_bucket_func()
+RUN_CYNARA_TEST(tc29_admin_erase_recursive_from_sub_bucket)
{
const char *bucket = "bucket29";
const char *subBucket = "sub_bucket29";
admin.listPoliciesDescriptions(expectedDescriptions);
}
-void tc30_admin_list_descriptions_no_plugins_func()
+RUN_CYNARA_TEST(tc30_admin_list_descriptions_no_plugins)
{
testPlugins({});
}
-void tc31_admin_list_descriptions_1_plugin_single_policy_func()
+RUN_CYNARA_TEST(tc31_admin_list_descriptions_1_plugin_single_policy)
{
testPlugins({CynaraTestPlugins::SINGLE_POLICY});
}
-void tc32_admin_list_descriptions_1_plugin_multiple_policy_func()
+RUN_CYNARA_TEST(tc32_admin_list_descriptions_1_plugin_multiple_policy)
{
testPlugins({CynaraTestPlugins::MULTIPLE_POLICY});
}
-void tc33_admin_list_descriptions_multiple_plugins_func()
+RUN_CYNARA_TEST(tc33_admin_list_descriptions_multiple_plugins)
{
testPlugins({CynaraTestPlugins::SINGLE_POLICY,
CynaraTestPlugins::MULTIPLE_POLICY});
}
-
-RUNNER_TEST_GROUP_INIT(cynara_tests)
-
-RUN_CYNARA_TEST(tc01_cynara_initialize)
-RUN_CYNARA_TEST(tc02_admin_initialize)
-RUN_CYNARA_TEST(tc03_cynara_check_invalid_params)
-RUN_CYNARA_TEST(tc04_admin_set_policies_invalid_params)
-RUN_CYNARA_TEST(tc05_admin_set_bucket_invalid_params)
-RUN_CYNARA_TEST(tc06_cynara_check_empty_admin1)
-RUN_CYNARA_TEST(tc06_cynara_check_empty_admin2)
-RUN_CYNARA_TEST(tc07_admin_set_bucket_admin_allow_deny)
-RUN_CYNARA_TEST(tc08_admin_set_policies_allow_remove1)
-RUN_CYNARA_TEST(tc08_admin_set_policies_allow_remove2)
-RUN_CYNARA_TEST(tc08_admin_set_policies_allow_remove3)
-RUN_CYNARA_TEST(tc09_admin_set_policies_wildcard_accesses)
-RUN_CYNARA_TEST(tc10_admin_change_extra_bucket)
-RUN_CYNARA_TEST(tc11_admin_bucket_not_found)
-RUN_CYNARA_TEST(tc12_admin_delete_bucket_with_policies_pointing_to_it)
-RUN_CYNARA_TEST(tc13_admin_set_policies_to_extra_bucket)
-RUN_CYNARA_TEST(tc14_admin_set_policies_integrity)
-RUN_CYNARA_TEST(tc15_admin_set_bucket_admin_none1)
-RUN_CYNARA_TEST(tc15_admin_set_bucket_admin_none2)
-RUN_CYNARA_TEST(tc15_admin_set_bucket_admin_none3)
-RUN_CYNARA_TEST(tc16_admin_check_single_bucket)
-RUN_CYNARA_TEST(tc17_admin_check_nested_bucket)
-RUN_CYNARA_TEST(tc18_admin_check_multiple_matches)
-RUN_CYNARA_TEST(tc19_admin_check_none_bucket)
-RUN_CYNARA_TEST(tc20_admin_list_empty_bucket)
-RUN_CYNARA_TEST(tc21_admin_list_no_bucket)
-RUN_CYNARA_TEST(tc22_admin_list_bucket)
-RUN_CYNARA_TEST(tc23_admin_erase_empty_bucket)
-RUN_CYNARA_TEST(tc24_admin_erase_no_bucket)
-RUN_CYNARA_TEST(tc25_admin_erase_single_bucket)
-RUN_CYNARA_TEST(tc26_admin_erase_recursive_not_linked_buckets)
-RUN_CYNARA_TEST(tc27_admin_erase_recursive_linked_buckets)
-RUN_CYNARA_TEST(tc28_admin_erase_non_recursive_linked_buckets)
-RUN_CYNARA_TEST(tc29_admin_erase_recursive_from_sub_bucket)
-RUN_CYNARA_TEST(tc30_admin_list_descriptions_no_plugins)
-RUN_CYNARA_TEST(tc31_admin_list_descriptions_1_plugin_single_policy)
-RUN_CYNARA_TEST(tc32_admin_list_descriptions_1_plugin_multiple_policy)
-RUN_CYNARA_TEST(tc33_admin_list_descriptions_multiple_plugins)