*/
#include <cynara_test_commons.h>
-#include <cynara_test_env.h>
#include <cynara_test_file_operations.h>
#include <cynara_test_cynara_mask.h>
}
-void environmentWrap(const char *testName, const std::function<void(void)> &func)
-{
- CynaraTestEnv env(testName);
- env.save();
- env.loadDefaultDatabase();
-
- try {
- func();
- } catch (const DPL::Test::TestException &e) {
- env.restore();
- throw;
- } catch (const DPL::Exception &e) {
- env.restore();
- throw;
- } catch (const std::exception &e) {
- env.restore();
- throw;
- } catch (...) {
- env.restore();
- throw std::runtime_error("Unknown exception");
- }
- env.restore();
-}
-
void loadServicePlugins(const DirectoryPaths &pluginDirectories)
{
CynaraMask mask;
#ifndef CYNARA_TEST_COMMONS_H_
#define CYNARA_TEST_COMMONS_H_
-#include <functional>
#include <string>
#include <vector>
+#include <cynara_test_env.h>
+
+#include <dpl/test/test_runner.h>
+
namespace CynaraTestConsts
{
const char *m_privilege;
};
-void environmentWrap(const char *testName, const std::function<void(void)> &func);
-
#define RUN_CYNARA_TEST(Proc) \
- RUNNER_TEST(Proc) \
- { \
- environmentWrap(#Proc, Proc##_func); \
- }
+ RUNNER_TEST(Proc, CynaraTestEnv) \
typedef std::vector<std::string> DirectoryPaths;
void loadServicePlugins(const DirectoryPaths &pluginDirectories);
using namespace FileOperations;
-CynaraTestEnv::CynaraTestEnv(const char *dirName)
+CynaraTestEnv::CynaraTestEnv()
: m_dbPresent(false)
{
- m_saveDir = TMP_DIR + "/" + dirName;
- m_dbSaveDir = m_saveDir + "/db";
- m_pluginsSaveDir = m_saveDir + "/plugins";
- m_defaultDir = "/etc/security-tests/db_patterns/default";
}
CynaraTestEnv::~CynaraTestEnv()
{
}
-void CynaraTestEnv::save()
+void CynaraTestEnv::init(const std::string &testName)
{
+ m_saveDir = TMP_DIR + "/" + testName;
+ m_dbSaveDir = m_saveDir + "/db";
+ m_pluginsSaveDir = m_saveDir + "/plugins";
+ m_defaultDir = "/etc/security-tests/db_patterns/default";
+
CynaraMask mask;
removeDirFiles(m_dbSaveDir);
}
makeDir(m_pluginsSaveDir);
copyCynaraFiles(CynaraTestConsts::SERVICE_PLUGINS_DIR, m_pluginsSaveDir);
+ unmaskedLoadDefaultDatabase();
}
-void CynaraTestEnv::restore()
+void CynaraTestEnv::finish()
{
CynaraMask mask;
removeDirIfExists(m_saveDir);
}
-void CynaraTestEnv::loadDefaultDatabase()
+void CynaraTestEnv::unmaskedLoadDefaultDatabase()
{
- CynaraMask mask;
-
if (m_dbPresent) {
removeDirFiles(CynaraTestConsts::DB_DIR);
copyCynaraFiles(m_defaultDir, CynaraTestConsts::DB_DIR);
}
}
+
+void CynaraTestEnv::loadDefaultDatabase()
+{
+ CynaraMask mask;
+ unmaskedLoadDefaultDatabase();
+}
class CynaraTestEnv
{
public:
- explicit CynaraTestEnv(const char *dirName);
- virtual ~CynaraTestEnv();
-
- void save();
- void restore();
+ explicit CynaraTestEnv();
+ ~CynaraTestEnv();
+ void init(const std::string &testName);
+ void finish();
void loadDefaultDatabase();
private:
+ void unmaskedLoadDefaultDatabase();
std::string m_saveDir;
std::string m_dbSaveDir;
std::string m_pluginsSaveDir;
using namespace CynaraTestAdmin;
using namespace CynaraTestClient;
-void tc01_cynara_initialize_func()
+RUNNER_TEST_GROUP_INIT(cynara_tests)
+
+RUN_CYNARA_TEST(tc01_cynara_initialize)
{
Client();
}
-void tc02_admin_initialize_func()
+RUN_CYNARA_TEST(tc02_admin_initialize)
{
Admin admin;
}
-void tc03_cynara_check_invalid_params_func()
+RUN_CYNARA_TEST(tc03_cynara_check_invalid_params)
{
Client cynara;
admin.setPolicies(cp, CYNARA_API_INVALID_PARAM);
}
-void tc04_admin_set_policies_invalid_params_func()
+RUN_CYNARA_TEST(tc04_admin_set_policies_invalid_params)
{
Admin admin;
checkInvalidPolicy(admin, bucket, client, user, privilege, resultNone, resultExtra);
}
-void tc05_admin_set_bucket_invalid_params_func()
+RUN_CYNARA_TEST(tc05_admin_set_bucket_invalid_params)
{
Admin admin;
admin.setBucket(bucket, operationNone, extra, CYNARA_API_OPERATION_NOT_ALLOWED);
}
-void tc06_cynara_check_empty_admin1_func()
+RUN_CYNARA_TEST(tc06_cynara_check_empty_admin1)
{
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc06_cynara_check_empty_admin2_func()
+RUN_CYNARA_TEST(tc06_cynara_check_empty_admin2)
{
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc07_admin_set_bucket_admin_allow_deny_func()
+RUN_CYNARA_TEST(tc07_admin_set_bucket_admin_allow_deny)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc08_admin_set_policies_allow_remove1_func()
+RUN_CYNARA_TEST(tc08_admin_set_policies_allow_remove1)
{
Admin admin;
Client cynara;
cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_ACCESS_DENIED);
}
-void tc08_admin_set_policies_allow_remove2_func()
+RUN_CYNARA_TEST(tc08_admin_set_policies_allow_remove2)
{
Admin admin;
Client cynara;
cynara.check(data[1][0], session, data[1][1], data[1][2], CYNARA_API_ACCESS_DENIED);
}
-void tc08_admin_set_policies_allow_remove3_func()
+RUN_CYNARA_TEST(tc08_admin_set_policies_allow_remove3)
{
Admin admin;
Client cynara;
admin.setPolicies(cp);
}
-void tc09_admin_set_policies_wildcard_accesses_func()
+RUN_CYNARA_TEST(tc09_admin_set_policies_wildcard_accesses)
{
const char *bucket = CYNARA_ADMIN_DEFAULT_BUCKET;
const char *session = "session09";
checkAllDeny(data, session);
}
-void tc10_admin_change_extra_bucket_func()
+RUN_CYNARA_TEST(tc10_admin_change_extra_bucket)
{
Admin admin;
Client cynara;
admin.setBucket(bucket, CYNARA_ADMIN_DELETE, extra);
}
-void tc11_admin_bucket_not_found_func()
+RUN_CYNARA_TEST(tc11_admin_bucket_not_found)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc12_admin_delete_bucket_with_policies_pointing_to_it_func()
+RUN_CYNARA_TEST(tc12_admin_delete_bucket_with_policies_pointing_to_it)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc13_admin_set_policies_to_extra_bucket_func()
+RUN_CYNARA_TEST(tc13_admin_set_policies_to_extra_bucket)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc14_admin_set_policies_integrity_func()
+RUN_CYNARA_TEST(tc14_admin_set_policies_integrity)
{
const char *bucketDefault = CYNARA_ADMIN_DEFAULT_BUCKET;
const char *bucket = "bucket14";
}
}
-void tc15_admin_set_bucket_admin_none1_func()
+RUN_CYNARA_TEST(tc15_admin_set_bucket_admin_none1)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_ALLOWED);
}
-void tc15_admin_set_bucket_admin_none2_func()
+RUN_CYNARA_TEST(tc15_admin_set_bucket_admin_none2)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_DENIED);
}
-void tc15_admin_set_bucket_admin_none3_func()
+RUN_CYNARA_TEST(tc15_admin_set_bucket_admin_none3)
{
Admin admin;
Client cynara;
cynara.check(client, session, user, privilege, CYNARA_API_ACCESS_ALLOWED);
}
-void tc16_admin_check_single_bucket_func()
+RUN_CYNARA_TEST(tc16_admin_check_single_bucket)
{
const char *bucketDefault = CYNARA_ADMIN_DEFAULT_BUCKET;
const char *client = "client16";
CYNARA_ADMIN_ALLOW, nullptr, CYNARA_API_SUCCESS);
}
-void tc17_admin_check_nested_bucket_func()
+RUN_CYNARA_TEST(tc17_admin_check_nested_bucket)
{
const char *bucketDefault = CYNARA_ADMIN_DEFAULT_BUCKET;
const char *bucket = "bucket17";
CYNARA_ADMIN_ALLOW, nullptr, CYNARA_API_SUCCESS);
}
-void tc18_admin_check_multiple_matches_func()
+RUN_CYNARA_TEST(tc18_admin_check_multiple_matches)
{
const char *bucketDefault = CYNARA_ADMIN_DEFAULT_BUCKET;
const char *client = "client18";
check(CYNARA_ADMIN_ALLOW);
}
-void tc19_admin_check_none_bucket_func()
+RUN_CYNARA_TEST(tc19_admin_check_none_bucket)
{
const char *bucketDefault = CYNARA_ADMIN_DEFAULT_BUCKET;
const char *bucket1 = "bucket19_a";
CYNARA_ADMIN_ALLOW, nullptr, CYNARA_API_SUCCESS);
}
-void tc20_admin_list_empty_bucket_func()
+RUN_CYNARA_TEST(tc20_admin_list_empty_bucket)
{
const char *emptyBucket = "empty_bucket20";
const char *client = "client20";
admin.listPolicies(emptyBucket, client, user, privilege, emptyPolicies);
}
-void tc21_admin_list_no_bucket_func()
+RUN_CYNARA_TEST(tc21_admin_list_no_bucket)
{
const char *emptyBucket = "empty_bucket21";
const char *notExistingBucket = "not_existing_bucket21";
CYNARA_API_BUCKET_NOT_FOUND);
}
-void tc22_admin_list_bucket_func()
+RUN_CYNARA_TEST(tc22_admin_list_bucket)
{
const char *bucket = "bucket22";
const char *emptyBucket = "empty_bucket22";
admin.listPolicies(bucket, client, wildcard, any, expectedPolicies);
}
-void tc23_admin_erase_empty_bucket_func()
+RUN_CYNARA_TEST(tc23_admin_erase_empty_bucket)
{
const char *emptyBucket = "empty_bucket23";
const char *client = "client23";
admin.erasePolicies(emptyBucket, recursive, client, user, privilege);
}
-void tc24_admin_erase_no_bucket_func()
+RUN_CYNARA_TEST(tc24_admin_erase_no_bucket)
{
const char *emptyBucket = "empty_bucket24";
const char *notExistingBucket = "not_existing_bucket24";
CYNARA_API_BUCKET_NOT_FOUND);
}
-void tc25_admin_erase_single_bucket_func()
+RUN_CYNARA_TEST(tc25_admin_erase_single_bucket)
{
const char *bucket = "bucket25";
const char *emptyBucket = "empty_bucket25";
}
}
-void tc26_admin_erase_recursive_not_linked_buckets_func()
+RUN_CYNARA_TEST(tc26_admin_erase_recursive_not_linked_buckets)
{
const char *bucket = "bucket26";
const char *subBucket = "sub_bucket26";
}
}
-void tc27_admin_erase_recursive_linked_buckets_func()
+RUN_CYNARA_TEST(tc27_admin_erase_recursive_linked_buckets)
{
const char *bucket = "bucket27";
const char *subBucket = "sub_bucket27";
}
}
-void tc28_admin_erase_non_recursive_linked_buckets_func()
+RUN_CYNARA_TEST(tc28_admin_erase_non_recursive_linked_buckets)
{
const char *bucket = "bucket28";
const char *subBucket = "sub_bucket28";
}
}
-void tc29_admin_erase_recursive_from_sub_bucket_func()
+RUN_CYNARA_TEST(tc29_admin_erase_recursive_from_sub_bucket)
{
const char *bucket = "bucket29";
const char *subBucket = "sub_bucket29";
admin.listPoliciesDescriptions(expectedDescriptions);
}
-void tc30_admin_list_descriptions_no_plugins_func()
+RUN_CYNARA_TEST(tc30_admin_list_descriptions_no_plugins)
{
testPlugins({});
}
-void tc31_admin_list_descriptions_1_plugin_single_policy_func()
+RUN_CYNARA_TEST(tc31_admin_list_descriptions_1_plugin_single_policy)
{
testPlugins({CynaraTestPlugins::SINGLE_POLICY});
}
-void tc32_admin_list_descriptions_1_plugin_multiple_policy_func()
+RUN_CYNARA_TEST(tc32_admin_list_descriptions_1_plugin_multiple_policy)
{
testPlugins({CynaraTestPlugins::MULTIPLE_POLICY});
}
-void tc33_admin_list_descriptions_multiple_plugins_func()
+RUN_CYNARA_TEST(tc33_admin_list_descriptions_multiple_plugins)
{
testPlugins({CynaraTestPlugins::SINGLE_POLICY,
CynaraTestPlugins::MULTIPLE_POLICY});
}
-
-RUNNER_TEST_GROUP_INIT(cynara_tests)
-
-RUN_CYNARA_TEST(tc01_cynara_initialize)
-RUN_CYNARA_TEST(tc02_admin_initialize)
-RUN_CYNARA_TEST(tc03_cynara_check_invalid_params)
-RUN_CYNARA_TEST(tc04_admin_set_policies_invalid_params)
-RUN_CYNARA_TEST(tc05_admin_set_bucket_invalid_params)
-RUN_CYNARA_TEST(tc06_cynara_check_empty_admin1)
-RUN_CYNARA_TEST(tc06_cynara_check_empty_admin2)
-RUN_CYNARA_TEST(tc07_admin_set_bucket_admin_allow_deny)
-RUN_CYNARA_TEST(tc08_admin_set_policies_allow_remove1)
-RUN_CYNARA_TEST(tc08_admin_set_policies_allow_remove2)
-RUN_CYNARA_TEST(tc08_admin_set_policies_allow_remove3)
-RUN_CYNARA_TEST(tc09_admin_set_policies_wildcard_accesses)
-RUN_CYNARA_TEST(tc10_admin_change_extra_bucket)
-RUN_CYNARA_TEST(tc11_admin_bucket_not_found)
-RUN_CYNARA_TEST(tc12_admin_delete_bucket_with_policies_pointing_to_it)
-RUN_CYNARA_TEST(tc13_admin_set_policies_to_extra_bucket)
-RUN_CYNARA_TEST(tc14_admin_set_policies_integrity)
-RUN_CYNARA_TEST(tc15_admin_set_bucket_admin_none1)
-RUN_CYNARA_TEST(tc15_admin_set_bucket_admin_none2)
-RUN_CYNARA_TEST(tc15_admin_set_bucket_admin_none3)
-RUN_CYNARA_TEST(tc16_admin_check_single_bucket)
-RUN_CYNARA_TEST(tc17_admin_check_nested_bucket)
-RUN_CYNARA_TEST(tc18_admin_check_multiple_matches)
-RUN_CYNARA_TEST(tc19_admin_check_none_bucket)
-RUN_CYNARA_TEST(tc20_admin_list_empty_bucket)
-RUN_CYNARA_TEST(tc21_admin_list_no_bucket)
-RUN_CYNARA_TEST(tc22_admin_list_bucket)
-RUN_CYNARA_TEST(tc23_admin_erase_empty_bucket)
-RUN_CYNARA_TEST(tc24_admin_erase_no_bucket)
-RUN_CYNARA_TEST(tc25_admin_erase_single_bucket)
-RUN_CYNARA_TEST(tc26_admin_erase_recursive_not_linked_buckets)
-RUN_CYNARA_TEST(tc27_admin_erase_recursive_linked_buckets)
-RUN_CYNARA_TEST(tc28_admin_erase_non_recursive_linked_buckets)
-RUN_CYNARA_TEST(tc29_admin_erase_recursive_from_sub_bucket)
-RUN_CYNARA_TEST(tc30_admin_list_descriptions_no_plugins)
-RUN_CYNARA_TEST(tc31_admin_list_descriptions_1_plugin_single_policy)
-RUN_CYNARA_TEST(tc32_admin_list_descriptions_1_plugin_multiple_policy)
-RUN_CYNARA_TEST(tc33_admin_list_descriptions_multiple_plugins)
sendClientRequest, hangOnGetRequest);
}
-void tcag01_set_agent_type_policy_without_plugin_func()
+RUNNER_TEST_GROUP_INIT(cynara_agent_tests)
+
+RUN_CYNARA_TEST(tcag01_set_agent_type_policy_without_plugin_func)
{
loadServicePlugins(DirectoryPaths());
setAgentPolicy(CYNARA_API_INVALID_PARAM);
}
-void tcag02_set_agent_type_policy_with_plugin_loaded_func()
+RUN_CYNARA_TEST(tcag02_set_agent_type_policy_with_plugin_loaded_func)
{
loadAgentPlugin();
setAgentPolicy();
}
-void tcag03_check_with_no_agent_func()
+RUN_CYNARA_TEST(tcag03_check_with_no_agent_func)
{
std::string testNo("03");
cynara_check_id id;
client.process(CYNARA_API_SUCCESS, Client::IGNORE_TIMEOUT);
}
-void tcag04_agent_initialize_func()
+RUN_CYNARA_TEST(tcag04_agent_initialize_func)
{
Agent();
}
-void tcag05_agent_request_timeout_func()
+RUN_CYNARA_TEST(tcag05_agent_request_timeout_func)
{
Agent agent;
AgentRequest request;
restartCynaraServiceAndSockets, hangOnGetRequest);
}
-void tcag06_check_with_unregistered_agent_func()
+RUN_CYNARA_TEST(tcag06_check_with_unregistered_agent_func)
{
std::string testNo("06");
cynara_check_id id;
client.process(CYNARA_API_SUCCESS, Client::IGNORE_TIMEOUT);
}
-void tcag07_get_request_func()
+RUN_CYNARA_TEST(tcag07_get_request_func)
{
std::string testNo("07");
CheckData data(testNo);
client.process();
}
-void tcag08_get_request_and_respond_with_wrong_id_func()
+RUN_CYNARA_TEST(tcag08_get_request_and_respond_with_wrong_id_func)
{
std::string testNo("08");
CheckData data(testNo);
client.process(CYNARA_API_SUCCESS, Client::TimeoutExpectation::EXPECT_TIMEOUT, 2);
}
-void tcag09_get_request_and_correct_responded_id_func()
+RUN_CYNARA_TEST(tcag09_get_request_and_correct_responded_id_func)
{
std::string testNo("09");
CheckData data(testNo);
client.process();
}
-void tcag10_cancel_request_func()
+RUN_CYNARA_TEST(tcag10_cancel_request_func)
{
std::string testNo("10");
CheckData data(testNo);
client.process(CYNARA_API_SUCCESS, Client::TimeoutExpectation::EXPECT_NO_TIMEOUT, 2);
}
-void tcag11_cancel_processed_request_func()
+RUN_CYNARA_TEST(tcag11_cancel_processed_request_func)
{
std::string testNo("11");
CheckData data(testNo);
client.process(CYNARA_API_SUCCESS, Client::TimeoutExpectation::EXPECT_NO_TIMEOUT, 2);
}
-void tcag12_create_two_requests_func()
+RUN_CYNARA_TEST(tcag12_create_two_requests_func)
{
std::string testNo("12");
CheckData data1(testNo, 1), data2(testNo, 2);
client.process(CYNARA_API_SUCCESS, Client::TimeoutExpectation::IGNORE_TIMEOUT, 1);
}
-void tcag13_create_many_requests_func()
+RUN_CYNARA_TEST(tcag13_create_many_requests_func)
{
const int numberOfRequests = 4;
std::string testNo("13");
}
}
-void tcag14_client_disconnects_func()
+RUN_CYNARA_TEST(tcag14_client_disconnects_func)
{
std::string testNo("14");
CheckData data(testNo);
agentRequest.assertCancel();
}
-void tcag15_agent_disconnects_func()
+RUN_CYNARA_TEST(tcag15_agent_disconnects_func)
{
std::string testNo("15");
CheckData data(testNo);
client.process(CYNARA_API_SUCCESS, Client::TimeoutExpectation::EXPECT_NO_TIMEOUT, 2);
}
-RUNNER_TEST_GROUP_INIT(cynara_agent_tests)
-
-RUN_CYNARA_TEST(tcag01_set_agent_type_policy_without_plugin)
-RUN_CYNARA_TEST(tcag02_set_agent_type_policy_with_plugin_loaded)
-RUN_CYNARA_TEST(tcag03_check_with_no_agent)
-RUN_CYNARA_TEST(tcag04_agent_initialize)
-RUN_CYNARA_TEST(tcag05_agent_request_timeout)
-RUN_CYNARA_TEST(tcag06_check_with_unregistered_agent)
-RUN_CYNARA_TEST(tcag07_get_request)
-RUN_CYNARA_TEST(tcag08_get_request_and_respond_with_wrong_id)
-RUN_CYNARA_TEST(tcag09_get_request_and_correct_responded_id)
-RUN_CYNARA_TEST(tcag10_cancel_request)
-RUN_CYNARA_TEST(tcag11_cancel_processed_request)
-RUN_CYNARA_TEST(tcag12_create_two_requests)
-RUN_CYNARA_TEST(tcag13_create_many_requests)
-RUN_CYNARA_TEST(tcag14_client_disconnects)
-RUN_CYNARA_TEST(tcag15_agent_disconnects)
using namespace CynaraTestClientAsync;
using namespace CynaraTestAdmin;
-void tca01_initialize_func()
+RUNNER_TEST_GROUP_INIT(cynara_async_tests)
+
+RUN_CYNARA_TEST(tca01_initialize)
{
Client client;
}
-void tca02_empty_cache_miss_func()
+RUN_CYNARA_TEST(tca02_empty_cache_miss)
{
std::string testNo("02");
Client client;
client.checkCache({testNo}, CYNARA_API_CACHE_MISS);
}
-void tca03_create_max_requests_func()
+RUN_CYNARA_TEST(tca03_create_max_requests)
{
std::string testNo("03");
cynara_check_id id;
client.assertStatus(READWRITE);
}
-void tca04_request_and_process_func()
+RUN_CYNARA_TEST(tca04_request_and_process)
{
std::string testNo("04");
cynara_check_id id;
client.process(CYNARA_API_SUCCESS, Client::IGNORE_TIMEOUT);
}
-void tca05_request_and_cancel1_func()
+RUN_CYNARA_TEST(tca05_request_and_cancel1)
{
std::string testNo("05");
int subtest = 1;
client.process(CYNARA_API_SUCCESS, Client::IGNORE_TIMEOUT);
}
-void tca05_request_and_cancel2_func()
+RUN_CYNARA_TEST(tca05_request_and_cancel2)
{
std::string testNo("05");
int subtest = 2;
client.process(CYNARA_API_SUCCESS, Client::IGNORE_TIMEOUT);
}
-void tca05_request_and_cancel3_func()
+RUN_CYNARA_TEST(tca05_request_and_cancel3)
{
std::string testNo("05");
int subtest = 3;
client.cancel(id, CYNARA_API_INVALID_PARAM);
}
-void tca06_cancel_fail_func()
+RUN_CYNARA_TEST(tca06_cancel_fail)
{
cynara_check_id id = 0xDEAD;
client.cancel(id, CYNARA_API_INVALID_PARAM);
}
-void tca07_request_with_data_insertion_func()
+RUN_CYNARA_TEST(tca07_request_with_data_insertion)
{
std::string testNo("07");
Admin admin;
client.checkCache(data[1], CYNARA_API_CACHE_MISS);
}
-void tca08_disconnect1_func()
+RUN_CYNARA_TEST(tca08_disconnect1)
{
std::string testNo("08");
int subtest = 1;
client.process(CYNARA_API_SUCCESS, Client::IGNORE_TIMEOUT);
}
-void tca08_disconnect2_func()
+RUN_CYNARA_TEST(tca08_disconnect2)
{
std::string testNo("08");
int subtest = 2;
client.process(CYNARA_API_SUCCESS, Client::IGNORE_TIMEOUT);
}
-void tca08_disconnect3_func()
+RUN_CYNARA_TEST(tca08_disconnect3)
{
std::string testNo("08");
int subtest = 2;
client.process(CYNARA_API_SUCCESS, Client::IGNORE_TIMEOUT);
}
-void tca09_disconnect_and_cancel1_func()
+RUN_CYNARA_TEST(tca09_disconnect_and_cancel1)
{
std::string testNo("09");
int subtest = 1;
client.assertStatus(READ);
}
-void tca09_disconnect_and_cancel2_func()
+RUN_CYNARA_TEST(tca09_disconnect_and_cancel2)
{
std::string testNo("09");
int subtest = 2;
client.assertStatus(READ);
}
-void tca10_double_request_func()
+RUN_CYNARA_TEST(tca10_double_request)
{
std::string testNo("10");
cynara_check_id id, id2;
client.process(CYNARA_API_SUCCESS, Client::IGNORE_TIMEOUT);
}
-void tca11_double_request_with_restart_func()
+RUN_CYNARA_TEST(tca11_double_request_with_restart)
{
std::string testNo("11");
cynara_check_id id, id2;
client.process(CYNARA_API_SUCCESS, Client::IGNORE_TIMEOUT);
}
-void tca12_multiple_connections_without_requests_func()
+RUN_CYNARA_TEST(tca12_multiple_connections_without_requests)
{
std::string testNo("12");
<< after << " / " << afterTimestamp.tv_sec << "."
<< afterTimestamp.tv_usec);
}
-
-RUNNER_TEST_GROUP_INIT(cynara_async_tests)
-
-RUN_CYNARA_TEST(tca01_initialize)
-RUN_CYNARA_TEST(tca02_empty_cache_miss)
-RUN_CYNARA_TEST(tca03_create_max_requests)
-RUN_CYNARA_TEST(tca04_request_and_process)
-RUN_CYNARA_TEST(tca05_request_and_cancel1)
-RUN_CYNARA_TEST(tca05_request_and_cancel2)
-RUN_CYNARA_TEST(tca05_request_and_cancel3)
-RUN_CYNARA_TEST(tca06_cancel_fail)
-RUN_CYNARA_TEST(tca07_request_with_data_insertion)
-RUN_CYNARA_TEST(tca08_disconnect1)
-RUN_CYNARA_TEST(tca08_disconnect2)
-RUN_CYNARA_TEST(tca08_disconnect3)
-RUN_CYNARA_TEST(tca09_disconnect_and_cancel1)
-RUN_CYNARA_TEST(tca09_disconnect_and_cancel2)
-RUN_CYNARA_TEST(tca10_double_request)
-RUN_CYNARA_TEST(tca11_double_request_with_restart)
-RUN_CYNARA_TEST(tca12_multiple_connections_without_requests)
} // anonymous namespace
+
+RUNNER_TEST_GROUP_INIT(cynara_db_tests)
+
/**
* @brief Lockdown initialization failure caused by fake guard existence
* @test Expected result: refuse to write data to storage as long as guard file creation fails
* 4. Retry to make a change (ALLOW) in default bucket (data dump should proceed)
* 5. Check if database is saved correctly
*/
-void tcdb01_lockdown_init_failure_func()
+RUN_CYNARA_TEST(tcdb01_lockdown_init_failure)
{
Admin admin;
Client cynara;
* 4. Try to make a change (DENY) in default bucket (data dump should fail)
* 5. Reload Cynara - policies loaded from default bucket should still be ALLOW
*/
-void tcdb02_write_to_backup_failure_func()
+RUN_CYNARA_TEST(tcdb02_write_to_backup_failure)
{
Admin admin;
Client cynara;
* 5. Reload Cynara - policies should be loaded from primary (revalidated) database
* 6. Check if all backup files were removed
*/
-void tcdb03_invalid_and_valid_backup_removal_func()
+RUN_CYNARA_TEST(tcdb03_invalid_and_valid_backup_removal)
{
Admin admin;
Client cynara;
* 1. Write sample policy to database (and let it save to storage)
* 2. Compare freshly saved files with samples from test patterns directory
*/
-void tcdb04_dumped_file_binary_comparison_func()
+RUN_CYNARA_TEST(tcdb04_dumped_file_binary_comparison)
{
Admin admin;
Client cynara;
* 2. Reload Cynara
* 3. Check if any of mentioned above files still remained
*/
-void tcdb05_non_indexed_files_removal_func()
+RUN_CYNARA_TEST(tcdb05_non_indexed_files_removal)
{
std::vector<std::string> filenames = { "_broken-backup~", "_non-indexed-bucket",
"some-file-that-doesnt-belong-here" };
restartCynaraServiceAndSockets();
compareDbs(defDb);
}
-
-RUNNER_TEST_GROUP_INIT(cynara_db_tests)
-
-RUN_CYNARA_TEST(tcdb01_lockdown_init_failure)
-RUN_CYNARA_TEST(tcdb02_write_to_backup_failure)
-RUN_CYNARA_TEST(tcdb03_invalid_and_valid_backup_removal)
-RUN_CYNARA_TEST(tcdb04_dumped_file_binary_comparison)
-RUN_CYNARA_TEST(tcdb05_non_indexed_files_removal)