/usr/bin/security-manager-tests
/etc/smack/test_smack_rules
/etc/smack/test_smack_rules_lnk
-/opt/usr/apps/*
+/opt/usr/globalapps/*
/usr/bin/cynara-test
/usr/bin/ckm-tests
/usr/bin/ckm-integration-tests
INSTALL(DIRECTORY
${PROJECT_SOURCE_DIR}/src/security-manager-tests/app_files/
- DESTINATION /opt/usr/apps/
+ DESTINATION /opt/usr/globalapps/
)
{}
std::string getInstallDir() const {
- return "/opt/usr/apps/" + getPkgId();
+ return "/opt/usr/globalapps/" + getPkgId();
}
std::string getTrustedDir(int i = 0) const {
static std::string genPath(int app_num, const char *postfix) {
char buf[16];
sprintf(buf, "%02d", app_num);
- return std::string("/opt/usr/apps/sm_test_") + std::string(buf) + std::string("_pkg_id_full/") + std::string(postfix);
+ return std::string("/opt/usr/globalapps/sm_test_") + std::string(buf) + std::string("_pkg_id_full/") + std::string(postfix);
}
std::string genRWPath(int app_num) {
return 0;
}
-static const char *const SM_DENIED_PATH = "/opt/usr/apps/non_app_dir";
+static const char *const SM_DENIED_PATH = "/opt/usr/globalapps/non_app_dir";
void check_app_permissions(const char *const app_id, const char *const pkg_id,
const char *const user, const privileges_t &allowed_privs,
extern const privileges_t SM_DENIED_PRIVILEGES;
extern const privileges_t SM_NO_PRIVILEGES;
extern const std::vector<std::string> SM_ALLOWED_GROUPS;
-static const char *const SM_RW_PATH = "/opt/usr/apps/sm_test_02_pkg_id_full/app_dir";
+static const char *const SM_RW_PATH = "/opt/usr/globalapps/sm_test_02_pkg_id_full/app_dir";
const std::string uidToStr(const uid_t uid);
using namespace SecurityManagerTest;
-static const char *const SM_TRUSTED_PATH = "/opt/usr/apps/sm_test_02_pkg_id_full/app_dir_trusted";
+static const char *const SM_TRUSTED_PATH = "/opt/usr/globalapps/sm_test_02_pkg_id_full/app_dir_trusted";
static void check_exact_access(const std::string& subject, const std::string& object, const std::string& access)
{