// tries to access other application data without permission
-RUNNER_TEST(T3020_manager_access_not_allowed)
+RUNNER_TEST(T3020_manager_access_not_allowed, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
// test accessibility from another label
}
// tries to access other application data with permission
-RUNNER_TEST(T3021_manager_access_allowed)
+RUNNER_TEST(T3021_manager_access_allowed, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
allow_access(TEST_ALIAS, APP_LABEL_2, CKMC_PERMISSION_READ);
}
}
// tries to read other application data with permission for read/remove
-RUNNER_TEST(T3022_manager_access_allowed_with_remove)
+RUNNER_TEST(T3022_manager_access_allowed_with_remove, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
allow_access(TEST_ALIAS, APP_LABEL_2, CKMC_PERMISSION_READ | CKMC_PERMISSION_REMOVE);
}
}
// tries to remove other application data with permission for reading only
-RUNNER_TEST(T3023_manager_access_allowed_remove_denied)
+RUNNER_TEST(T3023_manager_access_allowed_remove_denied, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
allow_access(TEST_ALIAS, APP_LABEL_2, CKMC_PERMISSION_READ);
}
}
// tries to remove other application data with permission
-RUNNER_TEST(T3025_manager_remove_allowed)
+RUNNER_TEST(T3025_manager_remove_allowed, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
allow_access(TEST_ALIAS, APP_LABEL_2, CKMC_PERMISSION_READ | CKMC_PERMISSION_REMOVE);
}
// tries to access other application data after allow function was called twice with different
// rights
-RUNNER_TEST(T3026_manager_double_allow)
+RUNNER_TEST(T3026_manager_double_allow, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
// access should be overwritten
allow_access(TEST_ALIAS, APP_LABEL_2, CKMC_PERMISSION_READ | CKMC_PERMISSION_REMOVE);
}
// tries to access application data with permission and after permission has been revoked
-RUNNER_TEST(T3027_manager_allow_deny)
+RUNNER_TEST(T3027_manager_allow_deny, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
std::string TEST_ALIAS_adr = aliasWithLabel(APP_LABEL_1, TEST_ALIAS);
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
allow_access(TEST_ALIAS, APP_LABEL_2, CKMC_PERMISSION_READ);
}
}
}
-RUNNER_TEST(T3028_manager_access_by_label)
+RUNNER_TEST(T3028_manager_access_by_label, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
const char *additional_data = "label-2-data";
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
allow_access(TEST_ALIAS, APP_LABEL_2, CKMC_PERMISSION_READ);
}
}
// tries to modify another label's permission
-RUNNER_TEST(T3029_manager_access_modification_by_foreign_label)
+RUNNER_TEST(T3029_manager_access_modification_by_foreign_label, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
allow_access(TEST_ALIAS, APP_LABEL_3, CKMC_PERMISSION_READ | CKMC_PERMISSION_REMOVE);
}
}
// checks if only aliases readable by given app are returned
-RUNNER_TEST(T3030_manager_get_all_aliases)
+RUNNER_TEST(T3030_manager_get_all_aliases, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
size_t count;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
- gc.save(TEST_ALIAS2, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS2, TEST_DATA);
count = count_aliases(ALIAS_DATA);
allow_access(TEST_ALIAS, APP_LABEL_2, CKMC_PERMISSION_READ);
}
// tries to access other application data with permission
-RUNNER_TEST(T3031_manager_deprecated_access_allowed)
+RUNNER_TEST(T3031_manager_deprecated_access_allowed, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
allow_access_deprecated(TEST_ALIAS, APP_LABEL_2, CKMC_AR_READ);
}
}
// tries to read other application data with permission for read/remove
-RUNNER_TEST(T3032_manager_deprecated_access_allowed_with_remove)
+RUNNER_TEST(T3032_manager_deprecated_access_allowed_with_remove, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
allow_access_deprecated(TEST_ALIAS, APP_LABEL_2, CKMC_AR_READ_REMOVE);
}
}
// tries to remove other application data with permission for reading only
-RUNNER_TEST(T3033_manager_deprecated_access_allowed_remove_denied)
+RUNNER_TEST(T3033_manager_deprecated_access_allowed_remove_denied, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
allow_access_deprecated(TEST_ALIAS, APP_LABEL_2, CKMC_AR_READ);
}
}
// tries to remove other application data with permission
-RUNNER_TEST(T3034_manager_deprecated_remove_allowed)
+RUNNER_TEST(T3034_manager_deprecated_remove_allowed, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
allow_access_deprecated(TEST_ALIAS, APP_LABEL_2, CKMC_AR_READ_REMOVE);
}
}
// invalid argument check
-RUNNER_TEST(T3101_control_allow_access_invalid)
+RUNNER_TEST(T3101_control_allow_access_invalid, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
int ret;
}
// invalid argument check
-RUNNER_TEST(T3102_control_deny_access_invalid)
+RUNNER_TEST(T3102_control_deny_access_invalid, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
RUNNER_ASSERT(CKMC_ERROR_INVALID_PARAMETER ==
// tries to allow access for non existing alias
RUNNER_TEST(T3103_control_allow_access_non_existing)
{
+ reset_user_data(APP_1, APP_PASS_1);
int ret = ckmc_set_permission_by_adm(APP_1, aliasWithLabel(NO_OWNER, NO_ALIAS).c_str(), "label", CKMC_PERMISSION_READ);
RUNNER_ASSERT_MSG(CKMC_ERROR_DB_ALIAS_UNKNOWN == ret,
"Allowing access for non existing alias returned " << CKMCErrorToString(ret));
// tries to deny access for non existing alias
RUNNER_TEST(T3104_control_deny_access_non_existing)
{
+ reset_user_data(APP_1, APP_PASS_1);
int ret = ckmc_set_permission_by_adm(APP_1, aliasWithLabel(NO_OWNER, NO_ALIAS).c_str(), "label", CKMC_PERMISSION_NONE);
RUNNER_ASSERT_MSG(CKMC_ERROR_DB_ALIAS_UNKNOWN == ret,
"Denying access for non existing alias returned " << CKMCErrorToString(ret));
}
// tries to deny non existing access
-RUNNER_TEST(T3105_control_deny_access_non_existing_access)
+RUNNER_TEST(T3105_control_deny_access_non_existing_access, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
int ret = ckmc_set_permission_by_adm(APP_1, aliasWithLabel(APP_LABEL_1, TEST_ALIAS).c_str(), APP_LABEL_2, CKMC_PERMISSION_NONE);
}
// tries to allow application to access its own data
-RUNNER_TEST(T3106_control_allow_access_to_myself)
+RUNNER_TEST(T3106_control_allow_access_to_myself, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
// test
int ret = ckmc_set_permission(TEST_ALIAS, APP_LABEL_1, CKMC_PERMISSION_READ);
}
// tries to use admin API as a user
-RUNNER_CHILD_TEST(T3110_control_allow_access_as_user)
+RUNNER_CHILD_TEST(T3110_control_allow_access_as_user, RemoveDataEnv<APP_1>)
{
RUNNER_IGNORED_MSG("Disabled until labeled sockets not available");
// prepare: add data
- GarbageCollector gc;
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
// test
int ret = ckmc_set_permission_by_adm(APP_1, aliasWithLabel(APP_LABEL_1, TEST_ALIAS).c_str(), APP_LABEL_2, CKMC_PERMISSION_READ);
}
// tries to use admin API as a user
-RUNNER_CHILD_TEST(T3111_control_deny_access_as_user)
+RUNNER_CHILD_TEST(T3111_control_deny_access_as_user, RemoveDataEnv<APP_1>)
{
RUNNER_IGNORED_MSG("Disabled until labeled sockets not available");
// prepare: add data
- GarbageCollector gc;
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
// test
int ret = ckmc_set_permission_by_adm(APP_1, aliasWithLabel(APP_LABEL_1, TEST_ALIAS).c_str(), APP_LABEL_2, CKMC_PERMISSION_NONE);
}
// tries to read other application data with permission
-RUNNER_TEST(T3121_control_access_allowed)
+RUNNER_TEST(T3121_control_access_allowed, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
allow_access_by_adm(APP_1, APP_LABEL_1, TEST_ALIAS, APP_LABEL_2, CKMC_PERMISSION_READ);
}
// tries to read other application data with permission to read/remove
-RUNNER_TEST(T3122_control_access_allowed_with_remove)
+RUNNER_TEST(T3122_control_access_allowed_with_remove, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
allow_access_by_adm(APP_1, APP_LABEL_1, TEST_ALIAS, APP_LABEL_2, CKMC_PERMISSION_READ | CKMC_PERMISSION_REMOVE);
}
// tries to remove other application data with permission to read
-RUNNER_TEST(T3122_control_access_allowed_remove_denied)
+RUNNER_TEST(T3122_control_access_allowed_remove_denied, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
allow_access_by_adm(APP_1, APP_LABEL_1, TEST_ALIAS, APP_LABEL_2, CKMC_PERMISSION_READ);
}
// tries to remove other application data with permission
-RUNNER_TEST(T3125_control_remove_allowed)
+RUNNER_TEST(T3125_control_remove_allowed, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
allow_access_by_adm(APP_1, APP_LABEL_1, TEST_ALIAS, APP_LABEL_2, CKMC_PERMISSION_READ | CKMC_PERMISSION_REMOVE);
// tries to access other application data after allow function has been called twice with different
// rights
-RUNNER_TEST(T3126_control_double_allow)
+RUNNER_TEST(T3126_control_double_allow, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
// access should be overwritten
}
// tries to access other application data with permission and after permission has been revoked
-RUNNER_TEST(T3127_control_allow_deny)
+RUNNER_TEST(T3127_control_allow_deny, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
std::string TEST_ALIAS_adr = aliasWithLabel(APP_LABEL_1, TEST_ALIAS);
}
// checks if only aliases readable by given app are returned
-RUNNER_TEST(T3130_control_get_all_aliases)
+RUNNER_TEST(T3130_control_get_all_aliases, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
size_t count;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
- gc.save(TEST_ALIAS2, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS2, TEST_DATA);
count = count_aliases(ALIAS_DATA);
}
}
// tries to add access to data in a database of invalid user
-RUNNER_TEST(T3140_control_allow_invalid_user)
+RUNNER_TEST(T3140_control_allow_invalid_user, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
int ret = ckmc_set_permission_by_adm(APP_2, aliasWithLabel(APP_LABEL_1, TEST_ALIAS).c_str(), APP_LABEL_2, CKMC_PERMISSION_READ | CKMC_PERMISSION_REMOVE);
}
// tries to revoke access to data in a database of invalid user
-RUNNER_TEST(T3141_control_deny_invalid_user)
+RUNNER_TEST(T3141_control_deny_invalid_user, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
int ret = ckmc_set_permission_by_adm(APP_2, aliasWithLabel(APP_LABEL_1, TEST_ALIAS).c_str(), APP_LABEL_2, CKMC_PERMISSION_NONE);
}
// tries to read other application data with permission
-RUNNER_TEST(T3142_control_deprecated_access_allowed)
+RUNNER_TEST(T3142_control_deprecated_access_allowed, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
allow_access_deprecated_by_adm(APP_1, APP_LABEL_1, TEST_ALIAS, APP_LABEL_2, CKMC_AR_READ);
}
// tries to read other application data with permission to read/remove
-RUNNER_TEST(T3143_control_deprecated_access_allowed_with_remove)
+RUNNER_TEST(T3143_control_deprecated_access_allowed_with_remove, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
allow_access_deprecated_by_adm(APP_1, APP_LABEL_1, TEST_ALIAS, APP_LABEL_2, CKMC_AR_READ_REMOVE);
}
// tries to remove other application data with permission to read
-RUNNER_TEST(T3144_control_deprecated_access_allowed_remove_denied)
+RUNNER_TEST(T3144_control_deprecated_access_allowed_remove_denied, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
allow_access_deprecated_by_adm(APP_1, APP_LABEL_1, TEST_ALIAS, APP_LABEL_2, CKMC_AR_READ);
}
// tries to remove other application data with permission
-RUNNER_TEST(T3145_control_deprecated_remove_allowed)
+RUNNER_TEST(T3145_control_deprecated_remove_allowed, RemoveDataEnv<APP_1>)
{
// prepare: add data
- GarbageCollector gc;
{
ScopedAccessProvider ap(APP_LABEL_1, APP_1, GROUP_1);
- gc.save(TEST_ALIAS, TEST_DATA);
+ save_data(TEST_ALIAS, TEST_DATA);
}
allow_access_deprecated_by_adm(APP_1, APP_LABEL_1, TEST_ALIAS, APP_LABEL_2, CKMC_AR_READ_REMOVE);
// [prepare]
remove_user_data(USER_APP);
- GarbageCollector gc;
- gc.save(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
+ save_data(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
allow_access(TEST_SYSTEM_ALIAS.c_str(), TEST_LABEL, CKMC_PERMISSION_READ);
// [test]
}
}
-RUNNER_TEST(T5030_CLIENT_APP_TRY_ADDING_SYSTEM_ITEM)
+RUNNER_TEST(T5030_CLIENT_APP_TRY_ADDING_SYSTEM_ITEM, RemoveDataEnv<0, USER_APP>)
{
// [test]
// switch to user app, unlock DB
// try to add item to system DB - expect fail
- // [prepare]
- remove_user_data(USER_APP);
-
// [test]
{
ScopedDBUnlock unlock(USER_APP, APP_PASS);
}
}
-RUNNER_TEST(T5031_CLIENT_APP_ACCESS_WITH_PERMISSION)
+RUNNER_TEST(T5031_CLIENT_APP_ACCESS_WITH_PERMISSION, RemoveDataEnv<0, USER_APP>)
{
// [prepare]
// start as system service
// switch to user app, unlock DB
// try to access the system item - expect success
- // [prepare]
- remove_user_data(USER_APP);
- GarbageCollector gc;
- gc.save(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
+ save_data(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
allow_access(TEST_SYSTEM_ALIAS.c_str(), TEST_LABEL, CKMC_PERMISSION_READ);
// [test]
}
}
-RUNNER_TEST(T5032_CLIENT_APP_ACCESS_NO_PERMISSION)
+RUNNER_TEST(T5032_CLIENT_APP_ACCESS_NO_PERMISSION, RemoveDataEnv<0, USER_APP>)
{
// [prepare]
// start as system service
// try to access the system item - expect fail
// [prepare]
- remove_user_data(USER_APP);
- GarbageCollector gc;
- gc.save(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
+ save_data(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
// [test]
{
}
}
-RUNNER_TEST(T5033_CLIENT_APP_PERMISSION_REMOVAL)
+RUNNER_TEST(T5033_CLIENT_APP_PERMISSION_REMOVAL, RemoveDataEnv<0, USER_APP>)
{
// [prepare]
// start as system service
// try to access the system item - expect fail
// [prepare]
- remove_user_data(USER_APP);
- GarbageCollector gc;
- gc.save(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
+ save_data(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
allow_access(TEST_SYSTEM_ALIAS.c_str(), TEST_LABEL, CKMC_PERMISSION_READ);
// [test]
}
}
-RUNNER_TEST(T5034_CLIENT_APP_SET_READ_ACCESS)
+RUNNER_TEST(T5034_CLIENT_APP_SET_READ_ACCESS, RemoveDataEnv<0, USER_APP>)
{
// [test]
// switch to user app, unlock DB
// [test]
{
- remove_user_data(USER_APP);
ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
}
}
-RUNNER_TEST(T5035_CLIENT_APP_TRY_REMOVING_SYSTEM_ITEM)
+RUNNER_TEST(T5035_CLIENT_APP_TRY_REMOVING_SYSTEM_ITEM, RemoveDataEnv<0, USER_APP>)
{
// [prepare]
// start as system service
// try to remove item from system DB - expect fail
// [prepare]
- remove_user_data(USER_APP);
- GarbageCollector gc;
- gc.save(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
+ save_data(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
allow_access(TEST_SYSTEM_ALIAS.c_str(), TEST_LABEL, CKMC_PERMISSION_READ);
// [test]
}
}
-RUNNER_TEST(T5036_CLIENT_LIST_ACCESSIBLE_ITEMS)
+RUNNER_TEST(T5036_CLIENT_LIST_ACCESSIBLE_ITEMS, RemoveDataEnv<0, USER_APP>)
{
// [prepare]
// start as system service
// user lists items - expect system item A and private item
// [prepare]
- remove_user_data(0);
- remove_user_data(USER_APP);
- GarbageCollector gc;
- gc.save(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
- gc.save(TEST_SYSTEM_ALIAS_2.c_str(), TEST_DATA);
+ save_data(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
+ save_data(TEST_SYSTEM_ALIAS_2.c_str(), TEST_DATA);
allow_access(TEST_SYSTEM_ALIAS.c_str(), TEST_LABEL, CKMC_PERMISSION_READ);
// [test]
}
}
-RUNNER_TEST(T5037_CLIENT_APP_TRY_GENERATE_KEY_IN_SYSTEM_DB)
+RUNNER_TEST(T5037_CLIENT_APP_TRY_GENERATE_KEY_IN_SYSTEM_DB, RemoveDataEnv<USER_APP>)
{
// [test]
// switch to user app, unlock DB
// [test]
{
- remove_user_data(USER_APP);
ScopedDBUnlock unlock(USER_APP, APP_PASS);
ScopedAccessProvider ap(TEST_LABEL);
ap.allowAPI("key-manager::api-storage", "rw");
}
}
-RUNNER_TEST(T5038_CLIENT_SERVER_CREATE_VERIFY_SYSTEM_DB)
+RUNNER_TEST(T5038_CLIENT_SERVER_CREATE_VERIFY_SYSTEM_DB, RemoveDataEnv<0,USER_APP>)
{
// [prepare]
// start as system service
// try to create signature in system DB - expect fail
// [prepare]
- remove_user_data(USER_APP);
- GarbageCollector gc;
std::string private_key_alias = aliasWithLabel(SYSTEM_LABEL, "sys-db-priv");
std::string public_key_alias = aliasWithLabel(SYSTEM_LABEL, "sys-db-pub");
- gc.add(private_key_alias.c_str());
- gc.add(public_key_alias.c_str());
ckmc_policy_s policy_private_key;
ckmc_policy_s policy_public_key;
policy_private_key.password = NULL;
}
}
-RUNNER_TEST(T5039_SYSTEM_APP_SET_REMOVE_ACCESS)
+RUNNER_TEST(T5039_SYSTEM_APP_SET_REMOVE_ACCESS, RemoveDataEnv<0>)
{
// [prepare]
// start as system service
// add remove permission to a user app - expect fail
// [prepare]
- GarbageCollector gc;
- gc.save(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
+ save_data(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
// [test]
allow_access_negative(TEST_SYSTEM_ALIAS.c_str(), TEST_LABEL, CKMC_PERMISSION_REMOVE, CKMC_ERROR_INVALID_PARAMETER);
}
-RUNNER_TEST(T5040_SYSTEM_SVC_ACCESS_DB)
+RUNNER_TEST(T5040_SYSTEM_SVC_ACCESS_DB, RemoveDataEnv<0>)
{
// [prepare]
// start as system service
// try to access the item - expect success
// [prepare]
- GarbageCollector gc;
- gc.save(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
+ save_data(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
// [test]
check_read(TEST_ALIAS, SYSTEM_LABEL, TEST_DATA);
}
-RUNNER_TEST(T5041_SYSTEM_SVC_1234_ACCESS_DB)
+RUNNER_TEST(T5041_SYSTEM_SVC_1234_ACCESS_DB, RemoveDataEnv<0>)
{
// [prepare]
// start as system service
// try to access the item - expect success
// [prepare]
- GarbageCollector gc;
- gc.save(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
+ save_data(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
// [test]
{
}
}
-RUNNER_TEST(T5043_SYSTEM_SVC_4999_ACCESS_DB)
+RUNNER_TEST(T5043_SYSTEM_SVC_4999_ACCESS_DB, RemoveDataEnv<0>)
{
// [prepare]
// start as system service
// try to access the item - expect success
// [prepare]
- GarbageCollector gc;
- gc.save(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
+ save_data(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
// [test]
{
}
}
-RUNNER_TEST(T5044_SYSTEM_SVC_5000_ACCESS_DB)
+RUNNER_TEST(T5044_SYSTEM_SVC_5000_ACCESS_DB, RemoveDataEnv<0>)
{
RUNNER_IGNORED_MSG("This test is turn off because fix "
"from tizen 2.4 that unlock db with empty password");
// try to access the item - expect fail (no system service)
// [prepare]
- GarbageCollector gc;
- gc.save(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
+ save_data(TEST_SYSTEM_ALIAS.c_str(), TEST_DATA);
// [test]
{
}
}
-RUNNER_TEST(T5045_SYSTEM_DB_ADD_WITH_INVALID_LABEL)
+RUNNER_TEST(T5045_SYSTEM_DB_ADD_WITH_INVALID_LABEL, RemoveDataEnv<0>)
{
// [prepare]
// start as system service
// try to add item to system DB using wrong label - expect fail
// try to add item using explicit system label - expect success
- // [prepare]
- remove_user_data(USER_APP);
-
// [test]
save_data(aliasWithLabel(INVALID_LABEL, TEST_ALIAS).c_str(), TEST_DATA, CKMC_ERROR_INVALID_PARAMETER);
check_read(TEST_ALIAS, INVALID_LABEL, TEST_DATA, CKMC_ERROR_DB_ALIAS_UNKNOWN);