X-Git-Url: https://git.proxmox.com/?a=blobdiff_plain;f=ceph%2Fsrc%2Ftest%2Fmds%2FTestMDSAuthCaps.cc;h=a05f16027826c9de0c16a6618b16feb6322c8333;hb=aee94f6923ba628a85d855d0c5316d0da78bfa2a;hp=4828032dbd6b51d5fdba113588a960f9945d2b93;hpb=27f45121cc74e31203777ad565f78d8aad9b92a2;p=ceph.git diff --git a/ceph/src/test/mds/TestMDSAuthCaps.cc b/ceph/src/test/mds/TestMDSAuthCaps.cc index 4828032db..a05f16027 100644 --- a/ceph/src/test/mds/TestMDSAuthCaps.cc +++ b/ceph/src/test/mds/TestMDSAuthCaps.cc @@ -58,7 +58,7 @@ TEST(MDSAuthCaps, ParseGood) { string str = parse_good[i]; MDSAuthCaps cap; std::cout << "Testing good input: '" << str << "'" << std::endl; - ASSERT_TRUE(cap.parse(g_ceph_context, str, &cout)); + ASSERT_TRUE(cap.parse(str, &cout)); } } @@ -97,7 +97,7 @@ TEST(MDSAuthCaps, ParseBad) { string str = parse_bad[i]; MDSAuthCaps cap; std::cout << "Testing bad input: '" << str << "'" << std::endl; - ASSERT_FALSE(cap.parse(g_ceph_context, str, &cout)); + ASSERT_FALSE(cap.parse(str, &cout)); } } @@ -105,26 +105,26 @@ TEST(MDSAuthCaps, AllowAll) { MDSAuthCaps cap; ASSERT_FALSE(cap.allow_all()); - ASSERT_TRUE(cap.parse(g_ceph_context, "allow r", NULL)); + ASSERT_TRUE(cap.parse("allow r", NULL)); ASSERT_FALSE(cap.allow_all()); cap = MDSAuthCaps(); - ASSERT_TRUE(cap.parse(g_ceph_context, "allow rw", NULL)); + ASSERT_TRUE(cap.parse("allow rw", NULL)); ASSERT_FALSE(cap.allow_all()); cap = MDSAuthCaps(); - ASSERT_TRUE(cap.parse(g_ceph_context, "allow", NULL)); + ASSERT_TRUE(cap.parse("allow", NULL)); ASSERT_FALSE(cap.allow_all()); cap = MDSAuthCaps(); - ASSERT_TRUE(cap.parse(g_ceph_context, "allow *", NULL)); + ASSERT_TRUE(cap.parse("allow *", NULL)); ASSERT_TRUE(cap.allow_all()); ASSERT_TRUE(cap.is_capable("foo/bar", 0, 0, 0777, 0, 0, NULL, MAY_READ | MAY_WRITE, 0, 0, addr)); } TEST(MDSAuthCaps, AllowUid) { - MDSAuthCaps cap(g_ceph_context); - ASSERT_TRUE(cap.parse(g_ceph_context, "allow * uid=10", NULL)); + MDSAuthCaps cap; + ASSERT_TRUE(cap.parse("allow * uid=10", NULL)); ASSERT_FALSE(cap.allow_all()); // uid/gid must be valid @@ -136,8 +136,8 @@ TEST(MDSAuthCaps, AllowUid) { } TEST(MDSAuthCaps, AllowUidGid) { - MDSAuthCaps cap(g_ceph_context); - ASSERT_TRUE(cap.parse(g_ceph_context, "allow * uid=10 gids=10,11,12; allow * uid=12 gids=12,10", NULL)); + MDSAuthCaps cap; + ASSERT_TRUE(cap.parse("allow * uid=10 gids=10,11,12; allow * uid=12 gids=12,10", NULL)); ASSERT_FALSE(cap.allow_all()); // uid/gid must be valid @@ -207,7 +207,7 @@ TEST(MDSAuthCaps, AllowUidGid) { TEST(MDSAuthCaps, AllowPath) { MDSAuthCaps cap; - ASSERT_TRUE(cap.parse(g_ceph_context, "allow * path=/sandbox", NULL)); + ASSERT_TRUE(cap.parse("allow * path=/sandbox", NULL)); ASSERT_FALSE(cap.allow_all()); ASSERT_TRUE(cap.is_capable("sandbox/foo", 0, 0, 0777, 0, 0, NULL, MAY_READ | MAY_WRITE, 0, 0, addr)); ASSERT_TRUE(cap.is_capable("sandbox", 0, 0, 0777, 0, 0, NULL, MAY_READ | MAY_WRITE, 0, 0, addr)); @@ -217,7 +217,7 @@ TEST(MDSAuthCaps, AllowPath) { TEST(MDSAuthCaps, AllowPathChars) { MDSAuthCaps unquo_cap; - ASSERT_TRUE(unquo_cap.parse(g_ceph_context, "allow * path=/sandbox-._foo", NULL)); + ASSERT_TRUE(unquo_cap.parse("allow * path=/sandbox-._foo", NULL)); ASSERT_FALSE(unquo_cap.allow_all()); ASSERT_TRUE(unquo_cap.is_capable("sandbox-._foo/foo", 0, 0, 0777, 0, 0, NULL, MAY_READ | MAY_WRITE, 0, 0, addr)); ASSERT_FALSE(unquo_cap.is_capable("sandbox", 0, 0, 0777, 0, 0, NULL, MAY_READ | MAY_WRITE, 0, 0, addr)); @@ -228,7 +228,7 @@ TEST(MDSAuthCaps, AllowPathChars) { TEST(MDSAuthCaps, AllowPathCharsQuoted) { MDSAuthCaps quo_cap; - ASSERT_TRUE(quo_cap.parse(g_ceph_context, "allow * path=\"/sandbox-._foo\"", NULL)); + ASSERT_TRUE(quo_cap.parse("allow * path=\"/sandbox-._foo\"", NULL)); ASSERT_FALSE(quo_cap.allow_all()); ASSERT_TRUE(quo_cap.is_capable("sandbox-._foo/foo", 0, 0, 0777, 0, 0, NULL, MAY_READ | MAY_WRITE, 0, 0, addr)); ASSERT_FALSE(quo_cap.is_capable("sandbox", 0, 0, 0777, 0, 0, NULL, MAY_READ | MAY_WRITE, 0, 0, addr)); @@ -238,7 +238,7 @@ TEST(MDSAuthCaps, AllowPathCharsQuoted) { TEST(MDSAuthCaps, RootSquash) { MDSAuthCaps rs_cap; - ASSERT_TRUE(rs_cap.parse(g_ceph_context, "allow rw root_squash, allow rw path=/sandbox", NULL)); + ASSERT_TRUE(rs_cap.parse("allow rw root_squash, allow rw path=/sandbox", NULL)); ASSERT_TRUE(rs_cap.is_capable("foo", 0, 0, 0777, 0, 0, NULL, MAY_READ, 0, 0, addr)); ASSERT_TRUE(rs_cap.is_capable("foo", 0, 0, 0777, 10, 10, NULL, MAY_READ | MAY_WRITE, 0, 0, addr)); ASSERT_FALSE(rs_cap.is_capable("foo", 0, 0, 0777, 0, 0, NULL, MAY_READ | MAY_WRITE, 0, 0, addr)); @@ -292,7 +292,7 @@ TEST(MDSAuthCaps, OutputParsed) { for (size_t i = 0; i < num_tests; ++i) { MDSAuthCaps cap; std::cout << "Testing input '" << test_values[i].input << "'" << std::endl; - ASSERT_TRUE(cap.parse(g_ceph_context, test_values[i].input, &cout)); + ASSERT_TRUE(cap.parse(test_values[i].input, &cout)); ASSERT_EQ(test_values[i].output, stringify(cap)); } } @@ -304,7 +304,7 @@ TEST(MDSAuthCaps, network) { c.parse("192.167.2.3"); MDSAuthCaps cap; - ASSERT_TRUE(cap.parse(g_ceph_context, "allow * network 192.168.0.0/16, allow * network 10.0.0.0/8", NULL)); + ASSERT_TRUE(cap.parse("allow * network 192.168.0.0/16, allow * network 10.0.0.0/8", NULL)); ASSERT_TRUE(cap.is_capable("foo", 0, 0, 0777, 0, 0, NULL, MAY_READ, 0, 0, a)); ASSERT_TRUE(cap.is_capable("foo", 0, 0, 0777, 0, 0, NULL, MAY_READ, 0, 0, b));