sl@0
|
1 |
/*
|
sl@0
|
2 |
* Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
|
sl@0
|
3 |
* All rights reserved.
|
sl@0
|
4 |
* This component and the accompanying materials are made available
|
sl@0
|
5 |
* under the terms of the License "Eclipse Public License v1.0"
|
sl@0
|
6 |
* which accompanies this distribution, and is available
|
sl@0
|
7 |
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
|
sl@0
|
8 |
*
|
sl@0
|
9 |
* Initial Contributors:
|
sl@0
|
10 |
* Nokia Corporation - initial contribution.
|
sl@0
|
11 |
*
|
sl@0
|
12 |
* Contributors:
|
sl@0
|
13 |
*
|
sl@0
|
14 |
* Description:
|
sl@0
|
15 |
*
|
sl@0
|
16 |
*/
|
sl@0
|
17 |
|
sl@0
|
18 |
|
sl@0
|
19 |
#include "t_policy.h"
|
sl@0
|
20 |
#include "t_input.h"
|
sl@0
|
21 |
#include "t_output.h"
|
sl@0
|
22 |
#include "t_testhandler.h"
|
sl@0
|
23 |
#include "utf.h"
|
sl@0
|
24 |
|
sl@0
|
25 |
#include <s32file.h>
|
sl@0
|
26 |
|
sl@0
|
27 |
// run failure tests first
|
sl@0
|
28 |
|
sl@0
|
29 |
_LIT8(KTestExeStart, "<testexe>");
|
sl@0
|
30 |
_LIT8(KExcludedCapsStart, "<excludedcapabilities>");
|
sl@0
|
31 |
_LIT8(KPolicyStart, "<policy>");
|
sl@0
|
32 |
_LIT8(KPreActionsStart, "<preactions>");
|
sl@0
|
33 |
_LIT8(KPassAcionStart, "<passactions>");
|
sl@0
|
34 |
_LIT8(KFailAcionStart, "<failactions>");
|
sl@0
|
35 |
_LIT8(KPostActionsStart, "<postactions>");
|
sl@0
|
36 |
_LIT8(KSecureIdStart, "<secureid>");
|
sl@0
|
37 |
_LIT8(KSecureIdEnd, "</secureid>");
|
sl@0
|
38 |
_LIT8(KVendorIdStart, "<vendorid>");
|
sl@0
|
39 |
_LIT8(KVendorIdEnd, "</vendorid>");
|
sl@0
|
40 |
|
sl@0
|
41 |
_LIT(KFormat,"Action Name : %S \n");
|
sl@0
|
42 |
_LIT(KSetCapExe, "setcap");
|
sl@0
|
43 |
_LIT(KSetCapExe2, "setcap : ");
|
sl@0
|
44 |
//NOTE :If the below literal is uncommented , remove the c:\hardcoded reference
|
sl@0
|
45 |
// and replace with RFs::GetSystemDrive().
|
sl@0
|
46 |
//_LIT(KTestExeTmpPath, "c:\\sys\\bin\\policytest_exe.exe");
|
sl@0
|
47 |
_LIT(KPassScriptPath, "\\policytest_script_pass.txt");
|
sl@0
|
48 |
_LIT(KFailScriptPath, "\\policytest_script_fail.txt");
|
sl@0
|
49 |
_LIT(KLogTmpPath, "\\policytest_log.txt");
|
sl@0
|
50 |
_LIT(KTestPath, "policytest_");
|
sl@0
|
51 |
_LIT(KFailTestRunning, "Fail Test Script Running");
|
sl@0
|
52 |
_LIT(KPassTestRunning, "Pass Test Script Running");
|
sl@0
|
53 |
|
sl@0
|
54 |
|
sl@0
|
55 |
const TUint KCapabilityAll = 0xffffffff;
|
sl@0
|
56 |
|
sl@0
|
57 |
CPolicyTest* CPolicyTest::NewL(CConsoleBase& aConsole,
|
sl@0
|
58 |
Output& aOut,
|
sl@0
|
59 |
const TTestActionSpec& aTestActionSpec)
|
sl@0
|
60 |
{
|
sl@0
|
61 |
CPolicyTest* self = CPolicyTest::NewLC(aConsole, aOut, aTestActionSpec);
|
sl@0
|
62 |
CleanupStack::Pop(self);
|
sl@0
|
63 |
return self;
|
sl@0
|
64 |
}
|
sl@0
|
65 |
|
sl@0
|
66 |
CPolicyTest* CPolicyTest::NewLC(CConsoleBase& aConsole,
|
sl@0
|
67 |
Output& aOut,
|
sl@0
|
68 |
const TTestActionSpec& aTestActionSpec)
|
sl@0
|
69 |
{
|
sl@0
|
70 |
CPolicyTest* self = new(ELeave) CPolicyTest(aConsole, aOut);
|
sl@0
|
71 |
CleanupStack::PushL(self);
|
sl@0
|
72 |
self->ConstructL(aTestActionSpec);
|
sl@0
|
73 |
return self;
|
sl@0
|
74 |
}
|
sl@0
|
75 |
|
sl@0
|
76 |
CPolicyTest::CPolicyTest(CConsoleBase& aConsole,
|
sl@0
|
77 |
Output& aOut)
|
sl@0
|
78 |
: CTestAction(aConsole, aOut)
|
sl@0
|
79 |
{
|
sl@0
|
80 |
}
|
sl@0
|
81 |
|
sl@0
|
82 |
void CPolicyTest::ConstructL(const TTestActionSpec& aTestActionSpec)
|
sl@0
|
83 |
{
|
sl@0
|
84 |
CTestAction::ConstructL(aTestActionSpec);
|
sl@0
|
85 |
iExpectedResult = KErrNone;
|
sl@0
|
86 |
|
sl@0
|
87 |
User::LeaveIfError(iFs.Connect());
|
sl@0
|
88 |
|
sl@0
|
89 |
RProcess thisProcess;
|
sl@0
|
90 |
User::LeaveIfError(thisProcess.Open(thisProcess.Id()));
|
sl@0
|
91 |
iProcessSecureId = thisProcess.SecureId();
|
sl@0
|
92 |
iProcessVendorId = thisProcess.VendorId();
|
sl@0
|
93 |
thisProcess.Close();
|
sl@0
|
94 |
|
sl@0
|
95 |
SetTestExeL(Input::ParseElement(aTestActionSpec.iActionBody, KTestExeStart));
|
sl@0
|
96 |
Input::ParseCapabilitySetL(Input::ParseElement(aTestActionSpec.iActionBody, KExcludedCapsStart), iExcludedCaps);
|
sl@0
|
97 |
SetPolicyL(Input::ParseElement(aTestActionSpec.iActionBody, KPolicyStart));
|
sl@0
|
98 |
iPreActions = Input::ParseElement(aTestActionSpec.iActionBody, KPreActionsStart).AllocL();
|
sl@0
|
99 |
SetTestActionL(Input::ParseElement(aTestActionSpec.iActionBody, KPassAcionStart),
|
sl@0
|
100 |
Input::ParseElement(aTestActionSpec.iActionBody, KFailAcionStart));
|
sl@0
|
101 |
iPostActions = Input::ParseElement(aTestActionSpec.iActionBody, KPostActionsStart).AllocL();
|
sl@0
|
102 |
}
|
sl@0
|
103 |
|
sl@0
|
104 |
CPolicyTest::~CPolicyTest()
|
sl@0
|
105 |
{
|
sl@0
|
106 |
iFs.Close();
|
sl@0
|
107 |
delete iTestExe;
|
sl@0
|
108 |
iCapabilities.Close();
|
sl@0
|
109 |
delete iPreActions;
|
sl@0
|
110 |
delete iPassAction;
|
sl@0
|
111 |
delete iFailAction;
|
sl@0
|
112 |
delete iPostActions;
|
sl@0
|
113 |
iProcess.Close();
|
sl@0
|
114 |
}
|
sl@0
|
115 |
|
sl@0
|
116 |
void CPolicyTest::BadUsageL(const TDesC& aMessage)
|
sl@0
|
117 |
{
|
sl@0
|
118 |
iOut.writeString(_L("Error in script action testpolicy"));
|
sl@0
|
119 |
iOut.writeNewLine();
|
sl@0
|
120 |
iOut.writeString(aMessage);
|
sl@0
|
121 |
iOut.writeNewLine();
|
sl@0
|
122 |
User::Leave(KErrArgument);
|
sl@0
|
123 |
}
|
sl@0
|
124 |
|
sl@0
|
125 |
void CPolicyTest::SetTestExeL(const TDesC8& aPath)
|
sl@0
|
126 |
{
|
sl@0
|
127 |
if (aPath == KNullDesC8)
|
sl@0
|
128 |
{
|
sl@0
|
129 |
BadUsageL(_L("testexe not specified"));
|
sl@0
|
130 |
}
|
sl@0
|
131 |
|
sl@0
|
132 |
iTestExe = HBufC::NewMaxL(aPath.Length());
|
sl@0
|
133 |
TPtr ptr = iTestExe->Des();
|
sl@0
|
134 |
ptr.Copy(aPath);
|
sl@0
|
135 |
}
|
sl@0
|
136 |
|
sl@0
|
137 |
void CPolicyTest::SetPolicyL(const TDesC8& aSpec)
|
sl@0
|
138 |
{
|
sl@0
|
139 |
iSecureId = Input::ParseIntElement(aSpec, KSecureIdStart, KSecureIdEnd);
|
sl@0
|
140 |
iVendorId = Input::ParseIntElement(aSpec, KVendorIdStart, KVendorIdEnd);
|
sl@0
|
141 |
|
sl@0
|
142 |
TCapabilitySet capSet;
|
sl@0
|
143 |
Input::ParseCapabilitySetL(aSpec, capSet);
|
sl@0
|
144 |
|
sl@0
|
145 |
// Extract capabilities into array
|
sl@0
|
146 |
for (TInt i = 0 ; i < ECapability_Limit ; ++i)
|
sl@0
|
147 |
{
|
sl@0
|
148 |
TCapability c = static_cast<TCapability>(i);
|
sl@0
|
149 |
if (capSet.HasCapability(c))
|
sl@0
|
150 |
{
|
sl@0
|
151 |
User::LeaveIfError(iCapabilities.Append(c));
|
sl@0
|
152 |
}
|
sl@0
|
153 |
}
|
sl@0
|
154 |
}
|
sl@0
|
155 |
|
sl@0
|
156 |
void CPolicyTest::SetTestActionL(const TDesC8& aPassAction, const TDesC8& aFailAction)
|
sl@0
|
157 |
{
|
sl@0
|
158 |
if (aPassAction == KNullDesC8)
|
sl@0
|
159 |
{
|
sl@0
|
160 |
BadUsageL(_L("passactions not specified"));
|
sl@0
|
161 |
}
|
sl@0
|
162 |
|
sl@0
|
163 |
iPassAction = aPassAction.AllocL();
|
sl@0
|
164 |
|
sl@0
|
165 |
if (aFailAction == KNullDesC8)
|
sl@0
|
166 |
{
|
sl@0
|
167 |
BadUsageL(_L("failactions not specified"));
|
sl@0
|
168 |
}
|
sl@0
|
169 |
|
sl@0
|
170 |
iFailAction = aFailAction.AllocL();
|
sl@0
|
171 |
}
|
sl@0
|
172 |
|
sl@0
|
173 |
void CPolicyTest::PerformAction(TRequestStatus& aStatus)
|
sl@0
|
174 |
{
|
sl@0
|
175 |
if (aStatus < 0)
|
sl@0
|
176 |
{
|
sl@0
|
177 |
iState = EFinished;
|
sl@0
|
178 |
}
|
sl@0
|
179 |
|
sl@0
|
180 |
switch (iState)
|
sl@0
|
181 |
{
|
sl@0
|
182 |
case EInit:
|
sl@0
|
183 |
{
|
sl@0
|
184 |
TDriveUnit sysDrive (RFs::GetSystemDrive());
|
sl@0
|
185 |
TDriveName sysDriveName (sysDrive.Name());
|
sl@0
|
186 |
|
sl@0
|
187 |
TBuf<128> scriptFile (sysDriveName);
|
sl@0
|
188 |
scriptFile.Append(KPassScriptPath);
|
sl@0
|
189 |
WriteScriptFileL(scriptFile, *iPassAction);
|
sl@0
|
190 |
|
sl@0
|
191 |
scriptFile.Copy(sysDriveName);
|
sl@0
|
192 |
scriptFile.Append(KFailScriptPath);
|
sl@0
|
193 |
WriteScriptFileL(scriptFile, *iFailAction);
|
sl@0
|
194 |
}
|
sl@0
|
195 |
// fall through
|
sl@0
|
196 |
|
sl@0
|
197 |
case ESetupTest:
|
sl@0
|
198 |
GetNextTest();
|
sl@0
|
199 |
if (iTestState == ETestFinished)
|
sl@0
|
200 |
{
|
sl@0
|
201 |
iState = EFinished;
|
sl@0
|
202 |
TRequestStatus* status = &aStatus;
|
sl@0
|
203 |
User::RequestComplete(status, KErrNone);
|
sl@0
|
204 |
}
|
sl@0
|
205 |
else
|
sl@0
|
206 |
{
|
sl@0
|
207 |
SetupTestL(aStatus);
|
sl@0
|
208 |
iState = ERunTest;
|
sl@0
|
209 |
}
|
sl@0
|
210 |
break;
|
sl@0
|
211 |
|
sl@0
|
212 |
case ERunTest:
|
sl@0
|
213 |
CheckProcessTermintationL();
|
sl@0
|
214 |
RunTestL(aStatus);
|
sl@0
|
215 |
iState = EProcessResults;
|
sl@0
|
216 |
break;
|
sl@0
|
217 |
|
sl@0
|
218 |
case EProcessResults:
|
sl@0
|
219 |
CheckProcessTermintationL();
|
sl@0
|
220 |
ProcessResultsL(aStatus);
|
sl@0
|
221 |
iState = ESetupTest;
|
sl@0
|
222 |
break;
|
sl@0
|
223 |
|
sl@0
|
224 |
case EFinished:
|
sl@0
|
225 |
iActionState = EPostrequisite;
|
sl@0
|
226 |
TRequestStatus* status = &aStatus;
|
sl@0
|
227 |
User::RequestComplete(status, aStatus.Int());
|
sl@0
|
228 |
break;
|
sl@0
|
229 |
}
|
sl@0
|
230 |
}
|
sl@0
|
231 |
|
sl@0
|
232 |
void CPolicyTest::StartProcessL(const TDesC& aExe, const TDesC& aCommandLine, TRequestStatus& aStatus)
|
sl@0
|
233 |
{
|
sl@0
|
234 |
iOut.writeString(_L("Starting child process: "));
|
sl@0
|
235 |
iOut.writeString(aExe);
|
sl@0
|
236 |
iOut.writeString(_L(" "));
|
sl@0
|
237 |
iOut.writeString(aCommandLine);
|
sl@0
|
238 |
iOut.writeNewLine();
|
sl@0
|
239 |
|
sl@0
|
240 |
User::LeaveIfError(iProcess.Create(aExe, aCommandLine));
|
sl@0
|
241 |
iProcess.Logon(aStatus);
|
sl@0
|
242 |
iProcess.Resume();
|
sl@0
|
243 |
}
|
sl@0
|
244 |
|
sl@0
|
245 |
void CPolicyTest::CheckProcessTermintationL()
|
sl@0
|
246 |
{
|
sl@0
|
247 |
if (iProcess.ExitType() == EExitPanic)
|
sl@0
|
248 |
{
|
sl@0
|
249 |
iOut.writeString(_L("Child process panicked: "));
|
sl@0
|
250 |
iOut.writeString(iProcess.ExitCategory());
|
sl@0
|
251 |
iOut.writeString(_L(" "));
|
sl@0
|
252 |
iOut.writeNum(iProcess.ExitReason());
|
sl@0
|
253 |
iOut.writeNewLine();
|
sl@0
|
254 |
User::Leave(KErrGeneral);
|
sl@0
|
255 |
}
|
sl@0
|
256 |
ASSERT(iProcess.ExitType() == EExitKill);
|
sl@0
|
257 |
iProcess.Close();
|
sl@0
|
258 |
}
|
sl@0
|
259 |
|
sl@0
|
260 |
void CPolicyTest::GetNextTest()
|
sl@0
|
261 |
{
|
sl@0
|
262 |
// Step through capabilities to be tested
|
sl@0
|
263 |
if (iTestState == ETestFailCap)
|
sl@0
|
264 |
{
|
sl@0
|
265 |
++iCapIndex;
|
sl@0
|
266 |
if (iCapIndex < iCapabilities.Count())
|
sl@0
|
267 |
return;
|
sl@0
|
268 |
}
|
sl@0
|
269 |
|
sl@0
|
270 |
// Step through possible tests until we hit a vaild test
|
sl@0
|
271 |
do
|
sl@0
|
272 |
{
|
sl@0
|
273 |
iTestState = static_cast<TTestState>(iTestState + 1);
|
sl@0
|
274 |
}
|
sl@0
|
275 |
while (!((iTestState == ETestFailSID && iSecureId) ||
|
sl@0
|
276 |
(iTestState == ETestFailVID && iVendorId) ||
|
sl@0
|
277 |
(iTestState == ETestFailCap && iCapabilities.Count()) ||
|
sl@0
|
278 |
(iTestState == ETestPass) ||
|
sl@0
|
279 |
(iTestState == ETestFinished)));
|
sl@0
|
280 |
}
|
sl@0
|
281 |
|
sl@0
|
282 |
void CPolicyTest::SetupTestL(TRequestStatus& aStatus)
|
sl@0
|
283 |
{
|
sl@0
|
284 |
switch (iTestState)
|
sl@0
|
285 |
{
|
sl@0
|
286 |
case ETestFailSID:
|
sl@0
|
287 |
{
|
sl@0
|
288 |
TInt wrongSecureId = iSecureId + 1;
|
sl@0
|
289 |
iOut.write(_L("Failure test: Wrong SID (%08x):\n\n"), wrongSecureId);
|
sl@0
|
290 |
SetTestSecurityInfoL(wrongSecureId, iVendorId, KCapabilityAll, aStatus);
|
sl@0
|
291 |
}
|
sl@0
|
292 |
break;
|
sl@0
|
293 |
|
sl@0
|
294 |
case ETestFailVID:
|
sl@0
|
295 |
{
|
sl@0
|
296 |
TInt wrongVendorId = iVendorId + 1;
|
sl@0
|
297 |
iOut.write(_L("Failure test: Wrong VID (%08x):\n\n"), wrongVendorId);
|
sl@0
|
298 |
SetTestSecurityInfoL(iSecureId, wrongVendorId, KCapabilityAll, aStatus);
|
sl@0
|
299 |
}
|
sl@0
|
300 |
break;
|
sl@0
|
301 |
|
sl@0
|
302 |
case ETestFailCap:
|
sl@0
|
303 |
{
|
sl@0
|
304 |
TCapability missingCap = iCapabilities[iCapIndex];
|
sl@0
|
305 |
|
sl@0
|
306 |
iOut.writeString(_L("Failure test: Missing capability ("));
|
sl@0
|
307 |
iOut.writeCapabilityL(missingCap);
|
sl@0
|
308 |
iOut.writeString(_L("):\n\n"));
|
sl@0
|
309 |
|
sl@0
|
310 |
TUint capSet = ~ (1 << missingCap);
|
sl@0
|
311 |
SetTestSecurityInfoL(iSecureId, iVendorId, capSet, aStatus);
|
sl@0
|
312 |
}
|
sl@0
|
313 |
break;
|
sl@0
|
314 |
|
sl@0
|
315 |
case ETestPass:
|
sl@0
|
316 |
{
|
sl@0
|
317 |
iOut.write(_L("Pass test:\n\n"));
|
sl@0
|
318 |
|
sl@0
|
319 |
TUint capSet = 0;
|
sl@0
|
320 |
for (TInt i = 0 ; i < iCapabilities.Count() ; ++i)
|
sl@0
|
321 |
{
|
sl@0
|
322 |
capSet |= 1 << iCapabilities[i];
|
sl@0
|
323 |
}
|
sl@0
|
324 |
|
sl@0
|
325 |
SetTestSecurityInfoL(iSecureId, iVendorId, capSet, aStatus);
|
sl@0
|
326 |
}
|
sl@0
|
327 |
break;
|
sl@0
|
328 |
|
sl@0
|
329 |
default:
|
sl@0
|
330 |
User::Invariant();
|
sl@0
|
331 |
}
|
sl@0
|
332 |
}
|
sl@0
|
333 |
|
sl@0
|
334 |
void CPolicyTest::SetTestSecurityInfoL(TInt aSecureId, TInt aVendorId, TUint aCapSet, TRequestStatus& aStatus)
|
sl@0
|
335 |
{
|
sl@0
|
336 |
// Remove excluded capabilities
|
sl@0
|
337 |
for (TInt i = 0 ; i < ECapability_Limit ; ++i)
|
sl@0
|
338 |
{
|
sl@0
|
339 |
if (iExcludedCaps.HasCapability(static_cast<TCapability>(i)))
|
sl@0
|
340 |
{
|
sl@0
|
341 |
aCapSet &= ~ (1 << i);
|
sl@0
|
342 |
}
|
sl@0
|
343 |
}
|
sl@0
|
344 |
|
sl@0
|
345 |
TBuf<128> commandLine;
|
sl@0
|
346 |
commandLine.AppendFormat(_L("%S %08x "), iTestExe, aCapSet);
|
sl@0
|
347 |
if (aSecureId)
|
sl@0
|
348 |
{
|
sl@0
|
349 |
commandLine.AppendFormat(_L("-SID %08x "), aSecureId);
|
sl@0
|
350 |
}
|
sl@0
|
351 |
if (aVendorId)
|
sl@0
|
352 |
{
|
sl@0
|
353 |
commandLine.AppendFormat(_L("-VID %08x "), aVendorId);
|
sl@0
|
354 |
}
|
sl@0
|
355 |
// commandLine.Append(KTestExeTmpPath);
|
sl@0
|
356 |
iTestExeTmpNewPath = KTestPath;
|
sl@0
|
357 |
iTestExeTmpNewPath.Append(*iTestExe);
|
sl@0
|
358 |
commandLine.Append(iTestExeTmpNewPath);
|
sl@0
|
359 |
|
sl@0
|
360 |
TBuf<128> isetcapTmpNewPath1; //stores the value of commandline
|
sl@0
|
361 |
TBuf<128> isetcapTmpNewPath; //stores the value of KsetCapexe2
|
sl@0
|
362 |
isetcapTmpNewPath = KSetCapExe2;
|
sl@0
|
363 |
isetcapTmpNewPath1= commandLine;
|
sl@0
|
364 |
isetcapTmpNewPath.Append(isetcapTmpNewPath1);
|
sl@0
|
365 |
RDebug::RawPrint(isetcapTmpNewPath);
|
sl@0
|
366 |
StartProcessL(KSetCapExe, commandLine, aStatus);
|
sl@0
|
367 |
|
sl@0
|
368 |
}
|
sl@0
|
369 |
|
sl@0
|
370 |
void CPolicyTest::WriteScriptFileL(const TDesC& aPath, const TDesC8& aAction)
|
sl@0
|
371 |
{
|
sl@0
|
372 |
iFs.Delete(aPath); // ignore errors
|
sl@0
|
373 |
|
sl@0
|
374 |
RFile file;
|
sl@0
|
375 |
User::LeaveIfError(file.Create(iFs, aPath, EFileShareExclusive | EFileWrite));
|
sl@0
|
376 |
CleanupClosePushL(file);
|
sl@0
|
377 |
|
sl@0
|
378 |
User::LeaveIfError(file.Write(*iPreActions));
|
sl@0
|
379 |
User::LeaveIfError(file.Write(aAction));
|
sl@0
|
380 |
User::LeaveIfError(file.Write(*iPostActions));
|
sl@0
|
381 |
|
sl@0
|
382 |
CleanupStack::PopAndDestroy(&file);
|
sl@0
|
383 |
}
|
sl@0
|
384 |
|
sl@0
|
385 |
void CPolicyTest::RunTestL(TRequestStatus& aStatus)
|
sl@0
|
386 |
{
|
sl@0
|
387 |
|
sl@0
|
388 |
HBufC* hptr16;
|
sl@0
|
389 |
hptr16 = CnvUtfConverter::ConvertToUnicodeFromUtf8L(*iNameInfo);
|
sl@0
|
390 |
RDebug::Print(KFormat,hptr16);
|
sl@0
|
391 |
delete hptr16;
|
sl@0
|
392 |
|
sl@0
|
393 |
TDriveUnit sysDrive (RFs::GetSystemDrive());
|
sl@0
|
394 |
TDriveName sysDriveName (sysDrive.Name());
|
sl@0
|
395 |
|
sl@0
|
396 |
TBuf<128> passScriptFile (sysDriveName);
|
sl@0
|
397 |
passScriptFile.Append(KPassScriptPath);
|
sl@0
|
398 |
|
sl@0
|
399 |
TBuf<128> failScriptFile (sysDriveName);
|
sl@0
|
400 |
failScriptFile.Append(KFailScriptPath);
|
sl@0
|
401 |
|
sl@0
|
402 |
TPtrC script = (iTestState == ETestPass) ? passScriptFile : failScriptFile;
|
sl@0
|
403 |
(iTestState == ETestPass) ? RDebug::RawPrint(KPassTestRunning) : RDebug::RawPrint(KFailTestRunning);
|
sl@0
|
404 |
|
sl@0
|
405 |
|
sl@0
|
406 |
TBuf<128> logTmpFile (sysDriveName);
|
sl@0
|
407 |
logTmpFile.Append(KLogTmpPath);
|
sl@0
|
408 |
iFs.Delete(logTmpFile); // ignore errors
|
sl@0
|
409 |
|
sl@0
|
410 |
TBuf<128> commandLine;
|
sl@0
|
411 |
commandLine.AppendFormat(_L("%S %S"), &script, &logTmpFile);
|
sl@0
|
412 |
|
sl@0
|
413 |
StartProcessL(iTestExeTmpNewPath, commandLine, aStatus);
|
sl@0
|
414 |
}
|
sl@0
|
415 |
|
sl@0
|
416 |
void CPolicyTest::ProcessResultsL(TRequestStatus& aStatus)
|
sl@0
|
417 |
{
|
sl@0
|
418 |
_LIT8(KSummaryLine, " tests failed out of ");
|
sl@0
|
419 |
_LIT8(KNewLine, "\r\n");
|
sl@0
|
420 |
|
sl@0
|
421 |
TInt failCount = KErrNotFound, runCount;
|
sl@0
|
422 |
|
sl@0
|
423 |
// Read entire log file into memory to process
|
sl@0
|
424 |
RFile file;
|
sl@0
|
425 |
TDriveUnit sysDrive (RFs::GetSystemDrive());
|
sl@0
|
426 |
TBuf<128> logTmpFile (sysDrive.Name());
|
sl@0
|
427 |
logTmpFile.Append(KLogTmpPath);
|
sl@0
|
428 |
User::LeaveIfError(file.Open(iFs, logTmpFile, EFileShareReadersOnly | EFileRead));
|
sl@0
|
429 |
CleanupClosePushL(file);
|
sl@0
|
430 |
|
sl@0
|
431 |
TInt size;
|
sl@0
|
432 |
User::LeaveIfError(file.Size(size));
|
sl@0
|
433 |
HBufC8* buffer = HBufC8::NewLC(size);
|
sl@0
|
434 |
TPtr8 ptr = buffer->Des();
|
sl@0
|
435 |
|
sl@0
|
436 |
User::LeaveIfError(file.Read(ptr));
|
sl@0
|
437 |
|
sl@0
|
438 |
iOut.writeString(_L("Child test output:\n"));
|
sl@0
|
439 |
|
sl@0
|
440 |
TInt pos = 0;
|
sl@0
|
441 |
while (pos < size)
|
sl@0
|
442 |
{
|
sl@0
|
443 |
TInt nextNewline = buffer->Mid(pos).Find(KNewLine);
|
sl@0
|
444 |
|
sl@0
|
445 |
// Split buffer into lines
|
sl@0
|
446 |
TPtrC8 line;
|
sl@0
|
447 |
if (nextNewline == KErrNotFound)
|
sl@0
|
448 |
{
|
sl@0
|
449 |
line.Set(buffer->Mid(pos));
|
sl@0
|
450 |
}
|
sl@0
|
451 |
else
|
sl@0
|
452 |
{
|
sl@0
|
453 |
line.Set(buffer->Mid(pos, nextNewline + KNewLine().Length()));
|
sl@0
|
454 |
}
|
sl@0
|
455 |
pos += line.Length();
|
sl@0
|
456 |
|
sl@0
|
457 |
// Search for summary line
|
sl@0
|
458 |
TInt pos2 = line.Find(KSummaryLine);
|
sl@0
|
459 |
if (pos2 != KErrNotFound)
|
sl@0
|
460 |
{
|
sl@0
|
461 |
// Parse the summary line to work out if the test passed
|
sl@0
|
462 |
TLex8 lex1(line.Left(pos2));
|
sl@0
|
463 |
TInt err1 = lex1.Val(failCount);
|
sl@0
|
464 |
TLex8 lex2(line.Mid(pos2 + KSummaryLine().Length()));
|
sl@0
|
465 |
TInt err2 = lex2.Val(runCount);
|
sl@0
|
466 |
|
sl@0
|
467 |
if (err1 != KErrNone || err2 != KErrNone)
|
sl@0
|
468 |
{
|
sl@0
|
469 |
iOut.writeString(_L("Failed to parse summary line\n"));
|
sl@0
|
470 |
User::LeaveIfError(err1);
|
sl@0
|
471 |
User::LeaveIfError(err2);
|
sl@0
|
472 |
}
|
sl@0
|
473 |
}
|
sl@0
|
474 |
else
|
sl@0
|
475 |
{
|
sl@0
|
476 |
// Don't print the summary line as this will confuse whatever parsed
|
sl@0
|
477 |
// the main log
|
sl@0
|
478 |
iOut.writeString(_L("> "));
|
sl@0
|
479 |
iOut.writeString(line);
|
sl@0
|
480 |
}
|
sl@0
|
481 |
}
|
sl@0
|
482 |
|
sl@0
|
483 |
if (failCount == KErrNotFound)
|
sl@0
|
484 |
{
|
sl@0
|
485 |
iOut.writeString(_L("Couldn't find summary line in test output\n"));
|
sl@0
|
486 |
User::Leave(KErrNotFound);
|
sl@0
|
487 |
}
|
sl@0
|
488 |
iFailCount += failCount;
|
sl@0
|
489 |
|
sl@0
|
490 |
// Print results in different format
|
sl@0
|
491 |
iOut.write(_L("Tests run: %d\n"), runCount);
|
sl@0
|
492 |
iOut.write(_L("Tests failed: %d\n"), failCount);
|
sl@0
|
493 |
iOut.writeNewLine();
|
sl@0
|
494 |
|
sl@0
|
495 |
CleanupStack::PopAndDestroy(2, &file);
|
sl@0
|
496 |
|
sl@0
|
497 |
TRequestStatus* status = &aStatus;
|
sl@0
|
498 |
User::RequestComplete(status, KErrNone);
|
sl@0
|
499 |
}
|
sl@0
|
500 |
|
sl@0
|
501 |
void CPolicyTest::PerformCancel()
|
sl@0
|
502 |
{
|
sl@0
|
503 |
// not implemented - need to pass original status object to LogonCancel
|
sl@0
|
504 |
User::Invariant();
|
sl@0
|
505 |
/*
|
sl@0
|
506 |
switch (iState)
|
sl@0
|
507 |
{
|
sl@0
|
508 |
case ESetCapsPass:
|
sl@0
|
509 |
case ERunTest:
|
sl@0
|
510 |
iProcess.LogonCancel();
|
sl@0
|
511 |
iProcess.Kill(KErrCancel);
|
sl@0
|
512 |
iProcess.Close();
|
sl@0
|
513 |
break;
|
sl@0
|
514 |
}
|
sl@0
|
515 |
*/
|
sl@0
|
516 |
}
|
sl@0
|
517 |
|
sl@0
|
518 |
void CPolicyTest::Reset()
|
sl@0
|
519 |
{
|
sl@0
|
520 |
iProcess.Close();
|
sl@0
|
521 |
iState = ESetupTest;
|
sl@0
|
522 |
iTestState = ETestNone;
|
sl@0
|
523 |
iCapIndex = -1;
|
sl@0
|
524 |
iFailCount = 0;
|
sl@0
|
525 |
}
|
sl@0
|
526 |
|
sl@0
|
527 |
void CPolicyTest::DoReportAction()
|
sl@0
|
528 |
{
|
sl@0
|
529 |
iOut.writeString(_L("Running policy tests...\n\n"));
|
sl@0
|
530 |
}
|
sl@0
|
531 |
|
sl@0
|
532 |
void CPolicyTest::DoCheckResult(TInt aError)
|
sl@0
|
533 |
{
|
sl@0
|
534 |
if (aError == KErrNone && iFailCount > 0)
|
sl@0
|
535 |
{
|
sl@0
|
536 |
iOut.write(_L("%d tests failed\n"), iFailCount);
|
sl@0
|
537 |
aError = KErrGeneral;
|
sl@0
|
538 |
}
|
sl@0
|
539 |
|
sl@0
|
540 |
iResult = (aError == iExpectedResult);
|
sl@0
|
541 |
}
|