First public contribution.
1 // Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
2 // All rights reserved.
3 // This component and the accompanying materials are made available
4 // under the terms of "Eclipse Public License v1.0"
5 // which accompanies this distribution, and is available
6 // at the URL "http://www.eclipse.org/legal/epl-v10.html".
8 // Initial Contributors:
9 // Nokia Corporation - initial contribution.
14 // The main purpose of this application is to test
15 // starting of SysAgt2 server and testing RProperty::Get()/Set() methods on
16 // protected by capability properties.
22 #include <e32property.h>
25 #include <saclsdefines.h>
26 #include "SaPrivate.h"
27 #include <saclscommon.h>
28 static RTest TheTest(_L("T_SysAgt2"));
30 _LIT(KSysAgent2ServerName, "SysAgt2Svr");
34 //Test macroses and functions
35 LOCAL_C void Check(TInt aValue, TInt aLine)
39 TheTest(EFalse, aLine);
42 static void Check(TInt aValue, TInt aExpected, TInt aLine)
44 if(aValue != aExpected)
46 RDebug::Print(_L("*** Expected error: %d, got: %d\r\n"), aExpected, aValue);
47 TheTest(EFalse, aLine);
50 #define TEST(arg) ::Check((arg), __LINE__)
51 #define TEST2(aValue, aExpected) ::Check(aValue, aExpected, __LINE__)
63 * These are keys which are defined by SystemAgent2
64 * which belong to other subsystems.
67 keyAssociation KSaExternalKeys[]=
69 KUidSystemCategory,KSAUidJavaInstallKeyValue,ETrue, // Java Install Key
70 KUidSystemCategory,KSAUidSoftwareInstallKeyValue,ETrue, // Software Install Key
71 KUidSystemCategory,KUidSwiLatestInstallation,ETrue,
72 KUidSystemCategory,KUidJmiLatestInstallation,ETrue,
73 KUidSystemCategory,KUidUnifiedCertstoreFlag,ETrue,
74 KUidSystemCategory,KUidBackupRestoreKey,ETrue,
75 KSAPosIndicatorCategory,KSAPosIntGpsHwStatus,ETrue,
76 KSAPosLastKnownLocationCategory,KSAPosLastKnownLocation,EFalse
79 TBool IsProcessRunning(const TDesC& aProcessName)
82 TBool IsProcessRunning(EFalse);
83 TBuf<64> pattern(aProcessName);
84 TInt length = pattern.Length();
86 TFindProcess procFinder(pattern);
88 while(procFinder.Next(name) == KErrNone)
90 if(name.Length() > length)
91 {//If found name is a string containing aProcessName string.
92 TChar c(name[length]);
93 if(c.IsAlphaDigit() || c == TChar('_') || c == TChar('-'))
94 {//If the found name is other valid application name starting with aProcessName string.
95 RDebug::Print(_L(":: Process name: \"%S\".\n"), &name);
100 if(proc.Open(name) == KErrNone)
102 if (EExitKill == proc.ExitType())
104 RDebug::Print(_L("\"%S\" process killed.\n"), &name);
106 IsProcessRunning = EFalse;
110 IsProcessRunning = ETrue;
111 RDebug::Print(_L("\"%S\" process is running.\n"), &name);
116 RDebug::Print(_L("Waiting additional time...\n"), &name);
118 User::After(1000000);
120 if (EExitKill == proc.ExitType())
122 RDebug::Print(_L("\"%S\" process now killed.\n"), &name);
123 IsProcessRunning = EFalse;
132 return IsProcessRunning;
139 @SYMTestCaseID SYSLIB-SYSAGENT2-CT-1254
140 @SYMTestCaseDesc Tests for SysAgt2 server
141 @SYMTestPriority High
142 @SYMTestActions Tests for RProperty::Set() and RProperty::Get() functions
143 @SYMTestExpectedResults Test must not fail
146 static void RunTestsL()
148 TheTest.Start(_L(" @SYMTestCaseID:SYSLIB-SYSAGENT2-CT-1254 StartSysAgt2() test 1 "));
149 TInt err = ::StartSysAgt2();
150 TEST(err == KErrNone);
152 //proves that server does not run
153 err = IsProcessRunning(KSysAgent2ServerName);
156 TheTest.Next(_L("Capability test"));
157 //The access to KUidPhonePwr, KUidSIMStatus, KUidNetworkStatus, KUidNetworkStrength,
158 //KUidChargerStatus, KUidBatteryStrength, KUidCurrentCall capabilities is protected
159 //by different capabilities. T_SAgtTest has only ReadDeviceData. Then, all attempts
160 //to write/read to/from protected capabilities must fail.
161 if(PlatSec::ConfigSetting(PlatSec::EPlatSecEnforcement) &&
162 PlatSec::IsCapabilityEnforced(ECapabilityWriteDeviceData))
164 err = RProperty::Set(KUidSystemCategory, KUidPhonePwr.iUid, 1);
165 TEST2(err, KErrPermissionDenied);
167 err = RProperty::Set(KUidSystemCategory, KUidSIMStatus.iUid, 1);
168 TEST2(err, KErrPermissionDenied);
170 err = RProperty::Set(KUidSystemCategory, KUidNetworkStatus.iUid, 1);
171 TEST2(err, KErrPermissionDenied);
173 err = RProperty::Set(KUidSystemCategory, KUidNetworkStrength.iUid, 1);
174 TEST2(err, KErrPermissionDenied);
176 err = RProperty::Set(KUidSystemCategory, KUidChargerStatus.iUid, 1);
177 TEST2(err, KErrPermissionDenied);
179 err = RProperty::Set(KUidSystemCategory, KUidBatteryStrength.iUid, 1);
180 TEST2(err, KErrPermissionDenied);
182 err = RProperty::Set(KUidSystemCategory, KUidCurrentCall.iUid, 1);
183 TEST2(err, KErrPermissionDenied);
186 TheTest.Next(_L("Capability test 2"));
187 //If all 48 predefined properties were registered successfully (by SysAgent server),
188 //the test must be able to read their values.
189 const TInt KPropertyCount = 48;
190 TUid saUid = TUid::Uid(KUidPhonePwrValue);
191 for(TInt i=0;i<KPropertyCount;++i)
194 err = RProperty::Get(KUidSystemCategory, saUid.iUid, val);
195 TEST2(err, KErrNone);
199 TheTest.Next(_L("Other defined Properties test"));
200 // This test checks that the other publish and subscribe properties
201 // have been defined by SystemAgent2. These are properties which are used
202 // in other subsystems, mainly defined by this component due to PlatSec
203 // restrictions requiring WriteUserData to define a property.
204 for (TInt i=0; i < sizeof(KSaExternalKeys) / sizeof(KSaExternalKeys[0]); ++i)
206 if(KSaExternalKeys[i].iIsInt)
208 TInt propertyValue=0;
209 err = RProperty::Get(KSaExternalKeys[i].iCategory, KSaExternalKeys[i].iProperty, propertyValue);
213 TBuf8<512> propertyValue;
214 err = RProperty::Get(KSaExternalKeys[i].iCategory, KSaExternalKeys[i].iProperty, propertyValue);
218 // We expect the property to be defined, but we cannot make any assumptions
219 // about what value it will have since it could have been changed before
220 // the test gets here.
226 GLDEF_C TInt E32Main()
228 CTrapCleanup* tc = CTrapCleanup::New();
232 TRAPD(err, ::RunTestsL());
233 TheTest(err == KErrNone);
240 User::Heap().Check();