aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorTobias Brunner <tobias@strongswan.org>2014-05-16 17:43:42 +0200
committerTobias Brunner <tobias@strongswan.org>2014-05-16 17:50:29 +0200
commit7c888e0d23b98b00a11616364499f0f651f9c481 (patch)
tree2306efc5cd53ebaf1a09e83ca9cfa515eaed9e2c /src
parent2145f0c212d6e804125c615978fd22f3829e8839 (diff)
downloadstrongswan-7c888e0d23b98b00a11616364499f0f651f9c481.tar.bz2
strongswan-7c888e0d23b98b00a11616364499f0f651f9c481.tar.xz
unit-tests: Don't assert failures for unreadable settings files as root
The file can still be read by root even if nobody has read privileges.
Diffstat (limited to 'src')
-rw-r--r--src/libstrongswan/tests/suites/test_settings.c13
1 files changed, 8 insertions, 5 deletions
diff --git a/src/libstrongswan/tests/suites/test_settings.c b/src/libstrongswan/tests/suites/test_settings.c
index e504b95a1..97e45fc04 100644
--- a/src/libstrongswan/tests/suites/test_settings.c
+++ b/src/libstrongswan/tests/suites/test_settings.c
@@ -675,11 +675,14 @@ START_TEST(test_load_files_section)
ck_assert(!settings->load_files_section(settings, include1".conf", TRUE, ""));
verify_include();
- /* unreadable files are too */
- ck_assert(chunk_write(contents, include1".no", 0444, TRUE));
- ck_assert(!settings->load_files_section(settings, include1".no", TRUE, ""));
- unlink(include1".no");
- verify_include();
+ /* unreadable files are too (only fails when not running as root) */
+ if (getuid() != 0)
+ {
+ ck_assert(chunk_write(contents, include1".no", 0444, TRUE));
+ ck_assert(!settings->load_files_section(settings, include1".no", TRUE, ""));
+ unlink(include1".no");
+ verify_include();
+ }
ck_assert(settings->load_files_section(settings, include2, FALSE, "main"));
verify_null("main.key1");