@@ -260,25 +260,6 @@ let test_rm () =
260260 (dom0, none, PathOp (" /a/b" , Rm ), OK );
261261 ]
262262
263- (*
264- let test_restrict () =
265- (* Check that only dom0 can restrict to another domain
266- and that it loses access to dom0-only nodes. *)
267- let dom0 = Connection.create (Xs_protocol.Domain 0) None in
268- let dom3 = Connection.create (Xs_protocol.Domain 3) None in
269- let dom7 = Connection.create (Xs_protocol.Domain 7) None in
270- let store = empty_store () in
271- let open Xs_protocol.Request in
272- run store [
273- dom0, none, PathOp("/foo", Write "bar"), OK;
274- dom0, none, PathOp("/foo", Setperms example_acl), OK;
275- dom3, none, PathOp("/foo", Write "bar"), OK;
276- dom7, none, PathOp("/foo", Write "bar"), Err "EACCES";
277- dom0, none, Restrict 7, OK;
278- dom0, none, PathOp("/foo", Write "bar"), Err "EACCES";
279- ]
280- *)
281-
282263(*
283264let test_set_target () =
284265 (* Check that dom0 can grant dom1 access to dom2's nodes,
@@ -844,7 +825,6 @@ let _ =
844825 " test_mkdir" > :: test_mkdir;
845826 " test_empty" > :: test_empty;
846827 " test_rm" > :: test_rm;
847- (* "test_restrict" >:: test_restrict;*)
848828 (* "test_set_target" >:: test_set_target;*)
849829 " transactions_are_isolated" > :: test_transactions_are_isolated;
850830 " independent_transactions_coalesce"
0 commit comments