@@ -260,25 +260,6 @@ let test_rm () =
260
260
(dom0, none, PathOp (" /a/b" , Rm ), OK );
261
261
]
262
262
263
- (*
264
- let test_restrict () =
265
- (* Check that only dom0 can restrict to another domain
266
- and that it loses access to dom0-only nodes. *)
267
- let dom0 = Connection.create (Xs_protocol.Domain 0) None in
268
- let dom3 = Connection.create (Xs_protocol.Domain 3) None in
269
- let dom7 = Connection.create (Xs_protocol.Domain 7) None in
270
- let store = empty_store () in
271
- let open Xs_protocol.Request in
272
- run store [
273
- dom0, none, PathOp("/foo", Write "bar"), OK;
274
- dom0, none, PathOp("/foo", Setperms example_acl), OK;
275
- dom3, none, PathOp("/foo", Write "bar"), OK;
276
- dom7, none, PathOp("/foo", Write "bar"), Err "EACCES";
277
- dom0, none, Restrict 7, OK;
278
- dom0, none, PathOp("/foo", Write "bar"), Err "EACCES";
279
- ]
280
- *)
281
-
282
263
(*
283
264
let test_set_target () =
284
265
(* Check that dom0 can grant dom1 access to dom2's nodes,
@@ -844,7 +825,6 @@ let _ =
844
825
" test_mkdir" > :: test_mkdir;
845
826
" test_empty" > :: test_empty;
846
827
" test_rm" > :: test_rm;
847
- (* "test_restrict" >:: test_restrict;*)
848
828
(* "test_set_target" >:: test_set_target;*)
849
829
" transactions_are_isolated" > :: test_transactions_are_isolated;
850
830
" independent_transactions_coalesce"
0 commit comments