diff --git a/TestSuites/FileServer/src/Auth/TestSuite/Authorization/SharePermissionTest.cs b/TestSuites/FileServer/src/Auth/TestSuite/Authorization/SharePermissionTest.cs index 6030f8b8c..4ee8d6e6c 100644 --- a/TestSuites/FileServer/src/Auth/TestSuite/Authorization/SharePermissionTest.cs +++ b/TestSuites/FileServer/src/Auth/TestSuite/Authorization/SharePermissionTest.cs @@ -38,6 +38,8 @@ protected override void TestInitialize() { base.TestInitialize(); + CheckDriverSupportsNRPC(); + if (dynamicallyConfigurableShareName == null) { dynamicallyConfigurableShareName = TestConfig.SharePermissionTestShare; @@ -74,7 +76,6 @@ protected override void TestCleanup() "ACCESS_ALLOWED_ACE with user SID exists in share Security Descriptor.")] public void BVT_SharePermission_AccessAllow_UserSid() { - CheckDriverSupportsNRPC(); _SID sid = sutCommonControlAdapterAccessor.GetUserSid(azUser01Name); string shareName; if (dynamicallyConfigurableShareExist) @@ -101,7 +102,6 @@ public void BVT_SharePermission_AccessAllow_UserSid() "ACCESS_ALLOWED_ACE with user's group SID exists in share Security Descriptor.")] public void SharePermission_AccessAllow_GroupSid() { - CheckDriverSupportsNRPC(); _SID sid = sutCommonControlAdapterAccessor.GetGroupSid(azGroup01Name); string shareName; if (dynamicallyConfigurableShareExist) @@ -130,7 +130,6 @@ public void SharePermission_AccessAllow_GroupSid() "ACCESS_DENIED_ACE with user SID exists in share Security Descriptor.")] public void SharePermission_AccessDeny_UserSid() { - CheckDriverSupportsNRPC(); _SID sid = sutCommonControlAdapterAccessor.GetUserSid(azUser01Name); string shareName; if (dynamicallyConfigurableShareExist) @@ -157,7 +156,6 @@ public void SharePermission_AccessDeny_UserSid() "ACCESS_DENIED_ACE with user's group SID exists in share Security Descriptor.")] public void SharePermission_AccessDeny_GroupSid() { - CheckDriverSupportsNRPC(); _SID sid = sutCommonControlAdapterAccessor.GetGroupSid(azGroup01Name); string shareName; if (dynamicallyConfigurableShareExist) @@ -186,7 +184,6 @@ public void SharePermission_AccessDeny_GroupSid() "user SID does not exist in share Security Descriptor.")] public void SharePermission_AccessDeny_SidNoInclude() { - CheckDriverSupportsNRPC(); _SID sid = sutCommonControlAdapterAccessor.GetUserSid(azUser01Name); string shareName; if (dynamicallyConfigurableShareExist) @@ -213,7 +210,6 @@ public void SharePermission_AccessDeny_SidNoInclude() "ACCESS_ALLOWED_ACE with user SID exists in share Security Descriptor.")] public void SharePermission_AccessDeny_UserSidWithoutReadPermission() { - CheckDriverSupportsNRPC(); _SID sid = sutCommonControlAdapterAccessor.GetUserSid(azUser01Name); string shareName; if (dynamicallyConfigurableShareExist) @@ -241,7 +237,6 @@ public void SharePermission_AccessDeny_UserSidWithoutReadPermission() [Description("This case is designed to test whether server can handle file deletion request when Treeconnect.MaximalAccess does not include DELETE or GENERIC_ALL.")] public void SharePermission_CreateClose_DeleteFile_MaximalAccessNotIncludeDeleteOrGenericAll() { - CheckDriverSupportsNRPC(); _SID sid = sutCommonControlAdapterAccessor.GetUserSid(azUser01Name); if (!dynamicallyConfigurableShareExist) {