4 """Unittests for the posix1e module"""
6 # Copyright (C) 2002-2009, 2012, 2014, 2015 Iustin Pop <iustin@k1024.org>
8 # This library is free software; you can redistribute it and/or
9 # modify it under the terms of the GNU Lesser General Public
10 # License as published by the Free Software Foundation; either
11 # version 2.1 of the License, or (at your option) any later version.
13 # This library is distributed in the hope that it will be useful,
14 # but WITHOUT ANY WARRANTY; without even the implied warranty of
15 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 # Lesser General Public License for more details.
18 # You should have received a copy of the GNU Lesser General Public
19 # License along with this library; if not, write to the Free Software
20 # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
32 import pytest # type: ignore
40 TEST_DIR = os.environ.get("TEST_DIR", ".")
42 BASIC_ACL_TEXT = "u::rw,g::r,o::-"
44 # Permset permission information
46 (ACL_READ, "read", Permset.read),
47 (ACL_WRITE, "write", Permset.write),
48 (ACL_EXECUTE, "execute", Permset.execute),
51 PERMSETS_IDS = [p[1] for p in PERMSETS]
54 (posix1e.ACL_USER, "user"),
55 (posix1e.ACL_GROUP, "group"),
56 (posix1e.ACL_USER_OBJ, "user object"),
57 (posix1e.ACL_GROUP_OBJ, "group object"),
58 (posix1e.ACL_MASK, "mask"),
59 (posix1e.ACL_OTHER, "other"),
62 ALL_TAG_VALUES = [i[0] for i in ALL_TAGS]
63 ALL_TAG_DESCS = [i[1] for i in ALL_TAGS]
65 # Fixtures and helpers
67 def ignore_ioerror(errnum, fn, *args, **kwargs):
68 """Call a function while ignoring some IOErrors.
70 This is needed as some OSes (e.g. FreeBSD) return failure (EINVAL)
71 when doing certain operations on an invalid ACL.
76 except IOError as err:
77 if err.errno == errnum:
83 """per-test temp dir based in TEST_DIR"""
84 with tempfile.TemporaryDirectory(dir=TEST_DIR) as dname:
88 fh, fname = tempfile.mkstemp(".test", "xattr-", path)
91 @contextlib.contextmanager
92 def get_file_name(path):
93 fh, fname = get_file(path)
97 @contextlib.contextmanager
98 def get_file_fd(path):
99 fd = get_file(path)[0]
103 @contextlib.contextmanager
104 def get_file_object(path):
105 fd = get_file(path)[0]
106 with os.fdopen(fd) as f:
109 @contextlib.contextmanager
111 yield tempfile.mkdtemp(".test", "xattr-", path)
113 def get_symlink(path, dangling=True):
114 """create a symlink"""
115 fh, fname = get_file(path)
119 sname = fname + ".symlink"
120 os.symlink(fname, sname)
123 @contextlib.contextmanager
124 def get_valid_symlink(path):
125 yield get_symlink(path, dangling=False)[1]
127 @contextlib.contextmanager
128 def get_dangling_symlink(path):
129 yield get_symlink(path, dangling=True)[1]
131 @contextlib.contextmanager
132 def get_file_and_symlink(path):
133 yield get_symlink(path, dangling=False)
135 @contextlib.contextmanager
136 def get_file_and_fobject(path):
137 fh, fname = get_file(path)
138 with os.fdopen(fh) as fo:
141 # Wrappers that build upon existing values
143 def as_wrapper(call, fn, closer=None):
144 @contextlib.contextmanager
146 with call(path) as r:
149 if closer is not None:
154 return as_wrapper(call, lambda r: r.encode())
157 return as_wrapper(call, pathlib.PurePath)
159 def as_iostream(call):
160 opener = lambda f: io.open(f, "r")
161 closer = lambda r: r.close()
162 return as_wrapper(call, opener, closer)
164 NOT_BEFORE_36 = pytest.mark.xfail(condition="sys.version_info < (3,6)",
166 NOT_PYPY = pytest.mark.xfail(condition="platform.python_implementation() == 'PyPy'",
169 require_acl_from_mode = pytest.mark.skipif("not HAS_ACL_FROM_MODE")
170 require_acl_check = pytest.mark.skipif("not HAS_ACL_CHECK")
171 require_acl_entry = pytest.mark.skipif("not HAS_ACL_ENTRY")
172 require_extended_check = pytest.mark.skipif("not HAS_EXTENDED_CHECK")
173 require_equiv_mode = pytest.mark.skipif("not HAS_EQUIV_MODE")
174 require_copy_ext = pytest.mark.skipif("not HAS_COPY_EXT")
176 # Note: ACLs are valid only for files/directories, not symbolic links
177 # themselves, so we only create valid symlinks.
180 as_bytes(get_file_name),
181 pytest.param(as_fspath(get_file_name),
182 marks=[NOT_BEFORE_36, NOT_PYPY]),
185 pytest.param(as_fspath(get_dir),
186 marks=[NOT_BEFORE_36, NOT_PYPY]),
188 as_bytes(get_valid_symlink),
189 pytest.param(as_fspath(get_valid_symlink),
190 marks=[NOT_BEFORE_36, NOT_PYPY]),
201 "file via symlink (bytes)",
202 "file via symlink (path)",
208 as_iostream(get_file_name),
217 ALL_P = FILE_P + FD_P
218 ALL_D = FILE_D + FD_D
220 @pytest.fixture(params=FILE_P, ids=FILE_D)
221 def file_subject(testdir, request):
222 with request.param(testdir) as value:
225 @pytest.fixture(params=FD_P, ids=FD_D)
226 def fd_subject(testdir, request):
227 with request.param(testdir) as value:
230 @pytest.fixture(params=ALL_P, ids=ALL_D)
231 def subject(testdir, request):
232 with request.param(testdir) as value:
237 """Load/create tests"""
238 def test_from_file(self, file_subject):
239 """Test loading ACLs from a file/directory"""
240 acl = posix1e.ACL(file=file_subject)
243 def test_from_dir(self, testdir):
244 """Test loading ACLs from a directory"""
245 with get_dir(testdir) as dname:
246 acl2 = posix1e.ACL(filedef=dname)
247 # default ACLs might or might not be valid; missing ones are
248 # not valid, so we don't test acl2 for validity
250 def test_from_fd(self, fd_subject):
251 """Test loading ACLs from a file descriptor"""
252 acl = posix1e.ACL(fd=fd_subject)
255 def test_from_nonexisting(self, testdir):
256 _, fname = get_file(testdir)
257 with pytest.raises(IOError):
258 posix1e.ACL(file="fname"+".no-such-file")
260 def test_from_invalid_fd(self, testdir):
261 fd, _ = get_file(testdir)
263 with pytest.raises(IOError):
266 def test_from_empty_invalid(self):
267 """Test creating an empty ACL"""
269 assert not acl1.valid()
271 def test_from_text(self):
272 """Test creating an ACL from text"""
273 acl1 = posix1e.ACL(text=BASIC_ACL_TEXT)
276 # This is acl_check, but should actually be have_linux...
278 def test_from_acl(self):
279 """Test creating an ACL from an existing ACL"""
280 acl1 = posix1e.ACL(text=BASIC_ACL_TEXT)
281 acl2 = posix1e.ACL(acl=acl1)
284 def test_from_acl_via_str(self):
285 # This is needed for not HAVE_LINUX cases.
286 acl1 = posix1e.ACL(text=BASIC_ACL_TEXT)
287 acl2 = posix1e.ACL(acl=acl1)
288 assert str(acl1) == str(acl2)
290 def test_invalid_creation_params(self, testdir):
291 """Test that creating an ACL from multiple objects fails"""
292 fd, _ = get_file(testdir)
293 with pytest.raises(ValueError):
294 posix1e.ACL(text=BASIC_ACL_TEXT, fd=fd)
296 def test_invalid_value_creation(self):
297 """Test that creating an ACL from wrong specification fails"""
298 with pytest.raises(EnvironmentError):
299 posix1e.ACL(text="foobar")
300 with pytest.raises(TypeError):
301 posix1e.ACL(foo="bar")
303 def test_uninit(self):
304 """Checks that uninit is actually empty init"""
305 acl = posix1e.ACL.__new__(posix1e.ACL)
306 assert not acl.valid()
311 def test_double_init(self):
312 acl1 = posix1e.ACL(text=BASIC_ACL_TEXT)
314 acl1.__init__(text=BASIC_ACL_TEXT) # type: ignore
317 @pytest.mark.xfail(reason="Unreliable test, re-init doesn't always invalidate children")
318 def test_double_init_breaks_children(self):
321 e.permset.write = True
322 acl.__init__() # type: ignore
323 with pytest.raises(EnvironmentError):
324 e.permset.write = False
327 class TestAclExtensions:
328 """ACL extensions checks"""
330 @require_acl_from_mode
331 def test_from_mode(self):
332 """Test loading ACLs from an octal mode"""
333 acl1 = posix1e.ACL(mode=0o644)
337 def test_acl_check(self):
338 """Test the acl_check method"""
339 acl1 = posix1e.ACL(text=BASIC_ACL_TEXT)
340 assert not acl1.check()
343 assert c == (ACL_MISS_ERROR, 0)
344 assert isinstance(c, tuple)
345 assert c[0] == ACL_MISS_ERROR
348 assert c == (ACL_ENTRY_ERROR, 0)
350 def test_applyto(self, subject):
351 """Test the apply_to function"""
352 # TODO: add read/compare with before, once ACL can be init'ed
354 basic_acl = posix1e.ACL(text=BASIC_ACL_TEXT)
355 basic_acl.applyto(subject)
356 enhanced_acl = posix1e.ACL(text="u::rw,g::-,o::-,u:root:rw,mask::r")
357 assert enhanced_acl.valid()
358 enhanced_acl.applyto(subject)
360 def test_apply_to_with_wrong_object(self):
361 acl1 = posix1e.ACL(text=BASIC_ACL_TEXT)
363 with pytest.raises(TypeError):
364 acl1.applyto(object())
365 with pytest.raises(TypeError):
366 acl1.applyto(object(), object()) # type: ignore
368 def test_apply_to_fail(self, testdir):
369 acl1 = posix1e.ACL(text=BASIC_ACL_TEXT)
371 fd, fname = get_file(testdir)
373 with pytest.raises(IOError):
375 with pytest.raises(IOError, match="no-such-file"):
376 acl1.applyto(fname+".no-such-file")
378 @require_extended_check
379 def test_applyto_extended(self, subject):
380 """Test the acl_extended function"""
381 basic_acl = posix1e.ACL(text=BASIC_ACL_TEXT)
382 basic_acl.applyto(subject)
383 assert not has_extended(subject)
384 enhanced_acl = posix1e.ACL(text="u::rw,g::-,o::-,u:root:rw,mask::r")
385 assert enhanced_acl.valid()
386 enhanced_acl.applyto(subject)
387 assert has_extended(subject)
389 @require_extended_check
390 @pytest.mark.parametrize(
391 "gen", [ get_file_and_symlink, get_file_and_fobject ])
392 def test_applyto_extended_mixed(self, testdir, gen):
393 """Test the acl_extended function"""
394 with gen(testdir) as (a, b):
395 basic_acl = posix1e.ACL(text=BASIC_ACL_TEXT)
398 assert not has_extended(item)
399 enhanced_acl = posix1e.ACL(text="u::rw,g::-,o::-,u:root:rw,mask::r")
400 assert enhanced_acl.valid()
401 enhanced_acl.applyto(b)
403 assert has_extended(item)
405 @require_extended_check
406 def test_extended_fail(self, testdir):
407 fd, fname = get_file(testdir)
409 with pytest.raises(IOError):
411 with pytest.raises(IOError, match="no-such-file"):
412 has_extended(fname+".no-such-file")
414 @require_extended_check
415 def test_extended_arg_handling(self):
416 with pytest.raises(TypeError):
417 has_extended() # type: ignore
418 with pytest.raises(TypeError):
419 has_extended(object()) # type: ignore
422 def test_equiv_mode(self):
423 """Test the equiv_mode function"""
424 if HAS_ACL_FROM_MODE:
425 for mode in 0o644, 0o755:
426 acl = posix1e.ACL(mode=mode)
427 assert acl.equiv_mode() == mode
428 acl = posix1e.ACL(text="u::rw,g::r,o::r")
429 assert acl.equiv_mode() == 0o644
430 acl = posix1e.ACL(text="u::rx,g::-,o::-")
431 assert acl.equiv_mode() == 0o500
434 @pytest.mark.xfail(reason="It seems equiv mode always passes, even for empty ACLs")
435 def test_equiv_mode_invalid(self):
436 """Test equiv_mode on invalid ACLs"""
438 with pytest.raises(EnvironmentError):
442 def test_to_any_text(self):
443 acl = posix1e.ACL(text=BASIC_ACL_TEXT)
445 acl.to_any_text(options=posix1e.TEXT_ABBREVIATE)
446 assert b"user::" in acl.to_any_text()
449 def test_to_any_text_wrong_args(self):
450 acl = posix1e.ACL(text=BASIC_ACL_TEXT)
451 with pytest.raises(TypeError):
452 acl.to_any_text(foo="bar") # type: ignore
456 def test_rich_compare(self):
457 acl1 = posix1e.ACL(text="u::rw,g::r,o::r")
458 acl2 = posix1e.ACL(acl=acl1)
459 acl3 = posix1e.ACL(text="u::rw,g::rw,o::r")
462 with pytest.raises(TypeError):
463 acl1 < acl2 # type: ignore
464 with pytest.raises(TypeError):
465 acl1 >= acl3 # type: ignore
466 assert acl1 != True # type: ignore
467 assert not (acl1 == 1) # type: ignore
468 with pytest.raises(TypeError):
469 acl1 > True # type: ignore
472 def test_acl_iterator(self):
473 acl = posix1e.ACL(text=BASIC_ACL_TEXT)
475 assert entry.parent is acl
478 def test_acl_copy_ext(self):
479 a = posix1e.ACL(text=BASIC_ACL_TEXT)
481 c = posix1e.ACL(acl=b)
484 state = a.__getstate__()
485 b.__setstate__(state)
493 def test_delete_default(self, testdir):
494 """Test removing the default ACL"""
495 with get_dir(testdir) as dname:
496 posix1e.delete_default(dname)
498 def test_delete_default_fail(self, testdir):
499 """Test removing the default ACL"""
500 with get_file_name(testdir) as fname:
501 with pytest.raises(IOError, match="no-such-file"):
502 posix1e.delete_default(fname+".no-such-file")
505 def test_delete_default_wrong_arg(self):
506 with pytest.raises(TypeError):
507 posix1e.delete_default(object()) # type: ignore
509 def test_reapply(self, testdir):
510 """Test re-applying an ACL"""
511 fd, fname = get_file(testdir)
512 acl1 = posix1e.ACL(fd=fd)
515 with get_dir(testdir) as dname:
516 acl2 = posix1e.ACL(file=fname)
522 class TestModification:
523 """ACL modification tests"""
525 def checkRef(self, obj):
526 """Checks if a given obj has a 'sane' refcount"""
527 if platform.python_implementation() == "PyPy":
529 ref_cnt = sys.getrefcount(obj)
530 # FIXME: hardcoded value for the max ref count... but I've
531 # seen it overflow on bad reference counting, so it's better
533 if ref_cnt < 2 or ref_cnt > 1024:
534 pytest.fail("Wrong reference count, expected 2-1024 and got %d" %
538 """Test str() of an ACL."""
539 acl = posix1e.ACL(text=BASIC_ACL_TEXT)
541 self.checkRef(str_acl)
543 def test_append(self):
544 """Test append a new Entry to the ACL"""
547 e.tag_type = posix1e.ACL_OTHER
548 ignore_ioerror(errno.EINVAL, acl.calc_mask)
550 self.checkRef(str_format)
552 ignore_ioerror(errno.EINVAL, acl.calc_mask)
553 assert not acl.valid()
555 def test_wrong_append(self):
556 """Test append a new Entry to the ACL based on wrong object type"""
558 with pytest.raises(TypeError):
559 acl.append(object()) # type: ignore
561 @pytest.mark.xfail(reason="Behaviour not conform to specification")
562 def test_append_invalid_source(self):
567 with pytest.raises(EnvironmentError):
568 f.permset.write = True
569 with pytest.raises(EnvironmentError):
572 def test_entry_creation(self):
574 e = posix1e.Entry(acl)
575 ignore_ioerror(errno.EINVAL, acl.calc_mask)
577 self.checkRef(str_format)
579 def test_entry_failed_creation(self):
580 # Checks for partial initialisation and deletion on error
582 with pytest.raises(TypeError):
583 posix1e.Entry(object()) # type: ignore
585 def test_entry_reinitialisations(self):
589 e.__init__(a) # type: ignore
590 with pytest.raises(ValueError, match="different parent"):
591 e.__init__(b) # type: ignore
594 def test_entry_reinit_leaks_refcount(self):
597 ref = sys.getrefcount(acl)
598 e.__init__(acl) # type: ignore
599 assert ref == sys.getrefcount(acl), "Uh-oh, ref leaks..."
601 def test_delete(self):
602 """Test delete Entry from the ACL"""
605 e.tag_type = posix1e.ACL_OTHER
606 ignore_ioerror(errno.EINVAL, acl.calc_mask)
608 ignore_ioerror(errno.EINVAL, acl.calc_mask)
610 def test_double_delete(self):
611 """Test delete Entry from the ACL"""
612 # This is not entirely valid/correct, since the entry object
613 # itself is invalid after the first deletion, so we're
614 # actually testing deleting an invalid object, not a
615 # non-existing entry...
618 e.tag_type = posix1e.ACL_OTHER
619 ignore_ioerror(errno.EINVAL, acl.calc_mask)
621 ignore_ioerror(errno.EINVAL, acl.calc_mask)
622 with pytest.raises(EnvironmentError):
625 def test_delete_unowned(self):
626 """Test delete Entry from the ACL"""
630 e.tag_type = posix1e.ACL_OTHER
631 with pytest.raises(ValueError, match="un-owned entry"):
634 # This currently fails as this deletion seems to be accepted :/
635 @pytest.mark.xfail(reason="Entry deletion is unreliable")
636 def testDeleteInvalidEntry(self):
637 """Test delete foreign Entry from the ACL"""
641 e.tag_type = posix1e.ACL_OTHER
642 ignore_ioerror(errno.EINVAL, acl1.calc_mask)
643 with pytest.raises(EnvironmentError):
646 def test_delete_invalid_object(self):
647 """Test delete a non-Entry from the ACL"""
649 with pytest.raises(TypeError):
650 acl.delete_entry(object()) # type: ignore
652 def test_double_entries(self):
653 """Test double entries"""
654 acl = posix1e.ACL(text=BASIC_ACL_TEXT)
656 for tag_type in (posix1e.ACL_USER_OBJ, posix1e.ACL_GROUP_OBJ,
659 e.tag_type = tag_type
661 assert not acl.valid(), ("ACL containing duplicate entries"
662 " should not be valid")
665 def test_multiple_good_entries(self):
666 """Test multiple valid entries"""
667 acl = posix1e.ACL(text=BASIC_ACL_TEXT)
669 for tag_type in (posix1e.ACL_USER,
671 for obj_id in range(5):
673 e.tag_type = tag_type
677 assert acl.valid(), ("ACL should be able to hold multiple"
678 " user/group entries")
680 def test_multiple_bad_entries(self):
681 """Test multiple invalid entries"""
682 for tag_type in (posix1e.ACL_USER,
684 acl = posix1e.ACL(text=BASIC_ACL_TEXT)
687 e1.tag_type = tag_type
691 assert acl.valid(), ("ACL should be able to add a"
694 e2.tag_type = tag_type
697 ignore_ioerror(errno.EINVAL, acl.calc_mask)
698 assert not acl.valid(), ("ACL should not validate when"
699 " containing two duplicate entries")
701 # FreeBSD trips over itself here and can't delete the
702 # entry, even though it still exists.
703 ignore_ioerror(errno.EINVAL, acl.delete_entry, e2)
708 e1.tag_type = ACL_USER
714 e2.tag_type = ACL_GROUP
721 assert e1.tag_type == e2.tag_type
723 def test_copy_wrong_arg(self):
726 with pytest.raises(TypeError):
727 e.copy(object()) # type: ignore
729 def test_set_permset(self):
732 e1.tag_type = ACL_USER
738 e2.tag_type = ACL_GROUP
744 assert e2.permset.write
745 assert e2.tag_type == ACL_GROUP
747 def test_set_permset_wrong_arg(self):
750 with pytest.raises(TypeError):
751 e.permset = object() # type: ignore
753 def test_permset_creation(self):
760 def test_permset_creation_wrong_arg(self):
761 with pytest.raises(TypeError):
762 Permset(object()) # type: ignore
764 def test_permset_reinitialisations(self):
769 p.__init__(e) # type: ignore
770 with pytest.raises(ValueError, match="different parent"):
771 p.__init__(f) # type: ignore
774 def test_permset_reinit_leaks_refcount(self):
778 ref = sys.getrefcount(e)
779 p.__init__(e) # type: ignore
780 assert ref == sys.getrefcount(e), "Uh-oh, ref leaks..."
782 @pytest.mark.parametrize("perm, txt, accessor",
783 PERMSETS, ids=PERMSETS_IDS)
784 def test_permset(self, perm, txt, accessor):
785 """Test permissions"""
792 self.checkRef(str_ps)
793 assert not ps.test(perm), ("Empty permission set should not"
794 " have permission '%s'" % txt)
796 assert ps.test(perm), ("Permission '%s' should exist"
797 " after addition" % txt)
799 self.checkRef(str_ps)
801 assert not ps.test(perm), ("Permission '%s' should not exist"
802 " after deletion" % txt)
804 assert ps.test(perm), ("Permission '%s' should exist"
805 " after addition" % txt)
807 assert not ps.test(perm), ("Permission '%s' should not exist"
808 " after clearing" % txt)
812 @pytest.mark.parametrize("perm, txt, accessor",
813 PERMSETS, ids=PERMSETS_IDS)
814 def test_permset_via_accessors(self, perm, txt, accessor):
815 """Test permissions"""
821 return accessor.__get__(ps) # type: ignore
823 return accessor.__set__(ps, value) # type: ignore
825 self.checkRef(str_ps)
826 assert not getter(), ("Empty permission set should not"
827 " have permission '%s'" % txt)
829 assert ps.test(perm), ("Permission '%s' should exist"
830 " after addition" % txt)
831 assert getter(), ("Permission '%s' should exist"
832 " after addition" % txt)
834 self.checkRef(str_ps)
836 assert not ps.test(perm), ("Permission '%s' should not exist"
837 " after deletion" % txt)
838 assert not getter(), ("Permission '%s' should not exist"
839 " after deletion" % txt)
845 def test_permset_invalid_type(self):
850 with pytest.raises(TypeError):
851 ps.add("foobar") # type: ignore
852 with pytest.raises(TypeError):
853 ps.delete("foobar") # type: ignore
854 with pytest.raises(TypeError):
855 ps.test("foobar") # type: ignore
856 with pytest.raises(ValueError):
857 ps.write = object() # type: ignore
859 @pytest.mark.parametrize("tag", [ACL_USER, ACL_GROUP],
860 ids=["ACL_USER", "ACL_GROUP"])
861 def test_qualifier_values(self, tag):
862 """Tests qualifier correct store/retrieval"""
868 regex = re.compile("(user|group) with (u|g)id %d" % qualifier)
870 e.qualifier = qualifier
871 except OverflowError:
872 # reached overflow condition, break
874 assert e.qualifier == qualifier
875 assert regex.search(str(e)) is not None
878 def test_qualifier_overflow(self):
879 """Tests qualifier overflow handling"""
882 # the uid_t/gid_t are unsigned, so they can hold slightly more
883 # than sys.maxsize*2 (on Linux).
884 qualifier = (sys.maxsize + 1) * 2
885 for tag in [posix1e.ACL_USER, posix1e.ACL_GROUP]:
887 with pytest.raises(OverflowError):
888 e.qualifier = qualifier
890 def test_qualifier_underflow(self):
891 """Tests negative qualifier handling"""
892 # Note: this presumes that uid_t/gid_t in C are unsigned...
895 for tag in [posix1e.ACL_USER, posix1e.ACL_GROUP]:
897 for qualifier in [-10, -5, -1]:
898 with pytest.raises(OverflowError):
899 e.qualifier = qualifier
901 def test_invalid_qualifier(self):
902 """Tests invalid qualifier handling"""
905 with pytest.raises(TypeError):
906 e.qualifier = object() # type: ignore
907 with pytest.raises((TypeError, AttributeError)):
910 def test_qualifier_on_wrong_tag(self):
911 """Tests qualifier setting on wrong tag"""
914 e.tag_type = posix1e.ACL_OTHER
915 with pytest.raises(TypeError):
917 with pytest.raises(TypeError):
920 @pytest.mark.parametrize("tag", ALL_TAG_VALUES, ids=ALL_TAG_DESCS)
921 def test_tag_types(self, tag):
922 """Tests tag type correct set/get"""
926 assert e.tag_type == tag
927 # check we can show all tag types without breaking
930 @pytest.mark.parametrize("src_tag", ALL_TAG_VALUES, ids=ALL_TAG_DESCS)
931 @pytest.mark.parametrize("dst_tag", ALL_TAG_VALUES, ids=ALL_TAG_DESCS)
932 def test_tag_overwrite(self, src_tag, dst_tag):
933 """Tests tag type correct set/get"""
937 assert e.tag_type == src_tag
940 assert e.tag_type == dst_tag
943 def test_invalid_tags(self):
944 """Tests tag type incorrect set/get"""
947 with pytest.raises(TypeError):
948 e.tag_type = object() # type: ignore
949 e.tag_type = posix1e.ACL_USER_OBJ
950 # For some reason, PyPy raises AttributeError. Strange...
951 with pytest.raises((TypeError, AttributeError)):
954 def test_tag_wrong_overwrite(self):
957 e.tag_type = posix1e.ACL_USER_OBJ
958 tag = max(ALL_TAG_VALUES) + 1
959 with pytest.raises(EnvironmentError):
961 # Check tag is still valid.
962 assert e.tag_type == posix1e.ACL_USER_OBJ
964 if __name__ == "__main__":