File: test_polcapquery.py

package info (click to toggle)
setools 4.6.0-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 3,600 kB
  • sloc: python: 24,485; makefile: 14
file content (34 lines) | stat: -rw-r--r-- 1,195 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
# Copyright 2014, Tresys Technology, LLC
#
# SPDX-License-Identifier: GPL-2.0-only
#
import pytest
import setools


@pytest.mark.obj_args("tests/library/polcapquery.conf")
class TestPolCapQuery:

    def test_unset(self, compiled_policy: setools.SELinuxPolicy) -> None:
        """Policy capability query with no criteria"""
        # query with no parameters gets all capabilities.
        allcaps = sorted(compiled_policy.polcaps())

        q = setools.PolCapQuery(compiled_policy)
        qcaps = sorted(q.results())

        assert allcaps == qcaps

    def test_name_exact(self, compiled_policy: setools.SELinuxPolicy) -> None:
        """Policy capability query with exact match"""
        q = setools.PolCapQuery(compiled_policy, name="open_perms", name_regex=False)

        caps = sorted(str(c) for c in q.results())
        assert ["open_perms"] == caps

    def test_name_regex(self, compiled_policy: setools.SELinuxPolicy) -> None:
        """Policy capability query with regex match"""
        q = setools.PolCapQuery(compiled_policy, name="pe?er", name_regex=True)

        caps = sorted(str(c) for c in q.results())
        assert ["network_peer_controls", "open_perms"] == caps