|
|
|
|
@ -63,7 +63,7 @@ def atomic_mocks(mocker, monkeypatch):
|
|
|
|
|
@pytest.fixture
|
|
|
|
|
def fake_stat(mocker):
|
|
|
|
|
stat1 = mocker.MagicMock()
|
|
|
|
|
stat1.st_mode = 0o0640
|
|
|
|
|
stat1.st_mode = 0o0644
|
|
|
|
|
stat1.st_uid = 0
|
|
|
|
|
stat1.st_gid = 0
|
|
|
|
|
stat1.st_flags = 0
|
|
|
|
|
@ -80,8 +80,7 @@ def test_new_file(atomic_am, atomic_mocks, mocker, selinux):
|
|
|
|
|
atomic_am.atomic_move('/path/to/src', '/path/to/dest')
|
|
|
|
|
|
|
|
|
|
atomic_mocks['rename'].assert_called_with(b'/path/to/src', b'/path/to/dest')
|
|
|
|
|
# 416 is what we expect with default perms set to 0640
|
|
|
|
|
assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/dest', 416)]
|
|
|
|
|
assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/dest', basic.DEFAULT_PERM & ~18)]
|
|
|
|
|
|
|
|
|
|
if selinux:
|
|
|
|
|
assert atomic_am.selinux_default_context.call_args_list == [mocker.call('/path/to/dest')]
|
|
|
|
|
@ -102,7 +101,7 @@ def test_existing_file(atomic_am, atomic_mocks, fake_stat, mocker, selinux):
|
|
|
|
|
atomic_am.atomic_move('/path/to/src', '/path/to/dest')
|
|
|
|
|
|
|
|
|
|
atomic_mocks['rename'].assert_called_with(b'/path/to/src', b'/path/to/dest')
|
|
|
|
|
assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/src', 416)]
|
|
|
|
|
assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/src', basic.DEFAULT_PERM & ~18)]
|
|
|
|
|
|
|
|
|
|
if selinux:
|
|
|
|
|
assert atomic_am.set_context_if_different.call_args_list == [mocker.call('/path/to/dest', mock_context, False)]
|
|
|
|
|
@ -125,9 +124,10 @@ def test_no_tty_fallback(atomic_am, atomic_mocks, fake_stat, mocker):
|
|
|
|
|
atomic_am.atomic_move('/path/to/src', '/path/to/dest')
|
|
|
|
|
|
|
|
|
|
atomic_mocks['rename'].assert_called_with(b'/path/to/src', b'/path/to/dest')
|
|
|
|
|
assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/src', basic.DEFAULT_PERM & ~18)]
|
|
|
|
|
|
|
|
|
|
assert atomic_am.set_context_if_different.call_args_list == [mocker.call('/path/to/dest', mock_context, False)]
|
|
|
|
|
assert atomic_am.selinux_context.call_args_list == [mocker.call('/path/to/dest')]
|
|
|
|
|
atomic_am.atomic_move('/path/to/src', '/path/to/dest')
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
@pytest.mark.parametrize('stdin', [{}], indirect=['stdin'])
|
|
|
|
|
@ -152,8 +152,9 @@ def test_existing_file_stat_perms_failure(atomic_am, atomic_mocks, mocker):
|
|
|
|
|
atomic_am.atomic_move('/path/to/src', '/path/to/dest')
|
|
|
|
|
|
|
|
|
|
atomic_mocks['rename'].assert_called_with(b'/path/to/src', b'/path/to/dest')
|
|
|
|
|
# atomic_move() will set a default permission value when it cannot retrieve the
|
|
|
|
|
# existing file's permissions.
|
|
|
|
|
# FIXME: Should atomic_move() set a default permission value when it cannot retrieve the
|
|
|
|
|
# existing file's permissions? (Right now it's up to the calling code.
|
|
|
|
|
# assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/src', basic.DEFAULT_PERM & ~18)]
|
|
|
|
|
assert atomic_am.set_context_if_different.call_args_list == [mocker.call('/path/to/dest', mock_context, False)]
|
|
|
|
|
assert atomic_am.selinux_context.call_args_list == [mocker.call('/path/to/dest')]
|
|
|
|
|
|
|
|
|
|
@ -210,7 +211,7 @@ def test_rename_perms_fail_temp_succeeds(atomic_am, atomic_mocks, fake_stat, moc
|
|
|
|
|
atomic_am.atomic_move('/path/to/src', '/path/to/dest')
|
|
|
|
|
assert atomic_mocks['rename'].call_args_list == [mocker.call(b'/path/to/src', b'/path/to/dest'),
|
|
|
|
|
mocker.call(b'/path/to/tempfile', b'/path/to/dest')]
|
|
|
|
|
assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/dest', 416)]
|
|
|
|
|
assert atomic_mocks['chmod'].call_args_list == [mocker.call(b'/path/to/dest', basic.DEFAULT_PERM & ~18)]
|
|
|
|
|
|
|
|
|
|
if selinux:
|
|
|
|
|
assert atomic_am.selinux_default_context.call_args_list == [mocker.call('/path/to/dest')]
|
|
|
|
|
|