def tearDown(self): # restore loglevel L.set_level(self.init_loglevel) # force remove test keychain if os.path.exists(self.keyfile): os.remove(self.keyfile)
def setUp(self): self.keyfile = S.keychain_to_file("debugsign_test") self.password = "******" self.identity = 'debug_codesign' # store and override loglevel self.init_loglevel = L._root.level L.set_level(logging.CRITICAL) # create test keychain self.assertTrue(S.create_keychain(self.keyfile, self.password))
def test_privilege_read_negative(self): """ - assert read of invalid privilege fails Consecutive unsuccessful read operations can result in delayed or denied authdb calls. Require --unsafe to prevent inadvertent lockouts. """ priv = self.invalid_priv log_level = L._root.level L.set_level(logging.CRITICAL) res_read = S.authdb_privilege_read(priv) L.set_level(log_level) self.assertFalse(res_read)
def test_logger(self): # type: () -> () # This test assumes the initial, intended semantics of the various # loggers returned. If semantics change, so must the tests. init_level = L._root.level test_level = 7 log_name = "TestLoggerLogger" log = L.get_logger(log_name) with self.subTest(method=L.get_logger): self.assertEqual(log.__class__, logging.Logger) self.assertEqual(log_name, log.name) # Returned loggers should default to 0 (inherit parent level) self.assertEqual(0, log.level) with self.subTest(method=L.set_level): # Assert set_level() sets root level, not sublogger level L.set_level(test_level) self.assertEqual(test_level, L._root.level) self.assertEqual(0, log.level) # Restore and verify L.set_level(init_level) self.assertEqual(init_level, L._root.level) self.assertEqual(0, log.level)
def tearDown(self): L.set_level(self.init_loglevel) if os.path.exists(self.keyfile): os.remove(self.keyfile)
def setUp(self): self.keyfile = S.keychain_to_file("debugsign_test") self.password = "******" self.init_loglevel = L._root.level L.set_level(logging.CRITICAL)