@@ -25,7 +25,7 @@ class RuleTestCase:
2525 type_ : type # the rule's policyrep class
2626 tclass : str | None = None
2727 xperm : str | None = None
28- perms : set [str ] | setools .IoctlSet | None = None
28+ perms : set [str ] | setools .XpermSet | None = None
2929 default : str | None = None
3030 filename : str | None = None
3131 conditional : str | None = None
@@ -57,10 +57,10 @@ class RuleTestCase:
5757 default = "system" , type_ = setools .TERule , conditional = "a_bool" ,
5858 statement = "type_change type31c type31b:infoflow2 system; [ a_bool ]:False" ),
5959 RuleTestCase (setools .TERuletype .allowxperm , "type30" , "type31a" , tclass = "infoflow" ,
60- xperm = "ioctl" , perms = setools .IoctlSet ((0x00ff ,)), type_ = setools .AVRuleXperm ,
60+ xperm = "ioctl" , perms = setools .XpermSet ((0x00ff ,)), type_ = setools .AVRuleXperm ,
6161 statement = "allowxperm type30 type31a:infoflow ioctl 0x00ff;" ),
6262 RuleTestCase (setools .TERuletype .auditallowxperm , "type31a" , "type31b" , tclass = "infoflow" ,
63- xperm = "ioctl" , perms = setools .IoctlSet ((1 , 2 , 3 )), type_ = setools .AVRuleXperm ,
63+ xperm = "ioctl" , perms = setools .XpermSet ((1 , 2 , 3 )), type_ = setools .AVRuleXperm ,
6464 statement = "auditallowxperm type31a type31b:infoflow ioctl 0x0001-0x0003;" )]
6565
6666
@@ -213,5 +213,5 @@ def test_regression(self, compiled_policy: setools.SELinuxPolicy):
213213 # expect 2 rules:
214214 # allowxperm init_type_t init_type_t : unix_dgram_socket ioctl { 0x8910 };
215215 # allowxperm init_type_t init_type_t : unix_dgram_socket ioctl { 0x0-0xff };
216- assert setools .IoctlSet (range (0x100 )) == rules [0 ].perms , f"{ rules [0 ].perms } "
217- assert setools .IoctlSet ([0x8910 ]) == rules [1 ].perms , f"{ rules [1 ].perms } "
216+ assert setools .XpermSet (range (0x100 )) == rules [0 ].perms , f"{ rules [0 ].perms } "
217+ assert setools .XpermSet ([0x8910 ]) == rules [1 ].perms , f"{ rules [1 ].perms } "
0 commit comments