Merged revisions 78546 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk ........ r78546 | gregory.p.smith | 2010-02-28 21:43:43 -0800 (Sun, 28 Feb 2010) | 3 lines Fixes issue #7999: os.setreuid() and os.setregid() would refuse to accept a -1 parameter on some platforms such as OS X. ........
This commit is contained in:
parent
1a530917e2
commit
c78d79ce30
|
@ -738,6 +738,7 @@ if sys.platform != 'win32':
|
|||
self.assertRaises(os.error, os.setreuid, 0, 0)
|
||||
self.assertRaises(OverflowError, os.setreuid, 1<<32, 0)
|
||||
self.assertRaises(OverflowError, os.setreuid, 0, 1<<32)
|
||||
os.setreuid(-1, -1) # Does nothing, but it needs to accept -1
|
||||
|
||||
if hasattr(os, 'setregid'):
|
||||
def test_setregid(self):
|
||||
|
@ -745,6 +746,7 @@ if sys.platform != 'win32':
|
|||
self.assertRaises(os.error, os.setregid, 0, 0)
|
||||
self.assertRaises(OverflowError, os.setregid, 1<<32, 0)
|
||||
self.assertRaises(OverflowError, os.setregid, 0, 1<<32)
|
||||
os.setregid(-1, -1) # Does nothing, but it needs to accept -1
|
||||
|
||||
@unittest.skipIf(sys.platform == 'darwin', "tests don't apply to OS X")
|
||||
class Pep383Tests(unittest.TestCase):
|
||||
|
|
|
@ -751,6 +751,9 @@ Extension Modules
|
|||
- Expat: Fix DoS via XML document with malformed UTF-8 sequences
|
||||
(CVE_2009_3560).
|
||||
|
||||
- Issue #7999: os.setreuid() and os.setregid() would refuse to accept a -1
|
||||
parameter on some platforms such as OS X.
|
||||
|
||||
Build
|
||||
-----
|
||||
|
||||
|
|
|
@ -4288,9 +4288,16 @@ posix_setreuid (PyObject *self, PyObject *args)
|
|||
uid_t ruid, euid;
|
||||
if (!PyArg_ParseTuple(args, "ll", &ruid_arg, &euid_arg))
|
||||
return NULL;
|
||||
ruid = ruid_arg;
|
||||
euid = euid_arg;
|
||||
if (euid != euid_arg || ruid != ruid_arg) {
|
||||
if (ruid_arg == -1)
|
||||
ruid = (uid_t)-1; /* let the compiler choose how -1 fits */
|
||||
else
|
||||
ruid = ruid_arg; /* otherwise, assign from our long */
|
||||
if (euid_arg == -1)
|
||||
euid = (uid_t)-1;
|
||||
else
|
||||
euid = euid_arg;
|
||||
if ((euid_arg != -1 && euid != euid_arg) ||
|
||||
(ruid_arg != -1 && ruid != ruid_arg)) {
|
||||
PyErr_SetString(PyExc_OverflowError, "user id too big");
|
||||
return NULL;
|
||||
}
|
||||
|
@ -4315,9 +4322,16 @@ posix_setregid (PyObject *self, PyObject *args)
|
|||
gid_t rgid, egid;
|
||||
if (!PyArg_ParseTuple(args, "ll", &rgid_arg, &egid_arg))
|
||||
return NULL;
|
||||
rgid = rgid_arg;
|
||||
egid = egid_arg;
|
||||
if (egid != egid_arg || rgid != rgid_arg) {
|
||||
if (rgid_arg == -1)
|
||||
rgid = (gid_t)-1; /* let the compiler choose how -1 fits */
|
||||
else
|
||||
rgid = rgid_arg; /* otherwise, assign from our long */
|
||||
if (egid_arg == -1)
|
||||
egid = (gid_t)-1;
|
||||
else
|
||||
egid = egid_arg;
|
||||
if ((egid_arg != -1 && egid != egid_arg) ||
|
||||
(rgid_arg != -1 && rgid != rgid_arg)) {
|
||||
PyErr_SetString(PyExc_OverflowError, "group id too big");
|
||||
return NULL;
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue