All checks were successful
		
		
	
	Test / Create distribution (push) Successful in 25s
				
			Test / Hakurei (push) Successful in 44s
				
			Test / Sandbox (push) Successful in 41s
				
			Test / Hakurei (race detector) (push) Successful in 44s
				
			Test / Sandbox (race detector) (push) Successful in 41s
				
			Test / Hpkg (push) Successful in 41s
				
			Test / Flake checks (push) Successful in 1m24s
				
			Most tests already had no global state, however parallel was never enabled. This change enables it for all applicable tests. Signed-off-by: Ophestra <cat@gensokyo.uk>
		
			
				
	
	
		
			186 lines
		
	
	
		
			9.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			186 lines
		
	
	
		
			9.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package system
 | 
						|
 | 
						|
import (
 | 
						|
	"os"
 | 
						|
	"syscall"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"hakurei.app/container/stub"
 | 
						|
	"hakurei.app/hst"
 | 
						|
	"hakurei.app/system/acl"
 | 
						|
)
 | 
						|
 | 
						|
func TestACLUpdateOp(t *testing.T) {
 | 
						|
	t.Parallel()
 | 
						|
 | 
						|
	checkOpBehaviour(t, []opBehaviourTestCase{
 | 
						|
		{"apply aclUpdate", 0xdeadbeef, 0xff,
 | 
						|
			&aclUpdateOp{Process, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}, []stub.Call{
 | 
						|
				call("verbose", stub.ExpectArgs{[]any{"applying ACL", &aclUpdateOp{Process, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}}}, nil, nil),
 | 
						|
				call("aclUpdate", stub.ExpectArgs{"/proc/nonexistent", 0xdeadbeef, []acl.Perm{acl.Read, acl.Write, acl.Execute}}, nil, stub.UniqueError(1)),
 | 
						|
			}, &OpError{Op: "acl", Err: stub.UniqueError(1)}, nil, nil},
 | 
						|
 | 
						|
		{"revert aclUpdate", 0xdeadbeef, 0xff,
 | 
						|
			&aclUpdateOp{Process, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}, []stub.Call{
 | 
						|
				call("verbose", stub.ExpectArgs{[]any{"applying ACL", &aclUpdateOp{Process, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}}}, nil, nil),
 | 
						|
				call("aclUpdate", stub.ExpectArgs{"/proc/nonexistent", 0xdeadbeef, []acl.Perm{acl.Read, acl.Write, acl.Execute}}, nil, nil),
 | 
						|
			}, nil, []stub.Call{
 | 
						|
				call("verbose", stub.ExpectArgs{[]any{"stripping ACL", &aclUpdateOp{Process, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}}}, nil, nil),
 | 
						|
				call("aclUpdate", stub.ExpectArgs{"/proc/nonexistent", 0xdeadbeef, ([]acl.Perm)(nil)}, nil, stub.UniqueError(0)),
 | 
						|
			}, &OpError{Op: "acl", Err: stub.UniqueError(0), Revert: true}},
 | 
						|
 | 
						|
		{"success revert skip", 0xdeadbeef, Process,
 | 
						|
			&aclUpdateOp{User, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}, []stub.Call{
 | 
						|
				call("verbose", stub.ExpectArgs{[]any{"applying ACL", &aclUpdateOp{User, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}}}, nil, nil),
 | 
						|
				call("aclUpdate", stub.ExpectArgs{"/proc/nonexistent", 0xdeadbeef, []acl.Perm{acl.Read, acl.Write, acl.Execute}}, nil, nil),
 | 
						|
			}, nil, []stub.Call{
 | 
						|
				call("verbose", stub.ExpectArgs{[]any{"skipping ACL", &aclUpdateOp{User, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}}}, nil, nil),
 | 
						|
			}, nil},
 | 
						|
 | 
						|
		{"success revert aclUpdate ENOENT", 0xdeadbeef, 0xff,
 | 
						|
			&aclUpdateOp{Process, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}, []stub.Call{
 | 
						|
				call("verbose", stub.ExpectArgs{[]any{"applying ACL", &aclUpdateOp{Process, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}}}, nil, nil),
 | 
						|
				call("aclUpdate", stub.ExpectArgs{"/proc/nonexistent", 0xdeadbeef, []acl.Perm{acl.Read, acl.Write, acl.Execute}}, nil, nil),
 | 
						|
			}, nil, []stub.Call{
 | 
						|
				call("verbose", stub.ExpectArgs{[]any{"stripping ACL", &aclUpdateOp{Process, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}}}, nil, nil),
 | 
						|
				call("aclUpdate", stub.ExpectArgs{"/proc/nonexistent", 0xdeadbeef, ([]acl.Perm)(nil)}, nil, &os.PathError{Op: "acl_get_file", Path: "/proc/nonexistent", Err: syscall.ENOENT}),
 | 
						|
				call("verbosef", stub.ExpectArgs{"target of ACL %s no longer exists", []any{&aclUpdateOp{Process, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}}}, nil, nil),
 | 
						|
			}, nil},
 | 
						|
 | 
						|
		{"success", 0xdeadbeef, 0xff,
 | 
						|
			&aclUpdateOp{Process, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}, []stub.Call{
 | 
						|
				call("verbose", stub.ExpectArgs{[]any{"applying ACL", &aclUpdateOp{Process, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}}}, nil, nil),
 | 
						|
				call("aclUpdate", stub.ExpectArgs{"/proc/nonexistent", 0xdeadbeef, []acl.Perm{acl.Read, acl.Write, acl.Execute}}, nil, nil),
 | 
						|
			}, nil, []stub.Call{
 | 
						|
				call("verbose", stub.ExpectArgs{[]any{"stripping ACL", &aclUpdateOp{Process, "/proc/nonexistent", []acl.Perm{acl.Read, acl.Write, acl.Execute}}}}, nil, nil),
 | 
						|
				call("aclUpdate", stub.ExpectArgs{"/proc/nonexistent", 0xdeadbeef, ([]acl.Perm)(nil)}, nil, nil),
 | 
						|
			}, nil},
 | 
						|
	})
 | 
						|
 | 
						|
	checkOpsBuilder(t, "UpdatePermType", []opsBuilderTestCase{
 | 
						|
		{"simple",
 | 
						|
			0xdeadbeef,
 | 
						|
			func(_ *testing.T, sys *I) {
 | 
						|
				sys.
 | 
						|
					UpdatePerm(m("/run/user/1971/hakurei"), acl.Execute).
 | 
						|
					UpdatePerm(m("/tmp/hakurei.0/tmpdir/150"), acl.Read, acl.Write, acl.Execute)
 | 
						|
			}, []Op{
 | 
						|
				&aclUpdateOp{Process, "/run/user/1971/hakurei", []acl.Perm{acl.Execute}},
 | 
						|
				&aclUpdateOp{Process, "/tmp/hakurei.0/tmpdir/150", []acl.Perm{acl.Read, acl.Write, acl.Execute}},
 | 
						|
			}, stub.Expect{}},
 | 
						|
 | 
						|
		{"tmpdirp", 0xdeadbeef, func(_ *testing.T, sys *I) {
 | 
						|
			sys.UpdatePermType(User, m("/tmp/hakurei.0/tmpdir"), acl.Execute)
 | 
						|
		}, []Op{
 | 
						|
			&aclUpdateOp{User, "/tmp/hakurei.0/tmpdir", []acl.Perm{acl.Execute}},
 | 
						|
		}, stub.Expect{}},
 | 
						|
 | 
						|
		{"tmpdir", 0xdeadbeef, func(_ *testing.T, sys *I) {
 | 
						|
			sys.UpdatePermType(User, m("/tmp/hakurei.0/tmpdir/150"), acl.Read, acl.Write, acl.Execute)
 | 
						|
		}, []Op{
 | 
						|
			&aclUpdateOp{User, "/tmp/hakurei.0/tmpdir/150", []acl.Perm{acl.Read, acl.Write, acl.Execute}},
 | 
						|
		}, stub.Expect{}},
 | 
						|
 | 
						|
		{"share", 0xdeadbeef, func(_ *testing.T, sys *I) {
 | 
						|
			sys.UpdatePermType(Process, m("/run/user/1971/hakurei/fcb8a12f7c482d183ade8288c3de78b5"), acl.Execute)
 | 
						|
		}, []Op{
 | 
						|
			&aclUpdateOp{Process, "/run/user/1971/hakurei/fcb8a12f7c482d183ade8288c3de78b5", []acl.Perm{acl.Execute}},
 | 
						|
		}, stub.Expect{}},
 | 
						|
 | 
						|
		{"passwd", 0xdeadbeef, func(_ *testing.T, sys *I) {
 | 
						|
			sys.
 | 
						|
				UpdatePermType(Process, m("/tmp/hakurei.0/fcb8a12f7c482d183ade8288c3de78b5/passwd"), acl.Read).
 | 
						|
				UpdatePermType(Process, m("/tmp/hakurei.0/fcb8a12f7c482d183ade8288c3de78b5/group"), acl.Read)
 | 
						|
		}, []Op{
 | 
						|
			&aclUpdateOp{Process, "/tmp/hakurei.0/fcb8a12f7c482d183ade8288c3de78b5/passwd", []acl.Perm{acl.Read}},
 | 
						|
			&aclUpdateOp{Process, "/tmp/hakurei.0/fcb8a12f7c482d183ade8288c3de78b5/group", []acl.Perm{acl.Read}},
 | 
						|
		}, stub.Expect{}},
 | 
						|
 | 
						|
		{"wayland", 0xdeadbeef, func(_ *testing.T, sys *I) {
 | 
						|
			sys.UpdatePermType(hst.EWayland, m("/run/user/1971/wayland-0"), acl.Read, acl.Write, acl.Execute)
 | 
						|
		}, []Op{
 | 
						|
			&aclUpdateOp{hst.EWayland, "/run/user/1971/wayland-0", []acl.Perm{acl.Read, acl.Write, acl.Execute}},
 | 
						|
		}, stub.Expect{}},
 | 
						|
	})
 | 
						|
 | 
						|
	checkOpIs(t, []opIsTestCase{
 | 
						|
		{"nil", (*aclUpdateOp)(nil), (*aclUpdateOp)(nil), false},
 | 
						|
		{"zero", new(aclUpdateOp), new(aclUpdateOp), true},
 | 
						|
 | 
						|
		{"et differs",
 | 
						|
			&aclUpdateOp{
 | 
						|
				hst.EWayland, "/run/user/1971/wayland-0",
 | 
						|
				[]acl.Perm{acl.Read, acl.Write, acl.Execute},
 | 
						|
			}, &aclUpdateOp{
 | 
						|
				hst.EX11, "/run/user/1971/wayland-0",
 | 
						|
				[]acl.Perm{acl.Read, acl.Write, acl.Execute},
 | 
						|
			}, false},
 | 
						|
 | 
						|
		{"path differs", &aclUpdateOp{
 | 
						|
			hst.EWayland, "/run/user/1971/wayland-0",
 | 
						|
			[]acl.Perm{acl.Read, acl.Write, acl.Execute},
 | 
						|
		}, &aclUpdateOp{
 | 
						|
			hst.EWayland, "/run/user/1971/wayland-1",
 | 
						|
			[]acl.Perm{acl.Read, acl.Write, acl.Execute},
 | 
						|
		}, false},
 | 
						|
 | 
						|
		{"perms differs", &aclUpdateOp{
 | 
						|
			hst.EWayland, "/run/user/1971/wayland-0",
 | 
						|
			[]acl.Perm{acl.Read, acl.Write, acl.Execute},
 | 
						|
		}, &aclUpdateOp{
 | 
						|
			hst.EWayland, "/run/user/1971/wayland-0",
 | 
						|
			[]acl.Perm{acl.Read, acl.Write},
 | 
						|
		}, false},
 | 
						|
 | 
						|
		{"equals", &aclUpdateOp{
 | 
						|
			hst.EWayland, "/run/user/1971/wayland-0",
 | 
						|
			[]acl.Perm{acl.Read, acl.Write, acl.Execute},
 | 
						|
		}, &aclUpdateOp{
 | 
						|
			hst.EWayland, "/run/user/1971/wayland-0",
 | 
						|
			[]acl.Perm{acl.Read, acl.Write, acl.Execute},
 | 
						|
		}, true},
 | 
						|
	})
 | 
						|
 | 
						|
	checkOpMeta(t, []opMetaTestCase{
 | 
						|
		{"clear",
 | 
						|
			&aclUpdateOp{Process, "/proc/nonexistent", []acl.Perm{}},
 | 
						|
			Process, "/proc/nonexistent",
 | 
						|
			`--- type: process path: "/proc/nonexistent"`},
 | 
						|
 | 
						|
		{"read",
 | 
						|
			&aclUpdateOp{User, "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/0", []acl.Perm{acl.Read}},
 | 
						|
			User, "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/0",
 | 
						|
			`r-- type: user path: "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/0"`},
 | 
						|
 | 
						|
		{"write",
 | 
						|
			&aclUpdateOp{User, "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/1", []acl.Perm{acl.Write}},
 | 
						|
			User, "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/1",
 | 
						|
			`-w- type: user path: "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/1"`},
 | 
						|
 | 
						|
		{"execute",
 | 
						|
			&aclUpdateOp{User, "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/2", []acl.Perm{acl.Execute}},
 | 
						|
			User, "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/2",
 | 
						|
			`--x type: user path: "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/2"`},
 | 
						|
 | 
						|
		{"wayland",
 | 
						|
			&aclUpdateOp{hst.EWayland, "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/wayland", []acl.Perm{acl.Read, acl.Write}},
 | 
						|
			hst.EWayland, "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/wayland",
 | 
						|
			`rw- type: wayland path: "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/wayland"`},
 | 
						|
 | 
						|
		{"x11",
 | 
						|
			&aclUpdateOp{hst.EX11, "/tmp/.X11-unix/X0", []acl.Perm{acl.Read, acl.Execute}},
 | 
						|
			hst.EX11, "/tmp/.X11-unix/X0",
 | 
						|
			`r-x type: x11 path: "/tmp/.X11-unix/X0"`},
 | 
						|
 | 
						|
		{"dbus",
 | 
						|
			&aclUpdateOp{hst.EDBus, "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/bus", []acl.Perm{acl.Write, acl.Execute}},
 | 
						|
			hst.EDBus, "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/bus",
 | 
						|
			`-wx type: dbus path: "/tmp/hakurei.0/27d81d567f8fae7f33278eec45da9446/bus"`},
 | 
						|
 | 
						|
		{"pulseaudio",
 | 
						|
			&aclUpdateOp{hst.EPulse, "/run/user/1971/hakurei/27d81d567f8fae7f33278eec45da9446/pulse", []acl.Perm{acl.Read, acl.Write, acl.Execute}},
 | 
						|
			hst.EPulse, "/run/user/1971/hakurei/27d81d567f8fae7f33278eec45da9446/pulse",
 | 
						|
			`rwx type: pulseaudio path: "/run/user/1971/hakurei/27d81d567f8fae7f33278eec45da9446/pulse"`},
 | 
						|
	})
 | 
						|
}
 |