All checks were successful
		
		
	
	Test / Create distribution (push) Successful in 33s
				
			Test / Sandbox (push) Successful in 2m7s
				
			Test / Hakurei (push) Successful in 3m8s
				
			Test / Hpkg (push) Successful in 3m59s
				
			Test / Sandbox (race detector) (push) Successful in 4m26s
				
			Test / Hakurei (race detector) (push) Successful in 5m6s
				
			Test / Flake checks (push) Successful in 1m26s
				
			This allows tests to stub all kernel behaviour, enabling measurement of all function call arguments and error injection. Signed-off-by: Ophestra <cat@gensokyo.uk>
		
			
				
	
	
		
			125 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			125 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package container
 | |
| 
 | |
| import (
 | |
| 	"io/fs"
 | |
| 	"os"
 | |
| 	"testing"
 | |
| )
 | |
| 
 | |
| func TestSymlinkOp(t *testing.T) {
 | |
| 	checkOpBehaviour(t, []opBehaviourTestCase{
 | |
| 		{"mkdir", &Params{ParentPerm: 0700}, &SymlinkOp{
 | |
| 			Target:   MustAbs("/etc/nixos"),
 | |
| 			LinkName: "/etc/static/nixos",
 | |
| 		}, nil, nil, []kexpect{
 | |
| 			{"mkdirAll", expectArgs{"/sysroot/etc", os.FileMode(0700)}, nil, errUnique},
 | |
| 		}, wrapErrSelf(errUnique)},
 | |
| 
 | |
| 		{"abs", &Params{ParentPerm: 0755}, &SymlinkOp{
 | |
| 			Target:      MustAbs("/etc/mtab"),
 | |
| 			LinkName:    "etc/mtab",
 | |
| 			Dereference: true,
 | |
| 		}, nil, msg.WrapErr(fs.ErrInvalid, `path "etc/mtab" is not absolute`), nil, nil},
 | |
| 
 | |
| 		{"readlink", &Params{ParentPerm: 0755}, &SymlinkOp{
 | |
| 			Target:      MustAbs("/etc/mtab"),
 | |
| 			LinkName:    "/etc/mtab",
 | |
| 			Dereference: true,
 | |
| 		}, []kexpect{
 | |
| 			{"readlink", expectArgs{"/etc/mtab"}, "/proc/mounts", errUnique},
 | |
| 		}, wrapErrSelf(errUnique), nil, nil},
 | |
| 
 | |
| 		{"success noderef", &Params{ParentPerm: 0700}, &SymlinkOp{
 | |
| 			Target:   MustAbs("/etc/nixos"),
 | |
| 			LinkName: "/etc/static/nixos",
 | |
| 		}, nil, nil, []kexpect{
 | |
| 			{"mkdirAll", expectArgs{"/sysroot/etc", os.FileMode(0700)}, nil, nil},
 | |
| 			{"symlink", expectArgs{"/etc/static/nixos", "/sysroot/etc/nixos"}, nil, nil},
 | |
| 		}, nil},
 | |
| 
 | |
| 		{"success", &Params{ParentPerm: 0755}, &SymlinkOp{
 | |
| 			Target:      MustAbs("/etc/mtab"),
 | |
| 			LinkName:    "/etc/mtab",
 | |
| 			Dereference: true,
 | |
| 		}, []kexpect{
 | |
| 			{"readlink", expectArgs{"/etc/mtab"}, "/proc/mounts", nil},
 | |
| 		}, nil, []kexpect{
 | |
| 			{"mkdirAll", expectArgs{"/sysroot/etc", os.FileMode(0755)}, nil, nil},
 | |
| 			{"symlink", expectArgs{"/proc/mounts", "/sysroot/etc/mtab"}, nil, nil},
 | |
| 		}, nil},
 | |
| 	})
 | |
| 
 | |
| 	checkOpsValid(t, []opValidTestCase{
 | |
| 		{"nil", (*SymlinkOp)(nil), false},
 | |
| 		{"zero", new(SymlinkOp), false},
 | |
| 		{"nil target", &SymlinkOp{LinkName: "/run/current-system"}, false},
 | |
| 		{"zero linkname", &SymlinkOp{Target: MustAbs("/run/current-system")}, false},
 | |
| 		{"valid", &SymlinkOp{Target: MustAbs("/run/current-system"), LinkName: "/run/current-system", Dereference: true}, true},
 | |
| 	})
 | |
| 
 | |
| 	checkOpsBuilder(t, []opsBuilderTestCase{
 | |
| 		{"current-system", new(Ops).Link(
 | |
| 			MustAbs("/run/current-system"),
 | |
| 			"/run/current-system",
 | |
| 			true,
 | |
| 		), Ops{
 | |
| 			&SymlinkOp{
 | |
| 				Target:      MustAbs("/run/current-system"),
 | |
| 				LinkName:    "/run/current-system",
 | |
| 				Dereference: true,
 | |
| 			},
 | |
| 		}},
 | |
| 	})
 | |
| 
 | |
| 	checkOpIs(t, []opIsTestCase{
 | |
| 		{"zero", new(SymlinkOp), new(SymlinkOp), false},
 | |
| 
 | |
| 		{"target differs", &SymlinkOp{
 | |
| 			Target:      MustAbs("/run/current-system/differs"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, &SymlinkOp{
 | |
| 			Target:      MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, false},
 | |
| 
 | |
| 		{"linkname differs", &SymlinkOp{
 | |
| 			Target:      MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system/differs",
 | |
| 			Dereference: true,
 | |
| 		}, &SymlinkOp{
 | |
| 			Target:      MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, false},
 | |
| 
 | |
| 		{"dereference differs", &SymlinkOp{
 | |
| 			Target:   MustAbs("/run/current-system"),
 | |
| 			LinkName: "/run/current-system",
 | |
| 		}, &SymlinkOp{
 | |
| 			Target:      MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, false},
 | |
| 
 | |
| 		{"equals", &SymlinkOp{
 | |
| 			Target:      MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, &SymlinkOp{
 | |
| 			Target:      MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, true},
 | |
| 	})
 | |
| 
 | |
| 	checkOpMeta(t, []opMetaTestCase{
 | |
| 		{"current-system", &SymlinkOp{
 | |
| 			Target:      MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, "creating", `symlink on "/run/current-system" linkname "/run/current-system"`},
 | |
| 	})
 | |
| }
 |