All checks were successful
		
		
	
	Test / Create distribution (push) Successful in 25s
				
			Test / Hakurei (push) Successful in 44s
				
			Test / Sandbox (push) Successful in 41s
				
			Test / Hakurei (race detector) (push) Successful in 44s
				
			Test / Sandbox (race detector) (push) Successful in 41s
				
			Test / Hpkg (push) Successful in 41s
				
			Test / Flake checks (push) Successful in 1m24s
				
			Most tests already had no global state, however parallel was never enabled. This change enables it for all applicable tests. Signed-off-by: Ophestra <cat@gensokyo.uk>
		
			
				
	
	
		
			129 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			129 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package container
 | |
| 
 | |
| import (
 | |
| 	"os"
 | |
| 	"testing"
 | |
| 
 | |
| 	"hakurei.app/container/check"
 | |
| 	"hakurei.app/container/stub"
 | |
| )
 | |
| 
 | |
| func TestSymlinkOp(t *testing.T) {
 | |
| 	t.Parallel()
 | |
| 
 | |
| 	checkOpBehaviour(t, []opBehaviourTestCase{
 | |
| 		{"mkdir", &Params{ParentPerm: 0700}, &SymlinkOp{
 | |
| 			Target:   check.MustAbs("/etc/nixos"),
 | |
| 			LinkName: "/etc/static/nixos",
 | |
| 		}, nil, nil, []stub.Call{
 | |
| 			call("mkdirAll", stub.ExpectArgs{"/sysroot/etc", os.FileMode(0700)}, nil, stub.UniqueError(1)),
 | |
| 		}, stub.UniqueError(1)},
 | |
| 
 | |
| 		{"abs", &Params{ParentPerm: 0755}, &SymlinkOp{
 | |
| 			Target:      check.MustAbs("/etc/mtab"),
 | |
| 			LinkName:    "etc/mtab",
 | |
| 			Dereference: true,
 | |
| 		}, nil, &check.AbsoluteError{Pathname: "etc/mtab"}, nil, nil},
 | |
| 
 | |
| 		{"readlink", &Params{ParentPerm: 0755}, &SymlinkOp{
 | |
| 			Target:      check.MustAbs("/etc/mtab"),
 | |
| 			LinkName:    "/etc/mtab",
 | |
| 			Dereference: true,
 | |
| 		}, []stub.Call{
 | |
| 			call("readlink", stub.ExpectArgs{"/etc/mtab"}, "/proc/mounts", stub.UniqueError(0)),
 | |
| 		}, stub.UniqueError(0), nil, nil},
 | |
| 
 | |
| 		{"success noderef", &Params{ParentPerm: 0700}, &SymlinkOp{
 | |
| 			Target:   check.MustAbs("/etc/nixos"),
 | |
| 			LinkName: "/etc/static/nixos",
 | |
| 		}, nil, nil, []stub.Call{
 | |
| 			call("mkdirAll", stub.ExpectArgs{"/sysroot/etc", os.FileMode(0700)}, nil, nil),
 | |
| 			call("symlink", stub.ExpectArgs{"/etc/static/nixos", "/sysroot/etc/nixos"}, nil, nil),
 | |
| 		}, nil},
 | |
| 
 | |
| 		{"success", &Params{ParentPerm: 0755}, &SymlinkOp{
 | |
| 			Target:      check.MustAbs("/etc/mtab"),
 | |
| 			LinkName:    "/etc/mtab",
 | |
| 			Dereference: true,
 | |
| 		}, []stub.Call{
 | |
| 			call("readlink", stub.ExpectArgs{"/etc/mtab"}, "/proc/mounts", nil),
 | |
| 		}, nil, []stub.Call{
 | |
| 			call("mkdirAll", stub.ExpectArgs{"/sysroot/etc", os.FileMode(0755)}, nil, nil),
 | |
| 			call("symlink", stub.ExpectArgs{"/proc/mounts", "/sysroot/etc/mtab"}, nil, nil),
 | |
| 		}, nil},
 | |
| 	})
 | |
| 
 | |
| 	checkOpsValid(t, []opValidTestCase{
 | |
| 		{"nil", (*SymlinkOp)(nil), false},
 | |
| 		{"zero", new(SymlinkOp), false},
 | |
| 		{"nil target", &SymlinkOp{LinkName: "/run/current-system"}, false},
 | |
| 		{"zero linkname", &SymlinkOp{Target: check.MustAbs("/run/current-system")}, false},
 | |
| 		{"valid", &SymlinkOp{Target: check.MustAbs("/run/current-system"), LinkName: "/run/current-system", Dereference: true}, true},
 | |
| 	})
 | |
| 
 | |
| 	checkOpsBuilder(t, []opsBuilderTestCase{
 | |
| 		{"current-system", new(Ops).Link(
 | |
| 			check.MustAbs("/run/current-system"),
 | |
| 			"/run/current-system",
 | |
| 			true,
 | |
| 		), Ops{
 | |
| 			&SymlinkOp{
 | |
| 				Target:      check.MustAbs("/run/current-system"),
 | |
| 				LinkName:    "/run/current-system",
 | |
| 				Dereference: true,
 | |
| 			},
 | |
| 		}},
 | |
| 	})
 | |
| 
 | |
| 	checkOpIs(t, []opIsTestCase{
 | |
| 		{"zero", new(SymlinkOp), new(SymlinkOp), false},
 | |
| 
 | |
| 		{"target differs", &SymlinkOp{
 | |
| 			Target:      check.MustAbs("/run/current-system/differs"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, &SymlinkOp{
 | |
| 			Target:      check.MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, false},
 | |
| 
 | |
| 		{"linkname differs", &SymlinkOp{
 | |
| 			Target:      check.MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system/differs",
 | |
| 			Dereference: true,
 | |
| 		}, &SymlinkOp{
 | |
| 			Target:      check.MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, false},
 | |
| 
 | |
| 		{"dereference differs", &SymlinkOp{
 | |
| 			Target:   check.MustAbs("/run/current-system"),
 | |
| 			LinkName: "/run/current-system",
 | |
| 		}, &SymlinkOp{
 | |
| 			Target:      check.MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, false},
 | |
| 
 | |
| 		{"equals", &SymlinkOp{
 | |
| 			Target:      check.MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, &SymlinkOp{
 | |
| 			Target:      check.MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, true},
 | |
| 	})
 | |
| 
 | |
| 	checkOpMeta(t, []opMetaTestCase{
 | |
| 		{"current-system", &SymlinkOp{
 | |
| 			Target:      check.MustAbs("/run/current-system"),
 | |
| 			LinkName:    "/run/current-system",
 | |
| 			Dereference: true,
 | |
| 		}, "creating", `symlink on "/run/current-system" linkname "/run/current-system"`},
 | |
| 	})
 | |
| }
 |