Convert Sandbox test to spec.
This commit is contained in:
parent
f06898a4f0
commit
d25f949824
78
Library/Homebrew/test/sandbox_spec.rb
Normal file
78
Library/Homebrew/test/sandbox_spec.rb
Normal file
@ -0,0 +1,78 @@
|
||||
require "sandbox"
|
||||
|
||||
RSpec::Matchers.define_negated_matcher :not_matching, :matching
|
||||
|
||||
describe Sandbox do
|
||||
let(:dir) { @dir = Pathname.new(Dir.mktmpdir) }
|
||||
let(:file) { dir/"foo" }
|
||||
|
||||
before(:each) do
|
||||
skip "Sandbox not implemented." unless described_class.available?
|
||||
end
|
||||
|
||||
after(:each) do
|
||||
dir.rmtree unless @dir.nil?
|
||||
end
|
||||
|
||||
specify "#formula?" do
|
||||
f = formula { url "foo-1.0" }
|
||||
f2 = formula { url "bar-1.0" }
|
||||
allow(f2).to receive(:tap).and_return(Tap.fetch("test/tap"))
|
||||
|
||||
ENV["HOMEBREW_SANDBOX"] = "1"
|
||||
expect(described_class).to be_formula(f), "Formulae should be sandboxed if --sandbox was passed."
|
||||
|
||||
ENV.delete("HOMEBREW_SANDBOX")
|
||||
expect(described_class).to be_formula(f), "Formulae should be sandboxed if in a sandboxed tap."
|
||||
expect(described_class).not_to be_formula(f2), "Formulae should not be sandboxed if not in a sandboxed tap."
|
||||
end
|
||||
|
||||
specify "#test?" do
|
||||
ENV.delete("HOMEBREW_NO_SANDBOX")
|
||||
expect(described_class).to be_test, "Tests should be sandboxed unless --no-sandbox was passed."
|
||||
end
|
||||
|
||||
specify "#allow_write" do
|
||||
subject.allow_write file
|
||||
subject.exec "touch", file
|
||||
|
||||
expect(file).to exist
|
||||
end
|
||||
|
||||
describe "#exec" do
|
||||
it "fails when writing to file not specified with ##allow_write" do
|
||||
shutup do
|
||||
expect {
|
||||
subject.exec "touch", file
|
||||
}.to raise_error(ErrorDuringExecution)
|
||||
end
|
||||
|
||||
expect(file).not_to exist
|
||||
end
|
||||
|
||||
it "complains on failure" do
|
||||
ENV["HOMEBREW_VERBOSE"] = "1"
|
||||
|
||||
expect(Utils).to receive(:popen_read).and_return("foo")
|
||||
|
||||
expect { subject.exec "false" }
|
||||
.to raise_error(ErrorDuringExecution)
|
||||
.and output(/foo/).to_stdout
|
||||
end
|
||||
|
||||
it "ignores bogus Python error" do
|
||||
ENV["HOMEBREW_VERBOSE"] = "1"
|
||||
|
||||
with_bogus_error = <<-EOS.undent
|
||||
foo
|
||||
Mar 17 02:55:06 sandboxd[342]: Python(49765) deny file-write-unlink /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/distutils/errors.pyc
|
||||
bar
|
||||
EOS
|
||||
expect(Utils).to receive(:popen_read).and_return(with_bogus_error)
|
||||
|
||||
expect { subject.exec "false" }
|
||||
.to raise_error(ErrorDuringExecution)
|
||||
.and output(a_string_matching(/foo/).and(matching(/bar/).and(not_matching(/Python/)))).to_stdout
|
||||
end
|
||||
end
|
||||
end
|
||||
@ -1,73 +0,0 @@
|
||||
require "testing_env"
|
||||
require "sandbox"
|
||||
|
||||
class SandboxTest < Homebrew::TestCase
|
||||
def setup
|
||||
super
|
||||
skip "sandbox not implemented" unless Sandbox.available?
|
||||
@sandbox = Sandbox.new
|
||||
@dir = Pathname.new(mktmpdir)
|
||||
@file = @dir/"foo"
|
||||
end
|
||||
|
||||
def test_formula?
|
||||
f = formula { url "foo-1.0" }
|
||||
f2 = formula { url "bar-1.0" }
|
||||
f2.stubs(:tap).returns(Tap.fetch("test/tap"))
|
||||
|
||||
ENV["HOMEBREW_SANDBOX"] = "1"
|
||||
assert Sandbox.formula?(f),
|
||||
"Formulae should be sandboxed if --sandbox was passed."
|
||||
|
||||
ENV.delete("HOMEBREW_SANDBOX")
|
||||
assert Sandbox.formula?(f),
|
||||
"Formulae should be sandboxed if in a sandboxed tap."
|
||||
refute Sandbox.formula?(f2),
|
||||
"Formulae should not be sandboxed if not in a sandboxed tap."
|
||||
end
|
||||
|
||||
def test_test?
|
||||
ENV.delete("HOMEBREW_NO_SANDBOX")
|
||||
assert Sandbox.test?,
|
||||
"Tests should be sandboxed unless --no-sandbox was passed."
|
||||
end
|
||||
|
||||
def test_allow_write
|
||||
@sandbox.allow_write @file
|
||||
@sandbox.exec "touch", @file
|
||||
assert_predicate @file, :exist?
|
||||
end
|
||||
|
||||
def test_deny_write
|
||||
shutup do
|
||||
assert_raises(ErrorDuringExecution) { @sandbox.exec "touch", @file }
|
||||
end
|
||||
refute_predicate @file, :exist?
|
||||
end
|
||||
|
||||
def test_complains_on_failure
|
||||
Utils.expects(popen_read: "foo")
|
||||
ENV["HOMEBREW_VERBOSE"] = "1"
|
||||
out, _err = capture_io do
|
||||
assert_raises(ErrorDuringExecution) { @sandbox.exec "false" }
|
||||
end
|
||||
assert_match "foo", out
|
||||
end
|
||||
|
||||
def test_ignores_bogus_python_error
|
||||
with_bogus_error = <<-EOS.undent
|
||||
foo
|
||||
Mar 17 02:55:06 sandboxd[342]: Python(49765) deny file-write-unlink /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/distutils/errors.pyc
|
||||
bar
|
||||
EOS
|
||||
Utils.expects(popen_read: with_bogus_error)
|
||||
ENV["HOMEBREW_VERBOSE"] = "1"
|
||||
out, _err = capture_io do
|
||||
assert_raises(ErrorDuringExecution) { @sandbox.exec "false" }
|
||||
end
|
||||
refute_predicate out, :empty?
|
||||
assert_match "foo", out
|
||||
assert_match "bar", out
|
||||
refute_match "Python", out
|
||||
end
|
||||
end
|
||||
Loading…
x
Reference in New Issue
Block a user