267 lines
		
	
	
		
			7.6 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
			
		
		
	
	
			267 lines
		
	
	
		
			7.6 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
| shared_examples "#uninstall_phase or #zap_phase" do
 | |
|   let(:artifact_dsl_key) { described_class.dsl_key }
 | |
|   let(:artifact) { cask.artifacts.find { |a| a.is_a?(described_class) } }
 | |
|   let(:fake_system_command) { Hbc::FakeSystemCommand }
 | |
| 
 | |
|   subject { artifact.public_send(:"#{artifact_dsl_key}_phase", command: fake_system_command) }
 | |
| 
 | |
|   context "using :launchctl" do
 | |
|     let(:cask) { Hbc::CaskLoader.load(cask_path("with-#{artifact_dsl_key}-launchctl")) }
 | |
|     let(:launchctl_list_cmd) { %w[/bin/launchctl list my.fancy.package.service] }
 | |
|     let(:launchctl_remove_cmd) { %w[/bin/launchctl remove my.fancy.package.service] }
 | |
|     let(:unknown_response) { "launchctl list returned unknown response\n" }
 | |
|     let(:service_info) do
 | |
|       <<~EOS
 | |
|         {
 | |
|                 "LimitLoadToSessionType" = "Aqua";
 | |
|                 "Label" = "my.fancy.package.service";
 | |
|                 "TimeOut" = 30;
 | |
|                 "OnDemand" = true;
 | |
|                 "LastExitStatus" = 0;
 | |
|                 "ProgramArguments" = (
 | |
|                         "argument";
 | |
|                 );
 | |
|         };
 | |
|       EOS
 | |
|     end
 | |
| 
 | |
|     it "works when job is owned by user" do
 | |
|       Hbc::FakeSystemCommand.stubs_command(
 | |
|         launchctl_list_cmd,
 | |
|         service_info,
 | |
|       )
 | |
| 
 | |
|       Hbc::FakeSystemCommand.stubs_command(
 | |
|         sudo(launchctl_list_cmd),
 | |
|         unknown_response,
 | |
|       )
 | |
| 
 | |
|       Hbc::FakeSystemCommand.expects_command(launchctl_remove_cmd)
 | |
| 
 | |
|       subject
 | |
|     end
 | |
| 
 | |
|     it "works when job is owned by system" do
 | |
|       Hbc::FakeSystemCommand.stubs_command(
 | |
|         launchctl_list_cmd,
 | |
|         unknown_response,
 | |
|       )
 | |
| 
 | |
|       Hbc::FakeSystemCommand.stubs_command(
 | |
|         sudo(launchctl_list_cmd),
 | |
|         service_info,
 | |
|       )
 | |
| 
 | |
|       Hbc::FakeSystemCommand.expects_command(sudo(launchctl_remove_cmd))
 | |
| 
 | |
|       subject
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   context "using :pkgutil" do
 | |
|     let(:fake_system_command) { class_double(Hbc::SystemCommand) }
 | |
| 
 | |
|     let(:cask) { Hbc::CaskLoader.load(cask_path("with-#{artifact_dsl_key}-pkgutil")) }
 | |
| 
 | |
|     let(:main_pkg_id) { "my.fancy.package.main" }
 | |
|     let(:agent_pkg_id) { "my.fancy.package.agent" }
 | |
| 
 | |
|     it "is supported" do
 | |
|       main_pkg = Hbc::Pkg.new(main_pkg_id, fake_system_command)
 | |
|       agent_pkg = Hbc::Pkg.new(agent_pkg_id, fake_system_command)
 | |
| 
 | |
|       expect(Hbc::Pkg).to receive(:all_matching).and_return(
 | |
|         [
 | |
|           main_pkg,
 | |
|           agent_pkg,
 | |
|         ],
 | |
|       )
 | |
| 
 | |
|       expect(main_pkg).to receive(:uninstall)
 | |
|       expect(agent_pkg).to receive(:uninstall)
 | |
| 
 | |
|       subject
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   context "using :kext" do
 | |
|     let(:cask) { Hbc::CaskLoader.load(cask_path("with-#{artifact_dsl_key}-kext")) }
 | |
|     let(:kext_id) { "my.fancy.package.kernelextension" }
 | |
| 
 | |
|     it "is supported" do
 | |
|       Hbc::FakeSystemCommand.stubs_command(
 | |
|         sudo(%W[/usr/sbin/kextstat -l -b #{kext_id}]), "loaded"
 | |
|       )
 | |
| 
 | |
|       Hbc::FakeSystemCommand.expects_command(
 | |
|         sudo(%W[/sbin/kextunload -b #{kext_id}]),
 | |
|       )
 | |
| 
 | |
|       Hbc::FakeSystemCommand.expects_command(
 | |
|         sudo(%W[/usr/sbin/kextfind -b #{kext_id}]), "/Library/Extensions/FancyPackage.kext\n"
 | |
|       )
 | |
| 
 | |
|       Hbc::FakeSystemCommand.expects_command(
 | |
|         sudo(["/bin/rm", "-rf", "/Library/Extensions/FancyPackage.kext"]),
 | |
|       )
 | |
| 
 | |
|       subject
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   context "using :quit" do
 | |
|     let(:cask) { Hbc::CaskLoader.load(cask_path("with-#{artifact_dsl_key}-quit")) }
 | |
|     let(:bundle_id) { "my.fancy.package.app" }
 | |
|     let(:quit_application_script) do
 | |
|       %Q(tell application id "#{bundle_id}" to quit)
 | |
|     end
 | |
| 
 | |
|     it "is supported" do
 | |
|       Hbc::FakeSystemCommand.stubs_command(
 | |
|         %w[/bin/launchctl list], "999\t0\t#{bundle_id}\n"
 | |
|       )
 | |
| 
 | |
|       Hbc::FakeSystemCommand.stubs_command(
 | |
|         %w[/bin/launchctl list],
 | |
|       )
 | |
| 
 | |
|       subject
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   context "using :signal" do
 | |
|     let(:cask) { Hbc::CaskLoader.load(cask_path("with-#{artifact_dsl_key}-signal")) }
 | |
|     let(:bundle_id) { "my.fancy.package.app" }
 | |
|     let(:signals) { %w[TERM KILL] }
 | |
|     let(:unix_pids) { [12_345, 67_890] }
 | |
| 
 | |
|     it "is supported" do
 | |
|       Hbc::FakeSystemCommand.stubs_command(
 | |
|         %w[/bin/launchctl list], unix_pids.map { |pid| [pid, 0, bundle_id].join("\t") }.join("\n")
 | |
|       )
 | |
| 
 | |
|       signals.each do |signal|
 | |
|         expect(Process).to receive(:kill).with(signal, *unix_pids)
 | |
|       end
 | |
| 
 | |
|       subject
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   [:delete, :trash].each do |directive|
 | |
|     next if directive == :trash && ENV["HOMEBREW_TESTS_COVERAGE"].nil?
 | |
| 
 | |
|     context "using :#{directive}" do
 | |
|       let(:dir) { TEST_TMPDIR }
 | |
|       let(:absolute_path) { Pathname.new("#{dir}/absolute_path") }
 | |
|       let(:path_with_tilde) { Pathname.new("#{dir}/path_with_tilde") }
 | |
|       let(:glob_path1) { Pathname.new("#{dir}/glob_path1") }
 | |
|       let(:glob_path2) { Pathname.new("#{dir}/glob_path2") }
 | |
|       let(:paths) { [absolute_path, path_with_tilde, glob_path1, glob_path2] }
 | |
| 
 | |
|       around(:each) do |example|
 | |
|         begin
 | |
|           ENV["HOME"] = dir
 | |
| 
 | |
|           FileUtils.touch paths
 | |
| 
 | |
|           example.run
 | |
|         ensure
 | |
|           FileUtils.rm_f paths
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       let(:fake_system_command) { Hbc::NeverSudoSystemCommand }
 | |
|       let(:cask) { Hbc::CaskLoader.load(cask_path("with-#{artifact_dsl_key}-#{directive}")) }
 | |
| 
 | |
|       before(:each) do
 | |
|         allow_any_instance_of(Hbc::Artifact::AbstractUninstall).to receive(:trash_paths)
 | |
|           .and_wrap_original do |method, *args|
 | |
|             result = method.call(*args)
 | |
|             FileUtils.rm_rf result.stdout.split("\0")
 | |
|           end
 | |
|       end
 | |
| 
 | |
|       it "is supported" do
 | |
|         paths.each do |path|
 | |
|           expect(path).to exist
 | |
|         end
 | |
| 
 | |
|         subject
 | |
| 
 | |
|         paths.each do |path|
 | |
|           expect(path).not_to exist
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   context "using :rmdir" do
 | |
|     let(:fake_system_command) { Hbc::NeverSudoSystemCommand }
 | |
|     let(:cask) { Hbc::CaskLoader.load(cask_path("with-#{artifact_dsl_key}-rmdir")) }
 | |
|     let(:empty_directory) { Pathname.new("#{TEST_TMPDIR}/empty_directory_path") }
 | |
|     let(:ds_store) { empty_directory.join(".DS_Store") }
 | |
| 
 | |
|     before(:each) do
 | |
|       empty_directory.mkdir
 | |
|       FileUtils.touch ds_store
 | |
|     end
 | |
| 
 | |
|     after(:each) do
 | |
|       FileUtils.rm_rf empty_directory
 | |
|     end
 | |
| 
 | |
|     it "is supported" do
 | |
|       expect(empty_directory).to exist
 | |
|       expect(ds_store).to exist
 | |
| 
 | |
|       subject
 | |
| 
 | |
|       expect(ds_store).not_to exist
 | |
|       expect(empty_directory).not_to exist
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   [:script, :early_script].each do |script_type|
 | |
|     context "using #{script_type.inspect}" do
 | |
|       let(:fake_system_command) { Hbc::NeverSudoSystemCommand }
 | |
|       let(:token) { "with-#{artifact_dsl_key}-#{script_type}".tr("_", "-") }
 | |
|       let(:cask) { Hbc::CaskLoader.load(cask_path(token.to_s)) }
 | |
|       let(:script_pathname) { cask.staged_path.join("MyFancyPkg", "FancyUninstaller.tool") }
 | |
| 
 | |
|       it "is supported" do
 | |
|         allow(fake_system_command).to receive(:run).with(any_args).and_call_original
 | |
| 
 | |
|         expect(fake_system_command).to receive(:run).with(
 | |
|           "/bin/chmod",
 | |
|           args: ["--", "+x", script_pathname],
 | |
|         )
 | |
| 
 | |
|         expect(fake_system_command).to receive(:run).with(
 | |
|           cask.staged_path.join("MyFancyPkg", "FancyUninstaller.tool"),
 | |
|           args: ["--please"],
 | |
|           must_succeed: true,
 | |
|           print_stdout: true,
 | |
|           sudo: false,
 | |
|         )
 | |
| 
 | |
|         InstallHelper.install_without_artifacts(cask)
 | |
|         subject
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   context "using :login_item" do
 | |
|     let(:cask) { Hbc::CaskLoader.load(cask_path("with-#{artifact_dsl_key}-login-item")) }
 | |
| 
 | |
|     it "is supported" do
 | |
|       Hbc::FakeSystemCommand.expects_command(
 | |
|         ["/usr/bin/osascript", "-e", 'tell application "System Events" to delete every login ' \
 | |
|                                      'item whose name is "Fancy"'],
 | |
|       )
 | |
| 
 | |
|       subject
 | |
|     end
 | |
|   end
 | |
| end
 | 
