brew/Library/Homebrew/test/sandbox_spec.rb

133 lines
3.6 KiB
Ruby
Raw Normal View History

# frozen_string_literal: true
2017-02-27 17:38:07 +01:00
require "sandbox"
RSpec.describe Sandbox, :needs_macos do
2017-05-09 23:00:51 +02:00
define_negated_matcher :not_matching, :matching
subject(:sandbox) { described_class.new }
2017-02-28 14:50:46 +01:00
let(:dir) { mktmpdir }
2017-02-27 17:38:07 +01:00
let(:file) { dir/"foo" }
before do
2017-02-27 17:38:07 +01:00
skip "Sandbox not implemented." unless described_class.available?
end
specify "#allow_write" do
2024-04-24 20:36:57 -04:00
sandbox.allow_write path: file
sandbox.run "touch", file
2017-02-27 17:38:07 +01:00
expect(file).to exist
end
describe "#path_filter" do
["'", '"', "(", ")", "\n", "\\"].each do |char|
it "fails if the path contains #{char}" do
expect do
sandbox.path_filter("foo#{char}bar", :subpath)
end.to raise_error(ArgumentError)
end
end
end
describe "#allow_write_cellar" do
it "fails when the formula has a name including )" do
f = formula do
url "https://brew.sh/foo-1.0.tar.gz"
version "1.0"
def initialize(*, **)
super
@name = "foo)bar"
end
end
expect do
sandbox.allow_write_cellar f
end.to raise_error(ArgumentError)
end
it "fails when the formula has a name including \"" do
f = formula do
url "https://brew.sh/foo-1.0.tar.gz"
version "1.0"
def initialize(*, **)
super
@name = "foo\"bar"
end
end
expect do
sandbox.allow_write_cellar f
end.to raise_error(ArgumentError)
end
end
describe "#run" do
2017-02-27 17:38:07 +01:00
it "fails when writing to file not specified with ##allow_write" do
expect do
sandbox.run "touch", file
end.to raise_error(ErrorDuringExecution)
2017-02-27 17:38:07 +01:00
expect(file).not_to exist
end
it "complains on failure" do
ENV["HOMEBREW_VERBOSE"] = "1"
2021-09-01 16:06:07 +01:00
allow(Utils).to receive(:popen_read).and_call_original
allow(Utils).to receive(:popen_read).with("syslog", any_args).and_return("foo")
2017-02-27 17:38:07 +01:00
expect { sandbox.run "false" }
2017-02-27 17:38:07 +01:00
.to raise_error(ErrorDuringExecution)
.and output(/foo/).to_stdout
end
it "ignores bogus Python error" do
ENV["HOMEBREW_VERBOSE"] = "1"
2017-10-15 02:28:32 +02:00
with_bogus_error = <<~EOS
2017-02-27 17:38:07 +01:00
foo
Mar 17 02:55:06 sandboxd[342]: Python(49765) deny file-write-unlink /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/distutils/errors.pyc
bar
EOS
2021-09-01 16:06:07 +01:00
allow(Utils).to receive(:popen_read).and_call_original
allow(Utils).to receive(:popen_read).with("syslog", any_args).and_return(with_bogus_error)
2017-02-27 17:38:07 +01:00
expect { sandbox.run "false" }
2017-02-27 17:38:07 +01:00
.to raise_error(ErrorDuringExecution)
.and output(a_string_matching(/foo/).and(matching(/bar/).and(not_matching(/Python/)))).to_stdout
end
end
2024-07-13 16:07:48 -04:00
describe "#disallow chmod on some directory" do
it "formula does a chmod to opt" do
expect { sandbox.run "chmod", "ug-w", HOMEBREW_PREFIX }.to raise_error(ErrorDuringExecution)
2024-07-13 16:07:48 -04:00
end
it "allows chmod on a path allowed to write" do
mktmpdir do |path|
FileUtils.touch path/"foo"
sandbox.allow_write_path(path)
expect { sandbox.run "chmod", "ug-w", path/"foo" }.not_to raise_error(ErrorDuringExecution)
end
end
end
describe "#disallow chmod SUID or SGID on some directory" do
it "formula does a chmod 4000 to opt" do
expect { sandbox.run "chmod", "4000", HOMEBREW_PREFIX }.to raise_error(ErrorDuringExecution)
end
it "allows chmod 4000 on a path allowed to write" do
mktmpdir do |path|
FileUtils.touch path/"foo"
sandbox.allow_write_path(path)
expect { sandbox.run "chmod", "4000", path/"foo" }.not_to raise_error(ErrorDuringExecution)
2024-07-13 16:07:48 -04:00
end
end
end
2017-02-27 17:38:07 +01:00
end