package settings import ( "encoding/json" "os" "path/filepath" "testing" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" ) // GIVEN a non existing build dir in the config // WHEN the config is loaded // THEN the directory should be created func TestNewConfig(t *testing.T) { configDir := t.TempDir() err := os.MkdirAll(filepath.Join(configDir, "yay"), 0o755) assert.NoError(t, err) os.Setenv("XDG_CONFIG_HOME", configDir) cacheDir := t.TempDir() config := map[string]string{"BuildDir": filepath.Join(cacheDir, "test-build-dir")} f, err := os.Create(filepath.Join(configDir, "yay", "config.json")) assert.NoError(t, err) defer f.Close() configJSON, _ := json.Marshal(config) _, err = f.WriteString(string(configJSON)) assert.NoError(t, err) newConfig, err := NewConfig("v1.0.0") assert.NoError(t, err) assert.Equal(t, filepath.Join(cacheDir, "test-build-dir"), newConfig.BuildDir) _, err = os.Stat(filepath.Join(cacheDir, "test-build-dir")) assert.NoError(t, err) } // GIVEN a non existing build dir in the config and AURDEST set to a non-existing folder // WHEN the config is loaded // THEN the directory of AURDEST should be created and selected func TestNewConfigAURDEST(t *testing.T) { configDir := t.TempDir() err := os.MkdirAll(filepath.Join(configDir, "yay"), 0o755) assert.NoError(t, err) os.Setenv("XDG_CONFIG_HOME", configDir) cacheDir := t.TempDir() config := map[string]string{"BuildDir": filepath.Join(cacheDir, "test-other-dir")} os.Setenv("AURDEST", filepath.Join(cacheDir, "test-build-dir")) f, err := os.Create(filepath.Join(configDir, "yay", "config.json")) assert.NoError(t, err) defer f.Close() configJSON, _ := json.Marshal(config) _, err = f.WriteString(string(configJSON)) assert.NoError(t, err) newConfig, err := NewConfig("v1.0.0") assert.NoError(t, err) assert.Equal(t, filepath.Join(cacheDir, "test-build-dir"), newConfig.BuildDir) _, err = os.Stat(filepath.Join(cacheDir, "test-build-dir")) assert.NoError(t, err) } // GIVEN default config // WHEN setPrivilegeElevator gets called // THEN sudobin should stay as "sudo" (given sudo exists) func TestConfiguration_setPrivilegeElevator(t *testing.T) { oldPath := os.Getenv("PATH") path := t.TempDir() doas := filepath.Join(path, "sudo") _, err := os.Create(doas) os.Chmod(doas, 0o755) assert.NoError(t, err) config := DefaultConfig() config.SudoLoop = true config.SudoFlags = "-v" os.Setenv("PATH", path) err = config.setPrivilegeElevator() os.Setenv("PATH", oldPath) assert.NoError(t, err) assert.Equal(t, "sudo", config.SudoBin) assert.Equal(t, "-v", config.SudoFlags) assert.True(t, config.SudoLoop) } // GIVEN default config and sudo loop enabled // GIVEN only su in path // WHEN setPrivilegeElevator gets called // THEN sudobin should be changed to "su" func TestConfiguration_setPrivilegeElevator_su(t *testing.T) { oldPath := os.Getenv("PATH") path := t.TempDir() doas := filepath.Join(path, "su") _, err := os.Create(doas) os.Chmod(doas, 0o755) assert.NoError(t, err) config := DefaultConfig() config.SudoLoop = true config.SudoFlags = "-v" os.Setenv("PATH", path) err = config.setPrivilegeElevator() os.Setenv("PATH", oldPath) assert.NoError(t, err) assert.Equal(t, "su", config.SudoBin) assert.Equal(t, "", config.SudoFlags) assert.False(t, config.SudoLoop) } // GIVEN default config and sudo loop enabled // GIVEN no sudo in path // WHEN setPrivilegeElevator gets called // THEN sudobin should be changed to "su" func TestConfiguration_setPrivilegeElevator_no_path(t *testing.T) { oldPath := os.Getenv("PATH") os.Setenv("PATH", "") config := DefaultConfig() config.SudoLoop = true config.SudoFlags = "-v" err := config.setPrivilegeElevator() os.Setenv("PATH", oldPath) assert.Error(t, err) assert.Equal(t, "sudo", config.SudoBin) assert.Equal(t, "", config.SudoFlags) assert.False(t, config.SudoLoop) } // GIVEN default config and sudo loop enabled // GIVEN doas in path // WHEN setPrivilegeElevator gets called // THEN sudobin should be changed to "doas" func TestConfiguration_setPrivilegeElevator_doas(t *testing.T) { oldPath := os.Getenv("PATH") path := t.TempDir() doas := filepath.Join(path, "doas") _, err := os.Create(doas) os.Chmod(doas, 0o755) assert.NoError(t, err) config := DefaultConfig() config.SudoLoop = true config.SudoFlags = "-v" os.Setenv("PATH", path) err = config.setPrivilegeElevator() os.Setenv("PATH", oldPath) assert.NoError(t, err) assert.Equal(t, "doas", config.SudoBin) assert.Equal(t, "", config.SudoFlags) assert.False(t, config.SudoLoop) } // GIVEN config with wrapper and sudo loop enabled // GIVEN wrapper is in path // WHEN setPrivilegeElevator gets called // THEN sudobin should be kept as the wrapper func TestConfiguration_setPrivilegeElevator_custom_script(t *testing.T) { oldPath := os.Getenv("PATH") path := t.TempDir() wrapper := filepath.Join(path, "custom-wrapper") _, err := os.Create(wrapper) os.Chmod(wrapper, 0o755) assert.NoError(t, err) config := DefaultConfig() config.SudoLoop = true config.SudoBin = wrapper config.SudoFlags = "-v" os.Setenv("PATH", path) err = config.setPrivilegeElevator() os.Setenv("PATH", oldPath) assert.NoError(t, err) assert.Equal(t, wrapper, config.SudoBin) assert.Equal(t, "-v", config.SudoFlags) assert.True(t, config.SudoLoop) } // GIVEN default config and sudo loop enabled // GIVEN doas as PACMAN_AUTH env variable // WHEN setPrivilegeElevator gets called // THEN sudobin should be changed to "doas" func TestConfiguration_setPrivilegeElevator_pacman_auth_doas(t *testing.T) { oldPath := os.Getenv("PATH") path := t.TempDir() doas := filepath.Join(path, "doas") _, err := os.Create(doas) os.Chmod(doas, 0o755) require.NoError(t, err) sudo := filepath.Join(path, "sudo") _, err = os.Create(sudo) os.Chmod(sudo, 0o755) require.NoError(t, err) config := DefaultConfig() config.SudoBin = "sudo" config.SudoLoop = true config.SudoFlags = "-v" os.Setenv("PACMAN_AUTH", "doas") os.Setenv("PATH", path) err = config.setPrivilegeElevator() os.Setenv("PATH", oldPath) assert.NoError(t, err) assert.Equal(t, "doas", config.SudoBin) assert.Equal(t, "", config.SudoFlags) assert.False(t, config.SudoLoop) } // GIVEN config with doas configed and sudo loop enabled // GIVEN sudo as PACMAN_AUTH env variable // WHEN setPrivilegeElevator gets called // THEN sudobin should be changed to "sudo" func TestConfiguration_setPrivilegeElevator_pacman_auth_sudo(t *testing.T) { oldPath := os.Getenv("PATH") path := t.TempDir() doas := filepath.Join(path, "doas") _, err := os.Create(doas) os.Chmod(doas, 0o755) require.NoError(t, err) sudo := filepath.Join(path, "sudo") _, err = os.Create(sudo) os.Chmod(sudo, 0o755) require.NoError(t, err) config := DefaultConfig() config.SudoBin = "doas" config.SudoLoop = true config.SudoFlags = "-v" os.Setenv("PACMAN_AUTH", "sudo") os.Setenv("PATH", path) err = config.setPrivilegeElevator() os.Setenv("PATH", oldPath) assert.NoError(t, err) assert.Equal(t, "sudo", config.SudoBin) assert.Equal(t, "-v", config.SudoFlags) assert.True(t, config.SudoLoop) }