90 lines
2.4 KiB
Go
90 lines
2.4 KiB
Go
|
package system
|
||
|
|
||
|
import (
|
||
|
"testing"
|
||
|
|
||
|
"git.ophivana.moe/cat/fortify/acl"
|
||
|
)
|
||
|
|
||
|
func TestUpdatePerm(t *testing.T) {
|
||
|
testCases := []struct {
|
||
|
path string
|
||
|
perms []acl.Perm
|
||
|
}{
|
||
|
{"/run/user/1971/fortify", []acl.Perm{acl.Execute}},
|
||
|
{"/tmp/fortify.1971/tmpdir/150", []acl.Perm{acl.Read, acl.Write, acl.Execute}},
|
||
|
}
|
||
|
|
||
|
for _, tc := range testCases {
|
||
|
t.Run(tc.path+permSubTestSuffix(tc.perms), func(t *testing.T) {
|
||
|
sys := New(150)
|
||
|
sys.UpdatePerm(tc.path, tc.perms...)
|
||
|
(&tcOp{Process, tc.path}).test(t, sys.ops, []Op{&ACL{Process, tc.path, tc.perms}}, "UpdatePerm")
|
||
|
})
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestUpdatePermType(t *testing.T) {
|
||
|
testCases := []struct {
|
||
|
perms []acl.Perm
|
||
|
tcOp
|
||
|
}{
|
||
|
{[]acl.Perm{acl.Execute}, tcOp{User, "/tmp/fortify.1971/tmpdir"}},
|
||
|
{[]acl.Perm{acl.Read, acl.Write, acl.Execute}, tcOp{User, "/tmp/fortify.1971/tmpdir/150"}},
|
||
|
{[]acl.Perm{acl.Execute}, tcOp{Process, "/run/user/1971/fortify/fcb8a12f7c482d183ade8288c3de78b5"}},
|
||
|
{[]acl.Perm{acl.Read}, tcOp{Process, "/tmp/fortify.1971/fcb8a12f7c482d183ade8288c3de78b5/passwd"}},
|
||
|
{[]acl.Perm{acl.Read}, tcOp{Process, "/tmp/fortify.1971/fcb8a12f7c482d183ade8288c3de78b5/group"}},
|
||
|
{[]acl.Perm{acl.Read, acl.Write, acl.Execute}, tcOp{EWayland, "/run/user/1971/wayland-0"}},
|
||
|
}
|
||
|
|
||
|
for _, tc := range testCases {
|
||
|
t.Run(tc.path+"_"+TypeString(tc.et)+permSubTestSuffix(tc.perms), func(t *testing.T) {
|
||
|
sys := New(150)
|
||
|
sys.UpdatePermType(tc.et, tc.path, tc.perms...)
|
||
|
tc.test(t, sys.ops, []Op{&ACL{tc.et, tc.path, tc.perms}}, "UpdatePermType")
|
||
|
})
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestACL_String(t *testing.T) {
|
||
|
testCases := []struct {
|
||
|
want string
|
||
|
perms []acl.Perm
|
||
|
}{
|
||
|
{"---", []acl.Perm{}},
|
||
|
{"r--", []acl.Perm{acl.Read}},
|
||
|
{"-w-", []acl.Perm{acl.Write}},
|
||
|
{"--x", []acl.Perm{acl.Execute}},
|
||
|
{"rw-", []acl.Perm{acl.Read, acl.Write}},
|
||
|
{"r-x", []acl.Perm{acl.Read, acl.Execute}},
|
||
|
{"rwx", []acl.Perm{acl.Read, acl.Write, acl.Execute}},
|
||
|
{"rwx", []acl.Perm{acl.Read, acl.Write, acl.Write, acl.Execute}},
|
||
|
}
|
||
|
|
||
|
for _, tc := range testCases {
|
||
|
t.Run(tc.want, func(t *testing.T) {
|
||
|
a := &ACL{perms: tc.perms}
|
||
|
if got := a.String(); got != tc.want {
|
||
|
t.Errorf("String() = %v, want %v",
|
||
|
got, tc.want)
|
||
|
}
|
||
|
})
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func permSubTestSuffix(perms []acl.Perm) (suffix string) {
|
||
|
for _, perm := range perms {
|
||
|
switch perm {
|
||
|
case acl.Read:
|
||
|
suffix += "_read"
|
||
|
case acl.Write:
|
||
|
suffix += "_write"
|
||
|
case acl.Execute:
|
||
|
suffix += "_execute"
|
||
|
default:
|
||
|
panic("unreachable")
|
||
|
}
|
||
|
}
|
||
|
return
|
||
|
}
|