diff options
author | João Souto <joao.jpgs@hotmail.com> | 2020-03-02 00:51:54 +0000 |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-03-01 19:51:54 -0500 |
commit | 809019dc6e9a80843affc927fa7a52cd41e76471 (patch) | |
tree | ca3f5ae27fe4cbdc98ea9ef7e713c1194c84e3e7 /cli/tests/integration_tests.rs | |
parent | 2a594bd3b2403fbbd26a0191ac8c289c365451d0 (diff) |
Port Complex Permissions Tests to Rust (#4200)
Diffstat (limited to 'cli/tests/integration_tests.rs')
-rw-r--r-- | cli/tests/integration_tests.rs | 405 |
1 files changed, 384 insertions, 21 deletions
diff --git a/cli/tests/integration_tests.rs b/cli/tests/integration_tests.rs index 434a55c08..d7e807793 100644 --- a/cli/tests/integration_tests.rs +++ b/cli/tests/integration_tests.rs @@ -442,6 +442,7 @@ fn repl_test_console_log() { "repl", Some(vec!["console.log('hello')", "'world'"]), None, + false, ); assert_eq!(out, "hello\nundefined\nworld\n"); assert!(err.is_empty()); @@ -451,7 +452,7 @@ fn repl_test_console_log() { #[test] fn repl_test_eof() { let (out, err, code) = - util::run_and_collect_output("repl", Some(vec!["1 + 2"]), None); + util::run_and_collect_output("repl", Some(vec!["1 + 2"]), None, false); assert_eq!(out, "3\n"); assert!(err.is_empty()); assert_eq!(code, 0); @@ -459,8 +460,12 @@ fn repl_test_eof() { #[test] fn repl_test_exit_command() { - let (out, err, code) = - util::run_and_collect_output("repl", Some(vec!["exit", "'ignored'"]), None); + let (out, err, code) = util::run_and_collect_output( + "repl", + Some(vec!["exit", "'ignored'"]), + None, + false, + ); assert!(out.is_empty()); assert!(err.is_empty()); assert_eq!(code, 0); @@ -469,7 +474,7 @@ fn repl_test_exit_command() { #[test] fn repl_test_help_command() { let (out, err, code) = - util::run_and_collect_output("repl", Some(vec!["help"]), None); + util::run_and_collect_output("repl", Some(vec!["help"]), None, false); assert_eq!( out, vec![ @@ -491,6 +496,7 @@ fn repl_test_function() { "repl", Some(vec!["Deno.writeFileSync"]), None, + false, ); assert_eq!(out, "[Function: writeFileSync]\n"); assert!(err.is_empty()); @@ -499,8 +505,12 @@ fn repl_test_function() { #[test] fn repl_test_multiline() { - let (out, err, code) = - util::run_and_collect_output("repl", Some(vec!["(\n1 + 2\n)"]), None); + let (out, err, code) = util::run_and_collect_output( + "repl", + Some(vec!["(\n1 + 2\n)"]), + None, + false, + ); assert_eq!(out, "3\n"); assert!(err.is_empty()); assert_eq!(code, 0); @@ -509,7 +519,7 @@ fn repl_test_multiline() { #[test] fn repl_test_eval_unterminated() { let (out, err, code) = - util::run_and_collect_output("repl", Some(vec!["eval('{')"]), None); + util::run_and_collect_output("repl", Some(vec!["eval('{')"]), None, false); assert!(out.is_empty()); assert!(err.contains("Unexpected end of input")); assert_eq!(code, 0); @@ -517,8 +527,12 @@ fn repl_test_eval_unterminated() { #[test] fn repl_test_reference_error() { - let (out, err, code) = - util::run_and_collect_output("repl", Some(vec!["not_a_variable"]), None); + let (out, err, code) = util::run_and_collect_output( + "repl", + Some(vec!["not_a_variable"]), + None, + false, + ); assert!(out.is_empty()); assert!(err.contains("not_a_variable is not defined")); assert_eq!(code, 0); @@ -526,8 +540,12 @@ fn repl_test_reference_error() { #[test] fn repl_test_syntax_error() { - let (out, err, code) = - util::run_and_collect_output("repl", Some(vec!["syntax error"]), None); + let (out, err, code) = util::run_and_collect_output( + "repl", + Some(vec!["syntax error"]), + None, + false, + ); assert!(out.is_empty()); assert!(err.contains("Unexpected identifier")); assert_eq!(code, 0); @@ -536,7 +554,7 @@ fn repl_test_syntax_error() { #[test] fn repl_test_type_error() { let (out, err, code) = - util::run_and_collect_output("repl", Some(vec!["console()"]), None); + util::run_and_collect_output("repl", Some(vec!["console()"]), None, false); assert!(out.is_empty()); assert!(err.contains("console is not a function")); assert_eq!(code, 0); @@ -544,8 +562,12 @@ fn repl_test_type_error() { #[test] fn repl_test_variable() { - let (out, err, code) = - util::run_and_collect_output("repl", Some(vec!["var a = 123;", "a"]), None); + let (out, err, code) = util::run_and_collect_output( + "repl", + Some(vec!["var a = 123;", "a"]), + None, + false, + ); assert_eq!(out, "undefined\n123\n"); assert!(err.is_empty()); assert_eq!(code, 0); @@ -553,8 +575,12 @@ fn repl_test_variable() { #[test] fn repl_test_lexical_scoped_variable() { - let (out, err, code) = - util::run_and_collect_output("repl", Some(vec!["let a = 123;", "a"]), None); + let (out, err, code) = util::run_and_collect_output( + "repl", + Some(vec!["let a = 123;", "a"]), + None, + false, + ); assert_eq!(out, "undefined\n123\n"); assert!(err.is_empty()); assert_eq!(code, 0); @@ -570,6 +596,7 @@ fn repl_test_missing_deno_dir() { "repl", Some(vec!["1"]), Some(vec![("DENO_DIR".to_owned(), DENO_DIR.to_owned())]), + false, ); assert!(read_dir(&test_deno_dir).is_ok()); remove_dir_all(&test_deno_dir).unwrap(); @@ -581,7 +608,7 @@ fn repl_test_missing_deno_dir() { #[test] fn repl_test_save_last_eval() { let (out, err, code) = - util::run_and_collect_output("repl", Some(vec!["1", "_"]), None); + util::run_and_collect_output("repl", Some(vec!["1", "_"]), None, false); assert_eq!(out, "1\n1\n"); assert!(err.is_empty()); assert_eq!(code, 0); @@ -589,8 +616,12 @@ fn repl_test_save_last_eval() { #[test] fn repl_test_save_last_thrown() { - let (out, err, code) = - util::run_and_collect_output("repl", Some(vec!["throw 1", "_error"]), None); + let (out, err, code) = util::run_and_collect_output( + "repl", + Some(vec!["throw 1", "_error"]), + None, + false, + ); assert_eq!(out, "1\n"); assert_eq!(err, "Thrown: 1\n"); assert_eq!(code, 0); @@ -598,8 +629,12 @@ fn repl_test_save_last_thrown() { #[test] fn repl_test_assign_underscore() { - let (out, err, code) = - util::run_and_collect_output("repl", Some(vec!["_ = 1", "2", "_"]), None); + let (out, err, code) = util::run_and_collect_output( + "repl", + Some(vec!["_ = 1", "2", "_"]), + None, + false, + ); assert_eq!( out, "Last evaluation result is no longer saved to _.\n1\n2\n1\n" @@ -614,6 +649,7 @@ fn repl_test_assign_underscore_error() { "repl", Some(vec!["_error = 1", "throw 2", "_error"]), None, + false, ); assert_eq!( out, @@ -1476,6 +1512,7 @@ fn test_permissions_with_allow() { &format!("run --allow-{0} permission_test.ts {0}Required", permission), None, None, + false, ); assert_eq!(code, 0); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); @@ -1489,12 +1526,331 @@ fn test_permissions_without_allow() { &format!("run permission_test.ts {0}Required", permission), None, None, + false, + ); + assert_eq!(code, 1); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); + } +} + +#[test] +fn test_permissions_rw_inside_project_dir() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + for permission in &PERMISSION_VARIANTS { + let (_, err, code) = util::run_and_collect_output( + &format!( + "run --allow-{0}={1} complex_permissions_test.ts {0} {2} {2}", + permission, + util::root_path().into_os_string().into_string().unwrap(), + "complex_permissions_test.ts" + ), + None, + None, + false, + ); + assert_eq!(code, 0); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); + } +} + +#[test] +fn test_permissions_rw_outside_test_dir() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + for permission in &PERMISSION_VARIANTS { + let (_, err, code) = util::run_and_collect_output( + &format!( + "run --allow-{0}={1} complex_permissions_test.ts {0} {2}", + permission, + util::root_path() + .join("cli") + .join("tests") + .into_os_string() + .into_string() + .unwrap(), + util::root_path() + .join("Cargo.toml") + .into_os_string() + .into_string() + .unwrap(), + ), + None, + None, + false, + ); + assert_eq!(code, 1); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); + } +} + +#[test] +fn test_permissions_rw_inside_test_dir() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + for permission in &PERMISSION_VARIANTS { + let (_, err, code) = util::run_and_collect_output( + &format!( + "run --allow-{0}={1} complex_permissions_test.ts {0} {2}", + permission, + util::root_path() + .join("cli") + .join("tests") + .into_os_string() + .into_string() + .unwrap(), + "complex_permissions_test.ts" + ), + None, + None, + false, + ); + assert_eq!(code, 0); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); + } +} + +#[test] +fn test_permissions_rw_outside_test_and_js_dir() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + let test_dir = util::root_path() + .join("cli") + .join("tests") + .into_os_string() + .into_string() + .unwrap(); + let js_dir = util::root_path() + .join("js") + .into_os_string() + .into_string() + .unwrap(); + for permission in &PERMISSION_VARIANTS { + let (_, err, code) = util::run_and_collect_output( + &format!( + "run --allow-{0}={1},{2} complex_permissions_test.ts {0} {3}", + permission, + test_dir, + js_dir, + util::root_path() + .join("Cargo.toml") + .into_os_string() + .into_string() + .unwrap(), + ), + None, + None, + false, ); assert_eq!(code, 1); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } } +#[test] +fn test_permissions_rw_inside_test_and_js_dir() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + let test_dir = util::root_path() + .join("cli") + .join("tests") + .into_os_string() + .into_string() + .unwrap(); + let js_dir = util::root_path() + .join("js") + .into_os_string() + .into_string() + .unwrap(); + for permission in &PERMISSION_VARIANTS { + let (_, err, code) = util::run_and_collect_output( + &format!( + "run --allow-{0}={1},{2} complex_permissions_test.ts {0} {3}", + permission, test_dir, js_dir, "complex_permissions_test.ts" + ), + None, + None, + false, + ); + assert_eq!(code, 0); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); + } +} + +#[test] +fn test_permissions_rw_relative() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + for permission in &PERMISSION_VARIANTS { + let (_, err, code) = util::run_and_collect_output( + &format!( + "run --allow-{0}=. complex_permissions_test.ts {0} complex_permissions_test.ts", + permission + ), + None, + None, + false, + ); + assert_eq!(code, 0); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); + } +} + +#[test] +fn test_permissions_rw_no_prefix() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + for permission in &PERMISSION_VARIANTS { + let (_, err, code) = util::run_and_collect_output( + &format!( + "run --allow-{0}=tls/../ complex_permissions_test.ts {0} complex_permissions_test.ts", + permission + ), + None, + None, + false, + ); + assert_eq!(code, 0); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); + } +} + +#[test] +fn test_permissions_net_fetch_allow_localhost_4545() { + let (_, err, code) = util::run_and_collect_output( + "run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4545/", + None, + None,true, + ); + assert_eq!(code, 0); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); +} + +#[test] +fn test_permissions_net_fetch_allow_deno_land() { + let (_, err, code) = util::run_and_collect_output( + "run --allow-net=deno.land complex_permissions_test.ts netFetch http://localhost:4545/", + None, + None, + true, + ); + assert_eq!(code, 1); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); +} + +#[test] +fn test_permissions_net_fetch_localhost_4545_fail() { + let (_, err, code) = util::run_and_collect_output( + "run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4546/", + None, + None, + true, + ); + assert_eq!(code, 1); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); +} + +#[test] +fn test_permissions_net_fetch_localhost() { + let (_, err, code) = util::run_and_collect_output( + "run --allow-net=localhost complex_permissions_test.ts netFetch http://localhost:4545/ http://localhost:4546/ http://localhost:4547/", + None, + None, + true, + ); + assert_eq!(code, 0); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); +} + +#[test] +fn test_permissions_net_connect_allow_localhost_ip_4555() { + let (_, err, code) = util::run_and_collect_output( + "run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4545", + None, + None, + true, + ); + assert_eq!(code, 0); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); +} + +#[test] +fn test_permissions_net_connect_allow_deno_land() { + let (_, err, code) = util::run_and_collect_output( + "run --allow-net=deno.land complex_permissions_test.ts netConnect 127.0.0.1:4546", + None, + None, + true, + ); + assert_eq!(code, 1); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); +} + +#[test] +fn test_permissions_net_connect_allow_localhost_ip_4545_fail() { + let (_, err, code) = util::run_and_collect_output( + "run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4546", + None, + None, + true, + ); + assert_eq!(code, 1); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); +} + +#[test] +fn test_permissions_net_connect_allow_localhost_ip() { + let (_, err, code) = util::run_and_collect_output( + "run --allow-net=127.0.0.1 complex_permissions_test.ts netConnect 127.0.0.1:4545 127.0.0.1:4546 127.0.0.1:4547", + None, + None, + true, + ); + assert_eq!(code, 0); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); +} + +#[test] +fn test_permissions_net_listen_allow_localhost_4555() { + let (_, err, code) = util::run_and_collect_output( + "run --allow-net=localhost:4558 complex_permissions_test.ts netListen localhost:4558", + None, + None, + false, + ); + assert_eq!(code, 0); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); +} + +#[test] +fn test_permissions_net_listen_allow_deno_land() { + let (_, err, code) = util::run_and_collect_output( + "run --allow-net=deno.land complex_permissions_test.ts netListen localhost:4545", + None, + None, + false, + ); + assert_eq!(code, 1); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); +} + +#[test] +fn test_permissions_net_listen_allow_localhost_4555_fail() { + let (_, err, code) = util::run_and_collect_output( + "run --allow-net=localhost:4555 complex_permissions_test.ts netListen localhost:4556", + None, + None, + false, + ); + assert_eq!(code, 1); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); +} + +#[test] +fn test_permissions_net_listen_allow_localhost() { + let (_, err, code) = util::run_and_collect_output( + "run --allow-net=localhost complex_permissions_test.ts netListen localhost:4545 localhost:4546 localhost:4547", + None, + None, + false, + ); + assert_eq!(code, 0); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); +} + mod util { use deno::colors::strip_ansi_codes; pub use deno::test_util::*; @@ -1518,6 +1874,7 @@ mod util { args: &str, input: Option<Vec<&str>>, envs: Option<Vec<(String, String)>>, + need_http_server: bool, ) -> (String, String, i32) { let root = root_path(); let tests_dir = root.join("cli").join("tests"); @@ -1531,6 +1888,11 @@ mod util { if let Some(envs) = envs { deno_process_builder.envs(envs); } + let http_guard = if need_http_server { + Some(http_server()) + } else { + None + }; let mut deno = deno_process_builder .spawn() .expect("failed to spawn script"); @@ -1545,6 +1907,7 @@ mod util { stderr, status, } = deno.wait_with_output().expect("failed to wait on child"); + drop(http_guard); ( String::from_utf8(stdout).unwrap(), String::from_utf8(stderr).unwrap(), |