mirror of
https://github.com/neovim/neovim.git
synced 2024-12-23 20:55:18 -07:00
e61228a214
Before calling "attach" a screen object is just a dummy container for (row, col) values whose purpose is to be sent as part of the "attach" function call anyway. Just create the screen in an attached state directly. Keep the complete (row, col, options) config together. It is still completely valid to later detach and re-attach as needed, including to another session.
310 lines
12 KiB
Lua
310 lines
12 KiB
Lua
local t = require('test.testutil')
|
|
local n = require('test.functional.testnvim')()
|
|
local Screen = require('test.functional.ui.screen')
|
|
|
|
local eq = t.eq
|
|
local clear = n.clear
|
|
local command = n.command
|
|
local pathsep = n.get_pathsep()
|
|
local is_os = t.is_os
|
|
local api = n.api
|
|
local exec_lua = n.exec_lua
|
|
local feed_command = n.feed_command
|
|
local feed = n.feed
|
|
local fn = n.fn
|
|
local stdpath = fn.stdpath
|
|
local pcall_err = t.pcall_err
|
|
local matches = t.matches
|
|
local read_file = t.read_file
|
|
|
|
describe('vim.secure', function()
|
|
describe('read()', function()
|
|
local xstate = 'Xstate'
|
|
|
|
setup(function()
|
|
clear { env = { XDG_STATE_HOME = xstate } }
|
|
n.mkdir_p(xstate .. pathsep .. (is_os('win') and 'nvim-data' or 'nvim'))
|
|
t.write_file(
|
|
'Xfile',
|
|
[[
|
|
let g:foobar = 42
|
|
]]
|
|
)
|
|
end)
|
|
|
|
teardown(function()
|
|
os.remove('Xfile')
|
|
n.rmdir(xstate)
|
|
end)
|
|
|
|
it('works', function()
|
|
local screen = Screen.new(80, 8)
|
|
screen:set_default_attr_ids({
|
|
[1] = { bold = true, foreground = Screen.colors.Blue1 },
|
|
[2] = { bold = true, reverse = true },
|
|
[3] = { bold = true, foreground = Screen.colors.SeaGreen },
|
|
[4] = { reverse = true },
|
|
})
|
|
|
|
--- XXX: screen:expect() may fail if this path is too long.
|
|
local cwd = fn.getcwd()
|
|
|
|
-- Need to use feed_command instead of exec_lua because of the confirmation prompt
|
|
feed_command([[lua vim.secure.read('Xfile')]])
|
|
screen:expect {
|
|
grid = [[
|
|
|
|
|
{1:~ }|*3
|
|
{2: }|
|
|
:lua vim.secure.read('Xfile') |
|
|
{3:]]
|
|
.. cwd
|
|
.. pathsep
|
|
.. [[Xfile is not trusted.}{MATCH:%s+}|
|
|
{3:[i]gnore, (v)iew, (d)eny, (a)llow: }^ |
|
|
]],
|
|
}
|
|
feed('d')
|
|
screen:expect {
|
|
grid = [[
|
|
^ |
|
|
{1:~ }|*6
|
|
|
|
|
]],
|
|
}
|
|
|
|
local trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('! %s', cwd .. pathsep .. 'Xfile'), vim.trim(trust))
|
|
eq(vim.NIL, exec_lua([[return vim.secure.read('Xfile')]]))
|
|
|
|
os.remove(stdpath('state') .. pathsep .. 'trust')
|
|
|
|
feed_command([[lua vim.secure.read('Xfile')]])
|
|
screen:expect {
|
|
grid = [[
|
|
|
|
|
{1:~ }|*3
|
|
{2: }|
|
|
:lua vim.secure.read('Xfile') |
|
|
{3:]]
|
|
.. cwd
|
|
.. pathsep
|
|
.. [[Xfile is not trusted.}{MATCH:%s+}|
|
|
{3:[i]gnore, (v)iew, (d)eny, (a)llow: }^ |
|
|
]],
|
|
}
|
|
feed('a')
|
|
screen:expect {
|
|
grid = [[
|
|
^ |
|
|
{1:~ }|*6
|
|
|
|
|
]],
|
|
}
|
|
|
|
local hash = fn.sha256(read_file('Xfile'))
|
|
trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('%s %s', hash, cwd .. pathsep .. 'Xfile'), vim.trim(trust))
|
|
eq(vim.NIL, exec_lua([[vim.secure.read('Xfile')]]))
|
|
|
|
os.remove(stdpath('state') .. pathsep .. 'trust')
|
|
|
|
feed_command([[lua vim.secure.read('Xfile')]])
|
|
screen:expect {
|
|
grid = [[
|
|
|
|
|
{1:~ }|*3
|
|
{2: }|
|
|
:lua vim.secure.read('Xfile') |
|
|
{3:]]
|
|
.. cwd
|
|
.. pathsep
|
|
.. [[Xfile is not trusted.}{MATCH:%s+}|
|
|
{3:[i]gnore, (v)iew, (d)eny, (a)llow: }^ |
|
|
]],
|
|
}
|
|
feed('i')
|
|
screen:expect {
|
|
grid = [[
|
|
^ |
|
|
{1:~ }|*6
|
|
|
|
|
]],
|
|
}
|
|
|
|
-- Trust database is not updated
|
|
trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq(nil, trust)
|
|
|
|
feed_command([[lua vim.secure.read('Xfile')]])
|
|
screen:expect {
|
|
grid = [[
|
|
|
|
|
{1:~ }|*3
|
|
{2: }|
|
|
:lua vim.secure.read('Xfile') |
|
|
{3:]]
|
|
.. cwd
|
|
.. pathsep
|
|
.. [[Xfile is not trusted.}{MATCH:%s+}|
|
|
{3:[i]gnore, (v)iew, (d)eny, (a)llow: }^ |
|
|
]],
|
|
}
|
|
feed('v')
|
|
screen:expect {
|
|
grid = [[
|
|
^let g:foobar = 42 |
|
|
{1:~ }|*2
|
|
{2:]]
|
|
.. fn.fnamemodify(cwd, ':~')
|
|
.. pathsep
|
|
.. [[Xfile [RO]{MATCH:%s+}}|
|
|
|
|
|
{1:~ }|
|
|
{4:[No Name] }|
|
|
|
|
|
]],
|
|
}
|
|
|
|
-- Trust database is not updated
|
|
trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq(nil, trust)
|
|
|
|
-- Cannot write file
|
|
pcall_err(command, 'write')
|
|
eq(true, api.nvim_get_option_value('readonly', {}))
|
|
end)
|
|
end)
|
|
|
|
describe('trust()', function()
|
|
local xstate = 'Xstate'
|
|
|
|
setup(function()
|
|
clear { env = { XDG_STATE_HOME = xstate } }
|
|
n.mkdir_p(xstate .. pathsep .. (is_os('win') and 'nvim-data' or 'nvim'))
|
|
end)
|
|
|
|
teardown(function()
|
|
n.rmdir(xstate)
|
|
end)
|
|
|
|
before_each(function()
|
|
t.write_file('test_file', 'test')
|
|
end)
|
|
|
|
after_each(function()
|
|
os.remove('test_file')
|
|
end)
|
|
|
|
it('returns error when passing both path and bufnr', function()
|
|
matches(
|
|
'"path" and "bufnr" are mutually exclusive',
|
|
pcall_err(exec_lua, [[vim.secure.trust({action='deny', bufnr=0, path='test_file'})]])
|
|
)
|
|
end)
|
|
|
|
it('returns error when passing neither path or bufnr', function()
|
|
matches(
|
|
'one of "path" or "bufnr" is required',
|
|
pcall_err(exec_lua, [[vim.secure.trust({action='deny'})]])
|
|
)
|
|
end)
|
|
|
|
it('trust then deny then remove a file using bufnr', function()
|
|
local cwd = fn.getcwd()
|
|
local hash = fn.sha256(read_file('test_file'))
|
|
local full_path = cwd .. pathsep .. 'test_file'
|
|
|
|
command('edit test_file')
|
|
eq({ true, full_path }, exec_lua([[return {vim.secure.trust({action='allow', bufnr=0})}]]))
|
|
local trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('%s %s', hash, full_path), vim.trim(trust))
|
|
|
|
eq({ true, full_path }, exec_lua([[return {vim.secure.trust({action='deny', bufnr=0})}]]))
|
|
trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('! %s', full_path), vim.trim(trust))
|
|
|
|
eq({ true, full_path }, exec_lua([[return {vim.secure.trust({action='remove', bufnr=0})}]]))
|
|
trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq('', vim.trim(trust))
|
|
end)
|
|
|
|
it('deny then trust then remove a file using bufnr', function()
|
|
local cwd = fn.getcwd()
|
|
local hash = fn.sha256(read_file('test_file'))
|
|
local full_path = cwd .. pathsep .. 'test_file'
|
|
|
|
command('edit test_file')
|
|
eq({ true, full_path }, exec_lua([[return {vim.secure.trust({action='deny', bufnr=0})}]]))
|
|
local trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('! %s', full_path), vim.trim(trust))
|
|
|
|
eq({ true, full_path }, exec_lua([[return {vim.secure.trust({action='allow', bufnr=0})}]]))
|
|
trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('%s %s', hash, full_path), vim.trim(trust))
|
|
|
|
eq({ true, full_path }, exec_lua([[return {vim.secure.trust({action='remove', bufnr=0})}]]))
|
|
trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq('', vim.trim(trust))
|
|
end)
|
|
|
|
it('trust using bufnr then deny then remove a file using path', function()
|
|
local cwd = fn.getcwd()
|
|
local hash = fn.sha256(read_file('test_file'))
|
|
local full_path = cwd .. pathsep .. 'test_file'
|
|
|
|
command('edit test_file')
|
|
eq({ true, full_path }, exec_lua([[return {vim.secure.trust({action='allow', bufnr=0})}]]))
|
|
local trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('%s %s', hash, full_path), vim.trim(trust))
|
|
|
|
eq(
|
|
{ true, full_path },
|
|
exec_lua([[return {vim.secure.trust({action='deny', path='test_file'})}]])
|
|
)
|
|
trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('! %s', full_path), vim.trim(trust))
|
|
|
|
eq(
|
|
{ true, full_path },
|
|
exec_lua([[return {vim.secure.trust({action='remove', path='test_file'})}]])
|
|
)
|
|
trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq('', vim.trim(trust))
|
|
end)
|
|
|
|
it('deny then trust then remove a file using bufnr', function()
|
|
local cwd = fn.getcwd()
|
|
local hash = fn.sha256(read_file('test_file'))
|
|
local full_path = cwd .. pathsep .. 'test_file'
|
|
|
|
command('edit test_file')
|
|
eq(
|
|
{ true, full_path },
|
|
exec_lua([[return {vim.secure.trust({action='deny', path='test_file'})}]])
|
|
)
|
|
local trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('! %s', full_path), vim.trim(trust))
|
|
|
|
eq({ true, full_path }, exec_lua([[return {vim.secure.trust({action='allow', bufnr=0})}]]))
|
|
trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('%s %s', hash, full_path), vim.trim(trust))
|
|
|
|
eq(
|
|
{ true, full_path },
|
|
exec_lua([[return {vim.secure.trust({action='remove', path='test_file'})}]])
|
|
)
|
|
trust = read_file(stdpath('state') .. pathsep .. 'trust')
|
|
eq('', vim.trim(trust))
|
|
end)
|
|
|
|
it('trust returns error when buffer not associated to file', function()
|
|
command('new')
|
|
eq(
|
|
{ false, 'buffer is not associated with a file' },
|
|
exec_lua([[return {vim.secure.trust({action='allow', bufnr=0})}]])
|
|
)
|
|
end)
|
|
end)
|
|
end)
|