|
@@ -14,15 +14,13 @@ import (
|
|
|
// WHEN the config is loaded
|
|
|
// THEN the directory should be created
|
|
|
func TestNewConfig(t *testing.T) {
|
|
|
- configDir, err := os.MkdirTemp(os.TempDir(), "yay-config-home")
|
|
|
- assert.NoError(t, err)
|
|
|
- err = os.MkdirAll(filepath.Join(configDir, "yay"), 0o755)
|
|
|
+ configDir := t.TempDir()
|
|
|
+ err := os.MkdirAll(filepath.Join(configDir, "yay"), 0o755)
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
os.Setenv("XDG_CONFIG_HOME", configDir)
|
|
|
|
|
|
- cacheDir, err := os.MkdirTemp(os.TempDir(), "yay-cache-home")
|
|
|
- assert.NoError(t, err)
|
|
|
+ cacheDir := t.TempDir()
|
|
|
|
|
|
config := map[string]string{"BuildDir": filepath.Join(cacheDir, "test-build-dir")}
|
|
|
|
|
@@ -48,15 +46,13 @@ func TestNewConfig(t *testing.T) {
|
|
|
// WHEN the config is loaded
|
|
|
// THEN the directory of AURDEST should be created and selected
|
|
|
func TestNewConfigAURDEST(t *testing.T) {
|
|
|
- configDir, err := os.MkdirTemp(os.TempDir(), "yay-config-home")
|
|
|
- assert.NoError(t, err)
|
|
|
- err = os.MkdirAll(filepath.Join(configDir, "yay"), 0o755)
|
|
|
+ configDir := t.TempDir()
|
|
|
+ err := os.MkdirAll(filepath.Join(configDir, "yay"), 0o755)
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
os.Setenv("XDG_CONFIG_HOME", configDir)
|
|
|
|
|
|
- cacheDir, err := os.MkdirTemp(os.TempDir(), "yay-cache-home")
|
|
|
- assert.NoError(t, err)
|
|
|
+ cacheDir := t.TempDir()
|
|
|
|
|
|
config := map[string]string{"BuildDir": filepath.Join(cacheDir, "test-other-dir")}
|
|
|
os.Setenv("AURDEST", filepath.Join(cacheDir, "test-build-dir"))
|
|
@@ -85,16 +81,13 @@ func TestNewConfigAURDEST(t *testing.T) {
|
|
|
func TestConfiguration_setPrivilegeElevator(t *testing.T) {
|
|
|
oldPath := os.Getenv("PATH")
|
|
|
|
|
|
- path, err := os.MkdirTemp("", "yay-test")
|
|
|
- assert.NoError(t, err)
|
|
|
+ path := t.TempDir()
|
|
|
|
|
|
doas := filepath.Join(path, "sudo")
|
|
|
- _, err = os.Create(doas)
|
|
|
+ _, err := os.Create(doas)
|
|
|
os.Chmod(doas, 0o755)
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
- defer os.RemoveAll(path)
|
|
|
-
|
|
|
config := DefaultConfig()
|
|
|
config.SudoLoop = true
|
|
|
config.SudoFlags = "-v"
|
|
@@ -116,16 +109,13 @@ func TestConfiguration_setPrivilegeElevator(t *testing.T) {
|
|
|
func TestConfiguration_setPrivilegeElevator_su(t *testing.T) {
|
|
|
oldPath := os.Getenv("PATH")
|
|
|
|
|
|
- path, err := os.MkdirTemp("", "yay-test")
|
|
|
- assert.NoError(t, err)
|
|
|
+ path := t.TempDir()
|
|
|
|
|
|
doas := filepath.Join(path, "su")
|
|
|
- _, err = os.Create(doas)
|
|
|
+ _, err := os.Create(doas)
|
|
|
os.Chmod(doas, 0o755)
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
- defer os.RemoveAll(path)
|
|
|
-
|
|
|
config := DefaultConfig()
|
|
|
config.SudoLoop = true
|
|
|
config.SudoFlags = "-v"
|
|
@@ -168,16 +158,13 @@ func TestConfiguration_setPrivilegeElevator_no_path(t *testing.T) {
|
|
|
func TestConfiguration_setPrivilegeElevator_doas(t *testing.T) {
|
|
|
oldPath := os.Getenv("PATH")
|
|
|
|
|
|
- path, err := os.MkdirTemp("", "yay-test")
|
|
|
- assert.NoError(t, err)
|
|
|
+ path := t.TempDir()
|
|
|
|
|
|
doas := filepath.Join(path, "doas")
|
|
|
- _, err = os.Create(doas)
|
|
|
+ _, err := os.Create(doas)
|
|
|
os.Chmod(doas, 0o755)
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
- defer os.RemoveAll(path)
|
|
|
-
|
|
|
config := DefaultConfig()
|
|
|
config.SudoLoop = true
|
|
|
config.SudoFlags = "-v"
|
|
@@ -198,16 +185,13 @@ func TestConfiguration_setPrivilegeElevator_doas(t *testing.T) {
|
|
|
func TestConfiguration_setPrivilegeElevator_custom_script(t *testing.T) {
|
|
|
oldPath := os.Getenv("PATH")
|
|
|
|
|
|
- path, err := os.MkdirTemp("", "yay-test")
|
|
|
- assert.NoError(t, err)
|
|
|
+ path := t.TempDir()
|
|
|
|
|
|
wrapper := filepath.Join(path, "custom-wrapper")
|
|
|
- _, err = os.Create(wrapper)
|
|
|
+ _, err := os.Create(wrapper)
|
|
|
os.Chmod(wrapper, 0o755)
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
- defer os.RemoveAll(path)
|
|
|
-
|
|
|
config := DefaultConfig()
|
|
|
config.SudoLoop = true
|
|
|
config.SudoBin = wrapper
|
|
@@ -230,11 +214,10 @@ func TestConfiguration_setPrivilegeElevator_custom_script(t *testing.T) {
|
|
|
func TestConfiguration_setPrivilegeElevator_pacman_auth_doas(t *testing.T) {
|
|
|
oldPath := os.Getenv("PATH")
|
|
|
|
|
|
- path, err := os.MkdirTemp("", "yay-test")
|
|
|
- require.NoError(t, err)
|
|
|
+ path := t.TempDir()
|
|
|
|
|
|
doas := filepath.Join(path, "doas")
|
|
|
- _, err = os.Create(doas)
|
|
|
+ _, err := os.Create(doas)
|
|
|
os.Chmod(doas, 0o755)
|
|
|
require.NoError(t, err)
|
|
|
|
|
@@ -243,8 +226,6 @@ func TestConfiguration_setPrivilegeElevator_pacman_auth_doas(t *testing.T) {
|
|
|
os.Chmod(sudo, 0o755)
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
- defer os.RemoveAll(path)
|
|
|
-
|
|
|
config := DefaultConfig()
|
|
|
config.SudoBin = "sudo"
|
|
|
config.SudoLoop = true
|
|
@@ -267,11 +248,10 @@ func TestConfiguration_setPrivilegeElevator_pacman_auth_doas(t *testing.T) {
|
|
|
func TestConfiguration_setPrivilegeElevator_pacman_auth_sudo(t *testing.T) {
|
|
|
oldPath := os.Getenv("PATH")
|
|
|
|
|
|
- path, err := os.MkdirTemp("", "yay-test")
|
|
|
- require.NoError(t, err)
|
|
|
+ path := t.TempDir()
|
|
|
|
|
|
doas := filepath.Join(path, "doas")
|
|
|
- _, err = os.Create(doas)
|
|
|
+ _, err := os.Create(doas)
|
|
|
os.Chmod(doas, 0o755)
|
|
|
require.NoError(t, err)
|
|
|
|
|
@@ -280,8 +260,6 @@ func TestConfiguration_setPrivilegeElevator_pacman_auth_sudo(t *testing.T) {
|
|
|
os.Chmod(sudo, 0o755)
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
- defer os.RemoveAll(path)
|
|
|
-
|
|
|
config := DefaultConfig()
|
|
|
config.SudoBin = "doas"
|
|
|
config.SudoLoop = true
|