mirror of
https://github.com/neovim/neovim.git
synced 2026-02-18 17:38:32 +00:00
Define a CMake target for every subdirectory of test/functional that contains functional tests, and a functionaltest_parallel target that depends on all those targets, allowing multiple test runners to run in parallel. On CI, use at most 2 parallel test runners, as using more may increase system load and make tests unstable.
87 lines
3.2 KiB
Lua
87 lines
3.2 KiB
Lua
local t = require('test.testutil')
|
|
local n = require('test.functional.testnvim')()
|
|
|
|
local eq = t.eq
|
|
local clear = n.clear
|
|
local command = n.command
|
|
local exec_capture = n.exec_capture
|
|
local matches = t.matches
|
|
local pathsep = n.get_pathsep()
|
|
local is_os = t.is_os
|
|
local fn = n.fn
|
|
|
|
describe(':trust', function()
|
|
local xstate = 'Xstate_ex_trust'
|
|
local test_file = 'Xtest_functional_ex_cmds_trust'
|
|
|
|
before_each(function()
|
|
n.mkdir_p(xstate .. pathsep .. (is_os('win') and 'nvim-data' or 'nvim'))
|
|
t.write_file(test_file, 'test')
|
|
clear { env = { XDG_STATE_HOME = xstate } }
|
|
end)
|
|
|
|
after_each(function()
|
|
os.remove(test_file)
|
|
n.rmdir(xstate)
|
|
end)
|
|
|
|
--- @param s string
|
|
local function fmt(s)
|
|
return s:format(test_file)
|
|
end
|
|
|
|
it('is not executed when inside false condition', function()
|
|
command(fmt('edit %s'))
|
|
eq('', exec_capture('if 0 | trust | endif'))
|
|
eq(nil, vim.uv.fs_stat(fn.stdpath('state') .. pathsep .. 'trust'))
|
|
end)
|
|
|
|
it('trust then deny then remove a file using current buffer', function()
|
|
local cwd = fn.getcwd()
|
|
local hash = fn.sha256(assert(t.read_file(test_file)))
|
|
|
|
command(fmt('edit %s'))
|
|
matches(fmt('^Allowed in trust database%%: ".*%s"$'), exec_capture('trust'))
|
|
local trust = t.read_file(fn.stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('%s %s', hash, cwd .. pathsep .. test_file), vim.trim(trust))
|
|
|
|
matches(fmt('^Denied in trust database%%: ".*%s"$'), exec_capture('trust ++deny'))
|
|
trust = t.read_file(fn.stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('! %s', cwd .. pathsep .. test_file), vim.trim(trust))
|
|
|
|
matches(fmt('^Removed from trust database%%: ".*%s"$'), exec_capture('trust ++remove'))
|
|
trust = t.read_file(fn.stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format(''), vim.trim(trust))
|
|
end)
|
|
|
|
it('deny then trust then remove a file using current buffer', function()
|
|
local cwd = fn.getcwd()
|
|
local hash = fn.sha256(assert(t.read_file(test_file)))
|
|
|
|
command(fmt('edit %s'))
|
|
matches(fmt('^Denied in trust database%%: ".*%s"$'), exec_capture('trust ++deny'))
|
|
local trust = t.read_file(fn.stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('! %s', cwd .. pathsep .. test_file), vim.trim(trust))
|
|
|
|
matches(fmt('^Allowed in trust database%%: ".*%s"$'), exec_capture('trust'))
|
|
trust = t.read_file(fn.stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('%s %s', hash, cwd .. pathsep .. test_file), vim.trim(trust))
|
|
|
|
matches(fmt('^Removed from trust database%%: ".*%s"$'), exec_capture('trust ++remove'))
|
|
trust = t.read_file(fn.stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format(''), vim.trim(trust))
|
|
end)
|
|
|
|
it('deny then remove a file using file path', function()
|
|
local cwd = fn.getcwd()
|
|
|
|
matches(fmt('^Denied in trust database%%: ".*%s"$'), exec_capture(fmt('trust ++deny %s')))
|
|
local trust = t.read_file(fn.stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format('! %s', cwd .. pathsep .. test_file), vim.trim(trust))
|
|
|
|
matches(fmt('^Removed from trust database%%: ".*%s"$'), exec_capture(fmt('trust ++remove %s')))
|
|
trust = t.read_file(fn.stdpath('state') .. pathsep .. 'trust')
|
|
eq(string.format(''), vim.trim(trust))
|
|
end)
|
|
end)
|