summaryrefslogtreecommitdiff
path: root/test/test_sandbox_execution.vader
blob: cf994ce874d1b7acee1bf09423951e3b3aa37831 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
Before:
  function! TestCallback(buffer, output)
    return [
    \ {
    \   'lnum': 1,
    \   'bufnr': 1,
    \   'vcol': 0,
    \   'linter_name': 'testlinter',
    \   'nr': -1,
    \   'type': 'E',
    \   'col': 1,
    \   'text': 'Test Error',
    \ },
    \]
  endfunction

  call ale#linter#Define('foobar', {
  \ 'name': 'testlinter',
  \ 'callback': 'TestCallback',
  \ 'executable': 'echo',
  \ 'command': 'echo',
  \})

  let g:ale_buffer_info = {}

After:
  unlet! b:in_sandbox
  unlet! b:result

  delfunction TestCallback
  call ale#linter#Reset()
  let g:ale_buffer_info = {}


Given foobar (Some imaginary filetype):
  foo
  bar
  baz

Execute(ale#util#InSandbox should return 1 when in a sandbox):
  sandbox let b:in_sandbox = ale#util#InSandbox()

  Assert b:in_sandbox, 'ale#util#InSandbox() returned 0 for a sandbox command'

Execute(ALE shouldn't blow up when run from a sandbox):
  AssertEqual 'foobar', &filetype

  sandbox call ale#Queue(0)
  sandbox call ale#Queue(1)

Execute(ALE shouldn't blow up if file cleanup happens in a sandbox):
  " Make a call to an engine function first, so the function will be defined
  " before we make the sandbox call.
  "
  " You are not allowed to define any functions in the sandbox.
  call ale#engine#InitBufferInfo(3)

  let g:ale_buffer_info[3] = {
  \ 'temporary_file_list': ['/tmp/foo'],
  \ 'temporary_directory_list': ['/tmp/bar'],
  \}
  sandbox call ale#command#RemoveManagedFiles(3)

  AssertEqual ['/tmp/foo'], g:ale_buffer_info[3].temporary_file_list
  AssertEqual ['/tmp/bar'], g:ale_buffer_info[3].temporary_directory_list

Execute(You shouldn't be able to define linters from the sandbox):
  call ale#linter#Reset()
  call ale#linter#PreventLoading('testft')

  AssertThrows sandbox call ale#linter#Define('testft', {
  \ 'name': 'testlinter',
  \ 'output_stream': 'stdout',
  \ 'executable': 'testlinter',
  \ 'command': 'testlinter',
  \ 'callback': 'testCB',
  \})
  AssertEqual 'Vim(let):E48: Not allowed in sandbox', g:vader_exception
  AssertEqual [], ale#linter#GetAll(['testft'])

Execute(You shouldn't be able to register fixers from the sandbox):
  call ale#fix#registry#Clear()
  AssertThrows sandbox call ale#fix#registry#Add('prettier', '', ['javascript'], 'prettier')
  AssertEqual 'Vim(let):E48: Not allowed in sandbox', g:vader_exception
  AssertEqual [], ale#fix#registry#CompleteFixers('', 'ALEFix ', 7)

Execute(You shouldn't be able to get linters from the sandbox, to prevent tampering):
  AssertThrows sandbox call ale#linter#GetLintersLoaded()
  AssertEqual 'Vim(let):E48: Not allowed in sandbox', g:vader_exception

  call ale#linter#Reset()

  sandbox let b:result = ale#linter#GetAll(['testft'])

  AssertEqual 0, len(b:result)

  let b:result = ale#linter#GetAll(['testft'])

  AssertEqual 1, len(b:result)

  sandbox let b:result = ale#linter#GetAll(['testft'])

  AssertEqual 0, len(b:result)