|  | 
|  | 1 | +package source_test | 
|  | 2 | + | 
|  | 3 | +import ( | 
|  | 4 | +	"io/fs" | 
|  | 5 | +	"os" | 
|  | 6 | +	"path/filepath" | 
|  | 7 | +	"testing" | 
|  | 8 | + | 
|  | 9 | +	"github.com/stretchr/testify/require" | 
|  | 10 | + | 
|  | 11 | +	"github.com/operator-framework/operator-controller/internal/rukpak/source" | 
|  | 12 | +) | 
|  | 13 | + | 
|  | 14 | +func TestSetReadOnlyRecursive(t *testing.T) { | 
|  | 15 | +	tempDir := t.TempDir() | 
|  | 16 | +	targetFilePath := filepath.Join(tempDir, "target") | 
|  | 17 | +	nestedDir := filepath.Join(tempDir, "nested") | 
|  | 18 | +	filePath := filepath.Join(nestedDir, "testfile") | 
|  | 19 | +	symlinkPath := filepath.Join(nestedDir, "symlink") | 
|  | 20 | + | 
|  | 21 | +	t.Log("Create symlink target file outside directory with its own permissions") | 
|  | 22 | +	// nolint:gosec | 
|  | 23 | +	require.NoError(t, os.WriteFile(targetFilePath, []byte("something"), 0644)) | 
|  | 24 | + | 
|  | 25 | +	t.Log("Create a nested directory structure that contains a file and sym. link") | 
|  | 26 | +	require.NoError(t, os.Mkdir(nestedDir, source.OwnerWritableDirMode)) | 
|  | 27 | +	require.NoError(t, os.WriteFile(filePath, []byte("test"), source.OwnerWritableFileMode)) | 
|  | 28 | +	require.NoError(t, os.Symlink(targetFilePath, symlinkPath)) | 
|  | 29 | + | 
|  | 30 | +	t.Log("Set directory structure as read-only") | 
|  | 31 | +	require.NoError(t, source.SetReadOnlyRecursive(nestedDir)) | 
|  | 32 | + | 
|  | 33 | +	t.Log("Check file permissions") | 
|  | 34 | +	stat, err := os.Stat(filePath) | 
|  | 35 | +	require.NoError(t, err) | 
|  | 36 | +	require.Equal(t, source.OwnerReadOnlyFileMode, stat.Mode().Perm()) | 
|  | 37 | + | 
|  | 38 | +	t.Log("Check directory permissions") | 
|  | 39 | +	nestedStat, err := os.Stat(nestedDir) | 
|  | 40 | +	require.NoError(t, err) | 
|  | 41 | +	require.Equal(t, source.OwnerReadOnlyDirMode, nestedStat.Mode().Perm()) | 
|  | 42 | + | 
|  | 43 | +	t.Log("Check symlink target file permissions - should not be affected") | 
|  | 44 | +	stat, err = os.Stat(targetFilePath) | 
|  | 45 | +	require.NoError(t, err) | 
|  | 46 | +	require.Equal(t, fs.FileMode(0644), stat.Mode().Perm()) | 
|  | 47 | + | 
|  | 48 | +	t.Log("Make directory writable to enable test clean-up") | 
|  | 49 | +	require.NoError(t, source.SetWritableRecursive(tempDir)) | 
|  | 50 | +} | 
|  | 51 | + | 
|  | 52 | +func TestSetWritableRecursive(t *testing.T) { | 
|  | 53 | +	tempDir := t.TempDir() | 
|  | 54 | +	targetFilePath := filepath.Join(tempDir, "target") | 
|  | 55 | +	nestedDir := filepath.Join(tempDir, "nested") | 
|  | 56 | +	filePath := filepath.Join(nestedDir, "testfile") | 
|  | 57 | +	symlinkPath := filepath.Join(nestedDir, "symlink") | 
|  | 58 | + | 
|  | 59 | +	t.Log("Create symlink target file outside directory with its own permissions") | 
|  | 60 | +	// nolint:gosec | 
|  | 61 | +	require.NoError(t, os.WriteFile(targetFilePath, []byte("something"), 0644)) | 
|  | 62 | + | 
|  | 63 | +	t.Log("Create a nested directory (writable) structure that contains a file (read-only) and sym. link") | 
|  | 64 | +	require.NoError(t, os.Mkdir(nestedDir, source.OwnerWritableDirMode)) | 
|  | 65 | +	require.NoError(t, os.WriteFile(filePath, []byte("test"), source.OwnerReadOnlyFileMode)) | 
|  | 66 | +	require.NoError(t, os.Symlink(targetFilePath, symlinkPath)) | 
|  | 67 | + | 
|  | 68 | +	t.Log("Make directory read-only") | 
|  | 69 | +	require.NoError(t, os.Chmod(nestedDir, source.OwnerReadOnlyDirMode)) | 
|  | 70 | + | 
|  | 71 | +	t.Log("Call SetWritableRecursive") | 
|  | 72 | +	require.NoError(t, source.SetWritableRecursive(nestedDir)) | 
|  | 73 | + | 
|  | 74 | +	t.Log("Check file is writable") | 
|  | 75 | +	stat, err := os.Stat(filePath) | 
|  | 76 | +	require.NoError(t, err) | 
|  | 77 | +	require.Equal(t, source.OwnerWritableFileMode, stat.Mode().Perm()) | 
|  | 78 | + | 
|  | 79 | +	t.Log("Check directory is writable") | 
|  | 80 | +	nestedStat, err := os.Stat(nestedDir) | 
|  | 81 | +	require.NoError(t, err) | 
|  | 82 | +	require.Equal(t, source.OwnerWritableDirMode, nestedStat.Mode().Perm()) | 
|  | 83 | + | 
|  | 84 | +	t.Log("Check symlink target file permissions - should not be affected") | 
|  | 85 | +	stat, err = os.Stat(targetFilePath) | 
|  | 86 | +	require.NoError(t, err) | 
|  | 87 | +	require.Equal(t, fs.FileMode(0644), stat.Mode().Perm()) | 
|  | 88 | +} | 
|  | 89 | + | 
|  | 90 | +func TestDeleteReadOnlyRecursive(t *testing.T) { | 
|  | 91 | +	tempDir := t.TempDir() | 
|  | 92 | +	nestedDir := filepath.Join(tempDir, "nested") | 
|  | 93 | +	filePath := filepath.Join(nestedDir, "testfile") | 
|  | 94 | + | 
|  | 95 | +	t.Log("Create a nested read-only directory structure that contains a file and sym. link") | 
|  | 96 | +	require.NoError(t, os.Mkdir(nestedDir, source.OwnerWritableDirMode)) | 
|  | 97 | +	require.NoError(t, os.WriteFile(filePath, []byte("test"), source.OwnerReadOnlyFileMode)) | 
|  | 98 | +	require.NoError(t, os.Chmod(nestedDir, source.OwnerReadOnlyDirMode)) | 
|  | 99 | + | 
|  | 100 | +	t.Log("Set directory structure as read-only") | 
|  | 101 | +	require.NoError(t, source.DeleteReadOnlyRecursive(nestedDir)) | 
|  | 102 | + | 
|  | 103 | +	t.Log("Ensure directory was deleted") | 
|  | 104 | +	_, err := os.Stat(nestedDir) | 
|  | 105 | +	require.ErrorIs(t, err, os.ErrNotExist) | 
|  | 106 | +} | 
|  | 107 | + | 
|  | 108 | +func TestIsImageUnpacked(t *testing.T) { | 
|  | 109 | +	tempDir := t.TempDir() | 
|  | 110 | +	unpackPath := filepath.Join(tempDir, "myimage") | 
|  | 111 | + | 
|  | 112 | +	t.Log("Test case: unpack path does not exist") | 
|  | 113 | +	unpacked, modTime, err := source.IsImageUnpacked(unpackPath) | 
|  | 114 | +	require.NoError(t, err) | 
|  | 115 | +	require.False(t, unpacked) | 
|  | 116 | +	require.True(t, modTime.IsZero()) | 
|  | 117 | + | 
|  | 118 | +	t.Log("Test case: unpack path points to file") | 
|  | 119 | +	require.NoError(t, os.WriteFile(unpackPath, []byte("test"), source.OwnerWritableFileMode)) | 
|  | 120 | + | 
|  | 121 | +	unpacked, modTime, err = source.IsImageUnpacked(filepath.Join(tempDir, "myimage")) | 
|  | 122 | +	require.NoError(t, err) | 
|  | 123 | +	require.False(t, unpacked) | 
|  | 124 | +	require.True(t, modTime.IsZero()) | 
|  | 125 | + | 
|  | 126 | +	t.Log("Expect file to be deleted") | 
|  | 127 | +	_, err = os.Stat(unpackPath) | 
|  | 128 | +	require.ErrorIs(t, err, os.ErrNotExist) | 
|  | 129 | + | 
|  | 130 | +	t.Log("Test case: unpack path points to directory (happy path)") | 
|  | 131 | +	require.NoError(t, os.Mkdir(unpackPath, source.OwnerWritableDirMode)) | 
|  | 132 | + | 
|  | 133 | +	unpacked, modTime, err = source.IsImageUnpacked(unpackPath) | 
|  | 134 | +	require.NoError(t, err) | 
|  | 135 | +	require.True(t, unpacked) | 
|  | 136 | +	require.False(t, modTime.IsZero()) | 
|  | 137 | + | 
|  | 138 | +	t.Log("Expect unpack time to match directory mod time") | 
|  | 139 | +	stat, err := os.Stat(unpackPath) | 
|  | 140 | +	require.NoError(t, err) | 
|  | 141 | +	require.Equal(t, stat.ModTime(), modTime) | 
|  | 142 | +} | 
0 commit comments