summaryrefslogtreecommitdiff
path: root/uvim/src/testdir/test_restricted.mnv
blob: 458ce1d405abb3b98f1c49e28eebe34d1a25d805 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
" Test for "rmnv" or "mnv -Z"

"if has('win32') && has('gui')
"  " Win32 GUI shows a dialog instead of displaying the error in the last line.
"  finish
"endif

func Test_restricted_mode()
  let lines =<< trim END
    if has('lua')
      call assert_fails('lua print("Hello, MNV!")', 'E981:')
      call assert_fails('luado return "hello"', 'E981:')
      call assert_fails('luafile somefile', 'E981:')
      call assert_fails('call luaeval("expression")', 'E145:')
    endif

    if has('mzscheme')
      call assert_fails('mzscheme statement', 'E981:')
      call assert_fails('mzfile somefile', 'E981:')
      call assert_fails('call mzeval("expression")', 'E145:')
    endif

    if has('perl')
      " TODO: how to make Safe mode fail?
      " call assert_fails('perl system("ls")', 'E981:')
      " call assert_fails('perldo system("hello")', 'E981:')
      " call assert_fails('perlfile somefile', 'E981:')
      " call assert_fails('call perleval("system(\"ls\")")', 'E145:')
    endif

    if has('python')
      call assert_fails('python print "hello"', 'E981:')
      call assert_fails('pydo return "hello"', 'E981:')
      call assert_fails('pyfile somefile', 'E981:')
      call assert_fails('call pyeval("expression")', 'E145:')
    endif

    if has('python3')
      call assert_fails('py3 print "hello"', 'E981:')
      call assert_fails('py3do return "hello"', 'E981:')
      call assert_fails('py3file somefile', 'E981:')
      call assert_fails('call py3eval("expression")', 'E145:')
    endif

    if has('ruby')
      call assert_fails('ruby print "Hello"', 'E981:')
      call assert_fails('rubydo print "Hello"', 'E981:')
      call assert_fails('rubyfile somefile', 'E981:')
    endif

    if has('tcl')
      call assert_fails('tcl puts "Hello"', 'E981:')
      call assert_fails('tcldo puts "Hello"', 'E981:')
      call assert_fails('tclfile somefile', 'E981:')
    endif

    if has('clientserver')
      call assert_fails('let s=remote_peek(10)', 'E145:')
      call assert_fails('let s=remote_read(10)', 'E145:')
      call assert_fails('let s=remote_send("mnv", "abc")', 'E145:')
      call assert_fails('let s=server2client(10, "abc")', 'E145:')
    endif

    if has('terminal')
      call assert_fails('terminal', 'E145:')
      call assert_fails('call term_start("mnv")', 'E145:')
      call assert_fails('call term_dumpwrite(1, "Xfile")', 'E145:')
    endif

    if has('channel')
      call assert_fails("call ch_logfile('Xlog')", 'E145:')
      call assert_fails("call ch_open('localhost:8765')", 'E145:')
    endif

    if has('job')
      call assert_fails("call job_start('mnv')", 'E145:')
    endif

    if has('unix') && has('libcall')
      call assert_fails("echo libcall('libc.so', 'getenv', 'HOME')", 'E145:')
    endif
    call assert_fails("call rename('a', 'b')", 'E145:')
    call assert_fails("call delete('Xfile')", 'E145:')
    call assert_fails("call mkdir('Xdir')", 'E145:')
    call assert_fails('!ls', 'E145:')
    call assert_fails('shell', 'E145:')
    call assert_fails('stop', 'E145:')
    call assert_fails('exe "normal \<C-Z>"', 'E145:')
    set insertmode
    call assert_fails('call feedkeys("\<C-Z>", "xt")', 'E145:')
    set insertmode&
    call assert_fails('suspend', 'E145:')
    call assert_fails('call system("ls")', 'E145:')
    call assert_fails('call systemlist("ls")', 'E145:')
    if has('unix')
      call assert_fails('cd `pwd`', 'E145:')
    endif

    call writefile(v:errors, 'Xresult')
    qa!
  END
  call writefile(lines, 'Xrestricted', 'D')
  if RunMNV([], [], '-Z --clean -S Xrestricted')
    call assert_equal([], readfile('Xresult'))
  endif
  call delete('Xresult')
  if has('unix') && RunMNVPiped([], [], '--clean -S Xrestricted', 'SHELL=/bin/false ')
    call assert_equal([], readfile('Xresult'))
  endif
  call delete('Xresult')
  if has('unix') && RunMNVPiped([], [], '--clean -S Xrestricted', 'SHELL=/sbin/nologin')
    call assert_equal([], readfile('Xresult'))
  endif

  call delete('Xresult')
endfunc

" Test that external diff is blocked in restricted mode.
" Using :diffupdate with 'diffopt' excluding "internal" would call an external
" diff program via call_shell(), which must be blocked.
func Test_restricted_diff()
  let lines =<< trim END
    set diffopt=filler
    call writefile(['line1', 'line2'], 'Xrfile1', 'D')
    call writefile(['line1', 'line3'], 'Xrfile2', 'D')
    edit Xrfile1
    diffthis
    split Xrfile2
    diffthis
    call assert_fails('diffupdate', 'E145:')
    call writefile(v:errors, 'Xresult')
    qa!
  END
  call writefile(lines, 'Xrestricteddiff', 'D')
  if RunMNV([], [], '-Z --clean -S Xrestricteddiff')
    call assert_equal([], readfile('Xresult'))
  endif
  call delete('Xresult')
endfunc

func Test_restricted_env()
  let lines =<< trim END
      mnv9script
      def SetEnv()
          $ENV = '123'
      enddef
      var result = 'okay'
      try
        SetEnv()
      catch /^MNV\%((\S\+)\)\=:E145:/
        result = 'not-allowed'
      endtry
      writefile([result], 'XResult_env')
      qa!
  END
  call writefile(lines, 'Xrestrictedmnv9', 'D')
  if RunMNV([], [], '-Z --clean -S Xrestrictedmnv9')
    call assert_equal(['not-allowed'], readfile('XResult_env'))
  endif
  call delete('XResult_env')

  let lines =<< trim END
      try
        let $ENV_TEST = 'val'
        let result = 'okay'
      catch /^MNV\%((\S\+)\)\=:E145:/
        let result = 'not-allowed'
      endtry
      call writefile([result], 'XResult_env')
      qa!
  END
  call writefile(lines, 'Xrestricted_legacy', 'D')
  if RunMNV([], [], '-Z --clean -S Xrestricted_legacy')
    call assert_equal(['not-allowed'], readfile('XResult_env'))
  endif
  call delete('XResult_env')
endfunc

func Test_restricted_grep()
  CheckScreendump

  let lines =<< trim END
    let result = 'okay'
    try
      " Try to use grep to execute an external command
      grep 'MNV' ./*.mnv
    catch /^MNV\%((\S\+)\)\=:E145:/
      let result = 'grep-blocked'
    endtry
    call writefile([result], 'XResult_grep')
    qa!
  END

  call writefile(lines, 'Xrestricted_grep', 'D')
  if RunMNV([], [], '-Z --clean -S Xrestricted_grep')
    call assert_equal(['grep-blocked'], readfile('XResult_grep'))
  endif
  call delete('XResult_grep')
endfunc

func Test_restricted_cscope()
  CheckFeature cscope

  " File does not exist, but shouldn't matter, it must be disallowed
  let lines =<< trim END
    let result = 'okay'
    try
      cscope add Xfoobar.out
    catch /^MNV\%((\S\+)\)\=:E145:/
      let result = 'blocked'
    endtry
    call writefile([result], 'XResult_cscope')
    qa!
  END

  call writefile(lines, 'Xrestricted_cscope', 'D')
  if RunMNV([], [], '-Z --clean -S Xrestricted_cscope')
    call assert_equal(['blocked'], readfile('XResult_cscope'))
  endif
  call delete('XResult_cscope')
endfunc

" mnv: shiftwidth=2 sts=2 expandtab