|
|
/*
|
|
|
* Copyright (C) 2013 The Android Open Source Project
|
|
|
*
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
* You may obtain a copy of the License at
|
|
|
*
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
*
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
* See the License for the specific language governing permissions and
|
|
|
* limitations under the License.
|
|
|
*/
|
|
|
|
|
|
#include "android-base/file.h"
|
|
|
|
|
|
#include "android-base/utf8.h"
|
|
|
|
|
|
#include <gtest/gtest.h>
|
|
|
|
|
|
#include <errno.h>
|
|
|
#include <fcntl.h>
|
|
|
#include <unistd.h>
|
|
|
#include <wchar.h>
|
|
|
|
|
|
#include <string>
|
|
|
|
|
|
#if !defined(_WIN32)
|
|
|
#include <pwd.h>
|
|
|
#else
|
|
|
#include <windows.h>
|
|
|
#endif
|
|
|
|
|
|
#include "android-base/logging.h" // and must be after windows.h for ERROR
|
|
|
|
|
|
TEST(file, ReadFileToString_ENOENT) {
|
|
|
std::string s("hello");
|
|
|
errno = 0;
|
|
|
ASSERT_FALSE(android::base::ReadFileToString("/proc/does-not-exist", &s));
|
|
|
EXPECT_EQ(ENOENT, errno);
|
|
|
EXPECT_EQ("", s); // s was cleared.
|
|
|
}
|
|
|
|
|
|
TEST(file, ReadFileToString_WriteStringToFile) {
|
|
|
TemporaryFile tf;
|
|
|
ASSERT_NE(tf.fd, -1) << tf.path;
|
|
|
ASSERT_TRUE(android::base::WriteStringToFile("abc", tf.path))
|
|
|
<< strerror(errno);
|
|
|
std::string s;
|
|
|
ASSERT_TRUE(android::base::ReadFileToString(tf.path, &s))
|
|
|
<< strerror(errno);
|
|
|
EXPECT_EQ("abc", s);
|
|
|
}
|
|
|
|
|
|
// symlinks require elevated privileges on Windows.
|
|
|
#if !defined(_WIN32)
|
|
|
TEST(file, ReadFileToString_WriteStringToFile_symlink) {
|
|
|
TemporaryFile target, link;
|
|
|
ASSERT_EQ(0, unlink(link.path));
|
|
|
ASSERT_EQ(0, symlink(target.path, link.path));
|
|
|
ASSERT_FALSE(android::base::WriteStringToFile("foo", link.path, false));
|
|
|
ASSERT_EQ(ELOOP, errno);
|
|
|
ASSERT_TRUE(android::base::WriteStringToFile("foo", link.path, true));
|
|
|
|
|
|
std::string s;
|
|
|
ASSERT_FALSE(android::base::ReadFileToString(link.path, &s));
|
|
|
ASSERT_EQ(ELOOP, errno);
|
|
|
ASSERT_TRUE(android::base::ReadFileToString(link.path, &s, true));
|
|
|
ASSERT_EQ("foo", s);
|
|
|
}
|
|
|
#endif
|
|
|
|
|
|
// WriteStringToFile2 is explicitly for setting Unix permissions, which make no
|
|
|
// sense on Windows.
|
|
|
#if !defined(_WIN32)
|
|
|
TEST(file, WriteStringToFile2) {
|
|
|
TemporaryFile tf;
|
|
|
ASSERT_NE(tf.fd, -1) << tf.path;
|
|
|
ASSERT_TRUE(android::base::WriteStringToFile("abc", tf.path, 0660,
|
|
|
getuid(), getgid()))
|
|
|
<< strerror(errno);
|
|
|
struct stat sb;
|
|
|
ASSERT_EQ(0, stat(tf.path, &sb));
|
|
|
ASSERT_EQ(0660U, static_cast<unsigned int>(sb.st_mode & ~S_IFMT));
|
|
|
ASSERT_EQ(getuid(), sb.st_uid);
|
|
|
ASSERT_EQ(getgid(), sb.st_gid);
|
|
|
std::string s;
|
|
|
ASSERT_TRUE(android::base::ReadFileToString(tf.path, &s))
|
|
|
<< strerror(errno);
|
|
|
EXPECT_EQ("abc", s);
|
|
|
}
|
|
|
#endif
|
|
|
|
|
|
#if defined(_WIN32)
|
|
|
TEST(file, NonUnicodeCharsWindows) {
|
|
|
constexpr auto kMaxEnvVariableValueSize = 32767;
|
|
|
std::wstring old_tmp;
|
|
|
old_tmp.resize(kMaxEnvVariableValueSize);
|
|
|
old_tmp.resize(GetEnvironmentVariableW(L"TMP", old_tmp.data(), old_tmp.size()));
|
|
|
if (old_tmp.empty()) {
|
|
|
// Can't continue with empty TMP folder.
|
|
|
return;
|
|
|
}
|
|
|
|
|
|
std::wstring new_tmp = old_tmp;
|
|
|
if (new_tmp.back() != L'\\') {
|
|
|
new_tmp.push_back(L'\\');
|
|
|
}
|
|
|
|
|
|
{
|
|
|
auto path(new_tmp + L"锦绣成都\\");
|
|
|
_wmkdir(path.c_str());
|
|
|
ASSERT_TRUE(SetEnvironmentVariableW(L"TMP", path.c_str()));
|
|
|
|
|
|
TemporaryFile tf;
|
|
|
ASSERT_NE(tf.fd, -1) << tf.path;
|
|
|
ASSERT_TRUE(android::base::WriteStringToFd("abc", tf.fd));
|
|
|
|
|
|
ASSERT_EQ(0, lseek(tf.fd, 0, SEEK_SET)) << strerror(errno);
|
|
|
|
|
|
std::string s;
|
|
|
ASSERT_TRUE(android::base::ReadFdToString(tf.fd, &s)) << strerror(errno);
|
|
|
EXPECT_EQ("abc", s);
|
|
|
}
|
|
|
{
|
|
|
auto path(new_tmp + L"директория с длинным именем\\");
|
|
|
_wmkdir(path.c_str());
|
|
|
ASSERT_TRUE(SetEnvironmentVariableW(L"TMP", path.c_str()));
|
|
|
|
|
|
TemporaryFile tf;
|
|
|
ASSERT_NE(tf.fd, -1) << tf.path;
|
|
|
ASSERT_TRUE(android::base::WriteStringToFd("abc", tf.fd));
|
|
|
|
|
|
ASSERT_EQ(0, lseek(tf.fd, 0, SEEK_SET)) << strerror(errno);
|
|
|
|
|
|
std::string s;
|
|
|
ASSERT_TRUE(android::base::ReadFdToString(tf.fd, &s)) << strerror(errno);
|
|
|
EXPECT_EQ("abc", s);
|
|
|
}
|
|
|
{
|
|
|
auto path(new_tmp + L"äüöß weiß\\");
|
|
|
_wmkdir(path.c_str());
|
|
|
ASSERT_TRUE(SetEnvironmentVariableW(L"TMP", path.c_str()));
|
|
|
|
|
|
TemporaryFile tf;
|
|
|
ASSERT_NE(tf.fd, -1) << tf.path;
|
|
|
ASSERT_TRUE(android::base::WriteStringToFd("abc", tf.fd));
|
|
|
|
|
|
ASSERT_EQ(0, lseek(tf.fd, 0, SEEK_SET)) << strerror(errno);
|
|
|
|
|
|
std::string s;
|
|
|
ASSERT_TRUE(android::base::ReadFdToString(tf.fd, &s)) << strerror(errno);
|
|
|
EXPECT_EQ("abc", s);
|
|
|
}
|
|
|
|
|
|
SetEnvironmentVariableW(L"TMP", old_tmp.c_str());
|
|
|
}
|
|
|
|
|
|
TEST(file, RootDirectoryWindows) {
|
|
|
constexpr auto kMaxEnvVariableValueSize = 32767;
|
|
|
std::wstring old_tmp;
|
|
|
bool tmp_is_empty = false;
|
|
|
old_tmp.resize(kMaxEnvVariableValueSize);
|
|
|
old_tmp.resize(GetEnvironmentVariableW(L"TMP", old_tmp.data(), old_tmp.size()));
|
|
|
if (old_tmp.empty()) {
|
|
|
tmp_is_empty = (GetLastError() == ERROR_ENVVAR_NOT_FOUND);
|
|
|
}
|
|
|
SetEnvironmentVariableW(L"TMP", L"C:");
|
|
|
|
|
|
TemporaryFile tf;
|
|
|
ASSERT_NE(tf.fd, -1) << tf.path;
|
|
|
|
|
|
SetEnvironmentVariableW(L"TMP", tmp_is_empty ? nullptr : old_tmp.c_str());
|
|
|
}
|
|
|
#endif
|
|
|
|
|
|
TEST(file, WriteStringToFd) {
|
|
|
TemporaryFile tf;
|
|
|
ASSERT_NE(tf.fd, -1) << tf.path;
|
|
|
ASSERT_TRUE(android::base::WriteStringToFd("abc", tf.fd));
|
|
|
|
|
|
ASSERT_EQ(0, lseek(tf.fd, 0, SEEK_SET)) << strerror(errno);
|
|
|
|
|
|
std::string s;
|
|
|
ASSERT_TRUE(android::base::ReadFdToString(tf.fd, &s)) << strerror(errno);
|
|
|
EXPECT_EQ("abc", s);
|
|
|
}
|
|
|
|
|
|
TEST(file, WriteFully) {
|
|
|
TemporaryFile tf;
|
|
|
ASSERT_NE(tf.fd, -1) << tf.path;
|
|
|
ASSERT_TRUE(android::base::WriteFully(tf.fd, "abc", 3));
|
|
|
|
|
|
ASSERT_EQ(0, lseek(tf.fd, 0, SEEK_SET)) << strerror(errno);
|
|
|
|
|
|
std::string s;
|
|
|
s.resize(3);
|
|
|
ASSERT_TRUE(android::base::ReadFully(tf.fd, &s[0], s.size()))
|
|
|
<< strerror(errno);
|
|
|
EXPECT_EQ("abc", s);
|
|
|
|
|
|
ASSERT_EQ(0, lseek(tf.fd, 0, SEEK_SET)) << strerror(errno);
|
|
|
|
|
|
s.resize(1024);
|
|
|
ASSERT_FALSE(android::base::ReadFully(tf.fd, &s[0], s.size()));
|
|
|
}
|
|
|
|
|
|
TEST(file, RemoveFileIfExists) {
|
|
|
TemporaryFile tf;
|
|
|
ASSERT_NE(tf.fd, -1) << tf.path;
|
|
|
close(tf.fd);
|
|
|
tf.fd = -1;
|
|
|
std::string err;
|
|
|
ASSERT_TRUE(android::base::RemoveFileIfExists(tf.path, &err)) << err;
|
|
|
ASSERT_TRUE(android::base::RemoveFileIfExists(tf.path));
|
|
|
TemporaryDir td;
|
|
|
ASSERT_FALSE(android::base::RemoveFileIfExists(td.path));
|
|
|
ASSERT_FALSE(android::base::RemoveFileIfExists(td.path, &err));
|
|
|
ASSERT_EQ("is not a regular file or symbolic link", err);
|
|
|
}
|
|
|
|
|
|
TEST(file, RemoveFileIfExists_ENOTDIR) {
|
|
|
TemporaryFile tf;
|
|
|
close(tf.fd);
|
|
|
tf.fd = -1;
|
|
|
std::string err{"xxx"};
|
|
|
ASSERT_TRUE(android::base::RemoveFileIfExists(std::string{tf.path} + "/abc", &err));
|
|
|
ASSERT_EQ("xxx", err);
|
|
|
}
|
|
|
|
|
|
#if !defined(_WIN32)
|
|
|
TEST(file, RemoveFileIfExists_EACCES) {
|
|
|
// EACCES -- one of the directories in the path has no search permission
|
|
|
// root can bypass permission restrictions, so drop root.
|
|
|
if (getuid() == 0) {
|
|
|
passwd* shell = getpwnam("shell");
|
|
|
setgid(shell->pw_gid);
|
|
|
setuid(shell->pw_uid);
|
|
|
}
|
|
|
|
|
|
TemporaryDir td;
|
|
|
TemporaryFile tf(td.path);
|
|
|
close(tf.fd);
|
|
|
tf.fd = -1;
|
|
|
std::string err{"xxx"};
|
|
|
// Remove dir's search permission.
|
|
|
ASSERT_TRUE(chmod(td.path, S_IRUSR | S_IWUSR) == 0);
|
|
|
ASSERT_FALSE(android::base::RemoveFileIfExists(tf.path, &err));
|
|
|
ASSERT_EQ("Permission denied", err);
|
|
|
// Set dir's search permission again.
|
|
|
ASSERT_TRUE(chmod(td.path, S_IRWXU) == 0);
|
|
|
ASSERT_TRUE(android::base::RemoveFileIfExists(tf.path, &err));
|
|
|
}
|
|
|
#endif
|
|
|
|
|
|
TEST(file, Readlink) {
|
|
|
#if !defined(_WIN32)
|
|
|
// Linux doesn't allow empty symbolic links.
|
|
|
std::string min("x");
|
|
|
// ext2 and ext4 both have PAGE_SIZE limits.
|
|
|
// If file encryption is enabled, there's extra overhead to store the
|
|
|
// size of the encrypted symlink target. There's also an off-by-one
|
|
|
// in current kernels (and marlin/sailfish where we're seeing this
|
|
|
// failure are still on 3.18, far from current). http://b/33306057.
|
|
|
std::string max(static_cast<size_t>(4096 - 2 - 1 - 1), 'x');
|
|
|
|
|
|
TemporaryDir td;
|
|
|
std::string min_path{std::string(td.path) + "/" + "min"};
|
|
|
std::string max_path{std::string(td.path) + "/" + "max"};
|
|
|
|
|
|
ASSERT_EQ(0, symlink(min.c_str(), min_path.c_str()));
|
|
|
ASSERT_EQ(0, symlink(max.c_str(), max_path.c_str()));
|
|
|
|
|
|
std::string result;
|
|
|
|
|
|
result = "wrong";
|
|
|
ASSERT_TRUE(android::base::Readlink(min_path, &result));
|
|
|
ASSERT_EQ(min, result);
|
|
|
|
|
|
result = "wrong";
|
|
|
ASSERT_TRUE(android::base::Readlink(max_path, &result));
|
|
|
ASSERT_EQ(max, result);
|
|
|
#endif
|
|
|
}
|
|
|
|
|
|
TEST(file, Realpath) {
|
|
|
#if !defined(_WIN32)
|
|
|
TemporaryDir td;
|
|
|
std::string basename = android::base::Basename(td.path);
|
|
|
std::string dir_name = android::base::Dirname(td.path);
|
|
|
std::string base_dir_name = android::base::Basename(dir_name);
|
|
|
|
|
|
{
|
|
|
std::string path = dir_name + "/../" + base_dir_name + "/" + basename;
|
|
|
std::string result;
|
|
|
ASSERT_TRUE(android::base::Realpath(path, &result));
|
|
|
ASSERT_EQ(td.path, result);
|
|
|
}
|
|
|
|
|
|
{
|
|
|
std::string path = std::string(td.path) + "/..";
|
|
|
std::string result;
|
|
|
ASSERT_TRUE(android::base::Realpath(path, &result));
|
|
|
ASSERT_EQ(dir_name, result);
|
|
|
}
|
|
|
|
|
|
{
|
|
|
errno = 0;
|
|
|
std::string path = std::string(td.path) + "/foo.noent";
|
|
|
std::string result = "wrong";
|
|
|
ASSERT_TRUE(!android::base::Realpath(path, &result));
|
|
|
ASSERT_TRUE(result.empty());
|
|
|
ASSERT_EQ(ENOENT, errno);
|
|
|
}
|
|
|
#endif
|
|
|
}
|
|
|
|
|
|
TEST(file, GetExecutableDirectory) {
|
|
|
std::string path = android::base::GetExecutableDirectory();
|
|
|
ASSERT_NE("", path);
|
|
|
ASSERT_NE(android::base::GetExecutablePath(), path);
|
|
|
ASSERT_EQ('/', path[0]);
|
|
|
ASSERT_NE('/', path[path.size() - 1]);
|
|
|
}
|
|
|
|
|
|
TEST(file, GetExecutablePath) {
|
|
|
ASSERT_NE("", android::base::GetExecutablePath());
|
|
|
}
|
|
|
|
|
|
TEST(file, Basename) {
|
|
|
EXPECT_EQ("sh", android::base::Basename("/system/bin/sh"));
|
|
|
EXPECT_EQ("sh", android::base::Basename("sh"));
|
|
|
EXPECT_EQ("sh", android::base::Basename("/system/bin/sh/"));
|
|
|
}
|
|
|
|
|
|
TEST(file, Dirname) {
|
|
|
EXPECT_EQ("/system/bin", android::base::Dirname("/system/bin/sh"));
|
|
|
EXPECT_EQ(".", android::base::Dirname("sh"));
|
|
|
EXPECT_EQ("/system/bin", android::base::Dirname("/system/bin/sh/"));
|
|
|
}
|
|
|
|
|
|
TEST(file, ReadFileToString_capacity) {
|
|
|
TemporaryFile tf;
|
|
|
ASSERT_NE(tf.fd, -1) << tf.path;
|
|
|
|
|
|
// For a huge file, the overhead should still be small.
|
|
|
std::string s;
|
|
|
size_t size = 16 * 1024 * 1024;
|
|
|
ASSERT_TRUE(android::base::WriteStringToFile(std::string(size, 'x'), tf.path));
|
|
|
ASSERT_TRUE(android::base::ReadFileToString(tf.path, &s));
|
|
|
EXPECT_EQ(size, s.size());
|
|
|
EXPECT_LT(s.capacity(), size + 16);
|
|
|
|
|
|
// Even for weird badly-aligned sizes.
|
|
|
size += 12345;
|
|
|
ASSERT_TRUE(android::base::WriteStringToFile(std::string(size, 'x'), tf.path));
|
|
|
ASSERT_TRUE(android::base::ReadFileToString(tf.path, &s));
|
|
|
EXPECT_EQ(size, s.size());
|
|
|
EXPECT_LT(s.capacity(), size + 16);
|
|
|
|
|
|
// We'll shrink an enormous string if you read a small file into it.
|
|
|
size = 64;
|
|
|
ASSERT_TRUE(android::base::WriteStringToFile(std::string(size, 'x'), tf.path));
|
|
|
ASSERT_TRUE(android::base::ReadFileToString(tf.path, &s));
|
|
|
EXPECT_EQ(size, s.size());
|
|
|
EXPECT_LT(s.capacity(), size + 16);
|
|
|
}
|
|
|
|
|
|
TEST(file, ReadFileToString_capacity_0) {
|
|
|
TemporaryFile tf;
|
|
|
ASSERT_NE(tf.fd, -1) << tf.path;
|
|
|
|
|
|
// Because /proc reports its files as zero-length, we don't actually trust
|
|
|
// any file that claims to be zero-length. Rather than add increasingly
|
|
|
// complex heuristics for shrinking the passed-in string in that case, we
|
|
|
// currently leave it alone.
|
|
|
std::string s;
|
|
|
size_t initial_capacity = s.capacity();
|
|
|
ASSERT_TRUE(android::base::WriteStringToFile("", tf.path));
|
|
|
ASSERT_TRUE(android::base::ReadFileToString(tf.path, &s));
|
|
|
EXPECT_EQ(0U, s.size());
|
|
|
EXPECT_EQ(initial_capacity, s.capacity());
|
|
|
}
|