forked from OSchip/llvm-project
				
			
		
			
				
	
	
		
			161 lines
		
	
	
		
			5.6 KiB
		
	
	
	
		
			C++
		
	
	
	
			
		
		
	
	
			161 lines
		
	
	
		
			5.6 KiB
		
	
	
	
		
			C++
		
	
	
	
| //===----------------------------------------------------------------------===//
 | |
| //
 | |
| //                     The LLVM Compiler Infrastructure
 | |
| //
 | |
| // This file is dual licensed under the MIT and the University of Illinois Open
 | |
| // Source Licenses. See LICENSE.TXT for details.
 | |
| //
 | |
| //===----------------------------------------------------------------------===//
 | |
| 
 | |
| // UNSUPPORTED: c++98, c++03
 | |
| 
 | |
| // <experimental/filesystem>
 | |
| 
 | |
| // void permissions(const path& p, perms prms);
 | |
| // void permissions(const path& p, perms prms, std::error_code& ec) noexcept;
 | |
| 
 | |
| 
 | |
| #include <experimental/filesystem>
 | |
| 
 | |
| #include "test_macros.h"
 | |
| #include "rapid-cxx-test.hpp"
 | |
| #include "filesystem_test_helper.hpp"
 | |
| 
 | |
| using namespace std::experimental::filesystem;
 | |
| namespace fs = std::experimental::filesystem;
 | |
| 
 | |
| using PR = fs::perms;
 | |
| 
 | |
| TEST_SUITE(filesystem_permissions_test_suite)
 | |
| 
 | |
| TEST_CASE(test_signatures)
 | |
| {
 | |
|     const path p; ((void)p);
 | |
|     const perms opts{}; ((void)opts);
 | |
|     std::error_code ec; ((void)ec);
 | |
|     ASSERT_NOT_NOEXCEPT(fs::permissions(p, opts));
 | |
|     // Not noexcept because of narrow contract
 | |
|     LIBCPP_ONLY(
 | |
|         ASSERT_NOT_NOEXCEPT(fs::permissions(p, opts, ec)));
 | |
| }
 | |
| 
 | |
| TEST_CASE(test_error_reporting)
 | |
| {
 | |
|     auto checkThrow = [](path const& f, fs::perms opts, const std::error_code& ec)
 | |
|     {
 | |
| #ifndef TEST_HAS_NO_EXCEPTIONS
 | |
|         try {
 | |
|             fs::permissions(f, opts);
 | |
|             return false;
 | |
|         } catch (filesystem_error const& err) {
 | |
|             return err.path1() == f
 | |
|                 && err.path2() == ""
 | |
|                 && err.code() == ec;
 | |
|         }
 | |
| #else
 | |
|         ((void)f); ((void)opts); ((void)ec);
 | |
|         return true;
 | |
| #endif
 | |
|     };
 | |
| 
 | |
|     scoped_test_env env;
 | |
|     const path dne = env.make_env_path("dne");
 | |
|     const path dne_sym = env.create_symlink(dne, "dne_sym");
 | |
|     { // !exists
 | |
|         std::error_code ec;
 | |
|         fs::permissions(dne, fs::perms{}, ec);
 | |
|         TEST_REQUIRE(ec);
 | |
|         TEST_CHECK(checkThrow(dne, fs::perms{}, ec));
 | |
|     }
 | |
|     {
 | |
|         std::error_code ec;
 | |
|         fs::permissions(dne_sym, fs::perms{}, ec);
 | |
|         TEST_REQUIRE(ec);
 | |
|         TEST_CHECK(checkThrow(dne_sym, fs::perms{}, ec));
 | |
|     }
 | |
| }
 | |
| 
 | |
| TEST_CASE(basic_permissions_test)
 | |
| {
 | |
|     scoped_test_env env;
 | |
|     const path file = env.create_file("file1", 42);
 | |
|     const path dir = env.create_dir("dir1");
 | |
|     const path file_for_sym = env.create_file("file2", 42);
 | |
|     const path sym = env.create_symlink(file_for_sym, "sym");
 | |
|     const perms AP = perms::add_perms;
 | |
|     const perms RP = perms::remove_perms;
 | |
|     const perms NF = perms::symlink_nofollow;
 | |
|     struct TestCase {
 | |
|       path p;
 | |
|       perms set_perms;
 | |
|       perms expected;
 | |
|     } cases[] = {
 | |
|         // test file
 | |
|         {file, perms::none, perms::none},
 | |
|         {file, perms::owner_all, perms::owner_all},
 | |
|         {file, perms::group_all | AP, perms::owner_all | perms::group_all},
 | |
|         {file, perms::group_all | RP, perms::owner_all},
 | |
|         // test directory
 | |
|         {dir, perms::none, perms::none},
 | |
|         {dir, perms::owner_all, perms::owner_all},
 | |
|         {dir, perms::group_all | AP, perms::owner_all | perms::group_all},
 | |
|         {dir, perms::group_all | RP, perms::owner_all},
 | |
|         // test symlink without symlink_nofollow
 | |
|         {sym, perms::none, perms::none},
 | |
|         {sym, perms::owner_all, perms::owner_all},
 | |
|         {sym, perms::group_all | AP, perms::owner_all | perms::group_all},
 | |
|         {sym, perms::group_all | RP , perms::owner_all},
 | |
|         // test non-symlink with symlink_nofollow. The last test on file/dir
 | |
|         // will have set their permissions to perms::owner_all
 | |
|         {file, perms::group_all | AP | NF, perms::owner_all | perms::group_all},
 | |
|         {dir,  perms::group_all | AP | NF, perms::owner_all | perms::group_all}
 | |
|     };
 | |
|     for (auto const& TC : cases) {
 | |
|         TEST_CHECK(status(TC.p).permissions() != TC.expected);
 | |
|         // Set the error code to ensure it's cleared.
 | |
|         std::error_code ec = std::make_error_code(std::errc::bad_address);
 | |
|         permissions(TC.p, TC.set_perms, ec);
 | |
|         TEST_CHECK(!ec);
 | |
|         auto pp = status(TC.p).permissions();
 | |
|         TEST_CHECK(pp == TC.expected);
 | |
|     }
 | |
| }
 | |
| 
 | |
| TEST_CASE(test_no_resolve_symlink_on_symlink)
 | |
| {
 | |
|     scoped_test_env env;
 | |
|     const path file = env.create_file("file", 42);
 | |
|     const path sym = env.create_symlink(file, "sym");
 | |
|     const auto file_perms = status(file).permissions();
 | |
| 
 | |
|     struct TestCase {
 | |
|         perms set_perms;
 | |
|         perms expected; // only expected on platform that support symlink perms.
 | |
|     } cases[] = {
 | |
|         {perms::owner_all, perms::owner_all},
 | |
|         {perms::group_all | perms::add_perms, perms::owner_all | perms::group_all},
 | |
|         {perms::owner_all | perms::remove_perms, perms::group_all},
 | |
|     };
 | |
|     for (auto const& TC : cases) {
 | |
| #if defined(__APPLE__) || defined(__FreeBSD__)
 | |
|         // On OS X symlink permissions are supported. We should get an empty
 | |
|         // error code and the expected permissions.
 | |
|         const auto expected_link_perms = TC.expected;
 | |
|         std::error_code expected_ec;
 | |
| #else
 | |
|         // On linux symlink permissions are not supported. The error code should
 | |
|         // be 'operation_not_supported' and the symlink permissions should be
 | |
|         // unchanged.
 | |
|         const auto expected_link_perms = symlink_status(sym).permissions();
 | |
|         std::error_code expected_ec = std::make_error_code(std::errc::operation_not_supported);
 | |
| #endif
 | |
|         std::error_code ec = std::make_error_code(std::errc::bad_address);
 | |
|         permissions(sym, TC.set_perms | perms::symlink_nofollow, ec);
 | |
|         TEST_CHECK(ec == expected_ec);
 | |
|         TEST_CHECK(status(file).permissions() == file_perms);
 | |
|         TEST_CHECK(symlink_status(sym).permissions() == expected_link_perms);
 | |
|     }
 | |
| }
 | |
| 
 | |
| TEST_SUITE_END()
 |