/* * Copyright (C) 2013 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "android-base/file.h" #include #include #include #include #include #include "android-base/test_utils.h" TEST(file, ReadFileToString_ENOENT) { std::string s("hello"); errno = 0; ASSERT_FALSE(android::base::ReadFileToString("/proc/does-not-exist", &s)); EXPECT_EQ(ENOENT, errno); EXPECT_EQ("", s); // s was cleared. } TEST(file, ReadFileToString_WriteStringToFile) { TemporaryFile tf; ASSERT_TRUE(tf.fd != -1); ASSERT_TRUE(android::base::WriteStringToFile("abc", tf.path)) << strerror(errno); std::string s; ASSERT_TRUE(android::base::ReadFileToString(tf.path, &s)) << strerror(errno); EXPECT_EQ("abc", s); } // symlinks require elevated privileges on Windows. #if !defined(_WIN32) TEST(file, ReadFileToString_WriteStringToFile_symlink) { TemporaryFile target, link; ASSERT_EQ(0, unlink(link.path)); ASSERT_EQ(0, symlink(target.path, link.path)); ASSERT_FALSE(android::base::WriteStringToFile("foo", link.path, false)); ASSERT_EQ(ELOOP, errno); ASSERT_TRUE(android::base::WriteStringToFile("foo", link.path, true)); std::string s; ASSERT_FALSE(android::base::ReadFileToString(link.path, &s)); ASSERT_EQ(ELOOP, errno); ASSERT_TRUE(android::base::ReadFileToString(link.path, &s, true)); ASSERT_EQ("foo", s); } #endif // WriteStringToFile2 is explicitly for setting Unix permissions, which make no // sense on Windows. #if !defined(_WIN32) TEST(file, WriteStringToFile2) { TemporaryFile tf; ASSERT_TRUE(tf.fd != -1); ASSERT_TRUE(android::base::WriteStringToFile("abc", tf.path, 0660, getuid(), getgid())) << strerror(errno); struct stat sb; ASSERT_EQ(0, stat(tf.path, &sb)); ASSERT_EQ(0660U, static_cast(sb.st_mode & ~S_IFMT)); ASSERT_EQ(getuid(), sb.st_uid); ASSERT_EQ(getgid(), sb.st_gid); std::string s; ASSERT_TRUE(android::base::ReadFileToString(tf.path, &s)) << strerror(errno); EXPECT_EQ("abc", s); } #endif TEST(file, WriteStringToFd) { TemporaryFile tf; ASSERT_TRUE(tf.fd != -1); ASSERT_TRUE(android::base::WriteStringToFd("abc", tf.fd)); ASSERT_EQ(0, lseek(tf.fd, 0, SEEK_SET)) << strerror(errno); std::string s; ASSERT_TRUE(android::base::ReadFdToString(tf.fd, &s)) << strerror(errno); EXPECT_EQ("abc", s); } TEST(file, WriteFully) { TemporaryFile tf; ASSERT_TRUE(tf.fd != -1); ASSERT_TRUE(android::base::WriteFully(tf.fd, "abc", 3)); ASSERT_EQ(0, lseek(tf.fd, 0, SEEK_SET)) << strerror(errno); std::string s; s.resize(3); ASSERT_TRUE(android::base::ReadFully(tf.fd, &s[0], s.size())) << strerror(errno); EXPECT_EQ("abc", s); ASSERT_EQ(0, lseek(tf.fd, 0, SEEK_SET)) << strerror(errno); s.resize(1024); ASSERT_FALSE(android::base::ReadFully(tf.fd, &s[0], s.size())); } TEST(file, RemoveFileIfExist) { TemporaryFile tf; ASSERT_TRUE(tf.fd != -1); close(tf.fd); tf.fd = -1; std::string err; ASSERT_TRUE(android::base::RemoveFileIfExists(tf.path, &err)) << err; ASSERT_TRUE(android::base::RemoveFileIfExists(tf.path)); TemporaryDir td; ASSERT_FALSE(android::base::RemoveFileIfExists(td.path)); ASSERT_FALSE(android::base::RemoveFileIfExists(td.path, &err)); ASSERT_EQ("is not a regular or symbol link file", err); } TEST(file, Readlink) { #if !defined(_WIN32) // Linux doesn't allow empty symbolic links. std::string min("x"); // ext2 and ext4 both have PAGE_SIZE limits. // If file encryption is enabled, there's extra overhead to store the // size of the encrypted symlink target. There's also an off-by-one // in current kernels (and marlin/sailfish where we're seeing this // failure are still on 3.18, far from current). http://b/33306057. std::string max(static_cast(4096 - 2 - 1 - 1), 'x'); TemporaryDir td; std::string min_path{std::string(td.path) + "/" + "min"}; std::string max_path{std::string(td.path) + "/" + "max"}; ASSERT_EQ(0, symlink(min.c_str(), min_path.c_str())); ASSERT_EQ(0, symlink(max.c_str(), max_path.c_str())); std::string result; result = "wrong"; ASSERT_TRUE(android::base::Readlink(min_path, &result)); ASSERT_EQ(min, result); result = "wrong"; ASSERT_TRUE(android::base::Readlink(max_path, &result)); ASSERT_EQ(max, result); #endif } TEST(file, GetExecutablePath) { ASSERT_NE("", android::base::GetExecutablePath()); }