Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(44)

Side by Side Diff: base/file_util_unittest.cc

Issue 468253002: Move file_util to base/files/ directory. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Forgot to add forwarding header to patch Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « base/file_util_posix.cc ('k') | base/file_util_win.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "build/build_config.h"
6
7 #if defined(OS_WIN)
8 #include <windows.h>
9 #include <shellapi.h>
10 #include <shlobj.h>
11 #include <tchar.h>
12 #include <winioctl.h>
13 #endif
14
15 #if defined(OS_POSIX)
16 #include <errno.h>
17 #include <fcntl.h>
18 #include <unistd.h>
19 #endif
20
21 #include <algorithm>
22 #include <fstream>
23 #include <set>
24 #include <vector>
25
26 #include "base/base_paths.h"
27 #include "base/file_util.h"
28 #include "base/files/file_enumerator.h"
29 #include "base/files/file_path.h"
30 #include "base/files/scoped_file.h"
31 #include "base/files/scoped_temp_dir.h"
32 #include "base/path_service.h"
33 #include "base/strings/utf_string_conversions.h"
34 #include "base/test/test_file_util.h"
35 #include "base/threading/platform_thread.h"
36 #include "testing/gtest/include/gtest/gtest.h"
37 #include "testing/platform_test.h"
38
39 #if defined(OS_WIN)
40 #include "base/win/scoped_handle.h"
41 #include "base/win/windows_version.h"
42 #endif
43
44 #if defined(OS_ANDROID)
45 #include "base/android/content_uri_utils.h"
46 #endif
47
48 // This macro helps avoid wrapped lines in the test structs.
49 #define FPL(x) FILE_PATH_LITERAL(x)
50
51 namespace base {
52
53 namespace {
54
55 // To test that file_util::Normalize FilePath() deals with NTFS reparse points
56 // correctly, we need functions to create and delete reparse points.
57 #if defined(OS_WIN)
58 typedef struct _REPARSE_DATA_BUFFER {
59 ULONG ReparseTag;
60 USHORT ReparseDataLength;
61 USHORT Reserved;
62 union {
63 struct {
64 USHORT SubstituteNameOffset;
65 USHORT SubstituteNameLength;
66 USHORT PrintNameOffset;
67 USHORT PrintNameLength;
68 ULONG Flags;
69 WCHAR PathBuffer[1];
70 } SymbolicLinkReparseBuffer;
71 struct {
72 USHORT SubstituteNameOffset;
73 USHORT SubstituteNameLength;
74 USHORT PrintNameOffset;
75 USHORT PrintNameLength;
76 WCHAR PathBuffer[1];
77 } MountPointReparseBuffer;
78 struct {
79 UCHAR DataBuffer[1];
80 } GenericReparseBuffer;
81 };
82 } REPARSE_DATA_BUFFER, *PREPARSE_DATA_BUFFER;
83
84 // Sets a reparse point. |source| will now point to |target|. Returns true if
85 // the call succeeds, false otherwise.
86 bool SetReparsePoint(HANDLE source, const FilePath& target_path) {
87 std::wstring kPathPrefix = L"\\??\\";
88 std::wstring target_str;
89 // The juction will not work if the target path does not start with \??\ .
90 if (kPathPrefix != target_path.value().substr(0, kPathPrefix.size()))
91 target_str += kPathPrefix;
92 target_str += target_path.value();
93 const wchar_t* target = target_str.c_str();
94 USHORT size_target = static_cast<USHORT>(wcslen(target)) * sizeof(target[0]);
95 char buffer[2000] = {0};
96 DWORD returned;
97
98 REPARSE_DATA_BUFFER* data = reinterpret_cast<REPARSE_DATA_BUFFER*>(buffer);
99
100 data->ReparseTag = 0xa0000003;
101 memcpy(data->MountPointReparseBuffer.PathBuffer, target, size_target + 2);
102
103 data->MountPointReparseBuffer.SubstituteNameLength = size_target;
104 data->MountPointReparseBuffer.PrintNameOffset = size_target + 2;
105 data->ReparseDataLength = size_target + 4 + 8;
106
107 int data_size = data->ReparseDataLength + 8;
108
109 if (!DeviceIoControl(source, FSCTL_SET_REPARSE_POINT, &buffer, data_size,
110 NULL, 0, &returned, NULL)) {
111 return false;
112 }
113 return true;
114 }
115
116 // Delete the reparse point referenced by |source|. Returns true if the call
117 // succeeds, false otherwise.
118 bool DeleteReparsePoint(HANDLE source) {
119 DWORD returned;
120 REPARSE_DATA_BUFFER data = {0};
121 data.ReparseTag = 0xa0000003;
122 if (!DeviceIoControl(source, FSCTL_DELETE_REPARSE_POINT, &data, 8, NULL, 0,
123 &returned, NULL)) {
124 return false;
125 }
126 return true;
127 }
128
129 // Manages a reparse point for a test.
130 class ReparsePoint {
131 public:
132 // Creates a reparse point from |source| (an empty directory) to |target|.
133 ReparsePoint(const FilePath& source, const FilePath& target) {
134 dir_.Set(
135 ::CreateFile(source.value().c_str(),
136 FILE_ALL_ACCESS,
137 FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE,
138 NULL,
139 OPEN_EXISTING,
140 FILE_FLAG_BACKUP_SEMANTICS, // Needed to open a directory.
141 NULL));
142 created_ = dir_.IsValid() && SetReparsePoint(dir_, target);
143 }
144
145 ~ReparsePoint() {
146 if (created_)
147 DeleteReparsePoint(dir_);
148 }
149
150 bool IsValid() { return created_; }
151
152 private:
153 win::ScopedHandle dir_;
154 bool created_;
155 DISALLOW_COPY_AND_ASSIGN(ReparsePoint);
156 };
157
158 #endif
159
160 #if defined(OS_POSIX)
161 // Provide a simple way to change the permissions bits on |path| in tests.
162 // ASSERT failures will return, but not stop the test. Caller should wrap
163 // calls to this function in ASSERT_NO_FATAL_FAILURE().
164 void ChangePosixFilePermissions(const FilePath& path,
165 int mode_bits_to_set,
166 int mode_bits_to_clear) {
167 ASSERT_FALSE(mode_bits_to_set & mode_bits_to_clear)
168 << "Can't set and clear the same bits.";
169
170 int mode = 0;
171 ASSERT_TRUE(GetPosixFilePermissions(path, &mode));
172 mode |= mode_bits_to_set;
173 mode &= ~mode_bits_to_clear;
174 ASSERT_TRUE(SetPosixFilePermissions(path, mode));
175 }
176 #endif // defined(OS_POSIX)
177
178 const wchar_t bogus_content[] = L"I'm cannon fodder.";
179
180 const int FILES_AND_DIRECTORIES =
181 FileEnumerator::FILES | FileEnumerator::DIRECTORIES;
182
183 // file_util winds up using autoreleased objects on the Mac, so this needs
184 // to be a PlatformTest
185 class FileUtilTest : public PlatformTest {
186 protected:
187 virtual void SetUp() OVERRIDE {
188 PlatformTest::SetUp();
189 ASSERT_TRUE(temp_dir_.CreateUniqueTempDir());
190 }
191
192 ScopedTempDir temp_dir_;
193 };
194
195 // Collects all the results from the given file enumerator, and provides an
196 // interface to query whether a given file is present.
197 class FindResultCollector {
198 public:
199 explicit FindResultCollector(FileEnumerator& enumerator) {
200 FilePath cur_file;
201 while (!(cur_file = enumerator.Next()).value().empty()) {
202 FilePath::StringType path = cur_file.value();
203 // The file should not be returned twice.
204 EXPECT_TRUE(files_.end() == files_.find(path))
205 << "Same file returned twice";
206
207 // Save for later.
208 files_.insert(path);
209 }
210 }
211
212 // Returns true if the enumerator found the file.
213 bool HasFile(const FilePath& file) const {
214 return files_.find(file.value()) != files_.end();
215 }
216
217 int size() {
218 return static_cast<int>(files_.size());
219 }
220
221 private:
222 std::set<FilePath::StringType> files_;
223 };
224
225 // Simple function to dump some text into a new file.
226 void CreateTextFile(const FilePath& filename,
227 const std::wstring& contents) {
228 std::wofstream file;
229 file.open(filename.value().c_str());
230 ASSERT_TRUE(file.is_open());
231 file << contents;
232 file.close();
233 }
234
235 // Simple function to take out some text from a file.
236 std::wstring ReadTextFile(const FilePath& filename) {
237 wchar_t contents[64];
238 std::wifstream file;
239 file.open(filename.value().c_str());
240 EXPECT_TRUE(file.is_open());
241 file.getline(contents, arraysize(contents));
242 file.close();
243 return std::wstring(contents);
244 }
245
246 #if defined(OS_WIN)
247 uint64 FileTimeAsUint64(const FILETIME& ft) {
248 ULARGE_INTEGER u;
249 u.LowPart = ft.dwLowDateTime;
250 u.HighPart = ft.dwHighDateTime;
251 return u.QuadPart;
252 }
253 #endif
254
255 TEST_F(FileUtilTest, FileAndDirectorySize) {
256 // Create three files of 20, 30 and 3 chars (utf8). ComputeDirectorySize
257 // should return 53 bytes.
258 FilePath file_01 = temp_dir_.path().Append(FPL("The file 01.txt"));
259 CreateTextFile(file_01, L"12345678901234567890");
260 int64 size_f1 = 0;
261 ASSERT_TRUE(GetFileSize(file_01, &size_f1));
262 EXPECT_EQ(20ll, size_f1);
263
264 FilePath subdir_path = temp_dir_.path().Append(FPL("Level2"));
265 CreateDirectory(subdir_path);
266
267 FilePath file_02 = subdir_path.Append(FPL("The file 02.txt"));
268 CreateTextFile(file_02, L"123456789012345678901234567890");
269 int64 size_f2 = 0;
270 ASSERT_TRUE(GetFileSize(file_02, &size_f2));
271 EXPECT_EQ(30ll, size_f2);
272
273 FilePath subsubdir_path = subdir_path.Append(FPL("Level3"));
274 CreateDirectory(subsubdir_path);
275
276 FilePath file_03 = subsubdir_path.Append(FPL("The file 03.txt"));
277 CreateTextFile(file_03, L"123");
278
279 int64 computed_size = ComputeDirectorySize(temp_dir_.path());
280 EXPECT_EQ(size_f1 + size_f2 + 3, computed_size);
281 }
282
283 TEST_F(FileUtilTest, NormalizeFilePathBasic) {
284 // Create a directory under the test dir. Because we create it,
285 // we know it is not a link.
286 FilePath file_a_path = temp_dir_.path().Append(FPL("file_a"));
287 FilePath dir_path = temp_dir_.path().Append(FPL("dir"));
288 FilePath file_b_path = dir_path.Append(FPL("file_b"));
289 CreateDirectory(dir_path);
290
291 FilePath normalized_file_a_path, normalized_file_b_path;
292 ASSERT_FALSE(PathExists(file_a_path));
293 ASSERT_FALSE(NormalizeFilePath(file_a_path, &normalized_file_a_path))
294 << "NormalizeFilePath() should fail on nonexistent paths.";
295
296 CreateTextFile(file_a_path, bogus_content);
297 ASSERT_TRUE(PathExists(file_a_path));
298 ASSERT_TRUE(NormalizeFilePath(file_a_path, &normalized_file_a_path));
299
300 CreateTextFile(file_b_path, bogus_content);
301 ASSERT_TRUE(PathExists(file_b_path));
302 ASSERT_TRUE(NormalizeFilePath(file_b_path, &normalized_file_b_path));
303
304 // Beacuse this test created |dir_path|, we know it is not a link
305 // or junction. So, the real path of the directory holding file a
306 // must be the parent of the path holding file b.
307 ASSERT_TRUE(normalized_file_a_path.DirName()
308 .IsParent(normalized_file_b_path.DirName()));
309 }
310
311 #if defined(OS_WIN)
312
313 TEST_F(FileUtilTest, NormalizeFilePathReparsePoints) {
314 // Build the following directory structure:
315 //
316 // temp_dir
317 // |-> base_a
318 // | |-> sub_a
319 // | |-> file.txt
320 // | |-> long_name___... (Very long name.)
321 // | |-> sub_long
322 // | |-> deep.txt
323 // |-> base_b
324 // |-> to_sub_a (reparse point to temp_dir\base_a\sub_a)
325 // |-> to_base_b (reparse point to temp_dir\base_b)
326 // |-> to_sub_long (reparse point to temp_dir\sub_a\long_name_\sub_long)
327
328 FilePath base_a = temp_dir_.path().Append(FPL("base_a"));
329 ASSERT_TRUE(CreateDirectory(base_a));
330
331 FilePath sub_a = base_a.Append(FPL("sub_a"));
332 ASSERT_TRUE(CreateDirectory(sub_a));
333
334 FilePath file_txt = sub_a.Append(FPL("file.txt"));
335 CreateTextFile(file_txt, bogus_content);
336
337 // Want a directory whose name is long enough to make the path to the file
338 // inside just under MAX_PATH chars. This will be used to test that when
339 // a junction expands to a path over MAX_PATH chars in length,
340 // NormalizeFilePath() fails without crashing.
341 FilePath sub_long_rel(FPL("sub_long"));
342 FilePath deep_txt(FPL("deep.txt"));
343
344 int target_length = MAX_PATH;
345 target_length -= (sub_a.value().length() + 1); // +1 for the sepperator '\'.
346 target_length -= (sub_long_rel.Append(deep_txt).value().length() + 1);
347 // Without making the path a bit shorter, CreateDirectory() fails.
348 // the resulting path is still long enough to hit the failing case in
349 // NormalizePath().
350 const int kCreateDirLimit = 4;
351 target_length -= kCreateDirLimit;
352 FilePath::StringType long_name_str = FPL("long_name_");
353 long_name_str.resize(target_length, '_');
354
355 FilePath long_name = sub_a.Append(FilePath(long_name_str));
356 FilePath deep_file = long_name.Append(sub_long_rel).Append(deep_txt);
357 ASSERT_EQ(MAX_PATH - kCreateDirLimit, deep_file.value().length());
358
359 FilePath sub_long = deep_file.DirName();
360 ASSERT_TRUE(CreateDirectory(sub_long));
361 CreateTextFile(deep_file, bogus_content);
362
363 FilePath base_b = temp_dir_.path().Append(FPL("base_b"));
364 ASSERT_TRUE(CreateDirectory(base_b));
365
366 FilePath to_sub_a = base_b.Append(FPL("to_sub_a"));
367 ASSERT_TRUE(CreateDirectory(to_sub_a));
368 FilePath normalized_path;
369 {
370 ReparsePoint reparse_to_sub_a(to_sub_a, sub_a);
371 ASSERT_TRUE(reparse_to_sub_a.IsValid());
372
373 FilePath to_base_b = base_b.Append(FPL("to_base_b"));
374 ASSERT_TRUE(CreateDirectory(to_base_b));
375 ReparsePoint reparse_to_base_b(to_base_b, base_b);
376 ASSERT_TRUE(reparse_to_base_b.IsValid());
377
378 FilePath to_sub_long = base_b.Append(FPL("to_sub_long"));
379 ASSERT_TRUE(CreateDirectory(to_sub_long));
380 ReparsePoint reparse_to_sub_long(to_sub_long, sub_long);
381 ASSERT_TRUE(reparse_to_sub_long.IsValid());
382
383 // Normalize a junction free path: base_a\sub_a\file.txt .
384 ASSERT_TRUE(NormalizeFilePath(file_txt, &normalized_path));
385 ASSERT_STREQ(file_txt.value().c_str(), normalized_path.value().c_str());
386
387 // Check that the path base_b\to_sub_a\file.txt can be normalized to exclude
388 // the junction to_sub_a.
389 ASSERT_TRUE(NormalizeFilePath(to_sub_a.Append(FPL("file.txt")),
390 &normalized_path));
391 ASSERT_STREQ(file_txt.value().c_str(), normalized_path.value().c_str());
392
393 // Check that the path base_b\to_base_b\to_base_b\to_sub_a\file.txt can be
394 // normalized to exclude junctions to_base_b and to_sub_a .
395 ASSERT_TRUE(NormalizeFilePath(base_b.Append(FPL("to_base_b"))
396 .Append(FPL("to_base_b"))
397 .Append(FPL("to_sub_a"))
398 .Append(FPL("file.txt")),
399 &normalized_path));
400 ASSERT_STREQ(file_txt.value().c_str(), normalized_path.value().c_str());
401
402 // A long enough path will cause NormalizeFilePath() to fail. Make a long
403 // path using to_base_b many times, and check that paths long enough to fail
404 // do not cause a crash.
405 FilePath long_path = base_b;
406 const int kLengthLimit = MAX_PATH + 200;
407 while (long_path.value().length() <= kLengthLimit) {
408 long_path = long_path.Append(FPL("to_base_b"));
409 }
410 long_path = long_path.Append(FPL("to_sub_a"))
411 .Append(FPL("file.txt"));
412
413 ASSERT_FALSE(NormalizeFilePath(long_path, &normalized_path));
414
415 // Normalizing the junction to deep.txt should fail, because the expanded
416 // path to deep.txt is longer than MAX_PATH.
417 ASSERT_FALSE(NormalizeFilePath(to_sub_long.Append(deep_txt),
418 &normalized_path));
419
420 // Delete the reparse points, and see that NormalizeFilePath() fails
421 // to traverse them.
422 }
423
424 ASSERT_FALSE(NormalizeFilePath(to_sub_a.Append(FPL("file.txt")),
425 &normalized_path));
426 }
427
428 TEST_F(FileUtilTest, DevicePathToDriveLetter) {
429 // Get a drive letter.
430 std::wstring real_drive_letter = temp_dir_.path().value().substr(0, 2);
431 if (!isalpha(real_drive_letter[0]) || ':' != real_drive_letter[1]) {
432 LOG(ERROR) << "Can't get a drive letter to test with.";
433 return;
434 }
435
436 // Get the NT style path to that drive.
437 wchar_t device_path[MAX_PATH] = {'\0'};
438 ASSERT_TRUE(
439 ::QueryDosDevice(real_drive_letter.c_str(), device_path, MAX_PATH));
440 FilePath actual_device_path(device_path);
441 FilePath win32_path;
442
443 // Run DevicePathToDriveLetterPath() on the NT style path we got from
444 // QueryDosDevice(). Expect the drive letter we started with.
445 ASSERT_TRUE(DevicePathToDriveLetterPath(actual_device_path, &win32_path));
446 ASSERT_EQ(real_drive_letter, win32_path.value());
447
448 // Add some directories to the path. Expect those extra path componenets
449 // to be preserved.
450 FilePath kRelativePath(FPL("dir1\\dir2\\file.txt"));
451 ASSERT_TRUE(DevicePathToDriveLetterPath(
452 actual_device_path.Append(kRelativePath),
453 &win32_path));
454 EXPECT_EQ(FilePath(real_drive_letter + L"\\").Append(kRelativePath).value(),
455 win32_path.value());
456
457 // Deform the real path so that it is invalid by removing the last four
458 // characters. The way windows names devices that are hard disks
459 // (\Device\HardDiskVolume${NUMBER}) guarantees that the string is longer
460 // than three characters. The only way the truncated string could be a
461 // real drive is if more than 10^3 disks are mounted:
462 // \Device\HardDiskVolume10000 would be truncated to \Device\HardDiskVolume1
463 // Check that DevicePathToDriveLetterPath fails.
464 int path_length = actual_device_path.value().length();
465 int new_length = path_length - 4;
466 ASSERT_LT(0, new_length);
467 FilePath prefix_of_real_device_path(
468 actual_device_path.value().substr(0, new_length));
469 ASSERT_FALSE(DevicePathToDriveLetterPath(prefix_of_real_device_path,
470 &win32_path));
471
472 ASSERT_FALSE(DevicePathToDriveLetterPath(
473 prefix_of_real_device_path.Append(kRelativePath),
474 &win32_path));
475
476 // Deform the real path so that it is invalid by adding some characters. For
477 // example, if C: maps to \Device\HardDiskVolume8, then we simulate a
478 // request for the drive letter whose native path is
479 // \Device\HardDiskVolume812345 . We assume such a device does not exist,
480 // because drives are numbered in order and mounting 112345 hard disks will
481 // never happen.
482 const FilePath::StringType kExtraChars = FPL("12345");
483
484 FilePath real_device_path_plus_numbers(
485 actual_device_path.value() + kExtraChars);
486
487 ASSERT_FALSE(DevicePathToDriveLetterPath(
488 real_device_path_plus_numbers,
489 &win32_path));
490
491 ASSERT_FALSE(DevicePathToDriveLetterPath(
492 real_device_path_plus_numbers.Append(kRelativePath),
493 &win32_path));
494 }
495
496 TEST_F(FileUtilTest, CreateTemporaryFileInDirLongPathTest) {
497 // Test that CreateTemporaryFileInDir() creates a path and returns a long path
498 // if it is available. This test requires that:
499 // - the filesystem at |temp_dir_| supports long filenames.
500 // - the account has FILE_LIST_DIRECTORY permission for all ancestor
501 // directories of |temp_dir_|.
502 const FilePath::CharType kLongDirName[] = FPL("A long path");
503 const FilePath::CharType kTestSubDirName[] = FPL("test");
504 FilePath long_test_dir = temp_dir_.path().Append(kLongDirName);
505 ASSERT_TRUE(CreateDirectory(long_test_dir));
506
507 // kLongDirName is not a 8.3 component. So GetShortName() should give us a
508 // different short name.
509 WCHAR path_buffer[MAX_PATH];
510 DWORD path_buffer_length = GetShortPathName(long_test_dir.value().c_str(),
511 path_buffer, MAX_PATH);
512 ASSERT_LT(path_buffer_length, DWORD(MAX_PATH));
513 ASSERT_NE(DWORD(0), path_buffer_length);
514 FilePath short_test_dir(path_buffer);
515 ASSERT_STRNE(kLongDirName, short_test_dir.BaseName().value().c_str());
516
517 FilePath temp_file;
518 ASSERT_TRUE(CreateTemporaryFileInDir(short_test_dir, &temp_file));
519 EXPECT_STREQ(kLongDirName, temp_file.DirName().BaseName().value().c_str());
520 EXPECT_TRUE(PathExists(temp_file));
521
522 // Create a subdirectory of |long_test_dir| and make |long_test_dir|
523 // unreadable. We should still be able to create a temp file in the
524 // subdirectory, but we won't be able to determine the long path for it. This
525 // mimics the environment that some users run where their user profiles reside
526 // in a location where the don't have full access to the higher level
527 // directories. (Note that this assumption is true for NTFS, but not for some
528 // network file systems. E.g. AFS).
529 FilePath access_test_dir = long_test_dir.Append(kTestSubDirName);
530 ASSERT_TRUE(CreateDirectory(access_test_dir));
531 base::FilePermissionRestorer long_test_dir_restorer(long_test_dir);
532 ASSERT_TRUE(base::MakeFileUnreadable(long_test_dir));
533
534 // Use the short form of the directory to create a temporary filename.
535 ASSERT_TRUE(CreateTemporaryFileInDir(
536 short_test_dir.Append(kTestSubDirName), &temp_file));
537 EXPECT_TRUE(PathExists(temp_file));
538 EXPECT_TRUE(short_test_dir.IsParent(temp_file.DirName()));
539
540 // Check that the long path can't be determined for |temp_file|.
541 path_buffer_length = GetLongPathName(temp_file.value().c_str(),
542 path_buffer, MAX_PATH);
543 EXPECT_EQ(DWORD(0), path_buffer_length);
544 }
545
546 #endif // defined(OS_WIN)
547
548 #if defined(OS_POSIX)
549
550 TEST_F(FileUtilTest, CreateAndReadSymlinks) {
551 FilePath link_from = temp_dir_.path().Append(FPL("from_file"));
552 FilePath link_to = temp_dir_.path().Append(FPL("to_file"));
553 CreateTextFile(link_to, bogus_content);
554
555 ASSERT_TRUE(CreateSymbolicLink(link_to, link_from))
556 << "Failed to create file symlink.";
557
558 // If we created the link properly, we should be able to read the contents
559 // through it.
560 std::wstring contents = ReadTextFile(link_from);
561 EXPECT_EQ(bogus_content, contents);
562
563 FilePath result;
564 ASSERT_TRUE(ReadSymbolicLink(link_from, &result));
565 EXPECT_EQ(link_to.value(), result.value());
566
567 // Link to a directory.
568 link_from = temp_dir_.path().Append(FPL("from_dir"));
569 link_to = temp_dir_.path().Append(FPL("to_dir"));
570 ASSERT_TRUE(CreateDirectory(link_to));
571 ASSERT_TRUE(CreateSymbolicLink(link_to, link_from))
572 << "Failed to create directory symlink.";
573
574 // Test failures.
575 EXPECT_FALSE(CreateSymbolicLink(link_to, link_to));
576 EXPECT_FALSE(ReadSymbolicLink(link_to, &result));
577 FilePath missing = temp_dir_.path().Append(FPL("missing"));
578 EXPECT_FALSE(ReadSymbolicLink(missing, &result));
579 }
580
581 // The following test of NormalizeFilePath() require that we create a symlink.
582 // This can not be done on Windows before Vista. On Vista, creating a symlink
583 // requires privilege "SeCreateSymbolicLinkPrivilege".
584 // TODO(skerner): Investigate the possibility of giving base_unittests the
585 // privileges required to create a symlink.
586 TEST_F(FileUtilTest, NormalizeFilePathSymlinks) {
587 // Link one file to another.
588 FilePath link_from = temp_dir_.path().Append(FPL("from_file"));
589 FilePath link_to = temp_dir_.path().Append(FPL("to_file"));
590 CreateTextFile(link_to, bogus_content);
591
592 ASSERT_TRUE(CreateSymbolicLink(link_to, link_from))
593 << "Failed to create file symlink.";
594
595 // Check that NormalizeFilePath sees the link.
596 FilePath normalized_path;
597 ASSERT_TRUE(NormalizeFilePath(link_from, &normalized_path));
598 EXPECT_NE(link_from, link_to);
599 EXPECT_EQ(link_to.BaseName().value(), normalized_path.BaseName().value());
600 EXPECT_EQ(link_to.BaseName().value(), normalized_path.BaseName().value());
601
602 // Link to a directory.
603 link_from = temp_dir_.path().Append(FPL("from_dir"));
604 link_to = temp_dir_.path().Append(FPL("to_dir"));
605 ASSERT_TRUE(CreateDirectory(link_to));
606 ASSERT_TRUE(CreateSymbolicLink(link_to, link_from))
607 << "Failed to create directory symlink.";
608
609 EXPECT_FALSE(NormalizeFilePath(link_from, &normalized_path))
610 << "Links to directories should return false.";
611
612 // Test that a loop in the links causes NormalizeFilePath() to return false.
613 link_from = temp_dir_.path().Append(FPL("link_a"));
614 link_to = temp_dir_.path().Append(FPL("link_b"));
615 ASSERT_TRUE(CreateSymbolicLink(link_to, link_from))
616 << "Failed to create loop symlink a.";
617 ASSERT_TRUE(CreateSymbolicLink(link_from, link_to))
618 << "Failed to create loop symlink b.";
619
620 // Infinite loop!
621 EXPECT_FALSE(NormalizeFilePath(link_from, &normalized_path));
622 }
623 #endif // defined(OS_POSIX)
624
625 TEST_F(FileUtilTest, DeleteNonExistent) {
626 FilePath non_existent = temp_dir_.path().AppendASCII("bogus_file_dne.foobar");
627 ASSERT_FALSE(PathExists(non_existent));
628
629 EXPECT_TRUE(DeleteFile(non_existent, false));
630 ASSERT_FALSE(PathExists(non_existent));
631 EXPECT_TRUE(DeleteFile(non_existent, true));
632 ASSERT_FALSE(PathExists(non_existent));
633 }
634
635 TEST_F(FileUtilTest, DeleteNonExistentWithNonExistentParent) {
636 FilePath non_existent = temp_dir_.path().AppendASCII("bogus_topdir");
637 non_existent = non_existent.AppendASCII("bogus_subdir");
638 ASSERT_FALSE(PathExists(non_existent));
639
640 EXPECT_TRUE(DeleteFile(non_existent, false));
641 ASSERT_FALSE(PathExists(non_existent));
642 EXPECT_TRUE(DeleteFile(non_existent, true));
643 ASSERT_FALSE(PathExists(non_existent));
644 }
645
646 TEST_F(FileUtilTest, DeleteFile) {
647 // Create a file
648 FilePath file_name = temp_dir_.path().Append(FPL("Test DeleteFile 1.txt"));
649 CreateTextFile(file_name, bogus_content);
650 ASSERT_TRUE(PathExists(file_name));
651
652 // Make sure it's deleted
653 EXPECT_TRUE(DeleteFile(file_name, false));
654 EXPECT_FALSE(PathExists(file_name));
655
656 // Test recursive case, create a new file
657 file_name = temp_dir_.path().Append(FPL("Test DeleteFile 2.txt"));
658 CreateTextFile(file_name, bogus_content);
659 ASSERT_TRUE(PathExists(file_name));
660
661 // Make sure it's deleted
662 EXPECT_TRUE(DeleteFile(file_name, true));
663 EXPECT_FALSE(PathExists(file_name));
664 }
665
666 #if defined(OS_POSIX)
667 TEST_F(FileUtilTest, DeleteSymlinkToExistentFile) {
668 // Create a file.
669 FilePath file_name = temp_dir_.path().Append(FPL("Test DeleteFile 2.txt"));
670 CreateTextFile(file_name, bogus_content);
671 ASSERT_TRUE(PathExists(file_name));
672
673 // Create a symlink to the file.
674 FilePath file_link = temp_dir_.path().Append("file_link_2");
675 ASSERT_TRUE(CreateSymbolicLink(file_name, file_link))
676 << "Failed to create symlink.";
677
678 // Delete the symbolic link.
679 EXPECT_TRUE(DeleteFile(file_link, false));
680
681 // Make sure original file is not deleted.
682 EXPECT_FALSE(PathExists(file_link));
683 EXPECT_TRUE(PathExists(file_name));
684 }
685
686 TEST_F(FileUtilTest, DeleteSymlinkToNonExistentFile) {
687 // Create a non-existent file path.
688 FilePath non_existent = temp_dir_.path().Append(FPL("Test DeleteFile 3.txt"));
689 EXPECT_FALSE(PathExists(non_existent));
690
691 // Create a symlink to the non-existent file.
692 FilePath file_link = temp_dir_.path().Append("file_link_3");
693 ASSERT_TRUE(CreateSymbolicLink(non_existent, file_link))
694 << "Failed to create symlink.";
695
696 // Make sure the symbolic link is exist.
697 EXPECT_TRUE(IsLink(file_link));
698 EXPECT_FALSE(PathExists(file_link));
699
700 // Delete the symbolic link.
701 EXPECT_TRUE(DeleteFile(file_link, false));
702
703 // Make sure the symbolic link is deleted.
704 EXPECT_FALSE(IsLink(file_link));
705 }
706
707 TEST_F(FileUtilTest, ChangeFilePermissionsAndRead) {
708 // Create a file path.
709 FilePath file_name = temp_dir_.path().Append(FPL("Test Readable File.txt"));
710 EXPECT_FALSE(PathExists(file_name));
711
712 const std::string kData("hello");
713
714 int buffer_size = kData.length();
715 char* buffer = new char[buffer_size];
716
717 // Write file.
718 EXPECT_EQ(static_cast<int>(kData.length()),
719 WriteFile(file_name, kData.data(), kData.length()));
720 EXPECT_TRUE(PathExists(file_name));
721
722 // Make sure the file is readable.
723 int32 mode = 0;
724 EXPECT_TRUE(GetPosixFilePermissions(file_name, &mode));
725 EXPECT_TRUE(mode & FILE_PERMISSION_READ_BY_USER);
726
727 // Get rid of the read permission.
728 EXPECT_TRUE(SetPosixFilePermissions(file_name, 0u));
729 EXPECT_TRUE(GetPosixFilePermissions(file_name, &mode));
730 EXPECT_FALSE(mode & FILE_PERMISSION_READ_BY_USER);
731 // Make sure the file can't be read.
732 EXPECT_EQ(-1, ReadFile(file_name, buffer, buffer_size));
733
734 // Give the read permission.
735 EXPECT_TRUE(SetPosixFilePermissions(file_name, FILE_PERMISSION_READ_BY_USER));
736 EXPECT_TRUE(GetPosixFilePermissions(file_name, &mode));
737 EXPECT_TRUE(mode & FILE_PERMISSION_READ_BY_USER);
738 // Make sure the file can be read.
739 EXPECT_EQ(static_cast<int>(kData.length()),
740 ReadFile(file_name, buffer, buffer_size));
741
742 // Delete the file.
743 EXPECT_TRUE(DeleteFile(file_name, false));
744 EXPECT_FALSE(PathExists(file_name));
745
746 delete[] buffer;
747 }
748
749 TEST_F(FileUtilTest, ChangeFilePermissionsAndWrite) {
750 // Create a file path.
751 FilePath file_name = temp_dir_.path().Append(FPL("Test Readable File.txt"));
752 EXPECT_FALSE(PathExists(file_name));
753
754 const std::string kData("hello");
755
756 // Write file.
757 EXPECT_EQ(static_cast<int>(kData.length()),
758 WriteFile(file_name, kData.data(), kData.length()));
759 EXPECT_TRUE(PathExists(file_name));
760
761 // Make sure the file is writable.
762 int mode = 0;
763 EXPECT_TRUE(GetPosixFilePermissions(file_name, &mode));
764 EXPECT_TRUE(mode & FILE_PERMISSION_WRITE_BY_USER);
765 EXPECT_TRUE(PathIsWritable(file_name));
766
767 // Get rid of the write permission.
768 EXPECT_TRUE(SetPosixFilePermissions(file_name, 0u));
769 EXPECT_TRUE(GetPosixFilePermissions(file_name, &mode));
770 EXPECT_FALSE(mode & FILE_PERMISSION_WRITE_BY_USER);
771 // Make sure the file can't be write.
772 EXPECT_EQ(-1, WriteFile(file_name, kData.data(), kData.length()));
773 EXPECT_FALSE(PathIsWritable(file_name));
774
775 // Give read permission.
776 EXPECT_TRUE(SetPosixFilePermissions(file_name,
777 FILE_PERMISSION_WRITE_BY_USER));
778 EXPECT_TRUE(GetPosixFilePermissions(file_name, &mode));
779 EXPECT_TRUE(mode & FILE_PERMISSION_WRITE_BY_USER);
780 // Make sure the file can be write.
781 EXPECT_EQ(static_cast<int>(kData.length()),
782 WriteFile(file_name, kData.data(), kData.length()));
783 EXPECT_TRUE(PathIsWritable(file_name));
784
785 // Delete the file.
786 EXPECT_TRUE(DeleteFile(file_name, false));
787 EXPECT_FALSE(PathExists(file_name));
788 }
789
790 TEST_F(FileUtilTest, ChangeDirectoryPermissionsAndEnumerate) {
791 // Create a directory path.
792 FilePath subdir_path =
793 temp_dir_.path().Append(FPL("PermissionTest1"));
794 CreateDirectory(subdir_path);
795 ASSERT_TRUE(PathExists(subdir_path));
796
797 // Create a dummy file to enumerate.
798 FilePath file_name = subdir_path.Append(FPL("Test Readable File.txt"));
799 EXPECT_FALSE(PathExists(file_name));
800 const std::string kData("hello");
801 EXPECT_EQ(static_cast<int>(kData.length()),
802 WriteFile(file_name, kData.data(), kData.length()));
803 EXPECT_TRUE(PathExists(file_name));
804
805 // Make sure the directory has the all permissions.
806 int mode = 0;
807 EXPECT_TRUE(GetPosixFilePermissions(subdir_path, &mode));
808 EXPECT_EQ(FILE_PERMISSION_USER_MASK, mode & FILE_PERMISSION_USER_MASK);
809
810 // Get rid of the permissions from the directory.
811 EXPECT_TRUE(SetPosixFilePermissions(subdir_path, 0u));
812 EXPECT_TRUE(GetPosixFilePermissions(subdir_path, &mode));
813 EXPECT_FALSE(mode & FILE_PERMISSION_USER_MASK);
814
815 // Make sure the file in the directory can't be enumerated.
816 FileEnumerator f1(subdir_path, true, FileEnumerator::FILES);
817 EXPECT_TRUE(PathExists(subdir_path));
818 FindResultCollector c1(f1);
819 EXPECT_EQ(0, c1.size());
820 EXPECT_FALSE(GetPosixFilePermissions(file_name, &mode));
821
822 // Give the permissions to the directory.
823 EXPECT_TRUE(SetPosixFilePermissions(subdir_path, FILE_PERMISSION_USER_MASK));
824 EXPECT_TRUE(GetPosixFilePermissions(subdir_path, &mode));
825 EXPECT_EQ(FILE_PERMISSION_USER_MASK, mode & FILE_PERMISSION_USER_MASK);
826
827 // Make sure the file in the directory can be enumerated.
828 FileEnumerator f2(subdir_path, true, FileEnumerator::FILES);
829 FindResultCollector c2(f2);
830 EXPECT_TRUE(c2.HasFile(file_name));
831 EXPECT_EQ(1, c2.size());
832
833 // Delete the file.
834 EXPECT_TRUE(DeleteFile(subdir_path, true));
835 EXPECT_FALSE(PathExists(subdir_path));
836 }
837
838 #endif // defined(OS_POSIX)
839
840 #if defined(OS_WIN)
841 // Tests that the Delete function works for wild cards, especially
842 // with the recursion flag. Also coincidentally tests PathExists.
843 // TODO(erikkay): see if anyone's actually using this feature of the API
844 TEST_F(FileUtilTest, DeleteWildCard) {
845 // Create a file and a directory
846 FilePath file_name = temp_dir_.path().Append(FPL("Test DeleteWildCard.txt"));
847 CreateTextFile(file_name, bogus_content);
848 ASSERT_TRUE(PathExists(file_name));
849
850 FilePath subdir_path = temp_dir_.path().Append(FPL("DeleteWildCardDir"));
851 CreateDirectory(subdir_path);
852 ASSERT_TRUE(PathExists(subdir_path));
853
854 // Create the wildcard path
855 FilePath directory_contents = temp_dir_.path();
856 directory_contents = directory_contents.Append(FPL("*"));
857
858 // Delete non-recursively and check that only the file is deleted
859 EXPECT_TRUE(DeleteFile(directory_contents, false));
860 EXPECT_FALSE(PathExists(file_name));
861 EXPECT_TRUE(PathExists(subdir_path));
862
863 // Delete recursively and make sure all contents are deleted
864 EXPECT_TRUE(DeleteFile(directory_contents, true));
865 EXPECT_FALSE(PathExists(file_name));
866 EXPECT_FALSE(PathExists(subdir_path));
867 }
868
869 // TODO(erikkay): see if anyone's actually using this feature of the API
870 TEST_F(FileUtilTest, DeleteNonExistantWildCard) {
871 // Create a file and a directory
872 FilePath subdir_path =
873 temp_dir_.path().Append(FPL("DeleteNonExistantWildCard"));
874 CreateDirectory(subdir_path);
875 ASSERT_TRUE(PathExists(subdir_path));
876
877 // Create the wildcard path
878 FilePath directory_contents = subdir_path;
879 directory_contents = directory_contents.Append(FPL("*"));
880
881 // Delete non-recursively and check nothing got deleted
882 EXPECT_TRUE(DeleteFile(directory_contents, false));
883 EXPECT_TRUE(PathExists(subdir_path));
884
885 // Delete recursively and check nothing got deleted
886 EXPECT_TRUE(DeleteFile(directory_contents, true));
887 EXPECT_TRUE(PathExists(subdir_path));
888 }
889 #endif
890
891 // Tests non-recursive Delete() for a directory.
892 TEST_F(FileUtilTest, DeleteDirNonRecursive) {
893 // Create a subdirectory and put a file and two directories inside.
894 FilePath test_subdir = temp_dir_.path().Append(FPL("DeleteDirNonRecursive"));
895 CreateDirectory(test_subdir);
896 ASSERT_TRUE(PathExists(test_subdir));
897
898 FilePath file_name = test_subdir.Append(FPL("Test DeleteDir.txt"));
899 CreateTextFile(file_name, bogus_content);
900 ASSERT_TRUE(PathExists(file_name));
901
902 FilePath subdir_path1 = test_subdir.Append(FPL("TestSubDir1"));
903 CreateDirectory(subdir_path1);
904 ASSERT_TRUE(PathExists(subdir_path1));
905
906 FilePath subdir_path2 = test_subdir.Append(FPL("TestSubDir2"));
907 CreateDirectory(subdir_path2);
908 ASSERT_TRUE(PathExists(subdir_path2));
909
910 // Delete non-recursively and check that the empty dir got deleted
911 EXPECT_TRUE(DeleteFile(subdir_path2, false));
912 EXPECT_FALSE(PathExists(subdir_path2));
913
914 // Delete non-recursively and check that nothing got deleted
915 EXPECT_FALSE(DeleteFile(test_subdir, false));
916 EXPECT_TRUE(PathExists(test_subdir));
917 EXPECT_TRUE(PathExists(file_name));
918 EXPECT_TRUE(PathExists(subdir_path1));
919 }
920
921 // Tests recursive Delete() for a directory.
922 TEST_F(FileUtilTest, DeleteDirRecursive) {
923 // Create a subdirectory and put a file and two directories inside.
924 FilePath test_subdir = temp_dir_.path().Append(FPL("DeleteDirRecursive"));
925 CreateDirectory(test_subdir);
926 ASSERT_TRUE(PathExists(test_subdir));
927
928 FilePath file_name = test_subdir.Append(FPL("Test DeleteDirRecursive.txt"));
929 CreateTextFile(file_name, bogus_content);
930 ASSERT_TRUE(PathExists(file_name));
931
932 FilePath subdir_path1 = test_subdir.Append(FPL("TestSubDir1"));
933 CreateDirectory(subdir_path1);
934 ASSERT_TRUE(PathExists(subdir_path1));
935
936 FilePath subdir_path2 = test_subdir.Append(FPL("TestSubDir2"));
937 CreateDirectory(subdir_path2);
938 ASSERT_TRUE(PathExists(subdir_path2));
939
940 // Delete recursively and check that the empty dir got deleted
941 EXPECT_TRUE(DeleteFile(subdir_path2, true));
942 EXPECT_FALSE(PathExists(subdir_path2));
943
944 // Delete recursively and check that everything got deleted
945 EXPECT_TRUE(DeleteFile(test_subdir, true));
946 EXPECT_FALSE(PathExists(file_name));
947 EXPECT_FALSE(PathExists(subdir_path1));
948 EXPECT_FALSE(PathExists(test_subdir));
949 }
950
951 TEST_F(FileUtilTest, MoveFileNew) {
952 // Create a file
953 FilePath file_name_from =
954 temp_dir_.path().Append(FILE_PATH_LITERAL("Move_Test_File.txt"));
955 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
956 ASSERT_TRUE(PathExists(file_name_from));
957
958 // The destination.
959 FilePath file_name_to = temp_dir_.path().Append(
960 FILE_PATH_LITERAL("Move_Test_File_Destination.txt"));
961 ASSERT_FALSE(PathExists(file_name_to));
962
963 EXPECT_TRUE(Move(file_name_from, file_name_to));
964
965 // Check everything has been moved.
966 EXPECT_FALSE(PathExists(file_name_from));
967 EXPECT_TRUE(PathExists(file_name_to));
968 }
969
970 TEST_F(FileUtilTest, MoveFileExists) {
971 // Create a file
972 FilePath file_name_from =
973 temp_dir_.path().Append(FILE_PATH_LITERAL("Move_Test_File.txt"));
974 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
975 ASSERT_TRUE(PathExists(file_name_from));
976
977 // The destination name.
978 FilePath file_name_to = temp_dir_.path().Append(
979 FILE_PATH_LITERAL("Move_Test_File_Destination.txt"));
980 CreateTextFile(file_name_to, L"Old file content");
981 ASSERT_TRUE(PathExists(file_name_to));
982
983 EXPECT_TRUE(Move(file_name_from, file_name_to));
984
985 // Check everything has been moved.
986 EXPECT_FALSE(PathExists(file_name_from));
987 EXPECT_TRUE(PathExists(file_name_to));
988 EXPECT_TRUE(L"Gooooooooooooooooooooogle" == ReadTextFile(file_name_to));
989 }
990
991 TEST_F(FileUtilTest, MoveFileDirExists) {
992 // Create a file
993 FilePath file_name_from =
994 temp_dir_.path().Append(FILE_PATH_LITERAL("Move_Test_File.txt"));
995 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
996 ASSERT_TRUE(PathExists(file_name_from));
997
998 // The destination directory
999 FilePath dir_name_to =
1000 temp_dir_.path().Append(FILE_PATH_LITERAL("Destination"));
1001 CreateDirectory(dir_name_to);
1002 ASSERT_TRUE(PathExists(dir_name_to));
1003
1004 EXPECT_FALSE(Move(file_name_from, dir_name_to));
1005 }
1006
1007
1008 TEST_F(FileUtilTest, MoveNew) {
1009 // Create a directory
1010 FilePath dir_name_from =
1011 temp_dir_.path().Append(FILE_PATH_LITERAL("Move_From_Subdir"));
1012 CreateDirectory(dir_name_from);
1013 ASSERT_TRUE(PathExists(dir_name_from));
1014
1015 // Create a file under the directory
1016 FilePath txt_file_name(FILE_PATH_LITERAL("Move_Test_File.txt"));
1017 FilePath file_name_from = dir_name_from.Append(txt_file_name);
1018 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
1019 ASSERT_TRUE(PathExists(file_name_from));
1020
1021 // Move the directory.
1022 FilePath dir_name_to =
1023 temp_dir_.path().Append(FILE_PATH_LITERAL("Move_To_Subdir"));
1024 FilePath file_name_to =
1025 dir_name_to.Append(FILE_PATH_LITERAL("Move_Test_File.txt"));
1026
1027 ASSERT_FALSE(PathExists(dir_name_to));
1028
1029 EXPECT_TRUE(Move(dir_name_from, dir_name_to));
1030
1031 // Check everything has been moved.
1032 EXPECT_FALSE(PathExists(dir_name_from));
1033 EXPECT_FALSE(PathExists(file_name_from));
1034 EXPECT_TRUE(PathExists(dir_name_to));
1035 EXPECT_TRUE(PathExists(file_name_to));
1036
1037 // Test path traversal.
1038 file_name_from = dir_name_to.Append(txt_file_name);
1039 file_name_to = dir_name_to.Append(FILE_PATH_LITERAL(".."));
1040 file_name_to = file_name_to.Append(txt_file_name);
1041 EXPECT_FALSE(Move(file_name_from, file_name_to));
1042 EXPECT_TRUE(PathExists(file_name_from));
1043 EXPECT_FALSE(PathExists(file_name_to));
1044 EXPECT_TRUE(internal::MoveUnsafe(file_name_from, file_name_to));
1045 EXPECT_FALSE(PathExists(file_name_from));
1046 EXPECT_TRUE(PathExists(file_name_to));
1047 }
1048
1049 TEST_F(FileUtilTest, MoveExist) {
1050 // Create a directory
1051 FilePath dir_name_from =
1052 temp_dir_.path().Append(FILE_PATH_LITERAL("Move_From_Subdir"));
1053 CreateDirectory(dir_name_from);
1054 ASSERT_TRUE(PathExists(dir_name_from));
1055
1056 // Create a file under the directory
1057 FilePath file_name_from =
1058 dir_name_from.Append(FILE_PATH_LITERAL("Move_Test_File.txt"));
1059 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
1060 ASSERT_TRUE(PathExists(file_name_from));
1061
1062 // Move the directory
1063 FilePath dir_name_exists =
1064 temp_dir_.path().Append(FILE_PATH_LITERAL("Destination"));
1065
1066 FilePath dir_name_to =
1067 dir_name_exists.Append(FILE_PATH_LITERAL("Move_To_Subdir"));
1068 FilePath file_name_to =
1069 dir_name_to.Append(FILE_PATH_LITERAL("Move_Test_File.txt"));
1070
1071 // Create the destination directory.
1072 CreateDirectory(dir_name_exists);
1073 ASSERT_TRUE(PathExists(dir_name_exists));
1074
1075 EXPECT_TRUE(Move(dir_name_from, dir_name_to));
1076
1077 // Check everything has been moved.
1078 EXPECT_FALSE(PathExists(dir_name_from));
1079 EXPECT_FALSE(PathExists(file_name_from));
1080 EXPECT_TRUE(PathExists(dir_name_to));
1081 EXPECT_TRUE(PathExists(file_name_to));
1082 }
1083
1084 TEST_F(FileUtilTest, CopyDirectoryRecursivelyNew) {
1085 // Create a directory.
1086 FilePath dir_name_from =
1087 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_From_Subdir"));
1088 CreateDirectory(dir_name_from);
1089 ASSERT_TRUE(PathExists(dir_name_from));
1090
1091 // Create a file under the directory.
1092 FilePath file_name_from =
1093 dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1094 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
1095 ASSERT_TRUE(PathExists(file_name_from));
1096
1097 // Create a subdirectory.
1098 FilePath subdir_name_from =
1099 dir_name_from.Append(FILE_PATH_LITERAL("Subdir"));
1100 CreateDirectory(subdir_name_from);
1101 ASSERT_TRUE(PathExists(subdir_name_from));
1102
1103 // Create a file under the subdirectory.
1104 FilePath file_name2_from =
1105 subdir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1106 CreateTextFile(file_name2_from, L"Gooooooooooooooooooooogle");
1107 ASSERT_TRUE(PathExists(file_name2_from));
1108
1109 // Copy the directory recursively.
1110 FilePath dir_name_to =
1111 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_To_Subdir"));
1112 FilePath file_name_to =
1113 dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1114 FilePath subdir_name_to =
1115 dir_name_to.Append(FILE_PATH_LITERAL("Subdir"));
1116 FilePath file_name2_to =
1117 subdir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1118
1119 ASSERT_FALSE(PathExists(dir_name_to));
1120
1121 EXPECT_TRUE(CopyDirectory(dir_name_from, dir_name_to, true));
1122
1123 // Check everything has been copied.
1124 EXPECT_TRUE(PathExists(dir_name_from));
1125 EXPECT_TRUE(PathExists(file_name_from));
1126 EXPECT_TRUE(PathExists(subdir_name_from));
1127 EXPECT_TRUE(PathExists(file_name2_from));
1128 EXPECT_TRUE(PathExists(dir_name_to));
1129 EXPECT_TRUE(PathExists(file_name_to));
1130 EXPECT_TRUE(PathExists(subdir_name_to));
1131 EXPECT_TRUE(PathExists(file_name2_to));
1132 }
1133
1134 TEST_F(FileUtilTest, CopyDirectoryRecursivelyExists) {
1135 // Create a directory.
1136 FilePath dir_name_from =
1137 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_From_Subdir"));
1138 CreateDirectory(dir_name_from);
1139 ASSERT_TRUE(PathExists(dir_name_from));
1140
1141 // Create a file under the directory.
1142 FilePath file_name_from =
1143 dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1144 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
1145 ASSERT_TRUE(PathExists(file_name_from));
1146
1147 // Create a subdirectory.
1148 FilePath subdir_name_from =
1149 dir_name_from.Append(FILE_PATH_LITERAL("Subdir"));
1150 CreateDirectory(subdir_name_from);
1151 ASSERT_TRUE(PathExists(subdir_name_from));
1152
1153 // Create a file under the subdirectory.
1154 FilePath file_name2_from =
1155 subdir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1156 CreateTextFile(file_name2_from, L"Gooooooooooooooooooooogle");
1157 ASSERT_TRUE(PathExists(file_name2_from));
1158
1159 // Copy the directory recursively.
1160 FilePath dir_name_exists =
1161 temp_dir_.path().Append(FILE_PATH_LITERAL("Destination"));
1162
1163 FilePath dir_name_to =
1164 dir_name_exists.Append(FILE_PATH_LITERAL("Copy_From_Subdir"));
1165 FilePath file_name_to =
1166 dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1167 FilePath subdir_name_to =
1168 dir_name_to.Append(FILE_PATH_LITERAL("Subdir"));
1169 FilePath file_name2_to =
1170 subdir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1171
1172 // Create the destination directory.
1173 CreateDirectory(dir_name_exists);
1174 ASSERT_TRUE(PathExists(dir_name_exists));
1175
1176 EXPECT_TRUE(CopyDirectory(dir_name_from, dir_name_exists, true));
1177
1178 // Check everything has been copied.
1179 EXPECT_TRUE(PathExists(dir_name_from));
1180 EXPECT_TRUE(PathExists(file_name_from));
1181 EXPECT_TRUE(PathExists(subdir_name_from));
1182 EXPECT_TRUE(PathExists(file_name2_from));
1183 EXPECT_TRUE(PathExists(dir_name_to));
1184 EXPECT_TRUE(PathExists(file_name_to));
1185 EXPECT_TRUE(PathExists(subdir_name_to));
1186 EXPECT_TRUE(PathExists(file_name2_to));
1187 }
1188
1189 TEST_F(FileUtilTest, CopyDirectoryNew) {
1190 // Create a directory.
1191 FilePath dir_name_from =
1192 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_From_Subdir"));
1193 CreateDirectory(dir_name_from);
1194 ASSERT_TRUE(PathExists(dir_name_from));
1195
1196 // Create a file under the directory.
1197 FilePath file_name_from =
1198 dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1199 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
1200 ASSERT_TRUE(PathExists(file_name_from));
1201
1202 // Create a subdirectory.
1203 FilePath subdir_name_from =
1204 dir_name_from.Append(FILE_PATH_LITERAL("Subdir"));
1205 CreateDirectory(subdir_name_from);
1206 ASSERT_TRUE(PathExists(subdir_name_from));
1207
1208 // Create a file under the subdirectory.
1209 FilePath file_name2_from =
1210 subdir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1211 CreateTextFile(file_name2_from, L"Gooooooooooooooooooooogle");
1212 ASSERT_TRUE(PathExists(file_name2_from));
1213
1214 // Copy the directory not recursively.
1215 FilePath dir_name_to =
1216 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_To_Subdir"));
1217 FilePath file_name_to =
1218 dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1219 FilePath subdir_name_to =
1220 dir_name_to.Append(FILE_PATH_LITERAL("Subdir"));
1221
1222 ASSERT_FALSE(PathExists(dir_name_to));
1223
1224 EXPECT_TRUE(CopyDirectory(dir_name_from, dir_name_to, false));
1225
1226 // Check everything has been copied.
1227 EXPECT_TRUE(PathExists(dir_name_from));
1228 EXPECT_TRUE(PathExists(file_name_from));
1229 EXPECT_TRUE(PathExists(subdir_name_from));
1230 EXPECT_TRUE(PathExists(file_name2_from));
1231 EXPECT_TRUE(PathExists(dir_name_to));
1232 EXPECT_TRUE(PathExists(file_name_to));
1233 EXPECT_FALSE(PathExists(subdir_name_to));
1234 }
1235
1236 TEST_F(FileUtilTest, CopyDirectoryExists) {
1237 // Create a directory.
1238 FilePath dir_name_from =
1239 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_From_Subdir"));
1240 CreateDirectory(dir_name_from);
1241 ASSERT_TRUE(PathExists(dir_name_from));
1242
1243 // Create a file under the directory.
1244 FilePath file_name_from =
1245 dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1246 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
1247 ASSERT_TRUE(PathExists(file_name_from));
1248
1249 // Create a subdirectory.
1250 FilePath subdir_name_from =
1251 dir_name_from.Append(FILE_PATH_LITERAL("Subdir"));
1252 CreateDirectory(subdir_name_from);
1253 ASSERT_TRUE(PathExists(subdir_name_from));
1254
1255 // Create a file under the subdirectory.
1256 FilePath file_name2_from =
1257 subdir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1258 CreateTextFile(file_name2_from, L"Gooooooooooooooooooooogle");
1259 ASSERT_TRUE(PathExists(file_name2_from));
1260
1261 // Copy the directory not recursively.
1262 FilePath dir_name_to =
1263 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_To_Subdir"));
1264 FilePath file_name_to =
1265 dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1266 FilePath subdir_name_to =
1267 dir_name_to.Append(FILE_PATH_LITERAL("Subdir"));
1268
1269 // Create the destination directory.
1270 CreateDirectory(dir_name_to);
1271 ASSERT_TRUE(PathExists(dir_name_to));
1272
1273 EXPECT_TRUE(CopyDirectory(dir_name_from, dir_name_to, false));
1274
1275 // Check everything has been copied.
1276 EXPECT_TRUE(PathExists(dir_name_from));
1277 EXPECT_TRUE(PathExists(file_name_from));
1278 EXPECT_TRUE(PathExists(subdir_name_from));
1279 EXPECT_TRUE(PathExists(file_name2_from));
1280 EXPECT_TRUE(PathExists(dir_name_to));
1281 EXPECT_TRUE(PathExists(file_name_to));
1282 EXPECT_FALSE(PathExists(subdir_name_to));
1283 }
1284
1285 TEST_F(FileUtilTest, CopyFileWithCopyDirectoryRecursiveToNew) {
1286 // Create a file
1287 FilePath file_name_from =
1288 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1289 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
1290 ASSERT_TRUE(PathExists(file_name_from));
1291
1292 // The destination name
1293 FilePath file_name_to = temp_dir_.path().Append(
1294 FILE_PATH_LITERAL("Copy_Test_File_Destination.txt"));
1295 ASSERT_FALSE(PathExists(file_name_to));
1296
1297 EXPECT_TRUE(CopyDirectory(file_name_from, file_name_to, true));
1298
1299 // Check the has been copied
1300 EXPECT_TRUE(PathExists(file_name_to));
1301 }
1302
1303 TEST_F(FileUtilTest, CopyFileWithCopyDirectoryRecursiveToExisting) {
1304 // Create a file
1305 FilePath file_name_from =
1306 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1307 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
1308 ASSERT_TRUE(PathExists(file_name_from));
1309
1310 // The destination name
1311 FilePath file_name_to = temp_dir_.path().Append(
1312 FILE_PATH_LITERAL("Copy_Test_File_Destination.txt"));
1313 CreateTextFile(file_name_to, L"Old file content");
1314 ASSERT_TRUE(PathExists(file_name_to));
1315
1316 EXPECT_TRUE(CopyDirectory(file_name_from, file_name_to, true));
1317
1318 // Check the has been copied
1319 EXPECT_TRUE(PathExists(file_name_to));
1320 EXPECT_TRUE(L"Gooooooooooooooooooooogle" == ReadTextFile(file_name_to));
1321 }
1322
1323 TEST_F(FileUtilTest, CopyFileWithCopyDirectoryRecursiveToExistingDirectory) {
1324 // Create a file
1325 FilePath file_name_from =
1326 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1327 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
1328 ASSERT_TRUE(PathExists(file_name_from));
1329
1330 // The destination
1331 FilePath dir_name_to =
1332 temp_dir_.path().Append(FILE_PATH_LITERAL("Destination"));
1333 CreateDirectory(dir_name_to);
1334 ASSERT_TRUE(PathExists(dir_name_to));
1335 FilePath file_name_to =
1336 dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1337
1338 EXPECT_TRUE(CopyDirectory(file_name_from, dir_name_to, true));
1339
1340 // Check the has been copied
1341 EXPECT_TRUE(PathExists(file_name_to));
1342 }
1343
1344 TEST_F(FileUtilTest, CopyDirectoryWithTrailingSeparators) {
1345 // Create a directory.
1346 FilePath dir_name_from =
1347 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_From_Subdir"));
1348 CreateDirectory(dir_name_from);
1349 ASSERT_TRUE(PathExists(dir_name_from));
1350
1351 // Create a file under the directory.
1352 FilePath file_name_from =
1353 dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1354 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
1355 ASSERT_TRUE(PathExists(file_name_from));
1356
1357 // Copy the directory recursively.
1358 FilePath dir_name_to =
1359 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_To_Subdir"));
1360 FilePath file_name_to =
1361 dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1362
1363 // Create from path with trailing separators.
1364 #if defined(OS_WIN)
1365 FilePath from_path =
1366 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_From_Subdir\\\\\\"));
1367 #elif defined (OS_POSIX)
1368 FilePath from_path =
1369 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_From_Subdir///"));
1370 #endif
1371
1372 EXPECT_TRUE(CopyDirectory(from_path, dir_name_to, true));
1373
1374 // Check everything has been copied.
1375 EXPECT_TRUE(PathExists(dir_name_from));
1376 EXPECT_TRUE(PathExists(file_name_from));
1377 EXPECT_TRUE(PathExists(dir_name_to));
1378 EXPECT_TRUE(PathExists(file_name_to));
1379 }
1380
1381 // Sets the source file to read-only.
1382 void SetReadOnly(const FilePath& path) {
1383 #if defined(OS_WIN)
1384 // On Windows, it involves setting a bit.
1385 DWORD attrs = GetFileAttributes(path.value().c_str());
1386 ASSERT_NE(INVALID_FILE_ATTRIBUTES, attrs);
1387 ASSERT_TRUE(SetFileAttributes(
1388 path.value().c_str(), attrs | FILE_ATTRIBUTE_READONLY));
1389 attrs = GetFileAttributes(path.value().c_str());
1390 // Files in the temporary directory should not be indexed ever. If this
1391 // assumption change, fix this unit test accordingly.
1392 // FILE_ATTRIBUTE_NOT_CONTENT_INDEXED doesn't exist on XP.
1393 DWORD expected = FILE_ATTRIBUTE_ARCHIVE | FILE_ATTRIBUTE_READONLY;
1394 if (win::GetVersion() >= win::VERSION_VISTA)
1395 expected |= FILE_ATTRIBUTE_NOT_CONTENT_INDEXED;
1396 ASSERT_EQ(expected, attrs);
1397 #else
1398 // On all other platforms, it involves removing the write bit.
1399 EXPECT_TRUE(SetPosixFilePermissions(path, S_IRUSR));
1400 #endif
1401 }
1402
1403 bool IsReadOnly(const FilePath& path) {
1404 #if defined(OS_WIN)
1405 DWORD attrs = GetFileAttributes(path.value().c_str());
1406 EXPECT_NE(INVALID_FILE_ATTRIBUTES, attrs);
1407 return attrs & FILE_ATTRIBUTE_READONLY;
1408 #else
1409 int mode = 0;
1410 EXPECT_TRUE(GetPosixFilePermissions(path, &mode));
1411 return !(mode & S_IWUSR);
1412 #endif
1413 }
1414
1415 TEST_F(FileUtilTest, CopyDirectoryACL) {
1416 // Create a directory.
1417 FilePath src = temp_dir_.path().Append(FILE_PATH_LITERAL("src"));
1418 CreateDirectory(src);
1419 ASSERT_TRUE(PathExists(src));
1420
1421 // Create a file under the directory.
1422 FilePath src_file = src.Append(FILE_PATH_LITERAL("src.txt"));
1423 CreateTextFile(src_file, L"Gooooooooooooooooooooogle");
1424 SetReadOnly(src_file);
1425 ASSERT_TRUE(IsReadOnly(src_file));
1426
1427 // Copy the directory recursively.
1428 FilePath dst = temp_dir_.path().Append(FILE_PATH_LITERAL("dst"));
1429 FilePath dst_file = dst.Append(FILE_PATH_LITERAL("src.txt"));
1430 EXPECT_TRUE(CopyDirectory(src, dst, true));
1431
1432 ASSERT_FALSE(IsReadOnly(dst_file));
1433 }
1434
1435 TEST_F(FileUtilTest, CopyFile) {
1436 // Create a directory
1437 FilePath dir_name_from =
1438 temp_dir_.path().Append(FILE_PATH_LITERAL("Copy_From_Subdir"));
1439 CreateDirectory(dir_name_from);
1440 ASSERT_TRUE(PathExists(dir_name_from));
1441
1442 // Create a file under the directory
1443 FilePath file_name_from =
1444 dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt"));
1445 const std::wstring file_contents(L"Gooooooooooooooooooooogle");
1446 CreateTextFile(file_name_from, file_contents);
1447 ASSERT_TRUE(PathExists(file_name_from));
1448
1449 // Copy the file.
1450 FilePath dest_file = dir_name_from.Append(FILE_PATH_LITERAL("DestFile.txt"));
1451 ASSERT_TRUE(CopyFile(file_name_from, dest_file));
1452
1453 // Copy the file to another location using '..' in the path.
1454 FilePath dest_file2(dir_name_from);
1455 dest_file2 = dest_file2.AppendASCII("..");
1456 dest_file2 = dest_file2.AppendASCII("DestFile.txt");
1457 ASSERT_FALSE(CopyFile(file_name_from, dest_file2));
1458 ASSERT_TRUE(internal::CopyFileUnsafe(file_name_from, dest_file2));
1459
1460 FilePath dest_file2_test(dir_name_from);
1461 dest_file2_test = dest_file2_test.DirName();
1462 dest_file2_test = dest_file2_test.AppendASCII("DestFile.txt");
1463
1464 // Check everything has been copied.
1465 EXPECT_TRUE(PathExists(file_name_from));
1466 EXPECT_TRUE(PathExists(dest_file));
1467 const std::wstring read_contents = ReadTextFile(dest_file);
1468 EXPECT_EQ(file_contents, read_contents);
1469 EXPECT_TRUE(PathExists(dest_file2_test));
1470 EXPECT_TRUE(PathExists(dest_file2));
1471 }
1472
1473 TEST_F(FileUtilTest, CopyFileACL) {
1474 // While FileUtilTest.CopyFile asserts the content is correctly copied over,
1475 // this test case asserts the access control bits are meeting expectations in
1476 // CopyFileUnsafe().
1477 FilePath src = temp_dir_.path().Append(FILE_PATH_LITERAL("src.txt"));
1478 const std::wstring file_contents(L"Gooooooooooooooooooooogle");
1479 CreateTextFile(src, file_contents);
1480
1481 // Set the source file to read-only.
1482 ASSERT_FALSE(IsReadOnly(src));
1483 SetReadOnly(src);
1484 ASSERT_TRUE(IsReadOnly(src));
1485
1486 // Copy the file.
1487 FilePath dst = temp_dir_.path().Append(FILE_PATH_LITERAL("dst.txt"));
1488 ASSERT_TRUE(CopyFile(src, dst));
1489 EXPECT_EQ(file_contents, ReadTextFile(dst));
1490
1491 ASSERT_FALSE(IsReadOnly(dst));
1492 }
1493
1494 // file_util winds up using autoreleased objects on the Mac, so this needs
1495 // to be a PlatformTest.
1496 typedef PlatformTest ReadOnlyFileUtilTest;
1497
1498 TEST_F(ReadOnlyFileUtilTest, ContentsEqual) {
1499 FilePath data_dir;
1500 ASSERT_TRUE(PathService::Get(DIR_TEST_DATA, &data_dir));
1501 data_dir = data_dir.AppendASCII("file_util");
1502 ASSERT_TRUE(PathExists(data_dir));
1503
1504 FilePath original_file =
1505 data_dir.Append(FILE_PATH_LITERAL("original.txt"));
1506 FilePath same_file =
1507 data_dir.Append(FILE_PATH_LITERAL("same.txt"));
1508 FilePath same_length_file =
1509 data_dir.Append(FILE_PATH_LITERAL("same_length.txt"));
1510 FilePath different_file =
1511 data_dir.Append(FILE_PATH_LITERAL("different.txt"));
1512 FilePath different_first_file =
1513 data_dir.Append(FILE_PATH_LITERAL("different_first.txt"));
1514 FilePath different_last_file =
1515 data_dir.Append(FILE_PATH_LITERAL("different_last.txt"));
1516 FilePath empty1_file =
1517 data_dir.Append(FILE_PATH_LITERAL("empty1.txt"));
1518 FilePath empty2_file =
1519 data_dir.Append(FILE_PATH_LITERAL("empty2.txt"));
1520 FilePath shortened_file =
1521 data_dir.Append(FILE_PATH_LITERAL("shortened.txt"));
1522 FilePath binary_file =
1523 data_dir.Append(FILE_PATH_LITERAL("binary_file.bin"));
1524 FilePath binary_file_same =
1525 data_dir.Append(FILE_PATH_LITERAL("binary_file_same.bin"));
1526 FilePath binary_file_diff =
1527 data_dir.Append(FILE_PATH_LITERAL("binary_file_diff.bin"));
1528
1529 EXPECT_TRUE(ContentsEqual(original_file, original_file));
1530 EXPECT_TRUE(ContentsEqual(original_file, same_file));
1531 EXPECT_FALSE(ContentsEqual(original_file, same_length_file));
1532 EXPECT_FALSE(ContentsEqual(original_file, different_file));
1533 EXPECT_FALSE(ContentsEqual(FilePath(FILE_PATH_LITERAL("bogusname")),
1534 FilePath(FILE_PATH_LITERAL("bogusname"))));
1535 EXPECT_FALSE(ContentsEqual(original_file, different_first_file));
1536 EXPECT_FALSE(ContentsEqual(original_file, different_last_file));
1537 EXPECT_TRUE(ContentsEqual(empty1_file, empty2_file));
1538 EXPECT_FALSE(ContentsEqual(original_file, shortened_file));
1539 EXPECT_FALSE(ContentsEqual(shortened_file, original_file));
1540 EXPECT_TRUE(ContentsEqual(binary_file, binary_file_same));
1541 EXPECT_FALSE(ContentsEqual(binary_file, binary_file_diff));
1542 }
1543
1544 TEST_F(ReadOnlyFileUtilTest, TextContentsEqual) {
1545 FilePath data_dir;
1546 ASSERT_TRUE(PathService::Get(DIR_TEST_DATA, &data_dir));
1547 data_dir = data_dir.AppendASCII("file_util");
1548 ASSERT_TRUE(PathExists(data_dir));
1549
1550 FilePath original_file =
1551 data_dir.Append(FILE_PATH_LITERAL("original.txt"));
1552 FilePath same_file =
1553 data_dir.Append(FILE_PATH_LITERAL("same.txt"));
1554 FilePath crlf_file =
1555 data_dir.Append(FILE_PATH_LITERAL("crlf.txt"));
1556 FilePath shortened_file =
1557 data_dir.Append(FILE_PATH_LITERAL("shortened.txt"));
1558 FilePath different_file =
1559 data_dir.Append(FILE_PATH_LITERAL("different.txt"));
1560 FilePath different_first_file =
1561 data_dir.Append(FILE_PATH_LITERAL("different_first.txt"));
1562 FilePath different_last_file =
1563 data_dir.Append(FILE_PATH_LITERAL("different_last.txt"));
1564 FilePath first1_file =
1565 data_dir.Append(FILE_PATH_LITERAL("first1.txt"));
1566 FilePath first2_file =
1567 data_dir.Append(FILE_PATH_LITERAL("first2.txt"));
1568 FilePath empty1_file =
1569 data_dir.Append(FILE_PATH_LITERAL("empty1.txt"));
1570 FilePath empty2_file =
1571 data_dir.Append(FILE_PATH_LITERAL("empty2.txt"));
1572 FilePath blank_line_file =
1573 data_dir.Append(FILE_PATH_LITERAL("blank_line.txt"));
1574 FilePath blank_line_crlf_file =
1575 data_dir.Append(FILE_PATH_LITERAL("blank_line_crlf.txt"));
1576
1577 EXPECT_TRUE(TextContentsEqual(original_file, same_file));
1578 EXPECT_TRUE(TextContentsEqual(original_file, crlf_file));
1579 EXPECT_FALSE(TextContentsEqual(original_file, shortened_file));
1580 EXPECT_FALSE(TextContentsEqual(original_file, different_file));
1581 EXPECT_FALSE(TextContentsEqual(original_file, different_first_file));
1582 EXPECT_FALSE(TextContentsEqual(original_file, different_last_file));
1583 EXPECT_FALSE(TextContentsEqual(first1_file, first2_file));
1584 EXPECT_TRUE(TextContentsEqual(empty1_file, empty2_file));
1585 EXPECT_FALSE(TextContentsEqual(original_file, empty1_file));
1586 EXPECT_TRUE(TextContentsEqual(blank_line_file, blank_line_crlf_file));
1587 }
1588
1589 // We don't need equivalent functionality outside of Windows.
1590 #if defined(OS_WIN)
1591 TEST_F(FileUtilTest, CopyAndDeleteDirectoryTest) {
1592 // Create a directory
1593 FilePath dir_name_from =
1594 temp_dir_.path().Append(FILE_PATH_LITERAL("CopyAndDelete_From_Subdir"));
1595 CreateDirectory(dir_name_from);
1596 ASSERT_TRUE(PathExists(dir_name_from));
1597
1598 // Create a file under the directory
1599 FilePath file_name_from =
1600 dir_name_from.Append(FILE_PATH_LITERAL("CopyAndDelete_Test_File.txt"));
1601 CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle");
1602 ASSERT_TRUE(PathExists(file_name_from));
1603
1604 // Move the directory by using CopyAndDeleteDirectory
1605 FilePath dir_name_to = temp_dir_.path().Append(
1606 FILE_PATH_LITERAL("CopyAndDelete_To_Subdir"));
1607 FilePath file_name_to =
1608 dir_name_to.Append(FILE_PATH_LITERAL("CopyAndDelete_Test_File.txt"));
1609
1610 ASSERT_FALSE(PathExists(dir_name_to));
1611
1612 EXPECT_TRUE(internal::CopyAndDeleteDirectory(dir_name_from,
1613 dir_name_to));
1614
1615 // Check everything has been moved.
1616 EXPECT_FALSE(PathExists(dir_name_from));
1617 EXPECT_FALSE(PathExists(file_name_from));
1618 EXPECT_TRUE(PathExists(dir_name_to));
1619 EXPECT_TRUE(PathExists(file_name_to));
1620 }
1621
1622 TEST_F(FileUtilTest, GetTempDirTest) {
1623 static const TCHAR* kTmpKey = _T("TMP");
1624 static const TCHAR* kTmpValues[] = {
1625 _T(""), _T("C:"), _T("C:\\"), _T("C:\\tmp"), _T("C:\\tmp\\")
1626 };
1627 // Save the original $TMP.
1628 size_t original_tmp_size;
1629 TCHAR* original_tmp;
1630 ASSERT_EQ(0, ::_tdupenv_s(&original_tmp, &original_tmp_size, kTmpKey));
1631 // original_tmp may be NULL.
1632
1633 for (unsigned int i = 0; i < arraysize(kTmpValues); ++i) {
1634 FilePath path;
1635 ::_tputenv_s(kTmpKey, kTmpValues[i]);
1636 GetTempDir(&path);
1637 EXPECT_TRUE(path.IsAbsolute()) << "$TMP=" << kTmpValues[i] <<
1638 " result=" << path.value();
1639 }
1640
1641 // Restore the original $TMP.
1642 if (original_tmp) {
1643 ::_tputenv_s(kTmpKey, original_tmp);
1644 free(original_tmp);
1645 } else {
1646 ::_tputenv_s(kTmpKey, _T(""));
1647 }
1648 }
1649 #endif // OS_WIN
1650
1651 TEST_F(FileUtilTest, CreateTemporaryFileTest) {
1652 FilePath temp_files[3];
1653 for (int i = 0; i < 3; i++) {
1654 ASSERT_TRUE(CreateTemporaryFile(&(temp_files[i])));
1655 EXPECT_TRUE(PathExists(temp_files[i]));
1656 EXPECT_FALSE(DirectoryExists(temp_files[i]));
1657 }
1658 for (int i = 0; i < 3; i++)
1659 EXPECT_FALSE(temp_files[i] == temp_files[(i+1)%3]);
1660 for (int i = 0; i < 3; i++)
1661 EXPECT_TRUE(DeleteFile(temp_files[i], false));
1662 }
1663
1664 TEST_F(FileUtilTest, CreateAndOpenTemporaryFileTest) {
1665 FilePath names[3];
1666 FILE* fps[3];
1667 int i;
1668
1669 // Create; make sure they are open and exist.
1670 for (i = 0; i < 3; ++i) {
1671 fps[i] = CreateAndOpenTemporaryFile(&(names[i]));
1672 ASSERT_TRUE(fps[i]);
1673 EXPECT_TRUE(PathExists(names[i]));
1674 }
1675
1676 // Make sure all names are unique.
1677 for (i = 0; i < 3; ++i) {
1678 EXPECT_FALSE(names[i] == names[(i+1)%3]);
1679 }
1680
1681 // Close and delete.
1682 for (i = 0; i < 3; ++i) {
1683 EXPECT_TRUE(CloseFile(fps[i]));
1684 EXPECT_TRUE(DeleteFile(names[i], false));
1685 }
1686 }
1687
1688 TEST_F(FileUtilTest, FileToFILE) {
1689 File file;
1690 FILE* stream = FileToFILE(file.Pass(), "w");
1691 EXPECT_FALSE(stream);
1692
1693 FilePath file_name = temp_dir_.path().Append(FPL("The file.txt"));
1694 file = File(file_name, File::FLAG_CREATE | File::FLAG_WRITE);
1695 EXPECT_TRUE(file.IsValid());
1696
1697 stream = FileToFILE(file.Pass(), "w");
1698 EXPECT_TRUE(stream);
1699 EXPECT_FALSE(file.IsValid());
1700 EXPECT_TRUE(CloseFile(stream));
1701 }
1702
1703 TEST_F(FileUtilTest, CreateNewTempDirectoryTest) {
1704 FilePath temp_dir;
1705 ASSERT_TRUE(CreateNewTempDirectory(FilePath::StringType(), &temp_dir));
1706 EXPECT_TRUE(PathExists(temp_dir));
1707 EXPECT_TRUE(DeleteFile(temp_dir, false));
1708 }
1709
1710 TEST_F(FileUtilTest, CreateNewTemporaryDirInDirTest) {
1711 FilePath new_dir;
1712 ASSERT_TRUE(CreateTemporaryDirInDir(
1713 temp_dir_.path(),
1714 FILE_PATH_LITERAL("CreateNewTemporaryDirInDirTest"),
1715 &new_dir));
1716 EXPECT_TRUE(PathExists(new_dir));
1717 EXPECT_TRUE(temp_dir_.path().IsParent(new_dir));
1718 EXPECT_TRUE(DeleteFile(new_dir, false));
1719 }
1720
1721 #if defined(OS_POSIX)
1722 TEST_F(FileUtilTest, GetShmemTempDirTest) {
1723 FilePath dir;
1724 EXPECT_TRUE(GetShmemTempDir(false, &dir));
1725 EXPECT_TRUE(DirectoryExists(dir));
1726 }
1727 #endif
1728
1729 TEST_F(FileUtilTest, GetHomeDirTest) {
1730 #if !defined(OS_ANDROID) // Not implemented on Android.
1731 // We don't actually know what the home directory is supposed to be without
1732 // calling some OS functions which would just duplicate the implementation.
1733 // So here we just test that it returns something "reasonable".
1734 FilePath home = GetHomeDir();
1735 ASSERT_FALSE(home.empty());
1736 ASSERT_TRUE(home.IsAbsolute());
1737 #endif
1738 }
1739
1740 TEST_F(FileUtilTest, CreateDirectoryTest) {
1741 FilePath test_root =
1742 temp_dir_.path().Append(FILE_PATH_LITERAL("create_directory_test"));
1743 #if defined(OS_WIN)
1744 FilePath test_path =
1745 test_root.Append(FILE_PATH_LITERAL("dir\\tree\\likely\\doesnt\\exist\\"));
1746 #elif defined(OS_POSIX)
1747 FilePath test_path =
1748 test_root.Append(FILE_PATH_LITERAL("dir/tree/likely/doesnt/exist/"));
1749 #endif
1750
1751 EXPECT_FALSE(PathExists(test_path));
1752 EXPECT_TRUE(CreateDirectory(test_path));
1753 EXPECT_TRUE(PathExists(test_path));
1754 // CreateDirectory returns true if the DirectoryExists returns true.
1755 EXPECT_TRUE(CreateDirectory(test_path));
1756
1757 // Doesn't work to create it on top of a non-dir
1758 test_path = test_path.Append(FILE_PATH_LITERAL("foobar.txt"));
1759 EXPECT_FALSE(PathExists(test_path));
1760 CreateTextFile(test_path, L"test file");
1761 EXPECT_TRUE(PathExists(test_path));
1762 EXPECT_FALSE(CreateDirectory(test_path));
1763
1764 EXPECT_TRUE(DeleteFile(test_root, true));
1765 EXPECT_FALSE(PathExists(test_root));
1766 EXPECT_FALSE(PathExists(test_path));
1767
1768 // Verify assumptions made by the Windows implementation:
1769 // 1. The current directory always exists.
1770 // 2. The root directory always exists.
1771 ASSERT_TRUE(DirectoryExists(FilePath(FilePath::kCurrentDirectory)));
1772 FilePath top_level = test_root;
1773 while (top_level != top_level.DirName()) {
1774 top_level = top_level.DirName();
1775 }
1776 ASSERT_TRUE(DirectoryExists(top_level));
1777
1778 // Given these assumptions hold, it should be safe to
1779 // test that "creating" these directories succeeds.
1780 EXPECT_TRUE(CreateDirectory(
1781 FilePath(FilePath::kCurrentDirectory)));
1782 EXPECT_TRUE(CreateDirectory(top_level));
1783
1784 #if defined(OS_WIN)
1785 FilePath invalid_drive(FILE_PATH_LITERAL("o:\\"));
1786 FilePath invalid_path =
1787 invalid_drive.Append(FILE_PATH_LITERAL("some\\inaccessible\\dir"));
1788 if (!PathExists(invalid_drive)) {
1789 EXPECT_FALSE(CreateDirectory(invalid_path));
1790 }
1791 #endif
1792 }
1793
1794 TEST_F(FileUtilTest, DetectDirectoryTest) {
1795 // Check a directory
1796 FilePath test_root =
1797 temp_dir_.path().Append(FILE_PATH_LITERAL("detect_directory_test"));
1798 EXPECT_FALSE(PathExists(test_root));
1799 EXPECT_TRUE(CreateDirectory(test_root));
1800 EXPECT_TRUE(PathExists(test_root));
1801 EXPECT_TRUE(DirectoryExists(test_root));
1802 // Check a file
1803 FilePath test_path =
1804 test_root.Append(FILE_PATH_LITERAL("foobar.txt"));
1805 EXPECT_FALSE(PathExists(test_path));
1806 CreateTextFile(test_path, L"test file");
1807 EXPECT_TRUE(PathExists(test_path));
1808 EXPECT_FALSE(DirectoryExists(test_path));
1809 EXPECT_TRUE(DeleteFile(test_path, false));
1810
1811 EXPECT_TRUE(DeleteFile(test_root, true));
1812 }
1813
1814 TEST_F(FileUtilTest, FileEnumeratorTest) {
1815 // Test an empty directory.
1816 FileEnumerator f0(temp_dir_.path(), true, FILES_AND_DIRECTORIES);
1817 EXPECT_EQ(FPL(""), f0.Next().value());
1818 EXPECT_EQ(FPL(""), f0.Next().value());
1819
1820 // Test an empty directory, non-recursively, including "..".
1821 FileEnumerator f0_dotdot(temp_dir_.path(), false,
1822 FILES_AND_DIRECTORIES | FileEnumerator::INCLUDE_DOT_DOT);
1823 EXPECT_EQ(temp_dir_.path().Append(FPL("..")).value(),
1824 f0_dotdot.Next().value());
1825 EXPECT_EQ(FPL(""), f0_dotdot.Next().value());
1826
1827 // create the directories
1828 FilePath dir1 = temp_dir_.path().Append(FPL("dir1"));
1829 EXPECT_TRUE(CreateDirectory(dir1));
1830 FilePath dir2 = temp_dir_.path().Append(FPL("dir2"));
1831 EXPECT_TRUE(CreateDirectory(dir2));
1832 FilePath dir2inner = dir2.Append(FPL("inner"));
1833 EXPECT_TRUE(CreateDirectory(dir2inner));
1834
1835 // create the files
1836 FilePath dir2file = dir2.Append(FPL("dir2file.txt"));
1837 CreateTextFile(dir2file, std::wstring());
1838 FilePath dir2innerfile = dir2inner.Append(FPL("innerfile.txt"));
1839 CreateTextFile(dir2innerfile, std::wstring());
1840 FilePath file1 = temp_dir_.path().Append(FPL("file1.txt"));
1841 CreateTextFile(file1, std::wstring());
1842 FilePath file2_rel = dir2.Append(FilePath::kParentDirectory)
1843 .Append(FPL("file2.txt"));
1844 CreateTextFile(file2_rel, std::wstring());
1845 FilePath file2_abs = temp_dir_.path().Append(FPL("file2.txt"));
1846
1847 // Only enumerate files.
1848 FileEnumerator f1(temp_dir_.path(), true, FileEnumerator::FILES);
1849 FindResultCollector c1(f1);
1850 EXPECT_TRUE(c1.HasFile(file1));
1851 EXPECT_TRUE(c1.HasFile(file2_abs));
1852 EXPECT_TRUE(c1.HasFile(dir2file));
1853 EXPECT_TRUE(c1.HasFile(dir2innerfile));
1854 EXPECT_EQ(4, c1.size());
1855
1856 // Only enumerate directories.
1857 FileEnumerator f2(temp_dir_.path(), true, FileEnumerator::DIRECTORIES);
1858 FindResultCollector c2(f2);
1859 EXPECT_TRUE(c2.HasFile(dir1));
1860 EXPECT_TRUE(c2.HasFile(dir2));
1861 EXPECT_TRUE(c2.HasFile(dir2inner));
1862 EXPECT_EQ(3, c2.size());
1863
1864 // Only enumerate directories non-recursively.
1865 FileEnumerator f2_non_recursive(
1866 temp_dir_.path(), false, FileEnumerator::DIRECTORIES);
1867 FindResultCollector c2_non_recursive(f2_non_recursive);
1868 EXPECT_TRUE(c2_non_recursive.HasFile(dir1));
1869 EXPECT_TRUE(c2_non_recursive.HasFile(dir2));
1870 EXPECT_EQ(2, c2_non_recursive.size());
1871
1872 // Only enumerate directories, non-recursively, including "..".
1873 FileEnumerator f2_dotdot(temp_dir_.path(), false,
1874 FileEnumerator::DIRECTORIES |
1875 FileEnumerator::INCLUDE_DOT_DOT);
1876 FindResultCollector c2_dotdot(f2_dotdot);
1877 EXPECT_TRUE(c2_dotdot.HasFile(dir1));
1878 EXPECT_TRUE(c2_dotdot.HasFile(dir2));
1879 EXPECT_TRUE(c2_dotdot.HasFile(temp_dir_.path().Append(FPL(".."))));
1880 EXPECT_EQ(3, c2_dotdot.size());
1881
1882 // Enumerate files and directories.
1883 FileEnumerator f3(temp_dir_.path(), true, FILES_AND_DIRECTORIES);
1884 FindResultCollector c3(f3);
1885 EXPECT_TRUE(c3.HasFile(dir1));
1886 EXPECT_TRUE(c3.HasFile(dir2));
1887 EXPECT_TRUE(c3.HasFile(file1));
1888 EXPECT_TRUE(c3.HasFile(file2_abs));
1889 EXPECT_TRUE(c3.HasFile(dir2file));
1890 EXPECT_TRUE(c3.HasFile(dir2inner));
1891 EXPECT_TRUE(c3.HasFile(dir2innerfile));
1892 EXPECT_EQ(7, c3.size());
1893
1894 // Non-recursive operation.
1895 FileEnumerator f4(temp_dir_.path(), false, FILES_AND_DIRECTORIES);
1896 FindResultCollector c4(f4);
1897 EXPECT_TRUE(c4.HasFile(dir2));
1898 EXPECT_TRUE(c4.HasFile(dir2));
1899 EXPECT_TRUE(c4.HasFile(file1));
1900 EXPECT_TRUE(c4.HasFile(file2_abs));
1901 EXPECT_EQ(4, c4.size());
1902
1903 // Enumerate with a pattern.
1904 FileEnumerator f5(temp_dir_.path(), true, FILES_AND_DIRECTORIES, FPL("dir*"));
1905 FindResultCollector c5(f5);
1906 EXPECT_TRUE(c5.HasFile(dir1));
1907 EXPECT_TRUE(c5.HasFile(dir2));
1908 EXPECT_TRUE(c5.HasFile(dir2file));
1909 EXPECT_TRUE(c5.HasFile(dir2inner));
1910 EXPECT_TRUE(c5.HasFile(dir2innerfile));
1911 EXPECT_EQ(5, c5.size());
1912
1913 #if defined(OS_WIN)
1914 {
1915 // Make dir1 point to dir2.
1916 ReparsePoint reparse_point(dir1, dir2);
1917 EXPECT_TRUE(reparse_point.IsValid());
1918
1919 if ((win::GetVersion() >= win::VERSION_VISTA)) {
1920 // There can be a delay for the enumeration code to see the change on
1921 // the file system so skip this test for XP.
1922 // Enumerate the reparse point.
1923 FileEnumerator f6(dir1, true, FILES_AND_DIRECTORIES);
1924 FindResultCollector c6(f6);
1925 FilePath inner2 = dir1.Append(FPL("inner"));
1926 EXPECT_TRUE(c6.HasFile(inner2));
1927 EXPECT_TRUE(c6.HasFile(inner2.Append(FPL("innerfile.txt"))));
1928 EXPECT_TRUE(c6.HasFile(dir1.Append(FPL("dir2file.txt"))));
1929 EXPECT_EQ(3, c6.size());
1930 }
1931
1932 // No changes for non recursive operation.
1933 FileEnumerator f7(temp_dir_.path(), false, FILES_AND_DIRECTORIES);
1934 FindResultCollector c7(f7);
1935 EXPECT_TRUE(c7.HasFile(dir2));
1936 EXPECT_TRUE(c7.HasFile(dir2));
1937 EXPECT_TRUE(c7.HasFile(file1));
1938 EXPECT_TRUE(c7.HasFile(file2_abs));
1939 EXPECT_EQ(4, c7.size());
1940
1941 // Should not enumerate inside dir1 when using recursion.
1942 FileEnumerator f8(temp_dir_.path(), true, FILES_AND_DIRECTORIES);
1943 FindResultCollector c8(f8);
1944 EXPECT_TRUE(c8.HasFile(dir1));
1945 EXPECT_TRUE(c8.HasFile(dir2));
1946 EXPECT_TRUE(c8.HasFile(file1));
1947 EXPECT_TRUE(c8.HasFile(file2_abs));
1948 EXPECT_TRUE(c8.HasFile(dir2file));
1949 EXPECT_TRUE(c8.HasFile(dir2inner));
1950 EXPECT_TRUE(c8.HasFile(dir2innerfile));
1951 EXPECT_EQ(7, c8.size());
1952 }
1953 #endif
1954
1955 // Make sure the destructor closes the find handle while in the middle of a
1956 // query to allow TearDown to delete the directory.
1957 FileEnumerator f9(temp_dir_.path(), true, FILES_AND_DIRECTORIES);
1958 EXPECT_FALSE(f9.Next().value().empty()); // Should have found something
1959 // (we don't care what).
1960 }
1961
1962 TEST_F(FileUtilTest, AppendToFile) {
1963 FilePath data_dir =
1964 temp_dir_.path().Append(FILE_PATH_LITERAL("FilePathTest"));
1965
1966 // Create a fresh, empty copy of this directory.
1967 if (PathExists(data_dir)) {
1968 ASSERT_TRUE(DeleteFile(data_dir, true));
1969 }
1970 ASSERT_TRUE(CreateDirectory(data_dir));
1971
1972 // Create a fresh, empty copy of this directory.
1973 if (PathExists(data_dir)) {
1974 ASSERT_TRUE(DeleteFile(data_dir, true));
1975 }
1976 ASSERT_TRUE(CreateDirectory(data_dir));
1977 FilePath foobar(data_dir.Append(FILE_PATH_LITERAL("foobar.txt")));
1978
1979 std::string data("hello");
1980 EXPECT_EQ(-1, AppendToFile(foobar, data.c_str(), data.length()));
1981 EXPECT_EQ(static_cast<int>(data.length()),
1982 WriteFile(foobar, data.c_str(), data.length()));
1983 EXPECT_EQ(static_cast<int>(data.length()),
1984 AppendToFile(foobar, data.c_str(), data.length()));
1985
1986 const std::wstring read_content = ReadTextFile(foobar);
1987 EXPECT_EQ(L"hellohello", read_content);
1988 }
1989
1990 TEST_F(FileUtilTest, ReadFile) {
1991 // Create a test file to be read.
1992 const std::string kTestData("The quick brown fox jumps over the lazy dog.");
1993 FilePath file_path =
1994 temp_dir_.path().Append(FILE_PATH_LITERAL("ReadFileTest"));
1995
1996 ASSERT_EQ(static_cast<int>(kTestData.size()),
1997 WriteFile(file_path, kTestData.data(), kTestData.size()));
1998
1999 // Make buffers with various size.
2000 std::vector<char> small_buffer(kTestData.size() / 2);
2001 std::vector<char> exact_buffer(kTestData.size());
2002 std::vector<char> large_buffer(kTestData.size() * 2);
2003
2004 // Read the file with smaller buffer.
2005 int bytes_read_small = ReadFile(
2006 file_path, &small_buffer[0], static_cast<int>(small_buffer.size()));
2007 EXPECT_EQ(static_cast<int>(small_buffer.size()), bytes_read_small);
2008 EXPECT_EQ(
2009 std::string(kTestData.begin(), kTestData.begin() + small_buffer.size()),
2010 std::string(small_buffer.begin(), small_buffer.end()));
2011
2012 // Read the file with buffer which have exactly same size.
2013 int bytes_read_exact = ReadFile(
2014 file_path, &exact_buffer[0], static_cast<int>(exact_buffer.size()));
2015 EXPECT_EQ(static_cast<int>(kTestData.size()), bytes_read_exact);
2016 EXPECT_EQ(kTestData, std::string(exact_buffer.begin(), exact_buffer.end()));
2017
2018 // Read the file with larger buffer.
2019 int bytes_read_large = ReadFile(
2020 file_path, &large_buffer[0], static_cast<int>(large_buffer.size()));
2021 EXPECT_EQ(static_cast<int>(kTestData.size()), bytes_read_large);
2022 EXPECT_EQ(kTestData, std::string(large_buffer.begin(),
2023 large_buffer.begin() + kTestData.size()));
2024
2025 // Make sure the return value is -1 if the file doesn't exist.
2026 FilePath file_path_not_exist =
2027 temp_dir_.path().Append(FILE_PATH_LITERAL("ReadFileNotExistTest"));
2028 EXPECT_EQ(-1,
2029 ReadFile(file_path_not_exist,
2030 &exact_buffer[0],
2031 static_cast<int>(exact_buffer.size())));
2032 }
2033
2034 TEST_F(FileUtilTest, ReadFileToString) {
2035 const char kTestData[] = "0123";
2036 std::string data;
2037
2038 FilePath file_path =
2039 temp_dir_.path().Append(FILE_PATH_LITERAL("ReadFileToStringTest"));
2040 FilePath file_path_dangerous =
2041 temp_dir_.path().Append(FILE_PATH_LITERAL("..")).
2042 Append(temp_dir_.path().BaseName()).
2043 Append(FILE_PATH_LITERAL("ReadFileToStringTest"));
2044
2045 // Create test file.
2046 ASSERT_EQ(4, WriteFile(file_path, kTestData, 4));
2047
2048 EXPECT_TRUE(ReadFileToString(file_path, &data));
2049 EXPECT_EQ(kTestData, data);
2050
2051 data = "temp";
2052 EXPECT_FALSE(ReadFileToString(file_path, &data, 0));
2053 EXPECT_EQ(0u, data.length());
2054
2055 data = "temp";
2056 EXPECT_FALSE(ReadFileToString(file_path, &data, 2));
2057 EXPECT_EQ("01", data);
2058
2059 data.clear();
2060 EXPECT_FALSE(ReadFileToString(file_path, &data, 3));
2061 EXPECT_EQ("012", data);
2062
2063 data.clear();
2064 EXPECT_TRUE(ReadFileToString(file_path, &data, 4));
2065 EXPECT_EQ("0123", data);
2066
2067 data.clear();
2068 EXPECT_TRUE(ReadFileToString(file_path, &data, 6));
2069 EXPECT_EQ("0123", data);
2070
2071 EXPECT_TRUE(ReadFileToString(file_path, NULL, 6));
2072
2073 EXPECT_TRUE(ReadFileToString(file_path, NULL));
2074
2075 data = "temp";
2076 EXPECT_FALSE(ReadFileToString(file_path_dangerous, &data));
2077 EXPECT_EQ(0u, data.length());
2078
2079 // Delete test file.
2080 EXPECT_TRUE(base::DeleteFile(file_path, false));
2081
2082 data = "temp";
2083 EXPECT_FALSE(ReadFileToString(file_path, &data));
2084 EXPECT_EQ(0u, data.length());
2085
2086 data = "temp";
2087 EXPECT_FALSE(ReadFileToString(file_path, &data, 6));
2088 EXPECT_EQ(0u, data.length());
2089 }
2090
2091 TEST_F(FileUtilTest, TouchFile) {
2092 FilePath data_dir =
2093 temp_dir_.path().Append(FILE_PATH_LITERAL("FilePathTest"));
2094
2095 // Create a fresh, empty copy of this directory.
2096 if (PathExists(data_dir)) {
2097 ASSERT_TRUE(DeleteFile(data_dir, true));
2098 }
2099 ASSERT_TRUE(CreateDirectory(data_dir));
2100
2101 FilePath foobar(data_dir.Append(FILE_PATH_LITERAL("foobar.txt")));
2102 std::string data("hello");
2103 ASSERT_TRUE(WriteFile(foobar, data.c_str(), data.length()));
2104
2105 Time access_time;
2106 // This timestamp is divisible by one day (in local timezone),
2107 // to make it work on FAT too.
2108 ASSERT_TRUE(Time::FromString("Wed, 16 Nov 1994, 00:00:00",
2109 &access_time));
2110
2111 Time modification_time;
2112 // Note that this timestamp is divisible by two (seconds) - FAT stores
2113 // modification times with 2s resolution.
2114 ASSERT_TRUE(Time::FromString("Tue, 15 Nov 1994, 12:45:26 GMT",
2115 &modification_time));
2116
2117 ASSERT_TRUE(TouchFile(foobar, access_time, modification_time));
2118 File::Info file_info;
2119 ASSERT_TRUE(GetFileInfo(foobar, &file_info));
2120 EXPECT_EQ(access_time.ToInternalValue(),
2121 file_info.last_accessed.ToInternalValue());
2122 EXPECT_EQ(modification_time.ToInternalValue(),
2123 file_info.last_modified.ToInternalValue());
2124 }
2125
2126 TEST_F(FileUtilTest, IsDirectoryEmpty) {
2127 FilePath empty_dir = temp_dir_.path().Append(FILE_PATH_LITERAL("EmptyDir"));
2128
2129 ASSERT_FALSE(PathExists(empty_dir));
2130
2131 ASSERT_TRUE(CreateDirectory(empty_dir));
2132
2133 EXPECT_TRUE(IsDirectoryEmpty(empty_dir));
2134
2135 FilePath foo(empty_dir.Append(FILE_PATH_LITERAL("foo.txt")));
2136 std::string bar("baz");
2137 ASSERT_TRUE(WriteFile(foo, bar.c_str(), bar.length()));
2138
2139 EXPECT_FALSE(IsDirectoryEmpty(empty_dir));
2140 }
2141
2142 #if defined(OS_POSIX)
2143
2144 // Testing VerifyPathControlledByAdmin() is hard, because there is no
2145 // way a test can make a file owned by root, or change file paths
2146 // at the root of the file system. VerifyPathControlledByAdmin()
2147 // is implemented as a call to VerifyPathControlledByUser, which gives
2148 // us the ability to test with paths under the test's temp directory,
2149 // using a user id we control.
2150 // Pull tests of VerifyPathControlledByUserTest() into a separate test class
2151 // with a common SetUp() method.
2152 class VerifyPathControlledByUserTest : public FileUtilTest {
2153 protected:
2154 virtual void SetUp() OVERRIDE {
2155 FileUtilTest::SetUp();
2156
2157 // Create a basic structure used by each test.
2158 // base_dir_
2159 // |-> sub_dir_
2160 // |-> text_file_
2161
2162 base_dir_ = temp_dir_.path().AppendASCII("base_dir");
2163 ASSERT_TRUE(CreateDirectory(base_dir_));
2164
2165 sub_dir_ = base_dir_.AppendASCII("sub_dir");
2166 ASSERT_TRUE(CreateDirectory(sub_dir_));
2167
2168 text_file_ = sub_dir_.AppendASCII("file.txt");
2169 CreateTextFile(text_file_, L"This text file has some text in it.");
2170
2171 // Get the user and group files are created with from |base_dir_|.
2172 struct stat stat_buf;
2173 ASSERT_EQ(0, stat(base_dir_.value().c_str(), &stat_buf));
2174 uid_ = stat_buf.st_uid;
2175 ok_gids_.insert(stat_buf.st_gid);
2176 bad_gids_.insert(stat_buf.st_gid + 1);
2177
2178 ASSERT_EQ(uid_, getuid()); // This process should be the owner.
2179
2180 // To ensure that umask settings do not cause the initial state
2181 // of permissions to be different from what we expect, explicitly
2182 // set permissions on the directories we create.
2183 // Make all files and directories non-world-writable.
2184
2185 // Users and group can read, write, traverse
2186 int enabled_permissions =
2187 FILE_PERMISSION_USER_MASK | FILE_PERMISSION_GROUP_MASK;
2188 // Other users can't read, write, traverse
2189 int disabled_permissions = FILE_PERMISSION_OTHERS_MASK;
2190
2191 ASSERT_NO_FATAL_FAILURE(
2192 ChangePosixFilePermissions(
2193 base_dir_, enabled_permissions, disabled_permissions));
2194 ASSERT_NO_FATAL_FAILURE(
2195 ChangePosixFilePermissions(
2196 sub_dir_, enabled_permissions, disabled_permissions));
2197 }
2198
2199 FilePath base_dir_;
2200 FilePath sub_dir_;
2201 FilePath text_file_;
2202 uid_t uid_;
2203
2204 std::set<gid_t> ok_gids_;
2205 std::set<gid_t> bad_gids_;
2206 };
2207
2208 TEST_F(VerifyPathControlledByUserTest, BadPaths) {
2209 // File does not exist.
2210 FilePath does_not_exist = base_dir_.AppendASCII("does")
2211 .AppendASCII("not")
2212 .AppendASCII("exist");
2213 EXPECT_FALSE(
2214 base::VerifyPathControlledByUser(
2215 base_dir_, does_not_exist, uid_, ok_gids_));
2216
2217 // |base| not a subpath of |path|.
2218 EXPECT_FALSE(
2219 base::VerifyPathControlledByUser(
2220 sub_dir_, base_dir_, uid_, ok_gids_));
2221
2222 // An empty base path will fail to be a prefix for any path.
2223 FilePath empty;
2224 EXPECT_FALSE(
2225 base::VerifyPathControlledByUser(
2226 empty, base_dir_, uid_, ok_gids_));
2227
2228 // Finding that a bad call fails proves nothing unless a good call succeeds.
2229 EXPECT_TRUE(
2230 base::VerifyPathControlledByUser(
2231 base_dir_, sub_dir_, uid_, ok_gids_));
2232 }
2233
2234 TEST_F(VerifyPathControlledByUserTest, Symlinks) {
2235 // Symlinks in the path should cause failure.
2236
2237 // Symlink to the file at the end of the path.
2238 FilePath file_link = base_dir_.AppendASCII("file_link");
2239 ASSERT_TRUE(CreateSymbolicLink(text_file_, file_link))
2240 << "Failed to create symlink.";
2241
2242 EXPECT_FALSE(
2243 base::VerifyPathControlledByUser(
2244 base_dir_, file_link, uid_, ok_gids_));
2245 EXPECT_FALSE(
2246 base::VerifyPathControlledByUser(
2247 file_link, file_link, uid_, ok_gids_));
2248
2249 // Symlink from one directory to another within the path.
2250 FilePath link_to_sub_dir = base_dir_.AppendASCII("link_to_sub_dir");
2251 ASSERT_TRUE(CreateSymbolicLink(sub_dir_, link_to_sub_dir))
2252 << "Failed to create symlink.";
2253
2254 FilePath file_path_with_link = link_to_sub_dir.AppendASCII("file.txt");
2255 ASSERT_TRUE(PathExists(file_path_with_link));
2256
2257 EXPECT_FALSE(
2258 base::VerifyPathControlledByUser(
2259 base_dir_, file_path_with_link, uid_, ok_gids_));
2260
2261 EXPECT_FALSE(
2262 base::VerifyPathControlledByUser(
2263 link_to_sub_dir, file_path_with_link, uid_, ok_gids_));
2264
2265 // Symlinks in parents of base path are allowed.
2266 EXPECT_TRUE(
2267 base::VerifyPathControlledByUser(
2268 file_path_with_link, file_path_with_link, uid_, ok_gids_));
2269 }
2270
2271 TEST_F(VerifyPathControlledByUserTest, OwnershipChecks) {
2272 // Get a uid that is not the uid of files we create.
2273 uid_t bad_uid = uid_ + 1;
2274
2275 // Make all files and directories non-world-writable.
2276 ASSERT_NO_FATAL_FAILURE(
2277 ChangePosixFilePermissions(base_dir_, 0u, S_IWOTH));
2278 ASSERT_NO_FATAL_FAILURE(
2279 ChangePosixFilePermissions(sub_dir_, 0u, S_IWOTH));
2280 ASSERT_NO_FATAL_FAILURE(
2281 ChangePosixFilePermissions(text_file_, 0u, S_IWOTH));
2282
2283 // We control these paths.
2284 EXPECT_TRUE(
2285 base::VerifyPathControlledByUser(
2286 base_dir_, sub_dir_, uid_, ok_gids_));
2287 EXPECT_TRUE(
2288 base::VerifyPathControlledByUser(
2289 base_dir_, text_file_, uid_, ok_gids_));
2290 EXPECT_TRUE(
2291 base::VerifyPathControlledByUser(
2292 sub_dir_, text_file_, uid_, ok_gids_));
2293
2294 // Another user does not control these paths.
2295 EXPECT_FALSE(
2296 base::VerifyPathControlledByUser(
2297 base_dir_, sub_dir_, bad_uid, ok_gids_));
2298 EXPECT_FALSE(
2299 base::VerifyPathControlledByUser(
2300 base_dir_, text_file_, bad_uid, ok_gids_));
2301 EXPECT_FALSE(
2302 base::VerifyPathControlledByUser(
2303 sub_dir_, text_file_, bad_uid, ok_gids_));
2304
2305 // Another group does not control the paths.
2306 EXPECT_FALSE(
2307 base::VerifyPathControlledByUser(
2308 base_dir_, sub_dir_, uid_, bad_gids_));
2309 EXPECT_FALSE(
2310 base::VerifyPathControlledByUser(
2311 base_dir_, text_file_, uid_, bad_gids_));
2312 EXPECT_FALSE(
2313 base::VerifyPathControlledByUser(
2314 sub_dir_, text_file_, uid_, bad_gids_));
2315 }
2316
2317 TEST_F(VerifyPathControlledByUserTest, GroupWriteTest) {
2318 // Make all files and directories writable only by their owner.
2319 ASSERT_NO_FATAL_FAILURE(
2320 ChangePosixFilePermissions(base_dir_, 0u, S_IWOTH|S_IWGRP));
2321 ASSERT_NO_FATAL_FAILURE(
2322 ChangePosixFilePermissions(sub_dir_, 0u, S_IWOTH|S_IWGRP));
2323 ASSERT_NO_FATAL_FAILURE(
2324 ChangePosixFilePermissions(text_file_, 0u, S_IWOTH|S_IWGRP));
2325
2326 // Any group is okay because the path is not group-writable.
2327 EXPECT_TRUE(
2328 base::VerifyPathControlledByUser(
2329 base_dir_, sub_dir_, uid_, ok_gids_));
2330 EXPECT_TRUE(
2331 base::VerifyPathControlledByUser(
2332 base_dir_, text_file_, uid_, ok_gids_));
2333 EXPECT_TRUE(
2334 base::VerifyPathControlledByUser(
2335 sub_dir_, text_file_, uid_, ok_gids_));
2336
2337 EXPECT_TRUE(
2338 base::VerifyPathControlledByUser(
2339 base_dir_, sub_dir_, uid_, bad_gids_));
2340 EXPECT_TRUE(
2341 base::VerifyPathControlledByUser(
2342 base_dir_, text_file_, uid_, bad_gids_));
2343 EXPECT_TRUE(
2344 base::VerifyPathControlledByUser(
2345 sub_dir_, text_file_, uid_, bad_gids_));
2346
2347 // No group is okay, because we don't check the group
2348 // if no group can write.
2349 std::set<gid_t> no_gids; // Empty set of gids.
2350 EXPECT_TRUE(
2351 base::VerifyPathControlledByUser(
2352 base_dir_, sub_dir_, uid_, no_gids));
2353 EXPECT_TRUE(
2354 base::VerifyPathControlledByUser(
2355 base_dir_, text_file_, uid_, no_gids));
2356 EXPECT_TRUE(
2357 base::VerifyPathControlledByUser(
2358 sub_dir_, text_file_, uid_, no_gids));
2359
2360
2361 // Make all files and directories writable by their group.
2362 ASSERT_NO_FATAL_FAILURE(
2363 ChangePosixFilePermissions(base_dir_, S_IWGRP, 0u));
2364 ASSERT_NO_FATAL_FAILURE(
2365 ChangePosixFilePermissions(sub_dir_, S_IWGRP, 0u));
2366 ASSERT_NO_FATAL_FAILURE(
2367 ChangePosixFilePermissions(text_file_, S_IWGRP, 0u));
2368
2369 // Now |ok_gids_| works, but |bad_gids_| fails.
2370 EXPECT_TRUE(
2371 base::VerifyPathControlledByUser(
2372 base_dir_, sub_dir_, uid_, ok_gids_));
2373 EXPECT_TRUE(
2374 base::VerifyPathControlledByUser(
2375 base_dir_, text_file_, uid_, ok_gids_));
2376 EXPECT_TRUE(
2377 base::VerifyPathControlledByUser(
2378 sub_dir_, text_file_, uid_, ok_gids_));
2379
2380 EXPECT_FALSE(
2381 base::VerifyPathControlledByUser(
2382 base_dir_, sub_dir_, uid_, bad_gids_));
2383 EXPECT_FALSE(
2384 base::VerifyPathControlledByUser(
2385 base_dir_, text_file_, uid_, bad_gids_));
2386 EXPECT_FALSE(
2387 base::VerifyPathControlledByUser(
2388 sub_dir_, text_file_, uid_, bad_gids_));
2389
2390 // Because any group in the group set is allowed,
2391 // the union of good and bad gids passes.
2392
2393 std::set<gid_t> multiple_gids;
2394 std::set_union(
2395 ok_gids_.begin(), ok_gids_.end(),
2396 bad_gids_.begin(), bad_gids_.end(),
2397 std::inserter(multiple_gids, multiple_gids.begin()));
2398
2399 EXPECT_TRUE(
2400 base::VerifyPathControlledByUser(
2401 base_dir_, sub_dir_, uid_, multiple_gids));
2402 EXPECT_TRUE(
2403 base::VerifyPathControlledByUser(
2404 base_dir_, text_file_, uid_, multiple_gids));
2405 EXPECT_TRUE(
2406 base::VerifyPathControlledByUser(
2407 sub_dir_, text_file_, uid_, multiple_gids));
2408 }
2409
2410 TEST_F(VerifyPathControlledByUserTest, WriteBitChecks) {
2411 // Make all files and directories non-world-writable.
2412 ASSERT_NO_FATAL_FAILURE(
2413 ChangePosixFilePermissions(base_dir_, 0u, S_IWOTH));
2414 ASSERT_NO_FATAL_FAILURE(
2415 ChangePosixFilePermissions(sub_dir_, 0u, S_IWOTH));
2416 ASSERT_NO_FATAL_FAILURE(
2417 ChangePosixFilePermissions(text_file_, 0u, S_IWOTH));
2418
2419 // Initialy, we control all parts of the path.
2420 EXPECT_TRUE(
2421 base::VerifyPathControlledByUser(
2422 base_dir_, sub_dir_, uid_, ok_gids_));
2423 EXPECT_TRUE(
2424 base::VerifyPathControlledByUser(
2425 base_dir_, text_file_, uid_, ok_gids_));
2426 EXPECT_TRUE(
2427 base::VerifyPathControlledByUser(
2428 sub_dir_, text_file_, uid_, ok_gids_));
2429
2430 // Make base_dir_ world-writable.
2431 ASSERT_NO_FATAL_FAILURE(
2432 ChangePosixFilePermissions(base_dir_, S_IWOTH, 0u));
2433 EXPECT_FALSE(
2434 base::VerifyPathControlledByUser(
2435 base_dir_, sub_dir_, uid_, ok_gids_));
2436 EXPECT_FALSE(
2437 base::VerifyPathControlledByUser(
2438 base_dir_, text_file_, uid_, ok_gids_));
2439 EXPECT_TRUE(
2440 base::VerifyPathControlledByUser(
2441 sub_dir_, text_file_, uid_, ok_gids_));
2442
2443 // Make sub_dir_ world writable.
2444 ASSERT_NO_FATAL_FAILURE(
2445 ChangePosixFilePermissions(sub_dir_, S_IWOTH, 0u));
2446 EXPECT_FALSE(
2447 base::VerifyPathControlledByUser(
2448 base_dir_, sub_dir_, uid_, ok_gids_));
2449 EXPECT_FALSE(
2450 base::VerifyPathControlledByUser(
2451 base_dir_, text_file_, uid_, ok_gids_));
2452 EXPECT_FALSE(
2453 base::VerifyPathControlledByUser(
2454 sub_dir_, text_file_, uid_, ok_gids_));
2455
2456 // Make text_file_ world writable.
2457 ASSERT_NO_FATAL_FAILURE(
2458 ChangePosixFilePermissions(text_file_, S_IWOTH, 0u));
2459 EXPECT_FALSE(
2460 base::VerifyPathControlledByUser(
2461 base_dir_, sub_dir_, uid_, ok_gids_));
2462 EXPECT_FALSE(
2463 base::VerifyPathControlledByUser(
2464 base_dir_, text_file_, uid_, ok_gids_));
2465 EXPECT_FALSE(
2466 base::VerifyPathControlledByUser(
2467 sub_dir_, text_file_, uid_, ok_gids_));
2468
2469 // Make sub_dir_ non-world writable.
2470 ASSERT_NO_FATAL_FAILURE(
2471 ChangePosixFilePermissions(sub_dir_, 0u, S_IWOTH));
2472 EXPECT_FALSE(
2473 base::VerifyPathControlledByUser(
2474 base_dir_, sub_dir_, uid_, ok_gids_));
2475 EXPECT_FALSE(
2476 base::VerifyPathControlledByUser(
2477 base_dir_, text_file_, uid_, ok_gids_));
2478 EXPECT_FALSE(
2479 base::VerifyPathControlledByUser(
2480 sub_dir_, text_file_, uid_, ok_gids_));
2481
2482 // Make base_dir_ non-world-writable.
2483 ASSERT_NO_FATAL_FAILURE(
2484 ChangePosixFilePermissions(base_dir_, 0u, S_IWOTH));
2485 EXPECT_TRUE(
2486 base::VerifyPathControlledByUser(
2487 base_dir_, sub_dir_, uid_, ok_gids_));
2488 EXPECT_FALSE(
2489 base::VerifyPathControlledByUser(
2490 base_dir_, text_file_, uid_, ok_gids_));
2491 EXPECT_FALSE(
2492 base::VerifyPathControlledByUser(
2493 sub_dir_, text_file_, uid_, ok_gids_));
2494
2495 // Back to the initial state: Nothing is writable, so every path
2496 // should pass.
2497 ASSERT_NO_FATAL_FAILURE(
2498 ChangePosixFilePermissions(text_file_, 0u, S_IWOTH));
2499 EXPECT_TRUE(
2500 base::VerifyPathControlledByUser(
2501 base_dir_, sub_dir_, uid_, ok_gids_));
2502 EXPECT_TRUE(
2503 base::VerifyPathControlledByUser(
2504 base_dir_, text_file_, uid_, ok_gids_));
2505 EXPECT_TRUE(
2506 base::VerifyPathControlledByUser(
2507 sub_dir_, text_file_, uid_, ok_gids_));
2508 }
2509
2510 #if defined(OS_ANDROID)
2511 TEST_F(FileUtilTest, ValidContentUriTest) {
2512 // Get the test image path.
2513 FilePath data_dir;
2514 ASSERT_TRUE(PathService::Get(DIR_TEST_DATA, &data_dir));
2515 data_dir = data_dir.AppendASCII("file_util");
2516 ASSERT_TRUE(PathExists(data_dir));
2517 FilePath image_file = data_dir.Append(FILE_PATH_LITERAL("red.png"));
2518 int64 image_size;
2519 GetFileSize(image_file, &image_size);
2520 EXPECT_LT(0, image_size);
2521
2522 // Insert the image into MediaStore. MediaStore will do some conversions, and
2523 // return the content URI.
2524 FilePath path = base::InsertImageIntoMediaStore(image_file);
2525 EXPECT_TRUE(path.IsContentUri());
2526 EXPECT_TRUE(PathExists(path));
2527 // The file size may not equal to the input image as MediaStore may convert
2528 // the image.
2529 int64 content_uri_size;
2530 GetFileSize(path, &content_uri_size);
2531 EXPECT_EQ(image_size, content_uri_size);
2532
2533 // We should be able to read the file.
2534 char* buffer = new char[image_size];
2535 File file = OpenContentUriForRead(path);
2536 EXPECT_TRUE(file.IsValid());
2537 EXPECT_TRUE(file.ReadAtCurrentPos(buffer, image_size));
2538 delete[] buffer;
2539 }
2540
2541 TEST_F(FileUtilTest, NonExistentContentUriTest) {
2542 FilePath path("content://foo.bar");
2543 EXPECT_TRUE(path.IsContentUri());
2544 EXPECT_FALSE(PathExists(path));
2545 // Size should be smaller than 0.
2546 int64 size;
2547 EXPECT_FALSE(GetFileSize(path, &size));
2548
2549 // We should not be able to read the file.
2550 File file = OpenContentUriForRead(path);
2551 EXPECT_FALSE(file.IsValid());
2552 }
2553 #endif
2554
2555 TEST(ScopedFD, ScopedFDDoesClose) {
2556 int fds[2];
2557 char c = 0;
2558 ASSERT_EQ(0, pipe(fds));
2559 const int write_end = fds[1];
2560 base::ScopedFD read_end_closer(fds[0]);
2561 {
2562 base::ScopedFD write_end_closer(fds[1]);
2563 }
2564 // This is the only thread. This file descriptor should no longer be valid.
2565 int ret = close(write_end);
2566 EXPECT_EQ(-1, ret);
2567 EXPECT_EQ(EBADF, errno);
2568 // Make sure read(2) won't block.
2569 ASSERT_EQ(0, fcntl(fds[0], F_SETFL, O_NONBLOCK));
2570 // Reading the pipe should EOF.
2571 EXPECT_EQ(0, read(fds[0], &c, 1));
2572 }
2573
2574 #if defined(GTEST_HAS_DEATH_TEST)
2575 void CloseWithScopedFD(int fd) {
2576 base::ScopedFD fd_closer(fd);
2577 }
2578 #endif
2579
2580 TEST(ScopedFD, ScopedFDCrashesOnCloseFailure) {
2581 int fds[2];
2582 ASSERT_EQ(0, pipe(fds));
2583 base::ScopedFD read_end_closer(fds[0]);
2584 EXPECT_EQ(0, IGNORE_EINTR(close(fds[1])));
2585 #if defined(GTEST_HAS_DEATH_TEST)
2586 // This is the only thread. This file descriptor should no longer be valid.
2587 // Trying to close it should crash. This is important for security.
2588 EXPECT_DEATH(CloseWithScopedFD(fds[1]), "");
2589 #endif
2590 }
2591
2592 #endif // defined(OS_POSIX)
2593
2594 } // namespace
2595
2596 } // namespace base
OLDNEW
« no previous file with comments | « base/file_util_posix.cc ('k') | base/file_util_win.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698