// Copyright 2012 The Chromium Authors // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "base/files/file_util.h" #include #include #include #include #include #include #include #include #include #include #include "base/base_paths.h" #include "base/command_line.h" #include "base/environment.h" #include "base/features.h" #include "base/files/file.h" #include "base/files/file_enumerator.h" #include "base/files/file_path.h" #include "base/files/platform_file.h" #include "base/files/scoped_file.h" #include "base/files/scoped_temp_dir.h" #include "base/functional/bind.h" #include "base/functional/callback_helpers.h" #include "base/guid.h" #include "base/logging.h" #include "base/path_service.h" #include "base/rand_util.h" #include "base/scoped_environment_variable_override.h" #include "base/strings/string_util.h" #include "base/strings/stringprintf.h" #include "base/strings/utf_string_conversions.h" #include "base/test/bind.h" #include "base/test/multiprocess_test.h" #include "base/test/scoped_feature_list.h" #include "base/test/task_environment.h" #include "base/test/test_file_util.h" #include "base/test/test_timeouts.h" #include "base/threading/platform_thread.h" #include "base/threading/thread.h" #include "base/time/time.h" #include "build/build_config.h" #include "testing/gtest/include/gtest/gtest.h" #include "testing/multiprocess_func_list.h" #include "testing/platform_test.h" #if BUILDFLAG(IS_WIN) #include #include #include #include #include #include "base/features.h" #include "base/scoped_native_library.h" #include "base/strings/string_number_conversions.h" #include "base/test/gtest_util.h" #include "base/test/scoped_feature_list.h" #include "base/win/scoped_handle.h" #include "base/win/win_util.h" #endif #if BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA) #include #include #include #include #include #endif #if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_ANDROID) #include #endif #if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) #include #endif #if BUILDFLAG(IS_ANDROID) #include "base/android/content_uri_utils.h" #endif #if BUILDFLAG(IS_FUCHSIA) #include "base/test/scoped_dev_zero_fuchsia.h" #endif // This macro helps avoid wrapped lines in the test structs. #define FPL(x) FILE_PATH_LITERAL(x) namespace base { namespace { const size_t kLargeFileSize = (1 << 16) + 3; // To test that NormalizeFilePath() deals with NTFS reparse points correctly, // we need functions to create and delete reparse points. #if BUILDFLAG(IS_WIN) typedef struct _REPARSE_DATA_BUFFER { ULONG ReparseTag; USHORT ReparseDataLength; USHORT Reserved; union { struct { USHORT SubstituteNameOffset; USHORT SubstituteNameLength; USHORT PrintNameOffset; USHORT PrintNameLength; ULONG Flags; WCHAR PathBuffer[1]; } SymbolicLinkReparseBuffer; struct { USHORT SubstituteNameOffset; USHORT SubstituteNameLength; USHORT PrintNameOffset; USHORT PrintNameLength; WCHAR PathBuffer[1]; } MountPointReparseBuffer; struct { UCHAR DataBuffer[1]; } GenericReparseBuffer; }; } REPARSE_DATA_BUFFER, *PREPARSE_DATA_BUFFER; // Sets a reparse point. |source| will now point to |target|. Returns true if // the call succeeds, false otherwise. bool SetReparsePoint(HANDLE source, const FilePath& target_path) { std::wstring kPathPrefix = FILE_PATH_LITERAL("\\??\\"); std::wstring target_str; // The juction will not work if the target path does not start with \??\ . if (kPathPrefix != target_path.value().substr(0, kPathPrefix.size())) target_str += kPathPrefix; target_str += target_path.value(); const wchar_t* target = target_str.c_str(); USHORT size_target = static_cast(wcslen(target)) * sizeof(target[0]); char buffer[2000] = {0}; DWORD returned; REPARSE_DATA_BUFFER* data = reinterpret_cast(buffer); data->ReparseTag = 0xa0000003; memcpy(data->MountPointReparseBuffer.PathBuffer, target, size_target + 2); data->MountPointReparseBuffer.SubstituteNameLength = size_target; data->MountPointReparseBuffer.PrintNameOffset = size_target + 2; data->ReparseDataLength = size_target + 4 + 8; int data_size = data->ReparseDataLength + 8; if (!DeviceIoControl(source, FSCTL_SET_REPARSE_POINT, &buffer, data_size, NULL, 0, &returned, NULL)) { return false; } return true; } // Delete the reparse point referenced by |source|. Returns true if the call // succeeds, false otherwise. bool DeleteReparsePoint(HANDLE source) { DWORD returned; REPARSE_DATA_BUFFER data = {0}; data.ReparseTag = 0xa0000003; if (!DeviceIoControl(source, FSCTL_DELETE_REPARSE_POINT, &data, 8, NULL, 0, &returned, NULL)) { return false; } return true; } // Method that wraps the win32 GetShortPathName API. Returns an empty path on // error. FilePath MakeShortFilePath(const FilePath& input) { DWORD path_short_len = ::GetShortPathName(input.value().c_str(), nullptr, 0); if (path_short_len == 0UL) return FilePath(); std::wstring path_short_str; path_short_len = ::GetShortPathName( input.value().c_str(), WriteInto(&path_short_str, path_short_len), path_short_len); if (path_short_len == 0UL) return FilePath(); return FilePath(path_short_str); } // Manages a reparse point for a test. class ReparsePoint { public: // Creates a reparse point from |source| (an empty directory) to |target|. ReparsePoint(const FilePath& source, const FilePath& target) { dir_.Set( ::CreateFile(source.value().c_str(), GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE, NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, // Needed to open a directory. NULL)); created_ = dir_.is_valid() && SetReparsePoint(dir_.get(), target); } ReparsePoint(const ReparsePoint&) = delete; ReparsePoint& operator=(const ReparsePoint&) = delete; ~ReparsePoint() { if (created_) DeleteReparsePoint(dir_.get()); } bool IsValid() { return created_; } private: win::ScopedHandle dir_; bool created_; }; #endif #if BUILDFLAG(IS_MAC) // Provide a simple way to change the permissions bits on |path| in tests. // ASSERT failures will return, but not stop the test. Caller should wrap // calls to this function in ASSERT_NO_FATAL_FAILURE(). void ChangePosixFilePermissions(const FilePath& path, int mode_bits_to_set, int mode_bits_to_clear) { ASSERT_FALSE(mode_bits_to_set & mode_bits_to_clear) << "Can't set and clear the same bits."; int mode = 0; ASSERT_TRUE(GetPosixFilePermissions(path, &mode)); mode |= mode_bits_to_set; mode &= ~mode_bits_to_clear; ASSERT_TRUE(SetPosixFilePermissions(path, mode)); } #endif // BUILDFLAG(IS_MAC) // Fuchsia doesn't support file permissions. #if !BUILDFLAG(IS_FUCHSIA) // Sets the source file to read-only. void SetReadOnly(const FilePath& path, bool read_only) { #if BUILDFLAG(IS_WIN) // On Windows, it involves setting/removing the 'readonly' bit. DWORD attrs = GetFileAttributes(path.value().c_str()); ASSERT_NE(INVALID_FILE_ATTRIBUTES, attrs); ASSERT_TRUE(SetFileAttributes( path.value().c_str(), read_only ? (attrs | FILE_ATTRIBUTE_READONLY) : (attrs & ~FILE_ATTRIBUTE_READONLY))); DWORD expected = read_only ? ((attrs & (FILE_ATTRIBUTE_ARCHIVE | FILE_ATTRIBUTE_DIRECTORY)) | FILE_ATTRIBUTE_READONLY) : (attrs & (FILE_ATTRIBUTE_ARCHIVE | FILE_ATTRIBUTE_DIRECTORY)); // Ignore FILE_ATTRIBUTE_NOT_CONTENT_INDEXED and FILE_ATTRIBUTE_COMPRESSED // if present. These flags are set by the operating system, depending on // local configurations, such as compressing the file system. Not filtering // out these flags could cause tests to fail even though they should pass. attrs = GetFileAttributes(path.value().c_str()) & ~(FILE_ATTRIBUTE_NOT_CONTENT_INDEXED | FILE_ATTRIBUTE_COMPRESSED); ASSERT_EQ(expected, attrs); #else // On all other platforms, it involves removing/setting the write bit. mode_t mode = read_only ? S_IRUSR : (S_IRUSR | S_IWUSR); EXPECT_TRUE(SetPosixFilePermissions( path, DirectoryExists(path) ? (mode | S_IXUSR) : mode)); #endif // BUILDFLAG(IS_WIN) } bool IsReadOnly(const FilePath& path) { #if BUILDFLAG(IS_WIN) DWORD attrs = GetFileAttributes(path.value().c_str()); EXPECT_NE(INVALID_FILE_ATTRIBUTES, attrs); return attrs & FILE_ATTRIBUTE_READONLY; #else int mode = 0; EXPECT_TRUE(GetPosixFilePermissions(path, &mode)); return !(mode & S_IWUSR); #endif // BUILDFLAG(IS_WIN) } #endif // BUILDFLAG(IS_FUCHSIA) const wchar_t bogus_content[] = L"I'm cannon fodder."; const int FILES_AND_DIRECTORIES = FileEnumerator::FILES | FileEnumerator::DIRECTORIES; // file_util winds up using autoreleased objects on the Mac, so this needs // to be a PlatformTest class FileUtilTest : public PlatformTest { protected: void SetUp() override { PlatformTest::SetUp(); ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); } ScopedTempDir temp_dir_; }; // Collects all the results from the given file enumerator, and provides an // interface to query whether a given file is present. class FindResultCollector { public: explicit FindResultCollector(FileEnumerator* enumerator) { FilePath cur_file; while (!(cur_file = enumerator->Next()).value().empty()) { FilePath::StringType path = cur_file.value(); // The file should not be returned twice. EXPECT_TRUE(files_.end() == files_.find(path)) << "Same file returned twice"; // Save for later. files_.insert(path); } } // Returns true if the enumerator found the file. bool HasFile(const FilePath& file) const { return files_.find(file.value()) != files_.end(); } int size() { return static_cast(files_.size()); } private: std::set files_; }; // Simple function to dump some text into a new file. void CreateTextFile(const FilePath& filename, const std::wstring& contents) { std::wofstream file; #if BUILDFLAG(IS_WIN) file.open(filename.value().c_str()); #elif BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA) file.open(filename.value()); #endif // BUILDFLAG(IS_WIN) ASSERT_TRUE(file.is_open()); file << contents; file.close(); } // Simple function to take out some text from a file. std::wstring ReadTextFile(const FilePath& filename) { wchar_t contents[64]; std::wifstream file; #if BUILDFLAG(IS_WIN) file.open(filename.value().c_str()); #elif BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA) file.open(filename.value()); #endif // BUILDFLAG(IS_WIN) EXPECT_TRUE(file.is_open()); file.getline(contents, std::size(contents)); file.close(); return std::wstring(contents); } // Sets |is_inheritable| to indicate whether or not |stream| is set up to be // inerhited into child processes (i.e., HANDLE_FLAG_INHERIT is set on the // underlying handle on Windows, or FD_CLOEXEC is not set on the underlying file // descriptor on POSIX). Calls to this function must be wrapped with // ASSERT_NO_FATAL_FAILURE to properly abort tests in case of fatal failure. void GetIsInheritable(FILE* stream, bool* is_inheritable) { #if BUILDFLAG(IS_WIN) HANDLE handle = reinterpret_cast(_get_osfhandle(_fileno(stream))); ASSERT_NE(INVALID_HANDLE_VALUE, handle); DWORD info = 0; ASSERT_EQ(TRUE, ::GetHandleInformation(handle, &info)); *is_inheritable = ((info & HANDLE_FLAG_INHERIT) != 0); #elif BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA) int fd = fileno(stream); ASSERT_NE(-1, fd); int flags = fcntl(fd, F_GETFD, 0); ASSERT_NE(-1, flags); *is_inheritable = ((flags & FD_CLOEXEC) == 0); #else #error Not implemented #endif } #if BUILDFLAG(IS_POSIX) class ScopedWorkingDirectory { public: explicit ScopedWorkingDirectory(const FilePath& new_working_dir) { CHECK(base::GetCurrentDirectory(&original_working_directory_)); CHECK(base::SetCurrentDirectory(new_working_dir)); } ~ScopedWorkingDirectory() { CHECK(base::SetCurrentDirectory(original_working_directory_)); } private: base::FilePath original_working_directory_; }; TEST_F(FileUtilTest, MakeAbsoluteFilePathNoResolveSymbolicLinks) { FilePath cwd; ASSERT_TRUE(GetCurrentDirectory(&cwd)); const std::pair> kExpectedResults[]{ {FilePath(), absl::nullopt}, {FilePath("."), cwd}, {FilePath(".."), cwd.DirName()}, {FilePath("a/.."), cwd}, {FilePath("a/b/.."), cwd.Append(FPL("a"))}, {FilePath("/tmp/../.."), FilePath("/")}, {FilePath("/tmp/../"), FilePath("/")}, {FilePath("/tmp/a/b/../c/../.."), FilePath("/tmp")}, {FilePath("/././tmp/./a/./b/../c/./../.."), FilePath("/tmp")}, {FilePath("/.././../tmp"), FilePath("/tmp")}, {FilePath("/..///.////..////tmp"), FilePath("/tmp")}, {FilePath("//..///.////..////tmp"), FilePath("//tmp")}, {FilePath("///..///.////..////tmp"), FilePath("/tmp")}, }; for (auto& expected_result : kExpectedResults) { EXPECT_EQ(MakeAbsoluteFilePathNoResolveSymbolicLinks(expected_result.first), expected_result.second); } // Test that MakeAbsoluteFilePathNoResolveSymbolicLinks() returns an empty // path if GetCurrentDirectory() fails. const FilePath temp_dir_path = temp_dir_.GetPath(); ScopedWorkingDirectory scoped_cwd(temp_dir_path); // Delete the cwd so that GetCurrentDirectory() fails. ASSERT_TRUE(temp_dir_.Delete()); ASSERT_FALSE( MakeAbsoluteFilePathNoResolveSymbolicLinks(FilePath("relative_file_path")) .has_value()); } #endif // BUILDFLAG(IS_POSIX) TEST_F(FileUtilTest, FileAndDirectorySize) { // Create three files of 20, 30 and 3 chars (utf8). ComputeDirectorySize // should return 53 bytes. FilePath file_01 = temp_dir_.GetPath().Append(FPL("The file 01.txt")); CreateTextFile(file_01, L"12345678901234567890"); int64_t size_f1 = 0; ASSERT_TRUE(GetFileSize(file_01, &size_f1)); EXPECT_EQ(20ll, size_f1); FilePath subdir_path = temp_dir_.GetPath().Append(FPL("Level2")); CreateDirectory(subdir_path); FilePath file_02 = subdir_path.Append(FPL("The file 02.txt")); CreateTextFile(file_02, L"123456789012345678901234567890"); int64_t size_f2 = 0; ASSERT_TRUE(GetFileSize(file_02, &size_f2)); EXPECT_EQ(30ll, size_f2); FilePath subsubdir_path = subdir_path.Append(FPL("Level3")); CreateDirectory(subsubdir_path); FilePath file_03 = subsubdir_path.Append(FPL("The file 03.txt")); CreateTextFile(file_03, L"123"); int64_t computed_size = ComputeDirectorySize(temp_dir_.GetPath()); EXPECT_EQ(size_f1 + size_f2 + 3, computed_size); } TEST_F(FileUtilTest, NormalizeFilePathBasic) { // Create a directory under the test dir. Because we create it, // we know it is not a link. FilePath file_a_path = temp_dir_.GetPath().Append(FPL("file_a")); FilePath dir_path = temp_dir_.GetPath().Append(FPL("dir")); FilePath file_b_path = dir_path.Append(FPL("file_b")); CreateDirectory(dir_path); FilePath normalized_file_a_path, normalized_file_b_path; ASSERT_FALSE(PathExists(file_a_path)); ASSERT_FALSE(NormalizeFilePath(file_a_path, &normalized_file_a_path)) << "NormalizeFilePath() should fail on nonexistent paths."; CreateTextFile(file_a_path, bogus_content); ASSERT_TRUE(PathExists(file_a_path)); ASSERT_TRUE(NormalizeFilePath(file_a_path, &normalized_file_a_path)); CreateTextFile(file_b_path, bogus_content); ASSERT_TRUE(PathExists(file_b_path)); ASSERT_TRUE(NormalizeFilePath(file_b_path, &normalized_file_b_path)); // Because this test created |dir_path|, we know it is not a link // or junction. So, the real path of the directory holding file a // must be the parent of the path holding file b. ASSERT_TRUE(normalized_file_a_path.DirName() .IsParent(normalized_file_b_path.DirName())); } #if BUILDFLAG(IS_WIN) TEST_F(FileUtilTest, NormalizeFileEmptyFile) { // Create a directory under the test dir. Because we create it, // we know it is not a link. const wchar_t empty_content[] = L""; FilePath file_a_path = temp_dir_.GetPath().Append(FPL("file_empty_a")); FilePath dir_path = temp_dir_.GetPath().Append(FPL("dir")); FilePath file_b_path = dir_path.Append(FPL("file_empty_b")); ASSERT_TRUE(CreateDirectory(dir_path)); FilePath normalized_file_a_path, normalized_file_b_path; ASSERT_FALSE(PathExists(file_a_path)); EXPECT_FALSE(NormalizeFilePath(file_a_path, &normalized_file_a_path)) << "NormalizeFilePath() should fail on nonexistent paths."; CreateTextFile(file_a_path, empty_content); ASSERT_TRUE(PathExists(file_a_path)); EXPECT_TRUE(NormalizeFilePath(file_a_path, &normalized_file_a_path)); CreateTextFile(file_b_path, empty_content); ASSERT_TRUE(PathExists(file_b_path)); EXPECT_TRUE(NormalizeFilePath(file_b_path, &normalized_file_b_path)); // Because this test created |dir_path|, we know it is not a link // or junction. So, the real path of the directory holding file a // must be the parent of the path holding file b. EXPECT_TRUE(normalized_file_a_path.DirName().IsParent( normalized_file_b_path.DirName())); } TEST_F(FileUtilTest, NormalizeFilePathReparsePoints) { // Build the following directory structure: // // temp_dir // |-> base_a // | |-> sub_a // | |-> file.txt // | |-> long_name___... (Very long name.) // | |-> sub_long // | |-> deep.txt // |-> base_b // |-> to_sub_a (reparse point to temp_dir\base_a\sub_a) // |-> to_base_b (reparse point to temp_dir\base_b) // |-> to_sub_long (reparse point to temp_dir\sub_a\long_name_\sub_long) FilePath base_a = temp_dir_.GetPath().Append(FPL("base_a")); #if BUILDFLAG(IS_WIN) // TEMP can have a lower case drive letter. std::wstring temp_base_a = base_a.value(); ASSERT_FALSE(temp_base_a.empty()); temp_base_a[0] = ToUpperASCII(char16_t{temp_base_a[0]}); base_a = FilePath(temp_base_a); #endif ASSERT_TRUE(CreateDirectory(base_a)); #if BUILDFLAG(IS_WIN) // TEMP might be a short name which is not normalized. base_a = MakeLongFilePath(base_a); #endif FilePath sub_a = base_a.Append(FPL("sub_a")); ASSERT_TRUE(CreateDirectory(sub_a)); FilePath file_txt = sub_a.Append(FPL("file.txt")); CreateTextFile(file_txt, bogus_content); // Want a directory whose name is long enough to make the path to the file // inside just under MAX_PATH chars. This will be used to test that when // a junction expands to a path over MAX_PATH chars in length, // NormalizeFilePath() fails without crashing. FilePath sub_long_rel(FPL("sub_long")); FilePath deep_txt(FPL("deep.txt")); int target_length = MAX_PATH; target_length -= (sub_a.value().length() + 1); // +1 for the sepperator '\'. target_length -= (sub_long_rel.Append(deep_txt).value().length() + 1); // Without making the path a bit shorter, CreateDirectory() fails. // the resulting path is still long enough to hit the failing case in // NormalizePath(). const int kCreateDirLimit = 4; target_length -= kCreateDirLimit; FilePath::StringType long_name_str = FPL("long_name_"); long_name_str.resize(target_length, '_'); FilePath long_name = sub_a.Append(FilePath(long_name_str)); FilePath deep_file = long_name.Append(sub_long_rel).Append(deep_txt); ASSERT_EQ(static_cast(MAX_PATH - kCreateDirLimit), deep_file.value().length()); FilePath sub_long = deep_file.DirName(); ASSERT_TRUE(CreateDirectory(sub_long)); CreateTextFile(deep_file, bogus_content); FilePath base_b = temp_dir_.GetPath().Append(FPL("base_b")); ASSERT_TRUE(CreateDirectory(base_b)); #if BUILDFLAG(IS_WIN) // TEMP might be a short name which is not normalized. base_b = MakeLongFilePath(base_b); #endif FilePath to_sub_a = base_b.Append(FPL("to_sub_a")); ASSERT_TRUE(CreateDirectory(to_sub_a)); FilePath normalized_path; { ReparsePoint reparse_to_sub_a(to_sub_a, sub_a); ASSERT_TRUE(reparse_to_sub_a.IsValid()); FilePath to_base_b = base_b.Append(FPL("to_base_b")); ASSERT_TRUE(CreateDirectory(to_base_b)); ReparsePoint reparse_to_base_b(to_base_b, base_b); ASSERT_TRUE(reparse_to_base_b.IsValid()); FilePath to_sub_long = base_b.Append(FPL("to_sub_long")); ASSERT_TRUE(CreateDirectory(to_sub_long)); ReparsePoint reparse_to_sub_long(to_sub_long, sub_long); ASSERT_TRUE(reparse_to_sub_long.IsValid()); // Normalize a junction free path: base_a\sub_a\file.txt . ASSERT_TRUE(NormalizeFilePath(file_txt, &normalized_path)); ASSERT_EQ(file_txt.value(), normalized_path.value()); // Check that the path base_b\to_sub_a\file.txt can be normalized to exclude // the junction to_sub_a. ASSERT_TRUE(NormalizeFilePath(to_sub_a.Append(FPL("file.txt")), &normalized_path)); ASSERT_EQ(file_txt.value(), normalized_path.value()); // Check that the path base_b\to_base_b\to_base_b\to_sub_a\file.txt can be // normalized to exclude junctions to_base_b and to_sub_a . ASSERT_TRUE(NormalizeFilePath(base_b.Append(FPL("to_base_b")) .Append(FPL("to_base_b")) .Append(FPL("to_sub_a")) .Append(FPL("file.txt")), &normalized_path)); ASSERT_EQ(file_txt.value(), normalized_path.value()); // A long enough path will cause NormalizeFilePath() to fail. Make a long // path using to_base_b many times, and check that paths long enough to fail // do not cause a crash. FilePath long_path = base_b; const int kLengthLimit = MAX_PATH + 200; while (long_path.value().length() <= kLengthLimit) { long_path = long_path.Append(FPL("to_base_b")); } long_path = long_path.Append(FPL("to_sub_a")) .Append(FPL("file.txt")); ASSERT_FALSE(NormalizeFilePath(long_path, &normalized_path)); // Normalizing the junction to deep.txt should fail, because the expanded // path to deep.txt is longer than MAX_PATH. ASSERT_FALSE(NormalizeFilePath(to_sub_long.Append(deep_txt), &normalized_path)); // Delete the reparse points, and see that NormalizeFilePath() fails // to traverse them. } ASSERT_FALSE(NormalizeFilePath(to_sub_a.Append(FPL("file.txt")), &normalized_path)); } TEST_F(FileUtilTest, DevicePathToDriveLetter) { // Get a drive letter. std::wstring real_drive_letter = AsWString( ToUpperASCII(AsStringPiece16(temp_dir_.GetPath().value().substr(0, 2)))); if (!isalpha(real_drive_letter[0]) || ':' != real_drive_letter[1]) { LOG(ERROR) << "Can't get a drive letter to test with."; return; } // Get the NT style path to that drive. wchar_t device_path[MAX_PATH] = {'\0'}; ASSERT_TRUE( ::QueryDosDevice(real_drive_letter.c_str(), device_path, MAX_PATH)); FilePath actual_device_path(device_path); FilePath win32_path; // Run DevicePathToDriveLetterPath() on the NT style path we got from // QueryDosDevice(). Expect the drive letter we started with. ASSERT_TRUE(DevicePathToDriveLetterPath(actual_device_path, &win32_path)); ASSERT_EQ(real_drive_letter, win32_path.value()); // Add some directories to the path. Expect those extra path componenets // to be preserved. FilePath kRelativePath(FPL("dir1\\dir2\\file.txt")); ASSERT_TRUE(DevicePathToDriveLetterPath( actual_device_path.Append(kRelativePath), &win32_path)); EXPECT_EQ(FilePath(real_drive_letter + FILE_PATH_LITERAL("\\")) .Append(kRelativePath) .value(), win32_path.value()); // Deform the real path so that it is invalid by removing the last four // characters. The way windows names devices that are hard disks // (\Device\HardDiskVolume${NUMBER}) guarantees that the string is longer // than three characters. The only way the truncated string could be a // real drive is if more than 10^3 disks are mounted: // \Device\HardDiskVolume10000 would be truncated to \Device\HardDiskVolume1 // Check that DevicePathToDriveLetterPath fails. size_t path_length = actual_device_path.value().length(); size_t new_length = path_length - 4; ASSERT_GT(new_length, 0u); FilePath prefix_of_real_device_path( actual_device_path.value().substr(0, new_length)); ASSERT_FALSE(DevicePathToDriveLetterPath(prefix_of_real_device_path, &win32_path)); ASSERT_FALSE(DevicePathToDriveLetterPath( prefix_of_real_device_path.Append(kRelativePath), &win32_path)); // Deform the real path so that it is invalid by adding some characters. For // example, if C: maps to \Device\HardDiskVolume8, then we simulate a // request for the drive letter whose native path is // \Device\HardDiskVolume812345 . We assume such a device does not exist, // because drives are numbered in order and mounting 112345 hard disks will // never happen. const FilePath::StringType kExtraChars = FPL("12345"); FilePath real_device_path_plus_numbers( actual_device_path.value() + kExtraChars); ASSERT_FALSE(DevicePathToDriveLetterPath( real_device_path_plus_numbers, &win32_path)); ASSERT_FALSE(DevicePathToDriveLetterPath( real_device_path_plus_numbers.Append(kRelativePath), &win32_path)); } TEST_F(FileUtilTest, CreateTemporaryFileInDirLongPathTest) { // Test that CreateTemporaryFileInDir() creates a path and returns a long path // if it is available. This test requires that: // - the filesystem at |temp_dir_| supports long filenames. // - the account has FILE_LIST_DIRECTORY permission for all ancestor // directories of |temp_dir_|. constexpr FilePath::CharType kLongDirName[] = FPL("A long path"); constexpr FilePath::CharType kTestSubDirName[] = FPL("test"); FilePath long_test_dir = temp_dir_.GetPath().Append(kLongDirName); ASSERT_TRUE(CreateDirectory(long_test_dir)); // kLongDirName is not a 8.3 component. So ::GetShortPathName() should give us // a different short name. FilePath short_test_dir = MakeShortFilePath(long_test_dir); ASSERT_FALSE(short_test_dir.empty()); ASSERT_NE(kLongDirName, short_test_dir.BaseName().value()); FilePath temp_file; ASSERT_TRUE(CreateTemporaryFileInDir(short_test_dir, &temp_file)); EXPECT_EQ(kLongDirName, temp_file.DirName().BaseName().value()); EXPECT_TRUE(PathExists(temp_file)); // Create a subdirectory of |long_test_dir| and make |long_test_dir| // unreadable. We should still be able to create a temp file in the // subdirectory, but we won't be able to determine the long path for it. This // mimics the environment that some users run where their user profiles reside // in a location where the don't have full access to the higher level // directories. (Note that this assumption is true for NTFS, but not for some // network file systems. E.g. AFS). FilePath access_test_dir = long_test_dir.Append(kTestSubDirName); ASSERT_TRUE(CreateDirectory(access_test_dir)); FilePermissionRestorer long_test_dir_restorer(long_test_dir); ASSERT_TRUE(MakeFileUnreadable(long_test_dir)); // Use the short form of the directory to create a temporary filename. ASSERT_TRUE(CreateTemporaryFileInDir( short_test_dir.Append(kTestSubDirName), &temp_file)); EXPECT_TRUE(PathExists(temp_file)); EXPECT_TRUE(short_test_dir.IsParent(temp_file.DirName())); // Check that the long path can't be determined for |temp_file|. // Helper method base::MakeLongFilePath returns an empty path on error. FilePath temp_file_long = MakeLongFilePath(temp_file); ASSERT_TRUE(temp_file_long.empty()); } TEST_F(FileUtilTest, MakeLongFilePathTest) { // Tests helper function base::MakeLongFilePath // If a username isn't a valid 8.3 short file name (even just a // lengthy name like "user with long name"), Windows will set the TMP and TEMP // environment variables to be 8.3 paths. ::GetTempPath (called in // base::GetTempDir) just uses the value specified by TMP or TEMP, and so can // return a short path. So from the start need to use MakeLongFilePath // to normalize the path for such test environments. FilePath temp_dir_long = MakeLongFilePath(temp_dir_.GetPath()); ASSERT_FALSE(temp_dir_long.empty()); FilePath long_test_dir = temp_dir_long.Append(FPL("A long directory name")); ASSERT_TRUE(CreateDirectory(long_test_dir)); // Directory name is not a 8.3 component. So ::GetShortPathName() should give // us a different short name. FilePath short_test_dir = MakeShortFilePath(long_test_dir); ASSERT_FALSE(short_test_dir.empty()); EXPECT_NE(long_test_dir, short_test_dir); EXPECT_EQ(long_test_dir, MakeLongFilePath(short_test_dir)); FilePath long_test_file = long_test_dir.Append(FPL("A long file name.1234")); CreateTextFile(long_test_file, bogus_content); ASSERT_TRUE(PathExists(long_test_file)); // File name is not a 8.3 component. So ::GetShortPathName() should give us // a different short name. FilePath short_test_file = MakeShortFilePath(long_test_file); ASSERT_FALSE(short_test_file.empty()); EXPECT_NE(long_test_file, short_test_file); EXPECT_EQ(long_test_file, MakeLongFilePath(short_test_file)); // MakeLongFilePath should return empty path if file does not exist. EXPECT_TRUE(DeleteFile(short_test_file)); EXPECT_TRUE(MakeLongFilePath(short_test_file).empty()); // MakeLongFilePath should return empty path if directory does not exist. EXPECT_TRUE(DeleteFile(short_test_dir)); EXPECT_TRUE(MakeLongFilePath(short_test_dir).empty()); } TEST_F(FileUtilTest, CreateWinHardlinkTest) { // Link to a different file name in a sub-directory of |temp_dir_|. FilePath test_dir = temp_dir_.GetPath().Append(FPL("test")); ASSERT_TRUE(CreateDirectory(test_dir)); FilePath temp_file; ASSERT_TRUE(CreateTemporaryFileInDir(temp_dir_.GetPath(), &temp_file)); FilePath link_to_file = test_dir.Append(FPL("linked_name")); EXPECT_TRUE(CreateWinHardLink(link_to_file, temp_file)); EXPECT_TRUE(PathExists(link_to_file)); // Link two directories. This should fail. Verify that failure is returned // by CreateWinHardLink. EXPECT_FALSE(CreateWinHardLink(temp_dir_.GetPath(), test_dir)); } TEST_F(FileUtilTest, PreventExecuteMappingNewFile) { base::test::ScopedFeatureList enforcement_feature; enforcement_feature.InitAndEnableFeature( features::kEnforceNoExecutableFileHandles); FilePath file = temp_dir_.GetPath().Append(FPL("afile.txt")); ASSERT_FALSE(PathExists(file)); { File new_file(file, File::FLAG_WRITE | File::FLAG_WIN_NO_EXECUTE | File::FLAG_CREATE_ALWAYS); ASSERT_TRUE(new_file.IsValid()); } { File open_file(file, File::FLAG_READ | File::FLAG_WIN_EXECUTE | File::FLAG_OPEN_ALWAYS); EXPECT_FALSE(open_file.IsValid()); } // Verify the deny ACL did not prevent deleting the file. EXPECT_TRUE(DeleteFile(file)); } TEST_F(FileUtilTest, PreventExecuteMappingExisting) { base::test::ScopedFeatureList enforcement_feature; enforcement_feature.InitAndEnableFeature( features::kEnforceNoExecutableFileHandles); FilePath file = temp_dir_.GetPath().Append(FPL("afile.txt")); CreateTextFile(file, bogus_content); ASSERT_TRUE(PathExists(file)); { File open_file(file, File::FLAG_READ | File::FLAG_WIN_EXECUTE | File::FLAG_OPEN_ALWAYS); EXPECT_TRUE(open_file.IsValid()); } EXPECT_TRUE(PreventExecuteMapping(file)); { File open_file(file, File::FLAG_READ | File::FLAG_WIN_EXECUTE | File::FLAG_OPEN_ALWAYS); EXPECT_FALSE(open_file.IsValid()); } // Verify the deny ACL did not prevent deleting the file. EXPECT_TRUE(DeleteFile(file)); } TEST_F(FileUtilTest, PreventExecuteMappingOpenFile) { base::test::ScopedFeatureList enforcement_feature; enforcement_feature.InitAndEnableFeature( features::kEnforceNoExecutableFileHandles); FilePath file = temp_dir_.GetPath().Append(FPL("afile.txt")); CreateTextFile(file, bogus_content); ASSERT_TRUE(PathExists(file)); File open_file(file, File::FLAG_READ | File::FLAG_WRITE | File::FLAG_WIN_EXECUTE | File::FLAG_OPEN_ALWAYS); EXPECT_TRUE(open_file.IsValid()); // Verify ACE can be set even on an open file. EXPECT_TRUE(PreventExecuteMapping(file)); { File second_open_file( file, File::FLAG_READ | File::FLAG_WRITE | File::FLAG_OPEN_ALWAYS); EXPECT_TRUE(second_open_file.IsValid()); } { File third_open_file(file, File::FLAG_READ | File::FLAG_WIN_EXECUTE | File::FLAG_OPEN_ALWAYS); EXPECT_FALSE(third_open_file.IsValid()); } open_file.Close(); // Verify the deny ACL did not prevent deleting the file. EXPECT_TRUE(DeleteFile(file)); } TEST(FileUtilDeathTest, DisallowNoExecuteOnUnsafeFile) { base::test::ScopedFeatureList enforcement_feature; enforcement_feature.InitAndEnableFeature( features::kEnforceNoExecutableFileHandles); base::FilePath local_app_data; // This test places a file in %LOCALAPPDATA% to verify that the checks in // IsPathSafeToSetAclOn work correctly. ASSERT_TRUE( base::PathService::Get(base::DIR_LOCAL_APP_DATA, &local_app_data)); base::FilePath file_path; EXPECT_DCHECK_DEATH_WITH( { { base::File temp_file = base::CreateAndOpenTemporaryFileInDir(local_app_data, &file_path); } File reopen_file(file_path, File::FLAG_READ | File::FLAG_WRITE | File::FLAG_WIN_NO_EXECUTE | File::FLAG_OPEN_ALWAYS | File::FLAG_DELETE_ON_CLOSE); }, "Unsafe to deny execute access to path"); } MULTIPROCESS_TEST_MAIN(NoExecuteOnSafeFileMain) { base::FilePath temp_file; CHECK(base::CreateTemporaryFile(&temp_file)); // A file with FLAG_WIN_NO_EXECUTE created in temp dir should always be // permitted. File reopen_file(temp_file, File::FLAG_READ | File::FLAG_WRITE | File::FLAG_WIN_NO_EXECUTE | File::FLAG_OPEN_ALWAYS | File::FLAG_DELETE_ON_CLOSE); return 0; } TEST_F(FileUtilTest, NoExecuteOnSafeFile) { FilePath new_dir; ASSERT_TRUE(CreateTemporaryDirInDir( temp_dir_.GetPath(), FILE_PATH_LITERAL("NoExecuteOnSafeFileLongPath"), &new_dir)); FilePath short_dir = base::MakeShortFilePath(new_dir); // Verify that the path really is 8.3 now. ASSERT_NE(new_dir.value(), short_dir.value()); LaunchOptions options; options.environment[L"TMP"] = short_dir.value(); CommandLine child_command_line(GetMultiProcessTestChildBaseCommandLine()); Process child_process = SpawnMultiProcessTestChild( "NoExecuteOnSafeFileMain", child_command_line, options); ASSERT_TRUE(child_process.IsValid()); int rv = -1; ASSERT_TRUE(WaitForMultiprocessTestChildExit( child_process, TestTimeouts::action_timeout(), &rv)); ASSERT_EQ(0, rv); } class FileUtilExecuteEnforcementTest : public FileUtilTest, public ::testing::WithParamInterface { public: FileUtilExecuteEnforcementTest() { if (IsEnforcementEnabled()) { enforcement_feature_.InitAndEnableFeature( features::kEnforceNoExecutableFileHandles); } else { enforcement_feature_.InitAndDisableFeature( features::kEnforceNoExecutableFileHandles); } } protected: bool IsEnforcementEnabled() { return GetParam(); } private: base::test::ScopedFeatureList enforcement_feature_; }; // This test verifies that if a file has been passed to `PreventExecuteMapping` // and enforcement is enabled, then it cannot be mapped as executable into // memory. TEST_P(FileUtilExecuteEnforcementTest, Functional) { FilePath dir_exe; EXPECT_TRUE(PathService::Get(DIR_EXE, &dir_exe)); // This DLL is built as part of base_unittests so is guaranteed to be present. FilePath test_dll(dir_exe.Append(FPL("scoped_handle_test_dll.dll"))); EXPECT_TRUE(base::PathExists(test_dll)); FilePath dll_copy_path = temp_dir_.GetPath().Append(FPL("test.dll")); ASSERT_TRUE(CopyFile(test_dll, dll_copy_path)); ASSERT_TRUE(PreventExecuteMapping(dll_copy_path)); ScopedNativeLibrary module(dll_copy_path); // If enforcement is enabled, then `PreventExecuteMapping` will have prevented // the load, and the module will be invalid. EXPECT_EQ(IsEnforcementEnabled(), !module.is_valid()); } INSTANTIATE_TEST_SUITE_P(EnforcementEnabled, FileUtilExecuteEnforcementTest, ::testing::Values(true)); INSTANTIATE_TEST_SUITE_P(EnforcementDisabled, FileUtilExecuteEnforcementTest, ::testing::Values(false)); #endif // BUILDFLAG(IS_WIN) #if BUILDFLAG(IS_POSIX) TEST_F(FileUtilTest, CreateAndReadSymlinks) { FilePath link_from = temp_dir_.GetPath().Append(FPL("from_file")); FilePath link_to = temp_dir_.GetPath().Append(FPL("to_file")); CreateTextFile(link_to, bogus_content); ASSERT_TRUE(CreateSymbolicLink(link_to, link_from)) << "Failed to create file symlink."; // If we created the link properly, we should be able to read the contents // through it. EXPECT_EQ(bogus_content, ReadTextFile(link_from)); FilePath result; ASSERT_TRUE(ReadSymbolicLink(link_from, &result)); EXPECT_EQ(link_to.value(), result.value()); // Link to a directory. link_from = temp_dir_.GetPath().Append(FPL("from_dir")); link_to = temp_dir_.GetPath().Append(FPL("to_dir")); ASSERT_TRUE(CreateDirectory(link_to)); ASSERT_TRUE(CreateSymbolicLink(link_to, link_from)) << "Failed to create directory symlink."; // Test failures. EXPECT_FALSE(CreateSymbolicLink(link_to, link_to)); EXPECT_FALSE(ReadSymbolicLink(link_to, &result)); FilePath missing = temp_dir_.GetPath().Append(FPL("missing")); EXPECT_FALSE(ReadSymbolicLink(missing, &result)); } TEST_F(FileUtilTest, CreateAndReadRelativeSymlinks) { FilePath link_from = temp_dir_.GetPath().Append(FPL("from_file")); FilePath filename_link_to("to_file"); FilePath link_to = temp_dir_.GetPath().Append(filename_link_to); FilePath link_from_in_subdir = temp_dir_.GetPath().Append(FPL("subdir")).Append(FPL("from_file")); FilePath link_to_in_subdir = FilePath(FPL("..")).Append(filename_link_to); CreateTextFile(link_to, bogus_content); ASSERT_TRUE(CreateDirectory(link_from_in_subdir.DirName())); ASSERT_TRUE(CreateSymbolicLink(link_to_in_subdir, link_from_in_subdir)); ASSERT_TRUE(CreateSymbolicLink(filename_link_to, link_from)) << "Failed to create file symlink."; // If we created the link properly, we should be able to read the contents // through it. EXPECT_EQ(bogus_content, ReadTextFile(link_from)); EXPECT_EQ(bogus_content, ReadTextFile(link_from_in_subdir)); FilePath result; ASSERT_TRUE(ReadSymbolicLink(link_from, &result)); EXPECT_EQ(filename_link_to.value(), result.value()); absl::optional absolute_link = ReadSymbolicLinkAbsolute(link_from); ASSERT_TRUE(absolute_link); EXPECT_EQ(link_to.value(), absolute_link->value()); absolute_link = ReadSymbolicLinkAbsolute(link_from_in_subdir); ASSERT_TRUE(absolute_link); EXPECT_EQ(link_to.value(), absolute_link->value()); // Link to a directory. link_from = temp_dir_.GetPath().Append(FPL("from_dir")); filename_link_to = FilePath("to_dir"); link_to = temp_dir_.GetPath().Append(filename_link_to); ASSERT_TRUE(CreateDirectory(link_to)); ASSERT_TRUE(CreateSymbolicLink(filename_link_to, link_from)) << "Failed to create relative directory symlink."; ASSERT_TRUE(ReadSymbolicLink(link_from, &result)); EXPECT_EQ(filename_link_to.value(), result.value()); absolute_link = ReadSymbolicLinkAbsolute(link_from); ASSERT_TRUE(absolute_link); EXPECT_EQ(link_to.value(), absolute_link->value()); // Test failures. EXPECT_FALSE(CreateSymbolicLink(link_to, link_to)); EXPECT_FALSE(ReadSymbolicLink(link_to, &result)); } // The following test of NormalizeFilePath() require that we create a symlink. // This can not be done on Windows before Vista. On Vista, creating a symlink // requires privilege "SeCreateSymbolicLinkPrivilege". // TODO(skerner): Investigate the possibility of giving base_unittests the // privileges required to create a symlink. TEST_F(FileUtilTest, NormalizeFilePathSymlinks) { // Link one file to another. FilePath link_from = temp_dir_.GetPath().Append(FPL("from_file")); FilePath link_to = temp_dir_.GetPath().Append(FPL("to_file")); CreateTextFile(link_to, bogus_content); ASSERT_TRUE(CreateSymbolicLink(link_to, link_from)) << "Failed to create file symlink."; // Check that NormalizeFilePath sees the link. FilePath normalized_path; ASSERT_TRUE(NormalizeFilePath(link_from, &normalized_path)); EXPECT_NE(link_from, link_to); EXPECT_EQ(link_to.BaseName().value(), normalized_path.BaseName().value()); EXPECT_EQ(link_to.BaseName().value(), normalized_path.BaseName().value()); // Link to a directory. link_from = temp_dir_.GetPath().Append(FPL("from_dir")); link_to = temp_dir_.GetPath().Append(FPL("to_dir")); ASSERT_TRUE(CreateDirectory(link_to)); ASSERT_TRUE(CreateSymbolicLink(link_to, link_from)) << "Failed to create directory symlink."; EXPECT_FALSE(NormalizeFilePath(link_from, &normalized_path)) << "Links to directories should return false."; // Test that a loop in the links causes NormalizeFilePath() to return false. link_from = temp_dir_.GetPath().Append(FPL("link_a")); link_to = temp_dir_.GetPath().Append(FPL("link_b")); ASSERT_TRUE(CreateSymbolicLink(link_to, link_from)) << "Failed to create loop symlink a."; ASSERT_TRUE(CreateSymbolicLink(link_from, link_to)) << "Failed to create loop symlink b."; // Infinite loop! EXPECT_FALSE(NormalizeFilePath(link_from, &normalized_path)); } TEST_F(FileUtilTest, DeleteSymlinkToExistentFile) { // Create a file. FilePath file_name = temp_dir_.GetPath().Append(FPL("Test DeleteFile 2.txt")); CreateTextFile(file_name, bogus_content); ASSERT_TRUE(PathExists(file_name)); // Create a symlink to the file. FilePath file_link = temp_dir_.GetPath().Append("file_link_2"); ASSERT_TRUE(CreateSymbolicLink(file_name, file_link)) << "Failed to create symlink."; // Delete the symbolic link. EXPECT_TRUE(DeleteFile(file_link)); // Make sure original file is not deleted. EXPECT_FALSE(PathExists(file_link)); EXPECT_TRUE(PathExists(file_name)); } TEST_F(FileUtilTest, DeleteSymlinkToNonExistentFile) { // Create a non-existent file path. FilePath non_existent = temp_dir_.GetPath().Append(FPL("Test DeleteFile 3.txt")); EXPECT_FALSE(PathExists(non_existent)); // Create a symlink to the non-existent file. FilePath file_link = temp_dir_.GetPath().Append("file_link_3"); ASSERT_TRUE(CreateSymbolicLink(non_existent, file_link)) << "Failed to create symlink."; // Make sure the symbolic link is exist. EXPECT_TRUE(IsLink(file_link)); EXPECT_FALSE(PathExists(file_link)); // Delete the symbolic link. EXPECT_TRUE(DeleteFile(file_link)); // Make sure the symbolic link is deleted. EXPECT_FALSE(IsLink(file_link)); } TEST_F(FileUtilTest, CopyFileFollowsSymlinks) { FilePath link_from = temp_dir_.GetPath().Append(FPL("from_file")); FilePath link_to = temp_dir_.GetPath().Append(FPL("to_file")); CreateTextFile(link_to, bogus_content); ASSERT_TRUE(CreateSymbolicLink(link_to, link_from)); // If we created the link properly, we should be able to read the contents // through it. EXPECT_EQ(bogus_content, ReadTextFile(link_from)); FilePath result; ASSERT_TRUE(ReadSymbolicLink(link_from, &result)); EXPECT_EQ(link_to.value(), result.value()); // Create another file and copy it to |link_from|. FilePath src_file = temp_dir_.GetPath().Append(FPL("src.txt")); const std::wstring file_contents(L"Gooooooooooooooooooooogle"); CreateTextFile(src_file, file_contents); ASSERT_TRUE(CopyFile(src_file, link_from)); // Make sure |link_from| is still a symlink, and |link_to| has been written to // by CopyFile(). EXPECT_TRUE(IsLink(link_from)); EXPECT_EQ(file_contents, ReadTextFile(link_from)); EXPECT_EQ(file_contents, ReadTextFile(link_to)); } TEST_F(FileUtilTest, ChangeFilePermissionsAndRead) { // Create a file path. FilePath file_name = temp_dir_.GetPath().Append(FPL("Test Readable File.txt")); EXPECT_FALSE(PathExists(file_name)); EXPECT_FALSE(PathIsReadable(file_name)); static constexpr char kData[] = "hello"; static constexpr int kDataSize = sizeof(kData) - 1; char buffer[kDataSize]; // Write file. EXPECT_TRUE(WriteFile(file_name, kData)); EXPECT_TRUE(PathExists(file_name)); // Make sure the file is readable. int32_t mode = 0; EXPECT_TRUE(GetPosixFilePermissions(file_name, &mode)); EXPECT_TRUE(mode & FILE_PERMISSION_READ_BY_USER); EXPECT_TRUE(PathIsReadable(file_name)); // Get rid of the read permission. EXPECT_TRUE(SetPosixFilePermissions(file_name, 0u)); EXPECT_TRUE(GetPosixFilePermissions(file_name, &mode)); EXPECT_FALSE(mode & FILE_PERMISSION_READ_BY_USER); EXPECT_FALSE(PathIsReadable(file_name)); // Make sure the file can't be read. EXPECT_EQ(-1, ReadFile(file_name, buffer, kDataSize)); // Give the read permission. EXPECT_TRUE(SetPosixFilePermissions(file_name, FILE_PERMISSION_READ_BY_USER)); EXPECT_TRUE(GetPosixFilePermissions(file_name, &mode)); EXPECT_TRUE(mode & FILE_PERMISSION_READ_BY_USER); EXPECT_TRUE(PathIsReadable(file_name)); // Make sure the file can be read. EXPECT_EQ(kDataSize, ReadFile(file_name, buffer, kDataSize)); // Delete the file. EXPECT_TRUE(DeleteFile(file_name)); EXPECT_FALSE(PathExists(file_name)); } TEST_F(FileUtilTest, ChangeFilePermissionsAndWrite) { // Create a file path. FilePath file_name = temp_dir_.GetPath().Append(FPL("Test Readable File.txt")); EXPECT_FALSE(PathExists(file_name)); const std::string kData("hello"); // Write file. EXPECT_TRUE(WriteFile(file_name, kData)); EXPECT_TRUE(PathExists(file_name)); // Make sure the file is writable. int mode = 0; EXPECT_TRUE(GetPosixFilePermissions(file_name, &mode)); EXPECT_TRUE(mode & FILE_PERMISSION_WRITE_BY_USER); EXPECT_TRUE(PathIsWritable(file_name)); // Get rid of the write permission. EXPECT_TRUE(SetPosixFilePermissions(file_name, 0u)); EXPECT_TRUE(GetPosixFilePermissions(file_name, &mode)); EXPECT_FALSE(mode & FILE_PERMISSION_WRITE_BY_USER); // Make sure the file can't be write. EXPECT_FALSE(WriteFile(file_name, kData)); EXPECT_FALSE(PathIsWritable(file_name)); // Give read permission. EXPECT_TRUE(SetPosixFilePermissions(file_name, FILE_PERMISSION_WRITE_BY_USER)); EXPECT_TRUE(GetPosixFilePermissions(file_name, &mode)); EXPECT_TRUE(mode & FILE_PERMISSION_WRITE_BY_USER); // Make sure the file can be write. EXPECT_TRUE(WriteFile(file_name, kData)); EXPECT_TRUE(PathIsWritable(file_name)); // Delete the file. EXPECT_TRUE(DeleteFile(file_name)); EXPECT_FALSE(PathExists(file_name)); } TEST_F(FileUtilTest, ChangeDirectoryPermissionsAndEnumerate) { // Create a directory path. FilePath subdir_path = temp_dir_.GetPath().Append(FPL("PermissionTest1")); CreateDirectory(subdir_path); ASSERT_TRUE(PathExists(subdir_path)); // Create a dummy file to enumerate. FilePath file_name = subdir_path.Append(FPL("Test Readable File.txt")); EXPECT_FALSE(PathExists(file_name)); const std::string kData("hello"); EXPECT_TRUE(WriteFile(file_name, kData)); EXPECT_TRUE(PathExists(file_name)); // Make sure the directory has the all permissions. int mode = 0; EXPECT_TRUE(GetPosixFilePermissions(subdir_path, &mode)); EXPECT_EQ(FILE_PERMISSION_USER_MASK, mode & FILE_PERMISSION_USER_MASK); // Get rid of the permissions from the directory. EXPECT_TRUE(SetPosixFilePermissions(subdir_path, 0u)); EXPECT_TRUE(GetPosixFilePermissions(subdir_path, &mode)); EXPECT_FALSE(mode & FILE_PERMISSION_USER_MASK); // Make sure the file in the directory can't be enumerated. FileEnumerator f1(subdir_path, true, FileEnumerator::FILES); EXPECT_TRUE(PathExists(subdir_path)); FindResultCollector c1(&f1); EXPECT_EQ(0, c1.size()); EXPECT_FALSE(GetPosixFilePermissions(file_name, &mode)); // Give the permissions to the directory. EXPECT_TRUE(SetPosixFilePermissions(subdir_path, FILE_PERMISSION_USER_MASK)); EXPECT_TRUE(GetPosixFilePermissions(subdir_path, &mode)); EXPECT_EQ(FILE_PERMISSION_USER_MASK, mode & FILE_PERMISSION_USER_MASK); // Make sure the file in the directory can be enumerated. FileEnumerator f2(subdir_path, true, FileEnumerator::FILES); FindResultCollector c2(&f2); EXPECT_TRUE(c2.HasFile(file_name)); EXPECT_EQ(1, c2.size()); // Delete the file. EXPECT_TRUE(DeletePathRecursively(subdir_path)); EXPECT_FALSE(PathExists(subdir_path)); } TEST_F(FileUtilTest, ExecutableExistsInPath) { // Create two directories that we will put in our PATH const FilePath::CharType kDir1[] = FPL("dir1"); const FilePath::CharType kDir2[] = FPL("dir2"); FilePath dir1 = temp_dir_.GetPath().Append(kDir1); FilePath dir2 = temp_dir_.GetPath().Append(kDir2); ASSERT_TRUE(CreateDirectory(dir1)); ASSERT_TRUE(CreateDirectory(dir2)); ScopedEnvironmentVariableOverride scoped_env( "PATH", dir1.value() + ":" + dir2.value()); ASSERT_TRUE(scoped_env.IsOverridden()); const FilePath::CharType kRegularFileName[] = FPL("regular_file"); const FilePath::CharType kExeFileName[] = FPL("exe"); const FilePath::CharType kDneFileName[] = FPL("does_not_exist"); const FilePath kExePath = dir1.Append(kExeFileName); const FilePath kRegularFilePath = dir2.Append(kRegularFileName); // Write file. const std::string kData("hello"); ASSERT_TRUE(WriteFile(kExePath, kData)); ASSERT_TRUE(PathExists(kExePath)); ASSERT_TRUE(WriteFile(kRegularFilePath, kData)); ASSERT_TRUE(PathExists(kRegularFilePath)); ASSERT_TRUE(SetPosixFilePermissions(dir1.Append(kExeFileName), FILE_PERMISSION_EXECUTE_BY_USER)); EXPECT_TRUE(ExecutableExistsInPath(scoped_env.GetEnv(), kExeFileName)); EXPECT_FALSE(ExecutableExistsInPath(scoped_env.GetEnv(), kRegularFileName)); EXPECT_FALSE(ExecutableExistsInPath(scoped_env.GetEnv(), kDneFileName)); } TEST_F(FileUtilTest, CopyDirectoryPermissions) { // Create a directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); CreateDirectory(dir_name_from); ASSERT_TRUE(PathExists(dir_name_from)); // Create some regular files under the directory with various permissions. FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Reggy-1.txt")); CreateTextFile(file_name_from, L"Mordecai"); ASSERT_TRUE(PathExists(file_name_from)); ASSERT_TRUE(SetPosixFilePermissions(file_name_from, 0755)); FilePath file2_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Reggy-2.txt")); CreateTextFile(file2_name_from, L"Rigby"); ASSERT_TRUE(PathExists(file2_name_from)); ASSERT_TRUE(SetPosixFilePermissions(file2_name_from, 0777)); FilePath file3_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Reggy-3.txt")); CreateTextFile(file3_name_from, L"Benson"); ASSERT_TRUE(PathExists(file3_name_from)); ASSERT_TRUE(SetPosixFilePermissions(file3_name_from, 0400)); // Copy the directory recursively. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Reggy-1.txt")); FilePath file2_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Reggy-2.txt")); FilePath file3_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Reggy-3.txt")); ASSERT_FALSE(PathExists(dir_name_to)); EXPECT_TRUE(CopyDirectory(dir_name_from, dir_name_to, true)); ASSERT_TRUE(PathExists(file_name_to)); ASSERT_TRUE(PathExists(file2_name_to)); ASSERT_TRUE(PathExists(file3_name_to)); int mode = 0; int expected_mode; ASSERT_TRUE(GetPosixFilePermissions(file_name_to, &mode)); #if BUILDFLAG(IS_APPLE) expected_mode = 0755; #elif BUILDFLAG(IS_CHROMEOS) expected_mode = 0644; #else expected_mode = 0600; #endif EXPECT_EQ(expected_mode, mode); ASSERT_TRUE(GetPosixFilePermissions(file2_name_to, &mode)); #if BUILDFLAG(IS_APPLE) expected_mode = 0755; #elif BUILDFLAG(IS_CHROMEOS) expected_mode = 0644; #else expected_mode = 0600; #endif EXPECT_EQ(expected_mode, mode); ASSERT_TRUE(GetPosixFilePermissions(file3_name_to, &mode)); #if BUILDFLAG(IS_APPLE) expected_mode = 0600; #elif BUILDFLAG(IS_CHROMEOS) expected_mode = 0644; #else expected_mode = 0600; #endif EXPECT_EQ(expected_mode, mode); } TEST_F(FileUtilTest, CopyDirectoryPermissionsOverExistingFile) { // Create a directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); CreateDirectory(dir_name_from); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory. FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Reggy-1.txt")); CreateTextFile(file_name_from, L"Mordecai"); ASSERT_TRUE(PathExists(file_name_from)); ASSERT_TRUE(SetPosixFilePermissions(file_name_from, 0644)); // Create a directory. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); CreateDirectory(dir_name_to); ASSERT_TRUE(PathExists(dir_name_to)); // Create a file under the directory with wider permissions. FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Reggy-1.txt")); CreateTextFile(file_name_to, L"Rigby"); ASSERT_TRUE(PathExists(file_name_to)); ASSERT_TRUE(SetPosixFilePermissions(file_name_to, 0777)); // Ensure that when we copy the directory, the file contents are copied // but the permissions on the destination are left alone. EXPECT_TRUE(CopyDirectory(dir_name_from, dir_name_to, false)); ASSERT_TRUE(PathExists(file_name_to)); ASSERT_EQ(L"Mordecai", ReadTextFile(file_name_to)); int mode = 0; ASSERT_TRUE(GetPosixFilePermissions(file_name_to, &mode)); EXPECT_EQ(0777, mode); } TEST_F(FileUtilTest, CopyDirectoryExclDoesNotOverwrite) { // Create source directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); CreateDirectory(dir_name_from); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory. FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Reggy-1.txt")); CreateTextFile(file_name_from, L"Mordecai"); ASSERT_TRUE(PathExists(file_name_from)); // Create destination directory. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); CreateDirectory(dir_name_to); ASSERT_TRUE(PathExists(dir_name_to)); // Create a file under the directory with the same name. FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Reggy-1.txt")); CreateTextFile(file_name_to, L"Rigby"); ASSERT_TRUE(PathExists(file_name_to)); // Ensure that copying failed and the file was not overwritten. EXPECT_FALSE(CopyDirectoryExcl(dir_name_from, dir_name_to, false)); ASSERT_TRUE(PathExists(file_name_to)); ASSERT_EQ(L"Rigby", ReadTextFile(file_name_to)); } TEST_F(FileUtilTest, CopyDirectoryExclDirectoryOverExistingFile) { // Create source directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); CreateDirectory(dir_name_from); ASSERT_TRUE(PathExists(dir_name_from)); // Create a subdirectory. FilePath subdir_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Subsub")); CreateDirectory(subdir_name_from); ASSERT_TRUE(PathExists(subdir_name_from)); // Create destination directory. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); CreateDirectory(dir_name_to); ASSERT_TRUE(PathExists(dir_name_to)); // Create a regular file under the directory with the same name. FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Subsub")); CreateTextFile(file_name_to, L"Rigby"); ASSERT_TRUE(PathExists(file_name_to)); // Ensure that copying failed and the file was not overwritten. EXPECT_FALSE(CopyDirectoryExcl(dir_name_from, dir_name_to, false)); ASSERT_TRUE(PathExists(file_name_to)); ASSERT_EQ(L"Rigby", ReadTextFile(file_name_to)); } TEST_F(FileUtilTest, CopyDirectoryExclDirectoryOverExistingDirectory) { // Create source directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); CreateDirectory(dir_name_from); ASSERT_TRUE(PathExists(dir_name_from)); // Create a subdirectory. FilePath subdir_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Subsub")); CreateDirectory(subdir_name_from); ASSERT_TRUE(PathExists(subdir_name_from)); // Create destination directory. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); CreateDirectory(dir_name_to); ASSERT_TRUE(PathExists(dir_name_to)); // Create a subdirectory under the directory with the same name. FilePath subdir_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Subsub")); CreateDirectory(subdir_name_to); ASSERT_TRUE(PathExists(subdir_name_to)); // Ensure that copying failed and the file was not overwritten. EXPECT_FALSE(CopyDirectoryExcl(dir_name_from, dir_name_to, false)); } TEST_F(FileUtilTest, CopyFileExecutablePermission) { FilePath src = temp_dir_.GetPath().Append(FPL("src.txt")); const std::wstring file_contents(L"Gooooooooooooooooooooogle"); CreateTextFile(src, file_contents); ASSERT_TRUE(SetPosixFilePermissions(src, 0755)); int mode = 0; ASSERT_TRUE(GetPosixFilePermissions(src, &mode)); EXPECT_EQ(0755, mode); FilePath dst = temp_dir_.GetPath().Append(FPL("dst.txt")); ASSERT_TRUE(CopyFile(src, dst)); EXPECT_EQ(file_contents, ReadTextFile(dst)); ASSERT_TRUE(GetPosixFilePermissions(dst, &mode)); int expected_mode; #if BUILDFLAG(IS_APPLE) expected_mode = 0755; #elif BUILDFLAG(IS_CHROMEOS) expected_mode = 0644; #else expected_mode = 0600; #endif EXPECT_EQ(expected_mode, mode); ASSERT_TRUE(DeleteFile(dst)); ASSERT_TRUE(SetPosixFilePermissions(src, 0777)); ASSERT_TRUE(GetPosixFilePermissions(src, &mode)); EXPECT_EQ(0777, mode); ASSERT_TRUE(CopyFile(src, dst)); EXPECT_EQ(file_contents, ReadTextFile(dst)); ASSERT_TRUE(GetPosixFilePermissions(dst, &mode)); #if BUILDFLAG(IS_APPLE) expected_mode = 0755; #elif BUILDFLAG(IS_CHROMEOS) expected_mode = 0644; #else expected_mode = 0600; #endif EXPECT_EQ(expected_mode, mode); ASSERT_TRUE(DeleteFile(dst)); ASSERT_TRUE(SetPosixFilePermissions(src, 0400)); ASSERT_TRUE(GetPosixFilePermissions(src, &mode)); EXPECT_EQ(0400, mode); ASSERT_TRUE(CopyFile(src, dst)); EXPECT_EQ(file_contents, ReadTextFile(dst)); ASSERT_TRUE(GetPosixFilePermissions(dst, &mode)); #if BUILDFLAG(IS_APPLE) expected_mode = 0600; #elif BUILDFLAG(IS_CHROMEOS) expected_mode = 0644; #else expected_mode = 0600; #endif EXPECT_EQ(expected_mode, mode); // This time, do not delete |dst|. Instead set its permissions to 0777. ASSERT_TRUE(SetPosixFilePermissions(dst, 0777)); ASSERT_TRUE(GetPosixFilePermissions(dst, &mode)); EXPECT_EQ(0777, mode); // Overwrite it and check the permissions again. ASSERT_TRUE(CopyFile(src, dst)); EXPECT_EQ(file_contents, ReadTextFile(dst)); ASSERT_TRUE(GetPosixFilePermissions(dst, &mode)); EXPECT_EQ(0777, mode); } #endif // BUILDFLAG(IS_POSIX) #if !BUILDFLAG(IS_FUCHSIA) TEST_F(FileUtilTest, CopyFileACL) { // While FileUtilTest.CopyFile asserts the content is correctly copied over, // this test case asserts the access control bits are meeting expectations in // CopyFile(). FilePath src = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("src.txt")); const std::wstring file_contents(L"Gooooooooooooooooooooogle"); CreateTextFile(src, file_contents); // Set the source file to read-only. ASSERT_FALSE(IsReadOnly(src)); SetReadOnly(src, true); ASSERT_TRUE(IsReadOnly(src)); // Copy the file. FilePath dst = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("dst.txt")); ASSERT_TRUE(CopyFile(src, dst)); EXPECT_EQ(file_contents, ReadTextFile(dst)); ASSERT_FALSE(IsReadOnly(dst)); } TEST_F(FileUtilTest, CopyDirectoryACL) { // Create source directories. FilePath src = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("src")); FilePath src_subdir = src.Append(FILE_PATH_LITERAL("subdir")); CreateDirectory(src_subdir); ASSERT_TRUE(PathExists(src_subdir)); // Create a file under the directory. FilePath src_file = src.Append(FILE_PATH_LITERAL("src.txt")); CreateTextFile(src_file, L"Gooooooooooooooooooooogle"); SetReadOnly(src_file, true); ASSERT_TRUE(IsReadOnly(src_file)); // Make directory read-only. SetReadOnly(src_subdir, true); ASSERT_TRUE(IsReadOnly(src_subdir)); // Copy the directory recursively. FilePath dst = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("dst")); FilePath dst_file = dst.Append(FILE_PATH_LITERAL("src.txt")); EXPECT_TRUE(CopyDirectory(src, dst, true)); FilePath dst_subdir = dst.Append(FILE_PATH_LITERAL("subdir")); ASSERT_FALSE(IsReadOnly(dst_subdir)); ASSERT_FALSE(IsReadOnly(dst_file)); // Give write permissions to allow deletion. SetReadOnly(src_subdir, false); ASSERT_FALSE(IsReadOnly(src_subdir)); } #endif // !BUILDFLAG(IS_FUCHSIA) TEST_F(FileUtilTest, DeleteNonExistent) { FilePath non_existent = temp_dir_.GetPath().AppendASCII("bogus_file_dne.foobar"); ASSERT_FALSE(PathExists(non_existent)); EXPECT_TRUE(DeleteFile(non_existent)); ASSERT_FALSE(PathExists(non_existent)); EXPECT_TRUE(DeletePathRecursively(non_existent)); ASSERT_FALSE(PathExists(non_existent)); } TEST_F(FileUtilTest, DeleteNonExistentWithNonExistentParent) { FilePath non_existent = temp_dir_.GetPath().AppendASCII("bogus_topdir"); non_existent = non_existent.AppendASCII("bogus_subdir"); ASSERT_FALSE(PathExists(non_existent)); EXPECT_TRUE(DeleteFile(non_existent)); ASSERT_FALSE(PathExists(non_existent)); EXPECT_TRUE(DeletePathRecursively(non_existent)); ASSERT_FALSE(PathExists(non_existent)); } TEST_F(FileUtilTest, DeleteFile) { // Create a file FilePath file_name = temp_dir_.GetPath().Append(FPL("Test DeleteFile 1.txt")); CreateTextFile(file_name, bogus_content); ASSERT_TRUE(PathExists(file_name)); // Make sure it's deleted EXPECT_TRUE(DeleteFile(file_name)); EXPECT_FALSE(PathExists(file_name)); // Test recursive case, create a new file file_name = temp_dir_.GetPath().Append(FPL("Test DeleteFile 2.txt")); CreateTextFile(file_name, bogus_content); ASSERT_TRUE(PathExists(file_name)); // Make sure it's deleted EXPECT_TRUE(DeletePathRecursively(file_name)); EXPECT_FALSE(PathExists(file_name)); } #if BUILDFLAG(IS_ANDROID) TEST_F(FileUtilTest, DeleteContentUri) { // Get the path to the test file. FilePath data_dir; ASSERT_TRUE(PathService::Get(DIR_TEST_DATA, &data_dir)); data_dir = data_dir.Append(FPL("file_util")); ASSERT_TRUE(PathExists(data_dir)); FilePath image_file = data_dir.Append(FPL("red.png")); ASSERT_TRUE(PathExists(image_file)); // Make a copy (we don't want to delete the original red.png when deleting the // content URI). FilePath image_copy = data_dir.Append(FPL("redcopy.png")); ASSERT_TRUE(CopyFile(image_file, image_copy)); // Insert the image into MediaStore and get a content URI. FilePath uri_path = InsertImageIntoMediaStore(image_copy); ASSERT_TRUE(uri_path.IsContentUri()); ASSERT_TRUE(PathExists(uri_path)); // Try deleting the content URI. EXPECT_TRUE(DeleteFile(uri_path)); EXPECT_FALSE(PathExists(image_copy)); EXPECT_FALSE(PathExists(uri_path)); } #endif // BUILDFLAG(IS_ANDROID) #if BUILDFLAG(IS_WIN) // Tests that the Delete function works for wild cards, especially // with the recursion flag. Also coincidentally tests PathExists. // TODO(erikkay): see if anyone's actually using this feature of the API TEST_F(FileUtilTest, DeleteWildCard) { // Create a file and a directory FilePath file_name = temp_dir_.GetPath().Append(FPL("Test DeleteWildCard.txt")); CreateTextFile(file_name, bogus_content); ASSERT_TRUE(PathExists(file_name)); FilePath subdir_path = temp_dir_.GetPath().Append(FPL("DeleteWildCardDir")); CreateDirectory(subdir_path); ASSERT_TRUE(PathExists(subdir_path)); // Create the wildcard path FilePath directory_contents = temp_dir_.GetPath(); directory_contents = directory_contents.Append(FPL("*")); // Delete non-recursively and check that only the file is deleted EXPECT_TRUE(DeleteFile(directory_contents)); EXPECT_FALSE(PathExists(file_name)); EXPECT_TRUE(PathExists(subdir_path)); // Delete recursively and make sure all contents are deleted EXPECT_TRUE(DeletePathRecursively(directory_contents)); EXPECT_FALSE(PathExists(file_name)); EXPECT_FALSE(PathExists(subdir_path)); } // TODO(erikkay): see if anyone's actually using this feature of the API TEST_F(FileUtilTest, DeleteNonExistantWildCard) { // Create a file and a directory FilePath subdir_path = temp_dir_.GetPath().Append(FPL("DeleteNonExistantWildCard")); CreateDirectory(subdir_path); ASSERT_TRUE(PathExists(subdir_path)); // Create the wildcard path FilePath directory_contents = subdir_path; directory_contents = directory_contents.Append(FPL("*")); // Delete non-recursively and check nothing got deleted EXPECT_TRUE(DeleteFile(directory_contents)); EXPECT_TRUE(PathExists(subdir_path)); // Delete recursively and check nothing got deleted EXPECT_TRUE(DeletePathRecursively(directory_contents)); EXPECT_TRUE(PathExists(subdir_path)); } #endif // Tests non-recursive Delete() for a directory. TEST_F(FileUtilTest, DeleteDirNonRecursive) { // Create a subdirectory and put a file and two directories inside. FilePath test_subdir = temp_dir_.GetPath().Append(FPL("DeleteDirNonRecursive")); CreateDirectory(test_subdir); ASSERT_TRUE(PathExists(test_subdir)); FilePath file_name = test_subdir.Append(FPL("Test DeleteDir.txt")); CreateTextFile(file_name, bogus_content); ASSERT_TRUE(PathExists(file_name)); FilePath subdir_path1 = test_subdir.Append(FPL("TestSubDir1")); CreateDirectory(subdir_path1); ASSERT_TRUE(PathExists(subdir_path1)); FilePath subdir_path2 = test_subdir.Append(FPL("TestSubDir2")); CreateDirectory(subdir_path2); ASSERT_TRUE(PathExists(subdir_path2)); // Delete non-recursively and check that the empty dir got deleted EXPECT_TRUE(DeleteFile(subdir_path2)); EXPECT_FALSE(PathExists(subdir_path2)); // Delete non-recursively and check that nothing got deleted EXPECT_FALSE(DeleteFile(test_subdir)); EXPECT_TRUE(PathExists(test_subdir)); EXPECT_TRUE(PathExists(file_name)); EXPECT_TRUE(PathExists(subdir_path1)); } // Tests recursive Delete() for a directory. TEST_F(FileUtilTest, DeleteDirRecursive) { // Create a subdirectory and put a file and two directories inside. FilePath test_subdir = temp_dir_.GetPath().Append(FPL("DeleteDirRecursive")); CreateDirectory(test_subdir); ASSERT_TRUE(PathExists(test_subdir)); FilePath file_name = test_subdir.Append(FPL("Test DeleteDirRecursive.txt")); CreateTextFile(file_name, bogus_content); ASSERT_TRUE(PathExists(file_name)); FilePath subdir_path1 = test_subdir.Append(FPL("TestSubDir1")); CreateDirectory(subdir_path1); ASSERT_TRUE(PathExists(subdir_path1)); FilePath subdir_path2 = test_subdir.Append(FPL("TestSubDir2")); CreateDirectory(subdir_path2); ASSERT_TRUE(PathExists(subdir_path2)); // Delete recursively and check that the empty dir got deleted EXPECT_TRUE(DeletePathRecursively(subdir_path2)); EXPECT_FALSE(PathExists(subdir_path2)); // Delete recursively and check that everything got deleted EXPECT_TRUE(DeletePathRecursively(test_subdir)); EXPECT_FALSE(PathExists(file_name)); EXPECT_FALSE(PathExists(subdir_path1)); EXPECT_FALSE(PathExists(test_subdir)); } // Tests recursive Delete() for a directory. TEST_F(FileUtilTest, DeleteDirRecursiveWithOpenFile) { // Create a subdirectory and put a file and two directories inside. FilePath test_subdir = temp_dir_.GetPath().Append(FPL("DeleteWithOpenFile")); CreateDirectory(test_subdir); ASSERT_TRUE(PathExists(test_subdir)); FilePath file_name1 = test_subdir.Append(FPL("Undeletebable File1.txt")); File file1(file_name1, File::FLAG_CREATE | File::FLAG_READ | File::FLAG_WRITE); ASSERT_TRUE(PathExists(file_name1)); FilePath file_name2 = test_subdir.Append(FPL("Deleteable File2.txt")); CreateTextFile(file_name2, bogus_content); ASSERT_TRUE(PathExists(file_name2)); FilePath file_name3 = test_subdir.Append(FPL("Undeletebable File3.txt")); File file3(file_name3, File::FLAG_CREATE | File::FLAG_READ | File::FLAG_WRITE); ASSERT_TRUE(PathExists(file_name3)); #if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) // On Windows, holding the file open in sufficient to make it un-deletable. // The POSIX code is verifiable on Linux by creating an "immutable" file but // this is best-effort because it's not supported by all file systems. Both // files will have the same flags so no need to get them individually. int flags; bool file_attrs_supported = ioctl(file1.GetPlatformFile(), FS_IOC_GETFLAGS, &flags) == 0; // Some filesystems (e.g. tmpfs) don't support file attributes. if (file_attrs_supported) { flags |= FS_IMMUTABLE_FL; ioctl(file1.GetPlatformFile(), FS_IOC_SETFLAGS, &flags); ioctl(file3.GetPlatformFile(), FS_IOC_SETFLAGS, &flags); } #endif // Delete recursively and check that at least the second file got deleted. // This ensures that un-deletable files don't impact those that can be. DeletePathRecursively(test_subdir); EXPECT_FALSE(PathExists(file_name2)); #if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) // Make sure that the test can clean up after itself. if (file_attrs_supported) { flags &= ~FS_IMMUTABLE_FL; ioctl(file1.GetPlatformFile(), FS_IOC_SETFLAGS, &flags); ioctl(file3.GetPlatformFile(), FS_IOC_SETFLAGS, &flags); } #endif } #if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) // This test will validate that files which would block when read result in a // failure on a call to ReadFileToStringNonBlocking. To accomplish this we will // use a named pipe because it appears as a file on disk and we can control how // much data is available to read. This allows us to simulate a file which would // block. TEST_F(FileUtilTest, TestNonBlockingFileReadLinux) { FilePath fifo_path = temp_dir_.GetPath().Append(FPL("fifo")); int res = mkfifo(fifo_path.MaybeAsASCII().c_str(), S_IWUSR | S_IRUSR | S_IWGRP | S_IWGRP); ASSERT_NE(res, -1); base::ScopedFD fd(open(fifo_path.MaybeAsASCII().c_str(), O_RDWR)); ASSERT_TRUE(fd.is_valid()); std::string result; // We will try to read when nothing is available on the fifo, the output // string will be unmodified and it will fail with EWOULDBLOCK. ASSERT_FALSE(ReadFileToStringNonBlocking(fifo_path, &result)); EXPECT_EQ(errno, EWOULDBLOCK); EXPECT_TRUE(result.empty()); // Make a single byte available to read on the FIFO. ASSERT_EQ(write(fd.get(), "a", 1), 1); // Now the key part of the test we will call ReadFromFileNonBlocking which // should fail, errno will be EWOULDBLOCK and the output string will contain // the single 'a' byte. ASSERT_FALSE(ReadFileToStringNonBlocking(fifo_path, &result)); EXPECT_EQ(errno, EWOULDBLOCK); ASSERT_EQ(result.size(), 1u); EXPECT_EQ(result[0], 'a'); } #endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) TEST_F(FileUtilTest, MoveFileNew) { // Create a file FilePath file_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Move_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // The destination. FilePath file_name_to = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("Move_Test_File_Destination.txt")); ASSERT_FALSE(PathExists(file_name_to)); EXPECT_TRUE(Move(file_name_from, file_name_to)); // Check everything has been moved. EXPECT_FALSE(PathExists(file_name_from)); EXPECT_TRUE(PathExists(file_name_to)); } TEST_F(FileUtilTest, MoveFileExists) { // Create a file FilePath file_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Move_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // The destination name. FilePath file_name_to = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("Move_Test_File_Destination.txt")); CreateTextFile(file_name_to, L"Old file content"); ASSERT_TRUE(PathExists(file_name_to)); EXPECT_TRUE(Move(file_name_from, file_name_to)); // Check everything has been moved. EXPECT_FALSE(PathExists(file_name_from)); EXPECT_TRUE(PathExists(file_name_to)); EXPECT_TRUE(L"Gooooooooooooooooooooogle" == ReadTextFile(file_name_to)); } TEST_F(FileUtilTest, MoveFileDirExists) { // Create a file FilePath file_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Move_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // The destination directory FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Destination")); CreateDirectory(dir_name_to); ASSERT_TRUE(PathExists(dir_name_to)); EXPECT_FALSE(Move(file_name_from, dir_name_to)); } TEST_F(FileUtilTest, MoveNew) { // Create a directory FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Move_From_Subdir")); CreateDirectory(dir_name_from); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory FilePath txt_file_name(FILE_PATH_LITERAL("Move_Test_File.txt")); FilePath file_name_from = dir_name_from.Append(txt_file_name); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // Move the directory. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Move_To_Subdir")); FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Move_Test_File.txt")); ASSERT_FALSE(PathExists(dir_name_to)); EXPECT_TRUE(Move(dir_name_from, dir_name_to)); // Check everything has been moved. EXPECT_FALSE(PathExists(dir_name_from)); EXPECT_FALSE(PathExists(file_name_from)); EXPECT_TRUE(PathExists(dir_name_to)); EXPECT_TRUE(PathExists(file_name_to)); // Test path traversal. file_name_from = dir_name_to.Append(txt_file_name); file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("..")); file_name_to = file_name_to.Append(txt_file_name); EXPECT_FALSE(Move(file_name_from, file_name_to)); EXPECT_TRUE(PathExists(file_name_from)); EXPECT_FALSE(PathExists(file_name_to)); EXPECT_TRUE(internal::MoveUnsafe(file_name_from, file_name_to)); EXPECT_FALSE(PathExists(file_name_from)); EXPECT_TRUE(PathExists(file_name_to)); } TEST_F(FileUtilTest, MoveExist) { // Create a directory FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Move_From_Subdir")); CreateDirectory(dir_name_from); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Move_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // Move the directory FilePath dir_name_exists = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Destination")); FilePath dir_name_to = dir_name_exists.Append(FILE_PATH_LITERAL("Move_To_Subdir")); FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Move_Test_File.txt")); // Create the destination directory. CreateDirectory(dir_name_exists); ASSERT_TRUE(PathExists(dir_name_exists)); EXPECT_TRUE(Move(dir_name_from, dir_name_to)); // Check everything has been moved. EXPECT_FALSE(PathExists(dir_name_from)); EXPECT_FALSE(PathExists(file_name_from)); EXPECT_TRUE(PathExists(dir_name_to)); EXPECT_TRUE(PathExists(file_name_to)); } TEST_F(FileUtilTest, CopyDirectoryRecursivelyNew) { // Create a directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); CreateDirectory(dir_name_from); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory. FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // Create a subdirectory. FilePath subdir_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Subdir")); CreateDirectory(subdir_name_from); ASSERT_TRUE(PathExists(subdir_name_from)); // Create a file under the subdirectory. FilePath file_name2_from = subdir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name2_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name2_from)); // Copy the directory recursively. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); FilePath subdir_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Subdir")); FilePath file_name2_to = subdir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); ASSERT_FALSE(PathExists(dir_name_to)); EXPECT_TRUE(CopyDirectory(dir_name_from, dir_name_to, true)); // Check everything has been copied. EXPECT_TRUE(PathExists(dir_name_from)); EXPECT_TRUE(PathExists(file_name_from)); EXPECT_TRUE(PathExists(subdir_name_from)); EXPECT_TRUE(PathExists(file_name2_from)); EXPECT_TRUE(PathExists(dir_name_to)); EXPECT_TRUE(PathExists(file_name_to)); EXPECT_TRUE(PathExists(subdir_name_to)); EXPECT_TRUE(PathExists(file_name2_to)); } TEST_F(FileUtilTest, CopyDirectoryRecursivelyExists) { // Create a directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); CreateDirectory(dir_name_from); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory. FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // Create a subdirectory. FilePath subdir_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Subdir")); CreateDirectory(subdir_name_from); ASSERT_TRUE(PathExists(subdir_name_from)); // Create a file under the subdirectory. FilePath file_name2_from = subdir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name2_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name2_from)); // Copy the directory recursively. FilePath dir_name_exists = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Destination")); FilePath dir_name_to = dir_name_exists.Append(FILE_PATH_LITERAL("Copy_From_Subdir")); FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); FilePath subdir_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Subdir")); FilePath file_name2_to = subdir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); // Create the destination directory. CreateDirectory(dir_name_exists); ASSERT_TRUE(PathExists(dir_name_exists)); EXPECT_TRUE(CopyDirectory(dir_name_from, dir_name_exists, true)); // Check everything has been copied. EXPECT_TRUE(PathExists(dir_name_from)); EXPECT_TRUE(PathExists(file_name_from)); EXPECT_TRUE(PathExists(subdir_name_from)); EXPECT_TRUE(PathExists(file_name2_from)); EXPECT_TRUE(PathExists(dir_name_to)); EXPECT_TRUE(PathExists(file_name_to)); EXPECT_TRUE(PathExists(subdir_name_to)); EXPECT_TRUE(PathExists(file_name2_to)); } TEST_F(FileUtilTest, CopyDirectoryNew) { // Create a directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); CreateDirectory(dir_name_from); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory. FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // Create a subdirectory. FilePath subdir_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Subdir")); CreateDirectory(subdir_name_from); ASSERT_TRUE(PathExists(subdir_name_from)); // Create a file under the subdirectory. FilePath file_name2_from = subdir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name2_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name2_from)); // Copy the directory not recursively. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); FilePath subdir_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Subdir")); ASSERT_FALSE(PathExists(dir_name_to)); EXPECT_TRUE(CopyDirectory(dir_name_from, dir_name_to, false)); // Check everything has been copied. EXPECT_TRUE(PathExists(dir_name_from)); EXPECT_TRUE(PathExists(file_name_from)); EXPECT_TRUE(PathExists(subdir_name_from)); EXPECT_TRUE(PathExists(file_name2_from)); EXPECT_TRUE(PathExists(dir_name_to)); EXPECT_TRUE(PathExists(file_name_to)); EXPECT_FALSE(PathExists(subdir_name_to)); } TEST_F(FileUtilTest, CopyDirectoryExists) { // Create a directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); CreateDirectory(dir_name_from); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory. FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // Create a subdirectory. FilePath subdir_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Subdir")); CreateDirectory(subdir_name_from); ASSERT_TRUE(PathExists(subdir_name_from)); // Create a file under the subdirectory. FilePath file_name2_from = subdir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name2_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name2_from)); // Copy the directory not recursively. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); FilePath subdir_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Subdir")); // Create the destination directory. CreateDirectory(dir_name_to); ASSERT_TRUE(PathExists(dir_name_to)); EXPECT_TRUE(CopyDirectory(dir_name_from, dir_name_to, false)); // Check everything has been copied. EXPECT_TRUE(PathExists(dir_name_from)); EXPECT_TRUE(PathExists(file_name_from)); EXPECT_TRUE(PathExists(subdir_name_from)); EXPECT_TRUE(PathExists(file_name2_from)); EXPECT_TRUE(PathExists(dir_name_to)); EXPECT_TRUE(PathExists(file_name_to)); EXPECT_FALSE(PathExists(subdir_name_to)); } TEST_F(FileUtilTest, CopyFileWithCopyDirectoryRecursiveToNew) { // Create a file FilePath file_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // The destination name FilePath file_name_to = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("Copy_Test_File_Destination.txt")); ASSERT_FALSE(PathExists(file_name_to)); EXPECT_TRUE(CopyDirectory(file_name_from, file_name_to, true)); // Check the has been copied EXPECT_TRUE(PathExists(file_name_to)); } TEST_F(FileUtilTest, CopyFileWithCopyDirectoryRecursiveToExisting) { // Create a file FilePath file_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // The destination name FilePath file_name_to = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("Copy_Test_File_Destination.txt")); CreateTextFile(file_name_to, L"Old file content"); ASSERT_TRUE(PathExists(file_name_to)); EXPECT_TRUE(CopyDirectory(file_name_from, file_name_to, true)); // Check the has been copied EXPECT_TRUE(PathExists(file_name_to)); EXPECT_TRUE(L"Gooooooooooooooooooooogle" == ReadTextFile(file_name_to)); } TEST_F(FileUtilTest, CopyFileWithCopyDirectoryRecursiveToExistingDirectory) { // Create a file FilePath file_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // The destination FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Destination")); CreateDirectory(dir_name_to); ASSERT_TRUE(PathExists(dir_name_to)); FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); EXPECT_TRUE(CopyDirectory(file_name_from, dir_name_to, true)); // Check the has been copied EXPECT_TRUE(PathExists(file_name_to)); } TEST_F(FileUtilTest, CopyFileFailureWithCopyDirectoryExcl) { // Create a file FilePath file_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // Make a destination file. FilePath file_name_to = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("Copy_Test_File_Destination.txt")); CreateTextFile(file_name_to, L"Old file content"); ASSERT_TRUE(PathExists(file_name_to)); // Overwriting the destination should fail. EXPECT_FALSE(CopyDirectoryExcl(file_name_from, file_name_to, true)); EXPECT_EQ(L"Old file content", ReadTextFile(file_name_to)); } TEST_F(FileUtilTest, CopyDirectoryWithTrailingSeparators) { // Create a directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); CreateDirectory(dir_name_from); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory. FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // Copy the directory recursively. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); // Create from path with trailing separators. #if BUILDFLAG(IS_WIN) FilePath from_path = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir\\\\\\")); #elif BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA) FilePath from_path = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir///")); #endif EXPECT_TRUE(CopyDirectory(from_path, dir_name_to, true)); // Check everything has been copied. EXPECT_TRUE(PathExists(dir_name_from)); EXPECT_TRUE(PathExists(file_name_from)); EXPECT_TRUE(PathExists(dir_name_to)); EXPECT_TRUE(PathExists(file_name_to)); } #if BUILDFLAG(IS_POSIX) TEST_F(FileUtilTest, CopyDirectoryWithNonRegularFiles) { // Create a directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); ASSERT_TRUE(CreateDirectory(dir_name_from)); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory. FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // Create a symbolic link under the directory pointing to that file. FilePath symlink_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Symlink")); ASSERT_TRUE(CreateSymbolicLink(file_name_from, symlink_name_from)); ASSERT_TRUE(PathExists(symlink_name_from)); // Create a fifo under the directory. FilePath fifo_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Fifo")); ASSERT_EQ(0, mkfifo(fifo_name_from.value().c_str(), 0644)); ASSERT_TRUE(PathExists(fifo_name_from)); // Copy the directory. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); FilePath symlink_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Symlink")); FilePath fifo_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Fifo")); ASSERT_FALSE(PathExists(dir_name_to)); EXPECT_TRUE(CopyDirectory(dir_name_from, dir_name_to, false)); // Check that only directories and regular files are copied. EXPECT_TRUE(PathExists(dir_name_from)); EXPECT_TRUE(PathExists(file_name_from)); EXPECT_TRUE(PathExists(symlink_name_from)); EXPECT_TRUE(PathExists(fifo_name_from)); EXPECT_TRUE(PathExists(dir_name_to)); EXPECT_TRUE(PathExists(file_name_to)); EXPECT_FALSE(PathExists(symlink_name_to)); EXPECT_FALSE(PathExists(fifo_name_to)); } TEST_F(FileUtilTest, CopyDirectoryExclFileOverSymlink) { // Create a directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); ASSERT_TRUE(CreateDirectory(dir_name_from)); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory. FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // Create a destination directory with a symlink of the same name. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); ASSERT_TRUE(CreateDirectory(dir_name_to)); ASSERT_TRUE(PathExists(dir_name_to)); FilePath symlink_target = dir_name_to.Append(FILE_PATH_LITERAL("Symlink_Target.txt")); CreateTextFile(symlink_target, L"asdf"); ASSERT_TRUE(PathExists(symlink_target)); FilePath symlink_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); ASSERT_TRUE(CreateSymbolicLink(symlink_target, symlink_name_to)); ASSERT_TRUE(PathExists(symlink_name_to)); // Check that copying fails. EXPECT_FALSE(CopyDirectoryExcl(dir_name_from, dir_name_to, false)); } TEST_F(FileUtilTest, CopyDirectoryExclDirectoryOverSymlink) { // Create a directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); ASSERT_TRUE(CreateDirectory(dir_name_from)); ASSERT_TRUE(PathExists(dir_name_from)); // Create a subdirectory. FilePath subdir_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Subsub")); CreateDirectory(subdir_name_from); ASSERT_TRUE(PathExists(subdir_name_from)); // Create a destination directory with a symlink of the same name. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); ASSERT_TRUE(CreateDirectory(dir_name_to)); ASSERT_TRUE(PathExists(dir_name_to)); FilePath symlink_target = dir_name_to.Append(FILE_PATH_LITERAL("Subsub")); CreateTextFile(symlink_target, L"asdf"); ASSERT_TRUE(PathExists(symlink_target)); FilePath symlink_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); ASSERT_TRUE(CreateSymbolicLink(symlink_target, symlink_name_to)); ASSERT_TRUE(PathExists(symlink_name_to)); // Check that copying fails. EXPECT_FALSE(CopyDirectoryExcl(dir_name_from, dir_name_to, false)); } TEST_F(FileUtilTest, CopyDirectoryExclFileOverDanglingSymlink) { // Create a directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); ASSERT_TRUE(CreateDirectory(dir_name_from)); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory. FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // Create a destination directory with a dangling symlink of the same name. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); ASSERT_TRUE(CreateDirectory(dir_name_to)); ASSERT_TRUE(PathExists(dir_name_to)); FilePath symlink_target = dir_name_to.Append(FILE_PATH_LITERAL("Symlink_Target.txt")); CreateTextFile(symlink_target, L"asdf"); ASSERT_TRUE(PathExists(symlink_target)); FilePath symlink_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); ASSERT_TRUE(CreateSymbolicLink(symlink_target, symlink_name_to)); ASSERT_TRUE(PathExists(symlink_name_to)); ASSERT_TRUE(DeleteFile(symlink_target)); // Check that copying fails and that no file was created for the symlink's // referent. EXPECT_FALSE(CopyDirectoryExcl(dir_name_from, dir_name_to, false)); EXPECT_FALSE(PathExists(symlink_target)); } TEST_F(FileUtilTest, CopyDirectoryExclDirectoryOverDanglingSymlink) { // Create a directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); ASSERT_TRUE(CreateDirectory(dir_name_from)); ASSERT_TRUE(PathExists(dir_name_from)); // Create a subdirectory. FilePath subdir_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Subsub")); CreateDirectory(subdir_name_from); ASSERT_TRUE(PathExists(subdir_name_from)); // Create a destination directory with a dangling symlink of the same name. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); ASSERT_TRUE(CreateDirectory(dir_name_to)); ASSERT_TRUE(PathExists(dir_name_to)); FilePath symlink_target = dir_name_to.Append(FILE_PATH_LITERAL("Symlink_Target.txt")); CreateTextFile(symlink_target, L"asdf"); ASSERT_TRUE(PathExists(symlink_target)); FilePath symlink_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); ASSERT_TRUE(CreateSymbolicLink(symlink_target, symlink_name_to)); ASSERT_TRUE(PathExists(symlink_name_to)); ASSERT_TRUE(DeleteFile(symlink_target)); // Check that copying fails and that no directory was created for the // symlink's referent. EXPECT_FALSE(CopyDirectoryExcl(dir_name_from, dir_name_to, false)); EXPECT_FALSE(PathExists(symlink_target)); } TEST_F(FileUtilTest, CopyDirectoryExclFileOverFifo) { // Create a directory. FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); ASSERT_TRUE(CreateDirectory(dir_name_from)); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory. FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // Create a destination directory with a fifo of the same name. FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_To_Subdir")); ASSERT_TRUE(CreateDirectory(dir_name_to)); ASSERT_TRUE(PathExists(dir_name_to)); FilePath fifo_name_to = dir_name_to.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); ASSERT_EQ(0, mkfifo(fifo_name_to.value().c_str(), 0644)); ASSERT_TRUE(PathExists(fifo_name_to)); // Check that copying fails. EXPECT_FALSE(CopyDirectoryExcl(dir_name_from, dir_name_to, false)); } #endif // BUILDFLAG(IS_POSIX) TEST_F(FileUtilTest, CopyFile) { // Create a directory FilePath dir_name_from = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("Copy_From_Subdir")); ASSERT_TRUE(CreateDirectory(dir_name_from)); ASSERT_TRUE(DirectoryExists(dir_name_from)); // Create a file under the directory FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("Copy_Test_File.txt")); const std::wstring file_contents(L"Gooooooooooooooooooooogle"); CreateTextFile(file_name_from, file_contents); ASSERT_TRUE(PathExists(file_name_from)); // Copy the file. FilePath dest_file = dir_name_from.Append(FILE_PATH_LITERAL("DestFile.txt")); ASSERT_TRUE(CopyFile(file_name_from, dest_file)); // Try to copy the file to another location using '..' in the path. FilePath dest_file2(dir_name_from); dest_file2 = dest_file2.AppendASCII(".."); dest_file2 = dest_file2.AppendASCII("DestFile.txt"); ASSERT_FALSE(CopyFile(file_name_from, dest_file2)); FilePath dest_file2_test(dir_name_from); dest_file2_test = dest_file2_test.DirName(); dest_file2_test = dest_file2_test.AppendASCII("DestFile.txt"); // Check expected copy results. EXPECT_TRUE(PathExists(file_name_from)); EXPECT_TRUE(PathExists(dest_file)); EXPECT_EQ(file_contents, ReadTextFile(dest_file)); EXPECT_FALSE(PathExists(dest_file2_test)); EXPECT_FALSE(PathExists(dest_file2)); // Change |file_name_from| contents. const std::wstring new_file_contents(L"Moogle"); CreateTextFile(file_name_from, new_file_contents); ASSERT_TRUE(PathExists(file_name_from)); EXPECT_EQ(new_file_contents, ReadTextFile(file_name_from)); // Overwrite |dest_file|. ASSERT_TRUE(CopyFile(file_name_from, dest_file)); EXPECT_TRUE(PathExists(dest_file)); EXPECT_EQ(new_file_contents, ReadTextFile(dest_file)); // Create another directory. FilePath dest_dir = temp_dir_.GetPath().Append(FPL("dest_dir")); ASSERT_TRUE(CreateDirectory(dest_dir)); EXPECT_TRUE(DirectoryExists(dest_dir)); EXPECT_TRUE(IsDirectoryEmpty(dest_dir)); // Make sure CopyFile() cannot overwrite a directory. ASSERT_FALSE(CopyFile(file_name_from, dest_dir)); EXPECT_TRUE(DirectoryExists(dest_dir)); EXPECT_TRUE(IsDirectoryEmpty(dest_dir)); } // file_util winds up using autoreleased objects on the Mac, so this needs // to be a PlatformTest. typedef PlatformTest ReadOnlyFileUtilTest; TEST_F(ReadOnlyFileUtilTest, ContentsEqual) { FilePath data_dir; ASSERT_TRUE(PathService::Get(DIR_TEST_DATA, &data_dir)); data_dir = data_dir.AppendASCII("file_util"); ASSERT_TRUE(PathExists(data_dir)); FilePath original_file = data_dir.Append(FILE_PATH_LITERAL("original.txt")); FilePath same_file = data_dir.Append(FILE_PATH_LITERAL("same.txt")); FilePath same_length_file = data_dir.Append(FILE_PATH_LITERAL("same_length.txt")); FilePath different_file = data_dir.Append(FILE_PATH_LITERAL("different.txt")); FilePath different_first_file = data_dir.Append(FILE_PATH_LITERAL("different_first.txt")); FilePath different_last_file = data_dir.Append(FILE_PATH_LITERAL("different_last.txt")); FilePath empty1_file = data_dir.Append(FILE_PATH_LITERAL("empty1.txt")); FilePath empty2_file = data_dir.Append(FILE_PATH_LITERAL("empty2.txt")); FilePath shortened_file = data_dir.Append(FILE_PATH_LITERAL("shortened.txt")); FilePath binary_file = data_dir.Append(FILE_PATH_LITERAL("binary_file.bin")); FilePath binary_file_same = data_dir.Append(FILE_PATH_LITERAL("binary_file_same.bin")); FilePath binary_file_diff = data_dir.Append(FILE_PATH_LITERAL("binary_file_diff.bin")); EXPECT_TRUE(ContentsEqual(original_file, original_file)); EXPECT_TRUE(ContentsEqual(original_file, same_file)); EXPECT_FALSE(ContentsEqual(original_file, same_length_file)); EXPECT_FALSE(ContentsEqual(original_file, different_file)); EXPECT_FALSE(ContentsEqual(FilePath(FILE_PATH_LITERAL("bogusname")), FilePath(FILE_PATH_LITERAL("bogusname")))); EXPECT_FALSE(ContentsEqual(original_file, different_first_file)); EXPECT_FALSE(ContentsEqual(original_file, different_last_file)); EXPECT_TRUE(ContentsEqual(empty1_file, empty2_file)); EXPECT_FALSE(ContentsEqual(original_file, shortened_file)); EXPECT_FALSE(ContentsEqual(shortened_file, original_file)); EXPECT_TRUE(ContentsEqual(binary_file, binary_file_same)); EXPECT_FALSE(ContentsEqual(binary_file, binary_file_diff)); } TEST_F(ReadOnlyFileUtilTest, TextContentsEqual) { FilePath data_dir; ASSERT_TRUE(PathService::Get(DIR_TEST_DATA, &data_dir)); data_dir = data_dir.AppendASCII("file_util"); ASSERT_TRUE(PathExists(data_dir)); FilePath original_file = data_dir.Append(FILE_PATH_LITERAL("original.txt")); FilePath same_file = data_dir.Append(FILE_PATH_LITERAL("same.txt")); FilePath crlf_file = data_dir.Append(FILE_PATH_LITERAL("crlf.txt")); FilePath shortened_file = data_dir.Append(FILE_PATH_LITERAL("shortened.txt")); FilePath different_file = data_dir.Append(FILE_PATH_LITERAL("different.txt")); FilePath different_first_file = data_dir.Append(FILE_PATH_LITERAL("different_first.txt")); FilePath different_last_file = data_dir.Append(FILE_PATH_LITERAL("different_last.txt")); FilePath first1_file = data_dir.Append(FILE_PATH_LITERAL("first1.txt")); FilePath first2_file = data_dir.Append(FILE_PATH_LITERAL("first2.txt")); FilePath empty1_file = data_dir.Append(FILE_PATH_LITERAL("empty1.txt")); FilePath empty2_file = data_dir.Append(FILE_PATH_LITERAL("empty2.txt")); FilePath blank_line_file = data_dir.Append(FILE_PATH_LITERAL("blank_line.txt")); FilePath blank_line_crlf_file = data_dir.Append(FILE_PATH_LITERAL("blank_line_crlf.txt")); EXPECT_TRUE(TextContentsEqual(original_file, same_file)); EXPECT_TRUE(TextContentsEqual(original_file, crlf_file)); EXPECT_FALSE(TextContentsEqual(original_file, shortened_file)); EXPECT_FALSE(TextContentsEqual(original_file, different_file)); EXPECT_FALSE(TextContentsEqual(original_file, different_first_file)); EXPECT_FALSE(TextContentsEqual(original_file, different_last_file)); EXPECT_FALSE(TextContentsEqual(first1_file, first2_file)); EXPECT_TRUE(TextContentsEqual(empty1_file, empty2_file)); EXPECT_FALSE(TextContentsEqual(original_file, empty1_file)); EXPECT_TRUE(TextContentsEqual(blank_line_file, blank_line_crlf_file)); } // We don't need equivalent functionality outside of Windows. #if BUILDFLAG(IS_WIN) TEST_F(FileUtilTest, CopyAndDeleteDirectoryTest) { // Create a directory FilePath dir_name_from = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("CopyAndDelete_From_Subdir")); CreateDirectory(dir_name_from); ASSERT_TRUE(PathExists(dir_name_from)); // Create a file under the directory FilePath file_name_from = dir_name_from.Append(FILE_PATH_LITERAL("CopyAndDelete_Test_File.txt")); CreateTextFile(file_name_from, L"Gooooooooooooooooooooogle"); ASSERT_TRUE(PathExists(file_name_from)); // Move the directory by using CopyAndDeleteDirectory FilePath dir_name_to = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("CopyAndDelete_To_Subdir")); FilePath file_name_to = dir_name_to.Append(FILE_PATH_LITERAL("CopyAndDelete_Test_File.txt")); ASSERT_FALSE(PathExists(dir_name_to)); EXPECT_TRUE(internal::CopyAndDeleteDirectory(dir_name_from, dir_name_to)); // Check everything has been moved. EXPECT_FALSE(PathExists(dir_name_from)); EXPECT_FALSE(PathExists(file_name_from)); EXPECT_TRUE(PathExists(dir_name_to)); EXPECT_TRUE(PathExists(file_name_to)); } TEST_F(FileUtilTest, GetTempDirTest) { static const TCHAR* kTmpKey = _T("TMP"); static const TCHAR* kTmpValues[] = { _T(""), _T("C:"), _T("C:\\"), _T("C:\\tmp"), _T("C:\\tmp\\") }; // Save the original $TMP. size_t original_tmp_size; TCHAR* original_tmp; ASSERT_EQ(0, ::_tdupenv_s(&original_tmp, &original_tmp_size, kTmpKey)); // original_tmp may be NULL. for (unsigned int i = 0; i < std::size(kTmpValues); ++i) { FilePath path; ::_tputenv_s(kTmpKey, kTmpValues[i]); GetTempDir(&path); EXPECT_TRUE(path.IsAbsolute()) << "$TMP=" << kTmpValues[i] << " result=" << path.value(); } // Restore the original $TMP. if (original_tmp) { ::_tputenv_s(kTmpKey, original_tmp); free(original_tmp); } else { ::_tputenv_s(kTmpKey, _T("")); } } #endif // BUILDFLAG(IS_WIN) // Test that files opened by OpenFile are not set up for inheritance into child // procs. TEST_F(FileUtilTest, OpenFileNoInheritance) { FilePath file_path(temp_dir_.GetPath().Append(FPL("a_file"))); // Character set handling is leaking according to ASAN. http://crbug.com/883698 #if defined(ADDRESS_SANITIZER) static constexpr const char* modes[] = {"wb", "r"}; #else static constexpr const char* modes[] = {"wb", "r,ccs=UTF-8"}; #endif for (const char* mode : modes) { SCOPED_TRACE(mode); ASSERT_NO_FATAL_FAILURE(CreateTextFile(file_path, L"Geepers")); FILE* file = OpenFile(file_path, mode); ASSERT_NE(nullptr, file); { ScopedClosureRunner file_closer(BindOnce(IgnoreResult(&CloseFile), file)); bool is_inheritable = true; ASSERT_NO_FATAL_FAILURE(GetIsInheritable(file, &is_inheritable)); EXPECT_FALSE(is_inheritable); } ASSERT_TRUE(DeleteFile(file_path)); } } TEST_F(FileUtilTest, CreateAndOpenTemporaryFileInDir) { // Create a temporary file. FilePath path; File file = CreateAndOpenTemporaryFileInDir(temp_dir_.GetPath(), &path); ASSERT_TRUE(file.IsValid()); EXPECT_FALSE(path.empty()); // Try to open another handle to it. File file2(path, File::FLAG_OPEN | File::FLAG_READ | File::FLAG_WIN_SHARE_DELETE); #if BUILDFLAG(IS_WIN) // The file cannot be opened again on account of the exclusive access. EXPECT_FALSE(file2.IsValid()); #else // Exclusive access isn't a thing on non-Windows platforms. EXPECT_TRUE(file2.IsValid()); #endif } TEST_F(FileUtilTest, CreateTemporaryFileTest) { FilePath temp_files[3]; for (auto& i : temp_files) { ASSERT_TRUE(CreateTemporaryFile(&i)); EXPECT_TRUE(PathExists(i)); EXPECT_FALSE(DirectoryExists(i)); } for (int i = 0; i < 3; i++) EXPECT_FALSE(temp_files[i] == temp_files[(i+1)%3]); for (const auto& i : temp_files) EXPECT_TRUE(DeleteFile(i)); } TEST_F(FileUtilTest, CreateAndOpenTemporaryStreamTest) { FilePath names[3]; ScopedFILE fps[3]; int i; // Create; make sure they are open and exist. for (i = 0; i < 3; ++i) { fps[i] = CreateAndOpenTemporaryStream(&(names[i])); ASSERT_TRUE(fps[i]); EXPECT_TRUE(PathExists(names[i])); } // Make sure all names are unique. for (i = 0; i < 3; ++i) { EXPECT_FALSE(names[i] == names[(i+1)%3]); } // Close and delete. for (i = 0; i < 3; ++i) { fps[i].reset(); EXPECT_TRUE(DeleteFile(names[i])); } } TEST_F(FileUtilTest, GetUniquePathTest) { // Create a unique temp directory and use it to generate a unique file path. base::ScopedTempDir temp_dir; EXPECT_TRUE(temp_dir.CreateUniqueTempDir()); EXPECT_TRUE(temp_dir.IsValid()); FilePath base_name(FILE_PATH_LITERAL("Unique_Base_Name.txt")); FilePath base_path = temp_dir.GetPath().Append(base_name); EXPECT_FALSE(PathExists(base_path)); // GetUniquePath() should return unchanged path if file does not exist. EXPECT_EQ(base_path, GetUniquePath(base_path)); // Create the file. { File file(base_path, File::FLAG_CREATE | File::FLAG_READ | File::FLAG_WRITE); EXPECT_TRUE(PathExists(base_path)); } static const FilePath::CharType* const kExpectedNames[] = { FILE_PATH_LITERAL("Unique_Base_Name (1).txt"), FILE_PATH_LITERAL("Unique_Base_Name (2).txt"), FILE_PATH_LITERAL("Unique_Base_Name (3).txt"), }; // Call GetUniquePath() three times against this existing file name. for (const FilePath::CharType* expected_name : kExpectedNames) { FilePath expected_path = temp_dir.GetPath().Append(expected_name); FilePath path = GetUniquePath(base_path); EXPECT_EQ(expected_path, path); // Verify that a file with this path indeed does not exist on the file // system. EXPECT_FALSE(PathExists(path)); // Create the file so it exists for the next call to GetUniquePath() in the // loop. File file(path, File::FLAG_CREATE | File::FLAG_READ | File::FLAG_WRITE); EXPECT_TRUE(PathExists(path)); } } TEST_F(FileUtilTest, FileToFILE) { File file; FILE* stream = FileToFILE(std::move(file), "w"); EXPECT_FALSE(stream); FilePath file_name = temp_dir_.GetPath().Append(FPL("The file.txt")); file = File(file_name, File::FLAG_CREATE | File::FLAG_WRITE); EXPECT_TRUE(file.IsValid()); stream = FileToFILE(std::move(file), "w"); EXPECT_TRUE(stream); EXPECT_FALSE(file.IsValid()); EXPECT_TRUE(CloseFile(stream)); } TEST_F(FileUtilTest, FILEToFile) { ScopedFILE stream; EXPECT_FALSE(FILEToFile(stream.get()).IsValid()); stream.reset(OpenFile(temp_dir_.GetPath().Append(FPL("hello.txt")), "wb+")); ASSERT_TRUE(stream); File file = FILEToFile(stream.get()); EXPECT_TRUE(file.IsValid()); ASSERT_EQ(fprintf(stream.get(), "there"), 5); ASSERT_EQ(fflush(stream.get()), 0); EXPECT_EQ(file.GetLength(), 5L); } #if BUILDFLAG(IS_WIN) TEST_F(FileUtilTest, GetSecureSystemTemp) { FilePath secure_system_temp; ASSERT_EQ(GetSecureSystemTemp(&secure_system_temp), !!::IsUserAnAdmin()); if (!::IsUserAnAdmin()) { return; } FilePath dir_windows; ASSERT_TRUE(PathService::Get(DIR_WINDOWS, &dir_windows)); FilePath dir_program_files; ASSERT_TRUE(PathService::Get(DIR_PROGRAM_FILES, &dir_program_files)); ASSERT_TRUE((dir_windows.AppendASCII("SystemTemp") == secure_system_temp) || (dir_program_files == secure_system_temp)); } #endif // BUILDFLAG(IS_WIN) TEST_F(FileUtilTest, CreateNewTempDirectoryTest) { FilePath temp_dir; ASSERT_TRUE(CreateNewTempDirectory(FilePath::StringType(), &temp_dir)); EXPECT_TRUE(PathExists(temp_dir)); #if BUILDFLAG(IS_WIN) FilePath expected_parent_dir; if (!GetSecureSystemTemp(&expected_parent_dir)) { EXPECT_TRUE(PathService::Get(DIR_TEMP, &expected_parent_dir)); } EXPECT_TRUE(expected_parent_dir.IsParent(temp_dir)); #endif // BUILDFLAG(IS_WIN) EXPECT_TRUE(DeleteFile(temp_dir)); } TEST_F(FileUtilTest, CreateNewTemporaryDirInDirTest) { FilePath new_dir; ASSERT_TRUE(CreateTemporaryDirInDir( temp_dir_.GetPath(), FILE_PATH_LITERAL("CreateNewTemporaryDirInDirTest"), &new_dir)); EXPECT_TRUE(PathExists(new_dir)); EXPECT_TRUE(temp_dir_.GetPath().IsParent(new_dir)); EXPECT_TRUE(DeleteFile(new_dir)); } #if BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA) TEST_F(FileUtilTest, GetShmemTempDirTest) { FilePath dir; EXPECT_TRUE(GetShmemTempDir(false, &dir)); EXPECT_TRUE(DirectoryExists(dir)); } TEST_F(FileUtilTest, AllocateFileRegionTest_ZeroOffset) { const int kTestFileLength = 9; char test_data[] = "test_data"; FilePath file_path = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("allocate_file_region_test_zero_offset")); WriteFile(file_path, test_data, kTestFileLength); File file(file_path, base::File::FLAG_OPEN | base::File::FLAG_READ | base::File::FLAG_WRITE); ASSERT_TRUE(file.IsValid()); ASSERT_EQ(file.GetLength(), kTestFileLength); const int kExtendedFileLength = 23; ASSERT_TRUE(AllocateFileRegion(&file, 0, kExtendedFileLength)); EXPECT_EQ(file.GetLength(), kExtendedFileLength); char data_read[32]; int bytes_read = file.Read(0, data_read, kExtendedFileLength); EXPECT_EQ(bytes_read, kExtendedFileLength); for (int i = 0; i < kTestFileLength; ++i) EXPECT_EQ(test_data[i], data_read[i]); for (int i = kTestFileLength; i < kExtendedFileLength; ++i) EXPECT_EQ(0, data_read[i]); } TEST_F(FileUtilTest, AllocateFileRegionTest_NonZeroOffset) { const int kTestFileLength = 9; char test_data[] = "test_data"; FilePath file_path = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("allocate_file_region_test_non_zero_offset")); WriteFile(file_path, test_data, kTestFileLength); File file(file_path, base::File::FLAG_OPEN | base::File::FLAG_READ | base::File::FLAG_WRITE); ASSERT_TRUE(file.IsValid()); ASSERT_EQ(file.GetLength(), kTestFileLength); const int kExtensionOffset = 5; const int kExtensionSize = 10; ASSERT_TRUE(AllocateFileRegion(&file, kExtensionOffset, kExtensionSize)); const int kExtendedFileLength = kExtensionOffset + kExtensionSize; EXPECT_EQ(file.GetLength(), kExtendedFileLength); char data_read[32]; int bytes_read = file.Read(0, data_read, kExtendedFileLength); EXPECT_EQ(bytes_read, kExtendedFileLength); for (int i = 0; i < kTestFileLength; ++i) EXPECT_EQ(test_data[i], data_read[i]); for (int i = kTestFileLength; i < kExtendedFileLength; ++i) EXPECT_EQ(0, data_read[i]); } TEST_F(FileUtilTest, AllocateFileRegionTest_DontTruncate) { const int kTestFileLength = 9; char test_data[] = "test_data"; FilePath file_path = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("allocate_file_region_test_dont_truncate")); WriteFile(file_path, test_data, kTestFileLength); File file(file_path, base::File::FLAG_OPEN | base::File::FLAG_READ | base::File::FLAG_WRITE); ASSERT_TRUE(file.IsValid()); ASSERT_EQ(file.GetLength(), kTestFileLength); const int kTruncatedFileLength = 4; ASSERT_TRUE(AllocateFileRegion(&file, 0, kTruncatedFileLength)); EXPECT_EQ(file.GetLength(), kTestFileLength); } #endif TEST_F(FileUtilTest, GetHomeDirTest) { #if !BUILDFLAG(IS_ANDROID) // Not implemented on Android. // We don't actually know what the home directory is supposed to be without // calling some OS functions which would just duplicate the implementation. // So here we just test that it returns something "reasonable". FilePath home = GetHomeDir(); ASSERT_FALSE(home.empty()); ASSERT_TRUE(home.IsAbsolute()); #endif } TEST_F(FileUtilTest, CreateDirectoryTest) { FilePath test_root = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("create_directory_test")); #if BUILDFLAG(IS_WIN) FilePath test_path = test_root.Append(FILE_PATH_LITERAL("dir\\tree\\likely\\doesnt\\exist\\")); #elif BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA) FilePath test_path = test_root.Append(FILE_PATH_LITERAL("dir/tree/likely/doesnt/exist/")); #endif EXPECT_FALSE(PathExists(test_path)); EXPECT_TRUE(CreateDirectory(test_path)); EXPECT_TRUE(PathExists(test_path)); // CreateDirectory returns true if the DirectoryExists returns true. EXPECT_TRUE(CreateDirectory(test_path)); // Doesn't work to create it on top of a non-dir test_path = test_path.Append(FILE_PATH_LITERAL("foobar.txt")); EXPECT_FALSE(PathExists(test_path)); CreateTextFile(test_path, L"test file"); EXPECT_TRUE(PathExists(test_path)); EXPECT_FALSE(CreateDirectory(test_path)); EXPECT_TRUE(DeletePathRecursively(test_root)); EXPECT_FALSE(PathExists(test_root)); EXPECT_FALSE(PathExists(test_path)); // Verify assumptions made by the Windows implementation: // 1. The current directory always exists. // 2. The root directory always exists. ASSERT_TRUE(DirectoryExists(FilePath(FilePath::kCurrentDirectory))); FilePath top_level = test_root; while (top_level != top_level.DirName()) { top_level = top_level.DirName(); } ASSERT_TRUE(DirectoryExists(top_level)); // Given these assumptions hold, it should be safe to // test that "creating" these directories succeeds. EXPECT_TRUE(CreateDirectory( FilePath(FilePath::kCurrentDirectory))); EXPECT_TRUE(CreateDirectory(top_level)); #if BUILDFLAG(IS_WIN) FilePath invalid_drive(FILE_PATH_LITERAL("o:\\")); FilePath invalid_path = invalid_drive.Append(FILE_PATH_LITERAL("some\\inaccessible\\dir")); if (!PathExists(invalid_drive)) { EXPECT_FALSE(CreateDirectory(invalid_path)); } #endif } TEST_F(FileUtilTest, DetectDirectoryTest) { // Check a directory FilePath test_root = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("detect_directory_test")); EXPECT_FALSE(PathExists(test_root)); EXPECT_TRUE(CreateDirectory(test_root)); EXPECT_TRUE(PathExists(test_root)); EXPECT_TRUE(DirectoryExists(test_root)); // Check a file FilePath test_path = test_root.Append(FILE_PATH_LITERAL("foobar.txt")); EXPECT_FALSE(PathExists(test_path)); CreateTextFile(test_path, L"test file"); EXPECT_TRUE(PathExists(test_path)); EXPECT_FALSE(DirectoryExists(test_path)); EXPECT_TRUE(DeleteFile(test_path)); EXPECT_TRUE(DeletePathRecursively(test_root)); } TEST_F(FileUtilTest, FileEnumeratorTest) { // Test an empty directory. FileEnumerator f0(temp_dir_.GetPath(), true, FILES_AND_DIRECTORIES); EXPECT_EQ(FPL(""), f0.Next().value()); EXPECT_EQ(FPL(""), f0.Next().value()); // Test an empty directory, non-recursively, including "..". FileEnumerator f0_dotdot( temp_dir_.GetPath(), false, FILES_AND_DIRECTORIES | FileEnumerator::INCLUDE_DOT_DOT); EXPECT_EQ(temp_dir_.GetPath().Append(FPL("..")).value(), f0_dotdot.Next().value()); EXPECT_EQ(FPL(""), f0_dotdot.Next().value()); // create the directories FilePath dir1 = temp_dir_.GetPath().Append(FPL("dir1")); EXPECT_TRUE(CreateDirectory(dir1)); FilePath dir2 = temp_dir_.GetPath().Append(FPL("dir2")); EXPECT_TRUE(CreateDirectory(dir2)); FilePath dir2inner = dir2.Append(FPL("inner")); EXPECT_TRUE(CreateDirectory(dir2inner)); // create the files FilePath dir2file = dir2.Append(FPL("dir2file.txt")); CreateTextFile(dir2file, std::wstring()); FilePath dir2innerfile = dir2inner.Append(FPL("innerfile.txt")); CreateTextFile(dir2innerfile, std::wstring()); FilePath file1 = temp_dir_.GetPath().Append(FPL("file1.txt")); CreateTextFile(file1, std::wstring()); FilePath file2_rel = dir2.Append(FilePath::kParentDirectory) .Append(FPL("file2.txt")); CreateTextFile(file2_rel, std::wstring()); FilePath file2_abs = temp_dir_.GetPath().Append(FPL("file2.txt")); // Only enumerate files. FileEnumerator f1(temp_dir_.GetPath(), true, FileEnumerator::FILES); FindResultCollector c1(&f1); EXPECT_TRUE(c1.HasFile(file1)); EXPECT_TRUE(c1.HasFile(file2_abs)); EXPECT_TRUE(c1.HasFile(dir2file)); EXPECT_TRUE(c1.HasFile(dir2innerfile)); EXPECT_EQ(4, c1.size()); // Only enumerate directories. FileEnumerator f2(temp_dir_.GetPath(), true, FileEnumerator::DIRECTORIES); FindResultCollector c2(&f2); EXPECT_TRUE(c2.HasFile(dir1)); EXPECT_TRUE(c2.HasFile(dir2)); EXPECT_TRUE(c2.HasFile(dir2inner)); EXPECT_EQ(3, c2.size()); // Only enumerate directories non-recursively. FileEnumerator f2_non_recursive(temp_dir_.GetPath(), false, FileEnumerator::DIRECTORIES); FindResultCollector c2_non_recursive(&f2_non_recursive); EXPECT_TRUE(c2_non_recursive.HasFile(dir1)); EXPECT_TRUE(c2_non_recursive.HasFile(dir2)); EXPECT_EQ(2, c2_non_recursive.size()); // Only enumerate directories, non-recursively, including "..". FileEnumerator f2_dotdot( temp_dir_.GetPath(), false, FileEnumerator::DIRECTORIES | FileEnumerator::INCLUDE_DOT_DOT); FindResultCollector c2_dotdot(&f2_dotdot); EXPECT_TRUE(c2_dotdot.HasFile(dir1)); EXPECT_TRUE(c2_dotdot.HasFile(dir2)); EXPECT_TRUE(c2_dotdot.HasFile(temp_dir_.GetPath().Append(FPL("..")))); EXPECT_EQ(3, c2_dotdot.size()); // Enumerate files and directories. FileEnumerator f3(temp_dir_.GetPath(), true, FILES_AND_DIRECTORIES); FindResultCollector c3(&f3); EXPECT_TRUE(c3.HasFile(dir1)); EXPECT_TRUE(c3.HasFile(dir2)); EXPECT_TRUE(c3.HasFile(file1)); EXPECT_TRUE(c3.HasFile(file2_abs)); EXPECT_TRUE(c3.HasFile(dir2file)); EXPECT_TRUE(c3.HasFile(dir2inner)); EXPECT_TRUE(c3.HasFile(dir2innerfile)); EXPECT_EQ(7, c3.size()); // Non-recursive operation. FileEnumerator f4(temp_dir_.GetPath(), false, FILES_AND_DIRECTORIES); FindResultCollector c4(&f4); EXPECT_TRUE(c4.HasFile(dir2)); EXPECT_TRUE(c4.HasFile(dir2)); EXPECT_TRUE(c4.HasFile(file1)); EXPECT_TRUE(c4.HasFile(file2_abs)); EXPECT_EQ(4, c4.size()); // Enumerate with a pattern. FileEnumerator f5(temp_dir_.GetPath(), true, FILES_AND_DIRECTORIES, FPL("dir*")); FindResultCollector c5(&f5); EXPECT_TRUE(c5.HasFile(dir1)); EXPECT_TRUE(c5.HasFile(dir2)); EXPECT_TRUE(c5.HasFile(dir2file)); EXPECT_TRUE(c5.HasFile(dir2inner)); EXPECT_TRUE(c5.HasFile(dir2innerfile)); EXPECT_EQ(5, c5.size()); #if BUILDFLAG(IS_WIN) { // Make dir1 point to dir2. ReparsePoint reparse_point(dir1, dir2); EXPECT_TRUE(reparse_point.IsValid()); // There can be a delay for the enumeration code to see the change on // the file system so skip this test for XP. // Enumerate the reparse point. FileEnumerator f6(dir1, true, FILES_AND_DIRECTORIES); FindResultCollector c6(&f6); FilePath inner2 = dir1.Append(FPL("inner")); EXPECT_TRUE(c6.HasFile(inner2)); EXPECT_TRUE(c6.HasFile(inner2.Append(FPL("innerfile.txt")))); EXPECT_TRUE(c6.HasFile(dir1.Append(FPL("dir2file.txt")))); EXPECT_EQ(3, c6.size()); // No changes for non recursive operation. FileEnumerator f7(temp_dir_.GetPath(), false, FILES_AND_DIRECTORIES); FindResultCollector c7(&f7); EXPECT_TRUE(c7.HasFile(dir2)); EXPECT_TRUE(c7.HasFile(dir2)); EXPECT_TRUE(c7.HasFile(file1)); EXPECT_TRUE(c7.HasFile(file2_abs)); EXPECT_EQ(4, c7.size()); // Should not enumerate inside dir1 when using recursion. FileEnumerator f8(temp_dir_.GetPath(), true, FILES_AND_DIRECTORIES); FindResultCollector c8(&f8); EXPECT_TRUE(c8.HasFile(dir1)); EXPECT_TRUE(c8.HasFile(dir2)); EXPECT_TRUE(c8.HasFile(file1)); EXPECT_TRUE(c8.HasFile(file2_abs)); EXPECT_TRUE(c8.HasFile(dir2file)); EXPECT_TRUE(c8.HasFile(dir2inner)); EXPECT_TRUE(c8.HasFile(dir2innerfile)); EXPECT_EQ(7, c8.size()); } #endif // Make sure the destructor closes the find handle while in the middle of a // query to allow TearDown to delete the directory. FileEnumerator f9(temp_dir_.GetPath(), true, FILES_AND_DIRECTORIES); EXPECT_FALSE(f9.Next().value().empty()); // Should have found something // (we don't care what). } TEST_F(FileUtilTest, AppendToFile) { FilePath data_dir = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("FilePathTest")); // Create a fresh, empty copy of this directory. if (PathExists(data_dir)) { ASSERT_TRUE(DeletePathRecursively(data_dir)); } ASSERT_TRUE(CreateDirectory(data_dir)); // Create a fresh, empty copy of this directory. if (PathExists(data_dir)) { ASSERT_TRUE(DeletePathRecursively(data_dir)); } ASSERT_TRUE(CreateDirectory(data_dir)); FilePath foobar(data_dir.Append(FILE_PATH_LITERAL("foobar.txt"))); std::string data("hello"); EXPECT_FALSE(AppendToFile(foobar, data)); EXPECT_TRUE(WriteFile(foobar, data)); EXPECT_TRUE(AppendToFile(foobar, data)); const std::wstring read_content = ReadTextFile(foobar); EXPECT_EQ(L"hellohello", read_content); } TEST_F(FileUtilTest, ReadFile) { // Create a test file to be read. const std::string kTestData("The quick brown fox jumps over the lazy dog."); FilePath file_path = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("ReadFileTest")); ASSERT_TRUE(WriteFile(file_path, kTestData)); // Make buffers with various size. std::vector small_buffer(kTestData.size() / 2); std::vector exact_buffer(kTestData.size()); std::vector large_buffer(kTestData.size() * 2); // Read the file with smaller buffer. int bytes_read_small = ReadFile( file_path, &small_buffer[0], static_cast(small_buffer.size())); EXPECT_EQ(static_cast(small_buffer.size()), bytes_read_small); EXPECT_EQ( std::string(kTestData.begin(), kTestData.begin() + small_buffer.size()), std::string(small_buffer.begin(), small_buffer.end())); // Read the file with buffer which have exactly same size. int bytes_read_exact = ReadFile( file_path, &exact_buffer[0], static_cast(exact_buffer.size())); EXPECT_EQ(static_cast(kTestData.size()), bytes_read_exact); EXPECT_EQ(kTestData, std::string(exact_buffer.begin(), exact_buffer.end())); // Read the file with larger buffer. int bytes_read_large = ReadFile( file_path, &large_buffer[0], static_cast(large_buffer.size())); EXPECT_EQ(static_cast(kTestData.size()), bytes_read_large); EXPECT_EQ(kTestData, std::string(large_buffer.begin(), large_buffer.begin() + kTestData.size())); // Make sure the return value is -1 if the file doesn't exist. FilePath file_path_not_exist = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("ReadFileNotExistTest")); EXPECT_EQ(-1, ReadFile(file_path_not_exist, &exact_buffer[0], static_cast(exact_buffer.size()))); } TEST_F(FileUtilTest, ReadFileToBytes) { const std::vector kTestData = {'0', '1', '2', '3'}; FilePath file_path = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("ReadFileToStringTest")); FilePath file_path_dangerous = temp_dir_.GetPath() .Append(FILE_PATH_LITERAL("..")) .Append(temp_dir_.GetPath().BaseName()) .Append(FILE_PATH_LITERAL("ReadFileToStringTest")); // Create test file. ASSERT_TRUE(WriteFile(file_path, kTestData)); absl::optional> bytes = ReadFileToBytes(file_path); ASSERT_TRUE(bytes.has_value()); EXPECT_EQ(kTestData, bytes); // Write empty file. ASSERT_TRUE(WriteFile(file_path, "")); bytes = ReadFileToBytes(file_path); ASSERT_TRUE(bytes.has_value()); EXPECT_TRUE(bytes->empty()); ASSERT_FALSE(ReadFileToBytes(file_path_dangerous)); } TEST_F(FileUtilTest, ReadFileToString) { const char kTestData[] = "0123"; std::string data; FilePath file_path = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("ReadFileToStringTest")); FilePath file_path_dangerous = temp_dir_.GetPath() .Append(FILE_PATH_LITERAL("..")) .Append(temp_dir_.GetPath().BaseName()) .Append(FILE_PATH_LITERAL("ReadFileToStringTest")); // Create test file. ASSERT_TRUE(WriteFile(file_path, kTestData)); EXPECT_TRUE(ReadFileToString(file_path, &data)); EXPECT_EQ(kTestData, data); data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, &data, 0)); EXPECT_EQ(0u, data.length()); data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, &data, 2)); EXPECT_EQ("01", data); data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, &data, 3)); EXPECT_EQ("012", data); data = "temp"; EXPECT_TRUE(ReadFileToStringWithMaxSize(file_path, &data, 4)); EXPECT_EQ("0123", data); data = "temp"; EXPECT_TRUE(ReadFileToStringWithMaxSize(file_path, &data, 6)); EXPECT_EQ("0123", data); EXPECT_TRUE(ReadFileToStringWithMaxSize(file_path, nullptr, 6)); EXPECT_TRUE(ReadFileToString(file_path, nullptr)); data = "temp"; EXPECT_FALSE(ReadFileToString(file_path_dangerous, &data)); EXPECT_EQ(0u, data.length()); // Delete test file. EXPECT_TRUE(DeleteFile(file_path)); data = "temp"; EXPECT_FALSE(ReadFileToString(file_path, &data)); EXPECT_EQ(0u, data.length()); data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, &data, 6)); EXPECT_EQ(0u, data.length()); } #if !BUILDFLAG(IS_WIN) TEST_F(FileUtilTest, ReadFileToStringWithUnknownFileSize) { #if BUILDFLAG(IS_FUCHSIA) test::TaskEnvironment task_environment; auto dev_zero = ScopedDevZero::Get(); ASSERT_TRUE(dev_zero); #endif FilePath file_path("/dev/zero"); std::string data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, &data, 0)); EXPECT_EQ(0u, data.length()); data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, &data, 2)); EXPECT_EQ(std::string(2, '\0'), data); EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, nullptr, 6)); // Read more than buffer size. data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, &data, kLargeFileSize)); EXPECT_EQ(kLargeFileSize, data.length()); EXPECT_EQ(std::string(kLargeFileSize, '\0'), data); EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, nullptr, kLargeFileSize)); } #endif // !BUILDFLAG(IS_WIN) #if !BUILDFLAG(IS_WIN) && !BUILDFLAG(IS_NACL) && !BUILDFLAG(IS_FUCHSIA) && \ !BUILDFLAG(IS_IOS) #define ChildMain WriteToPipeChildMain #define ChildMainString "WriteToPipeChildMain" MULTIPROCESS_TEST_MAIN(ChildMain) { const char kTestData[] = "0123"; CommandLine* command_line = CommandLine::ForCurrentProcess(); const FilePath pipe_path = command_line->GetSwitchValuePath("pipe-path"); int fd = open(pipe_path.value().c_str(), O_WRONLY); CHECK_NE(-1, fd); size_t written = 0; while (written < strlen(kTestData)) { ssize_t res = write(fd, kTestData + written, strlen(kTestData) - written); if (res == -1) break; written += res; } CHECK_EQ(strlen(kTestData), written); CHECK_EQ(0, close(fd)); return 0; } #define MoreThanBufferSizeChildMain WriteToPipeMoreThanBufferSizeChildMain #define MoreThanBufferSizeChildMainString \ "WriteToPipeMoreThanBufferSizeChildMain" MULTIPROCESS_TEST_MAIN(MoreThanBufferSizeChildMain) { std::string data(kLargeFileSize, 'c'); CommandLine* command_line = CommandLine::ForCurrentProcess(); const FilePath pipe_path = command_line->GetSwitchValuePath("pipe-path"); int fd = open(pipe_path.value().c_str(), O_WRONLY); CHECK_NE(-1, fd); size_t written = 0; while (written < data.size()) { ssize_t res = write(fd, data.c_str() + written, data.size() - written); if (res == -1) { // We are unable to write because reading process has already read // requested number of bytes and closed pipe. break; } written += res; } CHECK_EQ(0, close(fd)); return 0; } TEST_F(FileUtilTest, ReadFileToStringWithNamedPipe) { FilePath pipe_path = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("test_pipe")); ASSERT_EQ(0, mkfifo(pipe_path.value().c_str(), 0600)); CommandLine child_command_line(GetMultiProcessTestChildBaseCommandLine()); child_command_line.AppendSwitchPath("pipe-path", pipe_path); { Process child_process = SpawnMultiProcessTestChild( ChildMainString, child_command_line, LaunchOptions()); ASSERT_TRUE(child_process.IsValid()); std::string data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(pipe_path, &data, 2)); EXPECT_EQ("01", data); int rv = -1; ASSERT_TRUE(WaitForMultiprocessTestChildExit( child_process, TestTimeouts::action_timeout(), &rv)); ASSERT_EQ(0, rv); } { Process child_process = SpawnMultiProcessTestChild( ChildMainString, child_command_line, LaunchOptions()); ASSERT_TRUE(child_process.IsValid()); std::string data = "temp"; EXPECT_TRUE(ReadFileToStringWithMaxSize(pipe_path, &data, 6)); EXPECT_EQ("0123", data); int rv = -1; ASSERT_TRUE(WaitForMultiprocessTestChildExit( child_process, TestTimeouts::action_timeout(), &rv)); ASSERT_EQ(0, rv); } { Process child_process = SpawnMultiProcessTestChild( MoreThanBufferSizeChildMainString, child_command_line, LaunchOptions()); ASSERT_TRUE(child_process.IsValid()); std::string data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(pipe_path, &data, 6)); EXPECT_EQ("cccccc", data); int rv = -1; ASSERT_TRUE(WaitForMultiprocessTestChildExit( child_process, TestTimeouts::action_timeout(), &rv)); ASSERT_EQ(0, rv); } { Process child_process = SpawnMultiProcessTestChild( MoreThanBufferSizeChildMainString, child_command_line, LaunchOptions()); ASSERT_TRUE(child_process.IsValid()); std::string data = "temp"; EXPECT_FALSE( ReadFileToStringWithMaxSize(pipe_path, &data, kLargeFileSize - 1)); EXPECT_EQ(std::string(kLargeFileSize - 1, 'c'), data); int rv = -1; ASSERT_TRUE(WaitForMultiprocessTestChildExit( child_process, TestTimeouts::action_timeout(), &rv)); ASSERT_EQ(0, rv); } { Process child_process = SpawnMultiProcessTestChild( MoreThanBufferSizeChildMainString, child_command_line, LaunchOptions()); ASSERT_TRUE(child_process.IsValid()); std::string data = "temp"; EXPECT_TRUE(ReadFileToStringWithMaxSize(pipe_path, &data, kLargeFileSize)); EXPECT_EQ(std::string(kLargeFileSize, 'c'), data); int rv = -1; ASSERT_TRUE(WaitForMultiprocessTestChildExit( child_process, TestTimeouts::action_timeout(), &rv)); ASSERT_EQ(0, rv); } { Process child_process = SpawnMultiProcessTestChild( MoreThanBufferSizeChildMainString, child_command_line, LaunchOptions()); ASSERT_TRUE(child_process.IsValid()); std::string data = "temp"; EXPECT_TRUE( ReadFileToStringWithMaxSize(pipe_path, &data, kLargeFileSize * 5)); EXPECT_EQ(std::string(kLargeFileSize, 'c'), data); int rv = -1; ASSERT_TRUE(WaitForMultiprocessTestChildExit( child_process, TestTimeouts::action_timeout(), &rv)); ASSERT_EQ(0, rv); } ASSERT_EQ(0, unlink(pipe_path.value().c_str())); } #endif // !BUILDFLAG(IS_WIN) && !BUILDFLAG(IS_NACL) && !BUILDFLAG(IS_FUCHSIA) // && !BUILDFLAG(IS_IOS) #if BUILDFLAG(IS_WIN) #define ChildMain WriteToPipeChildMain #define ChildMainString "WriteToPipeChildMain" MULTIPROCESS_TEST_MAIN(ChildMain) { const char kTestData[] = "0123"; CommandLine* command_line = CommandLine::ForCurrentProcess(); const FilePath pipe_path = command_line->GetSwitchValuePath("pipe-path"); std::string switch_string = command_line->GetSwitchValueASCII("sync_event"); EXPECT_FALSE(switch_string.empty()); unsigned int switch_uint = 0; EXPECT_TRUE(StringToUint(switch_string, &switch_uint)); win::ScopedHandle sync_event(win::Uint32ToHandle(switch_uint)); HANDLE ph = CreateNamedPipe(pipe_path.value().c_str(), PIPE_ACCESS_OUTBOUND, PIPE_WAIT, 1, 0, 0, 0, NULL); EXPECT_NE(ph, INVALID_HANDLE_VALUE); EXPECT_TRUE(SetEvent(sync_event.get())); if (!::ConnectNamedPipe(ph, /*lpOverlapped=*/nullptr)) { // ERROR_PIPE_CONNECTED means that the other side has already connected. auto error = ::GetLastError(); EXPECT_EQ(error, DWORD{ERROR_PIPE_CONNECTED}); } DWORD written; EXPECT_TRUE(::WriteFile(ph, kTestData, strlen(kTestData), &written, NULL)); EXPECT_EQ(strlen(kTestData), written); CloseHandle(ph); return 0; } #define MoreThanBufferSizeChildMain WriteToPipeMoreThanBufferSizeChildMain #define MoreThanBufferSizeChildMainString \ "WriteToPipeMoreThanBufferSizeChildMain" MULTIPROCESS_TEST_MAIN(MoreThanBufferSizeChildMain) { std::string data(kLargeFileSize, 'c'); CommandLine* command_line = CommandLine::ForCurrentProcess(); const FilePath pipe_path = command_line->GetSwitchValuePath("pipe-path"); std::string switch_string = command_line->GetSwitchValueASCII("sync_event"); EXPECT_FALSE(switch_string.empty()); unsigned int switch_uint = 0; EXPECT_TRUE(StringToUint(switch_string, &switch_uint)); win::ScopedHandle sync_event(win::Uint32ToHandle(switch_uint)); HANDLE ph = CreateNamedPipe(pipe_path.value().c_str(), PIPE_ACCESS_OUTBOUND, PIPE_WAIT, 1, data.size(), data.size(), 0, NULL); EXPECT_NE(ph, INVALID_HANDLE_VALUE); EXPECT_TRUE(SetEvent(sync_event.get())); if (!::ConnectNamedPipe(ph, /*lpOverlapped=*/nullptr)) { // ERROR_PIPE_CONNECTED means that the other side has already connected. auto error = ::GetLastError(); EXPECT_EQ(error, DWORD{ERROR_PIPE_CONNECTED}); } DWORD written; EXPECT_TRUE(::WriteFile(ph, data.c_str(), data.size(), &written, NULL)); EXPECT_EQ(data.size(), written); CloseHandle(ph); return 0; } TEST_F(FileUtilTest, ReadFileToStringWithNamedPipe) { FilePath pipe_path(FILE_PATH_LITERAL("\\\\.\\pipe\\test_pipe")); win::ScopedHandle sync_event(CreateEvent(0, false, false, nullptr)); CommandLine child_command_line(GetMultiProcessTestChildBaseCommandLine()); child_command_line.AppendSwitchPath("pipe-path", pipe_path); child_command_line.AppendSwitchASCII( "sync_event", NumberToString(win::HandleToUint32(sync_event.get()))); LaunchOptions options; options.handles_to_inherit.push_back(sync_event.get()); { Process child_process = SpawnMultiProcessTestChild( ChildMainString, child_command_line, options); ASSERT_TRUE(child_process.IsValid()); // Wait for pipe creation in child process. EXPECT_EQ(WAIT_OBJECT_0, WaitForSingleObject(sync_event.get(), INFINITE)); std::string data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(pipe_path, &data, 2)); EXPECT_EQ("01", data); int rv = -1; ASSERT_TRUE(WaitForMultiprocessTestChildExit( child_process, TestTimeouts::action_timeout(), &rv)); ASSERT_EQ(0, rv); } { Process child_process = SpawnMultiProcessTestChild( ChildMainString, child_command_line, options); ASSERT_TRUE(child_process.IsValid()); // Wait for pipe creation in child process. EXPECT_EQ(WAIT_OBJECT_0, WaitForSingleObject(sync_event.get(), INFINITE)); std::string data = "temp"; EXPECT_TRUE(ReadFileToStringWithMaxSize(pipe_path, &data, 6)); EXPECT_EQ("0123", data); int rv = -1; ASSERT_TRUE(WaitForMultiprocessTestChildExit( child_process, TestTimeouts::action_timeout(), &rv)); ASSERT_EQ(0, rv); } { Process child_process = SpawnMultiProcessTestChild( MoreThanBufferSizeChildMainString, child_command_line, options); ASSERT_TRUE(child_process.IsValid()); // Wait for pipe creation in child process. EXPECT_EQ(WAIT_OBJECT_0, WaitForSingleObject(sync_event.get(), INFINITE)); std::string data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(pipe_path, &data, 6)); EXPECT_EQ("cccccc", data); int rv = -1; ASSERT_TRUE(WaitForMultiprocessTestChildExit( child_process, TestTimeouts::action_timeout(), &rv)); ASSERT_EQ(0, rv); } { Process child_process = SpawnMultiProcessTestChild( MoreThanBufferSizeChildMainString, child_command_line, options); ASSERT_TRUE(child_process.IsValid()); // Wait for pipe creation in child process. EXPECT_EQ(WAIT_OBJECT_0, WaitForSingleObject(sync_event.get(), INFINITE)); std::string data = "temp"; EXPECT_FALSE( ReadFileToStringWithMaxSize(pipe_path, &data, kLargeFileSize - 1)); EXPECT_EQ(std::string(kLargeFileSize - 1, 'c'), data); int rv = -1; ASSERT_TRUE(WaitForMultiprocessTestChildExit( child_process, TestTimeouts::action_timeout(), &rv)); ASSERT_EQ(0, rv); } { Process child_process = SpawnMultiProcessTestChild( MoreThanBufferSizeChildMainString, child_command_line, options); ASSERT_TRUE(child_process.IsValid()); // Wait for pipe creation in child process. EXPECT_EQ(WAIT_OBJECT_0, WaitForSingleObject(sync_event.get(), INFINITE)); std::string data = "temp"; EXPECT_TRUE(ReadFileToStringWithMaxSize(pipe_path, &data, kLargeFileSize)); EXPECT_EQ(std::string(kLargeFileSize, 'c'), data); int rv = -1; ASSERT_TRUE(WaitForMultiprocessTestChildExit( child_process, TestTimeouts::action_timeout(), &rv)); ASSERT_EQ(0, rv); } { Process child_process = SpawnMultiProcessTestChild( MoreThanBufferSizeChildMainString, child_command_line, options); ASSERT_TRUE(child_process.IsValid()); // Wait for pipe creation in child process. EXPECT_EQ(WAIT_OBJECT_0, WaitForSingleObject(sync_event.get(), INFINITE)); std::string data = "temp"; EXPECT_TRUE( ReadFileToStringWithMaxSize(pipe_path, &data, kLargeFileSize * 5)); EXPECT_EQ(std::string(kLargeFileSize, 'c'), data); int rv = -1; ASSERT_TRUE(WaitForMultiprocessTestChildExit( child_process, TestTimeouts::action_timeout(), &rv)); ASSERT_EQ(0, rv); } } #endif // BUILDFLAG(IS_WIN) #if BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_APPLE) TEST_F(FileUtilTest, ReadFileToStringWithProcFileSystem) { FilePath file_path("/proc/cpuinfo"); std::string data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, &data, 0)); EXPECT_EQ(0u, data.length()); data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, &data, 2)); EXPECT_TRUE(EqualsCaseInsensitiveASCII("pr", data)); data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, &data, 4)); EXPECT_TRUE(EqualsCaseInsensitiveASCII("proc", data)); EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, nullptr, 4)); } #endif // BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_APPLE) TEST_F(FileUtilTest, ReadFileToStringWithLargeFile) { std::string data(kLargeFileSize, 'c'); FilePath file_path = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("ReadFileToStringTest")); // Create test file. ASSERT_TRUE(WriteFile(file_path, data)); std::string actual_data = "temp"; EXPECT_TRUE(ReadFileToString(file_path, &actual_data)); EXPECT_EQ(data, actual_data); actual_data = "temp"; EXPECT_FALSE(ReadFileToStringWithMaxSize(file_path, &actual_data, 0)); EXPECT_EQ(0u, actual_data.length()); // Read more than buffer size. actual_data = "temp"; EXPECT_FALSE( ReadFileToStringWithMaxSize(file_path, &actual_data, kLargeFileSize - 1)); EXPECT_EQ(std::string(kLargeFileSize - 1, 'c'), actual_data); } TEST_F(FileUtilTest, ReadStreamToString) { ScopedFILE stream( OpenFile(temp_dir_.GetPath().Append(FPL("hello.txt")), "wb+")); ASSERT_TRUE(stream); File file = FILEToFile(stream.get()); ASSERT_TRUE(file.IsValid()); ASSERT_EQ(fprintf(stream.get(), "there"), 5); ASSERT_EQ(fflush(stream.get()), 0); std::string contents; EXPECT_TRUE(ReadStreamToString(stream.get(), &contents)); EXPECT_EQ(contents, std::string("there")); } #if BUILDFLAG(IS_POSIX) TEST_F(FileUtilTest, ReadStreamToString_ZeroLengthFile) { Thread write_thread("write thread"); ASSERT_TRUE(write_thread.Start()); const size_t kSizes[] = {0, 1, 4095, 4096, 4097, 65535, 65536, 65537}; for (size_t size : kSizes) { ScopedFD read_fd, write_fd; // Pipes have a length of zero when stat()'d. ASSERT_TRUE(CreatePipe(&read_fd, &write_fd, false /* non_blocking */)); std::string random_data; if (size > 0) { random_data = RandBytesAsString(size); } EXPECT_EQ(size, random_data.size()); write_thread.task_runner()->PostTask( FROM_HERE, BindLambdaForTesting([random_data, write_fd = std::move(write_fd)]() { ASSERT_TRUE(WriteFileDescriptor(write_fd.get(), random_data)); })); ScopedFILE read_file(fdopen(read_fd.release(), "r")); ASSERT_TRUE(read_file); std::string contents; EXPECT_TRUE(ReadStreamToString(read_file.get(), &contents)); EXPECT_EQ(contents, random_data); } } #endif TEST_F(FileUtilTest, ReadStreamToStringWithMaxSize) { ScopedFILE stream( OpenFile(temp_dir_.GetPath().Append(FPL("hello.txt")), "wb+")); ASSERT_TRUE(stream); File file = FILEToFile(stream.get()); ASSERT_TRUE(file.IsValid()); ASSERT_EQ(fprintf(stream.get(), "there"), 5); ASSERT_EQ(fflush(stream.get()), 0); std::string contents; EXPECT_FALSE(ReadStreamToStringWithMaxSize(stream.get(), 2, &contents)); } TEST_F(FileUtilTest, ReadStreamToStringNullStream) { std::string contents; EXPECT_FALSE(ReadStreamToString(nullptr, &contents)); } TEST_F(FileUtilTest, TouchFile) { FilePath data_dir = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("FilePathTest")); // Create a fresh, empty copy of this directory. if (PathExists(data_dir)) { ASSERT_TRUE(DeletePathRecursively(data_dir)); } ASSERT_TRUE(CreateDirectory(data_dir)); FilePath foobar(data_dir.Append(FILE_PATH_LITERAL("foobar.txt"))); std::string data("hello"); ASSERT_TRUE(WriteFile(foobar, data)); Time access_time; // This timestamp is divisible by one day (in local timezone), // to make it work on FAT too. ASSERT_TRUE(Time::FromString("Wed, 16 Nov 1994, 00:00:00", &access_time)); Time modification_time; // Note that this timestamp is divisible by two (seconds) - FAT stores // modification times with 2s resolution. ASSERT_TRUE(Time::FromString("Tue, 15 Nov 1994, 12:45:26 GMT", &modification_time)); ASSERT_TRUE(TouchFile(foobar, access_time, modification_time)); File::Info file_info; ASSERT_TRUE(GetFileInfo(foobar, &file_info)); #if !BUILDFLAG(IS_FUCHSIA) // Access time is not supported on Fuchsia, see https://crbug.com/735233. EXPECT_EQ(access_time.ToInternalValue(), file_info.last_accessed.ToInternalValue()); #endif EXPECT_EQ(modification_time.ToInternalValue(), file_info.last_modified.ToInternalValue()); } TEST_F(FileUtilTest, WriteFileSpanVariant) { FilePath empty_file = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("empty_file")); ASSERT_FALSE(PathExists(empty_file)); EXPECT_TRUE(WriteFile(empty_file, base::span())); EXPECT_TRUE(PathExists(empty_file)); std::string data = "not empty"; EXPECT_TRUE(ReadFileToString(empty_file, &data)); EXPECT_TRUE(data.empty()); FilePath write_span_file = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("write_span_file")); ASSERT_FALSE(PathExists(write_span_file)); static constexpr uint8_t kInput[] = {'h', 'e', 'l', 'l', 'o'}; EXPECT_TRUE(WriteFile(write_span_file, kInput)); EXPECT_TRUE(PathExists(write_span_file)); data.clear(); EXPECT_TRUE(ReadFileToString(write_span_file, &data)); EXPECT_EQ("hello", data); } TEST_F(FileUtilTest, WriteFileStringVariant) { FilePath empty_file = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("empty_file")); ASSERT_FALSE(PathExists(empty_file)); EXPECT_TRUE(WriteFile(empty_file, "")); EXPECT_TRUE(PathExists(empty_file)); std::string data = "not empty"; EXPECT_TRUE(ReadFileToString(empty_file, &data)); EXPECT_TRUE(data.empty()); FilePath write_span_file = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("write_string_file")); ASSERT_FALSE(PathExists(write_span_file)); EXPECT_TRUE(WriteFile(write_span_file, "world")); EXPECT_TRUE(PathExists(write_span_file)); data.clear(); EXPECT_TRUE(ReadFileToString(write_span_file, &data)); EXPECT_EQ("world", data); } TEST_F(FileUtilTest, IsDirectoryEmpty) { FilePath empty_dir = temp_dir_.GetPath().Append(FILE_PATH_LITERAL("EmptyDir")); ASSERT_FALSE(PathExists(empty_dir)); ASSERT_TRUE(CreateDirectory(empty_dir)); EXPECT_TRUE(IsDirectoryEmpty(empty_dir)); FilePath foo(empty_dir.Append(FILE_PATH_LITERAL("foo.txt"))); std::string bar("baz"); ASSERT_TRUE(WriteFile(foo, bar)); EXPECT_FALSE(IsDirectoryEmpty(empty_dir)); } #if BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA) TEST_F(FileUtilTest, SetNonBlocking) { const int kBogusFd = 99999; EXPECT_FALSE(SetNonBlocking(kBogusFd)); FilePath path; ASSERT_TRUE(PathService::Get(DIR_TEST_DATA, &path)); path = path.Append(FPL("file_util")).Append(FPL("original.txt")); ScopedFD fd(open(path.value().c_str(), O_RDONLY)); ASSERT_GE(fd.get(), 0); EXPECT_TRUE(SetNonBlocking(fd.get())); } TEST_F(FileUtilTest, SetCloseOnExec) { const int kBogusFd = 99999; EXPECT_FALSE(SetCloseOnExec(kBogusFd)); FilePath path; ASSERT_TRUE(PathService::Get(DIR_TEST_DATA, &path)); path = path.Append(FPL("file_util")).Append(FPL("original.txt")); ScopedFD fd(open(path.value().c_str(), O_RDONLY)); ASSERT_GE(fd.get(), 0); EXPECT_TRUE(SetCloseOnExec(fd.get())); } #endif #if BUILDFLAG(IS_MAC) // Testing VerifyPathControlledByAdmin() is hard, because there is no // way a test can make a file owned by root, or change file paths // at the root of the file system. VerifyPathControlledByAdmin() // is implemented as a call to VerifyPathControlledByUser, which gives // us the ability to test with paths under the test's temp directory, // using a user id we control. // Pull tests of VerifyPathControlledByUserTest() into a separate test class // with a common SetUp() method. class VerifyPathControlledByUserTest : public FileUtilTest { protected: void SetUp() override { FileUtilTest::SetUp(); // Create a basic structure used by each test. // base_dir_ // |-> sub_dir_ // |-> text_file_ base_dir_ = temp_dir_.GetPath().AppendASCII("base_dir"); ASSERT_TRUE(CreateDirectory(base_dir_)); sub_dir_ = base_dir_.AppendASCII("sub_dir"); ASSERT_TRUE(CreateDirectory(sub_dir_)); text_file_ = sub_dir_.AppendASCII("file.txt"); CreateTextFile(text_file_, L"This text file has some text in it."); // Get the user and group files are created with from |base_dir_|. stat_wrapper_t stat_buf; ASSERT_EQ(0, File::Stat(base_dir_.value().c_str(), &stat_buf)); uid_ = stat_buf.st_uid; ok_gids_.insert(stat_buf.st_gid); bad_gids_.insert(stat_buf.st_gid + 1); ASSERT_EQ(uid_, getuid()); // This process should be the owner. // To ensure that umask settings do not cause the initial state // of permissions to be different from what we expect, explicitly // set permissions on the directories we create. // Make all files and directories non-world-writable. // Users and group can read, write, traverse int enabled_permissions = FILE_PERMISSION_USER_MASK | FILE_PERMISSION_GROUP_MASK; // Other users can't read, write, traverse int disabled_permissions = FILE_PERMISSION_OTHERS_MASK; ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions( base_dir_, enabled_permissions, disabled_permissions)); ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions( sub_dir_, enabled_permissions, disabled_permissions)); } FilePath base_dir_; FilePath sub_dir_; FilePath text_file_; uid_t uid_; std::set ok_gids_; std::set bad_gids_; }; TEST_F(VerifyPathControlledByUserTest, BadPaths) { // File does not exist. FilePath does_not_exist = base_dir_.AppendASCII("does") .AppendASCII("not") .AppendASCII("exist"); EXPECT_FALSE( VerifyPathControlledByUser(base_dir_, does_not_exist, uid_, ok_gids_)); // |base| not a subpath of |path|. EXPECT_FALSE(VerifyPathControlledByUser(sub_dir_, base_dir_, uid_, ok_gids_)); // An empty base path will fail to be a prefix for any path. FilePath empty; EXPECT_FALSE(VerifyPathControlledByUser(empty, base_dir_, uid_, ok_gids_)); // Finding that a bad call fails proves nothing unless a good call succeeds. EXPECT_TRUE(VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, ok_gids_)); } TEST_F(VerifyPathControlledByUserTest, Symlinks) { // Symlinks in the path should cause failure. // Symlink to the file at the end of the path. FilePath file_link = base_dir_.AppendASCII("file_link"); ASSERT_TRUE(CreateSymbolicLink(text_file_, file_link)) << "Failed to create symlink."; EXPECT_FALSE( VerifyPathControlledByUser(base_dir_, file_link, uid_, ok_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(file_link, file_link, uid_, ok_gids_)); // Symlink from one directory to another within the path. FilePath link_to_sub_dir = base_dir_.AppendASCII("link_to_sub_dir"); ASSERT_TRUE(CreateSymbolicLink(sub_dir_, link_to_sub_dir)) << "Failed to create symlink."; FilePath file_path_with_link = link_to_sub_dir.AppendASCII("file.txt"); ASSERT_TRUE(PathExists(file_path_with_link)); EXPECT_FALSE(VerifyPathControlledByUser(base_dir_, file_path_with_link, uid_, ok_gids_)); EXPECT_FALSE(VerifyPathControlledByUser(link_to_sub_dir, file_path_with_link, uid_, ok_gids_)); // Symlinks in parents of base path are allowed. EXPECT_TRUE(VerifyPathControlledByUser(file_path_with_link, file_path_with_link, uid_, ok_gids_)); } TEST_F(VerifyPathControlledByUserTest, OwnershipChecks) { // Get a uid that is not the uid of files we create. uid_t bad_uid = uid_ + 1; // Make all files and directories non-world-writable. ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(base_dir_, 0u, S_IWOTH)); ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(sub_dir_, 0u, S_IWOTH)); ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(text_file_, 0u, S_IWOTH)); // We control these paths. EXPECT_TRUE(VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, ok_gids_)); EXPECT_TRUE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, ok_gids_)); EXPECT_TRUE(VerifyPathControlledByUser(sub_dir_, text_file_, uid_, ok_gids_)); // Another user does not control these paths. EXPECT_FALSE( VerifyPathControlledByUser(base_dir_, sub_dir_, bad_uid, ok_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(base_dir_, text_file_, bad_uid, ok_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(sub_dir_, text_file_, bad_uid, ok_gids_)); // Another group does not control the paths. EXPECT_FALSE( VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, bad_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, bad_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(sub_dir_, text_file_, uid_, bad_gids_)); } TEST_F(VerifyPathControlledByUserTest, GroupWriteTest) { // Make all files and directories writable only by their owner. ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(base_dir_, 0u, S_IWOTH|S_IWGRP)); ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(sub_dir_, 0u, S_IWOTH|S_IWGRP)); ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(text_file_, 0u, S_IWOTH|S_IWGRP)); // Any group is okay because the path is not group-writable. EXPECT_TRUE(VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, ok_gids_)); EXPECT_TRUE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, ok_gids_)); EXPECT_TRUE(VerifyPathControlledByUser(sub_dir_, text_file_, uid_, ok_gids_)); EXPECT_TRUE(VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, bad_gids_)); EXPECT_TRUE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, bad_gids_)); EXPECT_TRUE( VerifyPathControlledByUser(sub_dir_, text_file_, uid_, bad_gids_)); // No group is okay, because we don't check the group // if no group can write. std::set no_gids; // Empty set of gids. EXPECT_TRUE(VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, no_gids)); EXPECT_TRUE(VerifyPathControlledByUser(base_dir_, text_file_, uid_, no_gids)); EXPECT_TRUE(VerifyPathControlledByUser(sub_dir_, text_file_, uid_, no_gids)); // Make all files and directories writable by their group. ASSERT_NO_FATAL_FAILURE(ChangePosixFilePermissions(base_dir_, S_IWGRP, 0u)); ASSERT_NO_FATAL_FAILURE(ChangePosixFilePermissions(sub_dir_, S_IWGRP, 0u)); ASSERT_NO_FATAL_FAILURE(ChangePosixFilePermissions(text_file_, S_IWGRP, 0u)); // Now |ok_gids_| works, but |bad_gids_| fails. EXPECT_TRUE(VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, ok_gids_)); EXPECT_TRUE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, ok_gids_)); EXPECT_TRUE(VerifyPathControlledByUser(sub_dir_, text_file_, uid_, ok_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, bad_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, bad_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(sub_dir_, text_file_, uid_, bad_gids_)); // Because any group in the group set is allowed, // the union of good and bad gids passes. std::set multiple_gids; std::set_union( ok_gids_.begin(), ok_gids_.end(), bad_gids_.begin(), bad_gids_.end(), std::inserter(multiple_gids, multiple_gids.begin())); EXPECT_TRUE( VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, multiple_gids)); EXPECT_TRUE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, multiple_gids)); EXPECT_TRUE( VerifyPathControlledByUser(sub_dir_, text_file_, uid_, multiple_gids)); } TEST_F(VerifyPathControlledByUserTest, WriteBitChecks) { // Make all files and directories non-world-writable. ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(base_dir_, 0u, S_IWOTH)); ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(sub_dir_, 0u, S_IWOTH)); ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(text_file_, 0u, S_IWOTH)); // Initialy, we control all parts of the path. EXPECT_TRUE(VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, ok_gids_)); EXPECT_TRUE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, ok_gids_)); EXPECT_TRUE(VerifyPathControlledByUser(sub_dir_, text_file_, uid_, ok_gids_)); // Make base_dir_ world-writable. ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(base_dir_, S_IWOTH, 0u)); EXPECT_FALSE(VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, ok_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, ok_gids_)); EXPECT_TRUE(VerifyPathControlledByUser(sub_dir_, text_file_, uid_, ok_gids_)); // Make sub_dir_ world writable. ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(sub_dir_, S_IWOTH, 0u)); EXPECT_FALSE(VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, ok_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, ok_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(sub_dir_, text_file_, uid_, ok_gids_)); // Make text_file_ world writable. ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(text_file_, S_IWOTH, 0u)); EXPECT_FALSE(VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, ok_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, ok_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(sub_dir_, text_file_, uid_, ok_gids_)); // Make sub_dir_ non-world writable. ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(sub_dir_, 0u, S_IWOTH)); EXPECT_FALSE(VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, ok_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, ok_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(sub_dir_, text_file_, uid_, ok_gids_)); // Make base_dir_ non-world-writable. ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(base_dir_, 0u, S_IWOTH)); EXPECT_TRUE(VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, ok_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, ok_gids_)); EXPECT_FALSE( VerifyPathControlledByUser(sub_dir_, text_file_, uid_, ok_gids_)); // Back to the initial state: Nothing is writable, so every path // should pass. ASSERT_NO_FATAL_FAILURE( ChangePosixFilePermissions(text_file_, 0u, S_IWOTH)); EXPECT_TRUE(VerifyPathControlledByUser(base_dir_, sub_dir_, uid_, ok_gids_)); EXPECT_TRUE( VerifyPathControlledByUser(base_dir_, text_file_, uid_, ok_gids_)); EXPECT_TRUE(VerifyPathControlledByUser(sub_dir_, text_file_, uid_, ok_gids_)); } #endif // BUILDFLAG(IS_MAC) // Flaky test: crbug/1054637 #if BUILDFLAG(IS_ANDROID) TEST_F(FileUtilTest, DISABLED_ValidContentUriTest) { // Get the test image path. FilePath data_dir; ASSERT_TRUE(PathService::Get(DIR_TEST_DATA, &data_dir)); data_dir = data_dir.AppendASCII("file_util"); ASSERT_TRUE(PathExists(data_dir)); FilePath image_file = data_dir.Append(FILE_PATH_LITERAL("red.png")); int64_t image_size; GetFileSize(image_file, &image_size); ASSERT_GT(image_size, 0); // Insert the image into MediaStore. MediaStore will do some conversions, and // return the content URI. FilePath path = InsertImageIntoMediaStore(image_file); EXPECT_TRUE(path.IsContentUri()); EXPECT_TRUE(PathExists(path)); // The file size may not equal to the input image as MediaStore may convert // the image. int64_t content_uri_size; GetFileSize(path, &content_uri_size); EXPECT_EQ(image_size, content_uri_size); // We should be able to read the file. File file = OpenContentUriForRead(path); EXPECT_TRUE(file.IsValid()); auto buffer = std::make_unique(image_size); EXPECT_TRUE(file.ReadAtCurrentPos(buffer.get(), image_size)); } TEST_F(FileUtilTest, NonExistentContentUriTest) { FilePath path("content://foo.bar"); EXPECT_TRUE(path.IsContentUri()); EXPECT_FALSE(PathExists(path)); // Size should be smaller than 0. int64_t size; EXPECT_FALSE(GetFileSize(path, &size)); // We should not be able to read the file. File file = OpenContentUriForRead(path); EXPECT_FALSE(file.IsValid()); } #endif TEST_F(FileUtilTest, GetUniquePathNumberNoFile) { // This file does not exist. const FilePath some_file = temp_dir_.GetPath().Append(FPL("SomeFile.txt")); // The path is unique as-is. EXPECT_EQ(GetUniquePathNumber(some_file), 0); } TEST_F(FileUtilTest, GetUniquePathNumberFileExists) { // Create a file with the desired path. const FilePath some_file = temp_dir_.GetPath().Append(FPL("SomeFile.txt")); ASSERT_TRUE(File(some_file, File::FLAG_CREATE | File::FLAG_WRITE).IsValid()); // The file exists, so the number 1 is needed to make it unique. EXPECT_EQ(GetUniquePathNumber(some_file), 1); } TEST_F(FileUtilTest, GetUniquePathNumberFilesExist) { // Create a file with the desired path and with it suffixed with " (1)" const FilePath some_file = temp_dir_.GetPath().Append(FPL("SomeFile.txt")); ASSERT_TRUE(File(some_file, File::FLAG_CREATE | File::FLAG_WRITE).IsValid()); const FilePath some_file_one = temp_dir_.GetPath().Append(FPL("SomeFile (1).txt")); ASSERT_TRUE( File(some_file_one, File::FLAG_CREATE | File::FLAG_WRITE).IsValid()); // This time the number 2 is needed to make it unique. EXPECT_EQ(GetUniquePathNumber(some_file), 2); } TEST_F(FileUtilTest, GetUniquePathNumberTooManyFiles) { // Create a file with the desired path. const FilePath some_file = temp_dir_.GetPath().Append(FPL("SomeFile.txt")); ASSERT_TRUE(File(some_file, File::FLAG_CREATE | File::FLAG_WRITE).IsValid()); // Now create 100 collisions. for (int i = 1; i <= kMaxUniqueFiles; ++i) { ASSERT_EQ(GetUniquePathNumber(some_file), i); ASSERT_TRUE(File(temp_dir_.GetPath().AppendASCII( StringPrintf("SomeFile (%d).txt", i)), File::FLAG_CREATE | File::FLAG_WRITE) .IsValid()); } // Verify that the limit has been reached. EXPECT_EQ(GetUniquePathNumber(some_file), -1); } TEST_F(FileUtilTest, PreReadFile_ExistingFile_NoSize) { FilePath text_file = temp_dir_.GetPath().Append(FPL("text_file")); CreateTextFile(text_file, bogus_content); EXPECT_TRUE(PreReadFile(text_file, /*is_executable=*/false)); } TEST_F(FileUtilTest, PreReadFile_ExistingFile_ExactSize) { FilePath text_file = temp_dir_.GetPath().Append(FPL("text_file")); CreateTextFile(text_file, bogus_content); EXPECT_TRUE(PreReadFile(text_file, /*is_executable=*/false, std::size(bogus_content))); } TEST_F(FileUtilTest, PreReadFile_ExistingFile_OverSized) { FilePath text_file = temp_dir_.GetPath().Append(FPL("text_file")); CreateTextFile(text_file, bogus_content); EXPECT_TRUE(PreReadFile(text_file, /*is_executable=*/false, std::size(bogus_content) * 2)); } TEST_F(FileUtilTest, PreReadFile_ExistingFile_UnderSized) { FilePath text_file = temp_dir_.GetPath().Append(FPL("text_file")); CreateTextFile(text_file, bogus_content); EXPECT_TRUE(PreReadFile(text_file, /*is_executable=*/false, std::size(bogus_content) / 2)); } TEST_F(FileUtilTest, PreReadFile_ExistingFile_ZeroSize) { FilePath text_file = temp_dir_.GetPath().Append(FPL("text_file")); CreateTextFile(text_file, bogus_content); EXPECT_TRUE(PreReadFile(text_file, /*is_executable=*/false, /*max_bytes=*/0)); } TEST_F(FileUtilTest, PreReadFile_ExistingEmptyFile_NoSize) { FilePath text_file = temp_dir_.GetPath().Append(FPL("text_file")); CreateTextFile(text_file, L""); // The test just asserts that this doesn't crash. The Windows implementation // fails in this case, due to the base::MemoryMappedFile implementation and // the limitations of ::MapViewOfFile(). PreReadFile(text_file, /*is_executable=*/false); } TEST_F(FileUtilTest, PreReadFile_ExistingEmptyFile_ZeroSize) { FilePath text_file = temp_dir_.GetPath().Append(FPL("text_file")); CreateTextFile(text_file, L""); EXPECT_TRUE(PreReadFile(text_file, /*is_executable=*/false, /*max_bytes=*/0)); } TEST_F(FileUtilTest, PreReadFile_InexistentFile) { FilePath inexistent_file = temp_dir_.GetPath().Append(FPL("inexistent_file")); EXPECT_FALSE(PreReadFile(inexistent_file, /*is_executable=*/false)); } TEST_F(FileUtilTest, PreReadFile_Executable) { FilePath exe_data_dir; ASSERT_TRUE(PathService::Get(DIR_TEST_DATA, &exe_data_dir)); exe_data_dir = exe_data_dir.Append(FPL("pe_image_reader")); ASSERT_TRUE(PathExists(exe_data_dir)); // Load a sample executable and confirm that it was successfully prefetched. // `test_exe` is a Windows binary, which is fine in this case because only the // Windows implementation treats binaries differently from other files. const FilePath test_exe = exe_data_dir.Append(FPL("signed.exe")); EXPECT_TRUE(PreReadFile(test_exe, /*is_executable=*/true)); } // Test that temp files obtained racily are all unique (no interference between // threads). Mimics file operations in DoLaunchChildTestProcess() to rule out // thread-safety issues @ https://crbug.com/826408#c17. TEST(FileUtilMultiThreadedTest, MultiThreadedTempFiles) { #if BUILDFLAG(IS_FUCHSIA) // TODO(crbug.com/844416): Too slow to run on infra due to QEMU overhead. constexpr int kNumThreads = 8; #else constexpr int kNumThreads = 64; #endif constexpr int kNumWritesPerThread = 32; std::unique_ptr threads[kNumThreads]; for (auto& thread : threads) { thread = std::make_unique("test worker"); thread->Start(); } // Wait until all threads are started for max parallelism. for (auto& thread : threads) thread->WaitUntilThreadStarted(); const RepeatingClosure open_write_close_read = BindRepeating([]() { FilePath output_filename; ScopedFILE output_file(CreateAndOpenTemporaryStream(&output_filename)); EXPECT_TRUE(output_file); const std::string content = GenerateGUID(); #if BUILDFLAG(IS_WIN) HANDLE handle = reinterpret_cast(_get_osfhandle(_fileno(output_file.get()))); DWORD bytes_written = 0; ::WriteFile(handle, content.c_str(), content.length(), &bytes_written, NULL); #else size_t bytes_written = ::write(::fileno(output_file.get()), content.c_str(), content.length()); #endif EXPECT_EQ(content.length(), bytes_written); ::fflush(output_file.get()); output_file.reset(); std::string output_file_contents; EXPECT_TRUE(ReadFileToString(output_filename, &output_file_contents)) << output_filename; EXPECT_EQ(content, output_file_contents); DeleteFile(output_filename); }); // Post tasks to each thread in a round-robin fashion to ensure as much // parallelism as possible. for (int i = 0; i < kNumWritesPerThread; ++i) { for (auto& thread : threads) { thread->task_runner()->PostTask(FROM_HERE, open_write_close_read); } } for (auto& thread : threads) thread->Stop(); } #if BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA) TEST(ScopedFD, ScopedFDDoesClose) { int fds[2]; char c = 0; ASSERT_EQ(0, pipe(fds)); const int write_end = fds[1]; ScopedFD read_end_closer(fds[0]); { ScopedFD write_end_closer(fds[1]); } // This is the only thread. This file descriptor should no longer be valid. int ret = close(write_end); EXPECT_EQ(-1, ret); EXPECT_EQ(EBADF, errno); // Make sure read(2) won't block. ASSERT_EQ(0, fcntl(fds[0], F_SETFL, O_NONBLOCK)); // Reading the pipe should EOF. EXPECT_EQ(0, read(fds[0], &c, 1)); } #if defined(GTEST_HAS_DEATH_TEST) void CloseWithScopedFD(int fd) { ScopedFD fd_closer(fd); } #endif TEST(ScopedFD, ScopedFDCrashesOnCloseFailure) { int fds[2]; ASSERT_EQ(0, pipe(fds)); ScopedFD read_end_closer(fds[0]); EXPECT_EQ(0, IGNORE_EINTR(close(fds[1]))); #if defined(GTEST_HAS_DEATH_TEST) // This is the only thread. This file descriptor should no longer be valid. // Trying to close it should crash. This is important for security. EXPECT_DEATH(CloseWithScopedFD(fds[1]), ""); #endif } #endif // BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA) #if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_ANDROID) TEST_F(FileUtilTest, CopyFileContentsWithSendfile) { // This test validates that sendfile(2) can be used to copy a file contents // and that it will honor the file offsets as CopyFileContents does. FilePath file_name_from = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("copy_contents_file_in.txt")); FilePath file_name_to = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("copy_contents_file_out.txt")); const std::wstring from_contents(L"0123456789ABCDEF"); CreateTextFile(file_name_from, from_contents); ASSERT_TRUE(PathExists(file_name_from)); const std::wstring to_contents(L"GHIJKL"); CreateTextFile(file_name_to, to_contents); ASSERT_TRUE(PathExists(file_name_to)); File from(file_name_from, File::FLAG_OPEN | File::FLAG_READ); ASSERT_TRUE(from.IsValid()); File to(file_name_to, File::FLAG_OPEN | File::FLAG_WRITE); ASSERT_TRUE(to.IsValid()); // See to the 1st byte in each file. ASSERT_EQ(from.Seek(File::Whence::FROM_BEGIN, 1), 1); ASSERT_EQ(to.Seek(File::Whence::FROM_BEGIN, 1), 1); bool retry_slow = false; // Given the test setup there should never be a sendfile(2) failure. ASSERT_TRUE(internal::CopyFileContentsWithSendfile(from, to, retry_slow)); from.Close(); to.Close(); // Expect the output file contents to be: G123456789ABCDEF because both // file positions when we copied the file contents were at 1. EXPECT_EQ(L"G123456789ABCDEF", ReadTextFile(file_name_to)); } TEST_F(FileUtilTest, CopyFileContentsWithSendfileEmpty) { FilePath file_name_from = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("copy_contents_file_in.txt")); FilePath file_name_to = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("copy_contents_file_out.txt")); const std::wstring from_contents(L""); CreateTextFile(file_name_from, from_contents); ASSERT_TRUE(PathExists(file_name_from)); const std::wstring to_contents(L""); CreateTextFile(file_name_to, to_contents); ASSERT_TRUE(PathExists(file_name_to)); File from(file_name_from, File::FLAG_OPEN | File::FLAG_READ); ASSERT_TRUE(from.IsValid()); File to(file_name_to, File::FLAG_OPEN | File::FLAG_WRITE); ASSERT_TRUE(to.IsValid()); bool retry_slow = false; ASSERT_FALSE(internal::CopyFileContentsWithSendfile(from, to, retry_slow)); ASSERT_TRUE(retry_slow); from.Close(); to.Close(); EXPECT_EQ(L"", ReadTextFile(file_name_to)); } TEST_F(FileUtilTest, CopyFileContentsWithSendfilePipe) { FilePath file_name_to = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("copy_contents_file_out.txt")); File to(file_name_to, File::FLAG_OPEN | File::FLAG_WRITE | File::FLAG_CREATE_ALWAYS); ASSERT_TRUE(to.IsValid()); // This test validates that CopyFileContentsWithSendfile fails with a pipe and // retry_slow is set. int fd[2]; ASSERT_EQ(pipe2(fd, O_CLOEXEC), 0); // For good measure write some data into the pipe. const char* buf = "hello world"; ASSERT_EQ(write(fd[1], buf, sizeof(buf)), static_cast(sizeof(buf))); // fd[0] refers to the read end of the pipe. bool retry_slow = false; base::PlatformFile pipe_read_end(fd[0]); base::File pipe_read(pipe_read_end); ASSERT_FALSE( internal::CopyFileContentsWithSendfile(pipe_read, to, retry_slow)); ASSERT_TRUE(retry_slow); } TEST_F(FileUtilTest, CopyFileContentsWithSendfileSocket) { // This test validates that CopyFileContentsWithSendfile fails with a socket // and retry_slow is set. int sock[2]; ASSERT_EQ(socketpair(AF_UNIX, SOCK_STREAM, 0, sock), 0); FilePath file_name_from = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("copy_contents_file_in.txt")); FilePath file_name_to = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("copy_contents_file_out.txt")); const std::wstring from_contents(L"0123456789ABCDEF"); CreateTextFile(file_name_from, from_contents); ASSERT_TRUE(PathExists(file_name_from)); File from(file_name_from, File::FLAG_OPEN | File::FLAG_READ); ASSERT_TRUE(from.IsValid()); base::PlatformFile to_file(sock[0]); base::File to_sock(to_file); // Copying from a file to a socket will work. bool retry_slow = false; ASSERT_TRUE( internal::CopyFileContentsWithSendfile(from, to_sock, retry_slow)); // But copying for a socket to a file will not. base::PlatformFile from_sock_file(sock[1]); base::File from_sock(from_sock_file); File to(file_name_to, File::FLAG_OPEN | File::FLAG_WRITE | File::FLAG_CREATE_ALWAYS); ASSERT_TRUE(to.IsValid()); ASSERT_FALSE( internal::CopyFileContentsWithSendfile(from_sock, to, retry_slow)); ASSERT_TRUE(retry_slow); } TEST_F(FileUtilTest, CopyFileContentsWithSendfileSeqFile) { // This test verifies the special case where we have a regular file with zero // length that might actually have contents (such as a seq_file). for (auto* const file : {"/proc/meminfo", "/proc/self/cmdline", "/proc/self/environ", "/proc/self/auxv"}) { FilePath proc_file_from(file); File from(proc_file_from, File::FLAG_OPEN | File::FLAG_READ); ASSERT_TRUE(from.IsValid()) << "could not open " << file; FilePath file_name_to = temp_dir_.GetPath().Append( FILE_PATH_LITERAL("copy_contents_file_out.txt")); File to(file_name_to, File::FLAG_OPEN | File::FLAG_WRITE | File::FLAG_CREATE_ALWAYS); ASSERT_TRUE(to.IsValid()); bool retry_slow = false; ASSERT_FALSE(internal::CopyFileContentsWithSendfile(from, to, retry_slow)) << proc_file_from << " should have failed"; ASSERT_TRUE(retry_slow) << "retry slow for " << proc_file_from << " should be set"; // Now let's make sure we can copy it the "slow" way. ASSERT_TRUE(base::CopyFileContents(from, to)); ASSERT_GT(to.GetLength(), 0); ASSERT_TRUE(base::DeleteFile(file_name_to)); } } #endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || // BUILDFLAG(IS_ANDROID) } // namespace } // namespace base