blob: b9a42e17d9e6c0e793af854ad0fccb7a68ce832c [file] [log] [blame]
// Copyright 2025 The Dawn & Tint Authors
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are met:
//
// 1. Redistributions of source code must retain the above copyright notice, this
// list of conditions and the following disclaimer.
//
// 2. Redistributions in binary form must reproduce the above copyright notice,
// this list of conditions and the following disclaimer in the documentation
// and/or other materials provided with the distribution.
//
// 3. Neither the name of the copyright holder nor the names of its
// contributors may be used to endorse or promote products derived from
// this software without specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
// AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
// DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
// FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
// DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
// SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
// CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
// OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
package oswrapper_test
import (
"os"
"path/filepath"
"testing"
"dawn.googlesource.com/dawn/tools/src/oswrapper"
"github.com/stretchr/testify/require"
)
// Tests for the MkdirAll() function in FSTestOSWrapper.
// NOTE: There are two types of tests in this file, those suffixed with _MatchesReal and those that
// are not. Those that are suffixed are meant to be testing the behaviour of the FSTestOSWrapper
// against the RealOSWrapper to confirm that it is a drop in replacement. Those that are not
// suffixed are traditional unittests that test the implementation functions in isolation against
// defined expectations.
func TestFSTestOSWrapper_MkdirAll(t *testing.T) {
root := getTestRoot()
tests := []struct {
name string
setup unittestSetup
path string
mode os.FileMode
expectedMode os.FileMode
verify func(t *testing.T, fs oswrapper.FSTestOSWrapper)
expectedError
}{
{
name: "Create new nested directory",
path: filepath.Join(root, "a", "b", "c"),
mode: 0755,
expectedMode: 0755,
verify: func(t *testing.T, fs oswrapper.FSTestOSWrapper) {
for _, p := range []string{
filepath.Join(root, "a"),
filepath.Join(root, "a", "b"),
filepath.Join(root, "a", "b", "c"),
} {
info, err := fs.Stat(p)
require.NoError(t, err)
require.True(t, info.IsDir())
file, ok := fs.FS[fs.CleanPath(p)]
require.True(t, ok)
require.Equal(t, os.FileMode(0755), file.Mode.Perm())
}
},
},
{
name: "Create in existing subdirectory",
path: filepath.Join(root, "a", "b"),
mode: 0755,
expectedMode: 0755,
setup: unittestSetup{
initialDirs: []string{filepath.Join(root, "a")},
},
verify: func(t *testing.T, fs oswrapper.FSTestOSWrapper) {
info, err := fs.Stat(filepath.Join(root, "a", "b"))
require.NoError(t, err)
require.True(t, info.IsDir())
},
},
{
name: "Create new nested directory with specific mode",
path: filepath.Join(root, "d", "e", "f"),
mode: 0700,
expectedMode: 0700,
verify: func(t *testing.T, fs oswrapper.FSTestOSWrapper) {
for _, p := range []string{
filepath.Join(root, "d"),
filepath.Join(root, "d", "e"),
filepath.Join(root, "d", "e", "f"),
} {
info, err := fs.Stat(p)
require.NoError(t, err)
require.True(t, info.IsDir())
file, ok := fs.FS[fs.CleanPath(p)]
require.True(t, ok)
require.Equal(t, os.FileMode(0700), file.Mode.Perm())
}
},
},
{
name: "Path already exists as directory",
path: filepath.Join(root, "a", "b"),
setup: unittestSetup{
initialDirs: []string{filepath.Join(root, "a", "b")},
},
},
{
name: "Part of path is a file",
path: filepath.Join(root, "a", "b", "c"),
setup: unittestSetup{
initialFiles: map[string]string{filepath.Join(root, "a", "b"): "i am a file"},
initialDirs: []string{filepath.Join(root, "a")},
},
expectedError: expectedError{
wantErrMsg: "not a directory",
},
},
{
name: "Destination path is a file",
path: filepath.Join(root, "a", "b"),
setup: unittestSetup{
initialFiles: map[string]string{filepath.Join(root, "a", "b"): "i am a file"},
initialDirs: []string{filepath.Join(root, "a")},
},
expectedError: expectedError{
wantErrIs: os.ErrExist,
},
},
{
name: "Create nested directory through symlink",
path: filepath.Join(root, "link_to_dir", "a", "b"),
mode: 0755,
setup: unittestSetup{
initialDirs: []string{filepath.Join(root, "real_dir")},
initialSymlinks: map[string]string{filepath.Join(root, "link_to_dir"): filepath.Join(root, "real_dir")},
},
verify: func(t *testing.T, fs oswrapper.FSTestOSWrapper) {
// Verify it exists in the real location
info, err := fs.Stat(filepath.Join(root, "real_dir", "a", "b"))
require.NoError(t, err)
require.True(t, info.IsDir())
},
},
{
name: "Part of path is a broken symlink",
path: filepath.Join(root, "broken_link", "a"),
setup: unittestSetup{
initialSymlinks: map[string]string{filepath.Join(root, "broken_link"): filepath.Join(root, "nonexistent")},
},
expectedError: expectedError{
wantErrIs: os.ErrExist, // MkdirAll returns EEXIST because the broken link exists as a file/link
},
},
{
name: "Symlink loop in path",
path: filepath.Join(root, "loop1", "a"),
setup: unittestSetup{
initialSymlinks: map[string]string{
filepath.Join(root, "loop1"): filepath.Join(root, "loop2"),
filepath.Join(root, "loop2"): filepath.Join(root, "loop1"),
},
},
expectedError: expectedError{
wantErrIs: os.ErrExist, // MkdirAll recurses on ELOOP and hits EEXIST on the loop link itself
},
},
}
for _, tc := range tests {
t.Run(tc.name, func(t *testing.T) {
wrapper := tc.setup.setup(t)
err := wrapper.MkdirAll(tc.path, tc.mode)
if tc.expectedError.Check(t, err) {
return
}
if tc.verify != nil {
tc.verify(t, wrapper)
}
if tc.expectedMode != 0 {
cleanedPath := wrapper.CleanPath(tc.path)
file, ok := wrapper.FS[cleanedPath]
require.True(t, ok, "file %v not found in test fs", cleanedPath)
require.Equal(t, tc.expectedMode, file.Mode.Perm())
}
})
}
}
func TestFSTestOSWrapper_MkdirAll_MatchesReal(t *testing.T) {
tests := []struct {
name string
setup matchesRealSetup
path string // path to MkdirAll
}{
{
name: "Create new nested directory",
path: filepath.Join("a", "b", "c"),
},
{
name: "Create in existing subdirectory",
setup: matchesRealSetup{unittestSetup{
initialDirs: []string{"a"},
}},
path: filepath.Join("a", "b"),
},
{
name: "Path already exists as directory",
setup: matchesRealSetup{unittestSetup{
initialDirs: []string{filepath.Join("a", "b", "c")},
}},
path: filepath.Join("a", "b", "c"),
},
{
name: "Part of path is a file",
setup: matchesRealSetup{unittestSetup{
initialFiles: map[string]string{filepath.Join("a", "b"): "i am a file"},
initialDirs: []string{"a"},
}},
path: filepath.Join("a", "b", "c"),
},
{
name: "Destination is a file",
setup: matchesRealSetup{unittestSetup{
initialFiles: map[string]string{filepath.Join("a", "b"): "i am a file"},
initialDirs: []string{"a"},
}},
path: filepath.Join("a", "b"),
},
{
name: "Create nested directory through symlink",
setup: matchesRealSetup{unittestSetup{
initialDirs: []string{"real_dir"},
initialSymlinks: map[string]string{"link_to_dir": "real_dir"},
}},
path: filepath.Join("link_to_dir", "a", "b"),
},
{
name: "Part of path is a broken symlink",
setup: matchesRealSetup{unittestSetup{
initialSymlinks: map[string]string{"broken_link": "nonexistent"},
}},
path: filepath.Join("broken_link", "a"),
},
{
name: "Symlink loop in path",
setup: matchesRealSetup{unittestSetup{
initialSymlinks: map[string]string{
"loop1": "loop2",
"loop2": "loop1",
},
}},
path: filepath.Join("loop1", "a"),
},
}
for _, tc := range tests {
t.Run(tc.name, func(t *testing.T) {
realRoot, realFS, testFS := tc.setup.setup(t)
defer os.RemoveAll(realRoot)
// Execute
realErr := realFS.MkdirAll(filepath.Join(realRoot, tc.path), 0755)
testErr := testFS.MkdirAll(tc.path, 0755)
requireErrorsMatch(t, realErr, testErr)
if realErr == nil {
requireFileSystemsMatch(t, realRoot, testFS)
}
})
}
}