blob: ef92111cec70ced091b45ccba251682d74ad7d42 [file] [log] [blame]
Jonas Devliegherefc514902018-10-10 13:27:25 +00001//===- unittests/Support/VirtualFileSystem.cpp -------------- VFS tests ---===//
Ben Langmuirc8130a72014-02-20 21:59:23 +00002//
Chandler Carruth2946cd72019-01-19 08:50:56 +00003// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
Ben Langmuirc8130a72014-02-20 21:59:23 +00006//
7//===----------------------------------------------------------------------===//
8
Jonas Devliegherefc514902018-10-10 13:27:25 +00009#include "llvm/Support/VirtualFileSystem.h"
Bruno Cardoso Lopesf6a0a722016-05-12 19:13:07 +000010#include "llvm/ADT/Triple.h"
Nico Weberd637c052018-04-30 13:52:15 +000011#include "llvm/Config/llvm-config.h"
Rafael Espindola71de0b62014-06-13 17:20:50 +000012#include "llvm/Support/Errc.h"
Bruno Cardoso Lopesf6a0a722016-05-12 19:13:07 +000013#include "llvm/Support/Host.h"
Ben Langmuird51ba0b2014-02-21 23:39:37 +000014#include "llvm/Support/MemoryBuffer.h"
Simon Marchiddbabc62018-08-06 21:48:20 +000015#include "llvm/Support/Path.h"
Ben Langmuird51ba0b2014-02-21 23:39:37 +000016#include "llvm/Support/SourceMgr.h"
Ilya Biryukovd5554c512018-09-04 14:15:53 +000017#include "gmock/gmock.h"
Ben Langmuirc8130a72014-02-20 21:59:23 +000018#include "gtest/gtest.h"
19#include <map>
Ilya Biryukovd5554c512018-09-04 14:15:53 +000020#include <string>
Hans Wennborgdcfba332015-10-06 23:40:43 +000021
Ben Langmuirc8130a72014-02-20 21:59:23 +000022using namespace llvm;
23using llvm::sys::fs::UniqueID;
Sam McCall39223772018-10-01 16:07:03 +000024using testing::ElementsAre;
25using testing::Pair;
26using testing::UnorderedElementsAre;
Ben Langmuirc8130a72014-02-20 21:59:23 +000027
28namespace {
Ben Langmuirf13302e2015-12-10 23:41:39 +000029struct DummyFile : public vfs::File {
30 vfs::Status S;
31 explicit DummyFile(vfs::Status S) : S(S) {}
32 llvm::ErrorOr<vfs::Status> status() override { return S; }
33 llvm::ErrorOr<std::unique_ptr<llvm::MemoryBuffer>>
34 getBuffer(const Twine &Name, int64_t FileSize, bool RequiresNullTerminator,
35 bool IsVolatile) override {
36 llvm_unreachable("unimplemented");
37 }
Eugene Zelenko1660a5d2016-01-26 19:01:06 +000038 std::error_code close() override { return std::error_code(); }
Ben Langmuirf13302e2015-12-10 23:41:39 +000039};
40
Ben Langmuirc8130a72014-02-20 21:59:23 +000041class DummyFileSystem : public vfs::FileSystem {
42 int FSID; // used to produce UniqueIDs
43 int FileID; // used to produce UniqueIDs
Jonas Devlieghere21703542019-10-15 23:08:57 +000044 std::string WorkingDirectory;
Ben Langmuirc8130a72014-02-20 21:59:23 +000045 std::map<std::string, vfs::Status> FilesAndDirs;
Jonas Devlieghere21703542019-10-15 23:08:57 +000046 typedef std::map<std::string, vfs::Status>::const_iterator const_iterator;
Ben Langmuirc8130a72014-02-20 21:59:23 +000047
48 static int getNextFSID() {
49 static int Count = 0;
50 return Count++;
51 }
52
53public:
54 DummyFileSystem() : FSID(getNextFSID()), FileID(0) {}
55
Fariborz Jahanian5afc8692014-10-01 16:56:40 +000056 ErrorOr<vfs::Status> status(const Twine &Path) override {
Jonas Devlieghere21703542019-10-15 23:08:57 +000057 auto I = findEntry(Path);
Ben Langmuirc8130a72014-02-20 21:59:23 +000058 if (I == FilesAndDirs.end())
Rafael Espindola71de0b62014-06-13 17:20:50 +000059 return make_error_code(llvm::errc::no_such_file_or_directory);
Ben Langmuirc8130a72014-02-20 21:59:23 +000060 return I->second;
61 }
Benjamin Kramera8857962014-10-26 22:44:13 +000062 ErrorOr<std::unique_ptr<vfs::File>>
63 openFileForRead(const Twine &Path) override {
Ben Langmuirf13302e2015-12-10 23:41:39 +000064 auto S = status(Path);
65 if (S)
66 return std::unique_ptr<vfs::File>(new DummyFile{*S});
67 return S.getError();
Ben Langmuirc8130a72014-02-20 21:59:23 +000068 }
Benjamin Kramer7708b2a2015-10-05 13:55:20 +000069 llvm::ErrorOr<std::string> getCurrentWorkingDirectory() const override {
Jonas Devlieghere21703542019-10-15 23:08:57 +000070 return WorkingDirectory;
Benjamin Kramer7708b2a2015-10-05 13:55:20 +000071 }
72 std::error_code setCurrentWorkingDirectory(const Twine &Path) override {
Jonas Devlieghere21703542019-10-15 23:08:57 +000073 WorkingDirectory = Path.str();
Benjamin Kramer7708b2a2015-10-05 13:55:20 +000074 return std::error_code();
75 }
Eric Liua840a462018-05-18 13:22:49 +000076 // Map any symlink to "/symlink".
Sam McCall99538e82018-11-09 15:11:34 +000077 std::error_code getRealPath(const Twine &Path,
78 SmallVectorImpl<char> &Output) const override {
Jonas Devlieghere21703542019-10-15 23:08:57 +000079 auto I = findEntry(Path);
Eric Liua840a462018-05-18 13:22:49 +000080 if (I == FilesAndDirs.end())
81 return make_error_code(llvm::errc::no_such_file_or_directory);
82 if (I->second.isSymlink()) {
83 Output.clear();
84 Twine("/symlink").toVector(Output);
85 return std::error_code();
86 }
87 Output.clear();
88 Path.toVector(Output);
89 return std::error_code();
90 }
Ben Langmuirc8130a72014-02-20 21:59:23 +000091
Jonas Devliegherefc514902018-10-10 13:27:25 +000092 struct DirIterImpl : public llvm::vfs::detail::DirIterImpl {
Ben Langmuir740812b2014-06-24 19:37:16 +000093 std::map<std::string, vfs::Status> &FilesAndDirs;
94 std::map<std::string, vfs::Status>::iterator I;
95 std::string Path;
Ben Langmuir7c9f6c82014-06-25 20:25:40 +000096 bool isInPath(StringRef S) {
97 if (Path.size() < S.size() && S.find(Path) == 0) {
98 auto LastSep = S.find_last_of('/');
Jonas Devliegherefc514902018-10-10 13:27:25 +000099 if (LastSep == Path.size() || LastSep == Path.size() - 1)
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000100 return true;
101 }
102 return false;
103 }
Ben Langmuir740812b2014-06-24 19:37:16 +0000104 DirIterImpl(std::map<std::string, vfs::Status> &FilesAndDirs,
105 const Twine &_Path)
106 : FilesAndDirs(FilesAndDirs), I(FilesAndDirs.begin()),
107 Path(_Path.str()) {
Jonas Devliegherefc514902018-10-10 13:27:25 +0000108 for (; I != FilesAndDirs.end(); ++I) {
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000109 if (isInPath(I->first)) {
Benjamin Krameradcd0262020-01-28 20:23:46 +0100110 CurrentEntry = vfs::directory_entry(std::string(I->second.getName()),
111 I->second.getType());
Ben Langmuir740812b2014-06-24 19:37:16 +0000112 break;
113 }
114 }
115 }
116 std::error_code increment() override {
117 ++I;
Jonas Devliegherefc514902018-10-10 13:27:25 +0000118 for (; I != FilesAndDirs.end(); ++I) {
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000119 if (isInPath(I->first)) {
Benjamin Krameradcd0262020-01-28 20:23:46 +0100120 CurrentEntry = vfs::directory_entry(std::string(I->second.getName()),
121 I->second.getType());
Ben Langmuir740812b2014-06-24 19:37:16 +0000122 break;
123 }
124 }
125 if (I == FilesAndDirs.end())
Sam McCall0ae00562018-09-14 12:47:38 +0000126 CurrentEntry = vfs::directory_entry();
Ben Langmuir740812b2014-06-24 19:37:16 +0000127 return std::error_code();
128 }
129 };
130
131 vfs::directory_iterator dir_begin(const Twine &Dir,
132 std::error_code &EC) override {
133 return vfs::directory_iterator(
134 std::make_shared<DirIterImpl>(FilesAndDirs, Dir));
135 }
136
Ben Langmuirc8130a72014-02-20 21:59:23 +0000137 void addEntry(StringRef Path, const vfs::Status &Status) {
Benjamin Krameradcd0262020-01-28 20:23:46 +0100138 FilesAndDirs[std::string(Path)] = Status;
Ben Langmuirc8130a72014-02-20 21:59:23 +0000139 }
140
Jonas Devlieghere21703542019-10-15 23:08:57 +0000141 const_iterator findEntry(const Twine &Path) const {
142 SmallString<128> P;
143 Path.toVector(P);
144 std::error_code EC = makeAbsolute(P);
145 assert(!EC);
David L. Jonesa3378062019-10-16 00:52:00 +0000146 (void)EC;
Benjamin Krameradcd0262020-01-28 20:23:46 +0100147 return FilesAndDirs.find(std::string(P.str()));
Jonas Devlieghere21703542019-10-15 23:08:57 +0000148 }
149
Ben Langmuird51ba0b2014-02-21 23:39:37 +0000150 void addRegularFile(StringRef Path, sys::fs::perms Perms = sys::fs::all_all) {
Pavel Labathac71c8e2016-11-09 10:52:22 +0000151 vfs::Status S(Path, UniqueID(FSID, FileID++),
152 std::chrono::system_clock::now(), 0, 0, 1024,
153 sys::fs::file_type::regular_file, Perms);
Ben Langmuirc8130a72014-02-20 21:59:23 +0000154 addEntry(Path, S);
155 }
156
Ben Langmuird51ba0b2014-02-21 23:39:37 +0000157 void addDirectory(StringRef Path, sys::fs::perms Perms = sys::fs::all_all) {
Pavel Labathac71c8e2016-11-09 10:52:22 +0000158 vfs::Status S(Path, UniqueID(FSID, FileID++),
159 std::chrono::system_clock::now(), 0, 0, 0,
160 sys::fs::file_type::directory_file, Perms);
Ben Langmuirc8130a72014-02-20 21:59:23 +0000161 addEntry(Path, S);
162 }
163
164 void addSymlink(StringRef Path) {
Pavel Labathac71c8e2016-11-09 10:52:22 +0000165 vfs::Status S(Path, UniqueID(FSID, FileID++),
166 std::chrono::system_clock::now(), 0, 0, 0,
167 sys::fs::file_type::symlink_file, sys::fs::all_all);
Ben Langmuirc8130a72014-02-20 21:59:23 +0000168 addEntry(Path, S);
169 }
170};
Simon Marchiddbabc62018-08-06 21:48:20 +0000171
Jonas Devlieghere21703542019-10-15 23:08:57 +0000172class ErrorDummyFileSystem : public DummyFileSystem {
173 std::error_code setCurrentWorkingDirectory(const Twine &Path) override {
174 return llvm::errc::no_such_file_or_directory;
175 }
176};
177
Simon Marchiddbabc62018-08-06 21:48:20 +0000178/// Replace back-slashes by front-slashes.
179std::string getPosixPath(std::string S) {
180 SmallString<128> Result;
181 llvm::sys::path::native(S, Result, llvm::sys::path::Style::posix);
Benjamin Krameradcd0262020-01-28 20:23:46 +0100182 return std::string(Result.str());
Craig Topper576ac052018-08-08 22:31:14 +0000183}
Ben Langmuirc8130a72014-02-20 21:59:23 +0000184} // end anonymous namespace
185
Ben Langmuird51ba0b2014-02-21 23:39:37 +0000186TEST(VirtualFileSystemTest, StatusQueries) {
Ben Langmuirc8130a72014-02-20 21:59:23 +0000187 IntrusiveRefCntPtr<DummyFileSystem> D(new DummyFileSystem());
Rafael Espindola8e650d72014-06-12 20:37:59 +0000188 ErrorOr<vfs::Status> Status((std::error_code()));
Ben Langmuirc8130a72014-02-20 21:59:23 +0000189
190 D->addRegularFile("/foo");
191 Status = D->status("/foo");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000192 ASSERT_FALSE(Status.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000193 EXPECT_TRUE(Status->isStatusKnown());
194 EXPECT_FALSE(Status->isDirectory());
195 EXPECT_TRUE(Status->isRegularFile());
196 EXPECT_FALSE(Status->isSymlink());
197 EXPECT_FALSE(Status->isOther());
198 EXPECT_TRUE(Status->exists());
199
200 D->addDirectory("/bar");
201 Status = D->status("/bar");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000202 ASSERT_FALSE(Status.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000203 EXPECT_TRUE(Status->isStatusKnown());
204 EXPECT_TRUE(Status->isDirectory());
205 EXPECT_FALSE(Status->isRegularFile());
206 EXPECT_FALSE(Status->isSymlink());
207 EXPECT_FALSE(Status->isOther());
208 EXPECT_TRUE(Status->exists());
209
210 D->addSymlink("/baz");
211 Status = D->status("/baz");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000212 ASSERT_FALSE(Status.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000213 EXPECT_TRUE(Status->isStatusKnown());
214 EXPECT_FALSE(Status->isDirectory());
215 EXPECT_FALSE(Status->isRegularFile());
216 EXPECT_TRUE(Status->isSymlink());
217 EXPECT_FALSE(Status->isOther());
218 EXPECT_TRUE(Status->exists());
219
220 EXPECT_TRUE(Status->equivalent(*Status));
221 ErrorOr<vfs::Status> Status2 = D->status("/foo");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000222 ASSERT_FALSE(Status2.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000223 EXPECT_FALSE(Status->equivalent(*Status2));
224}
225
Ben Langmuird51ba0b2014-02-21 23:39:37 +0000226TEST(VirtualFileSystemTest, BaseOnlyOverlay) {
Ben Langmuirc8130a72014-02-20 21:59:23 +0000227 IntrusiveRefCntPtr<DummyFileSystem> D(new DummyFileSystem());
Rafael Espindola8e650d72014-06-12 20:37:59 +0000228 ErrorOr<vfs::Status> Status((std::error_code()));
Ben Langmuirc8130a72014-02-20 21:59:23 +0000229 EXPECT_FALSE(Status = D->status("/foo"));
230
231 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(new vfs::OverlayFileSystem(D));
232 EXPECT_FALSE(Status = O->status("/foo"));
233
234 D->addRegularFile("/foo");
235 Status = D->status("/foo");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000236 EXPECT_FALSE(Status.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000237
Rafael Espindola8e650d72014-06-12 20:37:59 +0000238 ErrorOr<vfs::Status> Status2((std::error_code()));
Ben Langmuirc8130a72014-02-20 21:59:23 +0000239 Status2 = O->status("/foo");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000240 EXPECT_FALSE(Status2.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000241 EXPECT_TRUE(Status->equivalent(*Status2));
242}
243
Eric Liua840a462018-05-18 13:22:49 +0000244TEST(VirtualFileSystemTest, GetRealPathInOverlay) {
245 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
246 Lower->addRegularFile("/foo");
247 Lower->addSymlink("/lower_link");
248 IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
249
250 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
251 new vfs::OverlayFileSystem(Lower));
252 O->pushOverlay(Upper);
253
254 // Regular file.
255 SmallString<16> RealPath;
256 EXPECT_FALSE(O->getRealPath("/foo", RealPath));
257 EXPECT_EQ(RealPath.str(), "/foo");
258
259 // Expect no error getting real path for symlink in lower overlay.
260 EXPECT_FALSE(O->getRealPath("/lower_link", RealPath));
261 EXPECT_EQ(RealPath.str(), "/symlink");
262
263 // Try a non-existing link.
264 EXPECT_EQ(O->getRealPath("/upper_link", RealPath),
265 errc::no_such_file_or_directory);
266
267 // Add a new symlink in upper.
268 Upper->addSymlink("/upper_link");
269 EXPECT_FALSE(O->getRealPath("/upper_link", RealPath));
270 EXPECT_EQ(RealPath.str(), "/symlink");
271}
272
Ben Langmuird51ba0b2014-02-21 23:39:37 +0000273TEST(VirtualFileSystemTest, OverlayFiles) {
Ben Langmuirc8130a72014-02-20 21:59:23 +0000274 IntrusiveRefCntPtr<DummyFileSystem> Base(new DummyFileSystem());
275 IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
276 IntrusiveRefCntPtr<DummyFileSystem> Top(new DummyFileSystem());
Ben Langmuird51ba0b2014-02-21 23:39:37 +0000277 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
278 new vfs::OverlayFileSystem(Base));
Ben Langmuirc8130a72014-02-20 21:59:23 +0000279 O->pushOverlay(Middle);
280 O->pushOverlay(Top);
281
Rafael Espindola8e650d72014-06-12 20:37:59 +0000282 ErrorOr<vfs::Status> Status1((std::error_code())),
283 Status2((std::error_code())), Status3((std::error_code())),
284 StatusB((std::error_code())), StatusM((std::error_code())),
285 StatusT((std::error_code()));
Ben Langmuirc8130a72014-02-20 21:59:23 +0000286
287 Base->addRegularFile("/foo");
288 StatusB = Base->status("/foo");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000289 ASSERT_FALSE(StatusB.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000290 Status1 = O->status("/foo");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000291 ASSERT_FALSE(Status1.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000292 Middle->addRegularFile("/foo");
293 StatusM = Middle->status("/foo");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000294 ASSERT_FALSE(StatusM.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000295 Status2 = O->status("/foo");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000296 ASSERT_FALSE(Status2.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000297 Top->addRegularFile("/foo");
298 StatusT = Top->status("/foo");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000299 ASSERT_FALSE(StatusT.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000300 Status3 = O->status("/foo");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000301 ASSERT_FALSE(Status3.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000302
303 EXPECT_TRUE(Status1->equivalent(*StatusB));
304 EXPECT_TRUE(Status2->equivalent(*StatusM));
305 EXPECT_TRUE(Status3->equivalent(*StatusT));
306
307 EXPECT_FALSE(Status1->equivalent(*Status2));
308 EXPECT_FALSE(Status2->equivalent(*Status3));
309 EXPECT_FALSE(Status1->equivalent(*Status3));
310}
311
Ben Langmuird51ba0b2014-02-21 23:39:37 +0000312TEST(VirtualFileSystemTest, OverlayDirsNonMerged) {
Ben Langmuirc8130a72014-02-20 21:59:23 +0000313 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
314 IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
Ben Langmuird51ba0b2014-02-21 23:39:37 +0000315 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
316 new vfs::OverlayFileSystem(Lower));
Ben Langmuirc8130a72014-02-20 21:59:23 +0000317 O->pushOverlay(Upper);
318
319 Lower->addDirectory("/lower-only");
320 Upper->addDirectory("/upper-only");
321
322 // non-merged paths should be the same
323 ErrorOr<vfs::Status> Status1 = Lower->status("/lower-only");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000324 ASSERT_FALSE(Status1.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000325 ErrorOr<vfs::Status> Status2 = O->status("/lower-only");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000326 ASSERT_FALSE(Status2.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000327 EXPECT_TRUE(Status1->equivalent(*Status2));
328
329 Status1 = Upper->status("/upper-only");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000330 ASSERT_FALSE(Status1.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000331 Status2 = O->status("/upper-only");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000332 ASSERT_FALSE(Status2.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000333 EXPECT_TRUE(Status1->equivalent(*Status2));
334}
335
Ben Langmuird51ba0b2014-02-21 23:39:37 +0000336TEST(VirtualFileSystemTest, MergedDirPermissions) {
Ben Langmuirc8130a72014-02-20 21:59:23 +0000337 // merged directories get the permissions of the upper dir
338 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
339 IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
Ben Langmuird51ba0b2014-02-21 23:39:37 +0000340 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
341 new vfs::OverlayFileSystem(Lower));
Ben Langmuirc8130a72014-02-20 21:59:23 +0000342 O->pushOverlay(Upper);
343
Rafael Espindola8e650d72014-06-12 20:37:59 +0000344 ErrorOr<vfs::Status> Status((std::error_code()));
Ben Langmuirc8130a72014-02-20 21:59:23 +0000345 Lower->addDirectory("/both", sys::fs::owner_read);
346 Upper->addDirectory("/both", sys::fs::owner_all | sys::fs::group_read);
347 Status = O->status("/both");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000348 ASSERT_FALSE(Status.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000349 EXPECT_EQ(0740, Status->getPermissions());
350
351 // permissions (as usual) are not recursively applied
352 Lower->addRegularFile("/both/foo", sys::fs::owner_read);
353 Upper->addRegularFile("/both/bar", sys::fs::owner_write);
354 Status = O->status("/both/foo");
Jonas Devliegherefc514902018-10-10 13:27:25 +0000355 ASSERT_FALSE(Status.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000356 EXPECT_EQ(0400, Status->getPermissions());
357 Status = O->status("/both/bar");
Rafael Espindola3ae06202014-05-31 03:20:52 +0000358 ASSERT_FALSE(Status.getError());
Ben Langmuirc8130a72014-02-20 21:59:23 +0000359 EXPECT_EQ(0200, Status->getPermissions());
360}
Ben Langmuird51ba0b2014-02-21 23:39:37 +0000361
Jonas Devlieghereefe21082019-07-03 00:45:53 +0000362TEST(VirtualFileSystemTest, OverlayIterator) {
363 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
364 Lower->addRegularFile("/foo");
365 IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
366
367 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
368 new vfs::OverlayFileSystem(Lower));
369 O->pushOverlay(Upper);
370
371 ErrorOr<vfs::Status> Status((std::error_code()));
372 {
373 auto it = O->overlays_begin();
374 auto end = O->overlays_end();
375
376 EXPECT_NE(it, end);
377
378 Status = (*it)->status("/foo");
379 ASSERT_TRUE(Status.getError());
380
381 it++;
382 EXPECT_NE(it, end);
383
384 Status = (*it)->status("/foo");
385 ASSERT_FALSE(Status.getError());
386 EXPECT_TRUE(Status->exists());
387
388 it++;
389 EXPECT_EQ(it, end);
390 }
391
392 {
393 auto it = O->overlays_rbegin();
394 auto end = O->overlays_rend();
395
396 EXPECT_NE(it, end);
397
398 Status = (*it)->status("/foo");
399 ASSERT_FALSE(Status.getError());
400 EXPECT_TRUE(Status->exists());
401
402 it++;
403 EXPECT_NE(it, end);
404
405 Status = (*it)->status("/foo");
406 ASSERT_TRUE(Status.getError());
407
408 it++;
409 EXPECT_EQ(it, end);
410 }
411}
412
Ben Langmuir740812b2014-06-24 19:37:16 +0000413namespace {
414struct ScopedDir {
415 SmallString<128> Path;
Jonas Devliegherefc514902018-10-10 13:27:25 +0000416 ScopedDir(const Twine &Name, bool Unique = false) {
Ben Langmuir740812b2014-06-24 19:37:16 +0000417 std::error_code EC;
418 if (Unique) {
Jonas Devliegherefc514902018-10-10 13:27:25 +0000419 EC = llvm::sys::fs::createUniqueDirectory(Name, Path);
Sam McCall15e475e2019-02-14 12:57:01 +0000420 if (!EC) {
421 // Resolve any symlinks in the new directory.
Benjamin Krameradcd0262020-01-28 20:23:46 +0100422 std::string UnresolvedPath = std::string(Path.str());
Sam McCall15e475e2019-02-14 12:57:01 +0000423 EC = llvm::sys::fs::real_path(UnresolvedPath, Path);
424 }
Ben Langmuir740812b2014-06-24 19:37:16 +0000425 } else {
426 Path = Name.str();
427 EC = llvm::sys::fs::create_directory(Twine(Path));
428 }
429 if (EC)
430 Path = "";
Sam McCall15e475e2019-02-14 12:57:01 +0000431 EXPECT_FALSE(EC) << EC.message();
Ben Langmuir740812b2014-06-24 19:37:16 +0000432 }
433 ~ScopedDir() {
Galina Kistanova45fbb592017-06-15 21:01:24 +0000434 if (Path != "") {
Ben Langmuir740812b2014-06-24 19:37:16 +0000435 EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
Galina Kistanova45fbb592017-06-15 21:01:24 +0000436 }
Ben Langmuir740812b2014-06-24 19:37:16 +0000437 }
438 operator StringRef() { return Path.str(); }
439};
Juergen Ributzkaf9787432017-03-14 00:14:40 +0000440
441struct ScopedLink {
442 SmallString<128> Path;
443 ScopedLink(const Twine &To, const Twine &From) {
444 Path = From.str();
445 std::error_code EC = sys::fs::create_link(To, From);
446 if (EC)
447 Path = "";
448 EXPECT_FALSE(EC);
449 }
450 ~ScopedLink() {
Galina Kistanova45fbb592017-06-15 21:01:24 +0000451 if (Path != "") {
Juergen Ributzkaf9787432017-03-14 00:14:40 +0000452 EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
Galina Kistanova45fbb592017-06-15 21:01:24 +0000453 }
Juergen Ributzkaf9787432017-03-14 00:14:40 +0000454 }
455 operator StringRef() { return Path.str(); }
456};
Sam McCall15e475e2019-02-14 12:57:01 +0000457
458struct ScopedFile {
459 SmallString<128> Path;
460 ScopedFile(const Twine &Path, StringRef Contents) {
461 Path.toVector(this->Path);
462 std::error_code EC;
463 raw_fd_ostream OS(this->Path, EC);
464 EXPECT_FALSE(EC);
465 OS << Contents;
466 OS.flush();
467 EXPECT_FALSE(OS.error());
468 if (EC || OS.error())
469 this->Path = "";
470 }
471 ~ScopedFile() {
Bill Wendling191f1482019-04-13 21:39:28 +0000472 if (Path != "") {
Sam McCall15e475e2019-02-14 12:57:01 +0000473 EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
Bill Wendling191f1482019-04-13 21:39:28 +0000474 }
Sam McCall15e475e2019-02-14 12:57:01 +0000475 }
476};
Hans Wennborgdcfba332015-10-06 23:40:43 +0000477} // end anonymous namespace
Ben Langmuir740812b2014-06-24 19:37:16 +0000478
479TEST(VirtualFileSystemTest, BasicRealFSIteration) {
Jonas Devliegherefc514902018-10-10 13:27:25 +0000480 ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
Ben Langmuir740812b2014-06-24 19:37:16 +0000481 IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
482
483 std::error_code EC;
484 vfs::directory_iterator I = FS->dir_begin(Twine(TestDirectory), EC);
485 ASSERT_FALSE(EC);
486 EXPECT_EQ(vfs::directory_iterator(), I); // empty directory is empty
487
Jonas Devliegherefc514902018-10-10 13:27:25 +0000488 ScopedDir _a(TestDirectory + "/a");
489 ScopedDir _ab(TestDirectory + "/a/b");
490 ScopedDir _c(TestDirectory + "/c");
491 ScopedDir _cd(TestDirectory + "/c/d");
Ben Langmuir740812b2014-06-24 19:37:16 +0000492
493 I = FS->dir_begin(Twine(TestDirectory), EC);
494 ASSERT_FALSE(EC);
495 ASSERT_NE(vfs::directory_iterator(), I);
Ben Langmuirefb8b602014-06-24 21:08:13 +0000496 // Check either a or c, since we can't rely on the iteration order.
Sam McCall0ae00562018-09-14 12:47:38 +0000497 EXPECT_TRUE(I->path().endswith("a") || I->path().endswith("c"));
Ben Langmuir740812b2014-06-24 19:37:16 +0000498 I.increment(EC);
499 ASSERT_FALSE(EC);
500 ASSERT_NE(vfs::directory_iterator(), I);
Sam McCall0ae00562018-09-14 12:47:38 +0000501 EXPECT_TRUE(I->path().endswith("a") || I->path().endswith("c"));
Ben Langmuir740812b2014-06-24 19:37:16 +0000502 I.increment(EC);
503 EXPECT_EQ(vfs::directory_iterator(), I);
504}
505
Sam McCall62ab1a12019-01-14 17:51:10 +0000506#ifdef LLVM_ON_UNIX
Sam McCall15e475e2019-02-14 12:57:01 +0000507TEST(VirtualFileSystemTest, MultipleWorkingDirs) {
508 // Our root contains a/aa, b/bb, c, where c is a link to a/.
509 // Run tests both in root/b/ and root/c/ (to test "normal" and symlink dirs).
510 // Interleave operations to show the working directories are independent.
511 ScopedDir Root("r", true), ADir(Root.Path + "/a"), BDir(Root.Path + "/b");
512 ScopedLink C(ADir.Path, Root.Path + "/c");
513 ScopedFile AA(ADir.Path + "/aa", "aaaa"), BB(BDir.Path + "/bb", "bbbb");
514 std::unique_ptr<vfs::FileSystem> BFS = vfs::createPhysicalFileSystem(),
515 CFS = vfs::createPhysicalFileSystem();
516
517 ASSERT_FALSE(BFS->setCurrentWorkingDirectory(BDir.Path));
518 ASSERT_FALSE(CFS->setCurrentWorkingDirectory(C.Path));
519 EXPECT_EQ(BDir.Path, *BFS->getCurrentWorkingDirectory());
520 EXPECT_EQ(C.Path, *CFS->getCurrentWorkingDirectory());
521
522 // openFileForRead(), indirectly.
523 auto BBuf = BFS->getBufferForFile("bb");
524 ASSERT_TRUE(BBuf);
525 EXPECT_EQ("bbbb", (*BBuf)->getBuffer());
526
527 auto ABuf = CFS->getBufferForFile("aa");
528 ASSERT_TRUE(ABuf);
529 EXPECT_EQ("aaaa", (*ABuf)->getBuffer());
530
531 // status()
532 auto BStat = BFS->status("bb");
533 ASSERT_TRUE(BStat);
534 EXPECT_EQ("bb", BStat->getName());
535
536 auto AStat = CFS->status("aa");
537 ASSERT_TRUE(AStat);
538 EXPECT_EQ("aa", AStat->getName()); // unresolved name
539
540 // getRealPath()
541 SmallString<128> BPath;
542 ASSERT_FALSE(BFS->getRealPath("bb", BPath));
543 EXPECT_EQ(BB.Path, BPath);
544
545 SmallString<128> APath;
546 ASSERT_FALSE(CFS->getRealPath("aa", APath));
547 EXPECT_EQ(AA.Path, APath); // Reports resolved name.
548
549 // dir_begin
550 std::error_code EC;
551 auto BIt = BFS->dir_begin(".", EC);
552 ASSERT_FALSE(EC);
553 ASSERT_NE(BIt, vfs::directory_iterator());
554 EXPECT_EQ((BDir.Path + "/./bb").str(), BIt->path());
555 BIt.increment(EC);
556 ASSERT_FALSE(EC);
557 ASSERT_EQ(BIt, vfs::directory_iterator());
558
559 auto CIt = CFS->dir_begin(".", EC);
560 ASSERT_FALSE(EC);
561 ASSERT_NE(CIt, vfs::directory_iterator());
562 EXPECT_EQ((ADir.Path + "/./aa").str(), CIt->path()); // Partly resolved name!
563 CIt.increment(EC); // Because likely to read through this path.
564 ASSERT_FALSE(EC);
565 ASSERT_EQ(CIt, vfs::directory_iterator());
566}
567
Juergen Ributzkaf9787432017-03-14 00:14:40 +0000568TEST(VirtualFileSystemTest, BrokenSymlinkRealFSIteration) {
569 ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
570 IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
571
572 ScopedLink _a("no_such_file", TestDirectory + "/a");
573 ScopedDir _b(TestDirectory + "/b");
574 ScopedLink _c("no_such_file", TestDirectory + "/c");
575
Sam McCall39223772018-10-01 16:07:03 +0000576 // Should get no iteration error, but a stat error for the broken symlinks.
577 std::map<std::string, std::error_code> StatResults;
Juergen Ributzkaf9787432017-03-14 00:14:40 +0000578 std::error_code EC;
579 for (vfs::directory_iterator I = FS->dir_begin(Twine(TestDirectory), EC), E;
580 I != E; I.increment(EC)) {
Sam McCall39223772018-10-01 16:07:03 +0000581 EXPECT_FALSE(EC);
Benjamin Krameradcd0262020-01-28 20:23:46 +0100582 StatResults[std::string(sys::path::filename(I->path()))] =
Sam McCall39223772018-10-01 16:07:03 +0000583 FS->status(I->path()).getError();
Juergen Ributzkaf9787432017-03-14 00:14:40 +0000584 }
Sam McCall39223772018-10-01 16:07:03 +0000585 EXPECT_THAT(
586 StatResults,
587 ElementsAre(
588 Pair("a", std::make_error_code(std::errc::no_such_file_or_directory)),
589 Pair("b", std::error_code()),
590 Pair("c",
591 std::make_error_code(std::errc::no_such_file_or_directory))));
Juergen Ributzkaf9787432017-03-14 00:14:40 +0000592}
593#endif
594
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000595TEST(VirtualFileSystemTest, BasicRealFSRecursiveIteration) {
Jonas Devliegherefc514902018-10-10 13:27:25 +0000596 ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000597 IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
598
599 std::error_code EC;
600 auto I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
601 ASSERT_FALSE(EC);
602 EXPECT_EQ(vfs::recursive_directory_iterator(), I); // empty directory is empty
603
Jonas Devliegherefc514902018-10-10 13:27:25 +0000604 ScopedDir _a(TestDirectory + "/a");
605 ScopedDir _ab(TestDirectory + "/a/b");
606 ScopedDir _c(TestDirectory + "/c");
607 ScopedDir _cd(TestDirectory + "/c/d");
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000608
609 I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
610 ASSERT_FALSE(EC);
611 ASSERT_NE(vfs::recursive_directory_iterator(), I);
612
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000613 std::vector<std::string> Contents;
614 for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
615 I.increment(EC)) {
Benjamin Krameradcd0262020-01-28 20:23:46 +0100616 Contents.push_back(std::string(I->path()));
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000617 }
618
619 // Check contents, which may be in any order
620 EXPECT_EQ(4U, Contents.size());
Jonas Devliegherefc514902018-10-10 13:27:25 +0000621 int Counts[4] = {0, 0, 0, 0};
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000622 for (const std::string &Name : Contents) {
623 ASSERT_FALSE(Name.empty());
Jonas Devliegherefc514902018-10-10 13:27:25 +0000624 int Index = Name[Name.size() - 1] - 'a';
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000625 ASSERT_TRUE(Index >= 0 && Index < 4);
626 Counts[Index]++;
627 }
628 EXPECT_EQ(1, Counts[0]); // a
629 EXPECT_EQ(1, Counts[1]); // b
630 EXPECT_EQ(1, Counts[2]); // c
631 EXPECT_EQ(1, Counts[3]); // d
632}
633
Jonas Devlieghere41fb9512018-10-31 23:36:10 +0000634TEST(VirtualFileSystemTest, BasicRealFSRecursiveIterationNoPush) {
635 ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
636
637 ScopedDir _a(TestDirectory + "/a");
638 ScopedDir _ab(TestDirectory + "/a/b");
639 ScopedDir _c(TestDirectory + "/c");
640 ScopedDir _cd(TestDirectory + "/c/d");
641 ScopedDir _e(TestDirectory + "/e");
642 ScopedDir _ef(TestDirectory + "/e/f");
643 ScopedDir _g(TestDirectory + "/g");
644
645 IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
646
647 // Test that calling no_push on entries without subdirectories has no effect.
648 {
649 std::error_code EC;
650 auto I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
651 ASSERT_FALSE(EC);
652
653 std::vector<std::string> Contents;
654 for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
655 I.increment(EC)) {
Benjamin Krameradcd0262020-01-28 20:23:46 +0100656 Contents.push_back(std::string(I->path()));
Jonas Devlieghere41fb9512018-10-31 23:36:10 +0000657 char last = I->path().back();
658 switch (last) {
659 case 'b':
660 case 'd':
661 case 'f':
662 case 'g':
663 I.no_push();
664 break;
665 default:
666 break;
667 }
668 }
669 EXPECT_EQ(7U, Contents.size());
670 }
671
672 // Test that calling no_push skips subdirectories.
673 {
674 std::error_code EC;
675 auto I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
676 ASSERT_FALSE(EC);
677
678 std::vector<std::string> Contents;
679 for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
680 I.increment(EC)) {
Benjamin Krameradcd0262020-01-28 20:23:46 +0100681 Contents.push_back(std::string(I->path()));
Jonas Devlieghere41fb9512018-10-31 23:36:10 +0000682 char last = I->path().back();
683 switch (last) {
684 case 'a':
685 case 'c':
686 case 'e':
687 I.no_push();
688 break;
689 default:
690 break;
691 }
692 }
693
694 // Check contents, which may be in any order
695 EXPECT_EQ(4U, Contents.size());
696 int Counts[7] = {0, 0, 0, 0, 0, 0, 0};
697 for (const std::string &Name : Contents) {
698 ASSERT_FALSE(Name.empty());
699 int Index = Name[Name.size() - 1] - 'a';
700 ASSERT_TRUE(Index >= 0 && Index < 7);
701 Counts[Index]++;
702 }
703 EXPECT_EQ(1, Counts[0]); // a
704 EXPECT_EQ(0, Counts[1]); // b
705 EXPECT_EQ(1, Counts[2]); // c
706 EXPECT_EQ(0, Counts[3]); // d
707 EXPECT_EQ(1, Counts[4]); // e
708 EXPECT_EQ(0, Counts[5]); // f
709 EXPECT_EQ(1, Counts[6]); // g
710 }
711}
712
Juergen Ributzkaf9787432017-03-14 00:14:40 +0000713#ifdef LLVM_ON_UNIX
714TEST(VirtualFileSystemTest, BrokenSymlinkRealFSRecursiveIteration) {
715 ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
716 IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
717
718 ScopedLink _a("no_such_file", TestDirectory + "/a");
719 ScopedDir _b(TestDirectory + "/b");
720 ScopedLink _ba("no_such_file", TestDirectory + "/b/a");
721 ScopedDir _bb(TestDirectory + "/b/b");
722 ScopedLink _bc("no_such_file", TestDirectory + "/b/c");
723 ScopedLink _c("no_such_file", TestDirectory + "/c");
724 ScopedDir _d(TestDirectory + "/d");
725 ScopedDir _dd(TestDirectory + "/d/d");
726 ScopedDir _ddd(TestDirectory + "/d/d/d");
727 ScopedLink _e("no_such_file", TestDirectory + "/e");
Juergen Ributzkaf9787432017-03-14 00:14:40 +0000728
Max Moroze0975672018-04-04 19:47:25 +0000729 std::vector<std::string> VisitedBrokenSymlinks;
730 std::vector<std::string> VisitedNonBrokenSymlinks;
Juergen Ributzkaf9787432017-03-14 00:14:40 +0000731 std::error_code EC;
732 for (vfs::recursive_directory_iterator I(*FS, Twine(TestDirectory), EC), E;
733 I != E; I.increment(EC)) {
Sam McCall39223772018-10-01 16:07:03 +0000734 EXPECT_FALSE(EC);
735 (FS->status(I->path()) ? VisitedNonBrokenSymlinks : VisitedBrokenSymlinks)
Benjamin Krameradcd0262020-01-28 20:23:46 +0100736 .push_back(std::string(I->path()));
Juergen Ributzkaf9787432017-03-14 00:14:40 +0000737 }
738
Max Moroze0975672018-04-04 19:47:25 +0000739 // Check visited file names.
Sam McCall39223772018-10-01 16:07:03 +0000740 EXPECT_THAT(VisitedBrokenSymlinks,
Benjamin Krameradcd0262020-01-28 20:23:46 +0100741 UnorderedElementsAre(StringRef(_a).str(), StringRef(_ba).str(),
742 StringRef(_bc).str(), StringRef(_c).str(),
743 StringRef(_e).str()));
Sam McCall39223772018-10-01 16:07:03 +0000744 EXPECT_THAT(VisitedNonBrokenSymlinks,
Benjamin Krameradcd0262020-01-28 20:23:46 +0100745 UnorderedElementsAre(StringRef(_b).str(), StringRef(_bb).str(),
746 StringRef(_d).str(), StringRef(_dd).str(),
747 StringRef(_ddd).str()));
Juergen Ributzkaf9787432017-03-14 00:14:40 +0000748}
749#endif
750
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000751template <typename DirIter>
Bruno Cardoso Lopes29ebd492016-05-11 20:58:47 +0000752static void checkContents(DirIter I, ArrayRef<StringRef> ExpectedOut) {
Ben Langmuir740812b2014-06-24 19:37:16 +0000753 std::error_code EC;
Bruno Cardoso Lopes29ebd492016-05-11 20:58:47 +0000754 SmallVector<StringRef, 4> Expected(ExpectedOut.begin(), ExpectedOut.end());
755 SmallVector<std::string, 4> InputToCheck;
Ben Langmuir740812b2014-06-24 19:37:16 +0000756
Bruno Cardoso Lopes29ebd492016-05-11 20:58:47 +0000757 // Do not rely on iteration order to check for contents, sort both
758 // content vectors before comparison.
759 for (DirIter E; !EC && I != E; I.increment(EC))
Benjamin Krameradcd0262020-01-28 20:23:46 +0100760 InputToCheck.push_back(std::string(I->path()));
Bruno Cardoso Lopes29ebd492016-05-11 20:58:47 +0000761
Fangrui Song55fab262018-09-26 22:16:28 +0000762 llvm::sort(InputToCheck);
763 llvm::sort(Expected);
Bruno Cardoso Lopes29ebd492016-05-11 20:58:47 +0000764 EXPECT_EQ(InputToCheck.size(), Expected.size());
765
766 unsigned LastElt = std::min(InputToCheck.size(), Expected.size());
767 for (unsigned Idx = 0; Idx != LastElt; ++Idx)
Bruno Cardoso Lopes2835c5c2016-05-12 19:13:04 +0000768 EXPECT_EQ(StringRef(InputToCheck[Idx]), Expected[Idx]);
Ben Langmuir740812b2014-06-24 19:37:16 +0000769}
770
771TEST(VirtualFileSystemTest, OverlayIteration) {
772 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
773 IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
774 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
775 new vfs::OverlayFileSystem(Lower));
776 O->pushOverlay(Upper);
777
778 std::error_code EC;
NAKAMURA Takumi4669bd42014-06-25 04:34:10 +0000779 checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>());
Ben Langmuir740812b2014-06-24 19:37:16 +0000780
781 Lower->addRegularFile("/file1");
NAKAMURA Takumi4669bd42014-06-25 04:34:10 +0000782 checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>("/file1"));
Ben Langmuir740812b2014-06-24 19:37:16 +0000783
784 Upper->addRegularFile("/file2");
Benjamin Kramer2a23e552016-01-10 10:45:19 +0000785 checkContents(O->dir_begin("/", EC), {"/file2", "/file1"});
Ben Langmuir740812b2014-06-24 19:37:16 +0000786
787 Lower->addDirectory("/dir1");
788 Lower->addRegularFile("/dir1/foo");
789 Upper->addDirectory("/dir2");
790 Upper->addRegularFile("/dir2/foo");
NAKAMURA Takumi4669bd42014-06-25 04:34:10 +0000791 checkContents(O->dir_begin("/dir2", EC), ArrayRef<StringRef>("/dir2/foo"));
Benjamin Kramer2a23e552016-01-10 10:45:19 +0000792 checkContents(O->dir_begin("/", EC), {"/dir2", "/file2", "/dir1", "/file1"});
Ben Langmuir740812b2014-06-24 19:37:16 +0000793}
794
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000795TEST(VirtualFileSystemTest, OverlayRecursiveIteration) {
796 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
797 IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
798 IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
799 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
800 new vfs::OverlayFileSystem(Lower));
801 O->pushOverlay(Middle);
802 O->pushOverlay(Upper);
803
804 std::error_code EC;
805 checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
806 ArrayRef<StringRef>());
807
808 Lower->addRegularFile("/file1");
809 checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
810 ArrayRef<StringRef>("/file1"));
811
812 Upper->addDirectory("/dir");
813 Upper->addRegularFile("/dir/file2");
Benjamin Kramer2a23e552016-01-10 10:45:19 +0000814 checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
815 {"/dir", "/dir/file2", "/file1"});
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000816
817 Lower->addDirectory("/dir1");
818 Lower->addRegularFile("/dir1/foo");
819 Lower->addDirectory("/dir1/a");
820 Lower->addRegularFile("/dir1/a/b");
821 Middle->addDirectory("/a");
822 Middle->addDirectory("/a/b");
823 Middle->addDirectory("/a/b/c");
824 Middle->addRegularFile("/a/b/c/d");
825 Middle->addRegularFile("/hiddenByUp");
826 Upper->addDirectory("/dir2");
827 Upper->addRegularFile("/dir2/foo");
828 Upper->addRegularFile("/hiddenByUp");
829 checkContents(vfs::recursive_directory_iterator(*O, "/dir2", EC),
830 ArrayRef<StringRef>("/dir2/foo"));
Benjamin Kramer2a23e552016-01-10 10:45:19 +0000831 checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
832 {"/dir", "/dir/file2", "/dir2", "/dir2/foo", "/hiddenByUp",
833 "/a", "/a/b", "/a/b/c", "/a/b/c/d", "/dir1", "/dir1/a",
834 "/dir1/a/b", "/dir1/foo", "/file1"});
Ben Langmuir7c9f6c82014-06-25 20:25:40 +0000835}
836
Ben Langmuir740812b2014-06-24 19:37:16 +0000837TEST(VirtualFileSystemTest, ThreeLevelIteration) {
838 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
839 IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
840 IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
841 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
842 new vfs::OverlayFileSystem(Lower));
843 O->pushOverlay(Middle);
844 O->pushOverlay(Upper);
845
846 std::error_code EC;
NAKAMURA Takumi4669bd42014-06-25 04:34:10 +0000847 checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>());
Ben Langmuir740812b2014-06-24 19:37:16 +0000848
849 Middle->addRegularFile("/file2");
NAKAMURA Takumi4669bd42014-06-25 04:34:10 +0000850 checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>("/file2"));
Ben Langmuir740812b2014-06-24 19:37:16 +0000851
852 Lower->addRegularFile("/file1");
853 Upper->addRegularFile("/file3");
Benjamin Kramer2a23e552016-01-10 10:45:19 +0000854 checkContents(O->dir_begin("/", EC), {"/file3", "/file2", "/file1"});
Ben Langmuir740812b2014-06-24 19:37:16 +0000855}
856
857TEST(VirtualFileSystemTest, HiddenInIteration) {
858 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
859 IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
860 IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
861 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
862 new vfs::OverlayFileSystem(Lower));
863 O->pushOverlay(Middle);
864 O->pushOverlay(Upper);
865
866 std::error_code EC;
Sam McCall0ae00562018-09-14 12:47:38 +0000867 Lower->addRegularFile("/onlyInLow");
868 Lower->addDirectory("/hiddenByMid");
869 Lower->addDirectory("/hiddenByUp");
870 Middle->addRegularFile("/onlyInMid");
871 Middle->addRegularFile("/hiddenByMid");
872 Middle->addDirectory("/hiddenByUp");
873 Upper->addRegularFile("/onlyInUp");
874 Upper->addRegularFile("/hiddenByUp");
Benjamin Kramer2a23e552016-01-10 10:45:19 +0000875 checkContents(
876 O->dir_begin("/", EC),
877 {"/hiddenByUp", "/onlyInUp", "/hiddenByMid", "/onlyInMid", "/onlyInLow"});
Ben Langmuir740812b2014-06-24 19:37:16 +0000878
879 // Make sure we get the top-most entry
Ben Langmuirefb8b602014-06-24 21:08:13 +0000880 {
881 std::error_code EC;
882 vfs::directory_iterator I = O->dir_begin("/", EC), E;
Jonas Devliegherefc514902018-10-10 13:27:25 +0000883 for (; !EC && I != E; I.increment(EC))
Sam McCall0ae00562018-09-14 12:47:38 +0000884 if (I->path() == "/hiddenByUp")
Ben Langmuirefb8b602014-06-24 21:08:13 +0000885 break;
886 ASSERT_NE(E, I);
Sam McCall0ae00562018-09-14 12:47:38 +0000887 EXPECT_EQ(sys::fs::file_type::regular_file, I->type());
Ben Langmuirefb8b602014-06-24 21:08:13 +0000888 }
889 {
890 std::error_code EC;
891 vfs::directory_iterator I = O->dir_begin("/", EC), E;
Jonas Devliegherefc514902018-10-10 13:27:25 +0000892 for (; !EC && I != E; I.increment(EC))
Sam McCall0ae00562018-09-14 12:47:38 +0000893 if (I->path() == "/hiddenByMid")
Ben Langmuirefb8b602014-06-24 21:08:13 +0000894 break;
895 ASSERT_NE(E, I);
Sam McCall0ae00562018-09-14 12:47:38 +0000896 EXPECT_EQ(sys::fs::file_type::regular_file, I->type());
Ben Langmuirefb8b602014-06-24 21:08:13 +0000897 }
Ben Langmuir740812b2014-06-24 19:37:16 +0000898}
899
Michael J. Spencer937a1042018-12-17 22:30:05 +0000900TEST(ProxyFileSystemTest, Basic) {
901 IntrusiveRefCntPtr<vfs::InMemoryFileSystem> Base(
902 new vfs::InMemoryFileSystem());
903 vfs::ProxyFileSystem PFS(Base);
904
905 Base->addFile("/a", 0, MemoryBuffer::getMemBuffer("test"));
906
907 auto Stat = PFS.status("/a");
908 ASSERT_FALSE(Stat.getError());
909
910 auto File = PFS.openFileForRead("/a");
911 ASSERT_FALSE(File.getError());
912 EXPECT_EQ("test", (*(*File)->getBuffer("ignored"))->getBuffer());
913
914 std::error_code EC;
915 vfs::directory_iterator I = PFS.dir_begin("/", EC);
916 ASSERT_FALSE(EC);
917 ASSERT_EQ("/a", I->path());
918 I.increment(EC);
919 ASSERT_FALSE(EC);
920 ASSERT_EQ(vfs::directory_iterator(), I);
921
922 ASSERT_FALSE(PFS.setCurrentWorkingDirectory("/"));
923
924 auto PWD = PFS.getCurrentWorkingDirectory();
925 ASSERT_FALSE(PWD.getError());
926 ASSERT_EQ("/", *PWD);
927
928 SmallString<16> Path;
929 ASSERT_FALSE(PFS.getRealPath("a", Path));
930 ASSERT_EQ("/a", Path);
931
932 bool Local = true;
933 ASSERT_FALSE(PFS.isLocal("/a", Local));
Michael J. Spencer2a5a0ad2019-01-29 19:07:15 +0000934 EXPECT_FALSE(Local);
Michael J. Spencer937a1042018-12-17 22:30:05 +0000935}
936
Benjamin Kramera25dcfd2015-10-05 13:55:14 +0000937class InMemoryFileSystemTest : public ::testing::Test {
938protected:
Jonas Devliegherefc514902018-10-10 13:27:25 +0000939 llvm::vfs::InMemoryFileSystem FS;
940 llvm::vfs::InMemoryFileSystem NormalizedFS;
Benjamin Kramer71ce3762015-10-12 16:16:39 +0000941
942 InMemoryFileSystemTest()
943 : FS(/*UseNormalizedPaths=*/false),
944 NormalizedFS(/*UseNormalizedPaths=*/true) {}
Benjamin Kramera25dcfd2015-10-05 13:55:14 +0000945};
946
Ilya Biryukovd5554c512018-09-04 14:15:53 +0000947MATCHER_P2(IsHardLinkTo, FS, Target, "") {
948 StringRef From = arg;
949 StringRef To = Target;
950 auto OpenedFrom = FS->openFileForRead(From);
951 auto OpenedTo = FS->openFileForRead(To);
952 return !OpenedFrom.getError() && !OpenedTo.getError() &&
953 (*OpenedFrom)->status()->getUniqueID() ==
954 (*OpenedTo)->status()->getUniqueID();
955}
956
Benjamin Kramera25dcfd2015-10-05 13:55:14 +0000957TEST_F(InMemoryFileSystemTest, IsEmpty) {
958 auto Stat = FS.status("/a");
Jonas Devliegherefc514902018-10-10 13:27:25 +0000959 ASSERT_EQ(Stat.getError(), errc::no_such_file_or_directory) << FS.toString();
Benjamin Kramera25dcfd2015-10-05 13:55:14 +0000960 Stat = FS.status("/");
Rafael Espindolab7ab1872015-10-05 20:20:50 +0000961 ASSERT_EQ(Stat.getError(), errc::no_such_file_or_directory) << FS.toString();
Benjamin Kramera25dcfd2015-10-05 13:55:14 +0000962}
963
964TEST_F(InMemoryFileSystemTest, WindowsPath) {
965 FS.addFile("c:/windows/system128/foo.cpp", 0, MemoryBuffer::getMemBuffer(""));
966 auto Stat = FS.status("c:");
NAKAMURA Takumi4c33a1a2015-10-06 12:16:27 +0000967#if !defined(_WIN32)
Benjamin Kramera25dcfd2015-10-05 13:55:14 +0000968 ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
NAKAMURA Takumi4c33a1a2015-10-06 12:16:27 +0000969#endif
Benjamin Kramera25dcfd2015-10-05 13:55:14 +0000970 Stat = FS.status("c:/windows/system128/foo.cpp");
971 ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
972 FS.addFile("d:/windows/foo.cpp", 0, MemoryBuffer::getMemBuffer(""));
973 Stat = FS.status("d:/windows/foo.cpp");
974 ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
975}
976
977TEST_F(InMemoryFileSystemTest, OverlayFile) {
978 FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
Benjamin Kramer71ce3762015-10-12 16:16:39 +0000979 NormalizedFS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
Benjamin Kramera25dcfd2015-10-05 13:55:14 +0000980 auto Stat = FS.status("/");
981 ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
Benjamin Kramer71ce3762015-10-12 16:16:39 +0000982 Stat = FS.status("/.");
983 ASSERT_FALSE(Stat);
984 Stat = NormalizedFS.status("/.");
985 ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
Benjamin Kramera25dcfd2015-10-05 13:55:14 +0000986 Stat = FS.status("/a");
987 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
988 ASSERT_EQ("/a", Stat->getName());
989}
990
Benjamin Kramer2e2351a2015-10-06 10:04:08 +0000991TEST_F(InMemoryFileSystemTest, OverlayFileNoOwn) {
992 auto Buf = MemoryBuffer::getMemBuffer("a");
993 FS.addFileNoOwn("/a", 0, Buf.get());
994 auto Stat = FS.status("/a");
995 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
996 ASSERT_EQ("/a", Stat->getName());
997}
998
Benjamin Kramera25dcfd2015-10-05 13:55:14 +0000999TEST_F(InMemoryFileSystemTest, OpenFileForRead) {
1000 FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
Benjamin Kramer71ce3762015-10-12 16:16:39 +00001001 FS.addFile("././c", 0, MemoryBuffer::getMemBuffer("c"));
1002 FS.addFile("./d/../d", 0, MemoryBuffer::getMemBuffer("d"));
1003 NormalizedFS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
1004 NormalizedFS.addFile("././c", 0, MemoryBuffer::getMemBuffer("c"));
1005 NormalizedFS.addFile("./d/../d", 0, MemoryBuffer::getMemBuffer("d"));
Benjamin Kramera25dcfd2015-10-05 13:55:14 +00001006 auto File = FS.openFileForRead("/a");
1007 ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
1008 File = FS.openFileForRead("/a"); // Open again.
1009 ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
Benjamin Kramer71ce3762015-10-12 16:16:39 +00001010 File = NormalizedFS.openFileForRead("/././a"); // Open again.
1011 ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
Benjamin Kramera25dcfd2015-10-05 13:55:14 +00001012 File = FS.openFileForRead("/");
Rafael Espindolab7ab1872015-10-05 20:20:50 +00001013 ASSERT_EQ(File.getError(), errc::invalid_argument) << FS.toString();
Benjamin Kramera25dcfd2015-10-05 13:55:14 +00001014 File = FS.openFileForRead("/b");
Rafael Espindolab7ab1872015-10-05 20:20:50 +00001015 ASSERT_EQ(File.getError(), errc::no_such_file_or_directory) << FS.toString();
Benjamin Kramer71ce3762015-10-12 16:16:39 +00001016 File = FS.openFileForRead("./c");
1017 ASSERT_FALSE(File);
1018 File = FS.openFileForRead("e/../d");
1019 ASSERT_FALSE(File);
1020 File = NormalizedFS.openFileForRead("./c");
Benjamin Kramerd5e0b582015-10-07 08:32:50 +00001021 ASSERT_EQ("c", (*(*File)->getBuffer("ignored"))->getBuffer());
Benjamin Kramer71ce3762015-10-12 16:16:39 +00001022 File = NormalizedFS.openFileForRead("e/../d");
1023 ASSERT_EQ("d", (*(*File)->getBuffer("ignored"))->getBuffer());
1024}
1025
1026TEST_F(InMemoryFileSystemTest, DuplicatedFile) {
1027 ASSERT_TRUE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a")));
1028 ASSERT_FALSE(FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("a")));
1029 ASSERT_TRUE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a")));
1030 ASSERT_FALSE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("b")));
Benjamin Kramera25dcfd2015-10-05 13:55:14 +00001031}
1032
1033TEST_F(InMemoryFileSystemTest, DirectoryIteration) {
1034 FS.addFile("/a", 0, MemoryBuffer::getMemBuffer(""));
1035 FS.addFile("/b/c", 0, MemoryBuffer::getMemBuffer(""));
1036
1037 std::error_code EC;
1038 vfs::directory_iterator I = FS.dir_begin("/", EC);
1039 ASSERT_FALSE(EC);
Sam McCall0ae00562018-09-14 12:47:38 +00001040 ASSERT_EQ("/a", I->path());
Benjamin Kramera25dcfd2015-10-05 13:55:14 +00001041 I.increment(EC);
1042 ASSERT_FALSE(EC);
Sam McCall0ae00562018-09-14 12:47:38 +00001043 ASSERT_EQ("/b", I->path());
Benjamin Kramera25dcfd2015-10-05 13:55:14 +00001044 I.increment(EC);
1045 ASSERT_FALSE(EC);
1046 ASSERT_EQ(vfs::directory_iterator(), I);
1047
1048 I = FS.dir_begin("/b", EC);
1049 ASSERT_FALSE(EC);
Simon Marchiddbabc62018-08-06 21:48:20 +00001050 // When on Windows, we end up with "/b\\c" as the name. Convert to Posix
1051 // path for the sake of the comparison.
Benjamin Krameradcd0262020-01-28 20:23:46 +01001052 ASSERT_EQ("/b/c", getPosixPath(std::string(I->path())));
Benjamin Kramera25dcfd2015-10-05 13:55:14 +00001053 I.increment(EC);
1054 ASSERT_FALSE(EC);
1055 ASSERT_EQ(vfs::directory_iterator(), I);
1056}
1057
Benjamin Kramer1b8dbe32015-10-06 14:45:16 +00001058TEST_F(InMemoryFileSystemTest, WorkingDirectory) {
1059 FS.setCurrentWorkingDirectory("/b");
1060 FS.addFile("c", 0, MemoryBuffer::getMemBuffer(""));
1061
1062 auto Stat = FS.status("/b/c");
1063 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
Simon Marchiddbabc62018-08-06 21:48:20 +00001064 ASSERT_EQ("/b/c", Stat->getName());
Benjamin Kramer1b8dbe32015-10-06 14:45:16 +00001065 ASSERT_EQ("/b", *FS.getCurrentWorkingDirectory());
1066
1067 Stat = FS.status("c");
1068 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
Benjamin Kramere9e76072016-01-09 16:33:16 +00001069
1070 NormalizedFS.setCurrentWorkingDirectory("/b/c");
1071 NormalizedFS.setCurrentWorkingDirectory(".");
Simon Marchiddbabc62018-08-06 21:48:20 +00001072 ASSERT_EQ("/b/c",
1073 getPosixPath(NormalizedFS.getCurrentWorkingDirectory().get()));
Benjamin Kramere9e76072016-01-09 16:33:16 +00001074 NormalizedFS.setCurrentWorkingDirectory("..");
Simon Marchiddbabc62018-08-06 21:48:20 +00001075 ASSERT_EQ("/b",
1076 getPosixPath(NormalizedFS.getCurrentWorkingDirectory().get()));
Benjamin Kramer1b8dbe32015-10-06 14:45:16 +00001077}
1078
Jonas Devliegherecbb5c862018-11-08 00:01:32 +00001079TEST_F(InMemoryFileSystemTest, IsLocal) {
1080 FS.setCurrentWorkingDirectory("/b");
1081 FS.addFile("c", 0, MemoryBuffer::getMemBuffer(""));
1082
1083 std::error_code EC;
1084 bool IsLocal = true;
1085 EC = FS.isLocal("c", IsLocal);
1086 ASSERT_FALSE(EC);
1087 ASSERT_FALSE(IsLocal);
1088}
1089
Eric Liu43cb4512018-05-24 13:52:48 +00001090#if !defined(_WIN32)
Eric Liu33dd6192018-05-24 11:17:00 +00001091TEST_F(InMemoryFileSystemTest, GetRealPath) {
1092 SmallString<16> Path;
1093 EXPECT_EQ(FS.getRealPath("b", Path), errc::operation_not_permitted);
1094
1095 auto GetRealPath = [this](StringRef P) {
1096 SmallString<16> Output;
1097 auto EC = FS.getRealPath(P, Output);
1098 EXPECT_FALSE(EC);
1099 return Output.str().str();
1100 };
1101
1102 FS.setCurrentWorkingDirectory("a");
1103 EXPECT_EQ(GetRealPath("b"), "a/b");
1104 EXPECT_EQ(GetRealPath("../b"), "b");
1105 EXPECT_EQ(GetRealPath("b/./c"), "a/b/c");
1106
1107 FS.setCurrentWorkingDirectory("/a");
1108 EXPECT_EQ(GetRealPath("b"), "/a/b");
1109 EXPECT_EQ(GetRealPath("../b"), "/b");
1110 EXPECT_EQ(GetRealPath("b/./c"), "/a/b/c");
1111}
Eric Liu43cb4512018-05-24 13:52:48 +00001112#endif // _WIN32
Eric Liu33dd6192018-05-24 11:17:00 +00001113
Ben Hamiltone5af5bd2017-11-09 16:01:16 +00001114TEST_F(InMemoryFileSystemTest, AddFileWithUser) {
1115 FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), 0xFEEDFACE);
1116 auto Stat = FS.status("/a");
1117 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1118 ASSERT_TRUE(Stat->isDirectory());
1119 ASSERT_EQ(0xFEEDFACE, Stat->getUser());
1120 Stat = FS.status("/a/b");
1121 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1122 ASSERT_TRUE(Stat->isDirectory());
1123 ASSERT_EQ(0xFEEDFACE, Stat->getUser());
1124 Stat = FS.status("/a/b/c");
1125 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1126 ASSERT_TRUE(Stat->isRegularFile());
1127 ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
1128 ASSERT_EQ(0xFEEDFACE, Stat->getUser());
1129}
1130
1131TEST_F(InMemoryFileSystemTest, AddFileWithGroup) {
1132 FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, 0xDABBAD00);
1133 auto Stat = FS.status("/a");
1134 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1135 ASSERT_TRUE(Stat->isDirectory());
1136 ASSERT_EQ(0xDABBAD00, Stat->getGroup());
1137 Stat = FS.status("/a/b");
1138 ASSERT_TRUE(Stat->isDirectory());
1139 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1140 ASSERT_EQ(0xDABBAD00, Stat->getGroup());
1141 Stat = FS.status("/a/b/c");
1142 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1143 ASSERT_TRUE(Stat->isRegularFile());
1144 ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
1145 ASSERT_EQ(0xDABBAD00, Stat->getGroup());
1146}
1147
1148TEST_F(InMemoryFileSystemTest, AddFileWithFileType) {
1149 FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, None,
1150 sys::fs::file_type::socket_file);
1151 auto Stat = FS.status("/a");
1152 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1153 ASSERT_TRUE(Stat->isDirectory());
1154 Stat = FS.status("/a/b");
1155 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1156 ASSERT_TRUE(Stat->isDirectory());
1157 Stat = FS.status("/a/b/c");
1158 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1159 ASSERT_EQ(sys::fs::file_type::socket_file, Stat->getType());
1160 ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
1161}
1162
1163TEST_F(InMemoryFileSystemTest, AddFileWithPerms) {
Jonas Devliegherefc514902018-10-10 13:27:25 +00001164 FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, None, None,
1165 sys::fs::perms::owner_read | sys::fs::perms::owner_write);
Ben Hamiltone5af5bd2017-11-09 16:01:16 +00001166 auto Stat = FS.status("/a");
1167 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1168 ASSERT_TRUE(Stat->isDirectory());
1169 ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write |
Jonas Devliegherefc514902018-10-10 13:27:25 +00001170 sys::fs::perms::owner_exe,
1171 Stat->getPermissions());
Ben Hamiltone5af5bd2017-11-09 16:01:16 +00001172 Stat = FS.status("/a/b");
1173 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1174 ASSERT_TRUE(Stat->isDirectory());
1175 ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write |
Jonas Devliegherefc514902018-10-10 13:27:25 +00001176 sys::fs::perms::owner_exe,
1177 Stat->getPermissions());
Ben Hamiltone5af5bd2017-11-09 16:01:16 +00001178 Stat = FS.status("/a/b/c");
1179 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1180 ASSERT_TRUE(Stat->isRegularFile());
1181 ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write,
1182 Stat->getPermissions());
1183}
1184
Ben Hamilton78381012017-11-16 19:34:08 +00001185TEST_F(InMemoryFileSystemTest, AddDirectoryThenAddChild) {
1186 FS.addFile("/a", 0, MemoryBuffer::getMemBuffer(""), /*User=*/None,
1187 /*Group=*/None, sys::fs::file_type::directory_file);
1188 FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("abc"), /*User=*/None,
1189 /*Group=*/None, sys::fs::file_type::regular_file);
1190 auto Stat = FS.status("/a");
1191 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1192 ASSERT_TRUE(Stat->isDirectory());
1193 Stat = FS.status("/a/b");
1194 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
1195 ASSERT_TRUE(Stat->isRegularFile());
1196}
1197
Simon Marchiddbabc62018-08-06 21:48:20 +00001198// Test that the name returned by status() is in the same form as the path that
1199// was requested (to match the behavior of RealFileSystem).
1200TEST_F(InMemoryFileSystemTest, StatusName) {
1201 NormalizedFS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"),
1202 /*User=*/None,
1203 /*Group=*/None, sys::fs::file_type::regular_file);
1204 NormalizedFS.setCurrentWorkingDirectory("/a/b");
1205
1206 // Access using InMemoryFileSystem::status.
1207 auto Stat = NormalizedFS.status("../b/c");
1208 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n"
1209 << NormalizedFS.toString();
1210 ASSERT_TRUE(Stat->isRegularFile());
1211 ASSERT_EQ("../b/c", Stat->getName());
1212
1213 // Access using InMemoryFileAdaptor::status.
1214 auto File = NormalizedFS.openFileForRead("../b/c");
1215 ASSERT_FALSE(File.getError()) << File.getError() << "\n"
1216 << NormalizedFS.toString();
1217 Stat = (*File)->status();
1218 ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n"
1219 << NormalizedFS.toString();
1220 ASSERT_TRUE(Stat->isRegularFile());
1221 ASSERT_EQ("../b/c", Stat->getName());
1222
1223 // Access using a directory iterator.
1224 std::error_code EC;
Jonas Devliegherefc514902018-10-10 13:27:25 +00001225 llvm::vfs::directory_iterator It = NormalizedFS.dir_begin("../b", EC);
Simon Marchiddbabc62018-08-06 21:48:20 +00001226 // When on Windows, we end up with "../b\\c" as the name. Convert to Posix
1227 // path for the sake of the comparison.
Benjamin Krameradcd0262020-01-28 20:23:46 +01001228 ASSERT_EQ("../b/c", getPosixPath(std::string(It->path())));
Simon Marchiddbabc62018-08-06 21:48:20 +00001229}
1230
Ilya Biryukovd5554c512018-09-04 14:15:53 +00001231TEST_F(InMemoryFileSystemTest, AddHardLinkToFile) {
1232 StringRef FromLink = "/path/to/FROM/link";
1233 StringRef Target = "/path/to/TO/file";
1234 FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target"));
1235 EXPECT_TRUE(FS.addHardLink(FromLink, Target));
1236 EXPECT_THAT(FromLink, IsHardLinkTo(&FS, Target));
1237 EXPECT_TRUE(FS.status(FromLink)->getSize() == FS.status(Target)->getSize());
1238 EXPECT_TRUE(FS.getBufferForFile(FromLink)->get()->getBuffer() ==
1239 FS.getBufferForFile(Target)->get()->getBuffer());
1240}
1241
1242TEST_F(InMemoryFileSystemTest, AddHardLinkInChainPattern) {
1243 StringRef Link0 = "/path/to/0/link";
1244 StringRef Link1 = "/path/to/1/link";
1245 StringRef Link2 = "/path/to/2/link";
1246 StringRef Target = "/path/to/target";
1247 FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target file"));
1248 EXPECT_TRUE(FS.addHardLink(Link2, Target));
1249 EXPECT_TRUE(FS.addHardLink(Link1, Link2));
1250 EXPECT_TRUE(FS.addHardLink(Link0, Link1));
1251 EXPECT_THAT(Link0, IsHardLinkTo(&FS, Target));
1252 EXPECT_THAT(Link1, IsHardLinkTo(&FS, Target));
1253 EXPECT_THAT(Link2, IsHardLinkTo(&FS, Target));
1254}
1255
1256TEST_F(InMemoryFileSystemTest, AddHardLinkToAFileThatWasNotAddedBefore) {
1257 EXPECT_FALSE(FS.addHardLink("/path/to/link", "/path/to/target"));
1258}
1259
1260TEST_F(InMemoryFileSystemTest, AddHardLinkFromAFileThatWasAddedBefore) {
1261 StringRef Link = "/path/to/link";
1262 StringRef Target = "/path/to/target";
1263 FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target"));
1264 FS.addFile(Link, 0, MemoryBuffer::getMemBuffer("content of link"));
1265 EXPECT_FALSE(FS.addHardLink(Link, Target));
1266}
1267
1268TEST_F(InMemoryFileSystemTest, AddSameHardLinkMoreThanOnce) {
1269 StringRef Link = "/path/to/link";
1270 StringRef Target = "/path/to/target";
1271 FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target"));
1272 EXPECT_TRUE(FS.addHardLink(Link, Target));
1273 EXPECT_FALSE(FS.addHardLink(Link, Target));
1274}
1275
1276TEST_F(InMemoryFileSystemTest, AddFileInPlaceOfAHardLinkWithSameContent) {
1277 StringRef Link = "/path/to/link";
1278 StringRef Target = "/path/to/target";
1279 StringRef Content = "content of target";
1280 EXPECT_TRUE(FS.addFile(Target, 0, MemoryBuffer::getMemBuffer(Content)));
1281 EXPECT_TRUE(FS.addHardLink(Link, Target));
1282 EXPECT_TRUE(FS.addFile(Link, 0, MemoryBuffer::getMemBuffer(Content)));
1283}
1284
1285TEST_F(InMemoryFileSystemTest, AddFileInPlaceOfAHardLinkWithDifferentContent) {
1286 StringRef Link = "/path/to/link";
1287 StringRef Target = "/path/to/target";
1288 StringRef Content = "content of target";
1289 StringRef LinkContent = "different content of link";
1290 EXPECT_TRUE(FS.addFile(Target, 0, MemoryBuffer::getMemBuffer(Content)));
1291 EXPECT_TRUE(FS.addHardLink(Link, Target));
1292 EXPECT_FALSE(FS.addFile(Link, 0, MemoryBuffer::getMemBuffer(LinkContent)));
1293}
1294
1295TEST_F(InMemoryFileSystemTest, AddHardLinkToADirectory) {
1296 StringRef Dir = "path/to/dummy/dir";
1297 StringRef Link = "/path/to/link";
1298 StringRef File = "path/to/dummy/dir/target";
1299 StringRef Content = "content of target";
1300 EXPECT_TRUE(FS.addFile(File, 0, MemoryBuffer::getMemBuffer(Content)));
1301 EXPECT_FALSE(FS.addHardLink(Link, Dir));
1302}
1303
1304TEST_F(InMemoryFileSystemTest, AddHardLinkFromADirectory) {
1305 StringRef Dir = "path/to/dummy/dir";
1306 StringRef Target = "path/to/dummy/dir/target";
1307 StringRef Content = "content of target";
1308 EXPECT_TRUE(FS.addFile(Target, 0, MemoryBuffer::getMemBuffer(Content)));
1309 EXPECT_FALSE(FS.addHardLink(Dir, Target));
1310}
1311
1312TEST_F(InMemoryFileSystemTest, AddHardLinkUnderAFile) {
1313 StringRef CommonContent = "content string";
1314 FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer(CommonContent));
1315 FS.addFile("/c/d", 0, MemoryBuffer::getMemBuffer(CommonContent));
1316 EXPECT_FALSE(FS.addHardLink("/c/d/e", "/a/b"));
1317}
1318
1319TEST_F(InMemoryFileSystemTest, RecursiveIterationWithHardLink) {
1320 std::error_code EC;
1321 FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("content string"));
1322 EXPECT_TRUE(FS.addHardLink("/c/d", "/a/b"));
1323 auto I = vfs::recursive_directory_iterator(FS, "/", EC);
1324 ASSERT_FALSE(EC);
1325 std::vector<std::string> Nodes;
1326 for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
1327 I.increment(EC)) {
Benjamin Krameradcd0262020-01-28 20:23:46 +01001328 Nodes.push_back(getPosixPath(std::string(I->path())));
Ilya Biryukovd5554c512018-09-04 14:15:53 +00001329 }
1330 EXPECT_THAT(Nodes, testing::UnorderedElementsAre("/a", "/a/b", "/c", "/c/d"));
1331}
1332
Ben Langmuir93853232014-03-05 21:32:20 +00001333// NOTE: in the tests below, we use '//root/' as our root directory, since it is
1334// a legal *absolute* path on Windows as well as *nix.
Ben Langmuir97882e72014-02-24 20:56:37 +00001335class VFSFromYAMLTest : public ::testing::Test {
1336public:
1337 int NumDiagnostics;
Ben Langmuir93853232014-03-05 21:32:20 +00001338
Alexander Kornienko34eb2072015-04-11 02:00:23 +00001339 void SetUp() override { NumDiagnostics = 0; }
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001340
Ben Langmuir97882e72014-02-24 20:56:37 +00001341 static void CountingDiagHandler(const SMDiagnostic &, void *Context) {
1342 VFSFromYAMLTest *Test = static_cast<VFSFromYAMLTest *>(Context);
1343 ++Test->NumDiagnostics;
1344 }
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001345
Ben Langmuir97882e72014-02-24 20:56:37 +00001346 IntrusiveRefCntPtr<vfs::FileSystem>
1347 getFromYAMLRawString(StringRef Content,
1348 IntrusiveRefCntPtr<vfs::FileSystem> ExternalFS) {
Rafael Espindolad87f8d72014-08-27 20:03:29 +00001349 std::unique_ptr<MemoryBuffer> Buffer = MemoryBuffer::getMemBuffer(Content);
Bruno Cardoso Lopesd878e282016-03-20 02:08:48 +00001350 return getVFSFromYAML(std::move(Buffer), CountingDiagHandler, "", this,
Rafael Espindola91ac8df2014-08-17 23:27:13 +00001351 ExternalFS);
Ben Langmuir97882e72014-02-24 20:56:37 +00001352 }
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001353
Ben Langmuir97882e72014-02-24 20:56:37 +00001354 IntrusiveRefCntPtr<vfs::FileSystem> getFromYAMLString(
1355 StringRef Content,
1356 IntrusiveRefCntPtr<vfs::FileSystem> ExternalFS = new DummyFileSystem()) {
1357 std::string VersionPlusContent("{\n 'version':0,\n");
1358 VersionPlusContent += Content.slice(Content.find('{') + 1, StringRef::npos);
1359 return getFromYAMLRawString(VersionPlusContent, ExternalFS);
1360 }
Bruno Cardoso Lopesf6a0a722016-05-12 19:13:07 +00001361
1362 // This is intended as a "XFAIL" for windows hosts.
1363 bool supportsSameDirMultipleYAMLEntries() {
1364 Triple Host(Triple::normalize(sys::getProcessTriple()));
1365 return !Host.isOSWindows();
1366 }
Ben Langmuir97882e72014-02-24 20:56:37 +00001367};
1368
1369TEST_F(VFSFromYAMLTest, BasicVFSFromYAML) {
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001370 IntrusiveRefCntPtr<vfs::FileSystem> FS;
1371 FS = getFromYAMLString("");
Alp Tokerf994cef2014-07-05 03:08:06 +00001372 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001373 FS = getFromYAMLString("[]");
Alp Tokerf994cef2014-07-05 03:08:06 +00001374 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001375 FS = getFromYAMLString("'string'");
Alp Tokerf994cef2014-07-05 03:08:06 +00001376 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001377 EXPECT_EQ(3, NumDiagnostics);
1378}
1379
Ben Langmuir97882e72014-02-24 20:56:37 +00001380TEST_F(VFSFromYAMLTest, MappedFiles) {
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001381 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
Ben Langmuir93853232014-03-05 21:32:20 +00001382 Lower->addRegularFile("//root/foo/bar/a");
Jonas Devliegherefc514902018-10-10 13:27:25 +00001383 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
1384 "{ 'roots': [\n"
1385 "{\n"
1386 " 'type': 'directory',\n"
1387 " 'name': '//root/',\n"
1388 " 'contents': [ {\n"
1389 " 'type': 'file',\n"
1390 " 'name': 'file1',\n"
1391 " 'external-contents': '//root/foo/bar/a'\n"
1392 " },\n"
1393 " {\n"
1394 " 'type': 'file',\n"
1395 " 'name': 'file2',\n"
1396 " 'external-contents': '//root/foo/b'\n"
1397 " }\n"
1398 " ]\n"
1399 "}\n"
1400 "]\n"
1401 "}",
1402 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001403 ASSERT_TRUE(FS.get() != nullptr);
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001404
1405 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
1406 new vfs::OverlayFileSystem(Lower));
1407 O->pushOverlay(FS);
1408
1409 // file
Ben Langmuir93853232014-03-05 21:32:20 +00001410 ErrorOr<vfs::Status> S = O->status("//root/file1");
Rafael Espindola3ae06202014-05-31 03:20:52 +00001411 ASSERT_FALSE(S.getError());
Ben Langmuir93853232014-03-05 21:32:20 +00001412 EXPECT_EQ("//root/foo/bar/a", S->getName());
Ben Langmuirf13302e2015-12-10 23:41:39 +00001413 EXPECT_TRUE(S->IsVFSMapped);
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001414
Ben Langmuir93853232014-03-05 21:32:20 +00001415 ErrorOr<vfs::Status> SLower = O->status("//root/foo/bar/a");
1416 EXPECT_EQ("//root/foo/bar/a", SLower->getName());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001417 EXPECT_TRUE(S->equivalent(*SLower));
Ben Langmuirf13302e2015-12-10 23:41:39 +00001418 EXPECT_FALSE(SLower->IsVFSMapped);
1419
1420 // file after opening
1421 auto OpenedF = O->openFileForRead("//root/file1");
1422 ASSERT_FALSE(OpenedF.getError());
1423 auto OpenedS = (*OpenedF)->status();
1424 ASSERT_FALSE(OpenedS.getError());
1425 EXPECT_EQ("//root/foo/bar/a", OpenedS->getName());
1426 EXPECT_TRUE(OpenedS->IsVFSMapped);
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001427
1428 // directory
Ben Langmuir93853232014-03-05 21:32:20 +00001429 S = O->status("//root/");
Rafael Espindola3ae06202014-05-31 03:20:52 +00001430 ASSERT_FALSE(S.getError());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001431 EXPECT_TRUE(S->isDirectory());
Ben Langmuir93853232014-03-05 21:32:20 +00001432 EXPECT_TRUE(S->equivalent(*O->status("//root/"))); // non-volatile UniqueID
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001433
1434 // broken mapping
Rafael Espindola71de0b62014-06-13 17:20:50 +00001435 EXPECT_EQ(O->status("//root/file2").getError(),
1436 llvm::errc::no_such_file_or_directory);
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001437 EXPECT_EQ(0, NumDiagnostics);
1438}
1439
Ben Langmuir97882e72014-02-24 20:56:37 +00001440TEST_F(VFSFromYAMLTest, CaseInsensitive) {
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001441 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
Ben Langmuir93853232014-03-05 21:32:20 +00001442 Lower->addRegularFile("//root/foo/bar/a");
Jonas Devliegherefc514902018-10-10 13:27:25 +00001443 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
1444 "{ 'case-sensitive': 'false',\n"
1445 " 'roots': [\n"
1446 "{\n"
1447 " 'type': 'directory',\n"
1448 " 'name': '//root/',\n"
1449 " 'contents': [ {\n"
1450 " 'type': 'file',\n"
1451 " 'name': 'XX',\n"
1452 " 'external-contents': '//root/foo/bar/a'\n"
1453 " }\n"
1454 " ]\n"
1455 "}]}",
1456 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001457 ASSERT_TRUE(FS.get() != nullptr);
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001458
1459 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
1460 new vfs::OverlayFileSystem(Lower));
1461 O->pushOverlay(FS);
1462
Ben Langmuir93853232014-03-05 21:32:20 +00001463 ErrorOr<vfs::Status> S = O->status("//root/XX");
Rafael Espindola3ae06202014-05-31 03:20:52 +00001464 ASSERT_FALSE(S.getError());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001465
Ben Langmuir93853232014-03-05 21:32:20 +00001466 ErrorOr<vfs::Status> SS = O->status("//root/xx");
Rafael Espindola3ae06202014-05-31 03:20:52 +00001467 ASSERT_FALSE(SS.getError());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001468 EXPECT_TRUE(S->equivalent(*SS));
Ben Langmuir93853232014-03-05 21:32:20 +00001469 SS = O->status("//root/xX");
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001470 EXPECT_TRUE(S->equivalent(*SS));
Ben Langmuir93853232014-03-05 21:32:20 +00001471 SS = O->status("//root/Xx");
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001472 EXPECT_TRUE(S->equivalent(*SS));
1473 EXPECT_EQ(0, NumDiagnostics);
1474}
1475
Ben Langmuir97882e72014-02-24 20:56:37 +00001476TEST_F(VFSFromYAMLTest, CaseSensitive) {
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001477 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
Ben Langmuir93853232014-03-05 21:32:20 +00001478 Lower->addRegularFile("//root/foo/bar/a");
Jonas Devliegherefc514902018-10-10 13:27:25 +00001479 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
1480 "{ 'case-sensitive': 'true',\n"
1481 " 'roots': [\n"
1482 "{\n"
1483 " 'type': 'directory',\n"
1484 " 'name': '//root/',\n"
1485 " 'contents': [ {\n"
1486 " 'type': 'file',\n"
1487 " 'name': 'XX',\n"
1488 " 'external-contents': '//root/foo/bar/a'\n"
1489 " }\n"
1490 " ]\n"
1491 "}]}",
1492 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001493 ASSERT_TRUE(FS.get() != nullptr);
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001494
1495 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
1496 new vfs::OverlayFileSystem(Lower));
1497 O->pushOverlay(FS);
1498
Ben Langmuir93853232014-03-05 21:32:20 +00001499 ErrorOr<vfs::Status> SS = O->status("//root/xx");
Rafael Espindola71de0b62014-06-13 17:20:50 +00001500 EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
Ben Langmuir93853232014-03-05 21:32:20 +00001501 SS = O->status("//root/xX");
Rafael Espindola71de0b62014-06-13 17:20:50 +00001502 EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
Ben Langmuir93853232014-03-05 21:32:20 +00001503 SS = O->status("//root/Xx");
Rafael Espindola71de0b62014-06-13 17:20:50 +00001504 EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001505 EXPECT_EQ(0, NumDiagnostics);
1506}
1507
Ben Langmuir97882e72014-02-24 20:56:37 +00001508TEST_F(VFSFromYAMLTest, IllegalVFSFile) {
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001509 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
1510
1511 // invalid YAML at top-level
1512 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString("{]", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001513 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001514 // invalid YAML in roots
1515 FS = getFromYAMLString("{ 'roots':[}", Lower);
1516 // invalid YAML in directory
1517 FS = getFromYAMLString(
1518 "{ 'roots':[ { 'name': 'foo', 'type': 'directory', 'contents': [}",
1519 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001520 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001521
1522 // invalid configuration
1523 FS = getFromYAMLString("{ 'knobular': 'true', 'roots':[] }", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001524 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001525 FS = getFromYAMLString("{ 'case-sensitive': 'maybe', 'roots':[] }", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001526 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001527
1528 // invalid roots
1529 FS = getFromYAMLString("{ 'roots':'' }", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001530 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001531 FS = getFromYAMLString("{ 'roots':{} }", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001532 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001533
1534 // invalid entries
1535 FS = getFromYAMLString(
1536 "{ 'roots':[ { 'type': 'other', 'name': 'me', 'contents': '' }", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001537 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001538 FS = getFromYAMLString("{ 'roots':[ { 'type': 'file', 'name': [], "
1539 "'external-contents': 'other' }",
1540 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001541 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001542 FS = getFromYAMLString(
1543 "{ 'roots':[ { 'type': 'file', 'name': 'me', 'external-contents': [] }",
1544 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001545 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001546 FS = getFromYAMLString(
1547 "{ 'roots':[ { 'type': 'file', 'name': 'me', 'external-contents': {} }",
1548 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001549 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001550 FS = getFromYAMLString(
1551 "{ 'roots':[ { 'type': 'directory', 'name': 'me', 'contents': {} }",
1552 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001553 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001554 FS = getFromYAMLString(
1555 "{ 'roots':[ { 'type': 'directory', 'name': 'me', 'contents': '' }",
1556 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001557 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001558 FS = getFromYAMLString(
1559 "{ 'roots':[ { 'thingy': 'directory', 'name': 'me', 'contents': [] }",
1560 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001561 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001562
1563 // missing mandatory fields
1564 FS = getFromYAMLString("{ 'roots':[ { 'type': 'file', 'name': 'me' }", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001565 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001566 FS = getFromYAMLString(
1567 "{ 'roots':[ { 'type': 'file', 'external-contents': 'other' }", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001568 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001569 FS = getFromYAMLString("{ 'roots':[ { 'name': 'me', 'contents': [] }", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001570 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001571
1572 // duplicate keys
1573 FS = getFromYAMLString("{ 'roots':[], 'roots':[] }", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001574 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001575 FS = getFromYAMLString(
1576 "{ 'case-sensitive':'true', 'case-sensitive':'true', 'roots':[] }",
1577 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001578 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001579 FS =
1580 getFromYAMLString("{ 'roots':[{'name':'me', 'name':'you', 'type':'file', "
1581 "'external-contents':'blah' } ] }",
1582 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001583 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001584
1585 // missing version
1586 FS = getFromYAMLRawString("{ 'roots':[] }", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001587 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001588
1589 // bad version number
1590 FS = getFromYAMLRawString("{ 'version':'foo', 'roots':[] }", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001591 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001592 FS = getFromYAMLRawString("{ 'version':-1, 'roots':[] }", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001593 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001594 FS = getFromYAMLRawString("{ 'version':100000, 'roots':[] }", Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001595 EXPECT_EQ(nullptr, FS.get());
Ben Langmuird51ba0b2014-02-21 23:39:37 +00001596 EXPECT_EQ(24, NumDiagnostics);
1597}
Ben Langmuir47ff9ab2014-02-25 04:34:14 +00001598
Ben Langmuirb59cf672014-02-27 00:25:12 +00001599TEST_F(VFSFromYAMLTest, UseExternalName) {
1600 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
Ben Langmuir93853232014-03-05 21:32:20 +00001601 Lower->addRegularFile("//root/external/file");
Ben Langmuirb59cf672014-02-27 00:25:12 +00001602
Jonas Devliegherefc514902018-10-10 13:27:25 +00001603 IntrusiveRefCntPtr<vfs::FileSystem> FS =
1604 getFromYAMLString("{ 'roots': [\n"
1605 " { 'type': 'file', 'name': '//root/A',\n"
1606 " 'external-contents': '//root/external/file'\n"
1607 " },\n"
1608 " { 'type': 'file', 'name': '//root/B',\n"
1609 " 'use-external-name': true,\n"
1610 " 'external-contents': '//root/external/file'\n"
1611 " },\n"
1612 " { 'type': 'file', 'name': '//root/C',\n"
1613 " 'use-external-name': false,\n"
1614 " 'external-contents': '//root/external/file'\n"
1615 " }\n"
1616 "] }",
1617 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001618 ASSERT_TRUE(nullptr != FS.get());
Ben Langmuirb59cf672014-02-27 00:25:12 +00001619
1620 // default true
Ben Langmuir93853232014-03-05 21:32:20 +00001621 EXPECT_EQ("//root/external/file", FS->status("//root/A")->getName());
Ben Langmuirb59cf672014-02-27 00:25:12 +00001622 // explicit
Ben Langmuir93853232014-03-05 21:32:20 +00001623 EXPECT_EQ("//root/external/file", FS->status("//root/B")->getName());
1624 EXPECT_EQ("//root/C", FS->status("//root/C")->getName());
Ben Langmuirb59cf672014-02-27 00:25:12 +00001625
1626 // global configuration
Jonas Devliegherefc514902018-10-10 13:27:25 +00001627 FS = getFromYAMLString("{ 'use-external-names': false,\n"
1628 " 'roots': [\n"
1629 " { 'type': 'file', 'name': '//root/A',\n"
1630 " 'external-contents': '//root/external/file'\n"
1631 " },\n"
1632 " { 'type': 'file', 'name': '//root/B',\n"
1633 " 'use-external-name': true,\n"
1634 " 'external-contents': '//root/external/file'\n"
1635 " },\n"
1636 " { 'type': 'file', 'name': '//root/C',\n"
1637 " 'use-external-name': false,\n"
1638 " 'external-contents': '//root/external/file'\n"
1639 " }\n"
1640 "] }",
1641 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001642 ASSERT_TRUE(nullptr != FS.get());
Ben Langmuirb59cf672014-02-27 00:25:12 +00001643
1644 // default
Ben Langmuir93853232014-03-05 21:32:20 +00001645 EXPECT_EQ("//root/A", FS->status("//root/A")->getName());
Ben Langmuirb59cf672014-02-27 00:25:12 +00001646 // explicit
Ben Langmuir93853232014-03-05 21:32:20 +00001647 EXPECT_EQ("//root/external/file", FS->status("//root/B")->getName());
1648 EXPECT_EQ("//root/C", FS->status("//root/C")->getName());
Ben Langmuirb59cf672014-02-27 00:25:12 +00001649}
1650
Ben Langmuir47ff9ab2014-02-25 04:34:14 +00001651TEST_F(VFSFromYAMLTest, MultiComponentPath) {
1652 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
Ben Langmuir93853232014-03-05 21:32:20 +00001653 Lower->addRegularFile("//root/other");
Ben Langmuir47ff9ab2014-02-25 04:34:14 +00001654
1655 // file in roots
Jonas Devliegherefc514902018-10-10 13:27:25 +00001656 IntrusiveRefCntPtr<vfs::FileSystem> FS =
1657 getFromYAMLString("{ 'roots': [\n"
1658 " { 'type': 'file', 'name': '//root/path/to/file',\n"
1659 " 'external-contents': '//root/other' }]\n"
1660 "}",
1661 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001662 ASSERT_TRUE(nullptr != FS.get());
Rafael Espindola3ae06202014-05-31 03:20:52 +00001663 EXPECT_FALSE(FS->status("//root/path/to/file").getError());
1664 EXPECT_FALSE(FS->status("//root/path/to").getError());
1665 EXPECT_FALSE(FS->status("//root/path").getError());
1666 EXPECT_FALSE(FS->status("//root/").getError());
Ben Langmuir47ff9ab2014-02-25 04:34:14 +00001667
1668 // at the start
1669 FS = getFromYAMLString(
1670 "{ 'roots': [\n"
Ben Langmuir93853232014-03-05 21:32:20 +00001671 " { 'type': 'directory', 'name': '//root/path/to',\n"
Ben Langmuir47ff9ab2014-02-25 04:34:14 +00001672 " 'contents': [ { 'type': 'file', 'name': 'file',\n"
Ben Langmuir93853232014-03-05 21:32:20 +00001673 " 'external-contents': '//root/other' }]}]\n"
Jonas Devliegherefc514902018-10-10 13:27:25 +00001674 "}",
1675 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001676 ASSERT_TRUE(nullptr != FS.get());
Rafael Espindola3ae06202014-05-31 03:20:52 +00001677 EXPECT_FALSE(FS->status("//root/path/to/file").getError());
1678 EXPECT_FALSE(FS->status("//root/path/to").getError());
1679 EXPECT_FALSE(FS->status("//root/path").getError());
1680 EXPECT_FALSE(FS->status("//root/").getError());
Ben Langmuir47ff9ab2014-02-25 04:34:14 +00001681
1682 // at the end
1683 FS = getFromYAMLString(
1684 "{ 'roots': [\n"
Ben Langmuir93853232014-03-05 21:32:20 +00001685 " { 'type': 'directory', 'name': '//root/',\n"
Ben Langmuir47ff9ab2014-02-25 04:34:14 +00001686 " 'contents': [ { 'type': 'file', 'name': 'path/to/file',\n"
Ben Langmuir93853232014-03-05 21:32:20 +00001687 " 'external-contents': '//root/other' }]}]\n"
Jonas Devliegherefc514902018-10-10 13:27:25 +00001688 "}",
1689 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001690 ASSERT_TRUE(nullptr != FS.get());
Rafael Espindola3ae06202014-05-31 03:20:52 +00001691 EXPECT_FALSE(FS->status("//root/path/to/file").getError());
1692 EXPECT_FALSE(FS->status("//root/path/to").getError());
1693 EXPECT_FALSE(FS->status("//root/path").getError());
1694 EXPECT_FALSE(FS->status("//root/").getError());
Ben Langmuir47ff9ab2014-02-25 04:34:14 +00001695}
1696
1697TEST_F(VFSFromYAMLTest, TrailingSlashes) {
1698 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
Ben Langmuir93853232014-03-05 21:32:20 +00001699 Lower->addRegularFile("//root/other");
Ben Langmuir47ff9ab2014-02-25 04:34:14 +00001700
1701 // file in roots
1702 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
1703 "{ 'roots': [\n"
Ben Langmuir93853232014-03-05 21:32:20 +00001704 " { 'type': 'directory', 'name': '//root/path/to////',\n"
Ben Langmuir47ff9ab2014-02-25 04:34:14 +00001705 " 'contents': [ { 'type': 'file', 'name': 'file',\n"
Ben Langmuir93853232014-03-05 21:32:20 +00001706 " 'external-contents': '//root/other' }]}]\n"
Jonas Devliegherefc514902018-10-10 13:27:25 +00001707 "}",
1708 Lower);
Alp Tokerf994cef2014-07-05 03:08:06 +00001709 ASSERT_TRUE(nullptr != FS.get());
Rafael Espindola3ae06202014-05-31 03:20:52 +00001710 EXPECT_FALSE(FS->status("//root/path/to/file").getError());
1711 EXPECT_FALSE(FS->status("//root/path/to").getError());
1712 EXPECT_FALSE(FS->status("//root/path").getError());
1713 EXPECT_FALSE(FS->status("//root/").getError());
Ben Langmuir47ff9ab2014-02-25 04:34:14 +00001714}
Ben Langmuir740812b2014-06-24 19:37:16 +00001715
1716TEST_F(VFSFromYAMLTest, DirectoryIteration) {
1717 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
1718 Lower->addDirectory("//root/");
1719 Lower->addDirectory("//root/foo");
1720 Lower->addDirectory("//root/foo/bar");
1721 Lower->addRegularFile("//root/foo/bar/a");
1722 Lower->addRegularFile("//root/foo/bar/b");
1723 Lower->addRegularFile("//root/file3");
Jonas Devliegherefc514902018-10-10 13:27:25 +00001724 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
1725 "{ 'use-external-names': false,\n"
1726 " 'roots': [\n"
1727 "{\n"
1728 " 'type': 'directory',\n"
1729 " 'name': '//root/',\n"
1730 " 'contents': [ {\n"
1731 " 'type': 'file',\n"
1732 " 'name': 'file1',\n"
1733 " 'external-contents': '//root/foo/bar/a'\n"
1734 " },\n"
1735 " {\n"
1736 " 'type': 'file',\n"
1737 " 'name': 'file2',\n"
1738 " 'external-contents': '//root/foo/bar/b'\n"
1739 " }\n"
1740 " ]\n"
1741 "}\n"
1742 "]\n"
1743 "}",
1744 Lower);
Hans Wennborgdcfba332015-10-06 23:40:43 +00001745 ASSERT_TRUE(FS.get() != nullptr);
Ben Langmuir740812b2014-06-24 19:37:16 +00001746
1747 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
1748 new vfs::OverlayFileSystem(Lower));
1749 O->pushOverlay(FS);
1750
1751 std::error_code EC;
Benjamin Kramer2a23e552016-01-10 10:45:19 +00001752 checkContents(O->dir_begin("//root/", EC),
Bruno Cardoso Lopes26092b22016-05-12 04:43:27 +00001753 {"//root/file1", "//root/file2", "//root/file3", "//root/foo"});
Ben Langmuir740812b2014-06-24 19:37:16 +00001754
Benjamin Kramer2a23e552016-01-10 10:45:19 +00001755 checkContents(O->dir_begin("//root/foo/bar", EC),
1756 {"//root/foo/bar/a", "//root/foo/bar/b"});
Ben Langmuir740812b2014-06-24 19:37:16 +00001757}
Bruno Cardoso Lopesf6a0a722016-05-12 19:13:07 +00001758
1759TEST_F(VFSFromYAMLTest, DirectoryIterationSameDirMultipleEntries) {
1760 // https://llvm.org/bugs/show_bug.cgi?id=27725
1761 if (!supportsSameDirMultipleYAMLEntries())
1762 return;
1763
1764 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
1765 Lower->addDirectory("//root/zab");
1766 Lower->addDirectory("//root/baz");
1767 Lower->addRegularFile("//root/zab/a");
1768 Lower->addRegularFile("//root/zab/b");
1769 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
1770 "{ 'use-external-names': false,\n"
1771 " 'roots': [\n"
1772 "{\n"
1773 " 'type': 'directory',\n"
1774 " 'name': '//root/baz/',\n"
1775 " 'contents': [ {\n"
1776 " 'type': 'file',\n"
1777 " 'name': 'x',\n"
1778 " 'external-contents': '//root/zab/a'\n"
1779 " }\n"
1780 " ]\n"
1781 "},\n"
1782 "{\n"
1783 " 'type': 'directory',\n"
1784 " 'name': '//root/baz/',\n"
1785 " 'contents': [ {\n"
1786 " 'type': 'file',\n"
1787 " 'name': 'y',\n"
1788 " 'external-contents': '//root/zab/b'\n"
1789 " }\n"
1790 " ]\n"
1791 "}\n"
1792 "]\n"
1793 "}",
1794 Lower);
1795 ASSERT_TRUE(FS.get() != nullptr);
1796
1797 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
1798 new vfs::OverlayFileSystem(Lower));
1799 O->pushOverlay(FS);
1800
1801 std::error_code EC;
1802
1803 checkContents(O->dir_begin("//root/baz/", EC),
1804 {"//root/baz/x", "//root/baz/y"});
1805}
Bruno Cardoso Lopes32b28972016-05-14 00:00:18 +00001806
1807TEST_F(VFSFromYAMLTest, RecursiveDirectoryIterationLevel) {
1808
1809 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
1810 Lower->addDirectory("//root/a");
1811 Lower->addDirectory("//root/a/b");
1812 Lower->addDirectory("//root/a/b/c");
1813 Lower->addRegularFile("//root/a/b/c/file");
1814 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
1815 "{ 'use-external-names': false,\n"
1816 " 'roots': [\n"
1817 "{\n"
1818 " 'type': 'directory',\n"
1819 " 'name': '//root/a/b/c/',\n"
1820 " 'contents': [ {\n"
1821 " 'type': 'file',\n"
1822 " 'name': 'file',\n"
1823 " 'external-contents': '//root/a/b/c/file'\n"
1824 " }\n"
1825 " ]\n"
1826 "},\n"
1827 "]\n"
1828 "}",
1829 Lower);
1830 ASSERT_TRUE(FS.get() != nullptr);
1831
1832 IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
1833 new vfs::OverlayFileSystem(Lower));
1834 O->pushOverlay(FS);
1835
1836 std::error_code EC;
1837
1838 // Test recursive_directory_iterator level()
1839 vfs::recursive_directory_iterator I = vfs::recursive_directory_iterator(
Jonas Devliegherefc514902018-10-10 13:27:25 +00001840 *O, "//root", EC),
1841 E;
Bruno Cardoso Lopes32b28972016-05-14 00:00:18 +00001842 ASSERT_FALSE(EC);
1843 for (int l = 0; I != E; I.increment(EC), ++l) {
1844 ASSERT_FALSE(EC);
1845 EXPECT_EQ(I.level(), l);
1846 }
1847 EXPECT_EQ(I, E);
1848}
Volodymyr Sapsai3b2f6a42018-08-07 19:05:41 +00001849
1850TEST_F(VFSFromYAMLTest, RelativePaths) {
1851 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
1852 // Filename at root level without a parent directory.
1853 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
1854 "{ 'roots': [\n"
1855 " { 'type': 'file', 'name': 'file-not-in-directory.h',\n"
1856 " 'external-contents': '//root/external/file'\n"
1857 " }\n"
Jonas Devliegherefc514902018-10-10 13:27:25 +00001858 "] }",
1859 Lower);
Volodymyr Sapsai3b2f6a42018-08-07 19:05:41 +00001860 EXPECT_EQ(nullptr, FS.get());
1861
1862 // Relative file path.
Jonas Devliegherefc514902018-10-10 13:27:25 +00001863 FS = getFromYAMLString("{ 'roots': [\n"
1864 " { 'type': 'file', 'name': 'relative/file/path.h',\n"
1865 " 'external-contents': '//root/external/file'\n"
1866 " }\n"
1867 "] }",
1868 Lower);
Volodymyr Sapsai3b2f6a42018-08-07 19:05:41 +00001869 EXPECT_EQ(nullptr, FS.get());
1870
1871 // Relative directory path.
1872 FS = getFromYAMLString(
Jonas Devliegherefc514902018-10-10 13:27:25 +00001873 "{ 'roots': [\n"
1874 " { 'type': 'directory', 'name': 'relative/directory/path.h',\n"
1875 " 'contents': []\n"
1876 " }\n"
1877 "] }",
1878 Lower);
Volodymyr Sapsai3b2f6a42018-08-07 19:05:41 +00001879 EXPECT_EQ(nullptr, FS.get());
1880
1881 EXPECT_EQ(3, NumDiagnostics);
1882}
Volodymyr Sapsai91e13162018-10-26 22:14:33 +00001883
1884TEST_F(VFSFromYAMLTest, NonFallthroughDirectoryIteration) {
1885 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
1886 Lower->addDirectory("//root/");
1887 Lower->addRegularFile("//root/a");
1888 Lower->addRegularFile("//root/b");
1889 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
1890 "{ 'use-external-names': false,\n"
1891 " 'fallthrough': false,\n"
1892 " 'roots': [\n"
1893 "{\n"
1894 " 'type': 'directory',\n"
1895 " 'name': '//root/',\n"
1896 " 'contents': [ {\n"
1897 " 'type': 'file',\n"
1898 " 'name': 'c',\n"
1899 " 'external-contents': '//root/a'\n"
1900 " }\n"
1901 " ]\n"
1902 "}\n"
1903 "]\n"
1904 "}",
1905 Lower);
1906 ASSERT_TRUE(FS.get() != nullptr);
1907
1908 std::error_code EC;
1909 checkContents(FS->dir_begin("//root/", EC),
1910 {"//root/c"});
1911}
1912
1913TEST_F(VFSFromYAMLTest, DirectoryIterationWithDuplicates) {
1914 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
1915 Lower->addDirectory("//root/");
1916 Lower->addRegularFile("//root/a");
1917 Lower->addRegularFile("//root/b");
1918 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
1919 "{ 'use-external-names': false,\n"
1920 " 'roots': [\n"
1921 "{\n"
1922 " 'type': 'directory',\n"
1923 " 'name': '//root/',\n"
1924 " 'contents': [ {\n"
1925 " 'type': 'file',\n"
1926 " 'name': 'a',\n"
1927 " 'external-contents': '//root/a'\n"
1928 " }\n"
1929 " ]\n"
1930 "}\n"
1931 "]\n"
1932 "}",
1933 Lower);
1934 ASSERT_TRUE(FS.get() != nullptr);
1935
1936 std::error_code EC;
1937 checkContents(FS->dir_begin("//root/", EC),
1938 {"//root/a", "//root/b"});
1939}
1940
1941TEST_F(VFSFromYAMLTest, DirectoryIterationErrorInVFSLayer) {
1942 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
1943 Lower->addDirectory("//root/");
1944 Lower->addDirectory("//root/foo");
1945 Lower->addRegularFile("//root/foo/a");
1946 Lower->addRegularFile("//root/foo/b");
1947 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
1948 "{ 'use-external-names': false,\n"
1949 " 'roots': [\n"
1950 "{\n"
1951 " 'type': 'directory',\n"
1952 " 'name': '//root/',\n"
1953 " 'contents': [ {\n"
1954 " 'type': 'file',\n"
1955 " 'name': 'bar/a',\n"
1956 " 'external-contents': '//root/foo/a'\n"
1957 " }\n"
1958 " ]\n"
1959 "}\n"
1960 "]\n"
1961 "}",
1962 Lower);
1963 ASSERT_TRUE(FS.get() != nullptr);
1964
1965 std::error_code EC;
1966 checkContents(FS->dir_begin("//root/foo", EC),
1967 {"//root/foo/a", "//root/foo/b"});
1968}
Volodymyr Sapsai76100332018-11-16 01:15:54 +00001969
1970TEST_F(VFSFromYAMLTest, GetRealPath) {
1971 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
Volodymyr Sapsaiab734262018-11-16 02:20:33 +00001972 Lower->addDirectory("//dir/");
Volodymyr Sapsai76100332018-11-16 01:15:54 +00001973 Lower->addRegularFile("/foo");
1974 Lower->addSymlink("/link");
1975 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
1976 "{ 'use-external-names': false,\n"
1977 " 'roots': [\n"
1978 "{\n"
1979 " 'type': 'directory',\n"
Volodymyr Sapsaiab734262018-11-16 02:20:33 +00001980 " 'name': '//root/',\n"
Volodymyr Sapsai76100332018-11-16 01:15:54 +00001981 " 'contents': [ {\n"
1982 " 'type': 'file',\n"
1983 " 'name': 'bar',\n"
1984 " 'external-contents': '/link'\n"
1985 " }\n"
1986 " ]\n"
1987 "},\n"
1988 "{\n"
1989 " 'type': 'directory',\n"
Volodymyr Sapsaiab734262018-11-16 02:20:33 +00001990 " 'name': '//dir/',\n"
Volodymyr Sapsai76100332018-11-16 01:15:54 +00001991 " 'contents': []\n"
1992 "}\n"
1993 "]\n"
1994 "}",
1995 Lower);
1996 ASSERT_TRUE(FS.get() != nullptr);
1997
1998 // Regular file present in underlying file system.
1999 SmallString<16> RealPath;
2000 EXPECT_FALSE(FS->getRealPath("/foo", RealPath));
2001 EXPECT_EQ(RealPath.str(), "/foo");
2002
2003 // File present in YAML pointing to symlink in underlying file system.
Volodymyr Sapsaiab734262018-11-16 02:20:33 +00002004 EXPECT_FALSE(FS->getRealPath("//root/bar", RealPath));
Volodymyr Sapsai76100332018-11-16 01:15:54 +00002005 EXPECT_EQ(RealPath.str(), "/symlink");
2006
2007 // Directories should fall back to the underlying file system is possible.
Volodymyr Sapsaiab734262018-11-16 02:20:33 +00002008 EXPECT_FALSE(FS->getRealPath("//dir/", RealPath));
2009 EXPECT_EQ(RealPath.str(), "//dir/");
Volodymyr Sapsai76100332018-11-16 01:15:54 +00002010
2011 // Try a non-existing file.
2012 EXPECT_EQ(FS->getRealPath("/non_existing", RealPath),
2013 errc::no_such_file_or_directory);
2014}
Jonas Devlieghere21703542019-10-15 23:08:57 +00002015
2016TEST_F(VFSFromYAMLTest, WorkingDirectory) {
2017 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
2018 Lower->addDirectory("//root/");
2019 Lower->addDirectory("//root/foo");
2020 Lower->addRegularFile("//root/foo/a");
2021 Lower->addRegularFile("//root/foo/b");
2022 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
2023 "{ 'use-external-names': false,\n"
2024 " 'roots': [\n"
2025 "{\n"
2026 " 'type': 'directory',\n"
2027 " 'name': '//root/bar',\n"
2028 " 'contents': [ {\n"
2029 " 'type': 'file',\n"
2030 " 'name': 'a',\n"
2031 " 'external-contents': '//root/foo/a'\n"
2032 " }\n"
2033 " ]\n"
2034 "}\n"
2035 "]\n"
2036 "}",
2037 Lower);
2038 ASSERT_TRUE(FS.get() != nullptr);
2039 std::error_code EC = FS->setCurrentWorkingDirectory("//root/bar");
2040 ASSERT_FALSE(EC);
2041
2042 llvm::ErrorOr<std::string> WorkingDir = FS->getCurrentWorkingDirectory();
2043 ASSERT_TRUE(WorkingDir);
2044 EXPECT_EQ(*WorkingDir, "//root/bar");
2045
2046 llvm::ErrorOr<vfs::Status> Status = FS->status("./a");
2047 ASSERT_FALSE(Status.getError());
2048 EXPECT_TRUE(Status->isStatusKnown());
2049 EXPECT_FALSE(Status->isDirectory());
2050 EXPECT_TRUE(Status->isRegularFile());
2051 EXPECT_FALSE(Status->isSymlink());
2052 EXPECT_FALSE(Status->isOther());
2053 EXPECT_TRUE(Status->exists());
2054
2055 EC = FS->setCurrentWorkingDirectory("bogus");
2056 ASSERT_TRUE(EC);
2057 WorkingDir = FS->getCurrentWorkingDirectory();
2058 ASSERT_TRUE(WorkingDir);
2059 EXPECT_EQ(*WorkingDir, "//root/bar");
2060
2061 EC = FS->setCurrentWorkingDirectory("//root/");
2062 ASSERT_FALSE(EC);
2063 WorkingDir = FS->getCurrentWorkingDirectory();
2064 ASSERT_TRUE(WorkingDir);
2065 EXPECT_EQ(*WorkingDir, "//root/");
2066
2067 EC = FS->setCurrentWorkingDirectory("bar");
2068 ASSERT_FALSE(EC);
2069 WorkingDir = FS->getCurrentWorkingDirectory();
2070 ASSERT_TRUE(WorkingDir);
2071 EXPECT_EQ(*WorkingDir, "//root/bar");
2072}
2073
2074TEST_F(VFSFromYAMLTest, WorkingDirectoryFallthrough) {
2075 IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
2076 Lower->addDirectory("//root/");
2077 Lower->addDirectory("//root/foo");
2078 Lower->addRegularFile("//root/foo/a");
2079 Lower->addRegularFile("//root/foo/b");
2080 Lower->addRegularFile("//root/c");
2081 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
2082 "{ 'use-external-names': false,\n"
2083 " 'roots': [\n"
2084 "{\n"
2085 " 'type': 'directory',\n"
2086 " 'name': '//root/bar',\n"
2087 " 'contents': [ {\n"
2088 " 'type': 'file',\n"
2089 " 'name': 'a',\n"
2090 " 'external-contents': '//root/foo/a'\n"
2091 " }\n"
2092 " ]\n"
Jonas Devliegheref2f77492019-12-11 09:50:00 -08002093 "},\n"
2094 "{\n"
2095 " 'type': 'directory',\n"
2096 " 'name': '//root/bar/baz',\n"
2097 " 'contents': [ {\n"
2098 " 'type': 'file',\n"
2099 " 'name': 'a',\n"
2100 " 'external-contents': '//root/foo/a'\n"
2101 " }\n"
2102 " ]\n"
Jonas Devlieghere21703542019-10-15 23:08:57 +00002103 "}\n"
2104 "]\n"
2105 "}",
2106 Lower);
2107 ASSERT_TRUE(FS.get() != nullptr);
2108 std::error_code EC = FS->setCurrentWorkingDirectory("//root/");
2109 ASSERT_FALSE(EC);
2110 ASSERT_TRUE(FS.get() != nullptr);
2111
2112 llvm::ErrorOr<vfs::Status> Status = FS->status("bar/a");
2113 ASSERT_FALSE(Status.getError());
2114 EXPECT_TRUE(Status->exists());
2115
2116 Status = FS->status("foo/a");
2117 ASSERT_FALSE(Status.getError());
2118 EXPECT_TRUE(Status->exists());
2119
2120 EC = FS->setCurrentWorkingDirectory("//root/bar");
2121 ASSERT_FALSE(EC);
2122
2123 Status = FS->status("./a");
2124 ASSERT_FALSE(Status.getError());
2125 EXPECT_TRUE(Status->exists());
2126
2127 Status = FS->status("./b");
2128 ASSERT_TRUE(Status.getError());
2129
2130 Status = FS->status("./c");
2131 ASSERT_TRUE(Status.getError());
2132
2133 EC = FS->setCurrentWorkingDirectory("//root/");
2134 ASSERT_FALSE(EC);
2135
2136 Status = FS->status("c");
2137 ASSERT_FALSE(Status.getError());
2138 EXPECT_TRUE(Status->exists());
Jonas Devliegheref2f77492019-12-11 09:50:00 -08002139
2140 Status = FS->status("./bar/baz/a");
2141 ASSERT_FALSE(Status.getError());
2142 EXPECT_TRUE(Status->exists());
2143
2144 EC = FS->setCurrentWorkingDirectory("//root/bar");
2145 ASSERT_FALSE(EC);
2146
2147 Status = FS->status("./baz/a");
2148 ASSERT_FALSE(Status.getError());
2149 EXPECT_TRUE(Status->exists());
2150
Jonas Devliegheree59f0af2019-12-11 10:52:37 -08002151#if !defined(_WIN32)
Jonas Devliegheref2f77492019-12-11 09:50:00 -08002152 Status = FS->status("../bar/baz/a");
2153 ASSERT_FALSE(Status.getError());
2154 EXPECT_TRUE(Status->exists());
Jonas Devliegheree59f0af2019-12-11 10:52:37 -08002155#endif
Jonas Devlieghere21703542019-10-15 23:08:57 +00002156}
2157
2158TEST_F(VFSFromYAMLTest, WorkingDirectoryFallthroughInvalid) {
2159 IntrusiveRefCntPtr<ErrorDummyFileSystem> Lower(new ErrorDummyFileSystem());
2160 Lower->addDirectory("//root/");
2161 Lower->addDirectory("//root/foo");
2162 Lower->addRegularFile("//root/foo/a");
2163 Lower->addRegularFile("//root/foo/b");
2164 Lower->addRegularFile("//root/c");
2165 IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
2166 "{ 'use-external-names': false,\n"
2167 " 'roots': [\n"
2168 "{\n"
2169 " 'type': 'directory',\n"
2170 " 'name': '//root/bar',\n"
2171 " 'contents': [ {\n"
2172 " 'type': 'file',\n"
2173 " 'name': 'a',\n"
2174 " 'external-contents': '//root/foo/a'\n"
2175 " }\n"
2176 " ]\n"
2177 "}\n"
2178 "]\n"
2179 "}",
2180 Lower);
2181 ASSERT_TRUE(FS.get() != nullptr);
2182 std::error_code EC = FS->setCurrentWorkingDirectory("//root/");
2183 ASSERT_FALSE(EC);
2184 ASSERT_TRUE(FS.get() != nullptr);
2185
2186 llvm::ErrorOr<vfs::Status> Status = FS->status("bar/a");
2187 ASSERT_FALSE(Status.getError());
2188 EXPECT_TRUE(Status->exists());
2189
2190 Status = FS->status("foo/a");
2191 ASSERT_TRUE(Status.getError());
2192}