blob: 7e7281955badf93f9d0f77ab3420934506fcfa0d [file] [log] [blame]
// Copyright 2009 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
//go:build unix || (js && wasm) || wasip1
package os_test
import (
"internal/testenv"
"io"
. "os"
"path/filepath"
"runtime"
"strings"
"syscall"
"testing"
"time"
)
func init() {
isReadonlyError = func(err error) bool { return err == syscall.EROFS }
}
// For TestRawConnReadWrite.
type syscallDescriptor = int
func checkUidGid(t *testing.T, path string, uid, gid int) {
dir, err := Lstat(path)
if err != nil {
t.Fatalf("Lstat %q (looking for uid/gid %d/%d): %s", path, uid, gid, err)
}
sys := dir.Sys().(*syscall.Stat_t)
if int(sys.Uid) != uid {
t.Errorf("Lstat %q: uid %d want %d", path, sys.Uid, uid)
}
if int(sys.Gid) != gid {
t.Errorf("Lstat %q: gid %d want %d", path, sys.Gid, gid)
}
}
func TestChown(t *testing.T) {
if runtime.GOOS == "wasip1" {
t.Skip("file ownership not supported on " + runtime.GOOS)
}
t.Parallel()
f := newFile(t)
dir, err := f.Stat()
if err != nil {
t.Fatalf("stat %s: %s", f.Name(), err)
}
// Can't change uid unless root, but can try
// changing the group id. First try our current group.
gid := Getgid()
t.Log("gid:", gid)
if err = Chown(f.Name(), -1, gid); err != nil {
t.Fatalf("chown %s -1 %d: %s", f.Name(), gid, err)
}
sys := dir.Sys().(*syscall.Stat_t)
checkUidGid(t, f.Name(), int(sys.Uid), gid)
// Then try all the auxiliary groups.
groups, err := Getgroups()
if err != nil {
t.Fatalf("getgroups: %s", err)
}
t.Log("groups: ", groups)
for _, g := range groups {
if err = Chown(f.Name(), -1, g); err != nil {
if testenv.SyscallIsNotSupported(err) {
t.Logf("chown %s -1 %d: %s (error ignored)", f.Name(), g, err)
// Since the Chown call failed, the file should be unmodified.
checkUidGid(t, f.Name(), int(sys.Uid), gid)
continue
}
t.Fatalf("chown %s -1 %d: %s", f.Name(), g, err)
}
checkUidGid(t, f.Name(), int(sys.Uid), g)
// change back to gid to test fd.Chown
if err = f.Chown(-1, gid); err != nil {
t.Fatalf("fchown %s -1 %d: %s", f.Name(), gid, err)
}
checkUidGid(t, f.Name(), int(sys.Uid), gid)
}
}
func TestFileChown(t *testing.T) {
if runtime.GOOS == "wasip1" {
t.Skip("file ownership not supported on " + runtime.GOOS)
}
t.Parallel()
f := newFile(t)
dir, err := f.Stat()
if err != nil {
t.Fatalf("stat %s: %s", f.Name(), err)
}
// Can't change uid unless root, but can try
// changing the group id. First try our current group.
gid := Getgid()
t.Log("gid:", gid)
if err = f.Chown(-1, gid); err != nil {
t.Fatalf("fchown %s -1 %d: %s", f.Name(), gid, err)
}
sys := dir.Sys().(*syscall.Stat_t)
checkUidGid(t, f.Name(), int(sys.Uid), gid)
// Then try all the auxiliary groups.
groups, err := Getgroups()
if err != nil {
t.Fatalf("getgroups: %s", err)
}
t.Log("groups: ", groups)
for _, g := range groups {
if err = f.Chown(-1, g); err != nil {
if testenv.SyscallIsNotSupported(err) {
t.Logf("chown %s -1 %d: %s (error ignored)", f.Name(), g, err)
// Since the Chown call failed, the file should be unmodified.
checkUidGid(t, f.Name(), int(sys.Uid), gid)
continue
}
t.Fatalf("fchown %s -1 %d: %s", f.Name(), g, err)
}
checkUidGid(t, f.Name(), int(sys.Uid), g)
// change back to gid to test fd.Chown
if err = f.Chown(-1, gid); err != nil {
t.Fatalf("fchown %s -1 %d: %s", f.Name(), gid, err)
}
checkUidGid(t, f.Name(), int(sys.Uid), gid)
}
}
func TestLchown(t *testing.T) {
testenv.MustHaveSymlink(t)
t.Parallel()
f := newFile(t)
dir, err := f.Stat()
if err != nil {
t.Fatalf("stat %s: %s", f.Name(), err)
}
linkname := f.Name() + "2"
if err := Symlink(f.Name(), linkname); err != nil {
if runtime.GOOS == "android" && IsPermission(err) {
t.Skip("skipping test on Android; permission error creating symlink")
}
t.Fatalf("link %s -> %s: %v", f.Name(), linkname, err)
}
defer Remove(linkname)
// Can't change uid unless root, but can try
// changing the group id. First try our current group.
gid := Getgid()
t.Log("gid:", gid)
if err = Lchown(linkname, -1, gid); err != nil {
if err, ok := err.(*PathError); ok && err.Err == syscall.ENOSYS {
t.Skip("lchown is unavailable")
}
t.Fatalf("lchown %s -1 %d: %s", linkname, gid, err)
}
sys := dir.Sys().(*syscall.Stat_t)
checkUidGid(t, linkname, int(sys.Uid), gid)
// Then try all the auxiliary groups.
groups, err := Getgroups()
if err != nil {
t.Fatalf("getgroups: %s", err)
}
t.Log("groups: ", groups)
for _, g := range groups {
if err = Lchown(linkname, -1, g); err != nil {
if testenv.SyscallIsNotSupported(err) {
t.Logf("lchown %s -1 %d: %s (error ignored)", f.Name(), g, err)
// Since the Lchown call failed, the file should be unmodified.
checkUidGid(t, f.Name(), int(sys.Uid), gid)
continue
}
t.Fatalf("lchown %s -1 %d: %s", linkname, g, err)
}
checkUidGid(t, linkname, int(sys.Uid), g)
// Check that link target's gid is unchanged.
checkUidGid(t, f.Name(), int(sys.Uid), int(sys.Gid))
if err = Lchown(linkname, -1, gid); err != nil {
t.Fatalf("lchown %s -1 %d: %s", f.Name(), gid, err)
}
}
}
// Issue 16919: Readdir must return a non-empty slice or an error.
func TestReaddirRemoveRace(t *testing.T) {
oldStat := *LstatP
defer func() { *LstatP = oldStat }()
*LstatP = func(name string) (FileInfo, error) {
if strings.HasSuffix(name, "some-file") {
// Act like it's been deleted.
return nil, ErrNotExist
}
return oldStat(name)
}
dir := t.TempDir()
if err := WriteFile(filepath.Join(dir, "some-file"), []byte("hello"), 0644); err != nil {
t.Fatal(err)
}
d, err := Open(dir)
if err != nil {
t.Fatal(err)
}
defer d.Close()
fis, err := d.Readdir(2) // notably, greater than zero
if len(fis) == 0 && err == nil {
// This is what used to happen (Issue 16919)
t.Fatal("Readdir = empty slice & err == nil")
}
if len(fis) != 0 || err != io.EOF {
t.Errorf("Readdir = %d entries: %v; want 0, io.EOF", len(fis), err)
for i, fi := range fis {
t.Errorf(" entry[%d]: %q, %v", i, fi.Name(), fi.Mode())
}
t.FailNow()
}
}
// Issue 23120: respect umask when doing Mkdir with the sticky bit
func TestMkdirStickyUmask(t *testing.T) {
if runtime.GOOS == "wasip1" {
t.Skip("file permissions not supported on " + runtime.GOOS)
}
// Issue #69788: This test temporarily changes the umask for testing purposes,
// so it shouldn't be run in parallel with other test cases
// to avoid other tests (e.g., TestCopyFS) creating files with an unintended umask.
const umask = 0077
dir := t.TempDir()
oldUmask := syscall.Umask(umask)
defer syscall.Umask(oldUmask)
// We have set a umask, but if the parent directory happens to have a default
// ACL, the umask may be ignored. To prevent spurious failures from an ACL,
// we create a non-sticky directory as a “control case” to compare against our
// sticky-bit “experiment”.
control := filepath.Join(dir, "control")
if err := Mkdir(control, 0755); err != nil {
t.Fatal(err)
}
cfi, err := Stat(control)
if err != nil {
t.Fatal(err)
}
p := filepath.Join(dir, "dir1")
if err := Mkdir(p, ModeSticky|0755); err != nil {
t.Fatal(err)
}
fi, err := Stat(p)
if err != nil {
t.Fatal(err)
}
got := fi.Mode()
want := cfi.Mode() | ModeSticky
if got != want {
t.Errorf("Mkdir(_, ModeSticky|0755) created dir with mode %v; want %v", got, want)
}
}
// See also issues: 22939, 24331
func newFileTest(t *testing.T, blocking bool) {
if runtime.GOOS == "js" || runtime.GOOS == "wasip1" {
t.Skipf("syscall.Pipe is not available on %s.", runtime.GOOS)
}
p := make([]int, 2)
if err := syscall.Pipe(p); err != nil {
t.Fatalf("pipe: %v", err)
}
defer syscall.Close(p[1])
// Set the read-side to non-blocking.
if !blocking {
if err := syscall.SetNonblock(p[0], true); err != nil {
syscall.Close(p[0])
t.Fatalf("SetNonblock: %v", err)
}
}
// Convert it to a file.
file := NewFile(uintptr(p[0]), "notapipe")
if file == nil {
syscall.Close(p[0])
t.Fatalf("failed to convert fd to file!")
}
defer file.Close()
timeToWrite := 100 * time.Millisecond
timeToDeadline := 1 * time.Millisecond
if !blocking {
// Use a longer time to avoid flakes.
// We won't be waiting this long anyhow.
timeToWrite = 1 * time.Second
}
// Try to read with deadline (but don't block forever).
b := make([]byte, 1)
timer := time.AfterFunc(timeToWrite, func() { syscall.Write(p[1], []byte("a")) })
defer timer.Stop()
file.SetReadDeadline(time.Now().Add(timeToDeadline))
_, err := file.Read(b)
if !blocking {
// We want it to fail with a timeout.
if !isDeadlineExceeded(err) {
t.Fatalf("No timeout reading from file: %v", err)
}
} else {
// We want it to succeed after 100ms
if err != nil {
t.Fatalf("Error reading from file: %v", err)
}
}
}
func TestNewFileBlock(t *testing.T) {
t.Parallel()
newFileTest(t, true)
}
func TestNewFileNonBlock(t *testing.T) {
t.Parallel()
newFileTest(t, false)
}
func TestNewFileInvalid(t *testing.T) {
t.Parallel()
const negOne = ^uintptr(0)
if f := NewFile(negOne, "invalid"); f != nil {
t.Errorf("NewFile(-1) got %v want nil", f)
}
}
func TestSplitPath(t *testing.T) {
t.Parallel()
for _, tt := range []struct{ path, wantDir, wantBase string }{
{"a", ".", "a"},
{"a/", ".", "a"},
{"a//", ".", "a"},
{"a/b", "a", "b"},
{"a/b/", "a", "b"},
{"a/b/c", "a/b", "c"},
{"/a", "/", "a"},
{"/a/", "/", "a"},
{"/a/b", "/a", "b"},
{"/a/b/", "/a", "b"},
{"/a/b/c", "/a/b", "c"},
{"//a", "/", "a"},
{"//a/", "/", "a"},
{"///a", "/", "a"},
{"///a/", "/", "a"},
} {
if dir, base := SplitPath(tt.path); dir != tt.wantDir || base != tt.wantBase {
t.Errorf("splitPath(%q) = %q, %q, want %q, %q", tt.path, dir, base, tt.wantDir, tt.wantBase)
}
}
}
// Test that copying to files opened with O_APPEND works and
// the copy_file_range syscall isn't used on Linux.
//
// Regression test for go.dev/issue/60181
func TestIssue60181(t *testing.T) {
t.Chdir(t.TempDir())
want := "hello gopher"
a, err := CreateTemp(".", "a")
if err != nil {
t.Fatal(err)
}
a.WriteString(want[:5])
a.Close()
b, err := CreateTemp(".", "b")
if err != nil {
t.Fatal(err)
}
b.WriteString(want[5:])
b.Close()
afd, err := syscall.Open(a.Name(), syscall.O_RDWR|syscall.O_APPEND, 0)
if err != nil {
t.Fatal(err)
}
bfd, err := syscall.Open(b.Name(), syscall.O_RDONLY, 0)
if err != nil {
t.Fatal(err)
}
aa := NewFile(uintptr(afd), a.Name())
defer aa.Close()
bb := NewFile(uintptr(bfd), b.Name())
defer bb.Close()
// This would fail on Linux in case the copy_file_range syscall was used because it doesn't
// support destination files opened with O_APPEND, see
// https://man7.org/linux/man-pages/man2/copy_file_range.2.html#ERRORS
_, err = io.Copy(aa, bb)
if err != nil {
t.Fatal(err)
}
buf, err := ReadFile(aa.Name())
if err != nil {
t.Fatal(err)
}
if got := string(buf); got != want {
t.Errorf("files not concatenated: got %q, want %q", got, want)
}
}