VirtualFileSystemTest.cpp 57 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592
  1. //===- unittests/Basic/VirtualFileSystem.cpp ---------------- VFS tests ---===//
  2. //
  3. // The LLVM Compiler Infrastructure
  4. //
  5. // This file is distributed under the University of Illinois Open Source
  6. // License. See LICENSE.TXT for details.
  7. //
  8. //===----------------------------------------------------------------------===//
  9. #include "clang/Basic/VirtualFileSystem.h"
  10. #include "llvm/ADT/Triple.h"
  11. #include "llvm/Config/llvm-config.h"
  12. #include "llvm/Support/Errc.h"
  13. #include "llvm/Support/Host.h"
  14. #include "llvm/Support/MemoryBuffer.h"
  15. #include "llvm/Support/Path.h"
  16. #include "llvm/Support/SourceMgr.h"
  17. #include "gmock/gmock.h"
  18. #include "gtest/gtest.h"
  19. #include <map>
  20. #include <string>
  21. using namespace clang;
  22. using namespace llvm;
  23. using llvm::sys::fs::UniqueID;
  24. using testing::ElementsAre;
  25. using testing::Pair;
  26. using testing::UnorderedElementsAre;
  27. namespace {
  28. struct DummyFile : public vfs::File {
  29. vfs::Status S;
  30. explicit DummyFile(vfs::Status S) : S(S) {}
  31. llvm::ErrorOr<vfs::Status> status() override { return S; }
  32. llvm::ErrorOr<std::unique_ptr<llvm::MemoryBuffer>>
  33. getBuffer(const Twine &Name, int64_t FileSize, bool RequiresNullTerminator,
  34. bool IsVolatile) override {
  35. llvm_unreachable("unimplemented");
  36. }
  37. std::error_code close() override { return std::error_code(); }
  38. };
  39. class DummyFileSystem : public vfs::FileSystem {
  40. int FSID; // used to produce UniqueIDs
  41. int FileID; // used to produce UniqueIDs
  42. std::map<std::string, vfs::Status> FilesAndDirs;
  43. static int getNextFSID() {
  44. static int Count = 0;
  45. return Count++;
  46. }
  47. public:
  48. DummyFileSystem() : FSID(getNextFSID()), FileID(0) {}
  49. ErrorOr<vfs::Status> status(const Twine &Path) override {
  50. std::map<std::string, vfs::Status>::iterator I =
  51. FilesAndDirs.find(Path.str());
  52. if (I == FilesAndDirs.end())
  53. return make_error_code(llvm::errc::no_such_file_or_directory);
  54. return I->second;
  55. }
  56. ErrorOr<std::unique_ptr<vfs::File>>
  57. openFileForRead(const Twine &Path) override {
  58. auto S = status(Path);
  59. if (S)
  60. return std::unique_ptr<vfs::File>(new DummyFile{*S});
  61. return S.getError();
  62. }
  63. llvm::ErrorOr<std::string> getCurrentWorkingDirectory() const override {
  64. return std::string();
  65. }
  66. std::error_code setCurrentWorkingDirectory(const Twine &Path) override {
  67. return std::error_code();
  68. }
  69. // Map any symlink to "/symlink".
  70. std::error_code getRealPath(const Twine &Path,
  71. SmallVectorImpl<char> &Output) const override {
  72. auto I = FilesAndDirs.find(Path.str());
  73. if (I == FilesAndDirs.end())
  74. return make_error_code(llvm::errc::no_such_file_or_directory);
  75. if (I->second.isSymlink()) {
  76. Output.clear();
  77. Twine("/symlink").toVector(Output);
  78. return std::error_code();
  79. }
  80. Output.clear();
  81. Path.toVector(Output);
  82. return std::error_code();
  83. }
  84. struct DirIterImpl : public clang::vfs::detail::DirIterImpl {
  85. std::map<std::string, vfs::Status> &FilesAndDirs;
  86. std::map<std::string, vfs::Status>::iterator I;
  87. std::string Path;
  88. bool isInPath(StringRef S) {
  89. if (Path.size() < S.size() && S.find(Path) == 0) {
  90. auto LastSep = S.find_last_of('/');
  91. if (LastSep == Path.size() || LastSep == Path.size()-1)
  92. return true;
  93. }
  94. return false;
  95. }
  96. DirIterImpl(std::map<std::string, vfs::Status> &FilesAndDirs,
  97. const Twine &_Path)
  98. : FilesAndDirs(FilesAndDirs), I(FilesAndDirs.begin()),
  99. Path(_Path.str()) {
  100. for ( ; I != FilesAndDirs.end(); ++I) {
  101. if (isInPath(I->first)) {
  102. CurrentEntry =
  103. vfs::directory_entry(I->second.getName(), I->second.getType());
  104. break;
  105. }
  106. }
  107. }
  108. std::error_code increment() override {
  109. ++I;
  110. for ( ; I != FilesAndDirs.end(); ++I) {
  111. if (isInPath(I->first)) {
  112. CurrentEntry =
  113. vfs::directory_entry(I->second.getName(), I->second.getType());
  114. break;
  115. }
  116. }
  117. if (I == FilesAndDirs.end())
  118. CurrentEntry = vfs::directory_entry();
  119. return std::error_code();
  120. }
  121. };
  122. vfs::directory_iterator dir_begin(const Twine &Dir,
  123. std::error_code &EC) override {
  124. return vfs::directory_iterator(
  125. std::make_shared<DirIterImpl>(FilesAndDirs, Dir));
  126. }
  127. void addEntry(StringRef Path, const vfs::Status &Status) {
  128. FilesAndDirs[Path] = Status;
  129. }
  130. void addRegularFile(StringRef Path, sys::fs::perms Perms = sys::fs::all_all) {
  131. vfs::Status S(Path, UniqueID(FSID, FileID++),
  132. std::chrono::system_clock::now(), 0, 0, 1024,
  133. sys::fs::file_type::regular_file, Perms);
  134. addEntry(Path, S);
  135. }
  136. void addDirectory(StringRef Path, sys::fs::perms Perms = sys::fs::all_all) {
  137. vfs::Status S(Path, UniqueID(FSID, FileID++),
  138. std::chrono::system_clock::now(), 0, 0, 0,
  139. sys::fs::file_type::directory_file, Perms);
  140. addEntry(Path, S);
  141. }
  142. void addSymlink(StringRef Path) {
  143. vfs::Status S(Path, UniqueID(FSID, FileID++),
  144. std::chrono::system_clock::now(), 0, 0, 0,
  145. sys::fs::file_type::symlink_file, sys::fs::all_all);
  146. addEntry(Path, S);
  147. }
  148. };
  149. /// Replace back-slashes by front-slashes.
  150. std::string getPosixPath(std::string S) {
  151. SmallString<128> Result;
  152. llvm::sys::path::native(S, Result, llvm::sys::path::Style::posix);
  153. return Result.str();
  154. }
  155. } // end anonymous namespace
  156. TEST(VirtualFileSystemTest, StatusQueries) {
  157. IntrusiveRefCntPtr<DummyFileSystem> D(new DummyFileSystem());
  158. ErrorOr<vfs::Status> Status((std::error_code()));
  159. D->addRegularFile("/foo");
  160. Status = D->status("/foo");
  161. ASSERT_FALSE(Status.getError());
  162. EXPECT_TRUE(Status->isStatusKnown());
  163. EXPECT_FALSE(Status->isDirectory());
  164. EXPECT_TRUE(Status->isRegularFile());
  165. EXPECT_FALSE(Status->isSymlink());
  166. EXPECT_FALSE(Status->isOther());
  167. EXPECT_TRUE(Status->exists());
  168. D->addDirectory("/bar");
  169. Status = D->status("/bar");
  170. ASSERT_FALSE(Status.getError());
  171. EXPECT_TRUE(Status->isStatusKnown());
  172. EXPECT_TRUE(Status->isDirectory());
  173. EXPECT_FALSE(Status->isRegularFile());
  174. EXPECT_FALSE(Status->isSymlink());
  175. EXPECT_FALSE(Status->isOther());
  176. EXPECT_TRUE(Status->exists());
  177. D->addSymlink("/baz");
  178. Status = D->status("/baz");
  179. ASSERT_FALSE(Status.getError());
  180. EXPECT_TRUE(Status->isStatusKnown());
  181. EXPECT_FALSE(Status->isDirectory());
  182. EXPECT_FALSE(Status->isRegularFile());
  183. EXPECT_TRUE(Status->isSymlink());
  184. EXPECT_FALSE(Status->isOther());
  185. EXPECT_TRUE(Status->exists());
  186. EXPECT_TRUE(Status->equivalent(*Status));
  187. ErrorOr<vfs::Status> Status2 = D->status("/foo");
  188. ASSERT_FALSE(Status2.getError());
  189. EXPECT_FALSE(Status->equivalent(*Status2));
  190. }
  191. TEST(VirtualFileSystemTest, BaseOnlyOverlay) {
  192. IntrusiveRefCntPtr<DummyFileSystem> D(new DummyFileSystem());
  193. ErrorOr<vfs::Status> Status((std::error_code()));
  194. EXPECT_FALSE(Status = D->status("/foo"));
  195. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(new vfs::OverlayFileSystem(D));
  196. EXPECT_FALSE(Status = O->status("/foo"));
  197. D->addRegularFile("/foo");
  198. Status = D->status("/foo");
  199. EXPECT_FALSE(Status.getError());
  200. ErrorOr<vfs::Status> Status2((std::error_code()));
  201. Status2 = O->status("/foo");
  202. EXPECT_FALSE(Status2.getError());
  203. EXPECT_TRUE(Status->equivalent(*Status2));
  204. }
  205. TEST(VirtualFileSystemTest, GetRealPathInOverlay) {
  206. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  207. Lower->addRegularFile("/foo");
  208. Lower->addSymlink("/lower_link");
  209. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  210. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  211. new vfs::OverlayFileSystem(Lower));
  212. O->pushOverlay(Upper);
  213. // Regular file.
  214. SmallString<16> RealPath;
  215. EXPECT_FALSE(O->getRealPath("/foo", RealPath));
  216. EXPECT_EQ(RealPath.str(), "/foo");
  217. // Expect no error getting real path for symlink in lower overlay.
  218. EXPECT_FALSE(O->getRealPath("/lower_link", RealPath));
  219. EXPECT_EQ(RealPath.str(), "/symlink");
  220. // Try a non-existing link.
  221. EXPECT_EQ(O->getRealPath("/upper_link", RealPath),
  222. errc::no_such_file_or_directory);
  223. // Add a new symlink in upper.
  224. Upper->addSymlink("/upper_link");
  225. EXPECT_FALSE(O->getRealPath("/upper_link", RealPath));
  226. EXPECT_EQ(RealPath.str(), "/symlink");
  227. }
  228. TEST(VirtualFileSystemTest, OverlayFiles) {
  229. IntrusiveRefCntPtr<DummyFileSystem> Base(new DummyFileSystem());
  230. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  231. IntrusiveRefCntPtr<DummyFileSystem> Top(new DummyFileSystem());
  232. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  233. new vfs::OverlayFileSystem(Base));
  234. O->pushOverlay(Middle);
  235. O->pushOverlay(Top);
  236. ErrorOr<vfs::Status> Status1((std::error_code())),
  237. Status2((std::error_code())), Status3((std::error_code())),
  238. StatusB((std::error_code())), StatusM((std::error_code())),
  239. StatusT((std::error_code()));
  240. Base->addRegularFile("/foo");
  241. StatusB = Base->status("/foo");
  242. ASSERT_FALSE(StatusB.getError());
  243. Status1 = O->status("/foo");
  244. ASSERT_FALSE(Status1.getError());
  245. Middle->addRegularFile("/foo");
  246. StatusM = Middle->status("/foo");
  247. ASSERT_FALSE(StatusM.getError());
  248. Status2 = O->status("/foo");
  249. ASSERT_FALSE(Status2.getError());
  250. Top->addRegularFile("/foo");
  251. StatusT = Top->status("/foo");
  252. ASSERT_FALSE(StatusT.getError());
  253. Status3 = O->status("/foo");
  254. ASSERT_FALSE(Status3.getError());
  255. EXPECT_TRUE(Status1->equivalent(*StatusB));
  256. EXPECT_TRUE(Status2->equivalent(*StatusM));
  257. EXPECT_TRUE(Status3->equivalent(*StatusT));
  258. EXPECT_FALSE(Status1->equivalent(*Status2));
  259. EXPECT_FALSE(Status2->equivalent(*Status3));
  260. EXPECT_FALSE(Status1->equivalent(*Status3));
  261. }
  262. TEST(VirtualFileSystemTest, OverlayDirsNonMerged) {
  263. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  264. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  265. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  266. new vfs::OverlayFileSystem(Lower));
  267. O->pushOverlay(Upper);
  268. Lower->addDirectory("/lower-only");
  269. Upper->addDirectory("/upper-only");
  270. // non-merged paths should be the same
  271. ErrorOr<vfs::Status> Status1 = Lower->status("/lower-only");
  272. ASSERT_FALSE(Status1.getError());
  273. ErrorOr<vfs::Status> Status2 = O->status("/lower-only");
  274. ASSERT_FALSE(Status2.getError());
  275. EXPECT_TRUE(Status1->equivalent(*Status2));
  276. Status1 = Upper->status("/upper-only");
  277. ASSERT_FALSE(Status1.getError());
  278. Status2 = O->status("/upper-only");
  279. ASSERT_FALSE(Status2.getError());
  280. EXPECT_TRUE(Status1->equivalent(*Status2));
  281. }
  282. TEST(VirtualFileSystemTest, MergedDirPermissions) {
  283. // merged directories get the permissions of the upper dir
  284. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  285. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  286. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  287. new vfs::OverlayFileSystem(Lower));
  288. O->pushOverlay(Upper);
  289. ErrorOr<vfs::Status> Status((std::error_code()));
  290. Lower->addDirectory("/both", sys::fs::owner_read);
  291. Upper->addDirectory("/both", sys::fs::owner_all | sys::fs::group_read);
  292. Status = O->status("/both");
  293. ASSERT_FALSE(Status.getError());
  294. EXPECT_EQ(0740, Status->getPermissions());
  295. // permissions (as usual) are not recursively applied
  296. Lower->addRegularFile("/both/foo", sys::fs::owner_read);
  297. Upper->addRegularFile("/both/bar", sys::fs::owner_write);
  298. Status = O->status("/both/foo");
  299. ASSERT_FALSE( Status.getError());
  300. EXPECT_EQ(0400, Status->getPermissions());
  301. Status = O->status("/both/bar");
  302. ASSERT_FALSE(Status.getError());
  303. EXPECT_EQ(0200, Status->getPermissions());
  304. }
  305. namespace {
  306. struct ScopedDir {
  307. SmallString<128> Path;
  308. ScopedDir(const Twine &Name, bool Unique=false) {
  309. std::error_code EC;
  310. if (Unique) {
  311. EC = llvm::sys::fs::createUniqueDirectory(Name, Path);
  312. } else {
  313. Path = Name.str();
  314. EC = llvm::sys::fs::create_directory(Twine(Path));
  315. }
  316. if (EC)
  317. Path = "";
  318. EXPECT_FALSE(EC);
  319. }
  320. ~ScopedDir() {
  321. if (Path != "") {
  322. EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
  323. }
  324. }
  325. operator StringRef() { return Path.str(); }
  326. };
  327. struct ScopedLink {
  328. SmallString<128> Path;
  329. ScopedLink(const Twine &To, const Twine &From) {
  330. Path = From.str();
  331. std::error_code EC = sys::fs::create_link(To, From);
  332. if (EC)
  333. Path = "";
  334. EXPECT_FALSE(EC);
  335. }
  336. ~ScopedLink() {
  337. if (Path != "") {
  338. EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
  339. }
  340. }
  341. operator StringRef() { return Path.str(); }
  342. };
  343. } // end anonymous namespace
  344. TEST(VirtualFileSystemTest, BasicRealFSIteration) {
  345. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/true);
  346. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  347. std::error_code EC;
  348. vfs::directory_iterator I = FS->dir_begin(Twine(TestDirectory), EC);
  349. ASSERT_FALSE(EC);
  350. EXPECT_EQ(vfs::directory_iterator(), I); // empty directory is empty
  351. ScopedDir _a(TestDirectory+"/a");
  352. ScopedDir _ab(TestDirectory+"/a/b");
  353. ScopedDir _c(TestDirectory+"/c");
  354. ScopedDir _cd(TestDirectory+"/c/d");
  355. I = FS->dir_begin(Twine(TestDirectory), EC);
  356. ASSERT_FALSE(EC);
  357. ASSERT_NE(vfs::directory_iterator(), I);
  358. // Check either a or c, since we can't rely on the iteration order.
  359. EXPECT_TRUE(I->path().endswith("a") || I->path().endswith("c"));
  360. I.increment(EC);
  361. ASSERT_FALSE(EC);
  362. ASSERT_NE(vfs::directory_iterator(), I);
  363. EXPECT_TRUE(I->path().endswith("a") || I->path().endswith("c"));
  364. I.increment(EC);
  365. EXPECT_EQ(vfs::directory_iterator(), I);
  366. }
  367. #ifdef LLVM_ON_UNIX
  368. TEST(VirtualFileSystemTest, BrokenSymlinkRealFSIteration) {
  369. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  370. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  371. ScopedLink _a("no_such_file", TestDirectory + "/a");
  372. ScopedDir _b(TestDirectory + "/b");
  373. ScopedLink _c("no_such_file", TestDirectory + "/c");
  374. // Should get no iteration error, but a stat error for the broken symlinks.
  375. std::map<std::string, std::error_code> StatResults;
  376. std::error_code EC;
  377. for (vfs::directory_iterator I = FS->dir_begin(Twine(TestDirectory), EC), E;
  378. I != E; I.increment(EC)) {
  379. EXPECT_FALSE(EC);
  380. StatResults[sys::path::filename(I->path())] =
  381. FS->status(I->path()).getError();
  382. }
  383. EXPECT_THAT(
  384. StatResults,
  385. ElementsAre(
  386. Pair("a", std::make_error_code(std::errc::no_such_file_or_directory)),
  387. Pair("b", std::error_code()),
  388. Pair("c",
  389. std::make_error_code(std::errc::no_such_file_or_directory))));
  390. }
  391. #endif
  392. TEST(VirtualFileSystemTest, BasicRealFSRecursiveIteration) {
  393. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/true);
  394. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  395. std::error_code EC;
  396. auto I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
  397. ASSERT_FALSE(EC);
  398. EXPECT_EQ(vfs::recursive_directory_iterator(), I); // empty directory is empty
  399. ScopedDir _a(TestDirectory+"/a");
  400. ScopedDir _ab(TestDirectory+"/a/b");
  401. ScopedDir _c(TestDirectory+"/c");
  402. ScopedDir _cd(TestDirectory+"/c/d");
  403. I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
  404. ASSERT_FALSE(EC);
  405. ASSERT_NE(vfs::recursive_directory_iterator(), I);
  406. std::vector<std::string> Contents;
  407. for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
  408. I.increment(EC)) {
  409. Contents.push_back(I->path());
  410. }
  411. // Check contents, which may be in any order
  412. EXPECT_EQ(4U, Contents.size());
  413. int Counts[4] = { 0, 0, 0, 0 };
  414. for (const std::string &Name : Contents) {
  415. ASSERT_FALSE(Name.empty());
  416. int Index = Name[Name.size()-1] - 'a';
  417. ASSERT_TRUE(Index >= 0 && Index < 4);
  418. Counts[Index]++;
  419. }
  420. EXPECT_EQ(1, Counts[0]); // a
  421. EXPECT_EQ(1, Counts[1]); // b
  422. EXPECT_EQ(1, Counts[2]); // c
  423. EXPECT_EQ(1, Counts[3]); // d
  424. }
  425. #ifdef LLVM_ON_UNIX
  426. TEST(VirtualFileSystemTest, BrokenSymlinkRealFSRecursiveIteration) {
  427. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  428. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  429. ScopedLink _a("no_such_file", TestDirectory + "/a");
  430. ScopedDir _b(TestDirectory + "/b");
  431. ScopedLink _ba("no_such_file", TestDirectory + "/b/a");
  432. ScopedDir _bb(TestDirectory + "/b/b");
  433. ScopedLink _bc("no_such_file", TestDirectory + "/b/c");
  434. ScopedLink _c("no_such_file", TestDirectory + "/c");
  435. ScopedDir _d(TestDirectory + "/d");
  436. ScopedDir _dd(TestDirectory + "/d/d");
  437. ScopedDir _ddd(TestDirectory + "/d/d/d");
  438. ScopedLink _e("no_such_file", TestDirectory + "/e");
  439. std::vector<std::string> VisitedBrokenSymlinks;
  440. std::vector<std::string> VisitedNonBrokenSymlinks;
  441. std::error_code EC;
  442. for (vfs::recursive_directory_iterator I(*FS, Twine(TestDirectory), EC), E;
  443. I != E; I.increment(EC)) {
  444. EXPECT_FALSE(EC);
  445. (FS->status(I->path()) ? VisitedNonBrokenSymlinks : VisitedBrokenSymlinks)
  446. .push_back(I->path());
  447. }
  448. // Check visited file names.
  449. EXPECT_THAT(VisitedBrokenSymlinks,
  450. UnorderedElementsAre(StringRef(_a), StringRef(_ba),
  451. StringRef(_bc), StringRef(_c),
  452. StringRef(_e)));
  453. EXPECT_THAT(VisitedNonBrokenSymlinks,
  454. UnorderedElementsAre(StringRef(_b), StringRef(_bb), StringRef(_d),
  455. StringRef(_dd), StringRef(_ddd)));
  456. }
  457. #endif
  458. template <typename DirIter>
  459. static void checkContents(DirIter I, ArrayRef<StringRef> ExpectedOut) {
  460. std::error_code EC;
  461. SmallVector<StringRef, 4> Expected(ExpectedOut.begin(), ExpectedOut.end());
  462. SmallVector<std::string, 4> InputToCheck;
  463. // Do not rely on iteration order to check for contents, sort both
  464. // content vectors before comparison.
  465. for (DirIter E; !EC && I != E; I.increment(EC))
  466. InputToCheck.push_back(I->path());
  467. llvm::sort(InputToCheck);
  468. llvm::sort(Expected);
  469. EXPECT_EQ(InputToCheck.size(), Expected.size());
  470. unsigned LastElt = std::min(InputToCheck.size(), Expected.size());
  471. for (unsigned Idx = 0; Idx != LastElt; ++Idx)
  472. EXPECT_EQ(StringRef(InputToCheck[Idx]), Expected[Idx]);
  473. }
  474. TEST(VirtualFileSystemTest, OverlayIteration) {
  475. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  476. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  477. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  478. new vfs::OverlayFileSystem(Lower));
  479. O->pushOverlay(Upper);
  480. std::error_code EC;
  481. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>());
  482. Lower->addRegularFile("/file1");
  483. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>("/file1"));
  484. Upper->addRegularFile("/file2");
  485. checkContents(O->dir_begin("/", EC), {"/file2", "/file1"});
  486. Lower->addDirectory("/dir1");
  487. Lower->addRegularFile("/dir1/foo");
  488. Upper->addDirectory("/dir2");
  489. Upper->addRegularFile("/dir2/foo");
  490. checkContents(O->dir_begin("/dir2", EC), ArrayRef<StringRef>("/dir2/foo"));
  491. checkContents(O->dir_begin("/", EC), {"/dir2", "/file2", "/dir1", "/file1"});
  492. }
  493. TEST(VirtualFileSystemTest, OverlayRecursiveIteration) {
  494. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  495. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  496. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  497. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  498. new vfs::OverlayFileSystem(Lower));
  499. O->pushOverlay(Middle);
  500. O->pushOverlay(Upper);
  501. std::error_code EC;
  502. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  503. ArrayRef<StringRef>());
  504. Lower->addRegularFile("/file1");
  505. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  506. ArrayRef<StringRef>("/file1"));
  507. Upper->addDirectory("/dir");
  508. Upper->addRegularFile("/dir/file2");
  509. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  510. {"/dir", "/dir/file2", "/file1"});
  511. Lower->addDirectory("/dir1");
  512. Lower->addRegularFile("/dir1/foo");
  513. Lower->addDirectory("/dir1/a");
  514. Lower->addRegularFile("/dir1/a/b");
  515. Middle->addDirectory("/a");
  516. Middle->addDirectory("/a/b");
  517. Middle->addDirectory("/a/b/c");
  518. Middle->addRegularFile("/a/b/c/d");
  519. Middle->addRegularFile("/hiddenByUp");
  520. Upper->addDirectory("/dir2");
  521. Upper->addRegularFile("/dir2/foo");
  522. Upper->addRegularFile("/hiddenByUp");
  523. checkContents(vfs::recursive_directory_iterator(*O, "/dir2", EC),
  524. ArrayRef<StringRef>("/dir2/foo"));
  525. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  526. {"/dir", "/dir/file2", "/dir2", "/dir2/foo", "/hiddenByUp",
  527. "/a", "/a/b", "/a/b/c", "/a/b/c/d", "/dir1", "/dir1/a",
  528. "/dir1/a/b", "/dir1/foo", "/file1"});
  529. }
  530. TEST(VirtualFileSystemTest, ThreeLevelIteration) {
  531. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  532. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  533. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  534. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  535. new vfs::OverlayFileSystem(Lower));
  536. O->pushOverlay(Middle);
  537. O->pushOverlay(Upper);
  538. std::error_code EC;
  539. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>());
  540. Middle->addRegularFile("/file2");
  541. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>("/file2"));
  542. Lower->addRegularFile("/file1");
  543. Upper->addRegularFile("/file3");
  544. checkContents(O->dir_begin("/", EC), {"/file3", "/file2", "/file1"});
  545. }
  546. TEST(VirtualFileSystemTest, HiddenInIteration) {
  547. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  548. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  549. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  550. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  551. new vfs::OverlayFileSystem(Lower));
  552. O->pushOverlay(Middle);
  553. O->pushOverlay(Upper);
  554. std::error_code EC;
  555. Lower->addRegularFile("/onlyInLow");
  556. Lower->addDirectory("/hiddenByMid");
  557. Lower->addDirectory("/hiddenByUp");
  558. Middle->addRegularFile("/onlyInMid");
  559. Middle->addRegularFile("/hiddenByMid");
  560. Middle->addDirectory("/hiddenByUp");
  561. Upper->addRegularFile("/onlyInUp");
  562. Upper->addRegularFile("/hiddenByUp");
  563. checkContents(
  564. O->dir_begin("/", EC),
  565. {"/hiddenByUp", "/onlyInUp", "/hiddenByMid", "/onlyInMid", "/onlyInLow"});
  566. // Make sure we get the top-most entry
  567. {
  568. std::error_code EC;
  569. vfs::directory_iterator I = O->dir_begin("/", EC), E;
  570. for ( ; !EC && I != E; I.increment(EC))
  571. if (I->path() == "/hiddenByUp")
  572. break;
  573. ASSERT_NE(E, I);
  574. EXPECT_EQ(sys::fs::file_type::regular_file, I->type());
  575. }
  576. {
  577. std::error_code EC;
  578. vfs::directory_iterator I = O->dir_begin("/", EC), E;
  579. for ( ; !EC && I != E; I.increment(EC))
  580. if (I->path() == "/hiddenByMid")
  581. break;
  582. ASSERT_NE(E, I);
  583. EXPECT_EQ(sys::fs::file_type::regular_file, I->type());
  584. }
  585. }
  586. class InMemoryFileSystemTest : public ::testing::Test {
  587. protected:
  588. clang::vfs::InMemoryFileSystem FS;
  589. clang::vfs::InMemoryFileSystem NormalizedFS;
  590. InMemoryFileSystemTest()
  591. : FS(/*UseNormalizedPaths=*/false),
  592. NormalizedFS(/*UseNormalizedPaths=*/true) {}
  593. };
  594. MATCHER_P2(IsHardLinkTo, FS, Target, "") {
  595. StringRef From = arg;
  596. StringRef To = Target;
  597. auto OpenedFrom = FS->openFileForRead(From);
  598. auto OpenedTo = FS->openFileForRead(To);
  599. return !OpenedFrom.getError() && !OpenedTo.getError() &&
  600. (*OpenedFrom)->status()->getUniqueID() ==
  601. (*OpenedTo)->status()->getUniqueID();
  602. }
  603. TEST_F(InMemoryFileSystemTest, IsEmpty) {
  604. auto Stat = FS.status("/a");
  605. ASSERT_EQ(Stat.getError(),errc::no_such_file_or_directory) << FS.toString();
  606. Stat = FS.status("/");
  607. ASSERT_EQ(Stat.getError(), errc::no_such_file_or_directory) << FS.toString();
  608. }
  609. TEST_F(InMemoryFileSystemTest, WindowsPath) {
  610. FS.addFile("c:/windows/system128/foo.cpp", 0, MemoryBuffer::getMemBuffer(""));
  611. auto Stat = FS.status("c:");
  612. #if !defined(_WIN32)
  613. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  614. #endif
  615. Stat = FS.status("c:/windows/system128/foo.cpp");
  616. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  617. FS.addFile("d:/windows/foo.cpp", 0, MemoryBuffer::getMemBuffer(""));
  618. Stat = FS.status("d:/windows/foo.cpp");
  619. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  620. }
  621. TEST_F(InMemoryFileSystemTest, OverlayFile) {
  622. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  623. NormalizedFS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  624. auto Stat = FS.status("/");
  625. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  626. Stat = FS.status("/.");
  627. ASSERT_FALSE(Stat);
  628. Stat = NormalizedFS.status("/.");
  629. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  630. Stat = FS.status("/a");
  631. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  632. ASSERT_EQ("/a", Stat->getName());
  633. }
  634. TEST_F(InMemoryFileSystemTest, OverlayFileNoOwn) {
  635. auto Buf = MemoryBuffer::getMemBuffer("a");
  636. FS.addFileNoOwn("/a", 0, Buf.get());
  637. auto Stat = FS.status("/a");
  638. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  639. ASSERT_EQ("/a", Stat->getName());
  640. }
  641. TEST_F(InMemoryFileSystemTest, OpenFileForRead) {
  642. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  643. FS.addFile("././c", 0, MemoryBuffer::getMemBuffer("c"));
  644. FS.addFile("./d/../d", 0, MemoryBuffer::getMemBuffer("d"));
  645. NormalizedFS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  646. NormalizedFS.addFile("././c", 0, MemoryBuffer::getMemBuffer("c"));
  647. NormalizedFS.addFile("./d/../d", 0, MemoryBuffer::getMemBuffer("d"));
  648. auto File = FS.openFileForRead("/a");
  649. ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
  650. File = FS.openFileForRead("/a"); // Open again.
  651. ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
  652. File = NormalizedFS.openFileForRead("/././a"); // Open again.
  653. ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
  654. File = FS.openFileForRead("/");
  655. ASSERT_EQ(File.getError(), errc::invalid_argument) << FS.toString();
  656. File = FS.openFileForRead("/b");
  657. ASSERT_EQ(File.getError(), errc::no_such_file_or_directory) << FS.toString();
  658. File = FS.openFileForRead("./c");
  659. ASSERT_FALSE(File);
  660. File = FS.openFileForRead("e/../d");
  661. ASSERT_FALSE(File);
  662. File = NormalizedFS.openFileForRead("./c");
  663. ASSERT_EQ("c", (*(*File)->getBuffer("ignored"))->getBuffer());
  664. File = NormalizedFS.openFileForRead("e/../d");
  665. ASSERT_EQ("d", (*(*File)->getBuffer("ignored"))->getBuffer());
  666. }
  667. TEST_F(InMemoryFileSystemTest, DuplicatedFile) {
  668. ASSERT_TRUE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a")));
  669. ASSERT_FALSE(FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("a")));
  670. ASSERT_TRUE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a")));
  671. ASSERT_FALSE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("b")));
  672. }
  673. TEST_F(InMemoryFileSystemTest, DirectoryIteration) {
  674. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer(""));
  675. FS.addFile("/b/c", 0, MemoryBuffer::getMemBuffer(""));
  676. std::error_code EC;
  677. vfs::directory_iterator I = FS.dir_begin("/", EC);
  678. ASSERT_FALSE(EC);
  679. ASSERT_EQ("/a", I->path());
  680. I.increment(EC);
  681. ASSERT_FALSE(EC);
  682. ASSERT_EQ("/b", I->path());
  683. I.increment(EC);
  684. ASSERT_FALSE(EC);
  685. ASSERT_EQ(vfs::directory_iterator(), I);
  686. I = FS.dir_begin("/b", EC);
  687. ASSERT_FALSE(EC);
  688. // When on Windows, we end up with "/b\\c" as the name. Convert to Posix
  689. // path for the sake of the comparison.
  690. ASSERT_EQ("/b/c", getPosixPath(I->path()));
  691. I.increment(EC);
  692. ASSERT_FALSE(EC);
  693. ASSERT_EQ(vfs::directory_iterator(), I);
  694. }
  695. TEST_F(InMemoryFileSystemTest, WorkingDirectory) {
  696. FS.setCurrentWorkingDirectory("/b");
  697. FS.addFile("c", 0, MemoryBuffer::getMemBuffer(""));
  698. auto Stat = FS.status("/b/c");
  699. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  700. ASSERT_EQ("/b/c", Stat->getName());
  701. ASSERT_EQ("/b", *FS.getCurrentWorkingDirectory());
  702. Stat = FS.status("c");
  703. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  704. NormalizedFS.setCurrentWorkingDirectory("/b/c");
  705. NormalizedFS.setCurrentWorkingDirectory(".");
  706. ASSERT_EQ("/b/c",
  707. getPosixPath(NormalizedFS.getCurrentWorkingDirectory().get()));
  708. NormalizedFS.setCurrentWorkingDirectory("..");
  709. ASSERT_EQ("/b",
  710. getPosixPath(NormalizedFS.getCurrentWorkingDirectory().get()));
  711. }
  712. #if !defined(_WIN32)
  713. TEST_F(InMemoryFileSystemTest, GetRealPath) {
  714. SmallString<16> Path;
  715. EXPECT_EQ(FS.getRealPath("b", Path), errc::operation_not_permitted);
  716. auto GetRealPath = [this](StringRef P) {
  717. SmallString<16> Output;
  718. auto EC = FS.getRealPath(P, Output);
  719. EXPECT_FALSE(EC);
  720. return Output.str().str();
  721. };
  722. FS.setCurrentWorkingDirectory("a");
  723. EXPECT_EQ(GetRealPath("b"), "a/b");
  724. EXPECT_EQ(GetRealPath("../b"), "b");
  725. EXPECT_EQ(GetRealPath("b/./c"), "a/b/c");
  726. FS.setCurrentWorkingDirectory("/a");
  727. EXPECT_EQ(GetRealPath("b"), "/a/b");
  728. EXPECT_EQ(GetRealPath("../b"), "/b");
  729. EXPECT_EQ(GetRealPath("b/./c"), "/a/b/c");
  730. }
  731. #endif // _WIN32
  732. TEST_F(InMemoryFileSystemTest, AddFileWithUser) {
  733. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), 0xFEEDFACE);
  734. auto Stat = FS.status("/a");
  735. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  736. ASSERT_TRUE(Stat->isDirectory());
  737. ASSERT_EQ(0xFEEDFACE, Stat->getUser());
  738. Stat = FS.status("/a/b");
  739. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  740. ASSERT_TRUE(Stat->isDirectory());
  741. ASSERT_EQ(0xFEEDFACE, Stat->getUser());
  742. Stat = FS.status("/a/b/c");
  743. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  744. ASSERT_TRUE(Stat->isRegularFile());
  745. ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
  746. ASSERT_EQ(0xFEEDFACE, Stat->getUser());
  747. }
  748. TEST_F(InMemoryFileSystemTest, AddFileWithGroup) {
  749. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, 0xDABBAD00);
  750. auto Stat = FS.status("/a");
  751. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  752. ASSERT_TRUE(Stat->isDirectory());
  753. ASSERT_EQ(0xDABBAD00, Stat->getGroup());
  754. Stat = FS.status("/a/b");
  755. ASSERT_TRUE(Stat->isDirectory());
  756. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  757. ASSERT_EQ(0xDABBAD00, Stat->getGroup());
  758. Stat = FS.status("/a/b/c");
  759. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  760. ASSERT_TRUE(Stat->isRegularFile());
  761. ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
  762. ASSERT_EQ(0xDABBAD00, Stat->getGroup());
  763. }
  764. TEST_F(InMemoryFileSystemTest, AddFileWithFileType) {
  765. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, None,
  766. sys::fs::file_type::socket_file);
  767. auto Stat = FS.status("/a");
  768. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  769. ASSERT_TRUE(Stat->isDirectory());
  770. Stat = FS.status("/a/b");
  771. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  772. ASSERT_TRUE(Stat->isDirectory());
  773. Stat = FS.status("/a/b/c");
  774. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  775. ASSERT_EQ(sys::fs::file_type::socket_file, Stat->getType());
  776. ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
  777. }
  778. TEST_F(InMemoryFileSystemTest, AddFileWithPerms) {
  779. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, None,
  780. None, sys::fs::perms::owner_read | sys::fs::perms::owner_write);
  781. auto Stat = FS.status("/a");
  782. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  783. ASSERT_TRUE(Stat->isDirectory());
  784. ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write |
  785. sys::fs::perms::owner_exe, Stat->getPermissions());
  786. Stat = FS.status("/a/b");
  787. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  788. ASSERT_TRUE(Stat->isDirectory());
  789. ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write |
  790. sys::fs::perms::owner_exe, Stat->getPermissions());
  791. Stat = FS.status("/a/b/c");
  792. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  793. ASSERT_TRUE(Stat->isRegularFile());
  794. ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write,
  795. Stat->getPermissions());
  796. }
  797. TEST_F(InMemoryFileSystemTest, AddDirectoryThenAddChild) {
  798. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer(""), /*User=*/None,
  799. /*Group=*/None, sys::fs::file_type::directory_file);
  800. FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("abc"), /*User=*/None,
  801. /*Group=*/None, sys::fs::file_type::regular_file);
  802. auto Stat = FS.status("/a");
  803. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  804. ASSERT_TRUE(Stat->isDirectory());
  805. Stat = FS.status("/a/b");
  806. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  807. ASSERT_TRUE(Stat->isRegularFile());
  808. }
  809. // Test that the name returned by status() is in the same form as the path that
  810. // was requested (to match the behavior of RealFileSystem).
  811. TEST_F(InMemoryFileSystemTest, StatusName) {
  812. NormalizedFS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"),
  813. /*User=*/None,
  814. /*Group=*/None, sys::fs::file_type::regular_file);
  815. NormalizedFS.setCurrentWorkingDirectory("/a/b");
  816. // Access using InMemoryFileSystem::status.
  817. auto Stat = NormalizedFS.status("../b/c");
  818. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n"
  819. << NormalizedFS.toString();
  820. ASSERT_TRUE(Stat->isRegularFile());
  821. ASSERT_EQ("../b/c", Stat->getName());
  822. // Access using InMemoryFileAdaptor::status.
  823. auto File = NormalizedFS.openFileForRead("../b/c");
  824. ASSERT_FALSE(File.getError()) << File.getError() << "\n"
  825. << NormalizedFS.toString();
  826. Stat = (*File)->status();
  827. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n"
  828. << NormalizedFS.toString();
  829. ASSERT_TRUE(Stat->isRegularFile());
  830. ASSERT_EQ("../b/c", Stat->getName());
  831. // Access using a directory iterator.
  832. std::error_code EC;
  833. clang::vfs::directory_iterator It = NormalizedFS.dir_begin("../b", EC);
  834. // When on Windows, we end up with "../b\\c" as the name. Convert to Posix
  835. // path for the sake of the comparison.
  836. ASSERT_EQ("../b/c", getPosixPath(It->path()));
  837. }
  838. TEST_F(InMemoryFileSystemTest, AddHardLinkToFile) {
  839. StringRef FromLink = "/path/to/FROM/link";
  840. StringRef Target = "/path/to/TO/file";
  841. FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target"));
  842. EXPECT_TRUE(FS.addHardLink(FromLink, Target));
  843. EXPECT_THAT(FromLink, IsHardLinkTo(&FS, Target));
  844. EXPECT_TRUE(FS.status(FromLink)->getSize() == FS.status(Target)->getSize());
  845. EXPECT_TRUE(FS.getBufferForFile(FromLink)->get()->getBuffer() ==
  846. FS.getBufferForFile(Target)->get()->getBuffer());
  847. }
  848. TEST_F(InMemoryFileSystemTest, AddHardLinkInChainPattern) {
  849. StringRef Link0 = "/path/to/0/link";
  850. StringRef Link1 = "/path/to/1/link";
  851. StringRef Link2 = "/path/to/2/link";
  852. StringRef Target = "/path/to/target";
  853. FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target file"));
  854. EXPECT_TRUE(FS.addHardLink(Link2, Target));
  855. EXPECT_TRUE(FS.addHardLink(Link1, Link2));
  856. EXPECT_TRUE(FS.addHardLink(Link0, Link1));
  857. EXPECT_THAT(Link0, IsHardLinkTo(&FS, Target));
  858. EXPECT_THAT(Link1, IsHardLinkTo(&FS, Target));
  859. EXPECT_THAT(Link2, IsHardLinkTo(&FS, Target));
  860. }
  861. TEST_F(InMemoryFileSystemTest, AddHardLinkToAFileThatWasNotAddedBefore) {
  862. EXPECT_FALSE(FS.addHardLink("/path/to/link", "/path/to/target"));
  863. }
  864. TEST_F(InMemoryFileSystemTest, AddHardLinkFromAFileThatWasAddedBefore) {
  865. StringRef Link = "/path/to/link";
  866. StringRef Target = "/path/to/target";
  867. FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target"));
  868. FS.addFile(Link, 0, MemoryBuffer::getMemBuffer("content of link"));
  869. EXPECT_FALSE(FS.addHardLink(Link, Target));
  870. }
  871. TEST_F(InMemoryFileSystemTest, AddSameHardLinkMoreThanOnce) {
  872. StringRef Link = "/path/to/link";
  873. StringRef Target = "/path/to/target";
  874. FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target"));
  875. EXPECT_TRUE(FS.addHardLink(Link, Target));
  876. EXPECT_FALSE(FS.addHardLink(Link, Target));
  877. }
  878. TEST_F(InMemoryFileSystemTest, AddFileInPlaceOfAHardLinkWithSameContent) {
  879. StringRef Link = "/path/to/link";
  880. StringRef Target = "/path/to/target";
  881. StringRef Content = "content of target";
  882. EXPECT_TRUE(FS.addFile(Target, 0, MemoryBuffer::getMemBuffer(Content)));
  883. EXPECT_TRUE(FS.addHardLink(Link, Target));
  884. EXPECT_TRUE(FS.addFile(Link, 0, MemoryBuffer::getMemBuffer(Content)));
  885. }
  886. TEST_F(InMemoryFileSystemTest, AddFileInPlaceOfAHardLinkWithDifferentContent) {
  887. StringRef Link = "/path/to/link";
  888. StringRef Target = "/path/to/target";
  889. StringRef Content = "content of target";
  890. StringRef LinkContent = "different content of link";
  891. EXPECT_TRUE(FS.addFile(Target, 0, MemoryBuffer::getMemBuffer(Content)));
  892. EXPECT_TRUE(FS.addHardLink(Link, Target));
  893. EXPECT_FALSE(FS.addFile(Link, 0, MemoryBuffer::getMemBuffer(LinkContent)));
  894. }
  895. TEST_F(InMemoryFileSystemTest, AddHardLinkToADirectory) {
  896. StringRef Dir = "path/to/dummy/dir";
  897. StringRef Link = "/path/to/link";
  898. StringRef File = "path/to/dummy/dir/target";
  899. StringRef Content = "content of target";
  900. EXPECT_TRUE(FS.addFile(File, 0, MemoryBuffer::getMemBuffer(Content)));
  901. EXPECT_FALSE(FS.addHardLink(Link, Dir));
  902. }
  903. TEST_F(InMemoryFileSystemTest, AddHardLinkFromADirectory) {
  904. StringRef Dir = "path/to/dummy/dir";
  905. StringRef Target = "path/to/dummy/dir/target";
  906. StringRef Content = "content of target";
  907. EXPECT_TRUE(FS.addFile(Target, 0, MemoryBuffer::getMemBuffer(Content)));
  908. EXPECT_FALSE(FS.addHardLink(Dir, Target));
  909. }
  910. TEST_F(InMemoryFileSystemTest, AddHardLinkUnderAFile) {
  911. StringRef CommonContent = "content string";
  912. FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer(CommonContent));
  913. FS.addFile("/c/d", 0, MemoryBuffer::getMemBuffer(CommonContent));
  914. EXPECT_FALSE(FS.addHardLink("/c/d/e", "/a/b"));
  915. }
  916. TEST_F(InMemoryFileSystemTest, RecursiveIterationWithHardLink) {
  917. std::error_code EC;
  918. FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("content string"));
  919. EXPECT_TRUE(FS.addHardLink("/c/d", "/a/b"));
  920. auto I = vfs::recursive_directory_iterator(FS, "/", EC);
  921. ASSERT_FALSE(EC);
  922. std::vector<std::string> Nodes;
  923. for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
  924. I.increment(EC)) {
  925. Nodes.push_back(getPosixPath(I->path()));
  926. }
  927. EXPECT_THAT(Nodes, testing::UnorderedElementsAre("/a", "/a/b", "/c", "/c/d"));
  928. }
  929. // NOTE: in the tests below, we use '//root/' as our root directory, since it is
  930. // a legal *absolute* path on Windows as well as *nix.
  931. class VFSFromYAMLTest : public ::testing::Test {
  932. public:
  933. int NumDiagnostics;
  934. void SetUp() override { NumDiagnostics = 0; }
  935. static void CountingDiagHandler(const SMDiagnostic &, void *Context) {
  936. VFSFromYAMLTest *Test = static_cast<VFSFromYAMLTest *>(Context);
  937. ++Test->NumDiagnostics;
  938. }
  939. IntrusiveRefCntPtr<vfs::FileSystem>
  940. getFromYAMLRawString(StringRef Content,
  941. IntrusiveRefCntPtr<vfs::FileSystem> ExternalFS) {
  942. std::unique_ptr<MemoryBuffer> Buffer = MemoryBuffer::getMemBuffer(Content);
  943. return getVFSFromYAML(std::move(Buffer), CountingDiagHandler, "", this,
  944. ExternalFS);
  945. }
  946. IntrusiveRefCntPtr<vfs::FileSystem> getFromYAMLString(
  947. StringRef Content,
  948. IntrusiveRefCntPtr<vfs::FileSystem> ExternalFS = new DummyFileSystem()) {
  949. std::string VersionPlusContent("{\n 'version':0,\n");
  950. VersionPlusContent += Content.slice(Content.find('{') + 1, StringRef::npos);
  951. return getFromYAMLRawString(VersionPlusContent, ExternalFS);
  952. }
  953. // This is intended as a "XFAIL" for windows hosts.
  954. bool supportsSameDirMultipleYAMLEntries() {
  955. Triple Host(Triple::normalize(sys::getProcessTriple()));
  956. return !Host.isOSWindows();
  957. }
  958. };
  959. TEST_F(VFSFromYAMLTest, BasicVFSFromYAML) {
  960. IntrusiveRefCntPtr<vfs::FileSystem> FS;
  961. FS = getFromYAMLString("");
  962. EXPECT_EQ(nullptr, FS.get());
  963. FS = getFromYAMLString("[]");
  964. EXPECT_EQ(nullptr, FS.get());
  965. FS = getFromYAMLString("'string'");
  966. EXPECT_EQ(nullptr, FS.get());
  967. EXPECT_EQ(3, NumDiagnostics);
  968. }
  969. TEST_F(VFSFromYAMLTest, MappedFiles) {
  970. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  971. Lower->addRegularFile("//root/foo/bar/a");
  972. IntrusiveRefCntPtr<vfs::FileSystem> FS =
  973. getFromYAMLString("{ 'roots': [\n"
  974. "{\n"
  975. " 'type': 'directory',\n"
  976. " 'name': '//root/',\n"
  977. " 'contents': [ {\n"
  978. " 'type': 'file',\n"
  979. " 'name': 'file1',\n"
  980. " 'external-contents': '//root/foo/bar/a'\n"
  981. " },\n"
  982. " {\n"
  983. " 'type': 'file',\n"
  984. " 'name': 'file2',\n"
  985. " 'external-contents': '//root/foo/b'\n"
  986. " }\n"
  987. " ]\n"
  988. "}\n"
  989. "]\n"
  990. "}",
  991. Lower);
  992. ASSERT_TRUE(FS.get() != nullptr);
  993. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  994. new vfs::OverlayFileSystem(Lower));
  995. O->pushOverlay(FS);
  996. // file
  997. ErrorOr<vfs::Status> S = O->status("//root/file1");
  998. ASSERT_FALSE(S.getError());
  999. EXPECT_EQ("//root/foo/bar/a", S->getName());
  1000. EXPECT_TRUE(S->IsVFSMapped);
  1001. ErrorOr<vfs::Status> SLower = O->status("//root/foo/bar/a");
  1002. EXPECT_EQ("//root/foo/bar/a", SLower->getName());
  1003. EXPECT_TRUE(S->equivalent(*SLower));
  1004. EXPECT_FALSE(SLower->IsVFSMapped);
  1005. // file after opening
  1006. auto OpenedF = O->openFileForRead("//root/file1");
  1007. ASSERT_FALSE(OpenedF.getError());
  1008. auto OpenedS = (*OpenedF)->status();
  1009. ASSERT_FALSE(OpenedS.getError());
  1010. EXPECT_EQ("//root/foo/bar/a", OpenedS->getName());
  1011. EXPECT_TRUE(OpenedS->IsVFSMapped);
  1012. // directory
  1013. S = O->status("//root/");
  1014. ASSERT_FALSE(S.getError());
  1015. EXPECT_TRUE(S->isDirectory());
  1016. EXPECT_TRUE(S->equivalent(*O->status("//root/"))); // non-volatile UniqueID
  1017. // broken mapping
  1018. EXPECT_EQ(O->status("//root/file2").getError(),
  1019. llvm::errc::no_such_file_or_directory);
  1020. EXPECT_EQ(0, NumDiagnostics);
  1021. }
  1022. TEST_F(VFSFromYAMLTest, CaseInsensitive) {
  1023. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1024. Lower->addRegularFile("//root/foo/bar/a");
  1025. IntrusiveRefCntPtr<vfs::FileSystem> FS =
  1026. getFromYAMLString("{ 'case-sensitive': 'false',\n"
  1027. " 'roots': [\n"
  1028. "{\n"
  1029. " 'type': 'directory',\n"
  1030. " 'name': '//root/',\n"
  1031. " 'contents': [ {\n"
  1032. " 'type': 'file',\n"
  1033. " 'name': 'XX',\n"
  1034. " 'external-contents': '//root/foo/bar/a'\n"
  1035. " }\n"
  1036. " ]\n"
  1037. "}]}",
  1038. Lower);
  1039. ASSERT_TRUE(FS.get() != nullptr);
  1040. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1041. new vfs::OverlayFileSystem(Lower));
  1042. O->pushOverlay(FS);
  1043. ErrorOr<vfs::Status> S = O->status("//root/XX");
  1044. ASSERT_FALSE(S.getError());
  1045. ErrorOr<vfs::Status> SS = O->status("//root/xx");
  1046. ASSERT_FALSE(SS.getError());
  1047. EXPECT_TRUE(S->equivalent(*SS));
  1048. SS = O->status("//root/xX");
  1049. EXPECT_TRUE(S->equivalent(*SS));
  1050. SS = O->status("//root/Xx");
  1051. EXPECT_TRUE(S->equivalent(*SS));
  1052. EXPECT_EQ(0, NumDiagnostics);
  1053. }
  1054. TEST_F(VFSFromYAMLTest, CaseSensitive) {
  1055. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1056. Lower->addRegularFile("//root/foo/bar/a");
  1057. IntrusiveRefCntPtr<vfs::FileSystem> FS =
  1058. getFromYAMLString("{ 'case-sensitive': 'true',\n"
  1059. " 'roots': [\n"
  1060. "{\n"
  1061. " 'type': 'directory',\n"
  1062. " 'name': '//root/',\n"
  1063. " 'contents': [ {\n"
  1064. " 'type': 'file',\n"
  1065. " 'name': 'XX',\n"
  1066. " 'external-contents': '//root/foo/bar/a'\n"
  1067. " }\n"
  1068. " ]\n"
  1069. "}]}",
  1070. Lower);
  1071. ASSERT_TRUE(FS.get() != nullptr);
  1072. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1073. new vfs::OverlayFileSystem(Lower));
  1074. O->pushOverlay(FS);
  1075. ErrorOr<vfs::Status> SS = O->status("//root/xx");
  1076. EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
  1077. SS = O->status("//root/xX");
  1078. EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
  1079. SS = O->status("//root/Xx");
  1080. EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
  1081. EXPECT_EQ(0, NumDiagnostics);
  1082. }
  1083. TEST_F(VFSFromYAMLTest, IllegalVFSFile) {
  1084. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1085. // invalid YAML at top-level
  1086. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString("{]", Lower);
  1087. EXPECT_EQ(nullptr, FS.get());
  1088. // invalid YAML in roots
  1089. FS = getFromYAMLString("{ 'roots':[}", Lower);
  1090. // invalid YAML in directory
  1091. FS = getFromYAMLString(
  1092. "{ 'roots':[ { 'name': 'foo', 'type': 'directory', 'contents': [}",
  1093. Lower);
  1094. EXPECT_EQ(nullptr, FS.get());
  1095. // invalid configuration
  1096. FS = getFromYAMLString("{ 'knobular': 'true', 'roots':[] }", Lower);
  1097. EXPECT_EQ(nullptr, FS.get());
  1098. FS = getFromYAMLString("{ 'case-sensitive': 'maybe', 'roots':[] }", Lower);
  1099. EXPECT_EQ(nullptr, FS.get());
  1100. // invalid roots
  1101. FS = getFromYAMLString("{ 'roots':'' }", Lower);
  1102. EXPECT_EQ(nullptr, FS.get());
  1103. FS = getFromYAMLString("{ 'roots':{} }", Lower);
  1104. EXPECT_EQ(nullptr, FS.get());
  1105. // invalid entries
  1106. FS = getFromYAMLString(
  1107. "{ 'roots':[ { 'type': 'other', 'name': 'me', 'contents': '' }", Lower);
  1108. EXPECT_EQ(nullptr, FS.get());
  1109. FS = getFromYAMLString("{ 'roots':[ { 'type': 'file', 'name': [], "
  1110. "'external-contents': 'other' }",
  1111. Lower);
  1112. EXPECT_EQ(nullptr, FS.get());
  1113. FS = getFromYAMLString(
  1114. "{ 'roots':[ { 'type': 'file', 'name': 'me', 'external-contents': [] }",
  1115. Lower);
  1116. EXPECT_EQ(nullptr, FS.get());
  1117. FS = getFromYAMLString(
  1118. "{ 'roots':[ { 'type': 'file', 'name': 'me', 'external-contents': {} }",
  1119. Lower);
  1120. EXPECT_EQ(nullptr, FS.get());
  1121. FS = getFromYAMLString(
  1122. "{ 'roots':[ { 'type': 'directory', 'name': 'me', 'contents': {} }",
  1123. Lower);
  1124. EXPECT_EQ(nullptr, FS.get());
  1125. FS = getFromYAMLString(
  1126. "{ 'roots':[ { 'type': 'directory', 'name': 'me', 'contents': '' }",
  1127. Lower);
  1128. EXPECT_EQ(nullptr, FS.get());
  1129. FS = getFromYAMLString(
  1130. "{ 'roots':[ { 'thingy': 'directory', 'name': 'me', 'contents': [] }",
  1131. Lower);
  1132. EXPECT_EQ(nullptr, FS.get());
  1133. // missing mandatory fields
  1134. FS = getFromYAMLString("{ 'roots':[ { 'type': 'file', 'name': 'me' }", Lower);
  1135. EXPECT_EQ(nullptr, FS.get());
  1136. FS = getFromYAMLString(
  1137. "{ 'roots':[ { 'type': 'file', 'external-contents': 'other' }", Lower);
  1138. EXPECT_EQ(nullptr, FS.get());
  1139. FS = getFromYAMLString("{ 'roots':[ { 'name': 'me', 'contents': [] }", Lower);
  1140. EXPECT_EQ(nullptr, FS.get());
  1141. // duplicate keys
  1142. FS = getFromYAMLString("{ 'roots':[], 'roots':[] }", Lower);
  1143. EXPECT_EQ(nullptr, FS.get());
  1144. FS = getFromYAMLString(
  1145. "{ 'case-sensitive':'true', 'case-sensitive':'true', 'roots':[] }",
  1146. Lower);
  1147. EXPECT_EQ(nullptr, FS.get());
  1148. FS =
  1149. getFromYAMLString("{ 'roots':[{'name':'me', 'name':'you', 'type':'file', "
  1150. "'external-contents':'blah' } ] }",
  1151. Lower);
  1152. EXPECT_EQ(nullptr, FS.get());
  1153. // missing version
  1154. FS = getFromYAMLRawString("{ 'roots':[] }", Lower);
  1155. EXPECT_EQ(nullptr, FS.get());
  1156. // bad version number
  1157. FS = getFromYAMLRawString("{ 'version':'foo', 'roots':[] }", Lower);
  1158. EXPECT_EQ(nullptr, FS.get());
  1159. FS = getFromYAMLRawString("{ 'version':-1, 'roots':[] }", Lower);
  1160. EXPECT_EQ(nullptr, FS.get());
  1161. FS = getFromYAMLRawString("{ 'version':100000, 'roots':[] }", Lower);
  1162. EXPECT_EQ(nullptr, FS.get());
  1163. EXPECT_EQ(24, NumDiagnostics);
  1164. }
  1165. TEST_F(VFSFromYAMLTest, UseExternalName) {
  1166. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1167. Lower->addRegularFile("//root/external/file");
  1168. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1169. "{ 'roots': [\n"
  1170. " { 'type': 'file', 'name': '//root/A',\n"
  1171. " 'external-contents': '//root/external/file'\n"
  1172. " },\n"
  1173. " { 'type': 'file', 'name': '//root/B',\n"
  1174. " 'use-external-name': true,\n"
  1175. " 'external-contents': '//root/external/file'\n"
  1176. " },\n"
  1177. " { 'type': 'file', 'name': '//root/C',\n"
  1178. " 'use-external-name': false,\n"
  1179. " 'external-contents': '//root/external/file'\n"
  1180. " }\n"
  1181. "] }", Lower);
  1182. ASSERT_TRUE(nullptr != FS.get());
  1183. // default true
  1184. EXPECT_EQ("//root/external/file", FS->status("//root/A")->getName());
  1185. // explicit
  1186. EXPECT_EQ("//root/external/file", FS->status("//root/B")->getName());
  1187. EXPECT_EQ("//root/C", FS->status("//root/C")->getName());
  1188. // global configuration
  1189. FS = getFromYAMLString(
  1190. "{ 'use-external-names': false,\n"
  1191. " 'roots': [\n"
  1192. " { 'type': 'file', 'name': '//root/A',\n"
  1193. " 'external-contents': '//root/external/file'\n"
  1194. " },\n"
  1195. " { 'type': 'file', 'name': '//root/B',\n"
  1196. " 'use-external-name': true,\n"
  1197. " 'external-contents': '//root/external/file'\n"
  1198. " },\n"
  1199. " { 'type': 'file', 'name': '//root/C',\n"
  1200. " 'use-external-name': false,\n"
  1201. " 'external-contents': '//root/external/file'\n"
  1202. " }\n"
  1203. "] }", Lower);
  1204. ASSERT_TRUE(nullptr != FS.get());
  1205. // default
  1206. EXPECT_EQ("//root/A", FS->status("//root/A")->getName());
  1207. // explicit
  1208. EXPECT_EQ("//root/external/file", FS->status("//root/B")->getName());
  1209. EXPECT_EQ("//root/C", FS->status("//root/C")->getName());
  1210. }
  1211. TEST_F(VFSFromYAMLTest, MultiComponentPath) {
  1212. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1213. Lower->addRegularFile("//root/other");
  1214. // file in roots
  1215. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1216. "{ 'roots': [\n"
  1217. " { 'type': 'file', 'name': '//root/path/to/file',\n"
  1218. " 'external-contents': '//root/other' }]\n"
  1219. "}", Lower);
  1220. ASSERT_TRUE(nullptr != FS.get());
  1221. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1222. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1223. EXPECT_FALSE(FS->status("//root/path").getError());
  1224. EXPECT_FALSE(FS->status("//root/").getError());
  1225. // at the start
  1226. FS = getFromYAMLString(
  1227. "{ 'roots': [\n"
  1228. " { 'type': 'directory', 'name': '//root/path/to',\n"
  1229. " 'contents': [ { 'type': 'file', 'name': 'file',\n"
  1230. " 'external-contents': '//root/other' }]}]\n"
  1231. "}", Lower);
  1232. ASSERT_TRUE(nullptr != FS.get());
  1233. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1234. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1235. EXPECT_FALSE(FS->status("//root/path").getError());
  1236. EXPECT_FALSE(FS->status("//root/").getError());
  1237. // at the end
  1238. FS = getFromYAMLString(
  1239. "{ 'roots': [\n"
  1240. " { 'type': 'directory', 'name': '//root/',\n"
  1241. " 'contents': [ { 'type': 'file', 'name': 'path/to/file',\n"
  1242. " 'external-contents': '//root/other' }]}]\n"
  1243. "}", Lower);
  1244. ASSERT_TRUE(nullptr != FS.get());
  1245. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1246. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1247. EXPECT_FALSE(FS->status("//root/path").getError());
  1248. EXPECT_FALSE(FS->status("//root/").getError());
  1249. }
  1250. TEST_F(VFSFromYAMLTest, TrailingSlashes) {
  1251. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1252. Lower->addRegularFile("//root/other");
  1253. // file in roots
  1254. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1255. "{ 'roots': [\n"
  1256. " { 'type': 'directory', 'name': '//root/path/to////',\n"
  1257. " 'contents': [ { 'type': 'file', 'name': 'file',\n"
  1258. " 'external-contents': '//root/other' }]}]\n"
  1259. "}", Lower);
  1260. ASSERT_TRUE(nullptr != FS.get());
  1261. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1262. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1263. EXPECT_FALSE(FS->status("//root/path").getError());
  1264. EXPECT_FALSE(FS->status("//root/").getError());
  1265. }
  1266. TEST_F(VFSFromYAMLTest, DirectoryIteration) {
  1267. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1268. Lower->addDirectory("//root/");
  1269. Lower->addDirectory("//root/foo");
  1270. Lower->addDirectory("//root/foo/bar");
  1271. Lower->addRegularFile("//root/foo/bar/a");
  1272. Lower->addRegularFile("//root/foo/bar/b");
  1273. Lower->addRegularFile("//root/file3");
  1274. IntrusiveRefCntPtr<vfs::FileSystem> FS =
  1275. getFromYAMLString("{ 'use-external-names': false,\n"
  1276. " 'roots': [\n"
  1277. "{\n"
  1278. " 'type': 'directory',\n"
  1279. " 'name': '//root/',\n"
  1280. " 'contents': [ {\n"
  1281. " 'type': 'file',\n"
  1282. " 'name': 'file1',\n"
  1283. " 'external-contents': '//root/foo/bar/a'\n"
  1284. " },\n"
  1285. " {\n"
  1286. " 'type': 'file',\n"
  1287. " 'name': 'file2',\n"
  1288. " 'external-contents': '//root/foo/bar/b'\n"
  1289. " }\n"
  1290. " ]\n"
  1291. "}\n"
  1292. "]\n"
  1293. "}",
  1294. Lower);
  1295. ASSERT_TRUE(FS.get() != nullptr);
  1296. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1297. new vfs::OverlayFileSystem(Lower));
  1298. O->pushOverlay(FS);
  1299. std::error_code EC;
  1300. checkContents(O->dir_begin("//root/", EC),
  1301. {"//root/file1", "//root/file2", "//root/file3", "//root/foo"});
  1302. checkContents(O->dir_begin("//root/foo/bar", EC),
  1303. {"//root/foo/bar/a", "//root/foo/bar/b"});
  1304. }
  1305. TEST_F(VFSFromYAMLTest, DirectoryIterationSameDirMultipleEntries) {
  1306. // https://llvm.org/bugs/show_bug.cgi?id=27725
  1307. if (!supportsSameDirMultipleYAMLEntries())
  1308. return;
  1309. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1310. Lower->addDirectory("//root/zab");
  1311. Lower->addDirectory("//root/baz");
  1312. Lower->addRegularFile("//root/zab/a");
  1313. Lower->addRegularFile("//root/zab/b");
  1314. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1315. "{ 'use-external-names': false,\n"
  1316. " 'roots': [\n"
  1317. "{\n"
  1318. " 'type': 'directory',\n"
  1319. " 'name': '//root/baz/',\n"
  1320. " 'contents': [ {\n"
  1321. " 'type': 'file',\n"
  1322. " 'name': 'x',\n"
  1323. " 'external-contents': '//root/zab/a'\n"
  1324. " }\n"
  1325. " ]\n"
  1326. "},\n"
  1327. "{\n"
  1328. " 'type': 'directory',\n"
  1329. " 'name': '//root/baz/',\n"
  1330. " 'contents': [ {\n"
  1331. " 'type': 'file',\n"
  1332. " 'name': 'y',\n"
  1333. " 'external-contents': '//root/zab/b'\n"
  1334. " }\n"
  1335. " ]\n"
  1336. "}\n"
  1337. "]\n"
  1338. "}",
  1339. Lower);
  1340. ASSERT_TRUE(FS.get() != nullptr);
  1341. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1342. new vfs::OverlayFileSystem(Lower));
  1343. O->pushOverlay(FS);
  1344. std::error_code EC;
  1345. checkContents(O->dir_begin("//root/baz/", EC),
  1346. {"//root/baz/x", "//root/baz/y"});
  1347. }
  1348. TEST_F(VFSFromYAMLTest, RecursiveDirectoryIterationLevel) {
  1349. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1350. Lower->addDirectory("//root/a");
  1351. Lower->addDirectory("//root/a/b");
  1352. Lower->addDirectory("//root/a/b/c");
  1353. Lower->addRegularFile("//root/a/b/c/file");
  1354. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1355. "{ 'use-external-names': false,\n"
  1356. " 'roots': [\n"
  1357. "{\n"
  1358. " 'type': 'directory',\n"
  1359. " 'name': '//root/a/b/c/',\n"
  1360. " 'contents': [ {\n"
  1361. " 'type': 'file',\n"
  1362. " 'name': 'file',\n"
  1363. " 'external-contents': '//root/a/b/c/file'\n"
  1364. " }\n"
  1365. " ]\n"
  1366. "},\n"
  1367. "]\n"
  1368. "}",
  1369. Lower);
  1370. ASSERT_TRUE(FS.get() != nullptr);
  1371. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1372. new vfs::OverlayFileSystem(Lower));
  1373. O->pushOverlay(FS);
  1374. std::error_code EC;
  1375. // Test recursive_directory_iterator level()
  1376. vfs::recursive_directory_iterator I = vfs::recursive_directory_iterator(
  1377. *O, "//root", EC), E;
  1378. ASSERT_FALSE(EC);
  1379. for (int l = 0; I != E; I.increment(EC), ++l) {
  1380. ASSERT_FALSE(EC);
  1381. EXPECT_EQ(I.level(), l);
  1382. }
  1383. EXPECT_EQ(I, E);
  1384. }
  1385. TEST_F(VFSFromYAMLTest, RelativePaths) {
  1386. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1387. // Filename at root level without a parent directory.
  1388. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1389. "{ 'roots': [\n"
  1390. " { 'type': 'file', 'name': 'file-not-in-directory.h',\n"
  1391. " 'external-contents': '//root/external/file'\n"
  1392. " }\n"
  1393. "] }", Lower);
  1394. EXPECT_EQ(nullptr, FS.get());
  1395. // Relative file path.
  1396. FS = getFromYAMLString(
  1397. "{ 'roots': [\n"
  1398. " { 'type': 'file', 'name': 'relative/file/path.h',\n"
  1399. " 'external-contents': '//root/external/file'\n"
  1400. " }\n"
  1401. "] }", Lower);
  1402. EXPECT_EQ(nullptr, FS.get());
  1403. // Relative directory path.
  1404. FS = getFromYAMLString(
  1405. "{ 'roots': [\n"
  1406. " { 'type': 'directory', 'name': 'relative/directory/path.h',\n"
  1407. " 'contents': []\n"
  1408. " }\n"
  1409. "] }", Lower);
  1410. EXPECT_EQ(nullptr, FS.get());
  1411. EXPECT_EQ(3, NumDiagnostics);
  1412. }