VirtualFileSystemTest.cpp 49 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362
  1. //===- unittests/Basic/VirtualFileSystem.cpp ---------------- VFS tests ---===//
  2. //
  3. // The LLVM Compiler Infrastructure
  4. //
  5. // This file is distributed under the University of Illinois Open Source
  6. // License. See LICENSE.TXT for details.
  7. //
  8. //===----------------------------------------------------------------------===//
  9. #include "clang/Basic/VirtualFileSystem.h"
  10. #include "llvm/ADT/Triple.h"
  11. #include "llvm/Support/Errc.h"
  12. #include "llvm/Support/Host.h"
  13. #include "llvm/Support/MemoryBuffer.h"
  14. #include "llvm/Support/SourceMgr.h"
  15. #include "gtest/gtest.h"
  16. #include <map>
  17. using namespace clang;
  18. using namespace llvm;
  19. using llvm::sys::fs::UniqueID;
  20. namespace {
  21. struct DummyFile : public vfs::File {
  22. vfs::Status S;
  23. explicit DummyFile(vfs::Status S) : S(S) {}
  24. llvm::ErrorOr<vfs::Status> status() override { return S; }
  25. llvm::ErrorOr<std::unique_ptr<llvm::MemoryBuffer>>
  26. getBuffer(const Twine &Name, int64_t FileSize, bool RequiresNullTerminator,
  27. bool IsVolatile) override {
  28. llvm_unreachable("unimplemented");
  29. }
  30. std::error_code close() override { return std::error_code(); }
  31. };
  32. class DummyFileSystem : public vfs::FileSystem {
  33. int FSID; // used to produce UniqueIDs
  34. int FileID; // used to produce UniqueIDs
  35. std::map<std::string, vfs::Status> FilesAndDirs;
  36. static int getNextFSID() {
  37. static int Count = 0;
  38. return Count++;
  39. }
  40. public:
  41. DummyFileSystem() : FSID(getNextFSID()), FileID(0) {}
  42. ErrorOr<vfs::Status> status(const Twine &Path) override {
  43. std::map<std::string, vfs::Status>::iterator I =
  44. FilesAndDirs.find(Path.str());
  45. if (I == FilesAndDirs.end())
  46. return make_error_code(llvm::errc::no_such_file_or_directory);
  47. return I->second;
  48. }
  49. ErrorOr<std::unique_ptr<vfs::File>>
  50. openFileForRead(const Twine &Path) override {
  51. auto S = status(Path);
  52. if (S)
  53. return std::unique_ptr<vfs::File>(new DummyFile{*S});
  54. return S.getError();
  55. }
  56. llvm::ErrorOr<std::string> getCurrentWorkingDirectory() const override {
  57. return std::string();
  58. }
  59. std::error_code setCurrentWorkingDirectory(const Twine &Path) override {
  60. return std::error_code();
  61. }
  62. struct DirIterImpl : public clang::vfs::detail::DirIterImpl {
  63. std::map<std::string, vfs::Status> &FilesAndDirs;
  64. std::map<std::string, vfs::Status>::iterator I;
  65. std::string Path;
  66. bool isInPath(StringRef S) {
  67. if (Path.size() < S.size() && S.find(Path) == 0) {
  68. auto LastSep = S.find_last_of('/');
  69. if (LastSep == Path.size() || LastSep == Path.size()-1)
  70. return true;
  71. }
  72. return false;
  73. }
  74. DirIterImpl(std::map<std::string, vfs::Status> &FilesAndDirs,
  75. const Twine &_Path)
  76. : FilesAndDirs(FilesAndDirs), I(FilesAndDirs.begin()),
  77. Path(_Path.str()) {
  78. for ( ; I != FilesAndDirs.end(); ++I) {
  79. if (isInPath(I->first)) {
  80. CurrentEntry = I->second;
  81. break;
  82. }
  83. }
  84. }
  85. std::error_code increment() override {
  86. ++I;
  87. for ( ; I != FilesAndDirs.end(); ++I) {
  88. if (isInPath(I->first)) {
  89. CurrentEntry = I->second;
  90. break;
  91. }
  92. }
  93. if (I == FilesAndDirs.end())
  94. CurrentEntry = vfs::Status();
  95. return std::error_code();
  96. }
  97. };
  98. vfs::directory_iterator dir_begin(const Twine &Dir,
  99. std::error_code &EC) override {
  100. return vfs::directory_iterator(
  101. std::make_shared<DirIterImpl>(FilesAndDirs, Dir));
  102. }
  103. void addEntry(StringRef Path, const vfs::Status &Status) {
  104. FilesAndDirs[Path] = Status;
  105. }
  106. void addRegularFile(StringRef Path, sys::fs::perms Perms = sys::fs::all_all) {
  107. vfs::Status S(Path, UniqueID(FSID, FileID++),
  108. std::chrono::system_clock::now(), 0, 0, 1024,
  109. sys::fs::file_type::regular_file, Perms);
  110. addEntry(Path, S);
  111. }
  112. void addDirectory(StringRef Path, sys::fs::perms Perms = sys::fs::all_all) {
  113. vfs::Status S(Path, UniqueID(FSID, FileID++),
  114. std::chrono::system_clock::now(), 0, 0, 0,
  115. sys::fs::file_type::directory_file, Perms);
  116. addEntry(Path, S);
  117. }
  118. void addSymlink(StringRef Path) {
  119. vfs::Status S(Path, UniqueID(FSID, FileID++),
  120. std::chrono::system_clock::now(), 0, 0, 0,
  121. sys::fs::file_type::symlink_file, sys::fs::all_all);
  122. addEntry(Path, S);
  123. }
  124. };
  125. } // end anonymous namespace
  126. TEST(VirtualFileSystemTest, StatusQueries) {
  127. IntrusiveRefCntPtr<DummyFileSystem> D(new DummyFileSystem());
  128. ErrorOr<vfs::Status> Status((std::error_code()));
  129. D->addRegularFile("/foo");
  130. Status = D->status("/foo");
  131. ASSERT_FALSE(Status.getError());
  132. EXPECT_TRUE(Status->isStatusKnown());
  133. EXPECT_FALSE(Status->isDirectory());
  134. EXPECT_TRUE(Status->isRegularFile());
  135. EXPECT_FALSE(Status->isSymlink());
  136. EXPECT_FALSE(Status->isOther());
  137. EXPECT_TRUE(Status->exists());
  138. D->addDirectory("/bar");
  139. Status = D->status("/bar");
  140. ASSERT_FALSE(Status.getError());
  141. EXPECT_TRUE(Status->isStatusKnown());
  142. EXPECT_TRUE(Status->isDirectory());
  143. EXPECT_FALSE(Status->isRegularFile());
  144. EXPECT_FALSE(Status->isSymlink());
  145. EXPECT_FALSE(Status->isOther());
  146. EXPECT_TRUE(Status->exists());
  147. D->addSymlink("/baz");
  148. Status = D->status("/baz");
  149. ASSERT_FALSE(Status.getError());
  150. EXPECT_TRUE(Status->isStatusKnown());
  151. EXPECT_FALSE(Status->isDirectory());
  152. EXPECT_FALSE(Status->isRegularFile());
  153. EXPECT_TRUE(Status->isSymlink());
  154. EXPECT_FALSE(Status->isOther());
  155. EXPECT_TRUE(Status->exists());
  156. EXPECT_TRUE(Status->equivalent(*Status));
  157. ErrorOr<vfs::Status> Status2 = D->status("/foo");
  158. ASSERT_FALSE(Status2.getError());
  159. EXPECT_FALSE(Status->equivalent(*Status2));
  160. }
  161. TEST(VirtualFileSystemTest, BaseOnlyOverlay) {
  162. IntrusiveRefCntPtr<DummyFileSystem> D(new DummyFileSystem());
  163. ErrorOr<vfs::Status> Status((std::error_code()));
  164. EXPECT_FALSE(Status = D->status("/foo"));
  165. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(new vfs::OverlayFileSystem(D));
  166. EXPECT_FALSE(Status = O->status("/foo"));
  167. D->addRegularFile("/foo");
  168. Status = D->status("/foo");
  169. EXPECT_FALSE(Status.getError());
  170. ErrorOr<vfs::Status> Status2((std::error_code()));
  171. Status2 = O->status("/foo");
  172. EXPECT_FALSE(Status2.getError());
  173. EXPECT_TRUE(Status->equivalent(*Status2));
  174. }
  175. TEST(VirtualFileSystemTest, OverlayFiles) {
  176. IntrusiveRefCntPtr<DummyFileSystem> Base(new DummyFileSystem());
  177. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  178. IntrusiveRefCntPtr<DummyFileSystem> Top(new DummyFileSystem());
  179. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  180. new vfs::OverlayFileSystem(Base));
  181. O->pushOverlay(Middle);
  182. O->pushOverlay(Top);
  183. ErrorOr<vfs::Status> Status1((std::error_code())),
  184. Status2((std::error_code())), Status3((std::error_code())),
  185. StatusB((std::error_code())), StatusM((std::error_code())),
  186. StatusT((std::error_code()));
  187. Base->addRegularFile("/foo");
  188. StatusB = Base->status("/foo");
  189. ASSERT_FALSE(StatusB.getError());
  190. Status1 = O->status("/foo");
  191. ASSERT_FALSE(Status1.getError());
  192. Middle->addRegularFile("/foo");
  193. StatusM = Middle->status("/foo");
  194. ASSERT_FALSE(StatusM.getError());
  195. Status2 = O->status("/foo");
  196. ASSERT_FALSE(Status2.getError());
  197. Top->addRegularFile("/foo");
  198. StatusT = Top->status("/foo");
  199. ASSERT_FALSE(StatusT.getError());
  200. Status3 = O->status("/foo");
  201. ASSERT_FALSE(Status3.getError());
  202. EXPECT_TRUE(Status1->equivalent(*StatusB));
  203. EXPECT_TRUE(Status2->equivalent(*StatusM));
  204. EXPECT_TRUE(Status3->equivalent(*StatusT));
  205. EXPECT_FALSE(Status1->equivalent(*Status2));
  206. EXPECT_FALSE(Status2->equivalent(*Status3));
  207. EXPECT_FALSE(Status1->equivalent(*Status3));
  208. }
  209. TEST(VirtualFileSystemTest, OverlayDirsNonMerged) {
  210. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  211. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  212. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  213. new vfs::OverlayFileSystem(Lower));
  214. O->pushOverlay(Upper);
  215. Lower->addDirectory("/lower-only");
  216. Upper->addDirectory("/upper-only");
  217. // non-merged paths should be the same
  218. ErrorOr<vfs::Status> Status1 = Lower->status("/lower-only");
  219. ASSERT_FALSE(Status1.getError());
  220. ErrorOr<vfs::Status> Status2 = O->status("/lower-only");
  221. ASSERT_FALSE(Status2.getError());
  222. EXPECT_TRUE(Status1->equivalent(*Status2));
  223. Status1 = Upper->status("/upper-only");
  224. ASSERT_FALSE(Status1.getError());
  225. Status2 = O->status("/upper-only");
  226. ASSERT_FALSE(Status2.getError());
  227. EXPECT_TRUE(Status1->equivalent(*Status2));
  228. }
  229. TEST(VirtualFileSystemTest, MergedDirPermissions) {
  230. // merged directories get the permissions of the upper dir
  231. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  232. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  233. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  234. new vfs::OverlayFileSystem(Lower));
  235. O->pushOverlay(Upper);
  236. ErrorOr<vfs::Status> Status((std::error_code()));
  237. Lower->addDirectory("/both", sys::fs::owner_read);
  238. Upper->addDirectory("/both", sys::fs::owner_all | sys::fs::group_read);
  239. Status = O->status("/both");
  240. ASSERT_FALSE(Status.getError());
  241. EXPECT_EQ(0740, Status->getPermissions());
  242. // permissions (as usual) are not recursively applied
  243. Lower->addRegularFile("/both/foo", sys::fs::owner_read);
  244. Upper->addRegularFile("/both/bar", sys::fs::owner_write);
  245. Status = O->status("/both/foo");
  246. ASSERT_FALSE( Status.getError());
  247. EXPECT_EQ(0400, Status->getPermissions());
  248. Status = O->status("/both/bar");
  249. ASSERT_FALSE(Status.getError());
  250. EXPECT_EQ(0200, Status->getPermissions());
  251. }
  252. namespace {
  253. struct ScopedDir {
  254. SmallString<128> Path;
  255. ScopedDir(const Twine &Name, bool Unique=false) {
  256. std::error_code EC;
  257. if (Unique) {
  258. EC = llvm::sys::fs::createUniqueDirectory(Name, Path);
  259. } else {
  260. Path = Name.str();
  261. EC = llvm::sys::fs::create_directory(Twine(Path));
  262. }
  263. if (EC)
  264. Path = "";
  265. EXPECT_FALSE(EC);
  266. }
  267. ~ScopedDir() {
  268. if (Path != "") {
  269. EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
  270. }
  271. }
  272. operator StringRef() { return Path.str(); }
  273. };
  274. struct ScopedLink {
  275. SmallString<128> Path;
  276. ScopedLink(const Twine &To, const Twine &From) {
  277. Path = From.str();
  278. std::error_code EC = sys::fs::create_link(To, From);
  279. if (EC)
  280. Path = "";
  281. EXPECT_FALSE(EC);
  282. }
  283. ~ScopedLink() {
  284. if (Path != "") {
  285. EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
  286. }
  287. }
  288. operator StringRef() { return Path.str(); }
  289. };
  290. } // end anonymous namespace
  291. TEST(VirtualFileSystemTest, BasicRealFSIteration) {
  292. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/true);
  293. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  294. std::error_code EC;
  295. vfs::directory_iterator I = FS->dir_begin(Twine(TestDirectory), EC);
  296. ASSERT_FALSE(EC);
  297. EXPECT_EQ(vfs::directory_iterator(), I); // empty directory is empty
  298. ScopedDir _a(TestDirectory+"/a");
  299. ScopedDir _ab(TestDirectory+"/a/b");
  300. ScopedDir _c(TestDirectory+"/c");
  301. ScopedDir _cd(TestDirectory+"/c/d");
  302. I = FS->dir_begin(Twine(TestDirectory), EC);
  303. ASSERT_FALSE(EC);
  304. ASSERT_NE(vfs::directory_iterator(), I);
  305. // Check either a or c, since we can't rely on the iteration order.
  306. EXPECT_TRUE(I->getName().endswith("a") || I->getName().endswith("c"));
  307. I.increment(EC);
  308. ASSERT_FALSE(EC);
  309. ASSERT_NE(vfs::directory_iterator(), I);
  310. EXPECT_TRUE(I->getName().endswith("a") || I->getName().endswith("c"));
  311. I.increment(EC);
  312. EXPECT_EQ(vfs::directory_iterator(), I);
  313. }
  314. #ifdef LLVM_ON_UNIX
  315. TEST(VirtualFileSystemTest, BrokenSymlinkRealFSIteration) {
  316. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  317. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  318. ScopedLink _a("no_such_file", TestDirectory + "/a");
  319. ScopedDir _b(TestDirectory + "/b");
  320. ScopedLink _c("no_such_file", TestDirectory + "/c");
  321. std::error_code EC;
  322. for (vfs::directory_iterator I = FS->dir_begin(Twine(TestDirectory), EC), E;
  323. I != E; I.increment(EC)) {
  324. // Skip broken symlinks.
  325. auto EC2 = std::make_error_code(std::errc::no_such_file_or_directory);
  326. if (EC == EC2) {
  327. EC.clear();
  328. continue;
  329. }
  330. // For bot debugging.
  331. if (EC) {
  332. outs() << "Error code found:\n"
  333. << "EC value: " << EC.value() << "\n"
  334. << "EC category: " << EC.category().name()
  335. << "EC message: " << EC.message() << "\n";
  336. outs() << "Error code tested for:\n"
  337. << "EC value: " << EC2.value() << "\n"
  338. << "EC category: " << EC2.category().name()
  339. << "EC message: " << EC2.message() << "\n";
  340. }
  341. ASSERT_FALSE(EC);
  342. EXPECT_TRUE(I->getName() == _b);
  343. }
  344. }
  345. #endif
  346. TEST(VirtualFileSystemTest, BasicRealFSRecursiveIteration) {
  347. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/true);
  348. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  349. std::error_code EC;
  350. auto I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
  351. ASSERT_FALSE(EC);
  352. EXPECT_EQ(vfs::recursive_directory_iterator(), I); // empty directory is empty
  353. ScopedDir _a(TestDirectory+"/a");
  354. ScopedDir _ab(TestDirectory+"/a/b");
  355. ScopedDir _c(TestDirectory+"/c");
  356. ScopedDir _cd(TestDirectory+"/c/d");
  357. I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
  358. ASSERT_FALSE(EC);
  359. ASSERT_NE(vfs::recursive_directory_iterator(), I);
  360. std::vector<std::string> Contents;
  361. for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
  362. I.increment(EC)) {
  363. Contents.push_back(I->getName());
  364. }
  365. // Check contents, which may be in any order
  366. EXPECT_EQ(4U, Contents.size());
  367. int Counts[4] = { 0, 0, 0, 0 };
  368. for (const std::string &Name : Contents) {
  369. ASSERT_FALSE(Name.empty());
  370. int Index = Name[Name.size()-1] - 'a';
  371. ASSERT_TRUE(Index >= 0 && Index < 4);
  372. Counts[Index]++;
  373. }
  374. EXPECT_EQ(1, Counts[0]); // a
  375. EXPECT_EQ(1, Counts[1]); // b
  376. EXPECT_EQ(1, Counts[2]); // c
  377. EXPECT_EQ(1, Counts[3]); // d
  378. }
  379. #ifdef LLVM_ON_UNIX
  380. TEST(VirtualFileSystemTest, BrokenSymlinkRealFSRecursiveIteration) {
  381. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  382. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  383. ScopedLink _a("no_such_file", TestDirectory + "/a");
  384. ScopedDir _b(TestDirectory + "/b");
  385. ScopedLink _ba("no_such_file", TestDirectory + "/b/a");
  386. ScopedDir _bb(TestDirectory + "/b/b");
  387. ScopedLink _bc("no_such_file", TestDirectory + "/b/c");
  388. ScopedLink _c("no_such_file", TestDirectory + "/c");
  389. ScopedDir _d(TestDirectory + "/d");
  390. ScopedDir _dd(TestDirectory + "/d/d");
  391. ScopedDir _ddd(TestDirectory + "/d/d/d");
  392. ScopedLink _e("no_such_file", TestDirectory + "/e");
  393. std::vector<StringRef> ExpectedBrokenSymlinks = {_a, _ba, _bc, _c, _e};
  394. std::vector<StringRef> ExpectedNonBrokenSymlinks = {_b, _bb, _d, _dd, _ddd};
  395. std::vector<std::string> VisitedBrokenSymlinks;
  396. std::vector<std::string> VisitedNonBrokenSymlinks;
  397. std::error_code EC;
  398. for (vfs::recursive_directory_iterator I(*FS, Twine(TestDirectory), EC), E;
  399. I != E; I.increment(EC)) {
  400. auto EC2 = std::make_error_code(std::errc::no_such_file_or_directory);
  401. if (EC == EC2) {
  402. VisitedBrokenSymlinks.push_back(I->getName());
  403. continue;
  404. }
  405. // For bot debugging.
  406. if (EC) {
  407. outs() << "Error code found:\n"
  408. << "EC value: " << EC.value() << "\n"
  409. << "EC category: " << EC.category().name()
  410. << "EC message: " << EC.message() << "\n";
  411. outs() << "Error code tested for:\n"
  412. << "EC value: " << EC2.value() << "\n"
  413. << "EC category: " << EC2.category().name()
  414. << "EC message: " << EC2.message() << "\n";
  415. }
  416. ASSERT_FALSE(EC);
  417. VisitedNonBrokenSymlinks.push_back(I->getName());
  418. }
  419. // Check visited file names.
  420. std::sort(VisitedBrokenSymlinks.begin(), VisitedBrokenSymlinks.end());
  421. std::sort(VisitedNonBrokenSymlinks.begin(), VisitedNonBrokenSymlinks.end());
  422. EXPECT_EQ(ExpectedBrokenSymlinks.size(), VisitedBrokenSymlinks.size());
  423. EXPECT_TRUE(std::equal(VisitedBrokenSymlinks.begin(),
  424. VisitedBrokenSymlinks.end(),
  425. ExpectedBrokenSymlinks.begin()));
  426. EXPECT_EQ(ExpectedNonBrokenSymlinks.size(), VisitedNonBrokenSymlinks.size());
  427. EXPECT_TRUE(std::equal(VisitedNonBrokenSymlinks.begin(),
  428. VisitedNonBrokenSymlinks.end(),
  429. ExpectedNonBrokenSymlinks.begin()));
  430. }
  431. #endif
  432. template <typename DirIter>
  433. static void checkContents(DirIter I, ArrayRef<StringRef> ExpectedOut) {
  434. std::error_code EC;
  435. SmallVector<StringRef, 4> Expected(ExpectedOut.begin(), ExpectedOut.end());
  436. SmallVector<std::string, 4> InputToCheck;
  437. // Do not rely on iteration order to check for contents, sort both
  438. // content vectors before comparison.
  439. for (DirIter E; !EC && I != E; I.increment(EC))
  440. InputToCheck.push_back(I->getName());
  441. llvm::sort(InputToCheck.begin(), InputToCheck.end());
  442. llvm::sort(Expected.begin(), Expected.end());
  443. EXPECT_EQ(InputToCheck.size(), Expected.size());
  444. unsigned LastElt = std::min(InputToCheck.size(), Expected.size());
  445. for (unsigned Idx = 0; Idx != LastElt; ++Idx)
  446. EXPECT_EQ(StringRef(InputToCheck[Idx]), Expected[Idx]);
  447. }
  448. TEST(VirtualFileSystemTest, OverlayIteration) {
  449. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  450. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  451. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  452. new vfs::OverlayFileSystem(Lower));
  453. O->pushOverlay(Upper);
  454. std::error_code EC;
  455. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>());
  456. Lower->addRegularFile("/file1");
  457. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>("/file1"));
  458. Upper->addRegularFile("/file2");
  459. checkContents(O->dir_begin("/", EC), {"/file2", "/file1"});
  460. Lower->addDirectory("/dir1");
  461. Lower->addRegularFile("/dir1/foo");
  462. Upper->addDirectory("/dir2");
  463. Upper->addRegularFile("/dir2/foo");
  464. checkContents(O->dir_begin("/dir2", EC), ArrayRef<StringRef>("/dir2/foo"));
  465. checkContents(O->dir_begin("/", EC), {"/dir2", "/file2", "/dir1", "/file1"});
  466. }
  467. TEST(VirtualFileSystemTest, OverlayRecursiveIteration) {
  468. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  469. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  470. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  471. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  472. new vfs::OverlayFileSystem(Lower));
  473. O->pushOverlay(Middle);
  474. O->pushOverlay(Upper);
  475. std::error_code EC;
  476. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  477. ArrayRef<StringRef>());
  478. Lower->addRegularFile("/file1");
  479. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  480. ArrayRef<StringRef>("/file1"));
  481. Upper->addDirectory("/dir");
  482. Upper->addRegularFile("/dir/file2");
  483. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  484. {"/dir", "/dir/file2", "/file1"});
  485. Lower->addDirectory("/dir1");
  486. Lower->addRegularFile("/dir1/foo");
  487. Lower->addDirectory("/dir1/a");
  488. Lower->addRegularFile("/dir1/a/b");
  489. Middle->addDirectory("/a");
  490. Middle->addDirectory("/a/b");
  491. Middle->addDirectory("/a/b/c");
  492. Middle->addRegularFile("/a/b/c/d");
  493. Middle->addRegularFile("/hiddenByUp");
  494. Upper->addDirectory("/dir2");
  495. Upper->addRegularFile("/dir2/foo");
  496. Upper->addRegularFile("/hiddenByUp");
  497. checkContents(vfs::recursive_directory_iterator(*O, "/dir2", EC),
  498. ArrayRef<StringRef>("/dir2/foo"));
  499. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  500. {"/dir", "/dir/file2", "/dir2", "/dir2/foo", "/hiddenByUp",
  501. "/a", "/a/b", "/a/b/c", "/a/b/c/d", "/dir1", "/dir1/a",
  502. "/dir1/a/b", "/dir1/foo", "/file1"});
  503. }
  504. TEST(VirtualFileSystemTest, ThreeLevelIteration) {
  505. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  506. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  507. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  508. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  509. new vfs::OverlayFileSystem(Lower));
  510. O->pushOverlay(Middle);
  511. O->pushOverlay(Upper);
  512. std::error_code EC;
  513. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>());
  514. Middle->addRegularFile("/file2");
  515. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>("/file2"));
  516. Lower->addRegularFile("/file1");
  517. Upper->addRegularFile("/file3");
  518. checkContents(O->dir_begin("/", EC), {"/file3", "/file2", "/file1"});
  519. }
  520. TEST(VirtualFileSystemTest, HiddenInIteration) {
  521. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  522. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  523. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  524. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  525. new vfs::OverlayFileSystem(Lower));
  526. O->pushOverlay(Middle);
  527. O->pushOverlay(Upper);
  528. std::error_code EC;
  529. Lower->addRegularFile("/onlyInLow", sys::fs::owner_read);
  530. Lower->addRegularFile("/hiddenByMid", sys::fs::owner_read);
  531. Lower->addRegularFile("/hiddenByUp", sys::fs::owner_read);
  532. Middle->addRegularFile("/onlyInMid", sys::fs::owner_write);
  533. Middle->addRegularFile("/hiddenByMid", sys::fs::owner_write);
  534. Middle->addRegularFile("/hiddenByUp", sys::fs::owner_write);
  535. Upper->addRegularFile("/onlyInUp", sys::fs::owner_all);
  536. Upper->addRegularFile("/hiddenByUp", sys::fs::owner_all);
  537. checkContents(
  538. O->dir_begin("/", EC),
  539. {"/hiddenByUp", "/onlyInUp", "/hiddenByMid", "/onlyInMid", "/onlyInLow"});
  540. // Make sure we get the top-most entry
  541. {
  542. std::error_code EC;
  543. vfs::directory_iterator I = O->dir_begin("/", EC), E;
  544. for ( ; !EC && I != E; I.increment(EC))
  545. if (I->getName() == "/hiddenByUp")
  546. break;
  547. ASSERT_NE(E, I);
  548. EXPECT_EQ(sys::fs::owner_all, I->getPermissions());
  549. }
  550. {
  551. std::error_code EC;
  552. vfs::directory_iterator I = O->dir_begin("/", EC), E;
  553. for ( ; !EC && I != E; I.increment(EC))
  554. if (I->getName() == "/hiddenByMid")
  555. break;
  556. ASSERT_NE(E, I);
  557. EXPECT_EQ(sys::fs::owner_write, I->getPermissions());
  558. }
  559. }
  560. class InMemoryFileSystemTest : public ::testing::Test {
  561. protected:
  562. clang::vfs::InMemoryFileSystem FS;
  563. clang::vfs::InMemoryFileSystem NormalizedFS;
  564. InMemoryFileSystemTest()
  565. : FS(/*UseNormalizedPaths=*/false),
  566. NormalizedFS(/*UseNormalizedPaths=*/true) {}
  567. };
  568. TEST_F(InMemoryFileSystemTest, IsEmpty) {
  569. auto Stat = FS.status("/a");
  570. ASSERT_EQ(Stat.getError(),errc::no_such_file_or_directory) << FS.toString();
  571. Stat = FS.status("/");
  572. ASSERT_EQ(Stat.getError(), errc::no_such_file_or_directory) << FS.toString();
  573. }
  574. TEST_F(InMemoryFileSystemTest, WindowsPath) {
  575. FS.addFile("c:/windows/system128/foo.cpp", 0, MemoryBuffer::getMemBuffer(""));
  576. auto Stat = FS.status("c:");
  577. #if !defined(_WIN32)
  578. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  579. #endif
  580. Stat = FS.status("c:/windows/system128/foo.cpp");
  581. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  582. FS.addFile("d:/windows/foo.cpp", 0, MemoryBuffer::getMemBuffer(""));
  583. Stat = FS.status("d:/windows/foo.cpp");
  584. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  585. }
  586. TEST_F(InMemoryFileSystemTest, OverlayFile) {
  587. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  588. NormalizedFS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  589. auto Stat = FS.status("/");
  590. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  591. Stat = FS.status("/.");
  592. ASSERT_FALSE(Stat);
  593. Stat = NormalizedFS.status("/.");
  594. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  595. Stat = FS.status("/a");
  596. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  597. ASSERT_EQ("/a", Stat->getName());
  598. }
  599. TEST_F(InMemoryFileSystemTest, OverlayFileNoOwn) {
  600. auto Buf = MemoryBuffer::getMemBuffer("a");
  601. FS.addFileNoOwn("/a", 0, Buf.get());
  602. auto Stat = FS.status("/a");
  603. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  604. ASSERT_EQ("/a", Stat->getName());
  605. }
  606. TEST_F(InMemoryFileSystemTest, OpenFileForRead) {
  607. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  608. FS.addFile("././c", 0, MemoryBuffer::getMemBuffer("c"));
  609. FS.addFile("./d/../d", 0, MemoryBuffer::getMemBuffer("d"));
  610. NormalizedFS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  611. NormalizedFS.addFile("././c", 0, MemoryBuffer::getMemBuffer("c"));
  612. NormalizedFS.addFile("./d/../d", 0, MemoryBuffer::getMemBuffer("d"));
  613. auto File = FS.openFileForRead("/a");
  614. ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
  615. File = FS.openFileForRead("/a"); // Open again.
  616. ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
  617. File = NormalizedFS.openFileForRead("/././a"); // Open again.
  618. ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
  619. File = FS.openFileForRead("/");
  620. ASSERT_EQ(File.getError(), errc::invalid_argument) << FS.toString();
  621. File = FS.openFileForRead("/b");
  622. ASSERT_EQ(File.getError(), errc::no_such_file_or_directory) << FS.toString();
  623. File = FS.openFileForRead("./c");
  624. ASSERT_FALSE(File);
  625. File = FS.openFileForRead("e/../d");
  626. ASSERT_FALSE(File);
  627. File = NormalizedFS.openFileForRead("./c");
  628. ASSERT_EQ("c", (*(*File)->getBuffer("ignored"))->getBuffer());
  629. File = NormalizedFS.openFileForRead("e/../d");
  630. ASSERT_EQ("d", (*(*File)->getBuffer("ignored"))->getBuffer());
  631. }
  632. TEST_F(InMemoryFileSystemTest, DuplicatedFile) {
  633. ASSERT_TRUE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a")));
  634. ASSERT_FALSE(FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("a")));
  635. ASSERT_TRUE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a")));
  636. ASSERT_FALSE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("b")));
  637. }
  638. TEST_F(InMemoryFileSystemTest, DirectoryIteration) {
  639. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer(""));
  640. FS.addFile("/b/c", 0, MemoryBuffer::getMemBuffer(""));
  641. std::error_code EC;
  642. vfs::directory_iterator I = FS.dir_begin("/", EC);
  643. ASSERT_FALSE(EC);
  644. ASSERT_EQ("/a", I->getName());
  645. I.increment(EC);
  646. ASSERT_FALSE(EC);
  647. ASSERT_EQ("/b", I->getName());
  648. I.increment(EC);
  649. ASSERT_FALSE(EC);
  650. ASSERT_EQ(vfs::directory_iterator(), I);
  651. I = FS.dir_begin("/b", EC);
  652. ASSERT_FALSE(EC);
  653. ASSERT_EQ("/b/c", I->getName());
  654. I.increment(EC);
  655. ASSERT_FALSE(EC);
  656. ASSERT_EQ(vfs::directory_iterator(), I);
  657. }
  658. TEST_F(InMemoryFileSystemTest, WorkingDirectory) {
  659. FS.setCurrentWorkingDirectory("/b");
  660. FS.addFile("c", 0, MemoryBuffer::getMemBuffer(""));
  661. auto Stat = FS.status("/b/c");
  662. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  663. ASSERT_EQ("c", Stat->getName());
  664. ASSERT_EQ("/b", *FS.getCurrentWorkingDirectory());
  665. Stat = FS.status("c");
  666. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  667. auto ReplaceBackslashes = [](std::string S) {
  668. std::replace(S.begin(), S.end(), '\\', '/');
  669. return S;
  670. };
  671. NormalizedFS.setCurrentWorkingDirectory("/b/c");
  672. NormalizedFS.setCurrentWorkingDirectory(".");
  673. ASSERT_EQ("/b/c", ReplaceBackslashes(
  674. NormalizedFS.getCurrentWorkingDirectory().get()));
  675. NormalizedFS.setCurrentWorkingDirectory("..");
  676. ASSERT_EQ("/b", ReplaceBackslashes(
  677. NormalizedFS.getCurrentWorkingDirectory().get()));
  678. }
  679. TEST_F(InMemoryFileSystemTest, AddFileWithUser) {
  680. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), 0xFEEDFACE);
  681. auto Stat = FS.status("/a");
  682. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  683. ASSERT_TRUE(Stat->isDirectory());
  684. ASSERT_EQ(0xFEEDFACE, Stat->getUser());
  685. Stat = FS.status("/a/b");
  686. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  687. ASSERT_TRUE(Stat->isDirectory());
  688. ASSERT_EQ(0xFEEDFACE, Stat->getUser());
  689. Stat = FS.status("/a/b/c");
  690. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  691. ASSERT_TRUE(Stat->isRegularFile());
  692. ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
  693. ASSERT_EQ(0xFEEDFACE, Stat->getUser());
  694. }
  695. TEST_F(InMemoryFileSystemTest, AddFileWithGroup) {
  696. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, 0xDABBAD00);
  697. auto Stat = FS.status("/a");
  698. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  699. ASSERT_TRUE(Stat->isDirectory());
  700. ASSERT_EQ(0xDABBAD00, Stat->getGroup());
  701. Stat = FS.status("/a/b");
  702. ASSERT_TRUE(Stat->isDirectory());
  703. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  704. ASSERT_EQ(0xDABBAD00, Stat->getGroup());
  705. Stat = FS.status("/a/b/c");
  706. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  707. ASSERT_TRUE(Stat->isRegularFile());
  708. ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
  709. ASSERT_EQ(0xDABBAD00, Stat->getGroup());
  710. }
  711. TEST_F(InMemoryFileSystemTest, AddFileWithFileType) {
  712. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, None,
  713. sys::fs::file_type::socket_file);
  714. auto Stat = FS.status("/a");
  715. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  716. ASSERT_TRUE(Stat->isDirectory());
  717. Stat = FS.status("/a/b");
  718. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  719. ASSERT_TRUE(Stat->isDirectory());
  720. Stat = FS.status("/a/b/c");
  721. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  722. ASSERT_EQ(sys::fs::file_type::socket_file, Stat->getType());
  723. ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
  724. }
  725. TEST_F(InMemoryFileSystemTest, AddFileWithPerms) {
  726. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, None,
  727. None, sys::fs::perms::owner_read | sys::fs::perms::owner_write);
  728. auto Stat = FS.status("/a");
  729. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  730. ASSERT_TRUE(Stat->isDirectory());
  731. ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write |
  732. sys::fs::perms::owner_exe, Stat->getPermissions());
  733. Stat = FS.status("/a/b");
  734. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  735. ASSERT_TRUE(Stat->isDirectory());
  736. ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write |
  737. sys::fs::perms::owner_exe, Stat->getPermissions());
  738. Stat = FS.status("/a/b/c");
  739. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  740. ASSERT_TRUE(Stat->isRegularFile());
  741. ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write,
  742. Stat->getPermissions());
  743. }
  744. TEST_F(InMemoryFileSystemTest, AddDirectoryThenAddChild) {
  745. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer(""), /*User=*/None,
  746. /*Group=*/None, sys::fs::file_type::directory_file);
  747. FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("abc"), /*User=*/None,
  748. /*Group=*/None, sys::fs::file_type::regular_file);
  749. auto Stat = FS.status("/a");
  750. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  751. ASSERT_TRUE(Stat->isDirectory());
  752. Stat = FS.status("/a/b");
  753. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  754. ASSERT_TRUE(Stat->isRegularFile());
  755. }
  756. // NOTE: in the tests below, we use '//root/' as our root directory, since it is
  757. // a legal *absolute* path on Windows as well as *nix.
  758. class VFSFromYAMLTest : public ::testing::Test {
  759. public:
  760. int NumDiagnostics;
  761. void SetUp() override { NumDiagnostics = 0; }
  762. static void CountingDiagHandler(const SMDiagnostic &, void *Context) {
  763. VFSFromYAMLTest *Test = static_cast<VFSFromYAMLTest *>(Context);
  764. ++Test->NumDiagnostics;
  765. }
  766. IntrusiveRefCntPtr<vfs::FileSystem>
  767. getFromYAMLRawString(StringRef Content,
  768. IntrusiveRefCntPtr<vfs::FileSystem> ExternalFS) {
  769. std::unique_ptr<MemoryBuffer> Buffer = MemoryBuffer::getMemBuffer(Content);
  770. return getVFSFromYAML(std::move(Buffer), CountingDiagHandler, "", this,
  771. ExternalFS);
  772. }
  773. IntrusiveRefCntPtr<vfs::FileSystem> getFromYAMLString(
  774. StringRef Content,
  775. IntrusiveRefCntPtr<vfs::FileSystem> ExternalFS = new DummyFileSystem()) {
  776. std::string VersionPlusContent("{\n 'version':0,\n");
  777. VersionPlusContent += Content.slice(Content.find('{') + 1, StringRef::npos);
  778. return getFromYAMLRawString(VersionPlusContent, ExternalFS);
  779. }
  780. // This is intended as a "XFAIL" for windows hosts.
  781. bool supportsSameDirMultipleYAMLEntries() {
  782. Triple Host(Triple::normalize(sys::getProcessTriple()));
  783. return !Host.isOSWindows();
  784. }
  785. };
  786. TEST_F(VFSFromYAMLTest, BasicVFSFromYAML) {
  787. IntrusiveRefCntPtr<vfs::FileSystem> FS;
  788. FS = getFromYAMLString("");
  789. EXPECT_EQ(nullptr, FS.get());
  790. FS = getFromYAMLString("[]");
  791. EXPECT_EQ(nullptr, FS.get());
  792. FS = getFromYAMLString("'string'");
  793. EXPECT_EQ(nullptr, FS.get());
  794. EXPECT_EQ(3, NumDiagnostics);
  795. }
  796. TEST_F(VFSFromYAMLTest, MappedFiles) {
  797. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  798. Lower->addRegularFile("//root/foo/bar/a");
  799. IntrusiveRefCntPtr<vfs::FileSystem> FS =
  800. getFromYAMLString("{ 'roots': [\n"
  801. "{\n"
  802. " 'type': 'directory',\n"
  803. " 'name': '//root/',\n"
  804. " 'contents': [ {\n"
  805. " 'type': 'file',\n"
  806. " 'name': 'file1',\n"
  807. " 'external-contents': '//root/foo/bar/a'\n"
  808. " },\n"
  809. " {\n"
  810. " 'type': 'file',\n"
  811. " 'name': 'file2',\n"
  812. " 'external-contents': '//root/foo/b'\n"
  813. " }\n"
  814. " ]\n"
  815. "}\n"
  816. "]\n"
  817. "}",
  818. Lower);
  819. ASSERT_TRUE(FS.get() != nullptr);
  820. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  821. new vfs::OverlayFileSystem(Lower));
  822. O->pushOverlay(FS);
  823. // file
  824. ErrorOr<vfs::Status> S = O->status("//root/file1");
  825. ASSERT_FALSE(S.getError());
  826. EXPECT_EQ("//root/foo/bar/a", S->getName());
  827. EXPECT_TRUE(S->IsVFSMapped);
  828. ErrorOr<vfs::Status> SLower = O->status("//root/foo/bar/a");
  829. EXPECT_EQ("//root/foo/bar/a", SLower->getName());
  830. EXPECT_TRUE(S->equivalent(*SLower));
  831. EXPECT_FALSE(SLower->IsVFSMapped);
  832. // file after opening
  833. auto OpenedF = O->openFileForRead("//root/file1");
  834. ASSERT_FALSE(OpenedF.getError());
  835. auto OpenedS = (*OpenedF)->status();
  836. ASSERT_FALSE(OpenedS.getError());
  837. EXPECT_EQ("//root/foo/bar/a", OpenedS->getName());
  838. EXPECT_TRUE(OpenedS->IsVFSMapped);
  839. // directory
  840. S = O->status("//root/");
  841. ASSERT_FALSE(S.getError());
  842. EXPECT_TRUE(S->isDirectory());
  843. EXPECT_TRUE(S->equivalent(*O->status("//root/"))); // non-volatile UniqueID
  844. // broken mapping
  845. EXPECT_EQ(O->status("//root/file2").getError(),
  846. llvm::errc::no_such_file_or_directory);
  847. EXPECT_EQ(0, NumDiagnostics);
  848. }
  849. TEST_F(VFSFromYAMLTest, CaseInsensitive) {
  850. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  851. Lower->addRegularFile("//root/foo/bar/a");
  852. IntrusiveRefCntPtr<vfs::FileSystem> FS =
  853. getFromYAMLString("{ 'case-sensitive': 'false',\n"
  854. " 'roots': [\n"
  855. "{\n"
  856. " 'type': 'directory',\n"
  857. " 'name': '//root/',\n"
  858. " 'contents': [ {\n"
  859. " 'type': 'file',\n"
  860. " 'name': 'XX',\n"
  861. " 'external-contents': '//root/foo/bar/a'\n"
  862. " }\n"
  863. " ]\n"
  864. "}]}",
  865. Lower);
  866. ASSERT_TRUE(FS.get() != nullptr);
  867. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  868. new vfs::OverlayFileSystem(Lower));
  869. O->pushOverlay(FS);
  870. ErrorOr<vfs::Status> S = O->status("//root/XX");
  871. ASSERT_FALSE(S.getError());
  872. ErrorOr<vfs::Status> SS = O->status("//root/xx");
  873. ASSERT_FALSE(SS.getError());
  874. EXPECT_TRUE(S->equivalent(*SS));
  875. SS = O->status("//root/xX");
  876. EXPECT_TRUE(S->equivalent(*SS));
  877. SS = O->status("//root/Xx");
  878. EXPECT_TRUE(S->equivalent(*SS));
  879. EXPECT_EQ(0, NumDiagnostics);
  880. }
  881. TEST_F(VFSFromYAMLTest, CaseSensitive) {
  882. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  883. Lower->addRegularFile("//root/foo/bar/a");
  884. IntrusiveRefCntPtr<vfs::FileSystem> FS =
  885. getFromYAMLString("{ 'case-sensitive': 'true',\n"
  886. " 'roots': [\n"
  887. "{\n"
  888. " 'type': 'directory',\n"
  889. " 'name': '//root/',\n"
  890. " 'contents': [ {\n"
  891. " 'type': 'file',\n"
  892. " 'name': 'XX',\n"
  893. " 'external-contents': '//root/foo/bar/a'\n"
  894. " }\n"
  895. " ]\n"
  896. "}]}",
  897. Lower);
  898. ASSERT_TRUE(FS.get() != nullptr);
  899. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  900. new vfs::OverlayFileSystem(Lower));
  901. O->pushOverlay(FS);
  902. ErrorOr<vfs::Status> SS = O->status("//root/xx");
  903. EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
  904. SS = O->status("//root/xX");
  905. EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
  906. SS = O->status("//root/Xx");
  907. EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
  908. EXPECT_EQ(0, NumDiagnostics);
  909. }
  910. TEST_F(VFSFromYAMLTest, IllegalVFSFile) {
  911. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  912. // invalid YAML at top-level
  913. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString("{]", Lower);
  914. EXPECT_EQ(nullptr, FS.get());
  915. // invalid YAML in roots
  916. FS = getFromYAMLString("{ 'roots':[}", Lower);
  917. // invalid YAML in directory
  918. FS = getFromYAMLString(
  919. "{ 'roots':[ { 'name': 'foo', 'type': 'directory', 'contents': [}",
  920. Lower);
  921. EXPECT_EQ(nullptr, FS.get());
  922. // invalid configuration
  923. FS = getFromYAMLString("{ 'knobular': 'true', 'roots':[] }", Lower);
  924. EXPECT_EQ(nullptr, FS.get());
  925. FS = getFromYAMLString("{ 'case-sensitive': 'maybe', 'roots':[] }", Lower);
  926. EXPECT_EQ(nullptr, FS.get());
  927. // invalid roots
  928. FS = getFromYAMLString("{ 'roots':'' }", Lower);
  929. EXPECT_EQ(nullptr, FS.get());
  930. FS = getFromYAMLString("{ 'roots':{} }", Lower);
  931. EXPECT_EQ(nullptr, FS.get());
  932. // invalid entries
  933. FS = getFromYAMLString(
  934. "{ 'roots':[ { 'type': 'other', 'name': 'me', 'contents': '' }", Lower);
  935. EXPECT_EQ(nullptr, FS.get());
  936. FS = getFromYAMLString("{ 'roots':[ { 'type': 'file', 'name': [], "
  937. "'external-contents': 'other' }",
  938. Lower);
  939. EXPECT_EQ(nullptr, FS.get());
  940. FS = getFromYAMLString(
  941. "{ 'roots':[ { 'type': 'file', 'name': 'me', 'external-contents': [] }",
  942. Lower);
  943. EXPECT_EQ(nullptr, FS.get());
  944. FS = getFromYAMLString(
  945. "{ 'roots':[ { 'type': 'file', 'name': 'me', 'external-contents': {} }",
  946. Lower);
  947. EXPECT_EQ(nullptr, FS.get());
  948. FS = getFromYAMLString(
  949. "{ 'roots':[ { 'type': 'directory', 'name': 'me', 'contents': {} }",
  950. Lower);
  951. EXPECT_EQ(nullptr, FS.get());
  952. FS = getFromYAMLString(
  953. "{ 'roots':[ { 'type': 'directory', 'name': 'me', 'contents': '' }",
  954. Lower);
  955. EXPECT_EQ(nullptr, FS.get());
  956. FS = getFromYAMLString(
  957. "{ 'roots':[ { 'thingy': 'directory', 'name': 'me', 'contents': [] }",
  958. Lower);
  959. EXPECT_EQ(nullptr, FS.get());
  960. // missing mandatory fields
  961. FS = getFromYAMLString("{ 'roots':[ { 'type': 'file', 'name': 'me' }", Lower);
  962. EXPECT_EQ(nullptr, FS.get());
  963. FS = getFromYAMLString(
  964. "{ 'roots':[ { 'type': 'file', 'external-contents': 'other' }", Lower);
  965. EXPECT_EQ(nullptr, FS.get());
  966. FS = getFromYAMLString("{ 'roots':[ { 'name': 'me', 'contents': [] }", Lower);
  967. EXPECT_EQ(nullptr, FS.get());
  968. // duplicate keys
  969. FS = getFromYAMLString("{ 'roots':[], 'roots':[] }", Lower);
  970. EXPECT_EQ(nullptr, FS.get());
  971. FS = getFromYAMLString(
  972. "{ 'case-sensitive':'true', 'case-sensitive':'true', 'roots':[] }",
  973. Lower);
  974. EXPECT_EQ(nullptr, FS.get());
  975. FS =
  976. getFromYAMLString("{ 'roots':[{'name':'me', 'name':'you', 'type':'file', "
  977. "'external-contents':'blah' } ] }",
  978. Lower);
  979. EXPECT_EQ(nullptr, FS.get());
  980. // missing version
  981. FS = getFromYAMLRawString("{ 'roots':[] }", Lower);
  982. EXPECT_EQ(nullptr, FS.get());
  983. // bad version number
  984. FS = getFromYAMLRawString("{ 'version':'foo', 'roots':[] }", Lower);
  985. EXPECT_EQ(nullptr, FS.get());
  986. FS = getFromYAMLRawString("{ 'version':-1, 'roots':[] }", Lower);
  987. EXPECT_EQ(nullptr, FS.get());
  988. FS = getFromYAMLRawString("{ 'version':100000, 'roots':[] }", Lower);
  989. EXPECT_EQ(nullptr, FS.get());
  990. EXPECT_EQ(24, NumDiagnostics);
  991. }
  992. TEST_F(VFSFromYAMLTest, UseExternalName) {
  993. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  994. Lower->addRegularFile("//root/external/file");
  995. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  996. "{ 'roots': [\n"
  997. " { 'type': 'file', 'name': '//root/A',\n"
  998. " 'external-contents': '//root/external/file'\n"
  999. " },\n"
  1000. " { 'type': 'file', 'name': '//root/B',\n"
  1001. " 'use-external-name': true,\n"
  1002. " 'external-contents': '//root/external/file'\n"
  1003. " },\n"
  1004. " { 'type': 'file', 'name': '//root/C',\n"
  1005. " 'use-external-name': false,\n"
  1006. " 'external-contents': '//root/external/file'\n"
  1007. " }\n"
  1008. "] }", Lower);
  1009. ASSERT_TRUE(nullptr != FS.get());
  1010. // default true
  1011. EXPECT_EQ("//root/external/file", FS->status("//root/A")->getName());
  1012. // explicit
  1013. EXPECT_EQ("//root/external/file", FS->status("//root/B")->getName());
  1014. EXPECT_EQ("//root/C", FS->status("//root/C")->getName());
  1015. // global configuration
  1016. FS = getFromYAMLString(
  1017. "{ 'use-external-names': false,\n"
  1018. " 'roots': [\n"
  1019. " { 'type': 'file', 'name': '//root/A',\n"
  1020. " 'external-contents': '//root/external/file'\n"
  1021. " },\n"
  1022. " { 'type': 'file', 'name': '//root/B',\n"
  1023. " 'use-external-name': true,\n"
  1024. " 'external-contents': '//root/external/file'\n"
  1025. " },\n"
  1026. " { 'type': 'file', 'name': '//root/C',\n"
  1027. " 'use-external-name': false,\n"
  1028. " 'external-contents': '//root/external/file'\n"
  1029. " }\n"
  1030. "] }", Lower);
  1031. ASSERT_TRUE(nullptr != FS.get());
  1032. // default
  1033. EXPECT_EQ("//root/A", FS->status("//root/A")->getName());
  1034. // explicit
  1035. EXPECT_EQ("//root/external/file", FS->status("//root/B")->getName());
  1036. EXPECT_EQ("//root/C", FS->status("//root/C")->getName());
  1037. }
  1038. TEST_F(VFSFromYAMLTest, MultiComponentPath) {
  1039. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1040. Lower->addRegularFile("//root/other");
  1041. // file in roots
  1042. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1043. "{ 'roots': [\n"
  1044. " { 'type': 'file', 'name': '//root/path/to/file',\n"
  1045. " 'external-contents': '//root/other' }]\n"
  1046. "}", Lower);
  1047. ASSERT_TRUE(nullptr != FS.get());
  1048. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1049. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1050. EXPECT_FALSE(FS->status("//root/path").getError());
  1051. EXPECT_FALSE(FS->status("//root/").getError());
  1052. // at the start
  1053. FS = getFromYAMLString(
  1054. "{ 'roots': [\n"
  1055. " { 'type': 'directory', 'name': '//root/path/to',\n"
  1056. " 'contents': [ { 'type': 'file', 'name': 'file',\n"
  1057. " 'external-contents': '//root/other' }]}]\n"
  1058. "}", Lower);
  1059. ASSERT_TRUE(nullptr != FS.get());
  1060. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1061. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1062. EXPECT_FALSE(FS->status("//root/path").getError());
  1063. EXPECT_FALSE(FS->status("//root/").getError());
  1064. // at the end
  1065. FS = getFromYAMLString(
  1066. "{ 'roots': [\n"
  1067. " { 'type': 'directory', 'name': '//root/',\n"
  1068. " 'contents': [ { 'type': 'file', 'name': 'path/to/file',\n"
  1069. " 'external-contents': '//root/other' }]}]\n"
  1070. "}", Lower);
  1071. ASSERT_TRUE(nullptr != FS.get());
  1072. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1073. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1074. EXPECT_FALSE(FS->status("//root/path").getError());
  1075. EXPECT_FALSE(FS->status("//root/").getError());
  1076. }
  1077. TEST_F(VFSFromYAMLTest, TrailingSlashes) {
  1078. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1079. Lower->addRegularFile("//root/other");
  1080. // file in roots
  1081. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1082. "{ 'roots': [\n"
  1083. " { 'type': 'directory', 'name': '//root/path/to////',\n"
  1084. " 'contents': [ { 'type': 'file', 'name': 'file',\n"
  1085. " 'external-contents': '//root/other' }]}]\n"
  1086. "}", Lower);
  1087. ASSERT_TRUE(nullptr != FS.get());
  1088. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1089. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1090. EXPECT_FALSE(FS->status("//root/path").getError());
  1091. EXPECT_FALSE(FS->status("//root/").getError());
  1092. }
  1093. TEST_F(VFSFromYAMLTest, DirectoryIteration) {
  1094. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1095. Lower->addDirectory("//root/");
  1096. Lower->addDirectory("//root/foo");
  1097. Lower->addDirectory("//root/foo/bar");
  1098. Lower->addRegularFile("//root/foo/bar/a");
  1099. Lower->addRegularFile("//root/foo/bar/b");
  1100. Lower->addRegularFile("//root/file3");
  1101. IntrusiveRefCntPtr<vfs::FileSystem> FS =
  1102. getFromYAMLString("{ 'use-external-names': false,\n"
  1103. " 'roots': [\n"
  1104. "{\n"
  1105. " 'type': 'directory',\n"
  1106. " 'name': '//root/',\n"
  1107. " 'contents': [ {\n"
  1108. " 'type': 'file',\n"
  1109. " 'name': 'file1',\n"
  1110. " 'external-contents': '//root/foo/bar/a'\n"
  1111. " },\n"
  1112. " {\n"
  1113. " 'type': 'file',\n"
  1114. " 'name': 'file2',\n"
  1115. " 'external-contents': '//root/foo/bar/b'\n"
  1116. " }\n"
  1117. " ]\n"
  1118. "}\n"
  1119. "]\n"
  1120. "}",
  1121. Lower);
  1122. ASSERT_TRUE(FS.get() != nullptr);
  1123. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1124. new vfs::OverlayFileSystem(Lower));
  1125. O->pushOverlay(FS);
  1126. std::error_code EC;
  1127. checkContents(O->dir_begin("//root/", EC),
  1128. {"//root/file1", "//root/file2", "//root/file3", "//root/foo"});
  1129. checkContents(O->dir_begin("//root/foo/bar", EC),
  1130. {"//root/foo/bar/a", "//root/foo/bar/b"});
  1131. }
  1132. TEST_F(VFSFromYAMLTest, DirectoryIterationSameDirMultipleEntries) {
  1133. // https://llvm.org/bugs/show_bug.cgi?id=27725
  1134. if (!supportsSameDirMultipleYAMLEntries())
  1135. return;
  1136. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1137. Lower->addDirectory("//root/zab");
  1138. Lower->addDirectory("//root/baz");
  1139. Lower->addRegularFile("//root/zab/a");
  1140. Lower->addRegularFile("//root/zab/b");
  1141. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1142. "{ 'use-external-names': false,\n"
  1143. " 'roots': [\n"
  1144. "{\n"
  1145. " 'type': 'directory',\n"
  1146. " 'name': '//root/baz/',\n"
  1147. " 'contents': [ {\n"
  1148. " 'type': 'file',\n"
  1149. " 'name': 'x',\n"
  1150. " 'external-contents': '//root/zab/a'\n"
  1151. " }\n"
  1152. " ]\n"
  1153. "},\n"
  1154. "{\n"
  1155. " 'type': 'directory',\n"
  1156. " 'name': '//root/baz/',\n"
  1157. " 'contents': [ {\n"
  1158. " 'type': 'file',\n"
  1159. " 'name': 'y',\n"
  1160. " 'external-contents': '//root/zab/b'\n"
  1161. " }\n"
  1162. " ]\n"
  1163. "}\n"
  1164. "]\n"
  1165. "}",
  1166. Lower);
  1167. ASSERT_TRUE(FS.get() != nullptr);
  1168. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1169. new vfs::OverlayFileSystem(Lower));
  1170. O->pushOverlay(FS);
  1171. std::error_code EC;
  1172. checkContents(O->dir_begin("//root/baz/", EC),
  1173. {"//root/baz/x", "//root/baz/y"});
  1174. }
  1175. TEST_F(VFSFromYAMLTest, RecursiveDirectoryIterationLevel) {
  1176. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1177. Lower->addDirectory("//root/a");
  1178. Lower->addDirectory("//root/a/b");
  1179. Lower->addDirectory("//root/a/b/c");
  1180. Lower->addRegularFile("//root/a/b/c/file");
  1181. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1182. "{ 'use-external-names': false,\n"
  1183. " 'roots': [\n"
  1184. "{\n"
  1185. " 'type': 'directory',\n"
  1186. " 'name': '//root/a/b/c/',\n"
  1187. " 'contents': [ {\n"
  1188. " 'type': 'file',\n"
  1189. " 'name': 'file',\n"
  1190. " 'external-contents': '//root/a/b/c/file'\n"
  1191. " }\n"
  1192. " ]\n"
  1193. "},\n"
  1194. "]\n"
  1195. "}",
  1196. Lower);
  1197. ASSERT_TRUE(FS.get() != nullptr);
  1198. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1199. new vfs::OverlayFileSystem(Lower));
  1200. O->pushOverlay(FS);
  1201. std::error_code EC;
  1202. // Test recursive_directory_iterator level()
  1203. vfs::recursive_directory_iterator I = vfs::recursive_directory_iterator(
  1204. *O, "//root", EC), E;
  1205. ASSERT_FALSE(EC);
  1206. for (int l = 0; I != E; I.increment(EC), ++l) {
  1207. ASSERT_FALSE(EC);
  1208. EXPECT_EQ(I.level(), l);
  1209. }
  1210. EXPECT_EQ(I, E);
  1211. }