VirtualFileSystemTest.cpp 73 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164
  1. //===- unittests/Support/VirtualFileSystem.cpp -------------- VFS tests ---===//
  2. //
  3. // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
  4. // See https://llvm.org/LICENSE.txt for license information.
  5. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  6. //
  7. //===----------------------------------------------------------------------===//
  8. #include "llvm/Support/VirtualFileSystem.h"
  9. #include "llvm/ADT/Triple.h"
  10. #include "llvm/Config/llvm-config.h"
  11. #include "llvm/Support/Errc.h"
  12. #include "llvm/Support/Host.h"
  13. #include "llvm/Support/MemoryBuffer.h"
  14. #include "llvm/Support/Path.h"
  15. #include "llvm/Support/SourceMgr.h"
  16. #include "gmock/gmock.h"
  17. #include "gtest/gtest.h"
  18. #include <map>
  19. #include <string>
  20. using namespace llvm;
  21. using llvm::sys::fs::UniqueID;
  22. using testing::ElementsAre;
  23. using testing::Pair;
  24. using testing::UnorderedElementsAre;
  25. namespace {
  26. struct DummyFile : public vfs::File {
  27. vfs::Status S;
  28. explicit DummyFile(vfs::Status S) : S(S) {}
  29. llvm::ErrorOr<vfs::Status> status() override { return S; }
  30. llvm::ErrorOr<std::unique_ptr<llvm::MemoryBuffer>>
  31. getBuffer(const Twine &Name, int64_t FileSize, bool RequiresNullTerminator,
  32. bool IsVolatile) override {
  33. llvm_unreachable("unimplemented");
  34. }
  35. std::error_code close() override { return std::error_code(); }
  36. };
  37. class DummyFileSystem : public vfs::FileSystem {
  38. int FSID; // used to produce UniqueIDs
  39. int FileID; // used to produce UniqueIDs
  40. std::string WorkingDirectory;
  41. std::map<std::string, vfs::Status> FilesAndDirs;
  42. typedef std::map<std::string, vfs::Status>::const_iterator const_iterator;
  43. static int getNextFSID() {
  44. static int Count = 0;
  45. return Count++;
  46. }
  47. public:
  48. DummyFileSystem() : FSID(getNextFSID()), FileID(0) {}
  49. ErrorOr<vfs::Status> status(const Twine &Path) override {
  50. auto I = findEntry(Path);
  51. if (I == FilesAndDirs.end())
  52. return make_error_code(llvm::errc::no_such_file_or_directory);
  53. return I->second;
  54. }
  55. ErrorOr<std::unique_ptr<vfs::File>>
  56. openFileForRead(const Twine &Path) override {
  57. auto S = status(Path);
  58. if (S)
  59. return std::unique_ptr<vfs::File>(new DummyFile{*S});
  60. return S.getError();
  61. }
  62. llvm::ErrorOr<std::string> getCurrentWorkingDirectory() const override {
  63. return WorkingDirectory;
  64. }
  65. std::error_code setCurrentWorkingDirectory(const Twine &Path) override {
  66. WorkingDirectory = Path.str();
  67. return std::error_code();
  68. }
  69. // Map any symlink to "/symlink".
  70. std::error_code getRealPath(const Twine &Path,
  71. SmallVectorImpl<char> &Output) const override {
  72. auto I = findEntry(Path);
  73. if (I == FilesAndDirs.end())
  74. return make_error_code(llvm::errc::no_such_file_or_directory);
  75. if (I->second.isSymlink()) {
  76. Output.clear();
  77. Twine("/symlink").toVector(Output);
  78. return std::error_code();
  79. }
  80. Output.clear();
  81. Path.toVector(Output);
  82. return std::error_code();
  83. }
  84. struct DirIterImpl : public llvm::vfs::detail::DirIterImpl {
  85. std::map<std::string, vfs::Status> &FilesAndDirs;
  86. std::map<std::string, vfs::Status>::iterator I;
  87. std::string Path;
  88. bool isInPath(StringRef S) {
  89. if (Path.size() < S.size() && S.find(Path) == 0) {
  90. auto LastSep = S.find_last_of('/');
  91. if (LastSep == Path.size() || LastSep == Path.size() - 1)
  92. return true;
  93. }
  94. return false;
  95. }
  96. DirIterImpl(std::map<std::string, vfs::Status> &FilesAndDirs,
  97. const Twine &_Path)
  98. : FilesAndDirs(FilesAndDirs), I(FilesAndDirs.begin()),
  99. Path(_Path.str()) {
  100. for (; I != FilesAndDirs.end(); ++I) {
  101. if (isInPath(I->first)) {
  102. CurrentEntry =
  103. vfs::directory_entry(I->second.getName(), I->second.getType());
  104. break;
  105. }
  106. }
  107. }
  108. std::error_code increment() override {
  109. ++I;
  110. for (; I != FilesAndDirs.end(); ++I) {
  111. if (isInPath(I->first)) {
  112. CurrentEntry =
  113. vfs::directory_entry(I->second.getName(), I->second.getType());
  114. break;
  115. }
  116. }
  117. if (I == FilesAndDirs.end())
  118. CurrentEntry = vfs::directory_entry();
  119. return std::error_code();
  120. }
  121. };
  122. vfs::directory_iterator dir_begin(const Twine &Dir,
  123. std::error_code &EC) override {
  124. return vfs::directory_iterator(
  125. std::make_shared<DirIterImpl>(FilesAndDirs, Dir));
  126. }
  127. void addEntry(StringRef Path, const vfs::Status &Status) {
  128. FilesAndDirs[Path] = Status;
  129. }
  130. const_iterator findEntry(const Twine &Path) const {
  131. SmallString<128> P;
  132. Path.toVector(P);
  133. std::error_code EC = makeAbsolute(P);
  134. assert(!EC);
  135. (void)EC;
  136. return FilesAndDirs.find(P.str());
  137. }
  138. void addRegularFile(StringRef Path, sys::fs::perms Perms = sys::fs::all_all) {
  139. vfs::Status S(Path, UniqueID(FSID, FileID++),
  140. std::chrono::system_clock::now(), 0, 0, 1024,
  141. sys::fs::file_type::regular_file, Perms);
  142. addEntry(Path, S);
  143. }
  144. void addDirectory(StringRef Path, sys::fs::perms Perms = sys::fs::all_all) {
  145. vfs::Status S(Path, UniqueID(FSID, FileID++),
  146. std::chrono::system_clock::now(), 0, 0, 0,
  147. sys::fs::file_type::directory_file, Perms);
  148. addEntry(Path, S);
  149. }
  150. void addSymlink(StringRef Path) {
  151. vfs::Status S(Path, UniqueID(FSID, FileID++),
  152. std::chrono::system_clock::now(), 0, 0, 0,
  153. sys::fs::file_type::symlink_file, sys::fs::all_all);
  154. addEntry(Path, S);
  155. }
  156. };
  157. class ErrorDummyFileSystem : public DummyFileSystem {
  158. std::error_code setCurrentWorkingDirectory(const Twine &Path) override {
  159. return llvm::errc::no_such_file_or_directory;
  160. }
  161. };
  162. /// Replace back-slashes by front-slashes.
  163. std::string getPosixPath(std::string S) {
  164. SmallString<128> Result;
  165. llvm::sys::path::native(S, Result, llvm::sys::path::Style::posix);
  166. return Result.str();
  167. }
  168. } // end anonymous namespace
  169. TEST(VirtualFileSystemTest, StatusQueries) {
  170. IntrusiveRefCntPtr<DummyFileSystem> D(new DummyFileSystem());
  171. ErrorOr<vfs::Status> Status((std::error_code()));
  172. D->addRegularFile("/foo");
  173. Status = D->status("/foo");
  174. ASSERT_FALSE(Status.getError());
  175. EXPECT_TRUE(Status->isStatusKnown());
  176. EXPECT_FALSE(Status->isDirectory());
  177. EXPECT_TRUE(Status->isRegularFile());
  178. EXPECT_FALSE(Status->isSymlink());
  179. EXPECT_FALSE(Status->isOther());
  180. EXPECT_TRUE(Status->exists());
  181. D->addDirectory("/bar");
  182. Status = D->status("/bar");
  183. ASSERT_FALSE(Status.getError());
  184. EXPECT_TRUE(Status->isStatusKnown());
  185. EXPECT_TRUE(Status->isDirectory());
  186. EXPECT_FALSE(Status->isRegularFile());
  187. EXPECT_FALSE(Status->isSymlink());
  188. EXPECT_FALSE(Status->isOther());
  189. EXPECT_TRUE(Status->exists());
  190. D->addSymlink("/baz");
  191. Status = D->status("/baz");
  192. ASSERT_FALSE(Status.getError());
  193. EXPECT_TRUE(Status->isStatusKnown());
  194. EXPECT_FALSE(Status->isDirectory());
  195. EXPECT_FALSE(Status->isRegularFile());
  196. EXPECT_TRUE(Status->isSymlink());
  197. EXPECT_FALSE(Status->isOther());
  198. EXPECT_TRUE(Status->exists());
  199. EXPECT_TRUE(Status->equivalent(*Status));
  200. ErrorOr<vfs::Status> Status2 = D->status("/foo");
  201. ASSERT_FALSE(Status2.getError());
  202. EXPECT_FALSE(Status->equivalent(*Status2));
  203. }
  204. TEST(VirtualFileSystemTest, BaseOnlyOverlay) {
  205. IntrusiveRefCntPtr<DummyFileSystem> D(new DummyFileSystem());
  206. ErrorOr<vfs::Status> Status((std::error_code()));
  207. EXPECT_FALSE(Status = D->status("/foo"));
  208. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(new vfs::OverlayFileSystem(D));
  209. EXPECT_FALSE(Status = O->status("/foo"));
  210. D->addRegularFile("/foo");
  211. Status = D->status("/foo");
  212. EXPECT_FALSE(Status.getError());
  213. ErrorOr<vfs::Status> Status2((std::error_code()));
  214. Status2 = O->status("/foo");
  215. EXPECT_FALSE(Status2.getError());
  216. EXPECT_TRUE(Status->equivalent(*Status2));
  217. }
  218. TEST(VirtualFileSystemTest, GetRealPathInOverlay) {
  219. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  220. Lower->addRegularFile("/foo");
  221. Lower->addSymlink("/lower_link");
  222. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  223. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  224. new vfs::OverlayFileSystem(Lower));
  225. O->pushOverlay(Upper);
  226. // Regular file.
  227. SmallString<16> RealPath;
  228. EXPECT_FALSE(O->getRealPath("/foo", RealPath));
  229. EXPECT_EQ(RealPath.str(), "/foo");
  230. // Expect no error getting real path for symlink in lower overlay.
  231. EXPECT_FALSE(O->getRealPath("/lower_link", RealPath));
  232. EXPECT_EQ(RealPath.str(), "/symlink");
  233. // Try a non-existing link.
  234. EXPECT_EQ(O->getRealPath("/upper_link", RealPath),
  235. errc::no_such_file_or_directory);
  236. // Add a new symlink in upper.
  237. Upper->addSymlink("/upper_link");
  238. EXPECT_FALSE(O->getRealPath("/upper_link", RealPath));
  239. EXPECT_EQ(RealPath.str(), "/symlink");
  240. }
  241. TEST(VirtualFileSystemTest, OverlayFiles) {
  242. IntrusiveRefCntPtr<DummyFileSystem> Base(new DummyFileSystem());
  243. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  244. IntrusiveRefCntPtr<DummyFileSystem> Top(new DummyFileSystem());
  245. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  246. new vfs::OverlayFileSystem(Base));
  247. O->pushOverlay(Middle);
  248. O->pushOverlay(Top);
  249. ErrorOr<vfs::Status> Status1((std::error_code())),
  250. Status2((std::error_code())), Status3((std::error_code())),
  251. StatusB((std::error_code())), StatusM((std::error_code())),
  252. StatusT((std::error_code()));
  253. Base->addRegularFile("/foo");
  254. StatusB = Base->status("/foo");
  255. ASSERT_FALSE(StatusB.getError());
  256. Status1 = O->status("/foo");
  257. ASSERT_FALSE(Status1.getError());
  258. Middle->addRegularFile("/foo");
  259. StatusM = Middle->status("/foo");
  260. ASSERT_FALSE(StatusM.getError());
  261. Status2 = O->status("/foo");
  262. ASSERT_FALSE(Status2.getError());
  263. Top->addRegularFile("/foo");
  264. StatusT = Top->status("/foo");
  265. ASSERT_FALSE(StatusT.getError());
  266. Status3 = O->status("/foo");
  267. ASSERT_FALSE(Status3.getError());
  268. EXPECT_TRUE(Status1->equivalent(*StatusB));
  269. EXPECT_TRUE(Status2->equivalent(*StatusM));
  270. EXPECT_TRUE(Status3->equivalent(*StatusT));
  271. EXPECT_FALSE(Status1->equivalent(*Status2));
  272. EXPECT_FALSE(Status2->equivalent(*Status3));
  273. EXPECT_FALSE(Status1->equivalent(*Status3));
  274. }
  275. TEST(VirtualFileSystemTest, OverlayDirsNonMerged) {
  276. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  277. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  278. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  279. new vfs::OverlayFileSystem(Lower));
  280. O->pushOverlay(Upper);
  281. Lower->addDirectory("/lower-only");
  282. Upper->addDirectory("/upper-only");
  283. // non-merged paths should be the same
  284. ErrorOr<vfs::Status> Status1 = Lower->status("/lower-only");
  285. ASSERT_FALSE(Status1.getError());
  286. ErrorOr<vfs::Status> Status2 = O->status("/lower-only");
  287. ASSERT_FALSE(Status2.getError());
  288. EXPECT_TRUE(Status1->equivalent(*Status2));
  289. Status1 = Upper->status("/upper-only");
  290. ASSERT_FALSE(Status1.getError());
  291. Status2 = O->status("/upper-only");
  292. ASSERT_FALSE(Status2.getError());
  293. EXPECT_TRUE(Status1->equivalent(*Status2));
  294. }
  295. TEST(VirtualFileSystemTest, MergedDirPermissions) {
  296. // merged directories get the permissions of the upper dir
  297. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  298. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  299. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  300. new vfs::OverlayFileSystem(Lower));
  301. O->pushOverlay(Upper);
  302. ErrorOr<vfs::Status> Status((std::error_code()));
  303. Lower->addDirectory("/both", sys::fs::owner_read);
  304. Upper->addDirectory("/both", sys::fs::owner_all | sys::fs::group_read);
  305. Status = O->status("/both");
  306. ASSERT_FALSE(Status.getError());
  307. EXPECT_EQ(0740, Status->getPermissions());
  308. // permissions (as usual) are not recursively applied
  309. Lower->addRegularFile("/both/foo", sys::fs::owner_read);
  310. Upper->addRegularFile("/both/bar", sys::fs::owner_write);
  311. Status = O->status("/both/foo");
  312. ASSERT_FALSE(Status.getError());
  313. EXPECT_EQ(0400, Status->getPermissions());
  314. Status = O->status("/both/bar");
  315. ASSERT_FALSE(Status.getError());
  316. EXPECT_EQ(0200, Status->getPermissions());
  317. }
  318. TEST(VirtualFileSystemTest, OverlayIterator) {
  319. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  320. Lower->addRegularFile("/foo");
  321. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  322. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  323. new vfs::OverlayFileSystem(Lower));
  324. O->pushOverlay(Upper);
  325. ErrorOr<vfs::Status> Status((std::error_code()));
  326. {
  327. auto it = O->overlays_begin();
  328. auto end = O->overlays_end();
  329. EXPECT_NE(it, end);
  330. Status = (*it)->status("/foo");
  331. ASSERT_TRUE(Status.getError());
  332. it++;
  333. EXPECT_NE(it, end);
  334. Status = (*it)->status("/foo");
  335. ASSERT_FALSE(Status.getError());
  336. EXPECT_TRUE(Status->exists());
  337. it++;
  338. EXPECT_EQ(it, end);
  339. }
  340. {
  341. auto it = O->overlays_rbegin();
  342. auto end = O->overlays_rend();
  343. EXPECT_NE(it, end);
  344. Status = (*it)->status("/foo");
  345. ASSERT_FALSE(Status.getError());
  346. EXPECT_TRUE(Status->exists());
  347. it++;
  348. EXPECT_NE(it, end);
  349. Status = (*it)->status("/foo");
  350. ASSERT_TRUE(Status.getError());
  351. it++;
  352. EXPECT_EQ(it, end);
  353. }
  354. }
  355. namespace {
  356. struct ScopedDir {
  357. SmallString<128> Path;
  358. ScopedDir(const Twine &Name, bool Unique = false) {
  359. std::error_code EC;
  360. if (Unique) {
  361. EC = llvm::sys::fs::createUniqueDirectory(Name, Path);
  362. if (!EC) {
  363. // Resolve any symlinks in the new directory.
  364. std::string UnresolvedPath = Path.str();
  365. EC = llvm::sys::fs::real_path(UnresolvedPath, Path);
  366. }
  367. } else {
  368. Path = Name.str();
  369. EC = llvm::sys::fs::create_directory(Twine(Path));
  370. }
  371. if (EC)
  372. Path = "";
  373. EXPECT_FALSE(EC) << EC.message();
  374. }
  375. ~ScopedDir() {
  376. if (Path != "") {
  377. EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
  378. }
  379. }
  380. operator StringRef() { return Path.str(); }
  381. };
  382. struct ScopedLink {
  383. SmallString<128> Path;
  384. ScopedLink(const Twine &To, const Twine &From) {
  385. Path = From.str();
  386. std::error_code EC = sys::fs::create_link(To, From);
  387. if (EC)
  388. Path = "";
  389. EXPECT_FALSE(EC);
  390. }
  391. ~ScopedLink() {
  392. if (Path != "") {
  393. EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
  394. }
  395. }
  396. operator StringRef() { return Path.str(); }
  397. };
  398. struct ScopedFile {
  399. SmallString<128> Path;
  400. ScopedFile(const Twine &Path, StringRef Contents) {
  401. Path.toVector(this->Path);
  402. std::error_code EC;
  403. raw_fd_ostream OS(this->Path, EC);
  404. EXPECT_FALSE(EC);
  405. OS << Contents;
  406. OS.flush();
  407. EXPECT_FALSE(OS.error());
  408. if (EC || OS.error())
  409. this->Path = "";
  410. }
  411. ~ScopedFile() {
  412. if (Path != "") {
  413. EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
  414. }
  415. }
  416. };
  417. } // end anonymous namespace
  418. TEST(VirtualFileSystemTest, BasicRealFSIteration) {
  419. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  420. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  421. std::error_code EC;
  422. vfs::directory_iterator I = FS->dir_begin(Twine(TestDirectory), EC);
  423. ASSERT_FALSE(EC);
  424. EXPECT_EQ(vfs::directory_iterator(), I); // empty directory is empty
  425. ScopedDir _a(TestDirectory + "/a");
  426. ScopedDir _ab(TestDirectory + "/a/b");
  427. ScopedDir _c(TestDirectory + "/c");
  428. ScopedDir _cd(TestDirectory + "/c/d");
  429. I = FS->dir_begin(Twine(TestDirectory), EC);
  430. ASSERT_FALSE(EC);
  431. ASSERT_NE(vfs::directory_iterator(), I);
  432. // Check either a or c, since we can't rely on the iteration order.
  433. EXPECT_TRUE(I->path().endswith("a") || I->path().endswith("c"));
  434. I.increment(EC);
  435. ASSERT_FALSE(EC);
  436. ASSERT_NE(vfs::directory_iterator(), I);
  437. EXPECT_TRUE(I->path().endswith("a") || I->path().endswith("c"));
  438. I.increment(EC);
  439. EXPECT_EQ(vfs::directory_iterator(), I);
  440. }
  441. #ifdef LLVM_ON_UNIX
  442. TEST(VirtualFileSystemTest, MultipleWorkingDirs) {
  443. // Our root contains a/aa, b/bb, c, where c is a link to a/.
  444. // Run tests both in root/b/ and root/c/ (to test "normal" and symlink dirs).
  445. // Interleave operations to show the working directories are independent.
  446. ScopedDir Root("r", true), ADir(Root.Path + "/a"), BDir(Root.Path + "/b");
  447. ScopedLink C(ADir.Path, Root.Path + "/c");
  448. ScopedFile AA(ADir.Path + "/aa", "aaaa"), BB(BDir.Path + "/bb", "bbbb");
  449. std::unique_ptr<vfs::FileSystem> BFS = vfs::createPhysicalFileSystem(),
  450. CFS = vfs::createPhysicalFileSystem();
  451. ASSERT_FALSE(BFS->setCurrentWorkingDirectory(BDir.Path));
  452. ASSERT_FALSE(CFS->setCurrentWorkingDirectory(C.Path));
  453. EXPECT_EQ(BDir.Path, *BFS->getCurrentWorkingDirectory());
  454. EXPECT_EQ(C.Path, *CFS->getCurrentWorkingDirectory());
  455. // openFileForRead(), indirectly.
  456. auto BBuf = BFS->getBufferForFile("bb");
  457. ASSERT_TRUE(BBuf);
  458. EXPECT_EQ("bbbb", (*BBuf)->getBuffer());
  459. auto ABuf = CFS->getBufferForFile("aa");
  460. ASSERT_TRUE(ABuf);
  461. EXPECT_EQ("aaaa", (*ABuf)->getBuffer());
  462. // status()
  463. auto BStat = BFS->status("bb");
  464. ASSERT_TRUE(BStat);
  465. EXPECT_EQ("bb", BStat->getName());
  466. auto AStat = CFS->status("aa");
  467. ASSERT_TRUE(AStat);
  468. EXPECT_EQ("aa", AStat->getName()); // unresolved name
  469. // getRealPath()
  470. SmallString<128> BPath;
  471. ASSERT_FALSE(BFS->getRealPath("bb", BPath));
  472. EXPECT_EQ(BB.Path, BPath);
  473. SmallString<128> APath;
  474. ASSERT_FALSE(CFS->getRealPath("aa", APath));
  475. EXPECT_EQ(AA.Path, APath); // Reports resolved name.
  476. // dir_begin
  477. std::error_code EC;
  478. auto BIt = BFS->dir_begin(".", EC);
  479. ASSERT_FALSE(EC);
  480. ASSERT_NE(BIt, vfs::directory_iterator());
  481. EXPECT_EQ((BDir.Path + "/./bb").str(), BIt->path());
  482. BIt.increment(EC);
  483. ASSERT_FALSE(EC);
  484. ASSERT_EQ(BIt, vfs::directory_iterator());
  485. auto CIt = CFS->dir_begin(".", EC);
  486. ASSERT_FALSE(EC);
  487. ASSERT_NE(CIt, vfs::directory_iterator());
  488. EXPECT_EQ((ADir.Path + "/./aa").str(), CIt->path()); // Partly resolved name!
  489. CIt.increment(EC); // Because likely to read through this path.
  490. ASSERT_FALSE(EC);
  491. ASSERT_EQ(CIt, vfs::directory_iterator());
  492. }
  493. TEST(VirtualFileSystemTest, BrokenSymlinkRealFSIteration) {
  494. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  495. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  496. ScopedLink _a("no_such_file", TestDirectory + "/a");
  497. ScopedDir _b(TestDirectory + "/b");
  498. ScopedLink _c("no_such_file", TestDirectory + "/c");
  499. // Should get no iteration error, but a stat error for the broken symlinks.
  500. std::map<std::string, std::error_code> StatResults;
  501. std::error_code EC;
  502. for (vfs::directory_iterator I = FS->dir_begin(Twine(TestDirectory), EC), E;
  503. I != E; I.increment(EC)) {
  504. EXPECT_FALSE(EC);
  505. StatResults[sys::path::filename(I->path())] =
  506. FS->status(I->path()).getError();
  507. }
  508. EXPECT_THAT(
  509. StatResults,
  510. ElementsAre(
  511. Pair("a", std::make_error_code(std::errc::no_such_file_or_directory)),
  512. Pair("b", std::error_code()),
  513. Pair("c",
  514. std::make_error_code(std::errc::no_such_file_or_directory))));
  515. }
  516. #endif
  517. TEST(VirtualFileSystemTest, BasicRealFSRecursiveIteration) {
  518. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  519. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  520. std::error_code EC;
  521. auto I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
  522. ASSERT_FALSE(EC);
  523. EXPECT_EQ(vfs::recursive_directory_iterator(), I); // empty directory is empty
  524. ScopedDir _a(TestDirectory + "/a");
  525. ScopedDir _ab(TestDirectory + "/a/b");
  526. ScopedDir _c(TestDirectory + "/c");
  527. ScopedDir _cd(TestDirectory + "/c/d");
  528. I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
  529. ASSERT_FALSE(EC);
  530. ASSERT_NE(vfs::recursive_directory_iterator(), I);
  531. std::vector<std::string> Contents;
  532. for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
  533. I.increment(EC)) {
  534. Contents.push_back(I->path());
  535. }
  536. // Check contents, which may be in any order
  537. EXPECT_EQ(4U, Contents.size());
  538. int Counts[4] = {0, 0, 0, 0};
  539. for (const std::string &Name : Contents) {
  540. ASSERT_FALSE(Name.empty());
  541. int Index = Name[Name.size() - 1] - 'a';
  542. ASSERT_TRUE(Index >= 0 && Index < 4);
  543. Counts[Index]++;
  544. }
  545. EXPECT_EQ(1, Counts[0]); // a
  546. EXPECT_EQ(1, Counts[1]); // b
  547. EXPECT_EQ(1, Counts[2]); // c
  548. EXPECT_EQ(1, Counts[3]); // d
  549. }
  550. TEST(VirtualFileSystemTest, BasicRealFSRecursiveIterationNoPush) {
  551. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  552. ScopedDir _a(TestDirectory + "/a");
  553. ScopedDir _ab(TestDirectory + "/a/b");
  554. ScopedDir _c(TestDirectory + "/c");
  555. ScopedDir _cd(TestDirectory + "/c/d");
  556. ScopedDir _e(TestDirectory + "/e");
  557. ScopedDir _ef(TestDirectory + "/e/f");
  558. ScopedDir _g(TestDirectory + "/g");
  559. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  560. // Test that calling no_push on entries without subdirectories has no effect.
  561. {
  562. std::error_code EC;
  563. auto I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
  564. ASSERT_FALSE(EC);
  565. std::vector<std::string> Contents;
  566. for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
  567. I.increment(EC)) {
  568. Contents.push_back(I->path());
  569. char last = I->path().back();
  570. switch (last) {
  571. case 'b':
  572. case 'd':
  573. case 'f':
  574. case 'g':
  575. I.no_push();
  576. break;
  577. default:
  578. break;
  579. }
  580. }
  581. EXPECT_EQ(7U, Contents.size());
  582. }
  583. // Test that calling no_push skips subdirectories.
  584. {
  585. std::error_code EC;
  586. auto I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
  587. ASSERT_FALSE(EC);
  588. std::vector<std::string> Contents;
  589. for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
  590. I.increment(EC)) {
  591. Contents.push_back(I->path());
  592. char last = I->path().back();
  593. switch (last) {
  594. case 'a':
  595. case 'c':
  596. case 'e':
  597. I.no_push();
  598. break;
  599. default:
  600. break;
  601. }
  602. }
  603. // Check contents, which may be in any order
  604. EXPECT_EQ(4U, Contents.size());
  605. int Counts[7] = {0, 0, 0, 0, 0, 0, 0};
  606. for (const std::string &Name : Contents) {
  607. ASSERT_FALSE(Name.empty());
  608. int Index = Name[Name.size() - 1] - 'a';
  609. ASSERT_TRUE(Index >= 0 && Index < 7);
  610. Counts[Index]++;
  611. }
  612. EXPECT_EQ(1, Counts[0]); // a
  613. EXPECT_EQ(0, Counts[1]); // b
  614. EXPECT_EQ(1, Counts[2]); // c
  615. EXPECT_EQ(0, Counts[3]); // d
  616. EXPECT_EQ(1, Counts[4]); // e
  617. EXPECT_EQ(0, Counts[5]); // f
  618. EXPECT_EQ(1, Counts[6]); // g
  619. }
  620. }
  621. #ifdef LLVM_ON_UNIX
  622. TEST(VirtualFileSystemTest, BrokenSymlinkRealFSRecursiveIteration) {
  623. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  624. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  625. ScopedLink _a("no_such_file", TestDirectory + "/a");
  626. ScopedDir _b(TestDirectory + "/b");
  627. ScopedLink _ba("no_such_file", TestDirectory + "/b/a");
  628. ScopedDir _bb(TestDirectory + "/b/b");
  629. ScopedLink _bc("no_such_file", TestDirectory + "/b/c");
  630. ScopedLink _c("no_such_file", TestDirectory + "/c");
  631. ScopedDir _d(TestDirectory + "/d");
  632. ScopedDir _dd(TestDirectory + "/d/d");
  633. ScopedDir _ddd(TestDirectory + "/d/d/d");
  634. ScopedLink _e("no_such_file", TestDirectory + "/e");
  635. std::vector<std::string> VisitedBrokenSymlinks;
  636. std::vector<std::string> VisitedNonBrokenSymlinks;
  637. std::error_code EC;
  638. for (vfs::recursive_directory_iterator I(*FS, Twine(TestDirectory), EC), E;
  639. I != E; I.increment(EC)) {
  640. EXPECT_FALSE(EC);
  641. (FS->status(I->path()) ? VisitedNonBrokenSymlinks : VisitedBrokenSymlinks)
  642. .push_back(I->path());
  643. }
  644. // Check visited file names.
  645. EXPECT_THAT(VisitedBrokenSymlinks,
  646. UnorderedElementsAre(StringRef(_a), StringRef(_ba),
  647. StringRef(_bc), StringRef(_c),
  648. StringRef(_e)));
  649. EXPECT_THAT(VisitedNonBrokenSymlinks,
  650. UnorderedElementsAre(StringRef(_b), StringRef(_bb), StringRef(_d),
  651. StringRef(_dd), StringRef(_ddd)));
  652. }
  653. #endif
  654. template <typename DirIter>
  655. static void checkContents(DirIter I, ArrayRef<StringRef> ExpectedOut) {
  656. std::error_code EC;
  657. SmallVector<StringRef, 4> Expected(ExpectedOut.begin(), ExpectedOut.end());
  658. SmallVector<std::string, 4> InputToCheck;
  659. // Do not rely on iteration order to check for contents, sort both
  660. // content vectors before comparison.
  661. for (DirIter E; !EC && I != E; I.increment(EC))
  662. InputToCheck.push_back(I->path());
  663. llvm::sort(InputToCheck);
  664. llvm::sort(Expected);
  665. EXPECT_EQ(InputToCheck.size(), Expected.size());
  666. unsigned LastElt = std::min(InputToCheck.size(), Expected.size());
  667. for (unsigned Idx = 0; Idx != LastElt; ++Idx)
  668. EXPECT_EQ(StringRef(InputToCheck[Idx]), Expected[Idx]);
  669. }
  670. TEST(VirtualFileSystemTest, OverlayIteration) {
  671. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  672. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  673. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  674. new vfs::OverlayFileSystem(Lower));
  675. O->pushOverlay(Upper);
  676. std::error_code EC;
  677. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>());
  678. Lower->addRegularFile("/file1");
  679. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>("/file1"));
  680. Upper->addRegularFile("/file2");
  681. checkContents(O->dir_begin("/", EC), {"/file2", "/file1"});
  682. Lower->addDirectory("/dir1");
  683. Lower->addRegularFile("/dir1/foo");
  684. Upper->addDirectory("/dir2");
  685. Upper->addRegularFile("/dir2/foo");
  686. checkContents(O->dir_begin("/dir2", EC), ArrayRef<StringRef>("/dir2/foo"));
  687. checkContents(O->dir_begin("/", EC), {"/dir2", "/file2", "/dir1", "/file1"});
  688. }
  689. TEST(VirtualFileSystemTest, OverlayRecursiveIteration) {
  690. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  691. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  692. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  693. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  694. new vfs::OverlayFileSystem(Lower));
  695. O->pushOverlay(Middle);
  696. O->pushOverlay(Upper);
  697. std::error_code EC;
  698. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  699. ArrayRef<StringRef>());
  700. Lower->addRegularFile("/file1");
  701. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  702. ArrayRef<StringRef>("/file1"));
  703. Upper->addDirectory("/dir");
  704. Upper->addRegularFile("/dir/file2");
  705. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  706. {"/dir", "/dir/file2", "/file1"});
  707. Lower->addDirectory("/dir1");
  708. Lower->addRegularFile("/dir1/foo");
  709. Lower->addDirectory("/dir1/a");
  710. Lower->addRegularFile("/dir1/a/b");
  711. Middle->addDirectory("/a");
  712. Middle->addDirectory("/a/b");
  713. Middle->addDirectory("/a/b/c");
  714. Middle->addRegularFile("/a/b/c/d");
  715. Middle->addRegularFile("/hiddenByUp");
  716. Upper->addDirectory("/dir2");
  717. Upper->addRegularFile("/dir2/foo");
  718. Upper->addRegularFile("/hiddenByUp");
  719. checkContents(vfs::recursive_directory_iterator(*O, "/dir2", EC),
  720. ArrayRef<StringRef>("/dir2/foo"));
  721. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  722. {"/dir", "/dir/file2", "/dir2", "/dir2/foo", "/hiddenByUp",
  723. "/a", "/a/b", "/a/b/c", "/a/b/c/d", "/dir1", "/dir1/a",
  724. "/dir1/a/b", "/dir1/foo", "/file1"});
  725. }
  726. TEST(VirtualFileSystemTest, ThreeLevelIteration) {
  727. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  728. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  729. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  730. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  731. new vfs::OverlayFileSystem(Lower));
  732. O->pushOverlay(Middle);
  733. O->pushOverlay(Upper);
  734. std::error_code EC;
  735. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>());
  736. Middle->addRegularFile("/file2");
  737. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>("/file2"));
  738. Lower->addRegularFile("/file1");
  739. Upper->addRegularFile("/file3");
  740. checkContents(O->dir_begin("/", EC), {"/file3", "/file2", "/file1"});
  741. }
  742. TEST(VirtualFileSystemTest, HiddenInIteration) {
  743. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  744. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  745. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  746. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  747. new vfs::OverlayFileSystem(Lower));
  748. O->pushOverlay(Middle);
  749. O->pushOverlay(Upper);
  750. std::error_code EC;
  751. Lower->addRegularFile("/onlyInLow");
  752. Lower->addDirectory("/hiddenByMid");
  753. Lower->addDirectory("/hiddenByUp");
  754. Middle->addRegularFile("/onlyInMid");
  755. Middle->addRegularFile("/hiddenByMid");
  756. Middle->addDirectory("/hiddenByUp");
  757. Upper->addRegularFile("/onlyInUp");
  758. Upper->addRegularFile("/hiddenByUp");
  759. checkContents(
  760. O->dir_begin("/", EC),
  761. {"/hiddenByUp", "/onlyInUp", "/hiddenByMid", "/onlyInMid", "/onlyInLow"});
  762. // Make sure we get the top-most entry
  763. {
  764. std::error_code EC;
  765. vfs::directory_iterator I = O->dir_begin("/", EC), E;
  766. for (; !EC && I != E; I.increment(EC))
  767. if (I->path() == "/hiddenByUp")
  768. break;
  769. ASSERT_NE(E, I);
  770. EXPECT_EQ(sys::fs::file_type::regular_file, I->type());
  771. }
  772. {
  773. std::error_code EC;
  774. vfs::directory_iterator I = O->dir_begin("/", EC), E;
  775. for (; !EC && I != E; I.increment(EC))
  776. if (I->path() == "/hiddenByMid")
  777. break;
  778. ASSERT_NE(E, I);
  779. EXPECT_EQ(sys::fs::file_type::regular_file, I->type());
  780. }
  781. }
  782. TEST(ProxyFileSystemTest, Basic) {
  783. IntrusiveRefCntPtr<vfs::InMemoryFileSystem> Base(
  784. new vfs::InMemoryFileSystem());
  785. vfs::ProxyFileSystem PFS(Base);
  786. Base->addFile("/a", 0, MemoryBuffer::getMemBuffer("test"));
  787. auto Stat = PFS.status("/a");
  788. ASSERT_FALSE(Stat.getError());
  789. auto File = PFS.openFileForRead("/a");
  790. ASSERT_FALSE(File.getError());
  791. EXPECT_EQ("test", (*(*File)->getBuffer("ignored"))->getBuffer());
  792. std::error_code EC;
  793. vfs::directory_iterator I = PFS.dir_begin("/", EC);
  794. ASSERT_FALSE(EC);
  795. ASSERT_EQ("/a", I->path());
  796. I.increment(EC);
  797. ASSERT_FALSE(EC);
  798. ASSERT_EQ(vfs::directory_iterator(), I);
  799. ASSERT_FALSE(PFS.setCurrentWorkingDirectory("/"));
  800. auto PWD = PFS.getCurrentWorkingDirectory();
  801. ASSERT_FALSE(PWD.getError());
  802. ASSERT_EQ("/", *PWD);
  803. SmallString<16> Path;
  804. ASSERT_FALSE(PFS.getRealPath("a", Path));
  805. ASSERT_EQ("/a", Path);
  806. bool Local = true;
  807. ASSERT_FALSE(PFS.isLocal("/a", Local));
  808. EXPECT_FALSE(Local);
  809. }
  810. class InMemoryFileSystemTest : public ::testing::Test {
  811. protected:
  812. llvm::vfs::InMemoryFileSystem FS;
  813. llvm::vfs::InMemoryFileSystem NormalizedFS;
  814. InMemoryFileSystemTest()
  815. : FS(/*UseNormalizedPaths=*/false),
  816. NormalizedFS(/*UseNormalizedPaths=*/true) {}
  817. };
  818. MATCHER_P2(IsHardLinkTo, FS, Target, "") {
  819. StringRef From = arg;
  820. StringRef To = Target;
  821. auto OpenedFrom = FS->openFileForRead(From);
  822. auto OpenedTo = FS->openFileForRead(To);
  823. return !OpenedFrom.getError() && !OpenedTo.getError() &&
  824. (*OpenedFrom)->status()->getUniqueID() ==
  825. (*OpenedTo)->status()->getUniqueID();
  826. }
  827. TEST_F(InMemoryFileSystemTest, IsEmpty) {
  828. auto Stat = FS.status("/a");
  829. ASSERT_EQ(Stat.getError(), errc::no_such_file_or_directory) << FS.toString();
  830. Stat = FS.status("/");
  831. ASSERT_EQ(Stat.getError(), errc::no_such_file_or_directory) << FS.toString();
  832. }
  833. TEST_F(InMemoryFileSystemTest, WindowsPath) {
  834. FS.addFile("c:/windows/system128/foo.cpp", 0, MemoryBuffer::getMemBuffer(""));
  835. auto Stat = FS.status("c:");
  836. #if !defined(_WIN32)
  837. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  838. #endif
  839. Stat = FS.status("c:/windows/system128/foo.cpp");
  840. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  841. FS.addFile("d:/windows/foo.cpp", 0, MemoryBuffer::getMemBuffer(""));
  842. Stat = FS.status("d:/windows/foo.cpp");
  843. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  844. }
  845. TEST_F(InMemoryFileSystemTest, OverlayFile) {
  846. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  847. NormalizedFS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  848. auto Stat = FS.status("/");
  849. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  850. Stat = FS.status("/.");
  851. ASSERT_FALSE(Stat);
  852. Stat = NormalizedFS.status("/.");
  853. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  854. Stat = FS.status("/a");
  855. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  856. ASSERT_EQ("/a", Stat->getName());
  857. }
  858. TEST_F(InMemoryFileSystemTest, OverlayFileNoOwn) {
  859. auto Buf = MemoryBuffer::getMemBuffer("a");
  860. FS.addFileNoOwn("/a", 0, Buf.get());
  861. auto Stat = FS.status("/a");
  862. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  863. ASSERT_EQ("/a", Stat->getName());
  864. }
  865. TEST_F(InMemoryFileSystemTest, OpenFileForRead) {
  866. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  867. FS.addFile("././c", 0, MemoryBuffer::getMemBuffer("c"));
  868. FS.addFile("./d/../d", 0, MemoryBuffer::getMemBuffer("d"));
  869. NormalizedFS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  870. NormalizedFS.addFile("././c", 0, MemoryBuffer::getMemBuffer("c"));
  871. NormalizedFS.addFile("./d/../d", 0, MemoryBuffer::getMemBuffer("d"));
  872. auto File = FS.openFileForRead("/a");
  873. ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
  874. File = FS.openFileForRead("/a"); // Open again.
  875. ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
  876. File = NormalizedFS.openFileForRead("/././a"); // Open again.
  877. ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
  878. File = FS.openFileForRead("/");
  879. ASSERT_EQ(File.getError(), errc::invalid_argument) << FS.toString();
  880. File = FS.openFileForRead("/b");
  881. ASSERT_EQ(File.getError(), errc::no_such_file_or_directory) << FS.toString();
  882. File = FS.openFileForRead("./c");
  883. ASSERT_FALSE(File);
  884. File = FS.openFileForRead("e/../d");
  885. ASSERT_FALSE(File);
  886. File = NormalizedFS.openFileForRead("./c");
  887. ASSERT_EQ("c", (*(*File)->getBuffer("ignored"))->getBuffer());
  888. File = NormalizedFS.openFileForRead("e/../d");
  889. ASSERT_EQ("d", (*(*File)->getBuffer("ignored"))->getBuffer());
  890. }
  891. TEST_F(InMemoryFileSystemTest, DuplicatedFile) {
  892. ASSERT_TRUE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a")));
  893. ASSERT_FALSE(FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("a")));
  894. ASSERT_TRUE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a")));
  895. ASSERT_FALSE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("b")));
  896. }
  897. TEST_F(InMemoryFileSystemTest, DirectoryIteration) {
  898. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer(""));
  899. FS.addFile("/b/c", 0, MemoryBuffer::getMemBuffer(""));
  900. std::error_code EC;
  901. vfs::directory_iterator I = FS.dir_begin("/", EC);
  902. ASSERT_FALSE(EC);
  903. ASSERT_EQ("/a", I->path());
  904. I.increment(EC);
  905. ASSERT_FALSE(EC);
  906. ASSERT_EQ("/b", I->path());
  907. I.increment(EC);
  908. ASSERT_FALSE(EC);
  909. ASSERT_EQ(vfs::directory_iterator(), I);
  910. I = FS.dir_begin("/b", EC);
  911. ASSERT_FALSE(EC);
  912. // When on Windows, we end up with "/b\\c" as the name. Convert to Posix
  913. // path for the sake of the comparison.
  914. ASSERT_EQ("/b/c", getPosixPath(I->path()));
  915. I.increment(EC);
  916. ASSERT_FALSE(EC);
  917. ASSERT_EQ(vfs::directory_iterator(), I);
  918. }
  919. TEST_F(InMemoryFileSystemTest, WorkingDirectory) {
  920. FS.setCurrentWorkingDirectory("/b");
  921. FS.addFile("c", 0, MemoryBuffer::getMemBuffer(""));
  922. auto Stat = FS.status("/b/c");
  923. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  924. ASSERT_EQ("/b/c", Stat->getName());
  925. ASSERT_EQ("/b", *FS.getCurrentWorkingDirectory());
  926. Stat = FS.status("c");
  927. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  928. NormalizedFS.setCurrentWorkingDirectory("/b/c");
  929. NormalizedFS.setCurrentWorkingDirectory(".");
  930. ASSERT_EQ("/b/c",
  931. getPosixPath(NormalizedFS.getCurrentWorkingDirectory().get()));
  932. NormalizedFS.setCurrentWorkingDirectory("..");
  933. ASSERT_EQ("/b",
  934. getPosixPath(NormalizedFS.getCurrentWorkingDirectory().get()));
  935. }
  936. TEST_F(InMemoryFileSystemTest, IsLocal) {
  937. FS.setCurrentWorkingDirectory("/b");
  938. FS.addFile("c", 0, MemoryBuffer::getMemBuffer(""));
  939. std::error_code EC;
  940. bool IsLocal = true;
  941. EC = FS.isLocal("c", IsLocal);
  942. ASSERT_FALSE(EC);
  943. ASSERT_FALSE(IsLocal);
  944. }
  945. #if !defined(_WIN32)
  946. TEST_F(InMemoryFileSystemTest, GetRealPath) {
  947. SmallString<16> Path;
  948. EXPECT_EQ(FS.getRealPath("b", Path), errc::operation_not_permitted);
  949. auto GetRealPath = [this](StringRef P) {
  950. SmallString<16> Output;
  951. auto EC = FS.getRealPath(P, Output);
  952. EXPECT_FALSE(EC);
  953. return Output.str().str();
  954. };
  955. FS.setCurrentWorkingDirectory("a");
  956. EXPECT_EQ(GetRealPath("b"), "a/b");
  957. EXPECT_EQ(GetRealPath("../b"), "b");
  958. EXPECT_EQ(GetRealPath("b/./c"), "a/b/c");
  959. FS.setCurrentWorkingDirectory("/a");
  960. EXPECT_EQ(GetRealPath("b"), "/a/b");
  961. EXPECT_EQ(GetRealPath("../b"), "/b");
  962. EXPECT_EQ(GetRealPath("b/./c"), "/a/b/c");
  963. }
  964. #endif // _WIN32
  965. TEST_F(InMemoryFileSystemTest, AddFileWithUser) {
  966. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), 0xFEEDFACE);
  967. auto Stat = FS.status("/a");
  968. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  969. ASSERT_TRUE(Stat->isDirectory());
  970. ASSERT_EQ(0xFEEDFACE, Stat->getUser());
  971. Stat = FS.status("/a/b");
  972. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  973. ASSERT_TRUE(Stat->isDirectory());
  974. ASSERT_EQ(0xFEEDFACE, Stat->getUser());
  975. Stat = FS.status("/a/b/c");
  976. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  977. ASSERT_TRUE(Stat->isRegularFile());
  978. ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
  979. ASSERT_EQ(0xFEEDFACE, Stat->getUser());
  980. }
  981. TEST_F(InMemoryFileSystemTest, AddFileWithGroup) {
  982. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, 0xDABBAD00);
  983. auto Stat = FS.status("/a");
  984. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  985. ASSERT_TRUE(Stat->isDirectory());
  986. ASSERT_EQ(0xDABBAD00, Stat->getGroup());
  987. Stat = FS.status("/a/b");
  988. ASSERT_TRUE(Stat->isDirectory());
  989. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  990. ASSERT_EQ(0xDABBAD00, Stat->getGroup());
  991. Stat = FS.status("/a/b/c");
  992. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  993. ASSERT_TRUE(Stat->isRegularFile());
  994. ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
  995. ASSERT_EQ(0xDABBAD00, Stat->getGroup());
  996. }
  997. TEST_F(InMemoryFileSystemTest, AddFileWithFileType) {
  998. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, None,
  999. sys::fs::file_type::socket_file);
  1000. auto Stat = FS.status("/a");
  1001. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  1002. ASSERT_TRUE(Stat->isDirectory());
  1003. Stat = FS.status("/a/b");
  1004. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  1005. ASSERT_TRUE(Stat->isDirectory());
  1006. Stat = FS.status("/a/b/c");
  1007. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  1008. ASSERT_EQ(sys::fs::file_type::socket_file, Stat->getType());
  1009. ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
  1010. }
  1011. TEST_F(InMemoryFileSystemTest, AddFileWithPerms) {
  1012. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, None, None,
  1013. sys::fs::perms::owner_read | sys::fs::perms::owner_write);
  1014. auto Stat = FS.status("/a");
  1015. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  1016. ASSERT_TRUE(Stat->isDirectory());
  1017. ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write |
  1018. sys::fs::perms::owner_exe,
  1019. Stat->getPermissions());
  1020. Stat = FS.status("/a/b");
  1021. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  1022. ASSERT_TRUE(Stat->isDirectory());
  1023. ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write |
  1024. sys::fs::perms::owner_exe,
  1025. Stat->getPermissions());
  1026. Stat = FS.status("/a/b/c");
  1027. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  1028. ASSERT_TRUE(Stat->isRegularFile());
  1029. ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write,
  1030. Stat->getPermissions());
  1031. }
  1032. TEST_F(InMemoryFileSystemTest, AddDirectoryThenAddChild) {
  1033. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer(""), /*User=*/None,
  1034. /*Group=*/None, sys::fs::file_type::directory_file);
  1035. FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("abc"), /*User=*/None,
  1036. /*Group=*/None, sys::fs::file_type::regular_file);
  1037. auto Stat = FS.status("/a");
  1038. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  1039. ASSERT_TRUE(Stat->isDirectory());
  1040. Stat = FS.status("/a/b");
  1041. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  1042. ASSERT_TRUE(Stat->isRegularFile());
  1043. }
  1044. // Test that the name returned by status() is in the same form as the path that
  1045. // was requested (to match the behavior of RealFileSystem).
  1046. TEST_F(InMemoryFileSystemTest, StatusName) {
  1047. NormalizedFS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"),
  1048. /*User=*/None,
  1049. /*Group=*/None, sys::fs::file_type::regular_file);
  1050. NormalizedFS.setCurrentWorkingDirectory("/a/b");
  1051. // Access using InMemoryFileSystem::status.
  1052. auto Stat = NormalizedFS.status("../b/c");
  1053. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n"
  1054. << NormalizedFS.toString();
  1055. ASSERT_TRUE(Stat->isRegularFile());
  1056. ASSERT_EQ("../b/c", Stat->getName());
  1057. // Access using InMemoryFileAdaptor::status.
  1058. auto File = NormalizedFS.openFileForRead("../b/c");
  1059. ASSERT_FALSE(File.getError()) << File.getError() << "\n"
  1060. << NormalizedFS.toString();
  1061. Stat = (*File)->status();
  1062. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n"
  1063. << NormalizedFS.toString();
  1064. ASSERT_TRUE(Stat->isRegularFile());
  1065. ASSERT_EQ("../b/c", Stat->getName());
  1066. // Access using a directory iterator.
  1067. std::error_code EC;
  1068. llvm::vfs::directory_iterator It = NormalizedFS.dir_begin("../b", EC);
  1069. // When on Windows, we end up with "../b\\c" as the name. Convert to Posix
  1070. // path for the sake of the comparison.
  1071. ASSERT_EQ("../b/c", getPosixPath(It->path()));
  1072. }
  1073. TEST_F(InMemoryFileSystemTest, AddHardLinkToFile) {
  1074. StringRef FromLink = "/path/to/FROM/link";
  1075. StringRef Target = "/path/to/TO/file";
  1076. FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target"));
  1077. EXPECT_TRUE(FS.addHardLink(FromLink, Target));
  1078. EXPECT_THAT(FromLink, IsHardLinkTo(&FS, Target));
  1079. EXPECT_TRUE(FS.status(FromLink)->getSize() == FS.status(Target)->getSize());
  1080. EXPECT_TRUE(FS.getBufferForFile(FromLink)->get()->getBuffer() ==
  1081. FS.getBufferForFile(Target)->get()->getBuffer());
  1082. }
  1083. TEST_F(InMemoryFileSystemTest, AddHardLinkInChainPattern) {
  1084. StringRef Link0 = "/path/to/0/link";
  1085. StringRef Link1 = "/path/to/1/link";
  1086. StringRef Link2 = "/path/to/2/link";
  1087. StringRef Target = "/path/to/target";
  1088. FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target file"));
  1089. EXPECT_TRUE(FS.addHardLink(Link2, Target));
  1090. EXPECT_TRUE(FS.addHardLink(Link1, Link2));
  1091. EXPECT_TRUE(FS.addHardLink(Link0, Link1));
  1092. EXPECT_THAT(Link0, IsHardLinkTo(&FS, Target));
  1093. EXPECT_THAT(Link1, IsHardLinkTo(&FS, Target));
  1094. EXPECT_THAT(Link2, IsHardLinkTo(&FS, Target));
  1095. }
  1096. TEST_F(InMemoryFileSystemTest, AddHardLinkToAFileThatWasNotAddedBefore) {
  1097. EXPECT_FALSE(FS.addHardLink("/path/to/link", "/path/to/target"));
  1098. }
  1099. TEST_F(InMemoryFileSystemTest, AddHardLinkFromAFileThatWasAddedBefore) {
  1100. StringRef Link = "/path/to/link";
  1101. StringRef Target = "/path/to/target";
  1102. FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target"));
  1103. FS.addFile(Link, 0, MemoryBuffer::getMemBuffer("content of link"));
  1104. EXPECT_FALSE(FS.addHardLink(Link, Target));
  1105. }
  1106. TEST_F(InMemoryFileSystemTest, AddSameHardLinkMoreThanOnce) {
  1107. StringRef Link = "/path/to/link";
  1108. StringRef Target = "/path/to/target";
  1109. FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target"));
  1110. EXPECT_TRUE(FS.addHardLink(Link, Target));
  1111. EXPECT_FALSE(FS.addHardLink(Link, Target));
  1112. }
  1113. TEST_F(InMemoryFileSystemTest, AddFileInPlaceOfAHardLinkWithSameContent) {
  1114. StringRef Link = "/path/to/link";
  1115. StringRef Target = "/path/to/target";
  1116. StringRef Content = "content of target";
  1117. EXPECT_TRUE(FS.addFile(Target, 0, MemoryBuffer::getMemBuffer(Content)));
  1118. EXPECT_TRUE(FS.addHardLink(Link, Target));
  1119. EXPECT_TRUE(FS.addFile(Link, 0, MemoryBuffer::getMemBuffer(Content)));
  1120. }
  1121. TEST_F(InMemoryFileSystemTest, AddFileInPlaceOfAHardLinkWithDifferentContent) {
  1122. StringRef Link = "/path/to/link";
  1123. StringRef Target = "/path/to/target";
  1124. StringRef Content = "content of target";
  1125. StringRef LinkContent = "different content of link";
  1126. EXPECT_TRUE(FS.addFile(Target, 0, MemoryBuffer::getMemBuffer(Content)));
  1127. EXPECT_TRUE(FS.addHardLink(Link, Target));
  1128. EXPECT_FALSE(FS.addFile(Link, 0, MemoryBuffer::getMemBuffer(LinkContent)));
  1129. }
  1130. TEST_F(InMemoryFileSystemTest, AddHardLinkToADirectory) {
  1131. StringRef Dir = "path/to/dummy/dir";
  1132. StringRef Link = "/path/to/link";
  1133. StringRef File = "path/to/dummy/dir/target";
  1134. StringRef Content = "content of target";
  1135. EXPECT_TRUE(FS.addFile(File, 0, MemoryBuffer::getMemBuffer(Content)));
  1136. EXPECT_FALSE(FS.addHardLink(Link, Dir));
  1137. }
  1138. TEST_F(InMemoryFileSystemTest, AddHardLinkFromADirectory) {
  1139. StringRef Dir = "path/to/dummy/dir";
  1140. StringRef Target = "path/to/dummy/dir/target";
  1141. StringRef Content = "content of target";
  1142. EXPECT_TRUE(FS.addFile(Target, 0, MemoryBuffer::getMemBuffer(Content)));
  1143. EXPECT_FALSE(FS.addHardLink(Dir, Target));
  1144. }
  1145. TEST_F(InMemoryFileSystemTest, AddHardLinkUnderAFile) {
  1146. StringRef CommonContent = "content string";
  1147. FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer(CommonContent));
  1148. FS.addFile("/c/d", 0, MemoryBuffer::getMemBuffer(CommonContent));
  1149. EXPECT_FALSE(FS.addHardLink("/c/d/e", "/a/b"));
  1150. }
  1151. TEST_F(InMemoryFileSystemTest, RecursiveIterationWithHardLink) {
  1152. std::error_code EC;
  1153. FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("content string"));
  1154. EXPECT_TRUE(FS.addHardLink("/c/d", "/a/b"));
  1155. auto I = vfs::recursive_directory_iterator(FS, "/", EC);
  1156. ASSERT_FALSE(EC);
  1157. std::vector<std::string> Nodes;
  1158. for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
  1159. I.increment(EC)) {
  1160. Nodes.push_back(getPosixPath(I->path()));
  1161. }
  1162. EXPECT_THAT(Nodes, testing::UnorderedElementsAre("/a", "/a/b", "/c", "/c/d"));
  1163. }
  1164. // NOTE: in the tests below, we use '//root/' as our root directory, since it is
  1165. // a legal *absolute* path on Windows as well as *nix.
  1166. class VFSFromYAMLTest : public ::testing::Test {
  1167. public:
  1168. int NumDiagnostics;
  1169. void SetUp() override { NumDiagnostics = 0; }
  1170. static void CountingDiagHandler(const SMDiagnostic &, void *Context) {
  1171. VFSFromYAMLTest *Test = static_cast<VFSFromYAMLTest *>(Context);
  1172. ++Test->NumDiagnostics;
  1173. }
  1174. IntrusiveRefCntPtr<vfs::FileSystem>
  1175. getFromYAMLRawString(StringRef Content,
  1176. IntrusiveRefCntPtr<vfs::FileSystem> ExternalFS) {
  1177. std::unique_ptr<MemoryBuffer> Buffer = MemoryBuffer::getMemBuffer(Content);
  1178. return getVFSFromYAML(std::move(Buffer), CountingDiagHandler, "", this,
  1179. ExternalFS);
  1180. }
  1181. IntrusiveRefCntPtr<vfs::FileSystem> getFromYAMLString(
  1182. StringRef Content,
  1183. IntrusiveRefCntPtr<vfs::FileSystem> ExternalFS = new DummyFileSystem()) {
  1184. std::string VersionPlusContent("{\n 'version':0,\n");
  1185. VersionPlusContent += Content.slice(Content.find('{') + 1, StringRef::npos);
  1186. return getFromYAMLRawString(VersionPlusContent, ExternalFS);
  1187. }
  1188. // This is intended as a "XFAIL" for windows hosts.
  1189. bool supportsSameDirMultipleYAMLEntries() {
  1190. Triple Host(Triple::normalize(sys::getProcessTriple()));
  1191. return !Host.isOSWindows();
  1192. }
  1193. };
  1194. TEST_F(VFSFromYAMLTest, BasicVFSFromYAML) {
  1195. IntrusiveRefCntPtr<vfs::FileSystem> FS;
  1196. FS = getFromYAMLString("");
  1197. EXPECT_EQ(nullptr, FS.get());
  1198. FS = getFromYAMLString("[]");
  1199. EXPECT_EQ(nullptr, FS.get());
  1200. FS = getFromYAMLString("'string'");
  1201. EXPECT_EQ(nullptr, FS.get());
  1202. EXPECT_EQ(3, NumDiagnostics);
  1203. }
  1204. TEST_F(VFSFromYAMLTest, MappedFiles) {
  1205. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1206. Lower->addRegularFile("//root/foo/bar/a");
  1207. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1208. "{ 'roots': [\n"
  1209. "{\n"
  1210. " 'type': 'directory',\n"
  1211. " 'name': '//root/',\n"
  1212. " 'contents': [ {\n"
  1213. " 'type': 'file',\n"
  1214. " 'name': 'file1',\n"
  1215. " 'external-contents': '//root/foo/bar/a'\n"
  1216. " },\n"
  1217. " {\n"
  1218. " 'type': 'file',\n"
  1219. " 'name': 'file2',\n"
  1220. " 'external-contents': '//root/foo/b'\n"
  1221. " }\n"
  1222. " ]\n"
  1223. "}\n"
  1224. "]\n"
  1225. "}",
  1226. Lower);
  1227. ASSERT_TRUE(FS.get() != nullptr);
  1228. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1229. new vfs::OverlayFileSystem(Lower));
  1230. O->pushOverlay(FS);
  1231. // file
  1232. ErrorOr<vfs::Status> S = O->status("//root/file1");
  1233. ASSERT_FALSE(S.getError());
  1234. EXPECT_EQ("//root/foo/bar/a", S->getName());
  1235. EXPECT_TRUE(S->IsVFSMapped);
  1236. ErrorOr<vfs::Status> SLower = O->status("//root/foo/bar/a");
  1237. EXPECT_EQ("//root/foo/bar/a", SLower->getName());
  1238. EXPECT_TRUE(S->equivalent(*SLower));
  1239. EXPECT_FALSE(SLower->IsVFSMapped);
  1240. // file after opening
  1241. auto OpenedF = O->openFileForRead("//root/file1");
  1242. ASSERT_FALSE(OpenedF.getError());
  1243. auto OpenedS = (*OpenedF)->status();
  1244. ASSERT_FALSE(OpenedS.getError());
  1245. EXPECT_EQ("//root/foo/bar/a", OpenedS->getName());
  1246. EXPECT_TRUE(OpenedS->IsVFSMapped);
  1247. // directory
  1248. S = O->status("//root/");
  1249. ASSERT_FALSE(S.getError());
  1250. EXPECT_TRUE(S->isDirectory());
  1251. EXPECT_TRUE(S->equivalent(*O->status("//root/"))); // non-volatile UniqueID
  1252. // broken mapping
  1253. EXPECT_EQ(O->status("//root/file2").getError(),
  1254. llvm::errc::no_such_file_or_directory);
  1255. EXPECT_EQ(0, NumDiagnostics);
  1256. }
  1257. TEST_F(VFSFromYAMLTest, CaseInsensitive) {
  1258. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1259. Lower->addRegularFile("//root/foo/bar/a");
  1260. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1261. "{ 'case-sensitive': 'false',\n"
  1262. " 'roots': [\n"
  1263. "{\n"
  1264. " 'type': 'directory',\n"
  1265. " 'name': '//root/',\n"
  1266. " 'contents': [ {\n"
  1267. " 'type': 'file',\n"
  1268. " 'name': 'XX',\n"
  1269. " 'external-contents': '//root/foo/bar/a'\n"
  1270. " }\n"
  1271. " ]\n"
  1272. "}]}",
  1273. Lower);
  1274. ASSERT_TRUE(FS.get() != nullptr);
  1275. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1276. new vfs::OverlayFileSystem(Lower));
  1277. O->pushOverlay(FS);
  1278. ErrorOr<vfs::Status> S = O->status("//root/XX");
  1279. ASSERT_FALSE(S.getError());
  1280. ErrorOr<vfs::Status> SS = O->status("//root/xx");
  1281. ASSERT_FALSE(SS.getError());
  1282. EXPECT_TRUE(S->equivalent(*SS));
  1283. SS = O->status("//root/xX");
  1284. EXPECT_TRUE(S->equivalent(*SS));
  1285. SS = O->status("//root/Xx");
  1286. EXPECT_TRUE(S->equivalent(*SS));
  1287. EXPECT_EQ(0, NumDiagnostics);
  1288. }
  1289. TEST_F(VFSFromYAMLTest, CaseSensitive) {
  1290. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1291. Lower->addRegularFile("//root/foo/bar/a");
  1292. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1293. "{ 'case-sensitive': 'true',\n"
  1294. " 'roots': [\n"
  1295. "{\n"
  1296. " 'type': 'directory',\n"
  1297. " 'name': '//root/',\n"
  1298. " 'contents': [ {\n"
  1299. " 'type': 'file',\n"
  1300. " 'name': 'XX',\n"
  1301. " 'external-contents': '//root/foo/bar/a'\n"
  1302. " }\n"
  1303. " ]\n"
  1304. "}]}",
  1305. Lower);
  1306. ASSERT_TRUE(FS.get() != nullptr);
  1307. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1308. new vfs::OverlayFileSystem(Lower));
  1309. O->pushOverlay(FS);
  1310. ErrorOr<vfs::Status> SS = O->status("//root/xx");
  1311. EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
  1312. SS = O->status("//root/xX");
  1313. EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
  1314. SS = O->status("//root/Xx");
  1315. EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
  1316. EXPECT_EQ(0, NumDiagnostics);
  1317. }
  1318. TEST_F(VFSFromYAMLTest, IllegalVFSFile) {
  1319. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1320. // invalid YAML at top-level
  1321. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString("{]", Lower);
  1322. EXPECT_EQ(nullptr, FS.get());
  1323. // invalid YAML in roots
  1324. FS = getFromYAMLString("{ 'roots':[}", Lower);
  1325. // invalid YAML in directory
  1326. FS = getFromYAMLString(
  1327. "{ 'roots':[ { 'name': 'foo', 'type': 'directory', 'contents': [}",
  1328. Lower);
  1329. EXPECT_EQ(nullptr, FS.get());
  1330. // invalid configuration
  1331. FS = getFromYAMLString("{ 'knobular': 'true', 'roots':[] }", Lower);
  1332. EXPECT_EQ(nullptr, FS.get());
  1333. FS = getFromYAMLString("{ 'case-sensitive': 'maybe', 'roots':[] }", Lower);
  1334. EXPECT_EQ(nullptr, FS.get());
  1335. // invalid roots
  1336. FS = getFromYAMLString("{ 'roots':'' }", Lower);
  1337. EXPECT_EQ(nullptr, FS.get());
  1338. FS = getFromYAMLString("{ 'roots':{} }", Lower);
  1339. EXPECT_EQ(nullptr, FS.get());
  1340. // invalid entries
  1341. FS = getFromYAMLString(
  1342. "{ 'roots':[ { 'type': 'other', 'name': 'me', 'contents': '' }", Lower);
  1343. EXPECT_EQ(nullptr, FS.get());
  1344. FS = getFromYAMLString("{ 'roots':[ { 'type': 'file', 'name': [], "
  1345. "'external-contents': 'other' }",
  1346. Lower);
  1347. EXPECT_EQ(nullptr, FS.get());
  1348. FS = getFromYAMLString(
  1349. "{ 'roots':[ { 'type': 'file', 'name': 'me', 'external-contents': [] }",
  1350. Lower);
  1351. EXPECT_EQ(nullptr, FS.get());
  1352. FS = getFromYAMLString(
  1353. "{ 'roots':[ { 'type': 'file', 'name': 'me', 'external-contents': {} }",
  1354. Lower);
  1355. EXPECT_EQ(nullptr, FS.get());
  1356. FS = getFromYAMLString(
  1357. "{ 'roots':[ { 'type': 'directory', 'name': 'me', 'contents': {} }",
  1358. Lower);
  1359. EXPECT_EQ(nullptr, FS.get());
  1360. FS = getFromYAMLString(
  1361. "{ 'roots':[ { 'type': 'directory', 'name': 'me', 'contents': '' }",
  1362. Lower);
  1363. EXPECT_EQ(nullptr, FS.get());
  1364. FS = getFromYAMLString(
  1365. "{ 'roots':[ { 'thingy': 'directory', 'name': 'me', 'contents': [] }",
  1366. Lower);
  1367. EXPECT_EQ(nullptr, FS.get());
  1368. // missing mandatory fields
  1369. FS = getFromYAMLString("{ 'roots':[ { 'type': 'file', 'name': 'me' }", Lower);
  1370. EXPECT_EQ(nullptr, FS.get());
  1371. FS = getFromYAMLString(
  1372. "{ 'roots':[ { 'type': 'file', 'external-contents': 'other' }", Lower);
  1373. EXPECT_EQ(nullptr, FS.get());
  1374. FS = getFromYAMLString("{ 'roots':[ { 'name': 'me', 'contents': [] }", Lower);
  1375. EXPECT_EQ(nullptr, FS.get());
  1376. // duplicate keys
  1377. FS = getFromYAMLString("{ 'roots':[], 'roots':[] }", Lower);
  1378. EXPECT_EQ(nullptr, FS.get());
  1379. FS = getFromYAMLString(
  1380. "{ 'case-sensitive':'true', 'case-sensitive':'true', 'roots':[] }",
  1381. Lower);
  1382. EXPECT_EQ(nullptr, FS.get());
  1383. FS =
  1384. getFromYAMLString("{ 'roots':[{'name':'me', 'name':'you', 'type':'file', "
  1385. "'external-contents':'blah' } ] }",
  1386. Lower);
  1387. EXPECT_EQ(nullptr, FS.get());
  1388. // missing version
  1389. FS = getFromYAMLRawString("{ 'roots':[] }", Lower);
  1390. EXPECT_EQ(nullptr, FS.get());
  1391. // bad version number
  1392. FS = getFromYAMLRawString("{ 'version':'foo', 'roots':[] }", Lower);
  1393. EXPECT_EQ(nullptr, FS.get());
  1394. FS = getFromYAMLRawString("{ 'version':-1, 'roots':[] }", Lower);
  1395. EXPECT_EQ(nullptr, FS.get());
  1396. FS = getFromYAMLRawString("{ 'version':100000, 'roots':[] }", Lower);
  1397. EXPECT_EQ(nullptr, FS.get());
  1398. EXPECT_EQ(24, NumDiagnostics);
  1399. }
  1400. TEST_F(VFSFromYAMLTest, UseExternalName) {
  1401. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1402. Lower->addRegularFile("//root/external/file");
  1403. IntrusiveRefCntPtr<vfs::FileSystem> FS =
  1404. getFromYAMLString("{ 'roots': [\n"
  1405. " { 'type': 'file', 'name': '//root/A',\n"
  1406. " 'external-contents': '//root/external/file'\n"
  1407. " },\n"
  1408. " { 'type': 'file', 'name': '//root/B',\n"
  1409. " 'use-external-name': true,\n"
  1410. " 'external-contents': '//root/external/file'\n"
  1411. " },\n"
  1412. " { 'type': 'file', 'name': '//root/C',\n"
  1413. " 'use-external-name': false,\n"
  1414. " 'external-contents': '//root/external/file'\n"
  1415. " }\n"
  1416. "] }",
  1417. Lower);
  1418. ASSERT_TRUE(nullptr != FS.get());
  1419. // default true
  1420. EXPECT_EQ("//root/external/file", FS->status("//root/A")->getName());
  1421. // explicit
  1422. EXPECT_EQ("//root/external/file", FS->status("//root/B")->getName());
  1423. EXPECT_EQ("//root/C", FS->status("//root/C")->getName());
  1424. // global configuration
  1425. FS = getFromYAMLString("{ 'use-external-names': false,\n"
  1426. " 'roots': [\n"
  1427. " { 'type': 'file', 'name': '//root/A',\n"
  1428. " 'external-contents': '//root/external/file'\n"
  1429. " },\n"
  1430. " { 'type': 'file', 'name': '//root/B',\n"
  1431. " 'use-external-name': true,\n"
  1432. " 'external-contents': '//root/external/file'\n"
  1433. " },\n"
  1434. " { 'type': 'file', 'name': '//root/C',\n"
  1435. " 'use-external-name': false,\n"
  1436. " 'external-contents': '//root/external/file'\n"
  1437. " }\n"
  1438. "] }",
  1439. Lower);
  1440. ASSERT_TRUE(nullptr != FS.get());
  1441. // default
  1442. EXPECT_EQ("//root/A", FS->status("//root/A")->getName());
  1443. // explicit
  1444. EXPECT_EQ("//root/external/file", FS->status("//root/B")->getName());
  1445. EXPECT_EQ("//root/C", FS->status("//root/C")->getName());
  1446. }
  1447. TEST_F(VFSFromYAMLTest, MultiComponentPath) {
  1448. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1449. Lower->addRegularFile("//root/other");
  1450. // file in roots
  1451. IntrusiveRefCntPtr<vfs::FileSystem> FS =
  1452. getFromYAMLString("{ 'roots': [\n"
  1453. " { 'type': 'file', 'name': '//root/path/to/file',\n"
  1454. " 'external-contents': '//root/other' }]\n"
  1455. "}",
  1456. Lower);
  1457. ASSERT_TRUE(nullptr != FS.get());
  1458. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1459. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1460. EXPECT_FALSE(FS->status("//root/path").getError());
  1461. EXPECT_FALSE(FS->status("//root/").getError());
  1462. // at the start
  1463. FS = getFromYAMLString(
  1464. "{ 'roots': [\n"
  1465. " { 'type': 'directory', 'name': '//root/path/to',\n"
  1466. " 'contents': [ { 'type': 'file', 'name': 'file',\n"
  1467. " 'external-contents': '//root/other' }]}]\n"
  1468. "}",
  1469. Lower);
  1470. ASSERT_TRUE(nullptr != FS.get());
  1471. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1472. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1473. EXPECT_FALSE(FS->status("//root/path").getError());
  1474. EXPECT_FALSE(FS->status("//root/").getError());
  1475. // at the end
  1476. FS = getFromYAMLString(
  1477. "{ 'roots': [\n"
  1478. " { 'type': 'directory', 'name': '//root/',\n"
  1479. " 'contents': [ { 'type': 'file', 'name': 'path/to/file',\n"
  1480. " 'external-contents': '//root/other' }]}]\n"
  1481. "}",
  1482. Lower);
  1483. ASSERT_TRUE(nullptr != FS.get());
  1484. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1485. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1486. EXPECT_FALSE(FS->status("//root/path").getError());
  1487. EXPECT_FALSE(FS->status("//root/").getError());
  1488. }
  1489. TEST_F(VFSFromYAMLTest, TrailingSlashes) {
  1490. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1491. Lower->addRegularFile("//root/other");
  1492. // file in roots
  1493. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1494. "{ 'roots': [\n"
  1495. " { 'type': 'directory', 'name': '//root/path/to////',\n"
  1496. " 'contents': [ { 'type': 'file', 'name': 'file',\n"
  1497. " 'external-contents': '//root/other' }]}]\n"
  1498. "}",
  1499. Lower);
  1500. ASSERT_TRUE(nullptr != FS.get());
  1501. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1502. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1503. EXPECT_FALSE(FS->status("//root/path").getError());
  1504. EXPECT_FALSE(FS->status("//root/").getError());
  1505. }
  1506. TEST_F(VFSFromYAMLTest, DirectoryIteration) {
  1507. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1508. Lower->addDirectory("//root/");
  1509. Lower->addDirectory("//root/foo");
  1510. Lower->addDirectory("//root/foo/bar");
  1511. Lower->addRegularFile("//root/foo/bar/a");
  1512. Lower->addRegularFile("//root/foo/bar/b");
  1513. Lower->addRegularFile("//root/file3");
  1514. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1515. "{ 'use-external-names': false,\n"
  1516. " 'roots': [\n"
  1517. "{\n"
  1518. " 'type': 'directory',\n"
  1519. " 'name': '//root/',\n"
  1520. " 'contents': [ {\n"
  1521. " 'type': 'file',\n"
  1522. " 'name': 'file1',\n"
  1523. " 'external-contents': '//root/foo/bar/a'\n"
  1524. " },\n"
  1525. " {\n"
  1526. " 'type': 'file',\n"
  1527. " 'name': 'file2',\n"
  1528. " 'external-contents': '//root/foo/bar/b'\n"
  1529. " }\n"
  1530. " ]\n"
  1531. "}\n"
  1532. "]\n"
  1533. "}",
  1534. Lower);
  1535. ASSERT_TRUE(FS.get() != nullptr);
  1536. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1537. new vfs::OverlayFileSystem(Lower));
  1538. O->pushOverlay(FS);
  1539. std::error_code EC;
  1540. checkContents(O->dir_begin("//root/", EC),
  1541. {"//root/file1", "//root/file2", "//root/file3", "//root/foo"});
  1542. checkContents(O->dir_begin("//root/foo/bar", EC),
  1543. {"//root/foo/bar/a", "//root/foo/bar/b"});
  1544. }
  1545. TEST_F(VFSFromYAMLTest, DirectoryIterationSameDirMultipleEntries) {
  1546. // https://llvm.org/bugs/show_bug.cgi?id=27725
  1547. if (!supportsSameDirMultipleYAMLEntries())
  1548. return;
  1549. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1550. Lower->addDirectory("//root/zab");
  1551. Lower->addDirectory("//root/baz");
  1552. Lower->addRegularFile("//root/zab/a");
  1553. Lower->addRegularFile("//root/zab/b");
  1554. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1555. "{ 'use-external-names': false,\n"
  1556. " 'roots': [\n"
  1557. "{\n"
  1558. " 'type': 'directory',\n"
  1559. " 'name': '//root/baz/',\n"
  1560. " 'contents': [ {\n"
  1561. " 'type': 'file',\n"
  1562. " 'name': 'x',\n"
  1563. " 'external-contents': '//root/zab/a'\n"
  1564. " }\n"
  1565. " ]\n"
  1566. "},\n"
  1567. "{\n"
  1568. " 'type': 'directory',\n"
  1569. " 'name': '//root/baz/',\n"
  1570. " 'contents': [ {\n"
  1571. " 'type': 'file',\n"
  1572. " 'name': 'y',\n"
  1573. " 'external-contents': '//root/zab/b'\n"
  1574. " }\n"
  1575. " ]\n"
  1576. "}\n"
  1577. "]\n"
  1578. "}",
  1579. Lower);
  1580. ASSERT_TRUE(FS.get() != nullptr);
  1581. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1582. new vfs::OverlayFileSystem(Lower));
  1583. O->pushOverlay(FS);
  1584. std::error_code EC;
  1585. checkContents(O->dir_begin("//root/baz/", EC),
  1586. {"//root/baz/x", "//root/baz/y"});
  1587. }
  1588. TEST_F(VFSFromYAMLTest, RecursiveDirectoryIterationLevel) {
  1589. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1590. Lower->addDirectory("//root/a");
  1591. Lower->addDirectory("//root/a/b");
  1592. Lower->addDirectory("//root/a/b/c");
  1593. Lower->addRegularFile("//root/a/b/c/file");
  1594. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1595. "{ 'use-external-names': false,\n"
  1596. " 'roots': [\n"
  1597. "{\n"
  1598. " 'type': 'directory',\n"
  1599. " 'name': '//root/a/b/c/',\n"
  1600. " 'contents': [ {\n"
  1601. " 'type': 'file',\n"
  1602. " 'name': 'file',\n"
  1603. " 'external-contents': '//root/a/b/c/file'\n"
  1604. " }\n"
  1605. " ]\n"
  1606. "},\n"
  1607. "]\n"
  1608. "}",
  1609. Lower);
  1610. ASSERT_TRUE(FS.get() != nullptr);
  1611. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1612. new vfs::OverlayFileSystem(Lower));
  1613. O->pushOverlay(FS);
  1614. std::error_code EC;
  1615. // Test recursive_directory_iterator level()
  1616. vfs::recursive_directory_iterator I = vfs::recursive_directory_iterator(
  1617. *O, "//root", EC),
  1618. E;
  1619. ASSERT_FALSE(EC);
  1620. for (int l = 0; I != E; I.increment(EC), ++l) {
  1621. ASSERT_FALSE(EC);
  1622. EXPECT_EQ(I.level(), l);
  1623. }
  1624. EXPECT_EQ(I, E);
  1625. }
  1626. TEST_F(VFSFromYAMLTest, RelativePaths) {
  1627. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1628. // Filename at root level without a parent directory.
  1629. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1630. "{ 'roots': [\n"
  1631. " { 'type': 'file', 'name': 'file-not-in-directory.h',\n"
  1632. " 'external-contents': '//root/external/file'\n"
  1633. " }\n"
  1634. "] }",
  1635. Lower);
  1636. EXPECT_EQ(nullptr, FS.get());
  1637. // Relative file path.
  1638. FS = getFromYAMLString("{ 'roots': [\n"
  1639. " { 'type': 'file', 'name': 'relative/file/path.h',\n"
  1640. " 'external-contents': '//root/external/file'\n"
  1641. " }\n"
  1642. "] }",
  1643. Lower);
  1644. EXPECT_EQ(nullptr, FS.get());
  1645. // Relative directory path.
  1646. FS = getFromYAMLString(
  1647. "{ 'roots': [\n"
  1648. " { 'type': 'directory', 'name': 'relative/directory/path.h',\n"
  1649. " 'contents': []\n"
  1650. " }\n"
  1651. "] }",
  1652. Lower);
  1653. EXPECT_EQ(nullptr, FS.get());
  1654. EXPECT_EQ(3, NumDiagnostics);
  1655. }
  1656. TEST_F(VFSFromYAMLTest, NonFallthroughDirectoryIteration) {
  1657. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1658. Lower->addDirectory("//root/");
  1659. Lower->addRegularFile("//root/a");
  1660. Lower->addRegularFile("//root/b");
  1661. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1662. "{ 'use-external-names': false,\n"
  1663. " 'fallthrough': false,\n"
  1664. " 'roots': [\n"
  1665. "{\n"
  1666. " 'type': 'directory',\n"
  1667. " 'name': '//root/',\n"
  1668. " 'contents': [ {\n"
  1669. " 'type': 'file',\n"
  1670. " 'name': 'c',\n"
  1671. " 'external-contents': '//root/a'\n"
  1672. " }\n"
  1673. " ]\n"
  1674. "}\n"
  1675. "]\n"
  1676. "}",
  1677. Lower);
  1678. ASSERT_TRUE(FS.get() != nullptr);
  1679. std::error_code EC;
  1680. checkContents(FS->dir_begin("//root/", EC),
  1681. {"//root/c"});
  1682. }
  1683. TEST_F(VFSFromYAMLTest, DirectoryIterationWithDuplicates) {
  1684. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1685. Lower->addDirectory("//root/");
  1686. Lower->addRegularFile("//root/a");
  1687. Lower->addRegularFile("//root/b");
  1688. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1689. "{ 'use-external-names': false,\n"
  1690. " 'roots': [\n"
  1691. "{\n"
  1692. " 'type': 'directory',\n"
  1693. " 'name': '//root/',\n"
  1694. " 'contents': [ {\n"
  1695. " 'type': 'file',\n"
  1696. " 'name': 'a',\n"
  1697. " 'external-contents': '//root/a'\n"
  1698. " }\n"
  1699. " ]\n"
  1700. "}\n"
  1701. "]\n"
  1702. "}",
  1703. Lower);
  1704. ASSERT_TRUE(FS.get() != nullptr);
  1705. std::error_code EC;
  1706. checkContents(FS->dir_begin("//root/", EC),
  1707. {"//root/a", "//root/b"});
  1708. }
  1709. TEST_F(VFSFromYAMLTest, DirectoryIterationErrorInVFSLayer) {
  1710. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1711. Lower->addDirectory("//root/");
  1712. Lower->addDirectory("//root/foo");
  1713. Lower->addRegularFile("//root/foo/a");
  1714. Lower->addRegularFile("//root/foo/b");
  1715. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1716. "{ 'use-external-names': false,\n"
  1717. " 'roots': [\n"
  1718. "{\n"
  1719. " 'type': 'directory',\n"
  1720. " 'name': '//root/',\n"
  1721. " 'contents': [ {\n"
  1722. " 'type': 'file',\n"
  1723. " 'name': 'bar/a',\n"
  1724. " 'external-contents': '//root/foo/a'\n"
  1725. " }\n"
  1726. " ]\n"
  1727. "}\n"
  1728. "]\n"
  1729. "}",
  1730. Lower);
  1731. ASSERT_TRUE(FS.get() != nullptr);
  1732. std::error_code EC;
  1733. checkContents(FS->dir_begin("//root/foo", EC),
  1734. {"//root/foo/a", "//root/foo/b"});
  1735. }
  1736. TEST_F(VFSFromYAMLTest, GetRealPath) {
  1737. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1738. Lower->addDirectory("//dir/");
  1739. Lower->addRegularFile("/foo");
  1740. Lower->addSymlink("/link");
  1741. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1742. "{ 'use-external-names': false,\n"
  1743. " 'roots': [\n"
  1744. "{\n"
  1745. " 'type': 'directory',\n"
  1746. " 'name': '//root/',\n"
  1747. " 'contents': [ {\n"
  1748. " 'type': 'file',\n"
  1749. " 'name': 'bar',\n"
  1750. " 'external-contents': '/link'\n"
  1751. " }\n"
  1752. " ]\n"
  1753. "},\n"
  1754. "{\n"
  1755. " 'type': 'directory',\n"
  1756. " 'name': '//dir/',\n"
  1757. " 'contents': []\n"
  1758. "}\n"
  1759. "]\n"
  1760. "}",
  1761. Lower);
  1762. ASSERT_TRUE(FS.get() != nullptr);
  1763. // Regular file present in underlying file system.
  1764. SmallString<16> RealPath;
  1765. EXPECT_FALSE(FS->getRealPath("/foo", RealPath));
  1766. EXPECT_EQ(RealPath.str(), "/foo");
  1767. // File present in YAML pointing to symlink in underlying file system.
  1768. EXPECT_FALSE(FS->getRealPath("//root/bar", RealPath));
  1769. EXPECT_EQ(RealPath.str(), "/symlink");
  1770. // Directories should fall back to the underlying file system is possible.
  1771. EXPECT_FALSE(FS->getRealPath("//dir/", RealPath));
  1772. EXPECT_EQ(RealPath.str(), "//dir/");
  1773. // Try a non-existing file.
  1774. EXPECT_EQ(FS->getRealPath("/non_existing", RealPath),
  1775. errc::no_such_file_or_directory);
  1776. }
  1777. TEST_F(VFSFromYAMLTest, WorkingDirectory) {
  1778. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1779. Lower->addDirectory("//root/");
  1780. Lower->addDirectory("//root/foo");
  1781. Lower->addRegularFile("//root/foo/a");
  1782. Lower->addRegularFile("//root/foo/b");
  1783. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1784. "{ 'use-external-names': false,\n"
  1785. " 'roots': [\n"
  1786. "{\n"
  1787. " 'type': 'directory',\n"
  1788. " 'name': '//root/bar',\n"
  1789. " 'contents': [ {\n"
  1790. " 'type': 'file',\n"
  1791. " 'name': 'a',\n"
  1792. " 'external-contents': '//root/foo/a'\n"
  1793. " }\n"
  1794. " ]\n"
  1795. "}\n"
  1796. "]\n"
  1797. "}",
  1798. Lower);
  1799. ASSERT_TRUE(FS.get() != nullptr);
  1800. std::error_code EC = FS->setCurrentWorkingDirectory("//root/bar");
  1801. ASSERT_FALSE(EC);
  1802. llvm::ErrorOr<std::string> WorkingDir = FS->getCurrentWorkingDirectory();
  1803. ASSERT_TRUE(WorkingDir);
  1804. EXPECT_EQ(*WorkingDir, "//root/bar");
  1805. llvm::ErrorOr<vfs::Status> Status = FS->status("./a");
  1806. ASSERT_FALSE(Status.getError());
  1807. EXPECT_TRUE(Status->isStatusKnown());
  1808. EXPECT_FALSE(Status->isDirectory());
  1809. EXPECT_TRUE(Status->isRegularFile());
  1810. EXPECT_FALSE(Status->isSymlink());
  1811. EXPECT_FALSE(Status->isOther());
  1812. EXPECT_TRUE(Status->exists());
  1813. EC = FS->setCurrentWorkingDirectory("bogus");
  1814. ASSERT_TRUE(EC);
  1815. WorkingDir = FS->getCurrentWorkingDirectory();
  1816. ASSERT_TRUE(WorkingDir);
  1817. EXPECT_EQ(*WorkingDir, "//root/bar");
  1818. EC = FS->setCurrentWorkingDirectory("//root/");
  1819. ASSERT_FALSE(EC);
  1820. WorkingDir = FS->getCurrentWorkingDirectory();
  1821. ASSERT_TRUE(WorkingDir);
  1822. EXPECT_EQ(*WorkingDir, "//root/");
  1823. EC = FS->setCurrentWorkingDirectory("bar");
  1824. ASSERT_FALSE(EC);
  1825. WorkingDir = FS->getCurrentWorkingDirectory();
  1826. ASSERT_TRUE(WorkingDir);
  1827. EXPECT_EQ(*WorkingDir, "//root/bar");
  1828. }
  1829. TEST_F(VFSFromYAMLTest, WorkingDirectoryFallthrough) {
  1830. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1831. Lower->addDirectory("//root/");
  1832. Lower->addDirectory("//root/foo");
  1833. Lower->addRegularFile("//root/foo/a");
  1834. Lower->addRegularFile("//root/foo/b");
  1835. Lower->addRegularFile("//root/c");
  1836. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1837. "{ 'use-external-names': false,\n"
  1838. " 'roots': [\n"
  1839. "{\n"
  1840. " 'type': 'directory',\n"
  1841. " 'name': '//root/bar',\n"
  1842. " 'contents': [ {\n"
  1843. " 'type': 'file',\n"
  1844. " 'name': 'a',\n"
  1845. " 'external-contents': '//root/foo/a'\n"
  1846. " }\n"
  1847. " ]\n"
  1848. "}\n"
  1849. "]\n"
  1850. "}",
  1851. Lower);
  1852. ASSERT_TRUE(FS.get() != nullptr);
  1853. std::error_code EC = FS->setCurrentWorkingDirectory("//root/");
  1854. ASSERT_FALSE(EC);
  1855. ASSERT_TRUE(FS.get() != nullptr);
  1856. llvm::ErrorOr<vfs::Status> Status = FS->status("bar/a");
  1857. ASSERT_FALSE(Status.getError());
  1858. EXPECT_TRUE(Status->exists());
  1859. Status = FS->status("foo/a");
  1860. ASSERT_FALSE(Status.getError());
  1861. EXPECT_TRUE(Status->exists());
  1862. EC = FS->setCurrentWorkingDirectory("//root/bar");
  1863. ASSERT_FALSE(EC);
  1864. Status = FS->status("./a");
  1865. ASSERT_FALSE(Status.getError());
  1866. EXPECT_TRUE(Status->exists());
  1867. Status = FS->status("./b");
  1868. ASSERT_TRUE(Status.getError());
  1869. Status = FS->status("./c");
  1870. ASSERT_TRUE(Status.getError());
  1871. EC = FS->setCurrentWorkingDirectory("//root/");
  1872. ASSERT_FALSE(EC);
  1873. Status = FS->status("c");
  1874. ASSERT_FALSE(Status.getError());
  1875. EXPECT_TRUE(Status->exists());
  1876. }
  1877. TEST_F(VFSFromYAMLTest, WorkingDirectoryFallthroughInvalid) {
  1878. IntrusiveRefCntPtr<ErrorDummyFileSystem> Lower(new ErrorDummyFileSystem());
  1879. Lower->addDirectory("//root/");
  1880. Lower->addDirectory("//root/foo");
  1881. Lower->addRegularFile("//root/foo/a");
  1882. Lower->addRegularFile("//root/foo/b");
  1883. Lower->addRegularFile("//root/c");
  1884. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1885. "{ 'use-external-names': false,\n"
  1886. " 'roots': [\n"
  1887. "{\n"
  1888. " 'type': 'directory',\n"
  1889. " 'name': '//root/bar',\n"
  1890. " 'contents': [ {\n"
  1891. " 'type': 'file',\n"
  1892. " 'name': 'a',\n"
  1893. " 'external-contents': '//root/foo/a'\n"
  1894. " }\n"
  1895. " ]\n"
  1896. "}\n"
  1897. "]\n"
  1898. "}",
  1899. Lower);
  1900. ASSERT_TRUE(FS.get() != nullptr);
  1901. std::error_code EC = FS->setCurrentWorkingDirectory("//root/");
  1902. ASSERT_FALSE(EC);
  1903. ASSERT_TRUE(FS.get() != nullptr);
  1904. llvm::ErrorOr<vfs::Status> Status = FS->status("bar/a");
  1905. ASSERT_FALSE(Status.getError());
  1906. EXPECT_TRUE(Status->exists());
  1907. Status = FS->status("foo/a");
  1908. ASSERT_TRUE(Status.getError());
  1909. }