VirtualFileSystemTest.cpp 68 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996
  1. //===- unittests/Support/VirtualFileSystem.cpp -------------- VFS tests ---===//
  2. //
  3. // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
  4. // See https://llvm.org/LICENSE.txt for license information.
  5. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  6. //
  7. //===----------------------------------------------------------------------===//
  8. #include "llvm/Support/VirtualFileSystem.h"
  9. #include "llvm/ADT/Triple.h"
  10. #include "llvm/Config/llvm-config.h"
  11. #include "llvm/Support/Errc.h"
  12. #include "llvm/Support/Host.h"
  13. #include "llvm/Support/MemoryBuffer.h"
  14. #include "llvm/Support/Path.h"
  15. #include "llvm/Support/SourceMgr.h"
  16. #include "gmock/gmock.h"
  17. #include "gtest/gtest.h"
  18. #include <map>
  19. #include <string>
  20. using namespace llvm;
  21. using llvm::sys::fs::UniqueID;
  22. using testing::ElementsAre;
  23. using testing::Pair;
  24. using testing::UnorderedElementsAre;
  25. namespace {
  26. struct DummyFile : public vfs::File {
  27. vfs::Status S;
  28. explicit DummyFile(vfs::Status S) : S(S) {}
  29. llvm::ErrorOr<vfs::Status> status() override { return S; }
  30. llvm::ErrorOr<std::unique_ptr<llvm::MemoryBuffer>>
  31. getBuffer(const Twine &Name, int64_t FileSize, bool RequiresNullTerminator,
  32. bool IsVolatile) override {
  33. llvm_unreachable("unimplemented");
  34. }
  35. std::error_code close() override { return std::error_code(); }
  36. };
  37. class DummyFileSystem : public vfs::FileSystem {
  38. int FSID; // used to produce UniqueIDs
  39. int FileID; // used to produce UniqueIDs
  40. std::map<std::string, vfs::Status> FilesAndDirs;
  41. static int getNextFSID() {
  42. static int Count = 0;
  43. return Count++;
  44. }
  45. public:
  46. DummyFileSystem() : FSID(getNextFSID()), FileID(0) {}
  47. ErrorOr<vfs::Status> status(const Twine &Path) override {
  48. std::map<std::string, vfs::Status>::iterator I =
  49. FilesAndDirs.find(Path.str());
  50. if (I == FilesAndDirs.end())
  51. return make_error_code(llvm::errc::no_such_file_or_directory);
  52. return I->second;
  53. }
  54. ErrorOr<std::unique_ptr<vfs::File>>
  55. openFileForRead(const Twine &Path) override {
  56. auto S = status(Path);
  57. if (S)
  58. return std::unique_ptr<vfs::File>(new DummyFile{*S});
  59. return S.getError();
  60. }
  61. llvm::ErrorOr<std::string> getCurrentWorkingDirectory() const override {
  62. return std::string();
  63. }
  64. std::error_code setCurrentWorkingDirectory(const Twine &Path) override {
  65. return std::error_code();
  66. }
  67. // Map any symlink to "/symlink".
  68. std::error_code getRealPath(const Twine &Path,
  69. SmallVectorImpl<char> &Output) const override {
  70. auto I = FilesAndDirs.find(Path.str());
  71. if (I == FilesAndDirs.end())
  72. return make_error_code(llvm::errc::no_such_file_or_directory);
  73. if (I->second.isSymlink()) {
  74. Output.clear();
  75. Twine("/symlink").toVector(Output);
  76. return std::error_code();
  77. }
  78. Output.clear();
  79. Path.toVector(Output);
  80. return std::error_code();
  81. }
  82. struct DirIterImpl : public llvm::vfs::detail::DirIterImpl {
  83. std::map<std::string, vfs::Status> &FilesAndDirs;
  84. std::map<std::string, vfs::Status>::iterator I;
  85. std::string Path;
  86. bool isInPath(StringRef S) {
  87. if (Path.size() < S.size() && S.find(Path) == 0) {
  88. auto LastSep = S.find_last_of('/');
  89. if (LastSep == Path.size() || LastSep == Path.size() - 1)
  90. return true;
  91. }
  92. return false;
  93. }
  94. DirIterImpl(std::map<std::string, vfs::Status> &FilesAndDirs,
  95. const Twine &_Path)
  96. : FilesAndDirs(FilesAndDirs), I(FilesAndDirs.begin()),
  97. Path(_Path.str()) {
  98. for (; I != FilesAndDirs.end(); ++I) {
  99. if (isInPath(I->first)) {
  100. CurrentEntry =
  101. vfs::directory_entry(I->second.getName(), I->second.getType());
  102. break;
  103. }
  104. }
  105. }
  106. std::error_code increment() override {
  107. ++I;
  108. for (; I != FilesAndDirs.end(); ++I) {
  109. if (isInPath(I->first)) {
  110. CurrentEntry =
  111. vfs::directory_entry(I->second.getName(), I->second.getType());
  112. break;
  113. }
  114. }
  115. if (I == FilesAndDirs.end())
  116. CurrentEntry = vfs::directory_entry();
  117. return std::error_code();
  118. }
  119. };
  120. vfs::directory_iterator dir_begin(const Twine &Dir,
  121. std::error_code &EC) override {
  122. return vfs::directory_iterator(
  123. std::make_shared<DirIterImpl>(FilesAndDirs, Dir));
  124. }
  125. void addEntry(StringRef Path, const vfs::Status &Status) {
  126. FilesAndDirs[Path] = Status;
  127. }
  128. void addRegularFile(StringRef Path, sys::fs::perms Perms = sys::fs::all_all) {
  129. vfs::Status S(Path, UniqueID(FSID, FileID++),
  130. std::chrono::system_clock::now(), 0, 0, 1024,
  131. sys::fs::file_type::regular_file, Perms);
  132. addEntry(Path, S);
  133. }
  134. void addDirectory(StringRef Path, sys::fs::perms Perms = sys::fs::all_all) {
  135. vfs::Status S(Path, UniqueID(FSID, FileID++),
  136. std::chrono::system_clock::now(), 0, 0, 0,
  137. sys::fs::file_type::directory_file, Perms);
  138. addEntry(Path, S);
  139. }
  140. void addSymlink(StringRef Path) {
  141. vfs::Status S(Path, UniqueID(FSID, FileID++),
  142. std::chrono::system_clock::now(), 0, 0, 0,
  143. sys::fs::file_type::symlink_file, sys::fs::all_all);
  144. addEntry(Path, S);
  145. }
  146. };
  147. /// Replace back-slashes by front-slashes.
  148. std::string getPosixPath(std::string S) {
  149. SmallString<128> Result;
  150. llvm::sys::path::native(S, Result, llvm::sys::path::Style::posix);
  151. return Result.str();
  152. }
  153. } // end anonymous namespace
  154. TEST(VirtualFileSystemTest, StatusQueries) {
  155. IntrusiveRefCntPtr<DummyFileSystem> D(new DummyFileSystem());
  156. ErrorOr<vfs::Status> Status((std::error_code()));
  157. D->addRegularFile("/foo");
  158. Status = D->status("/foo");
  159. ASSERT_FALSE(Status.getError());
  160. EXPECT_TRUE(Status->isStatusKnown());
  161. EXPECT_FALSE(Status->isDirectory());
  162. EXPECT_TRUE(Status->isRegularFile());
  163. EXPECT_FALSE(Status->isSymlink());
  164. EXPECT_FALSE(Status->isOther());
  165. EXPECT_TRUE(Status->exists());
  166. D->addDirectory("/bar");
  167. Status = D->status("/bar");
  168. ASSERT_FALSE(Status.getError());
  169. EXPECT_TRUE(Status->isStatusKnown());
  170. EXPECT_TRUE(Status->isDirectory());
  171. EXPECT_FALSE(Status->isRegularFile());
  172. EXPECT_FALSE(Status->isSymlink());
  173. EXPECT_FALSE(Status->isOther());
  174. EXPECT_TRUE(Status->exists());
  175. D->addSymlink("/baz");
  176. Status = D->status("/baz");
  177. ASSERT_FALSE(Status.getError());
  178. EXPECT_TRUE(Status->isStatusKnown());
  179. EXPECT_FALSE(Status->isDirectory());
  180. EXPECT_FALSE(Status->isRegularFile());
  181. EXPECT_TRUE(Status->isSymlink());
  182. EXPECT_FALSE(Status->isOther());
  183. EXPECT_TRUE(Status->exists());
  184. EXPECT_TRUE(Status->equivalent(*Status));
  185. ErrorOr<vfs::Status> Status2 = D->status("/foo");
  186. ASSERT_FALSE(Status2.getError());
  187. EXPECT_FALSE(Status->equivalent(*Status2));
  188. }
  189. TEST(VirtualFileSystemTest, BaseOnlyOverlay) {
  190. IntrusiveRefCntPtr<DummyFileSystem> D(new DummyFileSystem());
  191. ErrorOr<vfs::Status> Status((std::error_code()));
  192. EXPECT_FALSE(Status = D->status("/foo"));
  193. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(new vfs::OverlayFileSystem(D));
  194. EXPECT_FALSE(Status = O->status("/foo"));
  195. D->addRegularFile("/foo");
  196. Status = D->status("/foo");
  197. EXPECT_FALSE(Status.getError());
  198. ErrorOr<vfs::Status> Status2((std::error_code()));
  199. Status2 = O->status("/foo");
  200. EXPECT_FALSE(Status2.getError());
  201. EXPECT_TRUE(Status->equivalent(*Status2));
  202. }
  203. TEST(VirtualFileSystemTest, GetRealPathInOverlay) {
  204. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  205. Lower->addRegularFile("/foo");
  206. Lower->addSymlink("/lower_link");
  207. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  208. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  209. new vfs::OverlayFileSystem(Lower));
  210. O->pushOverlay(Upper);
  211. // Regular file.
  212. SmallString<16> RealPath;
  213. EXPECT_FALSE(O->getRealPath("/foo", RealPath));
  214. EXPECT_EQ(RealPath.str(), "/foo");
  215. // Expect no error getting real path for symlink in lower overlay.
  216. EXPECT_FALSE(O->getRealPath("/lower_link", RealPath));
  217. EXPECT_EQ(RealPath.str(), "/symlink");
  218. // Try a non-existing link.
  219. EXPECT_EQ(O->getRealPath("/upper_link", RealPath),
  220. errc::no_such_file_or_directory);
  221. // Add a new symlink in upper.
  222. Upper->addSymlink("/upper_link");
  223. EXPECT_FALSE(O->getRealPath("/upper_link", RealPath));
  224. EXPECT_EQ(RealPath.str(), "/symlink");
  225. }
  226. TEST(VirtualFileSystemTest, OverlayFiles) {
  227. IntrusiveRefCntPtr<DummyFileSystem> Base(new DummyFileSystem());
  228. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  229. IntrusiveRefCntPtr<DummyFileSystem> Top(new DummyFileSystem());
  230. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  231. new vfs::OverlayFileSystem(Base));
  232. O->pushOverlay(Middle);
  233. O->pushOverlay(Top);
  234. ErrorOr<vfs::Status> Status1((std::error_code())),
  235. Status2((std::error_code())), Status3((std::error_code())),
  236. StatusB((std::error_code())), StatusM((std::error_code())),
  237. StatusT((std::error_code()));
  238. Base->addRegularFile("/foo");
  239. StatusB = Base->status("/foo");
  240. ASSERT_FALSE(StatusB.getError());
  241. Status1 = O->status("/foo");
  242. ASSERT_FALSE(Status1.getError());
  243. Middle->addRegularFile("/foo");
  244. StatusM = Middle->status("/foo");
  245. ASSERT_FALSE(StatusM.getError());
  246. Status2 = O->status("/foo");
  247. ASSERT_FALSE(Status2.getError());
  248. Top->addRegularFile("/foo");
  249. StatusT = Top->status("/foo");
  250. ASSERT_FALSE(StatusT.getError());
  251. Status3 = O->status("/foo");
  252. ASSERT_FALSE(Status3.getError());
  253. EXPECT_TRUE(Status1->equivalent(*StatusB));
  254. EXPECT_TRUE(Status2->equivalent(*StatusM));
  255. EXPECT_TRUE(Status3->equivalent(*StatusT));
  256. EXPECT_FALSE(Status1->equivalent(*Status2));
  257. EXPECT_FALSE(Status2->equivalent(*Status3));
  258. EXPECT_FALSE(Status1->equivalent(*Status3));
  259. }
  260. TEST(VirtualFileSystemTest, OverlayDirsNonMerged) {
  261. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  262. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  263. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  264. new vfs::OverlayFileSystem(Lower));
  265. O->pushOverlay(Upper);
  266. Lower->addDirectory("/lower-only");
  267. Upper->addDirectory("/upper-only");
  268. // non-merged paths should be the same
  269. ErrorOr<vfs::Status> Status1 = Lower->status("/lower-only");
  270. ASSERT_FALSE(Status1.getError());
  271. ErrorOr<vfs::Status> Status2 = O->status("/lower-only");
  272. ASSERT_FALSE(Status2.getError());
  273. EXPECT_TRUE(Status1->equivalent(*Status2));
  274. Status1 = Upper->status("/upper-only");
  275. ASSERT_FALSE(Status1.getError());
  276. Status2 = O->status("/upper-only");
  277. ASSERT_FALSE(Status2.getError());
  278. EXPECT_TRUE(Status1->equivalent(*Status2));
  279. }
  280. TEST(VirtualFileSystemTest, MergedDirPermissions) {
  281. // merged directories get the permissions of the upper dir
  282. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  283. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  284. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  285. new vfs::OverlayFileSystem(Lower));
  286. O->pushOverlay(Upper);
  287. ErrorOr<vfs::Status> Status((std::error_code()));
  288. Lower->addDirectory("/both", sys::fs::owner_read);
  289. Upper->addDirectory("/both", sys::fs::owner_all | sys::fs::group_read);
  290. Status = O->status("/both");
  291. ASSERT_FALSE(Status.getError());
  292. EXPECT_EQ(0740, Status->getPermissions());
  293. // permissions (as usual) are not recursively applied
  294. Lower->addRegularFile("/both/foo", sys::fs::owner_read);
  295. Upper->addRegularFile("/both/bar", sys::fs::owner_write);
  296. Status = O->status("/both/foo");
  297. ASSERT_FALSE(Status.getError());
  298. EXPECT_EQ(0400, Status->getPermissions());
  299. Status = O->status("/both/bar");
  300. ASSERT_FALSE(Status.getError());
  301. EXPECT_EQ(0200, Status->getPermissions());
  302. }
  303. TEST(VirtualFileSystemTest, OverlayIterator) {
  304. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  305. Lower->addRegularFile("/foo");
  306. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  307. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  308. new vfs::OverlayFileSystem(Lower));
  309. O->pushOverlay(Upper);
  310. ErrorOr<vfs::Status> Status((std::error_code()));
  311. {
  312. auto it = O->overlays_begin();
  313. auto end = O->overlays_end();
  314. EXPECT_NE(it, end);
  315. Status = (*it)->status("/foo");
  316. ASSERT_TRUE(Status.getError());
  317. it++;
  318. EXPECT_NE(it, end);
  319. Status = (*it)->status("/foo");
  320. ASSERT_FALSE(Status.getError());
  321. EXPECT_TRUE(Status->exists());
  322. it++;
  323. EXPECT_EQ(it, end);
  324. }
  325. {
  326. auto it = O->overlays_rbegin();
  327. auto end = O->overlays_rend();
  328. EXPECT_NE(it, end);
  329. Status = (*it)->status("/foo");
  330. ASSERT_FALSE(Status.getError());
  331. EXPECT_TRUE(Status->exists());
  332. it++;
  333. EXPECT_NE(it, end);
  334. Status = (*it)->status("/foo");
  335. ASSERT_TRUE(Status.getError());
  336. it++;
  337. EXPECT_EQ(it, end);
  338. }
  339. }
  340. namespace {
  341. struct ScopedDir {
  342. SmallString<128> Path;
  343. ScopedDir(const Twine &Name, bool Unique = false) {
  344. std::error_code EC;
  345. if (Unique) {
  346. EC = llvm::sys::fs::createUniqueDirectory(Name, Path);
  347. if (!EC) {
  348. // Resolve any symlinks in the new directory.
  349. std::string UnresolvedPath = Path.str();
  350. EC = llvm::sys::fs::real_path(UnresolvedPath, Path);
  351. }
  352. } else {
  353. Path = Name.str();
  354. EC = llvm::sys::fs::create_directory(Twine(Path));
  355. }
  356. if (EC)
  357. Path = "";
  358. EXPECT_FALSE(EC) << EC.message();
  359. }
  360. ~ScopedDir() {
  361. if (Path != "") {
  362. EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
  363. }
  364. }
  365. operator StringRef() { return Path.str(); }
  366. };
  367. struct ScopedLink {
  368. SmallString<128> Path;
  369. ScopedLink(const Twine &To, const Twine &From) {
  370. Path = From.str();
  371. std::error_code EC = sys::fs::create_link(To, From);
  372. if (EC)
  373. Path = "";
  374. EXPECT_FALSE(EC);
  375. }
  376. ~ScopedLink() {
  377. if (Path != "") {
  378. EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
  379. }
  380. }
  381. operator StringRef() { return Path.str(); }
  382. };
  383. struct ScopedFile {
  384. SmallString<128> Path;
  385. ScopedFile(const Twine &Path, StringRef Contents) {
  386. Path.toVector(this->Path);
  387. std::error_code EC;
  388. raw_fd_ostream OS(this->Path, EC);
  389. EXPECT_FALSE(EC);
  390. OS << Contents;
  391. OS.flush();
  392. EXPECT_FALSE(OS.error());
  393. if (EC || OS.error())
  394. this->Path = "";
  395. }
  396. ~ScopedFile() {
  397. if (Path != "") {
  398. EXPECT_FALSE(llvm::sys::fs::remove(Path.str()));
  399. }
  400. }
  401. };
  402. } // end anonymous namespace
  403. TEST(VirtualFileSystemTest, BasicRealFSIteration) {
  404. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  405. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  406. std::error_code EC;
  407. vfs::directory_iterator I = FS->dir_begin(Twine(TestDirectory), EC);
  408. ASSERT_FALSE(EC);
  409. EXPECT_EQ(vfs::directory_iterator(), I); // empty directory is empty
  410. ScopedDir _a(TestDirectory + "/a");
  411. ScopedDir _ab(TestDirectory + "/a/b");
  412. ScopedDir _c(TestDirectory + "/c");
  413. ScopedDir _cd(TestDirectory + "/c/d");
  414. I = FS->dir_begin(Twine(TestDirectory), EC);
  415. ASSERT_FALSE(EC);
  416. ASSERT_NE(vfs::directory_iterator(), I);
  417. // Check either a or c, since we can't rely on the iteration order.
  418. EXPECT_TRUE(I->path().endswith("a") || I->path().endswith("c"));
  419. I.increment(EC);
  420. ASSERT_FALSE(EC);
  421. ASSERT_NE(vfs::directory_iterator(), I);
  422. EXPECT_TRUE(I->path().endswith("a") || I->path().endswith("c"));
  423. I.increment(EC);
  424. EXPECT_EQ(vfs::directory_iterator(), I);
  425. }
  426. #ifdef LLVM_ON_UNIX
  427. TEST(VirtualFileSystemTest, MultipleWorkingDirs) {
  428. // Our root contains a/aa, b/bb, c, where c is a link to a/.
  429. // Run tests both in root/b/ and root/c/ (to test "normal" and symlink dirs).
  430. // Interleave operations to show the working directories are independent.
  431. ScopedDir Root("r", true), ADir(Root.Path + "/a"), BDir(Root.Path + "/b");
  432. ScopedLink C(ADir.Path, Root.Path + "/c");
  433. ScopedFile AA(ADir.Path + "/aa", "aaaa"), BB(BDir.Path + "/bb", "bbbb");
  434. std::unique_ptr<vfs::FileSystem> BFS = vfs::createPhysicalFileSystem(),
  435. CFS = vfs::createPhysicalFileSystem();
  436. ASSERT_FALSE(BFS->setCurrentWorkingDirectory(BDir.Path));
  437. ASSERT_FALSE(CFS->setCurrentWorkingDirectory(C.Path));
  438. EXPECT_EQ(BDir.Path, *BFS->getCurrentWorkingDirectory());
  439. EXPECT_EQ(C.Path, *CFS->getCurrentWorkingDirectory());
  440. // openFileForRead(), indirectly.
  441. auto BBuf = BFS->getBufferForFile("bb");
  442. ASSERT_TRUE(BBuf);
  443. EXPECT_EQ("bbbb", (*BBuf)->getBuffer());
  444. auto ABuf = CFS->getBufferForFile("aa");
  445. ASSERT_TRUE(ABuf);
  446. EXPECT_EQ("aaaa", (*ABuf)->getBuffer());
  447. // status()
  448. auto BStat = BFS->status("bb");
  449. ASSERT_TRUE(BStat);
  450. EXPECT_EQ("bb", BStat->getName());
  451. auto AStat = CFS->status("aa");
  452. ASSERT_TRUE(AStat);
  453. EXPECT_EQ("aa", AStat->getName()); // unresolved name
  454. // getRealPath()
  455. SmallString<128> BPath;
  456. ASSERT_FALSE(BFS->getRealPath("bb", BPath));
  457. EXPECT_EQ(BB.Path, BPath);
  458. SmallString<128> APath;
  459. ASSERT_FALSE(CFS->getRealPath("aa", APath));
  460. EXPECT_EQ(AA.Path, APath); // Reports resolved name.
  461. // dir_begin
  462. std::error_code EC;
  463. auto BIt = BFS->dir_begin(".", EC);
  464. ASSERT_FALSE(EC);
  465. ASSERT_NE(BIt, vfs::directory_iterator());
  466. EXPECT_EQ((BDir.Path + "/./bb").str(), BIt->path());
  467. BIt.increment(EC);
  468. ASSERT_FALSE(EC);
  469. ASSERT_EQ(BIt, vfs::directory_iterator());
  470. auto CIt = CFS->dir_begin(".", EC);
  471. ASSERT_FALSE(EC);
  472. ASSERT_NE(CIt, vfs::directory_iterator());
  473. EXPECT_EQ((ADir.Path + "/./aa").str(), CIt->path()); // Partly resolved name!
  474. CIt.increment(EC); // Because likely to read through this path.
  475. ASSERT_FALSE(EC);
  476. ASSERT_EQ(CIt, vfs::directory_iterator());
  477. }
  478. TEST(VirtualFileSystemTest, BrokenSymlinkRealFSIteration) {
  479. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  480. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  481. ScopedLink _a("no_such_file", TestDirectory + "/a");
  482. ScopedDir _b(TestDirectory + "/b");
  483. ScopedLink _c("no_such_file", TestDirectory + "/c");
  484. // Should get no iteration error, but a stat error for the broken symlinks.
  485. std::map<std::string, std::error_code> StatResults;
  486. std::error_code EC;
  487. for (vfs::directory_iterator I = FS->dir_begin(Twine(TestDirectory), EC), E;
  488. I != E; I.increment(EC)) {
  489. EXPECT_FALSE(EC);
  490. StatResults[sys::path::filename(I->path())] =
  491. FS->status(I->path()).getError();
  492. }
  493. EXPECT_THAT(
  494. StatResults,
  495. ElementsAre(
  496. Pair("a", std::make_error_code(std::errc::no_such_file_or_directory)),
  497. Pair("b", std::error_code()),
  498. Pair("c",
  499. std::make_error_code(std::errc::no_such_file_or_directory))));
  500. }
  501. #endif
  502. TEST(VirtualFileSystemTest, BasicRealFSRecursiveIteration) {
  503. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  504. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  505. std::error_code EC;
  506. auto I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
  507. ASSERT_FALSE(EC);
  508. EXPECT_EQ(vfs::recursive_directory_iterator(), I); // empty directory is empty
  509. ScopedDir _a(TestDirectory + "/a");
  510. ScopedDir _ab(TestDirectory + "/a/b");
  511. ScopedDir _c(TestDirectory + "/c");
  512. ScopedDir _cd(TestDirectory + "/c/d");
  513. I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
  514. ASSERT_FALSE(EC);
  515. ASSERT_NE(vfs::recursive_directory_iterator(), I);
  516. std::vector<std::string> Contents;
  517. for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
  518. I.increment(EC)) {
  519. Contents.push_back(I->path());
  520. }
  521. // Check contents, which may be in any order
  522. EXPECT_EQ(4U, Contents.size());
  523. int Counts[4] = {0, 0, 0, 0};
  524. for (const std::string &Name : Contents) {
  525. ASSERT_FALSE(Name.empty());
  526. int Index = Name[Name.size() - 1] - 'a';
  527. ASSERT_TRUE(Index >= 0 && Index < 4);
  528. Counts[Index]++;
  529. }
  530. EXPECT_EQ(1, Counts[0]); // a
  531. EXPECT_EQ(1, Counts[1]); // b
  532. EXPECT_EQ(1, Counts[2]); // c
  533. EXPECT_EQ(1, Counts[3]); // d
  534. }
  535. TEST(VirtualFileSystemTest, BasicRealFSRecursiveIterationNoPush) {
  536. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  537. ScopedDir _a(TestDirectory + "/a");
  538. ScopedDir _ab(TestDirectory + "/a/b");
  539. ScopedDir _c(TestDirectory + "/c");
  540. ScopedDir _cd(TestDirectory + "/c/d");
  541. ScopedDir _e(TestDirectory + "/e");
  542. ScopedDir _ef(TestDirectory + "/e/f");
  543. ScopedDir _g(TestDirectory + "/g");
  544. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  545. // Test that calling no_push on entries without subdirectories has no effect.
  546. {
  547. std::error_code EC;
  548. auto I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
  549. ASSERT_FALSE(EC);
  550. std::vector<std::string> Contents;
  551. for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
  552. I.increment(EC)) {
  553. Contents.push_back(I->path());
  554. char last = I->path().back();
  555. switch (last) {
  556. case 'b':
  557. case 'd':
  558. case 'f':
  559. case 'g':
  560. I.no_push();
  561. break;
  562. default:
  563. break;
  564. }
  565. }
  566. EXPECT_EQ(7U, Contents.size());
  567. }
  568. // Test that calling no_push skips subdirectories.
  569. {
  570. std::error_code EC;
  571. auto I = vfs::recursive_directory_iterator(*FS, Twine(TestDirectory), EC);
  572. ASSERT_FALSE(EC);
  573. std::vector<std::string> Contents;
  574. for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
  575. I.increment(EC)) {
  576. Contents.push_back(I->path());
  577. char last = I->path().back();
  578. switch (last) {
  579. case 'a':
  580. case 'c':
  581. case 'e':
  582. I.no_push();
  583. break;
  584. default:
  585. break;
  586. }
  587. }
  588. // Check contents, which may be in any order
  589. EXPECT_EQ(4U, Contents.size());
  590. int Counts[7] = {0, 0, 0, 0, 0, 0, 0};
  591. for (const std::string &Name : Contents) {
  592. ASSERT_FALSE(Name.empty());
  593. int Index = Name[Name.size() - 1] - 'a';
  594. ASSERT_TRUE(Index >= 0 && Index < 7);
  595. Counts[Index]++;
  596. }
  597. EXPECT_EQ(1, Counts[0]); // a
  598. EXPECT_EQ(0, Counts[1]); // b
  599. EXPECT_EQ(1, Counts[2]); // c
  600. EXPECT_EQ(0, Counts[3]); // d
  601. EXPECT_EQ(1, Counts[4]); // e
  602. EXPECT_EQ(0, Counts[5]); // f
  603. EXPECT_EQ(1, Counts[6]); // g
  604. }
  605. }
  606. #ifdef LLVM_ON_UNIX
  607. TEST(VirtualFileSystemTest, BrokenSymlinkRealFSRecursiveIteration) {
  608. ScopedDir TestDirectory("virtual-file-system-test", /*Unique*/ true);
  609. IntrusiveRefCntPtr<vfs::FileSystem> FS = vfs::getRealFileSystem();
  610. ScopedLink _a("no_such_file", TestDirectory + "/a");
  611. ScopedDir _b(TestDirectory + "/b");
  612. ScopedLink _ba("no_such_file", TestDirectory + "/b/a");
  613. ScopedDir _bb(TestDirectory + "/b/b");
  614. ScopedLink _bc("no_such_file", TestDirectory + "/b/c");
  615. ScopedLink _c("no_such_file", TestDirectory + "/c");
  616. ScopedDir _d(TestDirectory + "/d");
  617. ScopedDir _dd(TestDirectory + "/d/d");
  618. ScopedDir _ddd(TestDirectory + "/d/d/d");
  619. ScopedLink _e("no_such_file", TestDirectory + "/e");
  620. std::vector<std::string> VisitedBrokenSymlinks;
  621. std::vector<std::string> VisitedNonBrokenSymlinks;
  622. std::error_code EC;
  623. for (vfs::recursive_directory_iterator I(*FS, Twine(TestDirectory), EC), E;
  624. I != E; I.increment(EC)) {
  625. EXPECT_FALSE(EC);
  626. (FS->status(I->path()) ? VisitedNonBrokenSymlinks : VisitedBrokenSymlinks)
  627. .push_back(I->path());
  628. }
  629. // Check visited file names.
  630. EXPECT_THAT(VisitedBrokenSymlinks,
  631. UnorderedElementsAre(StringRef(_a), StringRef(_ba),
  632. StringRef(_bc), StringRef(_c),
  633. StringRef(_e)));
  634. EXPECT_THAT(VisitedNonBrokenSymlinks,
  635. UnorderedElementsAre(StringRef(_b), StringRef(_bb), StringRef(_d),
  636. StringRef(_dd), StringRef(_ddd)));
  637. }
  638. #endif
  639. template <typename DirIter>
  640. static void checkContents(DirIter I, ArrayRef<StringRef> ExpectedOut) {
  641. std::error_code EC;
  642. SmallVector<StringRef, 4> Expected(ExpectedOut.begin(), ExpectedOut.end());
  643. SmallVector<std::string, 4> InputToCheck;
  644. // Do not rely on iteration order to check for contents, sort both
  645. // content vectors before comparison.
  646. for (DirIter E; !EC && I != E; I.increment(EC))
  647. InputToCheck.push_back(I->path());
  648. llvm::sort(InputToCheck);
  649. llvm::sort(Expected);
  650. EXPECT_EQ(InputToCheck.size(), Expected.size());
  651. unsigned LastElt = std::min(InputToCheck.size(), Expected.size());
  652. for (unsigned Idx = 0; Idx != LastElt; ++Idx)
  653. EXPECT_EQ(StringRef(InputToCheck[Idx]), Expected[Idx]);
  654. }
  655. TEST(VirtualFileSystemTest, OverlayIteration) {
  656. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  657. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  658. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  659. new vfs::OverlayFileSystem(Lower));
  660. O->pushOverlay(Upper);
  661. std::error_code EC;
  662. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>());
  663. Lower->addRegularFile("/file1");
  664. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>("/file1"));
  665. Upper->addRegularFile("/file2");
  666. checkContents(O->dir_begin("/", EC), {"/file2", "/file1"});
  667. Lower->addDirectory("/dir1");
  668. Lower->addRegularFile("/dir1/foo");
  669. Upper->addDirectory("/dir2");
  670. Upper->addRegularFile("/dir2/foo");
  671. checkContents(O->dir_begin("/dir2", EC), ArrayRef<StringRef>("/dir2/foo"));
  672. checkContents(O->dir_begin("/", EC), {"/dir2", "/file2", "/dir1", "/file1"});
  673. }
  674. TEST(VirtualFileSystemTest, OverlayRecursiveIteration) {
  675. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  676. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  677. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  678. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  679. new vfs::OverlayFileSystem(Lower));
  680. O->pushOverlay(Middle);
  681. O->pushOverlay(Upper);
  682. std::error_code EC;
  683. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  684. ArrayRef<StringRef>());
  685. Lower->addRegularFile("/file1");
  686. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  687. ArrayRef<StringRef>("/file1"));
  688. Upper->addDirectory("/dir");
  689. Upper->addRegularFile("/dir/file2");
  690. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  691. {"/dir", "/dir/file2", "/file1"});
  692. Lower->addDirectory("/dir1");
  693. Lower->addRegularFile("/dir1/foo");
  694. Lower->addDirectory("/dir1/a");
  695. Lower->addRegularFile("/dir1/a/b");
  696. Middle->addDirectory("/a");
  697. Middle->addDirectory("/a/b");
  698. Middle->addDirectory("/a/b/c");
  699. Middle->addRegularFile("/a/b/c/d");
  700. Middle->addRegularFile("/hiddenByUp");
  701. Upper->addDirectory("/dir2");
  702. Upper->addRegularFile("/dir2/foo");
  703. Upper->addRegularFile("/hiddenByUp");
  704. checkContents(vfs::recursive_directory_iterator(*O, "/dir2", EC),
  705. ArrayRef<StringRef>("/dir2/foo"));
  706. checkContents(vfs::recursive_directory_iterator(*O, "/", EC),
  707. {"/dir", "/dir/file2", "/dir2", "/dir2/foo", "/hiddenByUp",
  708. "/a", "/a/b", "/a/b/c", "/a/b/c/d", "/dir1", "/dir1/a",
  709. "/dir1/a/b", "/dir1/foo", "/file1"});
  710. }
  711. TEST(VirtualFileSystemTest, ThreeLevelIteration) {
  712. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  713. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  714. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  715. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  716. new vfs::OverlayFileSystem(Lower));
  717. O->pushOverlay(Middle);
  718. O->pushOverlay(Upper);
  719. std::error_code EC;
  720. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>());
  721. Middle->addRegularFile("/file2");
  722. checkContents(O->dir_begin("/", EC), ArrayRef<StringRef>("/file2"));
  723. Lower->addRegularFile("/file1");
  724. Upper->addRegularFile("/file3");
  725. checkContents(O->dir_begin("/", EC), {"/file3", "/file2", "/file1"});
  726. }
  727. TEST(VirtualFileSystemTest, HiddenInIteration) {
  728. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  729. IntrusiveRefCntPtr<DummyFileSystem> Middle(new DummyFileSystem());
  730. IntrusiveRefCntPtr<DummyFileSystem> Upper(new DummyFileSystem());
  731. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  732. new vfs::OverlayFileSystem(Lower));
  733. O->pushOverlay(Middle);
  734. O->pushOverlay(Upper);
  735. std::error_code EC;
  736. Lower->addRegularFile("/onlyInLow");
  737. Lower->addDirectory("/hiddenByMid");
  738. Lower->addDirectory("/hiddenByUp");
  739. Middle->addRegularFile("/onlyInMid");
  740. Middle->addRegularFile("/hiddenByMid");
  741. Middle->addDirectory("/hiddenByUp");
  742. Upper->addRegularFile("/onlyInUp");
  743. Upper->addRegularFile("/hiddenByUp");
  744. checkContents(
  745. O->dir_begin("/", EC),
  746. {"/hiddenByUp", "/onlyInUp", "/hiddenByMid", "/onlyInMid", "/onlyInLow"});
  747. // Make sure we get the top-most entry
  748. {
  749. std::error_code EC;
  750. vfs::directory_iterator I = O->dir_begin("/", EC), E;
  751. for (; !EC && I != E; I.increment(EC))
  752. if (I->path() == "/hiddenByUp")
  753. break;
  754. ASSERT_NE(E, I);
  755. EXPECT_EQ(sys::fs::file_type::regular_file, I->type());
  756. }
  757. {
  758. std::error_code EC;
  759. vfs::directory_iterator I = O->dir_begin("/", EC), E;
  760. for (; !EC && I != E; I.increment(EC))
  761. if (I->path() == "/hiddenByMid")
  762. break;
  763. ASSERT_NE(E, I);
  764. EXPECT_EQ(sys::fs::file_type::regular_file, I->type());
  765. }
  766. }
  767. TEST(ProxyFileSystemTest, Basic) {
  768. IntrusiveRefCntPtr<vfs::InMemoryFileSystem> Base(
  769. new vfs::InMemoryFileSystem());
  770. vfs::ProxyFileSystem PFS(Base);
  771. Base->addFile("/a", 0, MemoryBuffer::getMemBuffer("test"));
  772. auto Stat = PFS.status("/a");
  773. ASSERT_FALSE(Stat.getError());
  774. auto File = PFS.openFileForRead("/a");
  775. ASSERT_FALSE(File.getError());
  776. EXPECT_EQ("test", (*(*File)->getBuffer("ignored"))->getBuffer());
  777. std::error_code EC;
  778. vfs::directory_iterator I = PFS.dir_begin("/", EC);
  779. ASSERT_FALSE(EC);
  780. ASSERT_EQ("/a", I->path());
  781. I.increment(EC);
  782. ASSERT_FALSE(EC);
  783. ASSERT_EQ(vfs::directory_iterator(), I);
  784. ASSERT_FALSE(PFS.setCurrentWorkingDirectory("/"));
  785. auto PWD = PFS.getCurrentWorkingDirectory();
  786. ASSERT_FALSE(PWD.getError());
  787. ASSERT_EQ("/", *PWD);
  788. SmallString<16> Path;
  789. ASSERT_FALSE(PFS.getRealPath("a", Path));
  790. ASSERT_EQ("/a", Path);
  791. bool Local = true;
  792. ASSERT_FALSE(PFS.isLocal("/a", Local));
  793. EXPECT_FALSE(Local);
  794. }
  795. class InMemoryFileSystemTest : public ::testing::Test {
  796. protected:
  797. llvm::vfs::InMemoryFileSystem FS;
  798. llvm::vfs::InMemoryFileSystem NormalizedFS;
  799. InMemoryFileSystemTest()
  800. : FS(/*UseNormalizedPaths=*/false),
  801. NormalizedFS(/*UseNormalizedPaths=*/true) {}
  802. };
  803. MATCHER_P2(IsHardLinkTo, FS, Target, "") {
  804. StringRef From = arg;
  805. StringRef To = Target;
  806. auto OpenedFrom = FS->openFileForRead(From);
  807. auto OpenedTo = FS->openFileForRead(To);
  808. return !OpenedFrom.getError() && !OpenedTo.getError() &&
  809. (*OpenedFrom)->status()->getUniqueID() ==
  810. (*OpenedTo)->status()->getUniqueID();
  811. }
  812. TEST_F(InMemoryFileSystemTest, IsEmpty) {
  813. auto Stat = FS.status("/a");
  814. ASSERT_EQ(Stat.getError(), errc::no_such_file_or_directory) << FS.toString();
  815. Stat = FS.status("/");
  816. ASSERT_EQ(Stat.getError(), errc::no_such_file_or_directory) << FS.toString();
  817. }
  818. TEST_F(InMemoryFileSystemTest, WindowsPath) {
  819. FS.addFile("c:/windows/system128/foo.cpp", 0, MemoryBuffer::getMemBuffer(""));
  820. auto Stat = FS.status("c:");
  821. #if !defined(_WIN32)
  822. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  823. #endif
  824. Stat = FS.status("c:/windows/system128/foo.cpp");
  825. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  826. FS.addFile("d:/windows/foo.cpp", 0, MemoryBuffer::getMemBuffer(""));
  827. Stat = FS.status("d:/windows/foo.cpp");
  828. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  829. }
  830. TEST_F(InMemoryFileSystemTest, OverlayFile) {
  831. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  832. NormalizedFS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  833. auto Stat = FS.status("/");
  834. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  835. Stat = FS.status("/.");
  836. ASSERT_FALSE(Stat);
  837. Stat = NormalizedFS.status("/.");
  838. ASSERT_FALSE(Stat.getError()) << Stat.getError() << FS.toString();
  839. Stat = FS.status("/a");
  840. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  841. ASSERT_EQ("/a", Stat->getName());
  842. }
  843. TEST_F(InMemoryFileSystemTest, OverlayFileNoOwn) {
  844. auto Buf = MemoryBuffer::getMemBuffer("a");
  845. FS.addFileNoOwn("/a", 0, Buf.get());
  846. auto Stat = FS.status("/a");
  847. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  848. ASSERT_EQ("/a", Stat->getName());
  849. }
  850. TEST_F(InMemoryFileSystemTest, OpenFileForRead) {
  851. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  852. FS.addFile("././c", 0, MemoryBuffer::getMemBuffer("c"));
  853. FS.addFile("./d/../d", 0, MemoryBuffer::getMemBuffer("d"));
  854. NormalizedFS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a"));
  855. NormalizedFS.addFile("././c", 0, MemoryBuffer::getMemBuffer("c"));
  856. NormalizedFS.addFile("./d/../d", 0, MemoryBuffer::getMemBuffer("d"));
  857. auto File = FS.openFileForRead("/a");
  858. ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
  859. File = FS.openFileForRead("/a"); // Open again.
  860. ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
  861. File = NormalizedFS.openFileForRead("/././a"); // Open again.
  862. ASSERT_EQ("a", (*(*File)->getBuffer("ignored"))->getBuffer());
  863. File = FS.openFileForRead("/");
  864. ASSERT_EQ(File.getError(), errc::invalid_argument) << FS.toString();
  865. File = FS.openFileForRead("/b");
  866. ASSERT_EQ(File.getError(), errc::no_such_file_or_directory) << FS.toString();
  867. File = FS.openFileForRead("./c");
  868. ASSERT_FALSE(File);
  869. File = FS.openFileForRead("e/../d");
  870. ASSERT_FALSE(File);
  871. File = NormalizedFS.openFileForRead("./c");
  872. ASSERT_EQ("c", (*(*File)->getBuffer("ignored"))->getBuffer());
  873. File = NormalizedFS.openFileForRead("e/../d");
  874. ASSERT_EQ("d", (*(*File)->getBuffer("ignored"))->getBuffer());
  875. }
  876. TEST_F(InMemoryFileSystemTest, DuplicatedFile) {
  877. ASSERT_TRUE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a")));
  878. ASSERT_FALSE(FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("a")));
  879. ASSERT_TRUE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("a")));
  880. ASSERT_FALSE(FS.addFile("/a", 0, MemoryBuffer::getMemBuffer("b")));
  881. }
  882. TEST_F(InMemoryFileSystemTest, DirectoryIteration) {
  883. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer(""));
  884. FS.addFile("/b/c", 0, MemoryBuffer::getMemBuffer(""));
  885. std::error_code EC;
  886. vfs::directory_iterator I = FS.dir_begin("/", EC);
  887. ASSERT_FALSE(EC);
  888. ASSERT_EQ("/a", I->path());
  889. I.increment(EC);
  890. ASSERT_FALSE(EC);
  891. ASSERT_EQ("/b", I->path());
  892. I.increment(EC);
  893. ASSERT_FALSE(EC);
  894. ASSERT_EQ(vfs::directory_iterator(), I);
  895. I = FS.dir_begin("/b", EC);
  896. ASSERT_FALSE(EC);
  897. // When on Windows, we end up with "/b\\c" as the name. Convert to Posix
  898. // path for the sake of the comparison.
  899. ASSERT_EQ("/b/c", getPosixPath(I->path()));
  900. I.increment(EC);
  901. ASSERT_FALSE(EC);
  902. ASSERT_EQ(vfs::directory_iterator(), I);
  903. }
  904. TEST_F(InMemoryFileSystemTest, WorkingDirectory) {
  905. FS.setCurrentWorkingDirectory("/b");
  906. FS.addFile("c", 0, MemoryBuffer::getMemBuffer(""));
  907. auto Stat = FS.status("/b/c");
  908. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  909. ASSERT_EQ("/b/c", Stat->getName());
  910. ASSERT_EQ("/b", *FS.getCurrentWorkingDirectory());
  911. Stat = FS.status("c");
  912. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  913. NormalizedFS.setCurrentWorkingDirectory("/b/c");
  914. NormalizedFS.setCurrentWorkingDirectory(".");
  915. ASSERT_EQ("/b/c",
  916. getPosixPath(NormalizedFS.getCurrentWorkingDirectory().get()));
  917. NormalizedFS.setCurrentWorkingDirectory("..");
  918. ASSERT_EQ("/b",
  919. getPosixPath(NormalizedFS.getCurrentWorkingDirectory().get()));
  920. }
  921. TEST_F(InMemoryFileSystemTest, IsLocal) {
  922. FS.setCurrentWorkingDirectory("/b");
  923. FS.addFile("c", 0, MemoryBuffer::getMemBuffer(""));
  924. std::error_code EC;
  925. bool IsLocal = true;
  926. EC = FS.isLocal("c", IsLocal);
  927. ASSERT_FALSE(EC);
  928. ASSERT_FALSE(IsLocal);
  929. }
  930. #if !defined(_WIN32)
  931. TEST_F(InMemoryFileSystemTest, GetRealPath) {
  932. SmallString<16> Path;
  933. EXPECT_EQ(FS.getRealPath("b", Path), errc::operation_not_permitted);
  934. auto GetRealPath = [this](StringRef P) {
  935. SmallString<16> Output;
  936. auto EC = FS.getRealPath(P, Output);
  937. EXPECT_FALSE(EC);
  938. return Output.str().str();
  939. };
  940. FS.setCurrentWorkingDirectory("a");
  941. EXPECT_EQ(GetRealPath("b"), "a/b");
  942. EXPECT_EQ(GetRealPath("../b"), "b");
  943. EXPECT_EQ(GetRealPath("b/./c"), "a/b/c");
  944. FS.setCurrentWorkingDirectory("/a");
  945. EXPECT_EQ(GetRealPath("b"), "/a/b");
  946. EXPECT_EQ(GetRealPath("../b"), "/b");
  947. EXPECT_EQ(GetRealPath("b/./c"), "/a/b/c");
  948. }
  949. #endif // _WIN32
  950. TEST_F(InMemoryFileSystemTest, AddFileWithUser) {
  951. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), 0xFEEDFACE);
  952. auto Stat = FS.status("/a");
  953. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  954. ASSERT_TRUE(Stat->isDirectory());
  955. ASSERT_EQ(0xFEEDFACE, Stat->getUser());
  956. Stat = FS.status("/a/b");
  957. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  958. ASSERT_TRUE(Stat->isDirectory());
  959. ASSERT_EQ(0xFEEDFACE, Stat->getUser());
  960. Stat = FS.status("/a/b/c");
  961. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  962. ASSERT_TRUE(Stat->isRegularFile());
  963. ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
  964. ASSERT_EQ(0xFEEDFACE, Stat->getUser());
  965. }
  966. TEST_F(InMemoryFileSystemTest, AddFileWithGroup) {
  967. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, 0xDABBAD00);
  968. auto Stat = FS.status("/a");
  969. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  970. ASSERT_TRUE(Stat->isDirectory());
  971. ASSERT_EQ(0xDABBAD00, Stat->getGroup());
  972. Stat = FS.status("/a/b");
  973. ASSERT_TRUE(Stat->isDirectory());
  974. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  975. ASSERT_EQ(0xDABBAD00, Stat->getGroup());
  976. Stat = FS.status("/a/b/c");
  977. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  978. ASSERT_TRUE(Stat->isRegularFile());
  979. ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
  980. ASSERT_EQ(0xDABBAD00, Stat->getGroup());
  981. }
  982. TEST_F(InMemoryFileSystemTest, AddFileWithFileType) {
  983. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, None,
  984. sys::fs::file_type::socket_file);
  985. auto Stat = FS.status("/a");
  986. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  987. ASSERT_TRUE(Stat->isDirectory());
  988. Stat = FS.status("/a/b");
  989. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  990. ASSERT_TRUE(Stat->isDirectory());
  991. Stat = FS.status("/a/b/c");
  992. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  993. ASSERT_EQ(sys::fs::file_type::socket_file, Stat->getType());
  994. ASSERT_EQ(sys::fs::perms::all_all, Stat->getPermissions());
  995. }
  996. TEST_F(InMemoryFileSystemTest, AddFileWithPerms) {
  997. FS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"), None, None, None,
  998. sys::fs::perms::owner_read | sys::fs::perms::owner_write);
  999. auto Stat = FS.status("/a");
  1000. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  1001. ASSERT_TRUE(Stat->isDirectory());
  1002. ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write |
  1003. sys::fs::perms::owner_exe,
  1004. Stat->getPermissions());
  1005. Stat = FS.status("/a/b");
  1006. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  1007. ASSERT_TRUE(Stat->isDirectory());
  1008. ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write |
  1009. sys::fs::perms::owner_exe,
  1010. Stat->getPermissions());
  1011. Stat = FS.status("/a/b/c");
  1012. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  1013. ASSERT_TRUE(Stat->isRegularFile());
  1014. ASSERT_EQ(sys::fs::perms::owner_read | sys::fs::perms::owner_write,
  1015. Stat->getPermissions());
  1016. }
  1017. TEST_F(InMemoryFileSystemTest, AddDirectoryThenAddChild) {
  1018. FS.addFile("/a", 0, MemoryBuffer::getMemBuffer(""), /*User=*/None,
  1019. /*Group=*/None, sys::fs::file_type::directory_file);
  1020. FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("abc"), /*User=*/None,
  1021. /*Group=*/None, sys::fs::file_type::regular_file);
  1022. auto Stat = FS.status("/a");
  1023. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  1024. ASSERT_TRUE(Stat->isDirectory());
  1025. Stat = FS.status("/a/b");
  1026. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n" << FS.toString();
  1027. ASSERT_TRUE(Stat->isRegularFile());
  1028. }
  1029. // Test that the name returned by status() is in the same form as the path that
  1030. // was requested (to match the behavior of RealFileSystem).
  1031. TEST_F(InMemoryFileSystemTest, StatusName) {
  1032. NormalizedFS.addFile("/a/b/c", 0, MemoryBuffer::getMemBuffer("abc"),
  1033. /*User=*/None,
  1034. /*Group=*/None, sys::fs::file_type::regular_file);
  1035. NormalizedFS.setCurrentWorkingDirectory("/a/b");
  1036. // Access using InMemoryFileSystem::status.
  1037. auto Stat = NormalizedFS.status("../b/c");
  1038. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n"
  1039. << NormalizedFS.toString();
  1040. ASSERT_TRUE(Stat->isRegularFile());
  1041. ASSERT_EQ("../b/c", Stat->getName());
  1042. // Access using InMemoryFileAdaptor::status.
  1043. auto File = NormalizedFS.openFileForRead("../b/c");
  1044. ASSERT_FALSE(File.getError()) << File.getError() << "\n"
  1045. << NormalizedFS.toString();
  1046. Stat = (*File)->status();
  1047. ASSERT_FALSE(Stat.getError()) << Stat.getError() << "\n"
  1048. << NormalizedFS.toString();
  1049. ASSERT_TRUE(Stat->isRegularFile());
  1050. ASSERT_EQ("../b/c", Stat->getName());
  1051. // Access using a directory iterator.
  1052. std::error_code EC;
  1053. llvm::vfs::directory_iterator It = NormalizedFS.dir_begin("../b", EC);
  1054. // When on Windows, we end up with "../b\\c" as the name. Convert to Posix
  1055. // path for the sake of the comparison.
  1056. ASSERT_EQ("../b/c", getPosixPath(It->path()));
  1057. }
  1058. TEST_F(InMemoryFileSystemTest, AddHardLinkToFile) {
  1059. StringRef FromLink = "/path/to/FROM/link";
  1060. StringRef Target = "/path/to/TO/file";
  1061. FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target"));
  1062. EXPECT_TRUE(FS.addHardLink(FromLink, Target));
  1063. EXPECT_THAT(FromLink, IsHardLinkTo(&FS, Target));
  1064. EXPECT_TRUE(FS.status(FromLink)->getSize() == FS.status(Target)->getSize());
  1065. EXPECT_TRUE(FS.getBufferForFile(FromLink)->get()->getBuffer() ==
  1066. FS.getBufferForFile(Target)->get()->getBuffer());
  1067. }
  1068. TEST_F(InMemoryFileSystemTest, AddHardLinkInChainPattern) {
  1069. StringRef Link0 = "/path/to/0/link";
  1070. StringRef Link1 = "/path/to/1/link";
  1071. StringRef Link2 = "/path/to/2/link";
  1072. StringRef Target = "/path/to/target";
  1073. FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target file"));
  1074. EXPECT_TRUE(FS.addHardLink(Link2, Target));
  1075. EXPECT_TRUE(FS.addHardLink(Link1, Link2));
  1076. EXPECT_TRUE(FS.addHardLink(Link0, Link1));
  1077. EXPECT_THAT(Link0, IsHardLinkTo(&FS, Target));
  1078. EXPECT_THAT(Link1, IsHardLinkTo(&FS, Target));
  1079. EXPECT_THAT(Link2, IsHardLinkTo(&FS, Target));
  1080. }
  1081. TEST_F(InMemoryFileSystemTest, AddHardLinkToAFileThatWasNotAddedBefore) {
  1082. EXPECT_FALSE(FS.addHardLink("/path/to/link", "/path/to/target"));
  1083. }
  1084. TEST_F(InMemoryFileSystemTest, AddHardLinkFromAFileThatWasAddedBefore) {
  1085. StringRef Link = "/path/to/link";
  1086. StringRef Target = "/path/to/target";
  1087. FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target"));
  1088. FS.addFile(Link, 0, MemoryBuffer::getMemBuffer("content of link"));
  1089. EXPECT_FALSE(FS.addHardLink(Link, Target));
  1090. }
  1091. TEST_F(InMemoryFileSystemTest, AddSameHardLinkMoreThanOnce) {
  1092. StringRef Link = "/path/to/link";
  1093. StringRef Target = "/path/to/target";
  1094. FS.addFile(Target, 0, MemoryBuffer::getMemBuffer("content of target"));
  1095. EXPECT_TRUE(FS.addHardLink(Link, Target));
  1096. EXPECT_FALSE(FS.addHardLink(Link, Target));
  1097. }
  1098. TEST_F(InMemoryFileSystemTest, AddFileInPlaceOfAHardLinkWithSameContent) {
  1099. StringRef Link = "/path/to/link";
  1100. StringRef Target = "/path/to/target";
  1101. StringRef Content = "content of target";
  1102. EXPECT_TRUE(FS.addFile(Target, 0, MemoryBuffer::getMemBuffer(Content)));
  1103. EXPECT_TRUE(FS.addHardLink(Link, Target));
  1104. EXPECT_TRUE(FS.addFile(Link, 0, MemoryBuffer::getMemBuffer(Content)));
  1105. }
  1106. TEST_F(InMemoryFileSystemTest, AddFileInPlaceOfAHardLinkWithDifferentContent) {
  1107. StringRef Link = "/path/to/link";
  1108. StringRef Target = "/path/to/target";
  1109. StringRef Content = "content of target";
  1110. StringRef LinkContent = "different content of link";
  1111. EXPECT_TRUE(FS.addFile(Target, 0, MemoryBuffer::getMemBuffer(Content)));
  1112. EXPECT_TRUE(FS.addHardLink(Link, Target));
  1113. EXPECT_FALSE(FS.addFile(Link, 0, MemoryBuffer::getMemBuffer(LinkContent)));
  1114. }
  1115. TEST_F(InMemoryFileSystemTest, AddHardLinkToADirectory) {
  1116. StringRef Dir = "path/to/dummy/dir";
  1117. StringRef Link = "/path/to/link";
  1118. StringRef File = "path/to/dummy/dir/target";
  1119. StringRef Content = "content of target";
  1120. EXPECT_TRUE(FS.addFile(File, 0, MemoryBuffer::getMemBuffer(Content)));
  1121. EXPECT_FALSE(FS.addHardLink(Link, Dir));
  1122. }
  1123. TEST_F(InMemoryFileSystemTest, AddHardLinkFromADirectory) {
  1124. StringRef Dir = "path/to/dummy/dir";
  1125. StringRef Target = "path/to/dummy/dir/target";
  1126. StringRef Content = "content of target";
  1127. EXPECT_TRUE(FS.addFile(Target, 0, MemoryBuffer::getMemBuffer(Content)));
  1128. EXPECT_FALSE(FS.addHardLink(Dir, Target));
  1129. }
  1130. TEST_F(InMemoryFileSystemTest, AddHardLinkUnderAFile) {
  1131. StringRef CommonContent = "content string";
  1132. FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer(CommonContent));
  1133. FS.addFile("/c/d", 0, MemoryBuffer::getMemBuffer(CommonContent));
  1134. EXPECT_FALSE(FS.addHardLink("/c/d/e", "/a/b"));
  1135. }
  1136. TEST_F(InMemoryFileSystemTest, RecursiveIterationWithHardLink) {
  1137. std::error_code EC;
  1138. FS.addFile("/a/b", 0, MemoryBuffer::getMemBuffer("content string"));
  1139. EXPECT_TRUE(FS.addHardLink("/c/d", "/a/b"));
  1140. auto I = vfs::recursive_directory_iterator(FS, "/", EC);
  1141. ASSERT_FALSE(EC);
  1142. std::vector<std::string> Nodes;
  1143. for (auto E = vfs::recursive_directory_iterator(); !EC && I != E;
  1144. I.increment(EC)) {
  1145. Nodes.push_back(getPosixPath(I->path()));
  1146. }
  1147. EXPECT_THAT(Nodes, testing::UnorderedElementsAre("/a", "/a/b", "/c", "/c/d"));
  1148. }
  1149. // NOTE: in the tests below, we use '//root/' as our root directory, since it is
  1150. // a legal *absolute* path on Windows as well as *nix.
  1151. class VFSFromYAMLTest : public ::testing::Test {
  1152. public:
  1153. int NumDiagnostics;
  1154. void SetUp() override { NumDiagnostics = 0; }
  1155. static void CountingDiagHandler(const SMDiagnostic &, void *Context) {
  1156. VFSFromYAMLTest *Test = static_cast<VFSFromYAMLTest *>(Context);
  1157. ++Test->NumDiagnostics;
  1158. }
  1159. IntrusiveRefCntPtr<vfs::FileSystem>
  1160. getFromYAMLRawString(StringRef Content,
  1161. IntrusiveRefCntPtr<vfs::FileSystem> ExternalFS) {
  1162. std::unique_ptr<MemoryBuffer> Buffer = MemoryBuffer::getMemBuffer(Content);
  1163. return getVFSFromYAML(std::move(Buffer), CountingDiagHandler, "", this,
  1164. ExternalFS);
  1165. }
  1166. IntrusiveRefCntPtr<vfs::FileSystem> getFromYAMLString(
  1167. StringRef Content,
  1168. IntrusiveRefCntPtr<vfs::FileSystem> ExternalFS = new DummyFileSystem()) {
  1169. std::string VersionPlusContent("{\n 'version':0,\n");
  1170. VersionPlusContent += Content.slice(Content.find('{') + 1, StringRef::npos);
  1171. return getFromYAMLRawString(VersionPlusContent, ExternalFS);
  1172. }
  1173. // This is intended as a "XFAIL" for windows hosts.
  1174. bool supportsSameDirMultipleYAMLEntries() {
  1175. Triple Host(Triple::normalize(sys::getProcessTriple()));
  1176. return !Host.isOSWindows();
  1177. }
  1178. };
  1179. TEST_F(VFSFromYAMLTest, BasicVFSFromYAML) {
  1180. IntrusiveRefCntPtr<vfs::FileSystem> FS;
  1181. FS = getFromYAMLString("");
  1182. EXPECT_EQ(nullptr, FS.get());
  1183. FS = getFromYAMLString("[]");
  1184. EXPECT_EQ(nullptr, FS.get());
  1185. FS = getFromYAMLString("'string'");
  1186. EXPECT_EQ(nullptr, FS.get());
  1187. EXPECT_EQ(3, NumDiagnostics);
  1188. }
  1189. TEST_F(VFSFromYAMLTest, MappedFiles) {
  1190. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1191. Lower->addRegularFile("//root/foo/bar/a");
  1192. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1193. "{ 'roots': [\n"
  1194. "{\n"
  1195. " 'type': 'directory',\n"
  1196. " 'name': '//root/',\n"
  1197. " 'contents': [ {\n"
  1198. " 'type': 'file',\n"
  1199. " 'name': 'file1',\n"
  1200. " 'external-contents': '//root/foo/bar/a'\n"
  1201. " },\n"
  1202. " {\n"
  1203. " 'type': 'file',\n"
  1204. " 'name': 'file2',\n"
  1205. " 'external-contents': '//root/foo/b'\n"
  1206. " }\n"
  1207. " ]\n"
  1208. "}\n"
  1209. "]\n"
  1210. "}",
  1211. Lower);
  1212. ASSERT_TRUE(FS.get() != nullptr);
  1213. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1214. new vfs::OverlayFileSystem(Lower));
  1215. O->pushOverlay(FS);
  1216. // file
  1217. ErrorOr<vfs::Status> S = O->status("//root/file1");
  1218. ASSERT_FALSE(S.getError());
  1219. EXPECT_EQ("//root/foo/bar/a", S->getName());
  1220. EXPECT_TRUE(S->IsVFSMapped);
  1221. ErrorOr<vfs::Status> SLower = O->status("//root/foo/bar/a");
  1222. EXPECT_EQ("//root/foo/bar/a", SLower->getName());
  1223. EXPECT_TRUE(S->equivalent(*SLower));
  1224. EXPECT_FALSE(SLower->IsVFSMapped);
  1225. // file after opening
  1226. auto OpenedF = O->openFileForRead("//root/file1");
  1227. ASSERT_FALSE(OpenedF.getError());
  1228. auto OpenedS = (*OpenedF)->status();
  1229. ASSERT_FALSE(OpenedS.getError());
  1230. EXPECT_EQ("//root/foo/bar/a", OpenedS->getName());
  1231. EXPECT_TRUE(OpenedS->IsVFSMapped);
  1232. // directory
  1233. S = O->status("//root/");
  1234. ASSERT_FALSE(S.getError());
  1235. EXPECT_TRUE(S->isDirectory());
  1236. EXPECT_TRUE(S->equivalent(*O->status("//root/"))); // non-volatile UniqueID
  1237. // broken mapping
  1238. EXPECT_EQ(O->status("//root/file2").getError(),
  1239. llvm::errc::no_such_file_or_directory);
  1240. EXPECT_EQ(0, NumDiagnostics);
  1241. }
  1242. TEST_F(VFSFromYAMLTest, CaseInsensitive) {
  1243. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1244. Lower->addRegularFile("//root/foo/bar/a");
  1245. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1246. "{ 'case-sensitive': 'false',\n"
  1247. " 'roots': [\n"
  1248. "{\n"
  1249. " 'type': 'directory',\n"
  1250. " 'name': '//root/',\n"
  1251. " 'contents': [ {\n"
  1252. " 'type': 'file',\n"
  1253. " 'name': 'XX',\n"
  1254. " 'external-contents': '//root/foo/bar/a'\n"
  1255. " }\n"
  1256. " ]\n"
  1257. "}]}",
  1258. Lower);
  1259. ASSERT_TRUE(FS.get() != nullptr);
  1260. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1261. new vfs::OverlayFileSystem(Lower));
  1262. O->pushOverlay(FS);
  1263. ErrorOr<vfs::Status> S = O->status("//root/XX");
  1264. ASSERT_FALSE(S.getError());
  1265. ErrorOr<vfs::Status> SS = O->status("//root/xx");
  1266. ASSERT_FALSE(SS.getError());
  1267. EXPECT_TRUE(S->equivalent(*SS));
  1268. SS = O->status("//root/xX");
  1269. EXPECT_TRUE(S->equivalent(*SS));
  1270. SS = O->status("//root/Xx");
  1271. EXPECT_TRUE(S->equivalent(*SS));
  1272. EXPECT_EQ(0, NumDiagnostics);
  1273. }
  1274. TEST_F(VFSFromYAMLTest, CaseSensitive) {
  1275. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1276. Lower->addRegularFile("//root/foo/bar/a");
  1277. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1278. "{ 'case-sensitive': 'true',\n"
  1279. " 'roots': [\n"
  1280. "{\n"
  1281. " 'type': 'directory',\n"
  1282. " 'name': '//root/',\n"
  1283. " 'contents': [ {\n"
  1284. " 'type': 'file',\n"
  1285. " 'name': 'XX',\n"
  1286. " 'external-contents': '//root/foo/bar/a'\n"
  1287. " }\n"
  1288. " ]\n"
  1289. "}]}",
  1290. Lower);
  1291. ASSERT_TRUE(FS.get() != nullptr);
  1292. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1293. new vfs::OverlayFileSystem(Lower));
  1294. O->pushOverlay(FS);
  1295. ErrorOr<vfs::Status> SS = O->status("//root/xx");
  1296. EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
  1297. SS = O->status("//root/xX");
  1298. EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
  1299. SS = O->status("//root/Xx");
  1300. EXPECT_EQ(SS.getError(), llvm::errc::no_such_file_or_directory);
  1301. EXPECT_EQ(0, NumDiagnostics);
  1302. }
  1303. TEST_F(VFSFromYAMLTest, IllegalVFSFile) {
  1304. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1305. // invalid YAML at top-level
  1306. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString("{]", Lower);
  1307. EXPECT_EQ(nullptr, FS.get());
  1308. // invalid YAML in roots
  1309. FS = getFromYAMLString("{ 'roots':[}", Lower);
  1310. // invalid YAML in directory
  1311. FS = getFromYAMLString(
  1312. "{ 'roots':[ { 'name': 'foo', 'type': 'directory', 'contents': [}",
  1313. Lower);
  1314. EXPECT_EQ(nullptr, FS.get());
  1315. // invalid configuration
  1316. FS = getFromYAMLString("{ 'knobular': 'true', 'roots':[] }", Lower);
  1317. EXPECT_EQ(nullptr, FS.get());
  1318. FS = getFromYAMLString("{ 'case-sensitive': 'maybe', 'roots':[] }", Lower);
  1319. EXPECT_EQ(nullptr, FS.get());
  1320. // invalid roots
  1321. FS = getFromYAMLString("{ 'roots':'' }", Lower);
  1322. EXPECT_EQ(nullptr, FS.get());
  1323. FS = getFromYAMLString("{ 'roots':{} }", Lower);
  1324. EXPECT_EQ(nullptr, FS.get());
  1325. // invalid entries
  1326. FS = getFromYAMLString(
  1327. "{ 'roots':[ { 'type': 'other', 'name': 'me', 'contents': '' }", Lower);
  1328. EXPECT_EQ(nullptr, FS.get());
  1329. FS = getFromYAMLString("{ 'roots':[ { 'type': 'file', 'name': [], "
  1330. "'external-contents': 'other' }",
  1331. Lower);
  1332. EXPECT_EQ(nullptr, FS.get());
  1333. FS = getFromYAMLString(
  1334. "{ 'roots':[ { 'type': 'file', 'name': 'me', 'external-contents': [] }",
  1335. Lower);
  1336. EXPECT_EQ(nullptr, FS.get());
  1337. FS = getFromYAMLString(
  1338. "{ 'roots':[ { 'type': 'file', 'name': 'me', 'external-contents': {} }",
  1339. Lower);
  1340. EXPECT_EQ(nullptr, FS.get());
  1341. FS = getFromYAMLString(
  1342. "{ 'roots':[ { 'type': 'directory', 'name': 'me', 'contents': {} }",
  1343. Lower);
  1344. EXPECT_EQ(nullptr, FS.get());
  1345. FS = getFromYAMLString(
  1346. "{ 'roots':[ { 'type': 'directory', 'name': 'me', 'contents': '' }",
  1347. Lower);
  1348. EXPECT_EQ(nullptr, FS.get());
  1349. FS = getFromYAMLString(
  1350. "{ 'roots':[ { 'thingy': 'directory', 'name': 'me', 'contents': [] }",
  1351. Lower);
  1352. EXPECT_EQ(nullptr, FS.get());
  1353. // missing mandatory fields
  1354. FS = getFromYAMLString("{ 'roots':[ { 'type': 'file', 'name': 'me' }", Lower);
  1355. EXPECT_EQ(nullptr, FS.get());
  1356. FS = getFromYAMLString(
  1357. "{ 'roots':[ { 'type': 'file', 'external-contents': 'other' }", Lower);
  1358. EXPECT_EQ(nullptr, FS.get());
  1359. FS = getFromYAMLString("{ 'roots':[ { 'name': 'me', 'contents': [] }", Lower);
  1360. EXPECT_EQ(nullptr, FS.get());
  1361. // duplicate keys
  1362. FS = getFromYAMLString("{ 'roots':[], 'roots':[] }", Lower);
  1363. EXPECT_EQ(nullptr, FS.get());
  1364. FS = getFromYAMLString(
  1365. "{ 'case-sensitive':'true', 'case-sensitive':'true', 'roots':[] }",
  1366. Lower);
  1367. EXPECT_EQ(nullptr, FS.get());
  1368. FS =
  1369. getFromYAMLString("{ 'roots':[{'name':'me', 'name':'you', 'type':'file', "
  1370. "'external-contents':'blah' } ] }",
  1371. Lower);
  1372. EXPECT_EQ(nullptr, FS.get());
  1373. // missing version
  1374. FS = getFromYAMLRawString("{ 'roots':[] }", Lower);
  1375. EXPECT_EQ(nullptr, FS.get());
  1376. // bad version number
  1377. FS = getFromYAMLRawString("{ 'version':'foo', 'roots':[] }", Lower);
  1378. EXPECT_EQ(nullptr, FS.get());
  1379. FS = getFromYAMLRawString("{ 'version':-1, 'roots':[] }", Lower);
  1380. EXPECT_EQ(nullptr, FS.get());
  1381. FS = getFromYAMLRawString("{ 'version':100000, 'roots':[] }", Lower);
  1382. EXPECT_EQ(nullptr, FS.get());
  1383. EXPECT_EQ(24, NumDiagnostics);
  1384. }
  1385. TEST_F(VFSFromYAMLTest, UseExternalName) {
  1386. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1387. Lower->addRegularFile("//root/external/file");
  1388. IntrusiveRefCntPtr<vfs::FileSystem> FS =
  1389. getFromYAMLString("{ 'roots': [\n"
  1390. " { 'type': 'file', 'name': '//root/A',\n"
  1391. " 'external-contents': '//root/external/file'\n"
  1392. " },\n"
  1393. " { 'type': 'file', 'name': '//root/B',\n"
  1394. " 'use-external-name': true,\n"
  1395. " 'external-contents': '//root/external/file'\n"
  1396. " },\n"
  1397. " { 'type': 'file', 'name': '//root/C',\n"
  1398. " 'use-external-name': false,\n"
  1399. " 'external-contents': '//root/external/file'\n"
  1400. " }\n"
  1401. "] }",
  1402. Lower);
  1403. ASSERT_TRUE(nullptr != FS.get());
  1404. // default true
  1405. EXPECT_EQ("//root/external/file", FS->status("//root/A")->getName());
  1406. // explicit
  1407. EXPECT_EQ("//root/external/file", FS->status("//root/B")->getName());
  1408. EXPECT_EQ("//root/C", FS->status("//root/C")->getName());
  1409. // global configuration
  1410. FS = getFromYAMLString("{ 'use-external-names': false,\n"
  1411. " 'roots': [\n"
  1412. " { 'type': 'file', 'name': '//root/A',\n"
  1413. " 'external-contents': '//root/external/file'\n"
  1414. " },\n"
  1415. " { 'type': 'file', 'name': '//root/B',\n"
  1416. " 'use-external-name': true,\n"
  1417. " 'external-contents': '//root/external/file'\n"
  1418. " },\n"
  1419. " { 'type': 'file', 'name': '//root/C',\n"
  1420. " 'use-external-name': false,\n"
  1421. " 'external-contents': '//root/external/file'\n"
  1422. " }\n"
  1423. "] }",
  1424. Lower);
  1425. ASSERT_TRUE(nullptr != FS.get());
  1426. // default
  1427. EXPECT_EQ("//root/A", FS->status("//root/A")->getName());
  1428. // explicit
  1429. EXPECT_EQ("//root/external/file", FS->status("//root/B")->getName());
  1430. EXPECT_EQ("//root/C", FS->status("//root/C")->getName());
  1431. }
  1432. TEST_F(VFSFromYAMLTest, MultiComponentPath) {
  1433. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1434. Lower->addRegularFile("//root/other");
  1435. // file in roots
  1436. IntrusiveRefCntPtr<vfs::FileSystem> FS =
  1437. getFromYAMLString("{ 'roots': [\n"
  1438. " { 'type': 'file', 'name': '//root/path/to/file',\n"
  1439. " 'external-contents': '//root/other' }]\n"
  1440. "}",
  1441. Lower);
  1442. ASSERT_TRUE(nullptr != FS.get());
  1443. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1444. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1445. EXPECT_FALSE(FS->status("//root/path").getError());
  1446. EXPECT_FALSE(FS->status("//root/").getError());
  1447. // at the start
  1448. FS = getFromYAMLString(
  1449. "{ 'roots': [\n"
  1450. " { 'type': 'directory', 'name': '//root/path/to',\n"
  1451. " 'contents': [ { 'type': 'file', 'name': 'file',\n"
  1452. " 'external-contents': '//root/other' }]}]\n"
  1453. "}",
  1454. Lower);
  1455. ASSERT_TRUE(nullptr != FS.get());
  1456. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1457. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1458. EXPECT_FALSE(FS->status("//root/path").getError());
  1459. EXPECT_FALSE(FS->status("//root/").getError());
  1460. // at the end
  1461. FS = getFromYAMLString(
  1462. "{ 'roots': [\n"
  1463. " { 'type': 'directory', 'name': '//root/',\n"
  1464. " 'contents': [ { 'type': 'file', 'name': 'path/to/file',\n"
  1465. " 'external-contents': '//root/other' }]}]\n"
  1466. "}",
  1467. Lower);
  1468. ASSERT_TRUE(nullptr != FS.get());
  1469. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1470. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1471. EXPECT_FALSE(FS->status("//root/path").getError());
  1472. EXPECT_FALSE(FS->status("//root/").getError());
  1473. }
  1474. TEST_F(VFSFromYAMLTest, TrailingSlashes) {
  1475. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1476. Lower->addRegularFile("//root/other");
  1477. // file in roots
  1478. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1479. "{ 'roots': [\n"
  1480. " { 'type': 'directory', 'name': '//root/path/to////',\n"
  1481. " 'contents': [ { 'type': 'file', 'name': 'file',\n"
  1482. " 'external-contents': '//root/other' }]}]\n"
  1483. "}",
  1484. Lower);
  1485. ASSERT_TRUE(nullptr != FS.get());
  1486. EXPECT_FALSE(FS->status("//root/path/to/file").getError());
  1487. EXPECT_FALSE(FS->status("//root/path/to").getError());
  1488. EXPECT_FALSE(FS->status("//root/path").getError());
  1489. EXPECT_FALSE(FS->status("//root/").getError());
  1490. }
  1491. TEST_F(VFSFromYAMLTest, DirectoryIteration) {
  1492. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1493. Lower->addDirectory("//root/");
  1494. Lower->addDirectory("//root/foo");
  1495. Lower->addDirectory("//root/foo/bar");
  1496. Lower->addRegularFile("//root/foo/bar/a");
  1497. Lower->addRegularFile("//root/foo/bar/b");
  1498. Lower->addRegularFile("//root/file3");
  1499. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1500. "{ 'use-external-names': false,\n"
  1501. " 'roots': [\n"
  1502. "{\n"
  1503. " 'type': 'directory',\n"
  1504. " 'name': '//root/',\n"
  1505. " 'contents': [ {\n"
  1506. " 'type': 'file',\n"
  1507. " 'name': 'file1',\n"
  1508. " 'external-contents': '//root/foo/bar/a'\n"
  1509. " },\n"
  1510. " {\n"
  1511. " 'type': 'file',\n"
  1512. " 'name': 'file2',\n"
  1513. " 'external-contents': '//root/foo/bar/b'\n"
  1514. " }\n"
  1515. " ]\n"
  1516. "}\n"
  1517. "]\n"
  1518. "}",
  1519. Lower);
  1520. ASSERT_TRUE(FS.get() != nullptr);
  1521. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1522. new vfs::OverlayFileSystem(Lower));
  1523. O->pushOverlay(FS);
  1524. std::error_code EC;
  1525. checkContents(O->dir_begin("//root/", EC),
  1526. {"//root/file1", "//root/file2", "//root/file3", "//root/foo"});
  1527. checkContents(O->dir_begin("//root/foo/bar", EC),
  1528. {"//root/foo/bar/a", "//root/foo/bar/b"});
  1529. }
  1530. TEST_F(VFSFromYAMLTest, DirectoryIterationSameDirMultipleEntries) {
  1531. // https://llvm.org/bugs/show_bug.cgi?id=27725
  1532. if (!supportsSameDirMultipleYAMLEntries())
  1533. return;
  1534. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1535. Lower->addDirectory("//root/zab");
  1536. Lower->addDirectory("//root/baz");
  1537. Lower->addRegularFile("//root/zab/a");
  1538. Lower->addRegularFile("//root/zab/b");
  1539. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1540. "{ 'use-external-names': false,\n"
  1541. " 'roots': [\n"
  1542. "{\n"
  1543. " 'type': 'directory',\n"
  1544. " 'name': '//root/baz/',\n"
  1545. " 'contents': [ {\n"
  1546. " 'type': 'file',\n"
  1547. " 'name': 'x',\n"
  1548. " 'external-contents': '//root/zab/a'\n"
  1549. " }\n"
  1550. " ]\n"
  1551. "},\n"
  1552. "{\n"
  1553. " 'type': 'directory',\n"
  1554. " 'name': '//root/baz/',\n"
  1555. " 'contents': [ {\n"
  1556. " 'type': 'file',\n"
  1557. " 'name': 'y',\n"
  1558. " 'external-contents': '//root/zab/b'\n"
  1559. " }\n"
  1560. " ]\n"
  1561. "}\n"
  1562. "]\n"
  1563. "}",
  1564. Lower);
  1565. ASSERT_TRUE(FS.get() != nullptr);
  1566. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1567. new vfs::OverlayFileSystem(Lower));
  1568. O->pushOverlay(FS);
  1569. std::error_code EC;
  1570. checkContents(O->dir_begin("//root/baz/", EC),
  1571. {"//root/baz/x", "//root/baz/y"});
  1572. }
  1573. TEST_F(VFSFromYAMLTest, RecursiveDirectoryIterationLevel) {
  1574. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1575. Lower->addDirectory("//root/a");
  1576. Lower->addDirectory("//root/a/b");
  1577. Lower->addDirectory("//root/a/b/c");
  1578. Lower->addRegularFile("//root/a/b/c/file");
  1579. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1580. "{ 'use-external-names': false,\n"
  1581. " 'roots': [\n"
  1582. "{\n"
  1583. " 'type': 'directory',\n"
  1584. " 'name': '//root/a/b/c/',\n"
  1585. " 'contents': [ {\n"
  1586. " 'type': 'file',\n"
  1587. " 'name': 'file',\n"
  1588. " 'external-contents': '//root/a/b/c/file'\n"
  1589. " }\n"
  1590. " ]\n"
  1591. "},\n"
  1592. "]\n"
  1593. "}",
  1594. Lower);
  1595. ASSERT_TRUE(FS.get() != nullptr);
  1596. IntrusiveRefCntPtr<vfs::OverlayFileSystem> O(
  1597. new vfs::OverlayFileSystem(Lower));
  1598. O->pushOverlay(FS);
  1599. std::error_code EC;
  1600. // Test recursive_directory_iterator level()
  1601. vfs::recursive_directory_iterator I = vfs::recursive_directory_iterator(
  1602. *O, "//root", EC),
  1603. E;
  1604. ASSERT_FALSE(EC);
  1605. for (int l = 0; I != E; I.increment(EC), ++l) {
  1606. ASSERT_FALSE(EC);
  1607. EXPECT_EQ(I.level(), l);
  1608. }
  1609. EXPECT_EQ(I, E);
  1610. }
  1611. TEST_F(VFSFromYAMLTest, RelativePaths) {
  1612. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1613. // Filename at root level without a parent directory.
  1614. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1615. "{ 'roots': [\n"
  1616. " { 'type': 'file', 'name': 'file-not-in-directory.h',\n"
  1617. " 'external-contents': '//root/external/file'\n"
  1618. " }\n"
  1619. "] }",
  1620. Lower);
  1621. EXPECT_EQ(nullptr, FS.get());
  1622. // Relative file path.
  1623. FS = getFromYAMLString("{ 'roots': [\n"
  1624. " { 'type': 'file', 'name': 'relative/file/path.h',\n"
  1625. " 'external-contents': '//root/external/file'\n"
  1626. " }\n"
  1627. "] }",
  1628. Lower);
  1629. EXPECT_EQ(nullptr, FS.get());
  1630. // Relative directory path.
  1631. FS = getFromYAMLString(
  1632. "{ 'roots': [\n"
  1633. " { 'type': 'directory', 'name': 'relative/directory/path.h',\n"
  1634. " 'contents': []\n"
  1635. " }\n"
  1636. "] }",
  1637. Lower);
  1638. EXPECT_EQ(nullptr, FS.get());
  1639. EXPECT_EQ(3, NumDiagnostics);
  1640. }
  1641. TEST_F(VFSFromYAMLTest, NonFallthroughDirectoryIteration) {
  1642. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1643. Lower->addDirectory("//root/");
  1644. Lower->addRegularFile("//root/a");
  1645. Lower->addRegularFile("//root/b");
  1646. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1647. "{ 'use-external-names': false,\n"
  1648. " 'fallthrough': false,\n"
  1649. " 'roots': [\n"
  1650. "{\n"
  1651. " 'type': 'directory',\n"
  1652. " 'name': '//root/',\n"
  1653. " 'contents': [ {\n"
  1654. " 'type': 'file',\n"
  1655. " 'name': 'c',\n"
  1656. " 'external-contents': '//root/a'\n"
  1657. " }\n"
  1658. " ]\n"
  1659. "}\n"
  1660. "]\n"
  1661. "}",
  1662. Lower);
  1663. ASSERT_TRUE(FS.get() != nullptr);
  1664. std::error_code EC;
  1665. checkContents(FS->dir_begin("//root/", EC),
  1666. {"//root/c"});
  1667. }
  1668. TEST_F(VFSFromYAMLTest, DirectoryIterationWithDuplicates) {
  1669. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1670. Lower->addDirectory("//root/");
  1671. Lower->addRegularFile("//root/a");
  1672. Lower->addRegularFile("//root/b");
  1673. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1674. "{ 'use-external-names': false,\n"
  1675. " 'roots': [\n"
  1676. "{\n"
  1677. " 'type': 'directory',\n"
  1678. " 'name': '//root/',\n"
  1679. " 'contents': [ {\n"
  1680. " 'type': 'file',\n"
  1681. " 'name': 'a',\n"
  1682. " 'external-contents': '//root/a'\n"
  1683. " }\n"
  1684. " ]\n"
  1685. "}\n"
  1686. "]\n"
  1687. "}",
  1688. Lower);
  1689. ASSERT_TRUE(FS.get() != nullptr);
  1690. std::error_code EC;
  1691. checkContents(FS->dir_begin("//root/", EC),
  1692. {"//root/a", "//root/b"});
  1693. }
  1694. TEST_F(VFSFromYAMLTest, DirectoryIterationErrorInVFSLayer) {
  1695. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1696. Lower->addDirectory("//root/");
  1697. Lower->addDirectory("//root/foo");
  1698. Lower->addRegularFile("//root/foo/a");
  1699. Lower->addRegularFile("//root/foo/b");
  1700. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1701. "{ 'use-external-names': false,\n"
  1702. " 'roots': [\n"
  1703. "{\n"
  1704. " 'type': 'directory',\n"
  1705. " 'name': '//root/',\n"
  1706. " 'contents': [ {\n"
  1707. " 'type': 'file',\n"
  1708. " 'name': 'bar/a',\n"
  1709. " 'external-contents': '//root/foo/a'\n"
  1710. " }\n"
  1711. " ]\n"
  1712. "}\n"
  1713. "]\n"
  1714. "}",
  1715. Lower);
  1716. ASSERT_TRUE(FS.get() != nullptr);
  1717. std::error_code EC;
  1718. checkContents(FS->dir_begin("//root/foo", EC),
  1719. {"//root/foo/a", "//root/foo/b"});
  1720. }
  1721. TEST_F(VFSFromYAMLTest, GetRealPath) {
  1722. IntrusiveRefCntPtr<DummyFileSystem> Lower(new DummyFileSystem());
  1723. Lower->addDirectory("//dir/");
  1724. Lower->addRegularFile("/foo");
  1725. Lower->addSymlink("/link");
  1726. IntrusiveRefCntPtr<vfs::FileSystem> FS = getFromYAMLString(
  1727. "{ 'use-external-names': false,\n"
  1728. " 'roots': [\n"
  1729. "{\n"
  1730. " 'type': 'directory',\n"
  1731. " 'name': '//root/',\n"
  1732. " 'contents': [ {\n"
  1733. " 'type': 'file',\n"
  1734. " 'name': 'bar',\n"
  1735. " 'external-contents': '/link'\n"
  1736. " }\n"
  1737. " ]\n"
  1738. "},\n"
  1739. "{\n"
  1740. " 'type': 'directory',\n"
  1741. " 'name': '//dir/',\n"
  1742. " 'contents': []\n"
  1743. "}\n"
  1744. "]\n"
  1745. "}",
  1746. Lower);
  1747. ASSERT_TRUE(FS.get() != nullptr);
  1748. // Regular file present in underlying file system.
  1749. SmallString<16> RealPath;
  1750. EXPECT_FALSE(FS->getRealPath("/foo", RealPath));
  1751. EXPECT_EQ(RealPath.str(), "/foo");
  1752. // File present in YAML pointing to symlink in underlying file system.
  1753. EXPECT_FALSE(FS->getRealPath("//root/bar", RealPath));
  1754. EXPECT_EQ(RealPath.str(), "/symlink");
  1755. // Directories should fall back to the underlying file system is possible.
  1756. EXPECT_FALSE(FS->getRealPath("//dir/", RealPath));
  1757. EXPECT_EQ(RealPath.str(), "//dir/");
  1758. // Try a non-existing file.
  1759. EXPECT_EQ(FS->getRealPath("/non_existing", RealPath),
  1760. errc::no_such_file_or_directory);
  1761. }