|  | #ifndef FILESYSTEM_TEST_HELPER_H | 
|  | #define FILESYSTEM_TEST_HELPER_H | 
|  |  | 
|  | #include "filesystem_include.h" | 
|  |  | 
|  | #include <sys/stat.h> // for stat, mkdir, mkfifo | 
|  | #ifndef _WIN32 | 
|  | #include <unistd.h> // for ftruncate, link, symlink, getcwd, chdir | 
|  | #include <sys/statvfs.h> | 
|  | #else | 
|  | #include <io.h> | 
|  | #include <direct.h> | 
|  | #include <windows.h> // for CreateSymbolicLink, CreateHardLink | 
|  | #endif | 
|  |  | 
|  | #include <cassert> | 
|  | #include <cerrno> | 
|  | #include <chrono> | 
|  | #include <cstdint> | 
|  | #include <cstdio> // for printf | 
|  | #include <string> | 
|  | #include <system_error> | 
|  | #include <type_traits> | 
|  | #include <vector> | 
|  |  | 
|  | #include "assert_macros.h" | 
|  | #include "make_string.h" | 
|  | #include "test_macros.h" | 
|  | #include "format_string.h" | 
|  |  | 
|  | // For creating socket files | 
|  | #if !defined(__FreeBSD__) && !defined(__APPLE__) && !defined(_WIN32) | 
|  | # include <sys/socket.h> | 
|  | # include <sys/un.h> | 
|  | #endif | 
|  |  | 
|  | namespace utils { | 
|  | #ifdef _WIN32 | 
|  | inline int mkdir(const char* path, int mode) { (void)mode; return ::_mkdir(path); } | 
|  | inline int symlink(const char* oldname, const char* newname, bool is_dir) { | 
|  | DWORD flags = is_dir ? SYMBOLIC_LINK_FLAG_DIRECTORY : 0; | 
|  | if (CreateSymbolicLinkA(newname, oldname, | 
|  | flags | SYMBOLIC_LINK_FLAG_ALLOW_UNPRIVILEGED_CREATE)) | 
|  | return 0; | 
|  | if (GetLastError() != ERROR_INVALID_PARAMETER) | 
|  | return 1; | 
|  | return !CreateSymbolicLinkA(newname, oldname, flags); | 
|  | } | 
|  | inline int link(const char *oldname, const char* newname) { | 
|  | return !CreateHardLinkA(newname, oldname, NULL); | 
|  | } | 
|  | inline int setenv(const char *var, const char *val, int overwrite) { | 
|  | (void)overwrite; | 
|  | return ::_putenv((std::string(var) + "=" + std::string(val)).c_str()); | 
|  | } | 
|  | inline int unsetenv(const char *var) { | 
|  | return ::_putenv((std::string(var) + "=").c_str()); | 
|  | } | 
|  | inline bool space(std::string path, std::uintmax_t &capacity, | 
|  | std::uintmax_t &free, std::uintmax_t &avail) { | 
|  | ULARGE_INTEGER FreeBytesAvailableToCaller, TotalNumberOfBytes, | 
|  | TotalNumberOfFreeBytes; | 
|  | if (!GetDiskFreeSpaceExA(path.c_str(), &FreeBytesAvailableToCaller, | 
|  | &TotalNumberOfBytes, &TotalNumberOfFreeBytes)) | 
|  | return false; | 
|  | capacity = TotalNumberOfBytes.QuadPart; | 
|  | free = TotalNumberOfFreeBytes.QuadPart; | 
|  | avail = FreeBytesAvailableToCaller.QuadPart; | 
|  | assert(capacity > 0); | 
|  | assert(free > 0); | 
|  | assert(avail > 0); | 
|  | return true; | 
|  | } | 
|  | #else | 
|  | using ::mkdir; | 
|  | inline int symlink(const char* oldname, const char* newname, bool is_dir) { (void)is_dir; return ::symlink(oldname, newname); } | 
|  | using ::link; | 
|  | using ::setenv; | 
|  | using ::unsetenv; | 
|  | inline bool space(std::string path, std::uintmax_t &capacity, | 
|  | std::uintmax_t &free, std::uintmax_t &avail) { | 
|  | struct statvfs expect; | 
|  | if (::statvfs(path.c_str(), &expect) == -1) | 
|  | return false; | 
|  | assert(expect.f_bavail > 0); | 
|  | assert(expect.f_bfree > 0); | 
|  | assert(expect.f_bsize > 0); | 
|  | assert(expect.f_blocks > 0); | 
|  | assert(expect.f_frsize > 0); | 
|  | auto do_mult = [&](std::uintmax_t val) { | 
|  | std::uintmax_t fsize = expect.f_frsize; | 
|  | std::uintmax_t new_val = val * fsize; | 
|  | assert(new_val / fsize == val); // Test for overflow | 
|  | return new_val; | 
|  | }; | 
|  | capacity = do_mult(expect.f_blocks); | 
|  | free = do_mult(expect.f_bfree); | 
|  | avail = do_mult(expect.f_bavail); | 
|  | return true; | 
|  | } | 
|  | #endif | 
|  |  | 
|  | // N.B. libc might define some of the foo[64] identifiers using macros from | 
|  | // foo64 -> foo or vice versa. | 
|  | #if defined(_WIN32) | 
|  | using off64_t = std::int64_t; | 
|  | #elif defined(__MVS__) || defined(__LP64__) | 
|  | using off64_t = ::off_t; | 
|  | #else | 
|  | using ::off64_t; | 
|  | #endif | 
|  |  | 
|  | inline FILE* fopen64(const char* pathname, const char* mode) { | 
|  | // Bionic does not distinguish between fopen and fopen64, but fopen64 | 
|  | // wasn't added until API 24. | 
|  | #if defined(_WIN32) || defined(__MVS__) || defined(__LP64__) || defined(__BIONIC__) | 
|  | return ::fopen(pathname, mode); | 
|  | #else | 
|  | return ::fopen64(pathname, mode); | 
|  | #endif | 
|  | } | 
|  |  | 
|  | inline int ftruncate64(int fd, off64_t length) { | 
|  | #if defined(_WIN32) | 
|  | // _chsize_s sets errno on failure and also returns the error number. | 
|  | return ::_chsize_s(fd, length) ? -1 : 0; | 
|  | #elif defined(__MVS__) || defined(__LP64__) | 
|  | return ::ftruncate(fd, length); | 
|  | #else | 
|  | return ::ftruncate64(fd, length); | 
|  | #endif | 
|  | } | 
|  |  | 
|  | inline std::string getcwd() { | 
|  | // Assume that path lengths are not greater than this. | 
|  | // This should be fine for testing purposes. | 
|  | char buf[4096]; | 
|  | char* ret = ::getcwd(buf, sizeof(buf)); | 
|  | assert(ret && "getcwd failed"); | 
|  | return std::string(ret); | 
|  | } | 
|  |  | 
|  | inline bool exists(std::string const& path) { | 
|  | struct ::stat tmp; | 
|  | return ::stat(path.c_str(), &tmp) == 0; | 
|  | } | 
|  | } // end namespace utils | 
|  |  | 
|  | struct scoped_test_env | 
|  | { | 
|  | scoped_test_env() : test_root(available_cwd_path()) { | 
|  | #ifdef _WIN32 | 
|  | // Windows mkdir can create multiple recursive directories | 
|  | // if needed. | 
|  | std::string cmd = "mkdir " + test_root.string(); | 
|  | #else | 
|  | std::string cmd = "mkdir -p " + test_root.string(); | 
|  | #endif | 
|  | int ret = std::system(cmd.c_str()); | 
|  | assert(ret == 0); | 
|  |  | 
|  | // Ensure that the root_path is fully resolved, i.e. it contains no | 
|  | // symlinks. The filesystem tests depend on that. We do this after | 
|  | // creating the root_path, because `fs::canonical` requires the | 
|  | // path to exist. | 
|  | test_root = fs::canonical(test_root); | 
|  | } | 
|  |  | 
|  | ~scoped_test_env() { | 
|  | #ifdef _WIN32 | 
|  | std::string cmd = "rmdir /s /q " + test_root.string(); | 
|  | int ret = std::system(cmd.c_str()); | 
|  | assert(ret == 0); | 
|  | #else | 
|  | #if defined(__MVS__) | 
|  | // The behaviour of chmod -R on z/OS prevents recursive | 
|  | // permission change for directories that do not have read permission. | 
|  | std::string cmd = "find  " + test_root.string() + " -exec chmod 777 {} \\;"; | 
|  | #else | 
|  | std::string cmd = "chmod -R 777 " + test_root.string(); | 
|  | #endif // defined(__MVS__) | 
|  | int ret = std::system(cmd.c_str()); | 
|  | #if !defined(_AIX) | 
|  | // On AIX the chmod command will return non-zero when trying to set | 
|  | // the permissions on a directory that contains a bad symlink. This triggers | 
|  | // the assert, despite being able to delete everything with the following | 
|  | // `rm -r` command. | 
|  | assert(ret == 0); | 
|  | #endif | 
|  |  | 
|  | cmd = "rm -rf " + test_root.string(); | 
|  | ret = std::system(cmd.c_str()); | 
|  | assert(ret == 0); | 
|  | #endif | 
|  | } | 
|  |  | 
|  | scoped_test_env(scoped_test_env const &) = delete; | 
|  | scoped_test_env & operator=(scoped_test_env const &) = delete; | 
|  |  | 
|  | fs::path make_env_path(std::string p) { return sanitize_path(p); } | 
|  |  | 
|  | std::string sanitize_path(std::string raw) { | 
|  | assert(raw.find("..") == std::string::npos); | 
|  | std::string root = test_root.string(); | 
|  | if (root.compare(0, root.size(), raw, 0, root.size()) != 0) { | 
|  | assert(raw.front() != '\\'); | 
|  | fs::path tmp(test_root); | 
|  | tmp /= raw; | 
|  | return tmp.string(); | 
|  | } | 
|  | return raw; | 
|  | } | 
|  |  | 
|  | // Purposefully using a size potentially larger than off_t here so we can | 
|  | // test the behavior of libc++fs when it is built with _FILE_OFFSET_BITS=64 | 
|  | // but the caller is not (std::filesystem also uses uintmax_t rather than | 
|  | // off_t). On a 32-bit system this allows us to create a file larger than | 
|  | // 2GB. | 
|  | std::string create_file(fs::path filename_path, std::uintmax_t size = 0) { | 
|  | std::string filename = sanitize_path(filename_path.string()); | 
|  |  | 
|  | if (size > | 
|  | static_cast<typename std::make_unsigned<utils::off64_t>::type>( | 
|  | std::numeric_limits<utils::off64_t>::max())) { | 
|  | fprintf(stderr, "create_file(%s, %ju) too large\n", | 
|  | filename.c_str(), size); | 
|  | abort(); | 
|  | } | 
|  |  | 
|  | #if defined(_WIN32) || defined(__MVS__) | 
|  | #  define FOPEN_CLOEXEC_FLAG "" | 
|  | #else | 
|  | #  define FOPEN_CLOEXEC_FLAG "e" | 
|  | #endif | 
|  | FILE* file = utils::fopen64(filename.c_str(), "w" FOPEN_CLOEXEC_FLAG); | 
|  | if (file == nullptr) { | 
|  | fprintf(stderr, "fopen %s failed: %s\n", filename.c_str(), | 
|  | strerror(errno)); | 
|  | abort(); | 
|  | } | 
|  |  | 
|  | if (utils::ftruncate64( | 
|  | fileno(file), static_cast<utils::off64_t>(size)) == -1) { | 
|  | fprintf(stderr, "ftruncate %s %ju failed: %s\n", filename.c_str(), | 
|  | size, strerror(errno)); | 
|  | fclose(file); | 
|  | abort(); | 
|  | } | 
|  |  | 
|  | fclose(file); | 
|  | return filename; | 
|  | } | 
|  |  | 
|  | std::string create_dir(fs::path filename_path) { | 
|  | std::string filename = filename_path.string(); | 
|  | filename = sanitize_path(std::move(filename)); | 
|  | int ret = utils::mkdir(filename.c_str(), 0777); // rwxrwxrwx mode | 
|  | assert(ret == 0); | 
|  | return filename; | 
|  | } | 
|  |  | 
|  | std::string create_file_dir_symlink(fs::path source_path, | 
|  | fs::path to_path, | 
|  | bool sanitize_source = true, | 
|  | bool is_dir = false) { | 
|  | std::string source = source_path.string(); | 
|  | std::string to = to_path.string(); | 
|  | if (sanitize_source) | 
|  | source = sanitize_path(std::move(source)); | 
|  | to = sanitize_path(std::move(to)); | 
|  | int ret = utils::symlink(source.c_str(), to.c_str(), is_dir); | 
|  | assert(ret == 0); | 
|  | return to; | 
|  | } | 
|  |  | 
|  | std::string create_symlink(fs::path source_path, | 
|  | fs::path to_path, | 
|  | bool sanitize_source = true) { | 
|  | return create_file_dir_symlink(source_path, to_path, sanitize_source, | 
|  | false); | 
|  | } | 
|  |  | 
|  | std::string create_directory_symlink(fs::path source_path, | 
|  | fs::path to_path, | 
|  | bool sanitize_source = true) { | 
|  | return create_file_dir_symlink(source_path, to_path, sanitize_source, | 
|  | true); | 
|  | } | 
|  |  | 
|  | std::string create_hardlink(fs::path source_path, fs::path to_path) { | 
|  | std::string source = source_path.string(); | 
|  | std::string to = to_path.string(); | 
|  | source = sanitize_path(std::move(source)); | 
|  | to = sanitize_path(std::move(to)); | 
|  | int ret = utils::link(source.c_str(), to.c_str()); | 
|  | assert(ret == 0); | 
|  | return to; | 
|  | } | 
|  |  | 
|  | #ifndef _WIN32 | 
|  | std::string create_fifo(std::string file) { | 
|  | file = sanitize_path(std::move(file)); | 
|  | int ret = ::mkfifo(file.c_str(), 0666); // rw-rw-rw- mode | 
|  | assert(ret == 0); | 
|  | return file; | 
|  | } | 
|  | #endif | 
|  |  | 
|  | // Some platforms doesn't support socket files so we shouldn't even | 
|  | // allow tests to call this unguarded. | 
|  | #if !defined(__FreeBSD__) && !defined(__APPLE__) && !defined(_WIN32) | 
|  | std::string create_socket(std::string file) { | 
|  | file = sanitize_path(std::move(file)); | 
|  |  | 
|  | ::sockaddr_un address; | 
|  | address.sun_family = AF_UNIX; | 
|  | assert(file.size() <= sizeof(address.sun_path)); | 
|  | ::strncpy(address.sun_path, file.c_str(), sizeof(address.sun_path)); | 
|  | int fd = ::socket(AF_UNIX, SOCK_STREAM, 0); | 
|  | ::bind(fd, reinterpret_cast<::sockaddr*>(&address), sizeof(address)); | 
|  | return file; | 
|  | } | 
|  | #endif | 
|  |  | 
|  | fs::path test_root; | 
|  |  | 
|  | private: | 
|  | // This could potentially introduce a filesystem race if multiple | 
|  | // scoped_test_envs were created concurrently in the same test (hence | 
|  | // sharing the same cwd). However, it is fairly unlikely to happen as | 
|  | // we generally don't use scoped_test_env from multiple threads, so | 
|  | // this is deemed acceptable. | 
|  | // The cwd.filename() itself isn't unique across all tests in the suite, | 
|  | // so start the numbering from a hash of the full cwd, to avoid | 
|  | // different tests interfering with each other. | 
|  | static inline fs::path available_cwd_path() { | 
|  | fs::path const cwd = utils::getcwd(); | 
|  | fs::path const tmp = fs::temp_directory_path(); | 
|  | std::string base = cwd.filename().string(); | 
|  | std::size_t i = std::hash<std::string>()(cwd.string()); | 
|  | fs::path p = tmp / (base + "-static_env." + std::to_string(i)); | 
|  | while (utils::exists(p.string())) { | 
|  | p = tmp / (base + "-static_env." + std::to_string(++i)); | 
|  | } | 
|  | return p; | 
|  | } | 
|  | }; | 
|  |  | 
|  | /// This class generates the following tree: | 
|  | /// | 
|  | ///     static_test_env | 
|  | ///     |-- bad_symlink -> dne | 
|  | ///     |-- dir1 | 
|  | ///     |   |-- dir2 | 
|  | ///     |   |   |-- afile3 | 
|  | ///     |   |   |-- dir3 | 
|  | ///     |   |   |   `-- file5 | 
|  | ///     |   |   |-- file4 | 
|  | ///     |   |   `-- symlink_to_dir3 -> dir3 | 
|  | ///     |   `-- file1 | 
|  | ///     |   `-- file2 | 
|  | ///     |-- empty_file | 
|  | ///     |-- non_empty_file | 
|  | ///     |-- symlink_to_dir -> dir1 | 
|  | ///     `-- symlink_to_empty_file -> empty_file | 
|  | /// | 
|  | class static_test_env { | 
|  | scoped_test_env env_; | 
|  | public: | 
|  | static_test_env() { | 
|  | env_.create_symlink("dne", "bad_symlink", false); | 
|  | env_.create_dir("dir1"); | 
|  | env_.create_dir("dir1/dir2"); | 
|  | env_.create_file("dir1/dir2/afile3"); | 
|  | env_.create_dir("dir1/dir2/dir3"); | 
|  | env_.create_file("dir1/dir2/dir3/file5"); | 
|  | env_.create_file("dir1/dir2/file4"); | 
|  | env_.create_directory_symlink("dir3", "dir1/dir2/symlink_to_dir3", false); | 
|  | env_.create_file("dir1/file1"); | 
|  | env_.create_file("dir1/file2", 42); | 
|  | env_.create_file("empty_file"); | 
|  | env_.create_file("non_empty_file", 42); | 
|  | env_.create_directory_symlink("dir1", "symlink_to_dir", false); | 
|  | env_.create_symlink("empty_file", "symlink_to_empty_file", false); | 
|  | } | 
|  |  | 
|  | const fs::path Root = env_.test_root; | 
|  |  | 
|  | fs::path makePath(fs::path const& p) const { | 
|  | // env_path is expected not to contain symlinks. | 
|  | fs::path const& env_path = Root; | 
|  | return env_path / p; | 
|  | } | 
|  |  | 
|  | const std::vector<fs::path> TestFileList = { | 
|  | makePath("empty_file"), | 
|  | makePath("non_empty_file"), | 
|  | makePath("dir1/file1"), | 
|  | makePath("dir1/file2") | 
|  | }; | 
|  |  | 
|  | const std::vector<fs::path> TestDirList = { | 
|  | makePath("dir1"), | 
|  | makePath("dir1/dir2"), | 
|  | makePath("dir1/dir2/dir3") | 
|  | }; | 
|  |  | 
|  | const fs::path File          = TestFileList[0]; | 
|  | const fs::path Dir           = TestDirList[0]; | 
|  | const fs::path Dir2          = TestDirList[1]; | 
|  | const fs::path Dir3          = TestDirList[2]; | 
|  | const fs::path SymlinkToFile = makePath("symlink_to_empty_file"); | 
|  | const fs::path SymlinkToDir  = makePath("symlink_to_dir"); | 
|  | const fs::path BadSymlink    = makePath("bad_symlink"); | 
|  | const fs::path DNE           = makePath("DNE"); | 
|  | const fs::path EmptyFile     = TestFileList[0]; | 
|  | const fs::path NonEmptyFile  = TestFileList[1]; | 
|  | const fs::path CharFile      = "/dev/null"; // Hopefully this exists | 
|  |  | 
|  | const std::vector<fs::path> DirIterationList = { | 
|  | makePath("dir1/dir2"), | 
|  | makePath("dir1/file1"), | 
|  | makePath("dir1/file2") | 
|  | }; | 
|  |  | 
|  | const std::vector<fs::path> DirIterationListDepth1 = { | 
|  | makePath("dir1/dir2/afile3"), | 
|  | makePath("dir1/dir2/dir3"), | 
|  | makePath("dir1/dir2/symlink_to_dir3"), | 
|  | makePath("dir1/dir2/file4"), | 
|  | }; | 
|  |  | 
|  | const std::vector<fs::path> RecDirIterationList = { | 
|  | makePath("dir1/dir2"), | 
|  | makePath("dir1/file1"), | 
|  | makePath("dir1/file2"), | 
|  | makePath("dir1/dir2/afile3"), | 
|  | makePath("dir1/dir2/dir3"), | 
|  | makePath("dir1/dir2/symlink_to_dir3"), | 
|  | makePath("dir1/dir2/file4"), | 
|  | makePath("dir1/dir2/dir3/file5") | 
|  | }; | 
|  |  | 
|  | const std::vector<fs::path> RecDirFollowSymlinksIterationList = { | 
|  | makePath("dir1/dir2"), | 
|  | makePath("dir1/file1"), | 
|  | makePath("dir1/file2"), | 
|  | makePath("dir1/dir2/afile3"), | 
|  | makePath("dir1/dir2/dir3"), | 
|  | makePath("dir1/dir2/file4"), | 
|  | makePath("dir1/dir2/dir3/file5"), | 
|  | makePath("dir1/dir2/symlink_to_dir3"), | 
|  | makePath("dir1/dir2/symlink_to_dir3/file5"), | 
|  | }; | 
|  | }; | 
|  |  | 
|  | struct CWDGuard { | 
|  | std::string oldCwd_; | 
|  | CWDGuard() : oldCwd_(utils::getcwd()) { } | 
|  | ~CWDGuard() { | 
|  | int ret = ::chdir(oldCwd_.c_str()); | 
|  | assert(ret == 0 && "chdir failed"); | 
|  | } | 
|  |  | 
|  | CWDGuard(CWDGuard const&) = delete; | 
|  | CWDGuard& operator=(CWDGuard const&) = delete; | 
|  | }; | 
|  |  | 
|  | // Misc test types | 
|  |  | 
|  | const MultiStringType PathList[] = { | 
|  | MKSTR(""), | 
|  | MKSTR(" "), | 
|  | MKSTR("//"), | 
|  | MKSTR("."), | 
|  | MKSTR(".."), | 
|  | MKSTR("foo"), | 
|  | MKSTR("/"), | 
|  | MKSTR("/foo"), | 
|  | MKSTR("foo/"), | 
|  | MKSTR("/foo/"), | 
|  | MKSTR("foo/bar"), | 
|  | MKSTR("/foo/bar"), | 
|  | MKSTR("//net"), | 
|  | MKSTR("//net/foo"), | 
|  | MKSTR("///foo///"), | 
|  | MKSTR("///foo///bar"), | 
|  | MKSTR("/."), | 
|  | MKSTR("./"), | 
|  | MKSTR("/.."), | 
|  | MKSTR("../"), | 
|  | MKSTR("foo/."), | 
|  | MKSTR("foo/.."), | 
|  | MKSTR("foo/./"), | 
|  | MKSTR("foo/./bar"), | 
|  | MKSTR("foo/../"), | 
|  | MKSTR("foo/../bar"), | 
|  | MKSTR("c:"), | 
|  | MKSTR("c:/"), | 
|  | MKSTR("c:foo"), | 
|  | MKSTR("c:/foo"), | 
|  | MKSTR("c:foo/"), | 
|  | MKSTR("c:/foo/"), | 
|  | MKSTR("c:/foo/bar"), | 
|  | MKSTR("prn:"), | 
|  | MKSTR("c:\\"), | 
|  | MKSTR("c:\\foo"), | 
|  | MKSTR("c:foo\\"), | 
|  | MKSTR("c:\\foo\\"), | 
|  | MKSTR("c:\\foo/"), | 
|  | MKSTR("c:/foo\\bar"), | 
|  | MKSTR("//"), | 
|  | MKSTR("/finally/we/need/one/really/really/really/really/really/really/really/long/string") | 
|  | }; | 
|  | const unsigned PathListSize = sizeof(PathList) / sizeof(MultiStringType); | 
|  |  | 
|  | template <class Iter> | 
|  | Iter IterEnd(Iter B) { | 
|  | using VT = typename std::iterator_traits<Iter>::value_type; | 
|  | for (; *B != VT{}; ++B) | 
|  | ; | 
|  | return B; | 
|  | } | 
|  |  | 
|  | template <class CharT> | 
|  | const CharT* StrEnd(CharT const* P) { | 
|  | return IterEnd(P); | 
|  | } | 
|  |  | 
|  | template <class CharT> | 
|  | std::size_t StrLen(CharT const* P) { | 
|  | return StrEnd(P) - P; | 
|  | } | 
|  |  | 
|  | // Testing the allocation behavior of the code_cvt functions requires | 
|  | // *knowing* that the allocation was not done by "path::__str_". | 
|  | // This hack forces path to allocate enough memory. | 
|  | inline void PathReserve(fs::path& p, std::size_t N) { | 
|  | auto const& native_ref = p.native(); | 
|  | const_cast<fs::path::string_type&>(native_ref).reserve(N); | 
|  | } | 
|  |  | 
|  | template <class Iter1, class Iter2> | 
|  | bool checkCollectionsEqual( | 
|  | Iter1 start1, Iter1 const end1 | 
|  | , Iter2 start2, Iter2 const end2 | 
|  | ) | 
|  | { | 
|  | while (start1 != end1 && start2 != end2) { | 
|  | if (*start1 != *start2) { | 
|  | return false; | 
|  | } | 
|  | ++start1; ++start2; | 
|  | } | 
|  | return (start1 == end1 && start2 == end2); | 
|  | } | 
|  |  | 
|  |  | 
|  | template <class Iter1, class Iter2> | 
|  | bool checkCollectionsEqualBackwards( | 
|  | Iter1 const start1, Iter1 end1 | 
|  | , Iter2 const start2, Iter2 end2 | 
|  | ) | 
|  | { | 
|  | while (start1 != end1 && start2 != end2) { | 
|  | --end1; --end2; | 
|  | if (*end1 != *end2) { | 
|  | return false; | 
|  | } | 
|  | } | 
|  | return (start1 == end1 && start2 == end2); | 
|  | } | 
|  |  | 
|  | // We often need to test that the error_code was cleared if no error occurs | 
|  | // this function returns an error_code which is set to an error that will | 
|  | // never be returned by the filesystem functions. | 
|  | inline std::error_code GetTestEC(unsigned Idx = 0) { | 
|  | using std::errc; | 
|  | auto GetErrc = [&]() { | 
|  | switch (Idx) { | 
|  | case 0: | 
|  | return errc::address_family_not_supported; | 
|  | case 1: | 
|  | return errc::address_not_available; | 
|  | case 2: | 
|  | return errc::address_in_use; | 
|  | case 3: | 
|  | return errc::argument_list_too_long; | 
|  | default: | 
|  | assert(false && "Idx out of range"); | 
|  | std::abort(); | 
|  | } | 
|  | }; | 
|  | return std::make_error_code(GetErrc()); | 
|  | } | 
|  |  | 
|  | inline bool ErrorIsImp(const std::error_code& ec, | 
|  | std::vector<std::errc> const& errors) { | 
|  | std::error_condition cond = ec.default_error_condition(); | 
|  | for (auto errc : errors) { | 
|  | if (cond.value() == static_cast<int>(errc)) | 
|  | return true; | 
|  | } | 
|  | return false; | 
|  | } | 
|  |  | 
|  | template <class... ErrcT> | 
|  | inline bool ErrorIs(const std::error_code& ec, std::errc First, ErrcT... Rest) { | 
|  | std::vector<std::errc> errors = {First, Rest...}; | 
|  | return ErrorIsImp(ec, errors); | 
|  | } | 
|  |  | 
|  | // Provide our own Sleep routine since std::this_thread::sleep_for is not | 
|  | // available in single-threaded mode. | 
|  | template <class Dur> void SleepFor(Dur dur) { | 
|  | using namespace std::chrono; | 
|  | #if defined(_LIBCPP_HAS_NO_MONOTONIC_CLOCK) | 
|  | using Clock = system_clock; | 
|  | #else | 
|  | using Clock = steady_clock; | 
|  | #endif | 
|  | const auto wake_time = Clock::now() + dur; | 
|  | while (Clock::now() < wake_time) | 
|  | ; | 
|  | } | 
|  |  | 
|  | inline bool PathEq(fs::path const& LHS, fs::path const& RHS) { | 
|  | return LHS.native() == RHS.native(); | 
|  | } | 
|  |  | 
|  | inline bool PathEqIgnoreSep(fs::path LHS, fs::path RHS) { | 
|  | LHS.make_preferred(); | 
|  | RHS.make_preferred(); | 
|  | return LHS.native() == RHS.native(); | 
|  | } | 
|  |  | 
|  | inline fs::perms NormalizeExpectedPerms(fs::perms P) { | 
|  | #ifdef _WIN32 | 
|  | // On Windows, fs::perms only maps down to one bit stored in the filesystem, | 
|  | // a boolean readonly flag. | 
|  | // Normalize permissions to the format it gets returned; all fs entries are | 
|  | // read+exec for all users; writable ones also have the write bit set for | 
|  | // all users. | 
|  | P |= fs::perms::owner_read | fs::perms::group_read | fs::perms::others_read; | 
|  | P |= fs::perms::owner_exec | fs::perms::group_exec | fs::perms::others_exec; | 
|  | fs::perms Write = | 
|  | fs::perms::owner_write | fs::perms::group_write | fs::perms::others_write; | 
|  | if ((P & Write) != fs::perms::none) | 
|  | P |= Write; | 
|  | #endif | 
|  | return P; | 
|  | } | 
|  |  | 
|  | struct ExceptionChecker { | 
|  | std::errc expected_err; | 
|  | fs::path expected_path1; | 
|  | fs::path expected_path2; | 
|  | unsigned num_paths; | 
|  | const char* func_name; | 
|  | std::string opt_message; | 
|  |  | 
|  | explicit ExceptionChecker(std::errc first_err, const char* fun_name, | 
|  | std::string opt_msg = {}) | 
|  | : expected_err{first_err}, num_paths(0), func_name(fun_name), | 
|  | opt_message(opt_msg) {} | 
|  | explicit ExceptionChecker(fs::path p, std::errc first_err, | 
|  | const char* fun_name, std::string opt_msg = {}) | 
|  | : expected_err(first_err), expected_path1(p), num_paths(1), | 
|  | func_name(fun_name), opt_message(opt_msg) {} | 
|  |  | 
|  | explicit ExceptionChecker(fs::path p1, fs::path p2, std::errc first_err, | 
|  | const char* fun_name, std::string opt_msg = {}) | 
|  | : expected_err(first_err), expected_path1(p1), expected_path2(p2), | 
|  | num_paths(2), func_name(fun_name), opt_message(opt_msg) {} | 
|  |  | 
|  | void operator()(fs::filesystem_error const& Err) { | 
|  | assert(ErrorIsImp(Err.code(), {expected_err})); | 
|  | assert(Err.path1() == expected_path1); | 
|  | assert(Err.path2() == expected_path2); | 
|  | LIBCPP_ONLY(check_libcxx_string(Err)); | 
|  | } | 
|  |  | 
|  | void check_libcxx_string(fs::filesystem_error const& Err) { | 
|  | std::string message = std::make_error_code(expected_err).message(); | 
|  |  | 
|  | std::string additional_msg = ""; | 
|  | if (!opt_message.empty()) { | 
|  | additional_msg = opt_message + ": "; | 
|  | } | 
|  | auto transform_path = [](const fs::path& p) { | 
|  | return "\"" + p.string() + "\""; | 
|  | }; | 
|  | std::string format = [&]() -> std::string { | 
|  | switch (num_paths) { | 
|  | case 0: | 
|  | return format_string("filesystem error: in %s: %s%s", func_name, | 
|  | additional_msg, message); | 
|  | case 1: | 
|  | return format_string("filesystem error: in %s: %s%s [%s]", func_name, | 
|  | additional_msg, message, | 
|  | transform_path(expected_path1).c_str()); | 
|  | case 2: | 
|  | return format_string("filesystem error: in %s: %s%s [%s] [%s]", | 
|  | func_name, additional_msg, message, | 
|  | transform_path(expected_path1).c_str(), | 
|  | transform_path(expected_path2).c_str()); | 
|  | default: | 
|  | TEST_FAIL("unexpected case"); | 
|  | return ""; | 
|  | } | 
|  | }(); | 
|  | assert(format == Err.what()); | 
|  | if (format != Err.what()) { | 
|  | fprintf(stderr, | 
|  | "filesystem_error::what() does not match expected output:\n"); | 
|  | fprintf(stderr, "  expected: \"%s\"\n", format.c_str()); | 
|  | fprintf(stderr, "  actual:   \"%s\"\n\n", Err.what()); | 
|  | } | 
|  | } | 
|  |  | 
|  | ExceptionChecker(ExceptionChecker const&) = delete; | 
|  | ExceptionChecker& operator=(ExceptionChecker const&) = delete; | 
|  |  | 
|  | }; | 
|  |  | 
|  | inline fs::path GetWindowsInaccessibleDir() { | 
|  | // Only makes sense on windows, but the code can be compiled for | 
|  | // any platform. | 
|  | const fs::path dir("C:\\System Volume Information"); | 
|  | std::error_code ec; | 
|  | const fs::path root("C:\\"); | 
|  | for (const auto &ent : fs::directory_iterator(root, ec)) { | 
|  | if (ent != dir) | 
|  | continue; | 
|  | // Basic sanity checks on the directory_entry | 
|  | if (!ent.exists() || !ent.is_directory()) { | 
|  | fprintf(stderr, "The expected inaccessible directory \"%s\" was found " | 
|  | "but doesn't behave as expected, skipping tests " | 
|  | "regarding it\n", dir.string().c_str()); | 
|  | return fs::path(); | 
|  | } | 
|  | // Check that it indeed is inaccessible as expected | 
|  | (void)fs::exists(ent, ec); | 
|  | if (!ec) { | 
|  | fprintf(stderr, "The expected inaccessible directory \"%s\" was found " | 
|  | "but seems to be accessible, skipping tests " | 
|  | "regarding it\n", dir.string().c_str()); | 
|  | return fs::path(); | 
|  | } | 
|  | return ent; | 
|  | } | 
|  | fprintf(stderr, "No inaccessible directory \"%s\" found, skipping tests " | 
|  | "regarding it\n", dir.string().c_str()); | 
|  | return fs::path(); | 
|  | } | 
|  |  | 
|  | #endif /* FILESYSTEM_TEST_HELPER_H */ |