Initial commit: Go 1.23 release state
This commit is contained in:
709
src/path/filepath/path_windows_test.go
Normal file
709
src/path/filepath/path_windows_test.go
Normal file
@@ -0,0 +1,709 @@
|
||||
// Copyright 2013 The Go Authors. All rights reserved.
|
||||
// Use of this source code is governed by a BSD-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package filepath_test
|
||||
|
||||
import (
|
||||
"flag"
|
||||
"fmt"
|
||||
"internal/godebug"
|
||||
"internal/testenv"
|
||||
"io/fs"
|
||||
"os"
|
||||
"os/exec"
|
||||
"path/filepath"
|
||||
"reflect"
|
||||
"runtime/debug"
|
||||
"strings"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestWinSplitListTestsAreValid(t *testing.T) {
|
||||
comspec := os.Getenv("ComSpec")
|
||||
if comspec == "" {
|
||||
t.Fatal("%ComSpec% must be set")
|
||||
}
|
||||
|
||||
for ti, tt := range winsplitlisttests {
|
||||
testWinSplitListTestIsValid(t, ti, tt, comspec)
|
||||
}
|
||||
}
|
||||
|
||||
func testWinSplitListTestIsValid(t *testing.T, ti int, tt SplitListTest,
|
||||
comspec string) {
|
||||
|
||||
const (
|
||||
cmdfile = `printdir.cmd`
|
||||
perm fs.FileMode = 0700
|
||||
)
|
||||
|
||||
tmp := t.TempDir()
|
||||
for i, d := range tt.result {
|
||||
if d == "" {
|
||||
continue
|
||||
}
|
||||
if cd := filepath.Clean(d); filepath.VolumeName(cd) != "" ||
|
||||
cd[0] == '\\' || cd == ".." || (len(cd) >= 3 && cd[0:3] == `..\`) {
|
||||
t.Errorf("%d,%d: %#q refers outside working directory", ti, i, d)
|
||||
return
|
||||
}
|
||||
dd := filepath.Join(tmp, d)
|
||||
if _, err := os.Stat(dd); err == nil {
|
||||
t.Errorf("%d,%d: %#q already exists", ti, i, d)
|
||||
return
|
||||
}
|
||||
if err := os.MkdirAll(dd, perm); err != nil {
|
||||
t.Errorf("%d,%d: MkdirAll(%#q) failed: %v", ti, i, dd, err)
|
||||
return
|
||||
}
|
||||
fn, data := filepath.Join(dd, cmdfile), []byte("@echo "+d+"\r\n")
|
||||
if err := os.WriteFile(fn, data, perm); err != nil {
|
||||
t.Errorf("%d,%d: WriteFile(%#q) failed: %v", ti, i, fn, err)
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
// on some systems, SystemRoot is required for cmd to work
|
||||
systemRoot := os.Getenv("SystemRoot")
|
||||
|
||||
for i, d := range tt.result {
|
||||
if d == "" {
|
||||
continue
|
||||
}
|
||||
exp := []byte(d + "\r\n")
|
||||
cmd := &exec.Cmd{
|
||||
Path: comspec,
|
||||
Args: []string{`/c`, cmdfile},
|
||||
Env: []string{`Path=` + systemRoot + "/System32;" + tt.list, `SystemRoot=` + systemRoot},
|
||||
Dir: tmp,
|
||||
}
|
||||
out, err := cmd.CombinedOutput()
|
||||
switch {
|
||||
case err != nil:
|
||||
t.Errorf("%d,%d: execution error %v\n%q", ti, i, err, out)
|
||||
return
|
||||
case !reflect.DeepEqual(out, exp):
|
||||
t.Errorf("%d,%d: expected %#q, got %#q", ti, i, exp, out)
|
||||
return
|
||||
default:
|
||||
// unshadow cmdfile in next directory
|
||||
err = os.Remove(filepath.Join(tmp, d, cmdfile))
|
||||
if err != nil {
|
||||
t.Fatalf("Remove test command failed: %v", err)
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestWindowsEvalSymlinks(t *testing.T) {
|
||||
testenv.MustHaveSymlink(t)
|
||||
|
||||
tmpDir := tempDirCanonical(t)
|
||||
|
||||
if len(tmpDir) < 3 {
|
||||
t.Fatalf("tmpDir path %q is too short", tmpDir)
|
||||
}
|
||||
if tmpDir[1] != ':' {
|
||||
t.Fatalf("tmpDir path %q must have drive letter in it", tmpDir)
|
||||
}
|
||||
test := EvalSymlinksTest{"test/linkabswin", tmpDir[:3]}
|
||||
|
||||
// Create the symlink farm using relative paths.
|
||||
testdirs := append(EvalSymlinksTestDirs, test)
|
||||
for _, d := range testdirs {
|
||||
var err error
|
||||
path := simpleJoin(tmpDir, d.path)
|
||||
if d.dest == "" {
|
||||
err = os.Mkdir(path, 0755)
|
||||
} else {
|
||||
err = os.Symlink(d.dest, path)
|
||||
}
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
path := simpleJoin(tmpDir, test.path)
|
||||
|
||||
testEvalSymlinks(t, path, test.dest)
|
||||
|
||||
testEvalSymlinksAfterChdir(t, path, ".", test.dest)
|
||||
|
||||
testEvalSymlinksAfterChdir(t,
|
||||
path,
|
||||
filepath.VolumeName(tmpDir)+".",
|
||||
test.dest)
|
||||
|
||||
testEvalSymlinksAfterChdir(t,
|
||||
simpleJoin(tmpDir, "test"),
|
||||
simpleJoin("..", test.path),
|
||||
test.dest)
|
||||
|
||||
testEvalSymlinksAfterChdir(t, tmpDir, test.path, test.dest)
|
||||
}
|
||||
|
||||
// TestEvalSymlinksCanonicalNames verify that EvalSymlinks
|
||||
// returns "canonical" path names on windows.
|
||||
func TestEvalSymlinksCanonicalNames(t *testing.T) {
|
||||
ctmp := tempDirCanonical(t)
|
||||
dirs := []string{
|
||||
"test",
|
||||
"test/dir",
|
||||
"testing_long_dir",
|
||||
"TEST2",
|
||||
}
|
||||
|
||||
for _, d := range dirs {
|
||||
dir := filepath.Join(ctmp, d)
|
||||
err := os.Mkdir(dir, 0755)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
cname, err := filepath.EvalSymlinks(dir)
|
||||
if err != nil {
|
||||
t.Errorf("EvalSymlinks(%q) error: %v", dir, err)
|
||||
continue
|
||||
}
|
||||
if dir != cname {
|
||||
t.Errorf("EvalSymlinks(%q) returns %q, but should return %q", dir, cname, dir)
|
||||
continue
|
||||
}
|
||||
// test non-canonical names
|
||||
test := strings.ToUpper(dir)
|
||||
p, err := filepath.EvalSymlinks(test)
|
||||
if err != nil {
|
||||
t.Errorf("EvalSymlinks(%q) error: %v", test, err)
|
||||
continue
|
||||
}
|
||||
if p != cname {
|
||||
t.Errorf("EvalSymlinks(%q) returns %q, but should return %q", test, p, cname)
|
||||
continue
|
||||
}
|
||||
// another test
|
||||
test = strings.ToLower(dir)
|
||||
p, err = filepath.EvalSymlinks(test)
|
||||
if err != nil {
|
||||
t.Errorf("EvalSymlinks(%q) error: %v", test, err)
|
||||
continue
|
||||
}
|
||||
if p != cname {
|
||||
t.Errorf("EvalSymlinks(%q) returns %q, but should return %q", test, p, cname)
|
||||
continue
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// checkVolume8dot3Setting runs "fsutil 8dot3name query c:" command
|
||||
// (where c: is vol parameter) to discover "8dot3 name creation state".
|
||||
// The state is combination of 2 flags. The global flag controls if it
|
||||
// is per volume or global setting:
|
||||
//
|
||||
// 0 - Enable 8dot3 name creation on all volumes on the system
|
||||
// 1 - Disable 8dot3 name creation on all volumes on the system
|
||||
// 2 - Set 8dot3 name creation on a per volume basis
|
||||
// 3 - Disable 8dot3 name creation on all volumes except the system volume
|
||||
//
|
||||
// If global flag is set to 2, then per-volume flag needs to be examined:
|
||||
//
|
||||
// 0 - Enable 8dot3 name creation on this volume
|
||||
// 1 - Disable 8dot3 name creation on this volume
|
||||
//
|
||||
// checkVolume8dot3Setting verifies that "8dot3 name creation" flags
|
||||
// are set to 2 and 0, if enabled parameter is true, or 2 and 1, if enabled
|
||||
// is false. Otherwise checkVolume8dot3Setting returns error.
|
||||
func checkVolume8dot3Setting(vol string, enabled bool) error {
|
||||
// It appears, on some systems "fsutil 8dot3name query ..." command always
|
||||
// exits with error. Ignore exit code, and look at fsutil output instead.
|
||||
out, _ := exec.Command("fsutil", "8dot3name", "query", vol).CombinedOutput()
|
||||
// Check that system has "Volume level setting" set.
|
||||
expected := "The registry state of NtfsDisable8dot3NameCreation is 2, the default (Volume level setting)"
|
||||
if !strings.Contains(string(out), expected) {
|
||||
// Windows 10 version of fsutil has different output message.
|
||||
expectedWindow10 := "The registry state is: 2 (Per volume setting - the default)"
|
||||
if !strings.Contains(string(out), expectedWindow10) {
|
||||
return fmt.Errorf("fsutil output should contain %q, but is %q", expected, string(out))
|
||||
}
|
||||
}
|
||||
// Now check the volume setting.
|
||||
expected = "Based on the above two settings, 8dot3 name creation is %s on %s"
|
||||
if enabled {
|
||||
expected = fmt.Sprintf(expected, "enabled", vol)
|
||||
} else {
|
||||
expected = fmt.Sprintf(expected, "disabled", vol)
|
||||
}
|
||||
if !strings.Contains(string(out), expected) {
|
||||
return fmt.Errorf("unexpected fsutil output: %q", string(out))
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func setVolume8dot3Setting(vol string, enabled bool) error {
|
||||
cmd := []string{"fsutil", "8dot3name", "set", vol}
|
||||
if enabled {
|
||||
cmd = append(cmd, "0")
|
||||
} else {
|
||||
cmd = append(cmd, "1")
|
||||
}
|
||||
// It appears, on some systems "fsutil 8dot3name set ..." command always
|
||||
// exits with error. Ignore exit code, and look at fsutil output instead.
|
||||
out, _ := exec.Command(cmd[0], cmd[1:]...).CombinedOutput()
|
||||
if string(out) != "\r\nSuccessfully set 8dot3name behavior.\r\n" {
|
||||
// Windows 10 version of fsutil has different output message.
|
||||
expectedWindow10 := "Successfully %s 8dot3name generation on %s\r\n"
|
||||
if enabled {
|
||||
expectedWindow10 = fmt.Sprintf(expectedWindow10, "enabled", vol)
|
||||
} else {
|
||||
expectedWindow10 = fmt.Sprintf(expectedWindow10, "disabled", vol)
|
||||
}
|
||||
if string(out) != expectedWindow10 {
|
||||
return fmt.Errorf("%v command failed: %q", cmd, string(out))
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
var runFSModifyTests = flag.Bool("run_fs_modify_tests", false, "run tests which modify filesystem parameters")
|
||||
|
||||
// This test assumes registry state of NtfsDisable8dot3NameCreation is 2,
|
||||
// the default (Volume level setting).
|
||||
func TestEvalSymlinksCanonicalNamesWith8dot3Disabled(t *testing.T) {
|
||||
if !*runFSModifyTests {
|
||||
t.Skip("skipping test that modifies file system setting; enable with -run_fs_modify_tests")
|
||||
}
|
||||
tempVol := filepath.VolumeName(os.TempDir())
|
||||
if len(tempVol) != 2 {
|
||||
t.Fatalf("unexpected temp volume name %q", tempVol)
|
||||
}
|
||||
|
||||
err := checkVolume8dot3Setting(tempVol, true)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
err = setVolume8dot3Setting(tempVol, false)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
defer func() {
|
||||
err := setVolume8dot3Setting(tempVol, true)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
err = checkVolume8dot3Setting(tempVol, true)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}()
|
||||
err = checkVolume8dot3Setting(tempVol, false)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
TestEvalSymlinksCanonicalNames(t)
|
||||
}
|
||||
|
||||
func TestToNorm(t *testing.T) {
|
||||
stubBase := func(path string) (string, error) {
|
||||
vol := filepath.VolumeName(path)
|
||||
path = path[len(vol):]
|
||||
|
||||
if strings.Contains(path, "/") {
|
||||
return "", fmt.Errorf("invalid path is given to base: %s", vol+path)
|
||||
}
|
||||
|
||||
if path == "" || path == "." || path == `\` {
|
||||
return "", fmt.Errorf("invalid path is given to base: %s", vol+path)
|
||||
}
|
||||
|
||||
i := strings.LastIndexByte(path, filepath.Separator)
|
||||
if i == len(path)-1 { // trailing '\' is invalid
|
||||
return "", fmt.Errorf("invalid path is given to base: %s", vol+path)
|
||||
}
|
||||
if i == -1 {
|
||||
return strings.ToUpper(path), nil
|
||||
}
|
||||
|
||||
return strings.ToUpper(path[i+1:]), nil
|
||||
}
|
||||
|
||||
// On this test, toNorm should be same as string.ToUpper(filepath.Clean(path)) except empty string.
|
||||
tests := []struct {
|
||||
arg string
|
||||
want string
|
||||
}{
|
||||
{"", ""},
|
||||
{".", "."},
|
||||
{"./foo/bar", `FOO\BAR`},
|
||||
{"/", `\`},
|
||||
{"/foo/bar", `\FOO\BAR`},
|
||||
{"/foo/bar/baz/qux", `\FOO\BAR\BAZ\QUX`},
|
||||
{"foo/bar", `FOO\BAR`},
|
||||
{"C:/foo/bar", `C:\FOO\BAR`},
|
||||
{"C:foo/bar", `C:FOO\BAR`},
|
||||
{"c:/foo/bar", `C:\FOO\BAR`},
|
||||
{"C:/foo/bar", `C:\FOO\BAR`},
|
||||
{"C:/foo/bar/", `C:\FOO\BAR`},
|
||||
{`C:\foo\bar`, `C:\FOO\BAR`},
|
||||
{`C:\foo/bar\`, `C:\FOO\BAR`},
|
||||
{"C:/ふー/バー", `C:\ふー\バー`},
|
||||
}
|
||||
|
||||
for _, test := range tests {
|
||||
var path string
|
||||
if test.arg != "" {
|
||||
path = filepath.Clean(test.arg)
|
||||
}
|
||||
got, err := filepath.ToNorm(path, stubBase)
|
||||
if err != nil {
|
||||
t.Errorf("toNorm(%s) failed: %v\n", test.arg, err)
|
||||
} else if got != test.want {
|
||||
t.Errorf("toNorm(%s) returns %s, but %s expected\n", test.arg, got, test.want)
|
||||
}
|
||||
}
|
||||
|
||||
testPath := `{{tmp}}\test\foo\bar`
|
||||
|
||||
testsDir := []struct {
|
||||
wd string
|
||||
arg string
|
||||
want string
|
||||
}{
|
||||
// test absolute paths
|
||||
{".", `{{tmp}}\test\foo\bar`, `{{tmp}}\test\foo\bar`},
|
||||
{".", `{{tmp}}\.\test/foo\bar`, `{{tmp}}\test\foo\bar`},
|
||||
{".", `{{tmp}}\test\..\test\foo\bar`, `{{tmp}}\test\foo\bar`},
|
||||
{".", `{{tmp}}\TEST\FOO\BAR`, `{{tmp}}\test\foo\bar`},
|
||||
|
||||
// test relative paths begin with drive letter
|
||||
{`{{tmp}}\test`, `{{tmpvol}}.`, `{{tmpvol}}.`},
|
||||
{`{{tmp}}\test`, `{{tmpvol}}..`, `{{tmpvol}}..`},
|
||||
{`{{tmp}}\test`, `{{tmpvol}}foo\bar`, `{{tmpvol}}foo\bar`},
|
||||
{`{{tmp}}\test`, `{{tmpvol}}.\foo\bar`, `{{tmpvol}}foo\bar`},
|
||||
{`{{tmp}}\test`, `{{tmpvol}}foo\..\foo\bar`, `{{tmpvol}}foo\bar`},
|
||||
{`{{tmp}}\test`, `{{tmpvol}}FOO\BAR`, `{{tmpvol}}foo\bar`},
|
||||
|
||||
// test relative paths begin with '\'
|
||||
{"{{tmp}}", `{{tmpnovol}}\test\foo\bar`, `{{tmpnovol}}\test\foo\bar`},
|
||||
{"{{tmp}}", `{{tmpnovol}}\.\test\foo\bar`, `{{tmpnovol}}\test\foo\bar`},
|
||||
{"{{tmp}}", `{{tmpnovol}}\test\..\test\foo\bar`, `{{tmpnovol}}\test\foo\bar`},
|
||||
{"{{tmp}}", `{{tmpnovol}}\TEST\FOO\BAR`, `{{tmpnovol}}\test\foo\bar`},
|
||||
|
||||
// test relative paths begin without '\'
|
||||
{`{{tmp}}\test`, ".", `.`},
|
||||
{`{{tmp}}\test`, "..", `..`},
|
||||
{`{{tmp}}\test`, `foo\bar`, `foo\bar`},
|
||||
{`{{tmp}}\test`, `.\foo\bar`, `foo\bar`},
|
||||
{`{{tmp}}\test`, `foo\..\foo\bar`, `foo\bar`},
|
||||
{`{{tmp}}\test`, `FOO\BAR`, `foo\bar`},
|
||||
|
||||
// test UNC paths
|
||||
{".", `\\localhost\c$`, `\\localhost\c$`},
|
||||
}
|
||||
|
||||
ctmp := tempDirCanonical(t)
|
||||
if err := os.MkdirAll(strings.ReplaceAll(testPath, "{{tmp}}", ctmp), 0777); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
cwd, err := os.Getwd()
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
defer func() {
|
||||
err := os.Chdir(cwd)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}()
|
||||
|
||||
tmpVol := filepath.VolumeName(ctmp)
|
||||
if len(tmpVol) != 2 {
|
||||
t.Fatalf("unexpected temp volume name %q", tmpVol)
|
||||
}
|
||||
|
||||
tmpNoVol := ctmp[len(tmpVol):]
|
||||
|
||||
replacer := strings.NewReplacer("{{tmp}}", ctmp, "{{tmpvol}}", tmpVol, "{{tmpnovol}}", tmpNoVol)
|
||||
|
||||
for _, test := range testsDir {
|
||||
wd := replacer.Replace(test.wd)
|
||||
arg := replacer.Replace(test.arg)
|
||||
want := replacer.Replace(test.want)
|
||||
|
||||
if test.wd == "." {
|
||||
err := os.Chdir(cwd)
|
||||
if err != nil {
|
||||
t.Error(err)
|
||||
|
||||
continue
|
||||
}
|
||||
} else {
|
||||
err := os.Chdir(wd)
|
||||
if err != nil {
|
||||
t.Error(err)
|
||||
|
||||
continue
|
||||
}
|
||||
}
|
||||
if arg != "" {
|
||||
arg = filepath.Clean(arg)
|
||||
}
|
||||
got, err := filepath.ToNorm(arg, filepath.NormBase)
|
||||
if err != nil {
|
||||
t.Errorf("toNorm(%s) failed: %v (wd=%s)\n", arg, err, wd)
|
||||
} else if got != want {
|
||||
t.Errorf("toNorm(%s) returns %s, but %s expected (wd=%s)\n", arg, got, want, wd)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestUNC(t *testing.T) {
|
||||
// Test that this doesn't go into an infinite recursion.
|
||||
// See golang.org/issue/15879.
|
||||
defer debug.SetMaxStack(debug.SetMaxStack(1e6))
|
||||
filepath.Glob(`\\?\c:\*`)
|
||||
}
|
||||
|
||||
func testWalkMklink(t *testing.T, linktype string) {
|
||||
output, _ := exec.Command("cmd", "/c", "mklink", "/?").Output()
|
||||
if !strings.Contains(string(output), fmt.Sprintf(" /%s ", linktype)) {
|
||||
t.Skipf(`skipping test; mklink does not supports /%s parameter`, linktype)
|
||||
}
|
||||
testWalkSymlink(t, func(target, link string) error {
|
||||
output, err := exec.Command("cmd", "/c", "mklink", "/"+linktype, link, target).CombinedOutput()
|
||||
if err != nil {
|
||||
return fmt.Errorf(`"mklink /%s %v %v" command failed: %v\n%v`, linktype, link, target, err, string(output))
|
||||
}
|
||||
return nil
|
||||
})
|
||||
}
|
||||
|
||||
func TestWalkDirectoryJunction(t *testing.T) {
|
||||
testenv.MustHaveSymlink(t)
|
||||
testWalkMklink(t, "J")
|
||||
}
|
||||
|
||||
func TestWalkDirectorySymlink(t *testing.T) {
|
||||
testenv.MustHaveSymlink(t)
|
||||
testWalkMklink(t, "D")
|
||||
}
|
||||
|
||||
func createMountPartition(t *testing.T, vhd string, args string) []byte {
|
||||
testenv.MustHaveExecPath(t, "powershell")
|
||||
t.Cleanup(func() {
|
||||
cmd := testenv.Command(t, "powershell", "-Command", fmt.Sprintf("Dismount-VHD %q", vhd))
|
||||
out, err := cmd.CombinedOutput()
|
||||
if err != nil {
|
||||
if t.Skipped() {
|
||||
// Probably failed to dismount because we never mounted it in
|
||||
// the first place. Log the error, but ignore it.
|
||||
t.Logf("%v: %v (skipped)\n%s", cmd, err, out)
|
||||
} else {
|
||||
// Something went wrong, and we don't want to leave dangling VHDs.
|
||||
// Better to fail the test than to just log the error and continue.
|
||||
t.Errorf("%v: %v\n%s", cmd, err, out)
|
||||
}
|
||||
}
|
||||
})
|
||||
|
||||
script := filepath.Join(t.TempDir(), "test.ps1")
|
||||
cmd := strings.Join([]string{
|
||||
"$ErrorActionPreference = \"Stop\"",
|
||||
fmt.Sprintf("$vhd = New-VHD -Path %q -SizeBytes 3MB -Fixed", vhd),
|
||||
"$vhd | Mount-VHD",
|
||||
fmt.Sprintf("$vhd = Get-VHD %q", vhd),
|
||||
"$vhd | Get-Disk | Initialize-Disk -PartitionStyle GPT",
|
||||
"$part = $vhd | Get-Disk | New-Partition -UseMaximumSize -AssignDriveLetter:$false",
|
||||
"$vol = $part | Format-Volume -FileSystem NTFS",
|
||||
args,
|
||||
}, "\n")
|
||||
|
||||
err := os.WriteFile(script, []byte(cmd), 0666)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
output, err := testenv.Command(t, "powershell", "-File", script).CombinedOutput()
|
||||
if err != nil {
|
||||
// This can happen if Hyper-V is not installed or enabled.
|
||||
t.Skip("skipping test because failed to create VHD: ", err, string(output))
|
||||
}
|
||||
return output
|
||||
}
|
||||
|
||||
var winsymlink = godebug.New("winsymlink")
|
||||
var winreadlinkvolume = godebug.New("winreadlinkvolume")
|
||||
|
||||
func TestEvalSymlinksJunctionToVolumeID(t *testing.T) {
|
||||
// Test that EvalSymlinks resolves a directory junction which
|
||||
// is mapped to volumeID (instead of drive letter). See go.dev/issue/39786.
|
||||
if winsymlink.Value() == "0" {
|
||||
t.Skip("skipping test because winsymlink is not enabled")
|
||||
}
|
||||
t.Parallel()
|
||||
|
||||
output, _ := exec.Command("cmd", "/c", "mklink", "/?").Output()
|
||||
if !strings.Contains(string(output), " /J ") {
|
||||
t.Skip("skipping test because mklink command does not support junctions")
|
||||
}
|
||||
|
||||
tmpdir := tempDirCanonical(t)
|
||||
vhd := filepath.Join(tmpdir, "Test.vhdx")
|
||||
output = createMountPartition(t, vhd, "Write-Host $vol.Path -NoNewline")
|
||||
vol := string(output)
|
||||
|
||||
dirlink := filepath.Join(tmpdir, "dirlink")
|
||||
output, err := testenv.Command(t, "cmd", "/c", "mklink", "/J", dirlink, vol).CombinedOutput()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to run mklink %v %v: %v %q", dirlink, vol, err, output)
|
||||
}
|
||||
got, err := filepath.EvalSymlinks(dirlink)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
if got != dirlink {
|
||||
t.Errorf(`EvalSymlinks(%q): got %q, want %q`, dirlink, got, dirlink)
|
||||
}
|
||||
}
|
||||
|
||||
func TestEvalSymlinksMountPointRecursion(t *testing.T) {
|
||||
// Test that EvalSymlinks doesn't follow recursive mount points.
|
||||
// See go.dev/issue/40176.
|
||||
if winsymlink.Value() == "0" {
|
||||
t.Skip("skipping test because winsymlink is not enabled")
|
||||
}
|
||||
t.Parallel()
|
||||
|
||||
tmpdir := tempDirCanonical(t)
|
||||
dirlink := filepath.Join(tmpdir, "dirlink")
|
||||
err := os.Mkdir(dirlink, 0755)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
vhd := filepath.Join(tmpdir, "Test.vhdx")
|
||||
createMountPartition(t, vhd, fmt.Sprintf("$part | Add-PartitionAccessPath -AccessPath %q\n", dirlink))
|
||||
|
||||
got, err := filepath.EvalSymlinks(dirlink)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
if got != dirlink {
|
||||
t.Errorf(`EvalSymlinks(%q): got %q, want %q`, dirlink, got, dirlink)
|
||||
}
|
||||
}
|
||||
|
||||
func TestNTNamespaceSymlink(t *testing.T) {
|
||||
output, _ := exec.Command("cmd", "/c", "mklink", "/?").Output()
|
||||
if !strings.Contains(string(output), " /J ") {
|
||||
t.Skip("skipping test because mklink command does not support junctions")
|
||||
}
|
||||
|
||||
tmpdir := tempDirCanonical(t)
|
||||
|
||||
vol := filepath.VolumeName(tmpdir)
|
||||
output, err := exec.Command("cmd", "/c", "mountvol", vol, "/L").CombinedOutput()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to run mountvol %v /L: %v %q", vol, err, output)
|
||||
}
|
||||
target := strings.Trim(string(output), " \n\r")
|
||||
|
||||
dirlink := filepath.Join(tmpdir, "dirlink")
|
||||
output, err = exec.Command("cmd", "/c", "mklink", "/J", dirlink, target).CombinedOutput()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to run mklink %v %v: %v %q", dirlink, target, err, output)
|
||||
}
|
||||
|
||||
got, err := filepath.EvalSymlinks(dirlink)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
var want string
|
||||
if winsymlink.Value() == "0" {
|
||||
if winreadlinkvolume.Value() == "0" {
|
||||
want = vol + `\`
|
||||
} else {
|
||||
want = target
|
||||
}
|
||||
} else {
|
||||
want = dirlink
|
||||
}
|
||||
if got != want {
|
||||
t.Errorf(`EvalSymlinks(%q): got %q, want %q`, dirlink, got, want)
|
||||
}
|
||||
|
||||
// Make sure we have sufficient privilege to run mklink command.
|
||||
testenv.MustHaveSymlink(t)
|
||||
|
||||
file := filepath.Join(tmpdir, "file")
|
||||
err = os.WriteFile(file, []byte(""), 0666)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
target = filepath.Join(target, file[len(filepath.VolumeName(file)):])
|
||||
|
||||
filelink := filepath.Join(tmpdir, "filelink")
|
||||
output, err = exec.Command("cmd", "/c", "mklink", filelink, target).CombinedOutput()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to run mklink %v %v: %v %q", filelink, target, err, output)
|
||||
}
|
||||
|
||||
got, err = filepath.EvalSymlinks(filelink)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if winreadlinkvolume.Value() == "0" {
|
||||
want = file
|
||||
} else {
|
||||
want = target
|
||||
}
|
||||
if got != want {
|
||||
t.Errorf(`EvalSymlinks(%q): got %q, want %q`, filelink, got, want)
|
||||
}
|
||||
}
|
||||
|
||||
func TestIssue52476(t *testing.T) {
|
||||
tests := []struct {
|
||||
lhs, rhs string
|
||||
want string
|
||||
}{
|
||||
{`..\.`, `C:`, `..\C:`},
|
||||
{`..`, `C:`, `..\C:`},
|
||||
{`.`, `:`, `.\:`},
|
||||
{`.`, `C:`, `.\C:`},
|
||||
{`.`, `C:/a/b/../c`, `.\C:\a\c`},
|
||||
{`.`, `\C:`, `.\C:`},
|
||||
{`C:\`, `.`, `C:\`},
|
||||
{`C:\`, `C:\`, `C:\C:`},
|
||||
{`C`, `:`, `C\:`},
|
||||
{`\.`, `C:`, `\C:`},
|
||||
{`\`, `C:`, `\C:`},
|
||||
}
|
||||
|
||||
for _, test := range tests {
|
||||
got := filepath.Join(test.lhs, test.rhs)
|
||||
if got != test.want {
|
||||
t.Errorf(`Join(%q, %q): got %q, want %q`, test.lhs, test.rhs, got, test.want)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestAbsWindows(t *testing.T) {
|
||||
for _, test := range []struct {
|
||||
path string
|
||||
want string
|
||||
}{
|
||||
{`C:\foo`, `C:\foo`},
|
||||
{`\\host\share\foo`, `\\host\share\foo`},
|
||||
{`\\host`, `\\host`},
|
||||
{`\\.\NUL`, `\\.\NUL`},
|
||||
{`NUL`, `\\.\NUL`},
|
||||
{`COM1`, `\\.\COM1`},
|
||||
{`a/NUL`, `\\.\NUL`},
|
||||
} {
|
||||
got, err := filepath.Abs(test.path)
|
||||
if err != nil || got != test.want {
|
||||
t.Errorf("Abs(%q) = %q, %v; want %q, nil", test.path, got, err, test.want)
|
||||
}
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user