use more_asserts::assert_gt; use std::{env, process}; use wasi_tests::{create_file, open_scratch_directory}; unsafe fn test_interesting_paths(dir_fd: wasi::Fd, arg: &str) { // Create a directory in the scratch directory. wasi::path_create_directory(dir_fd, "dir").expect("creating dir"); // Create a directory in the directory we just created. wasi::path_create_directory(dir_fd, "dir/nested").expect("creating a nested dir"); // Create a file in the nested directory. create_file(dir_fd, "dir/nested/file"); // Now open it with an absolute path. assert_eq!( wasi::path_open(dir_fd, 0, "/dir/nested/file", 0, 0, 0, 0) .expect_err("opening a file with an absolute path") .raw_error(), wasi::ERRNO_PERM, "errno should be ERRNO_PERM" ); // Now open it with a path containing "..". let mut file_fd = wasi::path_open( dir_fd, 0, "dir/.//nested/../../dir/nested/../nested///./file", 0, 0, 0, 0, ) .expect("opening a file with \"..\" in the path"); assert_gt!( file_fd, libc::STDERR_FILENO as wasi::Fd, "file descriptor range check", ); wasi::fd_close(file_fd).expect("closing a file"); // Now open it with a trailing NUL. assert_eq!( wasi::path_open(dir_fd, 0, "dir/nested/file\0", 0, 0, 0, 0) .expect_err("opening a file with a trailing NUL") .raw_error(), wasi::ERRNO_ILSEQ, "errno should be ERRNO_ILSEQ", ); // Now open it with a trailing slash. let one_trailing_slash_errno = wasi::path_open(dir_fd, 0, "dir/nested/file/", 0, 0, 0, 0) .expect_err("opening a file with a trailing slash should fail") .raw_error(); assert!( one_trailing_slash_errno == wasi::ERRNO_NOTDIR || one_trailing_slash_errno == wasi::ERRNO_NOENT, "errno should be ERRNO_NOTDIR or ERRNO_NOENT, got {}", one_trailing_slash_errno ); // Now open it with trailing slashes. let multi_trailing_slash_errno = wasi::path_open(dir_fd, 0, "dir/nested/file///", 0, 0, 0, 0) .expect_err("opening a file with trailing slashes should fail") .raw_error(); assert!( multi_trailing_slash_errno == wasi::ERRNO_NOTDIR || multi_trailing_slash_errno == wasi::ERRNO_NOENT, "errno should be ERRNO_NOTDIR or ERRNO_NOENT, got {}", multi_trailing_slash_errno, ); // Now open the directory with a trailing slash. file_fd = wasi::path_open(dir_fd, 0, "dir/nested/", 0, 0, 0, 0) .expect("opening a directory with a trailing slash"); assert_gt!( file_fd, libc::STDERR_FILENO as wasi::Fd, "file descriptor range check", ); wasi::fd_close(file_fd).expect("closing a file"); // Now open the directory with trailing slashes. file_fd = wasi::path_open(dir_fd, 0, "dir/nested///", 0, 0, 0, 0) .expect("opening a directory with trailing slashes"); assert_gt!( file_fd, libc::STDERR_FILENO as wasi::Fd, "file descriptor range check", ); wasi::fd_close(file_fd).expect("closing a file"); // Now open it with a path containing too many ".."s. let bad_path = format!("dir/nested/../../../{}/dir/nested/file", arg); assert_eq!( wasi::path_open(dir_fd, 0, &bad_path, 0, 0, 0, 0) .expect_err("opening a file with too many \"..\"s in the path should fail") .raw_error(), wasi::ERRNO_PERM, "errno should be ERRNO_PERM", ); wasi::path_unlink_file(dir_fd, "dir/nested/file") .expect("unlink_file on a symlink should succeed"); wasi::path_remove_directory(dir_fd, "dir/nested") .expect("remove_directory on a directory should succeed"); wasi::path_remove_directory(dir_fd, "dir") .expect("remove_directory on a directory should succeed"); } fn main() { let mut args = env::args(); let prog = args.next().unwrap(); let arg = if let Some(arg) = args.next() { arg } else { eprintln!("usage: {} ", prog); process::exit(1); }; // Open scratch directory let dir_fd = match open_scratch_directory(&arg) { Ok(dir_fd) => dir_fd, Err(err) => { eprintln!("{}", err); process::exit(1) } }; // Run the tests. unsafe { test_interesting_paths(dir_fd, &arg) } }