132 lines
4.4 KiB
Rust
132 lines
4.4 KiB
Rust
use more_asserts::assert_gt;
|
|
use std::{env, process};
|
|
use wasi_tests::{create_file, open_scratch_directory};
|
|
|
|
unsafe fn test_interesting_paths(dir_fd: wasi::Fd, arg: &str) {
|
|
// Create a directory in the scratch directory.
|
|
wasi::path_create_directory(dir_fd, "dir").expect("creating dir");
|
|
|
|
// Create a directory in the directory we just created.
|
|
wasi::path_create_directory(dir_fd, "dir/nested").expect("creating a nested dir");
|
|
|
|
// Create a file in the nested directory.
|
|
create_file(dir_fd, "dir/nested/file");
|
|
|
|
// Now open it with an absolute path.
|
|
assert_eq!(
|
|
wasi::path_open(dir_fd, 0, "/dir/nested/file", 0, 0, 0, 0)
|
|
.expect_err("opening a file with an absolute path")
|
|
.raw_error(),
|
|
wasi::ERRNO_PERM,
|
|
"errno should be ERRNO_PERM"
|
|
);
|
|
|
|
// Now open it with a path containing "..".
|
|
let mut file_fd = wasi::path_open(
|
|
dir_fd,
|
|
0,
|
|
"dir/.//nested/../../dir/nested/../nested///./file",
|
|
0,
|
|
0,
|
|
0,
|
|
0,
|
|
)
|
|
.expect("opening a file with \"..\" in the path");
|
|
assert_gt!(
|
|
file_fd,
|
|
libc::STDERR_FILENO as wasi::Fd,
|
|
"file descriptor range check",
|
|
);
|
|
wasi::fd_close(file_fd).expect("closing a file");
|
|
|
|
// Now open it with a trailing NUL.
|
|
assert_eq!(
|
|
wasi::path_open(dir_fd, 0, "dir/nested/file\0", 0, 0, 0, 0)
|
|
.expect_err("opening a file with a trailing NUL")
|
|
.raw_error(),
|
|
wasi::ERRNO_ILSEQ,
|
|
"errno should be ERRNO_ILSEQ",
|
|
);
|
|
|
|
// Now open it with a trailing slash.
|
|
let one_trailing_slash_errno = wasi::path_open(dir_fd, 0, "dir/nested/file/", 0, 0, 0, 0)
|
|
.expect_err("opening a file with a trailing slash should fail")
|
|
.raw_error();
|
|
assert!(
|
|
one_trailing_slash_errno == wasi::ERRNO_NOTDIR
|
|
|| one_trailing_slash_errno == wasi::ERRNO_NOENT,
|
|
"errno should be ERRNO_NOTDIR or ERRNO_NOENT, got {}",
|
|
one_trailing_slash_errno
|
|
);
|
|
|
|
// Now open it with trailing slashes.
|
|
let multi_trailing_slash_errno = wasi::path_open(dir_fd, 0, "dir/nested/file///", 0, 0, 0, 0)
|
|
.expect_err("opening a file with trailing slashes should fail")
|
|
.raw_error();
|
|
assert!(
|
|
multi_trailing_slash_errno == wasi::ERRNO_NOTDIR
|
|
|| multi_trailing_slash_errno == wasi::ERRNO_NOENT,
|
|
"errno should be ERRNO_NOTDIR or ERRNO_NOENT, got {}",
|
|
multi_trailing_slash_errno,
|
|
);
|
|
|
|
// Now open the directory with a trailing slash.
|
|
file_fd = wasi::path_open(dir_fd, 0, "dir/nested/", 0, 0, 0, 0)
|
|
.expect("opening a directory with a trailing slash");
|
|
assert_gt!(
|
|
file_fd,
|
|
libc::STDERR_FILENO as wasi::Fd,
|
|
"file descriptor range check",
|
|
);
|
|
wasi::fd_close(file_fd).expect("closing a file");
|
|
|
|
// Now open the directory with trailing slashes.
|
|
file_fd = wasi::path_open(dir_fd, 0, "dir/nested///", 0, 0, 0, 0)
|
|
.expect("opening a directory with trailing slashes");
|
|
assert_gt!(
|
|
file_fd,
|
|
libc::STDERR_FILENO as wasi::Fd,
|
|
"file descriptor range check",
|
|
);
|
|
wasi::fd_close(file_fd).expect("closing a file");
|
|
|
|
// Now open it with a path containing too many ".."s.
|
|
let bad_path = format!("dir/nested/../../../{}/dir/nested/file", arg);
|
|
assert_eq!(
|
|
wasi::path_open(dir_fd, 0, &bad_path, 0, 0, 0, 0)
|
|
.expect_err("opening a file with too many \"..\"s in the path should fail")
|
|
.raw_error(),
|
|
wasi::ERRNO_PERM,
|
|
"errno should be ERRNO_PERM",
|
|
);
|
|
wasi::path_unlink_file(dir_fd, "dir/nested/file")
|
|
.expect("unlink_file on a symlink should succeed");
|
|
wasi::path_remove_directory(dir_fd, "dir/nested")
|
|
.expect("remove_directory on a directory should succeed");
|
|
wasi::path_remove_directory(dir_fd, "dir")
|
|
.expect("remove_directory on a directory should succeed");
|
|
}
|
|
|
|
fn main() {
|
|
let mut args = env::args();
|
|
let prog = args.next().unwrap();
|
|
let arg = if let Some(arg) = args.next() {
|
|
arg
|
|
} else {
|
|
eprintln!("usage: {} <scratch directory>", prog);
|
|
process::exit(1);
|
|
};
|
|
|
|
// Open scratch directory
|
|
let dir_fd = match open_scratch_directory(&arg) {
|
|
Ok(dir_fd) => dir_fd,
|
|
Err(err) => {
|
|
eprintln!("{}", err);
|
|
process::exit(1)
|
|
}
|
|
};
|
|
|
|
// Run the tests.
|
|
unsafe { test_interesting_paths(dir_fd, &arg) }
|
|
}
|