View Javadoc
1   /*
2    * Copyright (C) 2012-2013, Robin Rosenberg <robin.rosenberg@dewire.com>
3    * and other copyright owners as documented in the project's IP log.
4    *
5    * This program and the accompanying materials are made available
6    * under the terms of the Eclipse Distribution License v1.0 which
7    * accompanies this distribution, is reproduced below, and is
8    * available at http://www.eclipse.org/org/documents/edl-v10.php
9    *
10   * All rights reserved.
11   *
12   * Redistribution and use in source and binary forms, with or
13   * without modification, are permitted provided that the following
14   * conditions are met:
15   *
16   * - Redistributions of source code must retain the above copyright
17   *   notice, this list of conditions and the following disclaimer.
18   *
19   * - Redistributions in binary form must reproduce the above
20   *   copyright notice, this list of conditions and the following
21   *   disclaimer in the documentation and/or other materials provided
22   *   with the distribution.
23   *
24   * - Neither the name of the Eclipse Foundation, Inc. nor the
25   *   names of its contributors may be used to endorse or promote
26   *   products derived from this software without specific prior
27   *   written permission.
28   *
29   * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
30   * CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
31   * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
32   * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
33   * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
34   * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
35   * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
36   * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
37   * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
38   * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
39   * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
40   * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
41   * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
42   */
43  
44  package org.eclipse.jgit.util;
45  
46  import static org.junit.Assert.assertEquals;
47  import static org.junit.Assert.assertFalse;
48  import static org.junit.Assert.assertTrue;
49  import static org.junit.Assume.assumeTrue;
50  
51  import java.io.File;
52  import java.io.IOException;
53  import java.nio.file.Files;
54  import java.nio.file.attribute.PosixFileAttributeView;
55  import java.nio.file.attribute.PosixFilePermission;
56  import java.util.Set;
57  
58  import org.eclipse.jgit.junit.RepositoryTestCase;
59  import org.junit.After;
60  import org.junit.Before;
61  import org.junit.Test;
62  
63  public class FSJava7Test {
64  	private File trash;
65  
66  	@Before
67  	public void setUp() throws Exception {
68  		trash = File.createTempFile("tmp_", "");
69  		trash.delete();
70  		assertTrue("mkdir " + trash, trash.mkdir());
71  	}
72  
73  	@After
74  	public void tearDown() throws Exception {
75  		FileUtils.delete(trash, FileUtils.RECURSIVE | FileUtils.RETRY);
76  	}
77  
78  	/**
79  	 * The old File methods traverse symbolic links and look at the targets.
80  	 * With symbolic links we usually want to modify/look at the link. For some
81  	 * reason the executable attribute seems to always look at the target, but
82  	 * for the other attributes like lastModified, hidden and exists we must
83  	 * differ between the link and the target.
84  	 *
85  	 * @throws IOException
86  	 * @throws InterruptedException
87  	 */
88  	@Test
89  	public void testSymlinkAttributes() throws IOException, InterruptedException {
90  		FS fs = FS.DETECTED;
91  		File link = new File(trash, "ä");
92  		File target = new File(trash, "å");
93  		fs.createSymLink(link, "å");
94  		assertTrue(fs.exists(link));
95  		String targetName = fs.readSymLink(link);
96  		assertEquals("å", targetName);
97  		assertTrue(fs.lastModified(link) > 0);
98  		assertTrue(fs.exists(link));
99  		assertFalse(fs.canExecute(link));
100 		assertEquals(2, fs.length(link));
101 		assertFalse(fs.exists(target));
102 		assertFalse(fs.isFile(target));
103 		assertFalse(fs.isDirectory(target));
104 		assertFalse(fs.canExecute(target));
105 
106 		RepositoryTestCase.fsTick(link);
107 		// Now create the link target
108 		FileUtils.createNewFile(target);
109 		assertTrue(fs.exists(link));
110 		assertTrue(fs.lastModified(link) > 0);
111 		assertTrue(fs.lastModified(target) > fs.lastModified(link));
112 		assertFalse(fs.canExecute(link));
113 		fs.setExecute(target, true);
114 		assertFalse(fs.canExecute(link));
115 		assumeTrue(fs.supportsExecute());
116 		assertTrue(fs.canExecute(target));
117 	}
118 
119 	@Test
120 	public void testExecutableAttributes() throws Exception {
121 		FS fs = FS.DETECTED.newInstance();
122 		// If this assumption fails the test is halted and ignored.
123 		assumeTrue(fs instanceof FS_POSIX);
124 		((FS_POSIX) fs).setUmask(0022);
125 
126 		File f = new File(trash, "bla");
127 		assertTrue(f.createNewFile());
128 		assertFalse(fs.canExecute(f));
129 
130 		Set<PosixFilePermission> permissions = readPermissions(f);
131 		assertTrue(!permissions.contains(PosixFilePermission.OTHERS_EXECUTE));
132 		assertTrue(!permissions.contains(PosixFilePermission.GROUP_EXECUTE));
133 		assertTrue(!permissions.contains(PosixFilePermission.OWNER_EXECUTE));
134 
135 		fs.setExecute(f, true);
136 
137 		permissions = readPermissions(f);
138 		assertTrue("'owner' execute permission not set",
139 				permissions.contains(PosixFilePermission.OWNER_EXECUTE));
140 		assertTrue("'group' execute permission not set",
141 				permissions.contains(PosixFilePermission.GROUP_EXECUTE));
142 		assertTrue("'others' execute permission not set",
143 				permissions.contains(PosixFilePermission.OTHERS_EXECUTE));
144 
145 		((FS_POSIX) fs).setUmask(0033);
146 		fs.setExecute(f, false);
147 		assertFalse(fs.canExecute(f));
148 		fs.setExecute(f, true);
149 
150 		permissions = readPermissions(f);
151 		assertTrue("'owner' execute permission not set",
152 				permissions.contains(PosixFilePermission.OWNER_EXECUTE));
153 		assertFalse("'group' execute permission set",
154 				permissions.contains(PosixFilePermission.GROUP_EXECUTE));
155 		assertFalse("'others' execute permission set",
156 				permissions.contains(PosixFilePermission.OTHERS_EXECUTE));
157 	}
158 
159 	private Set<PosixFilePermission> readPermissions(File f) throws IOException {
160 		return Files
161 				.getFileAttributeView(f.toPath(), PosixFileAttributeView.class)
162 				.readAttributes().permissions();
163 	}
164 
165 }