View Javadoc
1   /*
2    * Copyright (C) 2012-2013, Robin Rosenberg <robin.rosenberg@dewire.com>
3    * and other copyright owners as documented in the project's IP log.
4    *
5    * This program and the accompanying materials are made available
6    * under the terms of the Eclipse Distribution License v1.0 which
7    * accompanies this distribution, is reproduced below, and is
8    * available at http://www.eclipse.org/org/documents/edl-v10.php
9    *
10   * All rights reserved.
11   *
12   * Redistribution and use in source and binary forms, with or
13   * without modification, are permitted provided that the following
14   * conditions are met:
15   *
16   * - Redistributions of source code must retain the above copyright
17   *   notice, this list of conditions and the following disclaimer.
18   *
19   * - Redistributions in binary form must reproduce the above
20   *   copyright notice, this list of conditions and the following
21   *   disclaimer in the documentation and/or other materials provided
22   *   with the distribution.
23   *
24   * - Neither the name of the Eclipse Foundation, Inc. nor the
25   *   names of its contributors may be used to endorse or promote
26   *   products derived from this software without specific prior
27   *   written permission.
28   *
29   * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
30   * CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
31   * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
32   * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
33   * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
34   * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
35   * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
36   * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
37   * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
38   * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
39   * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
40   * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
41   * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
42   */
43  
44  package org.eclipse.jgit.util;
45  
46  import static org.junit.Assert.assertEquals;
47  import static org.junit.Assert.assertFalse;
48  import static org.junit.Assert.assertTrue;
49  import static org.junit.Assume.assumeTrue;
50  
51  import java.io.File;
52  import java.io.IOException;
53  import java.nio.charset.Charset;
54  import java.nio.file.Files;
55  import java.nio.file.attribute.PosixFileAttributeView;
56  import java.nio.file.attribute.PosixFilePermission;
57  import java.util.Set;
58  
59  import org.eclipse.jgit.errors.CommandFailedException;
60  import org.eclipse.jgit.junit.RepositoryTestCase;
61  import org.junit.After;
62  import org.junit.Assume;
63  import org.junit.Before;
64  import org.junit.Test;
65  
66  public class FSTest {
67  	private File trash;
68  
69  	@Before
70  	public void setUp() throws Exception {
71  		trash = File.createTempFile("tmp_", "");
72  		trash.delete();
73  		assertTrue("mkdir " + trash, trash.mkdir());
74  	}
75  
76  	@After
77  	public void tearDown() throws Exception {
78  		FileUtils.delete(trash, FileUtils.RECURSIVE | FileUtils.RETRY);
79  	}
80  
81  	/**
82  	 * The old File methods traverse symbolic links and look at the targets.
83  	 * With symbolic links we usually want to modify/look at the link. For some
84  	 * reason the executable attribute seems to always look at the target, but
85  	 * for the other attributes like lastModified, hidden and exists we must
86  	 * differ between the link and the target.
87  	 *
88  	 * @throws IOException
89  	 * @throws InterruptedException
90  	 */
91  	@Test
92  	public void testSymlinkAttributes() throws IOException, InterruptedException {
93  		Assume.assumeTrue(FS.DETECTED.supportsSymlinks());
94  		FS fs = FS.DETECTED;
95  		File link = new File(trash, "ä");
96  		File target = new File(trash, "å");
97  		fs.createSymLink(link, "å");
98  		assertTrue(fs.exists(link));
99  		String targetName = fs.readSymLink(link);
100 		assertEquals("å", targetName);
101 		assertTrue(fs.lastModified(link) > 0);
102 		assertTrue(fs.exists(link));
103 		assertFalse(fs.canExecute(link));
104 		assertEquals(2, fs.length(link));
105 		assertFalse(fs.exists(target));
106 		assertFalse(fs.isFile(target));
107 		assertFalse(fs.isDirectory(target));
108 		assertFalse(fs.canExecute(target));
109 
110 		RepositoryTestCase.fsTick(link);
111 		// Now create the link target
112 		FileUtils.createNewFile(target);
113 		assertTrue(fs.exists(link));
114 		assertTrue(fs.lastModified(link) > 0);
115 		assertTrue(fs.lastModified(target) > fs.lastModified(link));
116 		assertFalse(fs.canExecute(link));
117 		fs.setExecute(target, true);
118 		assertFalse(fs.canExecute(link));
119 		assumeTrue(fs.supportsExecute());
120 		assertTrue(fs.canExecute(target));
121 	}
122 
123 	@Test
124 	public void testExecutableAttributes() throws Exception {
125 		FS fs = FS.DETECTED.newInstance();
126 		// If this assumption fails the test is halted and ignored.
127 		assumeTrue(fs instanceof FS_POSIX);
128 		((FS_POSIX) fs).setUmask(0022);
129 
130 		File f = new File(trash, "bla");
131 		assertTrue(f.createNewFile());
132 		assertFalse(fs.canExecute(f));
133 
134 		Set<PosixFilePermission> permissions = readPermissions(f);
135 		assertTrue(!permissions.contains(PosixFilePermission.OTHERS_EXECUTE));
136 		assertTrue(!permissions.contains(PosixFilePermission.GROUP_EXECUTE));
137 		assertTrue(!permissions.contains(PosixFilePermission.OWNER_EXECUTE));
138 
139 		fs.setExecute(f, true);
140 
141 		permissions = readPermissions(f);
142 		assertTrue("'owner' execute permission not set",
143 				permissions.contains(PosixFilePermission.OWNER_EXECUTE));
144 		assertTrue("'group' execute permission not set",
145 				permissions.contains(PosixFilePermission.GROUP_EXECUTE));
146 		assertTrue("'others' execute permission not set",
147 				permissions.contains(PosixFilePermission.OTHERS_EXECUTE));
148 
149 		((FS_POSIX) fs).setUmask(0033);
150 		fs.setExecute(f, false);
151 		assertFalse(fs.canExecute(f));
152 		fs.setExecute(f, true);
153 
154 		permissions = readPermissions(f);
155 		assertTrue("'owner' execute permission not set",
156 				permissions.contains(PosixFilePermission.OWNER_EXECUTE));
157 		assertFalse("'group' execute permission set",
158 				permissions.contains(PosixFilePermission.GROUP_EXECUTE));
159 		assertFalse("'others' execute permission set",
160 				permissions.contains(PosixFilePermission.OTHERS_EXECUTE));
161 	}
162 
163 	private Set<PosixFilePermission> readPermissions(File f) throws IOException {
164 		return Files
165 				.getFileAttributeView(f.toPath(), PosixFileAttributeView.class)
166 				.readAttributes().permissions();
167 	}
168 
169 	@Test(expected = CommandFailedException.class)
170 	public void testReadPipePosixCommandFailure()
171 			throws CommandFailedException {
172 		FS fs = FS.DETECTED.newInstance();
173 		assumeTrue(fs instanceof FS_POSIX);
174 
175 		String r = FS.readPipe(fs.userHome(),
176 				new String[] { "bash", "--login", "-c", "foobar" },
177 				Charset.defaultCharset().name());
178 		System.out.println(r);
179 	}
180 }