2016-06-06 23:57:42 +02:00
|
|
|
package test_helpers
|
2015-11-12 21:02:44 +01:00
|
|
|
|
|
|
|
import (
|
2017-05-07 21:01:39 +02:00
|
|
|
"bytes"
|
2015-11-12 21:02:44 +01:00
|
|
|
"crypto/md5"
|
|
|
|
"encoding/hex"
|
2015-11-14 17:16:17 +01:00
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
2017-12-06 23:03:37 +01:00
|
|
|
"log"
|
2015-11-14 17:16:17 +01:00
|
|
|
"os"
|
|
|
|
"os/exec"
|
2016-02-07 13:28:55 +01:00
|
|
|
"path/filepath"
|
2015-12-13 20:10:52 +01:00
|
|
|
"syscall"
|
2015-11-12 21:02:44 +01:00
|
|
|
"testing"
|
2015-11-27 23:34:55 +01:00
|
|
|
|
2021-08-23 15:05:15 +02:00
|
|
|
"github.com/rfjakob/gocryptfs/v2/ctlsock"
|
|
|
|
"github.com/rfjakob/gocryptfs/v2/internal/nametransform"
|
|
|
|
"github.com/rfjakob/gocryptfs/v2/internal/syscallcompat"
|
2015-11-12 21:02:44 +01:00
|
|
|
)
|
|
|
|
|
2018-10-10 22:24:20 +02:00
|
|
|
// TmpDir will be created inside this directory, set in init() to
|
|
|
|
// $TMPDIR/gocryptfs-test-parent .
|
|
|
|
var testParentDir = ""
|
2016-10-02 06:14:18 +02:00
|
|
|
|
|
|
|
// GocryptfsBinary is the assumed path to the gocryptfs build.
|
2016-06-06 23:57:42 +02:00
|
|
|
const GocryptfsBinary = "../../gocryptfs"
|
2015-11-15 13:38:19 +01:00
|
|
|
|
2017-05-07 12:22:15 +02:00
|
|
|
// UnmountScript is the fusermount/umount compatibility wrapper script
|
2020-05-10 00:04:14 +02:00
|
|
|
const UnmountScript = "../../tests/fuse-unmount.bash"
|
2017-02-15 23:13:33 +01:00
|
|
|
|
2017-05-07 21:01:39 +02:00
|
|
|
// X255 contains 255 uppercase "X". This can be used as a maximum-length filename.
|
|
|
|
var X255 string
|
|
|
|
|
2016-10-02 06:14:18 +02:00
|
|
|
// TmpDir is a unique temporary directory. "go test" runs package tests in parallel. We create a
|
|
|
|
// unique TmpDir in init() so the tests do not interfere.
|
2016-06-30 00:57:14 +02:00
|
|
|
var TmpDir string
|
2016-09-24 22:45:25 +02:00
|
|
|
|
2016-10-02 06:14:18 +02:00
|
|
|
// DefaultPlainDir is TmpDir + "/default-plain"
|
2016-06-30 00:57:14 +02:00
|
|
|
var DefaultPlainDir string
|
2016-09-24 22:45:25 +02:00
|
|
|
|
2016-10-02 06:14:18 +02:00
|
|
|
// DefaultCipherDir is TmpDir + "/default-cipher"
|
2016-06-30 00:57:14 +02:00
|
|
|
var DefaultCipherDir string
|
|
|
|
|
|
|
|
func init() {
|
2018-03-24 21:37:41 +01:00
|
|
|
doInit()
|
|
|
|
}
|
|
|
|
|
|
|
|
func doInit() {
|
2017-05-07 21:01:39 +02:00
|
|
|
X255 = string(bytes.Repeat([]byte("X"), 255))
|
2019-01-01 22:01:49 +01:00
|
|
|
MountInfo = make(map[string]mountInfo)
|
2019-05-01 13:06:52 +02:00
|
|
|
// Something like /tmp/gocryptfs-test-parent-1234
|
2021-08-19 08:30:19 +02:00
|
|
|
testParentDir = fmt.Sprintf("%s/gocryptfs-test-parent-%d", os.TempDir(), os.Getuid())
|
2019-05-01 18:29:06 +02:00
|
|
|
os.MkdirAll(testParentDir, 0755)
|
2020-09-09 11:47:02 +02:00
|
|
|
if !isExt4(testParentDir) {
|
|
|
|
fmt.Printf("test_helpers: warning: testParentDir %q does not reside on ext4, we will miss failures caused by ino reuse\n", testParentDir)
|
|
|
|
}
|
2016-06-30 00:57:14 +02:00
|
|
|
var err error
|
|
|
|
TmpDir, err = ioutil.TempDir(testParentDir, "")
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
2019-05-01 18:29:06 +02:00
|
|
|
// Open permissions for the allow_other tests
|
|
|
|
os.Chmod(TmpDir, 0755)
|
2016-06-30 00:57:14 +02:00
|
|
|
DefaultPlainDir = TmpDir + "/default-plain"
|
|
|
|
DefaultCipherDir = TmpDir + "/default-cipher"
|
|
|
|
}
|
|
|
|
|
2016-10-02 06:14:18 +02:00
|
|
|
// ResetTmpDir deletes TmpDir, create new dir tree:
|
2016-06-16 21:06:03 +02:00
|
|
|
//
|
|
|
|
// TmpDir
|
|
|
|
// |-- DefaultPlainDir
|
|
|
|
// *-- DefaultCipherDir
|
|
|
|
// *-- gocryptfs.diriv
|
2016-10-08 19:22:59 +02:00
|
|
|
func ResetTmpDir(createDirIV bool) {
|
2016-06-30 00:57:14 +02:00
|
|
|
// Try to unmount and delete everything
|
2016-06-06 23:57:42 +02:00
|
|
|
entries, err := ioutil.ReadDir(TmpDir)
|
2016-04-10 19:43:37 +02:00
|
|
|
if err == nil {
|
|
|
|
for _, e := range entries {
|
2016-06-30 00:57:14 +02:00
|
|
|
d := filepath.Join(TmpDir, e.Name())
|
|
|
|
err = os.Remove(d)
|
|
|
|
if err != nil {
|
2016-09-25 14:57:04 +02:00
|
|
|
pe := err.(*os.PathError)
|
|
|
|
if pe.Err == syscall.EBUSY {
|
|
|
|
if testing.Verbose() {
|
|
|
|
fmt.Printf("Remove failed: %v. Maybe still mounted?\n", pe)
|
|
|
|
}
|
|
|
|
err = UnmountErr(d)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
} else if pe.Err != syscall.ENOTEMPTY {
|
|
|
|
panic("Unhandled error: " + pe.Err.Error())
|
2016-07-11 20:40:53 +02:00
|
|
|
}
|
2016-07-11 20:31:36 +02:00
|
|
|
err = os.RemoveAll(d)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
2016-06-30 00:57:14 +02:00
|
|
|
}
|
2016-04-10 19:43:37 +02:00
|
|
|
}
|
|
|
|
}
|
2019-05-01 18:29:06 +02:00
|
|
|
err = os.Mkdir(DefaultPlainDir, 0755)
|
2015-11-15 15:05:15 +01:00
|
|
|
if err != nil {
|
2016-06-30 00:57:14 +02:00
|
|
|
panic(err)
|
2015-11-15 15:05:15 +01:00
|
|
|
}
|
2019-05-01 18:29:06 +02:00
|
|
|
err = os.Mkdir(DefaultCipherDir, 0755)
|
2015-11-12 21:02:44 +01:00
|
|
|
if err != nil {
|
2016-06-30 00:57:14 +02:00
|
|
|
panic(err)
|
2015-11-12 21:02:44 +01:00
|
|
|
}
|
2016-10-08 19:22:59 +02:00
|
|
|
if createDirIV {
|
2019-01-03 13:32:13 +01:00
|
|
|
// Open cipherdir (following symlinks)
|
2019-01-03 18:11:07 +01:00
|
|
|
dirfd, err := syscall.Open(DefaultCipherDir, syscall.O_DIRECTORY|syscallcompat.O_PATH, 0)
|
2019-01-03 13:32:13 +01:00
|
|
|
if err == nil {
|
2021-08-20 10:57:26 +02:00
|
|
|
err = nametransform.WriteDirIVAt(dirfd)
|
2019-01-03 13:32:13 +01:00
|
|
|
syscall.Close(dirfd)
|
|
|
|
}
|
2016-02-07 13:28:55 +01:00
|
|
|
if err != nil {
|
2016-06-30 00:57:14 +02:00
|
|
|
panic(err)
|
2016-02-07 13:28:55 +01:00
|
|
|
}
|
2015-11-27 21:50:11 +01:00
|
|
|
}
|
2015-11-12 21:02:44 +01:00
|
|
|
}
|
|
|
|
|
2020-09-09 11:47:02 +02:00
|
|
|
// isExt4 finds out if `path` resides on an ext4 filesystem, as reported by
|
|
|
|
// statfs.
|
|
|
|
func isExt4(path string) bool {
|
|
|
|
// From man statfs
|
|
|
|
const EXT4_SUPER_MAGIC = 0xef53
|
|
|
|
|
|
|
|
var fs syscall.Statfs_t
|
|
|
|
err := syscall.Statfs(path, &fs)
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if fs.Type == EXT4_SUPER_MAGIC {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-05-01 12:47:54 +02:00
|
|
|
// InitFS creates a new empty cipherdir and calls
|
2016-06-27 21:39:02 +02:00
|
|
|
//
|
2019-05-01 12:47:54 +02:00
|
|
|
// gocryptfs -q -init -extpass "echo test" -scryptn=10 $extraArgs $cipherdir
|
|
|
|
//
|
|
|
|
// It returns cipherdir without a trailing slash.
|
2021-06-21 11:53:33 +02:00
|
|
|
//
|
|
|
|
// If t is set, t.Fatal() is called on error, log.Panic() otherwise.
|
2016-06-16 21:06:03 +02:00
|
|
|
func InitFS(t *testing.T, extraArgs ...string) string {
|
2020-05-09 15:42:57 +02:00
|
|
|
prefix := "x."
|
|
|
|
if t != nil {
|
|
|
|
prefix = t.Name() + "."
|
|
|
|
}
|
|
|
|
dir, err := ioutil.TempDir(TmpDir, prefix)
|
2016-06-16 21:06:03 +02:00
|
|
|
if err != nil {
|
2017-12-06 23:03:37 +01:00
|
|
|
if t != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
} else {
|
|
|
|
log.Panic(err)
|
|
|
|
}
|
2016-06-16 21:06:03 +02:00
|
|
|
}
|
|
|
|
args := []string{"-q", "-init", "-extpass", "echo test", "-scryptn=10"}
|
|
|
|
args = append(args, extraArgs...)
|
|
|
|
args = append(args, dir)
|
|
|
|
|
|
|
|
cmd := exec.Command(GocryptfsBinary, args...)
|
|
|
|
cmd.Stdout = os.Stdout
|
|
|
|
cmd.Stderr = os.Stderr
|
|
|
|
|
|
|
|
err = cmd.Run()
|
|
|
|
if err != nil {
|
2017-12-06 23:03:37 +01:00
|
|
|
if t != nil {
|
2019-05-01 12:47:54 +02:00
|
|
|
t.Fatalf("InitFS with args %q failed: %v", args, err)
|
2017-12-06 23:03:37 +01:00
|
|
|
} else {
|
|
|
|
log.Panic(err)
|
|
|
|
}
|
2016-06-16 21:06:03 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return dir
|
|
|
|
}
|
|
|
|
|
2016-10-02 06:14:18 +02:00
|
|
|
// Md5fn returns an md5 string for file "filename"
|
2016-06-06 23:57:42 +02:00
|
|
|
func Md5fn(filename string) string {
|
2015-11-12 21:02:44 +01:00
|
|
|
buf, err := ioutil.ReadFile(filename)
|
|
|
|
if err != nil {
|
|
|
|
fmt.Printf("ReadFile: %v\n", err)
|
|
|
|
return ""
|
|
|
|
}
|
2016-06-06 23:57:42 +02:00
|
|
|
return Md5hex(buf)
|
2015-11-12 21:02:44 +01:00
|
|
|
}
|
|
|
|
|
2016-10-02 06:14:18 +02:00
|
|
|
// Md5hex returns an md5 string for "buf"
|
2016-06-06 23:57:42 +02:00
|
|
|
func Md5hex(buf []byte) string {
|
2015-11-12 21:02:44 +01:00
|
|
|
rawHash := md5.Sum(buf)
|
|
|
|
hash := hex.EncodeToString(rawHash[:])
|
|
|
|
return hash
|
|
|
|
}
|
|
|
|
|
2016-10-02 06:14:18 +02:00
|
|
|
// VerifySize checks that the file size equals "want". This checks:
|
2019-11-16 21:24:04 +01:00
|
|
|
// 1) Number of bytes returned when reading the whole file
|
|
|
|
// 2) Size reported by Stat()
|
|
|
|
// 3) Size reported by Fstat()
|
2016-06-06 23:57:42 +02:00
|
|
|
func VerifySize(t *testing.T, path string, want int) {
|
2019-11-16 21:24:04 +01:00
|
|
|
// Read whole file
|
2015-11-12 21:02:44 +01:00
|
|
|
buf, err := ioutil.ReadFile(path)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("ReadFile failed: %v", err)
|
|
|
|
} else if len(buf) != want {
|
|
|
|
t.Errorf("wrong read size: got=%d want=%d", len(buf), want)
|
|
|
|
}
|
2019-11-16 21:24:04 +01:00
|
|
|
// Stat()
|
|
|
|
var st syscall.Stat_t
|
|
|
|
err = syscall.Stat(path, &st)
|
2015-11-12 21:02:44 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Stat failed: %v", err)
|
2019-11-16 21:24:04 +01:00
|
|
|
} else if st.Size != int64(want) {
|
|
|
|
t.Errorf("wrong stat file size, got=%d want=%d", st.Size, want)
|
|
|
|
}
|
|
|
|
// Fstat()
|
|
|
|
fd, err := os.Open(path)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer fd.Close()
|
|
|
|
var st2 syscall.Stat_t
|
|
|
|
err = syscall.Fstat(int(fd.Fd()), &st2)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if st2.Size != int64(want) {
|
|
|
|
t.Errorf("wrong fstat file size, got=%d want=%d", st2.Size, want)
|
|
|
|
}
|
2021-03-21 10:53:51 +01:00
|
|
|
// The inode number is not stable with `-sharedstorage`, ignore it in the
|
|
|
|
// comparison.
|
|
|
|
st.Ino = 0
|
|
|
|
st2.Ino = 0
|
2019-11-16 21:24:04 +01:00
|
|
|
if st != st2 {
|
2021-03-21 10:53:51 +01:00
|
|
|
t.Logf("Stat vs Fstat mismatch:\nst= %#v\nst2=%#v", st, st2)
|
2015-11-12 21:02:44 +01:00
|
|
|
}
|
|
|
|
}
|
2015-12-10 20:02:18 +01:00
|
|
|
|
2016-10-02 06:14:18 +02:00
|
|
|
// TestMkdirRmdir creates and deletes a directory
|
2016-06-06 23:57:42 +02:00
|
|
|
func TestMkdirRmdir(t *testing.T, plainDir string) {
|
2016-06-30 00:57:14 +02:00
|
|
|
dir := plainDir + "/dir1"
|
2015-12-10 20:02:18 +01:00
|
|
|
err := os.Mkdir(dir, 0777)
|
|
|
|
if err != nil {
|
2016-11-26 15:17:15 +01:00
|
|
|
t.Error(err)
|
|
|
|
return
|
2015-12-10 20:02:18 +01:00
|
|
|
}
|
|
|
|
err = syscall.Rmdir(dir)
|
|
|
|
if err != nil {
|
2016-11-26 15:17:15 +01:00
|
|
|
t.Error(err)
|
|
|
|
return
|
2015-12-10 20:02:18 +01:00
|
|
|
}
|
2018-04-27 20:19:51 +02:00
|
|
|
// Create a directory and put a file in it
|
|
|
|
// Trying to rmdir it should fail with ENOTEMPTY
|
|
|
|
err = os.Mkdir(dir, 0777)
|
|
|
|
if err != nil {
|
2016-11-26 15:17:15 +01:00
|
|
|
t.Error(err)
|
|
|
|
return
|
2015-12-11 19:54:53 +01:00
|
|
|
}
|
|
|
|
f, err := os.Create(dir + "/file")
|
|
|
|
if err != nil {
|
2016-11-26 15:17:15 +01:00
|
|
|
t.Error(err)
|
|
|
|
return
|
2015-12-11 19:54:53 +01:00
|
|
|
}
|
|
|
|
f.Close()
|
|
|
|
err = syscall.Rmdir(dir)
|
|
|
|
errno := err.(syscall.Errno)
|
|
|
|
if errno != syscall.ENOTEMPTY {
|
2018-04-27 20:19:51 +02:00
|
|
|
t.Errorf("Should have gotten ENOTEMPTY, got %v", errno)
|
2015-12-11 19:54:53 +01:00
|
|
|
}
|
2018-04-27 20:19:51 +02:00
|
|
|
err = syscall.Unlink(dir + "/file")
|
|
|
|
if err != nil {
|
2019-01-20 14:32:59 +01:00
|
|
|
var st syscall.Stat_t
|
|
|
|
syscall.Stat(dir, &st)
|
|
|
|
t.Errorf("err=%v mode=%0o", err, st.Mode)
|
2016-11-26 15:17:15 +01:00
|
|
|
return
|
2015-12-11 19:54:53 +01:00
|
|
|
}
|
2018-04-27 20:19:51 +02:00
|
|
|
err = syscall.Rmdir(dir)
|
|
|
|
if err != nil {
|
2016-11-26 15:17:15 +01:00
|
|
|
t.Error(err)
|
|
|
|
return
|
2015-12-11 19:54:53 +01:00
|
|
|
}
|
|
|
|
// We should also be able to remove a directory we do not have permissions to
|
|
|
|
// read or write
|
|
|
|
err = os.Mkdir(dir, 0000)
|
|
|
|
if err != nil {
|
2016-11-26 15:17:15 +01:00
|
|
|
t.Error(err)
|
|
|
|
return
|
2015-12-11 19:54:53 +01:00
|
|
|
}
|
|
|
|
err = syscall.Rmdir(dir)
|
|
|
|
if err != nil {
|
2016-04-10 19:43:37 +02:00
|
|
|
// Make sure the directory can cleaned up by the next test run
|
|
|
|
os.Chmod(dir, 0700)
|
2016-11-26 15:17:15 +01:00
|
|
|
t.Error(err)
|
|
|
|
return
|
2015-12-11 19:54:53 +01:00
|
|
|
}
|
2015-12-10 20:02:18 +01:00
|
|
|
}
|
|
|
|
|
2016-10-02 06:14:18 +02:00
|
|
|
// TestRename creates and renames a file
|
2016-06-06 23:57:42 +02:00
|
|
|
func TestRename(t *testing.T, plainDir string) {
|
2016-06-30 00:57:14 +02:00
|
|
|
file1 := plainDir + "/rename1"
|
|
|
|
file2 := plainDir + "/rename2"
|
2015-12-10 20:02:18 +01:00
|
|
|
err := ioutil.WriteFile(file1, []byte("content"), 0777)
|
|
|
|
if err != nil {
|
2016-11-26 15:17:15 +01:00
|
|
|
t.Error(err)
|
|
|
|
return
|
2015-12-10 20:02:18 +01:00
|
|
|
}
|
|
|
|
err = syscall.Rename(file1, file2)
|
|
|
|
if err != nil {
|
2020-07-12 13:35:37 +02:00
|
|
|
t.Errorf("Rename: %v", err)
|
2016-11-26 15:17:15 +01:00
|
|
|
return
|
2015-12-10 20:02:18 +01:00
|
|
|
}
|
|
|
|
syscall.Unlink(file2)
|
|
|
|
}
|
2016-02-07 10:55:13 +01:00
|
|
|
|
2016-10-02 06:14:18 +02:00
|
|
|
// VerifyExistence checks in 3 ways that "path" exists:
|
2018-08-11 22:37:22 +02:00
|
|
|
// stat, open, readdir. Returns true if the path exists, false otherwise.
|
|
|
|
// Panics if the result is inconsistent.
|
2020-08-15 15:39:08 +02:00
|
|
|
func VerifyExistence(t *testing.T, path string) bool {
|
|
|
|
t.Helper()
|
2019-01-04 17:32:27 +01:00
|
|
|
// Check if file can be stat()ed
|
2018-08-11 22:37:22 +02:00
|
|
|
stat := true
|
2019-01-04 17:32:27 +01:00
|
|
|
fi, err := os.Stat(path)
|
2016-02-07 10:55:13 +01:00
|
|
|
if err != nil {
|
2018-08-11 22:37:22 +02:00
|
|
|
stat = false
|
2016-02-07 10:55:13 +01:00
|
|
|
}
|
2019-01-04 17:32:27 +01:00
|
|
|
// Check if file can be opened
|
2018-08-11 22:37:22 +02:00
|
|
|
open := true
|
2016-02-07 10:55:13 +01:00
|
|
|
fd, err := os.Open(path)
|
|
|
|
if err != nil {
|
2018-08-11 22:37:22 +02:00
|
|
|
open = false
|
2016-02-07 10:55:13 +01:00
|
|
|
}
|
|
|
|
fd.Close()
|
2019-01-04 17:32:27 +01:00
|
|
|
// Check if file shows up in directory listing
|
2018-08-11 22:37:22 +02:00
|
|
|
readdir := false
|
2016-02-07 10:55:13 +01:00
|
|
|
dir := filepath.Dir(path)
|
|
|
|
name := filepath.Base(path)
|
2019-01-04 17:32:27 +01:00
|
|
|
d, err := os.Open(dir)
|
golangci-lint: fix issues found by gosimple
Everything except the
if err2.Err == syscall.EOPNOTSUPP
case. Gets too confusing when collapsed into a single line.
Issues were:
$ golangci-lint run --disable-all --enable gosimple
mount.go:473:2: S1008: should use 'return strings.HasPrefix(v, "fusermount version")' instead of 'if strings.HasPrefix(v, "fusermount version") { return true }; return false' (gosimple)
if strings.HasPrefix(v, "fusermount version") {
^
cli_args.go:258:5: S1002: should omit comparison to bool constant, can be simplified to `args.forcedecode` (gosimple)
if args.forcedecode == true {
^
cli_args.go:263:6: S1002: should omit comparison to bool constant, can be simplified to `args.aessiv` (gosimple)
if args.aessiv == true {
^
cli_args.go:267:6: S1002: should omit comparison to bool constant, can be simplified to `args.reverse` (gosimple)
if args.reverse == true {
^
internal/stupidgcm/stupidgcm.go:227:6: S1002: should omit comparison to bool constant, can be simplified to `g.forceDecode` (gosimple)
if g.forceDecode == true {
^
gocryptfs-xray/xray_tests/xray_test.go:23:5: S1004: should use !bytes.Equal(out, expected) instead (gosimple)
if bytes.Compare(out, expected) != 0 {
^
gocryptfs-xray/xray_tests/xray_test.go:40:5: S1004: should use !bytes.Equal(out, expected) instead (gosimple)
if bytes.Compare(out, expected) != 0 {
^
gocryptfs-xray/paths_ctlsock.go:34:20: S1002: should omit comparison to bool constant, can be simplified to `!eof` (gosimple)
for eof := false; eof == false; line++ {
^
tests/reverse/xattr_test.go:19:2: S1008: should use 'return err2.Err != syscall.EOPNOTSUPP' instead of 'if err2.Err == syscall.EOPNOTSUPP { return false }; return true' (gosimple)
if err2.Err == syscall.EOPNOTSUPP {
^
internal/fusefrontend/node.go:459:45: S1002: should omit comparison to bool constant, can be simplified to `!nameFileAlreadyThere` (gosimple)
if nametransform.IsLongContent(cName2) && nameFileAlreadyThere == false {
^
tests/xattr/xattr_integration_test.go:221:2: S1008: should use 'return err2.Err != syscall.EOPNOTSUPP' instead of 'if err2.Err == syscall.EOPNOTSUPP { return false }; return true' (gosimple)
if err2.Err == syscall.EOPNOTSUPP {
^
tests/test_helpers/helpers.go:338:19: S1002: should omit comparison to bool constant, can be simplified to `open` (gosimple)
if err != nil && open == true {
^
tests/matrix/concurrency_test.go:121:7: S1004: should use !bytes.Equal(buf, content) instead (gosimple)
if bytes.Compare(buf, content) != 0 {
^
2021-08-19 07:51:47 +02:00
|
|
|
if err != nil && open {
|
2020-08-15 15:39:08 +02:00
|
|
|
t.Errorf("VerifyExistence: we can open the file but not the parent dir!? err=%v", err)
|
2019-01-04 17:32:27 +01:00
|
|
|
} else if err == nil {
|
|
|
|
defer d.Close()
|
|
|
|
listing, err := d.Readdirnames(0)
|
|
|
|
if stat && fi.IsDir() && err != nil {
|
2020-08-15 15:39:08 +02:00
|
|
|
t.Errorf("VerifyExistence: It's a directory, but readdirnames failed: %v", err)
|
2019-01-04 17:32:27 +01:00
|
|
|
}
|
|
|
|
for _, entry := range listing {
|
|
|
|
if entry == name {
|
2018-08-11 22:37:22 +02:00
|
|
|
readdir = true
|
|
|
|
}
|
2016-02-07 10:55:13 +01:00
|
|
|
}
|
|
|
|
}
|
2018-08-11 22:37:22 +02:00
|
|
|
// If the result is consistent, return it.
|
|
|
|
if stat == open && open == readdir {
|
|
|
|
return stat
|
|
|
|
}
|
2020-08-15 15:39:08 +02:00
|
|
|
t.Errorf("VerifyExistence: inconsistent result on %q: stat=%v open=%v readdir=%v, path=%q", name, stat, open, readdir, path)
|
2016-02-07 10:55:13 +01:00
|
|
|
return false
|
|
|
|
}
|
2016-07-02 19:43:57 +02:00
|
|
|
|
|
|
|
// Du returns the disk usage of the file "fd" points to, in bytes.
|
|
|
|
// Same as "du --block-size=1".
|
2016-10-04 21:48:53 +02:00
|
|
|
func Du(t *testing.T, fd int) (nBytes int64) {
|
2016-07-02 19:43:57 +02:00
|
|
|
var st syscall.Stat_t
|
|
|
|
err := syscall.Fstat(fd, &st)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-10-04 21:48:53 +02:00
|
|
|
// st.Blocks = number of 512-byte blocks
|
|
|
|
return st.Blocks * 512
|
2016-07-02 19:43:57 +02:00
|
|
|
}
|
2016-11-10 23:32:51 +01:00
|
|
|
|
|
|
|
// QueryCtlSock sends a request to the control socket at "socketPath" and
|
|
|
|
// returns the response.
|
2020-05-09 19:09:33 +02:00
|
|
|
func QueryCtlSock(t *testing.T, socketPath string, req ctlsock.RequestStruct) ctlsock.ResponseStruct {
|
|
|
|
c, err := ctlsock.New(socketPath)
|
2016-11-10 23:32:51 +01:00
|
|
|
if err != nil {
|
2020-05-09 19:09:33 +02:00
|
|
|
// Connecting to the socket failed already. This is fatal.
|
2016-11-10 23:32:51 +01:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-05-09 19:09:33 +02:00
|
|
|
defer c.Close()
|
|
|
|
resp, err := c.Query(&req)
|
2016-11-10 23:32:51 +01:00
|
|
|
if err != nil {
|
2020-05-09 19:09:33 +02:00
|
|
|
// If we got a response, try to extract it. This is not fatal here
|
|
|
|
// as the tests may expect error responses.
|
|
|
|
if resp2, ok := err.(*ctlsock.ResponseStruct); ok {
|
|
|
|
return *resp2
|
|
|
|
}
|
|
|
|
// Another error means that we did not even get a response. This is fatal.
|
2016-11-10 23:32:51 +01:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-05-09 19:09:33 +02:00
|
|
|
return *resp
|
2016-11-10 23:32:51 +01:00
|
|
|
}
|
2018-04-01 21:23:32 +02:00
|
|
|
|
2018-04-08 20:24:29 +02:00
|
|
|
// ExtractCmdExitCode extracts the exit code from an error value that was
|
|
|
|
// returned from exec / cmd.Run()
|
2018-04-01 21:23:32 +02:00
|
|
|
func ExtractCmdExitCode(err error) int {
|
|
|
|
if err == nil {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
// OMG this is convoluted
|
2018-06-07 22:50:30 +02:00
|
|
|
if err2, ok := err.(*exec.ExitError); ok {
|
|
|
|
return err2.Sys().(syscall.WaitStatus).ExitStatus()
|
|
|
|
}
|
|
|
|
if err2, ok := err.(*os.PathError); ok {
|
|
|
|
return int(err2.Err.(syscall.Errno))
|
|
|
|
}
|
|
|
|
log.Panicf("could not decode error %#v", err)
|
|
|
|
return 0
|
2018-04-01 21:23:32 +02:00
|
|
|
}
|