1 // Copyright 2009 The Go Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style
3 // license that can be found in the LICENSE file.
5 // +build aix darwin dragonfly freebsd hurd linux netbsd openbsd solaris
22 isReadonlyError = func(err error) bool { return err == syscall.EROFS }
25 // For TestRawConnReadWrite.
26 type syscallDescriptor = int
28 func checkUidGid(t *testing.T, path string, uid, gid int) {
29 dir, err := Lstat(path)
31 t.Fatalf("Lstat %q (looking for uid/gid %d/%d): %s", path, uid, gid, err)
33 sys := dir.Sys().(*syscall.Stat_t)
34 if int(sys.Uid) != uid {
35 t.Errorf("Lstat %q: uid %d want %d", path, sys.Uid, uid)
37 if int(sys.Gid) != gid {
38 t.Errorf("Lstat %q: gid %d want %d", path, sys.Gid, gid)
42 func TestChown(t *testing.T) {
43 // Use TempDir() to make sure we're on a local file system,
44 // so that the group ids returned by Getgroups will be allowed
45 // on the file. On NFS, the Getgroups groups are
47 f := newFile("TestChown", t)
48 defer Remove(f.Name())
52 t.Fatalf("stat %s: %s", f.Name(), err)
55 // Can't change uid unless root, but can try
56 // changing the group id. First try our current group.
59 if err = Chown(f.Name(), -1, gid); err != nil {
60 t.Fatalf("chown %s -1 %d: %s", f.Name(), gid, err)
62 sys := dir.Sys().(*syscall.Stat_t)
63 checkUidGid(t, f.Name(), int(sys.Uid), gid)
65 // Then try all the auxiliary groups.
66 groups, err := Getgroups()
68 t.Fatalf("getgroups: %s", err)
70 t.Log("groups: ", groups)
71 for _, g := range groups {
72 if err = Chown(f.Name(), -1, g); err != nil {
73 t.Fatalf("chown %s -1 %d: %s", f.Name(), g, err)
75 checkUidGid(t, f.Name(), int(sys.Uid), g)
77 // change back to gid to test fd.Chown
78 if err = f.Chown(-1, gid); err != nil {
79 t.Fatalf("fchown %s -1 %d: %s", f.Name(), gid, err)
81 checkUidGid(t, f.Name(), int(sys.Uid), gid)
85 func TestFileChown(t *testing.T) {
86 // Use TempDir() to make sure we're on a local file system,
87 // so that the group ids returned by Getgroups will be allowed
88 // on the file. On NFS, the Getgroups groups are
90 f := newFile("TestFileChown", t)
91 defer Remove(f.Name())
95 t.Fatalf("stat %s: %s", f.Name(), err)
98 // Can't change uid unless root, but can try
99 // changing the group id. First try our current group.
102 if err = f.Chown(-1, gid); err != nil {
103 t.Fatalf("fchown %s -1 %d: %s", f.Name(), gid, err)
105 sys := dir.Sys().(*syscall.Stat_t)
106 checkUidGid(t, f.Name(), int(sys.Uid), gid)
108 // Then try all the auxiliary groups.
109 groups, err := Getgroups()
111 t.Fatalf("getgroups: %s", err)
113 t.Log("groups: ", groups)
114 for _, g := range groups {
115 if err = f.Chown(-1, g); err != nil {
116 t.Fatalf("fchown %s -1 %d: %s", f.Name(), g, err)
118 checkUidGid(t, f.Name(), int(sys.Uid), g)
120 // change back to gid to test fd.Chown
121 if err = f.Chown(-1, gid); err != nil {
122 t.Fatalf("fchown %s -1 %d: %s", f.Name(), gid, err)
124 checkUidGid(t, f.Name(), int(sys.Uid), gid)
128 func TestLchown(t *testing.T) {
129 // Use TempDir() to make sure we're on a local file system,
130 // so that the group ids returned by Getgroups will be allowed
131 // on the file. On NFS, the Getgroups groups are
132 // basically useless.
133 f := newFile("TestLchown", t)
134 defer Remove(f.Name())
138 t.Fatalf("stat %s: %s", f.Name(), err)
141 linkname := f.Name() + "2"
142 if err := Symlink(f.Name(), linkname); err != nil {
143 if runtime.GOOS == "android" && IsPermission(err) {
144 t.Skip("skipping test on Android; permission error creating symlink")
146 t.Fatalf("link %s -> %s: %v", f.Name(), linkname, err)
148 defer Remove(linkname)
150 // Can't change uid unless root, but can try
151 // changing the group id. First try our current group.
154 if err = Lchown(linkname, -1, gid); err != nil {
155 t.Fatalf("lchown %s -1 %d: %s", linkname, gid, err)
157 sys := dir.Sys().(*syscall.Stat_t)
158 checkUidGid(t, linkname, int(sys.Uid), gid)
160 // Then try all the auxiliary groups.
161 groups, err := Getgroups()
163 t.Fatalf("getgroups: %s", err)
165 t.Log("groups: ", groups)
166 for _, g := range groups {
167 if err = Lchown(linkname, -1, g); err != nil {
168 t.Fatalf("lchown %s -1 %d: %s", linkname, g, err)
170 checkUidGid(t, linkname, int(sys.Uid), g)
172 // Check that link target's gid is unchanged.
173 checkUidGid(t, f.Name(), int(sys.Uid), int(sys.Gid))
177 // Issue 16919: Readdir must return a non-empty slice or an error.
178 func TestReaddirRemoveRace(t *testing.T) {
180 defer func() { *LstatP = oldStat }()
181 *LstatP = func(name string) (FileInfo, error) {
182 if strings.HasSuffix(name, "some-file") {
183 // Act like it's been deleted.
184 return nil, ErrNotExist
188 dir := newDir("TestReaddirRemoveRace", t)
190 if err := ioutil.WriteFile(filepath.Join(dir, "some-file"), []byte("hello"), 0644); err != nil {
198 fis, err := d.Readdir(2) // notably, greater than zero
199 if len(fis) == 0 && err == nil {
200 // This is what used to happen (Issue 16919)
201 t.Fatal("Readdir = empty slice & err == nil")
203 if len(fis) != 0 || err != io.EOF {
204 t.Errorf("Readdir = %d entries: %v; want 0, io.EOF", len(fis), err)
205 for i, fi := range fis {
206 t.Errorf(" entry[%d]: %q, %v", i, fi.Name(), fi.Mode())
212 // Issue 23120: respect umask when doing Mkdir with the sticky bit
213 func TestMkdirStickyUmask(t *testing.T) {
215 dir := newDir("TestMkdirStickyUmask", t)
217 oldUmask := syscall.Umask(umask)
218 defer syscall.Umask(oldUmask)
219 p := filepath.Join(dir, "dir1")
220 if err := Mkdir(p, ModeSticky|0755); err != nil {
227 if mode := fi.Mode(); (mode&umask) != 0 || (mode&^ModePerm) != (ModeDir|ModeSticky) {
228 t.Errorf("unexpected mode %s", mode)
232 // See also issues: 22939, 24331
233 func newFileTest(t *testing.T, blocking bool) {
235 if err := syscall.Pipe(p); err != nil {
236 t.Fatalf("pipe: %v", err)
238 defer syscall.Close(p[1])
240 // Set the read-side to non-blocking.
242 if err := syscall.SetNonblock(p[0], true); err != nil {
244 t.Fatalf("SetNonblock: %v", err)
247 // Convert it to a file.
248 file := NewFile(uintptr(p[0]), "notapipe")
251 t.Fatalf("failed to convert fd to file!")
255 // Try to read with deadline (but don't block forever).
257 // Send something after 100ms.
258 timer := time.AfterFunc(100*time.Millisecond, func() { syscall.Write(p[1], []byte("a")) })
260 file.SetReadDeadline(time.Now().Add(10 * time.Millisecond))
261 _, err := file.Read(b)
263 // We want it to fail with a timeout.
265 t.Fatalf("No timeout reading from file: %v", err)
268 // We want it to succeed after 100ms
270 t.Fatalf("Error reading from file: %v", err)
275 func TestNewFileBlock(t *testing.T) {
280 func TestNewFileNonBlock(t *testing.T) {
282 newFileTest(t, false)