summaryrefslogtreecommitdiffstats
path: root/src/path/filepath/path_windows_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'src/path/filepath/path_windows_test.go')
-rw-r--r--src/path/filepath/path_windows_test.go582
1 files changed, 582 insertions, 0 deletions
diff --git a/src/path/filepath/path_windows_test.go b/src/path/filepath/path_windows_test.go
new file mode 100644
index 0000000..c8c7eef
--- /dev/null
+++ b/src/path/filepath/path_windows_test.go
@@ -0,0 +1,582 @@
+// Copyright 2013 The Go Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style
+// license that can be found in the LICENSE file.
+
+package filepath_test
+
+import (
+ "flag"
+ "fmt"
+ "internal/testenv"
+ "io/fs"
+ "os"
+ "os/exec"
+ "path/filepath"
+ "reflect"
+ "runtime/debug"
+ "strings"
+ "testing"
+)
+
+func TestWinSplitListTestsAreValid(t *testing.T) {
+ comspec := os.Getenv("ComSpec")
+ if comspec == "" {
+ t.Fatal("%ComSpec% must be set")
+ }
+
+ for ti, tt := range winsplitlisttests {
+ testWinSplitListTestIsValid(t, ti, tt, comspec)
+ }
+}
+
+func testWinSplitListTestIsValid(t *testing.T, ti int, tt SplitListTest,
+ comspec string) {
+
+ const (
+ cmdfile = `printdir.cmd`
+ perm fs.FileMode = 0700
+ )
+
+ tmp := t.TempDir()
+ for i, d := range tt.result {
+ if d == "" {
+ continue
+ }
+ if cd := filepath.Clean(d); filepath.VolumeName(cd) != "" ||
+ cd[0] == '\\' || cd == ".." || (len(cd) >= 3 && cd[0:3] == `..\`) {
+ t.Errorf("%d,%d: %#q refers outside working directory", ti, i, d)
+ return
+ }
+ dd := filepath.Join(tmp, d)
+ if _, err := os.Stat(dd); err == nil {
+ t.Errorf("%d,%d: %#q already exists", ti, i, d)
+ return
+ }
+ if err := os.MkdirAll(dd, perm); err != nil {
+ t.Errorf("%d,%d: MkdirAll(%#q) failed: %v", ti, i, dd, err)
+ return
+ }
+ fn, data := filepath.Join(dd, cmdfile), []byte("@echo "+d+"\r\n")
+ if err := os.WriteFile(fn, data, perm); err != nil {
+ t.Errorf("%d,%d: WriteFile(%#q) failed: %v", ti, i, fn, err)
+ return
+ }
+ }
+
+ // on some systems, SystemRoot is required for cmd to work
+ systemRoot := os.Getenv("SystemRoot")
+
+ for i, d := range tt.result {
+ if d == "" {
+ continue
+ }
+ exp := []byte(d + "\r\n")
+ cmd := &exec.Cmd{
+ Path: comspec,
+ Args: []string{`/c`, cmdfile},
+ Env: []string{`Path=` + systemRoot + "/System32;" + tt.list, `SystemRoot=` + systemRoot},
+ Dir: tmp,
+ }
+ out, err := cmd.CombinedOutput()
+ switch {
+ case err != nil:
+ t.Errorf("%d,%d: execution error %v\n%q", ti, i, err, out)
+ return
+ case !reflect.DeepEqual(out, exp):
+ t.Errorf("%d,%d: expected %#q, got %#q", ti, i, exp, out)
+ return
+ default:
+ // unshadow cmdfile in next directory
+ err = os.Remove(filepath.Join(tmp, d, cmdfile))
+ if err != nil {
+ t.Fatalf("Remove test command failed: %v", err)
+ }
+ }
+ }
+}
+
+func TestWindowsEvalSymlinks(t *testing.T) {
+ testenv.MustHaveSymlink(t)
+
+ tmpDir := tempDirCanonical(t)
+
+ if len(tmpDir) < 3 {
+ t.Fatalf("tmpDir path %q is too short", tmpDir)
+ }
+ if tmpDir[1] != ':' {
+ t.Fatalf("tmpDir path %q must have drive letter in it", tmpDir)
+ }
+ test := EvalSymlinksTest{"test/linkabswin", tmpDir[:3]}
+
+ // Create the symlink farm using relative paths.
+ testdirs := append(EvalSymlinksTestDirs, test)
+ for _, d := range testdirs {
+ var err error
+ path := simpleJoin(tmpDir, d.path)
+ if d.dest == "" {
+ err = os.Mkdir(path, 0755)
+ } else {
+ err = os.Symlink(d.dest, path)
+ }
+ if err != nil {
+ t.Fatal(err)
+ }
+ }
+
+ path := simpleJoin(tmpDir, test.path)
+
+ testEvalSymlinks(t, path, test.dest)
+
+ testEvalSymlinksAfterChdir(t, path, ".", test.dest)
+
+ testEvalSymlinksAfterChdir(t,
+ path,
+ filepath.VolumeName(tmpDir)+".",
+ test.dest)
+
+ testEvalSymlinksAfterChdir(t,
+ simpleJoin(tmpDir, "test"),
+ simpleJoin("..", test.path),
+ test.dest)
+
+ testEvalSymlinksAfterChdir(t, tmpDir, test.path, test.dest)
+}
+
+// TestEvalSymlinksCanonicalNames verify that EvalSymlinks
+// returns "canonical" path names on windows.
+func TestEvalSymlinksCanonicalNames(t *testing.T) {
+ ctmp := tempDirCanonical(t)
+ dirs := []string{
+ "test",
+ "test/dir",
+ "testing_long_dir",
+ "TEST2",
+ }
+
+ for _, d := range dirs {
+ dir := filepath.Join(ctmp, d)
+ err := os.Mkdir(dir, 0755)
+ if err != nil {
+ t.Fatal(err)
+ }
+ cname, err := filepath.EvalSymlinks(dir)
+ if err != nil {
+ t.Errorf("EvalSymlinks(%q) error: %v", dir, err)
+ continue
+ }
+ if dir != cname {
+ t.Errorf("EvalSymlinks(%q) returns %q, but should return %q", dir, cname, dir)
+ continue
+ }
+ // test non-canonical names
+ test := strings.ToUpper(dir)
+ p, err := filepath.EvalSymlinks(test)
+ if err != nil {
+ t.Errorf("EvalSymlinks(%q) error: %v", test, err)
+ continue
+ }
+ if p != cname {
+ t.Errorf("EvalSymlinks(%q) returns %q, but should return %q", test, p, cname)
+ continue
+ }
+ // another test
+ test = strings.ToLower(dir)
+ p, err = filepath.EvalSymlinks(test)
+ if err != nil {
+ t.Errorf("EvalSymlinks(%q) error: %v", test, err)
+ continue
+ }
+ if p != cname {
+ t.Errorf("EvalSymlinks(%q) returns %q, but should return %q", test, p, cname)
+ continue
+ }
+ }
+}
+
+// checkVolume8dot3Setting runs "fsutil 8dot3name query c:" command
+// (where c: is vol parameter) to discover "8dot3 name creation state".
+// The state is combination of 2 flags. The global flag controls if it
+// is per volume or global setting:
+//
+// 0 - Enable 8dot3 name creation on all volumes on the system
+// 1 - Disable 8dot3 name creation on all volumes on the system
+// 2 - Set 8dot3 name creation on a per volume basis
+// 3 - Disable 8dot3 name creation on all volumes except the system volume
+//
+// If global flag is set to 2, then per-volume flag needs to be examined:
+//
+// 0 - Enable 8dot3 name creation on this volume
+// 1 - Disable 8dot3 name creation on this volume
+//
+// checkVolume8dot3Setting verifies that "8dot3 name creation" flags
+// are set to 2 and 0, if enabled parameter is true, or 2 and 1, if enabled
+// is false. Otherwise checkVolume8dot3Setting returns error.
+func checkVolume8dot3Setting(vol string, enabled bool) error {
+ // It appears, on some systems "fsutil 8dot3name query ..." command always
+ // exits with error. Ignore exit code, and look at fsutil output instead.
+ out, _ := exec.Command("fsutil", "8dot3name", "query", vol).CombinedOutput()
+ // Check that system has "Volume level setting" set.
+ expected := "The registry state of NtfsDisable8dot3NameCreation is 2, the default (Volume level setting)"
+ if !strings.Contains(string(out), expected) {
+ // Windows 10 version of fsutil has different output message.
+ expectedWindow10 := "The registry state is: 2 (Per volume setting - the default)"
+ if !strings.Contains(string(out), expectedWindow10) {
+ return fmt.Errorf("fsutil output should contain %q, but is %q", expected, string(out))
+ }
+ }
+ // Now check the volume setting.
+ expected = "Based on the above two settings, 8dot3 name creation is %s on %s"
+ if enabled {
+ expected = fmt.Sprintf(expected, "enabled", vol)
+ } else {
+ expected = fmt.Sprintf(expected, "disabled", vol)
+ }
+ if !strings.Contains(string(out), expected) {
+ return fmt.Errorf("unexpected fsutil output: %q", string(out))
+ }
+ return nil
+}
+
+func setVolume8dot3Setting(vol string, enabled bool) error {
+ cmd := []string{"fsutil", "8dot3name", "set", vol}
+ if enabled {
+ cmd = append(cmd, "0")
+ } else {
+ cmd = append(cmd, "1")
+ }
+ // It appears, on some systems "fsutil 8dot3name set ..." command always
+ // exits with error. Ignore exit code, and look at fsutil output instead.
+ out, _ := exec.Command(cmd[0], cmd[1:]...).CombinedOutput()
+ if string(out) != "\r\nSuccessfully set 8dot3name behavior.\r\n" {
+ // Windows 10 version of fsutil has different output message.
+ expectedWindow10 := "Successfully %s 8dot3name generation on %s\r\n"
+ if enabled {
+ expectedWindow10 = fmt.Sprintf(expectedWindow10, "enabled", vol)
+ } else {
+ expectedWindow10 = fmt.Sprintf(expectedWindow10, "disabled", vol)
+ }
+ if string(out) != expectedWindow10 {
+ return fmt.Errorf("%v command failed: %q", cmd, string(out))
+ }
+ }
+ return nil
+}
+
+var runFSModifyTests = flag.Bool("run_fs_modify_tests", false, "run tests which modify filesystem parameters")
+
+// This test assumes registry state of NtfsDisable8dot3NameCreation is 2,
+// the default (Volume level setting).
+func TestEvalSymlinksCanonicalNamesWith8dot3Disabled(t *testing.T) {
+ if !*runFSModifyTests {
+ t.Skip("skipping test that modifies file system setting; enable with -run_fs_modify_tests")
+ }
+ tempVol := filepath.VolumeName(os.TempDir())
+ if len(tempVol) != 2 {
+ t.Fatalf("unexpected temp volume name %q", tempVol)
+ }
+
+ err := checkVolume8dot3Setting(tempVol, true)
+ if err != nil {
+ t.Fatal(err)
+ }
+ err = setVolume8dot3Setting(tempVol, false)
+ if err != nil {
+ t.Fatal(err)
+ }
+ defer func() {
+ err := setVolume8dot3Setting(tempVol, true)
+ if err != nil {
+ t.Fatal(err)
+ }
+ err = checkVolume8dot3Setting(tempVol, true)
+ if err != nil {
+ t.Fatal(err)
+ }
+ }()
+ err = checkVolume8dot3Setting(tempVol, false)
+ if err != nil {
+ t.Fatal(err)
+ }
+ TestEvalSymlinksCanonicalNames(t)
+}
+
+func TestToNorm(t *testing.T) {
+ stubBase := func(path string) (string, error) {
+ vol := filepath.VolumeName(path)
+ path = path[len(vol):]
+
+ if strings.Contains(path, "/") {
+ return "", fmt.Errorf("invalid path is given to base: %s", vol+path)
+ }
+
+ if path == "" || path == "." || path == `\` {
+ return "", fmt.Errorf("invalid path is given to base: %s", vol+path)
+ }
+
+ i := strings.LastIndexByte(path, filepath.Separator)
+ if i == len(path)-1 { // trailing '\' is invalid
+ return "", fmt.Errorf("invalid path is given to base: %s", vol+path)
+ }
+ if i == -1 {
+ return strings.ToUpper(path), nil
+ }
+
+ return strings.ToUpper(path[i+1:]), nil
+ }
+
+ // On this test, toNorm should be same as string.ToUpper(filepath.Clean(path)) except empty string.
+ tests := []struct {
+ arg string
+ want string
+ }{
+ {"", ""},
+ {".", "."},
+ {"./foo/bar", `FOO\BAR`},
+ {"/", `\`},
+ {"/foo/bar", `\FOO\BAR`},
+ {"/foo/bar/baz/qux", `\FOO\BAR\BAZ\QUX`},
+ {"foo/bar", `FOO\BAR`},
+ {"C:/foo/bar", `C:\FOO\BAR`},
+ {"C:foo/bar", `C:FOO\BAR`},
+ {"c:/foo/bar", `C:\FOO\BAR`},
+ {"C:/foo/bar", `C:\FOO\BAR`},
+ {"C:/foo/bar/", `C:\FOO\BAR`},
+ {`C:\foo\bar`, `C:\FOO\BAR`},
+ {`C:\foo/bar\`, `C:\FOO\BAR`},
+ {"C:/ふー/バー", `C:\ふー\バー`},
+ }
+
+ for _, test := range tests {
+ got, err := filepath.ToNorm(test.arg, stubBase)
+ if err != nil {
+ t.Errorf("toNorm(%s) failed: %v\n", test.arg, err)
+ } else if got != test.want {
+ t.Errorf("toNorm(%s) returns %s, but %s expected\n", test.arg, got, test.want)
+ }
+ }
+
+ testPath := `{{tmp}}\test\foo\bar`
+
+ testsDir := []struct {
+ wd string
+ arg string
+ want string
+ }{
+ // test absolute paths
+ {".", `{{tmp}}\test\foo\bar`, `{{tmp}}\test\foo\bar`},
+ {".", `{{tmp}}\.\test/foo\bar`, `{{tmp}}\test\foo\bar`},
+ {".", `{{tmp}}\test\..\test\foo\bar`, `{{tmp}}\test\foo\bar`},
+ {".", `{{tmp}}\TEST\FOO\BAR`, `{{tmp}}\test\foo\bar`},
+
+ // test relative paths begin with drive letter
+ {`{{tmp}}\test`, `{{tmpvol}}.`, `{{tmpvol}}.`},
+ {`{{tmp}}\test`, `{{tmpvol}}..`, `{{tmpvol}}..`},
+ {`{{tmp}}\test`, `{{tmpvol}}foo\bar`, `{{tmpvol}}foo\bar`},
+ {`{{tmp}}\test`, `{{tmpvol}}.\foo\bar`, `{{tmpvol}}foo\bar`},
+ {`{{tmp}}\test`, `{{tmpvol}}foo\..\foo\bar`, `{{tmpvol}}foo\bar`},
+ {`{{tmp}}\test`, `{{tmpvol}}FOO\BAR`, `{{tmpvol}}foo\bar`},
+
+ // test relative paths begin with '\'
+ {"{{tmp}}", `{{tmpnovol}}\test\foo\bar`, `{{tmpnovol}}\test\foo\bar`},
+ {"{{tmp}}", `{{tmpnovol}}\.\test\foo\bar`, `{{tmpnovol}}\test\foo\bar`},
+ {"{{tmp}}", `{{tmpnovol}}\test\..\test\foo\bar`, `{{tmpnovol}}\test\foo\bar`},
+ {"{{tmp}}", `{{tmpnovol}}\TEST\FOO\BAR`, `{{tmpnovol}}\test\foo\bar`},
+
+ // test relative paths begin without '\'
+ {`{{tmp}}\test`, ".", `.`},
+ {`{{tmp}}\test`, "..", `..`},
+ {`{{tmp}}\test`, `foo\bar`, `foo\bar`},
+ {`{{tmp}}\test`, `.\foo\bar`, `foo\bar`},
+ {`{{tmp}}\test`, `foo\..\foo\bar`, `foo\bar`},
+ {`{{tmp}}\test`, `FOO\BAR`, `foo\bar`},
+
+ // test UNC paths
+ {".", `\\localhost\c$`, `\\localhost\c$`},
+ }
+
+ ctmp := tempDirCanonical(t)
+ if err := os.MkdirAll(strings.ReplaceAll(testPath, "{{tmp}}", ctmp), 0777); err != nil {
+ t.Fatal(err)
+ }
+
+ cwd, err := os.Getwd()
+ if err != nil {
+ t.Fatal(err)
+ }
+ defer func() {
+ err := os.Chdir(cwd)
+ if err != nil {
+ t.Fatal(err)
+ }
+ }()
+
+ tmpVol := filepath.VolumeName(ctmp)
+ if len(tmpVol) != 2 {
+ t.Fatalf("unexpected temp volume name %q", tmpVol)
+ }
+
+ tmpNoVol := ctmp[len(tmpVol):]
+
+ replacer := strings.NewReplacer("{{tmp}}", ctmp, "{{tmpvol}}", tmpVol, "{{tmpnovol}}", tmpNoVol)
+
+ for _, test := range testsDir {
+ wd := replacer.Replace(test.wd)
+ arg := replacer.Replace(test.arg)
+ want := replacer.Replace(test.want)
+
+ if test.wd == "." {
+ err := os.Chdir(cwd)
+ if err != nil {
+ t.Error(err)
+
+ continue
+ }
+ } else {
+ err := os.Chdir(wd)
+ if err != nil {
+ t.Error(err)
+
+ continue
+ }
+ }
+
+ got, err := filepath.ToNorm(arg, filepath.NormBase)
+ if err != nil {
+ t.Errorf("toNorm(%s) failed: %v (wd=%s)\n", arg, err, wd)
+ } else if got != want {
+ t.Errorf("toNorm(%s) returns %s, but %s expected (wd=%s)\n", arg, got, want, wd)
+ }
+ }
+}
+
+func TestUNC(t *testing.T) {
+ // Test that this doesn't go into an infinite recursion.
+ // See golang.org/issue/15879.
+ defer debug.SetMaxStack(debug.SetMaxStack(1e6))
+ filepath.Glob(`\\?\c:\*`)
+}
+
+func testWalkMklink(t *testing.T, linktype string) {
+ output, _ := exec.Command("cmd", "/c", "mklink", "/?").Output()
+ if !strings.Contains(string(output), fmt.Sprintf(" /%s ", linktype)) {
+ t.Skipf(`skipping test; mklink does not supports /%s parameter`, linktype)
+ }
+ testWalkSymlink(t, func(target, link string) error {
+ output, err := exec.Command("cmd", "/c", "mklink", "/"+linktype, link, target).CombinedOutput()
+ if err != nil {
+ return fmt.Errorf(`"mklink /%s %v %v" command failed: %v\n%v`, linktype, link, target, err, string(output))
+ }
+ return nil
+ })
+}
+
+func TestWalkDirectoryJunction(t *testing.T) {
+ testenv.MustHaveSymlink(t)
+ testWalkMklink(t, "J")
+}
+
+func TestWalkDirectorySymlink(t *testing.T) {
+ testenv.MustHaveSymlink(t)
+ testWalkMklink(t, "D")
+}
+
+func TestNTNamespaceSymlink(t *testing.T) {
+ output, _ := exec.Command("cmd", "/c", "mklink", "/?").Output()
+ if !strings.Contains(string(output), " /J ") {
+ t.Skip("skipping test because mklink command does not support junctions")
+ }
+
+ tmpdir := tempDirCanonical(t)
+
+ vol := filepath.VolumeName(tmpdir)
+ output, err := exec.Command("cmd", "/c", "mountvol", vol, "/L").CombinedOutput()
+ if err != nil {
+ t.Fatalf("failed to run mountvol %v /L: %v %q", vol, err, output)
+ }
+ target := strings.Trim(string(output), " \n\r")
+
+ dirlink := filepath.Join(tmpdir, "dirlink")
+ output, err = exec.Command("cmd", "/c", "mklink", "/J", dirlink, target).CombinedOutput()
+ if err != nil {
+ t.Fatalf("failed to run mklink %v %v: %v %q", dirlink, target, err, output)
+ }
+
+ got, err := filepath.EvalSymlinks(dirlink)
+ if err != nil {
+ t.Fatal(err)
+ }
+ if want := vol + `\`; got != want {
+ t.Errorf(`EvalSymlinks(%q): got %q, want %q`, dirlink, got, want)
+ }
+
+ // Make sure we have sufficient privilege to run mklink command.
+ testenv.MustHaveSymlink(t)
+
+ file := filepath.Join(tmpdir, "file")
+ err = os.WriteFile(file, []byte(""), 0666)
+ if err != nil {
+ t.Fatal(err)
+ }
+
+ target += file[len(filepath.VolumeName(file)):]
+
+ filelink := filepath.Join(tmpdir, "filelink")
+ output, err = exec.Command("cmd", "/c", "mklink", filelink, target).CombinedOutput()
+ if err != nil {
+ t.Fatalf("failed to run mklink %v %v: %v %q", filelink, target, err, output)
+ }
+
+ got, err = filepath.EvalSymlinks(filelink)
+ if err != nil {
+ t.Fatal(err)
+ }
+ if want := file; got != want {
+ t.Errorf(`EvalSymlinks(%q): got %q, want %q`, filelink, got, want)
+ }
+}
+
+func TestIssue52476(t *testing.T) {
+ tests := []struct {
+ lhs, rhs string
+ want string
+ }{
+ {`..\.`, `C:`, `..\C:`},
+ {`..`, `C:`, `..\C:`},
+ {`.`, `:`, `.\:`},
+ {`.`, `C:`, `.\C:`},
+ {`.`, `C:/a/b/../c`, `.\C:\a\c`},
+ {`.`, `\C:`, `.\C:`},
+ {`C:\`, `.`, `C:\`},
+ {`C:\`, `C:\`, `C:\C:`},
+ {`C`, `:`, `C\:`},
+ {`\.`, `C:`, `\C:`},
+ {`\`, `C:`, `\C:`},
+ }
+
+ for _, test := range tests {
+ got := filepath.Join(test.lhs, test.rhs)
+ if got != test.want {
+ t.Errorf(`Join(%q, %q): got %q, want %q`, test.lhs, test.rhs, got, test.want)
+ }
+ }
+}
+
+func TestAbsWindows(t *testing.T) {
+ for _, test := range []struct {
+ path string
+ want string
+ }{
+ {`C:\foo`, `C:\foo`},
+ {`\\host\share\foo`, `\\host\share\foo`},
+ {`\\host`, `\\host`},
+ {`\\.\NUL`, `\\.\NUL`},
+ {`NUL`, `\\.\NUL`},
+ {`COM1`, `\\.\COM1`},
+ {`a/NUL`, `\\.\NUL`},
+ } {
+ got, err := filepath.Abs(test.path)
+ if err != nil || got != test.want {
+ t.Errorf("Abs(%q) = %q, %v; want %q, nil", test.path, got, err, test.want)
+ }
+ }
+}