summaryrefslogtreecommitdiffstats
path: root/src/test/ui/paths-containing-nul.rs
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-17 12:02:58 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-17 12:02:58 +0000
commit698f8c2f01ea549d77d7dc3338a12e04c11057b9 (patch)
tree173a775858bd501c378080a10dca74132f05bc50 /src/test/ui/paths-containing-nul.rs
parentInitial commit. (diff)
downloadrustc-698f8c2f01ea549d77d7dc3338a12e04c11057b9.tar.xz
rustc-698f8c2f01ea549d77d7dc3338a12e04c11057b9.zip
Adding upstream version 1.64.0+dfsg1.upstream/1.64.0+dfsg1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/test/ui/paths-containing-nul.rs')
-rw-r--r--src/test/ui/paths-containing-nul.rs49
1 files changed, 49 insertions, 0 deletions
diff --git a/src/test/ui/paths-containing-nul.rs b/src/test/ui/paths-containing-nul.rs
new file mode 100644
index 000000000..cb40c4f6f
--- /dev/null
+++ b/src/test/ui/paths-containing-nul.rs
@@ -0,0 +1,49 @@
+// run-pass
+
+#![allow(deprecated)]
+// ignore-wasm32-bare no files or I/O
+// ignore-emscripten no files
+// ignore-sgx no files
+
+use std::fs;
+use std::io;
+
+fn assert_invalid_input<T>(on: &str, result: io::Result<T>) {
+ fn inner(on: &str, result: io::Result<()>) {
+ match result {
+ Ok(()) => panic!("{} didn't return an error on a path with NUL", on),
+ Err(e) => assert!(e.kind() == io::ErrorKind::InvalidInput,
+ "{} returned a strange {:?} on a path with NUL", on, e.kind()),
+ }
+ }
+ inner(on, result.map(drop))
+}
+
+fn main() {
+ assert_invalid_input("File::open", fs::File::open("\0"));
+ assert_invalid_input("File::create", fs::File::create("\0"));
+ assert_invalid_input("remove_file", fs::remove_file("\0"));
+ assert_invalid_input("metadata", fs::metadata("\0"));
+ assert_invalid_input("symlink_metadata", fs::symlink_metadata("\0"));
+
+ // If `dummy_file` does not exist, then we might get another unrelated error
+ let dummy_file = std::env::current_exe().unwrap();
+
+ assert_invalid_input("rename1", fs::rename("\0", "a"));
+ assert_invalid_input("rename2", fs::rename(&dummy_file, "\0"));
+ assert_invalid_input("copy1", fs::copy("\0", "a"));
+ assert_invalid_input("copy2", fs::copy(&dummy_file, "\0"));
+ assert_invalid_input("hard_link1", fs::hard_link("\0", "a"));
+ assert_invalid_input("hard_link2", fs::hard_link(&dummy_file, "\0"));
+ assert_invalid_input("soft_link1", fs::soft_link("\0", "a"));
+ assert_invalid_input("soft_link2", fs::soft_link(&dummy_file, "\0"));
+ assert_invalid_input("read_link", fs::read_link("\0"));
+ assert_invalid_input("canonicalize", fs::canonicalize("\0"));
+ assert_invalid_input("create_dir", fs::create_dir("\0"));
+ assert_invalid_input("create_dir_all", fs::create_dir_all("\0"));
+ assert_invalid_input("remove_dir", fs::remove_dir("\0"));
+ assert_invalid_input("remove_dir_all", fs::remove_dir_all("\0"));
+ assert_invalid_input("read_dir", fs::read_dir("\0"));
+ assert_invalid_input("set_permissions",
+ fs::set_permissions("\0", fs::metadata(".").unwrap().permissions()));
+}