blob: c6156c54969bfc62321296a2ec1a18591db8fe49 [file] [log] [blame]
#!/usr/bin/env vpython3
# coding=utf-8
# Copyright 2013 The LUCI Authors. All rights reserved.
# Use of this source code is governed under the Apache License, Version 2.0
# that can be found in the LICENSE file.
import getpass
import io
import os
import subprocess
import sys
import tempfile
import time
import unittest
# Mutates sys.path.
import test_env
# third_party/
from depot_tools import auto_stub
from utils import file_path
from utils import fs
from utils import subprocess42
def write_content(filepath, content):
with fs.open(filepath, 'wb') as f:
f.write(content)
class FilePathTest(auto_stub.TestCase):
def setUp(self):
super(FilePathTest, self).setUp()
self._tempdir = None
def tearDown(self):
try:
if self._tempdir:
for dirpath, dirnames, filenames in fs.walk(
self._tempdir, topdown=True):
for filename in filenames:
file_path.set_read_only(os.path.join(dirpath, filename), False)
for dirname in dirnames:
file_path.set_read_only(os.path.join(dirpath, dirname), False)
file_path.rmtree(self._tempdir)
finally:
super(FilePathTest, self).tearDown()
@property
def tempdir(self):
if not self._tempdir:
self._tempdir = tempfile.mkdtemp(prefix='file_path_test')
return self._tempdir
def test_atomic_replace_new_file(self):
path = os.path.join(self.tempdir, 'new_file')
file_path.atomic_replace(path, b'blah')
with open(path, 'rb') as f:
self.assertEqual(b'blah', f.read())
self.assertEqual(['new_file'], os.listdir(self.tempdir))
def test_atomic_replace_existing_file(self):
path = os.path.join(self.tempdir, 'existing_file')
with open(path, 'wb') as f:
f.write(b'existing body')
file_path.atomic_replace(path, b'new body')
with open(path, 'rb') as f:
self.assertEqual(b'new body', f.read())
self.assertEqual(['existing_file'], os.listdir(self.tempdir))
def assertFileMode(self, filepath, mode, umask=None):
umask = test_env.umask() if umask is None else umask
actual = fs.stat(filepath).st_mode
expected = mode & ~umask # pylint: disable=invalid-unary-operand-type
self.assertEqual(
expected,
actual,
(filepath, oct(expected), oct(actual), oct(umask)))
def assertMaskedFileMode(self, filepath, mode):
"""It's usually when the file was first marked read only."""
self.assertFileMode(filepath, mode, 0 if sys.platform == 'win32' else 0o77)
def test_delete_wd_rf(self):
# Confirms that a RO file in a RW directory can be deleted on non-Windows.
dir_foo = os.path.join(self.tempdir, 'foo')
file_bar = os.path.join(dir_foo, 'bar')
fs.mkdir(dir_foo, 0o777)
write_content(file_bar, b'bar')
file_path.set_read_only(dir_foo, False)
file_path.set_read_only(file_bar, True)
self.assertFileMode(dir_foo, 0o40777)
self.assertMaskedFileMode(file_bar, 0o100444)
if sys.platform == 'win32':
# On Windows, a read-only file can't be deleted.
with self.assertRaises(OSError):
fs.remove(file_bar)
else:
fs.remove(file_bar)
def test_delete_rd_wf(self):
# Confirms that a Rw file in a RO directory can be deleted on Windows only.
dir_foo = os.path.join(self.tempdir, 'foo')
file_bar = os.path.join(dir_foo, 'bar')
fs.mkdir(dir_foo, 0o777)
write_content(file_bar, b'bar')
file_path.set_read_only(dir_foo, True)
file_path.set_read_only(file_bar, False)
self.assertMaskedFileMode(dir_foo, 0o40555)
self.assertFileMode(file_bar, 0o100666)
if sys.platform == 'win32':
# A read-only directory has a convoluted meaning on Windows, it means that
# the directory is "personalized". This is used as a signal by Windows
# Explorer to tell it to look into the directory for desktop.ini.
# See http://support.microsoft.com/kb/326549 for more details.
# As such, it is important to not try to set the read-only bit on
# directories on Windows since it has no effect other than trigger
# Windows Explorer to look for desktop.ini, which is unnecessary.
fs.remove(file_bar)
else:
with self.assertRaises(OSError):
fs.remove(file_bar)
def test_delete_rd_rf(self):
# Confirms that a RO file in a RO directory can't be deleted.
dir_foo = os.path.join(self.tempdir, 'foo')
file_bar = os.path.join(dir_foo, 'bar')
fs.mkdir(dir_foo, 0o777)
write_content(file_bar, b'bar')
file_path.set_read_only(dir_foo, True)
file_path.set_read_only(file_bar, True)
self.assertMaskedFileMode(dir_foo, 0o40555)
self.assertMaskedFileMode(file_bar, 0o100444)
with self.assertRaises(OSError):
# It fails for different reason depending on the OS. See the test cases
# above.
fs.remove(file_bar)
def test_hard_link_mode(self):
# Creates a hard link, see if the file mode changed on the node or the
# directory entry.
dir_foo = os.path.join(self.tempdir, 'foo')
file_bar = os.path.join(dir_foo, 'bar')
file_link = os.path.join(dir_foo, 'link')
fs.mkdir(dir_foo, 0o777)
write_content(file_bar, b'bar')
file_path.hardlink(file_bar, file_link)
self.assertFileMode(file_bar, 0o100666)
self.assertFileMode(file_link, 0o100666)
file_path.set_read_only(file_bar, True)
self.assertMaskedFileMode(file_bar, 0o100444)
self.assertMaskedFileMode(file_link, 0o100444)
# This is bad news for Windows; on Windows, the file must be writeable to be
# deleted, but the file node is modified. This means that every hard links
# must be reset to be read-only after deleting one of the hard link
# directory entry.
def test_ensure_tree(self):
dir_foo = os.path.join(self.tempdir, 'foo')
file_path.ensure_tree(dir_foo, 0o777)
self.assertTrue(os.path.isdir(dir_foo))
# Do not raise OSError with errno.EEXIST
file_path.ensure_tree(dir_foo, 0o777)
def _make_tree(self):
root = os.path.join(self.tempdir, 'root')
child_dir = os.path.join(root, 'child')
grand_child_dir = os.path.join(child_dir, 'grand_child')
dirs = [root, child_dir, grand_child_dir]
os.makedirs(grand_child_dir)
files = [
os.path.join(root, 'file1'),
os.path.join(child_dir, 'file2'),
os.path.join(grand_child_dir, 'file3'),
]
for f in files:
open(f, 'w').close()
return root, dirs, files
@unittest.skipIf(sys.platform == 'win32', 'posix only')
def test_rmtree(self):
root, dirs, _ = self._make_tree()
# Emulate fs.rmtree() permission error.
can_delete = set()
def fs_rmtree_mock(_path, onerror):
for d in dirs:
if d not in can_delete:
onerror(None, None, (None, None, None))
def chmod_mock(path, _mode):
can_delete.add(path)
self.mock(fs, 'rmtree', fs_rmtree_mock)
if hasattr(os, 'lchmod'):
self.mock(fs, 'lchmod', chmod_mock)
else:
self.mock(fs, 'chmod', chmod_mock)
file_path.rmtree(root)
@unittest.skipIf(sys.platform == 'win32', 'posix only')
def test_rmtree_with_sudo_chmod(self):
root, dirs, _ = self._make_tree()
# Emulate fs.rmtree() permission error.
can_delete = set()
def fs_rmtree_mock(_path, onerror):
for d in dirs:
if d not in can_delete:
onerror(None, None, (None, None, None))
self.mock(fs, 'rmtree', fs_rmtree_mock)
# pylint: disable=unused-argument
def subprocess_mock(cmd, stdin=None):
path = cmd[4]
can_delete.add(path)
self.mock(file_path, 'set_read_only_swallow', lambda *_: OSError('error'))
self.mock(subprocess42, 'call', subprocess_mock)
file_path.rmtree(root)
def test_rmtree_unicode(self):
subdir = os.path.join(self.tempdir, 'hi')
fs.mkdir(subdir)
filepath = os.path.join(subdir,
'\u0627\u0644\u0635\u064A\u0646\u064A\u0629')
with fs.open(filepath, 'wb') as f:
f.write(b'hi')
# In particular, it fails when the input argument is a str.
file_path.rmtree(str(subdir))
if sys.platform == 'win32':
def test_rmtree_win(self):
root, _, files = self._make_tree()
# Emulate fs.rmtree() permission error.
can_delete = set()
def fs_rmtree_mock(_path, onerror):
for f in files:
if f not in can_delete:
onerror(None, None, (None, None, None))
def chmod_mock(path, _mode):
can_delete.add(path)
self.mock(fs, 'rmtree', fs_rmtree_mock)
self.mock(fs, 'chmod', chmod_mock)
file_path.rmtree(root)
def test_rmtree_outliving_processes(self):
# Mock our sleep for faster test case execution.
sleeps = []
self.mock(time, 'sleep', sleeps.append)
self.mock(sys, 'stderr', io.StringIO())
# Open a child process, so the file is locked.
subdir = os.path.join(self.tempdir, 'to_be_deleted')
fs.mkdir(subdir)
script = 'import time; open(\'a\', \'w\'); time.sleep(60)'
proc = subprocess.Popen([sys.executable, '-c', script], cwd=subdir)
try:
# Wait until the file exist.
while not fs.isfile(os.path.join(subdir, 'a')):
self.assertEqual(None, proc.poll())
file_path.rmtree(subdir)
self.assertEqual([4, 2], sleeps)
# sys.stderr.getvalue() would return a fair amount of output but it is
# not completely deterministic so we're not testing it here.
finally:
proc.wait()
def test_filter_processes_dir_win(self):
python_dir = os.path.dirname(sys.executable)
processes = file_path._filter_processes_dir_win(
file_path._enum_processes_win(), python_dir)
self.assertTrue(processes)
proc_names = [proc.ExecutablePath for proc in processes]
# Try to find at least one python process.
self.assertTrue(
any(proc == sys.executable for proc in proc_names), proc_names)
def test_filter_processes_tree_win(self):
# Create a grand-child.
script = (
'import subprocess,sys;'
'proc = subprocess.Popen('
'[sys.executable, \'-u\', \'-c\', \'import time; print(1); '
'time.sleep(60)\'], stdout=subprocess.PIPE); '
# Signal grand child is ready.
'print(proc.stdout.read(1)); '
# Wait for parent to have completed the test.
'sys.stdin.read(1); '
'proc.kill()'
)
proc = subprocess.Popen(
[sys.executable, '-u', '-c', script],
stdin=subprocess.PIPE,
stdout=subprocess.PIPE)
try:
proc.stdout.read(1)
processes = file_path.filter_processes_tree_win(
file_path._enum_processes_win())
self.assertEqual(3, len(processes), processes)
proc.stdin.write('a')
proc.wait()
except Exception:
proc.kill()
finally:
proc.wait()
if sys.platform != 'win32':
def test_symlink(self):
# This test will fail if the checkout is in a symlink.
actual = file_path.split_at_symlink(None, test_env.CLIENT_DIR)
expected = (test_env.CLIENT_DIR, None, None)
self.assertEqual(expected, actual)
actual = file_path.split_at_symlink(
None, os.path.join(test_env.TESTS_DIR, 'trace_inputs'))
expected = (os.path.join(test_env.TESTS_DIR, 'trace_inputs'), None, None)
self.assertEqual(expected, actual)
actual = file_path.split_at_symlink(
None, os.path.join(test_env.TESTS_DIR, 'trace_inputs', 'files2'))
expected = (
os.path.join(test_env.TESTS_DIR, 'trace_inputs'), 'files2', '')
self.assertEqual(expected, actual)
actual = file_path.split_at_symlink(
test_env.CLIENT_DIR, os.path.join('tests', 'trace_inputs', 'files2'))
expected = (
os.path.join('tests', 'trace_inputs'), 'files2', '')
self.assertEqual(expected, actual)
actual = file_path.split_at_symlink(
test_env.CLIENT_DIR,
os.path.join('tests', 'trace_inputs', 'files2', 'bar'))
expected = (os.path.join('tests', 'trace_inputs'), 'files2', '/bar')
self.assertEqual(expected, actual)
else:
def test_undeleteable_chmod(self):
# Create a file and a directory with an empty ACL. Then try to delete it.
dirpath = os.path.join(self.tempdir, 'd')
filepath = os.path.join(dirpath, 'f')
os.mkdir(dirpath)
with open(filepath, 'w') as f:
f.write('hi')
os.chmod(filepath, 0)
os.chmod(dirpath, 0)
file_path.rmtree(dirpath)
def test_undeleteable_owner(self):
# Create a file and a directory with an empty ACL. Then try to delete it.
dirpath = os.path.join(self.tempdir, 'd')
filepath = os.path.join(dirpath, 'f')
os.mkdir(dirpath)
with open(filepath, 'w') as f:
f.write('hi')
import win32security
user, _domain, _type = win32security.LookupAccountName(
'', getpass.getuser())
sd = win32security.SECURITY_DESCRIPTOR()
sd.Initialize()
sd.SetSecurityDescriptorOwner(user, False)
# Create an empty DACL, which removes all rights.
dacl = win32security.ACL()
dacl.Initialize()
sd.SetSecurityDescriptorDacl(1, dacl, 0)
win32security.SetFileSecurity(
fs.extend(filepath), win32security.DACL_SECURITY_INFORMATION, sd)
win32security.SetFileSecurity(
fs.extend(dirpath), win32security.DACL_SECURITY_INFORMATION, sd)
file_path.rmtree(dirpath)
def _check_get_recursive_size(self, symlink='symlink'):
# Test that _get_recursive_size calculates file size recursively.
with open(os.path.join(self.tempdir, '1'), 'w') as f:
f.write('0')
self.assertEqual(file_path.get_recursive_size(self.tempdir), 1)
with open(os.path.join(self.tempdir, '2'), 'w') as f:
f.write('01')
self.assertEqual(file_path.get_recursive_size(self.tempdir), 3)
nested_dir = os.path.join(self.tempdir, 'dir1', 'dir2')
os.makedirs(nested_dir)
with open(os.path.join(nested_dir, '4'), 'w') as f:
f.write('0123')
self.assertEqual(file_path.get_recursive_size(self.tempdir), 7)
# Add an unreadable directory.
secure_dir = os.path.join(self.tempdir, 'dir_secure')
os.makedirs(secure_dir, mode=0o000)
self.assertEqual(file_path.get_recursive_size(self.tempdir), 7)
symlink_dir = os.path.join(self.tempdir, 'symlink_dir')
symlink_file = os.path.join(self.tempdir, 'symlink_file')
if symlink == 'symlink':
if sys.platform == 'win32':
subprocess.check_call('cmd /c mklink /d %s %s' %
(symlink_dir, nested_dir))
subprocess.check_call('cmd /c mklink %s %s' %
(symlink_file, os.path.join(self.tempdir, '1')))
else:
os.symlink(nested_dir, symlink_dir)
os.symlink(os.path.join(self.tempdir, '1'), symlink_file)
elif symlink == 'junction':
# junction should be ignored.
subprocess.check_call('cmd /c mklink /j %s %s' %
(symlink_dir, nested_dir))
# This is invalid junction, junction can be made only for directory.
subprocess.check_call('cmd /c mklink /j %s %s' %
(symlink_file, os.path.join(self.tempdir, '1')))
elif symlink == 'hardlink':
# hardlink can be made only for file.
subprocess.check_call('cmd /c mklink /h %s %s' %
(symlink_file, os.path.join(self.tempdir, '1')))
else:
assert False, ("symlink should be one of symlink, "
"junction or hardlink, but: %s" % symlink)
if symlink == 'hardlink':
# hardlinked file is double counted.
self.assertEqual(file_path.get_recursive_size(self.tempdir), 8)
else:
# symlink and junction should be ignored.
self.assertEqual(file_path.get_recursive_size(self.tempdir), 7)
def test_get_recursive_size(self):
self._check_get_recursive_size()
@unittest.skipUnless(sys.platform == 'win32', 'Windows specific')
def test_get_recursive_size_win_junction(self):
self._check_get_recursive_size(symlink='junction')
@unittest.skipUnless(sys.platform == 'win32', 'Windows specific')
def test_get_recursive_size_win_hardlink(self):
self._check_get_recursive_size(symlink='hardlink')
if __name__ == '__main__':
test_env.main()