]>
git.proxmox.com Git - rustc.git/blob - src/test/run-pass/paths-containing-nul.rs
2 // ignore-cloudabi no files or I/O
3 // ignore-wasm32-bare no files or I/O
4 // ignore-emscripten no files
9 fn assert_invalid_input
<T
>(on
: &str, result
: io
::Result
<T
>) {
10 fn inner(on
: &str, result
: io
::Result
<()>) {
12 Ok(()) => panic
!("{} didn't return an error on a path with NUL", on
),
13 Err(e
) => assert
!(e
.kind() == io
::ErrorKind
::InvalidInput
,
14 "{} returned a strange {:?} on a path with NUL", on
, e
.kind()),
17 inner(on
, result
.map(|_
| ()))
21 assert_invalid_input("File::open", fs
::File
::open("\0"));
22 assert_invalid_input("File::create", fs
::File
::create("\0"));
23 assert_invalid_input("remove_file", fs
::remove_file("\0"));
24 assert_invalid_input("metadata", fs
::metadata("\0"));
25 assert_invalid_input("symlink_metadata", fs
::symlink_metadata("\0"));
27 // If `dummy_file` does not exist, then we might get another unrelated error
28 let dummy_file
= std
::env
::current_exe().unwrap();
30 assert_invalid_input("rename1", fs
::rename("\0", "a"));
31 assert_invalid_input("rename2", fs
::rename(&dummy_file
, "\0"));
32 assert_invalid_input("copy1", fs
::copy("\0", "a"));
33 assert_invalid_input("copy2", fs
::copy(&dummy_file
, "\0"));
34 assert_invalid_input("hard_link1", fs
::hard_link("\0", "a"));
35 assert_invalid_input("hard_link2", fs
::hard_link(&dummy_file
, "\0"));
36 assert_invalid_input("soft_link1", fs
::soft_link("\0", "a"));
37 assert_invalid_input("soft_link2", fs
::soft_link(&dummy_file
, "\0"));
38 assert_invalid_input("read_link", fs
::read_link("\0"));
39 assert_invalid_input("canonicalize", fs
::canonicalize("\0"));
40 assert_invalid_input("create_dir", fs
::create_dir("\0"));
41 assert_invalid_input("create_dir_all", fs
::create_dir_all("\0"));
42 assert_invalid_input("remove_dir", fs
::remove_dir("\0"));
43 assert_invalid_input("remove_dir_all", fs
::remove_dir_all("\0"));
44 assert_invalid_input("read_dir", fs
::read_dir("\0"));
45 assert_invalid_input("set_permissions",
46 fs
::set_permissions("\0", fs
::metadata(".").unwrap().permissions()));