diff options
author | Matt Mastracci <matthew@mastracci.com> | 2024-02-10 13:22:13 -0700 |
---|---|---|
committer | GitHub <noreply@github.com> | 2024-02-10 20:22:13 +0000 |
commit | f5e46c9bf2f50d66a953fa133161fc829cecff06 (patch) | |
tree | 8faf2f5831c1c7b11d842cd9908d141082c869a5 /cli/tests/node_compat/test/parallel/test-fs-access.js | |
parent | d2477f780630a812bfd65e3987b70c0d309385bb (diff) |
chore: move cli/tests/ -> tests/ (#22369)
This looks like a massive PR, but it's only a move from cli/tests ->
tests, and updates of relative paths for files.
This is the first step towards aggregate all of the integration test
files under tests/, which will lead to a set of integration tests that
can run without the CLI binary being built.
While we could leave these tests under `cli`, it would require us to
keep a more complex directory structure for the various test runners. In
addition, we have a lot of complexity to ignore various test files in
the `cli` project itself (cargo publish exclusion rules, autotests =
false, etc).
And finally, the `tests/` folder will eventually house the `test_ffi`,
`test_napi` and other testing code, reducing the size of the root repo
directory.
For easier review, the extremely large and noisy "move" is in the first
commit (with no changes -- just a move), while the remainder of the
changes to actual files is in the second commit.
Diffstat (limited to 'cli/tests/node_compat/test/parallel/test-fs-access.js')
-rw-r--r-- | cli/tests/node_compat/test/parallel/test-fs-access.js | 242 |
1 files changed, 0 insertions, 242 deletions
diff --git a/cli/tests/node_compat/test/parallel/test-fs-access.js b/cli/tests/node_compat/test/parallel/test-fs-access.js deleted file mode 100644 index 2351d4171..000000000 --- a/cli/tests/node_compat/test/parallel/test-fs-access.js +++ /dev/null @@ -1,242 +0,0 @@ -// deno-fmt-ignore-file -// deno-lint-ignore-file - -// Copyright Joyent and Node contributors. All rights reserved. MIT license. -// Taken from Node 18.12.1 -// This file is automatically generated by `tools/node_compat/setup.ts`. Do not modify this file manually. - -// Flags: --expose-internals -'use strict'; - -// This tests that fs.access and fs.accessSync works as expected -// and the errors thrown from these APIs include the desired properties - -const common = require('../common'); -if (!common.isWindows && process.getuid() === 0) - common.skip('as this test should not be run as `root`'); - -if (common.isIBMi) - common.skip('IBMi has a different access permission mechanism'); - -const assert = require('assert'); -const fs = require('fs'); -const path = require('path'); - -const { internalBinding } = require('internal/test/binding'); -const { UV_ENOENT } = internalBinding('uv'); - -const tmpdir = require('../common/tmpdir'); -const doesNotExist = path.join(tmpdir.path, '__this_should_not_exist'); -const readOnlyFile = path.join(tmpdir.path, 'read_only_file'); -const readWriteFile = path.join(tmpdir.path, 'read_write_file'); - -function createFileWithPerms(file, mode) { - fs.writeFileSync(file, ''); - fs.chmodSync(file, mode); -} - -tmpdir.refresh(); -createFileWithPerms(readOnlyFile, 0o444); -createFileWithPerms(readWriteFile, 0o666); - -// On non-Windows supported platforms, fs.access(readOnlyFile, W_OK, ...) -// always succeeds if node runs as the super user, which is sometimes the -// case for tests running on our continuous testing platform agents. -// -// In this case, this test tries to change its process user id to a -// non-superuser user so that the test that checks for write access to a -// read-only file can be more meaningful. -// -// The change of user id is done after creating the fixtures files for the same -// reason: the test may be run as the superuser within a directory in which -// only the superuser can create files, and thus it may need superuser -// privileges to create them. -// -// There's not really any point in resetting the process' user id to 0 after -// changing it to 'nobody', since in the case that the test runs without -// superuser privilege, it is not possible to change its process user id to -// superuser. -// -// It can prevent the test from removing files created before the change of user -// id, but that's fine. In this case, it is the responsibility of the -// continuous integration platform to take care of that. -let hasWriteAccessForReadonlyFile = false; -if (!common.isWindows && process.getuid() === 0) { - hasWriteAccessForReadonlyFile = true; - try { - process.setuid('nobody'); - hasWriteAccessForReadonlyFile = false; - } catch { - // Continue regardless of error. - } -} - -assert.strictEqual(typeof fs.F_OK, 'number'); -assert.strictEqual(typeof fs.R_OK, 'number'); -assert.strictEqual(typeof fs.W_OK, 'number'); -assert.strictEqual(typeof fs.X_OK, 'number'); - -const throwNextTick = (e) => { process.nextTick(() => { throw e; }); }; - -fs.access(__filename, common.mustCall(function(...args) { - assert.deepStrictEqual(args, [null]); -})); -fs.promises.access(__filename) - .then(common.mustCall()) - .catch(throwNextTick); -fs.access(__filename, fs.R_OK, common.mustCall(function(...args) { - assert.deepStrictEqual(args, [null]); -})); -fs.promises.access(__filename, fs.R_OK) - .then(common.mustCall()) - .catch(throwNextTick); -fs.access(readOnlyFile, fs.R_OK, common.mustCall(function(...args) { - assert.deepStrictEqual(args, [null]); -})); -fs.promises.access(readOnlyFile, fs.R_OK) - .then(common.mustCall()) - .catch(throwNextTick); - -{ - const expectedError = (err) => { - assert.notStrictEqual(err, null); - assert.strictEqual(err.code, 'ENOENT'); - assert.strictEqual(err.path, doesNotExist); - }; - fs.access(doesNotExist, common.mustCall(expectedError)); - fs.promises.access(doesNotExist) - .then(common.mustNotCall(), common.mustCall(expectedError)) - .catch(throwNextTick); -} - -{ - function expectedError(err) { - assert.strictEqual(this, undefined); - if (hasWriteAccessForReadonlyFile) { - assert.ifError(err); - } else { - assert.notStrictEqual(err, null); - assert.strictEqual(err.path, readOnlyFile); - } - } - fs.access(readOnlyFile, fs.W_OK, common.mustCall(expectedError)); - fs.promises.access(readOnlyFile, fs.W_OK) - .then(common.mustNotCall(), common.mustCall(expectedError)) - .catch(throwNextTick); -} - -{ - const expectedError = (err) => { - assert.strictEqual(err.code, 'ERR_INVALID_ARG_TYPE'); - assert.ok(err instanceof TypeError); - return true; - }; - assert.throws( - () => { fs.access(100, fs.F_OK, common.mustNotCall()); }, - expectedError - ); - - fs.promises.access(100, fs.F_OK) - .then(common.mustNotCall(), common.mustCall(expectedError)) - .catch(throwNextTick); -} - -assert.throws( - () => { - fs.access(__filename, fs.F_OK); - }, - { - code: 'ERR_INVALID_ARG_TYPE', - name: 'TypeError' - }); - -assert.throws( - () => { - fs.access(__filename, fs.F_OK, common.mustNotMutateObjectDeep({})); - }, - { - code: 'ERR_INVALID_ARG_TYPE', - name: 'TypeError' - }); - -// Regular access should not throw. -fs.accessSync(__filename); -const mode = fs.R_OK | fs.W_OK; -fs.accessSync(readWriteFile, mode); - -// Invalid modes should throw. -[ - false, - 1n, - { [Symbol.toPrimitive]() { return fs.R_OK; } }, - [1], - 'r', -].forEach((mode, i) => { - console.log(mode, i); - assert.throws( - () => fs.access(readWriteFile, mode, common.mustNotCall()), - { - code: 'ERR_INVALID_ARG_TYPE', - } - ); - assert.throws( - () => fs.accessSync(readWriteFile, mode), - { - code: 'ERR_INVALID_ARG_TYPE', - } - ); -}); - -// Out of range modes should throw -[ - -1, - 8, - Infinity, - NaN, -].forEach((mode, i) => { - console.log(mode, i); - assert.throws( - () => fs.access(readWriteFile, mode, common.mustNotCall()), - { - code: 'ERR_OUT_OF_RANGE', - } - ); - assert.throws( - () => fs.accessSync(readWriteFile, mode), - { - code: 'ERR_OUT_OF_RANGE', - } - ); -}); - -assert.throws( - () => { fs.accessSync(doesNotExist); }, - (err) => { - assert.strictEqual(err.code, 'ENOENT'); - assert.strictEqual(err.path, doesNotExist); - assert.strictEqual( - err.message, - `ENOENT: no such file or directory, access '${doesNotExist}'` - ); - assert.strictEqual(err.constructor, Error); - assert.strictEqual(err.syscall, 'access'); - assert.strictEqual(err.errno, UV_ENOENT); - return true; - } -); - -assert.throws( - () => { fs.accessSync(Buffer.from(doesNotExist)); }, - (err) => { - assert.strictEqual(err.code, 'ENOENT'); - assert.strictEqual(err.path, doesNotExist); - assert.strictEqual( - err.message, - `ENOENT: no such file or directory, access '${doesNotExist}'` - ); - assert.strictEqual(err.constructor, Error); - assert.strictEqual(err.syscall, 'access'); - assert.strictEqual(err.errno, UV_ENOENT); - return true; - } -); |