mirror of
https://github.com/syncthing/syncthing.git
synced 2024-11-16 10:28:49 -07:00
932d8c69de
With this change we emulate a case sensitive filesystem on top of insensitive filesystems. This means we correctly pick up case-only renames and throw a case conflict error when there would be multiple files differing only in case. This safety check has a small performance hit (about 20% more filesystem operations when scanning for changes). The new advanced folder option `caseSensitiveFS` can be used to disable the safety checks, retaining the previous behavior on systems known to be fully case sensitive. Co-authored-by: Jakob Borg <jakob@kastelo.net>
118 lines
3.0 KiB
Go
118 lines
3.0 KiB
Go
// Copyright (C) 2016 The Syncthing Authors.
|
|
//
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
// You can obtain one at https://mozilla.org/MPL/2.0/.
|
|
|
|
package osutil_test
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
"runtime"
|
|
"testing"
|
|
|
|
"github.com/syncthing/syncthing/lib/fs"
|
|
"github.com/syncthing/syncthing/lib/osutil"
|
|
)
|
|
|
|
func TestTraversesSymlink(t *testing.T) {
|
|
tmpDir, err := ioutil.TempDir(".", ".test-TraversesSymlink-")
|
|
if err != nil {
|
|
panic("Failed to create temporary testing dir")
|
|
}
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
testFs := fs.NewFilesystem(fs.FilesystemTypeBasic, tmpDir)
|
|
testFs.MkdirAll("a/b/c", 0755)
|
|
if err = fs.DebugSymlinkForTestsOnly(testFs, testFs, filepath.Join("a", "b"), filepath.Join("a", "l")); err != nil {
|
|
if runtime.GOOS == "windows" {
|
|
t.Skip("Symlinks aren't working")
|
|
}
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// a/l -> b, so a/l/c should resolve by normal stat
|
|
info, err := testFs.Lstat("a/l/c")
|
|
if err != nil {
|
|
t.Fatal("unexpected error", err)
|
|
}
|
|
if !info.IsDir() {
|
|
t.Fatal("error in setup, a/l/c should be a directory")
|
|
}
|
|
|
|
cases := []struct {
|
|
name string
|
|
traverses bool
|
|
}{
|
|
// Exist
|
|
{".", false},
|
|
{"a", false},
|
|
{"a/b", false},
|
|
{"a/b/c", false},
|
|
// Don't exist
|
|
{"x", false},
|
|
{"a/x", false},
|
|
{"a/b/x", false},
|
|
{"a/x/c", false},
|
|
// Symlink or behind symlink
|
|
{"a/l", true},
|
|
{"a/l/c", true},
|
|
// Non-existing behind a symlink
|
|
{"a/l/x", true},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
if res := osutil.TraversesSymlink(testFs, tc.name); tc.traverses == (res == nil) {
|
|
t.Errorf("TraversesSymlink(%q) = %v, should be %v", tc.name, res, tc.traverses)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestIssue4875(t *testing.T) {
|
|
tmpDir, err := ioutil.TempDir("", ".test-Issue4875-")
|
|
if err != nil {
|
|
panic("Failed to create temporary testing dir")
|
|
}
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
testFs := fs.NewFilesystem(fs.FilesystemTypeBasic, tmpDir)
|
|
testFs.MkdirAll(filepath.Join("a", "b", "c"), 0755)
|
|
if err = fs.DebugSymlinkForTestsOnly(testFs, testFs, filepath.Join("a", "b"), filepath.Join("a", "l")); err != nil {
|
|
if runtime.GOOS == "windows" {
|
|
t.Skip("Symlinks aren't working")
|
|
}
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// a/l -> b, so a/l/c should resolve by normal stat
|
|
info, err := testFs.Lstat("a/l/c")
|
|
if err != nil {
|
|
t.Fatal("unexpected error", err)
|
|
}
|
|
if !info.IsDir() {
|
|
t.Fatal("error in setup, a/l/c should be a directory")
|
|
}
|
|
|
|
testFs = fs.NewFilesystem(fs.FilesystemTypeBasic, filepath.Join(tmpDir, "a/l"))
|
|
if err := osutil.TraversesSymlink(testFs, "."); err != nil {
|
|
t.Error(`TraversesSymlink on filesystem with symlink at root returned error for ".":`, err)
|
|
}
|
|
}
|
|
|
|
var traversesSymlinkResult error
|
|
|
|
func BenchmarkTraversesSymlink(b *testing.B) {
|
|
os.RemoveAll("testdata")
|
|
defer os.RemoveAll("testdata")
|
|
fs := fs.NewFilesystem(fs.FilesystemTypeBasic, "testdata")
|
|
fs.MkdirAll("a/b/c", 0755)
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
traversesSymlinkResult = osutil.TraversesSymlink(fs, "a/b/c")
|
|
}
|
|
|
|
b.ReportAllocs()
|
|
}
|