1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
|
/*
* Copyright (C) 2015 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <gtest/gtest.h>
#include "sysdeps.h"
#include "base/test_utils.h"
TEST(sysdeps_win32, adb_getenv) {
// Insert all test env vars before first call to adb_getenv() which will
// read the env var block only once.
ASSERT_EQ(0, _putenv("SYSDEPS_WIN32_TEST_UPPERCASE=1"));
ASSERT_EQ(0, _putenv("sysdeps_win32_test_lowercase=2"));
ASSERT_EQ(0, _putenv("Sysdeps_Win32_Test_MixedCase=3"));
// UTF-16 value
ASSERT_EQ(0, _wputenv(L"SYSDEPS_WIN32_TEST_UNICODE=\u00a1\u0048\u006f\u006c"
L"\u0061\u0021\u03b1\u03b2\u03b3\u0061\u006d\u0062"
L"\u0075\u006c\u014d\u043f\u0440\u0438\u0432\u0435"
L"\u0442"));
// Search for non-existant env vars.
EXPECT_STREQ(nullptr, adb_getenv("SYSDEPS_WIN32_TEST_NONEXISTANT"));
// Search for existing env vars.
// There is no test for an env var with a value of a zero-length string
// because _putenv() does not support inserting such an env var.
// Search for env var that is uppercase.
EXPECT_STREQ("1", adb_getenv("SYSDEPS_WIN32_TEST_UPPERCASE"));
EXPECT_STREQ("1", adb_getenv("sysdeps_win32_test_uppercase"));
EXPECT_STREQ("1", adb_getenv("Sysdeps_Win32_Test_Uppercase"));
// Search for env var that is lowercase.
EXPECT_STREQ("2", adb_getenv("SYSDEPS_WIN32_TEST_LOWERCASE"));
EXPECT_STREQ("2", adb_getenv("sysdeps_win32_test_lowercase"));
EXPECT_STREQ("2", adb_getenv("Sysdeps_Win32_Test_Lowercase"));
// Search for env var that is mixed-case.
EXPECT_STREQ("3", adb_getenv("SYSDEPS_WIN32_TEST_MIXEDCASE"));
EXPECT_STREQ("3", adb_getenv("sysdeps_win32_test_mixedcase"));
EXPECT_STREQ("3", adb_getenv("Sysdeps_Win32_Test_MixedCase"));
// Check that UTF-16 was converted to UTF-8.
EXPECT_STREQ("\xc2\xa1\x48\x6f\x6c\x61\x21\xce\xb1\xce\xb2\xce\xb3\x61\x6d"
"\x62\x75\x6c\xc5\x8d\xd0\xbf\xd1\x80\xd0\xb8\xd0\xb2\xd0\xb5"
"\xd1\x82",
adb_getenv("SYSDEPS_WIN32_TEST_UNICODE"));
// Check an env var that should always be set.
const char* path_val = adb_getenv("PATH");
EXPECT_NE(nullptr, path_val);
if (path_val != nullptr) {
EXPECT_GT(strlen(path_val), 0);
}
}
void TestAdbStrError(int err, const char* expected) {
errno = 12345;
const char* result = adb_strerror(err);
// Check that errno is not overwritten.
EXPECT_EQ(12345, errno);
EXPECT_STREQ(expected, result);
}
TEST(sysdeps_win32, adb_strerror) {
// Test an error code that should not have a mapped string. Use an error
// code that is not used by the internal implementation of adb_strerror().
TestAdbStrError(-2, "Unknown error");
// adb_strerror() uses -1 internally, so test that it can still be passed
// as a parameter.
TestAdbStrError(-1, "Unknown error");
// Test very big, positive unknown error.
TestAdbStrError(1000000, "Unknown error");
// Test success case.
TestAdbStrError(0, "No error");
// Test error that regular strerror() should have a string for.
TestAdbStrError(EPERM, "Operation not permitted");
// Test error that regular strerror() doesn't have a string for, but that
// adb_strerror() returns.
TestAdbStrError(ECONNRESET, "Connection reset by peer");
}
TEST(sysdeps_win32, unix_isatty) {
// stdin and stdout should be consoles. Use CONIN$ and CONOUT$ special files
// so that we can test this even if stdin/stdout have been redirected. Read
// permissions are required for unix_isatty().
int conin_fd = unix_open("CONIN$", O_RDONLY);
int conout_fd = unix_open("CONOUT$", O_RDWR);
for (const int fd : {conin_fd, conout_fd}) {
EXPECT_TRUE(fd >= 0);
EXPECT_EQ(1, unix_isatty(fd));
EXPECT_EQ(0, unix_close(fd));
}
// nul returns 1 from isatty(), make sure unix_isatty() corrects that.
for (auto flags : {O_RDONLY, O_RDWR}) {
int nul_fd = unix_open("nul", flags);
EXPECT_TRUE(nul_fd >= 0);
EXPECT_EQ(0, unix_isatty(nul_fd));
EXPECT_EQ(0, unix_close(nul_fd));
}
// Check a real file, both read-write and read-only.
TemporaryFile temp_file;
EXPECT_TRUE(temp_file.fd >= 0);
EXPECT_EQ(0, unix_isatty(temp_file.fd));
int temp_file_ro_fd = unix_open(temp_file.path, O_RDONLY);
EXPECT_TRUE(temp_file_ro_fd >= 0);
EXPECT_EQ(0, unix_isatty(temp_file_ro_fd));
EXPECT_EQ(0, unix_close(temp_file_ro_fd));
// Check a real OS pipe.
int pipe_fds[2];
EXPECT_EQ(0, _pipe(pipe_fds, 64, _O_BINARY));
EXPECT_EQ(0, unix_isatty(pipe_fds[0]));
EXPECT_EQ(0, unix_isatty(pipe_fds[1]));
EXPECT_EQ(0, _close(pipe_fds[0]));
EXPECT_EQ(0, _close(pipe_fds[1]));
// Make sure an invalid FD is handled correctly.
EXPECT_EQ(0, unix_isatty(-1));
}
|