PNG  IHDRX cHRMz&u0`:pQ<bKGD pHYsodtIME MeqIDATxw]Wug^Qd˶ 6`!N:!@xI~)%7%@Bh&`lnjVF29gΨ4E$|>cɚ{gk= %,a KX%,a KX%,a KX%,a KX%,a KX%,a KX%, b` ǟzeאfp]<!SJmɤY޲ڿ,%c ~ع9VH.!Ͳz&QynֺTkRR.BLHi٪:l;@(!MԴ=žI,:o&N'Kù\vRmJ雵֫AWic H@" !: Cé||]k-Ha oݜ:y F())u]aG7*JV@J415p=sZH!=!DRʯvɱh~V\}v/GKY$n]"X"}t@ xS76^[bw4dsce)2dU0 CkMa-U5tvLƀ~mlMwfGE/-]7XAƟ`׮g ewxwC4\[~7@O-Q( a*XGƒ{ ՟}$_y3tĐƤatgvێi|K=uVyrŲlLӪuܿzwk$m87k( `múcE)"@rK( z4$D; 2kW=Xb$V[Ru819קR~qloѱDyįݎ*mxw]y5e4K@ЃI0A D@"BDk_)N\8͜9dz"fK0zɿvM /.:2O{ Nb=M=7>??Zuo32 DLD@D| &+֎C #B8ַ`bOb $D#ͮҪtx]%`ES`Ru[=¾!@Od37LJ0!OIR4m]GZRJu$‡c=%~s@6SKy?CeIh:[vR@Lh | (BhAMy=݃  G"'wzn޺~8ԽSh ~T*A:xR[ܹ?X[uKL_=fDȊ؂p0}7=D$Ekq!/t.*2ʼnDbŞ}DijYaȲ(""6HA;:LzxQ‘(SQQ}*PL*fc\s `/d'QXW, e`#kPGZuŞuO{{wm[&NBTiiI0bukcA9<4@SӊH*؎4U/'2U5.(9JuDfrޱtycU%j(:RUbArLֺN)udA':uGQN"-"Is.*+k@ `Ojs@yU/ H:l;@yyTn}_yw!VkRJ4P)~y#)r,D =ě"Q]ci'%HI4ZL0"MJy 8A{ aN<8D"1#IJi >XjX֔#@>-{vN!8tRݻ^)N_╗FJEk]CT՟ YP:_|H1@ CBk]yKYp|og?*dGvzنzӴzjֺNkC~AbZƷ`.H)=!QͷVTT(| u78y֮}|[8-Vjp%2JPk[}ԉaH8Wpqhwr:vWª<}l77_~{s۴V+RCģ%WRZ\AqHifɤL36: #F:p]Bq/z{0CU6ݳEv_^k7'>sq*+kH%a`0ԣisqにtү04gVgW΂iJiS'3w.w}l6MC2uԯ|>JF5`fV5m`Y**Db1FKNttu]4ccsQNnex/87+}xaUW9y>ͯ骵G{䩓Գ3+vU}~jJ.NFRD7<aJDB1#ҳgSb,+CS?/ VG J?|?,2#M9}B)MiE+G`-wo߫V`fio(}S^4e~V4bHOYb"b#E)dda:'?}׮4繏`{7Z"uny-?ǹ;0MKx{:_pÚmFמ:F " .LFQLG)Q8qN q¯¯3wOvxDb\. BKD9_NN &L:4D{mm o^tֽ:q!ƥ}K+<"m78N< ywsard5+вz~mnG)=}lYݧNj'QJS{S :UYS-952?&O-:W}(!6Mk4+>A>j+i|<<|;ر^߉=HE|V#F)Emm#}/"y GII웻Jі94+v뾧xu~5C95~ūH>c@덉pʃ1/4-A2G%7>m;–Y,cyyaln" ?ƻ!ʪ<{~h~i y.zZB̃/,雋SiC/JFMmBH&&FAbϓO^tubbb_hZ{_QZ-sύodFgO(6]TJA˯#`۶ɟ( %$&+V'~hiYy>922 Wp74Zkq+Ovn錄c>8~GqܲcWꂎz@"1A.}T)uiW4="jJ2W7mU/N0gcqܗOO}?9/wìXžΏ0 >֩(V^Rh32!Hj5`;O28؇2#ݕf3 ?sJd8NJ@7O0 b־?lldщ̡&|9C.8RTWwxWy46ah嘦mh٤&l zCy!PY?: CJyв]dm4ǜҐR޻RլhX{FƯanшQI@x' ao(kUUuxW_Ñ줮[w8 FRJ(8˼)_mQ _!RJhm=!cVmm ?sFOnll6Qk}alY}; "baӌ~M0w,Ggw2W:G/k2%R,_=u`WU R.9T"v,<\Ik޽/2110Ӿxc0gyC&Ny޽JҢrV6N ``یeA16"J³+Rj*;BϜkZPJaÍ<Jyw:NP8/D$ 011z֊Ⱳ3ι֘k1V_"h!JPIΣ'ɜ* aEAd:ݺ>y<}Lp&PlRfTb1]o .2EW\ͮ]38؋rTJsǏP@芎sF\> P^+dYJLbJ C-xϐn> ι$nj,;Ǖa FU *择|h ~izť3ᤓ`K'-f tL7JK+vf2)V'-sFuB4i+m+@My=O҈0"|Yxoj,3]:cо3 $#uŘ%Y"y죯LebqtҢVzq¼X)~>4L׶m~[1_k?kxֺQ`\ |ٛY4Ѯr!)N9{56(iNq}O()Em]=F&u?$HypWUeB\k]JɩSع9 Zqg4ZĊo oMcjZBU]B\TUd34ݝ~:7ڶSUsB0Z3srx 7`:5xcx !qZA!;%͚7&P H<WL!džOb5kF)xor^aujƍ7 Ǡ8/p^(L>ὴ-B,{ۇWzֺ^k]3\EE@7>lYBȝR.oHnXO/}sB|.i@ɥDB4tcm,@ӣgdtJ!lH$_vN166L__'Z)y&kH;:,Y7=J 9cG) V\hjiE;gya~%ks_nC~Er er)muuMg2;֫R)Md) ,¶ 2-wr#F7<-BBn~_(o=KO㭇[Xv eN_SMgSҐ BS헃D%g_N:/pe -wkG*9yYSZS.9cREL !k}<4_Xs#FmҶ:7R$i,fi!~' # !6/S6y@kZkZcX)%5V4P]VGYq%H1!;e1MV<!ϐHO021Dp= HMs~~a)ަu7G^];git!Frl]H/L$=AeUvZE4P\.,xi {-~p?2b#amXAHq)MWǾI_r`S Hz&|{ +ʖ_= (YS(_g0a03M`I&'9vl?MM+m~}*xT۲(fY*V4x@29s{DaY"toGNTO+xCAO~4Ϳ;p`Ѫ:>Ҵ7K 3}+0 387x\)a"/E>qpWB=1 ¨"MP(\xp߫́A3+J] n[ʼnӼaTbZUWb={~2ooKױӰp(CS\S筐R*JغV&&"FA}J>G֐p1ٸbk7 ŘH$JoN <8s^yk_[;gy-;߉DV{c B yce% aJhDȶ 2IdйIB/^n0tNtџdcKj4϶v~- CBcgqx9= PJ) dMsjpYB] GD4RDWX +h{y`,3ꊕ$`zj*N^TP4L:Iz9~6s) Ga:?y*J~?OrMwP\](21sZUD ?ܟQ5Q%ggW6QdO+\@ ̪X'GxN @'4=ˋ+*VwN ne_|(/BDfj5(Dq<*tNt1х!MV.C0 32b#?n0pzj#!38}޴o1KovCJ`8ŗ_"]] rDUy޲@ Ȗ-;xџ'^Y`zEd?0„ DAL18IS]VGq\4o !swV7ˣι%4FѮ~}6)OgS[~Q vcYbL!wG3 7띸*E Pql8=jT\꘿I(z<[6OrR8ºC~ډ]=rNl[g|v TMTղb-o}OrP^Q]<98S¤!k)G(Vkwyqyr޽Nv`N/e p/~NAOk \I:G6]4+K;j$R:Mi #*[AȚT,ʰ,;N{HZTGMoּy) ]%dHء9Պ䠬|<45,\=[bƟ8QXeB3- &dҩ^{>/86bXmZ]]yޚN[(WAHL$YAgDKp=5GHjU&99v簪C0vygln*P)9^͞}lMuiH!̍#DoRBn9l@ xA/_v=ȺT{7Yt2N"4!YN`ae >Q<XMydEB`VU}u]嫇.%e^ánE87Mu\t`cP=AD/G)sI"@MP;)]%fH9'FNsj1pVhY&9=0pfuJ&gޤx+k:!r˭wkl03׼Ku C &ѓYt{.O.zҏ z}/tf_wEp2gvX)GN#I ݭ߽v/ .& и(ZF{e"=V!{zW`, ]+LGz"(UJp|j( #V4, 8B 0 9OkRrlɱl94)'VH9=9W|>PS['G(*I1==C<5"Pg+x'K5EMd؞Af8lG ?D FtoB[je?{k3zQ vZ;%Ɠ,]E>KZ+T/ EJxOZ1i #T<@ I}q9/t'zi(EMqw`mYkU6;[t4DPeckeM;H}_g pMww}k6#H㶏+b8雡Sxp)&C $@'b,fPߑt$RbJ'vznuS ~8='72_`{q纶|Q)Xk}cPz9p7O:'|G~8wx(a 0QCko|0ASD>Ip=4Q, d|F8RcU"/KM opKle M3#i0c%<7׿p&pZq[TR"BpqauIp$ 8~Ĩ!8Սx\ւdT>>Z40ks7 z2IQ}ItԀ<-%S⍤};zIb$I 5K}Q͙D8UguWE$Jh )cu4N tZl+[]M4k8֦Zeq֮M7uIqG 1==tLtR,ƜSrHYt&QP윯Lg' I,3@P'}'R˪e/%-Auv·ñ\> vDJzlӾNv5:|K/Jb6KI9)Zh*ZAi`?S {aiVDԲuy5W7pWeQJk֤#5&V<̺@/GH?^τZL|IJNvI:'P=Ϛt"¨=cud S Q.Ki0 !cJy;LJR;G{BJy޺[^8fK6)=yʊ+(k|&xQ2`L?Ȓ2@Mf 0C`6-%pKpm')c$׻K5[J*U[/#hH!6acB JA _|uMvDyk y)6OPYjœ50VT K}cǻP[ $:]4MEA.y)|B)cf-A?(e|lɉ#P9V)[9t.EiQPDѠ3ϴ;E:+Օ t ȥ~|_N2,ZJLt4! %ա]u {+=p.GhNcŞQI?Nd'yeh n7zi1DB)1S | S#ًZs2|Ɛy$F SxeX{7Vl.Src3E℃Q>b6G ўYCmtկ~=K0f(=LrAS GN'ɹ9<\!a`)֕y[uՍ[09` 9 +57ts6}b4{oqd+J5fa/,97J#6yν99mRWxJyѡyu_TJc`~W>l^q#Ts#2"nD1%fS)FU w{ܯ R{ ˎ󅃏џDsZSQS;LV;7 Od1&1n$ N /.q3~eNɪ]E#oM~}v֯FڦwyZ=<<>Xo稯lfMFV6p02|*=tV!c~]fa5Y^Q_WN|Vs 0ҘދU97OI'N2'8N֭fgg-}V%y]U4 峧p*91#9U kCac_AFңĪy뚇Y_AiuYyTTYЗ-(!JFLt›17uTozc. S;7A&&<ԋ5y;Ro+:' *eYJkWR[@F %SHWP 72k4 qLd'J "zB6{AC0ƁA6U.'F3:Ȅ(9ΜL;D]m8ڥ9}dU "v!;*13Rg^fJyShyy5auA?ɩGHRjo^]׽S)Fm\toy 4WQS@mE#%5ʈfFYDX ~D5Ϡ9tE9So_aU4?Ѽm%&c{n>.KW1Tlb}:j uGi(JgcYj0qn+>) %\!4{LaJso d||u//P_y7iRJ߬nHOy) l+@$($VFIQ9%EeKʈU. ia&FY̒mZ=)+qqoQn >L!qCiDB;Y<%} OgBxB!ØuG)WG9y(Ą{_yesuZmZZey'Wg#C~1Cev@0D $a@˲(.._GimA:uyw֬%;@!JkQVM_Ow:P.s\)ot- ˹"`B,e CRtaEUP<0'}r3[>?G8xU~Nqu;Wm8\RIkբ^5@k+5(By'L&'gBJ3ݶ!/㮻w҅ yqPWUg<e"Qy*167΃sJ\oz]T*UQ<\FԎ`HaNmڜ6DysCask8wP8y9``GJ9lF\G g's Nn͵MLN֪u$| /|7=]O)6s !ĴAKh]q_ap $HH'\1jB^s\|- W1:=6lJBqjY^LsPk""`]w)󭃈,(HC ?䔨Y$Sʣ{4Z+0NvQkhol6C.婧/u]FwiVjZka&%6\F*Ny#8O,22+|Db~d ~Çwc N:FuuCe&oZ(l;@ee-+Wn`44AMK➝2BRՈt7g*1gph9N) *"TF*R(#'88pm=}X]u[i7bEc|\~EMn}P瘊J)K.0i1M6=7'_\kaZ(Th{K*GJyytw"IO-PWJk)..axӝ47"89Cc7ĐBiZx 7m!fy|ϿF9CbȩV 9V-՛^pV̌ɄS#Bv4-@]Vxt-Z, &ֺ*diؠ2^VXbs֔Ìl.jQ]Y[47gj=幽ex)A0ip׳ W2[ᎇhuE^~q흙L} #-b۸oFJ_QP3r6jr+"nfzRJTUqoaۍ /$d8Mx'ݓ= OՃ| )$2mcM*cЙj}f };n YG w0Ia!1Q.oYfr]DyISaP}"dIӗթO67jqR ҊƐƈaɤGG|h;t]䗖oSv|iZqX)oalv;۩meEJ\!8=$4QU4Xo&VEĊ YS^E#d,yX_> ۘ-e\ "Wa6uLĜZi`aD9.% w~mB(02G[6y.773a7 /=o7D)$Z 66 $bY^\CuP. (x'"J60׿Y:Oi;F{w佩b+\Yi`TDWa~|VH)8q/=9!g߆2Y)?ND)%?Ǐ`k/sn:;O299yB=a[Ng 3˲N}vLNy;*?x?~L&=xyӴ~}q{qE*IQ^^ͧvü{Huu=R|>JyUlZV, B~/YF!Y\u_ݼF{_C)LD]m {H 0ihhadd nUkf3oٺCvE\)QJi+֥@tDJkB$1!Đr0XQ|q?d2) Ӣ_}qv-< FŊ߫%roppVBwü~JidY4:}L6M7f٬F "?71<2#?Jyy4뷢<_a7_=Q E=S1И/9{+93֮E{ǂw{))?maÆm(uLE#lïZ  ~d];+]h j?!|$F}*"4(v'8s<ŏUkm7^7no1w2ؗ}TrͿEk>p'8OB7d7R(A 9.*Mi^ͳ; eeUwS+C)uO@ =Sy]` }l8^ZzRXj[^iUɺ$tj))<sbDJfg=Pk_{xaKo1:-uyG0M ԃ\0Lvuy'ȱc2Ji AdyVgVh!{]/&}}ċJ#%d !+87<;qN޼Nفl|1N:8ya  8}k¾+-$4FiZYÔXk*I&'@iI99)HSh4+2G:tGhS^繿 Kتm0 вDk}֚+QT4;sC}rՅE,8CX-e~>G&'9xpW,%Fh,Ry56Y–hW-(v_,? ; qrBk4-V7HQ;ˇ^Gv1JVV%,ik;D_W!))+BoS4QsTM;gt+ndS-~:11Sgv!0qRVh!"Ȋ(̦Yl.]PQWgٳE'`%W1{ndΗBk|Ž7ʒR~,lnoa&:ü$ 3<a[CBݮwt"o\ePJ=Hz"_c^Z.#ˆ*x z̝grY]tdkP*:97YľXyBkD4N.C_[;F9`8& !AMO c `@BA& Ost\-\NX+Xp < !bj3C&QL+*&kAQ=04}cC!9~820G'PC9xa!w&bo_1 Sw"ܱ V )Yl3+ס2KoXOx]"`^WOy :3GO0g;%Yv㐫(R/r (s } u B &FeYZh0y> =2<Ϟc/ -u= c&׭,.0"g"7 6T!vl#sc>{u/Oh Bᾈ)۴74]x7 gMӒ"d]U)}" v4co[ ɡs 5Gg=XR14?5A}D "b{0$L .\4y{_fe:kVS\\O]c^W52LSBDM! C3Dhr̦RtArx4&agaN3Cf<Ԉp4~ B'"1@.b_/xQ} _߃҉/gٓ2Qkqp0շpZ2fԫYz< 4L.Cyυι1t@鎫Fe sYfsF}^ V}N<_`p)alٶ "(XEAVZ<)2},:Ir*#m_YӼ R%a||EƼIJ,,+f"96r/}0jE/)s)cjW#w'Sʯ5<66lj$a~3Kʛy 2:cZ:Yh))+a߭K::N,Q F'qB]={.]h85C9cr=}*rk?vwV렵ٸW Rs%}rNAkDv|uFLBkWY YkX מ|)1!$#3%y?pF<@<Rr0}: }\J [5FRxY<9"SQdE(Q*Qʻ)q1E0B_O24[U'],lOb ]~WjHޏTQ5Syu wq)xnw8~)c 쫬gٲߠ H% k5dƝk> kEj,0% b"vi2Wس_CuK)K{n|>t{P1򨾜j>'kEkƗBg*H%'_aY6Bn!TL&ɌOb{c`'d^{t\i^[uɐ[}q0lM˕G:‚4kb祔c^:?bpg… +37stH:0}en6x˟%/<]BL&* 5&fK9Mq)/iyqtA%kUe[ڛKN]Ě^,"`/ s[EQQm?|XJ߅92m]G.E΃ח U*Cn.j_)Tѧj̿30ڇ!A0=͜ar I3$C^-9#|pk!)?7.x9 @OO;WƝZBFU keZ75F6Tc6"ZȚs2y/1 ʵ:u4xa`C>6Rb/Yм)^=+~uRd`/|_8xbB0?Ft||Z\##|K 0>>zxv8۴吅q 8ĥ)"6>~\8:qM}#͚'ĉ#p\׶ l#bA?)|g g9|8jP(cr,BwV (WliVxxᡁ@0Okn;ɥh$_ckCgriv}>=wGzβ KkBɛ[˪ !J)h&k2%07δt}!d<9;I&0wV/ v 0<H}L&8ob%Hi|޶o&h1L|u֦y~󛱢8fٲUsւ)0oiFx2}X[zVYr_;N(w]_4B@OanC?gĦx>мgx>ΛToZoOMp>40>V Oy V9iq!4 LN,ˢu{jsz]|"R޻&'ƚ{53ўFu(<٪9:΋]B;)B>1::8;~)Yt|0(pw2N%&X,URBK)3\zz&}ax4;ǟ(tLNg{N|Ǽ\G#C9g$^\}p?556]/RP.90 k,U8/u776s ʪ_01چ|\N 0VV*3H鴃J7iI!wG_^ypl}r*jɤSR 5QN@ iZ#1ٰy;_\3\BQQ x:WJv츟ٯ$"@6 S#qe딇(/P( Dy~TOϻ<4:-+F`0||;Xl-"uw$Цi󼕝mKʩorz"mϺ$F:~E'ҐvD\y?Rr8_He@ e~O,T.(ފR*cY^m|cVR[8 JҡSm!ΆԨb)RHG{?MpqrmN>߶Y)\p,d#xۆWY*,l6]v0h15M˙MS8+EdI='LBJIH7_9{Caз*Lq,dt >+~ّeʏ?xԕ4bBAŚjﵫ!'\Ը$WNvKO}ӽmSşذqsOy?\[,d@'73'j%kOe`1.g2"e =YIzS2|zŐƄa\U,dP;jhhhaxǶ?КZ՚.q SE+XrbOu%\GتX(H,N^~]JyEZQKceTQ]VGYqnah;y$cQahT&QPZ*iZ8UQQM.qo/T\7X"u?Mttl2Xq(IoW{R^ ux*SYJ! 4S.Jy~ BROS[V|žKNɛP(L6V^|cR7i7nZW1Fd@ Ara{詑|(T*dN]Ko?s=@ |_EvF]׍kR)eBJc" MUUbY6`~V޴dJKß&~'d3i WWWWWW
Current Directory: /opt/golang/1.22.0/src/os
Viewing File: /opt/golang/1.22.0/src/os/os_windows_test.go
// Copyright 2014 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package os_test import ( "errors" "fmt" "internal/poll" "internal/syscall/windows" "internal/syscall/windows/registry" "internal/testenv" "io" "io/fs" "os" "os/exec" "path/filepath" "reflect" "runtime" "slices" "sort" "strings" "syscall" "testing" "unicode/utf16" "unsafe" ) // For TestRawConnReadWrite. type syscallDescriptor = syscall.Handle // chdir changes the current working directory to the named directory, // and then restore the original working directory at the end of the test. func chdir(t *testing.T, dir string) { olddir, err := os.Getwd() if err != nil { t.Fatalf("chdir: %v", err) } if err := os.Chdir(dir); err != nil { t.Fatalf("chdir %s: %v", dir, err) } t.Cleanup(func() { if err := os.Chdir(olddir); err != nil { t.Errorf("chdir to original working directory %s: %v", olddir, err) os.Exit(1) } }) } func TestSameWindowsFile(t *testing.T) { temp := t.TempDir() chdir(t, temp) f, err := os.Create("a") if err != nil { t.Fatal(err) } f.Close() ia1, err := os.Stat("a") if err != nil { t.Fatal(err) } path, err := filepath.Abs("a") if err != nil { t.Fatal(err) } ia2, err := os.Stat(path) if err != nil { t.Fatal(err) } if !os.SameFile(ia1, ia2) { t.Errorf("files should be same") } p := filepath.VolumeName(path) + filepath.Base(path) if err != nil { t.Fatal(err) } ia3, err := os.Stat(p) if err != nil { t.Fatal(err) } if !os.SameFile(ia1, ia3) { t.Errorf("files should be same") } } type dirLinkTest struct { name string mklink func(link, target string) error issueNo int // correspondent issue number (for broken tests) } func testDirLinks(t *testing.T, tests []dirLinkTest) { tmpdir := t.TempDir() chdir(t, tmpdir) dir := filepath.Join(tmpdir, "dir") err := os.Mkdir(dir, 0777) if err != nil { t.Fatal(err) } fi, err := os.Stat(dir) if err != nil { t.Fatal(err) } err = os.WriteFile(filepath.Join(dir, "abc"), []byte("abc"), 0644) if err != nil { t.Fatal(err) } for _, test := range tests { link := filepath.Join(tmpdir, test.name+"_link") err := test.mklink(link, dir) if err != nil { t.Errorf("creating link for %q test failed: %v", test.name, err) continue } data, err := os.ReadFile(filepath.Join(link, "abc")) if err != nil { t.Errorf("failed to read abc file: %v", err) continue } if string(data) != "abc" { t.Errorf(`abc file is expected to have "abc" in it, but has %v`, data) continue } if test.issueNo > 0 { t.Logf("skipping broken %q test: see issue %d", test.name, test.issueNo) continue } fi1, err := os.Stat(link) if err != nil { t.Errorf("failed to stat link %v: %v", link, err) continue } if !fi1.IsDir() { t.Errorf("%q should be a directory", link) continue } if fi1.Name() != filepath.Base(link) { t.Errorf("Stat(%q).Name() = %q, want %q", link, fi1.Name(), filepath.Base(link)) continue } if !os.SameFile(fi, fi1) { t.Errorf("%q should point to %q", link, dir) continue } fi2, err := os.Lstat(link) if err != nil { t.Errorf("failed to lstat link %v: %v", link, err) continue } if m := fi2.Mode(); m&fs.ModeSymlink == 0 { t.Errorf("%q should be a link, but is not (mode=0x%x)", link, uint32(m)) continue } if m := fi2.Mode(); m&fs.ModeDir != 0 { t.Errorf("%q should be a link, not a directory (mode=0x%x)", link, uint32(m)) continue } } } // reparseData is used to build reparse buffer data required for tests. type reparseData struct { substituteName namePosition printName namePosition pathBuf []uint16 } type namePosition struct { offset uint16 length uint16 } func (rd *reparseData) addUTF16s(s []uint16) (offset uint16) { off := len(rd.pathBuf) * 2 rd.pathBuf = append(rd.pathBuf, s...) return uint16(off) } func (rd *reparseData) addString(s string) (offset, length uint16) { p := syscall.StringToUTF16(s) return rd.addUTF16s(p), uint16(len(p)-1) * 2 // do not include terminating NUL in the length (as per PrintNameLength and SubstituteNameLength documentation) } func (rd *reparseData) addSubstituteName(name string) { rd.substituteName.offset, rd.substituteName.length = rd.addString(name) } func (rd *reparseData) addPrintName(name string) { rd.printName.offset, rd.printName.length = rd.addString(name) } func (rd *reparseData) addStringNoNUL(s string) (offset, length uint16) { p := syscall.StringToUTF16(s) p = p[:len(p)-1] return rd.addUTF16s(p), uint16(len(p)) * 2 } func (rd *reparseData) addSubstituteNameNoNUL(name string) { rd.substituteName.offset, rd.substituteName.length = rd.addStringNoNUL(name) } func (rd *reparseData) addPrintNameNoNUL(name string) { rd.printName.offset, rd.printName.length = rd.addStringNoNUL(name) } // pathBuffeLen returns length of rd pathBuf in bytes. func (rd *reparseData) pathBuffeLen() uint16 { return uint16(len(rd.pathBuf)) * 2 } // Windows REPARSE_DATA_BUFFER contains union member, and cannot be // translated into Go directly. _REPARSE_DATA_BUFFER type is to help // construct alternative versions of Windows REPARSE_DATA_BUFFER with // union part of SymbolicLinkReparseBuffer or MountPointReparseBuffer type. type _REPARSE_DATA_BUFFER struct { header windows.REPARSE_DATA_BUFFER_HEADER detail [syscall.MAXIMUM_REPARSE_DATA_BUFFER_SIZE]byte } func createDirLink(link string, rdb *_REPARSE_DATA_BUFFER) error { err := os.Mkdir(link, 0777) if err != nil { return err } linkp := syscall.StringToUTF16(link) fd, err := syscall.CreateFile(&linkp[0], syscall.GENERIC_WRITE, 0, nil, syscall.OPEN_EXISTING, syscall.FILE_FLAG_OPEN_REPARSE_POINT|syscall.FILE_FLAG_BACKUP_SEMANTICS, 0) if err != nil { return err } defer syscall.CloseHandle(fd) buflen := uint32(rdb.header.ReparseDataLength) + uint32(unsafe.Sizeof(rdb.header)) var bytesReturned uint32 return syscall.DeviceIoControl(fd, windows.FSCTL_SET_REPARSE_POINT, (*byte)(unsafe.Pointer(&rdb.header)), buflen, nil, 0, &bytesReturned, nil) } func createMountPoint(link string, target *reparseData) error { var buf *windows.MountPointReparseBuffer buflen := uint16(unsafe.Offsetof(buf.PathBuffer)) + target.pathBuffeLen() // see ReparseDataLength documentation byteblob := make([]byte, buflen) buf = (*windows.MountPointReparseBuffer)(unsafe.Pointer(&byteblob[0])) buf.SubstituteNameOffset = target.substituteName.offset buf.SubstituteNameLength = target.substituteName.length buf.PrintNameOffset = target.printName.offset buf.PrintNameLength = target.printName.length pbuflen := len(target.pathBuf) copy((*[2048]uint16)(unsafe.Pointer(&buf.PathBuffer[0]))[:pbuflen:pbuflen], target.pathBuf) var rdb _REPARSE_DATA_BUFFER rdb.header.ReparseTag = windows.IO_REPARSE_TAG_MOUNT_POINT rdb.header.ReparseDataLength = buflen copy(rdb.detail[:], byteblob) return createDirLink(link, &rdb) } func TestDirectoryJunction(t *testing.T) { var tests = []dirLinkTest{ { // Create link similar to what mklink does, by inserting \??\ at the front of absolute target. name: "standard", mklink: func(link, target string) error { var t reparseData t.addSubstituteName(`\??\` + target) t.addPrintName(target) return createMountPoint(link, &t) }, }, { // Do as junction utility https://learn.microsoft.com/en-us/sysinternals/downloads/junction does - set PrintNameLength to 0. name: "have_blank_print_name", mklink: func(link, target string) error { var t reparseData t.addSubstituteName(`\??\` + target) t.addPrintName("") return createMountPoint(link, &t) }, }, } output, _ := testenv.Command(t, "cmd", "/c", "mklink", "/?").Output() mklinkSupportsJunctionLinks := strings.Contains(string(output), " /J ") if mklinkSupportsJunctionLinks { tests = append(tests, dirLinkTest{ name: "use_mklink_cmd", mklink: func(link, target string) error { output, err := testenv.Command(t, "cmd", "/c", "mklink", "/J", link, target).CombinedOutput() if err != nil { t.Errorf("failed to run mklink %v %v: %v %q", link, target, err, output) } return nil }, }, ) } else { t.Log(`skipping "use_mklink_cmd" test, mklink does not supports directory junctions`) } testDirLinks(t, tests) } func enableCurrentThreadPrivilege(privilegeName string) error { ct, err := windows.GetCurrentThread() if err != nil { return err } var t syscall.Token err = windows.OpenThreadToken(ct, syscall.TOKEN_QUERY|windows.TOKEN_ADJUST_PRIVILEGES, false, &t) if err != nil { return err } defer syscall.CloseHandle(syscall.Handle(t)) var tp windows.TOKEN_PRIVILEGES privStr, err := syscall.UTF16PtrFromString(privilegeName) if err != nil { return err } err = windows.LookupPrivilegeValue(nil, privStr, &tp.Privileges[0].Luid) if err != nil { return err } tp.PrivilegeCount = 1 tp.Privileges[0].Attributes = windows.SE_PRIVILEGE_ENABLED return windows.AdjustTokenPrivileges(t, false, &tp, 0, nil, nil) } func createSymbolicLink(link string, target *reparseData, isrelative bool) error { var buf *windows.SymbolicLinkReparseBuffer buflen := uint16(unsafe.Offsetof(buf.PathBuffer)) + target.pathBuffeLen() // see ReparseDataLength documentation byteblob := make([]byte, buflen) buf = (*windows.SymbolicLinkReparseBuffer)(unsafe.Pointer(&byteblob[0])) buf.SubstituteNameOffset = target.substituteName.offset buf.SubstituteNameLength = target.substituteName.length buf.PrintNameOffset = target.printName.offset buf.PrintNameLength = target.printName.length if isrelative { buf.Flags = windows.SYMLINK_FLAG_RELATIVE } pbuflen := len(target.pathBuf) copy((*[2048]uint16)(unsafe.Pointer(&buf.PathBuffer[0]))[:pbuflen:pbuflen], target.pathBuf) var rdb _REPARSE_DATA_BUFFER rdb.header.ReparseTag = syscall.IO_REPARSE_TAG_SYMLINK rdb.header.ReparseDataLength = buflen copy(rdb.detail[:], byteblob) return createDirLink(link, &rdb) } func TestDirectorySymbolicLink(t *testing.T) { var tests []dirLinkTest output, _ := testenv.Command(t, "cmd", "/c", "mklink", "/?").Output() mklinkSupportsDirectorySymbolicLinks := strings.Contains(string(output), " /D ") if mklinkSupportsDirectorySymbolicLinks { tests = append(tests, dirLinkTest{ name: "use_mklink_cmd", mklink: func(link, target string) error { output, err := testenv.Command(t, "cmd", "/c", "mklink", "/D", link, target).CombinedOutput() if err != nil { t.Errorf("failed to run mklink %v %v: %v %q", link, target, err, output) } return nil }, }, ) } else { t.Log(`skipping "use_mklink_cmd" test, mklink does not supports directory symbolic links`) } // The rest of these test requires SeCreateSymbolicLinkPrivilege to be held. runtime.LockOSThread() defer runtime.UnlockOSThread() err := windows.ImpersonateSelf(windows.SecurityImpersonation) if err != nil { t.Fatal(err) } defer windows.RevertToSelf() err = enableCurrentThreadPrivilege("SeCreateSymbolicLinkPrivilege") if err != nil { t.Skipf(`skipping some tests, could not enable "SeCreateSymbolicLinkPrivilege": %v`, err) } tests = append(tests, dirLinkTest{ name: "use_os_pkg", mklink: func(link, target string) error { return os.Symlink(target, link) }, }, dirLinkTest{ // Create link similar to what mklink does, by inserting \??\ at the front of absolute target. name: "standard", mklink: func(link, target string) error { var t reparseData t.addPrintName(target) t.addSubstituteName(`\??\` + target) return createSymbolicLink(link, &t, false) }, }, dirLinkTest{ name: "relative", mklink: func(link, target string) error { var t reparseData t.addSubstituteNameNoNUL(filepath.Base(target)) t.addPrintNameNoNUL(filepath.Base(target)) return createSymbolicLink(link, &t, true) }, }, ) testDirLinks(t, tests) } func mustHaveWorkstation(t *testing.T) { mar, err := windows.OpenSCManager(nil, nil, windows.SERVICE_QUERY_STATUS) if err != nil { return } defer syscall.CloseHandle(mar) //LanmanWorkstation is the service name, and Workstation is the display name. srv, err := windows.OpenService(mar, syscall.StringToUTF16Ptr("LanmanWorkstation"), windows.SERVICE_QUERY_STATUS) if err != nil { return } defer syscall.CloseHandle(srv) var state windows.SERVICE_STATUS err = windows.QueryServiceStatus(srv, &state) if err != nil { return } if state.CurrentState != windows.SERVICE_RUNNING { t.Skip("Requires the Windows service Workstation, but it is detected that it is not enabled.") } } func TestNetworkSymbolicLink(t *testing.T) { testenv.MustHaveSymlink(t) const _NERR_ServerNotStarted = syscall.Errno(2114) dir := t.TempDir() chdir(t, dir) pid := os.Getpid() shareName := fmt.Sprintf("GoSymbolicLinkTestShare%d", pid) sharePath := filepath.Join(dir, shareName) testDir := "TestDir" err := os.MkdirAll(filepath.Join(sharePath, testDir), 0777) if err != nil { t.Fatal(err) } wShareName, err := syscall.UTF16PtrFromString(shareName) if err != nil { t.Fatal(err) } wSharePath, err := syscall.UTF16PtrFromString(sharePath) if err != nil { t.Fatal(err) } // Per https://learn.microsoft.com/en-us/windows/win32/api/lmshare/ns-lmshare-share_info_2: // // “[The shi2_permissions field] indicates the shared resource's permissions // for servers running with share-level security. A server running user-level // security ignores this member. // … // Note that Windows does not support share-level security.” // // So it shouldn't matter what permissions we set here. const permissions = 0 p := windows.SHARE_INFO_2{ Netname: wShareName, Type: windows.STYPE_DISKTREE | windows.STYPE_TEMPORARY, Remark: nil, Permissions: permissions, MaxUses: 1, CurrentUses: 0, Path: wSharePath, Passwd: nil, } err = windows.NetShareAdd(nil, 2, (*byte)(unsafe.Pointer(&p)), nil) if err != nil { if err == syscall.ERROR_ACCESS_DENIED || err == _NERR_ServerNotStarted { t.Skipf("skipping: NetShareAdd: %v", err) } t.Fatal(err) } defer func() { err := windows.NetShareDel(nil, wShareName, 0) if err != nil { t.Fatal(err) } }() UNCPath := `\\localhost\` + shareName + `\` fi1, err := os.Stat(sharePath) if err != nil { t.Fatal(err) } fi2, err := os.Stat(UNCPath) if err != nil { mustHaveWorkstation(t) t.Fatal(err) } if !os.SameFile(fi1, fi2) { t.Fatalf("%q and %q should be the same directory, but not", sharePath, UNCPath) } target := filepath.Join(UNCPath, testDir) link := "link" err = os.Symlink(target, link) if err != nil { t.Fatal(err) } defer os.Remove(link) got, err := os.Readlink(link) if err != nil { t.Fatal(err) } if got != target { t.Errorf(`os.Readlink(%#q): got %v, want %v`, link, got, target) } got, err = filepath.EvalSymlinks(link) if err != nil { t.Fatal(err) } if got != target { t.Errorf(`filepath.EvalSymlinks(%#q): got %v, want %v`, link, got, target) } } func TestStatLxSymLink(t *testing.T) { if _, err := exec.LookPath("wsl"); err != nil { t.Skip("skipping: WSL not detected") } temp := t.TempDir() chdir(t, temp) const target = "target" const link = "link" _, err := testenv.Command(t, "wsl", "/bin/mkdir", target).Output() if err != nil { // This normally happens when WSL still doesn't have a distro installed to run on. t.Skipf("skipping: WSL is not correctly installed: %v", err) } _, err = testenv.Command(t, "wsl", "/bin/ln", "-s", target, link).Output() if err != nil { t.Fatal(err) } fi, err := os.Lstat(link) if err != nil { t.Fatal(err) } if m := fi.Mode(); m&fs.ModeSymlink != 0 { // This can happen depending on newer WSL versions when running as admin or in developer mode. t.Skip("skipping: WSL created reparse tag IO_REPARSE_TAG_SYMLINK instead of an IO_REPARSE_TAG_LX_SYMLINK") } // Stat'ing a IO_REPARSE_TAG_LX_SYMLINK from outside WSL always return ERROR_CANT_ACCESS_FILE. // We check this condition to validate that os.Stat has tried to follow the link. _, err = os.Stat(link) const ERROR_CANT_ACCESS_FILE = syscall.Errno(1920) if err == nil || !errors.Is(err, ERROR_CANT_ACCESS_FILE) { t.Fatalf("os.Stat(%q): got %v, want ERROR_CANT_ACCESS_FILE", link, err) } } func TestStartProcessAttr(t *testing.T) { t.Parallel() p, err := os.StartProcess(os.Getenv("COMSPEC"), []string{"/c", "cd"}, new(os.ProcAttr)) if err != nil { return } defer p.Wait() t.Fatalf("StartProcess expected to fail, but succeeded.") } func TestShareNotExistError(t *testing.T) { if testing.Short() { t.Skip("slow test that uses network; skipping") } t.Parallel() _, err := os.Stat(`\\no_such_server\no_such_share\no_such_file`) if err == nil { t.Fatal("stat succeeded, but expected to fail") } if !os.IsNotExist(err) { t.Fatalf("os.Stat failed with %q, but os.IsNotExist(err) is false", err) } } func TestBadNetPathError(t *testing.T) { const ERROR_BAD_NETPATH = syscall.Errno(53) if !os.IsNotExist(ERROR_BAD_NETPATH) { t.Fatal("os.IsNotExist(syscall.Errno(53)) is false, but want true") } } func TestStatDir(t *testing.T) { defer chtmpdir(t)() f, err := os.Open(".") if err != nil { t.Fatal(err) } defer f.Close() fi, err := f.Stat() if err != nil { t.Fatal(err) } err = os.Chdir("..") if err != nil { t.Fatal(err) } fi2, err := f.Stat() if err != nil { t.Fatal(err) } if !os.SameFile(fi, fi2) { t.Fatal("race condition occurred") } } func TestOpenVolumeName(t *testing.T) { tmpdir := t.TempDir() chdir(t, tmpdir) want := []string{"file1", "file2", "file3", "gopher.txt"} sort.Strings(want) for _, name := range want { err := os.WriteFile(filepath.Join(tmpdir, name), nil, 0777) if err != nil { t.Fatal(err) } } f, err := os.Open(filepath.VolumeName(tmpdir)) if err != nil { t.Fatal(err) } defer f.Close() have, err := f.Readdirnames(-1) if err != nil { t.Fatal(err) } sort.Strings(have) if strings.Join(want, "/") != strings.Join(have, "/") { t.Fatalf("unexpected file list %q, want %q", have, want) } } func TestDeleteReadOnly(t *testing.T) { t.Parallel() tmpdir := t.TempDir() p := filepath.Join(tmpdir, "a") // This sets FILE_ATTRIBUTE_READONLY. f, err := os.OpenFile(p, os.O_CREATE, 0400) if err != nil { t.Fatal(err) } f.Close() if err = os.Chmod(p, 0400); err != nil { t.Fatal(err) } if err = os.Remove(p); err != nil { t.Fatal(err) } } func TestReadStdin(t *testing.T) { old := poll.ReadConsole defer func() { poll.ReadConsole = old }() p, err := syscall.GetCurrentProcess() if err != nil { t.Fatalf("Unable to get handle to current process: %v", err) } var stdinDuplicate syscall.Handle err = syscall.DuplicateHandle(p, syscall.Handle(syscall.Stdin), p, &stdinDuplicate, 0, false, syscall.DUPLICATE_SAME_ACCESS) if err != nil { t.Fatalf("Unable to duplicate stdin: %v", err) } testConsole := os.NewConsoleFile(stdinDuplicate, "test") var tests = []string{ "abc", "äöü", "\u3042", "“hi”™", "hello\x1aworld", "\U0001F648\U0001F649\U0001F64A", } for _, consoleSize := range []int{1, 2, 3, 10, 16, 100, 1000} { for _, readSize := range []int{1, 2, 3, 4, 5, 8, 10, 16, 20, 50, 100} { for _, s := range tests { t.Run(fmt.Sprintf("c%d/r%d/%s", consoleSize, readSize, s), func(t *testing.T) { s16 := utf16.Encode([]rune(s)) poll.ReadConsole = func(h syscall.Handle, buf *uint16, toread uint32, read *uint32, inputControl *byte) error { if inputControl != nil { t.Fatalf("inputControl not nil") } n := int(toread) if n > consoleSize { n = consoleSize } n = copy((*[10000]uint16)(unsafe.Pointer(buf))[:n:n], s16) s16 = s16[n:] *read = uint32(n) t.Logf("read %d -> %d", toread, *read) return nil } var all []string var buf []byte chunk := make([]byte, readSize) for { n, err := testConsole.Read(chunk) buf = append(buf, chunk[:n]...) if err == io.EOF { all = append(all, string(buf)) if len(all) >= 5 { break } buf = buf[:0] } else if err != nil { t.Fatalf("reading %q: error: %v", s, err) } if len(buf) >= 2000 { t.Fatalf("reading %q: stuck in loop: %q", s, buf) } } want := strings.Split(s, "\x1a") for len(want) < 5 { want = append(want, "") } if !reflect.DeepEqual(all, want) { t.Errorf("reading %q:\nhave %x\nwant %x", s, all, want) } }) } } } } func TestStatPagefile(t *testing.T) { t.Parallel() const path = `c:\pagefile.sys` fi, err := os.Stat(path) if err == nil { if fi.Name() == "" { t.Fatalf("Stat(%q).Name() is empty", path) } t.Logf("Stat(%q).Size() = %v", path, fi.Size()) return } if os.IsNotExist(err) { t.Skip(`skipping because c:\pagefile.sys is not found`) } t.Fatal(err) } // syscallCommandLineToArgv calls syscall.CommandLineToArgv // and converts returned result into []string. func syscallCommandLineToArgv(cmd string) ([]string, error) { var argc int32 argv, err := syscall.CommandLineToArgv(&syscall.StringToUTF16(cmd)[0], &argc) if err != nil { return nil, err } defer syscall.LocalFree(syscall.Handle(uintptr(unsafe.Pointer(argv)))) var args []string for _, v := range (*argv)[:argc] { args = append(args, syscall.UTF16ToString((*v)[:])) } return args, nil } // compareCommandLineToArgvWithSyscall ensures that // os.CommandLineToArgv(cmd) and syscall.CommandLineToArgv(cmd) // return the same result. func compareCommandLineToArgvWithSyscall(t *testing.T, cmd string) { syscallArgs, err := syscallCommandLineToArgv(cmd) if err != nil { t.Fatal(err) } args := os.CommandLineToArgv(cmd) if want, have := fmt.Sprintf("%q", syscallArgs), fmt.Sprintf("%q", args); want != have { t.Errorf("testing os.commandLineToArgv(%q) failed: have %q want %q", cmd, args, syscallArgs) return } } func TestCmdArgs(t *testing.T) { if testing.Short() { t.Skipf("in short mode; skipping test that builds a binary") } t.Parallel() tmpdir := t.TempDir() const prog = ` package main import ( "fmt" "os" ) func main() { fmt.Printf("%q", os.Args) } ` src := filepath.Join(tmpdir, "main.go") if err := os.WriteFile(src, []byte(prog), 0666); err != nil { t.Fatal(err) } exe := filepath.Join(tmpdir, "main.exe") cmd := testenv.Command(t, testenv.GoToolPath(t), "build", "-o", exe, src) cmd.Dir = tmpdir out, err := cmd.CombinedOutput() if err != nil { t.Fatalf("building main.exe failed: %v\n%s", err, out) } var cmds = []string{ ``, ` a b c`, ` "`, ` ""`, ` """`, ` "" a`, ` "123"`, ` \"123\"`, ` \"123 456\"`, ` \\"`, ` \\\"`, ` \\\\\"`, ` \\\"x`, ` """"\""\\\"`, ` abc`, ` \\\\\""x"""y z`, "\tb\t\"x\ty\"", ` "Брад" d e`, // examples from https://learn.microsoft.com/en-us/cpp/cpp/main-function-command-line-args ` "abc" d e`, ` a\\b d"e f"g h`, ` a\\\"b c d`, ` a\\\\"b c" d e`, // http://daviddeley.com/autohotkey/parameters/parameters.htm#WINARGV // from 5.4 Examples ` CallMeIshmael`, ` "Call Me Ishmael"`, ` Cal"l Me I"shmael`, ` CallMe\"Ishmael`, ` "CallMe\"Ishmael"`, ` "Call Me Ishmael\\"`, ` "CallMe\\\"Ishmael"`, ` a\\\b`, ` "a\\\b"`, // from 5.5 Some Common Tasks ` "\"Call Me Ishmael\""`, ` "C:\TEST A\\"`, ` "\"C:\TEST A\\\""`, // from 5.6 The Microsoft Examples Explained ` "a b c" d e`, ` "ab\"c" "\\" d`, ` a\\\b d"e f"g h`, ` a\\\"b c d`, ` a\\\\"b c" d e`, // from 5.7 Double Double Quote Examples (pre 2008) ` "a b c""`, ` """CallMeIshmael""" b c`, ` """Call Me Ishmael"""`, ` """"Call Me Ishmael"" b c`, } for _, cmd := range cmds { compareCommandLineToArgvWithSyscall(t, "test"+cmd) compareCommandLineToArgvWithSyscall(t, `"cmd line"`+cmd) compareCommandLineToArgvWithSyscall(t, exe+cmd) // test both syscall.EscapeArg and os.commandLineToArgv args := os.CommandLineToArgv(exe + cmd) out, err := testenv.Command(t, args[0], args[1:]...).CombinedOutput() if err != nil { t.Fatalf("running %q failed: %v\n%v", args, err, string(out)) } if want, have := fmt.Sprintf("%q", args), string(out); want != have { t.Errorf("wrong output of executing %q: have %q want %q", args, have, want) continue } } } func findOneDriveDir() (string, error) { // as per https://stackoverflow.com/questions/42519624/how-to-determine-location-of-onedrive-on-windows-7-and-8-in-c const onedrivekey = `SOFTWARE\Microsoft\OneDrive` k, err := registry.OpenKey(registry.CURRENT_USER, onedrivekey, registry.READ) if err != nil { return "", fmt.Errorf("OpenKey(%q) failed: %v", onedrivekey, err) } defer k.Close() path, valtype, err := k.GetStringValue("UserFolder") if err != nil { return "", fmt.Errorf("reading UserFolder failed: %v", err) } if valtype == registry.EXPAND_SZ { expanded, err := registry.ExpandString(path) if err != nil { return "", fmt.Errorf("expanding UserFolder failed: %v", err) } path = expanded } return path, nil } // TestOneDrive verifies that OneDrive folder is a directory and not a symlink. func TestOneDrive(t *testing.T) { t.Parallel() dir, err := findOneDriveDir() if err != nil { t.Skipf("Skipping, because we did not find OneDrive directory: %v", err) } testDirStats(t, dir) } func TestWindowsDevNullFile(t *testing.T) { t.Parallel() f1, err := os.Open("NUL") if err != nil { t.Fatal(err) } defer f1.Close() fi1, err := f1.Stat() if err != nil { t.Fatal(err) } f2, err := os.Open("nul") if err != nil { t.Fatal(err) } defer f2.Close() fi2, err := f2.Stat() if err != nil { t.Fatal(err) } if !os.SameFile(fi1, fi2) { t.Errorf(`"NUL" and "nul" are not the same file`) } } func TestFileStatNUL(t *testing.T) { t.Parallel() f, err := os.Open("NUL") if err != nil { t.Fatal(err) } fi, err := f.Stat() if err != nil { t.Fatal(err) } if got, want := fi.Mode(), os.ModeDevice|os.ModeCharDevice|0666; got != want { t.Errorf("Open(%q).Stat().Mode() = %v, want %v", "NUL", got, want) } } func TestStatNUL(t *testing.T) { t.Parallel() fi, err := os.Stat("NUL") if err != nil { t.Fatal(err) } if got, want := fi.Mode(), os.ModeDevice|os.ModeCharDevice|0666; got != want { t.Errorf("Stat(%q).Mode() = %v, want %v", "NUL", got, want) } } // TestSymlinkCreation verifies that creating a symbolic link // works on Windows when developer mode is active. // This is supported starting Windows 10 (1703, v10.0.14972). func TestSymlinkCreation(t *testing.T) { if !testenv.HasSymlink() && !isWindowsDeveloperModeActive() { t.Skip("Windows developer mode is not active") } t.Parallel() temp := t.TempDir() dummyFile := filepath.Join(temp, "file") if err := os.WriteFile(dummyFile, []byte(""), 0644); err != nil { t.Fatal(err) } linkFile := filepath.Join(temp, "link") if err := os.Symlink(dummyFile, linkFile); err != nil { t.Fatal(err) } } // isWindowsDeveloperModeActive checks whether or not the developer mode is active on Windows 10. // Returns false for prior Windows versions. // see https://docs.microsoft.com/en-us/windows/uwp/get-started/enable-your-device-for-development func isWindowsDeveloperModeActive() bool { key, err := registry.OpenKey(registry.LOCAL_MACHINE, "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\AppModelUnlock", registry.READ) if err != nil { return false } val, _, err := key.GetIntegerValue("AllowDevelopmentWithoutDevLicense") if err != nil { return false } return val != 0 } // TestRootRelativeDirSymlink verifies that symlinks to paths relative to the // drive root (beginning with "\" but no volume name) are created with the // correct symlink type. // (See https://golang.org/issue/39183#issuecomment-632175728.) func TestRootRelativeDirSymlink(t *testing.T) { testenv.MustHaveSymlink(t) t.Parallel() temp := t.TempDir() dir := filepath.Join(temp, "dir") if err := os.Mkdir(dir, 0755); err != nil { t.Fatal(err) } volumeRelDir := strings.TrimPrefix(dir, filepath.VolumeName(dir)) // leaves leading backslash link := filepath.Join(temp, "link") err := os.Symlink(volumeRelDir, link) if err != nil { t.Fatal(err) } t.Logf("Symlink(%#q, %#q)", volumeRelDir, link) f, err := os.Open(link) if err != nil { t.Fatal(err) } defer f.Close() if fi, err := f.Stat(); err != nil { t.Fatal(err) } else if !fi.IsDir() { t.Errorf("Open(%#q).Stat().IsDir() = false; want true", f.Name()) } } // TestWorkingDirectoryRelativeSymlink verifies that symlinks to paths relative // to the current working directory for the drive, such as "C:File.txt", are // correctly converted to absolute links of the correct symlink type (per // https://docs.microsoft.com/en-us/windows/win32/fileio/creating-symbolic-links). func TestWorkingDirectoryRelativeSymlink(t *testing.T) { testenv.MustHaveSymlink(t) // Construct a directory to be symlinked. temp := t.TempDir() if v := filepath.VolumeName(temp); len(v) < 2 || v[1] != ':' { t.Skipf("Can't test relative symlinks: t.TempDir() (%#q) does not begin with a drive letter.", temp) } absDir := filepath.Join(temp, `dir\sub`) if err := os.MkdirAll(absDir, 0755); err != nil { t.Fatal(err) } // Change to the temporary directory and construct a // working-directory-relative symlink. oldwd, err := os.Getwd() if err != nil { t.Fatal(err) } defer func() { if err := os.Chdir(oldwd); err != nil { t.Fatal(err) } }() if err := os.Chdir(temp); err != nil { t.Fatal(err) } t.Logf("Chdir(%#q)", temp) wdRelDir := filepath.VolumeName(temp) + `dir\sub` // no backslash after volume. absLink := filepath.Join(temp, "link") err = os.Symlink(wdRelDir, absLink) if err != nil { t.Fatal(err) } t.Logf("Symlink(%#q, %#q)", wdRelDir, absLink) // Now change back to the original working directory and verify that the // symlink still refers to its original path and is correctly marked as a // directory. if err := os.Chdir(oldwd); err != nil { t.Fatal(err) } t.Logf("Chdir(%#q)", oldwd) resolved, err := os.Readlink(absLink) if err != nil { t.Errorf("Readlink(%#q): %v", absLink, err) } else if resolved != absDir { t.Errorf("Readlink(%#q) = %#q; want %#q", absLink, resolved, absDir) } linkFile, err := os.Open(absLink) if err != nil { t.Fatal(err) } defer linkFile.Close() linkInfo, err := linkFile.Stat() if err != nil { t.Fatal(err) } if !linkInfo.IsDir() { t.Errorf("Open(%#q).Stat().IsDir() = false; want true", absLink) } absInfo, err := os.Stat(absDir) if err != nil { t.Fatal(err) } if !os.SameFile(absInfo, linkInfo) { t.Errorf("SameFile(Stat(%#q), Open(%#q).Stat()) = false; want true", absDir, absLink) } } // TestStatOfInvalidName is regression test for issue #24999. func TestStatOfInvalidName(t *testing.T) { t.Parallel() _, err := os.Stat("*.go") if err == nil { t.Fatal(`os.Stat("*.go") unexpectedly succeeded`) } } // findUnusedDriveLetter searches mounted drive list on the system // (starting from Z: and ending at D:) for unused drive letter. // It returns path to the found drive root directory (like Z:\) or error. func findUnusedDriveLetter() (string, error) { // Do not use A: and B:, because they are reserved for floppy drive. // Do not use C:, because it is normally used for main drive. for l := 'Z'; l >= 'D'; l-- { p := string(l) + `:\` _, err := os.Stat(p) if os.IsNotExist(err) { return p, nil } } return "", errors.New("Could not find unused drive letter.") } func TestRootDirAsTemp(t *testing.T) { if os.Getenv("GO_WANT_HELPER_PROCESS") == "1" { fmt.Print(os.TempDir()) os.Exit(0) } testenv.MustHaveExec(t) t.Parallel() exe, err := os.Executable() if err != nil { t.Fatal(err) } newtmp, err := findUnusedDriveLetter() if err != nil { t.Skip(err) } cmd := testenv.Command(t, exe, "-test.run=^TestRootDirAsTemp$") cmd.Env = cmd.Environ() cmd.Env = append(cmd.Env, "GO_WANT_HELPER_PROCESS=1") cmd.Env = append(cmd.Env, "TMP="+newtmp) cmd.Env = append(cmd.Env, "TEMP="+newtmp) output, err := cmd.CombinedOutput() if err != nil { t.Fatalf("Failed to spawn child process: %v %q", err, string(output)) } if want, have := newtmp, string(output); have != want { t.Fatalf("unexpected child process output %q, want %q", have, want) } } func testReadlink(t *testing.T, path, want string) { got, err := os.Readlink(path) if err != nil { t.Error(err) return } if got != want { t.Errorf(`Readlink(%q): got %q, want %q`, path, got, want) } } func mklink(t *testing.T, link, target string) { output, err := testenv.Command(t, "cmd", "/c", "mklink", link, target).CombinedOutput() if err != nil { t.Fatalf("failed to run mklink %v %v: %v %q", link, target, err, output) } } func mklinkj(t *testing.T, link, target string) { output, err := testenv.Command(t, "cmd", "/c", "mklink", "/J", link, target).CombinedOutput() if err != nil { t.Fatalf("failed to run mklink %v %v: %v %q", link, target, err, output) } } func mklinkd(t *testing.T, link, target string) { output, err := testenv.Command(t, "cmd", "/c", "mklink", "/D", link, target).CombinedOutput() if err != nil { t.Fatalf("failed to run mklink %v %v: %v %q", link, target, err, output) } } func TestWindowsReadlink(t *testing.T) { tmpdir, err := os.MkdirTemp("", "TestWindowsReadlink") if err != nil { t.Fatal(err) } defer os.RemoveAll(tmpdir) // Make sure tmpdir is not a symlink, otherwise tests will fail. tmpdir, err = filepath.EvalSymlinks(tmpdir) if err != nil { t.Fatal(err) } chdir(t, tmpdir) vol := filepath.VolumeName(tmpdir) output, err := testenv.Command(t, "cmd", "/c", "mountvol", vol, "/L").CombinedOutput() if err != nil { t.Fatalf("failed to run mountvol %v /L: %v %q", vol, err, output) } ntvol := strings.Trim(string(output), " \n\r") dir := filepath.Join(tmpdir, "dir") err = os.MkdirAll(dir, 0777) if err != nil { t.Fatal(err) } absdirjlink := filepath.Join(tmpdir, "absdirjlink") mklinkj(t, absdirjlink, dir) testReadlink(t, absdirjlink, dir) ntdirjlink := filepath.Join(tmpdir, "ntdirjlink") mklinkj(t, ntdirjlink, ntvol+absdirjlink[len(filepath.VolumeName(absdirjlink)):]) testReadlink(t, ntdirjlink, absdirjlink) ntdirjlinktolink := filepath.Join(tmpdir, "ntdirjlinktolink") mklinkj(t, ntdirjlinktolink, ntvol+absdirjlink[len(filepath.VolumeName(absdirjlink)):]) testReadlink(t, ntdirjlinktolink, absdirjlink) mklinkj(t, "reldirjlink", "dir") testReadlink(t, "reldirjlink", dir) // relative directory junction resolves to absolute path // Make sure we have sufficient privilege to run mklink command. testenv.MustHaveSymlink(t) absdirlink := filepath.Join(tmpdir, "absdirlink") mklinkd(t, absdirlink, dir) testReadlink(t, absdirlink, dir) ntdirlink := filepath.Join(tmpdir, "ntdirlink") mklinkd(t, ntdirlink, ntvol+absdirlink[len(filepath.VolumeName(absdirlink)):]) testReadlink(t, ntdirlink, absdirlink) mklinkd(t, "reldirlink", "dir") testReadlink(t, "reldirlink", "dir") file := filepath.Join(tmpdir, "file") err = os.WriteFile(file, []byte(""), 0666) if err != nil { t.Fatal(err) } filelink := filepath.Join(tmpdir, "filelink") mklink(t, filelink, file) testReadlink(t, filelink, file) linktofilelink := filepath.Join(tmpdir, "linktofilelink") mklink(t, linktofilelink, ntvol+filelink[len(filepath.VolumeName(filelink)):]) testReadlink(t, linktofilelink, filelink) mklink(t, "relfilelink", "file") testReadlink(t, "relfilelink", "file") } func TestOpenDirTOCTOU(t *testing.T) { t.Parallel() // Check opened directories can't be renamed until the handle is closed. // See issue 52747. tmpdir := t.TempDir() dir := filepath.Join(tmpdir, "dir") if err := os.Mkdir(dir, 0777); err != nil { t.Fatal(err) } f, err := os.Open(dir) if err != nil { t.Fatal(err) } newpath := filepath.Join(tmpdir, "dir1") err = os.Rename(dir, newpath) if err == nil || !errors.Is(err, windows.ERROR_SHARING_VIOLATION) { f.Close() t.Fatalf("Rename(%q, %q) = %v; want windows.ERROR_SHARING_VIOLATION", dir, newpath, err) } f.Close() err = os.Rename(dir, newpath) if err != nil { t.Error(err) } } func TestAppExecLinkStat(t *testing.T) { // We expect executables installed to %LOCALAPPDATA%\Microsoft\WindowsApps to // be reparse points with tag IO_REPARSE_TAG_APPEXECLINK. Here we check that // such reparse points are treated as irregular (but executable) files, not // broken symlinks. appdata := os.Getenv("LOCALAPPDATA") if appdata == "" { t.Skipf("skipping: LOCALAPPDATA not set") } pythonExeName := "python3.exe" pythonPath := filepath.Join(appdata, `Microsoft\WindowsApps`, pythonExeName) lfi, err := os.Lstat(pythonPath) if err != nil { t.Skip("skipping test, because Python 3 is not installed via the Windows App Store on this system; see https://golang.org/issue/42919") } // An APPEXECLINK reparse point is not a symlink, so os.Readlink should return // a non-nil error for it, and Stat should return results identical to Lstat. linkName, err := os.Readlink(pythonPath) if err == nil { t.Errorf("os.Readlink(%q) = %q, but expected an error\n(should be an APPEXECLINK reparse point, not a symlink)", pythonPath, linkName) } sfi, err := os.Stat(pythonPath) if err != nil { t.Fatalf("Stat %s: %v", pythonPath, err) } if lfi.Name() != sfi.Name() { t.Logf("os.Lstat(%q) = %+v", pythonPath, lfi) t.Logf("os.Stat(%q) = %+v", pythonPath, sfi) t.Errorf("files should be same") } if lfi.Name() != pythonExeName { t.Errorf("Stat %s: got %q, but wanted %q", pythonPath, lfi.Name(), pythonExeName) } if m := lfi.Mode(); m&fs.ModeSymlink != 0 { t.Errorf("%q should be a file, not a link (mode=0x%x)", pythonPath, uint32(m)) } if m := lfi.Mode(); m&fs.ModeDir != 0 { t.Errorf("%q should be a file, not a directory (mode=0x%x)", pythonPath, uint32(m)) } if m := lfi.Mode(); m&fs.ModeIrregular == 0 { // A reparse point is not a regular file, but we don't have a more appropriate // ModeType bit for it, so it should be marked as irregular. t.Errorf("%q should not be a regular file (mode=0x%x)", pythonPath, uint32(m)) } if sfi.Name() != pythonExeName { t.Errorf("Stat %s: got %q, but wanted %q", pythonPath, sfi.Name(), pythonExeName) } if m := sfi.Mode(); m&fs.ModeSymlink != 0 { t.Errorf("%q should be a file, not a link (mode=0x%x)", pythonPath, uint32(m)) } if m := sfi.Mode(); m&fs.ModeDir != 0 { t.Errorf("%q should be a file, not a directory (mode=0x%x)", pythonPath, uint32(m)) } if m := sfi.Mode(); m&fs.ModeIrregular == 0 { // A reparse point is not a regular file, but we don't have a more appropriate // ModeType bit for it, so it should be marked as irregular. t.Errorf("%q should not be a regular file (mode=0x%x)", pythonPath, uint32(m)) } p, err := exec.LookPath(pythonPath) if err != nil { t.Errorf("exec.LookPath(%q): %v", pythonPath, err) } if p != pythonPath { t.Errorf("exec.LookPath(%q) = %q; want %q", pythonPath, p, pythonPath) } } func TestIllformedUTF16FileName(t *testing.T) { dir := t.TempDir() const sep = string(os.PathSeparator) if !strings.HasSuffix(dir, sep) { dir += sep } // This UTF-16 file name is ill-formed as it contains low surrogates that are not preceded by high surrogates ([1:5]). namew := []uint16{0x2e, 0xdc6d, 0xdc73, 0xdc79, 0xdc73, 0x30, 0x30, 0x30, 0x31, 0} // Create a file whose name contains unpaired surrogates. // Use syscall.CreateFile instead of os.Create to simulate a file that is created by // a non-Go program so the file name hasn't gone through syscall.UTF16FromString. dirw := utf16.Encode([]rune(dir)) pathw := append(dirw, namew...) fd, err := syscall.CreateFile(&pathw[0], syscall.GENERIC_ALL, 0, nil, syscall.CREATE_NEW, 0, 0) if err != nil { t.Fatal(err) } syscall.CloseHandle(fd) name := syscall.UTF16ToString(namew) path := filepath.Join(dir, name) // Verify that os.Lstat can query the file. fi, err := os.Lstat(path) if err != nil { t.Fatal(err) } if got := fi.Name(); got != name { t.Errorf("got %q, want %q", got, name) } // Verify that File.Readdirnames lists the file. f, err := os.Open(dir) if err != nil { t.Fatal(err) } files, err := f.Readdirnames(0) f.Close() if err != nil { t.Fatal(err) } if !slices.Contains(files, name) { t.Error("file not listed") } // Verify that os.RemoveAll can remove the directory // and that it doesn't hang. err = os.RemoveAll(dir) if err != nil { t.Error(err) } } func TestUTF16Alloc(t *testing.T) { allowsPerRun := func(want int, f func()) { t.Helper() got := int(testing.AllocsPerRun(5, f)) if got != want { t.Errorf("got %d allocs, want %d", got, want) } } allowsPerRun(1, func() { syscall.UTF16ToString([]uint16{'a', 'b', 'c'}) }) allowsPerRun(1, func() { syscall.UTF16FromString("abc") }) } func TestNewFileInvalid(t *testing.T) { t.Parallel() if f := os.NewFile(uintptr(syscall.InvalidHandle), "invalid"); f != nil { t.Errorf("NewFile(InvalidHandle) got %v want nil", f) } } func TestReadDirPipe(t *testing.T) { dir := `\\.\pipe\` fi, err := os.Stat(dir) if err != nil || !fi.IsDir() { t.Skipf("%s is not a directory", dir) } _, err = os.ReadDir(dir) if err != nil { t.Errorf("ReadDir(%q) = %v", dir, err) } } func TestReadDirNoFileID(t *testing.T) { *os.AllowReadDirFileID = false defer func() { *os.AllowReadDirFileID = true }() dir := t.TempDir() pathA := filepath.Join(dir, "a") pathB := filepath.Join(dir, "b") if err := os.WriteFile(pathA, nil, 0666); err != nil { t.Fatal(err) } if err := os.WriteFile(pathB, nil, 0666); err != nil { t.Fatal(err) } files, err := os.ReadDir(dir) if err != nil { t.Fatal(err) } if len(files) != 2 { t.Fatalf("ReadDir(%q) = %v; want 2 files", dir, files) } // Check that os.SameFile works with files returned by os.ReadDir. f1, err := files[0].Info() if err != nil { t.Fatal(err) } f2, err := files[1].Info() if err != nil { t.Fatal(err) } if !os.SameFile(f1, f1) { t.Errorf("SameFile(%v, %v) = false; want true", f1, f1) } if !os.SameFile(f2, f2) { t.Errorf("SameFile(%v, %v) = false; want true", f2, f2) } if os.SameFile(f1, f2) { t.Errorf("SameFile(%v, %v) = true; want false", f1, f2) } // Check that os.SameFile works with a mix of os.ReadDir and os.Stat files. f1s, err := os.Stat(pathA) if err != nil { t.Fatal(err) } f2s, err := os.Stat(pathB) if err != nil { t.Fatal(err) } if !os.SameFile(f1, f1s) { t.Errorf("SameFile(%v, %v) = false; want true", f1, f1s) } if !os.SameFile(f2, f2s) { t.Errorf("SameFile(%v, %v) = false; want true", f2, f2s) } }