package reverse_test import ( "io/ioutil" "os" "syscall" "testing" "github.com/rfjakob/gocryptfs/internal/ctlsock" "github.com/rfjakob/gocryptfs/tests/test_helpers" ) func TestLongnameStat(t *testing.T) { fd, err := os.Create(dirA + "/" + x240) if err != nil { t.Fatal(err) } path := dirC + "/" + x240 if !test_helpers.VerifyExistence(path) { t.Fail() } test_helpers.VerifySize(t, path, 0) _, err = fd.Write(make([]byte, 10)) if err != nil { t.Fatal(err) } fd.Close() /* time.Sleep(1000 * time.Millisecond) test_helpers.VerifySize(t, path, 10) */ } func TestSymlinks(t *testing.T) { target := "/" os.Symlink(target, dirA+"/symlink") cSymlink := dirC + "/symlink" _, err := os.Lstat(cSymlink) if err != nil { t.Errorf("Lstat: %v", err) } _, err = os.Stat(cSymlink) if err != nil { t.Errorf("Stat: %v", err) } actualTarget, err := os.Readlink(cSymlink) if err != nil { t.Fatal(err) } if target != actualTarget { t.Errorf("wrong symlink target: want=%q have=%q", target, actualTarget) } } // Symbolic link dentry sizes should be set to the length of the string // that contains the target path. func TestSymlinkDentrySize(t *testing.T) { symlink := "a_symlink" mnt, err := ioutil.TempDir(test_helpers.TmpDir, "reverse_mnt_") if err != nil { t.Fatal(err) } sock := mnt + ".sock" test_helpers.MountOrFatal(t, "ctlsock_reverse_test_fs", mnt, "-reverse", "-extpass", "echo test", "-ctlsock="+sock) defer test_helpers.UnmountPanic(mnt) req := ctlsock.RequestStruct{EncryptPath: symlink} symlinkResponse := test_helpers.QueryCtlSock(t, sock, req) if symlinkResponse.ErrNo != 0 { t.Errorf("Encrypt: %q ErrNo=%d ErrText=%s", symlink, symlinkResponse.ErrNo, symlinkResponse.ErrText) } fi, err := os.Lstat(mnt + "/" + symlinkResponse.Result) if err != nil { t.Errorf("Lstat: %v", err) } target, err := os.Readlink(mnt + "/" + symlinkResponse.Result) if err != nil { t.Errorf("Readlink: %v", err) } if fi.Size() != int64(len(target)) { t.Errorf("Lstat reports that symbolic link %q's dentry size is %d, but this does not "+ "match the length of the string returned by readlink, which is %d.", symlink, fi.Size(), len(target)) } } // .gocryptfs.reverse.conf in the plaintext dir should be visible as // gocryptfs.conf func TestConfigMapping(t *testing.T) { c := dirB + "/gocryptfs.conf" if !test_helpers.VerifyExistence(c) { t.Errorf("%s missing", c) } data, err := ioutil.ReadFile(c) if err != nil { t.Fatal(err) } if len(data) == 0 { t.Errorf("empty file") } } // Check that the access() syscall works on virtual files func TestAccessVirtual(t *testing.T) { if plaintextnames { t.Skip() } var R_OK uint32 = 4 var W_OK uint32 = 2 var X_OK uint32 = 1 fn := dirB + "/gocryptfs.diriv" err := syscall.Access(fn, R_OK) if err != nil { t.Errorf("%q should be readable, but got error: %v", fn, err) } err = syscall.Access(fn, W_OK) if err == nil { t.Errorf("should NOT be writeable") } err = syscall.Access(fn, X_OK) if err == nil { t.Errorf("should NOT be executable") } }