4 // ignore-wasm32-bare no files or I/O
5 // ignore-emscripten no files
11 fn assert_invalid_input<T>(on: &str, result: io::Result<T>) {
12 fn inner(on: &str, result: io::Result<()>) {
14 Ok(()) => panic!("{} didn't return an error on a path with NUL", on),
15 Err(e) => assert!(e.kind() == io::ErrorKind::InvalidInput,
16 "{} returned a strange {:?} on a path with NUL", on, e.kind()),
19 inner(on, result.map(drop))
23 assert_invalid_input("File::open", fs::File::open("\0"));
24 assert_invalid_input("File::create", fs::File::create("\0"));
25 assert_invalid_input("remove_file", fs::remove_file("\0"));
26 assert_invalid_input("metadata", fs::metadata("\0"));
27 assert_invalid_input("symlink_metadata", fs::symlink_metadata("\0"));
29 // If `dummy_file` does not exist, then we might get another unrelated error
30 let dummy_file = std::env::current_exe().unwrap();
32 assert_invalid_input("rename1", fs::rename("\0", "a"));
33 assert_invalid_input("rename2", fs::rename(&dummy_file, "\0"));
34 assert_invalid_input("copy1", fs::copy("\0", "a"));
35 assert_invalid_input("copy2", fs::copy(&dummy_file, "\0"));
36 assert_invalid_input("hard_link1", fs::hard_link("\0", "a"));
37 assert_invalid_input("hard_link2", fs::hard_link(&dummy_file, "\0"));
38 assert_invalid_input("soft_link1", fs::soft_link("\0", "a"));
39 assert_invalid_input("soft_link2", fs::soft_link(&dummy_file, "\0"));
40 assert_invalid_input("read_link", fs::read_link("\0"));
41 assert_invalid_input("canonicalize", fs::canonicalize("\0"));
42 assert_invalid_input("create_dir", fs::create_dir("\0"));
43 assert_invalid_input("create_dir_all", fs::create_dir_all("\0"));
44 assert_invalid_input("remove_dir", fs::remove_dir("\0"));
45 assert_invalid_input("remove_dir_all", fs::remove_dir_all("\0"));
46 assert_invalid_input("read_dir", fs::read_dir("\0"));
47 assert_invalid_input("set_permissions",
48 fs::set_permissions("\0", fs::metadata(".").unwrap().permissions()));