| 1 | #![warn (rust_2018_idioms)] |
| 2 | #![cfg (all(feature = "full" , not(target_os = "wasi" )))] // WASI does not support all fs operations |
| 3 | |
| 4 | use tempfile::tempdir; |
| 5 | use tokio::fs; |
| 6 | |
| 7 | #[tokio::test ] |
| 8 | async fn try_exists() { |
| 9 | let dir = tempdir().unwrap(); |
| 10 | |
| 11 | let existing_path = dir.path().join("foo.txt" ); |
| 12 | fs::write(&existing_path, b"Hello File!" ).await.unwrap(); |
| 13 | let nonexisting_path = dir.path().join("bar.txt" ); |
| 14 | |
| 15 | assert!(fs::try_exists(existing_path).await.unwrap()); |
| 16 | assert!(!fs::try_exists(nonexisting_path).await.unwrap()); |
| 17 | // FreeBSD root user always has permission to stat. |
| 18 | #[cfg (all(unix, not(target_os = "freebsd" )))] |
| 19 | { |
| 20 | use std::os::unix::prelude::PermissionsExt; |
| 21 | let permission_denied_directory_path = dir.path().join("baz" ); |
| 22 | fs::create_dir(&permission_denied_directory_path) |
| 23 | .await |
| 24 | .unwrap(); |
| 25 | let permission_denied_file_path = permission_denied_directory_path.join("baz.txt" ); |
| 26 | fs::write(&permission_denied_file_path, b"Hello File!" ) |
| 27 | .await |
| 28 | .unwrap(); |
| 29 | let mut perms = tokio::fs::metadata(&permission_denied_directory_path) |
| 30 | .await |
| 31 | .unwrap() |
| 32 | .permissions(); |
| 33 | |
| 34 | perms.set_mode(0o244); |
| 35 | fs::set_permissions(&permission_denied_directory_path, perms) |
| 36 | .await |
| 37 | .unwrap(); |
| 38 | let permission_denied_result = fs::try_exists(permission_denied_file_path).await; |
| 39 | assert_eq!( |
| 40 | permission_denied_result.err().unwrap().kind(), |
| 41 | std::io::ErrorKind::PermissionDenied |
| 42 | ); |
| 43 | } |
| 44 | } |
| 45 | |