From 6cef9f0fc159de4c9fd708050ec76adb4e74d390 Mon Sep 17 00:00:00 2001 From: Tomasz Kramkowski Date: Fri, 27 Jan 2023 13:58:10 +0000 Subject: openat variant --- openat/tests/tmpfile.rs | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 openat/tests/tmpfile.rs (limited to 'openat/tests/tmpfile.rs') diff --git a/openat/tests/tmpfile.rs b/openat/tests/tmpfile.rs new file mode 100644 index 0000000..4fa0f0d --- /dev/null +++ b/openat/tests/tmpfile.rs @@ -0,0 +1,24 @@ +extern crate tempfile; +extern crate openat; + +use std::io::{self, Read, Write}; +use std::os::unix::fs::PermissionsExt; +use openat::Dir; + +#[test] +#[cfg(target_os="linux")] +fn unnamed_tmp_file_link() -> Result<(), io::Error> { + let tmp = tempfile::tempdir()?; + let dir = Dir::open(tmp.path())?; + let mut f = dir.new_unnamed_file(0o777)?; + f.write(b"hello\n")?; + // In glibc <= 2.22 permissions aren't set when using O_TMPFILE + // This includes ubuntu trusty on travis CI + f.set_permissions(PermissionsExt::from_mode(0o644))?; + dir.link_file_at(&f, "hello.txt")?; + let mut f = dir.open_file("hello.txt")?; + let mut buf = String::with_capacity(10); + f.read_to_string(&mut buf)?; + assert_eq!(buf, "hello\n"); + Ok(()) +} -- cgit v1.2.3-54-g00ecf