// run-pass #![allow(deprecated)] // ignore-cloudabi no files or I/O // ignore-wasm32-bare no files or I/O // ignore-emscripten no files // ignore-sgx no files use std::fs; use std::io; fn assert_invalid_input(on: &str, result: io::Result) { fn inner(on: &str, result: io::Result<()>) { match result { Ok(()) => panic!("{} didn't return an error on a path with NUL", on), Err(e) => assert!(e.kind() == io::ErrorKind::InvalidInput, "{} returned a strange {:?} on a path with NUL", on, e.kind()), } } inner(on, result.map(|_| ())) } fn main() { assert_invalid_input("File::open", fs::File::open("\0")); assert_invalid_input("File::create", fs::File::create("\0")); assert_invalid_input("remove_file", fs::remove_file("\0")); assert_invalid_input("metadata", fs::metadata("\0")); assert_invalid_input("symlink_metadata", fs::symlink_metadata("\0")); // If `dummy_file` does not exist, then we might get another unrelated error let dummy_file = std::env::current_exe().unwrap(); assert_invalid_input("rename1", fs::rename("\0", "a")); assert_invalid_input("rename2", fs::rename(&dummy_file, "\0")); assert_invalid_input("copy1", fs::copy("\0", "a")); assert_invalid_input("copy2", fs::copy(&dummy_file, "\0")); assert_invalid_input("hard_link1", fs::hard_link("\0", "a")); assert_invalid_input("hard_link2", fs::hard_link(&dummy_file, "\0")); assert_invalid_input("soft_link1", fs::soft_link("\0", "a")); assert_invalid_input("soft_link2", fs::soft_link(&dummy_file, "\0")); assert_invalid_input("read_link", fs::read_link("\0")); assert_invalid_input("canonicalize", fs::canonicalize("\0")); assert_invalid_input("create_dir", fs::create_dir("\0")); assert_invalid_input("create_dir_all", fs::create_dir_all("\0")); assert_invalid_input("remove_dir", fs::remove_dir("\0")); assert_invalid_input("remove_dir_all", fs::remove_dir_all("\0")); assert_invalid_input("read_dir", fs::read_dir("\0")); assert_invalid_input("set_permissions", fs::set_permissions("\0", fs::metadata(".").unwrap().permissions())); }