tempfile: Unify the two tempdir implementations

Looks like we ended up with two totally different tempdir
implementations: one from CL:520706 and the other from CL:1409705.

This CL consolidates them into one implementation.

BUG=chromium:974059
TEST=tempfile: cargo test
TEST=crosvm: cargo check --all-features
TEST=devices: cargo check --tests
TEST=sys_util: cargo check --tests
TEST=local kokoro
TEST=./build_test

Cq-Depend: chromium:1574668
Change-Id: Id70e963c9986ed2fc5f160819c4a7f9f16092b3b
Signed-off-by: Daniel Verkamp <dverkamp@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/1573227
Tested-by: kokoro <noreply+kokoro@google.com>
Legacy-Commit-Queue: Commit Bot <commit-bot@chromium.org>
This commit is contained in:
David Tolnay 2019-04-17 21:09:41 -07:00 committed by chrome-bot
parent 8f94a9ff71
commit e33b55c429
9 changed files with 96 additions and 133 deletions

2
Cargo.lock generated
View file

@ -162,6 +162,7 @@ dependencies = [
"resources 0.1.0", "resources 0.1.0",
"sync 0.1.0", "sync 0.1.0",
"sys_util 0.1.0", "sys_util 0.1.0",
"tempfile 3.0.7",
"tpm2 0.1.0", "tpm2 0.1.0",
"usb_util 0.1.0", "usb_util 0.1.0",
"vhost 0.1.0", "vhost 0.1.0",
@ -473,6 +474,7 @@ dependencies = [
"poll_token_derive 0.1.0", "poll_token_derive 0.1.0",
"sync 0.1.0", "sync 0.1.0",
"syscall_defines 0.1.0", "syscall_defines 0.1.0",
"tempfile 3.0.7",
] ]
[[package]] [[package]]

View file

@ -37,3 +37,6 @@ usb_util = { path = "../usb_util" }
vhost = { path = "../vhost" } vhost = { path = "../vhost" }
virtio_sys = { path = "../virtio_sys" } virtio_sys = { path = "../virtio_sys" }
vm_control = { path = "../vm_control" } vm_control = { path = "../vm_control" }
[dev-dependencies]
tempfile = { path = "../tempfile" }

View file

@ -1035,15 +1035,14 @@ impl<T: 'static + AsRawFd + DiskFile + Send> VirtioDevice for Block<T> {
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use std::fs::{File, OpenOptions}; use std::fs::{File, OpenOptions};
use std::path::PathBuf; use tempfile::TempDir;
use sys_util::TempDir;
use super::*; use super::*;
#[test] #[test]
fn read_size() { fn read_size() {
let tempdir = TempDir::new("/tmp/block_read_test").unwrap(); let tempdir = TempDir::new().unwrap();
let mut path = PathBuf::from(tempdir.as_path().unwrap()); let mut path = tempdir.path().to_owned();
path.push("disk_image"); path.push("disk_image");
let f = File::create(&path).unwrap(); let f = File::create(&path).unwrap();
f.set_len(0x1000).unwrap(); f.set_len(0x1000).unwrap();
@ -1061,8 +1060,8 @@ mod tests {
#[test] #[test]
fn read_features() { fn read_features() {
let tempdir = TempDir::new("/tmp/block_read_test").unwrap(); let tempdir = TempDir::new().unwrap();
let mut path = PathBuf::from(tempdir.as_path().unwrap()); let mut path = tempdir.path().to_owned();
path.push("disk_image"); path.push("disk_image");
// read-write block device // read-write block device
@ -1086,8 +1085,8 @@ mod tests {
#[test] #[test]
fn read_last_sector() { fn read_last_sector() {
let tempdir = TempDir::new("/tmp/block_read_test").unwrap(); let tempdir = TempDir::new().unwrap();
let mut path = PathBuf::from(tempdir.as_path().unwrap()); let mut path = tempdir.path().to_owned();
path.push("disk_image"); path.push("disk_image");
let mut f = OpenOptions::new() let mut f = OpenOptions::new()
.read(true) .read(true)
@ -1129,8 +1128,8 @@ mod tests {
#[test] #[test]
fn read_beyond_last_sector() { fn read_beyond_last_sector() {
let tempdir = TempDir::new("/tmp/block_read_test").unwrap(); let tempdir = TempDir::new().unwrap();
let mut path = PathBuf::from(tempdir.as_path().unwrap()); let mut path = tempdir.path().to_owned();
path.push("disk_image"); path.push("disk_image");
let mut f = OpenOptions::new() let mut f = OpenOptions::new()
.read(true) .read(true)

View file

@ -11,5 +11,6 @@ libc = "*"
poll_token_derive = { version = "*", path = "poll_token_derive" } poll_token_derive = { version = "*", path = "poll_token_derive" }
sync = { path = "../sync" } # provided by ebuild sync = { path = "../sync" } # provided by ebuild
syscall_defines = { path = "../syscall_defines" } # provided by ebuild syscall_defines = { path = "../syscall_defines" } # provided by ebuild
tempfile = { path = "../tempfile" } # provided by ebuild
[workspace] [workspace]

View file

@ -33,7 +33,6 @@ pub mod signal;
mod signalfd; mod signalfd;
mod sock_ctrl_msg; mod sock_ctrl_msg;
mod struct_util; mod struct_util;
mod tempdir;
mod terminal; mod terminal;
mod timerfd; mod timerfd;
mod write_zeroes; mod write_zeroes;
@ -60,7 +59,6 @@ pub use crate::signal::*;
pub use crate::signalfd::*; pub use crate::signalfd::*;
pub use crate::sock_ctrl_msg::*; pub use crate::sock_ctrl_msg::*;
pub use crate::struct_util::*; pub use crate::struct_util::*;
pub use crate::tempdir::*;
pub use crate::terminal::*; pub use crate::terminal::*;
pub use crate::timerfd::*; pub use crate::timerfd::*;
pub use poll_token_derive::*; pub use poll_token_derive::*;

View file

@ -54,10 +54,9 @@ impl SeekHole for File {
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use super::*; use super::*;
use crate::TempDir;
use std::fs::File; use std::fs::File;
use std::io::{Seek, SeekFrom, Write}; use std::io::{Seek, SeekFrom, Write};
use std::path::PathBuf; use tempfile::TempDir;
fn seek_cur(file: &mut File) -> u64 { fn seek_cur(file: &mut File) -> u64 {
file.seek(SeekFrom::Current(0)).unwrap() file.seek(SeekFrom::Current(0)).unwrap()
@ -65,8 +64,8 @@ mod tests {
#[test] #[test]
fn seek_data() { fn seek_data() {
let tempdir = TempDir::new("/tmp/seek_data_test").unwrap(); let tempdir = TempDir::new().unwrap();
let mut path = PathBuf::from(tempdir.as_path().unwrap()); let mut path = tempdir.path().to_owned();
path.push("test_file"); path.push("test_file");
let mut file = File::create(&path).unwrap(); let mut file = File::create(&path).unwrap();
@ -112,8 +111,8 @@ mod tests {
#[test] #[test]
fn seek_hole() { fn seek_hole() {
let tempdir = TempDir::new("/tmp/seek_hole_test").unwrap(); let tempdir = TempDir::new().unwrap();
let mut path = PathBuf::from(tempdir.as_path().unwrap()); let mut path = tempdir.path().to_owned();
path.push("test_file"); path.push("test_file");
let mut file = File::create(&path).unwrap(); let mut file = File::create(&path).unwrap();

View file

@ -1,102 +0,0 @@
// Copyright 2017 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
use std::ffi::CString;
use std::ffi::OsStr;
use std::ffi::OsString;
use std::fs;
use std::os::unix::ffi::OsStringExt;
use std::path::Path;
use std::path::PathBuf;
use libc;
use crate::{errno_result, Result};
/// Create and remove a temporary directory. The directory will be maintained for the lifetime of
/// the `TempDir` object.
pub struct TempDir {
path: Option<PathBuf>,
}
impl TempDir {
/// Creates a new tempory directory.
/// The directory will be removed when the object goes out of scope.
///
/// # Examples
///
/// ```
/// # use std::path::Path;
/// # use std::path::PathBuf;
/// # use sys_util::TempDir;
/// # fn test_create_temp_dir() -> Result<(), ()> {
/// let t = TempDir::new("/tmp/testdir").map_err(|_| ())?;
/// assert!(t.as_path().unwrap().exists());
/// # Ok(())
/// # }
/// ```
pub fn new<P: AsRef<OsStr>>(prefix: P) -> Result<TempDir> {
let mut dir_string = prefix.as_ref().to_os_string();
dir_string.push("XXXXXX");
// unwrap this result as the internal bytes can't have a null with a valid path.
let dir_name = CString::new(dir_string.into_vec()).unwrap();
let mut dir_bytes = dir_name.into_bytes_with_nul();
let ret = unsafe {
// Creating the directory isn't unsafe. The fact that it modifies the guts of the path
// is also OK because it only overwrites the last 6 Xs added above.
libc::mkdtemp(dir_bytes.as_mut_ptr() as *mut libc::c_char)
};
if ret.is_null() {
return errno_result();
}
dir_bytes.pop(); // Remove the null becasue from_vec can't handle it.
Ok(TempDir {
path: Some(PathBuf::from(OsString::from_vec(dir_bytes))),
})
}
/// Removes the temporary directory. Calling this is optional as dropping a `TempDir` object
/// will also remove the directory. Calling remove explicitly allows for better error handling.
pub fn remove(mut self) -> Result<()> {
let path = self.path.take();
path.map_or(Ok(()), fs::remove_dir_all)?;
Ok(())
}
/// Returns the path to the tempdir if it is currently valid
pub fn as_path(&self) -> Option<&Path> {
self.path.as_ref().map(PathBuf::as_path)
}
}
impl Drop for TempDir {
fn drop(&mut self) {
if let Some(p) = &self.path {
// Nothing can be done here if this returns an error.
let _ = fs::remove_dir_all(p);
}
}
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn create_dir() {
let t = TempDir::new("/tmp/asdf").unwrap();
let path = t.as_path().unwrap();
assert!(path.exists());
assert!(path.is_dir());
assert!(path.starts_with("/tmp/"));
}
#[test]
fn remove_dir() {
let t = TempDir::new("/tmp/asdf").unwrap();
let path = t.as_path().unwrap().to_owned();
assert!(t.remove().is_ok());
assert!(!path.exists());
}
}

View file

@ -59,14 +59,12 @@ mod tests {
use super::*; use super::*;
use std::fs::OpenOptions; use std::fs::OpenOptions;
use std::io::{Read, Seek, SeekFrom}; use std::io::{Read, Seek, SeekFrom};
use std::path::PathBuf; use tempfile::TempDir;
use crate::TempDir;
#[test] #[test]
fn simple_test() { fn simple_test() {
let tempdir = TempDir::new("/tmp/write_zeroes_test").unwrap(); let tempdir = TempDir::new().unwrap();
let mut path = PathBuf::from(tempdir.as_path().unwrap()); let mut path = tempdir.path().to_owned();
path.push("file"); path.push("file");
let mut f = OpenOptions::new() let mut f = OpenOptions::new()
.read(true) .read(true)
@ -131,8 +129,8 @@ mod tests {
#[test] #[test]
fn large_write_zeroes() { fn large_write_zeroes() {
let tempdir = TempDir::new("/tmp/write_zeroes_test").unwrap(); let tempdir = TempDir::new().unwrap();
let mut path = PathBuf::from(tempdir.as_path().unwrap()); let mut path = tempdir.path().to_owned();
path.push("file"); path.push("file");
let mut f = OpenOptions::new() let mut f = OpenOptions::new()
.read(true) .read(true)

View file

@ -2,20 +2,39 @@
// Use of this source code is governed by a BSD-style license that can be // Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file. // found in the LICENSE file.
//! Simplified tempfile which doesn't depend on the `rand` crate, instead using //! Simplified tempfile which doesn't depend on the `rand` crate.
//! /dev/urandom as a source of entropy //!
//! # Example
//!
//! ```
//! use std::io::Result;
//! use std::path::{Path, PathBuf};
//! use tempfile::TempDir;
//!
//! fn main() -> Result<()> {
//! let t = TempDir::new()?;
//! assert!(t.path().exists());
//!
//! Ok(())
//! }
//! ```
use libc::mkdtemp; use libc::mkdtemp;
use std::env; use std::env;
use std::ffi::CString; use std::ffi::CString;
use std::fs; use std::fs;
use std::io::{Error, ErrorKind, Result}; use std::io::{Error, ErrorKind, Result};
use std::mem::ManuallyDrop;
use std::path::{Path, PathBuf}; use std::path::{Path, PathBuf};
use std::ptr;
pub struct Builder { pub struct Builder {
prefix: String, prefix: String,
} }
// Note: we implement a builder because the protoc-rust crate uses this API from
// crates.io's tempfile. Our code mostly uses TempDir::new directly.
impl Builder { impl Builder {
pub fn new() -> Self { pub fn new() -> Self {
Builder { Builder {
@ -31,10 +50,9 @@ impl Builder {
self self
} }
/// Tries to make a tempdir inside of `env::temp_dir()` with a specified /// Creates a new temporary directory under libc's preferred system
/// prefix. The directory and it's content is destroyed when TempDir is /// temporary directory. The new directory will be removed when the returned
/// dropped. /// handle of type `TempDir` is dropped.
/// If the directory can not be created, `Err` is returned.
pub fn tempdir(&self) -> Result<TempDir> { pub fn tempdir(&self) -> Result<TempDir> {
// mkdtemp() requires the template to end in 6 X chars, which will be replaced // mkdtemp() requires the template to end in 6 X chars, which will be replaced
// with random characters to make the path unique. // with random characters to make the path unique.
@ -68,17 +86,43 @@ impl Builder {
} }
} }
/// Temporary directory. The directory will be removed when this object is
/// dropped.
pub struct TempDir { pub struct TempDir {
path: PathBuf, path: PathBuf,
// When adding new fields to TempDir: note that anything with a Drop impl
// will need to be dropped explicitly via ptr::read inside TempDir::remove
// or else it gets leaked (memory safe but not ideal).
} }
impl TempDir { impl TempDir {
pub fn new() -> Result<Self> {
Builder::new().tempdir()
}
/// Accesses the tempdir's [`Path`]. /// Accesses the tempdir's [`Path`].
/// ///
/// [`Path`]: http://doc.rust-lang.org/std/path/struct.Path.html /// [`Path`]: http://doc.rust-lang.org/std/path/struct.Path.html
pub fn path(&self) -> &Path { pub fn path(&self) -> &Path {
self.path.as_ref() self.path.as_ref()
} }
/// Removes the temporary directory.
///
/// Calling this is optional as dropping a TempDir object will also remove
/// the directory. Calling remove explicitly allows for any resulting error
/// to be handled.
pub fn remove(self) -> Result<()> {
// Place self inside ManuallyDrop so its Drop impl doesn't run, but nor
// does the path inside get dropped. Then use ptr::read to take out the
// PathBuf so that it *does* get dropped correctly at the bottom of this
// function.
let dont_drop = ManuallyDrop::new(self);
let path: PathBuf = unsafe { ptr::read(&dont_drop.path) };
fs::remove_dir_all(path)
}
} }
impl Drop for TempDir { impl Drop for TempDir {
@ -86,3 +130,24 @@ impl Drop for TempDir {
let _ = fs::remove_dir_all(&self.path); let _ = fs::remove_dir_all(&self.path);
} }
} }
#[cfg(test)]
mod tests {
use crate::TempDir;
#[test]
fn create_dir() {
let t = TempDir::new().unwrap();
let path = t.path();
assert!(path.exists());
assert!(path.is_dir());
}
#[test]
fn remove_dir() {
let t = TempDir::new().unwrap();
let path = t.path().to_owned();
assert!(t.remove().is_ok());
assert!(!path.exists());
}
}