Skip to main content
Go to Latest
File
// deno-fmt-ignore-file// deno-lint-ignore-file
// Copyright Joyent and Node contributors. All rights reserved. MIT license.// Taken from Node 16.13.0// This file is automatically generated by "node/_tools/setup.ts". Do not modify this file manually
// Flags: --expose-internals'use strict';
// This tests that fs.access and fs.accessSync works as expected// and the errors thrown from these APIs include the desired properties
const common = require('../common');if (!common.isWindows && process.getuid() === 0) common.skip('as this test should not be run as `root`');
if (common.isIBMi) common.skip('IBMi has a different access permission mechanism');
const assert = require('assert');const fs = require('fs');const path = require('path');
const { internalBinding } = require('internal/test/binding');const { UV_ENOENT } = internalBinding('uv');
const tmpdir = require('../common/tmpdir');const doesNotExist = path.join(tmpdir.path, '__this_should_not_exist');const readOnlyFile = path.join(tmpdir.path, 'read_only_file');const readWriteFile = path.join(tmpdir.path, 'read_write_file');
function createFileWithPerms(file, mode) { fs.writeFileSync(file, ''); fs.chmodSync(file, mode);}
tmpdir.refresh();createFileWithPerms(readOnlyFile, 0o444);createFileWithPerms(readWriteFile, 0o666);
// On non-Windows supported platforms, fs.access(readOnlyFile, W_OK, ...)// always succeeds if node runs as the super user, which is sometimes the// case for tests running on our continuous testing platform agents.//// In this case, this test tries to change its process user id to a// non-superuser user so that the test that checks for write access to a// read-only file can be more meaningful.//// The change of user id is done after creating the fixtures files for the same// reason: the test may be run as the superuser within a directory in which// only the superuser can create files, and thus it may need superuser// privileges to create them.//// There's not really any point in resetting the process' user id to 0 after// changing it to 'nobody', since in the case that the test runs without// superuser privilege, it is not possible to change its process user id to// superuser.//// It can prevent the test from removing files created before the change of user// id, but that's fine. In this case, it is the responsibility of the// continuous integration platform to take care of that.let hasWriteAccessForReadonlyFile = false;if (!common.isWindows && process.getuid() === 0) { hasWriteAccessForReadonlyFile = true; try { process.setuid('nobody'); hasWriteAccessForReadonlyFile = false; } catch { }}
assert.strictEqual(typeof fs.F_OK, 'number');assert.strictEqual(typeof fs.R_OK, 'number');assert.strictEqual(typeof fs.W_OK, 'number');assert.strictEqual(typeof fs.X_OK, 'number');
const throwNextTick = (e) => { process.nextTick(() => { throw e; }); };
fs.access(__filename, common.mustCall(function(...args) { assert.deepStrictEqual(args, [null]);}));fs.promises.access(__filename) .then(common.mustCall()) .catch(throwNextTick);fs.access(__filename, fs.R_OK, common.mustCall(function(...args) { assert.deepStrictEqual(args, [null]);}));fs.promises.access(__filename, fs.R_OK) .then(common.mustCall()) .catch(throwNextTick);fs.access(readOnlyFile, fs.F_OK | fs.R_OK, common.mustCall(function(...args) { assert.deepStrictEqual(args, [null]);}));fs.promises.access(readOnlyFile, fs.F_OK | fs.R_OK) .then(common.mustCall()) .catch(throwNextTick);
{ const expectedError = (err) => { assert.notStrictEqual(err, null); assert.strictEqual(err.code, 'ENOENT'); assert.strictEqual(err.path, doesNotExist); }; fs.access(doesNotExist, common.mustCall(expectedError)); fs.promises.access(doesNotExist) .then(common.mustNotCall(), common.mustCall(expectedError)) .catch(throwNextTick);}
{ function expectedError(err) { assert.strictEqual(this, undefined); if (hasWriteAccessForReadonlyFile) { assert.ifError(err); } else { assert.notStrictEqual(err, null); assert.strictEqual(err.path, readOnlyFile); } } fs.access(readOnlyFile, fs.W_OK, common.mustCall(expectedError)); fs.promises.access(readOnlyFile, fs.W_OK) .then(common.mustNotCall(), common.mustCall(expectedError)) .catch(throwNextTick);}
{ const expectedError = (err) => { assert.strictEqual(err.code, 'ERR_INVALID_ARG_TYPE'); assert.ok(err instanceof TypeError); return true; }; assert.throws( () => { fs.access(100, fs.F_OK, common.mustNotCall()); }, expectedError );
fs.promises.access(100, fs.F_OK) .then(common.mustNotCall(), common.mustCall(expectedError)) .catch(throwNextTick);}
assert.throws( () => { fs.access(__filename, fs.F_OK); }, { code: 'ERR_INVALID_CALLBACK', name: 'TypeError' });
assert.throws( () => { fs.access(__filename, fs.F_OK, {}); }, { code: 'ERR_INVALID_CALLBACK', name: 'TypeError' });
// Regular access should not throw.fs.accessSync(__filename);const mode = fs.F_OK | fs.R_OK | fs.W_OK;fs.accessSync(readWriteFile, mode);
// Invalid modes should throw.[ false, 1n, { [Symbol.toPrimitive]() { return fs.R_OK; } }, [1], 'r',].forEach((mode, i) => { console.log(mode, i); assert.throws( () => fs.access(readWriteFile, mode, common.mustNotCall()), { code: 'ERR_INVALID_ARG_TYPE', message: /"mode" argument.+integer/ } ); assert.throws( () => fs.accessSync(readWriteFile, mode), { code: 'ERR_INVALID_ARG_TYPE', message: /"mode" argument.+integer/ } );});
// Out of range modes should throw[ -1, 8, Infinity, NaN,].forEach((mode, i) => { console.log(mode, i); assert.throws( () => fs.access(readWriteFile, mode, common.mustNotCall()), { code: 'ERR_OUT_OF_RANGE', message: /"mode".+It must be an integer >= 0 && <= 7/ } ); assert.throws( () => fs.accessSync(readWriteFile, mode), { code: 'ERR_OUT_OF_RANGE', message: /"mode".+It must be an integer >= 0 && <= 7/ } );});
assert.throws( () => { fs.accessSync(doesNotExist); }, (err) => { assert.strictEqual(err.code, 'ENOENT'); assert.strictEqual(err.path, doesNotExist); assert.strictEqual( err.message, `ENOENT: no such file or directory, access '${doesNotExist}'` ); assert.strictEqual(err.constructor, Error); assert.strictEqual(err.syscall, 'access'); assert.strictEqual(err.errno, UV_ENOENT); return true; });
assert.throws( () => { fs.accessSync(Buffer.from(doesNotExist)); }, (err) => { assert.strictEqual(err.code, 'ENOENT'); assert.strictEqual(err.path, doesNotExist); assert.strictEqual( err.message, `ENOENT: no such file or directory, access '${doesNotExist}'` ); assert.strictEqual(err.constructor, Error); assert.strictEqual(err.syscall, 'access'); assert.strictEqual(err.errno, UV_ENOENT); return true; });