diff options
author | 2022-08-10 15:35:28 +0100 | |
---|---|---|
committer | 2022-08-31 16:55:25 +0000 | |
commit | 3aaecf0e678a241a25ac358dbf280a35a5c48efc (patch) | |
tree | 1e85d793126b9863c9428511620967a46d46b932 /artd/file_utils_test.cc | |
parent | 0332ab40ba7e71dbf0a759a96017a96991d0ac19 (diff) |
ART services: optimize package - Add artd methods.
This change adds two artd methods: `getDexoptNeeded` and `dexopt`, which
are used for app compilation.
Also, this CL replaces all `StringPrintf` with `_format`.
Bug: 229268202
Test: m test-art-host-gtest-art_artd_tests
Ignore-AOSP-First: ART Services.
Change-Id: I51a42816750ff39c768658f739c7e6337cfe3e1c
Diffstat (limited to 'artd/file_utils_test.cc')
-rw-r--r-- | artd/file_utils_test.cc | 23 |
1 files changed, 17 insertions, 6 deletions
diff --git a/artd/file_utils_test.cc b/artd/file_utils_test.cc index e6219a4658..8f79d5dce9 100644 --- a/artd/file_utils_test.cc +++ b/artd/file_utils_test.cc @@ -325,14 +325,25 @@ TEST_F(FileUtilsTest, OpenFileForReadingFailed) { HasError(WithMessage(ContainsRegex("Failed to open file .*/foo")))); } -TEST_F(FileUtilsTest, FsPermissionToMode) { - EXPECT_EQ(FsPermissionToMode(FsPermission{}), S_IRUSR | S_IWUSR | S_IRGRP); - EXPECT_EQ(FsPermissionToMode(FsPermission{.isOtherReadable = true}), +TEST_F(FileUtilsTest, FileFsPermissionToMode) { + EXPECT_EQ(FileFsPermissionToMode(FsPermission{}), S_IRUSR | S_IWUSR | S_IRGRP); + EXPECT_EQ(FileFsPermissionToMode(FsPermission{.isOtherReadable = true}), S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH); - EXPECT_EQ(FsPermissionToMode(FsPermission{.isOtherExecutable = true}), + EXPECT_EQ(FileFsPermissionToMode(FsPermission{.isOtherExecutable = true}), S_IRUSR | S_IWUSR | S_IRGRP | S_IXOTH); - EXPECT_EQ(FsPermissionToMode(FsPermission{.isOtherReadable = true, .isOtherExecutable = true}), - S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH | S_IXOTH); + EXPECT_EQ( + FileFsPermissionToMode(FsPermission{.isOtherReadable = true, .isOtherExecutable = true}), + S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH | S_IXOTH); +} + +TEST_F(FileUtilsTest, DirFsPermissionToMode) { + EXPECT_EQ(DirFsPermissionToMode(FsPermission{}), S_IRUSR | S_IWUSR | S_IXUSR | S_IRGRP | S_IXGRP); + EXPECT_EQ(DirFsPermissionToMode(FsPermission{.isOtherReadable = true}), + S_IRUSR | S_IWUSR | S_IXUSR | S_IRGRP | S_IXGRP | S_IROTH); + EXPECT_EQ(DirFsPermissionToMode(FsPermission{.isOtherExecutable = true}), + S_IRUSR | S_IWUSR | S_IXUSR | S_IRGRP | S_IXGRP | S_IXOTH); + EXPECT_EQ(DirFsPermissionToMode(FsPermission{.isOtherReadable = true, .isOtherExecutable = true}), + S_IRUSR | S_IWUSR | S_IXUSR | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH); } } // namespace |