summaryrefslogtreecommitdiff
path: root/artd/file_utils_test.cc
diff options
context:
space:
mode:
author Jiakai Zhang <jiakaiz@google.com> 2022-08-10 15:35:28 +0100
committer TreeHugger Robot <treehugger-gerrit@google.com> 2022-08-31 16:55:25 +0000
commit3aaecf0e678a241a25ac358dbf280a35a5c48efc (patch)
tree1e85d793126b9863c9428511620967a46d46b932 /artd/file_utils_test.cc
parent0332ab40ba7e71dbf0a759a96017a96991d0ac19 (diff)
ART services: optimize package - Add artd methods.
This change adds two artd methods: `getDexoptNeeded` and `dexopt`, which are used for app compilation. Also, this CL replaces all `StringPrintf` with `_format`. Bug: 229268202 Test: m test-art-host-gtest-art_artd_tests Ignore-AOSP-First: ART Services. Change-Id: I51a42816750ff39c768658f739c7e6337cfe3e1c
Diffstat (limited to 'artd/file_utils_test.cc')
-rw-r--r--artd/file_utils_test.cc23
1 files changed, 17 insertions, 6 deletions
diff --git a/artd/file_utils_test.cc b/artd/file_utils_test.cc
index e6219a4658..8f79d5dce9 100644
--- a/artd/file_utils_test.cc
+++ b/artd/file_utils_test.cc
@@ -325,14 +325,25 @@ TEST_F(FileUtilsTest, OpenFileForReadingFailed) {
HasError(WithMessage(ContainsRegex("Failed to open file .*/foo"))));
}
-TEST_F(FileUtilsTest, FsPermissionToMode) {
- EXPECT_EQ(FsPermissionToMode(FsPermission{}), S_IRUSR | S_IWUSR | S_IRGRP);
- EXPECT_EQ(FsPermissionToMode(FsPermission{.isOtherReadable = true}),
+TEST_F(FileUtilsTest, FileFsPermissionToMode) {
+ EXPECT_EQ(FileFsPermissionToMode(FsPermission{}), S_IRUSR | S_IWUSR | S_IRGRP);
+ EXPECT_EQ(FileFsPermissionToMode(FsPermission{.isOtherReadable = true}),
S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH);
- EXPECT_EQ(FsPermissionToMode(FsPermission{.isOtherExecutable = true}),
+ EXPECT_EQ(FileFsPermissionToMode(FsPermission{.isOtherExecutable = true}),
S_IRUSR | S_IWUSR | S_IRGRP | S_IXOTH);
- EXPECT_EQ(FsPermissionToMode(FsPermission{.isOtherReadable = true, .isOtherExecutable = true}),
- S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH | S_IXOTH);
+ EXPECT_EQ(
+ FileFsPermissionToMode(FsPermission{.isOtherReadable = true, .isOtherExecutable = true}),
+ S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH | S_IXOTH);
+}
+
+TEST_F(FileUtilsTest, DirFsPermissionToMode) {
+ EXPECT_EQ(DirFsPermissionToMode(FsPermission{}), S_IRUSR | S_IWUSR | S_IXUSR | S_IRGRP | S_IXGRP);
+ EXPECT_EQ(DirFsPermissionToMode(FsPermission{.isOtherReadable = true}),
+ S_IRUSR | S_IWUSR | S_IXUSR | S_IRGRP | S_IXGRP | S_IROTH);
+ EXPECT_EQ(DirFsPermissionToMode(FsPermission{.isOtherExecutable = true}),
+ S_IRUSR | S_IWUSR | S_IXUSR | S_IRGRP | S_IXGRP | S_IXOTH);
+ EXPECT_EQ(DirFsPermissionToMode(FsPermission{.isOtherReadable = true, .isOtherExecutable = true}),
+ S_IRUSR | S_IWUSR | S_IXUSR | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
}
} // namespace