summaryrefslogtreecommitdiff
path: root/util
diff options
context:
space:
mode:
authorReilly Grant <reillyg@google.com>2023-03-28 14:37:48 -0700
committerReilly Grant <reillyg@google.com>2023-03-28 14:37:48 -0700
commit89ea7f26438001a796f3338222e5321c5571042f (patch)
treec749b9384e02b9dbadd2fe5350cca1e1cbc9e901 /util
parentfb644cb44539925a7f444b1b0314f402a456c5f4 (diff)
downloadleveldb-89ea7f26438001a796f3338222e5321c5571042f.tar.gz
Fix tests when run against ChromiumEnv
There are a couple differences between ChromiumEnv and PosixEnv/WindowsEnv which cause test failures that are fixed (or at least patched over) in this change: * NewSequentialFile() and NewRandomAccessFile() return Status::IOError rather than Status::NotFound when a file is not found, due to https://crbug.com/760362. This means a few tests need to expect a different error result. * GetChildren() never returns the '.' or '..' entries. * As allowed by the documentation for Env::Schedule(), ChromiumEnv may execute functions on multiple threads and guarantees no sequencing. EnvTest.RunMany assumed that functions ran in order. The test has been updated.
Diffstat (limited to 'util')
-rw-r--r--util/env_test.cc37
1 files changed, 26 insertions, 11 deletions
diff --git a/util/env_test.cc b/util/env_test.cc
index 47174f5..e5c30fe 100644
--- a/util/env_test.cc
+++ b/util/env_test.cc
@@ -96,40 +96,45 @@ TEST_F(EnvTest, RunMany) {
struct RunState {
port::Mutex mu;
port::CondVar cvar{&mu};
- int last_id = 0;
+ int run_count = 0;
};
struct Callback {
- RunState* state_; // Pointer to shared state.
- const int id_; // Order# for the execution of this callback.
+ RunState* const state_; // Pointer to shared state.
+ bool run = false;
- Callback(RunState* s, int id) : state_(s), id_(id) {}
+ Callback(RunState* s) : state_(s) {}
static void Run(void* arg) {
Callback* callback = reinterpret_cast<Callback*>(arg);
RunState* state = callback->state_;
MutexLock l(&state->mu);
- ASSERT_EQ(state->last_id, callback->id_ - 1);
- state->last_id = callback->id_;
+ state->run_count++;
+ callback->run = true;
state->cvar.Signal();
}
};
RunState state;
- Callback callback1(&state, 1);
- Callback callback2(&state, 2);
- Callback callback3(&state, 3);
- Callback callback4(&state, 4);
+ Callback callback1(&state);
+ Callback callback2(&state);
+ Callback callback3(&state);
+ Callback callback4(&state);
env_->Schedule(&Callback::Run, &callback1);
env_->Schedule(&Callback::Run, &callback2);
env_->Schedule(&Callback::Run, &callback3);
env_->Schedule(&Callback::Run, &callback4);
MutexLock l(&state.mu);
- while (state.last_id != 4) {
+ while (state.run_count != 4) {
state.cvar.Wait();
}
+
+ ASSERT_TRUE(callback1.run);
+ ASSERT_TRUE(callback2.run);
+ ASSERT_TRUE(callback3.run);
+ ASSERT_TRUE(callback4.run);
}
struct State {
@@ -175,11 +180,21 @@ TEST_F(EnvTest, TestOpenNonExistentFile) {
RandomAccessFile* random_access_file;
Status status =
env_->NewRandomAccessFile(non_existent_file, &random_access_file);
+#if defined(LEVELDB_PLATFORM_CHROMIUM)
+ // TODO(crbug.com/760362): See comment in MakeIOError() from env_chromium.cc.
+ ASSERT_TRUE(status.IsIOError());
+#else
ASSERT_TRUE(status.IsNotFound());
+#endif // defined(LEVELDB_PLATFORM_CHROMIUM)
SequentialFile* sequential_file;
status = env_->NewSequentialFile(non_existent_file, &sequential_file);
+#if defined(LEVELDB_PLATFORM_CHROMIUM)
+ // TODO(crbug.com/760362): See comment in MakeIOError() from env_chromium.cc.
+ ASSERT_TRUE(status.IsIOError());
+#else
ASSERT_TRUE(status.IsNotFound());
+#endif // defined(LEVELDB_PLATFORM_CHROMIUM)
}
TEST_F(EnvTest, ReopenWritableFile) {