1ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair/* 2ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * Copyright 2008 the original author or authors. 3ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * 4ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * Licensed under the Apache License, Version 2.0 (the "License"); 5ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * you may not use this file except in compliance with the License. 6ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * You may obtain a copy of the License at 7ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * 8ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * http://www.apache.org/licenses/LICENSE-2.0 9ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * 10ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * Unless required by applicable law or agreed to in writing, software 11ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * distributed under the License is distributed on an "AS IS" BASIS, 12ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * See the License for the specific language governing permissions and 14ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * limitations under the License. 15ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair */ 16ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismairpackage org.mockftpserver.fake.filesystem; 17ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 18ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismairimport org.apache.log4j.Logger; 19ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismairimport org.mockftpserver.fake.FakeFtpServer; 20ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismairimport org.mockftpserver.test.AbstractTest; 21ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismairimport org.mockftpserver.test.IntegrationTest; 22ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 23ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair/** 24ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair * Example code illustrating how to programmatically configure a fake filesystem with permissions for FakeFtpServer. 25ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair */ 26ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismairpublic class WindowsFakeFileSystemPermissionsTest extends AbstractTest implements IntegrationTest { 27ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 28ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair private static final Logger LOG = Logger.getLogger(WindowsFakeFileSystemPermissionsTest.class); 29ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 30ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 31ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair public void testFilesystemWithPermissions() throws Exception { 32ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 33ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair final String USER1 = "joe"; 34ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair final String USER2 = "mary"; 35ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair final String GROUP = "dev"; 36ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair final String CONTENTS = "abcdef 1234567890"; 37ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 38ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair FileSystem fileSystem = new WindowsFakeFileSystem(); 39ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair DirectoryEntry directoryEntry1 = new DirectoryEntry("c:\\"); 40ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair directoryEntry1.setPermissions(new Permissions("rwxrwx---")); 41ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair directoryEntry1.setOwner(USER1); 42ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair directoryEntry1.setGroup(GROUP); 43ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 44ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair DirectoryEntry directoryEntry2 = new DirectoryEntry("c:\\data"); 45ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair directoryEntry2.setPermissions(Permissions.ALL); 46ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair directoryEntry2.setOwner(USER1); 47ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair directoryEntry2.setGroup(GROUP); 48ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 49ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair FileEntry fileEntry1 = new FileEntry("c:\\data\\file1.txt", CONTENTS); 50ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair fileEntry1.setPermissionsFromString("rw-rw-rw-"); 51ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair fileEntry1.setOwner(USER1); 52ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair fileEntry1.setGroup(GROUP); 53ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 54ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair FileEntry fileEntry2 = new FileEntry("c:\\data\\run.exe"); 55ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair fileEntry2.setPermissionsFromString("rwxrwx---"); 56ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair fileEntry2.setOwner(USER2); 57ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair fileEntry2.setGroup(GROUP); 58ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 59ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair fileSystem.add(directoryEntry1); 60ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair fileSystem.add(directoryEntry2); 61ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair fileSystem.add(fileEntry1); 62ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair fileSystem.add(fileEntry2); 63ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 64ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair FakeFtpServer fakeFtpServer = new FakeFtpServer(); 65ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair fakeFtpServer.setFileSystem(fileSystem); 66ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 67ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair LOG.info(fileSystem); 68ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair } 69ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair 70ad39334d4c363c6ada5863d0bb3184f5f4699d69chrismair}