/* * Copyright (C) 2008-2010, Google Inc. * Copyright (C) 2008, Shawn O. Pearce <spearce@spearce.org> * and other copyright owners as documented in the project's IP log. * * This program and the accompanying materials are made available * under the terms of the Eclipse Distribution License v1.0 which * accompanies this distribution, is reproduced below, and is * available at http://www.eclipse.org/org/documents/edl-v10.php * * All rights reserved. * * Redistribution and use in source and binary forms, with or * without modification, are permitted provided that the following * conditions are met: * * - Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * - Redistributions in binary form must reproduce the above * copyright notice, this list of conditions and the following * disclaimer in the documentation and/or other materials provided * with the distribution. * * - Neither the name of the Eclipse Foundation, Inc. nor the * names of its contributors may be used to endorse or promote * products derived from this software without specific prior * written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND * CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ package org.eclipse.jgit.lib; import static java.lang.Integer.valueOf; import static org.eclipse.jgit.lib.Constants.OBJECT_ID_LENGTH; import static org.eclipse.jgit.lib.Constants.OBJ_BAD; import static org.eclipse.jgit.lib.Constants.OBJ_BLOB; import static org.eclipse.jgit.lib.Constants.OBJ_COMMIT; import static org.eclipse.jgit.lib.Constants.OBJ_TAG; import static org.eclipse.jgit.lib.Constants.OBJ_TREE; import static org.eclipse.jgit.lib.Constants.encode; import static org.eclipse.jgit.lib.Constants.encodeASCII; import static org.eclipse.jgit.lib.ObjectChecker.ErrorType.DUPLICATE_ENTRIES; import static org.eclipse.jgit.lib.ObjectChecker.ErrorType.EMPTY_NAME; import static org.eclipse.jgit.lib.ObjectChecker.ErrorType.FULL_PATHNAME; import static org.eclipse.jgit.lib.ObjectChecker.ErrorType.HAS_DOT; import static org.eclipse.jgit.lib.ObjectChecker.ErrorType.HAS_DOTDOT; import static org.eclipse.jgit.lib.ObjectChecker.ErrorType.HAS_DOTGIT; import static org.eclipse.jgit.lib.ObjectChecker.ErrorType.NULL_SHA1; import static org.eclipse.jgit.lib.ObjectChecker.ErrorType.TREE_NOT_SORTED; import static org.eclipse.jgit.lib.ObjectChecker.ErrorType.ZERO_PADDED_FILEMODE; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertSame; import static org.junit.Assert.fail; import java.io.UnsupportedEncodingException; import java.text.MessageFormat; import org.eclipse.jgit.errors.CorruptObjectException; import org.eclipse.jgit.internal.JGitText; import org.junit.Before; import org.junit.Test; public class ObjectCheckerTest { private ObjectChecker checker; @Before public void setUp() throws Exception { checker = new ObjectChecker(); } @Test public void testInvalidType() { String msg = MessageFormat.format( JGitText.get().corruptObjectInvalidType2, valueOf(OBJ_BAD)); assertCorrupt(msg, OBJ_BAD, new byte[0]); } @Test public void testCheckBlob() throws CorruptObjectException { // Any blob should pass... checker.checkBlob(new byte[0]); checker.checkBlob(new byte[1]); checker.check(OBJ_BLOB, new byte[0]); checker.check(OBJ_BLOB, new byte[1]); } @Test public void testValidCommitNoParent() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author A. U. Thor <author@localhost> 1 +0000\n"); b.append("committer A. U. Thor <author@localhost> 1 +0000\n"); byte[] data = encodeASCII(b.toString()); checker.checkCommit(data); checker.check(OBJ_COMMIT, data); } @Test public void testValidCommitBlankAuthor() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author <> 0 +0000\n"); b.append("committer <> 0 +0000\n"); byte[] data = encodeASCII(b.toString()); checker.checkCommit(data); checker.check(OBJ_COMMIT, data); } @Test public void testCommitCorruptAuthor() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree be9bfa841874ccc9f2ef7c48d0c76226f89b7189\n"); b.append("author b <b@c> <b@c> 0 +0000\n"); b.append("committer <> 0 +0000\n"); byte[] data = encodeASCII(b.toString()); assertCorrupt("bad date", OBJ_COMMIT, data); checker.setAllowInvalidPersonIdent(true); checker.checkCommit(data); checker.setAllowInvalidPersonIdent(false); assertSkipListAccepts(OBJ_COMMIT, data); } @Test public void testCommitCorruptCommitter() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree be9bfa841874ccc9f2ef7c48d0c76226f89b7189\n"); b.append("author <> 0 +0000\n"); b.append("committer b <b@c> <b@c> 0 +0000\n"); byte[] data = encodeASCII(b.toString()); assertCorrupt("bad date", OBJ_COMMIT, data); checker.setAllowInvalidPersonIdent(true); checker.checkCommit(data); checker.setAllowInvalidPersonIdent(false); assertSkipListAccepts(OBJ_COMMIT, data); } @Test public void testValidCommit1Parent() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("parent "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author A. U. Thor <author@localhost> 1 +0000\n"); b.append("committer A. U. Thor <author@localhost> 1 +0000\n"); byte[] data = encodeASCII(b.toString()); checker.checkCommit(data); checker.check(OBJ_COMMIT, data); } @Test public void testValidCommit2Parent() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("parent "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("parent "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author A. U. Thor <author@localhost> 1 +0000\n"); b.append("committer A. U. Thor <author@localhost> 1 +0000\n"); byte[] data = encodeASCII(b.toString()); checker.checkCommit(data); checker.check(OBJ_COMMIT, data); } @Test public void testValidCommit128Parent() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); for (int i = 0; i < 128; i++) { b.append("parent "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); } b.append("author A. U. Thor <author@localhost> 1 +0000\n"); b.append("committer A. U. Thor <author@localhost> 1 +0000\n"); byte[] data = encodeASCII(b.toString()); checker.checkCommit(data); checker.check(OBJ_COMMIT, data); } @Test public void testValidCommitNormalTime() throws CorruptObjectException { StringBuilder b = new StringBuilder(); String when = "1222757360 -0730"; b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author A. U. Thor <author@localhost> " + when + "\n"); b.append("committer A. U. Thor <author@localhost> " + when + "\n"); byte[] data = encodeASCII(b.toString()); checker.checkCommit(data); checker.check(OBJ_COMMIT, data); } @Test public void testInvalidCommitNoTree1() { StringBuilder b = new StringBuilder(); b.append("parent "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); assertCorrupt("no tree header", OBJ_COMMIT, b); } @Test public void testInvalidCommitNoTree2() { StringBuilder b = new StringBuilder(); b.append("trie "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); assertCorrupt("no tree header", OBJ_COMMIT, b); } @Test public void testInvalidCommitNoTree3() { StringBuilder b = new StringBuilder(); b.append("tree"); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); assertCorrupt("no tree header", OBJ_COMMIT, b); } @Test public void testInvalidCommitNoTree4() { StringBuilder b = new StringBuilder(); b.append("tree\t"); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); assertCorrupt("no tree header", OBJ_COMMIT, b); } @Test public void testInvalidCommitInvalidTree1() { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("zzzzfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); assertCorrupt("invalid tree", OBJ_COMMIT, b); } @Test public void testInvalidCommitInvalidTree2() { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append("z\n"); assertCorrupt("invalid tree", OBJ_COMMIT, b); } @Test public void testInvalidCommitInvalidTree3() { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9b"); b.append("\n"); byte[] data = encodeASCII(b.toString()); assertCorrupt("invalid tree", OBJ_COMMIT, data); } @Test public void testInvalidCommitInvalidTree4() { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); assertCorrupt("invalid tree", OBJ_COMMIT, b); } @Test public void testInvalidCommitInvalidParent1() { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("parent "); b.append("\n"); assertCorrupt("invalid parent", OBJ_COMMIT, b); } @Test public void testInvalidCommitInvalidParent2() { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("parent "); b.append("zzzzfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append("\n"); assertCorrupt("invalid parent", OBJ_COMMIT, b); } @Test public void testInvalidCommitInvalidParent3() { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("parent "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append("\n"); assertCorrupt("invalid parent", OBJ_COMMIT, b); } @Test public void testInvalidCommitInvalidParent4() { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("parent "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append("z\n"); assertCorrupt("invalid parent", OBJ_COMMIT, b); } @Test public void testInvalidCommitInvalidParent5() { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("parent\t"); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append("\n"); byte[] data = encodeASCII(b.toString()); // Yes, really, we complain about author not being // found as the invalid parent line wasn't consumed. assertCorrupt("no author", OBJ_COMMIT, data); } @Test public void testInvalidCommitNoAuthor() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("committer A. U. Thor <author@localhost> 1 +0000\n"); byte[] data = encodeASCII(b.toString()); assertCorrupt("no author", OBJ_COMMIT, data); assertSkipListAccepts(OBJ_COMMIT, data); } @Test public void testInvalidCommitNoCommitter1() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author A. U. Thor <author@localhost> 1 +0000\n"); byte[] data = encodeASCII(b.toString()); assertCorrupt("no committer", OBJ_COMMIT, data); assertSkipListAccepts(OBJ_COMMIT, data); } @Test public void testInvalidCommitNoCommitter2() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author A. U. Thor <author@localhost> 1 +0000\n"); b.append("\n"); byte[] data = encodeASCII(b.toString()); assertCorrupt("no committer", OBJ_COMMIT, data); assertSkipListAccepts(OBJ_COMMIT, data); } @Test public void testInvalidCommitInvalidAuthor1() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author A. U. Thor <foo 1 +0000\n"); byte[] data = encodeASCII(b.toString()); assertCorrupt("bad email", OBJ_COMMIT, data); assertSkipListAccepts(OBJ_COMMIT, data); } @Test public void testInvalidCommitInvalidAuthor2() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author A. U. Thor foo> 1 +0000\n"); byte[] data = encodeASCII(b.toString()); assertCorrupt("missing email", OBJ_COMMIT, data); assertSkipListAccepts(OBJ_COMMIT, data); } @Test public void testInvalidCommitInvalidAuthor3() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author 1 +0000\n"); byte[] data = encodeASCII(b.toString()); assertCorrupt("missing email", OBJ_COMMIT, data); assertSkipListAccepts(OBJ_COMMIT, data); } @Test public void testInvalidCommitInvalidAuthor4() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author a <b> +0000\n"); byte[] data = encodeASCII(b.toString()); assertCorrupt("bad date", OBJ_COMMIT, data); assertSkipListAccepts(OBJ_COMMIT, data); } @Test public void testInvalidCommitInvalidAuthor5() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author a <b>\n"); byte[] data = encodeASCII(b.toString()); assertCorrupt("bad date", OBJ_COMMIT, data); assertSkipListAccepts(OBJ_COMMIT, data); } @Test public void testInvalidCommitInvalidAuthor6() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author a <b> z"); byte[] data = encodeASCII(b.toString()); assertCorrupt("bad date", OBJ_COMMIT, data); assertSkipListAccepts(OBJ_COMMIT, data); } @Test public void testInvalidCommitInvalidAuthor7() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author a <b> 1 z"); byte[] data = encodeASCII(b.toString()); assertCorrupt("bad time zone", OBJ_COMMIT, data); assertSkipListAccepts(OBJ_COMMIT, data); } @Test public void testInvalidCommitInvalidCommitter() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("tree "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("author a <b> 1 +0000\n"); b.append("committer a <"); byte[] data = encodeASCII(b.toString()); assertCorrupt("bad email", OBJ_COMMIT, data); assertSkipListAccepts(OBJ_COMMIT, data); } @Test public void testValidTag() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("object "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("type commit\n"); b.append("tag test-tag\n"); b.append("tagger A. U. Thor <author@localhost> 1 +0000\n"); byte[] data = encodeASCII(b.toString()); checker.checkTag(data); checker.check(OBJ_TAG, data); } @Test public void testInvalidTagNoObject1() { assertCorrupt("no object header", OBJ_TAG, new byte[0]); } @Test public void testInvalidTagNoObject2() { StringBuilder b = new StringBuilder(); b.append("object\t"); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); assertCorrupt("no object header", OBJ_TAG, b); } @Test public void testInvalidTagNoObject3() { StringBuilder b = new StringBuilder(); b.append("obejct "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); assertCorrupt("no object header", OBJ_TAG, b); } @Test public void testInvalidTagNoObject4() { StringBuilder b = new StringBuilder(); b.append("object "); b.append("zz9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); assertCorrupt("invalid object", OBJ_TAG, b); } @Test public void testInvalidTagNoObject5() { StringBuilder b = new StringBuilder(); b.append("object "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append(" \n"); assertCorrupt("invalid object", OBJ_TAG, b); } @Test public void testInvalidTagNoObject6() { StringBuilder b = new StringBuilder(); b.append("object "); b.append("be9"); assertCorrupt("invalid object", OBJ_TAG, b); } @Test public void testInvalidTagNoType1() { StringBuilder b = new StringBuilder(); b.append("object "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); assertCorrupt("no type header", OBJ_TAG, b); } @Test public void testInvalidTagNoType2() { StringBuilder b = new StringBuilder(); b.append("object "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("type\tcommit\n"); assertCorrupt("no type header", OBJ_TAG, b); } @Test public void testInvalidTagNoType3() { StringBuilder b = new StringBuilder(); b.append("object "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("tpye commit\n"); assertCorrupt("no type header", OBJ_TAG, b); } @Test public void testInvalidTagNoType4() { StringBuilder b = new StringBuilder(); b.append("object "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("type commit"); assertCorrupt("no tag header", OBJ_TAG, b); } @Test public void testInvalidTagNoTagHeader1() { StringBuilder b = new StringBuilder(); b.append("object "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("type commit\n"); assertCorrupt("no tag header", OBJ_TAG, b); } @Test public void testInvalidTagNoTagHeader2() { StringBuilder b = new StringBuilder(); b.append("object "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("type commit\n"); b.append("tag\tfoo\n"); assertCorrupt("no tag header", OBJ_TAG, b); } @Test public void testInvalidTagNoTagHeader3() { StringBuilder b = new StringBuilder(); b.append("object "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("type commit\n"); b.append("tga foo\n"); assertCorrupt("no tag header", OBJ_TAG, b); } @Test public void testValidTagHasNoTaggerHeader() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("object "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("type commit\n"); b.append("tag foo\n"); checker.checkTag(encodeASCII(b.toString())); } @Test public void testInvalidTagInvalidTaggerHeader1() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("object "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("type commit\n"); b.append("tag foo\n"); b.append("tagger \n"); byte[] data = encodeASCII(b.toString()); assertCorrupt("missing email", OBJ_TAG, data); checker.setAllowInvalidPersonIdent(true); checker.checkTag(data); checker.setAllowInvalidPersonIdent(false); assertSkipListAccepts(OBJ_TAG, data); } @Test public void testInvalidTagInvalidTaggerHeader3() throws CorruptObjectException { StringBuilder b = new StringBuilder(); b.append("object "); b.append("be9bfa841874ccc9f2ef7c48d0c76226f89b7189"); b.append('\n'); b.append("type commit\n"); b.append("tag foo\n"); b.append("tagger a < 1 +000\n"); byte[] data = encodeASCII(b.toString()); assertCorrupt("bad email", OBJ_TAG, data); assertSkipListAccepts(OBJ_TAG, data); } @Test public void testValidEmptyTree() throws CorruptObjectException { checker.checkTree(new byte[0]); checker.check(OBJ_TREE, new byte[0]); } @Test public void testValidTree1() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 regular-file"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testValidTree2() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100755 executable"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testValidTree3() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "40000 tree"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testValidTree4() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "120000 symlink"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testValidTree5() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "160000 git link"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testValidTree6() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .a"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testNullSha1InTreeEntry() throws CorruptObjectException { byte[] data = concat( encodeASCII("100644 A"), new byte[] { '\0' }, new byte[OBJECT_ID_LENGTH]); assertCorrupt("entry points to null SHA-1", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(NULL_SHA1, true); checker.checkTree(data); } @Test public void testValidPosixTree() throws CorruptObjectException { checkOneName("a<b>c:d|e"); checkOneName("test "); checkOneName("test."); checkOneName("NUL"); } @Test public void testValidTreeSorting1() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 fooaaa"); entry(b, "100755 foobar"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testValidTreeSorting2() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100755 fooaaa"); entry(b, "100644 foobar"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testValidTreeSorting3() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "40000 a"); entry(b, "100644 b"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testValidTreeSorting4() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 a"); entry(b, "40000 b"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testValidTreeSorting5() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 a.c"); entry(b, "40000 a"); entry(b, "100644 a0c"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testValidTreeSorting6() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "40000 a"); entry(b, "100644 apple"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testValidTreeSorting7() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "40000 an orang"); entry(b, "40000 an orange"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testValidTreeSorting8() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 a"); entry(b, "100644 a0c"); entry(b, "100644 b"); checker.checkTree(encodeASCII(b.toString())); } @Test public void testAcceptTreeModeWithZero() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "040000 a"); byte[] data = encodeASCII(b.toString()); checker.setAllowLeadingZeroFileMode(true); checker.checkTree(data); checker.setAllowLeadingZeroFileMode(false); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(ZERO_PADDED_FILEMODE, true); checker.checkTree(data); } @Test public void testInvalidTreeModeStartsWithZero1() { StringBuilder b = new StringBuilder(); entry(b, "0 a"); assertCorrupt("mode starts with '0'", OBJ_TREE, b); } @Test public void testInvalidTreeModeStartsWithZero2() { StringBuilder b = new StringBuilder(); entry(b, "0100644 a"); assertCorrupt("mode starts with '0'", OBJ_TREE, b); } @Test public void testInvalidTreeModeStartsWithZero3() { StringBuilder b = new StringBuilder(); entry(b, "040000 a"); assertCorrupt("mode starts with '0'", OBJ_TREE, b); } @Test public void testInvalidTreeModeNotOctal1() { StringBuilder b = new StringBuilder(); entry(b, "8 a"); assertCorrupt("invalid mode character", OBJ_TREE, b); } @Test public void testInvalidTreeModeNotOctal2() { StringBuilder b = new StringBuilder(); entry(b, "Z a"); byte[] data = encodeASCII(b.toString()); assertCorrupt("invalid mode character", OBJ_TREE, data); assertSkipListRejects("invalid mode character", OBJ_TREE, data); } @Test public void testInvalidTreeModeNotSupportedMode1() { StringBuilder b = new StringBuilder(); entry(b, "1 a"); byte[] data = encodeASCII(b.toString()); assertCorrupt("invalid mode 1", OBJ_TREE, data); assertSkipListRejects("invalid mode 1", OBJ_TREE, data); } @Test public void testInvalidTreeModeNotSupportedMode2() { StringBuilder b = new StringBuilder(); entry(b, "170000 a"); assertCorrupt("invalid mode " + 0170000, OBJ_TREE, b); } @Test public void testInvalidTreeModeMissingName() { StringBuilder b = new StringBuilder(); b.append("100644"); assertCorrupt("truncated in mode", OBJ_TREE, b); } @Test public void testInvalidTreeNameContainsSlash() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 a/b"); byte[] data = encodeASCII(b.toString()); assertCorrupt("name contains '/'", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(FULL_PATHNAME, true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsEmpty() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 "); byte[] data = encodeASCII(b.toString()); assertCorrupt("zero length name", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(EMPTY_NAME, true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsDot() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 ."); byte[] data = encodeASCII(b.toString()); assertCorrupt("invalid name '.'", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(HAS_DOT, true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsDotDot() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .."); byte[] data = encodeASCII(b.toString()); assertCorrupt("invalid name '..'", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(HAS_DOTDOT, true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsGit() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .git"); byte[] data = encodeASCII(b.toString()); assertCorrupt("invalid name '.git'", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(HAS_DOTGIT, true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsMixedCaseGit() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .GiT"); byte[] data = encodeASCII(b.toString()); assertCorrupt("invalid name '.GiT'", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(HAS_DOTGIT, true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsMacHFSGit() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .gi\u200Ct"); byte[] data = encode(b.toString()); // Fine on POSIX. checker.checkTree(data); // Rejected on Mac OS. checker.setSafeForMacOS(true); assertCorrupt( "invalid name '.gi\u200Ct' contains ignorable Unicode characters", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(HAS_DOTGIT, true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsMacHFSGit2() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 \u206B.git"); byte[] data = encode(b.toString()); // Fine on POSIX. checker.checkTree(data); // Rejected on Mac OS. checker.setSafeForMacOS(true); assertCorrupt( "invalid name '\u206B.git' contains ignorable Unicode characters", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(HAS_DOTGIT, true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsMacHFSGit3() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .git\uFEFF"); byte[] data = encode(b.toString()); // Fine on POSIX. checker.checkTree(data); // Rejected on Mac OS. checker.setSafeForMacOS(true); assertCorrupt( "invalid name '.git\uFEFF' contains ignorable Unicode characters", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(HAS_DOTGIT, true); checker.checkTree(data); } private static byte[] concat(byte[]... b) { int n = 0; for (byte[] a : b) { n += a.length; } byte[] data = new byte[n]; n = 0; for (byte[] a : b) { System.arraycopy(a, 0, data, n, a.length); n += a.length; } return data; } @Test public void testInvalidTreeNameIsMacHFSGitCorruptUTF8AtEnd() throws CorruptObjectException { byte[] data = concat(encode("100644 .git"), new byte[] { (byte) 0xef }); StringBuilder b = new StringBuilder(); entry(b, ""); data = concat(data, encode(b.toString())); // Fine on POSIX. checker.checkTree(data); // Rejected on Mac OS. checker.setSafeForMacOS(true); assertCorrupt( "invalid name contains byte sequence '0xef' which is not a valid UTF-8 character", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); } @Test public void testInvalidTreeNameIsMacHFSGitCorruptUTF8AtEnd2() throws CorruptObjectException { byte[] data = concat(encode("100644 .git"), new byte[] { (byte) 0xe2, (byte) 0xab }); StringBuilder b = new StringBuilder(); entry(b, ""); data = concat(data, encode(b.toString())); // Fine on POSIX. checker.checkTree(data); // Rejected on Mac OS. checker.setSafeForMacOS(true); assertCorrupt( "invalid name contains byte sequence '0xe2ab' which is not a valid UTF-8 character", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); } @Test public void testInvalidTreeNameIsNotMacHFSGit() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .git\u200Cx"); byte[] data = encode(b.toString()); checker.setSafeForMacOS(true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsNotMacHFSGit2() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .kit\u200C"); byte[] data = encode(b.toString()); checker.setSafeForMacOS(true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsNotMacHFSGitOtherPlatform() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .git\u200C"); byte[] data = encode(b.toString()); checker.checkTree(data); } @Test public void testInvalidTreeNameIsDotGitDot() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .git."); byte[] data = encodeASCII(b.toString()); assertCorrupt("invalid name '.git.'", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(HAS_DOTGIT, true); checker.checkTree(data); } @Test public void testValidTreeNameIsDotGitDotDot() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .git.."); checker.checkTree(encodeASCII(b.toString())); } @Test public void testInvalidTreeNameIsDotGitSpace() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .git "); byte[] data = encodeASCII(b.toString()); assertCorrupt("invalid name '.git '", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(HAS_DOTGIT, true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsDotGitSomething() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .gitfoobar"); byte[] data = encodeASCII(b.toString()); checker.checkTree(data); } @Test public void testInvalidTreeNameIsDotGitSomethingSpaceSomething() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .gitfoo bar"); byte[] data = encodeASCII(b.toString()); checker.checkTree(data); } @Test public void testInvalidTreeNameIsDotGitSomethingDot() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .gitfoobar."); byte[] data = encodeASCII(b.toString()); checker.checkTree(data); } @Test public void testInvalidTreeNameIsDotGitSomethingDotDot() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .gitfoobar.."); byte[] data = encodeASCII(b.toString()); checker.checkTree(data); } @Test public void testInvalidTreeNameIsDotGitDotSpace() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .git. "); byte[] data = encodeASCII(b.toString()); assertCorrupt("invalid name '.git. '", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(HAS_DOTGIT, true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsDotGitSpaceDot() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 .git . "); byte[] data = encodeASCII(b.toString()); assertCorrupt("invalid name '.git . '", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(HAS_DOTGIT, true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsGITTilde1() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 GIT~1"); byte[] data = encodeASCII(b.toString()); assertCorrupt("invalid name 'GIT~1'", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(HAS_DOTGIT, true); checker.checkTree(data); } @Test public void testInvalidTreeNameIsGiTTilde1() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 GiT~1"); byte[] data = encodeASCII(b.toString()); assertCorrupt("invalid name 'GiT~1'", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(HAS_DOTGIT, true); checker.checkTree(data); } @Test public void testValidTreeNameIsGitTilde11() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 GIT~11"); byte[] data = encodeASCII(b.toString()); checker.checkTree(data); } @Test public void testInvalidTreeTruncatedInName() { StringBuilder b = new StringBuilder(); b.append("100644 b"); byte[] data = encodeASCII(b.toString()); assertCorrupt("truncated in name", OBJ_TREE, data); assertSkipListRejects("truncated in name", OBJ_TREE, data); } @Test public void testInvalidTreeTruncatedInObjectId() { StringBuilder b = new StringBuilder(); b.append("100644 b\0\1\2"); byte[] data = encodeASCII(b.toString()); assertCorrupt("truncated in object id", OBJ_TREE, data); assertSkipListRejects("truncated in object id", OBJ_TREE, data); } @Test public void testInvalidTreeBadSorting1() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 foobar"); entry(b, "100644 fooaaa"); byte[] data = encodeASCII(b.toString()); assertCorrupt("incorrectly sorted", OBJ_TREE, data); ObjectId id = idFor(OBJ_TREE, data); try { checker.check(id, OBJ_TREE, data); fail("Did not throw CorruptObjectException"); } catch (CorruptObjectException e) { assertSame(TREE_NOT_SORTED, e.getErrorType()); assertEquals("treeNotSorted: object " + id.name() + ": incorrectly sorted", e.getMessage()); } assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(TREE_NOT_SORTED, true); checker.checkTree(data); } @Test public void testInvalidTreeBadSorting2() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "40000 a"); entry(b, "100644 a.c"); byte[] data = encodeASCII(b.toString()); assertCorrupt("incorrectly sorted", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(TREE_NOT_SORTED, true); checker.checkTree(data); } @Test public void testInvalidTreeBadSorting3() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 a0c"); entry(b, "40000 a"); byte[] data = encodeASCII(b.toString()); assertCorrupt("incorrectly sorted", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(TREE_NOT_SORTED, true); checker.checkTree(data); } @Test public void testInvalidTreeDuplicateNames1_File() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 a"); entry(b, "100644 a"); byte[] data = encodeASCII(b.toString()); assertCorrupt("duplicate entry names", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(DUPLICATE_ENTRIES, true); checker.checkTree(data); } @Test public void testInvalidTreeDuplicateNames1_Tree() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "40000 a"); entry(b, "40000 a"); byte[] data = encodeASCII(b.toString()); assertCorrupt("duplicate entry names", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(DUPLICATE_ENTRIES, true); checker.checkTree(data); } @Test public void testInvalidTreeDuplicateNames2() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 a"); entry(b, "100755 a"); byte[] data = encodeASCII(b.toString()); assertCorrupt("duplicate entry names", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(DUPLICATE_ENTRIES, true); checker.checkTree(data); } @Test public void testInvalidTreeDuplicateNames3() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 a"); entry(b, "40000 a"); byte[] data = encodeASCII(b.toString()); assertCorrupt("duplicate entry names", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(DUPLICATE_ENTRIES, true); checker.checkTree(data); } @Test public void testInvalidTreeDuplicateNames4() throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 a"); entry(b, "100644 a.c"); entry(b, "100644 a.d"); entry(b, "100644 a.e"); entry(b, "40000 a"); entry(b, "100644 zoo"); byte[] data = encodeASCII(b.toString()); assertCorrupt("duplicate entry names", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(DUPLICATE_ENTRIES, true); checker.checkTree(data); } @Test public void testInvalidTreeDuplicateNames5() throws UnsupportedEncodingException, CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 A"); entry(b, "100644 a"); byte[] data = b.toString().getBytes("UTF-8"); checker.setSafeForWindows(true); assertCorrupt("duplicate entry names", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(DUPLICATE_ENTRIES, true); checker.checkTree(data); } @Test public void testInvalidTreeDuplicateNames6() throws UnsupportedEncodingException, CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 A"); entry(b, "100644 a"); byte[] data = b.toString().getBytes("UTF-8"); checker.setSafeForMacOS(true); assertCorrupt("duplicate entry names", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(DUPLICATE_ENTRIES, true); checker.checkTree(data); } @Test public void testInvalidTreeDuplicateNames7() throws UnsupportedEncodingException, CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 \u0065\u0301"); entry(b, "100644 \u00e9"); byte[] data = b.toString().getBytes("UTF-8"); checker.setSafeForMacOS(true); assertCorrupt("duplicate entry names", OBJ_TREE, data); assertSkipListAccepts(OBJ_TREE, data); checker.setIgnore(DUPLICATE_ENTRIES, true); checker.checkTree(data); } @Test public void testInvalidTreeDuplicateNames8() throws UnsupportedEncodingException, CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 A"); checker.setSafeForMacOS(true); checker.checkTree(b.toString().getBytes("UTF-8")); } @Test public void testRejectNulInPathSegment() { try { checker.checkPathSegment(encodeASCII("a\u0000b"), 0, 3); fail("incorrectly accepted NUL in middle of name"); } catch (CorruptObjectException e) { assertEquals("name contains byte 0x00", e.getMessage()); } } @Test public void testRejectSpaceAtEndOnWindows() { checker.setSafeForWindows(true); try { checkOneName("test "); fail("incorrectly accepted space at end"); } catch (CorruptObjectException e) { assertEquals("invalid name ends with ' '", e.getMessage()); } } @Test public void testBug477090() throws CorruptObjectException { checker.setSafeForMacOS(true); final byte[] bytes = { // U+221E 0xe2889e INFINITY ∞ (byte) 0xe2, (byte) 0x88, (byte) 0x9e, // .html 0x2e, 0x68, 0x74, 0x6d, 0x6c }; checker.checkPathSegment(bytes, 0, bytes.length); } @Test public void testRejectDotAtEndOnWindows() { checker.setSafeForWindows(true); try { checkOneName("test."); fail("incorrectly accepted dot at end"); } catch (CorruptObjectException e) { assertEquals("invalid name ends with '.'", e.getMessage()); } } @Test public void testRejectDevicesOnWindows() { checker.setSafeForWindows(true); String[] bad = { "CON", "PRN", "AUX", "NUL", "COM1", "COM2", "COM3", "COM4", "COM5", "COM6", "COM7", "COM8", "COM9", "LPT1", "LPT2", "LPT3", "LPT4", "LPT5", "LPT6", "LPT7", "LPT8", "LPT9" }; for (String b : bad) { try { checkOneName(b); fail("incorrectly accepted " + b); } catch (CorruptObjectException e) { assertEquals("invalid name '" + b + "'", e.getMessage()); } try { checkOneName(b + ".txt"); fail("incorrectly accepted " + b + ".txt"); } catch (CorruptObjectException e) { assertEquals("invalid name '" + b + "'", e.getMessage()); } } } @Test public void testRejectInvalidWindowsCharacters() { checker.setSafeForWindows(true); rejectName('<'); rejectName('>'); rejectName(':'); rejectName('"'); rejectName('/'); rejectName('\\'); rejectName('|'); rejectName('?'); rejectName('*'); for (int i = 1; i <= 31; i++) rejectName((byte) i); } private void rejectName(char c) { try { checkOneName("te" + c + "st"); fail("incorrectly accepted with " + c); } catch (CorruptObjectException e) { assertEquals("name contains '" + c + "'", e.getMessage()); } } private void rejectName(byte c) { String h = Integer.toHexString(c); try { checkOneName("te" + ((char) c) + "st"); fail("incorrectly accepted with 0x" + h); } catch (CorruptObjectException e) { assertEquals("name contains byte 0x" + h, e.getMessage()); } } private void checkOneName(String name) throws CorruptObjectException { StringBuilder b = new StringBuilder(); entry(b, "100644 " + name); checker.checkTree(encodeASCII(b.toString())); } private static void entry(StringBuilder b, final String modeName) { b.append(modeName); b.append('\0'); for (int i = 0; i < OBJECT_ID_LENGTH; i++) b.append((char) i); } private void assertCorrupt(String msg, int type, StringBuilder b) { assertCorrupt(msg, type, encodeASCII(b.toString())); } private void assertCorrupt(String msg, int type, byte[] data) { try { checker.check(type, data); fail("Did not throw CorruptObjectException"); } catch (CorruptObjectException e) { assertEquals(msg, e.getMessage()); } } private void assertSkipListAccepts(int type, byte[] data) throws CorruptObjectException { ObjectId id = idFor(type, data); checker.setSkipList(set(id)); checker.check(id, type, data); checker.setSkipList(null); } private void assertSkipListRejects(String msg, int type, byte[] data) { ObjectId id = idFor(type, data); checker.setSkipList(set(id)); try { checker.check(id, type, data); fail("Did not throw CorruptObjectException"); } catch (CorruptObjectException e) { assertEquals(msg, e.getMessage()); } checker.setSkipList(null); } private static ObjectIdSet set(final ObjectId... ids) { return new ObjectIdSet() { @Override public boolean contains(AnyObjectId objectId) { for (ObjectId id : ids) { if (id.equals(objectId)) { return true; } } return false; } }; } @SuppressWarnings("resource") private static ObjectId idFor(int type, byte[] raw) { return new ObjectInserter.Formatter().idFor(type, raw); } }