@Override public boolean mkdir( File fileName ) { return fs.mkdir( fileName ); }
@Override public boolean mkdir( File fileName ) { return delegate.mkdir( fileName ); }
@Override public boolean mkdir( File fileName ) { return chooseFileSystem( fileName ).mkdir( fileName ); }
@Override public boolean mkdir( File fileName ) { adversary.injectFailure( SecurityException.class ); return delegate.mkdir( fileName ); }
private File badDataFile( FileSystemAbstraction fileSystem, File badDataPath ) throws IOException { fileSystem.mkdir( badDataPath.getParentFile() ); fileSystem.create( badDataPath ); return badDataPath; }
private void cleanMigrationDirectory( File migrationDirectory ) { try { if ( fileSystem.fileExists( migrationDirectory ) ) { fileSystem.deleteRecursively( migrationDirectory ); } } catch ( IOException | UncheckedIOException e ) { throw new UnableToUpgradeException( "Failure deleting upgrade directory " + migrationDirectory, e ); } fileSystem.mkdir( migrationDirectory ); }
@Test public void upgraderShouldCleanupLegacyLeftoverAndMigrationDirs() throws Exception { // Given fileSystem.deleteFile( databaseLayout.file( INTERNAL_LOG_FILE ) ); fileSystem.mkdir( databaseLayout.file( StoreUpgrader.MIGRATION_DIRECTORY ) ); fileSystem.mkdir( databaseLayout.file( StoreUpgrader.MIGRATION_LEFT_OVERS_DIRECTORY ) ); fileSystem.mkdir( databaseLayout.file( StoreUpgrader.MIGRATION_LEFT_OVERS_DIRECTORY + "_1" ) ); fileSystem.mkdir( databaseLayout.file( StoreUpgrader.MIGRATION_LEFT_OVERS_DIRECTORY + "_2" ) ); fileSystem.mkdir( databaseLayout.file( StoreUpgrader.MIGRATION_LEFT_OVERS_DIRECTORY + "_42" ) ); PageCache pageCache = pageCacheRule.getPageCache( fileSystem ); // When UpgradableDatabase upgradableDatabase = getUpgradableDatabase( pageCache ); StoreUpgrader storeUpgrader = newUpgrader( upgradableDatabase, pageCache ); storeUpgrader.migrateIfNeeded( databaseLayout ); // Then assertThat( migrationHelperDirs(), is( emptyCollectionOf( File.class ) ) ); }
public SslResource install( File targetDirectory, String trustedFileName ) throws IOException { File targetKey = new File( targetDirectory, PRIVATE_KEY_NAME ); File targetCertificate = new File( targetDirectory, PUBLIC_CERT_NAME ); File targetTrusted = new File( targetDirectory, TRUSTED_DIR_NAME ); File targetRevoked = new File( targetDirectory, REVOKED_DIR_NAME ); fsa.mkdir( targetTrusted ); fsa.mkdir( targetRevoked ); for ( int trustedKeyId : trusted ) { File targetTrustedCertificate = new File( targetTrusted, String.valueOf( trustedKeyId ) + ".crt" ); copy( resource( SELF_SIGNED_NAME, trustedKeyId ), targetTrustedCertificate ); } for ( int revokedKeyId : revoked ) { File targetRevokedCRL = new File( targetRevoked, String.valueOf( revokedKeyId ) + ".crl" ); copy( resource( REVOKED_NAME, revokedKeyId ), targetRevokedCRL ); } if ( trustSignedByCA ) { File targetTrustedCertificate = new File( targetTrusted, trustedFileName ); copy( resource( trustedFileName ), targetTrustedCertificate ); } copy( resource( PRIVATE_KEY_NAME, keyId ), targetKey ); copy( signedBy.keyId( keyId ), targetCertificate ); return new SslResource( targetKey, targetCertificate, targetTrusted, targetRevoked ); }
fs.mkdir( authFile.getParentFile() );
private void cleanDirectory() throws IOException { if ( !fs.mkdir( tempStoreDir ) ) { fs.deleteRecursively( tempStoreDir ); } }
private void cleanMigrationDirectory( File migrationDirectory ) { try { if ( fileSystem.fileExists( migrationDirectory ) ) { fileSystem.deleteRecursively( migrationDirectory ); } } catch ( IOException | UncheckedIOException e ) { throw new UnableToUpgradeException( "Failure deleting upgrade directory " + migrationDirectory, e ); } fileSystem.mkdir( migrationDirectory ); }