| // The information inside a .exe file contains a string of the PDB file name. |
| // This could be a security concern if the full path was exposed, as it could |
| // reveal information about the filesystem where the bin was first compiled. |
| // This should only be overridden by `-Clink-arg=/PDBALTPATH:...` - this test |
| // checks that no full file paths are exposed and that the override flag is respected. |
| // See https://github.com/rust-lang/rust/pull/121297 |
| |
| //@ only-x86_64-pc-windows-msvc |
| |
| use run_make_support::{bin_name, invalid_utf8_contains, invalid_utf8_not_contains, run, rustc}; |
| |
| fn main() { |
| // Test that we don't have the full path to the PDB file in the binary |
| rustc() |
| .input("main.rs") |
| .arg("-g") |
| .crate_name("my_crate_name") |
| .crate_type("bin") |
| .arg("-Cforce-frame-pointers") |
| .run(); |
| invalid_utf8_contains(&bin_name("my_crate_name"), "my_crate_name.pdb"); |
| invalid_utf8_not_contains(&bin_name("my_crate_name"), r#"\my_crate_name.pdb"#); |
| // Test that backtraces still can find debuginfo by checking that they contain symbol names and |
| // source locations. |
| let out = run(&bin_name("my_crate_name")); |
| out.assert_stdout_contains("my_crate_name::fn_in_backtrace"); |
| out.assert_stdout_contains("main.rs:15"); |
| // Test that explicitly passed `-Clink-arg=/PDBALTPATH:...` is respected |
| rustc() |
| .input("main.rs") |
| .arg("-g") |
| .crate_name("my_crate_name") |
| .crate_type("bin") |
| .link_arg("/PDBALTPATH:abcdefg.pdb") |
| .arg("-Cforce-frame-pointers") |
| .run(); |
| invalid_utf8_contains(&bin_name("my_crate_name"), "abcdefg.pdb"); |
| invalid_utf8_not_contains(&bin_name("my_crate_name"), "my_crate_name.pdb"); |
| } |