You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
303 lines
9.7 KiB
303 lines
9.7 KiB
//
|
|
// Copyright (C) 2012 The Android Open Source Project
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
//
|
|
|
|
#include "update_engine/common/subprocess.h"
|
|
|
|
#include <fcntl.h>
|
|
#include <poll.h>
|
|
#include <sys/types.h>
|
|
#include <unistd.h>
|
|
|
|
#include <set>
|
|
#include <string>
|
|
#include <vector>
|
|
|
|
#include <base/bind.h>
|
|
#include <base/files/scoped_temp_dir.h>
|
|
#include <base/location.h>
|
|
#if BASE_VER < 780000 // Android
|
|
#include <base/message_loop/message_loop.h>
|
|
#endif // BASE_VER < 780000
|
|
#include <base/strings/string_util.h>
|
|
#include <base/strings/stringprintf.h>
|
|
#if BASE_VER >= 780000 // Chrome OS
|
|
#include <base/task/single_thread_task_executor.h>
|
|
#endif // BASE_VER >= 780000
|
|
#include <base/time/time.h>
|
|
#include <brillo/message_loops/base_message_loop.h>
|
|
#include <brillo/message_loops/message_loop.h>
|
|
#include <brillo/message_loops/message_loop_utils.h>
|
|
#include <brillo/strings/string_utils.h>
|
|
#include <brillo/unittest_utils.h>
|
|
#include <gtest/gtest.h>
|
|
|
|
#include "update_engine/common/test_utils.h"
|
|
#include "update_engine/common/utils.h"
|
|
|
|
using base::TimeDelta;
|
|
using brillo::MessageLoop;
|
|
using std::string;
|
|
using std::unique_ptr;
|
|
using std::vector;
|
|
|
|
namespace {
|
|
|
|
#ifdef __ANDROID__
|
|
#define kBinPath "/system/bin"
|
|
#define kUsrBinPath "/system/bin"
|
|
#else
|
|
#define kBinPath "/bin"
|
|
#define kUsrBinPath "/usr/bin"
|
|
#endif // __ANDROID__
|
|
|
|
} // namespace
|
|
|
|
namespace chromeos_update_engine {
|
|
|
|
class SubprocessTest : public ::testing::Test {
|
|
protected:
|
|
void SetUp() override {
|
|
loop_.SetAsCurrent();
|
|
async_signal_handler_.Init();
|
|
subprocess_.Init(&async_signal_handler_);
|
|
}
|
|
|
|
#if BASE_VER < 780000 // Android
|
|
base::MessageLoopForIO base_loop_;
|
|
brillo::BaseMessageLoop loop_{&base_loop_};
|
|
#else // Chrome OS
|
|
base::SingleThreadTaskExecutor base_loop_{base::MessagePumpType::IO};
|
|
brillo::BaseMessageLoop loop_{base_loop_.task_runner()};
|
|
#endif // BASE_VER < 780000
|
|
brillo::AsynchronousSignalHandler async_signal_handler_;
|
|
Subprocess subprocess_;
|
|
unique_ptr<base::FileDescriptorWatcher::Controller> watcher_;
|
|
};
|
|
|
|
namespace {
|
|
|
|
void ExpectedResults(int expected_return_code,
|
|
const string& expected_output,
|
|
int return_code,
|
|
const string& output) {
|
|
EXPECT_EQ(expected_return_code, return_code);
|
|
EXPECT_EQ(expected_output, output);
|
|
MessageLoop::current()->BreakLoop();
|
|
}
|
|
|
|
void ExpectedEnvVars(int return_code, const string& output) {
|
|
EXPECT_EQ(0, return_code);
|
|
const std::set<string> allowed_envs = {"LD_LIBRARY_PATH", "PATH"};
|
|
for (const string& key_value : brillo::string_utils::Split(output, "\n")) {
|
|
auto key_value_pair =
|
|
brillo::string_utils::SplitAtFirst(key_value, "=", true);
|
|
EXPECT_NE(allowed_envs.end(), allowed_envs.find(key_value_pair.first));
|
|
}
|
|
MessageLoop::current()->BreakLoop();
|
|
}
|
|
|
|
void ExpectedDataOnPipe(const Subprocess* subprocess,
|
|
pid_t* pid,
|
|
int child_fd,
|
|
const string& child_fd_data,
|
|
int expected_return_code,
|
|
int return_code,
|
|
const string& /* output */) {
|
|
EXPECT_EQ(expected_return_code, return_code);
|
|
|
|
// Verify that we can read the data from our end of |child_fd|.
|
|
int fd = subprocess->GetPipeFd(*pid, child_fd);
|
|
EXPECT_NE(-1, fd);
|
|
vector<char> buf(child_fd_data.size() + 1);
|
|
EXPECT_EQ(static_cast<ssize_t>(child_fd_data.size()),
|
|
HANDLE_EINTR(read(fd, buf.data(), buf.size())));
|
|
EXPECT_EQ(child_fd_data,
|
|
string(buf.begin(), buf.begin() + child_fd_data.size()));
|
|
|
|
MessageLoop::current()->BreakLoop();
|
|
}
|
|
|
|
} // namespace
|
|
|
|
TEST_F(SubprocessTest, IsASingleton) {
|
|
EXPECT_EQ(&subprocess_, &Subprocess::Get());
|
|
}
|
|
|
|
TEST_F(SubprocessTest, InactiveInstancesDontChangeTheSingleton) {
|
|
std::unique_ptr<Subprocess> another_subprocess(new Subprocess());
|
|
EXPECT_EQ(&subprocess_, &Subprocess::Get());
|
|
another_subprocess.reset();
|
|
EXPECT_EQ(&subprocess_, &Subprocess::Get());
|
|
}
|
|
|
|
TEST_F(SubprocessTest, SimpleTest) {
|
|
EXPECT_TRUE(subprocess_.Exec({kBinPath "/false"},
|
|
base::Bind(&ExpectedResults, 1, "")));
|
|
loop_.Run();
|
|
}
|
|
|
|
TEST_F(SubprocessTest, EchoTest) {
|
|
EXPECT_TRUE(subprocess_.Exec(
|
|
{kBinPath "/sh", "-c", "echo this is stdout; echo this is stderr >&2"},
|
|
base::Bind(&ExpectedResults, 0, "this is stdout\nthis is stderr\n")));
|
|
loop_.Run();
|
|
}
|
|
|
|
TEST_F(SubprocessTest, StderrNotIncludedInOutputTest) {
|
|
EXPECT_TRUE(subprocess_.ExecFlags(
|
|
{kBinPath "/sh", "-c", "echo on stdout; echo on stderr >&2"},
|
|
0,
|
|
{},
|
|
base::Bind(&ExpectedResults, 0, "on stdout\n")));
|
|
loop_.Run();
|
|
}
|
|
|
|
TEST_F(SubprocessTest, PipeRedirectFdTest) {
|
|
pid_t pid;
|
|
pid = subprocess_.ExecFlags(
|
|
{kBinPath "/sh", "-c", "echo on pipe >&3"},
|
|
0,
|
|
{3},
|
|
base::Bind(&ExpectedDataOnPipe, &subprocess_, &pid, 3, "on pipe\n", 0));
|
|
EXPECT_NE(0, pid);
|
|
|
|
// Wrong file descriptor values should return -1.
|
|
EXPECT_EQ(-1, subprocess_.GetPipeFd(pid, 123));
|
|
loop_.Run();
|
|
// Calling GetPipeFd() after the callback runs is invalid.
|
|
EXPECT_EQ(-1, subprocess_.GetPipeFd(pid, 3));
|
|
}
|
|
|
|
// Test that a pipe file descriptor open in the parent is not open in the child.
|
|
TEST_F(SubprocessTest, PipeClosedWhenNotRedirectedTest) {
|
|
brillo::ScopedPipe pipe;
|
|
|
|
// test_subprocess will return with the errno of fstat, which should be EBADF
|
|
// if the passed file descriptor is closed in the child.
|
|
const vector<string> cmd = {
|
|
test_utils::GetBuildArtifactsPath("test_subprocess"),
|
|
"fstat",
|
|
std::to_string(pipe.writer)};
|
|
EXPECT_TRUE(subprocess_.ExecFlags(
|
|
cmd, 0, {}, base::Bind(&ExpectedResults, EBADF, "")));
|
|
loop_.Run();
|
|
}
|
|
|
|
TEST_F(SubprocessTest, EnvVarsAreFiltered) {
|
|
EXPECT_TRUE(
|
|
subprocess_.Exec({kUsrBinPath "/env"}, base::Bind(&ExpectedEnvVars)));
|
|
loop_.Run();
|
|
}
|
|
|
|
TEST_F(SubprocessTest, SynchronousTrueSearchsOnPath) {
|
|
int rc = -1;
|
|
EXPECT_TRUE(Subprocess::SynchronousExecFlags(
|
|
{"true"}, Subprocess::kSearchPath, &rc, nullptr, nullptr));
|
|
EXPECT_EQ(0, rc);
|
|
}
|
|
|
|
TEST_F(SubprocessTest, SynchronousEchoTest) {
|
|
vector<string> cmd = {
|
|
kBinPath "/sh", "-c", "echo -n stdout-here; echo -n stderr-there >&2"};
|
|
int rc = -1;
|
|
string stdout, stderr;
|
|
ASSERT_TRUE(Subprocess::SynchronousExec(cmd, &rc, &stdout, &stderr));
|
|
EXPECT_EQ(0, rc);
|
|
EXPECT_EQ("stdout-here", stdout);
|
|
EXPECT_EQ("stderr-there", stderr);
|
|
}
|
|
|
|
TEST_F(SubprocessTest, SynchronousEchoNoOutputTest) {
|
|
int rc = -1;
|
|
ASSERT_TRUE(Subprocess::SynchronousExec(
|
|
{kBinPath "/sh", "-c", "echo test"}, &rc, nullptr, nullptr));
|
|
EXPECT_EQ(0, rc);
|
|
}
|
|
|
|
namespace {
|
|
void CallbackBad(int return_code, const string& output) {
|
|
ADD_FAILURE() << "should never be called.";
|
|
}
|
|
} // namespace
|
|
|
|
// Test that you can cancel a program that's already running.
|
|
TEST_F(SubprocessTest, CancelTest) {
|
|
base::ScopedTempDir tempdir;
|
|
ASSERT_TRUE(tempdir.CreateUniqueTempDir());
|
|
string fifo_path = tempdir.GetPath().Append("fifo").value();
|
|
EXPECT_EQ(0, mkfifo(fifo_path.c_str(), 0666));
|
|
|
|
// Start a process, make sure it is running and try to cancel it. We write
|
|
// two bytes to the fifo, the first one marks that the program is running and
|
|
// the second one marks that the process waited for a timeout and was not
|
|
// killed. We should read the first byte but not the second one.
|
|
vector<string> cmd = {
|
|
kBinPath "/sh",
|
|
"-c",
|
|
base::StringPrintf(
|
|
// The 'sleep' launched below could be left behind as an orphaned
|
|
// process when the 'sh' process is terminated by SIGTERM. As a
|
|
// remedy, trap SIGTERM and kill the 'sleep' process, which requires
|
|
// launching 'sleep' in background and then waiting for it.
|
|
"cleanup() { kill \"${sleep_pid}\"; exit 0; }; "
|
|
"trap cleanup TERM; "
|
|
"sleep 60 & "
|
|
"sleep_pid=$!; "
|
|
"printf X >\"%s\"; "
|
|
"wait; "
|
|
"printf Y >\"%s\"; "
|
|
"exit 1",
|
|
fifo_path.c_str(),
|
|
fifo_path.c_str())};
|
|
uint32_t tag = Subprocess::Get().Exec(cmd, base::Bind(&CallbackBad));
|
|
EXPECT_NE(0U, tag);
|
|
|
|
int fifo_fd = HANDLE_EINTR(open(fifo_path.c_str(), O_RDONLY));
|
|
EXPECT_GE(fifo_fd, 0);
|
|
|
|
watcher_ = base::FileDescriptorWatcher::WatchReadable(
|
|
fifo_fd,
|
|
base::Bind(
|
|
[](unique_ptr<base::FileDescriptorWatcher::Controller>* watcher,
|
|
int fifo_fd,
|
|
uint32_t tag) {
|
|
char c;
|
|
EXPECT_EQ(1, HANDLE_EINTR(read(fifo_fd, &c, 1)));
|
|
EXPECT_EQ('X', c);
|
|
LOG(INFO) << "Killing tag " << tag;
|
|
Subprocess::Get().KillExec(tag);
|
|
*watcher = nullptr;
|
|
},
|
|
// watcher_ is no longer used outside the clousure.
|
|
base::Unretained(&watcher_),
|
|
fifo_fd,
|
|
tag));
|
|
|
|
// This test would leak a callback that runs when the child process exits
|
|
// unless we wait for it to run.
|
|
brillo::MessageLoopRunUntil(
|
|
&loop_, TimeDelta::FromSeconds(20), base::Bind([] {
|
|
return Subprocess::Get().subprocess_records_.empty();
|
|
}));
|
|
EXPECT_TRUE(Subprocess::Get().subprocess_records_.empty());
|
|
// Check that there isn't anything else to read from the pipe.
|
|
char c;
|
|
EXPECT_EQ(0, HANDLE_EINTR(read(fifo_fd, &c, 1)));
|
|
IGNORE_EINTR(close(fifo_fd));
|
|
}
|
|
|
|
} // namespace chromeos_update_engine
|