blob: 0874d3d28a8e37ef31a5512b95071ab60004271e [file] [log] [blame]
// Test the device manager and related services and tools.
//
// By default, this script tests the device manager in a fashion amenable
// to automatic testing: the --single_user is passed to the device
// manager so that all device manager components run as the same user and
// no user input (such as an agent pass phrase) is needed.
//
// When this script is invoked with the --with_suid <user> flag, it
// installs the device manager in its more secure multi-account
// configuration where the device manager runs under the account of the
// invoker and test apps will be executed as <user>. This mode will
// require root permisisons to install and may require configuring an
// agent passphrase.
//
// For exanple:
//
// v23 go test -v . --v23.tests --with_suid vanaguest
//
// to test a device manager with multi-account support enabled for app
// account vanaguest.
//
package mgmt_test
//go:generate v23 test generate .
import (
"errors"
"flag"
"fmt"
"io/ioutil"
"math/rand"
"os"
"path/filepath"
"strings"
"time"
"v.io/core/veyron/lib/testutil/v23tests"
_ "v.io/core/veyron/profiles"
)
var (
suidUserFlag string
hostname string
errTimeout = errors.New("timeout")
)
func init() {
flag.StringVar(&suidUserFlag, "with_suid", "", "run the device manager as the specified user")
name, err := os.Hostname()
if err != nil {
panic(fmt.Sprintf("Hostname() failed: %v", err))
}
hostname = name
}
func V23TestNodeManager(i *v23tests.T) {
defer fmt.Fprintf(os.Stderr, "--------------- SHUTDOWN ---------------\n")
userFlag := "--single_user"
withSuid := false
if len(suidUserFlag) > 0 {
userFlag = "--with_suid=" + suidUserFlag
withSuid = true
}
i.Logf("user flag: %q", userFlag)
v23tests.RunRootMT(i, "--veyron.tcp.address=127.0.0.1:0")
workDir := i.NewTempDir()
mkSubdir := func(sub string) string {
n := filepath.Join(workDir, sub)
if err := os.Mkdir(n, 0755); err != nil {
i.Fatalf("failed to create %q: %v", n, err)
}
return n
}
binStagingDir := mkSubdir("bin")
agentServerBin := i.BuildGoPkg("v.io/core/veyron/security/agent/agentd")
suidHelperBin := i.BuildGoPkg("v.io/core/veyron/services/mgmt/suidhelper")
initHelperBin := i.BuildGoPkg("v.io/core/veyron/services/mgmt/inithelper")
// Device manager and principal use their own set of credentials.
// The credentials directory will be populated with Start an application
// server under the blessing "alice/myworkstation/applicationd" so that
// the device ("alice/myworkstation") can talk to it. ALl of the binaries
// that communicate with each other must share this credentials directory.
credentials := "VEYRON_CREDENTIALS=" + i.NewTempDir()
namespaceBin := i.BuildGoPkg("v.io/core/veyron/tools/namespace").WithEnv(credentials)
debugBin := i.BuildGoPkg("v.io/core/veyron/tools/debug").WithEnv(credentials)
deviceBin := i.BuildGoPkg("v.io/core/veyron/tools/mgmt/device").WithEnv(credentials)
devicedBin := i.BuildGoPkg("v.io/core/veyron/services/mgmt/device/deviced").WithEnv(credentials)
deviceScript := i.BinaryFromPath("device/devicex").WithEnv(credentials)
principalBin := i.BuildGoPkg("v.io/core/veyron/tools/principal").WithEnv(credentials)
binarydBin := i.BuildGoPkg("v.io/core/veyron/services/mgmt/binary/binaryd").WithEnv(credentials)
binaryBin := i.BuildGoPkg("v.io/core/veyron/tools/binary").WithEnv(credentials)
applicationdBin := i.BuildGoPkg("v.io/core/veyron/services/mgmt/application/applicationd").WithEnv(credentials)
applicationBin := i.BuildGoPkg("v.io/core/veyron/tools/application").WithEnv(credentials)
appDName := "applicationd"
devicedAppName := filepath.Join(appDName, "deviced", "test")
i.BinaryFromPath("/bin/cp").Start(agentServerBin.Path(), suidHelperBin.Path(), initHelperBin.Path(), devicedBin.Path(), binStagingDir).WaitOrDie(os.Stdout, os.Stderr)
dmInstallDir := filepath.Join(workDir, "dm")
i.SetVar("VANADIUM_DEVICE_DIR", dmInstallDir)
neighborhoodName := fmt.Sprintf("%s-%d-%d", hostname, os.Getpid(), rand.Int())
deviceScript.Start(
"install",
binStagingDir,
userFlag,
"--origin="+devicedAppName,
"--",
"--veyron.tcp.address=127.0.0.1:0",
"--neighborhood_name="+neighborhoodName).
WaitOrDie(os.Stdout, os.Stderr)
deviceScript.Start("start").WaitOrDie(os.Stdout, os.Stderr)
mtName := "devices/" + hostname
resolve := func(name string) string {
resolver := func() (interface{}, error) {
// Use Start, rather than Run, sinde it's ok for 'namespace resolve'
// to fail with 'name doesn't exist'
inv := namespaceBin.Start("resolve", name)
// Cleanup after ourselves to avoid leaving a ton of invocations
// lying around which obscure logging output.
defer inv.Wait(nil, os.Stderr)
if r := strings.TrimRight(inv.Output(), "\n"); len(r) > 0 {
return r, nil
}
return nil, nil
}
return i.WaitFor(resolver, 100*time.Millisecond, time.Minute).(string)
}
mtEP := resolve(mtName)
// Verify that device manager's mounttable is published under the expected
// name (hostname).
if got := namespaceBin.Run("glob", mtName); len(got) == 0 {
i.Fatalf("glob failed for %q", mtName)
}
// Create a self-signed blessing with name "alice" and set it as default
// and shareable with all peers on the principal that the device manager
// and principal are sharing (via the .WithEnv method) above. This
// blessing will be used by all commands run by the device manager that
// specify the same credentials.
// TODO - update these commands
// that except those
// run with a different which gets a principal forked from the
// process principal.
blessingFilename := filepath.Join(workDir, "alice.bless")
blessing := principalBin.Run("blessself", "alice")
if err := ioutil.WriteFile(blessingFilename, []byte(blessing), 0755); err != nil {
i.Fatal(err)
}
principalBin.Run("store", "setdefault", blessingFilename)
principalBin.Run("store", "set", blessingFilename, "...")
defer os.Remove(blessingFilename)
// Claim the device as "alice/myworkstation".
deviceBin.Start("claim", mtName+"/devmgr/device", "myworkstation")
resolveChange := func(name, old string) string {
resolver := func() (interface{}, error) {
inv := namespaceBin.Start("resolve", name)
defer inv.Wait(nil, os.Stderr)
if r := strings.TrimRight(inv.Output(), "\n"); r != old {
return r, nil
}
return nil, nil
}
return i.WaitFor(resolver, 100*time.Millisecond, time.Minute).(string)
}
// Wait for the device manager to update its mount table entry.
mtEP = resolveChange(mtName, mtEP)
if withSuid {
/*
"${DEVICE_BIN}" associate add "${MT_NAME}/devmgr/device" "${SUID_USER}" "alice"
shell_test::assert_eq "$("${DEVICE_BIN}" associate list "${MT_NAME}/devmgr/device")" \
"alice ${SUID_USER}" "${LINENO}"
*/
}
// Verify the device's default blessing is as expected.
inv := debugBin.Start("stats", "read", mtName+"/devmgr/__debug/stats/security/principal/*/blessingstore")
inv.ExpectRE(".*Default blessings: alice/myworkstation$", -1)
// Get the device's profile, which should be set to non-empty string
inv = deviceBin.Start("describe", mtName+"/devmgr/device")
parts := inv.ExpectRE(`{Profiles:map\[(.*):{}\]}`, 1)
expectOneMatch := func(parts [][]string) string {
if len(parts) != 1 || len(parts[0]) != 2 {
loc := v23tests.Caller(1)
i.Fatalf("%s: failed to match profile: %#v", loc, parts)
}
return parts[0][1]
}
deviceProfile := expectOneMatch(parts)
if len(deviceProfile) == 0 {
i.Fatalf("failed to get profile")
}
binarydName := "binaryd"
// Start an application server under the blessing
// "alice/myworkstation/applicationd" so that
// the device ("alice/myworkstation") can talk to it.
binarydBin.Start(
"--name="+binarydName,
"--root_dir="+filepath.Join(workDir, "binstore"),
"--veyron.tcp.address=127.0.0.1:0",
"--http=127.0.0.1:0")
sampleAppBinName := binarydName + "/testapp"
binaryBin.Run("upload", sampleAppBinName, binarydBin.Path())
// Verify that the binary we uploaded is shown by glob, we need to run
// with the same blessed credentials as binaryd in order to be able to
// glob its names pace.
if got := namespaceBin.WithEnv(credentials).Run("glob", sampleAppBinName); len(got) == 0 {
i.Fatalf("glob failed for %q", sampleAppBinName)
}
appstoreDir := mkSubdir("apptstore")
applicationdBin.Start(
"--name="+appDName,
"--store="+appstoreDir,
"--veyron.tcp.address=127.0.0.1:0",
)
sampleAppName := appDName + "/testapp/v0"
appPubName := "testbinaryd"
appEnvelopeFilename := filepath.Join(workDir, "app.envelope")
appEnvelope := fmt.Sprintf("{\"Title\":\"BINARYD\", \"Args\":[\"--name=%s\", \"--root_dir=./binstore\", \"--veyron.tcp.address=127.0.0.1:0\", \"--http=127.0.0.1:0\"], \"Binary\":{\"File\":%q}, \"Env\":[]}", appPubName, sampleAppBinName)
ioutil.WriteFile(appEnvelopeFilename, []byte(appEnvelope), 0666)
defer os.Remove(appEnvelopeFilename)
output := applicationBin.Run("put", sampleAppName, deviceProfile, appEnvelopeFilename)
if got, want := output, "Application envelope added successfully."; got != want {
i.Fatalf("got %q, want %q", got, want)
}
// Verify that the envelope we uploaded shows up with glob.
inv = applicationBin.Start("match", sampleAppName, deviceProfile)
parts = inv.ExpectSetEventuallyRE(`"Title": "(.*)",`, `"File": "(.*)",`)
if got, want := len(parts), 2; got != want {
i.Fatalf("got %d, want %d", got, want)
}
for line, want := range []string{"BINARYD", sampleAppBinName} {
if got := parts[line][1]; got != want {
i.Fatalf("got %q, want %q", got, want)
}
}
// Install the app on the device.
inv = deviceBin.Start("install", mtName+"/devmgr/apps", sampleAppName)
parts = inv.ExpectRE(`Successfully installed: "(.*)"`, 1)
installationName := expectOneMatch(parts)
// Verify that the installation shows up when globbing the device manager.
output = namespaceBin.Run("glob", mtName+"/devmgr/apps/BINARYD/*")
if got, want := output, installationName; got != want {
i.Fatalf("got %q, want %q", got, want)
}
// Start an instance of the app, granting it blessing extension myapp.
inv = deviceBin.Start("start", installationName, "myapp")
parts = inv.ExpectRE(`Successfully started: "(.*)"`, 1)
instanceName := expectOneMatch(parts)
resolve(mtName + "/" + appPubName)
// Verify that the instance shows up when globbing the device manager.
output = namespaceBin.Run("glob", mtName+"/devmgr/apps/BINARYD/*/*")
if got, want := output, instanceName; got != want {
i.Fatalf("got %q, want %q", got, want)
}
// TODO(rjkroege): Verify that the app is actually running as ${SUID_USER}
// Verify the app's default blessing.
inv = debugBin.Start("stats", "read", instanceName+"/stats/security/principal/*/blessingstore")
// Why is this alice/myworkstation/myapp/BINARYD and not
// alice/myapp/BINARYD as seen by the test.sh?
inv.ExpectRE(".*Default blessings: alice/myworkstation/myapp/BINARYD$", -1)
// Stop the instance
deviceBin.Run("stop", instanceName)
// Verify that logs, but not stats, show up when globbing the
// stopped instance.
if output = namespaceBin.Run("glob", instanceName+"/stats/..."); len(output) > 0 {
i.Fatalf("no output expected for glob %s/stats/..., got %q", output, instanceName)
}
if output = namespaceBin.Run("glob", instanceName+"/logs/..."); len(output) == 0 {
i.Fatalf("output expected for glob %s/logs/..., but got none", instanceName)
}
// Upload a deviced binary
devicedAppBinName := binarydName + "/deviced"
binaryBin.Run("upload", devicedAppBinName, devicedBin.Path())
// Upload a device manager envelope, make sure that we set
// VEYRON_CREDENTIALS in the enevelope, otherwise the updated device
// manager will use new credentials.
devicedEnvelopeFilename := filepath.Join(workDir, "deviced.envelope")
devicedEnvelope := fmt.Sprintf("{\"Title\":\"device manager\", \"Binary\":{\"File\":%q}, \"Env\":[%q]}", devicedAppBinName, credentials)
ioutil.WriteFile(devicedEnvelopeFilename, []byte(devicedEnvelope), 0666)
defer os.Remove(devicedEnvelopeFilename)
applicationBin.Run("put", devicedAppName, deviceProfile, devicedEnvelopeFilename)
// Update the device manager.
deviceBin.Run("update", mtName+"/devmgr/device")
mtEP = resolveChange(mtName, mtEP)
// Verify that device manager's mounttable is still published under the
// expected name (hostname).
if namespaceBin.Run("glob", mtName) == "" {
i.Fatalf("failed to glob %s", mtName)
}
// Revert the device manager
deviceBin.Run("revert", mtName+"/devmgr/device")
mtEP = resolveChange(mtName, mtEP)
// Verify that device manager's mounttable is still published under the
// expected name (hostname).
if namespaceBin.Run("glob", mtName) == "" {
i.Fatalf("failed to glob %s", mtName)
}
// Verify that the local mounttable exists, and that the device manager,
// the global namespace, and the neighborhood are mounted on it.
n := mtEP + "/devmgr"
if namespaceBin.Run("resolve", n) == "" {
i.Fatalf("failed to resolve %s", n)
}
n = mtEP + "/nh"
if namespaceBin.Run("resolve", n) == "" {
i.Fatalf("failed to resolve %s", n)
}
namespaceRoot, _ := i.GetVar("NAMESPACE_ROOT")
n = mtEP + "/global"
// TODO(ashankar): The expected blessings of the namespace root should
// also be from some VAR or something. For now, hardcoded, but this
// should be fixed along with
// https://github.com/veyron/release-issues/issues/98
if got, want := namespaceBin.Run("resolve", n), fmt.Sprintf("[alice/myworkstation]%v", namespaceRoot); got != want {
i.Fatalf("got %q, want %q", got, want)
}
// Suspend the device manager, wait for the endpoint to change
deviceBin.Run("suspend", mtName+"/devmgr/device")
mtEP = resolveChange(mtName, mtEP)
// Stop the device manager.
deviceScript.Run("stop")
// Wait for the mounttable entry to go away.
resolveGone := func(name string) string {
resolver := func() (interface{}, error) {
inv := namespaceBin.Start("resolve", name)
defer inv.Wait(nil, os.Stderr)
if r := strings.TrimRight(inv.Output(), "\n"); len(r) == 0 {
return r, nil
}
return nil, nil
}
return i.WaitFor(resolver, 100*time.Millisecond, time.Minute).(string)
}
resolveGone(mtName)
fi, err := ioutil.ReadDir(dmInstallDir)
if err != nil {
i.Fatalf("failed to readdir for %q: %v", dmInstallDir, err)
}
deviceScript.Run("uninstall")
fi, err = ioutil.ReadDir(dmInstallDir)
if err == nil || len(fi) > 0 {
i.Fatalf("managed to read %d entries from %q", len(fi), dmInstallDir)
}
if err != nil && !strings.Contains(err.Error(), "no such file or directory") {
i.Fatalf("wrong error: %v", err)
}
}