blob: e6bc4ef3e10209c577e6cb975a3e05a87c891209 [file] [log] [blame]
Bogdan Caprita5420f172014-10-10 15:58:14 -07001// TODO(caprita): This file is becoming unmanageable; split into several test
2// files.
Robert Kroegeracc778b2014-11-03 17:17:21 -08003// TODO(rjkroege): Add a more extensive unit test case to exercise ACL logic.
Bogdan Caprita5420f172014-10-10 15:58:14 -07004
Jiri Simsa70c32052014-06-18 11:38:21 -07005package impl_test
Jiri Simsa5293dcb2014-05-10 09:56:38 -07006
7import (
Asim Shankar88292912014-10-09 19:41:07 -07008 "bytes"
Bogdan Caprita1e379132014-08-03 23:02:31 -07009 "crypto/md5"
10 "encoding/base64"
Asim Shankar88292912014-10-09 19:41:07 -070011 "encoding/hex"
Robert Kroeger627a1152014-10-01 14:57:55 -070012 "encoding/json"
Bogdan Capritac7e72b62015-01-07 19:22:23 -080013 "flag"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070014 "fmt"
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070015 "io"
Jiri Simsa70c32052014-06-18 11:38:21 -070016 "io/ioutil"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070017 "os"
Bogdan Capritac87a9142014-07-21 10:38:13 -070018 goexec "os/exec"
Robert Kroeger627a1152014-10-01 14:57:55 -070019 "os/user"
Robin Thellend9e523a62014-10-07 16:19:53 -070020 "path"
Jiri Simsa70c32052014-06-18 11:38:21 -070021 "path/filepath"
Robin Thellend09929f42014-10-01 10:18:13 -070022 "reflect"
Robin Thellend4c5266e2014-10-27 13:19:29 -070023 "regexp"
Robin Thellend09929f42014-10-01 10:18:13 -070024 "sort"
Jiri Simsa70c32052014-06-18 11:38:21 -070025 "strings"
Bogdan Caprita78b62162014-08-21 15:35:08 -070026 "syscall"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070027 "testing"
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070028 "time"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070029
Jiri Simsa764efb72014-12-25 20:57:03 -080030 "v.io/core/veyron2"
31 "v.io/core/veyron2/context"
32 "v.io/core/veyron2/ipc"
Bogdan Caprita8964d3f2015-02-02 13:47:39 -080033 "v.io/core/veyron2/mgmt"
Jiri Simsa764efb72014-12-25 20:57:03 -080034 "v.io/core/veyron2/naming"
Jiri Simsa764efb72014-12-25 20:57:03 -080035 "v.io/core/veyron2/security"
36 "v.io/core/veyron2/services/mgmt/application"
37 "v.io/core/veyron2/services/mgmt/device"
38 "v.io/core/veyron2/services/mgmt/logreader"
39 "v.io/core/veyron2/services/mgmt/pprof"
gauthamtcb03d132015-02-05 18:05:22 -080040 "v.io/core/veyron2/services/mgmt/repository"
Jiri Simsa764efb72014-12-25 20:57:03 -080041 "v.io/core/veyron2/services/mgmt/stats"
42 "v.io/core/veyron2/services/security/access"
Todd Wangff73e1f2015-02-10 21:45:52 -080043 "v.io/core/veyron2/verror"
Jiri Simsa764efb72014-12-25 20:57:03 -080044 "v.io/core/veyron2/vlog"
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070045
Bogdan Capritac7e72b62015-01-07 19:22:23 -080046 "v.io/core/veyron/lib/expect"
Bogdan Caprita8964d3f2015-02-02 13:47:39 -080047 "v.io/core/veyron/lib/flags/consts"
Jiri Simsa764efb72014-12-25 20:57:03 -080048 "v.io/core/veyron/lib/modules"
49 "v.io/core/veyron/lib/signals"
50 "v.io/core/veyron/lib/testutil"
51 tsecurity "v.io/core/veyron/lib/testutil/security"
52 binaryimpl "v.io/core/veyron/services/mgmt/binary/impl"
53 "v.io/core/veyron/services/mgmt/device/config"
54 "v.io/core/veyron/services/mgmt/device/impl"
Asim Shankarab75bc32015-02-12 21:52:04 -080055 "v.io/core/veyron/services/mgmt/device/starter"
Jiri Simsa764efb72014-12-25 20:57:03 -080056 libbinary "v.io/core/veyron/services/mgmt/lib/binary"
Robert Kroegerebfb62a2014-12-10 14:42:09 -080057 mgmttest "v.io/core/veyron/services/mgmt/lib/testutil"
Jiri Simsa764efb72014-12-25 20:57:03 -080058 suidhelper "v.io/core/veyron/services/mgmt/suidhelper/impl"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070059)
60
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070061const (
Bogdan Caprita17666dd2015-01-14 09:27:46 -080062 // Modules command names.
Bogdan Caprita2b219362014-12-09 17:03:33 -080063 execScriptCmd = "execScriptCmd"
64 deviceManagerCmd = "deviceManager"
65 appCmd = "app"
66 installerCmd = "installer"
Bogdan Capritaa40d3382014-12-19 16:30:26 -080067 uninstallerCmd = "uninstaller"
Bogdan Caprita17666dd2015-01-14 09:27:46 -080068
69 testFlagName = "random_test_flag"
70 // VEYRON prefix is necessary to pass the env filtering.
71 testEnvVarName = "VEYRON_RANDOM_ENV_VALUE"
Robin Thellendf5986282015-02-13 11:01:03 -080072
73 redirectEnv = "DEVICE_MANAGER_DONT_REDIRECT_STDOUT_STDERR"
Asim Shankar23dac322015-02-14 12:42:26 -080074
75 noPairingToken = ""
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070076)
Robert Kroegerdd07b362014-09-18 17:34:42 -070077
Bogdan Caprita17666dd2015-01-14 09:27:46 -080078var flagValue = flag.String(testFlagName, "default", "")
79
Robert Kroegerdd07b362014-09-18 17:34:42 -070080func init() {
Bogdan Capritac7e72b62015-01-07 19:22:23 -080081 // The installer sets this flag on the installed device manager, so we
82 // need to ensure it's defined.
83 flag.String("name", "", "")
84
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070085 modules.RegisterChild(execScriptCmd, "", execScript)
Bogdan Caprita2b219362014-12-09 17:03:33 -080086 modules.RegisterChild(deviceManagerCmd, "", deviceManager)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070087 modules.RegisterChild(appCmd, "", app)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070088
89 if modules.IsModulesProcess() {
Robert Kroegerdd07b362014-09-18 17:34:42 -070090 return
91 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070092}
93
Suharsh Sivakumar9d17e4a2015-02-02 22:42:16 -080094func TestMain(m *testing.M) {
95 testutil.Init()
96 os.Exit(m.Run())
97}
98
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070099// TestHelperProcess is the entrypoint for the modules commands in a
100// a test subprocess.
101func TestHelperProcess(t *testing.T) {
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700102 modules.DispatchInTest()
Robert Kroegerdd07b362014-09-18 17:34:42 -0700103}
104
105// TestSuidHelper is testing boilerplate for suidhelper that does not
Matt Rosencrantz5180d162014-12-03 13:48:40 -0800106// create a runtime because the suidhelper is not a Veyron application.
Robert Kroegerdd07b362014-09-18 17:34:42 -0700107func TestSuidHelper(t *testing.T) {
108 if os.Getenv("VEYRON_SUIDHELPER_TEST") != "1" {
109 return
110 }
111 vlog.VI(1).Infof("TestSuidHelper starting")
112
113 if err := suidhelper.Run(os.Environ()); err != nil {
114 vlog.Fatalf("Failed to Run() setuidhelper: %v", err)
115 }
Bogdan Capritac87a9142014-07-21 10:38:13 -0700116}
117
118// execScript launches the script passed as argument.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700119func execScript(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error {
Bogdan Capritac87a9142014-07-21 10:38:13 -0700120 if want, got := 1, len(args); want != got {
121 vlog.Fatalf("execScript expected %d arguments, got %d instead", want, got)
122 }
123 script := args[0]
Robin Thellendf5986282015-02-13 11:01:03 -0800124 osenv := []string{redirectEnv + "=1"}
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700125 if env["PAUSE_BEFORE_STOP"] == "1" {
126 osenv = append(osenv, "PAUSE_BEFORE_STOP=1")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700127 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700128
Bogdan Capritac87a9142014-07-21 10:38:13 -0700129 cmd := goexec.Cmd{
130 Path: script,
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700131 Env: osenv,
132 Stdin: stdin,
133 Stderr: stderr,
134 Stdout: stdout,
Bogdan Capritac87a9142014-07-21 10:38:13 -0700135 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700136
137 return cmd.Run()
Bogdan Capritac87a9142014-07-21 10:38:13 -0700138}
139
Bogdan Caprita2b219362014-12-09 17:03:33 -0800140// deviceManager sets up a device manager server. It accepts the name to
141// publish the server under as an argument. Additional arguments can optionally
142// specify device manager config settings.
143func deviceManager(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error {
Ankurf416ac52015-01-29 13:58:24 -0800144 ctx, shutdown := testutil.InitForTest()
Bogdan Capritac87a9142014-07-21 10:38:13 -0700145 if len(args) == 0 {
Bogdan Caprita2b219362014-12-09 17:03:33 -0800146 vlog.Fatalf("deviceManager expected at least an argument")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700147 }
148 publishName := args[0]
Bogdan Caprita78b62162014-08-21 15:35:08 -0700149 args = args[1:]
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800150 defer fmt.Fprintf(stdout, "%v terminated\n", publishName)
151 defer vlog.VI(1).Infof("%v terminated", publishName)
152 defer shutdown()
153 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
154
Bogdan Capritac87a9142014-07-21 10:38:13 -0700155 // Satisfy the contract described in doc.go by passing the config state
Bogdan Caprita2b219362014-12-09 17:03:33 -0800156 // through to the device manager dispatcher constructor.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700157 configState, err := config.Load()
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700158 if err != nil {
Bogdan Capritac87a9142014-07-21 10:38:13 -0700159 vlog.Fatalf("Failed to decode config state: %v", err)
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700160 }
Bogdan Capritac87a9142014-07-21 10:38:13 -0700161
162 // This exemplifies how to override or set specific config fields, if,
Bogdan Caprita2b219362014-12-09 17:03:33 -0800163 // for example, the device manager is invoked 'by hand' instead of via a
164 // script prepared by a previous version of the device manager.
gauthamt27f38ba2015-02-13 13:45:01 -0800165 var pairingToken string
Bogdan Caprita78b62162014-08-21 15:35:08 -0700166 if len(args) > 0 {
gauthamt27f38ba2015-02-13 13:45:01 -0800167 if want, got := 4, len(args); want > got {
168 vlog.Fatalf("expected atleast %d additional arguments, got %d instead: %q", want, got, args)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700169 }
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700170 configState.Root, configState.Helper, configState.Origin, configState.CurrentLink = args[0], args[1], args[2], args[3]
gauthamt27f38ba2015-02-13 13:45:01 -0800171 if len(args) > 4 {
172 pairingToken = args[4]
173 }
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700174 }
Robin Thellendacaa4322015-02-05 11:00:28 -0800175
Asim Shankarab75bc32015-02-12 21:52:04 -0800176 stop, err := starter.Start(ctx, starter.Args{
177 Namespace: starter.NamespaceArgs{
178 ListenSpec: ipc.ListenSpec{Addrs: ipc.ListenAddrs{{"tcp", "127.0.0.1:0"}}},
179 },
180 Device: starter.DeviceArgs{
181 Name: publishName,
182 ListenSpec: ipc.ListenSpec{Addrs: ipc.ListenAddrs{{"tcp", "127.0.0.1:0"}}},
183 ConfigState: configState,
184 TestMode: strings.HasSuffix(fmt.Sprint(veyron2.GetPrincipal(ctx).BlessingStore().Default()), "/testdm"),
185 RestartCallback: func() { fmt.Println("restart handler") },
gauthamt27f38ba2015-02-13 13:45:01 -0800186 PairingToken: pairingToken,
Asim Shankarab75bc32015-02-12 21:52:04 -0800187 },
188 // TODO(rthellend): Wire up the local mounttable like the real device
189 // manager, i.e. mount the device manager and the apps on it, and mount
190 // the local mounttable in the global namespace.
191 // MountGlobalNamespaceInLocalNamespace: true,
192 })
Robin Thellendacaa4322015-02-05 11:00:28 -0800193 if err != nil {
Asim Shankarab75bc32015-02-12 21:52:04 -0800194 vlog.Errorf("starter.Start failed: %v", err)
Robin Thellendacaa4322015-02-05 11:00:28 -0800195 return err
196 }
197 defer stop()
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700198 fmt.Fprintf(stdout, "ready:%d\n", os.Getpid())
Bogdan Capritac87a9142014-07-21 10:38:13 -0700199
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800200 <-signals.ShutdownOnSignals(ctx)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700201 if val, present := env["PAUSE_BEFORE_STOP"]; present && val == "1" {
202 modules.WaitForEOF(stdin)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700203 }
Asim Shankarab75bc32015-02-12 21:52:04 -0800204 // TODO(ashankar): Figure out a way to incorporate this check in the test.
205 // if impl.DispatcherLeaking(dispatcher) {
206 // vlog.Fatalf("device manager leaking resources")
207 // }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700208 return nil
209}
210
Bogdan Caprita1e379132014-08-03 23:02:31 -0700211// appService defines a test service that the test app should be running.
212// TODO(caprita): Use this to make calls to the app and verify how Suspend/Stop
213// interact with an active service.
214type appService struct{}
215
Todd Wang1fe7cdd2014-11-12 12:51:49 -0800216func (appService) Echo(_ ipc.ServerContext, message string) (string, error) {
Bogdan Caprita1e379132014-08-03 23:02:31 -0700217 return message, nil
218}
219
Robin Thellend875f2592014-12-02 10:29:37 -0800220func (appService) Cat(_ ipc.ServerContext, file string) (string, error) {
221 if file == "" || file[0] == filepath.Separator || file[0] == '.' {
222 return "", fmt.Errorf("illegal file name: %q", file)
223 }
224 bytes, err := ioutil.ReadFile(file)
225 if err != nil {
226 return "", err
227 }
228 return string(bytes), nil
229}
230
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800231type pingArgs struct {
Bogdan Capritae1960f52015-01-14 09:57:19 -0800232 Username, FlagValue, EnvValue string
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800233}
234
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800235func ping(ctx *context.T) {
Bogdan Capritae1960f52015-01-14 09:57:19 -0800236 helperEnv := os.Getenv(suidhelper.SavedArgs)
237 d := json.NewDecoder(strings.NewReader(helperEnv))
238 var savedArgs suidhelper.ArgsSavedForTest
239 if err := d.Decode(&savedArgs); err != nil {
240 vlog.Fatalf("Failed to decode preserved argument %v: %v", helperEnv, err)
241 }
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800242 args := &pingArgs{
Bogdan Capritae1960f52015-01-14 09:57:19 -0800243 // TODO(rjkroege): Consider validating additional parameters
244 // from helper.
245 Username: savedArgs.Uname,
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800246 FlagValue: *flagValue,
247 EnvValue: os.Getenv(testEnvVarName),
248 }
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800249 client := veyron2.GetClient(ctx)
250 if call, err := client.StartCall(ctx, "pingserver", "Ping", []interface{}{args}); err != nil {
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700251 vlog.Fatalf("StartCall failed: %v", err)
Todd Wang702385a2014-11-07 01:54:08 -0800252 } else if err := call.Finish(); err != nil {
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700253 vlog.Fatalf("Finish failed: %v", err)
254 }
255}
256
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800257func cat(ctx *context.T, name, file string) (string, error) {
258 ctx, cancel := context.WithTimeout(ctx, time.Minute)
Robin Thellend875f2592014-12-02 10:29:37 -0800259 defer cancel()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800260 client := veyron2.GetClient(ctx)
Matt Rosencrantz6edab562015-01-12 11:07:55 -0800261 call, err := client.StartCall(ctx, name, "Cat", []interface{}{file})
Robin Thellend875f2592014-12-02 10:29:37 -0800262 if err != nil {
263 return "", err
264 }
265 var content string
266 if ferr := call.Finish(&content, &err); ferr != nil {
267 err = ferr
268 }
269 return content, err
270}
271
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700272func app(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error {
Ankurf416ac52015-01-29 13:58:24 -0800273 ctx, shutdown := testutil.InitForTest()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800274 defer shutdown()
Ankurf416ac52015-01-29 13:58:24 -0800275
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800276 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
277
Bogdan Caprita1e379132014-08-03 23:02:31 -0700278 if expected, got := 1, len(args); expected != got {
279 vlog.Fatalf("Unexpected number of arguments: expected %d, got %d", expected, got)
280 }
281 publishName := args[0]
282
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800283 server, _ := mgmttest.NewServer(ctx)
Bogdan Caprita1e379132014-08-03 23:02:31 -0700284 defer server.Stop()
Cosmos Nicolaou92dba582014-11-05 17:24:10 -0800285 if err := server.Serve(publishName, new(appService), nil); err != nil {
Bogdan Caprita1e379132014-08-03 23:02:31 -0700286 vlog.Fatalf("Serve(%v) failed: %v", publishName, err)
287 }
Cosmos Nicolaoue3391532014-11-25 19:08:32 -0800288 // Some of our tests look for log files, so make sure they are flushed
289 // to ensure that at least the files exist.
290 vlog.FlushLog()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800291 ping(ctx)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700292
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800293 <-signals.ShutdownOnSignals(ctx)
Bogdan Caprita1e379132014-08-03 23:02:31 -0700294 if err := ioutil.WriteFile("testfile", []byte("goodbye world"), 0600); err != nil {
295 vlog.Fatalf("Failed to write testfile: %v", err)
296 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700297 return nil
Bogdan Caprita1e379132014-08-03 23:02:31 -0700298}
299
Bogdan Caprita2b219362014-12-09 17:03:33 -0800300// TODO(rjkroege): generateDeviceManagerScript and generateSuidHelperScript have
301// code similarity that might benefit from refactoring.
302// generateDeviceManagerScript is very similar in behavior to generateScript in
Bogdan Capritaa456f472014-12-10 10:18:03 -0800303// device_invoker.go. However, we chose to re-implement it here for two
304// reasons: (1) avoid making generateScript public; and (2) how the test choses
305// to invoke the device manager subprocess the first time should be independent
306// of how device manager implementation sets up its updated versions.
Bogdan Caprita2b219362014-12-09 17:03:33 -0800307func generateDeviceManagerScript(t *testing.T, root string, args, env []string) string {
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700308 env = impl.VeyronEnvironment(env)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700309 output := "#!/bin/bash\n"
Bogdan Caprita069341a2014-12-09 22:59:17 -0800310 output += strings.Join(config.QuoteEnv(env), " ") + " exec "
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700311 output += strings.Join(args, " ")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700312 if err := os.MkdirAll(filepath.Join(root, "factory"), 0755); err != nil {
313 t.Fatalf("MkdirAll failed: %v", err)
314 }
315 // Why pigeons? To show that the name we choose for the initial script
Bogdan Caprita2b219362014-12-09 17:03:33 -0800316 // doesn't matter and in particular is independent of how device manager
317 // names its updated version scripts (deviced.sh).
Bogdan Capritac87a9142014-07-21 10:38:13 -0700318 path := filepath.Join(root, "factory", "pigeons.sh")
319 if err := ioutil.WriteFile(path, []byte(output), 0755); err != nil {
320 t.Fatalf("WriteFile(%v) failed: %v", path, err)
321 }
322 return path
323}
324
Bogdan Caprita2b219362014-12-09 17:03:33 -0800325// TestDeviceManagerUpdateAndRevert makes the device manager go through the
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700326// motions of updating itself to newer versions (twice), and reverting itself
327// back (twice). It also checks that update and revert fail when they're
Bogdan Caprita2b219362014-12-09 17:03:33 -0800328// supposed to. The initial device manager is started 'by hand' via a module
329// command. Further versions are started through the soft link that the device
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700330// manager itself updates.
Bogdan Caprita2b219362014-12-09 17:03:33 -0800331func TestDeviceManagerUpdateAndRevert(t *testing.T) {
Ankurf416ac52015-01-29 13:58:24 -0800332 ctx, shutdown := testutil.InitForTest()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800333 defer shutdown()
334 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
335
336 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, veyron2.GetPrincipal(ctx))
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700337 defer deferFn()
338
339 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800340 envelope, cleanup := startMockRepos(t, ctx)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700341 defer cleanup()
Bogdan Capritac87a9142014-07-21 10:38:13 -0700342
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -0800343 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Bogdan Caprita080a7302014-08-20 15:35:37 -0700344 defer cleanup()
Jiri Simsae0fc61a2014-07-30 14:41:55 -0700345
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700346 // Current link does not have to live in the root dir, but it's
347 // convenient to put it there so we have everything in one place.
348 currLink := filepath.Join(root, "current_link")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700349
Asim Shankar23dac322015-02-14 12:42:26 -0800350 // Since the device manager will be restarted, use the
351 // VeyronCredentials environment variable to maintain the same set of
352 // credentials across runs.
353 // Without this, authentication/authorizatin state - such as the blessings
354 // of the device manager and the signatures used for ACL integrity checks
355 // - will not carry over between updates to the binary, which would not
356 // be reflective of intended use.
357 dmCreds, err := ioutil.TempDir("", "TestDeviceManagerUpdateAndRevert")
358 if err != nil {
359 t.Fatal(err)
360 }
361 defer os.RemoveAll(dmCreds)
362 dmEnv := []string{fmt.Sprintf("%v=%v", consts.VeyronCredentials, dmCreds)}
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800363 dmArgs := []string{"factoryDM", root, "unused_helper", mockApplicationRepoName, currLink}
Asim Shankar23dac322015-02-14 12:42:26 -0800364 args, env := sh.CommandEnvelope(deviceManagerCmd, dmEnv, dmArgs...)
Bogdan Caprita2b219362014-12-09 17:03:33 -0800365 scriptPathFactory := generateDeviceManagerScript(t, root, args, env)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700366
367 if err := os.Symlink(scriptPathFactory, currLink); err != nil {
368 t.Fatalf("Symlink(%q, %q) failed: %v", scriptPathFactory, currLink, err)
369 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700370
Bogdan Caprita2b219362014-12-09 17:03:33 -0800371 // We instruct the initial device manager that we run to pause before
Bogdan Capritac87a9142014-07-21 10:38:13 -0700372 // stopping its service, so that we get a chance to verify that
373 // attempting an update while another one is ongoing will fail.
Asim Shankar23dac322015-02-14 12:42:26 -0800374 dmPauseBeforeStopEnv := append(dmEnv, "PAUSE_BEFORE_STOP=1")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700375
Bogdan Caprita2b219362014-12-09 17:03:33 -0800376 // Start the initial version of the device manager, the so-called
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700377 // "factory" version. We use the modules-generated command to start it.
Bogdan Caprita2b219362014-12-09 17:03:33 -0800378 // We could have also used the scriptPathFactory to start it, but this
379 // demonstrates that the initial device manager could be started by hand
380 // as long as the right initial configuration is passed into the device
381 // manager implementation.
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800382 dmh, dms := mgmttest.RunShellCommand(t, sh, dmPauseBeforeStopEnv, deviceManagerCmd, dmArgs...)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700383 defer func() {
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800384 syscall.Kill(dmh.Pid(), syscall.SIGINT)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700385 }()
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700386
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800387 mgmttest.ReadPID(t, dms)
Asim Shankar23dac322015-02-14 12:42:26 -0800388 // Brand new device manager must be claimed first.
389 claimDevice(t, ctx, "factoryDM", "mydevice", noPairingToken)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700390
391 // Simulate an invalid envelope in the application repository.
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800392 *envelope = envelopeFromShell(sh, dmPauseBeforeStopEnv, deviceManagerCmd, "bogus", dmArgs...)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700393
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800394 updateDeviceExpectError(t, ctx, "factoryDM", impl.ErrAppTitleMismatch.ID)
395 revertDeviceExpectError(t, ctx, "factoryDM", impl.ErrUpdateNoOp.ID)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700396
Bogdan Caprita2b219362014-12-09 17:03:33 -0800397 // Set up a second version of the device manager. The information in the
398 // envelope will be used by the device manager to stage the next
399 // version.
Asim Shankar23dac322015-02-14 12:42:26 -0800400 *envelope = envelopeFromShell(sh, dmEnv, deviceManagerCmd, application.DeviceManagerTitle, "v2DM")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800401 updateDevice(t, ctx, "factoryDM")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700402
403 // Current link should have been updated to point to v2.
404 evalLink := func() string {
405 path, err := filepath.EvalSymlinks(currLink)
406 if err != nil {
407 t.Fatalf("EvalSymlinks(%v) failed: %v", currLink, err)
408 }
409 return path
410 }
411 scriptPathV2 := evalLink()
412 if scriptPathFactory == scriptPathV2 {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700413 t.Fatalf("current link didn't change")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700414 }
415
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800416 updateDeviceExpectError(t, ctx, "factoryDM", impl.ErrOperationInProgress.ID)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700417
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800418 dmh.CloseStdin()
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700419
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800420 dms.Expect("restart handler")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800421 dms.Expect("factoryDM terminated")
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800422 dmh.Shutdown(os.Stderr, os.Stderr)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700423
Bogdan Caprita2b219362014-12-09 17:03:33 -0800424 // A successful update means the device manager has stopped itself. We
Bogdan Capritac87a9142014-07-21 10:38:13 -0700425 // relaunch it from the current link.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800426 resolveExpectNotFound(t, ctx, "v2DM") // Ensure a clean slate.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700427
Asim Shankar23dac322015-02-14 12:42:26 -0800428 dmh, dms = mgmttest.RunShellCommand(t, sh, dmEnv, execScriptCmd, currLink)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700429
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800430 mgmttest.ReadPID(t, dms)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800431 resolve(t, ctx, "v2DM", 1) // Current link should have been launching v2.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700432
Bogdan Caprita2b219362014-12-09 17:03:33 -0800433 // Try issuing an update without changing the envelope in the
434 // application repository: this should fail, and current link should be
435 // unchanged.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800436 updateDeviceExpectError(t, ctx, "v2DM", impl.ErrUpdateNoOp.ID)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700437 if evalLink() != scriptPathV2 {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700438 t.Fatalf("script changed")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700439 }
440
Bogdan Caprita2b219362014-12-09 17:03:33 -0800441 // Create a third version of the device manager and issue an update.
Asim Shankar23dac322015-02-14 12:42:26 -0800442 *envelope = envelopeFromShell(sh, dmEnv, deviceManagerCmd, application.DeviceManagerTitle, "v3DM")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800443 updateDevice(t, ctx, "v2DM")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700444
445 scriptPathV3 := evalLink()
446 if scriptPathV3 == scriptPathV2 {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700447 t.Fatalf("current link didn't change")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700448 }
449
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800450 dms.Expect("restart handler")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800451 dms.Expect("v2DM terminated")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700452
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800453 dmh.Shutdown(os.Stderr, os.Stderr)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700454
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800455 resolveExpectNotFound(t, ctx, "v3DM") // Ensure a clean slate.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700456
Bogdan Caprita2b219362014-12-09 17:03:33 -0800457 // Re-lanuch the device manager from current link. We instruct the
458 // device manager to pause before stopping its server, so that we can
459 // verify that a second revert fails while a revert is in progress.
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800460 dmh, dms = mgmttest.RunShellCommand(t, sh, dmPauseBeforeStopEnv, execScriptCmd, currLink)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700461
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800462 mgmttest.ReadPID(t, dms)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800463 resolve(t, ctx, "v3DM", 1) // Current link should have been launching v3.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700464
Bogdan Caprita2b219362014-12-09 17:03:33 -0800465 // Revert the device manager to its previous version (v2).
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800466 revertDevice(t, ctx, "v3DM")
467 revertDeviceExpectError(t, ctx, "v3DM", impl.ErrOperationInProgress.ID) // Revert already in progress.
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800468 dmh.CloseStdin()
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800469 dms.Expect("restart handler")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800470 dms.Expect("v3DM terminated")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700471 if evalLink() != scriptPathV2 {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700472 t.Fatalf("current link was not reverted correctly")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700473 }
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800474 dmh.Shutdown(os.Stderr, os.Stderr)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700475
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800476 resolveExpectNotFound(t, ctx, "v2DM") // Ensure a clean slate.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700477
Asim Shankar23dac322015-02-14 12:42:26 -0800478 dmh, dms = mgmttest.RunShellCommand(t, sh, dmEnv, execScriptCmd, currLink)
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800479 mgmttest.ReadPID(t, dms)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800480 resolve(t, ctx, "v2DM", 1) // Current link should have been launching v2.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700481
Bogdan Caprita2b219362014-12-09 17:03:33 -0800482 // Revert the device manager to its previous version (factory).
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800483 revertDevice(t, ctx, "v2DM")
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800484 dms.Expect("restart handler")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800485 dms.Expect("v2DM terminated")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700486 if evalLink() != scriptPathFactory {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700487 t.Fatalf("current link was not reverted correctly")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700488 }
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800489 dmh.Shutdown(os.Stderr, os.Stderr)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700490
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800491 resolveExpectNotFound(t, ctx, "factoryDM") // Ensure a clean slate.
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800492
Asim Shankar23dac322015-02-14 12:42:26 -0800493 dmh, dms = mgmttest.RunShellCommand(t, sh, dmEnv, execScriptCmd, currLink)
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800494 mgmttest.ReadPID(t, dms)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800495 resolve(t, ctx, "factoryDM", 1) // Current link should have been launching factory version.
496 stopDevice(t, ctx, "factoryDM")
497 dms.Expect("factoryDM terminated")
Bogdan Caprita4ea9b032014-12-27 14:56:51 -0800498 dms.ExpectEOF()
499
500 // Re-launch the device manager, to exercise the behavior of Suspend.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800501 resolveExpectNotFound(t, ctx, "factoryDM") // Ensure a clean slate.
Asim Shankar23dac322015-02-14 12:42:26 -0800502 dmh, dms = mgmttest.RunShellCommand(t, sh, dmEnv, execScriptCmd, currLink)
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800503 mgmttest.ReadPID(t, dms)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800504 resolve(t, ctx, "factoryDM", 1)
505 suspendDevice(t, ctx, "factoryDM")
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800506 dms.Expect("restart handler")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800507 dms.Expect("factoryDM terminated")
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800508 dms.ExpectEOF()
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700509}
Bogdan Caprita1e379132014-08-03 23:02:31 -0700510
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800511type pingServer chan<- pingArgs
Bogdan Caprita1e379132014-08-03 23:02:31 -0700512
Bogdan Caprita916e99f2014-11-24 15:47:19 -0800513// TODO(caprita): Set the timeout in a more principled manner.
Bogdan Capritaa5dd9892015-01-02 11:16:25 -0800514const pingTimeout = 60 * time.Second
Bogdan Caprita916e99f2014-11-24 15:47:19 -0800515
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800516func (p pingServer) Ping(_ ipc.ServerContext, arg pingArgs) {
Robert Kroeger627a1152014-10-01 14:57:55 -0700517 p <- arg
518}
Bogdan Caprita1e379132014-08-03 23:02:31 -0700519
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700520// setupPingServer creates a server listening for a ping from a child app; it
521// returns a channel on which the app's ping message is returned, and a cleanup
522// function.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800523func setupPingServer(t *testing.T, ctx *context.T) (<-chan pingArgs, func()) {
524 server, _ := mgmttest.NewServer(ctx)
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800525 pingCh := make(chan pingArgs, 1)
Robin Thellend888f8cf2014-12-15 16:19:10 -0800526 if err := server.Serve("pingserver", pingServer(pingCh), &openAuthorizer{}); err != nil {
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700527 t.Fatalf("Serve(%q, <dispatcher>) failed: %v", "pingserver", err)
528 }
529 return pingCh, func() {
530 if err := server.Stop(); err != nil {
531 t.Fatalf("Stop() failed: %v", err)
532 }
533 }
534}
535
Robert Kroeger124a04f2015-02-03 17:32:32 -0800536func instanceDirForApp(root, appID, instanceID string) string {
Bogdan Caprita1e379132014-08-03 23:02:31 -0700537 applicationDirName := func(title string) string {
538 h := md5.New()
539 h.Write([]byte(title))
540 hash := strings.TrimRight(base64.URLEncoding.EncodeToString(h.Sum(nil)), "=")
541 return "app-" + hash
542 }
543 components := strings.Split(appID, "/")
544 appTitle, installationID := components[0], components[1]
Robert Kroeger124a04f2015-02-03 17:32:32 -0800545 return filepath.Join(root, applicationDirName(appTitle), "installation-"+installationID, "instances", "instance-"+instanceID)
546}
547
548func verifyAppWorkspace(t *testing.T, root, appID, instanceID string) {
549 // HACK ALERT: for now, we peek inside the device manager's directory
550 // structure (which ought to be opaque) to check for what the app has
551 // written to its local root.
552 //
553 // TODO(caprita): add support to device manager to browse logs/app local
554 // root.
555 rootDir := filepath.Join(instanceDirForApp(root, appID, instanceID), "root")
Bogdan Caprita1e379132014-08-03 23:02:31 -0700556 testFile := filepath.Join(rootDir, "testfile")
557 if read, err := ioutil.ReadFile(testFile); err != nil {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700558 t.Fatalf("Failed to read %v: %v", testFile, err)
Bogdan Caprita1e379132014-08-03 23:02:31 -0700559 } else if want, got := "goodbye world", string(read); want != got {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700560 t.Fatalf("Expected to read %v, got %v instead", want, got)
Bogdan Caprita1e379132014-08-03 23:02:31 -0700561 }
562 // END HACK
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700563}
Bogdan Caprita78b62162014-08-21 15:35:08 -0700564
Robert Kroeger124a04f2015-02-03 17:32:32 -0800565func verifyAppState(t *testing.T, root, appID, instanceID, state string) {
566 // Same hack alert as verifyAppWorkspace
567 testFile := filepath.Join(instanceDirForApp(root, appID, instanceID), state)
568 if read, err := ioutil.ReadFile(testFile); err != nil {
Robert Kroeger74645172015-02-11 14:22:21 -0800569 t.Fatalf(testutil.FormatLogLine(2, "failed to get read %v: %v", testFile, err))
Robert Kroeger124a04f2015-02-03 17:32:32 -0800570 } else if want, got := "status", string(read); want != got {
Robert Kroeger74645172015-02-11 14:22:21 -0800571 t.Fatalf(testutil.FormatLogLine(2, "Expected to read %v, got %v instead", want, got))
Robert Kroeger124a04f2015-02-03 17:32:32 -0800572 }
573}
574
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800575func verifyPingArgs(t *testing.T, pingCh <-chan pingArgs, username, flagValue, envValue string) {
576 var args pingArgs
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700577 select {
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800578 case args = <-pingCh:
Bogdan Caprita916e99f2014-11-24 15:47:19 -0800579 case <-time.After(pingTimeout):
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800580 t.Fatalf(testutil.FormatLogLine(2, "failed to get ping"))
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700581 }
Bogdan Capritae1960f52015-01-14 09:57:19 -0800582 wantArgs := pingArgs{
583 Username: username,
584 FlagValue: flagValue,
585 EnvValue: envValue,
Robert Kroeger627a1152014-10-01 14:57:55 -0700586 }
Bogdan Capritae1960f52015-01-14 09:57:19 -0800587 if !reflect.DeepEqual(args, wantArgs) {
588 t.Fatalf(testutil.FormatLogLine(2, "got ping args %q, expected %q", args, wantArgs))
Robert Kroeger627a1152014-10-01 14:57:55 -0700589 }
590}
591
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700592// TestAppLifeCycle installs an app, starts it, suspends it, resumes it, and
593// then stops it.
594func TestAppLifeCycle(t *testing.T) {
Ankurf416ac52015-01-29 13:58:24 -0800595 ctx, shutdown := testutil.InitForTest()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800596 defer shutdown()
597 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
598
599 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700600 defer deferFn()
601
602 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800603 envelope, cleanup := startMockRepos(t, ctx)
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700604 defer cleanup()
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700605
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -0800606 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700607 defer cleanup()
608
Robert Kroegerdd07b362014-09-18 17:34:42 -0700609 // Create a script wrapping the test target that implements suidhelper.
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700610 helperPath := generateSuidHelperScript(t, root)
Robert Kroegerdd07b362014-09-18 17:34:42 -0700611
Bogdan Caprita2b219362014-12-09 17:03:33 -0800612 // Set up the device manager. Since we won't do device manager updates,
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700613 // don't worry about its application envelope and current link.
Ryan Brown05de9ec2015-02-03 14:27:37 -0800614 dmh, dms := mgmttest.RunShellCommand(t, sh, nil, deviceManagerCmd, "dm", root, helperPath, "unused_app_repo_name", "unused_curr_link")
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800615 mgmttest.ReadPID(t, dms)
Asim Shankar23dac322015-02-14 12:42:26 -0800616 claimDevice(t, ctx, "dm", "mydevice", noPairingToken)
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700617
618 // Create the local server that the app uses to let us know it's ready.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800619 pingCh, cleanup := setupPingServer(t, ctx)
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700620 defer cleanup()
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700621
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800622 resolve(t, ctx, "pingserver", 1)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700623
Bogdan Capritabce0a632014-09-03 16:15:26 -0700624 // Create an envelope for a first version of the app.
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800625 *envelope = envelopeFromShell(sh, []string{testEnvVarName + "=env-val-envelope"}, appCmd, "google naps", fmt.Sprintf("--%s=flag-val-envelope", testFlagName), "appV1")
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700626
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800627 // Install the app. The config-specified flag value for testFlagName
Bogdan Caprita8964d3f2015-02-02 13:47:39 -0800628 // should override the value specified in the envelope above, and the
629 // config-specified value for origin should override the value in the
630 // Install rpc argument.
631 mtName, ok := sh.GetVar(consts.NamespaceRootPrefix)
632 if !ok {
633 t.Fatalf("failed to get namespace root var from shell")
634 }
635 // This rooted name should be equivalent to the relative name "ar", but
636 // we want to test that the config override for origin works.
637 rootedAppRepoName := naming.Join(mtName, "ar")
638 appID := installApp(t, ctx, device.Config{testFlagName: "flag-val-install", mgmt.AppOriginConfigKey: rootedAppRepoName})
Bogdan Capritad8373a12015-01-28 19:52:37 -0800639 installationDebug := debug(t, ctx, appID)
640 // We spot-check a couple pieces of information we expect in the debug
641 // output.
642 // TODO(caprita): Is there a way to verify more without adding brittle
643 // logic that assumes too much about the format? This may be one
644 // argument in favor of making the output of Debug a struct instead of
645 // free-form string.
Bogdan Caprita8964d3f2015-02-02 13:47:39 -0800646 if !strings.Contains(installationDebug, fmt.Sprintf("Origin: %v", rootedAppRepoName)) {
Bogdan Capritad8373a12015-01-28 19:52:37 -0800647 t.Fatalf("debug response doesn't contain expected info: %v", installationDebug)
648 }
649 if !strings.Contains(installationDebug, "Config: map[random_test_flag:flag-val-install]") {
650 t.Fatalf("debug response doesn't contain expected info: %v", installationDebug)
651 }
Bogdan Caprita730bde12014-11-08 15:35:43 -0800652
653 // Start requires the caller to grant a blessing for the app instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800654 if _, err := startAppImpl(t, ctx, appID, ""); err == nil || !verror.Is(err, impl.ErrInvalidBlessing.ID) {
Todd Wang34ed4c62014-11-26 15:15:52 -0800655 t.Fatalf("Start(%v) expected to fail with %v, got %v instead", appID, impl.ErrInvalidBlessing.ID, err)
Bogdan Caprita730bde12014-11-08 15:35:43 -0800656 }
657
Bogdan Capritabce0a632014-09-03 16:15:26 -0700658 // Start an instance of the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800659 instance1ID := startApp(t, ctx, appID)
Robert Kroeger627a1152014-10-01 14:57:55 -0700660
Bogdan Capritad8373a12015-01-28 19:52:37 -0800661 instanceDebug := debug(t, ctx, appID, instance1ID)
Bogdan Capritafca013d2015-01-29 15:32:34 -0800662 if !strings.Contains(instanceDebug, fmt.Sprintf("Blessing Store: Default blessings: %s/forapp/google naps", testutil.TestBlessing)) {
Bogdan Capritad8373a12015-01-28 19:52:37 -0800663 t.Fatalf("debug response doesn't contain expected info: %v", instanceDebug)
664 }
665
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700666 // Wait until the app pings us that it's ready.
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800667 verifyPingArgs(t, pingCh, userName(t), "flag-val-install", "env-val-envelope")
Robert Kroeger124a04f2015-02-03 17:32:32 -0800668 verifyAppState(t, root, appID, instance1ID, "started")
Robert Kroeger627a1152014-10-01 14:57:55 -0700669
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800670 v1EP1 := resolve(t, ctx, "appV1", 1)[0]
Bogdan Capritabce0a632014-09-03 16:15:26 -0700671
672 // Suspend the app instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800673 suspendApp(t, ctx, appID, instance1ID)
674 resolveExpectNotFound(t, ctx, "appV1")
Bogdan Capritabce0a632014-09-03 16:15:26 -0700675
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800676 resumeApp(t, ctx, appID, instance1ID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800677 verifyPingArgs(t, pingCh, userName(t), "flag-val-install", "env-val-envelope") // Wait until the app pings us that it's ready.
Bogdan Capritabce0a632014-09-03 16:15:26 -0700678 oldV1EP1 := v1EP1
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800679 if v1EP1 = resolve(t, ctx, "appV1", 1)[0]; v1EP1 == oldV1EP1 {
Bogdan Capritabce0a632014-09-03 16:15:26 -0700680 t.Fatalf("Expected a new endpoint for the app after suspend/resume")
681 }
682
683 // Start a second instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800684 instance2ID := startApp(t, ctx, appID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800685 verifyPingArgs(t, pingCh, userName(t), "flag-val-install", "env-val-envelope") // Wait until the app pings us that it's ready.
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700686
Bogdan Capritabce0a632014-09-03 16:15:26 -0700687 // There should be two endpoints mounted as "appV1", one for each
688 // instance of the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800689 endpoints := resolve(t, ctx, "appV1", 2)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700690 v1EP2 := endpoints[0]
691 if endpoints[0] == v1EP1 {
692 v1EP2 = endpoints[1]
693 if v1EP2 == v1EP1 {
694 t.Fatalf("Both endpoints are the same")
695 }
696 } else if endpoints[1] != v1EP1 {
697 t.Fatalf("Second endpoint should have been v1EP1: %v, %v", endpoints, v1EP1)
698 }
Bogdan Caprita268b4192014-08-28 10:04:44 -0700699
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700700 // TODO(caprita): test Suspend and Resume, and verify various
701 // non-standard combinations (suspend when stopped; resume while still
702 // running; stop while suspended).
703
Bogdan Capritabce0a632014-09-03 16:15:26 -0700704 // Suspend the first instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800705 suspendApp(t, ctx, appID, instance1ID)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700706 // Only the second instance should still be running and mounted.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800707 if want, got := v1EP2, resolve(t, ctx, "appV1", 1)[0]; want != got {
Bogdan Capritabce0a632014-09-03 16:15:26 -0700708 t.Fatalf("Resolve(%v): want: %v, got %v", "appV1", want, got)
709 }
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700710
Bogdan Capritabce0a632014-09-03 16:15:26 -0700711 // Updating the installation to itself is a no-op.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800712 updateAppExpectError(t, ctx, appID, impl.ErrUpdateNoOp.ID)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700713
714 // Updating the installation should not work with a mismatched title.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700715 *envelope = envelopeFromShell(sh, nil, appCmd, "bogus")
716
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800717 updateAppExpectError(t, ctx, appID, impl.ErrAppTitleMismatch.ID)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700718
719 // Create a second version of the app and update the app to it.
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800720 *envelope = envelopeFromShell(sh, []string{testEnvVarName + "=env-val-envelope"}, appCmd, "google naps", "appV2")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700721
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800722 updateApp(t, ctx, appID)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700723
724 // Second instance should still be running.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800725 if want, got := v1EP2, resolve(t, ctx, "appV1", 1)[0]; want != got {
Bogdan Capritabce0a632014-09-03 16:15:26 -0700726 t.Fatalf("Resolve(%v): want: %v, got %v", "appV1", want, got)
727 }
728
729 // Resume first instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800730 resumeApp(t, ctx, appID, instance1ID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800731 verifyPingArgs(t, pingCh, userName(t), "flag-val-install", "env-val-envelope") // Wait until the app pings us that it's ready.
Bogdan Capritabce0a632014-09-03 16:15:26 -0700732 // Both instances should still be running the first version of the app.
733 // Check that the mounttable contains two endpoints, one of which is
734 // v1EP2.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800735 endpoints = resolve(t, ctx, "appV1", 2)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700736 if endpoints[0] == v1EP2 {
737 if endpoints[1] == v1EP2 {
738 t.Fatalf("Both endpoints are the same")
739 }
740 } else if endpoints[1] != v1EP2 {
741 t.Fatalf("Second endpoint should have been v1EP2: %v, %v", endpoints, v1EP2)
742 }
743
744 // Stop first instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800745 stopApp(t, ctx, appID, instance1ID)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700746 verifyAppWorkspace(t, root, appID, instance1ID)
747
748 // Only second instance is still running.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800749 if want, got := v1EP2, resolve(t, ctx, "appV1", 1)[0]; want != got {
Bogdan Capritabce0a632014-09-03 16:15:26 -0700750 t.Fatalf("Resolve(%v): want: %v, got %v", "appV1", want, got)
751 }
752
753 // Start a third instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800754 instance3ID := startApp(t, ctx, appID)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700755 // Wait until the app pings us that it's ready.
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800756 verifyPingArgs(t, pingCh, userName(t), "flag-val-install", "env-val-envelope")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700757
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800758 resolve(t, ctx, "appV2", 1)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700759
760 // Stop second instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800761 stopApp(t, ctx, appID, instance2ID)
762 resolveExpectNotFound(t, ctx, "appV1")
Bogdan Capritabce0a632014-09-03 16:15:26 -0700763
764 // Stop third instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800765 stopApp(t, ctx, appID, instance3ID)
766 resolveExpectNotFound(t, ctx, "appV2")
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700767
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700768 // Revert the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800769 revertApp(t, ctx, appID)
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700770
771 // Start a fourth instance. It should be started from version 1.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800772 instance4ID := startApp(t, ctx, appID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800773 verifyPingArgs(t, pingCh, userName(t), "flag-val-install", "env-val-envelope") // Wait until the app pings us that it's ready.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800774 resolve(t, ctx, "appV1", 1)
775 stopApp(t, ctx, appID, instance4ID)
776 resolveExpectNotFound(t, ctx, "appV1")
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700777
778 // We are already on the first version, no further revert possible.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800779 revertAppExpectError(t, ctx, appID, impl.ErrUpdateNoOp.ID)
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700780
Bogdan Caprita8c776b22014-08-28 17:29:07 -0700781 // Uninstall the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800782 uninstallApp(t, ctx, appID)
Bogdan Caprita8c776b22014-08-28 17:29:07 -0700783
Bogdan Capritabce0a632014-09-03 16:15:26 -0700784 // Updating the installation should no longer be allowed.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800785 updateAppExpectError(t, ctx, appID, impl.ErrInvalidOperation.ID)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700786
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700787 // Reverting the installation should no longer be allowed.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800788 revertAppExpectError(t, ctx, appID, impl.ErrInvalidOperation.ID)
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700789
Bogdan Caprita8c776b22014-08-28 17:29:07 -0700790 // Starting new instances should no longer be allowed.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800791 startAppExpectError(t, ctx, appID, impl.ErrInvalidOperation.ID)
Bogdan Caprita8c776b22014-08-28 17:29:07 -0700792
Bogdan Caprita2b219362014-12-09 17:03:33 -0800793 // Cleanly shut down the device manager.
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800794 syscall.Kill(dmh.Pid(), syscall.SIGINT)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800795 dms.Expect("dm terminated")
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800796 dms.ExpectEOF()
Bogdan Caprita1e379132014-08-03 23:02:31 -0700797}
Gautham82bb9952014-08-28 14:11:51 -0700798
gauthamtcb03d132015-02-05 18:05:22 -0800799func startRealBinaryRepository(t *testing.T, ctx *context.T, von string) func() {
Jiri Simsa432cc2e2014-12-08 15:53:38 -0800800 rootDir, err := binaryimpl.SetupRootDir("")
Robin Thellend875f2592014-12-02 10:29:37 -0800801 if err != nil {
Jiri Simsa432cc2e2014-12-08 15:53:38 -0800802 t.Fatalf("binaryimpl.SetupRootDir failed: %v", err)
Robin Thellend875f2592014-12-02 10:29:37 -0800803 }
Jiri Simsa432cc2e2014-12-08 15:53:38 -0800804 state, err := binaryimpl.NewState(rootDir, "", 3)
Robin Thellend875f2592014-12-02 10:29:37 -0800805 if err != nil {
806 t.Fatalf("binaryimpl.NewState failed: %v", err)
807 }
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800808 server, _ := mgmttest.NewServer(ctx)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800809 d, err := binaryimpl.NewDispatcher(veyron2.GetPrincipal(ctx), state)
Robert Kroeger8d7a0ef2015-01-14 17:38:40 -0800810 if err != nil {
811 t.Fatalf("server.NewDispatcher failed: %v", err)
812 }
gauthamtcb03d132015-02-05 18:05:22 -0800813 if err := server.ServeDispatcher(von, d); err != nil {
Robin Thellend875f2592014-12-02 10:29:37 -0800814 t.Fatalf("server.ServeDispatcher failed: %v", err)
815 }
Robin Thellend875f2592014-12-02 10:29:37 -0800816 return func() {
817 if err := server.Stop(); err != nil {
818 t.Fatalf("server.Stop failed: %v", err)
819 }
Jiri Simsa432cc2e2014-12-08 15:53:38 -0800820 if err := os.RemoveAll(rootDir); err != nil {
821 t.Fatalf("os.RemoveAll(%q) failed: %v", rootDir, err)
Robin Thellend875f2592014-12-02 10:29:37 -0800822 }
823 }
824}
825
Bogdan Caprita2b219362014-12-09 17:03:33 -0800826// TestDeviceManagerClaim claims a devicemanager and tests ACL permissions on
827// its methods.
828func TestDeviceManagerClaim(t *testing.T) {
Ankurf416ac52015-01-29 13:58:24 -0800829 ctx, shutdown := testutil.InitForTest()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800830 defer shutdown()
831 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
832
833 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700834 defer deferFn()
835
836 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800837 envelope, cleanup := startMockRepos(t, ctx)
Gautham82bb9952014-08-28 14:11:51 -0700838 defer cleanup()
Gautham82bb9952014-08-28 14:11:51 -0700839
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -0800840 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Gautham82bb9952014-08-28 14:11:51 -0700841 defer cleanup()
842
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700843 // Create a script wrapping the test target that implements suidhelper.
844 helperPath := generateSuidHelperScript(t, root)
845
Bogdan Caprita2b219362014-12-09 17:03:33 -0800846 // Set up the device manager. Since we won't do device manager updates,
Gautham82bb9952014-08-28 14:11:51 -0700847 // don't worry about its application envelope and current link.
gauthamt27f38ba2015-02-13 13:45:01 -0800848 pairingToken := "abcxyz"
849 _, dms := mgmttest.RunShellCommand(t, sh, nil, deviceManagerCmd, "dm", root, helperPath, "unused_app_repo_name", "unused_curr_link", pairingToken)
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800850 pid := mgmttest.ReadPID(t, dms)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700851 defer syscall.Kill(pid, syscall.SIGINT)
Gautham82bb9952014-08-28 14:11:51 -0700852
Bogdan Caprita26929102014-11-07 11:56:56 -0800853 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "trapp")
Gautham82bb9952014-08-28 14:11:51 -0700854
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800855 claimantCtx, err := veyron2.SetPrincipal(ctx, tsecurity.NewPrincipal("claimant"))
856 if err != nil {
857 t.Fatalf("Could not create claimant principal: %v", err)
858 }
859 octx, err := veyron2.SetPrincipal(ctx, tsecurity.NewPrincipal("other"))
860 if err != nil {
861 t.Fatalf("Could not create other principal: %v", err)
862 }
Matt Rosencrantz5180d162014-12-03 13:48:40 -0800863
Asim Shankar23dac322015-02-14 12:42:26 -0800864 // Unclaimed devices cannot do anything but be claimed.
865 installAppExpectError(t, octx, impl.ErrUnclaimedDevice.ID)
866 // Claim the device with an incorrect pairing token should fail.
867 claimDeviceExpectError(t, claimantCtx, "dm", "mydevice", "badtoken", impl.ErrInvalidPairingToken.ID)
868 // But succeed with a valid pairing token
869 claimDevice(t, claimantCtx, "dm", "mydevice", pairingToken)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700870
Robin Thellend888f8cf2014-12-15 16:19:10 -0800871 // Installation should succeed since claimantRT is now the "owner" of
872 // the devicemanager.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800873 appID := installApp(t, claimantCtx)
Bogdan Capritab9501d12014-10-10 15:02:03 -0700874
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800875 // octx should be unable to install though, since the ACLs have
Bogdan Caprita2b219362014-12-09 17:03:33 -0800876 // changed now.
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800877 installAppExpectError(t, octx, verror.NoAccess.ID)
Bogdan Capritab9501d12014-10-10 15:02:03 -0700878
Bogdan Capritab9501d12014-10-10 15:02:03 -0700879 // Create the local server that the app uses to let us know it's ready.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800880 pingCh, cleanup := setupPingServer(t, ctx)
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700881 defer cleanup()
Bogdan Capritab9501d12014-10-10 15:02:03 -0700882
883 // Start an instance of the app.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800884 instanceID := startApp(t, claimantCtx, appID)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700885
886 // Wait until the app pings us that it's ready.
887 select {
888 case <-pingCh:
Bogdan Caprita916e99f2014-11-24 15:47:19 -0800889 case <-time.After(pingTimeout):
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700890 t.Fatalf("failed to get ping")
891 }
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800892 resolve(t, ctx, "trapp", 1)
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800893 suspendApp(t, claimantCtx, appID, instanceID)
Bogdan Capritab9501d12014-10-10 15:02:03 -0700894
Bogdan Caprita2b219362014-12-09 17:03:33 -0800895 // TODO(gauthamt): Test that ACLs persist across devicemanager restarts
Gautham82bb9952014-08-28 14:11:51 -0700896}
Gautham6fe61e52014-09-16 13:58:17 -0700897
Bogdan Caprita2b219362014-12-09 17:03:33 -0800898func TestDeviceManagerUpdateACL(t *testing.T) {
Ankurf416ac52015-01-29 13:58:24 -0800899 ctx, shutdown := testutil.InitForTest()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800900 defer shutdown()
901 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
902
903 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700904 defer deferFn()
905
906 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800907 envelope, cleanup := startMockRepos(t, ctx)
Gautham6fe61e52014-09-16 13:58:17 -0700908 defer cleanup()
Gautham6fe61e52014-09-16 13:58:17 -0700909
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -0800910 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Gautham6fe61e52014-09-16 13:58:17 -0700911 defer cleanup()
912
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800913 // The two "processes"/runtimes which will act as IPC clients to
914 // the devicemanager process.
915 selfCtx := ctx
916 octx, err := veyron2.SetPrincipal(ctx, tsecurity.NewPrincipal())
917 if err != nil {
918 t.Fatalf("Could not create other principal: %v", err)
919 }
920
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800921 // By default, selfCtx and octx will have blessings generated based on
Bogdan Caprita2b219362014-12-09 17:03:33 -0800922 // the username/machine name running this process. Since these blessings
923 // will appear in ACLs, give them recognizable names.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800924 idp := tsecurity.NewIDProvider("root")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800925 if err := idp.Bless(veyron2.GetPrincipal(selfCtx), "self"); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700926 t.Fatal(err)
927 }
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800928 if err := idp.Bless(veyron2.GetPrincipal(octx), "other"); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700929 t.Fatal(err)
930 }
931
Bogdan Caprita2b219362014-12-09 17:03:33 -0800932 // Set up the device manager. Since we won't do device manager updates,
Gautham6fe61e52014-09-16 13:58:17 -0700933 // don't worry about its application envelope and current link.
Ryan Brown05de9ec2015-02-03 14:27:37 -0800934 _, dms := mgmttest.RunShellCommand(t, sh, nil, deviceManagerCmd, "dm", root, "unused_helper", "unused_app_repo_name", "unused_curr_link")
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800935 pid := mgmttest.ReadPID(t, dms)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700936 defer syscall.Kill(pid, syscall.SIGINT)
Gautham6fe61e52014-09-16 13:58:17 -0700937
938 // Create an envelope for an app.
Bogdan Caprita26929102014-11-07 11:56:56 -0800939 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps")
Gautham6fe61e52014-09-16 13:58:17 -0700940
Robert Kroegere95ed6d2015-01-14 17:41:04 -0800941 // On an unclaimed device manager, there will be no ACLs.
942 deviceStub := device.DeviceClient("dm/device")
943 if _, _, err := deviceStub.GetACL(selfCtx); err == nil {
944 t.Fatalf("GetACL should have failed but didn't.")
Gautham6fe61e52014-09-16 13:58:17 -0700945 }
946
Bogdan Caprita2b219362014-12-09 17:03:33 -0800947 // Claim the devicemanager as "root/self/mydevice"
Asim Shankar23dac322015-02-14 12:42:26 -0800948 claimDevice(t, selfCtx, "dm", "mydevice", noPairingToken)
Asim Shankar68885192014-11-26 12:48:35 -0800949 expectedACL := make(access.TaggedACLMap)
950 for _, tag := range access.AllTypicalTags() {
Ankurd6a793b2015-02-12 11:52:11 -0800951 expectedACL[string(tag)] = access.ACL{In: []security.BlessingPattern{"root/$", "root/self/$", "root/self/mydevice/$"}}
Asim Shankar68885192014-11-26 12:48:35 -0800952 }
Gautham6fe61e52014-09-16 13:58:17 -0700953 var b bytes.Buffer
Asim Shankar68885192014-11-26 12:48:35 -0800954 if err := expectedACL.WriteTo(&b); err != nil {
955 t.Fatalf("Failed to save ACL:%v", err)
Gautham6fe61e52014-09-16 13:58:17 -0700956 }
957 md5hash := md5.Sum(b.Bytes())
958 expectedETAG := hex.EncodeToString(md5hash[:])
Robert Kroegere95ed6d2015-01-14 17:41:04 -0800959 acl, etag, err := deviceStub.GetACL(selfCtx)
960 if err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700961 t.Fatal(err)
Gautham6fe61e52014-09-16 13:58:17 -0700962 }
963 if etag != expectedETAG {
964 t.Fatalf("getACL expected:%v(%v), got:%v(%v)", expectedACL, expectedETAG, acl, etag)
965 }
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800966 // Install from octx should fail, since it does not match the ACL.
967 installAppExpectError(t, octx, verror.NoAccess.ID)
968
Asim Shankar68885192014-11-26 12:48:35 -0800969 newACL := make(access.TaggedACLMap)
970 for _, tag := range access.AllTypicalTags() {
971 newACL.Add("root/other", string(tag))
972 }
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800973 if err := deviceStub.SetACL(selfCtx, newACL, "invalid"); err == nil {
Gautham6fe61e52014-09-16 13:58:17 -0700974 t.Fatalf("SetACL should have failed with invalid etag")
975 }
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800976 if err := deviceStub.SetACL(selfCtx, newACL, etag); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700977 t.Fatal(err)
Gautham6fe61e52014-09-16 13:58:17 -0700978 }
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800979 // Install should now fail with selfCtx, which no longer matches the
980 // ACLs but succeed with octx, which does.
981 installAppExpectError(t, selfCtx, verror.NoAccess.ID)
982 installApp(t, octx)
Gautham6fe61e52014-09-16 13:58:17 -0700983}
Robin Thellend09929f42014-10-01 10:18:13 -0700984
Bogdan Capritac7e72b62015-01-07 19:22:23 -0800985type simpleRW chan []byte
986
987func (s simpleRW) Write(p []byte) (n int, err error) {
988 s <- p
989 return len(p), nil
990}
991func (s simpleRW) Read(p []byte) (n int, err error) {
992 return copy(p, <-s), nil
993}
994
995// TestDeviceManagerInstallation verifies the 'self install' and 'uninstall'
Bogdan Capritaa40d3382014-12-19 16:30:26 -0800996// functionality of the device manager: it runs SelfInstall in a child process,
997// then runs the executable from the soft link that the installation created.
998// This should bring up a functioning device manager. In the end it runs
999// Uninstall and verifies that the installation is gone.
Bogdan Capritac7e72b62015-01-07 19:22:23 -08001000func TestDeviceManagerInstallation(t *testing.T) {
Ankurf416ac52015-01-29 13:58:24 -08001001 ctx, shutdown := testutil.InitForTest()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001002 defer shutdown()
1003 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
1004
1005 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001006 defer deferFn()
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -08001007 testDir, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Bogdan Caprita5420f172014-10-10 15:58:14 -07001008 defer cleanup()
1009
Bogdan Capritac7e72b62015-01-07 19:22:23 -08001010 // Create a script wrapping the test target that implements suidhelper.
Bogdan Caprita29a3b352015-01-16 16:28:49 -08001011 suidHelperPath := generateSuidHelperScript(t, testDir)
Bogdan Capritac7e72b62015-01-07 19:22:23 -08001012 // Create a dummy script mascarading as the security agent.
1013 agentPath := generateAgentScript(t, testDir)
Bogdan Caprita29a3b352015-01-16 16:28:49 -08001014 initHelperPath := ""
Bogdan Caprita5420f172014-10-10 15:58:14 -07001015
Bogdan Caprita2b219362014-12-09 17:03:33 -08001016 // Create an 'envelope' for the device manager that we can pass to the
1017 // installer, to ensure that the device manager that the installer
Bogdan Capritac7e72b62015-01-07 19:22:23 -08001018 // configures can run.
1019 dmargs, dmenv := sh.CommandEnvelope(deviceManagerCmd, nil, "dm")
1020 dmDir := filepath.Join(testDir, "dm")
Bogdan Caprita29a3b352015-01-16 16:28:49 -08001021 // TODO(caprita): Add test logic when initMode = true.
1022 singleUser, sessionMode, initMode := true, true, false
Robin Thellendd9ffea92015-01-29 09:47:37 -08001023 if err := impl.SelfInstall(dmDir, suidHelperPath, agentPath, initHelperPath, "", singleUser, sessionMode, initMode, dmargs[1:], dmenv, os.Stderr, os.Stdout); err != nil {
Bogdan Capritac7e72b62015-01-07 19:22:23 -08001024 t.Fatalf("SelfInstall failed: %v", err)
1025 }
Bogdan Caprita5420f172014-10-10 15:58:14 -07001026
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001027 resolveExpectNotFound(t, ctx, "dm")
Bogdan Capritac7e72b62015-01-07 19:22:23 -08001028 // Start the device manager.
1029 stdout := make(simpleRW, 100)
Robin Thellendf5986282015-02-13 11:01:03 -08001030 defer os.Setenv(redirectEnv, os.Getenv(redirectEnv))
1031 os.Setenv(redirectEnv, "1")
Bogdan Capritac7e72b62015-01-07 19:22:23 -08001032 if err := impl.Start(dmDir, os.Stderr, stdout); err != nil {
1033 t.Fatalf("Start failed: %v", err)
1034 }
1035 dms := expect.NewSession(t, stdout, mgmttest.ExpectTimeout)
1036 mgmttest.ReadPID(t, dms)
Asim Shankar23dac322015-02-14 12:42:26 -08001037 claimDevice(t, ctx, "dm", "mydevice", noPairingToken)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001038 revertDeviceExpectError(t, ctx, "dm", impl.ErrUpdateNoOp.ID) // No previous version available.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001039
Bogdan Capritac7e72b62015-01-07 19:22:23 -08001040 // Stop the device manager.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001041 if err := impl.Stop(ctx, dmDir, os.Stderr, os.Stdout); err != nil {
Bogdan Capritac7e72b62015-01-07 19:22:23 -08001042 t.Fatalf("Stop failed: %v", err)
1043 }
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001044 dms.Expect("dm terminated")
Bogdan Capritaa40d3382014-12-19 16:30:26 -08001045
1046 // Uninstall.
Bogdan Caprita29a3b352015-01-16 16:28:49 -08001047 if err := impl.Uninstall(dmDir, os.Stderr, os.Stdout); err != nil {
Bogdan Capritac7e72b62015-01-07 19:22:23 -08001048 t.Fatalf("Uninstall failed: %v", err)
Bogdan Capritaa40d3382014-12-19 16:30:26 -08001049 }
Bogdan Capritac7e72b62015-01-07 19:22:23 -08001050 // Ensure that the installation is gone.
1051 if files, err := ioutil.ReadDir(dmDir); err != nil || len(files) > 0 {
1052 var finfo []string
1053 for _, f := range files {
1054 finfo = append(finfo, f.Name())
1055 }
1056 t.Fatalf("ReadDir returned (%v, %v)", err, finfo)
Bogdan Capritaa40d3382014-12-19 16:30:26 -08001057 }
Bogdan Caprita5420f172014-10-10 15:58:14 -07001058}
1059
Bogdan Caprita2b219362014-12-09 17:03:33 -08001060func TestDeviceManagerGlobAndDebug(t *testing.T) {
Ankurf416ac52015-01-29 13:58:24 -08001061 ctx, shutdown := testutil.InitForTest()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001062 defer shutdown()
1063 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
1064
1065 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001066 defer deferFn()
1067
1068 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001069 envelope, cleanup := startMockRepos(t, ctx)
Robin Thellend9e523a62014-10-07 16:19:53 -07001070 defer cleanup()
Robin Thellend9e523a62014-10-07 16:19:53 -07001071
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -08001072 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Robin Thellend09929f42014-10-01 10:18:13 -07001073 defer cleanup()
1074
Bogdan Caprita962d5e02014-10-28 18:36:09 -07001075 // Create a script wrapping the test target that implements suidhelper.
1076 helperPath := generateSuidHelperScript(t, root)
1077
Bogdan Caprita2b219362014-12-09 17:03:33 -08001078 // Set up the device manager. Since we won't do device manager updates,
Robin Thellend09929f42014-10-01 10:18:13 -07001079 // don't worry about its application envelope and current link.
Ryan Brown05de9ec2015-02-03 14:27:37 -08001080 _, dms := mgmttest.RunShellCommand(t, sh, nil, deviceManagerCmd, "dm", root, helperPath, "unused_app_repo_name", "unused_curr_link")
Robert Kroegerebfb62a2014-12-10 14:42:09 -08001081 pid := mgmttest.ReadPID(t, dms)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001082 defer syscall.Kill(pid, syscall.SIGINT)
Robin Thellend09929f42014-10-01 10:18:13 -07001083
Robin Thellend9e523a62014-10-07 16:19:53 -07001084 // Create the local server that the app uses to let us know it's ready.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001085 pingCh, cleanup := setupPingServer(t, ctx)
Bogdan Capritad2b9f032014-10-10 17:43:29 -07001086 defer cleanup()
Robin Thellend09929f42014-10-01 10:18:13 -07001087
Robin Thellend9e523a62014-10-07 16:19:53 -07001088 // Create the envelope for the first version of the app.
Bogdan Caprita26929102014-11-07 11:56:56 -08001089 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "appV1")
Robin Thellend9e523a62014-10-07 16:19:53 -07001090
Asim Shankar23dac322015-02-14 12:42:26 -08001091 // Device must be claimed before applications can be installed.
1092 claimDevice(t, ctx, "dm", "mydevice", noPairingToken)
Robin Thellend9e523a62014-10-07 16:19:53 -07001093 // Install the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001094 appID := installApp(t, ctx)
Bogdan Caprita43bc7372014-12-03 21:51:12 -08001095 install1ID := path.Base(appID)
Robin Thellend9e523a62014-10-07 16:19:53 -07001096
1097 // Start an instance of the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001098 instance1ID := startApp(t, ctx, appID)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001099
1100 // Wait until the app pings us that it's ready.
1101 select {
1102 case <-pingCh:
Bogdan Caprita916e99f2014-11-24 15:47:19 -08001103 case <-time.After(pingTimeout):
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001104 t.Fatalf("failed to get ping")
1105 }
Robin Thellend9e523a62014-10-07 16:19:53 -07001106
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001107 app2ID := installApp(t, ctx)
Bogdan Caprita43bc7372014-12-03 21:51:12 -08001108 install2ID := path.Base(app2ID)
1109
Robin Thellend9e523a62014-10-07 16:19:53 -07001110 testcases := []struct {
1111 name, pattern string
1112 expected []string
1113 }{
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001114 {"dm", "...", []string{
Robin Thellend9e523a62014-10-07 16:19:53 -07001115 "",
1116 "apps",
1117 "apps/google naps",
Bogdan Caprita43bc7372014-12-03 21:51:12 -08001118 "apps/google naps/" + install1ID,
1119 "apps/google naps/" + install1ID + "/" + instance1ID,
1120 "apps/google naps/" + install1ID + "/" + instance1ID + "/logs",
1121 "apps/google naps/" + install1ID + "/" + instance1ID + "/logs/STDERR-<timestamp>",
1122 "apps/google naps/" + install1ID + "/" + instance1ID + "/logs/STDOUT-<timestamp>",
1123 "apps/google naps/" + install1ID + "/" + instance1ID + "/logs/bin.INFO",
1124 "apps/google naps/" + install1ID + "/" + instance1ID + "/logs/bin.<*>.INFO.<timestamp>",
1125 "apps/google naps/" + install1ID + "/" + instance1ID + "/pprof",
1126 "apps/google naps/" + install1ID + "/" + instance1ID + "/stats",
1127 "apps/google naps/" + install1ID + "/" + instance1ID + "/stats/ipc",
1128 "apps/google naps/" + install1ID + "/" + instance1ID + "/stats/system",
1129 "apps/google naps/" + install1ID + "/" + instance1ID + "/stats/system/start-time-rfc1123",
1130 "apps/google naps/" + install1ID + "/" + instance1ID + "/stats/system/start-time-unix",
1131 "apps/google naps/" + install2ID,
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001132 "device",
Robin Thellend9e523a62014-10-07 16:19:53 -07001133 }},
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001134 {"dm/apps", "*", []string{"google naps"}},
1135 {"dm/apps/google naps", "*", []string{install1ID, install2ID}},
1136 {"dm/apps/google naps/" + install1ID, "*", []string{instance1ID}},
1137 {"dm/apps/google naps/" + install1ID + "/" + instance1ID, "*", []string{"logs", "pprof", "stats"}},
1138 {"dm/apps/google naps/" + install1ID + "/" + instance1ID + "/logs", "*", []string{
Robin Thellend58647322014-10-28 12:07:47 -07001139 "STDERR-<timestamp>",
1140 "STDOUT-<timestamp>",
1141 "bin.INFO",
1142 "bin.<*>.INFO.<timestamp>",
1143 }},
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001144 {"dm/apps/google naps/" + install1ID + "/" + instance1ID + "/stats/system", "start-time*", []string{"start-time-rfc1123", "start-time-unix"}},
Robin Thellend09929f42014-10-01 10:18:13 -07001145 }
Robin Thellend58647322014-10-28 12:07:47 -07001146 logFileTimeStampRE := regexp.MustCompile("(STDOUT|STDERR)-[0-9]+$")
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001147 logFileTrimInfoRE := regexp.MustCompile(`bin\..*\.INFO\.[0-9.-]+$`)
Robin Thellend58647322014-10-28 12:07:47 -07001148 logFileRemoveErrorFatalWarningRE := regexp.MustCompile("(ERROR|FATAL|WARNING)")
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001149 statsTrimRE := regexp.MustCompile("/stats/(ipc|system(/start-time.*)?)$")
Robin Thellend9e523a62014-10-07 16:19:53 -07001150 for _, tc := range testcases {
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001151 results, err := testutil.GlobName(ctx, tc.name, tc.pattern)
Robin Thellend5c95a6c2014-11-10 13:06:56 -08001152 if err != nil {
1153 t.Errorf("unexpected glob error for (%q, %q): %v", tc.name, tc.pattern, err)
1154 continue
1155 }
Robin Thellend58647322014-10-28 12:07:47 -07001156 filteredResults := []string{}
1157 for _, name := range results {
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001158 // Keep only the stats object names that match this RE.
1159 if strings.Contains(name, "/stats/") && !statsTrimRE.MatchString(name) {
1160 continue
1161 }
1162 // Remove ERROR, WARNING, FATAL log files because
1163 // they're not consistently there.
Robin Thellend58647322014-10-28 12:07:47 -07001164 if logFileRemoveErrorFatalWarningRE.MatchString(name) {
1165 continue
1166 }
1167 name = logFileTimeStampRE.ReplaceAllString(name, "$1-<timestamp>")
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001168 name = logFileTrimInfoRE.ReplaceAllString(name, "bin.<*>.INFO.<timestamp>")
Robin Thellend58647322014-10-28 12:07:47 -07001169 filteredResults = append(filteredResults, name)
Robin Thellend9e523a62014-10-07 16:19:53 -07001170 }
Robin Thellend12937a22014-10-29 17:53:23 -07001171 sort.Strings(filteredResults)
1172 sort.Strings(tc.expected)
Robin Thellend58647322014-10-28 12:07:47 -07001173 if !reflect.DeepEqual(filteredResults, tc.expected) {
1174 t.Errorf("unexpected result for (%q, %q). Got %q, want %q", tc.name, tc.pattern, filteredResults, tc.expected)
Robin Thellend9e523a62014-10-07 16:19:53 -07001175 }
Robin Thellend09929f42014-10-01 10:18:13 -07001176 }
Robin Thellend4c5266e2014-10-27 13:19:29 -07001177
Robin Thellend58647322014-10-28 12:07:47 -07001178 // Call Size() on the log file objects.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001179 files, err := testutil.GlobName(ctx, "dm", "apps/google naps/"+install1ID+"/"+instance1ID+"/logs/*")
Robin Thellend5c95a6c2014-11-10 13:06:56 -08001180 if err != nil {
1181 t.Errorf("unexpected glob error: %v", err)
1182 }
Robin Thellend12937a22014-10-29 17:53:23 -07001183 if want, got := 4, len(files); got < want {
1184 t.Errorf("Unexpected number of matches. Got %d, want at least %d", got, want)
1185 }
Robin Thellend4c5266e2014-10-27 13:19:29 -07001186 for _, file := range files {
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001187 name := naming.Join("dm", file)
Todd Wang702385a2014-11-07 01:54:08 -08001188 c := logreader.LogFileClient(name)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001189 if _, err := c.Size(ctx); err != nil {
Robin Thellend4c5266e2014-10-27 13:19:29 -07001190 t.Errorf("Size(%q) failed: %v", name, err)
1191 }
1192 }
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001193
1194 // Call Value() on some of the stats objects.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001195 objects, err := testutil.GlobName(ctx, "dm", "apps/google naps/"+install1ID+"/"+instance1ID+"/stats/system/start-time*")
Robin Thellend5c95a6c2014-11-10 13:06:56 -08001196 if err != nil {
1197 t.Errorf("unexpected glob error: %v", err)
1198 }
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001199 if want, got := 2, len(objects); got != want {
1200 t.Errorf("Unexpected number of matches. Got %d, want %d", got, want)
1201 }
1202 for _, obj := range objects {
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001203 name := naming.Join("dm", obj)
Todd Wang702385a2014-11-07 01:54:08 -08001204 c := stats.StatsClient(name)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001205 if _, err := c.Value(ctx); err != nil {
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001206 t.Errorf("Value(%q) failed: %v", name, err)
1207 }
1208 }
1209
1210 // Call CmdLine() on the pprof object.
1211 {
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001212 name := "dm/apps/google naps/" + install1ID + "/" + instance1ID + "/pprof"
Todd Wang702385a2014-11-07 01:54:08 -08001213 c := pprof.PProfClient(name)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001214 v, err := c.CmdLine(ctx)
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001215 if err != nil {
1216 t.Errorf("CmdLine(%q) failed: %v", name, err)
1217 }
1218 if len(v) == 0 {
1219 t.Fatalf("Unexpected empty cmdline: %v", v)
1220 }
1221 if got, want := filepath.Base(v[0]), "bin"; got != want {
1222 t.Errorf("Unexpected value for argv[0]. Got %v, want %v", got, want)
1223 }
1224 }
Robin Thellend4c5266e2014-10-27 13:19:29 -07001225}
1226
Bogdan Caprita2b219362014-12-09 17:03:33 -08001227func TestDeviceManagerPackages(t *testing.T) {
Ankurf416ac52015-01-29 13:58:24 -08001228 ctx, shutdown := testutil.InitForTest()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001229 defer shutdown()
1230 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
1231
1232 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Robin Thellend875f2592014-12-02 10:29:37 -08001233 defer deferFn()
1234
1235 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001236 envelope, cleanup := startMockRepos(t, ctx)
Robin Thellend875f2592014-12-02 10:29:37 -08001237 defer cleanup()
1238
gauthamtcb03d132015-02-05 18:05:22 -08001239 binaryVON := "realbin"
1240 defer startRealBinaryRepository(t, ctx, binaryVON)()
1241
1242 // upload package to binary repository
1243 tmpdir, err := ioutil.TempDir("", "test-package-")
1244 if err != nil {
1245 t.Fatalf("ioutil.TempDir failed: %v", err)
1246 }
1247 defer os.RemoveAll(tmpdir)
Bogdan Capritac25a48c2015-02-12 13:45:51 -08001248 createFile := func(name, contents string) {
1249 if err := ioutil.WriteFile(filepath.Join(tmpdir, name), []byte(contents), 0600); err != nil {
1250 t.Fatalf("ioutil.WriteFile failed: %v", err)
1251 }
gauthamtcb03d132015-02-05 18:05:22 -08001252 }
Bogdan Capritac25a48c2015-02-12 13:45:51 -08001253 createFile("hello.txt", "Hello World!")
gauthamtcb03d132015-02-05 18:05:22 -08001254 if _, err := libbinary.UploadFromDir(ctx, naming.Join(binaryVON, "testpkg"), tmpdir); err != nil {
1255 t.Fatalf("libbinary.UploadFromDir failed: %v", err)
1256 }
Bogdan Capritac25a48c2015-02-12 13:45:51 -08001257 createAndUpload := func(von, contents string) {
1258 createFile("tempfile", contents)
1259 if _, err := libbinary.UploadFromFile(ctx, naming.Join(binaryVON, von), filepath.Join(tmpdir, "tempfile")); err != nil {
1260 t.Fatalf("libbinary.UploadFromFile failed: %v", err)
1261 }
Bogdan Caprita2751d672015-02-06 13:43:47 -08001262 }
Bogdan Capritac25a48c2015-02-12 13:45:51 -08001263 createAndUpload("testfile", "Goodbye World!")
1264 createAndUpload("leftshark", "Left shark")
1265 createAndUpload("rightshark", "Right shark")
1266 createAndUpload("beachball", "Beach ball")
Robin Thellend875f2592014-12-02 10:29:37 -08001267
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -08001268 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Robin Thellend875f2592014-12-02 10:29:37 -08001269 defer cleanup()
1270
Robin Thellend875f2592014-12-02 10:29:37 -08001271 // Create a script wrapping the test target that implements suidhelper.
1272 helperPath := generateSuidHelperScript(t, root)
1273
Bogdan Caprita2b219362014-12-09 17:03:33 -08001274 // Set up the device manager. Since we won't do device manager updates,
Robin Thellend875f2592014-12-02 10:29:37 -08001275 // don't worry about its application envelope and current link.
Ryan Brown05de9ec2015-02-03 14:27:37 -08001276 _, dms := mgmttest.RunShellCommand(t, sh, nil, deviceManagerCmd, "dm", root, helperPath, "unused_app_repo_name", "unused_curr_link")
Robert Kroegerebfb62a2014-12-10 14:42:09 -08001277 pid := mgmttest.ReadPID(t, dms)
Robin Thellend875f2592014-12-02 10:29:37 -08001278 defer syscall.Kill(pid, syscall.SIGINT)
1279
1280 // Create the local server that the app uses to let us know it's ready.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001281 pingCh, cleanup := setupPingServer(t, ctx)
Robin Thellend875f2592014-12-02 10:29:37 -08001282 defer cleanup()
1283
1284 // Create the envelope for the first version of the app.
1285 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "appV1")
Bogdan Capritac25a48c2015-02-12 13:45:51 -08001286 envelope.Packages = map[string]application.SignedFile{
1287 "test": application.SignedFile{
gauthamt3dbef0c2015-02-10 12:26:02 -08001288 File: "realbin/testpkg",
1289 },
Bogdan Capritac25a48c2015-02-12 13:45:51 -08001290 "test2": application.SignedFile{
gauthamt3dbef0c2015-02-10 12:26:02 -08001291 File: "realbin/testfile",
1292 },
Bogdan Capritac25a48c2015-02-12 13:45:51 -08001293 "shark": application.SignedFile{
1294 File: "realbin/leftshark",
1295 },
Robin Thellend875f2592014-12-02 10:29:37 -08001296 }
1297
Bogdan Capritac25a48c2015-02-12 13:45:51 -08001298 // These are install-time overrides for packages.
1299 // Specifically, we override the 'shark' package and add a new
1300 // 'ball' package on top of what's specified in the envelope.
1301 packages := application.Packages{
1302 "shark": application.SignedFile{
1303 File: "realbin/rightshark",
1304 },
1305 "ball": application.SignedFile{
1306 File: "realbin/beachball",
1307 },
1308 }
Asim Shankar23dac322015-02-14 12:42:26 -08001309 // Device must be claimed before apps can be installed.
1310 claimDevice(t, ctx, "dm", "mydevice", noPairingToken)
Robin Thellend875f2592014-12-02 10:29:37 -08001311 // Install the app.
Bogdan Capritac25a48c2015-02-12 13:45:51 -08001312 appID := installApp(t, ctx, packages)
Robin Thellend875f2592014-12-02 10:29:37 -08001313
1314 // Start an instance of the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001315 startApp(t, ctx, appID)
Robin Thellend875f2592014-12-02 10:29:37 -08001316
1317 // Wait until the app pings us that it's ready.
1318 select {
1319 case <-pingCh:
1320 case <-time.After(pingTimeout):
1321 t.Fatalf("failed to get ping")
1322 }
1323
Bogdan Caprita2751d672015-02-06 13:43:47 -08001324 for _, c := range []struct {
1325 path, content string
1326 }{
1327 {
1328 filepath.Join("test", "hello.txt"),
1329 "Hello World!",
1330 },
1331 {
1332 "test2",
1333 "Goodbye World!",
1334 },
Bogdan Capritac25a48c2015-02-12 13:45:51 -08001335 {
1336 "shark",
1337 "Right shark",
1338 },
1339 {
1340 "ball",
1341 "Beach ball",
1342 },
Bogdan Caprita2751d672015-02-06 13:43:47 -08001343 } {
1344 // Ask the app to cat the file.
1345 file := filepath.Join("packages", c.path)
1346 name := "appV1"
1347 content, err := cat(ctx, name, file)
1348 if err != nil {
1349 t.Errorf("cat(%q, %q) failed: %v", name, file, err)
1350 }
1351 if expected := c.content; content != expected {
1352 t.Errorf("unexpected content: expected %q, got %q", expected, content)
1353 }
Robin Thellend875f2592014-12-02 10:29:37 -08001354 }
1355}
1356
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001357func listAndVerifyAssociations(t *testing.T, ctx *context.T, stub device.DeviceClientMethods, expected []device.Association) {
1358 assocs, err := stub.ListAssociations(ctx)
Robert Kroeger362ff892014-09-29 14:23:47 -07001359 if err != nil {
1360 t.Fatalf("ListAssociations failed %v", err)
1361 }
Robert Kroeger1cb4a0d2014-10-20 11:55:38 -07001362 compareAssociations(t, assocs, expected)
Robert Kroeger362ff892014-09-29 14:23:47 -07001363}
1364
Bogdan Caprita2b219362014-12-09 17:03:33 -08001365// TODO(rjkroege): Verify that associations persist across restarts once
1366// permanent storage is added.
Robert Kroeger362ff892014-09-29 14:23:47 -07001367func TestAccountAssociation(t *testing.T) {
Ankurf416ac52015-01-29 13:58:24 -08001368 ctx, shutdown := testutil.InitForTest()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001369 defer shutdown()
1370 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
1371
1372 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001373 defer deferFn()
Robert Kroeger362ff892014-09-29 14:23:47 -07001374
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -08001375 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Robert Kroeger362ff892014-09-29 14:23:47 -07001376 defer cleanup()
1377
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001378 // The two "processes"/contexts which will act as IPC clients to
1379 // the devicemanager process.
1380 selfCtx := ctx
1381 otherCtx, err := veyron2.SetPrincipal(ctx, tsecurity.NewPrincipal())
1382 if err != nil {
1383 t.Fatalf("Could not create other principal: %v", err)
1384 }
1385
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001386 // By default, selfCtx and otherCtx will have blessings generated based
1387 // on the username/machine name running this process. Since these
1388 // blessings will appear in test expecations, give them readable names.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001389 idp := tsecurity.NewIDProvider("root")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001390 if err := idp.Bless(veyron2.GetPrincipal(selfCtx), "self"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001391 t.Fatal(err)
1392 }
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001393 if err := idp.Bless(veyron2.GetPrincipal(otherCtx), "other"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001394 t.Fatal(err)
1395 }
1396
Ryan Brown05de9ec2015-02-03 14:27:37 -08001397 _, dms := mgmttest.RunShellCommand(t, sh, nil, deviceManagerCmd, "dm", root, "unused_helper", "unused_app_repo_name", "unused_curr_link")
Robert Kroegerebfb62a2014-12-10 14:42:09 -08001398 pid := mgmttest.ReadPID(t, dms)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001399 defer syscall.Kill(pid, syscall.SIGINT)
Robert Kroeger362ff892014-09-29 14:23:47 -07001400
Asim Shankar23dac322015-02-14 12:42:26 -08001401 deviceStub := device.DeviceClient("dm/device")
Bogdan Caprita2b219362014-12-09 17:03:33 -08001402 // Attempt to list associations on the device manager without having
Robert Kroeger362ff892014-09-29 14:23:47 -07001403 // claimed it.
Asim Shankar23dac322015-02-14 12:42:26 -08001404 if list, err := deviceStub.ListAssociations(otherCtx); err == nil {
1405 t.Fatalf("ListAssociations should fail on unclaimed device manager but did not: (%v, %v)", list, err)
Robert Kroeger362ff892014-09-29 14:23:47 -07001406 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001407
Bogdan Caprita2b219362014-12-09 17:03:33 -08001408 // self claims the device manager.
Asim Shankar23dac322015-02-14 12:42:26 -08001409 claimDevice(t, ctx, "dm", "alice", noPairingToken)
Robert Kroeger362ff892014-09-29 14:23:47 -07001410
1411 vlog.VI(2).Info("Verify that associations start out empty.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001412 listAndVerifyAssociations(t, selfCtx, deviceStub, []device.Association(nil))
Robert Kroeger362ff892014-09-29 14:23:47 -07001413
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001414 if err := deviceStub.AssociateAccount(selfCtx, []string{"root/self", "root/other"}, "alice_system_account"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001415 t.Fatalf("ListAssociations failed %v", err)
1416 }
1417 vlog.VI(2).Info("Added association should appear.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001418 listAndVerifyAssociations(t, selfCtx, deviceStub, []device.Association{
Robert Kroeger362ff892014-09-29 14:23:47 -07001419 {
1420 "root/self",
1421 "alice_system_account",
1422 },
1423 {
1424 "root/other",
1425 "alice_system_account",
1426 },
1427 })
1428
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001429 if err := deviceStub.AssociateAccount(selfCtx, []string{"root/self", "root/other"}, "alice_other_account"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001430 t.Fatalf("AssociateAccount failed %v", err)
1431 }
1432 vlog.VI(2).Info("Change the associations and the change should appear.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001433 listAndVerifyAssociations(t, selfCtx, deviceStub, []device.Association{
Robert Kroeger362ff892014-09-29 14:23:47 -07001434 {
1435 "root/self",
1436 "alice_other_account",
1437 },
1438 {
1439 "root/other",
1440 "alice_other_account",
1441 },
1442 })
1443
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001444 if err := deviceStub.AssociateAccount(selfCtx, []string{"root/other"}, ""); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001445 t.Fatalf("AssociateAccount failed %v", err)
1446 }
1447 vlog.VI(2).Info("Verify that we can remove an association.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001448 listAndVerifyAssociations(t, selfCtx, deviceStub, []device.Association{
Robert Kroeger362ff892014-09-29 14:23:47 -07001449 {
1450 "root/self",
1451 "alice_other_account",
1452 },
1453 })
1454}
1455
Bogdan Caprita2b219362014-12-09 17:03:33 -08001456// userName is a helper function to determine the system name that the test is
1457// running under.
Robert Kroeger362ff892014-09-29 14:23:47 -07001458func userName(t *testing.T) string {
1459 u, err := user.Current()
1460 if err != nil {
1461 t.Fatalf("user.Current() failed: %v", err)
1462 }
1463 return u.Username
1464}
1465
1466func TestAppWithSuidHelper(t *testing.T) {
Ankurf416ac52015-01-29 13:58:24 -08001467 ctx, shutdown := testutil.InitForTest()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001468 defer shutdown()
1469 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
1470
1471 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001472 defer deferFn()
1473
1474 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001475 envelope, cleanup := startMockRepos(t, ctx)
Robert Kroeger362ff892014-09-29 14:23:47 -07001476 defer cleanup()
Robert Kroeger362ff892014-09-29 14:23:47 -07001477
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -08001478 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Robert Kroeger362ff892014-09-29 14:23:47 -07001479 defer cleanup()
1480
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001481 // The two "processes"/runtimes which will act as IPC clients to
1482 // the devicemanager process.
1483 selfCtx := ctx
1484 otherCtx, err := veyron2.SetPrincipal(ctx, tsecurity.NewPrincipal())
1485 if err != nil {
1486 t.Fatalf("Could not create other principal: %v", err)
1487 }
Robert Kroeger362ff892014-09-29 14:23:47 -07001488
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001489 // By default, selfCtx and otherCtx will have blessings generated based
1490 // on the username/machine name running this process. Since these
1491 // blessings can appear in debugging output, give them recognizable
1492 // names.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001493 idp := tsecurity.NewIDProvider("root")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001494 if err := idp.Bless(veyron2.GetPrincipal(selfCtx), "self"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001495 t.Fatal(err)
1496 }
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001497 if err := idp.Bless(veyron2.GetPrincipal(otherCtx), "other"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001498 t.Fatal(err)
1499 }
1500
Bogdan Caprita2b219362014-12-09 17:03:33 -08001501 // Create a script wrapping the test target that implements suidhelper.
Bogdan Caprita962d5e02014-10-28 18:36:09 -07001502 helperPath := generateSuidHelperScript(t, root)
Robert Kroeger362ff892014-09-29 14:23:47 -07001503
Ryan Brown05de9ec2015-02-03 14:27:37 -08001504 _, dms := mgmttest.RunShellCommand(t, sh, nil, deviceManagerCmd, "-mocksetuid", "dm", root, helperPath, "unused_app_repo_name", "unused_curr_link")
Robert Kroegerebfb62a2014-12-10 14:42:09 -08001505 pid := mgmttest.ReadPID(t, dms)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001506 defer syscall.Kill(pid, syscall.SIGINT)
Asim Shankar23dac322015-02-14 12:42:26 -08001507 // Claim the devicemanager with selfCtx as root/self/alice
1508 claimDevice(t, selfCtx, "dm", "alice", noPairingToken)
Robert Kroeger362ff892014-09-29 14:23:47 -07001509
Asim Shankar23dac322015-02-14 12:42:26 -08001510 deviceStub := device.DeviceClient("dm/device")
Robert Kroeger362ff892014-09-29 14:23:47 -07001511
Bogdan Caprita2b219362014-12-09 17:03:33 -08001512 // Create the local server that the app uses to tell us which system
1513 // name the device manager wished to run it as.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001514 pingCh, cleanup := setupPingServer(t, ctx)
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001515 defer cleanup()
Robert Kroeger362ff892014-09-29 14:23:47 -07001516
Bogdan Caprita26929102014-11-07 11:56:56 -08001517 // Create an envelope for a first version of the app.
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001518 *envelope = envelopeFromShell(sh, []string{testEnvVarName + "=env-var"}, appCmd, "google naps", fmt.Sprintf("--%s=flag-val-envelope", testFlagName), "appV1")
Robert Kroeger362ff892014-09-29 14:23:47 -07001519
1520 // Install and start the app as root/self.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001521 appID := installApp(t, selfCtx)
Robert Kroeger362ff892014-09-29 14:23:47 -07001522
Bogdan Caprita2b219362014-12-09 17:03:33 -08001523 // Start an instance of the app but this time it should fail: we do not
1524 // have an associated uname for the invoking identity.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001525 startAppExpectError(t, selfCtx, appID, verror.NoAccess.ID)
Robert Kroeger362ff892014-09-29 14:23:47 -07001526
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001527 // Create an association for selfCtx
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001528 if err := deviceStub.AssociateAccount(selfCtx, []string{"root/self"}, testUserName); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001529 t.Fatalf("AssociateAccount failed %v", err)
1530 }
1531
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001532 instance1ID := startApp(t, selfCtx, appID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001533 verifyPingArgs(t, pingCh, testUserName, "flag-val-envelope", "env-var") // Wait until the app pings us that it's ready.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001534 stopApp(t, selfCtx, appID, instance1ID)
Robert Kroeger362ff892014-09-29 14:23:47 -07001535
1536 vlog.VI(2).Infof("other attempting to run an app without access. Should fail.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001537 startAppExpectError(t, otherCtx, appID, verror.NoAccess.ID)
Robert Kroeger362ff892014-09-29 14:23:47 -07001538
Robert Kroegeracc778b2014-11-03 17:17:21 -08001539 // Self will now let other also install apps.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001540 if err := deviceStub.AssociateAccount(selfCtx, []string{"root/other"}, testUserName); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001541 t.Fatalf("AssociateAccount failed %v", err)
1542 }
1543 // Add Start to the ACL list for root/other.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001544 newACL, _, err := deviceStub.GetACL(selfCtx)
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001545 if err != nil {
1546 t.Fatalf("GetACL failed %v", err)
1547 }
Asim Shankar68885192014-11-26 12:48:35 -08001548 newACL.Add("root/other", string(access.Write))
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001549 if err := deviceStub.SetACL(selfCtx, newACL, ""); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001550 t.Fatalf("SetACL failed %v", err)
1551 }
1552
Bogdan Caprita2b219362014-12-09 17:03:33 -08001553 // With the introduction of per installation and per instance ACLs,
1554 // while other now has administrator permissions on the device manager,
1555 // other doesn't have execution permissions for the app. So this will
1556 // fail.
Robert Kroegeracc778b2014-11-03 17:17:21 -08001557 vlog.VI(2).Infof("other attempting to run an app still without access. Should fail.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001558 startAppExpectError(t, otherCtx, appID, verror.NoAccess.ID)
Robert Kroegeracc778b2014-11-03 17:17:21 -08001559
1560 // But self can give other permissions to start applications.
1561 vlog.VI(2).Infof("self attempting to give other permission to start %s", appID)
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001562 newACL, _, err = appStub(appID).GetACL(selfCtx)
Robert Kroegeracc778b2014-11-03 17:17:21 -08001563 if err != nil {
1564 t.Fatalf("GetACL on appID: %v failed %v", appID, err)
1565 }
Asim Shankar68885192014-11-26 12:48:35 -08001566 newACL.Add("root/other", string(access.Read))
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001567 if err = appStub(appID).SetACL(selfCtx, newACL, ""); err != nil {
Robert Kroegeracc778b2014-11-03 17:17:21 -08001568 t.Fatalf("SetACL on appID: %v failed: %v", appID, err)
1569 }
1570
Robert Kroeger362ff892014-09-29 14:23:47 -07001571 vlog.VI(2).Infof("other attempting to run an app with access. Should succeed.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001572 instance2ID := startApp(t, otherCtx, appID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001573 verifyPingArgs(t, pingCh, testUserName, "flag-val-envelope", "env-var") // Wait until the app pings us that it's ready.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001574 suspendApp(t, otherCtx, appID, instance2ID)
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001575
1576 vlog.VI(2).Infof("Verify that Resume with the same systemName works.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001577 resumeApp(t, otherCtx, appID, instance2ID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001578 verifyPingArgs(t, pingCh, testUserName, "flag-val-envelope", "env-var") // Wait until the app pings us that it's ready.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001579 suspendApp(t, otherCtx, appID, instance2ID)
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001580
Robert Kroegeracc778b2014-11-03 17:17:21 -08001581 vlog.VI(2).Infof("Verify that other can install and run applications.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001582 otherAppID := installApp(t, otherCtx)
Robert Kroegeracc778b2014-11-03 17:17:21 -08001583
1584 vlog.VI(2).Infof("other attempting to run an app that other installed. Should succeed.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001585 instance4ID := startApp(t, otherCtx, otherAppID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001586 verifyPingArgs(t, pingCh, testUserName, "flag-val-envelope", "env-var") // Wait until the app pings us that it's ready.
Robert Kroegeracc778b2014-11-03 17:17:21 -08001587
1588 // Clean up.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001589 stopApp(t, otherCtx, otherAppID, instance4ID)
Robert Kroegeracc778b2014-11-03 17:17:21 -08001590
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001591 // Change the associated system name.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001592 if err := deviceStub.AssociateAccount(selfCtx, []string{"root/other"}, anotherTestUserName); err != nil {
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001593 t.Fatalf("AssociateAccount failed %v", err)
1594 }
1595
1596 vlog.VI(2).Infof("Show that Resume with a different systemName fails.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001597 resumeAppExpectError(t, otherCtx, appID, instance2ID, verror.NoAccess.ID)
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001598
1599 // Clean up.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001600 stopApp(t, otherCtx, appID, instance2ID)
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001601
1602 vlog.VI(2).Infof("Show that Start with different systemName works.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001603 instance3ID := startApp(t, otherCtx, appID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001604 verifyPingArgs(t, pingCh, anotherTestUserName, "flag-val-envelope", "env-var") // Wait until the app pings us that it's ready.
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001605
1606 // Clean up.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001607 stopApp(t, otherCtx, appID, instance3ID)
Robert Kroeger362ff892014-09-29 14:23:47 -07001608}
gauthamtcb03d132015-02-05 18:05:22 -08001609
1610func TestDownloadSignatureMatch(t *testing.T) {
1611 ctx, shutdown := testutil.InitForTest()
1612 defer shutdown()
1613 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
1614
1615 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
1616 defer deferFn()
1617
gauthamt3dbef0c2015-02-10 12:26:02 -08001618 binaryVON := "binary"
1619 pkgVON := naming.Join(binaryVON, "testpkg")
gauthamtcb03d132015-02-05 18:05:22 -08001620 defer startRealBinaryRepository(t, ctx, binaryVON)()
1621
gauthamt3dbef0c2015-02-10 12:26:02 -08001622 up := testutil.RandomBytes(testutil.Rand.Intn(5 << 20))
gauthamtcb03d132015-02-05 18:05:22 -08001623 mediaInfo := repository.MediaInfo{Type: "application/octet-stream"}
1624 sig, err := libbinary.Upload(ctx, naming.Join(binaryVON, "testbinary"), up, mediaInfo)
1625 if err != nil {
1626 t.Fatalf("Upload(%v) failed:%v", binaryVON, err)
1627 }
1628
gauthamt3dbef0c2015-02-10 12:26:02 -08001629 // Upload packages for this application
1630 tmpdir, err := ioutil.TempDir("", "test-package-")
1631 if err != nil {
1632 t.Fatalf("ioutil.TempDir failed: %v", err)
1633 }
1634 defer os.RemoveAll(tmpdir)
1635 pkgContents := testutil.RandomBytes(testutil.Rand.Intn(5 << 20))
1636 if err := ioutil.WriteFile(filepath.Join(tmpdir, "pkg.txt"), pkgContents, 0600); err != nil {
1637 t.Fatalf("ioutil.WriteFile failed: %v", err)
1638 }
1639 pkgSig, err := libbinary.UploadFromDir(ctx, pkgVON, tmpdir)
1640 if err != nil {
1641 t.Fatalf("libbinary.UploadFromDir failed: %v", err)
1642 }
1643
gauthamtcb03d132015-02-05 18:05:22 -08001644 // Start the application repository
1645 envelope, serverStop := startApplicationRepository(ctx)
1646 defer serverStop()
1647
1648 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
1649 defer cleanup()
1650
1651 // Create a script wrapping the test target that implements suidhelper.
1652 helperPath := generateSuidHelperScript(t, root)
1653
1654 // Set up the device manager. Since we won't do device manager updates,
1655 // don't worry about its application envelope and current link.
1656 _, dms := mgmttest.RunShellCommand(t, sh, nil, deviceManagerCmd, "dm", root, helperPath, "unused_app_repo_name", "unused_curr_link")
1657 pid := mgmttest.ReadPID(t, dms)
1658 defer syscall.Kill(pid, syscall.SIGINT)
Asim Shankar23dac322015-02-14 12:42:26 -08001659 claimDevice(t, ctx, "dm", "mydevice", noPairingToken)
gauthamtcb03d132015-02-05 18:05:22 -08001660
1661 publisher, err := veyron2.GetPrincipal(ctx).BlessSelf("publisher")
1662 if err != nil {
1663 t.Fatalf("Failed to generate publisher blessings:%v", err)
1664 }
1665 *envelope = application.Envelope{
Bogdan Capritac25a48c2015-02-12 13:45:51 -08001666 Binary: application.SignedFile{
1667 File: naming.Join(binaryVON, "testbinary"),
1668 Signature: *sig,
1669 },
gauthamtcb03d132015-02-05 18:05:22 -08001670 Publisher: security.MarshalBlessings(publisher),
Bogdan Capritac25a48c2015-02-12 13:45:51 -08001671 Packages: map[string]application.SignedFile{
1672 "pkg": application.SignedFile{
gauthamt3dbef0c2015-02-10 12:26:02 -08001673 File: pkgVON,
1674 Signature: *pkgSig,
1675 },
1676 },
gauthamtcb03d132015-02-05 18:05:22 -08001677 }
Bogdan Caprita047fa452015-02-11 10:18:04 -08001678 if _, err := appStub().Install(ctx, mockApplicationRepoName, device.Config{}, nil); err != nil {
gauthamtcb03d132015-02-05 18:05:22 -08001679 t.Fatalf("Failed to Install app:%v", err)
1680 }
gauthamt3dbef0c2015-02-10 12:26:02 -08001681
gauthamtcb03d132015-02-05 18:05:22 -08001682 // Verify that when the binary is corrupted, signature verification fails.
1683 up[0] = up[0] ^ 0xFF
1684 if err := libbinary.Delete(ctx, naming.Join(binaryVON, "testbinary")); err != nil {
1685 t.Fatalf("Delete(%v) failed:%v", binaryVON, err)
1686 }
1687 if _, err := libbinary.Upload(ctx, naming.Join(binaryVON, "testbinary"), up, mediaInfo); err != nil {
1688 t.Fatalf("Upload(%v) failed:%v", binaryVON, err)
1689 }
Bogdan Caprita047fa452015-02-11 10:18:04 -08001690 if _, err := appStub().Install(ctx, mockApplicationRepoName, device.Config{}, nil); !verror.Is(err, impl.ErrOperationFailed.ID) {
gauthamtcb03d132015-02-05 18:05:22 -08001691 t.Fatalf("Failed to verify signature mismatch for binary:%v", binaryVON)
1692 }
gauthamt3dbef0c2015-02-10 12:26:02 -08001693
1694 // Restore the binary and verify that installation succeeds.
1695 up[0] = up[0] ^ 0xFF
1696 if err := libbinary.Delete(ctx, naming.Join(binaryVON, "testbinary")); err != nil {
1697 t.Fatalf("Delete(%v) failed:%v", binaryVON, err)
1698 }
1699 if _, err := libbinary.Upload(ctx, naming.Join(binaryVON, "testbinary"), up, mediaInfo); err != nil {
1700 t.Fatalf("Upload(%v) failed:%v", binaryVON, err)
1701 }
Bogdan Caprita047fa452015-02-11 10:18:04 -08001702 if _, err := appStub().Install(ctx, mockApplicationRepoName, device.Config{}, nil); err != nil {
gauthamt3dbef0c2015-02-10 12:26:02 -08001703 t.Fatalf("Failed to Install app:%v", err)
1704 }
1705
1706 // Verify that when the package contents are corrupted, signature verification fails.
1707 pkgContents[0] = pkgContents[0] ^ 0xFF
1708 if err := libbinary.Delete(ctx, pkgVON); err != nil {
1709 t.Fatalf("Delete(%v) failed:%v", pkgVON, err)
1710 }
1711 if err := os.Remove(filepath.Join(tmpdir, "pkg.txt")); err != nil {
1712 t.Fatalf("Remove(%v) failed:%v", filepath.Join(tmpdir, "pkg.txt"), err)
1713 }
1714 if err := ioutil.WriteFile(filepath.Join(tmpdir, "pkg.txt"), pkgContents, 0600); err != nil {
1715 t.Fatalf("ioutil.WriteFile failed: %v", err)
1716 }
1717 if _, err = libbinary.UploadFromDir(ctx, pkgVON, tmpdir); err != nil {
1718 t.Fatalf("libbinary.UploadFromDir failed: %v", err)
1719 }
Bogdan Caprita047fa452015-02-11 10:18:04 -08001720 if _, err := appStub().Install(ctx, mockApplicationRepoName, device.Config{}, nil); !verror.Is(err, impl.ErrOperationFailed.ID) {
gauthamt3dbef0c2015-02-10 12:26:02 -08001721 t.Fatalf("Failed to verify signature mismatch for package:%v", pkgVON)
1722 }
gauthamtcb03d132015-02-05 18:05:22 -08001723}