blob: 0255ab3773cbbf42ab3103b0d38d4199dfb7c291 [file] [log] [blame]
Jiri Simsae63e07d2014-12-04 11:12:08 -08001package integration
2
3import (
4 "bufio"
James Ring65795102014-12-17 13:01:03 -08005 "bytes"
Jiri Simsae63e07d2014-12-04 11:12:08 -08006 "fmt"
James Ring65795102014-12-17 13:01:03 -08007 "io"
Jiri Simsae63e07d2014-12-04 11:12:08 -08008 "io/ioutil"
9 "os"
10 "os/exec"
11 "path"
12 "path/filepath"
James Ringb9a1dfd2015-01-07 17:08:29 -080013 "runtime"
Jiri Simsae63e07d2014-12-04 11:12:08 -080014 "strings"
James Ring65795102014-12-17 13:01:03 -080015 "syscall"
16 "testing"
Jiri Simsae63e07d2014-12-04 11:12:08 -080017 "time"
18
Jiri Simsa764efb72014-12-25 20:57:03 -080019 "v.io/core/veyron/lib/expect"
20 "v.io/core/veyron/lib/modules"
21 "v.io/core/veyron/lib/modules/core"
22 tsecurity "v.io/core/veyron/lib/testutil/security"
23 "v.io/core/veyron2/security"
Jiri Simsae63e07d2014-12-04 11:12:08 -080024)
25
James Ring65795102014-12-17 13:01:03 -080026// TestEnvironment represents a test environment. You should obtain
27// an instance with NewTestEnvironment. Typically, an end-to-end
28// test will begin with:
29// func TestFoo(t *testing.T) {
30// env := integration.NewTestEnvironment(t)
31// defer env.Cleanup()
32//
33// ...
34// }
35type TestEnvironment interface {
36 // Cleanup cleans up the environment and deletes all its artifacts.
37 Cleanup()
38
39 // BuildGoPkg expects a Go package path that identifies a "main"
40 // package and returns a TestBinary representing the newly built
41 // binary.
42 BuildGoPkg(path string) TestBinary
43
44 // RootMT returns the endpoint to the root mounttable for this test
45 // environment.
46 RootMT() string
47
48 // Principal returns the security principal of this environment.
49 Principal() security.Principal
50
51 // DebugShell drops the user into a debug shell. If there is no
52 // controlling TTY, DebugShell will emit a warning message and take no
53 // futher action.
54 DebugShell()
55
56 // TempFile creates a temporary file. Temporary files will be deleted
57 // by Cleanup.
58 TempFile() *os.File
James Ring23b54862015-01-07 11:54:48 -080059
60 // TempDir creates a temporary directory. Temporary directories and
61 // their contents will be deleted by Cleanup.
62 TempDir() string
James Ring65795102014-12-17 13:01:03 -080063}
64
65type TestBinary interface {
66 // Start starts the given binary with the given arguments.
67 Start(args ...string) Invocation
68
69 // Path returns the path to the binary.
70 Path() string
James Ring7edf1ca2015-01-08 12:32:29 -080071
72 // Returns a copy of this binary that, when Start is called, will use
73 // the given environment variables.
74 WithEnv(env []string) TestBinary
James Ring65795102014-12-17 13:01:03 -080075}
76
77type Invocation interface {
78 Stdin() io.Writer
79 Stdout() io.Reader
80 Stderr() io.Reader
81
82 // Output reads the invocation's stdout until EOF and then returns what
83 // was read as a string.
84 Output() string
85
86 // ErrorOutput reads the invocation's stderr until EOF and then returns
87 // what was read as a string.
88 ErrorOutput() string
89
James Ring72b14bd2014-12-29 14:26:54 -080090 // Sends the given signal to this invocation. It is up to the test
James Ring29c0e9d2015-01-05 10:12:50 -080091 // author to decide whether failure to deliver the signal is fatal to
92 // the test.
James Ring72b14bd2014-12-29 14:26:54 -080093 Kill(syscall.Signal) error
94
James Ring65795102014-12-17 13:01:03 -080095 // Wait waits for this invocation to finish. If either stdout or stderr
96 // is non-nil, any remaining unread output from those sources will be
James Ringe78c7da2015-01-06 15:59:37 -080097 // written to the corresponding writer. The returned error represents
98 // the exit status of the underlying command.
99 Wait(stdout, stderr io.Writer) error
100
101 // Wait waits for this invocation to finish. If either stdout or stderr
102 // is non-nil, any remaining unread output from those sources will be
103 // written to the corresponding writer. If the underlying command
104 // exited with anything but success (exit status 0), this function will
105 // cause the current test to fail.
106 WaitOrDie(stdout, stderr io.Writer)
James Ring65795102014-12-17 13:01:03 -0800107}
108
109type integrationTestEnvironment struct {
110 // The testing framework.
111 t *testing.T
112
113 // The shell to use to start commands.
114 shell *modules.Shell
115
116 // The environment's root security principal.
117 principal security.Principal
118
119 // Maps path to TestBinary.
120 builtBinaries map[string]*integrationTestBinary
121
122 mtHandle *modules.Handle
123 mtEndpoint string
124
125 tempFiles []*os.File
James Ring23b54862015-01-07 11:54:48 -0800126 tempDirs []string
James Ring65795102014-12-17 13:01:03 -0800127}
128
129type integrationTestBinary struct {
130 // The environment to which this binary belongs.
131 env *integrationTestEnvironment
132
133 // The path to the binary.
134 path string
135
James Ring7edf1ca2015-01-08 12:32:29 -0800136 // Environment variables that will be used when creating invocations
137 // via Start.
138 envVars []string
139
James Ring65795102014-12-17 13:01:03 -0800140 // The cleanup function to run when the binary exits.
141 cleanupFunc func()
142}
143
144type integrationTestBinaryInvocation struct {
145 // The environment to which this invocation belongs.
146 env *integrationTestEnvironment
147
148 // The handle to the process that was run when this invocation was started.
149 handle *modules.Handle
150}
151
152func (i *integrationTestBinaryInvocation) Stdin() io.Writer {
153 return (*i.handle).Stdin()
154}
155
156func (i *integrationTestBinaryInvocation) Stdout() io.Reader {
157 return (*i.handle).Stdout()
158}
159
James Ring72b14bd2014-12-29 14:26:54 -0800160func (i *integrationTestBinaryInvocation) Kill(sig syscall.Signal) error {
161 pid := (*i.handle).Pid()
162 (*i.handle).Shutdown(nil, nil)
163 i.env.t.Logf("sending signal %v to PID %d", sig, pid)
164 return syscall.Kill(pid, sig)
165}
166
James Ring65795102014-12-17 13:01:03 -0800167func readerToString(t *testing.T, r io.Reader) string {
168 buf := bytes.Buffer{}
169 _, err := buf.ReadFrom(r)
170 if err != nil {
171 t.Fatalf("ReadFrom() failed: %v", err)
172 }
173 return buf.String()
174}
175
176func (i *integrationTestBinaryInvocation) Output() string {
177 return readerToString(i.env.t, i.Stdout())
178}
179
180func (i *integrationTestBinaryInvocation) Stderr() io.Reader {
181 return (*i.handle).Stderr()
182}
183
184func (i *integrationTestBinaryInvocation) ErrorOutput() string {
185 return readerToString(i.env.t, i.Stderr())
186}
187
James Ringe78c7da2015-01-06 15:59:37 -0800188func (i *integrationTestBinaryInvocation) Wait(stdout, stderr io.Writer) error {
189 return (*i.handle).Shutdown(stdout, stderr)
190}
191
192func (i *integrationTestBinaryInvocation) WaitOrDie(stdout, stderr io.Writer) {
193 if err := i.Wait(stdout, stderr); err != nil {
James Ring7edf1ca2015-01-08 12:32:29 -0800194 i.env.t.Fatalf("FATAL: Wait() for pid %d failed: %v", (*i.handle).Pid(), err)
James Ring65795102014-12-17 13:01:03 -0800195 }
196}
197
198func (b *integrationTestBinary) cleanup() {
199 binaryDir := path.Dir(b.path)
200 b.env.t.Logf("cleaning up %s", binaryDir)
201 if err := os.RemoveAll(binaryDir); err != nil {
202 b.env.t.Logf("WARNING: RemoveAll(%s) failed (%v)", binaryDir, err)
203 }
204}
205
206func (b *integrationTestBinary) Path() string {
207 return b.path
208}
209
210func (b *integrationTestBinary) Start(args ...string) Invocation {
James Ringb9a1dfd2015-01-07 17:08:29 -0800211 locationString := ""
212 if _, file, line, ok := runtime.Caller(1); ok {
213 locationString = fmt.Sprintf("(requested at %s:%d) ", filepath.Base(file), line)
214 }
215 b.env.t.Logf("%sstarting %s %s", locationString, b.Path(), strings.Join(args, " "))
James Ring7edf1ca2015-01-08 12:32:29 -0800216 handle, err := b.env.shell.Start("exec", b.envVars, append([]string{b.Path()}, args...)...)
James Ring65795102014-12-17 13:01:03 -0800217 if err != nil {
218 b.env.t.Fatalf("Start(%v, %v) failed: %v", b.Path(), strings.Join(args, ", "), err)
219 }
James Ring72b14bd2014-12-29 14:26:54 -0800220 b.env.t.Logf("started PID %d\n", handle.Pid())
James Ring65795102014-12-17 13:01:03 -0800221 return &integrationTestBinaryInvocation{
222 env: b.env,
223 handle: &handle,
224 }
225}
226
James Ring7edf1ca2015-01-08 12:32:29 -0800227func (b *integrationTestBinary) WithEnv(env []string) TestBinary {
228 newBin := *b
229 newBin.envVars = env
230 return &newBin
231}
232
James Ring65795102014-12-17 13:01:03 -0800233func (e *integrationTestEnvironment) RootMT() string {
234 return e.mtEndpoint
235}
236
237func (e *integrationTestEnvironment) Principal() security.Principal {
238 return e.principal
239}
240
241func (e *integrationTestEnvironment) Cleanup() {
242 for _, binary := range e.builtBinaries {
243 binary.cleanupFunc()
244 }
245
246 for _, tempFile := range e.tempFiles {
247 e.t.Logf("cleaning up %s", tempFile.Name())
248 if err := tempFile.Close(); err != nil {
James Ring23b54862015-01-07 11:54:48 -0800249 e.t.Logf("WARNING: Close(%q) failed: %v", tempFile.Name(), err)
James Ring65795102014-12-17 13:01:03 -0800250 }
James Ring23b54862015-01-07 11:54:48 -0800251 if err := os.RemoveAll(tempFile.Name()); err != nil {
252 e.t.Logf("WARNING: RemoveAll(%q) failed: %v", tempFile.Name(), err)
253 }
254 }
255
256 for _, tempDir := range e.tempDirs {
257 e.t.Logf("cleaning up %s", tempDir)
258 if err := os.RemoveAll(tempDir); err != nil {
259 e.t.Logf("WARNING: RemoveAll(%q) failed: %v", tempDir, err)
James Ring65795102014-12-17 13:01:03 -0800260 }
261 }
262
263 if err := e.shell.Cleanup(os.Stdout, os.Stderr); err != nil {
264 e.t.Fatalf("WARNING: could not clean up shell (%v)", err)
265 }
266}
267
James Ring0d525c22014-12-30 12:03:31 -0800268func writeStringOrDie(t *testing.T, f *os.File, s string) {
James Ring0bad5672015-01-05 09:51:36 -0800269 if _, err := f.WriteString(s); err != nil {
James Ring0d525c22014-12-30 12:03:31 -0800270 t.Fatalf("Write() failed: %v", err)
271 }
272}
273
James Ring65795102014-12-17 13:01:03 -0800274func (e *integrationTestEnvironment) DebugShell() {
275 // Get the current working directory.
276 cwd, err := os.Getwd()
277 if err != nil {
278 e.t.Fatalf("Getwd() failed: %v", err)
279 }
280
281 // Transfer stdin, stdout, and stderr to the new process
282 // and also set target directory for the shell to start in.
283 dev := "/dev/tty"
James Ring0d525c22014-12-30 12:03:31 -0800284 fd, err := syscall.Open(dev, syscall.O_RDWR, 0)
James Ring65795102014-12-17 13:01:03 -0800285 if err != nil {
James Ring0d525c22014-12-30 12:03:31 -0800286 e.t.Logf("WARNING: Open(%v) failed, was asked to create a debug shell but cannot: %v", dev, err)
James Ring65795102014-12-17 13:01:03 -0800287 return
288 }
James Ring0d525c22014-12-30 12:03:31 -0800289 file := os.NewFile(uintptr(fd), dev)
James Ring65795102014-12-17 13:01:03 -0800290 attr := os.ProcAttr{
James Ring0d525c22014-12-30 12:03:31 -0800291 Files: []*os.File{file, file, file},
James Ring65795102014-12-17 13:01:03 -0800292 Dir: cwd,
293 }
294
295 // Start up a new shell.
James Ring0d525c22014-12-30 12:03:31 -0800296 writeStringOrDie(e.t, file, ">> Starting a new interactive shell\n")
297 writeStringOrDie(e.t, file, "Hit CTRL-D to resume the test\n")
James Ring65795102014-12-17 13:01:03 -0800298 if len(e.builtBinaries) > 0 {
James Ringff70b022015-01-06 18:02:58 -0800299 writeStringOrDie(e.t, file, "Built binaries:\n")
James Ring65795102014-12-17 13:01:03 -0800300 for _, value := range e.builtBinaries {
James Ringff70b022015-01-06 18:02:58 -0800301 writeStringOrDie(e.t, file, "\t"+value.Path()+"\n")
James Ring65795102014-12-17 13:01:03 -0800302 }
303 }
James Ring0d525c22014-12-30 12:03:31 -0800304 writeStringOrDie(e.t, file, fmt.Sprintf("Root mounttable endpoint: %s\n", e.RootMT()))
James Ring65795102014-12-17 13:01:03 -0800305
306 shellPath := "/bin/sh"
307 proc, err := os.StartProcess(shellPath, []string{}, &attr)
308 if err != nil {
309 e.t.Fatalf("StartProcess(%v) failed: %v", shellPath, err)
310 }
311
312 // Wait until user exits the shell
313 state, err := proc.Wait()
314 if err != nil {
315 e.t.Fatalf("Wait(%v) failed: %v", shellPath, err)
316 }
317
James Ring0d525c22014-12-30 12:03:31 -0800318 writeStringOrDie(e.t, file, fmt.Sprintf("<< Exited shell: %s\n", state.String()))
James Ring65795102014-12-17 13:01:03 -0800319}
320
321func (e *integrationTestEnvironment) BuildGoPkg(binary_path string) TestBinary {
322 e.t.Logf("building %s...", binary_path)
323 if cached_binary := e.builtBinaries[binary_path]; cached_binary != nil {
324 e.t.Logf("using cached binary for %s at %s.", binary_path, cached_binary.Path())
325 return cached_binary
326 }
327 built_path, cleanup, err := BuildPkgs([]string{binary_path})
328 if err != nil {
329 e.t.Fatalf("BuildPkgs() failed: %v", err)
330 return nil
331 }
332 output_path := path.Join(built_path, path.Base(binary_path))
333 e.t.Logf("done building %s, written to %s.", binary_path, output_path)
334 binary := &integrationTestBinary{
335 env: e,
James Ring7edf1ca2015-01-08 12:32:29 -0800336 envVars: nil,
James Ring65795102014-12-17 13:01:03 -0800337 path: output_path,
338 cleanupFunc: cleanup,
339 }
340 e.builtBinaries[binary_path] = binary
341 return binary
342}
343
344func (e *integrationTestEnvironment) TempFile() *os.File {
345 f, err := ioutil.TempFile("", "")
346 if err != nil {
347 e.t.Fatalf("TempFile() failed: %v", err)
348 }
349 e.t.Logf("created temporary file at %s", f.Name())
350 e.tempFiles = append(e.tempFiles, f)
351 return f
352}
353
James Ring23b54862015-01-07 11:54:48 -0800354func (e *integrationTestEnvironment) TempDir() string {
355 f, err := ioutil.TempDir("", "")
356 if err != nil {
357 e.t.Fatalf("TempDir() failed: %v", err)
358 }
359 e.t.Logf("created temporary directory at %s", f)
360 e.tempDirs = append(e.tempDirs, f)
361 return f
362}
363
James Ring65795102014-12-17 13:01:03 -0800364func NewTestEnvironment(t *testing.T) TestEnvironment {
365 t.Log("creating root principal")
366 principal := tsecurity.NewPrincipal("root")
367 shell, err := modules.NewShell(principal)
368 if err != nil {
369 t.Fatalf("NewShell() failed: %v", err)
370 }
371
372 t.Log("starting root mounttable...")
373 mtHandle, mtEndpoint, err := StartRootMT(shell)
374 if err != nil {
375 t.Fatalf("StartRootMT() failed: %v", err)
376 }
377 t.Logf("mounttable available at %s", mtEndpoint)
378
379 return &integrationTestEnvironment{
380 t: t,
381 principal: principal,
382 builtBinaries: make(map[string]*integrationTestBinary),
383 shell: shell,
384 mtHandle: &mtHandle,
385 mtEndpoint: mtEndpoint,
386 tempFiles: []*os.File{},
James Ring23b54862015-01-07 11:54:48 -0800387 tempDirs: []string{},
James Ring65795102014-12-17 13:01:03 -0800388 }
389}
390
Jiri Simsae63e07d2014-12-04 11:12:08 -0800391// BuildPkgs returns a path to a directory that contains the built
392// binaries for the given set of packages and a function that should
393// be invoked to clean up the build artifacts. Note that the clients
394// of this function should not modify the contents of this directory
395// directly and instead defer to the cleanup function.
396func BuildPkgs(pkgs []string) (string, func(), error) {
397 // The VEYRON_INTEGRATION_BIN_DIR environment variable can be
398 // used to identify a directory that multiple integration
399 // tests can use to share binaries. Whoever sets this
400 // environment variable is responsible for cleaning up the
401 // directory it points to.
402 binDir, cleanupFn := os.Getenv("VEYRON_INTEGRATION_BIN_DIR"), func() {}
403 if binDir == "" {
404 // If the aforementioned environment variable is not
405 // set, the given packages are built in a temporary
406 // directory, which the cleanup function removes.
407 tmpDir, err := ioutil.TempDir("", "")
408 if err != nil {
409 return "", nil, fmt.Errorf("TempDir() failed: %v", err)
410 }
411 binDir, cleanupFn = tmpDir, func() { os.RemoveAll(tmpDir) }
412 }
413 for _, pkg := range pkgs {
414 binFile := filepath.Join(binDir, path.Base(pkg))
415 if _, err := os.Stat(binFile); err != nil {
416 if !os.IsNotExist(err) {
417 return "", nil, err
418 }
Jiri Simsa764efb72014-12-25 20:57:03 -0800419 cmd := exec.Command("v23", "go", "build", "-o", filepath.Join(binDir, path.Base(pkg)), pkg)
Jiri Simsae63e07d2014-12-04 11:12:08 -0800420 if err := cmd.Run(); err != nil {
421 return "", nil, err
422 }
423 }
424 }
425 return binDir, cleanupFn, nil
426}
427
428// StartRootMT uses the given shell to start a root mount table and
429// returns a handle for the started command along with the object name
430// of the mount table.
431func StartRootMT(shell *modules.Shell) (modules.Handle, string, error) {
432 handle, err := shell.Start(core.RootMTCommand, nil, "--", "--veyron.tcp.address=127.0.0.1:0")
433 if err != nil {
434 return nil, "", err
435 }
James Ringc8aaaf62014-12-17 14:48:10 -0800436 s := expect.NewSession(nil, handle.Stdout(), 10*time.Second)
Cosmos Nicolaou28dabfc2014-12-15 22:51:07 -0800437 s.ExpectVar("PID")
438 if err := s.Error(); err != nil {
439 return nil, "", err
440 }
Jiri Simsae63e07d2014-12-04 11:12:08 -0800441 name := s.ExpectVar("MT_NAME")
442 if err := s.Error(); err != nil {
443 return nil, "", err
444 }
445 s.ExpectVar("MT_ADDR")
446 if err := s.Error(); err != nil {
447 return nil, "", err
448 }
Cosmos Nicolaou28dabfc2014-12-15 22:51:07 -0800449
Jiri Simsae63e07d2014-12-04 11:12:08 -0800450 return handle, name, nil
451}
452
453// StartServer starts a veyron server using the given binary and
454// arguments, waiting for the server to successfully mount itself in
455// the mount table.
456//
457// TODO(jsimsa,sadovsky): Use an instance of modules.Shell to start
458// and manage the server process to prevent leaking processes when
459// its parent terminates unexpectedly.
460func StartServer(bin string, args []string) (*os.Process, error) {
461 args = append(args, "-logtostderr", "-vmodule=publisher=2")
462 cmd := exec.Command(bin, args...)
463 outPipe, err := cmd.StderrPipe()
464 if err != nil {
465 return nil, err
466 }
Jiri Simsa75dda812014-12-08 15:47:19 -0800467 // TODO(jsimsa): Consider using the veyron exec library to
468 // facilitate coordination and communication between the
469 // parent and the child process.
Jiri Simsae63e07d2014-12-04 11:12:08 -0800470 if err := cmd.Start(); err != nil {
471 return nil, fmt.Errorf("%q failed: %v", strings.Join(cmd.Args, " "), err)
472 }
Jiri Simsa432cc2e2014-12-08 15:53:38 -0800473 // Wait for the server to mount both its tcp and ws endpoint.
Jiri Simsae63e07d2014-12-04 11:12:08 -0800474 ready := make(chan struct{}, 1)
475 go func() {
476 defer outPipe.Close()
477 scanner := bufio.NewScanner(outPipe)
Cosmos Nicolaouae8dd212014-12-13 23:43:08 -0800478 mounts := 0
Jiri Simsae63e07d2014-12-04 11:12:08 -0800479 for scanner.Scan() {
480 line := scanner.Text()
Cosmos Nicolaouae8dd212014-12-13 23:43:08 -0800481 // TODO(cnicolaou): find a better way of synchronizing with
482 // the child process, this is way too fragile.
Jiri Simsae63e07d2014-12-04 11:12:08 -0800483 if strings.Index(line, "ipc pub: mount") != -1 {
Cosmos Nicolaouae8dd212014-12-13 23:43:08 -0800484 mounts++
485 if mounts == 1 {
Jiri Simsa75dda812014-12-08 15:47:19 -0800486 close(ready)
487 }
Jiri Simsae63e07d2014-12-04 11:12:08 -0800488 }
489 }
490 if err := scanner.Err(); err != nil {
Jiri Simsa75dda812014-12-08 15:47:19 -0800491 fmt.Fprintf(os.Stderr, "Scan() failed: %v\n", err)
Jiri Simsae63e07d2014-12-04 11:12:08 -0800492 }
493 }()
494 select {
495 case <-ready:
496 return cmd.Process, nil
Cosmos Nicolaou80d22e92014-12-10 08:08:17 -0800497 case <-time.After(time.Minute):
Jiri Simsae63e07d2014-12-04 11:12:08 -0800498 cmd.Process.Kill()
Jiri Simsa75dda812014-12-08 15:47:19 -0800499 return nil, fmt.Errorf("timed out waiting for %q to mount itself", strings.Join(cmd.Args, " "))
Jiri Simsae63e07d2014-12-04 11:12:08 -0800500 }
501}