blob: d1c64b41eeb706f88b159b8f20889a7e49a501a2 [file] [log] [blame]
Jiri Simsad7616c92015-03-24 23:44:30 -07001// Copyright 2015 The Vanadium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style
3// license that can be found in the LICENSE file.
4
Todd Wang8c4e5cc2015-04-09 11:30:52 -07005// Package modules implements a mechanism for running commonly used services as
6// subprocesses, and client functionality for accessing those services. Such
7// services and functions are collectively called 'commands' and are managed by
8// a 'Registry'. The Shell is analagous to the UNIX shell and maintains a key,
9// value store of environment variables and config settings that are accessible
10// to the commands that it hosts. Simple variable expansion is supported.
Cosmos Nicolaou62613842014-08-25 21:57:37 -070011//
Cosmos Nicolaou42a17362015-03-10 16:40:18 -070012// Four types of 'commands' may be invoked via a Shell.
Cosmos Nicolaou62613842014-08-25 21:57:37 -070013//
Cosmos Nicolaou42a17362015-03-10 16:40:18 -070014// - functions of type Shell.Main as subprocesses via fork/exec
15// - functions of type Shell.Main as functions within the current process
16// - arbitrary non-Vanadium commands available on the underlying
17// operating system such as '/bin/cp', 'bash' etc.
18// - arbtirary Vanadium commands available on the underlying
19// operating system such as precompiled Vanadium services.
Cosmos Nicolaou62613842014-08-25 21:57:37 -070020//
Cosmos Nicolaou42a17362015-03-10 16:40:18 -070021// The first two types require that the function to be executed is compiled
22// into the binary executing the calls to the Shell. These functions
23// are registered with a single, per-process, registry.
Cosmos Nicolaou62613842014-08-25 21:57:37 -070024// The signature of the function that implements the command is the
25// same for both types of command and is defined by the Main function type.
26// In particular stdin, stdout and stderr are provided as parameters, as is
27// a map representation of the shell's environment.
Cosmos Nicolaou9afe1202014-09-19 13:45:57 -070028//
Cosmos Nicolaou42a17362015-03-10 16:40:18 -070029// The second two types allow for arbitrary binaries to be executed. The
30// distinction between a Vanadium and non-Vanadium command is that the
31// Vanadium command implements the protocol used by v.io/x/ref/lib/exec
32// package to synchronise between the parent and child processes and to share
33// information such as the ConfigKey key,value store supported by the Shell,
Cosmos Nicolaou52e9a222015-03-16 21:57:16 -070034// a shared secret, shared file descriptors etc.
35//
36// When the exec protocol is not used the only form of communication with the
37// child processes are environment variables and command line flags and any
38// shared file descriptors explicitly created by the parent process and expected
39// by the child process; the Start method will not create any additional
40// file descriptors.
Cosmos Nicolaou42a17362015-03-10 16:40:18 -070041//
42// The registry provides the following functions:
43// - RegisterChild: generally called from an init function to register a
44// shell.Main to be executed in a subprocess by fork/exec'ing the calling
45// process.
46// - Dispatch: which must be called in the child process to lookup the
47// requested function in the registry and to invoke it. This will typically
48// be called from a TestMain. modules.IsModulesChildProcess can be used
49// to determine if the calling process is a child started via this package.
50// - DispatchAndExit: essentially the same as Dispatch but intended to be
51// called as the first thing in a main function.
52// - RegisterFunction: for an in-process function that will be invoked
53// via function call.
54//
55// The v23 tool can automate generation of TestMain and calls to RegisterChild,
56// and RegisterFunction. Adding the comment below to a test file will
57// generate the appropriate code.
58//
59// //go:generate v23 test generate .
60//
61// Use 'v23 test generate --help' to get a complete explanation.
62//
63// In all cases commands are started by invoking the StartWithOpts method
64// on the Shell with the name of the command to run. An instance of the Handle
65// interface is returned which can be used to interact with the function
66// or subprocess, and in particular to read/write data from/to it using io
67// channels that follow the stdin, stdout, stderr convention. The StartOpts
68// struct is used to control the detailed behaviour of each such invocation.
69// Various helper functions are provided both for creating appropriate
70// instances of StartOpts and for common uses of StartWithOpts.
71//
72// Each successful call to StartWithOpts returns a handle representing
73// the running command. This handle can be used to gain access to that
74// command's stdin, stdout, stderr and to request or synchronize with
75// its termination via the Shutdown method. The Shutdown method can
76// optionally be used to read any remaining output from the commands stdout
77// and stderr.
78// The Shell maintains a record of all such handles and will call Shutdown
79// on them in LIFO order when the Shell's Cleanup method is called.
80//
81// A simple protocol must be followed by all modules.Main commands,
82// in particular, they should wait for their stdin stream to be closed
83// before exiting. The caller can then coordinate with any command by writing
84// to that stdin stream and reading responses from the stdout stream, and it
85// can close stdin when it's ready for the command to exit using the
86// CloseStdin method on the command's handle. Any binary or script that
87// follows this protocol can be used as well.
88//
Ryan Browna08a2212015-01-15 15:40:10 -080089// By default, every Shell created by NewShell starts a security agent
Cosmos Nicolaou42a17362015-03-10 16:40:18 -070090// to manage principals for child processes. These default credentials
91// can be overridden by passing a nil context to NewShell then specifying
92// VeyronCredentials in the environment provided as a parameter to the
93// StartWithOpts method. It is also possible to specify custom credentials
94// via StartOpts.
95//
96// Interacting with Commands:
97//
98// Handle.Stdout(), Stdin(), Stderr():
99// StartWithOpts returns a Handle which can be used to interact with the
100// running command. In particular, its Stdin() and Stdout() methods give
101// access to the running process' corresponding stdin and stdout and hence
102// can be used to communicate with it. Stderr is handled differently and is
103// configured so that the child's stderr is written to a log file rather
104// than a pipe. This is in order to maximise the liklihood of capturing
105// stderr output from a crashed child process.
106//
107// Handle.Shutdown(stdout, stderr io.Writer):
108// The Shutdown method is used to gracefully shutdown a command and to
109// synchronise with its termination. In particular, Shutdown can be used
110// to read any unread output from the command's stdout and stderr. Note that
111// since Stderr is buffered to a file, Shutdown is able to return the entire
112// contents of that file. This is useful for debugging misbehaving/crashing
113// child processes.
114//
115// Shell.Cleanup(stdout, stderr io.Writer):
116// The Shell keeps track of all Handles that it has issued and in particular
117// if Shutdown (or Forget) have not been called, it will call Shutdown for
118// each such Handle in LIFO order. This ensures that all commands will be
119// Shutdown even if the developer does not explicitly take care to do so
120// for every invocation.
121//
122// Pipes:
123// StartWithOpts allows the caller to pass an io.Reader to the command
124// (StartOpts.Stdin) for it to read from, rather than creating a new pipe
125// internally. This makes it possible to connect the output of one
126// command to the input of another directly.
127//
128// Command Line Arguments:
129// The arguments passed in calls to Start are appended to any system required
130// ones (e.g. for propagating test timeouts, verbosity etc) and the child
131// process will call the command with the result of flag.Args(). In this way
132// the caller can provide flags used by libraries in the child process
133// as well as those specific to the command and the command will only
134// receive the args specific to it. The usual "--" convention can be
135// used to override this default behaviour.
136//
137// Caveats:
138//
139// Handle.Shutdown assumes that the child command/process will terminate
140// when its stdin stream is closed. This assumption is unlikely to be valid
141// for 'external' commands (e.g. /bin/cp) and in these cases Kill or some other
142// application specific mechanism will need to be used.
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700143package modules
144
145import (
Cosmos Nicolaou52e9a222015-03-16 21:57:16 -0700146 "errors"
Cosmos Nicolaoud4f00562014-11-17 20:35:48 -0800147 "fmt"
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700148 "io"
Cosmos Nicolaou9afe1202014-09-19 13:45:57 -0700149 "io/ioutil"
150 "os"
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700151 "sync"
Ryan Browna08a2212015-01-15 15:40:10 -0800152 "syscall"
Cosmos Nicolaoue5b41502014-10-29 22:55:09 -0700153 "time"
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700154
Jiri Simsa6ac95222015-02-23 16:11:49 -0800155 "v.io/v23"
156 "v.io/v23/context"
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700157 "v.io/v23/security"
Asim Shankar59b8b692015-03-30 01:23:36 -0700158 "v.io/x/ref/envvar"
Jiri Simsaffceefa2015-02-28 11:03:34 -0800159 "v.io/x/ref/lib/exec"
Todd Wang88509682015-04-10 10:28:24 -0700160 "v.io/x/ref/services/agent/agentlib"
Todd Wangb3511492015-04-07 23:32:34 -0700161 "v.io/x/ref/services/agent/keymgr"
Cosmos Nicolaou1381f8a2015-03-13 09:40:34 -0700162 "v.io/x/ref/test/expect"
Ankur9f957942014-11-24 16:34:18 -0800163)
164
165const (
166 shellBlessingExtension = "test-shell"
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700167
168 defaultStartTimeout = time.Minute
169 defaultShutdownTimeout = time.Minute
170 defaultExpectTimeout = time.Minute
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700171)
172
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700173var defaultStartOpts = StartOpts{
174 StartTimeout: defaultStartTimeout,
175 ShutdownTimeout: defaultShutdownTimeout,
176 ExpectTimeout: defaultExpectTimeout,
177 ExecProtocol: true,
178}
179
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700180// Shell represents the context within which commands are run.
181type Shell struct {
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700182 mu sync.Mutex
183 env map[string]string
184 handles map[Handle]struct{}
185 lifoHandles []Handle
186 defaultStartOpts StartOpts
Ryan Browna08a2212015-01-15 15:40:10 -0800187 // tmpCredDir is the temporary directory created by this
188 // shell. This must be removed when the shell is cleaned up.
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700189 tempCredDir string
190 config exec.Config
191 principal security.Principal
192 agent *keymgr.Agent
193 ctx *context.T
194 sessionVerbosity bool
195 cancelCtx func()
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700196}
197
Ryan Browna08a2212015-01-15 15:40:10 -0800198// NewShell creates a new instance of Shell.
Ankur50ab9882015-02-17 12:17:17 -0800199//
Ryan Browna08a2212015-01-15 15:40:10 -0800200// If ctx is non-nil, the shell will manage Principals for child processes.
Ankur50ab9882015-02-17 12:17:17 -0800201//
202// If p is non-nil, any child process created has its principal blessed
203// by the default blessings of 'p', Else any child process created has its
204// principal blessed by the default blessings of ctx's principal.
Cosmos Nicolaou9e909842015-03-17 11:58:59 -0700205//
206// If verbosity is true additional debugging info will be displayed,
207// in particular by the Shutdown.
208//
209// If t is non-nil, then the expect Session created for every invocation
210// will be constructed with that value of t unless overridden by a
211// StartOpts provided to that invocation. Providing a non-nil value of
212// t enables expect.Session to call t.Error, Errorf and Log.
213func NewShell(ctx *context.T, p security.Principal, verbosity bool, t expect.Testing) (*Shell, error) {
Cosmos Nicolaou9afe1202014-09-19 13:45:57 -0700214 sh := &Shell{
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700215 env: make(map[string]string),
216 handles: make(map[Handle]struct{}),
217 config: exec.NewConfig(),
218 defaultStartOpts: defaultStartOpts,
Cosmos Nicolaou9e909842015-03-17 11:58:59 -0700219 sessionVerbosity: verbosity,
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700220 }
Cosmos Nicolaou9e909842015-03-17 11:58:59 -0700221 sh.defaultStartOpts = sh.defaultStartOpts.WithSessions(t, time.Minute)
Ryan Browna08a2212015-01-15 15:40:10 -0800222 if ctx == nil {
Cosmos Nicolaou344cc4a2014-11-26 15:38:43 -0800223 return sh, nil
Cosmos Nicolaou9afe1202014-09-19 13:45:57 -0700224 }
Ryan Browna08a2212015-01-15 15:40:10 -0800225 var err error
226 ctx, sh.cancelCtx = context.WithCancel(ctx)
Todd Wangad492042015-04-17 15:58:40 -0700227 if ctx, err = v23.WithNewStreamManager(ctx); err != nil {
Ryan Browna08a2212015-01-15 15:40:10 -0800228 return nil, err
229 }
230 sh.ctx = ctx
231
Cosmos Nicolaou185c0c62015-04-13 21:22:43 -0700232 if sh.tempCredDir, err = ioutil.TempDir("", "shell_credentials-"); err != nil {
Ryan Browna08a2212015-01-15 15:40:10 -0800233 return nil, err
234 }
235 if sh.agent, err = keymgr.NewLocalAgent(ctx, sh.tempCredDir, nil); err != nil {
236 return nil, err
237 }
Ryan Browna08a2212015-01-15 15:40:10 -0800238 sh.principal = p
Ankur50ab9882015-02-17 12:17:17 -0800239 if sh.principal == nil {
Jiri Simsa6ac95222015-02-23 16:11:49 -0800240 sh.principal = v23.GetPrincipal(ctx)
Cosmos Nicolaou344cc4a2014-11-26 15:38:43 -0800241 }
Cosmos Nicolaou344cc4a2014-11-26 15:38:43 -0800242 return sh, nil
Cosmos Nicolaou9afe1202014-09-19 13:45:57 -0700243}
244
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700245// DefaultStartOpts returns the current StartOpts stored with the Shell.
246func (sh *Shell) DefaultStartOpts() StartOpts {
247 return sh.defaultStartOpts
248}
249
250// SetDefaultStartOpts sets the default StartOpts stored with the Shell.
251func (sh *Shell) SetDefaultStartOpts(opts StartOpts) {
252 sh.defaultStartOpts = opts
253}
254
Ryan Brown61d69382015-02-25 11:13:39 -0800255// CustomCredentials encapsulates a Principal which can be shared with
256// one or more processes run by a Shell.
257type CustomCredentials struct {
258 p security.Principal
259 agent *keymgr.Agent
260 id []byte
261}
Ankur50ab9882015-02-17 12:17:17 -0800262
Ryan Brown61d69382015-02-25 11:13:39 -0800263// Principal returns the Principal.
264func (c *CustomCredentials) Principal() security.Principal {
265 return c.p
266}
267
268// File returns a socket which can be used to connect to the agent
269// managing this principal. Typically you would pass this to a child
270// process.
271func (c *CustomCredentials) File() (*os.File, error) {
272 return c.agent.NewConnection(c.id)
273}
274
275func dup(conn *os.File) (int, error) {
Bogdan Capritabb37c542015-01-22 10:21:57 -0800276 syscall.ForkLock.RLock()
Ryan Browna08a2212015-01-15 15:40:10 -0800277 fd, err := syscall.Dup(int(conn.Fd()))
Ankur9f957942014-11-24 16:34:18 -0800278 if err != nil {
Bogdan Capritabb37c542015-01-22 10:21:57 -0800279 syscall.ForkLock.RUnlock()
Ryan Brown61d69382015-02-25 11:13:39 -0800280 return -1, err
Ryan Browna08a2212015-01-15 15:40:10 -0800281 }
282 syscall.CloseOnExec(fd)
Bogdan Capritabb37c542015-01-22 10:21:57 -0800283 syscall.ForkLock.RUnlock()
Ryan Brown61d69382015-02-25 11:13:39 -0800284 return fd, nil
285}
286
Asim Shankar34fb2492015-03-12 10:25:46 -0700287// NewCustomCredentials creates a new Principal for StartWithOpts..
Ryan Brown61d69382015-02-25 11:13:39 -0800288// Returns nil if the shell is not managing principals.
289func (sh *Shell) NewCustomCredentials() (cred *CustomCredentials, err error) {
290 // Create child principal.
291 if sh.ctx == nil {
292 return nil, nil
293 }
294 id, conn, err := sh.agent.NewPrincipal(sh.ctx, true)
295 if err != nil {
296 return nil, err
297 }
298 fd, err := dup(conn)
299 conn.Close()
300 if err != nil {
301 return nil, err
302 }
Ryan Brown7f950a82015-04-20 18:08:39 -0700303 ep, err := v23.NewEndpoint(agentlib.AgentEndpoint(fd))
304 if err != nil {
305 syscall.Close(fd)
306 return nil, err
307 }
308 p, err := agentlib.NewAgentPrincipal(sh.ctx, ep, v23.GetClient(sh.ctx))
Ryan Browna08a2212015-01-15 15:40:10 -0800309 if err != nil {
Bogdan Caprita6613fc42015-01-28 11:54:23 -0800310 syscall.Close(fd)
Ryan Browna08a2212015-01-15 15:40:10 -0800311 return nil, err
Ankur9f957942014-11-24 16:34:18 -0800312 }
Ryan Brown61d69382015-02-25 11:13:39 -0800313 return &CustomCredentials{p, sh.agent, id}, nil
314}
315
Asim Shankar34fb2492015-03-12 10:25:46 -0700316// NewChildCredentials creates a new principal, served via the security agent
317// whose blessings are an extension of this shell's principal (with the
318// provided caveats).
319//
320// All processes started by this shell will recognize the credentials created
321// by this call.
322//
323// Returns nil if the shell is not managing principals.
324//
325// Since the Shell type is intended for tests, it is not required to provide
326// caveats. In production scenarios though, one must think long and hard
327// before blessing anothing principal without any caveats.
328func (sh *Shell) NewChildCredentials(extension string, caveats ...security.Caveat) (c *CustomCredentials, err error) {
Ryan Brown61d69382015-02-25 11:13:39 -0800329 creds, err := sh.NewCustomCredentials()
330 if creds == nil {
331 return nil, err
332 }
Asim Shankar34fb2492015-03-12 10:25:46 -0700333 parent := sh.principal
334 child := creds.p
335 if len(caveats) == 0 {
336 caveats = []security.Caveat{security.UnconstrainedUse()}
337 }
Ankur50ab9882015-02-17 12:17:17 -0800338
339 // Bless the child principal with blessings derived from the default blessings
340 // of shell's principal.
Asim Shankar34fb2492015-03-12 10:25:46 -0700341 blessings, err := parent.Bless(child.PublicKey(), parent.BlessingStore().Default(), extension, caveats[0], caveats[1:]...)
Ankur9f957942014-11-24 16:34:18 -0800342 if err != nil {
Ryan Browna08a2212015-01-15 15:40:10 -0800343 return nil, err
Ankur9f957942014-11-24 16:34:18 -0800344 }
Asim Shankar34fb2492015-03-12 10:25:46 -0700345 if err := child.BlessingStore().SetDefault(blessings); err != nil {
Ryan Browna08a2212015-01-15 15:40:10 -0800346 return nil, err
Ankur9f957942014-11-24 16:34:18 -0800347 }
Asim Shankar34fb2492015-03-12 10:25:46 -0700348 if _, err := child.BlessingStore().Set(blessings, security.AllPrincipals); err != nil {
Ryan Browna08a2212015-01-15 15:40:10 -0800349 return nil, err
Ankur9f957942014-11-24 16:34:18 -0800350 }
Asim Shankar34fb2492015-03-12 10:25:46 -0700351 if err := child.AddToRoots(blessings); err != nil {
Ryan Browna08a2212015-01-15 15:40:10 -0800352 return nil, err
Ankur9f957942014-11-24 16:34:18 -0800353 }
354
Ryan Brown61d69382015-02-25 11:13:39 -0800355 return creds, nil
Ankur9f957942014-11-24 16:34:18 -0800356}
357
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700358type Main func(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error
359
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700360// String returns a string representation of the Shell, which is a
Cosmos Nicolaouaddf4832014-09-10 21:36:54 -0700361// list of the commands currently available in the shell.
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700362func (sh *Shell) String() string {
Cosmos Nicolaoud4f00562014-11-17 20:35:48 -0800363 return registry.help("")
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700364}
365
366// Help returns the help message for the specified command.
367func (sh *Shell) Help(command string) string {
Cosmos Nicolaoud4f00562014-11-17 20:35:48 -0800368 return registry.help(command)
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700369}
370
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700371// Start is shorthand for StartWithOpts(sh.DefaultStartOpts(), ...)
372func (sh *Shell) Start(name string, env []string, args ...string) (Handle, error) {
373 return sh.StartWithOpts(sh.DefaultStartOpts(), env, name, args...)
374}
375
376// StartOpts represents the options that can be passed to the
377// StartWithOpts method.
378type StartOpts struct {
379 // Error is set when creating/intializing instances of StartOpts
380 // via one of the factory methods and returned when StartWithOpts
381 // is called. This allows usage of of the form:
382 //
383 // err := sh.StartWithOpts(sh.DefaultStartOpts()...)
384 //
385 // as opposed to:
386 //
387 // opts, err := sh.DefaultStartOpts(....)
388 // if err != nil {
389 // panic(...)
390 // }
391 // sh.StartWithOpts(opts, ....)
392 Error error
393
394 // Stdin, if non-nil, will be used as the stdin for the child process.
395 // If this option is set, then the Stdin() method on the returned Handle
396 // will return nil. The client of this API maintains ownership of stdin
397 // and must close it, i.e. the shell will not do so.
398 Stdin io.Reader
399 // Credentials, if non-nil, will be used as the credentials for the
400 // child process. If the creds are nil or the shell is not managing
401 // principals, the credentials are ignored.
402 Credentials *CustomCredentials
403 // ExecProtocol indicates whether the child process is expected to
404 // implement the v.io/x.ref/lib/exec parent/child protocol.
405 // It should be set to false when running non-vanadium commands
406 // (e.g. /bin/cp).
407 ExecProtocol bool
408 // External indicates if the command is an external process rather than
409 // a Shell.Main function.
410 External bool
411 // StartTimeout specifies the amount of time to wait for the
412 // child process to signal its correct intialization for Vanadium
413 // processes that implement the exec parent/child protocol. It has no
414 // effect if External is set to true.
415 StartTimeout time.Duration
416 // ShutdownTimeout specifics the amount of time to wait for the child
417 // process to exit when the Shutdown method is called on that
418 // child's handle.
419 ShutdownTimeout time.Duration
420 // ExpectTesting is used when creating an instance of expect.Session
421 // to embed in Handle.
422 ExpectTesting expect.Testing
423 // ExpectTimeout is the timeout to use with expect.Session.
424 ExpectTimeout time.Duration
425}
426
427// DefaultStartOpts returns an instance of Startops with the current default
428// values. The defaults have values for timeouts, no credentials
429// (StartWithOpts will then create credentials each time it is called),
430// and with ExecProtocol set to true.
431// This is expected to be the common use case.
432func DefaultStartOpts() StartOpts {
433 return defaultStartOpts
434}
435
436// WithCustomCredentials returns an instance of StartOpts with the specified
Asim Shankar34fb2492015-03-12 10:25:46 -0700437// credentials.
438//
439// All other options are set to the current defaults.
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700440func (opts StartOpts) WithCustomCredentials(creds *CustomCredentials) StartOpts {
441 opts.Credentials = creds
442 return opts
443}
444
445// WithSessions returns a copy of opts with the specified expect.Testing and
446// associated timeout.
447func (opts StartOpts) WithSessions(t expect.Testing, timeout time.Duration) StartOpts {
448 opts.ExpectTesting = t
449 opts.ExpectTimeout = timeout
450 return opts
451}
452
453// WithStdin returns a copy of opts with the specified Stdin io.Reader.
454func (opts StartOpts) WithStdin(stdin io.Reader) StartOpts {
455 opts.Stdin = stdin
456 return opts
457}
458
459// NoExecCommand returns a copy of opts with the External option
460// enabled and ExecProtocol disabled.
461func (opts StartOpts) NoExecCommand() StartOpts {
462 opts.External = true
463 opts.ExecProtocol = false
464 return opts
465}
466
467// ExternalCommand returns a copy of StartOpts with the
468// External option enabled.
469func (opts StartOpts) ExternalCommand() StartOpts {
470 opts.External = true
471 return opts
472}
473
Cosmos Nicolaou52e9a222015-03-16 21:57:16 -0700474var (
475 ErrNotRegistered = errors.New("command not registered")
476 ErrNoExecAndCustomCreds = errors.New("ExecProtocol set to false but this invocation is attempting to use custome credentials")
477)
478
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700479// StartWithOpts starts the specified command according to the supplied
480// StartOpts and returns a Handle which can be used for interacting with
481// that command.
Ankur9f957942014-11-24 16:34:18 -0800482//
483// The environment variables for the command are set by merging variables
484// from the OS environment, those in this Shell and those provided as a
485// parameter to it. In general, it prefers values from its parameter over
486// those from the Shell, over those from the OS. However, the VeyronCredentials
Ryan Brown10a4ade2015-02-10 13:17:18 -0800487// and agent FdEnvVar variables will never use the value from the Shell or OS.
Ankur9f957942014-11-24 16:34:18 -0800488//
Ryan Brown10a4ade2015-02-10 13:17:18 -0800489// If the shell is managing principals, the command is configured to
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700490// connect to the shell's agent. Custom credentials may be specified
491// via StartOpts. If the shell is not managing principals, set
Ryan Brown10a4ade2015-02-10 13:17:18 -0800492// the VeyronCredentials environment variable in the 'env' parameter.
Cosmos Nicolaou612ad382014-10-29 19:41:35 -0700493//
494// The Shell tracks all of the Handles that it creates so that it can shut
Cosmos Nicolaoue5b41502014-10-29 22:55:09 -0700495// them down when asked to. The returned Handle may be non-nil even when an
496// error is returned, in which case it may be used to retrieve any output
497// from the failed command.
Cosmos Nicolaou612ad382014-10-29 19:41:35 -0700498//
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700499// StartWithOpts will return a valid handle for errors that occur during the
500// child processes startup process. It is thus possible to call Shutdown
501// to obtain the error output. Handle will be nil if the error is due to
502// some other reason, such as failure to create pipes/files before starting
503// the child process. A common use will therefore be:
Ryan Brown61d69382015-02-25 11:13:39 -0800504//
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700505// h, err := sh.Start(env, "/bin/echo", "hello")
506// if err != nil {
507// if h != nil {
508// h.Shutdown(nil,os.Stderr)
509// }
510// t.Fatal(err)
511// }
512func (sh *Shell) StartWithOpts(opts StartOpts, env []string, name string, args ...string) (Handle, error) {
513 if opts.Error != nil {
514 return nil, opts.Error
515 }
Cosmos Nicolaou52e9a222015-03-16 21:57:16 -0700516
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700517 var desc *commandDesc
518 if opts.External {
519 desc = registry.getExternalCommand(name)
520 } else if desc = registry.getCommand(name); desc == nil {
Cosmos Nicolaou52e9a222015-03-16 21:57:16 -0700521 return nil, ErrNotRegistered
James Ring9d9489d2015-01-27 15:48:07 -0800522 }
Cosmos Nicolaou52e9a222015-03-16 21:57:16 -0700523
524 if !opts.ExecProtocol && opts.Credentials != nil {
525 return nil, ErrNoExecAndCustomCreds
526 }
527
528 if sh.ctx != nil && opts.ExecProtocol && opts.Credentials == nil {
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700529 var err error
Asim Shankar34fb2492015-03-12 10:25:46 -0700530 opts.Credentials, err = sh.NewChildCredentials("child")
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700531 if err != nil {
532 return nil, err
533 }
534 }
535 cmd := desc.factory()
James Ring9d9489d2015-01-27 15:48:07 -0800536 expanded := append([]string{name}, sh.expand(args...)...)
Ankur9f957942014-11-24 16:34:18 -0800537 cenv, err := sh.setupCommandEnv(env)
538 if err != nil {
539 return nil, err
540 }
Ryan Brown61d69382015-02-25 11:13:39 -0800541
542 var p *os.File
Cosmos Nicolaou52e9a222015-03-16 21:57:16 -0700543 if opts.Credentials != nil {
544 p, err = opts.Credentials.File()
545 if err != nil {
546 return nil, err
Ryan Brown61d69382015-02-25 11:13:39 -0800547 }
Ryan Browna08a2212015-01-15 15:40:10 -0800548 }
James Ring9d9489d2015-01-27 15:48:07 -0800549
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700550 h, err := cmd.start(sh, p, &opts, cenv, expanded...)
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700551 if err != nil {
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700552 return h, err
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700553 }
554 sh.mu.Lock()
555 sh.handles[h] = struct{}{}
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700556 sh.lifoHandles = append(sh.lifoHandles, h)
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700557 sh.mu.Unlock()
558 return h, nil
559}
560
Cosmos Nicolaoue664f3f2014-10-20 17:40:05 -0700561// CommandEnvelope returns the command line and environment that would be
562// used for running the subprocess or function if it were started with the
563// specifed arguments.
Cosmos Nicolaou2cb05fb2014-10-23 13:37:32 -0700564func (sh *Shell) CommandEnvelope(name string, env []string, args ...string) ([]string, []string) {
Cosmos Nicolaoud4f00562014-11-17 20:35:48 -0800565 cmd := registry.getCommand(name)
566 if cmd == nil {
567 return []string{}, []string{}
568 }
Ankur9f957942014-11-24 16:34:18 -0800569 menv, err := sh.setupCommandEnv(env)
570 if err != nil {
571 return []string{}, []string{}
572 }
573 return cmd.factory().envelope(sh, menv, args...)
Cosmos Nicolaoue664f3f2014-10-20 17:40:05 -0700574}
575
576// Forget tells the Shell to stop tracking the supplied Handle. This is
577// generally used when the application wants to control the order that
578// commands are shutdown in.
579func (sh *Shell) Forget(h Handle) {
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700580 sh.mu.Lock()
581 delete(sh.handles, h)
582 sh.mu.Unlock()
583}
584
585func (sh *Shell) expand(args ...string) []string {
586 exp := []string{}
587 for _, a := range args {
588 if len(a) > 0 && a[0] == '$' {
589 if v, present := sh.env[a[1:]]; present {
590 exp = append(exp, v)
591 continue
592 }
593 }
594 exp = append(exp, a)
595 }
596 return exp
597}
598
599// GetVar returns the variable associated with the specified key
600// and an indication of whether it is defined or not.
601func (sh *Shell) GetVar(key string) (string, bool) {
602 sh.mu.Lock()
603 defer sh.mu.Unlock()
604 v, present := sh.env[key]
605 return v, present
606}
607
608// SetVar sets the value to be associated with key.
609func (sh *Shell) SetVar(key, value string) {
610 sh.mu.Lock()
611 defer sh.mu.Unlock()
612 // TODO(cnicolaou): expand value
613 sh.env[key] = value
614}
615
Cosmos Nicolaou2cb05fb2014-10-23 13:37:32 -0700616// ClearVar removes the speficied variable from the Shell's environment
617func (sh *Shell) ClearVar(key string) {
618 sh.mu.Lock()
619 defer sh.mu.Unlock()
620 delete(sh.env, key)
621}
622
Jiri Simsa37893392014-11-07 10:55:45 -0800623// GetConfigKey returns the value associated with the specified key in
624// the Shell's config and an indication of whether it is defined or
625// not.
626func (sh *Shell) GetConfigKey(key string) (string, bool) {
627 v, err := sh.config.Get(key)
628 return v, err == nil
629}
630
631// SetConfigKey sets the value of the specified key in the Shell's
632// config.
633func (sh *Shell) SetConfigKey(key, value string) {
634 sh.config.Set(key, value)
635}
636
637// ClearConfigKey removes the speficied key from the Shell's config.
638func (sh *Shell) ClearConfigKey(key string) {
639 sh.config.Clear(key)
640}
641
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700642// Env returns the entire set of environment variables associated with this
643// Shell as a string slice.
644func (sh *Shell) Env() []string {
645 vars := []string{}
646 sh.mu.Lock()
647 defer sh.mu.Unlock()
648 for k, v := range sh.env {
649 vars = append(vars, k+"="+v)
650 }
651 return vars
652}
653
654// Cleanup calls Shutdown on all of the Handles currently being tracked
Cosmos Nicolaoubbae3882014-10-02 22:58:19 -0700655// by the Shell and writes to stdout and stderr as per the Shutdown
Cosmos Nicolaou2cb05fb2014-10-23 13:37:32 -0700656// method in the Handle interface. Cleanup returns the error from the
657// last Shutdown that returned a non-nil error. The order that the
658// Shutdown routines are executed is not defined.
659func (sh *Shell) Cleanup(stdout, stderr io.Writer) error {
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700660 sh.mu.Lock()
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700661 verbose := sh.sessionVerbosity
662 sh.mu.Unlock()
663
664 writeMsg := func(format string, args ...interface{}) {
665 if !verbose {
666 return
667 }
668 if stderr != nil {
669 fmt.Fprintf(stderr, format, args...)
670 }
671 }
672
Cosmos Nicolaou9fb10342015-04-12 19:37:24 -0700673 writeMsg("---- Shell Cleanup ----\n")
674 defer writeMsg("---- Shell Cleanup Complete ----\n")
675
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700676 sh.mu.Lock()
677 handles := make([]Handle, 0, len(sh.lifoHandles))
678 for _, h := range sh.lifoHandles {
679 if _, present := sh.handles[h]; present {
680 handles = append(handles, h)
681 }
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700682 }
683 sh.handles = make(map[Handle]struct{})
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700684 sh.lifoHandles = nil
Cosmos Nicolaou66afced2014-09-15 22:12:43 -0700685 sh.mu.Unlock()
Cosmos Nicolaou2cb05fb2014-10-23 13:37:32 -0700686 var err error
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700687 for i := len(handles); i > 0; i-- {
688 h := handles[i-1]
689 switch v := h.(type) {
690 case *functionHandle:
691 writeMsg("---- Cleanup calling Shutdown on function %q\n", v.name)
692 case *execHandle:
693 writeMsg("---- Cleanup calling Shutdown on command %q\n", v.name)
694 }
695 cerr := h.Shutdown(stdout, stderr)
Cosmos Nicolaou2cb05fb2014-10-23 13:37:32 -0700696 if cerr != nil {
697 err = cerr
698 }
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700699 fn := func() string {
700 if cerr == nil {
701 return ": done"
702 } else {
703 return ": error: " + err.Error()
704 }
705 }
706 switch v := h.(type) {
707 case *functionHandle:
708 writeMsg("---- Shutdown on function %q%s\n", v.name, fn())
709 case *execHandle:
710 writeMsg("---- Shutdown on command %q%s\n", v.name, fn())
711 }
Cosmos Nicolaou66afced2014-09-15 22:12:43 -0700712 }
Ankur9f957942014-11-24 16:34:18 -0800713
Ryan Browna08a2212015-01-15 15:40:10 -0800714 if sh.cancelCtx != nil {
Cosmos Nicolaou9fb10342015-04-12 19:37:24 -0700715 writeMsg("---- Cleanup calling cancelCtx ----\n")
Ryan Browna08a2212015-01-15 15:40:10 -0800716 // Note(ribrdb, caprita): This will shutdown the agents. If there
717 // were errors shutting down it is possible there could be child
718 // processes still running, and stopping the agent may cause
719 // additional failures.
720 sh.cancelCtx()
Cosmos Nicolaou9afe1202014-09-19 13:45:57 -0700721 }
Ryan Browna08a2212015-01-15 15:40:10 -0800722 os.RemoveAll(sh.tempCredDir)
Cosmos Nicolaou2cb05fb2014-10-23 13:37:32 -0700723 return err
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700724}
725
Ankur9f957942014-11-24 16:34:18 -0800726func (sh *Shell) setupCommandEnv(env []string) ([]string, error) {
Cosmos Nicolaou2cb05fb2014-10-23 13:37:32 -0700727 osmap := envSliceToMap(os.Environ())
728 evmap := envSliceToMap(env)
Ankur9f957942014-11-24 16:34:18 -0800729
Cosmos Nicolaou2cb05fb2014-10-23 13:37:32 -0700730 sh.mu.Lock()
Cosmos Nicolaou2cb05fb2014-10-23 13:37:32 -0700731 defer sh.mu.Unlock()
Ankur9f957942014-11-24 16:34:18 -0800732 m1 := mergeMaps(osmap, sh.env)
733 // Clear any VeyronCredentials directory in m1 as we never
734 // want the child to directly use the directory specified
735 // by the shell's VeyronCredentials.
Asim Shankar59b8b692015-03-30 01:23:36 -0700736 delete(m1, envvar.Credentials)
Ryan Brown7f950a82015-04-20 18:08:39 -0700737 delete(m1, envvar.AgentEndpoint)
Ankur9f957942014-11-24 16:34:18 -0800738
Cosmos Nicolaou2cb05fb2014-10-23 13:37:32 -0700739 m2 := mergeMaps(m1, evmap)
740 r := []string{}
741 for k, v := range m2 {
742 r = append(r, k+"="+v)
Cosmos Nicolaoue664f3f2014-10-20 17:40:05 -0700743 }
Ankur9f957942014-11-24 16:34:18 -0800744 return r, nil
Cosmos Nicolaoue664f3f2014-10-20 17:40:05 -0700745}
746
Cosmos Nicolaou1381f8a2015-03-13 09:40:34 -0700747// ExpectSession is a subset of v.io/x/ref/tests/expect.Session's methods
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700748// that are embedded in Handle.
749type ExpectSession interface {
750 Expect(expected string)
751 ExpectEOF() error
752 ExpectRE(pattern string, n int) [][]string
753 ExpectSetEventuallyRE(expected ...string) [][]string
754 ExpectSetRE(expected ...string) [][]string
755 ExpectVar(name string) string
756 Expectf(format string, args ...interface{})
757 ReadAll() (string, error)
758 ReadLine() string
759 SetVerbosity(bool)
760 Failed() bool
761 Error() error
762}
763
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700764// Handle represents a running command.
765type Handle interface {
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700766 ExpectSession
767
Cosmos Nicolaou9ca249d2014-09-18 15:07:12 -0700768 // Stdout returns a reader to the running command's stdout stream.
769 Stdout() io.Reader
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700770
Cosmos Nicolaou9ca249d2014-09-18 15:07:12 -0700771 // Stderr returns a reader to the running command's stderr
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700772 // stream.
773 Stderr() io.Reader
774
775 // Stdin returns a writer to the running command's stdin. The
776 // convention is for commands to wait for stdin to be closed before
777 // they exit, thus the caller should close stdin when it wants the
778 // command to exit cleanly.
Cosmos Nicolaou66afced2014-09-15 22:12:43 -0700779 Stdin() io.Writer
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700780
Cosmos Nicolaou66afced2014-09-15 22:12:43 -0700781 // CloseStdin closes stdin in a manner that avoids a data race
782 // between any current readers on it.
783 CloseStdin()
784
785 // Shutdown closes the Stdin for the command and then reads output
Cosmos Nicolaoubbae3882014-10-02 22:58:19 -0700786 // from the command's stdout until it encounters EOF, waits for
787 // the command to complete and then reads all of its stderr output.
788 // The stdout and stderr contents are written to the corresponding
789 // io.Writers if they are non-nil, otherwise the content is discarded.
790 Shutdown(stdout, stderr io.Writer) error
Cosmos Nicolaoucc581722014-10-07 12:45:39 -0700791
792 // Pid returns the pid of the process running the command
793 Pid() int
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700794}
795
796// command is used to abstract the implementations of inprocess and subprocess
797// commands.
798type command interface {
Cosmos Nicolaou2cb05fb2014-10-23 13:37:32 -0700799 envelope(sh *Shell, env []string, args ...string) ([]string, []string)
Cosmos Nicolaou42a17362015-03-10 16:40:18 -0700800 start(sh *Shell, agent *os.File, opts *StartOpts, env []string, args ...string) (Handle, error)
Cosmos Nicolaou62613842014-08-25 21:57:37 -0700801}