Jiri Simsa | d7616c9 | 2015-03-24 23:44:30 -0700 | [diff] [blame] | 1 | // Copyright 2015 The Vanadium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style |
| 3 | // license that can be found in the LICENSE file. |
| 4 | |
Todd Wang | 8c4e5cc | 2015-04-09 11:30:52 -0700 | [diff] [blame] | 5 | // Package modules implements a mechanism for running commonly used services as |
| 6 | // subprocesses, and client functionality for accessing those services. Such |
| 7 | // services and functions are collectively called 'commands' and are managed by |
| 8 | // a 'Registry'. The Shell is analagous to the UNIX shell and maintains a key, |
| 9 | // value store of environment variables and config settings that are accessible |
| 10 | // to the commands that it hosts. Simple variable expansion is supported. |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 11 | // |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 12 | // Four types of 'commands' may be invoked via a Shell. |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 13 | // |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 14 | // - functions of type Shell.Main as subprocesses via fork/exec |
| 15 | // - functions of type Shell.Main as functions within the current process |
| 16 | // - arbitrary non-Vanadium commands available on the underlying |
| 17 | // operating system such as '/bin/cp', 'bash' etc. |
| 18 | // - arbtirary Vanadium commands available on the underlying |
| 19 | // operating system such as precompiled Vanadium services. |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 20 | // |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 21 | // The first two types require that the function to be executed is compiled |
| 22 | // into the binary executing the calls to the Shell. These functions |
| 23 | // are registered with a single, per-process, registry. |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 24 | // The signature of the function that implements the command is the |
| 25 | // same for both types of command and is defined by the Main function type. |
| 26 | // In particular stdin, stdout and stderr are provided as parameters, as is |
| 27 | // a map representation of the shell's environment. |
Cosmos Nicolaou | 9afe120 | 2014-09-19 13:45:57 -0700 | [diff] [blame] | 28 | // |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 29 | // The second two types allow for arbitrary binaries to be executed. The |
| 30 | // distinction between a Vanadium and non-Vanadium command is that the |
| 31 | // Vanadium command implements the protocol used by v.io/x/ref/lib/exec |
| 32 | // package to synchronise between the parent and child processes and to share |
| 33 | // information such as the ConfigKey key,value store supported by the Shell, |
Cosmos Nicolaou | 52e9a22 | 2015-03-16 21:57:16 -0700 | [diff] [blame] | 34 | // a shared secret, shared file descriptors etc. |
| 35 | // |
| 36 | // When the exec protocol is not used the only form of communication with the |
| 37 | // child processes are environment variables and command line flags and any |
| 38 | // shared file descriptors explicitly created by the parent process and expected |
| 39 | // by the child process; the Start method will not create any additional |
| 40 | // file descriptors. |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 41 | // |
| 42 | // The registry provides the following functions: |
| 43 | // - RegisterChild: generally called from an init function to register a |
| 44 | // shell.Main to be executed in a subprocess by fork/exec'ing the calling |
| 45 | // process. |
| 46 | // - Dispatch: which must be called in the child process to lookup the |
| 47 | // requested function in the registry and to invoke it. This will typically |
| 48 | // be called from a TestMain. modules.IsModulesChildProcess can be used |
| 49 | // to determine if the calling process is a child started via this package. |
| 50 | // - DispatchAndExit: essentially the same as Dispatch but intended to be |
| 51 | // called as the first thing in a main function. |
| 52 | // - RegisterFunction: for an in-process function that will be invoked |
| 53 | // via function call. |
| 54 | // |
| 55 | // The v23 tool can automate generation of TestMain and calls to RegisterChild, |
| 56 | // and RegisterFunction. Adding the comment below to a test file will |
| 57 | // generate the appropriate code. |
| 58 | // |
| 59 | // //go:generate v23 test generate . |
| 60 | // |
| 61 | // Use 'v23 test generate --help' to get a complete explanation. |
| 62 | // |
| 63 | // In all cases commands are started by invoking the StartWithOpts method |
| 64 | // on the Shell with the name of the command to run. An instance of the Handle |
| 65 | // interface is returned which can be used to interact with the function |
| 66 | // or subprocess, and in particular to read/write data from/to it using io |
| 67 | // channels that follow the stdin, stdout, stderr convention. The StartOpts |
| 68 | // struct is used to control the detailed behaviour of each such invocation. |
| 69 | // Various helper functions are provided both for creating appropriate |
| 70 | // instances of StartOpts and for common uses of StartWithOpts. |
| 71 | // |
| 72 | // Each successful call to StartWithOpts returns a handle representing |
| 73 | // the running command. This handle can be used to gain access to that |
| 74 | // command's stdin, stdout, stderr and to request or synchronize with |
| 75 | // its termination via the Shutdown method. The Shutdown method can |
| 76 | // optionally be used to read any remaining output from the commands stdout |
| 77 | // and stderr. |
| 78 | // The Shell maintains a record of all such handles and will call Shutdown |
| 79 | // on them in LIFO order when the Shell's Cleanup method is called. |
| 80 | // |
| 81 | // A simple protocol must be followed by all modules.Main commands, |
| 82 | // in particular, they should wait for their stdin stream to be closed |
| 83 | // before exiting. The caller can then coordinate with any command by writing |
| 84 | // to that stdin stream and reading responses from the stdout stream, and it |
| 85 | // can close stdin when it's ready for the command to exit using the |
| 86 | // CloseStdin method on the command's handle. Any binary or script that |
| 87 | // follows this protocol can be used as well. |
| 88 | // |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 89 | // By default, every Shell created by NewShell starts a security agent |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 90 | // to manage principals for child processes. These default credentials |
| 91 | // can be overridden by passing a nil context to NewShell then specifying |
| 92 | // VeyronCredentials in the environment provided as a parameter to the |
| 93 | // StartWithOpts method. It is also possible to specify custom credentials |
| 94 | // via StartOpts. |
| 95 | // |
| 96 | // Interacting with Commands: |
| 97 | // |
| 98 | // Handle.Stdout(), Stdin(), Stderr(): |
| 99 | // StartWithOpts returns a Handle which can be used to interact with the |
| 100 | // running command. In particular, its Stdin() and Stdout() methods give |
| 101 | // access to the running process' corresponding stdin and stdout and hence |
| 102 | // can be used to communicate with it. Stderr is handled differently and is |
| 103 | // configured so that the child's stderr is written to a log file rather |
| 104 | // than a pipe. This is in order to maximise the liklihood of capturing |
| 105 | // stderr output from a crashed child process. |
| 106 | // |
| 107 | // Handle.Shutdown(stdout, stderr io.Writer): |
| 108 | // The Shutdown method is used to gracefully shutdown a command and to |
| 109 | // synchronise with its termination. In particular, Shutdown can be used |
| 110 | // to read any unread output from the command's stdout and stderr. Note that |
| 111 | // since Stderr is buffered to a file, Shutdown is able to return the entire |
| 112 | // contents of that file. This is useful for debugging misbehaving/crashing |
| 113 | // child processes. |
| 114 | // |
| 115 | // Shell.Cleanup(stdout, stderr io.Writer): |
| 116 | // The Shell keeps track of all Handles that it has issued and in particular |
| 117 | // if Shutdown (or Forget) have not been called, it will call Shutdown for |
| 118 | // each such Handle in LIFO order. This ensures that all commands will be |
| 119 | // Shutdown even if the developer does not explicitly take care to do so |
| 120 | // for every invocation. |
| 121 | // |
| 122 | // Pipes: |
| 123 | // StartWithOpts allows the caller to pass an io.Reader to the command |
| 124 | // (StartOpts.Stdin) for it to read from, rather than creating a new pipe |
| 125 | // internally. This makes it possible to connect the output of one |
| 126 | // command to the input of another directly. |
| 127 | // |
| 128 | // Command Line Arguments: |
| 129 | // The arguments passed in calls to Start are appended to any system required |
| 130 | // ones (e.g. for propagating test timeouts, verbosity etc) and the child |
| 131 | // process will call the command with the result of flag.Args(). In this way |
| 132 | // the caller can provide flags used by libraries in the child process |
| 133 | // as well as those specific to the command and the command will only |
| 134 | // receive the args specific to it. The usual "--" convention can be |
| 135 | // used to override this default behaviour. |
| 136 | // |
| 137 | // Caveats: |
| 138 | // |
| 139 | // Handle.Shutdown assumes that the child command/process will terminate |
| 140 | // when its stdin stream is closed. This assumption is unlikely to be valid |
| 141 | // for 'external' commands (e.g. /bin/cp) and in these cases Kill or some other |
| 142 | // application specific mechanism will need to be used. |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 143 | package modules |
| 144 | |
| 145 | import ( |
Cosmos Nicolaou | 52e9a22 | 2015-03-16 21:57:16 -0700 | [diff] [blame] | 146 | "errors" |
Cosmos Nicolaou | d4f0056 | 2014-11-17 20:35:48 -0800 | [diff] [blame] | 147 | "fmt" |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 148 | "io" |
Cosmos Nicolaou | 9afe120 | 2014-09-19 13:45:57 -0700 | [diff] [blame] | 149 | "io/ioutil" |
| 150 | "os" |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 151 | "sync" |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 152 | "syscall" |
Cosmos Nicolaou | e5b4150 | 2014-10-29 22:55:09 -0700 | [diff] [blame] | 153 | "time" |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 154 | |
Jiri Simsa | 6ac9522 | 2015-02-23 16:11:49 -0800 | [diff] [blame] | 155 | "v.io/v23" |
| 156 | "v.io/v23/context" |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 157 | "v.io/v23/security" |
Asim Shankar | 59b8b69 | 2015-03-30 01:23:36 -0700 | [diff] [blame] | 158 | "v.io/x/ref/envvar" |
Jiri Simsa | ffceefa | 2015-02-28 11:03:34 -0800 | [diff] [blame] | 159 | "v.io/x/ref/lib/exec" |
Todd Wang | 8850968 | 2015-04-10 10:28:24 -0700 | [diff] [blame] | 160 | "v.io/x/ref/services/agent/agentlib" |
Todd Wang | b351149 | 2015-04-07 23:32:34 -0700 | [diff] [blame] | 161 | "v.io/x/ref/services/agent/keymgr" |
Cosmos Nicolaou | 1381f8a | 2015-03-13 09:40:34 -0700 | [diff] [blame] | 162 | "v.io/x/ref/test/expect" |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 163 | ) |
| 164 | |
| 165 | const ( |
| 166 | shellBlessingExtension = "test-shell" |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 167 | |
| 168 | defaultStartTimeout = time.Minute |
| 169 | defaultShutdownTimeout = time.Minute |
| 170 | defaultExpectTimeout = time.Minute |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 171 | ) |
| 172 | |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 173 | var defaultStartOpts = StartOpts{ |
| 174 | StartTimeout: defaultStartTimeout, |
| 175 | ShutdownTimeout: defaultShutdownTimeout, |
| 176 | ExpectTimeout: defaultExpectTimeout, |
| 177 | ExecProtocol: true, |
| 178 | } |
| 179 | |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 180 | // Shell represents the context within which commands are run. |
| 181 | type Shell struct { |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 182 | mu sync.Mutex |
| 183 | env map[string]string |
| 184 | handles map[Handle]struct{} |
| 185 | lifoHandles []Handle |
| 186 | defaultStartOpts StartOpts |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 187 | // tmpCredDir is the temporary directory created by this |
| 188 | // shell. This must be removed when the shell is cleaned up. |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 189 | tempCredDir string |
| 190 | config exec.Config |
| 191 | principal security.Principal |
| 192 | agent *keymgr.Agent |
| 193 | ctx *context.T |
| 194 | sessionVerbosity bool |
| 195 | cancelCtx func() |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 196 | } |
| 197 | |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 198 | // NewShell creates a new instance of Shell. |
Ankur | 50ab988 | 2015-02-17 12:17:17 -0800 | [diff] [blame] | 199 | // |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 200 | // If ctx is non-nil, the shell will manage Principals for child processes. |
Ankur | 50ab988 | 2015-02-17 12:17:17 -0800 | [diff] [blame] | 201 | // |
| 202 | // If p is non-nil, any child process created has its principal blessed |
| 203 | // by the default blessings of 'p', Else any child process created has its |
| 204 | // principal blessed by the default blessings of ctx's principal. |
Cosmos Nicolaou | 9e90984 | 2015-03-17 11:58:59 -0700 | [diff] [blame] | 205 | // |
| 206 | // If verbosity is true additional debugging info will be displayed, |
| 207 | // in particular by the Shutdown. |
| 208 | // |
| 209 | // If t is non-nil, then the expect Session created for every invocation |
| 210 | // will be constructed with that value of t unless overridden by a |
| 211 | // StartOpts provided to that invocation. Providing a non-nil value of |
| 212 | // t enables expect.Session to call t.Error, Errorf and Log. |
| 213 | func NewShell(ctx *context.T, p security.Principal, verbosity bool, t expect.Testing) (*Shell, error) { |
Cosmos Nicolaou | 9afe120 | 2014-09-19 13:45:57 -0700 | [diff] [blame] | 214 | sh := &Shell{ |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 215 | env: make(map[string]string), |
| 216 | handles: make(map[Handle]struct{}), |
| 217 | config: exec.NewConfig(), |
| 218 | defaultStartOpts: defaultStartOpts, |
Cosmos Nicolaou | 9e90984 | 2015-03-17 11:58:59 -0700 | [diff] [blame] | 219 | sessionVerbosity: verbosity, |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 220 | } |
Cosmos Nicolaou | 9e90984 | 2015-03-17 11:58:59 -0700 | [diff] [blame] | 221 | sh.defaultStartOpts = sh.defaultStartOpts.WithSessions(t, time.Minute) |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 222 | if ctx == nil { |
Cosmos Nicolaou | 344cc4a | 2014-11-26 15:38:43 -0800 | [diff] [blame] | 223 | return sh, nil |
Cosmos Nicolaou | 9afe120 | 2014-09-19 13:45:57 -0700 | [diff] [blame] | 224 | } |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 225 | var err error |
| 226 | ctx, sh.cancelCtx = context.WithCancel(ctx) |
Todd Wang | ad49204 | 2015-04-17 15:58:40 -0700 | [diff] [blame] | 227 | if ctx, err = v23.WithNewStreamManager(ctx); err != nil { |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 228 | return nil, err |
| 229 | } |
| 230 | sh.ctx = ctx |
| 231 | |
Cosmos Nicolaou | 185c0c6 | 2015-04-13 21:22:43 -0700 | [diff] [blame] | 232 | if sh.tempCredDir, err = ioutil.TempDir("", "shell_credentials-"); err != nil { |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 233 | return nil, err |
| 234 | } |
| 235 | if sh.agent, err = keymgr.NewLocalAgent(ctx, sh.tempCredDir, nil); err != nil { |
| 236 | return nil, err |
| 237 | } |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 238 | sh.principal = p |
Ankur | 50ab988 | 2015-02-17 12:17:17 -0800 | [diff] [blame] | 239 | if sh.principal == nil { |
Jiri Simsa | 6ac9522 | 2015-02-23 16:11:49 -0800 | [diff] [blame] | 240 | sh.principal = v23.GetPrincipal(ctx) |
Cosmos Nicolaou | 344cc4a | 2014-11-26 15:38:43 -0800 | [diff] [blame] | 241 | } |
Cosmos Nicolaou | 344cc4a | 2014-11-26 15:38:43 -0800 | [diff] [blame] | 242 | return sh, nil |
Cosmos Nicolaou | 9afe120 | 2014-09-19 13:45:57 -0700 | [diff] [blame] | 243 | } |
| 244 | |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 245 | // DefaultStartOpts returns the current StartOpts stored with the Shell. |
| 246 | func (sh *Shell) DefaultStartOpts() StartOpts { |
| 247 | return sh.defaultStartOpts |
| 248 | } |
| 249 | |
| 250 | // SetDefaultStartOpts sets the default StartOpts stored with the Shell. |
| 251 | func (sh *Shell) SetDefaultStartOpts(opts StartOpts) { |
| 252 | sh.defaultStartOpts = opts |
| 253 | } |
| 254 | |
Ryan Brown | 61d6938 | 2015-02-25 11:13:39 -0800 | [diff] [blame] | 255 | // CustomCredentials encapsulates a Principal which can be shared with |
| 256 | // one or more processes run by a Shell. |
| 257 | type CustomCredentials struct { |
| 258 | p security.Principal |
| 259 | agent *keymgr.Agent |
| 260 | id []byte |
| 261 | } |
Ankur | 50ab988 | 2015-02-17 12:17:17 -0800 | [diff] [blame] | 262 | |
Ryan Brown | 61d6938 | 2015-02-25 11:13:39 -0800 | [diff] [blame] | 263 | // Principal returns the Principal. |
| 264 | func (c *CustomCredentials) Principal() security.Principal { |
| 265 | return c.p |
| 266 | } |
| 267 | |
| 268 | // File returns a socket which can be used to connect to the agent |
| 269 | // managing this principal. Typically you would pass this to a child |
| 270 | // process. |
| 271 | func (c *CustomCredentials) File() (*os.File, error) { |
| 272 | return c.agent.NewConnection(c.id) |
| 273 | } |
| 274 | |
| 275 | func dup(conn *os.File) (int, error) { |
Bogdan Caprita | bb37c54 | 2015-01-22 10:21:57 -0800 | [diff] [blame] | 276 | syscall.ForkLock.RLock() |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 277 | fd, err := syscall.Dup(int(conn.Fd())) |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 278 | if err != nil { |
Bogdan Caprita | bb37c54 | 2015-01-22 10:21:57 -0800 | [diff] [blame] | 279 | syscall.ForkLock.RUnlock() |
Ryan Brown | 61d6938 | 2015-02-25 11:13:39 -0800 | [diff] [blame] | 280 | return -1, err |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 281 | } |
| 282 | syscall.CloseOnExec(fd) |
Bogdan Caprita | bb37c54 | 2015-01-22 10:21:57 -0800 | [diff] [blame] | 283 | syscall.ForkLock.RUnlock() |
Ryan Brown | 61d6938 | 2015-02-25 11:13:39 -0800 | [diff] [blame] | 284 | return fd, nil |
| 285 | } |
| 286 | |
Asim Shankar | 34fb249 | 2015-03-12 10:25:46 -0700 | [diff] [blame] | 287 | // NewCustomCredentials creates a new Principal for StartWithOpts.. |
Ryan Brown | 61d6938 | 2015-02-25 11:13:39 -0800 | [diff] [blame] | 288 | // Returns nil if the shell is not managing principals. |
| 289 | func (sh *Shell) NewCustomCredentials() (cred *CustomCredentials, err error) { |
| 290 | // Create child principal. |
| 291 | if sh.ctx == nil { |
| 292 | return nil, nil |
| 293 | } |
| 294 | id, conn, err := sh.agent.NewPrincipal(sh.ctx, true) |
| 295 | if err != nil { |
| 296 | return nil, err |
| 297 | } |
| 298 | fd, err := dup(conn) |
| 299 | conn.Close() |
| 300 | if err != nil { |
| 301 | return nil, err |
| 302 | } |
Ryan Brown | 7f950a8 | 2015-04-20 18:08:39 -0700 | [diff] [blame] | 303 | ep, err := v23.NewEndpoint(agentlib.AgentEndpoint(fd)) |
| 304 | if err != nil { |
| 305 | syscall.Close(fd) |
| 306 | return nil, err |
| 307 | } |
| 308 | p, err := agentlib.NewAgentPrincipal(sh.ctx, ep, v23.GetClient(sh.ctx)) |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 309 | if err != nil { |
Bogdan Caprita | 6613fc4 | 2015-01-28 11:54:23 -0800 | [diff] [blame] | 310 | syscall.Close(fd) |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 311 | return nil, err |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 312 | } |
Ryan Brown | 61d6938 | 2015-02-25 11:13:39 -0800 | [diff] [blame] | 313 | return &CustomCredentials{p, sh.agent, id}, nil |
| 314 | } |
| 315 | |
Asim Shankar | 34fb249 | 2015-03-12 10:25:46 -0700 | [diff] [blame] | 316 | // NewChildCredentials creates a new principal, served via the security agent |
| 317 | // whose blessings are an extension of this shell's principal (with the |
| 318 | // provided caveats). |
| 319 | // |
| 320 | // All processes started by this shell will recognize the credentials created |
| 321 | // by this call. |
| 322 | // |
| 323 | // Returns nil if the shell is not managing principals. |
| 324 | // |
| 325 | // Since the Shell type is intended for tests, it is not required to provide |
| 326 | // caveats. In production scenarios though, one must think long and hard |
| 327 | // before blessing anothing principal without any caveats. |
| 328 | func (sh *Shell) NewChildCredentials(extension string, caveats ...security.Caveat) (c *CustomCredentials, err error) { |
Ryan Brown | 61d6938 | 2015-02-25 11:13:39 -0800 | [diff] [blame] | 329 | creds, err := sh.NewCustomCredentials() |
| 330 | if creds == nil { |
| 331 | return nil, err |
| 332 | } |
Asim Shankar | 34fb249 | 2015-03-12 10:25:46 -0700 | [diff] [blame] | 333 | parent := sh.principal |
| 334 | child := creds.p |
| 335 | if len(caveats) == 0 { |
| 336 | caveats = []security.Caveat{security.UnconstrainedUse()} |
| 337 | } |
Ankur | 50ab988 | 2015-02-17 12:17:17 -0800 | [diff] [blame] | 338 | |
| 339 | // Bless the child principal with blessings derived from the default blessings |
| 340 | // of shell's principal. |
Asim Shankar | 34fb249 | 2015-03-12 10:25:46 -0700 | [diff] [blame] | 341 | blessings, err := parent.Bless(child.PublicKey(), parent.BlessingStore().Default(), extension, caveats[0], caveats[1:]...) |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 342 | if err != nil { |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 343 | return nil, err |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 344 | } |
Asim Shankar | 34fb249 | 2015-03-12 10:25:46 -0700 | [diff] [blame] | 345 | if err := child.BlessingStore().SetDefault(blessings); err != nil { |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 346 | return nil, err |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 347 | } |
Asim Shankar | 34fb249 | 2015-03-12 10:25:46 -0700 | [diff] [blame] | 348 | if _, err := child.BlessingStore().Set(blessings, security.AllPrincipals); err != nil { |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 349 | return nil, err |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 350 | } |
Asim Shankar | 34fb249 | 2015-03-12 10:25:46 -0700 | [diff] [blame] | 351 | if err := child.AddToRoots(blessings); err != nil { |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 352 | return nil, err |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 353 | } |
| 354 | |
Ryan Brown | 61d6938 | 2015-02-25 11:13:39 -0800 | [diff] [blame] | 355 | return creds, nil |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 356 | } |
| 357 | |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 358 | type Main func(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error |
| 359 | |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 360 | // String returns a string representation of the Shell, which is a |
Cosmos Nicolaou | addf483 | 2014-09-10 21:36:54 -0700 | [diff] [blame] | 361 | // list of the commands currently available in the shell. |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 362 | func (sh *Shell) String() string { |
Cosmos Nicolaou | d4f0056 | 2014-11-17 20:35:48 -0800 | [diff] [blame] | 363 | return registry.help("") |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 364 | } |
| 365 | |
| 366 | // Help returns the help message for the specified command. |
| 367 | func (sh *Shell) Help(command string) string { |
Cosmos Nicolaou | d4f0056 | 2014-11-17 20:35:48 -0800 | [diff] [blame] | 368 | return registry.help(command) |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 369 | } |
| 370 | |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 371 | // Start is shorthand for StartWithOpts(sh.DefaultStartOpts(), ...) |
| 372 | func (sh *Shell) Start(name string, env []string, args ...string) (Handle, error) { |
| 373 | return sh.StartWithOpts(sh.DefaultStartOpts(), env, name, args...) |
| 374 | } |
| 375 | |
| 376 | // StartOpts represents the options that can be passed to the |
| 377 | // StartWithOpts method. |
| 378 | type StartOpts struct { |
| 379 | // Error is set when creating/intializing instances of StartOpts |
| 380 | // via one of the factory methods and returned when StartWithOpts |
| 381 | // is called. This allows usage of of the form: |
| 382 | // |
| 383 | // err := sh.StartWithOpts(sh.DefaultStartOpts()...) |
| 384 | // |
| 385 | // as opposed to: |
| 386 | // |
| 387 | // opts, err := sh.DefaultStartOpts(....) |
| 388 | // if err != nil { |
| 389 | // panic(...) |
| 390 | // } |
| 391 | // sh.StartWithOpts(opts, ....) |
| 392 | Error error |
| 393 | |
| 394 | // Stdin, if non-nil, will be used as the stdin for the child process. |
| 395 | // If this option is set, then the Stdin() method on the returned Handle |
| 396 | // will return nil. The client of this API maintains ownership of stdin |
| 397 | // and must close it, i.e. the shell will not do so. |
| 398 | Stdin io.Reader |
| 399 | // Credentials, if non-nil, will be used as the credentials for the |
| 400 | // child process. If the creds are nil or the shell is not managing |
| 401 | // principals, the credentials are ignored. |
| 402 | Credentials *CustomCredentials |
| 403 | // ExecProtocol indicates whether the child process is expected to |
| 404 | // implement the v.io/x.ref/lib/exec parent/child protocol. |
| 405 | // It should be set to false when running non-vanadium commands |
| 406 | // (e.g. /bin/cp). |
| 407 | ExecProtocol bool |
| 408 | // External indicates if the command is an external process rather than |
| 409 | // a Shell.Main function. |
| 410 | External bool |
| 411 | // StartTimeout specifies the amount of time to wait for the |
| 412 | // child process to signal its correct intialization for Vanadium |
| 413 | // processes that implement the exec parent/child protocol. It has no |
| 414 | // effect if External is set to true. |
| 415 | StartTimeout time.Duration |
| 416 | // ShutdownTimeout specifics the amount of time to wait for the child |
| 417 | // process to exit when the Shutdown method is called on that |
| 418 | // child's handle. |
| 419 | ShutdownTimeout time.Duration |
| 420 | // ExpectTesting is used when creating an instance of expect.Session |
| 421 | // to embed in Handle. |
| 422 | ExpectTesting expect.Testing |
| 423 | // ExpectTimeout is the timeout to use with expect.Session. |
| 424 | ExpectTimeout time.Duration |
| 425 | } |
| 426 | |
| 427 | // DefaultStartOpts returns an instance of Startops with the current default |
| 428 | // values. The defaults have values for timeouts, no credentials |
| 429 | // (StartWithOpts will then create credentials each time it is called), |
| 430 | // and with ExecProtocol set to true. |
| 431 | // This is expected to be the common use case. |
| 432 | func DefaultStartOpts() StartOpts { |
| 433 | return defaultStartOpts |
| 434 | } |
| 435 | |
| 436 | // WithCustomCredentials returns an instance of StartOpts with the specified |
Asim Shankar | 34fb249 | 2015-03-12 10:25:46 -0700 | [diff] [blame] | 437 | // credentials. |
| 438 | // |
| 439 | // All other options are set to the current defaults. |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 440 | func (opts StartOpts) WithCustomCredentials(creds *CustomCredentials) StartOpts { |
| 441 | opts.Credentials = creds |
| 442 | return opts |
| 443 | } |
| 444 | |
| 445 | // WithSessions returns a copy of opts with the specified expect.Testing and |
| 446 | // associated timeout. |
| 447 | func (opts StartOpts) WithSessions(t expect.Testing, timeout time.Duration) StartOpts { |
| 448 | opts.ExpectTesting = t |
| 449 | opts.ExpectTimeout = timeout |
| 450 | return opts |
| 451 | } |
| 452 | |
| 453 | // WithStdin returns a copy of opts with the specified Stdin io.Reader. |
| 454 | func (opts StartOpts) WithStdin(stdin io.Reader) StartOpts { |
| 455 | opts.Stdin = stdin |
| 456 | return opts |
| 457 | } |
| 458 | |
| 459 | // NoExecCommand returns a copy of opts with the External option |
| 460 | // enabled and ExecProtocol disabled. |
| 461 | func (opts StartOpts) NoExecCommand() StartOpts { |
| 462 | opts.External = true |
| 463 | opts.ExecProtocol = false |
| 464 | return opts |
| 465 | } |
| 466 | |
| 467 | // ExternalCommand returns a copy of StartOpts with the |
| 468 | // External option enabled. |
| 469 | func (opts StartOpts) ExternalCommand() StartOpts { |
| 470 | opts.External = true |
| 471 | return opts |
| 472 | } |
| 473 | |
Cosmos Nicolaou | 52e9a22 | 2015-03-16 21:57:16 -0700 | [diff] [blame] | 474 | var ( |
| 475 | ErrNotRegistered = errors.New("command not registered") |
| 476 | ErrNoExecAndCustomCreds = errors.New("ExecProtocol set to false but this invocation is attempting to use custome credentials") |
| 477 | ) |
| 478 | |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 479 | // StartWithOpts starts the specified command according to the supplied |
| 480 | // StartOpts and returns a Handle which can be used for interacting with |
| 481 | // that command. |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 482 | // |
| 483 | // The environment variables for the command are set by merging variables |
| 484 | // from the OS environment, those in this Shell and those provided as a |
| 485 | // parameter to it. In general, it prefers values from its parameter over |
| 486 | // those from the Shell, over those from the OS. However, the VeyronCredentials |
Ryan Brown | 10a4ade | 2015-02-10 13:17:18 -0800 | [diff] [blame] | 487 | // and agent FdEnvVar variables will never use the value from the Shell or OS. |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 488 | // |
Ryan Brown | 10a4ade | 2015-02-10 13:17:18 -0800 | [diff] [blame] | 489 | // If the shell is managing principals, the command is configured to |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 490 | // connect to the shell's agent. Custom credentials may be specified |
| 491 | // via StartOpts. If the shell is not managing principals, set |
Ryan Brown | 10a4ade | 2015-02-10 13:17:18 -0800 | [diff] [blame] | 492 | // the VeyronCredentials environment variable in the 'env' parameter. |
Cosmos Nicolaou | 612ad38 | 2014-10-29 19:41:35 -0700 | [diff] [blame] | 493 | // |
| 494 | // The Shell tracks all of the Handles that it creates so that it can shut |
Cosmos Nicolaou | e5b4150 | 2014-10-29 22:55:09 -0700 | [diff] [blame] | 495 | // them down when asked to. The returned Handle may be non-nil even when an |
| 496 | // error is returned, in which case it may be used to retrieve any output |
| 497 | // from the failed command. |
Cosmos Nicolaou | 612ad38 | 2014-10-29 19:41:35 -0700 | [diff] [blame] | 498 | // |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 499 | // StartWithOpts will return a valid handle for errors that occur during the |
| 500 | // child processes startup process. It is thus possible to call Shutdown |
| 501 | // to obtain the error output. Handle will be nil if the error is due to |
| 502 | // some other reason, such as failure to create pipes/files before starting |
| 503 | // the child process. A common use will therefore be: |
Ryan Brown | 61d6938 | 2015-02-25 11:13:39 -0800 | [diff] [blame] | 504 | // |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 505 | // h, err := sh.Start(env, "/bin/echo", "hello") |
| 506 | // if err != nil { |
| 507 | // if h != nil { |
| 508 | // h.Shutdown(nil,os.Stderr) |
| 509 | // } |
| 510 | // t.Fatal(err) |
| 511 | // } |
| 512 | func (sh *Shell) StartWithOpts(opts StartOpts, env []string, name string, args ...string) (Handle, error) { |
| 513 | if opts.Error != nil { |
| 514 | return nil, opts.Error |
| 515 | } |
Cosmos Nicolaou | 52e9a22 | 2015-03-16 21:57:16 -0700 | [diff] [blame] | 516 | |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 517 | var desc *commandDesc |
| 518 | if opts.External { |
| 519 | desc = registry.getExternalCommand(name) |
| 520 | } else if desc = registry.getCommand(name); desc == nil { |
Cosmos Nicolaou | 52e9a22 | 2015-03-16 21:57:16 -0700 | [diff] [blame] | 521 | return nil, ErrNotRegistered |
James Ring | 9d9489d | 2015-01-27 15:48:07 -0800 | [diff] [blame] | 522 | } |
Cosmos Nicolaou | 52e9a22 | 2015-03-16 21:57:16 -0700 | [diff] [blame] | 523 | |
| 524 | if !opts.ExecProtocol && opts.Credentials != nil { |
| 525 | return nil, ErrNoExecAndCustomCreds |
| 526 | } |
| 527 | |
| 528 | if sh.ctx != nil && opts.ExecProtocol && opts.Credentials == nil { |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 529 | var err error |
Asim Shankar | 34fb249 | 2015-03-12 10:25:46 -0700 | [diff] [blame] | 530 | opts.Credentials, err = sh.NewChildCredentials("child") |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 531 | if err != nil { |
| 532 | return nil, err |
| 533 | } |
| 534 | } |
| 535 | cmd := desc.factory() |
James Ring | 9d9489d | 2015-01-27 15:48:07 -0800 | [diff] [blame] | 536 | expanded := append([]string{name}, sh.expand(args...)...) |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 537 | cenv, err := sh.setupCommandEnv(env) |
| 538 | if err != nil { |
| 539 | return nil, err |
| 540 | } |
Ryan Brown | 61d6938 | 2015-02-25 11:13:39 -0800 | [diff] [blame] | 541 | |
| 542 | var p *os.File |
Cosmos Nicolaou | 52e9a22 | 2015-03-16 21:57:16 -0700 | [diff] [blame] | 543 | if opts.Credentials != nil { |
| 544 | p, err = opts.Credentials.File() |
| 545 | if err != nil { |
| 546 | return nil, err |
Ryan Brown | 61d6938 | 2015-02-25 11:13:39 -0800 | [diff] [blame] | 547 | } |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 548 | } |
James Ring | 9d9489d | 2015-01-27 15:48:07 -0800 | [diff] [blame] | 549 | |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 550 | h, err := cmd.start(sh, p, &opts, cenv, expanded...) |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 551 | if err != nil { |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 552 | return h, err |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 553 | } |
| 554 | sh.mu.Lock() |
| 555 | sh.handles[h] = struct{}{} |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 556 | sh.lifoHandles = append(sh.lifoHandles, h) |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 557 | sh.mu.Unlock() |
| 558 | return h, nil |
| 559 | } |
| 560 | |
Cosmos Nicolaou | e664f3f | 2014-10-20 17:40:05 -0700 | [diff] [blame] | 561 | // CommandEnvelope returns the command line and environment that would be |
| 562 | // used for running the subprocess or function if it were started with the |
| 563 | // specifed arguments. |
Cosmos Nicolaou | 2cb05fb | 2014-10-23 13:37:32 -0700 | [diff] [blame] | 564 | func (sh *Shell) CommandEnvelope(name string, env []string, args ...string) ([]string, []string) { |
Cosmos Nicolaou | d4f0056 | 2014-11-17 20:35:48 -0800 | [diff] [blame] | 565 | cmd := registry.getCommand(name) |
| 566 | if cmd == nil { |
| 567 | return []string{}, []string{} |
| 568 | } |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 569 | menv, err := sh.setupCommandEnv(env) |
| 570 | if err != nil { |
| 571 | return []string{}, []string{} |
| 572 | } |
| 573 | return cmd.factory().envelope(sh, menv, args...) |
Cosmos Nicolaou | e664f3f | 2014-10-20 17:40:05 -0700 | [diff] [blame] | 574 | } |
| 575 | |
| 576 | // Forget tells the Shell to stop tracking the supplied Handle. This is |
| 577 | // generally used when the application wants to control the order that |
| 578 | // commands are shutdown in. |
| 579 | func (sh *Shell) Forget(h Handle) { |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 580 | sh.mu.Lock() |
| 581 | delete(sh.handles, h) |
| 582 | sh.mu.Unlock() |
| 583 | } |
| 584 | |
| 585 | func (sh *Shell) expand(args ...string) []string { |
| 586 | exp := []string{} |
| 587 | for _, a := range args { |
| 588 | if len(a) > 0 && a[0] == '$' { |
| 589 | if v, present := sh.env[a[1:]]; present { |
| 590 | exp = append(exp, v) |
| 591 | continue |
| 592 | } |
| 593 | } |
| 594 | exp = append(exp, a) |
| 595 | } |
| 596 | return exp |
| 597 | } |
| 598 | |
| 599 | // GetVar returns the variable associated with the specified key |
| 600 | // and an indication of whether it is defined or not. |
| 601 | func (sh *Shell) GetVar(key string) (string, bool) { |
| 602 | sh.mu.Lock() |
| 603 | defer sh.mu.Unlock() |
| 604 | v, present := sh.env[key] |
| 605 | return v, present |
| 606 | } |
| 607 | |
| 608 | // SetVar sets the value to be associated with key. |
| 609 | func (sh *Shell) SetVar(key, value string) { |
| 610 | sh.mu.Lock() |
| 611 | defer sh.mu.Unlock() |
| 612 | // TODO(cnicolaou): expand value |
| 613 | sh.env[key] = value |
| 614 | } |
| 615 | |
Cosmos Nicolaou | 2cb05fb | 2014-10-23 13:37:32 -0700 | [diff] [blame] | 616 | // ClearVar removes the speficied variable from the Shell's environment |
| 617 | func (sh *Shell) ClearVar(key string) { |
| 618 | sh.mu.Lock() |
| 619 | defer sh.mu.Unlock() |
| 620 | delete(sh.env, key) |
| 621 | } |
| 622 | |
Jiri Simsa | 3789339 | 2014-11-07 10:55:45 -0800 | [diff] [blame] | 623 | // GetConfigKey returns the value associated with the specified key in |
| 624 | // the Shell's config and an indication of whether it is defined or |
| 625 | // not. |
| 626 | func (sh *Shell) GetConfigKey(key string) (string, bool) { |
| 627 | v, err := sh.config.Get(key) |
| 628 | return v, err == nil |
| 629 | } |
| 630 | |
| 631 | // SetConfigKey sets the value of the specified key in the Shell's |
| 632 | // config. |
| 633 | func (sh *Shell) SetConfigKey(key, value string) { |
| 634 | sh.config.Set(key, value) |
| 635 | } |
| 636 | |
| 637 | // ClearConfigKey removes the speficied key from the Shell's config. |
| 638 | func (sh *Shell) ClearConfigKey(key string) { |
| 639 | sh.config.Clear(key) |
| 640 | } |
| 641 | |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 642 | // Env returns the entire set of environment variables associated with this |
| 643 | // Shell as a string slice. |
| 644 | func (sh *Shell) Env() []string { |
| 645 | vars := []string{} |
| 646 | sh.mu.Lock() |
| 647 | defer sh.mu.Unlock() |
| 648 | for k, v := range sh.env { |
| 649 | vars = append(vars, k+"="+v) |
| 650 | } |
| 651 | return vars |
| 652 | } |
| 653 | |
| 654 | // Cleanup calls Shutdown on all of the Handles currently being tracked |
Cosmos Nicolaou | bbae388 | 2014-10-02 22:58:19 -0700 | [diff] [blame] | 655 | // by the Shell and writes to stdout and stderr as per the Shutdown |
Cosmos Nicolaou | 2cb05fb | 2014-10-23 13:37:32 -0700 | [diff] [blame] | 656 | // method in the Handle interface. Cleanup returns the error from the |
| 657 | // last Shutdown that returned a non-nil error. The order that the |
| 658 | // Shutdown routines are executed is not defined. |
| 659 | func (sh *Shell) Cleanup(stdout, stderr io.Writer) error { |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 660 | sh.mu.Lock() |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 661 | verbose := sh.sessionVerbosity |
| 662 | sh.mu.Unlock() |
| 663 | |
| 664 | writeMsg := func(format string, args ...interface{}) { |
| 665 | if !verbose { |
| 666 | return |
| 667 | } |
| 668 | if stderr != nil { |
| 669 | fmt.Fprintf(stderr, format, args...) |
| 670 | } |
| 671 | } |
| 672 | |
Cosmos Nicolaou | 9fb1034 | 2015-04-12 19:37:24 -0700 | [diff] [blame] | 673 | writeMsg("---- Shell Cleanup ----\n") |
| 674 | defer writeMsg("---- Shell Cleanup Complete ----\n") |
| 675 | |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 676 | sh.mu.Lock() |
| 677 | handles := make([]Handle, 0, len(sh.lifoHandles)) |
| 678 | for _, h := range sh.lifoHandles { |
| 679 | if _, present := sh.handles[h]; present { |
| 680 | handles = append(handles, h) |
| 681 | } |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 682 | } |
| 683 | sh.handles = make(map[Handle]struct{}) |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 684 | sh.lifoHandles = nil |
Cosmos Nicolaou | 66afced | 2014-09-15 22:12:43 -0700 | [diff] [blame] | 685 | sh.mu.Unlock() |
Cosmos Nicolaou | 2cb05fb | 2014-10-23 13:37:32 -0700 | [diff] [blame] | 686 | var err error |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 687 | for i := len(handles); i > 0; i-- { |
| 688 | h := handles[i-1] |
| 689 | switch v := h.(type) { |
| 690 | case *functionHandle: |
| 691 | writeMsg("---- Cleanup calling Shutdown on function %q\n", v.name) |
| 692 | case *execHandle: |
| 693 | writeMsg("---- Cleanup calling Shutdown on command %q\n", v.name) |
| 694 | } |
| 695 | cerr := h.Shutdown(stdout, stderr) |
Cosmos Nicolaou | 2cb05fb | 2014-10-23 13:37:32 -0700 | [diff] [blame] | 696 | if cerr != nil { |
| 697 | err = cerr |
| 698 | } |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 699 | fn := func() string { |
| 700 | if cerr == nil { |
| 701 | return ": done" |
| 702 | } else { |
| 703 | return ": error: " + err.Error() |
| 704 | } |
| 705 | } |
| 706 | switch v := h.(type) { |
| 707 | case *functionHandle: |
| 708 | writeMsg("---- Shutdown on function %q%s\n", v.name, fn()) |
| 709 | case *execHandle: |
| 710 | writeMsg("---- Shutdown on command %q%s\n", v.name, fn()) |
| 711 | } |
Cosmos Nicolaou | 66afced | 2014-09-15 22:12:43 -0700 | [diff] [blame] | 712 | } |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 713 | |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 714 | if sh.cancelCtx != nil { |
Cosmos Nicolaou | 9fb1034 | 2015-04-12 19:37:24 -0700 | [diff] [blame] | 715 | writeMsg("---- Cleanup calling cancelCtx ----\n") |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 716 | // Note(ribrdb, caprita): This will shutdown the agents. If there |
| 717 | // were errors shutting down it is possible there could be child |
| 718 | // processes still running, and stopping the agent may cause |
| 719 | // additional failures. |
| 720 | sh.cancelCtx() |
Cosmos Nicolaou | 9afe120 | 2014-09-19 13:45:57 -0700 | [diff] [blame] | 721 | } |
Ryan Brown | a08a221 | 2015-01-15 15:40:10 -0800 | [diff] [blame] | 722 | os.RemoveAll(sh.tempCredDir) |
Cosmos Nicolaou | 2cb05fb | 2014-10-23 13:37:32 -0700 | [diff] [blame] | 723 | return err |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 724 | } |
| 725 | |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 726 | func (sh *Shell) setupCommandEnv(env []string) ([]string, error) { |
Cosmos Nicolaou | 2cb05fb | 2014-10-23 13:37:32 -0700 | [diff] [blame] | 727 | osmap := envSliceToMap(os.Environ()) |
| 728 | evmap := envSliceToMap(env) |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 729 | |
Cosmos Nicolaou | 2cb05fb | 2014-10-23 13:37:32 -0700 | [diff] [blame] | 730 | sh.mu.Lock() |
Cosmos Nicolaou | 2cb05fb | 2014-10-23 13:37:32 -0700 | [diff] [blame] | 731 | defer sh.mu.Unlock() |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 732 | m1 := mergeMaps(osmap, sh.env) |
| 733 | // Clear any VeyronCredentials directory in m1 as we never |
| 734 | // want the child to directly use the directory specified |
| 735 | // by the shell's VeyronCredentials. |
Asim Shankar | 59b8b69 | 2015-03-30 01:23:36 -0700 | [diff] [blame] | 736 | delete(m1, envvar.Credentials) |
Ryan Brown | 7f950a8 | 2015-04-20 18:08:39 -0700 | [diff] [blame] | 737 | delete(m1, envvar.AgentEndpoint) |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 738 | |
Cosmos Nicolaou | 2cb05fb | 2014-10-23 13:37:32 -0700 | [diff] [blame] | 739 | m2 := mergeMaps(m1, evmap) |
| 740 | r := []string{} |
| 741 | for k, v := range m2 { |
| 742 | r = append(r, k+"="+v) |
Cosmos Nicolaou | e664f3f | 2014-10-20 17:40:05 -0700 | [diff] [blame] | 743 | } |
Ankur | 9f95794 | 2014-11-24 16:34:18 -0800 | [diff] [blame] | 744 | return r, nil |
Cosmos Nicolaou | e664f3f | 2014-10-20 17:40:05 -0700 | [diff] [blame] | 745 | } |
| 746 | |
Cosmos Nicolaou | 1381f8a | 2015-03-13 09:40:34 -0700 | [diff] [blame] | 747 | // ExpectSession is a subset of v.io/x/ref/tests/expect.Session's methods |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 748 | // that are embedded in Handle. |
| 749 | type ExpectSession interface { |
| 750 | Expect(expected string) |
| 751 | ExpectEOF() error |
| 752 | ExpectRE(pattern string, n int) [][]string |
| 753 | ExpectSetEventuallyRE(expected ...string) [][]string |
| 754 | ExpectSetRE(expected ...string) [][]string |
| 755 | ExpectVar(name string) string |
| 756 | Expectf(format string, args ...interface{}) |
| 757 | ReadAll() (string, error) |
| 758 | ReadLine() string |
| 759 | SetVerbosity(bool) |
| 760 | Failed() bool |
| 761 | Error() error |
| 762 | } |
| 763 | |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 764 | // Handle represents a running command. |
| 765 | type Handle interface { |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 766 | ExpectSession |
| 767 | |
Cosmos Nicolaou | 9ca249d | 2014-09-18 15:07:12 -0700 | [diff] [blame] | 768 | // Stdout returns a reader to the running command's stdout stream. |
| 769 | Stdout() io.Reader |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 770 | |
Cosmos Nicolaou | 9ca249d | 2014-09-18 15:07:12 -0700 | [diff] [blame] | 771 | // Stderr returns a reader to the running command's stderr |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 772 | // stream. |
| 773 | Stderr() io.Reader |
| 774 | |
| 775 | // Stdin returns a writer to the running command's stdin. The |
| 776 | // convention is for commands to wait for stdin to be closed before |
| 777 | // they exit, thus the caller should close stdin when it wants the |
| 778 | // command to exit cleanly. |
Cosmos Nicolaou | 66afced | 2014-09-15 22:12:43 -0700 | [diff] [blame] | 779 | Stdin() io.Writer |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 780 | |
Cosmos Nicolaou | 66afced | 2014-09-15 22:12:43 -0700 | [diff] [blame] | 781 | // CloseStdin closes stdin in a manner that avoids a data race |
| 782 | // between any current readers on it. |
| 783 | CloseStdin() |
| 784 | |
| 785 | // Shutdown closes the Stdin for the command and then reads output |
Cosmos Nicolaou | bbae388 | 2014-10-02 22:58:19 -0700 | [diff] [blame] | 786 | // from the command's stdout until it encounters EOF, waits for |
| 787 | // the command to complete and then reads all of its stderr output. |
| 788 | // The stdout and stderr contents are written to the corresponding |
| 789 | // io.Writers if they are non-nil, otherwise the content is discarded. |
| 790 | Shutdown(stdout, stderr io.Writer) error |
Cosmos Nicolaou | cc58172 | 2014-10-07 12:45:39 -0700 | [diff] [blame] | 791 | |
| 792 | // Pid returns the pid of the process running the command |
| 793 | Pid() int |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 794 | } |
| 795 | |
| 796 | // command is used to abstract the implementations of inprocess and subprocess |
| 797 | // commands. |
| 798 | type command interface { |
Cosmos Nicolaou | 2cb05fb | 2014-10-23 13:37:32 -0700 | [diff] [blame] | 799 | envelope(sh *Shell, env []string, args ...string) ([]string, []string) |
Cosmos Nicolaou | 42a1736 | 2015-03-10 16:40:18 -0700 | [diff] [blame] | 800 | start(sh *Shell, agent *os.File, opts *StartOpts, env []string, args ...string) (Handle, error) |
Cosmos Nicolaou | 6261384 | 2014-08-25 21:57:37 -0700 | [diff] [blame] | 801 | } |