blob: 61d2adac634034cbfbc16e6afed303f3a7e1cb8c [file] [log] [blame]
Jiri Simsad7616c92015-03-24 23:44:30 -07001// Copyright 2015 The Vanadium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style
3// license that can be found in the LICENSE file.
4
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -08005// Test the device manager and related services and tools.
6//
7// By default, this script tests the device manager in a fashion amenable
8// to automatic testing: the --single_user is passed to the device
9// manager so that all device manager components run as the same user and
10// no user input (such as an agent pass phrase) is needed.
11//
Robert Kroeger02714b72015-04-14 18:02:38 -070012// This script can exercise the device manager in two different modes. It
13// can be executed like so:
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -080014//
Robert Kroeger02714b72015-04-14 18:02:38 -070015// v23 go test -v . --v23.tests
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -080016//
Robert Kroeger02714b72015-04-14 18:02:38 -070017// This will exercise the device manager's single user mode where all
18// processes run as the same invoking user.
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -080019//
Robert Kroeger02714b72015-04-14 18:02:38 -070020// Alternatively, the device manager can be executed in multiple account
21// mode by providing the --deviceuser <deviceuser> and --appuser
22// <appuser> flags. In this case, the device manager will run as user
23// <devicemgr> and the test will run applications as user <appuser>. If
24// executed in this fashion, root permissions will be required to install
25// and it may require configuring an agent passphrase. For example:
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -080026//
Robert Kroeger02714b72015-04-14 18:02:38 -070027// v23 go test -v . --v23.tests --deviceuser devicemanager --appuser vana
28//
29// NB: the accounts provided as arguments to this test must already exist.
30// Also, the --v23.tests.shell-on-fail flag is useful to enable debugging
31// output.
32
Todd Wangcd4b3cc2015-04-06 16:42:02 -070033package device_test
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -080034
35//go:generate v23 test generate .
36
37import (
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -080038 "errors"
39 "flag"
40 "fmt"
41 "io/ioutil"
42 "math/rand"
43 "os"
Robert Kroeger02714b72015-04-14 18:02:38 -070044 "os/user"
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -080045 "path/filepath"
Robert Kroeger02714b72015-04-14 18:02:38 -070046 "regexp"
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -080047 "strings"
48 "time"
49
Todd Wang8123b5e2015-05-14 18:44:43 -070050 "v.io/x/ref"
Suharsh Sivakumardcc11d72015-05-11 12:19:20 -070051 _ "v.io/x/ref/runtime/factories/generic"
Cosmos Nicolaou1381f8a2015-03-13 09:40:34 -070052 "v.io/x/ref/test/v23tests"
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -080053)
54
55var (
Robert Kroeger02714b72015-04-14 18:02:38 -070056 appUserFlag string
57 deviceUserFlag string
58 hostname string
59 errTimeout = errors.New("timeout")
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -080060)
61
62func init() {
Robert Kroeger02714b72015-04-14 18:02:38 -070063 flag.StringVar(&appUserFlag, "appuser", "", "launch apps as the specified user")
64 flag.StringVar(&deviceUserFlag, "deviceuser", "", "run the device manager as the specified user")
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -080065 name, err := os.Hostname()
66 if err != nil {
67 panic(fmt.Sprintf("Hostname() failed: %v", err))
68 }
69 hostname = name
70}
71
Asim Shankar6cc759d2015-03-14 03:31:44 -070072func V23TestDeviceManager(i *v23tests.T) {
Robert Kroeger769353e2015-05-05 19:10:07 -070073 u, err := user.Current()
74 if err != nil {
75 i.Fatalf("couldn't get the current user: %v", err)
76 }
77 testCore(i, u.Username, "", false)
78}
79
80func V23TestDeviceManagerMultiUser(i *v23tests.T) {
81 u, err := user.Current()
82 if err != nil {
83 i.Fatalf("couldn't get the current user: %v", err)
84 }
85
86 if u.Username == "veyron" && runTestOnThisPlatform {
87 // We are running on the builder so run the multiuser
88 // test with default user names. These will be created as
89 // required.
90 makeTestAccounts(i)
91 testCore(i, "vana", "devicemanager", true)
92 return
93 }
94
95 if len(deviceUserFlag) > 0 && len(appUserFlag) > 0 {
96 testCore(i, appUserFlag, deviceUserFlag, true)
97 } else {
98 i.Logf("Test skipped because running in multiuser mode requires --appuser and --deviceuser flags")
99 }
100}
101
102func testCore(i *v23tests.T, appUser, deviceUser string, withSuid bool) {
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800103 defer fmt.Fprintf(os.Stderr, "--------------- SHUTDOWN ---------------\n")
104 userFlag := "--single_user"
Robert Kroeger02714b72015-04-14 18:02:38 -0700105 tempDir := ""
Robert Kroeger769353e2015-05-05 19:10:07 -0700106
107 if withSuid {
Robert Kroeger02714b72015-04-14 18:02:38 -0700108 // When running --with_suid, TMPDIR must grant the
109 // invoking user rwx permissions and world x permissions for
110 // all parent directories back to /. Otherwise, the
111 // with_suid user will not be able to use absolute paths.
112 // On Darwin, TMPDIR defaults to a directory hieararchy
113 // in /var that is 0700. This is unworkable so force
114 // TMPDIR to /tmp in this case.
115 tempDir = "/tmp"
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800116 }
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800117
Asim Shankar6cc759d2015-03-14 03:31:44 -0700118 var (
Robert Kroeger02714b72015-04-14 18:02:38 -0700119 workDir = i.NewTempDir(tempDir)
Asim Shankar6cc759d2015-03-14 03:31:44 -0700120 binStagingDir = mkSubdir(i, workDir, "bin")
121 dmInstallDir = filepath.Join(workDir, "dm")
122
123 // All vanadium command-line utitilities will be run by a
124 // principal that has "root/alice" as its blessing.
125 // (Where "root" comes from i.Principal().BlessingStore().Default()).
126 // Create those credentials and options to use to setup the
127 // binaries with them.
128 aliceCreds, _ = i.Shell().NewChildCredentials("alice")
Todd Wang95873902015-05-22 14:21:30 -0700129 aliceOpts = i.Shell().DefaultStartOpts().ExternalProgram().WithCustomCredentials(aliceCreds)
Asim Shankar6cc759d2015-03-14 03:31:44 -0700130
131 // Build all the command-line tools and set them up to run as alice.
132 // applicationd/binaryd servers will be run by alice too.
133 namespaceBin = i.BuildV23Pkg("v.io/x/ref/cmd/namespace").WithStartOpts(aliceOpts)
Todd Wang4aaf8fa2015-04-03 18:14:26 -0700134 debugBin = i.BuildV23Pkg("v.io/x/ref/services/debug/debug").WithStartOpts(aliceOpts)
Todd Wangcd4b3cc2015-04-06 16:42:02 -0700135 deviceBin = i.BuildV23Pkg("v.io/x/ref/services/device/device").WithStartOpts(aliceOpts)
Todd Wang1f7a6c62015-04-03 17:05:09 -0700136 binaryBin = i.BuildV23Pkg("v.io/x/ref/services/binary/binary").WithStartOpts(aliceOpts)
Todd Wang159f6ee2015-04-02 18:57:46 -0700137 applicationBin = i.BuildV23Pkg("v.io/x/ref/services/application/application").WithStartOpts(aliceOpts)
Todd Wang1f7a6c62015-04-03 17:05:09 -0700138 binarydBin = i.BuildV23Pkg("v.io/x/ref/services/binary/binaryd").WithStartOpts(aliceOpts)
Todd Wang159f6ee2015-04-02 18:57:46 -0700139 applicationdBin = i.BuildV23Pkg("v.io/x/ref/services/application/applicationd").WithStartOpts(aliceOpts)
Asim Shankar6cc759d2015-03-14 03:31:44 -0700140
141 // The devicex script is not provided with any credentials, it
142 // will generate its own. This means that on "devicex start"
143 // the device will have no useful credentials and until "device
144 // claim" is invoked (as alice), it will just sit around
145 // waiting to be claimed.
146 //
147 // Other binaries, like applicationd and binaryd will be run by alice.
Bogdan Capritacb055fa2015-04-08 10:21:23 -0700148 deviceScript = i.BinaryFromPath("./devicex").WithEnv("V23_DEVICE_DIR=" + dmInstallDir)
Asim Shankar6cc759d2015-03-14 03:31:44 -0700149
150 mtName = "devices/" + hostname // Name under which the device manager will publish itself.
151 )
152
Robert Kroeger02714b72015-04-14 18:02:38 -0700153 if withSuid {
154 // In multiuser mode, deviceUserFlag needs execute access to
155 // tempDir.
156 if err := os.Chmod(workDir, 0711); err != nil {
157 i.Fatalf("os.Chmod() failed: %v", err)
158 }
159 }
160
Asim Shankarf32d24d2015-04-01 16:34:26 -0700161 v23tests.RunRootMT(i, "--v23.tcp.address=127.0.0.1:0")
Asim Shankar6cc759d2015-03-14 03:31:44 -0700162 buildAndCopyBinaries(
163 i,
164 binStagingDir,
Todd Wangcd4b3cc2015-04-06 16:42:02 -0700165 "v.io/x/ref/services/device/deviced",
Todd Wangb3511492015-04-07 23:32:34 -0700166 "v.io/x/ref/services/agent/agentd",
Todd Wang392a9cc2015-04-06 14:35:11 -0700167 "v.io/x/ref/services/device/suidhelper",
168 "v.io/x/ref/services/device/inithelper")
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800169
170 appDName := "applicationd"
171 devicedAppName := filepath.Join(appDName, "deviced", "test")
172
Robert Kroeger02714b72015-04-14 18:02:38 -0700173 deviceScriptArguments := []string{
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800174 "install",
175 binStagingDir,
Robert Kroeger02714b72015-04-14 18:02:38 -0700176 }
177
178 if withSuid {
Robert Kroeger769353e2015-05-05 19:10:07 -0700179 deviceScriptArguments = append(deviceScriptArguments, "--devuser="+deviceUser)
Robert Kroeger02714b72015-04-14 18:02:38 -0700180 } else {
181 deviceScriptArguments = append(deviceScriptArguments, userFlag)
182 }
183
184 deviceScriptArguments = append(deviceScriptArguments, []string{
185 "--origin=" + devicedAppName,
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800186 "--",
Asim Shankarf32d24d2015-04-01 16:34:26 -0700187 "--v23.tcp.address=127.0.0.1:0",
Robert Kroeger02714b72015-04-14 18:02:38 -0700188 "--neighborhood-name=" + fmt.Sprintf("%s-%d-%d", hostname, os.Getpid(), rand.Int()),
189 }...)
190
191 deviceScript.Start(deviceScriptArguments...).WaitOrDie(os.Stdout, os.Stderr)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800192 deviceScript.Start("start").WaitOrDie(os.Stdout, os.Stderr)
Bogdan Capritae8073682015-04-25 15:37:53 -0700193 // Grab the endpoint for the claimable service from the device manager's
194 // log.
195 dmLog := filepath.Join(dmInstallDir, "dmroot/device-manager/logs/deviced.INFO")
196 var claimableEP string
197 expiry := time.Now().Add(30 * time.Second)
198 for {
199 if time.Now().After(expiry) {
200 i.Fatalf("Timed out looking for claimable endpoint in %v", dmLog)
201 }
202 startLog, err := ioutil.ReadFile(dmLog)
203 if err != nil {
204 i.Logf("Couldn't read log %v: %v", dmLog, err)
205 time.Sleep(time.Second)
206 continue
207 }
208 re := regexp.MustCompile(`Unclaimed device manager \((.*)\)`)
209 matches := re.FindSubmatch(startLog)
210 if len(matches) == 0 {
211 i.Logf("Couldn't find match in %v [%v]", dmLog, startLog)
212 time.Sleep(time.Second)
213 continue
214 }
215 if len(matches) != 2 {
216 i.Fatalf("Wrong match in %v (%d) %v", dmLog, len(matches), string(matches[0]))
217 }
218 claimableEP = string(matches[1])
219 break
220 }
221 // Claim the device as "root/alice/myworkstation".
222 deviceBin.Start("claim", claimableEP, "myworkstation")
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800223
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800224 resolve := func(name string) string {
225 resolver := func() (interface{}, error) {
Asim Shankar6cc759d2015-03-14 03:31:44 -0700226 // Use Start, rather than Run, since it's ok for 'namespace resolve'
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800227 // to fail with 'name doesn't exist'
228 inv := namespaceBin.Start("resolve", name)
229 // Cleanup after ourselves to avoid leaving a ton of invocations
230 // lying around which obscure logging output.
231 defer inv.Wait(nil, os.Stderr)
232 if r := strings.TrimRight(inv.Output(), "\n"); len(r) > 0 {
233 return r, nil
234 }
235 return nil, nil
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800236 }
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800237 return i.WaitFor(resolver, 100*time.Millisecond, time.Minute).(string)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800238 }
Bogdan Capritae8073682015-04-25 15:37:53 -0700239
240 // Wait for the device manager to publish its mount table entry.
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800241 mtEP := resolve(mtName)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800242
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800243 if withSuid {
Robert Kroeger769353e2015-05-05 19:10:07 -0700244 deviceBin.Start("associate", "add", mtName+"/devmgr/device", appUser, "root/alice")
Robert Kroeger02714b72015-04-14 18:02:38 -0700245
246 aai := deviceBin.Start("associate", "list", mtName+"/devmgr/device")
Robert Kroeger769353e2015-05-05 19:10:07 -0700247 if got, expected := strings.Trim(aai.Output(), "\n "), "root/alice "+appUser; got != expected {
Robert Kroeger02714b72015-04-14 18:02:38 -0700248 i.Fatalf("association test, got %v, expected %v", got, expected)
249 }
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800250 }
251
252 // Verify the device's default blessing is as expected.
253 inv := debugBin.Start("stats", "read", mtName+"/devmgr/__debug/stats/security/principal/*/blessingstore")
Suharsh Sivakumar4bbe8ed2015-04-09 14:21:44 -0700254 inv.ExpectSetEventuallyRE(".*Default Blessings[ ]+root/alice/myworkstation$")
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800255
256 // Get the device's profile, which should be set to non-empty string
257 inv = deviceBin.Start("describe", mtName+"/devmgr/device")
258
259 parts := inv.ExpectRE(`{Profiles:map\[(.*):{}\]}`, 1)
260 expectOneMatch := func(parts [][]string) string {
261 if len(parts) != 1 || len(parts[0]) != 2 {
262 loc := v23tests.Caller(1)
263 i.Fatalf("%s: failed to match profile: %#v", loc, parts)
264 }
265 return parts[0][1]
266 }
267 deviceProfile := expectOneMatch(parts)
268 if len(deviceProfile) == 0 {
269 i.Fatalf("failed to get profile")
270 }
271
Asim Shankar6cc759d2015-03-14 03:31:44 -0700272 // Start a binaryd server that will serve the binary for the test
273 // application to be installed on the device.
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800274 binarydName := "binaryd"
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800275 binarydBin.Start(
276 "--name="+binarydName,
Suharsh Sivakumar65e38502015-04-01 18:33:18 -0700277 "--root-dir="+filepath.Join(workDir, "binstore"),
Asim Shankarf32d24d2015-04-01 16:34:26 -0700278 "--v23.tcp.address=127.0.0.1:0",
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800279 "--http=127.0.0.1:0")
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800280 sampleAppBinName := binarydName + "/testapp"
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800281 binaryBin.Run("upload", sampleAppBinName, binarydBin.Path())
Asim Shankar6cc759d2015-03-14 03:31:44 -0700282 if got := namespaceBin.Run("glob", sampleAppBinName); len(got) == 0 {
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800283 i.Fatalf("glob failed for %q", sampleAppBinName)
284 }
285
Asim Shankar6cc759d2015-03-14 03:31:44 -0700286 // Start an applicationd server that will serve the application
287 // envelope for the test application to be installed on the device.
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800288 applicationdBin.Start(
289 "--name="+appDName,
Asim Shankar6cc759d2015-03-14 03:31:44 -0700290 "--store="+mkSubdir(i, workDir, "appstore"),
Asim Shankarf32d24d2015-04-01 16:34:26 -0700291 "--v23.tcp.address=127.0.0.1:0",
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800292 )
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800293 sampleAppName := appDName + "/testapp/v0"
294 appPubName := "testbinaryd"
295 appEnvelopeFilename := filepath.Join(workDir, "app.envelope")
Suharsh Sivakumar65e38502015-04-01 18:33:18 -0700296 appEnvelope := fmt.Sprintf("{\"Title\":\"BINARYD\", \"Args\":[\"--name=%s\", \"--root-dir=./binstore\", \"--v23.tcp.address=127.0.0.1:0\", \"--http=127.0.0.1:0\"], \"Binary\":{\"File\":%q}, \"Env\":[]}", appPubName, sampleAppBinName)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800297 ioutil.WriteFile(appEnvelopeFilename, []byte(appEnvelope), 0666)
298 defer os.Remove(appEnvelopeFilename)
299
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800300 output := applicationBin.Run("put", sampleAppName, deviceProfile, appEnvelopeFilename)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800301 if got, want := output, "Application envelope added successfully."; got != want {
302 i.Fatalf("got %q, want %q", got, want)
303 }
304
305 // Verify that the envelope we uploaded shows up with glob.
306 inv = applicationBin.Start("match", sampleAppName, deviceProfile)
307 parts = inv.ExpectSetEventuallyRE(`"Title": "(.*)",`, `"File": "(.*)",`)
308 if got, want := len(parts), 2; got != want {
309 i.Fatalf("got %d, want %d", got, want)
310 }
311 for line, want := range []string{"BINARYD", sampleAppBinName} {
312 if got := parts[line][1]; got != want {
313 i.Fatalf("got %q, want %q", got, want)
314 }
315 }
316
317 // Install the app on the device.
318 inv = deviceBin.Start("install", mtName+"/devmgr/apps", sampleAppName)
Bogdan Caprita2b050322015-04-17 09:04:03 -0700319 installationName := inv.ReadLine()
320 if installationName == "" {
321 i.Fatalf("got empty installation name from install")
322 }
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800323
324 // Verify that the installation shows up when globbing the device manager.
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800325 output = namespaceBin.Run("glob", mtName+"/devmgr/apps/BINARYD/*")
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800326 if got, want := output, installationName; got != want {
327 i.Fatalf("got %q, want %q", got, want)
328 }
329
330 // Start an instance of the app, granting it blessing extension myapp.
Bogdan Caprita2b050322015-04-17 09:04:03 -0700331 inv = deviceBin.Start("instantiate", installationName, "myapp")
332 instanceName := inv.ReadLine()
333 if instanceName == "" {
334 i.Fatalf("got empty instance name from new")
335 }
336 deviceBin.Start("run", instanceName)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800337
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800338 resolve(mtName + "/" + appPubName)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800339
340 // Verify that the instance shows up when globbing the device manager.
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800341 output = namespaceBin.Run("glob", mtName+"/devmgr/apps/BINARYD/*/*")
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800342 if got, want := output, instanceName; got != want {
343 i.Fatalf("got %q, want %q", got, want)
344 }
345
Robert Kroeger02714b72015-04-14 18:02:38 -0700346 inv = debugBin.Start("stats", "read", instanceName+"/stats/system/pid")
347 pid := inv.ExpectRE("[0-9]+$", 1)[0][0]
348 uname, err := getUserForPid(i, pid)
349 if err != nil {
350 i.Errorf("getUserForPid could not determine the user running pid %v", pid)
351 }
Robert Kroeger769353e2015-05-05 19:10:07 -0700352 if uname != appUser {
353 i.Errorf("app expected to be running as %v but is running as %v", appUser, uname)
Robert Kroeger02714b72015-04-14 18:02:38 -0700354 }
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800355
356 // Verify the app's default blessing.
357 inv = debugBin.Start("stats", "read", instanceName+"/stats/security/principal/*/blessingstore")
Suharsh Sivakumar4bbe8ed2015-04-09 14:21:44 -0700358 inv.ExpectSetEventuallyRE(".*Default Blessings[ ]+root/alice/myapp$")
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800359
Bogdan Caprita2b050322015-04-17 09:04:03 -0700360 // Kill and delete the instance.
361 deviceBin.Run("kill", instanceName)
362 deviceBin.Run("delete", instanceName)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800363
364 // Verify that logs, but not stats, show up when globbing the
Bogdan Caprita2b050322015-04-17 09:04:03 -0700365 // not-running instance.
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800366 if output = namespaceBin.Run("glob", instanceName+"/stats/..."); len(output) > 0 {
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800367 i.Fatalf("no output expected for glob %s/stats/..., got %q", output, instanceName)
368 }
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800369 if output = namespaceBin.Run("glob", instanceName+"/logs/..."); len(output) == 0 {
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800370 i.Fatalf("output expected for glob %s/logs/..., but got none", instanceName)
371 }
372
373 // Upload a deviced binary
374 devicedAppBinName := binarydName + "/deviced"
Todd Wangcd4b3cc2015-04-06 16:42:02 -0700375 binaryBin.Run("upload", devicedAppBinName, i.BuildGoPkg("v.io/x/ref/services/device/deviced").Path())
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800376
Asim Shankar6cc759d2015-03-14 03:31:44 -0700377 // Upload a device manager envelope.
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800378 devicedEnvelopeFilename := filepath.Join(workDir, "deviced.envelope")
Asim Shankar6cc759d2015-03-14 03:31:44 -0700379 devicedEnvelope := fmt.Sprintf("{\"Title\":\"device manager\", \"Binary\":{\"File\":%q}}", devicedAppBinName)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800380 ioutil.WriteFile(devicedEnvelopeFilename, []byte(devicedEnvelope), 0666)
381 defer os.Remove(devicedEnvelopeFilename)
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800382 applicationBin.Run("put", devicedAppName, deviceProfile, devicedEnvelopeFilename)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800383
384 // Update the device manager.
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800385 deviceBin.Run("update", mtName+"/devmgr/device")
Bogdan Capritae8073682015-04-25 15:37:53 -0700386 resolveChange := func(name, old string) string {
387 resolver := func() (interface{}, error) {
388 inv := namespaceBin.Start("resolve", name)
389 defer inv.Wait(nil, os.Stderr)
390 if r := strings.TrimRight(inv.Output(), "\n"); len(r) > 0 && r != old {
391 return r, nil
392 }
393 return nil, nil
394 }
395 return i.WaitFor(resolver, 100*time.Millisecond, time.Minute).(string)
396 }
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800397 mtEP = resolveChange(mtName, mtEP)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800398
399 // Verify that device manager's mounttable is still published under the
400 // expected name (hostname).
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800401 if namespaceBin.Run("glob", mtName) == "" {
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800402 i.Fatalf("failed to glob %s", mtName)
403 }
404
405 // Revert the device manager
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800406 deviceBin.Run("revert", mtName+"/devmgr/device")
407 mtEP = resolveChange(mtName, mtEP)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800408
409 // Verify that device manager's mounttable is still published under the
410 // expected name (hostname).
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800411 if namespaceBin.Run("glob", mtName) == "" {
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800412 i.Fatalf("failed to glob %s", mtName)
413 }
414
415 // Verify that the local mounttable exists, and that the device manager,
416 // the global namespace, and the neighborhood are mounted on it.
417 n := mtEP + "/devmgr"
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800418 if namespaceBin.Run("resolve", n) == "" {
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800419 i.Fatalf("failed to resolve %s", n)
420 }
421 n = mtEP + "/nh"
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800422 if namespaceBin.Run("resolve", n) == "" {
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800423 i.Fatalf("failed to resolve %s", n)
424 }
Todd Wang8123b5e2015-05-14 18:44:43 -0700425 namespaceRoot, _ := i.GetVar(ref.EnvNamespacePrefix)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800426 n = mtEP + "/global"
Asim Shankar43d1f932015-03-24 20:57:56 -0700427 if got, want := namespaceBin.Run("resolve", n), namespaceRoot; got != want {
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800428 i.Fatalf("got %q, want %q", got, want)
429 }
430
Bogdan Caprita2b050322015-04-17 09:04:03 -0700431 // Kill the device manager (which causes it to be restarted), wait for
432 // the endpoint to change.
433 deviceBin.Run("kill", mtName+"/devmgr/device")
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800434 mtEP = resolveChange(mtName, mtEP)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800435
Bogdan Caprita2b050322015-04-17 09:04:03 -0700436 // Shut down the device manager.
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800437 deviceScript.Run("stop")
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800438
439 // Wait for the mounttable entry to go away.
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800440 resolveGone := func(name string) string {
441 resolver := func() (interface{}, error) {
442 inv := namespaceBin.Start("resolve", name)
443 defer inv.Wait(nil, os.Stderr)
444 if r := strings.TrimRight(inv.Output(), "\n"); len(r) == 0 {
445 return r, nil
446 }
447 return nil, nil
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800448 }
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800449 return i.WaitFor(resolver, 100*time.Millisecond, time.Minute).(string)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800450 }
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800451 resolveGone(mtName)
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800452
Robert Kroeger02714b72015-04-14 18:02:38 -0700453 var fi []os.FileInfo
454
455 // This doesn't work in multiuser mode because dmInstallDir is
456 // owned by the device manager user and unreadable by the user
457 // running this test.
458 if !withSuid {
459 fi, err = ioutil.ReadDir(dmInstallDir)
460 if err != nil {
461 i.Fatalf("failed to readdir for %q: %v", dmInstallDir, err)
462 }
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800463 }
464
Cosmos Nicolaouabbcb202015-02-26 11:24:52 -0800465 deviceScript.Run("uninstall")
Cosmos Nicolaou93dd88b2015-02-19 15:10:53 -0800466
467 fi, err = ioutil.ReadDir(dmInstallDir)
468 if err == nil || len(fi) > 0 {
469 i.Fatalf("managed to read %d entries from %q", len(fi), dmInstallDir)
470 }
471 if err != nil && !strings.Contains(err.Error(), "no such file or directory") {
472 i.Fatalf("wrong error: %v", err)
473 }
474}
Asim Shankar6cc759d2015-03-14 03:31:44 -0700475
476func buildAndCopyBinaries(i *v23tests.T, destinationDir string, packages ...string) {
477 var args []string
478 for _, pkg := range packages {
479 args = append(args, i.BuildGoPkg(pkg).Path())
480 }
481 args = append(args, destinationDir)
482 i.BinaryFromPath("/bin/cp").Start(args...).WaitOrDie(os.Stdout, os.Stderr)
483}
484
485func mkSubdir(i *v23tests.T, parent, child string) string {
486 dir := filepath.Join(parent, child)
487 if err := os.Mkdir(dir, 0755); err != nil {
488 i.Fatalf("failed to create %q: %v", dir, err)
489 }
490 return dir
491}
Robert Kroeger02714b72015-04-14 18:02:38 -0700492
493var re = regexp.MustCompile("[ \t]+")
494
495// getUserForPid determines the username running process pid.
496func getUserForPid(i *v23tests.T, pid string) (string, error) {
497 pidString := i.BinaryFromPath("/bin/ps").Start(psFlags).Output()
498 for _, line := range strings.Split(pidString, "\n") {
499 fields := re.Split(line, -1)
500 if len(fields) > 1 && pid == fields[1] {
501 return fields[0], nil
502 }
503 }
504 return "", fmt.Errorf("Couldn't determine the user for pid %s", pid)
505}