blob: 170d8cc72308e1095bf166d2a231d888b8bc52d2 [file] [log] [blame]
Bogdan Caprita5420f172014-10-10 15:58:14 -07001// TODO(caprita): This file is becoming unmanageable; split into several test
2// files.
Robert Kroegeracc778b2014-11-03 17:17:21 -08003// TODO(rjkroege): Add a more extensive unit test case to exercise ACL logic.
Bogdan Caprita5420f172014-10-10 15:58:14 -07004
Jiri Simsa70c32052014-06-18 11:38:21 -07005package impl_test
Jiri Simsa5293dcb2014-05-10 09:56:38 -07006
7import (
Asim Shankar88292912014-10-09 19:41:07 -07008 "bytes"
Bogdan Caprita1e379132014-08-03 23:02:31 -07009 "crypto/md5"
10 "encoding/base64"
Asim Shankar88292912014-10-09 19:41:07 -070011 "encoding/hex"
Robert Kroeger627a1152014-10-01 14:57:55 -070012 "encoding/json"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070013 "fmt"
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070014 "io"
Jiri Simsa70c32052014-06-18 11:38:21 -070015 "io/ioutil"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070016 "os"
Bogdan Capritac87a9142014-07-21 10:38:13 -070017 goexec "os/exec"
Robert Kroeger627a1152014-10-01 14:57:55 -070018 "os/user"
Robin Thellend9e523a62014-10-07 16:19:53 -070019 "path"
Jiri Simsa70c32052014-06-18 11:38:21 -070020 "path/filepath"
Robin Thellend09929f42014-10-01 10:18:13 -070021 "reflect"
Robin Thellend4c5266e2014-10-27 13:19:29 -070022 "regexp"
Robin Thellend09929f42014-10-01 10:18:13 -070023 "sort"
Bogdan Caprita78b62162014-08-21 15:35:08 -070024 "strconv"
Jiri Simsa70c32052014-06-18 11:38:21 -070025 "strings"
Bogdan Caprita78b62162014-08-21 15:35:08 -070026 "syscall"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070027 "testing"
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070028 "time"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070029
Jiri Simsa519c5072014-09-17 21:37:57 -070030 "veyron.io/veyron/veyron2"
31 "veyron.io/veyron/veyron2/ipc"
32 "veyron.io/veyron/veyron2/naming"
33 "veyron.io/veyron/veyron2/rt"
34 "veyron.io/veyron/veyron2/security"
35 "veyron.io/veyron/veyron2/services/mgmt/application"
Robin Thellend4c5266e2014-10-27 13:19:29 -070036 "veyron.io/veyron/veyron2/services/mgmt/logreader"
Jiri Simsa519c5072014-09-17 21:37:57 -070037 "veyron.io/veyron/veyron2/services/mgmt/node"
Robin Thellendb9dd9bb2014-10-29 13:54:08 -070038 "veyron.io/veyron/veyron2/services/mgmt/pprof"
39 "veyron.io/veyron/veyron2/services/mgmt/stats"
Jiri Simsa519c5072014-09-17 21:37:57 -070040 "veyron.io/veyron/veyron2/verror"
41 "veyron.io/veyron/veyron2/vlog"
Robin Thellendb9dd9bb2014-10-29 13:54:08 -070042 "veyron.io/veyron/veyron2/vom"
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070043
44 "veyron.io/veyron/veyron/lib/expect"
45 "veyron.io/veyron/veyron/lib/modules"
46 "veyron.io/veyron/veyron/lib/signals"
47 "veyron.io/veyron/veyron/lib/testutil"
48 tsecurity "veyron.io/veyron/veyron/lib/testutil/security"
49 vsecurity "veyron.io/veyron/veyron/security"
50 "veyron.io/veyron/veyron/services/mgmt/node/config"
51 "veyron.io/veyron/veyron/services/mgmt/node/impl"
52 suidhelper "veyron.io/veyron/veyron/services/mgmt/suidhelper/impl"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070053)
54
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070055const (
56 execScriptCmd = "execScriptCmd"
57 nodeManagerCmd = "nodeManager"
58 appCmd = "app"
59 installerCmd = "installer"
60)
Robert Kroegerdd07b362014-09-18 17:34:42 -070061
62func init() {
Robin Thellendb9dd9bb2014-10-29 13:54:08 -070063 // TODO(rthellend): Remove when vom2 is ready.
Todd Wang1aa57692014-11-11 13:53:29 -080064 vom.Register(&naming.VDLMountedServer{})
Robin Thellendb9dd9bb2014-10-29 13:54:08 -070065
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070066 modules.RegisterChild(execScriptCmd, "", execScript)
67 modules.RegisterChild(nodeManagerCmd, "", nodeManager)
68 modules.RegisterChild(appCmd, "", app)
69 modules.RegisterChild(installerCmd, "", install)
70 testutil.Init()
71
72 if modules.IsModulesProcess() {
Robert Kroegerdd07b362014-09-18 17:34:42 -070073 return
74 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070075 initRT()
76}
Robert Kroegerdd07b362014-09-18 17:34:42 -070077
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070078func initRT() {
Asim Shankar7b5c94a2014-10-28 21:42:56 -070079 rt.Init()
Robert Kroegerdd07b362014-09-18 17:34:42 -070080 // Disable the cache because we will be manipulating/using the namespace
81 // across multiple processes and want predictable behaviour without
82 // relying on timeouts.
83 rt.R().Namespace().CacheCtl(naming.DisableCache(true))
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070084}
85
86// TestHelperProcess is the entrypoint for the modules commands in a
87// a test subprocess.
88func TestHelperProcess(t *testing.T) {
89 initRT()
90 modules.DispatchInTest()
Robert Kroegerdd07b362014-09-18 17:34:42 -070091}
92
93// TestSuidHelper is testing boilerplate for suidhelper that does not
94// invoke rt.Init() because the suidhelper is not a Veyron application.
95func TestSuidHelper(t *testing.T) {
96 if os.Getenv("VEYRON_SUIDHELPER_TEST") != "1" {
97 return
98 }
99 vlog.VI(1).Infof("TestSuidHelper starting")
100
101 if err := suidhelper.Run(os.Environ()); err != nil {
102 vlog.Fatalf("Failed to Run() setuidhelper: %v", err)
103 }
Bogdan Capritac87a9142014-07-21 10:38:13 -0700104}
105
106// execScript launches the script passed as argument.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700107func execScript(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error {
108 args = args[1:]
Bogdan Capritac87a9142014-07-21 10:38:13 -0700109 if want, got := 1, len(args); want != got {
110 vlog.Fatalf("execScript expected %d arguments, got %d instead", want, got)
111 }
112 script := args[0]
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700113 osenv := []string{}
114 if env["PAUSE_BEFORE_STOP"] == "1" {
115 osenv = append(osenv, "PAUSE_BEFORE_STOP=1")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700116 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700117
Bogdan Capritac87a9142014-07-21 10:38:13 -0700118 cmd := goexec.Cmd{
119 Path: script,
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700120 Env: osenv,
121 Stdin: stdin,
122 Stderr: stderr,
123 Stdout: stdout,
Bogdan Capritac87a9142014-07-21 10:38:13 -0700124 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700125
126 return cmd.Run()
Bogdan Capritac87a9142014-07-21 10:38:13 -0700127}
128
129// nodeManager sets up a node manager server. It accepts the name to publish
130// the server under as an argument. Additional arguments can optionally specify
131// node manager config settings.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700132func nodeManager(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error {
133 args = args[1:]
Bogdan Capritac87a9142014-07-21 10:38:13 -0700134 if len(args) == 0 {
135 vlog.Fatalf("nodeManager expected at least an argument")
136 }
137 publishName := args[0]
Bogdan Caprita78b62162014-08-21 15:35:08 -0700138 args = args[1:]
Bogdan Capritac87a9142014-07-21 10:38:13 -0700139
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700140 defer fmt.Fprintf(stdout, "%v terminating\n", publishName)
141 defer vlog.VI(1).Infof("%v terminating", publishName)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700142 defer rt.R().Cleanup()
143 server, endpoint := newServer()
144 defer server.Stop()
David Why Use Two When One Will Do Presotto8b4dbbf2014-11-06 10:50:14 -0800145 name := naming.JoinAddressName(endpoint, "")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700146 vlog.VI(1).Infof("Node manager name: %v", name)
147
148 // Satisfy the contract described in doc.go by passing the config state
149 // through to the node manager dispatcher constructor.
150 configState, err := config.Load()
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700151 if err != nil {
Bogdan Capritac87a9142014-07-21 10:38:13 -0700152 vlog.Fatalf("Failed to decode config state: %v", err)
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700153 }
Bogdan Capritac87a9142014-07-21 10:38:13 -0700154 configState.Name = name
155
156 // This exemplifies how to override or set specific config fields, if,
157 // for example, the node manager is invoked 'by hand' instead of via a
158 // script prepared by a previous version of the node manager.
Bogdan Caprita78b62162014-08-21 15:35:08 -0700159 if len(args) > 0 {
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700160 if want, got := 4, len(args); want != got {
Bogdan Capritac87a9142014-07-21 10:38:13 -0700161 vlog.Fatalf("expected %d additional arguments, got %d instead", want, got)
162 }
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700163 configState.Root, configState.Helper, configState.Origin, configState.CurrentLink = args[0], args[1], args[2], args[3]
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700164 }
Gautham82bb9952014-08-28 14:11:51 -0700165 dispatcher, err := impl.NewDispatcher(configState)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700166 if err != nil {
167 vlog.Fatalf("Failed to create node manager dispatcher: %v", err)
168 }
Cosmos Nicolaou92dba582014-11-05 17:24:10 -0800169 if err := server.ServeDispatcher(publishName, dispatcher); err != nil {
Bogdan Capritac87a9142014-07-21 10:38:13 -0700170 vlog.Fatalf("Serve(%v) failed: %v", publishName, err)
171 }
Bogdan Capritac87a9142014-07-21 10:38:13 -0700172 impl.InvokeCallback(name)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700173
174 fmt.Fprintf(stdout, "ready:%d\n", os.Getpid())
Bogdan Capritac87a9142014-07-21 10:38:13 -0700175
Bogdan Capritac87a9142014-07-21 10:38:13 -0700176 <-signals.ShutdownOnSignals()
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700177
178 if val, present := env["PAUSE_BEFORE_STOP"]; present && val == "1" {
179 modules.WaitForEOF(stdin)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700180 }
Bogdan Caprita78b62162014-08-21 15:35:08 -0700181 if dispatcher.Leaking() {
182 vlog.Fatalf("node manager leaking resources")
183 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700184 return nil
185}
186
187// install installs the node manager.
188func install(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error {
189 args = args[1:]
190 // args[0] is the entrypoint for the binary to be run from the shell script
191 // that SelfInstall will write out.
192 entrypoint := args[0]
Cosmos Nicolaoud4f00562014-11-17 20:35:48 -0800193 // Overwrite the entrypoint in our environment (i.e. the one
194 // that got us here), with the one we want written out in the shell
195 // script.
196 osenv := modules.SetEntryPoint(env, entrypoint)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700197 if args[1] != "--" {
198 vlog.Fatalf("expected '--' immediately following command name")
199 }
200 args = append([]string{""}, args[2:]...) // skip the cmd and '--'
201 if err := impl.SelfInstall(args, osenv); err != nil {
202 vlog.Fatalf("SelfInstall failed: %v", err)
203 return err
204 }
205 return nil
Bogdan Capritac87a9142014-07-21 10:38:13 -0700206}
207
Bogdan Caprita1e379132014-08-03 23:02:31 -0700208// appService defines a test service that the test app should be running.
209// TODO(caprita): Use this to make calls to the app and verify how Suspend/Stop
210// interact with an active service.
211type appService struct{}
212
Todd Wang1fe7cdd2014-11-12 12:51:49 -0800213func (appService) Echo(_ ipc.ServerContext, message string) (string, error) {
Bogdan Caprita1e379132014-08-03 23:02:31 -0700214 return message, nil
215}
216
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700217func ping() {
Robert Kroeger627a1152014-10-01 14:57:55 -0700218 if call, err := rt.R().Client().StartCall(rt.R().NewContext(), "pingserver", "Ping", []interface{}{os.Getenv(suidhelper.SavedArgs)}); err != nil {
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700219 vlog.Fatalf("StartCall failed: %v", err)
Todd Wang702385a2014-11-07 01:54:08 -0800220 } else if err := call.Finish(); err != nil {
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700221 vlog.Fatalf("Finish failed: %v", err)
222 }
223}
224
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700225func app(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error {
226 args = args[1:]
Bogdan Caprita1e379132014-08-03 23:02:31 -0700227 if expected, got := 1, len(args); expected != got {
228 vlog.Fatalf("Unexpected number of arguments: expected %d, got %d", expected, got)
229 }
230 publishName := args[0]
231
232 defer rt.R().Cleanup()
233 server, _ := newServer()
234 defer server.Stop()
Cosmos Nicolaou92dba582014-11-05 17:24:10 -0800235 if err := server.Serve(publishName, new(appService), nil); err != nil {
Bogdan Caprita1e379132014-08-03 23:02:31 -0700236 vlog.Fatalf("Serve(%v) failed: %v", publishName, err)
237 }
Cosmos Nicolaoue3391532014-11-25 19:08:32 -0800238 // Some of our tests look for log files, so make sure they are flushed
239 // to ensure that at least the files exist.
240 vlog.FlushLog()
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700241 ping()
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700242
Bogdan Caprita1e379132014-08-03 23:02:31 -0700243 <-signals.ShutdownOnSignals()
244 if err := ioutil.WriteFile("testfile", []byte("goodbye world"), 0600); err != nil {
245 vlog.Fatalf("Failed to write testfile: %v", err)
246 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700247 return nil
Bogdan Caprita1e379132014-08-03 23:02:31 -0700248}
249
Robert Kroegerdd07b362014-09-18 17:34:42 -0700250// TODO(rjkroege): generateNodeManagerScript and generateSuidHelperScript have code
251// similarity that might benefit from refactoring.
252// generateNodeManagerScript is very similar in behavior to generateScript in node_invoker.go.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700253// However, we chose to re-implement it here for two reasons: (1) avoid making
254// generateScript public; and (2) how the test choses to invoke the node manager
255// subprocess the first time should be independent of how node manager
256// implementation sets up its updated versions.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700257func generateNodeManagerScript(t *testing.T, root string, args, env []string) string {
258 env = impl.VeyronEnvironment(env)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700259 output := "#!/bin/bash\n"
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700260 output += strings.Join(config.QuoteEnv(env), " ") + " "
261 output += strings.Join(args, " ")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700262 if err := os.MkdirAll(filepath.Join(root, "factory"), 0755); err != nil {
263 t.Fatalf("MkdirAll failed: %v", err)
264 }
265 // Why pigeons? To show that the name we choose for the initial script
266 // doesn't matter and in particular is independent of how node manager
267 // names its updated version scripts (noded.sh).
268 path := filepath.Join(root, "factory", "pigeons.sh")
269 if err := ioutil.WriteFile(path, []byte(output), 0755); err != nil {
270 t.Fatalf("WriteFile(%v) failed: %v", path, err)
271 }
272 return path
273}
274
Robert Kroeger94ec7562014-10-28 17:58:44 -0700275/// readPID waits for the "ready:<PID>" line from the child and parses out the
Bogdan Caprita78b62162014-08-21 15:35:08 -0700276// PID of the child.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700277func readPID(t *testing.T, s *expect.Session) int {
278 m := s.ExpectRE("ready:([0-9]+)", -1)
279 if len(m) == 1 && len(m[0]) == 2 {
280 pid, err := strconv.Atoi(m[0][1])
281 if err != nil {
282 t.Fatalf("%s: Atoi(%q) failed: %v", loc(1), m[0][1], err)
283 }
284 return pid
Bogdan Caprita78b62162014-08-21 15:35:08 -0700285 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700286 t.Fatalf("%s: failed to extract pid: %v", loc(1), m)
287 return 0
Bogdan Caprita78b62162014-08-21 15:35:08 -0700288}
289
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700290// TestNodeManagerUpdateAndRevert makes the node manager go through the
291// motions of updating itself to newer versions (twice), and reverting itself
292// back (twice). It also checks that update and revert fail when they're
293// supposed to. The initial node manager is started 'by hand' via a module
294// command. Further versions are started through the soft link that the node
295// manager itself updates.
Bogdan Caprita1e379132014-08-03 23:02:31 -0700296func TestNodeManagerUpdateAndRevert(t *testing.T) {
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700297 sh, deferFn := createShellAndMountTable(t)
298 defer deferFn()
299
300 // Set up mock application and binary repositories.
301 envelope, cleanup := startMockRepos(t)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700302 defer cleanup()
Bogdan Capritac87a9142014-07-21 10:38:13 -0700303
Bogdan Caprita732e5112014-09-23 17:20:41 -0700304 root, cleanup := setupRootDir(t)
Bogdan Caprita080a7302014-08-20 15:35:37 -0700305 defer cleanup()
Jiri Simsae0fc61a2014-07-30 14:41:55 -0700306
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700307 // Current link does not have to live in the root dir, but it's
308 // convenient to put it there so we have everything in one place.
309 currLink := filepath.Join(root, "current_link")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700310
Bogdan Caprita26929102014-11-07 11:56:56 -0800311 crDir, crEnv := credentialsForChild("nodemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700312 defer os.RemoveAll(crDir)
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700313 nmArgs := []string{"factoryNM", root, "unused_helper", mockApplicationRepoName, currLink}
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700314 args, env := sh.CommandEnvelope(nodeManagerCmd, crEnv, nmArgs...)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700315
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700316 scriptPathFactory := generateNodeManagerScript(t, root, args, env)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700317
318 if err := os.Symlink(scriptPathFactory, currLink); err != nil {
319 t.Fatalf("Symlink(%q, %q) failed: %v", scriptPathFactory, currLink, err)
320 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700321
Bogdan Capritac87a9142014-07-21 10:38:13 -0700322 // We instruct the initial node manager that we run to pause before
323 // stopping its service, so that we get a chance to verify that
324 // attempting an update while another one is ongoing will fail.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700325 nmPauseBeforeStopEnv := append(crEnv, "PAUSE_BEFORE_STOP=1")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700326
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700327 // Start the initial version of the node manager, the so-called
328 // "factory" version. We use the modules-generated command to start it.
329 // We could have also used the scriptPathFactory to start it, but
Bogdan Capritac87a9142014-07-21 10:38:13 -0700330 // this demonstrates that the initial node manager could be started by
331 // hand as long as the right initial configuration is passed into the
332 // node manager implementation.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700333 nmh, nms := runShellCommand(t, sh, nmPauseBeforeStopEnv, nodeManagerCmd, nmArgs...)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700334 defer func() {
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700335 syscall.Kill(nmh.Pid(), syscall.SIGINT)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700336 }()
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700337
338 readPID(t, nms)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700339 resolve(t, "factoryNM", 1) // Verify the node manager has published itself.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700340
341 // Simulate an invalid envelope in the application repository.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700342 *envelope = envelopeFromShell(sh, nmPauseBeforeStopEnv, nodeManagerCmd, "bogus", nmArgs...)
343
Tilak Sharma492e8e92014-09-18 10:58:14 -0700344 updateNodeExpectError(t, "factoryNM", verror.BadArg) // Incorrect title.
345 revertNodeExpectError(t, "factoryNM", verror.NoExist) // No previous version available.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700346
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700347 // Set up a second version of the node manager. The information in the
348 // envelope will be used by the node manager to stage the next version.
Bogdan Caprita26929102014-11-07 11:56:56 -0800349 crDir, crEnv = credentialsForChild("nodemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700350 defer os.RemoveAll(crDir)
351 *envelope = envelopeFromShell(sh, crEnv, nodeManagerCmd, application.NodeManagerTitle, "v2NM")
Bogdan Caprita48bbd142014-09-04 16:07:23 -0700352 updateNode(t, "factoryNM")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700353
354 // Current link should have been updated to point to v2.
355 evalLink := func() string {
356 path, err := filepath.EvalSymlinks(currLink)
357 if err != nil {
358 t.Fatalf("EvalSymlinks(%v) failed: %v", currLink, err)
359 }
360 return path
361 }
362 scriptPathV2 := evalLink()
363 if scriptPathFactory == scriptPathV2 {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700364 t.Fatalf("current link didn't change")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700365 }
366
Bogdan Caprita48bbd142014-09-04 16:07:23 -0700367 updateNodeExpectError(t, "factoryNM", verror.Exists) // Update already in progress.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700368
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700369 nmh.CloseStdin()
370
371 nms.Expect("factoryNM terminating")
372 nmh.Shutdown(os.Stderr, os.Stderr)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700373
374 // A successful update means the node manager has stopped itself. We
375 // relaunch it from the current link.
Bogdan Capritabce0a632014-09-03 16:15:26 -0700376 resolveExpectNotFound(t, "v2NM") // Ensure a clean slate.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700377
378 nmh, nms = runShellCommand(t, sh, nil, execScriptCmd, currLink)
379
380 readPID(t, nms)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700381 resolve(t, "v2NM", 1) // Current link should have been launching v2.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700382
383 // Try issuing an update without changing the envelope in the application
384 // repository: this should fail, and current link should be unchanged.
Benjamin Prosnitzb8178d32014-11-04 10:24:12 -0800385 updateNodeExpectError(t, "v2NM", naming.ErrNoSuchName.ID)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700386 if evalLink() != scriptPathV2 {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700387 t.Fatalf("script changed")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700388 }
389
390 // Create a third version of the node manager and issue an update.
Bogdan Caprita26929102014-11-07 11:56:56 -0800391 crDir, crEnv = credentialsForChild("nodemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700392 defer os.RemoveAll(crDir)
Bogdan Caprita57ca0ff2014-11-18 10:09:01 -0800393 *envelope = envelopeFromShell(sh, crEnv, nodeManagerCmd, application.NodeManagerTitle, "v3NM")
Bogdan Caprita48bbd142014-09-04 16:07:23 -0700394 updateNode(t, "v2NM")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700395
396 scriptPathV3 := evalLink()
397 if scriptPathV3 == scriptPathV2 {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700398 t.Fatalf("current link didn't change")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700399 }
400
Bogdan Caprita57ca0ff2014-11-18 10:09:01 -0800401 nms.Expect("v2NM terminating")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700402
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700403 nmh.Shutdown(os.Stderr, os.Stderr)
404
405 resolveExpectNotFound(t, "v3NM") // Ensure a clean slate.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700406
407 // Re-lanuch the node manager from current link.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700408 // We instruct the node manager to pause before stopping its server, so
409 // that we can verify that a second revert fails while a revert is in
410 // progress.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700411 nmh, nms = runShellCommand(t, sh, nmPauseBeforeStopEnv, execScriptCmd, currLink)
412
413 readPID(t, nms)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700414 resolve(t, "v3NM", 1) // Current link should have been launching v3.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700415
416 // Revert the node manager to its previous version (v2).
Bogdan Caprita48bbd142014-09-04 16:07:23 -0700417 revertNode(t, "v3NM")
418 revertNodeExpectError(t, "v3NM", verror.Exists) // Revert already in progress.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700419 nmh.CloseStdin()
420 nms.Expect("v3NM terminating")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700421 if evalLink() != scriptPathV2 {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700422 t.Fatalf("current link was not reverted correctly")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700423 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700424 nmh.Shutdown(os.Stderr, os.Stderr)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700425
Bogdan Capritabce0a632014-09-03 16:15:26 -0700426 resolveExpectNotFound(t, "v2NM") // Ensure a clean slate.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700427
428 nmh, nms = runShellCommand(t, sh, nil, execScriptCmd, currLink)
429 readPID(t, nms)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700430 resolve(t, "v2NM", 1) // Current link should have been launching v2.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700431
432 // Revert the node manager to its previous version (factory).
Bogdan Caprita48bbd142014-09-04 16:07:23 -0700433 revertNode(t, "v2NM")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700434 nms.Expect("v2NM terminating")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700435 if evalLink() != scriptPathFactory {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700436 t.Fatalf("current link was not reverted correctly")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700437 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700438 nmh.Shutdown(os.Stderr, os.Stderr)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700439
Bogdan Capritabce0a632014-09-03 16:15:26 -0700440 resolveExpectNotFound(t, "factoryNM") // Ensure a clean slate.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700441 nmh, nms = runShellCommand(t, sh, nil, execScriptCmd, currLink)
442 pid := readPID(t, nms)
443 resolve(t, "factoryNM", 1) // Current link should have been launching
Bogdan Caprita78b62162014-08-21 15:35:08 -0700444 syscall.Kill(pid, syscall.SIGINT)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700445 nms.Expect("factoryNM terminating")
446 nms.ExpectEOF()
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700447}
Bogdan Caprita1e379132014-08-03 23:02:31 -0700448
Bogdan Caprita26929102014-11-07 11:56:56 -0800449type pingServer chan<- string
Bogdan Caprita1e379132014-08-03 23:02:31 -0700450
Bogdan Caprita916e99f2014-11-24 15:47:19 -0800451// TODO(caprita): Set the timeout in a more principled manner.
452const pingTimeout = 20 * time.Second
453
Todd Wang1fe7cdd2014-11-12 12:51:49 -0800454func (p pingServer) Ping(_ ipc.ServerContext, arg string) {
Robert Kroeger627a1152014-10-01 14:57:55 -0700455 p <- arg
456}
Bogdan Caprita1e379132014-08-03 23:02:31 -0700457
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700458// setupPingServer creates a server listening for a ping from a child app; it
459// returns a channel on which the app's ping message is returned, and a cleanup
460// function.
461func setupPingServer(t *testing.T) (<-chan string, func()) {
462 server, _ := newServer()
463 pingCh := make(chan string, 1)
Bogdan Caprita26929102014-11-07 11:56:56 -0800464 if err := server.Serve("pingserver", pingServer(pingCh), nil); err != nil {
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700465 t.Fatalf("Serve(%q, <dispatcher>) failed: %v", "pingserver", err)
466 }
467 return pingCh, func() {
468 if err := server.Stop(); err != nil {
469 t.Fatalf("Stop() failed: %v", err)
470 }
471 }
472}
473
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700474func verifyAppWorkspace(t *testing.T, root, appID, instanceID string) {
Bogdan Caprita1e379132014-08-03 23:02:31 -0700475 // HACK ALERT: for now, we peek inside the node manager's directory
476 // structure (which ought to be opaque) to check for what the app has
477 // written to its local root.
478 //
479 // TODO(caprita): add support to node manager to browse logs/app local
480 // root.
481 applicationDirName := func(title string) string {
482 h := md5.New()
483 h.Write([]byte(title))
484 hash := strings.TrimRight(base64.URLEncoding.EncodeToString(h.Sum(nil)), "=")
485 return "app-" + hash
486 }
487 components := strings.Split(appID, "/")
488 appTitle, installationID := components[0], components[1]
Bogdan Caprita268b4192014-08-28 10:04:44 -0700489 instanceDir := filepath.Join(root, applicationDirName(appTitle), "installation-"+installationID, "instances", "instance-"+instanceID)
Bogdan Caprita1e379132014-08-03 23:02:31 -0700490 rootDir := filepath.Join(instanceDir, "root")
491 testFile := filepath.Join(rootDir, "testfile")
492 if read, err := ioutil.ReadFile(testFile); err != nil {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700493 t.Fatalf("Failed to read %v: %v", testFile, err)
Bogdan Caprita1e379132014-08-03 23:02:31 -0700494 } else if want, got := "goodbye world", string(read); want != got {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700495 t.Fatalf("Expected to read %v, got %v instead", want, got)
Bogdan Caprita1e379132014-08-03 23:02:31 -0700496 }
497 // END HACK
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700498}
Bogdan Caprita78b62162014-08-21 15:35:08 -0700499
Robert Kroeger627a1152014-10-01 14:57:55 -0700500// TODO(rjkroege): Consider validating additional parameters.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700501func verifyHelperArgs(t *testing.T, pingCh <-chan string, username string) {
502 var env string
503 select {
504 case env = <-pingCh:
Bogdan Caprita916e99f2014-11-24 15:47:19 -0800505 case <-time.After(pingTimeout):
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700506 t.Fatalf("%s: failed to get ping", loc(1))
507 }
Robert Kroeger627a1152014-10-01 14:57:55 -0700508 d := json.NewDecoder(strings.NewReader(env))
509 var savedArgs suidhelper.ArgsSavedForTest
510
511 if err := d.Decode(&savedArgs); err != nil {
512 t.Fatalf("failed to decode preserved argument %v: %v", env, err)
513 }
514
515 if savedArgs.Uname != username {
516 t.Fatalf("got username %v, expected username %v", savedArgs.Uname, username)
517 }
518}
519
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700520// TestAppLifeCycle installs an app, starts it, suspends it, resumes it, and
521// then stops it.
522func TestAppLifeCycle(t *testing.T) {
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700523 sh, deferFn := createShellAndMountTable(t)
524 defer deferFn()
525
526 // Set up mock application and binary repositories.
527 envelope, cleanup := startMockRepos(t)
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700528 defer cleanup()
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700529
Bogdan Caprita732e5112014-09-23 17:20:41 -0700530 root, cleanup := setupRootDir(t)
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700531 defer cleanup()
532
Robert Kroegerdd07b362014-09-18 17:34:42 -0700533 // Create a script wrapping the test target that implements suidhelper.
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700534 helperPath := generateSuidHelperScript(t, root)
Robert Kroegerdd07b362014-09-18 17:34:42 -0700535
Bogdan Caprita26929102014-11-07 11:56:56 -0800536 crDir, crEnv := credentialsForChild("nodemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700537 defer os.RemoveAll(crDir)
538
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700539 // Set up the node manager. Since we won't do node manager updates,
540 // don't worry about its application envelope and current link.
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700541 nmh, nms := runShellCommand(t, sh, crEnv, nodeManagerCmd, "nm", root, helperPath, "unused_app_rep_ name", "unused_curr_link")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700542 readPID(t, nms)
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700543
544 // Create the local server that the app uses to let us know it's ready.
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700545 pingCh, cleanup := setupPingServer(t)
546 defer cleanup()
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700547
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700548 resolve(t, "pingserver", 1)
549
Bogdan Capritabce0a632014-09-03 16:15:26 -0700550 // Create an envelope for a first version of the app.
Bogdan Caprita26929102014-11-07 11:56:56 -0800551 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "appV1")
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700552
553 // Install the app.
554 appID := installApp(t)
Bogdan Caprita730bde12014-11-08 15:35:43 -0800555
556 // Start requires the caller to grant a blessing for the app instance.
557 if _, err := startAppImpl(t, appID, ""); err == nil || !verror.Is(err, verror.BadArg) {
558 t.Fatalf("Start(%v) expected to fail with %v, got %v instead", appID, verror.BadArg, err)
559 }
560
Bogdan Capritabce0a632014-09-03 16:15:26 -0700561 // Start an instance of the app.
562 instance1ID := startApp(t, appID)
Robert Kroeger627a1152014-10-01 14:57:55 -0700563
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700564 // Wait until the app pings us that it's ready.
565 verifyHelperArgs(t, pingCh, userName(t))
Robert Kroeger627a1152014-10-01 14:57:55 -0700566
Bogdan Capritabce0a632014-09-03 16:15:26 -0700567 v1EP1 := resolve(t, "appV1", 1)[0]
568
569 // Suspend the app instance.
570 suspendApp(t, appID, instance1ID)
571 resolveExpectNotFound(t, "appV1")
572
573 resumeApp(t, appID, instance1ID)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700574 verifyHelperArgs(t, pingCh, userName(t)) // Wait until the app pings us that it's ready.
Bogdan Capritabce0a632014-09-03 16:15:26 -0700575 oldV1EP1 := v1EP1
576 if v1EP1 = resolve(t, "appV1", 1)[0]; v1EP1 == oldV1EP1 {
577 t.Fatalf("Expected a new endpoint for the app after suspend/resume")
578 }
579
580 // Start a second instance.
581 instance2ID := startApp(t, appID)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700582 verifyHelperArgs(t, pingCh, userName(t)) // Wait until the app pings us that it's ready.
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700583
Bogdan Capritabce0a632014-09-03 16:15:26 -0700584 // There should be two endpoints mounted as "appV1", one for each
585 // instance of the app.
586 endpoints := resolve(t, "appV1", 2)
587 v1EP2 := endpoints[0]
588 if endpoints[0] == v1EP1 {
589 v1EP2 = endpoints[1]
590 if v1EP2 == v1EP1 {
591 t.Fatalf("Both endpoints are the same")
592 }
593 } else if endpoints[1] != v1EP1 {
594 t.Fatalf("Second endpoint should have been v1EP1: %v, %v", endpoints, v1EP1)
595 }
Bogdan Caprita268b4192014-08-28 10:04:44 -0700596
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700597 // TODO(caprita): test Suspend and Resume, and verify various
598 // non-standard combinations (suspend when stopped; resume while still
599 // running; stop while suspended).
600
Bogdan Capritabce0a632014-09-03 16:15:26 -0700601 // Suspend the first instance.
602 suspendApp(t, appID, instance1ID)
603 // Only the second instance should still be running and mounted.
604 if want, got := v1EP2, resolve(t, "appV1", 1)[0]; want != got {
605 t.Fatalf("Resolve(%v): want: %v, got %v", "appV1", want, got)
606 }
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700607
Bogdan Capritabce0a632014-09-03 16:15:26 -0700608 // Updating the installation to itself is a no-op.
Benjamin Prosnitzb8178d32014-11-04 10:24:12 -0800609 updateAppExpectError(t, appID, naming.ErrNoSuchName.ID)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700610
611 // Updating the installation should not work with a mismatched title.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700612 *envelope = envelopeFromShell(sh, nil, appCmd, "bogus")
613
Bogdan Caprita48bbd142014-09-04 16:07:23 -0700614 updateAppExpectError(t, appID, verror.BadArg)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700615
616 // Create a second version of the app and update the app to it.
Bogdan Caprita26929102014-11-07 11:56:56 -0800617 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "appV2")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700618
Bogdan Capritabce0a632014-09-03 16:15:26 -0700619 updateApp(t, appID)
620
621 // Second instance should still be running.
622 if want, got := v1EP2, resolve(t, "appV1", 1)[0]; want != got {
623 t.Fatalf("Resolve(%v): want: %v, got %v", "appV1", want, got)
624 }
625
626 // Resume first instance.
627 resumeApp(t, appID, instance1ID)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700628 verifyHelperArgs(t, pingCh, userName(t)) // Wait until the app pings us that it's ready.
Bogdan Capritabce0a632014-09-03 16:15:26 -0700629 // Both instances should still be running the first version of the app.
630 // Check that the mounttable contains two endpoints, one of which is
631 // v1EP2.
632 endpoints = resolve(t, "appV1", 2)
633 if endpoints[0] == v1EP2 {
634 if endpoints[1] == v1EP2 {
635 t.Fatalf("Both endpoints are the same")
636 }
637 } else if endpoints[1] != v1EP2 {
638 t.Fatalf("Second endpoint should have been v1EP2: %v, %v", endpoints, v1EP2)
639 }
640
641 // Stop first instance.
642 stopApp(t, appID, instance1ID)
643 verifyAppWorkspace(t, root, appID, instance1ID)
644
645 // Only second instance is still running.
646 if want, got := v1EP2, resolve(t, "appV1", 1)[0]; want != got {
647 t.Fatalf("Resolve(%v): want: %v, got %v", "appV1", want, got)
648 }
649
650 // Start a third instance.
651 instance3ID := startApp(t, appID)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700652 // Wait until the app pings us that it's ready.
653 verifyHelperArgs(t, pingCh, userName(t))
654
Bogdan Capritabce0a632014-09-03 16:15:26 -0700655 resolve(t, "appV2", 1)
656
657 // Stop second instance.
658 stopApp(t, appID, instance2ID)
659 resolveExpectNotFound(t, "appV1")
660
661 // Stop third instance.
662 stopApp(t, appID, instance3ID)
663 resolveExpectNotFound(t, "appV2")
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700664
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700665 // Revert the app.
666 revertApp(t, appID)
667
668 // Start a fourth instance. It should be started from version 1.
669 instance4ID := startApp(t, appID)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700670 verifyHelperArgs(t, pingCh, userName(t)) // Wait until the app pings us that it's ready.
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700671 resolve(t, "appV1", 1)
672 stopApp(t, appID, instance4ID)
673 resolveExpectNotFound(t, "appV1")
674
675 // We are already on the first version, no further revert possible.
Benjamin Prosnitzb8178d32014-11-04 10:24:12 -0800676 revertAppExpectError(t, appID, naming.ErrNoSuchName.ID)
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700677
Bogdan Caprita8c776b22014-08-28 17:29:07 -0700678 // Uninstall the app.
679 uninstallApp(t, appID)
680
Bogdan Capritabce0a632014-09-03 16:15:26 -0700681 // Updating the installation should no longer be allowed.
Bogdan Caprita48bbd142014-09-04 16:07:23 -0700682 updateAppExpectError(t, appID, verror.BadArg)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700683
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700684 // Reverting the installation should no longer be allowed.
Bogdan Caprita48bbd142014-09-04 16:07:23 -0700685 revertAppExpectError(t, appID, verror.BadArg)
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700686
Bogdan Caprita8c776b22014-08-28 17:29:07 -0700687 // Starting new instances should no longer be allowed.
Bogdan Caprita48bbd142014-09-04 16:07:23 -0700688 startAppExpectError(t, appID, verror.BadArg)
Bogdan Caprita8c776b22014-08-28 17:29:07 -0700689
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700690 // Cleanly shut down the node manager.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700691 syscall.Kill(nmh.Pid(), syscall.SIGINT)
692 nms.Expect("nm terminating")
693 nms.ExpectEOF()
Bogdan Caprita1e379132014-08-03 23:02:31 -0700694}
Gautham82bb9952014-08-28 14:11:51 -0700695
Asim Shankar88292912014-10-09 19:41:07 -0700696func newRuntime(t *testing.T) veyron2.Runtime {
Asim Shankar7b5c94a2014-10-28 21:42:56 -0700697 runtime, err := rt.New()
Gautham82bb9952014-08-28 14:11:51 -0700698 if err != nil {
699 t.Fatalf("rt.New() failed: %v", err)
700 }
701 runtime.Namespace().SetRoots(rt.R().Namespace().Roots()[0])
Asim Shankar88292912014-10-09 19:41:07 -0700702 return runtime
Gautham82bb9952014-08-28 14:11:51 -0700703}
704
Asim Shankar88292912014-10-09 19:41:07 -0700705func tryInstall(rt veyron2.Runtime) error {
Gautham82bb9952014-08-28 14:11:51 -0700706 appsName := "nm//apps"
Todd Wang702385a2014-11-07 01:54:08 -0800707 stub := node.ApplicationClient(appsName, rt.Client())
708 if _, err := stub.Install(rt.NewContext(), mockApplicationRepoName); err != nil {
Gautham82bb9952014-08-28 14:11:51 -0700709 return fmt.Errorf("Install failed: %v", err)
710 }
711 return nil
712}
713
714// TestNodeManagerClaim claims a nodemanager and tests ACL permissions on its methods.
715func TestNodeManagerClaim(t *testing.T) {
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700716 sh, deferFn := createShellAndMountTable(t)
717 defer deferFn()
718
719 // Set up mock application and binary repositories.
720 envelope, cleanup := startMockRepos(t)
Gautham82bb9952014-08-28 14:11:51 -0700721 defer cleanup()
Gautham82bb9952014-08-28 14:11:51 -0700722
Bogdan Caprita732e5112014-09-23 17:20:41 -0700723 root, cleanup := setupRootDir(t)
Gautham82bb9952014-08-28 14:11:51 -0700724 defer cleanup()
725
Bogdan Caprita26929102014-11-07 11:56:56 -0800726 crDir, crEnv := credentialsForChild("nodemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700727 defer os.RemoveAll(crDir)
728
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700729 // Create a script wrapping the test target that implements suidhelper.
730 helperPath := generateSuidHelperScript(t, root)
731
Gautham82bb9952014-08-28 14:11:51 -0700732 // Set up the node manager. Since we won't do node manager updates,
733 // don't worry about its application envelope and current link.
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700734 _, nms := runShellCommand(t, sh, crEnv, nodeManagerCmd, "nm", root, helperPath, "unused_app_repo_name", "unused_curr_link")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700735 pid := readPID(t, nms)
736 defer syscall.Kill(pid, syscall.SIGINT)
Gautham82bb9952014-08-28 14:11:51 -0700737
Bogdan Caprita26929102014-11-07 11:56:56 -0800738 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "trapp")
Gautham82bb9952014-08-28 14:11:51 -0700739
Todd Wang702385a2014-11-07 01:54:08 -0800740 nodeStub := node.NodeClient("nm//nm")
Asim Shankar88292912014-10-09 19:41:07 -0700741 selfRT := rt.R()
742 otherRT := newRuntime(t)
743 defer otherRT.Cleanup()
Gautham82bb9952014-08-28 14:11:51 -0700744
Asim Shankar88292912014-10-09 19:41:07 -0700745 // Nodemanager should have open ACLs before we claim it and so an Install from otherRT should succeed.
Todd Wang702385a2014-11-07 01:54:08 -0800746 if err := tryInstall(otherRT); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700747 t.Fatal(err)
Gautham82bb9952014-08-28 14:11:51 -0700748 }
Asim Shankar88292912014-10-09 19:41:07 -0700749 // Claim the nodemanager with selfRT as <defaultblessing>/mydevice
Todd Wang702385a2014-11-07 01:54:08 -0800750 if err := nodeStub.Claim(selfRT.NewContext(), &granter{p: selfRT.Principal(), extension: "mydevice"}); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700751 t.Fatal(err)
Gautham82bb9952014-08-28 14:11:51 -0700752 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700753
Bogdan Capritab9501d12014-10-10 15:02:03 -0700754 // Installation should succeed since rt.R() (a.k.a. selfRT) is now the
755 // "owner" of the nodemanager.
756 appID := installApp(t)
757
Asim Shankar88292912014-10-09 19:41:07 -0700758 // otherRT should be unable to install though, since the ACLs have changed now.
Todd Wang702385a2014-11-07 01:54:08 -0800759 if err := tryInstall(otherRT); err == nil {
Asim Shankar88292912014-10-09 19:41:07 -0700760 t.Fatalf("Install should have failed from otherRT")
Gautham82bb9952014-08-28 14:11:51 -0700761 }
Bogdan Capritab9501d12014-10-10 15:02:03 -0700762
Bogdan Capritab9501d12014-10-10 15:02:03 -0700763 // Create the local server that the app uses to let us know it's ready.
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700764 pingCh, cleanup := setupPingServer(t)
765 defer cleanup()
Bogdan Capritab9501d12014-10-10 15:02:03 -0700766
767 // Start an instance of the app.
768 instanceID := startApp(t, appID)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700769
770 // Wait until the app pings us that it's ready.
771 select {
772 case <-pingCh:
Bogdan Caprita916e99f2014-11-24 15:47:19 -0800773 case <-time.After(pingTimeout):
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700774 t.Fatalf("failed to get ping")
775 }
Bogdan Capritab9501d12014-10-10 15:02:03 -0700776 resolve(t, "trapp", 1)
777 suspendApp(t, appID, instanceID)
778
Gautham82bb9952014-08-28 14:11:51 -0700779 // TODO(gauthamt): Test that ACLs persist across nodemanager restarts
780}
Gautham6fe61e52014-09-16 13:58:17 -0700781
782func TestNodeManagerUpdateACL(t *testing.T) {
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700783 sh, deferFn := createShellAndMountTable(t)
784 defer deferFn()
785
786 // Set up mock application and binary repositories.
787 envelope, cleanup := startMockRepos(t)
Gautham6fe61e52014-09-16 13:58:17 -0700788 defer cleanup()
Gautham6fe61e52014-09-16 13:58:17 -0700789
Bogdan Caprita732e5112014-09-23 17:20:41 -0700790 root, cleanup := setupRootDir(t)
Gautham6fe61e52014-09-16 13:58:17 -0700791 defer cleanup()
792
Asim Shankar88292912014-10-09 19:41:07 -0700793 var (
Asim Shankar1ba96ef2014-10-26 19:52:10 -0700794 idp = tsecurity.NewIDProvider("root")
Asim Shankar88292912014-10-09 19:41:07 -0700795 // The two "processes"/runtimes which will act as IPC clients to the
796 // nodemanager process.
797 selfRT = rt.R()
798 otherRT = newRuntime(t)
799 )
800 defer otherRT.Cleanup()
801 // By default, selfRT and otherRT will have blessings generated based on the
802 // username/machine name running this process. Since these blessings will appear
803 // in ACLs, give them recognizable names.
Asim Shankar1ba96ef2014-10-26 19:52:10 -0700804 if err := idp.Bless(selfRT.Principal(), "self"); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700805 t.Fatal(err)
806 }
Asim Shankar1ba96ef2014-10-26 19:52:10 -0700807 if err := idp.Bless(otherRT.Principal(), "other"); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700808 t.Fatal(err)
809 }
810
Bogdan Caprita26929102014-11-07 11:56:56 -0800811 crDir, crEnv := credentialsForChild("nodemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700812 defer os.RemoveAll(crDir)
813
Gautham6fe61e52014-09-16 13:58:17 -0700814 // Set up the node manager. Since we won't do node manager updates,
815 // don't worry about its application envelope and current link.
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700816 _, nms := runShellCommand(t, sh, crEnv, nodeManagerCmd, "nm", root, "unused_helper", "unused_app_repo_name", "unused_curr_link")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700817 pid := readPID(t, nms)
818 defer syscall.Kill(pid, syscall.SIGINT)
Gautham6fe61e52014-09-16 13:58:17 -0700819
820 // Create an envelope for an app.
Bogdan Caprita26929102014-11-07 11:56:56 -0800821 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps")
Gautham6fe61e52014-09-16 13:58:17 -0700822
Todd Wang702385a2014-11-07 01:54:08 -0800823 nodeStub := node.NodeClient("nm//nm")
Asim Shankar88292912014-10-09 19:41:07 -0700824 acl, etag, err := nodeStub.GetACL(selfRT.NewContext())
Gautham6fe61e52014-09-16 13:58:17 -0700825 if err != nil {
826 t.Fatalf("GetACL failed:%v", err)
827 }
828 if etag != "default" {
829 t.Fatalf("getACL expected:default, got:%v(%v)", etag, acl)
830 }
831
Asim Shankar88292912014-10-09 19:41:07 -0700832 // Claim the nodemanager as "root/self/mydevice"
Todd Wang702385a2014-11-07 01:54:08 -0800833 if err := nodeStub.Claim(selfRT.NewContext(), &granter{p: selfRT.Principal(), extension: "mydevice"}); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700834 t.Fatal(err)
Gautham6fe61e52014-09-16 13:58:17 -0700835 }
Asim Shankar88292912014-10-09 19:41:07 -0700836 expectedACL := security.ACL{In: map[security.BlessingPattern]security.LabelSet{"root/self/mydevice": security.AllLabels}}
Gautham6fe61e52014-09-16 13:58:17 -0700837 var b bytes.Buffer
838 if err := vsecurity.SaveACL(&b, expectedACL); err != nil {
839 t.Fatalf("Failed to saveACL:%v", err)
840 }
841 md5hash := md5.Sum(b.Bytes())
842 expectedETAG := hex.EncodeToString(md5hash[:])
Asim Shankar88292912014-10-09 19:41:07 -0700843 if acl, etag, err = nodeStub.GetACL(selfRT.NewContext()); err != nil {
844 t.Fatal(err)
Gautham6fe61e52014-09-16 13:58:17 -0700845 }
846 if etag != expectedETAG {
847 t.Fatalf("getACL expected:%v(%v), got:%v(%v)", expectedACL, expectedETAG, acl, etag)
848 }
Asim Shankar88292912014-10-09 19:41:07 -0700849 // Install from otherRT should fail, since it does not match the ACL.
Todd Wang702385a2014-11-07 01:54:08 -0800850 if err := tryInstall(otherRT); err == nil {
Gautham6fe61e52014-09-16 13:58:17 -0700851 t.Fatalf("Install should have failed with random identity")
852 }
Asim Shankar88292912014-10-09 19:41:07 -0700853 newACL := security.ACL{In: map[security.BlessingPattern]security.LabelSet{"root/other": security.AllLabels}}
Todd Wang702385a2014-11-07 01:54:08 -0800854 if err := nodeStub.SetACL(selfRT.NewContext(), newACL, "invalid"); err == nil {
Gautham6fe61e52014-09-16 13:58:17 -0700855 t.Fatalf("SetACL should have failed with invalid etag")
856 }
Todd Wang702385a2014-11-07 01:54:08 -0800857 if err := nodeStub.SetACL(selfRT.NewContext(), newACL, etag); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700858 t.Fatal(err)
Gautham6fe61e52014-09-16 13:58:17 -0700859 }
Asim Shankar88292912014-10-09 19:41:07 -0700860 // Install should now fail with selfRT, which no longer matches the ACLs but succeed with otherRT, which does.
Todd Wang702385a2014-11-07 01:54:08 -0800861 if err := tryInstall(selfRT); err == nil {
Asim Shankar88292912014-10-09 19:41:07 -0700862 t.Errorf("Install should have failed with selfRT since it should no longer match the ACL")
Gautham6fe61e52014-09-16 13:58:17 -0700863 }
Todd Wang702385a2014-11-07 01:54:08 -0800864 if err := tryInstall(otherRT); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700865 t.Error(err)
Gautham6fe61e52014-09-16 13:58:17 -0700866 }
867}
Robin Thellend09929f42014-10-01 10:18:13 -0700868
Bogdan Caprita5420f172014-10-10 15:58:14 -0700869// TestNodeManagerInstall verifies the 'self install' functionality of the node
870// manager: it runs SelfInstall in a child process, then runs the executable
871// from the soft link that the installation created. This should bring up a
872// functioning node manager.
873func TestNodeManagerInstall(t *testing.T) {
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700874 sh, deferFn := createShellAndMountTable(t)
875 defer deferFn()
876
Bogdan Caprita5420f172014-10-10 15:58:14 -0700877 root, cleanup := setupRootDir(t)
878 defer cleanup()
879
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700880 // Current link does not have to live in the root dir, but it's
881 // convenient to put it there so we have everything in one place.
882 currLink := filepath.Join(root, "current_link")
Bogdan Caprita5420f172014-10-10 15:58:14 -0700883
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700884 // Create an 'envelope' for the node manager that we can pass to the
885 // installer, to ensure that the node manager that the installer
886 // configures can run. The installer uses a shell script, so we need
887 // to get a set of arguments that will work from within the shell
888 // script in order for it to start a node manager.
889 // We don't need the environment here since that can only
890 // be correctly setup in the actual 'installer' command implementation
891 // (in this case the shell script) which will inherit its environment
892 // when we run it.
893 // TODO(caprita): figure out if this is really necessary, hopefully not.
894 nmargs, _ := sh.CommandEnvelope(nodeManagerCmd, nil)
895 argsForNodeManager := append([]string{nodeManagerCmd, "--"}, nmargs[1:]...)
896 argsForNodeManager = append(argsForNodeManager, "nm")
Bogdan Caprita5420f172014-10-10 15:58:14 -0700897
898 // Add vars to instruct the installer how to configure the node manager.
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700899 installerEnv := []string{config.RootEnv + "=" + root, config.CurrentLinkEnv + "=" + currLink, config.HelperEnv + "=" + "unused"}
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700900 installerh, installers := runShellCommand(t, sh, installerEnv, installerCmd, argsForNodeManager...)
901 installers.ExpectEOF()
902 installerh.Shutdown(os.Stderr, os.Stderr)
Bogdan Caprita5420f172014-10-10 15:58:14 -0700903
904 // CurrLink should now be pointing to a node manager script that
905 // can start up a node manager.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700906 nmh, nms := runShellCommand(t, sh, nil, execScriptCmd, currLink)
Bogdan Caprita5420f172014-10-10 15:58:14 -0700907
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700908 // We need the pid of the child process started by the node manager
909 // script above to signal it, not the pid of the script itself.
910 // TODO(caprita): the scripts that the node manager generates
911 // should progagate signals so you don't have to obtain the pid of the
912 // child by reading it from stdout as we do here. The node manager should
913 // be able to retain a list of the processes it spawns and be confident
914 // that sending a signal to them will also result in that signal being
915 // sent to their children and so on.
916 pid := readPID(t, nms)
Bogdan Caprita5420f172014-10-10 15:58:14 -0700917 resolve(t, "nm", 1)
Benjamin Prosnitzb8178d32014-11-04 10:24:12 -0800918 revertNodeExpectError(t, "nm", naming.ErrNoSuchName.ID) // No previous version available.
Bogdan Caprita5420f172014-10-10 15:58:14 -0700919 syscall.Kill(pid, syscall.SIGINT)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700920
921 nms.Expect("nm terminating")
922 nms.ExpectEOF()
923 nmh.Shutdown(os.Stderr, os.Stderr)
Bogdan Caprita5420f172014-10-10 15:58:14 -0700924}
925
Robin Thellendb9dd9bb2014-10-29 13:54:08 -0700926func TestNodeManagerGlobAndDebug(t *testing.T) {
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700927 sh, deferFn := createShellAndMountTable(t)
928 defer deferFn()
929
930 // Set up mock application and binary repositories.
931 envelope, cleanup := startMockRepos(t)
Robin Thellend9e523a62014-10-07 16:19:53 -0700932 defer cleanup()
Robin Thellend9e523a62014-10-07 16:19:53 -0700933
Robin Thellend09929f42014-10-01 10:18:13 -0700934 root, cleanup := setupRootDir(t)
935 defer cleanup()
936
Bogdan Caprita26929102014-11-07 11:56:56 -0800937 crDir, crEnv := credentialsForChild("nodemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700938 defer os.RemoveAll(crDir)
939
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700940 // Create a script wrapping the test target that implements suidhelper.
941 helperPath := generateSuidHelperScript(t, root)
942
Robin Thellend09929f42014-10-01 10:18:13 -0700943 // Set up the node manager. Since we won't do node manager updates,
944 // don't worry about its application envelope and current link.
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700945 _, nms := runShellCommand(t, sh, crEnv, nodeManagerCmd, "nm", root, helperPath, "unused_app_repo_name", "unused_curr_link")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700946 pid := readPID(t, nms)
947 defer syscall.Kill(pid, syscall.SIGINT)
Robin Thellend09929f42014-10-01 10:18:13 -0700948
Robin Thellend9e523a62014-10-07 16:19:53 -0700949 // Create the local server that the app uses to let us know it's ready.
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700950 pingCh, cleanup := setupPingServer(t)
951 defer cleanup()
Robin Thellend09929f42014-10-01 10:18:13 -0700952
Robin Thellend9e523a62014-10-07 16:19:53 -0700953 // Create the envelope for the first version of the app.
Bogdan Caprita26929102014-11-07 11:56:56 -0800954 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "appV1")
Robin Thellend9e523a62014-10-07 16:19:53 -0700955
956 // Install the app.
957 appID := installApp(t)
958 installID := path.Base(appID)
959
960 // Start an instance of the app.
961 instance1ID := startApp(t, appID)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700962
963 // Wait until the app pings us that it's ready.
964 select {
965 case <-pingCh:
Bogdan Caprita916e99f2014-11-24 15:47:19 -0800966 case <-time.After(pingTimeout):
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700967 t.Fatalf("failed to get ping")
968 }
Robin Thellend9e523a62014-10-07 16:19:53 -0700969
970 testcases := []struct {
971 name, pattern string
972 expected []string
973 }{
974 {"nm", "...", []string{
975 "",
976 "apps",
977 "apps/google naps",
978 "apps/google naps/" + installID,
979 "apps/google naps/" + installID + "/" + instance1ID,
Robin Thellend4c5266e2014-10-27 13:19:29 -0700980 "apps/google naps/" + installID + "/" + instance1ID + "/logs",
981 "apps/google naps/" + installID + "/" + instance1ID + "/logs/STDERR-<timestamp>",
982 "apps/google naps/" + installID + "/" + instance1ID + "/logs/STDOUT-<timestamp>",
Robin Thellend58647322014-10-28 12:07:47 -0700983 "apps/google naps/" + installID + "/" + instance1ID + "/logs/bin.INFO",
984 "apps/google naps/" + installID + "/" + instance1ID + "/logs/bin.<*>.INFO.<timestamp>",
Robin Thellendb9dd9bb2014-10-29 13:54:08 -0700985 "apps/google naps/" + installID + "/" + instance1ID + "/pprof",
986 "apps/google naps/" + installID + "/" + instance1ID + "/stats",
987 "apps/google naps/" + installID + "/" + instance1ID + "/stats/ipc",
988 "apps/google naps/" + installID + "/" + instance1ID + "/stats/system",
989 "apps/google naps/" + installID + "/" + instance1ID + "/stats/system/start-time-rfc1123",
990 "apps/google naps/" + installID + "/" + instance1ID + "/stats/system/start-time-unix",
Robin Thellend9e523a62014-10-07 16:19:53 -0700991 "nm",
992 }},
993 {"nm/apps", "*", []string{"google naps"}},
994 {"nm/apps/google naps", "*", []string{installID}},
Robin Thellend4c5266e2014-10-27 13:19:29 -0700995 {"nm/apps/google naps/" + installID, "*", []string{instance1ID}},
Robin Thellendb9dd9bb2014-10-29 13:54:08 -0700996 {"nm/apps/google naps/" + installID + "/" + instance1ID, "*", []string{"logs", "pprof", "stats"}},
Robin Thellend58647322014-10-28 12:07:47 -0700997 {"nm/apps/google naps/" + installID + "/" + instance1ID + "/logs", "*", []string{
998 "STDERR-<timestamp>",
999 "STDOUT-<timestamp>",
1000 "bin.INFO",
1001 "bin.<*>.INFO.<timestamp>",
1002 }},
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001003 {"nm/apps/google naps/" + installID + "/" + instance1ID + "/stats/system", "start-time*", []string{"start-time-rfc1123", "start-time-unix"}},
Robin Thellend09929f42014-10-01 10:18:13 -07001004 }
Robin Thellend58647322014-10-28 12:07:47 -07001005 logFileTimeStampRE := regexp.MustCompile("(STDOUT|STDERR)-[0-9]+$")
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001006 logFileTrimInfoRE := regexp.MustCompile(`bin\..*\.INFO\.[0-9.-]+$`)
Robin Thellend58647322014-10-28 12:07:47 -07001007 logFileRemoveErrorFatalWarningRE := regexp.MustCompile("(ERROR|FATAL|WARNING)")
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001008 statsTrimRE := regexp.MustCompile("/stats/(ipc|system(/start-time.*)?)$")
Robin Thellend9e523a62014-10-07 16:19:53 -07001009 for _, tc := range testcases {
Robin Thellend5c95a6c2014-11-10 13:06:56 -08001010 results, err := testutil.GlobName(tc.name, tc.pattern)
1011 if err != nil {
1012 t.Errorf("unexpected glob error for (%q, %q): %v", tc.name, tc.pattern, err)
1013 continue
1014 }
Robin Thellend58647322014-10-28 12:07:47 -07001015 filteredResults := []string{}
1016 for _, name := range results {
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001017 // Keep only the stats object names that match this RE.
1018 if strings.Contains(name, "/stats/") && !statsTrimRE.MatchString(name) {
1019 continue
1020 }
1021 // Remove ERROR, WARNING, FATAL log files because
1022 // they're not consistently there.
Robin Thellend58647322014-10-28 12:07:47 -07001023 if logFileRemoveErrorFatalWarningRE.MatchString(name) {
1024 continue
1025 }
1026 name = logFileTimeStampRE.ReplaceAllString(name, "$1-<timestamp>")
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001027 name = logFileTrimInfoRE.ReplaceAllString(name, "bin.<*>.INFO.<timestamp>")
Robin Thellend58647322014-10-28 12:07:47 -07001028 filteredResults = append(filteredResults, name)
Robin Thellend9e523a62014-10-07 16:19:53 -07001029 }
Robin Thellend12937a22014-10-29 17:53:23 -07001030 sort.Strings(filteredResults)
1031 sort.Strings(tc.expected)
Robin Thellend58647322014-10-28 12:07:47 -07001032 if !reflect.DeepEqual(filteredResults, tc.expected) {
1033 t.Errorf("unexpected result for (%q, %q). Got %q, want %q", tc.name, tc.pattern, filteredResults, tc.expected)
Robin Thellend9e523a62014-10-07 16:19:53 -07001034 }
Robin Thellend09929f42014-10-01 10:18:13 -07001035 }
Robin Thellend4c5266e2014-10-27 13:19:29 -07001036
Robin Thellend58647322014-10-28 12:07:47 -07001037 // Call Size() on the log file objects.
Robin Thellend5c95a6c2014-11-10 13:06:56 -08001038 files, err := testutil.GlobName("nm", "apps/google naps/"+installID+"/"+instance1ID+"/logs/*")
1039 if err != nil {
1040 t.Errorf("unexpected glob error: %v", err)
1041 }
Robin Thellend12937a22014-10-29 17:53:23 -07001042 if want, got := 4, len(files); got < want {
1043 t.Errorf("Unexpected number of matches. Got %d, want at least %d", got, want)
1044 }
Robin Thellend4c5266e2014-10-27 13:19:29 -07001045 for _, file := range files {
1046 name := naming.Join("nm", file)
Todd Wang702385a2014-11-07 01:54:08 -08001047 c := logreader.LogFileClient(name)
Robin Thellend4c5266e2014-10-27 13:19:29 -07001048 if _, err := c.Size(rt.R().NewContext()); err != nil {
1049 t.Errorf("Size(%q) failed: %v", name, err)
1050 }
1051 }
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001052
1053 // Call Value() on some of the stats objects.
Robin Thellend5c95a6c2014-11-10 13:06:56 -08001054 objects, err := testutil.GlobName("nm", "apps/google naps/"+installID+"/"+instance1ID+"/stats/system/start-time*")
1055 if err != nil {
1056 t.Errorf("unexpected glob error: %v", err)
1057 }
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001058 if want, got := 2, len(objects); got != want {
1059 t.Errorf("Unexpected number of matches. Got %d, want %d", got, want)
1060 }
1061 for _, obj := range objects {
1062 name := naming.Join("nm", obj)
Todd Wang702385a2014-11-07 01:54:08 -08001063 c := stats.StatsClient(name)
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001064 if _, err := c.Value(rt.R().NewContext()); err != nil {
1065 t.Errorf("Value(%q) failed: %v", name, err)
1066 }
1067 }
1068
1069 // Call CmdLine() on the pprof object.
1070 {
1071 name := "nm/apps/google naps/" + installID + "/" + instance1ID + "/pprof"
Todd Wang702385a2014-11-07 01:54:08 -08001072 c := pprof.PProfClient(name)
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001073 v, err := c.CmdLine(rt.R().NewContext())
1074 if err != nil {
1075 t.Errorf("CmdLine(%q) failed: %v", name, err)
1076 }
1077 if len(v) == 0 {
1078 t.Fatalf("Unexpected empty cmdline: %v", v)
1079 }
1080 if got, want := filepath.Base(v[0]), "bin"; got != want {
1081 t.Errorf("Unexpected value for argv[0]. Got %v, want %v", got, want)
1082 }
1083 }
Robin Thellend4c5266e2014-10-27 13:19:29 -07001084}
1085
Todd Wang702385a2014-11-07 01:54:08 -08001086func listAndVerifyAssociations(t *testing.T, stub node.NodeClientMethods, run veyron2.Runtime, expected []node.Association) {
Robert Kroeger362ff892014-09-29 14:23:47 -07001087 assocs, err := stub.ListAssociations(run.NewContext())
1088 if err != nil {
1089 t.Fatalf("ListAssociations failed %v", err)
1090 }
Robert Kroeger1cb4a0d2014-10-20 11:55:38 -07001091 compareAssociations(t, assocs, expected)
Robert Kroeger362ff892014-09-29 14:23:47 -07001092}
1093
1094// TODO(rjkroege): Verify that associations persist across restarts
1095// once permanent storage is added.
1096func TestAccountAssociation(t *testing.T) {
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001097 sh, deferFn := createShellAndMountTable(t)
1098 defer deferFn()
Robert Kroeger362ff892014-09-29 14:23:47 -07001099
1100 root, cleanup := setupRootDir(t)
1101 defer cleanup()
1102
1103 var (
Asim Shankar1ba96ef2014-10-26 19:52:10 -07001104 idp = tsecurity.NewIDProvider("root")
Robert Kroeger362ff892014-09-29 14:23:47 -07001105 // The two "processes"/runtimes which will act as IPC clients to
1106 // the nodemanager process.
1107 selfRT = rt.R()
1108 otherRT = newRuntime(t)
1109 )
1110 defer otherRT.Cleanup()
1111 // By default, selfRT and otherRT will have blessings generated based
1112 // on the username/machine name running this process. Since these
1113 // blessings will appear in test expecations, give them readable
1114 // names.
Asim Shankar1ba96ef2014-10-26 19:52:10 -07001115 if err := idp.Bless(selfRT.Principal(), "self"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001116 t.Fatal(err)
1117 }
Asim Shankar1ba96ef2014-10-26 19:52:10 -07001118 if err := idp.Bless(otherRT.Principal(), "other"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001119 t.Fatal(err)
1120 }
Bogdan Caprita26929102014-11-07 11:56:56 -08001121 crFile, crEnv := credentialsForChild("nodemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001122 defer os.RemoveAll(crFile)
Robert Kroeger362ff892014-09-29 14:23:47 -07001123
Bogdan Caprita962d5e02014-10-28 18:36:09 -07001124 _, nms := runShellCommand(t, sh, crEnv, nodeManagerCmd, "nm", root, "unused_helper", "unused_app_repo_name", "unused_curr_link")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001125 pid := readPID(t, nms)
1126 defer syscall.Kill(pid, syscall.SIGINT)
Robert Kroeger362ff892014-09-29 14:23:47 -07001127
Todd Wang702385a2014-11-07 01:54:08 -08001128 nodeStub := node.NodeClient("nm//nm")
Robert Kroeger362ff892014-09-29 14:23:47 -07001129
1130 // Attempt to list associations on the node manager without having
1131 // claimed it.
1132 if list, err := nodeStub.ListAssociations(otherRT.NewContext()); err != nil || list != nil {
1133 t.Fatalf("ListAssociations should fail on unclaimed node manager but did not: %v", err)
1134 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001135
Robert Kroeger362ff892014-09-29 14:23:47 -07001136 // self claims the node manager.
Todd Wang702385a2014-11-07 01:54:08 -08001137 if err := nodeStub.Claim(selfRT.NewContext(), &granter{p: selfRT.Principal(), extension: "alice"}); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001138 t.Fatalf("Claim failed: %v", err)
1139 }
1140
1141 vlog.VI(2).Info("Verify that associations start out empty.")
1142 listAndVerifyAssociations(t, nodeStub, selfRT, []node.Association(nil))
1143
Todd Wang702385a2014-11-07 01:54:08 -08001144 if err := nodeStub.AssociateAccount(selfRT.NewContext(), []string{"root/self", "root/other"}, "alice_system_account"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001145 t.Fatalf("ListAssociations failed %v", err)
1146 }
1147 vlog.VI(2).Info("Added association should appear.")
1148 listAndVerifyAssociations(t, nodeStub, selfRT, []node.Association{
1149 {
1150 "root/self",
1151 "alice_system_account",
1152 },
1153 {
1154 "root/other",
1155 "alice_system_account",
1156 },
1157 })
1158
Todd Wang702385a2014-11-07 01:54:08 -08001159 if err := nodeStub.AssociateAccount(selfRT.NewContext(), []string{"root/self", "root/other"}, "alice_other_account"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001160 t.Fatalf("AssociateAccount failed %v", err)
1161 }
1162 vlog.VI(2).Info("Change the associations and the change should appear.")
1163 listAndVerifyAssociations(t, nodeStub, selfRT, []node.Association{
1164 {
1165 "root/self",
1166 "alice_other_account",
1167 },
1168 {
1169 "root/other",
1170 "alice_other_account",
1171 },
1172 })
1173
Todd Wang702385a2014-11-07 01:54:08 -08001174 if err := nodeStub.AssociateAccount(selfRT.NewContext(), []string{"root/other"}, ""); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001175 t.Fatalf("AssociateAccount failed %v", err)
1176 }
1177 vlog.VI(2).Info("Verify that we can remove an association.")
1178 listAndVerifyAssociations(t, nodeStub, selfRT, []node.Association{
1179 {
1180 "root/self",
1181 "alice_other_account",
1182 },
1183 })
1184}
1185
1186// userName is a helper function to determine the system name that the
1187// test is running under.
1188func userName(t *testing.T) string {
1189 u, err := user.Current()
1190 if err != nil {
1191 t.Fatalf("user.Current() failed: %v", err)
1192 }
1193 return u.Username
1194}
1195
1196func TestAppWithSuidHelper(t *testing.T) {
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001197 sh, deferFn := createShellAndMountTable(t)
1198 defer deferFn()
1199
1200 // Set up mock application and binary repositories.
1201 envelope, cleanup := startMockRepos(t)
Robert Kroeger362ff892014-09-29 14:23:47 -07001202 defer cleanup()
Robert Kroeger362ff892014-09-29 14:23:47 -07001203
1204 root, cleanup := setupRootDir(t)
1205 defer cleanup()
1206
1207 var (
Asim Shankar1ba96ef2014-10-26 19:52:10 -07001208 idp = tsecurity.NewIDProvider("root")
Robert Kroeger362ff892014-09-29 14:23:47 -07001209 // The two "processes"/runtimes which will act as IPC clients to
1210 // the nodemanager process.
1211 selfRT = rt.R()
1212 otherRT = newRuntime(t)
1213 )
1214 defer otherRT.Cleanup()
1215
1216 // By default, selfRT and otherRT will have blessings generated
1217 // based on the username/machine name running this process. Since
1218 // these blessings can appear in debugging output, give them
1219 // recognizable names.
Asim Shankar1ba96ef2014-10-26 19:52:10 -07001220 if err := idp.Bless(selfRT.Principal(), "self"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001221 t.Fatal(err)
1222 }
Asim Shankar1ba96ef2014-10-26 19:52:10 -07001223 if err := idp.Bless(otherRT.Principal(), "other"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001224 t.Fatal(err)
1225 }
1226
Bogdan Caprita26929102014-11-07 11:56:56 -08001227 crDir, crEnv := credentialsForChild("nodemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001228 defer os.RemoveAll(crDir)
1229
Robert Kroeger362ff892014-09-29 14:23:47 -07001230 // Create a script wrapping the test target that implements
1231 // suidhelper.
Bogdan Caprita962d5e02014-10-28 18:36:09 -07001232 helperPath := generateSuidHelperScript(t, root)
Robert Kroeger362ff892014-09-29 14:23:47 -07001233
Bogdan Caprita962d5e02014-10-28 18:36:09 -07001234 _, nms := runShellCommand(t, sh, crEnv, nodeManagerCmd, "-mocksetuid", "nm", root, helperPath, "unused_app_repo_name", "unused_curr_link")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001235 pid := readPID(t, nms)
1236 defer syscall.Kill(pid, syscall.SIGINT)
Robert Kroeger362ff892014-09-29 14:23:47 -07001237
Todd Wang702385a2014-11-07 01:54:08 -08001238 nodeStub := node.NodeClient("nm//nm")
Robert Kroeger362ff892014-09-29 14:23:47 -07001239
1240 // Create the local server that the app uses to tell us which system name
1241 // the node manager wished to run it as.
1242 server, _ := newServer()
1243 defer server.Stop()
1244 pingCh := make(chan string, 1)
Bogdan Caprita26929102014-11-07 11:56:56 -08001245 if err := server.Serve("pingserver", pingServer(pingCh), nil); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001246 t.Fatalf("Serve(%q, <dispatcher>) failed: %v", "pingserver", err)
1247 }
1248
Bogdan Caprita26929102014-11-07 11:56:56 -08001249 // Create an envelope for a first version of the app.
1250 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "appV1")
Robert Kroeger362ff892014-09-29 14:23:47 -07001251
1252 // Install and start the app as root/self.
1253 appID := installApp(t, selfRT)
1254
1255 // Claim the nodemanager with selfRT as root/self/alice
Todd Wang702385a2014-11-07 01:54:08 -08001256 if err := nodeStub.Claim(selfRT.NewContext(), &granter{p: selfRT.Principal(), extension: "alice"}); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001257 t.Fatal(err)
1258 }
1259
1260 // Start an instance of the app but this time it should fail: we do
1261 // not have an associated uname for the invoking identity.
1262 startAppExpectError(t, appID, verror.NoAccess, selfRT)
1263
1264 // Create an association for selfRT
Todd Wang702385a2014-11-07 01:54:08 -08001265 if err := nodeStub.AssociateAccount(selfRT.NewContext(), []string{"root/self"}, testUserName); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001266 t.Fatalf("AssociateAccount failed %v", err)
1267 }
1268
Robert Kroegerec7790e2014-10-15 14:57:43 -07001269 instance1ID := startApp(t, appID, selfRT)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001270 verifyHelperArgs(t, pingCh, testUserName) // Wait until the app pings us that it's ready.
Robert Kroegerec7790e2014-10-15 14:57:43 -07001271 stopApp(t, appID, instance1ID, selfRT)
Robert Kroeger362ff892014-09-29 14:23:47 -07001272
1273 vlog.VI(2).Infof("other attempting to run an app without access. Should fail.")
1274 startAppExpectError(t, appID, verror.NoAccess, otherRT)
1275
Robert Kroegeracc778b2014-11-03 17:17:21 -08001276 // Self will now let other also install apps.
Todd Wang702385a2014-11-07 01:54:08 -08001277 if err := nodeStub.AssociateAccount(selfRT.NewContext(), []string{"root/other"}, testUserName); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001278 t.Fatalf("AssociateAccount failed %v", err)
1279 }
1280 // Add Start to the ACL list for root/other.
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001281 newACL, _, err := nodeStub.GetACL(selfRT.NewContext())
1282 if err != nil {
1283 t.Fatalf("GetACL failed %v", err)
1284 }
Robert Kroegeracc778b2014-11-03 17:17:21 -08001285 newACL.In["root/other/..."] = security.LabelSet(security.WriteLabel)
Todd Wang702385a2014-11-07 01:54:08 -08001286 if err := nodeStub.SetACL(selfRT.NewContext(), newACL, ""); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001287 t.Fatalf("SetACL failed %v", err)
1288 }
1289
Robert Kroegeracc778b2014-11-03 17:17:21 -08001290 // With the introduction of per installation and per instance ACLs, while other now
1291 // has administrator permissions on the node manager, other doesn't have execution
1292 // permissions for the app. So this will fail.
1293 vlog.VI(2).Infof("other attempting to run an app still without access. Should fail.")
1294 startAppExpectError(t, appID, verror.NoAccess, otherRT)
1295
1296 // But self can give other permissions to start applications.
1297 vlog.VI(2).Infof("self attempting to give other permission to start %s", appID)
1298 newACL, _, err = appStub(appID).GetACL(selfRT.NewContext())
1299 if err != nil {
1300 t.Fatalf("GetACL on appID: %v failed %v", appID, err)
1301 }
1302 newACL.In["root/other/..."] = security.LabelSet(security.ReadLabel)
1303 if err = appStub(appID).SetACL(selfRT.NewContext(), newACL, ""); err != nil {
1304 t.Fatalf("SetACL on appID: %v failed: %v", appID, err)
1305 }
1306
Robert Kroeger362ff892014-09-29 14:23:47 -07001307 vlog.VI(2).Infof("other attempting to run an app with access. Should succeed.")
Robert Kroegerec7790e2014-10-15 14:57:43 -07001308 instance2ID := startApp(t, appID, otherRT)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001309 verifyHelperArgs(t, pingCh, testUserName) // Wait until the app pings us that it's ready.
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001310 suspendApp(t, appID, instance2ID, otherRT)
1311
1312 vlog.VI(2).Infof("Verify that Resume with the same systemName works.")
1313 resumeApp(t, appID, instance2ID, otherRT)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001314 verifyHelperArgs(t, pingCh, testUserName) // Wait until the app pings us that it's ready.
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001315 suspendApp(t, appID, instance2ID, otherRT)
1316
Robert Kroegeracc778b2014-11-03 17:17:21 -08001317 vlog.VI(2).Infof("Verify that other can install and run applications.")
1318 otherAppID := installApp(t, otherRT)
1319
1320 vlog.VI(2).Infof("other attempting to run an app that other installed. Should succeed.")
1321 instance4ID := startApp(t, otherAppID, otherRT)
1322 verifyHelperArgs(t, pingCh, testUserName) // Wait until the app pings us that it's ready.
1323
1324 // Clean up.
1325 stopApp(t, otherAppID, instance4ID, otherRT)
1326
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001327 // Change the associated system name.
Todd Wang702385a2014-11-07 01:54:08 -08001328 if err := nodeStub.AssociateAccount(selfRT.NewContext(), []string{"root/other"}, anotherTestUserName); err != nil {
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001329 t.Fatalf("AssociateAccount failed %v", err)
1330 }
1331
1332 vlog.VI(2).Infof("Show that Resume with a different systemName fails.")
1333 resumeAppExpectError(t, appID, instance2ID, verror.NoAccess, otherRT)
1334
1335 // Clean up.
Robert Kroegerec7790e2014-10-15 14:57:43 -07001336 stopApp(t, appID, instance2ID, otherRT)
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001337
1338 vlog.VI(2).Infof("Show that Start with different systemName works.")
1339 instance3ID := startApp(t, appID, otherRT)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001340 verifyHelperArgs(t, pingCh, anotherTestUserName) // Wait until the app pings us that it's ready.
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001341
1342 // Clean up.
1343 stopApp(t, appID, instance3ID, otherRT)
Robert Kroeger362ff892014-09-29 14:23:47 -07001344}