Bogdan Caprita | 5420f17 | 2014-10-10 15:58:14 -0700 | [diff] [blame] | 1 | // TODO(caprita): This file is becoming unmanageable; split into several test |
| 2 | // files. |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 3 | // TODO(rjkroege): Add a more extensive unit test case to exercise ACL logic. |
Bogdan Caprita | 5420f17 | 2014-10-10 15:58:14 -0700 | [diff] [blame] | 4 | |
Jiri Simsa | 70c3205 | 2014-06-18 11:38:21 -0700 | [diff] [blame] | 5 | package impl_test |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 6 | |
| 7 | import ( |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 8 | "bytes" |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 9 | "crypto/md5" |
| 10 | "encoding/base64" |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 11 | "encoding/hex" |
Robert Kroeger | 627a115 | 2014-10-01 14:57:55 -0700 | [diff] [blame] | 12 | "encoding/json" |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 13 | "fmt" |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 14 | "io" |
Jiri Simsa | 70c3205 | 2014-06-18 11:38:21 -0700 | [diff] [blame] | 15 | "io/ioutil" |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 16 | "os" |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 17 | goexec "os/exec" |
Robert Kroeger | 627a115 | 2014-10-01 14:57:55 -0700 | [diff] [blame] | 18 | "os/user" |
Robin Thellend | 9e523a6 | 2014-10-07 16:19:53 -0700 | [diff] [blame] | 19 | "path" |
Jiri Simsa | 70c3205 | 2014-06-18 11:38:21 -0700 | [diff] [blame] | 20 | "path/filepath" |
Robin Thellend | 09929f4 | 2014-10-01 10:18:13 -0700 | [diff] [blame] | 21 | "reflect" |
Robin Thellend | 4c5266e | 2014-10-27 13:19:29 -0700 | [diff] [blame] | 22 | "regexp" |
Robin Thellend | 09929f4 | 2014-10-01 10:18:13 -0700 | [diff] [blame] | 23 | "sort" |
Bogdan Caprita | 78b6216 | 2014-08-21 15:35:08 -0700 | [diff] [blame] | 24 | "strconv" |
Jiri Simsa | 70c3205 | 2014-06-18 11:38:21 -0700 | [diff] [blame] | 25 | "strings" |
Bogdan Caprita | 78b6216 | 2014-08-21 15:35:08 -0700 | [diff] [blame] | 26 | "syscall" |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 27 | "testing" |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 28 | "time" |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 29 | |
Jiri Simsa | 519c507 | 2014-09-17 21:37:57 -0700 | [diff] [blame] | 30 | "veyron.io/veyron/veyron2" |
| 31 | "veyron.io/veyron/veyron2/ipc" |
| 32 | "veyron.io/veyron/veyron2/naming" |
| 33 | "veyron.io/veyron/veyron2/rt" |
| 34 | "veyron.io/veyron/veyron2/security" |
| 35 | "veyron.io/veyron/veyron2/services/mgmt/application" |
Robin Thellend | 4c5266e | 2014-10-27 13:19:29 -0700 | [diff] [blame] | 36 | "veyron.io/veyron/veyron2/services/mgmt/logreader" |
Jiri Simsa | 519c507 | 2014-09-17 21:37:57 -0700 | [diff] [blame] | 37 | "veyron.io/veyron/veyron2/services/mgmt/node" |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 38 | "veyron.io/veyron/veyron2/services/mgmt/pprof" |
| 39 | "veyron.io/veyron/veyron2/services/mgmt/stats" |
Jiri Simsa | 519c507 | 2014-09-17 21:37:57 -0700 | [diff] [blame] | 40 | "veyron.io/veyron/veyron2/verror" |
| 41 | "veyron.io/veyron/veyron2/vlog" |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 42 | "veyron.io/veyron/veyron2/vom" |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 43 | |
| 44 | "veyron.io/veyron/veyron/lib/expect" |
| 45 | "veyron.io/veyron/veyron/lib/modules" |
| 46 | "veyron.io/veyron/veyron/lib/signals" |
| 47 | "veyron.io/veyron/veyron/lib/testutil" |
| 48 | tsecurity "veyron.io/veyron/veyron/lib/testutil/security" |
| 49 | vsecurity "veyron.io/veyron/veyron/security" |
| 50 | "veyron.io/veyron/veyron/services/mgmt/node/config" |
| 51 | "veyron.io/veyron/veyron/services/mgmt/node/impl" |
| 52 | suidhelper "veyron.io/veyron/veyron/services/mgmt/suidhelper/impl" |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 53 | ) |
| 54 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 55 | const ( |
| 56 | execScriptCmd = "execScriptCmd" |
| 57 | nodeManagerCmd = "nodeManager" |
| 58 | appCmd = "app" |
| 59 | installerCmd = "installer" |
| 60 | ) |
Robert Kroeger | dd07b36 | 2014-09-18 17:34:42 -0700 | [diff] [blame] | 61 | |
| 62 | func init() { |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 63 | // TODO(rthellend): Remove when vom2 is ready. |
Todd Wang | 1aa5769 | 2014-11-11 13:53:29 -0800 | [diff] [blame] | 64 | vom.Register(&naming.VDLMountedServer{}) |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 65 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 66 | modules.RegisterChild(execScriptCmd, "", execScript) |
| 67 | modules.RegisterChild(nodeManagerCmd, "", nodeManager) |
| 68 | modules.RegisterChild(appCmd, "", app) |
| 69 | modules.RegisterChild(installerCmd, "", install) |
| 70 | testutil.Init() |
| 71 | |
| 72 | if modules.IsModulesProcess() { |
Robert Kroeger | dd07b36 | 2014-09-18 17:34:42 -0700 | [diff] [blame] | 73 | return |
| 74 | } |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 75 | initRT() |
| 76 | } |
Robert Kroeger | dd07b36 | 2014-09-18 17:34:42 -0700 | [diff] [blame] | 77 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 78 | func initRT() { |
Asim Shankar | 7b5c94a | 2014-10-28 21:42:56 -0700 | [diff] [blame] | 79 | rt.Init() |
Robert Kroeger | dd07b36 | 2014-09-18 17:34:42 -0700 | [diff] [blame] | 80 | // Disable the cache because we will be manipulating/using the namespace |
| 81 | // across multiple processes and want predictable behaviour without |
| 82 | // relying on timeouts. |
| 83 | rt.R().Namespace().CacheCtl(naming.DisableCache(true)) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 84 | } |
| 85 | |
| 86 | // TestHelperProcess is the entrypoint for the modules commands in a |
| 87 | // a test subprocess. |
| 88 | func TestHelperProcess(t *testing.T) { |
| 89 | initRT() |
| 90 | modules.DispatchInTest() |
Robert Kroeger | dd07b36 | 2014-09-18 17:34:42 -0700 | [diff] [blame] | 91 | } |
| 92 | |
| 93 | // TestSuidHelper is testing boilerplate for suidhelper that does not |
| 94 | // invoke rt.Init() because the suidhelper is not a Veyron application. |
| 95 | func TestSuidHelper(t *testing.T) { |
| 96 | if os.Getenv("VEYRON_SUIDHELPER_TEST") != "1" { |
| 97 | return |
| 98 | } |
| 99 | vlog.VI(1).Infof("TestSuidHelper starting") |
| 100 | |
| 101 | if err := suidhelper.Run(os.Environ()); err != nil { |
| 102 | vlog.Fatalf("Failed to Run() setuidhelper: %v", err) |
| 103 | } |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 104 | } |
| 105 | |
| 106 | // execScript launches the script passed as argument. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 107 | func execScript(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error { |
| 108 | args = args[1:] |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 109 | if want, got := 1, len(args); want != got { |
| 110 | vlog.Fatalf("execScript expected %d arguments, got %d instead", want, got) |
| 111 | } |
| 112 | script := args[0] |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 113 | osenv := []string{} |
| 114 | if env["PAUSE_BEFORE_STOP"] == "1" { |
| 115 | osenv = append(osenv, "PAUSE_BEFORE_STOP=1") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 116 | } |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 117 | |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 118 | cmd := goexec.Cmd{ |
| 119 | Path: script, |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 120 | Env: osenv, |
| 121 | Stdin: stdin, |
| 122 | Stderr: stderr, |
| 123 | Stdout: stdout, |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 124 | } |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 125 | |
| 126 | return cmd.Run() |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 127 | } |
| 128 | |
| 129 | // nodeManager sets up a node manager server. It accepts the name to publish |
| 130 | // the server under as an argument. Additional arguments can optionally specify |
| 131 | // node manager config settings. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 132 | func nodeManager(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error { |
| 133 | args = args[1:] |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 134 | if len(args) == 0 { |
| 135 | vlog.Fatalf("nodeManager expected at least an argument") |
| 136 | } |
| 137 | publishName := args[0] |
Bogdan Caprita | 78b6216 | 2014-08-21 15:35:08 -0700 | [diff] [blame] | 138 | args = args[1:] |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 139 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 140 | defer fmt.Fprintf(stdout, "%v terminating\n", publishName) |
| 141 | defer vlog.VI(1).Infof("%v terminating", publishName) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 142 | defer rt.R().Cleanup() |
| 143 | server, endpoint := newServer() |
| 144 | defer server.Stop() |
David Why Use Two When One Will Do Presotto | 8b4dbbf | 2014-11-06 10:50:14 -0800 | [diff] [blame] | 145 | name := naming.JoinAddressName(endpoint, "") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 146 | vlog.VI(1).Infof("Node manager name: %v", name) |
| 147 | |
| 148 | // Satisfy the contract described in doc.go by passing the config state |
| 149 | // through to the node manager dispatcher constructor. |
| 150 | configState, err := config.Load() |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 151 | if err != nil { |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 152 | vlog.Fatalf("Failed to decode config state: %v", err) |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 153 | } |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 154 | configState.Name = name |
| 155 | |
| 156 | // This exemplifies how to override or set specific config fields, if, |
| 157 | // for example, the node manager is invoked 'by hand' instead of via a |
| 158 | // script prepared by a previous version of the node manager. |
Bogdan Caprita | 78b6216 | 2014-08-21 15:35:08 -0700 | [diff] [blame] | 159 | if len(args) > 0 { |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 160 | if want, got := 4, len(args); want != got { |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 161 | vlog.Fatalf("expected %d additional arguments, got %d instead", want, got) |
| 162 | } |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 163 | configState.Root, configState.Helper, configState.Origin, configState.CurrentLink = args[0], args[1], args[2], args[3] |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 164 | } |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 165 | dispatcher, err := impl.NewDispatcher(configState) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 166 | if err != nil { |
| 167 | vlog.Fatalf("Failed to create node manager dispatcher: %v", err) |
| 168 | } |
Cosmos Nicolaou | 92dba58 | 2014-11-05 17:24:10 -0800 | [diff] [blame] | 169 | if err := server.ServeDispatcher(publishName, dispatcher); err != nil { |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 170 | vlog.Fatalf("Serve(%v) failed: %v", publishName, err) |
| 171 | } |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 172 | impl.InvokeCallback(name) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 173 | |
| 174 | fmt.Fprintf(stdout, "ready:%d\n", os.Getpid()) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 175 | |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 176 | <-signals.ShutdownOnSignals() |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 177 | |
| 178 | if val, present := env["PAUSE_BEFORE_STOP"]; present && val == "1" { |
| 179 | modules.WaitForEOF(stdin) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 180 | } |
Bogdan Caprita | 78b6216 | 2014-08-21 15:35:08 -0700 | [diff] [blame] | 181 | if dispatcher.Leaking() { |
| 182 | vlog.Fatalf("node manager leaking resources") |
| 183 | } |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 184 | return nil |
| 185 | } |
| 186 | |
| 187 | // install installs the node manager. |
| 188 | func install(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error { |
| 189 | args = args[1:] |
| 190 | // args[0] is the entrypoint for the binary to be run from the shell script |
| 191 | // that SelfInstall will write out. |
| 192 | entrypoint := args[0] |
Cosmos Nicolaou | d4f0056 | 2014-11-17 20:35:48 -0800 | [diff] [blame] | 193 | // Overwrite the entrypoint in our environment (i.e. the one |
| 194 | // that got us here), with the one we want written out in the shell |
| 195 | // script. |
| 196 | osenv := modules.SetEntryPoint(env, entrypoint) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 197 | if args[1] != "--" { |
| 198 | vlog.Fatalf("expected '--' immediately following command name") |
| 199 | } |
| 200 | args = append([]string{""}, args[2:]...) // skip the cmd and '--' |
| 201 | if err := impl.SelfInstall(args, osenv); err != nil { |
| 202 | vlog.Fatalf("SelfInstall failed: %v", err) |
| 203 | return err |
| 204 | } |
| 205 | return nil |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 206 | } |
| 207 | |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 208 | // appService defines a test service that the test app should be running. |
| 209 | // TODO(caprita): Use this to make calls to the app and verify how Suspend/Stop |
| 210 | // interact with an active service. |
| 211 | type appService struct{} |
| 212 | |
Todd Wang | 1fe7cdd | 2014-11-12 12:51:49 -0800 | [diff] [blame] | 213 | func (appService) Echo(_ ipc.ServerContext, message string) (string, error) { |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 214 | return message, nil |
| 215 | } |
| 216 | |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 217 | func ping() { |
Robert Kroeger | 627a115 | 2014-10-01 14:57:55 -0700 | [diff] [blame] | 218 | if call, err := rt.R().Client().StartCall(rt.R().NewContext(), "pingserver", "Ping", []interface{}{os.Getenv(suidhelper.SavedArgs)}); err != nil { |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 219 | vlog.Fatalf("StartCall failed: %v", err) |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 220 | } else if err := call.Finish(); err != nil { |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 221 | vlog.Fatalf("Finish failed: %v", err) |
| 222 | } |
| 223 | } |
| 224 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 225 | func app(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error { |
| 226 | args = args[1:] |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 227 | if expected, got := 1, len(args); expected != got { |
| 228 | vlog.Fatalf("Unexpected number of arguments: expected %d, got %d", expected, got) |
| 229 | } |
| 230 | publishName := args[0] |
| 231 | |
| 232 | defer rt.R().Cleanup() |
| 233 | server, _ := newServer() |
| 234 | defer server.Stop() |
Cosmos Nicolaou | 92dba58 | 2014-11-05 17:24:10 -0800 | [diff] [blame] | 235 | if err := server.Serve(publishName, new(appService), nil); err != nil { |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 236 | vlog.Fatalf("Serve(%v) failed: %v", publishName, err) |
| 237 | } |
Cosmos Nicolaou | e339153 | 2014-11-25 19:08:32 -0800 | [diff] [blame^] | 238 | // Some of our tests look for log files, so make sure they are flushed |
| 239 | // to ensure that at least the files exist. |
| 240 | vlog.FlushLog() |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 241 | ping() |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 242 | |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 243 | <-signals.ShutdownOnSignals() |
| 244 | if err := ioutil.WriteFile("testfile", []byte("goodbye world"), 0600); err != nil { |
| 245 | vlog.Fatalf("Failed to write testfile: %v", err) |
| 246 | } |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 247 | return nil |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 248 | } |
| 249 | |
Robert Kroeger | dd07b36 | 2014-09-18 17:34:42 -0700 | [diff] [blame] | 250 | // TODO(rjkroege): generateNodeManagerScript and generateSuidHelperScript have code |
| 251 | // similarity that might benefit from refactoring. |
| 252 | // generateNodeManagerScript is very similar in behavior to generateScript in node_invoker.go. |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 253 | // However, we chose to re-implement it here for two reasons: (1) avoid making |
| 254 | // generateScript public; and (2) how the test choses to invoke the node manager |
| 255 | // subprocess the first time should be independent of how node manager |
| 256 | // implementation sets up its updated versions. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 257 | func generateNodeManagerScript(t *testing.T, root string, args, env []string) string { |
| 258 | env = impl.VeyronEnvironment(env) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 259 | output := "#!/bin/bash\n" |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 260 | output += strings.Join(config.QuoteEnv(env), " ") + " " |
| 261 | output += strings.Join(args, " ") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 262 | if err := os.MkdirAll(filepath.Join(root, "factory"), 0755); err != nil { |
| 263 | t.Fatalf("MkdirAll failed: %v", err) |
| 264 | } |
| 265 | // Why pigeons? To show that the name we choose for the initial script |
| 266 | // doesn't matter and in particular is independent of how node manager |
| 267 | // names its updated version scripts (noded.sh). |
| 268 | path := filepath.Join(root, "factory", "pigeons.sh") |
| 269 | if err := ioutil.WriteFile(path, []byte(output), 0755); err != nil { |
| 270 | t.Fatalf("WriteFile(%v) failed: %v", path, err) |
| 271 | } |
| 272 | return path |
| 273 | } |
| 274 | |
Robert Kroeger | 94ec756 | 2014-10-28 17:58:44 -0700 | [diff] [blame] | 275 | /// readPID waits for the "ready:<PID>" line from the child and parses out the |
Bogdan Caprita | 78b6216 | 2014-08-21 15:35:08 -0700 | [diff] [blame] | 276 | // PID of the child. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 277 | func readPID(t *testing.T, s *expect.Session) int { |
| 278 | m := s.ExpectRE("ready:([0-9]+)", -1) |
| 279 | if len(m) == 1 && len(m[0]) == 2 { |
| 280 | pid, err := strconv.Atoi(m[0][1]) |
| 281 | if err != nil { |
| 282 | t.Fatalf("%s: Atoi(%q) failed: %v", loc(1), m[0][1], err) |
| 283 | } |
| 284 | return pid |
Bogdan Caprita | 78b6216 | 2014-08-21 15:35:08 -0700 | [diff] [blame] | 285 | } |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 286 | t.Fatalf("%s: failed to extract pid: %v", loc(1), m) |
| 287 | return 0 |
Bogdan Caprita | 78b6216 | 2014-08-21 15:35:08 -0700 | [diff] [blame] | 288 | } |
| 289 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 290 | // TestNodeManagerUpdateAndRevert makes the node manager go through the |
| 291 | // motions of updating itself to newer versions (twice), and reverting itself |
| 292 | // back (twice). It also checks that update and revert fail when they're |
| 293 | // supposed to. The initial node manager is started 'by hand' via a module |
| 294 | // command. Further versions are started through the soft link that the node |
| 295 | // manager itself updates. |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 296 | func TestNodeManagerUpdateAndRevert(t *testing.T) { |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 297 | sh, deferFn := createShellAndMountTable(t) |
| 298 | defer deferFn() |
| 299 | |
| 300 | // Set up mock application and binary repositories. |
| 301 | envelope, cleanup := startMockRepos(t) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 302 | defer cleanup() |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 303 | |
Bogdan Caprita | 732e511 | 2014-09-23 17:20:41 -0700 | [diff] [blame] | 304 | root, cleanup := setupRootDir(t) |
Bogdan Caprita | 080a730 | 2014-08-20 15:35:37 -0700 | [diff] [blame] | 305 | defer cleanup() |
Jiri Simsa | e0fc61a | 2014-07-30 14:41:55 -0700 | [diff] [blame] | 306 | |
Bogdan Caprita | d2b9f03 | 2014-10-10 17:43:29 -0700 | [diff] [blame] | 307 | // Current link does not have to live in the root dir, but it's |
| 308 | // convenient to put it there so we have everything in one place. |
| 309 | currLink := filepath.Join(root, "current_link") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 310 | |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 311 | crDir, crEnv := credentialsForChild("nodemanager") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 312 | defer os.RemoveAll(crDir) |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 313 | nmArgs := []string{"factoryNM", root, "unused_helper", mockApplicationRepoName, currLink} |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 314 | args, env := sh.CommandEnvelope(nodeManagerCmd, crEnv, nmArgs...) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 315 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 316 | scriptPathFactory := generateNodeManagerScript(t, root, args, env) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 317 | |
| 318 | if err := os.Symlink(scriptPathFactory, currLink); err != nil { |
| 319 | t.Fatalf("Symlink(%q, %q) failed: %v", scriptPathFactory, currLink, err) |
| 320 | } |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 321 | |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 322 | // We instruct the initial node manager that we run to pause before |
| 323 | // stopping its service, so that we get a chance to verify that |
| 324 | // attempting an update while another one is ongoing will fail. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 325 | nmPauseBeforeStopEnv := append(crEnv, "PAUSE_BEFORE_STOP=1") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 326 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 327 | // Start the initial version of the node manager, the so-called |
| 328 | // "factory" version. We use the modules-generated command to start it. |
| 329 | // We could have also used the scriptPathFactory to start it, but |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 330 | // this demonstrates that the initial node manager could be started by |
| 331 | // hand as long as the right initial configuration is passed into the |
| 332 | // node manager implementation. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 333 | nmh, nms := runShellCommand(t, sh, nmPauseBeforeStopEnv, nodeManagerCmd, nmArgs...) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 334 | defer func() { |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 335 | syscall.Kill(nmh.Pid(), syscall.SIGINT) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 336 | }() |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 337 | |
| 338 | readPID(t, nms) |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 339 | resolve(t, "factoryNM", 1) // Verify the node manager has published itself. |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 340 | |
| 341 | // Simulate an invalid envelope in the application repository. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 342 | *envelope = envelopeFromShell(sh, nmPauseBeforeStopEnv, nodeManagerCmd, "bogus", nmArgs...) |
| 343 | |
Tilak Sharma | 492e8e9 | 2014-09-18 10:58:14 -0700 | [diff] [blame] | 344 | updateNodeExpectError(t, "factoryNM", verror.BadArg) // Incorrect title. |
| 345 | revertNodeExpectError(t, "factoryNM", verror.NoExist) // No previous version available. |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 346 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 347 | // Set up a second version of the node manager. The information in the |
| 348 | // envelope will be used by the node manager to stage the next version. |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 349 | crDir, crEnv = credentialsForChild("nodemanager") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 350 | defer os.RemoveAll(crDir) |
| 351 | *envelope = envelopeFromShell(sh, crEnv, nodeManagerCmd, application.NodeManagerTitle, "v2NM") |
Bogdan Caprita | 48bbd14 | 2014-09-04 16:07:23 -0700 | [diff] [blame] | 352 | updateNode(t, "factoryNM") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 353 | |
| 354 | // Current link should have been updated to point to v2. |
| 355 | evalLink := func() string { |
| 356 | path, err := filepath.EvalSymlinks(currLink) |
| 357 | if err != nil { |
| 358 | t.Fatalf("EvalSymlinks(%v) failed: %v", currLink, err) |
| 359 | } |
| 360 | return path |
| 361 | } |
| 362 | scriptPathV2 := evalLink() |
| 363 | if scriptPathFactory == scriptPathV2 { |
Jiri Simsa | 6351ee7 | 2014-08-18 16:44:41 -0700 | [diff] [blame] | 364 | t.Fatalf("current link didn't change") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 365 | } |
| 366 | |
Bogdan Caprita | 48bbd14 | 2014-09-04 16:07:23 -0700 | [diff] [blame] | 367 | updateNodeExpectError(t, "factoryNM", verror.Exists) // Update already in progress. |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 368 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 369 | nmh.CloseStdin() |
| 370 | |
| 371 | nms.Expect("factoryNM terminating") |
| 372 | nmh.Shutdown(os.Stderr, os.Stderr) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 373 | |
| 374 | // A successful update means the node manager has stopped itself. We |
| 375 | // relaunch it from the current link. |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 376 | resolveExpectNotFound(t, "v2NM") // Ensure a clean slate. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 377 | |
| 378 | nmh, nms = runShellCommand(t, sh, nil, execScriptCmd, currLink) |
| 379 | |
| 380 | readPID(t, nms) |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 381 | resolve(t, "v2NM", 1) // Current link should have been launching v2. |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 382 | |
| 383 | // Try issuing an update without changing the envelope in the application |
| 384 | // repository: this should fail, and current link should be unchanged. |
Benjamin Prosnitz | b8178d3 | 2014-11-04 10:24:12 -0800 | [diff] [blame] | 385 | updateNodeExpectError(t, "v2NM", naming.ErrNoSuchName.ID) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 386 | if evalLink() != scriptPathV2 { |
Jiri Simsa | 6351ee7 | 2014-08-18 16:44:41 -0700 | [diff] [blame] | 387 | t.Fatalf("script changed") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 388 | } |
| 389 | |
| 390 | // Create a third version of the node manager and issue an update. |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 391 | crDir, crEnv = credentialsForChild("nodemanager") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 392 | defer os.RemoveAll(crDir) |
Bogdan Caprita | 57ca0ff | 2014-11-18 10:09:01 -0800 | [diff] [blame] | 393 | *envelope = envelopeFromShell(sh, crEnv, nodeManagerCmd, application.NodeManagerTitle, "v3NM") |
Bogdan Caprita | 48bbd14 | 2014-09-04 16:07:23 -0700 | [diff] [blame] | 394 | updateNode(t, "v2NM") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 395 | |
| 396 | scriptPathV3 := evalLink() |
| 397 | if scriptPathV3 == scriptPathV2 { |
Jiri Simsa | 6351ee7 | 2014-08-18 16:44:41 -0700 | [diff] [blame] | 398 | t.Fatalf("current link didn't change") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 399 | } |
| 400 | |
Bogdan Caprita | 57ca0ff | 2014-11-18 10:09:01 -0800 | [diff] [blame] | 401 | nms.Expect("v2NM terminating") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 402 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 403 | nmh.Shutdown(os.Stderr, os.Stderr) |
| 404 | |
| 405 | resolveExpectNotFound(t, "v3NM") // Ensure a clean slate. |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 406 | |
| 407 | // Re-lanuch the node manager from current link. |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 408 | // We instruct the node manager to pause before stopping its server, so |
| 409 | // that we can verify that a second revert fails while a revert is in |
| 410 | // progress. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 411 | nmh, nms = runShellCommand(t, sh, nmPauseBeforeStopEnv, execScriptCmd, currLink) |
| 412 | |
| 413 | readPID(t, nms) |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 414 | resolve(t, "v3NM", 1) // Current link should have been launching v3. |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 415 | |
| 416 | // Revert the node manager to its previous version (v2). |
Bogdan Caprita | 48bbd14 | 2014-09-04 16:07:23 -0700 | [diff] [blame] | 417 | revertNode(t, "v3NM") |
| 418 | revertNodeExpectError(t, "v3NM", verror.Exists) // Revert already in progress. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 419 | nmh.CloseStdin() |
| 420 | nms.Expect("v3NM terminating") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 421 | if evalLink() != scriptPathV2 { |
Jiri Simsa | 6351ee7 | 2014-08-18 16:44:41 -0700 | [diff] [blame] | 422 | t.Fatalf("current link was not reverted correctly") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 423 | } |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 424 | nmh.Shutdown(os.Stderr, os.Stderr) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 425 | |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 426 | resolveExpectNotFound(t, "v2NM") // Ensure a clean slate. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 427 | |
| 428 | nmh, nms = runShellCommand(t, sh, nil, execScriptCmd, currLink) |
| 429 | readPID(t, nms) |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 430 | resolve(t, "v2NM", 1) // Current link should have been launching v2. |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 431 | |
| 432 | // Revert the node manager to its previous version (factory). |
Bogdan Caprita | 48bbd14 | 2014-09-04 16:07:23 -0700 | [diff] [blame] | 433 | revertNode(t, "v2NM") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 434 | nms.Expect("v2NM terminating") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 435 | if evalLink() != scriptPathFactory { |
Jiri Simsa | 6351ee7 | 2014-08-18 16:44:41 -0700 | [diff] [blame] | 436 | t.Fatalf("current link was not reverted correctly") |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 437 | } |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 438 | nmh.Shutdown(os.Stderr, os.Stderr) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 439 | |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 440 | resolveExpectNotFound(t, "factoryNM") // Ensure a clean slate. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 441 | nmh, nms = runShellCommand(t, sh, nil, execScriptCmd, currLink) |
| 442 | pid := readPID(t, nms) |
| 443 | resolve(t, "factoryNM", 1) // Current link should have been launching |
Bogdan Caprita | 78b6216 | 2014-08-21 15:35:08 -0700 | [diff] [blame] | 444 | syscall.Kill(pid, syscall.SIGINT) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 445 | nms.Expect("factoryNM terminating") |
| 446 | nms.ExpectEOF() |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 447 | } |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 448 | |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 449 | type pingServer chan<- string |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 450 | |
Bogdan Caprita | 916e99f | 2014-11-24 15:47:19 -0800 | [diff] [blame] | 451 | // TODO(caprita): Set the timeout in a more principled manner. |
| 452 | const pingTimeout = 20 * time.Second |
| 453 | |
Todd Wang | 1fe7cdd | 2014-11-12 12:51:49 -0800 | [diff] [blame] | 454 | func (p pingServer) Ping(_ ipc.ServerContext, arg string) { |
Robert Kroeger | 627a115 | 2014-10-01 14:57:55 -0700 | [diff] [blame] | 455 | p <- arg |
| 456 | } |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 457 | |
Bogdan Caprita | d2b9f03 | 2014-10-10 17:43:29 -0700 | [diff] [blame] | 458 | // setupPingServer creates a server listening for a ping from a child app; it |
| 459 | // returns a channel on which the app's ping message is returned, and a cleanup |
| 460 | // function. |
| 461 | func setupPingServer(t *testing.T) (<-chan string, func()) { |
| 462 | server, _ := newServer() |
| 463 | pingCh := make(chan string, 1) |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 464 | if err := server.Serve("pingserver", pingServer(pingCh), nil); err != nil { |
Bogdan Caprita | d2b9f03 | 2014-10-10 17:43:29 -0700 | [diff] [blame] | 465 | t.Fatalf("Serve(%q, <dispatcher>) failed: %v", "pingserver", err) |
| 466 | } |
| 467 | return pingCh, func() { |
| 468 | if err := server.Stop(); err != nil { |
| 469 | t.Fatalf("Stop() failed: %v", err) |
| 470 | } |
| 471 | } |
| 472 | } |
| 473 | |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 474 | func verifyAppWorkspace(t *testing.T, root, appID, instanceID string) { |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 475 | // HACK ALERT: for now, we peek inside the node manager's directory |
| 476 | // structure (which ought to be opaque) to check for what the app has |
| 477 | // written to its local root. |
| 478 | // |
| 479 | // TODO(caprita): add support to node manager to browse logs/app local |
| 480 | // root. |
| 481 | applicationDirName := func(title string) string { |
| 482 | h := md5.New() |
| 483 | h.Write([]byte(title)) |
| 484 | hash := strings.TrimRight(base64.URLEncoding.EncodeToString(h.Sum(nil)), "=") |
| 485 | return "app-" + hash |
| 486 | } |
| 487 | components := strings.Split(appID, "/") |
| 488 | appTitle, installationID := components[0], components[1] |
Bogdan Caprita | 268b419 | 2014-08-28 10:04:44 -0700 | [diff] [blame] | 489 | instanceDir := filepath.Join(root, applicationDirName(appTitle), "installation-"+installationID, "instances", "instance-"+instanceID) |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 490 | rootDir := filepath.Join(instanceDir, "root") |
| 491 | testFile := filepath.Join(rootDir, "testfile") |
| 492 | if read, err := ioutil.ReadFile(testFile); err != nil { |
Jiri Simsa | 6351ee7 | 2014-08-18 16:44:41 -0700 | [diff] [blame] | 493 | t.Fatalf("Failed to read %v: %v", testFile, err) |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 494 | } else if want, got := "goodbye world", string(read); want != got { |
Jiri Simsa | 6351ee7 | 2014-08-18 16:44:41 -0700 | [diff] [blame] | 495 | t.Fatalf("Expected to read %v, got %v instead", want, got) |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 496 | } |
| 497 | // END HACK |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 498 | } |
Bogdan Caprita | 78b6216 | 2014-08-21 15:35:08 -0700 | [diff] [blame] | 499 | |
Robert Kroeger | 627a115 | 2014-10-01 14:57:55 -0700 | [diff] [blame] | 500 | // TODO(rjkroege): Consider validating additional parameters. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 501 | func verifyHelperArgs(t *testing.T, pingCh <-chan string, username string) { |
| 502 | var env string |
| 503 | select { |
| 504 | case env = <-pingCh: |
Bogdan Caprita | 916e99f | 2014-11-24 15:47:19 -0800 | [diff] [blame] | 505 | case <-time.After(pingTimeout): |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 506 | t.Fatalf("%s: failed to get ping", loc(1)) |
| 507 | } |
Robert Kroeger | 627a115 | 2014-10-01 14:57:55 -0700 | [diff] [blame] | 508 | d := json.NewDecoder(strings.NewReader(env)) |
| 509 | var savedArgs suidhelper.ArgsSavedForTest |
| 510 | |
| 511 | if err := d.Decode(&savedArgs); err != nil { |
| 512 | t.Fatalf("failed to decode preserved argument %v: %v", env, err) |
| 513 | } |
| 514 | |
| 515 | if savedArgs.Uname != username { |
| 516 | t.Fatalf("got username %v, expected username %v", savedArgs.Uname, username) |
| 517 | } |
| 518 | } |
| 519 | |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 520 | // TestAppLifeCycle installs an app, starts it, suspends it, resumes it, and |
| 521 | // then stops it. |
| 522 | func TestAppLifeCycle(t *testing.T) { |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 523 | sh, deferFn := createShellAndMountTable(t) |
| 524 | defer deferFn() |
| 525 | |
| 526 | // Set up mock application and binary repositories. |
| 527 | envelope, cleanup := startMockRepos(t) |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 528 | defer cleanup() |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 529 | |
Bogdan Caprita | 732e511 | 2014-09-23 17:20:41 -0700 | [diff] [blame] | 530 | root, cleanup := setupRootDir(t) |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 531 | defer cleanup() |
| 532 | |
Robert Kroeger | dd07b36 | 2014-09-18 17:34:42 -0700 | [diff] [blame] | 533 | // Create a script wrapping the test target that implements suidhelper. |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 534 | helperPath := generateSuidHelperScript(t, root) |
Robert Kroeger | dd07b36 | 2014-09-18 17:34:42 -0700 | [diff] [blame] | 535 | |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 536 | crDir, crEnv := credentialsForChild("nodemanager") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 537 | defer os.RemoveAll(crDir) |
| 538 | |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 539 | // Set up the node manager. Since we won't do node manager updates, |
| 540 | // don't worry about its application envelope and current link. |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 541 | nmh, nms := runShellCommand(t, sh, crEnv, nodeManagerCmd, "nm", root, helperPath, "unused_app_rep_ name", "unused_curr_link") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 542 | readPID(t, nms) |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 543 | |
| 544 | // Create the local server that the app uses to let us know it's ready. |
Bogdan Caprita | d2b9f03 | 2014-10-10 17:43:29 -0700 | [diff] [blame] | 545 | pingCh, cleanup := setupPingServer(t) |
| 546 | defer cleanup() |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 547 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 548 | resolve(t, "pingserver", 1) |
| 549 | |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 550 | // Create an envelope for a first version of the app. |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 551 | *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "appV1") |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 552 | |
| 553 | // Install the app. |
| 554 | appID := installApp(t) |
Bogdan Caprita | 730bde1 | 2014-11-08 15:35:43 -0800 | [diff] [blame] | 555 | |
| 556 | // Start requires the caller to grant a blessing for the app instance. |
| 557 | if _, err := startAppImpl(t, appID, ""); err == nil || !verror.Is(err, verror.BadArg) { |
| 558 | t.Fatalf("Start(%v) expected to fail with %v, got %v instead", appID, verror.BadArg, err) |
| 559 | } |
| 560 | |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 561 | // Start an instance of the app. |
| 562 | instance1ID := startApp(t, appID) |
Robert Kroeger | 627a115 | 2014-10-01 14:57:55 -0700 | [diff] [blame] | 563 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 564 | // Wait until the app pings us that it's ready. |
| 565 | verifyHelperArgs(t, pingCh, userName(t)) |
Robert Kroeger | 627a115 | 2014-10-01 14:57:55 -0700 | [diff] [blame] | 566 | |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 567 | v1EP1 := resolve(t, "appV1", 1)[0] |
| 568 | |
| 569 | // Suspend the app instance. |
| 570 | suspendApp(t, appID, instance1ID) |
| 571 | resolveExpectNotFound(t, "appV1") |
| 572 | |
| 573 | resumeApp(t, appID, instance1ID) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 574 | verifyHelperArgs(t, pingCh, userName(t)) // Wait until the app pings us that it's ready. |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 575 | oldV1EP1 := v1EP1 |
| 576 | if v1EP1 = resolve(t, "appV1", 1)[0]; v1EP1 == oldV1EP1 { |
| 577 | t.Fatalf("Expected a new endpoint for the app after suspend/resume") |
| 578 | } |
| 579 | |
| 580 | // Start a second instance. |
| 581 | instance2ID := startApp(t, appID) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 582 | verifyHelperArgs(t, pingCh, userName(t)) // Wait until the app pings us that it's ready. |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 583 | |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 584 | // There should be two endpoints mounted as "appV1", one for each |
| 585 | // instance of the app. |
| 586 | endpoints := resolve(t, "appV1", 2) |
| 587 | v1EP2 := endpoints[0] |
| 588 | if endpoints[0] == v1EP1 { |
| 589 | v1EP2 = endpoints[1] |
| 590 | if v1EP2 == v1EP1 { |
| 591 | t.Fatalf("Both endpoints are the same") |
| 592 | } |
| 593 | } else if endpoints[1] != v1EP1 { |
| 594 | t.Fatalf("Second endpoint should have been v1EP1: %v, %v", endpoints, v1EP1) |
| 595 | } |
Bogdan Caprita | 268b419 | 2014-08-28 10:04:44 -0700 | [diff] [blame] | 596 | |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 597 | // TODO(caprita): test Suspend and Resume, and verify various |
| 598 | // non-standard combinations (suspend when stopped; resume while still |
| 599 | // running; stop while suspended). |
| 600 | |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 601 | // Suspend the first instance. |
| 602 | suspendApp(t, appID, instance1ID) |
| 603 | // Only the second instance should still be running and mounted. |
| 604 | if want, got := v1EP2, resolve(t, "appV1", 1)[0]; want != got { |
| 605 | t.Fatalf("Resolve(%v): want: %v, got %v", "appV1", want, got) |
| 606 | } |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 607 | |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 608 | // Updating the installation to itself is a no-op. |
Benjamin Prosnitz | b8178d3 | 2014-11-04 10:24:12 -0800 | [diff] [blame] | 609 | updateAppExpectError(t, appID, naming.ErrNoSuchName.ID) |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 610 | |
| 611 | // Updating the installation should not work with a mismatched title. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 612 | *envelope = envelopeFromShell(sh, nil, appCmd, "bogus") |
| 613 | |
Bogdan Caprita | 48bbd14 | 2014-09-04 16:07:23 -0700 | [diff] [blame] | 614 | updateAppExpectError(t, appID, verror.BadArg) |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 615 | |
| 616 | // Create a second version of the app and update the app to it. |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 617 | *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "appV2") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 618 | |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 619 | updateApp(t, appID) |
| 620 | |
| 621 | // Second instance should still be running. |
| 622 | if want, got := v1EP2, resolve(t, "appV1", 1)[0]; want != got { |
| 623 | t.Fatalf("Resolve(%v): want: %v, got %v", "appV1", want, got) |
| 624 | } |
| 625 | |
| 626 | // Resume first instance. |
| 627 | resumeApp(t, appID, instance1ID) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 628 | verifyHelperArgs(t, pingCh, userName(t)) // Wait until the app pings us that it's ready. |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 629 | // Both instances should still be running the first version of the app. |
| 630 | // Check that the mounttable contains two endpoints, one of which is |
| 631 | // v1EP2. |
| 632 | endpoints = resolve(t, "appV1", 2) |
| 633 | if endpoints[0] == v1EP2 { |
| 634 | if endpoints[1] == v1EP2 { |
| 635 | t.Fatalf("Both endpoints are the same") |
| 636 | } |
| 637 | } else if endpoints[1] != v1EP2 { |
| 638 | t.Fatalf("Second endpoint should have been v1EP2: %v, %v", endpoints, v1EP2) |
| 639 | } |
| 640 | |
| 641 | // Stop first instance. |
| 642 | stopApp(t, appID, instance1ID) |
| 643 | verifyAppWorkspace(t, root, appID, instance1ID) |
| 644 | |
| 645 | // Only second instance is still running. |
| 646 | if want, got := v1EP2, resolve(t, "appV1", 1)[0]; want != got { |
| 647 | t.Fatalf("Resolve(%v): want: %v, got %v", "appV1", want, got) |
| 648 | } |
| 649 | |
| 650 | // Start a third instance. |
| 651 | instance3ID := startApp(t, appID) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 652 | // Wait until the app pings us that it's ready. |
| 653 | verifyHelperArgs(t, pingCh, userName(t)) |
| 654 | |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 655 | resolve(t, "appV2", 1) |
| 656 | |
| 657 | // Stop second instance. |
| 658 | stopApp(t, appID, instance2ID) |
| 659 | resolveExpectNotFound(t, "appV1") |
| 660 | |
| 661 | // Stop third instance. |
| 662 | stopApp(t, appID, instance3ID) |
| 663 | resolveExpectNotFound(t, "appV2") |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 664 | |
Bogdan Caprita | 53b7b7e | 2014-09-03 20:51:16 -0700 | [diff] [blame] | 665 | // Revert the app. |
| 666 | revertApp(t, appID) |
| 667 | |
| 668 | // Start a fourth instance. It should be started from version 1. |
| 669 | instance4ID := startApp(t, appID) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 670 | verifyHelperArgs(t, pingCh, userName(t)) // Wait until the app pings us that it's ready. |
Bogdan Caprita | 53b7b7e | 2014-09-03 20:51:16 -0700 | [diff] [blame] | 671 | resolve(t, "appV1", 1) |
| 672 | stopApp(t, appID, instance4ID) |
| 673 | resolveExpectNotFound(t, "appV1") |
| 674 | |
| 675 | // We are already on the first version, no further revert possible. |
Benjamin Prosnitz | b8178d3 | 2014-11-04 10:24:12 -0800 | [diff] [blame] | 676 | revertAppExpectError(t, appID, naming.ErrNoSuchName.ID) |
Bogdan Caprita | 53b7b7e | 2014-09-03 20:51:16 -0700 | [diff] [blame] | 677 | |
Bogdan Caprita | 8c776b2 | 2014-08-28 17:29:07 -0700 | [diff] [blame] | 678 | // Uninstall the app. |
| 679 | uninstallApp(t, appID) |
| 680 | |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 681 | // Updating the installation should no longer be allowed. |
Bogdan Caprita | 48bbd14 | 2014-09-04 16:07:23 -0700 | [diff] [blame] | 682 | updateAppExpectError(t, appID, verror.BadArg) |
Bogdan Caprita | bce0a63 | 2014-09-03 16:15:26 -0700 | [diff] [blame] | 683 | |
Bogdan Caprita | 53b7b7e | 2014-09-03 20:51:16 -0700 | [diff] [blame] | 684 | // Reverting the installation should no longer be allowed. |
Bogdan Caprita | 48bbd14 | 2014-09-04 16:07:23 -0700 | [diff] [blame] | 685 | revertAppExpectError(t, appID, verror.BadArg) |
Bogdan Caprita | 53b7b7e | 2014-09-03 20:51:16 -0700 | [diff] [blame] | 686 | |
Bogdan Caprita | 8c776b2 | 2014-08-28 17:29:07 -0700 | [diff] [blame] | 687 | // Starting new instances should no longer be allowed. |
Bogdan Caprita | 48bbd14 | 2014-09-04 16:07:23 -0700 | [diff] [blame] | 688 | startAppExpectError(t, appID, verror.BadArg) |
Bogdan Caprita | 8c776b2 | 2014-08-28 17:29:07 -0700 | [diff] [blame] | 689 | |
Bogdan Caprita | 9a59b8c | 2014-08-22 14:21:10 -0700 | [diff] [blame] | 690 | // Cleanly shut down the node manager. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 691 | syscall.Kill(nmh.Pid(), syscall.SIGINT) |
| 692 | nms.Expect("nm terminating") |
| 693 | nms.ExpectEOF() |
Bogdan Caprita | 1e37913 | 2014-08-03 23:02:31 -0700 | [diff] [blame] | 694 | } |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 695 | |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 696 | func newRuntime(t *testing.T) veyron2.Runtime { |
Asim Shankar | 7b5c94a | 2014-10-28 21:42:56 -0700 | [diff] [blame] | 697 | runtime, err := rt.New() |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 698 | if err != nil { |
| 699 | t.Fatalf("rt.New() failed: %v", err) |
| 700 | } |
| 701 | runtime.Namespace().SetRoots(rt.R().Namespace().Roots()[0]) |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 702 | return runtime |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 703 | } |
| 704 | |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 705 | func tryInstall(rt veyron2.Runtime) error { |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 706 | appsName := "nm//apps" |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 707 | stub := node.ApplicationClient(appsName, rt.Client()) |
| 708 | if _, err := stub.Install(rt.NewContext(), mockApplicationRepoName); err != nil { |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 709 | return fmt.Errorf("Install failed: %v", err) |
| 710 | } |
| 711 | return nil |
| 712 | } |
| 713 | |
| 714 | // TestNodeManagerClaim claims a nodemanager and tests ACL permissions on its methods. |
| 715 | func TestNodeManagerClaim(t *testing.T) { |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 716 | sh, deferFn := createShellAndMountTable(t) |
| 717 | defer deferFn() |
| 718 | |
| 719 | // Set up mock application and binary repositories. |
| 720 | envelope, cleanup := startMockRepos(t) |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 721 | defer cleanup() |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 722 | |
Bogdan Caprita | 732e511 | 2014-09-23 17:20:41 -0700 | [diff] [blame] | 723 | root, cleanup := setupRootDir(t) |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 724 | defer cleanup() |
| 725 | |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 726 | crDir, crEnv := credentialsForChild("nodemanager") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 727 | defer os.RemoveAll(crDir) |
| 728 | |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 729 | // Create a script wrapping the test target that implements suidhelper. |
| 730 | helperPath := generateSuidHelperScript(t, root) |
| 731 | |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 732 | // Set up the node manager. Since we won't do node manager updates, |
| 733 | // don't worry about its application envelope and current link. |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 734 | _, nms := runShellCommand(t, sh, crEnv, nodeManagerCmd, "nm", root, helperPath, "unused_app_repo_name", "unused_curr_link") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 735 | pid := readPID(t, nms) |
| 736 | defer syscall.Kill(pid, syscall.SIGINT) |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 737 | |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 738 | *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "trapp") |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 739 | |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 740 | nodeStub := node.NodeClient("nm//nm") |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 741 | selfRT := rt.R() |
| 742 | otherRT := newRuntime(t) |
| 743 | defer otherRT.Cleanup() |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 744 | |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 745 | // Nodemanager should have open ACLs before we claim it and so an Install from otherRT should succeed. |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 746 | if err := tryInstall(otherRT); err != nil { |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 747 | t.Fatal(err) |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 748 | } |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 749 | // Claim the nodemanager with selfRT as <defaultblessing>/mydevice |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 750 | if err := nodeStub.Claim(selfRT.NewContext(), &granter{p: selfRT.Principal(), extension: "mydevice"}); err != nil { |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 751 | t.Fatal(err) |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 752 | } |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 753 | |
Bogdan Caprita | b9501d1 | 2014-10-10 15:02:03 -0700 | [diff] [blame] | 754 | // Installation should succeed since rt.R() (a.k.a. selfRT) is now the |
| 755 | // "owner" of the nodemanager. |
| 756 | appID := installApp(t) |
| 757 | |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 758 | // otherRT should be unable to install though, since the ACLs have changed now. |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 759 | if err := tryInstall(otherRT); err == nil { |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 760 | t.Fatalf("Install should have failed from otherRT") |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 761 | } |
Bogdan Caprita | b9501d1 | 2014-10-10 15:02:03 -0700 | [diff] [blame] | 762 | |
Bogdan Caprita | b9501d1 | 2014-10-10 15:02:03 -0700 | [diff] [blame] | 763 | // Create the local server that the app uses to let us know it's ready. |
Bogdan Caprita | d2b9f03 | 2014-10-10 17:43:29 -0700 | [diff] [blame] | 764 | pingCh, cleanup := setupPingServer(t) |
| 765 | defer cleanup() |
Bogdan Caprita | b9501d1 | 2014-10-10 15:02:03 -0700 | [diff] [blame] | 766 | |
| 767 | // Start an instance of the app. |
| 768 | instanceID := startApp(t, appID) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 769 | |
| 770 | // Wait until the app pings us that it's ready. |
| 771 | select { |
| 772 | case <-pingCh: |
Bogdan Caprita | 916e99f | 2014-11-24 15:47:19 -0800 | [diff] [blame] | 773 | case <-time.After(pingTimeout): |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 774 | t.Fatalf("failed to get ping") |
| 775 | } |
Bogdan Caprita | b9501d1 | 2014-10-10 15:02:03 -0700 | [diff] [blame] | 776 | resolve(t, "trapp", 1) |
| 777 | suspendApp(t, appID, instanceID) |
| 778 | |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 779 | // TODO(gauthamt): Test that ACLs persist across nodemanager restarts |
| 780 | } |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 781 | |
| 782 | func TestNodeManagerUpdateACL(t *testing.T) { |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 783 | sh, deferFn := createShellAndMountTable(t) |
| 784 | defer deferFn() |
| 785 | |
| 786 | // Set up mock application and binary repositories. |
| 787 | envelope, cleanup := startMockRepos(t) |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 788 | defer cleanup() |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 789 | |
Bogdan Caprita | 732e511 | 2014-09-23 17:20:41 -0700 | [diff] [blame] | 790 | root, cleanup := setupRootDir(t) |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 791 | defer cleanup() |
| 792 | |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 793 | var ( |
Asim Shankar | 1ba96ef | 2014-10-26 19:52:10 -0700 | [diff] [blame] | 794 | idp = tsecurity.NewIDProvider("root") |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 795 | // The two "processes"/runtimes which will act as IPC clients to the |
| 796 | // nodemanager process. |
| 797 | selfRT = rt.R() |
| 798 | otherRT = newRuntime(t) |
| 799 | ) |
| 800 | defer otherRT.Cleanup() |
| 801 | // By default, selfRT and otherRT will have blessings generated based on the |
| 802 | // username/machine name running this process. Since these blessings will appear |
| 803 | // in ACLs, give them recognizable names. |
Asim Shankar | 1ba96ef | 2014-10-26 19:52:10 -0700 | [diff] [blame] | 804 | if err := idp.Bless(selfRT.Principal(), "self"); err != nil { |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 805 | t.Fatal(err) |
| 806 | } |
Asim Shankar | 1ba96ef | 2014-10-26 19:52:10 -0700 | [diff] [blame] | 807 | if err := idp.Bless(otherRT.Principal(), "other"); err != nil { |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 808 | t.Fatal(err) |
| 809 | } |
| 810 | |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 811 | crDir, crEnv := credentialsForChild("nodemanager") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 812 | defer os.RemoveAll(crDir) |
| 813 | |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 814 | // Set up the node manager. Since we won't do node manager updates, |
| 815 | // don't worry about its application envelope and current link. |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 816 | _, nms := runShellCommand(t, sh, crEnv, nodeManagerCmd, "nm", root, "unused_helper", "unused_app_repo_name", "unused_curr_link") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 817 | pid := readPID(t, nms) |
| 818 | defer syscall.Kill(pid, syscall.SIGINT) |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 819 | |
| 820 | // Create an envelope for an app. |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 821 | *envelope = envelopeFromShell(sh, nil, appCmd, "google naps") |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 822 | |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 823 | nodeStub := node.NodeClient("nm//nm") |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 824 | acl, etag, err := nodeStub.GetACL(selfRT.NewContext()) |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 825 | if err != nil { |
| 826 | t.Fatalf("GetACL failed:%v", err) |
| 827 | } |
| 828 | if etag != "default" { |
| 829 | t.Fatalf("getACL expected:default, got:%v(%v)", etag, acl) |
| 830 | } |
| 831 | |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 832 | // Claim the nodemanager as "root/self/mydevice" |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 833 | if err := nodeStub.Claim(selfRT.NewContext(), &granter{p: selfRT.Principal(), extension: "mydevice"}); err != nil { |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 834 | t.Fatal(err) |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 835 | } |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 836 | expectedACL := security.ACL{In: map[security.BlessingPattern]security.LabelSet{"root/self/mydevice": security.AllLabels}} |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 837 | var b bytes.Buffer |
| 838 | if err := vsecurity.SaveACL(&b, expectedACL); err != nil { |
| 839 | t.Fatalf("Failed to saveACL:%v", err) |
| 840 | } |
| 841 | md5hash := md5.Sum(b.Bytes()) |
| 842 | expectedETAG := hex.EncodeToString(md5hash[:]) |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 843 | if acl, etag, err = nodeStub.GetACL(selfRT.NewContext()); err != nil { |
| 844 | t.Fatal(err) |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 845 | } |
| 846 | if etag != expectedETAG { |
| 847 | t.Fatalf("getACL expected:%v(%v), got:%v(%v)", expectedACL, expectedETAG, acl, etag) |
| 848 | } |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 849 | // Install from otherRT should fail, since it does not match the ACL. |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 850 | if err := tryInstall(otherRT); err == nil { |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 851 | t.Fatalf("Install should have failed with random identity") |
| 852 | } |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 853 | newACL := security.ACL{In: map[security.BlessingPattern]security.LabelSet{"root/other": security.AllLabels}} |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 854 | if err := nodeStub.SetACL(selfRT.NewContext(), newACL, "invalid"); err == nil { |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 855 | t.Fatalf("SetACL should have failed with invalid etag") |
| 856 | } |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 857 | if err := nodeStub.SetACL(selfRT.NewContext(), newACL, etag); err != nil { |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 858 | t.Fatal(err) |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 859 | } |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 860 | // Install should now fail with selfRT, which no longer matches the ACLs but succeed with otherRT, which does. |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 861 | if err := tryInstall(selfRT); err == nil { |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 862 | t.Errorf("Install should have failed with selfRT since it should no longer match the ACL") |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 863 | } |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 864 | if err := tryInstall(otherRT); err != nil { |
Asim Shankar | 8829291 | 2014-10-09 19:41:07 -0700 | [diff] [blame] | 865 | t.Error(err) |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 866 | } |
| 867 | } |
Robin Thellend | 09929f4 | 2014-10-01 10:18:13 -0700 | [diff] [blame] | 868 | |
Bogdan Caprita | 5420f17 | 2014-10-10 15:58:14 -0700 | [diff] [blame] | 869 | // TestNodeManagerInstall verifies the 'self install' functionality of the node |
| 870 | // manager: it runs SelfInstall in a child process, then runs the executable |
| 871 | // from the soft link that the installation created. This should bring up a |
| 872 | // functioning node manager. |
| 873 | func TestNodeManagerInstall(t *testing.T) { |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 874 | sh, deferFn := createShellAndMountTable(t) |
| 875 | defer deferFn() |
| 876 | |
Bogdan Caprita | 5420f17 | 2014-10-10 15:58:14 -0700 | [diff] [blame] | 877 | root, cleanup := setupRootDir(t) |
| 878 | defer cleanup() |
| 879 | |
Bogdan Caprita | d2b9f03 | 2014-10-10 17:43:29 -0700 | [diff] [blame] | 880 | // Current link does not have to live in the root dir, but it's |
| 881 | // convenient to put it there so we have everything in one place. |
| 882 | currLink := filepath.Join(root, "current_link") |
Bogdan Caprita | 5420f17 | 2014-10-10 15:58:14 -0700 | [diff] [blame] | 883 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 884 | // Create an 'envelope' for the node manager that we can pass to the |
| 885 | // installer, to ensure that the node manager that the installer |
| 886 | // configures can run. The installer uses a shell script, so we need |
| 887 | // to get a set of arguments that will work from within the shell |
| 888 | // script in order for it to start a node manager. |
| 889 | // We don't need the environment here since that can only |
| 890 | // be correctly setup in the actual 'installer' command implementation |
| 891 | // (in this case the shell script) which will inherit its environment |
| 892 | // when we run it. |
| 893 | // TODO(caprita): figure out if this is really necessary, hopefully not. |
| 894 | nmargs, _ := sh.CommandEnvelope(nodeManagerCmd, nil) |
| 895 | argsForNodeManager := append([]string{nodeManagerCmd, "--"}, nmargs[1:]...) |
| 896 | argsForNodeManager = append(argsForNodeManager, "nm") |
Bogdan Caprita | 5420f17 | 2014-10-10 15:58:14 -0700 | [diff] [blame] | 897 | |
| 898 | // Add vars to instruct the installer how to configure the node manager. |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 899 | installerEnv := []string{config.RootEnv + "=" + root, config.CurrentLinkEnv + "=" + currLink, config.HelperEnv + "=" + "unused"} |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 900 | installerh, installers := runShellCommand(t, sh, installerEnv, installerCmd, argsForNodeManager...) |
| 901 | installers.ExpectEOF() |
| 902 | installerh.Shutdown(os.Stderr, os.Stderr) |
Bogdan Caprita | 5420f17 | 2014-10-10 15:58:14 -0700 | [diff] [blame] | 903 | |
| 904 | // CurrLink should now be pointing to a node manager script that |
| 905 | // can start up a node manager. |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 906 | nmh, nms := runShellCommand(t, sh, nil, execScriptCmd, currLink) |
Bogdan Caprita | 5420f17 | 2014-10-10 15:58:14 -0700 | [diff] [blame] | 907 | |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 908 | // We need the pid of the child process started by the node manager |
| 909 | // script above to signal it, not the pid of the script itself. |
| 910 | // TODO(caprita): the scripts that the node manager generates |
| 911 | // should progagate signals so you don't have to obtain the pid of the |
| 912 | // child by reading it from stdout as we do here. The node manager should |
| 913 | // be able to retain a list of the processes it spawns and be confident |
| 914 | // that sending a signal to them will also result in that signal being |
| 915 | // sent to their children and so on. |
| 916 | pid := readPID(t, nms) |
Bogdan Caprita | 5420f17 | 2014-10-10 15:58:14 -0700 | [diff] [blame] | 917 | resolve(t, "nm", 1) |
Benjamin Prosnitz | b8178d3 | 2014-11-04 10:24:12 -0800 | [diff] [blame] | 918 | revertNodeExpectError(t, "nm", naming.ErrNoSuchName.ID) // No previous version available. |
Bogdan Caprita | 5420f17 | 2014-10-10 15:58:14 -0700 | [diff] [blame] | 919 | syscall.Kill(pid, syscall.SIGINT) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 920 | |
| 921 | nms.Expect("nm terminating") |
| 922 | nms.ExpectEOF() |
| 923 | nmh.Shutdown(os.Stderr, os.Stderr) |
Bogdan Caprita | 5420f17 | 2014-10-10 15:58:14 -0700 | [diff] [blame] | 924 | } |
| 925 | |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 926 | func TestNodeManagerGlobAndDebug(t *testing.T) { |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 927 | sh, deferFn := createShellAndMountTable(t) |
| 928 | defer deferFn() |
| 929 | |
| 930 | // Set up mock application and binary repositories. |
| 931 | envelope, cleanup := startMockRepos(t) |
Robin Thellend | 9e523a6 | 2014-10-07 16:19:53 -0700 | [diff] [blame] | 932 | defer cleanup() |
Robin Thellend | 9e523a6 | 2014-10-07 16:19:53 -0700 | [diff] [blame] | 933 | |
Robin Thellend | 09929f4 | 2014-10-01 10:18:13 -0700 | [diff] [blame] | 934 | root, cleanup := setupRootDir(t) |
| 935 | defer cleanup() |
| 936 | |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 937 | crDir, crEnv := credentialsForChild("nodemanager") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 938 | defer os.RemoveAll(crDir) |
| 939 | |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 940 | // Create a script wrapping the test target that implements suidhelper. |
| 941 | helperPath := generateSuidHelperScript(t, root) |
| 942 | |
Robin Thellend | 09929f4 | 2014-10-01 10:18:13 -0700 | [diff] [blame] | 943 | // Set up the node manager. Since we won't do node manager updates, |
| 944 | // don't worry about its application envelope and current link. |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 945 | _, nms := runShellCommand(t, sh, crEnv, nodeManagerCmd, "nm", root, helperPath, "unused_app_repo_name", "unused_curr_link") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 946 | pid := readPID(t, nms) |
| 947 | defer syscall.Kill(pid, syscall.SIGINT) |
Robin Thellend | 09929f4 | 2014-10-01 10:18:13 -0700 | [diff] [blame] | 948 | |
Robin Thellend | 9e523a6 | 2014-10-07 16:19:53 -0700 | [diff] [blame] | 949 | // Create the local server that the app uses to let us know it's ready. |
Bogdan Caprita | d2b9f03 | 2014-10-10 17:43:29 -0700 | [diff] [blame] | 950 | pingCh, cleanup := setupPingServer(t) |
| 951 | defer cleanup() |
Robin Thellend | 09929f4 | 2014-10-01 10:18:13 -0700 | [diff] [blame] | 952 | |
Robin Thellend | 9e523a6 | 2014-10-07 16:19:53 -0700 | [diff] [blame] | 953 | // Create the envelope for the first version of the app. |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 954 | *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "appV1") |
Robin Thellend | 9e523a6 | 2014-10-07 16:19:53 -0700 | [diff] [blame] | 955 | |
| 956 | // Install the app. |
| 957 | appID := installApp(t) |
| 958 | installID := path.Base(appID) |
| 959 | |
| 960 | // Start an instance of the app. |
| 961 | instance1ID := startApp(t, appID) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 962 | |
| 963 | // Wait until the app pings us that it's ready. |
| 964 | select { |
| 965 | case <-pingCh: |
Bogdan Caprita | 916e99f | 2014-11-24 15:47:19 -0800 | [diff] [blame] | 966 | case <-time.After(pingTimeout): |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 967 | t.Fatalf("failed to get ping") |
| 968 | } |
Robin Thellend | 9e523a6 | 2014-10-07 16:19:53 -0700 | [diff] [blame] | 969 | |
| 970 | testcases := []struct { |
| 971 | name, pattern string |
| 972 | expected []string |
| 973 | }{ |
| 974 | {"nm", "...", []string{ |
| 975 | "", |
| 976 | "apps", |
| 977 | "apps/google naps", |
| 978 | "apps/google naps/" + installID, |
| 979 | "apps/google naps/" + installID + "/" + instance1ID, |
Robin Thellend | 4c5266e | 2014-10-27 13:19:29 -0700 | [diff] [blame] | 980 | "apps/google naps/" + installID + "/" + instance1ID + "/logs", |
| 981 | "apps/google naps/" + installID + "/" + instance1ID + "/logs/STDERR-<timestamp>", |
| 982 | "apps/google naps/" + installID + "/" + instance1ID + "/logs/STDOUT-<timestamp>", |
Robin Thellend | 5864732 | 2014-10-28 12:07:47 -0700 | [diff] [blame] | 983 | "apps/google naps/" + installID + "/" + instance1ID + "/logs/bin.INFO", |
| 984 | "apps/google naps/" + installID + "/" + instance1ID + "/logs/bin.<*>.INFO.<timestamp>", |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 985 | "apps/google naps/" + installID + "/" + instance1ID + "/pprof", |
| 986 | "apps/google naps/" + installID + "/" + instance1ID + "/stats", |
| 987 | "apps/google naps/" + installID + "/" + instance1ID + "/stats/ipc", |
| 988 | "apps/google naps/" + installID + "/" + instance1ID + "/stats/system", |
| 989 | "apps/google naps/" + installID + "/" + instance1ID + "/stats/system/start-time-rfc1123", |
| 990 | "apps/google naps/" + installID + "/" + instance1ID + "/stats/system/start-time-unix", |
Robin Thellend | 9e523a6 | 2014-10-07 16:19:53 -0700 | [diff] [blame] | 991 | "nm", |
| 992 | }}, |
| 993 | {"nm/apps", "*", []string{"google naps"}}, |
| 994 | {"nm/apps/google naps", "*", []string{installID}}, |
Robin Thellend | 4c5266e | 2014-10-27 13:19:29 -0700 | [diff] [blame] | 995 | {"nm/apps/google naps/" + installID, "*", []string{instance1ID}}, |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 996 | {"nm/apps/google naps/" + installID + "/" + instance1ID, "*", []string{"logs", "pprof", "stats"}}, |
Robin Thellend | 5864732 | 2014-10-28 12:07:47 -0700 | [diff] [blame] | 997 | {"nm/apps/google naps/" + installID + "/" + instance1ID + "/logs", "*", []string{ |
| 998 | "STDERR-<timestamp>", |
| 999 | "STDOUT-<timestamp>", |
| 1000 | "bin.INFO", |
| 1001 | "bin.<*>.INFO.<timestamp>", |
| 1002 | }}, |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 1003 | {"nm/apps/google naps/" + installID + "/" + instance1ID + "/stats/system", "start-time*", []string{"start-time-rfc1123", "start-time-unix"}}, |
Robin Thellend | 09929f4 | 2014-10-01 10:18:13 -0700 | [diff] [blame] | 1004 | } |
Robin Thellend | 5864732 | 2014-10-28 12:07:47 -0700 | [diff] [blame] | 1005 | logFileTimeStampRE := regexp.MustCompile("(STDOUT|STDERR)-[0-9]+$") |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 1006 | logFileTrimInfoRE := regexp.MustCompile(`bin\..*\.INFO\.[0-9.-]+$`) |
Robin Thellend | 5864732 | 2014-10-28 12:07:47 -0700 | [diff] [blame] | 1007 | logFileRemoveErrorFatalWarningRE := regexp.MustCompile("(ERROR|FATAL|WARNING)") |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 1008 | statsTrimRE := regexp.MustCompile("/stats/(ipc|system(/start-time.*)?)$") |
Robin Thellend | 9e523a6 | 2014-10-07 16:19:53 -0700 | [diff] [blame] | 1009 | for _, tc := range testcases { |
Robin Thellend | 5c95a6c | 2014-11-10 13:06:56 -0800 | [diff] [blame] | 1010 | results, err := testutil.GlobName(tc.name, tc.pattern) |
| 1011 | if err != nil { |
| 1012 | t.Errorf("unexpected glob error for (%q, %q): %v", tc.name, tc.pattern, err) |
| 1013 | continue |
| 1014 | } |
Robin Thellend | 5864732 | 2014-10-28 12:07:47 -0700 | [diff] [blame] | 1015 | filteredResults := []string{} |
| 1016 | for _, name := range results { |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 1017 | // Keep only the stats object names that match this RE. |
| 1018 | if strings.Contains(name, "/stats/") && !statsTrimRE.MatchString(name) { |
| 1019 | continue |
| 1020 | } |
| 1021 | // Remove ERROR, WARNING, FATAL log files because |
| 1022 | // they're not consistently there. |
Robin Thellend | 5864732 | 2014-10-28 12:07:47 -0700 | [diff] [blame] | 1023 | if logFileRemoveErrorFatalWarningRE.MatchString(name) { |
| 1024 | continue |
| 1025 | } |
| 1026 | name = logFileTimeStampRE.ReplaceAllString(name, "$1-<timestamp>") |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 1027 | name = logFileTrimInfoRE.ReplaceAllString(name, "bin.<*>.INFO.<timestamp>") |
Robin Thellend | 5864732 | 2014-10-28 12:07:47 -0700 | [diff] [blame] | 1028 | filteredResults = append(filteredResults, name) |
Robin Thellend | 9e523a6 | 2014-10-07 16:19:53 -0700 | [diff] [blame] | 1029 | } |
Robin Thellend | 12937a2 | 2014-10-29 17:53:23 -0700 | [diff] [blame] | 1030 | sort.Strings(filteredResults) |
| 1031 | sort.Strings(tc.expected) |
Robin Thellend | 5864732 | 2014-10-28 12:07:47 -0700 | [diff] [blame] | 1032 | if !reflect.DeepEqual(filteredResults, tc.expected) { |
| 1033 | t.Errorf("unexpected result for (%q, %q). Got %q, want %q", tc.name, tc.pattern, filteredResults, tc.expected) |
Robin Thellend | 9e523a6 | 2014-10-07 16:19:53 -0700 | [diff] [blame] | 1034 | } |
Robin Thellend | 09929f4 | 2014-10-01 10:18:13 -0700 | [diff] [blame] | 1035 | } |
Robin Thellend | 4c5266e | 2014-10-27 13:19:29 -0700 | [diff] [blame] | 1036 | |
Robin Thellend | 5864732 | 2014-10-28 12:07:47 -0700 | [diff] [blame] | 1037 | // Call Size() on the log file objects. |
Robin Thellend | 5c95a6c | 2014-11-10 13:06:56 -0800 | [diff] [blame] | 1038 | files, err := testutil.GlobName("nm", "apps/google naps/"+installID+"/"+instance1ID+"/logs/*") |
| 1039 | if err != nil { |
| 1040 | t.Errorf("unexpected glob error: %v", err) |
| 1041 | } |
Robin Thellend | 12937a2 | 2014-10-29 17:53:23 -0700 | [diff] [blame] | 1042 | if want, got := 4, len(files); got < want { |
| 1043 | t.Errorf("Unexpected number of matches. Got %d, want at least %d", got, want) |
| 1044 | } |
Robin Thellend | 4c5266e | 2014-10-27 13:19:29 -0700 | [diff] [blame] | 1045 | for _, file := range files { |
| 1046 | name := naming.Join("nm", file) |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1047 | c := logreader.LogFileClient(name) |
Robin Thellend | 4c5266e | 2014-10-27 13:19:29 -0700 | [diff] [blame] | 1048 | if _, err := c.Size(rt.R().NewContext()); err != nil { |
| 1049 | t.Errorf("Size(%q) failed: %v", name, err) |
| 1050 | } |
| 1051 | } |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 1052 | |
| 1053 | // Call Value() on some of the stats objects. |
Robin Thellend | 5c95a6c | 2014-11-10 13:06:56 -0800 | [diff] [blame] | 1054 | objects, err := testutil.GlobName("nm", "apps/google naps/"+installID+"/"+instance1ID+"/stats/system/start-time*") |
| 1055 | if err != nil { |
| 1056 | t.Errorf("unexpected glob error: %v", err) |
| 1057 | } |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 1058 | if want, got := 2, len(objects); got != want { |
| 1059 | t.Errorf("Unexpected number of matches. Got %d, want %d", got, want) |
| 1060 | } |
| 1061 | for _, obj := range objects { |
| 1062 | name := naming.Join("nm", obj) |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1063 | c := stats.StatsClient(name) |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 1064 | if _, err := c.Value(rt.R().NewContext()); err != nil { |
| 1065 | t.Errorf("Value(%q) failed: %v", name, err) |
| 1066 | } |
| 1067 | } |
| 1068 | |
| 1069 | // Call CmdLine() on the pprof object. |
| 1070 | { |
| 1071 | name := "nm/apps/google naps/" + installID + "/" + instance1ID + "/pprof" |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1072 | c := pprof.PProfClient(name) |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 1073 | v, err := c.CmdLine(rt.R().NewContext()) |
| 1074 | if err != nil { |
| 1075 | t.Errorf("CmdLine(%q) failed: %v", name, err) |
| 1076 | } |
| 1077 | if len(v) == 0 { |
| 1078 | t.Fatalf("Unexpected empty cmdline: %v", v) |
| 1079 | } |
| 1080 | if got, want := filepath.Base(v[0]), "bin"; got != want { |
| 1081 | t.Errorf("Unexpected value for argv[0]. Got %v, want %v", got, want) |
| 1082 | } |
| 1083 | } |
Robin Thellend | 4c5266e | 2014-10-27 13:19:29 -0700 | [diff] [blame] | 1084 | } |
| 1085 | |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1086 | func listAndVerifyAssociations(t *testing.T, stub node.NodeClientMethods, run veyron2.Runtime, expected []node.Association) { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1087 | assocs, err := stub.ListAssociations(run.NewContext()) |
| 1088 | if err != nil { |
| 1089 | t.Fatalf("ListAssociations failed %v", err) |
| 1090 | } |
Robert Kroeger | 1cb4a0d | 2014-10-20 11:55:38 -0700 | [diff] [blame] | 1091 | compareAssociations(t, assocs, expected) |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1092 | } |
| 1093 | |
| 1094 | // TODO(rjkroege): Verify that associations persist across restarts |
| 1095 | // once permanent storage is added. |
| 1096 | func TestAccountAssociation(t *testing.T) { |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 1097 | sh, deferFn := createShellAndMountTable(t) |
| 1098 | defer deferFn() |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1099 | |
| 1100 | root, cleanup := setupRootDir(t) |
| 1101 | defer cleanup() |
| 1102 | |
| 1103 | var ( |
Asim Shankar | 1ba96ef | 2014-10-26 19:52:10 -0700 | [diff] [blame] | 1104 | idp = tsecurity.NewIDProvider("root") |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1105 | // The two "processes"/runtimes which will act as IPC clients to |
| 1106 | // the nodemanager process. |
| 1107 | selfRT = rt.R() |
| 1108 | otherRT = newRuntime(t) |
| 1109 | ) |
| 1110 | defer otherRT.Cleanup() |
| 1111 | // By default, selfRT and otherRT will have blessings generated based |
| 1112 | // on the username/machine name running this process. Since these |
| 1113 | // blessings will appear in test expecations, give them readable |
| 1114 | // names. |
Asim Shankar | 1ba96ef | 2014-10-26 19:52:10 -0700 | [diff] [blame] | 1115 | if err := idp.Bless(selfRT.Principal(), "self"); err != nil { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1116 | t.Fatal(err) |
| 1117 | } |
Asim Shankar | 1ba96ef | 2014-10-26 19:52:10 -0700 | [diff] [blame] | 1118 | if err := idp.Bless(otherRT.Principal(), "other"); err != nil { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1119 | t.Fatal(err) |
| 1120 | } |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 1121 | crFile, crEnv := credentialsForChild("nodemanager") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 1122 | defer os.RemoveAll(crFile) |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1123 | |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 1124 | _, nms := runShellCommand(t, sh, crEnv, nodeManagerCmd, "nm", root, "unused_helper", "unused_app_repo_name", "unused_curr_link") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 1125 | pid := readPID(t, nms) |
| 1126 | defer syscall.Kill(pid, syscall.SIGINT) |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1127 | |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1128 | nodeStub := node.NodeClient("nm//nm") |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1129 | |
| 1130 | // Attempt to list associations on the node manager without having |
| 1131 | // claimed it. |
| 1132 | if list, err := nodeStub.ListAssociations(otherRT.NewContext()); err != nil || list != nil { |
| 1133 | t.Fatalf("ListAssociations should fail on unclaimed node manager but did not: %v", err) |
| 1134 | } |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 1135 | |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1136 | // self claims the node manager. |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1137 | if err := nodeStub.Claim(selfRT.NewContext(), &granter{p: selfRT.Principal(), extension: "alice"}); err != nil { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1138 | t.Fatalf("Claim failed: %v", err) |
| 1139 | } |
| 1140 | |
| 1141 | vlog.VI(2).Info("Verify that associations start out empty.") |
| 1142 | listAndVerifyAssociations(t, nodeStub, selfRT, []node.Association(nil)) |
| 1143 | |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1144 | if err := nodeStub.AssociateAccount(selfRT.NewContext(), []string{"root/self", "root/other"}, "alice_system_account"); err != nil { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1145 | t.Fatalf("ListAssociations failed %v", err) |
| 1146 | } |
| 1147 | vlog.VI(2).Info("Added association should appear.") |
| 1148 | listAndVerifyAssociations(t, nodeStub, selfRT, []node.Association{ |
| 1149 | { |
| 1150 | "root/self", |
| 1151 | "alice_system_account", |
| 1152 | }, |
| 1153 | { |
| 1154 | "root/other", |
| 1155 | "alice_system_account", |
| 1156 | }, |
| 1157 | }) |
| 1158 | |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1159 | if err := nodeStub.AssociateAccount(selfRT.NewContext(), []string{"root/self", "root/other"}, "alice_other_account"); err != nil { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1160 | t.Fatalf("AssociateAccount failed %v", err) |
| 1161 | } |
| 1162 | vlog.VI(2).Info("Change the associations and the change should appear.") |
| 1163 | listAndVerifyAssociations(t, nodeStub, selfRT, []node.Association{ |
| 1164 | { |
| 1165 | "root/self", |
| 1166 | "alice_other_account", |
| 1167 | }, |
| 1168 | { |
| 1169 | "root/other", |
| 1170 | "alice_other_account", |
| 1171 | }, |
| 1172 | }) |
| 1173 | |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1174 | if err := nodeStub.AssociateAccount(selfRT.NewContext(), []string{"root/other"}, ""); err != nil { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1175 | t.Fatalf("AssociateAccount failed %v", err) |
| 1176 | } |
| 1177 | vlog.VI(2).Info("Verify that we can remove an association.") |
| 1178 | listAndVerifyAssociations(t, nodeStub, selfRT, []node.Association{ |
| 1179 | { |
| 1180 | "root/self", |
| 1181 | "alice_other_account", |
| 1182 | }, |
| 1183 | }) |
| 1184 | } |
| 1185 | |
| 1186 | // userName is a helper function to determine the system name that the |
| 1187 | // test is running under. |
| 1188 | func userName(t *testing.T) string { |
| 1189 | u, err := user.Current() |
| 1190 | if err != nil { |
| 1191 | t.Fatalf("user.Current() failed: %v", err) |
| 1192 | } |
| 1193 | return u.Username |
| 1194 | } |
| 1195 | |
| 1196 | func TestAppWithSuidHelper(t *testing.T) { |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 1197 | sh, deferFn := createShellAndMountTable(t) |
| 1198 | defer deferFn() |
| 1199 | |
| 1200 | // Set up mock application and binary repositories. |
| 1201 | envelope, cleanup := startMockRepos(t) |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1202 | defer cleanup() |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1203 | |
| 1204 | root, cleanup := setupRootDir(t) |
| 1205 | defer cleanup() |
| 1206 | |
| 1207 | var ( |
Asim Shankar | 1ba96ef | 2014-10-26 19:52:10 -0700 | [diff] [blame] | 1208 | idp = tsecurity.NewIDProvider("root") |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1209 | // The two "processes"/runtimes which will act as IPC clients to |
| 1210 | // the nodemanager process. |
| 1211 | selfRT = rt.R() |
| 1212 | otherRT = newRuntime(t) |
| 1213 | ) |
| 1214 | defer otherRT.Cleanup() |
| 1215 | |
| 1216 | // By default, selfRT and otherRT will have blessings generated |
| 1217 | // based on the username/machine name running this process. Since |
| 1218 | // these blessings can appear in debugging output, give them |
| 1219 | // recognizable names. |
Asim Shankar | 1ba96ef | 2014-10-26 19:52:10 -0700 | [diff] [blame] | 1220 | if err := idp.Bless(selfRT.Principal(), "self"); err != nil { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1221 | t.Fatal(err) |
| 1222 | } |
Asim Shankar | 1ba96ef | 2014-10-26 19:52:10 -0700 | [diff] [blame] | 1223 | if err := idp.Bless(otherRT.Principal(), "other"); err != nil { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1224 | t.Fatal(err) |
| 1225 | } |
| 1226 | |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 1227 | crDir, crEnv := credentialsForChild("nodemanager") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 1228 | defer os.RemoveAll(crDir) |
| 1229 | |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1230 | // Create a script wrapping the test target that implements |
| 1231 | // suidhelper. |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 1232 | helperPath := generateSuidHelperScript(t, root) |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1233 | |
Bogdan Caprita | 962d5e0 | 2014-10-28 18:36:09 -0700 | [diff] [blame] | 1234 | _, nms := runShellCommand(t, sh, crEnv, nodeManagerCmd, "-mocksetuid", "nm", root, helperPath, "unused_app_repo_name", "unused_curr_link") |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 1235 | pid := readPID(t, nms) |
| 1236 | defer syscall.Kill(pid, syscall.SIGINT) |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1237 | |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1238 | nodeStub := node.NodeClient("nm//nm") |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1239 | |
| 1240 | // Create the local server that the app uses to tell us which system name |
| 1241 | // the node manager wished to run it as. |
| 1242 | server, _ := newServer() |
| 1243 | defer server.Stop() |
| 1244 | pingCh := make(chan string, 1) |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 1245 | if err := server.Serve("pingserver", pingServer(pingCh), nil); err != nil { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1246 | t.Fatalf("Serve(%q, <dispatcher>) failed: %v", "pingserver", err) |
| 1247 | } |
| 1248 | |
Bogdan Caprita | 2692910 | 2014-11-07 11:56:56 -0800 | [diff] [blame] | 1249 | // Create an envelope for a first version of the app. |
| 1250 | *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "appV1") |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1251 | |
| 1252 | // Install and start the app as root/self. |
| 1253 | appID := installApp(t, selfRT) |
| 1254 | |
| 1255 | // Claim the nodemanager with selfRT as root/self/alice |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1256 | if err := nodeStub.Claim(selfRT.NewContext(), &granter{p: selfRT.Principal(), extension: "alice"}); err != nil { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1257 | t.Fatal(err) |
| 1258 | } |
| 1259 | |
| 1260 | // Start an instance of the app but this time it should fail: we do |
| 1261 | // not have an associated uname for the invoking identity. |
| 1262 | startAppExpectError(t, appID, verror.NoAccess, selfRT) |
| 1263 | |
| 1264 | // Create an association for selfRT |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1265 | if err := nodeStub.AssociateAccount(selfRT.NewContext(), []string{"root/self"}, testUserName); err != nil { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1266 | t.Fatalf("AssociateAccount failed %v", err) |
| 1267 | } |
| 1268 | |
Robert Kroeger | ec7790e | 2014-10-15 14:57:43 -0700 | [diff] [blame] | 1269 | instance1ID := startApp(t, appID, selfRT) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 1270 | verifyHelperArgs(t, pingCh, testUserName) // Wait until the app pings us that it's ready. |
Robert Kroeger | ec7790e | 2014-10-15 14:57:43 -0700 | [diff] [blame] | 1271 | stopApp(t, appID, instance1ID, selfRT) |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1272 | |
| 1273 | vlog.VI(2).Infof("other attempting to run an app without access. Should fail.") |
| 1274 | startAppExpectError(t, appID, verror.NoAccess, otherRT) |
| 1275 | |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 1276 | // Self will now let other also install apps. |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1277 | if err := nodeStub.AssociateAccount(selfRT.NewContext(), []string{"root/other"}, testUserName); err != nil { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1278 | t.Fatalf("AssociateAccount failed %v", err) |
| 1279 | } |
| 1280 | // Add Start to the ACL list for root/other. |
Robert Kroeger | 1ce0bd7 | 2014-10-22 13:57:14 -0700 | [diff] [blame] | 1281 | newACL, _, err := nodeStub.GetACL(selfRT.NewContext()) |
| 1282 | if err != nil { |
| 1283 | t.Fatalf("GetACL failed %v", err) |
| 1284 | } |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 1285 | newACL.In["root/other/..."] = security.LabelSet(security.WriteLabel) |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1286 | if err := nodeStub.SetACL(selfRT.NewContext(), newACL, ""); err != nil { |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1287 | t.Fatalf("SetACL failed %v", err) |
| 1288 | } |
| 1289 | |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 1290 | // With the introduction of per installation and per instance ACLs, while other now |
| 1291 | // has administrator permissions on the node manager, other doesn't have execution |
| 1292 | // permissions for the app. So this will fail. |
| 1293 | vlog.VI(2).Infof("other attempting to run an app still without access. Should fail.") |
| 1294 | startAppExpectError(t, appID, verror.NoAccess, otherRT) |
| 1295 | |
| 1296 | // But self can give other permissions to start applications. |
| 1297 | vlog.VI(2).Infof("self attempting to give other permission to start %s", appID) |
| 1298 | newACL, _, err = appStub(appID).GetACL(selfRT.NewContext()) |
| 1299 | if err != nil { |
| 1300 | t.Fatalf("GetACL on appID: %v failed %v", appID, err) |
| 1301 | } |
| 1302 | newACL.In["root/other/..."] = security.LabelSet(security.ReadLabel) |
| 1303 | if err = appStub(appID).SetACL(selfRT.NewContext(), newACL, ""); err != nil { |
| 1304 | t.Fatalf("SetACL on appID: %v failed: %v", appID, err) |
| 1305 | } |
| 1306 | |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1307 | vlog.VI(2).Infof("other attempting to run an app with access. Should succeed.") |
Robert Kroeger | ec7790e | 2014-10-15 14:57:43 -0700 | [diff] [blame] | 1308 | instance2ID := startApp(t, appID, otherRT) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 1309 | verifyHelperArgs(t, pingCh, testUserName) // Wait until the app pings us that it's ready. |
Robert Kroeger | 1ce0bd7 | 2014-10-22 13:57:14 -0700 | [diff] [blame] | 1310 | suspendApp(t, appID, instance2ID, otherRT) |
| 1311 | |
| 1312 | vlog.VI(2).Infof("Verify that Resume with the same systemName works.") |
| 1313 | resumeApp(t, appID, instance2ID, otherRT) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 1314 | verifyHelperArgs(t, pingCh, testUserName) // Wait until the app pings us that it's ready. |
Robert Kroeger | 1ce0bd7 | 2014-10-22 13:57:14 -0700 | [diff] [blame] | 1315 | suspendApp(t, appID, instance2ID, otherRT) |
| 1316 | |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 1317 | vlog.VI(2).Infof("Verify that other can install and run applications.") |
| 1318 | otherAppID := installApp(t, otherRT) |
| 1319 | |
| 1320 | vlog.VI(2).Infof("other attempting to run an app that other installed. Should succeed.") |
| 1321 | instance4ID := startApp(t, otherAppID, otherRT) |
| 1322 | verifyHelperArgs(t, pingCh, testUserName) // Wait until the app pings us that it's ready. |
| 1323 | |
| 1324 | // Clean up. |
| 1325 | stopApp(t, otherAppID, instance4ID, otherRT) |
| 1326 | |
Robert Kroeger | 1ce0bd7 | 2014-10-22 13:57:14 -0700 | [diff] [blame] | 1327 | // Change the associated system name. |
Todd Wang | 702385a | 2014-11-07 01:54:08 -0800 | [diff] [blame] | 1328 | if err := nodeStub.AssociateAccount(selfRT.NewContext(), []string{"root/other"}, anotherTestUserName); err != nil { |
Robert Kroeger | 1ce0bd7 | 2014-10-22 13:57:14 -0700 | [diff] [blame] | 1329 | t.Fatalf("AssociateAccount failed %v", err) |
| 1330 | } |
| 1331 | |
| 1332 | vlog.VI(2).Infof("Show that Resume with a different systemName fails.") |
| 1333 | resumeAppExpectError(t, appID, instance2ID, verror.NoAccess, otherRT) |
| 1334 | |
| 1335 | // Clean up. |
Robert Kroeger | ec7790e | 2014-10-15 14:57:43 -0700 | [diff] [blame] | 1336 | stopApp(t, appID, instance2ID, otherRT) |
Robert Kroeger | 1ce0bd7 | 2014-10-22 13:57:14 -0700 | [diff] [blame] | 1337 | |
| 1338 | vlog.VI(2).Infof("Show that Start with different systemName works.") |
| 1339 | instance3ID := startApp(t, appID, otherRT) |
Cosmos Nicolaou | ad2793f | 2014-10-27 16:24:15 -0700 | [diff] [blame] | 1340 | verifyHelperArgs(t, pingCh, anotherTestUserName) // Wait until the app pings us that it's ready. |
Robert Kroeger | 1ce0bd7 | 2014-10-22 13:57:14 -0700 | [diff] [blame] | 1341 | |
| 1342 | // Clean up. |
| 1343 | stopApp(t, appID, instance3ID, otherRT) |
Robert Kroeger | 362ff89 | 2014-09-29 14:23:47 -0700 | [diff] [blame] | 1344 | } |