blob: 3d59b81157ee949ca3e46c44810c6d4fbc38edc0 [file] [log] [blame]
Bogdan Caprita5420f172014-10-10 15:58:14 -07001// TODO(caprita): This file is becoming unmanageable; split into several test
2// files.
Robert Kroegeracc778b2014-11-03 17:17:21 -08003// TODO(rjkroege): Add a more extensive unit test case to exercise ACL logic.
Bogdan Caprita5420f172014-10-10 15:58:14 -07004
Jiri Simsa70c32052014-06-18 11:38:21 -07005package impl_test
Jiri Simsa5293dcb2014-05-10 09:56:38 -07006
7import (
Asim Shankar88292912014-10-09 19:41:07 -07008 "bytes"
Bogdan Caprita1e379132014-08-03 23:02:31 -07009 "crypto/md5"
10 "encoding/base64"
Asim Shankar88292912014-10-09 19:41:07 -070011 "encoding/hex"
Robert Kroeger627a1152014-10-01 14:57:55 -070012 "encoding/json"
Bogdan Capritac7e72b62015-01-07 19:22:23 -080013 "flag"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070014 "fmt"
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070015 "io"
Jiri Simsa70c32052014-06-18 11:38:21 -070016 "io/ioutil"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070017 "os"
Bogdan Capritac87a9142014-07-21 10:38:13 -070018 goexec "os/exec"
Robert Kroeger627a1152014-10-01 14:57:55 -070019 "os/user"
Robin Thellend9e523a62014-10-07 16:19:53 -070020 "path"
Jiri Simsa70c32052014-06-18 11:38:21 -070021 "path/filepath"
Robin Thellend09929f42014-10-01 10:18:13 -070022 "reflect"
Robin Thellend4c5266e2014-10-27 13:19:29 -070023 "regexp"
Robin Thellend09929f42014-10-01 10:18:13 -070024 "sort"
Jiri Simsa70c32052014-06-18 11:38:21 -070025 "strings"
Bogdan Caprita78b62162014-08-21 15:35:08 -070026 "syscall"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070027 "testing"
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070028 "time"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070029
Jiri Simsa764efb72014-12-25 20:57:03 -080030 "v.io/core/veyron2"
31 "v.io/core/veyron2/context"
32 "v.io/core/veyron2/ipc"
33 "v.io/core/veyron2/naming"
Jiri Simsa764efb72014-12-25 20:57:03 -080034 "v.io/core/veyron2/security"
35 "v.io/core/veyron2/services/mgmt/application"
36 "v.io/core/veyron2/services/mgmt/device"
37 "v.io/core/veyron2/services/mgmt/logreader"
38 "v.io/core/veyron2/services/mgmt/pprof"
39 "v.io/core/veyron2/services/mgmt/stats"
40 "v.io/core/veyron2/services/security/access"
Jiri Simsa764efb72014-12-25 20:57:03 -080041 verror "v.io/core/veyron2/verror2"
42 "v.io/core/veyron2/vlog"
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070043
Bogdan Capritac7e72b62015-01-07 19:22:23 -080044 "v.io/core/veyron/lib/expect"
Jiri Simsa764efb72014-12-25 20:57:03 -080045 "v.io/core/veyron/lib/modules"
46 "v.io/core/veyron/lib/signals"
47 "v.io/core/veyron/lib/testutil"
48 tsecurity "v.io/core/veyron/lib/testutil/security"
49 binaryimpl "v.io/core/veyron/services/mgmt/binary/impl"
50 "v.io/core/veyron/services/mgmt/device/config"
51 "v.io/core/veyron/services/mgmt/device/impl"
52 libbinary "v.io/core/veyron/services/mgmt/lib/binary"
Robert Kroegerebfb62a2014-12-10 14:42:09 -080053 mgmttest "v.io/core/veyron/services/mgmt/lib/testutil"
Jiri Simsa764efb72014-12-25 20:57:03 -080054 suidhelper "v.io/core/veyron/services/mgmt/suidhelper/impl"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070055)
56
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070057const (
Bogdan Caprita17666dd2015-01-14 09:27:46 -080058 // Modules command names.
Bogdan Caprita2b219362014-12-09 17:03:33 -080059 execScriptCmd = "execScriptCmd"
60 deviceManagerCmd = "deviceManager"
61 appCmd = "app"
62 installerCmd = "installer"
Bogdan Capritaa40d3382014-12-19 16:30:26 -080063 uninstallerCmd = "uninstaller"
Bogdan Caprita17666dd2015-01-14 09:27:46 -080064
65 testFlagName = "random_test_flag"
66 // VEYRON prefix is necessary to pass the env filtering.
67 testEnvVarName = "VEYRON_RANDOM_ENV_VALUE"
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070068)
Robert Kroegerdd07b362014-09-18 17:34:42 -070069
Bogdan Caprita17666dd2015-01-14 09:27:46 -080070var flagValue = flag.String(testFlagName, "default", "")
71
Robert Kroegerdd07b362014-09-18 17:34:42 -070072func init() {
Bogdan Capritac7e72b62015-01-07 19:22:23 -080073 // The installer sets this flag on the installed device manager, so we
74 // need to ensure it's defined.
75 flag.String("name", "", "")
76
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070077 modules.RegisterChild(execScriptCmd, "", execScript)
Bogdan Caprita2b219362014-12-09 17:03:33 -080078 modules.RegisterChild(deviceManagerCmd, "", deviceManager)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070079 modules.RegisterChild(appCmd, "", app)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070080 testutil.Init()
81
82 if modules.IsModulesProcess() {
Robert Kroegerdd07b362014-09-18 17:34:42 -070083 return
84 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070085}
86
87// TestHelperProcess is the entrypoint for the modules commands in a
88// a test subprocess.
89func TestHelperProcess(t *testing.T) {
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -070090 modules.DispatchInTest()
Robert Kroegerdd07b362014-09-18 17:34:42 -070091}
92
93// TestSuidHelper is testing boilerplate for suidhelper that does not
Matt Rosencrantz5180d162014-12-03 13:48:40 -080094// create a runtime because the suidhelper is not a Veyron application.
Robert Kroegerdd07b362014-09-18 17:34:42 -070095func TestSuidHelper(t *testing.T) {
96 if os.Getenv("VEYRON_SUIDHELPER_TEST") != "1" {
97 return
98 }
99 vlog.VI(1).Infof("TestSuidHelper starting")
100
101 if err := suidhelper.Run(os.Environ()); err != nil {
102 vlog.Fatalf("Failed to Run() setuidhelper: %v", err)
103 }
Bogdan Capritac87a9142014-07-21 10:38:13 -0700104}
105
106// execScript launches the script passed as argument.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700107func execScript(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error {
108 args = args[1:]
Bogdan Capritac87a9142014-07-21 10:38:13 -0700109 if want, got := 1, len(args); want != got {
110 vlog.Fatalf("execScript expected %d arguments, got %d instead", want, got)
111 }
112 script := args[0]
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700113 osenv := []string{}
114 if env["PAUSE_BEFORE_STOP"] == "1" {
115 osenv = append(osenv, "PAUSE_BEFORE_STOP=1")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700116 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700117
Bogdan Capritac87a9142014-07-21 10:38:13 -0700118 cmd := goexec.Cmd{
119 Path: script,
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700120 Env: osenv,
121 Stdin: stdin,
122 Stderr: stderr,
123 Stdout: stdout,
Bogdan Capritac87a9142014-07-21 10:38:13 -0700124 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700125
126 return cmd.Run()
Bogdan Capritac87a9142014-07-21 10:38:13 -0700127}
128
Bogdan Caprita2b219362014-12-09 17:03:33 -0800129// deviceManager sets up a device manager server. It accepts the name to
130// publish the server under as an argument. Additional arguments can optionally
131// specify device manager config settings.
132func deviceManager(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error {
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800133 ctx, shutdown := veyron2.Init()
134
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700135 args = args[1:]
Bogdan Capritac87a9142014-07-21 10:38:13 -0700136 if len(args) == 0 {
Bogdan Caprita2b219362014-12-09 17:03:33 -0800137 vlog.Fatalf("deviceManager expected at least an argument")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700138 }
139 publishName := args[0]
Bogdan Caprita78b62162014-08-21 15:35:08 -0700140 args = args[1:]
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800141 defer fmt.Fprintf(stdout, "%v terminated\n", publishName)
142 defer vlog.VI(1).Infof("%v terminated", publishName)
143 defer shutdown()
144 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
145
146 server, endpoint := mgmttest.NewServer(ctx)
David Why Use Two When One Will Do Presotto8b4dbbf2014-11-06 10:50:14 -0800147 name := naming.JoinAddressName(endpoint, "")
Bogdan Caprita2b219362014-12-09 17:03:33 -0800148 vlog.VI(1).Infof("Device manager name: %v", name)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700149
150 // Satisfy the contract described in doc.go by passing the config state
Bogdan Caprita2b219362014-12-09 17:03:33 -0800151 // through to the device manager dispatcher constructor.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700152 configState, err := config.Load()
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700153 if err != nil {
Bogdan Capritac87a9142014-07-21 10:38:13 -0700154 vlog.Fatalf("Failed to decode config state: %v", err)
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700155 }
Bogdan Capritac87a9142014-07-21 10:38:13 -0700156 configState.Name = name
157
158 // This exemplifies how to override or set specific config fields, if,
Bogdan Caprita2b219362014-12-09 17:03:33 -0800159 // for example, the device manager is invoked 'by hand' instead of via a
160 // script prepared by a previous version of the device manager.
Bogdan Caprita78b62162014-08-21 15:35:08 -0700161 if len(args) > 0 {
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700162 if want, got := 4, len(args); want != got {
Bogdan Capritac87a9142014-07-21 10:38:13 -0700163 vlog.Fatalf("expected %d additional arguments, got %d instead", want, got)
164 }
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700165 configState.Root, configState.Helper, configState.Origin, configState.CurrentLink = args[0], args[1], args[2], args[3]
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700166 }
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800167 dispatcher, err := impl.NewDispatcher(veyron2.GetPrincipal(ctx), configState, func() { fmt.Println("restart handler") })
Bogdan Capritac87a9142014-07-21 10:38:13 -0700168 if err != nil {
Bogdan Caprita2b219362014-12-09 17:03:33 -0800169 vlog.Fatalf("Failed to create device manager dispatcher: %v", err)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700170 }
Cosmos Nicolaou92dba582014-11-05 17:24:10 -0800171 if err := server.ServeDispatcher(publishName, dispatcher); err != nil {
Bogdan Capritac87a9142014-07-21 10:38:13 -0700172 vlog.Fatalf("Serve(%v) failed: %v", publishName, err)
173 }
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800174 impl.InvokeCallback(ctx, name)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700175
176 fmt.Fprintf(stdout, "ready:%d\n", os.Getpid())
Bogdan Capritac87a9142014-07-21 10:38:13 -0700177
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800178 <-signals.ShutdownOnSignals(ctx)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700179
180 if val, present := env["PAUSE_BEFORE_STOP"]; present && val == "1" {
181 modules.WaitForEOF(stdin)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700182 }
Bogdan Caprita78b62162014-08-21 15:35:08 -0700183 if dispatcher.Leaking() {
Bogdan Caprita2b219362014-12-09 17:03:33 -0800184 vlog.Fatalf("device manager leaking resources")
Bogdan Caprita78b62162014-08-21 15:35:08 -0700185 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700186 return nil
187}
188
Bogdan Caprita1e379132014-08-03 23:02:31 -0700189// appService defines a test service that the test app should be running.
190// TODO(caprita): Use this to make calls to the app and verify how Suspend/Stop
191// interact with an active service.
192type appService struct{}
193
Todd Wang1fe7cdd2014-11-12 12:51:49 -0800194func (appService) Echo(_ ipc.ServerContext, message string) (string, error) {
Bogdan Caprita1e379132014-08-03 23:02:31 -0700195 return message, nil
196}
197
Robin Thellend875f2592014-12-02 10:29:37 -0800198func (appService) Cat(_ ipc.ServerContext, file string) (string, error) {
199 if file == "" || file[0] == filepath.Separator || file[0] == '.' {
200 return "", fmt.Errorf("illegal file name: %q", file)
201 }
202 bytes, err := ioutil.ReadFile(file)
203 if err != nil {
204 return "", err
205 }
206 return string(bytes), nil
207}
208
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800209type pingArgs struct {
Bogdan Capritae1960f52015-01-14 09:57:19 -0800210 Username, FlagValue, EnvValue string
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800211}
212
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800213func ping(ctx *context.T) {
Bogdan Capritae1960f52015-01-14 09:57:19 -0800214 helperEnv := os.Getenv(suidhelper.SavedArgs)
215 d := json.NewDecoder(strings.NewReader(helperEnv))
216 var savedArgs suidhelper.ArgsSavedForTest
217 if err := d.Decode(&savedArgs); err != nil {
218 vlog.Fatalf("Failed to decode preserved argument %v: %v", helperEnv, err)
219 }
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800220 args := &pingArgs{
Bogdan Capritae1960f52015-01-14 09:57:19 -0800221 // TODO(rjkroege): Consider validating additional parameters
222 // from helper.
223 Username: savedArgs.Uname,
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800224 FlagValue: *flagValue,
225 EnvValue: os.Getenv(testEnvVarName),
226 }
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800227 client := veyron2.GetClient(ctx)
228 if call, err := client.StartCall(ctx, "pingserver", "Ping", []interface{}{args}); err != nil {
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700229 vlog.Fatalf("StartCall failed: %v", err)
Todd Wang702385a2014-11-07 01:54:08 -0800230 } else if err := call.Finish(); err != nil {
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700231 vlog.Fatalf("Finish failed: %v", err)
232 }
233}
234
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800235func cat(ctx *context.T, name, file string) (string, error) {
236 ctx, cancel := context.WithTimeout(ctx, time.Minute)
Robin Thellend875f2592014-12-02 10:29:37 -0800237 defer cancel()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800238 client := veyron2.GetClient(ctx)
Matt Rosencrantz6edab562015-01-12 11:07:55 -0800239 call, err := client.StartCall(ctx, name, "Cat", []interface{}{file})
Robin Thellend875f2592014-12-02 10:29:37 -0800240 if err != nil {
241 return "", err
242 }
243 var content string
244 if ferr := call.Finish(&content, &err); ferr != nil {
245 err = ferr
246 }
247 return content, err
248}
249
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700250func app(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error {
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800251 ctx, shutdown := veyron2.Init()
252 defer shutdown()
253 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
254
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700255 args = args[1:]
Bogdan Caprita1e379132014-08-03 23:02:31 -0700256 if expected, got := 1, len(args); expected != got {
257 vlog.Fatalf("Unexpected number of arguments: expected %d, got %d", expected, got)
258 }
259 publishName := args[0]
260
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800261 server, _ := mgmttest.NewServer(ctx)
Bogdan Caprita1e379132014-08-03 23:02:31 -0700262 defer server.Stop()
Cosmos Nicolaou92dba582014-11-05 17:24:10 -0800263 if err := server.Serve(publishName, new(appService), nil); err != nil {
Bogdan Caprita1e379132014-08-03 23:02:31 -0700264 vlog.Fatalf("Serve(%v) failed: %v", publishName, err)
265 }
Cosmos Nicolaoue3391532014-11-25 19:08:32 -0800266 // Some of our tests look for log files, so make sure they are flushed
267 // to ensure that at least the files exist.
268 vlog.FlushLog()
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800269 ping(ctx)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700270
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800271 <-signals.ShutdownOnSignals(ctx)
Bogdan Caprita1e379132014-08-03 23:02:31 -0700272 if err := ioutil.WriteFile("testfile", []byte("goodbye world"), 0600); err != nil {
273 vlog.Fatalf("Failed to write testfile: %v", err)
274 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700275 return nil
Bogdan Caprita1e379132014-08-03 23:02:31 -0700276}
277
Bogdan Caprita2b219362014-12-09 17:03:33 -0800278// TODO(rjkroege): generateDeviceManagerScript and generateSuidHelperScript have
279// code similarity that might benefit from refactoring.
280// generateDeviceManagerScript is very similar in behavior to generateScript in
Bogdan Capritaa456f472014-12-10 10:18:03 -0800281// device_invoker.go. However, we chose to re-implement it here for two
282// reasons: (1) avoid making generateScript public; and (2) how the test choses
283// to invoke the device manager subprocess the first time should be independent
284// of how device manager implementation sets up its updated versions.
Bogdan Caprita2b219362014-12-09 17:03:33 -0800285func generateDeviceManagerScript(t *testing.T, root string, args, env []string) string {
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700286 env = impl.VeyronEnvironment(env)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700287 output := "#!/bin/bash\n"
Bogdan Caprita069341a2014-12-09 22:59:17 -0800288 output += strings.Join(config.QuoteEnv(env), " ") + " exec "
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700289 output += strings.Join(args, " ")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700290 if err := os.MkdirAll(filepath.Join(root, "factory"), 0755); err != nil {
291 t.Fatalf("MkdirAll failed: %v", err)
292 }
293 // Why pigeons? To show that the name we choose for the initial script
Bogdan Caprita2b219362014-12-09 17:03:33 -0800294 // doesn't matter and in particular is independent of how device manager
295 // names its updated version scripts (deviced.sh).
Bogdan Capritac87a9142014-07-21 10:38:13 -0700296 path := filepath.Join(root, "factory", "pigeons.sh")
297 if err := ioutil.WriteFile(path, []byte(output), 0755); err != nil {
298 t.Fatalf("WriteFile(%v) failed: %v", path, err)
299 }
300 return path
301}
302
Bogdan Caprita2b219362014-12-09 17:03:33 -0800303// TestDeviceManagerUpdateAndRevert makes the device manager go through the
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700304// motions of updating itself to newer versions (twice), and reverting itself
305// back (twice). It also checks that update and revert fail when they're
Bogdan Caprita2b219362014-12-09 17:03:33 -0800306// supposed to. The initial device manager is started 'by hand' via a module
307// command. Further versions are started through the soft link that the device
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700308// manager itself updates.
Bogdan Caprita2b219362014-12-09 17:03:33 -0800309func TestDeviceManagerUpdateAndRevert(t *testing.T) {
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800310 ctx, shutdown := veyron2.Init()
311 defer shutdown()
312 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
313
314 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, veyron2.GetPrincipal(ctx))
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700315 defer deferFn()
316
317 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800318 envelope, cleanup := startMockRepos(t, ctx)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700319 defer cleanup()
Bogdan Capritac87a9142014-07-21 10:38:13 -0700320
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -0800321 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Bogdan Caprita080a7302014-08-20 15:35:37 -0700322 defer cleanup()
Jiri Simsae0fc61a2014-07-30 14:41:55 -0700323
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700324 // Current link does not have to live in the root dir, but it's
325 // convenient to put it there so we have everything in one place.
326 currLink := filepath.Join(root, "current_link")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700327
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800328 dmArgs := []string{"factoryDM", root, "unused_helper", mockApplicationRepoName, currLink}
Ryan Browna08a2212015-01-15 15:40:10 -0800329 args, env := sh.CommandEnvelope(deviceManagerCmd, nil, dmArgs...)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700330
Bogdan Caprita2b219362014-12-09 17:03:33 -0800331 scriptPathFactory := generateDeviceManagerScript(t, root, args, env)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700332
333 if err := os.Symlink(scriptPathFactory, currLink); err != nil {
334 t.Fatalf("Symlink(%q, %q) failed: %v", scriptPathFactory, currLink, err)
335 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700336
Bogdan Caprita2b219362014-12-09 17:03:33 -0800337 // We instruct the initial device manager that we run to pause before
Bogdan Capritac87a9142014-07-21 10:38:13 -0700338 // stopping its service, so that we get a chance to verify that
339 // attempting an update while another one is ongoing will fail.
Ryan Browna08a2212015-01-15 15:40:10 -0800340 dmPauseBeforeStopEnv := []string{"PAUSE_BEFORE_STOP=1"}
Bogdan Capritac87a9142014-07-21 10:38:13 -0700341
Bogdan Caprita2b219362014-12-09 17:03:33 -0800342 // Start the initial version of the device manager, the so-called
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700343 // "factory" version. We use the modules-generated command to start it.
Bogdan Caprita2b219362014-12-09 17:03:33 -0800344 // We could have also used the scriptPathFactory to start it, but this
345 // demonstrates that the initial device manager could be started by hand
346 // as long as the right initial configuration is passed into the device
347 // manager implementation.
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800348 dmh, dms := mgmttest.RunShellCommand(t, sh, dmPauseBeforeStopEnv, deviceManagerCmd, dmArgs...)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700349 defer func() {
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800350 syscall.Kill(dmh.Pid(), syscall.SIGINT)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700351 }()
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700352
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800353 mgmttest.ReadPID(t, dms)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800354 resolve(t, ctx, "factoryDM", 1) // Verify the device manager has published itself.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700355
356 // Simulate an invalid envelope in the application repository.
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800357 *envelope = envelopeFromShell(sh, dmPauseBeforeStopEnv, deviceManagerCmd, "bogus", dmArgs...)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700358
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800359 updateDeviceExpectError(t, ctx, "factoryDM", impl.ErrAppTitleMismatch.ID)
360 revertDeviceExpectError(t, ctx, "factoryDM", impl.ErrUpdateNoOp.ID)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700361
Bogdan Caprita2b219362014-12-09 17:03:33 -0800362 // Set up a second version of the device manager. The information in the
363 // envelope will be used by the device manager to stage the next
364 // version.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800365 crDir, crEnv := mgmttest.CredentialsForChild(ctx, "child")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700366 defer os.RemoveAll(crDir)
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800367 *envelope = envelopeFromShell(sh, crEnv, deviceManagerCmd, application.DeviceManagerTitle, "v2DM")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800368 updateDevice(t, ctx, "factoryDM")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700369
370 // Current link should have been updated to point to v2.
371 evalLink := func() string {
372 path, err := filepath.EvalSymlinks(currLink)
373 if err != nil {
374 t.Fatalf("EvalSymlinks(%v) failed: %v", currLink, err)
375 }
376 return path
377 }
378 scriptPathV2 := evalLink()
379 if scriptPathFactory == scriptPathV2 {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700380 t.Fatalf("current link didn't change")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700381 }
382
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800383 updateDeviceExpectError(t, ctx, "factoryDM", impl.ErrOperationInProgress.ID)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700384
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800385 dmh.CloseStdin()
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700386
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800387 dms.Expect("restart handler")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800388 dms.Expect("factoryDM terminated")
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800389 dmh.Shutdown(os.Stderr, os.Stderr)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700390
Bogdan Caprita2b219362014-12-09 17:03:33 -0800391 // A successful update means the device manager has stopped itself. We
Bogdan Capritac87a9142014-07-21 10:38:13 -0700392 // relaunch it from the current link.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800393 resolveExpectNotFound(t, ctx, "v2DM") // Ensure a clean slate.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700394
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800395 dmh, dms = mgmttest.RunShellCommand(t, sh, nil, execScriptCmd, currLink)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700396
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800397 mgmttest.ReadPID(t, dms)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800398 resolve(t, ctx, "v2DM", 1) // Current link should have been launching v2.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700399
Bogdan Caprita2b219362014-12-09 17:03:33 -0800400 // Try issuing an update without changing the envelope in the
401 // application repository: this should fail, and current link should be
402 // unchanged.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800403 updateDeviceExpectError(t, ctx, "v2DM", impl.ErrUpdateNoOp.ID)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700404 if evalLink() != scriptPathV2 {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700405 t.Fatalf("script changed")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700406 }
407
Bogdan Caprita2b219362014-12-09 17:03:33 -0800408 // Create a third version of the device manager and issue an update.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800409 crDir, crEnv = mgmttest.CredentialsForChild(ctx, "child")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700410 defer os.RemoveAll(crDir)
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800411 *envelope = envelopeFromShell(sh, crEnv, deviceManagerCmd, application.DeviceManagerTitle, "v3DM")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800412 updateDevice(t, ctx, "v2DM")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700413
414 scriptPathV3 := evalLink()
415 if scriptPathV3 == scriptPathV2 {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700416 t.Fatalf("current link didn't change")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700417 }
418
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800419 dms.Expect("restart handler")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800420 dms.Expect("v2DM terminated")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700421
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800422 dmh.Shutdown(os.Stderr, os.Stderr)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700423
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800424 resolveExpectNotFound(t, ctx, "v3DM") // Ensure a clean slate.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700425
Bogdan Caprita2b219362014-12-09 17:03:33 -0800426 // Re-lanuch the device manager from current link. We instruct the
427 // device manager to pause before stopping its server, so that we can
428 // verify that a second revert fails while a revert is in progress.
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800429 dmh, dms = mgmttest.RunShellCommand(t, sh, dmPauseBeforeStopEnv, execScriptCmd, currLink)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700430
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800431 mgmttest.ReadPID(t, dms)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800432 resolve(t, ctx, "v3DM", 1) // Current link should have been launching v3.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700433
Bogdan Caprita2b219362014-12-09 17:03:33 -0800434 // Revert the device manager to its previous version (v2).
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800435 revertDevice(t, ctx, "v3DM")
436 revertDeviceExpectError(t, ctx, "v3DM", impl.ErrOperationInProgress.ID) // Revert already in progress.
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800437 dmh.CloseStdin()
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800438 dms.Expect("restart handler")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800439 dms.Expect("v3DM terminated")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700440 if evalLink() != scriptPathV2 {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700441 t.Fatalf("current link was not reverted correctly")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700442 }
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800443 dmh.Shutdown(os.Stderr, os.Stderr)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700444
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800445 resolveExpectNotFound(t, ctx, "v2DM") // Ensure a clean slate.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700446
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800447 dmh, dms = mgmttest.RunShellCommand(t, sh, nil, execScriptCmd, currLink)
448 mgmttest.ReadPID(t, dms)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800449 resolve(t, ctx, "v2DM", 1) // Current link should have been launching v2.
Bogdan Capritac87a9142014-07-21 10:38:13 -0700450
Bogdan Caprita2b219362014-12-09 17:03:33 -0800451 // Revert the device manager to its previous version (factory).
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800452 revertDevice(t, ctx, "v2DM")
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800453 dms.Expect("restart handler")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800454 dms.Expect("v2DM terminated")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700455 if evalLink() != scriptPathFactory {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700456 t.Fatalf("current link was not reverted correctly")
Bogdan Capritac87a9142014-07-21 10:38:13 -0700457 }
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800458 dmh.Shutdown(os.Stderr, os.Stderr)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700459
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800460 resolveExpectNotFound(t, ctx, "factoryDM") // Ensure a clean slate.
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800461
462 dmh, dms = mgmttest.RunShellCommand(t, sh, nil, execScriptCmd, currLink)
463 mgmttest.ReadPID(t, dms)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800464 resolve(t, ctx, "factoryDM", 1) // Current link should have been launching factory version.
465 stopDevice(t, ctx, "factoryDM")
466 dms.Expect("factoryDM terminated")
Bogdan Caprita4ea9b032014-12-27 14:56:51 -0800467 dms.ExpectEOF()
468
469 // Re-launch the device manager, to exercise the behavior of Suspend.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800470 resolveExpectNotFound(t, ctx, "factoryDM") // Ensure a clean slate.
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800471 dmh, dms = mgmttest.RunShellCommand(t, sh, nil, execScriptCmd, currLink)
472 mgmttest.ReadPID(t, dms)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800473 resolve(t, ctx, "factoryDM", 1)
474 suspendDevice(t, ctx, "factoryDM")
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800475 dms.Expect("restart handler")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800476 dms.Expect("factoryDM terminated")
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800477 dms.ExpectEOF()
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700478}
Bogdan Caprita1e379132014-08-03 23:02:31 -0700479
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800480type pingServer chan<- pingArgs
Bogdan Caprita1e379132014-08-03 23:02:31 -0700481
Bogdan Caprita916e99f2014-11-24 15:47:19 -0800482// TODO(caprita): Set the timeout in a more principled manner.
Bogdan Capritaa5dd9892015-01-02 11:16:25 -0800483const pingTimeout = 60 * time.Second
Bogdan Caprita916e99f2014-11-24 15:47:19 -0800484
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800485func (p pingServer) Ping(_ ipc.ServerContext, arg pingArgs) {
Robert Kroeger627a1152014-10-01 14:57:55 -0700486 p <- arg
487}
Bogdan Caprita1e379132014-08-03 23:02:31 -0700488
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700489// setupPingServer creates a server listening for a ping from a child app; it
490// returns a channel on which the app's ping message is returned, and a cleanup
491// function.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800492func setupPingServer(t *testing.T, ctx *context.T) (<-chan pingArgs, func()) {
493 server, _ := mgmttest.NewServer(ctx)
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800494 pingCh := make(chan pingArgs, 1)
Robin Thellend888f8cf2014-12-15 16:19:10 -0800495 if err := server.Serve("pingserver", pingServer(pingCh), &openAuthorizer{}); err != nil {
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700496 t.Fatalf("Serve(%q, <dispatcher>) failed: %v", "pingserver", err)
497 }
498 return pingCh, func() {
499 if err := server.Stop(); err != nil {
500 t.Fatalf("Stop() failed: %v", err)
501 }
502 }
503}
504
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700505func verifyAppWorkspace(t *testing.T, root, appID, instanceID string) {
Bogdan Caprita2b219362014-12-09 17:03:33 -0800506 // HACK ALERT: for now, we peek inside the device manager's directory
Bogdan Caprita1e379132014-08-03 23:02:31 -0700507 // structure (which ought to be opaque) to check for what the app has
508 // written to its local root.
509 //
Bogdan Caprita2b219362014-12-09 17:03:33 -0800510 // TODO(caprita): add support to device manager to browse logs/app local
Bogdan Caprita1e379132014-08-03 23:02:31 -0700511 // root.
512 applicationDirName := func(title string) string {
513 h := md5.New()
514 h.Write([]byte(title))
515 hash := strings.TrimRight(base64.URLEncoding.EncodeToString(h.Sum(nil)), "=")
516 return "app-" + hash
517 }
518 components := strings.Split(appID, "/")
519 appTitle, installationID := components[0], components[1]
Bogdan Caprita268b4192014-08-28 10:04:44 -0700520 instanceDir := filepath.Join(root, applicationDirName(appTitle), "installation-"+installationID, "instances", "instance-"+instanceID)
Bogdan Caprita1e379132014-08-03 23:02:31 -0700521 rootDir := filepath.Join(instanceDir, "root")
522 testFile := filepath.Join(rootDir, "testfile")
523 if read, err := ioutil.ReadFile(testFile); err != nil {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700524 t.Fatalf("Failed to read %v: %v", testFile, err)
Bogdan Caprita1e379132014-08-03 23:02:31 -0700525 } else if want, got := "goodbye world", string(read); want != got {
Jiri Simsa6351ee72014-08-18 16:44:41 -0700526 t.Fatalf("Expected to read %v, got %v instead", want, got)
Bogdan Caprita1e379132014-08-03 23:02:31 -0700527 }
528 // END HACK
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700529}
Bogdan Caprita78b62162014-08-21 15:35:08 -0700530
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800531func verifyPingArgs(t *testing.T, pingCh <-chan pingArgs, username, flagValue, envValue string) {
532 var args pingArgs
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700533 select {
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800534 case args = <-pingCh:
Bogdan Caprita916e99f2014-11-24 15:47:19 -0800535 case <-time.After(pingTimeout):
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800536 t.Fatalf(testutil.FormatLogLine(2, "failed to get ping"))
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700537 }
Bogdan Capritae1960f52015-01-14 09:57:19 -0800538 wantArgs := pingArgs{
539 Username: username,
540 FlagValue: flagValue,
541 EnvValue: envValue,
Robert Kroeger627a1152014-10-01 14:57:55 -0700542 }
Bogdan Capritae1960f52015-01-14 09:57:19 -0800543 if !reflect.DeepEqual(args, wantArgs) {
544 t.Fatalf(testutil.FormatLogLine(2, "got ping args %q, expected %q", args, wantArgs))
Robert Kroeger627a1152014-10-01 14:57:55 -0700545 }
546}
547
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700548// TestAppLifeCycle installs an app, starts it, suspends it, resumes it, and
549// then stops it.
550func TestAppLifeCycle(t *testing.T) {
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800551 ctx, shutdown := veyron2.Init()
552 defer shutdown()
553 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
554
555 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700556 defer deferFn()
557
558 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800559 envelope, cleanup := startMockRepos(t, ctx)
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700560 defer cleanup()
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700561
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -0800562 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700563 defer cleanup()
564
Robert Kroegerdd07b362014-09-18 17:34:42 -0700565 // Create a script wrapping the test target that implements suidhelper.
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700566 helperPath := generateSuidHelperScript(t, root)
Robert Kroegerdd07b362014-09-18 17:34:42 -0700567
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800568 crDir, crEnv := mgmttest.CredentialsForChild(ctx, "devicemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700569 defer os.RemoveAll(crDir)
570
Bogdan Caprita2b219362014-12-09 17:03:33 -0800571 // Set up the device manager. Since we won't do device manager updates,
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700572 // don't worry about its application envelope and current link.
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800573 dmh, dms := mgmttest.RunShellCommand(t, sh, crEnv, deviceManagerCmd, "dm", root, helperPath, "unused_app_repo_name", "unused_curr_link")
574 mgmttest.ReadPID(t, dms)
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700575
576 // Create the local server that the app uses to let us know it's ready.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800577 pingCh, cleanup := setupPingServer(t, ctx)
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700578 defer cleanup()
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700579
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800580 resolve(t, ctx, "pingserver", 1)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700581
Bogdan Capritabce0a632014-09-03 16:15:26 -0700582 // Create an envelope for a first version of the app.
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800583 *envelope = envelopeFromShell(sh, []string{testEnvVarName + "=env-val-envelope"}, appCmd, "google naps", fmt.Sprintf("--%s=flag-val-envelope", testFlagName), "appV1")
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700584
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800585 // Install the app. The config-specified flag value for testFlagName
586 // should override the value specified in the envelope above.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800587 appID := installApp(t, ctx, device.Config{testFlagName: "flag-val-install"})
Bogdan Caprita730bde12014-11-08 15:35:43 -0800588
589 // Start requires the caller to grant a blessing for the app instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800590 if _, err := startAppImpl(t, ctx, appID, ""); err == nil || !verror.Is(err, impl.ErrInvalidBlessing.ID) {
Todd Wang34ed4c62014-11-26 15:15:52 -0800591 t.Fatalf("Start(%v) expected to fail with %v, got %v instead", appID, impl.ErrInvalidBlessing.ID, err)
Bogdan Caprita730bde12014-11-08 15:35:43 -0800592 }
593
Bogdan Capritabce0a632014-09-03 16:15:26 -0700594 // Start an instance of the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800595 instance1ID := startApp(t, ctx, appID)
Robert Kroeger627a1152014-10-01 14:57:55 -0700596
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700597 // Wait until the app pings us that it's ready.
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800598 verifyPingArgs(t, pingCh, userName(t), "flag-val-install", "env-val-envelope")
Robert Kroeger627a1152014-10-01 14:57:55 -0700599
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800600 v1EP1 := resolve(t, ctx, "appV1", 1)[0]
Bogdan Capritabce0a632014-09-03 16:15:26 -0700601
602 // Suspend the app instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800603 suspendApp(t, ctx, appID, instance1ID)
604 resolveExpectNotFound(t, ctx, "appV1")
Bogdan Capritabce0a632014-09-03 16:15:26 -0700605
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800606 resumeApp(t, ctx, appID, instance1ID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800607 verifyPingArgs(t, pingCh, userName(t), "flag-val-install", "env-val-envelope") // Wait until the app pings us that it's ready.
Bogdan Capritabce0a632014-09-03 16:15:26 -0700608 oldV1EP1 := v1EP1
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800609 if v1EP1 = resolve(t, ctx, "appV1", 1)[0]; v1EP1 == oldV1EP1 {
Bogdan Capritabce0a632014-09-03 16:15:26 -0700610 t.Fatalf("Expected a new endpoint for the app after suspend/resume")
611 }
612
613 // Start a second instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800614 instance2ID := startApp(t, ctx, appID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800615 verifyPingArgs(t, pingCh, userName(t), "flag-val-install", "env-val-envelope") // Wait until the app pings us that it's ready.
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700616
Bogdan Capritabce0a632014-09-03 16:15:26 -0700617 // There should be two endpoints mounted as "appV1", one for each
618 // instance of the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800619 endpoints := resolve(t, ctx, "appV1", 2)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700620 v1EP2 := endpoints[0]
621 if endpoints[0] == v1EP1 {
622 v1EP2 = endpoints[1]
623 if v1EP2 == v1EP1 {
624 t.Fatalf("Both endpoints are the same")
625 }
626 } else if endpoints[1] != v1EP1 {
627 t.Fatalf("Second endpoint should have been v1EP1: %v, %v", endpoints, v1EP1)
628 }
Bogdan Caprita268b4192014-08-28 10:04:44 -0700629
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700630 // TODO(caprita): test Suspend and Resume, and verify various
631 // non-standard combinations (suspend when stopped; resume while still
632 // running; stop while suspended).
633
Bogdan Capritabce0a632014-09-03 16:15:26 -0700634 // Suspend the first instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800635 suspendApp(t, ctx, appID, instance1ID)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700636 // Only the second instance should still be running and mounted.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800637 if want, got := v1EP2, resolve(t, ctx, "appV1", 1)[0]; want != got {
Bogdan Capritabce0a632014-09-03 16:15:26 -0700638 t.Fatalf("Resolve(%v): want: %v, got %v", "appV1", want, got)
639 }
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700640
Bogdan Capritabce0a632014-09-03 16:15:26 -0700641 // Updating the installation to itself is a no-op.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800642 updateAppExpectError(t, ctx, appID, impl.ErrUpdateNoOp.ID)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700643
644 // Updating the installation should not work with a mismatched title.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700645 *envelope = envelopeFromShell(sh, nil, appCmd, "bogus")
646
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800647 updateAppExpectError(t, ctx, appID, impl.ErrAppTitleMismatch.ID)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700648
649 // Create a second version of the app and update the app to it.
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800650 *envelope = envelopeFromShell(sh, []string{testEnvVarName + "=env-val-envelope"}, appCmd, "google naps", "appV2")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700651
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800652 updateApp(t, ctx, appID)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700653
654 // Second instance should still be running.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800655 if want, got := v1EP2, resolve(t, ctx, "appV1", 1)[0]; want != got {
Bogdan Capritabce0a632014-09-03 16:15:26 -0700656 t.Fatalf("Resolve(%v): want: %v, got %v", "appV1", want, got)
657 }
658
659 // Resume first instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800660 resumeApp(t, ctx, appID, instance1ID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800661 verifyPingArgs(t, pingCh, userName(t), "flag-val-install", "env-val-envelope") // Wait until the app pings us that it's ready.
Bogdan Capritabce0a632014-09-03 16:15:26 -0700662 // Both instances should still be running the first version of the app.
663 // Check that the mounttable contains two endpoints, one of which is
664 // v1EP2.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800665 endpoints = resolve(t, ctx, "appV1", 2)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700666 if endpoints[0] == v1EP2 {
667 if endpoints[1] == v1EP2 {
668 t.Fatalf("Both endpoints are the same")
669 }
670 } else if endpoints[1] != v1EP2 {
671 t.Fatalf("Second endpoint should have been v1EP2: %v, %v", endpoints, v1EP2)
672 }
673
674 // Stop first instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800675 stopApp(t, ctx, appID, instance1ID)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700676 verifyAppWorkspace(t, root, appID, instance1ID)
677
678 // Only second instance is still running.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800679 if want, got := v1EP2, resolve(t, ctx, "appV1", 1)[0]; want != got {
Bogdan Capritabce0a632014-09-03 16:15:26 -0700680 t.Fatalf("Resolve(%v): want: %v, got %v", "appV1", want, got)
681 }
682
683 // Start a third instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800684 instance3ID := startApp(t, ctx, appID)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700685 // Wait until the app pings us that it's ready.
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800686 verifyPingArgs(t, pingCh, userName(t), "flag-val-install", "env-val-envelope")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700687
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800688 resolve(t, ctx, "appV2", 1)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700689
690 // Stop second instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800691 stopApp(t, ctx, appID, instance2ID)
692 resolveExpectNotFound(t, ctx, "appV1")
Bogdan Capritabce0a632014-09-03 16:15:26 -0700693
694 // Stop third instance.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800695 stopApp(t, ctx, appID, instance3ID)
696 resolveExpectNotFound(t, ctx, "appV2")
Bogdan Caprita9a59b8c2014-08-22 14:21:10 -0700697
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700698 // Revert the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800699 revertApp(t, ctx, appID)
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700700
701 // Start a fourth instance. It should be started from version 1.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800702 instance4ID := startApp(t, ctx, appID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800703 verifyPingArgs(t, pingCh, userName(t), "flag-val-install", "env-val-envelope") // Wait until the app pings us that it's ready.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800704 resolve(t, ctx, "appV1", 1)
705 stopApp(t, ctx, appID, instance4ID)
706 resolveExpectNotFound(t, ctx, "appV1")
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700707
708 // We are already on the first version, no further revert possible.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800709 revertAppExpectError(t, ctx, appID, impl.ErrUpdateNoOp.ID)
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700710
Bogdan Caprita8c776b22014-08-28 17:29:07 -0700711 // Uninstall the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800712 uninstallApp(t, ctx, appID)
Bogdan Caprita8c776b22014-08-28 17:29:07 -0700713
Bogdan Capritabce0a632014-09-03 16:15:26 -0700714 // Updating the installation should no longer be allowed.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800715 updateAppExpectError(t, ctx, appID, impl.ErrInvalidOperation.ID)
Bogdan Capritabce0a632014-09-03 16:15:26 -0700716
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700717 // Reverting the installation should no longer be allowed.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800718 revertAppExpectError(t, ctx, appID, impl.ErrInvalidOperation.ID)
Bogdan Caprita53b7b7e2014-09-03 20:51:16 -0700719
Bogdan Caprita8c776b22014-08-28 17:29:07 -0700720 // Starting new instances should no longer be allowed.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800721 startAppExpectError(t, ctx, appID, impl.ErrInvalidOperation.ID)
Bogdan Caprita8c776b22014-08-28 17:29:07 -0700722
Bogdan Caprita2b219362014-12-09 17:03:33 -0800723 // Cleanly shut down the device manager.
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800724 syscall.Kill(dmh.Pid(), syscall.SIGINT)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800725 dms.Expect("dm terminated")
Bogdan Caprita9c4aa222014-12-10 14:46:30 -0800726 dms.ExpectEOF()
Bogdan Caprita1e379132014-08-03 23:02:31 -0700727}
Gautham82bb9952014-08-28 14:11:51 -0700728
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800729func startRealBinaryRepository(t *testing.T, ctx *context.T) func() {
Jiri Simsa432cc2e2014-12-08 15:53:38 -0800730 rootDir, err := binaryimpl.SetupRootDir("")
Robin Thellend875f2592014-12-02 10:29:37 -0800731 if err != nil {
Jiri Simsa432cc2e2014-12-08 15:53:38 -0800732 t.Fatalf("binaryimpl.SetupRootDir failed: %v", err)
Robin Thellend875f2592014-12-02 10:29:37 -0800733 }
Jiri Simsa432cc2e2014-12-08 15:53:38 -0800734 state, err := binaryimpl.NewState(rootDir, "", 3)
Robin Thellend875f2592014-12-02 10:29:37 -0800735 if err != nil {
736 t.Fatalf("binaryimpl.NewState failed: %v", err)
737 }
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800738 server, _ := mgmttest.NewServer(ctx)
Robin Thellend875f2592014-12-02 10:29:37 -0800739 name := "realbin"
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800740 d, err := binaryimpl.NewDispatcher(veyron2.GetPrincipal(ctx), state)
Robert Kroeger8d7a0ef2015-01-14 17:38:40 -0800741 if err != nil {
742 t.Fatalf("server.NewDispatcher failed: %v", err)
743 }
744 if err := server.ServeDispatcher(name, d); err != nil {
Robin Thellend875f2592014-12-02 10:29:37 -0800745 t.Fatalf("server.ServeDispatcher failed: %v", err)
746 }
747
748 tmpdir, err := ioutil.TempDir("", "test-package-")
749 if err != nil {
750 t.Fatalf("ioutil.TempDir failed: %v", err)
751 }
752 defer os.RemoveAll(tmpdir)
753 if err := ioutil.WriteFile(filepath.Join(tmpdir, "hello.txt"), []byte("Hello World!"), 0600); err != nil {
754 t.Fatalf("ioutil.WriteFile failed: %v", err)
755 }
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800756 if err := libbinary.UploadFromDir(ctx, naming.Join(name, "testpkg"), tmpdir); err != nil {
Robin Thellend875f2592014-12-02 10:29:37 -0800757 t.Fatalf("libbinary.UploadFromDir failed: %v", err)
758 }
759 return func() {
760 if err := server.Stop(); err != nil {
761 t.Fatalf("server.Stop failed: %v", err)
762 }
Jiri Simsa432cc2e2014-12-08 15:53:38 -0800763 if err := os.RemoveAll(rootDir); err != nil {
764 t.Fatalf("os.RemoveAll(%q) failed: %v", rootDir, err)
Robin Thellend875f2592014-12-02 10:29:37 -0800765 }
766 }
767}
768
Bogdan Caprita2b219362014-12-09 17:03:33 -0800769// TestDeviceManagerClaim claims a devicemanager and tests ACL permissions on
770// its methods.
771func TestDeviceManagerClaim(t *testing.T) {
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800772 ctx, shutdown := veyron2.Init()
773 defer shutdown()
774 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
775
776 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700777 defer deferFn()
778
779 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800780 envelope, cleanup := startMockRepos(t, ctx)
Gautham82bb9952014-08-28 14:11:51 -0700781 defer cleanup()
Gautham82bb9952014-08-28 14:11:51 -0700782
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -0800783 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Gautham82bb9952014-08-28 14:11:51 -0700784 defer cleanup()
785
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800786 crDir, crEnv := mgmttest.CredentialsForChild(ctx, "devicemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700787 defer os.RemoveAll(crDir)
788
Bogdan Caprita962d5e02014-10-28 18:36:09 -0700789 // Create a script wrapping the test target that implements suidhelper.
790 helperPath := generateSuidHelperScript(t, root)
791
Bogdan Caprita2b219362014-12-09 17:03:33 -0800792 // Set up the device manager. Since we won't do device manager updates,
Gautham82bb9952014-08-28 14:11:51 -0700793 // don't worry about its application envelope and current link.
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800794 _, dms := mgmttest.RunShellCommand(t, sh, crEnv, deviceManagerCmd, "dm", root, helperPath, "unused_app_repo_name", "unused_curr_link")
795 pid := mgmttest.ReadPID(t, dms)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700796 defer syscall.Kill(pid, syscall.SIGINT)
Gautham82bb9952014-08-28 14:11:51 -0700797
Bogdan Caprita26929102014-11-07 11:56:56 -0800798 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "trapp")
Gautham82bb9952014-08-28 14:11:51 -0700799
Robin Thellend888f8cf2014-12-15 16:19:10 -0800800 deviceStub := device.DeviceClient("dm/device")
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800801
802 claimantCtx, err := veyron2.SetPrincipal(ctx, tsecurity.NewPrincipal("claimant"))
803 if err != nil {
804 t.Fatalf("Could not create claimant principal: %v", err)
805 }
806 octx, err := veyron2.SetPrincipal(ctx, tsecurity.NewPrincipal("other"))
807 if err != nil {
808 t.Fatalf("Could not create other principal: %v", err)
809 }
Matt Rosencrantz5180d162014-12-03 13:48:40 -0800810
Bogdan Caprita2b219362014-12-09 17:03:33 -0800811 // Devicemanager should have open ACLs before we claim it and so an
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800812 // Install from octx should succeed.
813 installApp(t, octx)
Robin Thellend888f8cf2014-12-15 16:19:10 -0800814 // Claim the devicemanager with claimantRT as <defaultblessing>/mydevice
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800815 if err := deviceStub.Claim(claimantCtx, &granter{p: veyron2.GetPrincipal(claimantCtx), extension: "mydevice"}); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700816 t.Fatal(err)
Gautham82bb9952014-08-28 14:11:51 -0700817 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700818
Robin Thellend888f8cf2014-12-15 16:19:10 -0800819 // Installation should succeed since claimantRT is now the "owner" of
820 // the devicemanager.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800821 appID := installApp(t, claimantCtx)
Bogdan Capritab9501d12014-10-10 15:02:03 -0700822
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800823 // octx should be unable to install though, since the ACLs have
Bogdan Caprita2b219362014-12-09 17:03:33 -0800824 // changed now.
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800825 installAppExpectError(t, octx, verror.NoAccess.ID)
Bogdan Capritab9501d12014-10-10 15:02:03 -0700826
Bogdan Capritab9501d12014-10-10 15:02:03 -0700827 // Create the local server that the app uses to let us know it's ready.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800828 pingCh, cleanup := setupPingServer(t, ctx)
Bogdan Capritad2b9f032014-10-10 17:43:29 -0700829 defer cleanup()
Bogdan Capritab9501d12014-10-10 15:02:03 -0700830
831 // Start an instance of the app.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800832 instanceID := startApp(t, claimantCtx, appID)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700833
834 // Wait until the app pings us that it's ready.
835 select {
836 case <-pingCh:
Bogdan Caprita916e99f2014-11-24 15:47:19 -0800837 case <-time.After(pingTimeout):
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700838 t.Fatalf("failed to get ping")
839 }
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800840 resolve(t, ctx, "trapp", 1)
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800841 suspendApp(t, claimantCtx, appID, instanceID)
Bogdan Capritab9501d12014-10-10 15:02:03 -0700842
Bogdan Caprita2b219362014-12-09 17:03:33 -0800843 // TODO(gauthamt): Test that ACLs persist across devicemanager restarts
Gautham82bb9952014-08-28 14:11:51 -0700844}
Gautham6fe61e52014-09-16 13:58:17 -0700845
Bogdan Caprita2b219362014-12-09 17:03:33 -0800846func TestDeviceManagerUpdateACL(t *testing.T) {
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800847 ctx, shutdown := veyron2.Init()
848 defer shutdown()
849 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
850
851 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700852 defer deferFn()
853
854 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800855 envelope, cleanup := startMockRepos(t, ctx)
Gautham6fe61e52014-09-16 13:58:17 -0700856 defer cleanup()
Gautham6fe61e52014-09-16 13:58:17 -0700857
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -0800858 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Gautham6fe61e52014-09-16 13:58:17 -0700859 defer cleanup()
860
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800861 // The two "processes"/runtimes which will act as IPC clients to
862 // the devicemanager process.
863 selfCtx := ctx
864 octx, err := veyron2.SetPrincipal(ctx, tsecurity.NewPrincipal())
865 if err != nil {
866 t.Fatalf("Could not create other principal: %v", err)
867 }
868
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800869 // By default, selfCtx and octx will have blessings generated based on
Bogdan Caprita2b219362014-12-09 17:03:33 -0800870 // the username/machine name running this process. Since these blessings
871 // will appear in ACLs, give them recognizable names.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800872 idp := tsecurity.NewIDProvider("root")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800873 if err := idp.Bless(veyron2.GetPrincipal(selfCtx), "self"); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700874 t.Fatal(err)
875 }
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800876 if err := idp.Bless(veyron2.GetPrincipal(octx), "other"); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700877 t.Fatal(err)
878 }
879
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800880 crDir, crEnv := mgmttest.CredentialsForChild(ctx, "devicemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700881 defer os.RemoveAll(crDir)
882
Bogdan Caprita2b219362014-12-09 17:03:33 -0800883 // Set up the device manager. Since we won't do device manager updates,
Gautham6fe61e52014-09-16 13:58:17 -0700884 // don't worry about its application envelope and current link.
Robert Kroegerebfb62a2014-12-10 14:42:09 -0800885 _, dms := mgmttest.RunShellCommand(t, sh, crEnv, deviceManagerCmd, "dm", root, "unused_helper", "unused_app_repo_name", "unused_curr_link")
886 pid := mgmttest.ReadPID(t, dms)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700887 defer syscall.Kill(pid, syscall.SIGINT)
Gautham6fe61e52014-09-16 13:58:17 -0700888
889 // Create an envelope for an app.
Bogdan Caprita26929102014-11-07 11:56:56 -0800890 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps")
Gautham6fe61e52014-09-16 13:58:17 -0700891
Robert Kroegere95ed6d2015-01-14 17:41:04 -0800892 // On an unclaimed device manager, there will be no ACLs.
893 deviceStub := device.DeviceClient("dm/device")
894 if _, _, err := deviceStub.GetACL(selfCtx); err == nil {
895 t.Fatalf("GetACL should have failed but didn't.")
Gautham6fe61e52014-09-16 13:58:17 -0700896 }
897
Bogdan Caprita2b219362014-12-09 17:03:33 -0800898 // Claim the devicemanager as "root/self/mydevice"
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800899 if err := deviceStub.Claim(selfCtx, &granter{p: veyron2.GetPrincipal(selfCtx), extension: "mydevice"}); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700900 t.Fatal(err)
Gautham6fe61e52014-09-16 13:58:17 -0700901 }
Asim Shankar68885192014-11-26 12:48:35 -0800902 expectedACL := make(access.TaggedACLMap)
903 for _, tag := range access.AllTypicalTags() {
904 expectedACL[string(tag)] = access.ACL{In: []security.BlessingPattern{"root/self/mydevice"}}
905 }
Gautham6fe61e52014-09-16 13:58:17 -0700906 var b bytes.Buffer
Asim Shankar68885192014-11-26 12:48:35 -0800907 if err := expectedACL.WriteTo(&b); err != nil {
908 t.Fatalf("Failed to save ACL:%v", err)
Gautham6fe61e52014-09-16 13:58:17 -0700909 }
910 md5hash := md5.Sum(b.Bytes())
911 expectedETAG := hex.EncodeToString(md5hash[:])
Robert Kroegere95ed6d2015-01-14 17:41:04 -0800912 acl, etag, err := deviceStub.GetACL(selfCtx)
913 if err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700914 t.Fatal(err)
Gautham6fe61e52014-09-16 13:58:17 -0700915 }
916 if etag != expectedETAG {
917 t.Fatalf("getACL expected:%v(%v), got:%v(%v)", expectedACL, expectedETAG, acl, etag)
918 }
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800919 // Install from octx should fail, since it does not match the ACL.
920 installAppExpectError(t, octx, verror.NoAccess.ID)
921
Asim Shankar68885192014-11-26 12:48:35 -0800922 newACL := make(access.TaggedACLMap)
923 for _, tag := range access.AllTypicalTags() {
924 newACL.Add("root/other", string(tag))
925 }
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800926 if err := deviceStub.SetACL(selfCtx, newACL, "invalid"); err == nil {
Gautham6fe61e52014-09-16 13:58:17 -0700927 t.Fatalf("SetACL should have failed with invalid etag")
928 }
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -0800929 if err := deviceStub.SetACL(selfCtx, newACL, etag); err != nil {
Asim Shankar88292912014-10-09 19:41:07 -0700930 t.Fatal(err)
Gautham6fe61e52014-09-16 13:58:17 -0700931 }
Bogdan Caprita17666dd2015-01-14 09:27:46 -0800932 // Install should now fail with selfCtx, which no longer matches the
933 // ACLs but succeed with octx, which does.
934 installAppExpectError(t, selfCtx, verror.NoAccess.ID)
935 installApp(t, octx)
Gautham6fe61e52014-09-16 13:58:17 -0700936}
Robin Thellend09929f42014-10-01 10:18:13 -0700937
Bogdan Capritac7e72b62015-01-07 19:22:23 -0800938type simpleRW chan []byte
939
940func (s simpleRW) Write(p []byte) (n int, err error) {
941 s <- p
942 return len(p), nil
943}
944func (s simpleRW) Read(p []byte) (n int, err error) {
945 return copy(p, <-s), nil
946}
947
948// TestDeviceManagerInstallation verifies the 'self install' and 'uninstall'
Bogdan Capritaa40d3382014-12-19 16:30:26 -0800949// functionality of the device manager: it runs SelfInstall in a child process,
950// then runs the executable from the soft link that the installation created.
951// This should bring up a functioning device manager. In the end it runs
952// Uninstall and verifies that the installation is gone.
Bogdan Capritac7e72b62015-01-07 19:22:23 -0800953func TestDeviceManagerInstallation(t *testing.T) {
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800954 ctx, shutdown := veyron2.Init()
955 defer shutdown()
956 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
957
958 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700959 defer deferFn()
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -0800960 testDir, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Bogdan Caprita5420f172014-10-10 15:58:14 -0700961 defer cleanup()
962
Bogdan Capritac7e72b62015-01-07 19:22:23 -0800963 // Create a script wrapping the test target that implements suidhelper.
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800964 suidHelperPath := generateSuidHelperScript(t, testDir)
Bogdan Capritac7e72b62015-01-07 19:22:23 -0800965 // Create a dummy script mascarading as the security agent.
966 agentPath := generateAgentScript(t, testDir)
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800967 initHelperPath := ""
Bogdan Caprita5420f172014-10-10 15:58:14 -0700968
Bogdan Caprita2b219362014-12-09 17:03:33 -0800969 // Create an 'envelope' for the device manager that we can pass to the
970 // installer, to ensure that the device manager that the installer
Bogdan Capritac7e72b62015-01-07 19:22:23 -0800971 // configures can run.
972 dmargs, dmenv := sh.CommandEnvelope(deviceManagerCmd, nil, "dm")
973 dmDir := filepath.Join(testDir, "dm")
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800974 // TODO(caprita): Add test logic when initMode = true.
975 singleUser, sessionMode, initMode := true, true, false
976 if err := impl.SelfInstall(dmDir, suidHelperPath, agentPath, initHelperPath, singleUser, sessionMode, initMode, dmargs[1:], dmenv, os.Stderr, os.Stdout); err != nil {
Bogdan Capritac7e72b62015-01-07 19:22:23 -0800977 t.Fatalf("SelfInstall failed: %v", err)
978 }
Bogdan Caprita5420f172014-10-10 15:58:14 -0700979
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800980 resolveExpectNotFound(t, ctx, "dm")
Bogdan Capritac7e72b62015-01-07 19:22:23 -0800981 // Start the device manager.
982 stdout := make(simpleRW, 100)
983 if err := impl.Start(dmDir, os.Stderr, stdout); err != nil {
984 t.Fatalf("Start failed: %v", err)
985 }
986 dms := expect.NewSession(t, stdout, mgmttest.ExpectTimeout)
987 mgmttest.ReadPID(t, dms)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800988 resolve(t, ctx, "dm", 1)
989 revertDeviceExpectError(t, ctx, "dm", impl.ErrUpdateNoOp.ID) // No previous version available.
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -0700990
Bogdan Capritac7e72b62015-01-07 19:22:23 -0800991 // Stop the device manager.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800992 if err := impl.Stop(ctx, dmDir, os.Stderr, os.Stdout); err != nil {
Bogdan Capritac7e72b62015-01-07 19:22:23 -0800993 t.Fatalf("Stop failed: %v", err)
994 }
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -0800995 dms.Expect("dm terminated")
Bogdan Capritaa40d3382014-12-19 16:30:26 -0800996
997 // Uninstall.
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800998 if err := impl.Uninstall(dmDir, os.Stderr, os.Stdout); err != nil {
Bogdan Capritac7e72b62015-01-07 19:22:23 -0800999 t.Fatalf("Uninstall failed: %v", err)
Bogdan Capritaa40d3382014-12-19 16:30:26 -08001000 }
Bogdan Capritac7e72b62015-01-07 19:22:23 -08001001 // Ensure that the installation is gone.
1002 if files, err := ioutil.ReadDir(dmDir); err != nil || len(files) > 0 {
1003 var finfo []string
1004 for _, f := range files {
1005 finfo = append(finfo, f.Name())
1006 }
1007 t.Fatalf("ReadDir returned (%v, %v)", err, finfo)
Bogdan Capritaa40d3382014-12-19 16:30:26 -08001008 }
Bogdan Caprita5420f172014-10-10 15:58:14 -07001009}
1010
Bogdan Caprita2b219362014-12-09 17:03:33 -08001011func TestDeviceManagerGlobAndDebug(t *testing.T) {
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001012 ctx, shutdown := veyron2.Init()
1013 defer shutdown()
1014 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
1015
1016 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001017 defer deferFn()
1018
1019 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001020 envelope, cleanup := startMockRepos(t, ctx)
Robin Thellend9e523a62014-10-07 16:19:53 -07001021 defer cleanup()
Robin Thellend9e523a62014-10-07 16:19:53 -07001022
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -08001023 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Robin Thellend09929f42014-10-01 10:18:13 -07001024 defer cleanup()
1025
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001026 crDir, crEnv := mgmttest.CredentialsForChild(ctx, "devicemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001027 defer os.RemoveAll(crDir)
1028
Bogdan Caprita962d5e02014-10-28 18:36:09 -07001029 // Create a script wrapping the test target that implements suidhelper.
1030 helperPath := generateSuidHelperScript(t, root)
1031
Bogdan Caprita2b219362014-12-09 17:03:33 -08001032 // Set up the device manager. Since we won't do device manager updates,
Robin Thellend09929f42014-10-01 10:18:13 -07001033 // don't worry about its application envelope and current link.
Robert Kroegerebfb62a2014-12-10 14:42:09 -08001034 _, dms := mgmttest.RunShellCommand(t, sh, crEnv, deviceManagerCmd, "dm", root, helperPath, "unused_app_repo_name", "unused_curr_link")
1035 pid := mgmttest.ReadPID(t, dms)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001036 defer syscall.Kill(pid, syscall.SIGINT)
Robin Thellend09929f42014-10-01 10:18:13 -07001037
Robin Thellend9e523a62014-10-07 16:19:53 -07001038 // Create the local server that the app uses to let us know it's ready.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001039 pingCh, cleanup := setupPingServer(t, ctx)
Bogdan Capritad2b9f032014-10-10 17:43:29 -07001040 defer cleanup()
Robin Thellend09929f42014-10-01 10:18:13 -07001041
Robin Thellend9e523a62014-10-07 16:19:53 -07001042 // Create the envelope for the first version of the app.
Bogdan Caprita26929102014-11-07 11:56:56 -08001043 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "appV1")
Robin Thellend9e523a62014-10-07 16:19:53 -07001044
1045 // Install the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001046 appID := installApp(t, ctx)
Bogdan Caprita43bc7372014-12-03 21:51:12 -08001047 install1ID := path.Base(appID)
Robin Thellend9e523a62014-10-07 16:19:53 -07001048
1049 // Start an instance of the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001050 instance1ID := startApp(t, ctx, appID)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001051
1052 // Wait until the app pings us that it's ready.
1053 select {
1054 case <-pingCh:
Bogdan Caprita916e99f2014-11-24 15:47:19 -08001055 case <-time.After(pingTimeout):
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001056 t.Fatalf("failed to get ping")
1057 }
Robin Thellend9e523a62014-10-07 16:19:53 -07001058
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001059 app2ID := installApp(t, ctx)
Bogdan Caprita43bc7372014-12-03 21:51:12 -08001060 install2ID := path.Base(app2ID)
1061
Robin Thellend9e523a62014-10-07 16:19:53 -07001062 testcases := []struct {
1063 name, pattern string
1064 expected []string
1065 }{
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001066 {"dm", "...", []string{
Robin Thellend9e523a62014-10-07 16:19:53 -07001067 "",
1068 "apps",
1069 "apps/google naps",
Bogdan Caprita43bc7372014-12-03 21:51:12 -08001070 "apps/google naps/" + install1ID,
1071 "apps/google naps/" + install1ID + "/" + instance1ID,
1072 "apps/google naps/" + install1ID + "/" + instance1ID + "/logs",
1073 "apps/google naps/" + install1ID + "/" + instance1ID + "/logs/STDERR-<timestamp>",
1074 "apps/google naps/" + install1ID + "/" + instance1ID + "/logs/STDOUT-<timestamp>",
1075 "apps/google naps/" + install1ID + "/" + instance1ID + "/logs/bin.INFO",
1076 "apps/google naps/" + install1ID + "/" + instance1ID + "/logs/bin.<*>.INFO.<timestamp>",
1077 "apps/google naps/" + install1ID + "/" + instance1ID + "/pprof",
1078 "apps/google naps/" + install1ID + "/" + instance1ID + "/stats",
1079 "apps/google naps/" + install1ID + "/" + instance1ID + "/stats/ipc",
1080 "apps/google naps/" + install1ID + "/" + instance1ID + "/stats/system",
1081 "apps/google naps/" + install1ID + "/" + instance1ID + "/stats/system/start-time-rfc1123",
1082 "apps/google naps/" + install1ID + "/" + instance1ID + "/stats/system/start-time-unix",
1083 "apps/google naps/" + install2ID,
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001084 "device",
Robin Thellend9e523a62014-10-07 16:19:53 -07001085 }},
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001086 {"dm/apps", "*", []string{"google naps"}},
1087 {"dm/apps/google naps", "*", []string{install1ID, install2ID}},
1088 {"dm/apps/google naps/" + install1ID, "*", []string{instance1ID}},
1089 {"dm/apps/google naps/" + install1ID + "/" + instance1ID, "*", []string{"logs", "pprof", "stats"}},
1090 {"dm/apps/google naps/" + install1ID + "/" + instance1ID + "/logs", "*", []string{
Robin Thellend58647322014-10-28 12:07:47 -07001091 "STDERR-<timestamp>",
1092 "STDOUT-<timestamp>",
1093 "bin.INFO",
1094 "bin.<*>.INFO.<timestamp>",
1095 }},
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001096 {"dm/apps/google naps/" + install1ID + "/" + instance1ID + "/stats/system", "start-time*", []string{"start-time-rfc1123", "start-time-unix"}},
Robin Thellend09929f42014-10-01 10:18:13 -07001097 }
Robin Thellend58647322014-10-28 12:07:47 -07001098 logFileTimeStampRE := regexp.MustCompile("(STDOUT|STDERR)-[0-9]+$")
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001099 logFileTrimInfoRE := regexp.MustCompile(`bin\..*\.INFO\.[0-9.-]+$`)
Robin Thellend58647322014-10-28 12:07:47 -07001100 logFileRemoveErrorFatalWarningRE := regexp.MustCompile("(ERROR|FATAL|WARNING)")
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001101 statsTrimRE := regexp.MustCompile("/stats/(ipc|system(/start-time.*)?)$")
Robin Thellend9e523a62014-10-07 16:19:53 -07001102 for _, tc := range testcases {
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001103 results, err := testutil.GlobName(ctx, tc.name, tc.pattern)
Robin Thellend5c95a6c2014-11-10 13:06:56 -08001104 if err != nil {
1105 t.Errorf("unexpected glob error for (%q, %q): %v", tc.name, tc.pattern, err)
1106 continue
1107 }
Robin Thellend58647322014-10-28 12:07:47 -07001108 filteredResults := []string{}
1109 for _, name := range results {
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001110 // Keep only the stats object names that match this RE.
1111 if strings.Contains(name, "/stats/") && !statsTrimRE.MatchString(name) {
1112 continue
1113 }
1114 // Remove ERROR, WARNING, FATAL log files because
1115 // they're not consistently there.
Robin Thellend58647322014-10-28 12:07:47 -07001116 if logFileRemoveErrorFatalWarningRE.MatchString(name) {
1117 continue
1118 }
1119 name = logFileTimeStampRE.ReplaceAllString(name, "$1-<timestamp>")
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001120 name = logFileTrimInfoRE.ReplaceAllString(name, "bin.<*>.INFO.<timestamp>")
Robin Thellend58647322014-10-28 12:07:47 -07001121 filteredResults = append(filteredResults, name)
Robin Thellend9e523a62014-10-07 16:19:53 -07001122 }
Robin Thellend12937a22014-10-29 17:53:23 -07001123 sort.Strings(filteredResults)
1124 sort.Strings(tc.expected)
Robin Thellend58647322014-10-28 12:07:47 -07001125 if !reflect.DeepEqual(filteredResults, tc.expected) {
1126 t.Errorf("unexpected result for (%q, %q). Got %q, want %q", tc.name, tc.pattern, filteredResults, tc.expected)
Robin Thellend9e523a62014-10-07 16:19:53 -07001127 }
Robin Thellend09929f42014-10-01 10:18:13 -07001128 }
Robin Thellend4c5266e2014-10-27 13:19:29 -07001129
Robin Thellend58647322014-10-28 12:07:47 -07001130 // Call Size() on the log file objects.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001131 files, err := testutil.GlobName(ctx, "dm", "apps/google naps/"+install1ID+"/"+instance1ID+"/logs/*")
Robin Thellend5c95a6c2014-11-10 13:06:56 -08001132 if err != nil {
1133 t.Errorf("unexpected glob error: %v", err)
1134 }
Robin Thellend12937a22014-10-29 17:53:23 -07001135 if want, got := 4, len(files); got < want {
1136 t.Errorf("Unexpected number of matches. Got %d, want at least %d", got, want)
1137 }
Robin Thellend4c5266e2014-10-27 13:19:29 -07001138 for _, file := range files {
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001139 name := naming.Join("dm", file)
Todd Wang702385a2014-11-07 01:54:08 -08001140 c := logreader.LogFileClient(name)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001141 if _, err := c.Size(ctx); err != nil {
Robin Thellend4c5266e2014-10-27 13:19:29 -07001142 t.Errorf("Size(%q) failed: %v", name, err)
1143 }
1144 }
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001145
1146 // Call Value() on some of the stats objects.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001147 objects, err := testutil.GlobName(ctx, "dm", "apps/google naps/"+install1ID+"/"+instance1ID+"/stats/system/start-time*")
Robin Thellend5c95a6c2014-11-10 13:06:56 -08001148 if err != nil {
1149 t.Errorf("unexpected glob error: %v", err)
1150 }
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001151 if want, got := 2, len(objects); got != want {
1152 t.Errorf("Unexpected number of matches. Got %d, want %d", got, want)
1153 }
1154 for _, obj := range objects {
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001155 name := naming.Join("dm", obj)
Todd Wang702385a2014-11-07 01:54:08 -08001156 c := stats.StatsClient(name)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001157 if _, err := c.Value(ctx); err != nil {
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001158 t.Errorf("Value(%q) failed: %v", name, err)
1159 }
1160 }
1161
1162 // Call CmdLine() on the pprof object.
1163 {
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001164 name := "dm/apps/google naps/" + install1ID + "/" + instance1ID + "/pprof"
Todd Wang702385a2014-11-07 01:54:08 -08001165 c := pprof.PProfClient(name)
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001166 v, err := c.CmdLine(ctx)
Robin Thellendb9dd9bb2014-10-29 13:54:08 -07001167 if err != nil {
1168 t.Errorf("CmdLine(%q) failed: %v", name, err)
1169 }
1170 if len(v) == 0 {
1171 t.Fatalf("Unexpected empty cmdline: %v", v)
1172 }
1173 if got, want := filepath.Base(v[0]), "bin"; got != want {
1174 t.Errorf("Unexpected value for argv[0]. Got %v, want %v", got, want)
1175 }
1176 }
Robin Thellend4c5266e2014-10-27 13:19:29 -07001177}
1178
Bogdan Caprita2b219362014-12-09 17:03:33 -08001179func TestDeviceManagerPackages(t *testing.T) {
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001180 ctx, shutdown := veyron2.Init()
1181 defer shutdown()
1182 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
1183
1184 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Robin Thellend875f2592014-12-02 10:29:37 -08001185 defer deferFn()
1186
1187 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001188 envelope, cleanup := startMockRepos(t, ctx)
Robin Thellend875f2592014-12-02 10:29:37 -08001189 defer cleanup()
1190
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001191 defer startRealBinaryRepository(t, ctx)()
Robin Thellend875f2592014-12-02 10:29:37 -08001192
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -08001193 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Robin Thellend875f2592014-12-02 10:29:37 -08001194 defer cleanup()
1195
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001196 crDir, crEnv := mgmttest.CredentialsForChild(ctx, "devicemanager")
Robin Thellend875f2592014-12-02 10:29:37 -08001197 defer os.RemoveAll(crDir)
1198
1199 // Create a script wrapping the test target that implements suidhelper.
1200 helperPath := generateSuidHelperScript(t, root)
1201
Bogdan Caprita2b219362014-12-09 17:03:33 -08001202 // Set up the device manager. Since we won't do device manager updates,
Robin Thellend875f2592014-12-02 10:29:37 -08001203 // don't worry about its application envelope and current link.
Robert Kroegerebfb62a2014-12-10 14:42:09 -08001204 _, dms := mgmttest.RunShellCommand(t, sh, crEnv, deviceManagerCmd, "dm", root, helperPath, "unused_app_repo_name", "unused_curr_link")
1205 pid := mgmttest.ReadPID(t, dms)
Robin Thellend875f2592014-12-02 10:29:37 -08001206 defer syscall.Kill(pid, syscall.SIGINT)
1207
1208 // Create the local server that the app uses to let us know it's ready.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001209 pingCh, cleanup := setupPingServer(t, ctx)
Robin Thellend875f2592014-12-02 10:29:37 -08001210 defer cleanup()
1211
1212 // Create the envelope for the first version of the app.
1213 *envelope = envelopeFromShell(sh, nil, appCmd, "google naps", "appV1")
1214 (*envelope).Packages = map[string]string{
1215 "test": "realbin/testpkg",
1216 }
1217
1218 // Install the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001219 appID := installApp(t, ctx)
Robin Thellend875f2592014-12-02 10:29:37 -08001220
1221 // Start an instance of the app.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001222 startApp(t, ctx, appID)
Robin Thellend875f2592014-12-02 10:29:37 -08001223
1224 // Wait until the app pings us that it's ready.
1225 select {
1226 case <-pingCh:
1227 case <-time.After(pingTimeout):
1228 t.Fatalf("failed to get ping")
1229 }
1230
1231 // Ask the app to cat a file from the package.
1232 file := filepath.Join("packages", "test", "hello.txt")
1233 name := "appV1"
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001234 content, err := cat(ctx, name, file)
Robin Thellend875f2592014-12-02 10:29:37 -08001235 if err != nil {
1236 t.Errorf("cat(%q, %q) failed: %v", name, file, err)
1237 }
1238 if expected := "Hello World!"; content != expected {
1239 t.Errorf("unexpected content: expected %q, got %q", expected, content)
1240 }
1241}
1242
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001243func listAndVerifyAssociations(t *testing.T, ctx *context.T, stub device.DeviceClientMethods, expected []device.Association) {
1244 assocs, err := stub.ListAssociations(ctx)
Robert Kroeger362ff892014-09-29 14:23:47 -07001245 if err != nil {
1246 t.Fatalf("ListAssociations failed %v", err)
1247 }
Robert Kroeger1cb4a0d2014-10-20 11:55:38 -07001248 compareAssociations(t, assocs, expected)
Robert Kroeger362ff892014-09-29 14:23:47 -07001249}
1250
Bogdan Caprita2b219362014-12-09 17:03:33 -08001251// TODO(rjkroege): Verify that associations persist across restarts once
1252// permanent storage is added.
Robert Kroeger362ff892014-09-29 14:23:47 -07001253func TestAccountAssociation(t *testing.T) {
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001254 ctx, shutdown := veyron2.Init()
1255 defer shutdown()
1256 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
1257
1258 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001259 defer deferFn()
Robert Kroeger362ff892014-09-29 14:23:47 -07001260
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -08001261 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Robert Kroeger362ff892014-09-29 14:23:47 -07001262 defer cleanup()
1263
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001264 // The two "processes"/contexts which will act as IPC clients to
1265 // the devicemanager process.
1266 selfCtx := ctx
1267 otherCtx, err := veyron2.SetPrincipal(ctx, tsecurity.NewPrincipal())
1268 if err != nil {
1269 t.Fatalf("Could not create other principal: %v", err)
1270 }
1271
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001272 // By default, selfCtx and otherCtx will have blessings generated based
1273 // on the username/machine name running this process. Since these
1274 // blessings will appear in test expecations, give them readable names.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001275 idp := tsecurity.NewIDProvider("root")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001276 if err := idp.Bless(veyron2.GetPrincipal(selfCtx), "self"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001277 t.Fatal(err)
1278 }
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001279 if err := idp.Bless(veyron2.GetPrincipal(otherCtx), "other"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001280 t.Fatal(err)
1281 }
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001282 crFile, crEnv := mgmttest.CredentialsForChild(ctx, "devicemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001283 defer os.RemoveAll(crFile)
Robert Kroeger362ff892014-09-29 14:23:47 -07001284
Robert Kroegerebfb62a2014-12-10 14:42:09 -08001285 _, dms := mgmttest.RunShellCommand(t, sh, crEnv, deviceManagerCmd, "dm", root, "unused_helper", "unused_app_repo_name", "unused_curr_link")
1286 pid := mgmttest.ReadPID(t, dms)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001287 defer syscall.Kill(pid, syscall.SIGINT)
Robert Kroeger362ff892014-09-29 14:23:47 -07001288
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001289 deviceStub := device.DeviceClient("dm//device")
Robert Kroeger362ff892014-09-29 14:23:47 -07001290
Bogdan Caprita2b219362014-12-09 17:03:33 -08001291 // Attempt to list associations on the device manager without having
Robert Kroeger362ff892014-09-29 14:23:47 -07001292 // claimed it.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001293 if list, err := deviceStub.ListAssociations(otherCtx); err != nil || list != nil {
Bogdan Caprita2b219362014-12-09 17:03:33 -08001294 t.Fatalf("ListAssociations should fail on unclaimed device manager but did not: %v", err)
Robert Kroeger362ff892014-09-29 14:23:47 -07001295 }
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001296
Bogdan Caprita2b219362014-12-09 17:03:33 -08001297 // self claims the device manager.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001298 if err := deviceStub.Claim(selfCtx, &granter{p: veyron2.GetPrincipal(selfCtx), extension: "alice"}); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001299 t.Fatalf("Claim failed: %v", err)
1300 }
1301
1302 vlog.VI(2).Info("Verify that associations start out empty.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001303 listAndVerifyAssociations(t, selfCtx, deviceStub, []device.Association(nil))
Robert Kroeger362ff892014-09-29 14:23:47 -07001304
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001305 if err := deviceStub.AssociateAccount(selfCtx, []string{"root/self", "root/other"}, "alice_system_account"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001306 t.Fatalf("ListAssociations failed %v", err)
1307 }
1308 vlog.VI(2).Info("Added association should appear.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001309 listAndVerifyAssociations(t, selfCtx, deviceStub, []device.Association{
Robert Kroeger362ff892014-09-29 14:23:47 -07001310 {
1311 "root/self",
1312 "alice_system_account",
1313 },
1314 {
1315 "root/other",
1316 "alice_system_account",
1317 },
1318 })
1319
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001320 if err := deviceStub.AssociateAccount(selfCtx, []string{"root/self", "root/other"}, "alice_other_account"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001321 t.Fatalf("AssociateAccount failed %v", err)
1322 }
1323 vlog.VI(2).Info("Change the associations and the change should appear.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001324 listAndVerifyAssociations(t, selfCtx, deviceStub, []device.Association{
Robert Kroeger362ff892014-09-29 14:23:47 -07001325 {
1326 "root/self",
1327 "alice_other_account",
1328 },
1329 {
1330 "root/other",
1331 "alice_other_account",
1332 },
1333 })
1334
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001335 if err := deviceStub.AssociateAccount(selfCtx, []string{"root/other"}, ""); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001336 t.Fatalf("AssociateAccount failed %v", err)
1337 }
1338 vlog.VI(2).Info("Verify that we can remove an association.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001339 listAndVerifyAssociations(t, selfCtx, deviceStub, []device.Association{
Robert Kroeger362ff892014-09-29 14:23:47 -07001340 {
1341 "root/self",
1342 "alice_other_account",
1343 },
1344 })
1345}
1346
Bogdan Caprita2b219362014-12-09 17:03:33 -08001347// userName is a helper function to determine the system name that the test is
1348// running under.
Robert Kroeger362ff892014-09-29 14:23:47 -07001349func userName(t *testing.T) string {
1350 u, err := user.Current()
1351 if err != nil {
1352 t.Fatalf("user.Current() failed: %v", err)
1353 }
1354 return u.Username
1355}
1356
1357func TestAppWithSuidHelper(t *testing.T) {
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001358 ctx, shutdown := veyron2.Init()
1359 defer shutdown()
1360 veyron2.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
1361
1362 sh, deferFn := mgmttest.CreateShellAndMountTable(t, ctx, nil)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001363 defer deferFn()
1364
1365 // Set up mock application and binary repositories.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001366 envelope, cleanup := startMockRepos(t, ctx)
Robert Kroeger362ff892014-09-29 14:23:47 -07001367 defer cleanup()
Robert Kroeger362ff892014-09-29 14:23:47 -07001368
Robert Kroegerd6e1d1a2014-12-10 15:08:45 -08001369 root, cleanup := mgmttest.SetupRootDir(t, "devicemanager")
Robert Kroeger362ff892014-09-29 14:23:47 -07001370 defer cleanup()
1371
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001372 // The two "processes"/runtimes which will act as IPC clients to
1373 // the devicemanager process.
1374 selfCtx := ctx
1375 otherCtx, err := veyron2.SetPrincipal(ctx, tsecurity.NewPrincipal())
1376 if err != nil {
1377 t.Fatalf("Could not create other principal: %v", err)
1378 }
Robert Kroeger362ff892014-09-29 14:23:47 -07001379
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001380 // By default, selfCtx and otherCtx will have blessings generated based
1381 // on the username/machine name running this process. Since these
1382 // blessings can appear in debugging output, give them recognizable
1383 // names.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001384 idp := tsecurity.NewIDProvider("root")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001385 if err := idp.Bless(veyron2.GetPrincipal(selfCtx), "self"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001386 t.Fatal(err)
1387 }
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001388 if err := idp.Bless(veyron2.GetPrincipal(otherCtx), "other"); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001389 t.Fatal(err)
1390 }
1391
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001392 crDir, crEnv := mgmttest.CredentialsForChild(ctx, "devicemanager")
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001393 defer os.RemoveAll(crDir)
1394
Bogdan Caprita2b219362014-12-09 17:03:33 -08001395 // Create a script wrapping the test target that implements suidhelper.
Bogdan Caprita962d5e02014-10-28 18:36:09 -07001396 helperPath := generateSuidHelperScript(t, root)
Robert Kroeger362ff892014-09-29 14:23:47 -07001397
Robert Kroegerebfb62a2014-12-10 14:42:09 -08001398 _, dms := mgmttest.RunShellCommand(t, sh, crEnv, deviceManagerCmd, "-mocksetuid", "dm", root, helperPath, "unused_app_repo_name", "unused_curr_link")
1399 pid := mgmttest.ReadPID(t, dms)
Cosmos Nicolaouad2793f2014-10-27 16:24:15 -07001400 defer syscall.Kill(pid, syscall.SIGINT)
Robert Kroeger362ff892014-09-29 14:23:47 -07001401
Bogdan Caprita9c4aa222014-12-10 14:46:30 -08001402 deviceStub := device.DeviceClient("dm//device")
Robert Kroeger362ff892014-09-29 14:23:47 -07001403
Bogdan Caprita2b219362014-12-09 17:03:33 -08001404 // Create the local server that the app uses to tell us which system
1405 // name the device manager wished to run it as.
Matt Rosencrantzfa3082c2015-01-22 21:39:04 -08001406 pingCh, cleanup := setupPingServer(t, ctx)
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001407 defer cleanup()
Robert Kroeger362ff892014-09-29 14:23:47 -07001408
Bogdan Caprita26929102014-11-07 11:56:56 -08001409 // Create an envelope for a first version of the app.
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001410 *envelope = envelopeFromShell(sh, []string{testEnvVarName + "=env-var"}, appCmd, "google naps", fmt.Sprintf("--%s=flag-val-envelope", testFlagName), "appV1")
Robert Kroeger362ff892014-09-29 14:23:47 -07001411
1412 // Install and start the app as root/self.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001413 appID := installApp(t, selfCtx)
Robert Kroeger362ff892014-09-29 14:23:47 -07001414
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001415 // Claim the devicemanager with selfCtx as root/self/alice
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001416 if err := deviceStub.Claim(selfCtx, &granter{p: veyron2.GetPrincipal(selfCtx), extension: "alice"}); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001417 t.Fatal(err)
1418 }
1419
Bogdan Caprita2b219362014-12-09 17:03:33 -08001420 // Start an instance of the app but this time it should fail: we do not
1421 // have an associated uname for the invoking identity.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001422 startAppExpectError(t, selfCtx, appID, verror.NoAccess.ID)
Robert Kroeger362ff892014-09-29 14:23:47 -07001423
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001424 // Create an association for selfCtx
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001425 if err := deviceStub.AssociateAccount(selfCtx, []string{"root/self"}, testUserName); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001426 t.Fatalf("AssociateAccount failed %v", err)
1427 }
1428
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001429 instance1ID := startApp(t, selfCtx, appID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001430 verifyPingArgs(t, pingCh, testUserName, "flag-val-envelope", "env-var") // Wait until the app pings us that it's ready.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001431 stopApp(t, selfCtx, appID, instance1ID)
Robert Kroeger362ff892014-09-29 14:23:47 -07001432
1433 vlog.VI(2).Infof("other attempting to run an app without access. Should fail.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001434 startAppExpectError(t, otherCtx, appID, verror.NoAccess.ID)
Robert Kroeger362ff892014-09-29 14:23:47 -07001435
Robert Kroegeracc778b2014-11-03 17:17:21 -08001436 // Self will now let other also install apps.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001437 if err := deviceStub.AssociateAccount(selfCtx, []string{"root/other"}, testUserName); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001438 t.Fatalf("AssociateAccount failed %v", err)
1439 }
1440 // Add Start to the ACL list for root/other.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001441 newACL, _, err := deviceStub.GetACL(selfCtx)
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001442 if err != nil {
1443 t.Fatalf("GetACL failed %v", err)
1444 }
Asim Shankar68885192014-11-26 12:48:35 -08001445 newACL.Add("root/other", string(access.Write))
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001446 if err := deviceStub.SetACL(selfCtx, newACL, ""); err != nil {
Robert Kroeger362ff892014-09-29 14:23:47 -07001447 t.Fatalf("SetACL failed %v", err)
1448 }
1449
Bogdan Caprita2b219362014-12-09 17:03:33 -08001450 // With the introduction of per installation and per instance ACLs,
1451 // while other now has administrator permissions on the device manager,
1452 // other doesn't have execution permissions for the app. So this will
1453 // fail.
Robert Kroegeracc778b2014-11-03 17:17:21 -08001454 vlog.VI(2).Infof("other attempting to run an app still without access. Should fail.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001455 startAppExpectError(t, otherCtx, appID, verror.NoAccess.ID)
Robert Kroegeracc778b2014-11-03 17:17:21 -08001456
1457 // But self can give other permissions to start applications.
1458 vlog.VI(2).Infof("self attempting to give other permission to start %s", appID)
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001459 newACL, _, err = appStub(appID).GetACL(selfCtx)
Robert Kroegeracc778b2014-11-03 17:17:21 -08001460 if err != nil {
1461 t.Fatalf("GetACL on appID: %v failed %v", appID, err)
1462 }
Asim Shankar68885192014-11-26 12:48:35 -08001463 newACL.Add("root/other", string(access.Read))
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001464 if err = appStub(appID).SetACL(selfCtx, newACL, ""); err != nil {
Robert Kroegeracc778b2014-11-03 17:17:21 -08001465 t.Fatalf("SetACL on appID: %v failed: %v", appID, err)
1466 }
1467
Robert Kroeger362ff892014-09-29 14:23:47 -07001468 vlog.VI(2).Infof("other attempting to run an app with access. Should succeed.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001469 instance2ID := startApp(t, otherCtx, appID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001470 verifyPingArgs(t, pingCh, testUserName, "flag-val-envelope", "env-var") // Wait until the app pings us that it's ready.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001471 suspendApp(t, otherCtx, appID, instance2ID)
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001472
1473 vlog.VI(2).Infof("Verify that Resume with the same systemName works.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001474 resumeApp(t, otherCtx, appID, instance2ID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001475 verifyPingArgs(t, pingCh, testUserName, "flag-val-envelope", "env-var") // Wait until the app pings us that it's ready.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001476 suspendApp(t, otherCtx, appID, instance2ID)
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001477
Robert Kroegeracc778b2014-11-03 17:17:21 -08001478 vlog.VI(2).Infof("Verify that other can install and run applications.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001479 otherAppID := installApp(t, otherCtx)
Robert Kroegeracc778b2014-11-03 17:17:21 -08001480
1481 vlog.VI(2).Infof("other attempting to run an app that other installed. Should succeed.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001482 instance4ID := startApp(t, otherCtx, otherAppID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001483 verifyPingArgs(t, pingCh, testUserName, "flag-val-envelope", "env-var") // Wait until the app pings us that it's ready.
Robert Kroegeracc778b2014-11-03 17:17:21 -08001484
1485 // Clean up.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001486 stopApp(t, otherCtx, otherAppID, instance4ID)
Robert Kroegeracc778b2014-11-03 17:17:21 -08001487
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001488 // Change the associated system name.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001489 if err := deviceStub.AssociateAccount(selfCtx, []string{"root/other"}, anotherTestUserName); err != nil {
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001490 t.Fatalf("AssociateAccount failed %v", err)
1491 }
1492
1493 vlog.VI(2).Infof("Show that Resume with a different systemName fails.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001494 resumeAppExpectError(t, otherCtx, appID, instance2ID, verror.NoAccess.ID)
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001495
1496 // Clean up.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001497 stopApp(t, otherCtx, appID, instance2ID)
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001498
1499 vlog.VI(2).Infof("Show that Start with different systemName works.")
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001500 instance3ID := startApp(t, otherCtx, appID)
Bogdan Caprita17666dd2015-01-14 09:27:46 -08001501 verifyPingArgs(t, pingCh, anotherTestUserName, "flag-val-envelope", "env-var") // Wait until the app pings us that it's ready.
Robert Kroeger1ce0bd72014-10-22 13:57:14 -07001502
1503 // Clean up.
Matt Rosencrantzf1c3b442015-01-12 17:53:08 -08001504 stopApp(t, otherCtx, appID, instance3ID)
Robert Kroeger362ff892014-09-29 14:23:47 -07001505}