blob: bc52b83e66edb22bc508e13b6c0a68ad9aa9323c [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
adlr@google.com3defe6a2009-12-04 20:57:17 +000016
Alex Deymo39910dc2015-11-09 17:04:30 -080017#include "update_engine/common/subprocess.h"
Alex Deymoaab50e32014-11-10 19:55:35 -080018
Alex Deymo5d527802014-07-18 14:24:13 -070019#include <fcntl.h>
Gilad Arnoldb6c562a2013-07-01 02:19:26 -070020#include <poll.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000021#include <sys/types.h>
22#include <unistd.h>
Gilad Arnold8e3f1262013-01-08 14:59:54 -080023
Alex Deymo461b2592015-07-24 20:10:52 -070024#include <set>
adlr@google.com3defe6a2009-12-04 20:57:17 +000025#include <string>
26#include <vector>
Gilad Arnold8e3f1262013-01-08 14:59:54 -080027
Alex Deymo60ca1a72015-06-18 18:19:15 -070028#include <base/bind.h>
Alex Deymo279bbab2016-02-12 16:26:17 -080029#include <base/files/scoped_temp_dir.h>
Alex Deymo60ca1a72015-06-18 18:19:15 -070030#include <base/location.h>
Alex Deymo0b3db6b2015-08-10 15:19:37 -070031#include <base/message_loop/message_loop.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070032#include <base/strings/string_util.h>
33#include <base/strings/stringprintf.h>
34#include <base/time/time.h>
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070035#include <brillo/message_loops/base_message_loop.h>
36#include <brillo/message_loops/message_loop.h>
37#include <brillo/message_loops/message_loop_utils.h>
38#include <brillo/strings/string_utils.h>
Alex Deymoe384bb22016-03-29 17:23:33 -070039#include <brillo/unittest_utils.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000040#include <gtest/gtest.h>
Gilad Arnold8e3f1262013-01-08 14:59:54 -080041
Alex Deymo39910dc2015-11-09 17:04:30 -080042#include "update_engine/common/test_utils.h"
43#include "update_engine/common/utils.h"
adlr@google.com3defe6a2009-12-04 20:57:17 +000044
Gilad Arnold8e3f1262013-01-08 14:59:54 -080045using base::TimeDelta;
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070046using brillo::MessageLoop;
adlr@google.com3defe6a2009-12-04 20:57:17 +000047using std::string;
Qijiang Fan6955bcc2019-11-19 20:33:43 +090048using std::unique_ptr;
adlr@google.com3defe6a2009-12-04 20:57:17 +000049using std::vector;
50
Alex Deymo279bbab2016-02-12 16:26:17 -080051namespace {
52
53#ifdef __ANDROID__
54#define kBinPath "/system/bin"
55#define kUsrBinPath "/system/bin"
56#else
57#define kBinPath "/bin"
58#define kUsrBinPath "/usr/bin"
59#endif // __ANDROID__
60
61} // namespace
62
adlr@google.com3defe6a2009-12-04 20:57:17 +000063namespace chromeos_update_engine {
64
65class SubprocessTest : public ::testing::Test {
66 protected:
Alex Deymo60ca1a72015-06-18 18:19:15 -070067 void SetUp() override {
68 loop_.SetAsCurrent();
Alex Deymob7ca0962014-10-01 17:58:07 -070069 async_signal_handler_.Init();
70 subprocess_.Init(&async_signal_handler_);
Alex Deymo60ca1a72015-06-18 18:19:15 -070071 }
72
Alex Deymo0b3db6b2015-08-10 15:19:37 -070073 base::MessageLoopForIO base_loop_;
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070074 brillo::BaseMessageLoop loop_{&base_loop_};
75 brillo::AsynchronousSignalHandler async_signal_handler_;
Alex Deymo461b2592015-07-24 20:10:52 -070076 Subprocess subprocess_;
Tianjie55abd3c2020-06-19 00:22:59 -070077#ifndef __ANDROID__
Qijiang Fan6955bcc2019-11-19 20:33:43 +090078 unique_ptr<base::FileDescriptorWatcher::Controller> watcher_;
Tianjie55abd3c2020-06-19 00:22:59 -070079#endif // __ANDROID__
80
adlr@google.com3defe6a2009-12-04 20:57:17 +000081};
82
83namespace {
Alex Deymo461b2592015-07-24 20:10:52 -070084
Amin Hassanib2689592019-01-13 17:04:28 -080085void ExpectedResults(int expected_return_code,
86 const string& expected_output,
87 int return_code,
88 const string& output) {
Alex Deymo461b2592015-07-24 20:10:52 -070089 EXPECT_EQ(expected_return_code, return_code);
90 EXPECT_EQ(expected_output, output);
Alex Deymo60ca1a72015-06-18 18:19:15 -070091 MessageLoop::current()->BreakLoop();
adlr@google.com3defe6a2009-12-04 20:57:17 +000092}
93
Alex Deymo461b2592015-07-24 20:10:52 -070094void ExpectedEnvVars(int return_code, const string& output) {
Darin Petkov6f03a3b2010-11-10 14:27:14 -080095 EXPECT_EQ(0, return_code);
Alex Deymo461b2592015-07-24 20:10:52 -070096 const std::set<string> allowed_envs = {"LD_LIBRARY_PATH", "PATH"};
Chih-Hung Hsieh5c6bb1d2016-07-27 13:33:15 -070097 for (const string& key_value : brillo::string_utils::Split(output, "\n")) {
Amin Hassanib2689592019-01-13 17:04:28 -080098 auto key_value_pair =
99 brillo::string_utils::SplitAtFirst(key_value, "=", true);
Alex Deymo461b2592015-07-24 20:10:52 -0700100 EXPECT_NE(allowed_envs.end(), allowed_envs.find(key_value_pair.first));
101 }
Alex Deymo29b81532015-07-09 11:51:49 -0700102 MessageLoop::current()->BreakLoop();
103}
104
Alex Deymoe384bb22016-03-29 17:23:33 -0700105void ExpectedDataOnPipe(const Subprocess* subprocess,
106 pid_t* pid,
107 int child_fd,
108 const string& child_fd_data,
109 int expected_return_code,
110 int return_code,
111 const string& /* output */) {
112 EXPECT_EQ(expected_return_code, return_code);
113
114 // Verify that we can read the data from our end of |child_fd|.
115 int fd = subprocess->GetPipeFd(*pid, child_fd);
116 EXPECT_NE(-1, fd);
117 vector<char> buf(child_fd_data.size() + 1);
118 EXPECT_EQ(static_cast<ssize_t>(child_fd_data.size()),
119 HANDLE_EINTR(read(fd, buf.data(), buf.size())));
120 EXPECT_EQ(child_fd_data,
121 string(buf.begin(), buf.begin() + child_fd_data.size()));
122
123 MessageLoop::current()->BreakLoop();
124}
125
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700126} // namespace
adlr@google.com3defe6a2009-12-04 20:57:17 +0000127
Alex Deymo461b2592015-07-24 20:10:52 -0700128TEST_F(SubprocessTest, IsASingleton) {
129 EXPECT_EQ(&subprocess_, &Subprocess::Get());
130}
131
132TEST_F(SubprocessTest, InactiveInstancesDontChangeTheSingleton) {
133 std::unique_ptr<Subprocess> another_subprocess(new Subprocess());
134 EXPECT_EQ(&subprocess_, &Subprocess::Get());
135 another_subprocess.reset();
136 EXPECT_EQ(&subprocess_, &Subprocess::Get());
137}
138
Alex Deymo60ca1a72015-06-18 18:19:15 -0700139TEST_F(SubprocessTest, SimpleTest) {
Alex Deymo279bbab2016-02-12 16:26:17 -0800140 EXPECT_TRUE(subprocess_.Exec({kBinPath "/false"},
Alex Deymo461b2592015-07-24 20:10:52 -0700141 base::Bind(&ExpectedResults, 1, "")));
Alex Deymo60ca1a72015-06-18 18:19:15 -0700142 loop_.Run();
adlr@google.com3defe6a2009-12-04 20:57:17 +0000143}
144
Alex Deymo60ca1a72015-06-18 18:19:15 -0700145TEST_F(SubprocessTest, EchoTest) {
Alex Deymo461b2592015-07-24 20:10:52 -0700146 EXPECT_TRUE(subprocess_.Exec(
Alex Deymo279bbab2016-02-12 16:26:17 -0800147 {kBinPath "/sh", "-c", "echo this is stdout; echo this is stderr >&2"},
Alex Deymo461b2592015-07-24 20:10:52 -0700148 base::Bind(&ExpectedResults, 0, "this is stdout\nthis is stderr\n")));
Alex Deymo29b81532015-07-09 11:51:49 -0700149 loop_.Run();
150}
151
152TEST_F(SubprocessTest, StderrNotIncludedInOutputTest) {
Alex Deymo461b2592015-07-24 20:10:52 -0700153 EXPECT_TRUE(subprocess_.ExecFlags(
Alex Deymo279bbab2016-02-12 16:26:17 -0800154 {kBinPath "/sh", "-c", "echo on stdout; echo on stderr >&2"},
Alex Deymo461b2592015-07-24 20:10:52 -0700155 0,
Alex Deymoe384bb22016-03-29 17:23:33 -0700156 {},
Alex Deymo461b2592015-07-24 20:10:52 -0700157 base::Bind(&ExpectedResults, 0, "on stdout\n")));
Alex Deymo60ca1a72015-06-18 18:19:15 -0700158 loop_.Run();
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800159}
160
Alex Deymoe384bb22016-03-29 17:23:33 -0700161TEST_F(SubprocessTest, PipeRedirectFdTest) {
162 pid_t pid;
163 pid = subprocess_.ExecFlags(
164 {kBinPath "/sh", "-c", "echo on pipe >&3"},
165 0,
166 {3},
167 base::Bind(&ExpectedDataOnPipe, &subprocess_, &pid, 3, "on pipe\n", 0));
168 EXPECT_NE(0, pid);
169
170 // Wrong file descriptor values should return -1.
171 EXPECT_EQ(-1, subprocess_.GetPipeFd(pid, 123));
172 loop_.Run();
173 // Calling GetPipeFd() after the callback runs is invalid.
174 EXPECT_EQ(-1, subprocess_.GetPipeFd(pid, 3));
175}
176
177// Test that a pipe file descriptor open in the parent is not open in the child.
178TEST_F(SubprocessTest, PipeClosedWhenNotRedirectedTest) {
179 brillo::ScopedPipe pipe;
Alex Deymo279d5722016-04-07 16:22:13 -0700180
181 // test_subprocess will return with the errno of fstat, which should be EBADF
182 // if the passed file descriptor is closed in the child.
183 const vector<string> cmd = {
184 test_utils::GetBuildArtifactsPath("test_subprocess"),
185 "fstat",
186 std::to_string(pipe.writer)};
Alex Deymoe384bb22016-03-29 17:23:33 -0700187 EXPECT_TRUE(subprocess_.ExecFlags(
Alex Deymo279d5722016-04-07 16:22:13 -0700188 cmd, 0, {}, base::Bind(&ExpectedResults, EBADF, "")));
Alex Deymoe384bb22016-03-29 17:23:33 -0700189 loop_.Run();
190}
191
Alex Deymo461b2592015-07-24 20:10:52 -0700192TEST_F(SubprocessTest, EnvVarsAreFiltered) {
Alex Deymo279bbab2016-02-12 16:26:17 -0800193 EXPECT_TRUE(
194 subprocess_.Exec({kUsrBinPath "/env"}, base::Bind(&ExpectedEnvVars)));
Alex Deymo461b2592015-07-24 20:10:52 -0700195 loop_.Run();
196}
197
198TEST_F(SubprocessTest, SynchronousTrueSearchsOnPath) {
199 int rc = -1;
200 EXPECT_TRUE(Subprocess::SynchronousExecFlags(
Amin Hassani3a4caa12019-11-06 11:12:28 -0800201 {"true"}, Subprocess::kSearchPath, &rc, nullptr, nullptr));
Alex Deymo461b2592015-07-24 20:10:52 -0700202 EXPECT_EQ(0, rc);
203}
204
Alex Deymo60ca1a72015-06-18 18:19:15 -0700205TEST_F(SubprocessTest, SynchronousEchoTest) {
206 vector<string> cmd = {
Amin Hassanib2689592019-01-13 17:04:28 -0800207 kBinPath "/sh", "-c", "echo -n stdout-here; echo -n stderr-there >&2"};
Darin Petkov85d02b72011-05-17 13:25:51 -0700208 int rc = -1;
Amin Hassani3a4caa12019-11-06 11:12:28 -0800209 string stdout, stderr;
210 ASSERT_TRUE(Subprocess::SynchronousExec(cmd, &rc, &stdout, &stderr));
Darin Petkov85d02b72011-05-17 13:25:51 -0700211 EXPECT_EQ(0, rc);
Amin Hassani3a4caa12019-11-06 11:12:28 -0800212 EXPECT_EQ("stdout-here", stdout);
213 EXPECT_EQ("stderr-there", stderr);
Darin Petkov85d02b72011-05-17 13:25:51 -0700214}
215
Alex Deymo60ca1a72015-06-18 18:19:15 -0700216TEST_F(SubprocessTest, SynchronousEchoNoOutputTest) {
Darin Petkov85d02b72011-05-17 13:25:51 -0700217 int rc = -1;
Alex Deymo461b2592015-07-24 20:10:52 -0700218 ASSERT_TRUE(Subprocess::SynchronousExec(
Amin Hassani3a4caa12019-11-06 11:12:28 -0800219 {kBinPath "/sh", "-c", "echo test"}, &rc, nullptr, nullptr));
Darin Petkov85d02b72011-05-17 13:25:51 -0700220 EXPECT_EQ(0, rc);
221}
222
adlr@google.com3defe6a2009-12-04 20:57:17 +0000223namespace {
Alex Deymo461b2592015-07-24 20:10:52 -0700224void CallbackBad(int return_code, const string& output) {
225 ADD_FAILURE() << "should never be called.";
adlr@google.com3defe6a2009-12-04 20:57:17 +0000226}
Alex Deymo60ca1a72015-06-18 18:19:15 -0700227} // namespace
228
Alex Deymo279bbab2016-02-12 16:26:17 -0800229// Test that you can cancel a program that's already running.
Alex Deymo60ca1a72015-06-18 18:19:15 -0700230TEST_F(SubprocessTest, CancelTest) {
Alex Deymo279bbab2016-02-12 16:26:17 -0800231 base::ScopedTempDir tempdir;
232 ASSERT_TRUE(tempdir.CreateUniqueTempDir());
Hidehiko Abe2b9d2412017-12-13 18:56:18 +0900233 string fifo_path = tempdir.GetPath().Append("fifo").value();
Alex Deymo279bbab2016-02-12 16:26:17 -0800234 EXPECT_EQ(0, mkfifo(fifo_path.c_str(), 0666));
235
236 // Start a process, make sure it is running and try to cancel it. We write
237 // two bytes to the fifo, the first one marks that the program is running and
238 // the second one marks that the process waited for a timeout and was not
239 // killed. We should read the first byte but not the second one.
240 vector<string> cmd = {
241 kBinPath "/sh",
242 "-c",
243 base::StringPrintf(
Ben Chan70a21192017-01-10 19:56:50 -0800244 // The 'sleep' launched below could be left behind as an orphaned
245 // process when the 'sh' process is terminated by SIGTERM. As a
246 // remedy, trap SIGTERM and kill the 'sleep' process, which requires
247 // launching 'sleep' in background and then waiting for it.
248 "cleanup() { kill \"${sleep_pid}\"; exit 0; }; "
249 "trap cleanup TERM; "
250 "sleep 60 & "
251 "sleep_pid=$!; "
252 "printf X >\"%s\"; "
253 "wait; "
254 "printf Y >\"%s\"; "
255 "exit 1",
Alex Deymo279bbab2016-02-12 16:26:17 -0800256 fifo_path.c_str(),
257 fifo_path.c_str())};
258 uint32_t tag = Subprocess::Get().Exec(cmd, base::Bind(&CallbackBad));
259 EXPECT_NE(0U, tag);
260
261 int fifo_fd = HANDLE_EINTR(open(fifo_path.c_str(), O_RDONLY));
262 EXPECT_GE(fifo_fd, 0);
263
Tianjie55abd3c2020-06-19 00:22:59 -0700264#ifdef __ANDROID__
Alex Deymo279bbab2016-02-12 16:26:17 -0800265 loop_.WatchFileDescriptor(FROM_HERE,
266 fifo_fd,
267 MessageLoop::WatchMode::kWatchRead,
268 false,
Amin Hassanib2689592019-01-13 17:04:28 -0800269 base::Bind(
270 [](int fifo_fd, uint32_t tag) {
271 char c;
272 EXPECT_EQ(1,
273 HANDLE_EINTR(read(fifo_fd, &c, 1)));
274 EXPECT_EQ('X', c);
275 LOG(INFO) << "Killing tag " << tag;
276 Subprocess::Get().KillExec(tag);
277 },
278 fifo_fd,
279 tag));
Tianjie55abd3c2020-06-19 00:22:59 -0700280#else
Qijiang Fan6955bcc2019-11-19 20:33:43 +0900281 watcher_ = base::FileDescriptorWatcher::WatchReadable(
282 fifo_fd,
283 base::Bind(
284 [](unique_ptr<base::FileDescriptorWatcher::Controller>* watcher,
285 int fifo_fd,
286 uint32_t tag) {
287 char c;
288 EXPECT_EQ(1, HANDLE_EINTR(read(fifo_fd, &c, 1)));
289 EXPECT_EQ('X', c);
290 LOG(INFO) << "Killing tag " << tag;
291 Subprocess::Get().KillExec(tag);
292 *watcher = nullptr;
293 },
294 // watcher_ is no longer used outside the clousure.
295 base::Unretained(&watcher_),
296 fifo_fd,
297 tag));
Tianjie55abd3c2020-06-19 00:22:59 -0700298#endif // __ANDROID__
Alex Deymo279bbab2016-02-12 16:26:17 -0800299
Alex Deymo60ca1a72015-06-18 18:19:15 -0700300 // This test would leak a callback that runs when the child process exits
301 // unless we wait for it to run.
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700302 brillo::MessageLoopRunUntil(
Amin Hassanib2689592019-01-13 17:04:28 -0800303 &loop_, TimeDelta::FromSeconds(120), base::Bind([] {
304 return Subprocess::Get().subprocess_records_.empty();
305 }));
Alex Deymo279bbab2016-02-12 16:26:17 -0800306 EXPECT_TRUE(Subprocess::Get().subprocess_records_.empty());
307 // Check that there isn't anything else to read from the pipe.
308 char c;
309 EXPECT_EQ(0, HANDLE_EINTR(read(fifo_fd, &c, 1)));
310 IGNORE_EINTR(close(fifo_fd));
adlr@google.com3defe6a2009-12-04 20:57:17 +0000311}
312
313} // namespace chromeos_update_engine