blob: 19b24f457c0824dbb0620c2057d25581251fb6cb [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
adlr@google.com3defe6a2009-12-04 20:57:17 +000016
Alex Deymo39910dc2015-11-09 17:04:30 -080017#include "update_engine/common/subprocess.h"
Alex Deymoaab50e32014-11-10 19:55:35 -080018
Alex Deymo5d527802014-07-18 14:24:13 -070019#include <fcntl.h>
Gilad Arnoldb6c562a2013-07-01 02:19:26 -070020#include <poll.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000021#include <sys/types.h>
22#include <unistd.h>
Gilad Arnold8e3f1262013-01-08 14:59:54 -080023
Alex Deymo461b2592015-07-24 20:10:52 -070024#include <set>
adlr@google.com3defe6a2009-12-04 20:57:17 +000025#include <string>
26#include <vector>
Gilad Arnold8e3f1262013-01-08 14:59:54 -080027
Alex Deymo60ca1a72015-06-18 18:19:15 -070028#include <base/bind.h>
Alex Deymo279bbab2016-02-12 16:26:17 -080029#include <base/files/scoped_temp_dir.h>
Alex Deymo60ca1a72015-06-18 18:19:15 -070030#include <base/location.h>
Alex Deymo0b3db6b2015-08-10 15:19:37 -070031#include <base/message_loop/message_loop.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070032#include <base/strings/string_util.h>
33#include <base/strings/stringprintf.h>
34#include <base/time/time.h>
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070035#include <brillo/message_loops/base_message_loop.h>
36#include <brillo/message_loops/message_loop.h>
37#include <brillo/message_loops/message_loop_utils.h>
38#include <brillo/strings/string_utils.h>
Alex Deymoe384bb22016-03-29 17:23:33 -070039#include <brillo/unittest_utils.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000040#include <gtest/gtest.h>
Gilad Arnold8e3f1262013-01-08 14:59:54 -080041
Alex Deymo39910dc2015-11-09 17:04:30 -080042#include "update_engine/common/test_utils.h"
43#include "update_engine/common/utils.h"
adlr@google.com3defe6a2009-12-04 20:57:17 +000044
Gilad Arnold8e3f1262013-01-08 14:59:54 -080045using base::TimeDelta;
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070046using brillo::MessageLoop;
adlr@google.com3defe6a2009-12-04 20:57:17 +000047using std::string;
Qijiang Fan6955bcc2019-11-19 20:33:43 +090048using std::unique_ptr;
adlr@google.com3defe6a2009-12-04 20:57:17 +000049using std::vector;
50
Alex Deymo279bbab2016-02-12 16:26:17 -080051namespace {
52
53#ifdef __ANDROID__
54#define kBinPath "/system/bin"
55#define kUsrBinPath "/system/bin"
56#else
57#define kBinPath "/bin"
58#define kUsrBinPath "/usr/bin"
59#endif // __ANDROID__
60
61} // namespace
62
adlr@google.com3defe6a2009-12-04 20:57:17 +000063namespace chromeos_update_engine {
64
65class SubprocessTest : public ::testing::Test {
66 protected:
Alex Deymo60ca1a72015-06-18 18:19:15 -070067 void SetUp() override {
68 loop_.SetAsCurrent();
Alex Deymob7ca0962014-10-01 17:58:07 -070069 async_signal_handler_.Init();
70 subprocess_.Init(&async_signal_handler_);
Alex Deymo60ca1a72015-06-18 18:19:15 -070071 }
72
Alex Deymo0b3db6b2015-08-10 15:19:37 -070073 base::MessageLoopForIO base_loop_;
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070074 brillo::BaseMessageLoop loop_{&base_loop_};
75 brillo::AsynchronousSignalHandler async_signal_handler_;
Alex Deymo461b2592015-07-24 20:10:52 -070076 Subprocess subprocess_;
Qijiang Fan6955bcc2019-11-19 20:33:43 +090077 unique_ptr<base::FileDescriptorWatcher::Controller> watcher_;
adlr@google.com3defe6a2009-12-04 20:57:17 +000078};
79
80namespace {
Alex Deymo461b2592015-07-24 20:10:52 -070081
Amin Hassanib2689592019-01-13 17:04:28 -080082void ExpectedResults(int expected_return_code,
83 const string& expected_output,
84 int return_code,
85 const string& output) {
Alex Deymo461b2592015-07-24 20:10:52 -070086 EXPECT_EQ(expected_return_code, return_code);
87 EXPECT_EQ(expected_output, output);
Alex Deymo60ca1a72015-06-18 18:19:15 -070088 MessageLoop::current()->BreakLoop();
adlr@google.com3defe6a2009-12-04 20:57:17 +000089}
90
Alex Deymo461b2592015-07-24 20:10:52 -070091void ExpectedEnvVars(int return_code, const string& output) {
Darin Petkov6f03a3b2010-11-10 14:27:14 -080092 EXPECT_EQ(0, return_code);
Alex Deymo461b2592015-07-24 20:10:52 -070093 const std::set<string> allowed_envs = {"LD_LIBRARY_PATH", "PATH"};
Chih-Hung Hsieh5c6bb1d2016-07-27 13:33:15 -070094 for (const string& key_value : brillo::string_utils::Split(output, "\n")) {
Amin Hassanib2689592019-01-13 17:04:28 -080095 auto key_value_pair =
96 brillo::string_utils::SplitAtFirst(key_value, "=", true);
Alex Deymo461b2592015-07-24 20:10:52 -070097 EXPECT_NE(allowed_envs.end(), allowed_envs.find(key_value_pair.first));
98 }
Alex Deymo29b81532015-07-09 11:51:49 -070099 MessageLoop::current()->BreakLoop();
100}
101
Alex Deymoe384bb22016-03-29 17:23:33 -0700102void ExpectedDataOnPipe(const Subprocess* subprocess,
103 pid_t* pid,
104 int child_fd,
105 const string& child_fd_data,
106 int expected_return_code,
107 int return_code,
108 const string& /* output */) {
109 EXPECT_EQ(expected_return_code, return_code);
110
111 // Verify that we can read the data from our end of |child_fd|.
112 int fd = subprocess->GetPipeFd(*pid, child_fd);
113 EXPECT_NE(-1, fd);
114 vector<char> buf(child_fd_data.size() + 1);
115 EXPECT_EQ(static_cast<ssize_t>(child_fd_data.size()),
116 HANDLE_EINTR(read(fd, buf.data(), buf.size())));
117 EXPECT_EQ(child_fd_data,
118 string(buf.begin(), buf.begin() + child_fd_data.size()));
119
120 MessageLoop::current()->BreakLoop();
121}
122
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700123} // namespace
adlr@google.com3defe6a2009-12-04 20:57:17 +0000124
Alex Deymo461b2592015-07-24 20:10:52 -0700125TEST_F(SubprocessTest, IsASingleton) {
126 EXPECT_EQ(&subprocess_, &Subprocess::Get());
127}
128
129TEST_F(SubprocessTest, InactiveInstancesDontChangeTheSingleton) {
130 std::unique_ptr<Subprocess> another_subprocess(new Subprocess());
131 EXPECT_EQ(&subprocess_, &Subprocess::Get());
132 another_subprocess.reset();
133 EXPECT_EQ(&subprocess_, &Subprocess::Get());
134}
135
Alex Deymo60ca1a72015-06-18 18:19:15 -0700136TEST_F(SubprocessTest, SimpleTest) {
Alex Deymo279bbab2016-02-12 16:26:17 -0800137 EXPECT_TRUE(subprocess_.Exec({kBinPath "/false"},
Alex Deymo461b2592015-07-24 20:10:52 -0700138 base::Bind(&ExpectedResults, 1, "")));
Alex Deymo60ca1a72015-06-18 18:19:15 -0700139 loop_.Run();
adlr@google.com3defe6a2009-12-04 20:57:17 +0000140}
141
Alex Deymo60ca1a72015-06-18 18:19:15 -0700142TEST_F(SubprocessTest, EchoTest) {
Alex Deymo461b2592015-07-24 20:10:52 -0700143 EXPECT_TRUE(subprocess_.Exec(
Alex Deymo279bbab2016-02-12 16:26:17 -0800144 {kBinPath "/sh", "-c", "echo this is stdout; echo this is stderr >&2"},
Alex Deymo461b2592015-07-24 20:10:52 -0700145 base::Bind(&ExpectedResults, 0, "this is stdout\nthis is stderr\n")));
Alex Deymo29b81532015-07-09 11:51:49 -0700146 loop_.Run();
147}
148
149TEST_F(SubprocessTest, StderrNotIncludedInOutputTest) {
Alex Deymo461b2592015-07-24 20:10:52 -0700150 EXPECT_TRUE(subprocess_.ExecFlags(
Alex Deymo279bbab2016-02-12 16:26:17 -0800151 {kBinPath "/sh", "-c", "echo on stdout; echo on stderr >&2"},
Alex Deymo461b2592015-07-24 20:10:52 -0700152 0,
Alex Deymoe384bb22016-03-29 17:23:33 -0700153 {},
Alex Deymo461b2592015-07-24 20:10:52 -0700154 base::Bind(&ExpectedResults, 0, "on stdout\n")));
Alex Deymo60ca1a72015-06-18 18:19:15 -0700155 loop_.Run();
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800156}
157
Alex Deymoe384bb22016-03-29 17:23:33 -0700158TEST_F(SubprocessTest, PipeRedirectFdTest) {
159 pid_t pid;
160 pid = subprocess_.ExecFlags(
161 {kBinPath "/sh", "-c", "echo on pipe >&3"},
162 0,
163 {3},
164 base::Bind(&ExpectedDataOnPipe, &subprocess_, &pid, 3, "on pipe\n", 0));
165 EXPECT_NE(0, pid);
166
167 // Wrong file descriptor values should return -1.
168 EXPECT_EQ(-1, subprocess_.GetPipeFd(pid, 123));
169 loop_.Run();
170 // Calling GetPipeFd() after the callback runs is invalid.
171 EXPECT_EQ(-1, subprocess_.GetPipeFd(pid, 3));
172}
173
174// Test that a pipe file descriptor open in the parent is not open in the child.
175TEST_F(SubprocessTest, PipeClosedWhenNotRedirectedTest) {
176 brillo::ScopedPipe pipe;
Alex Deymo279d5722016-04-07 16:22:13 -0700177
178 // test_subprocess will return with the errno of fstat, which should be EBADF
179 // if the passed file descriptor is closed in the child.
180 const vector<string> cmd = {
181 test_utils::GetBuildArtifactsPath("test_subprocess"),
182 "fstat",
183 std::to_string(pipe.writer)};
Alex Deymoe384bb22016-03-29 17:23:33 -0700184 EXPECT_TRUE(subprocess_.ExecFlags(
Alex Deymo279d5722016-04-07 16:22:13 -0700185 cmd, 0, {}, base::Bind(&ExpectedResults, EBADF, "")));
Alex Deymoe384bb22016-03-29 17:23:33 -0700186 loop_.Run();
187}
188
Alex Deymo461b2592015-07-24 20:10:52 -0700189TEST_F(SubprocessTest, EnvVarsAreFiltered) {
Alex Deymo279bbab2016-02-12 16:26:17 -0800190 EXPECT_TRUE(
191 subprocess_.Exec({kUsrBinPath "/env"}, base::Bind(&ExpectedEnvVars)));
Alex Deymo461b2592015-07-24 20:10:52 -0700192 loop_.Run();
193}
194
195TEST_F(SubprocessTest, SynchronousTrueSearchsOnPath) {
196 int rc = -1;
197 EXPECT_TRUE(Subprocess::SynchronousExecFlags(
Amin Hassani3a4caa12019-11-06 11:12:28 -0800198 {"true"}, Subprocess::kSearchPath, &rc, nullptr, nullptr));
Alex Deymo461b2592015-07-24 20:10:52 -0700199 EXPECT_EQ(0, rc);
200}
201
Alex Deymo60ca1a72015-06-18 18:19:15 -0700202TEST_F(SubprocessTest, SynchronousEchoTest) {
203 vector<string> cmd = {
Amin Hassanib2689592019-01-13 17:04:28 -0800204 kBinPath "/sh", "-c", "echo -n stdout-here; echo -n stderr-there >&2"};
Darin Petkov85d02b72011-05-17 13:25:51 -0700205 int rc = -1;
Amin Hassani3a4caa12019-11-06 11:12:28 -0800206 string stdout, stderr;
207 ASSERT_TRUE(Subprocess::SynchronousExec(cmd, &rc, &stdout, &stderr));
Darin Petkov85d02b72011-05-17 13:25:51 -0700208 EXPECT_EQ(0, rc);
Amin Hassani3a4caa12019-11-06 11:12:28 -0800209 EXPECT_EQ("stdout-here", stdout);
210 EXPECT_EQ("stderr-there", stderr);
Darin Petkov85d02b72011-05-17 13:25:51 -0700211}
212
Alex Deymo60ca1a72015-06-18 18:19:15 -0700213TEST_F(SubprocessTest, SynchronousEchoNoOutputTest) {
Darin Petkov85d02b72011-05-17 13:25:51 -0700214 int rc = -1;
Alex Deymo461b2592015-07-24 20:10:52 -0700215 ASSERT_TRUE(Subprocess::SynchronousExec(
Amin Hassani3a4caa12019-11-06 11:12:28 -0800216 {kBinPath "/sh", "-c", "echo test"}, &rc, nullptr, nullptr));
Darin Petkov85d02b72011-05-17 13:25:51 -0700217 EXPECT_EQ(0, rc);
218}
219
adlr@google.com3defe6a2009-12-04 20:57:17 +0000220namespace {
Alex Deymo461b2592015-07-24 20:10:52 -0700221void CallbackBad(int return_code, const string& output) {
222 ADD_FAILURE() << "should never be called.";
adlr@google.com3defe6a2009-12-04 20:57:17 +0000223}
Alex Deymo60ca1a72015-06-18 18:19:15 -0700224} // namespace
225
Alex Deymo279bbab2016-02-12 16:26:17 -0800226// Test that you can cancel a program that's already running.
Alex Deymo60ca1a72015-06-18 18:19:15 -0700227TEST_F(SubprocessTest, CancelTest) {
Alex Deymo279bbab2016-02-12 16:26:17 -0800228 base::ScopedTempDir tempdir;
229 ASSERT_TRUE(tempdir.CreateUniqueTempDir());
Hidehiko Abe2b9d2412017-12-13 18:56:18 +0900230 string fifo_path = tempdir.GetPath().Append("fifo").value();
Alex Deymo279bbab2016-02-12 16:26:17 -0800231 EXPECT_EQ(0, mkfifo(fifo_path.c_str(), 0666));
232
233 // Start a process, make sure it is running and try to cancel it. We write
234 // two bytes to the fifo, the first one marks that the program is running and
235 // the second one marks that the process waited for a timeout and was not
236 // killed. We should read the first byte but not the second one.
237 vector<string> cmd = {
238 kBinPath "/sh",
239 "-c",
240 base::StringPrintf(
Ben Chan70a21192017-01-10 19:56:50 -0800241 // The 'sleep' launched below could be left behind as an orphaned
242 // process when the 'sh' process is terminated by SIGTERM. As a
243 // remedy, trap SIGTERM and kill the 'sleep' process, which requires
244 // launching 'sleep' in background and then waiting for it.
245 "cleanup() { kill \"${sleep_pid}\"; exit 0; }; "
246 "trap cleanup TERM; "
247 "sleep 60 & "
248 "sleep_pid=$!; "
249 "printf X >\"%s\"; "
250 "wait; "
251 "printf Y >\"%s\"; "
252 "exit 1",
Alex Deymo279bbab2016-02-12 16:26:17 -0800253 fifo_path.c_str(),
254 fifo_path.c_str())};
255 uint32_t tag = Subprocess::Get().Exec(cmd, base::Bind(&CallbackBad));
256 EXPECT_NE(0U, tag);
257
258 int fifo_fd = HANDLE_EINTR(open(fifo_path.c_str(), O_RDONLY));
259 EXPECT_GE(fifo_fd, 0);
260
Qijiang Fan6955bcc2019-11-19 20:33:43 +0900261 watcher_ = base::FileDescriptorWatcher::WatchReadable(
262 fifo_fd,
263 base::Bind(
264 [](unique_ptr<base::FileDescriptorWatcher::Controller>* watcher,
265 int fifo_fd,
266 uint32_t tag) {
267 char c;
268 EXPECT_EQ(1, HANDLE_EINTR(read(fifo_fd, &c, 1)));
269 EXPECT_EQ('X', c);
270 LOG(INFO) << "Killing tag " << tag;
271 Subprocess::Get().KillExec(tag);
272 *watcher = nullptr;
273 },
274 // watcher_ is no longer used outside the clousure.
275 base::Unretained(&watcher_),
276 fifo_fd,
277 tag));
Alex Deymo279bbab2016-02-12 16:26:17 -0800278
Alex Deymo60ca1a72015-06-18 18:19:15 -0700279 // This test would leak a callback that runs when the child process exits
280 // unless we wait for it to run.
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700281 brillo::MessageLoopRunUntil(
Amin Hassanib2689592019-01-13 17:04:28 -0800282 &loop_, TimeDelta::FromSeconds(120), base::Bind([] {
283 return Subprocess::Get().subprocess_records_.empty();
284 }));
Alex Deymo279bbab2016-02-12 16:26:17 -0800285 EXPECT_TRUE(Subprocess::Get().subprocess_records_.empty());
286 // Check that there isn't anything else to read from the pipe.
287 char c;
288 EXPECT_EQ(0, HANDLE_EINTR(read(fifo_fd, &c, 1)));
289 IGNORE_EINTR(close(fifo_fd));
adlr@google.com3defe6a2009-12-04 20:57:17 +0000290}
291
292} // namespace chromeos_update_engine