Add RunfilesPath to test_util
A few tests have their own ad-hoc implementations. Add a single common one. PiperOrigin-RevId: 283601666
This commit is contained in:
parent
812189664c
commit
d7cc2480cb
|
@ -47,23 +47,14 @@ namespace testing {
|
|||
|
||||
namespace {
|
||||
|
||||
constexpr char kBasicWorkload[] = "exec_basic_workload";
|
||||
constexpr char kExitScript[] = "exit_script";
|
||||
constexpr char kStateWorkload[] = "exec_state_workload";
|
||||
constexpr char kProcExeWorkload[] = "exec_proc_exe_workload";
|
||||
constexpr char kAssertClosedWorkload[] = "exec_assert_closed_workload";
|
||||
constexpr char kPriorityWorkload[] = "priority_execve";
|
||||
|
||||
std::string WorkloadPath(absl::string_view binary) {
|
||||
std::string full_path;
|
||||
char* test_src = getenv("TEST_SRCDIR");
|
||||
if (test_src) {
|
||||
full_path = JoinPath(test_src, "__main__/test/syscalls/linux", binary);
|
||||
}
|
||||
|
||||
TEST_CHECK(full_path.empty() == false);
|
||||
return full_path;
|
||||
}
|
||||
constexpr char kBasicWorkload[] = "test/syscalls/linux/exec_basic_workload";
|
||||
constexpr char kExitScript[] = "test/syscalls/linux/exit_script";
|
||||
constexpr char kStateWorkload[] = "test/syscalls/linux/exec_state_workload";
|
||||
constexpr char kProcExeWorkload[] =
|
||||
"test/syscalls/linux/exec_proc_exe_workload";
|
||||
constexpr char kAssertClosedWorkload[] =
|
||||
"test/syscalls/linux/exec_assert_closed_workload";
|
||||
constexpr char kPriorityWorkload[] = "test/syscalls/linux/priority_execve";
|
||||
|
||||
constexpr char kExit42[] = "--exec_exit_42";
|
||||
constexpr char kExecWithThread[] = "--exec_exec_with_thread";
|
||||
|
@ -171,44 +162,44 @@ TEST(ExecTest, EmptyPath) {
|
|||
}
|
||||
|
||||
TEST(ExecTest, Basic) {
|
||||
CheckExec(WorkloadPath(kBasicWorkload), {WorkloadPath(kBasicWorkload)}, {},
|
||||
CheckExec(RunfilePath(kBasicWorkload), {RunfilePath(kBasicWorkload)}, {},
|
||||
ArgEnvExitStatus(0, 0),
|
||||
absl::StrCat(WorkloadPath(kBasicWorkload), "\n"));
|
||||
absl::StrCat(RunfilePath(kBasicWorkload), "\n"));
|
||||
}
|
||||
|
||||
TEST(ExecTest, OneArg) {
|
||||
CheckExec(WorkloadPath(kBasicWorkload), {WorkloadPath(kBasicWorkload), "1"},
|
||||
{}, ArgEnvExitStatus(1, 0),
|
||||
absl::StrCat(WorkloadPath(kBasicWorkload), "\n1\n"));
|
||||
CheckExec(RunfilePath(kBasicWorkload), {RunfilePath(kBasicWorkload), "1"}, {},
|
||||
ArgEnvExitStatus(1, 0),
|
||||
absl::StrCat(RunfilePath(kBasicWorkload), "\n1\n"));
|
||||
}
|
||||
|
||||
TEST(ExecTest, FiveArg) {
|
||||
CheckExec(WorkloadPath(kBasicWorkload),
|
||||
{WorkloadPath(kBasicWorkload), "1", "2", "3", "4", "5"}, {},
|
||||
CheckExec(RunfilePath(kBasicWorkload),
|
||||
{RunfilePath(kBasicWorkload), "1", "2", "3", "4", "5"}, {},
|
||||
ArgEnvExitStatus(5, 0),
|
||||
absl::StrCat(WorkloadPath(kBasicWorkload), "\n1\n2\n3\n4\n5\n"));
|
||||
absl::StrCat(RunfilePath(kBasicWorkload), "\n1\n2\n3\n4\n5\n"));
|
||||
}
|
||||
|
||||
TEST(ExecTest, OneEnv) {
|
||||
CheckExec(WorkloadPath(kBasicWorkload), {WorkloadPath(kBasicWorkload)}, {"1"},
|
||||
CheckExec(RunfilePath(kBasicWorkload), {RunfilePath(kBasicWorkload)}, {"1"},
|
||||
ArgEnvExitStatus(0, 1),
|
||||
absl::StrCat(WorkloadPath(kBasicWorkload), "\n1\n"));
|
||||
absl::StrCat(RunfilePath(kBasicWorkload), "\n1\n"));
|
||||
}
|
||||
|
||||
TEST(ExecTest, FiveEnv) {
|
||||
CheckExec(WorkloadPath(kBasicWorkload), {WorkloadPath(kBasicWorkload)},
|
||||
CheckExec(RunfilePath(kBasicWorkload), {RunfilePath(kBasicWorkload)},
|
||||
{"1", "2", "3", "4", "5"}, ArgEnvExitStatus(0, 5),
|
||||
absl::StrCat(WorkloadPath(kBasicWorkload), "\n1\n2\n3\n4\n5\n"));
|
||||
absl::StrCat(RunfilePath(kBasicWorkload), "\n1\n2\n3\n4\n5\n"));
|
||||
}
|
||||
|
||||
TEST(ExecTest, OneArgOneEnv) {
|
||||
CheckExec(WorkloadPath(kBasicWorkload), {WorkloadPath(kBasicWorkload), "arg"},
|
||||
CheckExec(RunfilePath(kBasicWorkload), {RunfilePath(kBasicWorkload), "arg"},
|
||||
{"env"}, ArgEnvExitStatus(1, 1),
|
||||
absl::StrCat(WorkloadPath(kBasicWorkload), "\narg\nenv\n"));
|
||||
absl::StrCat(RunfilePath(kBasicWorkload), "\narg\nenv\n"));
|
||||
}
|
||||
|
||||
TEST(ExecTest, InterpreterScript) {
|
||||
CheckExec(WorkloadPath(kExitScript), {WorkloadPath(kExitScript), "25"}, {},
|
||||
CheckExec(RunfilePath(kExitScript), {RunfilePath(kExitScript), "25"}, {},
|
||||
ArgEnvExitStatus(25, 0), "");
|
||||
}
|
||||
|
||||
|
@ -216,7 +207,7 @@ TEST(ExecTest, InterpreterScript) {
|
|||
TEST(ExecTest, InterpreterScriptArgSplit) {
|
||||
// Symlink through /tmp to ensure the path is short enough.
|
||||
TempPath link = ASSERT_NO_ERRNO_AND_VALUE(
|
||||
TempPath::CreateSymlinkTo("/tmp", WorkloadPath(kBasicWorkload)));
|
||||
TempPath::CreateSymlinkTo("/tmp", RunfilePath(kBasicWorkload)));
|
||||
|
||||
TempPath script = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateFileWith(
|
||||
GetAbsoluteTestTmpdir(), absl::StrCat("#!", link.path(), " foo bar"),
|
||||
|
@ -230,7 +221,7 @@ TEST(ExecTest, InterpreterScriptArgSplit) {
|
|||
TEST(ExecTest, InterpreterScriptArgvZero) {
|
||||
// Symlink through /tmp to ensure the path is short enough.
|
||||
TempPath link = ASSERT_NO_ERRNO_AND_VALUE(
|
||||
TempPath::CreateSymlinkTo("/tmp", WorkloadPath(kBasicWorkload)));
|
||||
TempPath::CreateSymlinkTo("/tmp", RunfilePath(kBasicWorkload)));
|
||||
|
||||
TempPath script = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateFileWith(
|
||||
GetAbsoluteTestTmpdir(), absl::StrCat("#!", link.path()), 0755));
|
||||
|
@ -244,7 +235,7 @@ TEST(ExecTest, InterpreterScriptArgvZero) {
|
|||
TEST(ExecTest, InterpreterScriptArgvZeroRelative) {
|
||||
// Symlink through /tmp to ensure the path is short enough.
|
||||
TempPath link = ASSERT_NO_ERRNO_AND_VALUE(
|
||||
TempPath::CreateSymlinkTo("/tmp", WorkloadPath(kBasicWorkload)));
|
||||
TempPath::CreateSymlinkTo("/tmp", RunfilePath(kBasicWorkload)));
|
||||
|
||||
TempPath script = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateFileWith(
|
||||
GetAbsoluteTestTmpdir(), absl::StrCat("#!", link.path()), 0755));
|
||||
|
@ -261,7 +252,7 @@ TEST(ExecTest, InterpreterScriptArgvZeroRelative) {
|
|||
TEST(ExecTest, InterpreterScriptArgvZeroAdded) {
|
||||
// Symlink through /tmp to ensure the path is short enough.
|
||||
TempPath link = ASSERT_NO_ERRNO_AND_VALUE(
|
||||
TempPath::CreateSymlinkTo("/tmp", WorkloadPath(kBasicWorkload)));
|
||||
TempPath::CreateSymlinkTo("/tmp", RunfilePath(kBasicWorkload)));
|
||||
|
||||
TempPath script = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateFileWith(
|
||||
GetAbsoluteTestTmpdir(), absl::StrCat("#!", link.path()), 0755));
|
||||
|
@ -274,7 +265,7 @@ TEST(ExecTest, InterpreterScriptArgvZeroAdded) {
|
|||
TEST(ExecTest, InterpreterScriptArgNUL) {
|
||||
// Symlink through /tmp to ensure the path is short enough.
|
||||
TempPath link = ASSERT_NO_ERRNO_AND_VALUE(
|
||||
TempPath::CreateSymlinkTo("/tmp", WorkloadPath(kBasicWorkload)));
|
||||
TempPath::CreateSymlinkTo("/tmp", RunfilePath(kBasicWorkload)));
|
||||
|
||||
TempPath script = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateFileWith(
|
||||
GetAbsoluteTestTmpdir(),
|
||||
|
@ -289,7 +280,7 @@ TEST(ExecTest, InterpreterScriptArgNUL) {
|
|||
TEST(ExecTest, InterpreterScriptTrailingWhitespace) {
|
||||
// Symlink through /tmp to ensure the path is short enough.
|
||||
TempPath link = ASSERT_NO_ERRNO_AND_VALUE(
|
||||
TempPath::CreateSymlinkTo("/tmp", WorkloadPath(kBasicWorkload)));
|
||||
TempPath::CreateSymlinkTo("/tmp", RunfilePath(kBasicWorkload)));
|
||||
|
||||
TempPath script = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateFileWith(
|
||||
GetAbsoluteTestTmpdir(), absl::StrCat("#!", link.path(), " "), 0755));
|
||||
|
@ -302,7 +293,7 @@ TEST(ExecTest, InterpreterScriptTrailingWhitespace) {
|
|||
TEST(ExecTest, InterpreterScriptArgWhitespace) {
|
||||
// Symlink through /tmp to ensure the path is short enough.
|
||||
TempPath link = ASSERT_NO_ERRNO_AND_VALUE(
|
||||
TempPath::CreateSymlinkTo("/tmp", WorkloadPath(kBasicWorkload)));
|
||||
TempPath::CreateSymlinkTo("/tmp", RunfilePath(kBasicWorkload)));
|
||||
|
||||
TempPath script = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateFileWith(
|
||||
GetAbsoluteTestTmpdir(), absl::StrCat("#!", link.path(), " foo"), 0755));
|
||||
|
@ -325,7 +316,7 @@ TEST(ExecTest, InterpreterScriptNoPath) {
|
|||
TEST(ExecTest, ExecFn) {
|
||||
// Symlink through /tmp to ensure the path is short enough.
|
||||
TempPath link = ASSERT_NO_ERRNO_AND_VALUE(
|
||||
TempPath::CreateSymlinkTo("/tmp", WorkloadPath(kStateWorkload)));
|
||||
TempPath::CreateSymlinkTo("/tmp", RunfilePath(kStateWorkload)));
|
||||
|
||||
TempPath script = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateFileWith(
|
||||
GetAbsoluteTestTmpdir(), absl::StrCat("#!", link.path(), " PrintExecFn"),
|
||||
|
@ -342,7 +333,7 @@ TEST(ExecTest, ExecFn) {
|
|||
}
|
||||
|
||||
TEST(ExecTest, ExecName) {
|
||||
std::string path = WorkloadPath(kStateWorkload);
|
||||
std::string path = RunfilePath(kStateWorkload);
|
||||
|
||||
CheckExec(path, {path, "PrintExecName"}, {}, ArgEnvExitStatus(0, 0),
|
||||
absl::StrCat(Basename(path).substr(0, 15), "\n"));
|
||||
|
@ -351,7 +342,7 @@ TEST(ExecTest, ExecName) {
|
|||
TEST(ExecTest, ExecNameScript) {
|
||||
// Symlink through /tmp to ensure the path is short enough.
|
||||
TempPath link = ASSERT_NO_ERRNO_AND_VALUE(
|
||||
TempPath::CreateSymlinkTo("/tmp", WorkloadPath(kStateWorkload)));
|
||||
TempPath::CreateSymlinkTo("/tmp", RunfilePath(kStateWorkload)));
|
||||
|
||||
TempPath script = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateFileWith(
|
||||
GetAbsoluteTestTmpdir(),
|
||||
|
@ -405,13 +396,13 @@ TEST(ExecStateTest, HandlerReset) {
|
|||
ASSERT_THAT(sigaction(SIGUSR1, &sa, nullptr), SyscallSucceeds());
|
||||
|
||||
ExecveArray args = {
|
||||
WorkloadPath(kStateWorkload),
|
||||
RunfilePath(kStateWorkload),
|
||||
"CheckSigHandler",
|
||||
absl::StrCat(SIGUSR1),
|
||||
absl::StrCat(absl::Hex(reinterpret_cast<uintptr_t>(SIG_DFL))),
|
||||
};
|
||||
|
||||
CheckExec(WorkloadPath(kStateWorkload), args, {}, W_EXITCODE(0, 0), "");
|
||||
CheckExec(RunfilePath(kStateWorkload), args, {}, W_EXITCODE(0, 0), "");
|
||||
}
|
||||
|
||||
// Ignored signal dispositions are not reset.
|
||||
|
@ -421,13 +412,13 @@ TEST(ExecStateTest, IgnorePreserved) {
|
|||
ASSERT_THAT(sigaction(SIGUSR1, &sa, nullptr), SyscallSucceeds());
|
||||
|
||||
ExecveArray args = {
|
||||
WorkloadPath(kStateWorkload),
|
||||
RunfilePath(kStateWorkload),
|
||||
"CheckSigHandler",
|
||||
absl::StrCat(SIGUSR1),
|
||||
absl::StrCat(absl::Hex(reinterpret_cast<uintptr_t>(SIG_IGN))),
|
||||
};
|
||||
|
||||
CheckExec(WorkloadPath(kStateWorkload), args, {}, W_EXITCODE(0, 0), "");
|
||||
CheckExec(RunfilePath(kStateWorkload), args, {}, W_EXITCODE(0, 0), "");
|
||||
}
|
||||
|
||||
// Signal masks are not reset on exec
|
||||
|
@ -438,12 +429,12 @@ TEST(ExecStateTest, SignalMask) {
|
|||
ASSERT_THAT(sigprocmask(SIG_BLOCK, &s, nullptr), SyscallSucceeds());
|
||||
|
||||
ExecveArray args = {
|
||||
WorkloadPath(kStateWorkload),
|
||||
RunfilePath(kStateWorkload),
|
||||
"CheckSigBlocked",
|
||||
absl::StrCat(SIGUSR1),
|
||||
};
|
||||
|
||||
CheckExec(WorkloadPath(kStateWorkload), args, {}, W_EXITCODE(0, 0), "");
|
||||
CheckExec(RunfilePath(kStateWorkload), args, {}, W_EXITCODE(0, 0), "");
|
||||
}
|
||||
|
||||
// itimers persist across execve.
|
||||
|
@ -471,7 +462,7 @@ TEST(ExecStateTest, ItimerPreserved) {
|
|||
}
|
||||
};
|
||||
|
||||
std::string filename = WorkloadPath(kStateWorkload);
|
||||
std::string filename = RunfilePath(kStateWorkload);
|
||||
ExecveArray argv = {
|
||||
filename,
|
||||
"CheckItimerEnabled",
|
||||
|
@ -495,8 +486,8 @@ TEST(ExecStateTest, ItimerPreserved) {
|
|||
TEST(ProcSelfExe, ChangesAcrossExecve) {
|
||||
// See exec_proc_exe_workload for more details. We simply
|
||||
// assert that the /proc/self/exe link changes across execve.
|
||||
CheckExec(WorkloadPath(kProcExeWorkload),
|
||||
{WorkloadPath(kProcExeWorkload),
|
||||
CheckExec(RunfilePath(kProcExeWorkload),
|
||||
{RunfilePath(kProcExeWorkload),
|
||||
ASSERT_NO_ERRNO_AND_VALUE(ProcessExePath(getpid()))},
|
||||
{}, W_EXITCODE(0, 0), "");
|
||||
}
|
||||
|
@ -507,8 +498,8 @@ TEST(ExecTest, CloexecNormalFile) {
|
|||
const FileDescriptor fd_closed_on_exec =
|
||||
ASSERT_NO_ERRNO_AND_VALUE(Open(tempFile.path(), O_RDONLY | O_CLOEXEC));
|
||||
|
||||
CheckExec(WorkloadPath(kAssertClosedWorkload),
|
||||
{WorkloadPath(kAssertClosedWorkload),
|
||||
CheckExec(RunfilePath(kAssertClosedWorkload),
|
||||
{RunfilePath(kAssertClosedWorkload),
|
||||
absl::StrCat(fd_closed_on_exec.get())},
|
||||
{}, W_EXITCODE(0, 0), "");
|
||||
|
||||
|
@ -517,10 +508,10 @@ TEST(ExecTest, CloexecNormalFile) {
|
|||
const FileDescriptor fd_open_on_exec =
|
||||
ASSERT_NO_ERRNO_AND_VALUE(Open(tempFile.path(), O_RDONLY));
|
||||
|
||||
CheckExec(WorkloadPath(kAssertClosedWorkload),
|
||||
{WorkloadPath(kAssertClosedWorkload),
|
||||
absl::StrCat(fd_open_on_exec.get())},
|
||||
{}, W_EXITCODE(2, 0), "");
|
||||
CheckExec(
|
||||
RunfilePath(kAssertClosedWorkload),
|
||||
{RunfilePath(kAssertClosedWorkload), absl::StrCat(fd_open_on_exec.get())},
|
||||
{}, W_EXITCODE(2, 0), "");
|
||||
}
|
||||
|
||||
TEST(ExecTest, CloexecEventfd) {
|
||||
|
@ -528,15 +519,15 @@ TEST(ExecTest, CloexecEventfd) {
|
|||
ASSERT_THAT(efd = eventfd(0, EFD_CLOEXEC), SyscallSucceeds());
|
||||
FileDescriptor fd(efd);
|
||||
|
||||
CheckExec(WorkloadPath(kAssertClosedWorkload),
|
||||
{WorkloadPath(kAssertClosedWorkload), absl::StrCat(fd.get())}, {},
|
||||
CheckExec(RunfilePath(kAssertClosedWorkload),
|
||||
{RunfilePath(kAssertClosedWorkload), absl::StrCat(fd.get())}, {},
|
||||
W_EXITCODE(0, 0), "");
|
||||
}
|
||||
|
||||
constexpr int kLinuxMaxSymlinks = 40;
|
||||
|
||||
TEST(ExecTest, SymlinkLimitExceeded) {
|
||||
std::string path = WorkloadPath(kBasicWorkload);
|
||||
std::string path = RunfilePath(kBasicWorkload);
|
||||
|
||||
// Hold onto TempPath objects so they are not destructed prematurely.
|
||||
std::vector<TempPath> symlinks;
|
||||
|
@ -575,13 +566,13 @@ TEST(ExecTest, SymlinkLimitRefreshedForInterpreter) {
|
|||
}
|
||||
|
||||
TEST(ExecveatTest, BasicWithFDCWD) {
|
||||
std::string path = WorkloadPath(kBasicWorkload);
|
||||
std::string path = RunfilePath(kBasicWorkload);
|
||||
CheckExecveat(AT_FDCWD, path, {path}, {}, /*flags=*/0, ArgEnvExitStatus(0, 0),
|
||||
absl::StrCat(path, "\n"));
|
||||
}
|
||||
|
||||
TEST(ExecveatTest, Basic) {
|
||||
std::string absolute_path = WorkloadPath(kBasicWorkload);
|
||||
std::string absolute_path = RunfilePath(kBasicWorkload);
|
||||
std::string parent_dir = std::string(Dirname(absolute_path));
|
||||
std::string base = std::string(Basename(absolute_path));
|
||||
const FileDescriptor dirfd =
|
||||
|
@ -592,7 +583,7 @@ TEST(ExecveatTest, Basic) {
|
|||
}
|
||||
|
||||
TEST(ExecveatTest, FDNotADirectory) {
|
||||
std::string absolute_path = WorkloadPath(kBasicWorkload);
|
||||
std::string absolute_path = RunfilePath(kBasicWorkload);
|
||||
std::string base = std::string(Basename(absolute_path));
|
||||
const FileDescriptor fd = ASSERT_NO_ERRNO_AND_VALUE(Open(absolute_path, 0));
|
||||
|
||||
|
@ -604,13 +595,13 @@ TEST(ExecveatTest, FDNotADirectory) {
|
|||
}
|
||||
|
||||
TEST(ExecveatTest, AbsolutePathWithFDCWD) {
|
||||
std::string path = WorkloadPath(kBasicWorkload);
|
||||
std::string path = RunfilePath(kBasicWorkload);
|
||||
CheckExecveat(AT_FDCWD, path, {path}, {}, ArgEnvExitStatus(0, 0), 0,
|
||||
absl::StrCat(path, "\n"));
|
||||
}
|
||||
|
||||
TEST(ExecveatTest, AbsolutePath) {
|
||||
std::string path = WorkloadPath(kBasicWorkload);
|
||||
std::string path = RunfilePath(kBasicWorkload);
|
||||
// File descriptor should be ignored when an absolute path is given.
|
||||
const int32_t badFD = -1;
|
||||
CheckExecveat(badFD, path, {path}, {}, ArgEnvExitStatus(0, 0), 0,
|
||||
|
@ -618,7 +609,7 @@ TEST(ExecveatTest, AbsolutePath) {
|
|||
}
|
||||
|
||||
TEST(ExecveatTest, EmptyPathBasic) {
|
||||
std::string path = WorkloadPath(kBasicWorkload);
|
||||
std::string path = RunfilePath(kBasicWorkload);
|
||||
const FileDescriptor fd = ASSERT_NO_ERRNO_AND_VALUE(Open(path, O_PATH));
|
||||
|
||||
CheckExecveat(fd.get(), "", {path}, {}, AT_EMPTY_PATH, ArgEnvExitStatus(0, 0),
|
||||
|
@ -626,7 +617,7 @@ TEST(ExecveatTest, EmptyPathBasic) {
|
|||
}
|
||||
|
||||
TEST(ExecveatTest, EmptyPathWithDirFD) {
|
||||
std::string path = WorkloadPath(kBasicWorkload);
|
||||
std::string path = RunfilePath(kBasicWorkload);
|
||||
std::string parent_dir = std::string(Dirname(path));
|
||||
const FileDescriptor dirfd =
|
||||
ASSERT_NO_ERRNO_AND_VALUE(Open(parent_dir, O_DIRECTORY));
|
||||
|
@ -639,7 +630,7 @@ TEST(ExecveatTest, EmptyPathWithDirFD) {
|
|||
}
|
||||
|
||||
TEST(ExecveatTest, EmptyPathWithoutEmptyPathFlag) {
|
||||
std::string path = WorkloadPath(kBasicWorkload);
|
||||
std::string path = RunfilePath(kBasicWorkload);
|
||||
const FileDescriptor fd = ASSERT_NO_ERRNO_AND_VALUE(Open(path, O_PATH));
|
||||
|
||||
int execve_errno;
|
||||
|
@ -649,7 +640,7 @@ TEST(ExecveatTest, EmptyPathWithoutEmptyPathFlag) {
|
|||
}
|
||||
|
||||
TEST(ExecveatTest, AbsolutePathWithEmptyPathFlag) {
|
||||
std::string path = WorkloadPath(kBasicWorkload);
|
||||
std::string path = RunfilePath(kBasicWorkload);
|
||||
const FileDescriptor fd = ASSERT_NO_ERRNO_AND_VALUE(Open(path, O_PATH));
|
||||
|
||||
CheckExecveat(fd.get(), path, {path}, {}, AT_EMPTY_PATH,
|
||||
|
@ -657,7 +648,7 @@ TEST(ExecveatTest, AbsolutePathWithEmptyPathFlag) {
|
|||
}
|
||||
|
||||
TEST(ExecveatTest, RelativePathWithEmptyPathFlag) {
|
||||
std::string absolute_path = WorkloadPath(kBasicWorkload);
|
||||
std::string absolute_path = RunfilePath(kBasicWorkload);
|
||||
std::string parent_dir = std::string(Dirname(absolute_path));
|
||||
std::string base = std::string(Basename(absolute_path));
|
||||
const FileDescriptor dirfd =
|
||||
|
@ -670,7 +661,7 @@ TEST(ExecveatTest, RelativePathWithEmptyPathFlag) {
|
|||
TEST(ExecveatTest, SymlinkNoFollowWithRelativePath) {
|
||||
std::string parent_dir = "/tmp";
|
||||
TempPath link = ASSERT_NO_ERRNO_AND_VALUE(
|
||||
TempPath::CreateSymlinkTo(parent_dir, WorkloadPath(kBasicWorkload)));
|
||||
TempPath::CreateSymlinkTo(parent_dir, RunfilePath(kBasicWorkload)));
|
||||
const FileDescriptor dirfd =
|
||||
ASSERT_NO_ERRNO_AND_VALUE(Open(parent_dir, O_DIRECTORY));
|
||||
std::string base = std::string(Basename(link.path()));
|
||||
|
@ -685,7 +676,7 @@ TEST(ExecveatTest, SymlinkNoFollowWithRelativePath) {
|
|||
TEST(ExecveatTest, SymlinkNoFollowWithAbsolutePath) {
|
||||
std::string parent_dir = "/tmp";
|
||||
TempPath link = ASSERT_NO_ERRNO_AND_VALUE(
|
||||
TempPath::CreateSymlinkTo(parent_dir, WorkloadPath(kBasicWorkload)));
|
||||
TempPath::CreateSymlinkTo(parent_dir, RunfilePath(kBasicWorkload)));
|
||||
std::string path = link.path();
|
||||
|
||||
int execve_errno;
|
||||
|
@ -697,7 +688,7 @@ TEST(ExecveatTest, SymlinkNoFollowWithAbsolutePath) {
|
|||
|
||||
TEST(ExecveatTest, SymlinkNoFollowAndEmptyPath) {
|
||||
TempPath link = ASSERT_NO_ERRNO_AND_VALUE(
|
||||
TempPath::CreateSymlinkTo("/tmp", WorkloadPath(kBasicWorkload)));
|
||||
TempPath::CreateSymlinkTo("/tmp", RunfilePath(kBasicWorkload)));
|
||||
std::string path = link.path();
|
||||
const FileDescriptor fd = ASSERT_NO_ERRNO_AND_VALUE(Open(path, 0));
|
||||
|
||||
|
@ -723,7 +714,7 @@ TEST(ExecveatTest, SymlinkNoFollowWithNormalFile) {
|
|||
}
|
||||
|
||||
TEST(ExecveatTest, BasicWithCloexecFD) {
|
||||
std::string path = WorkloadPath(kBasicWorkload);
|
||||
std::string path = RunfilePath(kBasicWorkload);
|
||||
const FileDescriptor fd = ASSERT_NO_ERRNO_AND_VALUE(Open(path, O_CLOEXEC));
|
||||
|
||||
CheckExecveat(fd.get(), "", {path}, {}, AT_SYMLINK_NOFOLLOW | AT_EMPTY_PATH,
|
||||
|
@ -731,7 +722,7 @@ TEST(ExecveatTest, BasicWithCloexecFD) {
|
|||
}
|
||||
|
||||
TEST(ExecveatTest, InterpreterScriptWithCloexecFD) {
|
||||
std::string path = WorkloadPath(kExitScript);
|
||||
std::string path = RunfilePath(kExitScript);
|
||||
const FileDescriptor fd = ASSERT_NO_ERRNO_AND_VALUE(Open(path, O_CLOEXEC));
|
||||
|
||||
int execve_errno;
|
||||
|
@ -742,7 +733,7 @@ TEST(ExecveatTest, InterpreterScriptWithCloexecFD) {
|
|||
}
|
||||
|
||||
TEST(ExecveatTest, InterpreterScriptWithCloexecDirFD) {
|
||||
std::string absolute_path = WorkloadPath(kExitScript);
|
||||
std::string absolute_path = RunfilePath(kExitScript);
|
||||
std::string parent_dir = std::string(Dirname(absolute_path));
|
||||
std::string base = std::string(Basename(absolute_path));
|
||||
const FileDescriptor dirfd =
|
||||
|
@ -775,7 +766,7 @@ TEST(GetpriorityTest, ExecveMaintainsPriority) {
|
|||
|
||||
// Program run (priority_execve) will exit(X) where
|
||||
// X=getpriority(PRIO_PROCESS,0). Check that this exit value is prio.
|
||||
CheckExec(WorkloadPath(kPriorityWorkload), {WorkloadPath(kPriorityWorkload)},
|
||||
CheckExec(RunfilePath(kPriorityWorkload), {RunfilePath(kPriorityWorkload)},
|
||||
{}, W_EXITCODE(expected_exit_code, 0), "");
|
||||
}
|
||||
|
||||
|
|
|
@ -95,13 +95,7 @@ TEST(SigaltstackTest, ResetByExecve) {
|
|||
auto const cleanup_sigstack =
|
||||
ASSERT_NO_ERRNO_AND_VALUE(ScopedSigaltstack(stack));
|
||||
|
||||
std::string full_path;
|
||||
char* test_src = getenv("TEST_SRCDIR");
|
||||
if (test_src) {
|
||||
full_path = JoinPath(test_src, "../../linux/sigaltstack_check");
|
||||
}
|
||||
|
||||
ASSERT_FALSE(full_path.empty());
|
||||
std::string full_path = RunfilePath("test/syscalls/linux/sigaltstack_check");
|
||||
|
||||
pid_t child_pid = -1;
|
||||
int execve_errno = 0;
|
||||
|
|
|
@ -237,6 +237,7 @@ cc_library(
|
|||
] + select_for_linux(
|
||||
[
|
||||
"test_util_impl.cc",
|
||||
"test_util_runfiles.cc",
|
||||
],
|
||||
),
|
||||
hdrs = ["test_util.h"],
|
||||
|
@ -245,6 +246,7 @@ cc_library(
|
|||
":logging",
|
||||
":posix_error",
|
||||
":save_util",
|
||||
"@bazel_tools//tools/cpp/runfiles",
|
||||
"@com_google_absl//absl/base:core_headers",
|
||||
"@com_google_absl//absl/flags:flag",
|
||||
"@com_google_absl//absl/flags:parse",
|
||||
|
|
|
@ -764,6 +764,12 @@ MATCHER_P2(EquivalentWithin, target, tolerance,
|
|||
return Equivalent(arg, target, tolerance);
|
||||
}
|
||||
|
||||
// Returns the absolute path to the a data dependency. 'path' is the runfile
|
||||
// location relative to workspace root.
|
||||
#ifdef __linux__
|
||||
std::string RunfilePath(std::string path);
|
||||
#endif
|
||||
|
||||
void TestInit(int* argc, char*** argv);
|
||||
|
||||
} // namespace testing
|
||||
|
|
|
@ -0,0 +1,46 @@
|
|||
// Copyright 2019 The gVisor Authors.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#include <iostream>
|
||||
#include <string>
|
||||
|
||||
#include "test/util/fs_util.h"
|
||||
#include "test/util/test_util.h"
|
||||
#include "tools/cpp/runfiles/runfiles.h"
|
||||
|
||||
namespace gvisor {
|
||||
namespace testing {
|
||||
|
||||
std::string RunfilePath(std::string path) {
|
||||
static const bazel::tools::cpp::runfiles::Runfiles* const runfiles = [] {
|
||||
std::string error;
|
||||
auto* runfiles =
|
||||
bazel::tools::cpp::runfiles::Runfiles::CreateForTest(&error);
|
||||
if (runfiles == nullptr) {
|
||||
std::cerr << "Unable to find runfiles: " << error << std::endl;
|
||||
}
|
||||
return runfiles;
|
||||
}();
|
||||
|
||||
if (!runfiles) {
|
||||
// Can't find runfiles? This probably won't work, but __main__/path is our
|
||||
// best guess.
|
||||
return JoinPath("__main__", path);
|
||||
}
|
||||
|
||||
return runfiles->Rlocation(JoinPath("__main__", path));
|
||||
}
|
||||
|
||||
} // namespace testing
|
||||
} // namespace gvisor
|
Loading…
Reference in New Issue