1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "gtest/gtest.h"
#include <sys/eventfd.h>
#include <sched.h>
#include "nsCOMPtr.h"
#include "nsIFile.h"
#include "nsProfileLock.h"
#include "nsString.h"
static void CleanParentLock(const char *tmpdir)
{
// nsProfileLock doesn't clean up all its files
char permanent_lockfile[] = "/.parentlock";
char * parentlock_name;
size_t parentlock_name_size = strlen(tmpdir) + strlen(permanent_lockfile) + 1;
parentlock_name = (char*)malloc(parentlock_name_size);
strcpy(parentlock_name, tmpdir);
strcat(parentlock_name, permanent_lockfile);
EXPECT_EQ(0, unlink(parentlock_name));
EXPECT_EQ(0, rmdir(tmpdir));
free(parentlock_name);
}
TEST(ProfileLock, BasicLock)
{
char templ[] = "/tmp/profilelocktest.XXXXXX";
char * tmpdir = mkdtemp(templ);
ASSERT_NE(tmpdir, nullptr);
// This scope exits so the nsProfileLock destructor
// can clean up the files it leaves in tmpdir.
{
nsProfileLock myLock;
nsresult rv;
nsCOMPtr<nsIFile> dir(do_CreateInstance(NS_LOCAL_FILE_CONTRACTID, &rv));
ASSERT_EQ(NS_SUCCEEDED(rv), true);
rv = dir->InitWithNativePath(nsCString(tmpdir));
ASSERT_EQ(NS_SUCCEEDED(rv), true);
rv = myLock.Lock(dir, nullptr);
EXPECT_EQ(NS_SUCCEEDED(rv), true);
}
CleanParentLock(tmpdir);
}
TEST(ProfileLock, RetryLock)
{
char templ[] = "/tmp/profilelocktest.XXXXXX";
char * tmpdir = mkdtemp(templ);
ASSERT_NE(tmpdir, nullptr);
{
nsProfileLock myLock;
nsProfileLock myLock2;
nsresult rv;
nsCOMPtr<nsIFile> dir(do_CreateInstance(NS_LOCAL_FILE_CONTRACTID, &rv));
ASSERT_EQ(NS_SUCCEEDED(rv), true);
rv = dir->InitWithNativePath(nsCString(tmpdir));
ASSERT_EQ(NS_SUCCEEDED(rv), true);
int eventfd_fd = eventfd(0, 0);
ASSERT_GE(eventfd_fd, 0);
// fcntl advisory locks are per process, so it's hard
// to avoid using fork here.
pid_t childpid = fork();
if (childpid) {
// parent
// blocking read causing us to lose the race
eventfd_t value;
EXPECT_EQ(0, eventfd_read(eventfd_fd, &value));
rv = myLock2.Lock(dir, nullptr);
EXPECT_EQ(NS_ERROR_FILE_ACCESS_DENIED, rv);
// kill the child
EXPECT_EQ(0, kill(childpid, SIGTERM));
// reap zombie (required to collect the lock)
int status;
EXPECT_EQ(childpid, waitpid(childpid, &status, 0));
rv = myLock2.Lock(dir, nullptr);
EXPECT_EQ(NS_SUCCEEDED(rv), true);
} else {
// child
rv = myLock.Lock(dir, nullptr);
ASSERT_EQ(NS_SUCCEEDED(rv), true);
// unblock parent
EXPECT_EQ(0, eventfd_write(eventfd_fd, 1));
// parent will kill us
for (;;)
sleep(1);
}
close(eventfd_fd);
}
CleanParentLock(tmpdir);
}
|