summaryrefslogtreecommitdiffstats
path: root/toolkit/profile/gtest/TestProfileLock.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'toolkit/profile/gtest/TestProfileLock.cpp')
-rw-r--r--toolkit/profile/gtest/TestProfileLock.cpp116
1 files changed, 116 insertions, 0 deletions
diff --git a/toolkit/profile/gtest/TestProfileLock.cpp b/toolkit/profile/gtest/TestProfileLock.cpp
new file mode 100644
index 000000000..ac5117d74
--- /dev/null
+++ b/toolkit/profile/gtest/TestProfileLock.cpp
@@ -0,0 +1,116 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "gtest/gtest.h"
+
+#include <sys/eventfd.h>
+#include <sched.h>
+
+#include "nsCOMPtr.h"
+#include "nsIFile.h"
+#include "nsProfileLock.h"
+#include "nsString.h"
+
+static void CleanParentLock(const char *tmpdir)
+{
+ // nsProfileLock doesn't clean up all its files
+ char permanent_lockfile[] = "/.parentlock";
+
+ char * parentlock_name;
+ size_t parentlock_name_size = strlen(tmpdir) + strlen(permanent_lockfile) + 1;
+ parentlock_name = (char*)malloc(parentlock_name_size);
+
+ strcpy(parentlock_name, tmpdir);
+ strcat(parentlock_name, permanent_lockfile);
+
+ EXPECT_EQ(0, unlink(parentlock_name));
+ EXPECT_EQ(0, rmdir(tmpdir));
+ free(parentlock_name);
+}
+
+TEST(ProfileLock, BasicLock)
+{
+ char templ[] = "/tmp/profilelocktest.XXXXXX";
+ char * tmpdir = mkdtemp(templ);
+ ASSERT_NE(tmpdir, nullptr);
+
+ // This scope exits so the nsProfileLock destructor
+ // can clean up the files it leaves in tmpdir.
+ {
+ nsProfileLock myLock;
+ nsresult rv;
+ nsCOMPtr<nsIFile> dir(do_CreateInstance(NS_LOCAL_FILE_CONTRACTID, &rv));
+ ASSERT_EQ(NS_SUCCEEDED(rv), true);
+
+ rv = dir->InitWithNativePath(nsCString(tmpdir));
+ ASSERT_EQ(NS_SUCCEEDED(rv), true);
+
+ rv = myLock.Lock(dir, nullptr);
+ EXPECT_EQ(NS_SUCCEEDED(rv), true);
+ }
+
+ CleanParentLock(tmpdir);
+}
+
+TEST(ProfileLock, RetryLock)
+{
+ char templ[] = "/tmp/profilelocktest.XXXXXX";
+ char * tmpdir = mkdtemp(templ);
+ ASSERT_NE(tmpdir, nullptr);
+
+ {
+ nsProfileLock myLock;
+ nsProfileLock myLock2;
+ nsresult rv;
+ nsCOMPtr<nsIFile> dir(do_CreateInstance(NS_LOCAL_FILE_CONTRACTID, &rv));
+ ASSERT_EQ(NS_SUCCEEDED(rv), true);
+
+ rv = dir->InitWithNativePath(nsCString(tmpdir));
+ ASSERT_EQ(NS_SUCCEEDED(rv), true);
+
+ int eventfd_fd = eventfd(0, 0);
+ ASSERT_GE(eventfd_fd, 0);
+
+ // fcntl advisory locks are per process, so it's hard
+ // to avoid using fork here.
+ pid_t childpid = fork();
+
+ if (childpid) {
+ // parent
+
+ // blocking read causing us to lose the race
+ eventfd_t value;
+ EXPECT_EQ(0, eventfd_read(eventfd_fd, &value));
+
+ rv = myLock2.Lock(dir, nullptr);
+ EXPECT_EQ(NS_ERROR_FILE_ACCESS_DENIED, rv);
+
+ // kill the child
+ EXPECT_EQ(0, kill(childpid, SIGTERM));
+
+ // reap zombie (required to collect the lock)
+ int status;
+ EXPECT_EQ(childpid, waitpid(childpid, &status, 0));
+
+ rv = myLock2.Lock(dir, nullptr);
+ EXPECT_EQ(NS_SUCCEEDED(rv), true);
+ } else {
+ // child
+ rv = myLock.Lock(dir, nullptr);
+ ASSERT_EQ(NS_SUCCEEDED(rv), true);
+
+ // unblock parent
+ EXPECT_EQ(0, eventfd_write(eventfd_fd, 1));
+
+ // parent will kill us
+ for (;;)
+ sleep(1);
+ }
+
+ close(eventfd_fd);
+ }
+
+ CleanParentLock(tmpdir);
+}