summaryrefslogtreecommitdiffstats
path: root/toolkit/profile/gtest/TestProfileLock.cpp
blob: ac5117d74f7c79018233fbfe77a76d1ce1f094b6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

#include "gtest/gtest.h"

#include <sys/eventfd.h>
#include <sched.h>

#include "nsCOMPtr.h"
#include "nsIFile.h"
#include "nsProfileLock.h"
#include "nsString.h"

static void CleanParentLock(const char *tmpdir)
{
  // nsProfileLock doesn't clean up all its files
  char permanent_lockfile[] = "/.parentlock";

  char * parentlock_name;
  size_t parentlock_name_size = strlen(tmpdir) + strlen(permanent_lockfile) + 1;
  parentlock_name = (char*)malloc(parentlock_name_size);

  strcpy(parentlock_name, tmpdir);
  strcat(parentlock_name, permanent_lockfile);

  EXPECT_EQ(0, unlink(parentlock_name));
  EXPECT_EQ(0, rmdir(tmpdir));
  free(parentlock_name);
}

TEST(ProfileLock, BasicLock)
{
  char templ[] = "/tmp/profilelocktest.XXXXXX";
  char * tmpdir = mkdtemp(templ);
  ASSERT_NE(tmpdir, nullptr);

  // This scope exits so the nsProfileLock destructor
  // can clean up the files it leaves in tmpdir.
  {
    nsProfileLock myLock;
    nsresult rv;
    nsCOMPtr<nsIFile> dir(do_CreateInstance(NS_LOCAL_FILE_CONTRACTID, &rv));
    ASSERT_EQ(NS_SUCCEEDED(rv), true);

    rv = dir->InitWithNativePath(nsCString(tmpdir));
    ASSERT_EQ(NS_SUCCEEDED(rv), true);

    rv = myLock.Lock(dir, nullptr);
    EXPECT_EQ(NS_SUCCEEDED(rv), true);
  }

  CleanParentLock(tmpdir);
}

TEST(ProfileLock, RetryLock)
{
  char templ[] = "/tmp/profilelocktest.XXXXXX";
  char * tmpdir = mkdtemp(templ);
  ASSERT_NE(tmpdir, nullptr);

  {
    nsProfileLock myLock;
    nsProfileLock myLock2;
    nsresult rv;
    nsCOMPtr<nsIFile> dir(do_CreateInstance(NS_LOCAL_FILE_CONTRACTID, &rv));
    ASSERT_EQ(NS_SUCCEEDED(rv), true);

    rv = dir->InitWithNativePath(nsCString(tmpdir));
    ASSERT_EQ(NS_SUCCEEDED(rv), true);

    int eventfd_fd = eventfd(0, 0);
    ASSERT_GE(eventfd_fd, 0);

    // fcntl advisory locks are per process, so it's hard
    // to avoid using fork here.
    pid_t childpid = fork();

    if (childpid) {
      // parent

      // blocking read causing us to lose the race
      eventfd_t value;
      EXPECT_EQ(0, eventfd_read(eventfd_fd, &value));

      rv = myLock2.Lock(dir, nullptr);
      EXPECT_EQ(NS_ERROR_FILE_ACCESS_DENIED, rv);

      // kill the child
      EXPECT_EQ(0, kill(childpid, SIGTERM));

      // reap zombie (required to collect the lock)
      int status;
      EXPECT_EQ(childpid, waitpid(childpid, &status, 0));

      rv = myLock2.Lock(dir, nullptr);
      EXPECT_EQ(NS_SUCCEEDED(rv), true);
    } else {
      // child
      rv = myLock.Lock(dir, nullptr);
      ASSERT_EQ(NS_SUCCEEDED(rv), true);

      // unblock parent
      EXPECT_EQ(0, eventfd_write(eventfd_fd, 1));

      // parent will kill us
      for (;;)
        sleep(1);
    }

    close(eventfd_fd);
  }

  CleanParentLock(tmpdir);
}