2012-06-22 15:08:48 +04:00
/***
This file is part of systemd .
Copyright 2012 Lennart Poettering
2013-01-30 00:25:36 +04:00
Copyright 2013 Zbigniew Jędrzejewski - Szmek
2014-06-23 23:28:21 +04:00
Copyright 2014 Ronny Chevalier
2012-06-22 15:08:48 +04:00
systemd is free software ; you can redistribute it and / or modify it
under the terms of the GNU Lesser General Public License as published by
the Free Software Foundation ; either version 2.1 of the License , or
( at your option ) any later version .
systemd is distributed in the hope that it will be useful , but
WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the GNU
Lesser General Public License for more details .
You should have received a copy of the GNU Lesser General Public License
along with systemd ; If not , see < http : //www.gnu.org/licenses/>.
* * */
2015-10-24 23:58:24 +03:00
# include <pwd.h>
2012-06-22 15:08:48 +04:00
# include <stdio.h>
# include <stdlib.h>
# include <string.h>
2015-10-27 05:01:06 +03:00
# include "alloc-util.h"
2016-01-26 22:25:10 +03:00
# include "glob-util.h"
2015-10-24 23:58:24 +03:00
# include "hostname-util.h"
# include "macro.h"
2013-01-30 00:25:36 +04:00
# include "manager.h"
2015-10-24 23:58:24 +03:00
# include "path-util.h"
2017-07-18 20:26:09 +03:00
# include "rm-rf.h"
2015-10-24 23:58:24 +03:00
# include "specifier.h"
# include "string-util.h"
# include "test-helper.h"
2017-07-18 20:26:09 +03:00
# include "tests.h"
2012-06-22 15:08:48 +04:00
# include "unit-name.h"
2013-01-30 00:25:36 +04:00
# include "unit-printf.h"
2015-10-24 23:58:24 +03:00
# include "unit.h"
core: simplify handling of %u, %U, %s and %h unit file specifiers
Previously, the %u, %U, %s and %h specifiers would resolve to the user
name, numeric user ID, shell and home directory of the user configured
in the User= setting of a unit file, or the user of the manager instance
if no User= setting was configured. That at least was the theory. In
real-life this was not ever actually useful:
- For the systemd --user instance it made no sense to ever set User=,
since the instance runs in user context after all, and hence the
privileges to change user IDs don't even exist. The four specifiers
were actually not useful at all in this case.
- For the systemd --system instance we did not allow any resolving that
would require NSS. Hence, %s and %h were not supported, unless
User=root was set, in which case they would be hardcoded to /bin/sh
and /root, to avoid NSS. Then, %u would actually resolve to whatever
was set with User=, but %U would only resolve to the numeric UID of
that setting if the User= was specified in numeric form, or happened
to be root (in which case 0 was hardcoded as mapping). Two of the
specifiers are entirely useless in this case, one is realistically
also useless, and one is pretty pointless.
- Resolving of these settings would only happen if User= was actually
set *before* the specifiers where resolved. This behaviour was
undocumented and is really ugly, as specifiers should actually be
considered something that applies to the whole file equally,
independently of order...
With this change, %u, %U, %s and %h are drastically simplified: they now
always refer to the user that is running the service instance, and the
user configured in the unit file is irrelevant. For the system instance
of systemd this means they always resolve to "root", "0", "/bin/sh" and
"/root", thus avoiding NSS. For the user instance, to the data for the
specific user.
The new behaviour is identical to the old behaviour in all --user cases
and for all units that have no User= set (or set to "0" or "root").
2015-11-01 00:12:51 +03:00
# include "user-util.h"
2012-06-22 15:08:48 +04:00
# include "util.h"
2015-04-30 21:21:00 +03:00
static void test_unit_name_is_valid ( void ) {
assert_se ( unit_name_is_valid ( " foo.service " , UNIT_NAME_ANY ) ) ;
assert_se ( unit_name_is_valid ( " foo.service " , UNIT_NAME_PLAIN ) ) ;
assert_se ( ! unit_name_is_valid ( " foo.service " , UNIT_NAME_INSTANCE ) ) ;
assert_se ( ! unit_name_is_valid ( " foo.service " , UNIT_NAME_TEMPLATE ) ) ;
assert_se ( ! unit_name_is_valid ( " foo.service " , UNIT_NAME_INSTANCE | UNIT_NAME_TEMPLATE ) ) ;
assert_se ( unit_name_is_valid ( " foo@bar.service " , UNIT_NAME_ANY ) ) ;
assert_se ( ! unit_name_is_valid ( " foo@bar.service " , UNIT_NAME_PLAIN ) ) ;
assert_se ( unit_name_is_valid ( " foo@bar.service " , UNIT_NAME_INSTANCE ) ) ;
assert_se ( ! unit_name_is_valid ( " foo@bar.service " , UNIT_NAME_TEMPLATE ) ) ;
assert_se ( unit_name_is_valid ( " foo@bar.service " , UNIT_NAME_INSTANCE | UNIT_NAME_TEMPLATE ) ) ;
assert_se ( unit_name_is_valid ( " foo@.service " , UNIT_NAME_ANY ) ) ;
assert_se ( ! unit_name_is_valid ( " foo@.service " , UNIT_NAME_PLAIN ) ) ;
assert_se ( ! unit_name_is_valid ( " foo@.service " , UNIT_NAME_INSTANCE ) ) ;
assert_se ( unit_name_is_valid ( " foo@.service " , UNIT_NAME_TEMPLATE ) ) ;
assert_se ( unit_name_is_valid ( " foo@.service " , UNIT_NAME_INSTANCE | UNIT_NAME_TEMPLATE ) ) ;
assert_se ( ! unit_name_is_valid ( " .service " , UNIT_NAME_ANY ) ) ;
assert_se ( ! unit_name_is_valid ( " " , UNIT_NAME_ANY ) ) ;
assert_se ( ! unit_name_is_valid ( " foo.waldo " , UNIT_NAME_ANY ) ) ;
assert_se ( ! unit_name_is_valid ( " @.service " , UNIT_NAME_ANY ) ) ;
assert_se ( ! unit_name_is_valid ( " @piep.service " , UNIT_NAME_ANY ) ) ;
}
2013-01-29 23:39:32 +04:00
2016-01-26 21:48:29 +03:00
static void test_unit_name_replace_instance_one ( const char * pattern , const char * repl , const char * expected , int ret ) {
2015-04-30 21:21:00 +03:00
_cleanup_free_ char * t = NULL ;
assert_se ( unit_name_replace_instance ( pattern , repl , & t ) = = ret ) ;
puts ( strna ( t ) ) ;
assert_se ( streq_ptr ( t , expected ) ) ;
}
2013-01-29 23:39:32 +04:00
2016-01-26 21:48:29 +03:00
static void test_unit_name_replace_instance ( void ) {
2013-01-29 23:39:32 +04:00
puts ( " ------------------------------------------------- " ) ;
2016-01-26 21:48:29 +03:00
test_unit_name_replace_instance_one ( " foo@.service " , " waldo " , " foo@waldo.service " , 0 ) ;
test_unit_name_replace_instance_one ( " foo@xyz.service " , " waldo " , " foo@waldo.service " , 0 ) ;
test_unit_name_replace_instance_one ( " xyz " , " waldo " , NULL , - EINVAL ) ;
test_unit_name_replace_instance_one ( " " , " waldo " , NULL , - EINVAL ) ;
test_unit_name_replace_instance_one ( " foo.service " , " waldo " , NULL , - EINVAL ) ;
test_unit_name_replace_instance_one ( " .service " , " waldo " , NULL , - EINVAL ) ;
test_unit_name_replace_instance_one ( " foo@ " , " waldo " , NULL , - EINVAL ) ;
test_unit_name_replace_instance_one ( " @bar " , " waldo " , NULL , - EINVAL ) ;
2015-04-30 21:21:00 +03:00
}
2013-01-29 23:39:32 +04:00
2016-01-26 21:48:29 +03:00
static void test_unit_name_from_path_one ( const char * path , const char * suffix , const char * expected , int ret ) {
2015-04-30 21:21:00 +03:00
_cleanup_free_ char * t = NULL ;
2013-01-29 23:39:32 +04:00
2015-04-30 21:21:00 +03:00
assert_se ( unit_name_from_path ( path , suffix , & t ) = = ret ) ;
puts ( strna ( t ) ) ;
assert_se ( streq_ptr ( t , expected ) ) ;
2013-01-29 23:39:32 +04:00
2015-04-30 21:21:00 +03:00
if ( t ) {
_cleanup_free_ char * k = NULL ;
assert_se ( unit_name_to_path ( t , & k ) = = 0 ) ;
puts ( strna ( k ) ) ;
assert_se ( path_equal ( k , isempty ( path ) ? " / " : path ) ) ;
}
}
2013-01-29 23:39:32 +04:00
2016-01-26 21:48:29 +03:00
static void test_unit_name_from_path ( void ) {
2013-01-29 23:39:32 +04:00
puts ( " ------------------------------------------------- " ) ;
2016-01-26 21:48:29 +03:00
test_unit_name_from_path_one ( " /waldo " , " .mount " , " waldo.mount " , 0 ) ;
test_unit_name_from_path_one ( " /waldo/quuix " , " .mount " , " waldo-quuix.mount " , 0 ) ;
test_unit_name_from_path_one ( " /waldo/quuix/ " , " .mount " , " waldo-quuix.mount " , 0 ) ;
test_unit_name_from_path_one ( " " , " .mount " , " -.mount " , 0 ) ;
test_unit_name_from_path_one ( " / " , " .mount " , " -.mount " , 0 ) ;
test_unit_name_from_path_one ( " /// " , " .mount " , " -.mount " , 0 ) ;
test_unit_name_from_path_one ( " /foo/../bar " , " .mount " , NULL , - EINVAL ) ;
test_unit_name_from_path_one ( " /foo/./bar " , " .mount " , NULL , - EINVAL ) ;
2015-04-30 21:21:00 +03:00
}
2016-01-26 21:48:29 +03:00
static void test_unit_name_from_path_instance_one ( const char * pattern , const char * path , const char * suffix , const char * expected , int ret ) {
2015-04-30 21:21:00 +03:00
_cleanup_free_ char * t = NULL ;
assert_se ( unit_name_from_path_instance ( pattern , path , suffix , & t ) = = ret ) ;
puts ( strna ( t ) ) ;
assert_se ( streq_ptr ( t , expected ) ) ;
if ( t ) {
_cleanup_free_ char * k = NULL , * v = NULL ;
assert_se ( unit_name_to_instance ( t , & k ) > 0 ) ;
assert_se ( unit_name_path_unescape ( k , & v ) = = 0 ) ;
assert_se ( path_equal ( v , isempty ( path ) ? " / " : path ) ) ;
2013-01-29 23:39:32 +04:00
}
2015-04-30 21:21:00 +03:00
}
2013-01-29 23:39:32 +04:00
2016-01-26 21:48:29 +03:00
static void test_unit_name_from_path_instance ( void ) {
2015-04-30 21:21:00 +03:00
puts ( " ------------------------------------------------- " ) ;
2012-06-22 15:08:48 +04:00
2016-01-26 21:48:29 +03:00
test_unit_name_from_path_instance_one ( " waldo " , " /waldo " , " .mount " , " waldo@waldo.mount " , 0 ) ;
test_unit_name_from_path_instance_one ( " waldo " , " /waldo////quuix//// " , " .mount " , " waldo@waldo-quuix.mount " , 0 ) ;
test_unit_name_from_path_instance_one ( " waldo " , " / " , " .mount " , " waldo@-.mount " , 0 ) ;
test_unit_name_from_path_instance_one ( " waldo " , " " , " .mount " , " waldo@-.mount " , 0 ) ;
test_unit_name_from_path_instance_one ( " waldo " , " /// " , " .mount " , " waldo@-.mount " , 0 ) ;
test_unit_name_from_path_instance_one ( " waldo " , " .. " , " .mount " , NULL , - EINVAL ) ;
test_unit_name_from_path_instance_one ( " waldo " , " /foo " , " .waldi " , NULL , - EINVAL ) ;
test_unit_name_from_path_instance_one ( " wa--ldo " , " /-- " , " .mount " , " wa--ldo@ \\ x2d \\ x2d.mount " , 0 ) ;
2015-04-30 21:21:00 +03:00
}
2016-01-26 21:48:29 +03:00
static void test_unit_name_to_path_one ( const char * unit , const char * path , int ret ) {
2015-04-30 21:21:00 +03:00
_cleanup_free_ char * p = NULL ;
assert_se ( unit_name_to_path ( unit , & p ) = = ret ) ;
assert_se ( streq_ptr ( path , p ) ) ;
}
2016-01-26 21:48:29 +03:00
static void test_unit_name_to_path ( void ) {
test_unit_name_to_path_one ( " home.mount " , " /home " , 0 ) ;
test_unit_name_to_path_one ( " home-lennart.mount " , " /home/lennart " , 0 ) ;
test_unit_name_to_path_one ( " home-lennart-.mount " , NULL , - EINVAL ) ;
test_unit_name_to_path_one ( " -home-lennart.mount " , NULL , - EINVAL ) ;
test_unit_name_to_path_one ( " -home--lennart.mount " , NULL , - EINVAL ) ;
test_unit_name_to_path_one ( " home-..-lennart.mount " , NULL , - EINVAL ) ;
test_unit_name_to_path_one ( " " , NULL , - EINVAL ) ;
test_unit_name_to_path_one ( " home/foo " , NULL , - EINVAL ) ;
2015-04-30 21:21:00 +03:00
}
2016-01-26 22:25:10 +03:00
static void test_unit_name_mangle_one ( UnitNameMangle allow_globs , const char * pattern , const char * expect , int ret ) {
2015-04-30 21:21:00 +03:00
_cleanup_free_ char * t = NULL ;
2016-01-26 22:25:10 +03:00
assert_se ( unit_name_mangle ( pattern , allow_globs , & t ) = = ret ) ;
2015-04-30 21:21:00 +03:00
puts ( strna ( t ) ) ;
assert_se ( streq_ptr ( t , expect ) ) ;
if ( t ) {
_cleanup_free_ char * k = NULL ;
2016-01-26 22:25:10 +03:00
assert_se ( unit_name_is_valid ( t , UNIT_NAME_ANY ) | |
( allow_globs = = UNIT_NAME_GLOB & & string_is_glob ( t ) ) ) ;
2015-04-30 21:21:00 +03:00
2016-01-26 22:25:10 +03:00
assert_se ( unit_name_mangle ( t , allow_globs , & k ) = = 0 ) ;
2015-04-30 21:21:00 +03:00
assert_se ( streq_ptr ( t , k ) ) ;
}
}
2016-01-26 21:48:29 +03:00
static void test_unit_name_mangle ( void ) {
2015-04-30 21:21:00 +03:00
puts ( " ------------------------------------------------- " ) ;
2016-01-26 22:25:10 +03:00
test_unit_name_mangle_one ( UNIT_NAME_NOGLOB , " foo.service " , " foo.service " , 0 ) ;
test_unit_name_mangle_one ( UNIT_NAME_NOGLOB , " /home " , " home.mount " , 1 ) ;
test_unit_name_mangle_one ( UNIT_NAME_NOGLOB , " /dev/sda " , " dev-sda.device " , 1 ) ;
test_unit_name_mangle_one ( UNIT_NAME_NOGLOB , " üxknürz.service " , " \\ xc3 \\ xbcxkn \\ xc3 \\ xbcrz.service " , 1 ) ;
test_unit_name_mangle_one ( UNIT_NAME_NOGLOB , " foobar-meh...waldi.service " , " foobar-meh...waldi.service " , 0 ) ;
test_unit_name_mangle_one ( UNIT_NAME_NOGLOB , " _____####----.....service " , " _____ \\ x23 \\ x23 \\ x23 \\ x23----.....service " , 1 ) ;
test_unit_name_mangle_one ( UNIT_NAME_NOGLOB , " _____##@;;;,,,##----.....service " , " _____ \\ x23 \\ x23@ \\ x3b \\ x3b \\ x3b \\ x2c \\ x2c \\ x2c \\ x23 \\ x23----.....service " , 1 ) ;
test_unit_name_mangle_one ( UNIT_NAME_NOGLOB , " xxx@@@@///// \\ \\ \\ \\ \\ yyy.service " , " xxx@@@@----- \\ \\ \\ \\ \\ yyy.service " , 1 ) ;
test_unit_name_mangle_one ( UNIT_NAME_NOGLOB , " " , NULL , - EINVAL ) ;
test_unit_name_mangle_one ( UNIT_NAME_GLOB , " foo.service " , " foo.service " , 0 ) ;
test_unit_name_mangle_one ( UNIT_NAME_GLOB , " foo " , " foo.service " , 1 ) ;
test_unit_name_mangle_one ( UNIT_NAME_GLOB , " foo* " , " foo* " , 0 ) ;
test_unit_name_mangle_one ( UNIT_NAME_GLOB , " ü* " , " \\ xc3 \\ xbc* " , 1 ) ;
2013-01-30 00:25:36 +04:00
}
2013-03-27 05:07:46 +04:00
static int test_unit_printf ( void ) {
2014-02-19 20:47:11 +04:00
Manager * m = NULL ;
2013-01-30 00:25:36 +04:00
Unit * u , * u2 ;
2013-02-07 02:35:53 +04:00
int r ;
2013-01-30 00:25:36 +04:00
core: simplify handling of %u, %U, %s and %h unit file specifiers
Previously, the %u, %U, %s and %h specifiers would resolve to the user
name, numeric user ID, shell and home directory of the user configured
in the User= setting of a unit file, or the user of the manager instance
if no User= setting was configured. That at least was the theory. In
real-life this was not ever actually useful:
- For the systemd --user instance it made no sense to ever set User=,
since the instance runs in user context after all, and hence the
privileges to change user IDs don't even exist. The four specifiers
were actually not useful at all in this case.
- For the systemd --system instance we did not allow any resolving that
would require NSS. Hence, %s and %h were not supported, unless
User=root was set, in which case they would be hardcoded to /bin/sh
and /root, to avoid NSS. Then, %u would actually resolve to whatever
was set with User=, but %U would only resolve to the numeric UID of
that setting if the User= was specified in numeric form, or happened
to be root (in which case 0 was hardcoded as mapping). Two of the
specifiers are entirely useless in this case, one is realistically
also useless, and one is pretty pointless.
- Resolving of these settings would only happen if User= was actually
set *before* the specifiers where resolved. This behaviour was
undocumented and is really ugly, as specifiers should actually be
considered something that applies to the whole file equally,
independently of order...
With this change, %u, %U, %s and %h are drastically simplified: they now
always refer to the user that is running the service instance, and the
user configured in the unit file is irrelevant. For the system instance
of systemd this means they always resolve to "root", "0", "/bin/sh" and
"/root", thus avoiding NSS. For the user instance, to the data for the
specific user.
The new behaviour is identical to the old behaviour in all --user cases
and for all units that have no User= set (or set to "0" or "root").
2015-11-01 00:12:51 +03:00
_cleanup_free_ char * mid = NULL , * bid = NULL , * host = NULL , * uid = NULL , * user = NULL , * shell = NULL , * home = NULL ;
2013-01-30 00:25:36 +04:00
2013-09-17 19:03:46 +04:00
assert_se ( specifier_machine_id ( ' m ' , NULL , NULL , & mid ) > = 0 & & mid ) ;
assert_se ( specifier_boot_id ( ' b ' , NULL , NULL , & bid ) > = 0 & & bid ) ;
core: simplify handling of %u, %U, %s and %h unit file specifiers
Previously, the %u, %U, %s and %h specifiers would resolve to the user
name, numeric user ID, shell and home directory of the user configured
in the User= setting of a unit file, or the user of the manager instance
if no User= setting was configured. That at least was the theory. In
real-life this was not ever actually useful:
- For the systemd --user instance it made no sense to ever set User=,
since the instance runs in user context after all, and hence the
privileges to change user IDs don't even exist. The four specifiers
were actually not useful at all in this case.
- For the systemd --system instance we did not allow any resolving that
would require NSS. Hence, %s and %h were not supported, unless
User=root was set, in which case they would be hardcoded to /bin/sh
and /root, to avoid NSS. Then, %u would actually resolve to whatever
was set with User=, but %U would only resolve to the numeric UID of
that setting if the User= was specified in numeric form, or happened
to be root (in which case 0 was hardcoded as mapping). Two of the
specifiers are entirely useless in this case, one is realistically
also useless, and one is pretty pointless.
- Resolving of these settings would only happen if User= was actually
set *before* the specifiers where resolved. This behaviour was
undocumented and is really ugly, as specifiers should actually be
considered something that applies to the whole file equally,
independently of order...
With this change, %u, %U, %s and %h are drastically simplified: they now
always refer to the user that is running the service instance, and the
user configured in the unit file is irrelevant. For the system instance
of systemd this means they always resolve to "root", "0", "/bin/sh" and
"/root", thus avoiding NSS. For the user instance, to the data for the
specific user.
The new behaviour is identical to the old behaviour in all --user cases
and for all units that have no User= set (or set to "0" or "root").
2015-11-01 00:12:51 +03:00
assert_se ( host = gethostname_malloc ( ) ) ;
assert_se ( user = getusername_malloc ( ) ) ;
assert_se ( asprintf ( & uid , UID_FMT , getuid ( ) ) ) ;
assert_se ( get_home_dir ( & home ) > = 0 ) ;
assert_se ( get_shell ( & shell ) > = 0 ) ;
2013-01-30 00:25:36 +04:00
2017-09-16 12:19:43 +03:00
r = manager_new ( UNIT_FILE_USER , MANAGER_TEST_RUN_MINIMAL , & m ) ;
2017-07-18 20:26:09 +03:00
if ( MANAGER_SKIP_TEST ( r ) ) {
log_notice_errno ( r , " Skipping test: manager_new: %m " ) ;
2013-03-27 05:07:46 +04:00
return EXIT_TEST_SKIP ;
2013-02-07 02:35:53 +04:00
}
2014-10-05 01:51:45 +04:00
assert_se ( r = = 0 ) ;
2013-01-30 00:25:36 +04:00
# define expect(unit, pattern, expected) \
{ \
2013-02-07 02:03:12 +04:00
char * e ; \
2014-11-19 18:43:41 +03:00
_cleanup_free_ char * t = NULL ; \
2013-09-17 19:03:46 +04:00
assert_se ( unit_full_printf ( unit , pattern , & t ) > = 0 ) ; \
2013-02-07 02:35:53 +04:00
printf ( " result: %s \n expect: %s \n " , t , expected ) ; \
2013-02-07 02:03:12 +04:00
if ( ( e = endswith ( expected , " * " ) ) ) \
2014-10-05 01:51:45 +04:00
assert_se ( strncmp ( t , e , e - expected ) ) ; \
2013-02-07 02:03:12 +04:00
else \
2014-10-05 01:51:45 +04:00
assert_se ( streq ( t , expected ) ) ; \
2013-01-30 00:25:36 +04:00
}
assert_se ( u = unit_new ( m , sizeof ( Service ) ) ) ;
assert_se ( unit_add_name ( u , " blah.service " ) = = 0 ) ;
assert_se ( unit_add_name ( u , " blah.service " ) = = 0 ) ;
/* general tests */
expect ( u , " %% " , " % " ) ;
expect ( u , " %%s " , " %s " ) ;
2017-09-14 20:51:20 +03:00
expect ( u , " %, " , " %, " ) ;
expect ( u , " % " , " % " ) ;
2013-01-30 00:25:36 +04:00
/* normal unit */
expect ( u , " %n " , " blah.service " ) ;
2014-12-11 19:58:40 +03:00
expect ( u , " %f " , " /blah " ) ;
2013-01-30 00:25:36 +04:00
expect ( u , " %N " , " blah " ) ;
expect ( u , " %p " , " blah " ) ;
expect ( u , " %P " , " blah " ) ;
expect ( u , " %i " , " " ) ;
core: simplify handling of %u, %U, %s and %h unit file specifiers
Previously, the %u, %U, %s and %h specifiers would resolve to the user
name, numeric user ID, shell and home directory of the user configured
in the User= setting of a unit file, or the user of the manager instance
if no User= setting was configured. That at least was the theory. In
real-life this was not ever actually useful:
- For the systemd --user instance it made no sense to ever set User=,
since the instance runs in user context after all, and hence the
privileges to change user IDs don't even exist. The four specifiers
were actually not useful at all in this case.
- For the systemd --system instance we did not allow any resolving that
would require NSS. Hence, %s and %h were not supported, unless
User=root was set, in which case they would be hardcoded to /bin/sh
and /root, to avoid NSS. Then, %u would actually resolve to whatever
was set with User=, but %U would only resolve to the numeric UID of
that setting if the User= was specified in numeric form, or happened
to be root (in which case 0 was hardcoded as mapping). Two of the
specifiers are entirely useless in this case, one is realistically
also useless, and one is pretty pointless.
- Resolving of these settings would only happen if User= was actually
set *before* the specifiers where resolved. This behaviour was
undocumented and is really ugly, as specifiers should actually be
considered something that applies to the whole file equally,
independently of order...
With this change, %u, %U, %s and %h are drastically simplified: they now
always refer to the user that is running the service instance, and the
user configured in the unit file is irrelevant. For the system instance
of systemd this means they always resolve to "root", "0", "/bin/sh" and
"/root", thus avoiding NSS. For the user instance, to the data for the
specific user.
The new behaviour is identical to the old behaviour in all --user cases
and for all units that have no User= set (or set to "0" or "root").
2015-11-01 00:12:51 +03:00
expect ( u , " %u " , user ) ;
expect ( u , " %U " , uid ) ;
expect ( u , " %h " , home ) ;
2013-01-30 00:25:36 +04:00
expect ( u , " %m " , mid ) ;
expect ( u , " %b " , bid ) ;
expect ( u , " %H " , host ) ;
2013-02-07 02:03:12 +04:00
expect ( u , " %t " , " /run/user/* " ) ;
2013-01-30 00:25:36 +04:00
/* templated */
assert_se ( u2 = unit_new ( m , sizeof ( Service ) ) ) ;
assert_se ( unit_add_name ( u2 , " blah@foo-foo.service " ) = = 0 ) ;
assert_se ( unit_add_name ( u2 , " blah@foo-foo.service " ) = = 0 ) ;
expect ( u2 , " %n " , " blah@foo-foo.service " ) ;
expect ( u2 , " %N " , " blah@foo-foo " ) ;
2014-12-11 19:58:40 +03:00
expect ( u2 , " %f " , " /foo/foo " ) ;
2013-01-30 00:25:36 +04:00
expect ( u2 , " %p " , " blah " ) ;
expect ( u2 , " %P " , " blah " ) ;
expect ( u2 , " %i " , " foo-foo " ) ;
expect ( u2 , " %I " , " foo/foo " ) ;
core: simplify handling of %u, %U, %s and %h unit file specifiers
Previously, the %u, %U, %s and %h specifiers would resolve to the user
name, numeric user ID, shell and home directory of the user configured
in the User= setting of a unit file, or the user of the manager instance
if no User= setting was configured. That at least was the theory. In
real-life this was not ever actually useful:
- For the systemd --user instance it made no sense to ever set User=,
since the instance runs in user context after all, and hence the
privileges to change user IDs don't even exist. The four specifiers
were actually not useful at all in this case.
- For the systemd --system instance we did not allow any resolving that
would require NSS. Hence, %s and %h were not supported, unless
User=root was set, in which case they would be hardcoded to /bin/sh
and /root, to avoid NSS. Then, %u would actually resolve to whatever
was set with User=, but %U would only resolve to the numeric UID of
that setting if the User= was specified in numeric form, or happened
to be root (in which case 0 was hardcoded as mapping). Two of the
specifiers are entirely useless in this case, one is realistically
also useless, and one is pretty pointless.
- Resolving of these settings would only happen if User= was actually
set *before* the specifiers where resolved. This behaviour was
undocumented and is really ugly, as specifiers should actually be
considered something that applies to the whole file equally,
independently of order...
With this change, %u, %U, %s and %h are drastically simplified: they now
always refer to the user that is running the service instance, and the
user configured in the unit file is irrelevant. For the system instance
of systemd this means they always resolve to "root", "0", "/bin/sh" and
"/root", thus avoiding NSS. For the user instance, to the data for the
specific user.
The new behaviour is identical to the old behaviour in all --user cases
and for all units that have no User= set (or set to "0" or "root").
2015-11-01 00:12:51 +03:00
expect ( u2 , " %u " , user ) ;
expect ( u2 , " %U " , uid ) ;
expect ( u2 , " %h " , home ) ;
2013-01-30 00:25:36 +04:00
expect ( u2 , " %m " , mid ) ;
expect ( u2 , " %b " , bid ) ;
expect ( u2 , " %H " , host ) ;
2013-02-07 02:03:12 +04:00
expect ( u2 , " %t " , " /run/user/* " ) ;
2013-03-27 05:07:46 +04:00
2013-07-12 16:04:39 +04:00
manager_free ( m ) ;
2014-12-13 17:12:38 +03:00
# undef expect
2013-07-12 16:04:39 +04:00
2013-03-27 05:07:46 +04:00
return 0 ;
2013-01-30 00:25:36 +04:00
}
2014-06-23 23:28:21 +04:00
static void test_unit_instance_is_valid ( void ) {
assert_se ( unit_instance_is_valid ( " fooBar " ) ) ;
assert_se ( unit_instance_is_valid ( " foo-bar " ) ) ;
assert_se ( unit_instance_is_valid ( " foo.stUff " ) ) ;
assert_se ( unit_instance_is_valid ( " fOo123.stuff " ) ) ;
assert_se ( unit_instance_is_valid ( " @f_oo123.Stuff " ) ) ;
assert_se ( ! unit_instance_is_valid ( " $¢£ " ) ) ;
assert_se ( ! unit_instance_is_valid ( " " ) ) ;
assert_se ( ! unit_instance_is_valid ( " foo bar " ) ) ;
assert_se ( ! unit_instance_is_valid ( " foo/bar " ) ) ;
}
static void test_unit_prefix_is_valid ( void ) {
assert_se ( unit_prefix_is_valid ( " fooBar " ) ) ;
assert_se ( unit_prefix_is_valid ( " foo-bar " ) ) ;
assert_se ( unit_prefix_is_valid ( " foo.stUff " ) ) ;
assert_se ( unit_prefix_is_valid ( " fOo123.stuff " ) ) ;
assert_se ( unit_prefix_is_valid ( " foo123.Stuff " ) ) ;
assert_se ( ! unit_prefix_is_valid ( " $¢£ " ) ) ;
assert_se ( ! unit_prefix_is_valid ( " " ) ) ;
assert_se ( ! unit_prefix_is_valid ( " foo bar " ) ) ;
assert_se ( ! unit_prefix_is_valid ( " foo/bar " ) ) ;
assert_se ( ! unit_prefix_is_valid ( " @foo-bar " ) ) ;
}
static void test_unit_name_change_suffix ( void ) {
2015-04-30 21:21:00 +03:00
char * t ;
2014-06-23 23:28:21 +04:00
2015-04-30 21:21:00 +03:00
assert_se ( unit_name_change_suffix ( " foo.mount " , " .service " , & t ) = = 0 ) ;
assert_se ( streq ( t , " foo.service " ) ) ;
free ( t ) ;
2014-06-23 23:28:21 +04:00
2015-04-30 21:21:00 +03:00
assert_se ( unit_name_change_suffix ( " foo@stuff.service " , " .socket " , & t ) = = 0 ) ;
assert_se ( streq ( t , " foo@stuff.socket " ) ) ;
free ( t ) ;
2014-06-23 23:28:21 +04:00
}
static void test_unit_name_build ( void ) {
2015-04-30 21:21:00 +03:00
char * t ;
2014-06-23 23:28:21 +04:00
2015-04-30 21:21:00 +03:00
assert_se ( unit_name_build ( " foo " , " bar " , " .service " , & t ) = = 0 ) ;
assert_se ( streq ( t , " foo@bar.service " ) ) ;
free ( t ) ;
2014-06-23 23:28:21 +04:00
2015-04-30 21:21:00 +03:00
assert_se ( unit_name_build ( " fo0-stUff_b " , " bar " , " .mount " , & t ) = = 0 ) ;
assert_se ( streq ( t , " fo0-stUff_b@bar.mount " ) ) ;
free ( t ) ;
2014-06-23 23:28:21 +04:00
2015-04-30 21:21:00 +03:00
assert_se ( unit_name_build ( " foo " , NULL , " .service " , & t ) = = 0 ) ;
assert_se ( streq ( t , " foo.service " ) ) ;
free ( t ) ;
2014-06-23 23:28:21 +04:00
}
2015-05-05 23:39:14 +03:00
static void test_slice_name_is_valid ( void ) {
assert_se ( slice_name_is_valid ( " -.slice " ) ) ;
assert_se ( slice_name_is_valid ( " foo.slice " ) ) ;
assert_se ( slice_name_is_valid ( " foo-bar.slice " ) ) ;
assert_se ( slice_name_is_valid ( " foo-bar-baz.slice " ) ) ;
assert_se ( ! slice_name_is_valid ( " -foo-bar-baz.slice " ) ) ;
assert_se ( ! slice_name_is_valid ( " foo-bar-baz-.slice " ) ) ;
assert_se ( ! slice_name_is_valid ( " -foo-bar-baz-.slice " ) ) ;
assert_se ( ! slice_name_is_valid ( " foo-bar--baz.slice " ) ) ;
assert_se ( ! slice_name_is_valid ( " foo--bar--baz.slice " ) ) ;
assert_se ( ! slice_name_is_valid ( " .slice " ) ) ;
assert_se ( ! slice_name_is_valid ( " " ) ) ;
assert_se ( ! slice_name_is_valid ( " foo.service " ) ) ;
}
2014-06-23 23:28:21 +04:00
static void test_build_subslice ( void ) {
char * a ;
char * b ;
2015-04-30 21:21:00 +03:00
assert_se ( slice_build_subslice ( " -.slice " , " foo " , & a ) > = 0 ) ;
assert_se ( slice_build_subslice ( a , " bar " , & b ) > = 0 ) ;
2014-06-23 23:28:21 +04:00
free ( a ) ;
2015-04-30 21:21:00 +03:00
assert_se ( slice_build_subslice ( b , " barfoo " , & a ) > = 0 ) ;
2014-06-23 23:28:21 +04:00
free ( b ) ;
2015-04-30 21:21:00 +03:00
assert_se ( slice_build_subslice ( a , " foobar " , & b ) > = 0 ) ;
2014-06-23 23:28:21 +04:00
free ( a ) ;
assert_se ( streq ( b , " foo-bar-barfoo-foobar.slice " ) ) ;
free ( b ) ;
2015-04-30 21:21:00 +03:00
assert_se ( slice_build_subslice ( " foo.service " , " bar " , & a ) < 0 ) ;
assert_se ( slice_build_subslice ( " foo " , " bar " , & a ) < 0 ) ;
2014-06-23 23:28:21 +04:00
}
2015-05-05 23:39:14 +03:00
static void test_build_parent_slice_one ( const char * name , const char * expect , int ret ) {
_cleanup_free_ char * s = NULL ;
assert_se ( slice_build_parent_slice ( name , & s ) = = ret ) ;
assert_se ( streq_ptr ( s , expect ) ) ;
}
static void test_build_parent_slice ( void ) {
test_build_parent_slice_one ( " -.slice " , NULL , 0 ) ;
test_build_parent_slice_one ( " foo.slice " , " -.slice " , 1 ) ;
test_build_parent_slice_one ( " foo-bar.slice " , " foo.slice " , 1 ) ;
test_build_parent_slice_one ( " foo-bar-baz.slice " , " foo-bar.slice " , 1 ) ;
test_build_parent_slice_one ( " foo-bar--baz.slice " , NULL , - EINVAL ) ;
test_build_parent_slice_one ( " -foo-bar.slice " , NULL , - EINVAL ) ;
test_build_parent_slice_one ( " foo-bar-.slice " , NULL , - EINVAL ) ;
test_build_parent_slice_one ( " foo-bar.service " , NULL , - EINVAL ) ;
test_build_parent_slice_one ( " .slice " , NULL , - EINVAL ) ;
}
2014-06-23 23:28:21 +04:00
static void test_unit_name_to_instance ( void ) {
char * instance ;
int r ;
r = unit_name_to_instance ( " foo@bar.service " , & instance ) ;
assert_se ( r > = 0 ) ;
assert_se ( streq ( instance , " bar " ) ) ;
free ( instance ) ;
2014-12-13 17:12:38 +03:00
r = unit_name_to_instance ( " foo@.service " , & instance ) ;
assert_se ( r > = 0 ) ;
assert_se ( streq ( instance , " " ) ) ;
free ( instance ) ;
2015-04-30 21:21:00 +03:00
r = unit_name_to_instance ( " fo0-stUff_b@b.service " , & instance ) ;
2014-06-23 23:28:21 +04:00
assert_se ( r > = 0 ) ;
assert_se ( streq ( instance , " b " ) ) ;
free ( instance ) ;
2015-04-30 21:21:00 +03:00
r = unit_name_to_instance ( " foo.service " , & instance ) ;
assert_se ( r = = 0 ) ;
2014-06-23 23:28:21 +04:00
assert_se ( ! instance ) ;
r = unit_name_to_instance ( " fooj@unk " , & instance ) ;
assert_se ( r < 0 ) ;
2014-12-13 17:12:38 +03:00
r = unit_name_to_instance ( " foo@ " , & instance ) ;
assert_se ( r < 0 ) ;
2014-06-23 23:28:21 +04:00
}
static void test_unit_name_escape ( void ) {
_cleanup_free_ char * r ;
r = unit_name_escape ( " ab+-c.a/bc@foo.service " ) ;
assert_se ( r ) ;
assert_se ( streq ( r , " ab \\ x2b \\ x2dc.a-bc \\ x40foo.service " ) ) ;
}
2014-12-13 17:12:38 +03:00
2015-04-30 21:21:00 +03:00
static void test_u_n_t_one ( const char * name , const char * expected , int ret ) {
_cleanup_free_ char * f = NULL ;
2014-12-13 17:12:38 +03:00
2015-04-30 21:21:00 +03:00
assert_se ( unit_name_template ( name , & f ) = = ret ) ;
printf ( " got: %s, expected: %s \n " , strna ( f ) , strna ( expected ) ) ;
assert_se ( streq_ptr ( f , expected ) ) ;
}
static void test_unit_name_template ( void ) {
test_u_n_t_one ( " foo@bar.service " , " foo@.service " , 0 ) ;
test_u_n_t_one ( " foo.mount " , NULL , - EINVAL ) ;
2014-12-13 17:12:38 +03:00
}
2015-05-05 23:39:14 +03:00
static void test_unit_name_path_unescape_one ( const char * name , const char * path , int ret ) {
_cleanup_free_ char * p = NULL ;
assert_se ( unit_name_path_unescape ( name , & p ) = = ret ) ;
assert_se ( streq_ptr ( path , p ) ) ;
}
static void test_unit_name_path_unescape ( void ) {
test_unit_name_path_unescape_one ( " foo " , " /foo " , 0 ) ;
test_unit_name_path_unescape_one ( " foo-bar " , " /foo/bar " , 0 ) ;
test_unit_name_path_unescape_one ( " foo-.bar " , " /foo/.bar " , 0 ) ;
test_unit_name_path_unescape_one ( " foo-bar-baz " , " /foo/bar/baz " , 0 ) ;
test_unit_name_path_unescape_one ( " - " , " / " , 0 ) ;
test_unit_name_path_unescape_one ( " -- " , NULL , - EINVAL ) ;
test_unit_name_path_unescape_one ( " -foo-bar " , NULL , - EINVAL ) ;
test_unit_name_path_unescape_one ( " foo--bar " , NULL , - EINVAL ) ;
test_unit_name_path_unescape_one ( " foo-bar- " , NULL , - EINVAL ) ;
test_unit_name_path_unescape_one ( " .-bar " , NULL , - EINVAL ) ;
test_unit_name_path_unescape_one ( " foo-.. " , NULL , - EINVAL ) ;
test_unit_name_path_unescape_one ( " " , NULL , - EINVAL ) ;
}
2013-01-30 00:25:36 +04:00
int main ( int argc , char * argv [ ] ) {
2017-07-18 20:26:09 +03:00
_cleanup_ ( rm_rf_physical_and_freep ) char * runtime_dir = NULL ;
2013-07-18 10:30:06 +04:00
int rc = 0 ;
2017-07-18 20:26:09 +03:00
log_parse_environment ( ) ;
log_open ( ) ;
tests: when running a manager object in a test, migrate to private cgroup subroot first (#6576)
Without this "meson test" will end up running all tests in the same
cgroup root, and they all will try to manage it. Which usually isn't too
bad, except when they end up clearing up each other's cgroups. This race
is hard to trigger but has caused various CI runs to fail spuriously.
With this change we simply move every test that runs a manager object
into their own private cgroup. Note that we don't clean up the cgroup at
the end, we leave that to the cgroup manager around it.
This fixes races that become visible by test runs throwing out errors
like this:
```
exec-systemcallfilter-failing.service: Passing 0 fds to service
exec-systemcallfilter-failing.service: About to execute: /bin/echo 'This should not be seen'
exec-systemcallfilter-failing.service: Forked /bin/echo as 5693
exec-systemcallfilter-failing.service: Changed dead -> start
exec-systemcallfilter-failing.service: Failed to attach to cgroup /exec-systemcallfilter-failing.service: No such file or directory
Received SIGCHLD from PID 5693 ((echo)).
Child 5693 ((echo)) died (code=exited, status=219/CGROUP)
exec-systemcallfilter-failing.service: Child 5693 belongs to exec-systemcallfilter-failing.service
exec-systemcallfilter-failing.service: Main process exited, code=exited, status=219/CGROUP
exec-systemcallfilter-failing.service: Changed start -> failed
exec-systemcallfilter-failing.service: Unit entered failed state.
exec-systemcallfilter-failing.service: Failed with result 'exit-code'.
exec-systemcallfilter-failing.service: cgroup is empty
Assertion 'service->main_exec_status.status == status_expected' failed at ../src/src/test/test-execute.c:71, function check(). Aborting.
```
BTW, I tracked this race down by using perf:
```
# perf record -e cgroup:cgroup_mkdir,cgroup_rmdir
…
# perf script
```
Thanks a lot @iaguis, @alban for helping me how to use perf for this.
Fixes #5895.
2017-08-09 16:42:49 +03:00
enter_cgroup_subroot ( ) ;
2017-07-18 20:26:09 +03:00
assert_se ( runtime_dir = setup_fake_runtime_dir ( ) ) ;
2015-04-30 21:21:00 +03:00
test_unit_name_is_valid ( ) ;
2016-01-26 21:48:29 +03:00
test_unit_name_replace_instance ( ) ;
test_unit_name_from_path ( ) ;
test_unit_name_from_path_instance ( ) ;
test_unit_name_mangle ( ) ;
test_unit_name_to_path ( ) ;
2013-07-18 10:30:06 +04:00
TEST_REQ_RUNNING_SYSTEMD ( rc = test_unit_printf ( ) ) ;
2014-06-23 23:28:21 +04:00
test_unit_instance_is_valid ( ) ;
test_unit_prefix_is_valid ( ) ;
test_unit_name_change_suffix ( ) ;
test_unit_name_build ( ) ;
2015-05-05 23:39:14 +03:00
test_slice_name_is_valid ( ) ;
2014-06-23 23:28:21 +04:00
test_build_subslice ( ) ;
2015-05-05 23:39:14 +03:00
test_build_parent_slice ( ) ;
2014-06-23 23:28:21 +04:00
test_unit_name_to_instance ( ) ;
test_unit_name_escape ( ) ;
2014-12-13 17:12:38 +03:00
test_unit_name_template ( ) ;
2015-05-05 23:39:14 +03:00
test_unit_name_path_unescape ( ) ;
2014-06-23 23:28:21 +04:00
2013-07-18 10:30:06 +04:00
return rc ;
2012-06-22 15:08:48 +04:00
}