406 lines
14 KiB
C
406 lines
14 KiB
C
/*-*- mode:c;indent-tabs-mode:nil;c-basic-offset:2;tab-width:8;coding:utf-8 -*-│
|
|
│vi: set net ft=c ts=2 sts=2 sw=2 fenc=utf-8 :vi│
|
|
╞══════════════════════════════════════════════════════════════════════════════╡
|
|
│ Copyright 2020 Justine Alexandra Roberts Tunney │
|
|
│ │
|
|
│ This program is free software; you can redistribute it and/or modify │
|
|
│ it under the terms of the GNU General Public License as published by │
|
|
│ the Free Software Foundation; version 2 of the License. │
|
|
│ │
|
|
│ This program is distributed in the hope that it will be useful, but │
|
|
│ WITHOUT ANY WARRANTY; without even the implied warranty of │
|
|
│ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU │
|
|
│ General Public License for more details. │
|
|
│ │
|
|
│ You should have received a copy of the GNU General Public License │
|
|
│ along with this program; if not, write to the Free Software │
|
|
│ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA │
|
|
│ 02110-1301 USA │
|
|
╚─────────────────────────────────────────────────────────────────────────────*/
|
|
#include "libc/alg/alg.h"
|
|
#include "libc/bits/bits.h"
|
|
#include "libc/bits/safemacros.internal.h"
|
|
#include "libc/calls/calls.h"
|
|
#include "libc/calls/hefty/spawn.h"
|
|
#include "libc/calls/struct/itimerval.h"
|
|
#include "libc/calls/struct/sigaction.h"
|
|
#include "libc/calls/struct/stat.h"
|
|
#include "libc/dce.h"
|
|
#include "libc/dns/dns.h"
|
|
#include "libc/errno.h"
|
|
#include "libc/fmt/conv.h"
|
|
#include "libc/fmt/fmt.h"
|
|
#include "libc/limits.h"
|
|
#include "libc/log/check.h"
|
|
#include "libc/log/log.h"
|
|
#include "libc/mem/mem.h"
|
|
#include "libc/runtime/gc.h"
|
|
#include "libc/runtime/runtime.h"
|
|
#include "libc/sock/ipclassify.internal.h"
|
|
#include "libc/sock/sock.h"
|
|
#include "libc/stdio/stdio.h"
|
|
#include "libc/str/str.h"
|
|
#include "libc/sysv/consts/af.h"
|
|
#include "libc/sysv/consts/ai.h"
|
|
#include "libc/sysv/consts/ex.h"
|
|
#include "libc/sysv/consts/exit.h"
|
|
#include "libc/sysv/consts/fileno.h"
|
|
#include "libc/sysv/consts/ipproto.h"
|
|
#include "libc/sysv/consts/itimer.h"
|
|
#include "libc/sysv/consts/o.h"
|
|
#include "libc/sysv/consts/shut.h"
|
|
#include "libc/sysv/consts/sig.h"
|
|
#include "libc/sysv/consts/sock.h"
|
|
#include "libc/time/time.h"
|
|
#include "libc/x/x.h"
|
|
#include "tool/build/runit.h"
|
|
|
|
/**
|
|
* @fileoverview Remote test runner.
|
|
*
|
|
* This is able to upload and run test binaries on remote operating
|
|
* systems with about 30 milliseconds of latency. It requires zero ops
|
|
* work too, since it deploys the ephemeral runit daemon via SSH upon
|
|
* ECONNREFUSED. That takes 10x longer (300 milliseconds). Further note
|
|
* there's no make -j race conditions here, thanks to SO_REUSEPORT.
|
|
*
|
|
* o/default/tool/build/runit.com \
|
|
* o/default/tool/build/runitd.com \
|
|
* o/default/test/libc/alg/qsort_test.com \
|
|
* freebsd.test.:31337:22
|
|
*
|
|
* The only thing that needs to be configured is /etc/hosts or Bind, to
|
|
* assign numbers to the officially reserved canned names. For example:
|
|
*
|
|
* 192.168.0.10 windows.test. windows
|
|
* 192.168.0.11 freebsd.test. freebsd
|
|
* 192.168.0.12 openbsd.test. openbsd
|
|
*
|
|
* Life is easiest if SSH public key authentication is configured too.
|
|
* It can be tuned as follows in ~/.ssh/config:
|
|
*
|
|
* host windows.test.
|
|
* user testacct
|
|
* host freebsd.test.
|
|
* user testacct
|
|
* host openbsd.test.
|
|
* user testacct
|
|
*
|
|
* Firewalls may need to be configured as well, to allow port tcp:31337
|
|
* from the local subnet. For example:
|
|
*
|
|
* iptables -L -vn
|
|
* iptables -I INPUT 1 -s 10.0.0.0/8 -p tcp --dport 31337 -j ACCEPT
|
|
* iptables -I INPUT 1 -s 192.168.0.0/16 -p tcp --dport 31337 -j ACCEPT
|
|
*
|
|
* If your system administrator blocks all ICMP, you'll likely encounter
|
|
* difficulties. Consider offering feedback to his/her manager and grand
|
|
* manager.
|
|
*
|
|
* Finally note this tool isn't designed for untrustworthy environments.
|
|
* It also isn't designed to process untrustworthy inputs.
|
|
*/
|
|
|
|
static const struct addrinfo kResolvHints = {.ai_family = AF_INET,
|
|
.ai_socktype = SOCK_STREAM,
|
|
.ai_protocol = IPPROTO_TCP};
|
|
|
|
int g_sock;
|
|
char *g_prog;
|
|
char *g_runitd;
|
|
jmp_buf g_jmpbuf;
|
|
uint16_t g_sshport;
|
|
uint16_t g_runitdport;
|
|
char g_ssh[PATH_MAX];
|
|
char g_hostname[128];
|
|
|
|
forceinline pureconst size_t GreatestTwoDivisor(size_t x) {
|
|
return x & (~x + 1);
|
|
}
|
|
|
|
wontreturn void ShowUsage(FILE *f, int rc) {
|
|
fprintf(f, "Usage: %s RUNITD PROGRAM HOSTNAME[:RUNITDPORT[:SSHPORT]]...\n",
|
|
program_invocation_name);
|
|
exit(rc);
|
|
unreachable;
|
|
}
|
|
|
|
void CheckExists(const char *path) {
|
|
if (!isregularfile(path)) {
|
|
fprintf(stderr, "error: %s: not found or irregular\n", path);
|
|
ShowUsage(stderr, EX_USAGE);
|
|
unreachable;
|
|
}
|
|
}
|
|
|
|
nodiscard char *MakeDeployScript(struct addrinfo *remotenic, size_t combytes) {
|
|
const char *ip4 = (const char *)&remotenic->ai_addr4->sin_addr;
|
|
return xasprintf("mkdir -p o/ &&\n"
|
|
"dd bs=%zu count=%zu of=o/runitd.$$.com 2>/dev/null &&\n"
|
|
"exec <&- &&\n"
|
|
"chmod +x o/runitd.$$.com &&\n"
|
|
"o/runitd.$$.com -rdl%hhu.%hhu.%hhu.%hhu -p %hu &&\n"
|
|
"rm -f o/runitd.$$.com\n",
|
|
GreatestTwoDivisor(combytes),
|
|
combytes ? combytes / GreatestTwoDivisor(combytes) : 0,
|
|
ip4[0], ip4[1], ip4[2], ip4[3], g_runitdport);
|
|
}
|
|
|
|
void Upload(int pipe, int fd, struct stat *st) {
|
|
int64_t i;
|
|
for (i = 0; i < st->st_size;) {
|
|
CHECK_GT(splice(fd, &i, pipe, NULL, st->st_size - i, 0), 0);
|
|
}
|
|
CHECK_NE(-1, close(fd));
|
|
}
|
|
|
|
void DeployEphemeralRunItDaemonRemotelyViaSsh(struct addrinfo *ai) {
|
|
size_t got;
|
|
struct stat st;
|
|
char linebuf[32];
|
|
int sshpid, wstatus, binfd, sshfds[3];
|
|
DEBUGF("spawning %s on %s:%hu", g_runitd, g_hostname, g_runitdport);
|
|
CHECK_NE(-1, (binfd = open(g_runitd, O_RDONLY | O_CLOEXEC)));
|
|
CHECK_NE(-1, fstat(binfd, &st));
|
|
sshfds[0] = -1;
|
|
sshfds[1] = -1;
|
|
sshfds[2] = STDERR_FILENO;
|
|
CHECK_NE(-1, (sshpid = spawnve(
|
|
0, sshfds, g_ssh,
|
|
(char *const[]){"ssh", "-C", "-p",
|
|
gc(xasprintf("%hu", g_sshport)), g_hostname,
|
|
gc(MakeDeployScript(ai, st.st_size)), NULL},
|
|
environ)));
|
|
Upload(sshfds[0], binfd, &st);
|
|
CHECK_NE(-1, close(sshfds[0]));
|
|
CHECK_NE(-1, (got = read(sshfds[1], linebuf, sizeof(linebuf))));
|
|
CHECK_GT(got, 0);
|
|
linebuf[sizeof(linebuf) - 1] = '\0';
|
|
if (strncmp(linebuf, "ready ", 6) != 0) {
|
|
FATALF("expected ready response but got %`'.*s", got, linebuf);
|
|
}
|
|
g_runitdport = (uint16_t)atoi(&linebuf[6]);
|
|
CHECK_NE(-1, close(sshfds[1]));
|
|
CHECK_NE(-1, waitpid(sshpid, &wstatus, 0));
|
|
CHECK_EQ(0, WEXITSTATUS(wstatus));
|
|
}
|
|
|
|
void SetDeadline(int micros) {
|
|
setitimer(ITIMER_REAL, &(const struct itimerval){{0, 0}, {0, micros}}, NULL);
|
|
}
|
|
|
|
void Connect(int attempt) {
|
|
int rc, olderr;
|
|
const char *ip4;
|
|
struct addrinfo *ai;
|
|
if ((rc = getaddrinfo(g_hostname, gc(xasprintf("%hu", g_runitdport)),
|
|
&kResolvHints, &ai)) != 0) {
|
|
FATALF("%s:%hu: EAI_%s %m", g_hostname, g_runitdport, eai2str(rc));
|
|
unreachable;
|
|
}
|
|
if (ispublicip(ai->ai_family, &ai->ai_addr4->sin_addr)) {
|
|
ip4 = (const char *)&ai->ai_addr4->sin_addr;
|
|
FATALF("%s points to %hhu.%hhu.%hhu.%hhu"
|
|
" which isn't part of a local/private/testing subnet",
|
|
g_hostname, ip4[0], ip4[1], ip4[2], ip4[3]);
|
|
unreachable;
|
|
}
|
|
CHECK_NE(-1, (g_sock = socket(ai->ai_family, ai->ai_socktype | SOCK_CLOEXEC,
|
|
ai->ai_protocol)));
|
|
SetDeadline(50000);
|
|
olderr = errno;
|
|
rc = connect(g_sock, ai->ai_addr, ai->ai_addrlen);
|
|
SetDeadline(0);
|
|
if (rc == -1) {
|
|
if (!attempt &&
|
|
(errno == ECONNREFUSED || errno == EHOSTUNREACH || errno == EINTR)) {
|
|
errno = olderr;
|
|
DeployEphemeralRunItDaemonRemotelyViaSsh(ai);
|
|
Connect(1);
|
|
} else if (errno == EINTR) {
|
|
fprintf(stderr, "%s(%s:%hu): %s\n", "connect", g_hostname, g_runitdport,
|
|
"offline, icmp misconfigured, or too slow; tune make HOSTS=...");
|
|
exit(1);
|
|
} else {
|
|
FATALF("%s(%s:%hu): %m", "connect", g_hostname, g_runitdport);
|
|
unreachable;
|
|
}
|
|
}
|
|
freeaddrinfo(ai);
|
|
}
|
|
|
|
void SendRequest(void) {
|
|
int fd;
|
|
int64_t off;
|
|
struct stat st;
|
|
const char *name;
|
|
unsigned char *hdr;
|
|
size_t progsize, namesize, hdrsize;
|
|
CHECK_NE(-1, (fd = open(g_prog, O_RDONLY)));
|
|
CHECK_NE(-1, fstat(fd, &st));
|
|
CHECK_LE((namesize = strlen((name = basename(g_prog)))), PATH_MAX);
|
|
CHECK_LE((progsize = st.st_size), INT_MAX);
|
|
CHECK_NOTNULL((hdr = gc(calloc(1, (hdrsize = 4 + 1 + 4 + 4 + namesize)))));
|
|
hdr[0 + 0] = (unsigned char)((unsigned)RUNITD_MAGIC >> 030);
|
|
hdr[0 + 1] = (unsigned char)((unsigned)RUNITD_MAGIC >> 020);
|
|
hdr[0 + 2] = (unsigned char)((unsigned)RUNITD_MAGIC >> 010);
|
|
hdr[0 + 3] = (unsigned char)((unsigned)RUNITD_MAGIC >> 000);
|
|
hdr[4 + 0] = kRunitExecute;
|
|
hdr[5 + 0] = (unsigned char)((unsigned)namesize >> 030);
|
|
hdr[5 + 1] = (unsigned char)((unsigned)namesize >> 020);
|
|
hdr[5 + 2] = (unsigned char)((unsigned)namesize >> 010);
|
|
hdr[5 + 3] = (unsigned char)((unsigned)namesize >> 000);
|
|
hdr[9 + 0] = (unsigned char)((unsigned)progsize >> 030);
|
|
hdr[9 + 1] = (unsigned char)((unsigned)progsize >> 020);
|
|
hdr[9 + 2] = (unsigned char)((unsigned)progsize >> 010);
|
|
hdr[9 + 3] = (unsigned char)((unsigned)progsize >> 000);
|
|
memcpy(&hdr[4 + 1 + 4 + 4], name, namesize);
|
|
CHECK_EQ(hdrsize, write(g_sock, hdr, hdrsize));
|
|
for (off = 0; off < progsize;) {
|
|
CHECK_GT(sendfile(g_sock, fd, &off, progsize - off), 0);
|
|
}
|
|
CHECK_NE(-1, shutdown(g_sock, SHUT_WR));
|
|
}
|
|
|
|
int ReadResponse(void) {
|
|
int res;
|
|
uint32_t size;
|
|
ssize_t rc;
|
|
size_t n, m;
|
|
unsigned char *p;
|
|
enum RunitCommand cmd;
|
|
static unsigned char msg[512];
|
|
res = -1;
|
|
for (;;) {
|
|
CHECK_NE(-1, (rc = recv(g_sock, msg, sizeof(msg), 0)));
|
|
p = &msg[0];
|
|
n = (size_t)rc;
|
|
if (!n) break;
|
|
do {
|
|
CHECK_GE(n, 4 + 1);
|
|
CHECK_EQ(RUNITD_MAGIC, READ32BE(p));
|
|
p += 4, n -= 4;
|
|
cmd = *p++, n--;
|
|
switch (cmd) {
|
|
case kRunitExit:
|
|
CHECK_GE(n, 1);
|
|
res = *p;
|
|
goto drop;
|
|
case kRunitStderr:
|
|
CHECK_GE(n, 4);
|
|
size = read32be(p), p += 4, n -= 4;
|
|
while (size) {
|
|
if (n) {
|
|
CHECK_NE(-1, (rc = write(STDERR_FILENO, p, min(n, size))));
|
|
CHECK_NE(0, (m = (size_t)rc));
|
|
p += m, n -= m, size -= m;
|
|
} else {
|
|
CHECK_NE(-1, (rc = recv(g_sock, msg, sizeof(msg), 0)));
|
|
p = &msg[0];
|
|
n = (size_t)rc;
|
|
if (!n) goto drop;
|
|
}
|
|
}
|
|
break;
|
|
default:
|
|
__die();
|
|
}
|
|
} while (n);
|
|
}
|
|
drop:
|
|
CHECK_NE(-1, close(g_sock));
|
|
return res;
|
|
}
|
|
|
|
int RunOnHost(char *spec) {
|
|
char *p;
|
|
for (p = spec; *p; ++p) {
|
|
if (*p == ':') *p = ' ';
|
|
}
|
|
CHECK_GE(sscanf(spec, "%100s %hu %hu", g_hostname, &g_runitdport, &g_sshport),
|
|
1);
|
|
if (!strchr(g_hostname, '.')) strcat(g_hostname, ".test.");
|
|
Connect(0);
|
|
SendRequest();
|
|
return ReadResponse();
|
|
}
|
|
|
|
bool IsParallelBuild(void) {
|
|
const char *makeflags;
|
|
return (makeflags = getenv("MAKEFLAGS")) && strstr(makeflags, "-j");
|
|
}
|
|
|
|
bool ShouldRunInParralel(void) {
|
|
return !IsWindows() && IsParallelBuild();
|
|
}
|
|
|
|
int RunRemoteTestsInSerial(char *hosts[], int count) {
|
|
int i, exitcode;
|
|
for (i = 0; i < count; ++i) {
|
|
if ((exitcode = RunOnHost(hosts[i]))) {
|
|
return exitcode;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
void OnInterrupt(int sig) {
|
|
static bool once;
|
|
if (!once) {
|
|
once = true;
|
|
gclongjmp(g_jmpbuf, 128 + sig);
|
|
} else {
|
|
abort();
|
|
}
|
|
}
|
|
|
|
int RunRemoteTestsInParallel(char *hosts[], int count) {
|
|
const struct sigaction onsigterm = {.sa_handler = (void *)OnInterrupt};
|
|
struct sigaction onsigint = {.sa_handler = (void *)OnInterrupt};
|
|
int i, rc, exitcode;
|
|
int64_t leader, *pids;
|
|
leader = getpid();
|
|
pids = gc(xcalloc(count, sizeof(char *)));
|
|
if (!(exitcode = setjmp(g_jmpbuf))) {
|
|
sigaction(SIGINT, &onsigint, NULL);
|
|
sigaction(SIGTERM, &onsigterm, NULL);
|
|
for (i = 0; i < count; ++i) {
|
|
CHECK_NE(-1, (pids[i] = fork()));
|
|
if (!pids[i]) {
|
|
return RunOnHost(hosts[i]);
|
|
}
|
|
}
|
|
for (i = 0; i < count; ++i) {
|
|
CHECK_NE(-1, waitpid(pids[i], &rc, 0));
|
|
exitcode |= WEXITSTATUS(rc);
|
|
}
|
|
} else if (getpid() == leader) {
|
|
onsigint.sa_handler = SIG_IGN;
|
|
sigaction(SIGINT, &onsigint, NULL);
|
|
kill(0, SIGINT);
|
|
while (waitpid(-1, NULL, 0) > 0) donothing;
|
|
}
|
|
return exitcode;
|
|
}
|
|
|
|
int main(int argc, char *argv[]) {
|
|
showcrashreports();
|
|
g_loglevel = kLogDebug;
|
|
const struct sigaction onsigalrm = {.sa_handler = (void *)missingno};
|
|
if (argc > 1 &&
|
|
(strcmp(argv[1], "-h") == 0 || strcmp(argv[1], "--help") == 0)) {
|
|
ShowUsage(stdout, 0);
|
|
unreachable;
|
|
}
|
|
if (argc < 1 + 2) ShowUsage(stderr, EX_USAGE);
|
|
CHECK_NOTNULL(commandv(firstnonnull(getenv("SSH"), "ssh"), g_ssh));
|
|
CheckExists((g_runitd = argv[1]));
|
|
CheckExists((g_prog = argv[2]));
|
|
if (argc == 1 + 2) return 0; /* hosts list empty */
|
|
sigaction(SIGALRM, &onsigalrm, NULL);
|
|
g_sshport = 22;
|
|
g_runitdport = RUNITD_PORT;
|
|
return (ShouldRunInParralel() ? RunRemoteTestsInParallel
|
|
: RunRemoteTestsInSerial)(&argv[3], argc - 3);
|
|
}
|