2014-02-07 13:08:32 -06:00
|
|
|
// Copyright 2012-2013-2014 The Rust Project Developers. See the COPYRIGHT
|
2013-05-03 18:08:43 -05:00
|
|
|
// file at the top-level directory of this distribution and at
|
|
|
|
// http://rust-lang.org/COPYRIGHT.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
|
|
|
|
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
|
|
|
|
// option. This file may not be copied, modified, or distributed
|
|
|
|
// except according to those terms.
|
|
|
|
|
2014-02-07 13:08:32 -06:00
|
|
|
// ignore-fast
|
2013-05-03 18:08:43 -05:00
|
|
|
// compile-flags:--test
|
|
|
|
|
|
|
|
// NB: These tests kill child processes. Valgrind sees these children as leaking
|
|
|
|
// memory, which makes for some *confusing* logs. That's why these are here
|
2013-05-20 19:07:24 -05:00
|
|
|
// instead of in std.
|
2013-05-03 18:08:43 -05:00
|
|
|
|
2013-05-24 21:35:29 -05:00
|
|
|
use std::libc;
|
|
|
|
use std::run;
|
|
|
|
use std::str;
|
2013-11-11 00:46:32 -06:00
|
|
|
use std::io;
|
2013-05-03 18:08:43 -05:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_destroy_once() {
|
2013-11-14 17:34:54 -06:00
|
|
|
#[cfg(not(target_os="android"))]
|
|
|
|
static PROG: &'static str = "echo";
|
|
|
|
#[cfg(target_os="android")]
|
|
|
|
static PROG: &'static str = "ls"; // android don't have echo binary
|
|
|
|
|
2014-01-30 13:56:51 -06:00
|
|
|
let mut p = run::Process::new(PROG, [], run::ProcessOptions::new()).unwrap();
|
2013-05-03 18:08:43 -05:00
|
|
|
p.destroy(); // this shouldn't crash (and nor should the destructor)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_destroy_twice() {
|
2013-11-14 17:34:54 -06:00
|
|
|
#[cfg(not(target_os="android"))]
|
|
|
|
static PROG: &'static str = "echo";
|
|
|
|
#[cfg(target_os="android")]
|
|
|
|
static PROG: &'static str = "ls"; // android don't have echo binary
|
|
|
|
|
2014-01-30 13:56:51 -06:00
|
|
|
let mut p = match run::Process::new(PROG, [], run::ProcessOptions::new()) {
|
|
|
|
Ok(p) => p,
|
|
|
|
Err(e) => fail!("wut: {}", e),
|
|
|
|
};
|
2013-05-03 18:08:43 -05:00
|
|
|
p.destroy(); // this shouldnt crash...
|
2014-01-30 13:56:51 -06:00
|
|
|
p.destroy(); // ...and nor should this (and nor should the destructor)
|
2013-05-03 18:08:43 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn test_destroy_actually_kills(force: bool) {
|
|
|
|
|
2013-11-07 04:22:18 -06:00
|
|
|
#[cfg(unix,not(target_os="android"))]
|
2013-05-03 18:08:43 -05:00
|
|
|
static BLOCK_COMMAND: &'static str = "cat";
|
|
|
|
|
2013-11-07 04:22:18 -06:00
|
|
|
#[cfg(unix,target_os="android")]
|
|
|
|
static BLOCK_COMMAND: &'static str = "/system/bin/cat";
|
|
|
|
|
2013-05-03 18:08:43 -05:00
|
|
|
#[cfg(windows)]
|
|
|
|
static BLOCK_COMMAND: &'static str = "cmd";
|
|
|
|
|
2013-06-17 04:50:29 -05:00
|
|
|
#[cfg(unix,not(target_os="android"))]
|
2013-05-03 18:08:43 -05:00
|
|
|
fn process_exists(pid: libc::pid_t) -> bool {
|
2013-12-12 08:07:43 -06:00
|
|
|
let run::ProcessOutput {output, ..} = run::process_output("ps", [~"-p", pid.to_str()])
|
2014-01-30 13:56:51 -06:00
|
|
|
.unwrap();
|
2013-12-23 10:45:01 -06:00
|
|
|
str::from_utf8_owned(output).unwrap().contains(pid.to_str())
|
2013-05-03 18:08:43 -05:00
|
|
|
}
|
|
|
|
|
2013-06-17 04:50:29 -05:00
|
|
|
#[cfg(unix,target_os="android")]
|
|
|
|
fn process_exists(pid: libc::pid_t) -> bool {
|
2013-12-12 08:07:43 -06:00
|
|
|
let run::ProcessOutput {output, ..} = run::process_output("/system/bin/ps", [pid.to_str()])
|
2014-01-30 13:56:51 -06:00
|
|
|
.unwrap();
|
2013-12-23 10:45:01 -06:00
|
|
|
str::from_utf8_owned(output).unwrap().contains(~"root")
|
2013-06-17 04:50:29 -05:00
|
|
|
}
|
|
|
|
|
2013-05-03 18:08:43 -05:00
|
|
|
#[cfg(windows)]
|
|
|
|
fn process_exists(pid: libc::pid_t) -> bool {
|
2013-05-20 19:07:24 -05:00
|
|
|
use std::libc::types::os::arch::extra::DWORD;
|
|
|
|
use std::libc::funcs::extra::kernel32::{CloseHandle, GetExitCodeProcess, OpenProcess};
|
|
|
|
use std::libc::consts::os::extra::{FALSE, PROCESS_QUERY_INFORMATION, STILL_ACTIVE };
|
2013-05-03 18:08:43 -05:00
|
|
|
|
|
|
|
unsafe {
|
2013-10-28 17:22:49 -05:00
|
|
|
let process = OpenProcess(PROCESS_QUERY_INFORMATION, FALSE, pid as DWORD);
|
|
|
|
if process.is_null() {
|
2013-05-03 18:08:43 -05:00
|
|
|
return false;
|
|
|
|
}
|
2013-10-28 17:22:49 -05:00
|
|
|
// process will be non-null if the process is alive, or if it died recently
|
2013-05-03 18:08:43 -05:00
|
|
|
let mut status = 0;
|
2013-10-28 17:22:49 -05:00
|
|
|
GetExitCodeProcess(process, &mut status);
|
|
|
|
CloseHandle(process);
|
2013-05-03 18:08:43 -05:00
|
|
|
return status == STILL_ACTIVE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-12 07:58:00 -05:00
|
|
|
// this process will stay alive indefinitely trying to read from stdin
|
2013-12-12 08:07:43 -06:00
|
|
|
let mut p = run::Process::new(BLOCK_COMMAND, [], run::ProcessOptions::new())
|
2014-01-30 13:56:51 -06:00
|
|
|
.unwrap();
|
2013-05-03 18:08:43 -05:00
|
|
|
|
|
|
|
assert!(process_exists(p.get_id()));
|
|
|
|
|
|
|
|
if force {
|
|
|
|
p.force_destroy();
|
|
|
|
} else {
|
|
|
|
p.destroy();
|
|
|
|
}
|
|
|
|
|
|
|
|
assert!(!process_exists(p.get_id()));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_unforced_destroy_actually_kills() {
|
|
|
|
test_destroy_actually_kills(false);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_forced_destroy_actually_kills() {
|
|
|
|
test_destroy_actually_kills(true);
|
|
|
|
}
|