dailidong
5 years ago
102 changed files with 3430 additions and 268 deletions
@ -0,0 +1,27 @@
|
||||
#!/bin/bash |
||||
# |
||||
# Licensed to the Apache Software Foundation (ASF) under one or more |
||||
# contributor license agreements. See the NOTICE file distributed with |
||||
# this work for additional information regarding copyright ownership. |
||||
# The ASF licenses this file to You under the Apache License, Version 2.0 |
||||
# (the "License"); you may not use this file except in compliance with |
||||
# the License. You may obtain a copy of the License at |
||||
# |
||||
# http://www.apache.org/licenses/LICENSE-2.0 |
||||
# |
||||
# Unless required by applicable law or agreed to in writing, software |
||||
# distributed under the License is distributed on an "AS IS" BASIS, |
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
# See the License for the specific language governing permissions and |
||||
# limitations under the License. |
||||
# |
||||
|
||||
set -e |
||||
|
||||
if [ "$(ps -ef | grep java | grep -c $1)" -eq 0 ]; then |
||||
echo "[ERROR] $1 process not exits." |
||||
exit 1 |
||||
else |
||||
echo "[INFO] $1 process exits." |
||||
exit 0 |
||||
fi |
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,286 @@
|
||||
/* |
||||
* Licensed to the Apache Software Foundation (ASF) under one or more |
||||
* contributor license agreements. See the NOTICE file distributed with |
||||
* this work for additional information regarding copyright ownership. |
||||
* The ASF licenses this file to You under the Apache License, Version 2.0 |
||||
* (the "License"); you may not use this file except in compliance with |
||||
* the License. You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
package org.apache.dolphinscheduler.common.utils.process; |
||||
|
||||
import com.sun.jna.platform.win32.Kernel32Util; |
||||
|
||||
import java.util.*; |
||||
|
||||
final class ProcessEnvironmentForWin32 extends HashMap<String,String> { |
||||
|
||||
private static final long serialVersionUID = -8017839552603542824L; |
||||
|
||||
private static String validateName(String name) { |
||||
// An initial `=' indicates a magic Windows variable name -- OK
|
||||
if (name.indexOf('=', 1) != -1 || |
||||
name.indexOf('\u0000') != -1) |
||||
throw new IllegalArgumentException |
||||
("Invalid environment variable name: \"" + name + "\""); |
||||
return name; |
||||
} |
||||
|
||||
private static String validateValue(String value) { |
||||
if (value.indexOf('\u0000') != -1) |
||||
throw new IllegalArgumentException |
||||
("Invalid environment variable value: \"" + value + "\""); |
||||
return value; |
||||
} |
||||
|
||||
private static String nonNullString(Object o) { |
||||
if (o == null) |
||||
throw new NullPointerException(); |
||||
return (String) o; |
||||
} |
||||
|
||||
public String put(String key, String value) { |
||||
return super.put(validateName(key), validateValue(value)); |
||||
} |
||||
|
||||
public String get(Object key) { |
||||
return super.get(nonNullString(key)); |
||||
} |
||||
|
||||
public boolean containsKey(Object key) { |
||||
return super.containsKey(nonNullString(key)); |
||||
} |
||||
|
||||
public boolean containsValue(Object value) { |
||||
return super.containsValue(nonNullString(value)); |
||||
} |
||||
|
||||
public String remove(Object key) { |
||||
return super.remove(nonNullString(key)); |
||||
} |
||||
|
||||
private static class CheckedEntry implements Entry<String,String> { |
||||
private final Entry<String,String> e; |
||||
public CheckedEntry(Entry<String,String> e) {this.e = e;} |
||||
public String getKey() { return e.getKey();} |
||||
public String getValue() { return e.getValue();} |
||||
public String setValue(String value) { |
||||
return e.setValue(validateValue(value)); |
||||
} |
||||
public String toString() { return getKey() + "=" + getValue();} |
||||
public boolean equals(Object o) {return e.equals(o);} |
||||
public int hashCode() {return e.hashCode();} |
||||
} |
||||
|
||||
private static class CheckedEntrySet extends AbstractSet<Entry<String,String>> { |
||||
private final Set<Entry<String,String>> s; |
||||
public CheckedEntrySet(Set<Entry<String,String>> s) {this.s = s;} |
||||
public int size() {return s.size();} |
||||
public boolean isEmpty() {return s.isEmpty();} |
||||
public void clear() { s.clear();} |
||||
public Iterator<Entry<String,String>> iterator() { |
||||
return new Iterator<Entry<String,String>>() { |
||||
Iterator<Entry<String,String>> i = s.iterator(); |
||||
public boolean hasNext() { return i.hasNext();} |
||||
public Entry<String,String> next() { |
||||
return new CheckedEntry(i.next()); |
||||
} |
||||
public void remove() { i.remove();} |
||||
}; |
||||
} |
||||
private static Entry<String,String> checkedEntry(Object o) { |
||||
@SuppressWarnings("unchecked") |
||||
Entry<String,String> e = (Entry<String,String>) o; |
||||
nonNullString(e.getKey()); |
||||
nonNullString(e.getValue()); |
||||
return e; |
||||
} |
||||
public boolean contains(Object o) {return s.contains(checkedEntry(o));} |
||||
public boolean remove(Object o) {return s.remove(checkedEntry(o));} |
||||
} |
||||
|
||||
private static class CheckedValues extends AbstractCollection<String> { |
||||
private final Collection<String> c; |
||||
public CheckedValues(Collection<String> c) {this.c = c;} |
||||
public int size() {return c.size();} |
||||
public boolean isEmpty() {return c.isEmpty();} |
||||
public void clear() { c.clear();} |
||||
public Iterator<String> iterator() {return c.iterator();} |
||||
public boolean contains(Object o) {return c.contains(nonNullString(o));} |
||||
public boolean remove(Object o) {return c.remove(nonNullString(o));} |
||||
} |
||||
|
||||
private static class CheckedKeySet extends AbstractSet<String> { |
||||
private final Set<String> s; |
||||
public CheckedKeySet(Set<String> s) {this.s = s;} |
||||
public int size() {return s.size();} |
||||
public boolean isEmpty() {return s.isEmpty();} |
||||
public void clear() { s.clear();} |
||||
public Iterator<String> iterator() {return s.iterator();} |
||||
public boolean contains(Object o) {return s.contains(nonNullString(o));} |
||||
public boolean remove(Object o) {return s.remove(nonNullString(o));} |
||||
} |
||||
|
||||
public Set<String> keySet() { |
||||
return new CheckedKeySet(super.keySet()); |
||||
} |
||||
|
||||
public Collection<String> values() { |
||||
return new CheckedValues(super.values()); |
||||
} |
||||
|
||||
public Set<Entry<String,String>> entrySet() { |
||||
return new CheckedEntrySet(super.entrySet()); |
||||
} |
||||
|
||||
private static final class NameComparator implements Comparator<String> { |
||||
public int compare(String s1, String s2) { |
||||
// We can't use String.compareToIgnoreCase since it
|
||||
// canonicalizes to lower case, while Windows
|
||||
// canonicalizes to upper case! For example, "_" should
|
||||
// sort *after* "Z", not before.
|
||||
int n1 = s1.length(); |
||||
int n2 = s2.length(); |
||||
int min = Math.min(n1, n2); |
||||
for (int i = 0; i < min; i++) { |
||||
char c1 = s1.charAt(i); |
||||
char c2 = s2.charAt(i); |
||||
if (c1 != c2) { |
||||
c1 = Character.toUpperCase(c1); |
||||
c2 = Character.toUpperCase(c2); |
||||
if (c1 != c2) |
||||
// No overflow because of numeric promotion
|
||||
return c1 - c2; |
||||
} |
||||
} |
||||
return n1 - n2; |
||||
} |
||||
} |
||||
|
||||
private static final class EntryComparator implements Comparator<Entry<String,String>> { |
||||
public int compare(Entry<String,String> e1, |
||||
Entry<String,String> e2) { |
||||
return nameComparator.compare(e1.getKey(), e2.getKey()); |
||||
} |
||||
} |
||||
|
||||
// Allow `=' as first char in name, e.g. =C:=C:\DIR
|
||||
static final int MIN_NAME_LENGTH = 1; |
||||
|
||||
private static final NameComparator nameComparator; |
||||
private static final EntryComparator entryComparator; |
||||
private static final ProcessEnvironmentForWin32 theEnvironment; |
||||
private static final Map<String,String> theUnmodifiableEnvironment; |
||||
private static final Map<String,String> theCaseInsensitiveEnvironment; |
||||
|
||||
static { |
||||
nameComparator = new NameComparator(); |
||||
entryComparator = new EntryComparator(); |
||||
theEnvironment = new ProcessEnvironmentForWin32(); |
||||
theUnmodifiableEnvironment = Collections.unmodifiableMap(theEnvironment); |
||||
|
||||
theEnvironment.putAll(environmentBlock()); |
||||
|
||||
theCaseInsensitiveEnvironment = new TreeMap<>(nameComparator); |
||||
theCaseInsensitiveEnvironment.putAll(theEnvironment); |
||||
} |
||||
|
||||
private ProcessEnvironmentForWin32() { |
||||
super(); |
||||
} |
||||
|
||||
private ProcessEnvironmentForWin32(int capacity) { |
||||
super(capacity); |
||||
} |
||||
|
||||
// Only for use by System.getenv(String)
|
||||
static String getenv(String name) { |
||||
// The original implementation used a native call to _wgetenv,
|
||||
// but it turns out that _wgetenv is only consistent with
|
||||
// GetEnvironmentStringsW (for non-ASCII) if `wmain' is used
|
||||
// instead of `main', even in a process created using
|
||||
// CREATE_UNICODE_ENVIRONMENT. Instead we perform the
|
||||
// case-insensitive comparison ourselves. At least this
|
||||
// guarantees that System.getenv().get(String) will be
|
||||
// consistent with System.getenv(String).
|
||||
return theCaseInsensitiveEnvironment.get(name); |
||||
} |
||||
|
||||
// Only for use by System.getenv()
|
||||
static Map<String,String> getenv() { |
||||
return theUnmodifiableEnvironment; |
||||
} |
||||
|
||||
// Only for use by ProcessBuilder.environment()
|
||||
@SuppressWarnings("unchecked") |
||||
static Map<String,String> environment() { |
||||
return (Map<String,String>) theEnvironment.clone(); |
||||
} |
||||
|
||||
// Only for use by ProcessBuilder.environment(String[] envp)
|
||||
static Map<String,String> emptyEnvironment(int capacity) { |
||||
return new ProcessEnvironmentForWin32(capacity); |
||||
} |
||||
|
||||
private static Map<String, String> environmentBlock() { |
||||
return Kernel32Util.getEnvironmentVariables(); |
||||
} |
||||
|
||||
// Only for use by ProcessImpl.start()
|
||||
String toEnvironmentBlock() { |
||||
// Sort Unicode-case-insensitively by name
|
||||
List<Entry<String,String>> list = new ArrayList<>(entrySet()); |
||||
Collections.sort(list, entryComparator); |
||||
|
||||
StringBuilder sb = new StringBuilder(size()*30); |
||||
int cmp = -1; |
||||
|
||||
// Some versions of MSVCRT.DLL require SystemRoot to be set.
|
||||
// So, we make sure that it is always set, even if not provided
|
||||
// by the caller.
|
||||
final String SYSTEMROOT = "SystemRoot"; |
||||
|
||||
for (Entry<String,String> e : list) { |
||||
String key = e.getKey(); |
||||
String value = e.getValue(); |
||||
if (cmp < 0 && (cmp = nameComparator.compare(key, SYSTEMROOT)) > 0) { |
||||
// Not set, so add it here
|
||||
addToEnvIfSet(sb, SYSTEMROOT); |
||||
} |
||||
addToEnv(sb, key, value); |
||||
} |
||||
if (cmp < 0) { |
||||
// Got to end of list and still not found
|
||||
addToEnvIfSet(sb, SYSTEMROOT); |
||||
} |
||||
if (sb.length() == 0) { |
||||
// Environment was empty and SystemRoot not set in parent
|
||||
sb.append('\u0000'); |
||||
} |
||||
// Block is double NUL terminated
|
||||
sb.append('\u0000'); |
||||
return sb.toString(); |
||||
} |
||||
|
||||
// add the environment variable to the child, if it exists in parent
|
||||
private static void addToEnvIfSet(StringBuilder sb, String name) { |
||||
String s = getenv(name); |
||||
if (s != null) |
||||
addToEnv(sb, name, s); |
||||
} |
||||
|
||||
private static void addToEnv(StringBuilder sb, String name, String val) { |
||||
sb.append(name).append('=').append(val).append('\u0000'); |
||||
} |
||||
|
||||
static String toEnvironmentBlock(Map<String,String> map) { |
||||
return map == null ? null : ((ProcessEnvironmentForWin32)map).toEnvironmentBlock(); |
||||
} |
||||
} |
@ -0,0 +1,785 @@
|
||||
/* |
||||
* Licensed to the Apache Software Foundation (ASF) under one or more |
||||
* contributor license agreements. See the NOTICE file distributed with |
||||
* this work for additional information regarding copyright ownership. |
||||
* The ASF licenses this file to You under the Apache License, Version 2.0 |
||||
* (the "License"); you may not use this file except in compliance with |
||||
* the License. You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
package org.apache.dolphinscheduler.common.utils.process; |
||||
|
||||
import com.sun.jna.Pointer; |
||||
import com.sun.jna.platform.win32.*; |
||||
import com.sun.jna.ptr.IntByReference; |
||||
import java.lang.reflect.Field; |
||||
import org.apache.dolphinscheduler.common.utils.OSUtils; |
||||
import sun.security.action.GetPropertyAction; |
||||
|
||||
import java.io.*; |
||||
import java.security.AccessController; |
||||
import java.security.PrivilegedAction; |
||||
import java.util.ArrayList; |
||||
import java.util.Locale; |
||||
import java.util.concurrent.TimeUnit; |
||||
import java.util.regex.Matcher; |
||||
import java.util.regex.Pattern; |
||||
|
||||
import static com.sun.jna.platform.win32.WinBase.STILL_ACTIVE; |
||||
import static java.util.Objects.requireNonNull; |
||||
|
||||
public class ProcessImplForWin32 extends Process { |
||||
|
||||
private static final Field FD_HANDLE; |
||||
|
||||
static { |
||||
if (!OSUtils.isWindows()) { |
||||
throw new RuntimeException("ProcessImplForWin32 can be only initialized in " + |
||||
"Windows environment, but current OS is " + OSUtils.getOSName()); |
||||
} |
||||
|
||||
try { |
||||
FD_HANDLE = requireNonNull(FileDescriptor.class.getDeclaredField("handle")); |
||||
FD_HANDLE.setAccessible(true); |
||||
} catch (NoSuchFieldException e) { |
||||
throw new RuntimeException(e); |
||||
} |
||||
} |
||||
|
||||
private static final int PIPE_SIZE = 4096 + 24; |
||||
|
||||
private static final int HANDLE_STORAGE_SIZE = 6; |
||||
|
||||
private static final int OFFSET_READ = 0; |
||||
|
||||
private static final int OFFSET_WRITE = 1; |
||||
|
||||
private static final WinNT.HANDLE JAVA_INVALID_HANDLE_VALUE = new WinNT.HANDLE(Pointer.createConstant(-1)); |
||||
|
||||
private static void setHandle(FileDescriptor obj, long handle) { |
||||
try { |
||||
FD_HANDLE.set(obj, handle); |
||||
} catch (IllegalAccessException e) { |
||||
throw new RuntimeException(e); |
||||
} |
||||
} |
||||
|
||||
private static long getHandle(FileDescriptor obj) { |
||||
try { |
||||
return (Long) FD_HANDLE.get(obj); |
||||
} catch (IllegalAccessException e) { |
||||
throw new RuntimeException(e); |
||||
} |
||||
} |
||||
|
||||
/** |
||||
* Open a file for writing. If {@code append} is {@code true} then the file |
||||
* is opened for atomic append directly and a FileOutputStream constructed |
||||
* with the resulting handle. This is because a FileOutputStream created |
||||
* to append to a file does not open the file in a manner that guarantees |
||||
* that writes by the child process will be atomic. |
||||
*/ |
||||
private static FileOutputStream newFileOutputStream(File f, boolean append) |
||||
throws IOException |
||||
{ |
||||
if (append) { |
||||
String path = f.getPath(); |
||||
SecurityManager sm = System.getSecurityManager(); |
||||
if (sm != null) |
||||
sm.checkWrite(path); |
||||
long handle = openForAtomicAppend(path); |
||||
final FileDescriptor fd = new FileDescriptor(); |
||||
setHandle(fd, handle); |
||||
return AccessController.doPrivileged( |
||||
new PrivilegedAction<FileOutputStream>() { |
||||
public FileOutputStream run() { |
||||
return new FileOutputStream(fd); |
||||
} |
||||
} |
||||
); |
||||
} else { |
||||
return new FileOutputStream(f); |
||||
} |
||||
} |
||||
|
||||
// System-dependent portion of ProcessBuilderForWindows.start()
|
||||
static Process start(String username, |
||||
String password, |
||||
String cmdarray[], |
||||
java.util.Map<String,String> environment, |
||||
String dir, |
||||
ProcessBuilderForWin32.Redirect[] redirects, |
||||
boolean redirectErrorStream) |
||||
throws IOException |
||||
{ |
||||
String envblock = ProcessEnvironmentForWin32.toEnvironmentBlock(environment); |
||||
|
||||
FileInputStream f0 = null; |
||||
FileOutputStream f1 = null; |
||||
FileOutputStream f2 = null; |
||||
|
||||
try { |
||||
long[] stdHandles; |
||||
if (redirects == null) { |
||||
stdHandles = new long[] { -1L, -1L, -1L }; |
||||
} else { |
||||
stdHandles = new long[3]; |
||||
|
||||
if (redirects[0] == ProcessBuilderForWin32.Redirect.PIPE) |
||||
stdHandles[0] = -1L; |
||||
else if (redirects[0] == ProcessBuilderForWin32.Redirect.INHERIT) |
||||
stdHandles[0] = getHandle(FileDescriptor.in); |
||||
else { |
||||
f0 = new FileInputStream(redirects[0].file()); |
||||
stdHandles[0] = getHandle(f0.getFD()); |
||||
} |
||||
|
||||
if (redirects[1] == ProcessBuilderForWin32.Redirect.PIPE) |
||||
stdHandles[1] = -1L; |
||||
else if (redirects[1] == ProcessBuilderForWin32.Redirect.INHERIT) |
||||
stdHandles[1] = getHandle(FileDescriptor.out); |
||||
else { |
||||
f1 = newFileOutputStream(redirects[1].file(), |
||||
redirects[1].append()); |
||||
stdHandles[1] = getHandle(f1.getFD()); |
||||
} |
||||
|
||||
if (redirects[2] == ProcessBuilderForWin32.Redirect.PIPE) |
||||
stdHandles[2] = -1L; |
||||
else if (redirects[2] == ProcessBuilderForWin32.Redirect.INHERIT) |
||||
stdHandles[2] = getHandle(FileDescriptor.err); |
||||
else { |
||||
f2 = newFileOutputStream(redirects[2].file(), |
||||
redirects[2].append()); |
||||
stdHandles[2] = getHandle(f2.getFD()); |
||||
} |
||||
} |
||||
|
||||
return new ProcessImplForWin32(username, password, cmdarray, envblock, dir, stdHandles, redirectErrorStream); |
||||
} finally { |
||||
// In theory, close() can throw IOException
|
||||
// (although it is rather unlikely to happen here)
|
||||
try { if (f0 != null) f0.close(); } |
||||
finally { |
||||
try { if (f1 != null) f1.close(); } |
||||
finally { if (f2 != null) f2.close(); } |
||||
} |
||||
} |
||||
|
||||
} |
||||
|
||||
private static class LazyPattern { |
||||
// Escape-support version:
|
||||
// "(\")((?:\\\\\\1|.)+?)\\1|([^\\s\"]+)";
|
||||
private static final Pattern PATTERN = |
||||
Pattern.compile("[^\\s\"]+|\"[^\"]*\""); |
||||
}; |
||||
|
||||
/* Parses the command string parameter into the executable name and |
||||
* program arguments. |
||||
* |
||||
* The command string is broken into tokens. The token separator is a space |
||||
* or quota character. The space inside quotation is not a token separator. |
||||
* There are no escape sequences. |
||||
*/ |
||||
private static String[] getTokensFromCommand(String command) { |
||||
ArrayList<String> matchList = new ArrayList<>(8); |
||||
Matcher regexMatcher = ProcessImplForWin32.LazyPattern.PATTERN.matcher(command); |
||||
while (regexMatcher.find()) |
||||
matchList.add(regexMatcher.group()); |
||||
return matchList.toArray(new String[matchList.size()]); |
||||
} |
||||
|
||||
private static final int VERIFICATION_CMD_BAT = 0; |
||||
private static final int VERIFICATION_WIN32 = 1; |
||||
private static final int VERIFICATION_WIN32_SAFE = 2; // inside quotes not allowed
|
||||
private static final int VERIFICATION_LEGACY = 3; |
||||
// See Command shell overview for documentation of special characters.
|
||||
// https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-xp/bb490954(v=technet.10)
|
||||
private static final char ESCAPE_VERIFICATION[][] = { |
||||
// We guarantee the only command file execution for implicit [cmd.exe] run.
|
||||
// http://technet.microsoft.com/en-us/library/bb490954.aspx
|
||||
{' ', '\t', '<', '>', '&', '|', '^'}, |
||||
{' ', '\t', '<', '>'}, |
||||
{' ', '\t', '<', '>'}, |
||||
{' ', '\t'} |
||||
}; |
||||
|
||||
private static String createCommandLine(int verificationType, |
||||
final String executablePath, |
||||
final String cmd[]) |
||||
{ |
||||
StringBuilder cmdbuf = new StringBuilder(80); |
||||
|
||||
cmdbuf.append(executablePath); |
||||
|
||||
for (int i = 1; i < cmd.length; ++i) { |
||||
cmdbuf.append(' '); |
||||
String s = cmd[i]; |
||||
if (needsEscaping(verificationType, s)) { |
||||
cmdbuf.append('"'); |
||||
|
||||
if (verificationType == VERIFICATION_WIN32_SAFE) { |
||||
// Insert the argument, adding '\' to quote any interior quotes
|
||||
int length = s.length(); |
||||
for (int j = 0; j < length; j++) { |
||||
char c = s.charAt(j); |
||||
if (c == DOUBLEQUOTE) { |
||||
int count = countLeadingBackslash(verificationType, s, j); |
||||
while (count-- > 0) { |
||||
cmdbuf.append(BACKSLASH); // double the number of backslashes
|
||||
} |
||||
cmdbuf.append(BACKSLASH); // backslash to quote the quote
|
||||
} |
||||
cmdbuf.append(c); |
||||
} |
||||
} else { |
||||
cmdbuf.append(s); |
||||
} |
||||
// The code protects the [java.exe] and console command line
|
||||
// parser, that interprets the [\"] combination as an escape
|
||||
// sequence for the ["] char.
|
||||
// http://msdn.microsoft.com/en-us/library/17w5ykft.aspx
|
||||
//
|
||||
// If the argument is an FS path, doubling of the tail [\]
|
||||
// char is not a problem for non-console applications.
|
||||
//
|
||||
// The [\"] sequence is not an escape sequence for the [cmd.exe]
|
||||
// command line parser. The case of the [""] tail escape
|
||||
// sequence could not be realized due to the argument validation
|
||||
// procedure.
|
||||
int count = countLeadingBackslash(verificationType, s, s.length()); |
||||
while (count-- > 0) { |
||||
cmdbuf.append(BACKSLASH); // double the number of backslashes
|
||||
} |
||||
cmdbuf.append('"'); |
||||
} else { |
||||
cmdbuf.append(s); |
||||
} |
||||
} |
||||
return cmdbuf.toString(); |
||||
} |
||||
|
||||
/** |
||||
* Return the argument without quotes (1st and last) if present, else the arg. |
||||
* @param str a string |
||||
* @return the string without 1st and last quotes |
||||
*/ |
||||
private static String unQuote(String str) { |
||||
int len = str.length(); |
||||
return (len >= 2 && str.charAt(0) == DOUBLEQUOTE && str.charAt(len - 1) == DOUBLEQUOTE) |
||||
? str.substring(1, len - 1) |
||||
: str; |
||||
} |
||||
|
||||
private static boolean needsEscaping(int verificationType, String arg) { |
||||
// Switch off MS heuristic for internal ["].
|
||||
// Please, use the explicit [cmd.exe] call
|
||||
// if you need the internal ["].
|
||||
// Example: "cmd.exe", "/C", "Extended_MS_Syntax"
|
||||
|
||||
// For [.exe] or [.com] file the unpaired/internal ["]
|
||||
// in the argument is not a problem.
|
||||
String unquotedArg = unQuote(arg); |
||||
boolean argIsQuoted = !arg.equals(unquotedArg); |
||||
boolean embeddedQuote = unquotedArg.indexOf(DOUBLEQUOTE) >= 0; |
||||
|
||||
switch (verificationType) { |
||||
case VERIFICATION_CMD_BAT: |
||||
if (embeddedQuote) { |
||||
throw new IllegalArgumentException("Argument has embedded quote, " + |
||||
"use the explicit CMD.EXE call."); |
||||
} |
||||
break; // break determine whether to quote
|
||||
case VERIFICATION_WIN32_SAFE: |
||||
if (argIsQuoted && embeddedQuote) { |
||||
throw new IllegalArgumentException("Malformed argument has embedded quote: " |
||||
+ unquotedArg); |
||||
} |
||||
break; |
||||
default: |
||||
break; |
||||
} |
||||
|
||||
if (!argIsQuoted) { |
||||
char testEscape[] = ESCAPE_VERIFICATION[verificationType]; |
||||
for (int i = 0; i < testEscape.length; ++i) { |
||||
if (arg.indexOf(testEscape[i]) >= 0) { |
||||
return true; |
||||
} |
||||
} |
||||
} |
||||
return false; |
||||
} |
||||
|
||||
private static String getExecutablePath(String path) |
||||
throws IOException |
||||
{ |
||||
String name = unQuote(path); |
||||
if (name.indexOf(DOUBLEQUOTE) >= 0) { |
||||
throw new IllegalArgumentException("Executable name has embedded quote, " + |
||||
"split the arguments: " + name); |
||||
} |
||||
// Win32 CreateProcess requires path to be normalized
|
||||
File fileToRun = new File(name); |
||||
|
||||
// From the [CreateProcess] function documentation:
|
||||
//
|
||||
// "If the file name does not contain an extension, .exe is appended.
|
||||
// Therefore, if the file name extension is .com, this parameter
|
||||
// must include the .com extension. If the file name ends in
|
||||
// a period (.) with no extension, or if the file name contains a path,
|
||||
// .exe is not appended."
|
||||
//
|
||||
// "If the file name !does not contain a directory path!,
|
||||
// the system searches for the executable file in the following
|
||||
// sequence:..."
|
||||
//
|
||||
// In practice ANY non-existent path is extended by [.exe] extension
|
||||
// in the [CreateProcess] function with the only exception:
|
||||
// the path ends by (.)
|
||||
|
||||
return fileToRun.getPath(); |
||||
} |
||||
|
||||
/** |
||||
* An executable is any program that is an EXE or does not have an extension |
||||
* and the Windows createProcess will be looking for .exe. |
||||
* The comparison is case insensitive based on the name. |
||||
* @param executablePath the executable file |
||||
* @return true if the path ends in .exe or does not have an extension. |
||||
*/ |
||||
private boolean isExe(String executablePath) { |
||||
File file = new File(executablePath); |
||||
String upName = file.getName().toUpperCase(Locale.ROOT); |
||||
return (upName.endsWith(".EXE") || upName.indexOf('.') < 0); |
||||
} |
||||
|
||||
// Old version that can be bypassed
|
||||
private boolean isShellFile(String executablePath) { |
||||
String upPath = executablePath.toUpperCase(); |
||||
return (upPath.endsWith(".CMD") || upPath.endsWith(".BAT")); |
||||
} |
||||
|
||||
private String quoteString(String arg) { |
||||
StringBuilder argbuf = new StringBuilder(arg.length() + 2); |
||||
return argbuf.append('"').append(arg).append('"').toString(); |
||||
} |
||||
|
||||
// Count backslashes before start index of string.
|
||||
// .bat files don't include backslashes as part of the quote
|
||||
private static int countLeadingBackslash(int verificationType, |
||||
CharSequence input, int start) { |
||||
if (verificationType == VERIFICATION_CMD_BAT) |
||||
return 0; |
||||
int j; |
||||
for (j = start - 1; j >= 0 && input.charAt(j) == BACKSLASH; j--) { |
||||
// just scanning backwards
|
||||
} |
||||
return (start - 1) - j; // number of BACKSLASHES
|
||||
} |
||||
|
||||
private static final char DOUBLEQUOTE = '\"'; |
||||
private static final char BACKSLASH = '\\'; |
||||
|
||||
private WinNT.HANDLE handle; |
||||
private OutputStream stdin_stream; |
||||
private InputStream stdout_stream; |
||||
private InputStream stderr_stream; |
||||
|
||||
private ProcessImplForWin32( |
||||
String username, |
||||
String password, |
||||
String cmd[], |
||||
final String envblock, |
||||
final String path, |
||||
final long[] stdHandles, |
||||
final boolean redirectErrorStream) |
||||
throws IOException |
||||
{ |
||||
String cmdstr; |
||||
final SecurityManager security = System.getSecurityManager(); |
||||
GetPropertyAction action = new GetPropertyAction("jdk.lang.Process.allowAmbiguousCommands", |
||||
(security == null) ? "true" : "false"); |
||||
final boolean allowAmbiguousCommands = !"false".equalsIgnoreCase(action.run()); |
||||
if (allowAmbiguousCommands && security == null) { |
||||
// Legacy mode.
|
||||
|
||||
// Normalize path if possible.
|
||||
String executablePath = new File(cmd[0]).getPath(); |
||||
|
||||
// No worry about internal, unpaired ["], and redirection/piping.
|
||||
if (needsEscaping(VERIFICATION_LEGACY, executablePath) ) |
||||
executablePath = quoteString(executablePath); |
||||
|
||||
cmdstr = createCommandLine( |
||||
//legacy mode doesn't worry about extended verification
|
||||
VERIFICATION_LEGACY, |
||||
executablePath, |
||||
cmd); |
||||
} else { |
||||
String executablePath; |
||||
try { |
||||
executablePath = getExecutablePath(cmd[0]); |
||||
} catch (IllegalArgumentException e) { |
||||
// Workaround for the calls like
|
||||
// Runtime.getRuntime().exec("\"C:\\Program Files\\foo\" bar")
|
||||
|
||||
// No chance to avoid CMD/BAT injection, except to do the work
|
||||
// right from the beginning. Otherwise we have too many corner
|
||||
// cases from
|
||||
// Runtime.getRuntime().exec(String[] cmd [, ...])
|
||||
// calls with internal ["] and escape sequences.
|
||||
|
||||
// Restore original command line.
|
||||
StringBuilder join = new StringBuilder(); |
||||
// terminal space in command line is ok
|
||||
for (String s : cmd) |
||||
join.append(s).append(' '); |
||||
|
||||
// Parse the command line again.
|
||||
cmd = getTokensFromCommand(join.toString()); |
||||
executablePath = getExecutablePath(cmd[0]); |
||||
|
||||
// Check new executable name once more
|
||||
if (security != null) |
||||
security.checkExec(executablePath); |
||||
} |
||||
|
||||
// Quotation protects from interpretation of the [path] argument as
|
||||
// start of longer path with spaces. Quotation has no influence to
|
||||
// [.exe] extension heuristic.
|
||||
boolean isShell = allowAmbiguousCommands ? isShellFile(executablePath) |
||||
: !isExe(executablePath); |
||||
cmdstr = createCommandLine( |
||||
// We need the extended verification procedures
|
||||
isShell ? VERIFICATION_CMD_BAT |
||||
: (allowAmbiguousCommands ? VERIFICATION_WIN32 : VERIFICATION_WIN32_SAFE), |
||||
quoteString(executablePath), |
||||
cmd); |
||||
} |
||||
|
||||
handle = create(username, password, cmdstr, envblock, path, stdHandles, redirectErrorStream); |
||||
|
||||
AccessController.doPrivileged( |
||||
new PrivilegedAction<Void>() { |
||||
public Void run() { |
||||
if (stdHandles[0] == -1L) |
||||
stdin_stream = ProcessBuilderForWin32.NullOutputStream.INSTANCE; |
||||
else { |
||||
FileDescriptor stdin_fd = new FileDescriptor(); |
||||
setHandle(stdin_fd, stdHandles[0]); |
||||
stdin_stream = new BufferedOutputStream( |
||||
new FileOutputStream(stdin_fd)); |
||||
} |
||||
|
||||
if (stdHandles[1] == -1L) |
||||
stdout_stream = ProcessBuilderForWin32.NullInputStream.INSTANCE; |
||||
else { |
||||
FileDescriptor stdout_fd = new FileDescriptor(); |
||||
setHandle(stdout_fd, stdHandles[1]); |
||||
stdout_stream = new BufferedInputStream( |
||||
new FileInputStream(stdout_fd)); |
||||
} |
||||
|
||||
if (stdHandles[2] == -1L) |
||||
stderr_stream = ProcessBuilderForWin32.NullInputStream.INSTANCE; |
||||
else { |
||||
FileDescriptor stderr_fd = new FileDescriptor(); |
||||
setHandle(stderr_fd, stdHandles[2]); |
||||
stderr_stream = new FileInputStream(stderr_fd); |
||||
} |
||||
|
||||
return null; }}); |
||||
} |
||||
|
||||
public OutputStream getOutputStream() { |
||||
return stdin_stream; |
||||
} |
||||
|
||||
public InputStream getInputStream() { |
||||
return stdout_stream; |
||||
} |
||||
|
||||
public InputStream getErrorStream() { |
||||
return stderr_stream; |
||||
} |
||||
|
||||
protected void finalize() { |
||||
closeHandle(handle); |
||||
} |
||||
|
||||
public int exitValue() { |
||||
int exitCode = getExitCodeProcess(handle); |
||||
if (exitCode == STILL_ACTIVE) |
||||
throw new IllegalThreadStateException("process has not exited"); |
||||
return exitCode; |
||||
} |
||||
|
||||
public int waitFor() throws InterruptedException { |
||||
waitForInterruptibly(handle); |
||||
if (Thread.interrupted()) |
||||
throw new InterruptedException(); |
||||
return exitValue(); |
||||
} |
||||
|
||||
@Override |
||||
public boolean waitFor(long timeout, TimeUnit unit) |
||||
throws InterruptedException |
||||
{ |
||||
if (getExitCodeProcess(handle) != STILL_ACTIVE) return true; |
||||
if (timeout <= 0) return false; |
||||
|
||||
long remainingNanos = unit.toNanos(timeout); |
||||
long deadline = System.nanoTime() + remainingNanos ; |
||||
|
||||
do { |
||||
// Round up to next millisecond
|
||||
long msTimeout = TimeUnit.NANOSECONDS.toMillis(remainingNanos + 999_999L); |
||||
waitForTimeoutInterruptibly(handle, msTimeout); |
||||
if (Thread.interrupted()) |
||||
throw new InterruptedException(); |
||||
if (getExitCodeProcess(handle) != STILL_ACTIVE) { |
||||
return true; |
||||
} |
||||
remainingNanos = deadline - System.nanoTime(); |
||||
} while (remainingNanos > 0); |
||||
|
||||
return (getExitCodeProcess(handle) != STILL_ACTIVE); |
||||
} |
||||
|
||||
public void destroy() { terminateProcess(handle); } |
||||
|
||||
public Process destroyForcibly() { |
||||
destroy(); |
||||
return this; |
||||
} |
||||
|
||||
public boolean isAlive() { |
||||
return isProcessAlive(handle); |
||||
} |
||||
|
||||
private static boolean initHolder(WinNT.HANDLEByReference pjhandles, |
||||
WinNT.HANDLEByReference[] pipe, |
||||
int offset, |
||||
WinNT.HANDLEByReference phStd) { |
||||
if (!pjhandles.getValue().equals(JAVA_INVALID_HANDLE_VALUE)) { |
||||
phStd.setValue(pjhandles.getValue()); |
||||
pjhandles.setValue(JAVA_INVALID_HANDLE_VALUE); |
||||
} else { |
||||
if (!Kernel32.INSTANCE.CreatePipe(pipe[0], pipe[1], null, PIPE_SIZE)) { |
||||
throw new Win32Exception(Kernel32.INSTANCE.GetLastError()); |
||||
} else { |
||||
WinNT.HANDLE thisProcessEnd = offset == OFFSET_READ ? pipe[1].getValue() : pipe[0].getValue(); |
||||
phStd.setValue(pipe[offset].getValue()); |
||||
pjhandles.setValue(thisProcessEnd); |
||||
} |
||||
} |
||||
Kernel32.INSTANCE.SetHandleInformation(phStd.getValue(), Kernel32.HANDLE_FLAG_INHERIT, Kernel32.HANDLE_FLAG_INHERIT); |
||||
return true; |
||||
} |
||||
|
||||
private static void releaseHolder(boolean complete, WinNT.HANDLEByReference[] pipe, int offset) { |
||||
closeHandle(pipe[offset].getValue()); |
||||
if (complete) { |
||||
closeHandle(pipe[offset == OFFSET_READ ? OFFSET_WRITE : OFFSET_READ].getValue()); |
||||
} |
||||
} |
||||
|
||||
private static void prepareIOEHandleState(WinNT.HANDLE[] stdIOE, Boolean[] inherit) { |
||||
for(int i = 0; i < HANDLE_STORAGE_SIZE; ++i) { |
||||
WinNT.HANDLE hstd = stdIOE[i]; |
||||
if (!Kernel32.INVALID_HANDLE_VALUE.equals(hstd)) { |
||||
inherit[i] = Boolean.TRUE; |
||||
Kernel32.INSTANCE.SetHandleInformation(hstd, Kernel32.HANDLE_FLAG_INHERIT, 0); |
||||
} |
||||
} |
||||
} |
||||
|
||||
private static void restoreIOEHandleState(WinNT.HANDLE[] stdIOE, Boolean[] inherit) { |
||||
for (int i = HANDLE_STORAGE_SIZE - 1; i >= 0; --i) { |
||||
if (!Kernel32.INVALID_HANDLE_VALUE.equals(stdIOE[i])) { |
||||
Kernel32.INSTANCE.SetHandleInformation(stdIOE[i], Kernel32.HANDLE_FLAG_INHERIT, inherit[i] ? Kernel32.HANDLE_FLAG_INHERIT : 0); |
||||
} |
||||
} |
||||
} |
||||
|
||||
private static WinNT.HANDLE processCreate(String username, |
||||
String password, |
||||
String cmd, |
||||
final String envblock, |
||||
final String path, |
||||
final WinNT.HANDLEByReference[] stdHandles, |
||||
final boolean redirectErrorStream) { |
||||
WinNT.HANDLE ret = new WinNT.HANDLE(Pointer.createConstant(0)); |
||||
|
||||
WinNT.HANDLE[] stdIOE = new WinNT.HANDLE[] { |
||||
Kernel32.INVALID_HANDLE_VALUE, Kernel32.INVALID_HANDLE_VALUE, Kernel32.INVALID_HANDLE_VALUE, |
||||
stdHandles[0].getValue(), stdHandles[1].getValue(), stdHandles[2].getValue() |
||||
}; |
||||
stdIOE[0] = Kernel32.INSTANCE.GetStdHandle(Kernel32.STD_INPUT_HANDLE); |
||||
stdIOE[1] = Kernel32.INSTANCE.GetStdHandle(Kernel32.STD_OUTPUT_HANDLE); |
||||
stdIOE[2] = Kernel32.INSTANCE.GetStdHandle(Kernel32.STD_ERROR_HANDLE); |
||||
|
||||
Boolean[] inherit = new Boolean[] { |
||||
Boolean.FALSE, Boolean.FALSE, Boolean.FALSE, |
||||
Boolean.FALSE, Boolean.FALSE, Boolean.FALSE |
||||
}; |
||||
|
||||
prepareIOEHandleState(stdIOE, inherit); |
||||
|
||||
// input
|
||||
WinNT.HANDLEByReference hStdInput = new WinNT.HANDLEByReference(); |
||||
WinNT.HANDLEByReference[] pipeIn = new WinNT.HANDLEByReference[] { |
||||
new WinNT.HANDLEByReference(Kernel32.INVALID_HANDLE_VALUE), new WinNT.HANDLEByReference(Kernel32.INVALID_HANDLE_VALUE) }; |
||||
|
||||
// output
|
||||
WinNT.HANDLEByReference hStdOutput = new WinNT.HANDLEByReference(); |
||||
WinNT.HANDLEByReference[] pipeOut = new WinNT.HANDLEByReference[] { |
||||
new WinNT.HANDLEByReference(Kernel32.INVALID_HANDLE_VALUE), new WinNT.HANDLEByReference(Kernel32.INVALID_HANDLE_VALUE) }; |
||||
|
||||
// error
|
||||
WinNT.HANDLEByReference hStdError = new WinNT.HANDLEByReference(); |
||||
WinNT.HANDLEByReference[] pipeError = new WinNT.HANDLEByReference[] { |
||||
new WinNT.HANDLEByReference(Kernel32.INVALID_HANDLE_VALUE), new WinNT.HANDLEByReference(Kernel32.INVALID_HANDLE_VALUE) }; |
||||
|
||||
boolean success; |
||||
if (initHolder(stdHandles[0], pipeIn, OFFSET_READ, hStdInput)) { |
||||
if (initHolder(stdHandles[1], pipeOut, OFFSET_WRITE, hStdOutput)) { |
||||
WinBase.STARTUPINFO si = new WinBase.STARTUPINFO(); |
||||
si.hStdInput = hStdInput.getValue(); |
||||
si.hStdOutput = hStdOutput.getValue(); |
||||
|
||||
if (redirectErrorStream) { |
||||
si.hStdError = si.hStdOutput; |
||||
stdHandles[2].setValue(JAVA_INVALID_HANDLE_VALUE); |
||||
success = true; |
||||
} else { |
||||
success = initHolder(stdHandles[2], pipeError, OFFSET_WRITE, hStdError); |
||||
si.hStdError = hStdError.getValue(); |
||||
} |
||||
|
||||
if (success) { |
||||
WTypes.LPSTR lpEnvironment = envblock == null ? new WTypes.LPSTR() : new WTypes.LPSTR(envblock); |
||||
Kernel32.PROCESS_INFORMATION pi = new WinBase.PROCESS_INFORMATION(); |
||||
si.dwFlags = Kernel32.STARTF_USESTDHANDLES; |
||||
if (!Advapi32.INSTANCE.CreateProcessWithLogonW( |
||||
username |
||||
, null |
||||
, password |
||||
, Advapi32.LOGON_WITH_PROFILE |
||||
, null |
||||
, cmd |
||||
, Kernel32.CREATE_NO_WINDOW |
||||
, lpEnvironment.getPointer() |
||||
, path |
||||
, si |
||||
, pi)) { |
||||
throw new Win32Exception(Kernel32.INSTANCE.GetLastError()); |
||||
} else { |
||||
closeHandle(pi.hThread); |
||||
ret = pi.hProcess; |
||||
} |
||||
} |
||||
releaseHolder(ret.getPointer().equals(Pointer.createConstant(0)), pipeError, OFFSET_WRITE); |
||||
releaseHolder(ret.getPointer().equals(Pointer.createConstant(0)), pipeOut, OFFSET_WRITE); |
||||
} |
||||
releaseHolder(ret.getPointer().equals(Pointer.createConstant(0)), pipeIn, OFFSET_READ); |
||||
} |
||||
restoreIOEHandleState(stdIOE, inherit); |
||||
return ret; |
||||
} |
||||
|
||||
private static synchronized WinNT.HANDLE create(String username, |
||||
String password, |
||||
String cmd, |
||||
final String envblock, |
||||
final String path, |
||||
final long[] stdHandles, |
||||
final boolean redirectErrorStream) { |
||||
WinNT.HANDLE ret = new WinNT.HANDLE(Pointer.createConstant(0)); |
||||
WinNT.HANDLEByReference[] handles = new WinNT.HANDLEByReference[stdHandles.length]; |
||||
for (int i = 0; i < stdHandles.length; i++) { |
||||
handles[i] = new WinNT.HANDLEByReference(new WinNT.HANDLE(Pointer.createConstant(stdHandles[i]))); |
||||
} |
||||
|
||||
if (cmd != null) { |
||||
if (username != null && password != null) { |
||||
ret = processCreate(username, password, cmd, envblock, path, handles, redirectErrorStream); |
||||
} |
||||
} |
||||
|
||||
for (int i = 0; i < stdHandles.length; i++) { |
||||
stdHandles[i] = handles[i].getPointer().getLong(0); |
||||
} |
||||
|
||||
return ret; |
||||
} |
||||
|
||||
private static int getExitCodeProcess(WinNT.HANDLE handle) { |
||||
IntByReference exitStatus = new IntByReference(); |
||||
if (!Kernel32.INSTANCE.GetExitCodeProcess(handle, exitStatus)) { |
||||
throw new Win32Exception(Kernel32.INSTANCE.GetLastError()); |
||||
} |
||||
return exitStatus.getValue(); |
||||
} |
||||
|
||||
private static void terminateProcess(WinNT.HANDLE handle) { |
||||
Kernel32.INSTANCE.TerminateProcess(handle, 1); |
||||
} |
||||
|
||||
private static boolean isProcessAlive(WinNT.HANDLE handle) { |
||||
IntByReference exitStatus = new IntByReference(); |
||||
Kernel32.INSTANCE.GetExitCodeProcess(handle, exitStatus); |
||||
return exitStatus.getValue() == STILL_ACTIVE; |
||||
} |
||||
|
||||
private static void closeHandle(WinNT.HANDLE handle) { |
||||
Kernel32Util.closeHandle(handle); |
||||
} |
||||
|
||||
/** |
||||
* Opens a file for atomic append. The file is created if it doesn't |
||||
* already exist. |
||||
* |
||||
* @param path the file to open or create |
||||
* @return the native HANDLE |
||||
*/ |
||||
private static long openForAtomicAppend(String path) throws IOException { |
||||
int access = Kernel32.GENERIC_READ | Kernel32.GENERIC_WRITE; |
||||
int sharing = Kernel32.FILE_SHARE_READ | Kernel32.FILE_SHARE_WRITE; |
||||
int disposition = Kernel32.OPEN_ALWAYS; |
||||
int flagsAndAttributes = Kernel32.FILE_ATTRIBUTE_NORMAL; |
||||
if (path == null || path.isEmpty()) { |
||||
return -1; |
||||
} else { |
||||
WinNT.HANDLE handle = Kernel32.INSTANCE.CreateFile(path, access, sharing, null, disposition, flagsAndAttributes, null); |
||||
if (handle == Kernel32.INVALID_HANDLE_VALUE) { |
||||
throw new Win32Exception(Kernel32.INSTANCE.GetLastError()); |
||||
} |
||||
return handle.getPointer().getLong(0); |
||||
} |
||||
} |
||||
|
||||
private static void waitForInterruptibly(WinNT.HANDLE handle) { |
||||
int result = Kernel32.INSTANCE.WaitForMultipleObjects(1, new WinNT.HANDLE[]{handle}, false, Kernel32.INFINITE); |
||||
if (result == Kernel32.WAIT_FAILED) { |
||||
throw new Win32Exception(Kernel32.INSTANCE.GetLastError()); |
||||
} |
||||
} |
||||
|
||||
private static void waitForTimeoutInterruptibly(WinNT.HANDLE handle, long timeout) { |
||||
int result = Kernel32.INSTANCE.WaitForMultipleObjects(1, new WinNT.HANDLE[]{handle}, false, (int) timeout); |
||||
if (result == Kernel32.WAIT_FAILED) { |
||||
throw new Win32Exception(Kernel32.INSTANCE.GetLastError()); |
||||
} |
||||
} |
||||
|
||||
} |
@ -0,0 +1,40 @@
|
||||
/* |
||||
* Licensed to the Apache Software Foundation (ASF) under one or more |
||||
* contributor license agreements. See the NOTICE file distributed with |
||||
* this work for additional information regarding copyright ownership. |
||||
* The ASF licenses this file to You under the Apache License, Version 2.0 |
||||
* (the "License"); you may not use this file except in compliance with |
||||
* the License. You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
package org.apache.dolphinscheduler.common; |
||||
|
||||
import org.apache.dolphinscheduler.common.utils.OSUtils; |
||||
import org.junit.Assert; |
||||
import org.junit.Test; |
||||
|
||||
/** |
||||
* Constants Test |
||||
*/ |
||||
public class ConstantsTest { |
||||
|
||||
/** |
||||
* Test PID via env |
||||
*/ |
||||
@Test |
||||
public void testPID() { |
||||
if (OSUtils.isWindows()) { |
||||
Assert.assertEquals(Constants.PID, "handle"); |
||||
} else { |
||||
Assert.assertEquals(Constants.PID, "pid"); |
||||
} |
||||
} |
||||
|
||||
} |
@ -0,0 +1,210 @@
|
||||
/* |
||||
* Licensed to the Apache Software Foundation (ASF) under one or more |
||||
* contributor license agreements. See the NOTICE file distributed with |
||||
* this work for additional information regarding copyright ownership. |
||||
* The ASF licenses this file to You under the Apache License, Version 2.0 |
||||
* (the "License"); you may not use this file except in compliance with |
||||
* the License. You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
package org.apache.dolphinscheduler.common.utils.process; |
||||
|
||||
import org.apache.dolphinscheduler.common.utils.OSUtils; |
||||
import org.apache.dolphinscheduler.common.utils.StringUtils; |
||||
import org.junit.Assert; |
||||
import org.junit.Before; |
||||
import org.junit.Test; |
||||
import org.junit.runner.RunWith; |
||||
import org.powermock.api.mockito.PowerMockito; |
||||
import org.powermock.core.classloader.annotations.PrepareForTest; |
||||
import org.powermock.modules.junit4.PowerMockRunner; |
||||
import org.slf4j.Logger; |
||||
import org.slf4j.LoggerFactory; |
||||
|
||||
import java.io.*; |
||||
import java.nio.charset.Charset; |
||||
import java.util.ArrayList; |
||||
import java.util.Collections; |
||||
import java.util.List; |
||||
|
||||
@RunWith(PowerMockRunner.class) |
||||
@PrepareForTest(OSUtils.class) |
||||
public class ProcessBuilderForWin32Test { |
||||
|
||||
private static final Logger logger = LoggerFactory.getLogger(ProcessBuilderForWin32Test.class); |
||||
|
||||
@Before |
||||
public void before() { |
||||
PowerMockito.mockStatic(OSUtils.class); |
||||
PowerMockito.when(OSUtils.isWindows()).thenReturn(true); |
||||
} |
||||
|
||||
@Test |
||||
public void testCreateProcessBuilderForWin32() { |
||||
try { |
||||
ProcessBuilderForWin32 builder = new ProcessBuilderForWin32(); |
||||
Assert.assertNotNull(builder); |
||||
|
||||
builder = new ProcessBuilderForWin32("net"); |
||||
Assert.assertNotNull(builder); |
||||
|
||||
builder = new ProcessBuilderForWin32(Collections.singletonList("net")); |
||||
Assert.assertNotNull(builder); |
||||
|
||||
builder = new ProcessBuilderForWin32((List<String>) null); |
||||
Assert.assertNotNull(builder); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void testBuildUser() { |
||||
try { |
||||
ProcessBuilderForWin32 builder = new ProcessBuilderForWin32(); |
||||
builder.user("test", StringUtils.EMPTY); |
||||
Assert.assertNotNull(builder); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void testBuildCommand() { |
||||
try { |
||||
ProcessBuilderForWin32 builder = new ProcessBuilderForWin32(); |
||||
builder.command(Collections.singletonList("net")); |
||||
Assert.assertNotEquals(0, builder.command().size()); |
||||
|
||||
builder = new ProcessBuilderForWin32(); |
||||
builder.command("net"); |
||||
Assert.assertNotEquals(0, builder.command().size()); |
||||
|
||||
builder = new ProcessBuilderForWin32(); |
||||
builder.command((List<String>) null); |
||||
Assert.assertNotEquals(0, builder.command().size()); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void testEnvironment() { |
||||
try { |
||||
ProcessBuilderForWin32 builder = new ProcessBuilderForWin32(); |
||||
Assert.assertNotNull(builder.environment()); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
|
||||
try { |
||||
ProcessBuilderForWin32 builder = new ProcessBuilderForWin32(); |
||||
builder.environment(new String[]{ "a=123" }); |
||||
Assert.assertNotEquals(0, builder.environment().size()); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void testDirectory() { |
||||
try { |
||||
ProcessBuilderForWin32 builder = new ProcessBuilderForWin32(); |
||||
builder.directory(new File("/tmp")); |
||||
Assert.assertNotNull(builder.directory()); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void testStream() { |
||||
try { |
||||
InputStream in = ProcessBuilderForWin32.NullInputStream.INSTANCE; |
||||
Assert.assertNotNull(in); |
||||
Assert.assertEquals(-1, in.read()); |
||||
Assert.assertEquals(0, in.available()); |
||||
|
||||
OutputStream out = ProcessBuilderForWin32.NullOutputStream.INSTANCE; |
||||
Assert.assertNotNull(out); |
||||
out.write(new byte[] {1}); |
||||
} catch (Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void testRedirect() { |
||||
try { |
||||
ProcessBuilderForWin32 builder = new ProcessBuilderForWin32(); |
||||
|
||||
builder.redirectInput(new File("/tmp")); |
||||
Assert.assertNotNull(builder.redirectInput()); |
||||
Assert.assertNotNull(builder.redirectInput().file()); |
||||
|
||||
builder.redirectOutput(new File("/tmp")); |
||||
Assert.assertNotNull(builder.redirectOutput()); |
||||
Assert.assertNotNull(builder.redirectOutput().file()); |
||||
|
||||
builder.redirectError(new File("/tmp")); |
||||
Assert.assertNotNull(builder.redirectError()); |
||||
Assert.assertNotNull(builder.redirectError().file()); |
||||
|
||||
builder.redirectInput(builder.redirectOutput()); |
||||
builder.redirectOutput(builder.redirectInput()); |
||||
builder.redirectError(builder.redirectInput()); |
||||
|
||||
Assert.assertNotNull(ProcessBuilderForWin32.Redirect.PIPE.type()); |
||||
Assert.assertNotNull(ProcessBuilderForWin32.Redirect.PIPE.toString()); |
||||
Assert.assertNotNull(ProcessBuilderForWin32.Redirect.INHERIT.type()); |
||||
Assert.assertNotNull(ProcessBuilderForWin32.Redirect.INHERIT.toString()); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void testRedirectErrorStream() { |
||||
try { |
||||
ProcessBuilderForWin32 builder = new ProcessBuilderForWin32(); |
||||
builder.redirectErrorStream(true); |
||||
Assert.assertTrue(builder.redirectErrorStream()); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void runCmdViaUser() { |
||||
try { |
||||
ProcessBuilderForWin32 builder = new ProcessBuilderForWin32(); |
||||
builder.user("test123", StringUtils.EMPTY); |
||||
|
||||
List<String> commands = new ArrayList<>(); |
||||
commands.add("cmd.exe"); |
||||
commands.add("/c"); |
||||
commands.add("net user"); |
||||
builder.command(commands); |
||||
|
||||
Process process = builder.start(); |
||||
BufferedReader inReader = new BufferedReader(new InputStreamReader(process.getInputStream(), Charset.forName("GBK"))); |
||||
String line; |
||||
StringBuilder sb = new StringBuilder(); |
||||
while ((line = inReader.readLine()) != null) { |
||||
sb.append(line); |
||||
} |
||||
logger.info("net user: {}", sb.toString()); |
||||
Assert.assertNotEquals(StringUtils.EMPTY, sb.toString()); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
} |
@ -0,0 +1,124 @@
|
||||
/* |
||||
* Licensed to the Apache Software Foundation (ASF) under one or more |
||||
* contributor license agreements. See the NOTICE file distributed with |
||||
* this work for additional information regarding copyright ownership. |
||||
* The ASF licenses this file to You under the Apache License, Version 2.0 |
||||
* (the "License"); you may not use this file except in compliance with |
||||
* the License. You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
package org.apache.dolphinscheduler.common.utils.process; |
||||
|
||||
import org.apache.dolphinscheduler.common.utils.OSUtils; |
||||
import org.junit.Assert; |
||||
import org.junit.Before; |
||||
import org.junit.Test; |
||||
import org.junit.runner.RunWith; |
||||
import org.powermock.api.mockito.PowerMockito; |
||||
import org.powermock.core.classloader.annotations.PrepareForTest; |
||||
import org.powermock.modules.junit4.PowerMockRunner; |
||||
import org.slf4j.Logger; |
||||
import org.slf4j.LoggerFactory; |
||||
|
||||
import java.util.Collection; |
||||
import java.util.Map; |
||||
import java.util.Set; |
||||
|
||||
@RunWith(PowerMockRunner.class) |
||||
@PrepareForTest({OSUtils.class, ProcessEnvironmentForWin32.class}) |
||||
public class ProcessEnvironmentForWin32Test { |
||||
|
||||
private static final Logger logger = LoggerFactory.getLogger(ProcessBuilderForWin32Test.class); |
||||
|
||||
@Before |
||||
public void before() { |
||||
try { |
||||
PowerMockito.mockStatic(OSUtils.class); |
||||
PowerMockito.when(OSUtils.isWindows()).thenReturn(true); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void testPutAndGet() { |
||||
try { |
||||
ProcessEnvironmentForWin32 processEnvironmentForWin32 = (ProcessEnvironmentForWin32) ProcessEnvironmentForWin32.emptyEnvironment(0); |
||||
processEnvironmentForWin32.put("a", "123"); |
||||
Assert.assertEquals("123", processEnvironmentForWin32.get("a")); |
||||
Assert.assertTrue(processEnvironmentForWin32.containsKey("a")); |
||||
Assert.assertTrue(processEnvironmentForWin32.containsValue("123")); |
||||
Assert.assertEquals("123", processEnvironmentForWin32.remove("a")); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
|
||||
try { |
||||
ProcessEnvironmentForWin32 processEnvironmentForWin32 = (ProcessEnvironmentForWin32) ProcessEnvironmentForWin32.emptyEnvironment(0); |
||||
processEnvironmentForWin32.put("b=", "123"); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
|
||||
try { |
||||
ProcessEnvironmentForWin32 processEnvironmentForWin32 = (ProcessEnvironmentForWin32) ProcessEnvironmentForWin32.emptyEnvironment(0); |
||||
processEnvironmentForWin32.put("b", "\u0000"); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
|
||||
try { |
||||
ProcessEnvironmentForWin32 processEnvironmentForWin32 = (ProcessEnvironmentForWin32) ProcessEnvironmentForWin32.emptyEnvironment(0); |
||||
processEnvironmentForWin32.get(null); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void testEntrySet() { |
||||
try { |
||||
ProcessEnvironmentForWin32 processEnvironmentForWin32 = (ProcessEnvironmentForWin32) ProcessEnvironmentForWin32.emptyEnvironment(0); |
||||
processEnvironmentForWin32.clear(); |
||||
processEnvironmentForWin32.put("a", "123"); |
||||
Assert.assertEquals(0, processEnvironmentForWin32.entrySet().size()); |
||||
Assert.assertTrue(processEnvironmentForWin32.entrySet().isEmpty()); |
||||
for (Map.Entry<String, String> entry : processEnvironmentForWin32.entrySet()) { |
||||
Assert.assertNotNull(entry); |
||||
Assert.assertNotNull(entry.getKey()); |
||||
Assert.assertNotNull(entry.getValue()); |
||||
Assert.assertNotNull(entry.setValue("123")); |
||||
} |
||||
|
||||
processEnvironmentForWin32.clear(); |
||||
Set<String> keys = processEnvironmentForWin32.keySet(); |
||||
Assert.assertEquals(0, keys.size()); |
||||
Assert.assertTrue(keys.isEmpty()); |
||||
|
||||
processEnvironmentForWin32.clear(); |
||||
Collection<String> values = processEnvironmentForWin32.values(); |
||||
Assert.assertEquals(0, keys.size()); |
||||
Assert.assertTrue(keys.isEmpty()); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void testToEnvironmentBlock() { |
||||
try { |
||||
ProcessEnvironmentForWin32 processEnvironmentForWin32 = (ProcessEnvironmentForWin32) ProcessEnvironmentForWin32.emptyEnvironment(0); |
||||
Assert.assertNotNull(processEnvironmentForWin32.toEnvironmentBlock()); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
} |
@ -0,0 +1,70 @@
|
||||
/* |
||||
* Licensed to the Apache Software Foundation (ASF) under one or more |
||||
* contributor license agreements. See the NOTICE file distributed with |
||||
* this work for additional information regarding copyright ownership. |
||||
* The ASF licenses this file to You under the Apache License, Version 2.0 |
||||
* (the "License"); you may not use this file except in compliance with |
||||
* the License. You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
package org.apache.dolphinscheduler.common.utils.process; |
||||
|
||||
import org.apache.dolphinscheduler.common.utils.OSUtils; |
||||
import org.apache.dolphinscheduler.common.utils.StringUtils; |
||||
import org.junit.Assert; |
||||
import org.junit.Before; |
||||
import org.junit.Test; |
||||
import org.junit.runner.RunWith; |
||||
import org.powermock.api.mockito.PowerMockito; |
||||
import org.powermock.core.classloader.annotations.PrepareForTest; |
||||
import org.powermock.modules.junit4.PowerMockRunner; |
||||
import org.slf4j.Logger; |
||||
import org.slf4j.LoggerFactory; |
||||
import sun.security.action.GetPropertyAction; |
||||
|
||||
@RunWith(PowerMockRunner.class) |
||||
@PrepareForTest({OSUtils.class, GetPropertyAction.class}) |
||||
public class ProcessImplForWin32Test { |
||||
|
||||
private static final Logger logger = LoggerFactory.getLogger(ProcessBuilderForWin32Test.class); |
||||
|
||||
@Before |
||||
public void before() { |
||||
PowerMockito.mockStatic(OSUtils.class); |
||||
PowerMockito.mockStatic(GetPropertyAction.class); |
||||
PowerMockito.when(OSUtils.isWindows()).thenReturn(true); |
||||
} |
||||
|
||||
@Test |
||||
public void testStart() { |
||||
try { |
||||
Process process = ProcessImplForWin32.start( |
||||
"test123", StringUtils.EMPTY, new String[]{"net"}, |
||||
null, null, null, false); |
||||
Assert.assertNotNull(process); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
|
||||
try { |
||||
Process process = ProcessImplForWin32.start( |
||||
"test123", StringUtils.EMPTY, new String[]{"net"}, |
||||
null, null, new ProcessBuilderForWin32.Redirect[]{ |
||||
ProcessBuilderForWin32.Redirect.PIPE, |
||||
ProcessBuilderForWin32.Redirect.PIPE, |
||||
ProcessBuilderForWin32.Redirect.PIPE |
||||
}, false); |
||||
Assert.assertNotNull(process); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
} |
@ -1 +1 @@
|
||||
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.dolphinscheduler.remote.command;
import org.apache.dolphinscheduler.remote.utils.FastJsonSerializer;
import java.io.Serializable;
import java.util.List;
import java.util.concurrent.atomic.AtomicLong;
/**
* execute task request command
*/
public class ExecuteTaskRequestCommand implements Serializable {
/**
* task id
*/
private String taskId;
/**
* attempt id
*/
private String attemptId;
/**
* application name
*/
private String applicationName;
/**
* group name
*/
private String groupName;
/**
* task name
*/
private String taskName;
/**
* connector port
*/
private int connectorPort;
/**
* description info
*/
private String description;
/**
* class name
*/
private String className;
/**
* method name
*/
private String methodName;
/**
* parameters
*/
private String params;
/**
* shard itemds
*/
private List<Integer> shardItems;
public List<Integer> getShardItems() {
return shardItems;
}
public void setShardItems(List<Integer> shardItems) {
this.shardItems = shardItems;
}
public String getParams() {
return params;
}
public void setParams(String params) {
this.params = params;
}
public String getTaskId() {
return taskId;
}
public void setTaskId(String taskId) {
this.taskId = taskId;
}
public String getApplicationName() {
return applicationName;
}
public void setApplicationName(String applicationName) {
this.applicationName = applicationName;
}
public String getGroupName() {
return groupName;
}
public void setGroupName(String groupName) {
this.groupName = groupName;
}
public String getTaskName() {
return taskName;
}
public void setTaskName(String taskName) {
this.taskName = taskName;
}
public int getConnectorPort() {
return connectorPort;
}
public void setConnectorPort(int connectorPort) {
this.connectorPort = connectorPort;
}
public String getDescription() {
return description;
}
public void setDescription(String description) {
this.description = description;
}
public String getClassName() {
return className;
}
public void setClassName(String className) {
this.className = className;
}
public String getMethodName() {
return methodName;
}
public void setMethodName(String methodName) {
this.methodName = methodName;
}
/**
* package request command
*
* @return command
*/
public Command convert2Command(){
Command command = new Command();
command.setType(CommandType.EXECUTE_TASK_REQUEST);
byte[] body = FastJsonSerializer.serialize(this);
command.setBody(body);
return command;
}
} |
||||
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.dolphinscheduler.remote.command;
import org.apache.dolphinscheduler.remote.utils.FastJsonSerializer;
import java.io.Serializable;
import java.util.List;
/**
* execute task request command
*/
public class ExecuteTaskRequestCommand implements Serializable {
/**
* task id
*/
private String taskId;
/**
* attempt id
*/
private String attemptId;
/**
* application name
*/
private String applicationName;
/**
* group name
*/
private String groupName;
/**
* task name
*/
private String taskName;
/**
* connector port
*/
private int connectorPort;
/**
* description info
*/
private String description;
/**
* class name
*/
private String className;
/**
* method name
*/
private String methodName;
/**
* parameters
*/
private String params;
/**
* shard itemds
*/
private List<Integer> shardItems;
public List<Integer> getShardItems() {
return shardItems;
}
public void setShardItems(List<Integer> shardItems) {
this.shardItems = shardItems;
}
public String getParams() {
return params;
}
public void setParams(String params) {
this.params = params;
}
public String getTaskId() {
return taskId;
}
public void setTaskId(String taskId) {
this.taskId = taskId;
}
public String getApplicationName() {
return applicationName;
}
public void setApplicationName(String applicationName) {
this.applicationName = applicationName;
}
public String getGroupName() {
return groupName;
}
public void setGroupName(String groupName) {
this.groupName = groupName;
}
public String getTaskName() {
return taskName;
}
public void setTaskName(String taskName) {
this.taskName = taskName;
}
public int getConnectorPort() {
return connectorPort;
}
public void setConnectorPort(int connectorPort) {
this.connectorPort = connectorPort;
}
public String getDescription() {
return description;
}
public void setDescription(String description) {
this.description = description;
}
public String getClassName() {
return className;
}
public void setClassName(String className) {
this.className = className;
}
public String getMethodName() {
return methodName;
}
public void setMethodName(String methodName) {
this.methodName = methodName;
}
/**
* package request command
*
* @return command
*/
public Command convert2Command(){
Command command = new Command();
command.setType(CommandType.EXECUTE_TASK_REQUEST);
byte[] body = FastJsonSerializer.serialize(this);
command.setBody(body);
return command;
}
} |
@ -1 +1 @@
|
||||
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.dolphinscheduler.remote.command;
import org.apache.dolphinscheduler.remote.utils.FastJsonSerializer;
import java.io.Serializable;
import java.util.concurrent.atomic.AtomicLong;
/**
* execute task response command
*/
public class ExecuteTaskResponseCommand implements Serializable {
/**
* task id
*/
private String taskId;
/**
* attempt id
*/
private String attemptId;
/**
* return result
*/
private Object result;
/**
* received time
*/
private long receivedTime;
/**
* execute count
*/
private int executeCount;
/**
* execute time
*/
private long executeTime;
public String getAttemptId() {
return attemptId;
}
public void setAttemptId(String attemptId) {
this.attemptId = attemptId;
}
public String getTaskId() {
return taskId;
}
public void setTaskId(String taskId) {
this.taskId = taskId;
}
public Object getResult() {
return result;
}
public void setResult(Object result) {
this.result = result;
}
public long getReceivedTime() {
return receivedTime;
}
public void setReceivedTime(long receivedTime) {
this.receivedTime = receivedTime;
}
public int getExecuteCount() {
return executeCount;
}
public void setExecuteCount(int executeCount) {
this.executeCount = executeCount;
}
public long getExecuteTime() {
return executeTime;
}
public void setExecuteTime(long executeTime) {
this.executeTime = executeTime;
}
public Command convert2Command(long opaque){
Command command = new Command();
command.setType(CommandType.EXECUTE_TASK_RESPONSE);
byte[] body = FastJsonSerializer.serialize(this);
command.setBody(body);
return command;
}
} |
||||
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.dolphinscheduler.remote.command;
import org.apache.dolphinscheduler.remote.utils.FastJsonSerializer;
import java.io.Serializable;
/**
* execute task response command
*/
public class ExecuteTaskResponseCommand implements Serializable {
/**
* task id
*/
private String taskId;
/**
* attempt id
*/
private String attemptId;
/**
* return result
*/
private Object result;
/**
* received time
*/
private long receivedTime;
/**
* execute count
*/
private int executeCount;
/**
* execute time
*/
private long executeTime;
public String getAttemptId() {
return attemptId;
}
public void setAttemptId(String attemptId) {
this.attemptId = attemptId;
}
public String getTaskId() {
return taskId;
}
public void setTaskId(String taskId) {
this.taskId = taskId;
}
public Object getResult() {
return result;
}
public void setResult(Object result) {
this.result = result;
}
public long getReceivedTime() {
return receivedTime;
}
public void setReceivedTime(long receivedTime) {
this.receivedTime = receivedTime;
}
public int getExecuteCount() {
return executeCount;
}
public void setExecuteCount(int executeCount) {
this.executeCount = executeCount;
}
public long getExecuteTime() {
return executeTime;
}
public void setExecuteTime(long executeTime) {
this.executeTime = executeTime;
}
public Command convert2Command(long opaque){
Command command = new Command();
command.setType(CommandType.EXECUTE_TASK_RESPONSE);
byte[] body = FastJsonSerializer.serialize(this);
command.setBody(body);
return command;
}
} |
@ -0,0 +1,199 @@
|
||||
/* |
||||
* Licensed to the Apache Software Foundation (ASF) under one or more |
||||
* contributor license agreements. See the NOTICE file distributed with |
||||
* this work for additional information regarding copyright ownership. |
||||
* The ASF licenses this file to You under the Apache License, Version 2.0 |
||||
* (the "License"); you may not use this file except in compliance with |
||||
* the License. You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
package org.apache.dolphinscheduler.server.worker.task.shell; |
||||
|
||||
import org.apache.dolphinscheduler.common.enums.CommandType; |
||||
import org.apache.dolphinscheduler.common.enums.DbType; |
||||
import org.apache.dolphinscheduler.common.utils.OSUtils; |
||||
import org.apache.dolphinscheduler.dao.entity.DataSource; |
||||
import org.apache.dolphinscheduler.dao.entity.ProcessInstance; |
||||
import org.apache.dolphinscheduler.server.worker.task.ShellCommandExecutor; |
||||
import org.apache.dolphinscheduler.server.worker.task.TaskProps; |
||||
import org.apache.dolphinscheduler.service.bean.SpringApplicationContext; |
||||
import org.apache.dolphinscheduler.service.process.ProcessService; |
||||
import org.junit.After; |
||||
import org.junit.Assert; |
||||
import org.junit.Assume; |
||||
import org.junit.Before; |
||||
import org.junit.Test; |
||||
import org.junit.runner.RunWith; |
||||
import org.powermock.api.mockito.PowerMockito; |
||||
import org.powermock.core.classloader.annotations.PrepareForTest; |
||||
import org.powermock.modules.junit4.PowerMockRunner; |
||||
import org.slf4j.Logger; |
||||
import org.slf4j.LoggerFactory; |
||||
import org.springframework.context.ApplicationContext; |
||||
|
||||
import java.util.Date; |
||||
|
||||
/** |
||||
* shell task test |
||||
*/ |
||||
@RunWith(PowerMockRunner.class) |
||||
@PrepareForTest(OSUtils.class) |
||||
public class ShellTaskTest { |
||||
|
||||
private static final Logger logger = LoggerFactory.getLogger(ShellTaskTest.class); |
||||
|
||||
private ShellTask shellTask; |
||||
|
||||
private ProcessService processService; |
||||
|
||||
private ShellCommandExecutor shellCommandExecutor; |
||||
|
||||
private ApplicationContext applicationContext; |
||||
|
||||
@Before |
||||
public void before() throws Exception { |
||||
PowerMockito.mockStatic(OSUtils.class); |
||||
processService = PowerMockito.mock(ProcessService.class); |
||||
shellCommandExecutor = PowerMockito.mock(ShellCommandExecutor.class); |
||||
|
||||
applicationContext = PowerMockito.mock(ApplicationContext.class); |
||||
SpringApplicationContext springApplicationContext = new SpringApplicationContext(); |
||||
springApplicationContext.setApplicationContext(applicationContext); |
||||
PowerMockito.when(applicationContext.getBean(ProcessService.class)).thenReturn(processService); |
||||
|
||||
TaskProps props = new TaskProps(); |
||||
props.setTaskDir("/tmp"); |
||||
props.setTaskAppId(String.valueOf(System.currentTimeMillis())); |
||||
props.setTaskInstId(1); |
||||
props.setTenantCode("1"); |
||||
props.setEnvFile(".dolphinscheduler_env.sh"); |
||||
props.setTaskStartTime(new Date()); |
||||
props.setTaskTimeout(0); |
||||
props.setTaskParams("{\"rawScript\": \" echo 'hello world!'\"}"); |
||||
shellTask = new ShellTask(props, logger); |
||||
shellTask.init(); |
||||
|
||||
PowerMockito.when(processService.findDataSourceById(1)).thenReturn(getDataSource()); |
||||
PowerMockito.when(processService.findDataSourceById(2)).thenReturn(getDataSource()); |
||||
PowerMockito.when(processService.findProcessInstanceByTaskId(1)).thenReturn(getProcessInstance()); |
||||
|
||||
String fileName = String.format("%s/%s_node.%s", props.getTaskDir(), props.getTaskAppId(), OSUtils.isWindows() ? "bat" : "sh"); |
||||
PowerMockito.when(shellCommandExecutor.run(fileName, processService)).thenReturn(0); |
||||
} |
||||
|
||||
private DataSource getDataSource() { |
||||
DataSource dataSource = new DataSource(); |
||||
dataSource.setType(DbType.MYSQL); |
||||
dataSource.setConnectionParams( |
||||
"{\"user\":\"root\",\"password\":\"123456\",\"address\":\"jdbc:mysql://127.0.0.1:3306\",\"database\":\"test\",\"jdbcUrl\":\"jdbc:mysql://127.0.0.1:3306/test\"}"); |
||||
dataSource.setUserId(1); |
||||
return dataSource; |
||||
} |
||||
|
||||
private ProcessInstance getProcessInstance() { |
||||
ProcessInstance processInstance = new ProcessInstance(); |
||||
processInstance.setCommandType(CommandType.START_PROCESS); |
||||
processInstance.setScheduleTime(new Date()); |
||||
return processInstance; |
||||
} |
||||
|
||||
@After |
||||
public void after() {} |
||||
|
||||
/** |
||||
* Method: ShellTask() |
||||
*/ |
||||
@Test |
||||
public void testShellTask() |
||||
throws Exception { |
||||
TaskProps props = new TaskProps(); |
||||
props.setTaskDir("/tmp"); |
||||
props.setTaskAppId(String.valueOf(System.currentTimeMillis())); |
||||
props.setTaskInstId(1); |
||||
props.setTenantCode("1"); |
||||
ShellTask shellTaskTest = new ShellTask(props, logger); |
||||
Assert.assertNotNull(shellTaskTest); |
||||
} |
||||
|
||||
/** |
||||
* Method: init for Unix-like |
||||
*/ |
||||
@Test |
||||
public void testInitForUnix() { |
||||
try { |
||||
PowerMockito.when(OSUtils.isWindows()).thenReturn(false); |
||||
shellTask.init(); |
||||
Assert.assertTrue(true); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
/** |
||||
* Method: init for Windows |
||||
*/ |
||||
@Test |
||||
public void testInitForWindows() { |
||||
try { |
||||
PowerMockito.when(OSUtils.isWindows()).thenReturn(true); |
||||
shellTask.init(); |
||||
Assert.assertTrue(true); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
/** |
||||
* Method: handle() for Unix-like |
||||
*/ |
||||
@Test |
||||
public void testHandleForUnix() throws Exception { |
||||
try { |
||||
PowerMockito.when(OSUtils.isWindows()).thenReturn(false); |
||||
shellTask.handle(); |
||||
Assert.assertTrue(true); |
||||
} catch (Error | Exception e) { |
||||
if (!e.getMessage().contains("process error . exitCode is : -1") |
||||
&& !System.getProperty("os.name").startsWith("Windows")) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
} |
||||
|
||||
/** |
||||
* Method: handle() for Windows |
||||
*/ |
||||
@Test |
||||
public void testHandleForWindows() throws Exception { |
||||
try { |
||||
Assume.assumeTrue(OSUtils.isWindows()); |
||||
shellTask.handle(); |
||||
Assert.assertTrue(true); |
||||
} catch (Error | Exception e) { |
||||
if (!e.getMessage().contains("process error . exitCode is : -1")) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
} |
||||
|
||||
/** |
||||
* Method: cancelApplication() |
||||
*/ |
||||
@Test |
||||
public void testCancelApplication() throws Exception { |
||||
try { |
||||
shellTask.cancelApplication(true); |
||||
Assert.assertTrue(true); |
||||
} catch (Error | Exception e) { |
||||
logger.error(e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
} |
@ -0,0 +1,65 @@
|
||||
/* |
||||
* Licensed to the Apache Software Foundation (ASF) under one or more |
||||
* contributor license agreements. See the NOTICE file distributed with |
||||
* this work for additional information regarding copyright ownership. |
||||
* The ASF licenses this file to You under the Apache License, Version 2.0 |
||||
* (the "License"); you may not use this file except in compliance with |
||||
* the License. You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
package org.apache.dolphinscheduler.service.zk; |
||||
|
||||
import org.apache.curator.ensemble.EnsembleProvider; |
||||
import org.junit.AfterClass; |
||||
import org.junit.Assert; |
||||
import org.junit.BeforeClass; |
||||
import org.junit.Test; |
||||
|
||||
import java.io.IOException; |
||||
|
||||
import static org.junit.Assert.*; |
||||
|
||||
public class DefaultEnsembleProviderTest { |
||||
private static final String DEFAULT_SERVER_LIST = "localhost:2181"; |
||||
|
||||
@Test |
||||
public void startAndClose() { |
||||
EnsembleProvider ensembleProvider = new DefaultEnsembleProvider(DEFAULT_SERVER_LIST); |
||||
try { |
||||
ensembleProvider.start(); |
||||
} catch (Exception e) { |
||||
Assert.fail("EnsembleProvider start error: " + e.getMessage()); |
||||
} |
||||
try { |
||||
ensembleProvider.close(); |
||||
} catch (IOException e) { |
||||
Assert.fail("EnsembleProvider close error: " + e.getMessage()); |
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void getConnectionString() { |
||||
EnsembleProvider ensembleProvider = new DefaultEnsembleProvider(DEFAULT_SERVER_LIST); |
||||
Assert.assertEquals(DEFAULT_SERVER_LIST, ensembleProvider.getConnectionString()); |
||||
} |
||||
|
||||
@Test |
||||
public void setConnectionString() { |
||||
EnsembleProvider ensembleProvider = new DefaultEnsembleProvider(DEFAULT_SERVER_LIST); |
||||
ensembleProvider.setConnectionString("otherHost:2181"); |
||||
Assert.assertEquals(DEFAULT_SERVER_LIST, ensembleProvider.getConnectionString()); |
||||
} |
||||
|
||||
@Test |
||||
public void updateServerListEnabled() { |
||||
EnsembleProvider ensembleProvider = new DefaultEnsembleProvider(DEFAULT_SERVER_LIST); |
||||
Assert.assertFalse(ensembleProvider.updateServerListEnabled()); |
||||
} |
||||
} |
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in new issue