| // Copyright 2019 The Chromium OS Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| package crash |
| |
| import ( |
| "context" |
| "os" |
| "path/filepath" |
| "time" |
| |
| "github.com/google/go-cmp/cmp" |
| "github.com/google/go-cmp/cmp/cmpopts" |
| |
| "chromiumos/tast/local/chrome" |
| "chromiumos/tast/local/crash" |
| "chromiumos/tast/testing" |
| ) |
| |
| func init() { |
| testing.AddTest(&testing.Test{ |
| Func: Sender, |
| Desc: "Basic test to check that minidump crashes are uploaded", |
| Contacts: []string{ |
| "mutexlox@chromium.org", |
| "iby@chromium.org", |
| "cros-telemetry@google.com", |
| "nya@chromium.org", // ported to Tast |
| }, |
| // We only care about crash_sender on internal builds. |
| SoftwareDeps: []string{"cros_internal"}, |
| Attr: []string{"group:mainline"}, |
| Params: []testing.Param{{ |
| Name: "real_consent", |
| ExtraAttr: []string{"informational"}, |
| ExtraSoftwareDeps: []string{"chrome", "metrics_consent"}, |
| Pre: crash.ChromePreWithVerboseConsent(), |
| Val: crash.RealConsent, |
| }, { |
| Name: "mock_consent", |
| Fixture: "chromeLoggedIn", |
| Val: crash.MockConsent, |
| }}, |
| }) |
| } |
| |
| func Sender(ctx context.Context, s *testing.State) { |
| opt := crash.WithMockConsent() |
| useConsent := s.Param().(crash.ConsentType) |
| if useConsent == crash.RealConsent { |
| opt = crash.WithConsent(s.PreValue().(*chrome.Chrome)) |
| } |
| if err := crash.SetUpCrashTest(ctx, crash.FilterCrashes(crash.FilterInIgnoreAllCrashes), opt); err != nil { |
| s.Fatal("Setup failed: ", err) |
| } |
| defer crash.TearDownCrashTest(ctx) |
| |
| const basename = "some_program.1.2.3" |
| exp, err := crash.AddFakeMinidumpCrash(ctx, basename) |
| if err != nil { |
| s.Fatal("Failed to add a fake minidump crash: ", err) |
| } |
| |
| got, err := crash.RunSender(ctx) |
| if err != nil { |
| s.Fatal("Failed to run crash_sender: ", err) |
| } |
| want := []*crash.SendResult{{ |
| Success: true, |
| Data: *exp, |
| }} |
| if diff := cmp.Diff(got, want, cmpopts.IgnoreFields(crash.SendResult{}, "Schedule")); diff != "" { |
| s.Log("Results mismatch (-got +want): ", diff) |
| s.Errorf("crash_sender sent unexpected %d results; see logs for diff", len(got)) |
| } |
| |
| // Below we do extra checks that might not be covered by variants of this test. |
| |
| // Check that the scheduled upload time is reasonable. |
| if len(got) == 1 { |
| r := got[0] |
| d := r.Schedule.Sub(time.Now()) |
| const limit = time.Hour |
| if d >= limit { |
| s.Errorf("Scheduled time was too late: got %v, want <%v", d, limit) |
| } |
| } |
| |
| // Check that the metadata was removed. |
| if _, err := os.Stat(filepath.Join(crash.SystemCrashDir, basename+".meta")); err == nil { |
| s.Errorf("%s.meta was not removed by crash_sender", basename) |
| } else if !os.IsNotExist(err) { |
| s.Errorf("Failed to stat %s.meta: %v", basename, err) |
| } |
| |
| // Check that a send record file is created for rate limiting. |
| if rs, err := crash.ListSendRecords(); err != nil { |
| s.Error("Failed to list send records: ", err) |
| } else if len(rs) != 1 { |
| s.Errorf("Found %d send record(s); want 1", len(rs)) |
| } |
| } |