freebsd-dev/contrib/kyua/engine/requirements.cpp
Brooks Davis b0d29bc47d Import the kyua test framework.
Having kyua in the base system will simplify automated testing in CI and
eliminates bootstrapping issues on new platforms.

The build of kyua is controlled by WITH(OUT)_TESTS_SUPPORT.

Reviewed by:	emaste
Obtained from:	CheriBSD
Sponsored by:	DARPA
Differential Revision:	https://reviews.freebsd.org/D24103
2020-03-23 19:01:23 +00:00

294 lines
10 KiB
C++

// Copyright 2012 The Kyua Authors.
// All rights reserved.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are
// met:
//
// * Redistributions of source code must retain the above copyright
// notice, this list of conditions and the following disclaimer.
// * Redistributions in binary form must reproduce the above copyright
// notice, this list of conditions and the following disclaimer in the
// documentation and/or other materials provided with the distribution.
// * Neither the name of Google Inc. nor the names of its contributors
// may be used to endorse or promote products derived from this software
// without specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
#include "engine/requirements.hpp"
#include "model/metadata.hpp"
#include "model/types.hpp"
#include "utils/config/nodes.ipp"
#include "utils/config/tree.ipp"
#include "utils/format/macros.hpp"
#include "utils/fs/operations.hpp"
#include "utils/fs/path.hpp"
#include "utils/memory.hpp"
#include "utils/passwd.hpp"
#include "utils/sanity.hpp"
#include "utils/units.hpp"
namespace config = utils::config;
namespace fs = utils::fs;
namespace passwd = utils::passwd;
namespace units = utils::units;
namespace {
/// Checks if all required configuration variables are present.
///
/// \param required_configs Set of required variable names.
/// \param user_config Runtime user configuration.
/// \param test_suite_name Name of the test suite the test belongs to.
///
/// \return Empty if all variables are present or an error message otherwise.
static std::string
check_required_configs(const model::strings_set& required_configs,
const config::tree& user_config,
const std::string& test_suite_name)
{
for (model::strings_set::const_iterator iter = required_configs.begin();
iter != required_configs.end(); iter++) {
std::string property;
// TODO(jmmv): All this rewrite logic belongs in the ATF interface.
if ((*iter) == "unprivileged-user" || (*iter) == "unprivileged_user")
property = "unprivileged_user";
else
property = F("test_suites.%s.%s") % test_suite_name % (*iter);
if (!user_config.is_set(property))
return F("Required configuration property '%s' not defined") %
(*iter);
}
return "";
}
/// Checks if the allowed architectures match the current architecture.
///
/// \param allowed_architectures Set of allowed architectures.
/// \param user_config Runtime user configuration.
///
/// \return Empty if the current architecture is in the list or an error
/// message otherwise.
static std::string
check_allowed_architectures(const model::strings_set& allowed_architectures,
const config::tree& user_config)
{
if (!allowed_architectures.empty()) {
const std::string architecture =
user_config.lookup< config::string_node >("architecture");
if (allowed_architectures.find(architecture) ==
allowed_architectures.end())
return F("Current architecture '%s' not supported") % architecture;
}
return "";
}
/// Checks if the allowed platforms match the current architecture.
///
/// \param allowed_platforms Set of allowed platforms.
/// \param user_config Runtime user configuration.
///
/// \return Empty if the current platform is in the list or an error message
/// otherwise.
static std::string
check_allowed_platforms(const model::strings_set& allowed_platforms,
const config::tree& user_config)
{
if (!allowed_platforms.empty()) {
const std::string platform =
user_config.lookup< config::string_node >("platform");
if (allowed_platforms.find(platform) == allowed_platforms.end())
return F("Current platform '%s' not supported") % platform;
}
return "";
}
/// Checks if the current user matches the required user.
///
/// \param required_user Name of the required user category.
/// \param user_config Runtime user configuration.
///
/// \return Empty if the current user fits the required user characteristics or
/// an error message otherwise.
static std::string
check_required_user(const std::string& required_user,
const config::tree& user_config)
{
if (!required_user.empty()) {
const passwd::user user = passwd::current_user();
if (required_user == "root") {
if (!user.is_root())
return "Requires root privileges";
} else if (required_user == "unprivileged") {
if (user.is_root())
if (!user_config.is_set("unprivileged_user"))
return "Requires an unprivileged user but the "
"unprivileged-user configuration variable is not "
"defined";
} else
UNREACHABLE_MSG("Value of require.user not properly validated");
}
return "";
}
/// Checks if all required files exist.
///
/// \param required_files Set of paths.
///
/// \return Empty if the required files all exist or an error message otherwise.
static std::string
check_required_files(const model::paths_set& required_files)
{
for (model::paths_set::const_iterator iter = required_files.begin();
iter != required_files.end(); iter++) {
INV((*iter).is_absolute());
if (!fs::exists(*iter))
return F("Required file '%s' not found") % *iter;
}
return "";
}
/// Checks if all required programs exist.
///
/// \param required_programs Set of paths.
///
/// \return Empty if the required programs all exist or an error message
/// otherwise.
static std::string
check_required_programs(const model::paths_set& required_programs)
{
for (model::paths_set::const_iterator iter = required_programs.begin();
iter != required_programs.end(); iter++) {
if ((*iter).is_absolute()) {
if (!fs::exists(*iter))
return F("Required program '%s' not found") % *iter;
} else {
if (!fs::find_in_path((*iter).c_str()))
return F("Required program '%s' not found in PATH") % *iter;
}
}
return "";
}
/// Checks if the current system has the specified amount of memory.
///
/// \param required_memory Amount of required physical memory, or zero if not
/// applicable.
///
/// \return Empty if the current system has the required amount of memory or an
/// error message otherwise.
static std::string
check_required_memory(const units::bytes& required_memory)
{
if (required_memory > 0) {
const units::bytes physical_memory = utils::physical_memory();
if (physical_memory > 0 && physical_memory < required_memory)
return F("Requires %s bytes of physical memory but only %s "
"available") %
required_memory.format() % physical_memory.format();
}
return "";
}
/// Checks if the work directory's file system has enough free disk space.
///
/// \param required_disk_space Amount of required free disk space, or zero if
/// not applicable.
/// \param work_directory Path to where the test case will be run.
///
/// \return Empty if the file system where the work directory is hosted has
/// enough free disk space or an error message otherwise.
static std::string
check_required_disk_space(const units::bytes& required_disk_space,
const fs::path& work_directory)
{
if (required_disk_space > 0) {
const units::bytes free_disk_space = fs::free_disk_space(
work_directory);
if (free_disk_space < required_disk_space)
return F("Requires %s bytes of free disk space but only %s "
"available") %
required_disk_space.format() % free_disk_space.format();
}
return "";
}
} // anonymous namespace
/// Checks if all the requirements specified by the test case are met.
///
/// \param md The test metadata.
/// \param cfg The engine configuration.
/// \param test_suite Name of the test suite the test belongs to.
/// \param work_directory Path to where the test case will be run.
///
/// \return A string describing the reason for skipping the test, or empty if
/// the test should be executed.
std::string
engine::check_reqs(const model::metadata& md, const config::tree& cfg,
const std::string& test_suite,
const fs::path& work_directory)
{
std::string reason;
reason = check_required_configs(md.required_configs(), cfg, test_suite);
if (!reason.empty())
return reason;
reason = check_allowed_architectures(md.allowed_architectures(), cfg);
if (!reason.empty())
return reason;
reason = check_allowed_platforms(md.allowed_platforms(), cfg);
if (!reason.empty())
return reason;
reason = check_required_user(md.required_user(), cfg);
if (!reason.empty())
return reason;
reason = check_required_files(md.required_files());
if (!reason.empty())
return reason;
reason = check_required_programs(md.required_programs());
if (!reason.empty())
return reason;
reason = check_required_memory(md.required_memory());
if (!reason.empty())
return reason;
reason = check_required_disk_space(md.required_disk_space(),
work_directory);
if (!reason.empty())
return reason;
INV(reason.empty());
return reason;
}