mirror of
https://github.com/opnsense/src.git
synced 2026-02-18 18:20:26 -05:00
A new Kyua concept is added -- "execution environment". A test can be configured to be run within a specific environment. The test case lifecycle is extended respectively: - execenv init (creates a jail or does nothing for default execenv="host") - test exec - cleanup exec (optional) - execenv cleanup (removes a jail or does nothing for default execenv="host") The following new functionality is provided, from bottom to top: 1 ATF based tests - The new "execenv" metadata property can be set to explicitly ask for an execution environment: "host" or "jail". If it's not defined, as all existing tests do, then it implicitly means "host". - The new "execenv.jail.params" metadata property can be optionally defined to ask Kyua to use specific jail(8) parameters during creation of a temporary jail. An example is "vnet allow.raw_sockets". Kyua implicitly adds "children.max" to "execenv_jail_params" parameters with the maximum possible value. A test case can override it. 2 Kyuafile - The same new metadata properties can be defined on Kyuafile level: "execenv" and "execenv_jail_params". - Note that historically ATF uses dotted style of metadata naming, while Kyua uses underscore style. Hence "execenv.jail.params" vs. "execenv_jail_params". 3 kyua.conf, kyua CLI - The new "execenvs" engine configuration variable can be set to a list of execution environments to run only tests designed for. Tests of not listed environments are skipped. - By default, this variable lists all execution environments supported by a Kyua binary, e.g. execenvs="host jail". - This variable can be changed via "kyua.conf" or via kyua CLI's "-v" parameter. For example, "kyua -v execenvs=host test" will run only host-based tests and skip jail-based ones. - Current value of this variable can be examined with "kyua config". [markj] This feature has not landed upstream yet. See the discussion in https://github.com/freebsd/kyua/pull/224 . Having the ability to automatically jail tests allows many network tests to run in parallel, giving a drastic speedup. So, let's import the feature and start using it in main. Signed-off-by: Igor Ostapenko <pm@igoro.pro> Reviewed by: markj, kp Tested by: markj, kp MFC after: 3 months Differential Revision: https://reviews.freebsd.org/D45865 (cherry picked from commit 257e70f1d5ee61037c8c59b116538d3b6b1427a2) Approved by: kp (mentor), markj (mentor)
326 lines
11 KiB
C++
326 lines
11 KiB
C++
// Copyright 2012 The Kyua Authors.
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without
|
|
// modification, are permitted provided that the following conditions are
|
|
// met:
|
|
//
|
|
// * Redistributions of source code must retain the above copyright
|
|
// notice, this list of conditions and the following disclaimer.
|
|
// * Redistributions in binary form must reproduce the above copyright
|
|
// notice, this list of conditions and the following disclaimer in the
|
|
// documentation and/or other materials provided with the distribution.
|
|
// * Neither the name of Google Inc. nor the names of its contributors
|
|
// may be used to endorse or promote products derived from this software
|
|
// without specific prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
#include "engine/requirements.hpp"
|
|
|
|
#include "engine/execenv/execenv.hpp"
|
|
#include "model/metadata.hpp"
|
|
#include "model/types.hpp"
|
|
#include "utils/config/nodes.ipp"
|
|
#include "utils/config/tree.ipp"
|
|
#include "utils/format/macros.hpp"
|
|
#include "utils/fs/operations.hpp"
|
|
#include "utils/fs/path.hpp"
|
|
#include "utils/memory.hpp"
|
|
#include "utils/passwd.hpp"
|
|
#include "utils/sanity.hpp"
|
|
#include "utils/units.hpp"
|
|
|
|
namespace config = utils::config;
|
|
namespace fs = utils::fs;
|
|
namespace passwd = utils::passwd;
|
|
namespace units = utils::units;
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
/// Checks if all required configuration variables are present.
|
|
///
|
|
/// \param required_configs Set of required variable names.
|
|
/// \param user_config Runtime user configuration.
|
|
/// \param test_suite_name Name of the test suite the test belongs to.
|
|
///
|
|
/// \return Empty if all variables are present or an error message otherwise.
|
|
static std::string
|
|
check_required_configs(const model::strings_set& required_configs,
|
|
const config::tree& user_config,
|
|
const std::string& test_suite_name)
|
|
{
|
|
for (model::strings_set::const_iterator iter = required_configs.begin();
|
|
iter != required_configs.end(); iter++) {
|
|
std::string property;
|
|
// TODO(jmmv): All this rewrite logic belongs in the ATF interface.
|
|
if ((*iter) == "unprivileged-user" || (*iter) == "unprivileged_user")
|
|
property = "unprivileged_user";
|
|
else
|
|
property = F("test_suites.%s.%s") % test_suite_name % (*iter);
|
|
|
|
if (!user_config.is_set(property))
|
|
return F("Required configuration property '%s' not defined") %
|
|
(*iter);
|
|
}
|
|
return "";
|
|
}
|
|
|
|
|
|
/// Checks if the allowed architectures match the current architecture.
|
|
///
|
|
/// \param allowed_architectures Set of allowed architectures.
|
|
/// \param user_config Runtime user configuration.
|
|
///
|
|
/// \return Empty if the current architecture is in the list or an error
|
|
/// message otherwise.
|
|
static std::string
|
|
check_allowed_architectures(const model::strings_set& allowed_architectures,
|
|
const config::tree& user_config)
|
|
{
|
|
if (!allowed_architectures.empty()) {
|
|
const std::string architecture =
|
|
user_config.lookup< config::string_node >("architecture");
|
|
if (allowed_architectures.find(architecture) ==
|
|
allowed_architectures.end())
|
|
return F("Current architecture '%s' not supported") % architecture;
|
|
}
|
|
return "";
|
|
}
|
|
|
|
|
|
/// Checks if test's execenv matches the user configuration.
|
|
///
|
|
/// \param execenv Execution environment name a test is designed for.
|
|
/// \param user_config Runtime user configuration.
|
|
///
|
|
/// \return Empty if the execenv is in the list or an error message otherwise.
|
|
static std::string
|
|
check_execenv(const std::string& execenv, const config::tree& user_config)
|
|
{
|
|
std::string name = execenv;
|
|
if (name.empty())
|
|
name = engine::execenv::default_execenv_name; // if test claims nothing
|
|
|
|
std::set< std::string > execenvs;
|
|
try {
|
|
execenvs = user_config.lookup< config::strings_set_node >("execenvs");
|
|
} catch (const config::unknown_key_error&) {
|
|
// okay, user config does not define it, empty set then
|
|
}
|
|
|
|
if (execenvs.find(name) == execenvs.end())
|
|
return F("'%s' execenv is not supported or not allowed by "
|
|
"the runtime user configuration") % name;
|
|
|
|
return "";
|
|
}
|
|
|
|
|
|
/// Checks if the allowed platforms match the current architecture.
|
|
///
|
|
/// \param allowed_platforms Set of allowed platforms.
|
|
/// \param user_config Runtime user configuration.
|
|
///
|
|
/// \return Empty if the current platform is in the list or an error message
|
|
/// otherwise.
|
|
static std::string
|
|
check_allowed_platforms(const model::strings_set& allowed_platforms,
|
|
const config::tree& user_config)
|
|
{
|
|
if (!allowed_platforms.empty()) {
|
|
const std::string platform =
|
|
user_config.lookup< config::string_node >("platform");
|
|
if (allowed_platforms.find(platform) == allowed_platforms.end())
|
|
return F("Current platform '%s' not supported") % platform;
|
|
}
|
|
return "";
|
|
}
|
|
|
|
|
|
/// Checks if the current user matches the required user.
|
|
///
|
|
/// \param required_user Name of the required user category.
|
|
/// \param user_config Runtime user configuration.
|
|
///
|
|
/// \return Empty if the current user fits the required user characteristics or
|
|
/// an error message otherwise.
|
|
static std::string
|
|
check_required_user(const std::string& required_user,
|
|
const config::tree& user_config)
|
|
{
|
|
if (!required_user.empty()) {
|
|
const passwd::user user = passwd::current_user();
|
|
if (required_user == "root") {
|
|
if (!user.is_root())
|
|
return "Requires root privileges";
|
|
} else if (required_user == "unprivileged") {
|
|
if (user.is_root())
|
|
if (!user_config.is_set("unprivileged_user"))
|
|
return "Requires an unprivileged user but the "
|
|
"unprivileged-user configuration variable is not "
|
|
"defined";
|
|
} else
|
|
UNREACHABLE_MSG("Value of require.user not properly validated");
|
|
}
|
|
return "";
|
|
}
|
|
|
|
|
|
/// Checks if all required files exist.
|
|
///
|
|
/// \param required_files Set of paths.
|
|
///
|
|
/// \return Empty if the required files all exist or an error message otherwise.
|
|
static std::string
|
|
check_required_files(const model::paths_set& required_files)
|
|
{
|
|
for (model::paths_set::const_iterator iter = required_files.begin();
|
|
iter != required_files.end(); iter++) {
|
|
INV((*iter).is_absolute());
|
|
if (!fs::exists(*iter))
|
|
return F("Required file '%s' not found") % *iter;
|
|
}
|
|
return "";
|
|
}
|
|
|
|
|
|
/// Checks if all required programs exist.
|
|
///
|
|
/// \param required_programs Set of paths.
|
|
///
|
|
/// \return Empty if the required programs all exist or an error message
|
|
/// otherwise.
|
|
static std::string
|
|
check_required_programs(const model::paths_set& required_programs)
|
|
{
|
|
for (model::paths_set::const_iterator iter = required_programs.begin();
|
|
iter != required_programs.end(); iter++) {
|
|
if ((*iter).is_absolute()) {
|
|
if (!fs::exists(*iter))
|
|
return F("Required program '%s' not found") % *iter;
|
|
} else {
|
|
if (!fs::find_in_path((*iter).c_str()))
|
|
return F("Required program '%s' not found in PATH") % *iter;
|
|
}
|
|
}
|
|
return "";
|
|
}
|
|
|
|
|
|
/// Checks if the current system has the specified amount of memory.
|
|
///
|
|
/// \param required_memory Amount of required physical memory, or zero if not
|
|
/// applicable.
|
|
///
|
|
/// \return Empty if the current system has the required amount of memory or an
|
|
/// error message otherwise.
|
|
static std::string
|
|
check_required_memory(const units::bytes& required_memory)
|
|
{
|
|
if (required_memory > 0) {
|
|
const units::bytes physical_memory = utils::physical_memory();
|
|
if (physical_memory > 0 && physical_memory < required_memory)
|
|
return F("Requires %s bytes of physical memory but only %s "
|
|
"available") %
|
|
required_memory.format() % physical_memory.format();
|
|
}
|
|
return "";
|
|
}
|
|
|
|
|
|
/// Checks if the work directory's file system has enough free disk space.
|
|
///
|
|
/// \param required_disk_space Amount of required free disk space, or zero if
|
|
/// not applicable.
|
|
/// \param work_directory Path to where the test case will be run.
|
|
///
|
|
/// \return Empty if the file system where the work directory is hosted has
|
|
/// enough free disk space or an error message otherwise.
|
|
static std::string
|
|
check_required_disk_space(const units::bytes& required_disk_space,
|
|
const fs::path& work_directory)
|
|
{
|
|
if (required_disk_space > 0) {
|
|
const units::bytes free_disk_space = fs::free_disk_space(
|
|
work_directory);
|
|
if (free_disk_space < required_disk_space)
|
|
return F("Requires %s bytes of free disk space but only %s "
|
|
"available") %
|
|
required_disk_space.format() % free_disk_space.format();
|
|
}
|
|
return "";
|
|
}
|
|
|
|
|
|
} // anonymous namespace
|
|
|
|
|
|
/// Checks if all the requirements specified by the test case are met.
|
|
///
|
|
/// \param md The test metadata.
|
|
/// \param cfg The engine configuration.
|
|
/// \param test_suite Name of the test suite the test belongs to.
|
|
/// \param work_directory Path to where the test case will be run.
|
|
///
|
|
/// \return A string describing the reason for skipping the test, or empty if
|
|
/// the test should be executed.
|
|
std::string
|
|
engine::check_reqs(const model::metadata& md, const config::tree& cfg,
|
|
const std::string& test_suite,
|
|
const fs::path& work_directory)
|
|
{
|
|
std::string reason;
|
|
|
|
reason = check_required_configs(md.required_configs(), cfg, test_suite);
|
|
if (!reason.empty())
|
|
return reason;
|
|
|
|
reason = check_allowed_architectures(md.allowed_architectures(), cfg);
|
|
if (!reason.empty())
|
|
return reason;
|
|
|
|
reason = check_execenv(md.execenv(), cfg);
|
|
if (!reason.empty())
|
|
return reason;
|
|
|
|
reason = check_allowed_platforms(md.allowed_platforms(), cfg);
|
|
if (!reason.empty())
|
|
return reason;
|
|
|
|
reason = check_required_user(md.required_user(), cfg);
|
|
if (!reason.empty())
|
|
return reason;
|
|
|
|
reason = check_required_files(md.required_files());
|
|
if (!reason.empty())
|
|
return reason;
|
|
|
|
reason = check_required_programs(md.required_programs());
|
|
if (!reason.empty())
|
|
return reason;
|
|
|
|
reason = check_required_memory(md.required_memory());
|
|
if (!reason.empty())
|
|
return reason;
|
|
|
|
reason = check_required_disk_space(md.required_disk_space(),
|
|
work_directory);
|
|
if (!reason.empty())
|
|
return reason;
|
|
|
|
INV(reason.empty());
|
|
return reason;
|
|
}
|