aboutsummaryrefslogtreecommitdiff
path: root/engine/requirements.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'engine/requirements.cpp')
-rw-r--r--engine/requirements.cpp293
1 files changed, 293 insertions, 0 deletions
diff --git a/engine/requirements.cpp b/engine/requirements.cpp
new file mode 100644
index 000000000000..a7b0a90d97db
--- /dev/null
+++ b/engine/requirements.cpp
@@ -0,0 +1,293 @@
+// Copyright 2012 The Kyua Authors.
+// All rights reserved.
+//
+// Redistribution and use in source and binary forms, with or without
+// modification, are permitted provided that the following conditions are
+// met:
+//
+// * Redistributions of source code must retain the above copyright
+// notice, this list of conditions and the following disclaimer.
+// * Redistributions in binary form must reproduce the above copyright
+// notice, this list of conditions and the following disclaimer in the
+// documentation and/or other materials provided with the distribution.
+// * Neither the name of Google Inc. nor the names of its contributors
+// may be used to endorse or promote products derived from this software
+// without specific prior written permission.
+//
+// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+#include "engine/requirements.hpp"
+
+#include "model/metadata.hpp"
+#include "model/types.hpp"
+#include "utils/config/nodes.ipp"
+#include "utils/config/tree.ipp"
+#include "utils/format/macros.hpp"
+#include "utils/fs/operations.hpp"
+#include "utils/fs/path.hpp"
+#include "utils/memory.hpp"
+#include "utils/passwd.hpp"
+#include "utils/sanity.hpp"
+#include "utils/units.hpp"
+
+namespace config = utils::config;
+namespace fs = utils::fs;
+namespace passwd = utils::passwd;
+namespace units = utils::units;
+
+
+namespace {
+
+
+/// Checks if all required configuration variables are present.
+///
+/// \param required_configs Set of required variable names.
+/// \param user_config Runtime user configuration.
+/// \param test_suite_name Name of the test suite the test belongs to.
+///
+/// \return Empty if all variables are present or an error message otherwise.
+static std::string
+check_required_configs(const model::strings_set& required_configs,
+ const config::tree& user_config,
+ const std::string& test_suite_name)
+{
+ for (model::strings_set::const_iterator iter = required_configs.begin();
+ iter != required_configs.end(); iter++) {
+ std::string property;
+ // TODO(jmmv): All this rewrite logic belongs in the ATF interface.
+ if ((*iter) == "unprivileged-user" || (*iter) == "unprivileged_user")
+ property = "unprivileged_user";
+ else
+ property = F("test_suites.%s.%s") % test_suite_name % (*iter);
+
+ if (!user_config.is_set(property))
+ return F("Required configuration property '%s' not defined") %
+ (*iter);
+ }
+ return "";
+}
+
+
+/// Checks if the allowed architectures match the current architecture.
+///
+/// \param allowed_architectures Set of allowed architectures.
+/// \param user_config Runtime user configuration.
+///
+/// \return Empty if the current architecture is in the list or an error
+/// message otherwise.
+static std::string
+check_allowed_architectures(const model::strings_set& allowed_architectures,
+ const config::tree& user_config)
+{
+ if (!allowed_architectures.empty()) {
+ const std::string architecture =
+ user_config.lookup< config::string_node >("architecture");
+ if (allowed_architectures.find(architecture) ==
+ allowed_architectures.end())
+ return F("Current architecture '%s' not supported") % architecture;
+ }
+ return "";
+}
+
+
+/// Checks if the allowed platforms match the current architecture.
+///
+/// \param allowed_platforms Set of allowed platforms.
+/// \param user_config Runtime user configuration.
+///
+/// \return Empty if the current platform is in the list or an error message
+/// otherwise.
+static std::string
+check_allowed_platforms(const model::strings_set& allowed_platforms,
+ const config::tree& user_config)
+{
+ if (!allowed_platforms.empty()) {
+ const std::string platform =
+ user_config.lookup< config::string_node >("platform");
+ if (allowed_platforms.find(platform) == allowed_platforms.end())
+ return F("Current platform '%s' not supported") % platform;
+ }
+ return "";
+}
+
+
+/// Checks if the current user matches the required user.
+///
+/// \param required_user Name of the required user category.
+/// \param user_config Runtime user configuration.
+///
+/// \return Empty if the current user fits the required user characteristics or
+/// an error message otherwise.
+static std::string
+check_required_user(const std::string& required_user,
+ const config::tree& user_config)
+{
+ if (!required_user.empty()) {
+ const passwd::user user = passwd::current_user();
+ if (required_user == "root") {
+ if (!user.is_root())
+ return "Requires root privileges";
+ } else if (required_user == "unprivileged") {
+ if (user.is_root())
+ if (!user_config.is_set("unprivileged_user"))
+ return "Requires an unprivileged user but the "
+ "unprivileged-user configuration variable is not "
+ "defined";
+ } else
+ UNREACHABLE_MSG("Value of require.user not properly validated");
+ }
+ return "";
+}
+
+
+/// Checks if all required files exist.
+///
+/// \param required_files Set of paths.
+///
+/// \return Empty if the required files all exist or an error message otherwise.
+static std::string
+check_required_files(const model::paths_set& required_files)
+{
+ for (model::paths_set::const_iterator iter = required_files.begin();
+ iter != required_files.end(); iter++) {
+ INV((*iter).is_absolute());
+ if (!fs::exists(*iter))
+ return F("Required file '%s' not found") % *iter;
+ }
+ return "";
+}
+
+
+/// Checks if all required programs exist.
+///
+/// \param required_programs Set of paths.
+///
+/// \return Empty if the required programs all exist or an error message
+/// otherwise.
+static std::string
+check_required_programs(const model::paths_set& required_programs)
+{
+ for (model::paths_set::const_iterator iter = required_programs.begin();
+ iter != required_programs.end(); iter++) {
+ if ((*iter).is_absolute()) {
+ if (!fs::exists(*iter))
+ return F("Required program '%s' not found") % *iter;
+ } else {
+ if (!fs::find_in_path((*iter).c_str()))
+ return F("Required program '%s' not found in PATH") % *iter;
+ }
+ }
+ return "";
+}
+
+
+/// Checks if the current system has the specified amount of memory.
+///
+/// \param required_memory Amount of required physical memory, or zero if not
+/// applicable.
+///
+/// \return Empty if the current system has the required amount of memory or an
+/// error message otherwise.
+static std::string
+check_required_memory(const units::bytes& required_memory)
+{
+ if (required_memory > 0) {
+ const units::bytes physical_memory = utils::physical_memory();
+ if (physical_memory > 0 && physical_memory < required_memory)
+ return F("Requires %s bytes of physical memory but only %s "
+ "available") %
+ required_memory.format() % physical_memory.format();
+ }
+ return "";
+}
+
+
+/// Checks if the work directory's file system has enough free disk space.
+///
+/// \param required_disk_space Amount of required free disk space, or zero if
+/// not applicable.
+/// \param work_directory Path to where the test case will be run.
+///
+/// \return Empty if the file system where the work directory is hosted has
+/// enough free disk space or an error message otherwise.
+static std::string
+check_required_disk_space(const units::bytes& required_disk_space,
+ const fs::path& work_directory)
+{
+ if (required_disk_space > 0) {
+ const units::bytes free_disk_space = fs::free_disk_space(
+ work_directory);
+ if (free_disk_space < required_disk_space)
+ return F("Requires %s bytes of free disk space but only %s "
+ "available") %
+ required_disk_space.format() % free_disk_space.format();
+ }
+ return "";
+}
+
+
+} // anonymous namespace
+
+
+/// Checks if all the requirements specified by the test case are met.
+///
+/// \param md The test metadata.
+/// \param cfg The engine configuration.
+/// \param test_suite Name of the test suite the test belongs to.
+/// \param work_directory Path to where the test case will be run.
+///
+/// \return A string describing the reason for skipping the test, or empty if
+/// the test should be executed.
+std::string
+engine::check_reqs(const model::metadata& md, const config::tree& cfg,
+ const std::string& test_suite,
+ const fs::path& work_directory)
+{
+ std::string reason;
+
+ reason = check_required_configs(md.required_configs(), cfg, test_suite);
+ if (!reason.empty())
+ return reason;
+
+ reason = check_allowed_architectures(md.allowed_architectures(), cfg);
+ if (!reason.empty())
+ return reason;
+
+ reason = check_allowed_platforms(md.allowed_platforms(), cfg);
+ if (!reason.empty())
+ return reason;
+
+ reason = check_required_user(md.required_user(), cfg);
+ if (!reason.empty())
+ return reason;
+
+ reason = check_required_files(md.required_files());
+ if (!reason.empty())
+ return reason;
+
+ reason = check_required_programs(md.required_programs());
+ if (!reason.empty())
+ return reason;
+
+ reason = check_required_memory(md.required_memory());
+ if (!reason.empty())
+ return reason;
+
+ reason = check_required_disk_space(md.required_disk_space(),
+ work_directory);
+ if (!reason.empty())
+ return reason;
+
+ INV(reason.empty());
+ return reason;
+}