mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-10-30 18:03:32 +00:00
4b3a46ca6a
This script will check output generated by virtestmock against a white list. All non matching records found are printed out. So far, the white list is rather sparse at the moment. This test should be ran only after all other tests finished, and should cleanup the temporary file before their execution. Because I'm unable to reflect these requirements in Makefile.am correctly, I've introduced new target 'check-access' under which this test is available. Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
105 lines
2.6 KiB
Perl
Executable File
105 lines
2.6 KiB
Perl
Executable File
#!/usr/bin/perl -w
|
|
#
|
|
# Copyright (C) 2016 Red Hat, Inc.
|
|
#
|
|
# This library is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU Lesser General Public
|
|
# License as published by the Free Software Foundation; either
|
|
# version 2.1 of the License, or (at your option) any later version.
|
|
#
|
|
# This library is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
# Lesser General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU Lesser General Public
|
|
# License along with this library. If not, see
|
|
# <http://www.gnu.org/licenses/>.
|
|
#
|
|
# This script is supposed to check test_file_access.txt file and
|
|
# warn about file accesses outside our working tree.
|
|
#
|
|
#
|
|
|
|
use strict;
|
|
use warnings;
|
|
|
|
my $access_file = "test_file_access.txt";
|
|
my $whitelist_file = "file_access_whitelist.txt";
|
|
|
|
my @files;
|
|
my @whitelist;
|
|
|
|
open FILE, "<", $access_file or die "Unable to open $access_file: $!";
|
|
while (<FILE>) {
|
|
chomp;
|
|
if (/^(\S*):\s*(\S*)(\s*:\s*(.*))?$/) {
|
|
my %rec;
|
|
${rec}{path} = $1;
|
|
${rec}{progname} = $2;
|
|
if (defined $4) {
|
|
${rec}{testname} = $4;
|
|
}
|
|
push (@files, \%rec);
|
|
} else {
|
|
die "Malformed line $_";
|
|
}
|
|
}
|
|
close FILE;
|
|
|
|
open FILE, "<", $whitelist_file or die "Unable to open $whitelist_file: $!";
|
|
while (<FILE>) {
|
|
chomp;
|
|
if (/^\s*#.*$/) {
|
|
# comment
|
|
} elsif (/^(\S*)(:\s*(\S*)(\s*:\s*(.*))?)?$/) {
|
|
my %rec;
|
|
${rec}{path} = $1;
|
|
if (defined $3) {
|
|
${rec}{progname} = $3;
|
|
}
|
|
if (defined $5) {
|
|
${rec}{testname} = $5;
|
|
}
|
|
push (@whitelist, \%rec);
|
|
} else {
|
|
die "Malformed line $_";
|
|
}
|
|
}
|
|
close FILE;
|
|
|
|
# Now we should check if %traces is included in $whitelist. For
|
|
# now checking just keys is sufficient
|
|
my $error = 0;
|
|
for my $file (@files) {
|
|
my $match = 0;
|
|
|
|
for my $rule (@whitelist) {
|
|
if (not %${file}{path} =~ m/^$rule->{path}$/) {
|
|
next;
|
|
}
|
|
|
|
if (defined %${rule}{progname} and
|
|
not %${file}{progname} =~ m/^$rule->{progname}$/) {
|
|
next;
|
|
}
|
|
|
|
if (defined %${rule}{testname} and
|
|
defined %${file}{testname} and
|
|
not %${file}{testname} =~ m/^$rule->{testname}$/) {
|
|
next;
|
|
}
|
|
|
|
$match = 1;
|
|
}
|
|
|
|
if (not $match) {
|
|
$error = 1;
|
|
print "$file->{path}: $file->{progname}";
|
|
print ": $file->{testname}" if defined %${file}{testname};
|
|
print "\n";
|
|
}
|
|
}
|
|
|
|
exit $error;
|