2016-11-30 06:21:53 +01:00
|
|
|
#!/usr/bin/env python
|
2017-05-11 07:25:02 +02:00
|
|
|
"""Interpreter and code coverage injector for use with ansible-test.
|
|
|
|
|
|
|
|
The injector serves two main purposes:
|
|
|
|
|
|
|
|
1) Control the python interpreter used to run test tools and ansible code.
|
|
|
|
2) Provide optional code coverage analysis of ansible code.
|
|
|
|
|
|
|
|
The injector is executed one of two ways:
|
|
|
|
|
|
|
|
1) On the controller via a symbolic link such as ansible or pytest.
|
|
|
|
This is accomplished by prepending the injector directory to the PATH by ansible-test.
|
|
|
|
|
|
|
|
2) As the python interpreter when running ansible modules.
|
|
|
|
This is only supported when connecting to the local host.
|
|
|
|
Otherwise set the ANSIBLE_TEST_REMOTE_INTERPRETER environment variable.
|
|
|
|
It can be empty to auto-detect the python interpreter on the remote host.
|
|
|
|
If not empty it will be used to set ansible_python_interpreter.
|
|
|
|
|
|
|
|
NOTE: Running ansible-test with the --tox option or inside a virtual environment
|
|
|
|
may prevent the injector from working for tests which use connection
|
|
|
|
types other than local, or which use become, due to lack of permissions
|
|
|
|
to access the interpreter for the virtual environment.
|
|
|
|
"""
|
2016-11-30 06:21:53 +01:00
|
|
|
|
|
|
|
from __future__ import absolute_import, print_function
|
|
|
|
|
|
|
|
import errno
|
2017-05-11 07:25:02 +02:00
|
|
|
import json
|
2016-11-30 06:21:53 +01:00
|
|
|
import os
|
|
|
|
import sys
|
|
|
|
import pipes
|
|
|
|
import logging
|
|
|
|
import getpass
|
|
|
|
|
|
|
|
logger = logging.getLogger('injector') # pylint: disable=locally-disabled, invalid-name
|
2017-05-11 07:25:02 +02:00
|
|
|
# pylint: disable=locally-disabled, invalid-name
|
|
|
|
config = None # type: InjectorConfig
|
|
|
|
|
|
|
|
|
|
|
|
class InjectorConfig(object):
|
|
|
|
"""Mandatory configuration."""
|
|
|
|
def __init__(self, config_path):
|
|
|
|
"""Initialize config."""
|
|
|
|
with open(config_path) as config_fd:
|
|
|
|
_config = json.load(config_fd)
|
|
|
|
|
|
|
|
self.python_interpreter = _config['python_interpreter']
|
|
|
|
self.coverage_file = _config['coverage_file']
|
|
|
|
|
|
|
|
# Read from the environment instead of config since it needs to be changed by integration test scripts.
|
|
|
|
# It also does not need to flow from the controller to the remote. It is only used on the controller.
|
|
|
|
self.remote_interpreter = os.environ.get('ANSIBLE_TEST_REMOTE_INTERPRETER', None)
|
|
|
|
|
|
|
|
self.arguments = [to_text(c) for c in sys.argv]
|
|
|
|
|
|
|
|
|
|
|
|
def to_text(value):
|
|
|
|
"""
|
|
|
|
:type value: str | None
|
|
|
|
:rtype: str | None
|
|
|
|
"""
|
|
|
|
if value is None:
|
|
|
|
return None
|
|
|
|
|
|
|
|
if isinstance(value, bytes):
|
|
|
|
return value.decode('utf-8')
|
|
|
|
|
|
|
|
return u'%s' % value
|
2016-11-30 06:21:53 +01:00
|
|
|
|
|
|
|
|
|
|
|
def main():
|
|
|
|
"""Main entry point."""
|
2017-05-11 07:25:02 +02:00
|
|
|
global config # pylint: disable=locally-disabled, global-statement
|
|
|
|
|
2016-12-01 01:26:47 +01:00
|
|
|
formatter = logging.Formatter('%(asctime)s %(process)d %(levelname)s %(message)s')
|
2016-11-30 06:21:53 +01:00
|
|
|
log_name = 'ansible-test-coverage.%s.log' % getpass.getuser()
|
|
|
|
self_dir = os.path.dirname(os.path.abspath(__file__))
|
|
|
|
|
|
|
|
handler = logging.FileHandler(os.path.join('/tmp', log_name))
|
|
|
|
handler.setFormatter(formatter)
|
|
|
|
logger.addHandler(handler)
|
|
|
|
|
|
|
|
handler = logging.FileHandler(os.path.abspath(os.path.join(self_dir, '..', 'logs', log_name)))
|
|
|
|
handler.setFormatter(formatter)
|
|
|
|
logger.addHandler(handler)
|
|
|
|
|
|
|
|
logger.setLevel(logging.DEBUG)
|
|
|
|
|
|
|
|
try:
|
|
|
|
logger.debug('Self: %s', __file__)
|
|
|
|
|
2017-05-11 07:25:02 +02:00
|
|
|
config_path = os.path.join(os.path.dirname(os.path.abspath(__file__)), 'injector.json')
|
|
|
|
|
|
|
|
try:
|
|
|
|
config = InjectorConfig(config_path)
|
|
|
|
except IOError:
|
|
|
|
logger.exception('Error reading config: %s', config_path)
|
|
|
|
exit('No injector config found. Set ANSIBLE_TEST_REMOTE_INTERPRETER if the test is not connecting to the local host.')
|
|
|
|
|
|
|
|
logger.debug('Arguments: %s', ' '.join(pipes.quote(c) for c in config.arguments))
|
|
|
|
logger.debug('Python interpreter: %s', config.python_interpreter)
|
|
|
|
logger.debug('Remote interpreter: %s', config.remote_interpreter)
|
|
|
|
logger.debug('Coverage file: %s', config.coverage_file)
|
|
|
|
|
|
|
|
require_cwd = False
|
|
|
|
|
|
|
|
if os.path.basename(__file__) == 'injector.py':
|
|
|
|
if config.coverage_file:
|
|
|
|
args, env, require_cwd = cover()
|
|
|
|
else:
|
|
|
|
args, env = runner()
|
2016-11-30 06:21:53 +01:00
|
|
|
else:
|
|
|
|
args, env = injector()
|
|
|
|
|
|
|
|
logger.debug('Run command: %s', ' '.join(pipes.quote(c) for c in args))
|
|
|
|
|
2017-05-11 07:25:02 +02:00
|
|
|
altered_cwd = False
|
|
|
|
|
2016-11-30 06:21:53 +01:00
|
|
|
try:
|
|
|
|
cwd = os.getcwd()
|
|
|
|
except OSError as ex:
|
2017-05-11 07:25:02 +02:00
|
|
|
# some platforms, such as OS X, may not allow querying the working directory when using become to drop privileges
|
2016-11-30 06:21:53 +01:00
|
|
|
if ex.errno != errno.EACCES:
|
|
|
|
raise
|
2017-05-11 07:25:02 +02:00
|
|
|
if require_cwd:
|
|
|
|
# make sure the program we execute can determine the working directory if it's required
|
|
|
|
cwd = '/'
|
|
|
|
os.chdir(cwd)
|
|
|
|
altered_cwd = True
|
|
|
|
else:
|
|
|
|
cwd = None
|
2016-11-30 06:21:53 +01:00
|
|
|
|
2017-05-11 07:25:02 +02:00
|
|
|
logger.debug('Working directory: %s%s', cwd or '?', ' (altered)' if altered_cwd else '')
|
2016-11-30 06:21:53 +01:00
|
|
|
|
|
|
|
for key in sorted(env.keys()):
|
|
|
|
logger.debug('%s=%s', key, env[key])
|
|
|
|
|
|
|
|
os.execvpe(args[0], args, env)
|
|
|
|
except Exception as ex:
|
|
|
|
logger.fatal(ex)
|
|
|
|
raise
|
|
|
|
|
|
|
|
|
|
|
|
def injector():
|
|
|
|
"""
|
|
|
|
:rtype: list[str], dict[str, str]
|
|
|
|
"""
|
|
|
|
command = os.path.basename(__file__)
|
|
|
|
executable = find_executable(command)
|
|
|
|
|
2017-05-11 07:25:02 +02:00
|
|
|
if config.coverage_file:
|
|
|
|
args, env = coverage_command()
|
|
|
|
else:
|
|
|
|
args, env = [config.python_interpreter], os.environ.copy()
|
|
|
|
|
|
|
|
args += [executable]
|
|
|
|
|
|
|
|
if command in ('ansible', 'ansible-playbook', 'ansible-pull'):
|
|
|
|
if config.remote_interpreter is None:
|
|
|
|
interpreter = os.path.join(os.path.dirname(__file__), 'injector.py')
|
|
|
|
elif config.remote_interpreter == '':
|
|
|
|
interpreter = None
|
2016-11-30 06:21:53 +01:00
|
|
|
else:
|
2017-05-11 07:25:02 +02:00
|
|
|
interpreter = config.remote_interpreter
|
2016-11-30 06:21:53 +01:00
|
|
|
|
2017-05-11 07:25:02 +02:00
|
|
|
if interpreter:
|
2016-11-30 06:21:53 +01:00
|
|
|
args += ['--extra-vars', 'ansible_python_interpreter=' + interpreter]
|
|
|
|
|
2017-05-11 07:25:02 +02:00
|
|
|
args += config.arguments[1:]
|
2016-11-30 06:21:53 +01:00
|
|
|
|
|
|
|
return args, env
|
|
|
|
|
|
|
|
|
|
|
|
def runner():
|
|
|
|
"""
|
|
|
|
:rtype: list[str], dict[str, str]
|
|
|
|
"""
|
2017-05-11 07:25:02 +02:00
|
|
|
args, env = [config.python_interpreter], os.environ.copy()
|
2016-11-30 06:21:53 +01:00
|
|
|
|
2017-05-11 07:25:02 +02:00
|
|
|
args += config.arguments[1:]
|
2016-11-30 06:21:53 +01:00
|
|
|
|
|
|
|
return args, env
|
|
|
|
|
|
|
|
|
|
|
|
def cover():
|
|
|
|
"""
|
2017-05-11 07:25:02 +02:00
|
|
|
:rtype: list[str], dict[str, str], bool
|
2016-11-30 06:21:53 +01:00
|
|
|
"""
|
2017-05-11 07:25:02 +02:00
|
|
|
if len(config.arguments) > 1:
|
|
|
|
executable = config.arguments[1]
|
2016-11-30 06:21:53 +01:00
|
|
|
else:
|
|
|
|
executable = ''
|
|
|
|
|
2017-05-11 07:25:02 +02:00
|
|
|
require_cwd = False
|
|
|
|
|
2016-11-30 06:21:53 +01:00
|
|
|
if os.path.basename(executable).startswith('ansible_module_'):
|
2017-05-11 07:25:02 +02:00
|
|
|
args, env = coverage_command()
|
|
|
|
# coverage requires knowing the working directory
|
|
|
|
require_cwd = True
|
2016-11-30 06:21:53 +01:00
|
|
|
else:
|
2017-05-11 07:25:02 +02:00
|
|
|
args, env = [config.python_interpreter], os.environ.copy()
|
2016-11-30 06:21:53 +01:00
|
|
|
|
2017-05-11 07:25:02 +02:00
|
|
|
args += config.arguments[1:]
|
2016-11-30 06:21:53 +01:00
|
|
|
|
2017-05-11 07:25:02 +02:00
|
|
|
return args, env, require_cwd
|
2016-11-30 06:21:53 +01:00
|
|
|
|
|
|
|
|
2017-05-11 07:25:02 +02:00
|
|
|
def coverage_command():
|
2016-11-30 06:21:53 +01:00
|
|
|
"""
|
|
|
|
:rtype: list[str], dict[str, str]
|
|
|
|
"""
|
2017-05-11 07:25:02 +02:00
|
|
|
self_dir = os.path.dirname(os.path.abspath(__file__))
|
2016-11-30 06:21:53 +01:00
|
|
|
|
|
|
|
args = [
|
2017-05-11 07:25:02 +02:00
|
|
|
config.python_interpreter,
|
|
|
|
'-m',
|
|
|
|
'coverage.__main__',
|
2016-11-30 06:21:53 +01:00
|
|
|
'run',
|
|
|
|
'--rcfile',
|
|
|
|
os.path.join(self_dir, '.coveragerc'),
|
|
|
|
]
|
|
|
|
|
|
|
|
env = os.environ.copy()
|
2017-05-11 07:25:02 +02:00
|
|
|
env['COVERAGE_FILE'] = config.coverage_file
|
2016-11-30 06:21:53 +01:00
|
|
|
|
|
|
|
return args, env
|
|
|
|
|
|
|
|
|
|
|
|
def find_executable(executable):
|
|
|
|
"""
|
|
|
|
:type executable: str
|
|
|
|
:rtype: str
|
|
|
|
"""
|
|
|
|
self = os.path.abspath(__file__)
|
|
|
|
path = os.environ.get('PATH', os.defpath)
|
|
|
|
seen_dirs = set()
|
|
|
|
|
|
|
|
for path_dir in path.split(os.pathsep):
|
|
|
|
if path_dir in seen_dirs:
|
|
|
|
continue
|
|
|
|
|
|
|
|
seen_dirs.add(path_dir)
|
|
|
|
candidate = os.path.abspath(os.path.join(path_dir, executable))
|
|
|
|
|
|
|
|
if candidate == self:
|
|
|
|
continue
|
|
|
|
|
|
|
|
if os.path.exists(candidate) and os.access(candidate, os.F_OK | os.X_OK):
|
|
|
|
return candidate
|
|
|
|
|
|
|
|
raise Exception('Executable "%s" not found in path: %s' % (executable, path))
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
main()
|