forked from zephyrproject-rtos/zephyr
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
sanitycheck: validate YAML files w/ schemas files
This introduces an schema-based YAML validation process when loading any YAML file, before doing any operations on them. An exception will be raised at SanityConfigParser() if the file fails to verify with the given schema. Schemas are defined for the platform files in board///*.yaml and for the (sample|testcase).yaml files. The verification is done using the pykwalify python library. If not installed, a warning is printed and the verification schema is skipped. At some point, we might want to force it being installed. The verification library is made a separate module (scl.py) so it can be easily imported by others. Signed-off-by: Inaky Perez-Gonzalez <[email protected]>
- Loading branch information
1 parent
d3409c5
commit 662dde6
Showing
5 changed files
with
268 additions
and
24 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
# | ||
# Schema to validate a YAML file describing a Zephyr test platform | ||
# | ||
# We load this with pykwalify | ||
# (http://pykwalify.readthedocs.io/en/unstable/validation-rules.html), | ||
# a YAML structure validator, to validate the YAML files that describe | ||
# Zephyr test platforms | ||
# | ||
# The original spec comes from Zephyr's sanitycheck script | ||
# | ||
|
||
type: map | ||
mapping: | ||
"identifier": | ||
type: str | ||
"name": | ||
type: str | ||
"type": | ||
type: str | ||
enum: [ 'mcu', 'qemu' ] | ||
"arch": | ||
type: str | ||
"toolchain": | ||
type: seq | ||
seq: | ||
- | ||
type: str | ||
enum: [ 'gccarmemb', 'issm', 'xcc', 'zephyr' ] | ||
"ram": | ||
type: int | ||
"flash": | ||
type: int | ||
"supported": | ||
type: seq | ||
seq: | ||
- | ||
type: str | ||
"testing": | ||
type: map | ||
mapping: | ||
"default": | ||
type: bool | ||
"ignore_tags": | ||
type: seq | ||
seq: | ||
- | ||
type: str |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,102 @@ | ||
# | ||
# Schema to validate a YAML file describing a Zephyr test platform | ||
# | ||
# We load this with pykwalify | ||
# (http://pykwalify.readthedocs.io/en/unstable/validation-rules.html), | ||
# a YAML structure validator, to validate the YAML files that describe | ||
# Zephyr test platforms | ||
# | ||
# The original spec comes from Zephyr's sanitycheck script | ||
# | ||
type: map | ||
mapping: | ||
# The sample descriptor, if present | ||
"sample": | ||
type: map | ||
required: no | ||
mapping: | ||
"name": | ||
type: str | ||
required: yes | ||
"description": | ||
type: str | ||
required: no | ||
"platforms": | ||
type: str | ||
required: no | ||
# The list of testcases -- IDK why this is a sequence of | ||
# maps maps, shall just be a sequence of maps | ||
# maybe it is just an artifact? | ||
"tests": | ||
type: seq | ||
required: yes | ||
sequence: | ||
- type: map | ||
matching-rule: "any" | ||
mapping: | ||
# The key for the testname is any, so | ||
# regex;(([a-zA-Z0-9_]+)) for this to work, note below we | ||
# make it required: no | ||
regex;(([a-zA-Z0-9_]+)): | ||
type: map | ||
# has to be not-required, otherwise the parser gets | ||
# confused and things it never found it | ||
required: no | ||
mapping: | ||
"arch_exclude": | ||
type: str | ||
required: no | ||
"arch_whitelist": | ||
type: str | ||
required: no | ||
"build_only": | ||
type: bool | ||
required: no | ||
"build_on_all": | ||
type: bool | ||
required: no | ||
"depends_on": | ||
type: str | ||
required: no | ||
"extra_args": | ||
type: str | ||
required: no | ||
"extra_sections": | ||
type: str | ||
required: no | ||
"filter": | ||
type: str | ||
required: no | ||
"min_ram": | ||
type: int | ||
required: no | ||
"min_flash": | ||
type: int | ||
required: no | ||
"platform_exclude": | ||
type: str | ||
required: no | ||
"platform_whitelist": | ||
type: str | ||
required: no | ||
"tags": | ||
type: str | ||
required: yes | ||
"timeout": | ||
type: int | ||
required: no | ||
"toolchain_exclude": | ||
type: str | ||
required: no | ||
"toolchain_whitelist": | ||
type: str | ||
required: no | ||
"type": | ||
type: str | ||
enum: [ 'unit' ] | ||
"skip": | ||
type: bool | ||
required: no | ||
"slow": | ||
type: bool | ||
required: no |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,72 @@ | ||
#! /usr/bin/python | ||
# | ||
# Zephyr's Sanity Check library | ||
# | ||
# Set of code that other projects can also import to do things on | ||
# Zephyr's sanity check testcases. | ||
|
||
import logging | ||
import os | ||
import yaml | ||
|
||
log = logging.getLogger("scl") | ||
|
||
# | ||
# | ||
def yaml_load(filename): | ||
""" | ||
Safely load a YAML document | ||
Follows recomendations from | ||
https://security.openstack.org/guidelines/dg_avoid-dangerous-input-parsing-libraries.html. | ||
:param str filename: filename to load | ||
:raises yaml.scanner: On YAML scan issues | ||
:raises: any other exception on file access erors | ||
:return: dictionary representing the YAML document | ||
""" | ||
try: | ||
with open(filename, 'r') as f: | ||
return yaml.safe_load(f) | ||
except yaml.scanner.ScannerError as e: # For errors parsing schema.yaml | ||
mark = e.problem_mark | ||
cmark = e.context_mark | ||
log.error("%s:%d:%d: error: %s (note %s context @%s:%d:%d %s)", | ||
mark.name, mark.line, mark.column, e.problem, | ||
e.note, cmark.name, cmark.line, cmark.column, e.context) | ||
raise | ||
|
||
# If pykwalify is installed, then the validate functionw ill work -- | ||
# otherwise, it is a stub and we'd warn about it. | ||
try: | ||
import pykwalify.core | ||
# Don't print error messages yourself, let us do it | ||
logging.getLogger("pykwalify.core").setLevel(50) | ||
|
||
def _yaml_validate(data, schema): | ||
if not schema: | ||
return | ||
c = pykwalify.core.Core(source_data = data, schema_data = schema) | ||
c.validate(raise_exception = True) | ||
|
||
except ImportError as e: | ||
log.warning("can't import pykwalify; won't validate YAML (%s)", e) | ||
def _yaml_validate(data, schema): | ||
pass | ||
|
||
def yaml_load_verify(filename, schema): | ||
""" | ||
Safely load a testcase/sample yaml document and validate it | ||
against the YAML schema, returing in case of success the YAML data. | ||
:param str filename: name of the file to load and process | ||
:param dict schema: loaded YAML schema (can load with :func:`yaml_load`) | ||
# 'document.yaml' contains a single YAML document. | ||
:raises yaml.scanner.ScannerError: on YAML parsing error | ||
:raises pykwalify.errors.SchemaError: on Schema violation error | ||
""" | ||
# 'document.yaml' contains a single YAML document. | ||
y = yaml_load(filename) | ||
_yaml_validate(y, schema) | ||
return y |