etcd_spawn_cov.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116
  1. // Copyright 2017 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. // +build cov
  15. package e2e
  16. import (
  17. "fmt"
  18. "os"
  19. "path/filepath"
  20. "strings"
  21. "syscall"
  22. "time"
  23. "github.com/coreos/etcd/pkg/expect"
  24. "github.com/coreos/etcd/pkg/fileutil"
  25. "github.com/coreos/etcd/pkg/flags"
  26. )
  27. const noOutputLineCount = 2 // cov-enabled binaries emit PASS and coverage count lines
  28. func spawnCmd(args []string) (*expect.ExpectProcess, error) {
  29. if args[0] == binPath {
  30. covArgs, err := getCovArgs()
  31. if err != nil {
  32. return nil, err
  33. }
  34. ep, err := expect.NewExpectWithEnv(binDir+"/etcd_test", covArgs, args2env(args[1:]))
  35. if err != nil {
  36. return nil, err
  37. }
  38. // ep sends SIGTERM to etcd_test process on ep.close()
  39. // allowing the process to exit gracefully in order to generate a coverage report.
  40. // note: go runtime ignores SIGINT but not SIGTERM
  41. // if e2e test is run as a background process.
  42. ep.StopSignal = syscall.SIGTERM
  43. return ep, nil
  44. }
  45. if args[0] == ctlBinPath {
  46. covArgs, err := getCovArgs()
  47. if err != nil {
  48. return nil, err
  49. }
  50. // avoid test flag conflicts in coverage enabled etcdctl by putting flags in ETCDCTL_ARGS
  51. ctl_cov_env := []string{
  52. "ETCDCTL_ARGS" + "=" + strings.Join(args, "\xff"),
  53. }
  54. // when withFlagByEnv() is used in testCtl(), env variables for ctl is set to os.env.
  55. // they must be included in ctl_cov_env.
  56. ctl_cov_env = append(ctl_cov_env, os.Environ()...)
  57. ep, err := expect.NewExpectWithEnv(binDir+"/etcdctl_test", covArgs, ctl_cov_env)
  58. if err != nil {
  59. return nil, err
  60. }
  61. ep.StopSignal = syscall.SIGTERM
  62. return ep, nil
  63. }
  64. return expect.NewExpect(args[0], args[1:]...)
  65. }
  66. func getCovArgs() ([]string, error) {
  67. coverPath := os.Getenv("COVERDIR")
  68. if !filepath.IsAbs(coverPath) {
  69. // COVERDIR is relative to etcd root but e2e test has its path set to be relative to the e2e folder.
  70. // adding ".." in front of COVERDIR ensures that e2e saves coverage reports to the correct location.
  71. coverPath = filepath.Join("..", coverPath)
  72. }
  73. if !fileutil.Exist(coverPath) {
  74. return nil, fmt.Errorf("could not find coverage folder")
  75. }
  76. covArgs := []string{
  77. fmt.Sprintf("-test.coverprofile=e2e.%v.coverprofile", time.Now().UnixNano()),
  78. "-test.outputdir=" + coverPath,
  79. }
  80. return covArgs, nil
  81. }
  82. func args2env(args []string) []string {
  83. var covEnvs []string
  84. for i := range args[1:] {
  85. if !strings.HasPrefix(args[i], "--") {
  86. continue
  87. }
  88. flag := strings.Split(args[i], "--")[1]
  89. val := "true"
  90. // split the flag that has "="
  91. // e.g --auto-tls=true" => flag=auto-tls and val=true
  92. if strings.Contains(args[i], "=") {
  93. split := strings.Split(flag, "=")
  94. flag = split[0]
  95. val = split[1]
  96. }
  97. if i+1 < len(args) {
  98. if !strings.HasPrefix(args[i+1], "--") {
  99. val = args[i+1]
  100. }
  101. }
  102. covEnvs = append(covEnvs, flags.FlagToEnv("ETCD", flag)+"="+val)
  103. }
  104. return covEnvs
  105. }