aboutsummaryrefslogtreecommitdiff
path: root/llvm_tools/update_chromeos_llvm_hash_unittest.py
diff options
context:
space:
mode:
Diffstat (limited to 'llvm_tools/update_chromeos_llvm_hash_unittest.py')
-rwxr-xr-xllvm_tools/update_chromeos_llvm_hash_unittest.py801
1 files changed, 801 insertions, 0 deletions
diff --git a/llvm_tools/update_chromeos_llvm_hash_unittest.py b/llvm_tools/update_chromeos_llvm_hash_unittest.py
new file mode 100755
index 00000000..205feb0c
--- /dev/null
+++ b/llvm_tools/update_chromeos_llvm_hash_unittest.py
@@ -0,0 +1,801 @@
+#!/usr/bin/env python3
+# -*- coding: utf-8 -*-
+# Copyright 2019 The Chromium OS Authors. All rights reserved.
+# Use of this source code is governed by a BSD-style license that can be
+# found in the LICENSE file.
+
+"""Unit tests for updating LLVM hashes."""
+
+from __future__ import print_function
+
+from collections import namedtuple
+from datetime import datetime
+import os
+import re
+import subprocess
+import unittest
+import unittest.mock as mock
+
+import chroot
+import failure_modes
+import git
+import llvm_patch_management
+import test_helpers
+import update_chromeos_llvm_hash
+
+# These are unittests; protected access is OK to a point.
+# pylint: disable=protected-access
+
+
+class UpdateLLVMHashTest(unittest.TestCase):
+ """Test class for updating LLVM hashes of packages."""
+
+ # Simulate behavior of 'os.path.isfile()' when the ebuild path to a package
+ # does not exist.
+ @mock.patch.object(os.path, 'isfile', return_value=False)
+ def testFailedToUpdateLLVMHashForInvalidEbuildPath(self, mock_isfile):
+ ebuild_path = '/some/path/to/package.ebuild'
+ llvm_variant = update_chromeos_llvm_hash.LLVMVariant.current
+ git_hash = 'a123testhash1'
+ svn_version = 1000
+
+ # Verify the exception is raised when the ebuild path does not exist.
+ with self.assertRaises(ValueError) as err:
+ update_chromeos_llvm_hash.UpdateEbuildLLVMHash(ebuild_path, llvm_variant,
+ git_hash, svn_version)
+
+ self.assertEqual(
+ str(err.exception), 'Invalid ebuild path provided: %s' % ebuild_path)
+
+ mock_isfile.assert_called_once()
+
+ # Simulate 'os.path.isfile' behavior on a valid ebuild path.
+ @mock.patch.object(os.path, 'isfile', return_value=True)
+ def testFailedToUpdateLLVMHash(self, mock_isfile):
+ # Create a temporary file to simulate an ebuild file of a package.
+ with test_helpers.CreateTemporaryJsonFile() as ebuild_file:
+ with open(ebuild_file, 'w') as f:
+ f.write('\n'.join([
+ 'First line in the ebuild', 'Second line in the ebuild',
+ 'Last line in the ebuild'
+ ]))
+
+ llvm_variant = update_chromeos_llvm_hash.LLVMVariant.current
+ git_hash = 'a123testhash1'
+ svn_version = 1000
+
+ # Verify the exception is raised when the ebuild file does not have
+ # 'LLVM_HASH'.
+ with self.assertRaises(ValueError) as err:
+ update_chromeos_llvm_hash.UpdateEbuildLLVMHash(
+ ebuild_file, llvm_variant, git_hash, svn_version)
+
+ self.assertEqual(
+ str(err.exception), ('Failed to update %s.', 'LLVM_HASH'))
+
+ llvm_variant = update_chromeos_llvm_hash.LLVMVariant.next
+
+ self.assertEqual(mock_isfile.call_count, 2)
+
+ # Simulate 'os.path.isfile' behavior on a valid ebuild path.
+ @mock.patch.object(os.path, 'isfile', return_value=True)
+ def testFailedToUpdateLLVMNextHash(self, mock_isfile):
+ # Create a temporary file to simulate an ebuild file of a package.
+ with test_helpers.CreateTemporaryJsonFile() as ebuild_file:
+ with open(ebuild_file, 'w') as f:
+ f.write('\n'.join([
+ 'First line in the ebuild', 'Second line in the ebuild',
+ 'Last line in the ebuild'
+ ]))
+
+ llvm_variant = update_chromeos_llvm_hash.LLVMVariant.next
+ git_hash = 'a123testhash1'
+ svn_version = 1000
+
+ # Verify the exception is raised when the ebuild file does not have
+ # 'LLVM_NEXT_HASH'.
+ with self.assertRaises(ValueError) as err:
+ update_chromeos_llvm_hash.UpdateEbuildLLVMHash(
+ ebuild_file, llvm_variant, git_hash, svn_version)
+
+ self.assertEqual(
+ str(err.exception), ('Failed to update %s.', 'LLVM_NEXT_HASH'))
+
+ self.assertEqual(mock_isfile.call_count, 2)
+
+ @mock.patch.object(os.path, 'isfile', return_value=True)
+ @mock.patch.object(subprocess, 'check_output', return_value=None)
+ def testSuccessfullyStageTheEbuildForCommitForLLVMHashUpdate(
+ self, mock_stage_commit_command, mock_isfile):
+
+ # Create a temporary file to simulate an ebuild file of a package.
+ with test_helpers.CreateTemporaryJsonFile() as ebuild_file:
+ # Updates LLVM_HASH to 'git_hash' and revision to
+ # 'svn_version'.
+ llvm_variant = update_chromeos_llvm_hash.LLVMVariant.current
+ git_hash = 'a123testhash1'
+ svn_version = 1000
+
+ with open(ebuild_file, 'w') as f:
+ f.write('\n'.join([
+ 'First line in the ebuild', 'Second line in the ebuild',
+ 'LLVM_HASH=\"a12b34c56d78e90\" # r500', 'Last line in the ebuild'
+ ]))
+
+ update_chromeos_llvm_hash.UpdateEbuildLLVMHash(ebuild_file, llvm_variant,
+ git_hash, svn_version)
+
+ expected_file_contents = [
+ 'First line in the ebuild\n', 'Second line in the ebuild\n',
+ 'LLVM_HASH=\"a123testhash1\" # r1000\n', 'Last line in the ebuild'
+ ]
+
+ # Verify the new file contents of the ebuild file match the expected file
+ # contents.
+ with open(ebuild_file) as new_file:
+ file_contents_as_a_list = [cur_line for cur_line in new_file]
+ self.assertListEqual(file_contents_as_a_list, expected_file_contents)
+
+ self.assertEqual(mock_isfile.call_count, 2)
+
+ mock_stage_commit_command.assert_called_once()
+
+ @mock.patch.object(os.path, 'isfile', return_value=True)
+ @mock.patch.object(subprocess, 'check_output', return_value=None)
+ def testSuccessfullyStageTheEbuildForCommitForLLVMNextHashUpdate(
+ self, mock_stage_commit_command, mock_isfile):
+
+ # Create a temporary file to simulate an ebuild file of a package.
+ with test_helpers.CreateTemporaryJsonFile() as ebuild_file:
+ # Updates LLVM_NEXT_HASH to 'git_hash' and revision to
+ # 'svn_version'.
+ llvm_variant = update_chromeos_llvm_hash.LLVMVariant.next
+ git_hash = 'a123testhash1'
+ svn_version = 1000
+
+ with open(ebuild_file, 'w') as f:
+ f.write('\n'.join([
+ 'First line in the ebuild', 'Second line in the ebuild',
+ 'LLVM_NEXT_HASH=\"a12b34c56d78e90\" # r500',
+ 'Last line in the ebuild'
+ ]))
+
+ update_chromeos_llvm_hash.UpdateEbuildLLVMHash(ebuild_file, llvm_variant,
+ git_hash, svn_version)
+
+ expected_file_contents = [
+ 'First line in the ebuild\n', 'Second line in the ebuild\n',
+ 'LLVM_NEXT_HASH=\"a123testhash1\" # r1000\n',
+ 'Last line in the ebuild'
+ ]
+
+ # Verify the new file contents of the ebuild file match the expected file
+ # contents.
+ with open(ebuild_file) as new_file:
+ file_contents_as_a_list = [cur_line for cur_line in new_file]
+ self.assertListEqual(file_contents_as_a_list, expected_file_contents)
+
+ self.assertEqual(mock_isfile.call_count, 2)
+
+ mock_stage_commit_command.assert_called_once()
+
+ @mock.patch.object(os.path, 'islink', return_value=False)
+ def testFailedToUprevEbuildToVersionForInvalidSymlink(self, mock_islink):
+ symlink_path = '/path/to/chroot/package/package.ebuild'
+ svn_version = 1000
+
+ # Verify the exception is raised when a invalid symbolic link is passed in.
+ with self.assertRaises(ValueError) as err:
+ update_chromeos_llvm_hash.UprevEbuildToVersion(symlink_path, svn_version)
+
+ self.assertEqual(
+ str(err.exception), 'Invalid symlink provided: %s' % symlink_path)
+
+ mock_islink.assert_called_once()
+
+ @mock.patch.object(os.path, 'islink', return_value=False)
+ def testFailedToUprevEbuildSymlinkForInvalidSymlink(self, mock_islink):
+ symlink_path = '/path/to/chroot/package/package.ebuild'
+
+ # Verify the exception is raised when a invalid symbolic link is passed in.
+ with self.assertRaises(ValueError) as err:
+ update_chromeos_llvm_hash.UprevEbuildSymlink(symlink_path)
+
+ self.assertEqual(
+ str(err.exception), 'Invalid symlink provided: %s' % symlink_path)
+
+ mock_islink.assert_called_once()
+
+ # Simulate 'os.path.islink' when a symbolic link is passed in.
+ @mock.patch.object(os.path, 'islink', return_value=True)
+ # Simulate 'os.path.realpath' when a symbolic link is passed in.
+ @mock.patch.object(os.path, 'realpath', return_value=True)
+ def testFailedToUprevEbuildToVersion(self, mock_realpath, mock_islink):
+ symlink_path = '/path/to/chroot/llvm/llvm_pre123_p.ebuild'
+ mock_realpath.return_value = '/abs/path/to/llvm/llvm_pre123_p.ebuild'
+ svn_version = 1000
+
+ # Verify the exception is raised when the symlink does not match the
+ # expected pattern
+ with self.assertRaises(ValueError) as err:
+ update_chromeos_llvm_hash.UprevEbuildToVersion(symlink_path, svn_version)
+
+ self.assertEqual(str(err.exception), 'Failed to uprev the ebuild.')
+
+ mock_islink.assert_called_once_with(symlink_path)
+
+ # Simulate 'os.path.islink' when a symbolic link is passed in.
+ @mock.patch.object(os.path, 'islink', return_value=True)
+ def testFailedToUprevEbuildSymlink(self, mock_islink):
+ symlink_path = '/path/to/chroot/llvm/llvm_pre123_p.ebuild'
+
+ # Verify the exception is raised when the symlink does not match the
+ # expected pattern
+ with self.assertRaises(ValueError) as err:
+ update_chromeos_llvm_hash.UprevEbuildSymlink(symlink_path)
+
+ self.assertEqual(str(err.exception), 'Failed to uprev the symlink.')
+
+ mock_islink.assert_called_once_with(symlink_path)
+
+ @mock.patch.object(os.path, 'islink', return_value=True)
+ @mock.patch.object(os.path, 'realpath')
+ @mock.patch.object(subprocess, 'check_output', return_value=None)
+ def testSuccessfullyUprevEbuildToVersionLLVM(self, mock_command_output,
+ mock_realpath, mock_islink):
+ symlink = '/path/to/llvm/llvm_pre3_p2-r10.ebuild'
+ ebuild = '/abs/path/to/llvm/llvm_pre3_p2.ebuild'
+ mock_realpath.return_value = ebuild
+ svn_version = 1000
+
+ update_chromeos_llvm_hash.UprevEbuildToVersion(symlink, svn_version)
+
+ mock_islink.assert_called()
+
+ mock_realpath.assert_called_once_with(symlink)
+
+ mock_command_output.assert_called()
+
+ # Verify commands
+ symlink_dir = os.path.dirname(symlink)
+ new_ebuild, _is_changed = re.subn(
+ r'pre([0-9]+)_p([0-9]+)',
+ 'pre%s_p%s' % (svn_version, \
+ datetime.today().strftime('%Y%m%d')),
+ ebuild,
+ count=1)
+ new_symlink = new_ebuild[:-len('.ebuild')] + '-r1.ebuild'
+
+ expected_cmd = ['git', '-C', symlink_dir, 'mv', ebuild, new_ebuild]
+ self.assertEqual(mock_command_output.call_args_list[0],
+ mock.call(expected_cmd))
+
+ expected_cmd = ['ln', '-s', '-r', new_ebuild, new_symlink]
+ self.assertEqual(mock_command_output.call_args_list[1],
+ mock.call(expected_cmd))
+
+ expected_cmd = ['git', '-C', symlink_dir, 'add', new_symlink]
+ self.assertEqual(mock_command_output.call_args_list[2],
+ mock.call(expected_cmd))
+
+ expected_cmd = ['git', '-C', symlink_dir, 'rm', symlink]
+ self.assertEqual(mock_command_output.call_args_list[3],
+ mock.call(expected_cmd))
+
+ @mock.patch.object(os.path, 'islink', return_value=True)
+ @mock.patch.object(os.path, 'realpath')
+ @mock.patch.object(subprocess, 'check_output', return_value=None)
+ def testSuccessfullyUprevEbuildToVersionNonLLVM(self, mock_command_output,
+ mock_realpath, mock_islink):
+ symlink = '/path/to/compiler-rt/compiler-rt_pre3_p2-r10.ebuild'
+ ebuild = '/abs/path/to/compiler-rt/compiler-rt_pre3_p2.ebuild'
+ mock_realpath.return_value = ebuild
+ svn_version = 1000
+
+ update_chromeos_llvm_hash.UprevEbuildToVersion(symlink, svn_version)
+
+ mock_islink.assert_called()
+
+ mock_realpath.assert_called_once_with(symlink)
+
+ mock_command_output.assert_called()
+
+ # Verify commands
+ symlink_dir = os.path.dirname(symlink)
+ new_ebuild, _is_changed = re.subn(
+ r'pre([0-9]+)', 'pre%s' % svn_version, ebuild, count=1)
+ new_symlink = new_ebuild[:-len('.ebuild')] + '-r1.ebuild'
+
+ expected_cmd = ['git', '-C', symlink_dir, 'mv', ebuild, new_ebuild]
+ self.assertEqual(mock_command_output.call_args_list[0],
+ mock.call(expected_cmd))
+
+ expected_cmd = ['ln', '-s', '-r', new_ebuild, new_symlink]
+ self.assertEqual(mock_command_output.call_args_list[1],
+ mock.call(expected_cmd))
+
+ expected_cmd = ['git', '-C', symlink_dir, 'add', new_symlink]
+ self.assertEqual(mock_command_output.call_args_list[2],
+ mock.call(expected_cmd))
+
+ expected_cmd = ['git', '-C', symlink_dir, 'rm', symlink]
+ self.assertEqual(mock_command_output.call_args_list[3],
+ mock.call(expected_cmd))
+
+ @mock.patch.object(os.path, 'islink', return_value=True)
+ @mock.patch.object(subprocess, 'check_output', return_value=None)
+ def testSuccessfullyUprevEbuildSymlink(self, mock_command_output,
+ mock_islink):
+ symlink_to_uprev = '/symlink/to/package-r1.ebuild'
+
+ update_chromeos_llvm_hash.UprevEbuildSymlink(symlink_to_uprev)
+
+ mock_islink.assert_called_once_with(symlink_to_uprev)
+
+ mock_command_output.assert_called_once()
+
+ # Simulate behavior of 'os.path.isdir()' when the path to the repo is not a
+
+ # directory.
+
+ @mock.patch.object(chroot, 'GetChrootEbuildPaths')
+ @mock.patch.object(chroot, 'ConvertChrootPathsToAbsolutePaths')
+ def testExceptionRaisedWhenCreatingPathDictionaryFromPackages(
+ self, mock_chroot_paths_to_symlinks, mock_get_chroot_paths):
+
+ chroot_path = '/some/path/to/chroot'
+
+ package_name = 'test-pckg/package'
+ package_chroot_path = '/some/chroot/path/to/package-r1.ebuild'
+
+ # Test function to simulate 'ConvertChrootPathsToAbsolutePaths' when a
+ # symlink does not start with the prefix '/mnt/host/source'.
+ def BadPrefixChrootPath(_chroot_path, _chroot_file_paths):
+ raise ValueError('Invalid prefix for the chroot path: '
+ '%s' % package_chroot_path)
+
+ # Simulate 'GetChrootEbuildPaths' when valid packages are passed in.
+ #
+ # Returns a list of chroot paths.
+ mock_get_chroot_paths.return_value = [package_chroot_path]
+
+ # Use test function to simulate 'ConvertChrootPathsToAbsolutePaths'
+ # behavior.
+ mock_chroot_paths_to_symlinks.side_effect = BadPrefixChrootPath
+
+ # Verify exception is raised when for an invalid prefix in the symlink.
+ with self.assertRaises(ValueError) as err:
+ update_chromeos_llvm_hash.CreatePathDictionaryFromPackages(
+ chroot_path, [package_name])
+
+ self.assertEqual(
+ str(err.exception), 'Invalid prefix for the chroot path: '
+ '%s' % package_chroot_path)
+
+ mock_get_chroot_paths.assert_called_once_with(chroot_path, [package_name])
+
+ mock_chroot_paths_to_symlinks.assert_called_once_with(
+ chroot_path, [package_chroot_path])
+
+ @mock.patch.object(chroot, 'GetChrootEbuildPaths')
+ @mock.patch.object(chroot, 'ConvertChrootPathsToAbsolutePaths')
+ @mock.patch.object(update_chromeos_llvm_hash,
+ 'GetEbuildPathsFromSymLinkPaths')
+ def testSuccessfullyCreatedPathDictionaryFromPackages(
+ self, mock_ebuild_paths_from_symlink_paths, mock_chroot_paths_to_symlinks,
+ mock_get_chroot_paths):
+
+ package_chroot_path = '/mnt/host/source/src/path/to/package-r1.ebuild'
+
+ # Simulate 'GetChrootEbuildPaths' when returning a chroot path for a valid
+ # package.
+ #
+ # Returns a list of chroot paths.
+ mock_get_chroot_paths.return_value = [package_chroot_path]
+
+ package_symlink_path = '/some/path/to/chroot/src/path/to/package-r1.ebuild'
+
+ # Simulate 'ConvertChrootPathsToAbsolutePaths' when returning a symlink to
+ # a chroot path that points to a package.
+ #
+ # Returns a list of symlink file paths.
+ mock_chroot_paths_to_symlinks.return_value = [package_symlink_path]
+
+ chroot_package_path = '/some/path/to/chroot/src/path/to/package.ebuild'
+
+ # Simulate 'GetEbuildPathsFromSymlinkPaths' when returning a dictionary of
+ # a symlink that points to an ebuild.
+ #
+ # Returns a dictionary of a symlink and ebuild file path pair
+ # where the key is the absolute path to the symlink of the ebuild file
+ # and the value is the absolute path to the ebuild file of the package.
+ mock_ebuild_paths_from_symlink_paths.return_value = {
+ package_symlink_path: chroot_package_path
+ }
+
+ chroot_path = '/some/path/to/chroot'
+ package_name = 'test-pckg/package'
+
+ self.assertEqual(
+ update_chromeos_llvm_hash.CreatePathDictionaryFromPackages(
+ chroot_path, [package_name]),
+ {package_symlink_path: chroot_package_path})
+
+ mock_get_chroot_paths.assert_called_once_with(chroot_path, [package_name])
+
+ mock_chroot_paths_to_symlinks.assert_called_once_with(
+ chroot_path, [package_chroot_path])
+
+ mock_ebuild_paths_from_symlink_paths.assert_called_once_with(
+ [package_symlink_path])
+
+ @mock.patch.object(subprocess, 'check_output', return_value=None)
+ def testSuccessfullyRemovedPatchesFromFilesDir(self, mock_run_cmd):
+ patches_to_remove_list = [
+ '/abs/path/to/filesdir/cherry/fix_output.patch',
+ '/abs/path/to/filesdir/display_results.patch'
+ ]
+
+ update_chromeos_llvm_hash.RemovePatchesFromFilesDir(patches_to_remove_list)
+
+ self.assertEqual(mock_run_cmd.call_count, 2)
+
+ @mock.patch.object(os.path, 'isfile', return_value=False)
+ def testInvalidPatchMetadataFileStagedForCommit(self, mock_isfile):
+ patch_metadata_path = '/abs/path/to/filesdir/PATCHES'
+
+ # Verify the exception is raised when the absolute path to the patch
+ # metadata file does not exist or is not a file.
+ with self.assertRaises(ValueError) as err:
+ update_chromeos_llvm_hash.StagePatchMetadataFileForCommit(
+ patch_metadata_path)
+
+ self.assertEqual(
+ str(err.exception), 'Invalid patch metadata file provided: '
+ '%s' % patch_metadata_path)
+
+ mock_isfile.assert_called_once()
+
+ @mock.patch.object(os.path, 'isfile', return_value=True)
+ @mock.patch.object(subprocess, 'check_output', return_value=None)
+ def testSuccessfullyStagedPatchMetadataFileForCommit(self, mock_run_cmd,
+ _mock_isfile):
+
+ patch_metadata_path = '/abs/path/to/filesdir/PATCHES.json'
+
+ update_chromeos_llvm_hash.StagePatchMetadataFileForCommit(
+ patch_metadata_path)
+
+ mock_run_cmd.assert_called_once()
+
+ def testNoPatchResultsForCommit(self):
+ package_1_patch_info_dict = {
+ 'applied_patches': ['display_results.patch'],
+ 'failed_patches': ['fixes_output.patch'],
+ 'non_applicable_patches': [],
+ 'disabled_patches': [],
+ 'removed_patches': [],
+ 'modified_metadata': None
+ }
+
+ package_2_patch_info_dict = {
+ 'applied_patches': ['redirects_stdout.patch', 'fix_display.patch'],
+ 'failed_patches': [],
+ 'non_applicable_patches': [],
+ 'disabled_patches': [],
+ 'removed_patches': [],
+ 'modified_metadata': None
+ }
+
+ test_package_info_dict = {
+ 'test-packages/package1': package_1_patch_info_dict,
+ 'test-packages/package2': package_2_patch_info_dict
+ }
+
+ test_commit_message = ['Updated packages']
+
+ self.assertListEqual(
+ update_chromeos_llvm_hash.StagePackagesPatchResultsForCommit(
+ test_package_info_dict, test_commit_message), test_commit_message)
+
+ @mock.patch.object(update_chromeos_llvm_hash,
+ 'StagePatchMetadataFileForCommit')
+ @mock.patch.object(update_chromeos_llvm_hash, 'RemovePatchesFromFilesDir')
+ def testAddedPatchResultsForCommit(self, mock_remove_patches,
+ mock_stage_patches_for_commit):
+
+ package_1_patch_info_dict = {
+ 'applied_patches': [],
+ 'failed_patches': [],
+ 'non_applicable_patches': [],
+ 'disabled_patches': ['fixes_output.patch'],
+ 'removed_patches': [],
+ 'modified_metadata': '/abs/path/to/filesdir/PATCHES.json'
+ }
+
+ package_2_patch_info_dict = {
+ 'applied_patches': ['fix_display.patch'],
+ 'failed_patches': [],
+ 'non_applicable_patches': [],
+ 'disabled_patches': [],
+ 'removed_patches': ['/abs/path/to/filesdir/redirect_stdout.patch'],
+ 'modified_metadata': '/abs/path/to/filesdir/PATCHES.json'
+ }
+
+ test_package_info_dict = {
+ 'test-packages/package1': package_1_patch_info_dict,
+ 'test-packages/package2': package_2_patch_info_dict
+ }
+
+ test_commit_message = ['Updated packages']
+
+ expected_commit_messages = [
+ 'Updated packages', '\nFor the package test-packages/package1:',
+ 'The patch metadata file PATCHES.json was modified',
+ 'The following patches were disabled:', 'fixes_output.patch',
+ '\nFor the package test-packages/package2:',
+ 'The patch metadata file PATCHES.json was modified',
+ 'The following patches were removed:', 'redirect_stdout.patch'
+ ]
+
+ self.assertListEqual(
+ update_chromeos_llvm_hash.StagePackagesPatchResultsForCommit(
+ test_package_info_dict, test_commit_message),
+ expected_commit_messages)
+
+ path_to_removed_patch = '/abs/path/to/filesdir/redirect_stdout.patch'
+
+ mock_remove_patches.assert_called_once_with([path_to_removed_patch])
+
+ self.assertEqual(mock_stage_patches_for_commit.call_count, 2)
+
+ @mock.patch.object(update_chromeos_llvm_hash,
+ 'CreatePathDictionaryFromPackages')
+ @mock.patch.object(git, 'CreateBranch')
+ @mock.patch.object(update_chromeos_llvm_hash, 'UpdateEbuildLLVMHash')
+ @mock.patch.object(update_chromeos_llvm_hash, 'UprevEbuildSymlink')
+ @mock.patch.object(git, 'UploadChanges')
+ @mock.patch.object(git, 'DeleteBranch')
+ @mock.patch.object(os.path, 'realpath')
+ def testExceptionRaisedWhenUpdatingPackages(
+ self, mock_realpath, mock_delete_repo, mock_upload_changes,
+ mock_uprev_symlink, mock_update_llvm_next, mock_create_repo,
+ mock_create_path_dict):
+
+ abs_path_to_package = '/some/path/to/chroot/src/path/to/package.ebuild'
+
+ symlink_path_to_package = \
+ '/some/path/to/chroot/src/path/to/package-r1.ebuild'
+
+ path_to_package_dir = '/some/path/to/chroot/src/path/to'
+
+ # Test function to simulate 'CreateBranch' when successfully created the
+ # branch on a valid repo path.
+ def SuccessfullyCreateBranchForChanges(_repo_path, branch):
+ self.assertEqual(branch, 'update-LLVM_NEXT_HASH-a123testhash4')
+ return
+
+ # Test function to simulate 'UpdateEbuildLLVMHash' when successfully
+ # updated the ebuild's 'LLVM_NEXT_HASH'.
+ def SuccessfullyUpdatedLLVMHash(ebuild_path, _, git_hash, svn_version):
+ self.assertEqual(ebuild_path, abs_path_to_package)
+ self.assertEqual(git_hash, 'a123testhash4')
+ self.assertEqual(svn_version, 1000)
+ return
+
+ # Test function to simulate 'UprevEbuildSymlink' when the symlink to the
+ # ebuild does not have a revision number.
+ def FailedToUprevEbuildSymlink(_symlink_path):
+ # Raises a 'ValueError' exception because the symlink did not have have a
+ # revision number.
+ raise ValueError('Failed to uprev the ebuild.')
+
+ # Test function to fail on 'UploadChanges' if the function gets called
+ # when an exception is raised.
+ def ShouldNotExecuteUploadChanges(_repo_path, _git_hash, _commit_messages):
+ # Test function should not be called (i.e. execution should resume in the
+ # 'finally' block) because 'UprevEbuildSymlink' raised an
+ # exception.
+ assert False, 'Failed to go to "finally" block ' \
+ 'after the exception was raised.'
+
+ test_package_path_dict = {symlink_path_to_package: abs_path_to_package}
+
+ # Simulate behavior of 'CreatePathDictionaryFromPackages()' when
+ # successfully created a dictionary where the key is the absolute path to
+ # the symlink of the package and value is the absolute path to the ebuild of
+ # the package.
+ mock_create_path_dict.return_value = test_package_path_dict
+
+ # Use test function to simulate behavior.
+ mock_create_repo.side_effect = SuccessfullyCreateBranchForChanges
+ mock_update_llvm_next.side_effect = SuccessfullyUpdatedLLVMHash
+ mock_uprev_symlink.side_effect = FailedToUprevEbuildSymlink
+ mock_upload_changes.side_effect = ShouldNotExecuteUploadChanges
+ mock_realpath.return_value = '/abs/path/to/test-packages/package1.ebuild'
+
+ packages_to_update = ['test-packages/package1']
+ llvm_variant = update_chromeos_llvm_hash.LLVMVariant.next
+ git_hash = 'a123testhash4'
+ svn_version = 1000
+ chroot_path = '/some/path/to/chroot'
+ patch_metadata_file = 'PATCHES.json'
+ git_hash_source = 'google3'
+ branch = 'update-LLVM_NEXT_HASH-a123testhash4'
+ extra_commit_msg = None
+
+ # Verify exception is raised when an exception is thrown within
+ # the 'try' block by UprevEbuildSymlink function.
+ with self.assertRaises(ValueError) as err:
+ update_chromeos_llvm_hash.UpdatePackages(
+ packages_to_update, llvm_variant, git_hash, svn_version, chroot_path,
+ patch_metadata_file, failure_modes.FailureModes.FAIL, git_hash_source,
+ extra_commit_msg)
+
+ self.assertEqual(str(err.exception), 'Failed to uprev the ebuild.')
+
+ mock_create_path_dict.assert_called_once_with(chroot_path,
+ packages_to_update)
+
+ mock_create_repo.assert_called_once_with(path_to_package_dir, branch)
+
+ mock_update_llvm_next.assert_called_once_with(
+ abs_path_to_package, llvm_variant, git_hash, svn_version)
+
+ mock_uprev_symlink.assert_called_once_with(symlink_path_to_package)
+
+ mock_upload_changes.assert_not_called()
+
+ mock_delete_repo.assert_called_once_with(path_to_package_dir, branch)
+
+ @mock.patch.object(update_chromeos_llvm_hash,
+ 'CreatePathDictionaryFromPackages')
+ @mock.patch.object(git, 'CreateBranch')
+ @mock.patch.object(update_chromeos_llvm_hash, 'UpdateEbuildLLVMHash')
+ @mock.patch.object(update_chromeos_llvm_hash, 'UprevEbuildSymlink')
+ @mock.patch.object(git, 'UploadChanges')
+ @mock.patch.object(git, 'DeleteBranch')
+ @mock.patch.object(llvm_patch_management, 'UpdatePackagesPatchMetadataFile')
+ @mock.patch.object(update_chromeos_llvm_hash,
+ 'StagePatchMetadataFileForCommit')
+ def testSuccessfullyUpdatedPackages(
+ self, mock_stage_patch_file, mock_update_package_metadata_file,
+ mock_delete_repo, mock_upload_changes, mock_uprev_symlink,
+ mock_update_llvm_next, mock_create_repo, mock_create_path_dict):
+
+ abs_path_to_package = '/some/path/to/chroot/src/path/to/package.ebuild'
+
+ symlink_path_to_package = \
+ '/some/path/to/chroot/src/path/to/package-r1.ebuild'
+
+ path_to_package_dir = '/some/path/to/chroot/src/path/to'
+
+ # Test function to simulate 'CreateBranch' when successfully created the
+ # branch for the changes to be made to the ebuild files.
+ def SuccessfullyCreateBranchForChanges(_repo_path, branch):
+ self.assertEqual(branch, 'update-LLVM_NEXT_HASH-a123testhash5')
+ return
+
+ # Test function to simulate 'UploadChanges' after a successfull update of
+ # 'LLVM_NEXT_HASH" of the ebuild file.
+ def SuccessfullyUpdatedLLVMHash(ebuild_path, _, git_hash, svn_version):
+ self.assertEqual(ebuild_path,
+ '/some/path/to/chroot/src/path/to/package.ebuild')
+ self.assertEqual(git_hash, 'a123testhash5')
+ self.assertEqual(svn_version, 1000)
+ return
+
+ # Test function to simulate 'UprevEbuildSymlink' when successfully
+ # incremented the revision number by 1.
+ def SuccessfullyUprevedEbuildSymlink(symlink_path):
+ self.assertEqual(symlink_path,
+ '/some/path/to/chroot/src/path/to/package-r1.ebuild')
+
+ return
+
+ # Test function to simulate 'UpdatePackagesPatchMetadataFile()' when the
+ # patch results contains a disabled patch in 'disable_patches' mode.
+ def RetrievedPatchResults(chroot_path, svn_version, patch_metadata_file,
+ packages, mode):
+
+ self.assertEqual(chroot_path, '/some/path/to/chroot')
+ self.assertEqual(svn_version, 1000)
+ self.assertEqual(patch_metadata_file, 'PATCHES.json')
+ self.assertListEqual(packages, ['path/to'])
+ self.assertEqual(mode, failure_modes.FailureModes.DISABLE_PATCHES)
+
+ PatchInfo = namedtuple('PatchInfo', [
+ 'applied_patches', 'failed_patches', 'non_applicable_patches',
+ 'disabled_patches', 'removed_patches', 'modified_metadata'
+ ])
+
+ package_patch_info = PatchInfo(
+ applied_patches=['fix_display.patch'],
+ failed_patches=['fix_stdout.patch'],
+ non_applicable_patches=[],
+ disabled_patches=['fix_stdout.patch'],
+ removed_patches=[],
+ modified_metadata='/abs/path/to/filesdir/%s' % patch_metadata_file)
+
+ package_info_dict = {'path/to': package_patch_info._asdict()}
+
+ # Returns a dictionary where the key is the package and the value is a
+ # dictionary that contains information about the package's patch results
+ # produced by the patch manager.
+ return package_info_dict
+
+ # Test function to simulate 'UploadChanges()' when successfully created a
+ # commit for the changes made to the packages and their patches and
+ # retrieved the change list of the commit.
+ def SuccessfullyUploadedChanges(_repo_path, _branch, _commit_messages):
+ commit_url = 'https://some_name/path/to/commit/+/12345'
+
+ return git.CommitContents(url=commit_url, cl_number=12345)
+
+ test_package_path_dict = {symlink_path_to_package: abs_path_to_package}
+
+ # Simulate behavior of 'CreatePathDictionaryFromPackages()' when
+ # successfully created a dictionary where the key is the absolute path to
+ # the symlink of the package and value is the absolute path to the ebuild of
+ # the package.
+ mock_create_path_dict.return_value = test_package_path_dict
+
+ # Use test function to simulate behavior.
+ mock_create_repo.side_effect = SuccessfullyCreateBranchForChanges
+ mock_update_llvm_next.side_effect = SuccessfullyUpdatedLLVMHash
+ mock_uprev_symlink.side_effect = SuccessfullyUprevedEbuildSymlink
+ mock_update_package_metadata_file.side_effect = RetrievedPatchResults
+ mock_upload_changes.side_effect = SuccessfullyUploadedChanges
+
+ packages_to_update = ['test-packages/package1']
+ llvm_variant = update_chromeos_llvm_hash.LLVMVariant.next
+ git_hash = 'a123testhash5'
+ svn_version = 1000
+ chroot_path = '/some/path/to/chroot'
+ patch_metadata_file = 'PATCHES.json'
+ git_hash_source = 'tot'
+ branch = 'update-LLVM_NEXT_HASH-a123testhash5'
+ extra_commit_msg = '\ncommit-message-end'
+
+ change_list = update_chromeos_llvm_hash.UpdatePackages(
+ packages_to_update, llvm_variant, git_hash, svn_version, chroot_path,
+ patch_metadata_file, failure_modes.FailureModes.DISABLE_PATCHES,
+ git_hash_source, extra_commit_msg)
+
+ self.assertEqual(change_list.url,
+ 'https://some_name/path/to/commit/+/12345')
+
+ self.assertEqual(change_list.cl_number, 12345)
+
+ mock_create_path_dict.assert_called_once_with(chroot_path,
+ packages_to_update)
+
+ mock_create_repo.assert_called_once_with(path_to_package_dir, branch)
+
+ mock_update_llvm_next.assert_called_once_with(
+ abs_path_to_package, llvm_variant, git_hash, svn_version)
+
+ mock_uprev_symlink.assert_called_once_with(symlink_path_to_package)
+
+ expected_commit_messages = [
+ 'llvm-next/tot: upgrade to a123testhash5 (r1000)\n',
+ 'The following packages have been updated:', 'path/to',
+ '\nFor the package path/to:',
+ 'The patch metadata file PATCHES.json was modified',
+ 'The following patches were disabled:', 'fix_stdout.patch',
+ '\ncommit-message-end'
+ ]
+
+ mock_update_package_metadata_file.assert_called_once()
+
+ mock_stage_patch_file.assert_called_once_with(
+ '/abs/path/to/filesdir/PATCHES.json')
+
+ mock_upload_changes.assert_called_once_with(path_to_package_dir, branch,
+ expected_commit_messages)
+
+ mock_delete_repo.assert_called_once_with(path_to_package_dir, branch)
+
+
+if __name__ == '__main__':
+ unittest.main()