1 #![allow(clippy::enum_variant_names, clippy::useless_format, clippy::too_many_arguments)]
3 use std::collections::VecDeque;
5 use std::path::{Path, PathBuf};
6 use std::process::{Command, ExitStatus};
7 use std::sync::atomic::{AtomicUsize, Ordering};
11 use color_eyre::eyre::Result;
13 use comments::ErrorMatch;
15 use rustc_stderr::{Level, Message};
17 use crate::comments::{Comments, Condition};
26 /// Arguments passed to the binary that is executed.
27 pub args: Vec<String>,
28 /// `None` to run on the host, otherwise a target triple
29 pub target: Option<String>,
30 /// Filters applied to stderr output before processing it
31 pub stderr_filters: Filter,
32 /// Filters applied to stdout output before processing it
33 pub stdout_filters: Filter,
34 /// The folder in which to start searching for .rs files
35 pub root_dir: PathBuf,
38 pub output_conflict_handling: OutputConflictHandling,
39 /// Only run tests with one of these strings in their path/name
40 pub path_filter: Vec<String>,
44 pub enum OutputConflictHandling {
45 /// The default: emit a diff of the expected/actual output.
47 /// Ignore mismatches in the stderr/stdout files.
49 /// Instead of erroring if the stderr/stdout differs from the expected
50 /// automatically replace it with the found output (after applying filters).
54 pub type Filter = Vec<(Regex, &'static str)>;
56 pub fn run_tests(config: Config) -> Result<()> {
57 eprintln!(" Compiler flags: {:?}", config.args);
59 // Get the triple with which to run the tests
60 let target = config.target.clone().unwrap_or_else(|| config.get_host());
62 // A channel for files to process
63 let (submit, receive) = crossbeam::channel::unbounded();
65 // Some statistics and failure reports.
66 let failures = Mutex::new(vec![]);
67 let succeeded = AtomicUsize::default();
68 let ignored = AtomicUsize::default();
69 let filtered = AtomicUsize::default();
71 crossbeam::scope(|s| -> Result<()> {
72 // Create a thread that is in charge of walking the directory and submitting jobs.
73 // It closes the channel when it is done.
75 let mut todo = VecDeque::new();
76 todo.push_back(config.root_dir.clone());
77 while let Some(path) = todo.pop_front() {
79 // Enqueue everything inside this directory.
80 // We want it sorted, to have some control over scheduling of slow tests.
82 std::fs::read_dir(path).unwrap().collect::<Result<Vec<_>, _>>().unwrap();
83 entries.sort_by_key(|e| e.file_name());
84 for entry in entries {
85 todo.push_back(entry.path());
87 } else if path.extension().map(|ext| ext == "rs").unwrap_or(false) {
88 // Forward .rs files to the test workers.
89 submit.send(path).unwrap();
92 // There will be no more jobs. This signals the workers to quit.
93 // (This also ensures `submit` is moved into this closure.)
97 let mut threads = vec![];
99 // Create N worker threads that receive files to test.
100 for _ in 0..std::thread::available_parallelism().unwrap().get() {
101 threads.push(s.spawn(|_| -> Result<()> {
102 for path in &receive {
103 if !config.path_filter.is_empty() {
104 let path_display = path.display().to_string();
105 if !config.path_filter.iter().any(|filter| path_display.contains(filter)) {
106 filtered.fetch_add(1, Ordering::Relaxed);
110 let comments = Comments::parse_file(&path)?;
111 // Ignore file if only/ignore rules do (not) apply
112 if !test_file_conditions(&comments, &target) {
113 ignored.fetch_add(1, Ordering::Relaxed);
117 "ignored (in-test comment)".yellow()
121 // Run the test for all revisions
123 comments.revisions.clone().unwrap_or_else(|| vec![String::new()])
125 let (m, errors, stderr) =
126 run_test(&path, &config, &target, &revision, &comments);
128 // Using a single `eprintln!` to prevent messages from threads from getting intermingled.
129 let mut msg = format!("{} ", path.display());
130 if !revision.is_empty() {
131 write!(msg, "(revision `{revision}`) ").unwrap();
133 write!(msg, "... ").unwrap();
134 if errors.is_empty() {
135 eprintln!("{msg}{}", "ok".green());
136 succeeded.fetch_add(1, Ordering::Relaxed);
138 eprintln!("{msg}{}", "FAILED".red().bold());
139 failures.lock().unwrap().push((
152 for thread in threads {
153 thread.join().unwrap()?;
159 // Print all errors in a single thread to show reliable output
160 let failures = failures.into_inner().unwrap();
161 let succeeded = succeeded.load(Ordering::Relaxed);
162 let ignored = ignored.load(Ordering::Relaxed);
163 let filtered = filtered.load(Ordering::Relaxed);
164 if !failures.is_empty() {
165 for (path, miri, revision, errors, stderr) in &failures {
167 eprint!("{}", path.display().to_string().underline());
168 if !revision.is_empty() {
169 eprint!(" (revision `{}`)", revision);
171 eprint!(" {}", "FAILED".red());
173 eprintln!("command: {:?}", miri);
175 let mut dump_stderr = true;
176 for error in errors {
178 Error::ExitStatus(mode, exit_status) => eprintln!("{mode:?} got {exit_status}"),
179 Error::PatternNotFound { pattern, definition_line } => {
180 eprintln!("`{pattern}` {} in stderr output", "not found".red());
182 "expected because of pattern here: {}:{definition_line}",
183 path.display().to_string().bold()
186 Error::NoPatternsFound => {
187 eprintln!("{}", "no error patterns found in failure test".red());
189 Error::PatternFoundInPassTest =>
190 eprintln!("{}", "error pattern found in success test".red()),
191 Error::OutputDiffers { path, actual, expected } => {
192 if path.extension().unwrap() == "stderr" {
195 eprintln!("actual output differed from expected {}", path.display());
196 eprintln!("{}", pretty_assertions::StrComparison::new(expected, actual));
199 Error::ErrorsWithoutPattern { path: None, msgs } => {
201 "There were {} unmatched diagnostics that occurred outside the testfile and had not pattern",
204 for Message { level, message } in msgs {
205 eprintln!(" {level:?}: {message}")
208 Error::ErrorsWithoutPattern { path: Some((path, line)), msgs } => {
210 "There were {} unmatched diagnostics at {}:{line}",
214 for Message { level, message } in msgs {
215 eprintln!(" {level:?}: {message}")
218 Error::ErrorPatternWithoutErrorAnnotation(path, line) => {
220 "Annotation at {}:{line} matched an error diagnostic but did not have `ERROR` before its message",
227 // Unless we already dumped the stderr via an OutputDiffers diff, let's dump it here.
229 eprintln!("actual stderr:");
230 eprintln!("{}", stderr);
234 eprintln!("{}", "failures:".red().underline());
235 for (path, _miri, _revision, _errors, _stderr) in &failures {
236 eprintln!(" {}", path.display());
240 "test result: {}. {} tests failed, {} tests passed, {} ignored, {} filtered out",
242 failures.len().to_string().red().bold(),
243 succeeded.to_string().green(),
244 ignored.to_string().yellow(),
245 filtered.to_string().yellow(),
247 std::process::exit(1);
251 "test result: {}. {} tests passed, {} ignored, {} filtered out",
253 succeeded.to_string().green(),
254 ignored.to_string().yellow(),
255 filtered.to_string().yellow(),
263 /// Got an invalid exit status for the given mode.
264 ExitStatus(Mode, ExitStatus),
267 definition_line: usize,
269 /// A ui test checking for failure does not have any failure patterns
271 /// A ui test checking for success has failure patterns
272 PatternFoundInPassTest,
273 /// Stderr/Stdout differed from the `.stderr`/`.stdout` file present.
279 ErrorsWithoutPattern {
281 path: Option<(PathBuf, usize)>,
283 ErrorPatternWithoutErrorAnnotation(PathBuf, usize),
286 type Errors = Vec<Error>;
294 ) -> (Command, Errors, String) {
296 let mut miri = Command::new(&config.program);
297 miri.args(config.args.iter());
299 if !revision.is_empty() {
300 miri.arg(format!("--cfg={revision}"));
302 miri.arg("--error-format=json");
303 for arg in &comments.compile_flags {
306 for (k, v) in &comments.env_vars {
309 let output = miri.output().expect("could not execute miri");
310 let mut errors = config.mode.ok(output.status);
311 let stderr = check_test_result(
321 (miri, errors, stderr)
324 fn check_test_result(
334 // Always remove annotation comments from stderr.
335 let diagnostics = rustc_stderr::process(path, stderr);
336 let stdout = std::str::from_utf8(stdout).unwrap();
337 // Check output files (if any)
338 let revised = |extension: &str| {
339 if revision.is_empty() {
340 extension.to_string()
342 format!("{}.{}", revision, extension)
345 // Check output files against actual output
347 &diagnostics.rendered,
352 &config.stderr_filters,
362 &config.stdout_filters,
366 // Check error annotations in the source against output
368 diagnostics.messages,
369 diagnostics.messages_from_unknown_file_or_line,
379 fn check_annotations(
380 mut messages: Vec<Vec<Message>>,
381 mut messages_from_unknown_file_or_line: Vec<Message>,
388 if let Some((ref error_pattern, definition_line)) = comments.error_pattern {
389 // first check the diagnostics messages outside of our file. We check this first, so that
390 // you can mix in-file annotations with //@error-pattern annotations, even if there is overlap
392 if let Some(i) = messages_from_unknown_file_or_line
394 .position(|msg| msg.message.contains(error_pattern))
396 messages_from_unknown_file_or_line.remove(i);
398 errors.push(Error::PatternNotFound {
399 pattern: error_pattern.to_string(),
405 // The order on `Level` is such that `Error` is the highest level.
406 // We will ensure that *all* diagnostics of level at least `lowest_annotation_level`
408 let mut lowest_annotation_level = Level::Error;
409 for &ErrorMatch { ref matched, revision: ref rev, definition_line, line, level } in
410 &comments.error_matches
412 if let Some(rev) = rev {
417 if let Some(level) = level {
418 // If we found a diagnostic with a level annotation, make sure that all
419 // diagnostics of that level have annotations, even if we don't end up finding a matching diagnostic
421 lowest_annotation_level = std::cmp::min(lowest_annotation_level, level);
424 if let Some(msgs) = messages.get_mut(line) {
425 let found = msgs.iter().position(|msg| {
426 msg.message.contains(matched)
427 // in case there is no level on the annotation, match any level.
428 && level.map_or(true, |level| {
432 if let Some(found) = found {
433 let msg = msgs.remove(found);
434 if msg.level == Level::Error && level.is_none() {
436 .push(Error::ErrorPatternWithoutErrorAnnotation(path.to_path_buf(), line));
442 errors.push(Error::PatternNotFound { pattern: matched.to_string(), definition_line });
445 let filter = |msgs: Vec<Message>| -> Vec<_> {
446 msgs.into_iter().filter(|msg| msg.level >= lowest_annotation_level).collect()
449 let messages_from_unknown_file_or_line = filter(messages_from_unknown_file_or_line);
450 if !messages_from_unknown_file_or_line.is_empty() {
451 errors.push(Error::ErrorsWithoutPattern {
453 msgs: messages_from_unknown_file_or_line,
457 for (line, msgs) in messages.into_iter().enumerate() {
458 let msgs = filter(msgs);
459 if !msgs.is_empty() {
461 .push(Error::ErrorsWithoutPattern { path: Some((path.to_path_buf(), line)), msgs });
465 match (config.mode, comments.error_pattern.is_some() || !comments.error_matches.is_empty()) {
466 (Mode::Pass, true) | (Mode::Panic, true) => errors.push(Error::PatternFoundInPassTest),
467 (Mode::Fail, false) => errors.push(Error::NoPatternsFound),
482 let output = normalize(path, output, filters, comments);
483 let path = output_path(path, comments, kind, target);
484 match config.output_conflict_handling {
485 OutputConflictHandling::Bless =>
486 if output.is_empty() {
487 let _ = std::fs::remove_file(path);
489 std::fs::write(path, &output).unwrap();
491 OutputConflictHandling::Error => {
492 let expected_output = std::fs::read_to_string(&path).unwrap_or_default();
493 if output != expected_output {
494 errors.push(Error::OutputDiffers {
497 expected: expected_output,
501 OutputConflictHandling::Ignore => {}
505 fn output_path(path: &Path, comments: &Comments, kind: String, target: &str) -> PathBuf {
506 if comments.stderr_per_bitwidth {
507 return path.with_extension(format!("{}bit.{kind}", get_pointer_width(target)));
509 path.with_extension(kind)
512 fn test_condition(condition: &Condition, target: &str) -> bool {
514 Condition::Bitwidth(bits) => get_pointer_width(target) == *bits,
515 Condition::Target(t) => target.contains(t),
519 /// Returns whether according to the in-file conditions, this file should be run.
520 fn test_file_conditions(comments: &Comments, target: &str) -> bool {
521 if comments.ignore.iter().any(|c| test_condition(c, target)) {
524 comments.only.iter().all(|c| test_condition(c, target))
527 // Taken 1:1 from compiletest-rs
528 fn get_pointer_width(triple: &str) -> u8 {
529 if (triple.contains("64") && !triple.ends_with("gnux32") && !triple.ends_with("gnu_ilp32"))
530 || triple.starts_with("s390x")
533 } else if triple.starts_with("avr") {
540 fn normalize(path: &Path, text: &str, filters: &Filter, comments: &Comments) -> String {
542 let mut text = text.replace(&path.parent().unwrap().display().to_string(), "$DIR");
543 if let Some(lib_path) = option_env!("RUSTC_LIB_PATH") {
544 text = text.replace(lib_path, "RUSTLIB");
547 for (regex, replacement) in filters.iter() {
548 text = regex.replace_all(&text, *replacement).to_string();
551 for (from, to) in &comments.normalize_stderr {
552 text = from.replace_all(&text, to).to_string();
558 fn get_host(&self) -> String {
559 rustc_version::VersionMeta::for_command(std::process::Command::new(&self.program))
560 .expect("failed to parse rustc version info")
565 #[derive(Copy, Clone, Debug)]
567 // The test passes a full execution of the rustc driver
569 // The rustc driver panicked
571 // The rustc driver emitted an error
576 fn ok(self, status: ExitStatus) -> Errors {
577 match (status.code().unwrap(), self) {
578 (1, Mode::Fail) | (101, Mode::Panic) | (0, Mode::Pass) => vec![],
579 _ => vec![Error::ExitStatus(self, status)],