[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171009034335.pwehn4kz3cwjy6o7@thunk.org>
Date: Sun, 8 Oct 2017 23:43:35 -0400
From: Theodore Ts'o <tytso@....edu>
To: Josef Bacik <josef@...icpanda.com>
Cc: Dave Chinner <david@...morbit.com>, linux-fsdevel@...r.kernel.org,
kernel-team@...com, linux-btrfs@...r.kernel.org,
linux-block@...r.kernel.org, linux-ext4@...r.kernel.org,
linux-xfs@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [ANNOUNCE] fsperf: a simple fs/block performance testing
framework
On Sun, Oct 08, 2017 at 10:25:10PM -0400, Josef Bacik wrote:
>
> Probably should have led with that shouldn't I have? There's nothing keeping me
> from doing it, but I didn't want to try and shoehorn in a python thing into
> fstests. I need python to do the sqlite and the json parsing to dump into the
> sqlite database.
What version of python are you using? From inspection it looks like
some variant of python 3.x (you're using print as a function w/o using
"from __future import print_function") but it's not immediately
obvious from the top-level fsperf shell script what version of python
your scripts are dependant upon.
This could potentially be a bit of a portability issue across various
distributions --- RHEL doesn't ship with Python 3.x at all, and on
Debian you need to use python3 to get python 3.x, since
/usr/bin/python still points at Python 2.7 by default. So I could see
this as a potential issue for xfstests.
I'm currently using Python 2.7 in my wrapper scripts for, among other
things, to parse xUnit XML format and create nice summaries like this:
ext4/4k: 337 tests, 6 failures, 21 skipped, 3814 seconds
Failures: generic/232 generic/233 generic/361 generic/388
generic/451 generic/459
So I'm not opposed to python, but I will note that if you are using
modules from the Python Package Index, and they are modules which are
not packaged by your distribution (so you're using pip or easy_install
to pull them off the network), it does make doing hermetic builds from
trusted sources to be a bit trickier.
If you have a secops team who wants to know the provenance of software
which get thrown in production data centers (and automated downloading
from random external sources w/o any code review makes them break out
in hives), use of PyPI adds a new wrinkle. It's not impossible to
solve, by any means, but it's something to consider.
- Ted
Powered by blists - more mailing lists