mirror of
https://github.com/ARM-software/workload-automation.git
synced 2025-09-30 09:02:31 +01:00
framework: Add feature to mark workloads unsafe for confidential devices
Some workloads, such as Geekbench, may phone home and report data about the device they are running on. This poses a risk for users that are testing on unreleased or otherwise confidential devices - perhaps they use a standard agenda to run a large battery of tests, in which case they may forget to disable these dangerous workloads. This provides a mechanism to prevent running those workloads from running by setting allow_phone_home=False in the user configuration.
This commit is contained in:
@@ -39,6 +39,17 @@ class Workload(TargetedPlugin):
|
||||
|
||||
kind = 'workload'
|
||||
|
||||
phones_home = False
|
||||
"""
|
||||
Set this to True to mark that this workload poses a risk of exposing
|
||||
information to the outside world about the device it runs on. An example of
|
||||
this would be a benchmark application that sends scores and device data to a
|
||||
database owned by the maintainer.
|
||||
|
||||
The user can then set allow_phone_home=False in their configuration to
|
||||
prevent this workload from being run accidentally.
|
||||
"""
|
||||
|
||||
def init_resources(self, context):
|
||||
"""
|
||||
This method may be used to perform early resource discovery and
|
||||
|
Reference in New Issue
Block a user