blob: dea41bc42e122453f283df16ed08826a480ee1e2 [file] [log] [blame]
Doug Anderson44a644f2011-11-02 10:37:37 -07001#!/usr/bin/env python
Jon Salz98255932012-08-18 14:48:02 +08002# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Mandeep Singh Baines116ad102011-04-27 15:16:37 -07003# Use of this source code is governed by a BSD-style license that can be
4# found in the LICENSE file.
5
Mike Frysingerae409522014-02-01 03:16:11 -05006"""Presubmit checks to run when doing `repo upload`.
7
8You can add new checks by adding a functions to the HOOKS constants.
9"""
10
Mike Frysinger09d6a3d2013-10-08 22:21:03 -040011from __future__ import print_function
12
Ryan Cui9b651632011-05-11 11:38:58 -070013import ConfigParser
Jon Salz3ee59de2012-08-18 13:54:22 +080014import functools
Dale Curtis2975c432011-05-03 17:25:20 -070015import json
Doug Anderson44a644f2011-11-02 10:37:37 -070016import optparse
Mandeep Singh Baines116ad102011-04-27 15:16:37 -070017import os
Ryan Cuiec4d6332011-05-02 14:15:25 -070018import re
David Hendricks4c018e72013-02-06 13:46:38 -080019import socket
Mandeep Singh Bainesa7ffa4b2011-05-03 11:37:02 -070020import sys
Mandeep Singh Baines116ad102011-04-27 15:16:37 -070021import subprocess
22
Ryan Cui1562fb82011-05-09 11:01:31 -070023from errors import (VerifyException, HookFailure, PrintErrorForProject,
24 PrintErrorsForCommit)
Ryan Cuiec4d6332011-05-02 14:15:25 -070025
David Jamesc3b68b32013-04-03 09:17:03 -070026# If repo imports us, the __name__ will be __builtin__, and the wrapper will
27# be in $CHROMEOS_CHECKOUT/.repo/repo/main.py, so we need to go two directories
28# up. The same logic also happens to work if we're executed directly.
29if __name__ in ('__builtin__', '__main__'):
30 sys.path.insert(0, os.path.join(os.path.dirname(sys.argv[0]), '..', '..'))
31
32from chromite.lib import patch
Yu-Ju Hong5e0efa72013-11-19 16:28:10 -080033from chromite.licensing import licenses
David Jamesc3b68b32013-04-03 09:17:03 -070034
Ryan Cuiec4d6332011-05-02 14:15:25 -070035
36COMMON_INCLUDED_PATHS = [
Mike Frysingerae409522014-02-01 03:16:11 -050037 # C++ and friends
38 r".*\.c$", r".*\.cc$", r".*\.cpp$", r".*\.h$", r".*\.m$", r".*\.mm$",
39 r".*\.inl$", r".*\.asm$", r".*\.hxx$", r".*\.hpp$", r".*\.s$", r".*\.S$",
40 # Scripts
41 r".*\.js$", r".*\.py$", r".*\.sh$", r".*\.rb$", r".*\.pl$", r".*\.pm$",
42 # No extension at all, note that ALL CAPS files are black listed in
43 # COMMON_EXCLUDED_LIST below.
44 r"(^|.*[\\\/])[^.]+$",
45 # Other
46 r".*\.java$", r".*\.mk$", r".*\.am$",
Ryan Cuiec4d6332011-05-02 14:15:25 -070047]
48
Ryan Cui1562fb82011-05-09 11:01:31 -070049
Ryan Cuiec4d6332011-05-02 14:15:25 -070050COMMON_EXCLUDED_PATHS = [
Mike Frysingerae409522014-02-01 03:16:11 -050051 # avoid doing source file checks for kernel
52 r"/src/third_party/kernel/",
53 r"/src/third_party/kernel-next/",
54 r"/src/third_party/ktop/",
55 r"/src/third_party/punybench/",
56 r".*\bexperimental[\\\/].*",
57 r".*\b[A-Z0-9_]{2,}$",
58 r".*[\\\/]debian[\\\/]rules$",
59 # for ebuild trees, ignore any caches and manifest data
60 r".*/Manifest$",
61 r".*/metadata/[^/]*cache[^/]*/[^/]+/[^/]+$",
Doug Anderson5bfb6792011-10-25 16:45:41 -070062
Mike Frysingerae409522014-02-01 03:16:11 -050063 # ignore profiles data (like overlay-tegra2/profiles)
64 r".*/overlay-.*/profiles/.*",
65 # ignore minified js and jquery
66 r".*\.min\.js",
67 r".*jquery.*\.js",
Ryan Cuiec4d6332011-05-02 14:15:25 -070068]
Mandeep Singh Baines116ad102011-04-27 15:16:37 -070069
Ryan Cui1562fb82011-05-09 11:01:31 -070070
Ryan Cui9b651632011-05-11 11:38:58 -070071_CONFIG_FILE = 'PRESUBMIT.cfg'
72
73
Doug Anderson44a644f2011-11-02 10:37:37 -070074# Exceptions
75
76
77class BadInvocation(Exception):
78 """An Exception indicating a bad invocation of the program."""
79 pass
80
81
Ryan Cui1562fb82011-05-09 11:01:31 -070082# General Helpers
83
Sean Paulba01d402011-05-05 11:36:23 -040084
Doug Anderson44a644f2011-11-02 10:37:37 -070085def _run_command(cmd, cwd=None, stderr=None):
86 """Executes the passed in command and returns raw stdout output.
87
88 Args:
89 cmd: The command to run; should be a list of strings.
90 cwd: The directory to switch to for running the command.
91 stderr: Can be one of None (print stderr to console), subprocess.STDOUT
92 (combine stderr with stdout), or subprocess.PIPE (ignore stderr).
93
94 Returns:
95 The standard out from the process.
96 """
97 p = subprocess.Popen(cmd, stdout=subprocess.PIPE, stderr=stderr, cwd=cwd)
98 return p.communicate()[0]
Ryan Cui72834d12011-05-05 14:51:33 -070099
Ryan Cui1562fb82011-05-09 11:01:31 -0700100
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700101def _get_hooks_dir():
Ryan Cuiec4d6332011-05-02 14:15:25 -0700102 """Returns the absolute path to the repohooks directory."""
Doug Anderson44a644f2011-11-02 10:37:37 -0700103 if __name__ == '__main__':
104 # Works when file is run on its own (__file__ is defined)...
105 return os.path.abspath(os.path.dirname(__file__))
106 else:
107 # We need to do this when we're run through repo. Since repo executes
108 # us with execfile(), we don't get __file__ defined.
109 cmd = ['repo', 'forall', 'chromiumos/repohooks', '-c', 'pwd']
110 return _run_command(cmd).strip()
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700111
Ryan Cui1562fb82011-05-09 11:01:31 -0700112
Ryan Cuiec4d6332011-05-02 14:15:25 -0700113def _match_regex_list(subject, expressions):
114 """Try to match a list of regular expressions to a string.
115
116 Args:
117 subject: The string to match regexes on
118 expressions: A list of regular expressions to check for matches with.
119
120 Returns:
121 Whether the passed in subject matches any of the passed in regexes.
122 """
123 for expr in expressions:
Mike Frysingerae409522014-02-01 03:16:11 -0500124 if re.search(expr, subject):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700125 return True
126 return False
127
Ryan Cui1562fb82011-05-09 11:01:31 -0700128
Mike Frysingerae409522014-02-01 03:16:11 -0500129def _filter_files(files, include_list, exclude_list=()):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700130 """Filter out files based on the conditions passed in.
131
132 Args:
133 files: list of filepaths to filter
134 include_list: list of regex that when matched with a file path will cause it
135 to be added to the output list unless the file is also matched with a
136 regex in the exclude_list.
137 exclude_list: list of regex that when matched with a file will prevent it
138 from being added to the output list, even if it is also matched with a
139 regex in the include_list.
140
141 Returns:
142 A list of filepaths that contain files matched in the include_list and not
143 in the exclude_list.
144 """
145 filtered = []
146 for f in files:
147 if (_match_regex_list(f, include_list) and
148 not _match_regex_list(f, exclude_list)):
149 filtered.append(f)
150 return filtered
151
Ryan Cuiec4d6332011-05-02 14:15:25 -0700152
David Hendricks35030d02013-02-04 17:49:16 -0800153def _verify_header_content(commit, content, fail_msg):
154 """Verify that file headers contain specified content.
155
156 Args:
157 commit: the affected commit.
158 content: the content of the header to be verified.
159 fail_msg: the first message to display in case of failure.
160
161 Returns:
162 The return value of HookFailure().
163 """
164 license_re = re.compile(content, re.MULTILINE)
165 bad_files = []
166 files = _filter_files(_get_affected_files(commit),
167 COMMON_INCLUDED_PATHS,
168 COMMON_EXCLUDED_PATHS)
169
170 for f in files:
Mike Frysingerae409522014-02-01 03:16:11 -0500171 # Ignore non-existant files
172 if os.path.exists(f):
Gabe Blackcf3c32c2013-02-27 00:26:13 -0800173 contents = open(f).read()
Mike Frysingerae409522014-02-01 03:16:11 -0500174 if not contents:
175 # Ignore empty files
176 continue
Gabe Blackcf3c32c2013-02-27 00:26:13 -0800177 if not license_re.search(contents):
178 bad_files.append(f)
David Hendricks35030d02013-02-04 17:49:16 -0800179 if bad_files:
Mike Frysingerae409522014-02-01 03:16:11 -0500180 msg = "%s:\n%s\n%s" % (fail_msg, license_re.pattern,
181 "Found a bad header in these files:")
182 return HookFailure(msg, bad_files)
David Hendricks35030d02013-02-04 17:49:16 -0800183
184
Ryan Cuiec4d6332011-05-02 14:15:25 -0700185# Git Helpers
Ryan Cui1562fb82011-05-09 11:01:31 -0700186
187
Ryan Cui4725d952011-05-05 15:41:19 -0700188def _get_upstream_branch():
189 """Returns the upstream tracking branch of the current branch.
190
191 Raises:
192 Error if there is no tracking branch
193 """
194 current_branch = _run_command(['git', 'symbolic-ref', 'HEAD']).strip()
195 current_branch = current_branch.replace('refs/heads/', '')
196 if not current_branch:
Ryan Cui1562fb82011-05-09 11:01:31 -0700197 raise VerifyException('Need to be on a tracking branch')
Ryan Cui4725d952011-05-05 15:41:19 -0700198
199 cfg_option = 'branch.' + current_branch + '.%s'
200 full_upstream = _run_command(['git', 'config', cfg_option % 'merge']).strip()
201 remote = _run_command(['git', 'config', cfg_option % 'remote']).strip()
202 if not remote or not full_upstream:
Ryan Cui1562fb82011-05-09 11:01:31 -0700203 raise VerifyException('Need to be on a tracking branch')
Ryan Cui4725d952011-05-05 15:41:19 -0700204
205 return full_upstream.replace('heads', 'remotes/' + remote)
206
Ryan Cui1562fb82011-05-09 11:01:31 -0700207
Che-Liang Chiou5ce2d7b2013-03-22 18:47:55 -0700208def _get_patch(commit):
209 """Returns the patch for this commit."""
210 return _run_command(['git', 'format-patch', '--stdout', '-1', commit])
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700211
Ryan Cui1562fb82011-05-09 11:01:31 -0700212
Jon Salz98255932012-08-18 14:48:02 +0800213def _try_utf8_decode(data):
214 """Attempts to decode a string as UTF-8.
215
216 Returns:
217 The decoded Unicode object, or the original string if parsing fails.
218 """
219 try:
220 return unicode(data, 'utf-8', 'strict')
221 except UnicodeDecodeError:
222 return data
223
224
Mike Frysingerbf8b91c2014-02-01 02:50:27 -0500225def _get_file_content(path, commit):
226 """Returns the content of a file at a specific commit.
227
228 We can't rely on the file as it exists in the filesystem as people might be
229 uploading a series of changes which modifies the file multiple times.
230
231 Note: The "content" of a symlink is just the target. So if you're expecting
232 a full file, you should check that first. One way to detect is that the
233 content will not have any newlines.
234 """
235 return _run_command(['git', 'show', '%s:%s' % (commit, path)])
236
237
Mike Frysingerae409522014-02-01 03:16:11 -0500238def _get_file_diff(path, commit):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700239 """Returns a list of (linenum, lines) tuples that the commit touched."""
Mike Frysinger5122a1f2014-02-01 02:47:35 -0500240 output = _run_command(['git', 'show', '-p', '--pretty=format:',
Mike Frysingerae409522014-02-01 03:16:11 -0500241 '--no-ext-diff', commit, path])
Ryan Cuiec4d6332011-05-02 14:15:25 -0700242
243 new_lines = []
244 line_num = 0
245 for line in output.splitlines():
246 m = re.match(r'^@@ [0-9\,\+\-]+ \+([0-9]+)\,[0-9]+ @@', line)
247 if m:
248 line_num = int(m.groups(1)[0])
249 continue
250 if line.startswith('+') and not line.startswith('++'):
Jon Salz98255932012-08-18 14:48:02 +0800251 new_lines.append((line_num, _try_utf8_decode(line[1:])))
Ryan Cuiec4d6332011-05-02 14:15:25 -0700252 if not line.startswith('-'):
253 line_num += 1
254 return new_lines
255
Ryan Cui1562fb82011-05-09 11:01:31 -0700256
Mike Frysingerbf8b91c2014-02-01 02:50:27 -0500257def _get_affected_files(commit, include_deletes=False, relative=False):
Doug Anderson42b8a052013-06-26 10:45:36 -0700258 """Returns list of absolute filepaths that were modified/added.
259
260 Args:
261 commit: The commit
262 include_deletes: If true we'll include delete in the list.
Mike Frysingerbf8b91c2014-02-01 02:50:27 -0500263 relative: Whether to return full paths to files.
Doug Anderson42b8a052013-06-26 10:45:36 -0700264
265 Returns:
266 A list of modified/added (and perhaps deleted) files
267 """
Ryan Cui72834d12011-05-05 14:51:33 -0700268 output = _run_command(['git', 'diff', '--name-status', commit + '^!'])
Ryan Cuiec4d6332011-05-02 14:15:25 -0700269 files = []
270 for statusline in output.splitlines():
271 m = re.match('^(\w)+\t(.+)$', statusline.rstrip())
272 # Ignore deleted files, and return absolute paths of files
Mike Frysingerae409522014-02-01 03:16:11 -0500273 if include_deletes or m.group(1)[0] != 'D':
Mike Frysingerbf8b91c2014-02-01 02:50:27 -0500274 f = m.group(2)
275 if not relative:
276 pwd = os.getcwd()
277 f = os.path.join(pwd, f)
278 files.append(f)
Ryan Cuiec4d6332011-05-02 14:15:25 -0700279 return files
280
Ryan Cui1562fb82011-05-09 11:01:31 -0700281
Mandeep Singh Bainesb9ed1402011-04-29 15:32:06 -0700282def _get_commits():
Ryan Cuiec4d6332011-05-02 14:15:25 -0700283 """Returns a list of commits for this review."""
Ryan Cui4725d952011-05-05 15:41:19 -0700284 cmd = ['git', 'log', '%s..' % _get_upstream_branch(), '--format=%H']
Ryan Cui72834d12011-05-05 14:51:33 -0700285 return _run_command(cmd).split()
Mandeep Singh Bainesb9ed1402011-04-29 15:32:06 -0700286
Ryan Cui1562fb82011-05-09 11:01:31 -0700287
Ryan Cuiec4d6332011-05-02 14:15:25 -0700288def _get_commit_desc(commit):
289 """Returns the full commit message of a commit."""
Sean Paul23a2c582011-05-06 13:10:44 -0400290 return _run_command(['git', 'log', '--format=%s%n%n%b', commit + '^!'])
Ryan Cuiec4d6332011-05-02 14:15:25 -0700291
292
293# Common Hooks
294
Ryan Cui1562fb82011-05-09 11:01:31 -0700295
Mike Frysingerae409522014-02-01 03:16:11 -0500296def _check_no_long_lines(_project, commit):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700297 """Checks that there aren't any lines longer than maxlen characters in any of
298 the text files to be submitted.
299 """
300 MAX_LEN = 80
Jon Salz98255932012-08-18 14:48:02 +0800301 SKIP_REGEXP = re.compile('|'.join([
302 r'https?://',
303 r'^#\s*(define|include|import|pragma|if|endif)\b']))
Ryan Cuiec4d6332011-05-02 14:15:25 -0700304
305 errors = []
306 files = _filter_files(_get_affected_files(commit),
307 COMMON_INCLUDED_PATHS,
308 COMMON_EXCLUDED_PATHS)
309
310 for afile in files:
311 for line_num, line in _get_file_diff(afile, commit):
312 # Allow certain lines to exceed the maxlen rule.
Mike Frysingerae409522014-02-01 03:16:11 -0500313 if len(line) <= MAX_LEN or SKIP_REGEXP.search(line):
Jon Salz98255932012-08-18 14:48:02 +0800314 continue
315
316 errors.append('%s, line %s, %s chars' % (afile, line_num, len(line)))
317 if len(errors) == 5: # Just show the first 5 errors.
318 break
Ryan Cuiec4d6332011-05-02 14:15:25 -0700319
320 if errors:
321 msg = 'Found lines longer than %s characters (first 5 shown):' % MAX_LEN
Ryan Cui1562fb82011-05-09 11:01:31 -0700322 return HookFailure(msg, errors)
323
Ryan Cuiec4d6332011-05-02 14:15:25 -0700324
Mike Frysingerae409522014-02-01 03:16:11 -0500325def _check_no_stray_whitespace(_project, commit):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700326 """Checks that there is no stray whitespace at source lines end."""
327 errors = []
328 files = _filter_files(_get_affected_files(commit),
Mike Frysingerae409522014-02-01 03:16:11 -0500329 COMMON_INCLUDED_PATHS,
330 COMMON_EXCLUDED_PATHS)
Ryan Cuiec4d6332011-05-02 14:15:25 -0700331
332 for afile in files:
333 for line_num, line in _get_file_diff(afile, commit):
334 if line.rstrip() != line:
335 errors.append('%s, line %s' % (afile, line_num))
336 if errors:
Ryan Cui1562fb82011-05-09 11:01:31 -0700337 return HookFailure('Found line ending with white space in:', errors)
338
Ryan Cuiec4d6332011-05-02 14:15:25 -0700339
Mike Frysingerae409522014-02-01 03:16:11 -0500340def _check_no_tabs(_project, commit):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700341 """Checks there are no unexpanded tabs."""
342 TAB_OK_PATHS = [
Ryan Cui31e0c172011-05-04 21:00:45 -0700343 r"/src/third_party/u-boot/",
Ryan Cuiec4d6332011-05-02 14:15:25 -0700344 r".*\.ebuild$",
345 r".*\.eclass$",
Elly Jones5ab34192011-11-15 14:57:06 -0500346 r".*/[M|m]akefile$",
347 r".*\.mk$"
Ryan Cuiec4d6332011-05-02 14:15:25 -0700348 ]
349
350 errors = []
351 files = _filter_files(_get_affected_files(commit),
352 COMMON_INCLUDED_PATHS,
353 COMMON_EXCLUDED_PATHS + TAB_OK_PATHS)
354
355 for afile in files:
356 for line_num, line in _get_file_diff(afile, commit):
357 if '\t' in line:
Mike Frysingerae409522014-02-01 03:16:11 -0500358 errors.append('%s, line %s' % (afile, line_num))
Ryan Cuiec4d6332011-05-02 14:15:25 -0700359 if errors:
Ryan Cui1562fb82011-05-09 11:01:31 -0700360 return HookFailure('Found a tab character in:', errors)
361
Ryan Cuiec4d6332011-05-02 14:15:25 -0700362
Mike Frysingerae409522014-02-01 03:16:11 -0500363def _check_change_has_test_field(_project, commit):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700364 """Check for a non-empty 'TEST=' field in the commit message."""
David McMahon8f6553e2011-06-10 15:46:36 -0700365 TEST_RE = r'\nTEST=\S+'
Ryan Cuiec4d6332011-05-02 14:15:25 -0700366
Mandeep Singh Baines96a53be2011-05-03 11:10:25 -0700367 if not re.search(TEST_RE, _get_commit_desc(commit)):
Ryan Cui1562fb82011-05-09 11:01:31 -0700368 msg = 'Changelist description needs TEST field (after first line)'
369 return HookFailure(msg)
370
Ryan Cuiec4d6332011-05-02 14:15:25 -0700371
Mike Frysingerae409522014-02-01 03:16:11 -0500372def _check_change_has_valid_cq_depend(_project, commit):
David Jamesc3b68b32013-04-03 09:17:03 -0700373 """Check for a correctly formatted CQ-DEPEND field in the commit message."""
374 msg = 'Changelist has invalid CQ-DEPEND target.'
375 example = 'Example: CQ-DEPEND=CL:1234, CL:2345'
376 try:
377 patch.GetPaladinDeps(_get_commit_desc(commit))
378 except ValueError as ex:
379 return HookFailure(msg, [example, str(ex)])
380
381
Mike Frysingerae409522014-02-01 03:16:11 -0500382def _check_change_has_bug_field(_project, commit):
David McMahon8f6553e2011-06-10 15:46:36 -0700383 """Check for a correctly formatted 'BUG=' field in the commit message."""
David James5c0073d2013-04-03 08:48:52 -0700384 OLD_BUG_RE = r'\nBUG=.*chromium-os'
385 if re.search(OLD_BUG_RE, _get_commit_desc(commit)):
386 msg = ('The chromium-os bug tracker is now deprecated. Please use\n'
387 'the chromium tracker in your BUG= line now.')
388 return HookFailure(msg)
Ryan Cuiec4d6332011-05-02 14:15:25 -0700389
David James5c0073d2013-04-03 08:48:52 -0700390 BUG_RE = r'\nBUG=([Nn]one|(chrome-os-partner|chromium):\d+)'
Mandeep Singh Baines96a53be2011-05-03 11:10:25 -0700391 if not re.search(BUG_RE, _get_commit_desc(commit)):
David McMahon8f6553e2011-06-10 15:46:36 -0700392 msg = ('Changelist description needs BUG field (after first line):\n'
David James5c0073d2013-04-03 08:48:52 -0700393 'BUG=chromium:9999 (for public tracker)\n'
David McMahon8f6553e2011-06-10 15:46:36 -0700394 'BUG=chrome-os-partner:9999 (for partner tracker)\n'
395 'BUG=None')
Ryan Cui1562fb82011-05-09 11:01:31 -0700396 return HookFailure(msg)
397
Ryan Cuiec4d6332011-05-02 14:15:25 -0700398
Doug Anderson42b8a052013-06-26 10:45:36 -0700399def _check_for_uprev(project, commit):
400 """Check that we're not missing a revbump of an ebuild in the given commit.
401
402 If the given commit touches files in a directory that has ebuilds somewhere
403 up the directory hierarchy, it's very likely that we need an ebuild revbump
404 in order for those changes to take effect.
405
406 It's not totally trivial to detect a revbump, so at least detect that an
407 ebuild with a revision number in it was touched. This should handle the
408 common case where we use a symlink to do the revbump.
409
410 TODO: it would be nice to enhance this hook to:
411 * Handle cases where people revbump with a slightly different syntax. I see
412 one ebuild (puppy) that revbumps with _pN. This is a false positive.
413 * Catches cases where people aren't using symlinks for revbumps. If they
414 edit a revisioned file directly (and are expected to rename it for revbump)
415 we'll miss that. Perhaps we could detect that the file touched is a
416 symlink?
417
418 If a project doesn't use symlinks we'll potentially miss a revbump, but we're
419 still better off than without this check.
420
421 Args:
422 project: The project to look at
423 commit: The commit to look at
424
425 Returns:
426 A HookFailure or None.
427 """
Mike Frysinger011af942014-01-17 16:12:22 -0500428 # If this is the portage-stable overlay, then ignore the check. It's rare
429 # that we're doing anything other than importing files from upstream, so
430 # forcing a rev bump makes no sense.
431 whitelist = (
432 'chromiumos/overlays/portage-stable',
433 )
434 if project in whitelist:
435 return None
436
Doug Anderson42b8a052013-06-26 10:45:36 -0700437 affected_paths = _get_affected_files(commit, include_deletes=True)
438
439 # Don't yell about changes to whitelisted files...
Mike Frysinger011af942014-01-17 16:12:22 -0500440 whitelist = ('ChangeLog', 'Manifest', 'metadata.xml')
Doug Anderson42b8a052013-06-26 10:45:36 -0700441 affected_paths = [path for path in affected_paths
442 if os.path.basename(path) not in whitelist]
443 if not affected_paths:
444 return None
445
446 # If we've touched any file named with a -rN.ebuild then we'll say we're
447 # OK right away. See TODO above about enhancing this.
448 touched_revved_ebuild = any(re.search(r'-r\d*\.ebuild$', path)
449 for path in affected_paths)
450 if touched_revved_ebuild:
451 return None
452
453 # We want to examine the current contents of all directories that are parents
454 # of files that were touched (up to the top of the project).
455 #
456 # ...note: we use the current directory contents even though it may have
457 # changed since the commit we're looking at. This is just a heuristic after
458 # all. Worst case we don't flag a missing revbump.
459 project_top = os.getcwd()
460 dirs_to_check = set([project_top])
461 for path in affected_paths:
462 path = os.path.dirname(path)
463 while os.path.exists(path) and not os.path.samefile(path, project_top):
464 dirs_to_check.add(path)
465 path = os.path.dirname(path)
466
467 # Look through each directory. If it's got an ebuild in it then we'll
468 # consider this as a case when we need a revbump.
469 for dir_path in dirs_to_check:
470 contents = os.listdir(dir_path)
471 ebuilds = [os.path.join(dir_path, path)
472 for path in contents if path.endswith('.ebuild')]
473 ebuilds_9999 = [path for path in ebuilds if path.endswith('-9999.ebuild')]
474
475 # If the -9999.ebuild file was touched the bot will uprev for us.
476 # ...we'll use a simple intersection here as a heuristic...
477 if set(ebuilds_9999) & set(affected_paths):
478 continue
479
480 if ebuilds:
481 return HookFailure('Changelist probably needs a revbump of an ebuild\n'
482 'or a -r1.ebuild symlink if this is a new ebuild')
483
484 return None
485
486
Mike Frysingerbf8b91c2014-02-01 02:50:27 -0500487def _check_ebuild_eapi(project, commit):
488 """Make sure we have people use EAPI=4 or newer with custom ebuilds.
489
490 We want to get away from older EAPI's as it makes life confusing and they
491 have less builtin error checking.
492
493 Args:
494 project: The project to look at
495 commit: The commit to look at
496
497 Returns:
498 A HookFailure or None.
499 """
500 # If this is the portage-stable overlay, then ignore the check. It's rare
501 # that we're doing anything other than importing files from upstream, so
502 # forcing a rev bump makes no sense.
503 whitelist = (
504 'chromiumos/overlays/portage-stable',
505 )
506 if project in whitelist:
507 return None
508
509 BAD_EAPIS = ('0', '1', '2', '3')
510
511 get_eapi = re.compile(r'^\s*EAPI=[\'"]?([^\'"]+)')
512
513 ebuilds_re = [r'\.ebuild$']
514 ebuilds = _filter_files(_get_affected_files(commit, relative=True),
515 ebuilds_re)
516 bad_ebuilds = []
517
518 for ebuild in ebuilds:
519 # If the ebuild does not specify an EAPI, it defaults to 0.
520 eapi = '0'
521
522 lines = _get_file_content(ebuild, commit).splitlines()
523 if len(lines) == 1:
524 # This is most likely a symlink, so skip it entirely.
525 continue
526
527 for line in lines:
528 m = get_eapi.match(line)
529 if m:
530 # Once we hit the first EAPI line in this ebuild, stop processing.
531 # The spec requires that there only be one and it be first, so
532 # checking all possible values is pointless. We also assume that
533 # it's "the" EAPI line and not something in the middle of a heredoc.
534 eapi = m.group(1)
535 break
536
537 if eapi in BAD_EAPIS:
538 bad_ebuilds.append((ebuild, eapi))
539
540 if bad_ebuilds:
541 # pylint: disable=C0301
542 url = 'http://dev.chromium.org/chromium-os/how-tos-and-troubleshooting/upgrade-ebuild-eapis'
543 # pylint: enable=C0301
544 return HookFailure(
545 'These ebuilds are using old EAPIs. Please update to 4 or newer.\n'
546 '\t%s\n'
547 'See this guide for more details:\n%s\n' %
548 ('\n\t'.join(['%s: EAPI=%s' % x for x in bad_ebuilds]), url))
549
550
Mike Frysinger89bdb852014-02-01 05:26:26 -0500551def _check_ebuild_keywords(_project, commit):
Mike Frysingerc51ece72014-01-17 16:23:40 -0500552 """Make sure we use the new style KEYWORDS when possible in ebuilds.
553
554 If an ebuild generally does not care about the arch it is running on, then
555 ebuilds should flag it with one of:
556 KEYWORDS="*" # A stable ebuild.
557 KEYWORDS="~*" # An unstable ebuild.
558 KEYWORDS="-* ..." # Is known to only work on specific arches.
559
560 Args:
561 project: The project to look at
562 commit: The commit to look at
563
564 Returns:
565 A HookFailure or None.
566 """
567 WHITELIST = set(('*', '-*', '~*'))
568
569 get_keywords = re.compile(r'^\s*KEYWORDS="(.*)"')
570
Mike Frysinger89bdb852014-02-01 05:26:26 -0500571 ebuilds_re = [r'\.ebuild$']
572 ebuilds = _filter_files(_get_affected_files(commit, relative=True),
573 ebuilds_re)
574
Mike Frysingerc51ece72014-01-17 16:23:40 -0500575 for ebuild in ebuilds:
576 for _, line in _get_file_diff(ebuild, commit):
577 m = get_keywords.match(line)
578 if m:
579 keywords = set(m.group(1).split())
580 if not keywords or WHITELIST - keywords != WHITELIST:
581 continue
582
583 return HookFailure(
584 'Please update KEYWORDS to use a glob:\n'
585 'If the ebuild should be marked stable (normal for non-9999 '
586 'ebuilds):\n'
587 ' KEYWORDS="*"\n'
588 'If the ebuild should be marked unstable (normal for '
589 'cros-workon / 9999 ebuilds):\n'
590 ' KEYWORDS="~*"\n'
591 'If the ebuild needs to be marked for only specific arches,'
592 'then use -* like so:\n'
593 ' KEYWORDS="-* arm ..."\n')
594
595
Yu-Ju Hong5e0efa72013-11-19 16:28:10 -0800596def _check_ebuild_licenses(_project, commit):
597 """Check if the LICENSE field in the ebuild is correct."""
598 affected_paths = _get_affected_files(commit)
599 touched_ebuilds = [x for x in affected_paths if x.endswith('.ebuild')]
600
601 # A list of licenses to ignore for now.
602 LICENSES_IGNORE = ['||', '(', ')', 'Proprietary', 'as-is']
603
604 for ebuild in touched_ebuilds:
605 # Skip virutal packages.
606 if ebuild.split('/')[-3] == 'virtual':
607 continue
608
609 try:
610 license_types = licenses.GetLicenseTypesFromEbuild(ebuild)
611 except ValueError as e:
612 return HookFailure(e.message, [ebuild])
613
614 # Also ignore licenses ending with '?'
615 for license_type in [x for x in license_types
616 if x not in LICENSES_IGNORE and not x.endswith('?')]:
617 try:
618 licenses.Licensing.FindLicenseType(license_type)
619 except AssertionError as e:
620 return HookFailure(e.message, [ebuild])
621
622
Mike Frysingercd363c82014-02-01 05:20:18 -0500623def _check_ebuild_virtual_pv(project, commit):
624 """Enforce the virtual PV policies."""
625 # If this is the portage-stable overlay, then ignore the check.
626 # We want to import virtuals as-is from upstream Gentoo.
627 whitelist = (
628 'chromiumos/overlays/portage-stable',
629 )
630 if project in whitelist:
631 return None
632
633 # We assume the repo name is the same as the dir name on disk.
634 # It would be dumb to not have them match though.
635 project = os.path.basename(project)
636
637 is_variant = lambda x: x.startswith('overlay-variant-')
638 is_board = lambda x: x.startswith('overlay-')
639 is_private = lambda x: x.endswith('-private')
640
641 get_pv = re.compile(r'(.*?)virtual/([^/]+)/\2-([^/]*)\.ebuild$')
642
643 ebuilds_re = [r'\.ebuild$']
644 ebuilds = _filter_files(_get_affected_files(commit, relative=True),
645 ebuilds_re)
646 bad_ebuilds = []
647
648 for ebuild in ebuilds:
649 m = get_pv.match(ebuild)
650 if m:
651 overlay = m.group(1)
652 if not overlay or not is_board(overlay):
653 overlay = project
654
655 pv = m.group(3).split('-', 1)[0]
656
657 if is_private(overlay):
658 want_pv = '3.5' if is_variant(overlay) else '3'
659 elif is_board(overlay):
660 want_pv = '2.5' if is_variant(overlay) else '2'
661 else:
662 want_pv = '1'
663
664 if pv != want_pv:
665 bad_ebuilds.append((ebuild, pv, want_pv))
666
667 if bad_ebuilds:
668 # pylint: disable=C0301
669 url = 'http://dev.chromium.org/chromium-os/how-tos-and-troubleshooting/portage-build-faq#TOC-Virtuals-and-central-management'
670 # pylint: enable=C0301
671 return HookFailure(
672 'These virtuals have incorrect package versions (PVs). Please adjust:\n'
673 '\t%s\n'
674 'If this is an upstream Gentoo virtual, then you may ignore this\n'
675 'check (and re-run w/--no-verify). Otherwise, please see this\n'
676 'page for more details:\n%s\n' %
677 ('\n\t'.join(['%s:\n\t\tPV is %s but should be %s' % x
678 for x in bad_ebuilds]), url))
679
680
Mike Frysingerae409522014-02-01 03:16:11 -0500681def _check_change_has_proper_changeid(_project, commit):
Mandeep Singh Bainesa23eb5f2011-05-04 13:43:25 -0700682 """Verify that Change-ID is present in last paragraph of commit message."""
683 desc = _get_commit_desc(commit)
684 loc = desc.rfind('\nChange-Id:')
685 if loc == -1 or re.search('\n\s*\n\s*\S+', desc[loc:]):
Ryan Cui1562fb82011-05-09 11:01:31 -0700686 return HookFailure('Change-Id must be in last paragraph of description.')
687
Mandeep Singh Bainesa23eb5f2011-05-04 13:43:25 -0700688
Mike Frysingerae409522014-02-01 03:16:11 -0500689def _check_license(_project, commit):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700690 """Verifies the license header."""
691 LICENSE_HEADER = (
David Hendricks0af30eb2013-02-05 11:35:56 -0800692 r".* Copyright \(c\) 20[-0-9]{2,7} The Chromium OS Authors\. All rights "
Ryan Cuiec4d6332011-05-02 14:15:25 -0700693 r"reserved\." "\n"
David Hendricks0af30eb2013-02-05 11:35:56 -0800694 r".* Use of this source code is governed by a BSD-style license that can "
Ryan Cuiec4d6332011-05-02 14:15:25 -0700695 "be\n"
David Hendricks0af30eb2013-02-05 11:35:56 -0800696 r".* found in the LICENSE file\."
Ryan Cuiec4d6332011-05-02 14:15:25 -0700697 "\n"
698 )
David Hendricks35030d02013-02-04 17:49:16 -0800699 FAIL_MSG = "License must match"
Ryan Cuiec4d6332011-05-02 14:15:25 -0700700
David Hendricks35030d02013-02-04 17:49:16 -0800701 return _verify_header_content(commit, LICENSE_HEADER, FAIL_MSG)
Ryan Cuiec4d6332011-05-02 14:15:25 -0700702
703
Mike Frysingerae409522014-02-01 03:16:11 -0500704def _check_google_copyright(_project, commit):
David Hendricksa0e310d2013-02-04 17:51:55 -0800705 """Verifies Google Inc. as copyright holder."""
706 LICENSE_HEADER = (
707 r".* Copyright 20[-0-9]{2,7} Google Inc\."
708 )
709 FAIL_MSG = "Copyright must match"
710
David Hendricks4c018e72013-02-06 13:46:38 -0800711 # Avoid blocking partners and external contributors.
712 fqdn = socket.getfqdn()
713 if not fqdn.endswith(".corp.google.com"):
714 return None
715
David Hendricksa0e310d2013-02-04 17:51:55 -0800716 return _verify_header_content(commit, LICENSE_HEADER, FAIL_MSG)
717
718
Ryan Cuiec4d6332011-05-02 14:15:25 -0700719# Project-specific hooks
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700720
Ryan Cui1562fb82011-05-09 11:01:31 -0700721
Mike Frysingerae409522014-02-01 03:16:11 -0500722def _run_checkpatch(_project, commit, options=()):
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700723 """Runs checkpatch.pl on the given project"""
724 hooks_dir = _get_hooks_dir()
Mike Frysingerae409522014-02-01 03:16:11 -0500725 cmd = ['%s/checkpatch.pl' % hooks_dir] + list(options) + ['-']
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700726 p = subprocess.Popen(cmd, stdin=subprocess.PIPE, stdout=subprocess.PIPE)
Che-Liang Chiou5ce2d7b2013-03-22 18:47:55 -0700727 output = p.communicate(_get_patch(commit))[0]
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700728 if p.returncode:
Ryan Cui1562fb82011-05-09 11:01:31 -0700729 return HookFailure('checkpatch.pl errors/warnings\n\n' + output)
Ryan Cuiec4d6332011-05-02 14:15:25 -0700730
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700731
Anton Staaf815d6852011-08-22 10:08:45 -0700732def _run_checkpatch_no_tree(project, commit):
733 return _run_checkpatch(project, commit, ['--no-tree'])
734
Mike Frysingerae409522014-02-01 03:16:11 -0500735
Randall Spangler7318fd62013-11-21 12:16:58 -0800736def _run_checkpatch_ec(project, commit):
737 """Runs checkpatch with options for Chromium EC projects."""
738 return _run_checkpatch(project, commit, ['--no-tree',
739 '--ignore=MSLEEP,VOLATILE'])
740
Mike Frysingerae409522014-02-01 03:16:11 -0500741
742def _kernel_configcheck(_project, commit):
Olof Johanssona96810f2012-09-04 16:20:03 -0700743 """Makes sure kernel config changes are not mixed with code changes"""
744 files = _get_affected_files(commit)
745 if not len(_filter_files(files, [r'chromeos/config'])) in [0, len(files)]:
746 return HookFailure('Changes to chromeos/config/ and regular files must '
747 'be in separate commits:\n%s' % '\n'.join(files))
Anton Staaf815d6852011-08-22 10:08:45 -0700748
Mike Frysingerae409522014-02-01 03:16:11 -0500749
750def _run_json_check(_project, commit):
Dale Curtis2975c432011-05-03 17:25:20 -0700751 """Checks that all JSON files are syntactically valid."""
Dale Curtisa039cfd2011-05-04 12:01:05 -0700752 for f in _filter_files(_get_affected_files(commit), [r'.*\.json']):
Dale Curtis2975c432011-05-03 17:25:20 -0700753 try:
754 json.load(open(f))
755 except Exception, e:
Ryan Cui1562fb82011-05-09 11:01:31 -0700756 return HookFailure('Invalid JSON in %s: %s' % (f, e))
Dale Curtis2975c432011-05-03 17:25:20 -0700757
758
Mike Frysingerae409522014-02-01 03:16:11 -0500759def _check_manifests(_project, commit):
Mike Frysinger52b537e2013-08-22 22:59:53 -0400760 """Make sure Manifest files only have DIST lines"""
761 paths = []
762
763 for path in _get_affected_files(commit):
764 if os.path.basename(path) != 'Manifest':
765 continue
766 if not os.path.exists(path):
767 continue
768
769 with open(path, 'r') as f:
770 for line in f.readlines():
771 if not line.startswith('DIST '):
772 paths.append(path)
773 break
774
775 if paths:
776 return HookFailure('Please remove lines that do not start with DIST:\n%s' %
777 ('\n'.join(paths),))
778
779
Mike Frysingerae409522014-02-01 03:16:11 -0500780def _check_change_has_branch_field(_project, commit):
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700781 """Check for a non-empty 'BRANCH=' field in the commit message."""
782 BRANCH_RE = r'\nBRANCH=\S+'
783
784 if not re.search(BRANCH_RE, _get_commit_desc(commit)):
785 msg = ('Changelist description needs BRANCH field (after first line)\n'
786 'E.g. BRANCH=none or BRANCH=link,snow')
787 return HookFailure(msg)
788
789
Mike Frysingerae409522014-02-01 03:16:11 -0500790def _check_change_has_signoff_field(_project, commit):
Shawn Nematbakhsh51e16ac2014-01-28 15:31:07 -0800791 """Check for a non-empty 'Signed-off-by:' field in the commit message."""
792 SIGNOFF_RE = r'\nSigned-off-by: \S+'
793
794 if not re.search(SIGNOFF_RE, _get_commit_desc(commit)):
795 msg = ('Changelist description needs Signed-off-by: field\n'
796 'E.g. Signed-off-by: My Name <me@chromium.org>')
797 return HookFailure(msg)
798
799
Jon Salz3ee59de2012-08-18 13:54:22 +0800800def _run_project_hook_script(script, project, commit):
801 """Runs a project hook script.
802
803 The script is run with the following environment variables set:
804 PRESUBMIT_PROJECT: The affected project
805 PRESUBMIT_COMMIT: The affected commit
806 PRESUBMIT_FILES: A newline-separated list of affected files
807
808 The script is considered to fail if the exit code is non-zero. It should
809 write an error message to stdout.
810 """
811 env = dict(os.environ)
812 env['PRESUBMIT_PROJECT'] = project
813 env['PRESUBMIT_COMMIT'] = commit
814
815 # Put affected files in an environment variable
816 files = _get_affected_files(commit)
817 env['PRESUBMIT_FILES'] = '\n'.join(files)
818
819 process = subprocess.Popen(script, env=env, shell=True,
820 stdin=open(os.devnull),
Jon Salz7b618af2012-08-31 06:03:16 +0800821 stdout=subprocess.PIPE,
822 stderr=subprocess.STDOUT)
Jon Salz3ee59de2012-08-18 13:54:22 +0800823 stdout, _ = process.communicate()
824 if process.wait():
Jon Salz7b618af2012-08-31 06:03:16 +0800825 if stdout:
826 stdout = re.sub('(?m)^', ' ', stdout)
827 return HookFailure('Hook script "%s" failed with code %d%s' %
Jon Salz3ee59de2012-08-18 13:54:22 +0800828 (script, process.returncode,
829 ':\n' + stdout if stdout else ''))
830
831
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700832# Base
833
Ryan Cui1562fb82011-05-09 11:01:31 -0700834
Ryan Cui9b651632011-05-11 11:38:58 -0700835# A list of hooks that are not project-specific
836_COMMON_HOOKS = [
837 _check_change_has_bug_field,
David Jamesc3b68b32013-04-03 09:17:03 -0700838 _check_change_has_valid_cq_depend,
Ryan Cui9b651632011-05-11 11:38:58 -0700839 _check_change_has_test_field,
840 _check_change_has_proper_changeid,
Mike Frysingerbf8b91c2014-02-01 02:50:27 -0500841 _check_ebuild_eapi,
Mike Frysinger89bdb852014-02-01 05:26:26 -0500842 _check_ebuild_keywords,
Yu-Ju Hong5e0efa72013-11-19 16:28:10 -0800843 _check_ebuild_licenses,
Mike Frysingercd363c82014-02-01 05:20:18 -0500844 _check_ebuild_virtual_pv,
Ryan Cui9b651632011-05-11 11:38:58 -0700845 _check_no_stray_whitespace,
846 _check_no_long_lines,
847 _check_license,
848 _check_no_tabs,
Doug Anderson42b8a052013-06-26 10:45:36 -0700849 _check_for_uprev,
Ryan Cui9b651632011-05-11 11:38:58 -0700850]
Ryan Cuiec4d6332011-05-02 14:15:25 -0700851
Ryan Cui1562fb82011-05-09 11:01:31 -0700852
Ryan Cui9b651632011-05-11 11:38:58 -0700853# A dictionary of project-specific hooks(callbacks), indexed by project name.
854# dict[project] = [callback1, callback2]
855_PROJECT_SPECIFIC_HOOKS = {
Mike Frysingerdf980702013-08-22 22:25:22 -0400856 "chromeos/autotest-tools": [_run_json_check],
Mike Frysinger52b537e2013-08-22 22:59:53 -0400857 "chromeos/overlays/chromeos-overlay": [_check_manifests],
858 "chromeos/overlays/chromeos-partner-overlay": [_check_manifests],
Randall Spangler7318fd62013-11-21 12:16:58 -0800859 "chromeos/platform/ec-private": [_run_checkpatch_ec,
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700860 _check_change_has_branch_field],
Puneet Kumar57b9c092012-08-14 18:58:29 -0700861 "chromeos/third_party/intel-framework": [_check_change_has_branch_field],
Mike Frysingerdf980702013-08-22 22:25:22 -0400862 "chromeos/vendor/kernel-exynos-staging": [_run_checkpatch,
863 _kernel_configcheck],
864 "chromeos/vendor/u-boot-exynos": [_run_checkpatch_no_tree],
Mike Frysinger52b537e2013-08-22 22:59:53 -0400865 "chromiumos/overlays/board-overlays": [_check_manifests],
866 "chromiumos/overlays/chromiumos-overlay": [_check_manifests],
867 "chromiumos/overlays/portage-stable": [_check_manifests],
Randall Spangler7318fd62013-11-21 12:16:58 -0800868 "chromiumos/platform/ec": [_run_checkpatch_ec,
Mike Frysingerdf980702013-08-22 22:25:22 -0400869 _check_change_has_branch_field],
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700870 "chromiumos/platform/mosys": [_check_change_has_branch_field],
Mike Frysingerdf980702013-08-22 22:25:22 -0400871 "chromiumos/platform/vboot_reference": [_check_change_has_branch_field],
Shawn Nematbakhshb6ac17a2014-01-28 16:47:13 -0800872 "chromiumos/third_party/coreboot": [_check_change_has_branch_field,
873 _check_change_has_signoff_field,
874 _check_google_copyright],
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700875 "chromiumos/third_party/flashrom": [_check_change_has_branch_field],
Mike Frysingerdf980702013-08-22 22:25:22 -0400876 "chromiumos/third_party/kernel": [_run_checkpatch, _kernel_configcheck],
877 "chromiumos/third_party/kernel-next": [_run_checkpatch,
878 _kernel_configcheck],
879 "chromiumos/third_party/u-boot": [_run_checkpatch_no_tree,
880 _check_change_has_branch_field],
Ryan Cui9b651632011-05-11 11:38:58 -0700881}
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700882
Ryan Cui1562fb82011-05-09 11:01:31 -0700883
Ryan Cui9b651632011-05-11 11:38:58 -0700884# A dictionary of flags (keys) that can appear in the config file, and the hook
885# that the flag disables (value)
886_DISABLE_FLAGS = {
887 'stray_whitespace_check': _check_no_stray_whitespace,
888 'long_line_check': _check_no_long_lines,
889 'cros_license_check': _check_license,
890 'tab_check': _check_no_tabs,
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700891 'branch_check': _check_change_has_branch_field,
Shawn Nematbakhsh51e16ac2014-01-28 15:31:07 -0800892 'signoff_check': _check_change_has_signoff_field,
Ryan Cui9b651632011-05-11 11:38:58 -0700893}
894
895
Jon Salz3ee59de2012-08-18 13:54:22 +0800896def _get_disabled_hooks(config):
Ryan Cui9b651632011-05-11 11:38:58 -0700897 """Returns a set of hooks disabled by the current project's config file.
898
899 Expects to be called within the project root.
Jon Salz3ee59de2012-08-18 13:54:22 +0800900
901 Args:
902 config: A ConfigParser for the project's config file.
Ryan Cui9b651632011-05-11 11:38:58 -0700903 """
904 SECTION = 'Hook Overrides'
Jon Salz3ee59de2012-08-18 13:54:22 +0800905 if not config.has_section(SECTION):
906 return set()
Ryan Cui9b651632011-05-11 11:38:58 -0700907
908 disable_flags = []
Jon Salz3ee59de2012-08-18 13:54:22 +0800909 for flag in config.options(SECTION):
Ryan Cui9b651632011-05-11 11:38:58 -0700910 try:
Mike Frysingerae409522014-02-01 03:16:11 -0500911 if not config.getboolean(SECTION, flag):
912 disable_flags.append(flag)
Ryan Cui9b651632011-05-11 11:38:58 -0700913 except ValueError as e:
914 msg = "Error parsing flag \'%s\' in %s file - " % (flag, _CONFIG_FILE)
Mike Frysinger09d6a3d2013-10-08 22:21:03 -0400915 print(msg + str(e))
Ryan Cui9b651632011-05-11 11:38:58 -0700916
917 disabled_keys = set(_DISABLE_FLAGS.iterkeys()).intersection(disable_flags)
918 return set([_DISABLE_FLAGS[key] for key in disabled_keys])
919
920
Jon Salz3ee59de2012-08-18 13:54:22 +0800921def _get_project_hook_scripts(config):
922 """Returns a list of project-specific hook scripts.
923
924 Args:
925 config: A ConfigParser for the project's config file.
926 """
927 SECTION = 'Hook Scripts'
928 if not config.has_section(SECTION):
929 return []
930
931 hook_names_values = config.items(SECTION)
932 hook_names_values.sort(key=lambda x: x[0])
933 return [x[1] for x in hook_names_values]
934
935
Ryan Cui9b651632011-05-11 11:38:58 -0700936def _get_project_hooks(project):
937 """Returns a list of hooks that need to be run for a project.
938
939 Expects to be called from within the project root.
940 """
Jon Salz3ee59de2012-08-18 13:54:22 +0800941 config = ConfigParser.RawConfigParser()
942 try:
943 config.read(_CONFIG_FILE)
944 except ConfigParser.Error:
945 # Just use an empty config file
946 config = ConfigParser.RawConfigParser()
947
948 disabled_hooks = _get_disabled_hooks(config)
Ryan Cui9b651632011-05-11 11:38:58 -0700949 hooks = [hook for hook in _COMMON_HOOKS if hook not in disabled_hooks]
950
951 if project in _PROJECT_SPECIFIC_HOOKS:
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700952 hooks.extend(hook for hook in _PROJECT_SPECIFIC_HOOKS[project]
953 if hook not in disabled_hooks)
Ryan Cui9b651632011-05-11 11:38:58 -0700954
Jon Salz3ee59de2012-08-18 13:54:22 +0800955 for script in _get_project_hook_scripts(config):
956 hooks.append(functools.partial(_run_project_hook_script, script))
957
Ryan Cui9b651632011-05-11 11:38:58 -0700958 return hooks
959
960
Doug Anderson14749562013-06-26 13:38:29 -0700961def _run_project_hooks(project, proj_dir=None, commit_list=None):
Ryan Cui1562fb82011-05-09 11:01:31 -0700962 """For each project run its project specific hook from the hooks dictionary.
963
964 Args:
Doug Anderson44a644f2011-11-02 10:37:37 -0700965 project: The name of project to run hooks for.
966 proj_dir: If non-None, this is the directory the project is in. If None,
967 we'll ask repo.
Doug Anderson14749562013-06-26 13:38:29 -0700968 commit_list: A list of commits to run hooks against. If None or empty list
969 then we'll automatically get the list of commits that would be uploaded.
Ryan Cui1562fb82011-05-09 11:01:31 -0700970
971 Returns:
972 Boolean value of whether any errors were ecountered while running the hooks.
973 """
Doug Anderson44a644f2011-11-02 10:37:37 -0700974 if proj_dir is None:
David James2edd9002013-10-11 14:09:19 -0700975 proj_dirs = _run_command(['repo', 'forall', project, '-c', 'pwd']).split()
976 if len(proj_dirs) == 0:
977 print('%s cannot be found.' % project, file=sys.stderr)
978 print('Please specify a valid project.', file=sys.stderr)
979 return True
980 if len(proj_dirs) > 1:
981 print('%s is associated with multiple directories.' % project,
982 file=sys.stderr)
983 print('Please specify a directory to help disambiguate.', file=sys.stderr)
984 return True
985 proj_dir = proj_dirs[0]
Doug Anderson44a644f2011-11-02 10:37:37 -0700986
Ryan Cuiec4d6332011-05-02 14:15:25 -0700987 pwd = os.getcwd()
988 # hooks assume they are run from the root of the project
989 os.chdir(proj_dir)
990
Doug Anderson14749562013-06-26 13:38:29 -0700991 if not commit_list:
992 try:
993 commit_list = _get_commits()
994 except VerifyException as e:
995 PrintErrorForProject(project, HookFailure(str(e)))
996 os.chdir(pwd)
997 return True
Ryan Cuifa55df52011-05-06 11:16:55 -0700998
Ryan Cui9b651632011-05-11 11:38:58 -0700999 hooks = _get_project_hooks(project)
Ryan Cui1562fb82011-05-09 11:01:31 -07001000 error_found = False
Ryan Cuifa55df52011-05-06 11:16:55 -07001001 for commit in commit_list:
Ryan Cui1562fb82011-05-09 11:01:31 -07001002 error_list = []
Ryan Cui9b651632011-05-11 11:38:58 -07001003 for hook in hooks:
Ryan Cui1562fb82011-05-09 11:01:31 -07001004 hook_error = hook(project, commit)
1005 if hook_error:
1006 error_list.append(hook_error)
1007 error_found = True
1008 if error_list:
1009 PrintErrorsForCommit(project, commit, _get_commit_desc(commit),
1010 error_list)
Don Garrettdba548a2011-05-05 15:17:14 -07001011
Ryan Cuiec4d6332011-05-02 14:15:25 -07001012 os.chdir(pwd)
Ryan Cui1562fb82011-05-09 11:01:31 -07001013 return error_found
Mandeep Singh Baines116ad102011-04-27 15:16:37 -07001014
Mike Frysingerae409522014-02-01 03:16:11 -05001015
Mandeep Singh Baines116ad102011-04-27 15:16:37 -07001016# Main
Mandeep Singh Baines69e470e2011-04-06 10:34:52 -07001017
Ryan Cui1562fb82011-05-09 11:01:31 -07001018
Mike Frysingerae409522014-02-01 03:16:11 -05001019def main(project_list, worktree_list=None, **_kwargs):
Doug Anderson06456632012-01-05 11:02:14 -08001020 """Main function invoked directly by repo.
1021
1022 This function will exit directly upon error so that repo doesn't print some
1023 obscure error message.
1024
1025 Args:
1026 project_list: List of projects to run on.
David James2edd9002013-10-11 14:09:19 -07001027 worktree_list: A list of directories. It should be the same length as
1028 project_list, so that each entry in project_list matches with a directory
1029 in worktree_list. If None, we will attempt to calculate the directories
1030 automatically.
Doug Anderson06456632012-01-05 11:02:14 -08001031 kwargs: Leave this here for forward-compatibility.
1032 """
Ryan Cui1562fb82011-05-09 11:01:31 -07001033 found_error = False
David James2edd9002013-10-11 14:09:19 -07001034 if not worktree_list:
1035 worktree_list = [None] * len(project_list)
1036 for project, worktree in zip(project_list, worktree_list):
1037 if _run_project_hooks(project, proj_dir=worktree):
Ryan Cui1562fb82011-05-09 11:01:31 -07001038 found_error = True
1039
Mike Frysingerae409522014-02-01 03:16:11 -05001040 if found_error:
Ryan Cui1562fb82011-05-09 11:01:31 -07001041 msg = ('Preupload failed due to errors in project(s). HINTS:\n'
Ryan Cui9b651632011-05-11 11:38:58 -07001042 '- To disable some source style checks, and for other hints, see '
1043 '<checkout_dir>/src/repohooks/README\n'
1044 '- To upload only current project, run \'repo upload .\'')
Mike Frysinger09d6a3d2013-10-08 22:21:03 -04001045 print(msg, file=sys.stderr)
Don Garrettdba548a2011-05-05 15:17:14 -07001046 sys.exit(1)
Anush Elangovan63afad72011-03-23 00:41:27 -07001047
Ryan Cui1562fb82011-05-09 11:01:31 -07001048
Doug Anderson44a644f2011-11-02 10:37:37 -07001049def _identify_project(path):
1050 """Identify the repo project associated with the given path.
1051
1052 Returns:
1053 A string indicating what project is associated with the path passed in or
1054 a blank string upon failure.
1055 """
1056 return _run_command(['repo', 'forall', '.', '-c', 'echo ${REPO_PROJECT}'],
1057 stderr=subprocess.PIPE, cwd=path).strip()
1058
1059
1060def direct_main(args, verbose=False):
1061 """Run hooks directly (outside of the context of repo).
1062
1063 # Setup for doctests below.
1064 # ...note that some tests assume that running pre-upload on this CWD is fine.
1065 # TODO: Use mock and actually mock out _run_project_hooks() for tests.
1066 >>> mydir = os.path.dirname(os.path.abspath(__file__))
1067 >>> olddir = os.getcwd()
1068
1069 # OK to run w/ no arugments; will run with CWD.
1070 >>> os.chdir(mydir)
1071 >>> direct_main(['prog_name'], verbose=True)
1072 Running hooks on chromiumos/repohooks
1073 0
1074 >>> os.chdir(olddir)
1075
1076 # Run specifying a dir
1077 >>> direct_main(['prog_name', '--dir=%s' % mydir], verbose=True)
1078 Running hooks on chromiumos/repohooks
1079 0
1080
1081 # Not a problem to use a bogus project; we'll just get default settings.
1082 >>> direct_main(['prog_name', '--dir=%s' % mydir, '--project=X'],verbose=True)
1083 Running hooks on X
1084 0
1085
1086 # Run with project but no dir
1087 >>> os.chdir(mydir)
1088 >>> direct_main(['prog_name', '--project=X'], verbose=True)
1089 Running hooks on X
1090 0
1091 >>> os.chdir(olddir)
1092
1093 # Try with a non-git CWD
1094 >>> os.chdir('/tmp')
1095 >>> direct_main(['prog_name'])
1096 Traceback (most recent call last):
1097 ...
1098 BadInvocation: The current directory is not part of a git project.
1099
1100 # Check various bad arguments...
1101 >>> direct_main(['prog_name', 'bogus'])
1102 Traceback (most recent call last):
1103 ...
1104 BadInvocation: Unexpected arguments: bogus
1105 >>> direct_main(['prog_name', '--project=bogus', '--dir=bogusdir'])
1106 Traceback (most recent call last):
1107 ...
1108 BadInvocation: Invalid dir: bogusdir
1109 >>> direct_main(['prog_name', '--project=bogus', '--dir=/tmp'])
1110 Traceback (most recent call last):
1111 ...
1112 BadInvocation: Not a git directory: /tmp
1113
1114 Args:
1115 args: The value of sys.argv
Mike Frysingerae409522014-02-01 03:16:11 -05001116 verbose: Log verbose info while running
Doug Anderson44a644f2011-11-02 10:37:37 -07001117
1118 Returns:
1119 0 if no pre-upload failures, 1 if failures.
1120
1121 Raises:
1122 BadInvocation: On some types of invocation errors.
1123 """
1124 desc = 'Run Chromium OS pre-upload hooks on changes compared to upstream.'
1125 parser = optparse.OptionParser(description=desc)
1126
1127 parser.add_option('--dir', default=None,
1128 help='The directory that the project lives in. If not '
1129 'specified, use the git project root based on the cwd.')
1130 parser.add_option('--project', default=None,
1131 help='The project repo path; this can affect how the hooks '
1132 'get run, since some hooks are project-specific. For '
1133 'chromite this is chromiumos/chromite. If not specified, '
1134 'the repo tool will be used to figure this out based on '
1135 'the dir.')
Doug Anderson14749562013-06-26 13:38:29 -07001136 parser.add_option('--rerun-since', default=None,
1137 help='Rerun hooks on old commits since the given date. '
1138 'The date should match git log\'s concept of a date. '
1139 'e.g. 2012-06-20')
1140
1141 parser.usage = "pre-upload.py [options] [commits]"
Doug Anderson44a644f2011-11-02 10:37:37 -07001142
1143 opts, args = parser.parse_args(args[1:])
1144
Doug Anderson14749562013-06-26 13:38:29 -07001145 if opts.rerun_since:
1146 if args:
1147 raise BadInvocation('Can\'t pass commits and use rerun-since: %s' %
1148 ' '.join(args))
1149
1150 cmd = ['git', 'log', '--since="%s"' % opts.rerun_since, '--pretty=%H']
1151 all_commits = _run_command(cmd).splitlines()
1152 bot_commits = _run_command(cmd + ['--author=chrome-bot']).splitlines()
1153
1154 # Eliminate chrome-bot commits but keep ordering the same...
1155 bot_commits = set(bot_commits)
1156 args = [c for c in all_commits if c not in bot_commits]
1157
Doug Anderson44a644f2011-11-02 10:37:37 -07001158
1159 # Check/normlaize git dir; if unspecified, we'll use the root of the git
1160 # project from CWD
1161 if opts.dir is None:
1162 git_dir = _run_command(['git', 'rev-parse', '--git-dir'],
1163 stderr=subprocess.PIPE).strip()
1164 if not git_dir:
1165 raise BadInvocation('The current directory is not part of a git project.')
1166 opts.dir = os.path.dirname(os.path.abspath(git_dir))
1167 elif not os.path.isdir(opts.dir):
1168 raise BadInvocation('Invalid dir: %s' % opts.dir)
1169 elif not os.path.isdir(os.path.join(opts.dir, '.git')):
1170 raise BadInvocation('Not a git directory: %s' % opts.dir)
1171
1172 # Identify the project if it wasn't specified; this _requires_ the repo
1173 # tool to be installed and for the project to be part of a repo checkout.
1174 if not opts.project:
1175 opts.project = _identify_project(opts.dir)
1176 if not opts.project:
1177 raise BadInvocation("Repo couldn't identify the project of %s" % opts.dir)
1178
1179 if verbose:
Mike Frysinger09d6a3d2013-10-08 22:21:03 -04001180 print("Running hooks on %s" % (opts.project))
Doug Anderson44a644f2011-11-02 10:37:37 -07001181
Doug Anderson14749562013-06-26 13:38:29 -07001182 found_error = _run_project_hooks(opts.project, proj_dir=opts.dir,
1183 commit_list=args)
Doug Anderson44a644f2011-11-02 10:37:37 -07001184 if found_error:
1185 return 1
1186 return 0
1187
1188
1189def _test():
1190 """Run any built-in tests."""
1191 import doctest
1192 doctest.testmod()
1193
1194
Mandeep Singh Baines69e470e2011-04-06 10:34:52 -07001195if __name__ == '__main__':
Doug Anderson44a644f2011-11-02 10:37:37 -07001196 if sys.argv[1:2] == ["--test"]:
1197 _test()
1198 exit_code = 0
1199 else:
1200 prog_name = os.path.basename(sys.argv[0])
1201 try:
1202 exit_code = direct_main(sys.argv)
1203 except BadInvocation, e:
Mike Frysinger09d6a3d2013-10-08 22:21:03 -04001204 print("%s: %s" % (prog_name, str(e)), file=sys.stderr)
Doug Anderson44a644f2011-11-02 10:37:37 -07001205 exit_code = 1
1206 sys.exit(exit_code)