blob: 4879642cfb9fcd209a35cd0e63e0f91792910a03 [file] [log] [blame]
Doug Anderson44a644f2011-11-02 10:37:37 -07001#!/usr/bin/env python
Jon Salz98255932012-08-18 14:48:02 +08002# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Mandeep Singh Baines116ad102011-04-27 15:16:37 -07003# Use of this source code is governed by a BSD-style license that can be
4# found in the LICENSE file.
5
Ryan Cui9b651632011-05-11 11:38:58 -07006import ConfigParser
Jon Salz3ee59de2012-08-18 13:54:22 +08007import functools
Dale Curtis2975c432011-05-03 17:25:20 -07008import json
Doug Anderson44a644f2011-11-02 10:37:37 -07009import optparse
Mandeep Singh Baines116ad102011-04-27 15:16:37 -070010import os
Ryan Cuiec4d6332011-05-02 14:15:25 -070011import re
Mandeep Singh Bainesa7ffa4b2011-05-03 11:37:02 -070012import sys
Mandeep Singh Baines116ad102011-04-27 15:16:37 -070013import subprocess
14
Ryan Cui1562fb82011-05-09 11:01:31 -070015from errors import (VerifyException, HookFailure, PrintErrorForProject,
16 PrintErrorsForCommit)
Ryan Cuiec4d6332011-05-02 14:15:25 -070017
Ryan Cuiec4d6332011-05-02 14:15:25 -070018
19COMMON_INCLUDED_PATHS = [
20 # C++ and friends
21 r".*\.c$", r".*\.cc$", r".*\.cpp$", r".*\.h$", r".*\.m$", r".*\.mm$",
22 r".*\.inl$", r".*\.asm$", r".*\.hxx$", r".*\.hpp$", r".*\.s$", r".*\.S$",
23 # Scripts
24 r".*\.js$", r".*\.py$", r".*\.sh$", r".*\.rb$", r".*\.pl$", r".*\.pm$",
25 # No extension at all, note that ALL CAPS files are black listed in
26 # COMMON_EXCLUDED_LIST below.
27 r"(^|.*?[\\\/])[^.]+$",
28 # Other
29 r".*\.java$", r".*\.mk$", r".*\.am$",
30]
31
Ryan Cui1562fb82011-05-09 11:01:31 -070032
Ryan Cuiec4d6332011-05-02 14:15:25 -070033COMMON_EXCLUDED_PATHS = [
Ryan Cui31e0c172011-05-04 21:00:45 -070034 # avoid doing source file checks for kernel
35 r"/src/third_party/kernel/",
36 r"/src/third_party/kernel-next/",
Paul Taysomf8b6e012011-05-09 14:32:42 -070037 r"/src/third_party/ktop/",
38 r"/src/third_party/punybench/",
Ryan Cuiec4d6332011-05-02 14:15:25 -070039 r".*\bexperimental[\\\/].*",
40 r".*\b[A-Z0-9_]{2,}$",
41 r".*[\\\/]debian[\\\/]rules$",
Brian Harringd780d602011-10-18 16:48:08 -070042 # for ebuild trees, ignore any caches and manifest data
43 r".*/Manifest$",
44 r".*/metadata/[^/]*cache[^/]*/[^/]+/[^/]+$",
Doug Anderson5bfb6792011-10-25 16:45:41 -070045
46 # ignore profiles data (like overlay-tegra2/profiles)
47 r".*/overlay-.*/profiles/.*",
Andrew de los Reyes0e679922012-05-02 11:42:54 -070048 # ignore minified js and jquery
49 r".*\.min\.js",
50 r".*jquery.*\.js",
Ryan Cuiec4d6332011-05-02 14:15:25 -070051]
Mandeep Singh Baines116ad102011-04-27 15:16:37 -070052
Ryan Cui1562fb82011-05-09 11:01:31 -070053
Ryan Cui9b651632011-05-11 11:38:58 -070054_CONFIG_FILE = 'PRESUBMIT.cfg'
55
56
Doug Anderson44a644f2011-11-02 10:37:37 -070057# Exceptions
58
59
60class BadInvocation(Exception):
61 """An Exception indicating a bad invocation of the program."""
62 pass
63
64
Ryan Cui1562fb82011-05-09 11:01:31 -070065# General Helpers
66
Sean Paulba01d402011-05-05 11:36:23 -040067
Doug Anderson44a644f2011-11-02 10:37:37 -070068def _run_command(cmd, cwd=None, stderr=None):
69 """Executes the passed in command and returns raw stdout output.
70
71 Args:
72 cmd: The command to run; should be a list of strings.
73 cwd: The directory to switch to for running the command.
74 stderr: Can be one of None (print stderr to console), subprocess.STDOUT
75 (combine stderr with stdout), or subprocess.PIPE (ignore stderr).
76
77 Returns:
78 The standard out from the process.
79 """
80 p = subprocess.Popen(cmd, stdout=subprocess.PIPE, stderr=stderr, cwd=cwd)
81 return p.communicate()[0]
Ryan Cui72834d12011-05-05 14:51:33 -070082
Ryan Cui1562fb82011-05-09 11:01:31 -070083
Mandeep Singh Baines116ad102011-04-27 15:16:37 -070084def _get_hooks_dir():
Ryan Cuiec4d6332011-05-02 14:15:25 -070085 """Returns the absolute path to the repohooks directory."""
Doug Anderson44a644f2011-11-02 10:37:37 -070086 if __name__ == '__main__':
87 # Works when file is run on its own (__file__ is defined)...
88 return os.path.abspath(os.path.dirname(__file__))
89 else:
90 # We need to do this when we're run through repo. Since repo executes
91 # us with execfile(), we don't get __file__ defined.
92 cmd = ['repo', 'forall', 'chromiumos/repohooks', '-c', 'pwd']
93 return _run_command(cmd).strip()
Mandeep Singh Baines116ad102011-04-27 15:16:37 -070094
Ryan Cui1562fb82011-05-09 11:01:31 -070095
Ryan Cuiec4d6332011-05-02 14:15:25 -070096def _match_regex_list(subject, expressions):
97 """Try to match a list of regular expressions to a string.
98
99 Args:
100 subject: The string to match regexes on
101 expressions: A list of regular expressions to check for matches with.
102
103 Returns:
104 Whether the passed in subject matches any of the passed in regexes.
105 """
106 for expr in expressions:
107 if (re.search(expr, subject)):
108 return True
109 return False
110
Ryan Cui1562fb82011-05-09 11:01:31 -0700111
Ryan Cuiec4d6332011-05-02 14:15:25 -0700112def _filter_files(files, include_list, exclude_list=[]):
113 """Filter out files based on the conditions passed in.
114
115 Args:
116 files: list of filepaths to filter
117 include_list: list of regex that when matched with a file path will cause it
118 to be added to the output list unless the file is also matched with a
119 regex in the exclude_list.
120 exclude_list: list of regex that when matched with a file will prevent it
121 from being added to the output list, even if it is also matched with a
122 regex in the include_list.
123
124 Returns:
125 A list of filepaths that contain files matched in the include_list and not
126 in the exclude_list.
127 """
128 filtered = []
129 for f in files:
130 if (_match_regex_list(f, include_list) and
131 not _match_regex_list(f, exclude_list)):
132 filtered.append(f)
133 return filtered
134
Ryan Cuiec4d6332011-05-02 14:15:25 -0700135
David Hendricks35030d02013-02-04 17:49:16 -0800136def _verify_header_content(commit, content, fail_msg):
137 """Verify that file headers contain specified content.
138
139 Args:
140 commit: the affected commit.
141 content: the content of the header to be verified.
142 fail_msg: the first message to display in case of failure.
143
144 Returns:
145 The return value of HookFailure().
146 """
147 license_re = re.compile(content, re.MULTILINE)
148 bad_files = []
149 files = _filter_files(_get_affected_files(commit),
150 COMMON_INCLUDED_PATHS,
151 COMMON_EXCLUDED_PATHS)
152
153 for f in files:
154 contents = open(f).read()
155 if len(contents) == 0: continue # Ignore empty files
156 if not license_re.search(contents):
157 bad_files.append(f)
158 if bad_files:
159 msg = "%s:\n%s\n%s" % (fail_msg, license_re.pattern,
160 "Found a bad header in these files:")
161 return HookFailure(msg, bad_files)
162
163
Ryan Cuiec4d6332011-05-02 14:15:25 -0700164# Git Helpers
Ryan Cui1562fb82011-05-09 11:01:31 -0700165
166
Ryan Cui4725d952011-05-05 15:41:19 -0700167def _get_upstream_branch():
168 """Returns the upstream tracking branch of the current branch.
169
170 Raises:
171 Error if there is no tracking branch
172 """
173 current_branch = _run_command(['git', 'symbolic-ref', 'HEAD']).strip()
174 current_branch = current_branch.replace('refs/heads/', '')
175 if not current_branch:
Ryan Cui1562fb82011-05-09 11:01:31 -0700176 raise VerifyException('Need to be on a tracking branch')
Ryan Cui4725d952011-05-05 15:41:19 -0700177
178 cfg_option = 'branch.' + current_branch + '.%s'
179 full_upstream = _run_command(['git', 'config', cfg_option % 'merge']).strip()
180 remote = _run_command(['git', 'config', cfg_option % 'remote']).strip()
181 if not remote or not full_upstream:
Ryan Cui1562fb82011-05-09 11:01:31 -0700182 raise VerifyException('Need to be on a tracking branch')
Ryan Cui4725d952011-05-05 15:41:19 -0700183
184 return full_upstream.replace('heads', 'remotes/' + remote)
185
Ryan Cui1562fb82011-05-09 11:01:31 -0700186
Mandeep Singh Bainesb9ed1402011-04-29 15:32:06 -0700187def _get_diff(commit):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700188 """Returns the diff for this commit."""
Ryan Cui72834d12011-05-05 14:51:33 -0700189 return _run_command(['git', 'show', commit])
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700190
Ryan Cui1562fb82011-05-09 11:01:31 -0700191
Jon Salz98255932012-08-18 14:48:02 +0800192def _try_utf8_decode(data):
193 """Attempts to decode a string as UTF-8.
194
195 Returns:
196 The decoded Unicode object, or the original string if parsing fails.
197 """
198 try:
199 return unicode(data, 'utf-8', 'strict')
200 except UnicodeDecodeError:
201 return data
202
203
Ryan Cuiec4d6332011-05-02 14:15:25 -0700204def _get_file_diff(file, commit):
205 """Returns a list of (linenum, lines) tuples that the commit touched."""
Ryan Cui72834d12011-05-05 14:51:33 -0700206 output = _run_command(['git', 'show', '-p', '--no-ext-diff', commit, file])
Ryan Cuiec4d6332011-05-02 14:15:25 -0700207
208 new_lines = []
209 line_num = 0
210 for line in output.splitlines():
211 m = re.match(r'^@@ [0-9\,\+\-]+ \+([0-9]+)\,[0-9]+ @@', line)
212 if m:
213 line_num = int(m.groups(1)[0])
214 continue
215 if line.startswith('+') and not line.startswith('++'):
Jon Salz98255932012-08-18 14:48:02 +0800216 new_lines.append((line_num, _try_utf8_decode(line[1:])))
Ryan Cuiec4d6332011-05-02 14:15:25 -0700217 if not line.startswith('-'):
218 line_num += 1
219 return new_lines
220
Ryan Cui1562fb82011-05-09 11:01:31 -0700221
Ryan Cuiec4d6332011-05-02 14:15:25 -0700222def _get_affected_files(commit):
223 """Returns list of absolute filepaths that were modified/added."""
Ryan Cui72834d12011-05-05 14:51:33 -0700224 output = _run_command(['git', 'diff', '--name-status', commit + '^!'])
Ryan Cuiec4d6332011-05-02 14:15:25 -0700225 files = []
226 for statusline in output.splitlines():
227 m = re.match('^(\w)+\t(.+)$', statusline.rstrip())
228 # Ignore deleted files, and return absolute paths of files
229 if (m.group(1)[0] != 'D'):
230 pwd = os.getcwd()
231 files.append(os.path.join(pwd, m.group(2)))
232 return files
233
Ryan Cui1562fb82011-05-09 11:01:31 -0700234
Mandeep Singh Bainesb9ed1402011-04-29 15:32:06 -0700235def _get_commits():
Ryan Cuiec4d6332011-05-02 14:15:25 -0700236 """Returns a list of commits for this review."""
Ryan Cui4725d952011-05-05 15:41:19 -0700237 cmd = ['git', 'log', '%s..' % _get_upstream_branch(), '--format=%H']
Ryan Cui72834d12011-05-05 14:51:33 -0700238 return _run_command(cmd).split()
Mandeep Singh Bainesb9ed1402011-04-29 15:32:06 -0700239
Ryan Cui1562fb82011-05-09 11:01:31 -0700240
Ryan Cuiec4d6332011-05-02 14:15:25 -0700241def _get_commit_desc(commit):
242 """Returns the full commit message of a commit."""
Sean Paul23a2c582011-05-06 13:10:44 -0400243 return _run_command(['git', 'log', '--format=%s%n%n%b', commit + '^!'])
Ryan Cuiec4d6332011-05-02 14:15:25 -0700244
245
246# Common Hooks
247
Ryan Cui1562fb82011-05-09 11:01:31 -0700248
Ryan Cuiec4d6332011-05-02 14:15:25 -0700249def _check_no_long_lines(project, commit):
250 """Checks that there aren't any lines longer than maxlen characters in any of
251 the text files to be submitted.
252 """
253 MAX_LEN = 80
Jon Salz98255932012-08-18 14:48:02 +0800254 SKIP_REGEXP = re.compile('|'.join([
255 r'https?://',
256 r'^#\s*(define|include|import|pragma|if|endif)\b']))
Ryan Cuiec4d6332011-05-02 14:15:25 -0700257
258 errors = []
259 files = _filter_files(_get_affected_files(commit),
260 COMMON_INCLUDED_PATHS,
261 COMMON_EXCLUDED_PATHS)
262
263 for afile in files:
264 for line_num, line in _get_file_diff(afile, commit):
265 # Allow certain lines to exceed the maxlen rule.
Jon Salz98255932012-08-18 14:48:02 +0800266 if (len(line) <= MAX_LEN or SKIP_REGEXP.search(line)):
267 continue
268
269 errors.append('%s, line %s, %s chars' % (afile, line_num, len(line)))
270 if len(errors) == 5: # Just show the first 5 errors.
271 break
Ryan Cuiec4d6332011-05-02 14:15:25 -0700272
273 if errors:
274 msg = 'Found lines longer than %s characters (first 5 shown):' % MAX_LEN
Ryan Cui1562fb82011-05-09 11:01:31 -0700275 return HookFailure(msg, errors)
276
Ryan Cuiec4d6332011-05-02 14:15:25 -0700277
278def _check_no_stray_whitespace(project, commit):
279 """Checks that there is no stray whitespace at source lines end."""
280 errors = []
281 files = _filter_files(_get_affected_files(commit),
282 COMMON_INCLUDED_PATHS,
283 COMMON_EXCLUDED_PATHS)
284
285 for afile in files:
286 for line_num, line in _get_file_diff(afile, commit):
287 if line.rstrip() != line:
288 errors.append('%s, line %s' % (afile, line_num))
289 if errors:
Ryan Cui1562fb82011-05-09 11:01:31 -0700290 return HookFailure('Found line ending with white space in:', errors)
291
Ryan Cuiec4d6332011-05-02 14:15:25 -0700292
293def _check_no_tabs(project, commit):
294 """Checks there are no unexpanded tabs."""
295 TAB_OK_PATHS = [
Ryan Cui31e0c172011-05-04 21:00:45 -0700296 r"/src/third_party/u-boot/",
Ryan Cuiec4d6332011-05-02 14:15:25 -0700297 r".*\.ebuild$",
298 r".*\.eclass$",
Elly Jones5ab34192011-11-15 14:57:06 -0500299 r".*/[M|m]akefile$",
300 r".*\.mk$"
Ryan Cuiec4d6332011-05-02 14:15:25 -0700301 ]
302
303 errors = []
304 files = _filter_files(_get_affected_files(commit),
305 COMMON_INCLUDED_PATHS,
306 COMMON_EXCLUDED_PATHS + TAB_OK_PATHS)
307
308 for afile in files:
309 for line_num, line in _get_file_diff(afile, commit):
310 if '\t' in line:
311 errors.append('%s, line %s' % (afile, line_num))
312 if errors:
Ryan Cui1562fb82011-05-09 11:01:31 -0700313 return HookFailure('Found a tab character in:', errors)
314
Ryan Cuiec4d6332011-05-02 14:15:25 -0700315
316def _check_change_has_test_field(project, commit):
317 """Check for a non-empty 'TEST=' field in the commit message."""
David McMahon8f6553e2011-06-10 15:46:36 -0700318 TEST_RE = r'\nTEST=\S+'
Ryan Cuiec4d6332011-05-02 14:15:25 -0700319
Mandeep Singh Baines96a53be2011-05-03 11:10:25 -0700320 if not re.search(TEST_RE, _get_commit_desc(commit)):
Ryan Cui1562fb82011-05-09 11:01:31 -0700321 msg = 'Changelist description needs TEST field (after first line)'
322 return HookFailure(msg)
323
Ryan Cuiec4d6332011-05-02 14:15:25 -0700324
325def _check_change_has_bug_field(project, commit):
David McMahon8f6553e2011-06-10 15:46:36 -0700326 """Check for a correctly formatted 'BUG=' field in the commit message."""
Daniel Erat1f064642012-01-10 09:48:20 -0800327 BUG_RE = r'\nBUG=([Nn]one|(chrome-os-partner|chromium|chromium-os):\d+)'
Ryan Cuiec4d6332011-05-02 14:15:25 -0700328
Mandeep Singh Baines96a53be2011-05-03 11:10:25 -0700329 if not re.search(BUG_RE, _get_commit_desc(commit)):
David McMahon8f6553e2011-06-10 15:46:36 -0700330 msg = ('Changelist description needs BUG field (after first line):\n'
Daniel Erat1f064642012-01-10 09:48:20 -0800331 'BUG=chromium-os:9999 (for public tracker)\n'
David McMahon8f6553e2011-06-10 15:46:36 -0700332 'BUG=chrome-os-partner:9999 (for partner tracker)\n'
Daniel Erat1f064642012-01-10 09:48:20 -0800333 'BUG=chromium:9999 (for browser tracker)\n'
David McMahon8f6553e2011-06-10 15:46:36 -0700334 'BUG=None')
Ryan Cui1562fb82011-05-09 11:01:31 -0700335 return HookFailure(msg)
336
Ryan Cuiec4d6332011-05-02 14:15:25 -0700337
Mandeep Singh Bainesa23eb5f2011-05-04 13:43:25 -0700338def _check_change_has_proper_changeid(project, commit):
339 """Verify that Change-ID is present in last paragraph of commit message."""
340 desc = _get_commit_desc(commit)
341 loc = desc.rfind('\nChange-Id:')
342 if loc == -1 or re.search('\n\s*\n\s*\S+', desc[loc:]):
Ryan Cui1562fb82011-05-09 11:01:31 -0700343 return HookFailure('Change-Id must be in last paragraph of description.')
344
Mandeep Singh Bainesa23eb5f2011-05-04 13:43:25 -0700345
Ryan Cuiec4d6332011-05-02 14:15:25 -0700346def _check_license(project, commit):
347 """Verifies the license header."""
348 LICENSE_HEADER = (
David James28766e62012-08-06 17:30:15 -0700349 r".*? Copyright \(c\) 20[-0-9]{2,7} The Chromium OS Authors\. All rights "
Ryan Cuiec4d6332011-05-02 14:15:25 -0700350 r"reserved\." "\n"
351 r".*? Use of this source code is governed by a BSD-style license that can "
352 "be\n"
353 r".*? found in the LICENSE file\."
354 "\n"
355 )
David Hendricks35030d02013-02-04 17:49:16 -0800356 FAIL_MSG = "License must match"
Ryan Cuiec4d6332011-05-02 14:15:25 -0700357
David Hendricks35030d02013-02-04 17:49:16 -0800358 return _verify_header_content(commit, LICENSE_HEADER, FAIL_MSG)
Ryan Cuiec4d6332011-05-02 14:15:25 -0700359
360
David Hendricksa0e310d2013-02-04 17:51:55 -0800361def _check_google_copyright(project, commit):
362 """Verifies Google Inc. as copyright holder."""
363 LICENSE_HEADER = (
364 r".* Copyright 20[-0-9]{2,7} Google Inc\."
365 )
366 FAIL_MSG = "Copyright must match"
367
368 return _verify_header_content(commit, LICENSE_HEADER, FAIL_MSG)
369
370
Ryan Cuiec4d6332011-05-02 14:15:25 -0700371# Project-specific hooks
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700372
Ryan Cui1562fb82011-05-09 11:01:31 -0700373
Anton Staaf815d6852011-08-22 10:08:45 -0700374def _run_checkpatch(project, commit, options=[]):
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700375 """Runs checkpatch.pl on the given project"""
376 hooks_dir = _get_hooks_dir()
Anton Staaf815d6852011-08-22 10:08:45 -0700377 cmd = ['%s/checkpatch.pl' % hooks_dir] + options + ['-']
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700378 p = subprocess.Popen(cmd, stdin=subprocess.PIPE, stdout=subprocess.PIPE)
Mandeep Singh Bainesb9ed1402011-04-29 15:32:06 -0700379 output = p.communicate(_get_diff(commit))[0]
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700380 if p.returncode:
Ryan Cui1562fb82011-05-09 11:01:31 -0700381 return HookFailure('checkpatch.pl errors/warnings\n\n' + output)
Ryan Cuiec4d6332011-05-02 14:15:25 -0700382
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700383
Anton Staaf815d6852011-08-22 10:08:45 -0700384def _run_checkpatch_no_tree(project, commit):
385 return _run_checkpatch(project, commit, ['--no-tree'])
386
Olof Johanssona96810f2012-09-04 16:20:03 -0700387def _kernel_configcheck(project, commit):
388 """Makes sure kernel config changes are not mixed with code changes"""
389 files = _get_affected_files(commit)
390 if not len(_filter_files(files, [r'chromeos/config'])) in [0, len(files)]:
391 return HookFailure('Changes to chromeos/config/ and regular files must '
392 'be in separate commits:\n%s' % '\n'.join(files))
Anton Staaf815d6852011-08-22 10:08:45 -0700393
Dale Curtis2975c432011-05-03 17:25:20 -0700394def _run_json_check(project, commit):
395 """Checks that all JSON files are syntactically valid."""
Dale Curtisa039cfd2011-05-04 12:01:05 -0700396 for f in _filter_files(_get_affected_files(commit), [r'.*\.json']):
Dale Curtis2975c432011-05-03 17:25:20 -0700397 try:
398 json.load(open(f))
399 except Exception, e:
Ryan Cui1562fb82011-05-09 11:01:31 -0700400 return HookFailure('Invalid JSON in %s: %s' % (f, e))
Dale Curtis2975c432011-05-03 17:25:20 -0700401
402
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700403def _check_change_has_branch_field(project, commit):
404 """Check for a non-empty 'BRANCH=' field in the commit message."""
405 BRANCH_RE = r'\nBRANCH=\S+'
406
407 if not re.search(BRANCH_RE, _get_commit_desc(commit)):
408 msg = ('Changelist description needs BRANCH field (after first line)\n'
409 'E.g. BRANCH=none or BRANCH=link,snow')
410 return HookFailure(msg)
411
412
Jon Salz3ee59de2012-08-18 13:54:22 +0800413def _run_project_hook_script(script, project, commit):
414 """Runs a project hook script.
415
416 The script is run with the following environment variables set:
417 PRESUBMIT_PROJECT: The affected project
418 PRESUBMIT_COMMIT: The affected commit
419 PRESUBMIT_FILES: A newline-separated list of affected files
420
421 The script is considered to fail if the exit code is non-zero. It should
422 write an error message to stdout.
423 """
424 env = dict(os.environ)
425 env['PRESUBMIT_PROJECT'] = project
426 env['PRESUBMIT_COMMIT'] = commit
427
428 # Put affected files in an environment variable
429 files = _get_affected_files(commit)
430 env['PRESUBMIT_FILES'] = '\n'.join(files)
431
432 process = subprocess.Popen(script, env=env, shell=True,
433 stdin=open(os.devnull),
Jon Salz7b618af2012-08-31 06:03:16 +0800434 stdout=subprocess.PIPE,
435 stderr=subprocess.STDOUT)
Jon Salz3ee59de2012-08-18 13:54:22 +0800436 stdout, _ = process.communicate()
437 if process.wait():
Jon Salz7b618af2012-08-31 06:03:16 +0800438 if stdout:
439 stdout = re.sub('(?m)^', ' ', stdout)
440 return HookFailure('Hook script "%s" failed with code %d%s' %
Jon Salz3ee59de2012-08-18 13:54:22 +0800441 (script, process.returncode,
442 ':\n' + stdout if stdout else ''))
443
444
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700445# Base
446
Ryan Cui1562fb82011-05-09 11:01:31 -0700447
Ryan Cui9b651632011-05-11 11:38:58 -0700448# A list of hooks that are not project-specific
449_COMMON_HOOKS = [
450 _check_change_has_bug_field,
451 _check_change_has_test_field,
452 _check_change_has_proper_changeid,
453 _check_no_stray_whitespace,
454 _check_no_long_lines,
455 _check_license,
456 _check_no_tabs,
457]
Ryan Cuiec4d6332011-05-02 14:15:25 -0700458
Ryan Cui1562fb82011-05-09 11:01:31 -0700459
Ryan Cui9b651632011-05-11 11:38:58 -0700460# A dictionary of project-specific hooks(callbacks), indexed by project name.
461# dict[project] = [callback1, callback2]
462_PROJECT_SPECIFIC_HOOKS = {
Olof Johanssona96810f2012-09-04 16:20:03 -0700463 "chromiumos/third_party/kernel": [_run_checkpatch, _kernel_configcheck],
464 "chromiumos/third_party/kernel-next": [_run_checkpatch,
465 _kernel_configcheck],
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700466 "chromiumos/third_party/u-boot": [_run_checkpatch_no_tree,
467 _check_change_has_branch_field],
468 "chromiumos/platform/ec": [_run_checkpatch_no_tree,
469 _check_change_has_branch_field],
470 "chromeos/platform/ec-private": [_run_checkpatch_no_tree,
471 _check_change_has_branch_field],
472 "chromeos/third_party/coreboot": [_check_change_has_branch_field],
Puneet Kumar57b9c092012-08-14 18:58:29 -0700473 "chromeos/third_party/intel-framework": [_check_change_has_branch_field],
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700474 "chromiumos/platform/vboot_reference": [_check_change_has_branch_field],
475 "chromiumos/platform/mosys": [_check_change_has_branch_field],
476 "chromiumos/third_party/flashrom": [_check_change_has_branch_field],
Dale Curtis2975c432011-05-03 17:25:20 -0700477 "chromeos/autotest-tools": [_run_json_check],
Ryan Cui9b651632011-05-11 11:38:58 -0700478}
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700479
Ryan Cui1562fb82011-05-09 11:01:31 -0700480
Ryan Cui9b651632011-05-11 11:38:58 -0700481# A dictionary of flags (keys) that can appear in the config file, and the hook
482# that the flag disables (value)
483_DISABLE_FLAGS = {
484 'stray_whitespace_check': _check_no_stray_whitespace,
485 'long_line_check': _check_no_long_lines,
486 'cros_license_check': _check_license,
487 'tab_check': _check_no_tabs,
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700488 'branch_check': _check_change_has_branch_field,
Ryan Cui9b651632011-05-11 11:38:58 -0700489}
490
491
Jon Salz3ee59de2012-08-18 13:54:22 +0800492def _get_disabled_hooks(config):
Ryan Cui9b651632011-05-11 11:38:58 -0700493 """Returns a set of hooks disabled by the current project's config file.
494
495 Expects to be called within the project root.
Jon Salz3ee59de2012-08-18 13:54:22 +0800496
497 Args:
498 config: A ConfigParser for the project's config file.
Ryan Cui9b651632011-05-11 11:38:58 -0700499 """
500 SECTION = 'Hook Overrides'
Jon Salz3ee59de2012-08-18 13:54:22 +0800501 if not config.has_section(SECTION):
502 return set()
Ryan Cui9b651632011-05-11 11:38:58 -0700503
504 disable_flags = []
Jon Salz3ee59de2012-08-18 13:54:22 +0800505 for flag in config.options(SECTION):
Ryan Cui9b651632011-05-11 11:38:58 -0700506 try:
507 if not config.getboolean(SECTION, flag): disable_flags.append(flag)
508 except ValueError as e:
509 msg = "Error parsing flag \'%s\' in %s file - " % (flag, _CONFIG_FILE)
510 print msg + str(e)
511
512 disabled_keys = set(_DISABLE_FLAGS.iterkeys()).intersection(disable_flags)
513 return set([_DISABLE_FLAGS[key] for key in disabled_keys])
514
515
Jon Salz3ee59de2012-08-18 13:54:22 +0800516def _get_project_hook_scripts(config):
517 """Returns a list of project-specific hook scripts.
518
519 Args:
520 config: A ConfigParser for the project's config file.
521 """
522 SECTION = 'Hook Scripts'
523 if not config.has_section(SECTION):
524 return []
525
526 hook_names_values = config.items(SECTION)
527 hook_names_values.sort(key=lambda x: x[0])
528 return [x[1] for x in hook_names_values]
529
530
Ryan Cui9b651632011-05-11 11:38:58 -0700531def _get_project_hooks(project):
532 """Returns a list of hooks that need to be run for a project.
533
534 Expects to be called from within the project root.
535 """
Jon Salz3ee59de2012-08-18 13:54:22 +0800536 config = ConfigParser.RawConfigParser()
537 try:
538 config.read(_CONFIG_FILE)
539 except ConfigParser.Error:
540 # Just use an empty config file
541 config = ConfigParser.RawConfigParser()
542
543 disabled_hooks = _get_disabled_hooks(config)
Ryan Cui9b651632011-05-11 11:38:58 -0700544 hooks = [hook for hook in _COMMON_HOOKS if hook not in disabled_hooks]
545
546 if project in _PROJECT_SPECIFIC_HOOKS:
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700547 hooks.extend(hook for hook in _PROJECT_SPECIFIC_HOOKS[project]
548 if hook not in disabled_hooks)
Ryan Cui9b651632011-05-11 11:38:58 -0700549
Jon Salz3ee59de2012-08-18 13:54:22 +0800550 for script in _get_project_hook_scripts(config):
551 hooks.append(functools.partial(_run_project_hook_script, script))
552
Ryan Cui9b651632011-05-11 11:38:58 -0700553 return hooks
554
555
Doug Anderson44a644f2011-11-02 10:37:37 -0700556def _run_project_hooks(project, proj_dir=None):
Ryan Cui1562fb82011-05-09 11:01:31 -0700557 """For each project run its project specific hook from the hooks dictionary.
558
559 Args:
Doug Anderson44a644f2011-11-02 10:37:37 -0700560 project: The name of project to run hooks for.
561 proj_dir: If non-None, this is the directory the project is in. If None,
562 we'll ask repo.
Ryan Cui1562fb82011-05-09 11:01:31 -0700563
564 Returns:
565 Boolean value of whether any errors were ecountered while running the hooks.
566 """
Doug Anderson44a644f2011-11-02 10:37:37 -0700567 if proj_dir is None:
568 proj_dir = _run_command(['repo', 'forall', project, '-c', 'pwd']).strip()
569
Ryan Cuiec4d6332011-05-02 14:15:25 -0700570 pwd = os.getcwd()
571 # hooks assume they are run from the root of the project
572 os.chdir(proj_dir)
573
Ryan Cuifa55df52011-05-06 11:16:55 -0700574 try:
575 commit_list = _get_commits()
Don Garrettdba548a2011-05-05 15:17:14 -0700576 except VerifyException as e:
Ryan Cui1562fb82011-05-09 11:01:31 -0700577 PrintErrorForProject(project, HookFailure(str(e)))
578 os.chdir(pwd)
579 return True
Ryan Cuifa55df52011-05-06 11:16:55 -0700580
Ryan Cui9b651632011-05-11 11:38:58 -0700581 hooks = _get_project_hooks(project)
Ryan Cui1562fb82011-05-09 11:01:31 -0700582 error_found = False
Ryan Cuifa55df52011-05-06 11:16:55 -0700583 for commit in commit_list:
Ryan Cui1562fb82011-05-09 11:01:31 -0700584 error_list = []
Ryan Cui9b651632011-05-11 11:38:58 -0700585 for hook in hooks:
Ryan Cui1562fb82011-05-09 11:01:31 -0700586 hook_error = hook(project, commit)
587 if hook_error:
588 error_list.append(hook_error)
589 error_found = True
590 if error_list:
591 PrintErrorsForCommit(project, commit, _get_commit_desc(commit),
592 error_list)
Don Garrettdba548a2011-05-05 15:17:14 -0700593
Ryan Cuiec4d6332011-05-02 14:15:25 -0700594 os.chdir(pwd)
Ryan Cui1562fb82011-05-09 11:01:31 -0700595 return error_found
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700596
597# Main
Mandeep Singh Baines69e470e2011-04-06 10:34:52 -0700598
Ryan Cui1562fb82011-05-09 11:01:31 -0700599
Anush Elangovan63afad72011-03-23 00:41:27 -0700600def main(project_list, **kwargs):
Doug Anderson06456632012-01-05 11:02:14 -0800601 """Main function invoked directly by repo.
602
603 This function will exit directly upon error so that repo doesn't print some
604 obscure error message.
605
606 Args:
607 project_list: List of projects to run on.
608 kwargs: Leave this here for forward-compatibility.
609 """
Ryan Cui1562fb82011-05-09 11:01:31 -0700610 found_error = False
611 for project in project_list:
Ryan Cui9b651632011-05-11 11:38:58 -0700612 if _run_project_hooks(project):
Ryan Cui1562fb82011-05-09 11:01:31 -0700613 found_error = True
614
615 if (found_error):
616 msg = ('Preupload failed due to errors in project(s). HINTS:\n'
Ryan Cui9b651632011-05-11 11:38:58 -0700617 '- To disable some source style checks, and for other hints, see '
618 '<checkout_dir>/src/repohooks/README\n'
619 '- To upload only current project, run \'repo upload .\'')
Ryan Cui1562fb82011-05-09 11:01:31 -0700620 print >> sys.stderr, msg
Don Garrettdba548a2011-05-05 15:17:14 -0700621 sys.exit(1)
Anush Elangovan63afad72011-03-23 00:41:27 -0700622
Ryan Cui1562fb82011-05-09 11:01:31 -0700623
Doug Anderson44a644f2011-11-02 10:37:37 -0700624def _identify_project(path):
625 """Identify the repo project associated with the given path.
626
627 Returns:
628 A string indicating what project is associated with the path passed in or
629 a blank string upon failure.
630 """
631 return _run_command(['repo', 'forall', '.', '-c', 'echo ${REPO_PROJECT}'],
632 stderr=subprocess.PIPE, cwd=path).strip()
633
634
635def direct_main(args, verbose=False):
636 """Run hooks directly (outside of the context of repo).
637
638 # Setup for doctests below.
639 # ...note that some tests assume that running pre-upload on this CWD is fine.
640 # TODO: Use mock and actually mock out _run_project_hooks() for tests.
641 >>> mydir = os.path.dirname(os.path.abspath(__file__))
642 >>> olddir = os.getcwd()
643
644 # OK to run w/ no arugments; will run with CWD.
645 >>> os.chdir(mydir)
646 >>> direct_main(['prog_name'], verbose=True)
647 Running hooks on chromiumos/repohooks
648 0
649 >>> os.chdir(olddir)
650
651 # Run specifying a dir
652 >>> direct_main(['prog_name', '--dir=%s' % mydir], verbose=True)
653 Running hooks on chromiumos/repohooks
654 0
655
656 # Not a problem to use a bogus project; we'll just get default settings.
657 >>> direct_main(['prog_name', '--dir=%s' % mydir, '--project=X'],verbose=True)
658 Running hooks on X
659 0
660
661 # Run with project but no dir
662 >>> os.chdir(mydir)
663 >>> direct_main(['prog_name', '--project=X'], verbose=True)
664 Running hooks on X
665 0
666 >>> os.chdir(olddir)
667
668 # Try with a non-git CWD
669 >>> os.chdir('/tmp')
670 >>> direct_main(['prog_name'])
671 Traceback (most recent call last):
672 ...
673 BadInvocation: The current directory is not part of a git project.
674
675 # Check various bad arguments...
676 >>> direct_main(['prog_name', 'bogus'])
677 Traceback (most recent call last):
678 ...
679 BadInvocation: Unexpected arguments: bogus
680 >>> direct_main(['prog_name', '--project=bogus', '--dir=bogusdir'])
681 Traceback (most recent call last):
682 ...
683 BadInvocation: Invalid dir: bogusdir
684 >>> direct_main(['prog_name', '--project=bogus', '--dir=/tmp'])
685 Traceback (most recent call last):
686 ...
687 BadInvocation: Not a git directory: /tmp
688
689 Args:
690 args: The value of sys.argv
691
692 Returns:
693 0 if no pre-upload failures, 1 if failures.
694
695 Raises:
696 BadInvocation: On some types of invocation errors.
697 """
698 desc = 'Run Chromium OS pre-upload hooks on changes compared to upstream.'
699 parser = optparse.OptionParser(description=desc)
700
701 parser.add_option('--dir', default=None,
702 help='The directory that the project lives in. If not '
703 'specified, use the git project root based on the cwd.')
704 parser.add_option('--project', default=None,
705 help='The project repo path; this can affect how the hooks '
706 'get run, since some hooks are project-specific. For '
707 'chromite this is chromiumos/chromite. If not specified, '
708 'the repo tool will be used to figure this out based on '
709 'the dir.')
710
711 opts, args = parser.parse_args(args[1:])
712
713 if args:
714 raise BadInvocation('Unexpected arguments: %s' % ' '.join(args))
715
716 # Check/normlaize git dir; if unspecified, we'll use the root of the git
717 # project from CWD
718 if opts.dir is None:
719 git_dir = _run_command(['git', 'rev-parse', '--git-dir'],
720 stderr=subprocess.PIPE).strip()
721 if not git_dir:
722 raise BadInvocation('The current directory is not part of a git project.')
723 opts.dir = os.path.dirname(os.path.abspath(git_dir))
724 elif not os.path.isdir(opts.dir):
725 raise BadInvocation('Invalid dir: %s' % opts.dir)
726 elif not os.path.isdir(os.path.join(opts.dir, '.git')):
727 raise BadInvocation('Not a git directory: %s' % opts.dir)
728
729 # Identify the project if it wasn't specified; this _requires_ the repo
730 # tool to be installed and for the project to be part of a repo checkout.
731 if not opts.project:
732 opts.project = _identify_project(opts.dir)
733 if not opts.project:
734 raise BadInvocation("Repo couldn't identify the project of %s" % opts.dir)
735
736 if verbose:
737 print "Running hooks on %s" % (opts.project)
738
739 found_error = _run_project_hooks(opts.project, proj_dir=opts.dir)
740 if found_error:
741 return 1
742 return 0
743
744
745def _test():
746 """Run any built-in tests."""
747 import doctest
748 doctest.testmod()
749
750
Mandeep Singh Baines69e470e2011-04-06 10:34:52 -0700751if __name__ == '__main__':
Doug Anderson44a644f2011-11-02 10:37:37 -0700752 if sys.argv[1:2] == ["--test"]:
753 _test()
754 exit_code = 0
755 else:
756 prog_name = os.path.basename(sys.argv[0])
757 try:
758 exit_code = direct_main(sys.argv)
759 except BadInvocation, e:
760 print >>sys.stderr, "%s: %s" % (prog_name, str(e))
761 exit_code = 1
762 sys.exit(exit_code)