blob: 6f38310d8e39222ca482d6f352bae4e2e1998bef [file] [log] [blame]
Doug Anderson44a644f2011-11-02 10:37:37 -07001#!/usr/bin/env python
Jon Salz98255932012-08-18 14:48:02 +08002# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Mandeep Singh Baines116ad102011-04-27 15:16:37 -07003# Use of this source code is governed by a BSD-style license that can be
4# found in the LICENSE file.
5
Mike Frysingerae409522014-02-01 03:16:11 -05006"""Presubmit checks to run when doing `repo upload`.
7
8You can add new checks by adding a functions to the HOOKS constants.
9"""
10
Mike Frysinger09d6a3d2013-10-08 22:21:03 -040011from __future__ import print_function
12
Ryan Cui9b651632011-05-11 11:38:58 -070013import ConfigParser
Jon Salz3ee59de2012-08-18 13:54:22 +080014import functools
Dale Curtis2975c432011-05-03 17:25:20 -070015import json
Doug Anderson44a644f2011-11-02 10:37:37 -070016import optparse
Mandeep Singh Baines116ad102011-04-27 15:16:37 -070017import os
Ryan Cuiec4d6332011-05-02 14:15:25 -070018import re
David Hendricks4c018e72013-02-06 13:46:38 -080019import socket
Mandeep Singh Bainesa7ffa4b2011-05-03 11:37:02 -070020import sys
Mandeep Singh Baines116ad102011-04-27 15:16:37 -070021import subprocess
22
Ryan Cui1562fb82011-05-09 11:01:31 -070023from errors import (VerifyException, HookFailure, PrintErrorForProject,
24 PrintErrorsForCommit)
Ryan Cuiec4d6332011-05-02 14:15:25 -070025
David Jamesc3b68b32013-04-03 09:17:03 -070026# If repo imports us, the __name__ will be __builtin__, and the wrapper will
27# be in $CHROMEOS_CHECKOUT/.repo/repo/main.py, so we need to go two directories
28# up. The same logic also happens to work if we're executed directly.
29if __name__ in ('__builtin__', '__main__'):
30 sys.path.insert(0, os.path.join(os.path.dirname(sys.argv[0]), '..', '..'))
31
32from chromite.lib import patch
Yu-Ju Hong5e0efa72013-11-19 16:28:10 -080033from chromite.licensing import licenses
David Jamesc3b68b32013-04-03 09:17:03 -070034
Ryan Cuiec4d6332011-05-02 14:15:25 -070035
36COMMON_INCLUDED_PATHS = [
Mike Frysingerae409522014-02-01 03:16:11 -050037 # C++ and friends
38 r".*\.c$", r".*\.cc$", r".*\.cpp$", r".*\.h$", r".*\.m$", r".*\.mm$",
39 r".*\.inl$", r".*\.asm$", r".*\.hxx$", r".*\.hpp$", r".*\.s$", r".*\.S$",
40 # Scripts
41 r".*\.js$", r".*\.py$", r".*\.sh$", r".*\.rb$", r".*\.pl$", r".*\.pm$",
42 # No extension at all, note that ALL CAPS files are black listed in
43 # COMMON_EXCLUDED_LIST below.
44 r"(^|.*[\\\/])[^.]+$",
45 # Other
46 r".*\.java$", r".*\.mk$", r".*\.am$",
Ryan Cuiec4d6332011-05-02 14:15:25 -070047]
48
Ryan Cui1562fb82011-05-09 11:01:31 -070049
Ryan Cuiec4d6332011-05-02 14:15:25 -070050COMMON_EXCLUDED_PATHS = [
Mike Frysingerae409522014-02-01 03:16:11 -050051 # avoid doing source file checks for kernel
52 r"/src/third_party/kernel/",
53 r"/src/third_party/kernel-next/",
54 r"/src/third_party/ktop/",
55 r"/src/third_party/punybench/",
56 r".*\bexperimental[\\\/].*",
57 r".*\b[A-Z0-9_]{2,}$",
58 r".*[\\\/]debian[\\\/]rules$",
59 # for ebuild trees, ignore any caches and manifest data
60 r".*/Manifest$",
61 r".*/metadata/[^/]*cache[^/]*/[^/]+/[^/]+$",
Doug Anderson5bfb6792011-10-25 16:45:41 -070062
Mike Frysingerae409522014-02-01 03:16:11 -050063 # ignore profiles data (like overlay-tegra2/profiles)
64 r".*/overlay-.*/profiles/.*",
65 # ignore minified js and jquery
66 r".*\.min\.js",
67 r".*jquery.*\.js",
Ryan Cuiec4d6332011-05-02 14:15:25 -070068]
Mandeep Singh Baines116ad102011-04-27 15:16:37 -070069
Ryan Cui1562fb82011-05-09 11:01:31 -070070
Ryan Cui9b651632011-05-11 11:38:58 -070071_CONFIG_FILE = 'PRESUBMIT.cfg'
72
73
Doug Anderson44a644f2011-11-02 10:37:37 -070074# Exceptions
75
76
77class BadInvocation(Exception):
78 """An Exception indicating a bad invocation of the program."""
79 pass
80
81
Ryan Cui1562fb82011-05-09 11:01:31 -070082# General Helpers
83
Sean Paulba01d402011-05-05 11:36:23 -040084
Doug Anderson44a644f2011-11-02 10:37:37 -070085def _run_command(cmd, cwd=None, stderr=None):
86 """Executes the passed in command and returns raw stdout output.
87
88 Args:
89 cmd: The command to run; should be a list of strings.
90 cwd: The directory to switch to for running the command.
91 stderr: Can be one of None (print stderr to console), subprocess.STDOUT
92 (combine stderr with stdout), or subprocess.PIPE (ignore stderr).
93
94 Returns:
95 The standard out from the process.
96 """
97 p = subprocess.Popen(cmd, stdout=subprocess.PIPE, stderr=stderr, cwd=cwd)
98 return p.communicate()[0]
Ryan Cui72834d12011-05-05 14:51:33 -070099
Ryan Cui1562fb82011-05-09 11:01:31 -0700100
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700101def _get_hooks_dir():
Ryan Cuiec4d6332011-05-02 14:15:25 -0700102 """Returns the absolute path to the repohooks directory."""
Doug Anderson44a644f2011-11-02 10:37:37 -0700103 if __name__ == '__main__':
104 # Works when file is run on its own (__file__ is defined)...
105 return os.path.abspath(os.path.dirname(__file__))
106 else:
107 # We need to do this when we're run through repo. Since repo executes
108 # us with execfile(), we don't get __file__ defined.
109 cmd = ['repo', 'forall', 'chromiumos/repohooks', '-c', 'pwd']
110 return _run_command(cmd).strip()
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700111
Ryan Cui1562fb82011-05-09 11:01:31 -0700112
Ryan Cuiec4d6332011-05-02 14:15:25 -0700113def _match_regex_list(subject, expressions):
114 """Try to match a list of regular expressions to a string.
115
116 Args:
117 subject: The string to match regexes on
118 expressions: A list of regular expressions to check for matches with.
119
120 Returns:
121 Whether the passed in subject matches any of the passed in regexes.
122 """
123 for expr in expressions:
Mike Frysingerae409522014-02-01 03:16:11 -0500124 if re.search(expr, subject):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700125 return True
126 return False
127
Ryan Cui1562fb82011-05-09 11:01:31 -0700128
Mike Frysingerae409522014-02-01 03:16:11 -0500129def _filter_files(files, include_list, exclude_list=()):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700130 """Filter out files based on the conditions passed in.
131
132 Args:
133 files: list of filepaths to filter
134 include_list: list of regex that when matched with a file path will cause it
135 to be added to the output list unless the file is also matched with a
136 regex in the exclude_list.
137 exclude_list: list of regex that when matched with a file will prevent it
138 from being added to the output list, even if it is also matched with a
139 regex in the include_list.
140
141 Returns:
142 A list of filepaths that contain files matched in the include_list and not
143 in the exclude_list.
144 """
145 filtered = []
146 for f in files:
147 if (_match_regex_list(f, include_list) and
148 not _match_regex_list(f, exclude_list)):
149 filtered.append(f)
150 return filtered
151
Ryan Cuiec4d6332011-05-02 14:15:25 -0700152
David Hendricks35030d02013-02-04 17:49:16 -0800153def _verify_header_content(commit, content, fail_msg):
154 """Verify that file headers contain specified content.
155
156 Args:
157 commit: the affected commit.
158 content: the content of the header to be verified.
159 fail_msg: the first message to display in case of failure.
160
161 Returns:
162 The return value of HookFailure().
163 """
164 license_re = re.compile(content, re.MULTILINE)
165 bad_files = []
166 files = _filter_files(_get_affected_files(commit),
167 COMMON_INCLUDED_PATHS,
168 COMMON_EXCLUDED_PATHS)
169
170 for f in files:
Mike Frysingerae409522014-02-01 03:16:11 -0500171 # Ignore non-existant files
172 if os.path.exists(f):
Gabe Blackcf3c32c2013-02-27 00:26:13 -0800173 contents = open(f).read()
Mike Frysingerae409522014-02-01 03:16:11 -0500174 if not contents:
175 # Ignore empty files
176 continue
Gabe Blackcf3c32c2013-02-27 00:26:13 -0800177 if not license_re.search(contents):
178 bad_files.append(f)
David Hendricks35030d02013-02-04 17:49:16 -0800179 if bad_files:
Mike Frysingerae409522014-02-01 03:16:11 -0500180 msg = "%s:\n%s\n%s" % (fail_msg, license_re.pattern,
181 "Found a bad header in these files:")
182 return HookFailure(msg, bad_files)
David Hendricks35030d02013-02-04 17:49:16 -0800183
184
Ryan Cuiec4d6332011-05-02 14:15:25 -0700185# Git Helpers
Ryan Cui1562fb82011-05-09 11:01:31 -0700186
187
Ryan Cui4725d952011-05-05 15:41:19 -0700188def _get_upstream_branch():
189 """Returns the upstream tracking branch of the current branch.
190
191 Raises:
192 Error if there is no tracking branch
193 """
194 current_branch = _run_command(['git', 'symbolic-ref', 'HEAD']).strip()
195 current_branch = current_branch.replace('refs/heads/', '')
196 if not current_branch:
Ryan Cui1562fb82011-05-09 11:01:31 -0700197 raise VerifyException('Need to be on a tracking branch')
Ryan Cui4725d952011-05-05 15:41:19 -0700198
199 cfg_option = 'branch.' + current_branch + '.%s'
200 full_upstream = _run_command(['git', 'config', cfg_option % 'merge']).strip()
201 remote = _run_command(['git', 'config', cfg_option % 'remote']).strip()
202 if not remote or not full_upstream:
Ryan Cui1562fb82011-05-09 11:01:31 -0700203 raise VerifyException('Need to be on a tracking branch')
Ryan Cui4725d952011-05-05 15:41:19 -0700204
205 return full_upstream.replace('heads', 'remotes/' + remote)
206
Ryan Cui1562fb82011-05-09 11:01:31 -0700207
Che-Liang Chiou5ce2d7b2013-03-22 18:47:55 -0700208def _get_patch(commit):
209 """Returns the patch for this commit."""
210 return _run_command(['git', 'format-patch', '--stdout', '-1', commit])
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700211
Ryan Cui1562fb82011-05-09 11:01:31 -0700212
Jon Salz98255932012-08-18 14:48:02 +0800213def _try_utf8_decode(data):
214 """Attempts to decode a string as UTF-8.
215
216 Returns:
217 The decoded Unicode object, or the original string if parsing fails.
218 """
219 try:
220 return unicode(data, 'utf-8', 'strict')
221 except UnicodeDecodeError:
222 return data
223
224
Mike Frysingerbf8b91c2014-02-01 02:50:27 -0500225def _get_file_content(path, commit):
226 """Returns the content of a file at a specific commit.
227
228 We can't rely on the file as it exists in the filesystem as people might be
229 uploading a series of changes which modifies the file multiple times.
230
231 Note: The "content" of a symlink is just the target. So if you're expecting
232 a full file, you should check that first. One way to detect is that the
233 content will not have any newlines.
234 """
235 return _run_command(['git', 'show', '%s:%s' % (commit, path)])
236
237
Mike Frysingerae409522014-02-01 03:16:11 -0500238def _get_file_diff(path, commit):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700239 """Returns a list of (linenum, lines) tuples that the commit touched."""
Mike Frysinger5122a1f2014-02-01 02:47:35 -0500240 output = _run_command(['git', 'show', '-p', '--pretty=format:',
Mike Frysingerae409522014-02-01 03:16:11 -0500241 '--no-ext-diff', commit, path])
Ryan Cuiec4d6332011-05-02 14:15:25 -0700242
243 new_lines = []
244 line_num = 0
245 for line in output.splitlines():
246 m = re.match(r'^@@ [0-9\,\+\-]+ \+([0-9]+)\,[0-9]+ @@', line)
247 if m:
248 line_num = int(m.groups(1)[0])
249 continue
250 if line.startswith('+') and not line.startswith('++'):
Jon Salz98255932012-08-18 14:48:02 +0800251 new_lines.append((line_num, _try_utf8_decode(line[1:])))
Ryan Cuiec4d6332011-05-02 14:15:25 -0700252 if not line.startswith('-'):
253 line_num += 1
254 return new_lines
255
Ryan Cui1562fb82011-05-09 11:01:31 -0700256
Mike Frysingerbf8b91c2014-02-01 02:50:27 -0500257def _get_affected_files(commit, include_deletes=False, relative=False):
Doug Anderson42b8a052013-06-26 10:45:36 -0700258 """Returns list of absolute filepaths that were modified/added.
259
260 Args:
261 commit: The commit
262 include_deletes: If true we'll include delete in the list.
Mike Frysingerbf8b91c2014-02-01 02:50:27 -0500263 relative: Whether to return full paths to files.
Doug Anderson42b8a052013-06-26 10:45:36 -0700264
265 Returns:
266 A list of modified/added (and perhaps deleted) files
267 """
Ryan Cui72834d12011-05-05 14:51:33 -0700268 output = _run_command(['git', 'diff', '--name-status', commit + '^!'])
Ryan Cuiec4d6332011-05-02 14:15:25 -0700269 files = []
270 for statusline in output.splitlines():
271 m = re.match('^(\w)+\t(.+)$', statusline.rstrip())
272 # Ignore deleted files, and return absolute paths of files
Mike Frysingerae409522014-02-01 03:16:11 -0500273 if include_deletes or m.group(1)[0] != 'D':
Mike Frysingerbf8b91c2014-02-01 02:50:27 -0500274 f = m.group(2)
275 if not relative:
276 pwd = os.getcwd()
277 f = os.path.join(pwd, f)
278 files.append(f)
Ryan Cuiec4d6332011-05-02 14:15:25 -0700279 return files
280
Ryan Cui1562fb82011-05-09 11:01:31 -0700281
Mandeep Singh Bainesb9ed1402011-04-29 15:32:06 -0700282def _get_commits():
Ryan Cuiec4d6332011-05-02 14:15:25 -0700283 """Returns a list of commits for this review."""
Ryan Cui4725d952011-05-05 15:41:19 -0700284 cmd = ['git', 'log', '%s..' % _get_upstream_branch(), '--format=%H']
Ryan Cui72834d12011-05-05 14:51:33 -0700285 return _run_command(cmd).split()
Mandeep Singh Bainesb9ed1402011-04-29 15:32:06 -0700286
Ryan Cui1562fb82011-05-09 11:01:31 -0700287
Ryan Cuiec4d6332011-05-02 14:15:25 -0700288def _get_commit_desc(commit):
289 """Returns the full commit message of a commit."""
Sean Paul23a2c582011-05-06 13:10:44 -0400290 return _run_command(['git', 'log', '--format=%s%n%n%b', commit + '^!'])
Ryan Cuiec4d6332011-05-02 14:15:25 -0700291
292
293# Common Hooks
294
Ryan Cui1562fb82011-05-09 11:01:31 -0700295
Mike Frysingerae409522014-02-01 03:16:11 -0500296def _check_no_long_lines(_project, commit):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700297 """Checks that there aren't any lines longer than maxlen characters in any of
298 the text files to be submitted.
299 """
300 MAX_LEN = 80
Jon Salz98255932012-08-18 14:48:02 +0800301 SKIP_REGEXP = re.compile('|'.join([
302 r'https?://',
303 r'^#\s*(define|include|import|pragma|if|endif)\b']))
Ryan Cuiec4d6332011-05-02 14:15:25 -0700304
305 errors = []
306 files = _filter_files(_get_affected_files(commit),
307 COMMON_INCLUDED_PATHS,
308 COMMON_EXCLUDED_PATHS)
309
310 for afile in files:
311 for line_num, line in _get_file_diff(afile, commit):
312 # Allow certain lines to exceed the maxlen rule.
Mike Frysingerae409522014-02-01 03:16:11 -0500313 if len(line) <= MAX_LEN or SKIP_REGEXP.search(line):
Jon Salz98255932012-08-18 14:48:02 +0800314 continue
315
316 errors.append('%s, line %s, %s chars' % (afile, line_num, len(line)))
317 if len(errors) == 5: # Just show the first 5 errors.
318 break
Ryan Cuiec4d6332011-05-02 14:15:25 -0700319
320 if errors:
321 msg = 'Found lines longer than %s characters (first 5 shown):' % MAX_LEN
Ryan Cui1562fb82011-05-09 11:01:31 -0700322 return HookFailure(msg, errors)
323
Ryan Cuiec4d6332011-05-02 14:15:25 -0700324
Mike Frysingerae409522014-02-01 03:16:11 -0500325def _check_no_stray_whitespace(_project, commit):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700326 """Checks that there is no stray whitespace at source lines end."""
327 errors = []
328 files = _filter_files(_get_affected_files(commit),
Mike Frysingerae409522014-02-01 03:16:11 -0500329 COMMON_INCLUDED_PATHS,
330 COMMON_EXCLUDED_PATHS)
Ryan Cuiec4d6332011-05-02 14:15:25 -0700331
332 for afile in files:
333 for line_num, line in _get_file_diff(afile, commit):
334 if line.rstrip() != line:
335 errors.append('%s, line %s' % (afile, line_num))
336 if errors:
Ryan Cui1562fb82011-05-09 11:01:31 -0700337 return HookFailure('Found line ending with white space in:', errors)
338
Ryan Cuiec4d6332011-05-02 14:15:25 -0700339
Mike Frysingerae409522014-02-01 03:16:11 -0500340def _check_no_tabs(_project, commit):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700341 """Checks there are no unexpanded tabs."""
342 TAB_OK_PATHS = [
Ryan Cui31e0c172011-05-04 21:00:45 -0700343 r"/src/third_party/u-boot/",
Ryan Cuiec4d6332011-05-02 14:15:25 -0700344 r".*\.ebuild$",
345 r".*\.eclass$",
Elly Jones5ab34192011-11-15 14:57:06 -0500346 r".*/[M|m]akefile$",
347 r".*\.mk$"
Ryan Cuiec4d6332011-05-02 14:15:25 -0700348 ]
349
350 errors = []
351 files = _filter_files(_get_affected_files(commit),
352 COMMON_INCLUDED_PATHS,
353 COMMON_EXCLUDED_PATHS + TAB_OK_PATHS)
354
355 for afile in files:
356 for line_num, line in _get_file_diff(afile, commit):
357 if '\t' in line:
Mike Frysingerae409522014-02-01 03:16:11 -0500358 errors.append('%s, line %s' % (afile, line_num))
Ryan Cuiec4d6332011-05-02 14:15:25 -0700359 if errors:
Ryan Cui1562fb82011-05-09 11:01:31 -0700360 return HookFailure('Found a tab character in:', errors)
361
Ryan Cuiec4d6332011-05-02 14:15:25 -0700362
Mike Frysingerae409522014-02-01 03:16:11 -0500363def _check_change_has_test_field(_project, commit):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700364 """Check for a non-empty 'TEST=' field in the commit message."""
David McMahon8f6553e2011-06-10 15:46:36 -0700365 TEST_RE = r'\nTEST=\S+'
Ryan Cuiec4d6332011-05-02 14:15:25 -0700366
Mandeep Singh Baines96a53be2011-05-03 11:10:25 -0700367 if not re.search(TEST_RE, _get_commit_desc(commit)):
Ryan Cui1562fb82011-05-09 11:01:31 -0700368 msg = 'Changelist description needs TEST field (after first line)'
369 return HookFailure(msg)
370
Ryan Cuiec4d6332011-05-02 14:15:25 -0700371
Mike Frysingerae409522014-02-01 03:16:11 -0500372def _check_change_has_valid_cq_depend(_project, commit):
David Jamesc3b68b32013-04-03 09:17:03 -0700373 """Check for a correctly formatted CQ-DEPEND field in the commit message."""
374 msg = 'Changelist has invalid CQ-DEPEND target.'
375 example = 'Example: CQ-DEPEND=CL:1234, CL:2345'
376 try:
377 patch.GetPaladinDeps(_get_commit_desc(commit))
378 except ValueError as ex:
379 return HookFailure(msg, [example, str(ex)])
380
381
Mike Frysingerae409522014-02-01 03:16:11 -0500382def _check_change_has_bug_field(_project, commit):
David McMahon8f6553e2011-06-10 15:46:36 -0700383 """Check for a correctly formatted 'BUG=' field in the commit message."""
David James5c0073d2013-04-03 08:48:52 -0700384 OLD_BUG_RE = r'\nBUG=.*chromium-os'
385 if re.search(OLD_BUG_RE, _get_commit_desc(commit)):
386 msg = ('The chromium-os bug tracker is now deprecated. Please use\n'
387 'the chromium tracker in your BUG= line now.')
388 return HookFailure(msg)
Ryan Cuiec4d6332011-05-02 14:15:25 -0700389
David James5c0073d2013-04-03 08:48:52 -0700390 BUG_RE = r'\nBUG=([Nn]one|(chrome-os-partner|chromium):\d+)'
Mandeep Singh Baines96a53be2011-05-03 11:10:25 -0700391 if not re.search(BUG_RE, _get_commit_desc(commit)):
David McMahon8f6553e2011-06-10 15:46:36 -0700392 msg = ('Changelist description needs BUG field (after first line):\n'
David James5c0073d2013-04-03 08:48:52 -0700393 'BUG=chromium:9999 (for public tracker)\n'
David McMahon8f6553e2011-06-10 15:46:36 -0700394 'BUG=chrome-os-partner:9999 (for partner tracker)\n'
395 'BUG=None')
Ryan Cui1562fb82011-05-09 11:01:31 -0700396 return HookFailure(msg)
397
Ryan Cuiec4d6332011-05-02 14:15:25 -0700398
Doug Anderson42b8a052013-06-26 10:45:36 -0700399def _check_for_uprev(project, commit):
400 """Check that we're not missing a revbump of an ebuild in the given commit.
401
402 If the given commit touches files in a directory that has ebuilds somewhere
403 up the directory hierarchy, it's very likely that we need an ebuild revbump
404 in order for those changes to take effect.
405
406 It's not totally trivial to detect a revbump, so at least detect that an
407 ebuild with a revision number in it was touched. This should handle the
408 common case where we use a symlink to do the revbump.
409
410 TODO: it would be nice to enhance this hook to:
411 * Handle cases where people revbump with a slightly different syntax. I see
412 one ebuild (puppy) that revbumps with _pN. This is a false positive.
413 * Catches cases where people aren't using symlinks for revbumps. If they
414 edit a revisioned file directly (and are expected to rename it for revbump)
415 we'll miss that. Perhaps we could detect that the file touched is a
416 symlink?
417
418 If a project doesn't use symlinks we'll potentially miss a revbump, but we're
419 still better off than without this check.
420
421 Args:
422 project: The project to look at
423 commit: The commit to look at
424
425 Returns:
426 A HookFailure or None.
427 """
Mike Frysinger011af942014-01-17 16:12:22 -0500428 # If this is the portage-stable overlay, then ignore the check. It's rare
429 # that we're doing anything other than importing files from upstream, so
430 # forcing a rev bump makes no sense.
431 whitelist = (
432 'chromiumos/overlays/portage-stable',
433 )
434 if project in whitelist:
435 return None
436
Doug Anderson42b8a052013-06-26 10:45:36 -0700437 affected_paths = _get_affected_files(commit, include_deletes=True)
438
439 # Don't yell about changes to whitelisted files...
Mike Frysinger011af942014-01-17 16:12:22 -0500440 whitelist = ('ChangeLog', 'Manifest', 'metadata.xml')
Doug Anderson42b8a052013-06-26 10:45:36 -0700441 affected_paths = [path for path in affected_paths
442 if os.path.basename(path) not in whitelist]
443 if not affected_paths:
444 return None
445
446 # If we've touched any file named with a -rN.ebuild then we'll say we're
447 # OK right away. See TODO above about enhancing this.
448 touched_revved_ebuild = any(re.search(r'-r\d*\.ebuild$', path)
449 for path in affected_paths)
450 if touched_revved_ebuild:
451 return None
452
453 # We want to examine the current contents of all directories that are parents
454 # of files that were touched (up to the top of the project).
455 #
456 # ...note: we use the current directory contents even though it may have
457 # changed since the commit we're looking at. This is just a heuristic after
458 # all. Worst case we don't flag a missing revbump.
459 project_top = os.getcwd()
460 dirs_to_check = set([project_top])
461 for path in affected_paths:
462 path = os.path.dirname(path)
463 while os.path.exists(path) and not os.path.samefile(path, project_top):
464 dirs_to_check.add(path)
465 path = os.path.dirname(path)
466
467 # Look through each directory. If it's got an ebuild in it then we'll
468 # consider this as a case when we need a revbump.
469 for dir_path in dirs_to_check:
470 contents = os.listdir(dir_path)
471 ebuilds = [os.path.join(dir_path, path)
472 for path in contents if path.endswith('.ebuild')]
473 ebuilds_9999 = [path for path in ebuilds if path.endswith('-9999.ebuild')]
474
475 # If the -9999.ebuild file was touched the bot will uprev for us.
476 # ...we'll use a simple intersection here as a heuristic...
477 if set(ebuilds_9999) & set(affected_paths):
478 continue
479
480 if ebuilds:
481 return HookFailure('Changelist probably needs a revbump of an ebuild\n'
482 'or a -r1.ebuild symlink if this is a new ebuild')
483
484 return None
485
486
Mike Frysingerbf8b91c2014-02-01 02:50:27 -0500487def _check_ebuild_eapi(project, commit):
488 """Make sure we have people use EAPI=4 or newer with custom ebuilds.
489
490 We want to get away from older EAPI's as it makes life confusing and they
491 have less builtin error checking.
492
493 Args:
494 project: The project to look at
495 commit: The commit to look at
496
497 Returns:
498 A HookFailure or None.
499 """
500 # If this is the portage-stable overlay, then ignore the check. It's rare
501 # that we're doing anything other than importing files from upstream, so
502 # forcing a rev bump makes no sense.
503 whitelist = (
504 'chromiumos/overlays/portage-stable',
505 )
506 if project in whitelist:
507 return None
508
509 BAD_EAPIS = ('0', '1', '2', '3')
510
511 get_eapi = re.compile(r'^\s*EAPI=[\'"]?([^\'"]+)')
512
513 ebuilds_re = [r'\.ebuild$']
514 ebuilds = _filter_files(_get_affected_files(commit, relative=True),
515 ebuilds_re)
516 bad_ebuilds = []
517
518 for ebuild in ebuilds:
519 # If the ebuild does not specify an EAPI, it defaults to 0.
520 eapi = '0'
521
522 lines = _get_file_content(ebuild, commit).splitlines()
523 if len(lines) == 1:
524 # This is most likely a symlink, so skip it entirely.
525 continue
526
527 for line in lines:
528 m = get_eapi.match(line)
529 if m:
530 # Once we hit the first EAPI line in this ebuild, stop processing.
531 # The spec requires that there only be one and it be first, so
532 # checking all possible values is pointless. We also assume that
533 # it's "the" EAPI line and not something in the middle of a heredoc.
534 eapi = m.group(1)
535 break
536
537 if eapi in BAD_EAPIS:
538 bad_ebuilds.append((ebuild, eapi))
539
540 if bad_ebuilds:
541 # pylint: disable=C0301
542 url = 'http://dev.chromium.org/chromium-os/how-tos-and-troubleshooting/upgrade-ebuild-eapis'
543 # pylint: enable=C0301
544 return HookFailure(
545 'These ebuilds are using old EAPIs. Please update to 4 or newer.\n'
546 '\t%s\n'
547 'See this guide for more details:\n%s\n' %
548 ('\n\t'.join(['%s: EAPI=%s' % x for x in bad_ebuilds]), url))
549
550
Mike Frysingerae409522014-02-01 03:16:11 -0500551def _check_keywords(_project, commit):
Mike Frysingerc51ece72014-01-17 16:23:40 -0500552 """Make sure we use the new style KEYWORDS when possible in ebuilds.
553
554 If an ebuild generally does not care about the arch it is running on, then
555 ebuilds should flag it with one of:
556 KEYWORDS="*" # A stable ebuild.
557 KEYWORDS="~*" # An unstable ebuild.
558 KEYWORDS="-* ..." # Is known to only work on specific arches.
559
560 Args:
561 project: The project to look at
562 commit: The commit to look at
563
564 Returns:
565 A HookFailure or None.
566 """
567 WHITELIST = set(('*', '-*', '~*'))
568
569 get_keywords = re.compile(r'^\s*KEYWORDS="(.*)"')
570
571 ebuilds = [x for x in _get_affected_files(commit) if x.endswith('.ebuild')]
572 for ebuild in ebuilds:
573 for _, line in _get_file_diff(ebuild, commit):
574 m = get_keywords.match(line)
575 if m:
576 keywords = set(m.group(1).split())
577 if not keywords or WHITELIST - keywords != WHITELIST:
578 continue
579
580 return HookFailure(
581 'Please update KEYWORDS to use a glob:\n'
582 'If the ebuild should be marked stable (normal for non-9999 '
583 'ebuilds):\n'
584 ' KEYWORDS="*"\n'
585 'If the ebuild should be marked unstable (normal for '
586 'cros-workon / 9999 ebuilds):\n'
587 ' KEYWORDS="~*"\n'
588 'If the ebuild needs to be marked for only specific arches,'
589 'then use -* like so:\n'
590 ' KEYWORDS="-* arm ..."\n')
591
592
Yu-Ju Hong5e0efa72013-11-19 16:28:10 -0800593def _check_ebuild_licenses(_project, commit):
594 """Check if the LICENSE field in the ebuild is correct."""
595 affected_paths = _get_affected_files(commit)
596 touched_ebuilds = [x for x in affected_paths if x.endswith('.ebuild')]
597
598 # A list of licenses to ignore for now.
599 LICENSES_IGNORE = ['||', '(', ')', 'Proprietary', 'as-is']
600
601 for ebuild in touched_ebuilds:
602 # Skip virutal packages.
603 if ebuild.split('/')[-3] == 'virtual':
604 continue
605
606 try:
607 license_types = licenses.GetLicenseTypesFromEbuild(ebuild)
608 except ValueError as e:
609 return HookFailure(e.message, [ebuild])
610
611 # Also ignore licenses ending with '?'
612 for license_type in [x for x in license_types
613 if x not in LICENSES_IGNORE and not x.endswith('?')]:
614 try:
615 licenses.Licensing.FindLicenseType(license_type)
616 except AssertionError as e:
617 return HookFailure(e.message, [ebuild])
618
619
Mike Frysingercd363c82014-02-01 05:20:18 -0500620def _check_ebuild_virtual_pv(project, commit):
621 """Enforce the virtual PV policies."""
622 # If this is the portage-stable overlay, then ignore the check.
623 # We want to import virtuals as-is from upstream Gentoo.
624 whitelist = (
625 'chromiumos/overlays/portage-stable',
626 )
627 if project in whitelist:
628 return None
629
630 # We assume the repo name is the same as the dir name on disk.
631 # It would be dumb to not have them match though.
632 project = os.path.basename(project)
633
634 is_variant = lambda x: x.startswith('overlay-variant-')
635 is_board = lambda x: x.startswith('overlay-')
636 is_private = lambda x: x.endswith('-private')
637
638 get_pv = re.compile(r'(.*?)virtual/([^/]+)/\2-([^/]*)\.ebuild$')
639
640 ebuilds_re = [r'\.ebuild$']
641 ebuilds = _filter_files(_get_affected_files(commit, relative=True),
642 ebuilds_re)
643 bad_ebuilds = []
644
645 for ebuild in ebuilds:
646 m = get_pv.match(ebuild)
647 if m:
648 overlay = m.group(1)
649 if not overlay or not is_board(overlay):
650 overlay = project
651
652 pv = m.group(3).split('-', 1)[0]
653
654 if is_private(overlay):
655 want_pv = '3.5' if is_variant(overlay) else '3'
656 elif is_board(overlay):
657 want_pv = '2.5' if is_variant(overlay) else '2'
658 else:
659 want_pv = '1'
660
661 if pv != want_pv:
662 bad_ebuilds.append((ebuild, pv, want_pv))
663
664 if bad_ebuilds:
665 # pylint: disable=C0301
666 url = 'http://dev.chromium.org/chromium-os/how-tos-and-troubleshooting/portage-build-faq#TOC-Virtuals-and-central-management'
667 # pylint: enable=C0301
668 return HookFailure(
669 'These virtuals have incorrect package versions (PVs). Please adjust:\n'
670 '\t%s\n'
671 'If this is an upstream Gentoo virtual, then you may ignore this\n'
672 'check (and re-run w/--no-verify). Otherwise, please see this\n'
673 'page for more details:\n%s\n' %
674 ('\n\t'.join(['%s:\n\t\tPV is %s but should be %s' % x
675 for x in bad_ebuilds]), url))
676
677
Mike Frysingerae409522014-02-01 03:16:11 -0500678def _check_change_has_proper_changeid(_project, commit):
Mandeep Singh Bainesa23eb5f2011-05-04 13:43:25 -0700679 """Verify that Change-ID is present in last paragraph of commit message."""
680 desc = _get_commit_desc(commit)
681 loc = desc.rfind('\nChange-Id:')
682 if loc == -1 or re.search('\n\s*\n\s*\S+', desc[loc:]):
Ryan Cui1562fb82011-05-09 11:01:31 -0700683 return HookFailure('Change-Id must be in last paragraph of description.')
684
Mandeep Singh Bainesa23eb5f2011-05-04 13:43:25 -0700685
Mike Frysingerae409522014-02-01 03:16:11 -0500686def _check_license(_project, commit):
Ryan Cuiec4d6332011-05-02 14:15:25 -0700687 """Verifies the license header."""
688 LICENSE_HEADER = (
David Hendricks0af30eb2013-02-05 11:35:56 -0800689 r".* Copyright \(c\) 20[-0-9]{2,7} The Chromium OS Authors\. All rights "
Ryan Cuiec4d6332011-05-02 14:15:25 -0700690 r"reserved\." "\n"
David Hendricks0af30eb2013-02-05 11:35:56 -0800691 r".* Use of this source code is governed by a BSD-style license that can "
Ryan Cuiec4d6332011-05-02 14:15:25 -0700692 "be\n"
David Hendricks0af30eb2013-02-05 11:35:56 -0800693 r".* found in the LICENSE file\."
Ryan Cuiec4d6332011-05-02 14:15:25 -0700694 "\n"
695 )
David Hendricks35030d02013-02-04 17:49:16 -0800696 FAIL_MSG = "License must match"
Ryan Cuiec4d6332011-05-02 14:15:25 -0700697
David Hendricks35030d02013-02-04 17:49:16 -0800698 return _verify_header_content(commit, LICENSE_HEADER, FAIL_MSG)
Ryan Cuiec4d6332011-05-02 14:15:25 -0700699
700
Mike Frysingerae409522014-02-01 03:16:11 -0500701def _check_google_copyright(_project, commit):
David Hendricksa0e310d2013-02-04 17:51:55 -0800702 """Verifies Google Inc. as copyright holder."""
703 LICENSE_HEADER = (
704 r".* Copyright 20[-0-9]{2,7} Google Inc\."
705 )
706 FAIL_MSG = "Copyright must match"
707
David Hendricks4c018e72013-02-06 13:46:38 -0800708 # Avoid blocking partners and external contributors.
709 fqdn = socket.getfqdn()
710 if not fqdn.endswith(".corp.google.com"):
711 return None
712
David Hendricksa0e310d2013-02-04 17:51:55 -0800713 return _verify_header_content(commit, LICENSE_HEADER, FAIL_MSG)
714
715
Ryan Cuiec4d6332011-05-02 14:15:25 -0700716# Project-specific hooks
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700717
Ryan Cui1562fb82011-05-09 11:01:31 -0700718
Mike Frysingerae409522014-02-01 03:16:11 -0500719def _run_checkpatch(_project, commit, options=()):
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700720 """Runs checkpatch.pl on the given project"""
721 hooks_dir = _get_hooks_dir()
Mike Frysingerae409522014-02-01 03:16:11 -0500722 cmd = ['%s/checkpatch.pl' % hooks_dir] + list(options) + ['-']
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700723 p = subprocess.Popen(cmd, stdin=subprocess.PIPE, stdout=subprocess.PIPE)
Che-Liang Chiou5ce2d7b2013-03-22 18:47:55 -0700724 output = p.communicate(_get_patch(commit))[0]
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700725 if p.returncode:
Ryan Cui1562fb82011-05-09 11:01:31 -0700726 return HookFailure('checkpatch.pl errors/warnings\n\n' + output)
Ryan Cuiec4d6332011-05-02 14:15:25 -0700727
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700728
Anton Staaf815d6852011-08-22 10:08:45 -0700729def _run_checkpatch_no_tree(project, commit):
730 return _run_checkpatch(project, commit, ['--no-tree'])
731
Mike Frysingerae409522014-02-01 03:16:11 -0500732
Randall Spangler7318fd62013-11-21 12:16:58 -0800733def _run_checkpatch_ec(project, commit):
734 """Runs checkpatch with options for Chromium EC projects."""
735 return _run_checkpatch(project, commit, ['--no-tree',
736 '--ignore=MSLEEP,VOLATILE'])
737
Mike Frysingerae409522014-02-01 03:16:11 -0500738
739def _kernel_configcheck(_project, commit):
Olof Johanssona96810f2012-09-04 16:20:03 -0700740 """Makes sure kernel config changes are not mixed with code changes"""
741 files = _get_affected_files(commit)
742 if not len(_filter_files(files, [r'chromeos/config'])) in [0, len(files)]:
743 return HookFailure('Changes to chromeos/config/ and regular files must '
744 'be in separate commits:\n%s' % '\n'.join(files))
Anton Staaf815d6852011-08-22 10:08:45 -0700745
Mike Frysingerae409522014-02-01 03:16:11 -0500746
747def _run_json_check(_project, commit):
Dale Curtis2975c432011-05-03 17:25:20 -0700748 """Checks that all JSON files are syntactically valid."""
Dale Curtisa039cfd2011-05-04 12:01:05 -0700749 for f in _filter_files(_get_affected_files(commit), [r'.*\.json']):
Dale Curtis2975c432011-05-03 17:25:20 -0700750 try:
751 json.load(open(f))
752 except Exception, e:
Ryan Cui1562fb82011-05-09 11:01:31 -0700753 return HookFailure('Invalid JSON in %s: %s' % (f, e))
Dale Curtis2975c432011-05-03 17:25:20 -0700754
755
Mike Frysingerae409522014-02-01 03:16:11 -0500756def _check_manifests(_project, commit):
Mike Frysinger52b537e2013-08-22 22:59:53 -0400757 """Make sure Manifest files only have DIST lines"""
758 paths = []
759
760 for path in _get_affected_files(commit):
761 if os.path.basename(path) != 'Manifest':
762 continue
763 if not os.path.exists(path):
764 continue
765
766 with open(path, 'r') as f:
767 for line in f.readlines():
768 if not line.startswith('DIST '):
769 paths.append(path)
770 break
771
772 if paths:
773 return HookFailure('Please remove lines that do not start with DIST:\n%s' %
774 ('\n'.join(paths),))
775
776
Mike Frysingerae409522014-02-01 03:16:11 -0500777def _check_change_has_branch_field(_project, commit):
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700778 """Check for a non-empty 'BRANCH=' field in the commit message."""
779 BRANCH_RE = r'\nBRANCH=\S+'
780
781 if not re.search(BRANCH_RE, _get_commit_desc(commit)):
782 msg = ('Changelist description needs BRANCH field (after first line)\n'
783 'E.g. BRANCH=none or BRANCH=link,snow')
784 return HookFailure(msg)
785
786
Mike Frysingerae409522014-02-01 03:16:11 -0500787def _check_change_has_signoff_field(_project, commit):
Shawn Nematbakhsh51e16ac2014-01-28 15:31:07 -0800788 """Check for a non-empty 'Signed-off-by:' field in the commit message."""
789 SIGNOFF_RE = r'\nSigned-off-by: \S+'
790
791 if not re.search(SIGNOFF_RE, _get_commit_desc(commit)):
792 msg = ('Changelist description needs Signed-off-by: field\n'
793 'E.g. Signed-off-by: My Name <me@chromium.org>')
794 return HookFailure(msg)
795
796
Jon Salz3ee59de2012-08-18 13:54:22 +0800797def _run_project_hook_script(script, project, commit):
798 """Runs a project hook script.
799
800 The script is run with the following environment variables set:
801 PRESUBMIT_PROJECT: The affected project
802 PRESUBMIT_COMMIT: The affected commit
803 PRESUBMIT_FILES: A newline-separated list of affected files
804
805 The script is considered to fail if the exit code is non-zero. It should
806 write an error message to stdout.
807 """
808 env = dict(os.environ)
809 env['PRESUBMIT_PROJECT'] = project
810 env['PRESUBMIT_COMMIT'] = commit
811
812 # Put affected files in an environment variable
813 files = _get_affected_files(commit)
814 env['PRESUBMIT_FILES'] = '\n'.join(files)
815
816 process = subprocess.Popen(script, env=env, shell=True,
817 stdin=open(os.devnull),
Jon Salz7b618af2012-08-31 06:03:16 +0800818 stdout=subprocess.PIPE,
819 stderr=subprocess.STDOUT)
Jon Salz3ee59de2012-08-18 13:54:22 +0800820 stdout, _ = process.communicate()
821 if process.wait():
Jon Salz7b618af2012-08-31 06:03:16 +0800822 if stdout:
823 stdout = re.sub('(?m)^', ' ', stdout)
824 return HookFailure('Hook script "%s" failed with code %d%s' %
Jon Salz3ee59de2012-08-18 13:54:22 +0800825 (script, process.returncode,
826 ':\n' + stdout if stdout else ''))
827
828
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700829# Base
830
Ryan Cui1562fb82011-05-09 11:01:31 -0700831
Ryan Cui9b651632011-05-11 11:38:58 -0700832# A list of hooks that are not project-specific
833_COMMON_HOOKS = [
834 _check_change_has_bug_field,
David Jamesc3b68b32013-04-03 09:17:03 -0700835 _check_change_has_valid_cq_depend,
Ryan Cui9b651632011-05-11 11:38:58 -0700836 _check_change_has_test_field,
837 _check_change_has_proper_changeid,
Mike Frysingerbf8b91c2014-02-01 02:50:27 -0500838 _check_ebuild_eapi,
Yu-Ju Hong5e0efa72013-11-19 16:28:10 -0800839 _check_ebuild_licenses,
Mike Frysingercd363c82014-02-01 05:20:18 -0500840 _check_ebuild_virtual_pv,
Ryan Cui9b651632011-05-11 11:38:58 -0700841 _check_no_stray_whitespace,
842 _check_no_long_lines,
843 _check_license,
844 _check_no_tabs,
Doug Anderson42b8a052013-06-26 10:45:36 -0700845 _check_for_uprev,
Mike Frysingerc51ece72014-01-17 16:23:40 -0500846 _check_keywords,
Ryan Cui9b651632011-05-11 11:38:58 -0700847]
Ryan Cuiec4d6332011-05-02 14:15:25 -0700848
Ryan Cui1562fb82011-05-09 11:01:31 -0700849
Ryan Cui9b651632011-05-11 11:38:58 -0700850# A dictionary of project-specific hooks(callbacks), indexed by project name.
851# dict[project] = [callback1, callback2]
852_PROJECT_SPECIFIC_HOOKS = {
Mike Frysingerdf980702013-08-22 22:25:22 -0400853 "chromeos/autotest-tools": [_run_json_check],
Mike Frysinger52b537e2013-08-22 22:59:53 -0400854 "chromeos/overlays/chromeos-overlay": [_check_manifests],
855 "chromeos/overlays/chromeos-partner-overlay": [_check_manifests],
Randall Spangler7318fd62013-11-21 12:16:58 -0800856 "chromeos/platform/ec-private": [_run_checkpatch_ec,
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700857 _check_change_has_branch_field],
Puneet Kumar57b9c092012-08-14 18:58:29 -0700858 "chromeos/third_party/intel-framework": [_check_change_has_branch_field],
Mike Frysingerdf980702013-08-22 22:25:22 -0400859 "chromeos/vendor/kernel-exynos-staging": [_run_checkpatch,
860 _kernel_configcheck],
861 "chromeos/vendor/u-boot-exynos": [_run_checkpatch_no_tree],
Mike Frysinger52b537e2013-08-22 22:59:53 -0400862 "chromiumos/overlays/board-overlays": [_check_manifests],
863 "chromiumos/overlays/chromiumos-overlay": [_check_manifests],
864 "chromiumos/overlays/portage-stable": [_check_manifests],
Randall Spangler7318fd62013-11-21 12:16:58 -0800865 "chromiumos/platform/ec": [_run_checkpatch_ec,
Mike Frysingerdf980702013-08-22 22:25:22 -0400866 _check_change_has_branch_field],
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700867 "chromiumos/platform/mosys": [_check_change_has_branch_field],
Mike Frysingerdf980702013-08-22 22:25:22 -0400868 "chromiumos/platform/vboot_reference": [_check_change_has_branch_field],
Shawn Nematbakhshb6ac17a2014-01-28 16:47:13 -0800869 "chromiumos/third_party/coreboot": [_check_change_has_branch_field,
870 _check_change_has_signoff_field,
871 _check_google_copyright],
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700872 "chromiumos/third_party/flashrom": [_check_change_has_branch_field],
Mike Frysingerdf980702013-08-22 22:25:22 -0400873 "chromiumos/third_party/kernel": [_run_checkpatch, _kernel_configcheck],
874 "chromiumos/third_party/kernel-next": [_run_checkpatch,
875 _kernel_configcheck],
876 "chromiumos/third_party/u-boot": [_run_checkpatch_no_tree,
877 _check_change_has_branch_field],
Ryan Cui9b651632011-05-11 11:38:58 -0700878}
Mandeep Singh Baines116ad102011-04-27 15:16:37 -0700879
Ryan Cui1562fb82011-05-09 11:01:31 -0700880
Ryan Cui9b651632011-05-11 11:38:58 -0700881# A dictionary of flags (keys) that can appear in the config file, and the hook
882# that the flag disables (value)
883_DISABLE_FLAGS = {
884 'stray_whitespace_check': _check_no_stray_whitespace,
885 'long_line_check': _check_no_long_lines,
886 'cros_license_check': _check_license,
887 'tab_check': _check_no_tabs,
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700888 'branch_check': _check_change_has_branch_field,
Shawn Nematbakhsh51e16ac2014-01-28 15:31:07 -0800889 'signoff_check': _check_change_has_signoff_field,
Ryan Cui9b651632011-05-11 11:38:58 -0700890}
891
892
Jon Salz3ee59de2012-08-18 13:54:22 +0800893def _get_disabled_hooks(config):
Ryan Cui9b651632011-05-11 11:38:58 -0700894 """Returns a set of hooks disabled by the current project's config file.
895
896 Expects to be called within the project root.
Jon Salz3ee59de2012-08-18 13:54:22 +0800897
898 Args:
899 config: A ConfigParser for the project's config file.
Ryan Cui9b651632011-05-11 11:38:58 -0700900 """
901 SECTION = 'Hook Overrides'
Jon Salz3ee59de2012-08-18 13:54:22 +0800902 if not config.has_section(SECTION):
903 return set()
Ryan Cui9b651632011-05-11 11:38:58 -0700904
905 disable_flags = []
Jon Salz3ee59de2012-08-18 13:54:22 +0800906 for flag in config.options(SECTION):
Ryan Cui9b651632011-05-11 11:38:58 -0700907 try:
Mike Frysingerae409522014-02-01 03:16:11 -0500908 if not config.getboolean(SECTION, flag):
909 disable_flags.append(flag)
Ryan Cui9b651632011-05-11 11:38:58 -0700910 except ValueError as e:
911 msg = "Error parsing flag \'%s\' in %s file - " % (flag, _CONFIG_FILE)
Mike Frysinger09d6a3d2013-10-08 22:21:03 -0400912 print(msg + str(e))
Ryan Cui9b651632011-05-11 11:38:58 -0700913
914 disabled_keys = set(_DISABLE_FLAGS.iterkeys()).intersection(disable_flags)
915 return set([_DISABLE_FLAGS[key] for key in disabled_keys])
916
917
Jon Salz3ee59de2012-08-18 13:54:22 +0800918def _get_project_hook_scripts(config):
919 """Returns a list of project-specific hook scripts.
920
921 Args:
922 config: A ConfigParser for the project's config file.
923 """
924 SECTION = 'Hook Scripts'
925 if not config.has_section(SECTION):
926 return []
927
928 hook_names_values = config.items(SECTION)
929 hook_names_values.sort(key=lambda x: x[0])
930 return [x[1] for x in hook_names_values]
931
932
Ryan Cui9b651632011-05-11 11:38:58 -0700933def _get_project_hooks(project):
934 """Returns a list of hooks that need to be run for a project.
935
936 Expects to be called from within the project root.
937 """
Jon Salz3ee59de2012-08-18 13:54:22 +0800938 config = ConfigParser.RawConfigParser()
939 try:
940 config.read(_CONFIG_FILE)
941 except ConfigParser.Error:
942 # Just use an empty config file
943 config = ConfigParser.RawConfigParser()
944
945 disabled_hooks = _get_disabled_hooks(config)
Ryan Cui9b651632011-05-11 11:38:58 -0700946 hooks = [hook for hook in _COMMON_HOOKS if hook not in disabled_hooks]
947
948 if project in _PROJECT_SPECIFIC_HOOKS:
Puneet Kumarc80e3f62012-08-13 19:01:18 -0700949 hooks.extend(hook for hook in _PROJECT_SPECIFIC_HOOKS[project]
950 if hook not in disabled_hooks)
Ryan Cui9b651632011-05-11 11:38:58 -0700951
Jon Salz3ee59de2012-08-18 13:54:22 +0800952 for script in _get_project_hook_scripts(config):
953 hooks.append(functools.partial(_run_project_hook_script, script))
954
Ryan Cui9b651632011-05-11 11:38:58 -0700955 return hooks
956
957
Doug Anderson14749562013-06-26 13:38:29 -0700958def _run_project_hooks(project, proj_dir=None, commit_list=None):
Ryan Cui1562fb82011-05-09 11:01:31 -0700959 """For each project run its project specific hook from the hooks dictionary.
960
961 Args:
Doug Anderson44a644f2011-11-02 10:37:37 -0700962 project: The name of project to run hooks for.
963 proj_dir: If non-None, this is the directory the project is in. If None,
964 we'll ask repo.
Doug Anderson14749562013-06-26 13:38:29 -0700965 commit_list: A list of commits to run hooks against. If None or empty list
966 then we'll automatically get the list of commits that would be uploaded.
Ryan Cui1562fb82011-05-09 11:01:31 -0700967
968 Returns:
969 Boolean value of whether any errors were ecountered while running the hooks.
970 """
Doug Anderson44a644f2011-11-02 10:37:37 -0700971 if proj_dir is None:
David James2edd9002013-10-11 14:09:19 -0700972 proj_dirs = _run_command(['repo', 'forall', project, '-c', 'pwd']).split()
973 if len(proj_dirs) == 0:
974 print('%s cannot be found.' % project, file=sys.stderr)
975 print('Please specify a valid project.', file=sys.stderr)
976 return True
977 if len(proj_dirs) > 1:
978 print('%s is associated with multiple directories.' % project,
979 file=sys.stderr)
980 print('Please specify a directory to help disambiguate.', file=sys.stderr)
981 return True
982 proj_dir = proj_dirs[0]
Doug Anderson44a644f2011-11-02 10:37:37 -0700983
Ryan Cuiec4d6332011-05-02 14:15:25 -0700984 pwd = os.getcwd()
985 # hooks assume they are run from the root of the project
986 os.chdir(proj_dir)
987
Doug Anderson14749562013-06-26 13:38:29 -0700988 if not commit_list:
989 try:
990 commit_list = _get_commits()
991 except VerifyException as e:
992 PrintErrorForProject(project, HookFailure(str(e)))
993 os.chdir(pwd)
994 return True
Ryan Cuifa55df52011-05-06 11:16:55 -0700995
Ryan Cui9b651632011-05-11 11:38:58 -0700996 hooks = _get_project_hooks(project)
Ryan Cui1562fb82011-05-09 11:01:31 -0700997 error_found = False
Ryan Cuifa55df52011-05-06 11:16:55 -0700998 for commit in commit_list:
Ryan Cui1562fb82011-05-09 11:01:31 -0700999 error_list = []
Ryan Cui9b651632011-05-11 11:38:58 -07001000 for hook in hooks:
Ryan Cui1562fb82011-05-09 11:01:31 -07001001 hook_error = hook(project, commit)
1002 if hook_error:
1003 error_list.append(hook_error)
1004 error_found = True
1005 if error_list:
1006 PrintErrorsForCommit(project, commit, _get_commit_desc(commit),
1007 error_list)
Don Garrettdba548a2011-05-05 15:17:14 -07001008
Ryan Cuiec4d6332011-05-02 14:15:25 -07001009 os.chdir(pwd)
Ryan Cui1562fb82011-05-09 11:01:31 -07001010 return error_found
Mandeep Singh Baines116ad102011-04-27 15:16:37 -07001011
Mike Frysingerae409522014-02-01 03:16:11 -05001012
Mandeep Singh Baines116ad102011-04-27 15:16:37 -07001013# Main
Mandeep Singh Baines69e470e2011-04-06 10:34:52 -07001014
Ryan Cui1562fb82011-05-09 11:01:31 -07001015
Mike Frysingerae409522014-02-01 03:16:11 -05001016def main(project_list, worktree_list=None, **_kwargs):
Doug Anderson06456632012-01-05 11:02:14 -08001017 """Main function invoked directly by repo.
1018
1019 This function will exit directly upon error so that repo doesn't print some
1020 obscure error message.
1021
1022 Args:
1023 project_list: List of projects to run on.
David James2edd9002013-10-11 14:09:19 -07001024 worktree_list: A list of directories. It should be the same length as
1025 project_list, so that each entry in project_list matches with a directory
1026 in worktree_list. If None, we will attempt to calculate the directories
1027 automatically.
Doug Anderson06456632012-01-05 11:02:14 -08001028 kwargs: Leave this here for forward-compatibility.
1029 """
Ryan Cui1562fb82011-05-09 11:01:31 -07001030 found_error = False
David James2edd9002013-10-11 14:09:19 -07001031 if not worktree_list:
1032 worktree_list = [None] * len(project_list)
1033 for project, worktree in zip(project_list, worktree_list):
1034 if _run_project_hooks(project, proj_dir=worktree):
Ryan Cui1562fb82011-05-09 11:01:31 -07001035 found_error = True
1036
Mike Frysingerae409522014-02-01 03:16:11 -05001037 if found_error:
Ryan Cui1562fb82011-05-09 11:01:31 -07001038 msg = ('Preupload failed due to errors in project(s). HINTS:\n'
Ryan Cui9b651632011-05-11 11:38:58 -07001039 '- To disable some source style checks, and for other hints, see '
1040 '<checkout_dir>/src/repohooks/README\n'
1041 '- To upload only current project, run \'repo upload .\'')
Mike Frysinger09d6a3d2013-10-08 22:21:03 -04001042 print(msg, file=sys.stderr)
Don Garrettdba548a2011-05-05 15:17:14 -07001043 sys.exit(1)
Anush Elangovan63afad72011-03-23 00:41:27 -07001044
Ryan Cui1562fb82011-05-09 11:01:31 -07001045
Doug Anderson44a644f2011-11-02 10:37:37 -07001046def _identify_project(path):
1047 """Identify the repo project associated with the given path.
1048
1049 Returns:
1050 A string indicating what project is associated with the path passed in or
1051 a blank string upon failure.
1052 """
1053 return _run_command(['repo', 'forall', '.', '-c', 'echo ${REPO_PROJECT}'],
1054 stderr=subprocess.PIPE, cwd=path).strip()
1055
1056
1057def direct_main(args, verbose=False):
1058 """Run hooks directly (outside of the context of repo).
1059
1060 # Setup for doctests below.
1061 # ...note that some tests assume that running pre-upload on this CWD is fine.
1062 # TODO: Use mock and actually mock out _run_project_hooks() for tests.
1063 >>> mydir = os.path.dirname(os.path.abspath(__file__))
1064 >>> olddir = os.getcwd()
1065
1066 # OK to run w/ no arugments; will run with CWD.
1067 >>> os.chdir(mydir)
1068 >>> direct_main(['prog_name'], verbose=True)
1069 Running hooks on chromiumos/repohooks
1070 0
1071 >>> os.chdir(olddir)
1072
1073 # Run specifying a dir
1074 >>> direct_main(['prog_name', '--dir=%s' % mydir], verbose=True)
1075 Running hooks on chromiumos/repohooks
1076 0
1077
1078 # Not a problem to use a bogus project; we'll just get default settings.
1079 >>> direct_main(['prog_name', '--dir=%s' % mydir, '--project=X'],verbose=True)
1080 Running hooks on X
1081 0
1082
1083 # Run with project but no dir
1084 >>> os.chdir(mydir)
1085 >>> direct_main(['prog_name', '--project=X'], verbose=True)
1086 Running hooks on X
1087 0
1088 >>> os.chdir(olddir)
1089
1090 # Try with a non-git CWD
1091 >>> os.chdir('/tmp')
1092 >>> direct_main(['prog_name'])
1093 Traceback (most recent call last):
1094 ...
1095 BadInvocation: The current directory is not part of a git project.
1096
1097 # Check various bad arguments...
1098 >>> direct_main(['prog_name', 'bogus'])
1099 Traceback (most recent call last):
1100 ...
1101 BadInvocation: Unexpected arguments: bogus
1102 >>> direct_main(['prog_name', '--project=bogus', '--dir=bogusdir'])
1103 Traceback (most recent call last):
1104 ...
1105 BadInvocation: Invalid dir: bogusdir
1106 >>> direct_main(['prog_name', '--project=bogus', '--dir=/tmp'])
1107 Traceback (most recent call last):
1108 ...
1109 BadInvocation: Not a git directory: /tmp
1110
1111 Args:
1112 args: The value of sys.argv
Mike Frysingerae409522014-02-01 03:16:11 -05001113 verbose: Log verbose info while running
Doug Anderson44a644f2011-11-02 10:37:37 -07001114
1115 Returns:
1116 0 if no pre-upload failures, 1 if failures.
1117
1118 Raises:
1119 BadInvocation: On some types of invocation errors.
1120 """
1121 desc = 'Run Chromium OS pre-upload hooks on changes compared to upstream.'
1122 parser = optparse.OptionParser(description=desc)
1123
1124 parser.add_option('--dir', default=None,
1125 help='The directory that the project lives in. If not '
1126 'specified, use the git project root based on the cwd.')
1127 parser.add_option('--project', default=None,
1128 help='The project repo path; this can affect how the hooks '
1129 'get run, since some hooks are project-specific. For '
1130 'chromite this is chromiumos/chromite. If not specified, '
1131 'the repo tool will be used to figure this out based on '
1132 'the dir.')
Doug Anderson14749562013-06-26 13:38:29 -07001133 parser.add_option('--rerun-since', default=None,
1134 help='Rerun hooks on old commits since the given date. '
1135 'The date should match git log\'s concept of a date. '
1136 'e.g. 2012-06-20')
1137
1138 parser.usage = "pre-upload.py [options] [commits]"
Doug Anderson44a644f2011-11-02 10:37:37 -07001139
1140 opts, args = parser.parse_args(args[1:])
1141
Doug Anderson14749562013-06-26 13:38:29 -07001142 if opts.rerun_since:
1143 if args:
1144 raise BadInvocation('Can\'t pass commits and use rerun-since: %s' %
1145 ' '.join(args))
1146
1147 cmd = ['git', 'log', '--since="%s"' % opts.rerun_since, '--pretty=%H']
1148 all_commits = _run_command(cmd).splitlines()
1149 bot_commits = _run_command(cmd + ['--author=chrome-bot']).splitlines()
1150
1151 # Eliminate chrome-bot commits but keep ordering the same...
1152 bot_commits = set(bot_commits)
1153 args = [c for c in all_commits if c not in bot_commits]
1154
Doug Anderson44a644f2011-11-02 10:37:37 -07001155
1156 # Check/normlaize git dir; if unspecified, we'll use the root of the git
1157 # project from CWD
1158 if opts.dir is None:
1159 git_dir = _run_command(['git', 'rev-parse', '--git-dir'],
1160 stderr=subprocess.PIPE).strip()
1161 if not git_dir:
1162 raise BadInvocation('The current directory is not part of a git project.')
1163 opts.dir = os.path.dirname(os.path.abspath(git_dir))
1164 elif not os.path.isdir(opts.dir):
1165 raise BadInvocation('Invalid dir: %s' % opts.dir)
1166 elif not os.path.isdir(os.path.join(opts.dir, '.git')):
1167 raise BadInvocation('Not a git directory: %s' % opts.dir)
1168
1169 # Identify the project if it wasn't specified; this _requires_ the repo
1170 # tool to be installed and for the project to be part of a repo checkout.
1171 if not opts.project:
1172 opts.project = _identify_project(opts.dir)
1173 if not opts.project:
1174 raise BadInvocation("Repo couldn't identify the project of %s" % opts.dir)
1175
1176 if verbose:
Mike Frysinger09d6a3d2013-10-08 22:21:03 -04001177 print("Running hooks on %s" % (opts.project))
Doug Anderson44a644f2011-11-02 10:37:37 -07001178
Doug Anderson14749562013-06-26 13:38:29 -07001179 found_error = _run_project_hooks(opts.project, proj_dir=opts.dir,
1180 commit_list=args)
Doug Anderson44a644f2011-11-02 10:37:37 -07001181 if found_error:
1182 return 1
1183 return 0
1184
1185
1186def _test():
1187 """Run any built-in tests."""
1188 import doctest
1189 doctest.testmod()
1190
1191
Mandeep Singh Baines69e470e2011-04-06 10:34:52 -07001192if __name__ == '__main__':
Doug Anderson44a644f2011-11-02 10:37:37 -07001193 if sys.argv[1:2] == ["--test"]:
1194 _test()
1195 exit_code = 0
1196 else:
1197 prog_name = os.path.basename(sys.argv[0])
1198 try:
1199 exit_code = direct_main(sys.argv)
1200 except BadInvocation, e:
Mike Frysinger09d6a3d2013-10-08 22:21:03 -04001201 print("%s: %s" % (prog_name, str(e)), file=sys.stderr)
Doug Anderson44a644f2011-11-02 10:37:37 -07001202 exit_code = 1
1203 sys.exit(exit_code)