2012-01-23 18:45:41 +01:00
|
|
|
# Copyright (c) 2012 The WebRTC project authors. All Rights Reserved.
|
|
|
|
#
|
|
|
|
# Use of this source code is governed by a BSD-style license
|
|
|
|
# that can be found in the LICENSE file in the root of the source
|
|
|
|
# tree. An additional intellectual property rights grant can be found
|
|
|
|
# in the file PATENTS. All contributing project authors may
|
|
|
|
# be found in the AUTHORS file in the root of the source tree.
|
2011-05-30 13:51:34 +02:00
|
|
|
|
2013-10-22 18:47:40 +02:00
|
|
|
import re
|
|
|
|
|
|
|
|
|
2012-02-21 18:53:46 +01:00
|
|
|
def _CheckNoIOStreamInHeaders(input_api, output_api):
|
|
|
|
"""Checks to make sure no .h files include <iostream>."""
|
|
|
|
files = []
|
|
|
|
pattern = input_api.re.compile(r'^#include\s*<iostream>',
|
|
|
|
input_api.re.MULTILINE)
|
|
|
|
for f in input_api.AffectedSourceFiles(input_api.FilterSourceFile):
|
|
|
|
if not f.LocalPath().endswith('.h'):
|
|
|
|
continue
|
|
|
|
contents = input_api.ReadFile(f)
|
|
|
|
if pattern.search(contents):
|
|
|
|
files.append(f)
|
|
|
|
|
|
|
|
if len(files):
|
|
|
|
return [ output_api.PresubmitError(
|
|
|
|
'Do not #include <iostream> in header files, since it inserts static ' +
|
|
|
|
'initialization into every file including the header. Instead, ' +
|
|
|
|
'#include <ostream>. See http://crbug.com/94794',
|
|
|
|
files) ]
|
|
|
|
return []
|
|
|
|
|
|
|
|
def _CheckNoFRIEND_TEST(input_api, output_api):
|
|
|
|
"""Make sure that gtest's FRIEND_TEST() macro is not used, the
|
|
|
|
FRIEND_TEST_ALL_PREFIXES() macro from testsupport/gtest_prod_util.h should be
|
|
|
|
used instead since that allows for FLAKY_, FAILS_ and DISABLED_ prefixes."""
|
|
|
|
problems = []
|
|
|
|
|
|
|
|
file_filter = lambda f: f.LocalPath().endswith(('.cc', '.h'))
|
|
|
|
for f in input_api.AffectedFiles(file_filter=file_filter):
|
|
|
|
for line_num, line in f.ChangedContents():
|
|
|
|
if 'FRIEND_TEST(' in line:
|
|
|
|
problems.append(' %s:%d' % (f.LocalPath(), line_num))
|
|
|
|
|
|
|
|
if not problems:
|
|
|
|
return []
|
|
|
|
return [output_api.PresubmitPromptWarning('WebRTC\'s code should not use '
|
|
|
|
'gtest\'s FRIEND_TEST() macro. Include testsupport/gtest_prod_util.h and '
|
|
|
|
'use FRIEND_TEST_ALL_PREFIXES() instead.\n' + '\n'.join(problems))]
|
|
|
|
|
2012-07-01 07:55:23 +02:00
|
|
|
def _CheckApprovedFilesLintClean(input_api, output_api,
|
|
|
|
source_file_filter=None):
|
|
|
|
"""Checks that all new or whitelisted .cc and .h files pass cpplint.py.
|
2012-02-21 18:53:46 +01:00
|
|
|
This check is based on _CheckChangeLintsClean in
|
|
|
|
depot_tools/presubmit_canned_checks.py but has less filters and only checks
|
|
|
|
added files."""
|
|
|
|
result = []
|
|
|
|
|
|
|
|
# Initialize cpplint.
|
|
|
|
import cpplint
|
|
|
|
# Access to a protected member _XX of a client class
|
|
|
|
# pylint: disable=W0212
|
|
|
|
cpplint._cpplint_state.ResetErrorCounts()
|
|
|
|
|
|
|
|
# Justifications for each filter:
|
|
|
|
#
|
|
|
|
# - build/header_guard : WebRTC coding style says they should be prefixed
|
|
|
|
# with WEBRTC_, which is not possible to configure in
|
|
|
|
# cpplint.py.
|
|
|
|
cpplint._SetFilters('-build/header_guard')
|
|
|
|
|
|
|
|
# Use the strictest verbosity level for cpplint.py (level 1) which is the
|
|
|
|
# default when running cpplint.py from command line.
|
|
|
|
# To make it possible to work with not-yet-converted code, we're only applying
|
2012-07-01 07:55:23 +02:00
|
|
|
# it to new (or moved/renamed) files and files listed in LINT_FOLDERS.
|
2012-02-21 18:53:46 +01:00
|
|
|
verbosity_level = 1
|
|
|
|
files = []
|
|
|
|
for f in input_api.AffectedSourceFiles(source_file_filter):
|
|
|
|
# Note that moved/renamed files also count as added for svn.
|
2013-03-07 10:59:43 +01:00
|
|
|
if (f.Action() == 'A'):
|
2012-02-21 18:53:46 +01:00
|
|
|
files.append(f.AbsoluteLocalPath())
|
2012-07-01 07:55:23 +02:00
|
|
|
|
2012-02-21 18:53:46 +01:00
|
|
|
for file_name in files:
|
|
|
|
cpplint.ProcessFile(file_name, verbosity_level)
|
|
|
|
|
|
|
|
if cpplint._cpplint_state.error_count > 0:
|
|
|
|
if input_api.is_committing:
|
|
|
|
# TODO(kjellander): Change back to PresubmitError below when we're
|
|
|
|
# confident with the lint settings.
|
|
|
|
res_type = output_api.PresubmitPromptWarning
|
|
|
|
else:
|
|
|
|
res_type = output_api.PresubmitPromptWarning
|
|
|
|
result = [res_type('Changelist failed cpplint.py check.')]
|
|
|
|
|
|
|
|
return result
|
|
|
|
|
2014-02-20 00:18:19 +01:00
|
|
|
def _CheckTalkOrWebrtcOnly(input_api, output_api):
|
|
|
|
base_folders = set(["webrtc", "talk"])
|
|
|
|
base_folders_in_cl = set()
|
|
|
|
|
|
|
|
for f in input_api.AffectedFiles():
|
|
|
|
full_path = f.LocalPath()
|
|
|
|
base_folders_in_cl.add(full_path[:full_path.find('/')])
|
|
|
|
|
|
|
|
results = []
|
|
|
|
if base_folders.issubset(base_folders_in_cl):
|
|
|
|
error_type = output_api.PresubmitError
|
|
|
|
results.append(error_type(
|
|
|
|
'It is not allowed to check in files to ' + ', '.join(base_folders) +
|
|
|
|
' in the same cl',
|
|
|
|
[]))
|
|
|
|
return results
|
|
|
|
|
2012-01-26 22:24:23 +01:00
|
|
|
def _CommonChecks(input_api, output_api):
|
|
|
|
"""Checks common to both upload and commit."""
|
2012-02-21 18:53:46 +01:00
|
|
|
# TODO(kjellander): Use presubmit_canned_checks.PanProjectChecks too.
|
2011-05-30 13:51:34 +02:00
|
|
|
results = []
|
2013-03-07 10:59:43 +01:00
|
|
|
results.extend(input_api.canned_checks.RunPylint(input_api, output_api,
|
|
|
|
black_list=(r'^.*gviz_api\.py$',
|
|
|
|
r'^.*gaeunit\.py$',
|
2013-07-25 18:43:30 +02:00
|
|
|
# Embedded shell-script fakes out pylint.
|
|
|
|
r'^talk/site_scons/site_tools/talk_linux.py$',
|
2013-03-07 10:59:43 +01:00
|
|
|
r'^third_party/.*\.py$',
|
|
|
|
r'^testing/.*\.py$',
|
|
|
|
r'^tools/gyp/.*\.py$',
|
|
|
|
r'^tools/perf_expectations/.*\.py$',
|
2013-05-14 11:42:39 +02:00
|
|
|
r'^tools/protoc_wrapper/.*\.py$',
|
2013-03-07 10:59:43 +01:00
|
|
|
r'^tools/python/.*\.py$',
|
|
|
|
r'^tools/python_charts/data/.*\.py$',
|
2013-08-22 09:57:00 +02:00
|
|
|
r'^tools/refactoring/.*\.py$',
|
2013-12-11 14:37:12 +01:00
|
|
|
r'^tools/swarming_client/.*\.py$',
|
2013-03-07 10:59:43 +01:00
|
|
|
# TODO(phoglund): should arguably be checked.
|
|
|
|
r'^tools/valgrind-webrtc/.*\.py$',
|
|
|
|
r'^tools/valgrind/.*\.py$',
|
|
|
|
# TODO(phoglund): should arguably be checked.
|
|
|
|
r'^webrtc/build/.*\.py$',
|
|
|
|
r'^build/.*\.py$',
|
2014-03-01 03:09:36 +01:00
|
|
|
r'^out.*/.*\.py$',),
|
2013-03-07 10:59:43 +01:00
|
|
|
disabled_warnings=['F0401', # Failed to import x
|
|
|
|
'E0611', # No package y in x
|
|
|
|
'W0232', # Class has no __init__ method
|
|
|
|
]))
|
2012-01-23 18:45:41 +01:00
|
|
|
results.extend(input_api.canned_checks.CheckLongLines(
|
2013-04-08 17:46:07 +02:00
|
|
|
input_api, output_api, maxlen=80))
|
2012-01-23 18:45:41 +01:00
|
|
|
results.extend(input_api.canned_checks.CheckChangeHasNoTabs(
|
|
|
|
input_api, output_api))
|
2012-01-26 22:24:23 +01:00
|
|
|
results.extend(input_api.canned_checks.CheckChangeHasNoStrayWhitespace(
|
|
|
|
input_api, output_api))
|
|
|
|
results.extend(input_api.canned_checks.CheckChangeTodoHasOwner(
|
|
|
|
input_api, output_api))
|
2012-07-01 07:55:23 +02:00
|
|
|
results.extend(_CheckApprovedFilesLintClean(input_api, output_api))
|
2012-02-21 18:53:46 +01:00
|
|
|
results.extend(_CheckNoIOStreamInHeaders(input_api, output_api))
|
|
|
|
results.extend(_CheckNoFRIEND_TEST(input_api, output_api))
|
2014-02-20 00:18:19 +01:00
|
|
|
results.extend(_CheckTalkOrWebrtcOnly(input_api, output_api))
|
2012-01-26 22:24:23 +01:00
|
|
|
return results
|
2011-05-30 13:51:34 +02:00
|
|
|
|
2012-01-26 22:24:23 +01:00
|
|
|
def CheckChangeOnUpload(input_api, output_api):
|
|
|
|
results = []
|
|
|
|
results.extend(_CommonChecks(input_api, output_api))
|
2012-01-23 18:45:41 +01:00
|
|
|
return results
|
2011-05-30 13:51:34 +02:00
|
|
|
|
2012-01-23 18:45:41 +01:00
|
|
|
def CheckChangeOnCommit(input_api, output_api):
|
2011-06-09 09:07:24 +02:00
|
|
|
results = []
|
2012-01-26 22:24:23 +01:00
|
|
|
results.extend(_CommonChecks(input_api, output_api))
|
2011-06-09 09:07:24 +02:00
|
|
|
results.extend(input_api.canned_checks.CheckOwners(input_api, output_api))
|
2012-01-26 22:24:23 +01:00
|
|
|
results.extend(input_api.canned_checks.CheckChangeWasUploaded(
|
|
|
|
input_api, output_api))
|
|
|
|
results.extend(input_api.canned_checks.CheckChangeHasDescription(
|
|
|
|
input_api, output_api))
|
2012-02-21 18:53:46 +01:00
|
|
|
results.extend(input_api.canned_checks.CheckChangeHasBugField(
|
|
|
|
input_api, output_api))
|
|
|
|
results.extend(input_api.canned_checks.CheckChangeHasTestField(
|
|
|
|
input_api, output_api))
|
2014-02-13 12:53:43 +01:00
|
|
|
results.extend(input_api.canned_checks.CheckTreeIsOpen(
|
|
|
|
input_api, output_api,
|
|
|
|
json_url='http://webrtc-status.appspot.com/current?format=json'))
|
2011-06-09 09:07:24 +02:00
|
|
|
return results
|
2013-10-22 18:47:40 +02:00
|
|
|
|
|
|
|
# pylint: disable=W0613
|
|
|
|
def GetPreferredTrySlaves(project, change):
|
|
|
|
files = change.LocalPaths()
|
|
|
|
|
2013-12-20 22:20:42 +01:00
|
|
|
android_bots = [
|
|
|
|
'android',
|
2014-01-27 17:08:43 +01:00
|
|
|
'android_apk',
|
|
|
|
'android_apk_rel',
|
2013-12-20 22:20:42 +01:00
|
|
|
'android_rel',
|
|
|
|
'android_clang',
|
|
|
|
]
|
2013-10-22 18:47:40 +02:00
|
|
|
ios_bots = [
|
|
|
|
'ios',
|
|
|
|
'ios_rel',
|
|
|
|
]
|
|
|
|
linux_bots = [
|
|
|
|
'linux',
|
|
|
|
'linux_asan',
|
2014-01-22 20:00:01 +01:00
|
|
|
'linux_baremetal',
|
2013-10-22 18:47:40 +02:00
|
|
|
'linux_memcheck',
|
|
|
|
'linux_rel',
|
|
|
|
'linux_tsan',
|
|
|
|
]
|
|
|
|
mac_bots = [
|
|
|
|
'mac',
|
|
|
|
'mac_asan',
|
2014-01-22 20:00:01 +01:00
|
|
|
'mac_baremetal',
|
2013-10-22 18:47:40 +02:00
|
|
|
'mac_rel',
|
|
|
|
'mac_x64_rel',
|
|
|
|
]
|
|
|
|
win_bots = [
|
|
|
|
'win',
|
2014-01-22 20:00:01 +01:00
|
|
|
'win_baremetal',
|
2013-10-22 18:47:40 +02:00
|
|
|
'win_rel',
|
|
|
|
'win_x64_rel',
|
|
|
|
]
|
|
|
|
|
|
|
|
if not files or all(re.search(r'[\\/]OWNERS$', f) for f in files):
|
|
|
|
return []
|
|
|
|
|
|
|
|
if all(re.search('[/_]ios[/_.]', f) for f in files):
|
|
|
|
return ios_bots
|
|
|
|
if all(re.search('\.(m|mm)$|(^|[/_])mac[/_.]', f) for f in files):
|
|
|
|
return mac_bots
|
|
|
|
if all(re.search('(^|[/_])win[/_.]', f) for f in files):
|
|
|
|
return win_bots
|
|
|
|
|
2013-12-20 22:20:42 +01:00
|
|
|
return android_bots + ios_bots + linux_bots + mac_bots + win_bots
|