Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(36)

Side by Side Diff: components/viz/PRESUBMIT.py

Issue 2797993004: Configure components/viz/ directory. (Closed)
Patch Set: Fix presubmit. Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« components/viz/OWNERS ('K') | « components/viz/OWNERS ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 # Copyright 2017 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file.
4
5 """Top-level presubmit script for components/viz.
6
7 See http://dev.chromium.org/developers/how-tos/depottools/presubmit-scripts
8 for more details about the presubmit API built into depot_tools.
9 """
10
11 import re
12 import string
13
14 VIZ_SOURCE_FILES=(r'^components[\\/]viz[\\/].*\.(cc|h)$',)
15
16 def CheckChangeLintsClean(input_api, output_api):
17 source_filter = lambda x: input_api.FilterSourceFile(
18 x, white_list=VIZ_SOURCE_FILES, black_list=None)
19
20 return input_api.canned_checks.CheckChangeLintsClean(
21 input_api, output_api, source_filter, lint_filters=[], verbose_level=1)
22
23 def CheckAsserts(input_api, output_api, white_list=VIZ_SOURCE_FILES, black_list= None):
24 black_list = tuple(black_list or input_api.DEFAULT_BLACK_LIST)
25 source_file_filter = lambda x: input_api.FilterSourceFile(x, white_list, black _list)
26
27 assert_files = []
28 notreached_files = []
29
30 for f in input_api.AffectedSourceFiles(source_file_filter):
31 contents = input_api.ReadFile(f, 'rb')
32 # WebKit ASSERT() is not allowed.
33 if re.search(r"\bASSERT\(", contents):
34 assert_files.append(f.LocalPath())
35 # WebKit ASSERT_NOT_REACHED() is not allowed.
danakj 2017/04/05 16:41:30 ASSERT_NOT_REACHED() has gone away now, so this co
kylechar 2017/04/05 16:53:41 Done.
36 if re.search(r"ASSERT_NOT_REACHED\(", contents):
37 notreached_files.append(f.LocalPath())
38
39 if assert_files:
40 return [output_api.PresubmitError(
41 'These files use ASSERT instead of using DCHECK:',
42 items=assert_files)]
43 if notreached_files:
44 return [output_api.PresubmitError(
45 'These files use ASSERT_NOT_REACHED instead of using NOTREACHED:',
46 items=notreached_files)]
47 return []
48
49 def CheckStdAbs(input_api, output_api,
50 white_list=VIZ_SOURCE_FILES, black_list=None):
51 black_list = tuple(black_list or input_api.DEFAULT_BLACK_LIST)
52 source_file_filter = lambda x: input_api.FilterSourceFile(x,
53 white_list,
54 black_list)
55
56 using_std_abs_files = []
57 found_fabs_files = []
58 missing_std_prefix_files = []
59
60 for f in input_api.AffectedSourceFiles(source_file_filter):
61 contents = input_api.ReadFile(f, 'rb')
62 if re.search(r"using std::f?abs;", contents):
63 using_std_abs_files.append(f.LocalPath())
64 if re.search(r"\bfabsf?\(", contents):
65 found_fabs_files.append(f.LocalPath());
66
67 no_std_prefix = r"(?<!std::)"
68 # Matches occurrences of abs/absf/fabs/fabsf without a "std::" prefix.
69 abs_without_prefix = r"%s(\babsf?\()" % no_std_prefix
70 fabs_without_prefix = r"%s(\bfabsf?\()" % no_std_prefix
71 # Skips matching any lines that have "// NOLINT".
72 no_nolint = r"(?![^\n]*//\s+NOLINT)"
73
74 expression = re.compile("(%s|%s)%s" %
75 (abs_without_prefix, fabs_without_prefix, no_nolint))
76 if expression.search(contents):
77 missing_std_prefix_files.append(f.LocalPath())
78
79 result = []
80 if using_std_abs_files:
81 result.append(output_api.PresubmitError(
82 'These files have "using std::abs" which is not permitted.',
83 items=using_std_abs_files))
84 if found_fabs_files:
85 result.append(output_api.PresubmitError(
86 'std::abs() should be used instead of std::fabs() for consistency.',
87 items=found_fabs_files))
88 if missing_std_prefix_files:
89 result.append(output_api.PresubmitError(
90 'These files use abs(), absf(), fabs(), or fabsf() without qualifying '
91 'the std namespace. Please use std::abs() in all places.',
92 items=missing_std_prefix_files))
93 return result
94
95 def CheckPassByValue(input_api,
96 output_api,
97 white_list=VIZ_SOURCE_FILES,
98 black_list=None):
99 black_list = tuple(black_list or input_api.DEFAULT_BLACK_LIST)
100 source_file_filter = lambda x: input_api.FilterSourceFile(x,
101 white_list,
102 black_list)
103
104 local_errors = []
105
106 # Well-defined simple classes containing only <= 4 ints, or <= 2 floats.
danakj 2017/04/05 16:41:30 This is actually now types the same size as a prim
kylechar 2017/04/05 16:53:41 Done.
107 pass_by_value_types = ['base::Time',
108 'base::TimeTicks',
109 ]
110
111 for f in input_api.AffectedSourceFiles(source_file_filter):
112 contents = input_api.ReadFile(f, 'rb')
113 match = re.search(
114 r'\bconst +' + '(?P<type>(%s))&' %
115 string.join(pass_by_value_types, '|'),
116 contents)
117 if match:
118 local_errors.append(output_api.PresubmitError(
119 '%s passes %s by const ref instead of by value.' %
120 (f.LocalPath(), match.group('type'))))
121 return local_errors
122
123 def CheckTodos(input_api, output_api):
124 errors = []
125
126 source_file_filter = lambda x: x
127 for f in input_api.AffectedSourceFiles(source_file_filter):
128 contents = input_api.ReadFile(f, 'rb')
129 if ('FIX'+'ME') in contents:
130 errors.append(f.LocalPath())
131
132 if errors:
133 return [output_api.PresubmitError(
134 'All TODO comments should be of the form TODO(name). ' +
danakj 2017/04/05 16:41:30 TODO(name/bug) is the new format, can you say that
kylechar 2017/04/05 16:53:41 Done.
135 'Use TODO instead of FIX' + 'ME',
136 items=errors)]
137 return []
138
139 def CheckDoubleAngles(input_api, output_api, white_list=VIZ_SOURCE_FILES,
140 black_list=None):
141 errors = []
142
143 source_file_filter = lambda x: input_api.FilterSourceFile(x,
144 white_list,
145 black_list)
146 for f in input_api.AffectedSourceFiles(source_file_filter):
147 contents = input_api.ReadFile(f, 'rb')
148 if ('> >') in contents:
149 errors.append(f.LocalPath())
150
151 if errors:
152 return [output_api.PresubmitError('Use >> instead of > >:', items=errors)]
153 return []
154
155 def CheckUniquePtr(input_api, output_api,
156 white_list=VIZ_SOURCE_FILES, black_list=None):
157 black_list = tuple(black_list or input_api.DEFAULT_BLACK_LIST)
158 source_file_filter = lambda x: input_api.FilterSourceFile(x,
159 white_list,
160 black_list)
161 errors = []
162 for f in input_api.AffectedSourceFiles(source_file_filter):
163 for line_number, line in f.ChangedContents():
164 # Disallow:
165 # return std::unique_ptr<T>(foo);
166 # bar = std::unique_ptr<T>(foo);
167 # But allow:
168 # return std::unique_ptr<T[]>(foo);
169 # bar = std::unique_ptr<T[]>(foo);
170 if re.search(r'(=|\breturn)\s*std::unique_ptr<.*?(?<!])>\([^)]+\)', line):
171 errors.append(output_api.PresubmitError(
172 ('%s:%d uses explicit std::unique_ptr constructor. ' +
173 'Use base::MakeUnique<T>() instead.') %
174 (f.LocalPath(), line_number)))
175 # Disallow:
176 # std::unique_ptr<T>()
177 if re.search(r'\bstd::unique_ptr<.*?>\(\)', line):
178 errors.append(output_api.PresubmitError(
179 '%s:%d uses std::unique_ptr<T>(). Use nullptr instead.' %
180 (f.LocalPath(), line_number)))
181 return errors
182
183 def FindUnquotedQuote(contents, pos):
184 match = re.search(r"(?<!\\)(?P<quote>\")", contents[pos:])
185 return -1 if not match else match.start("quote") + pos
186
187 def FindUselessIfdefs(input_api, output_api):
188 errors = []
189 source_file_filter = lambda x: x
190 for f in input_api.AffectedSourceFiles(source_file_filter):
191 contents = input_api.ReadFile(f, 'rb')
192 if re.search(r'#if\s*0\s', contents):
193 errors.append(f.LocalPath())
194 if errors:
195 return [output_api.PresubmitError(
196 'Don\'t use #if '+'0; just delete the code.',
197 items=errors)]
198 return []
199
200 def FindNamespaceInBlock(pos, namespace, contents, whitelist=[]):
201 open_brace = -1
202 close_brace = -1
203 quote = -1
204 name = -1
205 brace_count = 1
206 quote_count = 0
207 while pos < len(contents) and brace_count > 0:
208 if open_brace < pos: open_brace = contents.find("{", pos)
209 if close_brace < pos: close_brace = contents.find("}", pos)
210 if quote < pos: quote = FindUnquotedQuote(contents, pos)
211 if name < pos: name = contents.find(("%s::" % namespace), pos)
212
213 if name < 0:
214 return False # The namespace is not used at all.
215 if open_brace < 0:
216 open_brace = len(contents)
217 if close_brace < 0:
218 close_brace = len(contents)
219 if quote < 0:
220 quote = len(contents)
221
222 next = min(open_brace, min(close_brace, min(quote, name)))
223
224 if next == open_brace:
225 brace_count += 1
226 elif next == close_brace:
227 brace_count -= 1
228 elif next == quote:
229 quote_count = 0 if quote_count else 1
230 elif next == name and not quote_count:
231 in_whitelist = False
232 for w in whitelist:
233 if re.match(w, contents[next:]):
234 in_whitelist = True
235 break
236 if not in_whitelist:
237 return True
238 pos = next + 1
239 return False
240
241 # Checks for the use of viz:: within the viz namespace, which is usually
242 # redundant.
243 def CheckNamespace(input_api, output_api):
244 errors = []
245
246 source_file_filter = lambda x: x
247 for f in input_api.AffectedSourceFiles(source_file_filter):
248 contents = input_api.ReadFile(f, 'rb')
249 match = re.search(r'namespace\s*viz\s*{', contents)
250 if match:
251 whitelist = []
252 if FindNamespaceInBlock(match.end(), 'viz', contents, whitelist=whitelist) :
253 errors.append(f.LocalPath())
254
255 if errors:
256 return [output_api.PresubmitError(
257 'Do not use viz:: inside of the viz namespace.',
258 items=errors)]
259 return []
260
261 def CheckForUseOfWrongClock(input_api,
262 output_api,
263 white_list=VIZ_SOURCE_FILES,
264 black_list=None):
265 """Make sure new lines of code don't use a clock susceptible to skew."""
266 black_list = tuple(black_list or input_api.DEFAULT_BLACK_LIST)
267 source_file_filter = lambda x: input_api.FilterSourceFile(x,
268 white_list,
269 black_list)
270 # Regular expression that should detect any explicit references to the
271 # base::Time type (or base::Clock/DefaultClock), whether in using decls,
272 # typedefs, or to call static methods.
273 base_time_type_pattern = r'(^|\W)base::(Time|Clock|DefaultClock)(\W|$)'
274
275 # Regular expression that should detect references to the base::Time class
276 # members, such as a call to base::Time::Now.
277 base_time_member_pattern = r'(^|\W)(Time|Clock|DefaultClock)::'
278
279 # Regular expression to detect "using base::Time" declarations. We want to
280 # prevent these from triggerring a warning. For example, it's perfectly
281 # reasonable for code to be written like this:
282 #
283 # using base::Time;
284 # ...
285 # int64 foo_us = foo_s * Time::kMicrosecondsPerSecond;
286 using_base_time_decl_pattern = r'^\s*using\s+(::)?base::Time\s*;'
287
288 # Regular expression to detect references to the kXXX constants in the
289 # base::Time class. We want to prevent these from triggerring a warning.
290 base_time_konstant_pattern = r'(^|\W)Time::k\w+'
291
292 problem_re = input_api.re.compile(
293 r'(' + base_time_type_pattern + r')|(' + base_time_member_pattern + r')')
294 exception_re = input_api.re.compile(
295 r'(' + using_base_time_decl_pattern + r')|(' +
296 base_time_konstant_pattern + r')')
297 problems = []
298 for f in input_api.AffectedSourceFiles(source_file_filter):
299 for line_number, line in f.ChangedContents():
300 if problem_re.search(line):
301 if not exception_re.search(line):
302 problems.append(
303 ' %s:%d\n %s' % (f.LocalPath(), line_number, line.strip()))
304
305 if problems:
306 return [output_api.PresubmitPromptOrNotify(
307 'You added one or more references to the base::Time class and/or one\n'
308 'of its member functions (or base::Clock/DefaultClock). In cc code,\n'
309 'it is most certainly incorrect! Instead use base::TimeTicks.\n\n'
310 '\n'.join(problems))]
311 else:
312 return []
313
314 def CheckChangeOnUpload(input_api, output_api):
315 results = []
316 results += CheckAsserts(input_api, output_api)
317 results += CheckStdAbs(input_api, output_api)
318 results += CheckPassByValue(input_api, output_api)
319 results += CheckChangeLintsClean(input_api, output_api)
320 results += CheckTodos(input_api, output_api)
321 results += CheckDoubleAngles(input_api, output_api)
322 results += CheckUniquePtr(input_api, output_api)
323 results += CheckNamespace(input_api, output_api)
324 results += CheckForUseOfWrongClock(input_api, output_api)
325 results += FindUselessIfdefs(input_api, output_api)
326 return results
OLDNEW
« components/viz/OWNERS ('K') | « components/viz/OWNERS ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698