Index: tools/checkdeps/checkdeps.py |
diff --git a/tools/checkdeps/checkdeps.py b/tools/checkdeps/checkdeps.py |
new file mode 100755 |
index 0000000000000000000000000000000000000000..5bf79076063b98d5293616292d4b9157b7044196 |
--- /dev/null |
+++ b/tools/checkdeps/checkdeps.py |
@@ -0,0 +1,237 @@ |
+#!/usr/bin/env python |
+# Copyright 2012 The Chromium Authors. All rights reserved. |
+# Use of this source code is governed by a BSD-style license that can be |
+# found in the LICENSE file. |
+ |
+"""Makes sure that files include headers from allowed directories. |
+ |
+Checks DEPS files in the source tree for rules, and applies those rules to |
+"#include" and "import" directives in the .cpp and .java source files. |
+Any source file including something not permitted by the DEPS files will fail. |
+ |
+See builddeps.py for a detailed description of the DEPS format. |
+""" |
+ |
+import os |
+import optparse |
+import re |
+import sys |
+ |
+import cpp_checker |
+import java_checker |
+import results |
+ |
+from builddeps import DepsBuilder |
+from rules import Rule, Rules |
+ |
+ |
+def _IsTestFile(filename): |
+ """Does a rudimentary check to try to skip test files; this could be |
+ improved but is good enough for now. |
+ """ |
+ return re.match('(test|mock|dummy)_.*|.*_[a-z]*test\.(cc|mm|java)', filename) |
+ |
+ |
+class DepsChecker(DepsBuilder): |
+ """Parses include_rules from DEPS files and verifies files in the |
+ source tree against them. |
+ """ |
+ |
+ def __init__(self, |
+ base_directory=None, |
+ verbose=False, |
+ being_tested=False, |
+ ignore_temp_rules=False, |
+ skip_tests=False): |
+ """Creates a new DepsChecker. |
+ |
+ Args: |
+ base_directory: OS-compatible path to root of checkout, e.g. C:\chr\src. |
+ verbose: Set to true for debug output. |
+ being_tested: Set to true to ignore the DEPS file at tools/checkdeps/DEPS. |
+ ignore_temp_rules: Ignore rules that start with Rule.TEMP_ALLOW ("!"). |
+ """ |
+ DepsBuilder.__init__( |
+ self, base_directory, verbose, being_tested, ignore_temp_rules) |
+ |
+ self._skip_tests = skip_tests |
+ self.results_formatter = results.NormalResultsFormatter(verbose) |
+ |
+ def Report(self): |
+ """Prints a report of results, and returns an exit code for the process.""" |
+ if self.results_formatter.GetResults(): |
+ self.results_formatter.PrintResults() |
+ return 1 |
+ print '\nSUCCESS\n' |
+ return 0 |
+ |
+ def CheckDirectory(self, start_dir): |
+ """Checks all relevant source files in the specified directory and |
+ its subdirectories for compliance with DEPS rules throughout the |
+ tree (starting at |self.base_directory|). |start_dir| must be a |
+ subdirectory of |self.base_directory|. |
+ |
+ On completion, self.results_formatter has the results of |
+ processing, and calling Report() will print a report of results. |
+ """ |
+ java = java_checker.JavaChecker(self.base_directory, self.verbose) |
+ cpp = cpp_checker.CppChecker(self.verbose) |
+ checkers = dict( |
+ (extension, checker) |
+ for checker in [java, cpp] for extension in checker.EXTENSIONS) |
+ self._CheckDirectoryImpl(checkers, start_dir) |
+ |
+ def _CheckDirectoryImpl(self, checkers, dir_name): |
+ rules = self.GetDirectoryRules(dir_name) |
+ if rules is None: |
+ return |
+ |
+ # Collect a list of all files and directories to check. |
+ files_to_check = [] |
+ dirs_to_check = [] |
+ contents = sorted(os.listdir(dir_name)) |
+ for cur in contents: |
+ full_name = os.path.join(dir_name, cur) |
+ if os.path.isdir(full_name): |
+ dirs_to_check.append(full_name) |
+ elif os.path.splitext(full_name)[1] in checkers: |
+ if not self._skip_tests or not _IsTestFile(cur): |
+ files_to_check.append(full_name) |
+ |
+ # First check all files in this directory. |
+ for cur in files_to_check: |
+ checker = checkers[os.path.splitext(cur)[1]] |
+ file_status = checker.CheckFile(rules, cur) |
+ if file_status.HasViolations(): |
+ self.results_formatter.AddError(file_status) |
+ |
+ # Next recurse into the subdirectories. |
+ for cur in dirs_to_check: |
+ self._CheckDirectoryImpl(checkers, cur) |
+ |
+ def CheckAddedCppIncludes(self, added_includes): |
+ """This is used from PRESUBMIT.py to check new #include statements added in |
+ the change being presubmit checked. |
+ |
+ Args: |
+ added_includes: ((file_path, (include_line, include_line, ...), ...) |
+ |
+ Return: |
+ A list of tuples, (bad_file_path, rule_type, rule_description) |
+ where rule_type is one of Rule.DISALLOW or Rule.TEMP_ALLOW and |
+ rule_description is human-readable. Empty if no problems. |
+ """ |
+ cpp = cpp_checker.CppChecker(self.verbose) |
+ problems = [] |
+ for file_path, include_lines in added_includes: |
+ if not cpp.IsCppFile(file_path): |
+ continue |
+ rules_for_file = self.GetDirectoryRules(os.path.dirname(file_path)) |
+ if not rules_for_file: |
+ continue |
+ for line in include_lines: |
+ is_include, violation = cpp.CheckLine( |
+ rules_for_file, line, file_path, True) |
+ if not violation: |
+ continue |
+ rule_type = violation.violated_rule.allow |
+ if rule_type == Rule.ALLOW: |
+ continue |
+ violation_text = results.NormalResultsFormatter.FormatViolation( |
+ violation, self.verbose) |
+ problems.append((file_path, rule_type, violation_text)) |
+ return problems |
+ |
+ |
+def PrintUsage(): |
+ print """Usage: python checkdeps.py [--root <root>] [tocheck] |
+ |
+ --root ROOT Specifies the repository root. This defaults to "../../.." |
+ relative to the script file. This will be correct given the |
+ normal location of the script in "<root>/tools/checkdeps". |
+ |
+ --(others) There are a few lesser-used options; run with --help to show them. |
+ |
+ tocheck Specifies the directory, relative to root, to check. This defaults |
+ to "." so it checks everything. |
+ |
+Examples: |
+ python checkdeps.py |
+ python checkdeps.py --root c:\\source chrome""" |
+ |
+ |
+def main(): |
+ option_parser = optparse.OptionParser() |
+ option_parser.add_option( |
+ '', '--root', |
+ default='', dest='base_directory', |
+ help='Specifies the repository root. This defaults ' |
+ 'to "../../.." relative to the script file, which ' |
+ 'will normally be the repository root.') |
+ option_parser.add_option( |
+ '', '--ignore-temp-rules', |
+ action='store_true', dest='ignore_temp_rules', default=False, |
+ help='Ignore !-prefixed (temporary) rules.') |
+ option_parser.add_option( |
+ '', '--generate-temp-rules', |
+ action='store_true', dest='generate_temp_rules', default=False, |
+ help='Print rules to temporarily allow files that fail ' |
+ 'dependency checking.') |
+ option_parser.add_option( |
+ '', '--count-violations', |
+ action='store_true', dest='count_violations', default=False, |
+ help='Count #includes in violation of intended rules.') |
+ option_parser.add_option( |
+ '', '--skip-tests', |
+ action='store_true', dest='skip_tests', default=False, |
+ help='Skip checking test files (best effort).') |
+ option_parser.add_option( |
+ '-v', '--verbose', |
+ action='store_true', default=False, |
+ help='Print debug logging') |
+ option_parser.add_option( |
+ '', '--json', |
+ help='Path to JSON output file') |
+ options, args = option_parser.parse_args() |
+ |
+ deps_checker = DepsChecker(options.base_directory, |
+ verbose=options.verbose, |
+ ignore_temp_rules=options.ignore_temp_rules, |
+ skip_tests=options.skip_tests) |
+ base_directory = deps_checker.base_directory # Default if needed, normalized |
+ |
+ # Figure out which directory we have to check. |
+ start_dir = base_directory |
+ if len(args) == 1: |
+ # Directory specified. Start here. It's supposed to be relative to the |
+ # base directory. |
+ start_dir = os.path.abspath(os.path.join(base_directory, args[0])) |
+ elif len(args) >= 2 or (options.generate_temp_rules and |
+ options.count_violations): |
+ # More than one argument, or incompatible flags, we don't handle this. |
+ PrintUsage() |
+ return 1 |
+ |
+ if not start_dir.startswith(deps_checker.base_directory): |
+ print 'Directory to check must be a subdirectory of the base directory,' |
+ print 'but %s is not a subdirectory of %s' % (start_dir, base_directory) |
+ return 1 |
+ |
+ print 'Using base directory:', base_directory |
+ print 'Checking:', start_dir |
+ |
+ if options.generate_temp_rules: |
+ deps_checker.results_formatter = results.TemporaryRulesFormatter() |
+ elif options.count_violations: |
+ deps_checker.results_formatter = results.CountViolationsFormatter() |
+ |
+ if options.json: |
+ deps_checker.results_formatter = results.JSONResultsFormatter( |
+ options.json, deps_checker.results_formatter) |
+ |
+ deps_checker.CheckDirectory(start_dir) |
+ return deps_checker.Report() |
+ |
+ |
+if '__main__' == __name__: |
+ sys.exit(main()) |