Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(42)

Unified Diff: tools/checkdeps/checkdeps_test.py

Issue 320043002: Revert of Remove now obsolete checkdeps copy (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « tools/checkdeps/checkdeps.py ('k') | tools/checkdeps/cpp_checker.py » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: tools/checkdeps/checkdeps_test.py
diff --git a/tools/checkdeps/checkdeps_test.py b/tools/checkdeps/checkdeps_test.py
new file mode 100755
index 0000000000000000000000000000000000000000..e8835a5ca8f455f55d7aa7ee917afdefe9148ba2
--- /dev/null
+++ b/tools/checkdeps/checkdeps_test.py
@@ -0,0 +1,177 @@
+#!/usr/bin/env python
+# Copyright (c) 2012 The Chromium Authors. All rights reserved.
+# Use of this source code is governed by a BSD-style license that can be
+# found in the LICENSE file.
+
+"""Tests for checkdeps.
+"""
+
+import os
+import unittest
+
+
+import checkdeps
+import results
+
+
+class CheckDepsTest(unittest.TestCase):
+
+ def setUp(self):
+ self.deps_checker = checkdeps.DepsChecker(being_tested=True)
+
+ def ImplTestRegularCheckDepsRun(self, ignore_temp_rules, skip_tests):
+ self.deps_checker._ignore_temp_rules = ignore_temp_rules
+ self.deps_checker._skip_tests = skip_tests
+ self.deps_checker.CheckDirectory(
+ os.path.join(self.deps_checker.base_directory,
+ 'tools/checkdeps/testdata'))
+
+ problems = self.deps_checker.results_formatter.GetResults()
+ if skip_tests:
+ self.failUnlessEqual(3, len(problems))
+ else:
+ self.failUnlessEqual(4, len(problems))
+
+ def VerifySubstringsInProblems(key_path, substrings_in_sequence):
+ """Finds the problem in |problems| that contains |key_path|,
+ then verifies that each of |substrings_in_sequence| occurs in
+ that problem, in the order they appear in
+ |substrings_in_sequence|.
+ """
+ found = False
+ key_path = os.path.normpath(key_path)
+ for problem in problems:
+ index = problem.find(key_path)
+ if index != -1:
+ for substring in substrings_in_sequence:
+ index = problem.find(substring, index + 1)
+ self.failUnless(index != -1, '%s in %s' % (substring, problem))
+ found = True
+ break
+ if not found:
+ self.fail('Found no problem for file %s' % key_path)
+
+ if ignore_temp_rules:
+ VerifySubstringsInProblems('testdata/allowed/test.h',
+ ['-tools/checkdeps/testdata/disallowed',
+ 'temporarily_allowed.h',
+ '-third_party/explicitly_disallowed',
+ 'Because of no rule applying'])
+ else:
+ VerifySubstringsInProblems('testdata/allowed/test.h',
+ ['-tools/checkdeps/testdata/disallowed',
+ '-third_party/explicitly_disallowed',
+ 'Because of no rule applying'])
+
+ VerifySubstringsInProblems('testdata/disallowed/test.h',
+ ['-third_party/explicitly_disallowed',
+ 'Because of no rule applying',
+ 'Because of no rule applying'])
+ VerifySubstringsInProblems('disallowed/allowed/test.h',
+ ['-third_party/explicitly_disallowed',
+ 'Because of no rule applying',
+ 'Because of no rule applying'])
+
+ if not skip_tests:
+ VerifySubstringsInProblems('allowed/not_a_test.cc',
+ ['-tools/checkdeps/testdata/disallowed'])
+
+ def testRegularCheckDepsRun(self):
+ self.ImplTestRegularCheckDepsRun(False, False)
+
+ def testRegularCheckDepsRunIgnoringTempRules(self):
+ self.ImplTestRegularCheckDepsRun(True, False)
+
+ def testRegularCheckDepsRunSkipTests(self):
+ self.ImplTestRegularCheckDepsRun(False, True)
+
+ def testRegularCheckDepsRunIgnoringTempRulesSkipTests(self):
+ self.ImplTestRegularCheckDepsRun(True, True)
+
+ def CountViolations(self, ignore_temp_rules):
+ self.deps_checker._ignore_temp_rules = ignore_temp_rules
+ self.deps_checker.results_formatter = results.CountViolationsFormatter()
+ self.deps_checker.CheckDirectory(
+ os.path.join(self.deps_checker.base_directory,
+ 'tools/checkdeps/testdata'))
+ return self.deps_checker.results_formatter.GetResults()
+
+ def testCountViolations(self):
+ self.failUnlessEqual('10', self.CountViolations(False))
+
+ def testCountViolationsIgnoringTempRules(self):
+ self.failUnlessEqual('11', self.CountViolations(True))
+
+ def testTempRulesGenerator(self):
+ self.deps_checker.results_formatter = results.TemporaryRulesFormatter()
+ self.deps_checker.CheckDirectory(
+ os.path.join(self.deps_checker.base_directory,
+ 'tools/checkdeps/testdata/allowed'))
+ temp_rules = self.deps_checker.results_formatter.GetResults()
+ expected = [u' "!third_party/explicitly_disallowed/bad.h",',
+ u' "!third_party/no_rule/bad.h",',
+ u' "!tools/checkdeps/testdata/disallowed/bad.h",',
+ u' "!tools/checkdeps/testdata/disallowed/teststuff/bad.h",']
+ self.failUnlessEqual(expected, temp_rules)
+
+ def testCheckAddedIncludesAllGood(self):
+ problems = self.deps_checker.CheckAddedCppIncludes(
+ [['tools/checkdeps/testdata/allowed/test.cc',
+ ['#include "tools/checkdeps/testdata/allowed/good.h"',
+ '#include "tools/checkdeps/testdata/disallowed/allowed/good.h"']
+ ]])
+ self.failIf(problems)
+
+ def testCheckAddedIncludesManyGarbageLines(self):
+ garbage_lines = ["My name is Sam%d\n" % num for num in range(50)]
+ problems = self.deps_checker.CheckAddedCppIncludes(
+ [['tools/checkdeps/testdata/allowed/test.cc', garbage_lines]])
+ self.failIf(problems)
+
+ def testCheckAddedIncludesNoRule(self):
+ problems = self.deps_checker.CheckAddedCppIncludes(
+ [['tools/checkdeps/testdata/allowed/test.cc',
+ ['#include "no_rule_for_this/nogood.h"']
+ ]])
+ self.failUnless(problems)
+
+ def testCheckAddedIncludesSkippedDirectory(self):
+ problems = self.deps_checker.CheckAddedCppIncludes(
+ [['tools/checkdeps/testdata/disallowed/allowed/skipped/test.cc',
+ ['#include "whatever/whocares.h"']
+ ]])
+ self.failIf(problems)
+
+ def testCheckAddedIncludesTempAllowed(self):
+ problems = self.deps_checker.CheckAddedCppIncludes(
+ [['tools/checkdeps/testdata/allowed/test.cc',
+ ['#include "tools/checkdeps/testdata/disallowed/temporarily_allowed.h"']
+ ]])
+ self.failUnless(problems)
+
+ def testCopyIsDeep(self):
+ # Regression test for a bug where we were making shallow copies of
+ # Rules objects and therefore all Rules objects shared the same
+ # dictionary for specific rules.
+ #
+ # The first pair should bring in a rule from testdata/allowed/DEPS
+ # into that global dictionary that allows the
+ # temp_allowed_for_tests.h file to be included in files ending
+ # with _unittest.cc, and the second pair should completely fail
+ # once the bug is fixed, but succeed (with a temporary allowance)
+ # if the bug is in place.
+ problems = self.deps_checker.CheckAddedCppIncludes(
+ [['tools/checkdeps/testdata/allowed/test.cc',
+ ['#include "tools/checkdeps/testdata/disallowed/temporarily_allowed.h"']
+ ],
+ ['tools/checkdeps/testdata/disallowed/foo_unittest.cc',
+ ['#include "tools/checkdeps/testdata/bongo/temp_allowed_for_tests.h"']
+ ]])
+ # With the bug in place, there would be two problems reported, and
+ # the second would be for foo_unittest.cc.
+ self.failUnless(len(problems) == 1)
+ self.failUnless(problems[0][0].endswith('/test.cc'))
+
+
+if __name__ == '__main__':
+ unittest.main()
« no previous file with comments | « tools/checkdeps/checkdeps.py ('k') | tools/checkdeps/cpp_checker.py » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698