1 # Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file.
5 """Top-level presubmit script for cc.
7 See http://dev.chromium.org/developers/how-tos/depottools/presubmit-scripts for
8 details on the presubmit API built into gcl.
14 CC_SOURCE_FILES
=(r
'^cc/.*\.(cc|h)$',)
15 CC_PERF_TEST
=(r
'^.*_perftest.*\.(cc|h)$',)
17 def CheckChangeLintsClean(input_api
, output_api
):
18 input_api
.cpplint
._cpplint
_state
.ResetErrorCounts() # reset global state
19 source_filter
= lambda x
: input_api
.FilterSourceFile(
20 x
, white_list
=CC_SOURCE_FILES
, black_list
=None)
21 files
= [f
.AbsoluteLocalPath() for f
in
22 input_api
.AffectedSourceFiles(source_filter
)]
23 level
= 1 # strict, but just warn
25 for file_name
in files
:
26 input_api
.cpplint
.ProcessFile(file_name
, level
)
28 if not input_api
.cpplint
._cpplint
_state
.error_count
:
31 return [output_api
.PresubmitPromptWarning(
32 'Changelist failed cpplint.py check.')]
34 def CheckAsserts(input_api
, output_api
, white_list
=CC_SOURCE_FILES
, black_list
=None):
35 black_list
= tuple(black_list
or input_api
.DEFAULT_BLACK_LIST
)
36 source_file_filter
= lambda x
: input_api
.FilterSourceFile(x
, white_list
, black_list
)
41 for f
in input_api
.AffectedSourceFiles(source_file_filter
):
42 contents
= input_api
.ReadFile(f
, 'rb')
43 # WebKit ASSERT() is not allowed.
44 if re
.search(r
"\bASSERT\(", contents
):
45 assert_files
.append(f
.LocalPath())
46 # WebKit ASSERT_NOT_REACHED() is not allowed.
47 if re
.search(r
"ASSERT_NOT_REACHED\(", contents
):
48 notreached_files
.append(f
.LocalPath())
51 return [output_api
.PresubmitError(
52 'These files use ASSERT instead of using DCHECK:',
55 return [output_api
.PresubmitError(
56 'These files use ASSERT_NOT_REACHED instead of using NOTREACHED:',
57 items
=notreached_files
)]
60 def CheckStdAbs(input_api
, output_api
,
61 white_list
=CC_SOURCE_FILES
, black_list
=None):
62 black_list
= tuple(black_list
or input_api
.DEFAULT_BLACK_LIST
)
63 source_file_filter
= lambda x
: input_api
.FilterSourceFile(x
,
67 using_std_abs_files
= []
69 missing_std_prefix_files
= []
71 for f
in input_api
.AffectedSourceFiles(source_file_filter
):
72 contents
= input_api
.ReadFile(f
, 'rb')
73 if re
.search(r
"using std::f?abs;", contents
):
74 using_std_abs_files
.append(f
.LocalPath())
75 if re
.search(r
"\bfabsf?\(", contents
):
76 found_fabs_files
.append(f
.LocalPath());
77 # The following regular expression in words says:
78 # "if there is no 'std::' behind an 'abs(' or 'absf(',
79 # or if there is no 'std::' behind a 'fabs(' or 'fabsf(',
81 if re
.search(r
"((?<!std::)(\babsf?\()|(?<!std::)(\bfabsf?\())", contents
):
82 missing_std_prefix_files
.append(f
.LocalPath())
85 if using_std_abs_files
:
86 result
.append(output_api
.PresubmitError(
87 'These files have "using std::abs" which is not permitted.',
88 items
=using_std_abs_files
))
90 result
.append(output_api
.PresubmitError(
91 'std::abs() should be used instead of std::fabs() for consistency.',
92 items
=found_fabs_files
))
93 if missing_std_prefix_files
:
94 result
.append(output_api
.PresubmitError(
95 'These files use abs(), absf(), fabs(), or fabsf() without qualifying '
96 'the std namespace. Please use std::abs() in all places.',
97 items
=missing_std_prefix_files
))
100 def CheckSpamLogging(input_api
,
102 white_list
=CC_SOURCE_FILES
,
104 black_list
= tuple(black_list
or input_api
.DEFAULT_BLACK_LIST
)
105 source_file_filter
= lambda x
: input_api
.FilterSourceFile(x
,
112 for f
in input_api
.AffectedSourceFiles(source_file_filter
):
113 contents
= input_api
.ReadFile(f
, 'rb')
114 if re
.search(r
"\bD?LOG\s*\(\s*INFO\s*\)", contents
):
115 log_info
.append(f
.LocalPath())
116 if re
.search(r
"\bf?printf\(", contents
):
117 printf
.append(f
.LocalPath())
120 return [output_api
.PresubmitError(
121 'These files spam the console log with LOG(INFO):',
124 return [output_api
.PresubmitError(
125 'These files spam the console log with printf/fprintf:',
129 def CheckPassByValue(input_api
,
131 white_list
=CC_SOURCE_FILES
,
133 black_list
= tuple(black_list
or input_api
.DEFAULT_BLACK_LIST
)
134 source_file_filter
= lambda x
: input_api
.FilterSourceFile(x
,
140 # Well-defined simple classes containing only <= 4 ints, or <= 2 floats.
141 pass_by_value_types
= ['base::Time',
152 for f
in input_api
.AffectedSourceFiles(source_file_filter
):
153 contents
= input_api
.ReadFile(f
, 'rb')
155 r
'\bconst +' + '(?P<type>(%s))&' %
156 string
.join(pass_by_value_types
, '|'),
159 local_errors
.append(output_api
.PresubmitError(
160 '%s passes %s by const ref instead of by value.' %
161 (f
.LocalPath(), match
.group('type'))))
164 def CheckTodos(input_api
, output_api
):
167 source_file_filter
= lambda x
: x
168 for f
in input_api
.AffectedSourceFiles(source_file_filter
):
169 contents
= input_api
.ReadFile(f
, 'rb')
170 if ('FIX'+'ME') in contents
:
171 errors
.append(f
.LocalPath())
174 return [output_api
.PresubmitError(
175 'All TODO comments should be of the form TODO(name).',
180 def CheckChangeOnUpload(input_api
, output_api
):
182 results
+= CheckAsserts(input_api
, output_api
)
183 results
+= CheckStdAbs(input_api
, output_api
)
184 results
+= CheckSpamLogging(input_api
, output_api
, black_list
=CC_PERF_TEST
)
185 results
+= CheckPassByValue(input_api
, output_api
)
186 results
+= CheckChangeLintsClean(input_api
, output_api
)
187 results
+= CheckTodos(input_api
, output_api
)
190 def GetPreferredTrySlaves(project
, change
):