Lines Matching refs:input_api
221 def _CheckNoProductionCodeUsingTestOnlyFunctions(input_api, output_api):
233 inclusion_pattern = input_api.re.compile(r'(%s)\s*\(' % base_function_pattern)
234 comment_pattern = input_api.re.compile(r'//.*%s' % base_function_pattern)
235 exclusion_pattern = input_api.re.compile(
242 input_api.DEFAULT_BLACK_LIST)
243 return input_api.FilterSourceFile(
249 for f in input_api.AffectedSourceFiles(FilterFile):
251 lines = input_api.ReadFile(f).splitlines()
267 def _CheckNoIOStreamInHeaders(input_api, output_api):
270 pattern = input_api.re.compile(r'^#include\s*<iostream>',
271 input_api.re.MULTILINE)
272 for f in input_api.AffectedSourceFiles(input_api.FilterSourceFile):
275 contents = input_api.ReadFile(f)
288 def _CheckNoUNIT_TESTInSourceFiles(input_api, output_api):
291 for f in input_api.AffectedFiles():
305 def _CheckNoNewWStrings(input_api, output_api):
308 for f in input_api.AffectedFiles():
331 def _CheckNoDEPSGIT(input_api, output_api):
334 input_api.AffectedFiles()):
344 def _CheckNoBannedFunctions(input_api, output_api):
350 for f in input_api.AffectedFiles(file_filter=file_filter):
362 for f in input_api.AffectedFiles(file_filter=file_filter):
368 if input_api.re.match(item, local_path):
391 def _CheckNoPragmaOnce(input_api, output_api):
394 pattern = input_api.re.compile(r'^#pragma\s+once',
395 input_api.re.MULTILINE)
396 for f in input_api.AffectedSourceFiles(input_api.FilterSourceFile):
399 contents = input_api.ReadFile(f)
411 def _CheckNoTrinaryTrueFalse(input_api, output_api):
414 pattern = input_api.re.compile(r'\?\s*(true|false)\s*:\s*(true|false)')
415 for f in input_api.AffectedFiles():
430 def _CheckUnwantedDependencies(input_api, output_api):
435 # We need to wait until we have an input_api object and use this
440 sys.path = sys.path + [input_api.os_path.join(
441 input_api.PresubmitLocalPath(), 'tools', 'checkdeps')]
450 for f in input_api.AffectedFiles():
457 deps_checker = checkdeps.DepsChecker(input_api.PresubmitLocalPath())
483 def _CheckFilePermissions(input_api, output_api):
486 input_api.change.RepositoryRoot()]
487 for f in input_api.AffectedFiles():
499 def _CheckNoAuraWindowPropertyHInHeaders(input_api, output_api):
503 pattern = input_api.re.compile(r'^#include\s*"ui/aura/window_property.h"')
505 for f in input_api.AffectedFiles():
519 def _CheckIncludeOrderForScope(scope, input_api, file_path, changed_linenums):
527 c_system_include_pattern = input_api.re.compile(r'\s*#include <.*\.h>')
528 cpp_system_include_pattern = input_api.re.compile(r'\s*#include <.*>')
529 custom_include_pattern = input_api.re.compile(r'\s*#include ".*')
568 def _CheckIncludeOrderInFile(input_api, f, changed_linenums):
571 system_include_pattern = input_api.re.compile(r'\s*#include \<.*')
574 excluded_include_pattern = input_api.re.compile(r'\s*#include \<.*/.*')
575 custom_include_pattern = input_api.re.compile(r'\s*#include "(?P<FILE>.*)"')
576 if_pattern = input_api.re.compile(
580 uncheckable_includes_pattern = input_api.re.compile(
602 header_basename = input_api.os_path.basename(
604 if header_basename not in input_api.os_path.basename(f.LocalPath()):
627 warnings.extend(_CheckIncludeOrderForScope(scope, input_api, f.LocalPath(),
632 def _CheckIncludeOrder(input_api, output_api):
645 for f in input_api.AffectedFiles():
648 warnings.extend(_CheckIncludeOrderInFile(input_api, f, changed_linenums))
657 def _CheckForVersionControlConflictsInFile(input_api, f):
658 pattern = input_api.re.compile('^(?:<<<<<<<|>>>>>>>) |^=======$')
666 def _CheckForVersionControlConflicts(input_api, output_api):
669 for f in input_api.AffectedFiles():
670 errors.extend(_CheckForVersionControlConflictsInFile(input_api, f))
679 def _CheckHardcodedGoogleHostsInLowerLayers(input_api, output_api):
681 """Filter function for use with input_api.AffectedSourceFiles,
686 return input_api.FilterSourceFile(
691 input_api.DEFAULT_BLACK_LIST))
694 comment_pattern = input_api.re.compile('//.*%s' % base_pattern)
695 pattern = input_api.re.compile(base_pattern)
697 for f in input_api.AffectedSourceFiles(FilterFile):
712 def _CheckNoAbbreviationInPngFileName(input_api, output_api):
715 pattern = input_api.re.compile(r'.*_[a-z]_.*\.png$|.*_[a-z]\.png$')
717 for f in input_api.AffectedFiles(include_deletes=False):
750 def _CheckAddedDepsHaveTargetApprovals(input_api, output_api):
757 for f in input_api.AffectedFiles():
758 filename = input_api.os_path.basename(f.LocalPath())
766 virtual_depended_on_files = _DepsFilesToCheck(input_api.re, changed_lines)
770 if input_api.is_committing:
771 if input_api.tbr:
774 if not input_api.change.issue:
782 owners_db = input_api.owners_db
783 owner_email, reviewers = input_api.canned_checks._RietveldOwnerAndReviewers(
784 input_api,
786 approval_needed=input_api.is_committing)
788 owner_email = owner_email or input_api.change.author_email
802 if not input_api.is_committing:
812 def _CommonChecks(input_api, output_api):
815 results.extend(input_api.canned_checks.PanProjectChecks(
816 input_api, output_api, excluded_paths=_EXCLUDED_PATHS))
817 results.extend(_CheckAuthorizedAuthor(input_api, output_api))
819 _CheckNoProductionCodeUsingTestOnlyFunctions(input_api, output_api))
820 results.extend(_CheckNoIOStreamInHeaders(input_api, output_api))
821 results.extend(_CheckNoUNIT_TESTInSourceFiles(input_api, output_api))
822 results.extend(_CheckNoNewWStrings(input_api, output_api))
823 results.extend(_CheckNoDEPSGIT(input_api, output_api))
824 results.extend(_CheckNoBannedFunctions(input_api, output_api))
825 results.extend(_CheckNoPragmaOnce(input_api, output_api))
826 results.extend(_CheckNoTrinaryTrueFalse(input_api, output_api))
827 results.extend(_CheckUnwantedDependencies(input_api, output_api))
828 results.extend(_CheckFilePermissions(input_api, output_api))
829 results.extend(_CheckNoAuraWindowPropertyHInHeaders(input_api, output_api))
830 results.extend(_CheckIncludeOrder(input_api, output_api))
831 results.extend(_CheckForVersionControlConflicts(input_api, output_api))
832 results.extend(_CheckPatchFiles(input_api, output_api))
833 results.extend(_CheckHardcodedGoogleHostsInLowerLayers(input_api, output_api))
834 results.extend(_CheckNoAbbreviationInPngFileName(input_api, output_api))
835 results.extend(_CheckForInvalidOSMacros(input_api, output_api))
836 results.extend(_CheckAddedDepsHaveTargetApprovals(input_api, output_api))
838 input_api.canned_checks.CheckChangeHasNoTabs(
839 input_api,
843 if any('PRESUBMIT.py' == f.LocalPath() for f in input_api.AffectedFiles()):
844 results.extend(input_api.canned_checks.RunUnitTestsInDirectory(
845 input_api, output_api,
846 input_api.PresubmitLocalPath(),
851 def _CheckSubversionConfig(input_api, output_api):
856 join = input_api.os_path.join
857 if input_api.platform == 'win32':
858 appdata = input_api.environ.get('APPDATA', '')
863 home = input_api.environ.get('HOME', '')
895 def _CheckAuthorizedAuthor(input_api, output_api):
899 # TODO(maruel): Add it to input_api?
902 author = input_api.change.author_email
904 input_api.logging.info('No author, skipping AUTHOR check')
906 authors_path = input_api.os_path.join(
907 input_api.PresubmitLocalPath(), 'AUTHORS')
909 input_api.re.match(r'[^#]+\s+\<(.+?)\>\s*$', line)
913 input_api.logging.info('Valid authors are %s', ', '.join(valid_authors))
924 def _CheckPatchFiles(input_api, output_api):
925 problems = [f.LocalPath() for f in input_api.AffectedFiles()
951 def _CheckForInvalidOSMacrosInFile(input_api, f):
953 preprocessor_statement = input_api.re.compile(r'^\s*#')
954 os_macro = input_api.re.compile(r'defined\((OS_[^)]+)\)')
969 def _CheckForInvalidOSMacros(input_api, output_api):
972 for f in input_api.AffectedFiles():
974 bad_macros.extend(_CheckForInvalidOSMacrosInFile(input_api, f))
984 def CheckChangeOnUpload(input_api, output_api):
986 results.extend(_CommonChecks(input_api, output_api))
990 def CheckChangeOnCommit(input_api, output_api):
992 results.extend(_CommonChecks(input_api, output_api))
994 #results.extend(input_api.canned_checks.CheckSvnModifiedDirectories(
995 # input_api, output_api, sources))
997 results.extend(input_api.canned_checks.CheckTreeIsOpen(
998 input_api,
1001 results.extend(input_api.canned_checks.CheckRietveldTryJobExecution(input_api,
1006 results.extend(input_api.canned_checks.CheckChangeHasBugField(
1007 input_api, output_api))
1008 results.extend(input_api.canned_checks.CheckChangeHasDescription(
1009 input_api, output_api))
1010 results.extend(_CheckSubversionConfig(input_api, output_api))