mirror of https://github.com/zulip/zulip.git
219 lines
7.1 KiB
Python
Executable File
219 lines
7.1 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
import argparse
|
|
import os
|
|
import random
|
|
import sys
|
|
|
|
# check for the venv
|
|
from lib import sanity_check
|
|
|
|
sanity_check.check_venv(__file__)
|
|
|
|
from zulint.command import LinterConfig, add_default_linter_arguments
|
|
|
|
from linter_lib.custom_check import non_py_rules, python_rules
|
|
|
|
|
|
def run() -> None:
|
|
parser = argparse.ArgumentParser()
|
|
parser.add_argument("--force", action="store_true", help="Run tests despite possible problems.")
|
|
parser.add_argument("--full", action="store_true", help="Check some things we typically ignore")
|
|
add_default_linter_arguments(parser)
|
|
args = parser.parse_args()
|
|
|
|
tools_dir = os.path.dirname(os.path.abspath(__file__))
|
|
root_dir = os.path.dirname(tools_dir)
|
|
sys.path.insert(0, root_dir)
|
|
|
|
from tools.lib.test_script import assert_provisioning_status_ok
|
|
from tools.linter_lib.exclude import EXCLUDED_FILES, PUPPET_CHECK_RULES_TO_EXCLUDE
|
|
from tools.linter_lib.pep8 import check_pep8
|
|
from tools.linter_lib.pyflakes import check_pyflakes
|
|
|
|
os.chdir(root_dir)
|
|
|
|
assert_provisioning_status_ok(args.force)
|
|
|
|
# Invoke the appropriate lint checker for each language,
|
|
# and also check files for extra whitespace.
|
|
|
|
linter_config = LinterConfig(args)
|
|
|
|
by_lang = linter_config.list_files(
|
|
groups={
|
|
"backend": ["py", "sh", "pp", "json", "md", "txt", "text", "yaml", "rst", "yml"],
|
|
"frontend": ["js", "ts", "css", "hbs", "html", "lock"],
|
|
},
|
|
exclude=EXCLUDED_FILES,
|
|
)
|
|
|
|
linter_config.external_linter(
|
|
"css",
|
|
["node", "node_modules/.bin/stylelint"],
|
|
["css"],
|
|
fix_arg="--fix",
|
|
description="Standard CSS style and formatting linter (config: stylelint.config.js)",
|
|
)
|
|
linter_config.external_linter(
|
|
"eslint",
|
|
["node", "node_modules/.bin/eslint", "--max-warnings=0", "--cache", "--ext", ".js,.ts"],
|
|
["js", "ts"],
|
|
fix_arg="--fix",
|
|
description="Standard JavaScript style and formatting linter (config: .eslintrc).",
|
|
)
|
|
linter_config.external_linter(
|
|
"puppet",
|
|
["puppet", "parser", "validate"],
|
|
["pp"],
|
|
description="Runs the puppet parser validator, checking for syntax errors.",
|
|
)
|
|
linter_config.external_linter(
|
|
"puppet-lint",
|
|
["puppet-lint", "--fail-on-warnings", *PUPPET_CHECK_RULES_TO_EXCLUDE],
|
|
["pp"],
|
|
fix_arg="--fix",
|
|
description="Standard puppet linter (config: tools/linter_lib/exclude.py)",
|
|
)
|
|
linter_config.external_linter(
|
|
"templates",
|
|
["tools/check-templates"],
|
|
["hbs", "html"],
|
|
description="Custom linter checks whitespace formatting of HTML templates",
|
|
fix_arg="--fix",
|
|
)
|
|
linter_config.external_linter(
|
|
"openapi",
|
|
["node", "tools/check-openapi"],
|
|
["yaml"],
|
|
description="Validates our OpenAPI/Swagger API documentation "
|
|
"(zerver/openapi/zulip.yaml) ",
|
|
)
|
|
linter_config.external_linter(
|
|
"shellcheck",
|
|
["shellcheck", "-x", "-P", "SCRIPTDIR"],
|
|
["sh"],
|
|
description="Standard shell script linter",
|
|
)
|
|
linter_config.external_linter(
|
|
"shfmt",
|
|
["shfmt"],
|
|
["sh"],
|
|
check_arg="-d",
|
|
fix_arg="-w",
|
|
description="Formats shell scripts",
|
|
)
|
|
command = ["tools/run-mypy", "--quiet"]
|
|
if args.force:
|
|
command.append("--force")
|
|
linter_config.external_linter(
|
|
"mypy",
|
|
command,
|
|
["py"],
|
|
pass_targets=False,
|
|
description="Static type checker for Python (config: mypy.ini)",
|
|
)
|
|
linter_config.external_linter(
|
|
"tsc",
|
|
["tools/run-tsc"],
|
|
["ts"],
|
|
pass_targets=False,
|
|
description="TypeScript compiler (config: tsconfig.json)",
|
|
)
|
|
linter_config.external_linter(
|
|
"yarn-deduplicate",
|
|
["tools/run-yarn-deduplicate"],
|
|
["lock"],
|
|
pass_targets=False,
|
|
description="Shares duplicate packages in yarn.lock",
|
|
)
|
|
linter_config.external_linter(
|
|
"gitlint",
|
|
["tools/commit-message-lint"],
|
|
description="Checks commit messages for common formatting errors (config: .gitlint)",
|
|
)
|
|
linter_config.external_linter(
|
|
"isort",
|
|
["isort"],
|
|
["py"],
|
|
description="Sorts Python import statements",
|
|
check_arg=["--check-only", "--diff"],
|
|
)
|
|
linter_config.external_linter(
|
|
"prettier",
|
|
["node_modules/.bin/prettier", "--check", "--loglevel=warn"],
|
|
["css", "js", "json", "ts", "yaml", "yml"],
|
|
fix_arg=["--write"],
|
|
description="Formats CSS, JavaScript, YAML",
|
|
)
|
|
|
|
semgrep_command = [
|
|
"semgrep",
|
|
"--config=./tools/semgrep.yml",
|
|
"--error",
|
|
"--disable-version-check",
|
|
"--quiet",
|
|
# This option is dangerous in the context of running
|
|
# semgrep-as-a-service on untrusted user code, since it
|
|
# causes Python code in the rules configuration to be
|
|
# executed. From our standpoint, it is required for
|
|
# `pattern-where-python` rules, and there's no real
|
|
# security impact, since if you can put arbitrary code
|
|
# into zulip.git, you can run arbitrary code in a Zulip
|
|
# development environment anyway.
|
|
"--dangerously-allow-arbitrary-code-execution-from-rules",
|
|
]
|
|
linter_config.external_linter(
|
|
"semgrep-py",
|
|
[*semgrep_command, "--lang=python"],
|
|
["py"],
|
|
fix_arg="--autofix",
|
|
description="Syntactic Grep (semgrep) Code Search Tool (config: ./tools/semgrep.yml)",
|
|
)
|
|
|
|
linter_config.external_linter(
|
|
"thirdparty",
|
|
["tools/check-thirdparty"],
|
|
description="Check docs/THIRDPARTY copyright file syntax",
|
|
)
|
|
|
|
@linter_config.lint
|
|
def custom_py() -> int:
|
|
"""Runs custom checks for python files (config: tools/linter_lib/custom_check.py)"""
|
|
failed = python_rules.check(by_lang, verbose=args.verbose)
|
|
return 1 if failed else 0
|
|
|
|
@linter_config.lint
|
|
def custom_nonpy() -> int:
|
|
"""Runs custom checks for non-python files (config: tools/linter_lib/custom_check.py)"""
|
|
failed = False
|
|
for rule in non_py_rules:
|
|
failed = failed or rule.check(by_lang, verbose=args.verbose)
|
|
return 1 if failed else 0
|
|
|
|
@linter_config.lint
|
|
def pyflakes() -> int:
|
|
"""Standard Python bug and code smell linter (config: tools/linter_lib/pyflakes.py)"""
|
|
failed = check_pyflakes(by_lang["py"], args)
|
|
return 1 if failed else 0
|
|
|
|
python_part1 = {x for x in by_lang["py"] if random.randint(0, 1) == 0}
|
|
python_part2 = {y for y in by_lang["py"] if y not in python_part1}
|
|
|
|
@linter_config.lint
|
|
def pep8_1of2() -> int:
|
|
"""Standard Python style linter on 50% of files (config: setup.cfg)"""
|
|
failed = check_pep8(list(python_part1))
|
|
return 1 if failed else 0
|
|
|
|
@linter_config.lint
|
|
def pep8_2of2() -> int:
|
|
"""Standard Python style linter on other 50% of files (config: setup.cfg)"""
|
|
failed = check_pep8(list(python_part2))
|
|
return 1 if failed else 0
|
|
|
|
linter_config.do_lint()
|
|
|
|
|
|
if __name__ == "__main__":
|
|
run()
|