diff options
Diffstat (limited to 'chromium/tools/checkperms')
-rw-r--r-- | chromium/tools/checkperms/OWNERS | 1 | ||||
-rw-r--r-- | chromium/tools/checkperms/PRESUBMIT.py | 27 | ||||
-rwxr-xr-x | chromium/tools/checkperms/checkperms.py | 508 |
3 files changed, 536 insertions, 0 deletions
diff --git a/chromium/tools/checkperms/OWNERS b/chromium/tools/checkperms/OWNERS new file mode 100644 index 00000000000..1967bf567e8 --- /dev/null +++ b/chromium/tools/checkperms/OWNERS @@ -0,0 +1 @@ +thestig@chromium.org diff --git a/chromium/tools/checkperms/PRESUBMIT.py b/chromium/tools/checkperms/PRESUBMIT.py new file mode 100644 index 00000000000..c2f93567da3 --- /dev/null +++ b/chromium/tools/checkperms/PRESUBMIT.py @@ -0,0 +1,27 @@ +# Copyright (c) 2012 The Chromium Authors. All rights reserved. +# Use of this source code is governed by a BSD-style license that can be +# found in the LICENSE file. + +"""Top-level presubmit script for checkperms. + +See http://dev.chromium.org/developers/how-tos/depottools/presubmit-scripts for +details on the presubmit API built into gcl. +""" + + +def CommonChecks(input_api, output_api): + output = [] + output.extend(input_api.canned_checks.RunPylint(input_api, output_api)) + # Run it like if it were a unit test. + output.extend( + input_api.canned_checks.RunUnitTests( + input_api, output_api, ['./checkperms.py'])) + return output + + +def CheckChangeOnUpload(input_api, output_api): + return CommonChecks(input_api, output_api) + + +def CheckChangeOnCommit(input_api, output_api): + return CommonChecks(input_api, output_api) diff --git a/chromium/tools/checkperms/checkperms.py b/chromium/tools/checkperms/checkperms.py new file mode 100755 index 00000000000..f07103e3797 --- /dev/null +++ b/chromium/tools/checkperms/checkperms.py @@ -0,0 +1,508 @@ +#!/usr/bin/env python +# Copyright (c) 2012 The Chromium Authors. All rights reserved. +# Use of this source code is governed by a BSD-style license that can be +# found in the LICENSE file. + +"""Makes sure files have the right permissions. + +Some developers have broken SCM configurations that flip the svn:executable +permission on for no good reason. Unix developers who run ls --color will then +see .cc files in green and get confused. + +- For file extensions that must be executable, add it to EXECUTABLE_EXTENSIONS. +- For file extensions that must not be executable, add it to + NOT_EXECUTABLE_EXTENSIONS. +- To ignore all the files inside a directory, add it to IGNORED_PATHS. +- For file base name with ambiguous state and that should not be checked for + shebang, add it to IGNORED_FILENAMES. + +Any file not matching the above will be opened and looked if it has a shebang. +It this doesn't match the executable bit on the file, the file will be flagged. + +Note that all directory separators must be slashes (Unix-style) and not +backslashes. All directories should be relative to the source root and all +file paths should be only lowercase. +""" + +import logging +import optparse +import os +import stat +import subprocess +import sys + +#### USER EDITABLE SECTION STARTS HERE #### + +# Files with these extensions must have executable bit set. +EXECUTABLE_EXTENSIONS = ( + 'bat', + 'dll', + 'dylib', + 'exe', +) + +# These files must have executable bit set. +EXECUTABLE_PATHS = ( + # TODO(maruel): Detect ELF files. + 'chrome/installer/mac/sign_app.sh.in', + 'chrome/installer/mac/sign_versioned_dir.sh.in', +) + +# These files must not have the executable bit set. This is mainly a performance +# optimization as these files are not checked for shebang. The list was +# partially generated from: +# git ls-files | grep "\\." | sed 's/.*\.//' | sort | uniq -c | sort -b -g +NON_EXECUTABLE_EXTENSIONS = ( + '1', + '3ds', + 'S', + 'am', + 'applescript', + 'asm', + 'c', + 'cc', + 'cfg', + 'chromium', + 'cpp', + 'crx', + 'cs', + 'css', + 'cur', + 'def', + 'der', + 'expected', + 'gif', + 'grd', + 'gyp', + 'gypi', + 'h', + 'hh', + 'htm', + 'html', + 'hyph', + 'ico', + 'idl', + 'java', + 'jpg', + 'js', + 'json', + 'm', + 'm4', + 'mm', + 'mms', + 'mock-http-headers', + 'nmf', + 'onc', + 'pat', + 'patch', + 'pdf', + 'pem', + 'plist', + 'png', + 'proto', + 'rc', + 'rfx', + 'rgs', + 'rules', + 'spec', + 'sql', + 'srpc', + 'svg', + 'tcl', + 'test', + 'tga', + 'txt', + 'vcproj', + 'vsprops', + 'webm', + 'word', + 'xib', + 'xml', + 'xtb', + 'zip', +) + +# File names that are always whitelisted. (These are all autoconf spew.) +IGNORED_FILENAMES = ( + 'config.guess', + 'config.sub', + 'configure', + 'depcomp', + 'install-sh', + 'missing', + 'mkinstalldirs', + 'naclsdk', + 'scons', +) + +# File paths starting with one of these will be ignored as well. +# Please consider fixing your file permissions, rather than adding to this list. +IGNORED_PATHS = ( + # TODO(maruel): Detect ELF files. + 'chrome/test/data/extensions/uitest/plugins/plugin.plugin/contents/' + 'macos/testnetscapeplugin', + 'chrome/test/data/extensions/uitest/plugins_private/plugin.plugin/contents/' + 'macos/testnetscapeplugin', + 'chrome/installer/mac/sign_app.sh.in', + 'chrome/installer/mac/sign_versioned_dir.sh.in', + 'native_client_sdk/src/build_tools/sdk_tools/third_party/', + 'out/', + # TODO(maruel): Fix these. + 'third_party/android_testrunner/', + 'third_party/bintrees/', + 'third_party/closure_linter/', + 'third_party/devscripts/licensecheck.pl.vanilla', + 'third_party/hyphen/', + 'third_party/jemalloc/', + 'third_party/lcov-1.9/contrib/galaxy/conglomerate_functions.pl', + 'third_party/lcov-1.9/contrib/galaxy/gen_makefile.sh', + 'third_party/lcov/contrib/galaxy/conglomerate_functions.pl', + 'third_party/lcov/contrib/galaxy/gen_makefile.sh', + 'third_party/libevent/autogen.sh', + 'third_party/libevent/test/test.sh', + 'third_party/libxml/linux/xml2-config', + 'third_party/libxml/src/ltmain.sh', + 'third_party/mesa/', + 'third_party/protobuf/', + 'third_party/python_gflags/gflags.py', + 'third_party/sqlite/', + 'third_party/talloc/script/mksyms.sh', + 'third_party/tcmalloc/', + 'third_party/tlslite/setup.py', +) + +#### USER EDITABLE SECTION ENDS HERE #### + +assert set(EXECUTABLE_EXTENSIONS) & set(NON_EXECUTABLE_EXTENSIONS) == set() + + +def capture(cmd, cwd): + """Returns the output of a command. + + Ignores the error code or stderr. + """ + logging.debug('%s; cwd=%s' % (' '.join(cmd), cwd)) + env = os.environ.copy() + env['LANGUAGE'] = 'en_US.UTF-8' + p = subprocess.Popen( + cmd, stdout=subprocess.PIPE, stderr=subprocess.PIPE, cwd=cwd, env=env) + return p.communicate()[0] + + +def get_svn_info(dir_path): + """Returns svn meta-data for a svn checkout.""" + if not os.path.isdir(dir_path): + return {} + out = capture(['svn', 'info', '.', '--non-interactive'], dir_path) + return dict(l.split(': ', 1) for l in out.splitlines() if l) + + +def get_svn_url(dir_path): + return get_svn_info(dir_path).get('URL') + + +def get_svn_root(dir_path): + """Returns the svn checkout root or None.""" + svn_url = get_svn_url(dir_path) + if not svn_url: + return None + logging.info('svn url: %s' % svn_url) + while True: + parent = os.path.dirname(dir_path) + if parent == dir_path: + return None + svn_url = svn_url.rsplit('/', 1)[0] + if svn_url != get_svn_url(parent): + return dir_path + dir_path = parent + + +def get_git_root(dir_path): + """Returns the git checkout root or None.""" + root = capture(['git', 'rev-parse', '--show-toplevel'], dir_path).strip() + if root: + return root + + +def is_ignored(rel_path): + """Returns True if rel_path is in our whitelist of files to ignore.""" + rel_path = rel_path.lower() + return ( + os.path.basename(rel_path) in IGNORED_FILENAMES or + rel_path.startswith(IGNORED_PATHS)) + + +def must_be_executable(rel_path): + """The file name represents a file type that must have the executable bit + set. + """ + return ( + os.path.splitext(rel_path)[1][1:].lower() in EXECUTABLE_EXTENSIONS or + rel_path in EXECUTABLE_PATHS) + + +def must_not_be_executable(rel_path): + """The file name represents a file type that must not have the executable + bit set. + """ + return os.path.splitext(rel_path)[1][1:].lower() in NON_EXECUTABLE_EXTENSIONS + + +def has_executable_bit(full_path): + """Returns if any executable bit is set.""" + permission = stat.S_IXUSR | stat.S_IXGRP | stat.S_IXOTH + return bool(permission & os.stat(full_path).st_mode) + + +def has_shebang(full_path): + """Returns if the file starts with #!/. + + file_path is the absolute path to the file. + """ + with open(full_path, 'rb') as f: + return f.read(3) == '#!/' + +def check_file(full_path, bare_output): + """Checks file_path's permissions and returns an error if it is + inconsistent. + + It is assumed that the file is not ignored by is_ignored(). + + If the file name is matched with must_be_executable() or + must_not_be_executable(), only its executable bit is checked. + Otherwise, the 3 first bytes of the file are read to verify if it has a + shebang and compares this with the executable bit on the file. + """ + try: + bit = has_executable_bit(full_path) + except OSError: + # It's faster to catch exception than call os.path.islink(). Chromium + # tree happens to have invalid symlinks under + # third_party/openssl/openssl/test/. + return None + + if must_be_executable(full_path): + if not bit: + if bare_output: + return full_path + return '%s: Must have executable bit set' % full_path + return + if must_not_be_executable(full_path): + if bit: + if bare_output: + return full_path + return '%s: Must not have executable bit set' % full_path + return + + # For the others, it depends on the shebang. + shebang = has_shebang(full_path) + if bit != shebang: + if bare_output: + return full_path + if bit: + return '%s: Has executable bit but not shebang' % full_path + else: + return '%s: Has shebang but not executable bit' % full_path + + +def check_files(root, files, bare_output): + errors = [] + for file_path in files: + if is_ignored(file_path): + continue + + full_file_path = os.path.join(root, file_path) + + error = check_file(full_file_path, bare_output) + if error: + errors.append(error) + + return errors + +class ApiBase(object): + def __init__(self, root_dir, bare_output): + self.root_dir = root_dir + self.bare_output = bare_output + self.count = 0 + self.count_shebang = 0 + + def check_file(self, rel_path): + logging.debug('check_file(%s)' % rel_path) + self.count += 1 + + if (not must_be_executable(rel_path) and + not must_not_be_executable(rel_path)): + self.count_shebang += 1 + + full_path = os.path.join(self.root_dir, rel_path) + return check_file(full_path, self.bare_output) + + def check_dir(self, rel_path): + return self.check(rel_path) + + def check(self, start_dir): + """Check the files in start_dir, recursively check its subdirectories.""" + errors = [] + items = self.list_dir(start_dir) + logging.info('check(%s) -> %d' % (start_dir, len(items))) + for item in items: + full_path = os.path.join(self.root_dir, start_dir, item) + rel_path = full_path[len(self.root_dir) + 1:] + if is_ignored(rel_path): + continue + if os.path.isdir(full_path): + # Depth first. + errors.extend(self.check_dir(rel_path)) + else: + error = self.check_file(rel_path) + if error: + errors.append(error) + return errors + + def list_dir(self, start_dir): + """Lists all the files and directory inside start_dir.""" + return sorted( + x for x in os.listdir(os.path.join(self.root_dir, start_dir)) + if not x.startswith('.') + ) + + +class ApiSvnQuick(ApiBase): + """Returns all files in svn-versioned directories, independent of the fact if + they are versionned. + + Uses svn info in each directory to determine which directories should be + crawled. + """ + def __init__(self, *args): + super(ApiSvnQuick, self).__init__(*args) + self.url = get_svn_url(self.root_dir) + + def check_dir(self, rel_path): + url = self.url + '/' + rel_path + if get_svn_url(os.path.join(self.root_dir, rel_path)) != url: + return [] + return super(ApiSvnQuick, self).check_dir(rel_path) + + +class ApiAllFilesAtOnceBase(ApiBase): + _files = None + + def list_dir(self, start_dir): + """Lists all the files and directory inside start_dir.""" + if self._files is None: + self._files = sorted(self._get_all_files()) + if not self.bare_output: + print 'Found %s files' % len(self._files) + start_dir = start_dir[len(self.root_dir) + 1:] + return [ + x[len(start_dir):] for x in self._files if x.startswith(start_dir) + ] + + def _get_all_files(self): + """Lists all the files and directory inside self._root_dir.""" + raise NotImplementedError() + + +class ApiSvn(ApiAllFilesAtOnceBase): + """Returns all the subversion controlled files. + + Warning: svn ls is abnormally slow. + """ + def _get_all_files(self): + cmd = ['svn', 'ls', '--non-interactive', '--recursive'] + return ( + x for x in capture(cmd, self.root_dir).splitlines() + if not x.endswith(os.path.sep)) + + +class ApiGit(ApiAllFilesAtOnceBase): + def _get_all_files(self): + return capture(['git', 'ls-files'], cwd=self.root_dir).splitlines() + + +def get_scm(dir_path, bare): + """Returns a properly configured ApiBase instance.""" + cwd = os.getcwd() + root = get_svn_root(dir_path or cwd) + if root: + if not bare: + print('Found subversion checkout at %s' % root) + return ApiSvnQuick(dir_path or root, bare) + root = get_git_root(dir_path or cwd) + if root: + if not bare: + print('Found git repository at %s' % root) + return ApiGit(dir_path or root, bare) + + # Returns a non-scm aware checker. + if not bare: + print('Failed to determine the SCM for %s' % dir_path) + return ApiBase(dir_path or cwd, bare) + + +def main(): + usage = """Usage: python %prog [--root <root>] [tocheck] + tocheck Specifies the directory, relative to root, to check. This defaults + to "." so it checks everything. + +Examples: + python %prog + python %prog --root /path/to/source chrome""" + + parser = optparse.OptionParser(usage=usage) + parser.add_option( + '--root', + help='Specifies the repository root. This defaults ' + 'to the checkout repository root') + parser.add_option( + '-v', '--verbose', action='count', default=0, help='Print debug logging') + parser.add_option( + '--bare', + action='store_true', + default=False, + help='Prints the bare filename triggering the checks') + parser.add_option( + '--file', action='append', dest='files', + help='Specifics a list of files to check the permissions of. Only these ' + 'files will be checked') + options, args = parser.parse_args() + + levels = [logging.ERROR, logging.INFO, logging.DEBUG] + logging.basicConfig(level=levels[min(len(levels) - 1, options.verbose)]) + + if len(args) > 1: + parser.error('Too many arguments used') + + if options.root: + options.root = os.path.abspath(options.root) + + if options.files: + errors = check_files(options.root, options.files, options.bare) + print '\n'.join(errors) + return bool(errors) + + api = get_scm(options.root, options.bare) + if args: + start_dir = args[0] + else: + start_dir = api.root_dir + + errors = api.check(start_dir) + + if not options.bare: + print 'Processed %s files, %d files where tested for shebang' % ( + api.count, api.count_shebang) + + if errors: + if not options.bare: + print '\nFAILED\n' + print '\n'.join(errors) + return 1 + if not options.bare: + print '\nSUCCESS\n' + return 0 + + +if '__main__' == __name__: + sys.exit(main()) |