|
@@ -0,0 +1,286 @@
|
|
|
+#! /usr/bin/env python3
|
|
|
+#
|
|
|
+# SPDX-License-Identifier: GPL-2.0-only
|
|
|
+#
|
|
|
+
|
|
|
+# TODO
|
|
|
+# - option to just list all broken files
|
|
|
+# - test suite
|
|
|
+# - validate signed-off-by
|
|
|
+
|
|
|
+import argparse
|
|
|
+import collections
|
|
|
+import json
|
|
|
+import os
|
|
|
+import re
|
|
|
+import subprocess
|
|
|
+
|
|
|
+status_values = (
|
|
|
+ "accepted",
|
|
|
+ "pending",
|
|
|
+ "inappropriate",
|
|
|
+ "backport",
|
|
|
+ "submitted",
|
|
|
+ "denied",
|
|
|
+)
|
|
|
+
|
|
|
+
|
|
|
+class PatchResult:
|
|
|
+ # Whether the patch has an Upstream-Status or not
|
|
|
+ missing_upstream_status = False
|
|
|
+ # If the Upstream-Status tag is malformed in some way (string for bad bit)
|
|
|
+ malformed_upstream_status = None
|
|
|
+ # If the Upstream-Status value is unknown (boolean)
|
|
|
+ unknown_upstream_status = False
|
|
|
+ # The upstream status value (Pending, etc)
|
|
|
+ upstream_status = None
|
|
|
+ # Whether the patch has a Signed-off-by or not
|
|
|
+ missing_sob = False
|
|
|
+ # Whether the Signed-off-by tag is malformed in some way
|
|
|
+ malformed_sob = False
|
|
|
+ # The Signed-off-by tag value
|
|
|
+ sob = None
|
|
|
+ # Whether a patch looks like a CVE but doesn't have a CVE tag
|
|
|
+ missing_cve = False
|
|
|
+
|
|
|
+
|
|
|
+class Summary:
|
|
|
+ total = 0
|
|
|
+ cve_missing = 0
|
|
|
+ sob_missing = 0
|
|
|
+ sob_malformed = 0
|
|
|
+ status_missing = 0
|
|
|
+ status_malformed = 0
|
|
|
+ status_pending = 0
|
|
|
+
|
|
|
+def blame_patch(patch):
|
|
|
+ """
|
|
|
+ From a patch filename, return a list of "commit summary (author name <author
|
|
|
+ email>)" strings representing the history.
|
|
|
+ """
|
|
|
+ return subprocess.check_output(("git", "log",
|
|
|
+ "--follow", "--find-renames", "--diff-filter=A",
|
|
|
+ "--format=%s (%aN <%aE>)",
|
|
|
+ "--", patch)).decode("utf-8").splitlines()
|
|
|
+
|
|
|
+def patchreview(patches):
|
|
|
+ # General pattern: start of line, optional whitespace, tag with optional
|
|
|
+ # hyphen or spaces, maybe a colon, some whitespace, then the value, all case
|
|
|
+ # insensitive.
|
|
|
+ sob_re = re.compile(r"^[\t ]*(Signed[-_ ]off[-_ ]by:?)[\t ]*(.+)", re.IGNORECASE | re.MULTILINE)
|
|
|
+ status_re = re.compile(r"^[\t ]*(Upstream[-_ ]Status:?)[\t ]*(\w*)", re.IGNORECASE | re.MULTILINE)
|
|
|
+ cve_tag_re = re.compile(r"^[\t ]*(CVE:)[\t ]*(.*)", re.IGNORECASE | re.MULTILINE)
|
|
|
+ cve_re = re.compile(r"cve-[0-9]{4}-[0-9]{4,6}", re.IGNORECASE)
|
|
|
+
|
|
|
+ results = {}
|
|
|
+
|
|
|
+ for patch in patches:
|
|
|
+
|
|
|
+ result = PatchResult()
|
|
|
+ results[patch] = result
|
|
|
+
|
|
|
+ content = open(patch, encoding="ascii", errors="ignore").read()
|
|
|
+
|
|
|
+ # Find the Signed-off-by tag
|
|
|
+ match = sob_re.search(content)
|
|
|
+ if match:
|
|
|
+ value = match.group(1)
|
|
|
+ if value != "Signed-off-by:":
|
|
|
+ result.malformed_sob = value
|
|
|
+ result.sob = match.group(2)
|
|
|
+ else:
|
|
|
+ result.missing_sob = True
|
|
|
+
|
|
|
+ # Find the Upstream-Status tag
|
|
|
+ match = status_re.search(content)
|
|
|
+ if match:
|
|
|
+ value = match.group(1)
|
|
|
+ if value != "Upstream-Status:":
|
|
|
+ result.malformed_upstream_status = value
|
|
|
+
|
|
|
+ value = match.group(2).lower()
|
|
|
+ # TODO: check case
|
|
|
+ if value not in status_values:
|
|
|
+ result.unknown_upstream_status = True
|
|
|
+ result.upstream_status = value
|
|
|
+ else:
|
|
|
+ result.missing_upstream_status = True
|
|
|
+
|
|
|
+ # Check that patches which looks like CVEs have CVE tags
|
|
|
+ if cve_re.search(patch) or cve_re.search(content):
|
|
|
+ if not cve_tag_re.search(content):
|
|
|
+ result.missing_cve = True
|
|
|
+ # TODO: extract CVE list
|
|
|
+
|
|
|
+ return results
|
|
|
+
|
|
|
+
|
|
|
+def analyse(results, want_blame=False, verbose=True):
|
|
|
+ """
|
|
|
+ want_blame: display blame data for each malformed patch
|
|
|
+ verbose: display per-file results instead of just summary
|
|
|
+ """
|
|
|
+
|
|
|
+ # want_blame requires verbose, so disable blame if we're not verbose
|
|
|
+ if want_blame and not verbose:
|
|
|
+ want_blame = False
|
|
|
+
|
|
|
+ summary = Summary()
|
|
|
+
|
|
|
+ for patch in sorted(results):
|
|
|
+ r = results[patch]
|
|
|
+ summary.total += 1
|
|
|
+ need_blame = False
|
|
|
+
|
|
|
+ # Build statistics
|
|
|
+ if r.missing_sob:
|
|
|
+ summary.sob_missing += 1
|
|
|
+ if r.malformed_sob:
|
|
|
+ summary.sob_malformed += 1
|
|
|
+ if r.missing_upstream_status:
|
|
|
+ summary.status_missing += 1
|
|
|
+ if r.malformed_upstream_status or r.unknown_upstream_status:
|
|
|
+ summary.status_malformed += 1
|
|
|
+ # Count patches with no status as pending
|
|
|
+ summary.status_pending += 1
|
|
|
+ if r.missing_cve:
|
|
|
+ summary.cve_missing += 1
|
|
|
+ if r.upstream_status == "pending":
|
|
|
+ summary.status_pending += 1
|
|
|
+
|
|
|
+ # Output warnings
|
|
|
+ if r.missing_sob:
|
|
|
+ need_blame = True
|
|
|
+ if verbose:
|
|
|
+ print("Missing Signed-off-by tag (%s)" % patch)
|
|
|
+ if r.malformed_sob:
|
|
|
+ need_blame = True
|
|
|
+ if verbose:
|
|
|
+ print("Malformed Signed-off-by '%s' (%s)" % (r.malformed_sob, patch))
|
|
|
+ if r.missing_cve:
|
|
|
+ need_blame = True
|
|
|
+ if verbose:
|
|
|
+ print("Missing CVE tag (%s)" % patch)
|
|
|
+ if r.missing_upstream_status:
|
|
|
+ need_blame = True
|
|
|
+ if verbose:
|
|
|
+ print("Missing Upstream-Status tag (%s)" % patch)
|
|
|
+ if r.malformed_upstream_status:
|
|
|
+ need_blame = True
|
|
|
+ if verbose:
|
|
|
+ print("Malformed Upstream-Status '%s' (%s)" % (r.malformed_upstream_status, patch))
|
|
|
+ if r.unknown_upstream_status:
|
|
|
+ need_blame = True
|
|
|
+ if verbose:
|
|
|
+ print("Unknown Upstream-Status value '%s' (%s)" % (r.upstream_status, patch))
|
|
|
+
|
|
|
+ if want_blame and need_blame:
|
|
|
+ print("\n".join(blame_patch(patch)) + "\n")
|
|
|
+
|
|
|
+ return summary
|
|
|
+
|
|
|
+
|
|
|
+def display_summary(summary, verbose):
|
|
|
+ def percent(num):
|
|
|
+ try:
|
|
|
+ return "%d (%d%%)" % (num, round(num * 100.0 / summary.total))
|
|
|
+ except ZeroDivisionError:
|
|
|
+ return "N/A"
|
|
|
+
|
|
|
+ if verbose:
|
|
|
+ print()
|
|
|
+
|
|
|
+ print("""Total patches found: %d
|
|
|
+Patches missing Signed-off-by: %s
|
|
|
+Patches with malformed Signed-off-by: %s
|
|
|
+Patches missing CVE: %s
|
|
|
+Patches missing Upstream-Status: %s
|
|
|
+Patches with malformed Upstream-Status: %s
|
|
|
+Patches in Pending state: %s""" % (summary.total,
|
|
|
+ percent(summary.sob_missing),
|
|
|
+ percent(summary.sob_malformed),
|
|
|
+ percent(summary.cve_missing),
|
|
|
+ percent(summary.status_missing),
|
|
|
+ percent(summary.status_malformed),
|
|
|
+ percent(summary.status_pending)))
|
|
|
+
|
|
|
+
|
|
|
+def generate_metrics(summary, output):
|
|
|
+ # https://github.com/OpenObservability/OpenMetrics/blob/main/specification/OpenMetrics.md
|
|
|
+ # Summary attribute name, MetricPoint help
|
|
|
+ mapping = (
|
|
|
+ ("total", "Total patches"),
|
|
|
+ ("cve_missing", "Patches missing CVE tag"),
|
|
|
+ ("sob_malformed", "Patches with malformed Signed-off-by"),
|
|
|
+ ("sob_missing", "Patches with missing Signed-off-by"),
|
|
|
+ ("status_malformed", "Patches with malformed Upstream-Status"),
|
|
|
+ ("status_missing", "Patches with missing Upstream-Status"),
|
|
|
+ ("status_pending", "Patches with Pending Upstream-Status")
|
|
|
+ )
|
|
|
+ for attr, help in mapping:
|
|
|
+ metric = f"patch_check_{attr}"
|
|
|
+ value = getattr(summary, attr)
|
|
|
+ output.write(f"""
|
|
|
+# TYPE {metric} gauge
|
|
|
+# HELP {help}
|
|
|
+{metric} {value}
|
|
|
+""")
|
|
|
+ output.write("\n# EOF\n")
|
|
|
+
|
|
|
+def histogram(results):
|
|
|
+ import math
|
|
|
+
|
|
|
+ from toolz import dicttoolz, recipes
|
|
|
+ counts = recipes.countby(lambda r: r.upstream_status, results.values())
|
|
|
+ bars = dicttoolz.valmap(lambda v: "#" * int(math.ceil(float(v) / len(results) * 100)), counts)
|
|
|
+ for k in bars:
|
|
|
+ print("%-20s %s (%d)" % (k.capitalize() if k else "No status", bars[k], counts[k]))
|
|
|
+
|
|
|
+def gather_patches(directories):
|
|
|
+ patches = []
|
|
|
+ for directory in directories:
|
|
|
+ filenames = subprocess.check_output(("git", "-C", directory, "ls-files", "recipes-*/**/*.patch", "recipes-*/**/*.diff")).decode("utf-8").split()
|
|
|
+ patches += [os.path.join(directory, f) for f in filenames]
|
|
|
+ return patches
|
|
|
+
|
|
|
+if __name__ == "__main__":
|
|
|
+ args = argparse.ArgumentParser(description="Patch Review Tool")
|
|
|
+ args.add_argument("-b", "--blame", action="store_true", help="show blame for malformed patches")
|
|
|
+ args.add_argument("-v", "--verbose", action="store_true", help="show per-patch results")
|
|
|
+ args.add_argument("-g", "--histogram", action="store_true", help="show patch histogram")
|
|
|
+ args.add_argument("-j", "--json", help="update JSON")
|
|
|
+ args.add_argument("-m", "--metrics", type=argparse.FileType('w'), help="write OpenMetrics")
|
|
|
+ args.add_argument("dirs", metavar="DIRECTORY", nargs="+", help="directory to scan")
|
|
|
+ args = args.parse_args()
|
|
|
+
|
|
|
+ patches = gather_patches(args.dirs)
|
|
|
+ results = patchreview(patches)
|
|
|
+ summary = analyse(results, want_blame=args.blame, verbose=args.verbose)
|
|
|
+ display_summary(summary, verbose=args.verbose)
|
|
|
+
|
|
|
+ if args.json:
|
|
|
+ if os.path.isfile(args.json):
|
|
|
+ data = json.load(open(args.json))
|
|
|
+ else:
|
|
|
+ data = []
|
|
|
+
|
|
|
+ row = collections.Counter()
|
|
|
+ row["total"] = len(results)
|
|
|
+ row["date"] = subprocess.check_output(["git", "-C", args.dirs[0], "show", "-s", "--pretty=format:%cd", "--date=format:%s"]).decode("utf-8").strip()
|
|
|
+ for r in results.values():
|
|
|
+ if r.upstream_status in status_values:
|
|
|
+ row[r.upstream_status] += 1
|
|
|
+ if r.malformed_upstream_status or r.missing_upstream_status:
|
|
|
+ row["malformed-upstream-status"] += 1
|
|
|
+ if r.malformed_sob or r.missing_sob:
|
|
|
+ row["malformed-sob"] += 1
|
|
|
+
|
|
|
+ data.append(row)
|
|
|
+ json.dump(data, open(args.json, "w"))
|
|
|
+
|
|
|
+ if args.metrics:
|
|
|
+ generate_metrics(summary, args.metrics)
|
|
|
+
|
|
|
+ if args.histogram:
|
|
|
+ print()
|
|
|
+ histogram(results)
|