Go to file
Tim Burke 7c360d21c7 Add optional H203 to check that assertIs(Not)None is used
...instead of assertEqual(None, ...) or assertIs(None, ...) and their
negations.

Apparently that's a thing that people want? At any rate, 30+ projects
have this bug marked "Fix Released". However, without a check to keep
them from regressing, there is a long tail of follow-up patches that
distracts developers and reviewers from addressing user-facing bugs. See
the following Nova changes, spread out over the course of a year, for an
example:

    If3824356ddf4e6e2d91f6bc2fbfa41946d8463cc
    I09f38e219931e0d7ad27f04861d1ebbc3b5e2c5f
    Iee1379b941f93388900e89388676000b845fc8fc
    I0d38a82e78fbe94657ab9a71c08422007843d179
    I9316c0b125aa87b6ebfa996a559c3551093ea711
    I406ea23b0e78f45f16306813e4111a95716cd6b0
    Ic8cb1192e001409d827c8da55fe536681895944b

Add a check for it in the interest of not wasting reviewer time or
having more code churn than necessary.

Change-Id: Iad65cb6399f4f933cbd9f503c88ce144387d39b5
Related-Bug: #1280522
2016-08-15 18:50:16 -07:00
2014-09-13 09:56:13 +02:00
2016-07-13 08:59:54 +02:00
2015-06-18 10:52:59 +12:00
2013-03-18 12:19:25 -07:00
2013-05-24 19:58:36 +00:00
2013-05-31 16:11:22 -07:00
2013-03-18 12:19:25 -07:00
2016-06-26 00:30:54 +07:00
2016-02-16 14:29:44 -08:00
2015-09-17 12:10:49 +00:00
2016-04-21 09:19:03 -05:00

Introduction

hacking is a set of flake8 plugins that test and enforce the StyleGuide.

Hacking pins its dependencies, as a new release of some dependency can break hacking based gating jobs. This is because new versions of dependencies can introduce new rules, or make existing rules stricter.

Installation

hacking is available from pypi, so just run:

pip install hacking

This will install specific versions of flake8 with the hacking, pep8, mccabe and pyflakes plugins.

Origin

Hacking started its life out as a text file in Nova's first commit. It was initially based on the Google Python Style Guide, and over time more OpenStack specific rules were added. Hacking serves several purposes:

  1. Agree on a common style guide so reviews don't get bogged down on style nit picks. (example: docstring guidelines)
  2. Make code written by many different authors easier to read by making the style more uniform. (example: unix vs windows newlines)
  3. Call out dangerous patterns and avoid them. (example: shadowing built-in or reserved words)

Initially the hacking style guide was enforced manually by reviewers, but this was a big waste of time so hacking, the tool, was born to automate the process and remove the extra burden from human reviewers.

Versioning

hacking uses the major.minor.maintenance release notation, where maintenance releases cannot contain new checks. This way projects can gate on hacking by pinning on the major.minor number while accepting maintenance updates without being concerned that a new version will break the gate with a new check.

For example a project can depend on hacking>=0.10.0,<0.11.0, and can know that 0.10.1 will not fail in places where 0.10.0 passed.

Adding additional checks

Each check is a pep8 plugin so read

The focus of new or changed rules should be to do one of the following

  • Substantially increase the reviewability of the code (eg: H301, H303) as they make it easy to understand where symbols come from)
  • Catch a common programming error that may arise in the future (H201)
  • Prevent a situation that would 100% of the time be -1ed by developers (H903)

But, as always, remember that these are Guidelines. Treat them as such. There are always times for exceptions. All new rules should support noqa.

If a check needs to be staged in, or it does not apply to every project or its branch, it can be added as off by default.

Requirements

  • The check must already have community support. We do not want to dictate style, only enforce it.
  • The canonical source of the OpenStack Style Guidelines is StyleGuide, and hacking just enforces them; so when adding a new check, it must be in HACKING.rst
  • False negatives are ok, but false positives are not
  • Cannot be project specific, project specific checks should be Local Checks
  • Include extensive tests
  • Registered as entry_points in setup.cfg
  • Error code must be in the relevant Hxxx group
  • The check should not attempt to import modules from the code being checked. Importing random modules, has caused all kinds of trouble for us in the past.

Local Checks

hacking supports having local changes in a source tree. They can be configured to run in two different ways. They can be registered individually, or with a factory function.

For individual registration, put a comma separated list of pep8 compatible check functions into the hacking section of tox.ini. E.g.:

[hacking]
local-check = nova.tests.hacking.bad_code_is_terrible

Alternately, you can specify the location of a callable that will be called at registration time and will be passed the registration function. The callable should expect to call the passed in function on everything if wants to register. Such as:

[hacking]
local-check-factory = nova.tests.hacking.factory
Description
RETIRED, further work has moved to Debian project infrastructure
Readme 937 KiB