|  | // Copyright 2017 Google Inc. All rights reserved. | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //     http://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  |  | 
|  | package android | 
|  |  | 
|  | import ( | 
|  | "fmt" | 
|  | "path/filepath" | 
|  | "reflect" | 
|  | "regexp" | 
|  | "strconv" | 
|  | "strings" | 
|  |  | 
|  | "github.com/google/blueprint/proptools" | 
|  | ) | 
|  |  | 
|  | // "neverallow" rules for the build system. | 
|  | // | 
|  | // This allows things which aren't related to the build system and are enforced | 
|  | // against assumptions, in progress code refactors, or policy to be expressed in a | 
|  | // straightforward away disjoint from implementations and tests which should | 
|  | // work regardless of these restrictions. | 
|  | // | 
|  | // A module is disallowed if all of the following are true: | 
|  | // - it is in one of the "In" paths | 
|  | // - it is not in one of the "NotIn" paths | 
|  | // - it has all "With" properties matched | 
|  | // - - values are matched in their entirety | 
|  | // - - nil is interpreted as an empty string | 
|  | // - - nested properties are separated with a '.' | 
|  | // - - if the property is a list, any of the values in the list being matches | 
|  | //     counts as a match | 
|  | // - it has none of the "Without" properties matched (same rules as above) | 
|  |  | 
|  | func registerNeverallowMutator(ctx RegisterMutatorsContext) { | 
|  | ctx.BottomUp("neverallow", neverallowMutator).Parallel() | 
|  | } | 
|  |  | 
|  | var neverallows = []Rule{} | 
|  |  | 
|  | func init() { | 
|  | AddNeverAllowRules(createIncludeDirsRules()...) | 
|  | AddNeverAllowRules(createTrebleRules()...) | 
|  | AddNeverAllowRules(createJavaDeviceForHostRules()...) | 
|  | AddNeverAllowRules(createCcSdkVariantRules()...) | 
|  | AddNeverAllowRules(createUncompressDexRules()...) | 
|  | AddNeverAllowRules(createInitFirstStageRules()...) | 
|  | AddNeverAllowRules(createProhibitFrameworkAccessRules()...) | 
|  | AddNeverAllowRules(createBp2BuildRule()) | 
|  | AddNeverAllowRules(createCcStubsRule()) | 
|  | AddNeverAllowRules(createJavaExcludeStaticLibsRule()) | 
|  | AddNeverAllowRules(createProhibitHeaderOnlyRule()) | 
|  | } | 
|  |  | 
|  | // Add a NeverAllow rule to the set of rules to apply. | 
|  | func AddNeverAllowRules(rules ...Rule) { | 
|  | neverallows = append(neverallows, rules...) | 
|  | } | 
|  |  | 
|  | func createBp2BuildRule() Rule { | 
|  | return NeverAllow(). | 
|  | With("bazel_module.bp2build_available", "true"). | 
|  | NotIn("soong_tests"). // only used in tests | 
|  | Because("setting bp2build_available in Android.bp is not " + | 
|  | "supported for custom conversion, use allowlists.go instead.") | 
|  | } | 
|  |  | 
|  | var ( | 
|  | neverallowNotInIncludeDir = []string{ | 
|  | "art", | 
|  | "art/libnativebridge", | 
|  | "art/libnativeloader", | 
|  | "libcore", | 
|  | "libnativehelper", | 
|  | "external/apache-harmony", | 
|  | "external/apache-xml", | 
|  | "external/boringssl", | 
|  | "external/bouncycastle", | 
|  | "external/conscrypt", | 
|  | "external/icu", | 
|  | "external/okhttp", | 
|  | "external/vixl", | 
|  | "external/wycheproof", | 
|  | } | 
|  | neverallowNoUseIncludeDir = []string{ | 
|  | "frameworks/av/apex", | 
|  | "frameworks/av/tools", | 
|  | "frameworks/native/cmds", | 
|  | "system/apex", | 
|  | "system/bpf", | 
|  | "system/gatekeeper", | 
|  | "system/hwservicemanager", | 
|  | "system/libbase", | 
|  | "system/libfmq", | 
|  | "system/libvintf", | 
|  | } | 
|  | ) | 
|  |  | 
|  | func createIncludeDirsRules() []Rule { | 
|  | rules := make([]Rule, 0, len(neverallowNotInIncludeDir)+len(neverallowNoUseIncludeDir)) | 
|  |  | 
|  | for _, path := range neverallowNotInIncludeDir { | 
|  | rule := | 
|  | NeverAllow(). | 
|  | WithMatcher("include_dirs", StartsWith(path+"/")). | 
|  | Because("include_dirs is deprecated, all usages of '" + path + "' have been migrated" + | 
|  | " to use alternate mechanisms and so can no longer be used.") | 
|  |  | 
|  | rules = append(rules, rule) | 
|  | } | 
|  |  | 
|  | for _, path := range neverallowNoUseIncludeDir { | 
|  | rule := NeverAllow().In(path+"/").WithMatcher("include_dirs", isSetMatcherInstance). | 
|  | Because("include_dirs is deprecated, all usages of them in '" + path + "' have been migrated" + | 
|  | " to use alternate mechanisms and so can no longer be used.") | 
|  | rules = append(rules, rule) | 
|  | } | 
|  |  | 
|  | return rules | 
|  | } | 
|  |  | 
|  | func createTrebleRules() []Rule { | 
|  | return []Rule{ | 
|  | NeverAllow(). | 
|  | In("vendor", "device"). | 
|  | With("vndk.enabled", "true"). | 
|  | Without("vendor", "true"). | 
|  | Without("product_specific", "true"). | 
|  | Because("the VNDK can never contain a library that is device dependent."), | 
|  | NeverAllow(). | 
|  | With("vndk.enabled", "true"). | 
|  | Without("vendor", "true"). | 
|  | Without("owner", ""). | 
|  | Because("a VNDK module can never have an owner."), | 
|  |  | 
|  | // TODO(b/67974785): always enforce the manifest | 
|  | NeverAllow(). | 
|  | Without("name", "libhidlbase-combined-impl"). | 
|  | Without("name", "libhidlbase"). | 
|  | With("product_variables.enforce_vintf_manifest.cflags", "*"). | 
|  | Because("manifest enforcement should be independent of ."), | 
|  |  | 
|  | // TODO(b/67975799): vendor code should always use /vendor/bin/sh | 
|  | NeverAllow(). | 
|  | Without("name", "libc_bionic_ndk"). | 
|  | With("product_variables.treble_linker_namespaces.cflags", "*"). | 
|  | Because("nothing should care if linker namespaces are enabled or not"), | 
|  |  | 
|  | // Example: | 
|  | // *NeverAllow().with("Srcs", "main.cpp")) | 
|  | } | 
|  | } | 
|  |  | 
|  | func createJavaDeviceForHostRules() []Rule { | 
|  | javaDeviceForHostProjectsAllowedList := []string{ | 
|  | "development/build", | 
|  | "external/guava", | 
|  | "external/kotlinx.coroutines", | 
|  | "external/robolectric-shadows", | 
|  | "external/robolectric", | 
|  | "frameworks/layoutlib", | 
|  | } | 
|  |  | 
|  | return []Rule{ | 
|  | NeverAllow(). | 
|  | NotIn(javaDeviceForHostProjectsAllowedList...). | 
|  | ModuleType("java_device_for_host", "java_host_for_device"). | 
|  | Because("java_device_for_host can only be used in allowed projects"), | 
|  | } | 
|  | } | 
|  |  | 
|  | func createCcSdkVariantRules() []Rule { | 
|  | sdkVersionOnlyAllowedList := []string{ | 
|  | // derive_sdk_prefer32 has stem: "derive_sdk" which conflicts with the derive_sdk. | 
|  | // This sometimes works because the APEX modules that contain derive_sdk and | 
|  | // derive_sdk_prefer32 suppress the platform installation rules, but fails when | 
|  | // the APEX modules contain the SDK variant and the platform variant still exists. | 
|  | "packages/modules/SdkExtensions/derive_sdk", | 
|  | // These are for apps and shouldn't be used by non-SDK variant modules. | 
|  | "prebuilts/ndk", | 
|  | "tools/test/graphicsbenchmark/apps/sample_app", | 
|  | "tools/test/graphicsbenchmark/functional_tests/java", | 
|  | "vendor/xts/gts-tests/hostsidetests/gamedevicecert/apps/javatests", | 
|  | "external/libtextclassifier/native", | 
|  | } | 
|  |  | 
|  | platformVariantPropertiesAllowedList := []string{ | 
|  | // android_native_app_glue and libRSSupport use native_window.h but target old | 
|  | // sdk versions (minimum and 9 respectively) where libnativewindow didn't exist, | 
|  | // so they can't add libnativewindow to shared_libs to get the header directory | 
|  | // for the platform variant.  Allow them to use the platform variant | 
|  | // property to set shared_libs. | 
|  | "prebuilts/ndk", | 
|  | "frameworks/rs", | 
|  | } | 
|  |  | 
|  | return []Rule{ | 
|  | NeverAllow(). | 
|  | NotIn(sdkVersionOnlyAllowedList...). | 
|  | WithMatcher("sdk_variant_only", isSetMatcherInstance). | 
|  | Because("sdk_variant_only can only be used in allowed projects"), | 
|  | NeverAllow(). | 
|  | NotIn(platformVariantPropertiesAllowedList...). | 
|  | WithMatcher("platform.shared_libs", isSetMatcherInstance). | 
|  | Because("platform variant properties can only be used in allowed projects"), | 
|  | } | 
|  | } | 
|  |  | 
|  | func createCcStubsRule() Rule { | 
|  | ccStubsImplementationInstallableProjectsAllowedList := []string{ | 
|  | "packages/modules/Virtualization/vm_payload", | 
|  | } | 
|  |  | 
|  | return NeverAllow(). | 
|  | NotIn(ccStubsImplementationInstallableProjectsAllowedList...). | 
|  | WithMatcher("stubs.implementation_installable", isSetMatcherInstance). | 
|  | Because("implementation_installable can only be used in allowed projects.") | 
|  | } | 
|  |  | 
|  | func createUncompressDexRules() []Rule { | 
|  | return []Rule{ | 
|  | NeverAllow(). | 
|  | NotIn("art"). | 
|  | WithMatcher("uncompress_dex", isSetMatcherInstance). | 
|  | Because("uncompress_dex is only allowed for certain jars for test in art."), | 
|  | } | 
|  | } | 
|  |  | 
|  | func createInitFirstStageRules() []Rule { | 
|  | return []Rule{ | 
|  | NeverAllow(). | 
|  | Without("name", "init_first_stage_defaults"). | 
|  | Without("name", "init_first_stage"). | 
|  | Without("name", "init_first_stage.microdroid"). | 
|  | With("install_in_root", "true"). | 
|  | Because("install_in_root is only for init_first_stage."), | 
|  | } | 
|  | } | 
|  |  | 
|  | func createProhibitFrameworkAccessRules() []Rule { | 
|  | return []Rule{ | 
|  | NeverAllow(). | 
|  | With("libs", "framework"). | 
|  | WithoutMatcher("sdk_version", Regexp("(core_.*|^$)")). | 
|  | Because("framework can't be used when building against SDK"), | 
|  | } | 
|  | } | 
|  |  | 
|  | func createJavaExcludeStaticLibsRule() Rule { | 
|  | return NeverAllow(). | 
|  | NotIn("build/soong", "libcore", "frameworks/base/api"). | 
|  | ModuleType("java_library"). | 
|  | WithMatcher("exclude_static_libs", isSetMatcherInstance). | 
|  | Because("exclude_static_libs property is only allowed for java modules defined in build/soong, libcore, and frameworks/base/api") | 
|  | } | 
|  |  | 
|  | func createProhibitHeaderOnlyRule() Rule { | 
|  | return NeverAllow(). | 
|  | Without("name", "framework-minus-apex-headers"). | 
|  | With("headers_only", "true"). | 
|  | Because("headers_only can only be used for generating framework-minus-apex headers for non-updatable modules") | 
|  | } | 
|  |  | 
|  | func neverallowMutator(ctx BottomUpMutatorContext) { | 
|  | m, ok := ctx.Module().(Module) | 
|  | if !ok { | 
|  | return | 
|  | } | 
|  |  | 
|  | dir := ctx.ModuleDir() + "/" | 
|  | properties := m.GetProperties() | 
|  |  | 
|  | osClass := ctx.Module().Target().Os.Class | 
|  |  | 
|  | for _, r := range neverallowRules(ctx.Config()) { | 
|  | n := r.(*rule) | 
|  | if !n.appliesToPath(dir) { | 
|  | continue | 
|  | } | 
|  |  | 
|  | if !n.appliesToModuleType(ctx.ModuleType()) { | 
|  | continue | 
|  | } | 
|  |  | 
|  | if !n.appliesToProperties(properties) { | 
|  | continue | 
|  | } | 
|  |  | 
|  | if !n.appliesToOsClass(osClass) { | 
|  | continue | 
|  | } | 
|  |  | 
|  | if !n.appliesToDirectDeps(ctx) { | 
|  | continue | 
|  | } | 
|  |  | 
|  | ctx.ModuleErrorf("violates " + n.String()) | 
|  | } | 
|  | } | 
|  |  | 
|  | type ValueMatcher interface { | 
|  | Test(string) bool | 
|  | String() string | 
|  | } | 
|  |  | 
|  | type equalMatcher struct { | 
|  | expected string | 
|  | } | 
|  |  | 
|  | func (m *equalMatcher) Test(value string) bool { | 
|  | return m.expected == value | 
|  | } | 
|  |  | 
|  | func (m *equalMatcher) String() string { | 
|  | return "=" + m.expected | 
|  | } | 
|  |  | 
|  | type anyMatcher struct { | 
|  | } | 
|  |  | 
|  | func (m *anyMatcher) Test(value string) bool { | 
|  | return true | 
|  | } | 
|  |  | 
|  | func (m *anyMatcher) String() string { | 
|  | return "=*" | 
|  | } | 
|  |  | 
|  | var anyMatcherInstance = &anyMatcher{} | 
|  |  | 
|  | type startsWithMatcher struct { | 
|  | prefix string | 
|  | } | 
|  |  | 
|  | func (m *startsWithMatcher) Test(value string) bool { | 
|  | return strings.HasPrefix(value, m.prefix) | 
|  | } | 
|  |  | 
|  | func (m *startsWithMatcher) String() string { | 
|  | return ".starts-with(" + m.prefix + ")" | 
|  | } | 
|  |  | 
|  | type regexMatcher struct { | 
|  | re *regexp.Regexp | 
|  | } | 
|  |  | 
|  | func (m *regexMatcher) Test(value string) bool { | 
|  | return m.re.MatchString(value) | 
|  | } | 
|  |  | 
|  | func (m *regexMatcher) String() string { | 
|  | return ".regexp(" + m.re.String() + ")" | 
|  | } | 
|  |  | 
|  | type notInListMatcher struct { | 
|  | allowed []string | 
|  | } | 
|  |  | 
|  | func (m *notInListMatcher) Test(value string) bool { | 
|  | return !InList(value, m.allowed) | 
|  | } | 
|  |  | 
|  | func (m *notInListMatcher) String() string { | 
|  | return ".not-in-list(" + strings.Join(m.allowed, ",") + ")" | 
|  | } | 
|  |  | 
|  | type isSetMatcher struct{} | 
|  |  | 
|  | func (m *isSetMatcher) Test(value string) bool { | 
|  | return value != "" | 
|  | } | 
|  |  | 
|  | func (m *isSetMatcher) String() string { | 
|  | return ".is-set" | 
|  | } | 
|  |  | 
|  | var isSetMatcherInstance = &isSetMatcher{} | 
|  |  | 
|  | type ruleProperty struct { | 
|  | fields  []string // e.x.: Vndk.Enabled | 
|  | matcher ValueMatcher | 
|  | } | 
|  |  | 
|  | func (r *ruleProperty) String() string { | 
|  | return fmt.Sprintf("%q matches: %s", strings.Join(r.fields, "."), r.matcher) | 
|  | } | 
|  |  | 
|  | type ruleProperties []ruleProperty | 
|  |  | 
|  | func (r ruleProperties) String() string { | 
|  | var s []string | 
|  | for _, r := range r { | 
|  | s = append(s, r.String()) | 
|  | } | 
|  | return strings.Join(s, " ") | 
|  | } | 
|  |  | 
|  | // A NeverAllow rule. | 
|  | type Rule interface { | 
|  | In(path ...string) Rule | 
|  |  | 
|  | NotIn(path ...string) Rule | 
|  |  | 
|  | InDirectDeps(deps ...string) Rule | 
|  |  | 
|  | WithOsClass(osClasses ...OsClass) Rule | 
|  |  | 
|  | ModuleType(types ...string) Rule | 
|  |  | 
|  | NotModuleType(types ...string) Rule | 
|  |  | 
|  | With(properties, value string) Rule | 
|  |  | 
|  | WithMatcher(properties string, matcher ValueMatcher) Rule | 
|  |  | 
|  | Without(properties, value string) Rule | 
|  |  | 
|  | WithoutMatcher(properties string, matcher ValueMatcher) Rule | 
|  |  | 
|  | Because(reason string) Rule | 
|  | } | 
|  |  | 
|  | type rule struct { | 
|  | // User string for why this is a thing. | 
|  | reason string | 
|  |  | 
|  | paths       []string | 
|  | unlessPaths []string | 
|  |  | 
|  | directDeps map[string]bool | 
|  |  | 
|  | osClasses []OsClass | 
|  |  | 
|  | moduleTypes       []string | 
|  | unlessModuleTypes []string | 
|  |  | 
|  | props       ruleProperties | 
|  | unlessProps ruleProperties | 
|  |  | 
|  | onlyBootclasspathJar bool | 
|  | } | 
|  |  | 
|  | // Create a new NeverAllow rule. | 
|  | func NeverAllow() Rule { | 
|  | return &rule{directDeps: make(map[string]bool)} | 
|  | } | 
|  |  | 
|  | // In adds path(s) where this rule applies. | 
|  | func (r *rule) In(path ...string) Rule { | 
|  | r.paths = append(r.paths, cleanPaths(path)...) | 
|  | return r | 
|  | } | 
|  |  | 
|  | // NotIn adds path(s) to that this rule does not apply to. | 
|  | func (r *rule) NotIn(path ...string) Rule { | 
|  | r.unlessPaths = append(r.unlessPaths, cleanPaths(path)...) | 
|  | return r | 
|  | } | 
|  |  | 
|  | // InDirectDeps adds dep(s) that are not allowed with this rule. | 
|  | func (r *rule) InDirectDeps(deps ...string) Rule { | 
|  | for _, d := range deps { | 
|  | r.directDeps[d] = true | 
|  | } | 
|  | return r | 
|  | } | 
|  |  | 
|  | // WithOsClass adds osClass(es) that this rule applies to. | 
|  | func (r *rule) WithOsClass(osClasses ...OsClass) Rule { | 
|  | r.osClasses = append(r.osClasses, osClasses...) | 
|  | return r | 
|  | } | 
|  |  | 
|  | // ModuleType adds type(s) that this rule applies to. | 
|  | func (r *rule) ModuleType(types ...string) Rule { | 
|  | r.moduleTypes = append(r.moduleTypes, types...) | 
|  | return r | 
|  | } | 
|  |  | 
|  | // NotModuleType adds type(s) that this rule does not apply to.. | 
|  | func (r *rule) NotModuleType(types ...string) Rule { | 
|  | r.unlessModuleTypes = append(r.unlessModuleTypes, types...) | 
|  | return r | 
|  | } | 
|  |  | 
|  | // With specifies property/value combinations that are restricted for this rule. | 
|  | func (r *rule) With(properties, value string) Rule { | 
|  | return r.WithMatcher(properties, selectMatcher(value)) | 
|  | } | 
|  |  | 
|  | // WithMatcher specifies property/matcher combinations that are restricted for this rule. | 
|  | func (r *rule) WithMatcher(properties string, matcher ValueMatcher) Rule { | 
|  | r.props = append(r.props, ruleProperty{ | 
|  | fields:  fieldNamesForProperties(properties), | 
|  | matcher: matcher, | 
|  | }) | 
|  | return r | 
|  | } | 
|  |  | 
|  | // Without specifies property/value combinations that this rule does not apply to. | 
|  | func (r *rule) Without(properties, value string) Rule { | 
|  | return r.WithoutMatcher(properties, selectMatcher(value)) | 
|  | } | 
|  |  | 
|  | // Without specifies property/matcher combinations that this rule does not apply to. | 
|  | func (r *rule) WithoutMatcher(properties string, matcher ValueMatcher) Rule { | 
|  | r.unlessProps = append(r.unlessProps, ruleProperty{ | 
|  | fields:  fieldNamesForProperties(properties), | 
|  | matcher: matcher, | 
|  | }) | 
|  | return r | 
|  | } | 
|  |  | 
|  | func selectMatcher(expected string) ValueMatcher { | 
|  | if expected == "*" { | 
|  | return anyMatcherInstance | 
|  | } | 
|  | return &equalMatcher{expected: expected} | 
|  | } | 
|  |  | 
|  | // Because specifies a reason for this rule. | 
|  | func (r *rule) Because(reason string) Rule { | 
|  | r.reason = reason | 
|  | return r | 
|  | } | 
|  |  | 
|  | func (r *rule) String() string { | 
|  | s := []string{"neverallow requirements. Not allowed:"} | 
|  | if len(r.paths) > 0 { | 
|  | s = append(s, fmt.Sprintf("in dirs: %q", r.paths)) | 
|  | } | 
|  | if len(r.moduleTypes) > 0 { | 
|  | s = append(s, fmt.Sprintf("module types: %q", r.moduleTypes)) | 
|  | } | 
|  | if len(r.props) > 0 { | 
|  | s = append(s, fmt.Sprintf("properties matching: %s", r.props)) | 
|  | } | 
|  | if len(r.directDeps) > 0 { | 
|  | s = append(s, fmt.Sprintf("dep(s): %q", SortedKeys(r.directDeps))) | 
|  | } | 
|  | if len(r.osClasses) > 0 { | 
|  | s = append(s, fmt.Sprintf("os class(es): %q", r.osClasses)) | 
|  | } | 
|  | if len(r.unlessPaths) > 0 { | 
|  | s = append(s, fmt.Sprintf("EXCEPT in dirs: %q", r.unlessPaths)) | 
|  | } | 
|  | if len(r.unlessModuleTypes) > 0 { | 
|  | s = append(s, fmt.Sprintf("EXCEPT module types: %q", r.unlessModuleTypes)) | 
|  | } | 
|  | if len(r.unlessProps) > 0 { | 
|  | s = append(s, fmt.Sprintf("EXCEPT properties matching: %q", r.unlessProps)) | 
|  | } | 
|  | if len(r.reason) != 0 { | 
|  | s = append(s, " which is restricted because "+r.reason) | 
|  | } | 
|  | if len(s) == 1 { | 
|  | s[0] = "neverallow requirements (empty)" | 
|  | } | 
|  | return strings.Join(s, "\n\t") | 
|  | } | 
|  |  | 
|  | func (r *rule) appliesToPath(dir string) bool { | 
|  | includePath := len(r.paths) == 0 || HasAnyPrefix(dir, r.paths) | 
|  | excludePath := HasAnyPrefix(dir, r.unlessPaths) | 
|  | return includePath && !excludePath | 
|  | } | 
|  |  | 
|  | func (r *rule) appliesToDirectDeps(ctx BottomUpMutatorContext) bool { | 
|  | if len(r.directDeps) == 0 { | 
|  | return true | 
|  | } | 
|  |  | 
|  | matches := false | 
|  | ctx.VisitDirectDeps(func(m Module) { | 
|  | if !matches { | 
|  | name := ctx.OtherModuleName(m) | 
|  | matches = r.directDeps[name] | 
|  | } | 
|  | }) | 
|  |  | 
|  | return matches | 
|  | } | 
|  |  | 
|  | func (r *rule) appliesToOsClass(osClass OsClass) bool { | 
|  | if len(r.osClasses) == 0 { | 
|  | return true | 
|  | } | 
|  |  | 
|  | for _, c := range r.osClasses { | 
|  | if c == osClass { | 
|  | return true | 
|  | } | 
|  | } | 
|  |  | 
|  | return false | 
|  | } | 
|  |  | 
|  | func (r *rule) appliesToModuleType(moduleType string) bool { | 
|  | return (len(r.moduleTypes) == 0 || InList(moduleType, r.moduleTypes)) && !InList(moduleType, r.unlessModuleTypes) | 
|  | } | 
|  |  | 
|  | func (r *rule) appliesToProperties(properties []interface{}) bool { | 
|  | includeProps := hasAllProperties(properties, r.props) | 
|  | excludeProps := hasAnyProperty(properties, r.unlessProps) | 
|  | return includeProps && !excludeProps | 
|  | } | 
|  |  | 
|  | func StartsWith(prefix string) ValueMatcher { | 
|  | return &startsWithMatcher{prefix} | 
|  | } | 
|  |  | 
|  | func Regexp(re string) ValueMatcher { | 
|  | r, err := regexp.Compile(re) | 
|  | if err != nil { | 
|  | panic(err) | 
|  | } | 
|  | return ®exMatcher{r} | 
|  | } | 
|  |  | 
|  | func NotInList(allowed []string) ValueMatcher { | 
|  | return ¬InListMatcher{allowed} | 
|  | } | 
|  |  | 
|  | // assorted utils | 
|  |  | 
|  | func cleanPaths(paths []string) []string { | 
|  | res := make([]string, len(paths)) | 
|  | for i, v := range paths { | 
|  | res[i] = filepath.Clean(v) + "/" | 
|  | } | 
|  | return res | 
|  | } | 
|  |  | 
|  | func fieldNamesForProperties(propertyNames string) []string { | 
|  | names := strings.Split(propertyNames, ".") | 
|  | for i, v := range names { | 
|  | names[i] = proptools.FieldNameForProperty(v) | 
|  | } | 
|  | return names | 
|  | } | 
|  |  | 
|  | func hasAnyProperty(properties []interface{}, props []ruleProperty) bool { | 
|  | for _, v := range props { | 
|  | if hasProperty(properties, v) { | 
|  | return true | 
|  | } | 
|  | } | 
|  | return false | 
|  | } | 
|  |  | 
|  | func hasAllProperties(properties []interface{}, props []ruleProperty) bool { | 
|  | for _, v := range props { | 
|  | if !hasProperty(properties, v) { | 
|  | return false | 
|  | } | 
|  | } | 
|  | return true | 
|  | } | 
|  |  | 
|  | func hasProperty(properties []interface{}, prop ruleProperty) bool { | 
|  | for _, propertyStruct := range properties { | 
|  | propertiesValue := reflect.ValueOf(propertyStruct).Elem() | 
|  | for _, v := range prop.fields { | 
|  | if !propertiesValue.IsValid() { | 
|  | break | 
|  | } | 
|  | propertiesValue = propertiesValue.FieldByName(v) | 
|  | } | 
|  | if !propertiesValue.IsValid() { | 
|  | continue | 
|  | } | 
|  |  | 
|  | check := func(value string) bool { | 
|  | return prop.matcher.Test(value) | 
|  | } | 
|  |  | 
|  | if matchValue(propertiesValue, check) { | 
|  | return true | 
|  | } | 
|  | } | 
|  | return false | 
|  | } | 
|  |  | 
|  | func matchValue(value reflect.Value, check func(string) bool) bool { | 
|  | if !value.IsValid() { | 
|  | return false | 
|  | } | 
|  |  | 
|  | if value.Kind() == reflect.Ptr { | 
|  | if value.IsNil() { | 
|  | return check("") | 
|  | } | 
|  | value = value.Elem() | 
|  | } | 
|  |  | 
|  | switch value.Kind() { | 
|  | case reflect.String: | 
|  | return check(value.String()) | 
|  | case reflect.Bool: | 
|  | return check(strconv.FormatBool(value.Bool())) | 
|  | case reflect.Int: | 
|  | return check(strconv.FormatInt(value.Int(), 10)) | 
|  | case reflect.Slice: | 
|  | slice, ok := value.Interface().([]string) | 
|  | if !ok { | 
|  | panic("Can only handle slice of string") | 
|  | } | 
|  | for _, v := range slice { | 
|  | if check(v) { | 
|  | return true | 
|  | } | 
|  | } | 
|  | return false | 
|  | } | 
|  |  | 
|  | panic("Can't handle type: " + value.Kind().String()) | 
|  | } | 
|  |  | 
|  | var neverallowRulesKey = NewOnceKey("neverallowRules") | 
|  |  | 
|  | func neverallowRules(config Config) []Rule { | 
|  | return config.Once(neverallowRulesKey, func() interface{} { | 
|  | // No test rules were set by setTestNeverallowRules, use the global rules | 
|  | return neverallows | 
|  | }).([]Rule) | 
|  | } | 
|  |  | 
|  | // Overrides the default neverallow rules for the supplied config. | 
|  | // | 
|  | // For testing only. | 
|  | func setTestNeverallowRules(config Config, testRules []Rule) { | 
|  | config.Once(neverallowRulesKey, func() interface{} { return testRules }) | 
|  | } | 
|  |  | 
|  | // Prepares for a test by setting neverallow rules and enabling the mutator. | 
|  | // | 
|  | // If the supplied rules are nil then the default rules are used. | 
|  | func PrepareForTestWithNeverallowRules(testRules []Rule) FixturePreparer { | 
|  | return GroupFixturePreparers( | 
|  | FixtureModifyConfig(func(config Config) { | 
|  | if testRules != nil { | 
|  | setTestNeverallowRules(config, testRules) | 
|  | } | 
|  | }), | 
|  | FixtureRegisterWithContext(func(ctx RegistrationContext) { | 
|  | ctx.PostDepsMutators(registerNeverallowMutator) | 
|  | }), | 
|  | ) | 
|  | } |