forked from VimPlug/jedi
Add sith.py, a script for random smoke test
This commit is contained in:
168
sith.py
Executable file
168
sith.py
Executable file
@@ -0,0 +1,168 @@
|
||||
#!/usr/bin/env python
|
||||
|
||||
"""
|
||||
Sith attacks (and helps debugging) Jedi.
|
||||
"""
|
||||
|
||||
import json
|
||||
import os
|
||||
import random
|
||||
import sys
|
||||
import traceback
|
||||
|
||||
import jedi
|
||||
|
||||
|
||||
class SourceCode(object):
|
||||
|
||||
def __init__(self, path):
|
||||
self.path = path
|
||||
with open(path) as f:
|
||||
self.source = f.read()
|
||||
self.lines = self.source.splitlines()
|
||||
self.maxline = len(self.lines)
|
||||
|
||||
def choose_script_args(self):
|
||||
line = random.randint(1, self.maxline)
|
||||
column = random.randint(0, len(self.lines[line - 1]))
|
||||
return (self.source, line, column, self.path)
|
||||
|
||||
|
||||
class SourceFinder(object):
|
||||
|
||||
def __init__(self, rootpath):
|
||||
self.rootpath = rootpath
|
||||
self.files = list(self.search_files())
|
||||
|
||||
def search_files(self):
|
||||
for root, dirnames, filenames in os.walk(self.rootpath):
|
||||
for name in filenames:
|
||||
if name.endswith('.py'):
|
||||
yield os.path.join(root, name)
|
||||
|
||||
def choose_source(self):
|
||||
# FIXME: try same file for several times
|
||||
return SourceCode(random.choice(self.files))
|
||||
|
||||
|
||||
class BaseAttacker(object):
|
||||
|
||||
def __init__(self):
|
||||
self.record = {'data': []}
|
||||
|
||||
def attack(self, operation, *args):
|
||||
script = jedi.Script(*args)
|
||||
op = getattr(script, operation)
|
||||
op()
|
||||
|
||||
def add_record(self, exc_info, operation, args):
|
||||
(_type, value, tb) = exc_info
|
||||
self.record['data'].append({
|
||||
'traceback': traceback.format_tb(tb),
|
||||
'error': repr(value),
|
||||
'operation': operation,
|
||||
'args': args,
|
||||
})
|
||||
|
||||
def get_record(self, recid):
|
||||
return self.record['data'][recid]
|
||||
|
||||
def save_record(self, path):
|
||||
with open(path, 'w') as f:
|
||||
json.dump(self.record, f)
|
||||
|
||||
def load_record(self, path):
|
||||
with open(path) as f:
|
||||
self.record = json.load(f)
|
||||
return self.record
|
||||
|
||||
def add_arguments(self, parser):
|
||||
parser.set_defaults(func=self.do_run)
|
||||
|
||||
|
||||
class RandomAtaccker(BaseAttacker):
|
||||
|
||||
operations = [
|
||||
'completions', 'goto_assignments', 'goto_definitions', 'usages',
|
||||
'call_signatures']
|
||||
|
||||
def choose_operation(self):
|
||||
return random.choice(self.operations)
|
||||
|
||||
def generate_attacks(self, maxtries, finder):
|
||||
for _ in range(maxtries):
|
||||
src = finder.choose_source()
|
||||
operation = self.choose_operation()
|
||||
yield (operation, src.choose_script_args())
|
||||
|
||||
def do_run(self, record, rootpath, maxtries):
|
||||
finder = SourceFinder(rootpath)
|
||||
for (operation, args) in self.generate_attacks(maxtries, finder):
|
||||
try:
|
||||
self.attack(operation, *args)
|
||||
except Exception:
|
||||
self.add_record(sys.exc_info(), operation, args)
|
||||
break
|
||||
self.save_record(record)
|
||||
|
||||
def add_arguments(self, parser):
|
||||
super(RandomAtaccker, self).add_arguments(parser)
|
||||
parser.add_argument(
|
||||
'--maxtries', default=10000, type=int)
|
||||
parser.add_argument(
|
||||
'rootpath', default='.', nargs='?',
|
||||
help='root directory to look for Python files.')
|
||||
|
||||
|
||||
class RedoAttacker(BaseAttacker):
|
||||
|
||||
def do_run(self, record, recid):
|
||||
self.load_record(record)
|
||||
data = self.get_record(recid)
|
||||
self.attack(data['operation'], *data['args'])
|
||||
|
||||
def add_arguments(self, parser):
|
||||
super(RedoAttacker, self).add_arguments(parser)
|
||||
parser = parser.add_argument(
|
||||
'recid', default=0, type=int)
|
||||
|
||||
|
||||
class AttackApp(object):
|
||||
|
||||
def __init__(self):
|
||||
self.parsers = []
|
||||
self.attackers = []
|
||||
|
||||
def run(self, args=None):
|
||||
parser = self.get_parser()
|
||||
self.do_run(**vars(parser.parse_args(args)))
|
||||
|
||||
def do_run(self, func, **kwds):
|
||||
func(**kwds)
|
||||
|
||||
def add_parser(self, attacker_class, *args, **kwds):
|
||||
parser = self.subparsers.add_parser(*args, **kwds)
|
||||
attacker = attacker_class()
|
||||
attacker.add_arguments(parser)
|
||||
|
||||
# Not required, just fore debugging:
|
||||
self.parsers.append(parser)
|
||||
self.attackers.append(attacker)
|
||||
|
||||
def get_parser(self):
|
||||
import argparse
|
||||
parser = argparse.ArgumentParser(description=__doc__)
|
||||
parser.add_argument(
|
||||
'--record', default='record.json',
|
||||
help='Exceptions are recorded in here.')
|
||||
|
||||
self.subparsers = parser.add_subparsers()
|
||||
self.add_parser(RandomAtaccker, 'random', help='Random attack')
|
||||
self.add_parser(RedoAttacker, 'redo', help='Redo recorded attack')
|
||||
|
||||
return parser
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
app = AttackApp()
|
||||
app.run()
|
||||
Reference in New Issue
Block a user