curl/docs/CHECKSRC.md

150 строки
5.3 KiB
Markdown
Исходник Обычный вид История

2016-04-04 01:11:32 +03:00
# checksrc
This is the tool we use within the curl project to scan C source code and
check that it adheres to our [Source Code Style guide](CODE_STYLE.md).
## Usage
checksrc.pl [options] [file1] [file2] ...
## Command line options
2016-04-06 03:00:01 +03:00
`-W[file]` whitelists that file and excludes it from being checked. Helpful
when, for example, one of the files is generated.
`-D[dir]` directory name to prepend to file names when accessing them.
`-h` shows the help output, that also lists all recognized warnings
2016-04-04 01:11:32 +03:00
## What does checksrc warn for?
checksrc does not check and verify the code against the entire style guide,
but the script is instead an effort to detect the most common mistakes and
2016-11-15 12:47:07 +03:00
syntax mistakes that contributors make before they get accustomed to our code
style. Heck, many of us regulars do the mistakes too and this script helps us
keep the code in shape.
2016-04-04 01:11:32 +03:00
checksrc.pl -h
Lists how to use the script and it lists all existing warnings it has and
problems it detects. At the time of this writing, the existing checksrc
warnings are:
- `ASSIGNWITHINCONDITION`: Assignment within a conditional expression. The
code style mandates the assignment to be done outside of it.
- `ASTERISKNOSPACE`: A pointer was declared like `char* name` instead of the more
appropriate `char *name` style. The asterisk should sit next to the name.
- `ASTERISKSPACE`: A pointer was declared like `char * name` instead of the
more appropriate `char *name` style. The asterisk should sit right next to
the name without a space in between.
- `BADCOMMAND`: There's a bad !checksrc! instruction in the code. See the
2016-04-04 01:11:32 +03:00
**Ignore certain warnings** section below for details.
2016-11-15 12:47:07 +03:00
- `BANNEDFUNC`: A banned function was used. The functions sprintf, vsprintf,
2016-04-04 01:11:32 +03:00
strcat, strncat, gets are **never** allowed in curl source code.
- `BRACEELSE`: '} else' on the same line. The else is supposed to be on the
2016-04-04 01:11:32 +03:00
following line.
- `BRACEPOS`: wrong position for an open brace (`{`).
2016-04-04 01:11:32 +03:00
- `COMMANOSPACE`: a comma without following space
2016-04-04 01:11:32 +03:00
2016-04-06 03:00:01 +03:00
- `COPYRIGHT`: the file is missing a copyright statement!
2016-04-04 01:11:32 +03:00
- `CPPCOMMENTS`: `//` comment detected, that's not C89 compliant
2016-04-04 01:11:32 +03:00
- `FOPENMODE`: `fopen()` needs a macro for the mode string, use it
2016-04-04 01:11:32 +03:00
- `INDENTATION`: detected a wrong start column for code. Note that this
warning only checks some specific places and will certainly miss many bad
2016-04-04 01:11:32 +03:00
indentations.
- `LONGLINE`: A line is longer than 79 columns.
2016-04-04 01:11:32 +03:00
- `MULTISPACE`: Multiple spaces were found where only one should be used.
- `NOSPACEEQUALS`: An equals sign was found without preceding space. We prefer
`a = 2` and *not* `a=2`.
- `OPENCOMMENT`: File ended with a comment (`/*`) still "open".
- `PARENBRACE`: `){` was used without sufficient space in between.
2016-04-04 01:11:32 +03:00
- `RETURNNOSPACE`: `return` was used without space between the keyword and the
2016-04-04 01:11:32 +03:00
following value.
- `SEMINOSPACE`: There was no space (or newline) following a semicolon.
- `SIZEOFNOPAREN`: Found use of sizeof without parentheses. We prefer
`sizeof(int)` style.
- `SNPRINTF` - Found use of `snprintf()`. Since we use an internal replacement
with a different return code etc, we prefer `msnprintf()`.
- `SPACEAFTERPAREN`: there was a space after open parenthesis, `( text`.
2016-04-04 01:11:32 +03:00
- `SPACEBEFORECLOSE`: there was a space before a close parenthesis, `text )`.
2016-04-04 01:11:32 +03:00
- `SPACEBEFORECOMMA`: there was a space before a comma, `one , two`.
2016-04-04 01:11:32 +03:00
- `SPACEBEFOREPAREN`: there was a space before an open parenthesis, `if (`,
2016-04-04 01:11:32 +03:00
where one was not expected
- `SPACESEMICOLON`: there was a space before semicolon, ` ;`.
2016-04-04 01:11:32 +03:00
- `TABS`: TAB characters are not allowed!
2016-04-04 01:11:32 +03:00
- `TRAILINGSPACE`: Trailing white space on the line
2016-04-04 01:11:32 +03:00
- `UNUSEDIGNORE`: a checksrc inlined warning ignore was asked for but not used,
2016-04-04 01:11:32 +03:00
that's an ignore that should be removed or changed to get used.
## Ignore certain warnings
2016-04-06 03:00:01 +03:00
Due to the nature of the source code and the flaws of the checksrc tool, there
is sometimes a need to ignore specific warnings. checksrc allows a few
different ways to do this.
2016-04-04 01:11:32 +03:00
### Inline ignore
You can control what to ignore within a specific source file by providing
instructions to checksrc in the source code itself. You need a magic marker
that is `!checksrc!` followed by the instruction. The instruction can ask to
ignore a specific warning N number of times or you ignore all of them until
you mark the end of the ignored section.
Inline ignores are only done for that single specific source code file.
Example
/* !checksrc! disable LONGLINE all */
2016-04-06 03:00:01 +03:00
This will ignore the warning for overly long lines until it is re-enabled with:
2016-04-04 01:11:32 +03:00
/* !checksrc! enable LONGLINE */
2016-04-06 03:00:01 +03:00
If the enabling isn't performed before the end of the file, it will be enabled
automatically for the next file.
2016-04-04 01:11:32 +03:00
You can also opt to ignore just N violations so that if you have a single long
line you just can't shorten and is agreed to be fine anyway:
/* !checksrc! disable LONGLINE 1 */
... and the warning for long lines will be enabled again automatically after
it has ignored that single warning. The number `1` can of course be changed to
any other integer number. It can be used to make sure only the exact intended
instances are ignored and nothing extra.
### Directory wide ignore patterns
This is a method we've transitioned away from. Use inline ignores as far as
possible.
2016-04-04 01:11:32 +03:00
Make a `checksrc.whitelist` file in the directory of the source code with the
false positive, and include the full offending line into this file.