Exclude `.git` from search paths.
Currently dscanner searches for files in the target directory ending in `.d` or `.di`. Git has some hidden files in `.git`, which log commits to files. These files share the same name as the tracked file: For example `.git/logs/refs/heads/somedfile.d` actually contains Git data, not D code. A naive call to dscanner using `dscanner --syntaxCheck` or `dscanner --styleCheck` (therefore also `dub lint...`) will attempt to check these Git files, resulting in spurious errors, such as: ```sh ./.git/logs/refs/heads/charstream.d(1:1)[error]: ./.git/logs/refs/heads/charstream.d(1:118)[warn]: Line is longer than 120 characters ``` I believe Git is a common enough tool that we're justified to handle this case inside D scanner, rather than asking the user to write configuration files with dodge the `.git` folder.
This commit is contained in:
parent
54e073e308
commit
346d11f5e0
|
@ -84,7 +84,7 @@ string[] expandArgs(string[] args)
|
||||||
{
|
{
|
||||||
import std.file : isFile, FileException, dirEntries, SpanMode;
|
import std.file : isFile, FileException, dirEntries, SpanMode;
|
||||||
import std.algorithm.iteration : map;
|
import std.algorithm.iteration : map;
|
||||||
import std.algorithm.searching : endsWith;
|
import std.algorithm.searching : endsWith, find;
|
||||||
|
|
||||||
// isFile can throw if it's a broken symlink.
|
// isFile can throw if it's a broken symlink.
|
||||||
bool isFileSafe(T)(T a)
|
bool isFileSafe(T)(T a)
|
||||||
|
@ -105,7 +105,7 @@ string[] expandArgs(string[] args)
|
||||||
else
|
else
|
||||||
foreach (item; dirEntries(arg, SpanMode.breadth).map!(a => a.name))
|
foreach (item; dirEntries(arg, SpanMode.breadth).map!(a => a.name))
|
||||||
{
|
{
|
||||||
if (isFileSafe(item) && (item.endsWith(`.d`) || item.endsWith(`.di`)))
|
if (isFileSafe(item) && (item.endsWith(`.d`) || item.endsWith(`.di`)) && !item.find('.git'))
|
||||||
rVal ~= item;
|
rVal ~= item;
|
||||||
else
|
else
|
||||||
continue;
|
continue;
|
||||||
|
|
Loading…
Reference in New Issue