Merge remote-tracking branch 'upstream/master' into phobos
This commit is contained in:
commit
7b3542fb6a
|
@ -1,5 +1,5 @@
|
|||
; Configure which static analysis checks are enabled
|
||||
[dscanner.analysis.config.StaticAnalysisConfig]
|
||||
[analysis.config.StaticAnalysisConfig]
|
||||
; Check variable, class, struct, interface, union, and function names against t
|
||||
; he Phobos style guide
|
||||
style_check="disabled"
|
||||
|
|
41
.travis.yml
41
.travis.yml
|
@ -15,16 +15,31 @@ env:
|
|||
script: "./.travis.sh"
|
||||
jobs:
|
||||
include:
|
||||
- stage: GitHub Release
|
||||
d: ldc
|
||||
os: linux
|
||||
script: echo "Deploying to GitHub releases ..." && make ldcbuild
|
||||
deploy:
|
||||
provider: releases
|
||||
api_key:
|
||||
secure: pbrrm6E0SPfVwt9g+e/ZFQfrmRuGBNA6KwMMLUhI+2+kbRzNquxvrYAUC7YcRX7xiRL/gugKHmOXEi1Dv9IEdSQ732M06H7ikZT9T9oQWYbsZzmVICBWgIovyM8XIPpVAwP8D7jq0JgMiBicqfEZfoz2SIJjo6aYbyQbCASCu8U=
|
||||
file: bin/dscanner
|
||||
skip_cleanup: true
|
||||
on:
|
||||
repo: dlang-community/D-Scanner
|
||||
tags: true
|
||||
- stage: GitHub Release
|
||||
if: tag IS present
|
||||
d: ldc
|
||||
os: linux
|
||||
script: echo "Deploying to GitHub releases ..." && make release
|
||||
deploy:
|
||||
provider: releases
|
||||
api_key: $GH_REPO_TOKEN
|
||||
file_glob: true
|
||||
file: bin/dscanner-*.tar.gz
|
||||
skip_cleanup: true
|
||||
on:
|
||||
repo: dlang-community/D-Scanner
|
||||
tags: true
|
||||
- stage: GitHub Release
|
||||
if: tag IS present
|
||||
d: ldc
|
||||
os: osx
|
||||
script: echo "Deploying to GitHub releases ..." && make release
|
||||
deploy:
|
||||
provider: releases
|
||||
api_key: $GH_REPO_TOKEN
|
||||
file_glob: true
|
||||
file: bin/dscanner-*.tar.gz
|
||||
skip_cleanup: true
|
||||
on:
|
||||
repo: dlang-community/D-Scanner
|
||||
tags: true
|
||||
|
|
|
@ -141,6 +141,7 @@ Note that the "--skipTests" option is the equivalent of changing each
|
|||
* Public declarations without a documented unittest. By default disabled.
|
||||
* Asserts without an explanatory message. By default disabled.
|
||||
* Indentation of if constraints
|
||||
* Check that `@trusted` is not applied to a whole scope. Trusting a whole scope can be a problem when new declarations are added and if they are not verified manually to be trustable.
|
||||
|
||||
#### Wishlist
|
||||
|
||||
|
|
2
dub.json
2
dub.json
|
@ -14,7 +14,7 @@
|
|||
"dependencies" : {
|
||||
"libdparse": "~>0.8.0-alpha.5",
|
||||
"dsymbol" : "~>0.3.0-alpha.3",
|
||||
"inifiled" : "~>1.1.0",
|
||||
"inifiled" : "~>1.2.0",
|
||||
"emsi_containers" : "~>0.6.0",
|
||||
"libddoc" : "~>0.3.0-beta.1",
|
||||
"stdx-allocator" : "~>2.77.0"
|
||||
|
|
2
inifiled
2
inifiled
|
@ -1 +1 @@
|
|||
Subproject commit e15038a5c265a9fdaea354476e7759d04e8d0bf9
|
||||
Subproject commit 971c5356388a73ebbf69e32f7f5e97cfc06cdcff
|
25
makefile
25
makefile
|
@ -27,6 +27,7 @@ VERSIONS =
|
|||
DEBUG_VERSIONS = -version=dparse_verbose
|
||||
DMD_FLAGS = -w -inline -release -O -J. -od${OBJ_DIR} -version=StdLoggerDisableWarning -fPIC
|
||||
DMD_TEST_FLAGS = -w -g -J. -version=StdLoggerDisableWarning
|
||||
SHELL:=/bin/bash
|
||||
|
||||
all: dmdbuild
|
||||
ldc: ldcbuild
|
||||
|
@ -72,3 +73,27 @@ clean:
|
|||
report: all
|
||||
dscanner --report src > src/dscanner-report.json
|
||||
sonar-runner
|
||||
|
||||
.ONESHELL:
|
||||
release:
|
||||
@set -eux -o pipefail
|
||||
VERSION=$$(git describe --abbrev=0 --tags)
|
||||
ARCH="$${ARCH:-64}"
|
||||
unameOut="$$(uname -s)"
|
||||
case "$$unameOut" in
|
||||
Linux*) OS=linux; ;;
|
||||
Darwin*) OS=osx; ;;
|
||||
*) echo "Unknown OS: $$unameOut"; exit 1
|
||||
esac
|
||||
|
||||
case "$$ARCH" in
|
||||
64) ARCH_SUFFIX="x86_64";;
|
||||
32) ARCH_SUFFIX="x86";;
|
||||
*) echo "Unknown ARCH: $$ARCH"; exit 1
|
||||
esac
|
||||
|
||||
archiveName="dscanner-$$VERSION-$$OS-$$ARCH_SUFFIX.tar.gz"
|
||||
|
||||
echo "Building $$archiveName"
|
||||
${MAKE} ldcbuild
|
||||
tar cvfz "bin/$$archiveName" -C bin dscanner
|
||||
|
|
|
@ -5,6 +5,7 @@
|
|||
module dscanner.analysis.assert_without_msg;
|
||||
|
||||
import dscanner.analysis.base : BaseAnalyzer;
|
||||
import dscanner.utils : safeAccess;
|
||||
import dsymbol.scope_ : Scope;
|
||||
import dparse.lexer;
|
||||
import dparse.ast;
|
||||
|
@ -37,11 +38,10 @@ class AssertWithoutMessageCheck : BaseAnalyzer
|
|||
if (!isStdExceptionImported)
|
||||
return;
|
||||
|
||||
if (expr.unaryExpression !is null &&
|
||||
expr.unaryExpression.primaryExpression !is null &&
|
||||
expr.unaryExpression.primaryExpression.identifierOrTemplateInstance !is null)
|
||||
if (const IdentifierOrTemplateInstance iot = safeAccess(expr)
|
||||
.unaryExpression.primaryExpression.identifierOrTemplateInstance)
|
||||
{
|
||||
auto ident = expr.unaryExpression.primaryExpression.identifierOrTemplateInstance.identifier;
|
||||
auto ident = iot.identifier;
|
||||
if (ident.text == "enforce" && expr.arguments !is null && expr.arguments.argumentList !is null &&
|
||||
expr.arguments.argumentList.items.length < 2)
|
||||
addErrorMessage(ident.line, ident.column, KEY, MESSAGE);
|
||||
|
|
|
@ -17,44 +17,43 @@ StaticAnalysisConfig defaultStaticAnalysisConfig()
|
|||
/// Describes how a check is operated.
|
||||
enum Check: string
|
||||
{
|
||||
/// Check is disabled.
|
||||
disabled = "disabled",
|
||||
/// Check is enabled.
|
||||
enabled = "enabled",
|
||||
/// Check is enabled but not operated in the unittests.
|
||||
skipTests = "skip-unittest"
|
||||
/// Check is disabled.
|
||||
disabled = "disabled",
|
||||
/// Check is enabled.
|
||||
enabled = "enabled",
|
||||
/// Check is enabled but not operated in the unittests.
|
||||
skipTests = "skip-unittest"
|
||||
}
|
||||
|
||||
/// Applies the --skipTests switch, allowing to call Dscanner without config
|
||||
/// and less noise related to the unittests.
|
||||
void enabled2SkipTests(ref StaticAnalysisConfig config)
|
||||
{
|
||||
foreach (mem; __traits(allMembers, StaticAnalysisConfig))
|
||||
{
|
||||
static if (is(typeof(__traits(getMember, StaticAnalysisConfig, mem))))
|
||||
static if (is(typeof(__traits(getMember, config, mem)) == string))
|
||||
{
|
||||
if (__traits(getMember, config, mem) == Check.enabled)
|
||||
__traits(getMember, config, mem) = Check.skipTests;
|
||||
|
||||
}
|
||||
}
|
||||
foreach (mem; __traits(allMembers, StaticAnalysisConfig))
|
||||
{
|
||||
static if (is(typeof(__traits(getMember, StaticAnalysisConfig, mem))))
|
||||
static if (is(typeof(__traits(getMember, config, mem)) == string))
|
||||
{
|
||||
if (__traits(getMember, config, mem) == Check.enabled)
|
||||
__traits(getMember, config, mem) = Check.skipTests;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// Returns a config with all the checks disabled.
|
||||
StaticAnalysisConfig disabledConfig()
|
||||
{
|
||||
StaticAnalysisConfig config;
|
||||
foreach (mem; __traits(allMembers, StaticAnalysisConfig))
|
||||
{
|
||||
static if (is(typeof(__traits(getMember, StaticAnalysisConfig, mem))))
|
||||
static if (is(typeof(__traits(getMember, config, mem)) == string))
|
||||
__traits(getMember, config, mem) = Check.disabled;
|
||||
}
|
||||
return config;
|
||||
StaticAnalysisConfig config;
|
||||
foreach (mem; __traits(allMembers, StaticAnalysisConfig))
|
||||
{
|
||||
static if (is(typeof(__traits(getMember, StaticAnalysisConfig, mem))))
|
||||
static if (is(typeof(__traits(getMember, config, mem)) == string))
|
||||
__traits(getMember, config, mem) = Check.disabled;
|
||||
}
|
||||
return config;
|
||||
}
|
||||
|
||||
@INI("Configure which static analysis checks are enabled")
|
||||
@INI("Configure which static analysis checks are enabled", "analysis.config.StaticAnalysisConfig")
|
||||
struct StaticAnalysisConfig
|
||||
{
|
||||
@INI("Check variable, class, struct, interface, union, and function names against the Phobos style guide")
|
||||
|
@ -171,14 +170,14 @@ struct StaticAnalysisConfig
|
|||
@INI("Check for properly documented public functions (Returns, Params)")
|
||||
string properly_documented_public_functions = Check.disabled;
|
||||
|
||||
@INI("Check for useless usage of the final attribute")
|
||||
string final_attribute_check = Check.enabled;
|
||||
@INI("Check for useless usage of the final attribute")
|
||||
string final_attribute_check = Check.enabled;
|
||||
|
||||
@INI("Check for virtual calls in the class constructors")
|
||||
string vcall_in_ctor = Check.enabled;
|
||||
@INI("Check for virtual calls in the class constructors")
|
||||
string vcall_in_ctor = Check.enabled;
|
||||
|
||||
@INI("Check for useless user defined initializers")
|
||||
string useless_initializer = Check.enabled;
|
||||
@INI("Check for useless user defined initializers")
|
||||
string useless_initializer = Check.enabled;
|
||||
|
||||
@INI("Check allman brace style")
|
||||
string allman_braces_check = Check.disabled;
|
||||
|
@ -195,6 +194,9 @@ struct StaticAnalysisConfig
|
|||
@INI("Check indent of if constraints")
|
||||
string if_constraints_indent = Check.disabled;
|
||||
|
||||
@INI("Check for @trusted applied to a bigger scope than a single function")
|
||||
string trust_too_much = Check.enabled;
|
||||
|
||||
@INI("Module-specific filters")
|
||||
ModuleFilters filters;
|
||||
}
|
||||
|
@ -207,11 +209,11 @@ private template ModuleFiltersMixin(A)
|
|||
static if (is(typeof(__traits(getMember, StaticAnalysisConfig, mem)) == string))
|
||||
s ~= `@INI("Exclude/Import modules") string[] ` ~ mem ~ ";\n";
|
||||
|
||||
return s;
|
||||
return s;
|
||||
}();
|
||||
}
|
||||
|
||||
@INI("ModuleFilters. +std.,-std.internal")
|
||||
@INI("ModuleFilters for selectively enabling (+std) and disabling (-std.internal) individual checks", "analysis.config.ModuleFilters")
|
||||
struct ModuleFilters
|
||||
{
|
||||
mixin(ModuleFiltersMixin!int);
|
||||
|
|
|
@ -1,6 +1,7 @@
|
|||
module dscanner.analysis.mismatched_args;
|
||||
|
||||
import dscanner.analysis.base : BaseAnalyzer;
|
||||
import dscanner.utils : safeAccess;
|
||||
import dsymbol.scope_;
|
||||
import dsymbol.symbol;
|
||||
import dparse.ast;
|
||||
|
@ -126,16 +127,15 @@ final class ArgVisitor : ASTVisitor
|
|||
{
|
||||
import dsymbol.string_interning : internString;
|
||||
|
||||
if (unary.primaryExpression is null)
|
||||
return;
|
||||
if (unary.primaryExpression.identifierOrTemplateInstance is null)
|
||||
return;
|
||||
if (unary.primaryExpression.identifierOrTemplateInstance.identifier == tok!"")
|
||||
return;
|
||||
immutable t = unary.primaryExpression.identifierOrTemplateInstance.identifier;
|
||||
lines ~= t.line;
|
||||
columns ~= t.column;
|
||||
args ~= internString(t.text);
|
||||
if (auto iot = unary.safeAccess.primaryExpression.identifierOrTemplateInstance.unwrap)
|
||||
{
|
||||
if (iot.identifier == tok!"")
|
||||
return;
|
||||
immutable t = iot.identifier;
|
||||
lines ~= t.line;
|
||||
columns ~= t.column;
|
||||
args ~= internString(t.text);
|
||||
}
|
||||
}
|
||||
|
||||
alias visit = ASTVisitor.visit;
|
||||
|
|
|
@ -166,8 +166,11 @@ private:
|
|||
import std.array : array;
|
||||
|
||||
const comment = parseComment(commentText, null);
|
||||
if (!comment.isDitto && !withinTemplate)
|
||||
{
|
||||
if (withinTemplate) {
|
||||
const paramSection = comment.sections.find!(s => s.name == "Params");
|
||||
if (!paramSection.empty)
|
||||
lastSeenFun.ddocParams ~= paramSection[0].mapping.map!(a => a[0]).array;
|
||||
} else if (!comment.isDitto) {
|
||||
// check old function for invalid ddoc params
|
||||
if (lastSeenFun.active)
|
||||
postCheckSeenDdocParams();
|
||||
|
@ -188,7 +191,7 @@ private:
|
|||
}
|
||||
|
||||
void checkDdocParams(size_t line, size_t column, const Parameters params,
|
||||
const TemplateParameters templateParameters = null)
|
||||
const TemplateParameters templateParameters = null)
|
||||
{
|
||||
import std.array : array;
|
||||
import std.algorithm.searching : canFind, countUntil;
|
||||
|
@ -263,13 +266,13 @@ private:
|
|||
{
|
||||
if (p.templateTypeParameter)
|
||||
return p.templateTypeParameter.identifier.text;
|
||||
if (p.templateValueParameter)
|
||||
if (p.templateValueParameter)
|
||||
return p.templateValueParameter.identifier.text;
|
||||
if (p.templateAliasParameter)
|
||||
if (p.templateAliasParameter)
|
||||
return p.templateAliasParameter.identifier.text;
|
||||
if (p.templateTupleParameter)
|
||||
if (p.templateTupleParameter)
|
||||
return p.templateTupleParameter.identifier.text;
|
||||
if (p.templateThisParameter)
|
||||
if (p.templateThisParameter)
|
||||
return p.templateThisParameter.templateTypeParameter.identifier.text;
|
||||
|
||||
return null;
|
||||
|
@ -280,35 +283,35 @@ private:
|
|||
import std.meta : AliasSeq;
|
||||
alias properties = AliasSeq!(
|
||||
"aliasDeclaration",
|
||||
"aliasThisDeclaration",
|
||||
"anonymousEnumDeclaration",
|
||||
"attributeDeclaration",
|
||||
"classDeclaration",
|
||||
"conditionalDeclaration",
|
||||
"constructor",
|
||||
"debugSpecification",
|
||||
"destructor",
|
||||
"enumDeclaration",
|
||||
"eponymousTemplateDeclaration",
|
||||
"functionDeclaration",
|
||||
"importDeclaration",
|
||||
"interfaceDeclaration",
|
||||
"invariant_",
|
||||
"mixinDeclaration",
|
||||
"mixinTemplateDeclaration",
|
||||
"postblit",
|
||||
"pragmaDeclaration",
|
||||
"sharedStaticConstructor",
|
||||
"sharedStaticDestructor",
|
||||
"staticAssertDeclaration",
|
||||
"staticConstructor",
|
||||
"staticDestructor",
|
||||
"structDeclaration",
|
||||
"templateDeclaration",
|
||||
"unionDeclaration",
|
||||
"unittest_",
|
||||
"variableDeclaration",
|
||||
"versionSpecification",
|
||||
"aliasThisDeclaration",
|
||||
"anonymousEnumDeclaration",
|
||||
"attributeDeclaration",
|
||||
"classDeclaration",
|
||||
"conditionalDeclaration",
|
||||
"constructor",
|
||||
"debugSpecification",
|
||||
"destructor",
|
||||
"enumDeclaration",
|
||||
"eponymousTemplateDeclaration",
|
||||
"functionDeclaration",
|
||||
"importDeclaration",
|
||||
"interfaceDeclaration",
|
||||
"invariant_",
|
||||
"mixinDeclaration",
|
||||
"mixinTemplateDeclaration",
|
||||
"postblit",
|
||||
"pragmaDeclaration",
|
||||
"sharedStaticConstructor",
|
||||
"sharedStaticDestructor",
|
||||
"staticAssertDeclaration",
|
||||
"staticConstructor",
|
||||
"staticDestructor",
|
||||
"structDeclaration",
|
||||
"templateDeclaration",
|
||||
"unionDeclaration",
|
||||
"unittest_",
|
||||
"variableDeclaration",
|
||||
"versionSpecification",
|
||||
);
|
||||
if (decl.declarations !is null)
|
||||
return false;
|
||||
|
@ -796,6 +799,40 @@ string bar(P, R)(R r){}// [warn]: %s
|
|||
}c.format(
|
||||
ProperlyDocumentedPublicFunctions.MISSING_TEMPLATE_PARAMS_MESSAGE.format("P")
|
||||
), sac);
|
||||
}
|
||||
|
||||
// https://github.com/dlang-community/D-Scanner/issues/583
|
||||
unittest
|
||||
{
|
||||
StaticAnalysisConfig sac = disabledConfig;
|
||||
sac.properly_documented_public_functions = Check.enabled;
|
||||
|
||||
assertAnalyzerWarnings(q{
|
||||
/++
|
||||
Implements the homonym function (also known as `accumulate`)
|
||||
|
||||
Returns:
|
||||
the accumulated `result`
|
||||
|
||||
Params:
|
||||
fun = one or more functions
|
||||
+/
|
||||
template reduce(fun...)
|
||||
if (fun.length >= 1)
|
||||
{
|
||||
/++
|
||||
No-seed version. The first element of `r` is used as the seed's value.
|
||||
|
||||
Params:
|
||||
r = an iterable value as defined by `isIterable`
|
||||
|
||||
Returns:
|
||||
the final result of the accumulator applied to the iterable
|
||||
+/
|
||||
auto reduce(R)(R r){}
|
||||
}
|
||||
}c.format(
|
||||
), sac);
|
||||
|
||||
stderr.writeln("Unittest for ProperlyDocumentedPublicFunctions passed.");
|
||||
}
|
||||
|
|
|
@ -72,6 +72,7 @@ import dscanner.analysis.redundant_attributes;
|
|||
import dscanner.analysis.has_public_example;
|
||||
import dscanner.analysis.assert_without_msg;
|
||||
import dscanner.analysis.if_constraints_indent;
|
||||
import dscanner.analysis.trust_too_much;
|
||||
|
||||
import dsymbol.string_interning : internString;
|
||||
import dsymbol.scope_;
|
||||
|
@ -81,7 +82,7 @@ import dsymbol.conversion.first;
|
|||
import dsymbol.conversion.second;
|
||||
import dsymbol.modulecache : ModuleCache;
|
||||
|
||||
import dscanner.readers;
|
||||
import dscanner.utils;
|
||||
|
||||
bool first = true;
|
||||
|
||||
|
@ -511,6 +512,10 @@ MessageSet analyze(string fileName, const Module m, const StaticAnalysisConfig a
|
|||
checks ~= new IfConstraintsIndentCheck(fileName, tokens,
|
||||
analysisConfig.if_constraints_indent == Check.skipTests && !ut);
|
||||
|
||||
if (moduleName.shouldRun!"trust_too_much"(analysisConfig))
|
||||
checks ~= new TrustTooMuchCheck(fileName,
|
||||
analysisConfig.trust_too_much == Check.skipTests && !ut);
|
||||
|
||||
version (none)
|
||||
if (moduleName.shouldRun!"redundant_if_check"(analysisConfig))
|
||||
checks ~= new IfStatementCheck(fileName, moduleScope,
|
||||
|
|
|
@ -8,6 +8,7 @@ module dscanner.analysis.static_if_else;
|
|||
import dparse.ast;
|
||||
import dparse.lexer;
|
||||
import dscanner.analysis.base;
|
||||
import dscanner.utils : safeAccess;
|
||||
|
||||
/**
|
||||
* Checks for potentially mistaken static if / else if.
|
||||
|
@ -47,17 +48,7 @@ class StaticIfElse : BaseAnalyzer
|
|||
|
||||
const(IfStatement) getIfStatement(const ConditionalStatement cc)
|
||||
{
|
||||
if (cc.falseStatement.statement)
|
||||
{
|
||||
if (cc.falseStatement.statement.statementNoCaseNoDefault)
|
||||
{
|
||||
if (cc.falseStatement.statement.statementNoCaseNoDefault.ifStatement)
|
||||
{
|
||||
return cc.falseStatement.statement.statementNoCaseNoDefault.ifStatement;
|
||||
}
|
||||
}
|
||||
}
|
||||
return null;
|
||||
return safeAccess(cc).falseStatement.statement.statementNoCaseNoDefault.ifStatement;
|
||||
}
|
||||
|
||||
enum KEY = "dscanner.suspicious.static_if_else";
|
||||
|
|
|
@ -0,0 +1,149 @@
|
|||
// Copyright The dlang community - 2018
|
||||
// Distributed under the Boost Software License, Version 1.0.
|
||||
// (See accompanying file LICENSE_1_0.txt or copy at
|
||||
// http://www.boost.org/LICENSE_1_0.txt)
|
||||
|
||||
module dscanner.analysis.trust_too_much;
|
||||
|
||||
import std.stdio;
|
||||
import dparse.ast;
|
||||
import dparse.lexer;
|
||||
import dscanner.analysis.base;
|
||||
import dsymbol.scope_;
|
||||
|
||||
/**
|
||||
* Checks that `@trusted` is only applied to a a single function
|
||||
*/
|
||||
class TrustTooMuchCheck : BaseAnalyzer
|
||||
{
|
||||
private:
|
||||
|
||||
static immutable MESSAGE = "Trusting a whole scope is a bad idea, " ~
|
||||
"`@trusted` should only be attached to a single function";
|
||||
static immutable string KEY = "dscanner.trust_too_much";
|
||||
|
||||
bool checkAtAttribute = true;
|
||||
|
||||
public:
|
||||
|
||||
alias visit = BaseAnalyzer.visit;
|
||||
|
||||
///
|
||||
this(string fileName, bool skipTests = false)
|
||||
{
|
||||
super(fileName, sc, skipTests);
|
||||
}
|
||||
|
||||
override void visit(const AtAttribute d)
|
||||
{
|
||||
if (checkAtAttribute && d.identifier.text == "trusted")
|
||||
{
|
||||
const Token t = d.identifier;
|
||||
addErrorMessage(t.line, t.column, KEY, MESSAGE);
|
||||
}
|
||||
d.accept(this);
|
||||
}
|
||||
|
||||
// always applied to function body, so OK
|
||||
override void visit(const MemberFunctionAttribute d)
|
||||
{
|
||||
const oldCheckAtAttribute = checkAtAttribute;
|
||||
checkAtAttribute = false;
|
||||
d.accept(this);
|
||||
checkAtAttribute = oldCheckAtAttribute;
|
||||
}
|
||||
|
||||
// handles `@trusted{}` and old style, leading, atAttribute for single funcs
|
||||
override void visit(const Declaration d)
|
||||
{
|
||||
const oldCheckAtAttribute = checkAtAttribute;
|
||||
checkAtAttribute = d.functionDeclaration is null;
|
||||
d.accept(this);
|
||||
checkAtAttribute = oldCheckAtAttribute;
|
||||
}
|
||||
|
||||
// issue #588
|
||||
override void visit(const AliasDeclaration d)
|
||||
{
|
||||
const oldCheckAtAttribute = checkAtAttribute;
|
||||
checkAtAttribute = false;
|
||||
d.accept(this);
|
||||
checkAtAttribute = oldCheckAtAttribute;
|
||||
}
|
||||
}
|
||||
|
||||
unittest
|
||||
{
|
||||
import dscanner.analysis.config : StaticAnalysisConfig, Check, disabledConfig;
|
||||
import dscanner.analysis.helpers : assertAnalyzerWarnings;
|
||||
import std.format : format;
|
||||
|
||||
StaticAnalysisConfig sac = disabledConfig();
|
||||
sac.trust_too_much = Check.enabled;
|
||||
const msg = TrustTooMuchCheck.MESSAGE;
|
||||
|
||||
//--- fail cases ---//
|
||||
|
||||
assertAnalyzerWarnings(q{
|
||||
@trusted: // [warn]: %s
|
||||
void test();
|
||||
}c.format(msg), sac);
|
||||
|
||||
assertAnalyzerWarnings(q{
|
||||
@trusted @nogc: // [warn]: %s
|
||||
void test();
|
||||
}c.format(msg), sac);
|
||||
|
||||
assertAnalyzerWarnings(q{
|
||||
@trusted { // [warn]: %s
|
||||
void test();
|
||||
void test();
|
||||
}
|
||||
}c.format(msg), sac);
|
||||
|
||||
assertAnalyzerWarnings(q{
|
||||
@safe {
|
||||
@trusted @nogc { // [warn]: %s
|
||||
void test();
|
||||
void test();
|
||||
}}
|
||||
}c.format(msg), sac);
|
||||
|
||||
assertAnalyzerWarnings(q{
|
||||
@nogc @trusted { // [warn]: %s
|
||||
void test();
|
||||
void test();
|
||||
}
|
||||
}c.format(msg), sac);
|
||||
|
||||
assertAnalyzerWarnings(q{
|
||||
@trusted template foo(){ // [warn]: %s
|
||||
}
|
||||
}c.format(msg), sac);
|
||||
|
||||
assertAnalyzerWarnings(q{
|
||||
struct foo{
|
||||
@trusted: // [warn]: %s
|
||||
}
|
||||
}c.format(msg), sac);
|
||||
//--- pass cases ---//
|
||||
|
||||
assertAnalyzerWarnings(q{
|
||||
void test() @trusted {}
|
||||
}c, sac);
|
||||
|
||||
assertAnalyzerWarnings(q{
|
||||
@trusted void test();
|
||||
}c, sac);
|
||||
|
||||
assertAnalyzerWarnings(q{
|
||||
@nogc template foo(){
|
||||
}
|
||||
}c , sac);
|
||||
|
||||
assertAnalyzerWarnings(q{
|
||||
alias nothrow @trusted uint F4();
|
||||
}c , sac);
|
||||
|
||||
stderr.writeln("Unittest for TrustTooMuchCheck passed.");
|
||||
}
|
|
@ -5,6 +5,7 @@
|
|||
module dscanner.analysis.unmodified;
|
||||
|
||||
import dscanner.analysis.base;
|
||||
import dscanner.utils : safeAccess;
|
||||
import dsymbol.scope_ : Scope;
|
||||
import std.container;
|
||||
import dparse.ast;
|
||||
|
@ -217,12 +218,9 @@ private:
|
|||
|
||||
bool initializedFromNew(const Initializer initializer)
|
||||
{
|
||||
if (initializer && initializer.nonVoidInitializer &&
|
||||
initializer.nonVoidInitializer.assignExpression &&
|
||||
cast(UnaryExpression) initializer.nonVoidInitializer.assignExpression)
|
||||
if (const UnaryExpression ue = cast(UnaryExpression) safeAccess(initializer)
|
||||
.nonVoidInitializer.assignExpression)
|
||||
{
|
||||
const UnaryExpression ue =
|
||||
cast(UnaryExpression) initializer.nonVoidInitializer.assignExpression;
|
||||
return ue.newExpression !is null;
|
||||
}
|
||||
return false;
|
||||
|
|
|
@ -5,6 +5,7 @@
|
|||
module dscanner.analysis.useless_initializer;
|
||||
|
||||
import dscanner.analysis.base;
|
||||
import dscanner.utils : safeAccess;
|
||||
import containers.dynamicarray;
|
||||
import containers.hashmap;
|
||||
import dparse.ast;
|
||||
|
@ -147,7 +148,7 @@ public:
|
|||
!declarator.initializer.nonVoidInitializer ||
|
||||
declarator.comment !is null)
|
||||
{
|
||||
continue;
|
||||
continue;
|
||||
}
|
||||
|
||||
version(unittest)
|
||||
|
@ -171,15 +172,14 @@ public:
|
|||
bool isStr, isSzInt;
|
||||
Token customType;
|
||||
|
||||
if (decl.type.type2.typeIdentifierPart &&
|
||||
decl.type.type2.typeIdentifierPart.typeIdentifierPart is null)
|
||||
if (const TypeIdentifierPart tip = safeAccess(decl).type.type2.typeIdentifierPart)
|
||||
{
|
||||
const IdentifierOrTemplateInstance idt =
|
||||
decl.type.type2.typeIdentifierPart.identifierOrTemplateInstance;
|
||||
|
||||
customType = idt.identifier;
|
||||
isStr = customType.text.among("string", "wstring", "dstring") != 0;
|
||||
isSzInt = customType.text.among("size_t", "ptrdiff_t") != 0;
|
||||
if (!tip.typeIdentifierPart)
|
||||
{
|
||||
customType = tip.identifierOrTemplateInstance.identifier;
|
||||
isStr = customType.text.among("string", "wstring", "dstring") != 0;
|
||||
isSzInt = customType.text.among("size_t", "ptrdiff_t") != 0;
|
||||
}
|
||||
}
|
||||
|
||||
// --- 'BasicType/Symbol AssignExpression' ---//
|
||||
|
@ -230,16 +230,18 @@ public:
|
|||
}
|
||||
}
|
||||
|
||||
// Symbol s = Symbol.init
|
||||
else if (ue && customType != tok!"" && ue.unaryExpression && ue.unaryExpression.primaryExpression &&
|
||||
ue.unaryExpression.primaryExpression.identifierOrTemplateInstance &&
|
||||
ue.unaryExpression.primaryExpression.identifierOrTemplateInstance.identifier == customType &&
|
||||
ue.identifierOrTemplateInstance && ue.identifierOrTemplateInstance.identifier.text == "init")
|
||||
else if (const IdentifierOrTemplateInstance iot = safeAccess(ue)
|
||||
.unaryExpression.primaryExpression.identifierOrTemplateInstance)
|
||||
{
|
||||
if (customType.text in _structCanBeInit)
|
||||
// Symbol s = Symbol.init
|
||||
if (ue && customType != tok!"" && iot.identifier == customType &&
|
||||
ue.identifierOrTemplateInstance && ue.identifierOrTemplateInstance.identifier.text == "init")
|
||||
{
|
||||
if (!_structCanBeInit[customType.text])
|
||||
mixin(warn);
|
||||
if (customType.text in _structCanBeInit)
|
||||
{
|
||||
if (!_structCanBeInit[customType.text])
|
||||
mixin(warn);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -5,6 +5,7 @@
|
|||
module dscanner.analysis.vcall_in_ctor;
|
||||
|
||||
import dscanner.analysis.base;
|
||||
import dscanner.utils;
|
||||
import dparse.ast, dparse.lexer;
|
||||
import std.algorithm: among;
|
||||
import std.algorithm.iteration : filter;
|
||||
|
@ -220,16 +221,12 @@ public:
|
|||
|
||||
override void visit(const(UnaryExpression) exp)
|
||||
{
|
||||
if (isInCtor)
|
||||
// get function identifier for a call, only for this member (so no ident chain)
|
||||
if (isInCtor && exp.functionCallExpression &&
|
||||
exp.functionCallExpression.unaryExpression &&
|
||||
exp.functionCallExpression.unaryExpression.primaryExpression &&
|
||||
exp.functionCallExpression.unaryExpression.primaryExpression
|
||||
.identifierOrTemplateInstance)
|
||||
if (const IdentifierOrTemplateInstance iot = safeAccess(exp)
|
||||
.functionCallExpression.unaryExpression.primaryExpression.identifierOrTemplateInstance)
|
||||
{
|
||||
const Token t = exp.functionCallExpression.unaryExpression
|
||||
.primaryExpression.identifierOrTemplateInstance.identifier;
|
||||
|
||||
const Token t = iot.identifier;
|
||||
if (t != tok!"")
|
||||
{
|
||||
_ctorCalls[$-1] ~= t;
|
||||
|
|
|
@ -12,7 +12,7 @@ import dparse.rollback_allocator;
|
|||
import std.stdio;
|
||||
import std.container.rbtree;
|
||||
import std.functional : toDelegate;
|
||||
import dscanner.readers;
|
||||
import dscanner.utils;
|
||||
|
||||
/**
|
||||
* AST visitor that collects modules imported to an R-B tree.
|
||||
|
|
|
@ -31,7 +31,7 @@ import dscanner.symbol_finder;
|
|||
import dscanner.analysis.run;
|
||||
import dscanner.analysis.config;
|
||||
import dscanner.dscanner_version;
|
||||
import dscanner.readers;
|
||||
import dscanner.utils;
|
||||
|
||||
import inifiled;
|
||||
|
||||
|
@ -68,7 +68,6 @@ else
|
|||
bool printVersion;
|
||||
bool explore;
|
||||
string errorFormat;
|
||||
bool patchConfig;
|
||||
|
||||
try
|
||||
{
|
||||
|
@ -97,8 +96,7 @@ else
|
|||
"muffinButton", &muffin,
|
||||
"explore", &explore,
|
||||
"skipTests", &skipTests,
|
||||
"errorFormat|f", &errorFormat,
|
||||
"patchConfig", &patchConfig);
|
||||
"errorFormat|f", &errorFormat);
|
||||
//dfmt on
|
||||
}
|
||||
catch (ConvException e)
|
||||
|
@ -235,11 +233,7 @@ else
|
|||
StaticAnalysisConfig config = defaultStaticAnalysisConfig();
|
||||
string s = configLocation is null ? getConfigurationLocation() : configLocation;
|
||||
if (s.exists())
|
||||
{
|
||||
if (hasWrongIniFileSection(s, patchConfig))
|
||||
return 0;
|
||||
readINIFile(config, s);
|
||||
}
|
||||
if (skipTests)
|
||||
config.enabled2SkipTests;
|
||||
if (report)
|
||||
|
@ -393,10 +387,7 @@ Options:
|
|||
Generates a default configuration file for the static analysis checks,
|
||||
|
||||
--skipTests
|
||||
Does not analyze in the unittests. Only works if --styleCheck.,
|
||||
|
||||
--patchConfig
|
||||
Patches the configuration file passed as parameter for v0.5.0.`,
|
||||
Does not analyze in the unittests. Only works if --styleCheck.`,
|
||||
|
||||
programName);
|
||||
}
|
||||
|
@ -416,24 +407,28 @@ version (OSX) version = useXDG;
|
|||
*/
|
||||
string getDefaultConfigurationLocation()
|
||||
{
|
||||
import std.process : environment;
|
||||
import std.exception : enforce;
|
||||
version (useXDG)
|
||||
{
|
||||
import std.process : environment;
|
||||
|
||||
string configDir = environment.get("XDG_CONFIG_HOME", null);
|
||||
if (configDir is null)
|
||||
{
|
||||
configDir = environment.get("HOME", null);
|
||||
if (configDir is null)
|
||||
throw new Exception("Both $XDG_CONFIG_HOME and $HOME are unset");
|
||||
enforce(configDir !is null, "Both $XDG_CONFIG_HOME and $HOME are unset");
|
||||
configDir = buildPath(configDir, ".config", "dscanner", CONFIG_FILE_NAME);
|
||||
}
|
||||
else
|
||||
configDir = buildPath(configDir, "dscanner", CONFIG_FILE_NAME);
|
||||
return configDir;
|
||||
}
|
||||
else version (Windows)
|
||||
return CONFIG_FILE_NAME;
|
||||
else version(Windows)
|
||||
{
|
||||
string configDir = environment.get("APPDATA", null);
|
||||
enforce(configDir !is null, "%APPDATA% is unset");
|
||||
configDir = buildPath(configDir, "dscanner", CONFIG_FILE_NAME);
|
||||
return configDir;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -472,41 +467,3 @@ string getConfigurationLocation()
|
|||
|
||||
return getDefaultConfigurationLocation();
|
||||
}
|
||||
|
||||
|
||||
/// Patch the INI file to v0.5.0 format.
|
||||
//TODO: remove this from v0.6.0
|
||||
bool hasWrongIniFileSection(string configFilename, bool patch)
|
||||
{
|
||||
import std.string : indexOf;
|
||||
import std.array : replace;
|
||||
|
||||
bool result;
|
||||
|
||||
static immutable v1 = "analysis.config.StaticAnalysisConfig";
|
||||
static immutable v2 = "dscanner.analysis.config.StaticAnalysisConfig";
|
||||
|
||||
char[] c = cast(char[]) readFile(configFilename);
|
||||
try if (c.indexOf(v2) < 0)
|
||||
{
|
||||
if (!patch)
|
||||
{
|
||||
writeln("warning, the configuration file `", configFilename, "` contains an outdated property");
|
||||
writeln("change manually [", v1, "] to [", v2, "]" );
|
||||
writeln("or restart D-Scanner with the `--patchConfig` option");
|
||||
result = true;
|
||||
}
|
||||
else
|
||||
{
|
||||
c = replace(c, v1, v2);
|
||||
std.file.write(configFilename, c);
|
||||
writeln("the configuration file `", configFilename, "` has been updated correctly");
|
||||
}
|
||||
}
|
||||
catch(Exception e)
|
||||
{
|
||||
stderr.writeln("error encountered when trying to verify the INI file compatibility");
|
||||
throw e;
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
|
|
@ -1,71 +0,0 @@
|
|||
module dscanner.readers;
|
||||
|
||||
import std.array : appender, uninitializedArray;
|
||||
import std.stdio : stdin, stderr, File;
|
||||
import std.conv : to;
|
||||
import std.file : exists;
|
||||
|
||||
ubyte[] readStdin()
|
||||
{
|
||||
auto sourceCode = appender!(ubyte[])();
|
||||
ubyte[4096] buf;
|
||||
while (true)
|
||||
{
|
||||
auto b = stdin.rawRead(buf);
|
||||
if (b.length == 0)
|
||||
break;
|
||||
sourceCode.put(b);
|
||||
}
|
||||
return sourceCode.data;
|
||||
}
|
||||
|
||||
ubyte[] readFile(string fileName)
|
||||
{
|
||||
if (fileName == "stdin")
|
||||
return readStdin();
|
||||
if (!exists(fileName))
|
||||
{
|
||||
stderr.writefln("%s does not exist", fileName);
|
||||
return [];
|
||||
}
|
||||
File f = File(fileName);
|
||||
if (f.size == 0)
|
||||
return [];
|
||||
ubyte[] sourceCode = uninitializedArray!(ubyte[])(to!size_t(f.size));
|
||||
f.rawRead(sourceCode);
|
||||
return sourceCode;
|
||||
}
|
||||
|
||||
string[] expandArgs(string[] args)
|
||||
{
|
||||
import std.file : isFile, FileException, dirEntries, SpanMode;
|
||||
import std.algorithm.iteration : map;
|
||||
import std.algorithm.searching : endsWith;
|
||||
|
||||
// isFile can throw if it's a broken symlink.
|
||||
bool isFileSafe(T)(T a)
|
||||
{
|
||||
try
|
||||
return isFile(a);
|
||||
catch (FileException)
|
||||
return false;
|
||||
}
|
||||
|
||||
string[] rVal;
|
||||
if (args.length == 1)
|
||||
args ~= ".";
|
||||
foreach (arg; args[1 .. $])
|
||||
{
|
||||
if (arg == "stdin" || isFileSafe(arg))
|
||||
rVal ~= arg;
|
||||
else
|
||||
foreach (item; dirEntries(arg, SpanMode.breadth).map!(a => a.name))
|
||||
{
|
||||
if (isFileSafe(item) && (item.endsWith(`.d`) || item.endsWith(`.di`)))
|
||||
rVal ~= item;
|
||||
else
|
||||
continue;
|
||||
}
|
||||
}
|
||||
return rVal;
|
||||
}
|
|
@ -0,0 +1,194 @@
|
|||
module dscanner.utils;
|
||||
|
||||
import std.array : appender, uninitializedArray;
|
||||
import std.stdio : stdin, stderr, File;
|
||||
import std.conv : to;
|
||||
import std.file : exists;
|
||||
|
||||
ubyte[] readStdin()
|
||||
{
|
||||
auto sourceCode = appender!(ubyte[])();
|
||||
ubyte[4096] buf;
|
||||
while (true)
|
||||
{
|
||||
auto b = stdin.rawRead(buf);
|
||||
if (b.length == 0)
|
||||
break;
|
||||
sourceCode.put(b);
|
||||
}
|
||||
return sourceCode.data;
|
||||
}
|
||||
|
||||
ubyte[] readFile(string fileName)
|
||||
{
|
||||
if (fileName == "stdin")
|
||||
return readStdin();
|
||||
if (!exists(fileName))
|
||||
{
|
||||
stderr.writefln("%s does not exist", fileName);
|
||||
return [];
|
||||
}
|
||||
File f = File(fileName);
|
||||
if (f.size == 0)
|
||||
return [];
|
||||
ubyte[] sourceCode = uninitializedArray!(ubyte[])(to!size_t(f.size));
|
||||
f.rawRead(sourceCode);
|
||||
return sourceCode;
|
||||
}
|
||||
|
||||
string[] expandArgs(string[] args)
|
||||
{
|
||||
import std.file : isFile, FileException, dirEntries, SpanMode;
|
||||
import std.algorithm.iteration : map;
|
||||
import std.algorithm.searching : endsWith;
|
||||
|
||||
// isFile can throw if it's a broken symlink.
|
||||
bool isFileSafe(T)(T a)
|
||||
{
|
||||
try
|
||||
return isFile(a);
|
||||
catch (FileException)
|
||||
return false;
|
||||
}
|
||||
|
||||
string[] rVal;
|
||||
if (args.length == 1)
|
||||
args ~= ".";
|
||||
foreach (arg; args[1 .. $])
|
||||
{
|
||||
if (arg == "stdin" || isFileSafe(arg))
|
||||
rVal ~= arg;
|
||||
else
|
||||
foreach (item; dirEntries(arg, SpanMode.breadth).map!(a => a.name))
|
||||
{
|
||||
if (isFileSafe(item) && (item.endsWith(`.d`) || item.endsWith(`.di`)))
|
||||
rVal ~= item;
|
||||
else
|
||||
continue;
|
||||
}
|
||||
}
|
||||
return rVal;
|
||||
}
|
||||
|
||||
/**
|
||||
* Allows to build access chains of class members as done with the $(D ?.) operator
|
||||
* in other languages. In the chain, any $(D null) member that is a class instance
|
||||
* or that returns one, has for effect to shortcut the complete evaluation.
|
||||
*
|
||||
* This function is copied from https://github.com/BBasile/iz to avoid a new submodule.
|
||||
* Any change made to this copy should also be applied to the origin.
|
||||
*
|
||||
* Params:
|
||||
* M = The class type of the chain entry point.
|
||||
*
|
||||
* Bugs:
|
||||
* Assigning a member only works with $(D unwrap).
|
||||
*
|
||||
*/
|
||||
struct SafeAccess(M)
|
||||
if (is(M == class))
|
||||
{
|
||||
M m;
|
||||
|
||||
@disable this();
|
||||
|
||||
/**
|
||||
* Instantiate.
|
||||
*
|
||||
* Params:
|
||||
* m = An instance of the entry point type. It is usually only
|
||||
* $(D null) when the constructor is used internally, to build
|
||||
* the chain.
|
||||
*/
|
||||
this(M m)
|
||||
{
|
||||
this.m = m;
|
||||
}
|
||||
|
||||
alias m this;
|
||||
/// Unprotect the class instance.
|
||||
alias unwrap = m;
|
||||
|
||||
/// Handles safe access.
|
||||
auto ref opDispatch(string member, A...)(auto ref A a)
|
||||
{
|
||||
import std.traits : ReturnType;
|
||||
alias T = typeof(__traits(getMember, m, member));
|
||||
static if (is(T == class))
|
||||
{
|
||||
return (!m || !__traits(getMember, m, member))
|
||||
? SafeAccess!T(null)
|
||||
: SafeAccess!T(__traits(getMember, m, member));
|
||||
}
|
||||
else
|
||||
{
|
||||
import std.traits : ReturnType, Parameters, isFunction;
|
||||
static if (isFunction!T)
|
||||
{
|
||||
// otherwise there's a missing return statement.
|
||||
alias R = ReturnType!T;
|
||||
static if (!is(R == void) &&
|
||||
!(is(R == class) && Parameters!T.length == 0))
|
||||
pragma(msg, __FILE__ ~ "(" ~ __LINE__.stringof ~ "): error, " ~
|
||||
"only `void function`s or `class` getters can be called without unwrap");
|
||||
|
||||
static if (is(R == class))
|
||||
{
|
||||
return (m is null)
|
||||
? SafeAccess!R(null)
|
||||
: SafeAccess!R(__traits(getMember, m, member)(a));
|
||||
}
|
||||
else
|
||||
{
|
||||
if (m)
|
||||
__traits(getMember, m, member)(a);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
if (m)
|
||||
__traits(getMember, m, member) = a;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
/// General usage
|
||||
@safe unittest
|
||||
{
|
||||
class LongLineOfIdent3{int foo; void setFoo(int v) @safe{foo = v;}}
|
||||
class LongLineOfIdent2{LongLineOfIdent3 longLineOfIdent3;}
|
||||
class LongLineOfIdent1{LongLineOfIdent2 longLineOfIdent2;}
|
||||
class Root {LongLineOfIdent1 longLineOfIdent1;}
|
||||
|
||||
SafeAccess!Root sar = SafeAccess!Root(new Root);
|
||||
// without the SafeAccess we would receive a SIGSEGV here
|
||||
sar.longLineOfIdent1.longLineOfIdent2.longLineOfIdent3.setFoo(0xDEADBEEF);
|
||||
|
||||
bool notAccessed = true;
|
||||
// the same with `&&` whould be much longer
|
||||
if (LongLineOfIdent3 a = sar.longLineOfIdent1.longLineOfIdent2.longLineOfIdent3)
|
||||
{
|
||||
notAccessed = false;
|
||||
}
|
||||
assert(notAccessed);
|
||||
|
||||
// checks that forwarding actually works
|
||||
sar.m.longLineOfIdent1 = new LongLineOfIdent1;
|
||||
sar.m.longLineOfIdent1.longLineOfIdent2 = new LongLineOfIdent2;
|
||||
sar.m.longLineOfIdent1.longLineOfIdent2.longLineOfIdent3 = new LongLineOfIdent3;
|
||||
|
||||
sar.longLineOfIdent1.longLineOfIdent2.longLineOfIdent3.setFoo(42);
|
||||
assert(sar.longLineOfIdent1.longLineOfIdent2.longLineOfIdent3.unwrap.foo == 42);
|
||||
}
|
||||
|
||||
/**
|
||||
* IFTI helper for $(D SafeAccess).
|
||||
*
|
||||
* Returns:
|
||||
* $(D m) with the ability to safely access its members that are class
|
||||
* instances.
|
||||
*/
|
||||
auto ref safeAccess(M)(M m)
|
||||
{
|
||||
return SafeAccess!M(m);
|
||||
}
|
Loading…
Reference in New Issue