Merge remote-tracking branch 'upstream/master' into phobos

This commit is contained in:
Sebastian Wilzbach 2018-04-03 11:09:28 +02:00
commit 7b3542fb6a
20 changed files with 571 additions and 269 deletions

View File

@ -1,5 +1,5 @@
; Configure which static analysis checks are enabled
[dscanner.analysis.config.StaticAnalysisConfig]
[analysis.config.StaticAnalysisConfig]
; Check variable, class, struct, interface, union, and function names against t
; he Phobos style guide
style_check="disabled"

View File

@ -15,16 +15,31 @@ env:
script: "./.travis.sh"
jobs:
include:
- stage: GitHub Release
d: ldc
os: linux
script: echo "Deploying to GitHub releases ..." && make ldcbuild
deploy:
provider: releases
api_key:
secure: pbrrm6E0SPfVwt9g+e/ZFQfrmRuGBNA6KwMMLUhI+2+kbRzNquxvrYAUC7YcRX7xiRL/gugKHmOXEi1Dv9IEdSQ732M06H7ikZT9T9oQWYbsZzmVICBWgIovyM8XIPpVAwP8D7jq0JgMiBicqfEZfoz2SIJjo6aYbyQbCASCu8U=
file: bin/dscanner
skip_cleanup: true
on:
repo: dlang-community/D-Scanner
tags: true
- stage: GitHub Release
if: tag IS present
d: ldc
os: linux
script: echo "Deploying to GitHub releases ..." && make release
deploy:
provider: releases
api_key: $GH_REPO_TOKEN
file_glob: true
file: bin/dscanner-*.tar.gz
skip_cleanup: true
on:
repo: dlang-community/D-Scanner
tags: true
- stage: GitHub Release
if: tag IS present
d: ldc
os: osx
script: echo "Deploying to GitHub releases ..." && make release
deploy:
provider: releases
api_key: $GH_REPO_TOKEN
file_glob: true
file: bin/dscanner-*.tar.gz
skip_cleanup: true
on:
repo: dlang-community/D-Scanner
tags: true

View File

@ -141,6 +141,7 @@ Note that the "--skipTests" option is the equivalent of changing each
* Public declarations without a documented unittest. By default disabled.
* Asserts without an explanatory message. By default disabled.
* Indentation of if constraints
* Check that `@trusted` is not applied to a whole scope. Trusting a whole scope can be a problem when new declarations are added and if they are not verified manually to be trustable.
#### Wishlist

View File

@ -14,7 +14,7 @@
"dependencies" : {
"libdparse": "~>0.8.0-alpha.5",
"dsymbol" : "~>0.3.0-alpha.3",
"inifiled" : "~>1.1.0",
"inifiled" : "~>1.2.0",
"emsi_containers" : "~>0.6.0",
"libddoc" : "~>0.3.0-beta.1",
"stdx-allocator" : "~>2.77.0"

@ -1 +1 @@
Subproject commit e15038a5c265a9fdaea354476e7759d04e8d0bf9
Subproject commit 971c5356388a73ebbf69e32f7f5e97cfc06cdcff

View File

@ -27,6 +27,7 @@ VERSIONS =
DEBUG_VERSIONS = -version=dparse_verbose
DMD_FLAGS = -w -inline -release -O -J. -od${OBJ_DIR} -version=StdLoggerDisableWarning -fPIC
DMD_TEST_FLAGS = -w -g -J. -version=StdLoggerDisableWarning
SHELL:=/bin/bash
all: dmdbuild
ldc: ldcbuild
@ -72,3 +73,27 @@ clean:
report: all
dscanner --report src > src/dscanner-report.json
sonar-runner
.ONESHELL:
release:
@set -eux -o pipefail
VERSION=$$(git describe --abbrev=0 --tags)
ARCH="$${ARCH:-64}"
unameOut="$$(uname -s)"
case "$$unameOut" in
Linux*) OS=linux; ;;
Darwin*) OS=osx; ;;
*) echo "Unknown OS: $$unameOut"; exit 1
esac
case "$$ARCH" in
64) ARCH_SUFFIX="x86_64";;
32) ARCH_SUFFIX="x86";;
*) echo "Unknown ARCH: $$ARCH"; exit 1
esac
archiveName="dscanner-$$VERSION-$$OS-$$ARCH_SUFFIX.tar.gz"
echo "Building $$archiveName"
${MAKE} ldcbuild
tar cvfz "bin/$$archiveName" -C bin dscanner

View File

@ -5,6 +5,7 @@
module dscanner.analysis.assert_without_msg;
import dscanner.analysis.base : BaseAnalyzer;
import dscanner.utils : safeAccess;
import dsymbol.scope_ : Scope;
import dparse.lexer;
import dparse.ast;
@ -37,11 +38,10 @@ class AssertWithoutMessageCheck : BaseAnalyzer
if (!isStdExceptionImported)
return;
if (expr.unaryExpression !is null &&
expr.unaryExpression.primaryExpression !is null &&
expr.unaryExpression.primaryExpression.identifierOrTemplateInstance !is null)
if (const IdentifierOrTemplateInstance iot = safeAccess(expr)
.unaryExpression.primaryExpression.identifierOrTemplateInstance)
{
auto ident = expr.unaryExpression.primaryExpression.identifierOrTemplateInstance.identifier;
auto ident = iot.identifier;
if (ident.text == "enforce" && expr.arguments !is null && expr.arguments.argumentList !is null &&
expr.arguments.argumentList.items.length < 2)
addErrorMessage(ident.line, ident.column, KEY, MESSAGE);

View File

@ -17,44 +17,43 @@ StaticAnalysisConfig defaultStaticAnalysisConfig()
/// Describes how a check is operated.
enum Check: string
{
/// Check is disabled.
disabled = "disabled",
/// Check is enabled.
enabled = "enabled",
/// Check is enabled but not operated in the unittests.
skipTests = "skip-unittest"
/// Check is disabled.
disabled = "disabled",
/// Check is enabled.
enabled = "enabled",
/// Check is enabled but not operated in the unittests.
skipTests = "skip-unittest"
}
/// Applies the --skipTests switch, allowing to call Dscanner without config
/// and less noise related to the unittests.
void enabled2SkipTests(ref StaticAnalysisConfig config)
{
foreach (mem; __traits(allMembers, StaticAnalysisConfig))
{
static if (is(typeof(__traits(getMember, StaticAnalysisConfig, mem))))
static if (is(typeof(__traits(getMember, config, mem)) == string))
{
if (__traits(getMember, config, mem) == Check.enabled)
__traits(getMember, config, mem) = Check.skipTests;
}
}
foreach (mem; __traits(allMembers, StaticAnalysisConfig))
{
static if (is(typeof(__traits(getMember, StaticAnalysisConfig, mem))))
static if (is(typeof(__traits(getMember, config, mem)) == string))
{
if (__traits(getMember, config, mem) == Check.enabled)
__traits(getMember, config, mem) = Check.skipTests;
}
}
}
/// Returns a config with all the checks disabled.
StaticAnalysisConfig disabledConfig()
{
StaticAnalysisConfig config;
foreach (mem; __traits(allMembers, StaticAnalysisConfig))
{
static if (is(typeof(__traits(getMember, StaticAnalysisConfig, mem))))
static if (is(typeof(__traits(getMember, config, mem)) == string))
__traits(getMember, config, mem) = Check.disabled;
}
return config;
StaticAnalysisConfig config;
foreach (mem; __traits(allMembers, StaticAnalysisConfig))
{
static if (is(typeof(__traits(getMember, StaticAnalysisConfig, mem))))
static if (is(typeof(__traits(getMember, config, mem)) == string))
__traits(getMember, config, mem) = Check.disabled;
}
return config;
}
@INI("Configure which static analysis checks are enabled")
@INI("Configure which static analysis checks are enabled", "analysis.config.StaticAnalysisConfig")
struct StaticAnalysisConfig
{
@INI("Check variable, class, struct, interface, union, and function names against the Phobos style guide")
@ -171,14 +170,14 @@ struct StaticAnalysisConfig
@INI("Check for properly documented public functions (Returns, Params)")
string properly_documented_public_functions = Check.disabled;
@INI("Check for useless usage of the final attribute")
string final_attribute_check = Check.enabled;
@INI("Check for useless usage of the final attribute")
string final_attribute_check = Check.enabled;
@INI("Check for virtual calls in the class constructors")
string vcall_in_ctor = Check.enabled;
@INI("Check for virtual calls in the class constructors")
string vcall_in_ctor = Check.enabled;
@INI("Check for useless user defined initializers")
string useless_initializer = Check.enabled;
@INI("Check for useless user defined initializers")
string useless_initializer = Check.enabled;
@INI("Check allman brace style")
string allman_braces_check = Check.disabled;
@ -195,6 +194,9 @@ struct StaticAnalysisConfig
@INI("Check indent of if constraints")
string if_constraints_indent = Check.disabled;
@INI("Check for @trusted applied to a bigger scope than a single function")
string trust_too_much = Check.enabled;
@INI("Module-specific filters")
ModuleFilters filters;
}
@ -207,11 +209,11 @@ private template ModuleFiltersMixin(A)
static if (is(typeof(__traits(getMember, StaticAnalysisConfig, mem)) == string))
s ~= `@INI("Exclude/Import modules") string[] ` ~ mem ~ ";\n";
return s;
return s;
}();
}
@INI("ModuleFilters. +std.,-std.internal")
@INI("ModuleFilters for selectively enabling (+std) and disabling (-std.internal) individual checks", "analysis.config.ModuleFilters")
struct ModuleFilters
{
mixin(ModuleFiltersMixin!int);

View File

@ -1,6 +1,7 @@
module dscanner.analysis.mismatched_args;
import dscanner.analysis.base : BaseAnalyzer;
import dscanner.utils : safeAccess;
import dsymbol.scope_;
import dsymbol.symbol;
import dparse.ast;
@ -126,16 +127,15 @@ final class ArgVisitor : ASTVisitor
{
import dsymbol.string_interning : internString;
if (unary.primaryExpression is null)
return;
if (unary.primaryExpression.identifierOrTemplateInstance is null)
return;
if (unary.primaryExpression.identifierOrTemplateInstance.identifier == tok!"")
return;
immutable t = unary.primaryExpression.identifierOrTemplateInstance.identifier;
lines ~= t.line;
columns ~= t.column;
args ~= internString(t.text);
if (auto iot = unary.safeAccess.primaryExpression.identifierOrTemplateInstance.unwrap)
{
if (iot.identifier == tok!"")
return;
immutable t = iot.identifier;
lines ~= t.line;
columns ~= t.column;
args ~= internString(t.text);
}
}
alias visit = ASTVisitor.visit;

View File

@ -166,8 +166,11 @@ private:
import std.array : array;
const comment = parseComment(commentText, null);
if (!comment.isDitto && !withinTemplate)
{
if (withinTemplate) {
const paramSection = comment.sections.find!(s => s.name == "Params");
if (!paramSection.empty)
lastSeenFun.ddocParams ~= paramSection[0].mapping.map!(a => a[0]).array;
} else if (!comment.isDitto) {
// check old function for invalid ddoc params
if (lastSeenFun.active)
postCheckSeenDdocParams();
@ -188,7 +191,7 @@ private:
}
void checkDdocParams(size_t line, size_t column, const Parameters params,
const TemplateParameters templateParameters = null)
const TemplateParameters templateParameters = null)
{
import std.array : array;
import std.algorithm.searching : canFind, countUntil;
@ -263,13 +266,13 @@ private:
{
if (p.templateTypeParameter)
return p.templateTypeParameter.identifier.text;
if (p.templateValueParameter)
if (p.templateValueParameter)
return p.templateValueParameter.identifier.text;
if (p.templateAliasParameter)
if (p.templateAliasParameter)
return p.templateAliasParameter.identifier.text;
if (p.templateTupleParameter)
if (p.templateTupleParameter)
return p.templateTupleParameter.identifier.text;
if (p.templateThisParameter)
if (p.templateThisParameter)
return p.templateThisParameter.templateTypeParameter.identifier.text;
return null;
@ -280,35 +283,35 @@ private:
import std.meta : AliasSeq;
alias properties = AliasSeq!(
"aliasDeclaration",
"aliasThisDeclaration",
"anonymousEnumDeclaration",
"attributeDeclaration",
"classDeclaration",
"conditionalDeclaration",
"constructor",
"debugSpecification",
"destructor",
"enumDeclaration",
"eponymousTemplateDeclaration",
"functionDeclaration",
"importDeclaration",
"interfaceDeclaration",
"invariant_",
"mixinDeclaration",
"mixinTemplateDeclaration",
"postblit",
"pragmaDeclaration",
"sharedStaticConstructor",
"sharedStaticDestructor",
"staticAssertDeclaration",
"staticConstructor",
"staticDestructor",
"structDeclaration",
"templateDeclaration",
"unionDeclaration",
"unittest_",
"variableDeclaration",
"versionSpecification",
"aliasThisDeclaration",
"anonymousEnumDeclaration",
"attributeDeclaration",
"classDeclaration",
"conditionalDeclaration",
"constructor",
"debugSpecification",
"destructor",
"enumDeclaration",
"eponymousTemplateDeclaration",
"functionDeclaration",
"importDeclaration",
"interfaceDeclaration",
"invariant_",
"mixinDeclaration",
"mixinTemplateDeclaration",
"postblit",
"pragmaDeclaration",
"sharedStaticConstructor",
"sharedStaticDestructor",
"staticAssertDeclaration",
"staticConstructor",
"staticDestructor",
"structDeclaration",
"templateDeclaration",
"unionDeclaration",
"unittest_",
"variableDeclaration",
"versionSpecification",
);
if (decl.declarations !is null)
return false;
@ -796,6 +799,40 @@ string bar(P, R)(R r){}// [warn]: %s
}c.format(
ProperlyDocumentedPublicFunctions.MISSING_TEMPLATE_PARAMS_MESSAGE.format("P")
), sac);
}
// https://github.com/dlang-community/D-Scanner/issues/583
unittest
{
StaticAnalysisConfig sac = disabledConfig;
sac.properly_documented_public_functions = Check.enabled;
assertAnalyzerWarnings(q{
/++
Implements the homonym function (also known as `accumulate`)
Returns:
the accumulated `result`
Params:
fun = one or more functions
+/
template reduce(fun...)
if (fun.length >= 1)
{
/++
No-seed version. The first element of `r` is used as the seed's value.
Params:
r = an iterable value as defined by `isIterable`
Returns:
the final result of the accumulator applied to the iterable
+/
auto reduce(R)(R r){}
}
}c.format(
), sac);
stderr.writeln("Unittest for ProperlyDocumentedPublicFunctions passed.");
}

View File

@ -72,6 +72,7 @@ import dscanner.analysis.redundant_attributes;
import dscanner.analysis.has_public_example;
import dscanner.analysis.assert_without_msg;
import dscanner.analysis.if_constraints_indent;
import dscanner.analysis.trust_too_much;
import dsymbol.string_interning : internString;
import dsymbol.scope_;
@ -81,7 +82,7 @@ import dsymbol.conversion.first;
import dsymbol.conversion.second;
import dsymbol.modulecache : ModuleCache;
import dscanner.readers;
import dscanner.utils;
bool first = true;
@ -511,6 +512,10 @@ MessageSet analyze(string fileName, const Module m, const StaticAnalysisConfig a
checks ~= new IfConstraintsIndentCheck(fileName, tokens,
analysisConfig.if_constraints_indent == Check.skipTests && !ut);
if (moduleName.shouldRun!"trust_too_much"(analysisConfig))
checks ~= new TrustTooMuchCheck(fileName,
analysisConfig.trust_too_much == Check.skipTests && !ut);
version (none)
if (moduleName.shouldRun!"redundant_if_check"(analysisConfig))
checks ~= new IfStatementCheck(fileName, moduleScope,

View File

@ -8,6 +8,7 @@ module dscanner.analysis.static_if_else;
import dparse.ast;
import dparse.lexer;
import dscanner.analysis.base;
import dscanner.utils : safeAccess;
/**
* Checks for potentially mistaken static if / else if.
@ -47,17 +48,7 @@ class StaticIfElse : BaseAnalyzer
const(IfStatement) getIfStatement(const ConditionalStatement cc)
{
if (cc.falseStatement.statement)
{
if (cc.falseStatement.statement.statementNoCaseNoDefault)
{
if (cc.falseStatement.statement.statementNoCaseNoDefault.ifStatement)
{
return cc.falseStatement.statement.statementNoCaseNoDefault.ifStatement;
}
}
}
return null;
return safeAccess(cc).falseStatement.statement.statementNoCaseNoDefault.ifStatement;
}
enum KEY = "dscanner.suspicious.static_if_else";

View File

@ -0,0 +1,149 @@
// Copyright The dlang community - 2018
// Distributed under the Boost Software License, Version 1.0.
// (See accompanying file LICENSE_1_0.txt or copy at
// http://www.boost.org/LICENSE_1_0.txt)
module dscanner.analysis.trust_too_much;
import std.stdio;
import dparse.ast;
import dparse.lexer;
import dscanner.analysis.base;
import dsymbol.scope_;
/**
* Checks that `@trusted` is only applied to a a single function
*/
class TrustTooMuchCheck : BaseAnalyzer
{
private:
static immutable MESSAGE = "Trusting a whole scope is a bad idea, " ~
"`@trusted` should only be attached to a single function";
static immutable string KEY = "dscanner.trust_too_much";
bool checkAtAttribute = true;
public:
alias visit = BaseAnalyzer.visit;
///
this(string fileName, bool skipTests = false)
{
super(fileName, sc, skipTests);
}
override void visit(const AtAttribute d)
{
if (checkAtAttribute && d.identifier.text == "trusted")
{
const Token t = d.identifier;
addErrorMessage(t.line, t.column, KEY, MESSAGE);
}
d.accept(this);
}
// always applied to function body, so OK
override void visit(const MemberFunctionAttribute d)
{
const oldCheckAtAttribute = checkAtAttribute;
checkAtAttribute = false;
d.accept(this);
checkAtAttribute = oldCheckAtAttribute;
}
// handles `@trusted{}` and old style, leading, atAttribute for single funcs
override void visit(const Declaration d)
{
const oldCheckAtAttribute = checkAtAttribute;
checkAtAttribute = d.functionDeclaration is null;
d.accept(this);
checkAtAttribute = oldCheckAtAttribute;
}
// issue #588
override void visit(const AliasDeclaration d)
{
const oldCheckAtAttribute = checkAtAttribute;
checkAtAttribute = false;
d.accept(this);
checkAtAttribute = oldCheckAtAttribute;
}
}
unittest
{
import dscanner.analysis.config : StaticAnalysisConfig, Check, disabledConfig;
import dscanner.analysis.helpers : assertAnalyzerWarnings;
import std.format : format;
StaticAnalysisConfig sac = disabledConfig();
sac.trust_too_much = Check.enabled;
const msg = TrustTooMuchCheck.MESSAGE;
//--- fail cases ---//
assertAnalyzerWarnings(q{
@trusted: // [warn]: %s
void test();
}c.format(msg), sac);
assertAnalyzerWarnings(q{
@trusted @nogc: // [warn]: %s
void test();
}c.format(msg), sac);
assertAnalyzerWarnings(q{
@trusted { // [warn]: %s
void test();
void test();
}
}c.format(msg), sac);
assertAnalyzerWarnings(q{
@safe {
@trusted @nogc { // [warn]: %s
void test();
void test();
}}
}c.format(msg), sac);
assertAnalyzerWarnings(q{
@nogc @trusted { // [warn]: %s
void test();
void test();
}
}c.format(msg), sac);
assertAnalyzerWarnings(q{
@trusted template foo(){ // [warn]: %s
}
}c.format(msg), sac);
assertAnalyzerWarnings(q{
struct foo{
@trusted: // [warn]: %s
}
}c.format(msg), sac);
//--- pass cases ---//
assertAnalyzerWarnings(q{
void test() @trusted {}
}c, sac);
assertAnalyzerWarnings(q{
@trusted void test();
}c, sac);
assertAnalyzerWarnings(q{
@nogc template foo(){
}
}c , sac);
assertAnalyzerWarnings(q{
alias nothrow @trusted uint F4();
}c , sac);
stderr.writeln("Unittest for TrustTooMuchCheck passed.");
}

View File

@ -5,6 +5,7 @@
module dscanner.analysis.unmodified;
import dscanner.analysis.base;
import dscanner.utils : safeAccess;
import dsymbol.scope_ : Scope;
import std.container;
import dparse.ast;
@ -217,12 +218,9 @@ private:
bool initializedFromNew(const Initializer initializer)
{
if (initializer && initializer.nonVoidInitializer &&
initializer.nonVoidInitializer.assignExpression &&
cast(UnaryExpression) initializer.nonVoidInitializer.assignExpression)
if (const UnaryExpression ue = cast(UnaryExpression) safeAccess(initializer)
.nonVoidInitializer.assignExpression)
{
const UnaryExpression ue =
cast(UnaryExpression) initializer.nonVoidInitializer.assignExpression;
return ue.newExpression !is null;
}
return false;

View File

@ -5,6 +5,7 @@
module dscanner.analysis.useless_initializer;
import dscanner.analysis.base;
import dscanner.utils : safeAccess;
import containers.dynamicarray;
import containers.hashmap;
import dparse.ast;
@ -147,7 +148,7 @@ public:
!declarator.initializer.nonVoidInitializer ||
declarator.comment !is null)
{
continue;
continue;
}
version(unittest)
@ -171,15 +172,14 @@ public:
bool isStr, isSzInt;
Token customType;
if (decl.type.type2.typeIdentifierPart &&
decl.type.type2.typeIdentifierPart.typeIdentifierPart is null)
if (const TypeIdentifierPart tip = safeAccess(decl).type.type2.typeIdentifierPart)
{
const IdentifierOrTemplateInstance idt =
decl.type.type2.typeIdentifierPart.identifierOrTemplateInstance;
customType = idt.identifier;
isStr = customType.text.among("string", "wstring", "dstring") != 0;
isSzInt = customType.text.among("size_t", "ptrdiff_t") != 0;
if (!tip.typeIdentifierPart)
{
customType = tip.identifierOrTemplateInstance.identifier;
isStr = customType.text.among("string", "wstring", "dstring") != 0;
isSzInt = customType.text.among("size_t", "ptrdiff_t") != 0;
}
}
// --- 'BasicType/Symbol AssignExpression' ---//
@ -230,16 +230,18 @@ public:
}
}
// Symbol s = Symbol.init
else if (ue && customType != tok!"" && ue.unaryExpression && ue.unaryExpression.primaryExpression &&
ue.unaryExpression.primaryExpression.identifierOrTemplateInstance &&
ue.unaryExpression.primaryExpression.identifierOrTemplateInstance.identifier == customType &&
ue.identifierOrTemplateInstance && ue.identifierOrTemplateInstance.identifier.text == "init")
else if (const IdentifierOrTemplateInstance iot = safeAccess(ue)
.unaryExpression.primaryExpression.identifierOrTemplateInstance)
{
if (customType.text in _structCanBeInit)
// Symbol s = Symbol.init
if (ue && customType != tok!"" && iot.identifier == customType &&
ue.identifierOrTemplateInstance && ue.identifierOrTemplateInstance.identifier.text == "init")
{
if (!_structCanBeInit[customType.text])
mixin(warn);
if (customType.text in _structCanBeInit)
{
if (!_structCanBeInit[customType.text])
mixin(warn);
}
}
}

View File

@ -5,6 +5,7 @@
module dscanner.analysis.vcall_in_ctor;
import dscanner.analysis.base;
import dscanner.utils;
import dparse.ast, dparse.lexer;
import std.algorithm: among;
import std.algorithm.iteration : filter;
@ -220,16 +221,12 @@ public:
override void visit(const(UnaryExpression) exp)
{
if (isInCtor)
// get function identifier for a call, only for this member (so no ident chain)
if (isInCtor && exp.functionCallExpression &&
exp.functionCallExpression.unaryExpression &&
exp.functionCallExpression.unaryExpression.primaryExpression &&
exp.functionCallExpression.unaryExpression.primaryExpression
.identifierOrTemplateInstance)
if (const IdentifierOrTemplateInstance iot = safeAccess(exp)
.functionCallExpression.unaryExpression.primaryExpression.identifierOrTemplateInstance)
{
const Token t = exp.functionCallExpression.unaryExpression
.primaryExpression.identifierOrTemplateInstance.identifier;
const Token t = iot.identifier;
if (t != tok!"")
{
_ctorCalls[$-1] ~= t;

View File

@ -12,7 +12,7 @@ import dparse.rollback_allocator;
import std.stdio;
import std.container.rbtree;
import std.functional : toDelegate;
import dscanner.readers;
import dscanner.utils;
/**
* AST visitor that collects modules imported to an R-B tree.

View File

@ -31,7 +31,7 @@ import dscanner.symbol_finder;
import dscanner.analysis.run;
import dscanner.analysis.config;
import dscanner.dscanner_version;
import dscanner.readers;
import dscanner.utils;
import inifiled;
@ -68,7 +68,6 @@ else
bool printVersion;
bool explore;
string errorFormat;
bool patchConfig;
try
{
@ -97,8 +96,7 @@ else
"muffinButton", &muffin,
"explore", &explore,
"skipTests", &skipTests,
"errorFormat|f", &errorFormat,
"patchConfig", &patchConfig);
"errorFormat|f", &errorFormat);
//dfmt on
}
catch (ConvException e)
@ -235,11 +233,7 @@ else
StaticAnalysisConfig config = defaultStaticAnalysisConfig();
string s = configLocation is null ? getConfigurationLocation() : configLocation;
if (s.exists())
{
if (hasWrongIniFileSection(s, patchConfig))
return 0;
readINIFile(config, s);
}
if (skipTests)
config.enabled2SkipTests;
if (report)
@ -393,10 +387,7 @@ Options:
Generates a default configuration file for the static analysis checks,
--skipTests
Does not analyze in the unittests. Only works if --styleCheck.,
--patchConfig
Patches the configuration file passed as parameter for v0.5.0.`,
Does not analyze in the unittests. Only works if --styleCheck.`,
programName);
}
@ -416,24 +407,28 @@ version (OSX) version = useXDG;
*/
string getDefaultConfigurationLocation()
{
import std.process : environment;
import std.exception : enforce;
version (useXDG)
{
import std.process : environment;
string configDir = environment.get("XDG_CONFIG_HOME", null);
if (configDir is null)
{
configDir = environment.get("HOME", null);
if (configDir is null)
throw new Exception("Both $XDG_CONFIG_HOME and $HOME are unset");
enforce(configDir !is null, "Both $XDG_CONFIG_HOME and $HOME are unset");
configDir = buildPath(configDir, ".config", "dscanner", CONFIG_FILE_NAME);
}
else
configDir = buildPath(configDir, "dscanner", CONFIG_FILE_NAME);
return configDir;
}
else version (Windows)
return CONFIG_FILE_NAME;
else version(Windows)
{
string configDir = environment.get("APPDATA", null);
enforce(configDir !is null, "%APPDATA% is unset");
configDir = buildPath(configDir, "dscanner", CONFIG_FILE_NAME);
return configDir;
}
}
/**
@ -472,41 +467,3 @@ string getConfigurationLocation()
return getDefaultConfigurationLocation();
}
/// Patch the INI file to v0.5.0 format.
//TODO: remove this from v0.6.0
bool hasWrongIniFileSection(string configFilename, bool patch)
{
import std.string : indexOf;
import std.array : replace;
bool result;
static immutable v1 = "analysis.config.StaticAnalysisConfig";
static immutable v2 = "dscanner.analysis.config.StaticAnalysisConfig";
char[] c = cast(char[]) readFile(configFilename);
try if (c.indexOf(v2) < 0)
{
if (!patch)
{
writeln("warning, the configuration file `", configFilename, "` contains an outdated property");
writeln("change manually [", v1, "] to [", v2, "]" );
writeln("or restart D-Scanner with the `--patchConfig` option");
result = true;
}
else
{
c = replace(c, v1, v2);
std.file.write(configFilename, c);
writeln("the configuration file `", configFilename, "` has been updated correctly");
}
}
catch(Exception e)
{
stderr.writeln("error encountered when trying to verify the INI file compatibility");
throw e;
}
return result;
}

View File

@ -1,71 +0,0 @@
module dscanner.readers;
import std.array : appender, uninitializedArray;
import std.stdio : stdin, stderr, File;
import std.conv : to;
import std.file : exists;
ubyte[] readStdin()
{
auto sourceCode = appender!(ubyte[])();
ubyte[4096] buf;
while (true)
{
auto b = stdin.rawRead(buf);
if (b.length == 0)
break;
sourceCode.put(b);
}
return sourceCode.data;
}
ubyte[] readFile(string fileName)
{
if (fileName == "stdin")
return readStdin();
if (!exists(fileName))
{
stderr.writefln("%s does not exist", fileName);
return [];
}
File f = File(fileName);
if (f.size == 0)
return [];
ubyte[] sourceCode = uninitializedArray!(ubyte[])(to!size_t(f.size));
f.rawRead(sourceCode);
return sourceCode;
}
string[] expandArgs(string[] args)
{
import std.file : isFile, FileException, dirEntries, SpanMode;
import std.algorithm.iteration : map;
import std.algorithm.searching : endsWith;
// isFile can throw if it's a broken symlink.
bool isFileSafe(T)(T a)
{
try
return isFile(a);
catch (FileException)
return false;
}
string[] rVal;
if (args.length == 1)
args ~= ".";
foreach (arg; args[1 .. $])
{
if (arg == "stdin" || isFileSafe(arg))
rVal ~= arg;
else
foreach (item; dirEntries(arg, SpanMode.breadth).map!(a => a.name))
{
if (isFileSafe(item) && (item.endsWith(`.d`) || item.endsWith(`.di`)))
rVal ~= item;
else
continue;
}
}
return rVal;
}

194
src/dscanner/utils.d Normal file
View File

@ -0,0 +1,194 @@
module dscanner.utils;
import std.array : appender, uninitializedArray;
import std.stdio : stdin, stderr, File;
import std.conv : to;
import std.file : exists;
ubyte[] readStdin()
{
auto sourceCode = appender!(ubyte[])();
ubyte[4096] buf;
while (true)
{
auto b = stdin.rawRead(buf);
if (b.length == 0)
break;
sourceCode.put(b);
}
return sourceCode.data;
}
ubyte[] readFile(string fileName)
{
if (fileName == "stdin")
return readStdin();
if (!exists(fileName))
{
stderr.writefln("%s does not exist", fileName);
return [];
}
File f = File(fileName);
if (f.size == 0)
return [];
ubyte[] sourceCode = uninitializedArray!(ubyte[])(to!size_t(f.size));
f.rawRead(sourceCode);
return sourceCode;
}
string[] expandArgs(string[] args)
{
import std.file : isFile, FileException, dirEntries, SpanMode;
import std.algorithm.iteration : map;
import std.algorithm.searching : endsWith;
// isFile can throw if it's a broken symlink.
bool isFileSafe(T)(T a)
{
try
return isFile(a);
catch (FileException)
return false;
}
string[] rVal;
if (args.length == 1)
args ~= ".";
foreach (arg; args[1 .. $])
{
if (arg == "stdin" || isFileSafe(arg))
rVal ~= arg;
else
foreach (item; dirEntries(arg, SpanMode.breadth).map!(a => a.name))
{
if (isFileSafe(item) && (item.endsWith(`.d`) || item.endsWith(`.di`)))
rVal ~= item;
else
continue;
}
}
return rVal;
}
/**
* Allows to build access chains of class members as done with the $(D ?.) operator
* in other languages. In the chain, any $(D null) member that is a class instance
* or that returns one, has for effect to shortcut the complete evaluation.
*
* This function is copied from https://github.com/BBasile/iz to avoid a new submodule.
* Any change made to this copy should also be applied to the origin.
*
* Params:
* M = The class type of the chain entry point.
*
* Bugs:
* Assigning a member only works with $(D unwrap).
*
*/
struct SafeAccess(M)
if (is(M == class))
{
M m;
@disable this();
/**
* Instantiate.
*
* Params:
* m = An instance of the entry point type. It is usually only
* $(D null) when the constructor is used internally, to build
* the chain.
*/
this(M m)
{
this.m = m;
}
alias m this;
/// Unprotect the class instance.
alias unwrap = m;
/// Handles safe access.
auto ref opDispatch(string member, A...)(auto ref A a)
{
import std.traits : ReturnType;
alias T = typeof(__traits(getMember, m, member));
static if (is(T == class))
{
return (!m || !__traits(getMember, m, member))
? SafeAccess!T(null)
: SafeAccess!T(__traits(getMember, m, member));
}
else
{
import std.traits : ReturnType, Parameters, isFunction;
static if (isFunction!T)
{
// otherwise there's a missing return statement.
alias R = ReturnType!T;
static if (!is(R == void) &&
!(is(R == class) && Parameters!T.length == 0))
pragma(msg, __FILE__ ~ "(" ~ __LINE__.stringof ~ "): error, " ~
"only `void function`s or `class` getters can be called without unwrap");
static if (is(R == class))
{
return (m is null)
? SafeAccess!R(null)
: SafeAccess!R(__traits(getMember, m, member)(a));
}
else
{
if (m)
__traits(getMember, m, member)(a);
}
}
else
{
if (m)
__traits(getMember, m, member) = a;
}
}
}
}
/// General usage
@safe unittest
{
class LongLineOfIdent3{int foo; void setFoo(int v) @safe{foo = v;}}
class LongLineOfIdent2{LongLineOfIdent3 longLineOfIdent3;}
class LongLineOfIdent1{LongLineOfIdent2 longLineOfIdent2;}
class Root {LongLineOfIdent1 longLineOfIdent1;}
SafeAccess!Root sar = SafeAccess!Root(new Root);
// without the SafeAccess we would receive a SIGSEGV here
sar.longLineOfIdent1.longLineOfIdent2.longLineOfIdent3.setFoo(0xDEADBEEF);
bool notAccessed = true;
// the same with `&&` whould be much longer
if (LongLineOfIdent3 a = sar.longLineOfIdent1.longLineOfIdent2.longLineOfIdent3)
{
notAccessed = false;
}
assert(notAccessed);
// checks that forwarding actually works
sar.m.longLineOfIdent1 = new LongLineOfIdent1;
sar.m.longLineOfIdent1.longLineOfIdent2 = new LongLineOfIdent2;
sar.m.longLineOfIdent1.longLineOfIdent2.longLineOfIdent3 = new LongLineOfIdent3;
sar.longLineOfIdent1.longLineOfIdent2.longLineOfIdent3.setFoo(42);
assert(sar.longLineOfIdent1.longLineOfIdent2.longLineOfIdent3.unwrap.foo == 42);
}
/**
* IFTI helper for $(D SafeAccess).
*
* Returns:
* $(D m) with the ability to safely access its members that are class
* instances.
*/
auto ref safeAccess(M)(M m)
{
return SafeAccess!M(m);
}