Index: depot_tools/cpplint.py |
=================================================================== |
--- depot_tools/cpplint.py (revision 0) |
+++ depot_tools/cpplint.py (revision 0) |
@@ -0,0 +1,2725 @@ |
+#!/usr/bin/python2.4 |
+# |
+# cpplint.py is Copyright (C) 2009 Google Inc. |
+# |
+# It is free software; you can redistribute it and/or modify it under the |
+# terms of either: |
+# |
+# a) the GNU General Public License as published by the Free Software |
+# Foundation; either version 1, or (at your option) any later version, or |
+# |
+# b) the "Artistic License". |
+ |
+# Here are some issues that I've had people identify in my code during reviews, |
+# that I think are possible to flag automatically in a lint tool. If these were |
+# caught by lint, it would save time both for myself and that of my reviewers. |
+# Most likely, some of these are beyond the scope of the current lint framework, |
+# but I think it is valuable to retain these wish-list items even if they cannot |
+# be immediately implemented. |
+# |
+# Suggestions |
+# ----------- |
+# - Check for no 'explicit' for multi-arg ctor |
+# - Check for boolean assign RHS in parens |
+# - Check for ctor initializer-list colon position and spacing |
+# - Check that if there's a ctor, there should be a dtor |
+# - Check accessors that return non-pointer member variables are |
+# declared const |
+# - Check accessors that return non-const pointer member vars are |
+# *not* declared const |
+# - Check for using public includes for testing |
+# - Check for spaces between brackets in one-line inline method |
+# - Check for no assert() |
+# - Check for spaces surrounding operators |
+# - Check for 0 in pointer context (should be NULL) |
+# - Check for 0 in char context (should be '\0') |
+# - Check for camel-case method name conventions for methods |
+# that are not simple inline getters and setters |
+# - Check that base classes have virtual destructors |
+# put " // namespace" after } that closes a namespace, with |
+# namespace's name after 'namespace' if it is named. |
+# - Do not indent namespace contents |
+# - Avoid inlining non-trivial constructors in header files |
+# include base/basictypes.h if DISALLOW_EVIL_CONSTRUCTORS is used |
+# - Check for old-school (void) cast for call-sites of functions |
+# ignored return value |
+# - Check gUnit usage of anonymous namespace |
+# - Check for class declaration order (typedefs, consts, enums, |
+# ctor(s?), dtor, friend declarations, methods, member vars) |
+# |
+ |
+"""Does google-lint on c++ files. |
+ |
+The goal of this script is to identify places in the code that *may* |
+be in non-compliance with google style. It does not attempt to fix |
+up these problems -- the point is to educate. It does also not |
+attempt to find all problems, or to ensure that everything it does |
+find is legitimately a problem. |
+ |
+In particular, we can get very confused by /* and // inside strings! |
+We do a small hack, which is to ignore //'s with "'s after them on the |
+same line, but it is far from perfect (in either direction). |
+""" |
+ |
+import codecs |
+import getopt |
+import math # for log |
+import os |
+import re |
+import sre_compile |
+import string |
+import sys |
+import unicodedata |
+ |
+ |
+_USAGE = """ |
+Syntax: cpplint.py [--verbose=#] [--output=vs7] [--filter=-x,+y,...] |
+ <file> [file] ... |
+ |
+ The style guidelines this tries to follow are those in |
+ http://google-styleguide.googlecode.com/svn/trunk/cppguide.xml |
+ |
+ Every problem is given a confidence score from 1-5, with 5 meaning we are |
+ certain of the problem, and 1 meaning it could be a legitimate construct. |
+ This will miss some errors, and is not a substitute for a code review. |
+ |
+ To prevent specific lines from being linted, add a '// NOLINT' comment to the |
+ end of the line. |
+ |
+ The files passed in will be linted; at least one file must be provided. |
+ Linted extensions are .cc, .cpp, and .h. Other file types will be ignored. |
+ |
+ Flags: |
+ |
+ output=vs7 |
+ By default, the output is formatted to ease emacs parsing. Visual Studio |
+ compatible output (vs7) may also be used. Other formats are unsupported. |
+ |
+ verbose=# |
+ Specify a number 0-5 to restrict errors to certain verbosity levels. |
+ |
+ filter=-x,+y,... |
+ Specify a comma-separated list of category-filters to apply: only |
+ error messages whose category names pass the filters will be printed. |
+ (Category names are printed with the message and look like |
+ "[whitespace/indent]".) Filters are evaluated left to right. |
+ "-FOO" and "FOO" means "do not print categories that start with FOO". |
+ "+FOO" means "do print categories that start with FOO". |
+ |
+ Examples: --filter=-whitespace,+whitespace/braces |
+ --filter=whitespace,runtime/printf,+runtime/printf_format |
+ --filter=-,+build/include_what_you_use |
+ |
+ To see a list of all the categories used in cpplint, pass no arg: |
+ --filter= |
+""" |
+ |
+# We categorize each error message we print. Here are the categories. |
+# We want an explicit list so we can list them all in cpplint --filter=. |
+# If you add a new error message with a new category, add it to the list |
+# here! cpplint_unittest.py should tell you if you forget to do this. |
+_ERROR_CATEGORIES = """\ |
+ build/class |
+ build/deprecated |
+ build/endif_comment |
+ build/forward_decl |
+ build/header_guard |
+ build/include |
+ build/include_order |
+ build/include_what_you_use |
+ build/namespaces |
+ build/printf_format |
+ build/storage_class |
+ legal/copyright |
+ readability/braces |
+ readability/casting |
+ readability/check |
+ readability/constructors |
+ readability/fn_size |
+ readability/function |
+ readability/multiline_comment |
+ readability/multiline_string |
+ readability/streams |
+ readability/todo |
+ readability/utf8 |
+ runtime/arrays |
+ runtime/casting |
+ runtime/explicit |
+ runtime/int |
+ runtime/init |
+ runtime/memset |
+ runtime/printf |
+ runtime/printf_format |
+ runtime/references |
+ runtime/rtti |
+ runtime/sizeof |
+ runtime/string |
+ runtime/threadsafe_fn |
+ runtime/virtual |
+ whitespace/blank_line |
+ whitespace/braces |
+ whitespace/comma |
+ whitespace/comments |
+ whitespace/end_of_line |
+ whitespace/ending_newline |
+ whitespace/indent |
+ whitespace/labels |
+ whitespace/line_length |
+ whitespace/newline |
+ whitespace/operators |
+ whitespace/parens |
+ whitespace/semicolon |
+ whitespace/tab |
+ whitespace/todo |
+""" |
+ |
+# We used to check for high-bit characters, but after much discussion we |
+# decided those were OK, as long as they were in UTF-8 and didn't represent |
+# hard-coded international strings, which belong in a seperate i18n file. |
+ |
+# Headers that we consider STL headers. |
+_STL_HEADERS = frozenset([ |
+ 'algobase.h', 'algorithm', 'alloc.h', 'bitset', 'deque', 'exception', |
+ 'function.h', 'functional', 'hash_map', 'hash_map.h', 'hash_set', |
+ 'hash_set.h', 'iterator', 'list', 'list.h', 'map', 'memory', 'pair.h', |
+ 'pthread_alloc', 'queue', 'set', 'set.h', 'sstream', 'stack', |
+ 'stl_alloc.h', 'stl_relops.h', 'type_traits.h', |
+ 'utility', 'vector', 'vector.h', |
+ ]) |
+ |
+ |
+# Non-STL C++ system headers. |
+_CPP_HEADERS = frozenset([ |
+ 'algo.h', 'builtinbuf.h', 'bvector.h', 'cassert', 'cctype', |
+ 'cerrno', 'cfloat', 'ciso646', 'climits', 'clocale', 'cmath', |
+ 'complex', 'complex.h', 'csetjmp', 'csignal', 'cstdarg', 'cstddef', |
+ 'cstdio', 'cstdlib', 'cstring', 'ctime', 'cwchar', 'cwctype', |
+ 'defalloc.h', 'deque.h', 'editbuf.h', 'exception', 'fstream', |
+ 'fstream.h', 'hashtable.h', 'heap.h', 'indstream.h', 'iomanip', |
+ 'iomanip.h', 'ios', 'iosfwd', 'iostream', 'iostream.h', 'istream.h', |
+ 'iterator.h', 'limits', 'map.h', 'multimap.h', 'multiset.h', |
+ 'numeric', 'ostream.h', 'parsestream.h', 'pfstream.h', 'PlotFile.h', |
+ 'procbuf.h', 'pthread_alloc.h', 'rope', 'rope.h', 'ropeimpl.h', |
+ 'SFile.h', 'slist', 'slist.h', 'stack.h', 'stdexcept', |
+ 'stdiostream.h', 'streambuf.h', 'stream.h', 'strfile.h', 'string', |
+ 'strstream', 'strstream.h', 'tempbuf.h', 'tree.h', 'typeinfo', 'valarray', |
+ ]) |
+ |
+ |
+# Assertion macros. These are defined in base/logging.h and |
+# testing/base/gunit.h. Note that the _M versions need to come first |
+# for substring matching to work. |
+_CHECK_MACROS = [ |
+ 'CHECK', |
+ 'EXPECT_TRUE_M', 'EXPECT_TRUE', |
+ 'ASSERT_TRUE_M', 'ASSERT_TRUE', |
+ 'EXPECT_FALSE_M', 'EXPECT_FALSE', |
+ 'ASSERT_FALSE_M', 'ASSERT_FALSE', |
+ ] |
+ |
+# Replacement macros for CHECK/EXPECT_TRUE/EXPECT_FALSE |
+_CHECK_REPLACEMENT = dict([(m, {}) for m in _CHECK_MACROS]) |
+ |
+for op, replacement in [('==', 'EQ'), ('!=', 'NE'), |
+ ('>=', 'GE'), ('>', 'GT'), |
+ ('<=', 'LE'), ('<', 'LT')]: |
+ _CHECK_REPLACEMENT['CHECK'][op] = 'CHECK_%s' % replacement |
+ _CHECK_REPLACEMENT['EXPECT_TRUE'][op] = 'EXPECT_%s' % replacement |
+ _CHECK_REPLACEMENT['ASSERT_TRUE'][op] = 'ASSERT_%s' % replacement |
+ _CHECK_REPLACEMENT['EXPECT_TRUE_M'][op] = 'EXPECT_%s_M' % replacement |
+ _CHECK_REPLACEMENT['ASSERT_TRUE_M'][op] = 'ASSERT_%s_M' % replacement |
+ |
+for op, inv_replacement in [('==', 'NE'), ('!=', 'EQ'), |
+ ('>=', 'LT'), ('>', 'LE'), |
+ ('<=', 'GT'), ('<', 'GE')]: |
+ _CHECK_REPLACEMENT['EXPECT_FALSE'][op] = 'EXPECT_%s' % inv_replacement |
+ _CHECK_REPLACEMENT['ASSERT_FALSE'][op] = 'ASSERT_%s' % inv_replacement |
+ _CHECK_REPLACEMENT['EXPECT_FALSE_M'][op] = 'EXPECT_%s_M' % inv_replacement |
+ _CHECK_REPLACEMENT['ASSERT_FALSE_M'][op] = 'ASSERT_%s_M' % inv_replacement |
+ |
+ |
+# These constants define types of headers for use with |
+# _IncludeState.CheckNextIncludeOrder(). |
+_C_SYS_HEADER = 1 |
+_CPP_SYS_HEADER = 2 |
+_LIKELY_MY_HEADER = 3 |
+_POSSIBLE_MY_HEADER = 4 |
+_OTHER_HEADER = 5 |
+ |
+ |
+_regexp_compile_cache = {} |
+ |
+ |
+def Match(pattern, s): |
+ """Matches the string with the pattern, caching the compiled regexp.""" |
+ # The regexp compilation caching is inlined in both Match and Search for |
+ # performance reasons; factoring it out into a separate function turns out |
+ # to be noticeably expensive. |
+ if not pattern in _regexp_compile_cache: |
+ _regexp_compile_cache[pattern] = sre_compile.compile(pattern) |
+ return _regexp_compile_cache[pattern].match(s) |
+ |
+ |
+def Search(pattern, s): |
+ """Searches the string for the pattern, caching the compiled regexp.""" |
+ if not pattern in _regexp_compile_cache: |
+ _regexp_compile_cache[pattern] = sre_compile.compile(pattern) |
+ return _regexp_compile_cache[pattern].search(s) |
+ |
+ |
+class _IncludeState(dict): |
+ """Tracks line numbers for includes, and the order in which includes appear. |
+ |
+ As a dict, an _IncludeState object serves as a mapping between include |
+ filename and line number on which that file was included. |
+ |
+ Call CheckNextIncludeOrder() once for each header in the file, passing |
+ in the type constants defined above. Calls in an illegal order will |
+ raise an _IncludeError with an appropriate error message. |
+ |
+ """ |
+ # self._section will move monotonically through this set. If it ever |
+ # needs to move backwards, CheckNextIncludeOrder will raise an error. |
+ _INITIAL_SECTION = 0 |
+ _MY_H_SECTION = 1 |
+ _C_SECTION = 2 |
+ _CPP_SECTION = 3 |
+ _OTHER_H_SECTION = 4 |
+ |
+ _TYPE_NAMES = { |
+ _C_SYS_HEADER: 'C system header', |
+ _CPP_SYS_HEADER: 'C++ system header', |
+ _LIKELY_MY_HEADER: 'header this file implements', |
+ _POSSIBLE_MY_HEADER: 'header this file may implement', |
+ _OTHER_HEADER: 'other header', |
+ } |
+ _SECTION_NAMES = { |
+ _INITIAL_SECTION: "... nothing. (This can't be an error.)", |
+ _MY_H_SECTION: 'a header this file implements', |
+ _C_SECTION: 'C system header', |
+ _CPP_SECTION: 'C++ system header', |
+ _OTHER_H_SECTION: 'other header', |
+ } |
+ |
+ def __init__(self): |
+ dict.__init__(self) |
+ self._section = self._INITIAL_SECTION |
+ |
+ def CheckNextIncludeOrder(self, header_type): |
+ """Returns a non-empty error message if the next header is out of order. |
+ |
+ This function also updates the internal state to be ready to check |
+ the next include. |
+ |
+ Args: |
+ header_type: One of the _XXX_HEADER constants defined above. |
+ |
+ Returns: |
+ The empty string if the header is in the right order, or an |
+ error message describing what's wrong. |
+ |
+ """ |
+ error_message = ('Found %s after %s' % |
+ (self._TYPE_NAMES[header_type], |
+ self._SECTION_NAMES[self._section])) |
+ |
+ if header_type == _C_SYS_HEADER: |
+ if self._section <= self._C_SECTION: |
+ self._section = self._C_SECTION |
+ else: |
+ return error_message |
+ elif header_type == _CPP_SYS_HEADER: |
+ if self._section <= self._CPP_SECTION: |
+ self._section = self._CPP_SECTION |
+ else: |
+ return error_message |
+ elif header_type == _LIKELY_MY_HEADER: |
+ if self._section <= self._MY_H_SECTION: |
+ self._section = self._MY_H_SECTION |
+ else: |
+ self._section = self._OTHER_H_SECTION |
+ elif header_type == _POSSIBLE_MY_HEADER: |
+ if self._section <= self._MY_H_SECTION: |
+ self._section = self._MY_H_SECTION |
+ else: |
+ # This will always be the fallback because we're not sure |
+ # enough that the header is associated with this file. |
+ self._section = self._OTHER_H_SECTION |
+ else: |
+ assert header_type == _OTHER_HEADER |
+ self._section = self._OTHER_H_SECTION |
+ |
+ return '' |
+ |
+ |
+class _CppLintState(object): |
+ """Maintains module-wide state..""" |
+ |
+ def __init__(self): |
+ self.verbose_level = 1 # global setting. |
+ self.error_count = 0 # global count of reported errors |
+ self.filters = [] # filters to apply when emitting error messages |
+ |
+ # output format: |
+ # "emacs" - format that emacs can parse (default) |
+ # "vs7" - format that Microsoft Visual Studio 7 can parse |
+ self.output_format = 'emacs' |
+ |
+ def SetOutputFormat(self, output_format): |
+ """Sets the output format for errors.""" |
+ self.output_format = output_format |
+ |
+ def SetVerboseLevel(self, level): |
+ """Sets the module's verbosity, and returns the previous setting.""" |
+ last_verbose_level = self.verbose_level |
+ self.verbose_level = level |
+ return last_verbose_level |
+ |
+ def SetFilters(self, filters): |
+ """Sets the error-message filters. |
+ |
+ These filters are applied when deciding whether to emit a given |
+ error message. |
+ |
+ Args: |
+ filters: A string of comma-separated filters (eg "+whitespace/indent"). |
+ Each filter should start with + or -; else we die. |
+ """ |
+ if not filters: |
+ self.filters = [] |
+ else: |
+ self.filters = filters.split(',') |
+ for filt in self.filters: |
+ if not (filt.startswith('+') or filt.startswith('-')): |
+ raise ValueError('Every filter in --filters must start with + or -' |
+ ' (%s does not)' % filt) |
+ |
+ def ResetErrorCount(self): |
+ """Sets the module's error statistic back to zero.""" |
+ self.error_count = 0 |
+ |
+ def IncrementErrorCount(self): |
+ """Bumps the module's error statistic.""" |
+ self.error_count += 1 |
+ |
+ |
+_cpplint_state = _CppLintState() |
+ |
+ |
+def _OutputFormat(): |
+ """Gets the module's output format.""" |
+ return _cpplint_state.output_format |
+ |
+ |
+def _SetOutputFormat(output_format): |
+ """Sets the module's output format.""" |
+ _cpplint_state.SetOutputFormat(output_format) |
+ |
+ |
+def _VerboseLevel(): |
+ """Returns the module's verbosity setting.""" |
+ return _cpplint_state.verbose_level |
+ |
+ |
+def _SetVerboseLevel(level): |
+ """Sets the module's verbosity, and returns the previous setting.""" |
+ return _cpplint_state.SetVerboseLevel(level) |
+ |
+ |
+def _Filters(): |
+ """Returns the module's list of output filters, as a list.""" |
+ return _cpplint_state.filters |
+ |
+ |
+def _SetFilters(filters): |
+ """Sets the module's error-message filters. |
+ |
+ These filters are applied when deciding whether to emit a given |
+ error message. |
+ |
+ Args: |
+ filters: A string of comma-separated filters (eg "whitespace/indent"). |
+ Each filter should start with + or -; else we die. |
+ """ |
+ _cpplint_state.SetFilters(filters) |
+ |
+ |
+class _FunctionState(object): |
+ """Tracks current function name and the number of lines in its body.""" |
+ |
+ _NORMAL_TRIGGER = 250 # for --v=0, 500 for --v=1, etc. |
+ _TEST_TRIGGER = 400 # about 50% more than _NORMAL_TRIGGER. |
+ |
+ def __init__(self): |
+ self.in_a_function = False |
+ self.lines_in_function = 0 |
+ self.current_function = '' |
+ |
+ def Begin(self, function_name): |
+ """Start analyzing function body. |
+ |
+ Args: |
+ function_name: The name of the function being tracked. |
+ """ |
+ self.in_a_function = True |
+ self.lines_in_function = 0 |
+ self.current_function = function_name |
+ |
+ def Count(self): |
+ """Count line in current function body.""" |
+ if self.in_a_function: |
+ self.lines_in_function += 1 |
+ |
+ def Check(self, error, filename, linenum): |
+ """Report if too many lines in function body. |
+ |
+ Args: |
+ error: The function to call with any errors found. |
+ filename: The name of the current file. |
+ linenum: The number of the line to check. |
+ """ |
+ if Match(r'T(EST|est)', self.current_function): |
+ base_trigger = self._TEST_TRIGGER |
+ else: |
+ base_trigger = self._NORMAL_TRIGGER |
+ trigger = base_trigger * 2**_VerboseLevel() |
+ |
+ if self.lines_in_function > trigger: |
+ error_level = int(math.log(self.lines_in_function / base_trigger, 2)) |
+ # 50 => 0, 100 => 1, 200 => 2, 400 => 3, 800 => 4, 1600 => 5, ... |
+ if error_level > 5: |
+ error_level = 5 |
+ error(filename, linenum, 'readability/fn_size', error_level, |
+ 'Small and focused functions are preferred:' |
+ ' %s has %d non-comment lines' |
+ ' (error triggered by exceeding %d lines).' % ( |
+ self.current_function, self.lines_in_function, trigger)) |
+ |
+ def End(self): |
+ """Stop analizing function body.""" |
+ self.in_a_function = False |
+ |
+ |
+class _IncludeError(Exception): |
+ """Indicates a problem with the include order in a file.""" |
+ pass |
+ |
+ |
+class FileInfo: |
+ """Provides utility functions for filenames. |
+ |
+ FileInfo provides easy access to the components of a file's path |
+ relative to the project root. |
+ """ |
+ |
+ def __init__(self, filename): |
+ self._filename = filename |
+ |
+ def FullName(self): |
+ """Make Windows paths like Unix.""" |
+ return os.path.abspath(self._filename).replace('\\', '/') |
+ |
+ def RepositoryName(self): |
+ """FullName after removing the local path to the repository. |
+ |
+ If we have a real absolute path name here we can try to do something smart: |
+ detecting the root of the checkout and truncating /path/to/checkout from |
+ the name so that we get header guards that don't include things like |
+ "C:\Documents and Settings\..." or "/home/username/..." in them and thus |
+ people on different computers who have checked the source out to different |
+ locations won't see bogus errors. |
+ """ |
+ fullname = self.FullName() |
+ |
+ if os.path.exists(fullname): |
+ project_dir = os.path.dirname(fullname) |
+ |
+ if os.path.exists(os.path.join(project_dir, ".svn")): |
+ # If there's a .svn file in the current directory, we recursively look |
+ # up the directory tree for the top of the SVN checkout |
+ root_dir = project_dir |
+ one_up_dir = os.path.dirname(root_dir) |
+ while os.path.exists(os.path.join(one_up_dir, ".svn")): |
+ root_dir = os.path.dirname(root_dir) |
+ one_up_dir = os.path.dirname(one_up_dir) |
+ |
+ prefix = os.path.commonprefix([root_dir, project_dir]) |
+ return fullname[len(prefix) + 1:] |
+ |
+ # Not SVN? Try to find a git top level directory by searching up from the |
+ # current path. |
+ root_dir = os.path.dirname(fullname) |
+ while (root_dir != os.path.dirname(root_dir) and |
+ not os.path.exists(os.path.join(root_dir, ".git"))): |
+ root_dir = os.path.dirname(root_dir) |
+ if os.path.exists(os.path.join(root_dir, ".git")): |
+ prefix = os.path.commonprefix([root_dir, project_dir]) |
+ return fullname[len(prefix) + 1:] |
+ |
+ # Don't know what to do; header guard warnings may be wrong... |
+ return fullname |
+ |
+ def Split(self): |
+ """Splits the file into the directory, basename, and extension. |
+ |
+ For 'chrome/browser/browser.cc', Split() would |
+ return ('chrome/browser', 'browser', '.cc') |
+ |
+ Returns: |
+ A tuple of (directory, basename, extension). |
+ """ |
+ |
+ googlename = self.RepositoryName() |
+ project, rest = os.path.split(googlename) |
+ return (project,) + os.path.splitext(rest) |
+ |
+ def BaseName(self): |
+ """File base name - text after the final slash, before the final period.""" |
+ return self.Split()[1] |
+ |
+ def Extension(self): |
+ """File extension - text following the final period.""" |
+ return self.Split()[2] |
+ |
+ def NoExtension(self): |
+ """File has no source file extension.""" |
+ return '/'.join(self.Split()[0:2]) |
+ |
+ def IsSource(self): |
+ """File has a source file extension.""" |
+ return self.Extension()[1:] in ('c', 'cc', 'cpp', 'cxx') |
+ |
+ |
+def _ShouldPrintError(category, confidence): |
+ """Returns true iff confidence >= verbose, and category passes filter.""" |
+ # There are two ways we might decide not to print an error message: |
+ # the verbosity level isn't high enough, or the filters filter it out. |
+ if confidence < _cpplint_state.verbose_level: |
+ return False |
+ |
+ is_filtered = False |
+ for one_filter in _Filters(): |
+ if one_filter.startswith('-'): |
+ if category.startswith(one_filter[1:]): |
+ is_filtered = True |
+ elif one_filter.startswith('+'): |
+ if category.startswith(one_filter[1:]): |
+ is_filtered = False |
+ else: |
+ assert False # should have been checked for in SetFilter. |
+ if is_filtered: |
+ return False |
+ |
+ return True |
+ |
+ |
+def Error(filename, linenum, category, confidence, message): |
+ """Logs the fact we've found a lint error. |
+ |
+ We log where the error was found, and also our confidence in the error, |
+ that is, how certain we are this is a legitimate style regression, and |
+ not a misidentification or a use that's sometimes justified. |
+ |
+ Args: |
+ filename: The name of the file containing the error. |
+ linenum: The number of the line containing the error. |
+ category: A string used to describe the "category" this bug |
+ falls under: "whitespace", say, or "runtime". Categories |
+ may have a hierarchy separated by slashes: "whitespace/indent". |
+ confidence: A number from 1-5 representing a confidence score for |
+ the error, with 5 meaning that we are certain of the problem, |
+ and 1 meaning that it could be a legitimate construct. |
+ message: The error message. |
+ """ |
+ # There are two ways we might decide not to print an error message: |
+ # the verbosity level isn't high enough, or the filters filter it out. |
+ if _ShouldPrintError(category, confidence): |
+ _cpplint_state.IncrementErrorCount() |
+ if _cpplint_state.output_format == 'vs7': |
+ sys.stderr.write('%s(%s): %s [%s] [%d]\n' % ( |
+ filename, linenum, message, category, confidence)) |
+ else: |
+ sys.stderr.write('%s:%s: %s [%s] [%d]\n' % ( |
+ filename, linenum, message, category, confidence)) |
+ |
+ |
+# Matches standard C++ escape esequences per 2.13.2.3 of the C++ standard. |
+_RE_PATTERN_CLEANSE_LINE_ESCAPES = re.compile( |
+ r'\\([abfnrtv?"\\\']|\d+|x[0-9a-fA-F]+)') |
+# Matches strings. Escape codes should already be removed by ESCAPES. |
+_RE_PATTERN_CLEANSE_LINE_DOUBLE_QUOTES = re.compile(r'"[^"]*"') |
+# Matches characters. Escape codes should already be removed by ESCAPES. |
+_RE_PATTERN_CLEANSE_LINE_SINGLE_QUOTES = re.compile(r"'.'") |
+# Matches multi-line C++ comments. |
+# This RE is a little bit more complicated than one might expect, because we |
+# have to take care of space removals tools so we can handle comments inside |
+# statements better. |
+# The current rule is: We only clear spaces from both sides when we're at the |
+# end of the line. Otherwise, we try to remove spaces from the right side, |
+# if this doesn't work we try on left side but only if there's a non-character |
+# on the right. |
+_RE_PATTERN_CLEANSE_LINE_C_COMMENTS = re.compile( |
+ r"""(\s*/\*.*\*/\s*$| |
+ /\*.*\*/\s+| |
+ \s+/\*.*\*/(?=\W)| |
+ /\*.*\*/)""", re.VERBOSE) |
+ |
+ |
+def IsCppString(line): |
+ """Does line terminate so, that the next symbol is in string constant. |
+ |
+ This function does not consider single-line nor multi-line comments. |
+ |
+ Args: |
+ line: is a partial line of code starting from the 0..n. |
+ |
+ Returns: |
+ True, if next character appended to 'line' is inside a |
+ string constant. |
+ """ |
+ |
+ line = line.replace(r'\\', 'XX') # after this, \\" does not match to \" |
+ return ((line.count('"') - line.count(r'\"') - line.count("'\"'")) & 1) == 1 |
+ |
+ |
+def FindNextMultiLineCommentStart(lines, lineix): |
+ """Find the beginning marker for a multiline comment.""" |
+ while lineix < len(lines): |
+ if lines[lineix].strip().startswith('/*'): |
+ # Only return this marker if the comment goes beyond this line |
+ if lines[lineix].strip().find('*/', 2) < 0: |
+ return lineix |
+ lineix += 1 |
+ return len(lines) |
+ |
+ |
+def FindNextMultiLineCommentEnd(lines, lineix): |
+ """We are inside a comment, find the end marker.""" |
+ while lineix < len(lines): |
+ if lines[lineix].strip().endswith('*/'): |
+ return lineix |
+ lineix += 1 |
+ return len(lines) |
+ |
+ |
+def RemoveMultiLineCommentsFromRange(lines, begin, end): |
+ """Clears a range of lines for multi-line comments.""" |
+ # Having // dummy comments makes the lines non-empty, so we will not get |
+ # unnecessary blank line warnings later in the code. |
+ for i in range(begin, end): |
+ lines[i] = '// dummy' |
+ |
+ |
+def RemoveMultiLineComments(filename, lines, error): |
+ """Removes multiline (c-style) comments from lines.""" |
+ lineix = 0 |
+ while lineix < len(lines): |
+ lineix_begin = FindNextMultiLineCommentStart(lines, lineix) |
+ if lineix_begin >= len(lines): |
+ return |
+ lineix_end = FindNextMultiLineCommentEnd(lines, lineix_begin) |
+ if lineix_end >= len(lines): |
+ error(filename, lineix_begin + 1, 'readability/multiline_comment', 5, |
+ 'Could not find end of multi-line comment') |
+ return |
+ RemoveMultiLineCommentsFromRange(lines, lineix_begin, lineix_end + 1) |
+ lineix = lineix_end + 1 |
+ |
+ |
+def CleanseComments(line): |
+ """Removes //-comments and single-line C-style /* */ comments. |
+ |
+ Args: |
+ line: A line of C++ source. |
+ |
+ Returns: |
+ The line with single-line comments removed. |
+ """ |
+ commentpos = line.find('//') |
+ if commentpos != -1 and not IsCppString(line[:commentpos]): |
+ line = line[:commentpos] |
+ # get rid of /* ... */ |
+ return _RE_PATTERN_CLEANSE_LINE_C_COMMENTS.sub('', line) |
+ |
+ |
+class CleansedLines: |
+ """Holds 3 copies of all lines with different preprocessing applied to them. |
+ |
+ 1) elided member contains lines without strings and comments, |
+ 2) lines member contains lines without comments, and |
+ 3) raw member contains all the lines without processing. |
+ All these three members are of <type 'list'>, and of the same length. |
+ """ |
+ |
+ def __init__(self, lines): |
+ self.elided = [] |
+ self.lines = [] |
+ self.raw_lines = lines |
+ self.num_lines = len(lines) |
+ for linenum in range(len(lines)): |
+ self.lines.append(CleanseComments(lines[linenum])) |
+ elided = self._CollapseStrings(lines[linenum]) |
+ self.elided.append(CleanseComments(elided)) |
+ |
+ def NumLines(self): |
+ """Returns the number of lines represented.""" |
+ return self.num_lines |
+ |
+ @staticmethod |
+ def _CollapseStrings(elided): |
+ """Collapses strings and chars on a line to simple "" or '' blocks. |
+ |
+ We nix strings first so we're not fooled by text like '"http://"' |
+ |
+ Args: |
+ elided: The line being processed. |
+ |
+ Returns: |
+ The line with collapsed strings. |
+ """ |
+ if not _RE_PATTERN_INCLUDE.match(elided): |
+ # Remove escaped characters first to make quote/single quote collapsing |
+ # basic. Things that look like escaped characters shouldn't occur |
+ # outside of strings and chars. |
+ elided = _RE_PATTERN_CLEANSE_LINE_ESCAPES.sub('', elided) |
+ elided = _RE_PATTERN_CLEANSE_LINE_SINGLE_QUOTES.sub("''", elided) |
+ elided = _RE_PATTERN_CLEANSE_LINE_DOUBLE_QUOTES.sub('""', elided) |
+ return elided |
+ |
+ |
+def CloseExpression(clean_lines, linenum, pos): |
+ """If input points to ( or { or [, finds the position that closes it. |
+ |
+ If lines[linenum][pos] points to a '(' or '{' or '[', finds the the |
+ linenum/pos that correspond to the closing of the expression. |
+ |
+ Args: |
+ clean_lines: A CleansedLines instance containing the file. |
+ linenum: The number of the line to check. |
+ pos: A position on the line. |
+ |
+ Returns: |
+ A tuple (line, linenum, pos) pointer *past* the closing brace, or |
+ (line, len(lines), -1) if we never find a close. Note we ignore |
+ strings and comments when matching; and the line we return is the |
+ 'cleansed' line at linenum. |
+ """ |
+ |
+ line = clean_lines.elided[linenum] |
+ startchar = line[pos] |
+ if startchar not in '({[': |
+ return (line, clean_lines.NumLines(), -1) |
+ if startchar == '(': endchar = ')' |
+ if startchar == '[': endchar = ']' |
+ if startchar == '{': endchar = '}' |
+ |
+ num_open = line.count(startchar) - line.count(endchar) |
+ while linenum < clean_lines.NumLines() and num_open > 0: |
+ linenum += 1 |
+ line = clean_lines.elided[linenum] |
+ num_open += line.count(startchar) - line.count(endchar) |
+ # OK, now find the endchar that actually got us back to even |
+ endpos = len(line) |
+ while num_open >= 0: |
+ endpos = line.rfind(')', 0, endpos) |
+ num_open -= 1 # chopped off another ) |
+ return (line, linenum, endpos + 1) |
+ |
+ |
+def CheckForCopyright(filename, lines, error): |
+ """Logs an error if no Copyright message appears at the top of the file.""" |
+ |
+ # We'll say it should occur by line 10. Don't forget there's a |
+ # dummy line at the front. |
+ for line in xrange(1, min(len(lines), 11)): |
+ if re.search(r'Copyright', lines[line], re.I): break |
+ else: # means no copyright line was found |
+ error(filename, 0, 'legal/copyright', 5, |
+ 'No copyright message found. ' |
+ 'You should have a line: "Copyright [year] <Copyright Owner>"') |
+ |
+ |
+def GetHeaderGuardCPPVariable(filename): |
+ """Returns the CPP variable that should be used as a header guard. |
+ |
+ Args: |
+ filename: The name of a C++ header file. |
+ |
+ Returns: |
+ The CPP variable that should be used as a header guard in the |
+ named file. |
+ |
+ """ |
+ |
+ fileinfo = FileInfo(filename) |
+ return re.sub(r'[-./\s]', '_', fileinfo.RepositoryName()).upper() + '_' |
+ |
+ |
+def CheckForHeaderGuard(filename, lines, error): |
+ """Checks that the file contains a header guard. |
+ |
+ Logs an error if no #ifndef header guard is present. For google3 |
+ headers, checks that the full pathname is used. |
+ |
+ Args: |
+ filename: The name of the C++ header file. |
+ lines: An array of strings, each representing a line of the file. |
+ error: The function to call with any errors found. |
+ """ |
+ |
+ cppvar = GetHeaderGuardCPPVariable(filename) |
+ |
+ ifndef = None |
+ ifndef_linenum = 0 |
+ define = None |
+ endif = None |
+ endif_linenum = 0 |
+ for linenum, line in enumerate(lines): |
+ linesplit = line.split() |
+ if len(linesplit) >= 2: |
+ # find the first occurrence of #ifndef and #define, save arg |
+ if not ifndef and linesplit[0] == '#ifndef': |
+ # set ifndef to the header guard presented on the #ifndef line. |
+ ifndef = linesplit[1] |
+ ifndef_linenum = linenum |
+ if not define and linesplit[0] == '#define': |
+ define = linesplit[1] |
+ # find the last occurrence of #endif, save entire line |
+ if line.startswith('#endif'): |
+ endif = line |
+ endif_linenum = linenum |
+ |
+ if not ifndef or not define or ifndef != define: |
+ error(filename, 0, 'build/header_guard', 5, |
+ 'No #ifndef header guard found, suggested CPP variable is: %s' % |
+ cppvar) |
+ return |
+ |
+ # The guard should be PATH_FILE_H_, but we also allow PATH_FILE_H__ |
+ # for backward compatibility. |
+ if ifndef != cppvar: |
+ error_level = 0 |
+ if ifndef != cppvar + '_': |
+ error_level = 5 |
+ |
+ error(filename, ifndef_linenum, 'build/header_guard', error_level, |
+ '#ifndef header guard has wrong style, please use: %s' % cppvar) |
+ |
+ if endif != ('#endif // %s' % cppvar): |
+ error_level = 0 |
+ if endif != ('#endif // %s' % (cppvar + '_')): |
+ error_level = 5 |
+ |
+ error(filename, endif_linenum, 'build/header_guard', error_level, |
+ '#endif line should be "#endif // %s"' % cppvar) |
+ |
+ |
+def CheckForUnicodeReplacementCharacters(filename, lines, error): |
+ """Logs an error for each line containing Unicode replacement characters. |
+ |
+ These indicate that either the file contained invalid UTF-8 (likely) |
+ or Unicode replacement characters (which it shouldn't). Note that |
+ it's possible for this to throw off line numbering if the invalid |
+ UTF-8 occurred adjacent to a newline. |
+ |
+ Args: |
+ filename: The name of the current file. |
+ lines: An array of strings, each representing a line of the file. |
+ error: The function to call with any errors found. |
+ """ |
+ for linenum, line in enumerate(lines): |
+ if u'\ufffd' in line: |
+ error(filename, linenum, 'readability/utf8', 5, |
+ 'Line contains invalid UTF-8 (or Unicode replacement character).') |
+ |
+ |
+def CheckForNewlineAtEOF(filename, lines, error): |
+ """Logs an error if there is no newline char at the end of the file. |
+ |
+ Args: |
+ filename: The name of the current file. |
+ lines: An array of strings, each representing a line of the file. |
+ error: The function to call with any errors found. |
+ """ |
+ |
+ # The array lines() was created by adding two newlines to the |
+ # original file (go figure), then splitting on \n. |
+ # To verify that the file ends in \n, we just have to make sure the |
+ # last-but-two element of lines() exists and is empty. |
+ if len(lines) < 3 or lines[-2]: |
+ error(filename, len(lines) - 2, 'whitespace/ending_newline', 5, |
+ 'Could not find a newline character at the end of the file.') |
+ |
+ |
+def CheckForMultilineCommentsAndStrings(filename, clean_lines, linenum, error): |
+ """Logs an error if we see /* ... */ or "..." that extend past one line. |
+ |
+ /* ... */ comments are legit inside macros, for one line. |
+ Otherwise, we prefer // comments, so it's ok to warn about the |
+ other. Likewise, it's ok for strings to extend across multiple |
+ lines, as long as a line continuation character (backslash) |
+ terminates each line. Although not currently prohibited by the C++ |
+ style guide, it's ugly and unnecessary. We don't do well with either |
+ in this lint program, so we warn about both. |
+ |
+ Args: |
+ filename: The name of the current file. |
+ clean_lines: A CleansedLines instance containing the file. |
+ linenum: The number of the line to check. |
+ error: The function to call with any errors found. |
+ """ |
+ line = clean_lines.elided[linenum] |
+ |
+ # Remove all \\ (escaped backslashes) from the line. They are OK, and the |
+ # second (escaped) slash may trigger later \" detection erroneously. |
+ line = line.replace('\\\\', '') |
+ |
+ if line.count('/*') > line.count('*/'): |
+ error(filename, linenum, 'readability/multiline_comment', 5, |
+ 'Complex multi-line /*...*/-style comment found. ' |
+ 'Lint may give bogus warnings. ' |
+ 'Consider replacing these with //-style comments, ' |
+ 'with #if 0...#endif, ' |
+ 'or with more clearly structured multi-line comments.') |
+ |
+ if (line.count('"') - line.count('\\"')) % 2: |
+ error(filename, linenum, 'readability/multiline_string', 5, |
+ 'Multi-line string ("...") found. This lint script doesn\'t ' |
+ 'do well with such strings, and may give bogus warnings. They\'re ' |
+ 'ugly and unnecessary, and you should use concatenation instead".') |
+ |
+ |
+threading_list = ( |
+ ('asctime(', 'asctime_r('), |
+ ('ctime(', 'ctime_r('), |
+ ('getgrgid(', 'getgrgid_r('), |
+ ('getgrnam(', 'getgrnam_r('), |
+ ('getlogin(', 'getlogin_r('), |
+ ('getpwnam(', 'getpwnam_r('), |
+ ('getpwuid(', 'getpwuid_r('), |
+ ('gmtime(', 'gmtime_r('), |
+ ('localtime(', 'localtime_r('), |
+ ('rand(', 'rand_r('), |
+ ('readdir(', 'readdir_r('), |
+ ('strtok(', 'strtok_r('), |
+ ('ttyname(', 'ttyname_r('), |
+ ) |
+ |
+ |
+def CheckPosixThreading(filename, clean_lines, linenum, error): |
+ """Checks for calls to thread-unsafe functions. |
+ |
+ Much code has been originally written without consideration of |
+ multi-threading. Also, engineers are relying on their old experience; |
+ they have learned posix before threading extensions were added. These |
+ tests guide the engineers to use thread-safe functions (when using |
+ posix directly). |
+ |
+ Args: |
+ filename: The name of the current file. |
+ clean_lines: A CleansedLines instance containing the file. |
+ linenum: The number of the line to check. |
+ error: The function to call with any errors found. |
+ """ |
+ line = clean_lines.elided[linenum] |
+ for single_thread_function, multithread_safe_function in threading_list: |
+ ix = line.find(single_thread_function) |
+ if ix >= 0 and (ix == 0 or (not line[ix - 1].isalnum() and |
+ line[ix - 1] not in ('_', '.', '>'))): |
+ error(filename, linenum, 'runtime/threadsafe_fn', 2, |
+ 'Consider using ' + multithread_safe_function + |
+ '...) instead of ' + single_thread_function + |
+ '...) for improved thread safety.') |
+ |
+ |
+class _ClassInfo(object): |
+ """Stores information about a class.""" |
+ |
+ def __init__(self, name, linenum): |
+ self.name = name |
+ self.linenum = linenum |
+ self.seen_open_brace = False |
+ self.is_derived = False |
+ self.virtual_method_linenumber = None |
+ self.has_virtual_destructor = False |
+ self.brace_depth = 0 |
+ |
+ |
+class _ClassState(object): |
+ """Holds the current state of the parse relating to class declarations. |
+ |
+ It maintains a stack of _ClassInfos representing the parser's guess |
+ as to the current nesting of class declarations. The innermost class |
+ is at the top (back) of the stack. Typically, the stack will either |
+ be empty or have exactly one entry. |
+ """ |
+ |
+ def __init__(self): |
+ self.classinfo_stack = [] |
+ |
+ def CheckFinished(self, filename, error): |
+ """Checks that all classes have been completely parsed. |
+ |
+ Call this when all lines in a file have been processed. |
+ Args: |
+ filename: The name of the current file. |
+ error: The function to call with any errors found. |
+ """ |
+ if self.classinfo_stack: |
+ # Note: This test can result in false positives if #ifdef constructs |
+ # get in the way of brace matching. See the testBuildClass test in |
+ # cpplint_unittest.py for an example of this. |
+ error(filename, self.classinfo_stack[0].linenum, 'build/class', 5, |
+ 'Failed to find complete declaration of class %s' % |
+ self.classinfo_stack[0].name) |
+ |
+ |
+def CheckForNonStandardConstructs(filename, clean_lines, linenum, |
+ class_state, error): |
+ """Logs an error if we see certain non-ANSI constructs ignored by gcc-2. |
+ |
+ Complain about several constructs which gcc-2 accepts, but which are |
+ not standard C++. Warning about these in lint is one way to ease the |
+ transition to new compilers. |
+ - put storage class first (e.g. "static const" instead of "const static"). |
+ - "%lld" instead of %qd" in printf-type functions. |
+ - "%1$d" is non-standard in printf-type functions. |
+ - "\%" is an undefined character escape sequence. |
+ - text after #endif is not allowed. |
+ - invalid inner-style forward declaration. |
+ - >? and <? operators, and their >?= and <?= cousins. |
+ - classes with virtual methods need virtual destructors (compiler warning |
+ available, but not turned on yet.) |
+ |
+ Additionally, check for constructor/destructor style violations as it |
+ is very convenient to do so while checking for gcc-2 compliance. |
+ |
+ Args: |
+ filename: The name of the current file. |
+ clean_lines: A CleansedLines instance containing the file. |
+ linenum: The number of the line to check. |
+ class_state: A _ClassState instance which maintains information about |
+ the current stack of nested class declarations being parsed. |
+ error: A callable to which errors are reported, which takes 4 arguments: |
+ filename, line number, error level, and message |
+ """ |
+ |
+ # Remove comments from the line, but leave in strings for now. |
+ line = clean_lines.lines[linenum] |
+ |
+ if Search(r'printf\s*\(.*".*%[-+ ]?\d*q', line): |
+ error(filename, linenum, 'runtime/printf_format', 3, |
+ '%q in format strings is deprecated. Use %ll instead.') |
+ |
+ if Search(r'printf\s*\(.*".*%\d+\$', line): |
+ error(filename, linenum, 'runtime/printf_format', 2, |
+ '%N$ formats are unconventional. Try rewriting to avoid them.') |
+ |
+ # Remove escaped backslashes before looking for undefined escapes. |
+ line = line.replace('\\\\', '') |
+ |
+ if Search(r'("|\').*\\(%|\[|\(|{)', line): |
+ error(filename, linenum, 'build/printf_format', 3, |
+ '%, [, (, and { are undefined character escapes. Unescape them.') |
+ |
+ # For the rest, work with both comments and strings removed. |
+ line = clean_lines.elided[linenum] |
+ |
+ if Search(r'\b(const|volatile|void|char|short|int|long' |
+ r'|float|double|signed|unsigned' |
+ r'|schar|u?int8|u?int16|u?int32|u?int64)' |
+ r'\s+(auto|register|static|extern|typedef)\b', |
+ line): |
+ error(filename, linenum, 'build/storage_class', 5, |
+ 'Storage class (static, extern, typedef, etc) should be first.') |
+ |
+ if Match(r'\s*#\s*endif\s*[^/\s]+', line): |
+ error(filename, linenum, 'build/endif_comment', 5, |
+ 'Uncommented text after #endif is non-standard. Use a comment.') |
+ |
+ if Match(r'\s*class\s+(\w+\s*::\s*)+\w+\s*;', line): |
+ error(filename, linenum, 'build/forward_decl', 5, |
+ 'Inner-style forward declarations are invalid. Remove this line.') |
+ |
+ if Search(r'(\w+|[+-]?\d+(\.\d*)?)\s*(<|>)\?=?\s*(\w+|[+-]?\d+)(\.\d*)?', |
+ line): |
+ error(filename, linenum, 'build/deprecated', 3, |
+ '>? and <? (max and min) operators are non-standard and deprecated.') |
+ |
+ # Track class entry and exit, and attempt to find cases within the |
+ # class declaration that don't meet the C++ style |
+ # guidelines. Tracking is very dependent on the code matching Google |
+ # style guidelines, but it seems to perform well enough in testing |
+ # to be a worthwhile addition to the checks. |
+ classinfo_stack = class_state.classinfo_stack |
+ # Look for a class declaration |
+ class_decl_match = Match( |
+ r'\s*(template\s*<[\w\s<>,:]*>\s*)?(class|struct)\s+(\w+(::\w+)*)', line) |
+ if class_decl_match: |
+ classinfo_stack.append(_ClassInfo(class_decl_match.group(3), linenum)) |
+ |
+ # Everything else in this function uses the top of the stack if it's |
+ # not empty. |
+ if not classinfo_stack: |
+ return |
+ |
+ classinfo = classinfo_stack[-1] |
+ |
+ # If the opening brace hasn't been seen look for it and also |
+ # parent class declarations. |
+ if not classinfo.seen_open_brace: |
+ # If the line has a ';' in it, assume it's a forward declaration or |
+ # a single-line class declaration, which we won't process. |
+ if line.find(';') != -1: |
+ classinfo_stack.pop() |
+ return |
+ classinfo.seen_open_brace = (line.find('{') != -1) |
+ # Look for a bare ':' |
+ if Search('(^|[^:]):($|[^:])', line): |
+ classinfo.is_derived = True |
+ if not classinfo.seen_open_brace: |
+ return # Everything else in this function is for after open brace |
+ |
+ # The class may have been declared with namespace or classname qualifiers. |
+ # The constructor and destructor will not have those qualifiers. |
+ base_classname = classinfo.name.split('::')[-1] |
+ |
+ # Look for single-argument constructors that aren't marked explicit. |
+ # Technically a valid construct, but against style. |
+ args = Match(r'(?<!explicit)\s+%s\s*\(([^,()]+)\)' |
+ % re.escape(base_classname), |
+ line) |
+ if (args and |
+ args.group(1) != 'void' and |
+ not Match(r'(const\s+)?%s\s*&' % re.escape(base_classname), |
+ args.group(1).strip())): |
+ error(filename, linenum, 'runtime/explicit', 5, |
+ 'Single-argument constructors should be marked explicit.') |
+ |
+ # Look for methods declared virtual. |
+ if Search(r'\bvirtual\b', line): |
+ classinfo.virtual_method_linenumber = linenum |
+ # Only look for a destructor declaration on the same line. It would |
+ # be extremely unlikely for the destructor declaration to occupy |
+ # more than one line. |
+ if Search(r'~%s\s*\(' % base_classname, line): |
+ classinfo.has_virtual_destructor = True |
+ |
+ # Look for class end. |
+ brace_depth = classinfo.brace_depth |
+ brace_depth = brace_depth + line.count('{') - line.count('}') |
+ if brace_depth <= 0: |
+ classinfo = classinfo_stack.pop() |
+ # Try to detect missing virtual destructor declarations. |
+ # For now, only warn if a non-derived class with virtual methods lacks |
+ # a virtual destructor. This is to make it less likely that people will |
+ # declare derived virtual destructors without declaring the base |
+ # destructor virtual. |
+ if ((classinfo.virtual_method_linenumber is not None) and |
+ (not classinfo.has_virtual_destructor) and |
+ (not classinfo.is_derived)): # Only warn for base classes |
+ error(filename, classinfo.linenum, 'runtime/virtual', 4, |
+ 'The class %s probably needs a virtual destructor due to ' |
+ 'having virtual method(s), one declared at line %d.' |
+ % (classinfo.name, classinfo.virtual_method_linenumber)) |
+ else: |
+ classinfo.brace_depth = brace_depth |
+ |
+ |
+def CheckSpacingForFunctionCall(filename, line, linenum, error): |
+ """Checks for the correctness of various spacing around function calls. |
+ |
+ Args: |
+ filename: The name of the current file. |
+ line: The text of the line to check. |
+ linenum: The number of the line to check. |
+ error: The function to call with any errors found. |
+ """ |
+ |
+ # Since function calls often occur inside if/for/while/switch |
+ # expressions - which have their own, more liberal conventions - we |
+ # first see if we should be looking inside such an expression for a |
+ # function call, to which we can apply more strict standards. |
+ fncall = line # if there's no control flow construct, look at whole line |
+ for pattern in (r'\bif\s*\((.*)\)\s*{', |
+ r'\bfor\s*\((.*)\)\s*{', |
+ r'\bwhile\s*\((.*)\)\s*[{;]', |
+ r'\bswitch\s*\((.*)\)\s*{'): |
+ match = Search(pattern, line) |
+ if match: |
+ fncall = match.group(1) # look inside the parens for function calls |
+ break |
+ |
+ # Except in if/for/while/switch, there should never be space |
+ # immediately inside parens (eg "f( 3, 4 )"). We make an exception |
+ # for nested parens ( (a+b) + c ). Likewise, there should never be |
+ # a space before a ( when it's a function argument. I assume it's a |
+ # function argument when the char before the whitespace is legal in |
+ # a function name (alnum + _) and we're not starting a macro. Also ignore |
+ # pointers and references to arrays and functions coz they're too tricky: |
+ # we use a very simple way to recognize these: |
+ # " (something)(maybe-something)" or |
+ # " (something)(maybe-something," or |
+ # " (something)[something]" |
+ # Note that we assume the contents of [] to be short enough that |
+ # they'll never need to wrap. |
+ if ( # Ignore control structures. |
+ not Search(r'\b(if|for|while|switch|return|delete)\b', fncall) and |
+ # Ignore pointers/references to functions. |
+ not Search(r' \([^)]+\)\([^)]*(\)|,$)', fncall) and |
+ # Ignore pointers/references to arrays. |
+ not Search(r' \([^)]+\)\[[^\]]+\]', fncall)): |
+ if Search(r'\w\s*\(\s', fncall): # a ( used for a fn call |
+ error(filename, linenum, 'whitespace/parens', 4, |
+ 'Extra space after ( in function call') |
+ elif Search(r'\(\s+[^(]', fncall): |
+ error(filename, linenum, 'whitespace/parens', 2, |
+ 'Extra space after (') |
+ if (Search(r'\w\s+\(', fncall) and |
+ not Search(r'#\s*define|typedef', fncall)): |
+ error(filename, linenum, 'whitespace/parens', 4, |
+ 'Extra space before ( in function call') |
+ # If the ) is followed only by a newline or a { + newline, assume it's |
+ # part of a control statement (if/while/etc), and don't complain |
+ if Search(r'[^)]\s+\)\s*[^{\s]', fncall): |
+ error(filename, linenum, 'whitespace/parens', 2, |
+ 'Extra space before )') |
+ |
+ |
+def IsBlankLine(line): |
+ """Returns true if the given line is blank. |
+ |
+ We consider a line to be blank if the line is empty or consists of |
+ only white spaces. |
+ |
+ Args: |
+ line: A line of a string. |
+ |
+ Returns: |
+ True, if the given line is blank. |
+ """ |
+ return not line or line.isspace() |
+ |
+ |
+def CheckForFunctionLengths(filename, clean_lines, linenum, |
+ function_state, error): |
+ """Reports for long function bodies. |
+ |
+ For an overview why this is done, see: |
+ http://google-styleguide.googlecode.com/svn/trunk/cppguide.xml#Write_Short_Functions |
+ |
+ Uses a simplistic algorithm assuming other style guidelines |
+ (especially spacing) are followed. |
+ Only checks unindented functions, so class members are unchecked. |
+ Trivial bodies are unchecked, so constructors with huge initializer lists |
+ may be missed. |
+ Blank/comment lines are not counted so as to avoid encouraging the removal |
+ of vertical space and commments just to get through a lint check. |
+ NOLINT *on the last line of a function* disables this check. |
+ |
+ Args: |
+ filename: The name of the current file. |
+ clean_lines: A CleansedLines instance containing the file. |
+ linenum: The number of the line to check. |
+ function_state: Current function name and lines in body so far. |
+ error: The function to call with any errors found. |
+ """ |
+ lines = clean_lines.lines |
+ line = lines[linenum] |
+ raw = clean_lines.raw_lines |
+ raw_line = raw[linenum] |
+ joined_line = '' |
+ |
+ starting_func = False |
+ regexp = r'(\w(\w|::|\*|\&|\s)*)\(' # decls * & space::name( ... |
+ match_result = Match(regexp, line) |
+ if match_result: |
+ # If the name is all caps and underscores, figure it's a macro and |
+ # ignore it, unless it's TEST or TEST_F. |
+ function_name = match_result.group(1).split()[-1] |
+ if function_name == 'TEST' or function_name == 'TEST_F' or ( |
+ not Match(r'[A-Z_]+$', function_name)): |
+ starting_func = True |
+ |
+ if starting_func: |
+ body_found = False |
+ # Don't look too far for the function body. Lint might be mistaken about |
+ # whether it's a function definition. |
+ for start_linenum in xrange(linenum, |
+ min(linenum+100, clean_lines.NumLines())): |
+ start_line = lines[start_linenum] |
+ joined_line += ' ' + start_line.lstrip() |
+ if Search(r'(;|})', start_line): # Declarations and trivial functions |
+ body_found = True |
+ break # ... ignore |
+ elif Search(r'{', start_line): |
+ body_found = True |
+ function = Search(r'((\w|:)*)\(', line).group(1) |
+ if Match(r'TEST', function): # Handle TEST... macros |
+ parameter_regexp = Search(r'(\(.*\))', joined_line) |
+ if parameter_regexp: # Ignore bad syntax |
+ function += parameter_regexp.group(1) |
+ else: |
+ function += '()' |
+ function_state.Begin(function) |
+ break |
+ if not body_found: |
+ # 50 lines after finding a line deemed to start a function |
+ # definition, no body for the function was found. A macro |
+ # invocation with no terminating semicolon could trigger this. |
+ error(filename, linenum, 'readability/fn_size', 5, |
+ 'Lint failed to find start of function body.') |
+ elif Match(r'^\}\s*$', line): # function end |
+ if not Search(r'\bNOLINT\b', raw_line): |
+ function_state.Check(error, filename, linenum) |
+ function_state.End() |
+ elif not Match(r'^\s*$', line): |
+ function_state.Count() # Count non-blank/non-comment lines. |
+ |
+ |
+_RE_PATTERN_TODO = re.compile(r'^//(\s*)TODO(\(.+?\))?:?(\s|$)?') |
+ |
+ |
+def CheckComment(comment, filename, linenum, error): |
+ """Checks for common mistakes in TODO comments. |
+ |
+ Args: |
+ comment: The text of the comment from the line in question. |
+ filename: The name of the current file. |
+ linenum: The number of the line to check. |
+ error: The function to call with any errors found. |
+ """ |
+ match = _RE_PATTERN_TODO.match(comment) |
+ if match: |
+ # One whitespace is correct; zero whitespace is handled elsewhere. |
+ leading_whitespace = match.group(1) |
+ if len(leading_whitespace) > 1: |
+ error(filename, linenum, 'whitespace/todo', 2, |
+ 'Too many spaces before TODO') |
+ |
+ username = match.group(2) |
+ if not username: |
+ error(filename, linenum, 'readability/todo', 2, |
+ 'Missing username in TODO; it should look like ' |
+ '"// TODO(my_username): Stuff."') |
+ |
+ middle_whitespace = match.group(3) |
+ if middle_whitespace != ' ' and middle_whitespace != '': |
+ error(filename, linenum, 'whitespace/todo', 2, |
+ 'TODO(my_username) should be followed by a space') |
+ |
+ |
+def CheckSpacing(filename, clean_lines, linenum, error): |
+ """Checks for the correctness of various spacing issues in the code. |
+ |
+ Things we check for: spaces around operators, spaces after |
+ if/for/while/switch, no spaces around parens in function calls, two |
+ spaces between code and comment, don't start a block with a blank |
+ line, don't end a function with a blank line, don't have too many |
+ blank lines in a row. |
+ |
+ Args: |
+ filename: The name of the current file. |
+ clean_lines: A CleansedLines instance containing the file. |
+ linenum: The number of the line to check. |
+ error: The function to call with any errors found. |
+ """ |
+ |
+ raw = clean_lines.raw_lines |
+ line = raw[linenum] |
+ |
+ # Before nixing comments, check if the line is blank for no good |
+ # reason. This includes the first line after a block is opened, and |
+ # blank lines at the end of a function (ie, right before a line like '}' |
+ if IsBlankLine(line): |
+ elided = clean_lines.elided |
+ prev_line = elided[linenum - 1] |
+ prevbrace = prev_line.rfind('{') |
+ # TODO(unknown): Don't complain if line before blank line, and line after, |
+ # both start with alnums and are indented the same amount. |
+ # This ignores whitespace at the start of a namespace block |
+ # because those are not usually indented. |
+ if (prevbrace != -1 and prev_line[prevbrace:].find('}') == -1 |
+ and prev_line[:prevbrace].find('namespace') == -1): |
+ # OK, we have a blank line at the start of a code block. Before we |
+ # complain, we check if it is an exception to the rule: The previous |
+ # non-empty line has the paramters of a function header that are indented |
+ # 4 spaces (because they did not fit in a 80 column line when placed on |
+ # the same line as the function name). We also check for the case where |
+ # the previous line is indented 6 spaces, which may happen when the |
+ # initializers of a constructor do not fit into a 80 column line. |
+ exception = False |
+ if Match(r' {6}\w', prev_line): # Initializer list? |
+ # We are looking for the opening column of initializer list, which |
+ # should be indented 4 spaces to cause 6 space indentation afterwards. |
+ search_position = linenum-2 |
+ while (search_position >= 0 |
+ and Match(r' {6}\w', elided[search_position])): |
+ search_position -= 1 |
+ exception = (search_position >= 0 |
+ and elided[search_position][:5] == ' :') |
+ else: |
+ # Search for the function arguments or an initializer list. We use a |
+ # simple heuristic here: If the line is indented 4 spaces; and we have a |
+ # closing paren, without the opening paren, followed by an opening brace |
+ # or colon (for initializer lists) we assume that it is the last line of |
+ # a function header. If we have a colon indented 4 spaces, it is an |
+ # initializer list. |
+ exception = (Match(r' {4}\w[^\(]*\)\s*(const\s*)?(\{\s*$|:)', |
+ prev_line) |
+ or Match(r' {4}:', prev_line)) |
+ |
+ if not exception: |
+ error(filename, linenum, 'whitespace/blank_line', 2, |
+ 'Blank line at the start of a code block. Is this needed?') |
+ # This doesn't ignore whitespace at the end of a namespace block |
+ # because that is too hard without pairing open/close braces; |
+ # however, a special exception is made for namespace closing |
+ # brackets which have a comment containing "namespace". |
+ # |
+ # Also, ignore blank lines at the end of a block in a long if-else |
+ # chain, like this: |
+ # if (condition1) { |
+ # // Something followed by a blank line |
+ # |
+ # } else if (condition2) { |
+ # // Something else |
+ # } |
+ if linenum + 1 < clean_lines.NumLines(): |
+ next_line = raw[linenum + 1] |
+ if (next_line |
+ and Match(r'\s*}', next_line) |
+ and next_line.find('namespace') == -1 |
+ and next_line.find('} else ') == -1): |
+ error(filename, linenum, 'whitespace/blank_line', 3, |
+ 'Blank line at the end of a code block. Is this needed?') |
+ |
+ # Next, we complain if there's a comment too near the text |
+ commentpos = line.find('//') |
+ if commentpos != -1: |
+ # Check if the // may be in quotes. If so, ignore it |
+ if (line.count('"', 0, commentpos) - |
+ line.count('\\"', 0, commentpos)) % 2 == 0: # not in quotes |
+ # Allow one space for new scopes, two spaces otherwise: |
+ if (not Match(r'^\s*{ //', line) and |
+ ((commentpos >= 1 and |
+ line[commentpos-1] not in string.whitespace) or |
+ (commentpos >= 2 and |
+ line[commentpos-2] not in string.whitespace))): |
+ error(filename, linenum, 'whitespace/comments', 2, |
+ 'At least two spaces is best between code and comments') |
+ # There should always be a space between the // and the comment |
+ commentend = commentpos + 2 |
+ if commentend < len(line) and not line[commentend] == ' ': |
+ # but some lines are exceptions -- e.g. if they're big |
+ # comment delimiters like: |
+ # //---------------------------------------------------------- |
+ match = Search(r'[=/-]{4,}\s*$', line[commentend:]) |
+ if not match: |
+ error(filename, linenum, 'whitespace/comments', 4, |
+ 'Should have a space between // and comment') |
+ CheckComment(line[commentpos:], filename, linenum, error) |
+ |
+ line = clean_lines.elided[linenum] # get rid of comments and strings |
+ |
+ # Don't try to do spacing checks for operator methods |
+ line = re.sub(r'operator(==|!=|<|<<|<=|>=|>>|>)\(', 'operator\(', line) |
+ |
+ # We allow no-spaces around = within an if: "if ( (a=Foo()) == 0 )". |
+ # Otherwise not. Note we only check for non-spaces on *both* sides; |
+ # sometimes people put non-spaces on one side when aligning ='s among |
+ # many lines (not that this is behavior that I approve of...) |
+ if Search(r'[\w.]=[\w.]', line) and not Search(r'\b(if|while) ', line): |
+ error(filename, linenum, 'whitespace/operators', 4, |
+ 'Missing spaces around =') |
+ |
+ # It's ok not to have spaces around binary operators like + - * /, but if |
+ # there's too little whitespace, we get concerned. It's hard to tell, |
+ # though, so we punt on this one for now. TODO. |
+ |
+ # You should always have whitespace around binary operators. |
+ # Alas, we can't test < or > because they're legitimately used sans spaces |
+ # (a->b, vector<int> a). The only time we can tell is a < with no >, and |
+ # only if it's not template params list spilling into the next line. |
+ match = Search(r'[^<>=!\s](==|!=|<=|>=)[^<>=!\s]', line) |
+ if not match: |
+ # Note that while it seems that the '<[^<]*' term in the following |
+ # regexp could be simplified to '<.*', which would indeed match |
+ # the same class of strings, the [^<] means that searching for the |
+ # regexp takes linear rather than quadratic time. |
+ if not Search(r'<[^<]*,\s*$', line): # template params spill |
+ match = Search(r'[^<>=!\s](<)[^<>=!\s]([^>]|->)*$', line) |
+ if match: |
+ error(filename, linenum, 'whitespace/operators', 3, |
+ 'Missing spaces around %s' % match.group(1)) |
+ # We allow no-spaces around << and >> when used like this: 10<<20, but |
+ # not otherwise (particularly, not when used as streams) |
+ match = Search(r'[^0-9\s](<<|>>)[^0-9\s]', line) |
+ if match: |
+ error(filename, linenum, 'whitespace/operators', 3, |
+ 'Missing spaces around %s' % match.group(1)) |
+ |
+ # There shouldn't be space around unary operators |
+ match = Search(r'(!\s|~\s|[\s]--[\s;]|[\s]\+\+[\s;])', line) |
+ if match: |
+ error(filename, linenum, 'whitespace/operators', 4, |
+ 'Extra space for operator %s' % match.group(1)) |
+ |
+ # A pet peeve of mine: no spaces after an if, while, switch, or for |
+ match = Search(r' (if\(|for\(|while\(|switch\()', line) |
+ if match: |
+ error(filename, linenum, 'whitespace/parens', 5, |
+ 'Missing space before ( in %s' % match.group(1)) |
+ |
+ # For if/for/while/switch, the left and right parens should be |
+ # consistent about how many spaces are inside the parens, and |
+ # there should either be zero or one spaces inside the parens. |
+ # We don't want: "if ( foo)" or "if ( foo )". |
+ # Exception: "for ( ; foo; bar)" is allowed. |
+ match = Search(r'\b(if|for|while|switch)\s*' |
+ r'\(([ ]*)(.).*[^ ]+([ ]*)\)\s*{\s*$', |
+ line) |
+ if match: |
+ if len(match.group(2)) != len(match.group(4)): |
+ if not (match.group(3) == ';' and |
+ len(match.group(2)) == 1 + len(match.group(4))): |
+ error(filename, linenum, 'whitespace/parens', 5, |
+ 'Mismatching spaces inside () in %s' % match.group(1)) |
+ if not len(match.group(2)) in [0, 1]: |
+ error(filename, linenum, 'whitespace/parens', 5, |
+ 'Should have zero or one spaces inside ( and ) in %s' % |
+ match.group(1)) |
+ |
+ # You should always have a space after a comma (either as fn arg or operator) |
+ if Search(r',[^\s]', line): |
+ error(filename, linenum, 'whitespace/comma', 3, |
+ 'Missing space after ,') |
+ |
+ # Next we will look for issues with function calls. |
+ CheckSpacingForFunctionCall(filename, line, linenum, error) |
+ |
+ # Except after an opening paren, you should have spaces before your braces. |
+ # And since you should never have braces at the beginning of a line, this is |
+ # an easy test. |
+ if Search(r'[^ (]{', line): |
+ error(filename, linenum, 'whitespace/braces', 5, |
+ 'Missing space before {') |
+ |
+ # Make sure '} else {' has spaces. |
+ if Search(r'}else', line): |
+ error(filename, linenum, 'whitespace/braces', 5, |
+ 'Missing space before else') |
+ |
+ # You shouldn't have spaces before your brackets, except maybe after |
+ # 'delete []' or 'new char * []'. |
+ if Search(r'\w\s+\[', line) and not Search(r'delete\s+\[', line): |
+ error(filename, linenum, 'whitespace/braces', 5, |
+ 'Extra space before [') |
+ |
+ # You shouldn't have a space before a semicolon at the end of the line. |
+ # There's a special case for "for" since the style guide allows space before |
+ # the semicolon there. |
+ if Search(r':\s*;\s*$', line): |
+ error(filename, linenum, 'whitespace/semicolon', 5, |
+ 'Semicolon defining empty statement. Use { } instead.') |
+ elif Search(r'^\s*;\s*$', line): |
+ error(filename, linenum, 'whitespace/semicolon', 5, |
+ 'Line contains only semicolon. If this should be an empty statement, ' |
+ 'use { } instead.') |
+ elif (Search(r'\s+;\s*$', line) and |
+ not Search(r'\bfor\b', line)): |
+ error(filename, linenum, 'whitespace/semicolon', 5, |
+ 'Extra space before last semicolon. If this should be an empty ' |
+ 'statement, use { } instead.') |
+ |
+ |
+def GetPreviousNonBlankLine(clean_lines, linenum): |
+ """Return the most recent non-blank line and its line number. |
+ |
+ Args: |
+ clean_lines: A CleansedLines instance containing the file contents. |
+ linenum: The number of the line to check. |
+ |
+ Returns: |
+ A tuple with two elements. The first element is the contents of the last |
+ non-blank line before the current line, or the empty string if this is the |
+ first non-blank line. The second is the line number of that line, or -1 |
+ if this is the first non-blank line. |
+ """ |
+ |
+ prevlinenum = linenum - 1 |
+ while prevlinenum >= 0: |
+ prevline = clean_lines.elided[prevlinenum] |
+ if not IsBlankLine(prevline): # if not a blank line... |
+ return (prevline, prevlinenum) |
+ prevlinenum -= 1 |
+ return ('', -1) |
+ |
+ |
+def CheckBraces(filename, clean_lines, linenum, error): |
+ """Looks for misplaced braces (e.g. at the end of line). |
+ |
+ Args: |
+ filename: The name of the current file. |
+ clean_lines: A CleansedLines instance containing the file. |
+ linenum: The number of the line to check. |
+ error: The function to call with any errors found. |
+ """ |
+ |
+ line = clean_lines.elided[linenum] # get rid of comments and strings |
+ |
+ if Match(r'\s*{\s*$', line): |
+ # We allow an open brace to start a line in the case where someone |
+ # is using braces in a block to explicitly create a new scope, |
+ # which is commonly used to control the lifetime of |
+ # stack-allocated variables. We don't detect this perfectly: we |
+ # just don't complain if the last non-whitespace character on the |
+ # previous non-blank line is ';', ':', '{', or '}'. |
+ prevline = GetPreviousNonBlankLine(clean_lines, linenum)[0] |
+ if not Search(r'[;:}{]\s*$', prevline): |
+ error(filename, linenum, 'whitespace/braces', 4, |
+ '{ should almost always be at the end of the previous line') |
+ |
+ # An else clause should be on the same line as the preceding closing brace. |
+ if Match(r'\s*else\s*', line): |
+ prevline = GetPreviousNonBlankLine(clean_lines, linenum)[0] |
+ if Match(r'\s*}\s*$', prevline): |
+ error(filename, linenum, 'whitespace/newline', 4, |
+ 'An else should appear on the same line as the preceding }') |
+ |
+ # If braces come on one side of an else, they should be on both. |
+ # However, we have to worry about "else if" that spans multiple lines! |
+ if Search(r'}\s*else[^{]*$', line) or Match(r'[^}]*else\s*{', line): |
+ if Search(r'}\s*else if([^{]*)$', line): # could be multi-line if |
+ # find the ( after the if |
+ pos = line.find('else if') |
+ pos = line.find('(', pos) |
+ if pos > 0: |
+ (endline, _, endpos) = CloseExpression(clean_lines, linenum, pos) |
+ if endline[endpos:].find('{') == -1: # must be brace after if |
+ error(filename, linenum, 'readability/braces', 5, |
+ 'If an else has a brace on one side, it should have it on both') |
+ else: # common case: else not followed by a multi-line if |
+ error(filename, linenum, 'readability/braces', 5, |
+ 'If an else has a brace on one side, it should have it on both') |
+ |
+ # Likewise, an else should never have the else clause on the same line |
+ if Search(r'\belse [^\s{]', line) and not Search(r'\belse if\b', line): |
+ error(filename, linenum, 'whitespace/newline', 4, |
+ 'Else clause should never be on same line as else (use 2 lines)') |
+ |
+ # In the same way, a do/while should never be on one line |
+ if Match(r'\s*do [^\s{]', line): |
+ error(filename, linenum, 'whitespace/newline', 4, |
+ 'do/while clauses should not be on a single line') |
+ |
+ # Braces shouldn't be followed by a ; unless they're defining a struct |
+ # or initializing an array. |
+ # We can't tell in general, but we can for some common cases. |
+ prevlinenum = linenum |
+ while True: |
+ (prevline, prevlinenum) = GetPreviousNonBlankLine(clean_lines, prevlinenum) |
+ if Match(r'\s+{.*}\s*;', line) and not prevline.count(';'): |
+ line = prevline + line |
+ else: |
+ break |
+ if (Search(r'{.*}\s*;', line) and |
+ line.count('{') == line.count('}') and |
+ not Search(r'struct|class|enum|\s*=\s*{', line)): |
+ error(filename, linenum, 'readability/braces', 4, |
+ "You don't need a ; after a }") |
+ |
+ |
+def ReplaceableCheck(operator, macro, line): |
+ """Determine whether a basic CHECK can be replaced with a more specific one. |
+ |
+ For example suggest using CHECK_EQ instead of CHECK(a == b) and |
+ similarly for CHECK_GE, CHECK_GT, CHECK_LE, CHECK_LT, CHECK_NE. |
+ |
+ Args: |
+ operator: The C++ operator used in the CHECK. |
+ macro: The CHECK or EXPECT macro being called. |
+ line: The current source line. |
+ |
+ Returns: |
+ True if the CHECK can be replaced with a more specific one. |
+ """ |
+ |
+ # This matches decimal and hex integers, strings, and chars (in that order). |
+ match_constant = r'([-+]?(\d+|0[xX][0-9a-fA-F]+)[lLuU]{0,3}|".*"|\'.*\')' |
+ |
+ # Expression to match two sides of the operator with something that |
+ # looks like a literal, since CHECK(x == iterator) won't compile. |
+ # This means we can't catch all the cases where a more specific |
+ # CHECK is possible, but it's less annoying than dealing with |
+ # extraneous warnings. |
+ match_this = (r'\s*' + macro + r'\((\s*' + |
+ match_constant + r'\s*' + operator + r'[^<>].*|' |
+ r'.*[^<>]' + operator + r'\s*' + match_constant + |
+ r'\s*\))') |
+ |
+ # Don't complain about CHECK(x == NULL) or similar because |
+ # CHECK_EQ(x, NULL) won't compile (requires a cast). |
+ # Also, don't complain about more complex boolean expressions |
+ # involving && or || such as CHECK(a == b || c == d). |
+ return Match(match_this, line) and not Search(r'NULL|&&|\|\|', line) |
+ |
+ |
+def CheckCheck(filename, clean_lines, linenum, error): |
+ """Checks the use of CHECK and EXPECT macros. |
+ |
+ Args: |
+ filename: The name of the current file. |
+ clean_lines: A CleansedLines instance containing the file. |
+ linenum: The number of the line to check. |
+ error: The function to call with any errors found. |
+ """ |
+ |
+ # Decide the set of replacement macros that should be suggested |
+ raw_lines = clean_lines.raw_lines |
+ current_macro = '' |
+ for macro in _CHECK_MACROS: |
+ if raw_lines[linenum].find(macro) >= 0: |
+ current_macro = macro |
+ break |
+ if not current_macro: |
+ # Don't waste time here if line doesn't contain 'CHECK' or 'EXPECT' |
+ return |
+ |
+ line = clean_lines.elided[linenum] # get rid of comments and strings |
+ |
+ # Encourage replacing plain CHECKs with CHECK_EQ/CHECK_NE/etc. |
+ for operator in ['==', '!=', '>=', '>', '<=', '<']: |
+ if ReplaceableCheck(operator, current_macro, line): |
+ error(filename, linenum, 'readability/check', 2, |
+ 'Consider using %s instead of %s(a %s b)' % ( |
+ _CHECK_REPLACEMENT[current_macro][operator], |
+ current_macro, operator)) |
+ break |
+ |
+ |
+def GetLineWidth(line): |
+ """Determines the width of the line in column positions. |
+ |
+ Args: |
+ line: A string, which may be a Unicode string. |
+ |
+ Returns: |
+ The width of the line in column positions, accounting for Unicode |
+ combining characters and wide characters. |
+ """ |
+ if isinstance(line, unicode): |
+ width = 0 |
+ for c in unicodedata.normalize('NFC', line): |
+ if unicodedata.east_asian_width(c) in ('W', 'F'): |
+ width += 2 |
+ elif not unicodedata.combining(c): |
+ width += 1 |
+ return width |
+ else: |
+ return len(line) |
+ |
+ |
+def CheckStyle(filename, clean_lines, linenum, file_extension, error): |
+ """Checks rules from the 'C++ style rules' section of cppguide.html. |
+ |
+ Most of these rules are hard to test (naming, comment style), but we |
+ do what we can. In particular we check for 2-space indents, line lengths, |
+ tab usage, spaces inside code, etc. |
+ |
+ Args: |
+ filename: The name of the current file. |
+ clean_lines: A CleansedLines instance containing the file. |
+ linenum: The number of the line to check. |
+ file_extension: The extension (without the dot) of the filename. |
+ error: The function to call with any errors found. |
+ """ |
+ |
+ raw_lines = clean_lines.raw_lines |
+ line = raw_lines[linenum] |
+ |
+ if line.find('\t') != -1: |
+ error(filename, linenum, 'whitespace/tab', 1, |
+ 'Tab found; better to use spaces') |
+ |
+ # One or three blank spaces at the beginning of the line is weird; it's |
+ # hard to reconcile that with 2-space indents. |
+ # NOTE: here are the conditions rob pike used for his tests. Mine aren't |
+ # as sophisticated, but it may be worth becoming so: RLENGTH==initial_spaces |
+ # if(RLENGTH > 20) complain = 0; |
+ # if(match($0, " +(error|private|public|protected):")) complain = 0; |
+ # if(match(prev, "&& *$")) complain = 0; |
+ # if(match(prev, "\\|\\| *$")) complain = 0; |
+ # if(match(prev, "[\",=><] *$")) complain = 0; |
+ # if(match($0, " <<")) complain = 0; |
+ # if(match(prev, " +for \\(")) complain = 0; |
+ # if(prevodd && match(prevprev, " +for \\(")) complain = 0; |
+ initial_spaces = 0 |
+ cleansed_line = clean_lines.elided[linenum] |
+ while initial_spaces < len(line) and line[initial_spaces] == ' ': |
+ initial_spaces += 1 |
+ if line and line[-1].isspace(): |
+ error(filename, linenum, 'whitespace/end_of_line', 4, |
+ 'Line ends in whitespace. Consider deleting these extra spaces.') |
+ # There are certain situations we allow one space, notably for labels |
+ elif ((initial_spaces == 1 or initial_spaces == 3) and |
+ not Match(r'\s*\w+\s*:\s*$', cleansed_line)): |
+ error(filename, linenum, 'whitespace/indent', 3, |
+ 'Weird number of spaces at line-start. ' |
+ 'Are you using a 2-space indent?') |
+ # Labels should always be indented at least one space. |
+ elif not initial_spaces and line[:2] != '//' and Search(r'[^:]:\s*$', |
+ line): |
+ error(filename, linenum, 'whitespace/labels', 4, |
+ 'Labels should always be indented at least one space. ' |
+ 'If this is a member-initializer list in a constructor, ' |
+ 'the colon should be on the line after the definition header.') |
+ |
+ # Check if the line is a header guard. |
+ is_header_guard = False |
+ if file_extension == 'h': |
+ cppvar = GetHeaderGuardCPPVariable(filename) |
+ if (line.startswith('#ifndef %s' % cppvar) or |
+ line.startswith('#define %s' % cppvar) or |
+ line.startswith('#endif // %s' % cppvar)): |
+ is_header_guard = True |
+ # #include lines and header guards can be long, since there's no clean way to |
+ # split them. |
+ if not line.startswith('#include') and not is_header_guard: |
+ line_width = GetLineWidth(line) |
+ if line_width > 100: |
+ error(filename, linenum, 'whitespace/line_length', 4, |
+ 'Lines should very rarely be longer than 100 characters') |
+ elif line_width > 80: |
+ error(filename, linenum, 'whitespace/line_length', 2, |
+ 'Lines should be <= 80 characters long') |
+ |
+ if (cleansed_line.count(';') > 1 and |
+ # for loops are allowed two ;'s (and may run over two lines). |
+ cleansed_line.find('for') == -1 and |
+ (GetPreviousNonBlankLine(clean_lines, linenum)[0].find('for') == -1 or |
+ GetPreviousNonBlankLine(clean_lines, linenum)[0].find(';') != -1) and |
+ # It's ok to have many commands in a switch case that fits in 1 line |
+ not ((cleansed_line.find('case ') != -1 or |
+ cleansed_line.find('default:') != -1) and |
+ cleansed_line.find('break;') != -1)): |
+ error(filename, linenum, 'whitespace/newline', 4, |
+ 'More than one command on the same line') |
+ |
+ # Some more style checks |
+ CheckBraces(filename, clean_lines, linenum, error) |
+ CheckSpacing(filename, clean_lines, linenum, error) |
+ CheckCheck(filename, clean_lines, linenum, error) |
+ |
+ |
+_RE_PATTERN_INCLUDE_NEW_STYLE = re.compile(r'#include +"[^/]+\.h"') |
+_RE_PATTERN_INCLUDE = re.compile(r'^\s*#\s*include\s*([<"])([^>"]*)[>"].*$') |
+# Matches the first component of a filename delimited by -s and _s. That is: |
+# _RE_FIRST_COMPONENT.match('foo').group(0) == 'foo' |
+# _RE_FIRST_COMPONENT.match('foo.cc').group(0) == 'foo' |
+# _RE_FIRST_COMPONENT.match('foo-bar_baz.cc').group(0) == 'foo' |
+# _RE_FIRST_COMPONENT.match('foo_bar-baz.cc').group(0) == 'foo' |
+_RE_FIRST_COMPONENT = re.compile(r'^[^-_.]+') |
+ |
+ |
+def _DropCommonSuffixes(filename): |
+ """Drops common suffixes like _test.cc or -inl.h from filename. |
+ |
+ For example: |
+ >>> _DropCommonSuffixes('foo/foo-inl.h') |
+ 'foo/foo' |
+ >>> _DropCommonSuffixes('foo/bar/foo.cc') |
+ 'foo/bar/foo' |
+ >>> _DropCommonSuffixes('foo/foo_internal.h') |
+ 'foo/foo' |
+ >>> _DropCommonSuffixes('foo/foo_unusualinternal.h') |
+ 'foo/foo_unusualinternal' |
+ |
+ Args: |
+ filename: The input filename. |
+ |
+ Returns: |
+ The filename with the common suffix removed. |
+ """ |
+ for suffix in ('test.cc', 'regtest.cc', 'unittest.cc', |
+ 'inl.h', 'impl.h', 'internal.h'): |
+ if (filename.endswith(suffix) and len(filename) > len(suffix) and |
+ filename[-len(suffix) - 1] in ('-', '_')): |
+ return filename[:-len(suffix) - 1] |
+ return os.path.splitext(filename)[0] |
+ |
+ |
+def _IsTestFilename(filename): |
+ """Determines if the given filename has a suffix that identifies it as a test. |
+ |
+ Args: |
+ filename: The input filename. |
+ |
+ Returns: |
+ True if 'filename' looks like a test, False otherwise. |
+ """ |
+ if (filename.endswith('_test.cc') or |
+ filename.endswith('_unittest.cc') or |
+ filename.endswith('_regtest.cc')): |
+ return True |
+ else: |
+ return False |
+ |
+ |
+def _ClassifyInclude(fileinfo, include, is_system): |
+ """Figures out what kind of header 'include' is. |
+ |
+ Args: |
+ fileinfo: The current file cpplint is running over. A FileInfo instance. |
+ include: The path to a #included file. |
+ is_system: True if the #include used <> rather than "". |
+ |
+ Returns: |
+ One of the _XXX_HEADER constants. |
+ |
+ For example: |
+ >>> _ClassifyInclude(FileInfo('foo/foo.cc'), 'stdio.h', True) |
+ _C_SYS_HEADER |
+ >>> _ClassifyInclude(FileInfo('foo/foo.cc'), 'string', True) |
+ _CPP_SYS_HEADER |
+ >>> _ClassifyInclude(FileInfo('foo/foo.cc'), 'foo/foo.h', False) |
+ _LIKELY_MY_HEADER |
+ >>> _ClassifyInclude(FileInfo('foo/foo_unknown_extension.cc'), |
+ ... 'bar/foo_other_ext.h', False) |
+ _POSSIBLE_MY_HEADER |
+ >>> _ClassifyInclude(FileInfo('foo/foo.cc'), 'foo/bar.h', False) |
+ _OTHER_HEADER |
+ """ |
+ # This is a list of all standard c++ header files, except |
+ # those already checked for above. |
+ is_stl_h = include in _STL_HEADERS |
+ is_cpp_h = is_stl_h or include in _CPP_HEADERS |
+ |
+ if is_system: |
+ if is_cpp_h: |
+ return _CPP_SYS_HEADER |
+ else: |
+ return _C_SYS_HEADER |
+ |
+ # If the target file and the include we're checking share a |
+ # basename when we drop common extensions, and the include |
+ # lives in . , then it's likely to be owned by the target file. |
+ target_dir, target_base = ( |
+ os.path.split(_DropCommonSuffixes(fileinfo.RepositoryName()))) |
+ include_dir, include_base = os.path.split(_DropCommonSuffixes(include)) |
+ if target_base == include_base and ( |
+ include_dir == target_dir or |
+ include_dir == os.path.normpath(target_dir + '/../public')): |
+ return _LIKELY_MY_HEADER |
+ |
+ # If the target and include share some initial basename |
+ # component, it's possible the target is implementing the |
+ # include, so it's allowed to be first, but we'll never |
+ # complain if it's not there. |
+ target_first_component = _RE_FIRST_COMPONENT.match(target_base) |
+ include_first_component = _RE_FIRST_COMPONENT.match(include_base) |
+ if (target_first_component and include_first_component and |
+ target_first_component.group(0) == |
+ include_first_component.group(0)): |
+ return _POSSIBLE_MY_HEADER |
+ |
+ return _OTHER_HEADER |
+ |
+ |
+def CheckLanguage(filename, clean_lines, linenum, file_extension, include_state, |
+ error): |
+ """Checks rules from the 'C++ language rules' section of cppguide.html. |
+ |
+ Some of these rules are hard to test (function overloading, using |
+ uint32 inappropriately), but we do the best we can. |
+ |
+ Args: |
+ filename: The name of the current file. |
+ clean_lines: A CleansedLines instance containing the file. |
+ linenum: The number of the line to check. |
+ file_extension: The extension (without the dot) of the filename. |
+ include_state: An _IncludeState instance in which the headers are inserted. |
+ error: The function to call with any errors found. |
+ """ |
+ fileinfo = FileInfo(filename) |
+ |
+ # get rid of comments |
+ comment_elided_line = clean_lines.lines[linenum] |
+ |
+ # "include" should use the new style "foo/bar.h" instead of just "bar.h" |
+ if _RE_PATTERN_INCLUDE_NEW_STYLE.search(comment_elided_line): |
+ error(filename, linenum, 'build/include', 4, |
+ 'Include the directory when naming .h files') |
+ |
+ # we shouldn't include a file more than once. actually, there are a |
+ # handful of instances where doing so is okay, but in general it's |
+ # not. |
+ match = _RE_PATTERN_INCLUDE.search(comment_elided_line) |
+ if match: |
+ include = match.group(2) |
+ is_system = (match.group(1) == '<') |
+ if include in include_state: |
+ error(filename, linenum, 'build/include', 4, |
+ '"%s" already included at %s:%s' % |
+ (include, filename, include_state[include])) |
+ else: |
+ include_state[include] = linenum |
+ |
+ # We want to ensure that headers appear in the right order: |
+ # 1) for foo.cc, foo.h (preferred location) |
+ # 2) c system files |
+ # 3) cpp system files |
+ # 4) for foo.cc, foo.h (deprecated location) |
+ # 5) other google headers |
+ # |
+ # We classify each include statement as one of those 5 types |
+ # using a number of techniques. The include_state object keeps |
+ # track of the highest type seen, and complains if we see a |
+ # lower type after that. |
+ error_message = include_state.CheckNextIncludeOrder( |
+ _ClassifyInclude(fileinfo, include, is_system)) |
+ if error_message: |
+ error(filename, linenum, 'build/include_order', 4, |
+ '%s. Should be: %s.h, c system, c++ system, other.' % |
+ (error_message, fileinfo.BaseName())) |
+ |
+ # If the line is empty or consists of entirely a comment, no need to |
+ # check it. |
+ line = clean_lines.elided[linenum] |
+ if not line: |
+ return |
+ |
+ # Create an extended_line, which is the concatenation of the current and |
+ # next lines, for more effective checking of code that may span more than one |
+ # line. |
+ if linenum + 1 < clean_lines.NumLines(): |
+ extended_line = line + clean_lines.elided[linenum + 1] |
+ else: |
+ extended_line = line |
+ |
+ # Make Windows paths like Unix. |
+ fullname = os.path.abspath(filename).replace('\\', '/') |
+ |
+ # TODO(unknown): figure out if they're using default arguments in fn proto. |
+ |
+ # Look for any of the stream classes that are part of standard C++. |
+ match = _RE_PATTERN_INCLUDE.match(line) |
+ if match: |
+ include = match.group(2) |
+ if Match(r'(f|ind|io|i|o|parse|pf|stdio|str|)?stream$', include): |
+ # Many unit tests use cout, so we exempt them. |
+ if not _IsTestFilename(filename): |
+ error(filename, linenum, 'readability/streams', 3, |
+ 'Streams are highly discouraged.') |
+ |
+ # Check for non-const references in functions. This is tricky because & |
+ # is also used to take the address of something. We allow <> for templates, |
+ # (ignoring whatever is between the braces) and : for classes. |
+ # These are complicated re's. They try to capture the following: |
+ # paren (for fn-prototype start), typename, &, varname. For the const |
+ # version, we're willing for const to be before typename or after |
+ # Don't check the implemention on same line. |
+ fnline = line.split('{', 1)[0] |
+ if (len(re.findall(r'\([^()]*\b(?:[\w:]|<[^()]*>)+(\s?&|&\s?)\w+', fnline)) > |
+ len(re.findall(r'\([^()]*\bconst\s+(?:typename\s+)?(?:struct\s+)?' |
+ r'(?:[\w:]|<[^()]*>)+(\s?&|&\s?)\w+', fnline)) + |
+ len(re.findall(r'\([^()]*\b(?:[\w:]|<[^()]*>)+\s+const(\s?&|&\s?)[\w]+', |
+ fnline))): |
+ |
+ # We allow non-const references in a few standard places, like functions |
+ # called "swap()" or iostream operators like "<<" or ">>". |
+ if not Search( |
+ r'(swap|Swap|operator[<>][<>])\s*\(\s*(?:[\w:]|<.*>)+\s*&', |
+ fnline): |
+ error(filename, linenum, 'runtime/references', 2, |
+ 'Is this a non-const reference? ' |
+ 'If so, make const or use a pointer.') |
+ |
+ # Check to see if they're using an conversion function cast. |
+ # I just try to capture the most common basic types, though there are more. |
+ # Parameterless conversion functions, such as bool(), are allowed as they are |
+ # probably a member operator declaration or default constructor. |
+ match = Search( |
+ r'\b(int|float|double|bool|char|int32|uint32|int64|uint64)\([^)]', line) |
+ if match: |
+ # gMock methods are defined using some variant of MOCK_METHODx(name, type) |
+ # where type may be float(), int(string), etc. Without context they are |
+ # virtually indistinguishable from int(x) casts. |
+ if not Match(r'^\s*MOCK_(CONST_)?METHOD\d+(_T)?\(', line): |
+ error(filename, linenum, 'readability/casting', 4, |
+ 'Using deprecated casting style. ' |
+ 'Use static_cast<%s>(...) instead' % |
+ match.group(1)) |
+ |
+ CheckCStyleCast(filename, linenum, line, clean_lines.raw_lines[linenum], |
+ 'static_cast', |
+ r'\((int|float|double|bool|char|u?int(16|32|64))\)', |
+ error) |
+ # This doesn't catch all cases. Consider (const char * const)"hello". |
+ CheckCStyleCast(filename, linenum, line, clean_lines.raw_lines[linenum], |
+ 'reinterpret_cast', r'\((\w+\s?\*+\s?)\)', error) |
+ |
+ # In addition, we look for people taking the address of a cast. This |
+ # is dangerous -- casts can assign to temporaries, so the pointer doesn't |
+ # point where you think. |
+ if Search( |
+ r'(&\([^)]+\)[\w(])|(&(static|dynamic|reinterpret)_cast\b)', line): |
+ error(filename, linenum, 'runtime/casting', 4, |
+ ('Are you taking an address of a cast? ' |
+ 'This is dangerous: could be a temp var. ' |
+ 'Take the address before doing the cast, rather than after')) |
+ |
+ # Check for people declaring static/global STL strings at the top level. |
+ # This is dangerous because the C++ language does not guarantee that |
+ # globals with constructors are initialized before the first access. |
+ match = Match( |
+ r'((?:|static +)(?:|const +))string +([a-zA-Z0-9_:]+)\b(.*)', |
+ line) |
+ # Make sure it's not a function. |
+ # Function template specialization looks like: "string foo<Type>(...". |
+ # Class template definitions look like: "string Foo<Type>::Method(...". |
+ if match and not Match(r'\s*(<.*>)?(::[a-zA-Z0-9_]+)?\s*\(([^"]|$)', |
+ match.group(3)): |
+ error(filename, linenum, 'runtime/string', 4, |
+ 'For a static/global string constant, use a C style string instead: ' |
+ '"%schar %s[]".' % |
+ (match.group(1), match.group(2))) |
+ |
+ # Check that we're not using RTTI outside of testing code. |
+ if Search(r'\bdynamic_cast<', line) and not _IsTestFilename(filename): |
+ error(filename, linenum, 'runtime/rtti', 5, |
+ 'Do not use dynamic_cast<>. If you need to cast within a class ' |
+ "hierarchy, use static_cast<> to upcast. Google doesn't support " |
+ 'RTTI.') |
+ |
+ if Search(r'\b([A-Za-z0-9_]*_)\(\1\)', line): |
+ error(filename, linenum, 'runtime/init', 4, |
+ 'You seem to be initializing a member variable with itself.') |
+ |
+ if file_extension == 'h': |
+ # TODO(unknown): check that 1-arg constructors are explicit. |
+ # How to tell it's a constructor? |
+ # (handled in CheckForNonStandardConstructs for now) |
+ # TODO(unknown): check that classes have DISALLOW_EVIL_CONSTRUCTORS |
+ # (level 1 error) |
+ pass |
+ |
+ # Check if people are using the verboten C basic types. The only exception |
+ # we regularly allow is "unsigned short port" for port. |
+ if Search(r'\bshort port\b', line): |
+ if not Search(r'\bunsigned short port\b', line): |
+ error(filename, linenum, 'runtime/int', 4, |
+ 'Use "unsigned short" for ports, not "short"') |
+ else: |
+ match = Search(r'\b(short|long(?! +double)|long long)\b', line) |
+ if match: |
+ error(filename, linenum, 'runtime/int', 4, |
+ 'Use int16/int64/etc, rather than the C type %s' % match.group(1)) |
+ |
+ # When snprintf is used, the second argument shouldn't be a literal. |
+ match = Search(r'snprintf\s*\(([^,]*),\s*([0-9]*)\s*,', line) |
+ if match: |
+ error(filename, linenum, 'runtime/printf', 3, |
+ 'If you can, use sizeof(%s) instead of %s as the 2nd arg ' |
+ 'to snprintf.' % (match.group(1), match.group(2))) |
+ |
+ # Check if some verboten C functions are being used. |
+ if Search(r'\bsprintf\b', line): |
+ error(filename, linenum, 'runtime/printf', 5, |
+ 'Never use sprintf. Use snprintf instead.') |
+ match = Search(r'\b(strcpy|strcat)\b', line) |
+ if match: |
+ error(filename, linenum, 'runtime/printf', 4, |
+ 'Almost always, snprintf is better than %s' % match.group(1)) |
+ |
+ if Search(r'\bsscanf\b', line): |
+ error(filename, linenum, 'runtime/printf', 1, |
+ 'sscanf can be ok, but is slow and can overflow buffers.') |
+ |
+ # Check for suspicious usage of "if" like |
+ # } if (a == b) { |
+ if Search(r'\}\s*if\s*\(', line): |
+ error(filename, linenum, 'readability/braces', 4, |
+ 'Did you mean "else if"? If not, start a new line for "if".') |
+ |
+ # Check for potential format string bugs like printf(foo). |
+ # We constrain the pattern not to pick things like DocidForPrintf(foo). |
+ # Not perfect but it can catch printf(foo.c_str()) and printf(foo->c_str()) |
+ match = re.search(r'\b((?:string)?printf)\s*\(([\w.\->()]+)\)', line, re.I) |
+ if match: |
+ error(filename, linenum, 'runtime/printf', 4, |
+ 'Potential format string bug. Do %s("%%s", %s) instead.' |
+ % (match.group(1), match.group(2))) |
+ |
+ # Check for potential memset bugs like memset(buf, sizeof(buf), 0). |
+ match = Search(r'memset\s*\(([^,]*),\s*([^,]*),\s*0\s*\)', line) |
+ if match and not Match(r"^''|-?[0-9]+|0x[0-9A-Fa-f]$", match.group(2)): |
+ error(filename, linenum, 'runtime/memset', 4, |
+ 'Did you mean "memset(%s, 0, %s)"?' |
+ % (match.group(1), match.group(2))) |
+ |
+ if Search(r'\busing namespace\b', line): |
+ error(filename, linenum, 'build/namespaces', 5, |
+ 'Do not use namespace using-directives. ' |
+ 'Use using-declarations instead.') |
+ |
+ # Detect variable-length arrays. |
+ match = Match(r'\s*(.+::)?(\w+) [a-z]\w*\[(.+)];', line) |
+ if (match and match.group(2) != 'return' and match.group(2) != 'delete' and |
+ match.group(3).find(']') == -1): |
+ # Split the size using space and arithmetic operators as delimiters. |
+ # If any of the resulting tokens are not compile time constants then |
+ # report the error. |
+ tokens = re.split(r'\s|\+|\-|\*|\/|<<|>>]', match.group(3)) |
+ is_const = True |
+ skip_next = False |
+ for tok in tokens: |
+ if skip_next: |
+ skip_next = False |
+ continue |
+ |
+ if Search(r'sizeof\(.+\)', tok): continue |
+ if Search(r'arraysize\(\w+\)', tok): continue |
+ |
+ tok = tok.lstrip('(') |
+ tok = tok.rstrip(')') |
+ if not tok: continue |
+ if Match(r'\d+', tok): continue |
+ if Match(r'0[xX][0-9a-fA-F]+', tok): continue |
+ if Match(r'k[A-Z0-9]\w*', tok): continue |
+ if Match(r'(.+::)?k[A-Z0-9]\w*', tok): continue |
+ if Match(r'(.+::)?[A-Z][A-Z0-9_]*', tok): continue |
+ # A catch all for tricky sizeof cases, including 'sizeof expression', |
+ # 'sizeof(*type)', 'sizeof(const type)', 'sizeof(struct StructName)' |
+ # requires skipping the next token becasue we split on ' ' and '*'. |
+ if tok.startswith('sizeof'): |
+ skip_next = True |
+ continue |
+ is_const = False |
+ break |
+ if not is_const: |
+ error(filename, linenum, 'runtime/arrays', 1, |
+ 'Do not use variable-length arrays. Use an appropriately named ' |
+ "('k' followed by CamelCase) compile-time constant for the size.") |
+ |
+ # If DISALLOW_EVIL_CONSTRUCTORS, DISALLOW_COPY_AND_ASSIGN, or |
+ # DISALLOW_IMPLICIT_CONSTRUCTORS is present, then it should be the last thing |
+ # in the class declaration. |
+ match = Match( |
+ (r'\s*' |
+ r'(DISALLOW_(EVIL_CONSTRUCTORS|COPY_AND_ASSIGN|IMPLICIT_CONSTRUCTORS))' |
+ r'\(.*\);$'), |
+ line) |
+ if match and linenum + 1 < clean_lines.NumLines(): |
+ next_line = clean_lines.elided[linenum + 1] |
+ if not Search(r'^\s*};', next_line): |
+ error(filename, linenum, 'readability/constructors', 3, |
+ match.group(1) + ' should be the last thing in the class') |
+ |
+ # Check for use of unnamed namespaces in header files. Registration |
+ # macros are typically OK, so we allow use of "namespace {" on lines |
+ # that end with backslashes. |
+ if (file_extension == 'h' |
+ and Search(r'\bnamespace\s*{', line) |
+ and line[-1] != '\\'): |
+ error(filename, linenum, 'build/namespaces', 4, |
+ 'Do not use unnamed namespaces in header files. See ' |
+ 'http://google-styleguide.googlecode.com/svn/trunk/cppguide.xml#Namespaces' |
+ ' for more information.') |
+ |
+ |
+def CheckCStyleCast(filename, linenum, line, raw_line, cast_type, pattern, |
+ error): |
+ """Checks for a C-style cast by looking for the pattern. |
+ |
+ This also handles sizeof(type) warnings, due to similarity of content. |
+ |
+ Args: |
+ filename: The name of the current file. |
+ linenum: The number of the line to check. |
+ line: The line of code to check. |
+ raw_line: The raw line of code to check, with comments. |
+ cast_type: The string for the C++ cast to recommend. This is either |
+ reinterpret_cast or static_cast, depending. |
+ pattern: The regular expression used to find C-style casts. |
+ error: The function to call with any errors found. |
+ """ |
+ match = Search(pattern, line) |
+ if not match: |
+ return |
+ |
+ # e.g., sizeof(int) |
+ sizeof_match = Match(r'.*sizeof\s*$', line[0:match.start(1) - 1]) |
+ if sizeof_match: |
+ error(filename, linenum, 'runtime/sizeof', 1, |
+ 'Using sizeof(type). Use sizeof(varname) instead if possible') |
+ return |
+ |
+ remainder = line[match.end(0):] |
+ |
+ # The close paren is for function pointers as arguments to a function. |
+ # eg, void foo(void (*bar)(int)); |
+ # The semicolon check is a more basic function check; also possibly a |
+ # function pointer typedef. |
+ # eg, void foo(int); or void foo(int) const; |
+ # The equals check is for function pointer assignment. |
+ # eg, void *(*foo)(int) = ... |
+ # |
+ # Right now, this will only catch cases where there's a single argument, and |
+ # it's unnamed. It should probably be expanded to check for multiple |
+ # arguments with some unnamed. |
+ function_match = Match(r'\s*(\)|=|(const)?\s*(;|\{|throw\(\)))', remainder) |
+ if function_match: |
+ if (not function_match.group(3) or |
+ function_match.group(3) == ';' or |
+ raw_line.find('/*') < 0): |
+ error(filename, linenum, 'readability/function', 3, |
+ 'All parameters should be named in a function') |
+ return |
+ |
+ # At this point, all that should be left is actual casts. |
+ error(filename, linenum, 'readability/casting', 4, |
+ 'Using C-style cast. Use %s<%s>(...) instead' % |
+ (cast_type, match.group(1))) |
+ |
+ |
+_HEADERS_CONTAINING_TEMPLATES = ( |
+ ('<deque>', ('deque',)), |
+ ('<functional>', ('unary_function', 'binary_function', |
+ 'plus', 'minus', 'multiplies', 'divides', 'modulus', |
+ 'negate', |
+ 'equal_to', 'not_equal_to', 'greater', 'less', |
+ 'greater_equal', 'less_equal', |
+ 'logical_and', 'logical_or', 'logical_not', |
+ 'unary_negate', 'not1', 'binary_negate', 'not2', |
+ 'bind1st', 'bind2nd', |
+ 'pointer_to_unary_function', |
+ 'pointer_to_binary_function', |
+ 'ptr_fun', |
+ 'mem_fun_t', 'mem_fun', 'mem_fun1_t', 'mem_fun1_ref_t', |
+ 'mem_fun_ref_t', |
+ 'const_mem_fun_t', 'const_mem_fun1_t', |
+ 'const_mem_fun_ref_t', 'const_mem_fun1_ref_t', |
+ 'mem_fun_ref', |
+ )), |
+ ('<limits>', ('numeric_limits',)), |
+ ('<list>', ('list',)), |
+ ('<map>', ('map', 'multimap',)), |
+ ('<memory>', ('allocator',)), |
+ ('<queue>', ('queue', 'priority_queue',)), |
+ ('<set>', ('set', 'multiset',)), |
+ ('<stack>', ('stack',)), |
+ ('<string>', ('char_traits', 'basic_string',)), |
+ ('<utility>', ('pair',)), |
+ ('<vector>', ('vector',)), |
+ |
+ # gcc extensions. |
+ # Note: std::hash is their hash, ::hash is our hash |
+ ('<hash_map>', ('hash_map', 'hash_multimap',)), |
+ ('<hash_set>', ('hash_set', 'hash_multiset',)), |
+ ('<slist>', ('slist',)), |
+ ) |
+ |
+_HEADERS_ACCEPTED_BUT_NOT_PROMOTED = { |
+ # We can trust with reasonable confidence that map gives us pair<>, too. |
+ 'pair<>': ('map', 'multimap', 'hash_map', 'hash_multimap') |
+} |
+ |
+_RE_PATTERN_STRING = re.compile(r'\bstring\b') |
+ |
+_re_pattern_algorithm_header = [] |
+for _template in ('copy', 'max', 'min', 'sort', 'swap'): |
+ # Match max<type>(..., ...), max(..., ...), but not foo->max, foo.max or |
+ # type::max(). |
+ _re_pattern_algorithm_header.append( |
+ (re.compile(r'[^>.]\b' + _template + r'(<.*?>)?\([^\)]'), |
+ _template, |
+ '<algorithm>')) |
+ |
+_re_pattern_templates = [] |
+for _header, _templates in _HEADERS_CONTAINING_TEMPLATES: |
+ for _template in _templates: |
+ _re_pattern_templates.append( |
+ (re.compile(r'(\<|\b)' + _template + r'\s*\<'), |
+ _template + '<>', |
+ _header)) |
+ |
+ |
+def CheckForIncludeWhatYouUse(filename, clean_lines, include_state, error): |
+ """Reports for missing stl includes. |
+ |
+ This function will output warnings to make sure you are including the headers |
+ necessary for the stl containers and functions that you use. We only give one |
+ reason to include a header. For example, if you use both equal_to<> and |
+ less<> in a .h file, only one (the latter in the file) of these will be |
+ reported as a reason to include the <functional>. |
+ |
+ We only check headers. We do not check inside cc-files. .cc files should be |
+ able to depend on their respective header files for includes. However, there |
+ is no simple way of producing this logic here. |
+ |
+ Args: |
+ filename: The name of the current file. |
+ clean_lines: A CleansedLines instance containing the file. |
+ include_state: An _IncludeState instance. |
+ error: The function to call with any errors found. |
+ """ |
+ if filename.endswith('.cc'): |
+ return |
+ |
+ required = {} # A map of header name to linenumber and the template entity. |
+ # Example of required: { '<functional>': (1219, 'less<>') } |
+ |
+ for linenum in xrange(clean_lines.NumLines()): |
+ line = clean_lines.elided[linenum] |
+ if not line or line[0] == '#': |
+ continue |
+ |
+ # String is special -- it is a non-templatized type in STL. |
+ if _RE_PATTERN_STRING.search(line): |
+ required['<string>'] = (linenum, 'string') |
+ |
+ for pattern, template, header in _re_pattern_algorithm_header: |
+ if pattern.search(line): |
+ required[header] = (linenum, template) |
+ |
+ # The following function is just a speed up, no semantics are changed. |
+ if not '<' in line: # Reduces the cpu time usage by skipping lines. |
+ continue |
+ |
+ for pattern, template, header in _re_pattern_templates: |
+ if pattern.search(line): |
+ required[header] = (linenum, template) |
+ |
+ # All the lines have been processed, report the errors found. |
+ for required_header_unstripped in required: |
+ template = required[required_header_unstripped][1] |
+ if template in _HEADERS_ACCEPTED_BUT_NOT_PROMOTED: |
+ headers = _HEADERS_ACCEPTED_BUT_NOT_PROMOTED[template] |
+ if [True for header in headers if header in include_state]: |
+ continue |
+ if required_header_unstripped.strip('<>"') not in include_state: |
+ error(filename, required[required_header_unstripped][0], |
+ 'build/include_what_you_use', 4, |
+ 'Add #include ' + required_header_unstripped + ' for ' + template) |
+ |
+ |
+def ProcessLine(filename, file_extension, |
+ clean_lines, line, include_state, function_state, |
+ class_state, error): |
+ """Processes a single line in the file. |
+ |
+ Args: |
+ filename: Filename of the file that is being processed. |
+ file_extension: The extension (dot not included) of the file. |
+ clean_lines: An array of strings, each representing a line of the file, |
+ with comments stripped. |
+ line: Number of line being processed. |
+ include_state: An _IncludeState instance in which the headers are inserted. |
+ function_state: A _FunctionState instance which counts function lines, etc. |
+ class_state: A _ClassState instance which maintains information about |
+ the current stack of nested class declarations being parsed. |
+ error: A callable to which errors are reported, which takes 4 arguments: |
+ filename, line number, error level, and message |
+ |
+ """ |
+ raw_lines = clean_lines.raw_lines |
+ CheckForFunctionLengths(filename, clean_lines, line, function_state, error) |
+ if Search(r'\bNOLINT\b', raw_lines[line]): # ignore nolint lines |
+ return |
+ CheckForMultilineCommentsAndStrings(filename, clean_lines, line, error) |
+ CheckStyle(filename, clean_lines, line, file_extension, error) |
+ CheckLanguage(filename, clean_lines, line, file_extension, include_state, |
+ error) |
+ CheckForNonStandardConstructs(filename, clean_lines, line, |
+ class_state, error) |
+ CheckPosixThreading(filename, clean_lines, line, error) |
+ |
+ |
+def ProcessFileData(filename, file_extension, lines, error): |
+ """Performs lint checks and reports any errors to the given error function. |
+ |
+ Args: |
+ filename: Filename of the file that is being processed. |
+ file_extension: The extension (dot not included) of the file. |
+ lines: An array of strings, each representing a line of the file, with the |
+ last element being empty if the file is termined with a newline. |
+ error: A callable to which errors are reported, which takes 4 arguments: |
+ """ |
+ lines = (['// marker so line numbers and indices both start at 1'] + lines + |
+ ['// marker so line numbers end in a known way']) |
+ |
+ include_state = _IncludeState() |
+ function_state = _FunctionState() |
+ class_state = _ClassState() |
+ |
+ CheckForCopyright(filename, lines, error) |
+ |
+ if file_extension == 'h': |
+ CheckForHeaderGuard(filename, lines, error) |
+ |
+ RemoveMultiLineComments(filename, lines, error) |
+ clean_lines = CleansedLines(lines) |
+ for line in xrange(clean_lines.NumLines()): |
+ ProcessLine(filename, file_extension, clean_lines, line, |
+ include_state, function_state, class_state, error) |
+ class_state.CheckFinished(filename, error) |
+ |
+ CheckForIncludeWhatYouUse(filename, clean_lines, include_state, error) |
+ |
+ # We check here rather than inside ProcessLine so that we see raw |
+ # lines rather than "cleaned" lines. |
+ CheckForUnicodeReplacementCharacters(filename, lines, error) |
+ |
+ CheckForNewlineAtEOF(filename, lines, error) |
+ |
+ |
+def ProcessFile(filename, vlevel): |
+ """Does google-lint on a single file. |
+ |
+ Args: |
+ filename: The name of the file to parse. |
+ |
+ vlevel: The level of errors to report. Every error of confidence |
+ >= verbose_level will be reported. 0 is a good default. |
+ """ |
+ |
+ _SetVerboseLevel(vlevel) |
+ |
+ try: |
+ # Support the UNIX convention of using "-" for stdin. Note that |
+ # we are not opening the file with universal newline support |
+ # (which codecs doesn't support anyway), so the resulting lines do |
+ # contain trailing '\r' characters if we are reading a file that |
+ # has CRLF endings. |
+ # If after the split a trailing '\r' is present, it is removed |
+ # below. If it is not expected to be present (i.e. os.linesep != |
+ # '\r\n' as in Windows), a warning is issued below if this file |
+ # is processed. |
+ |
+ if filename == '-': |
+ lines = codecs.StreamReaderWriter(sys.stdin, |
+ codecs.getreader('utf8'), |
+ codecs.getwriter('utf8'), |
+ 'replace').read().split('\n') |
+ else: |
+ lines = codecs.open(filename, 'r', 'utf8', 'replace').read().split('\n') |
+ |
+ carriage_return_found = False |
+ # Remove trailing '\r'. |
+ for linenum in range(len(lines)): |
+ if lines[linenum].endswith('\r'): |
+ lines[linenum] = lines[linenum].rstrip('\r') |
+ carriage_return_found = True |
+ |
+ except IOError: |
+ sys.stderr.write( |
+ "Skipping input '%s': Can't open for reading\n" % filename) |
+ return |
+ |
+ # Note, if no dot is found, this will give the entire filename as the ext. |
+ file_extension = filename[filename.rfind('.') + 1:] |
+ |
+ # When reading from stdin, the extension is unknown, so no cpplint tests |
+ # should rely on the extension. |
+ if (filename != '-' and file_extension != 'cc' and file_extension != 'h' |
+ and file_extension != 'cpp'): |
+ sys.stderr.write('Ignoring %s; not a .cc or .h file\n' % filename) |
+ else: |
+ ProcessFileData(filename, file_extension, lines, Error) |
+ if carriage_return_found and os.linesep != '\r\n': |
+ # Use 0 for linenum since outputing only one error for potentially |
+ # several lines. |
+ Error(filename, 0, 'whitespace/newline', 1, |
+ 'One or more unexpected \\r (^M) found;' |
+ 'better to use only a \\n') |
+ |
+ sys.stderr.write('Done processing %s\n' % filename) |
+ |
+ |
+def PrintUsage(message): |
+ """Prints a brief usage string and exits, optionally with an error message. |
+ |
+ Args: |
+ message: The optional error message. |
+ """ |
+ sys.stderr.write(_USAGE) |
+ if message: |
+ sys.exit('\nFATAL ERROR: ' + message) |
+ else: |
+ sys.exit(1) |
+ |
+ |
+def PrintCategories(): |
+ """Prints a list of all the error-categories used by error messages. |
+ |
+ These are the categories used to filter messages via --filter. |
+ """ |
+ sys.stderr.write(_ERROR_CATEGORIES) |
+ sys.exit(0) |
+ |
+ |
+def ParseArguments(args): |
+ """Parses the command line arguments. |
+ |
+ This may set the output format and verbosity level as side-effects. |
+ |
+ Args: |
+ args: The command line arguments: |
+ |
+ Returns: |
+ The list of filenames to lint. |
+ """ |
+ try: |
+ (opts, filenames) = getopt.getopt(args, '', ['help', 'output=', 'verbose=', |
+ 'filter=']) |
+ except getopt.GetoptError: |
+ PrintUsage('Invalid arguments.') |
+ |
+ verbosity = _VerboseLevel() |
+ output_format = _OutputFormat() |
+ filters = '' |
+ |
+ for (opt, val) in opts: |
+ if opt == '--help': |
+ PrintUsage(None) |
+ elif opt == '--output': |
+ if not val in ('emacs', 'vs7'): |
+ PrintUsage('The only allowed output formats are emacs and vs7.') |
+ output_format = val |
+ elif opt == '--verbose': |
+ verbosity = int(val) |
+ elif opt == '--filter': |
+ filters = val |
+ if filters == '': |
+ PrintCategories() |
+ |
+ if not filenames: |
+ PrintUsage('No files were specified.') |
+ |
+ _SetOutputFormat(output_format) |
+ _SetVerboseLevel(verbosity) |
+ _SetFilters(filters) |
+ |
+ return filenames |
+ |
+ |
+def main(): |
+ filenames = ParseArguments(sys.argv[1:]) |
+ |
+ # Change stderr to write with replacement characters so we don't die |
+ # if we try to print something containing non-ASCII characters. |
+ sys.stderr = codecs.StreamReaderWriter(sys.stderr, |
+ codecs.getreader('utf8'), |
+ codecs.getwriter('utf8'), |
+ 'replace') |
+ |
+ _cpplint_state.ResetErrorCount() |
+ for filename in filenames: |
+ ProcessFile(filename, _cpplint_state.verbose_level) |
+ sys.stderr.write('Total errors found: %d\n' % _cpplint_state.error_count) |
+ sys.exit(_cpplint_state.error_count > 0) |
+ |
+ |
+if __name__ == '__main__': |
+ main() |
Property changes on: depot_tools\cpplint.py |
___________________________________________________________________ |
Added: svn:executable |
+ * |
Added: svn:eol-style |
+ LF |