cppcheck/lib/settings.h

425 lines
12 KiB
C
Raw Normal View History

2010-04-13 19:25:08 +02:00
/*
* Cppcheck - A tool for static C/C++ code analysis
2021-03-21 20:58:32 +01:00
* Copyright (C) 2007-2021 Cppcheck team.
2010-04-13 19:25:08 +02:00
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
//---------------------------------------------------------------------------
#ifndef settingsH
#define settingsH
//---------------------------------------------------------------------------
2010-04-13 19:25:08 +02:00
#include "config.h"
#include "errortypes.h"
2017-05-27 04:33:47 +02:00
#include "importproject.h"
#include "library.h"
#include "platform.h"
#include "standards.h"
2017-05-27 04:33:47 +02:00
#include "suppressions.h"
#include "timer.h"
2010-04-13 19:25:08 +02:00
#include <algorithm>
#include <atomic>
#include <cstdint>
2017-05-27 04:33:47 +02:00
#include <list>
#include <map>
2017-05-27 04:33:47 +02:00
#include <set>
#include <string>
#include <vector>
namespace ValueFlow {
class Value;
}
2010-04-13 19:25:08 +02:00
/// @addtogroup Core
/// @{
template<typename T>
class SimpleEnableGroup {
2021-02-25 10:54:13 +01:00
uint32_t mFlags = 0;
public:
uint32_t intValue() const {
2021-02-25 10:54:13 +01:00
return mFlags;
}
void clear() {
2021-02-25 10:54:13 +01:00
mFlags = 0;
}
void fill() {
2021-02-25 10:54:13 +01:00
mFlags = 0xFFFFFFFF;
}
void setEnabledAll(bool enabled) {
if (enabled)
fill();
else
clear();
}
bool isEnabled(T flag) const {
2021-02-25 10:54:13 +01:00
return (mFlags & (1U << (uint32_t)flag)) != 0;
}
void enable(T flag) {
2021-02-25 10:54:13 +01:00
mFlags |= (1U << (uint32_t)flag);
}
void disable(T flag) {
2021-02-25 10:54:13 +01:00
mFlags &= ~(1U << (uint32_t)flag);
}
void setEnabled(T flag, bool enabled) {
if (enabled)
enable(flag);
else
disable(flag);
}
};
2010-04-13 19:25:08 +02:00
/**
* @brief This is just a container for general settings so that we don't need
* to pass individual values to functions or constructors now or in the
* future when we might have even more detailed settings.
*/
class CPPCHECKLIB Settings : public cppcheck::Platform {
2010-04-13 19:25:08 +02:00
private:
/** @brief terminate checking */
static std::atomic<bool> mTerminated;
2010-04-13 19:25:08 +02:00
public:
Settings();
2021-11-15 20:37:08 +01:00
void loadCppcheckCfg(const std::string &executable);
/** @brief addons, either filename of python/json file or json data */
std::list<std::string> addons;
/** @brief Path to the python interpreter to be used to run addons. */
std::string addonPython;
/** @brief Paths used as base for conversion to relative paths. */
std::vector<std::string> basePaths;
/** @brief Bug hunting */
bool bugHunting;
2020-12-18 21:31:44 +01:00
/** @brief Max time for bug hunting analysis in seconds, after
* timeout the analysis will just stop. */
int bugHuntingCheckFunctionMaxTime;
/** Filename for bug hunting report */
std::string bugHuntingReport;
2021-07-06 12:18:03 +02:00
/** @brief --cppcheck-build-dir. Always uses / as path separator. No trailing path separator. */
2016-10-29 12:18:11 +02:00
std::string buildDir;
/** @brief check all configurations (false if -D or --max-configs is used */
bool checkAllConfigurations;
/** Is the 'configuration checking' wanted? */
bool checkConfiguration;
2020-04-26 15:24:25 +02:00
/**
* Check code in the headers, this is on by default but can
* be turned off to save CPU */
bool checkHeaders;
/** Check for incomplete info in library files? */
bool checkLibrary;
/** @brief List of selected Visual Studio configurations that should be checks */
std::list<std::string> checkVsConfigs;
/** @brief check unknown function return values */
std::set<std::string> checkUnknownFunctionReturn;
/** Check unused/uninstantiated templates */
bool checkUnusedTemplates;
/** Use Clang */
bool clang;
/** Custom Clang executable */
std::string clangExecutable;
2020-01-30 07:14:17 +01:00
/** Use clang-tidy */
bool clangTidy;
/** @brief include paths excluded from checking the configuration */
std::set<std::string> configExcludePaths;
/** @brief Are we running from DACA script? */
bool daca;
/** @brief Debug bug hunting */
bool debugBugHunting;
/** @brief Is --debug-normal given? */
bool debugnormal;
/** @brief Is --debug-simplified given? */
bool debugSimplified;
/** @brief Is --debug-template given? */
bool debugtemplate;
/** @brief Is --debug-warnings given? */
bool debugwarnings;
2014-07-14 15:51:45 +02:00
/** @brief Is --dump given? */
bool dump;
std::string dumpFile;
2014-07-14 15:51:45 +02:00
enum Language {
None, C, CPP
};
/** @brief Name of the language that is enforced. Empty per default. */
Language enforcedLang;
/** @brief Is --exception-handling given */
bool exceptionHandling;
2019-04-14 15:00:03 +02:00
// argv[0]
std::string exename;
/** @brief If errors are found, this value is returned from main().
Default value is 0. */
int exitCode;
/** @brief List of --file-filter for analyzing special files */
std::vector<std::string> fileFilters;
2010-04-13 19:25:08 +02:00
/** @brief Force checking the files with "too many" configurations (--force). */
bool force;
2010-04-13 19:25:08 +02:00
std::map<std::string, std::string> functionContracts;
2020-08-22 11:37:44 +02:00
struct VariableContracts {
std::string minValue;
std::string maxValue;
};
std::map<std::string, VariableContracts> variableContracts;
/** @brief List of include paths, e.g. "my/includes/" which should be used
for finding include files inside source files. (-I) */
std::list<std::string> includePaths;
2017-05-16 14:07:23 +02:00
/** @brief Is --inline-suppr given? */
bool inlineSuppressions;
2010-04-13 19:25:08 +02:00
/** @brief How many processes/threads should do checking at the same
time. Default is 1. (-j N) */
unsigned int jobs;
2010-04-13 19:25:08 +02:00
/** @brief Collect unmatched suppressions in one run.
2021-08-07 20:51:18 +02:00
* This delays the reporting until all files are checked.
* It is needed by checks that analyse the whole code base. */
bool jointSuppressionReport;
2010-04-13 19:25:08 +02:00
/** @brief --library= */
std::list<std::string> libraries;
2016-01-02 11:48:36 +01:00
/** Library */
Library library;
/** @brief Load average value */
int loadAverage;
2010-04-13 19:25:08 +02:00
2011-10-22 11:11:54 +02:00
/** @brief Maximum number of configurations to check before bailing.
Default is 12. (--max-configs=N) */
int maxConfigs;
/** @brief --max-ctu-depth */
int maxCtuDepth;
/** @brief max template recursion */
int maxTemplateRecursion;
/** @brief suppress exitcode */
Suppressions nofail;
2010-04-13 19:25:08 +02:00
/** @brief suppress message (--suppressions) */
Suppressions nomsg;
/** @brief write results (--output-file=&lt;file&gt;) */
std::string outputFile;
/** @brief plist output (--plist-output=&lt;dir&gt;) */
std::string plistOutput;
/** @brief Using -E for debugging purposes */
bool preprocessOnly;
ImportProject project;
/** @brief Is --quiet given? */
bool quiet;
/** @brief Use relative paths in output. */
bool relativePaths;
/** @brief --report-progress */
bool reportProgress;
2010-12-12 11:56:22 +01:00
/** Rule */
class CPPCHECKLIB Rule {
2010-12-12 11:56:22 +01:00
public:
2012-02-18 14:44:04 +01:00
Rule()
: tokenlist("simple") // use simple tokenlist
, id("rule") // default id
, severity(Severity::style) { // default severity
2010-12-12 11:56:22 +01:00
}
std::string tokenlist;
2010-12-12 11:56:22 +01:00
std::string pattern;
std::string id;
std::string summary;
Severity::SeverityType severity;
2010-12-12 11:56:22 +01:00
};
/**
* @brief Extra rules
*/
std::list<Rule> rules;
/** Do not only check how interface is used. Also check that interface is safe. */
class CPPCHECKLIB SafeChecks {
public:
SafeChecks() : classes(false), externalFunctions(false), internalFunctions(false), externalVariables(false) {}
static const char XmlRootName[];
static const char XmlClasses[];
static const char XmlExternalFunctions[];
static const char XmlInternalFunctions[];
static const char XmlExternalVariables[];
void clear() {
classes = externalFunctions = internalFunctions = externalVariables = false;
}
/**
* Public interface of classes
* - public function parameters can have any value
* - public functions can be called in any order
* - public variables can have any value
*/
bool classes;
/**
* External functions
* - external functions can be called in any order
* - function parameters can have any values
*/
bool externalFunctions;
/**
* Experimental: assume that internal functions can be used in any way
* This is only available in the GUI.
*/
bool internalFunctions;
/**
* Global variables that can be modified outside the TU.
* - Such variable can have "any" value
*/
bool externalVariables;
};
SafeChecks safeChecks;
SimpleEnableGroup<Severity::SeverityType> severity;
SimpleEnableGroup<Certainty::CertaintyLevel> certainty;
SimpleEnableGroup<Checks::CheckList> checks;
/** @brief show timing information (--showtime=file|summary|top5) */
SHOWTIME_MODES showtime;
/** Struct contains standards settings */
Standards standards;
/** @brief The output format in which the errors are printed in text mode,
e.g. "{severity} {file}:{line} {message} {id}" */
std::string templateFormat;
/** @brief The output format in which the error locations are printed in
* text mode, e.g. "{file}:{line} {info}" */
std::string templateLocation;
2019-03-02 19:52:15 +01:00
/** @brief defines given by the user */
std::string userDefines;
/** @brief undefines given by the user */
std::set<std::string> userUndefs;
/** @brief forced includes given by the user */
std::list<std::string> userIncludes;
/** @brief Is --verbose given? */
bool verbose;
/** @brief write XML results (--xml) */
bool xml;
/** @brief XML version (--xml-version=..) */
int xml_version;
/**
* @brief return true if a included file is to be excluded in Preprocessor::getConfigs
* @return true for the file to be excluded.
*/
2014-11-20 14:20:09 +01:00
bool configurationExcluded(const std::string &file) const {
for (const std::string & configExcludePath : configExcludePaths) {
if (file.length()>=configExcludePath.length() && file.compare(0,configExcludePath.length(),configExcludePath)==0) {
return true;
}
}
return false;
}
/**
* @brief Enable extra checks by id. See isEnabled()
* @param str single id or list of id values to be enabled
* or empty string to enable all. e.g. "style,possibleError"
* @return error message. empty upon success
*/
std::string addEnabled(const std::string &str);
/**
2021-08-07 20:51:18 +02:00
* @brief Returns true if given value can be shown
* @return true if the value can be shown
*/
bool isEnabled(const ValueFlow::Value *value, bool inconclusiveCheck=false) const;
/** Is posix library specified? */
bool posix() const {
return std::find(libraries.begin(), libraries.end(), "posix") != libraries.end();
}
/** @brief Request termination of checking */
static void terminate(bool t = true) {
Settings::mTerminated = t;
}
/** @brief termination requested? */
static bool terminated() {
return Settings::mTerminated;
}
2020-12-19 19:02:42 +01:00
std::set<std::string> summaryReturn;
2020-12-19 19:02:42 +01:00
void loadSummaries();
2010-04-13 19:25:08 +02:00
};
/// @}
//---------------------------------------------------------------------------
#endif // settingsH