mirror of
https://github.com/jlengrand/error-prone-support.git
synced 2026-03-10 08:11:25 +00:00
13 KiB
13 KiB
Picnic's Error Prone Contrib
This project provides a plugin containing a collection of Error Prone checks.
How to contribute
Contributions are more than welcome! Below we list tasks that are on our TODO list. If you have others ideas/plans, feel free to file an issue or open a pull request.
Contribution guidelines
To the extend possible, the pull request process guards our coding guidelines. Some pointers:
- Checks should we topical: Ideally they address a single concern.
- Where possible checks should provide fixes, and ideally these are completely behavior preserving. In order for a check to be adopted by users it must not "get in the way". So for a check which addresses a relatively trivial stylistic concern it is doubly important that the violations it detects can be auto-patched.
- Make sure you have read Error Prone's criteria for new checks. Most guidelines described there apply to this project as well, except that this project does focus quite heavy on style enforcement. But that just makes the previous point doubly important.
- Make sure that a checks's (mutation) coverage is or remains about as high as it can be. Not only does this lead to better tests, it also points out opportunities to simplify the code.
- Please restrict the scope of a pull request to a single feature or fix. Don't sneak in unrelated changes.
- When in doubt about whether a pull request will be accepted, please first file an issue to discuss it.
Our wishlist
We expect the following tasks to help improve the quality of this open source project:
- Publish the artifact to Maven Central, then document the coordinates in this
README.md. - Document how to enable the checks.
- Document how to apply patches.
- Document each of the checks.
- Add Travis CI, SonarQube and Codecov integrations.
- Investigate whether it makes sense to include license headers in each file. If so, set that up and enforce it.
- Add non-Java file formatting support, like we have internally at Picnic. (I.e., somehow open-source that stuff.)
- Add relevant "badges" at the top of this
README.md. - Auto-generate a website listing each of the checks, just like the Error Prone bug patterns page. The Error Prone repository contains code for this.
- Set up a script/procedure for testing the plugin against other open source projects. By running the checks against a variety of code bases we are more likely to catch errors due to unexpected code constructs. False positives and regressions can be caught this way as well. For inspiration, review how Checkstyle does this.
- Have the repository be analyzed by Better Code Hub and potentially publish the results.
- Consider integrating with FOSSA.
- Review all places in the code where a
Descriptionis currently created, and see whether a custom error message (Description.Builder#setMessage) is warranted. - Improve an existing check (see
XXX-marked comments in the code) or write a new one (see the list of suggestions below).
Ideas for new checks
The following is a list of checks we'd like to see implemented:
- A check with functionality equivalent to the "Policeman's Forbidden API
Checker" Maven plugin, with a focus on disallowing usage of
the methods and fields listed by the "JDK System Out" and "JDK Unsafe"
signature groups. Using Error Prone's method matchers forbidden method calls
can easily be identified. But Error Prone can go one step further by
auto-patching violations. For each violation two fixes can be proposed: a
purely behavior-preserving fix which makes the platform-dependent behavior
explicit, and another which replaces the platform-dependent behavior with the
preferred alternative. (Such as using
UTF-8instead of the system default charset.) - The Modernizer Maven Plugin can similarly be replaced with an equivalent Error Prone check. The latter would allow automatic replacement of outdated APIs through Error Prone's patch functionality.
- A subset of the refactor operations provided by the Eclipse-specific AutoRefactor plugin.
- A check which replaces fully qualified types with simple types in contexts
where this does not introduce ambiguity. Should consider both actual Java
code and Javadoc
@linkreferences. - A check which simplifies array expressions. It would replace empty array
expressions of the form
new int[] {}withnew int[0]. Statements of the formbyte[] arr = new byte[] {'c'};would be shortened tobyte[] arr = {'c'};. - A check which replaces expressions of the form
String.format("some prefix %s", arg)with"some prefix " + arg, and similar for simple suffixes. Can perhaps be generalized further, though it's unclear how far. (Well, aString.formatcall without arguments can certainly be simplified, too.) - A check which replaces single-character strings with
chars where possible. For example as argument toStringBuilder.appendand in string concatenations. - A check which adds or removes the first
Localeargument toString.formatand similar calls as necessary. (For example, a format string containing only%splaceholders is locale-insensitive unless any of the arguments is aFormattable, while%fplaceholders are locale-sensitive.) - A check which replaces
String.replaceAllwithString.replaceif the first argument is certainly not a regular expression. And if both arguments are single-character strings then the(char, char)overload can be invoked instead. - A check which flags (and ideally, replaces)
try-finallyconstructs with equivalenttry-with-resourcesconstructs. - A check which drops exceptions declared in
throwsclauses if they are (a) not actually thrown and (b) the associated method cannot be overridden. - A check which tries to statically import certain methods whenever used, if
possible. The set of targeted methods should be configurable, but may default
to e.g.
java.util.Function.identity(), the static methods exposed byjava.util.stream.Collectorsand the various Guava collector factory methods. - A check which replaces
new Random().someMethod()calls withThreadLocalRandom.current().someMethod()calls, so as to avoid unnecessary synchronization. - A check which drops
this.fromthis.someMethod()calls and which optionally does the same for fields, if no ambiguity arises. - A check which replaces
Integer.valueOfcalls withInteger.parseIntor vice versa in order to prevent auto (un)boxing, and likewise for other number types. - A check which flags nullable collections.
- A check which flags
AutoCloseableresources not managed by atry-with-resourcesconstruct. Certain subtypes, such as jOOQ'sDSLContextshould be excluded. - A check which flags
java.timemethods which implicitly consult the system clock, suggesting that a passed-inClockis used instead. - A check which flags public methods on public classes which reference
non-public types. This can cause
IllegalAccessErrors andBootstrapMethodErrors at runtime. - A check which swaps the LHS and RHS in expressions of the form
nonConstant.equals(someNonNullConstant). - A check which annotates methods which only throw an exception with
@Deprecatedor@DoNotCall. - A check which flags imports from other test classes.
- A Guava-specific check which replaces
Joiner.joincalls withString.joincalls in those cases where the latter is a proper substitute for the former. - A Guava-specific check which flags
{Immutable,}Multimaptype usages where{Immutable,}{List,Set}Multimapwould be more appropriate. - A Guava-specific check which rewrites
if (conditional) { throw new IllegalArgumentException(); }and variants to an equivalentcheckArgumentstatement. Idem for other exception types. - A Guava-specific check which replaces simple anonymous
CacheLoadersubclass declarations withCacheLoader.from(someLambda). - A Spring-specific check which enforces that methods with the
@Scheduledannotation are also annotated with New Relic's@Traceannotation. Such methods should ideally not also represent Spring MVC endpoints. - A Spring-specific check which enforces that
@RequestMappingannotations, when applied to a method, explicitly specify one or more target HTTP methods. - A Spring-specific check which looks for classes in which all
@RequestMappingannotations (and the various aliases) specify the samepath/valueproperty and then moves that path to the class level. - A Spring-specific check which flags
@Value("some.property")annotations, as these almost certainly should be@Value("${some.property}"). - A Spring-specific check which drops the
requiredattribute from@RequestParamannotations when thedefaultValueattribute is also specified. - A Spring-specific check which rewrites a class which uses field injection to one which uses constructor injection. This check wouldn't be strictly behavior preserving, but could be used for a one-off code base migration.
- A Spring-specific check which disallows field injection, except in
AbstractTestNGSpringContextTestssubclasses. (One known edge case: self-injections so that a bean can call itself through an implicit proxy.) - A Spring-specific check which verifies that public methods on all classes
whose name matches a certain pattern, e.g.
.*Service, are annotated@Secured. - A Spring-specific check which verifies that annotations such as
@RequestParamare only present in@RestControllerclasses. - A Spring-specific check which disallows
@ResponseStatuson MVC endpoint methods, as this prevents communication of error status codes. - A Hibernate Validator-specific check which looks for
@UnwrapValidatedValueusages and migrates the associated constraint annotations to the generic type argument to which they (are presumed to) apply. - A TestNG-specific check which drops method-level
@Testannotations if a matching/more specific annotation is already present at the class level. - A TestNG-specific check which enforces that all tests are in a group.
- A TestNG-specific check which flags field assignments in
@BeforeMethod-annotated methods unless the class is annotated@Test(singleThreaded = true). - A TestNG-specific check which flags usages of the
expectedExceptionsattribute of the@Testannotation, pointing toassertThrows. - A Jongo-specific check which disallows the creation of sparse indices, in favour of partial indices.
- An Immutables-specific check which replaces
checkState/IllegalStateExceptionusages inside a@Value.Check-annotated method withcheckArgument/IllegalArgument, since the method is invoked when a caller attempts to create an immutable instance. - An Immutables-specific check which disallows references to collection types other than the Guava immutable collections, including inside generic type arguments.
- An SLF4J-specific check which drops or adds a trailing dot from log messages, as applicable.
- A Mockito-specific check which identifies sequences of statements which mock
a significant number of methods on a single object with "default data"; such
constructions can often benefit from a different type of default answer, such
as
Answers.RETURNS_MOCKS. - An RxJava-specific check which flags
.toCompletable()calls on expressions of typeSingle<Completable>etc., as most likely.flatMapCompletable(Functions.identity())was meant instead. Idem for other variations. - An RxJava-specific check which flags
expr.firstOrError()calls and suggestsexpr.switchIfEmpty(Single.error(...)), so that an application-specific exception is thrown instead ofNoSuchElementException. - An RxJava-specific check which flags use of
#assertValueSetwithout#assertValueCount, as the former method doesn't do what one may intuitivily expect it to do. See ReactiveX/RxJava#6151.