Files
error-prone-support/error-prone-contrib/README.md
Stephan Schroevers 72f92307dd Extend the README.md
2018-04-28 13:23:26 +02:00

9.1 KiB

Picnic's Error Prone Contrib

This project provides a plugin containing a collection of Error Prone checks.

How to contribute

Contributions are more than welcome! Below we list tasks that are on our TODO list. If you have others ideas/plans, feel free to file an issue or open a pull request.

Contribution guidelines

To the extend possible the pull request process guards our coding guidelines. Some pointers:

  • Checks should we topical: Ideally they address a single concern.
  • Where possible checks should provide fixes, and ideally these are completely behavior preserving. In order for a check to be adopted by users it must not "get in the way". So for a check which addresses a relatively trivial stylistic concern it is doubly important that the violations it detects can be auto-patched.
  • Make sure you have read Error Prone's criteria for new checks. Most guidelines described there apply to this project as well, except that this project does focus quite heavy on style enforcement. But that just makes the previous point doubly important.
  • Make sure that a checks's (mutation) coverage is or remains about as high as it can be. Not only does this lead to better tests, it also points out opportunities to simplify the code.

Our wishlist

We expect the following tasks to help improve the quality of this open source project:

  • Publish the artifact to Maven Central, then document the coordinates in this README.md.
  • Document how to enable the checks.
  • Document how to apply patches.
  • Document each of the checks.
  • Add Travis CI, SonarQube and Coveralls integrations.
  • Validate formatting upon PR builds.
  • Investigate whether it makes sense to include license headers in each file. If so, set that up and enforce it.
  • Add non-Java file formatting support, like we have internally at Picnic. (I.e., somehow open-source that stuff.)
  • Add relevant "badges" at the top of this README.md.
  • Auto-generate a website listing each of the checks, just like the Error Prone bug patterns page. The Error Prone repository contains code for this.
  • Set up a script/procedure for testing the plugin against other open source projects. By running the checks against a variety of code bases we are more likely to catch errors due to unexpected code constructs. False positives and regressions can be caught this way as well.
  • Create a tool which converts a collection of Refaster Templates into an Error Prone check. Ideally this tool is contributed upstream.
  • Have the repository be analyzed by Better Code Hub and potentially publish the results.
  • Review all places in the code where a Description is currently created, and see whether a custom error message (Description.Builder#setMessage) is warranted.
  • Improve an existing check (see XXX-marked comments in the code) or write a new one (see the list of suggestions below.)

Ideas for new checks

The following is a list of checks we'd like to see implemented:

  • A check with functionality equivalent to the "Policeman's Forbidden API Checker" Maven plugin, with a focus on disallowing usage of the methods and fields listed by the "JDK System Out" and "JDK Unsafe" signature groups. Using Error Prone's method matchers forbidden method calls can easily be identified. But Error Prone can go one step further by auto-patching violations. For each violation two fixes can be proposed: a purely behavior-preserving fix which make the platform-dependent behavior explicit, and another which replaces the platform-dependent behavior with the preferred alternative. (Such as using UTF-8 instead of the system default charset.)
  • A check which replaces fully qualified types with simple types in context where this does not introduce ambiguity. Should consider both actual Java code and Javadoc @link references.
  • A check which simplifies array expressions. It would replace empty array expressions of the form new int[] {} with new int[0]. Statements of the form byte[] arr = new byte[] {'c'}; would be shortened to byte[] arr = {'c'};.
  • A check which replaces expressions of the form String.format("some prefix %s", arg) with "some prefix " + arg, and similar for simple suffixes. Can perhaps be generalized further, though it's unclear how far. (Well, a String.format call without arguments can certainly be simplified, too.)
  • A check which replaces single-character strings with chars where possible. For example as argument to StringBuilder.append and in string concatenations.
  • A check which adds or removes the first Locale argument to String.format and similar calls as necessary. (For example, a format string containing only %s placeholders is local-insensitive unless any of the arguments is a Formattable, while %f placeholders are locale-sensitive.)
  • A check which replaces String.replaceAll with String.replace if the first argument is certainly not a regular expression. And if both arguments are single-character strings then the (char, char) overload can be invoked instead.
  • A check which flags (and ideally, replaces) try-finally constructs with equivalent try-with-resources constructs.
  • A check which drops exceptions declared in throws clauses if they are (a) not actually thrown and (b) the associated method cannot be overridden.
  • A check which tries to statically import certain methods whenever used, if possible. The set of targeted methods should be configurable, but may default to e.g. java.util.Function.identity(), the static methods exposed by java.util.stream.Collectors and the various Guava collector factory methods.
  • A Guava-specific check which replaces Joiner.join calls with String.join calls in those cases where the latter is a proper substitute for the former.
  • A Guava-specific check which flags {Immutable,}Multimap type usages where {Immutable,}{List,Set}Multimap would be more appropriate.
  • A Guava-specific check which rewrites if (conditional) { throw new IllegalArgumentException(); } and variants to an equivalent checkArgument statement. Idem for other exception types.
  • A Spring-specific check which enforces that methods with the @Scheduled annotation are also annotated with New Relic's @Trace annotation.
  • A Spring-specific check which enforces that @RequestMapping annotations, when applied to a method, explicitly specify one or more target HTTP methods.
  • A Spring-specific check which looks for classes in which all @RequestMapping annotations (and the various aliases) specify the same path/value property and then moves that path to the class level.
  • A Spring-specific check which flags @Value("some.property") annotations, as these almost certainly should be @Value("${some.property}").
  • A Spring-specific check which drops the required attribute from @RequestParam annotations when the defaultValue attribute is also specified.
  • A Spring-specific check which rewrites a class which uses field injection to one which uses constructor injection. This check wouldn't be strictly behavior preserving, but could be used for a one-off code base migration.
  • A Spring-specific check which disallows field injection, except in AbstractTestNGSpringContextTests subclasses.
  • A Spring-specific check which verifies that public methods on all classes whose name matches a certain pattern, e.g. .*Service, are annotated @Secured.
  • A Hibernate Validator-specific check which looks for @UnwrapValidatedValue usages and migrates the associated constraint annotations to the generic type argument to which they (are presumed to) apply.
  • A TestNG-specific check which drops method-level @Test annotations if a matching/more specific annotation is already present at the class level.
  • A TestNG-specific check which enforces that all tests are in a group.
  • A TestNG-specific check which flags field assignments in @BeforeMethod-annotated methods unless the class is annotated @Test(singleThreaded = true).
  • A TestNG-specific check which flags usages of the expectedExceptions attribute of the @Test annotation, pointing to assertThrows.
  • A Jongo-specific check which disallows the creation of spare indices, in favour of partial indices.
  • An Immutables-specific check which replaces checkState/IllegalStateException usages inside a @Value.Check-annotated method with checkArgument/IllegalArgument, since the method is invoked when a caller attempts to create an immutable instance.
  • An SLF4J-specific check which drops or adds a trailing dot from log messages, as applicable.