NAME
Perl::Critic::TODO - Things for Perl::Critic developers to do
SOURCE
#######################################################################
# $URL: http://perlcritic.tigris.org/svn/perlcritic/trunk/Perl-Critic/TODO.pod $
# $Date: 2008-06-05 22:24:36 -0500 (Thu, 05 Jun 2008) $
# $Author: chrisdolan $
# $Revision: 2414 $
#######################################################################
SEE ALSO
Perl-Critic-More is a separate distribution for less-widely-accepted policies. It contains its own TODO.pod.
NEW FEATURES
Report Safari sections in addition to book page numbers.
Add --files-with-violations/-l and --files-without-violations/-L options to perlcritic.
Just print out file names. I could have used this at work when combined with
--single-policy
.gvim `perlcritic --single-policy QuotedWordLists -l`
Add a file Behavior.
Allow values of (at least) string-list Parameters to be specified in a file.
For the benefit of PodSpelling, etc.
Enhance string-list Behavior to allow specification of delimiters.
For things like RequirePodSections.
Add queries to --list option to perlcritic.
List Policies based upon severity, theme, and (what I want this second) applies_to.
Add --prohibit-unrestricted-no-critic option to perlcritic.
Requires
## no critic
to take an argument:## no critic (SomePolicyPattern) # ok ## no critic # not ok
Can't be done as a regular Policy because any line that violated it would disable it.
Support for
#line 123 "filename"
directives.For code generators and template languages that allow inline Perl code.
Yes, somebody has an in-house templating system where they've written a custom test module that extracts the perl code from a template and critiques it.
Actually, this would be useful for programs: Module::Build "fixes" shebang lines so that there's the bit about invoking perl if the program is attempted to be run by a Bourne shell, which throws the line numbers off when using Test::P::C on the contents of a
blib
directory.Enhance statistics.
- Blank line count
- POD line count
- Comment line count
- Data section count
Detect 5.10 source and enable stuff for that.
For example, treat
say
as equivalent toprint
.Support a means of failing if a Policy isn't installed.
For example, the self compliance test now depends upon a Policy in the More distribution.
Something like using a "+" sign in front of the Policy name in its configuration block, analogous to the "-" sign used for disabling a policy, e.g. "
[+Example::Policy]
".
BUGS/LIMITATIONS
Modules::RequireVersionVar
Doesn't enforce three-part versions
NamingConventions::ProhibitAmbiguousNames
Don't allow compound names with forbidden words, like "last_record". Allow forbidden words in RHS of variable declarations
Also, we should make it easeir to add (or delete) words from the forbbiden list.
Subroutines::ProtectPrivateSubs
Doesn't forbid
$pkg->_foo()
because it can't tell the difference between that and$self->_foo()
ErrorHandling::RequireCarping
This should not complain about using
warn
ordie
if it's not in a function, or if it's not in a non-main:: package.Also, should allow
die
when it is obvious that the "message" is a reference.RegularExpressions::ProhibitCaptureWithoutTest
Allow this construct:
for ( ... ) { next unless /(....)/; if ( $1 ) { .... } }
Right now, P::C thinks that the
$1
isn't legal to use because it's "outside" of the match. The thing is, we can only get to theif
if the regex matched. while ( $str =~ /(expression)/ )CodeLayout::ProhibitParensWithBuiltins
Some builtin functions (particularly those that take a variable number of scalar arguments) should probably get parentheses. This policy should be enhanced to allow the user to specify a list of builtins that are expempt from the policy.
ValuesAndExpressions::ProhibitCommaSeparatedStatements
Needs to check for
scalar( something, something )
.Variables::ProhibitPunctuationVars
Needs to look inside strings. RT #35970.
TestingAndDebugging::RequireUseWarnings
Check for -w on the shbang line.
OTHER PBP POLICIES THAT SEEM FEASIBLE TO IMPLEMENT
Modules::RequireUseVersion [405-406]
Modules::RequireThreePartVersion [405-406]
NON-PBP POLICIES WANTED
Documentation::RequireModuleAbstract
Require a
=head1 NAME
POD section with content that matches\A \s* [\w:]+ \s+ - \s+ \S
. The single hyphen is the important bit. Also, must be a single line.Expressions::RequireFatCommasInHashConstructors
ErrorHandling::RequireCheckOfEvalErrorAfterEval
Expressions::ProhibitDecimalWithBitwiseOperator
Expressions::ProhibitStringsWithBitwiseOperator
InputOutput::ProhibitMagicDiamond
Steal the idea from B::Lint.
TBD::AllProgramsNeedShebangs
Anything that is a program should have a shebang line. This includes .t files.
BuiltInFunctions::RequireConstantSprintfFormat
BuiltInFunctions::RequireConstantUnpackFormat
http://diotalevi.isa-geek.net/~josh/yapc-lint/slides/slide5.html
Miscellanea::ProhibitObnoxiousComments
Forbid excessive hash marks e.g. "#### This is a loud comment ####". Make the obnoxious pattern configurable
ValuesAndExpressions::RequireNotOperator
Require the use of "not" instead of "!", except when this would contradict ProhibitMixedBooleanOperators. This may be better suited for Perl::Critic::More.
Modules::RequireExplicitImporting
Require every
use
statement to have an explicit import list. You could still get around this by callingimport
directly.Modules::ForbidImporting
Require every
use
to have an explicitly empty import list. This is for folks who like to see fully-qualified function names. Should probably provide a list of exempt modules (like FindBin);ControlStructures::ProhibitIncludeViaDo
Forbid
do "foo.pl"
. Not sure about this policy name.Variables::ProhibitUseVars
Disallow
use vars qw(...)
and requireour $foo
instead. This contradicts Miscellanea::Prohibit5006isms. Maybe verifyuse 5.6
before applying this policy. Low severity.VariablesAndExpressions::ProhibitQuotedHashKeys
Forbid quotes around hash keys, unless they are really needed. This is against what Damian says. Suggested by Adam Kennedy. Low severity.
CodeLayout::ProhibitFunctionalNew
Good:
Foo::Bar->new
, Bad:new Foo::Bar
RegularExpressions::ProhibitSWSWSW
Require
split
instead ofm/\s*\w*\s*\w*\s*/
. From MJD's Red Flags.VariablesAndExpressions::RequireConstantVersion (low severity)
VariablesAndExpressions::ProhibitComplexVersion (medium severity)
Documentation::RequireSynopsis
Documentation::RequireLicense
These are simplified versions of Documentation::RequirePodSections.
Documentation::RequireValidSynopsis
The Synopsis section must be all indented and must be syntactically valid Perl (as validated by PPI).
Documentation::ProhibitEmptySections
Any
=headN
and=over
sections must not be empty. This helps catch boilerplate (althought Test::Pod should catch empty=over
blocks).On the other hand,
=item ...
sections can be empty, since the item label is content.Miscellaneous::ProhibitBoilerplate
Complain about copy-and-paste code or docs from h2xs, Module::Starter::*, etc.
Here's a non-PPI implementation: http://search.cpan.org/src/JJORE/Carp-Clan-5.8/t/04boilerplate.t
BuiltinFunctions::ProhibitExtraneousScalarCall
Recommend that
if (scalar @array)
be rewritten asif (@array)
.RegularExpressions::ProhibitMixedDelimiters
Ban s{foo}(bar)
RegularExpressions::ProhibitScalarAsRegexp
Ban naked srtings as regexps, like:
print 1 if $str =~ $regexp;
Instead, it should be:
print 1 if $str =~ m/$regexp/;
or
print 1 if $str =~ m/$regexp/xms;
ValuesAndExpressions::RequireInterpolatedStringyEval
Ensure that the argument to a stringy eval is not a constant string. That's just wasteful. Real world examples include:
eval 'use Optional::Module';
which is better written as
eval { require Optional::Module; Optional::Module->import };
for performance gains and compile-time syntax checking.
RegularExpressions::ProhibitUnnecessaryEscapes
Complain if user puts a backslash escape in front of non-special characters. For example:
m/\!/;
Make exceptions for
\"
,\'
and\`
since those are often inserted to workaround bugs in syntax highlighting.Note that this is different inside character classes, where only
^
,]
and-
need to be escaped, I think. Caret only needs to be escaped at the beginning, and dash does NOT need to be escaped at the beginning and end. See perlreref.Steal ideas from Dunce::Files.
Can someone expand this entry, please?
ControlStructures::ProhibitAssigmentInConditional
ValuesAndExpressions::RequireConstantBeforeEquals
ValuesAndExpressions::RequireConstantBeforeOperator
http://use.perl.org/~stu42j/journal/36412
Just about everyone has been bitten by
if ($x = 10) { ... }
when they meant to use==
. A safer style is10 == $x
because omitting the second=
yields a noisy compile-time failure instead of silent runtime error.ProhibitAssigmentInConditional complains if the condition of a while, until, if or unless is solely an assignment. If it's anything more complex (like
if (($x=10)){}
orwhile ($x=$y=$z){}
), there is no warning.RequireConstantBeforeEquals complains if the left side of an
==
is a variable while the right side is a constant.RequireConstantBeforeOperator complains if the left side of any comparison operator (
==
,eq
,<
, etc) is a variable while the right side is a constant.InputOutput::ProhibitUTF8IOLayer
http://www.perlfoundation.org/perl5/index.cgi?the_utf8_perlio_layer
REFACTORINGS and ENHANCEMENTS
Create constants for the PPI location array elements.
MOVE THE LINE-DISABLING INTO P::C::Document
All the code that deals with finding all the '##no critic' comments and noting which policies are disabled at each line seems like it would be better placed in Perl::Critic::Document. P::C::Document could then provide methods to indicate if a policy is disabled at a particular line. So the basic algorithm in Perl::Critic might look something like this:
foreach $element (@PPI_ELEMENTS) { foreach $policy (@POLICIES) { $line = $element->location->[0]; next if $doc->policy_is_disabled_at_line( $policy, $line ); push @violations, $policy->violates( $elem, $doc ); } }
Some means of detecting "runnaway"
##no critic
Elliot was talking to a couple of users at ETech and one of their major concerns was that they were using
##no critic
and forgetting to do a##use critic
after the problematic section. Perhaps an option to perlcritic to scan for such things is in order.Change API to use named parameters
Most of the methods on the public classes use named parameters for passing arguments. I'd like to extend that pattern to include all object-methods. Static methods can still use positional parameters.
Enhance P::C::critique() to accept files, directories, or code strings
Just like bin/perlcritic does now.
Add
-cache
flag to bin/perlcriticIf enabled, this turns on PPI::Cache:
require PPI::Cache; my $cache_path = "/tmp/test-perl-critic-cache-$ENV{USER}"; mkdir $cache_path, oct 700 if (! -d $cache_path); PPI::Cache->import(path => $cache_path);
This cachedir should perhaps include the PPI version number! At least until PPI incorporates its own version number in the cache.
(see t/40_criticize.t for a more robust implementation)
Use hash-lookup instead of
List::MoreUtils::any
function.In several places, Perl::Critic uses
List::MoreUtils::any
to see if a string is a member of a list. Instead, I suggest using a named subroutine that does a hash-lookup like this:my %logical_ops = hashify( qw( ! || && ||= &&= and or not ) ); sub is_logical_op { return exists $logical_ops{ $_[0] }; }
Why?
Allow color output to work through a pipe.
http://rt.cpan.org/Ticket/Display.html?id=30140
ack now supports this.
PPI BUGS
We're waiting on the following bugs to get fixed in a CPAN release of PPI:
- Newlines
-
PPI does not preserve newlines. That makes CodeLayout::RequireConsistentNewlines impossible to implement under PPI. For now, it's implemented by pulling the source out of the file and skipping PPI.
It's unlikely that PPI will support mixde newlines anytime soon.
- Operators
-
ValuesAndExpressions::ProhibitMismatchedOperators has two workarounds for PPI bugs with parsing operators. Many of these bugs have been fixed in PPI, so it would be good to check if those workarounds are still needed.
- Regexp methods
-
Not strictly a bug -- the PPI Regexp classes have a dearth of accessor methods as of v1.118, meaning that we have to do messy digging into internals. I wrote Perl::Critic:Utils::PPIRegexp to encapsulate this messiness, but it would be nicer to have an official interface in PPI.