CheckstyleValidator.java
/*
* Copyright (c) 2011-2024 Qulice.com
*
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met: 1) Redistributions of source code must retain the above
* copyright notice, this list of conditions and the following
* disclaimer. 2) Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following
* disclaimer in the documentation and/or other materials provided
* with the distribution. 3) Neither the name of the Qulice.com nor
* the names of its contributors may be used to endorse or promote
* products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
* NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
* FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
* THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
*/
package com.qulice.checkstyle;
import com.jcabi.aspects.Tv;
import com.jcabi.log.Logger;
import com.puppycrawl.tools.checkstyle.Checker;
import com.puppycrawl.tools.checkstyle.ConfigurationLoader;
import com.puppycrawl.tools.checkstyle.PropertiesExpander;
import com.puppycrawl.tools.checkstyle.api.AuditEvent;
import com.puppycrawl.tools.checkstyle.api.CheckstyleException;
import com.puppycrawl.tools.checkstyle.api.Configuration;
import com.qulice.spi.Environment;
import com.qulice.spi.ResourceValidator;
import com.qulice.spi.Violation;
import java.io.File;
import java.io.IOException;
import java.net.MalformedURLException;
import java.net.URI;
import java.net.URISyntaxException;
import java.net.URL;
import java.nio.file.Path;
import java.nio.file.Paths;
import java.util.Collection;
import java.util.LinkedList;
import java.util.List;
import java.util.Properties;
import org.apache.commons.lang3.StringUtils;
import org.cactoos.text.IoCheckedText;
import org.cactoos.text.Replaced;
import org.cactoos.text.TextOf;
import org.cactoos.text.Trimmed;
import org.xml.sax.InputSource;
/**
* Validator with Checkstyle.
*
* @since 0.3
* @checkstyle ClassDataAbstractionCoupling (260 lines)
*/
public final class CheckstyleValidator implements ResourceValidator {
/**
* Checkstyle checker.
*/
private final Checker checker;
/**
* Listener of checkstyle messages.
*/
private final CheckstyleListener listener;
/**
* Environment to use.
*/
private final Environment env;
/**
* Constructor.
* @param env Environment to use.
*/
@SuppressWarnings("PMD.ConstructorOnlyInitializesOrCallOtherConstructors")
public CheckstyleValidator(final Environment env) {
this.env = env;
this.checker = new Checker();
this.checker.setModuleClassLoader(
Thread.currentThread().getContextClassLoader()
);
try {
this.checker.configure(this.configuration());
} catch (final CheckstyleException ex) {
throw new IllegalStateException("Failed to configure checker", ex);
}
this.listener = new CheckstyleListener(this.env);
this.checker.addListener(this.listener);
}
@Override
@SuppressWarnings("PMD.AvoidInstantiatingObjectsInLoops")
public Collection<Violation> validate(final Collection<File> files) {
final List<File> sources = this.getNonExcludedFiles(files);
try {
this.checker.process(sources);
} catch (final CheckstyleException ex) {
throw new IllegalStateException("Failed to process files", ex);
}
final List<AuditEvent> events = this.listener.events();
final Collection<Violation> results = new LinkedList<>();
for (final AuditEvent event : events) {
final String check = event.getSourceName();
results.add(
new Violation.Default(
this.name(),
check.substring(check.lastIndexOf('.') + 1),
event.getFileName(),
String.valueOf(event.getLine()),
event.getMessage()
)
);
}
return results;
}
@Override public String name() {
return "Checkstyle";
}
/**
* Filters out excluded files from further validation.
* @param files Files to validate
* @return List of relevant files
*/
public List<File> getNonExcludedFiles(final Collection<File> files) {
final List<File> relevant = new LinkedList<>();
for (final File file : files) {
final String name = file.getPath().substring(
this.env.basedir().toString().length()
);
if (!this.env.exclude("checkstyle", name)) {
relevant.add(file);
}
}
return relevant;
}
/**
* Load checkstyle configuration.
* @return The configuration just loaded
* @see #validate(Collection)
*/
private Configuration configuration() {
final File cache =
new File(this.env.tempdir(), "checkstyle/checkstyle.cache");
final File parent = cache.getParentFile();
if (!parent.exists() && !parent.mkdirs()) {
throw new IllegalStateException(
String.format(
"Unable to create directories needed for %s",
cache.getPath()
)
);
}
final Properties props = new Properties();
props.setProperty("cache.file", cache.getPath());
props.setProperty("header", this.header());
final InputSource src = new InputSource(
this.getClass().getResourceAsStream("checks.xml")
);
final Configuration config;
try {
config = ConfigurationLoader.loadConfiguration(
src,
new PropertiesExpander(props),
ConfigurationLoader.IgnoredModulesOptions.OMIT
);
} catch (final CheckstyleException ex) {
throw new IllegalStateException("Failed to load config", ex);
}
return config;
}
/**
* Create header content, from file.
* @return The content of header
* @see #configuration()
*/
private String header() {
final String name = this.env.param("license", "LICENSE.txt");
final URL url = this.toUrl(name);
final String content;
try {
content = new IoCheckedText(
new Replaced(
new Trimmed(
new TextOf(
url.openStream()
)
),
"[\\r\\n]+$",
""
)
).asString();
} catch (final IOException ex) {
throw new IllegalStateException("Failed to read license", ex);
}
final StringBuilder builder = new StringBuilder(Tv.HUNDRED);
final String eol = System.getProperty("line.separator");
builder.append("/*").append(eol);
for (final String line
: StringUtils.splitPreserveAllTokens(content, eol)) {
builder.append(" *");
if (!line.trim().isEmpty()) {
builder.append(' ').append(line.trim());
}
builder.append(eol);
}
builder.append(" */");
final String license = builder.toString();
Logger.debug(this, "LICENSE found: %s", url);
Logger.debug(
this,
"LICENSE full text after parsing:\n%s",
license
);
return license;
}
/**
* Convert file name to URL.
* @param name The name of file
* @return The URL
* @see #header()
*/
private URL toUrl(final String name) {
final URL url;
if (name.startsWith("file:")) {
try {
url = Paths.get(name.substring(5)).toUri().toURL();
} catch (final MalformedURLException ex) {
throw new IllegalStateException("Invalid URL", ex);
}
} else {
url = this.env.classloader().getResource(name);
if (url == null) {
throw new IllegalStateException(
String.format(
"'%s' resource is not found in classpath",
name
)
);
}
}
return url;
}
}