2018-02-21 14:28:25 +00:00
ROUTINE DEVELOPMENT
2019-02-02 14:00:50 +00:00
**Remember to check pull requests as well as issues in github.**
2018-02-21 14:28:25 +00:00
Default:
2022-03-12 01:55:41 +00:00
cmake -DMAINTAINER_MODE=1 -DBUILD_STATIC_LIBS=0 \
-DCMAKE_BUILD_TYPE=RelWithDebInfo ..
2021-12-17 12:31:58 +00:00
2018-02-21 14:28:25 +00:00
Debugging:
2022-03-12 01:55:41 +00:00
cmake -DMAINTAINER_MODE=1 -DBUILD_SHARED_LIBS=0 \
-DCMAKE_BUILD_TYPE=Debug ..
2018-02-21 14:28:25 +00:00
2019-07-13 14:38:27 +00:00
Profiling:
2022-03-12 01:55:41 +00:00
CFLAGS=-pg LDFLAGS=-pg \
2022-03-12 22:32:05 +00:00
cmake -DMAINTAINER_MODE=1 -DBUILD_SHARED_LIBS=0 \
-DCMAKE_BUILD_TYPE=Debug ..
2019-07-13 14:38:27 +00:00
Then run `gprof gmon.out`. Note that gmon.out is not cumulative.
2018-02-21 14:28:25 +00:00
Memory checks:
2022-03-12 01:55:41 +00:00
CFLAGS="-fsanitize=address -fsanitize=undefined" \
CXXFLAGS="-fsanitize=address -fsanitize=undefined" \
2018-12-17 16:51:38 +00:00
LDFLAGS="-fsanitize=address -fsanitize=undefined" \
2022-03-12 01:55:41 +00:00
CC=clang CXX=clang++ \
2022-03-12 22:32:05 +00:00
cmake -DMAINTAINER_MODE=1 -DBUILD_SHARED_LIBS=0 \
-DCMAKE_BUILD_TYPE=Debug ..
2019-11-17 03:29:00 +00:00
2022-03-12 01:54:07 +00:00
Windows:
../cmake-win {mingw|msvc} maint
2022-03-12 22:32:05 +00:00
See ./build-scripts for other ways to run the build for different
configurations.
2022-02-26 12:13:36 +00:00
VERSIONS
* The version number on the main branch is whatever the version would
be if the top of the branch were released. If the most recent
release is version a.b.c, then
* If there are any ABI-breaking changes since the last release,
main's version is a+1.0.0
* Else if there is any new public API, main's version is a.b+1.0
* Else if there are any code changes, main's version is a.b.c+1
* Whenever we bump the version number, bump shared library versions as
well.
* Every released major/minor version has an a.b branch which is used
primarily for documentation but could potentially be used to create
a new patch release after main has moved on. We don't do that as a
rule, but there's no reason we couldn't do it if main had unreleased
ABI/API changes that were still in flux and an important bug fix was
needed on the most recent release. In that case, a release can be
cut from a release branch and then either main can be rebased from
there or the changes can be merged back, depending on the amount of
drift.
2021-12-19 18:12:11 +00:00
CHECKING DOCS ON readthedocs
To check docs on readthedocs.io without running all of CI, push to the
doc-check branch. Then visit https://qpdf.readthedocs.io/en/doc-check/
Building docs from pull requests is also enabled.
2019-06-13 13:28:38 +00:00
GOOGLE OSS-FUZZ
2019-08-29 01:47:03 +00:00
* See ../misc/fuzz (not in repo) for unfixed, downloaded fuzz test cases
2019-06-14 16:34:23 +00:00
* qpdf project: https://github.com/google/oss-fuzz/tree/master/projects/qpdf
2020-10-22 09:11:36 +00:00
* Adding new test cases: download the file from oss-fuzz and drop it
2022-03-05 13:21:30 +00:00
in fuzz/qpdf_extra/issue-number.fuzz. When ready to include it, add
to fuzz/CMakeLists.txt. Until ready to use, the file can be stored
anywhere, and the absolute path can be passed to the reproduction
code as described below.
2020-10-22 09:11:36 +00:00
2019-06-13 13:28:38 +00:00
* To test locally, see https://github.com/google/oss-fuzz/tree/master/docs/,
2019-06-14 16:34:23 +00:00
especially new_project_guide.md. Summary:
2019-06-13 13:28:38 +00:00
2019-06-14 16:34:23 +00:00
Clone the oss-fuzz project. From the root directory of the repository:
2019-06-13 13:28:38 +00:00
2020-10-22 09:11:36 +00:00
python3 infra/helper.py build_image --pull qpdf
2022-03-12 15:05:36 +00:00
python3 infra/helper.py build_fuzzers [ --sanitizer memory|undefined|address ] qpdf [path-to-qpdf-source]
2020-10-22 09:11:36 +00:00
python3 infra/helper.py check_build qpdf
python3 infra/helper.py build_fuzzers --sanitizer coverage qpdf
python3 infra/helper.py coverage qpdf
2018-02-21 14:28:25 +00:00
2019-08-29 01:47:03 +00:00
To reproduce a test case, build with the correct sanitizer, then run
2020-10-22 09:11:36 +00:00
python3 infra/helper.py reproduce qpdf <specific-fuzzer> testcase
2019-08-29 01:47:03 +00:00
where fuzzer is the fuzzer used in the crash.
2019-06-14 16:34:23 +00:00
The fuzzer is in build/out/qpdf. It can be run with a directory as
an argument to run against files in a directory. You can use
qpdf_fuzzer -merge=1 cur new >& /dev/null&
to add any files from new into cur if they increase coverage. You
need to do this with the coverage build (the one with
--sanitizer coverage)
* General documentation: http://libfuzzer.info
* Build status: https://oss-fuzz-build-logs.storage.googleapis.com/index.html
* Project status: https://oss-fuzz.com/ (private -- log in with Google account)
* Latest corpus:
gs://qpdf-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/qpdf_fuzzer/latest.zip
2019-11-17 03:29:00 +00:00
2018-02-21 14:28:25 +00:00
CODING RULES
2022-04-09 16:22:46 +00:00
* Code is formatted with clang-format >= 15. See .clang-format and the
"Code Formatting" section in manual/contributing.rst for details.
See also "CODE FORMATTING" below.
2022-02-04 21:31:31 +00:00
* In a source file, include the header file that declares the source
class first followed by a blank line. If a config file is needed
first, put a blank line between that and the header followed by
another blank line. This assures that each header file is included
first at least once, thereby ensuring that it explicitly includes
all the headers it needs, which in turn alleviates lots of header
ordering problems. The blank line ensures that formatters don't
2022-02-05 00:44:10 +00:00
mess this up by resorting the headers.
2022-02-04 21:31:31 +00:00
2018-02-21 14:28:25 +00:00
* Avoid atoi. Use QUtil::string_to_int instead. It does
overflow/underflow checking.
2022-02-11 12:17:51 +00:00
* Avoid certain functions that tend to be macros or create compilation
errors on some platforms. Known cases: strcasecmp, abs. Avoid min
and max. If needed, std::min and std::max are okay to use in C++
code with <algorithm> included.
2018-02-21 14:28:25 +00:00
* Remember to avoid using `operator[]` with `std::string` or
`std::vector`. Instead, use `at()`. See README-hardening.md for
details.
2019-06-22 01:36:34 +00:00
* Use QIntC for type conversions -- see casting policy in docs.
2018-02-21 14:28:25 +00:00
2020-10-21 19:29:28 +00:00
* Remember to imbue ostringstreams with std::locale::classic() before
outputting numbers. This protects against the user's global locale
altering otherwise deterministic values. (See github issue #459.)
One could argue that error messages containing numbers should
respect the user's locale, but I think it's more important for
output to be consistent, since the messages in question are not
2020-10-26 23:42:23 +00:00
really targeted at the end user.
2020-10-21 19:29:28 +00:00
2019-06-22 00:27:31 +00:00
* Use QPDF_DLL on all methods that are to be exported in the shared
library/DLL. Use QPDF_DLL_CLASS for all classes whose type
information is needed. This is important for exception classes and
it seems also for classes that are intended to be subclassed across
the shared library boundary.
2019-06-22 01:32:47 +00:00
* Put private member variables in PointerHolder<Members> for all
2021-12-21 22:26:05 +00:00
public classes. Remember to use QPDF_DLL on ~Members(). Exception:
indirection through PointerHolder<Members> is expensive, so don't do
it for classes that are copied a lot, like QPDFObjectHandle and
QPDFObject.
* Traversal of objects is expensive. It's worth adding some complexity
to avoid needless traversals of objects.
* Avoid attaching too much metadata to objects and object handles
since those have to get copied around a lot.
2019-06-22 01:32:47 +00:00
2019-11-17 03:29:00 +00:00
2022-01-11 20:52:58 +00:00
HOW TO ADD A COMMAND-LINE ARGUMENT
2022-02-01 12:18:23 +00:00
QPDFJob is documented in three places:
* This section provides a quick reminder for how to add a command-line
argument
* generate_auto_job has a detailed explanation about how QPDFJob and
generate_auto_job work together
* The manual ("QPDFJob Design" in qpdf-job.rst) discusses the design
approach, rationale, and evolution of QPDFJob.
2022-01-11 20:52:58 +00:00
Command-line arguments are closely coupled with QPDFJob. To add a new
command-line argument, add the option to the appropriate table in
job.yml. This will automatically declare a method in the private
ArgParser class in QPDFJob_argv.cc which you have to implement. The
2022-02-01 12:18:23 +00:00
implementation should make calls to methods in QPDFJob via its Config
classes. Then, add the same option to either the no-json section of
job.yml if it is to be excluded from the job json structure, or add it
under the json structure to the place where it should appear in the
json structure.
In most cases, adding a new option will automatically declare and call
the appropriate Config method, which you then have to implement. If
you need a manual handler, you have to declare the option as manual in
job.yml and implement the handler yourself, though the automatically
generated code will declare it for you.
2022-01-11 20:52:58 +00:00
The build will fail until the new option is documented in
manual/cli.rst. To do that, create documentation for the option by
adding a ".. qpdf:option::" directive followed by a magic help comment
as described at the top of manual/cli.rst. Put this in the correct
help topic. Help topics roughly correspond with sections in that
chapter and are created using a special ".. help-topic" comment.
Follow the example of other options for style.
When done, the following should happen:
* qpdf --new-option should work as expected
* qpdf --help=--new-option should show the help from the comment in cli.rst
* qpdf --help=topic should list --new-option for the correct topic
* --new-option should appear in the manual
* --new-option should be in the command-line option index in the manual
2022-02-01 12:18:23 +00:00
* A Config method (in Config or one of the other Config classes in
QPDFJob) should exist that corresponds to the command-line flag
* The job JSON file should have a new key in the schema corresponding
to the new option
2022-01-11 20:52:58 +00:00
2018-02-21 14:28:25 +00:00
RELEASE PREPARATION
2021-01-04 21:01:09 +00:00
* Each year, update copyright notices. This will find all relevant
2022-02-04 21:36:22 +00:00
places (assuming current copyright is from last year):
2021-01-04 21:01:09 +00:00
git --no-pager grep -i -n -P "copyright.*$(expr $(date +%Y) - 1).*berkenbilt"
Also update the copyright in these places:
* debian package -- search for copyright.*berkenbilt in debian/copyright
* qtest-driver, TestDriver.pm in qtest source
2022-02-04 21:36:22 +00:00
Copyright last updated: 2022.
2018-02-21 14:28:25 +00:00
2020-10-25 21:59:34 +00:00
* Take a look at "External Libraries" in TODO to see if we need to
make any changes. There is still some automation work left to do, so
handling external-libs releases is still manual. See also
README-maintainer in external-libs.
2019-06-22 14:37:03 +00:00
* Check for open fuzz crashes at https://oss-fuzz.com
2020-04-16 16:38:12 +00:00
* Check lgtm: https://lgtm.com/projects/g/qpdf/qpdf/?mode=list
2019-02-02 14:00:50 +00:00
* Check all open issues and pull requests in github and the
2020-04-06 15:26:47 +00:00
sourceforge trackers. See ~/scripts/github-issues. Don't forget pull
2021-12-10 14:34:42 +00:00
requests. Note: If the location for reporting issues changes, do a
careful check of documentation and code to make sure any comments
that include the issue creation URL are updated.
2018-02-21 14:28:25 +00:00
* Check `TODO` file to make sure all planned items for the release are
done or retargeted.
2020-10-21 19:43:06 +00:00
* Check work `qpdf` project for private issues
2022-04-09 16:39:32 +00:00
* Make sure the code is formatted.
./format-code
2018-02-21 14:28:25 +00:00
* Run a spelling checker over the source code to catch errors in
variable names, strings, and comments.
2022-03-12 22:32:05 +00:00
./spell-check
2021-09-13 15:10:09 +00:00
This uses cspell. Install with `npm install -g cspell`. The output
of cspell is suitable for use with `M-x grep` in emacs. Add
exceptions to cSpell.json.
2018-02-21 14:28:25 +00:00
2022-03-12 22:32:05 +00:00
* If needed, run large file and image comparison tests by setting
these environment variables:
2018-02-21 14:28:25 +00:00
2022-03-12 22:32:05 +00:00
QPDF_LARGE_FILE_TEST_PATH=/full/path
QPDF_TEST_COMPARE_IMAGES=1
2018-02-21 14:28:25 +00:00
For Windows, use a Windows style path, not an MSYS path for large files.
* If any interfaces were added or changed, check C API to see whether
changes are appropriate there as well. If necessary, review the
casting policy in the manual, and ensure that integer types are
2021-11-20 15:35:50 +00:00
properly handled with QIntC or the appropriate cast. Remember to
ensure that any exceptions thrown by the library are caught and
converted. See `trap_errors` in qpdf-c.cc.
2018-02-21 14:28:25 +00:00
2022-02-26 12:13:36 +00:00
* Double check versions and shared library details. They should
already be up to date in the code.
2021-02-23 14:50:23 +00:00
* Make sure version numbers are consistent in the following locations:
2022-03-12 22:32:05 +00:00
* CMakeLists.txt
2022-02-08 21:54:03 +00:00
* include/qpdf/DLL.h
2021-12-18 16:19:20 +00:00
* manual/conf.py
2021-02-23 14:50:23 +00:00
`make_dist` verifies this consistency.
2022-02-26 12:13:36 +00:00
* Update release notes in manual. Look at diffs and ChangeLog.
Update release date in `manual/release-notes.rst`.
2021-03-04 20:20:36 +00:00
2022-02-26 12:13:36 +00:00
* Add a release entry to ChangeLog: "x.y.z: release"
2021-01-04 21:26:49 +00:00
2022-02-26 12:13:36 +00:00
* Commit title: "Prepare x.y.z release"
2021-03-04 20:20:36 +00:00
2020-04-06 15:26:47 +00:00
* Performance test is included with binary compatibility steps. Even
if releasing a new major release and not doing binary compatibility
testing, do performance testing.
* Test for performance and binary compatibility:
2022-03-15 01:39:29 +00:00
./abi-perf-test release-<old> @
Prefix with SKIP_PERF=1 to skip performance test.
Prefix with SKIP_TESTS=1 to skip test suite run.
See "ABI checks" for details about the process.
End state:
* /tmp/check-abi/old contains old sizes and library
* /tmp/check-abi/new contains new sizes and library
* run check_abi manually to compare
2018-06-23 01:12:26 +00:00
2020-04-08 23:33:10 +00:00
* Run pikepdf's test suite. Do this in a separate shell.
cd ...qpdf-source-tree...
export QPDF_SOURCE_TREE=$PWD
2022-03-14 23:14:26 +00:00
export QPDF_BUILD_LIBDIR=$QPDF_SOURCE_TREE/build/libqpdf
export LD_LIBRARY_PATH=$QPDF_BUILD_LIBDIR
2020-04-08 23:33:10 +00:00
cd /tmp/z
git clone git@github.com:pikepdf/pikepdf
virtualenv v
source v/bin/activate
cd pikepdf
2022-02-08 19:37:32 +00:00
pip3 install --upgrade pip
pip3 install '.[test]'
2020-04-08 23:33:10 +00:00
rehash
pip3 install .
pytest -n auto
2022-03-18 01:06:23 +00:00
* Run package tests:
cmake -S . -B build.tmp -DCMAKE_BUILD_TYPE=RelWithDebInfo
cmake --build build.tmp -j$(nproc)
DESTDIR=/tmp/inst cmake --install build.tmp
env PKG_CONFIG_PATH=/tmp/inst/usr/local/lib/pkgconfig \
CMAKE_PREFIX_PATH=/tmp/inst/usr/local \
./pkg-test/run-all
2018-02-21 14:28:25 +00:00
CREATING A RELEASE
2021-11-16 20:41:34 +00:00
* Push to main. This will create an artifact called distribution
2020-10-21 19:33:20 +00:00
which will contain all the distribution files. Download these,
verify the checksums from the job output, rename to remove -ci from
2022-03-12 22:32:05 +00:00
the names, and extract to the release archive area.
2018-02-25 14:27:14 +00:00
2018-10-13 16:24:46 +00:00
* Sign the source distribution:
2018-02-21 14:28:25 +00:00
version=x.y.z
2018-10-13 16:24:46 +00:00
gpg --detach-sign --armor qpdf-$version.tar.gz
2018-02-21 14:28:25 +00:00
2022-03-18 01:06:23 +00:00
* Build and test the debian package. This includes running autopkgtest.
2018-02-21 14:28:25 +00:00
2021-01-18 22:36:54 +00:00
* Add a calendar reminder to check the status of the debian package to
make sure it is transitioning properly and to resolve any issues.
2022-03-12 22:32:05 +00:00
* From the release archive area, sign the releases.
2018-02-21 14:28:25 +00:00
2020-10-25 21:59:34 +00:00
\rm -f *.sha256
2018-02-21 14:28:25 +00:00
files=(*)
2020-10-25 21:59:34 +00:00
sha256sum ${files[*]} >| qpdf-$version.sha256
gpg --clearsign --armor qpdf-$version.sha256
mv qpdf-$version.sha256.asc qpdf-$version.sha256
2018-02-25 14:27:14 +00:00
chmod 444 *
chmod 555 *.AppImage
2018-02-21 14:28:25 +00:00
* When creating releases on github and sourceforge, remember to copy
`README-what-to-download.md` separately onto the download area if
needed.
2021-11-16 20:41:34 +00:00
* Ensure that the main branch has been pushed to github. The
2019-02-02 02:28:55 +00:00
rev-parse command below should show the same commit hash for all its
2019-01-07 14:08:41 +00:00
arguments. Create and push a signed tag. This should be run with
2021-11-16 20:41:34 +00:00
HEAD pointing to the tip of main.
2018-02-25 14:27:14 +00:00
2021-11-16 22:02:35 +00:00
git rev-parse qpdf/main @
2022-03-19 12:57:47 +00:00
git tag -s v$version @ -m"qpdf $version"
git push qpdf v$version
2018-02-25 14:27:14 +00:00
2021-12-19 21:53:37 +00:00
* Update documentation branches
git push qpdf @:$(echo $version | sed -E 's/\.[^\.]+$//')
git push qpdf @:stable
* If this is an x.y.0 release, visit
https://readthedocs.org/projects/qpdf/versions/ (log in with
github), and activate the latest major/minor version
2018-02-21 14:28:25 +00:00
* Create a github release after pushing the tag. `gcurl` is an alias
that includes the auth token.
# Create release
2021-01-05 16:20:45 +00:00
GITHUB_TOKEN=$(qdata-show cred github-token)
function gcurl() { curl -H "Authorization: token $GITHUB_TOKEN" ${1+"$@"}; }
2022-03-19 12:57:47 +00:00
url=$(gcurl -s -XPOST https://api.github.com/repos/qpdf/qpdf/releases -d'{"tag_name": "v'$version'", "name": "qpdf '$version'", "draft": true}' | jq -r '.url')
2018-02-21 14:28:25 +00:00
# Get upload url
upload_url=$(gcurl -s $url | jq -r '.upload_url' | sed -E -e 's/\{.*\}//')
echo $upload_url
# Upload all the files. You can add a label attribute too, which
# overrides the name.
for i in *; do
mime=$(file -b --mime-type $i)
gcurl -H "Content-Type: $mime" --data-binary @$i "$upload_url?name=$i"
done
If needed, go onto github and make any manual updates such as
indicating a pre-release, adding release notes, etc.
2021-11-02 20:39:29 +00:00
Template for release notes:
```
This is qpdf version x.y.z. (Brief description)
2021-12-19 21:53:37 +00:00
For a full list of changes from previous releases, please see the [release notes](https://qpdf.readthedocs.io/en/stable/release-notes.html). See also [README-what-to-download](./README-what-to-download.md) for details about the available source and binary distributions.
2021-11-02 20:39:29 +00:00
```
2018-02-21 14:28:25 +00:00
# Publish release
gcurl -XPOST $url -d'{"draft": false}'
2019-11-17 03:29:00 +00:00
* Upload files to sourceforge.
rsync -vrlcO ./ jay_berkenbilt,qpdf@frs.sourceforge.net:/home/frs/project/q/qp/qpdf/qpdf/$version/
* On sourceforge, make the source package the default for all but
Windows, and make the 32-bit mingw build the default for Windows.
* Publish a news item manually on sourceforge.
2018-02-21 14:28:25 +00:00
2020-04-08 01:36:48 +00:00
* Upload the debian package and Ubuntu ppa backports.
2018-02-21 14:28:25 +00:00
* Email the qpdf-announce list.
OTHER NOTES
2019-06-22 20:38:17 +00:00
For local iteration on the AppImage generation, it works to just
2022-03-12 01:54:48 +00:00
./build-scripts/build-appimage and get the resulting AppImage from the
distribution directory. You can pass additional arguments to
build-appimage, which passes them along to to docker.
Use -e SKIP_TESTS=1 to skip the test suite.
Use -ti -e RUN_SHELL=1 to run a shell instead of the build script.
2018-02-21 14:28:25 +00:00
2022-04-02 17:59:01 +00:00
To iterate on the scripts directly in the source tree, you can run
docker build -t qpdfbuild appimage
docker run --privileged --rm -ti -e SKIP_TESTS=1 -e RUN_SHELL=1 \
-v $PWD/..:/tmp/build ${1+"$@"} qpdfbuild
This will put you at a shell prompt inside the container with your
current directory set to the top of the source tree and your uid equal
to the owner of the parent directory source tree.
2022-04-04 12:06:41 +00:00
Note: this will leave some extra files (like .bash_history) in the
parent directory of the source tree. You will want to clean those up.
2019-11-17 03:29:00 +00:00
2022-03-12 22:32:05 +00:00
LOCAL WINDOWS TESTING PROCEDURE
2018-02-21 14:28:25 +00:00
2022-03-12 22:32:05 +00:00
This is what I do for routine testing on Windows.
2018-02-21 14:28:25 +00:00
2022-03-12 22:32:05 +00:00
* From Windows, git clone from my Linux clone, and unzip
`external-libs`.
2018-02-21 14:28:25 +00:00
2022-03-12 22:32:05 +00:00
* Start a command-line shell for x86_64 and x86 tools from Visual
studio. From there, start C:\msys64\mingw64 twice and
C:\msys64\mingw32 twice.
2018-02-21 14:28:25 +00:00
2022-03-12 22:32:05 +00:00
* Create a build directory for each of the four permutations. Then, in
each build directory, run `../cmake-win <tool> maint`.
2015-05-24 20:46:36 +00:00
2022-03-12 22:32:05 +00:00
* Run `cmake --build . -j4`. For MSVC, add `--config Release`
2015-05-24 20:46:36 +00:00
2022-03-12 22:32:05 +00:00
* Test with with msvc: `ctest --verbose -C Release`
2015-05-24 20:46:36 +00:00
2022-03-12 22:32:05 +00:00
* Test with mingw: `ctest --verbose -C RelWithDebInfo`
2021-12-18 20:44:54 +00:00
DOCS ON readthedocs.org
* Registered for an account at readthedocs.org with my github account
* Project page: https://readthedocs.org/projects/qpdf/
* Docs: https://qpdf.readthedocs.io/
* Admin -> Settings
* Set project home page
2021-12-19 21:53:37 +00:00
* Advanced
* Show version warning
* Default version: stable
2021-12-18 20:44:54 +00:00
* Email Notifications: set email address for build failures
At this time, there is nothing in .github/workflows to support this.
It's all set up as an integration directly between github and
readthedocs.
2021-12-19 21:53:37 +00:00
The way readthedocs.org does stable and versions doesn't exactly work
for qpdf. My tagging convention is different from what they expect,
and I don't need versions for every point release. I have the
following branching strategy to support docs:
* x.y -- points to the latest x.y.z release
* stable -- points to the latest release
The release process includes updating the approach branches and
activating versions.
2022-03-12 22:32:05 +00:00
CMAKE notes
To verify the various cmake options and their interactions, several
manual tests were done:
* Break installed qpdf executables (qpdf, fix-qdf, zlib-flate), the
shared library, and DLL.h to ensure that other qpdf installations do
not interfere with building from source
* Build static only and shared only
* Install separate components separately
* Build only HTML docs and only PDF docs
* Try MAINTAINER_MODE without BUILD_DOC
We are using RelWithDebInfo for mingw and other non-Windows builds but
Release for MSVC. There are linker warnings if MSVC is built with
RelWithDebInfo when using external-libs.
2022-03-15 01:39:29 +00:00
ABI checks
Until the conversion of the build to cmake, we relied on running the
test suite with old executables and a new library. When QPDFJob was
introduced, this method got much less reliable since a lot of public
API doesn't cross the shared library boundary. Also, when switching to
cmake, we wanted a stronger check that the library had the expected
ABI.
Our ABI check now consists of three parts:
* The same check as before: run the test suite with old executables
and a new library
* Do a literal comparison of the symbols in the old and new shared
libraries -- this is a strong test of ABI change
* Do a check to ensure that object sizes didn't change -- even with no
changes to the API of exported functions, size changes break API
The combination of these checks is pretty strong, though there are
still things that could potentially break ABI, such as
* Changes to the types of public or protected data members without
changing the size
* Changes to the meanings of parameters with changing the signature
Not breaking ABI/API still requires care.
The check_abi script is responsible for performing many of these
steps. See comments in check_abi for additional notes. Running
"check_abi check-sizes" is run by ctest on Linux when CHECK_SIZES is
on.
2022-04-09 16:22:46 +00:00
CODE FORMATTING
* Emacs doesn't indent breaking strings concatenated with + over
lines but clang-format does. It's clearer with clang-format. To
get emacs and clang-format to agree, parenthesize the expression
that builds the concatenated string.
* With
long_function(long_function(
args)
clang-format anchors relative to the first function, and emacs
anchors relative to the second function. Use
long_function(
// line-break
long_function(
args)
to resolve.
In the revision control history, there is a commit around April 3,
2022 with the title "Update some code manually to get better
formatting results" that shows several examples of changing code so
that clang-format produces several results. (In git this is commit
77e889495f7c513ba8677df5fe662f08053709eb.)
The commit that has the bulk of the automatic reformatting is
12f1eb15ca3fed6310402847559a7c99d3c77847. This could go in a
blame.ignoreRevsFile file for `git blame` if needed.