toTop |
Last Published: 2024-02-28
- |
Version: 10.14.0
+
toTop |
Last Published: 2024-03-11
+ |
Version: 10.14.1
@@ -91,7 +91,7 @@ Package com.google.checkstyle.test.base
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule21filename/package-frame.html b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule21filename/package-frame.html
index a7a8e61d41..960acbb380 100644
--- a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule21filename/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule21filename/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter2filebasic.rule21filename
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter2filebasic.rule21filename
diff --git a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule21filename/package-summary.html b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule21filename/package-summary.html
index 623cc32fbb..5850cb4e10 100644
--- a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule21filename/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule21filename/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter2filebasic.rule21filename
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter2filebasic.rule21filename
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -136,7 +136,7 @@ Package com.google.checkstyle.test.chapter2fil
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule231filetab/package-frame.html b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule231filetab/package-frame.html
index 4125546ba6..c58605b80b 100644
--- a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule231filetab/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule231filetab/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter2filebasic.rule231filetab
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter2filebasic.rule231filetab
diff --git a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule231filetab/package-summary.html b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule231filetab/package-summary.html
index 6810659eaa..ff3e04e390 100644
--- a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule231filetab/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule231filetab/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter2filebasic.rule231filetab
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter2filebasic.rule231filetab
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -96,7 +96,7 @@ Package com.google.checkstyle.test.chapter2fil
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule232specialescape/package-frame.html b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule232specialescape/package-frame.html
index e5db4a7869..7f3ea5b328 100644
--- a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule232specialescape/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule232specialescape/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter2filebasic.rule232specialescape
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter2filebasic.rule232specialescape
diff --git a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule232specialescape/package-summary.html b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule232specialescape/package-summary.html
index 73186929d5..cac1127b65 100644
--- a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule232specialescape/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule232specialescape/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter2filebasic.rule232specialescape
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter2filebasic.rule232specialescape
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -91,7 +91,7 @@ Package com.google.checkstyle.test.chapter2fil
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule233nonascii/package-frame.html b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule233nonascii/package-frame.html
index 2290bc1b5c..264bb6eed6 100644
--- a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule233nonascii/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule233nonascii/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter2filebasic.rule233nonascii
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter2filebasic.rule233nonascii
diff --git a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule233nonascii/package-summary.html b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule233nonascii/package-summary.html
index a0fd37337a..d94da699c2 100644
--- a/xref-test/com/google/checkstyle/test/chapter2filebasic/rule233nonascii/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter2filebasic/rule233nonascii/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter2filebasic.rule233nonascii
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter2filebasic.rule233nonascii
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -86,7 +86,7 @@ Package com.google.checkstyle.test.chapter2fil
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule32packagestate/package-frame.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule32packagestate/package-frame.html
index 2fb3aba0d3..9030a524c0 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule32packagestate/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule32packagestate/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule32packagestate
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule32packagestate
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule32packagestate/package-summary.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule32packagestate/package-summary.html
index 4a0f94a256..0d23d2ba8b 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule32packagestate/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule32packagestate/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule32packagestate
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule32packagestate
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -86,7 +86,7 @@ Package com.google.checkstyle.test.chapter3fil
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule331nowildcard/package-frame.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule331nowildcard/package-frame.html
index 2635680de7..ac3c6c4e0d 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule331nowildcard/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule331nowildcard/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule331nowildcard
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule331nowildcard
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule331nowildcard/package-summary.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule331nowildcard/package-summary.html
index 2c63bccb12..50ee71bc22 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule331nowildcard/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule331nowildcard/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule331nowildcard
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule331nowildcard
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -86,7 +86,7 @@ Package com.google.checkstyle.test.chapter3fil
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule332nolinewrap/package-frame.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule332nolinewrap/package-frame.html
index 1f2d951305..1a0853e2aa 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule332nolinewrap/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule332nolinewrap/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule332nolinewrap
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule332nolinewrap
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule332nolinewrap/package-summary.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule332nolinewrap/package-summary.html
index 4eee38cee8..beecb02517 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule332nolinewrap/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule332nolinewrap/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule332nolinewrap
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule332nolinewrap
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -91,7 +91,7 @@ Package com.google.checkstyle.test.chapter3fil
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule333orderingandspacing/package-frame.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule333orderingandspacing/package-frame.html
index e5db9abba0..8b3e651df9 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule333orderingandspacing/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule333orderingandspacing/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule333orderingandspacing
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule333orderingandspacing
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule333orderingandspacing/package-summary.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule333orderingandspacing/package-summary.html
index bdff1ac907..24aac31308 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule333orderingandspacing/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule333orderingandspacing/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule333orderingandspacing
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule333orderingandspacing
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -121,7 +121,7 @@ Package com.google.checkstyle.test.chapter3fil
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule341onetoplevel/package-frame.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule341onetoplevel/package-frame.html
index 7d0e1dc873..614efe85fa 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule341onetoplevel/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule341onetoplevel/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule341onetoplevel
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule341onetoplevel
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule341onetoplevel/package-summary.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule341onetoplevel/package-summary.html
index fbd01ba1da..cbf0d2f4bf 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule341onetoplevel/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule341onetoplevel/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule341onetoplevel
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule341onetoplevel
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -156,7 +156,7 @@ Package com.google.checkstyle.test.chapter3fil
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3421overloadsplit/package-frame.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3421overloadsplit/package-frame.html
index 69d12a34a3..d93e74e80c 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3421overloadsplit/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3421overloadsplit/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule3421overloadsplit
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule3421overloadsplit
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3421overloadsplit/package-summary.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3421overloadsplit/package-summary.html
index 1d7a901379..1450adf401 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3421overloadsplit/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3421overloadsplit/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule3421overloadsplit
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule3421overloadsplit
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -101,7 +101,7 @@ Package com.google.checkstyle.test.chapter3fil
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3sourcefile/package-frame.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3sourcefile/package-frame.html
index 18f5b71d90..193e3b6254 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3sourcefile/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3sourcefile/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule3sourcefile
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule3sourcefile
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3sourcefile/package-summary.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3sourcefile/package-summary.html
index 71181b45cf..59def34d1c 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3sourcefile/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/rule3sourcefile/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.rule3sourcefile
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.rule3sourcefile
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -116,7 +116,7 @@ Package com.google.checkstyle.test.chapter3fil
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/toolongpackagetotestcoveragegooglesjavastylerule/package-frame.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/toolongpackagetotestcoveragegooglesjavastylerule/package-frame.html
index 0f94e2bbe5..19f2b9da05 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/toolongpackagetotestcoveragegooglesjavastylerule/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/toolongpackagetotestcoveragegooglesjavastylerule/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.toolongpackagetotestcoveragegooglesjavastylerule
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.toolongpackagetotestcoveragegooglesjavastylerule
diff --git a/xref-test/com/google/checkstyle/test/chapter3filestructure/toolongpackagetotestcoveragegooglesjavastylerule/package-summary.html b/xref-test/com/google/checkstyle/test/chapter3filestructure/toolongpackagetotestcoveragegooglesjavastylerule/package-summary.html
index 453486f1bb..1cd52e7b15 100644
--- a/xref-test/com/google/checkstyle/test/chapter3filestructure/toolongpackagetotestcoveragegooglesjavastylerule/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter3filestructure/toolongpackagetotestcoveragegooglesjavastylerule/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter3filestructure.toolongpackagetotestcoveragegooglesjavastylerule
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter3filestructure.toolongpackagetotestcoveragegooglesjavastylerule
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -81,7 +81,7 @@ Package com.google.checkstyle.test.chapter3fil
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule411bracesareused/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule411bracesareused/package-frame.html
index 6c8e82473f..031654e6ba 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule411bracesareused/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule411bracesareused/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule411bracesareused
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule411bracesareused
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule411bracesareused/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule411bracesareused/package-summary.html
index d9b85d6aa7..a2be1b6017 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule411bracesareused/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule411bracesareused/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule411bracesareused
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule411bracesareused
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -96,7 +96,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule412nonemptyblocks/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule412nonemptyblocks/package-frame.html
index 6817f2371f..4372e40ff9 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule412nonemptyblocks/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule412nonemptyblocks/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule412nonemptyblocks
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule412nonemptyblocks
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule412nonemptyblocks/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule412nonemptyblocks/package-summary.html
index f15f1b4520..6782cf8700 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule412nonemptyblocks/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule412nonemptyblocks/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule412nonemptyblocks
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule412nonemptyblocks
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -296,7 +296,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule413emptyblocks/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule413emptyblocks/package-frame.html
index 81274900b4..4932c7f2ec 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule413emptyblocks/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule413emptyblocks/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule413emptyblocks
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule413emptyblocks
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule413emptyblocks/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule413emptyblocks/package-summary.html
index f8ab6f63c4..c133bed6af 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule413emptyblocks/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule413emptyblocks/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule413emptyblocks
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule413emptyblocks
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -181,7 +181,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule42blockindentation/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule42blockindentation/package-frame.html
index 5fa4f0267f..f1b9abb535 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule42blockindentation/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule42blockindentation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule42blockindentation
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule42blockindentation
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule42blockindentation/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule42blockindentation/package-summary.html
index 2700ec7d9b..23125add11 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule42blockindentation/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule42blockindentation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule42blockindentation
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule42blockindentation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -196,7 +196,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule43onestatement/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule43onestatement/package-frame.html
index ad7def8a7f..e61b9c09c4 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule43onestatement/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule43onestatement/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule43onestatement
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule43onestatement
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule43onestatement/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule43onestatement/package-summary.html
index 421d77d5aa..2b90d709d1 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule43onestatement/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule43onestatement/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule43onestatement
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule43onestatement
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -91,7 +91,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule44columnlimit/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule44columnlimit/package-frame.html
index 75a36b136c..84371e5f86 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule44columnlimit/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule44columnlimit/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule44columnlimit
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule44columnlimit
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule44columnlimit/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule44columnlimit/package-summary.html
index 82353b0aa7..b7951138fc 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule44columnlimit/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule44columnlimit/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule44columnlimit
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule44columnlimit
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -96,7 +96,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule451wheretobreak/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule451wheretobreak/package-frame.html
index 264709ef04..572e067066 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule451wheretobreak/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule451wheretobreak/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule451wheretobreak
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule451wheretobreak
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule451wheretobreak/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule451wheretobreak/package-summary.html
index 5a4d36057b..14734ac8c6 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule451wheretobreak/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule451wheretobreak/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule451wheretobreak
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule451wheretobreak
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -191,7 +191,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule452indentcontinuationlines/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule452indentcontinuationlines/package-frame.html
index 0bd9fa56a7..11f07f46bb 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule452indentcontinuationlines/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule452indentcontinuationlines/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule452indentcontinuationlines
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule452indentcontinuationlines
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule452indentcontinuationlines/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule452indentcontinuationlines/package-summary.html
index 4dde3baa23..228c266dd9 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule452indentcontinuationlines/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule452indentcontinuationlines/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule452indentcontinuationlines
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule452indentcontinuationlines
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -191,7 +191,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule461verticalwhitespace/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule461verticalwhitespace/package-frame.html
index c4b601a62d..de765919f8 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule461verticalwhitespace/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule461verticalwhitespace/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule461verticalwhitespace
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule461verticalwhitespace
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule461verticalwhitespace/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule461verticalwhitespace/package-summary.html
index 7206050cd7..a6e9970024 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule461verticalwhitespace/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule461verticalwhitespace/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule461verticalwhitespace
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule461verticalwhitespace
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -116,7 +116,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule462horizontalwhitespace/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule462horizontalwhitespace/package-frame.html
index 7b027abbc0..b781682d74 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule462horizontalwhitespace/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule462horizontalwhitespace/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule462horizontalwhitespace
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule462horizontalwhitespace
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule462horizontalwhitespace/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule462horizontalwhitespace/package-summary.html
index 9e6a1e0135..f09bbad083 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule462horizontalwhitespace/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule462horizontalwhitespace/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule462horizontalwhitespace
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule462horizontalwhitespace
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -276,7 +276,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4821onevariableperline/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4821onevariableperline/package-frame.html
index e9a0f7baae..f1a0eb7d6d 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4821onevariableperline/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4821onevariableperline/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4821onevariableperline
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4821onevariableperline
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4821onevariableperline/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4821onevariableperline/package-summary.html
index 7db8d74f3b..24fcbaf59f 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4821onevariableperline/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4821onevariableperline/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4821onevariableperline
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4821onevariableperline
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -96,7 +96,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/InputVariableDeclarationUsageDistanceCheck.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/InputVariableDeclarationUsageDistanceCheck.html
index 181ab1f261..882da3af09 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/InputVariableDeclarationUsageDistanceCheck.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/InputVariableDeclarationUsageDistanceCheck.html
@@ -513,7 +513,7 @@
505 public int testIssue32_11(String toDir)
506 throws Exception
507 {
-508 int count = 0;
+508 int count = 0;
509 String[] files = {};
510
511 System.identityHashCode("Data archival started" );
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/VariableDeclarationUsageDistanceTest.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/VariableDeclarationUsageDistanceTest.html
index f8386ed55c..e1cc6d923e 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/VariableDeclarationUsageDistanceTest.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/VariableDeclarationUsageDistanceTest.html
@@ -51,17 +51,18 @@
43 "219:9: " + getCheckMessage(clazz, msgExt, "t" , 5, 3),
44 "483:9: " + getCheckMessage(clazz, msgExt, "myOption" , 7, 3),
45 "495:9: " + getCheckMessage(clazz, msgExt, "myOption" , 6, 3),
-46 };
-47
-48 final Configuration checkConfig =
-49 getModuleConfig("VariableDeclarationUsageDistance" );
-50 final String filePath = getPath("InputVariableDeclarationUsageDistanceCheck.java" );
-51
-52 final Integer[] warnList = getLinesWithWarn(filePath);
-53 verify(checkConfig, filePath, expected, warnList);
-54 }
-55
-56 }
+46 "508:9: " + getCheckMessage(clazz, msgExt, "count" , 4, 3),
+47 };
+48
+49 final Configuration checkConfig =
+50 getModuleConfig("VariableDeclarationUsageDistance" );
+51 final String filePath = getPath("InputVariableDeclarationUsageDistanceCheck.java" );
+52
+53 final Integer[] warnList = getLinesWithWarn(filePath);
+54 verify(checkConfig, filePath, expected, warnList);
+55 }
+56
+57 }
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/package-frame.html
index 7210f56bac..5b61676a05 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4822variabledistance
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4822variabledistance
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/package-summary.html
index e191d2631a..b9dddc1fc5 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4822variabledistance/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4822variabledistance
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4822variabledistance
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -86,7 +86,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4832nocstylearray/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4832nocstylearray/package-frame.html
index 32139feae2..6f7c4f63da 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4832nocstylearray/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4832nocstylearray/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4832nocstylearray
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4832nocstylearray
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4832nocstylearray/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4832nocstylearray/package-summary.html
index 6daaf65950..7a7e84233a 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4832nocstylearray/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4832nocstylearray/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4832nocstylearray
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4832nocstylearray
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -91,7 +91,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4841indentation/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4841indentation/package-frame.html
index 74dec3b889..efb0cf3b2a 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4841indentation/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4841indentation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4841indentation
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4841indentation
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4841indentation/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4841indentation/package-summary.html
index 5e5f07782b..fbce23ff46 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4841indentation/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4841indentation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4841indentation
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4841indentation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -231,7 +231,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4842fallthrough/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4842fallthrough/package-frame.html
index ac1880521c..0493fa3614 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4842fallthrough/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4842fallthrough/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4842fallthrough
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4842fallthrough
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4842fallthrough/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4842fallthrough/package-summary.html
index 831edb91ab..6665dfa90c 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4842fallthrough/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4842fallthrough/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4842fallthrough
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4842fallthrough
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -86,7 +86,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4843defaultcasepresent/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4843defaultcasepresent/package-frame.html
index f455414d2b..1a28659693 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4843defaultcasepresent/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4843defaultcasepresent/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4843defaultcasepresent
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4843defaultcasepresent
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4843defaultcasepresent/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4843defaultcasepresent/package-summary.html
index 64967e5c7d..d3fd9bcc8a 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4843defaultcasepresent/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4843defaultcasepresent/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4843defaultcasepresent
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4843defaultcasepresent
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -101,7 +101,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule485annotations/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule485annotations/package-frame.html
index c443fee414..0bb352dd97 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule485annotations/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule485annotations/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule485annotations
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule485annotations
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule485annotations/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule485annotations/package-summary.html
index f8b5410cb6..b2e1c2811e 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule485annotations/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule485annotations/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule485annotations
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule485annotations
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -166,7 +166,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4861blockcommentstyle/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4861blockcommentstyle/package-frame.html
index 2921b86897..9629f12f41 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4861blockcommentstyle/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4861blockcommentstyle/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4861blockcommentstyle
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4861blockcommentstyle
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4861blockcommentstyle/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4861blockcommentstyle/package-summary.html
index 2c6a161967..64847a0678 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule4861blockcommentstyle/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule4861blockcommentstyle/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule4861blockcommentstyle
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule4861blockcommentstyle
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -111,7 +111,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule487modifiers/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule487modifiers/package-frame.html
index 0c458dff11..96a3cc817e 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule487modifiers/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule487modifiers/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule487modifiers
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule487modifiers
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule487modifiers/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule487modifiers/package-summary.html
index 5fb96ccc4e..5343b3a9ca 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule487modifiers/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule487modifiers/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule487modifiers
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule487modifiers
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -136,7 +136,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule488numericliterals/package-frame.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule488numericliterals/package-frame.html
index 9ba95f5b99..d824ee426e 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule488numericliterals/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule488numericliterals/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule488numericliterals
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule488numericliterals
diff --git a/xref-test/com/google/checkstyle/test/chapter4formatting/rule488numericliterals/package-summary.html b/xref-test/com/google/checkstyle/test/chapter4formatting/rule488numericliterals/package-summary.html
index 1d9d6afc20..f2c40fbaf4 100644
--- a/xref-test/com/google/checkstyle/test/chapter4formatting/rule488numericliterals/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter4formatting/rule488numericliterals/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter4formatting.rule488numericliterals
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter4formatting.rule488numericliterals
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -101,7 +101,7 @@ Package com.google.checkstyle.test.chapter4for
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule51identifiernames/package-frame.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule51identifiernames/package-frame.html
index af6739a275..af5a5df45d 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule51identifiernames/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule51identifiernames/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule51identifiernames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule51identifiernames
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule51identifiernames/package-summary.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule51identifiernames/package-summary.html
index 5e63d8e53a..b19cd61e3e 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule51identifiernames/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule51identifiernames/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule51identifiernames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule51identifiernames
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -86,7 +86,7 @@ Package com.google.checkstyle.test.chapter5nam
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule521/package-frame.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule521/package-frame.html
index e9b465e721..6ce5395584 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule521/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule521/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule521
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule521
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule521/package-summary.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule521/package-summary.html
index de0b8897e5..e38991af53 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule521/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule521/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule521
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule521
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -81,7 +81,7 @@ Package com.google.checkstyle.test.chapter5nam
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule521_packagenames/package-frame.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule521_packagenames/package-frame.html
index 05d89d99ce..c2323cc1eb 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule521_packagenames/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule521_packagenames/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule521_packagenames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule521_packagenames
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule521_packagenames/package-summary.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule521_packagenames/package-summary.html
index 51ce7d8ef1..fca95e1c6d 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule521_packagenames/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule521_packagenames/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule521_packagenames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule521_packagenames
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -81,7 +81,7 @@ Package com.google.checkstyle.test.chapter5nam
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule521packageNamesCamelCase/package-frame.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule521packageNamesCamelCase/package-frame.html
index 21564020dd..89bc9987af 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule521packageNamesCamelCase/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule521packageNamesCamelCase/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule521packageNamesCamelCase
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule521packageNamesCamelCase
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule521packageNamesCamelCase/package-summary.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule521packageNamesCamelCase/package-summary.html
index 6c40cc85ac..9b423bf931 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule521packageNamesCamelCase/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule521packageNamesCamelCase/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule521packageNamesCamelCase
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule521packageNamesCamelCase
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -81,7 +81,7 @@ Package com.google.checkstyle.test.chapter5nam
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule521packagenames/package-frame.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule521packagenames/package-frame.html
index 156c33febf..3b91621c85 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule521packagenames/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule521packagenames/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule521packagenames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule521packagenames
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule521packagenames/package-summary.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule521packagenames/package-summary.html
index 09254fb648..03c824dce6 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule521packagenames/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule521packagenames/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule521packagenames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule521packagenames
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -86,7 +86,7 @@ Package com.google.checkstyle.test.chapter5nam
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule522typenames/package-frame.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule522typenames/package-frame.html
index b57ff1134d..d729fad696 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule522typenames/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule522typenames/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule522typenames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule522typenames
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule522typenames/package-summary.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule522typenames/package-summary.html
index 0baaba475a..8adeb336e4 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule522typenames/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule522typenames/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule522typenames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule522typenames
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -146,7 +146,7 @@ Package com.google.checkstyle.test.chapter5nam
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule523methodnames/package-frame.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule523methodnames/package-frame.html
index 3d503de499..ec5ecaf4f7 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule523methodnames/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule523methodnames/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule523methodnames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule523methodnames
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule523methodnames/package-summary.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule523methodnames/package-summary.html
index 0587b18301..c05da5bda8 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule523methodnames/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule523methodnames/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule523methodnames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule523methodnames
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -96,7 +96,7 @@ Package com.google.checkstyle.test.chapter5nam
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule525nonconstantfieldnames/package-frame.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule525nonconstantfieldnames/package-frame.html
index 9cf18d146a..92e1ccd499 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule525nonconstantfieldnames/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule525nonconstantfieldnames/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule525nonconstantfieldnames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule525nonconstantfieldnames
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule525nonconstantfieldnames/package-summary.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule525nonconstantfieldnames/package-summary.html
index 10b7e35a70..5855ccf526 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule525nonconstantfieldnames/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule525nonconstantfieldnames/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule525nonconstantfieldnames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule525nonconstantfieldnames
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -101,7 +101,7 @@ Package com.google.checkstyle.test.chapter5nam
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule526parameternames/package-frame.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule526parameternames/package-frame.html
index 88d03214ca..df0a3e1f69 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule526parameternames/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule526parameternames/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule526parameternames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule526parameternames
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule526parameternames/package-summary.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule526parameternames/package-summary.html
index 657af810e6..44882c21aa 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule526parameternames/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule526parameternames/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule526parameternames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule526parameternames
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -111,7 +111,7 @@ Package com.google.checkstyle.test.chapter5nam
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule527localvariablenames/package-frame.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule527localvariablenames/package-frame.html
index 29cd87e70c..ac90c859dc 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule527localvariablenames/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule527localvariablenames/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule527localvariablenames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule527localvariablenames
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule527localvariablenames/package-summary.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule527localvariablenames/package-summary.html
index dd7e0c14fa..40128cc403 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule527localvariablenames/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule527localvariablenames/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule527localvariablenames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule527localvariablenames
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -96,7 +96,7 @@ Package com.google.checkstyle.test.chapter5nam
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule528typevariablenames/package-frame.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule528typevariablenames/package-frame.html
index d5847099d7..80af5dfc51 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule528typevariablenames/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule528typevariablenames/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule528typevariablenames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule528typevariablenames
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule528typevariablenames/package-summary.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule528typevariablenames/package-summary.html
index 52ec968922..007c6780fc 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule528typevariablenames/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule528typevariablenames/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule528typevariablenames
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule528typevariablenames
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -206,7 +206,7 @@ Package com.google.checkstyle.test.chapter5nam
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule53camelcase/package-frame.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule53camelcase/package-frame.html
index 9501075da5..4a6e0b55de 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule53camelcase/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule53camelcase/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule53camelcase
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule53camelcase
diff --git a/xref-test/com/google/checkstyle/test/chapter5naming/rule53camelcase/package-summary.html b/xref-test/com/google/checkstyle/test/chapter5naming/rule53camelcase/package-summary.html
index 59c8caf2fa..a3b73d3e2a 100644
--- a/xref-test/com/google/checkstyle/test/chapter5naming/rule53camelcase/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter5naming/rule53camelcase/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter5naming.rule53camelcase
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter5naming.rule53camelcase
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -101,7 +101,7 @@ Package com.google.checkstyle.test.chapter5nam
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter6programpractice/rule62donotignoreexceptions/package-frame.html b/xref-test/com/google/checkstyle/test/chapter6programpractice/rule62donotignoreexceptions/package-frame.html
index 176a687ccb..3e284fb0fe 100644
--- a/xref-test/com/google/checkstyle/test/chapter6programpractice/rule62donotignoreexceptions/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter6programpractice/rule62donotignoreexceptions/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter6programpractice.rule62donotignoreexceptions
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter6programpractice.rule62donotignoreexceptions
diff --git a/xref-test/com/google/checkstyle/test/chapter6programpractice/rule62donotignoreexceptions/package-summary.html b/xref-test/com/google/checkstyle/test/chapter6programpractice/rule62donotignoreexceptions/package-summary.html
index 70cbbf17be..19ff7a63a8 100644
--- a/xref-test/com/google/checkstyle/test/chapter6programpractice/rule62donotignoreexceptions/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter6programpractice/rule62donotignoreexceptions/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter6programpractice.rule62donotignoreexceptions
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter6programpractice.rule62donotignoreexceptions
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -91,7 +91,7 @@ Package com.google.checkstyle.test.chapter6pro
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter6programpractice/rule64finalizers/package-frame.html b/xref-test/com/google/checkstyle/test/chapter6programpractice/rule64finalizers/package-frame.html
index 81d95a4bd5..f03e629f6c 100644
--- a/xref-test/com/google/checkstyle/test/chapter6programpractice/rule64finalizers/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter6programpractice/rule64finalizers/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter6programpractice.rule64finalizers
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter6programpractice.rule64finalizers
diff --git a/xref-test/com/google/checkstyle/test/chapter6programpractice/rule64finalizers/package-summary.html b/xref-test/com/google/checkstyle/test/chapter6programpractice/rule64finalizers/package-summary.html
index 8bb092e1c3..106e7a78b5 100644
--- a/xref-test/com/google/checkstyle/test/chapter6programpractice/rule64finalizers/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter6programpractice/rule64finalizers/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter6programpractice.rule64finalizers
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter6programpractice.rule64finalizers
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -146,7 +146,7 @@ Package com.google.checkstyle.test.chapter6pro
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule711generalform/package-frame.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule711generalform/package-frame.html
index a9c731f715..ef22162e3e 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule711generalform/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule711generalform/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule711generalform
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule711generalform
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule711generalform/package-summary.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule711generalform/package-summary.html
index 279abe2c27..0cd1ef78fe 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule711generalform/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule711generalform/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule711generalform
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule711generalform
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -121,7 +121,7 @@ Package com.google.checkstyle.test.chapter7jav
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule712paragraphs/package-frame.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule712paragraphs/package-frame.html
index 63d381bbf4..8eb1d3e0fe 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule712paragraphs/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule712paragraphs/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule712paragraphs
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule712paragraphs
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule712paragraphs/package-summary.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule712paragraphs/package-summary.html
index d647bd6141..6f38b08ae9 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule712paragraphs/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule712paragraphs/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule712paragraphs
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule712paragraphs
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -116,7 +116,7 @@ Package com.google.checkstyle.test.chapter7jav
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule713atclauses/package-frame.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule713atclauses/package-frame.html
index 537a9c024b..6a56a3c94d 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule713atclauses/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule713atclauses/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule713atclauses
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule713atclauses
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule713atclauses/package-summary.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule713atclauses/package-summary.html
index b06a154469..f65613f26c 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule713atclauses/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule713atclauses/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule713atclauses
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule713atclauses
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -201,7 +201,7 @@ Package com.google.checkstyle.test.chapter7jav
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule72thesummaryfragment/package-frame.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule72thesummaryfragment/package-frame.html
index 486b5f3735..fad22d766a 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule72thesummaryfragment/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule72thesummaryfragment/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule72thesummaryfragment
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule72thesummaryfragment
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule72thesummaryfragment/package-summary.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule72thesummaryfragment/package-summary.html
index fd1ca62b86..4bed7ab672 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule72thesummaryfragment/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule72thesummaryfragment/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule72thesummaryfragment
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule72thesummaryfragment
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -101,7 +101,7 @@ Package com.google.checkstyle.test.chapter7jav
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule731selfexplanatory/package-frame.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule731selfexplanatory/package-frame.html
index e509b93dea..8783195c9b 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule731selfexplanatory/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule731selfexplanatory/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule731selfexplanatory
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule731selfexplanatory
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule731selfexplanatory/package-summary.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule731selfexplanatory/package-summary.html
index 170ae7f568..dc81f6fc7e 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule731selfexplanatory/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule731selfexplanatory/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule731selfexplanatory
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule731selfexplanatory
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -111,7 +111,7 @@ Package com.google.checkstyle.test.chapter7jav
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule734nonrequiredjavadoc/package-frame.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule734nonrequiredjavadoc/package-frame.html
index fb513c1f65..21b54d13a7 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule734nonrequiredjavadoc/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule734nonrequiredjavadoc/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule734nonrequiredjavadoc
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule734nonrequiredjavadoc
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule734nonrequiredjavadoc/package-summary.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule734nonrequiredjavadoc/package-summary.html
index 8db4ff16ed..81e48d8813 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule734nonrequiredjavadoc/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule734nonrequiredjavadoc/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule734nonrequiredjavadoc
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule734nonrequiredjavadoc
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -111,7 +111,7 @@ Package com.google.checkstyle.test.chapter7jav
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule73wherejavadocrequired/package-frame.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule73wherejavadocrequired/package-frame.html
index c8a8240ec2..a7fc8a23a8 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule73wherejavadocrequired/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule73wherejavadocrequired/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule73wherejavadocrequired
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule73wherejavadocrequired
diff --git a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule73wherejavadocrequired/package-summary.html b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule73wherejavadocrequired/package-summary.html
index 2d889c364a..33eece16f6 100644
--- a/xref-test/com/google/checkstyle/test/chapter7javadoc/rule73wherejavadocrequired/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/chapter7javadoc/rule73wherejavadocrequired/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.chapter7javadoc.rule73wherejavadocrequired
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.chapter7javadoc.rule73wherejavadocrequired
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -236,7 +236,7 @@ Package com.google.checkstyle.test.chapter7jav
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/google/checkstyle/test/package-frame.html b/xref-test/com/google/checkstyle/test/package-frame.html
index 7c5e8f3230..6aac135401 100644
--- a/xref-test/com/google/checkstyle/test/package-frame.html
+++ b/xref-test/com/google/checkstyle/test/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.
diff --git a/xref-test/com/google/checkstyle/test/package-summary.html b/xref-test/com/google/checkstyle/test/package-summary.html
index 9decb0e183..30d1a687ab 100644
--- a/xref-test/com/google/checkstyle/test/package-summary.html
+++ b/xref-test/com/google/checkstyle/test/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.google.checkstyle.test.
+ checkstyle 10.14.1 Reference Package com.google.checkstyle.test.
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -91,7 +91,7 @@ Package com.google.checkstyle.test.
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/package-frame.html b/xref-test/com/package-frame.html
index 15d138bb5b..5fc13ac63a 100644
--- a/xref-test/com/package-frame.html
+++ b/xref-test/com/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.
+ checkstyle 10.14.1 Reference Package com.
diff --git a/xref-test/com/package-summary.html b/xref-test/com/package-summary.html
index f7f7329361..0321804b1c 100644
--- a/xref-test/com/package-summary.html
+++ b/xref-test/com/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.
+ checkstyle 10.14.1 Reference Package com.
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -76,7 +76,7 @@ Package com.
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/package-frame.html b/xref-test/com/puppycrawl/package-frame.html
index 84dc6c33dc..2998315f80 100644
--- a/xref-test/com/puppycrawl/package-frame.html
+++ b/xref-test/com/puppycrawl/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.
+ checkstyle 10.14.1 Reference Package com.puppycrawl.
diff --git a/xref-test/com/puppycrawl/package-summary.html b/xref-test/com/puppycrawl/package-summary.html
index 22e7543f6c..2392e99b25 100644
--- a/xref-test/com/puppycrawl/package-summary.html
+++ b/xref-test/com/puppycrawl/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.
+ checkstyle 10.14.1 Reference Package com.puppycrawl.
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -91,7 +91,7 @@ Package com.puppycrawl.
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/CheckerTest.html b/xref-test/com/puppycrawl/tools/checkstyle/CheckerTest.html
index 914a594f00..df0ddf531c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/CheckerTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/CheckerTest.html
@@ -1022,978 +1022,968 @@
1014
1015 @Test
1016 public void testClearLazyLoadCacheInDetailAST() throws Exception {
-1017 final DefaultConfiguration checkConfig1 =
-1018 createModuleConfig(CheckWhichDoesNotRequireCommentNodes.class );
-1019 final DefaultConfiguration checkConfig2 =
-1020 createModuleConfig(CheckWhichRequiresCommentNodes.class );
-1021
-1022 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
-1023 treeWalkerConfig.addChild(checkConfig1);
-1024 treeWalkerConfig.addChild(checkConfig2);
-1025
-1026 final DefaultConfiguration checkerConfig = createRootConfig(treeWalkerConfig);
-1027
-1028 final String filePath = getPath("InputCheckerClearDetailAstLazyLoadCache.java" );
-1029 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-1030
-1031 verify(checkerConfig, filePath, expected);
-1032 }
-1033
-1034 @Test
-1035 public void testCacheOnViolationSuppression() throws Exception {
-1036 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
-1037 final DefaultConfiguration violationCheck =
-1038 createModuleConfig(DummyFileSetViolationCheck.class );
+1017
+1018 final String filePath = getPath("InputCheckerClearDetailAstLazyLoadCache.java" );
+1019
+1020 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+1021 verifyWithInlineConfigParser(filePath, expected);
+1022 }
+1023
+1024 @Test
+1025 public void testCacheOnViolationSuppression() throws Exception {
+1026 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
+1027 final DefaultConfiguration violationCheck =
+1028 createModuleConfig(DummyFileSetViolationCheck.class );
+1029
+1030 final DefaultConfiguration filterConfig = createModuleConfig(SuppressionFilter.class );
+1031 filterConfig.addProperty("file" , getPath("InputCheckerSuppressAll.xml" ));
+1032
+1033 final DefaultConfiguration checkerConfig = createRootConfig(violationCheck);
+1034 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
+1035 checkerConfig.addChild(filterConfig);
+1036
+1037 final String fileViolationPath =
+1038 File.createTempFile("ViolationFile" , ".java" , temporaryFolder).getPath();
1039
-1040 final DefaultConfiguration filterConfig = createModuleConfig(SuppressionFilter.class );
-1041 filterConfig.addProperty("file" , getPath("InputCheckerSuppressAll.xml" ));
-1042
-1043 final DefaultConfiguration checkerConfig = createRootConfig(violationCheck);
-1044 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
-1045 checkerConfig.addChild(filterConfig);
-1046
-1047 final String fileViolationPath =
-1048 File.createTempFile("ViolationFile" , ".java" , temporaryFolder).getPath();
-1049
-1050 execute(checkerConfig, fileViolationPath);
+1040 execute(checkerConfig, fileViolationPath);
+1041
+1042 try (InputStream input = Files.newInputStream(cacheFile.toPath())) {
+1043 final Properties details = new Properties();
+1044 details.load(input);
+1045
+1046 assertWithMessage("suppressed violation file saved in cache" )
+1047 .that(details.getProperty(fileViolationPath))
+1048 .isNotNull();
+1049 }
+1050 }
1051
-1052 try (InputStream input = Files.newInputStream(cacheFile.toPath())) {
-1053 final Properties details = new Properties();
-1054 details.load(input);
-1055
-1056 assertWithMessage("suppressed violation file saved in cache" )
-1057 .that(details.getProperty(fileViolationPath))
-1058 .isNotNull();
-1059 }
-1060 }
-1061
-1062 @Test
-1063 public void testHaltOnException() throws Exception {
-1064 final DefaultConfiguration checkConfig =
-1065 createModuleConfig(CheckWhichThrowsError.class );
-1066 final String filePath = getPath("InputChecker.java" );
-1067 try {
-1068 execute(checkConfig, filePath);
-1069 assertWithMessage("Exception is expected" ).fail();
-1070 }
-1071 catch (CheckstyleException ex) {
-1072 assertWithMessage("Error message is not expected" )
-1073 .that(ex.getMessage())
-1074 .isEqualTo("Exception was thrown while processing " + filePath);
-1075 }
-1076 }
-1077
-1078 @Test
-1079 public void testExceptionWithCache() throws Exception {
-1080 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
-1081
-1082 final DefaultConfiguration checkConfig =
-1083 createModuleConfig(CheckWhichThrowsError.class );
-1084
-1085 final DefaultConfiguration treewalkerConfig =
-1086 createModuleConfig(TreeWalker.class );
-1087 treewalkerConfig.addChild(checkConfig);
-1088
-1089 final DefaultConfiguration checkerConfig = createRootConfig(treewalkerConfig);
-1090 checkerConfig.addProperty("charset" , StandardCharsets.UTF_8.name());
-1091 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
-1092 checkerConfig.addChild(treewalkerConfig);
-1093
-1094 final Checker checker = createChecker(checkerConfig);
+1052 @Test
+1053 public void testHaltOnException() throws Exception {
+1054 final DefaultConfiguration checkConfig =
+1055 createModuleConfig(CheckWhichThrowsError.class );
+1056 final String filePath = getPath("InputChecker.java" );
+1057 try {
+1058 execute(checkConfig, filePath);
+1059 assertWithMessage("Exception is expected" ).fail();
+1060 }
+1061 catch (CheckstyleException ex) {
+1062 assertWithMessage("Error message is not expected" )
+1063 .that(ex.getMessage())
+1064 .isEqualTo("Exception was thrown while processing " + filePath);
+1065 }
+1066 }
+1067
+1068 @Test
+1069 public void testExceptionWithCache() throws Exception {
+1070 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
+1071
+1072 final DefaultConfiguration checkConfig =
+1073 createModuleConfig(CheckWhichThrowsError.class );
+1074
+1075 final DefaultConfiguration treewalkerConfig =
+1076 createModuleConfig(TreeWalker.class );
+1077 treewalkerConfig.addChild(checkConfig);
+1078
+1079 final DefaultConfiguration checkerConfig = createRootConfig(treewalkerConfig);
+1080 checkerConfig.addProperty("charset" , StandardCharsets.UTF_8.name());
+1081 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
+1082 checkerConfig.addChild(treewalkerConfig);
+1083
+1084 final Checker checker = createChecker(checkerConfig);
+1085
+1086 final String filePath = getPath("InputChecker.java" );
+1087 try {
+1088 checker.process(Collections.singletonList(new File(filePath)));
+1089 assertWithMessage("Exception is expected" ).fail();
+1090 }
+1091 catch (CheckstyleException ex) {
+1092 assertWithMessage("Error message is not expected" )
+1093 .that(ex.getMessage())
+1094 .isEqualTo("Exception was thrown while processing " + filePath);
1095
-1096 final String filePath = getPath("InputChecker.java" );
-1097 try {
-1098 checker.process(Collections.singletonList(new File(filePath)));
-1099 assertWithMessage("Exception is expected" ).fail();
-1100 }
-1101 catch (CheckstyleException ex) {
-1102 assertWithMessage("Error message is not expected" )
-1103 .that(ex.getMessage())
-1104 .isEqualTo("Exception was thrown while processing " + filePath);
-1105
-1106
-1107 checker.destroy();
-1108
-1109 final Properties cache = new Properties();
-1110 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
-1111 cache.load(reader);
-1112 }
-1113
-1114 assertWithMessage("Cache has unexpected size" )
-1115 .that(cache)
-1116 .hasSize(1);
-1117 assertWithMessage("testFile is not in cache" )
-1118 .that(cache.getProperty(filePath))
-1119 .isNull();
-1120 }
-1121 }
-1122
-1123
-1124
-1125
-1126
-1127
-1128
-1129
-1130 @Test
-1131 public void testCatchErrorWithCache() throws Exception {
-1132 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
-1133
-1134 final DefaultConfiguration checkerConfig = new DefaultConfiguration("configuration" );
-1135 checkerConfig.addProperty("charset" , StandardCharsets.UTF_8.name());
-1136 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
-1137
-1138 final String errorMessage = "Java Virtual Machine is broken"
-1139 + " or has run out of resources necessary for it to continue operating." ;
-1140 final Error expectedError = new IOError(new InternalError(errorMessage));
-1141
-1142 final File mock = new File("testFile" ) {
-1143 private static final long serialVersionUID = 1L;
-1144
-1145 @Override
-1146 public String getAbsolutePath() {
-1147 return "testFile" ;
-1148 }
-1149
-1150
-1151
-1152
-1153
-1154
-1155
-1156
-1157 @Override
-1158 public File getAbsoluteFile() {
-1159 throw expectedError;
-1160 }
-1161 };
-1162
-1163 final Checker checker = new Checker();
-1164 checker.setModuleClassLoader(Thread.currentThread().getContextClassLoader());
-1165 checker.configure(checkerConfig);
-1166 final List<File> filesToProcess = new ArrayList<>();
-1167 filesToProcess.add(mock);
-1168 try {
-1169 checker.process(filesToProcess);
-1170 assertWithMessage("IOError is expected!" ).fail();
-1171 }
-1172
-1173 catch (Error error) {
-1174 assertWithMessage("Error cause differs from IOError" )
-1175 .that(error.getCause())
-1176 .isInstanceOf(IOError.class );
-1177 assertWithMessage("Error message is not expected" )
-1178 .that(error)
-1179 .hasCauseThat()
-1180 .hasCauseThat()
-1181 .hasMessageThat()
-1182 .isEqualTo(errorMessage);
-1183
-1184
-1185 checker.destroy();
-1186
-1187 final Properties cache = new Properties();
-1188 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
-1189 cache.load(reader);
-1190 }
-1191
-1192 assertWithMessage("Cache has unexpected size" )
-1193 .that(cache)
-1194 .hasSize(1);
-1195 assertWithMessage("testFile is not in cache" )
-1196 .that(cache.getProperty("testFile" ))
-1197 .isNull();
-1198 }
-1199 }
-1200
-1201
-1202
-1203
-1204
-1205
-1206
-1207
-1208 @Test
-1209 public void testCatchErrorWithCacheWithNoFileName() throws Exception {
-1210 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
-1211
-1212 final DefaultConfiguration checkerConfig = new DefaultConfiguration("configuration" );
-1213 checkerConfig.addProperty("charset" , StandardCharsets.UTF_8.name());
-1214 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
-1215
-1216 final String errorMessage = "Java Virtual Machine is broken"
-1217 + " or has run out of resources necessary for it to continue operating." ;
-1218 final Error expectedError = new IOError(new InternalError(errorMessage));
-1219
-1220 final File mock = new File("testFile" ) {
-1221 private static final long serialVersionUID = 1L;
-1222
-1223
-1224
-1225
-1226
-1227
-1228
-1229
-1230 @Override
-1231 public String getAbsolutePath() {
-1232 throw expectedError;
-1233 }
-1234 };
-1235
-1236 final Checker checker = new Checker();
-1237 checker.setModuleClassLoader(Thread.currentThread().getContextClassLoader());
-1238 checker.configure(checkerConfig);
-1239 final List<File> filesToProcess = new ArrayList<>();
-1240 filesToProcess.add(mock);
-1241 try {
-1242 checker.process(filesToProcess);
-1243 assertWithMessage("IOError is expected!" ).fail();
-1244 }
-1245
-1246 catch (Error error) {
-1247 assertWithMessage("Error cause differs from IOError" )
-1248 .that(error)
-1249 .hasCauseThat()
-1250 .isInstanceOf(IOError.class );
-1251 assertWithMessage("Error message is not expected" )
-1252 .that(error)
-1253 .hasCauseThat()
-1254 .hasCauseThat()
-1255 .hasMessageThat()
-1256 .isEqualTo(errorMessage);
-1257
-1258
-1259 checker.destroy();
-1260
-1261 final Properties cache = new Properties();
-1262 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
-1263 cache.load(reader);
-1264 }
-1265
-1266 assertWithMessage("Cache has unexpected size" )
-1267 .that(cache)
-1268 .hasSize(1);
-1269 }
-1270 }
-1271
-1272
-1273
-1274
-1275
-1276
-1277
-1278
-1279 @Test
-1280 public void testExceptionWithNoFileName() {
-1281 final String errorMessage = "Security Exception" ;
-1282 final RuntimeException expectedError = new SecurityException(errorMessage);
-1283
-1284 final File mock = new File("testFile" ) {
-1285 private static final long serialVersionUID = 1L;
-1286
-1287
-1288
-1289
-1290
-1291
-1292
-1293
-1294 @Override
-1295 public String getAbsolutePath() {
-1296 throw expectedError;
-1297 }
-1298 };
-1299
-1300 final Checker checker = new Checker();
-1301 final List<File> filesToProcess = new ArrayList<>();
-1302 filesToProcess.add(mock);
-1303 try {
-1304 checker.process(filesToProcess);
-1305 assertWithMessage("SecurityException is expected!" ).fail();
-1306 }
-1307 catch (CheckstyleException ex) {
-1308 assertWithMessage("Error cause differs from SecurityException" )
-1309 .that(ex)
-1310 .hasCauseThat()
-1311 .isInstanceOf(SecurityException.class );
-1312 assertWithMessage("Error message is not expected" )
-1313 .that(ex)
-1314 .hasCauseThat()
-1315 .hasMessageThat()
-1316 .isEqualTo(errorMessage);
-1317 }
-1318 }
-1319
-1320
-1321
-1322
-1323
-1324
-1325
-1326
-1327 @Test
-1328 public void testExceptionWithCacheAndNoFileName() throws Exception {
-1329 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
+1096
+1097 checker.destroy();
+1098
+1099 final Properties cache = new Properties();
+1100 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
+1101 cache.load(reader);
+1102 }
+1103
+1104 assertWithMessage("Cache has unexpected size" )
+1105 .that(cache)
+1106 .hasSize(1);
+1107 assertWithMessage("testFile is not in cache" )
+1108 .that(cache.getProperty(filePath))
+1109 .isNull();
+1110 }
+1111 }
+1112
+1113
+1114
+1115
+1116
+1117
+1118
+1119
+1120 @Test
+1121 public void testCatchErrorWithCache() throws Exception {
+1122 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
+1123
+1124 final DefaultConfiguration checkerConfig = new DefaultConfiguration("configuration" );
+1125 checkerConfig.addProperty("charset" , StandardCharsets.UTF_8.name());
+1126 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
+1127
+1128 final String errorMessage = "Java Virtual Machine is broken"
+1129 + " or has run out of resources necessary for it to continue operating." ;
+1130 final Error expectedError = new IOError(new InternalError(errorMessage));
+1131
+1132 final File mock = new File("testFile" ) {
+1133 private static final long serialVersionUID = 1L;
+1134
+1135 @Override
+1136 public String getAbsolutePath() {
+1137 return "testFile" ;
+1138 }
+1139
+1140
+1141
+1142
+1143
+1144
+1145
+1146
+1147 @Override
+1148 public File getAbsoluteFile() {
+1149 throw expectedError;
+1150 }
+1151 };
+1152
+1153 final Checker checker = new Checker();
+1154 checker.setModuleClassLoader(Thread.currentThread().getContextClassLoader());
+1155 checker.configure(checkerConfig);
+1156 final List<File> filesToProcess = new ArrayList<>();
+1157 filesToProcess.add(mock);
+1158 try {
+1159 checker.process(filesToProcess);
+1160 assertWithMessage("IOError is expected!" ).fail();
+1161 }
+1162
+1163 catch (Error error) {
+1164 assertWithMessage("Error cause differs from IOError" )
+1165 .that(error.getCause())
+1166 .isInstanceOf(IOError.class );
+1167 assertWithMessage("Error message is not expected" )
+1168 .that(error)
+1169 .hasCauseThat()
+1170 .hasCauseThat()
+1171 .hasMessageThat()
+1172 .isEqualTo(errorMessage);
+1173
+1174
+1175 checker.destroy();
+1176
+1177 final Properties cache = new Properties();
+1178 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
+1179 cache.load(reader);
+1180 }
+1181
+1182 assertWithMessage("Cache has unexpected size" )
+1183 .that(cache)
+1184 .hasSize(1);
+1185 assertWithMessage("testFile is not in cache" )
+1186 .that(cache.getProperty("testFile" ))
+1187 .isNull();
+1188 }
+1189 }
+1190
+1191
+1192
+1193
+1194
+1195
+1196
+1197
+1198 @Test
+1199 public void testCatchErrorWithCacheWithNoFileName() throws Exception {
+1200 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
+1201
+1202 final DefaultConfiguration checkerConfig = new DefaultConfiguration("configuration" );
+1203 checkerConfig.addProperty("charset" , StandardCharsets.UTF_8.name());
+1204 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
+1205
+1206 final String errorMessage = "Java Virtual Machine is broken"
+1207 + " or has run out of resources necessary for it to continue operating." ;
+1208 final Error expectedError = new IOError(new InternalError(errorMessage));
+1209
+1210 final File mock = new File("testFile" ) {
+1211 private static final long serialVersionUID = 1L;
+1212
+1213
+1214
+1215
+1216
+1217
+1218
+1219
+1220 @Override
+1221 public String getAbsolutePath() {
+1222 throw expectedError;
+1223 }
+1224 };
+1225
+1226 final Checker checker = new Checker();
+1227 checker.setModuleClassLoader(Thread.currentThread().getContextClassLoader());
+1228 checker.configure(checkerConfig);
+1229 final List<File> filesToProcess = new ArrayList<>();
+1230 filesToProcess.add(mock);
+1231 try {
+1232 checker.process(filesToProcess);
+1233 assertWithMessage("IOError is expected!" ).fail();
+1234 }
+1235
+1236 catch (Error error) {
+1237 assertWithMessage("Error cause differs from IOError" )
+1238 .that(error)
+1239 .hasCauseThat()
+1240 .isInstanceOf(IOError.class );
+1241 assertWithMessage("Error message is not expected" )
+1242 .that(error)
+1243 .hasCauseThat()
+1244 .hasCauseThat()
+1245 .hasMessageThat()
+1246 .isEqualTo(errorMessage);
+1247
+1248
+1249 checker.destroy();
+1250
+1251 final Properties cache = new Properties();
+1252 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
+1253 cache.load(reader);
+1254 }
+1255
+1256 assertWithMessage("Cache has unexpected size" )
+1257 .that(cache)
+1258 .hasSize(1);
+1259 }
+1260 }
+1261
+1262
+1263
+1264
+1265
+1266
+1267
+1268
+1269 @Test
+1270 public void testExceptionWithNoFileName() {
+1271 final String errorMessage = "Security Exception" ;
+1272 final RuntimeException expectedError = new SecurityException(errorMessage);
+1273
+1274 final File mock = new File("testFile" ) {
+1275 private static final long serialVersionUID = 1L;
+1276
+1277
+1278
+1279
+1280
+1281
+1282
+1283
+1284 @Override
+1285 public String getAbsolutePath() {
+1286 throw expectedError;
+1287 }
+1288 };
+1289
+1290 final Checker checker = new Checker();
+1291 final List<File> filesToProcess = new ArrayList<>();
+1292 filesToProcess.add(mock);
+1293 try {
+1294 checker.process(filesToProcess);
+1295 assertWithMessage("SecurityException is expected!" ).fail();
+1296 }
+1297 catch (CheckstyleException ex) {
+1298 assertWithMessage("Error cause differs from SecurityException" )
+1299 .that(ex)
+1300 .hasCauseThat()
+1301 .isInstanceOf(SecurityException.class );
+1302 assertWithMessage("Error message is not expected" )
+1303 .that(ex)
+1304 .hasCauseThat()
+1305 .hasMessageThat()
+1306 .isEqualTo(errorMessage);
+1307 }
+1308 }
+1309
+1310
+1311
+1312
+1313
+1314
+1315
+1316
+1317 @Test
+1318 public void testExceptionWithCacheAndNoFileName() throws Exception {
+1319 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
+1320
+1321 final DefaultConfiguration checkerConfig = new DefaultConfiguration("configuration" );
+1322 checkerConfig.addProperty("charset" , StandardCharsets.UTF_8.name());
+1323 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
+1324
+1325 final String errorMessage = "Security Exception" ;
+1326 final RuntimeException expectedError = new SecurityException(errorMessage);
+1327
+1328 final File mock = new File("testFile" ) {
+1329 private static final long serialVersionUID = 1L;
1330
-1331 final DefaultConfiguration checkerConfig = new DefaultConfiguration("configuration" );
-1332 checkerConfig.addProperty("charset" , StandardCharsets.UTF_8.name());
-1333 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
-1334
-1335 final String errorMessage = "Security Exception" ;
-1336 final RuntimeException expectedError = new SecurityException(errorMessage);
-1337
-1338 final File mock = new File("testFile" ) {
-1339 private static final long serialVersionUID = 1L;
-1340
-1341
-1342
-1343
-1344
-1345
-1346
-1347
-1348 @Override
-1349 public String getAbsolutePath() {
-1350 throw expectedError;
-1351 }
-1352 };
-1353
-1354 final Checker checker = new Checker();
-1355 checker.setModuleClassLoader(Thread.currentThread().getContextClassLoader());
-1356 checker.configure(checkerConfig);
-1357 final List<File> filesToProcess = new ArrayList<>();
-1358 filesToProcess.add(mock);
-1359 try {
-1360 checker.process(filesToProcess);
-1361 assertWithMessage("SecurityException is expected!" ).fail();
-1362 }
-1363 catch (CheckstyleException ex) {
-1364 assertWithMessage("Error cause differs from SecurityException" )
-1365 .that(ex)
-1366 .hasCauseThat()
-1367 .isInstanceOf(SecurityException.class );
-1368 assertWithMessage("Error message is not expected" )
-1369 .that(ex)
-1370 .hasCauseThat()
-1371 .hasMessageThat()
-1372 .isEqualTo(errorMessage);
-1373
-1374
-1375 checker.destroy();
-1376
-1377 final Properties cache = new Properties();
-1378 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
-1379 cache.load(reader);
-1380 }
-1381
-1382 assertWithMessage("Cache has unexpected size" )
-1383 .that(cache)
-1384 .hasSize(1);
-1385 }
-1386 }
-1387
-1388 @Test
-1389 public void testHaltOnExceptionOff() throws Exception {
-1390 final DefaultConfiguration checkConfig =
-1391 createModuleConfig(CheckWhichThrowsError.class );
-1392
-1393 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
-1394 treeWalkerConfig.addChild(checkConfig);
+1331
+1332
+1333
+1334
+1335
+1336
+1337
+1338 @Override
+1339 public String getAbsolutePath() {
+1340 throw expectedError;
+1341 }
+1342 };
+1343
+1344 final Checker checker = new Checker();
+1345 checker.setModuleClassLoader(Thread.currentThread().getContextClassLoader());
+1346 checker.configure(checkerConfig);
+1347 final List<File> filesToProcess = new ArrayList<>();
+1348 filesToProcess.add(mock);
+1349 try {
+1350 checker.process(filesToProcess);
+1351 assertWithMessage("SecurityException is expected!" ).fail();
+1352 }
+1353 catch (CheckstyleException ex) {
+1354 assertWithMessage("Error cause differs from SecurityException" )
+1355 .that(ex)
+1356 .hasCauseThat()
+1357 .isInstanceOf(SecurityException.class );
+1358 assertWithMessage("Error message is not expected" )
+1359 .that(ex)
+1360 .hasCauseThat()
+1361 .hasMessageThat()
+1362 .isEqualTo(errorMessage);
+1363
+1364
+1365 checker.destroy();
+1366
+1367 final Properties cache = new Properties();
+1368 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
+1369 cache.load(reader);
+1370 }
+1371
+1372 assertWithMessage("Cache has unexpected size" )
+1373 .that(cache)
+1374 .hasSize(1);
+1375 }
+1376 }
+1377
+1378 @Test
+1379 public void testHaltOnExceptionOff() throws Exception {
+1380 final DefaultConfiguration checkConfig =
+1381 createModuleConfig(CheckWhichThrowsError.class );
+1382
+1383 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
+1384 treeWalkerConfig.addChild(checkConfig);
+1385
+1386 final DefaultConfiguration checkerConfig = createRootConfig(treeWalkerConfig);
+1387 checkerConfig.addChild(treeWalkerConfig);
+1388
+1389 checkerConfig.addProperty("haltOnException" , "false" );
+1390
+1391 final String filePath = getPath("InputChecker.java" );
+1392 final String[] expected = {
+1393 "1: " + getCheckMessage(EXCEPTION_MSG, "java.lang.IndexOutOfBoundsException: test" ),
+1394 };
1395
-1396 final DefaultConfiguration checkerConfig = createRootConfig(treeWalkerConfig);
-1397 checkerConfig.addChild(treeWalkerConfig);
+1396 verify(checkerConfig, filePath, expected);
+1397 }
1398
-1399 checkerConfig.addProperty("haltOnException" , "false" );
-1400
-1401 final String filePath = getPath("InputChecker.java" );
-1402 final String[] expected = {
-1403 "1: " + getCheckMessage(EXCEPTION_MSG, "java.lang.IndexOutOfBoundsException: test" ),
+1399 @Test
+1400 public void testTabViolationDefault() throws Exception {
+1401 final String[] expected = {
+1402 "10:17: violation" ,
+1403 "13:33: violation" ,
1404 };
-1405
-1406 verify(checkerConfig, filePath, expected);
+1405 verifyWithInlineConfigParser(getPath("InputCheckerTabCharacter.txt" ),
+1406 expected);
1407 }
1408
1409 @Test
-1410 public void testTabViolationDefault() throws Exception {
-1411 final String[] expected = {
-1412 "10:17: violation" ,
-1413 "13:33: violation" ,
-1414 };
-1415 verifyWithInlineConfigParser(getPath("InputCheckerTabCharacter.txt" ),
-1416 expected);
-1417 }
-1418
-1419 @Test
-1420 public void testTabViolation() throws Exception {
-1421 final DefaultConfiguration checkConfig =
-1422 createModuleConfig(VerifyPositionAfterTabFileSet.class );
-1423 final DefaultConfiguration checkerConfig = createRootConfig(checkConfig);
-1424 checkerConfig.addProperty("tabWidth" , "4" );
-1425 final String[] expected = {
-1426 "10:13: violation" ,
-1427 "13:33: violation" ,
-1428 };
-1429 verify(checkerConfig, getPath("InputCheckerTabCharacter.txt" ),
-1430 expected);
-1431 }
-1432
-1433 @Test
-1434 public void testCheckerProcessCallAllNeededMethodsOfFileSets() throws Exception {
-1435 final DummyFileSet fileSet = new DummyFileSet();
-1436 final Checker checker = new Checker();
-1437 checker.addFileSetCheck(fileSet);
-1438 checker.process(Collections.singletonList(new File("dummy.java" )));
-1439 final List<String> expected =
-1440 Arrays.asList("beginProcessing" , "finishProcessing" , "destroy" );
-1441 assertWithMessage("Method calls were not expected" )
-1442 .that(fileSet.getMethodCalls())
-1443 .isEqualTo(expected);
+1410 public void testTabViolation() throws Exception {
+1411 final DefaultConfiguration checkConfig =
+1412 createModuleConfig(VerifyPositionAfterTabFileSet.class );
+1413 final DefaultConfiguration checkerConfig = createRootConfig(checkConfig);
+1414 checkerConfig.addProperty("tabWidth" , "4" );
+1415 final String[] expected = {
+1416 "10:13: violation" ,
+1417 "13:33: violation" ,
+1418 };
+1419 verify(checkerConfig, getPath("InputCheckerTabCharacter.txt" ),
+1420 expected);
+1421 }
+1422
+1423 @Test
+1424 public void testCheckerProcessCallAllNeededMethodsOfFileSets() throws Exception {
+1425 final DummyFileSet fileSet = new DummyFileSet();
+1426 final Checker checker = new Checker();
+1427 checker.addFileSetCheck(fileSet);
+1428 checker.process(Collections.singletonList(new File("dummy.java" )));
+1429 final List<String> expected =
+1430 Arrays.asList("beginProcessing" , "finishProcessing" , "destroy" );
+1431 assertWithMessage("Method calls were not expected" )
+1432 .that(fileSet.getMethodCalls())
+1433 .isEqualTo(expected);
+1434 }
+1435
+1436 @Test
+1437 public void testSetFileSetCheckSetsMessageDispatcher() {
+1438 final DummyFileSet fileSet = new DummyFileSet();
+1439 final Checker checker = new Checker();
+1440 checker.addFileSetCheck(fileSet);
+1441 assertWithMessage("Message dispatcher was not expected" )
+1442 .that(fileSet.getInternalMessageDispatcher())
+1443 .isEqualTo(checker);
1444 }
1445
1446 @Test
-1447 public void testSetFileSetCheckSetsMessageDispatcher() {
-1448 final DummyFileSet fileSet = new DummyFileSet();
-1449 final Checker checker = new Checker();
-1450 checker.addFileSetCheck(fileSet);
-1451 assertWithMessage("Message dispatcher was not expected" )
-1452 .that(fileSet.getInternalMessageDispatcher())
-1453 .isEqualTo(checker);
-1454 }
-1455
-1456 @Test
-1457 public void testAddAuditListenerAsChild() throws Exception {
-1458 final Checker checker = new Checker();
-1459 final DebugAuditAdapter auditAdapter = new DebugAuditAdapter ();
-1460 final PackageObjectFactory factory = new PackageObjectFactory(
-1461 new HashSet<>(), Thread.currentThread().getContextClassLoader()) {
-1462 @Override
-1463 public Object createModule(String name) throws CheckstyleException {
-1464 Object adapter = auditAdapter;
-1465 if (!name.equals(DebugAuditAdapter.class .getName())) {
-1466 adapter = super .createModule(name);
-1467 }
-1468 return adapter;
-1469 }
-1470 };
-1471 checker.setModuleFactory(factory);
-1472 checker.setupChild(createModuleConfig(DebugAuditAdapter.class ));
-1473
-1474 checker.process(Collections.singletonList(new File("dummy.java" )));
-1475 assertWithMessage("Checker.fireAuditStarted() doesn't call listener" )
-1476 .that(auditAdapter.wasCalled())
-1477 .isTrue();
-1478 }
-1479
-1480 @Test
-1481 public void testAddBeforeExecutionFileFilterAsChild() throws Exception {
-1482 final Checker checker = new Checker();
-1483 final TestBeforeExecutionFileFilter fileFilter = new TestBeforeExecutionFileFilter ();
-1484 final PackageObjectFactory factory = new PackageObjectFactory(
-1485 new HashSet<>(), Thread.currentThread().getContextClassLoader()) {
-1486 @Override
-1487 public Object createModule(String name) throws CheckstyleException {
-1488 Object filter = fileFilter;
-1489 if (!name.equals(TestBeforeExecutionFileFilter.class .getName())) {
-1490 filter = super .createModule(name);
-1491 }
-1492 return filter;
-1493 }
-1494 };
-1495 checker.setModuleFactory(factory);
-1496 checker.setupChild(createModuleConfig(TestBeforeExecutionFileFilter.class ));
-1497 checker.process(Collections.singletonList(new File("dummy.java" )));
-1498 assertWithMessage("Checker.acceptFileStarted() doesn't call listener" )
-1499 .that(fileFilter.wasCalled())
-1500 .isTrue();
-1501 }
-1502
-1503 @Test
-1504 public void testFileSetCheckInitWhenAddedAsChild() throws Exception {
-1505 final Checker checker = new Checker();
-1506 final DummyFileSet fileSet = new DummyFileSet();
-1507 final PackageObjectFactory factory = new PackageObjectFactory(
-1508 new HashSet<>(), Thread.currentThread().getContextClassLoader()) {
-1509 @Override
-1510 public Object createModule(String name) throws CheckstyleException {
-1511 Object check = fileSet;
-1512 if (!name.equals(DummyFileSet.class .getName())) {
-1513 check = super .createModule(name);
-1514 }
-1515 return check;
-1516 }
-1517 };
-1518 checker.setModuleFactory(factory);
-1519 checker.finishLocalSetup();
-1520 checker.setupChild(createModuleConfig(DummyFileSet.class ));
-1521 assertWithMessage("FileSetCheck.init() wasn't called" )
-1522 .that(fileSet.isInitCalled())
-1523 .isTrue();
-1524 }
-1525
-1526
-1527 @Test
-1528 public void testDefaultLoggerClosesItStreams() throws Exception {
-1529 final Checker checker = new Checker();
-1530 try (CloseAndFlushTestByteArrayOutputStream testInfoOutputStream =
-1531 new CloseAndFlushTestByteArrayOutputStream ();
-1532 CloseAndFlushTestByteArrayOutputStream testErrorOutputStream =
-1533 new CloseAndFlushTestByteArrayOutputStream ()) {
-1534 checker.setModuleClassLoader(Thread.currentThread().getContextClassLoader());
-1535 checker.addListener(new DefaultLogger(testInfoOutputStream,
-1536 OutputStreamOptions.CLOSE, testErrorOutputStream, OutputStreamOptions.CLOSE));
-1537
-1538 final File tmpFile = File.createTempFile("file" , ".java" , temporaryFolder);
-1539
-1540 execute(checker, tmpFile.getPath());
-1541
-1542 assertWithMessage("Output stream close count" )
-1543 .that(testInfoOutputStream.getCloseCount())
-1544 .isEqualTo(1);
-1545 assertWithMessage("Output stream flush count" )
-1546 .that(testInfoOutputStream.getFlushCount())
-1547 .isEqualTo(TestUtil.adjustFlushCountForOutputStreamClose(3));
-1548 assertWithMessage("Error stream close count" )
-1549 .that(testErrorOutputStream.getCloseCount())
-1550 .isEqualTo(1);
-1551 assertWithMessage("Error stream flush count" )
-1552 .that(testErrorOutputStream.getFlushCount())
-1553 .isEqualTo(TestUtil.adjustFlushCountForOutputStreamClose(1));
-1554 }
-1555 }
-1556
-1557
-1558 @Test
-1559 public void testXmlLoggerClosesItStreams() throws Exception {
-1560 final Checker checker = new Checker();
-1561 try (CloseAndFlushTestByteArrayOutputStream testInfoOutputStream =
-1562 new CloseAndFlushTestByteArrayOutputStream ()) {
-1563 checker.setModuleClassLoader(Thread.currentThread().getContextClassLoader());
-1564 checker.addListener(new XMLLogger(testInfoOutputStream, OutputStreamOptions.CLOSE));
-1565
-1566 final File tmpFile = File.createTempFile("file" , ".java" , temporaryFolder);
-1567
-1568 execute(checker, tmpFile.getPath(), tmpFile.getPath());
-1569
-1570 assertWithMessage("Output stream close count" )
-1571 .that(testInfoOutputStream.getCloseCount())
-1572 .isEqualTo(1);
-1573 assertWithMessage("Output stream flush count" )
-1574 .that(testInfoOutputStream.getFlushCount())
-1575 .isEqualTo(TestUtil.adjustFlushCountForOutputStreamClose(0));
-1576 }
-1577 }
-1578
-1579 @Test
-1580 public void testDuplicatedModule() throws Exception {
-1581
-1582 final DefaultConfiguration moduleConfig1 =
-1583 createModuleConfig(NewlineAtEndOfFileCheck.class );
-1584 final DefaultConfiguration moduleConfig2 =
-1585 createModuleConfig(NewlineAtEndOfFileCheck.class );
-1586 moduleConfig2.addProperty("id" , "ModuleId" );
-1587 final DefaultConfiguration root = new DefaultConfiguration("root" );
-1588 root.addChild(moduleConfig1);
-1589 root.addChild(moduleConfig2);
-1590 final Checker checker = new Checker();
-1591 checker.setModuleClassLoader(Thread.currentThread().getContextClassLoader());
-1592 checker.configure(root);
-1593
-1594
-1595 final ByteArrayOutputStream out = TestUtil.getInternalState(this , "stream" );
-1596 final DefaultLogger logger = new DefaultLogger(out, OutputStreamOptions.CLOSE, out,
-1597 OutputStreamOptions.NONE, new AuditEventDefaultFormatter());
-1598 checker.addListener(logger);
-1599
-1600 final String path = File.createTempFile("file" , ".java" , temporaryFolder).getPath();
-1601 final String violationMessage =
-1602 getCheckMessage(NewlineAtEndOfFileCheck.class , MSG_KEY_NO_NEWLINE_EOF);
-1603 final String[] expected = {
-1604 "1: " + violationMessage + " [NewlineAtEndOfFile]" ,
-1605 "1: " + violationMessage + " [ModuleId]" ,
-1606 };
-1607
-1608
-1609 out.flush();
-1610 final int errs = checker.process(Collections.singletonList(new File(path)));
-1611 try (ByteArrayInputStream inputStream =
-1612 new ByteArrayInputStream(out.toByteArray());
-1613 LineNumberReader lnr = new LineNumberReader(
-1614 new InputStreamReader(inputStream, StandardCharsets.UTF_8))) {
-1615
-1616 final List<String> actual = lnr.lines()
-1617 .filter(line -> !getCheckMessage(AUDIT_STARTED_MESSAGE).equals(line))
-1618 .filter(line -> !getCheckMessage(AUDIT_FINISHED_MESSAGE).equals(line))
-1619 .limit(expected.length)
-1620 .sorted()
-1621 .collect(Collectors.toUnmodifiableList());
-1622 Arrays.sort(expected);
-1623
-1624 for (int i = 0; i < expected.length; i++) {
-1625 final String expectedResult = "[ERROR] " + path + ":" + expected[i];
-1626 assertWithMessage("error message " + i)
-1627 .that(actual.get(i))
-1628 .isEqualTo(expectedResult);
-1629 }
-1630
-1631 assertWithMessage("unexpected output: " + lnr.readLine())
-1632 .that(errs)
-1633 .isEqualTo(expected.length);
-1634 }
-1635
-1636 checker.destroy();
-1637 }
-1638
-1639 @Test
-1640 public void testCachedFile() throws Exception {
-1641 final Checker checker = createChecker(createModuleConfig(TranslationCheck.class ));
-1642 final OutputStream infoStream = new ByteArrayOutputStream();
-1643 final OutputStream errorStream = new ByteArrayOutputStream();
-1644 final DefaultLoggerWithCounter loggerWithCounter =
-1645 new DefaultLoggerWithCounter(infoStream, OutputStreamOptions.CLOSE,
-1646 errorStream, OutputStreamOptions.CLOSE);
-1647 checker.addListener(loggerWithCounter);
-1648 final File cacheFile = File.createTempFile("cacheFile" , ".txt" , temporaryFolder);
-1649 checker.setCacheFile(cacheFile.getAbsolutePath());
-1650
-1651 final File testFile = File.createTempFile("testFile" , ".java" , temporaryFolder);
-1652 final List<File> files = List.of(testFile, testFile);
-1653 checker.process(files);
-1654
-1655 assertWithMessage("Cached file should not be processed twice" )
-1656 .that(loggerWithCounter.fileStartedCount)
-1657 .isEqualTo(1);
+1447 public void testAddAuditListenerAsChild() throws Exception {
+1448 final Checker checker = new Checker();
+1449 final DebugAuditAdapter auditAdapter = new DebugAuditAdapter ();
+1450 final PackageObjectFactory factory = new PackageObjectFactory(
+1451 new HashSet<>(), Thread.currentThread().getContextClassLoader()) {
+1452 @Override
+1453 public Object createModule(String name) throws CheckstyleException {
+1454 Object adapter = auditAdapter;
+1455 if (!name.equals(DebugAuditAdapter.class .getName())) {
+1456 adapter = super .createModule(name);
+1457 }
+1458 return adapter;
+1459 }
+1460 };
+1461 checker.setModuleFactory(factory);
+1462 checker.setupChild(createModuleConfig(DebugAuditAdapter.class ));
+1463
+1464 checker.process(Collections.singletonList(new File("dummy.java" )));
+1465 assertWithMessage("Checker.fireAuditStarted() doesn't call listener" )
+1466 .that(auditAdapter.wasCalled())
+1467 .isTrue();
+1468 }
+1469
+1470 @Test
+1471 public void testAddBeforeExecutionFileFilterAsChild() throws Exception {
+1472 final Checker checker = new Checker();
+1473 final TestBeforeExecutionFileFilter fileFilter = new TestBeforeExecutionFileFilter ();
+1474 final PackageObjectFactory factory = new PackageObjectFactory(
+1475 new HashSet<>(), Thread.currentThread().getContextClassLoader()) {
+1476 @Override
+1477 public Object createModule(String name) throws CheckstyleException {
+1478 Object filter = fileFilter;
+1479 if (!name.equals(TestBeforeExecutionFileFilter.class .getName())) {
+1480 filter = super .createModule(name);
+1481 }
+1482 return filter;
+1483 }
+1484 };
+1485 checker.setModuleFactory(factory);
+1486 checker.setupChild(createModuleConfig(TestBeforeExecutionFileFilter.class ));
+1487 checker.process(Collections.singletonList(new File("dummy.java" )));
+1488 assertWithMessage("Checker.acceptFileStarted() doesn't call listener" )
+1489 .that(fileFilter.wasCalled())
+1490 .isTrue();
+1491 }
+1492
+1493 @Test
+1494 public void testFileSetCheckInitWhenAddedAsChild() throws Exception {
+1495 final Checker checker = new Checker();
+1496 final DummyFileSet fileSet = new DummyFileSet();
+1497 final PackageObjectFactory factory = new PackageObjectFactory(
+1498 new HashSet<>(), Thread.currentThread().getContextClassLoader()) {
+1499 @Override
+1500 public Object createModule(String name) throws CheckstyleException {
+1501 Object check = fileSet;
+1502 if (!name.equals(DummyFileSet.class .getName())) {
+1503 check = super .createModule(name);
+1504 }
+1505 return check;
+1506 }
+1507 };
+1508 checker.setModuleFactory(factory);
+1509 checker.finishLocalSetup();
+1510 checker.setupChild(createModuleConfig(DummyFileSet.class ));
+1511 assertWithMessage("FileSetCheck.init() wasn't called" )
+1512 .that(fileSet.isInitCalled())
+1513 .isTrue();
+1514 }
+1515
+1516
+1517 @Test
+1518 public void testDefaultLoggerClosesItStreams() throws Exception {
+1519 final Checker checker = new Checker();
+1520 try (CloseAndFlushTestByteArrayOutputStream testInfoOutputStream =
+1521 new CloseAndFlushTestByteArrayOutputStream ();
+1522 CloseAndFlushTestByteArrayOutputStream testErrorOutputStream =
+1523 new CloseAndFlushTestByteArrayOutputStream ()) {
+1524 checker.setModuleClassLoader(Thread.currentThread().getContextClassLoader());
+1525 checker.addListener(new DefaultLogger(testInfoOutputStream,
+1526 OutputStreamOptions.CLOSE, testErrorOutputStream, OutputStreamOptions.CLOSE));
+1527
+1528 final File tmpFile = File.createTempFile("file" , ".java" , temporaryFolder);
+1529
+1530 execute(checker, tmpFile.getPath());
+1531
+1532 assertWithMessage("Output stream close count" )
+1533 .that(testInfoOutputStream.getCloseCount())
+1534 .isEqualTo(1);
+1535 assertWithMessage("Output stream flush count" )
+1536 .that(testInfoOutputStream.getFlushCount())
+1537 .isEqualTo(TestUtil.adjustFlushCountForOutputStreamClose(3));
+1538 assertWithMessage("Error stream close count" )
+1539 .that(testErrorOutputStream.getCloseCount())
+1540 .isEqualTo(1);
+1541 assertWithMessage("Error stream flush count" )
+1542 .that(testErrorOutputStream.getFlushCount())
+1543 .isEqualTo(TestUtil.adjustFlushCountForOutputStreamClose(1));
+1544 }
+1545 }
+1546
+1547
+1548 @Test
+1549 public void testXmlLoggerClosesItStreams() throws Exception {
+1550 final Checker checker = new Checker();
+1551 try (CloseAndFlushTestByteArrayOutputStream testInfoOutputStream =
+1552 new CloseAndFlushTestByteArrayOutputStream ()) {
+1553 checker.setModuleClassLoader(Thread.currentThread().getContextClassLoader());
+1554 checker.addListener(new XMLLogger(testInfoOutputStream, OutputStreamOptions.CLOSE));
+1555
+1556 final File tmpFile = File.createTempFile("file" , ".java" , temporaryFolder);
+1557
+1558 execute(checker, tmpFile.getPath(), tmpFile.getPath());
+1559
+1560 assertWithMessage("Output stream close count" )
+1561 .that(testInfoOutputStream.getCloseCount())
+1562 .isEqualTo(1);
+1563 assertWithMessage("Output stream flush count" )
+1564 .that(testInfoOutputStream.getFlushCount())
+1565 .isEqualTo(TestUtil.adjustFlushCountForOutputStreamClose(0));
+1566 }
+1567 }
+1568
+1569 @Test
+1570 public void testDuplicatedModule() throws Exception {
+1571
+1572 final DefaultConfiguration moduleConfig1 =
+1573 createModuleConfig(NewlineAtEndOfFileCheck.class );
+1574 final DefaultConfiguration moduleConfig2 =
+1575 createModuleConfig(NewlineAtEndOfFileCheck.class );
+1576 moduleConfig2.addProperty("id" , "ModuleId" );
+1577 final DefaultConfiguration root = new DefaultConfiguration("root" );
+1578 root.addChild(moduleConfig1);
+1579 root.addChild(moduleConfig2);
+1580 final Checker checker = new Checker();
+1581 checker.setModuleClassLoader(Thread.currentThread().getContextClassLoader());
+1582 checker.configure(root);
+1583
+1584
+1585 final ByteArrayOutputStream out = TestUtil.getInternalState(this , "stream" );
+1586 final DefaultLogger logger = new DefaultLogger(out, OutputStreamOptions.CLOSE, out,
+1587 OutputStreamOptions.NONE, new AuditEventDefaultFormatter());
+1588 checker.addListener(logger);
+1589
+1590 final String path = File.createTempFile("file" , ".java" , temporaryFolder).getPath();
+1591 final String violationMessage =
+1592 getCheckMessage(NewlineAtEndOfFileCheck.class , MSG_KEY_NO_NEWLINE_EOF);
+1593 final String[] expected = {
+1594 "1: " + violationMessage + " [NewlineAtEndOfFile]" ,
+1595 "1: " + violationMessage + " [ModuleId]" ,
+1596 };
+1597
+1598
+1599 out.flush();
+1600 final int errs = checker.process(Collections.singletonList(new File(path)));
+1601 try (ByteArrayInputStream inputStream =
+1602 new ByteArrayInputStream(out.toByteArray());
+1603 LineNumberReader lnr = new LineNumberReader(
+1604 new InputStreamReader(inputStream, StandardCharsets.UTF_8))) {
+1605
+1606 final List<String> actual = lnr.lines()
+1607 .filter(line -> !getCheckMessage(AUDIT_STARTED_MESSAGE).equals(line))
+1608 .filter(line -> !getCheckMessage(AUDIT_FINISHED_MESSAGE).equals(line))
+1609 .limit(expected.length)
+1610 .sorted()
+1611 .collect(Collectors.toUnmodifiableList());
+1612 Arrays.sort(expected);
+1613
+1614 for (int i = 0; i < expected.length; i++) {
+1615 final String expectedResult = "[ERROR] " + path + ":" + expected[i];
+1616 assertWithMessage("error message " + i)
+1617 .that(actual.get(i))
+1618 .isEqualTo(expectedResult);
+1619 }
+1620
+1621 assertWithMessage("unexpected output: " + lnr.readLine())
+1622 .that(errs)
+1623 .isEqualTo(expected.length);
+1624 }
+1625
+1626 checker.destroy();
+1627 }
+1628
+1629 @Test
+1630 public void testCachedFile() throws Exception {
+1631 final Checker checker = createChecker(createModuleConfig(TranslationCheck.class ));
+1632 final OutputStream infoStream = new ByteArrayOutputStream();
+1633 final OutputStream errorStream = new ByteArrayOutputStream();
+1634 final DefaultLoggerWithCounter loggerWithCounter =
+1635 new DefaultLoggerWithCounter(infoStream, OutputStreamOptions.CLOSE,
+1636 errorStream, OutputStreamOptions.CLOSE);
+1637 checker.addListener(loggerWithCounter);
+1638 final File cacheFile = File.createTempFile("cacheFile" , ".txt" , temporaryFolder);
+1639 checker.setCacheFile(cacheFile.getAbsolutePath());
+1640
+1641 final File testFile = File.createTempFile("testFile" , ".java" , temporaryFolder);
+1642 final List<File> files = List.of(testFile, testFile);
+1643 checker.process(files);
+1644
+1645 assertWithMessage("Cached file should not be processed twice" )
+1646 .that(loggerWithCounter.fileStartedCount)
+1647 .isEqualTo(1);
+1648
+1649 checker.destroy();
+1650 }
+1651
+1652 @SuppressForbidden
+1653 @Test
+1654 public void testUnmappableCharacters() throws Exception {
+1655 final String[] expected = {
+1656 "4: " + getCheckMessage(LineLengthCheck.class , MSG_KEY, 75, 238),
+1657 };
1658
-1659 checker.destroy();
-1660 }
+1659 final DefaultConfiguration checkConfig = createModuleConfig(LineLengthCheck.class );
+1660 checkConfig.addProperty("max" , "75" );
1661
-1662 @SuppressForbidden
-1663 @Test
-1664 public void testUnmappableCharacters() throws Exception {
-1665 final String[] expected = {
-1666 "4: " + getCheckMessage(LineLengthCheck.class , MSG_KEY, 75, 238),
-1667 };
-1668
-1669 final DefaultConfiguration checkConfig = createModuleConfig(LineLengthCheck.class );
-1670 checkConfig.addProperty("max" , "75" );
-1671
-1672 final DefaultConfiguration checkerConfig = createRootConfig(checkConfig);
-1673 checkerConfig.addProperty("charset" , "IBM1098" );
-1674
-1675 verify(checkerConfig, getPath("InputCheckerTestCharset.java" ), expected);
-1676 }
-1677
-1678 @Test
-1679 public void testViolationMessageOnIoException() throws Exception {
-1680 final DefaultConfiguration checkConfig =
-1681 createModuleConfig(CheckWhichThrowsError.class );
-1682
-1683 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
-1684 treeWalkerConfig.addChild(checkConfig);
-1685
-1686 final DefaultConfiguration checkerConfig = createRootConfig(treeWalkerConfig);
-1687 checkerConfig.addChild(treeWalkerConfig);
-1688
-1689 checkerConfig.addProperty("haltOnException" , "false" );
-1690 final File file = new File("InputNonChecker.java" );
-1691 final String filePath = file.getAbsolutePath();
-1692 final String[] expected = {
-1693 "1: " + getCheckMessage(EXCEPTION_MSG, filePath
-1694 + " (No such file or directory)" ),
-1695 };
-1696
-1697 verify(checkerConfig, filePath, expected);
-1698 }
-1699
-1700 public static class DefaultLoggerWithCounter extends DefaultLogger {
-1701
-1702 private int fileStartedCount;
-1703
-1704 public DefaultLoggerWithCounter(OutputStream infoStream,
-1705 OutputStreamOptions infoStreamOptions,
-1706 OutputStream errorStream,
-1707 OutputStreamOptions errorStreamOptions) {
-1708 super (infoStream, infoStreamOptions, errorStream, errorStreamOptions);
-1709 }
-1710
-1711 @Override
-1712 public void fileStarted(AuditEvent event) {
-1713 fileStartedCount++;
-1714 }
-1715 }
-1716
-1717 public static class DummyFilter implements Filter {
+1662 final DefaultConfiguration checkerConfig = createRootConfig(checkConfig);
+1663 checkerConfig.addProperty("charset" , "IBM1098" );
+1664
+1665 verify(checkerConfig, getPath("InputCheckerTestCharset.java" ), expected);
+1666 }
+1667
+1668 @Test
+1669 public void testViolationMessageOnIoException() throws Exception {
+1670 final DefaultConfiguration checkConfig =
+1671 createModuleConfig(CheckWhichThrowsError.class );
+1672
+1673 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
+1674 treeWalkerConfig.addChild(checkConfig);
+1675
+1676 final DefaultConfiguration checkerConfig = createRootConfig(treeWalkerConfig);
+1677 checkerConfig.addChild(treeWalkerConfig);
+1678
+1679 checkerConfig.addProperty("haltOnException" , "false" );
+1680 final File file = new File("InputNonChecker.java" );
+1681 final String filePath = file.getAbsolutePath();
+1682 final String[] expected = {
+1683 "1: " + getCheckMessage(EXCEPTION_MSG, filePath
+1684 + " (No such file or directory)" ),
+1685 };
+1686
+1687 verify(checkerConfig, filePath, expected);
+1688 }
+1689
+1690 public static class DefaultLoggerWithCounter extends DefaultLogger {
+1691
+1692 private int fileStartedCount;
+1693
+1694 public DefaultLoggerWithCounter(OutputStream infoStream,
+1695 OutputStreamOptions infoStreamOptions,
+1696 OutputStream errorStream,
+1697 OutputStreamOptions errorStreamOptions) {
+1698 super (infoStream, infoStreamOptions, errorStream, errorStreamOptions);
+1699 }
+1700
+1701 @Override
+1702 public void fileStarted(AuditEvent event) {
+1703 fileStartedCount++;
+1704 }
+1705 }
+1706
+1707 public static class DummyFilter implements Filter {
+1708
+1709 @Override
+1710 public boolean accept(AuditEvent event) {
+1711 return false;
+1712 }
+1713
+1714 }
+1715
+1716 public static class DummyFileSetViolationCheck extends AbstractFileSetCheck
+1717 implements ExternalResourceHolder {
1718
1719 @Override
-1720 public boolean accept(AuditEvent event) {
-1721 return false;
+1720 protected void processFiltered(File file, FileText fileText) {
+1721 log(1, "test" );
1722 }
1723
-1724 }
-1725
-1726 public static class DummyFileSetViolationCheck extends AbstractFileSetCheck
-1727 implements ExternalResourceHolder {
-1728
-1729 @Override
-1730 protected void processFiltered(File file, FileText fileText) {
-1731 log(1, "test" );
-1732 }
-1733
-1734 @Override
-1735 public Set<String> getExternalResourceLocations() {
-1736 final Set<String> externalResourceLocation = new HashSet<>(1);
-1737 externalResourceLocation.add("non_existent_external_resource.xml" );
-1738 return externalResourceLocation;
-1739 }
-1740
-1741 }
-1742
-1743 public static class DummyFilterSet extends FilterSet implements ExternalResourceHolder {
-1744
-1745 @Override
-1746 public Set<String> getExternalResourceLocations() {
-1747 final Set<String> strings = new HashSet<>();
-1748 strings.add("test" );
-1749 return strings;
-1750 }
-1751
-1752 }
+1724 @Override
+1725 public Set<String> getExternalResourceLocations() {
+1726 final Set<String> externalResourceLocation = new HashSet<>(1);
+1727 externalResourceLocation.add("non_existent_external_resource.xml" );
+1728 return externalResourceLocation;
+1729 }
+1730
+1731 }
+1732
+1733 public static class DummyFilterSet extends FilterSet implements ExternalResourceHolder {
+1734
+1735 @Override
+1736 public Set<String> getExternalResourceLocations() {
+1737 final Set<String> strings = new HashSet<>();
+1738 strings.add("test" );
+1739 return strings;
+1740 }
+1741
+1742 }
+1743
+1744 public static final class DynamicalResourceHolderCheck extends AbstractFileSetCheck
+1745 implements ExternalResourceHolder {
+1746
+1747 private String firstExternalResourceLocation;
+1748 private String secondExternalResourceLocation;
+1749
+1750 public void setFirstExternalResourceLocation(String firstExternalResourceLocation) {
+1751 this .firstExternalResourceLocation = firstExternalResourceLocation;
+1752 }
1753
-1754 public static final class DynamicalResourceHolderCheck extends AbstractFileSetCheck
-1755 implements ExternalResourceHolder {
-1756
-1757 private String firstExternalResourceLocation;
-1758 private String secondExternalResourceLocation;
-1759
-1760 public void setFirstExternalResourceLocation(String firstExternalResourceLocation) {
-1761 this .firstExternalResourceLocation = firstExternalResourceLocation;
-1762 }
-1763
-1764 public void setSecondExternalResourceLocation(String secondExternalResourceLocation) {
-1765 this .secondExternalResourceLocation = secondExternalResourceLocation;
-1766 }
-1767
-1768 @Override
-1769 protected void processFiltered(File file, FileText fileText) {
-1770
-1771 }
-1772
-1773 @Override
-1774 public Set<String> getExternalResourceLocations() {
-1775 final Set<String> locations = new HashSet<>();
-1776 locations.add(firstExternalResourceLocation);
-1777
-1778 if (secondExternalResourceLocation != null ) {
-1779 locations.add(secondExternalResourceLocation);
-1780 }
-1781 return locations;
-1782 }
-1783
-1784 }
+1754 public void setSecondExternalResourceLocation(String secondExternalResourceLocation) {
+1755 this .secondExternalResourceLocation = secondExternalResourceLocation;
+1756 }
+1757
+1758 @Override
+1759 protected void processFiltered(File file, FileText fileText) {
+1760
+1761 }
+1762
+1763 @Override
+1764 public Set<String> getExternalResourceLocations() {
+1765 final Set<String> locations = new HashSet<>();
+1766 locations.add(firstExternalResourceLocation);
+1767
+1768 if (secondExternalResourceLocation != null ) {
+1769 locations.add(secondExternalResourceLocation);
+1770 }
+1771 return locations;
+1772 }
+1773
+1774 }
+1775
+1776 public static class CheckWhichDoesNotRequireCommentNodes extends AbstractCheck {
+1777
+1778
+1779 private static final int METHOD_DEF_CHILD_COUNT = 7;
+1780
+1781 @Override
+1782 public int [] getDefaultTokens() {
+1783 return new int [] {TokenTypes.METHOD_DEF};
+1784 }
1785
-1786 public static class CheckWhichDoesNotRequireCommentNodes extends AbstractCheck {
-1787
-1788
-1789 private static final int METHOD_DEF_CHILD_COUNT = 7;
+1786 @Override
+1787 public int [] getAcceptableTokens() {
+1788 return new int [] {TokenTypes.METHOD_DEF};
+1789 }
1790
1791 @Override
-1792 public int [] getDefaultTokens() {
+1792 public int [] getRequiredTokens() {
1793 return new int [] {TokenTypes.METHOD_DEF};
1794 }
1795
1796 @Override
-1797 public int [] getAcceptableTokens() {
-1798 return new int [] {TokenTypes.METHOD_DEF};
-1799 }
-1800
-1801 @Override
-1802 public int [] getRequiredTokens() {
-1803 return new int [] {TokenTypes.METHOD_DEF};
-1804 }
-1805
-1806 @Override
-1807 public void visitToken(DetailAST ast) {
-1808 if (ast.findFirstToken(TokenTypes.MODIFIERS).findFirstToken(
-1809 TokenTypes.BLOCK_COMMENT_BEGIN) != null ) {
-1810 log(ast, "AST has incorrect structure structure."
-1811 + " The check does not require comment nodes but there were comment nodes"
-1812 + " in the AST." );
-1813 }
-1814 final int childCount = ast.getChildCount();
-1815 if (childCount != METHOD_DEF_CHILD_COUNT) {
-1816 final String msg = String.format(Locale.ENGLISH,
-1817 "AST node in no comment tree has wrong number of children. "
-1818 + "Expected is %d but was %d" ,
-1819 METHOD_DEF_CHILD_COUNT, childCount);
-1820 log(ast, msg);
-1821 }
-1822
-1823 int actualChildCount = 0;
-1824 for (DetailAST child = ast.getFirstChild().getFirstChild(); child != null ; child =
-1825 child.getNextSibling()) {
-1826 actualChildCount++;
-1827 }
-1828 final int cacheChildCount = ast.getFirstChild().getChildCount();
-1829 if (cacheChildCount != actualChildCount) {
-1830 final String msg = String.format(Locale.ENGLISH,
-1831 "AST node with no comment has wrong number of children. "
-1832 + "Expected is %d but was %d" ,
-1833 cacheChildCount, actualChildCount);
-1834 log(ast, msg);
-1835 }
-1836 }
-1837
-1838 }
+1797 public void visitToken(DetailAST ast) {
+1798 if (ast.findFirstToken(TokenTypes.MODIFIERS).findFirstToken(
+1799 TokenTypes.BLOCK_COMMENT_BEGIN) != null ) {
+1800 log(ast, "AST has incorrect structure structure."
+1801 + " The check does not require comment nodes but there were comment nodes"
+1802 + " in the AST." );
+1803 }
+1804 final int childCount = ast.getChildCount();
+1805 if (childCount != METHOD_DEF_CHILD_COUNT) {
+1806 final String msg = String.format(Locale.ENGLISH,
+1807 "AST node in no comment tree has wrong number of children. "
+1808 + "Expected is %d but was %d" ,
+1809 METHOD_DEF_CHILD_COUNT, childCount);
+1810 log(ast, msg);
+1811 }
+1812
+1813 int actualChildCount = 0;
+1814 for (DetailAST child = ast.getFirstChild().getFirstChild(); child != null ; child =
+1815 child.getNextSibling()) {
+1816 actualChildCount++;
+1817 }
+1818 final int cacheChildCount = ast.getFirstChild().getChildCount();
+1819 if (cacheChildCount != actualChildCount) {
+1820 final String msg = String.format(Locale.ENGLISH,
+1821 "AST node with no comment has wrong number of children. "
+1822 + "Expected is %d but was %d" ,
+1823 cacheChildCount, actualChildCount);
+1824 log(ast, msg);
+1825 }
+1826 }
+1827
+1828 }
+1829
+1830 public static class CheckWhichRequiresCommentNodes extends AbstractCheck {
+1831
+1832
+1833 private static final int METHOD_DEF_CHILD_COUNT = 7;
+1834
+1835 @Override
+1836 public boolean isCommentNodesRequired() {
+1837 return true ;
+1838 }
1839
-1840 public static class CheckWhichRequiresCommentNodes extends AbstractCheck {
-1841
-1842
-1843 private static final int METHOD_DEF_CHILD_COUNT = 7;
+1840 @Override
+1841 public int [] getDefaultTokens() {
+1842 return new int [] {TokenTypes.METHOD_DEF};
+1843 }
1844
1845 @Override
-1846 public boolean isCommentNodesRequired() {
-1847 return true ;
+1846 public int [] getAcceptableTokens() {
+1847 return new int [] {TokenTypes.METHOD_DEF};
1848 }
1849
1850 @Override
-1851 public int [] getDefaultTokens() {
+1851 public int [] getRequiredTokens() {
1852 return new int [] {TokenTypes.METHOD_DEF};
1853 }
1854
-1855 @Override
-1856 public int [] getAcceptableTokens() {
-1857 return new int [] {TokenTypes.METHOD_DEF};
-1858 }
-1859
-1860 @Override
-1861 public int [] getRequiredTokens() {
-1862 return new int [] {TokenTypes.METHOD_DEF};
-1863 }
-1864
-1865
-1866 @Override
-1867 public void visitToken(DetailAST ast) {
-1868 if (ast.findFirstToken(TokenTypes.MODIFIERS).findFirstToken(
-1869 TokenTypes.BLOCK_COMMENT_BEGIN) == null ) {
-1870 log(ast, "Incorrect AST structure." );
-1871 }
-1872 final int childCount = ast.getChildCount();
-1873 if (childCount != METHOD_DEF_CHILD_COUNT) {
-1874 final String msg = String.format(Locale.ENGLISH,
-1875 "AST node in comment tree has wrong number of children. "
-1876 + "Expected is %d but was %d" ,
-1877 METHOD_DEF_CHILD_COUNT, childCount);
-1878 log(ast, msg);
-1879 }
-1880
-1881 int actualChildCount = 0;
-1882 for (DetailAST child = ast.getFirstChild().getFirstChild(); child != null ; child =
-1883 child.getNextSibling()) {
-1884 actualChildCount++;
-1885 }
-1886 final int cacheChildCount = ast.getFirstChild().getChildCount();
-1887 if (cacheChildCount != actualChildCount) {
-1888 final String msg = String.format(Locale.ENGLISH,
-1889 "AST node with comment has wrong number of children. "
-1890 + "Expected is %d but was %d" ,
-1891 cacheChildCount, actualChildCount);
-1892 log(ast, msg);
-1893 }
-1894 }
-1895
-1896 }
-1897
-1898 public static class CheckWhichThrowsError extends AbstractCheck {
+1855
+1856 @Override
+1857 public void visitToken(DetailAST ast) {
+1858 if (ast.findFirstToken(TokenTypes.MODIFIERS).findFirstToken(
+1859 TokenTypes.BLOCK_COMMENT_BEGIN) == null ) {
+1860 log(ast, "Incorrect AST structure." );
+1861 }
+1862 final int childCount = ast.getChildCount();
+1863 if (childCount != METHOD_DEF_CHILD_COUNT) {
+1864 final String msg = String.format(Locale.ENGLISH,
+1865 "AST node in comment tree has wrong number of children. "
+1866 + "Expected is %d but was %d" ,
+1867 METHOD_DEF_CHILD_COUNT, childCount);
+1868 log(ast, msg);
+1869 }
+1870
+1871 int actualChildCount = 0;
+1872 for (DetailAST child = ast.getFirstChild().getFirstChild(); child != null ; child =
+1873 child.getNextSibling()) {
+1874 actualChildCount++;
+1875 }
+1876 final int cacheChildCount = ast.getFirstChild().getChildCount();
+1877 if (cacheChildCount != actualChildCount) {
+1878 final String msg = String.format(Locale.ENGLISH,
+1879 "AST node with comment has wrong number of children. "
+1880 + "Expected is %d but was %d" ,
+1881 cacheChildCount, actualChildCount);
+1882 log(ast, msg);
+1883 }
+1884 }
+1885
+1886 }
+1887
+1888 public static class CheckWhichThrowsError extends AbstractCheck {
+1889
+1890 @Override
+1891 public int [] getDefaultTokens() {
+1892 return new int [] {TokenTypes.CLASS_DEF};
+1893 }
+1894
+1895 @Override
+1896 public int [] getAcceptableTokens() {
+1897 return new int [] {TokenTypes.CLASS_DEF};
+1898 }
1899
1900 @Override
-1901 public int [] getDefaultTokens() {
+1901 public int [] getRequiredTokens() {
1902 return new int [] {TokenTypes.CLASS_DEF};
1903 }
1904
1905 @Override
-1906 public int [] getAcceptableTokens() {
-1907 return new int [] {TokenTypes.CLASS_DEF};
+1906 public void visitToken(DetailAST ast) {
+1907 throw new IndexOutOfBoundsException("test" );
1908 }
1909
-1910 @Override
-1911 public int [] getRequiredTokens() {
-1912 return new int [] {TokenTypes.CLASS_DEF};
-1913 }
-1914
-1915 @Override
-1916 public void visitToken(DetailAST ast) {
-1917 throw new IndexOutOfBoundsException("test" );
-1918 }
-1919
-1920 }
-1921
-1922 public static final class DummyFileSet extends AbstractFileSetCheck {
+1910 }
+1911
+1912 public static final class DummyFileSet extends AbstractFileSetCheck {
+1913
+1914 private final List<String> methodCalls = new ArrayList<>();
+1915
+1916 private boolean initCalled;
+1917
+1918 @Override
+1919 public void init() {
+1920 super .init();
+1921 initCalled = true ;
+1922 }
1923
-1924 private final List<String> methodCalls = new ArrayList<>();
-1925
-1926 private boolean initCalled;
-1927
-1928 @Override
-1929 public void init() {
-1930 super .init();
-1931 initCalled = true ;
-1932 }
-1933
-1934 @Override
-1935 public void beginProcessing(String charset) {
-1936 methodCalls.add("beginProcessing" );
-1937 super .beginProcessing(charset);
-1938 }
-1939
-1940 @Override
-1941 public void finishProcessing() {
-1942 methodCalls.add("finishProcessing" );
-1943 super .finishProcessing();
-1944 }
-1945
-1946 @Override
-1947 protected void processFiltered(File file, FileText fileText) {
-1948 methodCalls.add("processFiltered" );
+1924 @Override
+1925 public void beginProcessing(String charset) {
+1926 methodCalls.add("beginProcessing" );
+1927 super .beginProcessing(charset);
+1928 }
+1929
+1930 @Override
+1931 public void finishProcessing() {
+1932 methodCalls.add("finishProcessing" );
+1933 super .finishProcessing();
+1934 }
+1935
+1936 @Override
+1937 protected void processFiltered(File file, FileText fileText) {
+1938 methodCalls.add("processFiltered" );
+1939 }
+1940
+1941 @Override
+1942 public void destroy() {
+1943 methodCalls.add("destroy" );
+1944 super .destroy();
+1945 }
+1946
+1947 public List<String> getMethodCalls() {
+1948 return Collections.unmodifiableList(methodCalls);
1949 }
1950
-1951 @Override
-1952 public void destroy() {
-1953 methodCalls.add("destroy" );
-1954 super .destroy();
-1955 }
-1956
-1957 public List<String> getMethodCalls() {
-1958 return Collections.unmodifiableList(methodCalls);
-1959 }
+1951 public boolean isInitCalled() {
+1952 return initCalled;
+1953 }
+1954
+1955 public MessageDispatcher getInternalMessageDispatcher() {
+1956 return getMessageDispatcher();
+1957 }
+1958
+1959 }
1960
-1961 public boolean isInitCalled() {
-1962 return initCalled;
-1963 }
-1964
-1965 public MessageDispatcher getInternalMessageDispatcher() {
-1966 return getMessageDispatcher();
-1967 }
-1968
-1969 }
-1970
-1971 public static class VerifyPositionAfterTabFileSet extends AbstractFileSetCheck {
-1972
-1973 @Override
-1974 protected void processFiltered(File file, FileText fileText) {
-1975 int lineNumber = 0;
-1976 for (String line : getFileContents().getLines()) {
-1977 final int position = line.lastIndexOf('\t');
-1978 lineNumber++;
-1979
-1980 if (position != -1) {
-1981 log(lineNumber, position + 1, "violation" );
-1982 }
-1983 }
-1984 }
-1985
-1986 }
-1987
-1988 }
+1961 public static class VerifyPositionAfterTabFileSet extends AbstractFileSetCheck {
+1962
+1963 @Override
+1964 protected void processFiltered(File file, FileText fileText) {
+1965 int lineNumber = 0;
+1966 for (String line : getFileContents().getLines()) {
+1967 final int position = line.lastIndexOf('\t');
+1968 lineNumber++;
+1969
+1970 if (position != -1) {
+1971 log(lineNumber, position + 1, "violation" );
+1972 }
+1973 }
+1974 }
+1975
+1976 }
+1977
+1978 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/JavaAstVisitorTest.html b/xref-test/com/puppycrawl/tools/checkstyle/JavaAstVisitorTest.html
index 203d7802ad..29096c3f1d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/JavaAstVisitorTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/JavaAstVisitorTest.html
@@ -48,226 +48,230 @@
40 import com.puppycrawl.tools.checkstyle.api.FileContents;
41 import com.puppycrawl.tools.checkstyle.api.FileText;
42 import com.puppycrawl.tools.checkstyle.api.TokenTypes;
-43 import com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageLexer;
-44 import com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser;
-45 import com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParserBaseVisitor;
-46 import com.puppycrawl.tools.checkstyle.internal.utils.TestUtil;
-47
-48 public class JavaAstVisitorTest extends AbstractModuleTestSupport {
-49
-50
-51
-52
-53
-54
-55
-56
-57
-58 private static final Set<String> VISIT_METHODS_NOT_OVERRIDDEN = Set.of(
-59
-60 "visitClassOrInterfaceOrPrimitiveType" ,
-61 "visitNonWildcardTypeArgs" ,
-62 "visitStat" ,
-63 "visitAnnotationConstantRest" ,
-64 "visitSwitchLabeledRule" ,
-65 "visitLocalVariableDeclaration" ,
-66 "visitTypes" ,
-67 "visitSwitchStat" ,
-68 "visitSwitchPrimary" ,
-69 "visitClassDef" ,
-70 "visitInterfaceMemberDeclaration" ,
-71 "visitMemberDeclaration" ,
-72 "visitLiteralPrimary" ,
-73 "visitPatternDefinition" ,
-74 "visitLocalType" ,
-75 "visitLocalTypeDeclaration" ,
-76 "visitRecordBodyDeclaration" ,
-77 "visitResource" ,
-78 "visitVariableInitializer" ,
-79 "visitLambdaBody" ,
-80 "visitPatternVariableDef" ,
-81
-82
-83 "visitCreatedNameExtended" ,
-84 "visitSuperSuffixSimple" ,
-85 "visitFieldAccessNoIdent" ,
-86 "visitClassType" ,
-87 "visitClassOrInterfaceTypeExtended" ,
-88 "visitQualifiedNameExtended" ,
-89 "visitGuard" ,
-90
-91
-92 "visitTemplate" ,
-93
-94 "visitStringTemplateMiddle"
-95 );
-96
-97 @Override
-98 protected String getPackageLocation() {
-99 return "com/puppycrawl/tools/checkstyle/javaastvisitor" ;
-100 }
-101
-102 @Test
-103 public void testAllVisitMethodsAreOverridden() {
-104 final Method[] baseVisitMethods = JavaLanguageParserBaseVisitor
-105 .class .getDeclaredMethods();
-106 final Method[] visitMethods = JavaAstVisitor.class .getDeclaredMethods();
-107
-108 final Set<String> filteredBaseVisitMethodNames = Arrays.stream(baseVisitMethods)
-109 .filter(method -> !VISIT_METHODS_NOT_OVERRIDDEN.contains(method.getName()))
-110 .filter(method -> method.getName().contains("visit" ))
-111 .filter(method -> method.getModifiers() == Modifier.PUBLIC)
-112 .map(Method::getName)
-113 .collect(Collectors.toUnmodifiableSet());
-114
-115 final Set<String> filteredVisitMethodNames = Arrays.stream(visitMethods)
-116 .filter(method -> method.getName().contains("visit" ))
-117
-118
-119 .filter(method -> !"visit" .equals(method.getName()))
-120 .filter(method -> method.getModifiers() == Modifier.PUBLIC)
-121 .map(Method::getName)
-122 .collect(Collectors.toUnmodifiableSet());
-123
-124 final String message = "Visit methods in 'JavaLanguageParserBaseVisitor' generated from "
-125 + "production rules and labeled alternatives in 'JavaLanguageParser.g4' should "
-126 + "be overridden in 'JavaAstVisitor' or be added to 'VISIT_METHODS_NOT_OVERRIDDEN' "
-127 + "with comment explaining why." ;
-128
-129 assertWithMessage(message)
-130 .that(filteredVisitMethodNames)
-131 .containsExactlyElementsIn(filteredBaseVisitMethodNames);
-132 }
-133
-134 @Test
-135 public void testOrderOfVisitMethodsAndProductionRules() throws Exception {
-136
-137
-138 final String baseVisitorFilename = "target/generated-sources/antlr/com/puppycrawl"
-139 + "/tools/checkstyle/grammar/java/JavaLanguageParserBaseVisitor.java" ;
-140 final DetailAST baseVisitorAst = JavaParser.parseFile(new File(baseVisitorFilename),
-141 JavaParser.Options.WITHOUT_COMMENTS);
-142
-143 final String visitorFilename = "src/main/java/com/puppycrawl/tools/checkstyle"
-144 + "/JavaAstVisitor.java" ;
-145 final DetailAST visitorAst = JavaParser.parseFile(new File(visitorFilename),
-146 JavaParser.Options.WITHOUT_COMMENTS);
-147
-148 final List<String> orderedBaseVisitorMethodNames =
-149 getOrderedVisitMethodNames(baseVisitorAst);
-150 final List<String> orderedVisitorMethodNames =
-151 getOrderedVisitMethodNames(visitorAst);
-152
-153 orderedBaseVisitorMethodNames.removeAll(VISIT_METHODS_NOT_OVERRIDDEN);
+43 import com.puppycrawl.tools.checkstyle.grammar.CompositeLexerContextCache;
+44 import com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageLexer;
+45 import com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser;
+46 import com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParserBaseVisitor;
+47 import com.puppycrawl.tools.checkstyle.internal.utils.TestUtil;
+48
+49
+50 public class JavaAstVisitorTest extends AbstractModuleTestSupport {
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60 private static final Set<String> VISIT_METHODS_NOT_OVERRIDDEN = Set.of(
+61
+62 "visitClassOrInterfaceOrPrimitiveType" ,
+63 "visitNonWildcardTypeArgs" ,
+64 "visitStat" ,
+65 "visitAnnotationConstantRest" ,
+66 "visitSwitchLabeledRule" ,
+67 "visitLocalVariableDeclaration" ,
+68 "visitTypes" ,
+69 "visitSwitchStat" ,
+70 "visitSwitchPrimary" ,
+71 "visitClassDef" ,
+72 "visitInterfaceMemberDeclaration" ,
+73 "visitMemberDeclaration" ,
+74 "visitLiteralPrimary" ,
+75 "visitPatternDefinition" ,
+76 "visitLocalType" ,
+77 "visitLocalTypeDeclaration" ,
+78 "visitRecordBodyDeclaration" ,
+79 "visitResource" ,
+80 "visitVariableInitializer" ,
+81 "visitLambdaBody" ,
+82 "visitPatternVariableDef" ,
+83
+84
+85 "visitCreatedNameExtended" ,
+86 "visitSuperSuffixSimple" ,
+87 "visitFieldAccessNoIdent" ,
+88 "visitClassType" ,
+89 "visitClassOrInterfaceTypeExtended" ,
+90 "visitQualifiedNameExtended" ,
+91 "visitGuard" ,
+92
+93
+94 "visitTemplate" ,
+95
+96 "visitStringTemplateMiddle"
+97 );
+98
+99 @Override
+100 protected String getPackageLocation() {
+101 return "com/puppycrawl/tools/checkstyle/javaastvisitor" ;
+102 }
+103
+104 @Test
+105 public void testAllVisitMethodsAreOverridden() {
+106 final Method[] baseVisitMethods = JavaLanguageParserBaseVisitor
+107 .class .getDeclaredMethods();
+108 final Method[] visitMethods = JavaAstVisitor.class .getDeclaredMethods();
+109
+110 final Set<String> filteredBaseVisitMethodNames = Arrays.stream(baseVisitMethods)
+111 .filter(method -> !VISIT_METHODS_NOT_OVERRIDDEN.contains(method.getName()))
+112 .filter(method -> method.getName().contains("visit" ))
+113 .filter(method -> method.getModifiers() == Modifier.PUBLIC)
+114 .map(Method::getName)
+115 .collect(Collectors.toUnmodifiableSet());
+116
+117 final Set<String> filteredVisitMethodNames = Arrays.stream(visitMethods)
+118 .filter(method -> method.getName().contains("visit" ))
+119
+120
+121 .filter(method -> !"visit" .equals(method.getName()))
+122 .filter(method -> method.getModifiers() == Modifier.PUBLIC)
+123 .map(Method::getName)
+124 .collect(Collectors.toUnmodifiableSet());
+125
+126 final String message = "Visit methods in 'JavaLanguageParserBaseVisitor' generated from "
+127 + "production rules and labeled alternatives in 'JavaLanguageParser.g4' should "
+128 + "be overridden in 'JavaAstVisitor' or be added to 'VISIT_METHODS_NOT_OVERRIDDEN' "
+129 + "with comment explaining why." ;
+130
+131 assertWithMessage(message)
+132 .that(filteredVisitMethodNames)
+133 .containsExactlyElementsIn(filteredBaseVisitMethodNames);
+134 }
+135
+136 @Test
+137 public void testOrderOfVisitMethodsAndProductionRules() throws Exception {
+138
+139
+140 final String baseVisitorFilename = "target/generated-sources/antlr/com/puppycrawl"
+141 + "/tools/checkstyle/grammar/java/JavaLanguageParserBaseVisitor.java" ;
+142 final DetailAST baseVisitorAst = JavaParser.parseFile(new File(baseVisitorFilename),
+143 JavaParser.Options.WITHOUT_COMMENTS);
+144
+145 final String visitorFilename = "src/main/java/com/puppycrawl/tools/checkstyle"
+146 + "/JavaAstVisitor.java" ;
+147 final DetailAST visitorAst = JavaParser.parseFile(new File(visitorFilename),
+148 JavaParser.Options.WITHOUT_COMMENTS);
+149
+150 final List<String> orderedBaseVisitorMethodNames =
+151 getOrderedVisitMethodNames(baseVisitorAst);
+152 final List<String> orderedVisitorMethodNames =
+153 getOrderedVisitMethodNames(visitorAst);
154
-155
-156 orderedVisitorMethodNames.remove("visit" );
-157
-158 assertWithMessage("Visit methods in 'JavaAstVisitor' should appear in same order as "
-159 + "production rules and labeled alternatives in 'JavaLanguageParser.g4'." )
-160 .that(orderedVisitorMethodNames)
-161 .containsExactlyElementsIn(orderedBaseVisitorMethodNames)
-162 .inOrder();
-163 }
-164
-165
-166
-167
-168
-169
-170
-171
-172
-173 private static List<String> getOrderedVisitMethodNames(DetailAST root) {
-174 final List<String> orderedVisitMethodNames = new ArrayList<>();
-175
-176 DetailAST classDef = root.getFirstChild();
-177 while (classDef.getType() != TokenTypes.CLASS_DEF) {
-178 classDef = classDef.getNextSibling();
-179 }
-180
-181 final DetailAST objBlock = classDef.findFirstToken(TokenTypes.OBJBLOCK);
-182 DetailAST objBlockChild = objBlock.findFirstToken(TokenTypes.METHOD_DEF);
-183 while (objBlockChild != null ) {
-184 if (isVisitMethod(objBlockChild)) {
-185 orderedVisitMethodNames.add(objBlockChild
-186 .findFirstToken(TokenTypes.IDENT)
-187 .getText());
-188 }
-189 objBlockChild = objBlockChild.getNextSibling();
-190 }
-191 return orderedVisitMethodNames;
-192 }
-193
-194
-195
-196
-197
-198
-199
-200 private static boolean isVisitMethod(DetailAST objBlockChild) {
-201 return objBlockChild.getType() == TokenTypes.METHOD_DEF
-202 && objBlockChild.findFirstToken(TokenTypes.IDENT).getText().contains("visit" );
-203 }
-204
-205 @Test
-206 public void testNullSelfInAddLastSibling() throws Exception {
-207 final Method addLastSibling = JavaAstVisitor.class
-208 .getDeclaredMethod("addLastSibling" , DetailAstImpl.class , DetailAstImpl.class );
-209 addLastSibling.setAccessible(true );
-210 assertWithMessage("Method should not throw exception." )
-211 .that(addLastSibling.invoke(JavaAstVisitor.class , null , null ))
-212 .isNull();
-213 }
-214
-215
-216
-217
-218
-219
-220
-221
-222
-223
-224
-225
-226
-227
-228
-229
-230
-231
-232
-233 @Test
-234 public void testNoStackOverflowOnDeepStringConcat() throws Exception {
-235 final File file =
-236 new File(getPath("InputJavaAstVisitorNoStackOverflowOnDeepStringConcat.java" ));
-237 final FileText fileText = new FileText(file, StandardCharsets.UTF_8.name());
-238 final FileContents contents = new FileContents(fileText);
-239
-240 final String fullText = contents.getText().getFullText().toString();
-241 final CharStream codePointCharStream = CharStreams.fromString(fullText);
-242 final JavaLanguageLexer lexer = new JavaLanguageLexer(codePointCharStream, true );
-243 lexer.setCommentListener(contents);
-244
-245 final CommonTokenStream tokenStream = new CommonTokenStream(lexer);
-246 final JavaLanguageParser parser = new JavaLanguageParser(tokenStream);
-247
-248 final JavaLanguageParser.CompilationUnitContext compilationUnit = parser.compilationUnit();
-249
-250
-251
-252
-253
-254 final DetailAST root = TestUtil.getResultWithLimitedResources(
-255 () -> new JavaAstVisitor(tokenStream).visit(compilationUnit)
-256 );
-257
-258 assertWithMessage("File parsing and AST building should complete successfully." )
-259 .that(root)
-260 .isNotNull();
-261 }
-262 }
+155 orderedBaseVisitorMethodNames.removeAll(VISIT_METHODS_NOT_OVERRIDDEN);
+156
+157
+158 orderedVisitorMethodNames.remove("visit" );
+159
+160 assertWithMessage("Visit methods in 'JavaAstVisitor' should appear in same order as "
+161 + "production rules and labeled alternatives in 'JavaLanguageParser.g4'." )
+162 .that(orderedVisitorMethodNames)
+163 .containsExactlyElementsIn(orderedBaseVisitorMethodNames)
+164 .inOrder();
+165 }
+166
+167
+168
+169
+170
+171
+172
+173
+174
+175 private static List<String> getOrderedVisitMethodNames(DetailAST root) {
+176 final List<String> orderedVisitMethodNames = new ArrayList<>();
+177
+178 DetailAST classDef = root.getFirstChild();
+179 while (classDef.getType() != TokenTypes.CLASS_DEF) {
+180 classDef = classDef.getNextSibling();
+181 }
+182
+183 final DetailAST objBlock = classDef.findFirstToken(TokenTypes.OBJBLOCK);
+184 DetailAST objBlockChild = objBlock.findFirstToken(TokenTypes.METHOD_DEF);
+185 while (objBlockChild != null ) {
+186 if (isVisitMethod(objBlockChild)) {
+187 orderedVisitMethodNames.add(objBlockChild
+188 .findFirstToken(TokenTypes.IDENT)
+189 .getText());
+190 }
+191 objBlockChild = objBlockChild.getNextSibling();
+192 }
+193 return orderedVisitMethodNames;
+194 }
+195
+196
+197
+198
+199
+200
+201
+202 private static boolean isVisitMethod(DetailAST objBlockChild) {
+203 return objBlockChild.getType() == TokenTypes.METHOD_DEF
+204 && objBlockChild.findFirstToken(TokenTypes.IDENT).getText().contains("visit" );
+205 }
+206
+207 @Test
+208 public void testNullSelfInAddLastSibling() throws Exception {
+209 final Method addLastSibling = JavaAstVisitor.class
+210 .getDeclaredMethod("addLastSibling" , DetailAstImpl.class , DetailAstImpl.class );
+211 addLastSibling.setAccessible(true );
+212 assertWithMessage("Method should not throw exception." )
+213 .that(addLastSibling.invoke(JavaAstVisitor.class , null , null ))
+214 .isNull();
+215 }
+216
+217
+218
+219
+220
+221
+222
+223
+224
+225
+226
+227
+228
+229
+230
+231
+232
+233
+234
+235 @Test
+236 public void testNoStackOverflowOnDeepStringConcat() throws Exception {
+237 final File file =
+238 new File(getPath("InputJavaAstVisitorNoStackOverflowOnDeepStringConcat.java" ));
+239 final FileText fileText = new FileText(file, StandardCharsets.UTF_8.name());
+240 final FileContents contents = new FileContents(fileText);
+241
+242 final String fullText = contents.getText().getFullText().toString();
+243 final CharStream codePointCharStream = CharStreams.fromString(fullText);
+244 final JavaLanguageLexer lexer = new JavaLanguageLexer(codePointCharStream, true );
+245 final CompositeLexerContextCache contextCache = new CompositeLexerContextCache(lexer);
+246 lexer.setCommentListener(contents);
+247 lexer.setContextCache(contextCache);
+248
+249 final CommonTokenStream tokenStream = new CommonTokenStream(lexer);
+250 final JavaLanguageParser parser = new JavaLanguageParser(tokenStream);
+251
+252 final JavaLanguageParser.CompilationUnitContext compilationUnit = parser.compilationUnit();
+253
+254
+255
+256
+257
+258 final DetailAST root = TestUtil.getResultWithLimitedResources(
+259 () -> new JavaAstVisitor(tokenStream).visit(compilationUnit)
+260 );
+261
+262 assertWithMessage("File parsing and AST building should complete successfully." )
+263 .that(root)
+264 .isNotNull();
+265 }
+266 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/PropertyCacheFileTest.html b/xref-test/com/puppycrawl/tools/checkstyle/PropertyCacheFileTest.html
index 20787e38ec..4601391d79 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/PropertyCacheFileTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/PropertyCacheFileTest.html
@@ -48,511 +48,524 @@
40 import java.util.Locale;
41 import java.util.Properties;
42 import java.util.Set;
-43
-44 import org.junit.jupiter.api.Test;
-45 import org.junit.jupiter.api.condition.DisabledOnOs;
-46 import org.junit.jupiter.api.condition.OS;
-47 import org.junit.jupiter.api.io.TempDir;
-48 import org.junit.jupiter.params.ParameterizedTest;
-49 import org.junit.jupiter.params.provider.ValueSource;
-50 import org.mockito.MockedStatic;
-51
-52 import com.google.common.io.BaseEncoding;
-53 import com.google.common.io.ByteStreams;
-54 import com.puppycrawl.tools.checkstyle.api.CheckstyleException;
-55 import com.puppycrawl.tools.checkstyle.api.Configuration;
-56 import com.puppycrawl.tools.checkstyle.internal.utils.TestUtil;
-57 import com.puppycrawl.tools.checkstyle.utils.CommonUtil;
-58
-59 public class PropertyCacheFileTest extends AbstractPathTestSupport {
-60
-61 @TempDir
-62 public File temporaryFolder;
-63
-64 @Override
-65 protected String getPackageLocation() {
-66 return "com/puppycrawl/tools/checkstyle/propertycachefile" ;
-67 }
-68
-69 @Test
-70 public void testCtor() {
-71 try {
-72 final Object test = new PropertyCacheFile(null , "" );
-73 assertWithMessage("exception expected but got " + test).fail();
-74 }
-75 catch (IllegalArgumentException ex) {
-76 assertWithMessage("Invalid exception message" )
-77 .that(ex.getMessage())
-78 .isEqualTo("config can not be null" );
-79 }
-80 final Configuration config = new DefaultConfiguration("myName" );
-81 try {
-82 final Object test = new PropertyCacheFile(config, null );
-83 assertWithMessage("exception expected but got " + test).fail();
-84 }
-85 catch (IllegalArgumentException ex) {
-86 assertWithMessage("Invalid exception message" )
-87 .that(ex.getMessage())
-88 .isEqualTo("fileName can not be null" );
-89 }
-90 }
-91
-92 @Test
-93 public void testInCache() throws IOException {
-94 final Configuration config = new DefaultConfiguration("myName" );
-95 final String filePath = File.createTempFile("junit" , null , temporaryFolder).getPath();
-96 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath);
-97 cache.put("myFile" , 1);
-98 assertWithMessage("Should return true when file is in cache" )
-99 .that(cache.isInCache("myFile" , 1))
-100 .isTrue();
-101 assertWithMessage("Should return false when file is not in cache" )
-102 .that(cache.isInCache("myFile" , 2))
-103 .isFalse();
-104 assertWithMessage("Should return false when file is not in cache" )
-105 .that(cache.isInCache("myFile1" , 1))
-106 .isFalse();
-107 }
-108
-109 @Test
-110 public void testResetIfFileDoesNotExist() throws IOException {
-111 final Configuration config = new DefaultConfiguration("myName" );
-112 final PropertyCacheFile cache = new PropertyCacheFile(config, "fileDoesNotExist.txt" );
-113
-114 cache.load();
+43 import java.util.UUID;
+44
+45 import org.junit.jupiter.api.Test;
+46 import org.junit.jupiter.api.condition.DisabledOnOs;
+47 import org.junit.jupiter.api.condition.OS;
+48 import org.junit.jupiter.api.io.TempDir;
+49 import org.junit.jupiter.params.ParameterizedTest;
+50 import org.junit.jupiter.params.provider.ValueSource;
+51 import org.mockito.MockedStatic;
+52
+53 import com.google.common.io.BaseEncoding;
+54 import com.google.common.io.ByteStreams;
+55 import com.puppycrawl.tools.checkstyle.api.CheckstyleException;
+56 import com.puppycrawl.tools.checkstyle.api.Configuration;
+57 import com.puppycrawl.tools.checkstyle.internal.utils.TestUtil;
+58 import com.puppycrawl.tools.checkstyle.utils.CommonUtil;
+59
+60 public class PropertyCacheFileTest extends AbstractPathTestSupport {
+61
+62 @TempDir
+63 public File temporaryFolder;
+64
+65 @Override
+66 protected String getPackageLocation() {
+67 return "com/puppycrawl/tools/checkstyle/propertycachefile" ;
+68 }
+69
+70 @Test
+71 public void testCtor() {
+72 try {
+73 final Object test = new PropertyCacheFile(null , "" );
+74 assertWithMessage("exception expected but got " + test).fail();
+75 }
+76 catch (IllegalArgumentException ex) {
+77 assertWithMessage("Invalid exception message" )
+78 .that(ex.getMessage())
+79 .isEqualTo("config can not be null" );
+80 }
+81 final Configuration config = new DefaultConfiguration("myName" );
+82 try {
+83 final Object test = new PropertyCacheFile(config, null );
+84 assertWithMessage("exception expected but got " + test).fail();
+85 }
+86 catch (IllegalArgumentException ex) {
+87 assertWithMessage("Invalid exception message" )
+88 .that(ex.getMessage())
+89 .isEqualTo("fileName can not be null" );
+90 }
+91 }
+92
+93 @Test
+94 public void testInCache() {
+95 final Configuration config = new DefaultConfiguration("myName" );
+96 final String uniqueFileName = "junit_" + UUID.randomUUID() + ".java" ;
+97 final File filePath = new File(temporaryFolder, uniqueFileName);
+98 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath.toString());
+99 cache.put("myFile" , 1);
+100 assertWithMessage("Should return true when file is in cache" )
+101 .that(cache.isInCache("myFile" , 1))
+102 .isTrue();
+103 assertWithMessage("Should return false when file is not in cache" )
+104 .that(cache.isInCache("myFile" , 2))
+105 .isFalse();
+106 assertWithMessage("Should return false when file is not in cache" )
+107 .that(cache.isInCache("myFile1" , 1))
+108 .isFalse();
+109 }
+110
+111 @Test
+112 public void testResetIfFileDoesNotExist() throws IOException {
+113 final Configuration config = new DefaultConfiguration("myName" );
+114 final PropertyCacheFile cache = new PropertyCacheFile(config, "fileDoesNotExist.txt" );
115
-116 assertWithMessage("Config hash key should not be null" )
-117 .that(cache.get(PropertyCacheFile.CONFIG_HASH_KEY))
-118 .isNotNull();
-119 }
-120
-121 @Test
-122 public void testPopulateDetails() throws IOException {
-123 final Configuration config = new DefaultConfiguration("myName" );
-124 final PropertyCacheFile cache = new PropertyCacheFile(config,
-125 getPath("InputPropertyCacheFile" ));
-126 cache.load();
-127
-128 final String hash = cache.get(PropertyCacheFile.CONFIG_HASH_KEY);
-129 assertWithMessage("Config hash key should not be null" )
-130 .that(hash)
-131 .isNotNull();
-132 assertWithMessage("Should return null if key is not in cache" )
-133 .that(cache.get("key" ))
-134 .isNull();
-135
-136 cache.load();
+116 cache.load();
+117
+118 assertWithMessage("Config hash key should not be null" )
+119 .that(cache.get(PropertyCacheFile.CONFIG_HASH_KEY))
+120 .isNotNull();
+121 }
+122
+123 @Test
+124 public void testPopulateDetails() throws IOException {
+125 final Configuration config = new DefaultConfiguration("myName" );
+126 final PropertyCacheFile cache = new PropertyCacheFile(config,
+127 getPath("InputPropertyCacheFile" ));
+128 cache.load();
+129
+130 final String hash = cache.get(PropertyCacheFile.CONFIG_HASH_KEY);
+131 assertWithMessage("Config hash key should not be null" )
+132 .that(hash)
+133 .isNotNull();
+134 assertWithMessage("Should return null if key is not in cache" )
+135 .that(cache.get("key" ))
+136 .isNull();
137
-138 assertWithMessage("Invalid config hash key" )
-139 .that(cache.get(PropertyCacheFile.CONFIG_HASH_KEY))
-140 .isEqualTo(hash);
-141 assertWithMessage("Invalid cache value" )
-142 .that(cache.get("key" ))
-143 .isEqualTo("value" );
-144 assertWithMessage("Config hash key should not be null" )
-145 .that(cache.get(PropertyCacheFile.CONFIG_HASH_KEY))
-146 .isNotNull();
-147 }
-148
-149 @Test
-150 public void testConfigHashOnReset() throws IOException {
-151 final Configuration config = new DefaultConfiguration("myName" );
-152 final String filePath = File.createTempFile("junit" , null , temporaryFolder).getPath();
-153 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath);
-154
-155 cache.load();
-156
-157 final String hash = cache.get(PropertyCacheFile.CONFIG_HASH_KEY);
-158 assertWithMessage("Config hash key should not be null" )
-159 .that(hash)
-160 .isNotNull();
-161
-162 cache.reset();
-163
-164 assertWithMessage("Invalid config hash key" )
-165 .that(cache.get(PropertyCacheFile.CONFIG_HASH_KEY))
-166 .isEqualTo(hash);
-167 }
-168
-169 @Test
-170 public void testConfigHashRemainsOnResetExternalResources() throws IOException {
-171 final Configuration config = new DefaultConfiguration("myName" );
-172 final String filePath = File.createTempFile("junit" , null , temporaryFolder).getPath();
-173 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath);
-174
-175
-176 cache.load();
-177 cache.put("myFile" , 1);
+138 cache.load();
+139
+140 assertWithMessage("Invalid config hash key" )
+141 .that(cache.get(PropertyCacheFile.CONFIG_HASH_KEY))
+142 .isEqualTo(hash);
+143 assertWithMessage("Invalid cache value" )
+144 .that(cache.get("key" ))
+145 .isEqualTo("value" );
+146 assertWithMessage("Config hash key should not be null" )
+147 .that(cache.get(PropertyCacheFile.CONFIG_HASH_KEY))
+148 .isNotNull();
+149 }
+150
+151 @Test
+152 public void testConfigHashOnReset() throws IOException {
+153 final Configuration config = new DefaultConfiguration("myName" );
+154 final String uniqueFileName = "junit_" + UUID.randomUUID() + ".java" ;
+155 final File filePath = new File(temporaryFolder, uniqueFileName);
+156 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath.toString());
+157
+158 cache.load();
+159
+160 final String hash = cache.get(PropertyCacheFile.CONFIG_HASH_KEY);
+161 assertWithMessage("Config hash key should not be null" )
+162 .that(hash)
+163 .isNotNull();
+164
+165 cache.reset();
+166
+167 assertWithMessage("Invalid config hash key" )
+168 .that(cache.get(PropertyCacheFile.CONFIG_HASH_KEY))
+169 .isEqualTo(hash);
+170 }
+171
+172 @Test
+173 public void testConfigHashRemainsOnResetExternalResources() throws IOException {
+174 final Configuration config = new DefaultConfiguration("myName" );
+175 final String uniqueFileName = "file_" + UUID.randomUUID() + ".java" ;
+176 final File filePath = new File(temporaryFolder, uniqueFileName);
+177 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath.toString());
178
-179 final String hash = cache.get(PropertyCacheFile.CONFIG_HASH_KEY);
-180 assertWithMessage("Config hash key should not be null" )
-181 .that(hash)
-182 .isNotNull();
-183
-184
-185 final Set<String> resources = new HashSet<>();
-186 resources.add("dummy" );
-187 cache.putExternalResources(resources);
-188
-189 assertWithMessage("Invalid config hash key" )
-190 .that(cache.get(PropertyCacheFile.CONFIG_HASH_KEY))
-191 .isEqualTo(hash);
-192 assertWithMessage("Should return false in file is not in cache" )
-193 .that(cache.isInCache("myFile" , 1))
-194 .isFalse();
-195 }
-196
-197 @Test
-198 public void testCacheRemainsWhenExternalResourceTheSame() throws IOException {
-199 final Configuration config = new DefaultConfiguration("myName" );
-200 final String externalResourcePath =
-201 File.createTempFile("junit" , null , temporaryFolder).getPath();
-202 final String filePath = File.createTempFile("junit" , null , temporaryFolder).getPath();
-203 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath);
-204
-205
-206
-207 cache.load();
-208
-209 final Set<String> resources = new HashSet<>();
-210 resources.add(externalResourcePath);
-211 cache.putExternalResources(resources);
-212
-213 cache.persist();
-214
-215
-216
-217 cache.load();
-218 cache.put("myFile" , 1);
-219 cache.putExternalResources(resources);
-220
-221 assertWithMessage("Should return true in file is in cache" )
-222 .that(cache.isInCache("myFile" , 1))
-223 .isTrue();
-224 }
-225
-226 @Test
-227 public void testExternalResourceIsSavedInCache() throws Exception {
-228 final Configuration config = new DefaultConfiguration("myName" );
-229 final String filePath = File.createTempFile("junit" , null , temporaryFolder).getPath();
-230 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath);
-231
-232 cache.load();
-233
-234 final Set<String> resources = new HashSet<>();
-235 final String pathToResource = getPath("InputPropertyCacheFileExternal.properties" );
-236 resources.add(pathToResource);
-237 cache.putExternalResources(resources);
-238
-239 final MessageDigest digest = MessageDigest.getInstance("SHA-1" );
-240 final URI uri = CommonUtil.getUriByFilename(pathToResource);
-241 final byte[] input =
-242 ByteStreams.toByteArray(new BufferedInputStream(uri.toURL().openStream()));
-243 final ByteArrayOutputStream out = new ByteArrayOutputStream();
-244 try (ObjectOutputStream oos = new ObjectOutputStream(out)) {
-245 oos.writeObject(input);
-246 }
-247 digest.update(out.toByteArray());
-248 final String expected = BaseEncoding.base16().upperCase().encode(digest.digest());
-249
-250 assertWithMessage("Hashes are not equal" )
-251 .that(cache.get("module-resource*?:" + pathToResource))
-252 .isEqualTo(expected);
-253 }
-254
-255 @Test
-256 public void testCacheDirectoryDoesNotExistAndShouldBeCreated() throws IOException {
-257 final Configuration config = new DefaultConfiguration("myName" );
-258 final String filePath = String.format(Locale.ENGLISH, "%s%2$stemp%2$scache.temp" ,
-259 temporaryFolder, File.separator);
-260 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath);
-261
-262
-263 cache.persist();
-264
-265 assertWithMessage("cache exists in directory" )
-266 .that(new File(filePath).exists())
-267 .isTrue();
-268 }
+179
+180 cache.load();
+181 cache.put("myFile" , 1);
+182
+183 final String hash = cache.get(PropertyCacheFile.CONFIG_HASH_KEY);
+184 assertWithMessage("Config hash key should not be null" )
+185 .that(hash)
+186 .isNotNull();
+187
+188
+189 final Set<String> resources = new HashSet<>();
+190 resources.add("dummy" );
+191 cache.putExternalResources(resources);
+192
+193 assertWithMessage("Invalid config hash key" )
+194 .that(cache.get(PropertyCacheFile.CONFIG_HASH_KEY))
+195 .isEqualTo(hash);
+196 assertWithMessage("Should return false in file is not in cache" )
+197 .that(cache.isInCache("myFile" , 1))
+198 .isFalse();
+199 }
+200
+201 @Test
+202 public void testCacheRemainsWhenExternalResourceTheSame() throws IOException {
+203 final Configuration config = new DefaultConfiguration("myName" );
+204 final String externalFile = "junit_" + UUID.randomUUID() + ".java" ;
+205 final File externalResourcePath = new File(temporaryFolder, externalFile);
+206 externalResourcePath.createNewFile();
+207 final String uniqueFileName = "junit_" + UUID.randomUUID() + ".java" ;
+208 final File filePath = new File(temporaryFolder, uniqueFileName);
+209 filePath.createNewFile();
+210 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath.toString());
+211
+212
+213
+214 cache.load();
+215
+216 final Set<String> resources = new HashSet<>();
+217 resources.add(externalResourcePath.toString());
+218 cache.putExternalResources(resources);
+219
+220 cache.persist();
+221
+222
+223
+224 cache.load();
+225 cache.put("myFile" , 1);
+226 cache.putExternalResources(resources);
+227
+228 assertWithMessage("Should return true in file is in cache" )
+229 .that(cache.isInCache("myFile" , 1))
+230 .isTrue();
+231 }
+232
+233 @Test
+234 public void testExternalResourceIsSavedInCache() throws Exception {
+235 final Configuration config = new DefaultConfiguration("myName" );
+236 final String uniqueFileName = "junit_" + UUID.randomUUID() + ".java" ;
+237 final File filePath = new File(temporaryFolder, uniqueFileName);
+238 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath.toString());
+239
+240 cache.load();
+241
+242 final Set<String> resources = new HashSet<>();
+243 final String pathToResource = getPath("InputPropertyCacheFileExternal.properties" );
+244 resources.add(pathToResource);
+245 cache.putExternalResources(resources);
+246
+247 final MessageDigest digest = MessageDigest.getInstance("SHA-1" );
+248 final URI uri = CommonUtil.getUriByFilename(pathToResource);
+249 final byte[] input =
+250 ByteStreams.toByteArray(new BufferedInputStream(uri.toURL().openStream()));
+251 final ByteArrayOutputStream out = new ByteArrayOutputStream();
+252 try (ObjectOutputStream oos = new ObjectOutputStream(out)) {
+253 oos.writeObject(input);
+254 }
+255 digest.update(out.toByteArray());
+256 final String expected = BaseEncoding.base16().upperCase().encode(digest.digest());
+257
+258 assertWithMessage("Hashes are not equal" )
+259 .that(cache.get("module-resource*?:" + pathToResource))
+260 .isEqualTo(expected);
+261 }
+262
+263 @Test
+264 public void testCacheDirectoryDoesNotExistAndShouldBeCreated() throws IOException {
+265 final Configuration config = new DefaultConfiguration("myName" );
+266 final String filePath = String.format(Locale.ENGLISH, "%s%2$stemp%2$scache.temp" ,
+267 temporaryFolder, File.separator);
+268 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath);
269
-270 @Test
-271 public void testPathToCacheContainsOnlyFileName() throws IOException {
-272 final Configuration config = new DefaultConfiguration("myName" );
-273 final String fileName = "temp.cache" ;
-274 final Path filePath = Paths.get(fileName);
-275 final PropertyCacheFile cache = new PropertyCacheFile(config, fileName);
-276
-277
-278 cache.persist();
-279
-280 assertWithMessage("Cache file does not exist" )
-281 .that(Files.exists(filePath))
-282 .isTrue();
-283 Files.delete(filePath);
-284 }
-285
-286 @Test
-287 @DisabledOnOs(OS.WINDOWS)
-288 public void testPersistWithSymbolicLinkToDirectory() throws IOException {
-289 final Path tempDirectory = temporaryFolder.toPath();
-290 final Path symbolicLinkDirectory = temporaryFolder.toPath()
-291 .resolve("symbolicLink" );
-292 Files.createSymbolicLink(symbolicLinkDirectory, tempDirectory);
+270
+271 cache.persist();
+272
+273 assertWithMessage("cache exists in directory" )
+274 .that(new File(filePath).exists())
+275 .isTrue();
+276 }
+277
+278 @Test
+279 public void testPathToCacheContainsOnlyFileName() throws IOException {
+280 final Configuration config = new DefaultConfiguration("myName" );
+281 final String fileName = "temp.cache" ;
+282 final Path filePath = Paths.get(fileName);
+283 final PropertyCacheFile cache = new PropertyCacheFile(config, fileName);
+284
+285
+286 cache.persist();
+287
+288 assertWithMessage("Cache file does not exist" )
+289 .that(Files.exists(filePath))
+290 .isTrue();
+291 Files.delete(filePath);
+292 }
293
-294 final Configuration config = new DefaultConfiguration("myName" );
-295 final String cacheFilePath = symbolicLinkDirectory.resolve("cache.temp" ).toString();
-296 final PropertyCacheFile cache = new PropertyCacheFile(config, cacheFilePath);
-297
-298 cache.persist();
-299
-300 final Path expectedFilePath = tempDirectory.resolve("cache.temp" );
-301 assertWithMessage("Cache file should be created in the actual directory" )
-302 .that(Files.exists(expectedFilePath))
-303 .isTrue();
-304 }
+294 @Test
+295 @DisabledOnOs(OS.WINDOWS)
+296 public void testPersistWithSymbolicLinkToDirectory() throws IOException {
+297 final Path tempDirectory = temporaryFolder.toPath();
+298 final Path symbolicLinkDirectory = temporaryFolder.toPath()
+299 .resolve("symbolicLink" );
+300 Files.createSymbolicLink(symbolicLinkDirectory, tempDirectory);
+301
+302 final Configuration config = new DefaultConfiguration("myName" );
+303 final String cacheFilePath = symbolicLinkDirectory.resolve("cache.temp" ).toString();
+304 final PropertyCacheFile cache = new PropertyCacheFile(config, cacheFilePath);
305
-306 @Test
-307 @DisabledOnOs(OS.WINDOWS)
-308 public void testSymbolicLinkResolution() throws IOException {
-309 final Path tempDirectory = temporaryFolder.toPath();
-310 final Path symbolicLinkDirectory = temporaryFolder.toPath()
-311 .resolve("symbolicLink" );
-312 Files.createSymbolicLink(symbolicLinkDirectory, tempDirectory);
+306 cache.persist();
+307
+308 final Path expectedFilePath = tempDirectory.resolve("cache.temp" );
+309 assertWithMessage("Cache file should be created in the actual directory" )
+310 .that(Files.exists(expectedFilePath))
+311 .isTrue();
+312 }
313
-314 final Configuration config = new DefaultConfiguration("myName" );
-315 final String cacheFilePath = symbolicLinkDirectory.resolve("cache.temp" ).toString();
-316 final PropertyCacheFile cache = new PropertyCacheFile(config, cacheFilePath);
-317
-318 cache.persist();
-319
-320 final Path expectedFilePath = tempDirectory.resolve("cache.temp" );
-321 assertWithMessage(
-322 "Cache file should be created in the actual directory." )
-323 .that(Files.exists(expectedFilePath))
-324 .isTrue();
-325 }
-326
-327 @Test
-328 @DisabledOnOs(OS.WINDOWS)
-329 public void testSymbolicLinkToNonDirectory() throws IOException {
-330 final Path tempFile = Files.createTempFile("tempFile" , null );
-331 final Path symbolicLinkDirectory = temporaryFolder.toPath();
-332 final Path symbolicLink = symbolicLinkDirectory.resolve("symbolicLink" );
-333 Files.createSymbolicLink(symbolicLink, tempFile);
+314 @Test
+315 @DisabledOnOs(OS.WINDOWS)
+316 public void testSymbolicLinkResolution() throws IOException {
+317 final Path tempDirectory = temporaryFolder.toPath();
+318 final Path symbolicLinkDirectory = temporaryFolder.toPath()
+319 .resolve("symbolicLink" );
+320 Files.createSymbolicLink(symbolicLinkDirectory, tempDirectory);
+321
+322 final Configuration config = new DefaultConfiguration("myName" );
+323 final String cacheFilePath = symbolicLinkDirectory.resolve("cache.temp" ).toString();
+324 final PropertyCacheFile cache = new PropertyCacheFile(config, cacheFilePath);
+325
+326 cache.persist();
+327
+328 final Path expectedFilePath = tempDirectory.resolve("cache.temp" );
+329 assertWithMessage(
+330 "Cache file should be created in the actual directory." )
+331 .that(Files.exists(expectedFilePath))
+332 .isTrue();
+333 }
334
-335 final Configuration config = new DefaultConfiguration("myName" );
-336 final String cacheFilePath = symbolicLink.resolve("cache.temp" ).toString();
-337 final PropertyCacheFile cache = new PropertyCacheFile(config, cacheFilePath);
-338
-339 final IOException thrown = assertThrows(IOException.class , cache::persist);
-340
-341 final String expectedMessage = "Resolved symbolic link " + symbolicLink
-342 + " is not a directory." ;
-343
-344 assertWithMessage(
-345 "Expected IOException when symbolicLink is not a directory" )
-346 .that(thrown.getMessage())
-347 .contains(expectedMessage);
-348 }
-349
-350 @Test
-351 @DisabledOnOs(OS.WINDOWS)
-352 public void testMultipleSymbolicLinkResolution() throws IOException {
-353 final Path actualDirectory = temporaryFolder.toPath();
-354 final Path firstSymbolicLink = temporaryFolder.toPath()
-355 .resolve("firstLink" );
-356 Files.createSymbolicLink(firstSymbolicLink, actualDirectory);
-357
-358 final Path secondSymbolicLink = temporaryFolder.toPath()
-359 .resolve("secondLink" );
-360 Files.createSymbolicLink(secondSymbolicLink, firstSymbolicLink);
-361
-362 final Configuration config = new DefaultConfiguration("myName" );
-363 final String cacheFilePath = secondSymbolicLink.resolve("cache.temp" ).toString();
-364 final PropertyCacheFile cache = new PropertyCacheFile(config, cacheFilePath);
-365
-366 cache.persist();
+335 @Test
+336 @DisabledOnOs(OS.WINDOWS)
+337 public void testSymbolicLinkToNonDirectory() throws IOException {
+338 final String uniqueFileName = "tempFile_" + UUID.randomUUID() + ".java" ;
+339 final File tempFile = new File(temporaryFolder, uniqueFileName);
+340 tempFile.createNewFile();
+341 final Path symbolicLinkDirectory = temporaryFolder.toPath();
+342 final Path symbolicLink = symbolicLinkDirectory.resolve("symbolicLink" );
+343 Files.createSymbolicLink(symbolicLink, tempFile.toPath());
+344
+345 final Configuration config = new DefaultConfiguration("myName" );
+346 final String cacheFilePath = symbolicLink.resolve("cache.temp" ).toString();
+347 final PropertyCacheFile cache = new PropertyCacheFile(config, cacheFilePath);
+348
+349 final IOException thrown = assertThrows(IOException.class , cache::persist);
+350
+351 final String expectedMessage = "Resolved symbolic link " + symbolicLink
+352 + " is not a directory." ;
+353
+354 assertWithMessage(
+355 "Expected IOException when symbolicLink is not a directory" )
+356 .that(thrown.getMessage())
+357 .contains(expectedMessage);
+358 }
+359
+360 @Test
+361 @DisabledOnOs(OS.WINDOWS)
+362 public void testMultipleSymbolicLinkResolution() throws IOException {
+363 final Path actualDirectory = temporaryFolder.toPath();
+364 final Path firstSymbolicLink = temporaryFolder.toPath()
+365 .resolve("firstLink" );
+366 Files.createSymbolicLink(firstSymbolicLink, actualDirectory);
367
-368 final Path expectedFilePath = actualDirectory.resolve("cache.temp" );
-369 assertWithMessage("Cache file should be created in the final actual directory" )
-370 .that(Files.exists(expectedFilePath))
-371 .isTrue();
-372 }
-373
-374 @Test
-375 public void testChangeInConfig() throws Exception {
-376 final DefaultConfiguration config = new DefaultConfiguration("myConfig" );
-377 config.addProperty("attr" , "value" );
-378
-379 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
-380 final PropertyCacheFile cache = new PropertyCacheFile(config, cacheFile.getPath());
-381 cache.load();
-382
-383 final String expectedInitialConfigHash = "D5BB1747FC11B2BB839C80A6C28E3E7684AF9940" ;
-384 final String actualInitialConfigHash = cache.get(PropertyCacheFile.CONFIG_HASH_KEY);
-385 assertWithMessage("Invalid config hash" )
-386 .that(actualInitialConfigHash)
-387 .isEqualTo(expectedInitialConfigHash);
-388
-389 cache.persist();
-390
-391 final Properties details = new Properties();
-392 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
-393 details.load(reader);
-394 }
-395 assertWithMessage("Invalid details size" )
-396 .that(details)
-397 .hasSize(1);
+368 final Path secondSymbolicLink = temporaryFolder.toPath()
+369 .resolve("secondLink" );
+370 Files.createSymbolicLink(secondSymbolicLink, firstSymbolicLink);
+371
+372 final Configuration config = new DefaultConfiguration("myName" );
+373 final String cacheFilePath = secondSymbolicLink.resolve("cache.temp" ).toString();
+374 final PropertyCacheFile cache = new PropertyCacheFile(config, cacheFilePath);
+375
+376 cache.persist();
+377
+378 final Path expectedFilePath = actualDirectory.resolve("cache.temp" );
+379 assertWithMessage("Cache file should be created in the final actual directory" )
+380 .that(Files.exists(expectedFilePath))
+381 .isTrue();
+382 }
+383
+384 @Test
+385 public void testChangeInConfig() throws Exception {
+386 final DefaultConfiguration config = new DefaultConfiguration("myConfig" );
+387 config.addProperty("attr" , "value" );
+388 final String uniqueFileName = "junit_" + UUID.randomUUID() + ".java" ;
+389 final File cacheFile = new File(temporaryFolder, uniqueFileName);
+390 final PropertyCacheFile cache = new PropertyCacheFile(config, cacheFile.getPath());
+391 cache.load();
+392
+393 final String expectedInitialConfigHash = "D5BB1747FC11B2BB839C80A6C28E3E7684AF9940" ;
+394 final String actualInitialConfigHash = cache.get(PropertyCacheFile.CONFIG_HASH_KEY);
+395 assertWithMessage("Invalid config hash" )
+396 .that(actualInitialConfigHash)
+397 .isEqualTo(expectedInitialConfigHash);
398
-399
-400 config.addProperty("newAttr" , "newValue" );
-401
-402 final PropertyCacheFile cacheAfterChangeInConfig =
-403 new PropertyCacheFile(config, cacheFile.getPath());
-404 cacheAfterChangeInConfig.load();
-405
-406 final String expectedConfigHashAfterChange = "714876AE38C069EC52BF86889F061B3776E526D3" ;
-407 final String actualConfigHashAfterChange =
-408 cacheAfterChangeInConfig.get(PropertyCacheFile.CONFIG_HASH_KEY);
-409 assertWithMessage("Invalid config hash" )
-410 .that(actualConfigHashAfterChange)
-411 .isEqualTo(expectedConfigHashAfterChange);
-412
-413 cacheAfterChangeInConfig.persist();
-414
-415 final Properties detailsAfterChangeInConfig = new Properties();
-416 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
-417 detailsAfterChangeInConfig.load(reader);
-418 }
-419 assertWithMessage("Invalid cache size" )
-420 .that(detailsAfterChangeInConfig)
-421 .hasSize(1);
-422 }
-423
-424 @Test
-425 public void testNonExistentResource() throws IOException {
-426 final Configuration config = new DefaultConfiguration("myName" );
-427 final String filePath = File.createTempFile("junit" , null , temporaryFolder).getPath();
-428 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath);
-429
-430
-431 cache.load();
-432 final String myFile = "myFile" ;
-433 cache.put(myFile, 1);
-434
-435 final String hash = cache.get(PropertyCacheFile.CONFIG_HASH_KEY);
-436 assertWithMessage("Config hash key should not be null" )
-437 .that(hash)
-438 .isNotNull();
-439
-440
-441 final Set<String> resources = new HashSet<>();
-442 final String resource = getPath("InputPropertyCacheFile.header" );
-443 resources.add(resource);
-444 cache.putExternalResources(resources);
+399 cache.persist();
+400
+401 final Properties details = new Properties();
+402 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
+403 details.load(reader);
+404 }
+405 assertWithMessage("Invalid details size" )
+406 .that(details)
+407 .hasSize(1);
+408
+409
+410 config.addProperty("newAttr" , "newValue" );
+411
+412 final PropertyCacheFile cacheAfterChangeInConfig =
+413 new PropertyCacheFile(config, cacheFile.getPath());
+414 cacheAfterChangeInConfig.load();
+415
+416 final String expectedConfigHashAfterChange = "714876AE38C069EC52BF86889F061B3776E526D3" ;
+417 final String actualConfigHashAfterChange =
+418 cacheAfterChangeInConfig.get(PropertyCacheFile.CONFIG_HASH_KEY);
+419 assertWithMessage("Invalid config hash" )
+420 .that(actualConfigHashAfterChange)
+421 .isEqualTo(expectedConfigHashAfterChange);
+422
+423 cacheAfterChangeInConfig.persist();
+424
+425 final Properties detailsAfterChangeInConfig = new Properties();
+426 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
+427 detailsAfterChangeInConfig.load(reader);
+428 }
+429 assertWithMessage("Invalid cache size" )
+430 .that(detailsAfterChangeInConfig)
+431 .hasSize(1);
+432 }
+433
+434 @Test
+435 public void testNonExistentResource() throws IOException {
+436 final Configuration config = new DefaultConfiguration("myName" );
+437 final String uniqueFileName = "junit_" + UUID.randomUUID() + ".java" ;
+438 final File filePath = new File(temporaryFolder, uniqueFileName);
+439 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath.toString());
+440
+441
+442 cache.load();
+443 final String myFile = "myFile" ;
+444 cache.put(myFile, 1);
445
-446 assertWithMessage("Should return false in file is not in cache" )
-447 .that(cache.isInCache(myFile, 1))
-448 .isFalse();
-449
-450 assertWithMessage("Should return false in file is not in cache" )
-451 .that(cache.isInCache(resource, 1))
-452 .isFalse();
-453 }
-454
-455 @Test
-456 public void testExceptionNoSuchAlgorithmException() throws Exception {
-457 final Configuration config = new DefaultConfiguration("myName" );
-458 final String filePath = File.createTempFile("junit" , null , temporaryFolder).getPath();
-459 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath);
-460 cache.put("myFile" , 1);
-461
-462 try (MockedStatic<MessageDigest> messageDigest = mockStatic(MessageDigest.class )) {
-463 messageDigest.when(() -> MessageDigest.getInstance("SHA-1" ))
-464 .thenThrow(NoSuchAlgorithmException.class );
+446 final String hash = cache.get(PropertyCacheFile.CONFIG_HASH_KEY);
+447 assertWithMessage("Config hash key should not be null" )
+448 .that(hash)
+449 .isNotNull();
+450
+451
+452 final Set<String> resources = new HashSet<>();
+453 final String resource = getPath("InputPropertyCacheFile.header" );
+454 resources.add(resource);
+455 cache.putExternalResources(resources);
+456
+457 assertWithMessage("Should return false in file is not in cache" )
+458 .that(cache.isInCache(myFile, 1))
+459 .isFalse();
+460
+461 assertWithMessage("Should return false in file is not in cache" )
+462 .that(cache.isInCache(resource, 1))
+463 .isFalse();
+464 }
465
-466 final ReflectiveOperationException ex =
-467 assertThrows(ReflectiveOperationException.class , () -> {
-468 TestUtil.invokeStaticMethod(PropertyCacheFile.class ,
-469 "getHashCodeBasedOnObjectContent" , config);
-470 });
-471 assertWithMessage("Invalid exception cause" )
-472 .that(ex)
-473 .hasCauseThat()
-474 .hasCauseThat()
-475 .isInstanceOf(NoSuchAlgorithmException.class );
-476 assertWithMessage("Invalid exception message" )
-477 .that(ex)
-478 .hasCauseThat()
-479 .hasMessageThat()
-480 .isEqualTo("Unable to calculate hashcode." );
-481 }
-482 }
-483
-484
-485
-486
-487
-488
-489
-490
-491 @ParameterizedTest
-492 @ValueSource(strings = {"Same;Same" , "First;Second" })
-493 public void testPutNonExistentExternalResource(String rawMessages) throws Exception {
-494 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
-495 final String[] messages = rawMessages.split(";" );
-496
-497
-498 try (MockedStatic<CommonUtil> commonUtil = mockStatic(CommonUtil.class )) {
-499 final int numberOfRuns = messages.length;
-500 final String[] configHashes = new String[numberOfRuns];
-501 final String[] externalResourceHashes = new String[numberOfRuns];
-502 for (int i = 0; i < numberOfRuns; i++) {
-503 commonUtil.when(() -> CommonUtil.getUriByFilename(any(String.class )))
-504 .thenThrow(new CheckstyleException(messages[i]));
-505 final Configuration config = new DefaultConfiguration("myConfig" );
-506 final PropertyCacheFile cache = new PropertyCacheFile(config, cacheFile.getPath());
-507 cache.load();
-508
-509 configHashes[i] = cache.get(PropertyCacheFile.CONFIG_HASH_KEY);
-510 assertWithMessage("Config hash key should not be null" )
-511 .that(configHashes[i])
-512 .isNotNull();
-513
-514 final Set<String> nonExistentExternalResources = new HashSet<>();
-515 final String externalResourceFileName = "non_existent_file.xml" ;
-516 nonExistentExternalResources.add(externalResourceFileName);
-517 cache.putExternalResources(nonExistentExternalResources);
-518
-519 externalResourceHashes[i] = cache.get(PropertyCacheFile.EXTERNAL_RESOURCE_KEY_PREFIX
-520 + externalResourceFileName);
-521 assertWithMessage("External resource hashes should not be null" )
-522 .that(externalResourceHashes[i])
-523 .isNotNull();
-524
-525 cache.persist();
+466 @Test
+467 public void testExceptionNoSuchAlgorithmException() {
+468 final Configuration config = new DefaultConfiguration("myName" );
+469 final String uniqueFileName = "junit_" + UUID.randomUUID() + ".java" ;
+470 final File filePath = new File(temporaryFolder, uniqueFileName);
+471 final PropertyCacheFile cache = new PropertyCacheFile(config, filePath.toString());
+472 cache.put("myFile" , 1);
+473
+474 try (MockedStatic<MessageDigest> messageDigest = mockStatic(MessageDigest.class )) {
+475 messageDigest.when(() -> MessageDigest.getInstance("SHA-1" ))
+476 .thenThrow(NoSuchAlgorithmException.class );
+477
+478 final ReflectiveOperationException ex =
+479 assertThrows(ReflectiveOperationException.class , () -> {
+480 TestUtil.invokeStaticMethod(PropertyCacheFile.class ,
+481 "getHashCodeBasedOnObjectContent" , config);
+482 });
+483 assertWithMessage("Invalid exception cause" )
+484 .that(ex)
+485 .hasCauseThat()
+486 .hasCauseThat()
+487 .isInstanceOf(NoSuchAlgorithmException.class );
+488 assertWithMessage("Invalid exception message" )
+489 .that(ex)
+490 .hasCauseThat()
+491 .hasMessageThat()
+492 .isEqualTo("Unable to calculate hashcode." );
+493 }
+494 }
+495
+496
+497
+498
+499
+500
+501
+502
+503 @ParameterizedTest
+504 @ValueSource(strings = {"Same;Same" , "First;Second" })
+505 public void testPutNonExistentExternalResource(String rawMessages) throws Exception {
+506 final String uniqueFileName = "junit_" + UUID.randomUUID() + ".java" ;
+507 final File cacheFile = new File(temporaryFolder, uniqueFileName);
+508 final String[] messages = rawMessages.split(";" );
+509
+510
+511 try (MockedStatic<CommonUtil> commonUtil = mockStatic(CommonUtil.class )) {
+512 final int numberOfRuns = messages.length;
+513 final String[] configHashes = new String[numberOfRuns];
+514 final String[] externalResourceHashes = new String[numberOfRuns];
+515 for (int i = 0; i < numberOfRuns; i++) {
+516 commonUtil.when(() -> CommonUtil.getUriByFilename(any(String.class )))
+517 .thenThrow(new CheckstyleException(messages[i]));
+518 final Configuration config = new DefaultConfiguration("myConfig" );
+519 final PropertyCacheFile cache = new PropertyCacheFile(config, cacheFile.getPath());
+520 cache.load();
+521
+522 configHashes[i] = cache.get(PropertyCacheFile.CONFIG_HASH_KEY);
+523 assertWithMessage("Config hash key should not be null" )
+524 .that(configHashes[i])
+525 .isNotNull();
526
-527 final Properties cacheDetails = new Properties();
-528 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
-529 cacheDetails.load(reader);
-530 }
+527 final Set<String> nonExistentExternalResources = new HashSet<>();
+528 final String externalResourceFileName = "non_existent_file.xml" ;
+529 nonExistentExternalResources.add(externalResourceFileName);
+530 cache.putExternalResources(nonExistentExternalResources);
531
-532 assertWithMessage("Unexpected number of objects in cache" )
-533 .that(cacheDetails)
-534 .hasSize(2);
-535 }
-536
-537 assertWithMessage("Invalid config hash" )
-538 .that(configHashes[0])
-539 .isEqualTo(configHashes[1]);
-540 final boolean sameException = messages[0].equals(messages[1]);
-541 assertWithMessage("Invalid external resource hashes" )
-542 .that(externalResourceHashes[0].equals(externalResourceHashes[1]))
-543 .isEqualTo(sameException);
-544 }
-545 }
-546
-547 }
+532 externalResourceHashes[i] = cache.get(PropertyCacheFile.EXTERNAL_RESOURCE_KEY_PREFIX
+533 + externalResourceFileName);
+534 assertWithMessage("External resource hashes should not be null" )
+535 .that(externalResourceHashes[i])
+536 .isNotNull();
+537
+538 cache.persist();
+539
+540 final Properties cacheDetails = new Properties();
+541 try (BufferedReader reader = Files.newBufferedReader(cacheFile.toPath())) {
+542 cacheDetails.load(reader);
+543 }
+544
+545 assertWithMessage("Unexpected number of objects in cache" )
+546 .that(cacheDetails)
+547 .hasSize(2);
+548 }
+549
+550 assertWithMessage("Invalid config hash" )
+551 .that(configHashes[0])
+552 .isEqualTo(configHashes[1]);
+553 final boolean sameException = messages[0].equals(messages[1]);
+554 assertWithMessage("Invalid external resource hashes" )
+555 .that(externalResourceHashes[0].equals(externalResourceHashes[1]))
+556 .isEqualTo(sameException);
+557 }
+558 }
+559
+560 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/TreeWalkerTest.html b/xref-test/com/puppycrawl/tools/checkstyle/TreeWalkerTest.html
index 55ccba8130..3a9c6f69ee 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/TreeWalkerTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/TreeWalkerTest.html
@@ -46,792 +46,803 @@
38 import java.util.HashSet;
39 import java.util.List;
40 import java.util.Set;
-41 import java.util.regex.Matcher;
-42 import java.util.regex.Pattern;
-43
-44 import org.junit.jupiter.api.Test;
-45 import org.junit.jupiter.api.io.TempDir;
-46 import org.mockito.MockedConstruction;
-47 import org.mockito.MockedStatic;
-48 import org.mockito.Mockito;
-49 import org.mockito.internal.util.Checks;
-50
-51 import com.puppycrawl.tools.checkstyle.api.AbstractCheck;
-52 import com.puppycrawl.tools.checkstyle.api.CheckstyleException;
-53 import com.puppycrawl.tools.checkstyle.api.Configuration;
-54 import com.puppycrawl.tools.checkstyle.api.Context;
-55 import com.puppycrawl.tools.checkstyle.api.DetailAST;
-56 import com.puppycrawl.tools.checkstyle.api.FileContents;
-57 import com.puppycrawl.tools.checkstyle.api.FileText;
-58 import com.puppycrawl.tools.checkstyle.api.TokenTypes;
-59 import com.puppycrawl.tools.checkstyle.checks.coding.EmptyStatementCheck;
-60 import com.puppycrawl.tools.checkstyle.checks.coding.HiddenFieldCheck;
-61 import com.puppycrawl.tools.checkstyle.checks.design.OneTopLevelClassCheck;
-62 import com.puppycrawl.tools.checkstyle.checks.indentation.CommentsIndentationCheck;
-63 import com.puppycrawl.tools.checkstyle.checks.javadoc.JavadocPackageCheck;
-64 import com.puppycrawl.tools.checkstyle.checks.javadoc.JavadocParagraphCheck;
-65 import com.puppycrawl.tools.checkstyle.checks.naming.ConstantNameCheck;
-66 import com.puppycrawl.tools.checkstyle.checks.naming.MemberNameCheck;
-67 import com.puppycrawl.tools.checkstyle.checks.naming.ParameterNameCheck;
-68 import com.puppycrawl.tools.checkstyle.checks.naming.TypeNameCheck;
-69 import com.puppycrawl.tools.checkstyle.checks.whitespace.WhitespaceAfterCheck;
-70 import com.puppycrawl.tools.checkstyle.checks.whitespace.WhitespaceAroundCheck;
-71 import com.puppycrawl.tools.checkstyle.filters.SuppressWithNearbyCommentFilter;
-72 import com.puppycrawl.tools.checkstyle.filters.SuppressionXpathFilter;
-73 import com.puppycrawl.tools.checkstyle.internal.utils.TestUtil;
-74 import com.puppycrawl.tools.checkstyle.utils.CommonUtil;
-75
-76
-77
-78
-79
-80
-81
-82
-83 public class TreeWalkerTest extends AbstractModuleTestSupport {
-84
-85 @TempDir
-86 public File temporaryFolder;
-87
-88 @Override
-89 protected String getPackageLocation() {
-90 return "com/puppycrawl/tools/checkstyle/treewalker" ;
-91 }
-92
-93 @Test
-94 public void testProperFileExtension() throws Exception {
-95 final String path = getPath("InputTreeWalkerProperFileExtension.java" );
-96 final String[] expected = {
-97 "10:27: " + getCheckMessage(ConstantNameCheck.class ,
-98 MSG_INVALID_PATTERN, "k" , "^[A-Z][A-Z0-9]*(_[A-Z0-9]+)*$" ),
-99 };
-100 verifyWithInlineConfigParser(path, expected);
-101 }
-102
-103
-104
-105
-106
-107
-108
-109
-110
-111
-112
-113
-114
-115
-116
-117
-118
-119
-120
-121
-122
-123
-124
-125 @Test
-126 public void testNoAuditEventsWithoutFilters() throws Exception {
-127 final String[] expected = {
-128 "10:1: " + getCheckMessage(OneTopLevelClassCheck.class ,
-129 OneTopLevelClassCheck.MSG_KEY, "InputTreeWalkerInner" ),
-130 };
-131 try (MockedConstruction<TreeWalkerAuditEvent> mocked =
-132 Mockito.mockConstruction(TreeWalkerAuditEvent.class , (mock, context) -> {
-133 throw new CheckstyleException("No audit events expected" );
-134 })) {
-135 verifyWithInlineConfigParser(getPath("InputTreeWalker.java" ), expected);
-136 }
-137 }
-138
-139
-140
-141
-142
-143 @Test
-144 public void testConditionRequiredWithoutOrdinaryChecks() throws Exception {
-145 final String[] expected = {
-146 "7: " + getCheckMessage(JavadocParagraphCheck.class ,
-147 JavadocParagraphCheck.MSG_REDUNDANT_PARAGRAPH),
-148 };
-149 final String path = getPath("InputTreeWalkerJavadoc.java" );
-150 final DetailAST mockAst = mock();
-151 final DetailAST realAst = JavaParser.parseFile(new File(path),
-152 JavaParser.Options.WITH_COMMENTS);
-153
-154 doThrow(IllegalStateException.class ).when(mockAst).getFirstChild();
-155 try (MockedStatic<JavaParser> parser = Mockito.mockStatic(JavaParser.class )) {
-156 parser.when(() -> JavaParser.parse(any(FileContents.class ))).thenReturn(mockAst);
-157
-158 parser.when(() -> JavaParser.appendHiddenCommentNodes(mockAst)).thenReturn(realAst);
-159
-160 verifyWithInlineConfigParser(path, expected);
-161 }
-162 }
-163
-164
-165
-166
-167
-168 @Test
-169 public void testConditionRequiredWithoutCommentChecks() throws Exception {
-170 final String[] expected = {
-171 "10:1: " + getCheckMessage(OneTopLevelClassCheck.class ,
-172 OneTopLevelClassCheck.MSG_KEY, "InputTreeWalkerInner" ),
-173 };
-174 try (MockedStatic<JavaParser> parser =
-175 Mockito.mockStatic(JavaParser.class , CALLS_REAL_METHODS)) {
-176
-177 parser.when(() -> JavaParser.appendHiddenCommentNodes(any(DetailAST.class )))
-178 .thenThrow(IllegalStateException.class );
-179
-180 verifyWithInlineConfigParser(getPath("InputTreeWalker.java" ), expected);
-181 }
-182 }
-183
-184 @Test
-185 public void testImproperFileExtension() throws Exception {
-186 final String regularFilePath = getPath("InputTreeWalkerImproperFileExtension.java" );
-187 final File originalFile = new File(regularFilePath);
-188 final File tempFile = new File(temporaryFolder, "file.pdf" );
-189 Files.copy(originalFile.toPath(), tempFile.toPath(), StandardCopyOption.REPLACE_EXISTING);
-190 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-191 verifyWithInlineConfigParser(tempFile.getPath(), expected);
-192 }
-193
-194 @Test
-195 public void testAcceptableTokens()
-196 throws Exception {
-197 final DefaultConfiguration checkConfig =
-198 createModuleConfig(HiddenFieldCheck.class );
-199 checkConfig.addProperty("tokens" , "VARIABLE_DEF, ENUM_DEF, CLASS_DEF, METHOD_DEF,"
-200 + "IMPORT" );
-201 try {
-202 execute(checkConfig, getPath("InputTreeWalker.java" ));
-203 assertWithMessage("CheckstyleException is expected" ).fail();
-204 }
-205 catch (CheckstyleException ex) {
-206 final String errorMsg = ex.getMessage();
-207 final Pattern expected = Pattern.compile(Pattern.quote("cannot initialize module"
-208 + " com.puppycrawl.tools.checkstyle.TreeWalker - Token " )
-209 + "\"(ENUM_DEF|CLASS_DEF|METHOD_DEF|IMPORT)\""
-210 + Pattern.quote(" was not found in Acceptable tokens list in check"
-211 + " com.puppycrawl.tools.checkstyle.checks.coding.HiddenFieldCheck" ));
-212
-213 final Matcher errorMsgMatcher = expected.matcher(errorMsg);
-214 assertWithMessage("Failure for: " + errorMsg)
-215 .that(errorMsgMatcher.matches())
-216 .isTrue();
-217 }
-218 }
-219
-220 @Test
-221 public void testOnEmptyFile() throws Exception {
-222 final DefaultConfiguration checkConfig = createModuleConfig(HiddenFieldCheck.class );
-223 final File emptyFile = File.createTempFile("file" , ".java" , temporaryFolder);
-224 execute(checkConfig, emptyFile.getPath());
-225 final long fileSize = Files.size(emptyFile.toPath());
-226 assertWithMessage("File should be empty" )
-227 .that(fileSize)
-228 .isEqualTo(0);
-229 }
-230
-231 @Test
-232 public void testWithCheckNotHavingTreeWalkerAsParent() throws Exception {
-233 final DefaultConfiguration checkConfig = createModuleConfig(JavadocPackageCheck.class );
-234
-235 try {
-236 execute(createTreeWalkerConfig(checkConfig),
-237 File.createTempFile("junit" , null , temporaryFolder).getPath());
-238 assertWithMessage("CheckstyleException is expected" ).fail();
-239 }
-240 catch (CheckstyleException exception) {
-241 assertWithMessage("Error message is unexpected" )
-242 .that(exception.getMessage())
-243 .contains("TreeWalker is not allowed as a parent of" );
-244 }
-245 }
-246
-247 @Test
-248 public void testSetupChildExceptions() {
-249 final TreeWalker treeWalker = new TreeWalker();
-250 final PackageObjectFactory factory = new PackageObjectFactory(
-251 new HashSet<>(), Thread.currentThread().getContextClassLoader());
-252 treeWalker.setModuleFactory(factory);
-253
-254 final Configuration config = new DefaultConfiguration("java.lang.String" );
-255 try {
-256 treeWalker.setupChild(config);
-257 assertWithMessage("Exception is expected" ).fail();
-258 }
-259 catch (CheckstyleException ex) {
-260 assertWithMessage("Error message is not expected" )
-261 .that(ex.getMessage())
-262 .isEqualTo("TreeWalker is not allowed as a parent of java.lang.String "
-263 + "Please review 'Parent Module' section for this Check in "
-264 + "web documentation if Check is standard." );
-265 }
-266 }
-267
-268 @Test
-269 public void testSettersForParameters() throws Exception {
-270 final TreeWalker treeWalker = new TreeWalker();
-271 final DefaultConfiguration config = new DefaultConfiguration("default config" );
-272 treeWalker.setTabWidth(1);
-273 treeWalker.configure(config);
-274
-275 final int tabWidth = TestUtil.getInternalState(treeWalker, "tabWidth" );
-276 assertWithMessage("Invalid setter result" )
-277 .that(tabWidth)
-278 .isEqualTo(1);
-279 final Object configuration = TestUtil.getInternalState(treeWalker, "configuration" );
-280 assertWithMessage("Invalid configuration" )
-281 .that(configuration)
-282 .isEqualTo(config);
-283 }
-284
-285 @Test
-286 public void testForInvalidCheckImplementation() throws Exception {
-287 final DefaultConfiguration checkConfig = createModuleConfig(BadJavaDocCheck.class );
-288 final String pathToEmptyFile =
-289 File.createTempFile("file" , ".java" , temporaryFolder).getPath();
-290
-291 try {
-292 execute(checkConfig, pathToEmptyFile);
-293 assertWithMessage("Exception is expected" ).fail();
-294 }
-295 catch (CheckstyleException ex) {
-296 assertWithMessage("Error message is unexpected" )
-297 .that(ex.getMessage())
-298 .isEqualTo("cannot initialize module com.puppycrawl.tools.checkstyle."
-299 + "TreeWalker - Check 'com.puppycrawl.tools.checkstyle."
-300 + "TreeWalkerTest$BadJavaDocCheck' waits for comment type token "
-301 + "('SINGLE_LINE_COMMENT') and should override "
-302 + "'isCommentNodesRequired()' method to return 'true'" );
-303 assertWithMessage("Error message is unexpected" )
-304 .that(ex.getMessage())
-305 .contains("isCommentNodesRequired" );
-306 }
-307 }
-308
-309 @Test
-310 public void testProcessNonJavaFiles() throws Exception {
-311 final TreeWalker treeWalker = new TreeWalker();
-312 final PackageObjectFactory factory = new PackageObjectFactory(
-313 new HashSet<>(), Thread.currentThread().getContextClassLoader());
-314 treeWalker.setModuleFactory(factory);
-315 treeWalker.configure(new DefaultConfiguration("default config" ));
-316 final DefaultConfiguration childConfig = createModuleConfig(JavadocParagraphCheck.class );
-317 treeWalker.setupChild(childConfig);
-318 final File file = new File("input.java" );
-319 final List<String> lines =
-320 new ArrayList<>(Arrays.asList("package com.puppycrawl.tools.checkstyle;" , "" ,
-321 "error public class InputTreeWalkerFileWithViolation {}" ));
-322 final FileText fileText = new FileText(file, lines);
-323 treeWalker.setFileContents(new FileContents(fileText));
-324 try {
-325 treeWalker.processFiltered(file, fileText);
-326 assertWithMessage("Exception expected" ).fail();
-327 }
-328 catch (CheckstyleException ex) {
-329 assertWithMessage("Invalid exception message" )
-330 .that(ex.getMessage())
-331 .isEqualTo("IllegalStateException occurred while parsing file input.java." );
-332 }
-333 }
-334
-335 @Test
-336 public void testProcessNonJavaFilesWithoutException() throws Exception {
-337 final TreeWalker treeWalker = new TreeWalker();
-338 treeWalker.setTabWidth(1);
-339 treeWalker.configure(new DefaultConfiguration("default config" ));
-340 final File file = new File(getPath("InputTreeWalkerNotJava.xml" ));
-341 final FileText fileText = new FileText(file, StandardCharsets.ISO_8859_1.name());
-342 treeWalker.processFiltered(file, fileText);
-343 final Collection<Checks> checks = TestUtil.getInternalState(treeWalker, "ordinaryChecks" );
-344 assertWithMessage("No checks -> No parsing" )
-345 .that(checks)
-346 .isEmpty();
-347 }
-348
-349 @Test
-350 public void testWithCacheWithNoViolation() throws Exception {
-351 final String path = getPath("InputTreeWalkerWithCacheWithNoViolation.java" );
-352 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-353 verifyWithInlineConfigParser(path, expected);
-354 }
-355
-356 @Test
-357 public void testProcessWithParserThrowable() throws Exception {
-358 final TreeWalker treeWalker = new TreeWalker();
-359 treeWalker.configure(createModuleConfig(TypeNameCheck.class ));
-360 final PackageObjectFactory factory = new PackageObjectFactory(
-361 new HashSet<>(), Thread.currentThread().getContextClassLoader());
-362 treeWalker.setModuleFactory(factory);
-363 treeWalker.setupChild(createModuleConfig(TypeNameCheck.class ));
-364 final File file = new File(temporaryFolder, "file.java" );
-365 final List<String> lines = new ArrayList<>();
-366 lines.add(" classD a {} " );
-367 final FileText fileText = new FileText(file, lines);
-368 treeWalker.setFileContents(new FileContents(fileText));
-369 try {
-370 treeWalker.processFiltered(file, fileText);
-371 assertWithMessage("Exception is expected" ).fail();
-372 }
-373 catch (CheckstyleException exception) {
-374 assertWithMessage("Error message is unexpected" )
-375 .that(exception.getMessage())
-376 .contains("occurred while parsing file" );
-377 }
-378 }
-379
-380 @Test
-381 public void testProcessWithRecognitionException() throws Exception {
-382 final TreeWalker treeWalker = new TreeWalker();
-383 treeWalker.configure(createModuleConfig(TypeNameCheck.class ));
-384 final PackageObjectFactory factory = new PackageObjectFactory(
-385 new HashSet<>(), Thread.currentThread().getContextClassLoader());
-386 treeWalker.setModuleFactory(factory);
-387 treeWalker.setupChild(createModuleConfig(TypeNameCheck.class ));
-388 final File file = new File(temporaryFolder, "file.java" );
-389 final List<String> lines = new ArrayList<>();
-390 lines.add(" class a%$# {} " );
-391 final FileText fileText = new FileText(file, lines);
-392 treeWalker.setFileContents(new FileContents(fileText));
-393 try {
-394 treeWalker.processFiltered(file, fileText);
-395 assertWithMessage("Exception is expected" ).fail();
-396 }
-397 catch (CheckstyleException exception) {
-398 assertWithMessage("Error message is unexpected" )
-399 .that(exception.getMessage())
-400 .contains("IllegalStateException occurred while parsing file" );
-401 }
-402 }
-403
-404 @Test
-405 public void testRequiredTokenIsEmptyIntArray() throws Exception {
-406 final File file = new File(temporaryFolder, "file.java" );
-407 try (Writer writer = Files.newBufferedWriter(file.toPath(), StandardCharsets.UTF_8)) {
-408 final String configComment = "/*\n"
-409 + "com.puppycrawl.tools.checkstyle.TreeWalkerTest"
-410 + "$RequiredTokenIsEmptyIntArray\n\n"
-411 + "*/" ;
-412 writer.write(configComment);
-413 }
-414 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-415 verifyWithInlineConfigParser(file.getPath(), expected);
-416 }
-417
-418 @Test
-419 public void testBehaviourWithZeroChecks() throws Exception {
-420 final TreeWalker treeWalker = new TreeWalker();
-421 final PackageObjectFactory factory = new PackageObjectFactory(
-422 new HashSet<>(), Thread.currentThread().getContextClassLoader());
-423 treeWalker.setModuleFactory(factory);
-424
-425 final File file = new File(temporaryFolder, "file.java" );
-426 final FileText fileText = new FileText(file, new ArrayList<>());
-427
-428 treeWalker.processFiltered(file, fileText);
-429 final Collection<Checks> checks = TestUtil.getInternalState(treeWalker, "ordinaryChecks" );
-430 assertWithMessage("No checks -> No parsing" )
-431 .that(checks)
-432 .isEmpty();
-433 }
-434
-435 @Test
-436 public void testBehaviourWithOrdinaryAndCommentChecks() throws Exception {
-437 final TreeWalker treeWalker = new TreeWalker();
-438 treeWalker.configure(createModuleConfig(TypeNameCheck.class ));
-439 treeWalker.configure(createModuleConfig(CommentsIndentationCheck.class ));
-440 final PackageObjectFactory factory = new PackageObjectFactory(
-441 new HashSet<>(), Thread.currentThread().getContextClassLoader());
-442 treeWalker.setModuleFactory(factory);
-443 treeWalker.setupChild(createModuleConfig(TypeNameCheck.class ));
-444 treeWalker.setupChild(createModuleConfig(CommentsIndentationCheck.class ));
-445 final File file = new File(temporaryFolder, "file.java" );
-446 final List<String> lines = new ArrayList<>();
-447 lines.add(" class a%$# {} " );
-448 final FileText fileText = new FileText(file, lines);
-449 treeWalker.setFileContents(new FileContents(fileText));
-450
-451 try {
-452 treeWalker.processFiltered(file, fileText);
-453 assertWithMessage("file is not compilable, exception is expected" ).fail();
-454 }
-455 catch (CheckstyleException exception) {
-456 final String message = "IllegalStateException occurred while parsing file" ;
-457 assertWithMessage("Error message is unexpected" )
-458 .that(exception.getMessage())
-459 .contains(message);
-460 }
-461 }
-462
-463 @Test
-464 public void testSetupChild() throws Exception {
-465 final TreeWalker treeWalker = new TreeWalker();
-466 final PackageObjectFactory factory = new PackageObjectFactory(
-467 new HashSet<>(), Thread.currentThread().getContextClassLoader());
-468 treeWalker.setModuleFactory(factory);
-469 treeWalker.setTabWidth(99);
-470 treeWalker.finishLocalSetup();
-471
-472 final Configuration config = new DefaultConfiguration(
-473 XpathFileGeneratorAstFilter.class .getName());
-474
-475 treeWalker.setupChild(config);
-476
-477 final Set<TreeWalkerFilter> filters = TestUtil.getInternalState(treeWalker, "filters" );
-478 final int tabWidth = TestUtil.getInternalState(filters.iterator().next(), "tabWidth" );
-479
-480 assertWithMessage("expected tab width" )
-481 .that(tabWidth)
-482 .isEqualTo(99);
-483 }
-484
-485 @Test
-486 public void testBehaviourWithChecksAndFilters() throws Exception {
-487
-488 final String[] expected = {
-489 "17:17: " + getCheckMessage(MemberNameCheck.class , "name.invalidPattern" , "P" ,
-490 "^[a-z][a-zA-Z0-9]*$" ),
-491 "12:17: " + getCheckMessage(MemberNameCheck.class , "name.invalidPattern" , "I" ,
-492 "^[a-z][a-zA-Z0-9]*$" ),
-493 };
-494
-495 verifyWithInlineConfigParser(
-496 getPath("InputTreeWalkerSuppressionCommentFilter.java" ),
-497 expected);
-498 }
-499
-500 @Test
-501 public void testMultiCheckOrder() throws Exception {
-502
-503 final String[] expected = {
-504 "13:9: " + getCheckMessage(WhitespaceAfterCheck.class , "ws.notFollowed" , "if" ),
-505 "13:9: " + getCheckMessage(WhitespaceAroundCheck.class , "ws.notFollowed" , "if" ),
-506 };
-507
-508 verifyWithInlineConfigParser(
-509 getPath("InputTreeWalkerMultiCheckOrder.java" ),
-510 expected);
-511 }
-512
-513 @Test
-514 public void testMultiCheckOfSameTypeNoIdResultsInOrderingByHash() throws Exception {
-515
-516 final String[] expected = {
-517 "15:28: " + getCheckMessage(ParameterNameCheck.class ,
-518 "name.invalidPattern" , "V2" , "^[a-z]([a-z0-9][a-zA-Z0-9]*)?$" ),
-519 "17:25: " + getCheckMessage(ParameterNameCheck.class ,
-520 "name.invalidPattern" , "b" , "^[a-z][a-z0-9][a-zA-Z0-9]*$" ),
-521 };
-522
-523 verifyWithInlineConfigParser(
-524 getPath("InputTreeWalkerMultiCheckOrder2.java" ),
-525 expected);
-526 }
-527
-528 @Test
-529 public void testFinishLocalSetupFullyInitialized() {
-530 final TreeWalker treeWalker = new TreeWalker();
-531 treeWalker.setSeverity("error" );
-532 treeWalker.setTabWidth(100);
-533 treeWalker.finishLocalSetup();
-534
-535 final Context context = TestUtil.getInternalState(treeWalker, "childContext" );
-536 assertWithMessage("Severity differs from expected" )
-537 .that(context.get("severity" ))
-538 .isEqualTo("error" );
-539 assertWithMessage("Tab width differs from expected" )
-540 .that(context.get("tabWidth" ))
-541 .isEqualTo(String.valueOf(100));
-542 }
-543
-544 @Test
-545 public void testCheckInitIsCalledInTreeWalker() throws Exception {
-546 final DefaultConfiguration checkConfig =
-547 createModuleConfig(VerifyInitCheck.class );
-548 final File file = File.createTempFile("file" , ".pdf" , temporaryFolder);
-549 execute(checkConfig, file.getPath());
-550 assertWithMessage("Init was not called" )
-551 .that(VerifyInitCheck.isInitWasCalled())
-552 .isTrue();
-553 }
-554
-555 @Test
-556 public void testCheckDestroyIsCalledInTreeWalker() throws Exception {
-557 VerifyDestroyCheck.resetDestroyWasCalled();
-558 final DefaultConfiguration checkConfig =
-559 createModuleConfig(VerifyDestroyCheck.class );
-560 final File file = File.createTempFile("file" , ".pdf" , temporaryFolder);
-561 execute(checkConfig, file.getPath());
-562 assertWithMessage("Destroy was not called" )
-563 .that(VerifyDestroyCheck.isDestroyWasCalled())
-564 .isTrue();
-565 }
-566
-567 @Test
-568 public void testCommentCheckDestroyIsCalledInTreeWalker() throws Exception {
-569 VerifyDestroyCheck.resetDestroyWasCalled();
-570 final DefaultConfiguration checkConfig =
-571 createModuleConfig(VerifyDestroyCommentCheck.class );
-572 final File file = File.createTempFile("file" , ".pdf" , temporaryFolder);
-573 execute(checkConfig, file.getPath());
-574 assertWithMessage("Destroy was not called" )
-575 .that(VerifyDestroyCheck.isDestroyWasCalled())
-576 .isTrue();
-577 }
-578
-579 @Test
-580 public void testCacheWhenFileExternalResourceContentDoesNotChange() throws Exception {
-581 final DefaultConfiguration filterConfig = createModuleConfig(SuppressionXpathFilter.class );
-582 filterConfig.addProperty("file" , getPath("InputTreeWalkerSuppressionXpathFilter.xml" ));
-583 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
-584 treeWalkerConfig.addChild(filterConfig);
+41 import java.util.UUID;
+42 import java.util.regex.Matcher;
+43 import java.util.regex.Pattern;
+44
+45 import org.junit.jupiter.api.Test;
+46 import org.junit.jupiter.api.io.TempDir;
+47 import org.mockito.MockedConstruction;
+48 import org.mockito.MockedStatic;
+49 import org.mockito.Mockito;
+50 import org.mockito.internal.util.Checks;
+51
+52 import com.puppycrawl.tools.checkstyle.api.AbstractCheck;
+53 import com.puppycrawl.tools.checkstyle.api.CheckstyleException;
+54 import com.puppycrawl.tools.checkstyle.api.Configuration;
+55 import com.puppycrawl.tools.checkstyle.api.Context;
+56 import com.puppycrawl.tools.checkstyle.api.DetailAST;
+57 import com.puppycrawl.tools.checkstyle.api.FileContents;
+58 import com.puppycrawl.tools.checkstyle.api.FileText;
+59 import com.puppycrawl.tools.checkstyle.api.TokenTypes;
+60 import com.puppycrawl.tools.checkstyle.checks.coding.EmptyStatementCheck;
+61 import com.puppycrawl.tools.checkstyle.checks.coding.HiddenFieldCheck;
+62 import com.puppycrawl.tools.checkstyle.checks.design.OneTopLevelClassCheck;
+63 import com.puppycrawl.tools.checkstyle.checks.indentation.CommentsIndentationCheck;
+64 import com.puppycrawl.tools.checkstyle.checks.javadoc.JavadocPackageCheck;
+65 import com.puppycrawl.tools.checkstyle.checks.javadoc.JavadocParagraphCheck;
+66 import com.puppycrawl.tools.checkstyle.checks.naming.ConstantNameCheck;
+67 import com.puppycrawl.tools.checkstyle.checks.naming.MemberNameCheck;
+68 import com.puppycrawl.tools.checkstyle.checks.naming.ParameterNameCheck;
+69 import com.puppycrawl.tools.checkstyle.checks.naming.TypeNameCheck;
+70 import com.puppycrawl.tools.checkstyle.checks.whitespace.WhitespaceAfterCheck;
+71 import com.puppycrawl.tools.checkstyle.checks.whitespace.WhitespaceAroundCheck;
+72 import com.puppycrawl.tools.checkstyle.filters.SuppressWithNearbyCommentFilter;
+73 import com.puppycrawl.tools.checkstyle.filters.SuppressionXpathFilter;
+74 import com.puppycrawl.tools.checkstyle.internal.utils.TestUtil;
+75 import com.puppycrawl.tools.checkstyle.utils.CommonUtil;
+76
+77
+78
+79
+80
+81
+82
+83
+84 public class TreeWalkerTest extends AbstractModuleTestSupport {
+85
+86 @TempDir
+87 public File temporaryFolder;
+88
+89 @Override
+90 protected String getPackageLocation() {
+91 return "com/puppycrawl/tools/checkstyle/treewalker" ;
+92 }
+93
+94 @Test
+95 public void testProperFileExtension() throws Exception {
+96 final String path = getPath("InputTreeWalkerProperFileExtension.java" );
+97 final String[] expected = {
+98 "10:27: " + getCheckMessage(ConstantNameCheck.class ,
+99 MSG_INVALID_PATTERN, "k" , "^[A-Z][A-Z0-9]*(_[A-Z0-9]+)*$" ),
+100 };
+101 verifyWithInlineConfigParser(path, expected);
+102 }
+103
+104
+105
+106
+107
+108
+109
+110
+111
+112
+113
+114
+115
+116
+117
+118
+119
+120
+121
+122
+123
+124
+125
+126 @Test
+127 public void testNoAuditEventsWithoutFilters() throws Exception {
+128 final String[] expected = {
+129 "10:1: " + getCheckMessage(OneTopLevelClassCheck.class ,
+130 OneTopLevelClassCheck.MSG_KEY, "InputTreeWalkerInner" ),
+131 };
+132 try (MockedConstruction<TreeWalkerAuditEvent> mocked =
+133 Mockito.mockConstruction(TreeWalkerAuditEvent.class , (mock, context) -> {
+134 throw new CheckstyleException("No audit events expected" );
+135 })) {
+136 verifyWithInlineConfigParser(getPath("InputTreeWalker.java" ), expected);
+137 }
+138 }
+139
+140
+141
+142
+143
+144 @Test
+145 public void testConditionRequiredWithoutOrdinaryChecks() throws Exception {
+146 final String[] expected = {
+147 "7: " + getCheckMessage(JavadocParagraphCheck.class ,
+148 JavadocParagraphCheck.MSG_REDUNDANT_PARAGRAPH),
+149 };
+150 final String path = getPath("InputTreeWalkerJavadoc.java" );
+151 final DetailAST mockAst = mock();
+152 final DetailAST realAst = JavaParser.parseFile(new File(path),
+153 JavaParser.Options.WITH_COMMENTS);
+154
+155 doThrow(IllegalStateException.class ).when(mockAst).getFirstChild();
+156 try (MockedStatic<JavaParser> parser = Mockito.mockStatic(JavaParser.class )) {
+157 parser.when(() -> JavaParser.parse(any(FileContents.class ))).thenReturn(mockAst);
+158
+159 parser.when(() -> JavaParser.appendHiddenCommentNodes(mockAst)).thenReturn(realAst);
+160
+161 verifyWithInlineConfigParser(path, expected);
+162 }
+163 }
+164
+165
+166
+167
+168
+169 @Test
+170 public void testConditionRequiredWithoutCommentChecks() throws Exception {
+171 final String[] expected = {
+172 "10:1: " + getCheckMessage(OneTopLevelClassCheck.class ,
+173 OneTopLevelClassCheck.MSG_KEY, "InputTreeWalkerInner" ),
+174 };
+175 try (MockedStatic<JavaParser> parser =
+176 Mockito.mockStatic(JavaParser.class , CALLS_REAL_METHODS)) {
+177
+178 parser.when(() -> JavaParser.appendHiddenCommentNodes(any(DetailAST.class )))
+179 .thenThrow(IllegalStateException.class );
+180
+181 verifyWithInlineConfigParser(getPath("InputTreeWalker.java" ), expected);
+182 }
+183 }
+184
+185 @Test
+186 public void testImproperFileExtension() throws Exception {
+187 final String regularFilePath = getPath("InputTreeWalkerImproperFileExtension.java" );
+188 final File originalFile = new File(regularFilePath);
+189 final File tempFile = new File(temporaryFolder, "file.pdf" );
+190 Files.copy(originalFile.toPath(), tempFile.toPath(), StandardCopyOption.REPLACE_EXISTING);
+191 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+192 verifyWithInlineConfigParser(tempFile.getPath(), expected);
+193 }
+194
+195 @Test
+196 public void testAcceptableTokens()
+197 throws Exception {
+198 final DefaultConfiguration checkConfig =
+199 createModuleConfig(HiddenFieldCheck.class );
+200 checkConfig.addProperty("tokens" , "VARIABLE_DEF, ENUM_DEF, CLASS_DEF, METHOD_DEF,"
+201 + "IMPORT" );
+202 try {
+203 execute(checkConfig, getPath("InputTreeWalker.java" ));
+204 assertWithMessage("CheckstyleException is expected" ).fail();
+205 }
+206 catch (CheckstyleException ex) {
+207 final String errorMsg = ex.getMessage();
+208 final Pattern expected = Pattern.compile(Pattern.quote("cannot initialize module"
+209 + " com.puppycrawl.tools.checkstyle.TreeWalker - Token " )
+210 + "\"(ENUM_DEF|CLASS_DEF|METHOD_DEF|IMPORT)\""
+211 + Pattern.quote(" was not found in Acceptable tokens list in check"
+212 + " com.puppycrawl.tools.checkstyle.checks.coding.HiddenFieldCheck" ));
+213
+214 final Matcher errorMsgMatcher = expected.matcher(errorMsg);
+215 assertWithMessage("Failure for: " + errorMsg)
+216 .that(errorMsgMatcher.matches())
+217 .isTrue();
+218 }
+219 }
+220
+221 @Test
+222 public void testOnEmptyFile() throws Exception {
+223 final DefaultConfiguration checkConfig = createModuleConfig(HiddenFieldCheck.class );
+224 final String uniqueFileName = "file_" + UUID.randomUUID() + ".java" ;
+225 final File emptyFile = new File(temporaryFolder, uniqueFileName);
+226 emptyFile.createNewFile();
+227 execute(checkConfig, emptyFile.getPath());
+228 final long fileSize = Files.size(emptyFile.toPath());
+229 assertWithMessage("File should be empty" )
+230 .that(fileSize)
+231 .isEqualTo(0);
+232 }
+233
+234 @Test
+235 public void testWithCheckNotHavingTreeWalkerAsParent() throws Exception {
+236 final DefaultConfiguration checkConfig = createModuleConfig(JavadocPackageCheck.class );
+237
+238 try {
+239 final String uniqueFileName = "junit_" + UUID.randomUUID() + ".java" ;
+240 final File filePath = new File(temporaryFolder, uniqueFileName);
+241 execute(createTreeWalkerConfig(checkConfig), filePath.toString());
+242 assertWithMessage("CheckstyleException is expected" ).fail();
+243 }
+244 catch (CheckstyleException exception) {
+245 assertWithMessage("Error message is unexpected" )
+246 .that(exception.getMessage())
+247 .contains("TreeWalker is not allowed as a parent of" );
+248 }
+249 }
+250
+251 @Test
+252 public void testSetupChildExceptions() {
+253 final TreeWalker treeWalker = new TreeWalker();
+254 final PackageObjectFactory factory = new PackageObjectFactory(
+255 new HashSet<>(), Thread.currentThread().getContextClassLoader());
+256 treeWalker.setModuleFactory(factory);
+257
+258 final Configuration config = new DefaultConfiguration("java.lang.String" );
+259 try {
+260 treeWalker.setupChild(config);
+261 assertWithMessage("Exception is expected" ).fail();
+262 }
+263 catch (CheckstyleException ex) {
+264 assertWithMessage("Error message is not expected" )
+265 .that(ex.getMessage())
+266 .isEqualTo("TreeWalker is not allowed as a parent of java.lang.String "
+267 + "Please review 'Parent Module' section for this Check in "
+268 + "web documentation if Check is standard." );
+269 }
+270 }
+271
+272 @Test
+273 public void testSettersForParameters() throws Exception {
+274 final TreeWalker treeWalker = new TreeWalker();
+275 final DefaultConfiguration config = new DefaultConfiguration("default config" );
+276 treeWalker.setTabWidth(1);
+277 treeWalker.configure(config);
+278
+279 final int tabWidth = TestUtil.getInternalState(treeWalker, "tabWidth" );
+280 assertWithMessage("Invalid setter result" )
+281 .that(tabWidth)
+282 .isEqualTo(1);
+283 final Object configuration = TestUtil.getInternalState(treeWalker, "configuration" );
+284 assertWithMessage("Invalid configuration" )
+285 .that(configuration)
+286 .isEqualTo(config);
+287 }
+288
+289 @Test
+290 public void testForInvalidCheckImplementation() throws Exception {
+291 final DefaultConfiguration checkConfig = createModuleConfig(BadJavaDocCheck.class );
+292 final String uniqueFileName = "file_" + UUID.randomUUID() + ".java" ;
+293 final File pathToEmptyFile = new File(temporaryFolder, uniqueFileName);
+294
+295 try {
+296 execute(checkConfig, pathToEmptyFile.toString());
+297 assertWithMessage("Exception is expected" ).fail();
+298 }
+299 catch (CheckstyleException ex) {
+300 assertWithMessage("Error message is unexpected" )
+301 .that(ex.getMessage())
+302 .isEqualTo("cannot initialize module com.puppycrawl.tools.checkstyle."
+303 + "TreeWalker - Check 'com.puppycrawl.tools.checkstyle."
+304 + "TreeWalkerTest$BadJavaDocCheck' waits for comment type token "
+305 + "('SINGLE_LINE_COMMENT') and should override "
+306 + "'isCommentNodesRequired()' method to return 'true'" );
+307 assertWithMessage("Error message is unexpected" )
+308 .that(ex.getMessage())
+309 .contains("isCommentNodesRequired" );
+310 }
+311 }
+312
+313 @Test
+314 public void testProcessNonJavaFiles() throws Exception {
+315 final TreeWalker treeWalker = new TreeWalker();
+316 final PackageObjectFactory factory = new PackageObjectFactory(
+317 new HashSet<>(), Thread.currentThread().getContextClassLoader());
+318 treeWalker.setModuleFactory(factory);
+319 treeWalker.configure(new DefaultConfiguration("default config" ));
+320 final DefaultConfiguration childConfig = createModuleConfig(JavadocParagraphCheck.class );
+321 treeWalker.setupChild(childConfig);
+322 final File file = new File("input.java" );
+323 final List<String> lines =
+324 new ArrayList<>(Arrays.asList("package com.puppycrawl.tools.checkstyle;" , "" ,
+325 "error public class InputTreeWalkerFileWithViolation {}" ));
+326 final FileText fileText = new FileText(file, lines);
+327 treeWalker.setFileContents(new FileContents(fileText));
+328 try {
+329 treeWalker.processFiltered(file, fileText);
+330 assertWithMessage("Exception expected" ).fail();
+331 }
+332 catch (CheckstyleException ex) {
+333 assertWithMessage("Invalid exception message" )
+334 .that(ex.getMessage())
+335 .isEqualTo("IllegalStateException occurred while parsing file input.java." );
+336 }
+337 }
+338
+339 @Test
+340 public void testProcessNonJavaFilesWithoutException() throws Exception {
+341 final TreeWalker treeWalker = new TreeWalker();
+342 treeWalker.setTabWidth(1);
+343 treeWalker.configure(new DefaultConfiguration("default config" ));
+344 final File file = new File(getPath("InputTreeWalkerNotJava.xml" ));
+345 final FileText fileText = new FileText(file, StandardCharsets.ISO_8859_1.name());
+346 treeWalker.processFiltered(file, fileText);
+347 final Collection<Checks> checks = TestUtil.getInternalState(treeWalker, "ordinaryChecks" );
+348 assertWithMessage("No checks -> No parsing" )
+349 .that(checks)
+350 .isEmpty();
+351 }
+352
+353 @Test
+354 public void testWithCacheWithNoViolation() throws Exception {
+355 final String path = getPath("InputTreeWalkerWithCacheWithNoViolation.java" );
+356 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+357 verifyWithInlineConfigParser(path, expected);
+358 }
+359
+360 @Test
+361 public void testProcessWithParserThrowable() throws Exception {
+362 final TreeWalker treeWalker = new TreeWalker();
+363 treeWalker.configure(createModuleConfig(TypeNameCheck.class ));
+364 final PackageObjectFactory factory = new PackageObjectFactory(
+365 new HashSet<>(), Thread.currentThread().getContextClassLoader());
+366 treeWalker.setModuleFactory(factory);
+367 treeWalker.setupChild(createModuleConfig(TypeNameCheck.class ));
+368 final File file = new File(temporaryFolder, "file.java" );
+369 final List<String> lines = new ArrayList<>();
+370 lines.add(" classD a {} " );
+371 final FileText fileText = new FileText(file, lines);
+372 treeWalker.setFileContents(new FileContents(fileText));
+373 try {
+374 treeWalker.processFiltered(file, fileText);
+375 assertWithMessage("Exception is expected" ).fail();
+376 }
+377 catch (CheckstyleException exception) {
+378 assertWithMessage("Error message is unexpected" )
+379 .that(exception.getMessage())
+380 .contains("occurred while parsing file" );
+381 }
+382 }
+383
+384 @Test
+385 public void testProcessWithRecognitionException() throws Exception {
+386 final TreeWalker treeWalker = new TreeWalker();
+387 treeWalker.configure(createModuleConfig(TypeNameCheck.class ));
+388 final PackageObjectFactory factory = new PackageObjectFactory(
+389 new HashSet<>(), Thread.currentThread().getContextClassLoader());
+390 treeWalker.setModuleFactory(factory);
+391 treeWalker.setupChild(createModuleConfig(TypeNameCheck.class ));
+392 final File file = new File(temporaryFolder, "file.java" );
+393 final List<String> lines = new ArrayList<>();
+394 lines.add(" class a%$# {} " );
+395 final FileText fileText = new FileText(file, lines);
+396 treeWalker.setFileContents(new FileContents(fileText));
+397 try {
+398 treeWalker.processFiltered(file, fileText);
+399 assertWithMessage("Exception is expected" ).fail();
+400 }
+401 catch (CheckstyleException exception) {
+402 assertWithMessage("Error message is unexpected" )
+403 .that(exception.getMessage())
+404 .contains("IllegalStateException occurred while parsing file" );
+405 }
+406 }
+407
+408 @Test
+409 public void testRequiredTokenIsEmptyIntArray() throws Exception {
+410 final File file = new File(temporaryFolder, "file.java" );
+411 try (Writer writer = Files.newBufferedWriter(file.toPath(), StandardCharsets.UTF_8)) {
+412 final String configComment = "/*\n"
+413 + "com.puppycrawl.tools.checkstyle.TreeWalkerTest"
+414 + "$RequiredTokenIsEmptyIntArray\n\n"
+415 + "*/" ;
+416 writer.write(configComment);
+417 }
+418 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+419 verifyWithInlineConfigParser(file.getPath(), expected);
+420 }
+421
+422 @Test
+423 public void testBehaviourWithZeroChecks() throws Exception {
+424 final TreeWalker treeWalker = new TreeWalker();
+425 final PackageObjectFactory factory = new PackageObjectFactory(
+426 new HashSet<>(), Thread.currentThread().getContextClassLoader());
+427 treeWalker.setModuleFactory(factory);
+428
+429 final File file = new File(temporaryFolder, "file.java" );
+430 final FileText fileText = new FileText(file, new ArrayList<>());
+431
+432 treeWalker.processFiltered(file, fileText);
+433 final Collection<Checks> checks = TestUtil.getInternalState(treeWalker, "ordinaryChecks" );
+434 assertWithMessage("No checks -> No parsing" )
+435 .that(checks)
+436 .isEmpty();
+437 }
+438
+439 @Test
+440 public void testBehaviourWithOrdinaryAndCommentChecks() throws Exception {
+441 final TreeWalker treeWalker = new TreeWalker();
+442 treeWalker.configure(createModuleConfig(TypeNameCheck.class ));
+443 treeWalker.configure(createModuleConfig(CommentsIndentationCheck.class ));
+444 final PackageObjectFactory factory = new PackageObjectFactory(
+445 new HashSet<>(), Thread.currentThread().getContextClassLoader());
+446 treeWalker.setModuleFactory(factory);
+447 treeWalker.setupChild(createModuleConfig(TypeNameCheck.class ));
+448 treeWalker.setupChild(createModuleConfig(CommentsIndentationCheck.class ));
+449 final File file = new File(temporaryFolder, "file.java" );
+450 final List<String> lines = new ArrayList<>();
+451 lines.add(" class a%$# {} " );
+452 final FileText fileText = new FileText(file, lines);
+453 treeWalker.setFileContents(new FileContents(fileText));
+454
+455 try {
+456 treeWalker.processFiltered(file, fileText);
+457 assertWithMessage("file is not compilable, exception is expected" ).fail();
+458 }
+459 catch (CheckstyleException exception) {
+460 final String message = "IllegalStateException occurred while parsing file" ;
+461 assertWithMessage("Error message is unexpected" )
+462 .that(exception.getMessage())
+463 .contains(message);
+464 }
+465 }
+466
+467 @Test
+468 public void testSetupChild() throws Exception {
+469 final TreeWalker treeWalker = new TreeWalker();
+470 final PackageObjectFactory factory = new PackageObjectFactory(
+471 new HashSet<>(), Thread.currentThread().getContextClassLoader());
+472 treeWalker.setModuleFactory(factory);
+473 treeWalker.setTabWidth(99);
+474 treeWalker.finishLocalSetup();
+475
+476 final Configuration config = new DefaultConfiguration(
+477 XpathFileGeneratorAstFilter.class .getName());
+478
+479 treeWalker.setupChild(config);
+480
+481 final Set<TreeWalkerFilter> filters = TestUtil.getInternalState(treeWalker, "filters" );
+482 final int tabWidth = TestUtil.getInternalState(filters.iterator().next(), "tabWidth" );
+483
+484 assertWithMessage("expected tab width" )
+485 .that(tabWidth)
+486 .isEqualTo(99);
+487 }
+488
+489 @Test
+490 public void testBehaviourWithChecksAndFilters() throws Exception {
+491
+492 final String[] expected = {
+493 "17:17: " + getCheckMessage(MemberNameCheck.class , "name.invalidPattern" , "P" ,
+494 "^[a-z][a-zA-Z0-9]*$" ),
+495 "12:17: " + getCheckMessage(MemberNameCheck.class , "name.invalidPattern" , "I" ,
+496 "^[a-z][a-zA-Z0-9]*$" ),
+497 };
+498
+499 verifyWithInlineConfigParser(
+500 getPath("InputTreeWalkerSuppressionCommentFilter.java" ),
+501 expected);
+502 }
+503
+504 @Test
+505 public void testMultiCheckOrder() throws Exception {
+506
+507 final String[] expected = {
+508 "13:9: " + getCheckMessage(WhitespaceAfterCheck.class , "ws.notFollowed" , "if" ),
+509 "13:9: " + getCheckMessage(WhitespaceAroundCheck.class , "ws.notFollowed" , "if" ),
+510 };
+511
+512 verifyWithInlineConfigParser(
+513 getPath("InputTreeWalkerMultiCheckOrder.java" ),
+514 expected);
+515 }
+516
+517 @Test
+518 public void testMultiCheckOfSameTypeNoIdResultsInOrderingByHash() throws Exception {
+519
+520 final String[] expected = {
+521 "15:28: " + getCheckMessage(ParameterNameCheck.class ,
+522 "name.invalidPattern" , "V2" , "^[a-z]([a-z0-9][a-zA-Z0-9]*)?$" ),
+523 "17:25: " + getCheckMessage(ParameterNameCheck.class ,
+524 "name.invalidPattern" , "b" , "^[a-z][a-z0-9][a-zA-Z0-9]*$" ),
+525 };
+526
+527 verifyWithInlineConfigParser(
+528 getPath("InputTreeWalkerMultiCheckOrder2.java" ),
+529 expected);
+530 }
+531
+532 @Test
+533 public void testFinishLocalSetupFullyInitialized() {
+534 final TreeWalker treeWalker = new TreeWalker();
+535 treeWalker.setSeverity("error" );
+536 treeWalker.setTabWidth(100);
+537 treeWalker.finishLocalSetup();
+538
+539 final Context context = TestUtil.getInternalState(treeWalker, "childContext" );
+540 assertWithMessage("Severity differs from expected" )
+541 .that(context.get("severity" ))
+542 .isEqualTo("error" );
+543 assertWithMessage("Tab width differs from expected" )
+544 .that(context.get("tabWidth" ))
+545 .isEqualTo(String.valueOf(100));
+546 }
+547
+548 @Test
+549 public void testCheckInitIsCalledInTreeWalker() throws Exception {
+550 final DefaultConfiguration checkConfig =
+551 createModuleConfig(VerifyInitCheck.class );
+552 final String uniqueFileName = "file_" + UUID.randomUUID() + ".pdf" ;
+553 final File file = new File(temporaryFolder, uniqueFileName);
+554 execute(checkConfig, file.getPath());
+555 assertWithMessage("Init was not called" )
+556 .that(VerifyInitCheck.isInitWasCalled())
+557 .isTrue();
+558 }
+559
+560 @Test
+561 public void testCheckDestroyIsCalledInTreeWalker() throws Exception {
+562 VerifyDestroyCheck.resetDestroyWasCalled();
+563 final DefaultConfiguration checkConfig =
+564 createModuleConfig(VerifyDestroyCheck.class );
+565 final String uniqueFileName = "file_" + UUID.randomUUID() + ".pdf" ;
+566 final File file = new File(temporaryFolder, uniqueFileName);
+567 execute(checkConfig, file.getPath());
+568 assertWithMessage("Destroy was not called" )
+569 .that(VerifyDestroyCheck.isDestroyWasCalled())
+570 .isTrue();
+571 }
+572
+573 @Test
+574 public void testCommentCheckDestroyIsCalledInTreeWalker() throws Exception {
+575 VerifyDestroyCheck.resetDestroyWasCalled();
+576 final DefaultConfiguration checkConfig =
+577 createModuleConfig(VerifyDestroyCommentCheck.class );
+578 final String uniqueFileName = "file_" + UUID.randomUUID() + ".pdf" ;
+579 final File file = new File(temporaryFolder, uniqueFileName);
+580 execute(checkConfig, file.getPath());
+581 assertWithMessage("Destroy was not called" )
+582 .that(VerifyDestroyCheck.isDestroyWasCalled())
+583 .isTrue();
+584 }
585
-586 final DefaultConfiguration checkerConfig = createRootConfig(treeWalkerConfig);
-587 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
-588 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
-589
-590 final String filePath = File.createTempFile("file" , ".java" , temporaryFolder).getPath();
-591
-592 execute(checkerConfig, filePath);
-593
-594 execute(checkerConfig, filePath);
-595
-596 assertWithMessage("External resource is not present in cache" )
-597 .that(Files.readString(cacheFile.toPath()))
-598 .contains("InputTreeWalkerSuppressionXpathFilter.xml" );
-599 }
+586 @Test
+587 public void testCacheWhenFileExternalResourceContentDoesNotChange() throws Exception {
+588 final DefaultConfiguration filterConfig = createModuleConfig(SuppressionXpathFilter.class );
+589 filterConfig.addProperty("file" , getPath("InputTreeWalkerSuppressionXpathFilter.xml" ));
+590 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
+591 treeWalkerConfig.addChild(filterConfig);
+592
+593 final DefaultConfiguration checkerConfig = createRootConfig(treeWalkerConfig);
+594 final String uniqueFileName1 = "junit_" + UUID.randomUUID() + ".java" ;
+595 final File cacheFile = new File(temporaryFolder, uniqueFileName1);
+596 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
+597
+598 final String uniqueFileName2 = "file_" + UUID.randomUUID() + ".java" ;
+599 final File filePath = new File(temporaryFolder, uniqueFileName2);
600
-601 @Test
-602 public void testTreeWalkerFilterAbsolutePath() throws Exception {
-603
-604 final String filePath = "src/test/resources/" + getPackageLocation()
-605 + "/InputTreeWalkerSuppressionXpathFilterAbsolute.java" ;
-606
-607 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-608 verifyWithInlineConfigParser(filePath, expected);
-609 }
-610
-611 @Test
-612 public void testExternalResourceFiltersWithNoExternalResource() throws Exception {
-613 final DefaultConfiguration checkConfig = createModuleConfig(EmptyStatementCheck.class );
-614 final DefaultConfiguration filterConfig =
-615 createModuleConfig(SuppressWithNearbyCommentFilter.class );
-616 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
-617 treeWalkerConfig.addChild(checkConfig);
-618 treeWalkerConfig.addChild(filterConfig);
+601 execute(checkerConfig, filePath.toString());
+602
+603 execute(checkerConfig, filePath.toString());
+604
+605 assertWithMessage("External resource is not present in cache" )
+606 .that(Files.readString(cacheFile.toPath()))
+607 .contains("InputTreeWalkerSuppressionXpathFilter.xml" );
+608 }
+609
+610 @Test
+611 public void testTreeWalkerFilterAbsolutePath() throws Exception {
+612
+613 final String filePath = "src/test/resources/" + getPackageLocation()
+614 + "/InputTreeWalkerSuppressionXpathFilterAbsolute.java" ;
+615
+616 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+617 verifyWithInlineConfigParser(filePath, expected);
+618 }
619
-620 final DefaultConfiguration checkerConfig = createRootConfig(treeWalkerConfig);
-621 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
-622 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
-623 final String filePath = File.createTempFile("file" , ".java" , temporaryFolder).getPath();
-624
-625 execute(checkerConfig, filePath);
-626
-627 final long cacheSize = Files.size(cacheFile.toPath());
-628 assertWithMessage("cacheFile should not be empty" )
-629 .that(cacheSize)
-630 .isNotEqualTo(0);
-631 }
-632
-633
-634
-635
-636
-637
-638 @Test
-639 public void testOrderOfCheckExecution() throws Exception {
-640
-641 final DefaultConfiguration configuration1 = createModuleConfig(AaCheck.class );
-642 configuration1.addProperty("id" , "2" );
-643 final DefaultConfiguration configuration2 = createModuleConfig(BbCheck.class );
-644 configuration2.addProperty("id" , "1" );
-645
-646 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
-647 treeWalkerConfig.addChild(configuration2);
-648 treeWalkerConfig.addChild(configuration1);
-649
-650 final List<File> files =
-651 Collections.singletonList(new File(getPath("InputTreeWalker2.java" )));
-652 final Checker checker = createChecker(treeWalkerConfig);
-653
-654 try {
-655 checker.process(files);
-656 assertWithMessage("exception is expected" ).fail();
-657 }
-658 catch (CheckstyleException exception) {
-659 assertWithMessage("wrong order of Check executions" )
-660 .that(exception.getCause().getMessage())
-661 .isEqualTo(AaCheck.class .toString());
-662 }
-663 }
+620 @Test
+621 public void testExternalResourceFiltersWithNoExternalResource() throws Exception {
+622 final DefaultConfiguration checkConfig = createModuleConfig(EmptyStatementCheck.class );
+623 final DefaultConfiguration filterConfig =
+624 createModuleConfig(SuppressWithNearbyCommentFilter.class );
+625 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
+626 treeWalkerConfig.addChild(checkConfig);
+627 treeWalkerConfig.addChild(filterConfig);
+628
+629 final DefaultConfiguration checkerConfig = createRootConfig(treeWalkerConfig);
+630 final String uniqueFileName1 = "junit_" + UUID.randomUUID() + ".java" ;
+631 final File cacheFile = new File(temporaryFolder, uniqueFileName1);
+632 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
+633 final String uniqueFileName2 = "junit_" + UUID.randomUUID() + ".java" ;
+634 final File filePath = new File(temporaryFolder, uniqueFileName2);
+635
+636 execute(checkerConfig, filePath.toString());
+637
+638 final long cacheSize = Files.size(cacheFile.toPath());
+639 assertWithMessage("cacheFile should not be empty" )
+640 .that(cacheSize)
+641 .isNotEqualTo(0);
+642 }
+643
+644
+645
+646
+647
+648
+649 @Test
+650 public void testOrderOfCheckExecution() throws Exception {
+651
+652 final DefaultConfiguration configuration1 = createModuleConfig(AaCheck.class );
+653 configuration1.addProperty("id" , "2" );
+654 final DefaultConfiguration configuration2 = createModuleConfig(BbCheck.class );
+655 configuration2.addProperty("id" , "1" );
+656
+657 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
+658 treeWalkerConfig.addChild(configuration2);
+659 treeWalkerConfig.addChild(configuration1);
+660
+661 final List<File> files =
+662 Collections.singletonList(new File(getPath("InputTreeWalker2.java" )));
+663 final Checker checker = createChecker(treeWalkerConfig);
664
-665 public static class BadJavaDocCheck extends AbstractCheck {
-666
-667 @Override
-668 public int [] getDefaultTokens() {
-669 return getAcceptableTokens();
-670 }
-671
-672 @Override
-673 public int [] getAcceptableTokens() {
-674 return new int [] {TokenTypes.SINGLE_LINE_COMMENT};
-675 }
-676
-677 @Override
-678 public int [] getRequiredTokens() {
-679 return getAcceptableTokens();
-680 }
-681
-682 }
-683
-684 public static class VerifyInitCheck extends AbstractCheck {
-685
-686 private static boolean initWasCalled;
+665 try {
+666 checker.process(files);
+667 assertWithMessage("exception is expected" ).fail();
+668 }
+669 catch (CheckstyleException exception) {
+670 assertWithMessage("wrong order of Check executions" )
+671 .that(exception.getCause().getMessage())
+672 .isEqualTo(AaCheck.class .toString());
+673 }
+674 }
+675
+676 public static class BadJavaDocCheck extends AbstractCheck {
+677
+678 @Override
+679 public int [] getDefaultTokens() {
+680 return getAcceptableTokens();
+681 }
+682
+683 @Override
+684 public int [] getAcceptableTokens() {
+685 return new int [] {TokenTypes.SINGLE_LINE_COMMENT};
+686 }
687
688 @Override
-689 public int [] getDefaultTokens() {
-690 return CommonUtil.EMPTY_INT_ARRAY;
+689 public int [] getRequiredTokens() {
+690 return getAcceptableTokens();
691 }
692
-693 @Override
-694 public int [] getAcceptableTokens() {
-695 return getDefaultTokens();
-696 }
-697
-698 @Override
-699 public int [] getRequiredTokens() {
-700 return getDefaultTokens();
-701 }
-702
-703 @Override
-704 public void init() {
-705 super .init();
-706 initWasCalled = true ;
+693 }
+694
+695 public static class VerifyInitCheck extends AbstractCheck {
+696
+697 private static boolean initWasCalled;
+698
+699 @Override
+700 public int [] getDefaultTokens() {
+701 return CommonUtil.EMPTY_INT_ARRAY;
+702 }
+703
+704 @Override
+705 public int [] getAcceptableTokens() {
+706 return getDefaultTokens();
707 }
708
-709 public static boolean isInitWasCalled() {
-710 return initWasCalled;
-711 }
-712
-713 }
-714
-715 public static class VerifyDestroyCheck extends AbstractCheck {
-716
-717 private static boolean destroyWasCalled;
-718
-719 @Override
-720 public int [] getDefaultTokens() {
-721 return CommonUtil.EMPTY_INT_ARRAY;
+709 @Override
+710 public int [] getRequiredTokens() {
+711 return getDefaultTokens();
+712 }
+713
+714 @Override
+715 public void init() {
+716 super .init();
+717 initWasCalled = true ;
+718 }
+719
+720 public static boolean isInitWasCalled() {
+721 return initWasCalled;
722 }
723
-724 @Override
-725 public int [] getAcceptableTokens() {
-726 return getDefaultTokens();
-727 }
-728
-729 @Override
-730 public int [] getRequiredTokens() {
-731 return getDefaultTokens();
-732 }
-733
-734 @Override
-735 public void destroy() {
-736 super .destroy();
-737 destroyWasCalled = true ;
+724 }
+725
+726 public static class VerifyDestroyCheck extends AbstractCheck {
+727
+728 private static boolean destroyWasCalled;
+729
+730 @Override
+731 public int [] getDefaultTokens() {
+732 return CommonUtil.EMPTY_INT_ARRAY;
+733 }
+734
+735 @Override
+736 public int [] getAcceptableTokens() {
+737 return getDefaultTokens();
738 }
739
-740 public static void resetDestroyWasCalled() {
-741 destroyWasCalled = false;
-742 }
-743
-744 public static boolean isDestroyWasCalled() {
-745 return destroyWasCalled;
-746 }
-747
-748 }
-749
-750 public static class VerifyDestroyCommentCheck extends VerifyDestroyCheck {
-751
-752 @Override
-753 public boolean isCommentNodesRequired() {
-754 return true ;
-755 }
-756
-757 }
+740 @Override
+741 public int [] getRequiredTokens() {
+742 return getDefaultTokens();
+743 }
+744
+745 @Override
+746 public void destroy() {
+747 super .destroy();
+748 destroyWasCalled = true ;
+749 }
+750
+751 public static void resetDestroyWasCalled() {
+752 destroyWasCalled = false;
+753 }
+754
+755 public static boolean isDestroyWasCalled() {
+756 return destroyWasCalled;
+757 }
758
-759 public static class AaCheck extends AbstractCheck {
+759 }
760
-761 @Override
-762 public int [] getDefaultTokens() {
-763 return new int [0];
-764 }
-765
-766 @Override
-767 public int [] getAcceptableTokens() {
-768 return new int [0];
-769 }
-770
-771 @Override
-772 public int [] getRequiredTokens() {
-773 return new int [0];
-774 }
-775
-776 @Override
-777 public void beginTree(DetailAST rootAST) {
-778 throw new IllegalStateException(AaCheck.class .toString());
-779 }
-780
-781 }
-782
-783 public static class BbCheck extends AbstractCheck {
-784
-785 @Override
-786 public int [] getDefaultTokens() {
-787 return new int [0];
-788 }
-789
-790 @Override
-791 public int [] getAcceptableTokens() {
-792 return new int [0];
-793 }
-794
-795 @Override
-796 public int [] getRequiredTokens() {
-797 return new int [0];
-798 }
-799
-800 @Override
-801 public void beginTree(DetailAST rootAST) {
-802 throw new IllegalStateException(BbCheck.class .toString());
-803 }
-804
-805 }
-806
-807 public static class RequiredTokenIsEmptyIntArray extends AbstractCheck {
-808
-809 @Override
-810 public int [] getRequiredTokens() {
-811 return CommonUtil.EMPTY_INT_ARRAY;
-812 }
-813
-814 @Override
-815 public int [] getDefaultTokens() {
-816 return new int [] {TokenTypes.ANNOTATION};
-817 }
-818
-819 @Override
-820 public int [] getAcceptableTokens() {
-821 return CommonUtil.EMPTY_INT_ARRAY;
-822 }
-823
-824 }
-825
-826 }
+761 public static class VerifyDestroyCommentCheck extends VerifyDestroyCheck {
+762
+763 @Override
+764 public boolean isCommentNodesRequired() {
+765 return true ;
+766 }
+767
+768 }
+769
+770 public static class AaCheck extends AbstractCheck {
+771
+772 @Override
+773 public int [] getDefaultTokens() {
+774 return new int [0];
+775 }
+776
+777 @Override
+778 public int [] getAcceptableTokens() {
+779 return new int [0];
+780 }
+781
+782 @Override
+783 public int [] getRequiredTokens() {
+784 return new int [0];
+785 }
+786
+787 @Override
+788 public void beginTree(DetailAST rootAST) {
+789 throw new IllegalStateException(AaCheck.class .toString());
+790 }
+791
+792 }
+793
+794 public static class BbCheck extends AbstractCheck {
+795
+796 @Override
+797 public int [] getDefaultTokens() {
+798 return new int [0];
+799 }
+800
+801 @Override
+802 public int [] getAcceptableTokens() {
+803 return new int [0];
+804 }
+805
+806 @Override
+807 public int [] getRequiredTokens() {
+808 return new int [0];
+809 }
+810
+811 @Override
+812 public void beginTree(DetailAST rootAST) {
+813 throw new IllegalStateException(BbCheck.class .toString());
+814 }
+815
+816 }
+817
+818 public static class RequiredTokenIsEmptyIntArray extends AbstractCheck {
+819
+820 @Override
+821 public int [] getRequiredTokens() {
+822 return CommonUtil.EMPTY_INT_ARRAY;
+823 }
+824
+825 @Override
+826 public int [] getDefaultTokens() {
+827 return new int [] {TokenTypes.ANNOTATION};
+828 }
+829
+830 @Override
+831 public int [] getAcceptableTokens() {
+832 return CommonUtil.EMPTY_INT_ARRAY;
+833 }
+834
+835 }
+836
+837 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/ant/checkstyleanttask/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/ant/checkstyleanttask/package-frame.html
index 2f2148958d..71cb77ef33 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/ant/checkstyleanttask/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/ant/checkstyleanttask/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.ant.checkstyleanttask
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.ant.checkstyleanttask
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/ant/checkstyleanttask/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/ant/checkstyleanttask/package-summary.html
index 282815e785..3075886a75 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/ant/checkstyleanttask/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/ant/checkstyleanttask/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.ant.checkstyleanttask
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.ant.checkstyleanttask
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -91,7 +91,7 @@ Package com.puppycrawl.tools.checkstyle.ant.ch
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/ant/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/ant/package-frame.html
index be11a9695d..707594d83d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/ant/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/ant/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.ant
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.ant
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/ant/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/ant/package-summary.html
index c0b35d58cb..66d693cfe8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/ant/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/ant/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.ant
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.ant
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.antIndex
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/api/abstractcheck/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/api/abstractcheck/package-frame.html
index 1a1f8328c0..74dda19f28 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/api/abstractcheck/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/api/abstractcheck/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.api.abstractcheck
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.api.abstractcheck
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/api/abstractcheck/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/api/abstractcheck/package-summary.html
index b25015d7d1..7db4911e7f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/api/abstractcheck/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/api/abstractcheck/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.api.abstractcheck
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.api.abstractcheck
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.api.ab
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/api/abstractfileset/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/api/abstractfileset/package-frame.html
index 7d788b4507..e1db5cbee0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/api/abstractfileset/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/api/abstractfileset/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.api.abstractfileset
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.api.abstractfileset
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/api/abstractfileset/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/api/abstractfileset/package-summary.html
index ab30084491..e26807e96c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/api/abstractfileset/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/api/abstractfileset/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.api.abstractfileset
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.api.abstractfileset
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.api.ab
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/api/fileset/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/api/fileset/package-frame.html
index af633e0366..27c9dddb79 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/api/fileset/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/api/fileset/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.api.fileset
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.api.fileset
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/api/fileset/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/api/fileset/package-summary.html
index 82f9735651..c7f041873e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/api/fileset/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/api/fileset/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.api.fileset
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.api.fileset
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.api.fi
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/api/fullident/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/api/fullident/package-frame.html
index 5b21dffb1e..40daa53b45 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/api/fullident/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/api/fullident/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.api.fullident
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.api.fullident
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/api/fullident/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/api/fullident/package-summary.html
index 497d18f151..a6eaedf251 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/api/fullident/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/api/fullident/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.api.fullident
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.api.fullident
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -111,7 +111,7 @@ Package com.puppycrawl.tools.checkstyle.api.fu
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/api/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/api/package-frame.html
index 6a3e102c3b..3f38278e8b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/api/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/api/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.api
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.api
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/api/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/api/package-summary.html
index 70dd689ed0..f0faa6e918 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/api/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/api/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.api
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.api
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -196,7 +196,7 @@ Package com.puppycrawl.tools.checkstyle.apiIndex
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/asttreestringprinter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/asttreestringprinter/package-frame.html
index 71066f1637..a0ca1e4bac 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/asttreestringprinter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/asttreestringprinter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.asttreestringprinter
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.asttreestringprinter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/asttreestringprinter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/asttreestringprinter/package-summary.html
index 9e08ada2a9..5f0dbf240d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/asttreestringprinter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/asttreestringprinter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.asttreestringprinter
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.asttreestringprinter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -111,7 +111,7 @@ Package com.puppycrawl.tools.checkstyle.asttre
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/bdd/InlineConfigParser.html b/xref-test/com/puppycrawl/tools/checkstyle/bdd/InlineConfigParser.html
index 808fb13b28..1f2500ba41 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/bdd/InlineConfigParser.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/bdd/InlineConfigParser.html
@@ -309,25 +309,25 @@
301
302 private static String getFullyQualifiedClassName(String filePath, String moduleName)
303 throws CheckstyleException {
-304 String fullyQualifiedClassName;
-305
-306 final Map<String, String> moduleMappings = new HashMap<>();
-307 moduleMappings.put("ParameterNumber" ,
-308 "com.puppycrawl.tools.checkstyle.checks.sizes.ParameterNumberCheck" );
-309 moduleMappings.put("SuppressWarningsHolder" ,
-310 "com.puppycrawl.tools.checkstyle.checks.SuppressWarningsHolder" );
-311 moduleMappings.put("SuppressWarningsFilter" ,
-312 "com.puppycrawl.tools.checkstyle.filters.SuppressWarningsFilter" );
-313 moduleMappings.put("MemberName" ,
-314 "com.puppycrawl.tools.checkstyle.checks.naming.MemberNameCheck" );
-315 moduleMappings.put("ConstantName" ,
-316 "com.puppycrawl.tools.checkstyle.checks.naming.ConstantNameCheck" );
-317 moduleMappings.put("NoWhitespaceAfter" ,
-318 "com.puppycrawl.tools.checkstyle.checks.whitespace.NoWhitespaceAfterCheck" );
-319 moduleMappings.put("SummaryJavadoc" ,
-320 "com.puppycrawl.tools.checkstyle.checks.javadoc.SummaryJavadocCheck" );
-321 moduleMappings.put("LineLength" ,
-322 "com.puppycrawl.tools.checkstyle.checks.sizes.LineLengthCheck" );
+304
+305 final Map<String, String> moduleMappings = new HashMap<>();
+306 moduleMappings.put("ParameterNumber" ,
+307 "com.puppycrawl.tools.checkstyle.checks.sizes.ParameterNumberCheck" );
+308 moduleMappings.put("SuppressWarningsHolder" ,
+309 "com.puppycrawl.tools.checkstyle.checks.SuppressWarningsHolder" );
+310 moduleMappings.put("SuppressWarningsFilter" ,
+311 "com.puppycrawl.tools.checkstyle.filters.SuppressWarningsFilter" );
+312 moduleMappings.put("MemberName" ,
+313 "com.puppycrawl.tools.checkstyle.checks.naming.MemberNameCheck" );
+314 moduleMappings.put("ConstantName" ,
+315 "com.puppycrawl.tools.checkstyle.checks.naming.ConstantNameCheck" );
+316 moduleMappings.put("NoWhitespaceAfter" ,
+317 "com.puppycrawl.tools.checkstyle.checks.whitespace.NoWhitespaceAfterCheck" );
+318 moduleMappings.put("SummaryJavadoc" ,
+319 "com.puppycrawl.tools.checkstyle.checks.javadoc.SummaryJavadocCheck" );
+320 moduleMappings.put("LineLength" ,
+321 "com.puppycrawl.tools.checkstyle.checks.sizes.LineLengthCheck" );
+322 String fullyQualifiedClassName;
323 if (moduleMappings.containsKey(moduleName)) {
324 fullyQualifiedClassName = moduleMappings.get(moduleName);
325 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/bdd/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/bdd/package-frame.html
index b04e53d83b..14de86b3f0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/bdd/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/bdd/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.bdd
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.bdd
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/bdd/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/bdd/package-summary.html
index 9fcb0d60e3..e324b1acbe 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/bdd/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/bdd/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.bdd
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.bdd
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -101,7 +101,7 @@ Package com.puppycrawl.tools.checkstyle.bddIndex
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checker/InputCheckerClearDetailAstLazyLoadCache.html b/xref-test/com/puppycrawl/tools/checkstyle/checker/InputCheckerClearDetailAstLazyLoadCache.html
index 36fd597015..035c55dae0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checker/InputCheckerClearDetailAstLazyLoadCache.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checker/InputCheckerClearDetailAstLazyLoadCache.html
@@ -6,18 +6,26 @@
-1 package com.puppycrawl.tools.checkstyle.checker;
-2
-3 public class InputCheckerClearDetailAstLazyLoadCache {
-4
-5 public
-6
-7
-8
-9 static void foo() {
-10 return ;
-11 }
-12 }
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checker;
+10
+11 public class InputCheckerClearDetailAstLazyLoadCache {
+12
+13 public
+14
+15
+16
+17 static void foo() {
+18 return ;
+19 }
+20 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checker/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checker/package-frame.html
index 91ba7d08b1..e3e31241c8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checker/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checker/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checker
+
checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checker
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checker/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checker/package-summary.html
index 84e2d10709..21ad95b474 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checker/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checker/package-summary.html
@@ -4,7 +4,7 @@
-
checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checker
+
checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checker
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.checke
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/inputs/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/inputs/package-frame.html
index fa9e0c4c4a..5d0f2b5f0f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/inputs/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/inputs/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationlocation.inputs
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationlocation.inputs
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/inputs/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/inputs/package-summary.html
index 7acce24ff0..347d6a7678 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/inputs/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/inputs/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationlocation.inputs
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationlocation.inputs
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/package-frame.html
index 7e0559146e..4a4fd75627 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationlocation
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationlocation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/package-summary.html
index 6302fb444b..d0e64bb095 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationlocation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationlocation
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationlocation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -391,7 +391,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationonsameline/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationonsameline/package-frame.html
index 7970bcff3d..a3c8bbd608 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationonsameline/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationonsameline/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationonsameline
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationonsameline
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationonsameline/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationonsameline/package-summary.html
index 6114aa2be7..5353089fff 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationonsameline/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationonsameline/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationonsameline
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationonsameline
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -171,7 +171,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-frame.html
index 687dad3e99..6923d1e14a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-summary.html
index 72ea1c7a82..757193f0b5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -161,7 +161,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-frame.html
index 1a93d25265..e7898b4989 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingdeprecated
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingdeprecated
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-summary.html
index c78915afd7..65bb2eea08 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingdeprecated
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingdeprecated
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -191,7 +191,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/package-frame.html
index 530f2947c7..74b84f7e91 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingoverride
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingoverride
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/package-summary.html
index 336cf2e8d7..0d040822ad 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingoverride
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingoverride
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -361,7 +361,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-frame.html
index 194ea1baae..287e85dd81 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-summary.html
index 6dfd5985c3..158b06e90a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -151,7 +151,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/example3/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/example3/package-frame.html
index 98dd812b3e..555df6522b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/example3/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/example3/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.packageannotation.example3
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.packageannotation.example3
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/example3/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/example3/package-summary.html
index 6e7ff5b0ce..d56c289190 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/example3/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/example3/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.packageannotation.example3
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.packageannotation.example3
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-frame.html
index f71f52410e..a44e78f4ea 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.packageannotation
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.packageannotation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-summary.html
index 3ca6a8368a..9f9bc5db0f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.packageannotation
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.packageannotation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-frame.html
index c371bd2138..2632dc8a1b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarnings
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarnings
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-summary.html
index 7179024a4a..33d333a49a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarnings
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarnings
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -331,7 +331,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarningsholder/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarningsholder/package-frame.html
index 9e39c07025..93e9a24fe4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarningsholder/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarningsholder/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarningsholder
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarningsholder
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarningsholder/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarningsholder/package-summary.html
index 292627511e..61325d4ce5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarningsholder/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarningsholder/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarningsholder
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarningsholder
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-frame.html
index 08e6d1f5cd..748abec62e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.arraytypestyle
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.arraytypestyle
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-summary.html
index 5f43ceabcc..a4c724e1cd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.arraytypestyle
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.arraytypestyle
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -116,7 +116,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-frame.html
index 82ee85fe50..7ed7ea35a2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.avoidescapedunicodecharacters
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.avoidescapedunicodecharacters
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-summary.html
index 5f77225c40..edfc8c07ec 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.avoidescapedunicodecharacters
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.avoidescapedunicodecharacters
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -136,7 +136,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/RightCurlyCheckTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/RightCurlyCheckTest.html
index 8d644c8e65..8afa303dba 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/RightCurlyCheckTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/RightCurlyCheckTest.html
@@ -315,521 +315,527 @@
307 }
308
309 @Test
-310 public void testCatchWithoutFinally() throws Exception {
-311 final String[] expected = {
-312 "19:9: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 9),
-313 };
-314 verifyWithInlineConfigParser(
-315 getPath("InputRightCurlyTestWithoutFinally.java" ), expected);
-316 }
-317
-318 @Test
-319 public void testSingleLineClass() throws Exception {
-320 final String[] expected = {
-321 "29:56: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 56),
-322 };
-323 verifyWithInlineConfigParser(
-324 getPath("InputRightCurlyTestSingleLineClass.java" ), expected);
-325 }
-326
-327 @Test
-328 public void testInvalidOption() throws Exception {
-329
-330 try {
-331 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-332
-333 verifyWithInlineConfigParser(
-334 getPath("InputRightCurlyTestInvalidOption.java" ), expected);
-335 assertWithMessage("exception expected" ).fail();
-336 }
-337 catch (CheckstyleException ex) {
-338 assertWithMessage("Invalid exception message" )
-339 .that(ex.getMessage())
-340 .isEqualTo("cannot initialize module com.puppycrawl.tools.checkstyle.TreeWalker - "
-341 + "cannot initialize module com.puppycrawl.tools.checkstyle.checks."
-342 + "blocks.RightCurlyCheck - "
-343 + "Cannot set property 'option' to 'invalid_option'" );
-344 }
-345 }
-346
-347 @Test
-348 public void testRightCurlySameAndLiteralDo() throws Exception {
-349 final String[] expected = {
-350 "70:9: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 9),
-351 "75:13: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 13),
-352 "91:9: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 9),
-353 };
-354 verifyWithInlineConfigParser(
-355 getPath("InputRightCurlyTestSameAndLiteralDo.java" ), expected);
-356 }
-357
-358 @Test
-359 public void testTryWithResourceSame() throws Exception {
-360 final String[] expected = {
-361 "19:9: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 9),
-362 "33:67: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 67),
-363 "44:15: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 15),
-364 "46:13: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 13),
-365 };
-366 verifyWithInlineConfigParser(
-367 getPath("InputRightCurlyTestTryWithResourceSame.java" ), expected);
-368 }
-369
-370 @Test
-371 public void testTryWithResourceAlone() throws Exception {
-372 final String[] expected = {
-373 "27:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-374 "33:67: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 67),
-375 "34:35: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 35),
-376 "37:64: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 64),
-377 "37:92: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 92),
-378 "44:67: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 67),
-379 "46:15: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 15),
-380 "48:13: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 13),
-381 };
-382 verifyWithInlineConfigParser(
-383 getPath("InputRightCurlyTestTryWithResourceAlone.java" ), expected);
-384 }
-385
-386 @Test
-387 public void testTryWithResourceAloneSingle() throws Exception {
-388 final String[] expected = {
-389 "27:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-390 "36:64: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 64),
-391 "44:15: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 15),
-392 "46:13: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 13),
-393 };
-394 verifyWithInlineConfigParser(
-395 getPath("InputRightCurlyTryWithResourceAloneSingle.java" ), expected);
-396 }
-397
-398 @Test
-399 public void testBracePolicyAloneAndSinglelineIfBlocks() throws Exception {
-400 final String[] expected = {
-401 "13:32: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 32),
-402 "15:45: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 45),
-403 "15:47: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 47),
-404 };
-405 verifyWithInlineConfigParser(
-406 getPath("InputRightCurlyTestSinglelineIfBlocks.java" ), expected);
-407 }
-408
-409 @Test
-410 public void testRightCurlyIsAloneLambda() throws Exception {
-411 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-412 verifyWithInlineConfigParser(
-413 getPath("InputRightCurlyTestIsAloneLambda.java" ), expected);
-414 }
-415
-416 @Test
-417 public void testRightCurlyIsAloneOrSinglelineLambda() throws Exception {
-418 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-419 verifyWithInlineConfigParser(
-420 getPath("InputRightCurlyTestIsAloneOrSinglelineLambda.java" ), expected);
-421 }
-422
-423 @Test
-424 public void testRightCurlyIsSameLambda() throws Exception {
-425 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-426 verifyWithInlineConfigParser(
-427 getPath("InputRightCurlyTestIsSameLambda.java" ), expected);
-428 }
-429
-430 @Test
-431 public void testOptionAlone() throws Exception {
-432 final String[] expected = {
-433 "16:15: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 15),
-434 "17:21: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 21),
-435 "21:26: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 26),
-436 "30:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
-437 "47:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-438 "51:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
-439 "54:30: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 30),
-440 "56:27: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 27),
-441 "58:17: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 17),
-442 "60:53: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 53),
-443 "62:27: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 27),
-444 "62:52: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 52),
-445 "75:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-446 "75:11: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 11),
-447 "79:39: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 39),
-448 "81:56: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 56),
-449 "84:24: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 24),
-450 "96:30: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 30),
-451 "99:39: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 39),
-452 "105:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-453 "105:10: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 10),
-454 };
-455 verifyWithInlineConfigParser(
-456 getPath("InputRightCurlyTestOptionAlone.java" ),
-457 expected);
-458 }
-459
-460 @Test
-461 public void testOptionAloneOrSingleLine() throws Exception {
-462 final String[] expected = {
-463 "21:26: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 26),
-464 "30:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
-465 "38:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-466 "47:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-467 "51:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
-468 "72:24: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 24),
-469 "77:30: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 30),
-470 "86:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-471 "86:10: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 10),
-472 };
-473 verifyWithInlineConfigParser(
-474 getPath(
-475 "InputRightCurlyTestOptionAloneOrSingleLine.java" ), expected);
-476 }
-477
-478 @Test
-479 public void testBlocksEndingWithSemiOptionSame() throws Exception {
-480 final String[] expected = {
-481 "16:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-482 "21:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-483 "27:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-484 "35:29: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 29),
-485 "41:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-486 "44:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-487 "51:20: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 20),
-488 "57:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-489 "60:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-490 "65:30: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 30),
-491 "74:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-492 "74:11: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 11),
-493 "78:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-494 };
-495 verifyWithInlineConfigParser(
-496 getPath("InputRightCurlyTestOptSameBlocksWithSemi.java" ), expected);
-497 }
-498
-499 @Test
-500 public void testBlocksEndingWithSemiOptionAlone() throws Exception {
-501 final String[] expected = {
-502 "13:31: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 31),
-503 "16:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-504 "18:29: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 29),
-505 "21:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-506 "24:30: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 30),
-507 "27:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-508 "35:29: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 29),
-509 "37:40: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 40),
-510 "41:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-511 "44:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-512 "46:61: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 61),
-513 "48:19: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 19),
-514 "51:20: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 20),
-515 "53:34: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 34),
-516 "57:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-517 "60:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-518 "65:30: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 30),
-519 "71:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-520 "71:11: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 11),
-521 "75:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-522 };
-523 verifyWithInlineConfigParser(
-524 getPath("InputRightCurlyTestOptAloneBlocksWithSemi.java" ), expected);
-525 }
-526
-527 @Test
-528 public void testBlocksEndingWithSemiOptionAloneOrSingleLine() throws Exception {
-529 final String[] expected = {
-530 "16:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-531 "21:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-532 "27:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-533 "35:29: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 29),
-534 "41:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-535 "44:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-536 "51:20: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 20),
-537 "57:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-538 "60:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-539 "65:30: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 30),
-540 "74:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-541 "74:11: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 11),
-542 "78:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-543 };
-544 verifyWithInlineConfigParser(
-545 getPath("InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.java" ), expected);
-546 }
-547
-548 @Test
-549 public void testNewTokensAlone() throws Exception {
-550 final String[] expected = {
-551 "13:19: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 19),
-552 "16:20: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 20),
-553 "18:34: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 34),
-554 };
-555 verifyWithInlineConfigParser(
-556 getPath("InputRightCurlyTestNewTokensAlone.java" ), expected);
-557 }
-558
-559 @Test
-560 public void testNewTokensAloneOrSingleLine() throws Exception {
-561 final String[] expected = {
-562 "16:20: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 20),
-563 };
-564 verifyWithInlineConfigParser(
-565 getPath("InputRightCurlyNewTokensAloneOrSingleLine.java" ), expected);
-566 }
-567
-568 @Test
-569 public void testNewTokensSame() throws Exception {
-570 final String[] expected = {
-571 "16:20: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 20),
-572 };
-573 verifyWithInlineConfigParser(
-574 getPath("InputRightCurlyTestSameNewTokens.java" ), expected);
-575 }
-576
-577 @Test
-578 public void testRightCurlyDoubleBrace() throws Exception {
-579 final String[] expected = {
-580 "14:1: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 1),
-581 "14:2: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 2),
-582 };
-583 verifyWithInlineConfigParser(
-584 getPath("InputRightCurlyTestDoubleBrace.java" ), expected);
-585 }
-586
-587 @Test
-588 public void testRightCurlyEmptyOnSingleLine() throws Exception {
-589 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-590 verifyWithInlineConfigParser(
-591 getPath("InputRightCurlyTestEmptyOnSingleLine.java" ), expected);
-592 }
-593
-594 @Test
-595 public void testRightCurlyEndOfFile() throws Exception {
-596 final String[] expected = {
-597 "16:2: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 2),
-598 "16:3: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 3),
-599 };
-600 verifyWithInlineConfigParser(
-601 getPath("InputRightCurlyTestEndOfFile.java" ), expected);
-602 }
-603
-604 @Test
-605 public void testRightCurlyRecordsAndCompactCtors() throws Exception {
-606 final String[] expected = {
-607 "23:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-608 "23:11: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 11),
-609 "27:21: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 21),
-610 "32:23: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 23),
-611 "34:37: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 37),
-612 "41:68: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 68),
-613 };
-614 verifyWithInlineConfigParser(
-615 getNonCompilablePath("InputRightCurlyTestRecordsAndCompactCtors.java" ), expected);
-616 }
-617
-618 @Test
-619 public void testRightCurlyWithEmoji() throws Exception {
-620 final String[] expected = {
-621 "24:13: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 13),
-622 "28:13: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 13),
-623 "49:9: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 9),
-624 "69:50: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 50),
-625 "78:44: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 44),
-626 "84:41: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 41),
-627
-628 };
-629 verifyWithInlineConfigParser(getPath("InputRightCurlyWithEmoji.java" ), expected);
-630 }
-631
-632 @Test
-633 public void testRightCurlyWithEmojiAloneOrSingleLine() throws Exception {
-634 final String[] expected = {
-635 "24:38: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 38),
-636 "30:43: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 43),
-637 "40:45: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 45),
-638 "51:41: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 41),
-639 "54:31: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 31),
-640 };
-641 verifyWithInlineConfigParser(
-642 getPath("InputRightCurlyWithEmojiAloneOrSingleLine.java" ), expected);
-643 }
-644
-645 @Test
-646 public void testUppercaseOptionProperty() throws Exception {
-647 final String[] expected = {
-648 "16:46: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 46),
-649 "21:35: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 35),
-650 };
-651 verifyWithInlineConfigParser(
-652 getPath("InputRightCurlyWithUppercaseOptionProperty.java" ), expected);
-653 }
-654
-655 @Test
-656 public void testRightCurlyWithIfElseAlone() throws Exception {
-657 final String[] expected = {
-658 "19:12: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 12),
-659 "27:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-660 };
-661 verifyWithInlineConfigParser(
-662 getPath("InputRightCurlyTestIfElseAlone.java" ), expected);
-663 }
-664
-665 @Test
-666 public void testSwitchCase() throws Exception {
-667 final String[] expected = {
-668 "20:24: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 24),
-669 "27:27: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 27),
-670 "51:46: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 46),
-671 "69:68: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 68),
-672 "75:74: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 74),
-673 "112:17: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 17),
-674 "116:21: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 21),
-675 };
-676 verifyWithInlineConfigParser(
-677 getPath("InputRightCurlyTestSwitchCase.java" ), expected);
-678 }
-679
-680 @Test
-681 public void testSwitchCase2() throws Exception {
-682 final String[] expected = {
-683 "20:24: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 24),
-684 "27:27: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 27),
-685 "114:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-686 };
-687 verifyWithInlineConfigParser(
-688 getPath("InputRightCurlyTestSwitchCase2.java" ), expected);
-689 }
-690
-691 @Test
-692 public void testSwitchCase3() throws Exception {
-693 final String[] expected = {
-694 "15:22: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 22),
-695 "17:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-696 "19:36: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 36),
-697 "25:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-698 "26:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
-699 "28:22: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 22),
-700 "29:22: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 22),
-701 "37:26: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 26),
-702 "37:27: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 27),
-703 "43:40: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 40),
-704 "43:41: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 41),
-705 "48:46: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 46),
-706 "50:32: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 32),
-707 "50:33: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 33),
-708 "52:13: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 13),
-709 "52:14: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 14),
-710 };
-711 verifyWithInlineConfigParser(
-712 getPath("InputRightCurlyTestSwitchCase3.java" ), expected);
-713 }
-714
-715 @Test
-716 public void testSwitchCase4() throws Exception {
-717 final String[] expected = {
-718 "17:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-719 "19:36: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 36),
-720 "25:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-721 "26:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
-722 "28:22: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 22),
-723 "35:41: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 41),
-724 "35:42: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 42),
-725 "40:46: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 46),
-726 "42:32: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 32),
-727 };
-728 verifyWithInlineConfigParser(
-729 getPath("InputRightCurlyTestSwitchCase4.java" ), expected);
-730 }
-731
-732 @Test
-733 public void testSwitchCase5() throws Exception {
-734 final String[] expected = {
-735 "17:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-736 "19:36: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 36),
-737 "25:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-738 "26:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
-739 "28:22: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 22),
-740 "35:41: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 41),
-741 "35:42: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 42),
-742 "40:46: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 46),
-743 "42:32: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 32),
-744 "65:49: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 49),
-745 };
-746 verifyWithInlineConfigParser(
-747 getPath("InputRightCurlyTestSwitchCase5.java" ), expected);
-748 }
-749
-750 @Test
-751 public void testSwitchExpression() throws Exception {
-752 final String[] expected = {
-753 "48:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-754 "56:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-755 "92:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-756 };
-757 verifyWithInlineConfigParser(
-758 getNonCompilablePath("InputRightCurlyTestSwitchExpression.java" ), expected);
-759 }
-760
-761 @Test
-762 public void testSwitchExpression2() throws Exception {
-763 final String[] expected = {
-764 "46:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-765 "54:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
-766 "77:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-767 "90:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
-768 };
-769 verifyWithInlineConfigParser(
-770 getNonCompilablePath("InputRightCurlyTestSwitchExpression2.java" ), expected);
-771 }
-772
-773 @Test
-774 public void testSwitchExpression3() throws Exception {
-775 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-776 verifyWithInlineConfigParser(
-777 getNonCompilablePath("InputRightCurlyTestSwitchExpression3.java" ), expected);
-778 }
-779
-780 @Test
-781 public void testSwitchExpression4() throws Exception {
-782 final String[] expected = {
-783 "117:28: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 28),
-784 };
-785 verifyWithInlineConfigParser(
-786 getNonCompilablePath("InputRightCurlyTestSwitchExpression4.java" ), expected);
-787 }
-788
-789 @Test
-790 public void testSwitchExpression5() throws Exception {
-791 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-792 verifyWithInlineConfigParser(
-793 getNonCompilablePath("InputRightCurlyTestSwitchExpression5.java" ), expected);
-794 }
-795
-796 @Test
-797 public void testSwitchWithComment() throws Exception {
-798 final String[] expected = {
-799 "16:66: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 66),
-800 "23:61: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 61),
-801 "24:57: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 57),
-802 "31:23: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 23),
-803 "32:19: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 19),
-804 "37:23: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 23),
-805 "38:33: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 33),
-806 };
-807 verifyWithInlineConfigParser(
-808 getPath("InputRightCurlyTestWithComment.java" ), expected);
-809 }
-810
-811 @Test
-812 public void testSwitchExpression6() throws Exception {
-813 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-814 verifyWithInlineConfigParser(
-815 getNonCompilablePath("InputRightCurlyTestSwitchExpression6.java" ), expected);
-816 }
-817
-818 @Test
-819 public void testSwitchExpression7() throws Exception {
-820 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-821 verifyWithInlineConfigParser(
-822 getNonCompilablePath("InputRightCurlyTestSwitchExpression7.java" ), expected);
-823 }
-824 }
+310 public void testAloneOrSingleLineTryCatchBlock() throws Exception {
+311 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+312 verifyWithInlineConfigParser(
+313 getPath("InputRightCurlyTestAloneOrSinglelineTryCatchBlock.java" ), expected);
+314 }
+315
+316 @Test
+317 public void testCatchWithoutFinally() throws Exception {
+318 final String[] expected = {
+319 "19:9: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 9),
+320 };
+321 verifyWithInlineConfigParser(
+322 getPath("InputRightCurlyTestWithoutFinally.java" ), expected);
+323 }
+324
+325 @Test
+326 public void testSingleLineClass() throws Exception {
+327 final String[] expected = {
+328 "29:56: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 56),
+329 };
+330 verifyWithInlineConfigParser(
+331 getPath("InputRightCurlyTestSingleLineClass.java" ), expected);
+332 }
+333
+334 @Test
+335 public void testInvalidOption() throws Exception {
+336
+337 try {
+338 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+339
+340 verifyWithInlineConfigParser(
+341 getPath("InputRightCurlyTestInvalidOption.java" ), expected);
+342 assertWithMessage("exception expected" ).fail();
+343 }
+344 catch (CheckstyleException ex) {
+345 assertWithMessage("Invalid exception message" )
+346 .that(ex.getMessage())
+347 .isEqualTo("cannot initialize module com.puppycrawl.tools.checkstyle.TreeWalker - "
+348 + "cannot initialize module com.puppycrawl.tools.checkstyle.checks."
+349 + "blocks.RightCurlyCheck - "
+350 + "Cannot set property 'option' to 'invalid_option'" );
+351 }
+352 }
+353
+354 @Test
+355 public void testRightCurlySameAndLiteralDo() throws Exception {
+356 final String[] expected = {
+357 "70:9: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 9),
+358 "75:13: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 13),
+359 "91:9: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 9),
+360 };
+361 verifyWithInlineConfigParser(
+362 getPath("InputRightCurlyTestSameAndLiteralDo.java" ), expected);
+363 }
+364
+365 @Test
+366 public void testTryWithResourceSame() throws Exception {
+367 final String[] expected = {
+368 "19:9: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 9),
+369 "33:67: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 67),
+370 "44:15: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 15),
+371 "46:13: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 13),
+372 };
+373 verifyWithInlineConfigParser(
+374 getPath("InputRightCurlyTestTryWithResourceSame.java" ), expected);
+375 }
+376
+377 @Test
+378 public void testTryWithResourceAlone() throws Exception {
+379 final String[] expected = {
+380 "27:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+381 "33:67: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 67),
+382 "34:35: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 35),
+383 "37:64: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 64),
+384 "37:92: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 92),
+385 "44:67: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 67),
+386 "46:15: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 15),
+387 "48:13: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 13),
+388 };
+389 verifyWithInlineConfigParser(
+390 getPath("InputRightCurlyTestTryWithResourceAlone.java" ), expected);
+391 }
+392
+393 @Test
+394 public void testTryWithResourceAloneSingle() throws Exception {
+395 final String[] expected = {
+396 "27:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+397 "43:15: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 15),
+398 "45:13: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 13),
+399 };
+400 verifyWithInlineConfigParser(
+401 getPath("InputRightCurlyTryWithResourceAloneSingle.java" ), expected);
+402 }
+403
+404 @Test
+405 public void testBracePolicyAloneAndSinglelineIfBlocks() throws Exception {
+406 final String[] expected = {
+407 "13:32: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 32),
+408 "15:45: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 45),
+409 "15:47: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 47),
+410 };
+411 verifyWithInlineConfigParser(
+412 getPath("InputRightCurlyTestSinglelineIfBlocks.java" ), expected);
+413 }
+414
+415 @Test
+416 public void testRightCurlyIsAloneLambda() throws Exception {
+417 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+418 verifyWithInlineConfigParser(
+419 getPath("InputRightCurlyTestIsAloneLambda.java" ), expected);
+420 }
+421
+422 @Test
+423 public void testRightCurlyIsAloneOrSinglelineLambda() throws Exception {
+424 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+425 verifyWithInlineConfigParser(
+426 getPath("InputRightCurlyTestIsAloneOrSinglelineLambda.java" ), expected);
+427 }
+428
+429 @Test
+430 public void testRightCurlyIsSameLambda() throws Exception {
+431 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+432 verifyWithInlineConfigParser(
+433 getPath("InputRightCurlyTestIsSameLambda.java" ), expected);
+434 }
+435
+436 @Test
+437 public void testOptionAlone() throws Exception {
+438 final String[] expected = {
+439 "16:15: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 15),
+440 "17:21: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 21),
+441 "21:26: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 26),
+442 "30:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
+443 "47:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+444 "51:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
+445 "54:30: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 30),
+446 "56:27: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 27),
+447 "58:17: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 17),
+448 "60:53: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 53),
+449 "62:27: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 27),
+450 "62:52: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 52),
+451 "75:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+452 "75:11: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 11),
+453 "79:39: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 39),
+454 "81:56: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 56),
+455 "84:24: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 24),
+456 "96:30: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 30),
+457 "99:39: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 39),
+458 "105:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+459 "105:10: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 10),
+460 };
+461 verifyWithInlineConfigParser(
+462 getPath("InputRightCurlyTestOptionAlone.java" ),
+463 expected);
+464 }
+465
+466 @Test
+467 public void testOptionAloneOrSingleLine() throws Exception {
+468 final String[] expected = {
+469 "21:26: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 26),
+470 "30:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
+471 "38:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+472 "47:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+473 "51:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
+474 "72:24: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 24),
+475 "77:30: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 30),
+476 "86:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+477 "86:10: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 10),
+478 };
+479 verifyWithInlineConfigParser(
+480 getPath(
+481 "InputRightCurlyTestOptionAloneOrSingleLine.java" ), expected);
+482 }
+483
+484 @Test
+485 public void testBlocksEndingWithSemiOptionSame() throws Exception {
+486 final String[] expected = {
+487 "16:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+488 "21:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+489 "27:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+490 "35:29: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 29),
+491 "41:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+492 "44:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+493 "51:20: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 20),
+494 "57:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+495 "60:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+496 "65:30: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 30),
+497 "74:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+498 "74:11: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 11),
+499 "78:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+500 };
+501 verifyWithInlineConfigParser(
+502 getPath("InputRightCurlyTestOptSameBlocksWithSemi.java" ), expected);
+503 }
+504
+505 @Test
+506 public void testBlocksEndingWithSemiOptionAlone() throws Exception {
+507 final String[] expected = {
+508 "13:31: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 31),
+509 "16:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+510 "18:29: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 29),
+511 "21:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+512 "24:30: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 30),
+513 "27:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+514 "35:29: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 29),
+515 "37:40: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 40),
+516 "41:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+517 "44:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+518 "46:61: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 61),
+519 "48:19: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 19),
+520 "51:20: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 20),
+521 "53:34: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 34),
+522 "57:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+523 "60:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+524 "65:30: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 30),
+525 "71:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+526 "71:11: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 11),
+527 "75:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+528 };
+529 verifyWithInlineConfigParser(
+530 getPath("InputRightCurlyTestOptAloneBlocksWithSemi.java" ), expected);
+531 }
+532
+533 @Test
+534 public void testBlocksEndingWithSemiOptionAloneOrSingleLine() throws Exception {
+535 final String[] expected = {
+536 "16:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+537 "21:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+538 "27:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+539 "35:29: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 29),
+540 "41:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+541 "44:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+542 "51:20: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 20),
+543 "57:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+544 "60:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+545 "65:30: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 30),
+546 "74:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+547 "74:11: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 11),
+548 "78:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+549 };
+550 verifyWithInlineConfigParser(
+551 getPath("InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.java" ), expected);
+552 }
+553
+554 @Test
+555 public void testNewTokensAlone() throws Exception {
+556 final String[] expected = {
+557 "13:19: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 19),
+558 "16:20: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 20),
+559 "18:34: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 34),
+560 };
+561 verifyWithInlineConfigParser(
+562 getPath("InputRightCurlyTestNewTokensAlone.java" ), expected);
+563 }
+564
+565 @Test
+566 public void testNewTokensAloneOrSingleLine() throws Exception {
+567 final String[] expected = {
+568 "16:20: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 20),
+569 };
+570 verifyWithInlineConfigParser(
+571 getPath("InputRightCurlyNewTokensAloneOrSingleLine.java" ), expected);
+572 }
+573
+574 @Test
+575 public void testNewTokensSame() throws Exception {
+576 final String[] expected = {
+577 "16:20: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 20),
+578 };
+579 verifyWithInlineConfigParser(
+580 getPath("InputRightCurlyTestSameNewTokens.java" ), expected);
+581 }
+582
+583 @Test
+584 public void testRightCurlyDoubleBrace() throws Exception {
+585 final String[] expected = {
+586 "14:1: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 1),
+587 "14:2: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 2),
+588 };
+589 verifyWithInlineConfigParser(
+590 getPath("InputRightCurlyTestDoubleBrace.java" ), expected);
+591 }
+592
+593 @Test
+594 public void testRightCurlyEmptyOnSingleLine() throws Exception {
+595 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+596 verifyWithInlineConfigParser(
+597 getPath("InputRightCurlyTestEmptyOnSingleLine.java" ), expected);
+598 }
+599
+600 @Test
+601 public void testRightCurlyEndOfFile() throws Exception {
+602 final String[] expected = {
+603 "16:2: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 2),
+604 "16:3: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 3),
+605 };
+606 verifyWithInlineConfigParser(
+607 getPath("InputRightCurlyTestEndOfFile.java" ), expected);
+608 }
+609
+610 @Test
+611 public void testRightCurlyRecordsAndCompactCtors() throws Exception {
+612 final String[] expected = {
+613 "23:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+614 "23:11: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 11),
+615 "27:21: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 21),
+616 "32:23: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 23),
+617 "34:37: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 37),
+618 "41:68: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 68),
+619 };
+620 verifyWithInlineConfigParser(
+621 getNonCompilablePath("InputRightCurlyTestRecordsAndCompactCtors.java" ), expected);
+622 }
+623
+624 @Test
+625 public void testRightCurlyWithEmoji() throws Exception {
+626 final String[] expected = {
+627 "24:13: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 13),
+628 "28:13: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 13),
+629 "49:9: " + getCheckMessage(MSG_KEY_LINE_SAME, "}" , 9),
+630 "69:50: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 50),
+631 "78:44: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 44),
+632 "84:41: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 41),
+633
+634 };
+635 verifyWithInlineConfigParser(getPath("InputRightCurlyWithEmoji.java" ), expected);
+636 }
+637
+638 @Test
+639 public void testRightCurlyWithEmojiAloneOrSingleLine() throws Exception {
+640 final String[] expected = {
+641 "24:38: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 38),
+642 "30:43: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 43),
+643 "40:45: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 45),
+644 "51:41: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 41),
+645 "54:31: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 31),
+646 };
+647 verifyWithInlineConfigParser(
+648 getPath("InputRightCurlyWithEmojiAloneOrSingleLine.java" ), expected);
+649 }
+650
+651 @Test
+652 public void testUppercaseOptionProperty() throws Exception {
+653 final String[] expected = {
+654 "16:46: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 46),
+655 "21:35: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 35),
+656 };
+657 verifyWithInlineConfigParser(
+658 getPath("InputRightCurlyWithUppercaseOptionProperty.java" ), expected);
+659 }
+660
+661 @Test
+662 public void testRightCurlyWithIfElseAlone() throws Exception {
+663 final String[] expected = {
+664 "19:12: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 12),
+665 "27:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+666 };
+667 verifyWithInlineConfigParser(
+668 getPath("InputRightCurlyTestIfElseAlone.java" ), expected);
+669 }
+670
+671 @Test
+672 public void testSwitchCase() throws Exception {
+673 final String[] expected = {
+674 "20:24: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 24),
+675 "27:27: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 27),
+676 "51:46: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 46),
+677 "69:68: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 68),
+678 "75:74: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 74),
+679 "112:17: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 17),
+680 "116:21: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 21),
+681 };
+682 verifyWithInlineConfigParser(
+683 getPath("InputRightCurlyTestSwitchCase.java" ), expected);
+684 }
+685
+686 @Test
+687 public void testSwitchCase2() throws Exception {
+688 final String[] expected = {
+689 "20:24: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 24),
+690 "27:27: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 27),
+691 "114:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+692 };
+693 verifyWithInlineConfigParser(
+694 getPath("InputRightCurlyTestSwitchCase2.java" ), expected);
+695 }
+696
+697 @Test
+698 public void testSwitchCase3() throws Exception {
+699 final String[] expected = {
+700 "15:22: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 22),
+701 "17:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+702 "19:36: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 36),
+703 "25:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+704 "26:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
+705 "28:22: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 22),
+706 "29:22: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 22),
+707 "37:26: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 26),
+708 "37:27: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 27),
+709 "43:40: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 40),
+710 "43:41: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 41),
+711 "48:46: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 46),
+712 "50:32: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 32),
+713 "50:33: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 33),
+714 "52:13: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 13),
+715 "52:14: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 14),
+716 };
+717 verifyWithInlineConfigParser(
+718 getPath("InputRightCurlyTestSwitchCase3.java" ), expected);
+719 }
+720
+721 @Test
+722 public void testSwitchCase4() throws Exception {
+723 final String[] expected = {
+724 "17:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+725 "19:36: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 36),
+726 "25:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+727 "26:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
+728 "28:22: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 22),
+729 "35:41: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 41),
+730 "35:42: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 42),
+731 "40:46: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 46),
+732 "42:32: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 32),
+733 };
+734 verifyWithInlineConfigParser(
+735 getPath("InputRightCurlyTestSwitchCase4.java" ), expected);
+736 }
+737
+738 @Test
+739 public void testSwitchCase5() throws Exception {
+740 final String[] expected = {
+741 "17:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+742 "19:36: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 36),
+743 "25:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+744 "26:37: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 37),
+745 "28:22: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 22),
+746 "35:41: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 41),
+747 "35:42: " + getCheckMessage(MSG_KEY_LINE_BREAK_BEFORE, "}" , 42),
+748 "40:46: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 46),
+749 "42:32: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 32),
+750 "65:49: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 49),
+751 };
+752 verifyWithInlineConfigParser(
+753 getPath("InputRightCurlyTestSwitchCase5.java" ), expected);
+754 }
+755
+756 @Test
+757 public void testSwitchExpression() throws Exception {
+758 final String[] expected = {
+759 "48:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+760 "56:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+761 "92:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+762 };
+763 verifyWithInlineConfigParser(
+764 getNonCompilablePath("InputRightCurlyTestSwitchExpression.java" ), expected);
+765 }
+766
+767 @Test
+768 public void testSwitchExpression2() throws Exception {
+769 final String[] expected = {
+770 "46:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+771 "54:5: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 5),
+772 "77:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+773 "90:9: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 9),
+774 };
+775 verifyWithInlineConfigParser(
+776 getNonCompilablePath("InputRightCurlyTestSwitchExpression2.java" ), expected);
+777 }
+778
+779 @Test
+780 public void testSwitchExpression3() throws Exception {
+781 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+782 verifyWithInlineConfigParser(
+783 getNonCompilablePath("InputRightCurlyTestSwitchExpression3.java" ), expected);
+784 }
+785
+786 @Test
+787 public void testSwitchExpression4() throws Exception {
+788 final String[] expected = {
+789 "117:28: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 28),
+790 };
+791 verifyWithInlineConfigParser(
+792 getNonCompilablePath("InputRightCurlyTestSwitchExpression4.java" ), expected);
+793 }
+794
+795 @Test
+796 public void testSwitchExpression5() throws Exception {
+797 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+798 verifyWithInlineConfigParser(
+799 getNonCompilablePath("InputRightCurlyTestSwitchExpression5.java" ), expected);
+800 }
+801
+802 @Test
+803 public void testSwitchWithComment() throws Exception {
+804 final String[] expected = {
+805 "16:66: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 66),
+806 "23:61: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 61),
+807 "24:57: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 57),
+808 "31:23: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 23),
+809 "32:19: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 19),
+810 "37:23: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 23),
+811 "38:33: " + getCheckMessage(MSG_KEY_LINE_ALONE, "}" , 33),
+812 };
+813 verifyWithInlineConfigParser(
+814 getPath("InputRightCurlyTestWithComment.java" ), expected);
+815 }
+816
+817 @Test
+818 public void testSwitchExpression6() throws Exception {
+819 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+820 verifyWithInlineConfigParser(
+821 getNonCompilablePath("InputRightCurlyTestSwitchExpression6.java" ), expected);
+822 }
+823
+824 @Test
+825 public void testSwitchExpression7() throws Exception {
+826 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+827 verifyWithInlineConfigParser(
+828 getNonCompilablePath("InputRightCurlyTestSwitchExpression7.java" ), expected);
+829 }
+830 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-frame.html
index 25e285f31b..8214f480d9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.avoidnestedblocks
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.avoidnestedblocks
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-summary.html
index a090181f19..565829ba09 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.avoidnestedblocks
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.avoidnestedblocks
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-frame.html
index 9be1b8a5ad..3583e4c51a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptyblock
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptyblock
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-summary.html
index b74e7fb292..45b4c020e6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptyblock
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptyblock
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -196,7 +196,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-frame.html
index b8650e1ed2..3b507b11e8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptycatchblock
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptycatchblock
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-summary.html
index 4a54a3fbe8..c30989de14 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptycatchblock
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptycatchblock
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -116,7 +116,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-frame.html
index 8d31cec5e6..a679837acf 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-summary.html
index d3c2d13ed3..32501ce72c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -846,7 +846,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-frame.html
index e503e44e6d..ee0858daba 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.needbraces
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.needbraces
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-summary.html
index d718cc9874..f794ad12a6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.needbraces
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.needbraces
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -221,7 +221,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-frame.html
index f65c75a3c7..1c126e20e0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-summary.html
index 388ebdd2bf..d0c09b988f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -136,7 +136,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestAloneOrSinglelineTryCatchBlock.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestAloneOrSinglelineTryCatchBlock.html
new file mode 100644
index 0000000000..2ae1bd72e4
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestAloneOrSinglelineTryCatchBlock.html
@@ -0,0 +1,43 @@
+
+
+
+InputRightCurlyTestAloneOrSinglelineTryCatchBlock xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checks.blocks.rightcurly;
+10
+11 import java.io.BufferedReader;
+12 import java.io.IOException;
+13
+14 public class InputRightCurlyTestAloneOrSinglelineTryCatchBlock {
+15
+16 private void foo() {
+17
+18 try {
+19 int i = 5; int b = 10;
+20 }
+21 catch (Exception e) { }
+22 }
+23 private void testSingleLineTryBlock() {
+24 try { } catch (Exception e) { }
+25 try {int x = 5;} catch (RuntimeException e) { } catch (Exception e) { }
+26 try { } catch (RuntimeException e) { } catch (Exception e) { } finally { foo();}
+27 try (BufferedReader br1 = new BufferedReader(null )) {} catch (IOException e) { ; }
+28 }
+29
+30 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTryWithResourceAloneSingle.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTryWithResourceAloneSingle.html
index deb4ec35e4..ebb31a2ee5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTryWithResourceAloneSingle.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTryWithResourceAloneSingle.html
@@ -40,20 +40,19 @@
32 BufferedReader br2 =
new BufferedReader(br1)) { ; }
33 catch (IOException e) { ; }
34 try (BufferedReader br1 =
new BufferedReader(
null );
-
35
-
36 BufferedReader br2 =
new BufferedReader(br1)) {}
catch (IOException e) { ; }
-
37 try (BufferedReader br1 =
new BufferedReader(
null );
-
38 BufferedReader br2 =
new BufferedReader(br1)) {
-
39 ;
-
40 }
-
41 try (BufferedReader br1 =
new BufferedReader(
null );
-
42 BufferedReader br2 =
new BufferedReader(br1)) { ; }
-
43 try (BufferedReader br1 =
new BufferedReader(
null )) {
-
44 ; }
-
45 try (BufferedReader br1 =
new BufferedReader(
null )) {
-
46 }
int i;
-
47 }
-
48 }
+
35 BufferedReader br2 =
new BufferedReader(br1)) {}
catch (IOException e) { ; }
+
36 try (BufferedReader br1 =
new BufferedReader(
null );
+
37 BufferedReader br2 =
new BufferedReader(br1)) {
+
38 ;
+
39 }
+
40 try (BufferedReader br1 =
new BufferedReader(
null );
+
41 BufferedReader br2 =
new BufferedReader(br1)) { ; }
+
42 try (BufferedReader br1 =
new BufferedReader(
null )) {
+
43 ; }
+
44 try (BufferedReader br1 =
new BufferedReader(
null )) {
+
45 }
int i;
+
46 }
+
47 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-frame.html
index fe8400fb5a..f851036e73 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.rightcurly
+
checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.rightcurly
@@ -338,6 +338,9 @@
Classes
InputRightCurlyTestAloneOrSingleline.TestAnnottation4
+
+
+ InputRightCurlyTestAloneOrSinglelineTryCatchBlock
InputRightCurlyTestDoubleBrace
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-summary.html
index a65e5a1abc..8d17a59291 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.rightcurly
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.rightcurly
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -603,660 +603,665 @@ Package com.puppycrawl.tools.checkstyle.checks
- InputRightCurlyTestDoubleBrace
+ InputRightCurlyTestAloneOrSinglelineTryCatchBlock
- InputRightCurlyTestEmptyOnSingleLine
+ InputRightCurlyTestDoubleBrace
- InputRightCurlyTestEndOfFile
+ InputRightCurlyTestEmptyOnSingleLine
- InputRightCurlyTestForceLineBreakBefore
+ InputRightCurlyTestEndOfFile
- InputRightCurlyTestForceLineBreakBefore2
+ InputRightCurlyTestForceLineBreakBefore
- InputRightCurlyTestIfElseAlone
+ InputRightCurlyTestForceLineBreakBefore2
- InputRightCurlyTestInvalidOption
+ InputRightCurlyTestIfElseAlone
- InputRightCurlyTestIsAloneLambda
+ InputRightCurlyTestInvalidOption
- InputRightCurlyTestIsAloneOrSinglelineLambda
+ InputRightCurlyTestIsAloneLambda
- InputRightCurlyTestIsSameLambda
+ InputRightCurlyTestIsAloneOrSinglelineLambda
- InputRightCurlyTestNewTokensAlone
+ InputRightCurlyTestIsSameLambda
- InputRightCurlyTestNewTokensAlone.TestEnum
+ InputRightCurlyTestNewTokensAlone
- InputRightCurlyTestNewTokensAlone.TestEnum1
+ InputRightCurlyTestNewTokensAlone.TestEnum
- InputRightCurlyTestNewTokensAlone.TestEnum2
+ InputRightCurlyTestNewTokensAlone.TestEnum1
- InputRightCurlyTestNewTokensAlone.TestEnum3
+ InputRightCurlyTestNewTokensAlone.TestEnum2
- InputRightCurlyTestNewTokensAlone.TestEnum4
+ InputRightCurlyTestNewTokensAlone.TestEnum3
- InputRightCurlyTestNullPointerException
+ InputRightCurlyTestNewTokensAlone.TestEnum4
- InputRightCurlyTestOptAloneBlocksWithSemi
+ InputRightCurlyTestNullPointerException
- InputRightCurlyTestOptAloneBlocksWithSemi.Interface1
+ InputRightCurlyTestOptAloneBlocksWithSemi
- InputRightCurlyTestOptAloneBlocksWithSemi.Interface3
+ InputRightCurlyTestOptAloneBlocksWithSemi.Interface1
- InputRightCurlyTestOptAloneBlocksWithSemi.Interface3.Interface4
+ InputRightCurlyTestOptAloneBlocksWithSemi.Interface3
- InputRightCurlyTestOptAloneBlocksWithSemi.InterfaceEndingWithSemiColon2
+ InputRightCurlyTestOptAloneBlocksWithSemi.Interface3.Interface4
- InputRightCurlyTestOptAloneBlocksWithSemi.TestAnnnotation5
+ InputRightCurlyTestOptAloneBlocksWithSemi.InterfaceEndingWithSemiColon2
- InputRightCurlyTestOptAloneBlocksWithSemi.TestAnnotation6
+ InputRightCurlyTestOptAloneBlocksWithSemi.TestAnnnotation5
- InputRightCurlyTestOptAloneBlocksWithSemi.TestAnnotation7
+ InputRightCurlyTestOptAloneBlocksWithSemi.TestAnnotation6
- InputRightCurlyTestOptAloneBlocksWithSemi.TestAnnotation8
+ InputRightCurlyTestOptAloneBlocksWithSemi.TestAnnotation7
- InputRightCurlyTestOptAloneBlocksWithSemi.TestAnnotation9
+ InputRightCurlyTestOptAloneBlocksWithSemi.TestAnnotation8
- InputRightCurlyTestOptAloneBlocksWithSemi.TestClass
+ InputRightCurlyTestOptAloneBlocksWithSemi.TestAnnotation9
- InputRightCurlyTestOptAloneBlocksWithSemi.TestClass1
+ InputRightCurlyTestOptAloneBlocksWithSemi.TestClass
- InputRightCurlyTestOptAloneBlocksWithSemi.TestClass2
+ InputRightCurlyTestOptAloneBlocksWithSemi.TestClass1
- InputRightCurlyTestOptAloneBlocksWithSemi.TestEnum
+ InputRightCurlyTestOptAloneBlocksWithSemi.TestClass2
- InputRightCurlyTestOptAloneBlocksWithSemi.TestEnum1
+ InputRightCurlyTestOptAloneBlocksWithSemi.TestEnum
- InputRightCurlyTestOptAloneBlocksWithSemi.TestEnum2
+ InputRightCurlyTestOptAloneBlocksWithSemi.TestEnum1
- InputRightCurlyTestOptAloneBlocksWithSemi.TestEnum3
+ InputRightCurlyTestOptAloneBlocksWithSemi.TestEnum2
- InputRightCurlyTestOptAloneBlocksWithSemi.TestEnum4
+ InputRightCurlyTestOptAloneBlocksWithSemi.TestEnum3
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi
+ InputRightCurlyTestOptAloneBlocksWithSemi.TestEnum4
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.Interface1
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.Interface2
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.Interface1
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.Interface3
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.Interface2
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.Interface3.Interface4
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.Interface3
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.InterfaceEndingWithSemiColon2
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.Interface3.Interface4
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestAnnnotation5
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.InterfaceEndingWithSemiColon2
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestAnnotation6
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestAnnnotation5
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestAnnotation7
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestAnnotation6
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestAnnotation8
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestAnnotation7
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestAnnotation9
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestAnnotation8
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestClass
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestAnnotation9
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestClass1
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestClass
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestClass2
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestClass1
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestEnum
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestClass2
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestEnum1
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestEnum
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestEnum2
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestEnum1
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestEnum3
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestEnum2
- InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestEnum4
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestEnum3
- InputRightCurlyTestOptSameBlocksWithSemi
+ InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.TestEnum4
- InputRightCurlyTestOptSameBlocksWithSemi.Interface1
+ InputRightCurlyTestOptSameBlocksWithSemi
- InputRightCurlyTestOptSameBlocksWithSemi.Interface2
+ InputRightCurlyTestOptSameBlocksWithSemi.Interface1
- InputRightCurlyTestOptSameBlocksWithSemi.Interface3
+ InputRightCurlyTestOptSameBlocksWithSemi.Interface2
- InputRightCurlyTestOptSameBlocksWithSemi.Interface3.Interface4
+ InputRightCurlyTestOptSameBlocksWithSemi.Interface3
- InputRightCurlyTestOptSameBlocksWithSemi.InterfaceEndingWithSemiColon2
+ InputRightCurlyTestOptSameBlocksWithSemi.Interface3.Interface4
- InputRightCurlyTestOptSameBlocksWithSemi.TestAnnnotation5
+ InputRightCurlyTestOptSameBlocksWithSemi.InterfaceEndingWithSemiColon2
- InputRightCurlyTestOptSameBlocksWithSemi.TestAnnotation6
+ InputRightCurlyTestOptSameBlocksWithSemi.TestAnnnotation5
- InputRightCurlyTestOptSameBlocksWithSemi.TestAnnotation7
+ InputRightCurlyTestOptSameBlocksWithSemi.TestAnnotation6
- InputRightCurlyTestOptSameBlocksWithSemi.TestAnnotation8
+ InputRightCurlyTestOptSameBlocksWithSemi.TestAnnotation7
- InputRightCurlyTestOptSameBlocksWithSemi.TestAnnotation9
+ InputRightCurlyTestOptSameBlocksWithSemi.TestAnnotation8
- InputRightCurlyTestOptSameBlocksWithSemi.TestClass
+ InputRightCurlyTestOptSameBlocksWithSemi.TestAnnotation9
- InputRightCurlyTestOptSameBlocksWithSemi.TestClass1
+ InputRightCurlyTestOptSameBlocksWithSemi.TestClass
- InputRightCurlyTestOptSameBlocksWithSemi.TestClass2
+ InputRightCurlyTestOptSameBlocksWithSemi.TestClass1
- InputRightCurlyTestOptSameBlocksWithSemi.TestEnum
+ InputRightCurlyTestOptSameBlocksWithSemi.TestClass2
- InputRightCurlyTestOptSameBlocksWithSemi.TestEnum1
+ InputRightCurlyTestOptSameBlocksWithSemi.TestEnum
- InputRightCurlyTestOptSameBlocksWithSemi.TestEnum2
+ InputRightCurlyTestOptSameBlocksWithSemi.TestEnum1
- InputRightCurlyTestOptSameBlocksWithSemi.TestEnum3
+ InputRightCurlyTestOptSameBlocksWithSemi.TestEnum2
- InputRightCurlyTestOptSameBlocksWithSemi.TestEnum4
+ InputRightCurlyTestOptSameBlocksWithSemi.TestEnum3
- InputRightCurlyTestOptionAlone
+ InputRightCurlyTestOptSameBlocksWithSemi.TestEnum4
- InputRightCurlyTestOptionAloneOrSingleLine
+ InputRightCurlyTestOptionAlone
- InputRightCurlyTestOptionAloneOrSingleLine.Interface1
+ InputRightCurlyTestOptionAloneOrSingleLine
- InputRightCurlyTestOptionAloneOrSingleLine.Interface2
+ InputRightCurlyTestOptionAloneOrSingleLine.Interface1
- InputRightCurlyTestOptionAloneOrSingleLine.Interface3
+ InputRightCurlyTestOptionAloneOrSingleLine.Interface2
- InputRightCurlyTestOptionAloneOrSingleLine.Interface3.Interface4
+ InputRightCurlyTestOptionAloneOrSingleLine.Interface3
- InputRightCurlyTestOptionAloneOrSingleLine.TestClass4
+ InputRightCurlyTestOptionAloneOrSingleLine.Interface3.Interface4
- InputRightCurlyTestOptionAloneOrSingleLine.TestClass5
+ InputRightCurlyTestOptionAloneOrSingleLine.TestClass4
- InputRightCurlyTestSame
+ InputRightCurlyTestOptionAloneOrSingleLine.TestClass5
- InputRightCurlyTestSame.TestAnnotation
+ InputRightCurlyTestSame
- InputRightCurlyTestSame.TestAnnotation1
+ InputRightCurlyTestSame.TestAnnotation
- InputRightCurlyTestSame.TestAnnotation3
+ InputRightCurlyTestSame.TestAnnotation1
- InputRightCurlyTestSame.TestAnnotation4
+ InputRightCurlyTestSame.TestAnnotation3
- InputRightCurlyTestSame.TestClass
+ InputRightCurlyTestSame.TestAnnotation4
- InputRightCurlyTestSameAndLiteralDo
+ InputRightCurlyTestSame.TestClass
- InputRightCurlyTestSameNewTokens
+ InputRightCurlyTestSameAndLiteralDo
- InputRightCurlyTestSameNewTokens.TestEnum
+ InputRightCurlyTestSameNewTokens
- InputRightCurlyTestSameNewTokens.TestEnum1
+ InputRightCurlyTestSameNewTokens.TestEnum
- InputRightCurlyTestSameNewTokens.TestEnum2
+ InputRightCurlyTestSameNewTokens.TestEnum1
- InputRightCurlyTestSameNewTokens.TestEnum3
+ InputRightCurlyTestSameNewTokens.TestEnum2
- InputRightCurlyTestSameNewTokens.TestEnum4
+ InputRightCurlyTestSameNewTokens.TestEnum3
- InputRightCurlyTestSameOmitOneLiners
+ InputRightCurlyTestSameNewTokens.TestEnum4
- InputRightCurlyTestSingleLineClass
+ InputRightCurlyTestSameOmitOneLiners
- InputRightCurlyTestSinglelineIfBlocks
+ InputRightCurlyTestSingleLineClass
- InputRightCurlyTestSwitchCase
+ InputRightCurlyTestSinglelineIfBlocks
- InputRightCurlyTestSwitchCase2
+ InputRightCurlyTestSwitchCase
- InputRightCurlyTestSwitchCase3
+ InputRightCurlyTestSwitchCase2
- InputRightCurlyTestSwitchCase4
+ InputRightCurlyTestSwitchCase3
- InputRightCurlyTestSwitchCase5
+ InputRightCurlyTestSwitchCase4
- InputRightCurlyTestTryWithResourceAlone
+ InputRightCurlyTestSwitchCase5
- InputRightCurlyTestTryWithResourceSame
+ InputRightCurlyTestTryWithResourceAlone
- InputRightCurlyTestWithAnnotations
+ InputRightCurlyTestTryWithResourceSame
- InputRightCurlyTestWithAnnotations.A
+ InputRightCurlyTestWithAnnotations
- InputRightCurlyTestWithAnnotations.B
+ InputRightCurlyTestWithAnnotations.A
- InputRightCurlyTestWithAnnotations.TestAnnnotation5
+ InputRightCurlyTestWithAnnotations.B
- InputRightCurlyTestWithAnnotations.TestAnnotation
+ InputRightCurlyTestWithAnnotations.TestAnnnotation5
- InputRightCurlyTestWithAnnotations.TestAnnotation1
+ InputRightCurlyTestWithAnnotations.TestAnnotation
- InputRightCurlyTestWithAnnotations.TestAnnotation2
+ InputRightCurlyTestWithAnnotations.TestAnnotation1
- InputRightCurlyTestWithAnnotations.TestAnnotation3
+ InputRightCurlyTestWithAnnotations.TestAnnotation2
- InputRightCurlyTestWithAnnotations.TestAnnotation6
+ InputRightCurlyTestWithAnnotations.TestAnnotation3
- InputRightCurlyTestWithAnnotations.TestAnnotation7
+ InputRightCurlyTestWithAnnotations.TestAnnotation6
- InputRightCurlyTestWithAnnotations.TestAnnotation8
+ InputRightCurlyTestWithAnnotations.TestAnnotation7
- InputRightCurlyTestWithAnnotations.TestAnnotation9
+ InputRightCurlyTestWithAnnotations.TestAnnotation8
- InputRightCurlyTestWithAnnotations.TestAnnottation4
+ InputRightCurlyTestWithAnnotations.TestAnnotation9
- InputRightCurlyTestWithAnnotations.TestClass
+ InputRightCurlyTestWithAnnotations.TestAnnottation4
- InputRightCurlyTestWithAnnotations.TestClass1
+ InputRightCurlyTestWithAnnotations.TestClass
- InputRightCurlyTestWithAnnotations.TestClass2
+ InputRightCurlyTestWithAnnotations.TestClass1
- InputRightCurlyTestWithComment
+ InputRightCurlyTestWithAnnotations.TestClass2
- InputRightCurlyTestWithoutFinally
+ InputRightCurlyTestWithComment
- InputRightCurlyTryWithResourceAloneSingle
+ InputRightCurlyTestWithoutFinally
- InputRightCurlyWithEmoji
+ InputRightCurlyTryWithResourceAloneSingle
- InputRightCurlyWithEmoji.Interface3
+ InputRightCurlyWithEmoji
- InputRightCurlyWithEmoji.Interface3.Interface4
+ InputRightCurlyWithEmoji.Interface3
- InputRightCurlyWithEmojiAloneOrSingleLine
+ InputRightCurlyWithEmoji.Interface3.Interface4
- InputRightCurlyWithUppercaseOptionProperty
+ InputRightCurlyWithEmojiAloneOrSingleLine
- NoViolationOnInputRightCurlyTestSwitchCase5
+ InputRightCurlyWithUppercaseOptionProperty
- UniqEmptyClassTestInvalidOption
+ NoViolationOnInputRightCurlyTestSwitchCase5
- UniqEmptyClassTestSingleLineClass
+ UniqEmptyClassTestInvalidOption
+
+ UniqEmptyClassTestSingleLineClass
+
+
+
UniqEmptyClassTestWithoutFinally
@@ -1281,7 +1286,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.14.0 Reference
+ checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/AvoidNoArgumentSuperConstructorCallCheckExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/AvoidNoArgumentSuperConstructorCallCheckExamplesTest.html
index aca93fd322..4cb1615c81 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/AvoidNoArgumentSuperConstructorCallCheckExamplesTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/AvoidNoArgumentSuperConstructorCallCheckExamplesTest.html
@@ -27,12 +27,12 @@
19
20 package com.puppycrawl.tools.checkstyle.checks.coding;
21
-22 import org.junit.jupiter.api.Disabled;
-23 import org.junit.jupiter.api.Test;
-24
-25 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
-26
-27 @Disabled("until https://github.com/checkstyle/checkstyle/issues/13345" )
+22 import static com.puppycrawl.tools.checkstyle.checks.coding.AvoidNoArgumentSuperConstructorCallCheck.MSG_CTOR;
+23
+24 import org.junit.jupiter.api.Test;
+25
+26 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+27
28 public class AvoidNoArgumentSuperConstructorCallCheckExamplesTest
29 extends AbstractExamplesModuleTestSupport {
30 @Override
@@ -43,10 +43,10 @@
35 @Test
36 public void testExample1() throws Exception {
37 final String[] expected = {
-38
+38 "17:5: " + getCheckMessage(MSG_CTOR),
39 };
40
-41 verifyWithInlineConfigParser(getPath("Example1.txt" ), expected);
+41 verifyWithInlineConfigParser(getPath("Example1.java" ), expected);
42 }
43 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/IllegalTokenTextCheckTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/IllegalTokenTextCheckTest.html
index c6157c4ffd..efb885e996 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/IllegalTokenTextCheckTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/IllegalTokenTextCheckTest.html
@@ -50,46 +50,46 @@
42 }
43
44 @Test
-45 public void testCaseSensitive()
+45 public void testIllegalTokenTextCheckDefaultCaseSensitive()
46 throws Exception {
47 final String[] expected = {
48 "34:28: " + getCheckMessage(MSG_KEY, "a href" ),
49 };
50 verifyWithInlineConfigParser(
-51 getPath("InputIllegalTokenTextTokens.java" ), expected);
+51 getPath("InputIllegalTokenTextCheckDefaultCaseSensitive.java" ), expected);
52 }
53
54 @Test
-55 public void testCaseInSensitive()
+55 public void testIllegalTokenTextCheckCaseInSensitive()
56 throws Exception {
57 final String[] expected = {
58 "34:28: " + getCheckMessage(MSG_KEY, "a href" ),
59 "35:32: " + getCheckMessage(MSG_KEY, "a href" ),
60 };
61 verifyWithInlineConfigParser(
-62 getPath("InputIllegalTokenTextTokens2.java" ), expected);
+62 getPath("InputIllegalTokenTextCheckCaseInSensitive.java" ), expected);
63 }
64
65 @Test
-66 public void testCustomMessage()
+66 public void testIllegalTokenTextCheckCustomMessageInStringLiteral()
67 throws Exception {
68
69 final String[] expected = {
70 "34:28: " + "My custom message" ,
71 };
72 verifyWithInlineConfigParser(
-73 getPath("InputIllegalTokenTextTokens3.java" ), expected);
+73 getPath("InputIllegalTokenTextCheckCustomMessageInStringLiteral.java" ), expected);
74 }
75
76 @Test
-77 public void testNullCustomMessage()
+77 public void testIllegalTokenTextCheckNullMessageInStringLiteral()
78 throws Exception {
79
80 final String[] expected = {
81 "34:28: " + getCheckMessage(MSG_KEY, "a href" ),
82 };
83 verifyWithInlineConfigParser(
-84 getPath("InputIllegalTokenTextTokens4.java" ), expected);
+84 getPath("InputIllegalTokenTextCheckNullMessageInStringLiteral.java" ), expected);
85 }
86
87 @Test
@@ -140,7 +140,7 @@
132 }
133
134 @Test
-135 public void testCommentToken()
+135 public void testIllegalTokenTextCheckCommentToken()
136 throws Exception {
137
138 final String[] expected = {
@@ -148,7 +148,7 @@
140 "45:28: " + getCheckMessage(MSG_KEY, "a href" ),
141 };
142 verifyWithInlineConfigParser(
-143 getPath("InputIllegalTokenTextTokens5.java" ), expected);
+143 getPath("InputIllegalTokenTextCheckCommentToken.java" ), expected);
144 }
145
146 @Test
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/MissingCtorCheckTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/MissingCtorCheckTest.html
index cfcff12edb..290643e258 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/MissingCtorCheckTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/MissingCtorCheckTest.html
@@ -42,14 +42,14 @@
34 }
35
36 @Test
-37 public void testMissingSwitchDefault() throws Exception {
+37 public void testMissingCtorEmptyClass() throws Exception {
38
39 final String[] expected = {
40 "9:1: " + getCheckMessage(MSG_KEY),
41 };
42
43 verifyWithInlineConfigParser(
-44 getPath("InputMissingCtor.java" ),
+44 getPath("InputMissingCtorEmptyClass.java" ),
45 expected);
46 }
47
@@ -68,7 +68,7 @@
60 }
61
62 @Test
-63 public void testMissingCtorClassOnOneLine() throws Exception {
+63 public void testMissingCtorNestedClasses() throws Exception {
64
65 final String[] expected = {
66 "9:1: " + getCheckMessage(MSG_KEY),
@@ -77,7 +77,7 @@
69 };
70
71 verifyWithInlineConfigParser(
-72 getPath("InputMissingCtor2.java" ),
+72 getPath("InputMissingCtorNestedClasses.java" ),
73 expected);
74 }
75
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/NestedForDepthCheckTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/NestedForDepthCheckTest.html
index 1181b6502d..a6de9e3001 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/NestedForDepthCheckTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/NestedForDepthCheckTest.html
@@ -52,7 +52,7 @@
44
45
46 @Test
-47 public void testNestedTooDeep() throws Exception {
+47 public void testNestedForDepthCheckCustomMaxLevelTwo() throws Exception {
48
49 final String[] expected = {
50 "32:11: " + getCheckMessage(MSG_KEY, 3, 2),
@@ -61,7 +61,7 @@
53 };
54
55 verifyWithInlineConfigParser(
-56 getPath("InputNestedForDepth.java" ),
+56 getPath("InputNestedForDepthCheckCustomMaxLevelTwo.java" ),
57 expected);
58 }
59
@@ -76,12 +76,12 @@
68
69
70 @Test
-71 public void testNestedOk() throws Exception {
+71 public void testNestedForDepthCheckCustomMaxLevelFour() throws Exception {
72
73 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
74
75 verifyWithInlineConfigParser(
-76 getPath("InputNestedForDepth1.java" ),
+76 getPath("InputNestedForDepthCheckCustomMaxLevelFour.java" ),
77 expected);
78 }
79
@@ -100,13 +100,13 @@
92 }
93
94 @Test
-95 public void testNestedDefault() throws Exception {
+95 public void testNestedForDepthCheckDefaultMaxLevel() throws Exception {
96 final String[] expected = {
97 "27:9: " + getCheckMessage(MSG_KEY, 2, 1),
98 };
99
100 verifyWithInlineConfigParser(
-101 getPath("InputNestedForDepthDefault.java" ),
+101 getPath("InputNestedForDepthCheckDefaultMaxLevel.java" ),
102 expected);
103 }
104 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/VariableDeclarationUsageDistanceCheckTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/VariableDeclarationUsageDistanceCheckTest.html
index 4a9c5873cc..c14e2f534d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/VariableDeclarationUsageDistanceCheckTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/VariableDeclarationUsageDistanceCheckTest.html
@@ -176,216 +176,247 @@
168 "231:9: " + getCheckMessage(MSG_KEY, "t" , 5, 1),
169 "234:9: " + getCheckMessage(MSG_KEY, "c" , 3, 1),
170 "235:9: " + getCheckMessage(MSG_KEY, "d2" , 3, 1),
-171 "312:9: " + getCheckMessage(MSG_KEY, "wh" , 2, 1),
-172 "355:9: " + getCheckMessage(MSG_KEY, "green" , 2, 1),
-173 "356:9: " + getCheckMessage(MSG_KEY, "blue" , 3, 1),
-174 "379:9: " + getCheckMessage(MSG_KEY, "intervalMs" , 2, 1),
-175 "466:9: " + getCheckMessage(MSG_KEY, "aOpt" , 3, 1),
-176 "467:9: " + getCheckMessage(MSG_KEY, "bOpt" , 2, 1),
-177 "483:9: " + getCheckMessage(MSG_KEY, "l1" , 3, 1),
-178 "483:9: " + getCheckMessage(MSG_KEY, "l2" , 2, 1),
-179 "491:9: " + getCheckMessage(MSG_KEY, "myOption" , 7, 1),
-180 "503:9: " + getCheckMessage(MSG_KEY, "myOption" , 6, 1),
-181 "517:9: " + getCheckMessage(MSG_KEY, "files" , 2, 1),
-182 "552:13: " + getCheckMessage(MSG_KEY, "id" , 2, 1),
-183 "554:13: " + getCheckMessage(MSG_KEY, "parentId" , 4, 1),
-184 "990:9: " + getCheckMessage(MSG_KEY, "a" , 2, 1),
-185 "1036:9: " + getCheckMessage(MSG_KEY, "c" , 4, 1),
-186 "1066:9: " + getCheckMessage(MSG_KEY, "a" , 4, 1),
-187 };
-188 verifyWithInlineConfigParser(
-189 getPath("InputVariableDeclarationUsageDistanceScopes.java" ), expected);
-190 }
-191
-192 @Test
-193 public void testIgnoreFinalOption() throws Exception {
-194 final String[] expected = {
-195 "42:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 2, 1),
-196 "50:9: " + getCheckMessage(MSG_KEY_EXT, "temp" , 2, 1),
-197 "56:9: " + getCheckMessage(MSG_KEY_EXT, "temp" , 2, 1),
-198 "69:9: " + getCheckMessage(MSG_KEY_EXT, "count" , 2, 1),
-199 "83:9: " + getCheckMessage(MSG_KEY_EXT, "count" , 4, 1),
-200 "108:9: " + getCheckMessage(MSG_KEY_EXT, "arg" , 2, 1),
-201 "156:9: " + getCheckMessage(MSG_KEY_EXT, "m" , 3, 1),
-202 "157:9: " + getCheckMessage(MSG_KEY_EXT, "n" , 2, 1),
-203 "196:9: " + getCheckMessage(MSG_KEY_EXT, "result" , 2, 1),
-204 "231:9: " + getCheckMessage(MSG_KEY_EXT, "t" , 5, 1),
-205 "234:9: " + getCheckMessage(MSG_KEY_EXT, "c" , 3, 1),
-206 "235:9: " + getCheckMessage(MSG_KEY_EXT, "d2" , 3, 1),
-207 "272:9: " + getCheckMessage(MSG_KEY_EXT, "sel" , 2, 1),
-208 "273:9: " + getCheckMessage(MSG_KEY_EXT, "model" , 2, 1),
-209 "299:9: " + getCheckMessage(MSG_KEY_EXT, "sw" , 2, 1),
-210 "312:9: " + getCheckMessage(MSG_KEY_EXT, "wh" , 2, 1),
-211 "355:9: " + getCheckMessage(MSG_KEY_EXT, "green" , 2, 1),
-212 "356:9: " + getCheckMessage(MSG_KEY_EXT, "blue" , 3, 1),
-213 "466:9: " + getCheckMessage(MSG_KEY_EXT, "aOpt" , 3, 1),
-214 "467:9: " + getCheckMessage(MSG_KEY_EXT, "bOpt" , 2, 1),
-215 "483:9: " + getCheckMessage(MSG_KEY_EXT, "l1" , 3, 1),
-216 "483:9: " + getCheckMessage(MSG_KEY_EXT, "l2" , 2, 1),
-217 "491:9: " + getCheckMessage(MSG_KEY_EXT, "myOption" , 7, 1),
-218 "503:9: " + getCheckMessage(MSG_KEY_EXT, "myOption" , 6, 1),
-219 "516:9: " + getCheckMessage(MSG_KEY_EXT, "count" , 4, 1),
-220 "517:9: " + getCheckMessage(MSG_KEY_EXT, "files" , 2, 1),
-221 "552:13: " + getCheckMessage(MSG_KEY_EXT, "id" , 2, 1),
-222 "554:13: " + getCheckMessage(MSG_KEY_EXT, "parentId" , 3, 1),
-223 "903:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 4, 1),
-224 "913:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 4, 1),
-225 "979:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 4, 1),
-226 "1001:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 3, 1),
-227 "1036:9: " + getCheckMessage(MSG_KEY_EXT, "c" , 3, 1),
-228 "1066:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 4, 1),
-229 };
-230 verifyWithInlineConfigParser(
-231 getPath("InputVariableDeclarationUsageDistanceFinal.java" ), expected);
-232 }
-233
-234 @Test
-235 public void testTokensNotNull() {
-236 final VariableDeclarationUsageDistanceCheck check =
-237 new VariableDeclarationUsageDistanceCheck();
-238 assertWithMessage("Acceptable tokens should not be null" )
-239 .that(check.getAcceptableTokens())
-240 .isNotNull();
-241 assertWithMessage("Default tokens should not be null" )
-242 .that(check.getDefaultTokens())
-243 .isNotNull();
-244 assertWithMessage("Required tokens should not be null" )
-245 .that(check.getRequiredTokens())
-246 .isNotNull();
-247 }
-248
-249 @Test
-250 public void testDefaultConfiguration() throws Exception {
-251 final String[] expected = {
-252 "83:9: " + getCheckMessage(MSG_KEY_EXT, "count" , 4, 3),
-253 "231:9: " + getCheckMessage(MSG_KEY_EXT, "t" , 5, 3),
-254 "491:9: " + getCheckMessage(MSG_KEY_EXT, "myOption" , 7, 3),
-255 "503:9: " + getCheckMessage(MSG_KEY_EXT, "myOption" , 6, 3),
-256 "554:13: " + getCheckMessage(MSG_KEY_EXT, "parentId" , 4, 3),
-257 "1036:9: " + getCheckMessage(MSG_KEY_EXT, "c" , 4, 3),
-258 "1066:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 4, 3),
-259 };
+171 "272:9: " + getCheckMessage(MSG_KEY, "sel" , 2, 1),
+172 "273:9: " + getCheckMessage(MSG_KEY, "model" , 2, 1),
+173 "312:9: " + getCheckMessage(MSG_KEY, "wh" , 2, 1),
+174 "355:9: " + getCheckMessage(MSG_KEY, "green" , 2, 1),
+175 "356:9: " + getCheckMessage(MSG_KEY, "blue" , 3, 1),
+176 "379:9: " + getCheckMessage(MSG_KEY, "intervalMs" , 2, 1),
+177 "466:9: " + getCheckMessage(MSG_KEY, "aOpt" , 3, 1),
+178 "467:9: " + getCheckMessage(MSG_KEY, "bOpt" , 2, 1),
+179 "483:9: " + getCheckMessage(MSG_KEY, "l1" , 3, 1),
+180 "483:9: " + getCheckMessage(MSG_KEY, "l2" , 2, 1),
+181 "491:9: " + getCheckMessage(MSG_KEY, "myOption" , 7, 1),
+182 "503:9: " + getCheckMessage(MSG_KEY, "myOption" , 6, 1),
+183 "516:9: " + getCheckMessage(MSG_KEY, "count" , 4, 1),
+184 "517:9: " + getCheckMessage(MSG_KEY, "files" , 2, 1),
+185 "552:13: " + getCheckMessage(MSG_KEY, "id" , 2, 1),
+186 "554:13: " + getCheckMessage(MSG_KEY, "parentId" , 4, 1),
+187 "855:9: " + getCheckMessage(MSG_KEY, "a" , 5, 1),
+188 "867:9: " + getCheckMessage(MSG_KEY, "a" , 5, 1),
+189 "879:9: " + getCheckMessage(MSG_KEY, "a" , 5, 1),
+190 "891:9: " + getCheckMessage(MSG_KEY, "a" , 5, 1),
+191 "903:9: " + getCheckMessage(MSG_KEY, "a" , 5, 1),
+192 "913:9: " + getCheckMessage(MSG_KEY, "a" , 5, 1),
+193 "924:9: " + getCheckMessage(MSG_KEY, "a" , 2, 1),
+194 "945:9: " + getCheckMessage(MSG_KEY, "a" , 5, 1),
+195 "990:9: " + getCheckMessage(MSG_KEY, "a" , 2, 1),
+196 "1001:9: " + getCheckMessage(MSG_KEY, "a" , 4, 1),
+197 "1036:9: " + getCheckMessage(MSG_KEY, "c" , 4, 1),
+198 "1066:9: " + getCheckMessage(MSG_KEY, "a" , 4, 1),
+199 };
+200 verifyWithInlineConfigParser(
+201 getPath("InputVariableDeclarationUsageDistanceScopes.java" ), expected);
+202 }
+203
+204 @Test
+205 public void testIgnoreFinalOption() throws Exception {
+206 final String[] expected = {
+207 "42:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 2, 1),
+208 "50:9: " + getCheckMessage(MSG_KEY_EXT, "temp" , 2, 1),
+209 "56:9: " + getCheckMessage(MSG_KEY_EXT, "temp" , 2, 1),
+210 "69:9: " + getCheckMessage(MSG_KEY_EXT, "count" , 2, 1),
+211 "83:9: " + getCheckMessage(MSG_KEY_EXT, "count" , 4, 1),
+212 "108:9: " + getCheckMessage(MSG_KEY_EXT, "arg" , 2, 1),
+213 "156:9: " + getCheckMessage(MSG_KEY_EXT, "m" , 3, 1),
+214 "157:9: " + getCheckMessage(MSG_KEY_EXT, "n" , 2, 1),
+215 "196:9: " + getCheckMessage(MSG_KEY_EXT, "result" , 2, 1),
+216 "231:9: " + getCheckMessage(MSG_KEY_EXT, "t" , 5, 1),
+217 "234:9: " + getCheckMessage(MSG_KEY_EXT, "c" , 3, 1),
+218 "235:9: " + getCheckMessage(MSG_KEY_EXT, "d2" , 3, 1),
+219 "272:9: " + getCheckMessage(MSG_KEY_EXT, "sel" , 2, 1),
+220 "273:9: " + getCheckMessage(MSG_KEY_EXT, "model" , 2, 1),
+221 "299:9: " + getCheckMessage(MSG_KEY_EXT, "sw" , 2, 1),
+222 "312:9: " + getCheckMessage(MSG_KEY_EXT, "wh" , 2, 1),
+223 "355:9: " + getCheckMessage(MSG_KEY_EXT, "green" , 2, 1),
+224 "356:9: " + getCheckMessage(MSG_KEY_EXT, "blue" , 3, 1),
+225 "466:9: " + getCheckMessage(MSG_KEY_EXT, "aOpt" , 3, 1),
+226 "467:9: " + getCheckMessage(MSG_KEY_EXT, "bOpt" , 2, 1),
+227 "483:9: " + getCheckMessage(MSG_KEY_EXT, "l1" , 3, 1),
+228 "483:9: " + getCheckMessage(MSG_KEY_EXT, "l2" , 2, 1),
+229 "491:9: " + getCheckMessage(MSG_KEY_EXT, "myOption" , 7, 1),
+230 "503:9: " + getCheckMessage(MSG_KEY_EXT, "myOption" , 6, 1),
+231 "516:9: " + getCheckMessage(MSG_KEY_EXT, "count" , 4, 1),
+232 "517:9: " + getCheckMessage(MSG_KEY_EXT, "files" , 2, 1),
+233 "552:13: " + getCheckMessage(MSG_KEY_EXT, "id" , 2, 1),
+234 "554:13: " + getCheckMessage(MSG_KEY_EXT, "parentId" , 3, 1),
+235 "903:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 4, 1),
+236 "913:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 4, 1),
+237 "979:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 4, 1),
+238 "1001:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 3, 1),
+239 "1036:9: " + getCheckMessage(MSG_KEY_EXT, "c" , 3, 1),
+240 "1066:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 4, 1),
+241 };
+242 verifyWithInlineConfigParser(
+243 getPath("InputVariableDeclarationUsageDistanceFinal.java" ), expected);
+244 }
+245
+246 @Test
+247 public void testTokensNotNull() {
+248 final VariableDeclarationUsageDistanceCheck check =
+249 new VariableDeclarationUsageDistanceCheck();
+250 assertWithMessage("Acceptable tokens should not be null" )
+251 .that(check.getAcceptableTokens())
+252 .isNotNull();
+253 assertWithMessage("Default tokens should not be null" )
+254 .that(check.getDefaultTokens())
+255 .isNotNull();
+256 assertWithMessage("Required tokens should not be null" )
+257 .that(check.getRequiredTokens())
+258 .isNotNull();
+259 }
260
-261 verifyWithInlineConfigParser(
-262 getPath("InputVariableDeclarationUsageDistanceDefault.java" ), expected);
-263 }
-264
-265 @Test
-266 public void testDefaultConfiguration2() throws Exception {
-267 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-268
-269 verifyWithInlineConfigParser(
-270 getPath("InputVariableDeclarationUsageDistanceDefault2.java" ), expected);
-271 }
-272
-273 @Test
-274 public void testAnonymousClass() throws Exception {
-275 final String[] expected = {
-276 "19:9: " + getCheckMessage(MSG_KEY_EXT, "prefs" , 4, 3),
-277 };
-278
-279 verifyWithInlineConfigParser(
-280 getPath("InputVariableDeclarationUsageDistanceAnonymous.java" ),
-281 expected);
-282 }
-283
-284 @Test
-285 public void testLabels() throws Exception {
-286 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-287
-288 verifyWithInlineConfigParser(
-289 getPath("InputVariableDeclarationUsageDistanceLabels.java" ), expected);
-290 }
-291
-292 @Test
-293 public void testVariableDeclarationUsageDistanceSwitchExpressions() throws Exception {
-294
-295 final int maxDistance = 1;
-296 final String[] expected = {
-297 "35:17: " + getCheckMessage(MSG_KEY, "arg" , 2, maxDistance),
-298 "80:17: " + getCheckMessage(MSG_KEY, "m" , 3, maxDistance),
-299 "81:17: " + getCheckMessage(MSG_KEY, "n" , 2, maxDistance),
-300 "113:17: " + getCheckMessage(MSG_KEY, "arg" , 2, maxDistance),
-301 "155:17: " + getCheckMessage(MSG_KEY, "m" , 3, maxDistance),
-302 "156:17: " + getCheckMessage(MSG_KEY, "n" , 2, maxDistance),
-303 "177:17: " + getCheckMessage(MSG_KEY, "count" , 3, maxDistance),
-304 "197:17: " + getCheckMessage(MSG_KEY, "count" , 3, maxDistance),
-305 };
-306
-307 final String filename = "InputVariableDeclarationUsageDistanceCheckSwitchExpressions.java" ;
-308 verifyWithInlineConfigParser(getNonCompilablePath(filename), expected);
-309 }
-310
-311 @Test
-312 public void testVariableDeclarationUsageDistanceSwitchExpressions2() throws Exception {
-313 final int maxDistance = 1;
-314 final String[] expected = {
-315 "16:9: " + getCheckMessage(MSG_KEY, "i" , 2, maxDistance),
-316 };
-317
-318 final String filename = "InputVariableDeclarationUsageDistanceCheckSwitchExpressions2.java" ;
-319 verifyWithInlineConfigParser(getNonCompilablePath(filename), expected);
-320 }
-321
-322 @Test
-323 public void testGeneralClass3() throws Exception {
-324 final String[] expected = {
-325 "46:9: " + getCheckMessage(MSG_KEY, "a" , 2, 1),
+261 @Test
+262 public void testDefaultConfiguration() throws Exception {
+263 final String[] expected = {
+264 "83:9: " + getCheckMessage(MSG_KEY_EXT, "count" , 4, 3),
+265 "231:9: " + getCheckMessage(MSG_KEY_EXT, "t" , 5, 3),
+266 "491:9: " + getCheckMessage(MSG_KEY_EXT, "myOption" , 7, 3),
+267 "503:9: " + getCheckMessage(MSG_KEY_EXT, "myOption" , 6, 3),
+268 "516:9: " + getCheckMessage(MSG_KEY_EXT, "count" , 4, 3),
+269 "554:13: " + getCheckMessage(MSG_KEY_EXT, "parentId" , 4, 3),
+270 "855:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 5, 3),
+271 "867:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 5, 3),
+272 "879:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 5, 3),
+273 "891:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 5, 3),
+274 "903:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 5, 3),
+275 "913:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 5, 3),
+276 "945:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 5, 3),
+277 "1036:9: " + getCheckMessage(MSG_KEY_EXT, "c" , 4, 3),
+278 "1001:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 4, 3),
+279 "1066:9: " + getCheckMessage(MSG_KEY_EXT, "a" , 4, 3),
+280 };
+281 verifyWithInlineConfigParser(
+282 getPath("InputVariableDeclarationUsageDistanceDefault.java" ), expected);
+283 }
+284
+285 @Test
+286 public void testDefaultConfiguration2() throws Exception {
+287 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+288
+289 verifyWithInlineConfigParser(
+290 getPath("InputVariableDeclarationUsageDistanceDefault2.java" ), expected);
+291 }
+292
+293 @Test
+294 public void testAnonymousClass() throws Exception {
+295 final String[] expected = {
+296 "19:9: " + getCheckMessage(MSG_KEY_EXT, "prefs" , 4, 3),
+297 };
+298
+299 verifyWithInlineConfigParser(
+300 getPath("InputVariableDeclarationUsageDistanceAnonymous.java" ),
+301 expected);
+302 }
+303
+304 @Test
+305 public void testLabels() throws Exception {
+306 final String[] expected = {
+307 "15:9: " + getCheckMessage(MSG_KEY_EXT, "eol" , 5, 3),
+308 };
+309 verifyWithInlineConfigParser(
+310 getPath("InputVariableDeclarationUsageDistanceLabels.java" ), expected);
+311 }
+312
+313 @Test
+314 public void testVariableDeclarationUsageDistanceSwitchExpressions() throws Exception {
+315
+316 final int maxDistance = 1;
+317 final String[] expected = {
+318 "35:17: " + getCheckMessage(MSG_KEY, "arg" , 2, maxDistance),
+319 "80:17: " + getCheckMessage(MSG_KEY, "m" , 3, maxDistance),
+320 "81:17: " + getCheckMessage(MSG_KEY, "n" , 2, maxDistance),
+321 "113:17: " + getCheckMessage(MSG_KEY, "arg" , 2, maxDistance),
+322 "155:17: " + getCheckMessage(MSG_KEY, "m" , 3, maxDistance),
+323 "156:17: " + getCheckMessage(MSG_KEY, "n" , 2, maxDistance),
+324 "177:17: " + getCheckMessage(MSG_KEY, "count" , 3, maxDistance),
+325 "197:17: " + getCheckMessage(MSG_KEY, "count" , 3, maxDistance),
326 };
327
-328 verifyWithInlineConfigParser(
-329 getPath("InputVariableDeclarationUsageDistanceGeneral3.java" ), expected);
+328 final String filename = "InputVariableDeclarationUsageDistanceCheckSwitchExpressions.java" ;
+329 verifyWithInlineConfigParser(getNonCompilablePath(filename), expected);
330 }
331
332 @Test
-333 public void testGeneralClass4() throws Exception {
-334 final String[] expected = {
-335 "26:9: " + getCheckMessage(MSG_KEY, "z" , 3, 1),
-336 };
-337
-338 verifyWithInlineConfigParser(
-339 getPath("InputVariableDeclarationUsageDistanceGeneral4.java" ), expected);
-340 }
-341
-342 @Test
-343 public void testVariableDeclarationUsageDistanceTryResources() throws Exception {
-344 final String[] expected = {
-345 "19:9: " + getCheckMessage(MSG_KEY, "a" , 2, 1),
-346 "20:9: " + getCheckMessage(MSG_KEY, "b" , 2, 1),
+333 public void testVariableDeclarationUsageDistanceSwitchExpressions2() throws Exception {
+334 final int maxDistance = 1;
+335 final String[] expected = {
+336 "16:9: " + getCheckMessage(MSG_KEY, "i" , 2, maxDistance),
+337 };
+338
+339 final String filename = "InputVariableDeclarationUsageDistanceCheckSwitchExpressions2.java" ;
+340 verifyWithInlineConfigParser(getNonCompilablePath(filename), expected);
+341 }
+342
+343 @Test
+344 public void testGeneralClass3() throws Exception {
+345 final String[] expected = {
+346 "46:9: " + getCheckMessage(MSG_KEY, "a" , 2, 1),
347 };
348
349 verifyWithInlineConfigParser(
-350 getPath("InputVariableDeclarationUsageDistanceTryResources.java" ), expected);
+350 getPath("InputVariableDeclarationUsageDistanceGeneral3.java" ), expected);
351 }
352
353 @Test
-354 public void testVariableDeclarationUsageDistance4() throws Exception {
-355 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-356
-357 verifyWithInlineConfigParser(
-358 getPath("InputVariableDeclarationUsageDistance3.java" ), expected);
-359 }
-360
-361 @Test
-362 public void testVariableDeclarationUsageDistanceScope2() throws Exception {
-363 final String[] expected = {
-364 "16:9: " + getCheckMessage(MSG_KEY, "i" , 5, 1),
-365 };
-366
-367 verifyWithInlineConfigParser(
-368 getPath("InputVariableDeclarationUsageDistanceScope2.java" ), expected);
-369 }
-370
-371 @Test
-372 public void testVariableDeclarationUsageDistance1() throws Exception {
-373 final String[] expected = {
-374 "15:9: " + getCheckMessage(MSG_KEY, "i" , 2, 1),
-375 };
-376
-377 verifyWithInlineConfigParser(
-378 getPath("InputVariableDeclarationUsageDistance1.java" ), expected);
-379 }
-380 }
+354 public void testGeneralClass4() throws Exception {
+355 final String[] expected = {
+356 "26:9: " + getCheckMessage(MSG_KEY, "z" , 3, 1),
+357 };
+358
+359 verifyWithInlineConfigParser(
+360 getPath("InputVariableDeclarationUsageDistanceGeneral4.java" ), expected);
+361 }
+362
+363 @Test
+364 public void testVariableDeclarationUsageDistanceTryResources() throws Exception {
+365 final String[] expected = {
+366 "19:9: " + getCheckMessage(MSG_KEY, "a" , 2, 1),
+367 "20:9: " + getCheckMessage(MSG_KEY, "b" , 2, 1),
+368 };
+369
+370 verifyWithInlineConfigParser(
+371 getPath("InputVariableDeclarationUsageDistanceTryResources.java" ), expected);
+372 }
+373
+374 @Test
+375 public void testVariableDeclarationUsageDistance4() throws Exception {
+376 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+377
+378 verifyWithInlineConfigParser(
+379 getPath("InputVariableDeclarationUsageDistance3.java" ), expected);
+380 }
+381
+382 @Test
+383 public void testVariableDeclarationUsageDistanceScope2() throws Exception {
+384 final String[] expected = {
+385 "16:9: " + getCheckMessage(MSG_KEY, "i" , 5, 1),
+386 };
+387
+388 verifyWithInlineConfigParser(
+389 getPath("InputVariableDeclarationUsageDistanceScope2.java" ), expected);
+390 }
+391
+392 @Test
+393 public void testVariableDeclarationUsageDistance1() throws Exception {
+394 final String[] expected = {
+395 "15:9: " + getCheckMessage(MSG_KEY, "i" , 2, 1),
+396 };
+397
+398 verifyWithInlineConfigParser(
+399 getPath("InputVariableDeclarationUsageDistance1.java" ), expected);
+400 }
+401
+402 @Test
+403 public void testVariableDeclarationUsageDistanceCloseToBlock() throws Exception {
+404 final String[] expected = {
+405 "15:9: " + getCheckMessage(MSG_KEY, "a" , 13, 1),
+406 "16:9: " + getCheckMessage(MSG_KEY, "b" , 13, 1),
+407 };
+408 verifyWithInlineConfigParser(
+409 getPath("InputVariableDeclarationUsageDistanceCloseToBlock.java" ), expected);
+410 }
+411 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-frame.html
index 784afb0dec..73056c7541 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.arraytrailingcomma
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.arraytrailingcomma
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-summary.html
index 521bd3c0ce..966ed0e7c1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.arraytrailingcomma
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.arraytrailingcomma
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-frame.html
index ed3dbcb6cd..a2ec4a11cf 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoiddoublebraceinitialization
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoiddoublebraceinitialization
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-summary.html
index 44cf658886..c5310ba9c3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoiddoublebraceinitialization
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoiddoublebraceinitialization
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/Example1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/Example1.html
new file mode 100644
index 0000000000..8940bd09f6
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/Example1.html
@@ -0,0 +1,41 @@
+
+
+
+Example1 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8 package com.puppycrawl.tools.checkstyle.checks.coding.avoidnoargumentsuperconstructorcall;
+9
+10
+11 class SuperClass {
+12 public SuperClass () {}
+13 public SuperClass (int arg) {}
+14 }
+15 class Example1 extends SuperClass {
+16 Example1 () {
+17 super ();
+18 }
+19
+20 Example1 (int arg) {
+21 super (arg);
+22 }
+23
+24 Example1 (long arg) {
+25
+26 }
+27 }
+28
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-frame.html
index 3c0b9e9302..2ddae95c5e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoidnoargumentsuperconstructorcall
+
checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoidnoargumentsuperconstructorcall
@@ -14,6 +14,9 @@
Classes
Derived
+
+
+ Example1
InputAvoidNoArgumentSuperConstructorCall
@@ -23,6 +26,9 @@ Classes
Outer.InnerNonStatic
+
+
+ SuperClass
WithTypeArgs
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-summary.html
index 694c252bd7..8ee76e29c9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoidnoargumentsuperconstructorcall
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoidnoargumentsuperconstructorcall
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -63,18 +63,28 @@ Package com.puppycrawl.tools.checkstyle.checks
- InputAvoidNoArgumentSuperConstructorCall
+ Example1
- Outer
+ InputAvoidNoArgumentSuperConstructorCall
+
+ Outer
+
+
+
Outer.InnerNonStatic
+
+
+
+ SuperClass
+
@@ -101,7 +111,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.14.0 Reference
+ checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-frame.html
index b3b2379f53..4ea73ea57b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.covariantequals
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.covariantequals
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-summary.html
index 056f8de4c7..07d969259c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.covariantequals
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.covariantequals
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -136,7 +136,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-frame.html
index fa5d91e19b..67ba341fd7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.declarationorder
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.declarationorder
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-summary.html
index 599a084457..8047904fb1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.declarationorder
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.declarationorder
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -191,7 +191,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-frame.html
index 0b71c26cc8..07122652cc 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.defaultcomeslast
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.defaultcomeslast
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-summary.html
index e825dc69ac..54a160b9e2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.defaultcomeslast
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.defaultcomeslast
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-frame.html
index 14a717088c..8187e9f391 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.emptystatement
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.emptystatement
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-summary.html
index e8c8572834..3d34708d9d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.emptystatement
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.emptystatement
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-frame.html
index 070d8b4c97..5e8c2478f1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalsavoidnull
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalsavoidnull
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-summary.html
index 54684cf0f9..ae9e84b7dd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalsavoidnull
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalsavoidnull
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -266,7 +266,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-frame.html
index 07db1a666a..4a5267a247 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalshashcode
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalshashcode
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-summary.html
index 285929a798..8dfd829d04 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalshashcode
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalshashcode
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -221,7 +221,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-frame.html
index c4ee8f6dc6..3c91e8cfc3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.explicitinitialization
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.explicitinitialization
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-summary.html
index 7ffb4db211..f667a707bd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.explicitinitialization
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.explicitinitialization
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -166,7 +166,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-frame.html
index cc2d36ebbc..783a43611d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.fallthrough
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.fallthrough
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-summary.html
index 592a02774d..329c30f42c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.fallthrough
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.fallthrough
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -216,7 +216,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-frame.html
index 8fe7bccd78..b84d7f9d42 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.finallocalvariable
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.finallocalvariable
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-summary.html
index e96cbe8dd2..96dc994fa3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.finallocalvariable
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.finallocalvariable
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -486,7 +486,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-frame.html
index f9351b2c02..cec5217e00 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.hiddenfield
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.hiddenfield
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-summary.html
index ad10bf044d..7fc111fe12 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.hiddenfield
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.hiddenfield
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -851,7 +851,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-frame.html
index 97c4825c65..7ce91d8db4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalcatch
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalcatch
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-summary.html
index 6ceda3c2cb..d9103147ee 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalcatch
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalcatch
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-frame.html
index 07f3238702..be7cf9395b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalinstantiation
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalinstantiation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-summary.html
index 0b151ab946..6ccc02bdf0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalinstantiation
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalinstantiation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -211,7 +211,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-frame.html
index d01e8990ec..97bd40a01d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalthrows
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalthrows
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-summary.html
index df3d3576a9..6984c39b2c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalthrows
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalthrows
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-frame.html
index 3449e846a5..e5d81cd771 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltoken
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltoken
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-summary.html
index 1d9cf722c5..5db746fe1d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltoken
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltoken
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -111,7 +111,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckCaseInSensitive.html
similarity index 92%
rename from xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens2.html
rename to xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckCaseInSensitive.html
index 0b1cf7e6bf..d92509c07e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckCaseInSensitive.html
@@ -1,11 +1,11 @@
-InputIllegalTokenTextTokens2 xref
+InputIllegalTokenTextCheckCaseInSensitive xref
-
+
1
2
3
@@ -21,7 +21,7 @@
13
14
15
-16 public class InputIllegalTokenTextTokens2
+16 public class InputIllegalTokenTextCheckCaseInSensitive
17 {
18 public void methodWithPreviouslyIllegalTokens()
19 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens5.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckCommentToken.html
similarity index 93%
rename from xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens5.html
rename to xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckCommentToken.html
index be5652d579..4c6469b09f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens5.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckCommentToken.html
@@ -1,11 +1,11 @@
-InputIllegalTokenTextTokens5 xref
+InputIllegalTokenTextCheckCommentToken xref
-
+
1
2
3
@@ -21,7 +21,7 @@
13
14
15
-16 public class InputIllegalTokenTextTokens5
+16 public class InputIllegalTokenTextCheckCommentToken
17 {
18 public void methodWithPreviouslyIllegalTokens()
19 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckCustomMessageInStringLiteral.html
similarity index 91%
rename from xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens3.html
rename to xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckCustomMessageInStringLiteral.html
index 1ad37a39ba..412f0a6d32 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens3.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckCustomMessageInStringLiteral.html
@@ -1,11 +1,11 @@
-InputIllegalTokenTextTokens3 xref
+InputIllegalTokenTextCheckCustomMessageInStringLiteral xref
-
+
1
2
3
@@ -21,7 +21,7 @@
13
14
15
-16 public class InputIllegalTokenTextTokens3
+16 public class InputIllegalTokenTextCheckCustomMessageInStringLiteral
17 {
18 public void methodWithPreviouslyIllegalTokens()
19 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckDefaultCaseSensitive.html
similarity index 92%
rename from xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens.html
rename to xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckDefaultCaseSensitive.html
index bd76c47f5d..9bc15a5f95 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckDefaultCaseSensitive.html
@@ -1,11 +1,11 @@
-InputIllegalTokenTextTokens xref
+InputIllegalTokenTextCheckDefaultCaseSensitive xref
-
+
1
2
3
@@ -21,7 +21,7 @@
13
14
15
-16 public class InputIllegalTokenTextTokens
+16 public class InputIllegalTokenTextCheckDefaultCaseSensitive
17 {
18 public void methodWithPreviouslyIllegalTokens()
19 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens4.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckNullMessageInStringLiteral.html
similarity index 91%
rename from xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens4.html
rename to xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckNullMessageInStringLiteral.html
index 728c785c20..e3d87d32d1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextTokens4.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/InputIllegalTokenTextCheckNullMessageInStringLiteral.html
@@ -1,11 +1,11 @@
-InputIllegalTokenTextTokens4 xref
+InputIllegalTokenTextCheckNullMessageInStringLiteral xref
-
+
1
2
3
@@ -21,7 +21,7 @@
13
14
15
-16 public class InputIllegalTokenTextTokens4
+16 public class InputIllegalTokenTextCheckNullMessageInStringLiteral
17 {
18 public void methodWithPreviouslyIllegalTokens()
19 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-frame.html
index cf152b66c8..0ccca74970 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltokentext
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltokentext
@@ -22,22 +22,22 @@ Classes
Example4
- InputIllegalTokenTextDefaultFormat
+ InputIllegalTokenTextCheckCaseInSensitive
- InputIllegalTokenTextTokens
+ InputIllegalTokenTextCheckCommentToken
- InputIllegalTokenTextTokens2
+ InputIllegalTokenTextCheckCustomMessageInStringLiteral
- InputIllegalTokenTextTokens3
+ InputIllegalTokenTextCheckDefaultCaseSensitive
- InputIllegalTokenTextTokens4
+ InputIllegalTokenTextCheckNullMessageInStringLiteral
- InputIllegalTokenTextTokens5
+ InputIllegalTokenTextDefaultFormat
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-summary.html
index b9b845bf07..4792d6914a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltokentext
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltokentext
@@ -23,7 +23,7 @@
Index
Help
- checkstyle 10.14.0 Reference
+ checkstyle 10.14.1 Reference
@@ -73,32 +73,32 @@ Package com.puppycrawl.tools.checkstyle.checks
- InputIllegalTokenTextDefaultFormat
+ InputIllegalTokenTextCheckCaseInSensitive
- InputIllegalTokenTextTokens
+ InputIllegalTokenTextCheckCommentToken
- InputIllegalTokenTextTokens2
+ InputIllegalTokenTextCheckCustomMessageInStringLiteral
- InputIllegalTokenTextTokens3
+ InputIllegalTokenTextCheckDefaultCaseSensitive
- InputIllegalTokenTextTokens4
+ InputIllegalTokenTextCheckNullMessageInStringLiteral
- InputIllegalTokenTextTokens5
+ InputIllegalTokenTextDefaultFormat
@@ -121,7 +121,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-frame.html
index 94121dd818..b20a8edd0d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltype
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltype
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-summary.html
index 1ae5ff0289..3d03be4388 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltype
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltype
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -461,7 +461,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-frame.html
index 4de175ba19..070af7de98 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.innerassignment
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.innerassignment
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-summary.html
index 86ca0a325f..57ba5dabbf 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.innerassignment
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.innerassignment
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -121,7 +121,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-frame.html
index 0ddc44b19b..9251114537 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.magicnumber
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.magicnumber
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-summary.html
index 063012116b..ff05d38cd3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.magicnumber
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.magicnumber
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -576,7 +576,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-frame.html
index 6ece8f128f..1cdfb29aeb 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.matchxpath
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.matchxpath
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-summary.html
index d53ddd90d5..7bf00a49e3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.matchxpath
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.matchxpath
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
@@ -156,7 +156,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/InputMissingCtor.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/InputMissingCtorEmptyClass.html
similarity index 80%
rename from xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/InputMissingCtor.html
rename to xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/InputMissingCtorEmptyClass.html
index ba624a3da8..5711b946ad 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/InputMissingCtor.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/InputMissingCtorEmptyClass.html
@@ -1,11 +1,11 @@
-InputMissingCtor xref
+InputMissingCtorEmptyClass xref
-
+
1
2
3
@@ -14,16 +14,16 @@
6
7 package com.puppycrawl.tools.checkstyle.checks.coding.missingctor;
8
-9 public class InputMissingCtor
+9 public class InputMissingCtorEmptyClass
10 {
11 }
12
-13 abstract class AbstractClass {
+13 abstract class AbstractClass {
14 }
15
16
-17 class CorrectClass {
-18 CorrectClass () {
+17 class CorrectClass {
+18 CorrectClass () {
19 }
20 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/InputMissingCtor2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/InputMissingCtorNestedClasses.html
similarity index 83%
rename from xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/InputMissingCtor2.html
rename to xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/InputMissingCtorNestedClasses.html
index 4071c032d7..354d471ba3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/InputMissingCtor2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/InputMissingCtorNestedClasses.html
@@ -1,11 +1,11 @@
-InputMissingCtor2 xref
+InputMissingCtorNestedClasses xref
-
+
1
2
3
@@ -14,7 +14,7 @@
6
7 package com.puppycrawl.tools.checkstyle.checks.coding.missingctor;
8
-9 public class InputMissingCtor2 {
+9 public class InputMissingCtorNestedClasses {
10 class Inner1 {
11 class Inner2 {
12
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-frame.html
index d12fc611e3..f4fede7081 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.missingctor
+ checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.missingctor
@@ -13,22 +13,22 @@
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-summary.html
index 615b8c6682..ee1153ec7a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-summary.html
@@ -4,7 +4,7 @@
-
checkstyle 10.14.0 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.missingctor
+
checkstyle 10.14.1 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.missingctor
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.14.0 Reference
+
checkstyle 10.14.1 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedfordepth/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedfordepth/package-summary.html
index 776ffbc93b..ba1f17f191 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedfordepth/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedfordepth/package-summary.html
@@ -4,7 +4,7 @@