Package com.puppycrawl.tools.checkstyle.checks
- InputAnnotationOnSameLineCheck
+ Example1
- InputAnnotationOnSameLineCheck2
+ Example2
- InputAnnotationOnSameLineCheck3
+ Foo
- InputAnnotationOnSameLineCheckOnDifferentTokens
+ InputAnnotationOnSameLineCheck
- InputAnnotationOnSameLineCheckOnDifferentTokens.TestEnum
+ InputAnnotationOnSameLineCheck2
- SomeClass
+ InputAnnotationOnSameLineCheck3
- SomeClass.Annotation
+ InputAnnotationOnSameLineCheckOnDifferentTokens
- SomeClass2
+ InputAnnotationOnSameLineCheckOnDifferentTokens.TestEnum
+
+
+
+
+ SomeClass
+
+
+
+
+ SomeClass.Annotation
+
+ SomeClass2
+
+
+
SomeClass2.Annotation
+
+
+
+ Test1
+
@@ -151,7 +171,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/Example1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/Example1.html
new file mode 100644
index 0000000000..798a60d057
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/Example1.html
@@ -0,0 +1,46 @@
+
+
+
+Example1 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
+10
+11 @interface SomeArrays {
+12 String[] value() default {};
+13 }
+14
+15
+16 @SuppressWarnings("unchecked" )
+17 @Deprecated
+18 @SomeArrays({"unchecked" ,"unused" })
+19 public class Example1
+20 {
+21
+22 }
+23
+24
+25 @SuppressWarnings(value={"unchecked" })
+26 @Deprecated()
+27
+28 @SomeArrays(value={"unchecked" ,"unused" ,})
+29 class TestStyle1
+30 {
+31
+32 }
+33
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/Example2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/Example2.html
new file mode 100644
index 0000000000..fa33c0761c
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/Example2.html
@@ -0,0 +1,45 @@
+
+
+
+
Example2 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
+14
+15
+16 @SuppressWarnings("unchecked" )
+17 @Deprecated
+18
+19 @SomeArrays({"unchecked" ,"unused" })
+20 public class Example2
+21 {
+22
+23 }
+24
+25 @SuppressWarnings(value={"unchecked" })
+26 @Deprecated()
+27
+28 @SomeArrays(value={"unchecked" ,"unused" ,})
+29 class TestStyle2 {
+30
+31 }
+32
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/Example3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/Example3.html
new file mode 100644
index 0000000000..465b3b1033
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/Example3.html
@@ -0,0 +1,45 @@
+
+
+
+
Example3 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
+14
+15
+16 @SuppressWarnings("unchecked" )
+17 @Deprecated
+18 @SomeArrays({"unchecked" ,"unused" })
+19 public class Example3
+20 {
+21
+22 }
+23
+24
+25 @SuppressWarnings(value={"unchecked" })
+26 @Deprecated()
+27
+28 @SomeArrays(value={"unchecked" ,"unused" ,})
+29 class TestStyle3 {
+30
+31 }
+32
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/Example4.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/Example4.html
new file mode 100644
index 0000000000..e67e6dc66a
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/Example4.html
@@ -0,0 +1,46 @@
+
+
+
+
Example4 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
+14
+15
+16 @SuppressWarnings("unchecked" )
+17 @Deprecated
+18
+19 @SomeArrays({"unchecked" ,"unused" })
+20 public class Example4
+21 {
+22
+23 }
+24
+25
+26 @SuppressWarnings(value={"unchecked" })
+27 @Deprecated()
+28
+29 @SomeArrays(value={"unchecked" ,"unused" ,})
+30 class TestStyle4 {
+31
+32 }
+33
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyle.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyle.html
index 96fd3ec1ba..3be7930418 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyle.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyle.html
@@ -18,7 +18,7 @@
10 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
11
12 @
interface InputAnnotationUseStyle {
-
13 @Another32(value={
"foo" ,
"bar" })
+
13 @Another32(value={
"foo" ,
"bar" })
14 DOGS[] pooches();
15 }
16
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleCompact.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleCompact.html
index a1514dab44..f3055c1b75 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleCompact.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleCompact.html
@@ -18,14 +18,14 @@
10 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
11
12 @Deprecated
-
13 @SomeArrays(pooches={DOGS.LEO})
+
13 @SomeArraysDiffStyle(pooches={DOGS.LEO})
14 @SuppressWarnings({
"" })
15 public class InputAnnotationUseStyleCompact
16 {
17
18 }
19
-
20 @SomeArrays(pooches={DOGS.LEO}, um={}, duh={
"bleh" })
+
20 @SomeArraysDiffStyle(pooches={DOGS.LEO}, um={}, duh={
"bleh" })
21 @SuppressWarnings(
"" )
22 @Deprecated()
23 class Dep5 {
@@ -33,12 +33,12 @@
25 }
26
27 @Deprecated
-
28 @SomeArrays(pooches={DOGS.LEO})
+
28 @SomeArraysDiffStyle(pooches={DOGS.LEO})
29 @SuppressWarnings({
"" })
30 enum SON5 {
31
32 @Deprecated
-
33 @SomeArrays(pooches={DOGS.LEO}, um={
"" }, duh={
"bleh" })
+
33 @SomeArraysDiffStyle(pooches={DOGS.LEO}, um={
"" }, duh={
"bleh" })
34 @APooch(dog=DOGS.HERBIE)
35 @Another(
"" )
36 ETHAN
@@ -76,7 +76,7 @@
68 String value1()
default "" ;
69 }
70
-
71 @SomeArrays(pooches = {})
+
71 @SomeArraysDiffStyle(pooches = {})
72 @Another({})
73 class Closing5 {
74 static final String UN_U =
"UN_U" ;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleCompactNoArray.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleCompactNoArray.html
index 7f3f487c5f..e83d555c9d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleCompactNoArray.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleCompactNoArray.html
@@ -18,7 +18,7 @@
10 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
11
12 @Deprecated
-
13 @SomeArrays(pooches={DOGS.LEO})
+
13 @SomeArraysDiffStyle(pooches={DOGS.LEO})
14 @SuppressWarnings({
"" })
15 public class InputAnnotationUseStyleCompactNoArray
16 {
@@ -26,7 +26,7 @@
18 }
19
20
-
21 @SomeArrays(pooches={DOGS.LEO},um={}, duh={
"bleh" })
+
21 @SomeArraysDiffStyle(pooches={DOGS.LEO},um={}, duh={
"bleh" })
22 @SuppressWarnings(
"" )
23 @Deprecated()
24 class Dep6 {
@@ -34,13 +34,13 @@
26 }
27
28 @Deprecated
-
29 @SomeArrays(pooches={DOGS.LEO})
+
29 @SomeArraysDiffStyle(pooches={DOGS.LEO})
30 @SuppressWarnings({
"" })
31 enum SON6 {
32
33 @Deprecated
34
-
35 @SomeArrays(pooches={DOGS.LEO},um={
"" }, duh={
"bleh" })
+
35 @SomeArraysDiffStyle(pooches={DOGS.LEO},um={
"" }, duh={
"bleh" })
36 @APooch(dog=DOGS.HERBIE)
37 @Another(
"" )
38 ETHAN
@@ -78,7 +78,7 @@
70 String value1()
default "" ;
71 }
72
-
73 @SomeArrays(pooches = {})
+
73 @SomeArraysDiffStyle(pooches = {})
74 @Another({})
75 class Closing6 {
76 static final String UN_U =
"UN_U" ;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleDifferentStyles.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleDifferentStyles.html
index 69f9725575..7ec5a49602 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleDifferentStyles.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleDifferentStyles.html
@@ -18,7 +18,7 @@
10 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
11
12 @Deprecated
-
13 @SomeArrays(pooches={DOGS.LEO})
+
13 @SomeArraysDiffStyle(pooches={DOGS.LEO})
14 @SuppressWarnings({
"" })
15 public class InputAnnotationUseStyleDifferentStyles
16 {
@@ -26,7 +26,7 @@
18 }
19
20
-
21 @SomeArrays(pooches={DOGS.LEO},um={}, duh={
"bleh" })
+
21 @SomeArraysDiffStyle(pooches={DOGS.LEO},um={}, duh={
"bleh" })
22 @SuppressWarnings(
"" )
23 @Deprecated()
24 class Dep {
@@ -34,13 +34,13 @@
26 }
27
28 @Deprecated
-
29 @SomeArrays(pooches={DOGS.LEO})
+
29 @SomeArraysDiffStyle(pooches={DOGS.LEO})
30 @SuppressWarnings({
"" })
31 enum SON {
32
33 @Deprecated
34
-
35 @SomeArrays(pooches={DOGS.LEO},um={
"" }, duh={
"bleh" })
+
35 @SomeArraysDiffStyle(pooches={DOGS.LEO},um={
"" }, duh={
"bleh" })
36 @APooch(dog=DOGS.HERBIE)
37 @Another(
"" )
38 ETHAN
@@ -55,7 +55,7 @@
47 HERBIE
48 }
49
-
50 @
interface SomeArrays {
+
50 @
interface SomeArraysDiffStyle {
51 @Another(
"" )
52 String[] um()
default {};
53 @Another({
"" })
@@ -79,7 +79,7 @@
71 String value1()
default "" ;
72 }
73
-
74 @SomeArrays(pooches = {})
+
74 @SomeArraysDiffStyle(pooches = {})
75 @Another({})
76 class Closing {
77 static final String UN_U =
"UN_U" ;
@@ -89,15 +89,15 @@
81 }
82
83 @AnnotationWithAnnotationValue(@Another)
-
84 class Example1 {}
+
84 class ExampleA {}
85 @AnnotationWithAnnotationValue(value = @Another)
-
86 class Example2 {}
+
86 class ExampleB {}
87
88 @AnnotationWithAnnotationValue(@Another())
-
89 class Example3 {}
+
89 class ExampleC {}
90
91 @AnnotationWithAnnotationValue(value = @Another())
-
92 class Example4 {}
+
92 class ExampleD {}
93
94 class Foo {
95 Foo(@Another String par1, @Another
int par2) {}
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleEverythingMixed.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleEverythingMixed.html
index 5685c1eb12..23b05b7a16 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleEverythingMixed.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleEverythingMixed.html
@@ -17,51 +17,51 @@
9
10 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
11
-
12 @Deprecated
-
13 @SomeArrays(pooches={DOGS.LEO})
-
14 @SuppressWarnings({
"" })
+
12 @Deprecated
+
13 @SomeArraysDiffStyle(pooches={DOGS.LEO})
+
14 @SuppressWarnings({
"" })
15 public class InputAnnotationUseStyleEverythingMixed
16 {
17
18 }
19
-
20 @SomeArrays(pooches={DOGS.LEO}, um={}, duh={
"bleh" })
-
21 @SuppressWarnings(
"" )
-
22 @Deprecated()
+
20 @SomeArraysDiffStyle(pooches={DOGS.LEO}, um={}, duh={
"bleh" })
+
21 @SuppressWarnings(
"" )
+
22 @Deprecated()
23 class Dep7 {
24
25 }
26
-
27 @Deprecated
-
28 @SomeArrays(pooches={DOGS.LEO})
-
29 @SuppressWarnings({
"" })
+
27 @Deprecated
+
28 @SomeArraysDiffStyle(pooches={DOGS.LEO})
+
29 @SuppressWarnings({
"" })
30 enum SON7 {
31
-
32 @Deprecated
-
33 @SomeArrays(pooches={DOGS.LEO}, um={
"" }, duh={
"bleh" })
-
34 @APooch(dog=DOGS.HERBIE)
-
35 @Another(
"" )
+
32 @Deprecated
+
33 @SomeArraysDiffStyle(pooches={DOGS.LEO}, um={
"" }, duh={
"bleh" })
+
34 @APooch(dog=DOGS.HERBIE)
+
35 @Another(
"" )
36 ETHAN
37 }
38
-
39 @InputAnnotationUseStyleCustomAnnotation4()
+
39 @InputAnnotationUseStyleCustomAnnotation4()
40 enum DOGS7 {
41
-
42 @Deprecated()
+
42 @Deprecated()
43 LEO,
44 HERBIE
45 }
46
47 @
interface SomeArrays7 {
-
48 @Another(
"" )
+
48 @Another(
"" )
49 String[] um()
default {};
-
50 @Another({
"" })
+
50 @Another({
"" })
51 String[] duh()
default {};
-
52 @Another(value={
"" })
+
52 @Another(value={
"" })
53 DOGS[] pooches();
54 }
55
-
56 @Another(value={
"" })
+
56 @Another(value={
"" })
57 enum E7 {
58
59 }
@@ -72,30 +72,30 @@
64
65 @
interface Another7 {
66 String[] value()
default {};
-
67 @Another({
"foo" ,
"bar" })
+
67 @Another({
"foo" ,
"bar" })
68 String value1()
default "" ;
69 }
70
-
71 @SomeArrays(pooches = {})
-
72 @Another({})
+
71 @SomeArraysDiffStyle(pooches = {})
+
72 @Another({})
73 class Closing7 {
74 static final String UN_U =
"UN_U" ;
75
-
76 @SuppressWarnings(value = UN_U)
+
76 @SuppressWarnings(value = UN_U)
77 int d;
78 }
79
-
80 @AnnotationWithAnnotationValue(@Another)
+
80 @AnnotationWithAnnotationValue(@Another)
81 class Example25 {}
-
82 @AnnotationWithAnnotationValue(value = @Another)
+
82 @AnnotationWithAnnotationValue(value = @Another)
83 class Example26 {}
-
84 @AnnotationWithAnnotationValue(@Another())
+
84 @AnnotationWithAnnotationValue(@Another())
85 class Example27 {}
-
86 @AnnotationWithAnnotationValue(value = @Another())
+
86 @AnnotationWithAnnotationValue(value = @Another())
87 class Example28 {}
88
89 class Foo7 {
-
90 Foo7(@Another String par1, @Another
int par2) {}
+
90 Foo7(@Another String par1, @Another
int par2) {}
91 }
92
93 @
interface AnnotationWithAnnotationValue7 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleExpanded.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleExpanded.html
index 8c5a1b7aaf..0599f4928f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleExpanded.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleExpanded.html
@@ -18,14 +18,14 @@
10 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
11
12 @Deprecated
-
13 @SomeArrays(pooches={DOGS.LEO})
+
13 @SomeArraysDiffStyle(pooches={DOGS.LEO})
14 @SuppressWarnings({
"" })
15 public class InputAnnotationUseStyleExpanded
16 {
17
18 }
19
-
20 @SomeArrays(pooches={DOGS.LEO}, um={}, duh={
"bleh" })
+
20 @SomeArraysDiffStyle(pooches={DOGS.LEO}, um={}, duh={
"bleh" })
21 @SuppressWarnings(
"" )
22 @Deprecated()
23 class Dep4 {
@@ -33,12 +33,12 @@
25 }
26
27 @Deprecated
-
28 @SomeArrays(pooches={DOGS.LEO})
+
28 @SomeArraysDiffStyle(pooches={DOGS.LEO})
29 @SuppressWarnings({
"" })
30 enum SON4 {
31
32 @Deprecated
-
33 @SomeArrays(pooches={DOGS.LEO}, um={
"" }, duh={
"bleh" })
+
33 @SomeArraysDiffStyle(pooches={DOGS.LEO}, um={
"" }, duh={
"bleh" })
34 @APooch(dog=DOGS.HERBIE)
35 @Another(
"" )
36 ETHAN
@@ -76,7 +76,7 @@
68 String value1()
default "" ;
69 }
70
-
71 @SomeArrays(pooches = {})
+
71 @SomeArraysDiffStyle(pooches = {})
72 @Another({})
73 class Closing4 {
74 static final String UN_U =
"UN_U" ;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleNoParens.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleNoParens.html
index df4ee19bdc..586913076d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleNoParens.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleNoParens.html
@@ -18,14 +18,14 @@
10 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
11
12 @Deprecated
-
13 @SomeArrays(pooches={DOGS.LEO})
+
13 @SomeArraysDiffStyle(pooches={DOGS.LEO})
14 @SuppressWarnings({
"" })
15 public class InputAnnotationUseStyleNoParens
16 {
17
18 }
19
-
20 @SomeArrays(pooches={DOGS.LEO}, um={}, duh={
"bleh" })
+
20 @SomeArraysDiffStyle(pooches={DOGS.LEO}, um={}, duh={
"bleh" })
21 @SuppressWarnings(
"" )
22 @Deprecated()
23 class Dep3 {
@@ -33,12 +33,12 @@
25 }
26
27 @Deprecated
-
28 @SomeArrays(pooches={DOGS.LEO})
+
28 @SomeArraysDiffStyle(pooches={DOGS.LEO})
29 @SuppressWarnings({
"" })
30 enum SON3 {
31
32 @Deprecated
-
33 @SomeArrays(pooches={DOGS.LEO}, um={
"" }, duh={
"bleh" })
+
33 @SomeArraysDiffStyle(pooches={DOGS.LEO}, um={
"" }, duh={
"bleh" })
34 @APooch(dog=DOGS.HERBIE)
35 @Another(
"" )
36 ETHAN
@@ -77,7 +77,7 @@
69 String value1()
default "" ;
70 }
71
-
72 @SomeArrays(pooches = {})
+
72 @SomeArraysDiffStyle(pooches = {})
73 @Another({})
74 class Closing3 {
75 static final String UN_U =
"UN_U" ;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleNoTrailingCommaNever.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleNoTrailingCommaNever.html
index f666911a2a..a12645deaa 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleNoTrailingCommaNever.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleNoTrailingCommaNever.html
@@ -17,20 +17,20 @@
9
10 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
11
-
12 @SuppressWarnings({})
+
12 @SuppressWarnings({})
13 public class InputAnnotationUseStyleNoTrailingCommaNever
14 {
-
15 @SuppressWarnings({
"common" })
+
15 @SuppressWarnings({
"common" })
16 public void foo() {
17
18
-
19 @SuppressWarnings({
"common" ,
"foo" })
+
19 @SuppressWarnings({
"common" ,
"foo" })
20 Object o =
new Object() {
21
-
22 @SuppressWarnings(value={
"common" })
+
22 @SuppressWarnings(value={
"common" })
23 public String toString() {
24
-
25 @SuppressWarnings(value={
"leo" ,
"herbie" })
+
25 @SuppressWarnings(value={
"leo" ,
"herbie" })
26 final String pooches =
"leo.herbie" ;
27
28 return pooches;
@@ -38,15 +38,15 @@
30 };
31 }
32
-
33 @Test5(value={
"foo" }, more={
"bar" })
+
33 @Test5(value={
"foo" }, more={
"bar" })
34
-
35 @Pooches5(tokens={},other={})
+
35 @Pooches5(tokens={},other={})
36 enum P {
37
-
38 @Pooches5(tokens={Pooches5.
class },other={1})
+
38 @Pooches5(tokens={Pooches5.
class },other={1})
39 L,
40
-
41 @Test5(value={}, more={
"unchecked" })
+
41 @Test5(value={}, more={
"unchecked" })
42 Y;
43 }
44
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleParams.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleParams.html
index 47fd9ef890..1386b896c5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleParams.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleParams.html
@@ -22,7 +22,7 @@
14
15 public class InputAnnotationUseStyleParams
16 {
-
17 @Target({})
+
17 @Target({})
18 public @
interface myAnn {
19
20 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleWithParens.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleWithParens.html
index a633ad393a..ae625aa1e5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleWithParens.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleWithParens.html
@@ -18,14 +18,14 @@
10 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
11
12 @Deprecated
-
13 @SomeArrays(pooches={DOGS.LEO})
+
13 @SomeArraysDiffStyle(pooches={DOGS.LEO})
14 @SuppressWarnings({
"" })
15 public class InputAnnotationUseStyleWithParens
16 {
17
18 }
19
-
20 @SomeArrays(pooches={DOGS.LEO}, um={}, duh={
"bleh" })
+
20 @SomeArraysDiffStyle(pooches={DOGS.LEO}, um={}, duh={
"bleh" })
21 @SuppressWarnings(
"" )
22 @Deprecated()
23 class Dep2 {
@@ -33,12 +33,12 @@
25 }
26
27 @Deprecated
-
28 @SomeArrays(pooches={DOGS.LEO})
+
28 @SomeArraysDiffStyle(pooches={DOGS.LEO})
29 @SuppressWarnings({
"" })
30 enum SON2 {
31
32 @Deprecated
-
33 @SomeArrays(pooches={DOGS.LEO}, um={
"" }, duh={
"bleh" })
+
33 @SomeArraysDiffStyle(pooches={DOGS.LEO}, um={
"" }, duh={
"bleh" })
34 @APooch(dog=DOGS.HERBIE)
35 @Another(
"" )
36 ETHAN
@@ -76,7 +76,7 @@
68 String value1()
default "" ;
69 }
70
-
71 @SomeArrays(pooches = {})
+
71 @SomeArraysDiffStyle(pooches = {})
72 @Another({})
73 class Closing2 {
74 static final String UN_U =
"UN_U" ;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleWithTrailingComma.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleWithTrailingComma.html
index 83d5ae6c63..bd202a9245 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleWithTrailingComma.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/InputAnnotationUseStyleWithTrailingComma.html
@@ -16,55 +16,39 @@
8
9
10 package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle;
-
11
-
12
-
13 public class InputAnnotationUseStyleWithTrailingComma
-
14 {
-
15 @SuppressWarnings({
"common" ,})
-
16 public void foo() {
-
17
-
18
-
19 @SuppressWarnings({
"common" ,
"foo" ,})
-
20 Object o =
new Object() {
-
21
-
22 @SuppressWarnings(value={
"common" ,})
-
23 public String toString() {
-
24
-
25 @SuppressWarnings(value={
"leo" ,
"herbie" ,})
-
26 final String pooches =
"leo.herbie" ;
-
27
-
28 return pooches;
-
29 }
-
30 };
-
31 }
-
32
-
33 @Test(value={
"foo" ,}, more={
"bar" ,})
-
34
-
35
-
36
-
37 enum P {
-
38
-
39 @Pooches(tokens={Pooches.
class ,},other={1,})
-
40 L,
-
41
-
42
-
43
-
44
-
45 Y;
-
46 }
-
47
-
48 }
-
49
-
50 @
interface Test {
-
51 String[] value();
-
52 String[] more()
default {};
-
53 }
-
54
-
55 @
interface Pooches {
-
56
-
57 Class<?>[] tokens();
-
58 int [] other();
-
59 }
+
11
+
12 public class InputAnnotationUseStyleWithTrailingComma {
+
13 @SuppressWarnings({
"common" ,})
+
14 public void foo() {
+
15 @SuppressWarnings({
"common" ,
"foo" ,})
+
16 Object o =
new Object() {
+
17 @SuppressWarnings(value={
"common" ,})
+
18 public String toString() {
+
19 @SuppressWarnings(value={
"leo" ,
"herbie" ,})
+
20 final String pooches =
"leo.herbie" ;
+
21 return pooches;
+
22 }
+
23 };
+
24 }
+
25
+
26 @Test(value={
"foo" ,}, more={
"bar" ,})
+
27 enum P {
+
28 @Pooches(tokens={Pooches.
class ,},other={1,})
+
29 L,
+
30
+
31 Y;
+
32 }
+
33 }
+
34
+
35 @
interface Test {
+
36 String[] value();
+
37 String[] more()
default {};
+
38 }
+
39
+
40 @
interface Pooches {
+
41 Class<?>[] tokens();
+
42 int [] other();
+
43 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-frame.html
index 25e3d2420a..f3c04c3000 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle
@@ -50,6 +50,9 @@
Classes
Pooches4
+
+
+ SomeArrays
Test
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-summary.html
index ddda78f974..459243a22f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/annotationusestyle/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.annotationusestyle
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -123,15 +123,20 @@ Package com.puppycrawl.tools.checkstyle.checks
- Test
+ SomeArrays
- Test3
+ Test
+
+ Test3
+
+
+
Test4
@@ -156,7 +161,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/Example1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/Example1.html
new file mode 100644
index 0000000000..27d9700f4d
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/Example1.html
@@ -0,0 +1,48 @@
+
+
+
+Example1 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checks.annotation.missingdeprecated;
+10
+11
+12 class Example1 {
+13 @Deprecated
+14 public static final int MY_CONST = 13;
+15
+16
+17
+18 @Deprecated
+19 public static final int COUNTER = 10;
+20
+21
+22
+23
+24
+25 @Deprecated
+26 public static final int NUM = 123456;
+27
+28
+29
+30
+31
+32 @Deprecated
+33 public static final int CONST = 12;
+34 }
+35
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/Example2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/Example2.html
new file mode 100644
index 0000000000..dc101132c1
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/Example2.html
@@ -0,0 +1,50 @@
+
+
+
+
Example2 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11 package com.puppycrawl.tools.checkstyle.checks.annotation.missingdeprecated;
+12
+13
+14 class Example2 {
+15 @Deprecated
+16 public static final int MY_CONST = 13;
+17
+18
+19
+20 @Deprecated
+21 public static final int COUNTER = 10;
+22
+23
+24
+25
+26
+27 @Deprecated
+28 public static final int NUM = 123456;
+29
+30
+31
+32
+33
+34 @Deprecated
+35 public static final int CONST = 12;
+36 }
+37
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/InputMissingDeprecatedGood.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/InputMissingDeprecatedGood.html
index 08272e01de..cf80aa4e6e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/InputMissingDeprecatedGood.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/InputMissingDeprecatedGood.html
@@ -20,7 +20,7 @@
12
13
14 @Deprecated
-
15 public class InputMissingDeprecatedGood
+
15 public class InputMissingDeprecatedGood
16 {
17
18
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/InputMissingDeprecatedSingleComment.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/InputMissingDeprecatedSingleComment.html
index 61847d3587..57f34db88e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/InputMissingDeprecatedSingleComment.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/InputMissingDeprecatedSingleComment.html
@@ -24,7 +24,7 @@
16
17
18 @Deprecated
-
19 class InputMissingDeprecatedSingleComment {
+
19 class InputMissingDeprecatedSingleComment {
20 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-frame.html
index 0c8e433ed5..c5cbc7ba6c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingdeprecated
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingdeprecated
@@ -20,6 +20,12 @@
Classes
Bleh6
+
+
+ Example1
+
+
+ Example2
Foo1
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-summary.html
index 03763a630d..b371a775d4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingdeprecated/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingdeprecated
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingdeprecated
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -70,6 +70,16 @@ Package com.puppycrawl.tools.checkstyle.checks
Bleh6
+
+
+
+ Example1
+
+
+
+
+ Example2
+
@@ -181,7 +191,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/Example1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/Example1.html
new file mode 100644
index 0000000000..f64d92d704
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/Example1.html
@@ -0,0 +1,56 @@
+
+
+
+Example1 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checks.annotation.missingoverride;
+10
+11 class ParentClass1 {
+12 public void test1(){}
+13
+14 public void test2(){}
+15
+16 }
+17
+18 class Example1 extends ParentClass1 {
+19
+20
+21 @Override
+22 public void test1() {
+23
+24 }
+25
+26
+27 public void test2() {
+28
+29 }
+30
+31
+32
+33 private void test3() {
+34
+35 }
+36
+37
+38
+39 public static void test4() {
+40
+41 }
+42 }
+43
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/Example2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/Example2.html
new file mode 100644
index 0000000000..117282c312
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/Example2.html
@@ -0,0 +1,67 @@
+
+
+
+
Example2 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12 package com.puppycrawl.tools.checkstyle.checks.annotation.missingoverride;
+13
+14 class ParentClass2 {
+15 public void test(){}
+16
+17 }
+18
+19
+20 class Example2 {
+21
+22 public boolean equals(Object o) {
+23 return o == this ;
+24 }
+25 }
+26
+27 interface B {
+28
+29
+30 void test();
+31 }
+32
+33 class C extends ParentClass2 {
+34
+35 public void test() {
+36
+37 }
+38 }
+39
+40 class D implements B {
+41
+42 public void test() {
+43 }
+44 }
+45
+46 class E {
+47 Runnable r = new Runnable() {
+48
+49
+50 public void run() {
+51 }
+52 };
+53 }
+54
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideBadAnnotationJava5.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideBadAnnotationJava5.html
index 4f286e5fcb..7ed732acad 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideBadAnnotationJava5.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideBadAnnotationJava5.html
@@ -22,13 +22,13 @@
14
15
16
-
17 public void run() {
+
17 public void run() {
18 Throwable t =
new Throwable() {
19
20
21
22
-
23 public String toString() {
+
23 public String toString() {
24 return "junk" ;
25 }
26 };
@@ -41,13 +41,13 @@
33
34
35
-
36 public void run() {
+
36 public void run() {
37 Throwable t =
new Throwable() {
38
39
40
41
-
42 public String toString() {
+
42 public String toString() {
43 return "junk" ;
44 }
45 };
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideBadOverrideFromOtherJava5.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideBadOverrideFromOtherJava5.html
index bd24bc1cef..f8f0d0ec0f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideBadOverrideFromOtherJava5.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideBadOverrideFromOtherJava5.html
@@ -22,7 +22,7 @@
14
15
16
-
17 public void doFoo() {}
+
17 public void doFoo() {}
18
19 public void doFoo2() {}
20
@@ -38,7 +38,7 @@
30
31
32
-
33 public void doFoo();
+
33 public void doFoo();
34 }
35
36 class MoreJunk2Java5 extends InputMissingOverrideBadOverrideFromOtherJava5 {
@@ -46,24 +46,24 @@
38
39
40
-
41 public void doFoo() {}
+
41 public void doFoo() {}
42
43
44
45
-
46 public void doFoo2() {}
+
46 public void doFoo2() {}
47
48 class EvenMoreJunk2
extends MoreJunk2Java5 implements Serializable {
49
50
51
52
-
53 public void doFoo() {}
+
53 public void doFoo() {}
54
55
56
57
-
58 public void doFoo2() {}
+
58 public void doFoo2() {}
59 }
60 }
61
@@ -73,7 +73,7 @@
65
66
67
-
68 public void doFoo() {}
+
68 public void doFoo() {}
69 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverride.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverride.html
index 10f6a9f175..033735673c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverride.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverride.html
@@ -25,7 +25,7 @@
17
18
19
-
20 @Override
+
20 @Override
21 public String toString() {
22 return "junk" ;
23 }
@@ -42,7 +42,7 @@
34
35
36
-
37 @Override
+
37 @Override
38 public String toString() {
39 return "junk" ;
40 }
@@ -60,7 +60,7 @@
52
53
54
-
55 @java.lang.Override
+
55 @java.lang.Override
56 public String toString() {
57 return "junk" ;
58 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromObject.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromObject.html
index 3818bd7bb3..15fdf50f33 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromObject.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromObject.html
@@ -20,7 +20,7 @@
12
13
14
-
15 @Override
+
15 @Override
16 public boolean equals(Object obj) {
17 return false;
18 }
@@ -32,7 +32,7 @@
24
25
26
-
27 @Override
+
27 @Override
28 public int hashCode() {
29 return 1;
30 }
@@ -42,7 +42,7 @@
34
35
36
-
37 @Override
+
37 @Override
38 protected void finalize()
throws Throwable {}
39 }
40 }
@@ -52,7 +52,7 @@
44
45
46
-
47 @Override
+
47 @Override
48 public int hashCode();
49 }
50
@@ -62,7 +62,7 @@
54
55
56
-
57 @Override
+
57 @Override
58 public String toString() {
59 return "B" ;
60 }
@@ -74,7 +74,7 @@
66
67
68
-
69 @java.lang.Override
+
69 @java.lang.Override
70 public String toString() {
71 return "B" ;
72 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromObjectJava5.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromObjectJava5.html
index 43fd53a122..42e7aa572e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromObjectJava5.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromObjectJava5.html
@@ -20,7 +20,7 @@
12
13
14
-
15 @Override
+
15 @Override
16 public boolean equals(Object obj) {
17 return false;
18 }
@@ -32,7 +32,7 @@
24
25
26
-
27 @Override
+
27 @Override
28 public int hashCode() {
29 return 1;
30 }
@@ -42,7 +42,7 @@
34
35
36
-
37 @Override
+
37 @Override
38 protected void finalize()
throws Throwable {}
39 }
40 }
@@ -52,7 +52,7 @@
44
45
46
-
47 @Override
+
47 @Override
48 public int hashCode();
49 }
50
@@ -62,7 +62,7 @@
54
55
56
-
57 @Override
+
57 @Override
58 public String toString() {
59 return "B" ;
60 }
@@ -74,7 +74,7 @@
66
67
68
-
69 @java.lang.Override
+
69 @java.lang.Override
70 public String toString() {
71 return "B" ;
72 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromOther.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromOther.html
index caf294d580..7afe0900aa 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromOther.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromOther.html
@@ -40,13 +40,13 @@
32
33
34
-
35 @Override
+
35 @Override
36 public void doFoo() {}
37
38
39
40
-
41 @Override
+
41 @Override
42 public void doFoo2() {}
43
44 class EvenMoreJunk
extends MoreJunk1 implements Serializable {
@@ -54,13 +54,13 @@
46
47
48
-
49 @Override
+
49 @Override
50 public void doFoo() {}
51
52
53
54
-
55 @Override
+
55 @Override
56 public void doFoo2() {}
57 }
58
@@ -69,13 +69,13 @@
61
62
63
-
64 @java.lang.Override
+
64 @java.lang.Override
65 public void doFoo() {}
66
67
68
69
-
70 @java.lang.Override
+
70 @java.lang.Override
71 public void doFoo2() {}
72 }
73 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromOtherJava5.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromOtherJava5.html
index f95566f095..2c98fd1dc0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromOtherJava5.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideFromOtherJava5.html
@@ -40,13 +40,13 @@
32
33
34
-
35 @Override
+
35 @Override
36 public void doFoo() {}
37
38
39
40
-
41 @Override
+
41 @Override
42 public void doFoo2() {}
43
44 class EvenMoreJunk
extends MoreJunk1Java5 implements Serializable {
@@ -54,13 +54,13 @@
46
47
48
-
49 @Override
+
49 @Override
50 public void doFoo() {}
51
52
53
54
-
55 @Override
+
55 @Override
56 public void doFoo2() {}
57 }
58
@@ -69,13 +69,13 @@
61
62
63
-
64 @java.lang.Override
+
64 @java.lang.Override
65 public void doFoo() {}
66
67
68
69
-
70 @java.lang.Override
+
70 @java.lang.Override
71 public void doFoo2() {}
72 }
73 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideJava5.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideJava5.html
index 25c49b9d4f..622cf3b3a6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideJava5.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideGoodOverrideJava5.html
@@ -25,7 +25,7 @@
17
18
19
-
20 @Override
+
20 @Override
21 public String toString() {
22 return "junk" ;
23 }
@@ -42,7 +42,7 @@
34
35
36
-
37 @Override
+
37 @Override
38 public String toString() {
39 return "junk" ;
40 }
@@ -60,7 +60,7 @@
52
53
54
-
55 @java.lang.Override
+
55 @java.lang.Override
56 public String toString() {
57 return "junk" ;
58 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideNotOverride.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideNotOverride.html
index 1795cc5c86..e2e7711a41 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideNotOverride.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/InputMissingOverrideNotOverride.html
@@ -30,7 +30,7 @@
22
23
24
-
25 public String junk =
"" ;
+
25 public String junk =
"" ;
26
27 void dodoo() {}
28 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/package-frame.html
index 2488b815ef..1847c566e8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/missingoverride/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingoverride
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.missingoverride
@@ -13,6 +13,24 @@
@@ -57,6 +57,36 @@ Package com.puppycrawl.tools.checkstyle.checks
+
+ B
+
+
+
+
+ C
+
+
+
+
+ D
+
+
+
+
+ E
+
+
+
+
+ Example1
+
+
+
+
+ Example2
+
+
+
Football1
@@ -270,6 +300,16 @@ Package com.puppycrawl.tools.checkstyle.checks
MoreJunk2Java5.EvenMoreJunk2
+
+
+
+ ParentClass1
+
+
+
+
+ ParentClass2
+
@@ -321,7 +361,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-frame.html
index 06c43d4adf..fbe6b147e3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-summary.html
index 9b4b7152bf..c42580dbd2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -151,7 +151,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-frame.html
index f5784c0dc0..8afa5d285e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.packageannotation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.packageannotation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-summary.html
index 4fb2c1374b..57a947f01f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/packageannotation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.packageannotation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.packageannotation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/Example1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/Example1.html
new file mode 100644
index 0000000000..9dc3cd596b
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/Example1.html
@@ -0,0 +1,50 @@
+
+
+
+Example1 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarnings;
+10
+11
+12
+13 @SuppressWarnings("" )
+14 class Example1 {
+15
+16 @SuppressWarnings("" )
+17 final int num1 = 1;
+18
+19 @SuppressWarnings("all" )
+20 final int num2 = 2;
+21
+22 @SuppressWarnings("unused" )
+23 final int num3 = 3;
+24
+25 void foo1(@SuppressWarnings("unused" ) int param) {}
+26
+27 @SuppressWarnings("all" )
+28 void foo2(int param) {}
+29 @SuppressWarnings("unused" )
+30 void foo3(int param) {}
+31 @SuppressWarnings(true ?"all" :"unused" )
+32 void foo4(int param) {}
+33 }
+34
+35 @SuppressWarnings("unchecked" )
+36 class Test1 {}
+37
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/Example2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/Example2.html
new file mode 100644
index 0000000000..32d7b3d0ca
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/Example2.html
@@ -0,0 +1,64 @@
+
+
+
+
Example2 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18 package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarnings;
+19
+20
+21
+22 @SuppressWarnings("" )
+23 class Example2 {
+24
+25 @SuppressWarnings("" )
+26 final int num1 = 1;
+27 @SuppressWarnings("all" )
+28 final int num2 = 2;
+29 @SuppressWarnings("unused" )
+30 final int num3 = 3;
+31
+32
+33 void foo1(@SuppressWarnings("unused" ) int param) {}
+34
+35
+36 @SuppressWarnings("all" )
+37 void foo2(int param) {}
+38
+39
+40 @SuppressWarnings("unused" )
+41 void foo3(int param) {}
+42
+43
+44 @SuppressWarnings(true ?"all" :"unused" )
+45 void foo4(int param) {}
+46 }
+47
+48
+49 @SuppressWarnings("unchecked" )
+50 class Test2 {}
+51
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-frame.html
index 041db80a1c..a4a2997232 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarnings
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarnings
@@ -17,6 +17,12 @@
Classes
CustomSuppressWarnings.SuppressWarnings
+
+
+ Example1
+
+
+ Example2
InputSuppressWarningsConstants
@@ -152,6 +158,12 @@ Classes
InputSuppressWarningsValuePair
+
+
+ Test1
+
+
+ Test2
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-summary.html
index f2195e88d7..e29aecd240 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/annotation/suppresswarnings/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarnings
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.annotation.suppresswarnings
@@ -23,7 +23,7 @@
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
+
+
+ Example1
+
+
+
+
+ Example2
+
@@ -290,6 +300,16 @@ Package com.puppycrawl.tools.checkstyle.checks
InputSuppressWarningsValuePair
+
+
+
+ Test1
+
+
+
+
+ Test2
+
@@ -311,7 +331,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/Example1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/Example1.html
new file mode 100644
index 0000000000..617d9aa85c
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/Example1.html
@@ -0,0 +1,37 @@
+
+
+
+Example1 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checks.arraytypestyle;
+10
+11
+12 public class Example1 {
+13 int [] nums;
+14 String strings[];
+15
+16 char [] toCharArray() {
+17 return null ;
+18 }
+19
+20 byte getData()[] {
+21 return null ;
+22 }
+23 }
+24
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/Example2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/Example2.html
new file mode 100644
index 0000000000..5a4ac2ebbe
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/Example2.html
@@ -0,0 +1,39 @@
+
+
+
+
Example2 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11 package com.puppycrawl.tools.checkstyle.checks.arraytypestyle;
+12
+13
+14 public class Example2 {
+15 int [] nums;
+16 String strings[];
+17
+18 char [] toCharArray() {
+19 return null ;
+20 }
+21
+22 byte getData()[] {
+23 return null ;
+24 }
+25 }
+26
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/InputArrayTypeStyleNestedGenerics.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/InputArrayTypeStyleNestedGenerics.html
index 1e91b04a8d..02caa1cb1f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/InputArrayTypeStyleNestedGenerics.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/InputArrayTypeStyleNestedGenerics.html
@@ -16,9 +16,9 @@
8 package com.puppycrawl.tools.checkstyle.checks.arraytypestyle;
9
10 public class InputArrayTypeStyleNestedGenerics {
-
11 protected Pair<Integer, Object>[] values1;
-
12 protected Pair<Integer, Pair<String, Object>[]>[] values2;
-
13 protected Pair<Integer, Pair<String, Pair<String, Object>>[]>[] values3a;
+
11 protected Pair<Integer, Object>[] values1;
+
12 protected Pair<Integer, Pair<String, Object>[]>[] values2;
+
13 protected Pair<Integer, Pair<String, Pair<String, Object>>[]>[] values3a;
14 protected Pair<
15 Integer,
16 Pair<
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-frame.html
index b654763838..6581fbcf5d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.arraytypestyle
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.arraytypestyle
@@ -13,6 +13,12 @@
com.puppycraw
Classes
+ Example1
+
+
+ Example2
+
+
InputArrayTypeStyle
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-summary.html
index 2dbaf719c7..8910ed5386 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/arraytypestyle/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.arraytypestyle
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.arraytypestyle
@@ -23,7 +23,7 @@
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
@@ -57,6 +57,16 @@ Package com.puppycrawl.tools.checkstyle.checks
+
+ Example1
+
+
+
+
+ Example2
+
+
+
InputArrayTypeStyle
@@ -106,7 +116,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-frame.html
index 83e4f2895c..cd7d0e8e7c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.avoidescapedunicodecharacters
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.avoidescapedunicodecharacters
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-summary.html
index 3e37a59b82..cad9e2798b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/avoidescapedunicodecharacters/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.avoidescapedunicodecharacters
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.avoidescapedunicodecharacters
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -111,7 +111,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/LeftCurlyCheckExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/LeftCurlyCheckExamplesTest.html
index a33c7688f3..9f0b0bba77 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/LeftCurlyCheckExamplesTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/LeftCurlyCheckExamplesTest.html
@@ -27,54 +27,60 @@
19
20 package com.puppycrawl.tools.checkstyle.checks.blocks;
21
-22 import org.junit.jupiter.api.Disabled;
-23 import org.junit.jupiter.api.Test;
-24
-25 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
-26
-27 @Disabled("until https://github.com/checkstyle/checkstyle/issues/13345" )
-28 public class LeftCurlyCheckExamplesTest extends AbstractExamplesModuleTestSupport {
-29 @Override
-30 protected String getPackageLocation() {
-31 return "com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly" ;
-32 }
-33
-34 @Test
-35 public void testExample1() throws Exception {
-36 final String[] expected = {
-37
-38 };
-39
-40 verifyWithInlineConfigParser(getPath("Example1.txt" ), expected);
-41 }
+22 import static com.puppycrawl.tools.checkstyle.checks.blocks.LeftCurlyCheck.MSG_KEY_LINE_BREAK_AFTER;
+23 import static com.puppycrawl.tools.checkstyle.checks.blocks.LeftCurlyCheck.MSG_KEY_LINE_NEW;
+24 import static com.puppycrawl.tools.checkstyle.checks.blocks.LeftCurlyCheck.MSG_KEY_LINE_PREVIOUS;
+25
+26 import org.junit.jupiter.api.Test;
+27
+28 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+29
+30 public class LeftCurlyCheckExamplesTest extends AbstractExamplesModuleTestSupport {
+31 @Override
+32 protected String getPackageLocation() {
+33 return "com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly" ;
+34 }
+35
+36 @Test
+37 public void testExample1() throws Exception {
+38 final String[] expected = {
+39 "13:1: " + getCheckMessage(MSG_KEY_LINE_PREVIOUS, "{" , "1" ),
+40 "15:3: " + getCheckMessage(MSG_KEY_LINE_PREVIOUS, "{" , "3" ),
+41 };
42
-43 @Test
-44 public void testExample2() throws Exception {
-45 final String[] expected = {
-46
-47 };
-48
-49 verifyWithInlineConfigParser(getPath("Example2.txt" ), expected);
-50 }
+43 verifyWithInlineConfigParser(getPath("Example1.java" ), expected);
+44 }
+45
+46 @Test
+47 public void testExample2() throws Exception {
+48 final String[] expected = {
+49 "23:13: " + getCheckMessage(MSG_KEY_LINE_NEW, "{" , "13" ),
+50 };
51
-52 @Test
-53 public void testExample3() throws Exception {
-54 final String[] expected = {
-55
-56 };
-57
-58 verifyWithInlineConfigParser(getPath("Example3.txt" ), expected);
-59 }
-60
-61 @Test
-62 public void testExample4() throws Exception {
-63 final String[] expected = {
+52 verifyWithInlineConfigParser(getPath("Example2.java" ), expected);
+53 }
+54
+55 @Test
+56 public void testExample3() throws Exception {
+57 final String[] expected = {
+58 "16:1: " + getCheckMessage(MSG_KEY_LINE_PREVIOUS, "{" , "1" ),
+59 "22:13: " + getCheckMessage(MSG_KEY_LINE_NEW, "{" , "13" ),
+60 };
+61
+62 verifyWithInlineConfigParser(getPath("Example3.java" ), expected);
+63 }
64
-65 };
-66
-67 verifyWithInlineConfigParser(getPath("Example4.txt" ), expected);
-68 }
-69 }
+65 @Test
+66 public void testExample4() throws Exception {
+67 final String[] expected = {
+68 "15:1: " + getCheckMessage(MSG_KEY_LINE_PREVIOUS, "{" , "1" ),
+69 "17:3: " + getCheckMessage(MSG_KEY_LINE_PREVIOUS, "{" , "3" ),
+70 "25:15: " + getCheckMessage(MSG_KEY_LINE_BREAK_AFTER, "{" , "15" ),
+71 };
+72
+73 verifyWithInlineConfigParser(getPath("Example4.java" ), expected);
+74 }
+75 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/InputAvoidNestedBlocksAllowInSwitchCase.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/InputAvoidNestedBlocksAllowInSwitchCase.html
index 1cc576231b..5d09d6affd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/InputAvoidNestedBlocksAllowInSwitchCase.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/InputAvoidNestedBlocksAllowInSwitchCase.html
@@ -18,7 +18,7 @@
10 class InputAvoidNestedBlocksAllowInSwitchCase
11 {
12 static
-13 {
+13 {
14 }
15
16 public void method()
@@ -32,7 +32,7 @@
24 }
25
26 if (x == 1)
-27 {
+27 {
28 x = 2;
29 }
30
@@ -43,7 +43,7 @@
35 switch (x)
36 {
37 case 0:
-38
+38
39 x = 3;
40 break ;
41 case 1:
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/InputAvoidNestedBlocksDefault.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/InputAvoidNestedBlocksDefault.html
index 0a5dcd69f2..3e72b3924b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/InputAvoidNestedBlocksDefault.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/InputAvoidNestedBlocksDefault.html
@@ -22,7 +22,7 @@
14 class InputAvoidNestedBlocksDefault
15 {
16 static
-17 {
+17 {
18 }
19
20 public void method()
@@ -36,7 +36,7 @@
28 }
29
30 if (x == 1)
-31 {
+31 {
32 x = 2;
33 }
34
@@ -47,7 +47,7 @@
39 switch (x)
40 {
41 case 0:
-42
+42
43 x = 3;
44 break ;
45 case 1:
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-frame.html
index 0b4e633ad5..62f51a2cc0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.avoidnestedblocks
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.avoidnestedblocks
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-summary.html
index dd07e9b6a0..2ab95e2824 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/avoidnestedblocks/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.avoidnestedblocks
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.avoidnestedblocks
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockAnnotationDefaultKeyword.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockAnnotationDefaultKeyword.html
index 696ca8b524..bebb25c9a4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockAnnotationDefaultKeyword.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockAnnotationDefaultKeyword.html
@@ -17,7 +17,7 @@
9 package com.puppycrawl.tools.checkstyle.checks.blocks.emptyblock;
10
11 public @interface InputEmptyBlockAnnotationDefaultKeyword {
-12 String name() default "" ;
+12 String name() default "" ;
13 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockCase.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockCase.html
index 6f4e19e0f5..642ade83c9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockCase.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockCase.html
@@ -20,7 +20,7 @@
12 {
13 void method1(int a) {
14 switch (a) {}
-15 switch (a) {case 1: ; }
+15 switch (a) {case 1: ; }
16 switch (a) {case 1:{}}
17 switch (a) {
18 case 1:
@@ -31,15 +31,15 @@
23 }
24 switch (a) {
25 case 1:
-26 {
+26 {
27 }
28 }
29 }
30
31 public void method2(char c) {
-32 switch (c) { case 0: }
+32 switch (c) { case 0: }
33 switch (c) { case 0: {} method1(1); }
-34 switch (c) { case 0: method1(0); {} }
+34 switch (c) { case 0: method1(0); {} }
35 switch (c) { case 0: case 1: {} }
36 switch (c) { case 0: {} case 1: {
37 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockCase2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockCase2.html
index d8104145dc..bc54e05a88 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockCase2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockCase2.html
@@ -20,7 +20,7 @@
12 {
13 void method1(int a) {
14 switch (a) {}
-15 switch (a) {case 1: ; }
+15 switch (a) {case 1: ; }
16 switch (a) {case 1:{}}
17 switch (a) {
18 case 1:
@@ -37,9 +37,9 @@
29 }
30
31 public void method2(char c) {
-32 switch (c) { case 0: }
+32 switch (c) { case 0: }
33 switch (c) { case 0: {} method1(1); }
-34 switch (c) { case 0: method1(0); {} }
+34 switch (c) { case 0: method1(0); {} }
35 switch (c) { case 0: case 1: {} }
36 switch (c) { case 0: {} case 1: {
37 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockDefault.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockDefault.html
index 0c01d7100a..ab75cba768 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockDefault.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockDefault.html
@@ -19,7 +19,7 @@
11 public class InputEmptyBlockDefault {
12 void method1(int a) {
13 switch (a) {}
-14 switch (a) {default : ; }
+14 switch (a) {default : ; }
15 switch (a) {default : {}}
16 switch (a) {
17 default :
@@ -30,7 +30,7 @@
22 }
23 switch (a) {
24 default :
-25 {
+25 {
26 }
27 }
28 }
@@ -39,9 +39,9 @@
31 switch (a) {
32 case 1:a++;
33 case 2:a++;
-34 default :
+34 default :
35 switch (a) {
-36 default : {
+36 default : {
37
38 }
39 }
@@ -56,7 +56,7 @@
48
49 switch (b) {
50 case 2: break ;
-51 default : method2(b); {}
+51 default : method2(b); {}
52 }
53
54 switch (a+b) {case 1: break ; default : {} ; }
@@ -70,17 +70,17 @@
62
63 switch (b) {
64 case 1:
-65 default :
+65 default :
66 }
67
68 switch (a+b) {
-69 default :
+69 default :
70 case 1: { }
71 }
72
73 switch (a-b) {
74 case 1:
-75 default : {
+75 default : {
76
77 } ;
78 case 2: { }
@@ -98,7 +98,7 @@
90 }
91
92 switch (b) {
-93 default :
+93 default :
94 case 1:
95 case 2: { } method2(b);
96 case 3:
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockDefault2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockDefault2.html
index 6061fdb553..34cb48427b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockDefault2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockDefault2.html
@@ -19,7 +19,7 @@
11 public class InputEmptyBlockDefault2 {
12 void method1(int a) {
13 switch (a) {}
-14 switch (a) {default : ; }
+14 switch (a) {default : ; }
15 switch (a) {default : {}}
16 switch (a) {
17 default :
@@ -39,7 +39,7 @@
31 switch (a) {
32 case 1:a++;
33 case 2:a++;
-34 default :
+34 default :
35 switch (a) {
36 default : {
37
@@ -56,7 +56,7 @@
48
49 switch (b) {
50 case 2: break ;
-51 default : method2(b); {}
+51 default : method2(b); {}
52 }
53
54 switch (a+b) {case 1: break ; default : {} ; }
@@ -70,11 +70,11 @@
62
63 switch (b) {
64 case 1:
-65 default :
+65 default :
66 }
67
68 switch (a+b) {
-69 default :
+69 default :
70 case 1: { }
71 }
72
@@ -98,7 +98,7 @@
90 }
91
92 switch (b) {
-93 default :
+93 default :
94 case 1:
95 case 2: { } method2(b);
96 case 3:
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemantic.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemantic.html
index 00aba6290f..2afd27be64 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemantic.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemantic.html
@@ -53,10 +53,10 @@
45 finally {
46
47 }
-48 try {
+48 try {
49 ;
50 }
-51 finally {
+51 finally {
52 ;
53 }
54 }
@@ -82,7 +82,7 @@
74
75 synchronized void foo() {
76 synchronized (this ) {}
-77 synchronized (Class.class ) {
+77 synchronized (Class.class ) {
78 synchronized (new Object()) {
79
80 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemantic2Statement.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemantic2Statement.html
index fc1bb3678a..7561da55c2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemantic2Statement.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemantic2Statement.html
@@ -30,11 +30,11 @@
22 char [] s = {'1', '2'};
23 int index = 2;
24 if (doSideEffect() == 1) {}
-25 while ((a = index - 1) != 0) {}
-26 for (; index < s.length && s[index] != 'x'; index++) {}
+25 while ((a = index - 1) != 0) {}
+26 for (; index < s.length && s[index] != 'x'; index++) {}
27 if (a == 1) {} else {a++;}
28 switch (a) {}
-29 switch (a) {
+29 switch (a) {
30 case 1:
31 a = 2;
32 case 2:
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemantic2Text.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemantic2Text.html
index 5ea2e1c900..ab49387e19 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemantic2Text.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemantic2Text.html
@@ -35,11 +35,11 @@
27 char [] s = {'1', '2'};
28 int index = 2;
29 if (doSideEffect() == 1) {}
-30 while ((a = index - 1) != 0) {}
-31 for (; index < s.length && s[index] != 'x'; index++) {}
+30 while ((a = index - 1) != 0) {}
+31 for (; index < s.length && s[index] != 'x'; index++) {}
32 if (a == 1) {} else {System.identityHashCode("a" );}
33 switch (a) {}
-34 switch (a) {
+34 switch (a) {
35 case 1:
36 a = 2;
37 case 2:
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemanticInvalid.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemanticInvalid.html
index c9ad6c5a73..d024fdbc99 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemanticInvalid.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemanticInvalid.html
@@ -53,10 +53,10 @@
45 finally {
46
47 }
-48 try {
+48 try {
49 ;
50 }
-51 finally {
+51 finally {
52 ;
53 }
54 }
@@ -82,7 +82,7 @@
74
75 synchronized void foo() {
76 synchronized (this ) {}
-77 synchronized (Class.class ) {
+77 synchronized (Class.class ) {
78 synchronized (new Object()) {
79
80 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemanticStatement.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemanticStatement.html
index 5de362956e..de47bbeace 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemanticStatement.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemanticStatement.html
@@ -53,10 +53,10 @@
45 finally {
46
47 }
-48 try {
+48 try {
49 ;
50 }
-51 finally {
+51 finally {
52 ;
53 }
54 }
@@ -82,7 +82,7 @@
74
75 synchronized void foo() {
76 synchronized (this ) {}
-77 synchronized (Class.class ) {
+77 synchronized (Class.class ) {
78 synchronized (new Object()) {
79
80 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemanticText.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemanticText.html
index 6b056246f6..f19744cd0f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemanticText.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockSemanticText.html
@@ -47,16 +47,16 @@
39 }
40 finally {
41 }
-42 try {
+42 try {
43
44 }
-45 finally {
+45 finally {
46
47 }
-48 try {
+48 try {
49 ;
50 }
-51 finally {
+51 finally {
52 ;
53 }
54 }
@@ -82,8 +82,8 @@
74
75 synchronized void foo() {
76 synchronized (this ) {}
-77 synchronized (Class.class ) {
-78 synchronized (new Object()) {
+77 synchronized (Class.class ) {
+78 synchronized (new Object()) {
79
80 }
81 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockTestUppercaseOptionProperty.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockTestUppercaseOptionProperty.html
index 4d2df248fd..558e020306 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockTestUppercaseOptionProperty.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockTestUppercaseOptionProperty.html
@@ -20,7 +20,7 @@
12
13 void method1(int a) {
14 switch (a) {}
-15 switch (a) {default : ; }
+15 switch (a) {default : ; }
16 switch (a) {default : {}}
17 switch (a) {
18 default :
@@ -31,7 +31,7 @@
23 }
24 switch (a) {
25 default :
-26 {
+26 {
27 }
28 }
29 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockWithEmoji.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockWithEmoji.html
index f2a79d1ed0..a5c1130ecb 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockWithEmoji.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/InputEmptyBlockWithEmoji.html
@@ -34,14 +34,14 @@
26 char [] s = {'1', '2'};
27 int index = 2;
28 if (doSideEffect() == 1) { }
-29 while ((a = "12" ) != "🧐" ) {return ;}
+29 while ((a = "12" ) != "🧐" ) {return ;}
30 for (; index < s.length && s[index] != 'x'; index++) {}
31 if (a == "12🤣" ) {} else {System.identityHashCode("a" );}
32
33 switch ("😆😆😆😆😆" ) {
34
35 }
-36 switch (a) {
+36 switch (a) {
37 case "🎄" : {
38 a = "🤣🤣" ;
39 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-frame.html
index 4941c9edba..58b8e0ec1e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptyblock
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptyblock
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-summary.html
index 8d6ff07026..ba5765d3da 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptyblock/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptyblock
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptyblock
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -181,7 +181,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/InputEmptyCatchBlockDefault.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/InputEmptyCatchBlockDefault.html
index 2d7337dee5..17ccf75dd4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/InputEmptyCatchBlockDefault.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/InputEmptyCatchBlockDefault.html
@@ -92,7 +92,7 @@
84 {
85 try {
86 }
-87 catch (Exception e) {
+87 catch (Exception e) {
88
89
90
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-frame.html
index a2e2d17214..b0388b773b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptycatchblock
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptycatchblock
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-summary.html
index fc1b497f82..67d8cbb305 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/emptycatchblock/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptycatchblock
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.emptycatchblock
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -91,7 +91,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/Example1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/Example1.html
new file mode 100644
index 0000000000..2b12f6b74f
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/Example1.html
@@ -0,0 +1,41 @@
+
+
+
+Example1 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly;
+10
+11
+12 class Example1
+13 {
+14 private interface TestInterface
+15 {
+16 }
+17
+18 private
+19 class
+20 MyClass {
+21 }
+22
+23 enum Colors {RED,
+24 BLUE,
+25 GREEN;
+26 }
+27 }
+28
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/Example2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/Example2.html
new file mode 100644
index 0000000000..1315d491be
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/Example2.html
@@ -0,0 +1,44 @@
+
+
+
+
Example2 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12 package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly;
+13
+14
+15 class Example2
+16 {
+17 private interface TestInterface
+18 {
+19 }
+20
+21 private
+22 class
+23 MyClass {
+24 }
+25
+26 enum Colors {RED,
+27 BLUE,
+28 GREEN;
+29 }
+30 }
+31
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/Example3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/Example3.html
new file mode 100644
index 0000000000..da18d4ba22
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/Example3.html
@@ -0,0 +1,43 @@
+
+
+
+
Example3 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12 package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly;
+13
+14
+15 class Example3
+16 {
+17 private interface TestInterface {
+18 }
+19
+20 private
+21 class
+22 MyClass {
+23 }
+24
+25 enum Colors {RED,
+26 BLUE,
+27 GREEN;
+28 }
+29 }
+30
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/Example4.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/Example4.html
new file mode 100644
index 0000000000..37f42d9d88
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/Example4.html
@@ -0,0 +1,43 @@
+
+
+
+
Example4 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11 package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly;
+12
+13
+14 class Example4
+15 {
+16 private interface TestInterface
+17 {
+18 }
+19
+20 private
+21 class
+22 MyClass {
+23 }
+24
+25 enum Colors {RED,
+26 BLUE,
+27 GREEN;
+28 }
+29 }
+30
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyCommentBeforeLeftCurly.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyCommentBeforeLeftCurly.html
index 653d73afba..924fa5ec86 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyCommentBeforeLeftCurly.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyCommentBeforeLeftCurly.html
@@ -44,7 +44,7 @@
36 private void some()
throws Exception {
37 try {
38 throw new IOException();
-
39 }
catch (IOException | NullPointerException | ArithmeticException ex)
+
39 }
catch (IOException | NullPointerException | ArithmeticException ex)
40 {
41 }
42 }
@@ -58,7 +58,7 @@
50 Node next;
51
52 public
-
53 Node(
int value) {
+
53 Node(
int value) {
54 this .value=value;
55 }
56
@@ -71,7 +71,7 @@
63
64 public void array() {
65 Integer[] array =
null ;
-
66 for (Integer i: array) {
+
66 for (Integer i: array) {
67
68 }
69 }
@@ -98,12 +98,12 @@
90 { }
91 }
92
-
93 private void method() {
+
93 private void method() {
94 String b =
"🧐🧐🧐ccvb" ;
-
95 if (b.equals(
"🧐🧐" )) {
+
95 if (b.equals(
"🧐🧐" )) {
96
97 }
-
98 if (b.equals(
"s🧐d🧐a" )) {
+
98 if (b.equals(
"s🧐d🧐a" )) {
99 }
100
101 while (b ==
"😂🥳" ) { }
@@ -113,7 +113,7 @@
105 interface check {
106 }
107
-
108 class InputAstTreeStringPrinterFullOfBlockComments {
+
108 class InputAstTreeStringPrinterFullOfBlockComments {
109 public static String main(String[] args) {
110 String line =
"/*I'm NOT comment*/blabla" /*35*/;/*36*/
111 String.CASE_INSENSITIVE_ORDER.equals(line);
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyCommentBeforeLeftCurly2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyCommentBeforeLeftCurly2.html
index 594336f7fb..bc4e7a0b3c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyCommentBeforeLeftCurly2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyCommentBeforeLeftCurly2.html
@@ -37,9 +37,9 @@
29 }
30
31 void method2()
-
32 {
+
32 {
33 if (!Arrays.equals(
this .countList, countList)
-
34 ) {
+
34 ) {
35 }
36 }
37
@@ -47,7 +47,7 @@
39 { }
40
41
-
42 InputLeftCurlyCommentBeforeLeftCurly2() { }
+
42 InputLeftCurlyCommentBeforeLeftCurly2() { }
43
44 InputLeftCurlyCommentBeforeLeftCurly2(
int data)
45 { }
@@ -66,14 +66,14 @@
58
59 String s =
"🧐 🧐" ;
60 private void foo3(String s) {
-
61 if (
"🧐" .isEmpty()) {
+
61 if (
"🧐" .isEmpty()) {
62 }
63 }
64
65 List<ThrowingConsumer<InetSocketAddress>> targets = List.of(
66 (a) -> {Socket s =
new Socket();},
67
-
68 (b) -> {
+
68 (b) -> {
69 Socket s =
new Socket();
70 }
71 );
@@ -83,11 +83,11 @@
75 void method() {
76 int a = 9;
int b = 9;
77 if (a == 0 && b == 0
-
78 ) {}
+
78 ) {}
79 }
80
81 public void test2(String
-
82 ...para) {
+
82 ...para) {
83 }
84
85 public void test3(String line) {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyDefaultTestNl.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyDefaultTestNl.html
index 7d97b3a759..363c4e5abb 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyDefaultTestNl.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyDefaultTestNl.html
@@ -22,21 +22,21 @@
14 package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly;
15
16 public class InputLeftCurlyDefaultTestNl
-
17 {
+
17 {
18 private interface PrivateInterface
-
19 {
+
19 {
20 }
21
22 interface PackageInnerInterface
-
23 {
+
23 {
24 }
25
26 protected interface ProtectedInnerInterface
-
27 {
+
27 {
28 }
29
30 public interface PublicInnerInterface
-
31 {
+
31 {
32 }
33
34 private
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyDefaultTestNlow.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyDefaultTestNlow.html
index 64c17a2226..7be90f77d3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyDefaultTestNlow.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyDefaultTestNlow.html
@@ -72,9 +72,9 @@
64 class MyClass3 {
65 }
66
-
67 public class MyClass4 {
-
68 void method() {
-
69 while (
true ) {}
+
67 public class MyClass4 {
+
68 void method() {
+
69 while (
true ) {}
70 }
71 }
72 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyIgnoreEnumsOptTrue.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyIgnoreEnumsOptTrue.html
index 5fb5d3c44f..5ba8fd4039 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyIgnoreEnumsOptTrue.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyIgnoreEnumsOptTrue.html
@@ -22,7 +22,7 @@
14 package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly;
15
16 public class InputLeftCurlyIgnoreEnumsOptTrue {
-
17 enum Colors {RED,
+
17 enum Colors {RED,
18 BLUE,
19 GREEN;
20
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyMethod.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyMethod.html
index 169ea65eb9..79593ea661 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyMethod.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyMethod.html
@@ -24,14 +24,14 @@
16 class InputLeftCurlyMethod
17 {
18 InputLeftCurlyMethod () {}
-
19 InputLeftCurlyMethod (String aOne) {
+
19 InputLeftCurlyMethod (String aOne) {
20 }
21 InputLeftCurlyMethod (
int aOne)
22 {
23 }
24
25 void method1() {}
-
26 void method2() {
+
26 void method2() {
27 }
28 void method3()
29 {
@@ -44,7 +44,7 @@
36 {
37 }
38 void method6(String aOne,
-
39 String aTwo) {
+
39 String aTwo) {
40 }
41 }
42
@@ -53,7 +53,7 @@
45 CONSTANT1(
"hello" )
46 {
47 void method1() {}
-
48 void method2() {
+
48 void method2() {
49 }
50 void method3()
51 {
@@ -66,11 +66,11 @@
58 {
59 }
60 void method6(String aOne,
-
61 String aTwo) {
+
61 String aTwo) {
62 }
63 },
64
-
65 CONSTANT2(
"hello" ) {
+
65 CONSTANT2(
"hello" ) {
66
67 },
68
@@ -84,7 +84,7 @@
76 }
77
78 void method1() {}
-
79 void method2() {
+
79 void method2() {
80 }
81 void method3()
82 {
@@ -97,7 +97,7 @@
89 {
90 }
91 void method6(String aOne,
-
92 String aTwo) {
+
92 String aTwo) {
93 }
94 }
95
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyMethodTestNewLine2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyMethodTestNewLine2.html
index df2d6e2f8f..6494b4e5f0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyMethodTestNewLine2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyMethodTestNewLine2.html
@@ -22,26 +22,26 @@
14 package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly;
15
16 class InputLeftCurlyMethodTestNewLine2
-
17 {
+
17 {
18 void InputLeftCurlyMethod () {}
19 void InputLeftCurlyMethod (String aOne) {
20 }
21 void InputLeftCurlyMethod (
int aOne)
-
22 {
+
22 {
23 }
24
25 void method1() {}
26 void method2() {
27 }
28 void method3()
-
29 {
+
29 {
30 }
31 void method4()
-
32 {
+
32 {
33 }
34 void method5(String aOne,
35 String aTwo)
-
36 {
+
36 {
37 }
38 void method6(String aOne,
39 String aTwo) {
@@ -49,21 +49,21 @@
41 }
42
43 enum
InputLeftCurlyMethodEnumTestNewLine2
-
44 {
+
44 {
45 CONSTANT1()
-
46 {
+
46 {
47 void method1() {}
48 void method2() {
49 }
50 void method3()
-
51 {
+
51 {
52 }
53 void method4()
-
54 {
+
54 {
55 }
56 void method5(String aOne,
57 String aTwo)
-
58 {
+
58 {
59 }
60 void method6(String aOne,
61 String aTwo) {
@@ -75,11 +75,11 @@
67 },
68
69 CONSTANT3()
-
70 {
+
70 {
71 };
72
73 private void InputLeftCurlyMethodEnum (String value)
-
74 {
+
74 {
75
76 }
77
@@ -87,14 +87,14 @@
79 void method2() {
80 }
81 void method3()
-
82 {
+
82 {
83 }
84 void method4()
-
85 {
+
85 {
86 }
87 void method5(String aOne,
88 String aTwo)
-
89 {
+
89 {
90 }
91 void method6(String aOne,
92 String aTwo) {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefault.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefault.html
index 6742cb3d13..4f5e849689 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefault.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefault.html
@@ -41,40 +41,40 @@
33
34 private
35 class
-
36 MyClass1 {
+
36 MyClass1 {
37 }
38
39 class
-
40 MyClass2 {
+
40 MyClass2 {
41 }
42
43 private
44 interface
-
45 MyInterface1 {
+
45 MyInterface1 {
46 }
47
48 interface
-
49 MyInterface2 {
+
49 MyInterface2 {
50 }
51
52 protected
53 enum
-
54 MyEnum {
+
54 MyEnum {
55 }
56
57 private
58 @
interface
-
59 MyAnnotation {
+
59 MyAnnotation {
60 }
61
62 @Deprecated
63 public
-
64 class MyClass3 {
+
64 class MyClass3 {
65 }
66
-
67 public class MyClass4 {
-
68 void method() {
-
69 while (
true ) {}
+
67 public class MyClass4 {
+
68 void method() {
+
69 while (
true ) {}
70 }
71 }
72 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefault3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefault3.html
index 73de379553..88b503d67a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefault3.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefault3.html
@@ -36,7 +36,7 @@
28 {
29 break ;
30 }
-
31 else if (x < 0) {
+
31 else if (x < 0) {
32 ;
33 }
34 else
@@ -101,7 +101,7 @@
93 void method2()
94 {
95 boolean flag =
true ;
-
96 if (flag) {
+
96 if (flag) {
97 System.identityHashCode(
"heh" );
98 flag = !flag; } String.CASE_INSENSITIVE_ORDER.
99 equals(
"Xe-xe" );
@@ -152,7 +152,7 @@
144
145
146
-
147 class Absent_CustomFieldSerializer3 {
+
147 class Absent_CustomFieldSerializer3 {
148
149 public static void serialize() {}
150 }
@@ -168,14 +168,14 @@
160
161 class ClassWithStaticInitializers
162 {
-
163 static {
+
163 static {
164 }
165 static
166 {}
167
168 static class Inner
169 {
-
170 static {
+
170 static {
171 int i = 1;
172 }
173 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefaultLambda.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefaultLambda.html
index d2d40fce18..ee0c467265 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefaultLambda.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefaultLambda.html
@@ -23,7 +23,7 @@
15
16 public class InputLeftCurlyTestDefaultLambda
17 {
-
18 static Runnable r1 = () -> {
+
18 static Runnable r1 = () -> {
19 String.valueOf(
"Hello world one!" );
20 };
21
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefaultWithAnnotations.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefaultWithAnnotations.html
index ae38463491..e0df9fef00 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefaultWithAnnotations.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestDefaultWithAnnotations.html
@@ -53,16 +53,16 @@
45 }
46
47 @TestClassAnnotation
-
48 class InputLeftCurlyAnnotations2 {
+
48 class InputLeftCurlyAnnotations2 {
49 private static final int X = 10;
50 @Override
-
51 public boolean equals(Object other) {
+
51 public boolean equals(Object other) {
52 return false;
53 }
54
55 @Override
56 @SuppressWarnings(
"unused" )
-
57 public int hashCode() {
+
57 public int hashCode() {
58 int a = 10;
59 return 1;
60 }
@@ -84,7 +84,7 @@
76 }
77
78 @Target(ElementType.TYPE)
-
79 @
interface TestClassAnnotation {
+
79 @
interface TestClassAnnotation {
80 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestFirstLine.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestFirstLine.html
index 475f825f3d..02df455f1d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestFirstLine.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestFirstLine.html
@@ -26,7 +26,7 @@
18 import java.util.ArrayList;
19 import java.util.List;
20
-
21 class InputLeftCurlyTestFirstLine {
+
21 class InputLeftCurlyTestFirstLine {
22
23 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestInvalidOption.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestInvalidOption.html
index e8f4e0c73d..ed6e5adafe 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestInvalidOption.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestInvalidOption.html
@@ -22,59 +22,59 @@
14 package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly;
15
16 public class InputLeftCurlyTestInvalidOption
-
17 {
+
17 {
18 private interface PrivateInterface
-
19 {
+
19 {
20 }
21
22 interface PackageInnerInterface
-
23 {
+
23 {
24 }
25
26 protected interface ProtectedInnerInterface
-
27 {
+
27 {
28 }
29
30 public interface PublicInnerInterface
-
31 {
+
31 {
32 }
33
34 private
35 class
-
36 MyClass1 {
+
36 MyClass1 {
37 }
38
39 class
-
40 MyClass2 {
+
40 MyClass2 {
41 }
42
43 private
44 interface
-
45 MyInterface1 {
+
45 MyInterface1 {
46 }
47
48 interface
-
49 MyInterface2 {
+
49 MyInterface2 {
50 }
51
52 protected
53 enum
-
54 MyEnum {
+
54 MyEnum {
55 }
56
57 private
58 @
interface
-
59 MyAnnotation {
+
59 MyAnnotation {
60 }
61
62 @Deprecated
63 public
-
64 class MyClass3 {
+
64 class MyClass3 {
65 }
66
-
67 public class MyClass4 {
-
68 void method() {
-
69 while (
true ) {}
+
67 public class MyClass4 {
+
68 void method() {
+
69 while (
true ) {}
70 }
71 }
72 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNewLine3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNewLine3.html
index 2f100704bc..ea19c5dd85 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNewLine3.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNewLine3.html
@@ -22,29 +22,29 @@
14 package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly;
15
16 class InputLeftCurlyTestNewLine3
-
17 {
+
17 {
18
19 int foo()
throws InterruptedException
-
20 {
+
20 {
21 int x = 1;
22 int a = 2;
23 while (
true )
-
24 {
+
24 {
25 try
-
26 {
+
26 {
27 if (x > 0)
-
28 {
+
28 {
29 break ;
30 }
31 else if (x < 0) {
32 ;
33 }
34 else
-
35 {
+
35 {
36 break ;
37 }
38 switch (a)
-
39 {
+
39 {
40 case 0:
41 break ;
42 default :
@@ -52,19 +52,19 @@
44 }
45 }
46 catch (Exception e)
-
47 {
+
47 {
48 break ;
49 }
50 finally
-
51 {
+
51 {
52 break ;
53 }
54 }
55
56 synchronized (
this )
-
57 {
+
57 {
58 do
-
59 {
+
59 {
60 x = 2;
61 }
while (x == 2);
62 }
@@ -73,7 +73,7 @@
65 );
66
67 for (
int k = 0; k < 1; k++)
-
68 {
+
68 {
69 String innerBlockVariable =
"" ;
70 }
71
@@ -86,20 +86,20 @@
78
79
80 static
-
81 {
+
81 {
82 int x = 1;
83 }
84
85
86
87 public enum GreetingsEnum
-
88 {
+
88 {
89 HELLO,
90 GOODBYE
91 };
92
93 void method2()
-
94 {
+
94 {
95 boolean flag =
true ;
96 if (flag) {
97 System.identityHashCode(
"heh" );
@@ -116,10 +116,10 @@
108
109
110 class FooCtorTestNewLine3
-
111 {
+
111 {
112 int i;
113 public void FooCtor ()
-
114 {
+
114 {
115 i = 1;
116 }}
117
@@ -128,9 +128,9 @@
120
121
122 class FooMethodTestNewLine3
-
123 {
+
123 {
124 public void fooMethod()
-
125 {
+
125 {
126 int i = 1;
127 }}
128
@@ -139,11 +139,11 @@
131
132
133 class FooInnerTestNewLine3
-
134 {
+
134 {
135 class InnerFoo
-
136 {
+
136 {
137 public void fooInnerMethod ()
-
138 {
+
138 {
139
140 }
141 }}
@@ -158,7 +158,7 @@
150 }
151
152 class Absent_CustomFieldSerializer4TestNewLine3
-
153 {
+
153 {
154 public void Absent_CustomFieldSerializer4 () {}
155 }
156
@@ -167,14 +167,14 @@
159 interface EmptyInterface3TestNewLine3 {}
160
161 class ClassWithStaticInitializersTestNewLine3
-
162 {
+
162 {
163 static {
164 }
165 static
166 {}
167
168 static class Inner
-
169 {
+
169 {
170 static {
171 int i = 1;
172 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNewLineOptionWithLambda.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNewLineOptionWithLambda.html
index 923b6d5e6a..6a1e51689d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNewLineOptionWithLambda.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNewLineOptionWithLambda.html
@@ -22,7 +22,7 @@
14 package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly;
15
16 public class InputLeftCurlyTestNewLineOptionWithLambda
-
17 {
+
17 {
18 static Runnable r1 = () -> {
19 String.valueOf(
"Hello world one!" );
20 };
@@ -32,7 +32,7 @@
24 static Runnable r3 = () -> {String.valueOf(
"ok" );};
25
26 static Runnable r4 = () ->
-
27 {
+
27 {
28 String.valueOf(
"Hello world one!" );
29 };
30 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNlWithAnnotations.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNlWithAnnotations.html
index 83ed19980d..13287647bf 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNlWithAnnotations.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNlWithAnnotations.html
@@ -28,24 +28,24 @@
20
21 @TestClassAnnotation
22 class InputLeftCurlyTestNlWithAnnotations
-
23 {
+
23 {
24 private static final int X = 10;
25 @Override
26 public boolean equals(Object other)
-
27 {
+
27 {
28 return false;
29 }
30
31 @Override
32 @SuppressWarnings(
"unused" )
33 public int hashCode()
-
34 {
+
34 {
35 int a = 10;
36 return 1;
37 }
38
39 @Override @SuppressWarnings({
"unused" ,
"unchecked" ,
"static-access" })
public String toString()
-
40 {
+
40 {
41 Integer i =
this .X;
42 List<String> l =
new ArrayList();
43 return "SomeString" ;
@@ -68,7 +68,7 @@
60 }
61
62 @Override @SuppressWarnings({
"unused" ,
"unchecked" ,
"static-access" })
public String toString()
-
63 {
+
63 {
64 Integer i =
this .X;
65 List<String> l =
new ArrayList();
66 return "SomeString" ;
@@ -76,7 +76,7 @@
68
69 @Deprecated
70 @SuppressWarnings({
"unused" ,
"unchecked" ,
"static-access" })
public String toString2()
-
71 {
+
71 {
72 Integer i =
this .X;
73 List<String> l =
new ArrayList();
74 return "SomeString" ;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNlowWithAnnotations.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNlowWithAnnotations.html
index 5da6d9adc0..ba89a3f9d4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNlowWithAnnotations.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyTestNlowWithAnnotations.html
@@ -53,16 +53,16 @@
45 }
46
47 @TestClassAnnotation
-
48 class InputLeftCurlyAnnotations2TestNlowWithAnnotations {
+
48 class InputLeftCurlyAnnotations2TestNlowWithAnnotations {
49 private static final int X = 10;
50 @Override
-
51 public boolean equals(Object other) {
+
51 public boolean equals(Object other) {
52 return false;
53 }
54
55 @Override
56 @SuppressWarnings(
"unused" )
-
57 public int hashCode() {
+
57 public int hashCode() {
58 int a = 10;
59 return 1;
60 }
@@ -84,7 +84,7 @@
76 }
77
78 @Target(ElementType.TYPE)
-
79 @
interface TestClassTestNlowWithAnnotation {
+
79 @
interface TestClassTestNlowWithAnnotation {
80 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyWithEmoji.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyWithEmoji.html
index 48f443aca3..528b6cc2ed 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyWithEmoji.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyWithEmoji.html
@@ -24,21 +24,21 @@
16 public class InputLeftCurlyWithEmoji {
17 static Runnable r1 = () -> {String.valueOf(
"🥳 🎄!" );};
18
-
19 private void method() {
+
19 private void method() {
20
21 String a =
"🧐🧐🧐" ;
22
23 String b =
"🧐🧐🧐ccvb" ;
-
24 if (b.equals(
"🧐🧐" )) {
+
24 if (b.equals(
"🧐🧐" )) {
25
26 }
-
27 if (b.equals(
"s🧐d🧐a" )) {
+
27 if (b.equals(
"s🧐d🧐a" )) {
28 }
29
30 while (b ==
"😂🥳" ) { }
31 }
32
-
33 private void method2() {
+
33 private void method2() {
34 String x =
"🎄🤣" ;
35
36 try
@@ -47,7 +47,7 @@
39 {
40
41 }
-
42 else if (!x.equals(
"🎄🤣" )) {
+
42 else if (!x.equals(
"🎄🤣" )) {
43 ;
44 }
45 else
@@ -79,8 +79,8 @@
71 enum
InputLeftCurlyMethodEnumWithEmoji
72 {
73 CONSTANT1(
"🧐🧐dsds🧐" ) {
-
74 void method1() {}
-
75 void method2() {
+
74 void method1() {}
+
75 void method2() {
76 }
77 void method3()
78 {
@@ -90,7 +90,7 @@
82 }
83 };
84
-
85 private InputLeftCurlyMethodEnumWithEmoji (String s) {
+
85 private InputLeftCurlyMethodEnumWithEmoji (String s) {
86 }
87 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyWithEmojiNl.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyWithEmojiNl.html
index e6609d9ad5..b19c577077 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyWithEmojiNl.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyWithEmojiNl.html
@@ -22,7 +22,7 @@
14 package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly;
15
16 public class InputLeftCurlyWithEmojiNl
-
17 {
+
17 {
18 static Runnable r1 = () -> {String.valueOf(
"🥳🎄!" );};
19
20 private void method() {
@@ -43,24 +43,24 @@
35 String x =
"🎄🤣" ;
36
37 try
-
38 {
+
38 {
39 if (x.equals(
"🎄🤣" ))
-
40 {
+
40 {
41
42 }
43 else if (!x.equals(
"🎄🤣" )) {
44 ;
45 }
46 else
-
47 {
+
47 {
48
49 }
50 switch (x)
-
51 {
+
51 {
52 case "🤣🤣🤣" :
53 break ;
54 default :
-
55 {
+
55 {
56 break ;
57 }
58 }
@@ -74,22 +74,22 @@
66 }
67 }
68 catch (Exception e)
-
69 {
+
69 {
70 }
71 }
72 }
73 enum
InputLeftCurlyMethodEnumWithEmojiNl
-
74 {
+
74 {
75 CONSTANT1(
"🧐🧐dsds🧐" ) {
76 String method1() {
return "sds🧐" ; }
77 void method2() {
78 }
79 String method3()
-
80 {
+
80 {
81 return "sds🧐" ;
82 }
83 boolean method4()
-
84 {
+
84 {
85 return "sds🧐" .equals(
"🧐🧐dsds🧐" );
86 }
87 };
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyWithTrimOptionProperty.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyWithTrimOptionProperty.html
index 8d14985302..2a2ecfd484 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyWithTrimOptionProperty.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/InputLeftCurlyWithTrimOptionProperty.html
@@ -24,7 +24,7 @@
16 {}
17
18 static class Inner
-
19 {
+
19 {
20 static {
21 int i = 1;
22 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-frame.html
index af8807c3ac..754aa9521f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly
@@ -65,6 +65,54 @@
Classes
EmptyInterface3TestNewLine3
+
+
+ Example1
+
+
+ Example1.Colors
+
+
+ Example1.MyClass
+
+
+ Example1.TestInterface
+
+
+ Example2
+
+
+ Example2.Colors
+
+
+ Example2.MyClass
+
+
+ Example2.TestInterface
+
+
+ Example3
+
+
+ Example3.Colors
+
+
+ Example3.MyClass
+
+
+ Example3.TestInterface
+
+
+ Example4
+
+
+ Example4.Colors
+
+
+ Example4.MyClass
+
+
+ Example4.TestInterface
FooCtor
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-summary.html
index 8812a416fd..d180863ae5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/leftcurly/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.leftcurly
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
+
+
+ Example1
+
+
+
+
+ Example1.Colors
+
+
+
+
+ Example1.MyClass
+
+
+
+
+ Example1.TestInterface
+
+
+
+
+ Example2
+
+
+
+
+ Example2.Colors
+
+
+
+
+ Example2.MyClass
+
+
+
+
+ Example2.TestInterface
+
+
+
+
+ Example3
+
+
+
+
+ Example3.Colors
+
+
+
+
+ Example3.MyClass
+
+
+
+
+ Example3.TestInterface
+
+
+
+
+ Example4
+
+
+
+
+ Example4.Colors
+
+
+
+
+ Example4.MyClass
+
+
+
+
+ Example4.TestInterface
+
@@ -766,7 +846,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesEmptySingleLineDefaultStmt.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesEmptySingleLineDefaultStmt.html
index 72159dd339..10ffb143b5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesEmptySingleLineDefaultStmt.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesEmptySingleLineDefaultStmt.html
@@ -32,7 +32,7 @@
24 }
25
26 @interface ExampleEmptySingleLineDefaultStmt {
-27 String priority() default "value" ;
+27 String priority() default "value" ;
28 }
29
30 interface IntefaceWithDefaultMethodEmptySingleLineDefaultStmt {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesLoopBodyTrue.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesLoopBodyTrue.html
index 4db8306796..cc1fd1d150 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesLoopBodyTrue.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesLoopBodyTrue.html
@@ -24,64 +24,64 @@
16
17 {
18 value = 0;
-19 while (incrementValue() < 5);;
+19 while (incrementValue() < 5);;
20 }
21
22 public void foo() {
-23 while (incrementValue() < 5);
+23 while (incrementValue() < 5);
24 }
25
26 public void foo2() {
-27 for (int i = 0; i < 10; incrementValue());
-28 for (int i = 0; incrementValue() < 8; i++);
+27 for (int i = 0; i < 10; incrementValue());
+28 for (int i = 0; incrementValue() < 8; i++);
29 }
30
31 public void foo3() {
-32 while (incrementValue()
+32 while (incrementValue()
33 < 5);
34 }
35
36 public void foo4() {
-37 while (incrementValue() < 5)
+37 while (incrementValue() < 5)
38 ;
39 }
40
41 public void foo5() {
-42 while (incrementValue()
+42 while (incrementValue()
43 < 5)
44 ;
45 }
46
47 public void foo6() {
-48 while (
+48 while (
49 incrementValue() < 5
50 );
51 }
52
53 public void foo7() {
-54 while (
+54 while (
55 incrementValue() < 5);
56 }
57
58 public void foo8() {
-59 for (int i = 0; incrementValue() < 8; i++);
+59 for (int i = 0; incrementValue() < 8; i++);
60 }
61
62 public void foo9() {
-63 for (int i = 0;
+63 for (int i = 0;
64 incrementValue() < 8;
65 i++);
66 }
67
68 public void foo10() {
-69 for (
+69 for (
70 int i = 0;
71 incrementValue() < 8;
72 i++);
73 }
74
75 public void foo11() {
-76 for
+76 for
77 (
78 int i = 0;
79 incrementValue() < 8;
@@ -103,11 +103,11 @@
95 }
96
97 public void foo15() {
-98 while (true );
+98 while (true );
99 }
100
101 public void foo16() {
-102 for (;;);
+102 for (;;);
103 }
104
105 public void foo17() {
@@ -122,7 +122,7 @@
114
115 @Override
116 public String toString(){
-117 while (fco.removeAssignedRole(this ));
+117 while (fco.removeAssignedRole(this ));
118 return "" ;
119 }
120
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesSingleLineStatements.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesSingleLineStatements.html
index c40767bd9c..10386e5b79 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesSingleLineStatements.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesSingleLineStatements.html
@@ -86,10 +86,10 @@
78 int counter = 0;
79 switch (num) {
80 case 1: counter++; break ;
-81 case 2:
+81 case 2:
82 counter += 2;
83 break ;
-84 case 3:
+84 case 3:
85 counter += 3;
86 break ;
87 case 6: counter += 10; break ;
@@ -136,9 +136,9 @@
128 private void method(){
129 if (false) {
130 switch (0) {
-131 case -1:
+131 case -1:
132 return ;
-133 default :
+133 default :
134 return ;
135 }
136 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestCycles.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestCycles.html
index 37b018b093..62a72e8334 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestCycles.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestCycles.html
@@ -55,10 +55,10 @@
47 case 3: {
48 break ;}
49
-50 case 4:
+50 case 4:
51 break ;
52
-53 case 5: System.lineSeparator();
+53 case 5: System.lineSeparator();
54 break ;
55 }
56
@@ -70,7 +70,7 @@
62 }
63
64 switch (1) {
-65 default :
+65 default :
66 break ;
67 }
68
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestItWithAllowsOn.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestItWithAllowsOn.html
index 4c77cd9b50..3344968ec2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestItWithAllowsOn.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestItWithAllowsOn.html
@@ -36,7 +36,7 @@
28 while (condition());
29
30
-31 do testDoWhile(); while (condition());
+31 do testDoWhile(); while (condition());
32 }
33
34
@@ -48,10 +48,10 @@
40 }
41
42
-43 while (condition());
+43 while (condition());
44 while (condition())
45 testWhile();
-46 while (condition())
+46 while (condition())
47 if (condition())
48 testWhile();
49 }
@@ -65,7 +65,7 @@
57 }
58
59
-60 for (int i = 1;i < 5;i++);
+60 for (int i = 1;i < 5;i++);
61 for (int i = 1; i < 5; i++)
62 testFor();
63 for (int i = 1; i < 5;
@@ -89,7 +89,7 @@
81 }
82
83
-84 if (condition());
+84 if (condition());
85 if (condition())
86 testIf();
87 if (condition())
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestSingleLineCaseDefault.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestSingleLineCaseDefault.html
index 00076deb93..783d2530c9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestSingleLineCaseDefault.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestSingleLineCaseDefault.html
@@ -37,13 +37,13 @@
29 }
30
31 private int foo2() {
-32 if (SomeClass.test(true ) == true )
+32 if (SomeClass.test(true ) == true )
33 return 4;
34 return 0;
35 }
36
37 private int foo3() {
-38 if (SomeClass.test(true ) == true ) if (true ) return 4;
+38 if (SomeClass.test(true ) == true ) if (true ) return 4;
39 return 0;
40 }
41
@@ -52,7 +52,7 @@
44 }
45
46 private void foo2(Object o) {
-47 if (o != null )
+47 if (o != null )
48 this .notify();
49 }
50
@@ -60,23 +60,23 @@
52 while (o != null ) {
53 this .notify();
54 }
-55 while (o != null )
+55 while (o != null )
56 this .notify();
57 while (o != null ) this .notify();
58 do {
59 this .notify();
60 } while (o != null );
61 do this .notify(); while (o != null );
-62 do
+62 do
63 this .notify();
64 while (o != null );
-65 for (;;)
+65 for (;;)
66 break ;
67 for (;;) break ;
68 for (int i = 0; i < 10; i++) {
69 this .notify();
70 }
-71 for (int i = 0; i < 10; i++)
+71 for (int i = 0; i < 10; i++)
72 this .notify();
73 for (int i = 0; ; ) this .notify();
74 }
@@ -105,11 +105,11 @@
97 }
98
99 private int testMissingWarnings() {
-100 if (true )
+100 if (true )
101 throw new RuntimeException();
102 if (true ) {
103 return 1;
-104 } else
+104 } else
105 return 2;
106 }
107
@@ -121,14 +121,14 @@
113
114 private class StateInfo {
115 public boolean isInitial() {
-116 for (int locator: sourceLocators) if (locator != 0) return false;
+116 for (int locator: sourceLocators) if (locator != 0) return false;
117 return true ;
118 }
119 }
120
121 private void forEachLoop() {
122 for (String s: new String[]{"" }) break ;
-123 for (String s: new String[]{"" })
+123 for (String s: new String[]{"" })
124 break ;
125 for (;;)
126 ;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestSingleLineCaseDefault2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestSingleLineCaseDefault2.html
index fe429645d8..f5f8a624fd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestSingleLineCaseDefault2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestSingleLineCaseDefault2.html
@@ -32,7 +32,7 @@
24 }
25
26 @interface Example {
-27 String priority() default "value" ;
+27 String priority() default "value" ;
28 }
29
30 interface IntefaceWithDefaultMethod {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestSingleLineLambda.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestSingleLineLambda.html
index 2aead0e3ca..97c9dd827c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestSingleLineLambda.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/InputNeedBracesTestSingleLineLambda.html
@@ -19,8 +19,8 @@
11
12 public class InputNeedBracesTestSingleLineLambda {
13
-14 static Runnable r1 = ()->String.CASE_INSENSITIVE_ORDER.equals("Hello world one!" );
-15 static Runnable r2 = () -> String.CASE_INSENSITIVE_ORDER.equals("Hello world two!" );
+14 static Runnable r1 = ()->String.CASE_INSENSITIVE_ORDER.equals("Hello world one!" );
+15 static Runnable r2 = () -> String.CASE_INSENSITIVE_ORDER.equals("Hello world two!" );
16 static Runnable r3 = () ->
17 String.CASE_INSENSITIVE_ORDER.equals("Hello world two!" );
18 static Runnable r4 = () -> {String.CASE_INSENSITIVE_ORDER.equals("Hello world two!" );};
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-frame.html
index 8e8ec98aa7..61ea196c38 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.needbraces
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.needbraces
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-summary.html
index 04ec00a59f..bf8d0e4913 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/needbraces/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.needbraces
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.needbraces
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -181,7 +181,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-frame.html
index c1712279d8..7b89257673 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-summary.html
index a06ed8ad51..563bcc264f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -136,7 +136,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestAlone.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestAlone.html
index dea87a8c5a..f959dbdb02 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestAlone.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestAlone.html
@@ -92,7 +92,7 @@
84 {
85 HELLO,
86 GOODBYE
-87 };
+87 };
88
89 void method2()
90 {
@@ -117,7 +117,7 @@
109 public void FooCtor ()
110 {
111 i = 1;
-112 }}
+112 }}
113
114
115
@@ -128,7 +128,7 @@
120 public void fooMethod()
121 {
122 int i = 1;
-123 }}
+123 }}
124
125
126
@@ -142,7 +142,7 @@
134 {
135
136 }
-137 }}
+137 }}
138
139
140
@@ -150,17 +150,17 @@
142
143 class Absent_CustomFieldSerializer3TestAlone {
144
-145 public static void serialize() {}
+145 public static void serialize() {}
146 }
147
148 class Absent_CustomFieldSerializer4TestAlone
149 {
-150 public void Absent_CustomFieldSerializer4 () {}
+150 public void Absent_CustomFieldSerializer4 () {}
151 }
152
-153 class EmptyClass2TestAlone {}
+153 class EmptyClass2TestAlone {}
154
-155 interface EmptyInterface3TestAlone {}
+155 interface EmptyInterface3TestAlone {}
156
157 class ClassWithStaticInitializersTestAlone
158 {
@@ -204,21 +204,21 @@
196 @Override
197 public Thread newThread(final Runnable r) {
198 return new Thread(r);
-199 }};
+199 }};
200
201 interface Interface1
202 {
203 int i = 1;
-204 public void meth1(); }
+204 public void meth1(); }
205
206 interface Interface2
-207 { int i = 1; public void meth1(); }
+207 { int i = 1; public void meth1(); }
208
209 interface Interface3 {
210 void display();
211 interface Interface4 {
212 void myMethod();
-213 }}
+213 }}
214 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestDefault.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestDefault.html
index 0f3e9696b3..f43d2279d3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestDefault.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestDefault.html
@@ -61,7 +61,7 @@
53 do
54 {
55 x = 2;
-56 } while (x == 2);
+56 } while (x == 2);
57 }
58
59 this .wait(666
@@ -91,7 +91,7 @@
83 {
84 HELLO,
85 GOODBYE
-86 };
+86 };
87
88 void method2()
89 {
@@ -102,7 +102,7 @@
94 CASE_INSENSITIVE_ORDER.equals("Xe-xe" );
95
96
-97 if (flag) { String.CASE_INSENSITIVE_ORDER.equals("it is ok." ); }
+97 if (flag) { String.CASE_INSENSITIVE_ORDER.equals("it is ok." ); }
98 }
99 }
100
@@ -116,7 +116,7 @@
108 public FooCtor ()
109 {
110 i = 1;
-111 }}
+111 }}
112
113
114
@@ -127,7 +127,7 @@
119 public void fooMethod()
120 {
121 int i = 1;
-122 }}
+122 }}
123
124
125
@@ -141,7 +141,7 @@
133 {
134
135 }
-136 }}
+136 }}
137
138
139
@@ -149,17 +149,17 @@
141
142 class Absent_CustomFieldSerializer3 {
143
-144 public static void serialize() {}
+144 public static void serialize() {}
145 }
146
147 class Absent_CustomFieldSerializer4
148 {
-149 public Absent_CustomFieldSerializer4 () {}
+149 public Absent_CustomFieldSerializer4 () {}
150 }
151
-152 class EmptyClass2 {}
+152 class EmptyClass2 {}
153
-154 interface EmptyInterface3 {}
+154 interface EmptyInterface3 {}
155
156 class ClassWithStaticInitializers
157 {
@@ -178,23 +178,23 @@
170 public void emptyBlocks() {
171 try {
172
-173 } catch (RuntimeException e) {
+173 } catch (RuntimeException e) {
174 new Object();
-175 } catch (Exception e) {
+175 } catch (Exception e) {
176
-177 } catch (Throwable e) {
-178 } finally {
+177 } catch (Throwable e) {
+178 } finally {
179
180 }
181
182 do {
-183 } while (true );
+183 } while (true );
184 }
185
186 public void codeAfterLastRightCurly() {
187 while (new Object().equals(new Object())) {
-188 };
-189 for (int i = 0; i < 1; i++) { new Object(); };
+188 };
+189 for (int i = 0; i < 1; i++) { new Object(); };
190 }
191
192 static final java.util.concurrent.ThreadFactory threadFactory
@@ -202,21 +202,21 @@
194 @Override
195 public Thread newThread(final Runnable r) {
196 return new Thread(r);
-197 }};
+197 }};
198
199 interface Interface1
200 {
201 int i = 1;
-202 public void meth1(); }
+202 public void meth1(); }
203
204 interface Interface2
-205 { int i = 1; public void meth1(); }
+205 { int i = 1; public void meth1(); }
206
207 interface Interface3 {
208 void display();
209 interface Interface4 {
210 void myMethod();
-211 }}
+211 }}
212 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestNewLine.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestNewLine.html
index ba75decad4..852e1ebad1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestNewLine.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestNewLine.html
@@ -30,10 +30,10 @@
22 if (x > 0)
23 {
24 break ;
-25 }
+25 }
26 else if (x < 0) {
27 ;
-28 }
+28 }
29 else
30 {
31 break ;
@@ -45,11 +45,11 @@
37 default :
38 break ;
39 }
-40 }
+40 }
41 catch (Exception e)
42 {
43 break ;
-44 }
+44 }
45 finally
46 {
47 break ;
@@ -61,7 +61,7 @@
53 do
54 {
55 x = 2;
-56 } while (x == 2);
+56 } while (x == 2);
57 }
58
59 this .wait(666
@@ -98,11 +98,11 @@
90 boolean flag = true ;
91 if (flag) {
92 System.identityHashCode("heh" );
-93 flag = !flag; } String.CASE_INSENSITIVE_ORDER.
+93 flag = !flag; } String.CASE_INSENSITIVE_ORDER.
94 equals("Xe-xe" );
95
96
-97 if (flag) { String.CASE_INSENSITIVE_ORDER.equals("it is ok." ); }
+97 if (flag) { String.CASE_INSENSITIVE_ORDER.equals("it is ok." ); }
98 }
99 }
100
@@ -178,23 +178,23 @@
170 public void emptyBlocks() {
171 try {
172
-173 } catch (RuntimeException e) {
+173 } catch (RuntimeException e) {
174 new Object();
-175 } catch (Exception e) {
+175 } catch (Exception e) {
176
-177 } catch (Throwable e) {
-178 } finally {
+177 } catch (Throwable e) {
+178 } finally {
179
180 }
181
182 do {
-183 } while (true );
+183 } while (true );
184 }
185
186 public void codeAfterLastRightCurly() {
187 while (new Object().equals(new Object())) {
-188 };
-189 for (int i = 0; i < 1; i++) { new Object(); };
+188 };
+189 for (int i = 0; i < 1; i++) { new Object(); };
190 }
191
192 static final java.util.concurrent.ThreadFactory threadFactory
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestSame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestSame.html
index 5906ecec90..e90820acad 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestSame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestSame.html
@@ -62,7 +62,7 @@
54 do
55 {
56 x = 2;
-57 } while (x == 2);
+57 } while (x == 2);
58 }
59
60 this .wait(666
@@ -103,7 +103,7 @@
95 CASE_INSENSITIVE_ORDER.equals("Xe-xe" );
96
97
-98 if (flag) { String.CASE_INSENSITIVE_ORDER.equals("it is ok." ); }
+98 if (flag) { String.CASE_INSENSITIVE_ORDER.equals("it is ok." ); }
99 }
100 }
101
@@ -117,7 +117,7 @@
109 public void FooCtor ()
110 {
111 i = 1;
-112 }}
+112 }}
113
114
115
@@ -128,7 +128,7 @@
120 public void fooMethod()
121 {
122 int i = 1;
-123 }}
+123 }}
124
125
126
@@ -142,7 +142,7 @@
134 {
135
136 }
-137 }}
+137 }}
138
139
140
@@ -150,17 +150,17 @@
142
143 class Absent_CustomFieldSerializer3TestSame {
144
-145 public static void serialize() {}
+145 public static void serialize() {}
146 }
147
148 class Absent_CustomFieldSerializer4TestSame
149 {
-150 public void Absent_CustomFieldSerializer4 () {}
+150 public void Absent_CustomFieldSerializer4 () {}
151 }
152
-153 class EmptyClass2TestSame {}
+153 class EmptyClass2TestSame {}
154
-155 interface EmptyInterface3TestSame {}
+155 interface EmptyInterface3TestSame {}
156
157 class ClassWithStaticInitializersTestSame
158 {
@@ -179,17 +179,17 @@
171 public void emptyBlocks() {
172 try {
173
-174 } catch (RuntimeException e) {
+174 } catch (RuntimeException e) {
175 new Object();
-176 } catch (Exception e) {
+176 } catch (Exception e) {
177
-178 } catch (Throwable e) {
-179 } finally {
+178 } catch (Throwable e) {
+179 } finally {
180
181 }
182
183 do {
-184 } while (true );
+184 } while (true );
185 }
186
187 public void codeAfterLastRightCurly() {
@@ -203,21 +203,21 @@
195 @Override
196 public Thread newThread(final Runnable r) {
197 return new Thread(r);
-198 }};
+198 }};
199
200 interface Interface1
201 {
202 int i = 1;
-203 public void meth1(); }
+203 public void meth1(); }
204
205 interface Interface2
-206 { int i = 1; public void meth1(); }
+206 { int i = 1; public void meth1(); }
207
208 interface Interface3 {
209 void display();
210 interface Interface4 {
211 void myMethod();
-212 }}
+212 }}
213 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestShouldStartLine2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestShouldStartLine2.html
index bca556e7a4..f6ff8b5000 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestShouldStartLine2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyLeftTestShouldStartLine2.html
@@ -30,10 +30,10 @@
22 if (x > 0)
23 {
24 break ;
-25 }
+25 }
26 else if (x < 0) {
27 ;
-28 }
+28 }
29 else
30 {
31 break ;
@@ -45,11 +45,11 @@
37 default :
38 break ;
39 }
-40 }
+40 }
41 catch (Exception e)
42 {
43 break ;
-44 }
+44 }
45 finally
46 {
47 break ;
@@ -61,7 +61,7 @@
53 do
54 {
55 x = 2;
-56 } while (x == 2);
+56 } while (x == 2);
57 }
58
59 this .wait(666
@@ -98,11 +98,11 @@
90 boolean flag = true ;
91 if (flag) {
92 System.identityHashCode("heh" );
-93 flag = !flag; } String.CASE_INSENSITIVE_ORDER.
+93 flag = !flag; } String.CASE_INSENSITIVE_ORDER.
94 equals("Xe-xe" );
95
96
-97 if (flag) { String.CASE_INSENSITIVE_ORDER.equals("it is ok." ); }
+97 if (flag) { String.CASE_INSENSITIVE_ORDER.equals("it is ok." ); }
98 }
99 }
100
@@ -149,17 +149,17 @@
141
142 class Absent_CustomFieldSerializer3TestShouldStartLine2 {
143
-144 public static void serialize() {}
+144 public static void serialize() {}
145 }
146
147 class Absent_CustomFieldSerializer4TestShouldStartLine2
148 {
-149 public void Absent_CustomFieldSerializer4 () {}
+149 public void Absent_CustomFieldSerializer4 () {}
150 }
151
-152 class EmptyClass2TestShouldStartLine2 {}
+152 class EmptyClass2TestShouldStartLine2 {}
153
-154 interface EmptyInterface3TestShouldStartLine2 {}
+154 interface EmptyInterface3TestShouldStartLine2 {}
155
156 class ClassWithStaticInitializersTestShouldStartLine2
157 {
@@ -178,23 +178,23 @@
170 public void emptyBlocks() {
171 try {
172
-173 } catch (RuntimeException e) {
+173 } catch (RuntimeException e) {
174 new Object();
-175 } catch (Exception e) {
+175 } catch (Exception e) {
176
-177 } catch (Throwable e) {
-178 } finally {
+177 } catch (Throwable e) {
+178 } finally {
179
180 }
181
182 do {
-183 } while (true );
+183 } while (true );
184 }
185
186 public void codeAfterLastRightCurly() {
187 while (new Object().equals(new Object())) {
-188 };
-189 for (int i = 0; i < 1; i++) { new Object(); };
+188 };
+189 for (int i = 0; i < 1; i++) { new Object(); };
190 }
191
192 static final java.util.concurrent.ThreadFactory threadFactory
@@ -210,7 +210,7 @@
202 public void meth1(); }
203
204 interface Interface2
-205 { int i = 1; public void meth1(); }
+205 { int i = 1; public void meth1(); }
206
207 interface Interface3 {
208 void display();
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyNewTokensAloneOrSingleLine.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyNewTokensAloneOrSingleLine.html
index eb779e322b..5bb5860f2e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyNewTokensAloneOrSingleLine.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyNewTokensAloneOrSingleLine.html
@@ -18,12 +18,12 @@
10
11 public class InputRightCurlyNewTokensAloneOrSingleLine {
12
-13 enum TestEnum{}
+13 enum TestEnum{}
14
15 enum TestEnum1{
16 SOME_VALUE;}
17
-18 enum TestEnum2 { SOME_VALUE; }
+18 enum TestEnum2 { SOME_VALUE; }
19
20 enum TestEnum3{
21 SOME_VALUE;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestEmptyOnSingleLine.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestEmptyOnSingleLine.html
index cd4ba8df59..c89e10c78d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestEmptyOnSingleLine.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestEmptyOnSingleLine.html
@@ -17,7 +17,7 @@
9
10 package com.puppycrawl.tools.checkstyle.checks.blocks.rightcurly;
11
-12 public class InputRightCurlyTestEmptyOnSingleLine {}
+12 public class InputRightCurlyTestEmptyOnSingleLine {}
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestForceLineBreakBefore2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestForceLineBreakBefore2.html
index 3b8585bbf4..2e35466219 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestForceLineBreakBefore2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestForceLineBreakBefore2.html
@@ -43,19 +43,19 @@
35 } catch (Exception e) { break ; } finally { break ; }
36 }
37
-38 synchronized (this ) { do { x = 2; } while (x == 2); }
+38 synchronized (this ) { do { x = 2; } while (x == 2); }
39
40 synchronized (this ) {
-41 do {} while (x == 2);
+41 do {} while (x == 2);
42 }
43
-44 for (int k = 0; k < 1; k++) { String innerBlockVariable = "" ; }
+44 for (int k = 0; k < 1; k++) { String innerBlockVariable = "" ; }
45
-46 for (int k = 0; k < 1; k++) {}
+46 for (int k = 0; k < 1; k++) {}
47 return a;
48 }
49
-50 static { int x = 1; }
+50 static { int x = 1; }
51
52 void method2()
53 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestInvalidOption.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestInvalidOption.html
index 7cd551c724..668f963330 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestInvalidOption.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestInvalidOption.html
@@ -24,7 +24,7 @@
16 try
17 {
18
-19 }
+19 }
20 catch (Exception e)
21 {
22 return ;
@@ -34,7 +34,7 @@
26
27 }
28
-29 class UniqEmptyClassTestInvalidOption {private int a;}
+29 class UniqEmptyClassTestInvalidOption {private int a;}
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestIsAloneLambda.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestIsAloneLambda.html
index 9441ebaa86..cac4bba6ff 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestIsAloneLambda.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestIsAloneLambda.html
@@ -27,10 +27,10 @@
19
20 static Runnable r2 = () -> String.valueOf("Test rightCurly two!" );
21
-22 static Runnable r3 = () -> {String.valueOf("Test rightCurly three!" );};
+22 static Runnable r3 = () -> {String.valueOf("Test rightCurly three!" );};
23
24 static Runnable r4 = () -> {
-25 String.valueOf("Test rightCurly four!" );};
+25 String.valueOf("Test rightCurly four!" );};
26
27 static Runnable r5 = () ->
28 {
@@ -48,7 +48,7 @@
40
41 static Runnable r9 = () -> {
42 String.valueOf("Test rightCurly nine!" );
-43 }; int i;
+43 }; int i;
44
45 void foo1() {
46 Stream.of("Hello" ).filter(s -> {
@@ -58,7 +58,7 @@
50
51 Stream.of("Hello" ).filter(s -> {
52 return s != null ;
-53 }).collect(Collectors.toList());
+53 }).collect(Collectors.toList());
54 }
55 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestIsAloneOrSinglelineLambda.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestIsAloneOrSinglelineLambda.html
index 7c34f10916..d968fb09ee 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestIsAloneOrSinglelineLambda.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestIsAloneOrSinglelineLambda.html
@@ -30,7 +30,7 @@
22 static Runnable r3 = () -> {String.valueOf("Test rightCurly three!" );};
23
24 static Runnable r4 = () -> {
-25 String.valueOf("Test rightCurly four!" );};
+25 String.valueOf("Test rightCurly four!" );};
26
27 static Runnable r5 = () ->
28 {
@@ -48,7 +48,7 @@
40
41 static Runnable r9 = () -> {
42 String.valueOf("Test rightCurly nine!" );
-43 }; int i;
+43 }; int i;
44
45 void foo1() {
46 Stream.of("Hello" ).filter(s -> {
@@ -58,9 +58,9 @@
50
51 Stream.of("Hello" ).filter(s -> {
52 return s != null ;
-53 }).collect(Collectors.toList());
+53 }).collect(Collectors.toList());
54
-55 Stream.of("H" ).filter(s -> {return s != null ;}).collect(Collectors.toList());
+55 Stream.of("H" ).filter(s -> {return s != null ;}).collect(Collectors.toList());
56 }
57 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestIsSameLambda.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestIsSameLambda.html
index 443f444d99..6617583036 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestIsSameLambda.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestIsSameLambda.html
@@ -30,7 +30,7 @@
22 static Runnable r3 = () -> {String.valueOf("Test rightCurly three!" );};
23
24 static Runnable r4 = () -> {
-25 String.valueOf("Test rightCurly four!" );};
+25 String.valueOf("Test rightCurly four!" );};
26
27 static Runnable r5 = () ->
28 {
@@ -48,12 +48,12 @@
40
41 static Runnable r9 = () -> {
42 String.valueOf("Test rightCurly nine!" );
-43 }; int i;
+43 }; int i;
44
45 void foo1() {
46 Stream.of("Hello" ).filter(s -> {
47 return s != null ;
-48 }
+48 }
49 ).collect(Collectors.toList());
50
51 Stream.of("Hello" ).filter(s -> {
@@ -66,7 +66,7 @@
58 Stream.of("Hello" ).filter(s -> {return s != null ;}).collect(Collectors.toList());
59
60 Stream.of("Hello" ).filter(s -> {
-61 return s != null ;}).collect(Collectors.toList());
+61 return s != null ;}).collect(Collectors.toList());
62
63 bar(() -> {return ;}, () -> {return ;});
64
@@ -81,12 +81,12 @@
73 });
74
75 bar(() -> {
-76 return ;}, () -> {return ;});
+76 return ;}, () -> {return ;});
77
78 bar(() -> {
79 return ;
80 }, () -> {
-81 return ;});
+81 return ;});
82
83 }
84
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestNullPointerException.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestNullPointerException.html
index b1eba52817..70d9208073 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestNullPointerException.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestNullPointerException.html
@@ -24,7 +24,7 @@
16 void foo() {
17 while (true );
18 }
-19 }
+19 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.html
index 21c904d847..3c3a94140a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi.html
@@ -18,18 +18,18 @@
10
11 public class InputRightCurlyTestOptAloneOrSingleLineBlocksWithSemi {
12
-13 public void testMethod() {};
+13 public void testMethod() {};
14
15 public void testMethod1() {
16 };
17
-18 public class TestClass {};
+18 public class TestClass {};
19
20 public class TestClass1 {
21 };
22
23 public class TestClass2 {
-24 public TestClass2() {};
+24 public TestClass2() {};
25
26 public TestClass2(String someValue) {
27 };
@@ -42,7 +42,7 @@
34 public @interface TestAnnnotation5 {
35 String someValue(); };
36
-37 public @interface TestAnnotation6 {};
+37 public @interface TestAnnotation6 {};
38
39 public @interface TestAnnotation7 {
40 String someValue();
@@ -51,14 +51,14 @@
43 public @interface TestAnnotation8 { String someValue();
44 };
45
-46 public @interface TestAnnotation9 { String someValue(); };
+46 public @interface TestAnnotation9 { String someValue(); };
47
-48 enum TestEnum{};
+48 enum TestEnum{};
49
50 enum TestEnum1{
51 SOME_VALUE;};
52
-53 enum TestEnum2 { SOME_VALUE; };
+53 enum TestEnum2 { SOME_VALUE; };
54
55 enum TestEnum3{
56 SOME_VALUE;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptSameBlocksWithSemi.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptSameBlocksWithSemi.html
index ba44262015..01fa3a7dcb 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptSameBlocksWithSemi.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptSameBlocksWithSemi.html
@@ -18,18 +18,18 @@
10
11 public class InputRightCurlyTestOptSameBlocksWithSemi {
12
-13 public void testMethod() {};
+13 public void testMethod() {};
14
15 public void testMethod1() {
16 };
17
-18 public class TestClass {};
+18 public class TestClass {};
19
20 public class TestClass1 {
21 };
22
23 public class TestClass2 {
-24 public TestClass2() {};
+24 public TestClass2() {};
25
26 public TestClass2(String someValue) {
27 };
@@ -42,7 +42,7 @@
34 public @interface TestAnnnotation5 {
35 String someValue(); };
36
-37 public @interface TestAnnotation6 {};
+37 public @interface TestAnnotation6 {};
38
39 public @interface TestAnnotation7 {
40 String someValue();
@@ -51,14 +51,14 @@
43 public @interface TestAnnotation8 { String someValue();
44 };
45
-46 public @interface TestAnnotation9 { String someValue(); };
+46 public @interface TestAnnotation9 { String someValue(); };
47
-48 enum TestEnum{};
+48 enum TestEnum{};
49
50 enum TestEnum1{
51 SOME_VALUE;};
52
-53 enum TestEnum2 { SOME_VALUE; };
+53 enum TestEnum2 { SOME_VALUE; };
54
55 enum TestEnum3{
56 SOME_VALUE;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptionAlone.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptionAlone.html
index 35ef97f9d6..5f62026457 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptionAlone.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptionAlone.html
@@ -43,7 +43,7 @@
35 put("first" , "second" );
36 put("polygene" , "lubricants" );
37 put("alpha" , "betical" );
-38 }};
+38 }};
39 }
40
41 void method3() {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptionAloneOrSingleLine.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptionAloneOrSingleLine.html
index 25b932d326..02787cfbcf 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptionAloneOrSingleLine.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestOptionAloneOrSingleLine.html
@@ -21,8 +21,8 @@
13
14 private int a;
15 private static int b;
-16 { a = 2; }
-17 static { b = 3; }
+16 { a = 2; }
+17 static { b = 3; }
18
19 void method1() {
20 Thread t = new Thread() {@Override public void run() {
@@ -59,15 +59,15 @@
51 if (a>2) a*=10; return ++a; }
52
53 void method5(int a) {
-54 while (a > 5) { a--; }
+54 while (a > 5) { a--; }
55
-56 if (a > 4) { a++; }
+56 if (a > 4) { a++; }
57
-58 do {a--;} while (a > 3);
+58 do {a--;} while (a > 3);
59
-60 for (int i = 1; i < 10; i++) { byte b = 10; }
+60 for (int i = 1; i < 10; i++) { byte b = 10; }
61
-62 if (a < 2) { --a; } else if (a > 3) { a++; }
+62 if (a < 2) { --a; } else if (a > 3) { a++; }
63
64 java.util.List<String> list = new java.util.ArrayList<>();
65 list.stream()
@@ -85,7 +85,7 @@
77 public void meth1(); }
78
79 interface Interface2
-80 { int i = 1; public void meth1(); }
+80 { int i = 1; public void meth1(); }
81
82 interface Interface3 {
83 void display();
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSame.html
index b17b2e1d15..2ccca4b1d4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSame.html
@@ -29,7 +29,7 @@
21 @Override
22 public void run() {
23 }
-24 });
+24 });
25 }
26
27 public void doLoop() {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSameNewTokens.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSameNewTokens.html
index 7761fcc8b6..921b56f5b2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSameNewTokens.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSameNewTokens.html
@@ -18,12 +18,12 @@
10
11 public class InputRightCurlyTestSameNewTokens {
12
-13 enum TestEnum{}
+13 enum TestEnum{}
14
15 enum TestEnum1{
16 SOME_VALUE;}
17
-18 enum TestEnum2 { SOME_VALUE; }
+18 enum TestEnum2 { SOME_VALUE; }
19
20 enum TestEnum3{
21 SOME_VALUE;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSameOmitOneLiners.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSameOmitOneLiners.html
index 45590f0857..11707d18bd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSameOmitOneLiners.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSameOmitOneLiners.html
@@ -24,7 +24,7 @@
16 public static void main(String[] args) {
17 boolean after = false;
18 try {
-19 } finally { after = true ; }
+19 } finally { after = true ; }
20 }
21 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSingleLineClass.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSingleLineClass.html
index 337ec3e4eb..63f2ff4267 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSingleLineClass.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSingleLineClass.html
@@ -24,7 +24,7 @@
16 try
17 {
18
-19 }
+19 }
20 catch (Exception e)
21 {
22 return ;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase.html
index d839c2b1f0..641849f983 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase.html
@@ -43,7 +43,7 @@
35 break ;
36 default :
37 x = 0;
-38 }
+38 }
39 }
40
41 public static void method3() {
@@ -51,7 +51,7 @@
43 switch (mode) {
44 default :
45 int x = 0;
-46 }
+46 }
47 }
48
49 public static void method4() {
@@ -63,13 +63,13 @@
55 public static void method5() {
56 int mode = 0;
57 switch (mode) { default : int x = 0;
-58 }
+58 }
59 }
60
61 public static void method6() {
62 int mode = 0;
63 switch (mode) { case 0: int x = 1; break ; default : x = 5;
-64 }
+64 }
65 }
66
67 public static void method7() {
@@ -87,13 +87,13 @@
79 public static void method9() {
80 int mode = 0;
81 switch (mode) { case 0: int x = 1; break ; default : x = 5;
-82 }
+82 }
83 }
84
85 public static void method10() {
86 int mode = 0;
87 switch (mode) { case 0: int x = 1; break ; case 80: x = 1; break ;
-88 }
+88 }
89 }
90
91 public static void method11() {
@@ -123,7 +123,7 @@
115 }
116 switch (x) {};
117 switch (x) {
-118 }
+118 }
119 }
120 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase2.html
index a3aa9715f9..737e9d4f40 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase2.html
@@ -43,7 +43,7 @@
35 break ;
36 default :
37 x = 0;
-38 }
+38 }
39 }
40
41 public static void method3() {
@@ -51,46 +51,46 @@
43 switch (mode) {
44 default :
45 int x = 0;
-46 }
+46 }
47 }
48
49 public static void method4() {
50 int mode = 0;
-51 switch (mode) { default : int x = 0; }
+51 switch (mode) { default : int x = 0; }
52 }
53
54 public static void method5() {
55 int mode = 0;
56 switch (mode) { default : int x = 0;
-57 }
+57 }
58 }
59
60 public static void method6() {
61 int mode = 0;
62 switch (mode) { case 0: int x = 1; break ; default : x = 5;
-63 }
+63 }
64 }
65
66 public static void method7() {
67 int mode = 0;
-68 switch (mode) { case 0: int x = 1; break ; default : x = 5; }
+68 switch (mode) { case 0: int x = 1; break ; default : x = 5; }
69 }
70
71 public static void method8() {
72 int mode = 0;
-73 switch (mode) { case 0: int x = 1; break ; case 80: x = 1; break ; }
+73 switch (mode) { case 0: int x = 1; break ; case 80: x = 1; break ; }
74 }
75
76 public static void method9() {
77 int mode = 0;
78 switch (mode) { case 0: int x = 1; break ; default : x = 5;
-79 }
+79 }
80 }
81
82 public static void method10() {
83 int mode = 0;
84 switch (mode) { case 0: int x = 1; break ; case 80: x = 1; break ;
-85 }
+85 }
86 }
87
88 public static void method11() {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase3.html
index de6b67e9d9..0c49a39742 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase3.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase3.html
@@ -27,7 +27,7 @@
19 case (1): x = 0; break ; }
20 switch (x)
21 {
-22 }
+22 }
23 switch (x)
24 {case (1): x=1;break ;
25 } int b;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase4.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase4.html
index 482775e68e..df1531c89a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase4.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase4.html
@@ -20,21 +20,21 @@
12
13 public void method() {
14 int x = 0;
-15 switch (x) { }
+15 switch (x) { }
16 switch (x) {
17 } int a;
18 switch (x) {
19 case (1): x = 0; break ; }
20 switch (x)
21 {
-22 }
+22 }
23 switch (x)
24 {case (1): x=1;break ;
25 } int b;
26 switch (x) {case (2): break ; } int c;
27
28 switch (x) { } int d;
-29 switch (x) { }
+29 switch (x) { }
30 }
31
32 public void someMethod2() {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase5.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase5.html
index d467255628..7756c254c7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase5.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestSwitchCase5.html
@@ -20,21 +20,21 @@
12
13 public void method() {
14 int x = 0;
-15 switch (x) { }
+15 switch (x) { }
16 switch (x) {
17 } int a;
18 switch (x) {
19 case (1): x = 0; break ; }
20 switch (x)
21 {
-22 }
+22 }
23 switch (x)
24 {case (1): x=1;break ;
25 } int b;
26 switch (x) {case (2): break ; } int c;
27
28 switch (x) { } int d;
-29 switch (x) { }
+29 switch (x) { }
30 }
31
32 public void someMethod2() {
@@ -54,18 +54,18 @@
46 class NoViolationOnInputRightCurlyTestSwitchCase5 {
47 public void method() {
48 int x = 0;
-49 switch (x) { }
-50 switch (x) { default : }
-51 switch (x) { case (1): x = 0; break ; }
+49 switch (x) { }
+50 switch (x) { default : }
+51 switch (x) { case (1): x = 0; break ; }
52 switch (x)
53 {
-54 }
+54 }
55 switch (x)
56 {case (1): x=1;break ;
57 }
58 int b;
59 switch (x) {case (2): break ; }
-60 switch (x) { }
+60 switch (x) { }
61 }
62
63 public void someMethod2() {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestTryWithResourceAlone.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestTryWithResourceAlone.html
index 1bbb007d7b..1a2b6d5aef 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestTryWithResourceAlone.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestTryWithResourceAlone.html
@@ -24,7 +24,7 @@
16 try (BufferedReader br1 = new BufferedReader(null );
17 BufferedReader br2 = new BufferedReader(br1)) {
18 ;
-19 }
+19 }
20 catch (IOException e) {
21 ;
22 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestTryWithResourceSame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestTryWithResourceSame.html
index b0a4645bb2..fb20f56f5a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestTryWithResourceSame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestTryWithResourceSame.html
@@ -32,22 +32,22 @@
24 BufferedReader br2 = new BufferedReader(br1))
25 {
26 ;
-27 } catch (IOException e)
+27 } catch (IOException e)
28 {
29 ;
30 }
31 try (BufferedReader br1 = new BufferedReader(null );
32
33 BufferedReader br2 = new BufferedReader(br1)) { ; }
-34 catch (IOException e) { ; }
+34 catch (IOException e) { ; }
35 try (BufferedReader br1 = new BufferedReader(null );
-36 BufferedReader br2 = new BufferedReader(br1)) {} catch (IOException e) { ; }
+36 BufferedReader br2 = new BufferedReader(br1)) {} catch (IOException e) { ; }
37 try (BufferedReader br1 = new BufferedReader(null );
38 BufferedReader br2 = new BufferedReader(br1)) {
39 ;
40 }
41 try (BufferedReader br1 = new BufferedReader(null );
-42 BufferedReader br2 = new BufferedReader(br1)) { ; }
+42 BufferedReader br2 = new BufferedReader(br1)) { ; }
43 try (BufferedReader br1 = new BufferedReader(null )) {
44 ; }
45 try (BufferedReader br1 = new BufferedReader(null )) {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestWithoutFinally.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestWithoutFinally.html
index a003690ef4..c8a49744f6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestWithoutFinally.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTestWithoutFinally.html
@@ -34,7 +34,7 @@
26
27 }
28
-29 class UniqEmptyClassTestWithoutFinally {private int a;}
+29 class UniqEmptyClassTestWithoutFinally {private int a;}
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTryWithResourceAloneSingle.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTryWithResourceAloneSingle.html
index 54f423ce90..5b4f304229 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTryWithResourceAloneSingle.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyTryWithResourceAloneSingle.html
@@ -24,7 +24,7 @@
16 try (BufferedReader br1 = new BufferedReader(null );
17 BufferedReader br2 = new BufferedReader(br1)) {
18 ;
-19 }
+19 }
20 catch (IOException e) {
21 ;
22 }
@@ -37,8 +37,8 @@
29 ;
30 }
31 try (BufferedReader br1 = new BufferedReader(null );
-32 BufferedReader br2 = new BufferedReader(br1)) { ; }
-33 catch (IOException e) { ; }
+32 BufferedReader br2 = new BufferedReader(br1)) { ; }
+33 catch (IOException e) { ; }
34 try (BufferedReader br1 = new BufferedReader(null );
35
36 BufferedReader br2 = new BufferedReader(br1)) {} catch (IOException e) { ; }
@@ -47,7 +47,7 @@
39 ;
40 }
41 try (BufferedReader br1 = new BufferedReader(null );
-42 BufferedReader br2 = new BufferedReader(br1)) { ; }
+42 BufferedReader br2 = new BufferedReader(br1)) { ; }
43 try (BufferedReader br1 = new BufferedReader(null )) {
44 ; }
45 try (BufferedReader br1 = new BufferedReader(null )) {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyWithEmoji.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyWithEmoji.html
index a7f27cb060..5085364365 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyWithEmoji.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyWithEmoji.html
@@ -21,11 +21,11 @@
13
14 static Runnable r = () -> {
15 String.valueOf("Hello world 🥳 🎄 !!" );
-16 };
+16 };
17
18 private void method2() {
19 String x = "🎄🤣" ;
-20 { String y = "🎄🤣🎄🤣" ;}
+20 { String y = "🎄🤣🎄🤣" ;}
21 try {
22 if (x.equals("🎄🤣" )) {
23
@@ -37,7 +37,7 @@
29
30 else {
31 x = "🎄🤣" ;
-32 }
+32 }
33 switch (x) {
34 case "\uD83C\uDF84\uD83E\uDD23" :
35 break ;
@@ -49,7 +49,7 @@
41 switch ("🤣" ) {
42 case "qw" : {
43 return ;
-44 }
+44 }
45 default : {
46 return ;
47 }
@@ -70,14 +70,14 @@
62 do {
63 i++;
64 String.CASE_INSENSITIVE_ORDER.equals(i + " " );
-65 } while (a.equals("🧐" ));
+65 } while (a.equals("🧐" ));
66 }
67
68 String method4(String a) {
69 if (a.equals("🎄" )) a = "😆" ; return "😆🤩" ; }
70
71
-72 public void foo4() {String a = "😆🤩" ;}
+72 public void foo4() {String a = "😆🤩" ;}
73 interface Interface3 {
74 void display();
75
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyWithEmojiAloneOrSingleLine.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyWithEmojiAloneOrSingleLine.html
index 656b132dae..8597c2301c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyWithEmojiAloneOrSingleLine.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/InputRightCurlyWithEmojiAloneOrSingleLine.html
@@ -20,8 +20,8 @@
12 public class InputRightCurlyWithEmojiAloneOrSingleLine {
13 private String a;
14 private static String b;
-15 { a = "🧐😏" ; }
-16 static { b = "😧🤩" ; }
+15 { a = "🧐😏" ; }
+16 static { b = "😧🤩" ; }
17
18
19 void method2(java.util.HashSet<String> set) {
@@ -38,11 +38,11 @@
30 if (a.equals("🎄" )) ; return "😆🤩" ; }
31
32 void method5(String a, int b) {
-33 while ("👈🏻🧐" .length() > 5) { ; }
+33 while ("👈🏻🧐" .length() > 5) { ; }
34
-35 if ("👉🏻👉🏼" .isEmpty()) { ; }
+35 if ("👉🏻👉🏼" .isEmpty()) { ; }
36
-37 do {b--;} while (a.equals("🤩" ));
+37 do {b--;} while (a.equals("🤩" ));
38
39 for (int i = 1; i < 10; i++) {
40 if ("🎄🎄🎄" .charAt(i) == 's') i++; }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-frame.html
index 6e2e64f4bc..3562d168b2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.rightcurly
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.rightcurly
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-summary.html
index 4452378bd9..5b9b5e6cc9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/blocks/rightcurly/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.rightcurly
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.blocks.rightcurly
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -1256,7 +1256,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/FallThroughCheckTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/FallThroughCheckTest.html
index d1e5c36a4f..2fff04403e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/FallThroughCheckTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/FallThroughCheckTest.html
@@ -56,7 +56,7 @@
48 "187:11: " + getCheckMessage(MSG_FALL_THROUGH),
49 "377:11: " + getCheckMessage(MSG_FALL_THROUGH),
50 "380:11: " + getCheckMessage(MSG_FALL_THROUGH),
-51 "382:40: " + getCheckMessage(MSG_FALL_THROUGH),
+51 "382:27: " + getCheckMessage(MSG_FALL_THROUGH),
52 "424:13: " + getCheckMessage(MSG_FALL_THROUGH),
53 "432:9: " + getCheckMessage(MSG_FALL_THROUGH),
54 "444:9: " + getCheckMessage(MSG_FALL_THROUGH),
@@ -132,238 +132,248 @@
124 "432:9: " + getCheckMessage(MSG_FALL_THROUGH),
125 "444:9: " + getCheckMessage(MSG_FALL_THROUGH),
126 "454:9: " + getCheckMessage(MSG_FALL_THROUGH),
-127
-128 "490:9: " + getCheckMessage(MSG_FALL_THROUGH),
-129 "491:9: " + getCheckMessage(MSG_FALL_THROUGH),
-130 "492:9: " + getCheckMessage(MSG_FALL_THROUGH),
-131 };
-132 verifyWithInlineConfigParser(
-133 getPath("InputFallThrough.java" ),
-134 expected);
-135 }
-136
-137 @Test
-138 public void testOwnPattern() throws Exception {
-139
-140 final String[] expected = {
-141 "22:13: " + getCheckMessage(MSG_FALL_THROUGH),
-142 "46:13: " + getCheckMessage(MSG_FALL_THROUGH),
-143 "55:13: " + getCheckMessage(MSG_FALL_THROUGH),
-144 "61:13: " + getCheckMessage(MSG_FALL_THROUGH),
-145 "78:13: " + getCheckMessage(MSG_FALL_THROUGH),
-146 "95:13: " + getCheckMessage(MSG_FALL_THROUGH),
-147 "131:13: " + getCheckMessage(MSG_FALL_THROUGH),
-148 "153:11: " + getCheckMessage(MSG_FALL_THROUGH),
-149 "178:11: " + getCheckMessage(MSG_FALL_THROUGH),
-150 "187:11: " + getCheckMessage(MSG_FALL_THROUGH),
-151 "194:11: " + getCheckMessage(MSG_FALL_THROUGH),
-152 "212:11: " + getCheckMessage(MSG_FALL_THROUGH),
-153 "230:11: " + getCheckMessage(MSG_FALL_THROUGH),
-154 "260:26: " + getCheckMessage(MSG_FALL_THROUGH),
-155 "274:11: " + getCheckMessage(MSG_FALL_THROUGH),
-156 "289:11: " + getCheckMessage(MSG_FALL_THROUGH),
-157 "292:11: " + getCheckMessage(MSG_FALL_THROUGH),
-158 "296:11: " + getCheckMessage(MSG_FALL_THROUGH),
-159 "298:25: " + getCheckMessage(MSG_FALL_THROUGH),
-160 "314:11: " + getCheckMessage(MSG_FALL_THROUGH),
-161 "317:11: " + getCheckMessage(MSG_FALL_THROUGH),
-162 "319:25: " + getCheckMessage(MSG_FALL_THROUGH),
-163 "335:11: " + getCheckMessage(MSG_FALL_THROUGH),
-164 "338:11: " + getCheckMessage(MSG_FALL_THROUGH),
-165 "340:23: " + getCheckMessage(MSG_FALL_THROUGH),
-166 "356:11: " + getCheckMessage(MSG_FALL_THROUGH),
-167 "359:11: " + getCheckMessage(MSG_FALL_THROUGH),
-168 "361:30: " + getCheckMessage(MSG_FALL_THROUGH),
-169 "424:13: " + getCheckMessage(MSG_FALL_THROUGH),
-170 "432:9: " + getCheckMessage(MSG_FALL_THROUGH),
-171 "444:9: " + getCheckMessage(MSG_FALL_THROUGH),
-172 "454:9: " + getCheckMessage(MSG_FALL_THROUGH),
-173 "481:12: " + getCheckMessage(MSG_FALL_THROUGH),
-174 "490:9: " + getCheckMessage(MSG_FALL_THROUGH),
-175 "491:9: " + getCheckMessage(MSG_FALL_THROUGH),
-176 "492:9: " + getCheckMessage(MSG_FALL_THROUGH),
-177 };
-178 verifyWithInlineConfigParser(
-179 getPath("InputFallThrough3.java" ),
-180 expected);
-181 }
-182
-183 @Test
-184 public void testOwnPatternTryWithResources() throws Exception {
-185
-186 final String[] expected = {
-187 "54:9: " + getCheckMessage(MSG_FALL_THROUGH),
-188 "58:9: " + getCheckMessage(MSG_FALL_THROUGH),
-189 "64:9: " + getCheckMessage(MSG_FALL_THROUGH),
-190 "70:9: " + getCheckMessage(MSG_FALL_THROUGH),
-191 "77:9: " + getCheckMessage(MSG_FALL_THROUGH),
-192 };
-193 verifyWithInlineConfigParser(
-194 getNonCompilablePath("InputFallThrough2.java" ),
-195 expected);
-196 }
-197
-198 @Test
-199 public void testWithEmoji() throws Exception {
-200 final String[] expected = {
-201 "22:17: " + getCheckMessage(MSG_FALL_THROUGH),
-202 "25:17: " + getCheckMessage(MSG_FALL_THROUGH),
-203 "49:17: " + getCheckMessage(MSG_FALL_THROUGH),
-204 "52:17: " + getCheckMessage(MSG_FALL_THROUGH),
-205 };
-206 verifyWithInlineConfigParser(
-207 getPath("InputFallThroughWithEmoji.java" ), expected);
-208 }
-209
-210 @Test
-211 public void testTokensNotNull() {
-212 final FallThroughCheck check = new FallThroughCheck();
-213 assertWithMessage("Acceptable tokens should not be null" )
-214 .that(check.getAcceptableTokens())
-215 .isNotNull();
-216 assertWithMessage("Default tokens should not be null" )
-217 .that(check.getDefaultTokens())
-218 .isNotNull();
-219 assertWithMessage("Required tokens should not be null" )
-220 .that(check.getRequiredTokens())
-221 .isNotNull();
-222 }
-223
-224 @Test
-225 public void testFallThroughNoElse() throws Exception {
-226 final String[] expected = {
-227 "28:13: " + getCheckMessage(MSG_FALL_THROUGH),
-228 "43:13: " + getCheckMessage(MSG_FALL_THROUGH),
-229 "47:13: " + getCheckMessage(MSG_FALL_THROUGH),
-230 "54:13: " + getCheckMessage(MSG_FALL_THROUGH),
-231 "68:13: " + getCheckMessage(MSG_FALL_THROUGH),
-232 "75:13: " + getCheckMessage(MSG_FALL_THROUGH),
-233 "88:21: " + getCheckMessage(MSG_FALL_THROUGH),
-234 "94:13: " + getCheckMessage(MSG_FALL_THROUGH),
-235 "96:13: " + getCheckMessage(MSG_FALL_THROUGH),
-236 };
-237 verifyWithInlineConfigParser(
-238 getPath("InputFallThrough2.java" ),
-239 expected);
-240 }
-241
-242 @Test
-243 public void testYield() throws Exception {
-244 final String[] expected = {
-245 "19:9: " + getCheckMessage(MSG_FALL_THROUGH),
-246 };
-247 verifyWithInlineConfigParser(
-248 getNonCompilablePath("InputFallThrough3.java" ),
-249 expected);
-250 }
-251
-252 @Test
-253 public void testLastCase() throws Exception {
-254 final String[] expected = {
-255 "48:11: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
-256 "83:11: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
-257 };
-258 verifyWithInlineConfigParser(
-259 getPath("InputFallThrough4.java" ),
-260 expected);
-261 }
-262
-263 @Test
-264 public void testIfElse() throws Exception {
-265 final String[] expected = {
-266 "94:13: " + getCheckMessage(MSG_FALL_THROUGH),
-267 };
-268 verifyWithInlineConfigParser(
-269 getPath("InputFallThrough5.java" ),
-270 expected);
-271 }
-272
-273 @Test
-274 public void testFallThrough() throws Exception {
-275 final String[] expected = {
-276 "16:13: " + getCheckMessage(MSG_FALL_THROUGH),
-277 "18:13: " + getCheckMessage(MSG_FALL_THROUGH),
-278 "23:13: " + getCheckMessage(MSG_FALL_THROUGH),
-279 "25:13: " + getCheckMessage(MSG_FALL_THROUGH),
-280 "27:13: " + getCheckMessage(MSG_FALL_THROUGH),
-281
-282 "37:10: " + getCheckMessage(MSG_FALL_THROUGH),
-283 "52:13: " + getCheckMessage(MSG_FALL_THROUGH),
-284 "65:13: " + getCheckMessage(MSG_FALL_THROUGH),
-285 "80:13: " + getCheckMessage(MSG_FALL_THROUGH),
-286 "94:13: " + getCheckMessage(MSG_FALL_THROUGH),
-287 "109:13: " + getCheckMessage(MSG_FALL_THROUGH),
-288 };
-289 verifyWithInlineConfigParser(
-290 getPath("InputFallThrough6.java" ),
-291 expected);
-292 }
-293
-294 @Test
-295 public void testFallThroughNonCompilable4() throws Exception {
-296 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-297 verifyWithInlineConfigParser(
-298 getNonCompilablePath("InputFallThrough4.java" ),
-299 expected);
-300 }
-301
-302 @Test
-303 public void testFallThroughComment() throws Exception {
-304 final String[] expected = {
-305 "20:13: " + getCheckMessage(MSG_FALL_THROUGH),
-306 "43:13: " + getCheckMessage(MSG_FALL_THROUGH),
-307 };
-308 verifyWithInlineConfigParser(
-309 getPath("InputFallThroughFallThroughLotsOfComment.java" ),
-310 expected);
-311 }
-312
-313 @Test
-314 public void testFallThroughComment2() throws Exception {
-315 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-316 verifyWithInlineConfigParser(
-317 getPath("InputFallThroughFallThroughLotsOfComment2.java" ),
-318 expected);
-319 }
-320
-321 @Test
-322 public void testFallThrough7() throws Exception {
-323 final String[] expected = {
-324 "21:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
-325 "36:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
-326 "50:13: " + getCheckMessage(MSG_FALL_THROUGH),
-327 "50:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
-328 "64:13: " + getCheckMessage(MSG_FALL_THROUGH),
-329 "111:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
-330 };
-331 verifyWithInlineConfigParser(
-332 getPath("InputFallThrough7.java" ),
-333 expected);
-334 }
-335
-336 @Test
-337 public void testLastLine() throws Exception {
-338 final String[] expected = {
-339 "21:13: " + getCheckMessage(MSG_FALL_THROUGH),
-340 "99:39: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
-341 };
-342 verifyWithInlineConfigParser(
-343 getPath("InputFallThroughLastLineCommentCheck.java" ),
-344 expected);
-345 }
-346
-347 @Test
-348 public void testLastLine2() throws Exception {
-349 final String[] expected = {
-350 "19:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
-351 "22:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
-352 "25:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
-353 };
-354 verifyWithInlineConfigParser(
-355 getNonCompilablePath("InputFallThrough5.java" ),
-356 expected);
-357 }
-358 }
+127 "491:9: " + getCheckMessage(MSG_FALL_THROUGH),
+128 "492:9: " + getCheckMessage(MSG_FALL_THROUGH),
+129 };
+130 verifyWithInlineConfigParser(
+131 getPath("InputFallThrough.java" ),
+132 expected);
+133 }
+134
+135 @Test
+136 public void testOwnPattern() throws Exception {
+137
+138 final String[] expected = {
+139 "22:13: " + getCheckMessage(MSG_FALL_THROUGH),
+140 "46:13: " + getCheckMessage(MSG_FALL_THROUGH),
+141 "55:13: " + getCheckMessage(MSG_FALL_THROUGH),
+142 "61:13: " + getCheckMessage(MSG_FALL_THROUGH),
+143 "78:13: " + getCheckMessage(MSG_FALL_THROUGH),
+144 "95:13: " + getCheckMessage(MSG_FALL_THROUGH),
+145 "131:13: " + getCheckMessage(MSG_FALL_THROUGH),
+146 "153:11: " + getCheckMessage(MSG_FALL_THROUGH),
+147 "178:11: " + getCheckMessage(MSG_FALL_THROUGH),
+148 "187:11: " + getCheckMessage(MSG_FALL_THROUGH),
+149 "194:11: " + getCheckMessage(MSG_FALL_THROUGH),
+150 "212:11: " + getCheckMessage(MSG_FALL_THROUGH),
+151 "230:11: " + getCheckMessage(MSG_FALL_THROUGH),
+152 "260:26: " + getCheckMessage(MSG_FALL_THROUGH),
+153 "274:11: " + getCheckMessage(MSG_FALL_THROUGH),
+154 "289:11: " + getCheckMessage(MSG_FALL_THROUGH),
+155 "292:11: " + getCheckMessage(MSG_FALL_THROUGH),
+156 "296:11: " + getCheckMessage(MSG_FALL_THROUGH),
+157 "298:25: " + getCheckMessage(MSG_FALL_THROUGH),
+158 "314:11: " + getCheckMessage(MSG_FALL_THROUGH),
+159 "317:11: " + getCheckMessage(MSG_FALL_THROUGH),
+160 "319:25: " + getCheckMessage(MSG_FALL_THROUGH),
+161 "335:11: " + getCheckMessage(MSG_FALL_THROUGH),
+162 "338:11: " + getCheckMessage(MSG_FALL_THROUGH),
+163 "340:23: " + getCheckMessage(MSG_FALL_THROUGH),
+164 "356:11: " + getCheckMessage(MSG_FALL_THROUGH),
+165 "359:11: " + getCheckMessage(MSG_FALL_THROUGH),
+166 "361:30: " + getCheckMessage(MSG_FALL_THROUGH),
+167 "424:13: " + getCheckMessage(MSG_FALL_THROUGH),
+168 "432:9: " + getCheckMessage(MSG_FALL_THROUGH),
+169 "444:9: " + getCheckMessage(MSG_FALL_THROUGH),
+170 "454:9: " + getCheckMessage(MSG_FALL_THROUGH),
+171 "481:12: " + getCheckMessage(MSG_FALL_THROUGH),
+172 "490:9: " + getCheckMessage(MSG_FALL_THROUGH),
+173 "491:9: " + getCheckMessage(MSG_FALL_THROUGH),
+174 "492:9: " + getCheckMessage(MSG_FALL_THROUGH),
+175 };
+176 verifyWithInlineConfigParser(
+177 getPath("InputFallThrough3.java" ),
+178 expected);
+179 }
+180
+181 @Test
+182 public void testOwnPatternTryWithResources() throws Exception {
+183
+184 final String[] expected = {
+185 "54:9: " + getCheckMessage(MSG_FALL_THROUGH),
+186 "58:9: " + getCheckMessage(MSG_FALL_THROUGH),
+187 "64:9: " + getCheckMessage(MSG_FALL_THROUGH),
+188 "70:9: " + getCheckMessage(MSG_FALL_THROUGH),
+189 "77:9: " + getCheckMessage(MSG_FALL_THROUGH),
+190 };
+191 verifyWithInlineConfigParser(
+192 getNonCompilablePath("InputFallThrough2.java" ),
+193 expected);
+194 }
+195
+196 @Test
+197 public void testWithEmoji() throws Exception {
+198 final String[] expected = {
+199 "22:17: " + getCheckMessage(MSG_FALL_THROUGH),
+200 "25:17: " + getCheckMessage(MSG_FALL_THROUGH),
+201 "49:17: " + getCheckMessage(MSG_FALL_THROUGH),
+202 "52:17: " + getCheckMessage(MSG_FALL_THROUGH),
+203 };
+204 verifyWithInlineConfigParser(
+205 getPath("InputFallThroughWithEmoji.java" ), expected);
+206 }
+207
+208 @Test
+209 public void testTokensNotNull() {
+210 final FallThroughCheck check = new FallThroughCheck();
+211 assertWithMessage("Acceptable tokens should not be null" )
+212 .that(check.getAcceptableTokens())
+213 .isNotNull();
+214 assertWithMessage("Default tokens should not be null" )
+215 .that(check.getDefaultTokens())
+216 .isNotNull();
+217 assertWithMessage("Required tokens should not be null" )
+218 .that(check.getRequiredTokens())
+219 .isNotNull();
+220 }
+221
+222 @Test
+223 public void testFallThroughNoElse() throws Exception {
+224 final String[] expected = {
+225 "28:13: " + getCheckMessage(MSG_FALL_THROUGH),
+226 "43:13: " + getCheckMessage(MSG_FALL_THROUGH),
+227 "47:13: " + getCheckMessage(MSG_FALL_THROUGH),
+228 "54:13: " + getCheckMessage(MSG_FALL_THROUGH),
+229 "68:13: " + getCheckMessage(MSG_FALL_THROUGH),
+230 "75:13: " + getCheckMessage(MSG_FALL_THROUGH),
+231 "88:21: " + getCheckMessage(MSG_FALL_THROUGH),
+232 "94:13: " + getCheckMessage(MSG_FALL_THROUGH),
+233 "96:13: " + getCheckMessage(MSG_FALL_THROUGH),
+234 };
+235 verifyWithInlineConfigParser(
+236 getPath("InputFallThrough2.java" ),
+237 expected);
+238 }
+239
+240 @Test
+241 public void testYield() throws Exception {
+242 final String[] expected = {
+243 "19:9: " + getCheckMessage(MSG_FALL_THROUGH),
+244 };
+245 verifyWithInlineConfigParser(
+246 getNonCompilablePath("InputFallThrough3.java" ),
+247 expected);
+248 }
+249
+250 @Test
+251 public void testLastCase() throws Exception {
+252 final String[] expected = {
+253 "48:11: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
+254 "83:11: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
+255 "112:11: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
+256 };
+257 verifyWithInlineConfigParser(
+258 getPath("InputFallThrough4.java" ),
+259 expected);
+260 }
+261
+262 @Test
+263 public void testIfElse() throws Exception {
+264 final String[] expected = {
+265 "94:13: " + getCheckMessage(MSG_FALL_THROUGH),
+266 };
+267 verifyWithInlineConfigParser(
+268 getPath("InputFallThrough5.java" ),
+269 expected);
+270 }
+271
+272 @Test
+273 public void testFallThrough() throws Exception {
+274 final String[] expected = {
+275 "23:13: " + getCheckMessage(MSG_FALL_THROUGH),
+276 "27:13: " + getCheckMessage(MSG_FALL_THROUGH),
+277 "52:13: " + getCheckMessage(MSG_FALL_THROUGH),
+278 "65:13: " + getCheckMessage(MSG_FALL_THROUGH),
+279 "80:13: " + getCheckMessage(MSG_FALL_THROUGH),
+280 "94:13: " + getCheckMessage(MSG_FALL_THROUGH),
+281 "109:13: " + getCheckMessage(MSG_FALL_THROUGH),
+282 };
+283 verifyWithInlineConfigParser(
+284 getPath("InputFallThrough6.java" ),
+285 expected);
+286 }
+287
+288 @Test
+289 public void testFallThroughNonCompilable4() throws Exception {
+290 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+291 verifyWithInlineConfigParser(
+292 getNonCompilablePath("InputFallThrough4.java" ),
+293 expected);
+294 }
+295
+296 @Test
+297 public void testFallThroughComment() throws Exception {
+298 final String[] expected = {
+299 "20:13: " + getCheckMessage(MSG_FALL_THROUGH),
+300 "43:13: " + getCheckMessage(MSG_FALL_THROUGH),
+301 };
+302 verifyWithInlineConfigParser(
+303 getPath("InputFallThroughFallThroughLotsOfComment.java" ),
+304 expected);
+305 }
+306
+307 @Test
+308 public void testFallThroughComment2() throws Exception {
+309 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+310 verifyWithInlineConfigParser(
+311 getPath("InputFallThroughFallThroughLotsOfComment2.java" ),
+312 expected);
+313 }
+314
+315 @Test
+316 public void testFallThrough7() throws Exception {
+317 final String[] expected = {
+318 "21:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
+319 "36:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
+320 "50:13: " + getCheckMessage(MSG_FALL_THROUGH),
+321 "50:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
+322 "64:13: " + getCheckMessage(MSG_FALL_THROUGH),
+323 "111:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
+324 };
+325 verifyWithInlineConfigParser(
+326 getPath("InputFallThrough7.java" ),
+327 expected);
+328 }
+329
+330 @Test
+331 public void testLastLine() throws Exception {
+332 final String[] expected = {
+333 "21:13: " + getCheckMessage(MSG_FALL_THROUGH),
+334
+335 "33:13: " + getCheckMessage(MSG_FALL_THROUGH),
+336 "99:39: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
+337
+338 "107:11: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
+339 };
+340 verifyWithInlineConfigParser(
+341 getPath("InputFallThroughLastLineCommentCheck.java" ),
+342 expected);
+343 }
+344
+345 @Test
+346 public void testLastLine2() throws Exception {
+347 final String[] expected = {
+348 "19:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
+349 "22:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
+350 };
+351 verifyWithInlineConfigParser(
+352 getNonCompilablePath("InputFallThrough5.java" ),
+353 expected);
+354 }
+355
+356 @Test
+357 public void testReliefCommentBetweenMultipleComment() throws Exception {
+358 final String[] expected = {
+359
+360 "25:17: " + getCheckMessage(MSG_FALL_THROUGH),
+361
+362 "34:13: " + getCheckMessage(MSG_FALL_THROUGH_LAST),
+363 };
+364 verifyWithInlineConfigParser(
+365 getPath("InputFallThrough8.java" ),
+366 expected);
+367 }
+368 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/MatchXpathCheckTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/MatchXpathCheckTest.html
index 6a66ce9473..56a79638cd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/MatchXpathCheckTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/MatchXpathCheckTest.html
@@ -27,218 +27,229 @@
19
20 package com.puppycrawl.tools.checkstyle.checks.coding;
21
-22 import static com.google.common.truth.Truth.assertWithMessage;
-23
-24 import org.junit.jupiter.api.Test;
+22 import static com.google.common.truth.Truth.assertThat;
+23 import static com.google.common.truth.Truth.assertWithMessage;
+24 import static org.junit.jupiter.api.Assertions.assertThrows;
25
-26 import com.puppycrawl.tools.checkstyle.AbstractModuleTestSupport;
-27 import com.puppycrawl.tools.checkstyle.DetailAstImpl;
-28 import com.puppycrawl.tools.checkstyle.api.TokenTypes;
-29 import com.puppycrawl.tools.checkstyle.utils.CommonUtil;
-30
-31 public class MatchXpathCheckTest
-32 extends AbstractModuleTestSupport {
+26 import org.junit.jupiter.api.Test;
+27
+28 import com.puppycrawl.tools.checkstyle.AbstractModuleTestSupport;
+29 import com.puppycrawl.tools.checkstyle.DetailAstImpl;
+30 import com.puppycrawl.tools.checkstyle.api.CheckstyleException;
+31 import com.puppycrawl.tools.checkstyle.api.TokenTypes;
+32 import com.puppycrawl.tools.checkstyle.utils.CommonUtil;
33
-34 @Override
-35 protected String getPackageLocation() {
-36 return "com/puppycrawl/tools/checkstyle/checks/coding/matchxpath" ;
-37 }
-38
-39 @Test
-40 public void testCheckWithEmptyQuery()
-41 throws Exception {
-42 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-43 verifyWithInlineConfigParser(
-44 getPath("InputMatchXpath.java" ), expected);
-45 }
-46
-47 @Test
-48 public void testNoStackoverflowError()
-49 throws Exception {
-50 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-51 verifyWithInlineConfigParser(
-52 getPath("InputMatchXpathNoStackoverflowError.java" ), expected);
-53 }
-54
-55 @Test
-56 public void testCheckWithImplicitEmptyQuery()
-57 throws Exception {
-58 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-59 verifyWithInlineConfigParser(
-60 getPath("InputMatchXpath2.java" ), expected);
-61 }
-62
-63 @Test
-64 public void testCheckWithMatchingMethodNames()
-65 throws Exception {
-66 final String[] expected = {
-67 "11:5: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
-68 "13:5: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
-69 };
-70 verifyWithInlineConfigParser(
-71 getPath("InputMatchXpath3.java" ), expected);
-72 }
-73
-74 @Test
-75 public void testCheckWithNoMatchingMethodName()
-76 throws Exception {
-77 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-78 verifyWithInlineConfigParser(
-79 getPath("InputMatchXpath4.java" ), expected);
-80 }
-81
-82 @Test
-83 public void testCheckWithSingleLineCommentsStartsWithSpace() throws Exception {
-84 final String[] expected = {
-85 "13:25: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
-86 "14:27: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
-87 };
-88 verifyWithInlineConfigParser(
-89 getPath("InputMatchXpathSingleLineComments.java" ), expected);
-90 }
-91
-92 @Test
-93 public void testCheckWithBlockComments() throws Exception {
-94 final String[] expected = {
-95 "12:5: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
-96 "14:5: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
-97 };
-98 verifyWithInlineConfigParser(
-99 getPath("InputMatchXpathBlockComments.java" ), expected);
-100 }
-101
-102 @Test
-103 public void testCheckWithMultilineComments() throws Exception {
-104 final String[] expected = {
-105 "14:5: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
-106 "20:5: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
-107 };
-108 verifyWithInlineConfigParser(
-109 getPath("InputMatchXpathMultilineComments.java" ), expected);
-110 }
-111
-112 @Test
-113 public void testCheckWithDoubleBraceInitialization()
-114 throws Exception {
-115 final String[] expected = {
-116 "18:35: Do not use double-brace initialization" ,
-117 };
-118 verifyWithInlineConfigParser(
-119 getPath("InputMatchXpathDoubleBrace.java" ), expected);
-120 }
-121
-122 @Test
-123 public void testImitateIllegalThrowsCheck()
-124 throws Exception {
-125 final String[] expected = {
-126 "13:25: Illegal throws statement" ,
-127 "15:25: Illegal throws statement" ,
-128 "16:25: Illegal throws statement" ,
-129 };
-130 verifyWithInlineConfigParser(
-131 getPath("InputMatchXpathIllegalThrows.java" ), expected);
-132 }
-133
-134 @Test
-135 public void testImitateExecutableStatementCountCheck()
-136 throws Exception {
-137 final String[] expected = {
-138 "25:5: Executable number of statements exceed threshold" ,
-139 };
-140 verifyWithInlineConfigParser(
-141 getPath("InputMatchXpathExecutableStatementCount.java" ), expected);
-142 }
-143
-144 @Test
-145 public void testForbidPrintStackTrace()
-146 throws Exception {
-147 final String[] expected = {
-148 "18:27: printStackTrace() method calls are forbidden" ,
-149 };
-150 verifyWithInlineConfigParser(
-151 getPath("InputMatchXpathForbidPrintStackTrace.java" ), expected);
-152 }
-153
-154 @Test
-155 public void testForbidParameterizedConstructor()
-156 throws Exception {
-157 final String[] expected = {
-158 "13:5: Parameterized constructors are not allowed" ,
-159 "15:5: Parameterized constructors are not allowed" ,
-160 };
-161 verifyWithInlineConfigParser(
-162 getPath("InputMatchXpathForbidParameterizedConstructor.java" ),
-163 expected);
-164 }
-165
-166 @Test
-167 public void testAvoidInstanceCreationWithoutVar()
-168 throws Exception {
-169 final String[] expected = {
-170 "13:9: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
-171 };
-172 verifyWithInlineConfigParser(
-173 getPath("InputMatchXpathAvoidInstanceCreationWithoutVar.java" ),
-174 expected);
-175 }
-176
-177 @Test
-178 public void testInvalidQuery() {
-179 final MatchXpathCheck matchXpathCheck = new MatchXpathCheck();
-180
-181 try {
-182 matchXpathCheck.setQuery("!@#%^" );
-183 assertWithMessage("Exception was expected" ).fail();
-184 }
-185 catch (IllegalStateException ignored) {
-186
+34 public class MatchXpathCheckTest
+35 extends AbstractModuleTestSupport {
+36
+37 @Override
+38 protected String getPackageLocation() {
+39 return "com/puppycrawl/tools/checkstyle/checks/coding/matchxpath" ;
+40 }
+41
+42 @Test
+43 public void testCheckWithEmptyQuery()
+44 throws Exception {
+45 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+46 verifyWithInlineConfigParser(
+47 getPath("InputMatchXpath.java" ), expected);
+48 }
+49
+50 @Test
+51 public void testNoStackoverflowError()
+52 throws Exception {
+53 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+54 verifyWithInlineConfigParser(
+55 getPath("InputMatchXpathNoStackoverflowError.java" ), expected);
+56 }
+57
+58 @Test
+59 public void testCheckWithImplicitEmptyQuery()
+60 throws Exception {
+61 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+62 verifyWithInlineConfigParser(
+63 getPath("InputMatchXpath2.java" ), expected);
+64 }
+65
+66 @Test
+67 public void testCheckWithMatchingMethodNames()
+68 throws Exception {
+69 final String[] expected = {
+70 "11:5: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
+71 "13:5: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
+72 };
+73 verifyWithInlineConfigParser(
+74 getPath("InputMatchXpath3.java" ), expected);
+75 }
+76
+77 @Test
+78 public void testCheckWithNoMatchingMethodName()
+79 throws Exception {
+80 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+81 verifyWithInlineConfigParser(
+82 getPath("InputMatchXpath4.java" ), expected);
+83 }
+84
+85 @Test
+86 public void testCheckWithSingleLineCommentsStartsWithSpace() throws Exception {
+87 final String[] expected = {
+88 "13:25: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
+89 "14:27: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
+90 };
+91 verifyWithInlineConfigParser(
+92 getPath("InputMatchXpathSingleLineComments.java" ), expected);
+93 }
+94
+95 @Test
+96 public void testCheckWithBlockComments() throws Exception {
+97 final String[] expected = {
+98 "12:5: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
+99 "14:5: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
+100 };
+101 verifyWithInlineConfigParser(
+102 getPath("InputMatchXpathBlockComments.java" ), expected);
+103 }
+104
+105 @Test
+106 public void testCheckWithMultilineComments() throws Exception {
+107 final String[] expected = {
+108 "14:5: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
+109 "20:5: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
+110 };
+111 verifyWithInlineConfigParser(
+112 getPath("InputMatchXpathMultilineComments.java" ), expected);
+113 }
+114
+115 @Test
+116 public void testCheckWithDoubleBraceInitialization()
+117 throws Exception {
+118 final String[] expected = {
+119 "18:35: Do not use double-brace initialization" ,
+120 };
+121 verifyWithInlineConfigParser(
+122 getPath("InputMatchXpathDoubleBrace.java" ), expected);
+123 }
+124
+125 @Test
+126 public void testImitateIllegalThrowsCheck()
+127 throws Exception {
+128 final String[] expected = {
+129 "13:25: Illegal throws statement" ,
+130 "15:25: Illegal throws statement" ,
+131 "16:25: Illegal throws statement" ,
+132 };
+133 verifyWithInlineConfigParser(
+134 getPath("InputMatchXpathIllegalThrows.java" ), expected);
+135 }
+136
+137 @Test
+138 public void testImitateExecutableStatementCountCheck()
+139 throws Exception {
+140 final String[] expected = {
+141 "25:5: Executable number of statements exceed threshold" ,
+142 };
+143 verifyWithInlineConfigParser(
+144 getPath("InputMatchXpathExecutableStatementCount.java" ), expected);
+145 }
+146
+147 @Test
+148 public void testForbidPrintStackTrace()
+149 throws Exception {
+150 final String[] expected = {
+151 "18:27: printStackTrace() method calls are forbidden" ,
+152 };
+153 verifyWithInlineConfigParser(
+154 getPath("InputMatchXpathForbidPrintStackTrace.java" ), expected);
+155 }
+156
+157 @Test
+158 public void testForbidParameterizedConstructor()
+159 throws Exception {
+160 final String[] expected = {
+161 "13:5: Parameterized constructors are not allowed" ,
+162 "15:5: Parameterized constructors are not allowed" ,
+163 };
+164 verifyWithInlineConfigParser(
+165 getPath("InputMatchXpathForbidParameterizedConstructor.java" ),
+166 expected);
+167 }
+168
+169 @Test
+170 public void testAvoidInstanceCreationWithoutVar()
+171 throws Exception {
+172 final String[] expected = {
+173 "13:9: " + getCheckMessage(MatchXpathCheck.MSG_KEY),
+174 };
+175 verifyWithInlineConfigParser(
+176 getPath("InputMatchXpathAvoidInstanceCreationWithoutVar.java" ),
+177 expected);
+178 }
+179
+180 @Test
+181 public void testInvalidQuery() {
+182 final MatchXpathCheck matchXpathCheck = new MatchXpathCheck();
+183
+184 try {
+185 matchXpathCheck.setQuery("!@#%^" );
+186 assertWithMessage("Exception was expected" ).fail();
187 }
-188 }
-189
-190 @Test
-191 public void testEvaluationException() {
-192 final MatchXpathCheck matchXpathCheck = new MatchXpathCheck();
-193 matchXpathCheck.setQuery("count(*) div 0" );
-194
-195 final DetailAstImpl detailAST = new DetailAstImpl();
-196 detailAST.setType(TokenTypes.CLASS_DEF);
-197 detailAST.setText("Class Def" );
-198 detailAST.setLineNo(0);
-199 detailAST.setColumnNo(0);
-200
-201 try {
-202 matchXpathCheck.beginTree(detailAST);
-203 assertWithMessage("Exception was expected" ).fail();
-204 }
-205 catch (IllegalStateException ignored) {
-206
+188 catch (IllegalStateException ignored) {
+189
+190 }
+191 }
+192
+193 @Test
+194 public void testEvaluationException() {
+195 final MatchXpathCheck matchXpathCheck = new MatchXpathCheck();
+196 matchXpathCheck.setQuery("count(*) div 0" );
+197
+198 final DetailAstImpl detailAST = new DetailAstImpl();
+199 detailAST.setType(TokenTypes.CLASS_DEF);
+200 detailAST.setText("Class Def" );
+201 detailAST.setLineNo(0);
+202 detailAST.setColumnNo(0);
+203
+204 try {
+205 matchXpathCheck.beginTree(detailAST);
+206 assertWithMessage("Exception was expected" ).fail();
207 }
-208 }
-209
-210 @Test
-211 public void testGetDefaultTokens() {
-212 final MatchXpathCheck matchXpathCheck = new MatchXpathCheck();
-213 assertWithMessage("Expected empty array" )
-214 .that(matchXpathCheck.getDefaultTokens())
-215 .isEmpty();
-216 }
-217
-218 @Test
-219 public void testGetAcceptableTokens() {
-220 final MatchXpathCheck matchXpathCheck = new MatchXpathCheck();
-221 assertWithMessage("Expected empty array" )
-222 .that(matchXpathCheck.getAcceptableTokens())
-223 .isEmpty();
-224 }
-225
-226 @Test
-227 public void testGetRequiredTokens() {
-228 final MatchXpathCheck matchXpathCheck = new MatchXpathCheck();
-229 assertWithMessage("Expected empty array" )
-230 .that(matchXpathCheck.getRequiredTokens())
-231 .isEmpty();
-232 }
-233 }
+208 catch (IllegalStateException ignored) {
+209
+210 }
+211 }
+212
+213 @Test
+214 public void testGetDefaultTokens() {
+215 final MatchXpathCheck matchXpathCheck = new MatchXpathCheck();
+216 assertWithMessage("Expected empty array" )
+217 .that(matchXpathCheck.getDefaultTokens())
+218 .isEmpty();
+219 }
+220
+221 @Test
+222 public void testGetAcceptableTokens() {
+223 final MatchXpathCheck matchXpathCheck = new MatchXpathCheck();
+224 assertWithMessage("Expected empty array" )
+225 .that(matchXpathCheck.getAcceptableTokens())
+226 .isEmpty();
+227 }
+228
+229 @Test
+230 public void testGetRequiredTokens() {
+231 final MatchXpathCheck matchXpathCheck = new MatchXpathCheck();
+232 assertWithMessage("Expected empty array" )
+233 .that(matchXpathCheck.getRequiredTokens())
+234 .isEmpty();
+235 }
+236
+237 @Test
+238 public void testMatchXpathWithFailedEvaluation() {
+239 final CheckstyleException ex = assertThrows(CheckstyleException.class ,
+240 () -> verifyWithInlineConfigParser(getPath("InputMatchXpath5.java" )));
+241 assertThat(ex.getCause().getMessage())
+242 .isEqualTo("Evaluation of Xpath query failed: count(*) div 0" );
+243 }
+244 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/SuperCloneCheckExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/SuperCloneCheckExamplesTest.html
index 602c5c07bd..15de802bde 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/SuperCloneCheckExamplesTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/SuperCloneCheckExamplesTest.html
@@ -27,27 +27,28 @@
19
20 package com.puppycrawl.tools.checkstyle.checks.coding;
21
-22 import org.junit.jupiter.api.Disabled;
-23 import org.junit.jupiter.api.Test;
-24
-25 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
-26
-27 @Disabled("until https://github.com/checkstyle/checkstyle/issues/13345" )
+22 import static com.puppycrawl.tools.checkstyle.checks.coding.AbstractSuperCheck.MSG_KEY;
+23
+24 import org.junit.jupiter.api.Test;
+25
+26 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+27
28 public class SuperCloneCheckExamplesTest extends AbstractExamplesModuleTestSupport {
-29 @Override
-30 protected String getPackageLocation() {
-31 return "com/puppycrawl/tools/checkstyle/checks/coding/superclone" ;
-32 }
-33
-34 @Test
-35 public void testExample1() throws Exception {
-36 final String[] expected = {
-37
-38 };
-39
-40 verifyWithInlineConfigParser(getPath("Example1.txt" ), expected);
-41 }
-42 }
+29
+30 @Override
+31 protected String getPackageLocation() {
+32 return "com/puppycrawl/tools/checkstyle/checks/coding/superclone" ;
+33 }
+34
+35 @Test
+36 public void testExample1() throws Exception {
+37 final String[] expected = {
+38 "22:22: " + getCheckMessage(MSG_KEY, "clone" ),
+39 };
+40
+41 verifyWithInlineConfigParser(getPath("Example1.java" ), expected);
+42 }
+43 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-frame.html
index a49e5c5786..0e81112725 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.arraytrailingcomma
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.arraytrailingcomma
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-summary.html
index 9293ec50ca..0bf4c31d7e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/arraytrailingcomma/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.arraytrailingcomma
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.arraytrailingcomma
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-frame.html
index 0f50deac34..7385b0750f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoiddoublebraceinitialization
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoiddoublebraceinitialization
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-summary.html
index 51d258ba14..8b04fd96f2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoiddoublebraceinitialization/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoiddoublebraceinitialization
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoiddoublebraceinitialization
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -91,7 +91,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-frame.html
index 6426f76ea1..da0c453991 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoidnoargumentsuperconstructorcall
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoidnoargumentsuperconstructorcall
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-summary.html
index df0c825d0b..b7b44f10b2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/avoidnoargumentsuperconstructorcall/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoidnoargumentsuperconstructorcall
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.avoidnoargumentsuperconstructorcall
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -101,7 +101,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-frame.html
index 4f08b3ed93..200a8c570d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.covariantequals
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.covariantequals
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-summary.html
index 916446135a..b924660c05 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/covariantequals/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.covariantequals
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.covariantequals
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -136,7 +136,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-frame.html
index e369ed8027..011abe0c87 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.declarationorder
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.declarationorder
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-summary.html
index 4116462479..387e320876 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/declarationorder/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.declarationorder
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.declarationorder
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -191,7 +191,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-frame.html
index b433b45e4c..c29365d641 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.defaultcomeslast
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.defaultcomeslast
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-summary.html
index 7b6228f9ef..c5efb7fd7e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/defaultcomeslast/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.defaultcomeslast
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.defaultcomeslast
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-frame.html
index 8b4fd6c612..be63448224 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.emptystatement
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.emptystatement
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-summary.html
index ad9249a244..98305fcbf6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/emptystatement/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.emptystatement
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.emptystatement
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-frame.html
index 18340aa29e..c0c8be61ed 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalsavoidnull
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalsavoidnull
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-summary.html
index c60060ff9e..8172fb5745 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalsavoidnull/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalsavoidnull
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalsavoidnull
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -266,7 +266,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-frame.html
index 241f861ecf..4c62c81492 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalshashcode
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalshashcode
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-summary.html
index 9ef2c60ea3..f9725a27bd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/equalshashcode/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalshashcode
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.equalshashcode
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -221,7 +221,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-frame.html
index 42348ccc59..2b633608d0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.explicitinitialization
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.explicitinitialization
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-summary.html
index b1e1395c1e..09f4834ec3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/explicitinitialization/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.explicitinitialization
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.explicitinitialization
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -166,7 +166,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/Example1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/Example1.html
index 4c25adbf99..705ac81024 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/Example1.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/Example1.html
@@ -26,7 +26,7 @@
18 switch (i) {
19 case 1:
20 i++;
-21 case 2:
+21 case 2:
22 i++;
23 break ;
24 case 3:
@@ -37,7 +37,7 @@
29 throw new Exception();
30 case 5:
31 i++;
-32 case 6:
+32 case 6:
33 case 7:
34 i++;
35 continue ;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/Example2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/Example2.html
index 1a5634dbc9..094fd82c3d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/Example2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/Example2.html
@@ -28,7 +28,7 @@
20 switch (i) {
21 case 1:
22 i++;
-23 case 2:
+23 case 2:
24 i++;
25 break ;
26 case 3:
@@ -39,11 +39,11 @@
31 throw new Exception();
32 case 5:
33 i++;
-34 case 6:
+34 case 6:
35 case 7:
36 i++;
37 continue ;
-38 case 11:
+38 case 11:
39 i++;
40 }
41 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/Example3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/Example3.html
index b982924d9e..c39eb627a9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/Example3.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/Example3.html
@@ -28,7 +28,7 @@
20 switch (i) {
21 case 1:
22 i++;
-23 case 2:
+23 case 2:
24 i++;
25 break ;
26 case 3:
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough.html
index bfc09e1144..9d5eee88be 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough.html
@@ -27,7 +27,7 @@
19 break ;
20 case 2:
21 i++;
-22 case 3:
+22 case 3:
23 i++;
24 break ;
25 case 4:
@@ -51,7 +51,7 @@
43 case 11: {
44 i++;
45 }
-46 case 12:
+46 case 12:
47 if (false)
48 break ;
49 else
@@ -60,13 +60,13 @@
52 if (true ) {
53 return ;
54 }
-55 case 14:
+55 case 14:
56 if (true ) {
57 return ;
58 } else {
59
60 }
-61 case 15:
+61 case 15:
62 do {
63 System.identityHashCode("something" );
64 return ;
@@ -83,7 +83,7 @@
75 while (cond) {
76 break ;
77 }
-78 case 19:
+78 case 19:
79 try {
80 i++;
81 break ;
@@ -100,7 +100,7 @@
92 } catch (Error e) {
93 return ;
94 }
-95 case 21:
+95 case 21:
96 try {
97 i++;
98 } catch (RuntimeException e) {
@@ -192,7 +192,7 @@
184 if (true ) {
185 return ;
186 }
-187 case 14:
+187 case 14:
188 if (true ) {
189 return ;
190 } else {
@@ -382,12 +382,12 @@
374 case 0:
375 i++;
376
-377 case 1:
+377 case 1:
378 i++;
379
-380 case 2:
+380 case 2:
381 i++;
-382 case 3:
+382 case 3:
383 break ;
384 case 4:
385 i++;
@@ -429,7 +429,7 @@
421 switch (hashCode()) {
422 case 1:
423 }
-424 default :
+424 default :
425 }
426 }
427
@@ -437,7 +437,7 @@
429 switch (hashCode()) {
430 case 1:
431 switch (hashCode()){}
-432 case 2:
+432 case 2:
433 System.lineSeparator();
434 break ;
435 }
@@ -449,7 +449,7 @@
441 if (true ) {
442 System.lineSeparator();
443 }
-444 case 2:
+444 case 2:
445 System.lineSeparator();
446 break ;
447 }
@@ -459,7 +459,7 @@
451 switch (hashCode()) {
452 case 1: System.lineSeparator();
453
-454 case 2:
+454 case 2:
455 System.lineSeparator();
456 break ;
457 }
@@ -495,9 +495,9 @@
487 int i = 0;
488 switch (i) {
489 case 0: case 1: i *= i;
-490 case 2: case 3: i *= i;
-491 case 4: case 5: i *= i;
-492 case 6: case 7: i *= i;
+490 case 2: case 3: i *= i;
+491 case 4: case 5: i *= i;
+492 case 6: case 7: i *= i;
493 break ;
494 default :
495 throw new RuntimeException();
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough2.html
index b8fd0c5424..2a02879d20 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough2.html
@@ -33,7 +33,7 @@
25
26 break ;
27 }
-28 case C:
+28 case C:
29 break ;
30 }
31
@@ -48,18 +48,18 @@
40 if (true ) {
41 return ;
42 }
-43 case 4:
+43 case 4:
44 if (var 2 == 2) {
45 break ;
46 }
-47 case 5:
+47 case 5:
48 if (var 2 == 1) {
49
50 }
51 else if (true ) {
52 return ;
53 }
-54 case 6:
+54 case 6:
55 if (var 2 > 1) {
56 break ;
57 }
@@ -73,14 +73,14 @@
65 else if (true ) {
66 return ;
67 }
-68 case 8:
+68 case 8:
69 if (var 2 == 5) {
70 System.identityHashCode("0xB16B00B5" );
71 }
72 else {
73 break ;
74 }
-75 case 9:
+75 case 9:
76 if (var 2 == 5) {
77 System.identityHashCode("0xCAFED00D" );
78 }
@@ -93,15 +93,15 @@
85 switch (var 3) {
86 case 0xCAFEBABE:
87 String.CASE_INSENSITIVE_ORDER.equals("0x1CEB00DA" );
-88 default :
+88 default :
89 String.CASE_INSENSITIVE_ORDER.equals("" );
90 }
91 if (true ) {
92 break ;
93 }
-94 case 11:
+94 case 11:
95 if (false) {break ;}
-96 case 12:
+96 case 12:
97 if (true );
98 break ;
99 default :
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough3.html
index bf2b03dae7..5cc66f8de1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough3.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough3.html
@@ -27,7 +27,7 @@
19 break ;
20 case 2:
21 i++;
-22 case 3:
+22 case 3:
23 i++;
24 break ;
25 case 4:
@@ -51,7 +51,7 @@
43 case 11: {
44 i++;
45 }
-46 case 12:
+46 case 12:
47 if (false)
48 break ;
49 else
@@ -60,13 +60,13 @@
52 if (true ) {
53 return ;
54 }
-55 case 14:
+55 case 14:
56 if (true ) {
57 return ;
58 } else {
59
60 }
-61 case 15:
+61 case 15:
62 do {
63 System.identityHashCode("something" );
64 return ;
@@ -83,7 +83,7 @@
75 while (cond) {
76 break ;
77 }
-78 case 19:
+78 case 19:
79 try {
80 i++;
81 break ;
@@ -100,7 +100,7 @@
92 } catch (Error e) {
93 return ;
94 }
-95 case 21:
+95 case 21:
96 try {
97 i++;
98 } catch (RuntimeException e) {
@@ -136,7 +136,7 @@
128 default :
129 return ;
130 }
-131 default :
+131 default :
132
133 i++;
134 }
@@ -158,7 +158,7 @@
150 case 2:
151 i++;
152
-153 case 3:
+153 case 3:
154 i++;
155 break ;
156 case 4:
@@ -183,7 +183,7 @@
175 i++;
176 }
177
-178 case 12:
+178 case 12:
179 if (false)
180 break ;
181 else
@@ -192,14 +192,14 @@
184 if (true ) {
185 return ;
186 }
-187 case 14:
+187 case 14:
188 if (true ) {
189 return ;
190 } else {
191
192 }
193
-194 case 15:
+194 case 15:
195 do {
196 System.identityHashCode("something" );
197 return ;
@@ -217,7 +217,7 @@
209 break ;
210 }
211
-212 case 19:
+212 case 19:
213 try {
214 i++;
215 break ;
@@ -235,7 +235,7 @@
227 return ;
228 }
229
-230 case 21:
+230 case 21:
231 try {
232 i++;
233 } catch (RuntimeException e) {
@@ -265,7 +265,7 @@
257 }
258 case 24:
259 i++;
-260 case 25:
+260 case 25:
261 i++;
262 break ;
263
@@ -279,7 +279,7 @@
271 return ;
272 }
273
-274 default :
+274 default :
275
276 i++;
277
@@ -294,16 +294,16 @@
286 case 0:
287 i++;
288
-289 case 1:
+289 case 1:
290 i++;
291
-292 case 2: {
+292 case 2: {
293 i++;
294 }
295
-296 case 3:
+296 case 3:
297 i++;
-298 case 4:
+298 case 4:
299 break ;
300 case 5:
301 i++;
@@ -319,12 +319,12 @@
311 case 0:
312 i++;
313
-314 case 1:
+314 case 1:
315 i++;
316
-317 case 2:
+317 case 2:
318 i++;
-319 case 3:
+319 case 3:
320 break ;
321 case 4:
322 i++;
@@ -340,12 +340,12 @@
332 case 0:
333 i++;
334
-335 case 1:
+335 case 1:
336 i++;
337
-338 case 2:
+338 case 2:
339 i++;
-340 case 3:
+340 case 3:
341 break ;
342 case 4:
343 i++;
@@ -361,12 +361,12 @@
353 case 0:
354 i++;
355
-356 case 1:
+356 case 1:
357 i++;
358
-359 case 2:
+359 case 2:
360 i++;
-361 case 3:
+361 case 3:
362 break ;
363 case 4:
364 i++;
@@ -429,7 +429,7 @@
421 switch (hashCode()) {
422 case 1:
423 }
-424 default :
+424 default :
425 }
426 }
427
@@ -437,7 +437,7 @@
429 switch (hashCode()) {
430 case 1:
431 switch (hashCode()){}
-432 case 2:
+432 case 2:
433 System.lineSeparator();
434 break ;
435 }
@@ -449,7 +449,7 @@
441 if (true ) {
442 System.lineSeparator();
443 }
-444 case 2:
+444 case 2:
445 System.lineSeparator();
446 break ;
447 }
@@ -459,7 +459,7 @@
451 switch (hashCode()) {
452 case 1: System.lineSeparator();
453
-454 case 2:
+454 case 2:
455 System.lineSeparator();
456 break ;
457 }
@@ -486,7 +486,7 @@
478 synchronized (this ) {
479 }
480
-481 default :
+481 default :
482 break ;
483 }
484 }
@@ -495,9 +495,9 @@
487 int i = 0;
488 switch (i) {
489 case 0: case 1: i *= i;
-490 case 2: case 3: i *= i;
-491 case 4: case 5: i *= i;
-492 case 6: case 7: i *= i;
+490 case 2: case 3: i *= i;
+491 case 4: case 5: i *= i;
+492 case 6: case 7: i *= i;
493 break ;
494 default :
495 throw new RuntimeException();
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough4.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough4.html
index c7c41c7111..1830ae410c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough4.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough4.html
@@ -117,7 +117,7 @@
109 void method5(int i, int j, boolean cond) {
110 while (true ) {
111 switch (i){
-112 case 5:
+112 case 5:
113 i++;
114
115 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough5.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough5.html
index 533af92fda..98187548b8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough5.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough5.html
@@ -99,7 +99,7 @@
91
92 i++;
93
-94 case 2:
+94 case 2:
95 break ;
96 }
97 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough6.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough6.html
index d6c76c3b97..fbc9eb60a5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough6.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough6.html
@@ -21,18 +21,18 @@
13 switch (i) {
14 case 1:
15 int fallthru = 2;
-16 case 2:
+16 case 2:
17 int fallthrough = 2;
-18 case 3:
+18 case 3:
19 break ;
20 case 4:
21 int fallthru2 = 3;
22
-23 case 5:
+23 case 5:
24 int fallthru3 = 4;
-25 case 6:
+25 case 6:
26 int fallthru4 = 5;
-27 default :
+27 default :
28 }
29 }
30
@@ -43,7 +43,7 @@
35 case 2: case 3: i *= i;
36 case 4: case 5: i *= i;
37 case 6: case 7: i *= i;
-38 break ;
+38 break ;
39 default :
40 throw new RuntimeException();
41 }
@@ -57,7 +57,7 @@
49 case 1:
50
51 i++;
-52 case 2:
+52 case 2:
53 break ;
54 }
55 }
@@ -70,7 +70,7 @@
62 case 1:
63
64 i++;
-65 case 2:
+65 case 2:
66 break ;
67 }
68 }
@@ -85,7 +85,7 @@
77
78
79 i++;
-80 case 2:
+80 case 2:
81 break ;
82 }
83 }
@@ -99,7 +99,7 @@
91
92
93 i++;
-94 case 2:
+94 case 2:
95 break ;
96 }
97 }
@@ -114,7 +114,7 @@
106
107
108 System.out.println("check" );
-109 case 2:
+109 case 2:
110 break ;
111 }
112 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough7.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough7.html
index f677b81992..d63825b9cb 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough7.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough7.html
@@ -69,7 +69,7 @@
61 case 4:
62 case 3:
63 c = 4;
-64 case 2:
+64 case 2:
65 case 1:
66 default :
67 c = 9;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough8.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough8.html
new file mode 100644
index 0000000000..e9eb42e4e3
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThrough8.html
@@ -0,0 +1,61 @@
+
+
+
+InputFallThrough8 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checks.coding.fallthrough;
+10
+11 public class InputFallThrough8 {
+12 void methodLastLine(int i) {
+13 while (true ) {
+14 switch (i) {
+15 case 0:
+16 i++;
+17
+18
+19 case 1:
+20 i++;
+21 break ;
+22 case 2:
+23 i++;
+24
+25 case 3:
+26 i--;
+27 break ;
+28 }
+29 }
+30 }
+31
+32 void testLastCase(int i) {
+33 switch (i) {
+34 case 0:
+35 i++;
+36
+37 }
+38 }
+39
+40 void testLastCase2(int i) {
+41 switch (i) {
+42 case 0:
+43 i++;
+44
+45
+46 }
+47 }
+48 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughCharacterSwitch.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughCharacterSwitch.html
index f69f4e1413..d3c9a6acee 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughCharacterSwitch.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughCharacterSwitch.html
@@ -24,7 +24,7 @@
16 case 'a':
17 case 'b':
18 i++;
-
19 case 'c':
+
19 case 'c':
20 String.valueOf(i);
21 break ;
22 case 'd':
@@ -35,7 +35,7 @@
27 if (
true ) {
28 return ;
29 }
-
30 case 'g':
+
30 case 'g':
31 try {
32 i++;
33 break ;
@@ -43,17 +43,17 @@
35 }
catch (Error e) {
36 return ;
37 }
-
38 case 'h':
+
38 case 'h':
39 switch (i) {
40 case 1:
41 continue ;
42 case 2:
43 i++;
-
44 case 3:
+
44 case 3:
45 String.valueOf(i);
46 return ;
47 }
-
48 case 'i':
+
48 case 'i':
49 switch (i) {
50 case 1:
51 continue ;
@@ -68,7 +68,7 @@
60 case 'A':
61 i++;
62
-
63 case 'B':
+
63 case 'B':
64 i++;
65
66 default :
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughDefault.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughDefault.html
index f2f8bd98fd..d2e8d0dc24 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughDefault.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughDefault.html
@@ -27,7 +27,7 @@
19 break ;
20 case 2:
21 i++;
-
22 case 3:
+
22 case 3:
23 i++;
24 break ;
25 case 4:
@@ -51,7 +51,7 @@
43 case 11: {
44 i++;
45 }
-
46 case 12:
+
46 case 12:
47 if (false)
48 break ;
49 else
@@ -60,13 +60,13 @@
52 if (
true ) {
53 return ;
54 }
-
55 case 14:
+
55 case 14:
56 if (
true ) {
57 return ;
58 }
else {
59
60 }
-
61 case 15:
+
61 case 15:
62 do {
63 System.identityHashCode(
"something" );
64 return ;
@@ -83,7 +83,7 @@
75 while (cond) {
76 break ;
77 }
-
78 case 19:
+
78 case 19:
79 try {
80 i++;
81 break ;
@@ -100,7 +100,7 @@
92 }
catch (Error e) {
93 return ;
94 }
-
95 case 21:
+
95 case 21:
96 try {
97 i++;
98 }
catch (RuntimeException e) {
@@ -136,7 +136,7 @@
128 default :
129 return ;
130 }
-
131 default :
+
131 default :
132
133 i++;
134 }
@@ -192,7 +192,7 @@
184 if (
true ) {
185 return ;
186 }
-
187 case 14:
+
187 case 14:
188 if (
true ) {
189 return ;
190 }
else {
@@ -382,12 +382,12 @@
374 case 0:
375 i++;
376
-
377 case 1:
+
377 case 1:
378 i++;
379
-
380 case 2:
+
380 case 2:
381 i++;
-
382 case 3:
+
382 case 3:
383 break ;
384 case 4:
385 i++;
@@ -429,7 +429,7 @@
421 switch (hashCode()) {
422 case 1:
423 }
-
424 default :
+
424 default :
425 }
426 }
427
@@ -437,7 +437,7 @@
429 switch (hashCode()) {
430 case 1:
431 switch (hashCode()){}
-
432 case 2:
+
432 case 2:
433 System.lineSeparator();
434 break ;
435 }
@@ -449,7 +449,7 @@
441 if (
true ) {
442 System.lineSeparator();
443 }
-
444 case 2:
+
444 case 2:
445 System.lineSeparator();
446 break ;
447 }
@@ -459,7 +459,7 @@
451 switch (hashCode()) {
452 case 1: System.lineSeparator();
453
-
454 case 2:
+
454 case 2:
455 System.lineSeparator();
456 break ;
457 }
@@ -495,9 +495,9 @@
487 int i = 0;
488 switch (i) {
489 case 0:
case 1: i *= i;
-
490 case 2:
case 3: i *= i;
-
491 case 4:
case 5: i *= i;
-
492 case 6:
case 7: i *= i;
+
490 case 2:
case 3: i *= i;
+
491 case 4:
case 5: i *= i;
+
492 case 6:
case 7: i *= i;
493 break ;
494 default :
495 throw new RuntimeException();
@@ -534,15 +534,15 @@
526 i++;
527 case 12:
528 i++;
-
529 case 13:
+
529 case 13:
530 i++;
-
531 case 14:
+
531 case 14:
532 i++;
-
533 case 15:
+
533 case 15:
534 i++;
-
535 case 16:
+
535 case 16:
536 i++;
-
537 default :
+
537 default :
538 throw new RuntimeException();
539 }
540 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughFallThroughLotsOfComment.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughFallThroughLotsOfComment.html
index 8016b58c34..793f4af1e7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughFallThroughLotsOfComment.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughFallThroughLotsOfComment.html
@@ -25,7 +25,7 @@
17 int line = 2;
18
19
-
20 case 4:
+
20 case 4:
21 case 5:
22 case 6:
23 case 7: {
@@ -48,7 +48,7 @@
40
41
42 }
-
43 case 16:
+
43 case 16:
44 case 17:
45 case 18:
46
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughLastLineCommentCheck.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughLastLineCommentCheck.html
index 935e02a413..82a1df43cf 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughLastLineCommentCheck.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughLastLineCommentCheck.html
@@ -26,7 +26,7 @@
18
19
20
-
21 case 2:
+
21 case 2:
22 break ;
23 case 3:
24 break ;
@@ -38,7 +38,7 @@
30 case 1:
31 i++;
32
-
33 case 2:
+
33 case 2:
34
35 i++;
36
@@ -112,7 +112,7 @@
104 void method7(
int i,
int j,
boolean cond) {
105 while (
true ) {
106 switch (i){
-
107 case 5:
+
107 case 5:
108 i++;
109 i++;
110 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughStringSwitch.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughStringSwitch.html
index 3170eefd38..abfca92914 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughStringSwitch.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughStringSwitch.html
@@ -26,7 +26,7 @@
18 break ;
19 case "violation" :
20 i++;
-
21 case "fallthru" :
+
21 case "fallthru" :
22 }
23 return i;
24 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughTryCatchInSwitch.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughTryCatchInSwitch.html
index 1d3fd50475..bfd2029859 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughTryCatchInSwitch.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughTryCatchInSwitch.html
@@ -42,7 +42,7 @@
34 }
finally {
35
36 }
-
37 default :
+
37 default :
38
39 }
40
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughWeird.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughWeird.html
index 522507dc7c..f6b4eb9cc9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughWeird.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughWeird.html
@@ -20,7 +20,7 @@
12 switch (i) {
13 case 1:
14 int fallthru = 2;
-
15 case 2:
+
15 case 2:
16 break ;
17 case 3:
18 int c = 2;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughWithEmoji.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughWithEmoji.html
index ee604036c1..1f968eb17b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughWithEmoji.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/InputFallThroughWithEmoji.html
@@ -28,10 +28,10 @@
20 case "👇🏻" :
21 i++;
22 case "😂sda" :
-
23
+
23
24 i++;
25 case "d😂sda" :
return ;
-
26
+
26
27
28 case "5😆" :
throw new RuntimeException(
"" );
29 case "🧐6" :
@@ -55,9 +55,9 @@
47 }
48
49 case "9" : String s =
"s🥳d🥳s" ;
-
50
+
50
51
-
52 default :
+
52 default :
53 "🥳" .toString().equals(
"🥳" );
54
55
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-frame.html
index 91254b4b49..ce0005b74b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.fallthrough
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.fallthrough
@@ -47,6 +47,9 @@
Classes
InputFallThrough7
+
+
+ InputFallThrough8
InputFallThroughCharacterSwitch
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-summary.html
index 99dd26f9cf..d655a76c6f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/fallthrough/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.fallthrough
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.fallthrough
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -118,75 +118,80 @@ Package com.puppycrawl.tools.checkstyle.checks
- InputFallThroughCharacterSwitch
+ InputFallThrough8
- InputFallThroughDefault
+ InputFallThroughCharacterSwitch
- InputFallThroughFallThroughLotsOfComment
+ InputFallThroughDefault
- InputFallThroughFallThroughLotsOfComment2
+ InputFallThroughFallThroughLotsOfComment
- InputFallThroughLastLineCommentCheck
+ InputFallThroughFallThroughLotsOfComment2
- InputFallThroughStringSwitch
+ InputFallThroughLastLineCommentCheck
- InputFallThroughTryCatchInSwitch
+ InputFallThroughStringSwitch
- InputFallThroughWeird
+ InputFallThroughTryCatchInSwitch
- InputFallThroughWithEmoji
+ InputFallThroughWeird
- K
+ InputFallThroughWithEmoji
- LIRSNode
+ K
- Node
+ LIRSNode
- Recency
+ Node
- Test
+ Recency
+
+ Test
+
+
+
V
@@ -211,7 +216,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-frame.html
index 876596dcd8..c2b076c490 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.finallocalvariable
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.finallocalvariable
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-summary.html
index 5db614f4cc..9290e66d15 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/finallocalvariable/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.finallocalvariable
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.finallocalvariable
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -446,7 +446,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-frame.html
index dc4c837df7..0aeed98cf3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.hiddenfield
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.hiddenfield
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-summary.html
index f4e45fb68a..ce5d42da3a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/hiddenfield/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.hiddenfield
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.hiddenfield
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -851,7 +851,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-frame.html
index 14ff14dce4..078a2bef4d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalcatch
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalcatch
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-summary.html
index fb13d242db..df9f2753ed 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalcatch/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalcatch
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalcatch
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-frame.html
index 4530e320fe..660252bcbe 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalinstantiation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalinstantiation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-summary.html
index 7be69d1ed6..b9418f4849 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalinstantiation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalinstantiation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalinstantiation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -211,7 +211,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-frame.html
index 202c7684ca..e7deb64b0e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalthrows
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalthrows
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-summary.html
index a6bba5a6c7..5b57ec1842 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegalthrows/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalthrows
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegalthrows
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-frame.html
index fb91139ff0..4def7b99c7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltoken
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltoken
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-summary.html
index 95b64b14dd..8c1162b277 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltoken/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltoken
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltoken
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -111,7 +111,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-frame.html
index f471dda4b4..934d45ab78 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltokentext
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltokentext
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-summary.html
index cea3958eb2..38786f4e9a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltokentext/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltokentext
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltokentext
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-frame.html
index 7b67a61269..12c583e655 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltype
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltype
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-summary.html
index 9a265883b4..885c8aaefb 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/illegaltype/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltype
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.illegaltype
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -461,7 +461,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-frame.html
index 54f985c552..fca9780cf8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.innerassignment
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.innerassignment
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-summary.html
index 12bf0bc150..0ee39bfd1b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/innerassignment/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.innerassignment
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.innerassignment
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-frame.html
index 436bdad547..5228490648 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.magicnumber
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.magicnumber
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-summary.html
index 51e0c6284b..c40468251b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/magicnumber/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.magicnumber
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.magicnumber
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -576,7 +576,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/InputMatchXpath5.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/InputMatchXpath5.html
new file mode 100644
index 0000000000..0c5899deb3
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/InputMatchXpath5.html
@@ -0,0 +1,24 @@
+
+
+
+InputMatchXpath5 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8 package com.puppycrawl.tools.checkstyle.checks.coding.matchxpath;
+9
+10 public class InputMatchXpath5 {
+11 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-frame.html
index e2e87d6764..249fa90675 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.matchxpath
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.matchxpath
@@ -23,6 +23,9 @@
Classes
InputMatchXpath4
+
+
+ InputMatchXpath5
InputMatchXpathAvoidInstanceCreationWithoutVar
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-summary.html
index dc78db79c7..1a105162ad 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/matchxpath/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.matchxpath
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.matchxpath
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -78,55 +78,60 @@ Package com.puppycrawl.tools.checkstyle.checks
- InputMatchXpathAvoidInstanceCreationWithoutVar
+ InputMatchXpath5
- InputMatchXpathAvoidInstanceCreationWithoutVar.SomeObject
+ InputMatchXpathAvoidInstanceCreationWithoutVar
- InputMatchXpathBlockComments
+ InputMatchXpathAvoidInstanceCreationWithoutVar.SomeObject
- InputMatchXpathDoubleBrace
+ InputMatchXpathBlockComments
- InputMatchXpathExecutableStatementCount
+ InputMatchXpathDoubleBrace
- InputMatchXpathForbidParameterizedConstructor
+ InputMatchXpathExecutableStatementCount
- InputMatchXpathForbidPrintStackTrace
+ InputMatchXpathForbidParameterizedConstructor
- InputMatchXpathIllegalThrows
+ InputMatchXpathForbidPrintStackTrace
- InputMatchXpathMultilineComments
+ InputMatchXpathIllegalThrows
- InputMatchXpathNoStackoverflowError
+ InputMatchXpathMultilineComments
+
+ InputMatchXpathNoStackoverflowError
+
+
+
InputMatchXpathSingleLineComments
@@ -151,7 +156,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-frame.html
index 637220ac04..21d9c50705 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.missingctor
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.missingctor
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-summary.html
index 5eeb5e2f34..80250c9003 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingctor/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.missingctor
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.missingctor
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingswitchdefault/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingswitchdefault/package-frame.html
index 6cbb0c2558..d91495bd1d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingswitchdefault/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingswitchdefault/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.missingswitchdefault
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.missingswitchdefault
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingswitchdefault/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingswitchdefault/package-summary.html
index 7a465f0b3b..99879718ac 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingswitchdefault/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/missingswitchdefault/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.missingswitchdefault
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.missingswitchdefault
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/modifiedcontrolvariable/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/modifiedcontrolvariable/package-frame.html
index afbdb158e8..bd7fac4c63 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/modifiedcontrolvariable/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/modifiedcontrolvariable/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.modifiedcontrolvariable
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.modifiedcontrolvariable
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/modifiedcontrolvariable/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/modifiedcontrolvariable/package-summary.html
index 89ffda0b31..474b33f770 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/modifiedcontrolvariable/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/modifiedcontrolvariable/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.modifiedcontrolvariable
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.modifiedcontrolvariable
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -111,7 +111,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplestringliterals/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplestringliterals/package-frame.html
index dfff97ebb2..8091c697cf 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplestringliterals/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplestringliterals/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.multiplestringliterals
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.multiplestringliterals
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplestringliterals/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplestringliterals/package-summary.html
index 63361800b6..a0bc2f2139 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplestringliterals/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplestringliterals/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.multiplestringliterals
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.multiplestringliterals
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -116,7 +116,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplevariabledeclarations/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplevariabledeclarations/package-frame.html
index 2c3f608ec2..6dc6e3280e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplevariabledeclarations/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplevariabledeclarations/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.multiplevariabledeclarations
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.multiplevariabledeclarations
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplevariabledeclarations/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplevariabledeclarations/package-summary.html
index d429e2783e..1305173432 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplevariabledeclarations/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/multiplevariabledeclarations/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.multiplevariabledeclarations
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.multiplevariabledeclarations
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedfordepth/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedfordepth/package-frame.html
index da724baba4..15b2fdca0e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedfordepth/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedfordepth/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nestedfordepth
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nestedfordepth
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedfordepth/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedfordepth/package-summary.html
index a3fbd20c47..c6a8d1ec0a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedfordepth/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedfordepth/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nestedfordepth
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nestedfordepth
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -91,7 +91,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedifdepth/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedifdepth/package-frame.html
index 8401fb5738..aff15419a6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedifdepth/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedifdepth/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nestedifdepth
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nestedifdepth
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedifdepth/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedifdepth/package-summary.html
index 34c3119dc0..2e14d3fa05 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedifdepth/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedifdepth/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nestedifdepth
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nestedifdepth
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedtrydepth/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedtrydepth/package-frame.html
index d745166902..4d3342a64c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedtrydepth/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedtrydepth/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nestedtrydepth
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nestedtrydepth
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedtrydepth/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedtrydepth/package-summary.html
index 2f346146d6..c2cf1298e9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedtrydepth/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nestedtrydepth/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nestedtrydepth
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nestedtrydepth
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noarraytrailingcomma/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noarraytrailingcomma/package-frame.html
index aef2c5abcc..3aa755ac8d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noarraytrailingcomma/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noarraytrailingcomma/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.noarraytrailingcomma
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.noarraytrailingcomma
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noarraytrailingcomma/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noarraytrailingcomma/package-summary.html
index 5dd6b34499..c861b9f95f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noarraytrailingcomma/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noarraytrailingcomma/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.noarraytrailingcomma
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.noarraytrailingcomma
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noclone/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noclone/package-frame.html
index c532937bf9..69c6d45b84 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noclone/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noclone/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.noclone
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.noclone
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noclone/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noclone/package-summary.html
index c7cee19b4f..51bca3b33e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noclone/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noclone/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.noclone
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.noclone
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -121,7 +121,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noenumtrailingcomma/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noenumtrailingcomma/package-frame.html
index 6a21f933d7..5c3e1b893d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noenumtrailingcomma/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noenumtrailingcomma/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.noenumtrailingcomma
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.noenumtrailingcomma
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noenumtrailingcomma/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noenumtrailingcomma/package-summary.html
index c1439aee8f..adc1ccb5f6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noenumtrailingcomma/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/noenumtrailingcomma/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.noenumtrailingcomma
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.noenumtrailingcomma
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -336,7 +336,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nofinalizer/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nofinalizer/package-frame.html
index 1b5af16d32..c5a8ce40bd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nofinalizer/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nofinalizer/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nofinalizer
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nofinalizer
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nofinalizer/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nofinalizer/package-summary.html
index f68fab7ee4..e8307b983d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nofinalizer/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/nofinalizer/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nofinalizer
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.nofinalizer
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/onestatementperline/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/onestatementperline/package-frame.html
index f734af9124..5a837d62d2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/onestatementperline/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/onestatementperline/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.onestatementperline
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.onestatementperline
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/onestatementperline/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/onestatementperline/package-summary.html
index 5227adda73..60f4adb341 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/onestatementperline/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/onestatementperline/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.onestatementperline
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.onestatementperline
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -136,7 +136,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/overloadmethodsdeclarationorder/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/overloadmethodsdeclarationorder/package-frame.html
index 69aea73ee2..ac9f081e5e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/overloadmethodsdeclarationorder/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/overloadmethodsdeclarationorder/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.overloadmethodsdeclarationorder
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.overloadmethodsdeclarationorder
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/overloadmethodsdeclarationorder/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/overloadmethodsdeclarationorder/package-summary.html
index 3b8a5ab33b..3f8704dfc7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/overloadmethodsdeclarationorder/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/overloadmethodsdeclarationorder/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.overloadmethodsdeclarationorder
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.overloadmethodsdeclarationorder
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -101,7 +101,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/package-frame.html
index 1927a40129..33c1e75a19 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/package-summary.html
index c7a32bb3a1..9797e8a4ab 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -606,7 +606,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/packagedeclaration/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/packagedeclaration/package-frame.html
index 41115e8445..45aa675a3b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/packagedeclaration/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/packagedeclaration/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.packagedeclaration
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.packagedeclaration
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/packagedeclaration/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/packagedeclaration/package-summary.html
index a1eb43af96..497d09069d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/packagedeclaration/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/packagedeclaration/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.packagedeclaration
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.packagedeclaration
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/parameterassignment/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/parameterassignment/package-frame.html
index e4eb1af657..b1a7689381 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/parameterassignment/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/parameterassignment/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.parameterassignment
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.parameterassignment
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/parameterassignment/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/parameterassignment/package-summary.html
index d06d79bc60..afe94bd360 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/parameterassignment/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/parameterassignment/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.parameterassignment
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.parameterassignment
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/requirethis/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/requirethis/package-frame.html
index b9c73f5135..0b81b39e5c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/requirethis/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/requirethis/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.requirethis
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.requirethis
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/requirethis/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/requirethis/package-summary.html
index 90833de4d7..5ccecb3f84 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/requirethis/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/requirethis/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.requirethis
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.requirethis
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -561,7 +561,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/returncount/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/returncount/package-frame.html
index b1d5a95197..2c77382ad8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/returncount/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/returncount/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.returncount
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.returncount
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/returncount/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/returncount/package-summary.html
index 2f15d20dfe..6d4fc54bd8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/returncount/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/returncount/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.returncount
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.returncount
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -121,7 +121,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanexpression/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanexpression/package-frame.html
index b8fe2d7e6a..717bdb0416 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanexpression/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanexpression/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.simplifybooleanexpression
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.simplifybooleanexpression
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanexpression/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanexpression/package-summary.html
index e7263e6366..108145483a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanexpression/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanexpression/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.simplifybooleanexpression
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.simplifybooleanexpression
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanreturn/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanreturn/package-frame.html
index 64b2c08dec..02c00838e8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanreturn/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanreturn/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.simplifybooleanreturn
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.simplifybooleanreturn
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanreturn/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanreturn/package-summary.html
index 6b4b291347..c9e27f8a84 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanreturn/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/simplifybooleanreturn/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.simplifybooleanreturn
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.simplifybooleanreturn
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/stringliteralequality/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/stringliteralequality/package-frame.html
index baf997b321..903b4f5976 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/stringliteralequality/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/stringliteralequality/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.stringliteralequality
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.stringliteralequality
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/stringliteralequality/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/stringliteralequality/package-summary.html
index 90dad0a700..f943b061af 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/stringliteralequality/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/stringliteralequality/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.stringliteralequality
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.stringliteralequality
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -91,7 +91,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superclone/Example1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superclone/Example1.html
new file mode 100644
index 0000000000..39bf7dfc33
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superclone/Example1.html
@@ -0,0 +1,48 @@
+
+
+
+Example1 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checks.coding.superclone;
+10
+11
+12 class Example1 {
+13 public Object clone() throws CloneNotSupportedException {
+14 return super .clone();
+15 }
+16 }
+17
+18 class SuperCloneB {
+19 private int b;
+20
+21
+22 public SuperCloneB clone() {
+23 SuperCloneB other = new SuperCloneB ();
+24 other.b = this .b;
+25 return other;
+26 }
+27 }
+28
+29 class SuperCloneC {
+30
+31 public SuperCloneC clone() throws CloneNotSupportedException {
+32 return (SuperCloneC ) super .clone();
+33 }
+34 }
+35
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superclone/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superclone/package-frame.html
index ed91d6897d..1b9f8a1c8a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superclone/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superclone/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.superclone
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.superclone
@@ -32,6 +32,9 @@
Classes
D
+
+
+ Example1
InnerClone
@@ -62,6 +65,12 @@ Classes
NoSuperClone
+
+
+ SuperCloneB
+
+
+ SuperCloneC
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superclone/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superclone/package-summary.html
index 04df5469fd..e6c82a8e30 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superclone/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superclone/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.superclone
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.superclone
@@ -23,7 +23,7 @@
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
@@ -93,53 +93,68 @@ Package com.puppycrawl.tools.checkstyle.checks
- InnerClone
+ Example1
- InnerClone.Inner
+ InnerClone
- InputSuperCloneInnerAndWithArguments
+ InnerClone.Inner
- InputSuperCloneMethodReference
+ InputSuperCloneInnerAndWithArguments
- InputSuperCloneMethodReference.CheckedSupplier
+ InputSuperCloneMethodReference
- InputSuperClonePlainAndSubclasses
+ InputSuperCloneMethodReference.CheckedSupplier
- InputSuperCloneWithoutWarnings
+ InputSuperClonePlainAndSubclasses
- MyClassWithGenericSuperMethod
+ InputSuperCloneWithoutWarnings
- NativeTest
+ MyClassWithGenericSuperMethod
+
+ NativeTest
+
+
+
NoSuperClone
+
+
+
+ SuperCloneB
+
+
+
+
+ SuperCloneC
+
@@ -161,7 +176,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superfinalize/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superfinalize/package-frame.html
index 78750eaa10..3ed12942cb 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superfinalize/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superfinalize/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.superfinalize
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.superfinalize
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superfinalize/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superfinalize/package-summary.html
index dac7192e01..51cf2f144d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superfinalize/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/superfinalize/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.superfinalize
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.superfinalize
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -136,7 +136,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessaryparentheses/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessaryparentheses/package-frame.html
index 01010f4a8b..bfdbfe7995 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessaryparentheses/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessaryparentheses/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessaryparentheses
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessaryparentheses
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessaryparentheses/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessaryparentheses/package-summary.html
index b09bd1bfd5..db345466bd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessaryparentheses/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessaryparentheses/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessaryparentheses
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessaryparentheses
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -161,7 +161,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonafteroutertypedeclaration/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonafteroutertypedeclaration/package-frame.html
index 02d718b3eb..09f8385c3c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonafteroutertypedeclaration/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonafteroutertypedeclaration/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicolonafteroutertypedeclaration
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicolonafteroutertypedeclaration
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonafteroutertypedeclaration/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonafteroutertypedeclaration/package-summary.html
index 102a6a8169..52803990b8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonafteroutertypedeclaration/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonafteroutertypedeclaration/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicolonafteroutertypedeclaration
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicolonafteroutertypedeclaration
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -136,7 +136,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonaftertypememberdeclaration/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonaftertypememberdeclaration/package-frame.html
index e65fce2c93..bb648aa30c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonaftertypememberdeclaration/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonaftertypememberdeclaration/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicolonaftertypememberdeclaration
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicolonaftertypememberdeclaration
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonaftertypememberdeclaration/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonaftertypememberdeclaration/package-summary.html
index 4212a8f537..f513372018 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonaftertypememberdeclaration/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonaftertypememberdeclaration/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicolonaftertypememberdeclaration
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicolonaftertypememberdeclaration
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -181,7 +181,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicoloninenumeration/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicoloninenumeration/package-frame.html
index 36b9ee74f0..3a150d6fc5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicoloninenumeration/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicoloninenumeration/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicoloninenumeration
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicoloninenumeration
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicoloninenumeration/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicoloninenumeration/package-summary.html
index 0f2e9ad202..d72144598b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicoloninenumeration/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicoloninenumeration/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicoloninenumeration
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicoloninenumeration
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -226,7 +226,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonintrywithresources/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonintrywithresources/package-frame.html
index 2b82e64994..7e0eb47162 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonintrywithresources/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonintrywithresources/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicolonintrywithresources
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicolonintrywithresources
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonintrywithresources/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonintrywithresources/package-summary.html
index 941d5d2a29..642ac6369b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonintrywithresources/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unnecessarysemicolonintrywithresources/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicolonintrywithresources
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unnecessarysemicolonintrywithresources
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unusedlocalvariable/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unusedlocalvariable/package-frame.html
index 1525e3c389..bd0a9a4f33 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unusedlocalvariable/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unusedlocalvariable/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unusedlocalvariable
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unusedlocalvariable
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unusedlocalvariable/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unusedlocalvariable/package-summary.html
index 769e7f8eae..f1ab786d70 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unusedlocalvariable/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/unusedlocalvariable/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unusedlocalvariable
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.unusedlocalvariable
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -506,7 +506,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/variabledeclarationusagedistance/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/variabledeclarationusagedistance/package-frame.html
index 8789c66c57..b85e25c6d5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/variabledeclarationusagedistance/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/variabledeclarationusagedistance/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.variabledeclarationusagedistance
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.variabledeclarationusagedistance
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/variabledeclarationusagedistance/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/variabledeclarationusagedistance/package-summary.html
index cefa3580fa..061a123f41 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/variabledeclarationusagedistance/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/coding/variabledeclarationusagedistance/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.variabledeclarationusagedistance
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.coding.variabledeclarationusagedistance
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -236,7 +236,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenIllegalTokens.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenIllegalTokens.html
index 8f8bf4ba47..ef15bea499 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenIllegalTokens.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenIllegalTokens.html
@@ -23,7 +23,7 @@
15
16 package com.puppycrawl.tools.checkstyle.checks.descendanttoken;
17
-18 public class InputDescendantTokenIllegalTokens
+18 public class InputDescendantTokenIllegalTokens
19 {
20 public void methodWithPreviouslyIllegalTokens()
21 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenIllegalTokens5.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenIllegalTokens5.html
index dd6c1bf20f..dacb12f9ca 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenIllegalTokens5.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenIllegalTokens5.html
@@ -23,7 +23,7 @@
15
16 package com.puppycrawl.tools.checkstyle.checks.descendanttoken;
17
-18 public class InputDescendantTokenIllegalTokens5
+18 public class InputDescendantTokenIllegalTokens5
19 {
20 public void methodWithPreviouslyIllegalTokens()
21 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenIllegalTokens6.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenIllegalTokens6.html
index f24c4d35b9..79d7cfe513 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenIllegalTokens6.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenIllegalTokens6.html
@@ -23,7 +23,7 @@
15
16 package com.puppycrawl.tools.checkstyle.checks.descendanttoken;
17
-18 public class InputDescendantTokenIllegalTokens6
+18 public class InputDescendantTokenIllegalTokens6
19 {
20 public void methodWithPreviouslyIllegalTokens()
21 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenReturnFromFinally2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenReturnFromFinally2.html
index 089d7d4de2..37f76a0e2a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenReturnFromFinally2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenReturnFromFinally2.html
@@ -23,7 +23,7 @@
15
16 package com.puppycrawl.tools.checkstyle.checks.descendanttoken;
17
-18 public class InputDescendantTokenReturnFromFinally2 {
+18 public class InputDescendantTokenReturnFromFinally2 {
19 public void foo() {
20 try {
21 System.currentTimeMillis();
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenTestLimitedToken.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenTestLimitedToken.html
index ffb697ef73..c6e140aa24 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenTestLimitedToken.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/InputDescendantTokenTestLimitedToken.html
@@ -16,30 +16,29 @@
8
9 package com.puppycrawl.tools.checkstyle.checks.descendanttoken;
10
-11
-12 public class InputDescendantTokenTestLimitedToken {
-13 }
-14
-15 class Test {
-16 public static void main(String[] args) {
-17 int x = 1;
-18 switch (x) {
-19 case 1:
-20 x--;
-21 break ;
-22 default :
-23 x++;
-24 break ;
-25 }
-26
-27 int y = 1;
-28 switch (y) {
-29 case 1:
-30 y++;
-31 break ;
-32 }
-33 }
-34 }
+11 public class InputDescendantTokenTestLimitedToken {
+12 }
+13
+14 class Test {
+15 public static void main(String[] args) {
+16 int x = 1;
+17 switch (x) {
+18 case 1:
+19 x--;
+20 break ;
+21 default :
+22 x++;
+23 break ;
+24 }
+25
+26 int y = 1;
+27 switch (y) {
+28 case 1:
+29 y++;
+30 break ;
+31 }
+32 }
+33 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/package-frame.html
index 9623f59e97..bc47c2b87c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.descendanttoken
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.descendanttoken
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/package-summary.html
index f0998b723a..799bc878c4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/descendanttoken/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.descendanttoken
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.descendanttoken
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -191,7 +191,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/FinalClassCheckExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/FinalClassCheckExamplesTest.html
index dd320dde35..9e1eb9228a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/FinalClassCheckExamplesTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/FinalClassCheckExamplesTest.html
@@ -42,8 +42,8 @@
34 @Test
35 public void testExample1() throws Exception {
36 final String[] expected = {
-37 "14:1: " + getCheckMessage(MSG_KEY, "A" ),
-38 "41:3: " + getCheckMessage(MSG_KEY, "Class2" ),
+37 "19:3: " + getCheckMessage(MSG_KEY, "B" ),
+38 "50:5: " + getCheckMessage(MSG_KEY, "Class2" ),
39 };
40
41 verifyWithInlineConfigParser(getPath("Example1.java" ), expected);
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/designforextension/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/designforextension/package-frame.html
index 930812c1c5..480a3b308e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/designforextension/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/designforextension/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.designforextension
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.designforextension
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/designforextension/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/designforextension/package-summary.html
index bda4200fa4..eb132120ff 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/designforextension/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/designforextension/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.designforextension
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.designforextension
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -206,7 +206,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/finalclass/Example1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/finalclass/Example1.html
index c3f228eba1..b823927c44 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/finalclass/Example1.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/finalclass/Example1.html
@@ -2,10 +2,10 @@
Example1 xref
-
+
-
+
1
2
3
@@ -14,46 +14,56 @@
6
7
8
-9
-10 final class Example1 {
-11 private Example1 () { }
-12 }
+9 package com.puppycrawl.tools.checkstyle.checks.design.finalclass;
+10
+11
+12 public class Example1 {
13
-14 class A {
-15 private A () { }
-16 }
-17
-18 class B {
-19 int field1;
-20 String field2;
-21 private B (int value) {
-22 this .field1 = value;
-23 this .field2 = " " ;
-24 }
-25 public B (String value) {
-26 this .field2 = value;
-27 this .field1 = 0;
-28 }
-29 }
-30
-31 class TestAnonymousInnerClasses {
-32 public static final TestAnonymousInnerClasses ONE
-33 = new TestAnonymousInnerClasses () {};
-34
-35 private TestAnonymousInnerClasses () {
-36 }
-37 }
+14 final class A {
+15 private A() {
+16 }
+17 }
+18
+19 class B {
+20 private B() {
+21 }
+22 }
+23
+24 class C {
+25 int field1;
+26 String field2;
+27
+28 private C(int value) {
+29 this .field1 = value;
+30 this .field2 = " " ;
+31 }
+32
+33 public C(String value) {
+34 this .field2 = value;
+35 this .field1 = 0;
+36 }
+37 }
38
-39 class Class1 {
-40
-41 private class Class2 {
-42 }
+39 class AnonymousInner {
+40 public final AnonymousInner ONE
+41 = new AnonymousInner() {
+42 };
43
-44 public class Class3 {
-45 }
-46
-47 }
-48
+44 private AnonymousInner() {
+45 }
+46 }
+47
+48 class Class1 {
+49
+50 private class Class2 {
+51 }
+52
+53 public class Class3 {
+54 }
+55
+56 }
+57 }
+58
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/finalclass/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/finalclass/package-frame.html
index 6890b45ee4..db2228d9e9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/finalclass/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/finalclass/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.finalclass
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.finalclass
@@ -53,6 +53,30 @@ Classes
Exam2.PaperSetter
+
+
+ Example1
+
+
+ Example1.A
+
+
+ Example1.AnonymousInner
+
+
+ Example1.B
+
+
+ Example1.C
+
+
+ Example1.Class1
+
+
+ Example1.Class1.Class2
+
+
+ Example1.Class1.Class3
IfAbstract
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/finalclass/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/finalclass/package-summary.html
index 6966f71269..d992c84c9a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/finalclass/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/finalclass/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.finalclass
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.finalclass
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -125,6 +125,46 @@ Package com.puppycrawl.tools.checkstyle.checks
Exam2.PaperSetter
+
+
+
+ Example1
+
+
+
+
+ Example1.A
+
+
+
+
+ Example1.AnonymousInner
+
+
+
+
+ Example1.B
+
+
+
+
+ Example1.C
+
+
+
+
+ Example1.Class1
+
+
+
+
+ Example1.Class1.Class2
+
+
+
+
+ Example1.Class1.Class3
+
@@ -896,7 +936,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/hideutilityclassconstructor/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/hideutilityclassconstructor/package-frame.html
index 24456ba620..5423053064 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/hideutilityclassconstructor/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/hideutilityclassconstructor/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.hideutilityclassconstructor
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.hideutilityclassconstructor
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/hideutilityclassconstructor/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/hideutilityclassconstructor/package-summary.html
index 7e1612a5fa..8810340319 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/hideutilityclassconstructor/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/hideutilityclassconstructor/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.hideutilityclassconstructor
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.hideutilityclassconstructor
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -186,7 +186,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/innertypelast/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/innertypelast/package-frame.html
index 50ac18628a..64a31b818d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/innertypelast/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/innertypelast/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.innertypelast
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.innertypelast
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/innertypelast/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/innertypelast/package-summary.html
index c294835ae2..964a92f5ec 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/innertypelast/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/innertypelast/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.innertypelast
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.innertypelast
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -216,7 +216,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/interfaceistype/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/interfaceistype/package-frame.html
index 03a59e72b9..fccfcb0693 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/interfaceistype/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/interfaceistype/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.interfaceistype
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.interfaceistype
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/interfaceistype/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/interfaceistype/package-summary.html
index 788d729c7f..7c22ca2ee1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/interfaceistype/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/interfaceistype/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.interfaceistype
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.interfaceistype
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -116,7 +116,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/mutableexception/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/mutableexception/package-frame.html
index 46b7e2765f..2e074084db 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/mutableexception/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/mutableexception/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.mutableexception
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.mutableexception
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/mutableexception/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/mutableexception/package-summary.html
index 5d9bb86be8..1606a8df08 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/mutableexception/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/mutableexception/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.mutableexception
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.mutableexception
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -261,7 +261,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/onetoplevelclass/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/onetoplevelclass/package-frame.html
index 44003524c4..7a5700b436 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/onetoplevelclass/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/onetoplevelclass/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.onetoplevelclass
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.onetoplevelclass
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/onetoplevelclass/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/onetoplevelclass/package-summary.html
index 3452b98eae..97dd44afe0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/onetoplevelclass/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/onetoplevelclass/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.onetoplevelclass
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.onetoplevelclass
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -291,7 +291,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/package-frame.html
index 831b168038..175c85f008 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/package-summary.html
index 883d256ec6..68321ad3d2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -166,7 +166,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/throwscount/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/throwscount/package-frame.html
index 8649ef5104..a4ef1ab3fa 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/throwscount/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/throwscount/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.throwscount
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.throwscount
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/throwscount/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/throwscount/package-summary.html
index f73a8e45c9..b1a1a6957d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/throwscount/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/throwscount/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.throwscount
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.throwscount
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -126,7 +126,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/inputs/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/inputs/package-frame.html
index 4a3811ae07..c6301c9aff 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/inputs/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/inputs/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.visibilitymodifier.inputs
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.visibilitymodifier.inputs
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/inputs/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/inputs/package-summary.html
index 866a17dbcd..67c81f9732 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/inputs/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/inputs/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.visibilitymodifier.inputs
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.visibilitymodifier.inputs
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/package-frame.html
index 5bab07b701..35c6f7587a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.visibilitymodifier
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.visibilitymodifier
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/package-summary.html
index 1778dd9292..8646b1260d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/design/visibilitymodifier/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.design.visibilitymodifier
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.design.visibilitymodifier
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -436,7 +436,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/finalparameters/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/finalparameters/package-frame.html
index ed7765ce58..cfcb9dd6a2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/finalparameters/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/finalparameters/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.finalparameters
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.finalparameters
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/finalparameters/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/finalparameters/package-summary.html
index 7bb655626d..29d3f9140e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/finalparameters/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/finalparameters/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.finalparameters
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.finalparameters
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -221,7 +221,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/header/header/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/header/header/package-frame.html
index 8ee1e74d69..c379925703 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/header/header/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/header/header/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.header.header
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.header.header
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/header/header/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/header/header/package-summary.html
index 7fa8356540..a9e7d553ad 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/header/header/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/header/header/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.header.header
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.header.header
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/header/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/header/package-frame.html
index 8fa87cc632..509239eeb8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/header/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/header/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.header
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.header
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/header/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/header/package-summary.html
index 3afa674117..e091afdb3b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/header/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/header/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.header
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.header
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/header/regexpheader/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/header/regexpheader/package-frame.html
index 737dcc8e8d..22fa30410c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/header/regexpheader/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/header/regexpheader/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.header.regexpheader
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.header.regexpheader
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/header/regexpheader/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/header/regexpheader/package-summary.html
index a646dbff68..37c4f9ffda 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/header/regexpheader/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/header/regexpheader/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.header.regexpheader
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.header.regexpheader
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -121,7 +121,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/ImportControlCheckTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/ImportControlCheckTest.html
index 7bc5ce534b..4dd4690a9c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/ImportControlCheckTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/ImportControlCheckTest.html
@@ -27,441 +27,466 @@
19
20 package com.puppycrawl.tools.checkstyle.checks.imports;
21
-22 import static com.google.common.truth.Truth.assertWithMessage;
-23 import static com.puppycrawl.tools.checkstyle.checks.imports.ImportControlCheck.MSG_DISALLOWED;
-24 import static com.puppycrawl.tools.checkstyle.checks.imports.ImportControlCheck.MSG_MISSING_FILE;
-25 import static com.puppycrawl.tools.checkstyle.checks.imports.ImportControlCheck.MSG_UNKNOWN_PKG;
-26
-27 import java.io.File;
-28 import java.nio.file.Files;
-29 import java.util.Arrays;
-30 import java.util.List;
-31
-32 import org.junit.jupiter.api.Test;
-33 import org.junit.jupiter.api.io.TempDir;
-34
-35 import com.puppycrawl.tools.checkstyle.AbstractModuleTestSupport;
-36 import com.puppycrawl.tools.checkstyle.DefaultConfiguration;
-37 import com.puppycrawl.tools.checkstyle.TreeWalker;
-38 import com.puppycrawl.tools.checkstyle.api.CheckstyleException;
-39 import com.puppycrawl.tools.checkstyle.api.TokenTypes;
-40 import com.puppycrawl.tools.checkstyle.utils.CommonUtil;
-41
-42 public class ImportControlCheckTest extends AbstractModuleTestSupport {
+22 import static com.google.common.truth.Truth.assertThat;
+23 import static com.google.common.truth.Truth.assertWithMessage;
+24 import static com.puppycrawl.tools.checkstyle.checks.imports.ImportControlCheck.MSG_DISALLOWED;
+25 import static com.puppycrawl.tools.checkstyle.checks.imports.ImportControlCheck.MSG_MISSING_FILE;
+26 import static com.puppycrawl.tools.checkstyle.checks.imports.ImportControlCheck.MSG_UNKNOWN_PKG;
+27 import static org.junit.jupiter.api.Assertions.assertThrows;
+28
+29 import java.io.File;
+30 import java.nio.file.Files;
+31 import java.util.Arrays;
+32 import java.util.List;
+33
+34 import org.junit.jupiter.api.Test;
+35 import org.junit.jupiter.api.io.TempDir;
+36
+37 import com.puppycrawl.tools.checkstyle.AbstractModuleTestSupport;
+38 import com.puppycrawl.tools.checkstyle.DefaultConfiguration;
+39 import com.puppycrawl.tools.checkstyle.TreeWalker;
+40 import com.puppycrawl.tools.checkstyle.api.CheckstyleException;
+41 import com.puppycrawl.tools.checkstyle.api.TokenTypes;
+42 import com.puppycrawl.tools.checkstyle.utils.CommonUtil;
43
-44 @TempDir
-45 public File temporaryFolder;
-46
-47 @Override
-48 protected String getPackageLocation() {
-49 return "com/puppycrawl/tools/checkstyle/checks/imports/importcontrol" ;
-50 }
-51
-52 @Test
-53 public void testGetRequiredTokens() {
-54 final ImportControlCheck checkObj = new ImportControlCheck();
-55 final int [] expected = {
-56 TokenTypes.PACKAGE_DEF,
-57 TokenTypes.IMPORT,
-58 TokenTypes.STATIC_IMPORT,
-59 };
-60 assertWithMessage("Default required tokens are invalid" )
-61 .that(checkObj.getRequiredTokens())
-62 .isEqualTo(expected);
-63 }
-64
-65 @Test
-66 public void testOne() throws Exception {
-67 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
-68
-69 verifyWithInlineConfigParser(
-70 getPath("InputImportControl.java" ), expected);
-71 }
-72
-73 @Test
-74 public void testTwo() throws Exception {
-75 final String[] expected = {
-76 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
-77 "12:1: " + getCheckMessage(MSG_DISALLOWED, "javax.swing.border.*" ),
-78 "14:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Button.ABORT" ),
-79 };
-80
-81 verifyWithInlineConfigParser(
-82 getPath("InputImportControl2.java" ), expected);
-83 }
-84
-85 @Test
-86 public void testWrong() throws Exception {
-87 final String[] expected = {"9:1: " + getCheckMessage(MSG_UNKNOWN_PKG)};
-88 verifyWithInlineConfigParser(
-89 getPath("InputImportControl3.java" ), expected);
-90 }
-91
-92 @Test
-93 public void testMissing() throws Exception {
-94 final String[] expected = {"9:1: " + getCheckMessage(MSG_MISSING_FILE)};
-95 verifyWithInlineConfigParser(
-96 getPath("InputImportControl4.java" ), expected);
-97 }
-98
-99 @Test
-100 public void testEmpty() throws Exception {
-101 final String[] expected = {"9:1: " + getCheckMessage(MSG_MISSING_FILE)};
-102 verifyWithInlineConfigParser(
-103 getPath("InputImportControl5.java" ), expected);
-104 }
-105
-106 @Test
-107 public void testNull() throws Exception {
-108 final String[] expected = {"9:1: " + getCheckMessage(MSG_MISSING_FILE)};
-109 verifyWithInlineConfigParser(
-110 getPath("InputImportControl6.java" ), expected);
-111 }
-112
-113 @Test
-114 public void testUnknown() throws Exception {
-115 try {
-116 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-117 verifyWithInlineConfigParser(
-118 getPath("InputImportControl7.java" ), expected);
-119 assertWithMessage("Test should fail if exception was not thrown" ).fail();
-120 }
-121 catch (CheckstyleException ex) {
-122 final String message = getCheckstyleExceptionMessage(ex);
-123 final String messageStart = "Unable to find: " ;
-124
-125 assertWithMessage("Invalid message, should start with: %s" , messageStart)
-126 .that(message)
-127 .startsWith(messageStart);
-128 }
-129 }
-130
-131 @Test
-132 public void testBroken() throws Exception {
-133 try {
-134 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-135 verifyWithInlineConfigParser(getPath("InputImportControl8.java" ), expected);
-136 assertWithMessage("Test should fail if exception was not thrown" ).fail();
-137 }
-138 catch (CheckstyleException ex) {
-139 final String message = getCheckstyleExceptionMessage(ex);
-140 final String messageStart = "Unable to load " ;
-141
-142 assertWithMessage("Invalid message, should start with: %s" , messageStart)
-143 .that(message)
-144 .startsWith(messageStart);
-145 }
-146 }
-147
-148 @Test
-149 public void testOneRegExp() throws Exception {
-150 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
-151
-152 verifyWithInlineConfigParser(
-153 getPath("InputImportControl9.java" ), expected);
-154 }
-155
-156 @Test
-157 public void testTwoRegExp() throws Exception {
-158 final String[] expected = {
-159 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
-160 "12:1: " + getCheckMessage(MSG_DISALLOWED, "javax.swing.border.*" ),
-161 "14:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Button.ABORT" ),
-162 };
-163
-164 verifyWithInlineConfigParser(
-165 getPath("InputImportControl10.java" ), expected);
-166 }
-167
-168 @Test
-169 public void testNotRegExpNoMatch() throws Exception {
-170
-171 verifyWithInlineConfigParser(
-172 getPath("InputImportControl11.java" ), CommonUtil.EMPTY_STRING_ARRAY);
-173 }
-174
-175 @Test
-176 public void testBlacklist() throws Exception {
-177 final String[] expected = {
-178 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.stream.Stream" ),
-179 "12:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.Date" ),
-180 "14:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.stream.Collectors" ),
-181 "15:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.stream.IntStream" ),
-182 };
-183
-184 verifyWithInlineConfigParser(
-185 getPath("InputImportControl_Blacklist.java" ), expected);
-186 }
-187
-188 @Test
-189 public void testStrategyOnMismatchOne() throws Exception {
-190 final String[] expected = {
-191 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
-192 "12:1: " + getCheckMessage(MSG_DISALLOWED, "javax.swing.border.*" ),
-193 "14:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Button.ABORT" ),
-194 };
-195
-196 verifyWithInlineConfigParser(
-197 getPath("InputImportControl12.java" ), expected);
-198 }
-199
-200 @Test
-201 public void testStrategyOnMismatchTwo() throws Exception {
-202 final String[] expected = {
-203 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
-204 "14:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Button.ABORT" ),
-205 };
-206
-207 verifyWithInlineConfigParser(
-208 getPath("InputImportControl13.java" ), expected);
-209 }
-210
-211 @Test
-212 public void testStrategyOnMismatchThree() throws Exception {
-213 final String[] expected = {
-214 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
-215 };
-216
-217 verifyWithInlineConfigParser(
-218 getPath("InputImportControl14.java" ), expected);
-219 }
-220
-221 @Test
-222 public void testStrategyOnMismatchFour() throws Exception {
-223 final String[] expected = {
-224 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
-225 "12:1: " + getCheckMessage(MSG_DISALLOWED, "javax.swing.border.*" ),
-226 };
-227
-228 verifyWithInlineConfigParser(
-229 getPath("InputImportControl15.java" ), expected);
-230 }
-231
-232 @Test
-233 public void testWithoutRegexAndWithStrategyOnMismatch() throws Exception {
-234 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-235
-236 verifyWithInlineConfigParser(
-237 getPath("InputImportControlWithoutRegexAndWithStrategyOnMismatch.java" ),
-238 expected);
-239 }
-240
-241 @Test
-242 public void testPkgRegExpInParent() throws Exception {
-243 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
-244
-245 verifyWithInlineConfigParser(
-246 getPath("InputImportControl16.java" ), expected);
-247 }
-248
-249 @Test
-250 public void testPkgRegExpInChild() throws Exception {
-251 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
-252
-253 verifyWithInlineConfigParser(
-254 getPath("InputImportControl162.java" ), expected);
-255 }
-256
-257 @Test
-258 public void testPkgRegExpInBoth() throws Exception {
-259 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
-260
-261 verifyWithInlineConfigParser(
-262 getPath("InputImportControl163.java" ), expected);
-263 }
-264
-265 @Test
-266 public void testGetAcceptableTokens() {
-267 final ImportControlCheck testCheckObject =
-268 new ImportControlCheck();
-269 final int [] actual = testCheckObject.getAcceptableTokens();
-270 final int [] expected = {
-271 TokenTypes.PACKAGE_DEF,
-272 TokenTypes.IMPORT,
-273 TokenTypes.STATIC_IMPORT,
-274 };
-275
-276 assertWithMessage("Default acceptable tokens are invalid" )
-277 .that(actual)
-278 .isEqualTo(expected);
-279 }
-280
-281 @Test
-282 public void testResource() throws Exception {
-283 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
-284
-285 verifyWithInlineConfigParser(
-286 getPath("InputImportControl17.java" ), expected);
-287 }
-288
-289 @Test
-290 public void testResourceUnableToLoad() throws Exception {
-291 try {
-292 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-293 verifyWithInlineConfigParser(getPath("InputImportControl18.java" ), expected);
-294 assertWithMessage("Test should fail if exception was not thrown" ).fail();
-295 }
-296 catch (CheckstyleException ex) {
-297 final String message = getCheckstyleExceptionMessage(ex);
-298 final String messageStart = "Unable to find: " ;
-299
-300 assertWithMessage("Invalid message, should start with: %s" , messageStart)
-301 .that(message)
-302 .startsWith(messageStart);
-303 }
-304 }
-305
-306 @Test
-307 public void testUrlInFileProperty() throws Exception {
-308 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
-309
-310 verifyWithInlineConfigParser(
-311 getPath("InputImportControl19.java" ), expected);
-312 }
-313
-314 @Test
-315 public void testUrlInFilePropertyUnableToLoad() throws Exception {
-316
-317 try {
-318 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-319 verifyWithInlineConfigParser(
-320 getPath("InputImportControl20.java" ), expected);
-321 assertWithMessage("Test should fail if exception was not thrown" ).fail();
-322 }
-323 catch (CheckstyleException ex) {
-324 final String message = getCheckstyleExceptionMessage(ex);
-325 final String messageStart = "Unable to load " ;
-326
-327 assertWithMessage("Invalid message, should start with: %s" , messageStart)
-328 .that(message)
-329 .startsWith(messageStart);
-330 }
-331 }
-332
-333 @Test
-334 public void testCacheWhenFileExternalResourceContentDoesNotChange() throws Exception {
-335 final DefaultConfiguration checkConfig = createModuleConfig(ImportControlCheck.class );
-336 checkConfig.addProperty("file" , getPath("InputImportControlOneRegExp.xml" ));
-337
-338 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
-339 treeWalkerConfig.addChild(checkConfig);
-340
-341 final DefaultConfiguration checkerConfig = createRootConfig(treeWalkerConfig);
-342 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
-343 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
-344
-345 final String filePath = File.createTempFile("empty" , ".java" , temporaryFolder).getPath();
+44 public class ImportControlCheckTest extends AbstractModuleTestSupport {
+45
+46 @TempDir
+47 public File temporaryFolder;
+48
+49 @Override
+50 protected String getPackageLocation() {
+51 return "com/puppycrawl/tools/checkstyle/checks/imports/importcontrol" ;
+52 }
+53
+54 @Test
+55 public void testGetRequiredTokens() {
+56 final ImportControlCheck checkObj = new ImportControlCheck();
+57 final int [] expected = {
+58 TokenTypes.PACKAGE_DEF,
+59 TokenTypes.IMPORT,
+60 TokenTypes.STATIC_IMPORT,
+61 };
+62 assertWithMessage("Default required tokens are invalid" )
+63 .that(checkObj.getRequiredTokens())
+64 .isEqualTo(expected);
+65 }
+66
+67 @Test
+68 public void testOne() throws Exception {
+69 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
+70
+71 verifyWithInlineConfigParser(
+72 getPath("InputImportControl.java" ), expected);
+73 }
+74
+75 @Test
+76 public void testTwo() throws Exception {
+77 final String[] expected = {
+78 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
+79 "12:1: " + getCheckMessage(MSG_DISALLOWED, "javax.swing.border.*" ),
+80 "14:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Button.ABORT" ),
+81 };
+82
+83 verifyWithInlineConfigParser(
+84 getPath("InputImportControl2.java" ), expected);
+85 }
+86
+87 @Test
+88 public void testWrong() throws Exception {
+89 final String[] expected = {"9:1: " + getCheckMessage(MSG_UNKNOWN_PKG)};
+90 verifyWithInlineConfigParser(
+91 getPath("InputImportControl3.java" ), expected);
+92 }
+93
+94 @Test
+95 public void testMissing() throws Exception {
+96 final String[] expected = {"9:1: " + getCheckMessage(MSG_MISSING_FILE)};
+97 verifyWithInlineConfigParser(
+98 getPath("InputImportControl4.java" ), expected);
+99 }
+100
+101 @Test
+102 public void testEmpty() throws Exception {
+103 final String[] expected = {"9:1: " + getCheckMessage(MSG_MISSING_FILE)};
+104 verifyWithInlineConfigParser(
+105 getPath("InputImportControl5.java" ), expected);
+106 }
+107
+108 @Test
+109 public void testNull() throws Exception {
+110 final String[] expected = {"9:1: " + getCheckMessage(MSG_MISSING_FILE)};
+111 verifyWithInlineConfigParser(
+112 getPath("InputImportControl6.java" ), expected);
+113 }
+114
+115 @Test
+116 public void testUnknown() throws Exception {
+117 try {
+118 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+119 verifyWithInlineConfigParser(
+120 getPath("InputImportControl7.java" ), expected);
+121 assertWithMessage("Test should fail if exception was not thrown" ).fail();
+122 }
+123 catch (CheckstyleException ex) {
+124 final String message = getCheckstyleExceptionMessage(ex);
+125 final String messageStart = "Unable to find: " ;
+126
+127 assertWithMessage("Invalid message, should start with: %s" , messageStart)
+128 .that(message)
+129 .startsWith(messageStart);
+130 }
+131 }
+132
+133 @Test
+134 public void testBroken() throws Exception {
+135 try {
+136 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+137 verifyWithInlineConfigParser(getPath("InputImportControl8.java" ), expected);
+138 assertWithMessage("Test should fail if exception was not thrown" ).fail();
+139 }
+140 catch (CheckstyleException ex) {
+141 final String message = getCheckstyleExceptionMessage(ex);
+142 final String messageStart = "Unable to load " ;
+143
+144 assertWithMessage("Invalid message, should start with: %s" , messageStart)
+145 .that(message)
+146 .startsWith(messageStart);
+147 }
+148 }
+149
+150 @Test
+151 public void testOneRegExp() throws Exception {
+152 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
+153
+154 verifyWithInlineConfigParser(
+155 getPath("InputImportControl9.java" ), expected);
+156 }
+157
+158 @Test
+159 public void testTwoRegExp() throws Exception {
+160 final String[] expected = {
+161 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
+162 "12:1: " + getCheckMessage(MSG_DISALLOWED, "javax.swing.border.*" ),
+163 "14:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Button.ABORT" ),
+164 };
+165
+166 verifyWithInlineConfigParser(
+167 getPath("InputImportControl10.java" ), expected);
+168 }
+169
+170 @Test
+171 public void testNotRegExpNoMatch() throws Exception {
+172
+173 verifyWithInlineConfigParser(
+174 getPath("InputImportControl11.java" ), CommonUtil.EMPTY_STRING_ARRAY);
+175 }
+176
+177 @Test
+178 public void testBlacklist() throws Exception {
+179 final String[] expected = {
+180 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.stream.Stream" ),
+181 "12:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.Date" ),
+182 "14:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.stream.Collectors" ),
+183 "15:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.stream.IntStream" ),
+184 };
+185
+186 verifyWithInlineConfigParser(
+187 getPath("InputImportControl_Blacklist.java" ), expected);
+188 }
+189
+190 @Test
+191 public void testStrategyOnMismatchOne() throws Exception {
+192 final String[] expected = {
+193 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
+194 "12:1: " + getCheckMessage(MSG_DISALLOWED, "javax.swing.border.*" ),
+195 "14:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Button.ABORT" ),
+196 };
+197
+198 verifyWithInlineConfigParser(
+199 getPath("InputImportControl12.java" ), expected);
+200 }
+201
+202 @Test
+203 public void testStrategyOnMismatchTwo() throws Exception {
+204 final String[] expected = {
+205 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
+206 "14:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Button.ABORT" ),
+207 };
+208
+209 verifyWithInlineConfigParser(
+210 getPath("InputImportControl13.java" ), expected);
+211 }
+212
+213 @Test
+214 public void testStrategyOnMismatchThree() throws Exception {
+215 final String[] expected = {
+216 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
+217 };
+218
+219 verifyWithInlineConfigParser(
+220 getPath("InputImportControl14.java" ), expected);
+221 }
+222
+223 @Test
+224 public void testStrategyOnMismatchFour() throws Exception {
+225 final String[] expected = {
+226 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
+227 "12:1: " + getCheckMessage(MSG_DISALLOWED, "javax.swing.border.*" ),
+228 };
+229
+230 verifyWithInlineConfigParser(
+231 getPath("InputImportControl15.java" ), expected);
+232 }
+233
+234 @Test
+235 public void testWithoutRegexAndWithStrategyOnMismatch() throws Exception {
+236 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+237
+238 verifyWithInlineConfigParser(
+239 getPath("InputImportControlWithoutRegexAndWithStrategyOnMismatch.java" ),
+240 expected);
+241 }
+242
+243 @Test
+244 public void testPkgRegExpInParent() throws Exception {
+245 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
+246
+247 verifyWithInlineConfigParser(
+248 getPath("InputImportControl16.java" ), expected);
+249 }
+250
+251 @Test
+252 public void testPkgRegExpInChild() throws Exception {
+253 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
+254
+255 verifyWithInlineConfigParser(
+256 getPath("InputImportControl162.java" ), expected);
+257 }
+258
+259 @Test
+260 public void testPkgRegExpInBoth() throws Exception {
+261 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
+262
+263 verifyWithInlineConfigParser(
+264 getPath("InputImportControl163.java" ), expected);
+265 }
+266
+267 @Test
+268 public void testGetAcceptableTokens() {
+269 final ImportControlCheck testCheckObject =
+270 new ImportControlCheck();
+271 final int [] actual = testCheckObject.getAcceptableTokens();
+272 final int [] expected = {
+273 TokenTypes.PACKAGE_DEF,
+274 TokenTypes.IMPORT,
+275 TokenTypes.STATIC_IMPORT,
+276 };
+277
+278 assertWithMessage("Default acceptable tokens are invalid" )
+279 .that(actual)
+280 .isEqualTo(expected);
+281 }
+282
+283 @Test
+284 public void testResource() throws Exception {
+285 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
+286
+287 verifyWithInlineConfigParser(
+288 getPath("InputImportControl17.java" ), expected);
+289 }
+290
+291 @Test
+292 public void testResourceUnableToLoad() throws Exception {
+293 try {
+294 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+295 verifyWithInlineConfigParser(getPath("InputImportControl18.java" ), expected);
+296 assertWithMessage("Test should fail if exception was not thrown" ).fail();
+297 }
+298 catch (CheckstyleException ex) {
+299 final String message = getCheckstyleExceptionMessage(ex);
+300 final String messageStart = "Unable to find: " ;
+301
+302 assertWithMessage("Invalid message, should start with: %s" , messageStart)
+303 .that(message)
+304 .startsWith(messageStart);
+305 }
+306 }
+307
+308 @Test
+309 public void testUrlInFileProperty() throws Exception {
+310 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
+311
+312 verifyWithInlineConfigParser(
+313 getPath("InputImportControl19.java" ), expected);
+314 }
+315
+316 @Test
+317 public void testUrlInFilePropertyUnableToLoad() throws Exception {
+318
+319 try {
+320 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+321 verifyWithInlineConfigParser(
+322 getPath("InputImportControl20.java" ), expected);
+323 assertWithMessage("Test should fail if exception was not thrown" ).fail();
+324 }
+325 catch (CheckstyleException ex) {
+326 final String message = getCheckstyleExceptionMessage(ex);
+327 final String messageStart = "Unable to load " ;
+328
+329 assertWithMessage("Invalid message, should start with: %s" , messageStart)
+330 .that(message)
+331 .startsWith(messageStart);
+332 }
+333 }
+334
+335 @Test
+336 public void testCacheWhenFileExternalResourceContentDoesNotChange() throws Exception {
+337 final DefaultConfiguration checkConfig = createModuleConfig(ImportControlCheck.class );
+338 checkConfig.addProperty("file" , getPath("InputImportControlOneRegExp.xml" ));
+339
+340 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
+341 treeWalkerConfig.addChild(checkConfig);
+342
+343 final DefaultConfiguration checkerConfig = createRootConfig(treeWalkerConfig);
+344 final File cacheFile = File.createTempFile("junit" , null , temporaryFolder);
+345 checkerConfig.addProperty("cacheFile" , cacheFile.getPath());
346
-347 execute(checkerConfig, filePath);
-348
+347 final String filePath = File.createTempFile("empty" , ".java" , temporaryFolder).getPath();
+348
349 execute(checkerConfig, filePath);
-350
-351 final String contents = Files.readString(cacheFile.toPath());
-352 assertWithMessage("External resource is not present in cache" )
-353 .that(contents)
-354 .contains("InputImportControlOneRegExp.xml" );
-355 }
-356
-357 @Test
-358 public void testPathRegexMatches() throws Exception {
-359 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
-360
-361 verifyWithInlineConfigParser(
-362 getPath("InputImportControl21.java" ), expected);
-363 }
-364
-365 @Test
-366 public void testPathRegexMatchesPartially() throws Exception {
-367 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
-368
-369 verifyWithInlineConfigParser(
-370 getPath("InputImportControl22.java" ), expected);
-371 }
-372
-373 @Test
-374 public void testPathRegexDoesntMatch() throws Exception {
-375 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-376
-377 verifyWithInlineConfigParser(
-378 getPath("InputImportControl23.java" ), expected);
-379 }
-380
-381 @Test
-382 public void testPathRegexDoesntMatchPartially() throws Exception {
-383 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-384
-385 verifyWithInlineConfigParser(
-386 getPath("InputImportControl24.java" ), expected);
-387 }
-388
-389 @Test
-390 public void testDisallowClassOfAllowPackage() throws Exception {
-391 final String[] expected = {
-392 "12:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.Date" ),
-393 };
-394
-395 verifyWithInlineConfigParser(
-396 getPath("InputImportControlDisallowClassOfAllowPackage.java" ),
-397 expected);
-398 }
-399
-400 @Test
-401 public void testFileName() throws Exception {
-402 final String[] expected = {
-403 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
-404 };
-405
-406 verifyWithInlineConfigParser(
-407 getPath("InputImportControlFileName.java" ), expected);
-408 }
-409
-410 @Test
-411 public void testWithRegex() throws Exception {
-412 final String[] expected = {
-413 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" ),
-414 };
-415
-416 verifyWithInlineConfigParser(
-417 getPath("InputImportControlWithRegex.java" ), expected);
-418 }
-419
-420 @Test
-421 public void testFileNameNoExtension() throws Exception {
-422 final String[] expected = {
-423 "13:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
-424 };
-425
-426 verifyWithInlineConfigParser(
-427 getPath("InputImportControlFileNameNoExtension" ), expected);
-428 }
-429
-430 @Test
-431 public void testBeginTreeCurrentImportControl() throws Exception {
-432 final String file1 = getPath("InputImportControlBeginTree1.java" );
-433 final String file2 = getPath("InputImportControlBeginTree2.java" );
-434 final List<String> expectedFirstInput = Arrays.asList(
-435 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.stream.Stream" ),
-436 "12:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.stream.Collectors" )
-437 );
-438 final List<String> expectedSecondInput = Arrays.asList(CommonUtil.EMPTY_STRING_ARRAY);
-439 verifyWithInlineConfigParser(file1, file2, expectedFirstInput, expectedSecondInput);
-440 }
-441
-442
-443
-444
-445
-446
-447
-448
-449
-450
-451
-452 private static String getCheckstyleExceptionMessage(CheckstyleException exception) {
-453 return exception.getCause().getCause().getCause().getCause().getMessage();
-454 }
-455
-456 }
+350
+351 execute(checkerConfig, filePath);
+352
+353 final String contents = Files.readString(cacheFile.toPath());
+354 assertWithMessage("External resource is not present in cache" )
+355 .that(contents)
+356 .contains("InputImportControlOneRegExp.xml" );
+357 }
+358
+359 @Test
+360 public void testPathRegexMatches() throws Exception {
+361 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
+362
+363 verifyWithInlineConfigParser(
+364 getPath("InputImportControl21.java" ), expected);
+365 }
+366
+367 @Test
+368 public void testPathRegexMatchesPartially() throws Exception {
+369 final String[] expected = {"13:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" )};
+370
+371 verifyWithInlineConfigParser(
+372 getPath("InputImportControl22.java" ), expected);
+373 }
+374
+375 @Test
+376 public void testPathRegexDoesntMatch() throws Exception {
+377 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+378
+379 verifyWithInlineConfigParser(
+380 getPath("InputImportControl23.java" ), expected);
+381 }
+382
+383 @Test
+384 public void testPathRegexDoesntMatchPartially() throws Exception {
+385 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+386
+387 verifyWithInlineConfigParser(
+388 getPath("InputImportControl24.java" ), expected);
+389 }
+390
+391 @Test
+392 public void testDisallowClassOfAllowPackage() throws Exception {
+393 final String[] expected = {
+394 "12:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.Date" ),
+395 };
+396
+397 verifyWithInlineConfigParser(
+398 getPath("InputImportControlDisallowClassOfAllowPackage.java" ),
+399 expected);
+400 }
+401
+402 @Test
+403 public void testFileName() throws Exception {
+404 final String[] expected = {
+405 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
+406 };
+407
+408 verifyWithInlineConfigParser(
+409 getPath("InputImportControlFileName.java" ), expected);
+410 }
+411
+412 @Test
+413 public void testWithRegex() throws Exception {
+414 final String[] expected = {
+415 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.io.File" ),
+416 };
+417
+418 verifyWithInlineConfigParser(
+419 getPath("InputImportControlWithRegex.java" ), expected);
+420 }
+421
+422 @Test
+423 public void testFileNameNoExtension() throws Exception {
+424 final String[] expected = {
+425 "13:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
+426 };
+427
+428 verifyWithInlineConfigParser(
+429 getPath("InputImportControlFileNameNoExtension" ), expected);
+430 }
+431
+432 @Test
+433 public void testBeginTreeCurrentImportControl() throws Exception {
+434 final String file1 = getPath("InputImportControlBeginTree1.java" );
+435 final String file2 = getPath("InputImportControlBeginTree2.java" );
+436 final List<String> expectedFirstInput = Arrays.asList(
+437 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.stream.Stream" ),
+438 "12:1: " + getCheckMessage(MSG_DISALLOWED, "java.util.stream.Collectors" )
+439 );
+440 final List<String> expectedSecondInput = Arrays.asList(CommonUtil.EMPTY_STRING_ARRAY);
+441 verifyWithInlineConfigParser(file1, file2, expectedFirstInput, expectedSecondInput);
+442 }
+443
+444 @Test
+445 public void testImportControlFileName() throws Exception {
+446 final String[] expected = {
+447 "11:1: " + getCheckMessage(MSG_DISALLOWED, "java.awt.Image" ),
+448 };
+449
+450 verifyWithInlineConfigParser(
+451 getPath("InputImportControlTestRegexpInFile.java" ), expected);
+452 }
+453
+454 @Test
+455 public void testImportControlTestException() {
+456 final CheckstyleException ex = assertThrows(CheckstyleException.class , () -> {
+457 verifyWithInlineConfigParser(getPath("InputImportControlTestException.java" ));
+458 });
+459
+460 assertThat(ex.getCause().getCause().getCause().getCause().getCause().getMessage())
+461 .startsWith("unable to parse file:" );
+462 assertThat(ex.getCause().getCause().getCause().getCause().getCause().getMessage())
+463 .endsWith("- Document root element \"import-control\", must match DOCTYPE"
+464 + " root \"null\"." );
+465 }
+466
+467
+468
+469
+470
+471
+472
+473
+474
+475
+476
+477 private static String getCheckstyleExceptionMessage(CheckstyleException exception) {
+478 return exception.getCause().getCause().getCause().getCause().getMessage();
+479 }
+480
+481 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/ImportOrderCheckTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/ImportOrderCheckTest.html
index d50169a299..2bbada7376 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/ImportOrderCheckTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/ImportOrderCheckTest.html
@@ -56,772 +56,780 @@
48 }
49
50 @Test
-51 public void testGetTokens() {
-52 final ImportOrderCheck checkObj = new ImportOrderCheck();
-53 final int [] expected = {TokenTypes.IMPORT, TokenTypes.STATIC_IMPORT};
-54 assertWithMessage("Default tokens differs from expected" )
-55 .that(checkObj.getDefaultTokens())
-56 .isEqualTo(expected);
-57 assertWithMessage("Acceptable tokens differs from expected" )
-58 .that(checkObj.getAcceptableTokens())
-59 .isEqualTo(expected);
-60 assertWithMessage("Required tokens differs from expected" )
-61 .that(checkObj.getRequiredTokens())
-62 .isEqualTo(expected);
-63 }
-64
-65
-66
-67
-68
-69 @Test
-70 public void testImportOrderOptionValueOf() {
-71 final ImportOrderOption option = ImportOrderOption.valueOf("TOP" );
-72 assertWithMessage("Invalid valueOf result" )
-73 .that(option)
-74 .isEqualTo(ImportOrderOption.TOP);
-75 }
-76
+51 public void testVeryPreciseGrouping() throws Exception {
+52 final String[] expected = {};
+53
+54 verifyWithInlineConfigParser(
+55 getNonCompilablePath("InputImportOrder6.java" ), expected);
+56 }
+57
+58 @Test
+59 public void testGetTokens() {
+60 final ImportOrderCheck checkObj = new ImportOrderCheck();
+61 final int [] expected = {TokenTypes.IMPORT, TokenTypes.STATIC_IMPORT};
+62 assertWithMessage("Default tokens differs from expected" )
+63 .that(checkObj.getDefaultTokens())
+64 .isEqualTo(expected);
+65 assertWithMessage("Acceptable tokens differs from expected" )
+66 .that(checkObj.getAcceptableTokens())
+67 .isEqualTo(expected);
+68 assertWithMessage("Required tokens differs from expected" )
+69 .that(checkObj.getRequiredTokens())
+70 .isEqualTo(expected);
+71 }
+72
+73
+74
+75
+76
77 @Test
-78 public void testDefault() throws Exception {
-79 final String[] expected = {
-80 "21:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
-81 "25:1: " + getCheckMessage(MSG_ORDERING, "javax.swing.JComponent" ),
-82 "27:1: " + getCheckMessage(MSG_ORDERING, "java.io.File" ),
-83 "29:1: " + getCheckMessage(MSG_ORDERING, "java.io.IOException" ),
-84 "34:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP,
-85 "sun.tools.util.ModifierFilter.ALL_ACCESS" ),
-86 };
-87
-88 verifyWithInlineConfigParser(
-89 getNonCompilablePath("InputImportOrder1.java" ), expected);
-90 }
-91
-92 @Test
-93 public void testWrongSequenceInNonStaticImports() throws Exception {
-94
-95 final String[] expected = {
-96 "19:1: " + getCheckMessage(MSG_ORDERING,
-97 "java.util.HashMap" ),
-98 };
+78 public void testImportOrderOptionValueOf() {
+79 final ImportOrderOption option = ImportOrderOption.valueOf("TOP" );
+80 assertWithMessage("Invalid valueOf result" )
+81 .that(option)
+82 .isEqualTo(ImportOrderOption.TOP);
+83 }
+84
+85 @Test
+86 public void testDefault() throws Exception {
+87 final String[] expected = {
+88 "21:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
+89 "25:1: " + getCheckMessage(MSG_ORDERING, "javax.swing.JComponent" ),
+90 "27:1: " + getCheckMessage(MSG_ORDERING, "java.io.File" ),
+91 "29:1: " + getCheckMessage(MSG_ORDERING, "java.io.IOException" ),
+92 "34:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP,
+93 "sun.tools.util.ModifierFilter.ALL_ACCESS" ),
+94 };
+95
+96 verifyWithInlineConfigParser(
+97 getNonCompilablePath("InputImportOrder1.java" ), expected);
+98 }
99
-100 verifyWithInlineConfigParser(
-101 getNonCompilablePath("InputImportOrderNonStaticWrongSequence.java" ), expected);
-102 }
-103
-104 @Test
-105 public void testMultilineImport() throws Exception {
-106 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+100 @Test
+101 public void testWrongSequenceInNonStaticImports() throws Exception {
+102
+103 final String[] expected = {
+104 "19:1: " + getCheckMessage(MSG_ORDERING,
+105 "java.util.HashMap" ),
+106 };
107
108 verifyWithInlineConfigParser(
-109 getNonCompilablePath("InputImportOrderMultiline.java" ), expected);
+109 getNonCompilablePath("InputImportOrderNonStaticWrongSequence.java" ), expected);
110 }
111
112 @Test
-113 public void testGroups() throws Exception {
-114 final String[] expected = {
-115 "21:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
-116 "29:1: " + getCheckMessage(MSG_ORDERING, "java.io.IOException" ),
-117 "32:1: " + getCheckMessage(MSG_ORDERING, "javax.swing.WindowConstants.*" ),
-118 "34:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP,
-119 "sun.tools.util.ModifierFilter.ALL_ACCESS" ),
-120 };
-121
-122 verifyWithInlineConfigParser(
-123 getNonCompilablePath("InputImportOrder2.java" ), expected);
-124 }
-125
-126 @Test
-127 public void testGroupsRegexp() throws Exception {
-128 final String[] expected = {
-129 "27:1: " + getCheckMessage(MSG_ORDERING, "java.io.File" ),
-130 "34:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP,
-131 "sun.tools.util.ModifierFilter.ALL_ACCESS" ),
-132 };
+113 public void testMultilineImport() throws Exception {
+114 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+115
+116 verifyWithInlineConfigParser(
+117 getNonCompilablePath("InputImportOrderMultiline.java" ), expected);
+118 }
+119
+120 @Test
+121 public void testGroups() throws Exception {
+122 final String[] expected = {
+123 "21:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
+124 "29:1: " + getCheckMessage(MSG_ORDERING, "java.io.IOException" ),
+125 "32:1: " + getCheckMessage(MSG_ORDERING, "javax.swing.WindowConstants.*" ),
+126 "34:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP,
+127 "sun.tools.util.ModifierFilter.ALL_ACCESS" ),
+128 };
+129
+130 verifyWithInlineConfigParser(
+131 getNonCompilablePath("InputImportOrder2.java" ), expected);
+132 }
133
-134 verifyWithInlineConfigParser(
-135 getNonCompilablePath("InputImportOrder3.java" ), expected);
-136 }
-137
-138 @Test
-139 public void testSeparated() throws Exception {
-140 final String[] expected = {
-141 "25:1: " + getCheckMessage(MSG_SEPARATION, "javax.swing.JComponent" ),
-142 "27:1: " + getCheckMessage(MSG_SEPARATION, "java.io.File" ),
-143 "32:1: " + getCheckMessage(MSG_ORDERING, "javax.swing.WindowConstants.*" ),
-144 };
+134 @Test
+135 public void testGroupsRegexp() throws Exception {
+136 final String[] expected = {
+137 "27:1: " + getCheckMessage(MSG_ORDERING, "java.io.File" ),
+138 "34:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP,
+139 "sun.tools.util.ModifierFilter.ALL_ACCESS" ),
+140 };
+141
+142 verifyWithInlineConfigParser(
+143 getNonCompilablePath("InputImportOrder3.java" ), expected);
+144 }
145
-146 verifyWithInlineConfigParser(
-147 getNonCompilablePath("InputImportOrder4.java" ), expected);
-148 }
-149
-150 @Test
-151 public void testStaticImportSeparated() throws Exception {
-152 final String[] expected = {
-153 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.cos" ),
-154 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.junit.Assert.assertEquals" ),
-155 };
-156
-157 verifyWithInlineConfigParser(
-158 getPath("InputImportOrderStaticGroupSeparated.java" ), expected);
-159 }
-160
-161 @Test
-162 public void testNoGapBetweenStaticImports() throws Exception {
-163 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+146 @Test
+147 public void testSeparated() throws Exception {
+148 final String[] expected = {
+149 "25:1: " + getCheckMessage(MSG_SEPARATION, "javax.swing.JComponent" ),
+150 "27:1: " + getCheckMessage(MSG_SEPARATION, "java.io.File" ),
+151 "32:1: " + getCheckMessage(MSG_ORDERING, "javax.swing.WindowConstants.*" ),
+152 };
+153
+154 verifyWithInlineConfigParser(
+155 getNonCompilablePath("InputImportOrder4.java" ), expected);
+156 }
+157
+158 @Test
+159 public void testStaticImportSeparated() throws Exception {
+160 final String[] expected = {
+161 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.cos" ),
+162 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.junit.Assert.assertEquals" ),
+163 };
164
165 verifyWithInlineConfigParser(
-166 getPath("InputImportOrderNoGapBetweenStaticImports.java" ), expected);
+166 getPath("InputImportOrderStaticGroupSeparated.java" ), expected);
167 }
168
169 @Test
-170 public void testSortStaticImportsAlphabeticallyFalse() throws Exception {
+170 public void testNoGapBetweenStaticImports() throws Exception {
171 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
172
173 verifyWithInlineConfigParser(
-174 getPath("InputImportOrderSortStaticImportsAlphabetically1.java" ),
-175 expected);
-176 }
-177
-178 @Test
-179 public void testSortStaticImportsAlphabeticallyTrue() throws Exception {
-180 final String[] expected = {
-181 "20:1: " + getCheckMessage(MSG_ORDERING,
-182 "javax.xml.transform.TransformerFactory.newInstance" ),
-183 "21:1: " + getCheckMessage(MSG_ORDERING, "java.lang.Math.cos" ),
-184 "22:1: " + getCheckMessage(MSG_ORDERING, "java.lang.Math.abs" ),
-185 };
-186
-187 verifyWithInlineConfigParser(
-188 getPath("InputImportOrderSortStaticImportsAlphabetically2.java" ),
-189 expected);
-190 }
-191
-192 @Test
-193 public void testCaseInsensitive() throws Exception {
-194 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-195
-196 verifyWithInlineConfigParser(
-197 getPath("InputImportOrderCaseInsensitive.java" ), expected);
+174 getPath("InputImportOrderNoGapBetweenStaticImports.java" ), expected);
+175 }
+176
+177 @Test
+178 public void testSortStaticImportsAlphabeticallyFalse() throws Exception {
+179 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+180
+181 verifyWithInlineConfigParser(
+182 getPath("InputImportOrderSortStaticImportsAlphabetically1.java" ),
+183 expected);
+184 }
+185
+186 @Test
+187 public void testSortStaticImportsAlphabeticallyTrue() throws Exception {
+188 final String[] expected = {
+189 "20:1: " + getCheckMessage(MSG_ORDERING,
+190 "javax.xml.transform.TransformerFactory.newInstance" ),
+191 "21:1: " + getCheckMessage(MSG_ORDERING, "java.lang.Math.cos" ),
+192 "22:1: " + getCheckMessage(MSG_ORDERING, "java.lang.Math.abs" ),
+193 };
+194
+195 verifyWithInlineConfigParser(
+196 getPath("InputImportOrderSortStaticImportsAlphabetically2.java" ),
+197 expected);
198 }
199
200 @Test
-201 public void testContainerCaseInsensitive() throws Exception {
+201 public void testCaseInsensitive() throws Exception {
202 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
203
204 verifyWithInlineConfigParser(
-205 getNonCompilablePath("InputImportOrderEclipseStaticCaseSensitive.java" ),
-206 expected);
-207 }
-208
-209 @Test
-210 public void testSimilarGroupPattern() throws Exception {
-211 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-212
-213 verifyWithInlineConfigParser(
-214 getNonCompilablePath("InputImportOrderSimilarGroupPattern.java" ),
-215 expected);
-216 }
-217
-218 @Test
-219 public void testInvalidOption() throws Exception {
+205 getPath("InputImportOrderCaseInsensitive.java" ), expected);
+206 }
+207
+208 @Test
+209 public void testContainerCaseInsensitive() throws Exception {
+210 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+211
+212 verifyWithInlineConfigParser(
+213 getNonCompilablePath("InputImportOrderEclipseStaticCaseSensitive.java" ),
+214 expected);
+215 }
+216
+217 @Test
+218 public void testSimilarGroupPattern() throws Exception {
+219 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
220
-221 try {
-222 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-223
-224 verifyWithInlineConfigParser(
-225 getPath("InputImportOrder_Top1.java" ), expected);
-226 assertWithMessage("exception expected" ).fail();
-227 }
-228 catch (CheckstyleException ex) {
-229 assertWithMessage("Invalid exception message" )
-230 .that(ex.getMessage())
-231 .isEqualTo("cannot initialize module com.puppycrawl.tools.checkstyle.TreeWalker - "
-232 + "cannot initialize module com.puppycrawl.tools.checkstyle.checks"
-233 + ".imports.ImportOrderCheck - "
-234 + "Cannot set property 'option' to 'invalid_option'" );
+221 verifyWithInlineConfigParser(
+222 getNonCompilablePath("InputImportOrderSimilarGroupPattern.java" ),
+223 expected);
+224 }
+225
+226 @Test
+227 public void testInvalidOption() throws Exception {
+228
+229 try {
+230 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+231
+232 verifyWithInlineConfigParser(
+233 getPath("InputImportOrder_Top1.java" ), expected);
+234 assertWithMessage("exception expected" ).fail();
235 }
-236 }
-237
-238 @Test
-239 public void testTop() throws Exception {
-240 final String[] expected = {
-241 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.awt.Button" ),
-242 "28:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.IOException" ),
-243 "31:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "javax.swing.JComponent" ),
-244 "34:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.File.*" ),
-245 "34:1: " + getCheckMessage(MSG_ORDERING, "java.io.File.*" ),
-246 };
-247
-248 verifyWithInlineConfigParser(
-249 getPath("InputImportOrder_Top2.java" ), expected);
-250 }
-251
-252 @Test
-253 public void testAbove() throws Exception {
-254 final String[] expected = {
-255 "21:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Button.ABORT" ),
-256 "24:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
-257 "29:1: " + getCheckMessage(MSG_ORDERING, "java.io.File" ),
-258 "29:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.File" ),
-259 "30:1: " + getCheckMessage(MSG_ORDERING, "java.io.File.createTempFile" ),
-260 };
-261
-262 verifyWithInlineConfigParser(
-263 getPath("InputImportOrder_Above.java" ), expected);
-264 }
-265
-266 @Test
-267 public void testInFlow() throws Exception {
-268 final String[] expected = {
-269 "22:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
-270 "25:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "javax.swing.JComponent" ),
-271 "27:1: " + getCheckMessage(MSG_ORDERING,
-272 "javax.swing.WindowConstants.DO_NOTHING_ON_CLOSE" ),
-273 "28:1: " + getCheckMessage(MSG_ORDERING, "javax.swing.WindowConstants.*" ),
-274 "29:1: " + getCheckMessage(MSG_ORDERING, "javax.swing.JTable" ),
-275 "31:1: " + getCheckMessage(MSG_ORDERING, "java.io.File.createTempFile" ),
-276 "31:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.File.createTempFile" ),
-277 "32:1: " + getCheckMessage(MSG_ORDERING, "java.io.File" ),
-278 };
-279
-280 verifyWithInlineConfigParser(
-281 getPath("InputImportOrder_InFlow.java" ), expected);
-282 }
-283
-284 @Test
-285 public void testUnder() throws Exception {
-286
-287 final String[] expected = {
-288 "21:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
-289 "27:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Button.ABORT" ),
-290 "29:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.File.createTempFile" ),
-291 "30:1: " + getCheckMessage(MSG_ORDERING, "java.io.File" ),
-292 };
-293
-294 verifyWithInlineConfigParser(
-295 getPath("InputImportOrder_Under.java" ), expected);
-296 }
-297
-298 @Test
-299 public void testBottom() throws Exception {
-300 final String[] expected = {
-301 "24:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.IOException" ),
-302 "27:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "javax.swing.JComponent" ),
-303 "30:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.File.*" ),
-304 "31:1: " + getCheckMessage(MSG_ORDERING, "java.io.File" ),
-305 "33:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.File.createTempFile" ),
-306 "37:1: " + getCheckMessage(MSG_ORDERING, "java.io.Reader" ),
-307 "37:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.Reader" ),
-308 };
-309
-310 verifyWithInlineConfigParser(
-311 getPath("InputImportOrder_Bottom.java" ), expected);
-312 }
-313
-314 @Test
-315 public void testGetGroupNumber() throws Exception {
-316 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+236 catch (CheckstyleException ex) {
+237 assertWithMessage("Invalid exception message" )
+238 .that(ex.getMessage())
+239 .isEqualTo("cannot initialize module com.puppycrawl.tools.checkstyle.TreeWalker - "
+240 + "cannot initialize module com.puppycrawl.tools.checkstyle.checks"
+241 + ".imports.ImportOrderCheck - "
+242 + "Cannot set property 'option' to 'invalid_option'" );
+243 }
+244 }
+245
+246 @Test
+247 public void testTop() throws Exception {
+248 final String[] expected = {
+249 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.awt.Button" ),
+250 "28:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.IOException" ),
+251 "31:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "javax.swing.JComponent" ),
+252 "34:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.File.*" ),
+253 "34:1: " + getCheckMessage(MSG_ORDERING, "java.io.File.*" ),
+254 };
+255
+256 verifyWithInlineConfigParser(
+257 getPath("InputImportOrder_Top2.java" ), expected);
+258 }
+259
+260 @Test
+261 public void testAbove() throws Exception {
+262 final String[] expected = {
+263 "21:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Button.ABORT" ),
+264 "24:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
+265 "29:1: " + getCheckMessage(MSG_ORDERING, "java.io.File" ),
+266 "29:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.File" ),
+267 "30:1: " + getCheckMessage(MSG_ORDERING, "java.io.File.createTempFile" ),
+268 };
+269
+270 verifyWithInlineConfigParser(
+271 getPath("InputImportOrder_Above.java" ), expected);
+272 }
+273
+274 @Test
+275 public void testInFlow() throws Exception {
+276 final String[] expected = {
+277 "22:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
+278 "25:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "javax.swing.JComponent" ),
+279 "27:1: " + getCheckMessage(MSG_ORDERING,
+280 "javax.swing.WindowConstants.DO_NOTHING_ON_CLOSE" ),
+281 "28:1: " + getCheckMessage(MSG_ORDERING, "javax.swing.WindowConstants.*" ),
+282 "29:1: " + getCheckMessage(MSG_ORDERING, "javax.swing.JTable" ),
+283 "31:1: " + getCheckMessage(MSG_ORDERING, "java.io.File.createTempFile" ),
+284 "31:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.File.createTempFile" ),
+285 "32:1: " + getCheckMessage(MSG_ORDERING, "java.io.File" ),
+286 };
+287
+288 verifyWithInlineConfigParser(
+289 getPath("InputImportOrder_InFlow.java" ), expected);
+290 }
+291
+292 @Test
+293 public void testUnder() throws Exception {
+294
+295 final String[] expected = {
+296 "21:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
+297 "27:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Button.ABORT" ),
+298 "29:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.File.createTempFile" ),
+299 "30:1: " + getCheckMessage(MSG_ORDERING, "java.io.File" ),
+300 };
+301
+302 verifyWithInlineConfigParser(
+303 getPath("InputImportOrder_Under.java" ), expected);
+304 }
+305
+306 @Test
+307 public void testBottom() throws Exception {
+308 final String[] expected = {
+309 "24:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.IOException" ),
+310 "27:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "javax.swing.JComponent" ),
+311 "30:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.File.*" ),
+312 "31:1: " + getCheckMessage(MSG_ORDERING, "java.io.File" ),
+313 "33:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.File.createTempFile" ),
+314 "37:1: " + getCheckMessage(MSG_ORDERING, "java.io.Reader" ),
+315 "37:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.io.Reader" ),
+316 };
317
318 verifyWithInlineConfigParser(
-319 getNonCompilablePath("InputImportOrderGetGroupNumber.java" ), expected);
+319 getPath("InputImportOrder_Bottom.java" ), expected);
320 }
321
322 @Test
-323 public void testHonorsTokenProperty() throws Exception {
-324 final String[] expected = {
-325 "20:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Button.ABORT" ),
-326 "21:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
-327 "22:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Button" ),
-328 };
+323 public void testGetGroupNumber() throws Exception {
+324 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+325
+326 verifyWithInlineConfigParser(
+327 getNonCompilablePath("InputImportOrderGetGroupNumber.java" ), expected);
+328 }
329
-330 verifyWithInlineConfigParser(
-331 getPath("InputImportOrder_HonorsTokensProperty.java" ), expected);
-332 }
-333
-334 @Test
-335 public void testWildcard() throws Exception {
-336 final String[] expected = {
-337 "25:1: " + getCheckMessage(MSG_ORDERING, "javax.crypto.Cipher" ),
-338 };
-339
-340 verifyWithInlineConfigParser(
-341 getPath("InputImportOrder_Wildcard.java" ), expected);
-342 }
-343
-344 @Test
-345 public void testWildcardUnspecified() throws Exception {
-346 final String[] expected = {
-347 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP,
-348 "com.puppycrawl.tools.checkstyle.checks.imports.importorder.InputImportOrderBug" ),
-349 };
-350
-351 verifyWithInlineConfigParser(
-352 getPath("InputImportOrder_WildcardUnspecified.java" ), expected);
-353 }
-354
-355 @Test
-356 public void testNoFailureForRedundantImports() throws Exception {
-357 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-358 verifyWithInlineConfigParser(
-359 getPath("InputImportOrder_NoFailureForRedundantImports.java" ),
-360 expected);
+330 @Test
+331 public void testHonorsTokenProperty() throws Exception {
+332 final String[] expected = {
+333 "20:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Button.ABORT" ),
+334 "21:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
+335 "22:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Button" ),
+336 };
+337
+338 verifyWithInlineConfigParser(
+339 getPath("InputImportOrder_HonorsTokensProperty.java" ), expected);
+340 }
+341
+342 @Test
+343 public void testWildcard() throws Exception {
+344 final String[] expected = {
+345 "25:1: " + getCheckMessage(MSG_ORDERING, "javax.crypto.Cipher" ),
+346 };
+347
+348 verifyWithInlineConfigParser(
+349 getPath("InputImportOrder_Wildcard.java" ), expected);
+350 }
+351
+352 @Test
+353 public void testWildcardUnspecified() throws Exception {
+354 final String[] expected = {
+355 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP,
+356 "com.puppycrawl.tools.checkstyle.checks.imports.importorder.InputImportOrderBug" ),
+357 };
+358
+359 verifyWithInlineConfigParser(
+360 getPath("InputImportOrder_WildcardUnspecified.java" ), expected);
361 }
362
363 @Test
-364 public void testStaticGroupsAlphabeticalOrder() throws Exception {
-365 final String[] expected = {
-366 "22:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.antlr.v4.runtime.*" ),
-367 "24:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
-368 };
-369
-370 verifyWithInlineConfigParser(
-371 getPath("InputImportOrderStaticGroupOrder1.java" ), expected);
-372 }
-373
-374 @Test
-375 public void testStaticGroupsOrder() throws Exception {
-376 final String[] expected = {
-377 "22:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.antlr.v4.runtime.*" ),
-378 "24:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
-379 };
-380 verifyWithInlineConfigParser(
-381 getPath("InputImportOrderStaticGroupOrder2.java" ), expected);
-382 }
-383
-384 @Test
-385 public void testStaticGroupsAlphabeticalOrderBottom() throws Exception {
-386 final String[] expected = {
-387 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
-388 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.PI" ),
-389 };
-390 verifyWithInlineConfigParser(
-391 getPath("InputImportOrderStaticGroupOrderBottom1.java" ), expected);
-392 }
-393
-394 @Test
-395 public void testStaticGroupsAlphabeticalOrderBottomNegative() throws Exception {
-396 final String[] expected = {
-397 "24:1: " + getCheckMessage(MSG_ORDERING, "java.util.Set" ),
-398 };
-399 verifyWithInlineConfigParser(
-400 getPath("InputImportOrderStaticGroupOrderBottom_Negative1.java" ),
-401 expected);
-402 }
-403
-404
-405
-406
-407
-408 @Test
-409 public void testStaticGroupsAlphabeticalOrderTopNegative() throws Exception {
-410 final String[] expected = {
-411 "21:1: " + getCheckMessage(MSG_ORDERING, "java.lang.Math.PI" ),
-412 };
-413 verifyWithInlineConfigParser(
-414 getPath("InputImportOrderStaticGroupOrderBottom_Negative2.java" ),
-415 expected);
-416 }
-417
-418
-419
-420
-421
-422 @Test
-423 public void testStaticGroupsAlphabeticalOrderBottomNegative2() throws Exception {
-424 final String[] expected = {
-425 "24:1: " + getCheckMessage(MSG_ORDERING, "java.util.Set" ),
-426 };
-427 verifyWithInlineConfigParser(
-428 getPath("InputImportOrderStaticGroupOrderBottom_Negative3.java" ),
-429 expected);
-430 }
-431
-432 @Test
-433 public void testStaticGroupsOrderBottom() throws Exception {
-434 final String[] expected = {
-435 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
-436 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.PI" ),
-437 };
-438 verifyWithInlineConfigParser(
-439 getPath("InputImportOrderStaticGroupOrderBottom2.java" ), expected);
-440 }
-441
-442 @Test
-443 public void testImportReception() throws Exception {
-444 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-445 verifyWithInlineConfigParser(
-446 getPath("InputImportOrderRepetition.java" ), expected);
-447 }
-448
-449 @Test
-450 public void testStaticImportReceptionTop() throws Exception {
-451 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-452 verifyWithInlineConfigParser(
-453 getPath("InputImportOrderStaticRepetition1.java" ), expected);
-454 }
-455
-456 @Test
-457 public void testStaticImportReception() throws Exception {
-458 final String[] expected = {
-459 "20:1: " + getCheckMessage(MSG_SEPARATION, "org.antlr.v4.runtime.CommonToken.*" ),
-460 "23:1: " + getCheckMessage(MSG_ORDERING, "java.util.Set" ),
-461 };
-462 verifyWithInlineConfigParser(
-463 getPath("InputImportOrderStaticRepetition2.java" ), expected);
-464 }
-465
-466 @Test
-467 public void testStaticGroupsOrderAbove() throws Exception {
-468 final String[] expected = {
-469 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
-470 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.PI" ),
-471 "23:1: " + getCheckMessage(MSG_ORDERING, "java.lang.Math.PI" ),
-472 "24:1: " + getCheckMessage(MSG_ORDERING, "org.antlr.v4.runtime.Recognizer.EOF" ),
-473 };
-474 verifyWithInlineConfigParser(
-475 getPath("InputImportOrderStaticGroupOrderBottom3.java" ), expected);
-476 }
-477
-478 @Test
-479 public void testStaticOnDemandGroupsOrder() throws Exception {
-480 final String[] expected = {
-481 "22:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.antlr.v4.runtime.*" ),
-482 "24:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
-483 "25:1: " + getCheckMessage(MSG_ORDERING, "org.junit.Test" ),
-484 };
-485 verifyWithInlineConfigParser(
-486 getPath("InputImportOrderStaticOnDemandGroupOrder1.java" ), expected);
-487 }
-488
-489 @Test
-490 public void testStaticOnDemandGroupsAlphabeticalOrder() throws Exception {
-491 final String[] expected = {
-492 "22:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.antlr.v4.runtime.*" ),
-493 "24:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
-494 "25:1: " + getCheckMessage(MSG_ORDERING, "org.junit.Test" ),
-495 };
-496 verifyWithInlineConfigParser(
-497 getPath("InputImportOrderStaticOnDemandGroupOrder2.java" ), expected);
-498 }
-499
-500 @Test
-501 public void testStaticOnDemandGroupsOrderBottom() throws Exception {
-502 final String[] expected = {
-503 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
-504 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.*" ),
-505 };
-506 verifyWithInlineConfigParser(
-507 getPath("InputImportOrderStaticOnDemandGroupOrderBottom1.java" ),
-508 expected);
-509 }
-510
-511 @Test
-512 public void testStaticOnDemandGroupsAlphabeticalOrderBottom() throws Exception {
-513 final String[] expected = {
-514 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
-515 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.*" ),
-516 };
-517 verifyWithInlineConfigParser(
-518 getPath("InputImportOrderStaticOnDemandGroupOrderBottom2.java" ),
-519 expected);
-520 }
-521
-522 @Test
-523 public void testStaticOnDemandGroupsOrderAbove() throws Exception {
-524 final String[] expected = {
-525 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
-526 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.*" ),
-527 "23:1: " + getCheckMessage(MSG_ORDERING, "java.lang.Math.*" ),
-528 "24:1: " + getCheckMessage(MSG_ORDERING, "org.antlr.v4.runtime.CommonToken.*" ),
-529 };
-530 verifyWithInlineConfigParser(
-531 getPath("InputImportOrderStaticOnDemandGroupOrderBottom3.java" ),
-532 expected);
-533 }
-534
-535 @Test
-536 public void testGroupWithSlashes() throws Exception {
-537 final DefaultConfiguration checkConfig = createModuleConfig(ImportOrderCheck.class );
-538 checkConfig.addProperty("groups" , "/^javax" );
-539
-540 try {
-541 execute(checkConfig, getNonCompilablePath("InputImportOrder5.java" ));
-542 assertWithMessage("exception expected" ).fail();
-543 }
-544 catch (CheckstyleException ex) {
-545 assertWithMessage("Invalid exception message" )
-546 .that(ex.getMessage())
-547 .isEqualTo("cannot initialize module com.puppycrawl.tools.checkstyle.TreeWalker - "
-548 + "cannot initialize module com.puppycrawl.tools.checkstyle.checks"
-549 + ".imports.ImportOrderCheck - "
-550 + "Cannot set property 'groups' to '/^javax'" );
-551 assertWithMessage("Invalid exception message" )
-552 .that(ex.getCause().getCause().getCause().getCause().getMessage())
-553 .isEqualTo("Invalid group: /^javax" );
-554 }
-555 }
-556
-557 @Test
-558 public void testGroupWithDot() throws Exception {
-559 final String[] expected = {
-560 "21:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
-561 "23:1: " + getCheckMessage(MSG_ORDERING, "javax.swing.JComponent" ),
-562 };
-563 verifyWithInlineConfigParser(
-564 getPath("InputImportOrder_DotPackageName.java" ),
-565 expected);
-566 }
-567
-568 @Test
-569 public void testMultiplePatternMatches() throws Exception {
-570 final String[] expected = {
-571 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.*" ),
-572 };
-573
-574 verifyWithInlineConfigParser(
-575 getNonCompilablePath("InputImportOrder_MultiplePatternMatches1.java" ),
-576 expected);
-577 }
-578
-579
-580
-581
-582
-583
-584
-585 @Test
-586 public void testVisitTokenSwitchReflection() {
-587
-588 final DetailAstImpl astImport = mockAST(TokenTypes.IMPORT, "import" , 0, 0);
-589 final DetailAstImpl astIdent = mockAST(TokenTypes.IDENT, "myTestImport" , 0, 0);
-590 astImport.addChild(astIdent);
-591 final DetailAST astSemi = mockAST(TokenTypes.SEMI, ";" , 0, 0);
-592 astIdent.addNextSibling(astSemi);
-593
-594
-595 final ImportOrderCheck mock = new ImportOrderCheck();
-596 TestUtil.setInternalState(mock, "option" , null );
-597
-598
-599 try {
-600 mock.visitToken(astImport);
-601 assertWithMessage("An exception is expected" ).fail();
-602 }
-603 catch (IllegalStateException ex) {
-604 assertWithMessage("invalid exception message" )
-605 .that(ex.getMessage())
-606 .endsWith(": null" );
-607 }
-608 }
-609
-610
-611
-612
-613
-614
-615
-616
-617
-618
-619 private static DetailAstImpl mockAST(final int tokenType, final String tokenText,
-620 final int tokenRow, final int tokenColumn) {
-621 final CommonToken tokenImportSemi = new CommonToken(tokenType, tokenText);
-622 tokenImportSemi.setLine(tokenRow);
-623 tokenImportSemi.setCharPositionInLine(tokenColumn);
-624 final DetailAstImpl astSemi = new DetailAstImpl();
-625 astSemi.initialize(tokenImportSemi);
-626 return astSemi;
-627 }
-628
-629 @Test
-630 public void testEclipseDefaultPositive() throws Exception {
-631 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-632
-633 verifyWithInlineConfigParser(
-634 getNonCompilablePath("InputImportOrder_EclipseDefaultPositive.java" ), expected);
+364 public void testNoFailureForRedundantImports() throws Exception {
+365 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+366 verifyWithInlineConfigParser(
+367 getPath("InputImportOrder_NoFailureForRedundantImports.java" ),
+368 expected);
+369 }
+370
+371 @Test
+372 public void testStaticGroupsAlphabeticalOrder() throws Exception {
+373 final String[] expected = {
+374 "22:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.antlr.v4.runtime.*" ),
+375 "24:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
+376 };
+377
+378 verifyWithInlineConfigParser(
+379 getPath("InputImportOrderStaticGroupOrder1.java" ), expected);
+380 }
+381
+382 @Test
+383 public void testStaticGroupsOrder() throws Exception {
+384 final String[] expected = {
+385 "22:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.antlr.v4.runtime.*" ),
+386 "24:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
+387 };
+388 verifyWithInlineConfigParser(
+389 getPath("InputImportOrderStaticGroupOrder2.java" ), expected);
+390 }
+391
+392 @Test
+393 public void testStaticGroupsAlphabeticalOrderBottom() throws Exception {
+394 final String[] expected = {
+395 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
+396 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.PI" ),
+397 };
+398 verifyWithInlineConfigParser(
+399 getPath("InputImportOrderStaticGroupOrderBottom1.java" ), expected);
+400 }
+401
+402 @Test
+403 public void testStaticGroupsAlphabeticalOrderBottomNegative() throws Exception {
+404 final String[] expected = {
+405 "24:1: " + getCheckMessage(MSG_ORDERING, "java.util.Set" ),
+406 };
+407 verifyWithInlineConfigParser(
+408 getPath("InputImportOrderStaticGroupOrderBottom_Negative1.java" ),
+409 expected);
+410 }
+411
+412
+413
+414
+415
+416 @Test
+417 public void testStaticGroupsAlphabeticalOrderTopNegative() throws Exception {
+418 final String[] expected = {
+419 "21:1: " + getCheckMessage(MSG_ORDERING, "java.lang.Math.PI" ),
+420 };
+421 verifyWithInlineConfigParser(
+422 getPath("InputImportOrderStaticGroupOrderBottom_Negative2.java" ),
+423 expected);
+424 }
+425
+426
+427
+428
+429
+430 @Test
+431 public void testStaticGroupsAlphabeticalOrderBottomNegative2() throws Exception {
+432 final String[] expected = {
+433 "24:1: " + getCheckMessage(MSG_ORDERING, "java.util.Set" ),
+434 };
+435 verifyWithInlineConfigParser(
+436 getPath("InputImportOrderStaticGroupOrderBottom_Negative3.java" ),
+437 expected);
+438 }
+439
+440 @Test
+441 public void testStaticGroupsOrderBottom() throws Exception {
+442 final String[] expected = {
+443 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
+444 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.PI" ),
+445 };
+446 verifyWithInlineConfigParser(
+447 getPath("InputImportOrderStaticGroupOrderBottom2.java" ), expected);
+448 }
+449
+450 @Test
+451 public void testImportReception() throws Exception {
+452 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+453 verifyWithInlineConfigParser(
+454 getPath("InputImportOrderRepetition.java" ), expected);
+455 }
+456
+457 @Test
+458 public void testStaticImportReceptionTop() throws Exception {
+459 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+460 verifyWithInlineConfigParser(
+461 getPath("InputImportOrderStaticRepetition1.java" ), expected);
+462 }
+463
+464 @Test
+465 public void testStaticImportReception() throws Exception {
+466 final String[] expected = {
+467 "20:1: " + getCheckMessage(MSG_SEPARATION, "org.antlr.v4.runtime.CommonToken.*" ),
+468 "23:1: " + getCheckMessage(MSG_ORDERING, "java.util.Set" ),
+469 };
+470 verifyWithInlineConfigParser(
+471 getPath("InputImportOrderStaticRepetition2.java" ), expected);
+472 }
+473
+474 @Test
+475 public void testStaticGroupsOrderAbove() throws Exception {
+476 final String[] expected = {
+477 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
+478 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.PI" ),
+479 "23:1: " + getCheckMessage(MSG_ORDERING, "java.lang.Math.PI" ),
+480 "24:1: " + getCheckMessage(MSG_ORDERING, "org.antlr.v4.runtime.Recognizer.EOF" ),
+481 };
+482 verifyWithInlineConfigParser(
+483 getPath("InputImportOrderStaticGroupOrderBottom3.java" ), expected);
+484 }
+485
+486 @Test
+487 public void testStaticOnDemandGroupsOrder() throws Exception {
+488 final String[] expected = {
+489 "22:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.antlr.v4.runtime.*" ),
+490 "24:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
+491 "25:1: " + getCheckMessage(MSG_ORDERING, "org.junit.Test" ),
+492 };
+493 verifyWithInlineConfigParser(
+494 getPath("InputImportOrderStaticOnDemandGroupOrder1.java" ), expected);
+495 }
+496
+497 @Test
+498 public void testStaticOnDemandGroupsAlphabeticalOrder() throws Exception {
+499 final String[] expected = {
+500 "22:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.antlr.v4.runtime.*" ),
+501 "24:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
+502 "25:1: " + getCheckMessage(MSG_ORDERING, "org.junit.Test" ),
+503 };
+504 verifyWithInlineConfigParser(
+505 getPath("InputImportOrderStaticOnDemandGroupOrder2.java" ), expected);
+506 }
+507
+508 @Test
+509 public void testStaticOnDemandGroupsOrderBottom() throws Exception {
+510 final String[] expected = {
+511 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
+512 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.*" ),
+513 };
+514 verifyWithInlineConfigParser(
+515 getPath("InputImportOrderStaticOnDemandGroupOrderBottom1.java" ),
+516 expected);
+517 }
+518
+519 @Test
+520 public void testStaticOnDemandGroupsAlphabeticalOrderBottom() throws Exception {
+521 final String[] expected = {
+522 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
+523 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.*" ),
+524 };
+525 verifyWithInlineConfigParser(
+526 getPath("InputImportOrderStaticOnDemandGroupOrderBottom2.java" ),
+527 expected);
+528 }
+529
+530 @Test
+531 public void testStaticOnDemandGroupsOrderAbove() throws Exception {
+532 final String[] expected = {
+533 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.util.Set" ),
+534 "23:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "java.lang.Math.*" ),
+535 "23:1: " + getCheckMessage(MSG_ORDERING, "java.lang.Math.*" ),
+536 "24:1: " + getCheckMessage(MSG_ORDERING, "org.antlr.v4.runtime.CommonToken.*" ),
+537 };
+538 verifyWithInlineConfigParser(
+539 getPath("InputImportOrderStaticOnDemandGroupOrderBottom3.java" ),
+540 expected);
+541 }
+542
+543 @Test
+544 public void testGroupWithSlashes() throws Exception {
+545 final DefaultConfiguration checkConfig = createModuleConfig(ImportOrderCheck.class );
+546 checkConfig.addProperty("groups" , "/^javax" );
+547
+548 try {
+549 execute(checkConfig, getNonCompilablePath("InputImportOrder5.java" ));
+550 assertWithMessage("exception expected" ).fail();
+551 }
+552 catch (CheckstyleException ex) {
+553 assertWithMessage("Invalid exception message" )
+554 .that(ex.getMessage())
+555 .isEqualTo("cannot initialize module com.puppycrawl.tools.checkstyle.TreeWalker - "
+556 + "cannot initialize module com.puppycrawl.tools.checkstyle.checks"
+557 + ".imports.ImportOrderCheck - "
+558 + "Cannot set property 'groups' to '/^javax'" );
+559 assertWithMessage("Invalid exception message" )
+560 .that(ex.getCause().getCause().getCause().getCause().getMessage())
+561 .isEqualTo("Invalid group: /^javax" );
+562 }
+563 }
+564
+565 @Test
+566 public void testGroupWithDot() throws Exception {
+567 final String[] expected = {
+568 "21:1: " + getCheckMessage(MSG_ORDERING, "java.awt.Dialog" ),
+569 "23:1: " + getCheckMessage(MSG_ORDERING, "javax.swing.JComponent" ),
+570 };
+571 verifyWithInlineConfigParser(
+572 getPath("InputImportOrder_DotPackageName.java" ),
+573 expected);
+574 }
+575
+576 @Test
+577 public void testMultiplePatternMatches() throws Exception {
+578 final String[] expected = {
+579 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.*" ),
+580 };
+581
+582 verifyWithInlineConfigParser(
+583 getNonCompilablePath("InputImportOrder_MultiplePatternMatches1.java" ),
+584 expected);
+585 }
+586
+587
+588
+589
+590
+591
+592
+593 @Test
+594 public void testVisitTokenSwitchReflection() {
+595
+596 final DetailAstImpl astImport = mockAST(TokenTypes.IMPORT, "import" , 0, 0);
+597 final DetailAstImpl astIdent = mockAST(TokenTypes.IDENT, "myTestImport" , 0, 0);
+598 astImport.addChild(astIdent);
+599 final DetailAST astSemi = mockAST(TokenTypes.SEMI, ";" , 0, 0);
+600 astIdent.addNextSibling(astSemi);
+601
+602
+603 final ImportOrderCheck mock = new ImportOrderCheck();
+604 TestUtil.setInternalState(mock, "option" , null );
+605
+606
+607 try {
+608 mock.visitToken(astImport);
+609 assertWithMessage("An exception is expected" ).fail();
+610 }
+611 catch (IllegalStateException ex) {
+612 assertWithMessage("invalid exception message" )
+613 .that(ex.getMessage())
+614 .endsWith(": null" );
+615 }
+616 }
+617
+618
+619
+620
+621
+622
+623
+624
+625
+626
+627 private static DetailAstImpl mockAST(final int tokenType, final String tokenText,
+628 final int tokenRow, final int tokenColumn) {
+629 final CommonToken tokenImportSemi = new CommonToken(tokenType, tokenText);
+630 tokenImportSemi.setLine(tokenRow);
+631 tokenImportSemi.setCharPositionInLine(tokenColumn);
+632 final DetailAstImpl astSemi = new DetailAstImpl();
+633 astSemi.initialize(tokenImportSemi);
+634 return astSemi;
635 }
636
637 @Test
-638 public void testStaticImportEclipseRepetition() throws Exception {
+638 public void testEclipseDefaultPositive() throws Exception {
639 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-640 verifyWithInlineConfigParser(
-641 getNonCompilablePath("InputImportOrderEclipseStaticRepetition.java" ), expected);
-642 }
-643
-644 @Test
-645 public void testEclipseDefaultNegative() throws Exception {
-646 final String[] expected = {
-647 "28:1: " + getCheckMessage(MSG_SEPARATION, "javax.swing.JComponent" ),
-648 "33:1: " + getCheckMessage(MSG_ORDERING, "org.junit.Test" ),
-649 };
-650
-651 verifyWithInlineConfigParser(
-652 getNonCompilablePath("InputImportOrder_EclipseDefaultNegative.java" ), expected);
-653 }
-654
-655 @Test
-656 public void testUseContainerOrderingForStaticTrue() throws Exception {
-657 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-658 verifyWithInlineConfigParser(
-659 getNonCompilablePath("InputImportOrderEclipseStatic1.java" ), expected);
-660 }
-661
-662 @Test
-663 public void testUseContainerOrderingForStaticFalse() throws Exception {
-664 final String[] expected = {
-665 "22:1: " + getCheckMessage(MSG_ORDERING,
-666 "io.netty.handler.codec.http.HttpHeaders.Names.addDate" ),
-667 };
-668 verifyWithInlineConfigParser(
-669 getNonCompilablePath("InputImportOrderEclipseStatic2.java" ), expected);
-670 }
-671
-672 @Test
-673 public void testUseContainerOrderingForStaticTrueCaseSensitive() throws Exception {
-674 final String[] expected = {
-675 "23:1: " + getCheckMessage(MSG_ORDERING,
-676 "io.netty.handler.codec.http.HttpHeaders.Names.DATE" ),
-677 };
-678 verifyWithInlineConfigParser(
-679 getNonCompilablePath("InputImportOrderEclipseStatic3.java" ), expected);
-680 }
-681
-682 @Test
-683 public void testUseContainerOrderingForStatic() throws Exception {
-684 final String[] expected = {
-685 "22:1: " + getCheckMessage(MSG_ORDERING,
-686 "io.netty.handler.Codec.HTTP.HttpHeaders.tmp.same" ),
-687 "23:1: " + getCheckMessage(MSG_ORDERING,
-688 "io.netty.handler.Codec.HTTP.HttpHeaders.TKN.same" ),
-689 };
-690 verifyWithInlineConfigParser(
-691 getNonCompilablePath("InputImportOrderContainerOrdering.java" ),
-692 expected);
-693 }
-694
-695 @Test
-696 public void testImportGroupsRedundantSeparatedInternally() throws Exception {
-697 final String[] expected = {
-698 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.*" ),
-699 };
-700 verifyWithInlineConfigParser(
-701 getNonCompilablePath("InputImportOrder_MultiplePatternMatches2.java" ),
-702 expected);
-703 }
-704
-705 @Test
-706 public void testStaticGroupsAbove() throws Exception {
-707 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-708
-709 verifyWithInlineConfigParser(
-710 getNonCompilablePath("InputImportOrderStaticGroupsAbove.java" ),
-711 expected);
-712 }
-713
-714 @Test
-715 public void testStaticGroupsBottom() throws Exception {
-716 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-717
-718 verifyWithInlineConfigParser(
-719 getNonCompilablePath("InputImportOrderStaticGroupsBottom.java" ),
-720 expected);
-721 }
-722
-723 @Test
-724 public void testStaticGroupsBottomSeparated() throws Exception {
-725 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-726
-727 verifyWithInlineConfigParser(
-728 getNonCompilablePath("InputImportOrderStaticGroupsBottomSeparated.java" ), expected);
+640
+641 verifyWithInlineConfigParser(
+642 getNonCompilablePath("InputImportOrder_EclipseDefaultPositive.java" ), expected);
+643 }
+644
+645 @Test
+646 public void testStaticImportEclipseRepetition() throws Exception {
+647 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+648 verifyWithInlineConfigParser(
+649 getNonCompilablePath("InputImportOrderEclipseStaticRepetition.java" ), expected);
+650 }
+651
+652 @Test
+653 public void testEclipseDefaultNegative() throws Exception {
+654 final String[] expected = {
+655 "28:1: " + getCheckMessage(MSG_SEPARATION, "javax.swing.JComponent" ),
+656 "33:1: " + getCheckMessage(MSG_ORDERING, "org.junit.Test" ),
+657 };
+658
+659 verifyWithInlineConfigParser(
+660 getNonCompilablePath("InputImportOrder_EclipseDefaultNegative.java" ), expected);
+661 }
+662
+663 @Test
+664 public void testUseContainerOrderingForStaticTrue() throws Exception {
+665 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+666 verifyWithInlineConfigParser(
+667 getNonCompilablePath("InputImportOrderEclipseStatic1.java" ), expected);
+668 }
+669
+670 @Test
+671 public void testUseContainerOrderingForStaticFalse() throws Exception {
+672 final String[] expected = {
+673 "22:1: " + getCheckMessage(MSG_ORDERING,
+674 "io.netty.handler.codec.http.HttpHeaders.Names.addDate" ),
+675 };
+676 verifyWithInlineConfigParser(
+677 getNonCompilablePath("InputImportOrderEclipseStatic2.java" ), expected);
+678 }
+679
+680 @Test
+681 public void testUseContainerOrderingForStaticTrueCaseSensitive() throws Exception {
+682 final String[] expected = {
+683 "23:1: " + getCheckMessage(MSG_ORDERING,
+684 "io.netty.handler.codec.http.HttpHeaders.Names.DATE" ),
+685 };
+686 verifyWithInlineConfigParser(
+687 getNonCompilablePath("InputImportOrderEclipseStatic3.java" ), expected);
+688 }
+689
+690 @Test
+691 public void testUseContainerOrderingForStatic() throws Exception {
+692 final String[] expected = {
+693 "22:1: " + getCheckMessage(MSG_ORDERING,
+694 "io.netty.handler.Codec.HTTP.HttpHeaders.tmp.same" ),
+695 "23:1: " + getCheckMessage(MSG_ORDERING,
+696 "io.netty.handler.Codec.HTTP.HttpHeaders.TKN.same" ),
+697 };
+698 verifyWithInlineConfigParser(
+699 getNonCompilablePath("InputImportOrderContainerOrdering.java" ),
+700 expected);
+701 }
+702
+703 @Test
+704 public void testImportGroupsRedundantSeparatedInternally() throws Exception {
+705 final String[] expected = {
+706 "21:1: " + getCheckMessage(MSG_SEPARATED_IN_GROUP, "org.*" ),
+707 };
+708 verifyWithInlineConfigParser(
+709 getNonCompilablePath("InputImportOrder_MultiplePatternMatches2.java" ),
+710 expected);
+711 }
+712
+713 @Test
+714 public void testStaticGroupsAbove() throws Exception {
+715 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+716
+717 verifyWithInlineConfigParser(
+718 getNonCompilablePath("InputImportOrderStaticGroupsAbove.java" ),
+719 expected);
+720 }
+721
+722 @Test
+723 public void testStaticGroupsBottom() throws Exception {
+724 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+725
+726 verifyWithInlineConfigParser(
+727 getNonCompilablePath("InputImportOrderStaticGroupsBottom.java" ),
+728 expected);
729 }
730
731 @Test
-732 public void testStaticGroupsInflow() throws Exception {
+732 public void testStaticGroupsBottomSeparated() throws Exception {
733 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
734
735 verifyWithInlineConfigParser(
-736 getNonCompilablePath("InputImportOrderStaticGroupsInflow.java" ),
-737 expected);
-738 }
-739
-740 @Test
-741 public void testStaticGroupsNegative() throws Exception {
-742 final String[] expected = {
-743 "21:1: " + getCheckMessage(MSG_ORDERING, "org.junit.Assert.fail" ),
-744 "23:1: " + getCheckMessage(MSG_ORDERING, "org.infinispan.test.TestingUtil.extract" ),
-745 };
-746
-747 verifyWithInlineConfigParser(
-748 getNonCompilablePath("InputImportOrderStaticGroupsNegative.java" ),
-749 expected);
-750 }
-751
-752 @Test
-753 public void testStaticGroupsTop() throws Exception {
-754 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-755
-756 verifyWithInlineConfigParser(
-757 getNonCompilablePath("InputImportOrderStaticGroupsTop.java" ),
-758 expected);
-759 }
-760
-761 @Test
-762 public void testStaticGroupsTopSeparated() throws Exception {
-763 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-764
-765 verifyWithInlineConfigParser(
-766 getNonCompilablePath("InputImportOrderStaticGroupsTopSeparated.java" ),
-767 expected);
-768 }
-769
-770 @Test
-771 public void testStaticGroupsUnordered() throws Exception {
-772 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-773
-774 verifyWithInlineConfigParser(
-775 getNonCompilablePath("InputImportOrderStaticGroupsUnordered.java" ),
-776 expected);
-777 }
-778
-779 @Test
-780 public void testTrimOption() throws Exception {
-781 final String[] expected = {
-782 "25:1: " + getCheckMessage(MSG_ORDERING, "java.util.Set" ),
-783 };
-784
-785 verifyWithInlineConfigParser(
-786 getPath("InputImportOrderTestTrimInOption.java" ),
-787 expected);
-788 }
-789
-790
-791
-792
-793
-794
-795
-796
-797
-798 @Test
-799 public void testClearState() throws Exception {
-800 final ImportOrderCheck check = new ImportOrderCheck();
-801 final DetailAST root = JavaParser.parseFile(
-802 new File(getPath("InputImportOrderBeginTree.java" )),
-803 JavaParser.Options.WITHOUT_COMMENTS);
-804 final Optional<DetailAST> staticImport = TestUtil.findTokenInAstByPredicate(root,
-805 ast -> ast.getType() == TokenTypes.STATIC_IMPORT);
-806
-807 assertWithMessage("Ast should contain STATIC_IMPORT" )
-808 .that(staticImport.isPresent())
-809 .isTrue();
-810 assertWithMessage("State is not cleared on beginTree" )
-811 .that(TestUtil.isStatefulFieldClearedDuringBeginTree(check, staticImport.get(),
-812 "lastImportStatic" , lastImportStatic -> !((boolean ) lastImportStatic)))
-813 .isTrue();
+736 getNonCompilablePath("InputImportOrderStaticGroupsBottomSeparated.java" ), expected);
+737 }
+738
+739 @Test
+740 public void testStaticGroupsInflow() throws Exception {
+741 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+742
+743 verifyWithInlineConfigParser(
+744 getNonCompilablePath("InputImportOrderStaticGroupsInflow.java" ),
+745 expected);
+746 }
+747
+748 @Test
+749 public void testStaticGroupsNegative() throws Exception {
+750 final String[] expected = {
+751 "21:1: " + getCheckMessage(MSG_ORDERING, "org.junit.Assert.fail" ),
+752 "23:1: " + getCheckMessage(MSG_ORDERING, "org.infinispan.test.TestingUtil.extract" ),
+753 };
+754
+755 verifyWithInlineConfigParser(
+756 getNonCompilablePath("InputImportOrderStaticGroupsNegative.java" ),
+757 expected);
+758 }
+759
+760 @Test
+761 public void testStaticGroupsTop() throws Exception {
+762 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+763
+764 verifyWithInlineConfigParser(
+765 getNonCompilablePath("InputImportOrderStaticGroupsTop.java" ),
+766 expected);
+767 }
+768
+769 @Test
+770 public void testStaticGroupsTopSeparated() throws Exception {
+771 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+772
+773 verifyWithInlineConfigParser(
+774 getNonCompilablePath("InputImportOrderStaticGroupsTopSeparated.java" ),
+775 expected);
+776 }
+777
+778 @Test
+779 public void testStaticGroupsUnordered() throws Exception {
+780 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+781
+782 verifyWithInlineConfigParser(
+783 getNonCompilablePath("InputImportOrderStaticGroupsUnordered.java" ),
+784 expected);
+785 }
+786
+787 @Test
+788 public void testTrimOption() throws Exception {
+789 final String[] expected = {
+790 "25:1: " + getCheckMessage(MSG_ORDERING, "java.util.Set" ),
+791 };
+792
+793 verifyWithInlineConfigParser(
+794 getPath("InputImportOrderTestTrimInOption.java" ),
+795 expected);
+796 }
+797
+798
+799
+800
+801
+802
+803
+804
+805
+806 @Test
+807 public void testClearState() throws Exception {
+808 final ImportOrderCheck check = new ImportOrderCheck();
+809 final DetailAST root = JavaParser.parseFile(
+810 new File(getPath("InputImportOrderBeginTree.java" )),
+811 JavaParser.Options.WITHOUT_COMMENTS);
+812 final Optional<DetailAST> staticImport = TestUtil.findTokenInAstByPredicate(root,
+813 ast -> ast.getType() == TokenTypes.STATIC_IMPORT);
814
-815 }
-816 }
+815 assertWithMessage("Ast should contain STATIC_IMPORT" )
+816 .that(staticImport.isPresent())
+817 .isTrue();
+818 assertWithMessage("State is not cleared on beginTree" )
+819 .that(TestUtil.isStatefulFieldClearedDuringBeginTree(check, staticImport.get(),
+820 "lastImportStatic" , lastImportStatic -> !((boolean ) lastImportStatic)))
+821 .isTrue();
+822
+823 }
+824 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstarimport/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstarimport/package-frame.html
index c45db62700..3e8b6aa4f2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstarimport/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstarimport/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.avoidstarimport
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.avoidstarimport
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstarimport/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstarimport/package-summary.html
index a214c6bd11..4400e6220d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstarimport/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstarimport/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.avoidstarimport
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.avoidstarimport
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstaticimport/InputAvoidStaticImportNestedClass.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstaticimport/InputAvoidStaticImportNestedClass.html
index b62317a8de..33ce51d91e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstaticimport/InputAvoidStaticImportNestedClass.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstaticimport/InputAvoidStaticImportNestedClass.html
@@ -14,7 +14,7 @@
6
7 package com.puppycrawl.tools.checkstyle.checks.imports.avoidstaticimport;
8
-9 public class InputAvoidStaticImportNestedClass {
+9 public class InputAvoidStaticImportNestedClass {
10 public static Integer zero=0;
11
12 public static class InnerClass {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstaticimport/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstaticimport/package-frame.html
index fbf2ac75ff..78a34c94b8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstaticimport/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstaticimport/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.avoidstaticimport
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.avoidstaticimport
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstaticimport/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstaticimport/package-summary.html
index 07b0c4471a..3bc084c202 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstaticimport/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/avoidstaticimport/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.avoidstaticimport
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.avoidstaticimport
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -111,7 +111,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault5.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault5.html
index ed654f5f0c..2ba6a98126 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault5.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault5.html
@@ -42,7 +42,7 @@
34 import com.google.common.collect.*;
35 import org.junit.*;
36
-37 public class InputCustomImportOrderDefault5 {
+37 public class InputCustomImportOrderDefault5 {
38 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault6.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault6.html
index b79b93443a..3a2bcb5e39 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault6.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault6.html
@@ -42,7 +42,7 @@
34 import com.google.common.collect.*;
35 import org.junit.*;
36
-37 public class InputCustomImportOrderDefault6 {
+37 public class InputCustomImportOrderDefault6 {
38 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault7.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault7.html
index bec929a73d..17c69a3759 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault7.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault7.html
@@ -42,7 +42,7 @@
34 import com.google.common.collect.*;
35 import org.junit.*;
36
-37 public class InputCustomImportOrderDefault7 {
+37 public class InputCustomImportOrderDefault7 {
38 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault8.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault8.html
index ac9022d393..d62aac0ccd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault8.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderDefault8.html
@@ -42,7 +42,7 @@
34 import com.google.common.collect.*;
35 import org.junit.*;
36
-37 public class InputCustomImportOrderDefault8 {
+37 public class InputCustomImportOrderDefault8 {
38 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderNoValid.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderNoValid.html
index 0f13acec0b..9fe162ec63 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderNoValid.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderNoValid.html
@@ -24,7 +24,7 @@
16 import java.util.Map.Entry;
17 import java.util.NoSuchElementException;
18
-19 public class InputCustomImportOrderNoValid {
+19 public class InputCustomImportOrderNoValid {
20 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderSpecialImportsRegExp.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderSpecialImportsRegExp.html
index da60e06d84..7ba5aa0e48 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderSpecialImportsRegExp.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrderSpecialImportsRegExp.html
@@ -22,7 +22,7 @@
14
15 import org.junit.Test;
16
-17 public class InputCustomImportOrderSpecialImportsRegExp {
+17 public class InputCustomImportOrderSpecialImportsRegExp {
18 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_MultiplePatternMatches.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_MultiplePatternMatches.html
index 9975d19083..8a4813d87e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_MultiplePatternMatches.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_MultiplePatternMatches.html
@@ -23,7 +23,7 @@
15
16 import org.junit.Test;
17
-18 public class InputCustomImportOrder_MultiplePatternMatches {
+18 public class InputCustomImportOrder_MultiplePatternMatches {
19 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_MultiplePatternMatches2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_MultiplePatternMatches2.html
index 68a94c25d9..4a67b68c77 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_MultiplePatternMatches2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_MultiplePatternMatches2.html
@@ -23,7 +23,7 @@
15
16 import org.junit.Test;
17
-18 public class InputCustomImportOrder_MultiplePatternMatches2 {
+18 public class InputCustomImportOrder_MultiplePatternMatches2 {
19 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_MultiplePatternMatches3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_MultiplePatternMatches3.html
index 6d25df198e..f3e653f021 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_MultiplePatternMatches3.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_MultiplePatternMatches3.html
@@ -23,7 +23,7 @@
15
16 import org.junit.Test;
17
-18 public class InputCustomImportOrder_MultiplePatternMatches3 {
+18 public class InputCustomImportOrder_MultiplePatternMatches3 {
19 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_NoImports.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_NoImports.html
index 6e5f337c6f..fb6617d684 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_NoImports.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/InputCustomImportOrder_NoImports.html
@@ -22,7 +22,7 @@
14 package com.puppycrawl.tools.checkstyle.checks.imports.customimportorder;
15
16
-17 public class InputCustomImportOrder_NoImports {
+17 public class InputCustomImportOrder_NoImports {
18 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/package-frame.html
index b2b34c6b88..93420393ce 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.customimportorder
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.customimportorder
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/package-summary.html
index f9a18ae14b..03dab5ba4e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/customimportorder/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.customimportorder
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.customimportorder
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -201,7 +201,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault1.html
index fd3152d615..18a0b3aaf8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault1.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault1.html
@@ -17,36 +17,36 @@
9
10 package com.puppycrawl.tools.checkstyle.checks.imports.illegalimport;
11
-12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
+12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
13
14 import java.io.*;
-15 import java.lang.*;
-16 import java.sql.Connection;
-17 import java.util.List;
-18 import java.util.List;
-19 import java.lang.ArithmeticException;
-20 import org.junit.jupiter.api.*;
-21 import java.util.Enumeration;
-22 import java.util.Arrays;
+15 import java.lang.*;
+16 import java.sql.Connection;
+17 import java.util.List;
+18 import java.util.List;
+19 import java.lang.ArithmeticException;
+20 import org.junit.jupiter.api.*;
+21 import java.util.Enumeration;
+22 import java.util.Arrays;
23
-24 import javax.swing.JToolBar;
-25 import javax.swing.JToggleButton;
-26 import javax.swing.ScrollPaneLayout;
-27 import javax.swing.BorderFactory;
+24 import javax.swing.JToolBar;
+25 import javax.swing.JToggleButton;
+26 import javax.swing.ScrollPaneLayout;
+27 import javax.swing.BorderFactory;
28 import static java.io.File.listRoots;
29
-30 import static javax.swing.WindowConstants.*;
-31 import static javax.swing.WindowConstants.*;
+30 import static javax.swing.WindowConstants.*;
+31 import static javax.swing.WindowConstants.*;
32 import static java.io.File.createTempFile;
-33 import org.junit.jupiter.api.*;
+33 import org.junit.jupiter.api.*;
34
-35 import java.awt.Component;
-36 import java.awt.Graphics2D;
-37 import java.awt.HeadlessException;
-38 import java.awt.Label;
-39 import java.util.Date;
-40 import java.util.Calendar;
-41 import java.util.BitSet;
+35 import java.awt.Component;
+36 import java.awt.Graphics2D;
+37 import java.awt.HeadlessException;
+38 import java.awt.Label;
+39 import java.util.Date;
+40 import java.util.Calendar;
+41 import java.util.BitSet;
42
43
44
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault2.html
index c3bf71a089..a8b3a44a01 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault2.html
@@ -17,36 +17,36 @@
9
10 package com.puppycrawl.tools.checkstyle.checks.imports.illegalimport;
11
-12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
+12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
13
-14 import java.io.*;
-15 import java.lang.*;
-16 import java.sql.Connection;
-17 import java.util.List;
-18 import java.util.List;
-19 import java.lang.ArithmeticException;
-20 import org.junit.jupiter.api.*;
-21 import java.util.Enumeration;
-22 import java.util.Arrays;
+14 import java.io.*;
+15 import java.lang.*;
+16 import java.sql.Connection;
+17 import java.util.List;
+18 import java.util.List;
+19 import java.lang.ArithmeticException;
+20 import org.junit.jupiter.api.*;
+21 import java.util.Enumeration;
+22 import java.util.Arrays;
23
-24 import javax.swing.JToolBar;
-25 import javax.swing.JToggleButton;
-26 import javax.swing.ScrollPaneLayout;
-27 import javax.swing.BorderFactory;
-28 import static java.io.File.listRoots;
+24 import javax.swing.JToolBar;
+25 import javax.swing.JToggleButton;
+26 import javax.swing.ScrollPaneLayout;
+27 import javax.swing.BorderFactory;
+28 import static java.io.File.listRoots;
29
-30 import static javax.swing.WindowConstants.*;
-31 import static javax.swing.WindowConstants.*;
-32 import static java.io.File.createTempFile;
-33 import org.junit.jupiter.api.*;
+30 import static javax.swing.WindowConstants.*;
+31 import static javax.swing.WindowConstants.*;
+32 import static java.io.File.createTempFile;
+33 import org.junit.jupiter.api.*;
34
-35 import java.awt.Component;
-36 import java.awt.Graphics2D;
-37 import java.awt.HeadlessException;
-38 import java.awt.Label;
-39 import java.util.Date;
-40 import java.util.Calendar;
-41 import java.util.BitSet;
+35 import java.awt.Component;
+36 import java.awt.Graphics2D;
+37 import java.awt.HeadlessException;
+38 import java.awt.Label;
+39 import java.util.Date;
+40 import java.util.Calendar;
+41 import java.util.BitSet;
42
43 class InputIllegalImportDefault2
44 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault3.html
index 109dee3a14..d8109dbcbb 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault3.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault3.html
@@ -17,36 +17,36 @@
9
10 package com.puppycrawl.tools.checkstyle.checks.imports.illegalimport;
11
-12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
+12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
13
-14 import java.io.*;
-15 import java.lang.*;
+14 import java.io.*;
+15 import java.lang.*;
16 import java.sql.Connection;
-17 import java.util.List;
-18 import java.util.List;
-19 import java.lang.ArithmeticException;
+17 import java.util.List;
+18 import java.util.List;
+19 import java.lang.ArithmeticException;
20 import org.junit.jupiter.api.*;
-21 import java.util.Enumeration;
-22 import java.util.Arrays;
+21 import java.util.Enumeration;
+22 import java.util.Arrays;
23
-24 import javax.swing.JToolBar;
-25 import javax.swing.JToggleButton;
-26 import javax.swing.ScrollPaneLayout;
-27 import javax.swing.BorderFactory;
-28 import static java.io.File.listRoots;
+24 import javax.swing.JToolBar;
+25 import javax.swing.JToggleButton;
+26 import javax.swing.ScrollPaneLayout;
+27 import javax.swing.BorderFactory;
+28 import static java.io.File.listRoots;
29
-30 import static javax.swing.WindowConstants.*;
-31 import static javax.swing.WindowConstants.*;
-32 import static java.io.File.createTempFile;
+30 import static javax.swing.WindowConstants.*;
+31 import static javax.swing.WindowConstants.*;
+32 import static java.io.File.createTempFile;
33 import org.junit.jupiter.api.*;
34
-35 import java.awt.Component;
-36 import java.awt.Graphics2D;
-37 import java.awt.HeadlessException;
-38 import java.awt.Label;
-39 import java.util.Date;
-40 import java.util.Calendar;
-41 import java.util.BitSet;
+35 import java.awt.Component;
+36 import java.awt.Graphics2D;
+37 import java.awt.HeadlessException;
+38 import java.awt.Label;
+39 import java.util.Date;
+40 import java.util.Calendar;
+41 import java.util.BitSet;
42
43 class InputIllegalImportDefault3
44 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault4.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault4.html
index 351ffa7f00..7fa0742f77 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault4.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault4.html
@@ -17,36 +17,36 @@
9
10 package com.puppycrawl.tools.checkstyle.checks.imports.illegalimport;
11
-12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
+12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
13
14 import java.io.*;
-15 import java.lang.*;
-16 import java.sql.Connection;
-17 import java.util.List;
-18 import java.util.List;
-19 import java.lang.ArithmeticException;
+15 import java.lang.*;
+16 import java.sql.Connection;
+17 import java.util.List;
+18 import java.util.List;
+19 import java.lang.ArithmeticException;
20 import org.junit.jupiter.api.*;
-21 import java.util.Enumeration;
-22 import java.util.Arrays;
+21 import java.util.Enumeration;
+22 import java.util.Arrays;
23
-24 import javax.swing.JToolBar;
-25 import javax.swing.JToggleButton;
-26 import javax.swing.ScrollPaneLayout;
-27 import javax.swing.BorderFactory;
-28 import static java.io.File.listRoots;
+24 import javax.swing.JToolBar;
+25 import javax.swing.JToggleButton;
+26 import javax.swing.ScrollPaneLayout;
+27 import javax.swing.BorderFactory;
+28 import static java.io.File.listRoots;
29
-30 import static javax.swing.WindowConstants.*;
-31 import static javax.swing.WindowConstants.*;
-32 import static java.io.File.createTempFile;
+30 import static javax.swing.WindowConstants.*;
+31 import static javax.swing.WindowConstants.*;
+32 import static java.io.File.createTempFile;
33 import org.junit.jupiter.api.*;
34
-35 import java.awt.Component;
-36 import java.awt.Graphics2D;
-37 import java.awt.HeadlessException;
-38 import java.awt.Label;
-39 import java.util.Date;
-40 import java.util.Calendar;
-41 import java.util.BitSet;
+35 import java.awt.Component;
+36 import java.awt.Graphics2D;
+37 import java.awt.HeadlessException;
+38 import java.awt.Label;
+39 import java.util.Date;
+40 import java.util.Calendar;
+41 import java.util.BitSet;
42
43 class InputIllegalImportDefault4
44 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault5.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault5.html
index e9001fdb26..030d24f1f5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault5.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault5.html
@@ -17,33 +17,33 @@
9
10 package com.puppycrawl.tools.checkstyle.checks.imports.illegalimport;
11
-12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
+12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
13
-14 import java.io.*;
-15 import java.lang.*;
-16 import java.sql.Connection;
+14 import java.io.*;
+15 import java.lang.*;
+16 import java.sql.Connection;
17 import java.util.List;
18 import java.util.List;
-19 import java.lang.ArithmeticException;
-20 import org.junit.jupiter.api.*;
+19 import java.lang.ArithmeticException;
+20 import org.junit.jupiter.api.*;
21 import java.util.Enumeration;
22 import java.util.Arrays;
23
-24 import javax.swing.JToolBar;
-25 import javax.swing.JToggleButton;
-26 import javax.swing.ScrollPaneLayout;
-27 import javax.swing.BorderFactory;
-28 import static java.io.File.listRoots;
+24 import javax.swing.JToolBar;
+25 import javax.swing.JToggleButton;
+26 import javax.swing.ScrollPaneLayout;
+27 import javax.swing.BorderFactory;
+28 import static java.io.File.listRoots;
29
-30 import static javax.swing.WindowConstants.*;
-31 import static javax.swing.WindowConstants.*;
-32 import static java.io.File.createTempFile;
-33 import org.junit.jupiter.api.*;
+30 import static javax.swing.WindowConstants.*;
+31 import static javax.swing.WindowConstants.*;
+32 import static java.io.File.createTempFile;
+33 import org.junit.jupiter.api.*;
34
-35 import java.awt.Component;
-36 import java.awt.Graphics2D;
-37 import java.awt.HeadlessException;
-38 import java.awt.Label;
+35 import java.awt.Component;
+36 import java.awt.Graphics2D;
+37 import java.awt.HeadlessException;
+38 import java.awt.Label;
39 import java.util.Date;
40 import java.util.Calendar;
41 import java.util.BitSet;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault6.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault6.html
index 7623710cb3..6c635beae6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault6.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault6.html
@@ -17,36 +17,36 @@
9
10 package com.puppycrawl.tools.checkstyle.checks.imports.illegalimport;
11
-12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
+12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
13
-14 import java.io.*;
-15 import java.lang.*;
-16 import java.sql.Connection;
+14 import java.io.*;
+15 import java.lang.*;
+16 import java.sql.Connection;
17 import java.util.List;
18 import java.util.List;
-19 import java.lang.ArithmeticException;
-20 import org.junit.jupiter.api.*;
-21 import java.util.Enumeration;
+19 import java.lang.ArithmeticException;
+20 import org.junit.jupiter.api.*;
+21 import java.util.Enumeration;
22 import java.util.Arrays;
23
-24 import javax.swing.JToolBar;
-25 import javax.swing.JToggleButton;
-26 import javax.swing.ScrollPaneLayout;
-27 import javax.swing.BorderFactory;
-28 import static java.io.File.listRoots;
+24 import javax.swing.JToolBar;
+25 import javax.swing.JToggleButton;
+26 import javax.swing.ScrollPaneLayout;
+27 import javax.swing.BorderFactory;
+28 import static java.io.File.listRoots;
29
-30 import static javax.swing.WindowConstants.*;
-31 import static javax.swing.WindowConstants.*;
-32 import static java.io.File.createTempFile;
-33 import org.junit.jupiter.api.*;
+30 import static javax.swing.WindowConstants.*;
+31 import static javax.swing.WindowConstants.*;
+32 import static java.io.File.createTempFile;
+33 import org.junit.jupiter.api.*;
34
-35 import java.awt.Component;
-36 import java.awt.Graphics2D;
-37 import java.awt.HeadlessException;
-38 import java.awt.Label;
-39 import java.util.Date;
-40 import java.util.Calendar;
-41 import java.util.BitSet;
+35 import java.awt.Component;
+36 import java.awt.Graphics2D;
+37 import java.awt.HeadlessException;
+38 import java.awt.Label;
+39 import java.util.Date;
+40 import java.util.Calendar;
+41 import java.util.BitSet;
42
43 class InputIllegalImportDefault6
44 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault7.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault7.html
index ff596a264b..63bf04fbf9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault7.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/InputIllegalImportDefault7.html
@@ -17,28 +17,28 @@
9
10 package com.puppycrawl.tools.checkstyle.checks.imports.illegalimport;
11
-12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
+12 import com.puppycrawl.tools.checkstyle.checks.imports.illegalimport.*;
13
-14 import java.io.*;
-15 import java.lang.*;
-16 import java.sql.Connection;
+14 import java.io.*;
+15 import java.lang.*;
+16 import java.sql.Connection;
17 import java.util.List;
18 import java.util.List;
-19 import java.lang.ArithmeticException;
-20 import org.junit.jupiter.api.*;
+19 import java.lang.ArithmeticException;
+20 import org.junit.jupiter.api.*;
21 import java.util.Enumeration;
22 import java.util.Arrays;
23
-24 import javax.swing.JToolBar;
-25 import javax.swing.JToggleButton;
-26 import javax.swing.ScrollPaneLayout;
-27 import javax.swing.BorderFactory;
-28 import static java.io.File.listRoots;
+24 import javax.swing.JToolBar;
+25 import javax.swing.JToggleButton;
+26 import javax.swing.ScrollPaneLayout;
+27 import javax.swing.BorderFactory;
+28 import static java.io.File.listRoots;
29
-30 import static javax.swing.WindowConstants.*;
-31 import static javax.swing.WindowConstants.*;
-32 import static java.io.File.createTempFile;
-33 import org.junit.jupiter.api.*;
+30 import static javax.swing.WindowConstants.*;
+31 import static javax.swing.WindowConstants.*;
+32 import static java.io.File.createTempFile;
+33 import org.junit.jupiter.api.*;
34
35 import java.awt.Component;
36 import java.awt.Graphics2D;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/package-frame.html
index 832674467e..88a830977f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.illegalimport
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.illegalimport
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/package-summary.html
index 99935cf534..b3bc51e825 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/illegalimport/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.illegalimport
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.illegalimport
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -111,7 +111,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl11.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl11.html
index 92e0f1c6f0..9a26763a01 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl11.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl11.html
@@ -14,7 +14,7 @@
6
7
8
-9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
+9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
10
11 import java.awt.Image;
12 import javax.swing.border.*;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl18.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl18.html
index 4215175c79..efe6f9fa91 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl18.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl18.html
@@ -14,7 +14,7 @@
6
7
8
-9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
+9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
10
11 import java.awt.Image;
12 import javax.swing.border.*;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl20.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl20.html
index 34462ea81f..4a1dbb1e9b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl20.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl20.html
@@ -14,7 +14,7 @@
6
7
8
-9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
+9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
10
11 import java.awt.Image;
12 import javax.swing.border.*;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl23.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl23.html
index 40b4d9e213..6e04a335f5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl23.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl23.html
@@ -14,7 +14,7 @@
6
7
8
-9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
+9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
10
11 import java.awt.Image;
12 import javax.swing.border.*;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl24.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl24.html
index 6793c7a7f7..5b10d78d87 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl24.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl24.html
@@ -14,7 +14,7 @@
6
7
8
-9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
+9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
10
11 import java.awt.Image;
12 import javax.swing.border.*;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl7.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl7.html
index fb399e92dd..54b6ba9a82 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl7.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl7.html
@@ -14,7 +14,7 @@
6
7
8
-9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
+9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
10
11 import java.awt.Image;
12 import javax.swing.border.*;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl8.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl8.html
index ebd34030a1..4eb3f99c31 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl8.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControl8.html
@@ -14,7 +14,7 @@
6
7
8
-9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
+9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
10
11 import java.awt.Image;
12 import javax.swing.border.*;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlBeginTree2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlBeginTree2.html
index 70b1c2b7d8..74be06931e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlBeginTree2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlBeginTree2.html
@@ -18,9 +18,8 @@
10 import java.util.stream.Collectors;
11 import java.util.stream.IntStream;
12
-13
-14 public class InputImportControlBeginTree2 {
-15 }
+13 public class InputImportControlBeginTree2 {
+14 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlTestException.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlTestException.html
new file mode 100644
index 0000000000..89c31ee566
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlTestException.html
@@ -0,0 +1,24 @@
+
+
+
+InputImportControlTestException xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
+10
+11 public class InputImportControlTestException { }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlTestRegexpInFile.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlTestRegexpInFile.html
new file mode 100644
index 0000000000..56e5421b1e
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlTestRegexpInFile.html
@@ -0,0 +1,27 @@
+
+
+
+
InputImportControlTestRegexpInFile xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
+10
+11 import java.awt.Image;
+12
+13 public class InputImportControlTestRegexpInFile {
+14 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlWithoutRegexAndWithStrategyOnMismatch.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlWithoutRegexAndWithStrategyOnMismatch.html
index 01e564a4ec..d46c773ac2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlWithoutRegexAndWithStrategyOnMismatch.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/InputImportControlWithoutRegexAndWithStrategyOnMismatch.html
@@ -16,7 +16,7 @@
8
9 package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol;
10
-
11 import java.io.File;
+
11 import java.io.File;
12
13 public class InputImportControlWithoutRegexAndWithStrategyOnMismatch {
14 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/package-frame.html
index b00b6dcf40..e52d55287b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol
@@ -98,6 +98,12 @@
Classes
InputImportControlFileName
+
+
+ InputImportControlTestException
+
+
+ InputImportControlTestRegexpInFile
InputImportControlWithRegex
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/package-summary.html
index a8c52af72c..9184c3e574 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importcontrol/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.importcontrol
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
+
+
+ InputImportControlTestException
+
+
+
+
+ InputImportControlTestRegexpInFile
+
@@ -236,7 +246,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderBeginTree.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderBeginTree.html
index c567bba758..92ca65f4be 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderBeginTree.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderBeginTree.html
@@ -8,7 +8,7 @@
1 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
2
-3 import static java.io.IOException.*;
+3 import static java.io.IOException.*;
4
5 public class InputImportOrderBeginTree {
6 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderBug.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderBug.html
index 55da3b7d3c..46c48f1123 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderBug.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderBug.html
@@ -16,7 +16,7 @@
8
9 import java.net.URL;
10
-11 public class InputImportOrderBug {
+11 public class InputImportOrderBug {
12
13 private static String URL = "This is a String object" ;
14
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderCaseInsensitive.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderCaseInsensitive.html
index 5a189d0e25..4a6872a14a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderCaseInsensitive.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderCaseInsensitive.html
@@ -24,12 +24,12 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import java.io.File;
-20 import java.io.InputStream;
-21 import java.io.IOException;
-22 import java.io.Reader;
-23 import static java.io.InputStream.*;
-24 import static java.io.IOException.*;
+19 import java.io.File;
+20 import java.io.InputStream;
+21 import java.io.IOException;
+22 import java.io.Reader;
+23 import static java.io.InputStream.*;
+24 import static java.io.IOException.*;
25
26 public class InputImportOrderCaseInsensitive {
27 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderNoGapBetweenStaticImports.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderNoGapBetweenStaticImports.html
index 51f8017d18..43583b938b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderNoGapBetweenStaticImports.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderNoGapBetweenStaticImports.html
@@ -24,10 +24,10 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import static java.lang.Math.abs;
-20 import static java.lang.Math.cos;
-21 import static javax.xml.transform.TransformerFactory.newInstance;
-22 import static org.junit.Assert.fail;
+19 import static java.lang.Math.abs;
+20 import static java.lang.Math.cos;
+21 import static javax.xml.transform.TransformerFactory.newInstance;
+22 import static org.junit.Assert.fail;
23
24 public class InputImportOrderNoGapBetweenStaticImports {
25 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderRepetition.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderRepetition.html
index a6c1b8fe29..821bc094e5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderRepetition.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderRepetition.html
@@ -24,13 +24,13 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import java.awt.Button;
-20 import java.awt.Dialog;
-21 import java.awt.event.ActionEvent;
-22 import java.awt.event.ActionEvent;
+19 import java.awt.Button;
+20 import java.awt.Dialog;
+21 import java.awt.event.ActionEvent;
+22 import java.awt.event.ActionEvent;
23
-24 import javax.swing.JComponent;
-25 import javax.swing.JTable;
+24 import javax.swing.JComponent;
+25 import javax.swing.JTable;
26
27 public class InputImportOrderRepetition {
28 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderSortStaticImportsAlphabetically1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderSortStaticImportsAlphabetically1.html
index 3b66b33813..445c797899 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderSortStaticImportsAlphabetically1.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderSortStaticImportsAlphabetically1.html
@@ -24,10 +24,10 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import static org.junit.Assert.fail;
-20 import static javax.xml.transform.TransformerFactory.newInstance;
-21 import static java.lang.Math.cos;
-22 import static java.lang.Math.abs;
+19 import static org.junit.Assert.fail;
+20 import static javax.xml.transform.TransformerFactory.newInstance;
+21 import static java.lang.Math.cos;
+22 import static java.lang.Math.abs;
23
24 public class InputImportOrderSortStaticImportsAlphabetically1 {
25 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderSortStaticImportsAlphabetically2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderSortStaticImportsAlphabetically2.html
index 3ad918ae12..295a581da5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderSortStaticImportsAlphabetically2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderSortStaticImportsAlphabetically2.html
@@ -24,7 +24,7 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import static org.junit.Assert.fail;
+19 import static org.junit.Assert.fail;
20 import static javax.xml.transform.TransformerFactory.newInstance;
21 import static java.lang.Math.cos;
22 import static java.lang.Math.abs;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrder1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrder1.html
index f084becb8e..1ee68987c4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrder1.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrder1.html
@@ -24,8 +24,8 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import static java.lang.Math.abs;
-20 import static org.antlr.v4.runtime.Recognizer.EOF;
+19 import static java.lang.Math.abs;
+20 import static org.antlr.v4.runtime.Recognizer.EOF;
21
22 import org.antlr.v4.runtime.*;
23
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrder2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrder2.html
index 1818234f1a..c9f940826e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrder2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrder2.html
@@ -24,8 +24,8 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import static java.lang.Math.abs;
-20 import static org.antlr.v4.runtime.Recognizer.EOF;
+19 import static java.lang.Math.abs;
+20 import static org.antlr.v4.runtime.Recognizer.EOF;
21
22 import org.antlr.v4.runtime.*;
23
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom1.html
index 22f1d643d3..951c2ae034 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom1.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom1.html
@@ -24,12 +24,12 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import org.antlr.v4.runtime.*;
+19 import org.antlr.v4.runtime.*;
20
21 import java.util.Set;
22
23 import static java.lang.Math.PI;
-24 import static org.antlr.v4.runtime.Recognizer.EOF;
+24 import static org.antlr.v4.runtime.Recognizer.EOF;
25
26 public class InputImportOrderStaticGroupOrderBottom1
27 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom2.html
index 2d24400e4d..3d28e52466 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom2.html
@@ -24,12 +24,12 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import org.antlr.v4.runtime.*;
+19 import org.antlr.v4.runtime.*;
20
21 import java.util.Set;
22
23 import static java.lang.Math.PI;
-24 import static org.antlr.v4.runtime.Recognizer.EOF;
+24 import static org.antlr.v4.runtime.Recognizer.EOF;
25
26 public class InputImportOrderStaticGroupOrderBottom2
27 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom3.html
index 1cc98842a4..4808e337e1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom3.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom3.html
@@ -24,7 +24,7 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import org.antlr.v4.runtime.*;
+19 import org.antlr.v4.runtime.*;
20
21 import java.util.Set;
22
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom_Negative1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom_Negative1.html
index 0cff8dbd98..a1bba098c0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom_Negative1.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom_Negative1.html
@@ -24,10 +24,10 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import org.antlr.v4.runtime.*;
+19 import org.antlr.v4.runtime.*;
20
-21 import static java.lang.Math.PI;
-22 import static org.antlr.v4.runtime.Recognizer.EOF;
+21 import static java.lang.Math.PI;
+22 import static org.antlr.v4.runtime.Recognizer.EOF;
23
24 import java.util.Set;
25
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom_Negative2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom_Negative2.html
index 0ab743d93d..5b84712548 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom_Negative2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom_Negative2.html
@@ -24,12 +24,12 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import org.antlr.v4.runtime.*;
+19 import org.antlr.v4.runtime.*;
20
21 import static java.lang.Math.PI;
-22 import static org.antlr.v4.runtime.Recognizer.EOF;
+22 import static org.antlr.v4.runtime.Recognizer.EOF;
23
-24 import java.util.Set;
+24 import java.util.Set;
25
26 public class InputImportOrderStaticGroupOrderBottom_Negative2
27 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom_Negative3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom_Negative3.html
index 759b6f71ea..a6ca83a8b6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom_Negative3.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupOrderBottom_Negative3.html
@@ -24,14 +24,14 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import org.antlr.v4.runtime.*;
+19 import org.antlr.v4.runtime.*;
20
-21 import static java.lang.Math.PI;
-22 import static org.antlr.v4.runtime.Recognizer.EOF;
+21 import static java.lang.Math.PI;
+22 import static org.antlr.v4.runtime.Recognizer.EOF;
23
24 import java.util.Set;
25
-26 import static java.util.Set.*;
+26 import static java.util.Set.*;
27
28 public class InputImportOrderStaticGroupOrderBottom_Negative3
29 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupSeparated.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupSeparated.html
index e3ea8557a7..f422292989 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupSeparated.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticGroupSeparated.html
@@ -24,12 +24,12 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import static java.lang.Math.abs;
+19 import static java.lang.Math.abs;
20
21 import static java.lang.Math.cos;
22
23 import static org.junit.Assert.assertEquals;
-24 import static org.junit.Assert.fail;
+24 import static org.junit.Assert.fail;
25
26 public class InputImportOrderStaticGroupSeparated {
27 void method() {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrder1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrder1.html
index e228e6a692..622f144bb1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrder1.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrder1.html
@@ -24,8 +24,8 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import static java.lang.Math.*;
-20 import static org.antlr.v4.runtime.CommonToken.*;
+19 import static java.lang.Math.*;
+20 import static org.antlr.v4.runtime.CommonToken.*;
21
22 import org.antlr.v4.runtime.*;
23
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrder2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrder2.html
index 61d3e27e2e..b0a90de1a4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrder2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrder2.html
@@ -24,8 +24,8 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import static java.lang.Math.*;
-20 import static org.antlr.v4.runtime.CommonToken.*;
+19 import static java.lang.Math.*;
+20 import static org.antlr.v4.runtime.CommonToken.*;
21
22 import org.antlr.v4.runtime.*;
23
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrderBottom1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrderBottom1.html
index ac33f7bf05..ae9b95716d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrderBottom1.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrderBottom1.html
@@ -24,12 +24,12 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import org.antlr.v4.runtime.*;
+19 import org.antlr.v4.runtime.*;
20
21 import java.util.Set;
22
23 import static java.lang.Math.*;
-24 import static org.antlr.v4.runtime.CommonToken.*;
+24 import static org.antlr.v4.runtime.CommonToken.*;
25
26 public class InputImportOrderStaticOnDemandGroupOrderBottom1
27 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrderBottom2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrderBottom2.html
index 7f6a5a2cc2..c48c87e57e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrderBottom2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrderBottom2.html
@@ -24,12 +24,12 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import org.antlr.v4.runtime.*;
+19 import org.antlr.v4.runtime.*;
20
21 import java.util.Set;
22
23 import static java.lang.Math.*;
-24 import static org.antlr.v4.runtime.CommonToken.*;
+24 import static org.antlr.v4.runtime.CommonToken.*;
25
26 public class InputImportOrderStaticOnDemandGroupOrderBottom2
27 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrderBottom3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrderBottom3.html
index 72240c4b3e..7919ab4bc7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrderBottom3.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticOnDemandGroupOrderBottom3.html
@@ -24,7 +24,7 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import org.antlr.v4.runtime.*;
+19 import org.antlr.v4.runtime.*;
20
21 import java.util.Set;
22
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticRepetition1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticRepetition1.html
index 78b40fe3cd..085497a1d0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticRepetition1.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticRepetition1.html
@@ -24,13 +24,13 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import static java.lang.Math.*;
-20 import static org.antlr.v4.runtime.CommonToken.*;
-21 import static org.antlr.v4.runtime.CommonToken.*;
+19 import static java.lang.Math.*;
+20 import static org.antlr.v4.runtime.CommonToken.*;
+21 import static org.antlr.v4.runtime.CommonToken.*;
22
-23 import java.util.Set;
+23 import java.util.Set;
24
-25 import org.junit.Test;
+25 import org.junit.Test;
26
27 public class InputImportOrderStaticRepetition1 {
28 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticRepetition2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticRepetition2.html
index feff2d2ed4..b022eec8d8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticRepetition2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrderStaticRepetition2.html
@@ -24,13 +24,13 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import static java.lang.Math.*;
+19 import static java.lang.Math.*;
20 import static org.antlr.v4.runtime.CommonToken.*;
-21 import static org.antlr.v4.runtime.CommonToken.*;
+21 import static org.antlr.v4.runtime.CommonToken.*;
22
23 import java.util.Set;
24
-25 import org.junit.Test;
+25 import org.junit.Test;
26
27 public class InputImportOrderStaticRepetition2 {
28 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Above.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Above.html
index 6120973c3f..605661bcf4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Above.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Above.html
@@ -24,21 +24,21 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import static java.awt.Button.ABORT;
-20 import static javax.swing.WindowConstants.*;
+19 import static java.awt.Button.ABORT;
+20 import static javax.swing.WindowConstants.*;
21 import static java.awt.Button.ABORT;
-22 import java.awt.Button;
-23 import java.awt.Frame;
+22 import java.awt.Button;
+23 import java.awt.Frame;
24 import java.awt.Dialog;
-25 import java.awt.event.ActionEvent;
-26 import javax.swing.JComponent;
-27 import javax.swing.JTable;
+25 import java.awt.event.ActionEvent;
+26 import javax.swing.JComponent;
+27 import javax.swing.JTable;
28
29 import java.io.File;
30 import static java.io.File.createTempFile;
-31 import java.io.IOException;
-32 import java.io.InputStream;
-33 import java.io.Reader;
+31 import java.io.IOException;
+32 import java.io.InputStream;
+33 import java.io.Reader;
34
35 public class InputImportOrder_Above {
36 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Bottom.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Bottom.html
index 8b55c28e3e..bc3e2438f4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Bottom.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Bottom.html
@@ -24,23 +24,23 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import java.awt.Button;
-20 import java.awt.Dialog;
-21 import java.awt.Frame;
-22 import java.awt.event.ActionEvent;
+19 import java.awt.Button;
+20 import java.awt.Dialog;
+21 import java.awt.Frame;
+22 import java.awt.event.ActionEvent;
23
24 import java.io.IOException;
-25 import java.io.InputStream;
+25 import java.io.InputStream;
26
27 import javax.swing.JComponent;
-28 import javax.swing.JTable;
+28 import javax.swing.JTable;
29
30 import static java.io.File.*;
31 import java.io.File;
32
33 import static java.io.File.createTempFile;
-34 import static java.awt.Button.ABORT;
-35 import static javax.swing.WindowConstants.*;
+34 import static java.awt.Button.ABORT;
+35 import static javax.swing.WindowConstants.*;
36
37 import java.io.Reader;
38
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_DotPackageName.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_DotPackageName.html
index bb00c5a4cf..70e8635d75 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_DotPackageName.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_DotPackageName.html
@@ -24,12 +24,12 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import java.awt.Button;
-20 import java.awt.Frame;
+19 import java.awt.Button;
+20 import java.awt.Frame;
21 import java.awt.Dialog;
-22 import java.awt.event.ActionEvent;
+22 import java.awt.event.ActionEvent;
23 import javax.swing.JComponent;
-24 import javax.swing.JTable;
+24 import javax.swing.JTable;
25
26 public class InputImportOrder_DotPackageName {
27 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_HonorsTokensProperty.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_HonorsTokensProperty.html
index f9d641340a..4a0cc1d739 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_HonorsTokensProperty.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_HonorsTokensProperty.html
@@ -24,7 +24,7 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import static javax.swing.WindowConstants.DISPOSE_ON_CLOSE;
+19 import static javax.swing.WindowConstants.DISPOSE_ON_CLOSE;
20 import static java.awt.Button.ABORT;
21 import java.awt.Dialog;
22 import java.awt.Button;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_InFlow.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_InFlow.html
index acef127509..e6d5a3c92d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_InFlow.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_InFlow.html
@@ -24,23 +24,23 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 import java.awt.Button;
-20 import static java.awt.Button.ABORT;
-21 import java.awt.Frame;
+19 import java.awt.Button;
+20 import static java.awt.Button.ABORT;
+21 import java.awt.Frame;
22 import java.awt.Dialog;
-23 import java.awt.event.ActionEvent;
+23 import java.awt.event.ActionEvent;
24
25 import javax.swing.JComponent;
-26 import static javax.swing.WindowConstants.HIDE_ON_CLOSE;
+26 import static javax.swing.WindowConstants.HIDE_ON_CLOSE;
27 import static javax.swing.WindowConstants.DO_NOTHING_ON_CLOSE;
28 import static javax.swing.WindowConstants.*;
29 import javax.swing.JTable;
30
31 import static java.io.File.createTempFile;
32 import java.io.File;
-33 import java.io.IOException;
-34 import java.io.InputStream;
-35 import java.io.Reader;
+33 import java.io.IOException;
+34 import java.io.InputStream;
+35 import java.io.Reader;
36
37 public class InputImportOrder_InFlow {
38 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_NoFailureForRedundantImports.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_NoFailureForRedundantImports.html
index ff672f8490..50bb59b5c6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_NoFailureForRedundantImports.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_NoFailureForRedundantImports.html
@@ -24,7 +24,7 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-19 public class InputImportOrder_NoFailureForRedundantImports {
+19 public class InputImportOrder_NoFailureForRedundantImports {
20 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Top1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Top1.html
index 43421a3d70..db1e9a866c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Top1.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Top1.html
@@ -24,24 +24,24 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-
19 import static java.io.File.createTempFile;
-
20 import static java.awt.Button.ABORT;
-
21 import static javax.swing.WindowConstants.*;
+
19 import static java.io.File.createTempFile;
+
20 import static java.awt.Button.ABORT;
+
21 import static javax.swing.WindowConstants.*;
22
-
23 import java.awt.Button;
-
24 import java.awt.Dialog;
-
25 import java.awt.Frame;
-
26 import java.awt.event.ActionEvent;
+
23 import java.awt.Button;
+
24 import java.awt.Dialog;
+
25 import java.awt.Frame;
+
26 import java.awt.event.ActionEvent;
27
-
28 import java.io.IOException;
-
29 import java.io.InputStream;
+
28 import java.io.IOException;
+
29 import java.io.InputStream;
30
-
31 import javax.swing.JComponent;
-
32 import javax.swing.JTable;
+
31 import javax.swing.JComponent;
+
32 import javax.swing.JTable;
33
-
34 import static java.io.File.*;
-
35 import java.io.File;
-
36 import java.io.Reader;
+
34 import static java.io.File.*;
+
35 import java.io.File;
+
36 import java.io.Reader;
37
38 public class InputImportOrder_Top1 {
39 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Top2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Top2.html
index d5ffc7982f..3d0ceec3c2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Top2.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Top2.html
@@ -24,24 +24,24 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-
19 import static java.io.File.createTempFile;
-
20 import static java.awt.Button.ABORT;
-
21 import static javax.swing.WindowConstants.*;
+
19 import static java.io.File.createTempFile;
+
20 import static java.awt.Button.ABORT;
+
21 import static javax.swing.WindowConstants.*;
22
23 import java.awt.Button;
-
24 import java.awt.Dialog;
-
25 import java.awt.Frame;
-
26 import java.awt.event.ActionEvent;
+
24 import java.awt.Dialog;
+
25 import java.awt.Frame;
+
26 import java.awt.event.ActionEvent;
27
28 import java.io.IOException;
-
29 import java.io.InputStream;
+
29 import java.io.InputStream;
30
31 import javax.swing.JComponent;
-
32 import javax.swing.JTable;
+
32 import javax.swing.JTable;
33
34 import static java.io.File.*;
-
35 import java.io.File;
-
36 import java.io.Reader;
+
35 import java.io.File;
+
36 import java.io.Reader;
37
38 public class InputImportOrder_Top2 {
39 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Under.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Under.html
index af671dd91f..bc2c2894ac 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Under.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Under.html
@@ -24,21 +24,21 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-
19 import java.awt.Button;
-
20 import java.awt.Frame;
+
19 import java.awt.Button;
+
20 import java.awt.Frame;
21 import java.awt.Dialog;
-
22 import java.awt.event.ActionEvent;
-
23 import javax.swing.JComponent;
-
24 import javax.swing.JTable;
-
25 import static java.awt.Button.ABORT;
-
26 import static javax.swing.WindowConstants.*;
+
22 import java.awt.event.ActionEvent;
+
23 import javax.swing.JComponent;
+
24 import javax.swing.JTable;
+
25 import static java.awt.Button.ABORT;
+
26 import static javax.swing.WindowConstants.*;
27 import static java.awt.Button.ABORT;
28
29 import static java.io.File.createTempFile;
30 import java.io.File;
-
31 import java.io.IOException;
-
32 import java.io.InputStream;
-
33 import java.io.Reader;
+
31 import java.io.IOException;
+
32 import java.io.InputStream;
+
33 import java.io.Reader;
34
35 public class InputImportOrder_Under {
36 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Wildcard.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Wildcard.html
index deb4ede1fc..ec7ddf322a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Wildcard.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_Wildcard.html
@@ -27,9 +27,9 @@
19
20
21
-
22 import com.puppycrawl.tools.checkstyle.checks.imports.importorder.InputImportOrder_Above;
-
23 import javax.crypto.BadPaddingException;
-
24 import java.util.List;
+
22 import com.puppycrawl.tools.checkstyle.checks.imports.importorder.InputImportOrder_Above;
+
23 import javax.crypto.BadPaddingException;
+
24 import java.util.List;
25 import javax.crypto.Cipher;
26
27 public class InputImportOrder_Wildcard {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_WildcardUnspecified.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_WildcardUnspecified.html
index d8a3d378a4..c93a5efba2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_WildcardUnspecified.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/InputImportOrder_WildcardUnspecified.html
@@ -24,9 +24,9 @@
16
17 package com.puppycrawl.tools.checkstyle.checks.imports.importorder;
18
-
19 import java.io.File;
-
20 import java.io.IOException;
-
21 import java.util.Iterator;
+
19 import java.io.File;
+
20 import java.io.IOException;
+
21 import java.util.Iterator;
22
23 import com.puppycrawl.tools.checkstyle.checks.imports.importorder.InputImportOrderBug;
24
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/package-frame.html
index aa4febc90a..2caafcd14d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.importorder
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.importorder
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/package-summary.html
index 927468b25a..fd0b772595 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/importorder/package-summary.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.importorder
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.importorder
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -251,7 +251,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/package-frame.html
index 4e5b20e0b7..8c8ce390a4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/package-summary.html
index b0c54af126..5ed6cc2567 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -181,7 +181,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/InputRedundantImportBug.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/InputRedundantImportBug.html
index 35d1df14fd..e99e102ed6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/InputRedundantImportBug.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/InputRedundantImportBug.html
@@ -16,7 +16,7 @@
8
9 import java.net.URL;
10
-11 public class InputRedundantImportBug {
+11 public class InputRedundantImportBug {
12
13 private static String URL = "This is a String object" ;
14
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/InputRedundantImportWithoutWarnings.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/InputRedundantImportWithoutWarnings.html
index 3b1bee6367..bc40f6b10f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/InputRedundantImportWithoutWarnings.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/InputRedundantImportWithoutWarnings.html
@@ -18,7 +18,7 @@
10
11 import java.util.List;
12
-13 public class InputRedundantImportWithoutWarnings {
+13 public class InputRedundantImportWithoutWarnings {
14 private static final List<String> CONSTANTS = asList("a" , "b" );
15 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/package-frame.html
index 1c4535c29c..17f316ef01 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.redundantimport
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.redundantimport
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/package-summary.html
index aa72dae396..c42a80b534 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/redundantimport/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.redundantimport
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.redundantimport
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImports15Extensions.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImports15Extensions.html
index a346733058..6f43f6759c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImports15Extensions.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImports15Extensions.html
@@ -15,7 +15,7 @@
7
8 package com.puppycrawl.tools.checkstyle.checks.imports.unusedimports;
9
-10 @interface MyAnnotation1 {
+10 @interface MyAnnotation1 {
11 String name();
12 int version();
13 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsArrayRef.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsArrayRef.html
index 7e5e4189b9..f89d728df4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsArrayRef.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsArrayRef.html
@@ -15,7 +15,7 @@
7
8 package com.puppycrawl.tools.checkstyle.checks.imports.unusedimports;
9
-10 import java.util.HashMap;
+10 import java.util.HashMap;
11 import java.util.HashSet;
12 import java.util.Set;
13 import java.util.ArrayList;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsBug.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsBug.html
index 273b709720..ed057873f5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsBug.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsBug.html
@@ -17,7 +17,7 @@
9
10 import java.net.URL;
11
-12 public class InputUnusedImportsBug {
+12 public class InputUnusedImportsBug {
13
14 private static String URL = "This is a String object" ;
15
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsFromJavaLang.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsFromJavaLang.html
index cbee4d135c..08c010778b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsFromJavaLang.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsFromJavaLang.html
@@ -27,11 +27,11 @@
19 import java.lang.Float;
20 import java.lang.Short;
21
-22 import java.lang.annotation.Annotation;
-23 import java.lang.reflect.Modifier;
-24 import java.lang.reflect.Field;
+22 import java.lang.annotation.Annotation;
+23 import java.lang.reflect.Modifier;
+24 import java.lang.reflect.Field;
25
-26 import java.lang.*;
+26 import java.lang.*;
27
28 public class InputUnusedImportsFromJavaLang {
29 private static final String SOMETHING = "a string" ;
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsJavadocQualifiedName.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsJavadocQualifiedName.html
index 0b52effc99..87d104de43 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsJavadocQualifiedName.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsJavadocQualifiedName.html
@@ -15,7 +15,7 @@
7
8 package com.puppycrawl.tools.checkstyle.checks.imports.unusedimports;
9
-10 import java.util.Map;
+10 import java.util.Map;
11 import java.util.List;
12
13
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsShadowed.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsShadowed.html
index 46fbdf832a..35eb56b34e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsShadowed.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsShadowed.html
@@ -15,18 +15,18 @@
7
8 package com.puppycrawl.tools.checkstyle.checks.imports.unusedimports;
9
-10 import java.util.AbstractMap;
-11 import java.util.List;
+10 import java.util.AbstractMap;
+11 import java.util.List;
12 import java.util.Map;
13 import java.util.Set;
-14 import java.util.concurrent.Callable;
+14 import java.util.concurrent.Callable;
15
16 import com.puppycrawl.tools.checkstyle.checks.imports.unusedimports.InputUnusedImportsShadowed;
-17 import com.puppycrawl.tools.checkstyle.checks.imports.unusedimports.InputUnusedImportsShadowed.Deprecated;
-18 import com.puppycrawl.tools.checkstyle.checks.imports.unusedimports.InputUnusedImportsShadowed.Foo;
-19 import com.puppycrawl.tools.checkstyle.checks.imports.unusedimports.InputUnusedImportsShadowed.Inner;
-20 import com.puppycrawl.tools.checkstyle.checks.imports.unusedimports.InputUnusedImportsShadowed.Nested;
-21 import com.puppycrawl.tools.checkstyle.checks.imports.unusedimports.InputUnusedImportsShadowed.Nested.List.Map.Entry;
+17 import com.puppycrawl.tools.checkstyle.checks.imports.unusedimports.InputUnusedImportsShadowed.Deprecated;
+18 import com.puppycrawl.tools.checkstyle.checks.imports.unusedimports.InputUnusedImportsShadowed.Foo;
+19 import com.puppycrawl.tools.checkstyle.checks.imports.unusedimports.InputUnusedImportsShadowed.Inner;
+20 import com.puppycrawl.tools.checkstyle.checks.imports.unusedimports.InputUnusedImportsShadowed.Nested;
+21 import com.puppycrawl.tools.checkstyle.checks.imports.unusedimports.InputUnusedImportsShadowed.Nested.List.Map.Entry;
22
23 @Deprecated(foo = Foo.class , classes = {Inner.class })
24 public class InputUnusedImportsShadowed
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithBlockMethodParameters.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithBlockMethodParameters.html
index 42a153fcde..b08058dbe7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithBlockMethodParameters.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithBlockMethodParameters.html
@@ -19,7 +19,7 @@
11 import java.util.concurrent.ExecutorService;
12 import java.util.concurrent.TimeUnit;
13
-14 public class InputUnusedImportsWithBlockMethodParameters {
+14 public class InputUnusedImportsWithBlockMethodParameters {
15
16
17
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithNewlinesInsideTags.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithNewlinesInsideTags.html
index 7f0e36738c..04dd616d83 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithNewlinesInsideTags.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithNewlinesInsideTags.html
@@ -18,7 +18,7 @@
10 import java.net.ResponseCache;
11 import java.util.List;
12
-13 public class InputUnusedImportsWithNewlinesInsideTags {
+13 public class InputUnusedImportsWithNewlinesInsideTags {
14
15
16
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithValueTag.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithValueTag.html
index 6d308f39b6..15db34949a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithValueTag.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithValueTag.html
@@ -17,7 +17,7 @@
9
10 import java.util.Calendar;
11
-12 public class InputUnusedImportsWithValueTag {
+12 public class InputUnusedImportsWithValueTag {
13
14
15
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithoutWarnings.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithoutWarnings.html
index bd1341cf6e..986b0dbb24 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithoutWarnings.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/InputUnusedImportsWithoutWarnings.html
@@ -18,7 +18,7 @@
10 import java.util.Arrays;
11 import java.util.List;
12
-13 public class InputUnusedImportsWithoutWarnings {
+13 public class InputUnusedImportsWithoutWarnings {
14 private static final List<String> CONSTANTS = Arrays.asList("a" , "b" );
15 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/package-frame.html
index 1f8b81d66d..9d712c9b7e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.unusedimports
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.unusedimports
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/package-summary.html
index 91add54af0..8f3e9d449d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/imports/unusedimports/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.unusedimports
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.imports.unusedimports
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -161,7 +161,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/commentsindentation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/commentsindentation/package-frame.html
index de9888b2aa..d848f14e19 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/commentsindentation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/commentsindentation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.indentation.commentsindentation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.indentation.commentsindentation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/commentsindentation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/commentsindentation/package-summary.html
index 17026fa05e..05641aaed5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/commentsindentation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/commentsindentation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.indentation.commentsindentation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.indentation.commentsindentation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -231,7 +231,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/indentation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/indentation/package-frame.html
index 41677ba254..932498968a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/indentation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/indentation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.indentation.indentation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.indentation.indentation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/indentation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/indentation/package-summary.html
index 1182d496ef..8a1edd1314 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/indentation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/indentation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.indentation.indentation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.indentation.indentation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -1401,7 +1401,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/package-frame.html
index 5b0748b86f..d52c465805 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.indentation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.indentation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/package-summary.html
index 08c2e8db04..616d9aa001 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/indentation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.indentation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.indentation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -101,7 +101,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/MissingJavadocMethodCheckTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/MissingJavadocMethodCheckTest.html
index ae6c9c1dd0..8fdd198d74 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/MissingJavadocMethodCheckTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/MissingJavadocMethodCheckTest.html
@@ -30,440 +30,513 @@
22 import static com.google.common.truth.Truth.assertWithMessage;
23 import static com.puppycrawl.tools.checkstyle.checks.javadoc.MissingJavadocMethodCheck.MSG_JAVADOC_MISSING;
24
-25 import org.junit.jupiter.api.Test;
+25 import java.io.File;
26
-27 import com.puppycrawl.tools.checkstyle.AbstractModuleTestSupport;
-28 import com.puppycrawl.tools.checkstyle.api.TokenTypes;
-29 import com.puppycrawl.tools.checkstyle.utils.CommonUtil;
-30
-31 public class MissingJavadocMethodCheckTest extends AbstractModuleTestSupport {
-32
-33 @Override
-34 protected String getPackageLocation() {
-35 return "com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod" ;
-36 }
-37
-38 @Test
-39 public void testGetAcceptableTokens() {
-40 final MissingJavadocMethodCheck missingJavadocMethodCheck = new MissingJavadocMethodCheck();
+27 import org.junit.jupiter.api.Test;
+28
+29 import com.puppycrawl.tools.checkstyle.AbstractModuleTestSupport;
+30 import com.puppycrawl.tools.checkstyle.api.DetailAST;
+31 import com.puppycrawl.tools.checkstyle.api.TokenTypes;
+32 import com.puppycrawl.tools.checkstyle.utils.CheckUtilTest;
+33 import com.puppycrawl.tools.checkstyle.utils.CommonUtil;
+34
+35 public class MissingJavadocMethodCheckTest extends AbstractModuleTestSupport {
+36
+37 @Override
+38 protected String getPackageLocation() {
+39 return "com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod" ;
+40 }
41
-42 final int [] actual = missingJavadocMethodCheck.getAcceptableTokens();
-43 final int [] expected = {
-44 TokenTypes.METHOD_DEF,
-45 TokenTypes.CTOR_DEF,
-46 TokenTypes.ANNOTATION_FIELD_DEF,
-47 TokenTypes.COMPACT_CTOR_DEF,
-48 };
-49
-50 assertWithMessage("Default acceptable tokens are invalid" )
-51 .that(actual)
-52 .isEqualTo(expected);
-53 }
-54
-55 @Test
-56 public void testGetRequiredTokens() {
-57 final MissingJavadocMethodCheck missingJavadocMethodCheck = new MissingJavadocMethodCheck();
-58 final int [] actual = missingJavadocMethodCheck.getRequiredTokens();
-59 final int [] expected = CommonUtil.EMPTY_INT_ARRAY;
-60 assertWithMessage("Required tokens are invalid" )
-61 .that(actual)
-62 .isEqualTo(expected);
-63 }
-64
-65 @Test
-66 public void extendAnnotationTest() throws Exception {
-67 final String[] expected = {
-68 "44:1: " + getCheckMessage(MSG_JAVADOC_MISSING),
-69 };
-70 verifyWithInlineConfigParser(
-71 getPath("InputMissingJavadocMethodExtendAnnotation.java" ), expected);
-72 }
-73
-74 @Test
-75 public void newTest() throws Exception {
-76 final String[] expected = {
-77 "70:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-78 };
-79 verifyWithInlineConfigParser(
-80 getPath("InputMissingJavadocMethodSmallMethods.java" ), expected);
-81 }
-82
-83 @Test
-84 public void allowedAnnotationsTest() throws Exception {
-85 final String[] expected = {
-86 "32:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-87 };
-88 verifyWithInlineConfigParser(
-89 getPath("InputMissingJavadocMethodAllowedAnnotations.java" ), expected);
-90 }
-91
-92 @Test
-93 public void testTags() throws Exception {
-94 final String[] expected = {
-95 "23:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-96 "337:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-97 "346:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-98 };
-99
-100 verifyWithInlineConfigParser(
-101 getPath("InputMissingJavadocMethodTags.java" ), expected);
-102 }
+42 @Test
+43 public void testGetAcceptableTokens() {
+44 final MissingJavadocMethodCheck missingJavadocMethodCheck = new MissingJavadocMethodCheck();
+45
+46 final int [] actual = missingJavadocMethodCheck.getAcceptableTokens();
+47 final int [] expected = {
+48 TokenTypes.METHOD_DEF,
+49 TokenTypes.CTOR_DEF,
+50 TokenTypes.ANNOTATION_FIELD_DEF,
+51 TokenTypes.COMPACT_CTOR_DEF,
+52 };
+53
+54 assertWithMessage("Default acceptable tokens are invalid" )
+55 .that(actual)
+56 .isEqualTo(expected);
+57 }
+58
+59 @Test
+60 public void testGetRequiredTokens() {
+61 final MissingJavadocMethodCheck missingJavadocMethodCheck = new MissingJavadocMethodCheck();
+62 final int [] actual = missingJavadocMethodCheck.getRequiredTokens();
+63 final int [] expected = CommonUtil.EMPTY_INT_ARRAY;
+64 assertWithMessage("Required tokens are invalid" )
+65 .that(actual)
+66 .isEqualTo(expected);
+67 }
+68
+69 @Test
+70 public void extendAnnotationTest() throws Exception {
+71 final String[] expected = {
+72 "44:1: " + getCheckMessage(MSG_JAVADOC_MISSING),
+73 };
+74 verifyWithInlineConfigParser(
+75 getPath("InputMissingJavadocMethodExtendAnnotation.java" ), expected);
+76 }
+77
+78 @Test
+79 public void newTest() throws Exception {
+80 final String[] expected = {
+81 "70:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+82 };
+83 verifyWithInlineConfigParser(
+84 getPath("InputMissingJavadocMethodSmallMethods.java" ), expected);
+85 }
+86
+87 @Test
+88 public void allowedAnnotationsTest() throws Exception {
+89 final String[] expected = {
+90 "32:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+91 };
+92 verifyWithInlineConfigParser(
+93 getPath("InputMissingJavadocMethodAllowedAnnotations.java" ), expected);
+94 }
+95
+96 @Test
+97 public void testTags() throws Exception {
+98 final String[] expected = {
+99 "23:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+100 "337:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+101 "346:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+102 };
103
-104 @Test
-105 public void testStrictJavadoc() throws Exception {
-106 final String[] expected = {
-107 "24:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-108 "30:13: " + getCheckMessage(MSG_JAVADOC_MISSING),
-109 "37:13: " + getCheckMessage(MSG_JAVADOC_MISSING),
-110 "50:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-111 "60:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-112 "64:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-113 "68:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-114 "72:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-115 "76:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-116 "80:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-117 "84:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-118 "88:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-119 };
-120 verifyWithInlineConfigParser(
-121 getPath("InputMissingJavadocMethodPublicOnly.java" ), expected);
-122 }
-123
-124 @Test
-125 public void testNoJavadoc() throws Exception {
-126 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-127 verifyWithInlineConfigParser(
-128 getPath("InputMissingJavadocMethodPublicOnly2.java" ), expected);
-129 }
-130
-131
-132 @Test
-133 public void testRelaxedJavadoc() throws Exception {
-134 final String[] expected = {
-135 "65:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-136 "69:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-137 "81:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-138 "85:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-139 };
-140 verifyWithInlineConfigParser(
-141 getPath("InputMissingJavadocMethodPublicOnly3.java" ), expected);
-142 }
-143
-144 @Test
-145 public void testScopeInnerInterfacesPublic() throws Exception {
-146 final String[] expected = {
-147 "52:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-148 "53:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-149 };
-150 verifyWithInlineConfigParser(
-151 getPath("InputMissingJavadocMethodScopeInnerInterfaces.java" ),
-152 expected);
-153 }
-154
-155 @Test
-156 public void testInterfaceMemberScopeIsPublic() throws Exception {
-157 final String[] expected = {
-158 "22:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-159 "30:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-160 };
-161 verifyWithInlineConfigParser(
-162 getPath("InputMissingJavadocMethodInterfaceMemberScopeIsPublic.java" ),
-163 expected);
-164 }
-165
-166 @Test
-167 public void testEnumCtorScopeIsPrivate() throws Exception {
-168 final String[] expected = {
-169 "26:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-170 };
-171 verifyWithInlineConfigParser(
-172 getPath("InputMissingJavadocMethodEnumCtorScopeIsPrivate.java" ),
-173 expected);
-174 }
-175
-176 @Test
-177 public void testScopeAnonInnerPrivate() throws Exception {
-178 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-179 verifyWithInlineConfigParser(
-180 getPath("InputMissingJavadocMethodScopeAnonInner.java" ), expected);
-181 }
-182
-183 @Test
-184 public void testScopeAnonInnerAnonInner() throws Exception {
-185 final String[] expected = {
-186 "34:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-187 "47:13: " + getCheckMessage(MSG_JAVADOC_MISSING),
-188 "61:13: " + getCheckMessage(MSG_JAVADOC_MISSING), };
-189 verifyWithInlineConfigParser(
-190 getPath("InputMissingJavadocMethodScopeAnonInner2.java" ), expected);
-191 }
-192
-193 @Test
-194 public void testScopes() throws Exception {
-195 final String[] expected = {
-196 "26:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-197 "27:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-198 "28:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-199 "29:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-200 "37:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-201 "38:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-202 "39:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-203 "40:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-204 "49:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-205 "50:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-206 "51:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-207 "52:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-208 "61:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-209 "62:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-210 "63:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-211 "64:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-212 "74:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-213 "75:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-214 "76:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-215 "77:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-216 "85:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-217 "86:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-218 "87:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-219 "88:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-220 "97:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-221 "98:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-222 "99:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-223 "100:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-224 "109:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-225 "110:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-226 "111:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-227 "112:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-228 "121:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-229 "122:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-230 "123:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-231 "124:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-232 "135:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-233 };
-234 verifyWithInlineConfigParser(
-235 getPath("InputMissingJavadocMethodNoJavadoc.java" ), expected);
-236 }
-237
-238 @Test
-239 public void testScopes2() throws Exception {
-240 final String[] expected = {
-241 "26:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-242 "27:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-243 "37:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-244 "38:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-245 };
-246 verifyWithInlineConfigParser(
-247 getPath("InputMissingJavadocMethodNoJavadoc2.java" ), expected);
-248 }
-249
-250 @Test
-251 public void testExcludeScope() throws Exception {
-252 final String[] expected = {
-253 "27:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-254 "29:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-255 "30:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-256 "50:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-257 "52:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-258 "53:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-259 "62:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-260 "64:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-261 "65:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-262 "75:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-263 "77:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-264 "78:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-265 "86:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-266 "88:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-267 "89:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-268 "98:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-269 "100:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-270 "101:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-271 "110:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-272 "112:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-273 "113:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-274 "122:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-275 "124:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-276 "125:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-277 "136:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-278 };
-279 verifyWithInlineConfigParser(
-280 getPath("InputMissingJavadocMethodNoJavadoc3.java" ), expected);
-281 }
-282
-283 @Test
-284 public void testDoAllowMissingJavadocTagsByDefault() throws Exception {
-285 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-286 verifyWithInlineConfigParser(
-287 getPath("InputMissingJavadocMethodMissingJavadocTags.java" ), expected);
-288 }
-289
-290 @Test
-291 public void testSetterGetterOff() throws Exception {
-292 final String[] expected = {
-293 "20:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-294 "25:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-295 "30:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-296 "35:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-297 "41:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-298 "45:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-299 "50:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-300 "56:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-301 "61:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-302 "66:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-303 "68:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-304 "72:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-305 "76:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-306 "80:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-307 "82:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-308 "87:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-309 "89:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-310 };
-311 verifyWithInlineConfigParser(
-312 getPath("InputMissingJavadocMethodSetterGetter.java" ), expected);
-313 }
-314
-315 @Test
-316 public void testSetterGetterOn() throws Exception {
-317 final String[] expected = {
-318 "30:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-319 "35:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-320 "41:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-321 "45:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-322 "50:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-323 "56:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-324 "66:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-325 "68:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-326 "72:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-327 "76:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-328 "80:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-329 "82:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-330 "87:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-331 "89:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-332 };
-333 verifyWithInlineConfigParser(
-334 getPath("InputMissingJavadocMethodSetterGetter2.java" ), expected);
-335 }
-336
-337 @Test
-338 public void test11684081() throws Exception {
-339 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-340 verifyWithInlineConfigParser(
-341 getPath("InputMissingJavadocMethod_01.java" ), expected);
-342 }
-343
-344 @Test
-345 public void test11684082() throws Exception {
-346 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-347 verifyWithInlineConfigParser(
-348 getPath("InputMissingJavadocMethod_02.java" ), expected);
-349 }
-350
-351 @Test
-352 public void testSkipCertainMethods() throws Exception {
-353 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-354 verifyWithInlineConfigParser(
-355 getPath("InputMissingJavadocMethodIgnoreNameRegex.java" ), expected);
-356 }
-357
-358 @Test
-359 public void testNotSkipAnythingWhenSkipRegexDoesNotMatch() throws Exception {
-360 final String[] expected = {
-361 "22:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-362 "26:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-363 "30:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-364 };
-365 verifyWithInlineConfigParser(
-366 getPath("InputMissingJavadocMethodIgnoreNameRegex2.java" ), expected);
-367 }
-368
-369 @Test
-370 public void testAllowToSkipOverridden() throws Exception {
-371 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-372 verifyWithInlineConfigParser(
-373 getPath("InputMissingJavadocMethodsNotSkipWritten.java" ), expected);
-374 }
-375
-376 @Test
-377 public void testJava8ReceiverParameter() throws Exception {
-378 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-379 verifyWithInlineConfigParser(
-380 getPath("InputMissingJavadocMethodReceiverParameter.java" ), expected);
-381 }
-382
-383 @Test
-384 public void testJavadocInMethod() throws Exception {
-385 final String[] expected = {
-386 "20:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-387 "22:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-388 "25:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-389 "29:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-390 };
-391 verifyWithInlineConfigParser(
-392 getPath("InputMissingJavadocMethodJavadocInMethod.java" ), expected);
-393 }
-394
-395 @Test
-396 public void testConstructor() throws Exception {
-397 final String[] expected = {
-398 "21:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-399 };
-400 verifyWithInlineConfigParser(
-401 getPath("InputMissingJavadocMethodConstructor.java" ), expected);
-402 }
-403
-404 @Test
-405 public void testNotPublicInterfaceMethods() throws Exception {
-406 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-407 verifyWithInlineConfigParser(
-408 getPath("InputMissingJavadocMethodInterfacePrivateMethod.java" ), expected);
-409 }
-410
-411 @Test
-412 public void testPublicMethods() throws Exception {
-413 final String[] expected = {
-414 "22:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-415 "24:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-416 "28:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-417 "31:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-418 "35:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-419 };
-420 verifyWithInlineConfigParser(
-421 getPath("InputMissingJavadocMethodPublicMethods.java" ), expected);
-422
-423 }
-424
-425 @Test
-426 public void testMissingJavadocMethodRecordsAndCompactCtors() throws Exception {
-427 final String[] expected = {
-428 "22:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-429 "27:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-430 "31:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-431 "38:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-432 "44:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
-433 "48:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-434 };
-435 verifyWithInlineConfigParser(
-436 getNonCompilablePath("InputMissingJavadocMethodRecordsAndCtors.java" ), expected);
-437 }
-438
-439 @Test
-440 public void testMissingJavadocMethodRecordsAndCompactCtorsMinLineCount() throws Exception {
-441
-442 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-443
-444 verifyWithInlineConfigParser(
-445 getNonCompilablePath("InputMissingJavadocMethodRecordsAndCtorsMinLineCount.java" ),
-446 expected);
-447 }
-448
-449 @Test
-450 public void testMinLineCount() throws Exception {
-451 final String[] expected = {
-452 "14:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
-453 };
-454 verifyWithInlineConfigParser(
-455 getNonCompilablePath("InputMissingJavadocMethod1.java" ),
-456 expected);
-457 }
-458 }
+104 verifyWithInlineConfigParser(
+105 getPath("InputMissingJavadocMethodTags.java" ), expected);
+106 }
+107
+108 @Test
+109 public void testStrictJavadoc() throws Exception {
+110 final String[] expected = {
+111 "24:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+112 "30:13: " + getCheckMessage(MSG_JAVADOC_MISSING),
+113 "37:13: " + getCheckMessage(MSG_JAVADOC_MISSING),
+114 "50:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+115 "60:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+116 "64:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+117 "68:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+118 "72:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+119 "76:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+120 "80:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+121 "84:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+122 "88:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+123 };
+124 verifyWithInlineConfigParser(
+125 getPath("InputMissingJavadocMethodPublicOnly.java" ), expected);
+126 }
+127
+128 @Test
+129 public void testNoJavadoc() throws Exception {
+130 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+131 verifyWithInlineConfigParser(
+132 getPath("InputMissingJavadocMethodPublicOnly2.java" ), expected);
+133 }
+134
+135
+136 @Test
+137 public void testRelaxedJavadoc() throws Exception {
+138 final String[] expected = {
+139 "65:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+140 "69:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+141 "81:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+142 "85:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+143 };
+144 verifyWithInlineConfigParser(
+145 getPath("InputMissingJavadocMethodPublicOnly3.java" ), expected);
+146 }
+147
+148 @Test
+149 public void testScopeInnerInterfacesPublic() throws Exception {
+150 final String[] expected = {
+151 "52:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+152 "53:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+153 };
+154 verifyWithInlineConfigParser(
+155 getPath("InputMissingJavadocMethodScopeInnerInterfaces.java" ),
+156 expected);
+157 }
+158
+159 @Test
+160 public void testInterfaceMemberScopeIsPublic() throws Exception {
+161 final String[] expected = {
+162 "22:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+163 "30:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+164 };
+165 verifyWithInlineConfigParser(
+166 getPath("InputMissingJavadocMethodInterfaceMemberScopeIsPublic.java" ),
+167 expected);
+168 }
+169
+170 @Test
+171 public void testEnumCtorScopeIsPrivate() throws Exception {
+172 final String[] expected = {
+173 "26:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+174 };
+175 verifyWithInlineConfigParser(
+176 getPath("InputMissingJavadocMethodEnumCtorScopeIsPrivate.java" ),
+177 expected);
+178 }
+179
+180 @Test
+181 public void testScopeAnonInnerPrivate() throws Exception {
+182 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+183 verifyWithInlineConfigParser(
+184 getPath("InputMissingJavadocMethodScopeAnonInner.java" ), expected);
+185 }
+186
+187 @Test
+188 public void testScopeAnonInnerAnonInner() throws Exception {
+189 final String[] expected = {
+190 "34:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+191 "47:13: " + getCheckMessage(MSG_JAVADOC_MISSING),
+192 "61:13: " + getCheckMessage(MSG_JAVADOC_MISSING), };
+193 verifyWithInlineConfigParser(
+194 getPath("InputMissingJavadocMethodScopeAnonInner2.java" ), expected);
+195 }
+196
+197 @Test
+198 public void testScopes() throws Exception {
+199 final String[] expected = {
+200 "26:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+201 "27:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+202 "28:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+203 "29:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+204 "37:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+205 "38:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+206 "39:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+207 "40:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+208 "49:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+209 "50:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+210 "51:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+211 "52:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+212 "61:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+213 "62:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+214 "63:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+215 "64:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+216 "74:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+217 "75:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+218 "76:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+219 "77:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+220 "85:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+221 "86:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+222 "87:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+223 "88:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+224 "97:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+225 "98:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+226 "99:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+227 "100:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+228 "109:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+229 "110:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+230 "111:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+231 "112:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+232 "121:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+233 "122:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+234 "123:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+235 "124:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+236 "135:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+237 };
+238 verifyWithInlineConfigParser(
+239 getPath("InputMissingJavadocMethodNoJavadoc.java" ), expected);
+240 }
+241
+242 @Test
+243 public void testScopes2() throws Exception {
+244 final String[] expected = {
+245 "26:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+246 "27:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+247 "37:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+248 "38:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+249 };
+250 verifyWithInlineConfigParser(
+251 getPath("InputMissingJavadocMethodNoJavadoc2.java" ), expected);
+252 }
+253
+254 @Test
+255 public void testExcludeScope() throws Exception {
+256 final String[] expected = {
+257 "27:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+258 "29:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+259 "30:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+260 "50:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+261 "52:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+262 "53:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+263 "62:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+264 "64:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+265 "65:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+266 "75:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+267 "77:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+268 "78:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+269 "86:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+270 "88:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+271 "89:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+272 "98:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+273 "100:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+274 "101:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+275 "110:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+276 "112:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+277 "113:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+278 "122:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+279 "124:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+280 "125:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+281 "136:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+282 };
+283 verifyWithInlineConfigParser(
+284 getPath("InputMissingJavadocMethodNoJavadoc3.java" ), expected);
+285 }
+286
+287 @Test
+288 public void testDoAllowMissingJavadocTagsByDefault() throws Exception {
+289 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+290 verifyWithInlineConfigParser(
+291 getPath("InputMissingJavadocMethodMissingJavadocTags.java" ), expected);
+292 }
+293
+294 @Test
+295 public void testSetterGetterOff() throws Exception {
+296 final String[] expected = {
+297 "20:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+298 "25:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+299 "30:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+300 "35:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+301 "41:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+302 "45:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+303 "50:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+304 "56:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+305 "61:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+306 "66:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+307 "68:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+308 "72:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+309 "76:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+310 "80:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+311 "82:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+312 "87:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+313 "89:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+314 };
+315 verifyWithInlineConfigParser(
+316 getPath("InputMissingJavadocMethodSetterGetter.java" ), expected);
+317 }
+318
+319 @Test
+320 public void testSetterGetterOnCheck() throws Exception {
+321 final String[] expected = {
+322 "30:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+323 "35:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+324 "41:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+325 "45:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+326 "50:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+327 "56:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+328 "66:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+329 "68:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+330 "72:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+331 "76:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+332 "80:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+333 "82:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+334 "87:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+335 "89:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+336 };
+337 verifyWithInlineConfigParser(
+338 getPath("InputMissingJavadocMethodSetterGetter2.java" ), expected);
+339 }
+340
+341 @Test
+342 public void test11684081() throws Exception {
+343 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+344 verifyWithInlineConfigParser(
+345 getPath("InputMissingJavadocMethod_01.java" ), expected);
+346 }
+347
+348 @Test
+349 public void test11684082() throws Exception {
+350 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+351 verifyWithInlineConfigParser(
+352 getPath("InputMissingJavadocMethod_02.java" ), expected);
+353 }
+354
+355 @Test
+356 public void testSkipCertainMethods() throws Exception {
+357 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+358 verifyWithInlineConfigParser(
+359 getPath("InputMissingJavadocMethodIgnoreNameRegex.java" ), expected);
+360 }
+361
+362 @Test
+363 public void testNotSkipAnythingWhenSkipRegexDoesNotMatch() throws Exception {
+364 final String[] expected = {
+365 "22:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+366 "26:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+367 "30:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+368 };
+369 verifyWithInlineConfigParser(
+370 getPath("InputMissingJavadocMethodIgnoreNameRegex2.java" ), expected);
+371 }
+372
+373 @Test
+374 public void testAllowToSkipOverridden() throws Exception {
+375 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+376 verifyWithInlineConfigParser(
+377 getPath("InputMissingJavadocMethodsNotSkipWritten.java" ), expected);
+378 }
+379
+380 @Test
+381 public void testJava8ReceiverParameter() throws Exception {
+382 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+383 verifyWithInlineConfigParser(
+384 getPath("InputMissingJavadocMethodReceiverParameter.java" ), expected);
+385 }
+386
+387 @Test
+388 public void testJavadocInMethod() throws Exception {
+389 final String[] expected = {
+390 "20:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+391 "22:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+392 "25:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+393 "29:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+394 };
+395 verifyWithInlineConfigParser(
+396 getPath("InputMissingJavadocMethodJavadocInMethod.java" ), expected);
+397 }
+398
+399 @Test
+400 public void testConstructor() throws Exception {
+401 final String[] expected = {
+402 "21:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+403 };
+404 verifyWithInlineConfigParser(
+405 getPath("InputMissingJavadocMethodConstructor.java" ), expected);
+406 }
+407
+408 @Test
+409 public void testNotPublicInterfaceMethods() throws Exception {
+410 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+411 verifyWithInlineConfigParser(
+412 getPath("InputMissingJavadocMethodInterfacePrivateMethod.java" ), expected);
+413 }
+414
+415 @Test
+416 public void testPublicMethods() throws Exception {
+417 final String[] expected = {
+418 "22:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+419 "24:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+420 "28:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+421 "31:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+422 "35:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+423 };
+424 verifyWithInlineConfigParser(
+425 getPath("InputMissingJavadocMethodPublicMethods.java" ), expected);
+426
+427 }
+428
+429 @Test
+430 public void testMissingJavadocMethodRecordsAndCompactCtors() throws Exception {
+431 final String[] expected = {
+432 "22:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+433 "27:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+434 "31:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+435 "38:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+436 "44:9: " + getCheckMessage(MSG_JAVADOC_MISSING),
+437 "48:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+438 };
+439 verifyWithInlineConfigParser(
+440 getNonCompilablePath("InputMissingJavadocMethodRecordsAndCtors.java" ), expected);
+441 }
+442
+443 @Test
+444 public void testMissingJavadocMethodRecordsAndCompactCtorsMinLineCount() throws Exception {
+445
+446 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+447
+448 verifyWithInlineConfigParser(
+449 getNonCompilablePath("InputMissingJavadocMethodRecordsAndCtorsMinLineCount.java" ),
+450 expected);
+451 }
+452
+453 @Test
+454 public void testMinLineCount() throws Exception {
+455 final String[] expected = {
+456 "14:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+457 };
+458 verifyWithInlineConfigParser(
+459 getNonCompilablePath("InputMissingJavadocMethod1.java" ),
+460 expected);
+461 }
+462
+463 @Test
+464 public void testAnnotationField() throws Exception {
+465 final String[] expected = {
+466 "25:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+467 "27:5: " + getCheckMessage(MSG_JAVADOC_MISSING),
+468 };
+469
+470 verifyWithInlineConfigParser(
+471 getPath("InputMissingJavadocMethodAnnotationField.java" ),
+472 expected);
+473 }
+474
+475 @Test
+476 public void testIsGetterMethod() throws Exception {
+477 final File testFile =
+478 new File(getPath("InputMissingJavadocMethodSetterGetter3.java" ));
+479 final DetailAST notGetterMethod =
+480 CheckUtilTest.getNode(testFile, TokenTypes.METHOD_DEF);
+481 final DetailAST getterMethod = notGetterMethod.getNextSibling().getNextSibling();
+482
+483 assertWithMessage("Invalid result: AST provided is getter method" )
+484 .that(MissingJavadocMethodCheck.isGetterMethod(getterMethod))
+485 .isTrue();
+486 assertWithMessage("Invalid result: AST provided is not getter method" )
+487 .that(MissingJavadocMethodCheck.isGetterMethod(notGetterMethod))
+488 .isFalse();
+489 }
+490
+491 @Test
+492 public void testIsSetterMethod() throws Exception {
+493 final File testFile =
+494 new File(getPath("InputMissingJavadocMethodSetterGetter3.java" ));
+495 final DetailAST firstClassMethod =
+496 CheckUtilTest.getNode(testFile, TokenTypes.METHOD_DEF);
+497 final DetailAST setterMethod =
+498 firstClassMethod.getNextSibling().getNextSibling().getNextSibling();
+499 final DetailAST notSetterMethod = setterMethod.getNextSibling();
+500
+501 assertWithMessage("Invalid result: AST provided is not setter method" )
+502 .that(MissingJavadocMethodCheck.isSetterMethod(setterMethod))
+503 .isTrue();
+504 assertWithMessage("Invalid result: AST provided is not setter method" )
+505 .that(MissingJavadocMethodCheck.isSetterMethod(notSetterMethod))
+506 .isFalse();
+507 }
+508
+509 @Test
+510 public void testSetterGetterOn() throws Exception {
+511 final String[] expected = {
+512 "20:5: " + getCheckMessage(MissingJavadocMethodCheck.class ,
+513 MSG_JAVADOC_MISSING),
+514 "24:5: " + getCheckMessage(MissingJavadocMethodCheck.class ,
+515 MSG_JAVADOC_MISSING),
+516 "29:5: " + getCheckMessage(MissingJavadocMethodCheck.class ,
+517 MSG_JAVADOC_MISSING),
+518 };
+519 verifyWithInlineConfigParser(
+520 getPath("InputMissingJavadocMethodSetterGetter4.java" ), expected);
+521 }
+522
+523 @Test
+524 public void missingJavadoc() throws Exception {
+525 final String[] expected = {
+526 "13:5: " + getCheckMessage(MissingJavadocMethodCheck.class , MSG_JAVADOC_MISSING),
+527 };
+528 verifyWithInlineConfigParser(
+529 getNonCompilablePath("InputMissingJavadocMethodBasic.java" ), expected);
+530 }
+531 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/NonEmptyAtclauseDescriptionCheckTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/NonEmptyAtclauseDescriptionCheckTest.html
index dcb665ad79..9af8d5f234 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/NonEmptyAtclauseDescriptionCheckTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/NonEmptyAtclauseDescriptionCheckTest.html
@@ -30,80 +30,112 @@
22 import static com.google.common.truth.Truth.assertWithMessage;
23 import static com.puppycrawl.tools.checkstyle.checks.javadoc.NonEmptyAtclauseDescriptionCheck.MSG_KEY;
24
-25 import org.junit.jupiter.api.Test;
+25 import java.nio.charset.CodingErrorAction;
26
-27 import com.puppycrawl.tools.checkstyle.AbstractModuleTestSupport;
-28 import com.puppycrawl.tools.checkstyle.api.TokenTypes;
-29
-30 public class NonEmptyAtclauseDescriptionCheckTest
-31 extends AbstractModuleTestSupport {
-32
-33 @Override
-34 protected String getPackageLocation() {
-35 return "com/puppycrawl/tools/checkstyle/checks/javadoc/nonemptyatclausedescription" ;
-36 }
-37
-38 @Test
-39 public void testGetAcceptableTokens() {
-40 final NonEmptyAtclauseDescriptionCheck checkObj =
-41 new NonEmptyAtclauseDescriptionCheck();
-42 final int [] expected = {TokenTypes.BLOCK_COMMENT_BEGIN};
-43 assertWithMessage("Default acceptable tokens are invalid" )
-44 .that(checkObj.getAcceptableTokens())
-45 .isEqualTo(expected);
-46 }
-47
-48 @Test
-49 public void testGetRequiredTokens() {
-50 final NonEmptyAtclauseDescriptionCheck checkObj =
-51 new NonEmptyAtclauseDescriptionCheck();
-52 final int [] expected = {TokenTypes.BLOCK_COMMENT_BEGIN};
-53 assertWithMessage("Default required tokens are invalid" )
-54 .that(checkObj.getRequiredTokens())
-55 .isEqualTo(expected);
-56 }
-57
-58 @Test
-59 public void testCheckOne() throws Exception {
-60 final String[] expected = {
-61
-62 "37: " + getCheckMessage(MSG_KEY),
-63
-64 "38: " + getCheckMessage(MSG_KEY),
-65
-66 "39: " + getCheckMessage(MSG_KEY),
+27 import org.junit.jupiter.api.Test;
+28
+29 import com.puppycrawl.tools.checkstyle.AbstractModuleTestSupport;
+30 import com.puppycrawl.tools.checkstyle.DefaultConfiguration;
+31 import com.puppycrawl.tools.checkstyle.TreeWalker;
+32 import com.puppycrawl.tools.checkstyle.api.TokenTypes;
+33 import com.puppycrawl.tools.checkstyle.utils.CommonUtil;
+34 import de.thetaphi.forbiddenapis.SuppressForbidden;
+35
+36 public class NonEmptyAtclauseDescriptionCheckTest
+37 extends AbstractModuleTestSupport {
+38
+39 @Override
+40 protected String getPackageLocation() {
+41 return "com/puppycrawl/tools/checkstyle/checks/javadoc/nonemptyatclausedescription" ;
+42 }
+43
+44 @Test
+45 public void testGetAcceptableTokens() {
+46 final NonEmptyAtclauseDescriptionCheck checkObj =
+47 new NonEmptyAtclauseDescriptionCheck();
+48 final int [] expected = {TokenTypes.BLOCK_COMMENT_BEGIN};
+49 assertWithMessage("Default acceptable tokens are invalid" )
+50 .that(checkObj.getAcceptableTokens())
+51 .isEqualTo(expected);
+52 }
+53
+54 @Test
+55 public void testGetRequiredTokens() {
+56 final NonEmptyAtclauseDescriptionCheck checkObj =
+57 new NonEmptyAtclauseDescriptionCheck();
+58 final int [] expected = {TokenTypes.BLOCK_COMMENT_BEGIN};
+59 assertWithMessage("Default required tokens are invalid" )
+60 .that(checkObj.getRequiredTokens())
+61 .isEqualTo(expected);
+62 }
+63
+64 @Test
+65 public void testCheckOne() throws Exception {
+66 final String[] expected = {
67
-68 "50: " + getCheckMessage(MSG_KEY),
+68 "37: " + getCheckMessage(MSG_KEY),
69
-70 "51: " + getCheckMessage(MSG_KEY),
+70 "38: " + getCheckMessage(MSG_KEY),
71
-72 "52: " + getCheckMessage(MSG_KEY),
-73 "92: " + getCheckMessage(MSG_KEY),
-74 "93: " + getCheckMessage(MSG_KEY),
-75 "94: " + getCheckMessage(MSG_KEY),
-76 "95: " + getCheckMessage(MSG_KEY),
-77 "96: " + getCheckMessage(MSG_KEY),
-78 "97: " + getCheckMessage(MSG_KEY),
-79 };
-80 verifyWithInlineConfigParser(getPath("InputNonEmptyAtclauseDescriptionOne.java" ), expected);
-81 }
-82
-83 @Test
-84 public void testCheckTwo() throws Exception {
-85 final String[] expected = {
-86 "16: " + getCheckMessage(MSG_KEY),
-87 "17: " + getCheckMessage(MSG_KEY),
-88 "18: " + getCheckMessage(MSG_KEY),
-89 "19: " + getCheckMessage(MSG_KEY),
-90 "20: " + getCheckMessage(MSG_KEY),
-91 "51: " + getCheckMessage(MSG_KEY),
-92 "60: " + getCheckMessage(MSG_KEY),
-93 "75: " + getCheckMessage(MSG_KEY),
-94 "77: " + getCheckMessage(MSG_KEY),
-95 };
-96 verifyWithInlineConfigParser(getPath("InputNonEmptyAtclauseDescriptionTwo.java" ), expected);
-97 }
-98 }
+72 "39: " + getCheckMessage(MSG_KEY),
+73
+74 "50: " + getCheckMessage(MSG_KEY),
+75
+76 "51: " + getCheckMessage(MSG_KEY),
+77
+78 "52: " + getCheckMessage(MSG_KEY),
+79 "92: " + getCheckMessage(MSG_KEY),
+80 "93: " + getCheckMessage(MSG_KEY),
+81 "94: " + getCheckMessage(MSG_KEY),
+82 "95: " + getCheckMessage(MSG_KEY),
+83 "96: " + getCheckMessage(MSG_KEY),
+84 "97: " + getCheckMessage(MSG_KEY),
+85 };
+86 verifyWithInlineConfigParser(getPath("InputNonEmptyAtclauseDescriptionOne.java" ), expected);
+87 }
+88
+89 @Test
+90 public void testCheckTwo() throws Exception {
+91 final String[] expected = {
+92 "16: " + getCheckMessage(MSG_KEY),
+93 "17: " + getCheckMessage(MSG_KEY),
+94 "18: " + getCheckMessage(MSG_KEY),
+95 "19: " + getCheckMessage(MSG_KEY),
+96 "20: " + getCheckMessage(MSG_KEY),
+97 "51: " + getCheckMessage(MSG_KEY),
+98 "60: " + getCheckMessage(MSG_KEY),
+99 "75: " + getCheckMessage(MSG_KEY),
+100 "77: " + getCheckMessage(MSG_KEY),
+101 };
+102 verifyWithInlineConfigParser(getPath("InputNonEmptyAtclauseDescriptionTwo.java" ), expected);
+103 }
+104
+105
+106
+107
+108
+109
+110
+111
+112
+113 @SuppressForbidden
+114 @Test
+115 public void testDecoderOnMalformedInput() throws Exception {
+116 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+117 final DefaultConfiguration checkConfig =
+118 createModuleConfig(NonEmptyAtclauseDescriptionCheck.class );
+119
+120 final DefaultConfiguration treeWalkerConfig = createModuleConfig(TreeWalker.class );
+121 treeWalkerConfig.addChild(checkConfig);
+122
+123 final DefaultConfiguration checkerConfig = createRootConfig(treeWalkerConfig);
+124 checkerConfig.addChild(treeWalkerConfig);
+125 checkerConfig.addProperty("charset" , "US-ASCII" );
+126
+127 verify(checkerConfig,
+128 getPath("InputNonEmptyAtclauseDescriptionDifferentCharset.java" ), expected);
+129 }
+130 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/SummaryJavadocCheckTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/SummaryJavadocCheckTest.html
index c204a83598..cdd6e1d4d2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/SummaryJavadocCheckTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/SummaryJavadocCheckTest.html
@@ -321,7 +321,17 @@
313 verifyWithInlineConfigParser(
314 getPath("InputSummaryJavadoc1.java" ), expected);
315 }
-316 }
+316
+317 @Test
+318 public void testInheritDoc() throws Exception {
+319 final String[] expected = {
+320 "14: " + getCheckMessage(MSG_SUMMARY_FIRST_SENTENCE),
+321 };
+322
+323 verifyWithInlineConfigParser(
+324 getPath("InputSummaryJavadocInheritDoc.java" ), expected);
+325 }
+326 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/abstractjavadoc/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/abstractjavadoc/package-frame.html
index e1c0ff4a68..87ec781b92 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/abstractjavadoc/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/abstractjavadoc/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.abstractjavadoc
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.abstractjavadoc
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/abstractjavadoc/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/abstractjavadoc/package-summary.html
index f6f9194fc8..38796460eb 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/abstractjavadoc/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/abstractjavadoc/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.abstractjavadoc
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.abstractjavadoc
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -741,7 +741,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/atclauseorder/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/atclauseorder/package-frame.html
index e038166e44..320c7f841e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/atclauseorder/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/atclauseorder/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.atclauseorder
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.atclauseorder
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/atclauseorder/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/atclauseorder/package-summary.html
index 67e9d09aec..6bbf1dca4a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/atclauseorder/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/atclauseorder/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.atclauseorder
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.atclauseorder
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -256,7 +256,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/comment/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/comment/package-frame.html
index 868e0f0ee4..4a8434fd73 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/comment/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/comment/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.invalidjavadocposition.comment
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.invalidjavadocposition.comment
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/comment/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/comment/package-summary.html
index 98ce6ba75d..b3dac2f070 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/comment/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/comment/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.invalidjavadocposition.comment
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.invalidjavadocposition.comment
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/package-frame.html
index 524d8517a1..13561e5e09 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.invalidjavadocposition
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.invalidjavadocposition
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/package-summary.html
index 2990acb28a..bdb1f29af6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/invalidjavadocposition/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.invalidjavadocposition
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.invalidjavadocposition
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocblocktaglocation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocblocktaglocation/package-frame.html
index 8f41a91f4d..74814b046b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocblocktaglocation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocblocktaglocation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocblocktaglocation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocblocktaglocation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocblocktaglocation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocblocktaglocation/package-summary.html
index a35729cb02..22e5801125 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocblocktaglocation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocblocktaglocation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocblocktaglocation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocblocktaglocation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoccontentlocation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoccontentlocation/package-frame.html
index b372fe10b8..49d455503e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoccontentlocation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoccontentlocation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadoccontentlocation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadoccontentlocation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoccontentlocation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoccontentlocation/package-summary.html
index 7ed33e6af6..c2c9a6995d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoccontentlocation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoccontentlocation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadoccontentlocation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadoccontentlocation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmethod/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmethod/package-frame.html
index 4566edf135..9d4c7324eb 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmethod/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmethod/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocmethod
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocmethod
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmethod/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmethod/package-summary.html
index 0e7ba2d4b1..18536da5a1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmethod/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmethod/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocmethod
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocmethod
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -711,7 +711,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingleadingasterisk/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingleadingasterisk/package-frame.html
index 1c2b38563a..a17bb7a24e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingleadingasterisk/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingleadingasterisk/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocmissingleadingasterisk
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocmissingleadingasterisk
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingleadingasterisk/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingleadingasterisk/package-summary.html
index 42d5e8ecb0..39ac092f0e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingleadingasterisk/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingleadingasterisk/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocmissingleadingasterisk
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocmissingleadingasterisk
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -101,7 +101,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingwhitespaceafterasterisk/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingwhitespaceafterasterisk/package-frame.html
index 6414965cfe..b6f152708e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingwhitespaceafterasterisk/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingwhitespaceafterasterisk/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocmissingwhitespaceafterasterisk
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocmissingwhitespaceafterasterisk
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingwhitespaceafterasterisk/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingwhitespaceafterasterisk/package-summary.html
index a86b17d156..a2da0140d8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingwhitespaceafterasterisk/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocmissingwhitespaceafterasterisk/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocmissingwhitespaceafterasterisk
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocmissingwhitespaceafterasterisk
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -136,7 +136,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/annotation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/annotation/package-frame.html
index 6697ace2da..e68223506f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/annotation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/annotation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.annotation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.annotation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/annotation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/annotation/package-summary.html
index b208df2581..2ddb979f66 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/annotation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/annotation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.annotation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.annotation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/bothfiles/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/bothfiles/package-frame.html
index 7eafe2f881..78a684a7d9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/bothfiles/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/bothfiles/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.bothfiles
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.bothfiles
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/bothfiles/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/bothfiles/package-summary.html
index 6a60265573..f73d1027bc 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/bothfiles/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/bothfiles/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.bothfiles
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.bothfiles
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/noparentfile/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/noparentfile/package-frame.html
index be61b0b2ee..16400546ce 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/noparentfile/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/noparentfile/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.noparentfile
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.noparentfile
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/noparentfile/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/noparentfile/package-summary.html
index 72583389a5..e40b43b5ad 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/noparentfile/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/noparentfile/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.noparentfile
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.noparentfile
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/package-frame.html
index 4ed1c56c8c..44f0fd6287 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/package-summary.html
index ecebd4ad6d..1f2f73821d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -151,7 +151,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/pkghtml/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/pkghtml/package-frame.html
index 6125afa562..20c6239b95 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/pkghtml/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/pkghtml/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.pkghtml
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.pkghtml
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/pkghtml/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/pkghtml/package-summary.html
index f4ab30b066..eb29e763bd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/pkghtml/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocpackage/pkghtml/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.pkghtml
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocpackage.pkghtml
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocparagraph/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocparagraph/package-frame.html
index 6646de0d1b..403957f0fa 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocparagraph/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocparagraph/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocparagraph
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocparagraph
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocparagraph/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocparagraph/package-summary.html
index a947344c98..19bfd4d5e7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocparagraph/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocparagraph/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocparagraph
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocparagraph
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -121,7 +121,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/bothfiles/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/bothfiles/package-frame.html
index d0bee7e733..ee5657fd2e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/bothfiles/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/bothfiles/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.bothfiles
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.bothfiles
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/bothfiles/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/bothfiles/package-summary.html
index aa792c0989..db7e1e429c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/bothfiles/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/bothfiles/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.bothfiles
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.bothfiles
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/missingperiod/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/missingperiod/package-frame.html
index 2564ae2162..331f79751e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/missingperiod/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/missingperiod/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.missingperiod
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.missingperiod
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/missingperiod/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/missingperiod/package-summary.html
index be1be24236..a135744fee 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/missingperiod/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/missingperiod/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.missingperiod
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.missingperiod
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/package-frame.html
index 9b3e707b2a..01280c177e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/package-summary.html
index 8c1b06ff8b..37a37a5b30 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -591,7 +591,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/annotation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/annotation/package-frame.html
index c5b0820c37..87e3e21429 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/annotation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/annotation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.annotation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.annotation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/annotation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/annotation/package-summary.html
index 71093ffde3..444e0ee8a2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/annotation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/annotation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.annotation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.annotation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidformat/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidformat/package-frame.html
index dfe57096ee..16ecc4acd8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidformat/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidformat/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.invalidformat
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.invalidformat
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidformat/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidformat/package-summary.html
index 9ae5f7e452..24d05cfa5d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidformat/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidformat/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.invalidformat
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.invalidformat
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidinherit/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidinherit/package-frame.html
index 1bef52d6e6..643c0742ff 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidinherit/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidinherit/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.invalidinherit
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.invalidinherit
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidinherit/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidinherit/package-summary.html
index f633e13339..a6a6e3b328 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidinherit/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/invalidinherit/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.invalidinherit
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.invalidinherit
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/valid/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/valid/package-frame.html
index a1194c8fd6..ef9fbc2900 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/valid/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/valid/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.valid
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.valid
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/valid/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/valid/package-summary.html
index 8be3d31ea0..6de82e4fdd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/valid/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocstyle/pkginfo/valid/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.valid
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocstyle.pkginfo.valid
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctagcontinuationindentation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctagcontinuationindentation/package-frame.html
index 8264306618..c7c32e63c9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctagcontinuationindentation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctagcontinuationindentation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadoctagcontinuationindentation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadoctagcontinuationindentation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctagcontinuationindentation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctagcontinuationindentation/package-summary.html
index dc2377a905..d3b247c87b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctagcontinuationindentation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctagcontinuationindentation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadoctagcontinuationindentation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadoctagcontinuationindentation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -136,7 +136,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctype/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctype/package-frame.html
index 2844a69d4a..7332ae74b6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctype/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctype/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadoctype
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadoctype
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctype/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctype/package-summary.html
index 058f5cc766..828c6d47b3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctype/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadoctype/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadoctype
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadoctype
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -1001,7 +1001,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocvariable/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocvariable/package-frame.html
index 4dc4f7315d..f014c0ed97 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocvariable/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocvariable/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocvariable
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocvariable
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocvariable/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocvariable/package-summary.html
index a512ada376..579683bdf6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocvariable/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/javadocvariable/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocvariable
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.javadocvariable
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -486,7 +486,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/InputMissingJavadocMethodAnnotationField.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/InputMissingJavadocMethodAnnotationField.html
new file mode 100644
index 0000000000..e24a678146
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/InputMissingJavadocMethodAnnotationField.html
@@ -0,0 +1,42 @@
+
+
+
+InputMissingJavadocMethodAnnotationField xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14 package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocmethod;
+15
+16 import java.lang.annotation.ElementType;
+17 import java.lang.annotation.Retention;
+18 import java.lang.annotation.RetentionPolicy;
+19 import java.lang.annotation.Target;
+20
+21 @Retention(RetentionPolicy.RUNTIME)
+22 @Target(ElementType.TYPE)
+23 public @interface InputMissingJavadocMethodAnnotationField {
+24
+25 int method();
+26
+27 String value() default "AMD" ;
+28 }
+29
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/InputMissingJavadocMethodSetterGetter3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/InputMissingJavadocMethodSetterGetter3.html
new file mode 100644
index 0000000000..a5a8a1fde8
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/InputMissingJavadocMethodSetterGetter3.html
@@ -0,0 +1,86 @@
+
+
+
+
InputMissingJavadocMethodSetterGetter3 xref
+
+
+
+
+1 package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocmethod;
+2 import com.google.common.base.Objects;
+3 import java.util.HashMap;
+4 import java.util.Map;
+5
+6
+7
+8
+9
+10
+11 public class InputMissingJavadocMethodSetterGetter3<V, C> {
+12 private Map<String, Integer> field = new HashMap<>();
+13 protected int [] array = new int [10];
+14 public static final Long VAR_1 = 1L;
+15 static final double VAR_2 = 5.0;
+16
+17 @Override
+18 public boolean equals(Object o) {
+19 if (this == o) {
+20 return true ;
+21 }
+22 if (o == null || getClass() != o.getClass()) {
+23 return false;
+24 }
+25 InputMissingJavadocMethodSetterGetter3<V, C> that =
+26 (InputMissingJavadocMethodSetterGetter3<V, C>) o;
+27 return Objects.equal(field, that.field) &&
+28 Objects.equal(array, that.array);
+29 }
+30
+31 public void doSomething(int value) {
+32 if (field.isEmpty()) {
+33 field.put(String.valueOf(value), value << 1);
+34 } else {
+35 if (!field.containsKey(String.valueOf(value))){
+36 field.put(String.valueOf(value), value << 1);
+37 }
+38 }
+39
+40 if (!field.containsKey(String.valueOf(value))){
+41 field.put(String.valueOf(value), value << 1);
+42 } else if (value == 10) {
+43 array[9] = -1;
+44 }
+45
+46 if (field.size() < 10){
+47 array[9] = field.getOrDefault(String.valueOf(value), -1);
+48 }
+49
+50 }
+51
+52 public Map<String, Integer> getField() {
+53 return new HashMap<>(field);
+54 }
+55
+56 public void setField(Map<String, Integer> field) {
+57 this .field = field;
+58 }
+59
+60 public void setArray(String name, int ... array) {
+61 this .array = array;
+62 }
+63
+64 public void anotherMethod(int ... array) {
+65 this .array = array;
+66 }
+67
+68 public void testReceiver(InputMissingJavadocMethodSetterGetter3<V, C>this , int variable) {}
+69
+70 public interface Example {
+71 void method();
+72 }
+73 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/checkutil/InputCheckUtil9.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/InputMissingJavadocMethodSetterGetter4.html
similarity index 85%
rename from xref-test/com/puppycrawl/tools/checkstyle/utils/checkutil/InputCheckUtil9.html
rename to xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/InputMissingJavadocMethodSetterGetter4.html
index 701805138d..855babac2d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/checkutil/InputCheckUtil9.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/InputMissingJavadocMethodSetterGetter4.html
@@ -1,11 +1,11 @@
-
InputCheckUtil9 xref
-
+
InputMissingJavadocMethodSetterGetter4 xref
+
-
+
1
2
3
@@ -19,9 +19,9 @@
11
12
13
-14 package com.puppycrawl.tools.checkstyle.utils.checkutil;
+14 package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocmethod;
15
-16 public class InputCheckUtil9 {
+16 public class InputMissingJavadocMethodSetterGetter4 {
17
18 private int mNumber;
19
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/package-frame.html
index 467ca74670..15196c7cfb 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocmethod
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocmethod
@@ -26,6 +26,9 @@ Classes
InputMissingJavadocMethodAllowedAnnotations
+
+
+ InputMissingJavadocMethodAnnotationField
InputMissingJavadocMethodConstructor
@@ -203,6 +206,15 @@ Classes
InputMissingJavadocMethodSetterGetter2
+
+
+ InputMissingJavadocMethodSetterGetter3
+
+
+ InputMissingJavadocMethodSetterGetter3.Example
+
+
+ InputMissingJavadocMethodSetterGetter4
InputMissingJavadocMethodSmallMethods
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/package-summary.html
index 32dfb6155f..f739ea3630 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocmethod/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocmethod
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocmethod
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -83,298 +83,318 @@ Package com.puppycrawl.tools.checkstyle.checks
- InputMissingJavadocMethodConstructor
+ InputMissingJavadocMethodAnnotationField
- InputMissingJavadocMethodEnumCtorScopeIsPrivate
+ InputMissingJavadocMethodConstructor
- InputMissingJavadocMethodExtendAnnotation
+ InputMissingJavadocMethodEnumCtorScopeIsPrivate
- InputMissingJavadocMethodExtendAnnotation.CollectionFeature
+ InputMissingJavadocMethodExtendAnnotation
- InputMissingJavadocMethodExtendAnnotation.CollectionFeature.Require
+ InputMissingJavadocMethodExtendAnnotation.CollectionFeature
- InputMissingJavadocMethodIgnoreNameRegex
+ InputMissingJavadocMethodExtendAnnotation.CollectionFeature.Require
- InputMissingJavadocMethodIgnoreNameRegex2
+ InputMissingJavadocMethodIgnoreNameRegex
- InputMissingJavadocMethodInterfaceMemberScopeIsPublic
+ InputMissingJavadocMethodIgnoreNameRegex2
- InputMissingJavadocMethodInterfaceMemberScopeIsPublic.Class
+ InputMissingJavadocMethodInterfaceMemberScopeIsPublic
- InputMissingJavadocMethodInterfaceMemberScopeIsPublic.Enum
+ InputMissingJavadocMethodInterfaceMemberScopeIsPublic.Class
- InputMissingJavadocMethodInterfacePrivateMethod
+ InputMissingJavadocMethodInterfaceMemberScopeIsPublic.Enum
- InputMissingJavadocMethodJavadocInMethod
+ InputMissingJavadocMethodInterfacePrivateMethod
- InputMissingJavadocMethodMissingJavadocTags
+ InputMissingJavadocMethodJavadocInMethod
- InputMissingJavadocMethodNoJavadoc
+ InputMissingJavadocMethodMissingJavadocTags
- InputMissingJavadocMethodNoJavadoc.PackageInner
+ InputMissingJavadocMethodNoJavadoc
- InputMissingJavadocMethodNoJavadoc.PrivateInner
+ InputMissingJavadocMethodNoJavadoc.PackageInner
- InputMissingJavadocMethodNoJavadoc.ProtectedInner
+ InputMissingJavadocMethodNoJavadoc.PrivateInner
- InputMissingJavadocMethodNoJavadoc2
+ InputMissingJavadocMethodNoJavadoc.ProtectedInner
- InputMissingJavadocMethodNoJavadoc2.PackageInner
+ InputMissingJavadocMethodNoJavadoc2
- InputMissingJavadocMethodNoJavadoc2.PrivateInner
+ InputMissingJavadocMethodNoJavadoc2.PackageInner
- InputMissingJavadocMethodNoJavadoc2.ProtectedInner
+ InputMissingJavadocMethodNoJavadoc2.PrivateInner
- InputMissingJavadocMethodNoJavadoc3
+ InputMissingJavadocMethodNoJavadoc2.ProtectedInner
- InputMissingJavadocMethodNoJavadoc3.PackageInner
+ InputMissingJavadocMethodNoJavadoc3
- InputMissingJavadocMethodNoJavadoc3.PrivateInner
+ InputMissingJavadocMethodNoJavadoc3.PackageInner
- InputMissingJavadocMethodNoJavadoc3.ProtectedInner
+ InputMissingJavadocMethodNoJavadoc3.PrivateInner
- InputMissingJavadocMethodPublicMethods
+ InputMissingJavadocMethodNoJavadoc3.ProtectedInner
- InputMissingJavadocMethodPublicMethods.SomeAnnotation
+ InputMissingJavadocMethodPublicMethods
- InputMissingJavadocMethodPublicOnly
+ InputMissingJavadocMethodPublicMethods.SomeAnnotation
- InputMissingJavadocMethodPublicOnly.InnerClass
+ InputMissingJavadocMethodPublicOnly
- InputMissingJavadocMethodPublicOnly.InnerInterface
+ InputMissingJavadocMethodPublicOnly.InnerClass
- InputMissingJavadocMethodPublicOnly.InnerInterface.InnerInnerClass
+ InputMissingJavadocMethodPublicOnly.InnerInterface
- InputMissingJavadocMethodPublicOnly.InnerWithoutAuthor
+ InputMissingJavadocMethodPublicOnly.InnerInterface.InnerInnerClass
- InputMissingJavadocMethodPublicOnly2
+ InputMissingJavadocMethodPublicOnly.InnerWithoutAuthor
- InputMissingJavadocMethodPublicOnly2.InnerClass
+ InputMissingJavadocMethodPublicOnly2
- InputMissingJavadocMethodPublicOnly2.InnerInterface
+ InputMissingJavadocMethodPublicOnly2.InnerClass
- InputMissingJavadocMethodPublicOnly2.InnerInterface.InnerInnerClass
+ InputMissingJavadocMethodPublicOnly2.InnerInterface
- InputMissingJavadocMethodPublicOnly2.InnerWithoutAuthor
+ InputMissingJavadocMethodPublicOnly2.InnerInterface.InnerInnerClass
- InputMissingJavadocMethodPublicOnly3
+ InputMissingJavadocMethodPublicOnly2.InnerWithoutAuthor
- InputMissingJavadocMethodPublicOnly3.InnerClass
+ InputMissingJavadocMethodPublicOnly3
- InputMissingJavadocMethodPublicOnly3.InnerInterface
+ InputMissingJavadocMethodPublicOnly3.InnerClass
- InputMissingJavadocMethodPublicOnly3.InnerInterface.InnerInnerClass
+ InputMissingJavadocMethodPublicOnly3.InnerInterface
- InputMissingJavadocMethodPublicOnly3.InnerWithoutAuthor
+ InputMissingJavadocMethodPublicOnly3.InnerInterface.InnerInnerClass
- InputMissingJavadocMethodReceiverParameter
+ InputMissingJavadocMethodPublicOnly3.InnerWithoutAuthor
- InputMissingJavadocMethodReceiverParameter.Ann
+ InputMissingJavadocMethodReceiverParameter
- InputMissingJavadocMethodScopeAnonInner
+ InputMissingJavadocMethodReceiverParameter.Ann
- InputMissingJavadocMethodScopeAnonInner2
+ InputMissingJavadocMethodScopeAnonInner
- InputMissingJavadocMethodScopeInnerInterfaces
+ InputMissingJavadocMethodScopeAnonInner2
- InputMissingJavadocMethodScopeInnerInterfaces.MyAnnotation
+ InputMissingJavadocMethodScopeInnerInterfaces
- InputMissingJavadocMethodScopeInnerInterfaces.MyClass1
+ InputMissingJavadocMethodScopeInnerInterfaces.MyAnnotation
- InputMissingJavadocMethodScopeInnerInterfaces.MyClass2
+ InputMissingJavadocMethodScopeInnerInterfaces.MyClass1
- InputMissingJavadocMethodScopeInnerInterfaces.MyEnum
+ InputMissingJavadocMethodScopeInnerInterfaces.MyClass2
- InputMissingJavadocMethodScopeInnerInterfaces.MyInterface1
+ InputMissingJavadocMethodScopeInnerInterfaces.MyEnum
- InputMissingJavadocMethodScopeInnerInterfaces.MyInterface2
+ InputMissingJavadocMethodScopeInnerInterfaces.MyInterface1
- InputMissingJavadocMethodScopeInnerInterfaces.PackageInnerInterface
+ InputMissingJavadocMethodScopeInnerInterfaces.MyInterface2
- InputMissingJavadocMethodScopeInnerInterfaces.PrivateInterface
+ InputMissingJavadocMethodScopeInnerInterfaces.PackageInnerInterface
- InputMissingJavadocMethodScopeInnerInterfaces.ProtectedInnerInterface
+ InputMissingJavadocMethodScopeInnerInterfaces.PrivateInterface
- InputMissingJavadocMethodScopeInnerInterfaces.PublicInnerInterface
+ InputMissingJavadocMethodScopeInnerInterfaces.ProtectedInnerInterface
- InputMissingJavadocMethodSetterGetter
+ InputMissingJavadocMethodScopeInnerInterfaces.PublicInnerInterface
+
+ InputMissingJavadocMethodSetterGetter
+
+
+
InputMissingJavadocMethodSetterGetter2
+
+
+
+ InputMissingJavadocMethodSetterGetter3
+
+
+
+
+ InputMissingJavadocMethodSetterGetter3.Example
+
+
+
+
+ InputMissingJavadocMethodSetterGetter4
+
@@ -576,7 +596,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/annotation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/annotation/package-frame.html
index 3d4dcb74ac..df1d62c84a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/annotation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/annotation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.annotation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.annotation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/annotation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/annotation/package-summary.html
index f7c180f8e9..59b55fb731 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/annotation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/annotation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.annotation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.annotation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/blank/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/blank/package-frame.html
index d45534a4cd..37c3d698cf 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/blank/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/blank/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.blank
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.blank
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/blank/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/blank/package-summary.html
index f71484657c..c5d798d4f3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/blank/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/blank/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.blank
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.blank
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/header/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/header/package-frame.html
index 5f4021469a..4cdf86827a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/header/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/header/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.header
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.header
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/header/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/header/package-summary.html
index 0a59092dfd..090f218033 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/header/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/header/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.header
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.header
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/package-frame.html
index 067e39de1f..1369b0a797 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/package-summary.html
index ff1cf4f02d..157e2c03dd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/singleline/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/singleline/package-frame.html
index 17d4e3de7d..a102004831 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/singleline/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/singleline/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.singleline
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.singleline
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/singleline/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/singleline/package-summary.html
index 615a65ccd0..25766e9ebd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/singleline/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadocpackage/singleline/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.singleline
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadocpackage.singleline
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadoctype/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadoctype/package-frame.html
index eb32707820..930688c59f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadoctype/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadoctype/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadoctype
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadoctype
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadoctype/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadoctype/package-summary.html
index d56adad111..3367ec5f6d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadoctype/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/missingjavadoctype/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadoctype
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.missingjavadoctype
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -891,7 +891,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/nonemptyatclausedescription/InputNonEmptyAtclauseDescriptionDifferentCharset.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/nonemptyatclausedescription/InputNonEmptyAtclauseDescriptionDifferentCharset.html
new file mode 100644
index 0000000000..9827702f6d
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/nonemptyatclausedescription/InputNonEmptyAtclauseDescriptionDifferentCharset.html
@@ -0,0 +1,23 @@
+
+
+
+InputNonEmptyAtclauseDescriptionDifferentCharset xref
+
+
+
+
+1 package com.puppycrawl.tools.checkstyle.checks.javadoc.nonemptyatclausedescription;
+2
+3 public class InputNonEmptyAtclauseDescriptionDifferentCharset {
+4
+5
+6
+7
+8 private void foo() {
+9 }
+10 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/nonemptyatclausedescription/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/nonemptyatclausedescription/package-frame.html
index c5db17b78d..cf69bfcac6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/nonemptyatclausedescription/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/nonemptyatclausedescription/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.nonemptyatclausedescription
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.nonemptyatclausedescription
@@ -13,6 +13,9 @@
com.puppycraw
Classes
+ InputNonEmptyAtclauseDescriptionDifferentCharset
+
+
InputNonEmptyAtclauseDescriptionOne
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/nonemptyatclausedescription/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/nonemptyatclausedescription/package-summary.html
index 6aeaaae307..bc85d6eb20 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/nonemptyatclausedescription/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/nonemptyatclausedescription/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.nonemptyatclausedescription
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.nonemptyatclausedescription
@@ -23,7 +23,7 @@
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
@@ -58,10 +58,15 @@ Package com.puppycrawl.tools.checkstyle.checks
- InputNonEmptyAtclauseDescriptionOne
+ InputNonEmptyAtclauseDescriptionDifferentCharset
+
+ InputNonEmptyAtclauseDescriptionOne
+
+
+
InputNonEmptyAtclauseDescriptionTwo
@@ -86,7 +91,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/package-frame.html
index f4568499a4..60f71b80bc 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/package-summary.html
index 83f877f278..2c5c533a99 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -341,7 +341,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/requireemptylinebeforeblocktaggroup/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/requireemptylinebeforeblocktaggroup/package-frame.html
index edf4f749ce..11798fbf89 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/requireemptylinebeforeblocktaggroup/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/requireemptylinebeforeblocktaggroup/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.requireemptylinebeforeblocktaggroup
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.requireemptylinebeforeblocktaggroup
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/requireemptylinebeforeblocktaggroup/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/requireemptylinebeforeblocktaggroup/package-summary.html
index 70038212d9..95d9b966e4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/requireemptylinebeforeblocktaggroup/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/requireemptylinebeforeblocktaggroup/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.requireemptylinebeforeblocktaggroup
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.requireemptylinebeforeblocktaggroup
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/singlelinejavadoc/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/singlelinejavadoc/package-frame.html
index b66344074e..e8ddb3bdad 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/singlelinejavadoc/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/singlelinejavadoc/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.singlelinejavadoc
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.singlelinejavadoc
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/singlelinejavadoc/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/singlelinejavadoc/package-summary.html
index 3dcb670247..ecfae47c90 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/singlelinejavadoc/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/singlelinejavadoc/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.singlelinejavadoc
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.singlelinejavadoc
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/InputSummaryJavadocInheritDoc.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/InputSummaryJavadocInheritDoc.html
new file mode 100644
index 0000000000..3b50dc21d5
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/InputSummaryJavadocInheritDoc.html
@@ -0,0 +1,29 @@
+
+
+
+InputSummaryJavadocInheritDoc xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10 package com.puppycrawl.tools.checkstyle.checks.javadoc.summaryjavadoc;
+11
+12 public class InputSummaryJavadocInheritDoc {
+13
+14
+15 void bar2() {}
+16 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/inputs/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/inputs/package-frame.html
index ed84b04335..61e0cf945c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/inputs/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/inputs/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.summaryjavadoc.inputs
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.summaryjavadoc.inputs
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/inputs/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/inputs/package-summary.html
index be418d5228..52668c63c1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/inputs/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/inputs/package-summary.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.summaryjavadoc.inputs
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.summaryjavadoc.inputs
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/package-frame.html
index be930f4d70..7776302f5c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.summaryjavadoc
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.summaryjavadoc
@@ -41,6 +41,9 @@ Classes
InputSummaryJavadocIncorrect3
+
+
+ InputSummaryJavadocInheritDoc
InputSummaryJavadocInlineCorrect
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/package-summary.html
index fb4e53e2a5..1a9e59082c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/summaryjavadoc/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.summaryjavadoc
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.summaryjavadoc
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -108,90 +108,95 @@ Package com.puppycrawl.tools.checkstyle.checks
- InputSummaryJavadocInlineCorrect
+ InputSummaryJavadocInheritDoc
- InputSummaryJavadocInlineCorrect.InputSummaryJavadocInlineParagraphCheck
+ InputSummaryJavadocInlineCorrect
- InputSummaryJavadocInlineCorrect.TestClass
+ InputSummaryJavadocInlineCorrect.InputSummaryJavadocInlineParagraphCheck
- InputSummaryJavadocInlineDefault
+ InputSummaryJavadocInlineCorrect.TestClass
- InputSummaryJavadocInlineDefault.InnerInputCorrectJavaDocParagraphCheck
+ InputSummaryJavadocInlineDefault
- InputSummaryJavadocInlineForbidden
+ InputSummaryJavadocInlineDefault.InnerInputCorrectJavaDocParagraphCheck
- InputSummaryJavadocInlineForbidden.InnerInputCorrectJavaDocParagraphCheck
+ InputSummaryJavadocInlineForbidden
- InputSummaryJavadocInlineForbidden.TestClass
+ InputSummaryJavadocInlineForbidden.InnerInputCorrectJavaDocParagraphCheck
- InputSummaryJavadocInlineReturn
+ InputSummaryJavadocInlineForbidden.TestClass
- InputSummaryJavadocInlineReturn.NotAMethod
+ InputSummaryJavadocInlineReturn
- InputSummaryJavadocInlineReturn2
+ InputSummaryJavadocInlineReturn.NotAMethod
- InputSummaryJavadocInlineReturnForbidden
+ InputSummaryJavadocInlineReturn2
- InputSummaryJavadocNoPeriod
+ InputSummaryJavadocInlineReturnForbidden
- InputSummaryJavadocPeriod
+ InputSummaryJavadocNoPeriod
- InputSummaryJavadocPeriodAtEnd
+ InputSummaryJavadocPeriod
- InputSummaryJavadocTestForbiddenFragments
+ InputSummaryJavadocPeriodAtEnd
- InputSummaryJavadocTestForbiddenFragments2
+ InputSummaryJavadocTestForbiddenFragments
+
+ InputSummaryJavadocTestForbiddenFragments2
+
+
+
InputSummaryJavadocTestForbiddenFragments3
@@ -216,7 +221,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/utils/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/utils/package-frame.html
index c868d1b0e8..38c4fa9d14 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/utils/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/utils/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.utils
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.utils
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/utils/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/utils/package-summary.html
index 5093d8d2e6..54ef5f71af 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/utils/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/utils/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.utils
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.utils
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/writetag/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/writetag/package-frame.html
index 1eab19d84d..b4e6fcfa04 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/writetag/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/writetag/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.writetag
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.writetag
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/writetag/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/writetag/package-summary.html
index b564995227..b4754b72f1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/writetag/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/javadoc/writetag/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.writetag
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.javadoc.writetag
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -156,7 +156,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/booleanexpressioncomplexity/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/booleanexpressioncomplexity/package-frame.html
index 782551c690..7e971150cf 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/booleanexpressioncomplexity/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/booleanexpressioncomplexity/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.booleanexpressioncomplexity
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.booleanexpressioncomplexity
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/booleanexpressioncomplexity/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/booleanexpressioncomplexity/package-summary.html
index b7036e6642..148f7ca835 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/booleanexpressioncomplexity/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/booleanexpressioncomplexity/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.booleanexpressioncomplexity
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.booleanexpressioncomplexity
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -126,7 +126,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/aa/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/aa/package-frame.html
index 04e8472a2e..ba4b6bb605 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/aa/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/aa/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.a.aa
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.a.aa
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/aa/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/aa/package-summary.html
index 25ee31642b..081d25bbd2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/aa/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/aa/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.a.aa
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.a.aa
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/ab/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/ab/package-frame.html
index dae9b4741c..3a74c37075 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/ab/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/ab/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.a.ab
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.a.ab
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/ab/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/ab/package-summary.html
index 753c47c73d..e5701bb810 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/ab/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/a/ab/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.a.ab
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.a.ab
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/b/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/b/package-frame.html
index 6a20efd5e9..4a14498a40 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/b/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/b/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.b
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.b
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/b/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/b/package-summary.html
index 8dcb453bdc..f057d80b0f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/b/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/b/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.b
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.b
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/c/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/c/package-frame.html
index 2bc58a20c8..7cb7bce244 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/c/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/c/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.c
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.c
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/c/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/c/package-summary.html
index 11f66b9099..bc29a3005c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/c/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/inputs/c/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.c
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling.inputs.c
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/package-frame.html
index ef16ead3ac..51bc013a2b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/package-summary.html
index 7e7f41dcb1..6277bf931e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classdataabstractioncoupling/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classdataabstractioncoupling
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -226,7 +226,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/aa/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/aa/package-frame.html
index d2000b63ce..41033d28cd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/aa/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/aa/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.a.aa
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.a.aa
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/aa/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/aa/package-summary.html
index ee964cee66..5e27f1d6a6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/aa/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/aa/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.a.aa
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.a.aa
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/ab/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/ab/package-frame.html
index f89f8ad21c..9eef871af0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/ab/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/ab/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.a.ab
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.a.ab
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/ab/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/ab/package-summary.html
index f4abbf5a49..c09c19c6b9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/ab/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/a/ab/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.a.ab
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.a.ab
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/b/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/b/package-frame.html
index 8c37bf933a..d893f3fff0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/b/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/b/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.b
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.b
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/b/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/b/package-summary.html
index bc5878b1e8..07e1c2ea23 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/b/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/b/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.b
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.b
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/c/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/c/package-frame.html
index 0c7d715508..48183ab287 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/c/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/c/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.c
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.c
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/c/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/c/package-summary.html
index db4f8cd294..6a4cac017e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/c/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/inputs/c/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.c
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity.inputs.c
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/package-frame.html
index 1e6aa2d496..c2507bd618 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/package-summary.html
index 200a9b33e0..f82718472b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/classfanoutcomplexity/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.classfanoutcomplexity
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -496,7 +496,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/cyclomaticcomplexity/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/cyclomaticcomplexity/package-frame.html
index 3e6168e28c..2f57d6cb6e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/cyclomaticcomplexity/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/cyclomaticcomplexity/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.cyclomaticcomplexity
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.cyclomaticcomplexity
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/cyclomaticcomplexity/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/cyclomaticcomplexity/package-summary.html
index 3499491592..e9c7a49b9c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/cyclomaticcomplexity/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/cyclomaticcomplexity/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.cyclomaticcomplexity
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.cyclomaticcomplexity
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/javancss/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/javancss/package-frame.html
index ebb591f7a6..b5afef001b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/javancss/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/javancss/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.javancss
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.javancss
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/javancss/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/javancss/package-summary.html
index 6de771e1e1..96d8651eae 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/javancss/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/javancss/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.javancss
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.javancss
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -151,7 +151,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/npathcomplexity/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/npathcomplexity/package-frame.html
index 77adb488d8..d61136a078 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/npathcomplexity/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/npathcomplexity/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.npathcomplexity
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.npathcomplexity
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/npathcomplexity/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/npathcomplexity/package-summary.html
index 65b2c10885..a4596e6ba1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/npathcomplexity/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/npathcomplexity/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.npathcomplexity
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics.npathcomplexity
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -116,7 +116,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/package-frame.html
index 1391daea54..6fcd9b8a86 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/package-summary.html
index 17e7487c9d..2c6f49c937 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/metrics/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.metrics
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -136,7 +136,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/classmemberimpliedmodifier/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/classmemberimpliedmodifier/package-frame.html
index 4a2b25e3f9..de8fe56fe3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/classmemberimpliedmodifier/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/classmemberimpliedmodifier/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.classmemberimpliedmodifier
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.classmemberimpliedmodifier
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/classmemberimpliedmodifier/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/classmemberimpliedmodifier/package-summary.html
index 8e69e3361a..e7cadc1700 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/classmemberimpliedmodifier/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/classmemberimpliedmodifier/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.classmemberimpliedmodifier
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.classmemberimpliedmodifier
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -426,7 +426,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/interfacememberimpliedmodifier/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/interfacememberimpliedmodifier/package-frame.html
index a3fb90e533..85b13575d0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/interfacememberimpliedmodifier/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/interfacememberimpliedmodifier/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.interfacememberimpliedmodifier
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.interfacememberimpliedmodifier
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/interfacememberimpliedmodifier/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/interfacememberimpliedmodifier/package-summary.html
index cb38011a5b..334011bb06 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/interfacememberimpliedmodifier/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/interfacememberimpliedmodifier/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.interfacememberimpliedmodifier
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.interfacememberimpliedmodifier
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -531,7 +531,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/modifierorder/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/modifierorder/package-frame.html
index c4673ca1e1..479acc3eec 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/modifierorder/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/modifierorder/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.modifierorder
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.modifierorder
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/modifierorder/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/modifierorder/package-summary.html
index 2113736144..3e935f3c98 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/modifierorder/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/modifierorder/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.modifierorder
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.modifierorder
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -181,7 +181,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/package-frame.html
index ed82694f1d..9804d2c82d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/package-summary.html
index 8c40a77b1e..87ee050bed 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -116,7 +116,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/redundantmodifier/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/redundantmodifier/package-frame.html
index 5c0e94b4d7..f84160faf6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/redundantmodifier/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/redundantmodifier/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.redundantmodifier
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.redundantmodifier
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/redundantmodifier/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/redundantmodifier/package-summary.html
index 56212e68e0..20ef594ba4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/redundantmodifier/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/modifier/redundantmodifier/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.redundantmodifier
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.modifier.redundantmodifier
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -516,7 +516,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/MemberNameCheckExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/MemberNameCheckExamplesTest.html
index c2da2e4ecd..6f6b771545 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/MemberNameCheckExamplesTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/MemberNameCheckExamplesTest.html
@@ -27,12 +27,12 @@
19
20 package com.puppycrawl.tools.checkstyle.checks.naming;
21
-22 import org.junit.jupiter.api.Disabled;
-23 import org.junit.jupiter.api.Test;
-24
-25 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
-26
-27 @Disabled("until https://github.com/checkstyle/checkstyle/issues/13345" )
+22 import static com.puppycrawl.tools.checkstyle.checks.naming.MemberNameCheck.MSG_INVALID_PATTERN;
+23
+24 import org.junit.jupiter.api.Test;
+25
+26 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+27
28 public class MemberNameCheckExamplesTest extends AbstractExamplesModuleTestSupport {
29 @Override
30 protected String getPackageLocation() {
@@ -42,30 +42,35 @@
34 @Test
35 public void testExample1() throws Exception {
36 final String[] expected = {
-37
-38 };
-39
-40 verifyWithInlineConfigParser(getPath("Example1.txt" ), expected);
-41 }
+37 "21:14: " + getCheckMessage(MSG_INVALID_PATTERN, "NUM1" , "^[a-z][a-zA-Z0-9]*$" ),
+38 "23:17: " + getCheckMessage(MSG_INVALID_PATTERN, "NUM2" , "^[a-z][a-zA-Z0-9]*$" ),
+39 "25:7: " + getCheckMessage(MSG_INVALID_PATTERN, "NUM3" , "^[a-z][a-zA-Z0-9]*$" ),
+40 "27:15: " + getCheckMessage(MSG_INVALID_PATTERN, "NUM4" , "^[a-z][a-zA-Z0-9]*$" ),
+41 };
42
-43 @Test
-44 public void testExample2() throws Exception {
-45 final String[] expected = {
-46
-47 };
-48
-49 verifyWithInlineConfigParser(getPath("Example2.txt" ), expected);
-50 }
-51
-52 @Test
-53 public void testExample3() throws Exception {
-54 final String[] expected = {
+43 verifyWithInlineConfigParser(getPath("Example1.java" ), expected);
+44 }
+45
+46 @Test
+47 public void testExample2() throws Exception {
+48 final String[] expected = {
+49 "16:14: " + getCheckMessage(MSG_INVALID_PATTERN, "num1" , "^m[A-Z][a-zA-Z0-9]*$" ),
+50 "20:15: " + getCheckMessage(MSG_INVALID_PATTERN, "num4" , "^m[A-Z][a-zA-Z0-9]*$" ),
+51 };
+52
+53 verifyWithInlineConfigParser(getPath("Example2.java" ), expected);
+54 }
55
-56 };
-57
-58 verifyWithInlineConfigParser(getPath("Example3.txt" ), expected);
-59 }
-60 }
+56 @Test
+57 public void testExample3() throws Exception {
+58 final String[] expected = {
+59 "16:17: " + getCheckMessage(MSG_INVALID_PATTERN, "NUM2" , "^[a-z][a-zA-Z0-9]*$" ),
+60 "18:7: " + getCheckMessage(MSG_INVALID_PATTERN, "NUM3" , "^[a-z][a-zA-Z0-9]*$" ),
+61 };
+62
+63 verifyWithInlineConfigParser(getPath("Example3.java" ), expected);
+64 }
+65 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/MethodNameCheckExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/MethodNameCheckExamplesTest.html
index 55911ad83a..302903f4f4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/MethodNameCheckExamplesTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/MethodNameCheckExamplesTest.html
@@ -27,63 +27,66 @@
19
20 package com.puppycrawl.tools.checkstyle.checks.naming;
21
-22 import org.junit.jupiter.api.Disabled;
-23 import org.junit.jupiter.api.Test;
+22 import static com.puppycrawl.tools.checkstyle.checks.naming.MethodNameCheck.MSG_INVALID_PATTERN;
+23 import static com.puppycrawl.tools.checkstyle.checks.naming.MethodNameCheck.MSG_KEY;
24
-25 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+25 import org.junit.jupiter.api.Test;
26
-27 @Disabled("until https://github.com/checkstyle/checkstyle/issues/13345" )
-28 public class MethodNameCheckExamplesTest extends AbstractExamplesModuleTestSupport {
-29 @Override
-30 protected String getPackageLocation() {
-31 return "com/puppycrawl/tools/checkstyle/checks/naming/methodname" ;
-32 }
-33
-34 @Test
-35 public void testExample1() throws Exception {
-36 final String[] expected = {
-37
-38 };
-39
-40 verifyWithInlineConfigParser(getPath("Example1.txt" ), expected);
-41 }
-42
-43 @Test
-44 public void testExample2() throws Exception {
-45 final String[] expected = {
-46
-47 };
-48
-49 verifyWithInlineConfigParser(getPath("Example2.txt" ), expected);
-50 }
-51
-52 @Test
-53 public void testExample3() throws Exception {
-54 final String[] expected = {
-55
-56 };
+27 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+28
+29 public class MethodNameCheckExamplesTest extends AbstractExamplesModuleTestSupport {
+30 @Override
+31 protected String getPackageLocation() {
+32 return "com/puppycrawl/tools/checkstyle/checks/naming/methodname" ;
+33 }
+34
+35 @Test
+36 public void testExample1() throws Exception {
+37 final String[] expected = {
+38 "15:16: " + getCheckMessage(MSG_INVALID_PATTERN, "Method3" , "^[a-z][a-zA-Z0-9]*$" ),
+39 "16:15: " + getCheckMessage(MSG_INVALID_PATTERN, "Method4" , "^[a-z][a-zA-Z0-9]*$" ),
+40 };
+41
+42 verifyWithInlineConfigParser(getPath("Example1.java" ), expected);
+43 }
+44
+45 @Test
+46 public void testExample2() throws Exception {
+47 final String[] expected = {
+48 "16:15: " + getCheckMessage(MSG_INVALID_PATTERN, "Method2" , "^[a-z](_?[a-zA-Z0-9]+)*$" ),
+49 };
+50
+51 verifyWithInlineConfigParser(getPath("Example2.java" ), expected);
+52 }
+53
+54 @Test
+55 public void testExample3() throws Exception {
+56 final String[] expected = {
57
-58 verifyWithInlineConfigParser(getPath("Example3.txt" ), expected);
-59 }
-60
-61 @Test
-62 public void testExample4() throws Exception {
-63 final String[] expected = {
-64
-65 };
-66
-67 verifyWithInlineConfigParser(getPath("Example4.txt" ), expected);
-68 }
-69
-70 @Test
-71 public void testExample5() throws Exception {
-72 final String[] expected = {
-73
-74 };
-75
-76 verifyWithInlineConfigParser(getPath("Example5.txt" ), expected);
-77 }
-78 }
+58 };
+59
+60 verifyWithInlineConfigParser(getPath("Example3.java" ), expected);
+61 }
+62
+63 @Test
+64 public void testExample4() throws Exception {
+65 final String[] expected = {
+66 "17:15: " + getCheckMessage(MSG_KEY, "Example4" ),
+67 };
+68
+69 verifyWithInlineConfigParser(getPath("Example4.java" ), expected);
+70 }
+71
+72 @Test
+73 public void testExample5() throws Exception {
+74 final String[] expected = {
+75 "19:16: " + getCheckMessage(MSG_INVALID_PATTERN, "Method3" , "^[a-z](_?[a-zA-Z0-9]+)*$" ),
+76 "20:8: " + getCheckMessage(MSG_INVALID_PATTERN, "Method4" , "^[a-z](_?[a-zA-Z0-9]+)*$" ),
+77 };
+78
+79 verifyWithInlineConfigParser(getPath("Example5.java" ), expected);
+80 }
+81 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abbreviationaswordinname/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abbreviationaswordinname/package-frame.html
index 821ea63771..80a5c6d998 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abbreviationaswordinname/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abbreviationaswordinname/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.abbreviationaswordinname
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.abbreviationaswordinname
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abbreviationaswordinname/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abbreviationaswordinname/package-summary.html
index e7184ca4ae..f37c25d03d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abbreviationaswordinname/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abbreviationaswordinname/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.abbreviationaswordinname
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.abbreviationaswordinname
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -2161,7 +2161,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abstractclassname/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abstractclassname/package-frame.html
index 9b48a417d9..c0f7d265ba 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abstractclassname/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abstractclassname/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.abstractclassname
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.abstractclassname
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abstractclassname/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abstractclassname/package-summary.html
index 0a006ceab1..3c2662c580 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abstractclassname/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/abstractclassname/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.abstractclassname
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.abstractclassname
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -416,7 +416,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/catchparametername/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/catchparametername/package-frame.html
index d0f43d71f9..86d2ccdf6d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/catchparametername/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/catchparametername/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.catchparametername
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.catchparametername
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/catchparametername/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/catchparametername/package-summary.html
index 1107f5d018..a0acc876ff 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/catchparametername/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/catchparametername/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.catchparametername
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.catchparametername
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/classtypeparametername/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/classtypeparametername/package-frame.html
index 200ccb705d..939658ae86 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/classtypeparametername/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/classtypeparametername/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.classtypeparametername
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.classtypeparametername
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/classtypeparametername/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/classtypeparametername/package-summary.html
index 79378f1797..4f5a47c22b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/classtypeparametername/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/classtypeparametername/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.classtypeparametername
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.classtypeparametername
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -156,7 +156,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/constantname/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/constantname/package-frame.html
index 24d9f4bba4..5b73a4e833 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/constantname/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/constantname/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.constantname
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.constantname
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/constantname/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/constantname/package-summary.html
index d0349c2cc2..d9d80d9c09 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/constantname/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/constantname/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.constantname
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.constantname
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -196,7 +196,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/interfacetypeparametername/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/interfacetypeparametername/package-frame.html
index 12d8f2ebbe..cc0522ae57 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/interfacetypeparametername/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/interfacetypeparametername/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.interfacetypeparametername
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.interfacetypeparametername
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/interfacetypeparametername/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/interfacetypeparametername/package-summary.html
index 7686eb3432..83b0ad305a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/interfacetypeparametername/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/interfacetypeparametername/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.interfacetypeparametername
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.interfacetypeparametername
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -156,7 +156,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/lambdaparametername/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/lambdaparametername/package-frame.html
index 6d8870ef68..f9a81efeb0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/lambdaparametername/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/lambdaparametername/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.lambdaparametername
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.lambdaparametername
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/lambdaparametername/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/lambdaparametername/package-summary.html
index 597b4cbf37..4d210edcba 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/lambdaparametername/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/lambdaparametername/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.lambdaparametername
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.lambdaparametername
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localfinalvariablename/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localfinalvariablename/package-frame.html
index 907eb174c6..852ea857f4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localfinalvariablename/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localfinalvariablename/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.localfinalvariablename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.localfinalvariablename
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localfinalvariablename/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localfinalvariablename/package-summary.html
index f17212b1d3..4247b8941b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localfinalvariablename/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localfinalvariablename/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.localfinalvariablename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.localfinalvariablename
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -156,7 +156,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localvariablename/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localvariablename/package-frame.html
index 6f48fb3e81..a2e6e39461 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localvariablename/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localvariablename/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.localvariablename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.localvariablename
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localvariablename/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localvariablename/package-summary.html
index edbe6353c4..7e290ab4ab 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localvariablename/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/localvariablename/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.localvariablename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.localvariablename
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -131,7 +131,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/Example1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/Example1.html
new file mode 100644
index 0000000000..7ed6df5073
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/Example1.html
@@ -0,0 +1,43 @@
+
+
+
+Example1 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checks.naming.membername;
+10
+11
+12 class Example1 {
+13 public int num1;
+14 protected int num2;
+15 final int num3 = 3;
+16 private int num4;
+17
+18 static int num5;
+19 public static final int CONSTANT = 1;
+20
+21 public int NUM1;
+22
+23 protected int NUM2;
+24
+25 int NUM3;
+26
+27 private int NUM4;
+28
+29 }
+30
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/Example2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/Example2.html
new file mode 100644
index 0000000000..c440311c01
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/Example2.html
@@ -0,0 +1,36 @@
+
+
+
+
Example2 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12 package com.puppycrawl.tools.checkstyle.checks.naming.membername;
+13
+14
+15 class Example2 {
+16 public int num1;
+17
+18 protected int num2;
+19 int num3;
+20 private int num4;
+21
+22 }
+23
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/Example3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/Example3.html
new file mode 100644
index 0000000000..f985c37aa5
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/Example3.html
@@ -0,0 +1,35 @@
+
+
+
+
Example3 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11 package com.puppycrawl.tools.checkstyle.checks.naming.membername;
+12
+13
+14 class Example3 {
+15 public int NUM1;
+16 protected int NUM2;
+17
+18 int NUM3;
+19
+20 private int NUM4;
+21 }
+22
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/package-frame.html
index f5eddd10fc..19d62c8188 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.membername
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.membername
@@ -14,6 +14,15 @@
Classes
Direction
+
+
+ Example1
+
+
+ Example2
+
+
+ Example3
In
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/package-summary.html
index bbdb657a81..0ac806b9a9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/membername/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.membername
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.membername
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -63,100 +63,115 @@ Package com.puppycrawl.tools.checkstyle.checks
- In
+ Example1
- InputMemberName
+ Example2
- InputMemberName2
+ Example3
- InputMemberName3
+ In
- InputMemberName4
+ InputMemberName
- InputMemberName5
+ InputMemberName2
- InputMemberName6
+ InputMemberName3
- InputMemberName7
+ InputMemberName4
- InputMemberNameExtended
+ InputMemberName5
- InputMemberNameExtended.Inner
+ InputMemberName6
- InputMemberNameInner
+ InputMemberName7
- InputMemberNameInner.InnerAnnotation
+ InputMemberNameExtended
- InputMemberNameInner.InnerEnum
+ InputMemberNameExtended.Inner
- InputMemberNameInner.InnerInner2
+ InputMemberNameInner
- InputMemberNameInner.InnerInterface2
+ InputMemberNameInner.InnerAnnotation
- InputMemberNameInner.InnerInterface2.InnerInterfaceInnerClass
+ InputMemberNameInner.InnerEnum
- InputMemberNameInner.Inter
+ InputMemberNameInner.InnerInner2
- InputMemberNameSimple
+ InputMemberNameInner.InnerInterface2
- InputMemberNameSimple2
+ InputMemberNameInner.InnerInterface2.InnerInterfaceInnerClass
+
+ InputMemberNameInner.Inter
+
+
+
+
+ InputMemberNameSimple
+
+
+
+
+ InputMemberNameSimple2
+
+
+
MyEnum1
@@ -181,7 +196,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example1.html
new file mode 100644
index 0000000000..3ca15e181d
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example1.html
@@ -0,0 +1,31 @@
+
+
+
+Example1 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9 package com.puppycrawl.tools.checkstyle.checks.naming.methodname;
+10
+11
+12 class Example1 {
+13 public void method1() {}
+14 protected void method2() {}
+15 private void Method3() {}
+16 public void Method4() {}
+17 }
+18
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example2.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example2.html
new file mode 100644
index 0000000000..e5c60c5b42
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example2.html
@@ -0,0 +1,31 @@
+
+
+
+
Example2 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11 package com.puppycrawl.tools.checkstyle.checks.naming.methodname;
+12
+13
+14 class Example2 {
+15 public void method1() {}
+16 public void Method2() {}
+17 }
+18
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example3.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example3.html
new file mode 100644
index 0000000000..98189d0f47
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example3.html
@@ -0,0 +1,32 @@
+
+
+
+
Example3 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12 package com.puppycrawl.tools.checkstyle.checks.naming.methodname;
+13
+14
+15 class Example3 {
+16 public Example3 () {}
+17 public void Example3 () {}
+18 }
+19
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example4.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example4.html
new file mode 100644
index 0000000000..4107ed3c35
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example4.html
@@ -0,0 +1,32 @@
+
+
+
+
Example4 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12 package com.puppycrawl.tools.checkstyle.checks.naming.methodname;
+13
+14
+15 class Example4 {
+16 public Example4 () {}
+17 public void Example4 () {}
+18 }
+19
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example5.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example5.html
new file mode 100644
index 0000000000..df78813b12
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/Example5.html
@@ -0,0 +1,35 @@
+
+
+
+
Example5 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13 package com.puppycrawl.tools.checkstyle.checks.naming.methodname;
+14
+15
+16 class Example5 {
+17 public void Method1() {}
+18 protected void Method2() {}
+19 private void Method3() {}
+20 void Method4() {}
+21 }
+22
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/package-frame.html
index 730a2ff371..0c93a2e297 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.methodname
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.methodname
@@ -13,6 +13,21 @@
com.puppycraw
Classes
+ Example1
+
+
+ Example2
+
+
+ Example3
+
+
+ Example4
+
+
+ Example5
+
+
InputMethodNameEqualClassName
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/package-summary.html
index c7f176f16e..e48b364453 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodname/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.methodname
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.methodname
@@ -23,7 +23,7 @@
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
@@ -58,120 +58,145 @@ Package com.puppycrawl.tools.checkstyle.checks
- InputMethodNameEqualClassName
+ Example1
- InputMethodNameEqualClassName.Inner
+ Example2
- InputMethodNameEqualClassName2
+ Example3
- InputMethodNameEqualClassName2.Inner
+ Example4
- InputMethodNameEqualClassName3
+ Example5
- InputMethodNameEqualClassName3.Inner
+ InputMethodNameEqualClassName
- InputMethodNameExtra
+ InputMethodNameEqualClassName.Inner
- InputMethodNameExtra.ChangeHistoryDisplayName
+ InputMethodNameEqualClassName2
- InputMethodNameExtra.More
+ InputMethodNameEqualClassName2.Inner
- InputMethodNameExtra.More.ViewChangeHistoryBaseAction
+ InputMethodNameEqualClassName3
- InputMethodNameExtra.More.ViewChangeHistoryBaseAction.ChangeHistoryDisplayName
+ InputMethodNameEqualClassName3.Inner
- InputMethodNameOverriddenMethods
+ InputMethodNameExtra
- InputMethodNamePrivateMethodsInInterfaces
+ InputMethodNameExtra.ChangeHistoryDisplayName
- InputMethodNamePublicMethodsInInterfaces
+ InputMethodNameExtra.More
- InputMethodNameSimple
+ InputMethodNameExtra.More.ViewChangeHistoryBaseAction
- InputMethodNameSimple2
+ InputMethodNameExtra.More.ViewChangeHistoryBaseAction.ChangeHistoryDisplayName
- MyEnum1
+ InputMethodNameOverriddenMethods
- Outer
+ InputMethodNamePrivateMethodsInInterfaces
- Outer2
+ InputMethodNamePublicMethodsInInterfaces
- Outer3
+ InputMethodNameSimple
- SomeClass
+ InputMethodNameSimple2
- SweetInterface
+ MyEnum1
- SweetInterface2
+ Outer
+
+ Outer2
+
+
+
+
+ Outer3
+
+
+
+
+ SomeClass
+
+
+
+
+ SweetInterface
+
+
+
+
+ SweetInterface2
+
+
+
SweetInterface3
@@ -196,7 +221,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodtypeparametername/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodtypeparametername/package-frame.html
index c97d5513d6..7ffa957e6a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodtypeparametername/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodtypeparametername/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.methodtypeparametername
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.methodtypeparametername
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodtypeparametername/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodtypeparametername/package-summary.html
index 5afd006651..8bc978383e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodtypeparametername/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/methodtypeparametername/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.methodtypeparametername
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.methodtypeparametername
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -156,7 +156,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/package-frame.html
index c2e6978c11..d33ceb880b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/package-summary.html
index e5e45e18c6..54f91aa0ff 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -281,7 +281,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/packagename/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/packagename/package-frame.html
index 1ef295ddf1..6e0520a1ea 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/packagename/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/packagename/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.packagename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.packagename
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/packagename/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/packagename/package-summary.html
index c50481ba0d..9dd58ccbe5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/packagename/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/packagename/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.packagename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.packagename
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/parametername/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/parametername/package-frame.html
index 0029df4bf3..cfe46bd57d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/parametername/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/parametername/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.parametername
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.parametername
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/parametername/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/parametername/package-summary.html
index 879c3556cd..54c0bd7de3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/parametername/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/parametername/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.parametername
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.parametername
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -186,7 +186,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/staticvariablename/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/staticvariablename/package-frame.html
index 68e993c768..dd8fc002f7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/staticvariablename/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/staticvariablename/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.staticvariablename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.staticvariablename
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/staticvariablename/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/staticvariablename/package-summary.html
index e9d4654c4f..ece8a7b0b7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/staticvariablename/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/staticvariablename/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.staticvariablename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.staticvariablename
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -121,7 +121,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/typename/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/typename/package-frame.html
index d16eaa393c..7fa56d2375 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/typename/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/typename/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.typename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.typename
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/typename/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/typename/package-summary.html
index 70d10ac5b3..2d2da47d7e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/typename/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/naming/typename/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.typename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.naming.typename
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -226,7 +226,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/newlineatendoffile/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/newlineatendoffile/package-frame.html
index e2c546c67f..dd9b10d83f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/newlineatendoffile/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/newlineatendoffile/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.newlineatendoffile
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.newlineatendoffile
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/newlineatendoffile/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/newlineatendoffile/package-summary.html
index f25fe9633b..53996a098f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/newlineatendoffile/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/newlineatendoffile/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.newlineatendoffile
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.newlineatendoffile
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -126,7 +126,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/nocodeinfile/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/nocodeinfile/package-frame.html
index 3eedbb94d5..317a039c57 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/nocodeinfile/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/nocodeinfile/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.nocodeinfile
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.nocodeinfile
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/nocodeinfile/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/nocodeinfile/package-summary.html
index 6658694cba..c42a816ab6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/nocodeinfile/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/nocodeinfile/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.nocodeinfile
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.nocodeinfile
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/outertypefilename/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/outertypefilename/package-frame.html
index cad027c282..d2be634b13 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/outertypefilename/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/outertypefilename/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.outertypefilename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.outertypefilename
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/outertypefilename/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/outertypefilename/package-summary.html
index 3b3823cd5b..59cb8d6d69 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/outertypefilename/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/outertypefilename/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.outertypefilename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.outertypefilename
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -201,7 +201,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/package-frame.html
index 245623fbc0..8370a00fd0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/package-summary.html
index c98ab6e3e7..35547420ce 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -226,7 +226,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/package-frame.html
index bbc389cd3f..60fc7b6b75 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/package-summary.html
index 255ab1629e..959ec2f811 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -126,7 +126,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexp/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexp/package-frame.html
index 841c56fe9a..d890167dd7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexp/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexp/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexp
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexp
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexp/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexp/package-summary.html
index 51a7c78e62..c39ab930c1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexp/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexp/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexp
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexp
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -791,7 +791,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpmultiline/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpmultiline/package-frame.html
index 4db0f884d5..3dad7fa551 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpmultiline/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpmultiline/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexpmultiline
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexpmultiline
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpmultiline/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpmultiline/package-summary.html
index 03df9be66a..5f90fd5b2e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpmultiline/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpmultiline/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexpmultiline
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexpmultiline
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -491,7 +491,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexponfilename/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexponfilename/package-frame.html
index d1c961fd48..803c03599d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexponfilename/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexponfilename/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexponfilename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexponfilename
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexponfilename/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexponfilename/package-summary.html
index d8816e01a3..e1f97076cd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexponfilename/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexponfilename/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexponfilename
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexponfilename
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -121,7 +121,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsingleline/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsingleline/package-frame.html
index 4cad346c95..00166e17e8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsingleline/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsingleline/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexpsingleline
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexpsingleline
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsingleline/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsingleline/package-summary.html
index 7d6f8d1b85..abca6b462b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsingleline/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsingleline/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexpsingleline
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexpsingleline
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -446,7 +446,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsinglelinejava/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsinglelinejava/package-frame.html
index 83d7d2402e..8cd72ef7ba 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsinglelinejava/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsinglelinejava/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexpsinglelinejava
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexpsinglelinejava
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsinglelinejava/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsinglelinejava/package-summary.html
index 31eab279bd..38e540183c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsinglelinejava/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/regexp/regexpsinglelinejava/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexpsinglelinejava
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.regexp.regexpsinglelinejava
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -451,7 +451,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/LineLengthCheckTest.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/LineLengthCheckTest.html
index b7820a3364..2b08e90ecd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/LineLengthCheckTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/LineLengthCheckTest.html
@@ -29,104 +29,131 @@
21
22 import static com.puppycrawl.tools.checkstyle.checks.sizes.LineLengthCheck.MSG_KEY;
23
-24 import org.junit.jupiter.api.Test;
+24 import java.nio.charset.CodingErrorAction;
25
-26 import com.puppycrawl.tools.checkstyle.AbstractModuleTestSupport;
+26 import org.junit.jupiter.api.Test;
27
-28 public class LineLengthCheckTest extends AbstractModuleTestSupport {
-29
-30 @Override
-31 protected String getPackageLocation() {
-32 return "com/puppycrawl/tools/checkstyle/checks/sizes/linelength" ;
-33 }
-34
-35 @Test
-36 public void testSimple()
-37 throws Exception {
-38 final String[] expected = {
-39 "22: " + getCheckMessage(MSG_KEY, 80, 81),
-40 "149: " + getCheckMessage(MSG_KEY, 80, 83),
-41 };
-42 verifyWithInlineConfigParser(
-43 getPath("InputLineLengthSimple.java" ), expected);
-44 }
-45
-46 @Test
-47 public void shouldLogActualLineLength()
-48 throws Exception {
-49 final String[] expected = {
-50 "23: 80,81" ,
-51 "150: 80,83" ,
-52 };
-53 verifyWithInlineConfigParser(
-54 getPath("InputLineLengthSimple1.java" ), expected);
-55 }
-56
-57 @Test
-58 public void shouldNotLogLongImportStatements() throws Exception {
-59 final String[] expected = {
-60 "18: " + getCheckMessage(MSG_KEY, 80, 100),
-61 };
-62 verifyWithInlineConfigParser(
-63 getPath("InputLineLengthLongImportStatements.java" ), expected);
-64 }
-65
-66 @Test
-67 public void shouldNotLogLongPackageStatements() throws Exception {
-68 final String[] expected = {
-69 "17: " + getCheckMessage(MSG_KEY, 80, 100),
-70 };
-71 verifyWithInlineConfigParser(
-72 getNonCompilablePath("InputLineLengthLongPackageStatement.java" ),
-73 expected);
-74 }
-75
-76 @Test
-77 public void shouldNotLogLongLinks() throws Exception {
-78 final String[] expected = {
-79 "13: " + getCheckMessage(MSG_KEY, 80, 111),
-80 };
-81 verifyWithInlineConfigParser(
-82 getPath("InputLineLengthLongLink.java" ), expected);
-83 }
-84
-85 @Test
-86 public void countUnicodePointsOnce() throws Exception {
-87 final String[] expected = {
-88 "15: " + getCheckMessage(MSG_KEY, 100, 149),
-89 "16: " + getCheckMessage(MSG_KEY, 100, 149),
-90 };
-91 verifyWithInlineConfigParser(getPath("InputLineLengthUnicodeChars.java" ), expected);
-92
-93 }
-94
-95 @Test
-96 public void testLineLengthIgnoringPackageStatements() throws Exception {
-97 final String[] expected = {
-98 "13: " + getCheckMessage(MSG_KEY, 75, 76),
-99 "22: " + getCheckMessage(MSG_KEY, 75, 86),
-100 "26: " + getCheckMessage(MSG_KEY, 75, 76),
-101 "34: " + getCheckMessage(MSG_KEY, 75, 77),
-102 };
-103
-104 verifyWithInlineConfigParser(
-105 getNonCompilablePath("InputLineLengthIgnoringPackageStatements.java" ), expected);
-106 }
+28 import com.puppycrawl.tools.checkstyle.AbstractModuleTestSupport;
+29 import com.puppycrawl.tools.checkstyle.DefaultConfiguration;
+30 import de.thetaphi.forbiddenapis.SuppressForbidden;
+31
+32 public class LineLengthCheckTest extends AbstractModuleTestSupport {
+33
+34 @Override
+35 protected String getPackageLocation() {
+36 return "com/puppycrawl/tools/checkstyle/checks/sizes/linelength" ;
+37 }
+38
+39 @Test
+40 public void testSimple()
+41 throws Exception {
+42 final String[] expected = {
+43 "22: " + getCheckMessage(MSG_KEY, 80, 81),
+44 "149: " + getCheckMessage(MSG_KEY, 80, 83),
+45 };
+46 verifyWithInlineConfigParser(
+47 getPath("InputLineLengthSimple.java" ), expected);
+48 }
+49
+50 @Test
+51 public void shouldLogActualLineLength()
+52 throws Exception {
+53 final String[] expected = {
+54 "23: 80,81" ,
+55 "150: 80,83" ,
+56 };
+57 verifyWithInlineConfigParser(
+58 getPath("InputLineLengthSimple1.java" ), expected);
+59 }
+60
+61 @Test
+62 public void shouldNotLogLongImportStatements() throws Exception {
+63 final String[] expected = {
+64 "18: " + getCheckMessage(MSG_KEY, 80, 100),
+65 };
+66 verifyWithInlineConfigParser(
+67 getPath("InputLineLengthLongImportStatements.java" ), expected);
+68 }
+69
+70 @Test
+71 public void shouldNotLogLongPackageStatements() throws Exception {
+72 final String[] expected = {
+73 "17: " + getCheckMessage(MSG_KEY, 80, 100),
+74 };
+75 verifyWithInlineConfigParser(
+76 getNonCompilablePath("InputLineLengthLongPackageStatement.java" ),
+77 expected);
+78 }
+79
+80 @Test
+81 public void shouldNotLogLongLinks() throws Exception {
+82 final String[] expected = {
+83 "13: " + getCheckMessage(MSG_KEY, 80, 111),
+84 };
+85 verifyWithInlineConfigParser(
+86 getPath("InputLineLengthLongLink.java" ), expected);
+87 }
+88
+89 @Test
+90 public void countUnicodePointsOnce() throws Exception {
+91 final String[] expected = {
+92 "15: " + getCheckMessage(MSG_KEY, 100, 149),
+93 "16: " + getCheckMessage(MSG_KEY, 100, 149),
+94 };
+95 verifyWithInlineConfigParser(getPath("InputLineLengthUnicodeChars.java" ), expected);
+96
+97 }
+98
+99 @Test
+100 public void testLineLengthIgnoringPackageStatements() throws Exception {
+101 final String[] expected = {
+102 "13: " + getCheckMessage(MSG_KEY, 75, 76),
+103 "22: " + getCheckMessage(MSG_KEY, 75, 86),
+104 "26: " + getCheckMessage(MSG_KEY, 75, 76),
+105 "34: " + getCheckMessage(MSG_KEY, 75, 77),
+106 };
107
-108 @Test
-109 public void testLineLengthIgnoringImportStatements() throws Exception {
-110 final String[] expected = {
-111 "12: " + getCheckMessage(MSG_KEY, 75, 79),
-112 "21: " + getCheckMessage(MSG_KEY, 75, 81),
-113 "25: " + getCheckMessage(MSG_KEY, 75, 84),
-114 "33: " + getCheckMessage(MSG_KEY, 75, 77),
-115 };
-116
-117 verifyWithInlineConfigParser(
-118 getNonCompilablePath("InputLineLengthIgnoringImportStatements.java" ), expected);
-119 }
+108 verifyWithInlineConfigParser(
+109 getNonCompilablePath("InputLineLengthIgnoringPackageStatements.java" ), expected);
+110 }
+111
+112 @Test
+113 public void testLineLengthIgnoringImportStatements() throws Exception {
+114 final String[] expected = {
+115 "12: " + getCheckMessage(MSG_KEY, 75, 79),
+116 "21: " + getCheckMessage(MSG_KEY, 75, 81),
+117 "25: " + getCheckMessage(MSG_KEY, 75, 84),
+118 "33: " + getCheckMessage(MSG_KEY, 75, 77),
+119 };
120
-121 }
+121 verifyWithInlineConfigParser(
+122 getNonCompilablePath("InputLineLengthIgnoringImportStatements.java" ), expected);
+123 }
+124
+125
+126
+127
+128
+129
+130
+131
+132
+133 @SuppressForbidden
+134 @Test
+135 public void testUnmappableCharacters() throws Exception {
+136 final String[] expected = {
+137 "4: " + getCheckMessage(MSG_KEY, 75, 238),
+138 };
+139
+140 final DefaultConfiguration checkConfig = createModuleConfig(LineLengthCheck.class );
+141 checkConfig.addProperty("max" , "75" );
+142
+143 final DefaultConfiguration checkerConfig = createRootConfig(checkConfig);
+144 checkerConfig.addProperty("charset" , "IBM1098" );
+145
+146 verify(checkerConfig, getPath("InputLineLengthUnmappableCharacters.java" ), expected);
+147 }
+148 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/anoninnerlength/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/anoninnerlength/package-frame.html
index 12e7fe1cd2..18d440bd02 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/anoninnerlength/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/anoninnerlength/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.anoninnerlength
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.anoninnerlength
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/anoninnerlength/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/anoninnerlength/package-summary.html
index 5b166062ff..c537abe480 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/anoninnerlength/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/anoninnerlength/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.anoninnerlength
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.anoninnerlength
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/executablestatementcount/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/executablestatementcount/package-frame.html
index c8688c125a..934badbb85 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/executablestatementcount/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/executablestatementcount/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.executablestatementcount
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.executablestatementcount
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/executablestatementcount/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/executablestatementcount/package-summary.html
index edc69e4ebd..271592ef26 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/executablestatementcount/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/executablestatementcount/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.executablestatementcount
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.executablestatementcount
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -111,7 +111,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/filelength/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/filelength/package-frame.html
index fecd2b7efd..bf06460ce2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/filelength/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/filelength/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.filelength
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.filelength
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/filelength/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/filelength/package-summary.html
index d555d4ea48..ebbc81b061 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/filelength/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/filelength/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.filelength
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.filelength
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -141,7 +141,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/lambdabodylength/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/lambdabodylength/package-frame.html
index 5ca00b3967..49265b2d97 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/lambdabodylength/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/lambdabodylength/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.lambdabodylength
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.lambdabodylength
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/lambdabodylength/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/lambdabodylength/package-summary.html
index 88949c446b..020f6ffc3d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/lambdabodylength/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/lambdabodylength/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.lambdabodylength
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.lambdabodylength
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/InputLineLengthLongImportStatements.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/InputLineLengthLongImportStatements.html
index 570d88c55b..5a7260f985 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/InputLineLengthLongImportStatements.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/InputLineLengthLongImportStatements.html
@@ -17,8 +17,8 @@
9
10 package com.puppycrawl.tools.checkstyle.checks.sizes.linelength;
11
-12 import com.puppycrawl.tools.checkstyle.grammar.comments.InputFullOfSinglelineComments;
-13 import static com.puppycrawl.tools.checkstyle.grammar.comments.InputFullOfSinglelineComments.main;
+12 import java.util. HashMap;
+13 import java.util. HashSet;
14
15 public class InputLineLengthLongImportStatements {
16 @Override
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/InputLineLengthUnmappableCharacters.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/InputLineLengthUnmappableCharacters.html
new file mode 100644
index 0000000000..5828ef4a14
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/InputLineLengthUnmappableCharacters.html
@@ -0,0 +1,18 @@
+
+
+
+InputLineLengthUnmappableCharacters xref
+
+
+
+
+1 package com.puppycrawl.tools.checkstyle.checks.sizes.linelength;
+2
+3 public class InputLineLengthUnmappableCharacters {
+4 String a = "ᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀᾀ" ;
+5 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/package-frame.html
index 284a30dd76..0db4d2d728 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.linelength
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.linelength
@@ -32,6 +32,9 @@
Classes
InputLineLengthUnicodeChars
+
+
+ InputLineLengthUnmappableCharacters
MyEnum1
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/package-summary.html
index 0c25b7ccf2..9ebc9c6d8f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/linelength/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.linelength
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.linelength
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -93,10 +93,15 @@ Package com.puppycrawl.tools.checkstyle.checks
- MyEnum1
+ InputLineLengthUnmappableCharacters
+
+ MyEnum1
+
+
+
MyEnum2
@@ -121,7 +126,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodcount/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodcount/package-frame.html
index 0f3c1376a9..3bf2c12e6d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodcount/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodcount/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.methodcount
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.methodcount
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodcount/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodcount/package-summary.html
index da9eda1e7d..35ca98c8de 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodcount/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodcount/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.methodcount
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.methodcount
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -161,7 +161,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodlength/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodlength/package-frame.html
index bbbc0e22b2..b1fd93d2e0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodlength/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodlength/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.methodlength
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.methodlength
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodlength/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodlength/package-summary.html
index 665f7e84ea..6a814ca75d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodlength/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/methodlength/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.methodlength
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.methodlength
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -171,7 +171,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/outertypenumber/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/outertypenumber/package-frame.html
index e90f04e939..8473f43a76 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/outertypenumber/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/outertypenumber/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.outertypenumber
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.outertypenumber
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/outertypenumber/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/outertypenumber/package-summary.html
index e9cb0e471a..fc3f23cb6a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/outertypenumber/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/outertypenumber/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.outertypenumber
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.outertypenumber
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -116,7 +116,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/package-frame.html
index 4201cc7697..9a398e51e9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/package-summary.html
index 5534dc227e..84646e602e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -176,7 +176,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/parameternumber/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/parameternumber/package-frame.html
index 4f0a7b9b36..ac87e75106 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/parameternumber/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/parameternumber/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.parameternumber
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.parameternumber
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/parameternumber/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/parameternumber/package-summary.html
index 129bd66da2..d5f49a2657 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/parameternumber/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/sizes/parameternumber/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.parameternumber
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.sizes.parameternumber
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -156,7 +156,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/suppresswarningsholder/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/suppresswarningsholder/package-frame.html
index daa30b50a1..33b8b9a0f7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/suppresswarningsholder/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/suppresswarningsholder/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.suppresswarningsholder
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.suppresswarningsholder
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/suppresswarningsholder/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/suppresswarningsholder/package-summary.html
index 1468625149..66c3c2c566 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/suppresswarningsholder/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/suppresswarningsholder/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.suppresswarningsholder
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.suppresswarningsholder
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -191,7 +191,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/todocomment/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/todocomment/package-frame.html
index 18b39deae9..2549949adf 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/todocomment/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/todocomment/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.todocomment
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.todocomment
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/todocomment/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/todocomment/package-summary.html
index 966fb05472..0dc858a9d8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/todocomment/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/todocomment/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.todocomment
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.todocomment
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/trailingcomment/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/trailingcomment/package-frame.html
index 24794655e2..6ba5296626 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/trailingcomment/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/trailingcomment/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.trailingcomment
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.trailingcomment
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/trailingcomment/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/trailingcomment/package-summary.html
index 29bc20e216..53d1948abe 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/trailingcomment/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/trailingcomment/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.trailingcomment
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.trailingcomment
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -116,7 +116,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/uncommentedmain/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/uncommentedmain/package-frame.html
index 49f6590c67..d93798a4e8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/uncommentedmain/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/uncommentedmain/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.uncommentedmain
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.uncommentedmain
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/uncommentedmain/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/uncommentedmain/package-summary.html
index dcfac9fc3f..ac24a5406c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/uncommentedmain/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/uncommentedmain/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.uncommentedmain
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.uncommentedmain
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -236,7 +236,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/upperell/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/upperell/package-frame.html
index 6019c72d71..6a1b7c3b5e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/upperell/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/upperell/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.upperell
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.upperell
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/upperell/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/upperell/package-summary.html
index b9e5ff18f8..6d12195c69 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/upperell/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/upperell/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.upperell
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.upperell
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -121,7 +121,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforinitializerpad/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforinitializerpad/package-frame.html
index 74f5f3232d..59dcd0fd41 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforinitializerpad/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforinitializerpad/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptyforinitializerpad
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptyforinitializerpad
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforinitializerpad/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforinitializerpad/package-summary.html
index dbe7a8c0cb..fe8b57b792 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforinitializerpad/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforinitializerpad/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptyforinitializerpad
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptyforinitializerpad
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -111,7 +111,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforiteratorpad/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforiteratorpad/package-frame.html
index 4cacd1beb8..a7c7dc7a55 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforiteratorpad/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforiteratorpad/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptyforiteratorpad
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptyforiteratorpad
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforiteratorpad/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforiteratorpad/package-summary.html
index 519d8cfc54..68c3b11610 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforiteratorpad/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptyforiteratorpad/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptyforiteratorpad
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptyforiteratorpad
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -116,7 +116,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/package-frame.html
index 98cf26ca82..ce7df41095 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/package-summary.html
index 4defccb386..020382a433 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -701,7 +701,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test1/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test1/package-frame.html
index 629f359563..e16b8f7aab 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test1/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test1/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test1
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test1
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test1/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test1/package-summary.html
index c8d8905e0e..a20fb3b0df 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test1/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test1/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test1
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test1
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test2/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test2/package-frame.html
index 772c599af6..17d06c55f8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test2/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test2/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test2
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test2
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test2/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test2/package-summary.html
index ea57fe6e82..52d85a0690 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test2/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test2/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test2
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test2
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test3/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test3/package-frame.html
index 57e5b31192..2fa8c3ba74 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test3/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test3/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test3
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test3
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test3/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test3/package-summary.html
index da73d29447..e0edd63095 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test3/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test3/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test3
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test3
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test4/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test4/package-frame.html
index 262ca8369b..08305294f1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test4/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test4/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test4
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test4
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test4/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test4/package-summary.html
index 12026c2d6a..61d2460b8d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test4/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/emptylineseparator/packageinfo/test4/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test4
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.emptylineseparator.packageinfo.test4
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/filetabcharacter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/filetabcharacter/package-frame.html
index d60388894d..289944e656 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/filetabcharacter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/filetabcharacter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.filetabcharacter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.filetabcharacter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/filetabcharacter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/filetabcharacter/package-summary.html
index 1882a01c4c..475ea675b8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/filetabcharacter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/filetabcharacter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.filetabcharacter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.filetabcharacter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -126,7 +126,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceEndsTheLine.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceEndsTheLine.html
index ca60da5f0c..d138a3e9e2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceEndsTheLine.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceEndsTheLine.html
@@ -14,7 +14,7 @@
6
7 package com.puppycrawl.tools.checkstyle.checks.whitespace.genericwhitespace;
8
-9 public class InputGenericWhitespaceEndsTheLine {
+9 public class InputGenericWhitespaceEndsTheLine {
10 public boolean returnsGenericObjectAtEndOfLine(Object otherObject) {
11 return otherObject instanceof Enum<?>;
12 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceInnerClass.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceInnerClass.html
index e73921199f..c934abb59f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceInnerClass.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceInnerClass.html
@@ -12,7 +12,7 @@
4
5
6
-7 package com.puppycrawl.tools.checkstyle.checks.whitespace.genericwhitespace;
+7 package com.puppycrawl.tools.checkstyle.checks.whitespace.genericwhitespace;
8
9 import java.util.List;
10
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceList.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceList.html
index e38888bf04..3785d67154 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceList.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceList.html
@@ -16,7 +16,7 @@
8
9 import java.util.List;
10
-11 public class InputGenericWhitespaceList
+11 public class InputGenericWhitespaceList
12 {
13 public List<List<String>[]> listOfListOFArrays;
14 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceMethodRef1.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceMethodRef1.html
index cadb767dea..1ec7436b42 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceMethodRef1.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceMethodRef1.html
@@ -16,7 +16,7 @@
8 import java.util.function.Supplier;
9 public class InputGenericWhitespaceMethodRef1
10 {
-11 public static class SomeClass {
+11 public static class SomeClass {
12 public static class Nested<V> {
13 private Nested() {
14 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceWithEmoji.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceWithEmoji.html
index db4a1cc34a..bac76b3228 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceWithEmoji.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/InputGenericWhitespaceWithEmoji.html
@@ -20,7 +20,7 @@
12
13 public class InputGenericWhitespaceWithEmoji {
14
-15 public static class SomeClass {
+15 public static class SomeClass {
16
17 public static class Nested<V> {
18
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/package-frame.html
index 2942101e3f..be146fec6d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.genericwhitespace
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.genericwhitespace
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/package-summary.html
index 9ae9e1a799..8a4542f0a0 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/genericwhitespace/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.genericwhitespace
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.genericwhitespace
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -221,7 +221,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/InputMethodParamPad4.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/InputMethodParamPad4.html
index 363f13d97a..3af07b5265 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/InputMethodParamPad4.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/InputMethodParamPad4.html
@@ -19,7 +19,7 @@
11 package com.puppycrawl.tools.checkstyle.checks.whitespace.methodparampad;
12 import java.util.Vector;
13
-14 public class InputMethodParamPad4
+14 public class InputMethodParamPad4
15 {
16 public InputMethodParamPad4 ()
17 {
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/InputMethodParamPadSetOptionTrim.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/InputMethodParamPadSetOptionTrim.html
index f185b9e28b..c73f32cb18 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/InputMethodParamPadSetOptionTrim.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/InputMethodParamPadSetOptionTrim.html
@@ -27,7 +27,7 @@
19 }
20 }
21
-22 public int method2 () {
+22 public int method2 () {
23 return 1;
24 }
25
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/InputMethodParamPadWhitespaceAround.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/InputMethodParamPadWhitespaceAround.html
index b3b1b0ae0e..6bf38e6c4a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/InputMethodParamPadWhitespaceAround.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/InputMethodParamPadWhitespaceAround.html
@@ -19,11 +19,11 @@
11 package com.puppycrawl.tools.checkstyle.checks.whitespace.methodparampad;
12
13 @SuppressWarnings({"this" , "that" })
-14 public class InputMethodParamPadWhitespaceAround
+14 public class InputMethodParamPadWhitespaceAround
15 {
16 protected InputMethodParamPadWhitespaceAround ( int i )
17 {
-18 this ();
+18 this ();
19 toString ();
20 }
21 protected InputMethodParamPadWhitespaceAround ()
@@ -31,22 +31,30 @@
23 super ();
24 }
25
-26 public void enhancedFor ()
+26 protected InputMethodParamPadWhitespaceAround ( String s)
27 {
-28 int [] i = new int [2];
-29 for ( int j: i ) {
-30 System.identityHashCode ( j );
-31 }
-32 }
-33 }
-34
-35 @interface CronExpression {
-36 Class<?>[] groups() default {};
-37 }
-38
-39 @interface CronExpression1 {
-40 Class<?>[] groups() default { };
-41 }
+28
+29 this ();
+30 }
+31
+32 public void enhancedFor ()
+33 {
+34 int [] i = new int [2];
+35 for ( int j: i ) {
+36 System.identityHashCode ( j );
+37 }
+38 }
+39 }
+40
+41 @interface CronExpression {
+42
+43 Class<?>[] groups() default {};
+44 }
+45
+46 @interface CronExpression1 {
+47
+48 Class<?>[] groups() default { };
+49 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/package-frame.html
index a4e58c3ad3..d088233342 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.methodparampad
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.methodparampad
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/package-summary.html
index b270e4f949..9cfea459d6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/methodparampad/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.methodparampad
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.methodparampad
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -141,7 +141,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nolinewrap/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nolinewrap/package-frame.html
index 8ef7e2f843..866447a4bc 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nolinewrap/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nolinewrap/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nolinewrap
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nolinewrap
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nolinewrap/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nolinewrap/package-summary.html
index 37d794626c..23e0dc8ec9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nolinewrap/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nolinewrap/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nolinewrap
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nolinewrap
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespaceafter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespaceafter/package-frame.html
index 81069c5522..f302dec07c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespaceafter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespaceafter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nowhitespaceafter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nowhitespaceafter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespaceafter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespaceafter/package-summary.html
index 06dbf600aa..90cbc1a02c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespaceafter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespaceafter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nowhitespaceafter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nowhitespaceafter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -306,7 +306,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebefore/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebefore/package-frame.html
index b89305cf68..7a64108403 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebefore/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebefore/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nowhitespacebefore
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nowhitespacebefore
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebefore/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebefore/package-summary.html
index 501208b1e3..3e77b54a26 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebefore/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebefore/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nowhitespacebefore
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nowhitespacebefore
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -126,7 +126,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebeforecasedefaultcolon/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebeforecasedefaultcolon/package-frame.html
index d603ba7502..1008c4f39f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebeforecasedefaultcolon/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebeforecasedefaultcolon/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nowhitespacebeforecasedefaultcolon
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nowhitespacebeforecasedefaultcolon
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebeforecasedefaultcolon/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebeforecasedefaultcolon/package-summary.html
index d4e41fe1de..55e62a4f48 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebeforecasedefaultcolon/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/nowhitespacebeforecasedefaultcolon/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nowhitespacebeforecasedefaultcolon
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.nowhitespacebeforecasedefaultcolon
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/operatorwrap/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/operatorwrap/package-frame.html
index b9c98016b1..ce1d39f395 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/operatorwrap/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/operatorwrap/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.operatorwrap
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.operatorwrap
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/operatorwrap/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/operatorwrap/package-summary.html
index d417dc59ba..73a31132ef 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/operatorwrap/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/operatorwrap/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.operatorwrap
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.operatorwrap
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -291,7 +291,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/package-frame.html
index 250c3962e9..49458cab2a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/package-summary.html
index 8e432fe836..2b0086c1ad 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -276,7 +276,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/parenpad/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/parenpad/package-frame.html
index d65fe041b5..ac588b727b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/parenpad/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/parenpad/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.parenpad
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.parenpad
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/parenpad/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/parenpad/package-summary.html
index 93980a5c91..74cae5871f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/parenpad/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/parenpad/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.parenpad
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.parenpad
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -266,7 +266,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/separatorwrap/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/separatorwrap/package-frame.html
index 2ef17c2c0a..edad360c65 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/separatorwrap/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/separatorwrap/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.separatorwrap
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.separatorwrap
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/separatorwrap/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/separatorwrap/package-summary.html
index 38eeca8940..cb11388bc1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/separatorwrap/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/separatorwrap/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.separatorwrap
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.separatorwrap
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -211,7 +211,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/singlespaceseparator/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/singlespaceseparator/package-frame.html
index 18c5160310..875642e4ac 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/singlespaceseparator/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/singlespaceseparator/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.singlespaceseparator
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.singlespaceseparator
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/singlespaceseparator/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/singlespaceseparator/package-summary.html
index 116c67c528..93321b512e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/singlespaceseparator/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/singlespaceseparator/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.singlespaceseparator
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.singlespaceseparator
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -131,7 +131,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/typecastparenpad/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/typecastparenpad/package-frame.html
index bb748d1996..e5376cb202 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/typecastparenpad/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/typecastparenpad/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.typecastparenpad
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.typecastparenpad
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/typecastparenpad/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/typecastparenpad/package-summary.html
index dadc734169..221cf86705 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/typecastparenpad/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/typecastparenpad/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.typecastparenpad
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.typecastparenpad
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -131,7 +131,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespaceafter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespaceafter/package-frame.html
index 84ec5602e0..c8a2f57b88 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespaceafter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespaceafter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.whitespaceafter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.whitespaceafter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespaceafter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespaceafter/package-summary.html
index 6ac90b3091..77ca83c3c3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespaceafter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespaceafter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.whitespaceafter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.whitespaceafter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -226,7 +226,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespacearound/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespacearound/package-frame.html
index 759fcc27f3..099f5a462c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespacearound/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespacearound/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.whitespacearound
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.whitespacearound
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespacearound/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespacearound/package-summary.html
index 769361badd..075a6d100f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespacearound/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/checks/whitespace/whitespacearound/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.whitespacearound
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.checks.whitespace.whitespacearound
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -441,7 +441,7 @@ Package com.puppycrawl.tools.checkstyle.checks
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filefilters/beforeexecutionexclusionfilefilter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/filefilters/beforeexecutionexclusionfilefilter/package-frame.html
index af3af2bb72..6d3c0de1b4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filefilters/beforeexecutionexclusionfilefilter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filefilters/beforeexecutionexclusionfilefilter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filefilters.beforeexecutionexclusionfilefilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filefilters.beforeexecutionexclusionfilefilter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filefilters/beforeexecutionexclusionfilefilter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/filefilters/beforeexecutionexclusionfilefilter/package-summary.html
index f79aadd84b..932dc3521b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filefilters/beforeexecutionexclusionfilefilter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filefilters/beforeexecutionexclusionfilefilter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filefilters.beforeexecutionexclusionfilefilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filefilters.beforeexecutionexclusionfilefilter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.filefi
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filefilters/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/filefilters/package-frame.html
index bfc3a6064d..6d96543f1b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filefilters/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filefilters/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filefilters
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filefilters
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filefilters/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/filefilters/package-summary.html
index 0a08b6ede3..0e73a53d12 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filefilters/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filefilters/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filefilters
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filefilters
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.filefi
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/SeverityMatchFilterExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/SeverityMatchFilterExamplesTest.html
new file mode 100644
index 0000000000..68d50937e3
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/SeverityMatchFilterExamplesTest.html
@@ -0,0 +1,55 @@
+
+
+
+SeverityMatchFilterExamplesTest xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20 package com.puppycrawl.tools.checkstyle.filters;
+21
+22 import org.junit.jupiter.api.Disabled;
+23 import org.junit.jupiter.api.Test;
+24
+25 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+26
+27 @Disabled("until https://github.com/checkstyle/checkstyle/issues/13345" )
+28 public class SeverityMatchFilterExamplesTest extends AbstractExamplesModuleTestSupport {
+29 @Override
+30 protected String getPackageLocation() {
+31 return "com/puppycrawl/tools/checkstyle/filters/severitymatchfilter" ;
+32 }
+33
+34 @Test
+35 public void testExample1() throws Exception {
+36 final String[] expected = {
+37
+38 };
+39
+40 verifyWithInlineConfigParser(getPath("Example1.txt" ), expected);
+41 }
+42 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressWarningsFilterExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressWarningsFilterExamplesTest.html
new file mode 100644
index 0000000000..c2e3905564
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressWarningsFilterExamplesTest.html
@@ -0,0 +1,64 @@
+
+
+
+
SuppressWarningsFilterExamplesTest xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20 package com.puppycrawl.tools.checkstyle.filters;
+21
+22 import org.junit.jupiter.api.Disabled;
+23 import org.junit.jupiter.api.Test;
+24
+25 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+26
+27 @Disabled("until https://github.com/checkstyle/checkstyle/issues/13345" )
+28 public class SuppressWarningsFilterExamplesTest extends AbstractExamplesModuleTestSupport {
+29 @Override
+30 protected String getPackageLocation() {
+31 return "com/puppycrawl/tools/checkstyle/filters/suppresswarningsfilter" ;
+32 }
+33
+34 @Test
+35 public void testExample1() throws Exception {
+36 final String[] expected = {
+37
+38 };
+39
+40 verifyWithInlineConfigParser(getPath("Example1.txt" ), expected);
+41 }
+42
+43 @Test
+44 public void testExample2() throws Exception {
+45 final String[] expected = {
+46
+47 };
+48
+49 verifyWithInlineConfigParser(getPath("Example2.txt" ), expected);
+50 }
+51 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressWithNearbyCommentFilterExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressWithNearbyCommentFilterExamplesTest.html
new file mode 100644
index 0000000000..39a440036c
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressWithNearbyCommentFilterExamplesTest.html
@@ -0,0 +1,118 @@
+
+
+
+
SuppressWithNearbyCommentFilterExamplesTest xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20 package com.puppycrawl.tools.checkstyle.filters;
+21
+22 import org.junit.jupiter.api.Disabled;
+23 import org.junit.jupiter.api.Test;
+24
+25 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+26
+27 @Disabled("until https://github.com/checkstyle/checkstyle/issues/13345" )
+28 public class SuppressWithNearbyCommentFilterExamplesTest extends AbstractExamplesModuleTestSupport {
+29 @Override
+30 protected String getPackageLocation() {
+31 return "com/puppycrawl/tools/checkstyle/filters/suppresswithnearbycommentfilter" ;
+32 }
+33
+34 @Test
+35 public void testExample1() throws Exception {
+36 final String[] expected = {
+37
+38 };
+39
+40 verifyWithInlineConfigParser(getPath("Example1.txt" ), expected);
+41 }
+42
+43 @Test
+44 public void testExample2() throws Exception {
+45 final String[] expected = {
+46
+47 };
+48
+49 verifyWithInlineConfigParser(getPath("Example2.txt" ), expected);
+50 }
+51
+52 @Test
+53 public void testExample3() throws Exception {
+54 final String[] expected = {
+55
+56 };
+57
+58 verifyWithInlineConfigParser(getPath("Example3.txt" ), expected);
+59 }
+60
+61 @Test
+62 public void testExample4() throws Exception {
+63 final String[] expected = {
+64
+65 };
+66
+67 verifyWithInlineConfigParser(getPath("Example4.txt" ), expected);
+68 }
+69
+70 @Test
+71 public void testExample5() throws Exception {
+72 final String[] expected = {
+73
+74 };
+75
+76 verifyWithInlineConfigParser(getPath("Example5.txt" ), expected);
+77 }
+78
+79 @Test
+80 public void testExample6() throws Exception {
+81 final String[] expected = {
+82
+83 };
+84
+85 verifyWithInlineConfigParser(getPath("Example6.txt" ), expected);
+86 }
+87
+88 @Test
+89 public void testExample7() throws Exception {
+90 final String[] expected = {
+91
+92 };
+93
+94 verifyWithInlineConfigParser(getPath("Example7.txt" ), expected);
+95 }
+96
+97 @Test
+98 public void testExample8() throws Exception {
+99 final String[] expected = {
+100
+101 };
+102
+103 verifyWithInlineConfigParser(getPath("Example8.txt" ), expected);
+104 }
+105 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressWithNearbyTextFilterExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressWithNearbyTextFilterExamplesTest.html
new file mode 100644
index 0000000000..574e65b0ac
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressWithNearbyTextFilterExamplesTest.html
@@ -0,0 +1,127 @@
+
+
+
+
SuppressWithNearbyTextFilterExamplesTest xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20 package com.puppycrawl.tools.checkstyle.filters;
+21
+22 import org.junit.jupiter.api.Disabled;
+23 import org.junit.jupiter.api.Test;
+24
+25 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+26
+27 @Disabled("until https://github.com/checkstyle/checkstyle/issues/13345" )
+28 public class SuppressWithNearbyTextFilterExamplesTest extends AbstractExamplesModuleTestSupport {
+29 @Override
+30 protected String getPackageLocation() {
+31 return "com/puppycrawl/tools/checkstyle/filters/suppresswithnearbytextfilter" ;
+32 }
+33
+34 @Test
+35 public void testExample1() throws Exception {
+36 final String[] expected = {
+37
+38 };
+39
+40 verifyWithInlineConfigParser(getPath("Example1.txt" ), expected);
+41 }
+42
+43 @Test
+44 public void testExample2() throws Exception {
+45 final String[] expected = {
+46
+47 };
+48
+49 verifyWithInlineConfigParser(getPath("Example2.txt" ), expected);
+50 }
+51
+52 @Test
+53 public void testExample3() throws Exception {
+54 final String[] expected = {
+55
+56 };
+57
+58 verifyWithInlineConfigParser(getPath("Example3.txt" ), expected);
+59 }
+60
+61 @Test
+62 public void testExample4() throws Exception {
+63 final String[] expected = {
+64
+65 };
+66
+67 verifyWithInlineConfigParser(getPath("Example4.txt" ), expected);
+68 }
+69
+70 @Test
+71 public void testExample5() throws Exception {
+72 final String[] expected = {
+73
+74 };
+75
+76 verifyWithInlineConfigParser(getPath("Example5.txt" ), expected);
+77 }
+78
+79 @Test
+80 public void testExample6() throws Exception {
+81 final String[] expected = {
+82
+83 };
+84
+85 verifyWithInlineConfigParser(getPath("Example6.txt" ), expected);
+86 }
+87
+88 @Test
+89 public void testExample7() throws Exception {
+90 final String[] expected = {
+91
+92 };
+93
+94 verifyWithInlineConfigParser(getPath("Example7.txt" ), expected);
+95 }
+96
+97 @Test
+98 public void testExample8() throws Exception {
+99 final String[] expected = {
+100
+101 };
+102
+103 verifyWithInlineConfigParser(getPath("Example8.txt" ), expected);
+104 }
+105
+106 @Test
+107 public void testExample9() throws Exception {
+108 final String[] expected = {
+109
+110 };
+111
+112 verifyWithInlineConfigParser(getPath("Example9.txt" ), expected);
+113 }
+114 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressWithPlainTextCommentFilterExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressWithPlainTextCommentFilterExamplesTest.html
new file mode 100644
index 0000000000..004ce7f71c
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressWithPlainTextCommentFilterExamplesTest.html
@@ -0,0 +1,119 @@
+
+
+
+
SuppressWithPlainTextCommentFilterExamplesTest xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20 package com.puppycrawl.tools.checkstyle.filters;
+21
+22 import org.junit.jupiter.api.Disabled;
+23 import org.junit.jupiter.api.Test;
+24
+25 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+26
+27 @Disabled("until https://github.com/checkstyle/checkstyle/issues/13345" )
+28 public class SuppressWithPlainTextCommentFilterExamplesTest
+29 extends AbstractExamplesModuleTestSupport {
+30 @Override
+31 protected String getPackageLocation() {
+32 return "com/puppycrawl/tools/checkstyle/filters/suppresswithplaintextcommentfilter" ;
+33 }
+34
+35 @Test
+36 public void testExample1() throws Exception {
+37 final String[] expected = {
+38
+39 };
+40
+41 verifyWithInlineConfigParser(getPath("Example1.txt" ), expected);
+42 }
+43
+44 @Test
+45 public void testExample2() throws Exception {
+46 final String[] expected = {
+47
+48 };
+49
+50 verifyWithInlineConfigParser(getPath("Example2.txt" ), expected);
+51 }
+52
+53 @Test
+54 public void testExample3() throws Exception {
+55 final String[] expected = {
+56
+57 };
+58
+59 verifyWithInlineConfigParser(getPath("Example3.txt" ), expected);
+60 }
+61
+62 @Test
+63 public void testExample4() throws Exception {
+64 final String[] expected = {
+65
+66 };
+67
+68 verifyWithInlineConfigParser(getPath("Example4.txt" ), expected);
+69 }
+70
+71 @Test
+72 public void testExample5() throws Exception {
+73 final String[] expected = {
+74
+75 };
+76
+77 verifyWithInlineConfigParser(getPath("Example5.txt" ), expected);
+78 }
+79
+80 @Test
+81 public void testExample6() throws Exception {
+82 final String[] expected = {
+83
+84 };
+85
+86 verifyWithInlineConfigParser(getPath("Example6.txt" ), expected);
+87 }
+88
+89 @Test
+90 public void testExample7() throws Exception {
+91 final String[] expected = {
+92
+93 };
+94
+95 verifyWithInlineConfigParser(getPath("Example7.txt" ), expected);
+96 }
+97
+98 @Test
+99 public void testExample8() throws Exception {
+100 final String[] expected = {
+101
+102 };
+103
+104 verifyWithInlineConfigParser(getPath("Example8.txt" ), expected);
+105 }
+106 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionCommentFilterExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionCommentFilterExamplesTest.html
new file mode 100644
index 0000000000..5a39da9c1d
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionCommentFilterExamplesTest.html
@@ -0,0 +1,118 @@
+
+
+
+
SuppressionCommentFilterExamplesTest xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20 package com.puppycrawl.tools.checkstyle.filters;
+21
+22 import org.junit.jupiter.api.Disabled;
+23 import org.junit.jupiter.api.Test;
+24
+25 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+26
+27 @Disabled("until https://github.com/checkstyle/checkstyle/issues/13345" )
+28 public class SuppressionCommentFilterExamplesTest extends AbstractExamplesModuleTestSupport {
+29 @Override
+30 protected String getPackageLocation() {
+31 return "com/puppycrawl/tools/checkstyle/filters/suppressioncommentfilter" ;
+32 }
+33
+34 @Test
+35 public void testExample1() throws Exception {
+36 final String[] expected = {
+37
+38 };
+39
+40 verifyWithInlineConfigParser(getPath("Example1.txt" ), expected);
+41 }
+42
+43 @Test
+44 public void testExample2() throws Exception {
+45 final String[] expected = {
+46
+47 };
+48
+49 verifyWithInlineConfigParser(getPath("Example2.txt" ), expected);
+50 }
+51
+52 @Test
+53 public void testExample3() throws Exception {
+54 final String[] expected = {
+55
+56 };
+57
+58 verifyWithInlineConfigParser(getPath("Example3.txt" ), expected);
+59 }
+60
+61 @Test
+62 public void testExample4() throws Exception {
+63 final String[] expected = {
+64
+65 };
+66
+67 verifyWithInlineConfigParser(getPath("Example4.txt" ), expected);
+68 }
+69
+70 @Test
+71 public void testExample5() throws Exception {
+72 final String[] expected = {
+73
+74 };
+75
+76 verifyWithInlineConfigParser(getPath("Example5.txt" ), expected);
+77 }
+78
+79 @Test
+80 public void testExample6() throws Exception {
+81 final String[] expected = {
+82
+83 };
+84
+85 verifyWithInlineConfigParser(getPath("Example6.txt" ), expected);
+86 }
+87
+88 @Test
+89 public void testExample7() throws Exception {
+90 final String[] expected = {
+91
+92 };
+93
+94 verifyWithInlineConfigParser(getPath("Example7.txt" ), expected);
+95 }
+96
+97 @Test
+98 public void testExample8() throws Exception {
+99 final String[] expected = {
+100
+101 };
+102
+103 verifyWithInlineConfigParser(getPath("Example8.txt" ), expected);
+104 }
+105 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionFilterTest.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionFilterTest.html
index b8e3e8e258..0ae0af884e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionFilterTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionFilterTest.html
@@ -294,7 +294,35 @@
286 expected, suppressed);
287 }
288 }
-
289 }
+
289
+
290 @Test
+
291 public void testSuppression2()
throws Exception {
+
292 final String pattern =
"^[A-Z][A-Z0-9]*(_[A-Z0-9]+)*$" ;
+
293 final String[] expected = {
+
294 "19:29: " + getCheckMessage(ConstantNameCheck.
class ,
+
295 MSG_INVALID_PATTERN,
"bad_name" , pattern),
+
296 };
+
297 final String[] suppressed = {
+
298 "19:29: " + getCheckMessage(ConstantNameCheck.
class ,
+
299 MSG_INVALID_PATTERN,
"bad_name" , pattern),
+
300
+
301 };
+
302 verifyFilterWithInlineConfigParser(getPath(
"InputSuppressionFilter7.java" ),
+
303 expected, removeSuppressed(expected, suppressed));
+
304 }
+
305
+
306 @Test
+
307 public void testSuppression3()
throws Exception {
+
308 final String pattern =
"^[A-Z][A-Z0-9]*(_[A-Z0-9]+)*$" ;
+
309 final String[] expected = {
+
310 "19:29: " + getCheckMessage(ConstantNameCheck.
class ,
+
311 MSG_INVALID_PATTERN,
"bad_name" , pattern),
+
312 };
+
313 final String[] suppressed = CommonUtil.EMPTY_STRING_ARRAY;
+
314 verifyFilterWithInlineConfigParser(getPath(
"InputSuppressionFilter8.java" ),
+
315 expected, removeSuppressed(expected, suppressed));
+
316 }
+
317 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionSingleFilterExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionSingleFilterExamplesTest.html
new file mode 100644
index 0000000000..414a130df2
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionSingleFilterExamplesTest.html
@@ -0,0 +1,136 @@
+
+
+
+
SuppressionSingleFilterExamplesTest xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20 package com.puppycrawl.tools.checkstyle.filters;
+21
+22 import org.junit.jupiter.api.Disabled;
+23 import org.junit.jupiter.api.Test;
+24
+25 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+26
+27 @Disabled("until https://github.com/checkstyle/checkstyle/issues/13345" )
+28 public class SuppressionSingleFilterExamplesTest extends AbstractExamplesModuleTestSupport {
+29 @Override
+30 protected String getPackageLocation() {
+31 return "com/puppycrawl/tools/checkstyle/filters/suppressionsinglefilter" ;
+32 }
+33
+34 @Test
+35 public void testExample1() throws Exception {
+36 final String[] expected = {
+37
+38 };
+39
+40 verifyWithInlineConfigParser(getPath("Example1.txt" ), expected);
+41 }
+42
+43 @Test
+44 public void testExample2() throws Exception {
+45 final String[] expected = {
+46
+47 };
+48
+49 verifyWithInlineConfigParser(getPath("Example2.txt" ), expected);
+50 }
+51
+52 @Test
+53 public void testExample3() throws Exception {
+54 final String[] expected = {
+55
+56 };
+57
+58 verifyWithInlineConfigParser(getPath("Example3.txt" ), expected);
+59 }
+60
+61 @Test
+62 public void testExample4() throws Exception {
+63 final String[] expected = {
+64
+65 };
+66
+67 verifyWithInlineConfigParser(getPath("Example4.txt" ), expected);
+68 }
+69
+70 @Test
+71 public void testExample5() throws Exception {
+72 final String[] expected = {
+73
+74 };
+75
+76 verifyWithInlineConfigParser(getPath("Example5.txt" ), expected);
+77 }
+78
+79 @Test
+80 public void testExample6() throws Exception {
+81 final String[] expected = {
+82
+83 };
+84
+85 verifyWithInlineConfigParser(getPath("Example6.txt" ), expected);
+86 }
+87
+88 @Test
+89 public void testExample7() throws Exception {
+90 final String[] expected = {
+91
+92 };
+93
+94 verifyWithInlineConfigParser(getPath("Example7.txt" ), expected);
+95 }
+96
+97 @Test
+98 public void testExample8() throws Exception {
+99 final String[] expected = {
+100
+101 };
+102
+103 verifyWithInlineConfigParser(getPath("Example8.txt" ), expected);
+104 }
+105
+106 @Test
+107 public void testExample9() throws Exception {
+108 final String[] expected = {
+109
+110 };
+111
+112 verifyWithInlineConfigParser(getPath("Example9.txt" ), expected);
+113 }
+114
+115 @Test
+116 public void testExample10() throws Exception {
+117 final String[] expected = {
+118
+119 };
+120
+121 verifyWithInlineConfigParser(getPath("Example10.txt" ), expected);
+122 }
+123 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionXpathFilterTest.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionXpathFilterTest.html
index 232241cdd0..5ed77339d7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionXpathFilterTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionXpathFilterTest.html
@@ -241,7 +241,48 @@
233 expected, removeSuppressed(expected, suppressed));
234 }
235 }
-
236 }
+
236
+
237 @Test
+
238 public void testXpathSuppression2()
throws Exception {
+
239 final String pattern =
"[^a-zA-z0-9]*" ;
+
240 final String[] expected = {
+
241 "18:14: " + getCheckMessage(IllegalTokenTextCheck.
class , MSG_KEY, pattern),
+
242 };
+
243
+
244 final String[] suppressed = {
+
245 "18:14: " + getCheckMessage(IllegalTokenTextCheck.
class , MSG_KEY, pattern),
+
246 };
+
247
+
248 verifyFilterWithInlineConfigParser(getPath(
"InputSuppressionXpathFilter5.java" ),
+
249 expected, removeSuppressed(expected, suppressed));
+
250 }
+
251
+
252 @Test
+
253 public void testXpathSuppression3()
throws Exception {
+
254 final String pattern =
"[^a-zA-z0-9]*" ;
+
255 final String[] expected = {
+
256 "18:14: " + getCheckMessage(IllegalTokenTextCheck.
class , MSG_KEY, pattern),
+
257 };
+
258
+
259 final String[] suppressed = {
+
260 "18:14: " + getCheckMessage(IllegalTokenTextCheck.
class , MSG_KEY, pattern),
+
261 };
+
262
+
263 verifyFilterWithInlineConfigParser(getPath(
"InputSuppressionXpathFilter6.java" ),
+
264 expected, removeSuppressed(expected, suppressed));
+
265 }
+
266
+
267 @Test
+
268 public void testXpathSuppression4()
throws Exception {
+
269 final String[] suppressed = {
+
270 "20:29: " + getCheckMessage(ConstantNameCheck.
class ,
+
271 MSG_INVALID_PATTERN,
"bad_name" , PATTERN),
+
272 };
+
273 verifyFilterWithInlineConfigParser(getPath(
"InputSuppressionXpathFilter7.java" ),
+
274 ALL_MESSAGES,
+
275 removeSuppressed(ALL_MESSAGES, suppressed));
+
276 }
+
277 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionXpathSingleFilterExamplesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionXpathSingleFilterExamplesTest.html
new file mode 100644
index 0000000000..6b783be5b9
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/SuppressionXpathSingleFilterExamplesTest.html
@@ -0,0 +1,172 @@
+
+
+
+
SuppressionXpathSingleFilterExamplesTest xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20 package com.puppycrawl.tools.checkstyle.filters;
+21
+22 import org.junit.jupiter.api.Disabled;
+23 import org.junit.jupiter.api.Test;
+24
+25 import com.puppycrawl.tools.checkstyle.AbstractExamplesModuleTestSupport;
+26
+27 @Disabled("until https://github.com/checkstyle/checkstyle/issues/13345" )
+28 public class SuppressionXpathSingleFilterExamplesTest extends AbstractExamplesModuleTestSupport {
+29 @Override
+30 protected String getPackageLocation() {
+31 return "com/puppycrawl/tools/checkstyle/filters/suppressionxpathsinglefilter" ;
+32 }
+33
+34 @Test
+35 public void testExample1() throws Exception {
+36 final String[] expected = {
+37
+38 };
+39
+40 verifyWithInlineConfigParser(getPath("Example1.txt" ), expected);
+41 }
+42
+43 @Test
+44 public void testExample2() throws Exception {
+45 final String[] expected = {
+46
+47 };
+48
+49 verifyWithInlineConfigParser(getPath("Example2.txt" ), expected);
+50 }
+51
+52 @Test
+53 public void testExample3() throws Exception {
+54 final String[] expected = {
+55
+56 };
+57
+58 verifyWithInlineConfigParser(getPath("Example3.txt" ), expected);
+59 }
+60
+61 @Test
+62 public void testExample4() throws Exception {
+63 final String[] expected = {
+64
+65 };
+66
+67 verifyWithInlineConfigParser(getPath("Example4.txt" ), expected);
+68 }
+69
+70 @Test
+71 public void testExample5() throws Exception {
+72 final String[] expected = {
+73
+74 };
+75
+76 verifyWithInlineConfigParser(getPath("Example5.txt" ), expected);
+77 }
+78
+79 @Test
+80 public void testExample6() throws Exception {
+81 final String[] expected = {
+82
+83 };
+84
+85 verifyWithInlineConfigParser(getPath("Example6.txt" ), expected);
+86 }
+87
+88 @Test
+89 public void testExample7() throws Exception {
+90 final String[] expected = {
+91
+92 };
+93
+94 verifyWithInlineConfigParser(getPath("Example7.txt" ), expected);
+95 }
+96
+97 @Test
+98 public void testExample8() throws Exception {
+99 final String[] expected = {
+100
+101 };
+102
+103 verifyWithInlineConfigParser(getPath("Example8.txt" ), expected);
+104 }
+105
+106 @Test
+107 public void testExample9() throws Exception {
+108 final String[] expected = {
+109
+110 };
+111
+112 verifyWithInlineConfigParser(getPath("Example9.txt" ), expected);
+113 }
+114
+115 @Test
+116 public void testExample10() throws Exception {
+117 final String[] expected = {
+118
+119 };
+120
+121 verifyWithInlineConfigParser(getPath("Example10.txt" ), expected);
+122 }
+123
+124 @Test
+125 public void testExample11() throws Exception {
+126 final String[] expected = {
+127
+128 };
+129
+130 verifyWithInlineConfigParser(getPath("Example11.txt" ), expected);
+131 }
+132
+133 @Test
+134 public void testExample12() throws Exception {
+135 final String[] expected = {
+136
+137 };
+138
+139 verifyWithInlineConfigParser(getPath("Example12.txt" ), expected);
+140 }
+141
+142 @Test
+143 public void testExample13() throws Exception {
+144 final String[] expected = {
+145
+146 };
+147
+148 verifyWithInlineConfigParser(getPath("Example13.txt" ), expected);
+149 }
+150
+151 @Test
+152 public void testExample14() throws Exception {
+153 final String[] expected = {
+154
+155 };
+156
+157 verifyWithInlineConfigParser(getPath("Example14.txt" ), expected);
+158 }
+159 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/package-frame.html
index 331b6db56f..5e757fc0f8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters
@@ -20,36 +20,60 @@
Classes
IntRangeFilterElementTest
+
+
+ SeverityMatchFilterExamplesTest
SeverityMatchFilterTest
SuppressFilterElementTest
+
+
+ SuppressWarningsFilterExamplesTest
SuppressWarningsFilterTest
+
+
+ SuppressWithNearbyCommentFilterExamplesTest
SuppressWithNearbyCommentFilterTest
+
+
+ SuppressWithNearbyTextFilterExamplesTest
SuppressWithNearbyTextFilterTest
+
+
+ SuppressWithPlainTextCommentFilterExamplesTest
SuppressWithPlainTextCommentFilterTest
+
+
+ SuppressionCommentFilterExamplesTest
SuppressionCommentFilterTest
SuppressionFilterTest
+
+
+ SuppressionSingleFilterExamplesTest
SuppressionSingleFilterTest
SuppressionXpathFilterTest
+
+
+ SuppressionXpathSingleFilterExamplesTest
SuppressionXpathSingleFilterTest
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/package-summary.html
index a35eb9b558..bafb696773 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -73,13 +73,23 @@ Package com.puppycrawl.tools.checkstyle.filter
- SeverityMatchFilterTest
+ SeverityMatchFilterExamplesTest
+
+ SeverityMatchFilterTest
+
+
+
SuppressFilterElementTest
+
+
+
+ SuppressWarningsFilterExamplesTest
+
@@ -87,9 +97,19 @@ Package com.puppycrawl.tools.checkstyle.filter
+
+ SuppressWithNearbyCommentFilterExamplesTest
+
+
+
SuppressWithNearbyCommentFilterTest
+
+
+
+ SuppressWithNearbyTextFilterExamplesTest
+
@@ -97,9 +117,19 @@ Package com.puppycrawl.tools.checkstyle.filter
+
+ SuppressWithPlainTextCommentFilterExamplesTest
+
+
+
SuppressWithPlainTextCommentFilterTest
+
+
+
+ SuppressionCommentFilterExamplesTest
+
@@ -113,13 +143,23 @@ Package com.puppycrawl.tools.checkstyle.filter
- SuppressionSingleFilterTest
+ SuppressionSingleFilterExamplesTest
+
+ SuppressionSingleFilterTest
+
+
+
SuppressionXpathFilterTest
+
+
+
+ SuppressionXpathSingleFilterExamplesTest
+
@@ -156,7 +196,7 @@ Package com.puppycrawl.tools.checkstyle.filter
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressioncommentfilter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressioncommentfilter/package-frame.html
index 6ecc10adbc..858e41398f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressioncommentfilter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressioncommentfilter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressioncommentfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressioncommentfilter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressioncommentfilter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressioncommentfilter/package-summary.html
index 920a265ea0..b7285072af 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressioncommentfilter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressioncommentfilter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressioncommentfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressioncommentfilter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -156,7 +156,7 @@ Package com.puppycrawl.tools.checkstyle.filter
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/InputSuppressionFilter7.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/InputSuppressionFilter7.html
new file mode 100644
index 0000000000..56d755e4f5
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/InputSuppressionFilter7.html
@@ -0,0 +1,33 @@
+
+
+
+InputSuppressionFilter7 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15 package com.puppycrawl.tools.checkstyle.filters.suppressionfilter;
+16
+17 public class InputSuppressionFilter7 {
+18
+19 public final static int bad_name = 1;
+20 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/InputSuppressionFilter8.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/InputSuppressionFilter8.html
new file mode 100644
index 0000000000..6bc5e1978e
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/InputSuppressionFilter8.html
@@ -0,0 +1,34 @@
+
+
+
+
InputSuppressionFilter8 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15 package com.puppycrawl.tools.checkstyle.filters.suppressionfilter;
+16
+17 public class InputSuppressionFilter8 {
+18
+19 public final static int bad_name = 1;
+20
+21 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/package-frame.html
index 4dd4bc490d..ccc5c7c4c8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionfilter
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionfilter
@@ -29,6 +29,12 @@
Classes
InputSuppressionFilter6
+
+
+ InputSuppressionFilter7
+
+
+ InputSuppressionFilter8
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/package-summary.html
index c2316c1345..822775682d 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionfilter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionfilter
@@ -23,7 +23,7 @@
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
+
+
+ InputSuppressionFilter7
+
+
+
+
+ InputSuppressionFilter8
+
@@ -106,7 +116,7 @@ Package com.puppycrawl.tools.checkstyle.filter
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionsinglefilter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionsinglefilter/package-frame.html
index 0f9406bca6..dbab5d9039 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionsinglefilter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionsinglefilter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionsinglefilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionsinglefilter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionsinglefilter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionsinglefilter/package-summary.html
index fce6e8df58..16f8ef73f8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionsinglefilter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionsinglefilter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionsinglefilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionsinglefilter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -126,7 +126,7 @@ Package com.puppycrawl.tools.checkstyle.filter
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/InputSuppressionXpathFilter5.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/InputSuppressionXpathFilter5.html
new file mode 100644
index 0000000000..5ef6f81002
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/InputSuppressionXpathFilter5.html
@@ -0,0 +1,32 @@
+
+
+
+InputSuppressionXpathFilter5 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14 package com.puppycrawl.tools.checkstyle.filters.suppressionxpathfilter;
+15
+16 public class InputSuppressionXpathFilter5 {
+17
+18 char a = '&';
+19 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/InputSuppressionXpathFilter6.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/InputSuppressionXpathFilter6.html
new file mode 100644
index 0000000000..e78d7de30a
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/InputSuppressionXpathFilter6.html
@@ -0,0 +1,32 @@
+
+
+
+
InputSuppressionXpathFilter6 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14 package com.puppycrawl.tools.checkstyle.filters.suppressionxpathfilter;
+15
+16 public class InputSuppressionXpathFilter6 {
+17
+18 char a = '&';
+19 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/InputSuppressionXpathFilter7.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/InputSuppressionXpathFilter7.html
new file mode 100644
index 0000000000..70694840eb
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/InputSuppressionXpathFilter7.html
@@ -0,0 +1,34 @@
+
+
+
+
InputSuppressionXpathFilter7 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16 package com.puppycrawl.tools.checkstyle.filters.suppressionxpathfilter;
+17
+18 public class InputSuppressionXpathFilter7 {
+19
+20 public final static int bad_name = 1;
+21 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/package-frame.html
index 0f214f74b9..a56a393980 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionxpathfilter
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionxpathfilter
@@ -23,6 +23,15 @@
Classes
InputSuppressionXpathFilter4
+
+
+ InputSuppressionXpathFilter5
+
+
+ InputSuppressionXpathFilter6
+
+
+ InputSuppressionXpathFilter7
InputSuppressionXpathFilterAcceptOnNullFile
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/package-summary.html
index 1c3148419c..92a8a82e05 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathfilter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionxpathfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionxpathfilter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -78,40 +78,55 @@ Package com.puppycrawl.tools.checkstyle.filter
- InputSuppressionXpathFilterAcceptOnNullFile
+ InputSuppressionXpathFilter5
- InputSuppressionXpathFilterAcceptOne
+ InputSuppressionXpathFilter6
- InputSuppressionXpathFilterAcceptTwo
+ InputSuppressionXpathFilter7
- InputSuppressionXpathFilterAcceptWithOptionalTrue
+ InputSuppressionXpathFilterAcceptOnNullFile
- InputSuppressionXpathFilterEscapeChar
+ InputSuppressionXpathFilterAcceptOne
- InputSuppressionXpathFilterEscapeString
+ InputSuppressionXpathFilterAcceptTwo
- InputSuppressionXpathFilterNonExistentFileWithTrueOptional
+ InputSuppressionXpathFilterAcceptWithOptionalTrue
+
+
+
+
+ InputSuppressionXpathFilterEscapeChar
+
+
+
+
+ InputSuppressionXpathFilterEscapeString
+
+ InputSuppressionXpathFilterNonExistentFileWithTrueOptional
+
+
+
InputSuppressionXpathFilterReject
@@ -136,7 +151,7 @@ Package com.puppycrawl.tools.checkstyle.filter
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathsinglefilter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathsinglefilter/package-frame.html
index 5936e379fb..78ee248a44 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathsinglefilter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathsinglefilter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionxpathsinglefilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionxpathsinglefilter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathsinglefilter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathsinglefilter/package-summary.html
index fc425d55ba..92de763f6b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathsinglefilter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppressionxpathsinglefilter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionxpathsinglefilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppressionxpathsinglefilter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -191,7 +191,7 @@ Package com.puppycrawl.tools.checkstyle.filter
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswarningsfilter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswarningsfilter/package-frame.html
index 42b1499236..897682d44b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswarningsfilter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswarningsfilter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswarningsfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswarningsfilter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswarningsfilter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswarningsfilter/package-summary.html
index a0bf0d5684..c24abf1c92 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswarningsfilter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswarningsfilter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswarningsfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswarningsfilter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -171,7 +171,7 @@ Package com.puppycrawl.tools.checkstyle.filter
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbycommentfilter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbycommentfilter/package-frame.html
index 0b7bee90a2..fa6446eb08 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbycommentfilter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbycommentfilter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswithnearbycommentfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswithnearbycommentfilter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbycommentfilter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbycommentfilter/package-summary.html
index 89c53bffa4..58cad365bc 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbycommentfilter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbycommentfilter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswithnearbycommentfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswithnearbycommentfilter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -221,7 +221,7 @@ Package com.puppycrawl.tools.checkstyle.filter
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbytextfilter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbytextfilter/package-frame.html
index e4b3779164..a45518d761 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbytextfilter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbytextfilter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswithnearbytextfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswithnearbytextfilter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbytextfilter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbytextfilter/package-summary.html
index bc7812326b..99a2117d09 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbytextfilter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithnearbytextfilter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswithnearbytextfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswithnearbytextfilter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.filter
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithplaintextcommentfilter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithplaintextcommentfilter/package-frame.html
index bf498b843d..70d13acf98 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithplaintextcommentfilter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithplaintextcommentfilter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswithplaintextcommentfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswithplaintextcommentfilter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithplaintextcommentfilter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithplaintextcommentfilter/package-summary.html
index 9391bd5794..9c141baafb 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithplaintextcommentfilter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/suppresswithplaintextcommentfilter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswithplaintextcommentfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.suppresswithplaintextcommentfilter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -121,7 +121,7 @@ Package com.puppycrawl.tools.checkstyle.filter
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/xpathfilterelement/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/xpathfilterelement/package-frame.html
index 93487abbfd..1e7d96b940 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/xpathfilterelement/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/xpathfilterelement/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.xpathfilterelement
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.xpathfilterelement
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/filters/xpathfilterelement/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/filters/xpathfilterelement/package-summary.html
index 920799f2c5..4a50c57910 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/filters/xpathfilterelement/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/filters/xpathfilterelement/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.filters.xpathfilterelement
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.filters.xpathfilterelement
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.filter
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/antlr4/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/antlr4/package-frame.html
index b5fcd8397e..c7c66cb16f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/antlr4/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/antlr4/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.antlr4
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.antlr4
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/antlr4/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/antlr4/package-summary.html
index 2876d64528..bfed6397b8 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/antlr4/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/antlr4/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.antlr4
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.antlr4
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -836,7 +836,7 @@ Package com.puppycrawl.tools.checkstyle.gramma
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/comments/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/comments/package-frame.html
index 3c1bc31751..3202df57a5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/comments/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/comments/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.comments
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.comments
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/comments/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/comments/package-summary.html
index 5002a8187e..712c9bdc7f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/comments/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/comments/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.comments
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.comments
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -111,7 +111,7 @@ Package com.puppycrawl.tools.checkstyle.gramma
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java19/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java19/package-frame.html
index ee1c30a786..54798b1def 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java19/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java19/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.java19
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.java19
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java19/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java19/package-summary.html
index bd6228b06d..960dd05f80 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java19/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java19/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.java19
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.java19
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.gramma
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java20/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java20/package-frame.html
index 9607e1e5e2..edac1c29a7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java20/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java20/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.java20
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.java20
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java20/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java20/package-summary.html
index 1f24b35610..9102213419 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java20/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java20/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.java20
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.java20
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.gramma
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java8/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java8/package-frame.html
index 14747e014d..34c1e6fe32 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java8/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java8/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.java8
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.java8
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java8/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java8/package-summary.html
index 11a72b8ecb..3b2c4c3e77 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java8/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java8/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.java8
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.java8
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -491,7 +491,7 @@ Package com.puppycrawl.tools.checkstyle.gramma
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java9/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java9/package-frame.html
index 4fdb8535b7..af418680d4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java9/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java9/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.java9
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.java9
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java9/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java9/package-summary.html
index 56e77a7a39..5491a6ca57 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/java9/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/java9/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.java9
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.java9
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -96,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.gramma
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/javadoc/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/javadoc/package-frame.html
index e34b460f70..c252d24e67 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/javadoc/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/javadoc/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.javadoc
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.javadoc
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/javadoc/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/javadoc/package-summary.html
index c890a00b55..51e0385896 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/javadoc/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/javadoc/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar.javadoc
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar.javadoc
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.gramma
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/package-frame.html
index b6e7e57d75..8028a28f85 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/grammar/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/grammar/package-summary.html
index 8bea8dc99f..b503c26813 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/grammar/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/grammar/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.grammar
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.grammar
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -461,7 +461,7 @@ Package com.puppycrawl.tools.checkstyle.gramma
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/codeselectorpresentation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/codeselectorpresentation/package-frame.html
index da0b35db98..9a99d71a32 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/codeselectorpresentation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/codeselectorpresentation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui.codeselectorpresentation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui.codeselectorpresentation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/codeselectorpresentation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/codeselectorpresentation/package-summary.html
index 92323dd74d..f9edb3e988 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/codeselectorpresentation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/codeselectorpresentation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui.codeselectorpresentation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui.codeselectorpresentation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.gui.co
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/main/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/main/package-frame.html
index a62b003a32..aee9affe7b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/main/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/main/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui.main
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui.main
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/main/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/main/package-summary.html
index 1a9717420c..ba155694e9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/main/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/main/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui.main
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui.main
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.gui.ma
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframe/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframe/package-frame.html
index 07bf6783a5..8b70803be1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframe/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframe/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui.mainframe
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui.mainframe
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframe/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframe/package-summary.html
index 399b05093a..178bb256f6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframe/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframe/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui.mainframe
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui.mainframe
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.gui.ma
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframemodel/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframemodel/package-frame.html
index e7f6bb1cd3..bc18936cb1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframemodel/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframemodel/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui.mainframemodel
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui.mainframemodel
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframemodel/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframemodel/package-summary.html
index e92d13dee7..77e7248447 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframemodel/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/mainframemodel/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui.mainframemodel
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui.mainframemodel
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.gui.ma
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/package-frame.html
index 0c62070ab8..e33c6135ea 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/package-summary.html
index 421a5d1266..6d8ff33b74 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -116,7 +116,7 @@ Package com.puppycrawl.tools.checkstyle.guiIndex
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/parsetreetablepresentation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/parsetreetablepresentation/package-frame.html
index 0f60a7f72c..2d35927ffc 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/parsetreetablepresentation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/parsetreetablepresentation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui.parsetreetablepresentation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui.parsetreetablepresentation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/parsetreetablepresentation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/parsetreetablepresentation/package-summary.html
index b8c6c73813..aa0a5565b9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/parsetreetablepresentation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/parsetreetablepresentation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui.parsetreetablepresentation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui.parsetreetablepresentation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.gui.pa
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/treetable/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/treetable/package-frame.html
index a2da2dd51d..c68a6cbafc 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/treetable/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/treetable/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui.treetable
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui.treetable
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/gui/treetable/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/gui/treetable/package-summary.html
index b696888314..4d2a477bc2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/gui/treetable/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/gui/treetable/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.gui.treetable
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.gui.treetable
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -91,7 +91,7 @@ Package com.puppycrawl.tools.checkstyle.gui.tr
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/internal/AllChecksTest.html b/xref-test/com/puppycrawl/tools/checkstyle/internal/AllChecksTest.html
index f5e8398126..8cd4faf0a7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/internal/AllChecksTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/internal/AllChecksTest.html
@@ -570,77 +570,79 @@
562
563 for (Object key : pr.keySet()) {
564
-565 if ("translation.wrongLanguageCode" .equals(key)) {
-566 continue ;
-567 }
-568
-569 assertWithMessage("property '" + key + "' isn't used by any check in package '"
-570 + entry.getKey() + "'" )
-571 .that(entry.getValue())
-572 .contains(key.toString());
-573 }
-574 }
-575 }
-576
-577 private static void verifyCheckstyleMessage(Map<String, List<String>> usedMessages,
-578 Class<?> module, Field message) throws Exception {
-579 final String messageString = message.get(null ).toString();
-580 final String packageName = module.getPackage().getName();
-581 final List<String> packageMessages =
-582 usedMessages.computeIfAbsent(packageName, key -> new ArrayList<>());
-583
-584 packageMessages.add(messageString);
+565
+566 if ("translation.wrongLanguageCode" .equals(key)
+567 || "javadoc.unclosedHtml" .equals(key)) {
+568 continue ;
+569 }
+570
+571 assertWithMessage("property '" + key + "' isn't used by any check in package '"
+572 + entry.getKey() + "'" )
+573 .that(entry.getValue())
+574 .contains(key.toString());
+575 }
+576 }
+577 }
+578
+579 private static void verifyCheckstyleMessage(Map<String, List<String>> usedMessages,
+580 Class<?> module, Field message) throws Exception {
+581 final String messageString = message.get(null ).toString();
+582 final String packageName = module.getPackage().getName();
+583 final List<String> packageMessages =
+584 usedMessages.computeIfAbsent(packageName, key -> new ArrayList<>());
585
-586 for (Locale locale : ALL_LOCALES) {
-587 String result = null ;
-588
-589 try {
-590 result = CheckUtil.getCheckMessage(module, locale, messageString);
-591 }
-592
-593 catch (Exception ex) {
-594 assertWithMessage(module.getSimpleName() + " with the message '" + messageString
-595 + "' in locale '" + locale.getLanguage() + "' failed with: "
-596 + ex.getClass().getSimpleName() + " - " + ex.getMessage()).fail();
-597 }
-598
-599 assertWithMessage(module.getSimpleName() + " should have text for the message '"
-600 + messageString + "' in locale " + locale.getLanguage() + "'" )
-601 .that(result)
-602 .isNotNull();
-603 assertWithMessage("%s should have non-empty text for the message '%s' in locale '%s'" ,
-604 module.getSimpleName(), messageString, locale.getLanguage())
-605 .that(result.trim())
-606 .isNotEmpty();
-607 assertWithMessage(
-608 module.getSimpleName() + " should have non-TODO text for the message '"
-609 + messageString + "' in locale " + locale.getLanguage() + "'" )
-610 .that(!"todo.match" .equals(messageString)
-611 && result.trim().startsWith("TODO" ))
-612 .isFalse();
-613 }
-614 }
-615
-616
-617
-618
-619
-620
-621
-622
-623 private static boolean isSubset(int [] array, int ... arrayToCheckIn) {
-624 Arrays.sort(arrayToCheckIn);
-625 boolean result = true ;
-626 for (final int element : array) {
-627 if (Arrays.binarySearch(arrayToCheckIn, element) < 0) {
-628 result = false;
-629 break ;
-630 }
-631 }
-632 return result;
-633 }
-634
-635 }
+586 packageMessages.add(messageString);
+587
+588 for (Locale locale : ALL_LOCALES) {
+589 String result = null ;
+590
+591 try {
+592 result = CheckUtil.getCheckMessage(module, locale, messageString);
+593 }
+594
+595 catch (Exception ex) {
+596 assertWithMessage(module.getSimpleName() + " with the message '" + messageString
+597 + "' in locale '" + locale.getLanguage() + "' failed with: "
+598 + ex.getClass().getSimpleName() + " - " + ex.getMessage()).fail();
+599 }
+600
+601 assertWithMessage(module.getSimpleName() + " should have text for the message '"
+602 + messageString + "' in locale " + locale.getLanguage() + "'" )
+603 .that(result)
+604 .isNotNull();
+605 assertWithMessage("%s should have non-empty text for the message '%s' in locale '%s'" ,
+606 module.getSimpleName(), messageString, locale.getLanguage())
+607 .that(result.trim())
+608 .isNotEmpty();
+609 assertWithMessage(
+610 module.getSimpleName() + " should have non-TODO text for the message '"
+611 + messageString + "' in locale " + locale.getLanguage() + "'" )
+612 .that(!"todo.match" .equals(messageString)
+613 && result.trim().startsWith("TODO" ))
+614 .isFalse();
+615 }
+616 }
+617
+618
+619
+620
+621
+622
+623
+624
+625 private static boolean isSubset(int [] array, int ... arrayToCheckIn) {
+626 Arrays.sort(arrayToCheckIn);
+627 boolean result = true ;
+628 for (final int element : array) {
+629 if (Arrays.binarySearch(arrayToCheckIn, element) < 0) {
+630 result = false;
+631 break ;
+632 }
+633 }
+634 return result;
+635 }
+636
+637 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/internal/XdocsJavaDocsTest.html b/xref-test/com/puppycrawl/tools/checkstyle/internal/XdocsJavaDocsTest.html
index fc53c330af..aba3d86d15 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/internal/XdocsJavaDocsTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/internal/XdocsJavaDocsTest.html
@@ -71,13 +71,13 @@
63 import com.puppycrawl.tools.checkstyle.checks.blocks.RightCurlyOption;
64 import com.puppycrawl.tools.checkstyle.checks.imports.ImportOrderOption;
65 import com.puppycrawl.tools.checkstyle.checks.javadoc.JavadocContentLocationOption;
-66 import com.puppycrawl.tools.checkstyle.checks.naming.AccessModifierOption;
-67 import com.puppycrawl.tools.checkstyle.checks.whitespace.PadOption;
-68 import com.puppycrawl.tools.checkstyle.checks.whitespace.WrapOption;
-69 import com.puppycrawl.tools.checkstyle.internal.utils.TestUtil;
-70 import com.puppycrawl.tools.checkstyle.internal.utils.XdocUtil;
-71 import com.puppycrawl.tools.checkstyle.internal.utils.XmlUtil;
-72 import com.puppycrawl.tools.checkstyle.utils.CheckUtil;
+66 import com.puppycrawl.tools.checkstyle.checks.javadoc.MissingJavadocMethodCheck;
+67 import com.puppycrawl.tools.checkstyle.checks.naming.AccessModifierOption;
+68 import com.puppycrawl.tools.checkstyle.checks.whitespace.PadOption;
+69 import com.puppycrawl.tools.checkstyle.checks.whitespace.WrapOption;
+70 import com.puppycrawl.tools.checkstyle.internal.utils.TestUtil;
+71 import com.puppycrawl.tools.checkstyle.internal.utils.XdocUtil;
+72 import com.puppycrawl.tools.checkstyle.internal.utils.XmlUtil;
73 import com.puppycrawl.tools.checkstyle.utils.JavadocUtil;
74 import com.puppycrawl.tools.checkstyle.utils.ScopeUtil;
75 import com.puppycrawl.tools.checkstyle.utils.TokenUtil;
@@ -121,837 +121,650 @@
113 "MultipleStringLiterals - ignoreOccurrenceContext" ,
114 }).collect(Collectors.toSet()));
115
-116
-117
-118 private static final Set<String> MODULES_EXAMPLES_TO_SKIP = Set.of(
-119 "EmptyForInitializerPad" ,
-120 "EmptyForIteratorPad" ,
-121 "EmptyLineSeparator" ,
-122 "FileTabCharacter" ,
-123 "GenericWhitespace" ,
-124 "MethodParamPad" ,
-125 "NoLineWrap" ,
-126 "NoWhitespaceAfter" ,
-127 "NoWhitespaceBefore" ,
-128 "NoWhitespaceBeforeCaseDefaultColon" ,
-129 "OperatorWrap" ,
-130 "ParenPad" ,
-131 "SeparatorWrap" ,
-132 "SingleSpaceSeparator" ,
-133 "TypecastParenPad" ,
-134 "WhitespaceAround" ,
-135 "InnerAssignment" ,
-136 "MagicNumber" ,
-137 "MatchXpath" ,
-138 "MissingCtor" ,
-139 "MissingSwitchDefault" ,
-140 "ModifiedControlVariable" ,
-141 "MultipleStringLiterals" ,
-142 "MultipleVariableDeclarations" ,
-143 "NestedForDepth" ,
-144 "NestedIfDepth" ,
-145 "NestedTryDepth" ,
-146 "NoArrayTrailingComma" ,
-147 "NoClone" ,
-148 "BeforeExecutionExclusionFileFilter" ,
-149 "NoEnumTrailingComma" ,
-150 "NoFinalizer" ,
-151 "OneStatementPerLine" ,
-152 "OverloadMethodsDeclarationOrder" ,
-153 "PackageDeclaration" ,
-154 "ParameterAssignment" ,
-155 "RequireThis" ,
-156 "ReturnCount" ,
-157 "SimplifyBooleanExpression" ,
-158 "SimplifyBooleanReturn" ,
-159 "StringLiteralEquality" ,
-160 "SuperClone" ,
-161 "SuperFinalize" ,
-162 "UnnecessaryParentheses" ,
-163 "UnnecessarySemicolonAfterOuterTypeDeclaration" ,
-164 "UnnecessarySemicolonAfterTypeMemberDeclaration" ,
-165 "UnnecessarySemicolonInEnumeration" ,
-166 "UnnecessarySemicolonInTryWithResources" ,
-167 "UnusedLocalVariable" ,
-168 "VariableDeclarationUsageDistance" ,
-169 "ArrayTrailingComma" ,
-170 "AvoidDoubleBraceInitialization" ,
-171 "AvoidInlineConditionals" ,
-172 "AvoidNoArgumentSuperConstructorCall" ,
-173 "CovariantEquals" ,
-174 "DeclarationOrder" ,
-175 "DefaultComesLast" ,
-176 "EmptyStatement" ,
-177 "EqualsAvoidNull" ,
-178 "EqualsHashCode" ,
-179 "ExplicitInitialization" ,
-180 "FallThrough" ,
-181 "FinalLocalVariable" ,
-182 "HiddenField" ,
-183 "IllegalCatch" ,
-184 "IllegalInstantiation" ,
-185 "IllegalThrows" ,
-186 "IllegalToken" ,
-187 "IllegalTokenText" ,
-188 "IllegalType" ,
-189 "ClassMemberImpliedModifier" ,
-190 "InterfaceMemberImpliedModifier" ,
-191 "ModifierOrder" ,
-192 "RedundantModifier" ,
-193 "AnonInnerLength" ,
-194 "ExecutableStatementCount" ,
-195 "FileLength" ,
-196 "LambdaBodyLength" ,
-197 "LineLength" ,
-198 "MethodCount" ,
-199 "MethodLength" ,
-200 "OuterTypeNumber" ,
-201 "ParameterNumber" ,
-202 "RecordComponentNumber" ,
-203 "AnnotationLocation" ,
-204 "AnnotationOnSameLine" ,
-205 "AnnotationUseStyle" ,
-206 "MissingDeprecated" ,
-207 "MissingOverride" ,
-208 "SuppressWarnings" ,
-209 "PackageAnnotation" ,
-210 "SuppressWarningsHolder" ,
-211 "Regexp" ,
-212 "RegexpMultiline" ,
-213 "RegexpOnFilename" ,
-214 "RegexpSingleline" ,
-215 "RegexpSinglelineJava" ,
-216 "WhitespaceAfter" ,
-217 "InnerTypeLast" ,
-218 "InterfaceIsType" ,
-219 "MutableException" ,
-220 "OneTopLevelClass" ,
-221 "ThrowsCount" ,
-222 "VisibilityModifier" ,
-223 "BooleanExpressionComplexity" ,
-224 "ClassDataAbstractionCoupling" ,
-225 "ClassFanOutComplexity" ,
-226 "CyclomaticComplexity" ,
-227 "JavaNCSS" ,
-228 "NPathComplexity" ,
-229 "ArrayTypeStyle" ,
-230 "AvoidEscapedUnicodeCharacters" ,
-231 "CommentsIndentation" ,
-232 "DescendantToken" ,
-233 "FinalParameters" ,
-234 "Header" ,
-235 "RegexpHeader" ,
-236 "Indentation" ,
-237 "NewlineAtEndOfFile" ,
-238 "NoCodeInFile" ,
-239 "OrderedProperties" ,
-240 "OuterTypeFilename" ,
-241 "TodoComment" ,
-242 "AvoidStarImport" ,
-243 "AvoidStaticImport" ,
-244 "CustomImportOrder" ,
-245 "IllegalImport" ,
-246 "ImportControl" ,
-247 "ImportOrder" ,
-248 "RedundantImport" ,
-249 "UnusedImports" ,
-250 "TrailingComment" ,
-251 "Translation" ,
-252 "UncommentedMain" ,
-253 "UniqueProperties" ,
-254 "UpperEll" ,
-255 "AtclauseOrder" ,
-256 "InvalidJavadocPosition" ,
-257 "JavadocBlockTagLocation" ,
-258 "JavadocContentLocation" ,
-259 "JavadocMethod" ,
-260 "JavadocMissingLeadingAsterisk" ,
-261 "JavadocMissingWhitespaceAfterAsterisk" ,
-262 "JavadocPackage" ,
-263 "JavadocParagraph" ,
-264 "JavadocStyle" ,
-265 "JavadocTagContinuationIndentation" ,
-266 "JavadocType" ,
-267 "JavadocVariable" ,
-268 "MissingJavadocMethod" ,
-269 "MissingJavadocPackage" ,
-270 "MissingJavadocType" ,
-271 "NonEmptyAtclauseDescription" ,
-272 "RequireEmptyLineBeforeBlockTagGroup" ,
-273 "SingleLineJavadoc" ,
-274 "SummaryJavadoc" ,
-275 "WriteTag" ,
-276 "AbbreviationAsWordInName" ,
-277 "AbstractClassName" ,
-278 "CatchParameterName" ,
-279 "ClassTypeParameterName" ,
-280 "ConstantName" ,
-281 "IllegalIdentifierName" ,
-282 "InterfaceTypeParameterName" ,
-283 "LambdaParameterName" ,
-284 "LocalFinalVariableName" ,
-285 "LocalVariableName" ,
-286 "MemberName" ,
-287 "MethodName" ,
-288 "MethodTypeParameterName" ,
-289 "PackageName" ,
-290 "ParameterName" ,
-291 "PatternVariableName" ,
-292 "RecordComponentName" ,
-293 "RecordTypeParameterName" ,
-294 "StaticVariableName" ,
-295 "TypeName"
-296 );
+116 private static final List<List<Node>> CHECK_PROPERTIES = new ArrayList<>();
+117 private static final Map<String, String> CHECK_PROPERTY_DOC = new HashMap<>();
+118 private static final Map<String, String> CHECK_TEXT = new HashMap<>();
+119
+120 private static Checker checker;
+121
+122 private static String checkName;
+123
+124 private static Path currentXdocPath;
+125
+126 @Override
+127 protected String getPackageLocation() {
+128 return "com.puppycrawl.tools.checkstyle.internal" ;
+129 }
+130
+131 @BeforeEach
+132 public void setUp() throws Exception {
+133 final DefaultConfiguration checkConfig = new DefaultConfiguration(
+134 JavaDocCapture.class .getName());
+135 checker = createChecker(checkConfig);
+136 }
+137
+138
+139
+140
+141
+142
+143
+144
+145 @Test
+146 public void testAllCheckSectionJavaDocs() throws Exception {
+147 final ModuleFactory moduleFactory = TestUtil.getPackageObjectFactory();
+148
+149 for (Path path : XdocUtil.getXdocsConfigFilePaths(XdocUtil.getXdocsFilePaths())) {
+150 currentXdocPath = path;
+151 final File file = path.toFile();
+152 final String fileName = file.getName();
+153
+154 if ("config_system_properties.xml" .equals(fileName)
+155 || "index.xml" .equals(fileName)) {
+156 continue ;
+157 }
+158
+159 final String input = Files.readString(path);
+160 final Document document = XmlUtil.getRawXml(fileName, input, input);
+161 final NodeList sources = document.getElementsByTagName("section" );
+162
+163 for (int position = 0; position < sources.getLength(); position++) {
+164 final Node section = sources.item(position);
+165 final String sectionName = XmlUtil.getNameAttributeOfNode(section);
+166
+167 if ("Content" .equals(sectionName) || "Overview" .equals(sectionName)) {
+168 continue ;
+169 }
+170
+171 examineCheckSection(moduleFactory, fileName, sectionName, section);
+172 }
+173 }
+174 }
+175
+176 private static void examineCheckSection(ModuleFactory moduleFactory, String fileName,
+177 String sectionName, Node section) throws Exception {
+178 final Object instance;
+179
+180 try {
+181 instance = moduleFactory.createModule(sectionName);
+182 }
+183 catch (CheckstyleException ex) {
+184 throw new CheckstyleException(fileName + " couldn't find class: " + sectionName, ex);
+185 }
+186
+187 CHECK_TEXT.clear();
+188 CHECK_PROPERTIES.clear();
+189 CHECK_PROPERTY_DOC.clear();
+190 checkName = sectionName;
+191
+192 examineCheckSectionChildren(section);
+193
+194 final List<File> files = new ArrayList<>();
+195 files.add(new File("src/main/java/" + instance.getClass().getName().replace("." , "/" )
+196 + ".java" ));
+197
+198 checker.process(files);
+199 }
+200
+201 private static void examineCheckSectionChildren(Node section) {
+202 for (Node subSection : XmlUtil.getChildrenElements(section)) {
+203 if (!"subsection" .equals(subSection.getNodeName())) {
+204 final String text = getNodeText(subSection);
+205 if (text.startsWith("Since Checkstyle" )) {
+206 CHECK_TEXT.put("since" , text.substring(17));
+207 }
+208 continue ;
+209 }
+210
+211 final String subSectionName = XmlUtil.getNameAttributeOfNode(subSection);
+212
+213 examineCheckSubSection(subSection, subSectionName);
+214 }
+215 }
+216
+217 private static void examineCheckSubSection(Node subSection, String subSectionName) {
+218 switch (subSectionName) {
+219 case "Description" :
+220 case "Examples" :
+221 case "Notes" :
+222 case "Rule Description" :
+223 CHECK_TEXT.put(subSectionName, getNodeText(subSection).replace("\r" , "" ));
+224 break ;
+225 case "Properties" :
+226 populateProperties(subSection);
+227 CHECK_TEXT.put(subSectionName, createPropertiesText());
+228 break ;
+229 case "Example of Usage" :
+230 case "Violation Messages" :
+231 CHECK_TEXT.put(subSectionName,
+232 createViolationMessagesText(getViolationMessages(subSection)));
+233 break ;
+234 case "Package" :
+235 case "Parent Module" :
+236 CHECK_TEXT.put(subSectionName, createParentText(subSection));
+237 break ;
+238 default :
+239 break ;
+240 }
+241 }
+242
+243 private static List<String> getViolationMessages(Node subsection) {
+244 final Node child = XmlUtil.getFirstChildElement(subsection);
+245 final List<String> violationMessages = new ArrayList<>();
+246 for (Node row : XmlUtil.getChildrenElements(child)) {
+247 violationMessages.add(row.getTextContent().trim());
+248 }
+249 return violationMessages;
+250 }
+251
+252 private static String createViolationMessagesText(List<String> violationMessages) {
+253 final StringBuilder result = new StringBuilder(100);
+254 result.append("\n<p>\nViolation Message Keys:\n</p>\n<ul>" );
+255
+256 for (String msg : violationMessages) {
+257 result.append("\n<li>\n{@code " ).append(msg).append("}\n</li>" );
+258 }
+259
+260 result.append("\n</ul>" );
+261 return result.toString();
+262 }
+263
+264 private static String createParentText(Node subsection) {
+265 return "\n<p>\nParent is {@code com.puppycrawl.tools.checkstyle."
+266 + XmlUtil.getFirstChildElement(subsection).getTextContent().trim() + "}\n</p>" ;
+267 }
+268
+269 private static void populateProperties(Node subSection) {
+270 boolean skip = true ;
+271
+272
+273
+274
+275 Node child = XmlUtil.getFirstChildElement(subSection);
+276 if (child.hasAttributes() && child.getAttributes().getNamedItem("class" ) != null
+277 && "wrapper" .equals(child.getAttributes().getNamedItem("class" )
+278 .getTextContent())) {
+279 child = XmlUtil.getFirstChildElement(child);
+280 }
+281 for (Node row : XmlUtil.getChildrenElements(child)) {
+282 if (skip) {
+283 skip = false;
+284 continue ;
+285 }
+286 CHECK_PROPERTIES.add(new ArrayList<>(XmlUtil.getChildrenElements(row)));
+287 }
+288 }
+289
+290 private static String createPropertiesText() {
+291 final StringBuilder result = new StringBuilder(100);
+292
+293 result.append("\n<ul>" );
+294
+295 for (List<Node> property : CHECK_PROPERTIES) {
+296 final String propertyName = getNodeText(property.get(0));
297
-298 private static final List<List<Node>> CHECK_PROPERTIES = new ArrayList<>();
-299 private static final Map<String, String> CHECK_PROPERTY_DOC = new HashMap<>();
-300 private static final Map<String, String> CHECK_TEXT = new HashMap<>();
+298 result.append("\n<li>\nProperty {@code " );
+299 result.append(propertyName);
+300 result.append("} - " );
301
-302 private static Checker checker;
+302 final String temp = getNodeText(property.get(1));
303
-304 private static String checkName;
-305
-306 private static Path currentXdocPath;
-307
-308 @Override
-309 protected String getPackageLocation() {
-310 return "com.puppycrawl.tools.checkstyle.internal" ;
-311 }
-312
-313 @BeforeEach
-314 public void setUp() throws Exception {
-315 final DefaultConfiguration checkConfig = new DefaultConfiguration(
-316 JavaDocCapture.class .getName());
-317 checker = createChecker(checkConfig);
-318 }
-319
-320
-321
-322
-323
-324
-325
-326
-327 @Test
-328 public void testAllCheckSectionJavaDocs() throws Exception {
-329 final ModuleFactory moduleFactory = TestUtil.getPackageObjectFactory();
-330
-331 for (Path path : XdocUtil.getXdocsConfigFilePaths(XdocUtil.getXdocsFilePaths())) {
-332 currentXdocPath = path;
-333 final File file = path.toFile();
-334 final String fileName = file.getName();
-335
-336 if ("config_system_properties.xml" .equals(fileName)
-337 || "index.xml" .equals(fileName)) {
-338 continue ;
-339 }
+304 result.append(temp);
+305 CHECK_PROPERTY_DOC.put(propertyName, temp);
+306
+307 String typeText = "java.lang.String[]" ;
+308 final String propertyType = property.get(2).getTextContent();
+309 final boolean isSpecialAllTokensType = propertyType.contains("set of any supported" );
+310 final boolean isPropertyTokenType = isSpecialAllTokensType
+311 || propertyType.contains("subset of tokens" )
+312 || propertyType.contains("subset of javadoc tokens" );
+313 if (!isPropertyTokenType) {
+314 final String typeName =
+315 getCorrectNodeBasedOnPropertyType(property).getTextContent().trim();
+316 typeText = FULLY_QUALIFIED_CLASS_NAMES.get(typeName).getTypeName();
+317 }
+318 if (isSpecialAllTokensType) {
+319 typeText = "anyTokenTypesSet" ;
+320 }
+321 result.append(" Type is {@code " ).append(typeText).append("}." );
+322
+323 if (!isSpecialAllTokensType) {
+324 final String validationType = getValidationType(isPropertyTokenType, propertyName);
+325 if (validationType != null ) {
+326 result.append(validationType);
+327 }
+328 }
+329
+330 result.append(getDefaultValueOfType(propertyName, isSpecialAllTokensType));
+331
+332 result.append(emptyStringArrayDefaultValue(property.get(3), isPropertyTokenType));
+333
+334 if (result.charAt(result.length() - 1) != '.') {
+335 result.append('.');
+336 }
+337
+338 result.append("\n</li>" );
+339 }
340
-341 final String input = Files.readString(path);
-342 final Document document = XmlUtil.getRawXml(fileName, input, input);
-343 final NodeList sources = document.getElementsByTagName("section" );
-344
-345 for (int position = 0; position < sources.getLength(); position++) {
-346 final Node section = sources.item(position);
-347 final String sectionName = XmlUtil.getNameAttributeOfNode(section);
-348
-349 if ("Content" .equals(sectionName) || "Overview" .equals(sectionName)) {
-350 continue ;
-351 }
-352
-353 examineCheckSection(moduleFactory, fileName, sectionName, section);
-354 }
-355 }
-356 }
-357
-358 private static void examineCheckSection(ModuleFactory moduleFactory, String fileName,
-359 String sectionName, Node section) throws Exception {
-360 final Object instance;
-361
-362 try {
-363 instance = moduleFactory.createModule(sectionName);
+341 result.append("\n</ul>" );
+342
+343 return result.toString();
+344 }
+345
+346 private static Node getCorrectNodeBasedOnPropertyType(List<Node> property) {
+347 final Node result;
+348 if (property.get(2).getFirstChild().getFirstChild() == null ) {
+349 result = property.get(2).getFirstChild().getNextSibling();
+350 }
+351 else {
+352 result = property.get(2).getFirstChild().getFirstChild();
+353 }
+354 return result;
+355 }
+356
+357 private static String getDefaultValueOfType(String propertyName,
+358 boolean isSpecialAllTokensType) {
+359 final String result;
+360 if (!isSpecialAllTokensType
+361 && (propertyName.endsWith("token" ) || propertyName.endsWith(
+362 "tokens" ))) {
+363 result = " Default value is: " ;
364 }
-365 catch (CheckstyleException ex) {
-366 throw new CheckstyleException(fileName + " couldn't find class: " + sectionName, ex);
+365 else {
+366 result = " Default value is " ;
367 }
-368
-369 CHECK_TEXT.clear();
-370 CHECK_PROPERTIES.clear();
-371 CHECK_PROPERTY_DOC.clear();
-372 checkName = sectionName;
-373
-374 examineCheckSectionChildren(section);
-375
-376 final List<File> files = new ArrayList<>();
-377 files.add(new File("src/main/java/" + instance.getClass().getName().replace("." , "/" )
-378 + ".java" ));
-379
-380 checker.process(files);
-381 }
-382
-383 private static void examineCheckSectionChildren(Node section) {
-384 for (Node subSection : XmlUtil.getChildrenElements(section)) {
-385 if (!"subsection" .equals(subSection.getNodeName())) {
-386 final String text = getNodeText(subSection);
-387 if (text.startsWith("Since Checkstyle" )) {
-388 CHECK_TEXT.put("since" , text.substring(17));
-389 }
-390 continue ;
-391 }
+368 return result;
+369 }
+370
+371 private static String getValidationType(boolean isPropertyTokenType, String propertyName) {
+372 String result = null ;
+373 if (NON_BASE_TOKEN_PROPERTIES.contains(checkName + " - " + propertyName)) {
+374 result = " Validation type is {@code tokenTypesSet}." ;
+375 }
+376 else if (isPropertyTokenType) {
+377 result = " Validation type is {@code tokenSet}." ;
+378 }
+379 return result;
+380 }
+381
+382 private static String emptyStringArrayDefaultValue(Node defaultValueNode,
+383 boolean isPropertyTokenType) {
+384 String defaultValueText = getNodeText(defaultValueNode);
+385 if ("{@code {}}" .equals(defaultValueText)
+386 || "{@code all files}" .equals(defaultValueText)
+387 || isPropertyTokenType && "{@code empty}" .equals(defaultValueText)) {
+388 defaultValueText = "{@code \"\"}" ;
+389 }
+390 return defaultValueText;
+391 }
392
-393 final String subSectionName = XmlUtil.getNameAttributeOfNode(subSection);
-394
-395 examineCheckSubSection(subSection, subSectionName);
-396 }
-397 }
-398
-399 private static void examineCheckSubSection(Node subSection, String subSectionName) {
-400 switch (subSectionName) {
-401 case "Description" :
-402 case "Examples" :
-403 case "Notes" :
-404 case "Rule Description" :
-405 CHECK_TEXT.put(subSectionName, getNodeText(subSection).replace("\r" , "" ));
-406 break ;
-407 case "Properties" :
-408 populateProperties(subSection);
-409 CHECK_TEXT.put(subSectionName, createPropertiesText());
-410 break ;
-411 case "Example of Usage" :
-412 case "Violation Messages" :
-413 CHECK_TEXT.put(subSectionName,
-414 createViolationMessagesText(getViolationMessages(subSection)));
-415 break ;
-416 case "Package" :
-417 case "Parent Module" :
-418 CHECK_TEXT.put(subSectionName, createParentText(subSection));
-419 break ;
-420 default :
-421 break ;
-422 }
+393 private static String getNodeText(Node node) {
+394 final StringBuilder result = new StringBuilder(20);
+395
+396 for (Node child = node.getFirstChild(); child != null ; child = child.getNextSibling()) {
+397 if (child.getNodeType() == Node.TEXT_NODE) {
+398 for (String temp : child.getTextContent().split("\n" )) {
+399 final String text = temp.trim();
+400
+401 if (!text.isEmpty()) {
+402 if (shouldAppendSpace(result, text.charAt(0))) {
+403 result.append(' ');
+404 }
+405
+406 result.append(text);
+407 }
+408 }
+409 }
+410 else {
+411 if (child.hasAttributes() && child.getAttributes().getNamedItem("class" ) != null
+412 && "wrapper" .equals(child.getAttributes().getNamedItem("class" )
+413 .getNodeValue())) {
+414 appendNodeText(result, XmlUtil.getFirstChildElement(child));
+415 }
+416 else {
+417 appendNodeText(result, child);
+418 }
+419 }
+420 }
+421
+422 return result.toString();
423 }
424
-425 private static List<String> getViolationMessages(Node subsection) {
-426 final Node child = XmlUtil.getFirstChildElement(subsection);
-427 final List<String> violationMessages = new ArrayList<>();
-428 for (Node row : XmlUtil.getChildrenElements(child)) {
-429 violationMessages.add(row.getTextContent().trim());
-430 }
-431 return violationMessages;
-432 }
-433
-434 private static String createViolationMessagesText(List<String> violationMessages) {
-435 final StringBuilder result = new StringBuilder(100);
-436 result.append("\n<p>\nViolation Message Keys:\n</p>\n<ul>" );
-437
-438 for (String msg : violationMessages) {
-439 result.append("\n<li>\n{@code " ).append(msg).append("}\n</li>" );
-440 }
-441
-442 result.append("\n</ul>" );
-443 return result.toString();
-444 }
-445
-446 private static String createParentText(Node subsection) {
-447 return "\n<p>\nParent is {@code com.puppycrawl.tools.checkstyle."
-448 + XmlUtil.getFirstChildElement(subsection).getTextContent().trim() + "}\n</p>" ;
-449 }
-450
-451 private static void populateProperties(Node subSection) {
-452 boolean skip = true ;
-453
-454
-455
-456
-457 Node child = XmlUtil.getFirstChildElement(subSection);
-458 if (child.hasAttributes() && child.getAttributes().getNamedItem("class" ) != null
-459 && "wrapper" .equals(child.getAttributes().getNamedItem("class" )
-460 .getTextContent())) {
-461 child = XmlUtil.getFirstChildElement(child);
-462 }
-463 for (Node row : XmlUtil.getChildrenElements(child)) {
-464 if (skip) {
-465 skip = false;
-466 continue ;
-467 }
-468 CHECK_PROPERTIES.add(new ArrayList<>(XmlUtil.getChildrenElements(row)));
-469 }
-470 }
-471
-472 private static String createPropertiesText() {
-473 final StringBuilder result = new StringBuilder(100);
-474
-475 result.append("\n<ul>" );
-476
-477 for (List<Node> property : CHECK_PROPERTIES) {
-478 final String propertyName = getNodeText(property.get(0));
+425
+426 private static void appendNodeText(StringBuilder result, Node node) {
+427 final String name = transformXmlToJavaDocName(node.getNodeName());
+428 final boolean list = "ol" .equals(name) || "ul" .equals(name);
+429 final boolean newLineOpenBefore = list || "p" .equals(name) || "pre" .equals(name)
+430 || "li" .equals(name);
+431 final boolean newLineOpenAfter = newLineOpenBefore && !list;
+432 final boolean newLineClose = newLineOpenAfter || list;
+433 final boolean sanitize = "pre" .equals(name);
+434 final boolean changeToTag = "code" .equals(name);
+435
+436 if (newLineOpenBefore) {
+437 result.append('\n');
+438 }
+439 else if (shouldAppendSpace(result, '<')) {
+440 result.append(' ');
+441 }
+442
+443 if (changeToTag) {
+444 result.append("{@" );
+445 result.append(name);
+446 result.append(' ');
+447 }
+448 else {
+449 result.append('<');
+450 result.append(name);
+451 result.append(getAttributeText(name, node.getAttributes()));
+452 result.append('>');
+453 }
+454
+455 if (newLineOpenAfter) {
+456 result.append('\n');
+457 }
+458
+459 if (sanitize) {
+460 result.append(XmlUtil.sanitizeXml(node.getTextContent()));
+461 }
+462 else {
+463 result.append(getNodeText(node));
+464 }
+465
+466 if (newLineClose) {
+467 result.append('\n');
+468 }
+469
+470 if (changeToTag) {
+471 result.append('}');
+472 }
+473 else {
+474 result.append("</" );
+475 result.append(name);
+476 result.append('>');
+477 }
+478 }
479
-480 result.append("\n<li>\nProperty {@code " );
-481 result.append(propertyName);
-482 result.append("} - " );
-483
-484 final String temp = getNodeText(property.get(1));
-485
-486 result.append(temp);
-487 CHECK_PROPERTY_DOC.put(propertyName, temp);
+480 private static boolean shouldAppendSpace(StringBuilder text, char firstCharToAppend) {
+481 final boolean result;
+482
+483 if (text.length() == 0) {
+484 result = false;
+485 }
+486 else {
+487 final char last = text.charAt(text.length() - 1);
488
-489 String typeText = "java.lang.String[]" ;
-490 final String propertyType = property.get(2).getTextContent();
-491 final boolean isSpecialAllTokensType = propertyType.contains("set of any supported" );
-492 final boolean isPropertyTokenType = isSpecialAllTokensType
-493 || propertyType.contains("subset of tokens" )
-494 || propertyType.contains("subset of javadoc tokens" );
-495 if (!isPropertyTokenType) {
-496 final String typeName =
-497 getCorrectNodeBasedOnPropertyType(property).getTextContent().trim();
-498 typeText = FULLY_QUALIFIED_CLASS_NAMES.get(typeName).getTypeName();
-499 }
-500 if (isSpecialAllTokensType) {
-501 typeText = "anyTokenTypesSet" ;
-502 }
-503 result.append(" Type is {@code " ).append(typeText).append("}." );
-504
-505 if (!isSpecialAllTokensType) {
-506 final String validationType = getValidationType(isPropertyTokenType, propertyName);
-507 if (validationType != null ) {
-508 result.append(validationType);
-509 }
-510 }
+489 result = (firstCharToAppend == '@'
+490 || Character.getType(firstCharToAppend) == Character.DASH_PUNCTUATION
+491 || Character.getType(last) == Character.OTHER_PUNCTUATION
+492 || Character.isAlphabetic(last)
+493 || Character.isAlphabetic(firstCharToAppend)) && !Character.isWhitespace(last);
+494 }
+495
+496 return result;
+497 }
+498
+499 private static String transformXmlToJavaDocName(String name) {
+500 final String result;
+501
+502 if ("source" .equals(name)) {
+503 result = "pre" ;
+504 }
+505 else if ("h4" .equals(name)) {
+506 result = "p" ;
+507 }
+508 else {
+509 result = name;
+510 }
511
-512 result.append(getDefaultValueOfType(propertyName, isSpecialAllTokensType));
-513
-514 result.append(emptyStringArrayDefaultValue(property.get(3), isPropertyTokenType));
-515
-516 if (result.charAt(result.length() - 1) != '.') {
-517 result.append('.');
-518 }
-519
-520 result.append("\n</li>" );
-521 }
-522
-523 result.append("\n</ul>" );
+512 return result;
+513 }
+514
+515 private static String getAttributeText(String nodeName, NamedNodeMap attributes) {
+516 final StringBuilder result = new StringBuilder(20);
+517
+518 for (int i = 0; i < attributes.getLength(); i++) {
+519 result.append(' ');
+520
+521 final Node attribute = attributes.item(i);
+522 final String attrName = attribute.getNodeName();
+523 final String attrValue;
524
-525 return result.toString();
-526 }
+525 if ("a" .equals(nodeName) && "href" .equals(attrName)) {
+526 final String value = attribute.getNodeValue();
527
-528 private static Node getCorrectNodeBasedOnPropertyType(List<Node> property) {
-529 final Node result;
-530 if (property.get(2).getFirstChild().getFirstChild() == null ) {
-531 result = property.get(2).getFirstChild().getNextSibling();
-532 }
-533 else {
-534 result = property.get(2).getFirstChild().getFirstChild();
-535 }
-536 return result;
-537 }
-538
-539 private static String getDefaultValueOfType(String propertyName,
-540 boolean isSpecialAllTokensType) {
-541 final String result;
-542 if (!isSpecialAllTokensType
-543 && (propertyName.endsWith("token" ) || propertyName.endsWith(
-544 "tokens" ))) {
-545 result = " Default value is: " ;
-546 }
-547 else {
-548 result = " Default value is " ;
-549 }
-550 return result;
-551 }
-552
-553 private static String getValidationType(boolean isPropertyTokenType, String propertyName) {
-554 String result = null ;
-555 if (NON_BASE_TOKEN_PROPERTIES.contains(checkName + " - " + propertyName)) {
-556 result = " Validation type is {@code tokenTypesSet}." ;
-557 }
-558 else if (isPropertyTokenType) {
-559 result = " Validation type is {@code tokenSet}." ;
-560 }
-561 return result;
-562 }
-563
-564 private static String emptyStringArrayDefaultValue(Node defaultValueNode,
-565 boolean isPropertyTokenType) {
-566 String defaultValueText = getNodeText(defaultValueNode);
-567 if ("{@code {}}" .equals(defaultValueText)
-568 || "{@code all files}" .equals(defaultValueText)
-569 || isPropertyTokenType && "{@code empty}" .equals(defaultValueText)) {
-570 defaultValueText = "{@code \"\"}" ;
-571 }
-572 return defaultValueText;
-573 }
-574
-575 private static String getNodeText(Node node) {
-576 final StringBuilder result = new StringBuilder(20);
-577
-578 for (Node child = node.getFirstChild(); child != null ; child = child.getNextSibling()) {
-579 if (child.getNodeType() == Node.TEXT_NODE) {
-580 for (String temp : child.getTextContent().split("\n" )) {
-581 final String text = temp.trim();
-582
-583 if (!text.isEmpty()) {
-584 if (shouldAppendSpace(result, text.charAt(0))) {
-585 result.append(' ');
-586 }
-587
-588 result.append(text);
-589 }
-590 }
-591 }
-592 else {
-593 if (child.hasAttributes() && child.getAttributes().getNamedItem("class" ) != null
-594 && "wrapper" .equals(child.getAttributes().getNamedItem("class" )
-595 .getNodeValue())) {
-596 appendNodeText(result, XmlUtil.getFirstChildElement(child));
-597 }
-598 else {
-599 appendNodeText(result, child);
-600 }
-601 }
-602 }
+528 assertWithMessage("links starting with '#' aren't supported: " + value)
+529 .that(value.charAt(0))
+530 .isNotEqualTo('#');
+531
+532 attrValue = getLinkValue(value);
+533 }
+534 else {
+535 attrValue = attribute.getNodeValue();
+536 }
+537
+538 result.append(attrName);
+539 result.append("=\"" );
+540 result.append(attrValue);
+541 result.append('"');
+542 }
+543
+544 return result.toString();
+545 }
+546
+547 private static String getLinkValue(String initialValue) {
+548 String value = initialValue;
+549 final String attrValue;
+550 if (value.contains("://" )) {
+551 attrValue = value;
+552 }
+553 else {
+554 if (value.charAt(0) == '/') {
+555 value = value.substring(1);
+556 }
+557
+558
+559 if (!initialValue.startsWith("/dtds" )) {
+560 value = currentXdocPath
+561 .getParent()
+562 .resolve(Paths.get(value))
+563 .normalize()
+564 .toString()
+565 .replaceAll("src[\\\\/]xdocs[\\\\/]" , "" )
+566 .replaceAll("\\\\" , "/" );
+567 }
+568
+569 attrValue = "https://checkstyle.org/" + value;
+570 }
+571 return attrValue;
+572 }
+573
+574 public static class JavaDocCapture extends AbstractCheck {
+575 private static final Pattern SETTER_PATTERN = Pattern.compile("^set[A-Z].*" );
+576
+577 @Override
+578 public boolean isCommentNodesRequired() {
+579 return true ;
+580 }
+581
+582 @Override
+583 public int [] getRequiredTokens() {
+584 return new int [] {
+585 TokenTypes.BLOCK_COMMENT_BEGIN,
+586 };
+587 }
+588
+589 @Override
+590 public int [] getDefaultTokens() {
+591 return getRequiredTokens();
+592 }
+593
+594 @Override
+595 public int [] getAcceptableTokens() {
+596 return getRequiredTokens();
+597 }
+598
+599 @Override
+600 public void visitToken(DetailAST ast) {
+601 if (JavadocUtil.isJavadocComment(ast)) {
+602 final DetailAST parentNode = getParent(ast);
603
-604 return result.toString();
-605 }
-606
-607
-608 private static void appendNodeText(StringBuilder result, Node node) {
-609 final String name = transformXmlToJavaDocName(node.getNodeName());
-610 final boolean list = "ol" .equals(name) || "ul" .equals(name);
-611 final boolean newLineOpenBefore = list || "p" .equals(name) || "pre" .equals(name)
-612 || "li" .equals(name);
-613 final boolean newLineOpenAfter = newLineOpenBefore && !list;
-614 final boolean newLineClose = newLineOpenAfter || list;
-615 final boolean sanitize = "pre" .equals(name);
-616 final boolean changeToTag = "code" .equals(name);
-617
-618 if (newLineOpenBefore) {
-619 result.append('\n');
-620 }
-621 else if (shouldAppendSpace(result, '<')) {
-622 result.append(' ');
-623 }
-624
-625 if (changeToTag) {
-626 result.append("{@" );
-627 result.append(name);
-628 result.append(' ');
-629 }
-630 else {
-631 result.append('<');
-632 result.append(name);
-633 result.append(getAttributeText(name, node.getAttributes()));
-634 result.append('>');
-635 }
+604 switch (parentNode.getType()) {
+605 case TokenTypes.CLASS_DEF:
+606 visitClass(ast);
+607 break ;
+608 case TokenTypes.METHOD_DEF:
+609 visitMethod(ast, parentNode);
+610 break ;
+611 case TokenTypes.VARIABLE_DEF:
+612 visitField(ast, parentNode);
+613 break ;
+614 case TokenTypes.CTOR_DEF:
+615 case TokenTypes.ENUM_DEF:
+616 case TokenTypes.ENUM_CONSTANT_DEF:
+617
+618 break ;
+619 default :
+620 assertWithMessage(
+621 "Unknown token '" + TokenUtil.getTokenName(parentNode.getType())
+622 + "': " + ast.getLineNo()).fail();
+623 break ;
+624 }
+625 }
+626 }
+627
+628 private static DetailAST getParent(DetailAST node) {
+629 DetailAST result = node.getParent();
+630 int type = result.getType();
+631
+632 while (type == TokenTypes.MODIFIERS || type == TokenTypes.ANNOTATION) {
+633 result = result.getParent();
+634 type = result.getType();
+635 }
636
-637 if (newLineOpenAfter) {
-638 result.append('\n');
-639 }
-640
-641 if (sanitize) {
-642 result.append(XmlUtil.sanitizeXml(node.getTextContent()));
-643 }
-644 else {
-645 result.append(getNodeText(node));
-646 }
-647
-648 if (newLineClose) {
-649 result.append('\n');
-650 }
-651
-652 if (changeToTag) {
-653 result.append('}');
-654 }
-655 else {
-656 result.append("</" );
-657 result.append(name);
-658 result.append('>');
-659 }
-660 }
+637 return result;
+638 }
+639
+640 private static void visitClass(DetailAST node) {
+641 String violationMessagesText = CHECK_TEXT.get("Violation Messages" );
+642
+643 if (checkName.endsWith("Filter" ) || "SuppressWarningsHolder" .equals(checkName)) {
+644 violationMessagesText = "" ;
+645 }
+646
+647 if (ScopeUtil.isInScope(node, Scope.PUBLIC)) {
+648 final String expected = CHECK_TEXT.get("Description" )
+649 + CHECK_TEXT.computeIfAbsent("Rule Description" , unused -> "" )
+650 + CHECK_TEXT.computeIfAbsent("Notes" , unused -> "" )
+651 + CHECK_TEXT.computeIfAbsent("Properties" , unused -> "" )
+652 + CHECK_TEXT.get("Parent Module" )
+653 + violationMessagesText + " @since "
+654 + CHECK_TEXT.get("since" );
+655
+656 assertWithMessage(checkName + "'s class-level JavaDoc" )
+657 .that(getJavaDocText(node))
+658 .isEqualTo(expected);
+659 }
+660 }
661
-662 private static boolean shouldAppendSpace(StringBuilder text, char firstCharToAppend) {
-663 final boolean result;
-664
-665 if (text.length() == 0) {
-666 result = false;
-667 }
-668 else {
-669 final char last = text.charAt(text.length() - 1);
-670
-671 result = (firstCharToAppend == '@'
-672 || Character.getType(firstCharToAppend) == Character.DASH_PUNCTUATION
-673 || Character.getType(last) == Character.OTHER_PUNCTUATION
-674 || Character.isAlphabetic(last)
-675 || Character.isAlphabetic(firstCharToAppend)) && !Character.isWhitespace(last);
-676 }
-677
-678 return result;
-679 }
-680
-681 private static String transformXmlToJavaDocName(String name) {
-682 final String result;
-683
-684 if ("source" .equals(name)) {
-685 result = "pre" ;
-686 }
-687 else if ("h4" .equals(name)) {
-688 result = "p" ;
-689 }
-690 else {
-691 result = name;
+662 private static void visitField(DetailAST node, DetailAST parentNode) {
+663 if (ScopeUtil.isInScope(parentNode, Scope.PUBLIC)) {
+664 final String propertyName = parentNode.findFirstToken(TokenTypes.IDENT).getText();
+665 final String propertyDoc = CHECK_PROPERTY_DOC.get(propertyName);
+666
+667 if (propertyDoc != null ) {
+668 assertWithMessage(checkName + "'s class field-level JavaDoc for "
+669 + propertyName)
+670 .that(getJavaDocText(node))
+671 .isEqualTo(makeFirstUpper(propertyDoc));
+672 }
+673 }
+674 }
+675
+676 private static void visitMethod(DetailAST node, DetailAST parentNode) {
+677 if (ScopeUtil.isInScope(node, Scope.PUBLIC) && isSetterMethod(parentNode)) {
+678 final String propertyUpper = parentNode.findFirstToken(TokenTypes.IDENT)
+679 .getText().substring(3);
+680 final String propertyName = makeFirstLower(propertyUpper);
+681 final String propertyDoc = CHECK_PROPERTY_DOC.get(propertyName);
+682
+683 if (propertyDoc != null ) {
+684 final String javaDoc = getJavaDocText(node);
+685
+686 assertWithMessage(checkName + "'s class method-level JavaDoc for "
+687 + propertyName)
+688 .that(javaDoc.substring(0, javaDoc.indexOf(" @param" )))
+689 .isEqualTo("Setter to " + makeFirstLower(propertyDoc));
+690 }
+691 }
692 }
693
-694 return result;
-695 }
-696
-697 private static String getAttributeText(String nodeName, NamedNodeMap attributes) {
-698 final StringBuilder result = new StringBuilder(20);
-699
-700 for (int i = 0; i < attributes.getLength(); i++) {
-701 result.append(' ');
-702
-703 final Node attribute = attributes.item(i);
-704 final String attrName = attribute.getNodeName();
-705 final String attrValue;
-706
-707 if ("a" .equals(nodeName) && "href" .equals(attrName)) {
-708 final String value = attribute.getNodeValue();
-709
-710 assertWithMessage("links starting with '#' aren't supported: " + value)
-711 .that(value.charAt(0))
-712 .isNotEqualTo('#');
+694
+695
+696
+697
+698
+699
+700
+701
+702 private static boolean isSetterMethod(DetailAST ast) {
+703 boolean setterMethod = false;
+704
+705 if (ast.getType() == TokenTypes.METHOD_DEF) {
+706 final DetailAST type = ast.findFirstToken(TokenTypes.TYPE);
+707 final String name = type.getNextSibling().getText();
+708 final boolean matchesSetterFormat = SETTER_PATTERN.matcher(name).matches();
+709 final boolean voidReturnType = type.findFirstToken(TokenTypes.LITERAL_VOID) != null ;
+710
+711 final DetailAST params = ast.findFirstToken(TokenTypes.PARAMETERS);
+712 final boolean singleParam = params.getChildCount(TokenTypes.PARAMETER_DEF) == 1;
713
-714 attrValue = getLinkValue(value);
-715 }
-716 else {
-717 attrValue = attribute.getNodeValue();
-718 }
-719
-720 result.append(attrName);
-721 result.append("=\"" );
-722 result.append(attrValue);
-723 result.append('"');
-724 }
-725
-726 return result.toString();
-727 }
-728
-729 private static String getLinkValue(String initialValue) {
-730 String value = initialValue;
-731 final String attrValue;
-732 if (value.contains("://" )) {
-733 attrValue = value;
-734 }
-735 else {
-736 if (value.charAt(0) == '/') {
-737 value = value.substring(1);
-738 }
-739
-740
-741 if (!initialValue.startsWith("/dtds" )) {
-742 value = currentXdocPath
-743 .getParent()
-744 .resolve(Paths.get(value))
-745 .normalize()
-746 .toString()
-747 .replaceAll("src[\\\\/]xdocs[\\\\/]" , "" )
-748 .replaceAll("\\\\" , "/" );
-749 }
-750
-751 attrValue = "https://checkstyle.org/" + value;
-752 }
-753 return attrValue;
-754 }
-755
-756 public static class JavaDocCapture extends AbstractCheck {
-757 private static final Pattern SETTER_PATTERN = Pattern.compile("^set[A-Z].*" );
-758
-759 @Override
-760 public boolean isCommentNodesRequired() {
-761 return true ;
-762 }
-763
-764 @Override
-765 public int [] getRequiredTokens() {
-766 return new int [] {
-767 TokenTypes.BLOCK_COMMENT_BEGIN,
-768 };
-769 }
-770
-771 @Override
-772 public int [] getDefaultTokens() {
-773 return getRequiredTokens();
-774 }
-775
-776 @Override
-777 public int [] getAcceptableTokens() {
-778 return getRequiredTokens();
-779 }
-780
-781 @Override
-782 public void visitToken(DetailAST ast) {
-783 if (JavadocUtil.isJavadocComment(ast)) {
-784 final DetailAST parentNode = getParent(ast);
-785
-786 switch (parentNode.getType()) {
-787 case TokenTypes.CLASS_DEF:
-788 visitClass(ast);
-789 break ;
-790 case TokenTypes.METHOD_DEF:
-791 visitMethod(ast, parentNode);
-792 break ;
-793 case TokenTypes.VARIABLE_DEF:
-794 visitField(ast, parentNode);
-795 break ;
-796 case TokenTypes.CTOR_DEF:
-797 case TokenTypes.ENUM_DEF:
-798 case TokenTypes.ENUM_CONSTANT_DEF:
-799
-800 break ;
-801 default :
-802 assertWithMessage(
-803 "Unknown token '" + TokenUtil.getTokenName(parentNode.getType())
-804 + "': " + ast.getLineNo()).fail();
-805 break ;
-806 }
-807 }
-808 }
-809
-810 private static DetailAST getParent(DetailAST node) {
-811 DetailAST result = node.getParent();
-812 int type = result.getType();
-813
-814 while (type == TokenTypes.MODIFIERS || type == TokenTypes.ANNOTATION) {
-815 result = result.getParent();
-816 type = result.getType();
-817 }
-818
-819 return result;
-820 }
-821
-822 private static void visitClass(DetailAST node) {
-823 String violationMessagesText = CHECK_TEXT.get("Violation Messages" );
-824
-825 if (checkName.endsWith("Filter" ) || "SuppressWarningsHolder" .equals(checkName)) {
-826 violationMessagesText = "" ;
-827 }
-828
-829 if (ScopeUtil.isInScope(node, Scope.PUBLIC)) {
-830 String expected = CHECK_TEXT.get("Description" )
-831 + CHECK_TEXT.computeIfAbsent("Rule Description" , unused -> "" )
-832 + CHECK_TEXT.computeIfAbsent("Notes" , unused -> "" )
-833 + CHECK_TEXT.computeIfAbsent("Properties" , unused -> "" );
-834
-835 if (!MODULES_EXAMPLES_TO_SKIP.contains(checkName)) {
-836 expected += CHECK_TEXT.get("Examples" );
-837 }
-838
-839 expected += CHECK_TEXT.get("Parent Module" )
-840 + violationMessagesText + " @since "
-841 + CHECK_TEXT.get("since" );
-842
-843 assertWithMessage(checkName + "'s class-level JavaDoc" )
-844 .that(getJavaDocText(node))
-845 .isEqualTo(expected);
-846 }
-847 }
-848
-849 private static void visitField(DetailAST node, DetailAST parentNode) {
-850 if (ScopeUtil.isInScope(parentNode, Scope.PUBLIC)) {
-851 final String propertyName = parentNode.findFirstToken(TokenTypes.IDENT).getText();
-852 final String propertyDoc = CHECK_PROPERTY_DOC.get(propertyName);
-853
-854 if (propertyDoc != null ) {
-855 assertWithMessage(checkName + "'s class field-level JavaDoc for "
-856 + propertyName)
-857 .that(getJavaDocText(node))
-858 .isEqualTo(makeFirstUpper(propertyDoc));
-859 }
-860 }
-861 }
-862
-863 private static void visitMethod(DetailAST node, DetailAST parentNode) {
-864 if (ScopeUtil.isInScope(node, Scope.PUBLIC) && isSetterMethod(parentNode)) {
-865 final String propertyUpper = parentNode.findFirstToken(TokenTypes.IDENT)
-866 .getText().substring(3);
-867 final String propertyName = makeFirstLower(propertyUpper);
-868 final String propertyDoc = CHECK_PROPERTY_DOC.get(propertyName);
-869
-870 if (propertyDoc != null ) {
-871 final String javaDoc = getJavaDocText(node);
-872
-873 assertWithMessage(checkName + "'s class method-level JavaDoc for "
-874 + propertyName)
-875 .that(javaDoc.substring(0, javaDoc.indexOf(" @param" )))
-876 .isEqualTo("Setter to " + makeFirstLower(propertyDoc));
-877 }
-878 }
-879 }
-880
-881
-882
-883
-884
-885
-886
-887
-888
-889 private static boolean isSetterMethod(DetailAST ast) {
-890 boolean setterMethod = false;
-891
-892 if (ast.getType() == TokenTypes.METHOD_DEF) {
-893 final DetailAST type = ast.findFirstToken(TokenTypes.TYPE);
-894 final String name = type.getNextSibling().getText();
-895 final boolean matchesSetterFormat = SETTER_PATTERN.matcher(name).matches();
-896 final boolean voidReturnType = type.findFirstToken(TokenTypes.LITERAL_VOID) != null ;
-897
-898 final DetailAST params = ast.findFirstToken(TokenTypes.PARAMETERS);
-899 final boolean singleParam = params.getChildCount(TokenTypes.PARAMETER_DEF) == 1;
-900
-901 if (matchesSetterFormat && voidReturnType && singleParam) {
-902 final DetailAST slist = ast.findFirstToken(TokenTypes.SLIST);
-903
-904 setterMethod = slist != null ;
-905 }
-906 }
-907 return setterMethod;
-908 }
-909
-910 private static String getJavaDocText(DetailAST node) {
-911 final String text = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<document>\n"
-912 + node.getFirstChild().getText().replaceAll("(^|\\r?\\n)\\s*\\* ?" , "\n" )
-913 .replaceAll("\\n?@noinspection.*\\r?\\n[^@]*" , "\n" )
-914 .trim() + "\n</document>" ;
-915 String result = null ;
-916
-917 try {
-918 result = getNodeText(XmlUtil.getRawXml(checkName, text, text).getFirstChild())
-919 .replace("\r" , "" );
-920 }
-921 catch (ParserConfigurationException ex) {
-922 assertWithMessage("Exception: " + ex.getClass() + " - " + ex.getMessage()).fail();
-923 }
-924
-925 return result;
-926 }
-927
-928 private static String makeFirstUpper(String str) {
-929 final char ch = str.charAt(0);
-930 final String result;
-931
-932 if (Character.isLowerCase(ch)) {
-933 result = Character.toUpperCase(ch) + str.substring(1);
-934 }
-935 else {
-936 result = str;
-937 }
-938
-939 return result;
-940 }
-941
-942 private static String makeFirstLower(String str) {
-943 return Character.toLowerCase(str.charAt(0)) + str.substring(1);
-944 }
-945 }
-946 }
+714 if (matchesSetterFormat && voidReturnType && singleParam) {
+715 final DetailAST slist = ast.findFirstToken(TokenTypes.SLIST);
+716
+717 setterMethod = slist != null ;
+718 }
+719 }
+720 return setterMethod;
+721 }
+722
+723 private static String getJavaDocText(DetailAST node) {
+724 final String text = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<document>\n"
+725 + node.getFirstChild().getText().replaceAll("(^|\\r?\\n)\\s*\\* ?" , "\n" )
+726 .replaceAll("\\n?@noinspection.*\\r?\\n[^@]*" , "\n" )
+727 .trim() + "\n</document>" ;
+728 String result = null ;
+729
+730 try {
+731 result = getNodeText(XmlUtil.getRawXml(checkName, text, text).getFirstChild())
+732 .replace("\r" , "" );
+733 }
+734 catch (ParserConfigurationException ex) {
+735 assertWithMessage("Exception: " + ex.getClass() + " - " + ex.getMessage()).fail();
+736 }
+737
+738 return result;
+739 }
+740
+741 private static String makeFirstUpper(String str) {
+742 final char ch = str.charAt(0);
+743 final String result;
+744
+745 if (Character.isLowerCase(ch)) {
+746 result = Character.toUpperCase(ch) + str.substring(1);
+747 }
+748 else {
+749 result = str;
+750 }
+751
+752 return result;
+753 }
+754
+755 private static String makeFirstLower(String str) {
+756 return Character.toLowerCase(str.charAt(0)) + str.substring(1);
+757 }
+758 }
+759 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/internal/XdocsPagesTest.html b/xref-test/com/puppycrawl/tools/checkstyle/internal/XdocsPagesTest.html
index 1a2116f6b1..8810b5fdb9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/internal/XdocsPagesTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/internal/XdocsPagesTest.html
@@ -252,1645 +252,1692 @@
244
245 CheckUtil.getSimpleNames(CheckUtil.getCheckstyleChecks())
246 .stream()
-247 .filter(checkName -> !"JavadocMetadataScraper" .equals(checkName))
-248 .forEach(checkName -> {
-249 if (!isPresent(availableChecks, checkName)) {
-250 assertWithMessage(
-251 checkName + " is not correctly listed on Available Checks page"
-252 + " - add it to " + AVAILABLE_CHECKS_PATH).fail();
-253 }
-254 });
-255 }
-256
-257 private static boolean isPresent(String availableChecks, String checkName) {
-258 final String linkPattern = String.format(Locale.ROOT, LINK_TEMPLATE, checkName);
-259 return availableChecks.matches(linkPattern);
-260 }
-261
-262 @Test
-263 public void testAllConfigsHaveLinkInSite() throws Exception {
-264 final String siteContent = Files.readString(SITE_PATH);
-265
-266 for (Path path : XdocUtil.getXdocsConfigFilePaths(XdocUtil.getXdocsFilePaths())) {
-267 final String expectedFile = path.toString()
-268 .replace(".xml" , ".html" )
-269 .replaceAll("\\\\" , "/" )
-270 .replaceAll("src[\\\\/]xdocs[\\\\/]" , "" );
-271 final String expectedLink = String.format(Locale.ROOT, "href=\"%s\"" , expectedFile);
-272 assertWithMessage("Expected to find link to '" + expectedLink + "' in " + SITE_PATH)
-273 .that(siteContent)
-274 .contains(expectedLink);
-275 }
-276 }
-277
-278 @Test
-279 public void testAllChecksPageInSyncWithChecksSummaries() throws Exception {
-280 final Pattern endOfSentence = Pattern.compile("(.*?\\.)\\s" , Pattern.DOTALL);
-281 final Map<String, String> summaries = readSummaries();
-282
-283 for (Path path : XdocUtil.getXdocsConfigFilePaths(XdocUtil.getXdocsFilePaths())) {
-284 final String fileName = path.getFileName().toString();
-285 if ("config_system_properties.xml" .equals(fileName)
-286 || path.toString().contains("filefilters" )
-287 || path.toString().contains("filters" )) {
-288 continue ;
-289 }
-290
-291 final String input = Files.readString(path);
-292 final Document document = XmlUtil.getRawXml(fileName, input, input);
-293 final NodeList sources = document.getElementsByTagName("subsection" );
-294
-295 for (int position = 0; position < sources.getLength(); position++) {
-296 final Node section = sources.item(position);
-297 final String sectionName = XmlUtil.getNameAttributeOfNode(section);
-298 if (!"Description" .equals(sectionName)) {
-299 continue ;
-300 }
-301
-302 final String checkName = XmlUtil.getNameAttributeOfNode(section.getParentNode());
-303 final Matcher matcher = endOfSentence.matcher(section.getTextContent());
-304 assertWithMessage(
-305 "The first sentence of the \"Description\" subsection for the check "
-306 + checkName + " in the file \"" + fileName + "\" should end with a period" )
-307 .that(matcher.find())
-308 .isTrue();
-309 final String firstSentence = XmlUtil.sanitizeXml(matcher.group(1));
-310 assertWithMessage("The summary for check " + checkName
-311 + " in the file \"" + AVAILABLE_CHECKS_PATH + "\""
-312 + " should match the first sentence of the \"Description\" subsection"
-313 + " for this check in the file \"" + fileName + "\"" )
-314 .that(summaries.get(checkName))
-315 .isEqualTo(firstSentence);
-316 }
-317 }
-318 }
-319
-320 @Test
-321 public void testCategoryIndexPageTableInSyncWithAllChecksPageTable() throws Exception {
-322 final Map<String, String> summaries = readSummaries();
-323 for (Path path : XdocUtil.getXdocsConfigFilePaths(XdocUtil.getXdocsFilePaths())) {
-324 final String fileName = path.getFileName().toString();
-325 if (!"index.xml" .equals(fileName)
-326 || path.getParent().toString().contains("filters" )) {
-327 continue ;
-328 }
-329
-330 final String input = Files.readString(path);
-331 final Document document = XmlUtil.getRawXml(fileName, input, input);
-332 final NodeList sources = document.getElementsByTagName("tr" );
-333
-334 for (int position = 0; position < sources.getLength(); position++) {
-335 final Node tableRow = sources.item(position);
-336 final Iterator<Node> cells = XmlUtil
-337 .findChildElementsByTag(tableRow, "td" ).iterator();
-338 final String checkName = XmlUtil.sanitizeXml(cells.next().getTextContent());
-339 final String description = XmlUtil.sanitizeXml(cells.next().getTextContent());
-340 assertWithMessage("The summary for check " + checkName
-341 + " in the file \"" + path + "\""
-342 + " should match the summary"
-343 + " for this check in the file \"" + AVAILABLE_CHECKS_PATH + "\"" )
-344 .that(description)
-345 .isEqualTo(summaries.get(checkName));
-346 }
-347 }
-348 }
-349
-350 private static Map<String, String> readSummaries() throws Exception {
-351 final String fileName = AVAILABLE_CHECKS_PATH.getFileName().toString();
-352 final String input = Files.readString(AVAILABLE_CHECKS_PATH);
-353 final Document document = XmlUtil.getRawXml(fileName, input, input);
-354 final NodeList rows = document.getElementsByTagName("tr" );
-355 final Map<String, String> result = new HashMap<>();
-356
-357 for (int position = 0; position < rows.getLength(); position++) {
-358 final Node row = rows.item(position);
-359 final Iterator<Node> cells = XmlUtil.findChildElementsByTag(row, "td" ).iterator();
-360 final String name = XmlUtil.sanitizeXml(cells.next().getTextContent());
-361 final String summary = XmlUtil.sanitizeXml(cells.next().getTextContent());
-362
-363 result.put(name, summary);
-364 }
+247 .filter(checkName -> {
+248 return !"JavadocMetadataScraper" .equals(checkName)
+249 && !"ClassAndPropertiesSettersJavadocScraper" .equals(checkName);
+250 })
+251 .forEach(checkName -> {
+252 if (!isPresent(availableChecks, checkName)) {
+253 assertWithMessage(
+254 checkName + " is not correctly listed on Available Checks page"
+255 + " - add it to " + AVAILABLE_CHECKS_PATH).fail();
+256 }
+257 });
+258 }
+259
+260 private static boolean isPresent(String availableChecks, String checkName) {
+261 final String linkPattern = String.format(Locale.ROOT, LINK_TEMPLATE, checkName);
+262 return availableChecks.matches(linkPattern);
+263 }
+264
+265 @Test
+266 public void testAllConfigsHaveLinkInSite() throws Exception {
+267 final String siteContent = Files.readString(SITE_PATH);
+268
+269 for (Path path : XdocUtil.getXdocsConfigFilePaths(XdocUtil.getXdocsFilePaths())) {
+270 final String expectedFile = path.toString()
+271 .replace(".xml" , ".html" )
+272 .replaceAll("\\\\" , "/" )
+273 .replaceAll("src[\\\\/]xdocs[\\\\/]" , "" );
+274 final String expectedLink = String.format(Locale.ROOT, "href=\"%s\"" , expectedFile);
+275 assertWithMessage("Expected to find link to '" + expectedLink + "' in " + SITE_PATH)
+276 .that(siteContent)
+277 .contains(expectedLink);
+278 }
+279 }
+280
+281 @Test
+282 public void testAllChecksPageInSyncWithChecksSummaries() throws Exception {
+283 final Pattern endOfSentence = Pattern.compile("(.*?\\.)\\s" , Pattern.DOTALL);
+284 final Map<String, String> summaries = readSummaries();
+285
+286 for (Path path : XdocUtil.getXdocsConfigFilePaths(XdocUtil.getXdocsFilePaths())) {
+287 final String fileName = path.getFileName().toString();
+288 if ("config_system_properties.xml" .equals(fileName)
+289 || path.toString().contains("filefilters" )
+290 || path.toString().contains("filters" )) {
+291 continue ;
+292 }
+293
+294 final String input = Files.readString(path);
+295 final Document document = XmlUtil.getRawXml(fileName, input, input);
+296 final NodeList sources = document.getElementsByTagName("subsection" );
+297
+298 for (int position = 0; position < sources.getLength(); position++) {
+299 final Node section = sources.item(position);
+300 final String sectionName = XmlUtil.getNameAttributeOfNode(section);
+301 if (!"Description" .equals(sectionName)) {
+302 continue ;
+303 }
+304
+305 final String checkName = XmlUtil.getNameAttributeOfNode(section.getParentNode());
+306 final Matcher matcher = endOfSentence.matcher(section.getTextContent());
+307 assertWithMessage(
+308 "The first sentence of the \"Description\" subsection for the check "
+309 + checkName + " in the file \"" + fileName + "\" should end with a period" )
+310 .that(matcher.find())
+311 .isTrue();
+312 final String firstSentence = XmlUtil.sanitizeXml(matcher.group(1));
+313 assertWithMessage("The summary for check " + checkName
+314 + " in the file \"" + AVAILABLE_CHECKS_PATH + "\""
+315 + " should match the first sentence of the \"Description\" subsection"
+316 + " for this check in the file \"" + fileName + "\"" )
+317 .that(summaries.get(checkName))
+318 .isEqualTo(firstSentence);
+319 }
+320 }
+321 }
+322
+323 @Test
+324 public void testCategoryIndexPageTableInSyncWithAllChecksPageTable() throws Exception {
+325 final Map<String, String> summaries = readSummaries();
+326 for (Path path : XdocUtil.getXdocsConfigFilePaths(XdocUtil.getXdocsFilePaths())) {
+327 final String fileName = path.getFileName().toString();
+328 if (!"index.xml" .equals(fileName)
+329 || path.getParent().toString().contains("filters" )) {
+330 continue ;
+331 }
+332
+333 final String input = Files.readString(path);
+334 final Document document = XmlUtil.getRawXml(fileName, input, input);
+335 final NodeList sources = document.getElementsByTagName("tr" );
+336
+337 for (int position = 0; position < sources.getLength(); position++) {
+338 final Node tableRow = sources.item(position);
+339 final Iterator<Node> cells = XmlUtil
+340 .findChildElementsByTag(tableRow, "td" ).iterator();
+341 final String checkName = XmlUtil.sanitizeXml(cells.next().getTextContent());
+342 final String description = XmlUtil.sanitizeXml(cells.next().getTextContent());
+343 assertWithMessage("The summary for check " + checkName
+344 + " in the file \"" + path + "\""
+345 + " should match the summary"
+346 + " for this check in the file \"" + AVAILABLE_CHECKS_PATH + "\"" )
+347 .that(description)
+348 .isEqualTo(summaries.get(checkName));
+349 }
+350 }
+351 }
+352
+353 private static Map<String, String> readSummaries() throws Exception {
+354 final String fileName = AVAILABLE_CHECKS_PATH.getFileName().toString();
+355 final String input = Files.readString(AVAILABLE_CHECKS_PATH);
+356 final Document document = XmlUtil.getRawXml(fileName, input, input);
+357 final NodeList rows = document.getElementsByTagName("tr" );
+358 final Map<String, String> result = new HashMap<>();
+359
+360 for (int position = 0; position < rows.getLength(); position++) {
+361 final Node row = rows.item(position);
+362 final Iterator<Node> cells = XmlUtil.findChildElementsByTag(row, "td" ).iterator();
+363 final String name = XmlUtil.sanitizeXml(cells.next().getTextContent());
+364 final String summary = XmlUtil.sanitizeXml(cells.next().getTextContent());
365
-366 return result;
-367 }
+366 result.put(name, summary);
+367 }
368
-369 @Test
-370 public void testAllSubSections() throws Exception {
-371 for (Path path : XdocUtil.getXdocsFilePaths()) {
-372 final String input = Files.readString(path);
-373 final String fileName = path.getFileName().toString();
-374
-375 final Document document = XmlUtil.getRawXml(fileName, input, input);
-376 final NodeList subSections = document.getElementsByTagName("subsection" );
+369 return result;
+370 }
+371
+372 @Test
+373 public void testAllSubSections() throws Exception {
+374 for (Path path : XdocUtil.getXdocsFilePaths()) {
+375 final String input = Files.readString(path);
+376 final String fileName = path.getFileName().toString();
377
-378 for (int position = 0; position < subSections.getLength(); position++) {
-379 final Node subSection = subSections.item(position);
-380 final Node name = subSection.getAttributes().getNamedItem("name" );
-381
-382 assertWithMessage("All sub-sections in '" + fileName + "' must have a name" )
-383 .that(name)
-384 .isNotNull();
-385
-386 final Node id = subSection.getAttributes().getNamedItem("id" );
-387
-388 assertWithMessage("All sub-sections in '" + fileName + "' must have an id" )
-389 .that(id)
-390 .isNotNull();
-391
-392 final String sectionName;
-393 final String nameString = name.getNodeValue();
-394 final String idString = id.getNodeValue();
-395 final String expectedId;
-396
-397 if ("google_style.xml" .equals(fileName)) {
-398 sectionName = "Google" ;
-399 expectedId = (sectionName + " " + nameString).replace(' ', '_');
-400 }
-401 else if ("sun_style.xml" .equals(fileName)) {
-402 sectionName = "Sun" ;
-403 expectedId = (sectionName + " " + nameString).replace(' ', '_');
-404 }
-405 else if (path.toString().contains("filters" )
-406 || path.toString().contains("checks" )) {
-407
-408
-409 sectionName = XmlUtil.getNameAttributeOfNode(subSection.getParentNode());
-410 expectedId = nameString.replace(' ', '_');
-411 }
-412 else {
-413 sectionName = XmlUtil.getNameAttributeOfNode(subSection.getParentNode());
-414 expectedId = (sectionName + " " + nameString).replace(' ', '_');
-415 }
-416
-417 assertWithMessage(fileName + " sub-section " + nameString + " for section "
-418 + sectionName + " must match" )
-419 .that(idString)
-420 .isEqualTo(expectedId);
-421 }
-422 }
-423 }
-424
-425 @Test
-426 public void testAllXmlExamples() throws Exception {
-427 for (Path path : XdocUtil.getXdocsFilePaths()) {
-428 final String input = Files.readString(path);
-429 final String fileName = path.getFileName().toString();
-430
-431 final Document document = XmlUtil.getRawXml(fileName, input, input);
-432 final NodeList sources = document.getElementsByTagName("source" );
+378 final Document document = XmlUtil.getRawXml(fileName, input, input);
+379 final NodeList subSections = document.getElementsByTagName("subsection" );
+380
+381 for (int position = 0; position < subSections.getLength(); position++) {
+382 final Node subSection = subSections.item(position);
+383 final Node name = subSection.getAttributes().getNamedItem("name" );
+384
+385 assertWithMessage("All sub-sections in '" + fileName + "' must have a name" )
+386 .that(name)
+387 .isNotNull();
+388
+389 final Node id = subSection.getAttributes().getNamedItem("id" );
+390
+391 assertWithMessage("All sub-sections in '" + fileName + "' must have an id" )
+392 .that(id)
+393 .isNotNull();
+394
+395 final String sectionName;
+396 final String nameString = name.getNodeValue();
+397 final String idString = id.getNodeValue();
+398 final String expectedId;
+399
+400 if ("google_style.xml" .equals(fileName)) {
+401 sectionName = "Google" ;
+402 expectedId = (sectionName + " " + nameString).replace(' ', '_');
+403 }
+404 else if ("sun_style.xml" .equals(fileName)) {
+405 sectionName = "Sun" ;
+406 expectedId = (sectionName + " " + nameString).replace(' ', '_');
+407 }
+408 else if (path.toString().contains("filters" )
+409 || path.toString().contains("checks" )) {
+410
+411
+412 sectionName = XmlUtil.getNameAttributeOfNode(subSection.getParentNode());
+413 expectedId = nameString.replace(' ', '_');
+414 }
+415 else {
+416 sectionName = XmlUtil.getNameAttributeOfNode(subSection.getParentNode());
+417 expectedId = (sectionName + " " + nameString).replace(' ', '_');
+418 }
+419
+420 assertWithMessage(fileName + " sub-section " + nameString + " for section "
+421 + sectionName + " must match" )
+422 .that(idString)
+423 .isEqualTo(expectedId);
+424 }
+425 }
+426 }
+427
+428 @Test
+429 public void testAllXmlExamples() throws Exception {
+430 for (Path path : XdocUtil.getXdocsFilePaths()) {
+431 final String input = Files.readString(path);
+432 final String fileName = path.getFileName().toString();
433
-434 for (int position = 0; position < sources.getLength(); position++) {
-435 final String unserializedSource = sources.item(position).getTextContent()
-436 .replace("..." , "" ).trim();
-437
-438 if (unserializedSource.length() > 1 && (unserializedSource.charAt(0) != '<'
-439 || unserializedSource.charAt(unserializedSource.length() - 1) != '>'
-440
-441 || unserializedSource.contains("<!" ))) {
-442 continue ;
-443 }
-444
-445 final String code = buildXml(unserializedSource);
-446
-447 XmlUtil.getRawXml(fileName, code, unserializedSource);
-448
-449
-450 assertWithMessage("Xml is invalid, old or has outdated structure" )
-451 .that(fileName.startsWith("anttask" )
-452 || fileName.startsWith("releasenotes" )
-453 || fileName.startsWith("writingjavadocchecks" )
-454 || isValidCheckstyleXml(fileName, code, unserializedSource))
-455 .isTrue();
-456 }
-457 }
-458 }
-459
-460 private static String buildXml(String unserializedSource) throws IOException {
-461
-462 String code = unserializedSource
-463
-464 .replace("target/cachefile" , "target/cachefile-test" );
-465
-466 if (!hasFileSetClass(code)) {
-467 code = "<module name=\"TreeWalker\">\n" + code + "\n</module>" ;
-468 }
-469 if (!code.contains("name=\"Checker\"" )) {
-470 code = "<module name=\"Checker\">\n" + code + "\n</module>" ;
+434 final Document document = XmlUtil.getRawXml(fileName, input, input);
+435 final NodeList sources = document.getElementsByTagName("source" );
+436
+437 for (int position = 0; position < sources.getLength(); position++) {
+438 final String unserializedSource = sources.item(position).getTextContent()
+439 .replace("..." , "" ).trim();
+440
+441 if (unserializedSource.length() > 1 && (unserializedSource.charAt(0) != '<'
+442 || unserializedSource.charAt(unserializedSource.length() - 1) != '>'
+443
+444 || unserializedSource.contains("<!" ))) {
+445 continue ;
+446 }
+447
+448 final String code = buildXml(unserializedSource);
+449
+450 XmlUtil.getRawXml(fileName, code, unserializedSource);
+451
+452
+453 assertWithMessage("Xml is invalid, old or has outdated structure" )
+454 .that(fileName.startsWith("anttask" )
+455 || fileName.startsWith("releasenotes" )
+456 || fileName.startsWith("writingjavadocchecks" )
+457 || isValidCheckstyleXml(fileName, code, unserializedSource))
+458 .isTrue();
+459 }
+460 }
+461 }
+462
+463 private static String buildXml(String unserializedSource) throws IOException {
+464
+465 String code = unserializedSource
+466
+467 .replace("target/cachefile" , "target/cachefile-test" );
+468
+469 if (!hasFileSetClass(code)) {
+470 code = "<module name=\"TreeWalker\">\n" + code + "\n</module>" ;
471 }
-472 if (!code.startsWith("<?xml" )) {
-473 final String dtdPath = new File(
-474 "src/main/resources/com/puppycrawl/tools/checkstyle/configuration_1_3.dtd" )
-475 .getCanonicalPath();
-476
-477 code = "<?xml version=\"1.0\"?>\n<!DOCTYPE module PUBLIC "
-478 + "\"-//Checkstyle//DTD Checkstyle Configuration 1.3//EN\" \"" + dtdPath
-479 + "\">\n" + code;
-480 }
-481 return code;
-482 }
-483
-484 private static boolean hasFileSetClass(String xml) {
-485 boolean found = false;
+472 if (!code.contains("name=\"Checker\"" )) {
+473 code = "<module name=\"Checker\">\n" + code + "\n</module>" ;
+474 }
+475 if (!code.startsWith("<?xml" )) {
+476 final String dtdPath = new File(
+477 "src/main/resources/com/puppycrawl/tools/checkstyle/configuration_1_3.dtd" )
+478 .getCanonicalPath();
+479
+480 code = "<?xml version=\"1.0\"?>\n<!DOCTYPE module PUBLIC "
+481 + "\"-//Checkstyle//DTD Checkstyle Configuration 1.3//EN\" \"" + dtdPath
+482 + "\">\n" + code;
+483 }
+484 return code;
+485 }
486
-487 for (String find : XML_FILESET_LIST) {
-488 if (xml.contains(find)) {
-489 found = true ;
-490 break ;
-491 }
-492 }
-493
-494 return found;
-495 }
+487 private static boolean hasFileSetClass(String xml) {
+488 boolean found = false;
+489
+490 for (String find : XML_FILESET_LIST) {
+491 if (xml.contains(find)) {
+492 found = true ;
+493 break ;
+494 }
+495 }
496
-497 private static boolean isValidCheckstyleXml(String fileName, String code,
-498 String unserializedSource)
-499 throws IOException, CheckstyleException {
-500
-501 if (!code.contains("com.mycompany" ) && !code.contains("checkstyle-packages" )
-502 && !code.contains("MethodLimit" ) && !code.contains("<suppress " )
-503 && !code.contains("<suppress-xpath " )
-504 && !code.contains("<import-control " )
-505 && !unserializedSource.startsWith("<property " )
-506 && !unserializedSource.startsWith("<taskdef " )) {
-507
-508 try {
-509 final Properties properties = new Properties();
-510
-511 properties.setProperty("checkstyle.header.file" ,
-512 new File("config/java.header" ).getCanonicalPath());
+497 return found;
+498 }
+499
+500 private static boolean isValidCheckstyleXml(String fileName, String code,
+501 String unserializedSource)
+502 throws IOException, CheckstyleException {
+503
+504 if (!code.contains("com.mycompany" ) && !code.contains("checkstyle-packages" )
+505 && !code.contains("MethodLimit" ) && !code.contains("<suppress " )
+506 && !code.contains("<suppress-xpath " )
+507 && !code.contains("<import-control " )
+508 && !unserializedSource.startsWith("<property " )
+509 && !unserializedSource.startsWith("<taskdef " )) {
+510
+511 try {
+512 final Properties properties = new Properties();
513
-514 final PropertiesExpander expander = new PropertiesExpander(properties);
-515 final Configuration config = ConfigurationLoader.loadConfiguration(new InputSource(
-516 new StringReader(code)), expander, IgnoredModulesOptions.EXECUTE);
-517 final Checker checker = new Checker();
-518
-519 try {
-520 final ClassLoader moduleClassLoader = Checker.class .getClassLoader();
-521 checker.setModuleClassLoader(moduleClassLoader);
-522 checker.configure(config);
-523 }
-524 finally {
-525 checker.destroy();
+514 properties.setProperty("checkstyle.header.file" ,
+515 new File("config/java.header" ).getCanonicalPath());
+516
+517 final PropertiesExpander expander = new PropertiesExpander(properties);
+518 final Configuration config = ConfigurationLoader.loadConfiguration(new InputSource(
+519 new StringReader(code)), expander, IgnoredModulesOptions.EXECUTE);
+520 final Checker checker = new Checker();
+521
+522 try {
+523 final ClassLoader moduleClassLoader = Checker.class .getClassLoader();
+524 checker.setModuleClassLoader(moduleClassLoader);
+525 checker.configure(config);
526 }
-527 }
-528 catch (CheckstyleException ex) {
-529 throw new CheckstyleException(fileName + " has invalid Checkstyle xml ("
-530 + ex.getMessage() + "): " + unserializedSource, ex);
-531 }
-532 }
-533 return true ;
-534 }
-535
-536 @Test
-537 public void testAllCheckSections() throws Exception {
-538 final ModuleFactory moduleFactory = TestUtil.getPackageObjectFactory();
-539
-540 for (Path path : XdocUtil.getXdocsConfigFilePaths(XdocUtil.getXdocsFilePaths())) {
-541 final String fileName = path.getFileName().toString();
+527 finally {
+528 checker.destroy();
+529 }
+530 }
+531 catch (CheckstyleException ex) {
+532 throw new CheckstyleException(fileName + " has invalid Checkstyle xml ("
+533 + ex.getMessage() + "): " + unserializedSource, ex);
+534 }
+535 }
+536 return true ;
+537 }
+538
+539 @Test
+540 public void testAllCheckSections() throws Exception {
+541 final ModuleFactory moduleFactory = TestUtil.getPackageObjectFactory();
542
-543 if ("config_system_properties.xml" .equals(fileName)
-544 || "index.xml" .equals(fileName)) {
-545 continue ;
-546 }
-547
-548 final String input = Files.readString(path);
-549 final Document document = XmlUtil.getRawXml(fileName, input, input);
-550 final NodeList sources = document.getElementsByTagName("section" );
-551 String lastSectionName = null ;
-552
-553 for (int position = 0; position < sources.getLength(); position++) {
-554 final Node section = sources.item(position);
-555 final String sectionName = XmlUtil.getNameAttributeOfNode(section);
-556
-557 if ("Content" .equals(sectionName) || "Overview" .equals(sectionName)) {
-558 assertWithMessage(fileName + " section '" + sectionName + "' should be first" )
-559 .that(lastSectionName)
-560 .isNull();
-561 continue ;
-562 }
-563
-564 assertWithMessage(
-565 fileName + " section '" + sectionName + "' shouldn't end with 'Check'" )
-566 .that(sectionName.endsWith("Check" ))
-567 .isFalse();
-568 if (lastSectionName != null ) {
-569 assertWithMessage(fileName + " section '" + sectionName
-570 + "' is out of order compared to '" + lastSectionName + "'" )
-571 .that(sectionName.toLowerCase(Locale.ENGLISH).compareTo(
-572 lastSectionName.toLowerCase(Locale.ENGLISH)) >= 0)
-573 .isTrue();
-574 }
-575
-576 validateCheckSection(moduleFactory, fileName, sectionName, section);
-577
-578 lastSectionName = sectionName;
-579 }
-580 }
-581 }
-582
-583
-584
-585
-586
-587
-588
-589
-590 @Test
-591 public void testAllCheckSectionsEx() throws Exception {
-592 final ModuleFactory moduleFactory = TestUtil.getPackageObjectFactory();
-593
-594 final Path path = Paths.get(XdocUtil.DIRECTORY_PATH + "/config.xml" );
-595 final String fileName = path.getFileName().toString();
+543 for (Path path : XdocUtil.getXdocsConfigFilePaths(XdocUtil.getXdocsFilePaths())) {
+544 final String fileName = path.getFileName().toString();
+545
+546 if ("config_system_properties.xml" .equals(fileName)
+547 || "index.xml" .equals(fileName)) {
+548 continue ;
+549 }
+550
+551 final String input = Files.readString(path);
+552 final Document document = XmlUtil.getRawXml(fileName, input, input);
+553 final NodeList sources = document.getElementsByTagName("section" );
+554 String lastSectionName = null ;
+555
+556 for (int position = 0; position < sources.getLength(); position++) {
+557 final Node section = sources.item(position);
+558 final String sectionName = XmlUtil.getNameAttributeOfNode(section);
+559
+560 if ("Content" .equals(sectionName) || "Overview" .equals(sectionName)) {
+561 assertWithMessage(fileName + " section '" + sectionName + "' should be first" )
+562 .that(lastSectionName)
+563 .isNull();
+564 continue ;
+565 }
+566
+567 assertWithMessage(
+568 fileName + " section '" + sectionName + "' shouldn't end with 'Check'" )
+569 .that(sectionName.endsWith("Check" ))
+570 .isFalse();
+571 if (lastSectionName != null ) {
+572 assertWithMessage(fileName + " section '" + sectionName
+573 + "' is out of order compared to '" + lastSectionName + "'" )
+574 .that(sectionName.toLowerCase(Locale.ENGLISH).compareTo(
+575 lastSectionName.toLowerCase(Locale.ENGLISH)) >= 0)
+576 .isTrue();
+577 }
+578
+579 validateCheckSection(moduleFactory, fileName, sectionName, section);
+580
+581 lastSectionName = sectionName;
+582 }
+583 }
+584 }
+585
+586
+587
+588
+589
+590
+591
+592
+593 @Test
+594 public void testAllCheckSectionsEx() throws Exception {
+595 final ModuleFactory moduleFactory = TestUtil.getPackageObjectFactory();
596
-597 final String input = Files.readString(path);
-598 final Document document = XmlUtil.getRawXml(fileName, input, input);
-599 final NodeList sources = document.getElementsByTagName("section" );
-600
-601 for (int position = 0; position < sources.getLength(); position++) {
-602 final Node section = sources.item(position);
-603 final String sectionName = XmlUtil.getNameAttributeOfNode(section);
-604
-605 if (!"Checker" .equals(sectionName) && !"TreeWalker" .equals(sectionName)) {
-606 continue ;
-607 }
-608
-609 validateCheckSection(moduleFactory, fileName, sectionName, section);
-610 }
-611 }
-612
-613 private static void validateCheckSection(ModuleFactory moduleFactory, String fileName,
-614 String sectionName, Node section) throws Exception {
-615 final Object instance;
-616
-617 try {
-618 instance = moduleFactory.createModule(sectionName);
-619 }
-620 catch (CheckstyleException ex) {
-621 throw new CheckstyleException(fileName + " couldn't find class: " + sectionName, ex);
+597 final Path path = Paths.get(XdocUtil.DIRECTORY_PATH + "/config.xml" );
+598 final String fileName = path.getFileName().toString();
+599
+600 final String input = Files.readString(path);
+601 final Document document = XmlUtil.getRawXml(fileName, input, input);
+602 final NodeList sources = document.getElementsByTagName("section" );
+603
+604 for (int position = 0; position < sources.getLength(); position++) {
+605 final Node section = sources.item(position);
+606 final String sectionName = XmlUtil.getNameAttributeOfNode(section);
+607
+608 if (!"Checker" .equals(sectionName) && !"TreeWalker" .equals(sectionName)) {
+609 continue ;
+610 }
+611
+612 validateCheckSection(moduleFactory, fileName, sectionName, section);
+613 }
+614 }
+615
+616 private static void validateCheckSection(ModuleFactory moduleFactory, String fileName,
+617 String sectionName, Node section) throws Exception {
+618 final Object instance;
+619
+620 try {
+621 instance = moduleFactory.createModule(sectionName);
622 }
-623
-624 int subSectionPos = 0;
-625 for (Node subSection : XmlUtil.getChildrenElements(section)) {
-626 if (subSectionPos == 0 && "p" .equals(subSection.getNodeName())) {
-627 validateSinceDescriptionSection(fileName, sectionName, subSection);
-628 continue ;
-629 }
-630
-631 final String subSectionName = XmlUtil.getNameAttributeOfNode(subSection);
-632
-633
-634 if ("Notes" .equals(subSectionName)
-635 || "Rule Description" .equals(subSectionName)
-636 || "Metadata" .equals(subSectionName)) {
-637 continue ;
-638 }
-639
-640
-641 if (subSectionPos == 1 && !"Properties" .equals(subSectionName)) {
-642 validatePropertySection(fileName, sectionName, null , instance);
-643 subSectionPos++;
-644 }
-645 if (subSectionPos == 4 && !"Violation Messages" .equals(subSectionName)) {
-646 validateViolationSection(fileName, sectionName, null , instance);
-647 subSectionPos++;
-648 }
-649
-650 assertWithMessage(fileName + " section '" + sectionName + "' should be in order" )
-651 .that(subSectionName)
-652 .isEqualTo(getSubSectionName(subSectionPos));
-653
-654 switch (subSectionPos) {
-655 case 0:
-656 validateDescriptionSection(fileName, sectionName, subSection);
-657 break ;
-658 case 1:
-659 validatePropertySection(fileName, sectionName, subSection, instance);
+623 catch (CheckstyleException ex) {
+624 throw new CheckstyleException(fileName + " couldn't find class: " + sectionName, ex);
+625 }
+626
+627 int subSectionPos = 0;
+628 for (Node subSection : XmlUtil.getChildrenElements(section)) {
+629 if (subSectionPos == 0 && "p" .equals(subSection.getNodeName())) {
+630 validateSinceDescriptionSection(fileName, sectionName, subSection);
+631 continue ;
+632 }
+633
+634 final String subSectionName = XmlUtil.getNameAttributeOfNode(subSection);
+635
+636
+637 if ("Notes" .equals(subSectionName)
+638 || "Rule Description" .equals(subSectionName)
+639 || "Metadata" .equals(subSectionName)) {
+640 continue ;
+641 }
+642
+643
+644 if (subSectionPos == 1 && !"Properties" .equals(subSectionName)) {
+645 validatePropertySection(fileName, sectionName, null , instance);
+646 subSectionPos++;
+647 }
+648 if (subSectionPos == 4 && !"Violation Messages" .equals(subSectionName)) {
+649 validateViolationSection(fileName, sectionName, null , instance);
+650 subSectionPos++;
+651 }
+652
+653 assertWithMessage(fileName + " section '" + sectionName + "' should be in order" )
+654 .that(subSectionName)
+655 .isEqualTo(getSubSectionName(subSectionPos));
+656
+657 switch (subSectionPos) {
+658 case 0:
+659 validateDescriptionSection(fileName, sectionName, subSection);
660 break ;
-661 case 3:
-662 validateUsageExample(fileName, sectionName, subSection);
+661 case 1:
+662 validatePropertySection(fileName, sectionName, subSection, instance);
663 break ;
-664 case 4:
-665 validateViolationSection(fileName, sectionName, subSection, instance);
+664 case 3:
+665 validateUsageExample(fileName, sectionName, subSection);
666 break ;
-667 case 5:
-668 validatePackageSection(fileName, sectionName, subSection, instance);
+667 case 4:
+668 validateViolationSection(fileName, sectionName, subSection, instance);
669 break ;
-670 case 6:
-671 validateParentSection(fileName, sectionName, subSection);
+670 case 5:
+671 validatePackageSection(fileName, sectionName, subSection, instance);
672 break ;
-673 case 2:
-674 default :
+673 case 6:
+674 validateParentSection(fileName, sectionName, subSection);
675 break ;
-676 }
-677
-678 subSectionPos++;
-679 }
+676 case 2:
+677 default :
+678 break ;
+679 }
680
-681 if ("Checker" .equals(sectionName)) {
-682 assertWithMessage(fileName + " section '" + sectionName
-683 + "' should contain up to 'Package' sub-section" )
-684 .that(subSectionPos)
-685 .isGreaterThan(5);
-686 }
-687 else {
-688 assertWithMessage(fileName + " section '" + sectionName
-689 + "' should contain up to 'Parent' sub-section" )
-690 .that(subSectionPos)
-691 .isGreaterThan(6);
-692 }
-693 }
-694
-695 private static void validateSinceDescriptionSection(String fileName, String sectionName,
-696 Node subSection) {
-697 assertWithMessage(fileName + " section '" + sectionName
-698 + "' should have a valid version at the start of the description like:\n"
-699 + DESCRIPTION_VERSION.pattern())
-700 .that(DESCRIPTION_VERSION.matcher(subSection.getTextContent().trim()).find())
-701 .isTrue();
-702 }
-703
-704 private static Object getSubSectionName(int subSectionPos) {
-705 final String result;
+681 subSectionPos++;
+682 }
+683
+684 if ("Checker" .equals(sectionName)) {
+685 assertWithMessage(fileName + " section '" + sectionName
+686 + "' should contain up to 'Package' sub-section" )
+687 .that(subSectionPos)
+688 .isGreaterThan(5);
+689 }
+690 else {
+691 assertWithMessage(fileName + " section '" + sectionName
+692 + "' should contain up to 'Parent' sub-section" )
+693 .that(subSectionPos)
+694 .isGreaterThan(6);
+695 }
+696 }
+697
+698 private static void validateSinceDescriptionSection(String fileName, String sectionName,
+699 Node subSection) {
+700 assertWithMessage(fileName + " section '" + sectionName
+701 + "' should have a valid version at the start of the description like:\n"
+702 + DESCRIPTION_VERSION.pattern())
+703 .that(DESCRIPTION_VERSION.matcher(subSection.getTextContent().trim()).find())
+704 .isTrue();
+705 }
706
-707 switch (subSectionPos) {
-708 case 0:
-709 result = "Description" ;
-710 break ;
-711 case 1:
-712 result = "Properties" ;
+707 private static Object getSubSectionName(int subSectionPos) {
+708 final String result;
+709
+710 switch (subSectionPos) {
+711 case 0:
+712 result = "Description" ;
713 break ;
-714 case 2:
-715 result = "Examples" ;
+714 case 1:
+715 result = "Properties" ;
716 break ;
-717 case 3:
-718 result = "Example of Usage" ;
+717 case 2:
+718 result = "Examples" ;
719 break ;
-720 case 4:
-721 result = "Violation Messages" ;
+720 case 3:
+721 result = "Example of Usage" ;
722 break ;
-723 case 5:
-724 result = "Package" ;
+723 case 4:
+724 result = "Violation Messages" ;
725 break ;
-726 case 6:
-727 result = "Parent Module" ;
+726 case 5:
+727 result = "Package" ;
728 break ;
-729 default :
-730 result = null ;
+729 case 6:
+730 result = "Parent Module" ;
731 break ;
-732 }
-733
-734 return result;
-735 }
+732 default :
+733 result = null ;
+734 break ;
+735 }
736
-737 private static void validateDescriptionSection(String fileName, String sectionName,
-738 Node subSection) {
-739 if ("config_filters.xml" .equals(fileName) && "SuppressionXpathFilter" .equals(sectionName)) {
-740 validateListOfSuppressionXpathFilterIncompatibleChecks(subSection);
-741 }
-742 }
-743
-744 private static void validateListOfSuppressionXpathFilterIncompatibleChecks(Node subSection) {
-745 assertWithMessage(
-746 "Incompatible check list should match XpathRegressionTest.INCOMPATIBLE_CHECK_NAMES" )
-747 .that(getListById(subSection, "SuppressionXpathFilter_IncompatibleChecks" ))
-748 .isEqualTo(XpathRegressionTest.INCOMPATIBLE_CHECK_NAMES);
-749 final Set<String> suppressionXpathFilterJavadocChecks = getListById(subSection,
-750 "SuppressionXpathFilter_JavadocChecks" );
-751 assertWithMessage(
-752 "Javadoc check list should match XpathRegressionTest.INCOMPATIBLE_JAVADOC_CHECK_NAMES" )
-753 .that(suppressionXpathFilterJavadocChecks)
-754 .isEqualTo(XpathRegressionTest.INCOMPATIBLE_JAVADOC_CHECK_NAMES);
-755 }
-756
-757 private static void validatePropertySection(String fileName, String sectionName,
-758 Node subSection, Object instance) throws Exception {
-759 final Set<String> properties = getProperties(instance.getClass());
-760 final Class<?> clss = instance.getClass();
-761
-762 fixCapturedProperties(sectionName, instance, clss, properties);
-763
-764 if (subSection != null ) {
-765 assertWithMessage(fileName + " section '" + sectionName
-766 + "' should have no properties to show" )
-767 .that(properties)
-768 .isNotEmpty();
-769
-770 final Set<Node> nodes = XmlUtil.getChildrenElements(subSection);
-771 assertWithMessage(fileName + " section '" + sectionName
-772 + "' subsection 'Properties' should have one child node" )
-773 .that(nodes)
-774 .hasSize(1);
-775
-776 final Node div = nodes.iterator().next();
-777 assertWithMessage(fileName + " section '" + sectionName
-778 + "' subsection 'Properties' has unexpected child node" )
-779 .that(div.getNodeName())
-780 .isEqualTo("div" );
-781 final String wrapperMessage = fileName + " section '" + sectionName
-782 + "' subsection 'Properties' wrapping div for table needs the"
-783 + " class 'wrapper'" ;
-784 assertWithMessage(wrapperMessage)
-785 .that(div.hasAttributes())
-786 .isTrue();
+737 return result;
+738 }
+739
+740 private static void validateDescriptionSection(String fileName, String sectionName,
+741 Node subSection) {
+742 if ("config_filters.xml" .equals(fileName) && "SuppressionXpathFilter" .equals(sectionName)) {
+743 validateListOfSuppressionXpathFilterIncompatibleChecks(subSection);
+744 }
+745 }
+746
+747 private static void validateListOfSuppressionXpathFilterIncompatibleChecks(Node subSection) {
+748 assertWithMessage(
+749 "Incompatible check list should match XpathRegressionTest.INCOMPATIBLE_CHECK_NAMES" )
+750 .that(getListById(subSection, "SuppressionXpathFilter_IncompatibleChecks" ))
+751 .isEqualTo(XpathRegressionTest.INCOMPATIBLE_CHECK_NAMES);
+752 final Set<String> suppressionXpathFilterJavadocChecks = getListById(subSection,
+753 "SuppressionXpathFilter_JavadocChecks" );
+754 assertWithMessage(
+755 "Javadoc check list should match XpathRegressionTest.INCOMPATIBLE_JAVADOC_CHECK_NAMES" )
+756 .that(suppressionXpathFilterJavadocChecks)
+757 .isEqualTo(XpathRegressionTest.INCOMPATIBLE_JAVADOC_CHECK_NAMES);
+758 }
+759
+760 private static void validatePropertySection(String fileName, String sectionName,
+761 Node subSection, Object instance) throws Exception {
+762 final Set<String> properties = getProperties(instance.getClass());
+763 final Class<?> clss = instance.getClass();
+764
+765 fixCapturedProperties(sectionName, instance, clss, properties);
+766
+767 if (subSection != null ) {
+768 assertWithMessage(fileName + " section '" + sectionName
+769 + "' should have no properties to show" )
+770 .that(properties)
+771 .isNotEmpty();
+772
+773 final Set<Node> nodes = XmlUtil.getChildrenElements(subSection);
+774 assertWithMessage(fileName + " section '" + sectionName
+775 + "' subsection 'Properties' should have one child node" )
+776 .that(nodes)
+777 .hasSize(1);
+778
+779 final Node div = nodes.iterator().next();
+780 assertWithMessage(fileName + " section '" + sectionName
+781 + "' subsection 'Properties' has unexpected child node" )
+782 .that(div.getNodeName())
+783 .isEqualTo("div" );
+784 final String wrapperMessage = fileName + " section '" + sectionName
+785 + "' subsection 'Properties' wrapping div for table needs the"
+786 + " class 'wrapper'" ;
787 assertWithMessage(wrapperMessage)
-788 .that(div.getAttributes().getNamedItem("class" ).getNodeValue())
-789 .isNotNull();
+788 .that(div.hasAttributes())
+789 .isTrue();
790 assertWithMessage(wrapperMessage)
-791 .that(div.getAttributes().getNamedItem("class" ).getNodeValue())
-792 .contains("wrapper" );
-793
-794 final Node table = XmlUtil.getFirstChildElement(div);
-795 assertWithMessage(fileName + " section '" + sectionName
-796 + "' subsection 'Properties' has unexpected child node" )
-797 .that(table.getNodeName())
-798 .isEqualTo("table" );
-799
-800 validatePropertySectionProperties(fileName, sectionName, table, instance,
-801 properties);
-802 }
-803
-804 assertWithMessage(
-805 fileName + " section '" + sectionName + "' should show properties: " + properties)
-806 .that(properties)
-807 .isEmpty();
-808 }
-809
-810 private static void fixCapturedProperties(String sectionName, Object instance, Class<?> clss,
-811 Set<String> properties) {
-812
-813 if (hasParentModule(sectionName)) {
-814 if (AbstractJavadocCheck.class .isAssignableFrom(clss)) {
-815 properties.removeAll(JAVADOC_CHECK_PROPERTIES);
-816
-817
-818 properties.add("violateExecutionOnNonTightHtml" );
-819 }
-820 else if (AbstractCheck.class .isAssignableFrom(clss)) {
-821 properties.removeAll(CHECK_PROPERTIES);
-822 }
-823 }
-824 if (AbstractFileSetCheck.class .isAssignableFrom(clss)) {
-825 properties.removeAll(FILESET_PROPERTIES);
-826
-827
-828 properties.add("fileExtensions" );
+791 .that(div.getAttributes().getNamedItem("class" ).getNodeValue())
+792 .isNotNull();
+793 assertWithMessage(wrapperMessage)
+794 .that(div.getAttributes().getNamedItem("class" ).getNodeValue())
+795 .contains("wrapper" );
+796
+797 final Node table = XmlUtil.getFirstChildElement(div);
+798 assertWithMessage(fileName + " section '" + sectionName
+799 + "' subsection 'Properties' has unexpected child node" )
+800 .that(table.getNodeName())
+801 .isEqualTo("table" );
+802
+803 validatePropertySectionPropertiesOrder(fileName, sectionName, table, properties);
+804
+805 validatePropertySectionProperties(fileName, sectionName, table, instance,
+806 properties);
+807 }
+808
+809 assertWithMessage(
+810 fileName + " section '" + sectionName + "' should show properties: " + properties)
+811 .that(properties)
+812 .isEmpty();
+813 }
+814
+815 private static void validatePropertySectionPropertiesOrder(String fileName, String sectionName,
+816 Node table, Set<String> properties) {
+817 final Set<Node> rows = XmlUtil.getChildrenElements(table);
+818 final List<String> orderedPropertyNames = new ArrayList<>(properties);
+819 final List<String> tablePropertyNames = new ArrayList<>();
+820
+821
+822 if (orderedPropertyNames.contains("javadocTokens" )) {
+823 orderedPropertyNames.remove("javadocTokens" );
+824 orderedPropertyNames.add("javadocTokens" );
+825 }
+826 if (orderedPropertyNames.contains("tokens" )) {
+827 orderedPropertyNames.remove("tokens" );
+828 orderedPropertyNames.add("tokens" );
829 }
830
-831
-832 new HashSet<>(properties).stream()
-833 .filter(prop -> UNDOCUMENTED_PROPERTIES.contains(clss.getSimpleName() + "." + prop))
-834 .forEach(properties::remove);
-835
-836 if (AbstractCheck.class .isAssignableFrom(clss)) {
-837 final AbstractCheck check = (AbstractCheck) instance;
-838
-839 final int [] acceptableTokens = check.getAcceptableTokens();
-840 Arrays.sort(acceptableTokens);
-841 final int [] defaultTokens = check.getDefaultTokens();
-842 Arrays.sort(defaultTokens);
-843 final int [] requiredTokens = check.getRequiredTokens();
-844 Arrays.sort(requiredTokens);
+831 rows
+832 .stream()
+833
+834 .skip(1)
+835 .forEach(row -> {
+836 final List<Node> columns = new ArrayList<>(XmlUtil.getChildrenElements(row));
+837 assertWithMessage(fileName + " section '" + sectionName
+838 + "' should have the requested columns" )
+839 .that(columns)
+840 .hasSize(5);
+841
+842 final String propertyName = columns.get(0).getTextContent();
+843 tablePropertyNames.add(propertyName);
+844 });
845
-846 if (!Arrays.equals(acceptableTokens, defaultTokens)
-847 || !Arrays.equals(acceptableTokens, requiredTokens)) {
-848 properties.add("tokens" );
-849 }
-850 }
+846 assertWithMessage(fileName + " section '" + sectionName
+847 + "' should have properties in the requested order" )
+848 .that(tablePropertyNames)
+849 .isEqualTo(orderedPropertyNames);
+850 }
851
-852 if (AbstractJavadocCheck.class .isAssignableFrom(clss)) {
-853 final AbstractJavadocCheck check = (AbstractJavadocCheck) instance;
-854
-855 final int [] acceptableJavadocTokens = check.getAcceptableJavadocTokens();
-856 Arrays.sort(acceptableJavadocTokens);
-857 final int [] defaultJavadocTokens = check.getDefaultJavadocTokens();
-858 Arrays.sort(defaultJavadocTokens);
-859 final int [] requiredJavadocTokens = check.getRequiredJavadocTokens();
-860 Arrays.sort(requiredJavadocTokens);
-861
-862 if (!Arrays.equals(acceptableJavadocTokens, defaultJavadocTokens)
-863 || !Arrays.equals(acceptableJavadocTokens, requiredJavadocTokens)) {
-864 properties.add("javadocTokens" );
-865 }
-866 }
-867 }
+852 private static void fixCapturedProperties(String sectionName, Object instance, Class<?> clss,
+853 Set<String> properties) {
+854
+855 if (hasParentModule(sectionName)) {
+856 if (AbstractJavadocCheck.class .isAssignableFrom(clss)) {
+857 properties.removeAll(JAVADOC_CHECK_PROPERTIES);
+858
+859
+860 properties.add("violateExecutionOnNonTightHtml" );
+861 }
+862 else if (AbstractCheck.class .isAssignableFrom(clss)) {
+863 properties.removeAll(CHECK_PROPERTIES);
+864 }
+865 }
+866 if (AbstractFileSetCheck.class .isAssignableFrom(clss)) {
+867 properties.removeAll(FILESET_PROPERTIES);
868
-869 private static void validatePropertySectionProperties(String fileName, String sectionName,
-870 Node table, Object instance, Set<String> properties) throws Exception {
-871 boolean skip = true ;
-872 boolean didJavadocTokens = false;
-873 boolean didTokens = false;
-874
-875 for (Node row : XmlUtil.getChildrenElements(table)) {
-876 final List<Node> columns = new ArrayList<>(XmlUtil.getChildrenElements(row));
+869
+870 properties.add("fileExtensions" );
+871 }
+872
+873
+874 new HashSet<>(properties).stream()
+875 .filter(prop -> UNDOCUMENTED_PROPERTIES.contains(clss.getSimpleName() + "." + prop))
+876 .forEach(properties::remove);
877
-878 assertWithMessage(fileName + " section '" + sectionName
-879 + "' should have the requested columns" )
-880 .that(columns)
-881 .hasSize(5);
-882
-883 if (skip) {
-884 assertWithMessage(fileName + " section '" + sectionName
-885 + "' should have the specific title" )
-886 .that(columns.get(0).getTextContent())
-887 .isEqualTo("name" );
-888 assertWithMessage(fileName + " section '" + sectionName
-889 + "' should have the specific title" )
-890 .that(columns.get(1).getTextContent())
-891 .isEqualTo("description" );
-892 assertWithMessage(fileName + " section '" + sectionName
-893 + "' should have the specific title" )
-894 .that(columns.get(2).getTextContent())
-895 .isEqualTo("type" );
-896 assertWithMessage(fileName + " section '" + sectionName
-897 + "' should have the specific title" )
-898 .that(columns.get(3).getTextContent())
-899 .isEqualTo("default value" );
-900 assertWithMessage(fileName + " section '" + sectionName
-901 + "' should have the specific title" )
-902 .that(columns.get(4).getTextContent())
-903 .isEqualTo("since" );
-904
-905 skip = false;
-906 continue ;
+878 if (AbstractCheck.class .isAssignableFrom(clss)) {
+879 final AbstractCheck check = (AbstractCheck) instance;
+880
+881 final int [] acceptableTokens = check.getAcceptableTokens();
+882 Arrays.sort(acceptableTokens);
+883 final int [] defaultTokens = check.getDefaultTokens();
+884 Arrays.sort(defaultTokens);
+885 final int [] requiredTokens = check.getRequiredTokens();
+886 Arrays.sort(requiredTokens);
+887
+888 if (!Arrays.equals(acceptableTokens, defaultTokens)
+889 || !Arrays.equals(acceptableTokens, requiredTokens)) {
+890 properties.add("tokens" );
+891 }
+892 }
+893
+894 if (AbstractJavadocCheck.class .isAssignableFrom(clss)) {
+895 final AbstractJavadocCheck check = (AbstractJavadocCheck) instance;
+896
+897 final int [] acceptableJavadocTokens = check.getAcceptableJavadocTokens();
+898 Arrays.sort(acceptableJavadocTokens);
+899 final int [] defaultJavadocTokens = check.getDefaultJavadocTokens();
+900 Arrays.sort(defaultJavadocTokens);
+901 final int [] requiredJavadocTokens = check.getRequiredJavadocTokens();
+902 Arrays.sort(requiredJavadocTokens);
+903
+904 if (!Arrays.equals(acceptableJavadocTokens, defaultJavadocTokens)
+905 || !Arrays.equals(acceptableJavadocTokens, requiredJavadocTokens)) {
+906 properties.add("javadocTokens" );
907 }
-908
-909 assertWithMessage(fileName + " section '" + sectionName
-910 + "' should have token properties last" )
-911 .that(didTokens)
-912 .isFalse();
-913
-914 final String propertyName = columns.get(0).getTextContent();
-915 assertWithMessage(fileName + " section '" + sectionName
-916 + "' should not contain the property: " + propertyName)
-917 .that(properties.remove(propertyName))
-918 .isTrue();
+908 }
+909 }
+910
+911 private static void validatePropertySectionProperties(String fileName, String sectionName,
+912 Node table, Object instance, Set<String> properties) throws Exception {
+913 boolean skip = true ;
+914 boolean didJavadocTokens = false;
+915 boolean didTokens = false;
+916
+917 for (Node row : XmlUtil.getChildrenElements(table)) {
+918 final List<Node> columns = new ArrayList<>(XmlUtil.getChildrenElements(row));
919
-920 if ("tokens" .equals(propertyName)) {
-921 final AbstractCheck check = (AbstractCheck) instance;
-922 validatePropertySectionPropertyTokens(fileName, sectionName, check, columns);
-923 didTokens = true ;
-924 }
-925 else if ("javadocTokens" .equals(propertyName)) {
-926 final AbstractJavadocCheck check = (AbstractJavadocCheck) instance;
-927 validatePropertySectionPropertyJavadocTokens(fileName, sectionName, check, columns);
-928 didJavadocTokens = true ;
-929 }
-930 else {
-931 assertWithMessage(fileName + " section '" + sectionName
-932 + "' should have javadoc token properties next to last, before tokens" )
-933 .that(didJavadocTokens)
-934 .isFalse();
-935
-936 validatePropertySectionPropertyEx(fileName, sectionName, instance, columns,
-937 propertyName);
-938 }
-939
-940 assertWithMessage("%s section '%s' should have a version for %s" ,
-941 fileName, sectionName, propertyName)
-942 .that(columns.get(4).getTextContent().trim())
-943 .isNotEmpty();
-944 assertWithMessage("%s section '%s' should have a valid version for %s" ,
-945 fileName, sectionName, propertyName)
-946 .that(columns.get(4).getTextContent().trim())
-947 .matches(VERSION);
-948 }
-949 }
+920 assertWithMessage(fileName + " section '" + sectionName
+921 + "' should have the requested columns" )
+922 .that(columns)
+923 .hasSize(5);
+924
+925 if (skip) {
+926 assertWithMessage(fileName + " section '" + sectionName
+927 + "' should have the specific title" )
+928 .that(columns.get(0).getTextContent())
+929 .isEqualTo("name" );
+930 assertWithMessage(fileName + " section '" + sectionName
+931 + "' should have the specific title" )
+932 .that(columns.get(1).getTextContent())
+933 .isEqualTo("description" );
+934 assertWithMessage(fileName + " section '" + sectionName
+935 + "' should have the specific title" )
+936 .that(columns.get(2).getTextContent())
+937 .isEqualTo("type" );
+938 assertWithMessage(fileName + " section '" + sectionName
+939 + "' should have the specific title" )
+940 .that(columns.get(3).getTextContent())
+941 .isEqualTo("default value" );
+942 assertWithMessage(fileName + " section '" + sectionName
+943 + "' should have the specific title" )
+944 .that(columns.get(4).getTextContent())
+945 .isEqualTo("since" );
+946
+947 skip = false;
+948 continue ;
+949 }
950
-951 private static void validatePropertySectionPropertyEx(String fileName, String sectionName,
-952 Object instance, List<Node> columns, String propertyName) throws Exception {
-953 assertWithMessage("%s section '%s' should have a description for %s" ,
-954 fileName, sectionName, propertyName)
-955 .that(columns.get(1).getTextContent().trim())
-956 .isNotEmpty();
-957
-958 final String actualTypeName = columns.get(2).getTextContent().replace("\n" , "" )
-959 .replace("\r" , "" ).replaceAll(" +" , " " ).trim();
-960
-961 assertWithMessage(
-962 fileName + " section '" + sectionName + "' should have a type for " + propertyName)
-963 .that(actualTypeName)
-964 .isNotEmpty();
-965
-966 final Field field = getField(instance.getClass(), propertyName);
-967 final Class<?> fieldClass = getFieldClass(fileName, sectionName, instance, field,
-968 propertyName);
-969
-970 final String expectedTypeName;
-971
-972 if ("SuppressWarningsHolder" .equals(sectionName) && "aliasList" .equals(propertyName)) {
-973 expectedTypeName = "String[] in a format of comma separated attribute=value entries. "
-974 + "The attribute is the fully qualified name of the Check and value is its alias." ;
-975 }
-976 else {
-977 expectedTypeName = Optional.ofNullable(field)
-978 .map(nonNullField -> nonNullField.getAnnotation(XdocsPropertyType.class ))
-979 .map(propertyType -> propertyType.value().getDescription())
-980 .orElse(fieldClass.getSimpleName());
-981 }
-982 final String expectedValue = getModulePropertyExpectedValue(sectionName, propertyName,
-983 field, fieldClass, instance);
-984
-985 assertWithMessage(fileName + " section '" + sectionName
-986 + "' should have the type for " + propertyName)
-987 .that(actualTypeName)
-988 .isEqualTo(expectedTypeName);
-989
-990 if (expectedValue != null ) {
-991 final String actualValue = columns.get(3).getTextContent().trim()
-992 .replaceAll("\\s+" , " " )
-993 .replaceAll("\\s," , "," );
-994
-995 assertWithMessage(fileName + " section '" + sectionName
-996 + "' should have the value for " + propertyName)
-997 .that(actualValue)
-998 .isEqualTo(expectedValue);
-999 }
-1000 }
-1001
-1002 private static void validatePropertySectionPropertyTokens(String fileName, String sectionName,
-1003 AbstractCheck check, List<Node> columns) {
-1004 assertWithMessage(fileName + " section '" + sectionName
-1005 + "' should have the basic token description" )
-1006 .that(columns.get(1).getTextContent())
-1007 .isEqualTo("tokens to check" );
-1008
-1009 final String acceptableTokenText = columns.get(2).getTextContent().trim();
-1010 String expectedAcceptableTokenText = "subset of tokens "
-1011 + CheckUtil.getTokenText(check.getAcceptableTokens(),
-1012 check.getRequiredTokens());
-1013 if (isAllTokensAcceptable(check)) {
-1014 expectedAcceptableTokenText = "set of any supported tokens" ;
-1015 }
-1016 assertWithMessage(fileName + " section '" + sectionName
-1017 + "' should have all the acceptable tokens" )
-1018 .that(acceptableTokenText
-1019 .replaceAll("\\s+" , " " )
-1020 .replaceAll("\\s," , "," )
-1021 .replaceAll("\\s\\." , "." ))
-1022 .isEqualTo(expectedAcceptableTokenText);
-1023 assertWithMessage(fileName + "'s acceptable token section: " + sectionName
-1024 + "should have ',' & '.' at beginning of the next corresponding lines." )
-1025 .that(isInvalidTokenPunctuation(acceptableTokenText))
-1026 .isFalse();
-1027
-1028 final String defaultTokenText = columns.get(3).getTextContent().trim();
-1029 final String expectedDefaultTokenText = CheckUtil.getTokenText(check.getDefaultTokens(),
-1030 check.getRequiredTokens());
-1031 if (expectedDefaultTokenText.isEmpty()) {
-1032 assertWithMessage("Empty tokens should have 'empty' string in xdoc" )
-1033 .that(defaultTokenText)
-1034 .isEqualTo("empty" );
-1035 }
-1036 else {
-1037 assertWithMessage(fileName + " section '" + sectionName
-1038 + "' should have all the default tokens" )
-1039 .that(defaultTokenText
-1040 .replaceAll("\\s+" , " " )
-1041 .replaceAll("\\s," , "," )
-1042 .replaceAll("\\s\\." , "." ))
-1043 .isEqualTo(expectedDefaultTokenText);
-1044 assertWithMessage(fileName + "'s default token section: " + sectionName
-1045 + "should have ',' or '.' at beginning of the next corresponding lines." )
-1046 .that(isInvalidTokenPunctuation(defaultTokenText))
-1047 .isFalse();
-1048 }
-1049
-1050 }
-1051
-1052 private static boolean isAllTokensAcceptable(AbstractCheck check) {
-1053 return Arrays.equals(check.getAcceptableTokens(), TokenUtil.getAllTokenIds());
-1054 }
+951 assertWithMessage(fileName + " section '" + sectionName
+952 + "' should have token properties last" )
+953 .that(didTokens)
+954 .isFalse();
+955
+956 final String propertyName = columns.get(0).getTextContent();
+957 assertWithMessage(fileName + " section '" + sectionName
+958 + "' should not contain the property: " + propertyName)
+959 .that(properties.remove(propertyName))
+960 .isTrue();
+961
+962 if ("tokens" .equals(propertyName)) {
+963 final AbstractCheck check = (AbstractCheck) instance;
+964 validatePropertySectionPropertyTokens(fileName, sectionName, check, columns);
+965 didTokens = true ;
+966 }
+967 else if ("javadocTokens" .equals(propertyName)) {
+968 final AbstractJavadocCheck check = (AbstractJavadocCheck) instance;
+969 validatePropertySectionPropertyJavadocTokens(fileName, sectionName, check, columns);
+970 didJavadocTokens = true ;
+971 }
+972 else {
+973 assertWithMessage(fileName + " section '" + sectionName
+974 + "' should have javadoc token properties next to last, before tokens" )
+975 .that(didJavadocTokens)
+976 .isFalse();
+977
+978 validatePropertySectionPropertyEx(fileName, sectionName, instance, columns,
+979 propertyName);
+980 }
+981
+982 assertWithMessage("%s section '%s' should have a version for %s" ,
+983 fileName, sectionName, propertyName)
+984 .that(columns.get(4).getTextContent().trim())
+985 .isNotEmpty();
+986 assertWithMessage("%s section '%s' should have a valid version for %s" ,
+987 fileName, sectionName, propertyName)
+988 .that(columns.get(4).getTextContent().trim())
+989 .matches(VERSION);
+990 }
+991 }
+992
+993 private static void validatePropertySectionPropertyEx(String fileName, String sectionName,
+994 Object instance, List<Node> columns, String propertyName) throws Exception {
+995 assertWithMessage("%s section '%s' should have a description for %s" ,
+996 fileName, sectionName, propertyName)
+997 .that(columns.get(1).getTextContent().trim())
+998 .isNotEmpty();
+999 assertWithMessage("%s section '%s' should have a description for %s"
+1000 + " that starts with uppercase character" ,
+1001 fileName, sectionName, propertyName)
+1002 .that(Character.isUpperCase(columns.get(1).getTextContent().trim().charAt(0)))
+1003 .isTrue();
+1004
+1005 final String actualTypeName = columns.get(2).getTextContent().replace("\n" , "" )
+1006 .replace("\r" , "" ).replaceAll(" +" , " " ).trim();
+1007
+1008 assertWithMessage(
+1009 fileName + " section '" + sectionName + "' should have a type for " + propertyName)
+1010 .that(actualTypeName)
+1011 .isNotEmpty();
+1012
+1013 final Field field = getField(instance.getClass(), propertyName);
+1014 final Class<?> fieldClass = getFieldClass(fileName, sectionName, instance, field,
+1015 propertyName);
+1016
+1017 final String expectedTypeName;
+1018
+1019 if ("SuppressWarningsHolder" .equals(sectionName) && "aliasList" .equals(propertyName)) {
+1020 expectedTypeName = "String[] in a format of comma separated attribute=value entries. "
+1021 + "The attribute is the fully qualified name of the Check and value is its alias." ;
+1022 }
+1023 else {
+1024 expectedTypeName = Optional.ofNullable(field)
+1025 .map(nonNullField -> nonNullField.getAnnotation(XdocsPropertyType.class ))
+1026 .map(propertyType -> propertyType.value().getDescription())
+1027 .orElse(fieldClass.getSimpleName());
+1028 }
+1029 final String expectedValue = getModulePropertyExpectedValue(sectionName, propertyName,
+1030 field, fieldClass, instance);
+1031
+1032 assertWithMessage(fileName + " section '" + sectionName
+1033 + "' should have the type for " + propertyName)
+1034 .that(actualTypeName)
+1035 .isEqualTo(expectedTypeName);
+1036
+1037 if (expectedValue != null ) {
+1038 final String actualValue = columns.get(3).getTextContent().trim()
+1039 .replaceAll("\\s+" , " " )
+1040 .replaceAll("\\s," , "," );
+1041
+1042 assertWithMessage(fileName + " section '" + sectionName
+1043 + "' should have the value for " + propertyName)
+1044 .that(actualValue)
+1045 .isEqualTo(expectedValue);
+1046 }
+1047 }
+1048
+1049 private static void validatePropertySectionPropertyTokens(String fileName, String sectionName,
+1050 AbstractCheck check, List<Node> columns) {
+1051 assertWithMessage(fileName + " section '" + sectionName
+1052 + "' should have the basic token description" )
+1053 .that(columns.get(1).getTextContent())
+1054 .isEqualTo("tokens to check" );
1055
-1056 private static void validatePropertySectionPropertyJavadocTokens(String fileName,
-1057 String sectionName, AbstractJavadocCheck check, List<Node> columns) {
-1058 assertWithMessage(fileName + " section '" + sectionName
-1059 + "' should have the basic token javadoc description" )
-1060 .that(columns.get(1).getTextContent())
-1061 .isEqualTo("javadoc tokens to check" );
-1062
-1063 final String acceptableTokenText = columns.get(2).getTextContent().trim();
-1064 assertWithMessage(fileName + " section '" + sectionName
-1065 + "' should have all the acceptable javadoc tokens" )
-1066 .that(acceptableTokenText
-1067 .replaceAll("\\s+" , " " )
-1068 .replaceAll("\\s," , "," )
-1069 .replaceAll("\\s\\." , "." ))
-1070 .isEqualTo("subset of javadoc tokens "
-1071 + CheckUtil.getJavadocTokenText(check.getAcceptableJavadocTokens(),
-1072 check.getRequiredJavadocTokens()));
-1073 assertWithMessage(fileName + "'s acceptable javadoc token section: " + sectionName
-1074 + "should have ',' & '.' at beginning of the next corresponding lines." )
-1075 .that(isInvalidTokenPunctuation(acceptableTokenText))
-1076 .isFalse();
-1077
-1078 final String defaultTokenText = columns.get(3).getTextContent().trim();
-1079 assertWithMessage(fileName + " section '" + sectionName
-1080 + "' should have all the default javadoc tokens" )
-1081 .that(defaultTokenText
-1082 .replaceAll("\\s+" , " " )
-1083 .replaceAll("\\s," , "," )
-1084 .replaceAll("\\s\\." , "." ))
-1085 .isEqualTo(CheckUtil.getJavadocTokenText(check.getDefaultJavadocTokens(),
-1086 check.getRequiredJavadocTokens()));
-1087 assertWithMessage(fileName + "'s default javadoc token section: " + sectionName
-1088 + "should have ',' & '.' at beginning of the next corresponding lines." )
-1089 .that(isInvalidTokenPunctuation(defaultTokenText))
-1090 .isFalse();
-1091 }
-1092
-1093 private static boolean isInvalidTokenPunctuation(String tokenText) {
-1094 return Pattern.compile("\\w," ).matcher(tokenText).find()
-1095 || Pattern.compile("\\w\\." ).matcher(tokenText).find();
-1096 }
-1097
-1098
-1099
-1100
-1101
-1102
-1103
-1104
-1105
-1106
-1107
-1108
-1109
-1110
-1111 private static String getModulePropertyExpectedValue(String sectionName, String propertyName,
-1112 Field field, Class<?> fieldClass, Object instance) throws Exception {
-1113 String result = null ;
-1114
-1115 if (field != null ) {
-1116 final Object value = field.get(instance);
-1117
-1118 if ("Checker" .equals(sectionName) && "localeCountry" .equals(propertyName)) {
-1119 result = "default locale country for the Java Virtual Machine" ;
-1120 }
-1121 else if ("Checker" .equals(sectionName) && "localeLanguage" .equals(propertyName)) {
-1122 result = "default locale language for the Java Virtual Machine" ;
-1123 }
-1124 else if ("Checker" .equals(sectionName) && "charset" .equals(propertyName)) {
-1125 result = "UTF-8" ;
-1126 }
-1127 else if ("charset" .equals(propertyName)) {
-1128 result = "the charset property of the parent Checker module" ;
-1129 }
-1130 else if ("PropertyCacheFile" .equals(fieldClass.getSimpleName())) {
-1131 result = "null (no cache file)" ;
-1132 }
-1133 else if (fieldClass == boolean .class ) {
-1134 result = value.toString();
-1135 }
-1136 else if (fieldClass == int .class ) {
-1137 result = value.toString();
-1138 }
-1139 else if (fieldClass == int [].class ) {
-1140 result = getIntArrayPropertyValue(value);
-1141 }
-1142 else if (fieldClass == double [].class ) {
-1143 result = Arrays.toString((double []) value).replace("[" , "" ).replace("]" , "" )
-1144 .replace(".0" , "" );
-1145 if (result.isEmpty()) {
-1146 result = "{}" ;
-1147 }
-1148 }
-1149 else if (fieldClass == String[].class ) {
-1150 result = getStringArrayPropertyValue(propertyName, value);
-1151 }
-1152 else if (fieldClass == URI.class || fieldClass == String.class ) {
-1153 if (value != null ) {
-1154 result = '"' + value.toString() + '"';
-1155 }
-1156 }
-1157 else if (fieldClass == Pattern.class ) {
-1158 if (value != null ) {
-1159 result = '"' + value.toString().replace("\n" , "\\n" ).replace("\t" , "\\t" )
-1160 .replace("\r" , "\\r" ).replace("\f" , "\\f" ) + '"';
-1161 }
-1162 }
-1163 else if (fieldClass == Pattern[].class ) {
-1164 result = getPatternArrayPropertyValue(value);
-1165 }
-1166 else if (fieldClass.isEnum()) {
-1167 if (value != null ) {
-1168 result = value.toString().toLowerCase(Locale.ENGLISH);
-1169 }
+1056 final String acceptableTokenText = columns.get(2).getTextContent().trim();
+1057 String expectedAcceptableTokenText = "subset of tokens "
+1058 + CheckUtil.getTokenText(check.getAcceptableTokens(),
+1059 check.getRequiredTokens());
+1060 if (isAllTokensAcceptable(check)) {
+1061 expectedAcceptableTokenText = "set of any supported tokens" ;
+1062 }
+1063 assertWithMessage(fileName + " section '" + sectionName
+1064 + "' should have all the acceptable tokens" )
+1065 .that(acceptableTokenText
+1066 .replaceAll("\\s+" , " " )
+1067 .replaceAll("\\s," , "," )
+1068 .replaceAll("\\s\\." , "." ))
+1069 .isEqualTo(expectedAcceptableTokenText);
+1070 assertWithMessage(fileName + "'s acceptable token section: " + sectionName
+1071 + "should have ',' & '.' at beginning of the next corresponding lines." )
+1072 .that(isInvalidTokenPunctuation(acceptableTokenText))
+1073 .isFalse();
+1074
+1075 final String defaultTokenText = columns.get(3).getTextContent().trim();
+1076 final String expectedDefaultTokenText = CheckUtil.getTokenText(check.getDefaultTokens(),
+1077 check.getRequiredTokens());
+1078 if (expectedDefaultTokenText.isEmpty()) {
+1079 assertWithMessage("Empty tokens should have 'empty' string in xdoc" )
+1080 .that(defaultTokenText)
+1081 .isEqualTo("empty" );
+1082 }
+1083 else {
+1084 assertWithMessage(fileName + " section '" + sectionName
+1085 + "' should have all the default tokens" )
+1086 .that(defaultTokenText
+1087 .replaceAll("\\s+" , " " )
+1088 .replaceAll("\\s," , "," )
+1089 .replaceAll("\\s\\." , "." ))
+1090 .isEqualTo(expectedDefaultTokenText);
+1091 assertWithMessage(fileName + "'s default token section: " + sectionName
+1092 + "should have ',' or '.' at beginning of the next corresponding lines." )
+1093 .that(isInvalidTokenPunctuation(defaultTokenText))
+1094 .isFalse();
+1095 }
+1096
+1097 }
+1098
+1099 private static boolean isAllTokensAcceptable(AbstractCheck check) {
+1100 return Arrays.equals(check.getAcceptableTokens(), TokenUtil.getAllTokenIds());
+1101 }
+1102
+1103 private static void validatePropertySectionPropertyJavadocTokens(String fileName,
+1104 String sectionName, AbstractJavadocCheck check, List<Node> columns) {
+1105 assertWithMessage(fileName + " section '" + sectionName
+1106 + "' should have the basic token javadoc description" )
+1107 .that(columns.get(1).getTextContent())
+1108 .isEqualTo("javadoc tokens to check" );
+1109
+1110 final String acceptableTokenText = columns.get(2).getTextContent().trim();
+1111 assertWithMessage(fileName + " section '" + sectionName
+1112 + "' should have all the acceptable javadoc tokens" )
+1113 .that(acceptableTokenText
+1114 .replaceAll("\\s+" , " " )
+1115 .replaceAll("\\s," , "," )
+1116 .replaceAll("\\s\\." , "." ))
+1117 .isEqualTo("subset of javadoc tokens "
+1118 + CheckUtil.getJavadocTokenText(check.getAcceptableJavadocTokens(),
+1119 check.getRequiredJavadocTokens()));
+1120 assertWithMessage(fileName + "'s acceptable javadoc token section: " + sectionName
+1121 + "should have ',' & '.' at beginning of the next corresponding lines." )
+1122 .that(isInvalidTokenPunctuation(acceptableTokenText))
+1123 .isFalse();
+1124
+1125 final String defaultTokenText = columns.get(3).getTextContent().trim();
+1126 assertWithMessage(fileName + " section '" + sectionName
+1127 + "' should have all the default javadoc tokens" )
+1128 .that(defaultTokenText
+1129 .replaceAll("\\s+" , " " )
+1130 .replaceAll("\\s," , "," )
+1131 .replaceAll("\\s\\." , "." ))
+1132 .isEqualTo(CheckUtil.getJavadocTokenText(check.getDefaultJavadocTokens(),
+1133 check.getRequiredJavadocTokens()));
+1134 assertWithMessage(fileName + "'s default javadoc token section: " + sectionName
+1135 + "should have ',' & '.' at beginning of the next corresponding lines." )
+1136 .that(isInvalidTokenPunctuation(defaultTokenText))
+1137 .isFalse();
+1138 }
+1139
+1140 private static boolean isInvalidTokenPunctuation(String tokenText) {
+1141 return Pattern.compile("\\w," ).matcher(tokenText).find()
+1142 || Pattern.compile("\\w\\." ).matcher(tokenText).find();
+1143 }
+1144
+1145
+1146
+1147
+1148
+1149
+1150
+1151
+1152
+1153
+1154
+1155
+1156
+1157
+1158 private static String getModulePropertyExpectedValue(String sectionName, String propertyName,
+1159 Field field, Class<?> fieldClass, Object instance) throws Exception {
+1160 String result = null ;
+1161
+1162 if (field != null ) {
+1163 final Object value = field.get(instance);
+1164
+1165 if ("Checker" .equals(sectionName) && "localeCountry" .equals(propertyName)) {
+1166 result = "default locale country for the Java Virtual Machine" ;
+1167 }
+1168 else if ("Checker" .equals(sectionName) && "localeLanguage" .equals(propertyName)) {
+1169 result = "default locale language for the Java Virtual Machine" ;
1170 }
-1171 else if (fieldClass == AccessModifierOption[].class ) {
-1172 result = Arrays.toString((Object[]) value).replace("[" , "" ).replace("]" , "" );
+1171 else if ("Checker" .equals(sectionName) && "charset" .equals(propertyName)) {
+1172 result = "UTF-8" ;
1173 }
-1174 else {
-1175 assertWithMessage("Unknown property type: " + fieldClass.getSimpleName()).fail();
+1174 else if ("charset" .equals(propertyName)) {
+1175 result = "the charset property of the parent Checker module" ;
1176 }
-1177
-1178 if (result == null ) {
-1179 result = "null" ;
-1180 }
-1181 }
-1182
-1183 return result;
-1184 }
-1185
-1186
-1187
-1188
-1189
-1190
-1191
-1192 private static String getPatternArrayPropertyValue(Object fieldValue) {
-1193 Object value = fieldValue;
-1194 String result;
-1195 if (value instanceof Collection) {
-1196 final Collection<?> collection = (Collection<?>) value;
-1197 final Pattern[] newArray = new Pattern[collection.size()];
-1198 final Iterator<?> iterator = collection.iterator();
-1199 int index = 0;
-1200
-1201 while (iterator.hasNext()) {
-1202 final Object next = iterator.next();
-1203 newArray[index] = (Pattern) next;
-1204 index++;
-1205 }
-1206
-1207 value = newArray;
-1208 }
-1209
-1210 if (value != null && Array.getLength(value) > 0) {
-1211 final String[] newArray = new String[Array.getLength(value)];
-1212
-1213 for (int i = 0; i < newArray.length; i++) {
-1214 newArray[i] = ((Pattern) Array.get(value, i)).pattern();
-1215 }
-1216
-1217 result = Arrays.toString(newArray).replace("[" , "" ).replace("]" , "" );
-1218 }
-1219 else {
-1220 result = "" ;
-1221 }
-1222
-1223 if (result.isEmpty()) {
-1224 result = "{}" ;
-1225 }
-1226 return result;
-1227 }
-1228
-1229
-1230
-1231
-1232
-1233
-1234
-1235
-1236 private static String getStringArrayPropertyValue(String propertyName, Object value) {
-1237 String result;
-1238 if (value == null ) {
-1239 result = "" ;
-1240 }
-1241 else {
-1242 final Stream<?> valuesStream;
-1243 if (value instanceof Collection) {
-1244 final Collection<?> collection = (Collection<?>) value;
-1245 valuesStream = collection.stream();
-1246 }
-1247 else {
-1248 final Object[] array = (Object[]) value;
-1249 valuesStream = Arrays.stream(array);
-1250 }
-1251 result = valuesStream
-1252 .map(String.class ::cast )
-1253 .sorted()
-1254 .collect(Collectors.joining(", " ));
+1177 else if ("PropertyCacheFile" .equals(fieldClass.getSimpleName())) {
+1178 result = "null (no cache file)" ;
+1179 }
+1180 else if (fieldClass == boolean .class ) {
+1181 result = value.toString();
+1182 }
+1183 else if (fieldClass == int .class ) {
+1184 result = value.toString();
+1185 }
+1186 else if (fieldClass == int [].class ) {
+1187 result = getIntArrayPropertyValue(value);
+1188 }
+1189 else if (fieldClass == double [].class ) {
+1190 result = Arrays.toString((double []) value).replace("[" , "" ).replace("]" , "" )
+1191 .replace(".0" , "" );
+1192 if (result.isEmpty()) {
+1193 result = "{}" ;
+1194 }
+1195 }
+1196 else if (fieldClass == String[].class ) {
+1197 result = getStringArrayPropertyValue(propertyName, value);
+1198 }
+1199 else if (fieldClass == URI.class || fieldClass == String.class ) {
+1200 if (value != null ) {
+1201 result = '"' + value.toString() + '"';
+1202 }
+1203 }
+1204 else if (fieldClass == Pattern.class ) {
+1205 if (value != null ) {
+1206 result = '"' + value.toString().replace("\n" , "\\n" ).replace("\t" , "\\t" )
+1207 .replace("\r" , "\\r" ).replace("\f" , "\\f" ) + '"';
+1208 }
+1209 }
+1210 else if (fieldClass == Pattern[].class ) {
+1211 result = getPatternArrayPropertyValue(value);
+1212 }
+1213 else if (fieldClass.isEnum()) {
+1214 if (value != null ) {
+1215 result = value.toString().toLowerCase(Locale.ENGLISH);
+1216 }
+1217 }
+1218 else if (fieldClass == AccessModifierOption[].class ) {
+1219 result = Arrays.toString((Object[]) value).replace("[" , "" ).replace("]" , "" );
+1220 }
+1221 else {
+1222 assertWithMessage("Unknown property type: " + fieldClass.getSimpleName()).fail();
+1223 }
+1224
+1225 if (result == null ) {
+1226 result = "null" ;
+1227 }
+1228 }
+1229
+1230 return result;
+1231 }
+1232
+1233
+1234
+1235
+1236
+1237
+1238
+1239 private static String getPatternArrayPropertyValue(Object fieldValue) {
+1240 Object value = fieldValue;
+1241 String result;
+1242 if (value instanceof Collection) {
+1243 final Collection<?> collection = (Collection<?>) value;
+1244 final Pattern[] newArray = new Pattern[collection.size()];
+1245 final Iterator<?> iterator = collection.iterator();
+1246 int index = 0;
+1247
+1248 while (iterator.hasNext()) {
+1249 final Object next = iterator.next();
+1250 newArray[index] = (Pattern) next;
+1251 index++;
+1252 }
+1253
+1254 value = newArray;
1255 }
1256
-1257 if (result.isEmpty()) {
-1258 if ("fileExtensions" .equals(propertyName)) {
-1259 result = "all files" ;
-1260 }
-1261 else {
-1262 result = "{}" ;
-1263 }
-1264 }
-1265 return result;
-1266 }
-1267
-1268
-1269
-1270
-1271
-1272
-1273
-1274 private static String getIntArrayPropertyValue(Object value) {
-1275 final IntStream stream;
-1276 if (value instanceof Collection) {
-1277 final Collection<?> collection = (Collection<?>) value;
-1278 stream = collection.stream()
-1279 .mapToInt(number -> (int ) number);
-1280 }
-1281 else if (value instanceof BitSet) {
-1282 stream = ((BitSet) value).stream();
-1283 }
-1284 else {
-1285 stream = Arrays.stream((int []) value);
-1286 }
-1287 String result = stream
-1288 .mapToObj(TokenUtil::getTokenName)
-1289 .sorted()
-1290 .collect(Collectors.joining(", " ));
-1291 if (result.isEmpty()) {
-1292 result = "{}" ;
-1293 }
-1294 return result;
-1295 }
-1296
-1297
-1298
-1299
-1300
-1301
-1302
-1303
-1304 private static Field getField(Class<?> fieldClass, String propertyName) {
-1305 Field result = null ;
-1306 Class<?> currentClass = fieldClass;
-1307
-1308 while (!Object.class .equals(currentClass)) {
-1309 try {
-1310 result = currentClass.getDeclaredField(propertyName);
-1311 result.trySetAccessible();
-1312 break ;
-1313 }
-1314 catch (NoSuchFieldException ignored) {
-1315 currentClass = currentClass.getSuperclass();
-1316 }
-1317 }
-1318
-1319 return result;
-1320 }
-1321
-1322 private static Class<?> getFieldClass(String fileName, String sectionName, Object instance,
-1323 Field field, String propertyName) throws Exception {
-1324 Class<?> result = null ;
-1325
-1326 if (field != null ) {
-1327 result = field.getType();
-1328 }
-1329 if (result == null ) {
-1330 assertWithMessage(
-1331 fileName + " section '" + sectionName + "' could not find field "
-1332 + propertyName)
-1333 .that(PROPERTIES_ALLOWED_GET_TYPES_FROM_METHOD)
-1334 .contains(sectionName + "." + propertyName);
-1335
-1336 final PropertyDescriptor descriptor = PropertyUtils.getPropertyDescriptor(instance,
-1337 propertyName);
-1338 result = descriptor.getPropertyType();
-1339 }
-1340 if (result == List.class || result == Set.class ) {
-1341 final ParameterizedType type = (ParameterizedType) field.getGenericType();
-1342 final Class<?> parameterClass = (Class<?>) type.getActualTypeArguments()[0];
+1257 if (value != null && Array.getLength(value) > 0) {
+1258 final String[] newArray = new String[Array.getLength(value)];
+1259
+1260 for (int i = 0; i < newArray.length; i++) {
+1261 newArray[i] = ((Pattern) Array.get(value, i)).pattern();
+1262 }
+1263
+1264 result = Arrays.toString(newArray).replace("[" , "" ).replace("]" , "" );
+1265 }
+1266 else {
+1267 result = "" ;
+1268 }
+1269
+1270 if (result.isEmpty()) {
+1271 result = "{}" ;
+1272 }
+1273 return result;
+1274 }
+1275
+1276
+1277
+1278
+1279
+1280
+1281
+1282
+1283 private static String getStringArrayPropertyValue(String propertyName, Object value) {
+1284 String result;
+1285 if (value == null ) {
+1286 result = "" ;
+1287 }
+1288 else {
+1289 final Stream<?> valuesStream;
+1290 if (value instanceof Collection) {
+1291 final Collection<?> collection = (Collection<?>) value;
+1292 valuesStream = collection.stream();
+1293 }
+1294 else {
+1295 final Object[] array = (Object[]) value;
+1296 valuesStream = Arrays.stream(array);
+1297 }
+1298 result = valuesStream
+1299 .map(String.class ::cast )
+1300 .sorted()
+1301 .collect(Collectors.joining(", " ));
+1302 }
+1303
+1304 if (result.isEmpty()) {
+1305 if ("fileExtensions" .equals(propertyName)) {
+1306 result = "all files" ;
+1307 }
+1308 else {
+1309 result = "{}" ;
+1310 }
+1311 }
+1312 return result;
+1313 }
+1314
+1315
+1316
+1317
+1318
+1319
+1320
+1321 private static String getIntArrayPropertyValue(Object value) {
+1322 final IntStream stream;
+1323 if (value instanceof Collection) {
+1324 final Collection<?> collection = (Collection<?>) value;
+1325 stream = collection.stream()
+1326 .mapToInt(number -> (int ) number);
+1327 }
+1328 else if (value instanceof BitSet) {
+1329 stream = ((BitSet) value).stream();
+1330 }
+1331 else {
+1332 stream = Arrays.stream((int []) value);
+1333 }
+1334 String result = stream
+1335 .mapToObj(TokenUtil::getTokenName)
+1336 .sorted()
+1337 .collect(Collectors.joining(", " ));
+1338 if (result.isEmpty()) {
+1339 result = "{}" ;
+1340 }
+1341 return result;
+1342 }
1343
-1344 if (parameterClass == Integer.class ) {
-1345 result = int [].class ;
-1346 }
-1347 else if (parameterClass == String.class ) {
-1348 result = String[].class ;
-1349 }
-1350 else if (parameterClass == Pattern.class ) {
-1351 result = Pattern[].class ;
-1352 }
-1353 else {
-1354 assertWithMessage("Unknown parameterized type: " + parameterClass.getSimpleName())
-1355 .fail();
-1356 }
-1357 }
-1358 else if (result == BitSet.class ) {
-1359 result = int [].class ;
-1360 }
-1361
-1362 return result;
-1363 }
-1364
-1365 private static Set<String> getListById(Node subSection, String id) {
-1366 Set<String> result = null ;
-1367 final Node node = XmlUtil.findChildElementById(subSection, id);
-1368 if (node != null ) {
-1369 result = XmlUtil.getChildrenElements(node)
-1370 .stream()
-1371 .map(Node::getTextContent)
-1372 .collect(Collectors.toSet());
-1373 }
-1374 return result;
-1375 }
-1376
-1377 private static void validateViolationSection(String fileName, String sectionName,
-1378 Node subSection,
-1379 Object instance) throws Exception {
-1380 final Class<?> clss = instance.getClass();
-1381 final Set<Field> fields = CheckUtil.getCheckMessages(clss, true );
-1382 final Set<String> list = new TreeSet<>();
-1383
-1384 for (Field field : fields) {
-1385
-1386 field.trySetAccessible();
-1387
-1388 list.add(field.get(null ).toString());
-1389 }
+1344
+1345
+1346
+1347
+1348
+1349
+1350
+1351 private static Field getField(Class<?> fieldClass, String propertyName) {
+1352 Field result = null ;
+1353 Class<?> currentClass = fieldClass;
+1354
+1355 while (!Object.class .equals(currentClass)) {
+1356 try {
+1357 result = currentClass.getDeclaredField(propertyName);
+1358 result.trySetAccessible();
+1359 break ;
+1360 }
+1361 catch (NoSuchFieldException ignored) {
+1362 currentClass = currentClass.getSuperclass();
+1363 }
+1364 }
+1365
+1366 return result;
+1367 }
+1368
+1369 private static Class<?> getFieldClass(String fileName, String sectionName, Object instance,
+1370 Field field, String propertyName) throws Exception {
+1371 Class<?> result = null ;
+1372
+1373 if (field != null ) {
+1374 result = field.getType();
+1375 }
+1376 if (result == null ) {
+1377 assertWithMessage(
+1378 fileName + " section '" + sectionName + "' could not find field "
+1379 + propertyName)
+1380 .that(PROPERTIES_ALLOWED_GET_TYPES_FROM_METHOD)
+1381 .contains(sectionName + "." + propertyName);
+1382
+1383 final PropertyDescriptor descriptor = PropertyUtils.getPropertyDescriptor(instance,
+1384 propertyName);
+1385 result = descriptor.getPropertyType();
+1386 }
+1387 if (result == List.class || result == Set.class ) {
+1388 final ParameterizedType type = (ParameterizedType) field.getGenericType();
+1389 final Class<?> parameterClass = (Class<?>) type.getActualTypeArguments()[0];
1390
-1391 final StringBuilder expectedText = new StringBuilder(120);
-1392
-1393 for (String s : list) {
-1394 expectedText.append(s);
-1395 expectedText.append('\n');
-1396 }
-1397
-1398 if (expectedText.length() > 0) {
-1399 expectedText.append("All messages can be customized if the default message doesn't "
-1400 + "suit you.\nPlease see the documentation to learn how to." );
-1401 }
-1402
-1403 if (subSection == null ) {
-1404 assertWithMessage(fileName + " section '" + sectionName
-1405 + "' should have the expected error keys" )
-1406 .that(expectedText.toString())
-1407 .isEqualTo("" );
-1408 }
-1409 else {
-1410 final String subsectionTextContent = subSection.getTextContent()
-1411 .replaceAll("\n\\s+" , "\n" )
-1412 .replaceAll("\\s+" , " " )
-1413 .trim();
-1414 assertWithMessage(fileName + " section '" + sectionName
-1415 + "' should have the expected error keys" )
-1416 .that(subsectionTextContent)
-1417 .isEqualTo(expectedText.toString().replaceAll("\n" , " " ).trim());
-1418
-1419 for (Node node : XmlUtil.findChildElementsByTag(subSection, "a" )) {
-1420 final String url = node.getAttributes().getNamedItem("href" ).getTextContent();
-1421 final String linkText = node.getTextContent().trim();
-1422 final String expectedUrl;
+1391 if (parameterClass == Integer.class ) {
+1392 result = int [].class ;
+1393 }
+1394 else if (parameterClass == String.class ) {
+1395 result = String[].class ;
+1396 }
+1397 else if (parameterClass == Pattern.class ) {
+1398 result = Pattern[].class ;
+1399 }
+1400 else {
+1401 assertWithMessage("Unknown parameterized type: " + parameterClass.getSimpleName())
+1402 .fail();
+1403 }
+1404 }
+1405 else if (result == BitSet.class ) {
+1406 result = int [].class ;
+1407 }
+1408
+1409 return result;
+1410 }
+1411
+1412 private static Set<String> getListById(Node subSection, String id) {
+1413 Set<String> result = null ;
+1414 final Node node = XmlUtil.findChildElementById(subSection, id);
+1415 if (node != null ) {
+1416 result = XmlUtil.getChildrenElements(node)
+1417 .stream()
+1418 .map(Node::getTextContent)
+1419 .collect(Collectors.toSet());
+1420 }
+1421 return result;
+1422 }
1423
-1424 if ("see the documentation" .equals(linkText)) {
-1425 expectedUrl = "../../config.html#Custom_messages" ;
-1426 }
-1427 else {
-1428 expectedUrl = "https://github.com/search?q="
-1429 + "path%3Asrc%2Fmain%2Fresources%2F"
-1430 + clss.getPackage().getName().replace("." , "%2F" )
-1431 + "%20path%3A**%2Fmessages*.properties+repo%3Acheckstyle%2F"
-1432 + "checkstyle+%22" + linkText + "%22" ;
-1433 }
+1424 private static void validateViolationSection(String fileName, String sectionName,
+1425 Node subSection,
+1426 Object instance) throws Exception {
+1427 final Class<?> clss = instance.getClass();
+1428 final Set<Field> fields = CheckUtil.getCheckMessages(clss, true );
+1429 final Set<String> list = new TreeSet<>();
+1430
+1431 for (Field field : fields) {
+1432
+1433 field.trySetAccessible();
1434
-1435 assertWithMessage(fileName + " section '" + sectionName
-1436 + "' should have matching url for '" + linkText + "'" )
-1437 .that(url)
-1438 .isEqualTo(expectedUrl);
-1439 }
-1440 }
-1441 }
-1442
-1443 private static void validateUsageExample(String fileName, String sectionName, Node subSection) {
-1444 final String text = subSection.getTextContent().replace("Checkstyle Style" , "" )
-1445 .replace("Google Style" , "" ).replace("Sun Style" , "" ).trim();
-1446
-1447 assertWithMessage(fileName + " section '" + sectionName
-1448 + "' has unknown text in 'Example of Usage': " + text)
-1449 .that(text)
-1450 .isEmpty();
-1451
-1452 boolean hasCheckstyle = false;
-1453 boolean hasGoogle = false;
-1454 boolean hasSun = false;
-1455
-1456 for (Node node : XmlUtil.findChildElementsByTag(subSection, "a" )) {
-1457 final String url = node.getAttributes().getNamedItem("href" ).getTextContent();
-1458 final String linkText = node.getTextContent().trim();
-1459 String expectedUrl = null ;
-1460
-1461 if ("Checkstyle Style" .equals(linkText)) {
-1462 hasCheckstyle = true ;
-1463 expectedUrl = "https://github.com/search?q="
-1464 + "path%3Aconfig%20path%3A**%2Fcheckstyle-checks.xml+"
-1465 + "repo%3Acheckstyle%2Fcheckstyle+" + sectionName;
-1466 }
-1467 else if ("Google Style" .equals(linkText)) {
-1468 hasGoogle = true ;
-1469 expectedUrl = "https://github.com/search?q="
-1470 + "path%3Asrc%2Fmain%2Fresources%20path%3A**%2Fgoogle_checks.xml+"
-1471 + "repo%3Acheckstyle%2Fcheckstyle+"
-1472 + sectionName;
-1473
-1474 assertWithMessage(fileName + " section '" + sectionName
-1475 + "' should be in google_checks.xml or not reference 'Google Style'" )
-1476 .that(GOOGLE_MODULES)
-1477 .contains(sectionName);
-1478 }
-1479 else if ("Sun Style" .equals(linkText)) {
-1480 hasSun = true ;
-1481 expectedUrl = "https://github.com/search?q="
-1482 + "path%3Asrc%2Fmain%2Fresources%20path%3A**%2Fsun_checks.xml+"
-1483 + "repo%3Acheckstyle%2Fcheckstyle+"
-1484 + sectionName;
-1485
-1486 assertWithMessage(fileName + " section '" + sectionName
-1487 + "' should be in sun_checks.xml or not reference 'Sun Style'" )
-1488 .that(SUN_MODULES)
-1489 .contains(sectionName);
-1490 }
-1491
-1492 assertWithMessage(fileName + " section '" + sectionName
-1493 + "' should have matching url" )
-1494 .that(url)
-1495 .isEqualTo(expectedUrl);
-1496 }
-1497
-1498 assertWithMessage(fileName + " section '" + sectionName
-1499 + "' should have a checkstyle section" )
-1500 .that(hasCheckstyle)
-1501 .isTrue();
-1502 assertWithMessage(fileName + " section '" + sectionName
-1503 + "' should have a google section since it is in it's config" )
-1504 .that(hasGoogle || !GOOGLE_MODULES.contains(sectionName))
-1505 .isTrue();
-1506 assertWithMessage(fileName + " section '" + sectionName
-1507 + "' should have a sun section since it is in it's config" )
-1508 .that(hasSun || !SUN_MODULES.contains(sectionName))
-1509 .isTrue();
-1510 }
-1511
-1512 private static void validatePackageSection(String fileName, String sectionName,
-1513 Node subSection, Object instance) {
-1514 assertWithMessage(fileName + " section '" + sectionName
-1515 + "' should have matching package" )
-1516 .that(subSection.getTextContent().trim())
-1517 .isEqualTo(instance.getClass().getPackage().getName());
-1518 }
-1519
-1520 private static void validateParentSection(String fileName, String sectionName,
-1521 Node subSection) {
-1522 final String expected;
-1523
-1524 if (!"TreeWalker" .equals(sectionName) && hasParentModule(sectionName)) {
-1525 expected = "TreeWalker" ;
-1526 }
-1527 else {
-1528 expected = "Checker" ;
-1529 }
-1530
-1531 assertWithMessage(fileName + " section '" + sectionName + "' should have matching parent" )
-1532 .that(subSection.getTextContent().trim())
-1533 .isEqualTo(expected);
-1534 }
-1535
-1536 private static boolean hasParentModule(String sectionName) {
-1537 final String search = "\"" + sectionName + "\"" ;
-1538 boolean result = true ;
-1539
-1540 for (String find : XML_FILESET_LIST) {
-1541 if (find.contains(search)) {
-1542 result = false;
-1543 break ;
-1544 }
-1545 }
-1546
-1547 return result;
-1548 }
-1549
-1550 private static Set<String> getProperties(Class<?> clss) {
-1551 final Set<String> result = new TreeSet<>();
-1552 final PropertyDescriptor[] map = PropertyUtils.getPropertyDescriptors(clss);
-1553
-1554 for (PropertyDescriptor p : map) {
-1555 if (p.getWriteMethod() != null ) {
-1556 result.add(p.getName());
-1557 }
-1558 }
-1559
-1560 return result;
-1561 }
-1562
-1563 @Test
-1564 public void testAllStyleRules() throws Exception {
-1565 for (Path path : XdocUtil.getXdocsStyleFilePaths(XdocUtil.getXdocsFilePaths())) {
-1566 final String fileName = path.getFileName().toString();
-1567 final String styleName = fileName.substring(0, fileName.lastIndexOf('_'));
-1568 final String input = Files.readString(path);
-1569 final Document document = XmlUtil.getRawXml(fileName, input, input);
-1570 final NodeList sources = document.getElementsByTagName("tr" );
-1571
-1572 final Set<String> styleChecks;
-1573 switch (styleName) {
-1574 case "google" :
-1575 styleChecks = new HashSet<>(GOOGLE_MODULES);
-1576 break ;
+1435 list.add(field.get(null ).toString());
+1436 }
+1437
+1438 final StringBuilder expectedText = new StringBuilder(120);
+1439
+1440 for (String s : list) {
+1441 expectedText.append(s);
+1442 expectedText.append('\n');
+1443 }
+1444
+1445 if (expectedText.length() > 0) {
+1446 expectedText.append("All messages can be customized if the default message doesn't "
+1447 + "suit you.\nPlease see the documentation to learn how to." );
+1448 }
+1449
+1450 if (subSection == null ) {
+1451 assertWithMessage(fileName + " section '" + sectionName
+1452 + "' should have the expected error keys" )
+1453 .that(expectedText.toString())
+1454 .isEqualTo("" );
+1455 }
+1456 else {
+1457 final String subsectionTextContent = subSection.getTextContent()
+1458 .replaceAll("\n\\s+" , "\n" )
+1459 .replaceAll("\\s+" , " " )
+1460 .trim();
+1461 assertWithMessage(fileName + " section '" + sectionName
+1462 + "' should have the expected error keys" )
+1463 .that(subsectionTextContent)
+1464 .isEqualTo(expectedText.toString().replaceAll("\n" , " " ).trim());
+1465
+1466 for (Node node : XmlUtil.findChildElementsByTag(subSection, "a" )) {
+1467 final String url = node.getAttributes().getNamedItem("href" ).getTextContent();
+1468 final String linkText = node.getTextContent().trim();
+1469 final String expectedUrl;
+1470
+1471 if ("see the documentation" .equals(linkText)) {
+1472 expectedUrl = "../../config.html#Custom_messages" ;
+1473 }
+1474 else {
+1475 expectedUrl = "https://github.com/search?q="
+1476 + "path%3Asrc%2Fmain%2Fresources%2F"
+1477 + clss.getPackage().getName().replace("." , "%2F" )
+1478 + "%20path%3A**%2Fmessages*.properties+repo%3Acheckstyle%2F"
+1479 + "checkstyle+%22" + linkText + "%22" ;
+1480 }
+1481
+1482 assertWithMessage(fileName + " section '" + sectionName
+1483 + "' should have matching url for '" + linkText + "'" )
+1484 .that(url)
+1485 .isEqualTo(expectedUrl);
+1486 }
+1487 }
+1488 }
+1489
+1490 private static void validateUsageExample(String fileName, String sectionName, Node subSection) {
+1491 final String text = subSection.getTextContent().replace("Checkstyle Style" , "" )
+1492 .replace("Google Style" , "" ).replace("Sun Style" , "" ).trim();
+1493
+1494 assertWithMessage(fileName + " section '" + sectionName
+1495 + "' has unknown text in 'Example of Usage': " + text)
+1496 .that(text)
+1497 .isEmpty();
+1498
+1499 boolean hasCheckstyle = false;
+1500 boolean hasGoogle = false;
+1501 boolean hasSun = false;
+1502
+1503 for (Node node : XmlUtil.findChildElementsByTag(subSection, "a" )) {
+1504 final String url = node.getAttributes().getNamedItem("href" ).getTextContent();
+1505 final String linkText = node.getTextContent().trim();
+1506 String expectedUrl = null ;
+1507
+1508 if ("Checkstyle Style" .equals(linkText)) {
+1509 hasCheckstyle = true ;
+1510 expectedUrl = "https://github.com/search?q="
+1511 + "path%3Aconfig%20path%3A**%2Fcheckstyle-checks.xml+"
+1512 + "repo%3Acheckstyle%2Fcheckstyle+" + sectionName;
+1513 }
+1514 else if ("Google Style" .equals(linkText)) {
+1515 hasGoogle = true ;
+1516 expectedUrl = "https://github.com/search?q="
+1517 + "path%3Asrc%2Fmain%2Fresources%20path%3A**%2Fgoogle_checks.xml+"
+1518 + "repo%3Acheckstyle%2Fcheckstyle+"
+1519 + sectionName;
+1520
+1521 assertWithMessage(fileName + " section '" + sectionName
+1522 + "' should be in google_checks.xml or not reference 'Google Style'" )
+1523 .that(GOOGLE_MODULES)
+1524 .contains(sectionName);
+1525 }
+1526 else if ("Sun Style" .equals(linkText)) {
+1527 hasSun = true ;
+1528 expectedUrl = "https://github.com/search?q="
+1529 + "path%3Asrc%2Fmain%2Fresources%20path%3A**%2Fsun_checks.xml+"
+1530 + "repo%3Acheckstyle%2Fcheckstyle+"
+1531 + sectionName;
+1532
+1533 assertWithMessage(fileName + " section '" + sectionName
+1534 + "' should be in sun_checks.xml or not reference 'Sun Style'" )
+1535 .that(SUN_MODULES)
+1536 .contains(sectionName);
+1537 }
+1538
+1539 assertWithMessage(fileName + " section '" + sectionName
+1540 + "' should have matching url" )
+1541 .that(url)
+1542 .isEqualTo(expectedUrl);
+1543 }
+1544
+1545 assertWithMessage(fileName + " section '" + sectionName
+1546 + "' should have a checkstyle section" )
+1547 .that(hasCheckstyle)
+1548 .isTrue();
+1549 assertWithMessage(fileName + " section '" + sectionName
+1550 + "' should have a google section since it is in it's config" )
+1551 .that(hasGoogle || !GOOGLE_MODULES.contains(sectionName))
+1552 .isTrue();
+1553 assertWithMessage(fileName + " section '" + sectionName
+1554 + "' should have a sun section since it is in it's config" )
+1555 .that(hasSun || !SUN_MODULES.contains(sectionName))
+1556 .isTrue();
+1557 }
+1558
+1559 private static void validatePackageSection(String fileName, String sectionName,
+1560 Node subSection, Object instance) {
+1561 assertWithMessage(fileName + " section '" + sectionName
+1562 + "' should have matching package" )
+1563 .that(subSection.getTextContent().trim())
+1564 .isEqualTo(instance.getClass().getPackage().getName());
+1565 }
+1566
+1567 private static void validateParentSection(String fileName, String sectionName,
+1568 Node subSection) {
+1569 final String expected;
+1570
+1571 if (!"TreeWalker" .equals(sectionName) && hasParentModule(sectionName)) {
+1572 expected = "TreeWalker" ;
+1573 }
+1574 else {
+1575 expected = "Checker" ;
+1576 }
1577
-1578 case "sun" :
-1579 styleChecks = new HashSet<>(SUN_MODULES);
-1580 styleChecks.removeAll(IGNORED_SUN_MODULES);
-1581 break ;
+1578 assertWithMessage(fileName + " section '" + sectionName + "' should have matching parent" )
+1579 .that(subSection.getTextContent().trim())
+1580 .isEqualTo(expected);
+1581 }
1582
-1583 default :
-1584 assertWithMessage("Missing modules list for style file '" + fileName + "'" )
-1585 .fail();
-1586 styleChecks = null ;
-1587 }
-1588
-1589 String lastRuleName = null ;
-1590 String[] lastRuleNumberParts = null ;
-1591
-1592 for (int position = 0; position < sources.getLength(); position++) {
-1593 final Node row = sources.item(position);
-1594 final List<Node> columns = new ArrayList<>(
-1595 XmlUtil.findChildElementsByTag(row, "td" ));
+1583 private static boolean hasParentModule(String sectionName) {
+1584 final String search = "\"" + sectionName + "\"" ;
+1585 boolean result = true ;
+1586
+1587 for (String find : XML_FILESET_LIST) {
+1588 if (find.contains(search)) {
+1589 result = false;
+1590 break ;
+1591 }
+1592 }
+1593
+1594 return result;
+1595 }
1596
-1597 if (columns.isEmpty()) {
-1598 continue ;
-1599 }
+1597 private static Set<String> getProperties(Class<?> clss) {
+1598 final Set<String> result = new TreeSet<>();
+1599 final PropertyDescriptor[] map = PropertyUtils.getPropertyDescriptors(clss);
1600
-1601 final String ruleName = columns.get(1).getTextContent().trim();
-1602 lastRuleNumberParts = validateRuleNameOrder(
-1603 fileName, lastRuleName, lastRuleNumberParts, ruleName);
-1604
-1605 if (!"--" .equals(ruleName)) {
-1606 validateStyleAnchors(XmlUtil.findChildElementsByTag(columns.get(0), "a" ),
-1607 fileName, ruleName);
-1608 }
+1601 for (PropertyDescriptor p : map) {
+1602 if (p.getWriteMethod() != null ) {
+1603 result.add(p.getName());
+1604 }
+1605 }
+1606
+1607 return result;
+1608 }
1609
-1610 validateStyleModules(XmlUtil.findChildElementsByTag(columns.get(2), "a" ),
-1611 XmlUtil.findChildElementsByTag(columns.get(3), "a" ), styleChecks, styleName,
-1612 ruleName);
-1613
-1614 lastRuleName = ruleName;
-1615 }
-1616
-1617
-1618 styleChecks.remove("BeforeExecutionExclusionFileFilter" );
-1619 styleChecks.remove("SuppressionFilter" );
-1620 styleChecks.remove("SuppressionXpathFilter" );
-1621 styleChecks.remove("SuppressionXpathSingleFilter" );
-1622 styleChecks.remove("TreeWalker" );
-1623 styleChecks.remove("Checker" );
-1624 styleChecks.remove("SuppressWithNearbyCommentFilter" );
-1625 styleChecks.remove("SuppressionCommentFilter" );
-1626 styleChecks.remove("SuppressWarningsFilter" );
-1627 styleChecks.remove("SuppressWarningsHolder" );
-1628
-1629 assertWithMessage(
-1630 fileName + " requires the following check(s) to appear: " + styleChecks)
-1631 .that(styleChecks)
-1632 .isEmpty();
-1633 }
-1634 }
+1610 @Test
+1611 public void testAllStyleRules() throws Exception {
+1612 for (Path path : XdocUtil.getXdocsStyleFilePaths(XdocUtil.getXdocsFilePaths())) {
+1613 final String fileName = path.getFileName().toString();
+1614 final String styleName = fileName.substring(0, fileName.lastIndexOf('_'));
+1615 final String input = Files.readString(path);
+1616 final Document document = XmlUtil.getRawXml(fileName, input, input);
+1617 final NodeList sources = document.getElementsByTagName("tr" );
+1618
+1619 final Set<String> styleChecks;
+1620 switch (styleName) {
+1621 case "google" :
+1622 styleChecks = new HashSet<>(GOOGLE_MODULES);
+1623 break ;
+1624
+1625 case "sun" :
+1626 styleChecks = new HashSet<>(SUN_MODULES);
+1627 styleChecks.removeAll(IGNORED_SUN_MODULES);
+1628 break ;
+1629
+1630 default :
+1631 assertWithMessage("Missing modules list for style file '" + fileName + "'" )
+1632 .fail();
+1633 styleChecks = null ;
+1634 }
1635
-1636 private static String[] validateRuleNameOrder(String fileName, String lastRuleName,
-1637 String[] lastRuleNumberParts, String ruleName) {
-1638 final String[] ruleNumberParts = ruleName.split(" " , 2)[0].split("\\." );
-1639
-1640 if (lastRuleName != null ) {
-1641 final int ruleNumberPartsAmount = ruleNumberParts.length;
-1642 final int lastRuleNumberPartsAmount = lastRuleNumberParts.length;
-1643 final String outOfOrderReason = fileName + " rule '" + ruleName
-1644 + "' is out of order compared to '" + lastRuleName + "'" ;
-1645 boolean lastRuleNumberPartWasEqual = false;
-1646 int partIndex;
-1647 for (partIndex = 0; partIndex < ruleNumberPartsAmount; partIndex++) {
-1648 if (lastRuleNumberPartsAmount <= partIndex) {
-1649
-1650
-1651 break ;
-1652 }
-1653
-1654 final String ruleNumberPart = ruleNumberParts[partIndex];
-1655 final String lastRuleNumberPart = lastRuleNumberParts[partIndex];
-1656 final boolean ruleNumberPartsAreNumeric = IntStream.concat(
-1657 ruleNumberPart.chars(),
-1658 lastRuleNumberPart.chars()
-1659 ).allMatch(Character::isDigit);
+1636 String lastRuleName = null ;
+1637 String[] lastRuleNumberParts = null ;
+1638
+1639 for (int position = 0; position < sources.getLength(); position++) {
+1640 final Node row = sources.item(position);
+1641 final List<Node> columns = new ArrayList<>(
+1642 XmlUtil.findChildElementsByTag(row, "td" ));
+1643
+1644 if (columns.isEmpty()) {
+1645 continue ;
+1646 }
+1647
+1648 final String ruleName = columns.get(1).getTextContent().trim();
+1649 lastRuleNumberParts = validateRuleNameOrder(
+1650 fileName, lastRuleName, lastRuleNumberParts, ruleName);
+1651
+1652 if (!"--" .equals(ruleName)) {
+1653 validateStyleAnchors(XmlUtil.findChildElementsByTag(columns.get(0), "a" ),
+1654 fileName, ruleName);
+1655 }
+1656
+1657 validateStyleModules(XmlUtil.findChildElementsByTag(columns.get(2), "a" ),
+1658 XmlUtil.findChildElementsByTag(columns.get(3), "a" ), styleChecks, styleName,
+1659 ruleName);
1660
-1661 if (ruleNumberPartsAreNumeric) {
-1662 final int numericRuleNumberPart = parseInt(ruleNumberPart);
-1663 final int numericLastRuleNumberPart = parseInt(lastRuleNumberPart);
-1664 assertWithMessage(outOfOrderReason)
-1665 .that(numericRuleNumberPart)
-1666 .isAtLeast(numericLastRuleNumberPart);
-1667 }
-1668 else {
-1669 assertWithMessage(outOfOrderReason)
-1670 .that(ruleNumberPart.compareToIgnoreCase(lastRuleNumberPart))
-1671 .isAtLeast(0);
-1672 }
-1673 lastRuleNumberPartWasEqual = ruleNumberPart.equalsIgnoreCase(lastRuleNumberPart);
-1674 if (!lastRuleNumberPartWasEqual) {
-1675
-1676
-1677 break ;
-1678 }
-1679 }
-1680 if (ruleNumberPartsAmount == partIndex && lastRuleNumberPartWasEqual) {
-1681 if (lastRuleNumberPartsAmount == partIndex) {
-1682 assertWithMessage(fileName + " rule '" + ruleName + "' and rule '"
-1683 + lastRuleName + "' have the same rule number" ).fail();
-1684 }
-1685 else {
-1686 assertWithMessage(outOfOrderReason).fail();
-1687 }
-1688 }
-1689 }
-1690
-1691 return ruleNumberParts;
-1692 }
-1693
-1694 private static void validateStyleAnchors(Set<Node> anchors, String fileName, String ruleName) {
-1695 assertWithMessage(fileName + " rule '" + ruleName + "' must have two row anchors" )
-1696 .that(anchors)
-1697 .hasSize(2);
-1698
-1699 final int space = ruleName.indexOf(' ');
-1700 assertWithMessage(fileName + " rule '" + ruleName
-1701 + "' must have have a space between the rule's number and the rule's name" )
-1702 .that(space)
-1703 .isNotEqualTo(-1);
-1704
-1705 final String ruleNumber = ruleName.substring(0, space);
-1706
-1707 int position = 1;
-1708
-1709 for (Node anchor : anchors) {
-1710 final String actualUrl;
-1711 final String expectedUrl;
-1712
-1713 if (position == 1) {
-1714 actualUrl = XmlUtil.getNameAttributeOfNode(anchor);
-1715 expectedUrl = ruleNumber;
-1716 }
-1717 else {
-1718 actualUrl = anchor.getAttributes().getNamedItem("href" ).getTextContent();
-1719 expectedUrl = "#" + ruleNumber;
-1720 }
-1721
-1722 assertWithMessage(fileName + " rule '" + ruleName + "' anchor "
-1723 + position + " should have matching name/url" )
-1724 .that(actualUrl)
-1725 .isEqualTo(expectedUrl);
-1726
-1727 position++;
-1728 }
-1729 }
-1730
-1731 private static void validateStyleModules(Set<Node> checks, Set<Node> configs,
-1732 Set<String> styleChecks, String styleName, String ruleName) {
-1733 final Iterator<Node> itrChecks = checks.iterator();
-1734 final Iterator<Node> itrConfigs = configs.iterator();
-1735
-1736 while (itrChecks.hasNext()) {
-1737 final Node module = itrChecks.next();
-1738 final String moduleName = module.getTextContent().trim();
-1739 final String href = module.getAttributes().getNamedItem("href" ).getTextContent();
-1740
-1741 final boolean moduleIsConfig = href.startsWith("config_" );
-1742 final boolean moduleIsCheck = href.startsWith("checks/" );
-1743
-1744 if (!moduleIsConfig && !moduleIsCheck) {
-1745 continue ;
-1746 }
-1747
-1748 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '" + moduleName
-1749 + "' shouldn't end with 'Check'" )
-1750 .that(moduleName.endsWith("Check" ))
-1751 .isFalse();
-1752
-1753 styleChecks.remove(moduleName);
-1754
-1755 for (String configName : new String[] {"config" , "test" }) {
-1756 Node config = null ;
-1757
-1758 try {
-1759 config = itrConfigs.next();
-1760 }
-1761 catch (NoSuchElementException ignore) {
-1762 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '"
-1763 + moduleName + "' is missing the config link: " + configName).fail();
-1764 }
-1765
-1766 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '"
-1767 + moduleName + "' has mismatched config/test links" )
-1768 .that(config.getTextContent().trim())
-1769 .isEqualTo(configName);
-1770
-1771 final String configUrl = config.getAttributes().getNamedItem("href" )
-1772 .getTextContent();
+1661 lastRuleName = ruleName;
+1662 }
+1663
+1664
+1665 styleChecks.remove("BeforeExecutionExclusionFileFilter" );
+1666 styleChecks.remove("SuppressionFilter" );
+1667 styleChecks.remove("SuppressionXpathFilter" );
+1668 styleChecks.remove("SuppressionXpathSingleFilter" );
+1669 styleChecks.remove("TreeWalker" );
+1670 styleChecks.remove("Checker" );
+1671 styleChecks.remove("SuppressWithNearbyCommentFilter" );
+1672 styleChecks.remove("SuppressionCommentFilter" );
+1673 styleChecks.remove("SuppressWarningsFilter" );
+1674 styleChecks.remove("SuppressWarningsHolder" );
+1675
+1676 assertWithMessage(
+1677 fileName + " requires the following check(s) to appear: " + styleChecks)
+1678 .that(styleChecks)
+1679 .isEmpty();
+1680 }
+1681 }
+1682
+1683 private static String[] validateRuleNameOrder(String fileName, String lastRuleName,
+1684 String[] lastRuleNumberParts, String ruleName) {
+1685 final String[] ruleNumberParts = ruleName.split(" " , 2)[0].split("\\." );
+1686
+1687 if (lastRuleName != null ) {
+1688 final int ruleNumberPartsAmount = ruleNumberParts.length;
+1689 final int lastRuleNumberPartsAmount = lastRuleNumberParts.length;
+1690 final String outOfOrderReason = fileName + " rule '" + ruleName
+1691 + "' is out of order compared to '" + lastRuleName + "'" ;
+1692 boolean lastRuleNumberPartWasEqual = false;
+1693 int partIndex;
+1694 for (partIndex = 0; partIndex < ruleNumberPartsAmount; partIndex++) {
+1695 if (lastRuleNumberPartsAmount <= partIndex) {
+1696
+1697
+1698 break ;
+1699 }
+1700
+1701 final String ruleNumberPart = ruleNumberParts[partIndex];
+1702 final String lastRuleNumberPart = lastRuleNumberParts[partIndex];
+1703 final boolean ruleNumberPartsAreNumeric = IntStream.concat(
+1704 ruleNumberPart.chars(),
+1705 lastRuleNumberPart.chars()
+1706 ).allMatch(Character::isDigit);
+1707
+1708 if (ruleNumberPartsAreNumeric) {
+1709 final int numericRuleNumberPart = parseInt(ruleNumberPart);
+1710 final int numericLastRuleNumberPart = parseInt(lastRuleNumberPart);
+1711 assertWithMessage(outOfOrderReason)
+1712 .that(numericRuleNumberPart)
+1713 .isAtLeast(numericLastRuleNumberPart);
+1714 }
+1715 else {
+1716 assertWithMessage(outOfOrderReason)
+1717 .that(ruleNumberPart.compareToIgnoreCase(lastRuleNumberPart))
+1718 .isAtLeast(0);
+1719 }
+1720 lastRuleNumberPartWasEqual = ruleNumberPart.equalsIgnoreCase(lastRuleNumberPart);
+1721 if (!lastRuleNumberPartWasEqual) {
+1722
+1723
+1724 break ;
+1725 }
+1726 }
+1727 if (ruleNumberPartsAmount == partIndex && lastRuleNumberPartWasEqual) {
+1728 if (lastRuleNumberPartsAmount == partIndex) {
+1729 assertWithMessage(fileName + " rule '" + ruleName + "' and rule '"
+1730 + lastRuleName + "' have the same rule number" ).fail();
+1731 }
+1732 else {
+1733 assertWithMessage(outOfOrderReason).fail();
+1734 }
+1735 }
+1736 }
+1737
+1738 return ruleNumberParts;
+1739 }
+1740
+1741 private static void validateStyleAnchors(Set<Node> anchors, String fileName, String ruleName) {
+1742 assertWithMessage(fileName + " rule '" + ruleName + "' must have two row anchors" )
+1743 .that(anchors)
+1744 .hasSize(2);
+1745
+1746 final int space = ruleName.indexOf(' ');
+1747 assertWithMessage(fileName + " rule '" + ruleName
+1748 + "' must have have a space between the rule's number and the rule's name" )
+1749 .that(space)
+1750 .isNotEqualTo(-1);
+1751
+1752 final String ruleNumber = ruleName.substring(0, space);
+1753
+1754 int position = 1;
+1755
+1756 for (Node anchor : anchors) {
+1757 final String actualUrl;
+1758 final String expectedUrl;
+1759
+1760 if (position == 1) {
+1761 actualUrl = XmlUtil.getNameAttributeOfNode(anchor);
+1762 expectedUrl = ruleNumber;
+1763 }
+1764 else {
+1765 actualUrl = anchor.getAttributes().getNamedItem("href" ).getTextContent();
+1766 expectedUrl = "#" + ruleNumber;
+1767 }
+1768
+1769 assertWithMessage(fileName + " rule '" + ruleName + "' anchor "
+1770 + position + " should have matching name/url" )
+1771 .that(actualUrl)
+1772 .isEqualTo(expectedUrl);
1773
-1774 if ("config" .equals(configName)) {
-1775 final String expectedUrl = "https://github.com/search?q="
-1776 + "path%3Asrc%2Fmain%2Fresources%20path%3A**%2F" + styleName
-1777 + "_checks.xml+repo%3Acheckstyle%2Fcheckstyle+" + moduleName;
-1778
-1779 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '"
-1780 + moduleName + "' should have matching " + configName + " url" )
-1781 .that(configUrl)
-1782 .isEqualTo(expectedUrl);
-1783 }
-1784 else if ("test" .equals(configName)) {
-1785 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '"
-1786 + moduleName + "' should have matching " + configName + " url" )
-1787 .that(configUrl)
-1788 .startsWith("https://github.com/checkstyle/checkstyle/"
-1789 + "blob/master/src/it/java/com/" + styleName
-1790 + "/checkstyle/test/" );
-1791 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '"
-1792 + moduleName + "' should have matching " + configName + " url" )
-1793 .that(configUrl)
-1794 .endsWith("/" + moduleName + "Test.java" );
-1795
-1796 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '"
-1797 + moduleName + "' should have a test that exists" )
-1798 .that(new File(configUrl.substring(53).replace('/',
-1799 File.separatorChar)).exists())
-1800 .isTrue();
-1801 }
-1802 }
-1803 }
+1774 position++;
+1775 }
+1776 }
+1777
+1778 private static void validateStyleModules(Set<Node> checks, Set<Node> configs,
+1779 Set<String> styleChecks, String styleName, String ruleName) {
+1780 final Iterator<Node> itrChecks = checks.iterator();
+1781 final Iterator<Node> itrConfigs = configs.iterator();
+1782
+1783 while (itrChecks.hasNext()) {
+1784 final Node module = itrChecks.next();
+1785 final String moduleName = module.getTextContent().trim();
+1786 final String href = module.getAttributes().getNamedItem("href" ).getTextContent();
+1787
+1788 final boolean moduleIsConfig = href.startsWith("config_" );
+1789 final boolean moduleIsCheck = href.startsWith("checks/" );
+1790
+1791 if (!moduleIsConfig && !moduleIsCheck) {
+1792 continue ;
+1793 }
+1794
+1795 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '" + moduleName
+1796 + "' shouldn't end with 'Check'" )
+1797 .that(moduleName.endsWith("Check" ))
+1798 .isFalse();
+1799
+1800 styleChecks.remove(moduleName);
+1801
+1802 for (String configName : new String[] {"config" , "test" }) {
+1803 Node config = null ;
1804
-1805 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' has too many configs" )
-1806 .that(itrConfigs.hasNext())
-1807 .isFalse();
-1808 }
-1809
-1810 @Test
-1811 public void testAllExampleMacrosHaveParagraphWithIdBeforeThem() throws Exception {
-1812 for (Path path : XdocUtil.getXdocsTemplatesFilePaths()) {
-1813 final String fileName = path.getFileName().toString();
-1814 final String input = Files.readString(path);
-1815 final Document document = XmlUtil.getRawXml(fileName, input, input);
-1816 final NodeList sources = document.getElementsByTagName("macro" );
+1805 try {
+1806 config = itrConfigs.next();
+1807 }
+1808 catch (NoSuchElementException ignore) {
+1809 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '"
+1810 + moduleName + "' is missing the config link: " + configName).fail();
+1811 }
+1812
+1813 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '"
+1814 + moduleName + "' has mismatched config/test links" )
+1815 .that(config.getTextContent().trim())
+1816 .isEqualTo(configName);
1817
-1818 for (int position = 0; position < sources.getLength(); position++) {
-1819 final Node macro = sources.item(position);
-1820 final String macroName = macro.getAttributes()
-1821 .getNamedItem("name" ).getTextContent();
-1822
-1823 if (!"example" .equals(macroName)) {
-1824 continue ;
-1825 }
-1826
-1827 final Node precedingParagraph = getPrecedingParagraph(macro);
-1828 assertWithMessage(fileName
-1829 + ": paragraph before example macro should have an id attribute" )
-1830 .that(precedingParagraph.hasAttributes())
-1831 .isTrue();
-1832
-1833 final Node idAttribute = precedingParagraph.getAttributes().getNamedItem("id" );
-1834 assertWithMessage(fileName
-1835 + ": paragraph before example macro should have an id attribute" )
-1836 .that(idAttribute)
-1837 .isNotNull();
-1838
-1839 validatePrecedingParagraphId(macro, fileName, idAttribute);
-1840 }
-1841 }
-1842 }
-1843
-1844 private static void validatePrecedingParagraphId(
-1845 Node macro, String fileName, Node idAttribute) {
-1846 String exampleName = "" ;
-1847 String exampleType = "" ;
-1848 final NodeList params = macro.getChildNodes();
-1849 for (int paramPosition = 0; paramPosition < params.getLength(); paramPosition++) {
-1850 final Node item = params.item(paramPosition);
+1818 final String configUrl = config.getAttributes().getNamedItem("href" )
+1819 .getTextContent();
+1820
+1821 if ("config" .equals(configName)) {
+1822 final String expectedUrl = "https://github.com/search?q="
+1823 + "path%3Asrc%2Fmain%2Fresources%20path%3A**%2F" + styleName
+1824 + "_checks.xml+repo%3Acheckstyle%2Fcheckstyle+" + moduleName;
+1825
+1826 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '"
+1827 + moduleName + "' should have matching " + configName + " url" )
+1828 .that(configUrl)
+1829 .isEqualTo(expectedUrl);
+1830 }
+1831 else if ("test" .equals(configName)) {
+1832 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '"
+1833 + moduleName + "' should have matching " + configName + " url" )
+1834 .that(configUrl)
+1835 .startsWith("https://github.com/checkstyle/checkstyle/"
+1836 + "blob/master/src/it/java/com/" + styleName
+1837 + "/checkstyle/test/" );
+1838 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '"
+1839 + moduleName + "' should have matching " + configName + " url" )
+1840 .that(configUrl)
+1841 .endsWith("/" + moduleName + "Test.java" );
+1842
+1843 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' module '"
+1844 + moduleName + "' should have a test that exists" )
+1845 .that(new File(configUrl.substring(53).replace('/',
+1846 File.separatorChar)).exists())
+1847 .isTrue();
+1848 }
+1849 }
+1850 }
1851
-1852 if (!"param" .equals(item.getNodeName())) {
-1853 continue ;
-1854 }
-1855
-1856 final String paramName = item.getAttributes()
-1857 .getNamedItem("name" ).getTextContent();
-1858 final String paramValue = item.getAttributes()
-1859 .getNamedItem("value" ).getTextContent();
-1860 if ("path" .equals(paramName)) {
-1861 exampleName = paramValue.substring(paramValue.lastIndexOf('/') + 1,
-1862 paramValue.lastIndexOf('.'));
-1863 }
-1864 else if ("type" .equals(paramName)) {
-1865 exampleType = paramValue;
-1866 }
-1867 }
-1868
-1869 final String id = idAttribute.getTextContent();
-1870 final String expectedId = String.format(Locale.ROOT, "%s-%s" , exampleName,
-1871 exampleType);
-1872 assertWithMessage(fileName
-1873 + ": paragraph before example macro should have the expected id value" )
-1874 .that(id)
-1875 .isEqualTo(expectedId);
-1876 }
-1877
-1878 private static Node getPrecedingParagraph(Node macro) {
-1879 Node precedingNode = macro.getPreviousSibling();
-1880 while (!"p" .equals(precedingNode.getNodeName())) {
-1881 precedingNode = precedingNode.getPreviousSibling();
-1882 }
-1883 return precedingNode;
-1884 }
-1885 }
+1852 assertWithMessage(styleName + "_style.xml rule '" + ruleName + "' has too many configs" )
+1853 .that(itrConfigs.hasNext())
+1854 .isFalse();
+1855 }
+1856
+1857 @Test
+1858 public void testAllExampleMacrosHaveParagraphWithIdBeforeThem() throws Exception {
+1859 for (Path path : XdocUtil.getXdocsTemplatesFilePaths()) {
+1860 final String fileName = path.getFileName().toString();
+1861 final String input = Files.readString(path);
+1862 final Document document = XmlUtil.getRawXml(fileName, input, input);
+1863 final NodeList sources = document.getElementsByTagName("macro" );
+1864
+1865 for (int position = 0; position < sources.getLength(); position++) {
+1866 final Node macro = sources.item(position);
+1867 final String macroName = macro.getAttributes()
+1868 .getNamedItem("name" ).getTextContent();
+1869
+1870 if (!"example" .equals(macroName)) {
+1871 continue ;
+1872 }
+1873
+1874 final Node precedingParagraph = getPrecedingParagraph(macro);
+1875 assertWithMessage(fileName
+1876 + ": paragraph before example macro should have an id attribute" )
+1877 .that(precedingParagraph.hasAttributes())
+1878 .isTrue();
+1879
+1880 final Node idAttribute = precedingParagraph.getAttributes().getNamedItem("id" );
+1881 assertWithMessage(fileName
+1882 + ": paragraph before example macro should have an id attribute" )
+1883 .that(idAttribute)
+1884 .isNotNull();
+1885
+1886 validatePrecedingParagraphId(macro, fileName, idAttribute);
+1887 }
+1888 }
+1889 }
+1890
+1891 private static void validatePrecedingParagraphId(
+1892 Node macro, String fileName, Node idAttribute) {
+1893 String exampleName = "" ;
+1894 String exampleType = "" ;
+1895 final NodeList params = macro.getChildNodes();
+1896 for (int paramPosition = 0; paramPosition < params.getLength(); paramPosition++) {
+1897 final Node item = params.item(paramPosition);
+1898
+1899 if (!"param" .equals(item.getNodeName())) {
+1900 continue ;
+1901 }
+1902
+1903 final String paramName = item.getAttributes()
+1904 .getNamedItem("name" ).getTextContent();
+1905 final String paramValue = item.getAttributes()
+1906 .getNamedItem("value" ).getTextContent();
+1907 if ("path" .equals(paramName)) {
+1908 exampleName = paramValue.substring(paramValue.lastIndexOf('/') + 1,
+1909 paramValue.lastIndexOf('.'));
+1910 }
+1911 else if ("type" .equals(paramName)) {
+1912 exampleType = paramValue;
+1913 }
+1914 }
+1915
+1916 final String id = idAttribute.getTextContent();
+1917 final String expectedId = String.format(Locale.ROOT, "%s-%s" , exampleName,
+1918 exampleType);
+1919 assertWithMessage(fileName
+1920 + ": paragraph before example macro should have the expected id value" )
+1921 .that(id)
+1922 .isEqualTo(expectedId);
+1923 }
+1924
+1925 private static Node getPrecedingParagraph(Node macro) {
+1926 Node precedingNode = macro.getPreviousSibling();
+1927 while (!"p" .equals(precedingNode.getNodeName())) {
+1928 precedingNode = precedingNode.getPreviousSibling();
+1929 }
+1930 return precedingNode;
+1931 }
+1932 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/internal/allchecks/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/internal/allchecks/package-frame.html
index 7c05bd3674..0ded7d369a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/internal/allchecks/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/internal/allchecks/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.internal.allchecks
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.internal.allchecks
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/internal/allchecks/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/internal/allchecks/package-summary.html
index 0d63db6868..bacb2df81c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/internal/allchecks/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/internal/allchecks/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.internal.allchecks
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.internal.allchecks
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.intern
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/internal/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/internal/package-frame.html
index 59ecd999fe..267284a647 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/internal/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/internal/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.internal
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.internal
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/internal/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/internal/package-summary.html
index 0769af11db..a42711e23b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/internal/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/internal/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.internal
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.internal
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -176,7 +176,7 @@ Package com.puppycrawl.tools.checkstyle.intern
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/internal/testmodules/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/internal/testmodules/package-frame.html
index 8138c3026f..99d5ca09a3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/internal/testmodules/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/internal/testmodules/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.internal.testmodules
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.internal.testmodules
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/internal/testmodules/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/internal/testmodules/package-summary.html
index 93a5f3024d..94923b5ca6 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/internal/testmodules/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/internal/testmodules/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.internal.testmodules
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.internal.testmodules
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -131,7 +131,7 @@ Package com.puppycrawl.tools.checkstyle.intern
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/internal/utils/CheckUtil.html b/xref-test/com/puppycrawl/tools/checkstyle/internal/utils/CheckUtil.html
index 8a8e7b8602..13d82fb04b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/internal/utils/CheckUtil.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/internal/utils/CheckUtil.html
@@ -203,210 +203,211 @@
195 private static boolean isFromAllowedPackages(Class<?> cls) {
196 final String canonicalName = cls.getCanonicalName();
197 return !canonicalName.startsWith("com.puppycrawl.tools.checkstyle.packageobjectfactory" )
-198 && !canonicalName.startsWith("com.puppycrawl.tools.checkstyle.internal.testmodules" );
-199 }
-200
-201
-202
-203
-204
-205
-206
-207
-208
-209
-210
-211 public static Set<Field> getCheckMessages(Class<?> module, boolean deepScan)
-212 throws ClassNotFoundException {
-213 final Set<Field> checkstyleMessages = new HashSet<>();
-214
-215
-216 final Field[] fields = module.getDeclaredFields();
-217
-218 for (Field field : fields) {
-219 if (field.getName().startsWith("MSG_" )) {
-220 checkstyleMessages.add(field);
-221 }
-222 }
-223
-224
-225 final Class<?> superModule = module.getSuperclass();
-226
-227 if (superModule != null && (deepScan || shouldScanDeepClassForMessages(superModule))) {
-228 checkstyleMessages.addAll(getCheckMessages(superModule, deepScan));
-229 }
-230
-231
-232 if (module == RegexpMultilineCheck.class ) {
-233 checkstyleMessages.addAll(getCheckMessages(Class
-234 .forName("com.puppycrawl.tools.checkstyle.checks.regexp.MultilineDetector" ),
-235 deepScan));
-236 }
-237 else if (module == RegexpSinglelineCheck.class
-238 || module == RegexpSinglelineJavaCheck.class ) {
-239 checkstyleMessages.addAll(getCheckMessages(Class
-240 .forName("com.puppycrawl.tools.checkstyle.checks.regexp.SinglelineDetector" ),
-241 deepScan));
-242 }
-243
-244 return checkstyleMessages;
-245 }
-246
-247
-248
-249
-250
-251
-252
-253 private static boolean shouldScanDeepClassForMessages(Class<?> superModule) {
-254 return superModule == AbstractNameCheck.class
-255 || superModule == AbstractAccessControlNameCheck.class
-256 || superModule == AbstractParenPadCheck.class
-257 || superModule == AbstractSuperCheck.class ;
-258 }
-259
-260
-261
-262
-263
-264
-265
-266
-267
-268
-269
-270 public static String getCheckMessage(Class<?> module, Locale locale, String messageKey,
-271 Object... arguments) {
-272 String checkMessage;
-273 try {
-274 final Properties pr = new Properties();
-275 if (locale == Locale.ENGLISH) {
-276 pr.load(module.getResourceAsStream("messages.properties" ));
-277 }
-278 else {
-279 pr.load(module
-280 .getResourceAsStream("messages_" + locale.getLanguage() + ".properties" ));
-281 }
-282 final MessageFormat formatter = new MessageFormat(pr.getProperty(messageKey), locale);
-283 checkMessage = formatter.format(arguments);
-284 }
-285 catch (IOException ignored) {
-286 checkMessage = null ;
-287 }
-288 return checkMessage;
-289 }
-290
-291 public static String getTokenText(int [] tokens, int ... subtractions) {
-292 final String tokenText;
-293 if (subtractions.length == 0 && Arrays.equals(tokens, TokenUtil.getAllTokenIds())) {
-294 tokenText = "TokenTypes." ;
-295 }
-296 else {
-297 final StringBuilder result = new StringBuilder(50);
-298 boolean first = true ;
-299
-300 for (int token : tokens) {
-301 boolean found = false;
-302
-303 for (int subtraction : subtractions) {
-304 if (subtraction == token) {
-305 found = true ;
-306 break ;
-307 }
-308 }
-309
-310 if (found) {
-311 continue ;
-312 }
-313
-314 if (first) {
-315 first = false;
-316 }
-317 else {
-318 result.append(", " );
-319 }
-320
-321 result.append(TokenUtil.getTokenName(token));
-322 }
-323
-324 if (result.length() != 0) {
-325 result.append('.');
-326 }
-327
-328 tokenText = result.toString();
-329 }
-330 return tokenText;
-331 }
-332
-333 public static Set<String> getTokenNameSet(int ... tokens) {
-334 final Set<String> result = new HashSet<>();
-335
-336 for (int token : tokens) {
-337 result.add(TokenUtil.getTokenName(token));
-338 }
-339
-340 return result;
-341 }
-342
-343 public static String getJavadocTokenText(int [] tokens, int ... subtractions) {
-344 final StringBuilder result = new StringBuilder(50);
-345 boolean first = true ;
-346
-347 for (int token : tokens) {
-348 boolean found = false;
-349
-350 for (int subtraction : subtractions) {
-351 if (subtraction == token) {
-352 found = true ;
-353 break ;
-354 }
-355 }
-356
-357 if (found) {
-358 continue ;
-359 }
-360
-361 if (first) {
-362 first = false;
-363 }
-364 else {
-365 result.append(", " );
-366 }
-367
-368 result.append(JavadocUtil.getTokenName(token));
-369 }
-370
-371 if (result.length() != 0) {
-372 result.append('.');
-373 }
-374
-375 return result.toString();
-376 }
-377
-378 public static String getLineSeparatorForFile(String filepath, Charset charset)
-379 throws IOException {
-380 final boolean [] crFound = {false};
-381 new FileText(new File(filepath), charset.name())
-382 .getFullText()
-383 .chars()
-384 .peek(character -> {
-385 if (character == '\r') {
-386 crFound[0] = true ;
-387 }
-388 })
-389 .filter(character -> character == '\n')
-390 .findFirst();
-391
-392 final String result;
-393 if (crFound[0]) {
-394 result = CRLF;
-395 }
-396 else {
-397 result = "\n" ;
-398 }
-399 return result;
-400 }
-401 }
+198 && !canonicalName.startsWith("com.puppycrawl.tools.checkstyle.internal.testmodules" )
+199 && !canonicalName.startsWith("com.puppycrawl.tools.checkstyle.site" );
+200 }
+201
+202
+203
+204
+205
+206
+207
+208
+209
+210
+211
+212 public static Set<Field> getCheckMessages(Class<?> module, boolean deepScan)
+213 throws ClassNotFoundException {
+214 final Set<Field> checkstyleMessages = new HashSet<>();
+215
+216
+217 final Field[] fields = module.getDeclaredFields();
+218
+219 for (Field field : fields) {
+220 if (field.getName().startsWith("MSG_" )) {
+221 checkstyleMessages.add(field);
+222 }
+223 }
+224
+225
+226 final Class<?> superModule = module.getSuperclass();
+227
+228 if (superModule != null && (deepScan || shouldScanDeepClassForMessages(superModule))) {
+229 checkstyleMessages.addAll(getCheckMessages(superModule, deepScan));
+230 }
+231
+232
+233 if (module == RegexpMultilineCheck.class ) {
+234 checkstyleMessages.addAll(getCheckMessages(Class
+235 .forName("com.puppycrawl.tools.checkstyle.checks.regexp.MultilineDetector" ),
+236 deepScan));
+237 }
+238 else if (module == RegexpSinglelineCheck.class
+239 || module == RegexpSinglelineJavaCheck.class ) {
+240 checkstyleMessages.addAll(getCheckMessages(Class
+241 .forName("com.puppycrawl.tools.checkstyle.checks.regexp.SinglelineDetector" ),
+242 deepScan));
+243 }
+244
+245 return checkstyleMessages;
+246 }
+247
+248
+249
+250
+251
+252
+253
+254 private static boolean shouldScanDeepClassForMessages(Class<?> superModule) {
+255 return superModule == AbstractNameCheck.class
+256 || superModule == AbstractAccessControlNameCheck.class
+257 || superModule == AbstractParenPadCheck.class
+258 || superModule == AbstractSuperCheck.class ;
+259 }
+260
+261
+262
+263
+264
+265
+266
+267
+268
+269
+270
+271 public static String getCheckMessage(Class<?> module, Locale locale, String messageKey,
+272 Object... arguments) {
+273 String checkMessage;
+274 try {
+275 final Properties pr = new Properties();
+276 if (locale == Locale.ENGLISH) {
+277 pr.load(module.getResourceAsStream("messages.properties" ));
+278 }
+279 else {
+280 pr.load(module
+281 .getResourceAsStream("messages_" + locale.getLanguage() + ".properties" ));
+282 }
+283 final MessageFormat formatter = new MessageFormat(pr.getProperty(messageKey), locale);
+284 checkMessage = formatter.format(arguments);
+285 }
+286 catch (IOException ignored) {
+287 checkMessage = null ;
+288 }
+289 return checkMessage;
+290 }
+291
+292 public static String getTokenText(int [] tokens, int ... subtractions) {
+293 final String tokenText;
+294 if (subtractions.length == 0 && Arrays.equals(tokens, TokenUtil.getAllTokenIds())) {
+295 tokenText = "TokenTypes." ;
+296 }
+297 else {
+298 final StringBuilder result = new StringBuilder(50);
+299 boolean first = true ;
+300
+301 for (int token : tokens) {
+302 boolean found = false;
+303
+304 for (int subtraction : subtractions) {
+305 if (subtraction == token) {
+306 found = true ;
+307 break ;
+308 }
+309 }
+310
+311 if (found) {
+312 continue ;
+313 }
+314
+315 if (first) {
+316 first = false;
+317 }
+318 else {
+319 result.append(", " );
+320 }
+321
+322 result.append(TokenUtil.getTokenName(token));
+323 }
+324
+325 if (result.length() != 0) {
+326 result.append('.');
+327 }
+328
+329 tokenText = result.toString();
+330 }
+331 return tokenText;
+332 }
+333
+334 public static Set<String> getTokenNameSet(int ... tokens) {
+335 final Set<String> result = new HashSet<>();
+336
+337 for (int token : tokens) {
+338 result.add(TokenUtil.getTokenName(token));
+339 }
+340
+341 return result;
+342 }
+343
+344 public static String getJavadocTokenText(int [] tokens, int ... subtractions) {
+345 final StringBuilder result = new StringBuilder(50);
+346 boolean first = true ;
+347
+348 for (int token : tokens) {
+349 boolean found = false;
+350
+351 for (int subtraction : subtractions) {
+352 if (subtraction == token) {
+353 found = true ;
+354 break ;
+355 }
+356 }
+357
+358 if (found) {
+359 continue ;
+360 }
+361
+362 if (first) {
+363 first = false;
+364 }
+365 else {
+366 result.append(", " );
+367 }
+368
+369 result.append(JavadocUtil.getTokenName(token));
+370 }
+371
+372 if (result.length() != 0) {
+373 result.append('.');
+374 }
+375
+376 return result.toString();
+377 }
+378
+379 public static String getLineSeparatorForFile(String filepath, Charset charset)
+380 throws IOException {
+381 final boolean [] crFound = {false};
+382 new FileText(new File(filepath), charset.name())
+383 .getFullText()
+384 .chars()
+385 .peek(character -> {
+386 if (character == '\r') {
+387 crFound[0] = true ;
+388 }
+389 })
+390 .filter(character -> character == '\n')
+391 .findFirst();
+392
+393 final String result;
+394 if (crFound[0]) {
+395 result = CRLF;
+396 }
+397 else {
+398 result = "\n" ;
+399 }
+400 return result;
+401 }
+402 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/internal/utils/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/internal/utils/package-frame.html
index 241946785c..c7899ebf26 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/internal/utils/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/internal/utils/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.internal.utils
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.internal.utils
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/internal/utils/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/internal/utils/package-summary.html
index d30410895b..19de8b0ab4 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/internal/utils/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/internal/utils/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.internal.utils
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.internal.utils
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -126,7 +126,7 @@ Package com.puppycrawl.tools.checkstyle.intern
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/javaastvisitor/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/javaastvisitor/package-frame.html
index da56b42f54..199e5d0a6b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/javaastvisitor/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/javaastvisitor/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.javaastvisitor
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.javaastvisitor
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/javaastvisitor/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/javaastvisitor/package-summary.html
index 7d013c82d1..aeee9bf8a5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/javaastvisitor/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/javaastvisitor/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.javaastvisitor
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.javaastvisitor
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.javaas
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/javadocdetailnodeparser/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/javadocdetailnodeparser/package-frame.html
index 43007ca77e..8f3f2828b7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/javadocdetailnodeparser/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/javadocdetailnodeparser/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.javadocdetailnodeparser
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.javadocdetailnodeparser
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/javadocdetailnodeparser/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/javadocdetailnodeparser/package-summary.html
index 586626d59c..b824711099 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/javadocdetailnodeparser/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/javadocdetailnodeparser/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.javadocdetailnodeparser
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.javadocdetailnodeparser
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.javado
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/javadocpropertiesgenerator/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/javadocpropertiesgenerator/package-frame.html
index 2bda4b0c6e..a42a405020 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/javadocpropertiesgenerator/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/javadocpropertiesgenerator/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.javadocpropertiesgenerator
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.javadocpropertiesgenerator
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/javadocpropertiesgenerator/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/javadocpropertiesgenerator/package-summary.html
index 671bdf0ea3..b10a8c0b33 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/javadocpropertiesgenerator/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/javadocpropertiesgenerator/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.javadocpropertiesgenerator
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.javadocpropertiesgenerator
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.javado
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/javaparser/InputJavaParserHiddenComments4.html b/xref-test/com/puppycrawl/tools/checkstyle/javaparser/InputJavaParserHiddenComments4.html
new file mode 100644
index 0000000000..55167cde38
--- /dev/null
+++ b/xref-test/com/puppycrawl/tools/checkstyle/javaparser/InputJavaParserHiddenComments4.html
@@ -0,0 +1,27 @@
+
+
+
+InputJavaParserHiddenComments4 xref
+
+
+
+
+1
+2
+3
+4
+5
+6
+7 package com.puppycrawl.tools.checkstyle.javaparser;
+8
+9
+10
+11
+12
+13 public interface InputJavaParserHiddenComments4 {
+14 }
+
+
+
+
+
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/javaparser/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/javaparser/package-frame.html
index d9ee1a8c63..c6da90dade 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/javaparser/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/javaparser/package-frame.html
@@ -4,7 +4,7 @@
-
checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.javaparser
+
checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.javaparser
@@ -20,6 +20,9 @@
Classes
InputJavaParserHiddenComments3
+
+
+ InputJavaParserHiddenComments4
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/javaparser/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/javaparser/package-summary.html
index b235a33ccf..0578f752d2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/javaparser/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/javaparser/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.javaparser
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.javaparser
@@ -23,7 +23,7 @@
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
+
+
+ InputJavaParserHiddenComments4
+
@@ -91,7 +96,7 @@ Package com.puppycrawl.tools.checkstyle.javapa
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/main/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/main/package-frame.html
index 5bfc3c8035..c72f47f8cb 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/main/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/main/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.main
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.main
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/main/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/main/package-summary.html
index cdc38465cb..02df0ecc76 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/main/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/main/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.main
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.main
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -136,7 +136,7 @@ Package com.puppycrawl.tools.checkstyle.main
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/meta/MetadataGeneratorUtilTest.html b/xref-test/com/puppycrawl/tools/checkstyle/meta/MetadataGeneratorUtilTest.html
index 508a7ecc70..61ab0a4dac 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/meta/MetadataGeneratorUtilTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/meta/MetadataGeneratorUtilTest.html
@@ -55,100 +55,101 @@
47 private final Set<String> modulesContainingNoMetadataFile = Set.of(
48 "Checker" ,
49 "TreeWalker" ,
-50 "JavadocMetadataScraper"
-51 );
-52
-53 @Override
-54 protected String getPackageLocation() {
-55 return null ;
-56 }
-57
-58
-59
-60
-61
-62
-63
-64
-65
-66
-67
-68
-69
-70 @Test
-71 public void testMetadataFilesGenerationAllFiles(@SystemOutGuard.SysOut Capturable systemOut)
-72 throws Exception {
-73 systemOut.captureMuted();
-74
-75 MetadataGeneratorUtil.generate(System.getProperty("user.dir" )
-76 + "/src/main/java/com/puppycrawl/tools/checkstyle" ,
-77 System.out, "checks" , "filters" , "filefilters" );
-78
-79 final String[] expectedErrorMessages = {
-80 "31: " + getCheckMessage(MSG_DESC_MISSING, "AbstractSuperCheck" ),
-81 "44: " + getCheckMessage(MSG_DESC_MISSING, "AbstractHeaderCheck" ),
-82 "42: " + getCheckMessage(MSG_DESC_MISSING, "AbstractJavadocCheck" ),
-83 "45: " + getCheckMessage(MSG_DESC_MISSING, "AbstractClassCouplingCheck" ),
-84 "26: " + getCheckMessage(MSG_DESC_MISSING, "AbstractAccessControlNameCheck" ),
-85 "30: " + getCheckMessage(MSG_DESC_MISSING, "AbstractNameCheck" ),
-86 "30: " + getCheckMessage(MSG_DESC_MISSING, "AbstractParenPadCheck" ),
-87 };
-88
-89 final String[] actualViolations = systemOut.getCapturedData().split("\\n" );
-90 final Pattern violationExtractingPattern = Pattern.compile("((?<=:)\\d.*:.*(?=\\s\\[))" );
-91
-92 Arrays.setAll(actualViolations, id -> {
-93 final Matcher matcher = violationExtractingPattern.matcher(actualViolations[id]);
-94 matcher.find();
-95 return matcher.group(1);
-96 });
-97
-98 assertWithMessage("Expected and actual errors do not match" )
-99 .that(expectedErrorMessages)
-100 .asList()
-101 .containsExactlyElementsIn(actualViolations);
-102
-103 final Set<String> metaFiles;
-104 try (Stream<Path> fileStream = Files.walk(
-105 Paths.get(System.getProperty("user.dir" ) + "/src/main/resources/com/puppycrawl"
-106 + "/tools/checkstyle/meta" ))) {
-107 metaFiles = fileStream
-108 .filter(Files::isRegularFile)
-109 .filter(path -> !path.toString().endsWith(".properties" ))
-110 .map(MetadataGeneratorUtilTest::getMetaFileName)
-111 .sorted()
-112 .collect(Collectors.toCollection(LinkedHashSet::new ));
-113 }
-114 final Set<String> checkstyleModules =
-115 CheckUtil.getSimpleNames(CheckUtil.getCheckstyleModules())
-116 .stream()
-117 .sorted()
-118 .collect(Collectors.toCollection(LinkedHashSet::new ));
-119 checkstyleModules.removeAll(modulesContainingNoMetadataFile);
-120 assertWithMessage("Number of generated metadata files dont match with "
-121 + "number of checkstyle module" )
-122 .that(metaFiles)
-123 .isEqualTo(checkstyleModules);
-124 }
-125
-126
-127
-128
-129
-130
-131
-132 private static String getMetaFileName(Path file) {
-133 final String fileName = file.getFileName().toString();
-134 final int lengthToOmit;
-135 if (fileName.contains("Check" )) {
-136 lengthToOmit = "Check.xml" .length();
-137 }
-138 else {
-139 lengthToOmit = ".xml" .length();
-140 }
-141 return fileName.substring(0, fileName.length() - lengthToOmit);
-142 }
-143 }
+50 "JavadocMetadataScraper" ,
+51 "ClassAndPropertiesSettersJavadocScraper"
+52 );
+53
+54 @Override
+55 protected String getPackageLocation() {
+56 return null ;
+57 }
+58
+59
+60
+61
+62
+63
+64
+65
+66
+67
+68
+69
+70
+71 @Test
+72 public void testMetadataFilesGenerationAllFiles(@SystemOutGuard.SysOut Capturable systemOut)
+73 throws Exception {
+74 systemOut.captureMuted();
+75
+76 MetadataGeneratorUtil.generate(System.getProperty("user.dir" )
+77 + "/src/main/java/com/puppycrawl/tools/checkstyle" ,
+78 System.out, "checks" , "filters" , "filefilters" );
+79
+80 final String[] expectedErrorMessages = {
+81 "31: " + getCheckMessage(MSG_DESC_MISSING, "AbstractSuperCheck" ),
+82 "44: " + getCheckMessage(MSG_DESC_MISSING, "AbstractHeaderCheck" ),
+83 "42: " + getCheckMessage(MSG_DESC_MISSING, "AbstractJavadocCheck" ),
+84 "45: " + getCheckMessage(MSG_DESC_MISSING, "AbstractClassCouplingCheck" ),
+85 "26: " + getCheckMessage(MSG_DESC_MISSING, "AbstractAccessControlNameCheck" ),
+86 "30: " + getCheckMessage(MSG_DESC_MISSING, "AbstractNameCheck" ),
+87 "30: " + getCheckMessage(MSG_DESC_MISSING, "AbstractParenPadCheck" ),
+88 };
+89
+90 final String[] actualViolations = systemOut.getCapturedData().split("\\n" );
+91 final Pattern violationExtractingPattern = Pattern.compile("((?<=:)\\d.*:.*(?=\\s\\[))" );
+92
+93 Arrays.setAll(actualViolations, id -> {
+94 final Matcher matcher = violationExtractingPattern.matcher(actualViolations[id]);
+95 matcher.find();
+96 return matcher.group(1);
+97 });
+98
+99 assertWithMessage("Expected and actual errors do not match" )
+100 .that(expectedErrorMessages)
+101 .asList()
+102 .containsExactlyElementsIn(actualViolations);
+103
+104 final Set<String> metaFiles;
+105 try (Stream<Path> fileStream = Files.walk(
+106 Paths.get(System.getProperty("user.dir" ) + "/src/main/resources/com/puppycrawl"
+107 + "/tools/checkstyle/meta" ))) {
+108 metaFiles = fileStream
+109 .filter(Files::isRegularFile)
+110 .filter(path -> !path.toString().endsWith(".properties" ))
+111 .map(MetadataGeneratorUtilTest::getMetaFileName)
+112 .sorted()
+113 .collect(Collectors.toCollection(LinkedHashSet::new ));
+114 }
+115 final Set<String> checkstyleModules =
+116 CheckUtil.getSimpleNames(CheckUtil.getCheckstyleModules())
+117 .stream()
+118 .sorted()
+119 .collect(Collectors.toCollection(LinkedHashSet::new ));
+120 checkstyleModules.removeAll(modulesContainingNoMetadataFile);
+121 assertWithMessage("Number of generated metadata files dont match with "
+122 + "number of checkstyle module" )
+123 .that(metaFiles)
+124 .isEqualTo(checkstyleModules);
+125 }
+126
+127
+128
+129
+130
+131
+132
+133 private static String getMetaFileName(Path file) {
+134 final String fileName = file.getFileName().toString();
+135 final int lengthToOmit;
+136 if (fileName.contains("Check" )) {
+137 lengthToOmit = "Check.xml" .length();
+138 }
+139 else {
+140 lengthToOmit = ".xml" .length();
+141 }
+142 return fileName.substring(0, fileName.length() - lengthToOmit);
+143 }
+144 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/meta/javadocmetadatascraper/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/meta/javadocmetadatascraper/package-frame.html
index 558e4a6de6..7de8f1a5f1 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/meta/javadocmetadatascraper/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/meta/javadocmetadatascraper/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.meta.javadocmetadatascraper
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.meta.javadocmetadatascraper
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/meta/javadocmetadatascraper/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/meta/javadocmetadatascraper/package-summary.html
index 5bea589418..6507778e05 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/meta/javadocmetadatascraper/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/meta/javadocmetadatascraper/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.meta.javadocmetadatascraper
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.meta.javadocmetadatascraper
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -146,7 +146,7 @@ Package com.puppycrawl.tools.checkstyle.meta.j
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/meta/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/meta/package-frame.html
index 5f34d0935a..77d05f2be5 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/meta/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/meta/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.meta
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.meta
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/meta/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/meta/package-summary.html
index 1780d0ce4a..191ed8f1df 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/meta/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/meta/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.meta
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.meta
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -91,7 +91,7 @@ Package com.puppycrawl.tools.checkstyle.meta
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/package-frame.html
index dd6b1e71e1..0178a5e9dc 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/package-summary.html
index 24b1580830..68a1fde571 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -86,7 +86,7 @@ Package com.puppycrawl.tools.checkstyle.
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/packagenamesloader/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/packagenamesloader/package-frame.html
index ce22bf53f5..6f5b83c6d9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/packagenamesloader/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/packagenamesloader/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.packagenamesloader
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.packagenamesloader
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/packagenamesloader/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/packagenamesloader/package-summary.html
index ffba5392ca..d328525b55 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/packagenamesloader/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/packagenamesloader/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.packagenamesloader
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.packagenamesloader
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.packag
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/bar/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/bar/package-frame.html
index 119b670b10..a938b4c3dc 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/bar/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/bar/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.packageobjectfactory.bar
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.packageobjectfactory.bar
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/bar/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/bar/package-summary.html
index 4a55f38f46..40528e7e85 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/bar/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/bar/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.packageobjectfactory.bar
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.packageobjectfactory.bar
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.packag
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/foo/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/foo/package-frame.html
index 5db65af38d..8891dfdbea 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/foo/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/foo/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.packageobjectfactory.foo
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.packageobjectfactory.foo
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/foo/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/foo/package-summary.html
index e7600b4792..156665174e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/foo/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/packageobjectfactory/foo/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.packageobjectfactory.foo
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.packageobjectfactory.foo
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.packag
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/suppressionsstringprinter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/suppressionsstringprinter/package-frame.html
index 56cabe31a0..c23005bc83 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/suppressionsstringprinter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/suppressionsstringprinter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.suppressionsstringprinter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.suppressionsstringprinter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/suppressionsstringprinter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/suppressionsstringprinter/package-summary.html
index d532401f26..ae3beddc20 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/suppressionsstringprinter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/suppressionsstringprinter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.suppressionsstringprinter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.suppressionsstringprinter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.suppre
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/treewalker/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/treewalker/package-frame.html
index ce8856584a..cac1d0b4ba 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/treewalker/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/treewalker/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.treewalker
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.treewalker
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/treewalker/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/treewalker/package-summary.html
index 396524f73a..394cd0ad69 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/treewalker/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/treewalker/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.treewalker
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.treewalker
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.treewa
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/CheckUtilTest.html b/xref-test/com/puppycrawl/tools/checkstyle/utils/CheckUtilTest.html
index 315823c603..c2e7df69cd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/CheckUtilTest.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/utils/CheckUtilTest.html
@@ -32,454 +32,413 @@
24 import static com.puppycrawl.tools.checkstyle.checks.coding.MultipleVariableDeclarationsCheck.MSG_MULTIPLE;
25 import static com.puppycrawl.tools.checkstyle.checks.coding.NestedIfDepthCheck.MSG_KEY;
26 import static com.puppycrawl.tools.checkstyle.checks.javadoc.JavadocMethodCheck.MSG_EXPECTED_TAG;
-27 import static com.puppycrawl.tools.checkstyle.checks.javadoc.MissingJavadocMethodCheck.MSG_JAVADOC_MISSING;
-28 import static com.puppycrawl.tools.checkstyle.internal.utils.TestUtil.findTokenInAstByPredicate;
-29 import static com.puppycrawl.tools.checkstyle.internal.utils.TestUtil.isUtilsClassHasPrivateConstructor;
-30
-31 import java.io.File;
-32 import java.util.Arrays;
-33 import java.util.HashSet;
-34 import java.util.List;
-35 import java.util.Optional;
-36 import java.util.Set;
-37
-38 import org.junit.jupiter.api.Test;
-39
-40 import com.puppycrawl.tools.checkstyle.AbstractModuleTestSupport;
-41 import com.puppycrawl.tools.checkstyle.DetailAstImpl;
-42 import com.puppycrawl.tools.checkstyle.JavaParser;
-43 import com.puppycrawl.tools.checkstyle.api.DetailAST;
-44 import com.puppycrawl.tools.checkstyle.api.TokenTypes;
-45 import com.puppycrawl.tools.checkstyle.checks.coding.EqualsAvoidNullCheck;
-46 import com.puppycrawl.tools.checkstyle.checks.coding.MultipleVariableDeclarationsCheck;
-47 import com.puppycrawl.tools.checkstyle.checks.coding.NestedIfDepthCheck;
-48 import com.puppycrawl.tools.checkstyle.checks.javadoc.JavadocMethodCheck;
-49 import com.puppycrawl.tools.checkstyle.checks.javadoc.MissingJavadocMethodCheck;
-50 import com.puppycrawl.tools.checkstyle.checks.naming.AccessModifierOption;
+27 import static com.puppycrawl.tools.checkstyle.internal.utils.TestUtil.findTokenInAstByPredicate;
+28 import static com.puppycrawl.tools.checkstyle.internal.utils.TestUtil.isUtilsClassHasPrivateConstructor;
+29
+30 import java.io.File;
+31 import java.util.Arrays;
+32 import java.util.HashSet;
+33 import java.util.List;
+34 import java.util.Optional;
+35 import java.util.Set;
+36
+37 import org.junit.jupiter.api.Test;
+38
+39 import com.puppycrawl.tools.checkstyle.AbstractModuleTestSupport;
+40 import com.puppycrawl.tools.checkstyle.DetailAstImpl;
+41 import com.puppycrawl.tools.checkstyle.JavaParser;
+42 import com.puppycrawl.tools.checkstyle.api.DetailAST;
+43 import com.puppycrawl.tools.checkstyle.api.TokenTypes;
+44 import com.puppycrawl.tools.checkstyle.checks.coding.EqualsAvoidNullCheck;
+45 import com.puppycrawl.tools.checkstyle.checks.coding.MultipleVariableDeclarationsCheck;
+46 import com.puppycrawl.tools.checkstyle.checks.coding.NestedIfDepthCheck;
+47 import com.puppycrawl.tools.checkstyle.checks.javadoc.JavadocMethodCheck;
+48 import com.puppycrawl.tools.checkstyle.checks.naming.AccessModifierOption;
+49
+50 public class CheckUtilTest extends AbstractModuleTestSupport {
51
-52 public class CheckUtilTest extends AbstractModuleTestSupport {
-53
-54 @Override
-55 protected String getPackageLocation() {
-56 return "com/puppycrawl/tools/checkstyle/utils/checkutil" ;
-57 }
-58
-59 @Test
-60 public void testIsProperUtilsClass() throws ReflectiveOperationException {
-61 assertWithMessage("Constructor is not private" )
-62 .that(isUtilsClassHasPrivateConstructor(CheckUtil.class ))
-63 .isTrue();
-64 }
-65
-66 @Test
-67 public void testParseDoubleWithIncorrectToken() {
-68 final double parsedDouble = CheckUtil.parseDouble("1_02" , TokenTypes.ASSIGN);
-69 assertWithMessage("Invalid parse result" )
-70 .that(parsedDouble)
-71 .isEqualTo(Double.NaN);
-72 }
-73
-74 @Test
-75 public void testEquals() {
-76 final DetailAstImpl litStatic = new DetailAstImpl();
-77 litStatic.setType(TokenTypes.LITERAL_STATIC);
-78
-79 final DetailAstImpl modifiers = new DetailAstImpl();
-80 modifiers.setType(TokenTypes.MODIFIERS);
-81 modifiers.addChild(litStatic);
-82
-83 final DetailAstImpl metDef = new DetailAstImpl();
-84 metDef.setType(TokenTypes.METHOD_DEF);
-85 metDef.addChild(modifiers);
-86
-87 assertWithMessage("Invalid result: ast is not equals method" )
-88 .that(CheckUtil.isEqualsMethod(metDef))
-89 .isFalse();
+52 @Override
+53 protected String getPackageLocation() {
+54 return "com/puppycrawl/tools/checkstyle/utils/checkutil" ;
+55 }
+56
+57 @Test
+58 public void testIsProperUtilsClass() throws ReflectiveOperationException {
+59 assertWithMessage("Constructor is not private" )
+60 .that(isUtilsClassHasPrivateConstructor(CheckUtil.class ))
+61 .isTrue();
+62 }
+63
+64 @Test
+65 public void testParseDoubleWithIncorrectToken() {
+66 final double parsedDouble = CheckUtil.parseDouble("1_02" , TokenTypes.ASSIGN);
+67 assertWithMessage("Invalid parse result" )
+68 .that(parsedDouble)
+69 .isEqualTo(Double.NaN);
+70 }
+71
+72 @Test
+73 public void testEquals() {
+74 final DetailAstImpl litStatic = new DetailAstImpl();
+75 litStatic.setType(TokenTypes.LITERAL_STATIC);
+76
+77 final DetailAstImpl modifiers = new DetailAstImpl();
+78 modifiers.setType(TokenTypes.MODIFIERS);
+79 modifiers.addChild(litStatic);
+80
+81 final DetailAstImpl metDef = new DetailAstImpl();
+82 metDef.setType(TokenTypes.METHOD_DEF);
+83 metDef.addChild(modifiers);
+84
+85 assertWithMessage("Invalid result: ast is not equals method" )
+86 .that(CheckUtil.isEqualsMethod(metDef))
+87 .isFalse();
+88
+89 metDef.removeChildren();
90
-91 metDef.removeChildren();
-92
-93 final DetailAstImpl metName = new DetailAstImpl();
-94 metName.setType(TokenTypes.IDENT);
-95 metName.setText("equals" );
-96 metDef.addChild(metName);
-97
-98 final DetailAstImpl modifiers2 = new DetailAstImpl();
-99 modifiers2.setType(TokenTypes.MODIFIERS);
-100 metDef.addChild(modifiers2);
-101
-102 final DetailAstImpl parameter1 = new DetailAstImpl();
-103 final DetailAstImpl parameter2 = new DetailAstImpl();
-104
-105 final DetailAstImpl parameters = new DetailAstImpl();
-106 parameters.setType(TokenTypes.PARAMETERS);
+91 final DetailAstImpl metName = new DetailAstImpl();
+92 metName.setType(TokenTypes.IDENT);
+93 metName.setText("equals" );
+94 metDef.addChild(metName);
+95
+96 final DetailAstImpl modifiers2 = new DetailAstImpl();
+97 modifiers2.setType(TokenTypes.MODIFIERS);
+98 metDef.addChild(modifiers2);
+99
+100 final DetailAstImpl parameter1 = new DetailAstImpl();
+101 final DetailAstImpl parameter2 = new DetailAstImpl();
+102
+103 final DetailAstImpl parameters = new DetailAstImpl();
+104 parameters.setType(TokenTypes.PARAMETERS);
+105
+106 parameters.addChild(parameter2);
107
-108 parameters.addChild(parameter2);
-109
-110 parameters.addChild(parameter1);
-111 metDef.addChild(parameters);
-112
-113 assertWithMessage("Invalid result: ast is not equals method" )
-114 .that(CheckUtil.isEqualsMethod(metDef))
-115 .isFalse();
-116 }
-117
-118 @Test
-119 public void testGetAccessModifierFromModifiersTokenWrongTokenType() {
-120 final DetailAstImpl modifiers = new DetailAstImpl();
-121 modifiers.setType(TokenTypes.METHOD_DEF);
-122
-123 try {
-124 CheckUtil.getAccessModifierFromModifiersToken(modifiers);
-125 assertWithMessage("%s was expected." , IllegalArgumentException.class .getSimpleName())
-126 .fail();
-127 }
-128 catch (IllegalArgumentException exc) {
-129 final String expectedExceptionMsg = "expected non-null AST-token with type 'MODIFIERS'" ;
-130 final String actualExceptionMsg = exc.getMessage();
-131 assertWithMessage("Invalid exception message" )
-132 .that(actualExceptionMsg)
-133 .isEqualTo(expectedExceptionMsg);
-134 }
-135 }
-136
-137 @Test
-138 public void testGetTypeParameterNames() throws Exception {
-139 final DetailAST parameterizedClassNode = getNodeFromFile(TokenTypes.CLASS_DEF);
-140 final List<String> expected = Arrays.asList("V" , "C" );
-141 final List<String> actual = CheckUtil.getTypeParameterNames(parameterizedClassNode);
-142
-143 assertWithMessage("Invalid type parameters" )
-144 .that(actual)
-145 .isEqualTo(expected);
-146 }
-147
-148 @Test
-149 public void testGetTypeParameters() throws Exception {
-150 final DetailAST parameterizedClassNode = getNodeFromFile(TokenTypes.CLASS_DEF);
-151 final DetailAST firstTypeParameter =
-152 getNode(parameterizedClassNode, TokenTypes.TYPE_PARAMETER);
-153 final List<DetailAST> expected = Arrays.asList(firstTypeParameter,
-154 firstTypeParameter.getNextSibling().getNextSibling());
-155 final List<DetailAST> actual = CheckUtil.getTypeParameters(parameterizedClassNode);
-156
-157 assertWithMessage("Invalid type parameters" )
-158 .that(actual)
-159 .isEqualTo(expected);
-160 }
-161
-162 @Test
-163 public void testIsEqualsMethod() throws Exception {
-164 final DetailAST equalsMethodNode = getNodeFromFile(TokenTypes.METHOD_DEF);
-165 final DetailAST someOtherMethod = equalsMethodNode.getNextSibling();
-166
-167 assertWithMessage("Invalid result: AST provided is not equals method" )
-168 .that(CheckUtil.isEqualsMethod(equalsMethodNode))
-169 .isTrue();
-170 assertWithMessage("Invalid result: AST provided is equals method" )
-171 .that(CheckUtil.isEqualsMethod(someOtherMethod))
-172 .isFalse();
-173 }
-174
-175 @Test
-176 public void testIsNonVoidMethod() throws Exception {
-177 final DetailAST nonVoidMethod = getNodeFromFile(TokenTypes.METHOD_DEF);
-178 final DetailAST voidMethod = nonVoidMethod.getNextSibling();
-179
-180 assertWithMessage("Invalid result: AST provided is void method" )
-181 .that(CheckUtil.isNonVoidMethod(nonVoidMethod))
-182 .isTrue();
-183 assertWithMessage("Invalid result: AST provided is non void method" )
-184 .that(CheckUtil.isNonVoidMethod(voidMethod))
-185 .isFalse();
-186 }
-187
-188 @Test
-189 public void testIsGetterMethod() throws Exception {
-190 final DetailAST notGetterMethod = getNodeFromFile(TokenTypes.METHOD_DEF);
-191 final DetailAST getterMethod = notGetterMethod.getNextSibling().getNextSibling();
-192
-193 assertWithMessage("Invalid result: AST provided is getter method" )
-194 .that(CheckUtil.isGetterMethod(getterMethod))
-195 .isTrue();
-196 assertWithMessage("Invalid result: AST provided is not getter method" )
-197 .that(CheckUtil.isGetterMethod(notGetterMethod))
-198 .isFalse();
-199 }
-200
-201 @Test
-202 public void testIsSetterMethod() throws Exception {
-203 final DetailAST firstClassMethod = getNodeFromFile(TokenTypes.METHOD_DEF);
-204 final DetailAST setterMethod =
-205 firstClassMethod.getNextSibling().getNextSibling().getNextSibling();
-206 final DetailAST notSetterMethod = setterMethod.getNextSibling();
-207
-208 assertWithMessage("Invalid result: AST provided is setter method" )
-209 .that(CheckUtil.isSetterMethod(setterMethod))
-210 .isTrue();
-211 assertWithMessage("Invalid result: AST provided is not setter method" )
-212 .that(CheckUtil.isSetterMethod(notSetterMethod))
-213 .isFalse();
-214 }
-215
-216 @Test
-217 public void testGetAccessModifierFromModifiersToken() throws Exception {
-218 final DetailAST interfaceDef = getNodeFromFile(TokenTypes.INTERFACE_DEF);
-219 final AccessModifierOption modifierInterface = CheckUtil
-220 .getAccessModifierFromModifiersToken(interfaceDef
-221 .findFirstToken(TokenTypes.OBJBLOCK)
-222 .findFirstToken(TokenTypes.METHOD_DEF));
-223 assertWithMessage("Invalid access modifier" )
-224 .that(modifierInterface)
-225 .isEqualTo(AccessModifierOption.PUBLIC);
-226
-227 final DetailAST privateVariable = getNodeFromFile(TokenTypes.VARIABLE_DEF);
-228 final AccessModifierOption modifierPrivate =
-229 CheckUtil.getAccessModifierFromModifiersToken(privateVariable);
-230 assertWithMessage("Invalid access modifier" )
-231 .that(modifierPrivate)
-232 .isEqualTo(AccessModifierOption.PRIVATE);
-233
-234 final DetailAST protectedVariable = privateVariable.getNextSibling();
-235 final AccessModifierOption modifierProtected =
-236 CheckUtil.getAccessModifierFromModifiersToken(protectedVariable);
-237 assertWithMessage("Invalid access modifier" )
-238 .that(modifierProtected)
-239 .isEqualTo(AccessModifierOption.PROTECTED);
-240
-241 final DetailAST publicVariable = protectedVariable.getNextSibling();
-242 final AccessModifierOption modifierPublic =
-243 CheckUtil.getAccessModifierFromModifiersToken(publicVariable);
-244 assertWithMessage("Invalid access modifier" )
-245 .that(modifierPublic)
-246 .isEqualTo(AccessModifierOption.PUBLIC);
-247
-248 final DetailAST packageVariable = publicVariable.getNextSibling();
-249 final AccessModifierOption modifierPackage =
-250 CheckUtil.getAccessModifierFromModifiersToken(packageVariable);
-251 assertWithMessage("Invalid access modifier" )
-252 .that(modifierPackage)
-253 .isEqualTo(AccessModifierOption.PACKAGE);
-254 }
-255
-256 @Test
-257 public void testGetFirstNode() throws Exception {
-258 final DetailAST classDef = getNodeFromFile(TokenTypes.CLASS_DEF);
-259
-260 final DetailAST firstChild = classDef.getFirstChild().getFirstChild();
-261 final DetailAST firstNode = CheckUtil.getFirstNode(classDef);
-262 assertWithMessage("Invalid first node" )
-263 .that(firstNode)
-264 .isEqualTo(firstChild);
-265 }
+108 parameters.addChild(parameter1);
+109 metDef.addChild(parameters);
+110
+111 assertWithMessage("Invalid result: ast is not equals method" )
+112 .that(CheckUtil.isEqualsMethod(metDef))
+113 .isFalse();
+114 }
+115
+116 @Test
+117 public void testGetAccessModifierFromModifiersTokenWrongTokenType() {
+118 final DetailAstImpl modifiers = new DetailAstImpl();
+119 modifiers.setType(TokenTypes.METHOD_DEF);
+120
+121 try {
+122 CheckUtil.getAccessModifierFromModifiersToken(modifiers);
+123 assertWithMessage("%s was expected." , IllegalArgumentException.class .getSimpleName())
+124 .fail();
+125 }
+126 catch (IllegalArgumentException exc) {
+127 final String expectedExceptionMsg = "expected non-null AST-token with type 'MODIFIERS'" ;
+128 final String actualExceptionMsg = exc.getMessage();
+129 assertWithMessage("Invalid exception message" )
+130 .that(actualExceptionMsg)
+131 .isEqualTo(expectedExceptionMsg);
+132 }
+133 }
+134
+135 @Test
+136 public void testGetTypeParameterNames() throws Exception {
+137 final DetailAST parameterizedClassNode = getNodeFromFile(TokenTypes.CLASS_DEF);
+138 final List<String> expected = Arrays.asList("V" , "C" );
+139 final List<String> actual = CheckUtil.getTypeParameterNames(parameterizedClassNode);
+140
+141 assertWithMessage("Invalid type parameters" )
+142 .that(actual)
+143 .isEqualTo(expected);
+144 }
+145
+146 @Test
+147 public void testGetTypeParameters() throws Exception {
+148 final DetailAST parameterizedClassNode = getNodeFromFile(TokenTypes.CLASS_DEF);
+149 final DetailAST firstTypeParameter =
+150 getNode(parameterizedClassNode, TokenTypes.TYPE_PARAMETER);
+151 final List<DetailAST> expected = Arrays.asList(firstTypeParameter,
+152 firstTypeParameter.getNextSibling().getNextSibling());
+153 final List<DetailAST> actual = CheckUtil.getTypeParameters(parameterizedClassNode);
+154
+155 assertWithMessage("Invalid type parameters" )
+156 .that(actual)
+157 .isEqualTo(expected);
+158 }
+159
+160 @Test
+161 public void testIsEqualsMethod() throws Exception {
+162 final DetailAST equalsMethodNode = getNodeFromFile(TokenTypes.METHOD_DEF);
+163 final DetailAST someOtherMethod = equalsMethodNode.getNextSibling();
+164
+165 assertWithMessage("Invalid result: AST provided is not equals method" )
+166 .that(CheckUtil.isEqualsMethod(equalsMethodNode))
+167 .isTrue();
+168 assertWithMessage("Invalid result: AST provided is equals method" )
+169 .that(CheckUtil.isEqualsMethod(someOtherMethod))
+170 .isFalse();
+171 }
+172
+173 @Test
+174 public void testIsNonVoidMethod() throws Exception {
+175 final DetailAST nonVoidMethod = getNodeFromFile(TokenTypes.METHOD_DEF);
+176 final DetailAST voidMethod = nonVoidMethod.getNextSibling();
+177
+178 assertWithMessage("Invalid result: AST provided is void method" )
+179 .that(CheckUtil.isNonVoidMethod(nonVoidMethod))
+180 .isTrue();
+181 assertWithMessage("Invalid result: AST provided is non void method" )
+182 .that(CheckUtil.isNonVoidMethod(voidMethod))
+183 .isFalse();
+184 }
+185
+186 @Test
+187 public void testGetAccessModifierFromModifiersToken() throws Exception {
+188 final DetailAST interfaceDef = getNodeFromFile(TokenTypes.INTERFACE_DEF);
+189 final AccessModifierOption modifierInterface = CheckUtil
+190 .getAccessModifierFromModifiersToken(interfaceDef
+191 .findFirstToken(TokenTypes.OBJBLOCK)
+192 .findFirstToken(TokenTypes.METHOD_DEF));
+193 assertWithMessage("Invalid access modifier" )
+194 .that(modifierInterface)
+195 .isEqualTo(AccessModifierOption.PUBLIC);
+196
+197 final DetailAST privateVariable = getNodeFromFile(TokenTypes.VARIABLE_DEF);
+198 final AccessModifierOption modifierPrivate =
+199 CheckUtil.getAccessModifierFromModifiersToken(privateVariable);
+200 assertWithMessage("Invalid access modifier" )
+201 .that(modifierPrivate)
+202 .isEqualTo(AccessModifierOption.PRIVATE);
+203
+204 final DetailAST protectedVariable = privateVariable.getNextSibling();
+205 final AccessModifierOption modifierProtected =
+206 CheckUtil.getAccessModifierFromModifiersToken(protectedVariable);
+207 assertWithMessage("Invalid access modifier" )
+208 .that(modifierProtected)
+209 .isEqualTo(AccessModifierOption.PROTECTED);
+210
+211 final DetailAST publicVariable = protectedVariable.getNextSibling();
+212 final AccessModifierOption modifierPublic =
+213 CheckUtil.getAccessModifierFromModifiersToken(publicVariable);
+214 assertWithMessage("Invalid access modifier" )
+215 .that(modifierPublic)
+216 .isEqualTo(AccessModifierOption.PUBLIC);
+217
+218 final DetailAST packageVariable = publicVariable.getNextSibling();
+219 final AccessModifierOption modifierPackage =
+220 CheckUtil.getAccessModifierFromModifiersToken(packageVariable);
+221 assertWithMessage("Invalid access modifier" )
+222 .that(modifierPackage)
+223 .isEqualTo(AccessModifierOption.PACKAGE);
+224 }
+225
+226 @Test
+227 public void testGetFirstNode() throws Exception {
+228 final DetailAST classDef = getNodeFromFile(TokenTypes.CLASS_DEF);
+229
+230 final DetailAST firstChild = classDef.getFirstChild().getFirstChild();
+231 final DetailAST firstNode = CheckUtil.getFirstNode(classDef);
+232 assertWithMessage("Invalid first node" )
+233 .that(firstNode)
+234 .isEqualTo(firstChild);
+235 }
+236
+237 @Test
+238 public void testGetFirstNode1() {
+239 final DetailAstImpl child = new DetailAstImpl();
+240 child.setLineNo(5);
+241 child.setColumnNo(6);
+242
+243 final DetailAstImpl root = new DetailAstImpl();
+244 root.setLineNo(5);
+245 root.setColumnNo(6);
+246
+247 root.addChild(child);
+248
+249 final DetailAST firstNode = CheckUtil.getFirstNode(root);
+250 assertWithMessage("Unexpected node" )
+251 .that(firstNode)
+252 .isEqualTo(root);
+253 }
+254
+255 @Test
+256 public void testGetFirstNode2() {
+257 final DetailAstImpl child = new DetailAstImpl();
+258 child.setLineNo(6);
+259 child.setColumnNo(5);
+260
+261 final DetailAstImpl root = new DetailAstImpl();
+262 root.setLineNo(5);
+263 root.setColumnNo(6);
+264
+265 root.addChild(child);
266
-267 @Test
-268 public void testGetFirstNode1() {
-269 final DetailAstImpl child = new DetailAstImpl();
-270 child.setLineNo(5);
-271 child.setColumnNo(6);
+267 final DetailAST firstNode = CheckUtil.getFirstNode(root);
+268 assertWithMessage("Unexpected node" )
+269 .that(firstNode)
+270 .isEqualTo(root);
+271 }
272
-273 final DetailAstImpl root = new DetailAstImpl();
-274 root.setLineNo(5);
-275 root.setColumnNo(6);
-276
-277 root.addChild(child);
-278
-279 final DetailAST firstNode = CheckUtil.getFirstNode(root);
-280 assertWithMessage("Unexpected node" )
-281 .that(firstNode)
-282 .isEqualTo(root);
-283 }
-284
-285 @Test
-286 public void testGetFirstNode2() {
-287 final DetailAstImpl child = new DetailAstImpl();
-288 child.setLineNo(6);
-289 child.setColumnNo(5);
-290
-291 final DetailAstImpl root = new DetailAstImpl();
-292 root.setLineNo(5);
-293 root.setColumnNo(6);
+273 @Test
+274 public void testParseDoubleFloatingPointValues() {
+275 assertWithMessage("Invalid parse result" )
+276 .that(CheckUtil.parseDouble("-0.05f" , TokenTypes.NUM_FLOAT))
+277 .isEqualTo(-0.05);
+278 assertWithMessage("Invalid parse result" )
+279 .that(CheckUtil.parseDouble("10.0" , TokenTypes.NUM_DOUBLE))
+280 .isEqualTo(10.0);
+281 assertWithMessage("Invalid parse result" )
+282 .that(CheckUtil.parseDouble("1.23e3" , TokenTypes.NUM_DOUBLE))
+283 .isEqualTo(1230);
+284 assertWithMessage("Invalid parse result" )
+285 .that(CheckUtil.parseDouble("-3.21E2" , TokenTypes.NUM_DOUBLE))
+286 .isEqualTo(-321);
+287 assertWithMessage("Invalid parse result" )
+288 .that(CheckUtil.parseDouble("-0.0" , TokenTypes.NUM_DOUBLE))
+289 .isEqualTo(-0.0);
+290 assertWithMessage("Invalid parse result" )
+291 .that(CheckUtil.parseDouble("NaN" , TokenTypes.NUM_DOUBLE))
+292 .isEqualTo(Double.NaN);
+293 }
294
-295 root.addChild(child);
-296
-297 final DetailAST firstNode = CheckUtil.getFirstNode(root);
-298 assertWithMessage("Unexpected node" )
-299 .that(firstNode)
-300 .isEqualTo(root);
-301 }
-302
-303 @Test
-304 public void testParseDoubleFloatingPointValues() {
-305 assertWithMessage("Invalid parse result" )
-306 .that(CheckUtil.parseDouble("-0.05f" , TokenTypes.NUM_FLOAT))
-307 .isEqualTo(-0.05);
-308 assertWithMessage("Invalid parse result" )
-309 .that(CheckUtil.parseDouble("10.0" , TokenTypes.NUM_DOUBLE))
-310 .isEqualTo(10.0);
-311 assertWithMessage("Invalid parse result" )
-312 .that(CheckUtil.parseDouble("1.23e3" , TokenTypes.NUM_DOUBLE))
-313 .isEqualTo(1230);
-314 assertWithMessage("Invalid parse result" )
-315 .that(CheckUtil.parseDouble("-3.21E2" , TokenTypes.NUM_DOUBLE))
-316 .isEqualTo(-321);
-317 assertWithMessage("Invalid parse result" )
-318 .that(CheckUtil.parseDouble("-0.0" , TokenTypes.NUM_DOUBLE))
-319 .isEqualTo(-0.0);
-320 assertWithMessage("Invalid parse result" )
-321 .that(CheckUtil.parseDouble("NaN" , TokenTypes.NUM_DOUBLE))
-322 .isEqualTo(Double.NaN);
-323 }
-324
-325 @Test
-326 public void testParseDoubleIntegerValues() {
+295 @Test
+296 public void testParseDoubleIntegerValues() {
+297 assertWithMessage("Invalid parse result" )
+298 .that(CheckUtil.parseDouble("0L" , TokenTypes.NUM_LONG))
+299 .isEqualTo(0.0);
+300 assertWithMessage("Invalid parse result" )
+301 .that(CheckUtil.parseDouble("0B101" , TokenTypes.NUM_INT))
+302 .isEqualTo(0b101);
+303 assertWithMessage("Invalid parse result" )
+304 .that(CheckUtil.parseDouble("0b10001010001011010000101000101L" , TokenTypes.NUM_LONG))
+305 .isEqualTo(289_775_941);
+306 assertWithMessage("Invalid parse result" )
+307 .that(CheckUtil.parseDouble("1" , TokenTypes.NUM_INT))
+308 .isEqualTo(1.0);
+309 assertWithMessage("Invalid parse result" )
+310 .that(CheckUtil.parseDouble("8L" , TokenTypes.NUM_LONG))
+311 .isEqualTo(8.0);
+312 assertWithMessage("Invalid parse result" )
+313 .that(CheckUtil.parseDouble("-21474836480" , TokenTypes.NUM_LONG))
+314 .isEqualTo(-2.147_483_648E10);
+315 assertWithMessage("Invalid parse result" )
+316 .that(CheckUtil.parseDouble("-2" , TokenTypes.NUM_INT))
+317 .isEqualTo(-2);
+318 assertWithMessage("Invalid parse result" )
+319 .that(CheckUtil.parseDouble("0xffffffff" , TokenTypes.NUM_INT))
+320 .isEqualTo(-1);
+321 assertWithMessage("Invalid parse result" )
+322 .that(CheckUtil.parseDouble("0x0B63" , TokenTypes.NUM_INT))
+323 .isEqualTo(2915.0);
+324 assertWithMessage("Invalid parse result" )
+325 .that(CheckUtil.parseDouble("21474836470" , TokenTypes.NUM_LONG))
+326 .isEqualTo(2.147_483_647E10);
327 assertWithMessage("Invalid parse result" )
-328 .that(CheckUtil.parseDouble("0L" , TokenTypes.NUM_LONG))
-329 .isEqualTo(0.0);
-330 assertWithMessage("Invalid parse result" )
-331 .that(CheckUtil.parseDouble("0B101" , TokenTypes.NUM_INT))
-332 .isEqualTo(0b101);
-333 assertWithMessage("Invalid parse result" )
-334 .that(CheckUtil.parseDouble("0b10001010001011010000101000101L" , TokenTypes.NUM_LONG))
-335 .isEqualTo(289_775_941);
-336 assertWithMessage("Invalid parse result" )
-337 .that(CheckUtil.parseDouble("1" , TokenTypes.NUM_INT))
-338 .isEqualTo(1.0);
-339 assertWithMessage("Invalid parse result" )
-340 .that(CheckUtil.parseDouble("8L" , TokenTypes.NUM_LONG))
-341 .isEqualTo(8.0);
-342 assertWithMessage("Invalid parse result" )
-343 .that(CheckUtil.parseDouble("-21474836480" , TokenTypes.NUM_LONG))
-344 .isEqualTo(-2.147_483_648E10);
-345 assertWithMessage("Invalid parse result" )
-346 .that(CheckUtil.parseDouble("-2" , TokenTypes.NUM_INT))
-347 .isEqualTo(-2);
-348 assertWithMessage("Invalid parse result" )
-349 .that(CheckUtil.parseDouble("0xffffffff" , TokenTypes.NUM_INT))
-350 .isEqualTo(-1);
-351 assertWithMessage("Invalid parse result" )
-352 .that(CheckUtil.parseDouble("0x0B63" , TokenTypes.NUM_INT))
-353 .isEqualTo(2915.0);
-354 assertWithMessage("Invalid parse result" )
-355 .that(CheckUtil.parseDouble("21474836470" , TokenTypes.NUM_LONG))
-356 .isEqualTo(2.147_483_647E10);
-357 assertWithMessage("Invalid parse result" )
-358 .that(CheckUtil.parseDouble("073l" , TokenTypes.NUM_LONG))
-359 .isEqualTo(59.0);
-360 }
-361
-362 @Test
-363 public void testParseClassNames() {
-364 final Set<String> actual = CheckUtil.parseClassNames(
-365 "I.am.class.name.with.dot.in.the.end." , "ClassOnly" , "my.Class" );
-366 final Set<String> expected = new HashSet<>();
-367 expected.add("I.am.class.name.with.dot.in.the.end." );
-368 expected.add("ClassOnly" );
-369 expected.add("my.Class" );
-370 expected.add("Class" );
-371 assertWithMessage("Result is not expected" )
-372 .that(actual)
-373 .isEqualTo(expected);
-374 }
-375
-376 @Test
-377 public void testEqualsAvoidNullCheck() throws Exception {
-378
-379 final String[] expected = {
-380 "14:28: " + getCheckMessage(EqualsAvoidNullCheck.class , MSG_EQUALS_AVOID_NULL),
-381 "21:17: " + getCheckMessage(EqualsAvoidNullCheck.class , MSG_EQUALS_AVOID_NULL),
-382 };
-383 verifyWithInlineConfigParser(
-384 getPath("InputCheckUtil1.java" ), expected);
-385 }
-386
-387 @Test
-388 public void testMultipleVariableDeclarationsCheck() throws Exception {
-389 final String[] expected = {
-390 "11:5: " + getCheckMessage(MultipleVariableDeclarationsCheck.class , MSG_MULTIPLE),
-391 "14:5: " + getCheckMessage(MultipleVariableDeclarationsCheck.class , MSG_MULTIPLE),
-392 };
-393 verifyWithInlineConfigParser(
-394 getPath("InputCheckUtil2.java" ),
-395 expected);
-396 }
-397
-398 @Test
-399 public void testNestedIfDepth() throws Exception {
-400 final String[] expected = {
-401 "26:17: " + getCheckMessage(NestedIfDepthCheck.class , MSG_KEY, 2, 1),
-402 "52:17: " + getCheckMessage(NestedIfDepthCheck.class , MSG_KEY, 2, 1),
-403 };
-404 verifyWithInlineConfigParser(
-405 getPath("InputCheckUtil3.java" ), expected);
-406 }
-407
-408 @Test
-409 public void testJavaDocMethod() throws Exception {
-410 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
-411 verifyWithInlineConfigParser(
-412 getPath("InputCheckUtil4.java" ), expected);
-413 }
-414
-415 @Test
-416 public void testJavaDocMethod2() throws Exception {
-417 final String[] expected = {
-418 "14:25: " + getCheckMessage(JavadocMethodCheck.class ,
-419 MSG_EXPECTED_TAG, "@param" , "i" ),
-420 };
-421 verifyWithInlineConfigParser(
-422 getPath("InputCheckUtil5.java" ), expected);
-423 }
-424
-425 @Test
-426 public void testSetterGetterOn() throws Exception {
-427 final String[] expected = {
-428 "20:5: " + getCheckMessage(MissingJavadocMethodCheck.class ,
-429 MSG_JAVADOC_MISSING),
-430 "24:5: " + getCheckMessage(MissingJavadocMethodCheck.class ,
-431 MSG_JAVADOC_MISSING),
-432 "29:5: " + getCheckMessage(MissingJavadocMethodCheck.class ,
-433 MSG_JAVADOC_MISSING),
-434 };
-435 verifyWithInlineConfigParser(
-436 getPath("InputCheckUtil9.java" ), expected);
-437 }
-438
-439 @Test
-440 public void missingJavadoc() throws Exception {
-441 final String[] expected = {
-442 "13:5: " + getCheckMessage(MissingJavadocMethodCheck.class , MSG_JAVADOC_MISSING),
-443 };
-444 verifyWithInlineConfigParser(
-445 getNonCompilablePath("InputCheckUtil1.java" ), expected);
-446 }
-447
-448 @Test
-449 public void testJavadoc() throws Exception {
-450 final String[] expected = {
-451 "25:39: " + getCheckMessage(JavadocMethodCheck.class ,
-452 MSG_EXPECTED_TAG, "@param" , "i" ),
-453 };
-454 verifyWithInlineConfigParser(
-455 getPath("InputCheckUtil7.java" ), expected);
-456 }
-457
-458 private DetailAST getNodeFromFile(int type) throws Exception {
-459 return getNode(JavaParser.parseFile(new File(getPath("InputCheckUtilTest.java" )),
-460 JavaParser.Options.WITH_COMMENTS), type);
-461 }
-462
-463 private static DetailAST getNode(DetailAST root, int type) {
-464 final Optional<DetailAST> node = findTokenInAstByPredicate(root,
-465 ast -> ast.getType() == type);
-466
-467 assertWithMessage("Cannot find node of specified type: %s" , type)
-468 .that(node.isPresent())
-469 .isTrue();
-470
-471 return node.get();
-472 }
-473
-474 }
+328 .that(CheckUtil.parseDouble("073l" , TokenTypes.NUM_LONG))
+329 .isEqualTo(59.0);
+330 }
+331
+332 @Test
+333 public void testParseClassNames() {
+334 final Set<String> actual = CheckUtil.parseClassNames(
+335 "I.am.class.name.with.dot.in.the.end." , "ClassOnly" , "my.Class" );
+336 final Set<String> expected = new HashSet<>();
+337 expected.add("I.am.class.name.with.dot.in.the.end." );
+338 expected.add("ClassOnly" );
+339 expected.add("my.Class" );
+340 expected.add("Class" );
+341 assertWithMessage("Result is not expected" )
+342 .that(actual)
+343 .isEqualTo(expected);
+344 }
+345
+346 @Test
+347 public void testEqualsAvoidNullCheck() throws Exception {
+348
+349 final String[] expected = {
+350 "14:28: " + getCheckMessage(EqualsAvoidNullCheck.class , MSG_EQUALS_AVOID_NULL),
+351 "21:17: " + getCheckMessage(EqualsAvoidNullCheck.class , MSG_EQUALS_AVOID_NULL),
+352 };
+353 verifyWithInlineConfigParser(
+354 getPath("InputCheckUtil1.java" ), expected);
+355 }
+356
+357 @Test
+358 public void testMultipleVariableDeclarationsCheck() throws Exception {
+359 final String[] expected = {
+360 "11:5: " + getCheckMessage(MultipleVariableDeclarationsCheck.class , MSG_MULTIPLE),
+361 "14:5: " + getCheckMessage(MultipleVariableDeclarationsCheck.class , MSG_MULTIPLE),
+362 };
+363 verifyWithInlineConfigParser(
+364 getPath("InputCheckUtil2.java" ),
+365 expected);
+366 }
+367
+368 @Test
+369 public void testNestedIfDepth() throws Exception {
+370 final String[] expected = {
+371 "26:17: " + getCheckMessage(NestedIfDepthCheck.class , MSG_KEY, 2, 1),
+372 "52:17: " + getCheckMessage(NestedIfDepthCheck.class , MSG_KEY, 2, 1),
+373 };
+374 verifyWithInlineConfigParser(
+375 getPath("InputCheckUtil3.java" ), expected);
+376 }
+377
+378 @Test
+379 public void testJavaDocMethod() throws Exception {
+380 final String[] expected = CommonUtil.EMPTY_STRING_ARRAY;
+381 verifyWithInlineConfigParser(
+382 getPath("InputCheckUtil4.java" ), expected);
+383 }
+384
+385 @Test
+386 public void testJavaDocMethod2() throws Exception {
+387 final String[] expected = {
+388 "14:25: " + getCheckMessage(JavadocMethodCheck.class ,
+389 MSG_EXPECTED_TAG, "@param" , "i" ),
+390 };
+391 verifyWithInlineConfigParser(
+392 getPath("InputCheckUtil5.java" ), expected);
+393 }
+394
+395 @Test
+396 public void testJavadoc() throws Exception {
+397 final String[] expected = {
+398 "25:39: " + getCheckMessage(JavadocMethodCheck.class ,
+399 MSG_EXPECTED_TAG, "@param" , "i" ),
+400 };
+401 verifyWithInlineConfigParser(
+402 getPath("InputCheckUtil7.java" ), expected);
+403 }
+404
+405 private DetailAST getNodeFromFile(int type) throws Exception {
+406 return getNode(JavaParser.parseFile(new File(getPath("InputCheckUtilTest.java" )),
+407 JavaParser.Options.WITH_COMMENTS), type);
+408 }
+409
+410
+411
+412
+413
+414
+415
+416
+417
+418
+419 public static DetailAST getNode(File file, int type) throws Exception {
+420 return getNode(JavaParser.parseFile(file, JavaParser.Options.WITH_COMMENTS), type);
+421 }
+422
+423 private static DetailAST getNode(DetailAST root, int type) {
+424 final Optional<DetailAST> node = findTokenInAstByPredicate(root,
+425 ast -> ast.getType() == type);
+426
+427 assertWithMessage("Cannot find node of specified type: %s" , type)
+428 .that(node.isPresent())
+429 .isTrue();
+430
+431 return node.get();
+432 }
+433 }
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/annotationutil/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/utils/annotationutil/package-frame.html
index 14841d2c8b..8cda05b4cd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/annotationutil/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/utils/annotationutil/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.utils.annotationutil
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.utils.annotationutil
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/annotationutil/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/utils/annotationutil/package-summary.html
index 7314a9b005..f05bd6108c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/annotationutil/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/utils/annotationutil/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.utils.annotationutil
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.utils.annotationutil
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.utils.
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/annotation/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/annotation/package-frame.html
index 9fad9dae8b..3c3886bdd3 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/annotation/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/annotation/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.utils.blockcommentposition.inputs.annotation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.utils.blockcommentposition.inputs.annotation
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/annotation/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/annotation/package-summary.html
index db97c7eceb..6c5f41ebc7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/annotation/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/annotation/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.utils.blockcommentposition.inputs.annotation
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.utils.blockcommentposition.inputs.annotation
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.utils.
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/normal/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/normal/package-frame.html
index 263805c25b..84066c3d38 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/normal/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/normal/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.utils.blockcommentposition.inputs.normal
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.utils.blockcommentposition.inputs.normal
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/normal/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/normal/package-summary.html
index 88eb2a5171..f972b2d4c2 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/normal/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/inputs/normal/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.utils.blockcommentposition.inputs.normal
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.utils.blockcommentposition.inputs.normal
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -76,7 +76,7 @@ Package com.puppycrawl.tools.checkstyle.utils.
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/package-frame.html
index d02ce50d91..be05ae4e64 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.utils.blockcommentposition
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.utils.blockcommentposition
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/package-summary.html
index 14d7ea51ca..41e66467a9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/utils/blockcommentposition/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.utils.blockcommentposition
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.utils.blockcommentposition
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -161,7 +161,7 @@ Package com.puppycrawl.tools.checkstyle.utils.
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/checkutil/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/utils/checkutil/package-frame.html
index c5603f3614..b6cc61719c 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/checkutil/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/utils/checkutil/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.utils.checkutil
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.utils.checkutil
@@ -35,9 +35,6 @@ Classes
InputCheckUtil7.TestException3
-
-
- InputCheckUtil9
InputCheckUtilPackage
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/checkutil/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/utils/checkutil/package-summary.html
index 04cc2deac3..529b291d5e 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/checkutil/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/utils/checkutil/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.utils.checkutil
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.utils.checkutil
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -97,21 +97,16 @@ Package com.puppycrawl.tools.checkstyle.utils.
-
- InputCheckUtil9
-
-
-
InputCheckUtilPackage
-
+
InputCheckUtilTest
-
+
InputCheckUtilTest.Example
@@ -136,7 +131,7 @@ Package com.puppycrawl.tools.checkstyle.utils.
Index
Help
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/utils/package-frame.html
index 37b7eeeda4..63c001547f 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/utils/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.utils
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.utils
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/utils/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/utils/package-summary.html
index ecaac3ce70..f43c82c236 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/utils/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/utils/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.utils
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.utils
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -211,7 +211,7 @@ Package com.puppycrawl.tools.checkstyle.utils<
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/xpath/iterators/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/xpath/iterators/package-frame.html
index 635c9ce72c..c9df47f956 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/xpath/iterators/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/xpath/iterators/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.xpath.iterators
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.xpath.iterators
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/xpath/iterators/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/xpath/iterators/package-summary.html
index 3612e82468..6c844f359b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/xpath/iterators/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/xpath/iterators/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.xpath.iterators
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.xpath.iterators
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.checkstyle.xpath.
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/xpath/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/xpath/package-frame.html
index 9288222503..6e902c8e1b 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/xpath/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/xpath/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.xpath
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.xpath
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/xpath/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/xpath/package-summary.html
index 69f9493bde..0ef272a79a 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/xpath/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/xpath/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.xpath
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.xpath
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -101,7 +101,7 @@ Package com.puppycrawl.tools.checkstyle.xpath<
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathmapper/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathmapper/package-frame.html
index ac4fe27ee0..99985dfdfd 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathmapper/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathmapper/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.xpath.xpathmapper
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.xpath.xpathmapper
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathmapper/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathmapper/package-summary.html
index 13c27c0827..80ccd26d93 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathmapper/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathmapper/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.xpath.xpathmapper
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.xpath.xpathmapper
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -116,7 +116,7 @@ Package com.puppycrawl.tools.checkstyle.xpath.
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathquerygenerator/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathquerygenerator/package-frame.html
index 20ed1f5f93..dd42de9554 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathquerygenerator/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathquerygenerator/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.xpath.xpathquerygenerator
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.xpath.xpathquerygenerator
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathquerygenerator/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathquerygenerator/package-summary.html
index ceb94267b6..6d9eab5992 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathquerygenerator/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/xpath/xpathquerygenerator/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.xpath.xpathquerygenerator
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.xpath.xpathquerygenerator
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -111,7 +111,7 @@ Package com.puppycrawl.tools.checkstyle.xpath.
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorastfilter/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorastfilter/package-frame.html
index 24c2588d62..5dae72bebc 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorastfilter/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorastfilter/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.xpathfilegeneratorastfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.xpathfilegeneratorastfilter
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorastfilter/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorastfilter/package-summary.html
index 127646c53c..2ac4311861 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorastfilter/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorastfilter/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.xpathfilegeneratorastfilter
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.xpathfilegeneratorastfilter
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.xpathf
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorauditlistener/package-frame.html b/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorauditlistener/package-frame.html
index 02b380d8c0..dcfcc558b7 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorauditlistener/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorauditlistener/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.xpathfilegeneratorauditlistener
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.xpathfilegeneratorauditlistener
diff --git a/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorauditlistener/package-summary.html b/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorauditlistener/package-summary.html
index 56c96567f8..71f54d86f9 100644
--- a/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorauditlistener/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/checkstyle/xpathfilegeneratorauditlistener/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.checkstyle.xpathfilegeneratorauditlistener
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.checkstyle.xpathfilegeneratorauditlistener
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.puppycrawl.tools.checkstyle.xpathf
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/puppycrawl/tools/package-frame.html b/xref-test/com/puppycrawl/tools/package-frame.html
index e7f658be80..d8fd021d83 100644
--- a/xref-test/com/puppycrawl/tools/package-frame.html
+++ b/xref-test/com/puppycrawl/tools/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.
diff --git a/xref-test/com/puppycrawl/tools/package-summary.html b/xref-test/com/puppycrawl/tools/package-summary.html
index 8c972ad09b..e5ec9e81c7 100644
--- a/xref-test/com/puppycrawl/tools/package-summary.html
+++ b/xref-test/com/puppycrawl/tools/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.puppycrawl.tools.
+ checkstyle 10.12.4 Reference Package com.puppycrawl.tools.
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -106,7 +106,7 @@ Package com.puppycrawl.tools.
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/sun/checkstyle/test/base/package-frame.html b/xref-test/com/sun/checkstyle/test/base/package-frame.html
index 38b427b435..4d30050390 100644
--- a/xref-test/com/sun/checkstyle/test/base/package-frame.html
+++ b/xref-test/com/sun/checkstyle/test/base/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.sun.checkstyle.test.base
+ checkstyle 10.12.4 Reference Package com.sun.checkstyle.test.base
diff --git a/xref-test/com/sun/checkstyle/test/base/package-summary.html b/xref-test/com/sun/checkstyle/test/base/package-summary.html
index 20e522c630..d83355bc3d 100644
--- a/xref-test/com/sun/checkstyle/test/base/package-summary.html
+++ b/xref-test/com/sun/checkstyle/test/base/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.sun.checkstyle.test.base
+ checkstyle 10.12.4 Reference Package com.sun.checkstyle.test.base
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -81,7 +81,7 @@ Package com.sun.checkstyle.test.base
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/sun/checkstyle/test/chapter5comments/rule52documentationcomments/package-frame.html b/xref-test/com/sun/checkstyle/test/chapter5comments/rule52documentationcomments/package-frame.html
index d260a47802..97bf3d8b0a 100644
--- a/xref-test/com/sun/checkstyle/test/chapter5comments/rule52documentationcomments/package-frame.html
+++ b/xref-test/com/sun/checkstyle/test/chapter5comments/rule52documentationcomments/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.sun.checkstyle.test.chapter5comments.rule52documentationcomments
+ checkstyle 10.12.4 Reference Package com.sun.checkstyle.test.chapter5comments.rule52documentationcomments
diff --git a/xref-test/com/sun/checkstyle/test/chapter5comments/rule52documentationcomments/package-summary.html b/xref-test/com/sun/checkstyle/test/chapter5comments/rule52documentationcomments/package-summary.html
index 7052a4fe9a..c6bc82ca9a 100644
--- a/xref-test/com/sun/checkstyle/test/chapter5comments/rule52documentationcomments/package-summary.html
+++ b/xref-test/com/sun/checkstyle/test/chapter5comments/rule52documentationcomments/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.sun.checkstyle.test.chapter5comments.rule52documentationcomments
+ checkstyle 10.12.4 Reference Package com.sun.checkstyle.test.chapter5comments.rule52documentationcomments
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -111,7 +111,7 @@ Package com.sun.checkstyle.test.chapter5commen
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/com/sun/checkstyle/test/chapter6declarations/rule61numberperline/package-frame.html b/xref-test/com/sun/checkstyle/test/chapter6declarations/rule61numberperline/package-frame.html
index 175619c659..73ba4555ae 100644
--- a/xref-test/com/sun/checkstyle/test/chapter6declarations/rule61numberperline/package-frame.html
+++ b/xref-test/com/sun/checkstyle/test/chapter6declarations/rule61numberperline/package-frame.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.sun.checkstyle.test.chapter6declarations.rule61numberperline
+ checkstyle 10.12.4 Reference Package com.sun.checkstyle.test.chapter6declarations.rule61numberperline
diff --git a/xref-test/com/sun/checkstyle/test/chapter6declarations/rule61numberperline/package-summary.html b/xref-test/com/sun/checkstyle/test/chapter6declarations/rule61numberperline/package-summary.html
index f9f39217f7..ab0849e99a 100644
--- a/xref-test/com/sun/checkstyle/test/chapter6declarations/rule61numberperline/package-summary.html
+++ b/xref-test/com/sun/checkstyle/test/chapter6declarations/rule61numberperline/package-summary.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference Package com.sun.checkstyle.test.chapter6declarations.rule61numberperline
+ checkstyle 10.12.4 Reference Package com.sun.checkstyle.test.chapter6declarations.rule61numberperline
@@ -23,7 +23,7 @@
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
@@ -96,7 +96,7 @@ Package com.sun.checkstyle.test.chapter6declar
Index
Help
-
checkstyle 10.12.3 Reference
+
checkstyle 10.12.4 Reference
diff --git a/xref-test/index.html b/xref-test/index.html
index 3c95088150..fe02203d82 100644
--- a/xref-test/index.html
+++ b/xref-test/index.html
@@ -4,7 +4,7 @@
- checkstyle 10.12.3 Reference
+ checkstyle 10.12.4 Reference