Re: perl checking - Mailing list pgsql-hackers

From Kyotaro HORIGUCHI
Subject Re: perl checking
Date
Msg-id 20180522.171144.119792758.horiguchi.kyotaro@lab.ntt.co.jp
Whole thread Raw
In response to perl checking  (Andrew Dunstan <andrew.dunstan@2ndquadrant.com>)
Responses Re: perl checking  (Andrew Dunstan <andrew.dunstan@2ndquadrant.com>)
List pgsql-hackers
At Fri, 18 May 2018 14:02:39 -0400, Andrew Dunstan <andrew.dunstan@2ndquadrant.com> wrote in
<5a6d6de8-cff8-1ffb-946c-ccf381800ea1@2ndQuadrant.com>
> 
> These two small patches allow us to run "perl -cw" cleanly on all our
> perl code.
> 
> 
> One patch silences a warning from convutils.pl about the unportability
> of the literal 0x100000000. We've run for many years without this
> giving us a problem, so I think we can turn the warning off pretty
> safely.

It was introduced by aeed17d000 (in 2017). The history of the
file is rather short. Over 32-bit values do not apperar as a
character so there's no problem in ignoring the warning for now,
but can't we use bigint to silence it instead?

> The other patch provides a dummy library that emulates just enough of
> the Win32 perl infrastructure to allow us to run these checks. That
> means that Unix-based developers who might want to make changes in the
> msvc code can actually run a check against their code without having
> to put it on a Windows machine. The invocation goes like this (to
> check Mkvcbuild.pl for example):
> 
> 
>    PERL5LIB=src/tools/msvc/dummylib perl -cw src/tools/Mkvcbuild.pm
> 
> 
> This also allows us to check src/tools/win32tzlist.pl.
> 
> 
> In due course I'll submit a script to automate this syntax checking.
> 
> 
> cheers
> 
> 
> andrew

regards.

-- 
Kyotaro Horiguchi
NTT Open Source Software Center



pgsql-hackers by date:

Previous
From: Kyotaro HORIGUCHI
Date:
Subject: Re: Fix some error handling for read() and errno
Next
From: Michael Paquier
Date:
Subject: Re: SCRAM with channel binding downgrade attack