1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
|
////////////////////////////////////////////////////////////////////////////////
//
// The Loki Library
// Copyright (c) 2008 Rich Sposato
// The copyright on this file is protected under the terms of the MIT license.
//
// Permission to use, copy, modify, distribute and sell this software for any
// purpose is hereby granted without fee, provided that the above copyright
// notice appear in all copies and that both that copyright notice and this
// permission notice appear in supporting documentation.
//
// The author makes no representations about the suitability of this software
// for any purpose. It is provided "as is" without express or implied warranty.
//
////////////////////////////////////////////////////////////////////////////////
// $Id$
/// @file Checker.h This file provides Loki's Checker facility.
// ----------------------------------------------------------------------------
#ifndef LOKI_CHECKER_H_INCLUDED
#define LOKI_CHECKER_H_INCLUDED
#include <exception> // needed for calls to uncaught_exception.
#include <assert.h>
namespace Loki
{
/** @par ContractChecker and StaticChecker Overview
The ContractChecker and StaticChecker classes have two purposes:
- provide a mechanism by which programmers can determine which functions
violate class/data invariants,
- and determine which exception safety a function provides.
@par Class & Data Invariants
The ContractChecker and StaticChecker define invariants as "expressions that
are true for particular data". They uses a function which returns true if all
data are valid, and returns false if any datum is invalid. This is called the
validator function, and the host class or function provides a pointer to it.
The validator could also assert for any invariant which fails rather than
return false. If the validator is a static member function, you can use it
with checkers in any function, but especially standalone functions and class
static functions. If the validator is a non-static member function, you can
use it only within non-static member functions.
@par Exception Safety Levels
Years ago, David Abrahams formalized a framework for assessing the exception
safety level a function provides. His framework describes three levels of
guarantees. Any function which does not provide any of these levels is
considered unsafe. ContractChecker and StaticChecker determine a function's
safety level through the use of policy classes. Checker's policy classes can
show if a function provides any of these three guarantees. Since there is no
universal way to detect leaks, this facility provides no mechanism for finding
leaks, but users may create their own validators which do. StaticChecker's
policy classes only provide direct checking for the no-throw and invariant
guarantees. With some finesse, a programmer can write a validator for
StaticChecker that checks for the Strong guarantee.
- No-throw guarantee: A function will not throw any exceptions.
- Strong guarantee: A function will not change data if an exception occurs.
(Which I call the no-change guarantee.)
- Basic guarantee: A function will not leak resources and data will remain
in a valid state if an exception occurs. (Which I call either the no-leak
or no-break guarantee depending on context.)
*/
// ----------------------------------------------------------------------------
/** @class CheckForNoThrow
@par Exception Safety Level:
This exception-checking policy class for ContractChecker asserts if an
exception exists. Host classes can use this to show that a member function
provides the no-throw exception safety guarantees.
@par Requirements For Host Class:
This policy imposes no requirements on a host class.
*/
template < class Host >
class CheckForNoThrow
{
public:
inline explicit CheckForNoThrow( const Host * ) {}
inline bool Check( const Host * ) const
{
const bool okay = ( !::std::uncaught_exception() );
assert( okay );
return okay;
}
};
// ----------------------------------------------------------------------------
/** @class CheckForNoChange
@par Exception Safety Level:
This exception-checking policy class for ContractChecker asserts only if a
copy of the host differs from the host object when an exception occurs. Host
classes can use this policy to show which member functions provide the strong
exception guarantee.
@par Requirements:
This policy requires hosts to provide both the copy-constructor and the
equality operator, and is intended for classes with value semantics.
equality operator.
*/
template < class Host >
class CheckForNoChange
{
public:
inline explicit CheckForNoChange( const Host * host ) :
m_compare( *host ) {}
inline bool Check( const Host * host ) const
{
const bool okay = ( !::std::uncaught_exception() )
|| ( m_compare == *host );
assert( okay );
return okay;
}
private:
Host m_compare;
};
// ----------------------------------------------------------------------------
/** @class CheckForNoChangeOrThrow
@par Exception Safety Level:
This exception-checking policy class for ContractChecker asserts either if a
copy of the host differs from the original host object, or if an exception
occurs. Host classes can use this policy to show which member functions provide
the no-throw exception guarantee, and would never change data anyway.
@par Requirements For Host Class:
This policy requires hosts to provide both the copy-constructor and the
equality operator, and is intended for classes with value semantics.
*/
template < class Host >
class CheckForNoChangeOrThrow
{
public:
inline explicit CheckForNoChangeOrThrow( const Host * host ) :
m_compare( *host ) {}
inline bool Check( const Host * host ) const
{
bool okay = ( !::std::uncaught_exception() );
assert( okay );
okay = ( m_compare == *host );
assert( okay );
return okay;
}
private:
Host m_compare;
};
// ----------------------------------------------------------------------------
/** @class CheckForEquality
@par Exception Safety Level:
This exception-checking policy class for ContractChecker asserts if a copy of the host differs from the host object regardless of whether an exception occurs.
Host classes can use this policy to show which member functions never change
data members, and thereby provide the strong exception safety level by default.
@par Requirements For Host Class:
This policy requires hosts to provide both the copy-constructor and the
equality operator, and is intended for classes with value semantics.
*/
template < class Host >
class CheckForEquality
{
public:
inline explicit CheckForEquality( const Host * host ) :
m_compare( *host ) {}
inline bool Check( const Host * host ) const
{
const bool okay = ( m_compare == *host );
assert( okay );
return okay;
}
private:
Host m_compare;
};
// ----------------------------------------------------------------------------
/** @class CheckForNothing
@par Exception Safety Level:
This exception-checking policy class for ContractChecker does nothing when
called. Host classes can use this to show which member functions provide
neither the strong nor no-throw exception guarantees. The best guarantee such
functions can provide is that nothing gets leaked.
@par Requirements For Host Class:
This policy imposes no requirements on a host class.
*/
template < class Host >
class CheckForNothing
{
public:
inline explicit CheckForNothing( const Host * ) {}
inline bool Check( const Host * ) const { return true; }
};
// ----------------------------------------------------------------------------
/** @class ContractChecker
This class determines if a function violated any class invariant, but it also
determines if a function fulfills its contract with client code. In the
"Design by Contract" paradigm, each function has certain pre-conditions and
post-conditions which may differ from the class invariants. This asserts if a
check for an invariant fails as well as if any pre- or post-condition fails.
It also demonstrate which exception safety level a function provides.
@par Usage
-# Implement a function that checks each class invariant. The function must
have the signature similar to the Validator type. Something like:
"bool Host::IsValid( void ) const;"
- The function should return true if everything is okay, but false if
something is wrong.
- Or it could assert if anything is wrong.
- Ideally, it should be private.
-# Implement similar functions to check for pre-conditions and post-conditions.
Functions which verify pre-conditions and post-conditions do not need to
check all class invariants, just conditions specific to certain public
functions in the host class.
-# Declare some typedef's inside the class declaration like these. Make one
typedef for each exception policy you use. I typedef'ed the CheckForNothing
policy as CheckInvariants because even if a function can't provide either the
no-throw nor the no-change policies, it should still make sure the object
remains in a valid state.
- typedef ::Loki::ContractChecker< Host, ::Loki::CheckForNoThrow > CheckForNoThrow;
- typedef ::Loki::ContractChecker< Host, ::Loki::CheckForNoChange > CheckForNoChange;
- typedef ::Loki::ContractChecker< Host, ::Loki::CheckForEquality > CheckForEquality;
- typedef ::Loki::ContractChecker< Host, ::Loki::CheckForNothing > CheckInvariants;
-# Construct a checker near the top of each member function - except in the
validator member function. Pass the this pointer and the address of your
validator function into the checker's constructor. You may also pass in pointers
to function which check pre- and post-conditions.
- If the function never throws, then use the CheckForNoThrow policy.
- If the function never changes any data members, then use CheckForEquality
policy.
- If the function's normal execution flow changes data, but must make sure
data remains unchanged when any exceptions occur, then use the
CheckForNoChange policy.
- Otherwise use the CheckInvariants policy.
-# Recompile a debug version of your program, run the program and all the unit
tests, and look for which assertions failed.
*/
template
<
class Host,
template < class > class ExceptionPolicy
>
class ContractChecker : public ExceptionPolicy< Host >
{
/// Shorthand for the ExceptionPolicy class.
typedef ExceptionPolicy< Host > Ep;
public:
/// Signature for the validation function.
typedef bool ( Host:: * Validator )( void ) const;
/** The constructor makes sure the host is valid at the time the checker
was created, thus insuring the host object was not corrupt from the start.
@par host Pointer to host object.
@par validator Pointer to function that checks class invariants.
@par pre Optional pointer to function that checks pre-conditions.
@par post Optional pointer to function that checks post-conditions.
*/
inline ContractChecker( const Host * host, Validator validator,
Validator pre = 0, Validator post = 0 ) :
Ep( host ),
m_host( host ),
m_validator( validator ),
m_pre( pre ),
m_post( post )
{
assert( Check() );
if ( 0 != m_pre )
assert( ( m_host->*( m_pre ) )() );
}
/** The destructor checks if any Host invariants failed, and then calls the
ExceptionPolicy's Check function to determine what to do in case of an
exception.
*/
inline ~ContractChecker( void )
{
assert( Check() );
if ( 0 != m_post )
assert( ( m_host->*( m_post ) )() );
assert( Ep::Check( m_host ) );
}
/** This first checks the invariants for ContractChecker, and then calls the
validator function for the host to make sure no class invariants were
broken by the host within the Host's member function body. The host
member function can call Check directly to verify the object remains valid
at any time. This does not care if the pre- and post-condition validator
pointers are null since a host class may pass in NULL pointers for either
to indicate the pre-conditions or post-conditions are the same as the
overall class invariants.
*/
inline bool Check( void ) const
{
assert( 0 != this );
assert( 0 != m_host );
assert( 0 != m_validator );
// Now that this confirms the pointers to the host and validation
// functions are not null, go ahead and validate the host object.
const bool okay = ( m_host->*( m_validator ) )();
assert( okay );
return okay;
}
private:
/// Default constructor is not implemented.
ContractChecker( void );
/// Copy constructor is not implemented.
ContractChecker( const ContractChecker & );
/// Copy-assignment operator is not implemented.
ContractChecker & operator = ( const ContractChecker & );
/// Pointer to the host object.
const Host * m_host;
/// Pointer to member function that checks Host object's invariants.
Validator m_validator;
/// Pointer to member function that checks Host object's pre-conditions.
Validator m_pre;
/// Pointer to member function that checks Host object's post-conditions.
Validator m_post;
};
// ----------------------------------------------------------------------------
/** @class CheckStaticForNoThrow
@par Exception Safety Level:
This exception-checking policy class for StaticChecker asserts if an exception
exists. Functions can use this to show they provide the no-throw exception
safety guarantee.
*/
class CheckStaticForNoThrow
{
public:
inline bool Check( void )
{
const bool okay = !::std::uncaught_exception();
assert( okay );
return okay;
}
};
// ----------------------------------------------------------------------------
/** @class CheckStaticForNothing
@par Exception Safety Level:
This exception-checking policy class for StaticChecker does nothing when called.
Functions can use this to show they might provide the weak exception guarantee.
The best guarantee such functions can provide is that nothing gets leaked.
*/
class CheckStaticForNothing
{
public:
inline bool Check( void ) { return true; }
};
// ----------------------------------------------------------------------------
/** @class StaticChecker
This class checks if a function provides the no-throw exception safety level
and if the function violated any invariants. Invariants for stand-alone and
static functions act as pre-conditions and post-conditions.
@par Usage
-# Implement a function that checks the invariants associated with a function,
or with the static data for a class. The function must
have the signature similar to the Validator type. Something like:
"static bool Host::StaticIsValid( void );" or "bool IsOkay( void );"
- The function should return true if everything is okay, but false if
something is wrong.
- Or it could assert if anything is wrong.
-# If the checker is for static functions within a class, declare typedef's
inside the class declaration like these. Make one typedef for each policy
you use. I typedef'ed the CheckForNothing policy as CheckInvariants because
even if a function can't provide the no-throw guarantee, it should still
make sure that static data remains in a valid state.
- typedef ::Loki::StaticChecker< ::Loki::CheckForNoThrow > CheckStaticForNoThrow;
- typedef ::Loki::StaticChecker< ::Loki::CheckForNothing > CheckStaticInvariants;
-# Construct a checker near the top of each member function - except in the
validator member function. Pass the address of your validator function into
the checker's constructor.
- If the function never throws, then use the CheckForNoThrow policy.
- Otherwise use the CheckInvariants policy.
-# Recompile a debug version of your program, run it, and see if an assertion
fails.
*/
template
<
class ExceptionPolicy
>
class StaticChecker : public ExceptionPolicy
{
/// Shorthand for the ExceptionPolicy class.
typedef ExceptionPolicy Ep;
public:
/// Signature for the validation function.
typedef bool ( * Validator )( void );
/** The constructor makes sure the host is valid at the time the checker
was created, thus insuring the host object was not corrupt from the start.
@par validator Pointer to function that checks class invariants.
@par pre Optional pointer to function that checks pre-conditions.
@par post Optional pointer to function that checks post-conditions.
*/
inline explicit StaticChecker( Validator validator,
Validator pre = 0, Validator post = 0 ) :
Ep(),
m_validator( validator ),
m_pre( pre ),
m_post( post )
{
assert( Check() );
if ( 0 != m_pre )
assert( m_pre() );
}
/** The destructor checks if any Host invariants failed, and then calls the
ExceptionPolicy's Check function to determine what to do in case of an
exception.
*/
inline ~StaticChecker( void )
{
assert( Check() );
if ( 0 != m_post )
assert( m_post() );
assert( Ep::Check() );
}
/** This first checks its own invariants, and then calls the validator
function to make sure no invariants were broken by the function which
created this checker. That function can call Check directly to verify the
data remains valid at any time. This does not care if the pre- and post-
condition validator pointers are null since a host class may pass in NULL
pointers for either to indicate the pre-conditions or post-conditions are
the same as the overall class invariants.
*/
inline bool Check( void ) const
{
assert( 0 != this );
assert( 0 != m_validator );
// Now that this confirms the pointers to the host and validation
// functions are not null, go ahead and validate the host object.
const bool okay = m_validator();
assert( okay );
return okay;
}
private:
/// Default constructor is not implemented.
StaticChecker( void );
/// Copy constructor is not implemented.
StaticChecker( const StaticChecker & );
/// Copy-assignment operator is not implemented.
StaticChecker & operator = ( const StaticChecker & );
/// Pointer to member function that checks Host object's invariants.
Validator m_validator;
/// Pointer to member function that checks Host object's pre-conditions.
Validator m_pre;
/// Pointer to member function that checks Host object's post-conditions.
Validator m_post;
};
// ----------------------------------------------------------------------------
}; // end namespace Loki
#endif
|