Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package cppcheck for openSUSE:Factory 
checked in at 2023-10-02 20:04:59
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/cppcheck (Old)
 and      /work/SRC/openSUSE:Factory/.cppcheck.new.28202 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "cppcheck"

Mon Oct  2 20:04:59 2023 rev:34 rq:1114263 version:2.12.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/cppcheck/cppcheck.changes        2023-06-01 
17:20:47.470612360 +0200
+++ /work/SRC/openSUSE:Factory/.cppcheck.new.28202/cppcheck.changes     
2023-10-02 20:06:27.310780207 +0200
@@ -1,0 +2,73 @@
+Tue Sep 19 14:21:21 UTC 2023 - Dirk Müller <dmuel...@suse.com>
+
+- update to 2.12.1:
+  * Support importing projects with project-name
+
+-------------------------------------------------------------------
+Thu Sep 14 11:18:59 UTC 2023 - Dirk Müller <dmuel...@suse.com>
+
+- update to 2.12.0:
+  * uselessOverride finds overriding functions that either
+    duplicate code from or delegate back to the base class
+    implementation
+  * knownPointerToBool finds pointer to bool conversions that are
+    always true or false
+  * truncLongCastAssignment and truncLongCastReturn check
+    additional types, including float/double/long double
+  * duplInheritedMember also reports duplicated member functions
+  * constParameter*/constVariable* checks find more instances of
+    pointers/references that can be const, e.g. when calling
+    library functions
+  * Write how many checkers was activated after a run
+  * Added --checkers-report that can be used to generate a report
+    in a file that shows what checkers was activated and disabled
+  * The qmake build system has been deprecated and will be
+    removed in a future version.
+  * Command-line option '--template
+- update to 2.11:
+  * pop_back on empty container is UB
+  * Improve useStlAlgorithm check to handle many more conditions
+    in the loop for any_of, all_of and none_of algorithms
+  * ValueFlow can evaluate the return value of functions even
+    when conditionals are used
+  * ValueFlow will now forward the container sizes being returned
+    from a function
+  * ValueFlow can infer possible values from possible symbolic
+    values
+  * Improve valueflow after pushing to container
+  * The new option --check-level= has been added that controls
+    how much checking is made by Cppcheck. The default checking
+    level is "normal". If you feel that you can wait longer on
+    results you can use --check-level=exhaustive.
+  * It is no longer necessary to run "--check-config" to get
+    detailed "missingInclude" and "missingIncludeSystem"
+    messages. They will always be issued in the regular analysis
+    if "missingInclude" is enabled.
+  * "missingInclude" and "missingIncludeSystem" are reported with
+    "-j" is > 1 and processes are used in the backend (default in
+    non-Windows binaries)
+  * "missingInclude" and "missingIncludeSystem" will now cause
+    the "--error-exitcode" to be applied
+  * "--enable=information" will no longer implicitly enable
+    "missingInclude" starting with 2.16. Please enable it
+    explicitly if you require it.
+  * The `constParameter` and `constVariable` checks have been
+    split into 3 different IDs based on if the variable is a
+    pointer, a reference, or local. The different IDs will allow
+    users to suppress different const warning based on variable
+    type.
+  * `constParameter`
+  * `constParameterReference`
+  * `constParameterPointer`
+  * `constVariable`
+  * `constVariableReference`
+  * `constVariablePointer`
+  * More command-line parameters will now check if the given
+    integer argument is actually valid. Several other internal
+    string-to-integer conversions will now be error checked.
+  * scanning projects (with -j1) will now defer the analysis of
+    markup files until the whole code was processed
+- add werror-return-type.patch to fix false warnings where
+  gcc can not properly detect the "noreturn" nature of the function
+
+-------------------------------------------------------------------

Old:
----
  cppcheck-2.10.3.tar.gz

New:
----
  cppcheck-2.12.1.tar.gz
  werror-return-type.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ cppcheck.spec ++++++
--- /var/tmp/diff_new_pack.kSohgh/_old  2023-10-02 20:06:28.394819192 +0200
+++ /var/tmp/diff_new_pack.kSohgh/_new  2023-10-02 20:06:28.394819192 +0200
@@ -17,21 +17,18 @@
 
 
 Name:           cppcheck
-Version:        2.10.3
+Version:        2.12.1
 Release:        0
 Summary:        A tool for static C/C++ code analysis
 License:        GPL-3.0-or-later
 URL:            https://github.com/danmar/cppcheck
 Source:         
https://github.com/danmar/cppcheck/archive/refs/tags/%{version}.tar.gz#/%{name}-%{version}.tar.gz
 Patch0:         disable-some-tests-about-char-signedness.patch
+Patch1:         werror-return-type.patch
 BuildRequires:  cmake
 BuildRequires:  docbook-xsl-stylesheets
 BuildRequires:  fdupes
-%if 0%{?suse_version} > 1500
-BuildRequires:  gcc12-c++
-%else
 BuildRequires:  gcc-c++
-%endif
 BuildRequires:  libqt5-linguist-devel
 BuildRequires:  pkgconfig
 BuildRequires:  python3-base
@@ -82,11 +79,8 @@
 %autosetup -p1
 
 %build
-%if 0%{?suse_version} > 1500
-export CXX=/usr/bin/g++-12
-%endif
 %cmake \
-  -DCMAKE_CXX_FLAGS="-DNDEBUG %{optflags}" \
+  -DCMAKE_CXX_FLAGS="%{optflags} -UNDEBUG" \
   -DFILESDIR="%{_datadir}/%{name}" \
   -DBUILD_GUI=ON \
   -DBUILD_TESTS=ON \

++++++ cppcheck-2.10.3.tar.gz -> cppcheck-2.12.1.tar.gz ++++++
++++ 116508 lines of diff (skipped)

++++++ werror-return-type.patch ++++++
Index: cppcheck-2.12.0/lib/keywords.cpp
===================================================================
--- cppcheck-2.12.0.orig/lib/keywords.cpp
+++ cppcheck-2.12.0/lib/keywords.cpp
@@ -165,6 +166,7 @@ const std::unordered_set<std::string>& K
             return c23_keywords_all;*/
     }
     assert(false && "unreachable");
+    __builtin_unreachable();
 }
 
 // cppcheck-suppress unusedFunction
@@ -185,6 +187,7 @@ const std::unordered_set<std::string>& K
         return cpp23_keywords_all;
     }
     assert(false && "unreachable");
+    __builtin_unreachable();
 }
 
 // cppcheck-suppress unusedFunction
@@ -202,6 +205,7 @@ const std::unordered_set<std::string>& K
             return c23_keywords_all;*/
     }
     assert(false && "unreachable");
+    __builtin_unreachable();
 }
 
 // cppcheck-suppress unusedFunction
@@ -223,5 +227,6 @@ const std::unordered_set<std::string>& K
         return cpp23_keywords;
     }
     assert(false && "unreachable");
+    __builtin_unreachable();
 }
 

Reply via email to