]> git.ipfire.org Git - thirdparty/systemd.git/blob - docs/CODING_STYLE.md
Merge pull request #26044 from DaanDeMeyer/repart-sector-size
[thirdparty/systemd.git] / docs / CODING_STYLE.md
1 ---
2 title: Coding Style
3 category: Contributing
4 layout: default
5 SPDX-License-Identifier: LGPL-2.1-or-later
6 ---
7
8 # Coding Style
9
10 ## Formatting
11
12 - 8ch indent, no tabs, except for files in `man/` which are 2ch indent, and
13 still no tabs, and shell scripts, which are 4ch indent, and no tabs either.
14
15 - We prefer `/* comments */` over `// comments` in code you commit,
16 please. This way `// comments` are left for developers to use for local,
17 temporary commenting of code for debug purposes (i.e. uncommittable stuff),
18 making such comments easily discernible from explanatory, documenting code
19 comments (i.e. committable stuff).
20
21 - Don't break code lines too eagerly. We do **not** force line breaks at 80ch,
22 all of today's screens should be much larger than that. But then again, don't
23 overdo it, ~109ch should be enough really. The `.editorconfig`, `.vimrc` and
24 `.dir-locals.el` files contained in the repository will set this limit up for
25 you automatically, if you let them (as well as a few other things). Please
26 note that emacs loads `.dir-locals.el` automatically, but vim needs to be
27 configured to load `.vimrc`, see that file for instructions.
28
29 - If you break a function declaration over multiple lines, do it like this:
30
31 ```c
32 void some_function(
33 int foo,
34 bool bar,
35 char baz) {
36
37 int a, b, c;
38 ```
39
40 (i.e. use double indentation — 16 spaces — for the parameter list.)
41
42 - Try to write this:
43
44 ```c
45 void foo() {
46 }
47 ```
48
49 instead of this:
50
51 ```c
52 void foo()
53 {
54 }
55 ```
56
57 - Single-line `if` blocks should not be enclosed in `{}`. Write this:
58
59 ```c
60 if (foobar)
61 waldo();
62 ```
63
64 instead of this:
65
66 ```c
67 if (foobar) {
68 waldo();
69 }
70 ```
71
72 - Do not write `foo ()`, write `foo()`.
73
74 - `else` blocks should generally start on the same line as the closing `}`:
75 ```c
76 if (foobar) {
77 find();
78 waldo();
79 } else
80 dont_find_waldo();
81 ```
82
83 - Please define flags types like this:
84
85 ```c
86 typedef enum FoobarFlags {
87 FOOBAR_QUUX = 1 << 0,
88 FOOBAR_WALDO = 1 << 1,
89 FOOBAR_XOXO = 1 << 2,
90
91 } FoobarFlags;
92 ```
93
94 i.e. use an enum for it, if possible. Indicate bit values via `1 <<`
95 expressions, and align them vertically. Define both an enum and a type for
96 it.
97
98 - If you define (non-flags) enums, follow this template:
99
100 ```c
101 typedef enum FoobarMode {
102 FOOBAR_AAA,
103 FOOBAR_BBB,
104 FOOBAR_CCC,
105
106 _FOOBAR_MAX,
107 _FOOBAR_INVALID = -EINVAL,
108 } FoobarMode;
109 ```
110
111 i.e. define a `_MAX` enum for the largest defined enum value, plus one. Since
112 this is not a regular enum value, prefix it with `_`. Also, define a special
113 "invalid" enum value, and set it to `-EINVAL`. That way the enum type can
114 safely be used to propagate conversion errors.
115
116 - If you define an enum in a public API, be extra careful, as the size of the
117 enum might change when new values are added, which would break ABI
118 compatibility. Since we typically want to allow adding new enum values to an
119 existing enum type with later API versions, please use the
120 `_SD_ENUM_FORCE_S64()` macro in the enum definition, which forces the size of
121 the enum to be signed 64bit wide.
122
123 - Empty lines to separate code blocks are a good thing, please add them
124 abundantly. However, please stick to one at a time, i.e. multiple empty lines
125 immediately following each other are not OK. Also, we try to keep function calls and their immediate error handling together. Hence:
126
127 ```c
128 /* → empty line here is good */
129 r = some_function(…);
130 /* → empty line here would be bad */
131 if (r < 0)
132 return log_error_errno(r, "Some function failed: %m");
133 /* → empty line here is good */
134 ```
135
136 ## Code Organization and Semantics
137
138 - For our codebase we intend to use ISO C11 *with* GNU extensions (aka
139 "gnu11"). Public APIs (i.e. those we expose via `libsystemd.so`
140 i.e. `systemd/sd-*.h`) should only use ISO C89 however (with a very limited
141 set of conservative and common extensions, such as fixed size integer types
142 from `<inttypes.h>`), so that we don't force consuming programs into C11
143 mode. (This discrepancy in particular means one thing: internally we use C99
144 `bool` booleans, externally C89-compatible `int` booleans which generally
145 have different size in memory and slightly different semantics, also see
146 below.) Both for internal and external code it's OK to use even newer
147 features and GCC extension than "gnu11", as long as there's reasonable
148 fallback #ifdeffery in place to ensure compatibility is retained with older
149 compilers.
150
151 - Please name structures in `PascalCase` (with exceptions, such as public API
152 structs), variables and functions in `snake_case`.
153
154 - Avoid static variables, except for caches and very few other cases. Think
155 about thread-safety! While most of our code is never used in threaded
156 environments, at least the library code should make sure it works correctly
157 in them. Instead of doing a lot of locking for that, we tend to prefer using
158 TLS to do per-thread caching (which only works for small, fixed-size cache
159 objects), or we disable caching for any thread that is not the main
160 thread. Use `is_main_thread()` to detect whether the calling thread is the
161 main thread.
162
163 - Do not write functions that clobber call-by-reference variables on
164 failure. Use temporary variables for these cases and change the passed in
165 variables only on success. The rule is: never clobber return parameters on
166 failure, always initialize return parameters on success.
167
168 - Typically, function parameters fit into three categories: input parameters,
169 mutable objects, and call-by-reference return parameters. Input parameters
170 should always carry suitable "const" declarators if they are pointers, to
171 indicate they are input-only and not changed by the function. Return
172 parameters are best prefixed with "ret_", to clarify they are return
173 parameters. (Conversely, please do not prefix parameters that aren't
174 output-only with "ret_", in particular not mutable parameters that are both
175 input as well as output). Example:
176
177 ```c
178 static int foobar_frobnicate(
179 Foobar* object, /* the associated mutable object */
180 const char *input, /* immutable input parameter */
181 char **ret_frobnicated) { /* return parameter */
182
183 return 0;
184 }
185 ```
186
187 - The order in which header files are included doesn't matter too
188 much. systemd-internal headers must not rely on an include order, so it is
189 safe to include them in any order possible. However, to not clutter global
190 includes, and to make sure internal definitions will not affect global
191 headers, please always include the headers of external components first
192 (these are all headers enclosed in <>), followed by our own exported headers
193 (usually everything that's prefixed by `sd-`), and then followed by internal
194 headers. Furthermore, in all three groups, order all includes alphabetically
195 so duplicate includes can easily be detected.
196
197 - Please avoid using global variables as much as you can. And if you do use
198 them make sure they are static at least, instead of exported. Especially in
199 library-like code it is important to avoid global variables. Why are global
200 variables bad? They usually hinder generic reusability of code (since they
201 break in threaded programs, and usually would require locking there), and as
202 the code using them has side-effects make programs non-transparent. That
203 said, there are many cases where they explicitly make a lot of sense, and are
204 OK to use. For example, the log level and target in `log.c` is stored in a
205 global variable, and that's OK and probably expected by most. Also in many
206 cases we cache data in global variables. If you add more caches like this,
207 please be careful however, and think about threading. Only use static
208 variables if you are sure that thread-safety doesn't matter in your
209 case. Alternatively, consider using TLS, which is pretty easy to use with
210 gcc's `thread_local` concept. It's also OK to store data that is inherently
211 global in global variables, for example data parsed from command lines, see
212 below.
213
214 - Our focus is on the GNU libc (glibc), not any other libcs. If other libcs are
215 incompatible with glibc it's on them. However, if there are equivalent POSIX
216 and Linux/GNU-specific APIs, we generally prefer the POSIX APIs. If there
217 aren't, we are happy to use GNU or Linux APIs, and expect non-GNU
218 implementations of libc to catch up with glibc.
219
220 ## Using C Constructs
221
222 - Allocate local variables where it makes sense: at the top of the block, or at
223 the point where they can be initialized. Avoid huge variable declaration
224 lists at the top of the function.
225
226 As an exception, `int r` is typically used for a local state variable, but
227 should almost always be declared as the last variable at the top of the
228 function.
229
230 ```c
231 {
232 uint64_t a;
233 int r;
234
235 r = frobnicate(&a);
236 if (r < 0)
237
238
239 uint64_t b = a + 1, c;
240
241 r = foobarify(a, b, &c);
242 if (r < 0)
243
244
245 const char *pretty = prettify(a, b, c);
246
247 }
248 ```
249
250 - Do not mix multiple variable definitions with function invocations or
251 complicated expressions:
252
253 ```c
254 {
255 uint64_t x = 7;
256 int a;
257
258 a = foobar();
259 }
260 ```
261
262 instead of:
263
264 ```c
265 {
266 int a = foobar();
267 uint64_t x = 7;
268 }
269 ```
270
271 - Use `goto` for cleaning up, and only use it for that. I.e. you may only jump
272 to the end of a function, and little else. Never jump backwards!
273
274 - To minimize strict aliasing violations, we prefer unions over casting.
275
276 - Instead of using `memzero()`/`memset()` to initialize structs allocated on
277 the stack, please try to use c99 structure initializers. It's short, prettier
278 and actually even faster at execution. Hence:
279
280 ```c
281 struct foobar t = {
282 .foo = 7,
283 .bar = "bazz",
284 };
285 ```
286
287 instead of:
288
289 ```c
290 struct foobar t;
291 zero(t);
292 t.foo = 7;
293 t.bar = "bazz";
294 ```
295
296 - To implement an endless loop, use `for (;;)` rather than `while (1)`. The
297 latter is a bit ugly anyway, since you probably really meant `while
298 (true)`. To avoid the discussion what the right always-true expression for an
299 infinite while loop is, our recommendation is to simply write it without any
300 such expression by using `for (;;)`.
301
302 - To determine the length of a constant string `"foo"`, don't bother with
303 `sizeof("foo")-1`, please use `strlen()` instead (both gcc and clang optimize
304 the call away for fixed strings). The only exception is when declaring an
305 array. In that case use `STRLEN()`, which evaluates to a static constant and
306 doesn't force the compiler to create a VLA.
307
308 - Please use C's downgrade-to-bool feature only for expressions that are
309 actually booleans (or "boolean-like"), and not for variables that are really
310 numeric. Specifically, if you have an `int b` and it's only used in a boolean
311 sense, by all means check its state with `if (b) …` — but if `b` can actually
312 have more than two semantic values, and you want to compare for non-zero,
313 then please write that explicitly with `if (b != 0) …`. This helps readability
314 as the value range and semantical behaviour is directly clear from the
315 condition check. As a special addition: when dealing with pointers which you
316 want to check for non-NULL-ness, you may also use downgrade-to-bool feature.
317
318 - Please do not use yoda comparisons, i.e. please prefer the more readable `if
319 (a == 7)` over the less readable `if (7 == a)`.
320
321 ## Destructors
322
323 - The destructors always deregister the object from the next bigger object, not
324 the other way around.
325
326 - For robustness reasons, destructors should be able to destruct
327 half-initialized objects, too.
328
329 - When you define a destructor or `unref()` call for an object, please accept a
330 `NULL` object and simply treat this as NOP. This is similar to how libc
331 `free()` works, which accepts `NULL` pointers and becomes a NOP for them. By
332 following this scheme a lot of `if` checks can be removed before invoking
333 your destructor, which makes the code substantially more readable and robust.
334
335 - Related to this: when you define a destructor or `unref()` call for an
336 object, please make it return the same type it takes and always return `NULL`
337 from it. This allows writing code like this:
338
339 ```c
340 p = foobar_unref(p);
341 ```
342
343 which will always work regardless if `p` is initialized or not, and
344 guarantees that `p` is `NULL` afterwards, all in just one line.
345
346 ## Common Function Naming
347
348 - Name destructor functions that destroy an object in full freeing all its
349 memory and associated resources (and thus invalidating the pointer to it)
350 `xyz_free()`. Example: `strv_free()`.
351
352 - Name destructor functions that destroy only the referenced content of an
353 object but leave the object itself allocated `xyz_done()`. If it resets all
354 fields so that the object can be reused later call it `xyz_clear()`.
355
356 - Functions that decrease the reference counter of an object by one should be
357 called `xyz_unref()`. Example: `json_variant_unref()`. Functions that
358 increase the reference counter by one should be called `xyz_ref()`. Example:
359 `json_variant_ref()`
360
361 ## Error Handling
362
363 - Error codes are returned as negative `Exxx`. e.g. `return -EINVAL`. There are
364 some exceptions: for constructors, it is OK to return `NULL` on OOM. For
365 lookup functions, `NULL` is fine too for "not found".
366
367 Be strict with this. When you write a function that can fail due to more than
368 one cause, it *really* should have an `int` as the return value for the error
369 code.
370
371 - libc system calls typically return -1 on error (with the error code in
372 `errno`), and >= 0 on success. Use the RET_NERRNO() helper if you are looking
373 for a simple way to convert this libc style error returning into systemd
374 style error returning. e.g.
375
376 ```c
377
378 r = RET_NERRNO(unlink(t));
379
380 ```
381
382 or
383
384 ```c
385
386 r = RET_NERRNO(open("/some/file", O_RDONLY|O_CLOEXEC));
387
388 ```
389
390 - Do not bother with error checking whether writing to stdout/stderr worked.
391
392 - Do not log errors from "library" code, only do so from "main program"
393 code. (With one exception: it is OK to log with DEBUG level from any code,
394 with the exception of maybe inner loops).
395
396 - In public API calls, you **must** validate all your input arguments for
397 programming error with `assert_return()` and return a sensible return
398 code. In all other calls, it is recommended to check for programming errors
399 with a more brutal `assert()`. We are more forgiving to public users than for
400 ourselves! Note that `assert()` and `assert_return()` really only should be
401 used for detecting programming errors, not for runtime errors. `assert()` and
402 `assert_return()` by usage of `_likely_()` inform the compiler that it should
403 not expect these checks to fail, and they inform fellow programmers about the
404 expected validity and range of parameters.
405
406 - When you invoke certain calls like `unlink()`, or `mkdir_p()` and you know it
407 is safe to ignore the error it might return (because a later call would
408 detect the failure anyway, or because the error is in an error path and you
409 thus couldn't do anything about it anyway), then make this clear by casting
410 the invocation explicitly to `(void)`. Code checks like Coverity understand
411 that, and will not complain about ignored error codes. Hence, please use
412 this:
413
414 ```c
415 (void) unlink("/foo/bar/baz");
416 ```
417
418 instead of just this:
419
420 ```c
421 unlink("/foo/bar/baz");
422 ```
423
424 When returning from a `void` function, you may also want to shorten the error
425 path boilerplate by returning a function invocation cast to `(void)` like so:
426
427 ```c
428 if (condition_not_met)
429 return (void) log_tests_skipped("Cannot run ...");
430 ```
431
432 Don't cast function calls to `(void)` that return no error
433 conditions. Specifically, the various `xyz_unref()` calls that return a
434 `NULL` object shouldn't be cast to `(void)`, since not using the return value
435 does not hide any errors.
436
437 - When returning a return code from `main()`, please preferably use
438 `EXIT_FAILURE` and `EXIT_SUCCESS` as defined by libc.
439
440 ## Logging
441
442 - For every function you add, think about whether it is a "logging" function or
443 a "non-logging" function. "Logging" functions do (non-debug) logging on their
444 own, "non-logging" functions never log on their own (except at debug level)
445 and expect their callers to log. All functions in "library" code, i.e. in
446 `src/shared/` and suchlike must be "non-logging". Every time a "logging"
447 function calls a "non-logging" function, it should log about the resulting
448 errors. If a "logging" function calls another "logging" function, then it
449 should not generate log messages, so that log messages are not generated
450 twice for the same errors. (Note that debug level logging — at syslog level
451 `LOG_DEBUG` — is not considered logging in this context, debug logging is
452 generally always fine and welcome.)
453
454 - If possible, do a combined log & return operation:
455
456 ```c
457 r = operation(...);
458 if (r < 0)
459 return log_(error|warning|notice|...)_errno(r, "Failed to ...: %m");
460 ```
461
462 If the error value is "synthetic", i.e. it was not received from
463 the called function, use `SYNTHETIC_ERRNO` wrapper to tell the logging
464 system to not log the errno value, but still return it:
465
466 ```c
467 n = read(..., s, sizeof s);
468 if (n != sizeof s)
469 return log_error_errno(SYNTHETIC_ERRNO(EIO), "Failed to read ...");
470 ```
471
472 ## Memory Allocation
473
474 - Always check OOM. There is no excuse. In program code, you can use
475 `log_oom()` for then printing a short message, but not in "library" code.
476
477 - Avoid fixed-size string buffers, unless you really know the maximum size and
478 that maximum size is small. It is often nicer to use dynamic memory,
479 `alloca_safe()` or VLAs. If you do allocate fixed-size strings on the stack,
480 then it is probably only OK if you either use a maximum size such as
481 `LINE_MAX`, or count in detail the maximum size a string can
482 have. (`DECIMAL_STR_MAX` and `DECIMAL_STR_WIDTH` macros are your friends for
483 this!)
484
485 Or in other words, if you use `char buf[256]` then you are likely doing
486 something wrong!
487
488 - Make use of `_cleanup_free_` and friends. It makes your code much nicer to
489 read (and shorter)!
490
491 - Do not use `alloca()`, `strdupa()` or `strndupa()` directly. Use
492 `alloca_safe()`, `strdupa_safe()` or `strndupa_safe()` instead. (The
493 difference is that the latter include an assertion that the specified size is
494 below a safety threshold, so that the program rather aborts than runs into
495 possible stack overruns.)
496
497 - Use `alloca_safe()`, but never forget that it is not OK to invoke
498 `alloca_safe()` within a loop or within function call
499 parameters. `alloca_safe()` memory is released at the end of a function, and
500 not at the end of a `{}` block. Thus, if you invoke it in a loop, you keep
501 increasing the stack pointer without ever releasing memory again. (VLAs have
502 better behavior in this case, so consider using them as an alternative.)
503 Regarding not using `alloca_safe()` within function parameters, see the BUGS
504 section of the `alloca(3)` man page.
505
506 - If you want to concatenate two or more strings, consider using `strjoina()`
507 or `strjoin()` rather than `asprintf()`, as the latter is a lot slower. This
508 matters particularly in inner loops (but note that `strjoina()` cannot be
509 used there).
510
511 ## Runtime Behaviour
512
513 - Avoid leaving long-running child processes around, i.e. `fork()`s that are
514 not followed quickly by an `execv()` in the child. Resource management is
515 unclear in this case, and memory CoW will result in unexpected penalties in
516 the parent much, much later on.
517
518 - Don't block execution for arbitrary amounts of time using `usleep()` or a
519 similar call, unless you really know what you do. Just "giving something some
520 time", or so is a lazy excuse. Always wait for the proper event, instead of
521 doing time-based poll loops.
522
523 - Whenever installing a signal handler, make sure to set `SA_RESTART` for it,
524 so that interrupted system calls are automatically restarted, and we minimize
525 hassles with handling `EINTR` (in particular as `EINTR` handling is pretty
526 broken on Linux).
527
528 - When applying C-style unescaping as well as specifier expansion on the same
529 string, always apply the C-style unescaping first, followed by the specifier
530 expansion. When doing the reverse, make sure to escape `%` in specifier-style
531 first (i.e. `%` → `%%`), and then do C-style escaping where necessary.
532
533 - Be exceptionally careful when formatting and parsing floating point
534 numbers. Their syntax is locale dependent (i.e. `5.000` in en_US is generally
535 understood as 5, while in de_DE as 5000.).
536
537 - Make sure to enforce limits on every user controllable resource. If the user
538 can allocate resources in your code, your code must enforce some form of
539 limits after which it will refuse operation. It's fine if it is hard-coded
540 (at least initially), but it needs to be there. This is particularly
541 important for objects that unprivileged users may allocate, but also matters
542 for everything else any user may allocate.
543
544 ## Types
545
546 - Think about the types you use. If a value cannot sensibly be negative, do not
547 use `int`, but use `unsigned`.
548
549 - Use `char` only for actual characters. Use `uint8_t` or `int8_t` when you
550 actually mean a byte-sized signed or unsigned integers. When referring to a
551 generic byte, we generally prefer the unsigned variant `uint8_t`. Do not use
552 types based on `short`. They *never* make sense. Use `int`, `long`, `long
553 long`, all in unsigned and signed fashion, and the fixed-size types
554 `uint8_t`, `uint16_t`, `uint32_t`, `uint64_t`, `int8_t`, `int16_t`, `int32_t`
555 and so on, as well as `size_t`, but nothing else. Do not use kernel types
556 like `u32` and so on, leave that to the kernel.
557
558 - Stay uniform. For example, always use `usec_t` for time values. Do not mix
559 `usec` and `msec`, and `usec` and whatnot.
560
561 - Never use the `off_t` type, and particularly avoid it in public APIs. It's
562 really weirdly defined, as it usually is 64-bit and we don't support it any
563 other way, but it could in theory also be 32-bit. Which one it is depends on
564 a compiler switch chosen by the compiled program, which hence corrupts APIs
565 using it unless they can also follow the program's choice. Moreover, in
566 systemd we should parse values the same way on all architectures and cannot
567 expose `off_t` values over D-Bus. To avoid any confusion regarding conversion
568 and ABIs, always use simply `uint64_t` directly.
569
570 - Unless you allocate an array, `double` is always a better choice than
571 `float`. Processors speak `double` natively anyway, so there is no speed
572 benefit, and on calls like `printf()` `float`s get promoted to `double`s
573 anyway, so there is no point.
574
575 - Use the bool type for booleans, not integers. One exception: in public
576 headers (i.e those in `src/systemd/sd-*.h`) use integers after all, as `bool`
577 is C99 and in our public APIs we try to stick to C89 (with a few extensions;
578 also see above).
579
580 ## Deadlocks
581
582 - Do not issue NSS requests (that includes user name and hostname lookups)
583 from PID 1 as this might trigger deadlocks when those lookups involve
584 synchronously talking to services that we would need to start up.
585
586 - Do not synchronously talk to any other service from PID 1, due to risk of
587 deadlocks.
588
589 ## File Descriptors
590
591 - When you allocate a file descriptor, it should be made `O_CLOEXEC` right from
592 the beginning, as none of our files should leak to forked binaries by
593 default. Hence, whenever you open a file, `O_CLOEXEC` must be specified,
594 right from the beginning. This also applies to sockets. Effectively, this
595 means that all invocations to:
596
597 - `open()` must get `O_CLOEXEC` passed,
598 - `socket()` and `socketpair()` must get `SOCK_CLOEXEC` passed,
599 - `recvmsg()` must get `MSG_CMSG_CLOEXEC` set,
600 - `F_DUPFD_CLOEXEC` should be used instead of `F_DUPFD`, and so on,
601 - invocations of `fopen()` should take `e`.
602
603 - It's a good idea to use `O_NONBLOCK` when opening 'foreign' regular files,
604 i.e. file system objects that are supposed to be regular files whose paths
605 were specified by the user and hence might actually refer to other types of
606 file system objects. This is a good idea so that we don't end up blocking on
607 'strange' file nodes, for example if the user pointed us to a FIFO or device
608 node which may block when opening. Moreover even for actual regular files
609 `O_NONBLOCK` has a benefit: it bypasses any mandatory lock that might be in
610 effect on the regular file. If in doubt consider turning off `O_NONBLOCK`
611 again after opening.
612
613 ## Command Line
614
615 - If you parse a command line, and want to store the parsed parameters in
616 global variables, please consider prefixing their names with `arg_`. We have
617 been following this naming rule in most of our tools, and we should continue
618 to do so, as it makes it easy to identify command line parameter variables,
619 and makes it clear why it is OK that they are global variables.
620
621 - Command line option parsing:
622 - Do not print full `help()` on error, be specific about the error.
623 - Do not print messages to stdout on error.
624 - Do not POSIX_ME_HARDER unless necessary, i.e. avoid `+` in option string.
625
626 ## Exporting Symbols
627
628 - Variables and functions **must** be static, unless they have a prototype, and
629 are supposed to be exported.
630
631 - Public API calls (i.e. functions exported by our shared libraries)
632 must be marked `_public_` and need to be prefixed with `sd_`. No
633 other functions should be prefixed like that.
634
635 - When exposing public C APIs, be careful what function parameters you make
636 `const`. For example, a parameter taking a context object should probably not
637 be `const`, even if you are writing an otherwise read-only accessor function
638 for it. The reason is that making it `const` fixates the contract that your
639 call won't alter the object ever, as part of the API. However, that's often
640 quite a promise, given that this even prohibits object-internal caching or
641 lazy initialization of object variables. Moreover, it's usually not too
642 useful for client applications. Hence, please be careful and avoid `const` on
643 object parameters, unless you are very sure `const` is appropriate.
644
645 ## Referencing Concepts
646
647 - When referring to a configuration file option in the documentation and such,
648 please always suffix it with `=`, to indicate that it is a configuration file
649 setting.
650
651 - When referring to a command line option in the documentation and such, please
652 always prefix with `--` or `-` (as appropriate), to indicate that it is a
653 command line option.
654
655 - When referring to a file system path that is a directory, please always
656 suffix it with `/`, to indicate that it is a directory, not a regular file
657 (or other file system object).
658
659 ## Functions to Avoid
660
661 - Use `memzero()` or even better `zero()` instead of `memset(..., 0, ...)`
662
663 - Please use `streq()` and `strneq()` instead of `strcmp()`, `strncmp()` where
664 applicable (i.e. wherever you just care about equality/inequality, not about
665 the sorting order).
666
667 - Never use `strtol()`, `atoi()` and similar calls. Use `safe_atoli()`,
668 `safe_atou32()` and suchlike instead. They are much nicer to use in most
669 cases and correctly check for parsing errors.
670
671 - `htonl()`/`ntohl()` and `htons()`/`ntohs()` are weird. Please use `htobe32()`
672 and `htobe16()` instead, it's much more descriptive, and actually says what
673 really is happening, after all `htonl()` and `htons()` don't operate on
674 `long`s and `short`s as their name would suggest, but on `uint32_t` and
675 `uint16_t`. Also, "network byte order" is just a weird name for "big endian",
676 hence we might want to call it "big endian" right-away.
677
678 - Use `typesafe_inet_ntop()`, `typesafe_inet_ntop4()`, and
679 `typesafe_inet_ntop6()` instead of `inet_ntop()`. But better yet, use the
680 `IN_ADDR_TO_STRING()`, `IN4_ADDR_TO_STRING()`, and `IN6_ADDR_TO_STRING()`
681 macros which allocate an anonymous buffer internally.
682
683 - Please never use `dup()`. Use `fcntl(fd, F_DUPFD_CLOEXEC, 3)` instead. For
684 two reasons: first, you want `O_CLOEXEC` set on the new `fd` (see
685 above). Second, `dup()` will happily duplicate your `fd` as 0, 1, 2,
686 i.e. stdin, stdout, stderr, should those `fd`s be closed. Given the special
687 semantics of those `fd`s, it's probably a good idea to avoid
688 them. `F_DUPFD_CLOEXEC` with `3` as parameter avoids them.
689
690 - Don't use `fgets()`, it's too hard to properly handle errors such as overly
691 long lines. Use `read_line()` instead, which is our own function that handles
692 this much more nicely.
693
694 - Don't invoke `exit()`, ever. It is not replacement for proper error
695 handling. Please escalate errors up your call chain, and use normal `return`
696 to exit from the main function of a process. If you `fork()`ed off a child
697 process, please use `_exit()` instead of `exit()`, so that the exit handlers
698 are not run.
699
700 - Do not use `basename()` or `dirname()`. The semantics in corner cases are
701 full of pitfalls, and the fact that there are two quite different versions of
702 `basename()` (one POSIX and one GNU, of which the latter is much more useful)
703 doesn't make it better either. Use path_extract_filename() and
704 path_extract_directory() instead.
705
706 - Never use `FILENAME_MAX`. Use `PATH_MAX` instead (for checking maximum size
707 of paths) and `NAME_MAX` (for checking maximum size of filenames).
708 `FILENAME_MAX` is not POSIX, and is a confusingly named alias for `PATH_MAX`
709 on Linux. Note that `NAME_MAX` does not include space for a trailing `NUL`,
710 but `PATH_MAX` does. UNIX FTW!
711
712 ## Committing to git
713
714 - Commit message subject lines should be prefixed with an appropriate component
715 name of some kind. For example "journal: ", "nspawn: " and so on.
716
717 - Do not use "Signed-Off-By:" in your commit messages. That's a kernel thing we
718 don't do in the systemd project.
719
720 ## Commenting
721
722 - The best place for code comments and explanations is in the code itself. Only
723 the second best is in git commit messages. The worst place is in the GitHub
724 PR cover letter. Hence, whenever you type a commit message consider for a
725 moment if what you are typing there wouldn't be a better fit for an in-code
726 comment. And if you type the cover letter of a PR, think hard if this
727 wouldn't be better as a commit message or even code comment. Comments are
728 supposed to be useful for somebody who reviews the code, and hence hiding
729 comments in git commits or PR cover letters makes reviews unnecessarily
730 hard. Moreover, while we rely heavily on GitHub's project management
731 infrastructure we'd like to keep everything that can reasonably be kept in
732 the git repository itself in the git repository, so that we can theoretically
733 move things elswhere with the least effort possible.
734
735 - It's OK to reference GitHub PRs, GitHub issues and git commits from code
736 comments. Cross-referencing code, issues, and documentation is a good thing.
737
738 - Reasonable use of non-ASCII Unicode UTF-8 characters in code comments is
739 welcome. If your code comment contains an emoji or two this will certainly
740 brighten the day of the occasional reviewer of your code. Really! 😊