Sha256: 180da657adf5a13427e901f8a983bbe789bc77135aed45551a86d18e0bbc779b
Contents?: true
Size: 1.12 KB
Versions: 1
Compression:
Stored size: 1.12 KB
Contents
[![Gem](https://img.shields.io/gem/v/danger-php_codesniffer.svg)](https://rubygems.org/gems/danger-php_codesniffer) [![Build Status](https://travis-ci.org/Golface/danger-php_codesniffer.svg?branch=master)](https://travis-ci.org/Golface/danger-php_codesniffer) # danger-php_codesniffer [Danger](https://github.com/danger/danger) plugin for [PHP_CodeSniffer](https://github.com/squizlabs/PHP_CodeSniffer). ## Installation ``` $ gem install danger-php_codesniffer ``` ## Usage Detect your PHP violations of a defined coding standard. The plugin will post a comment on PR/MR on your Github or Gitlab project. Dangerfile: ``` php_codesniffer.exec ``` Ignore file/path and use specific coding standard: ``` php_codesniffer.ignore = "./vendor" php_codesniffer.standard = "CodeIgniter" php_codesniffer.exec ``` Only check new and modified file: ``` php_codesniffer.standard = "PSR2" php_codesniffer.exec ``` ## Development 1. Clone this repo 2. Run `bundle install` to setup dependencies. 3. Run `bundle exec rake spec` to run the tests. 4. Use `bundle exec guard` to automatically have tests run as you make changes. 5. Make your changes.
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
danger-php_codesniffer-0.1.4 | README.md |