Sha256: 2a25678cf93f4656d512ba66a5c1c0d3b3d1ab6cd04b15450b1a05028916f616

Contents?: true

Size: 1.12 KB

Versions: 1

Compression:

Stored size: 1.12 KB

Contents

[![Gem](https://img.shields.io/gem/v/danger-php_codesniffer.svg)](https://rubygems.org/gems/danger-php_codesniffer) [![Build Status](https://travis-ci.org/Golface/danger-php_codesniffer.svg?branch=master)](https://travis-ci.org/Golface/danger-php_codesniffer)

# danger-php_codesniffer

[Danger](https://github.com/danger/danger) plugin for [PHP_CodeSniffer](https://github.com/squizlabs/PHP_CodeSniffer).

## Installation

```
$ gem install danger-php_codesniffer
```

## Usage

Detect your PHP violations of a defined coding standard. The plugin will post a comment on PR/MR on your Github or Gitlab project.

Dangerfile:

```
php_codesniffer.exec
```

Ignore file/path and use specific coding standard:

```
php_codesniffer.ignore = "./vendor"
php_codesniffer.standard = "CodeIgniter"
php_codesniffer.exec
```

Only check new and modified file:

```
php_codesniffer.filtering = true
php_codesniffer.exec
```

## Development

1. Clone this repo
2. Run `bundle install` to setup dependencies.
3. Run `bundle exec rake spec` to run the tests.
4. Use `bundle exec guard` to automatically have tests run as you make changes.
5. Make your changes.

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
danger-php_codesniffer-0.1.5 README.md