SourceSafe Keyword Expansion Template

We use Visual SourceSafe's keyword expansion. Each of our project's source files has (or should if we remember) the following header when we add it to source control.

// TEST.CPP : implementation file
//
/* $Log: /TEST/TEST.CPP $
*/     
This macro inserts the template into .H and .CPP files.

Sub AddSSHeader()
'DESCRIPTION: Insert the source safe keyword expansion comments at the top of source file

 strName = UCase(ActiveDocument.Name)
 pos = Instr(strName, ".")

 if (pos < 1) then
  Exit Sub
 end if
  
 strExt = Mid(strName, pos)

 if (strExt = ".CPP") then
  strDesc = "implementation file"
 else 
  if (strExt = ".H") then
   strDesc = "header file"
  else
   exit sub       
  end if
 end if

 ActiveDocument.Selection.StartOfDocument

 ' Check for existing keyword expansion
 for i = 1 to 20
  ActiveDocument.Selection.SelectLine

 if Instr(ActiveDocument.Selection, "/* $Log:") > 0 then
  MsgBox "File already has keyword expansion."
  exit sub
 end if  

  ActiveDocument.Selection.LineDown
 next

 strFullName = ActiveDocument.FullName
 pos = Instr(strFullName, ":")

 if (pos > 0) then
  strFullName = Mid(strFullName, pos + 1)
 end if

 ActiveDocument.Selection.StartOfDocument
 ActiveDocument.Selection = "// " + strName + " : " + strDesc + vbCrLf 
 ActiveDocument.Selection = "//" + vbCrLf
 ActiveDocument.Selection = "/* $Log: " + UCase(Replace(strFullName, 
 "\", "/")) + " $" + vbCrLf
 ActiveDocument.Selection = "*/" + vbCrLf + vbCrLf

end sub

Date Last Updated: February 3, 1999



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

  • The 3rd Platform of computing, based around the four pillars of mobile computing, social media, big data and analytics, and cloud, is redefining what IT infrastructure needs to provide. Endpoint solutions must meet not only traditional data protection requirements, but also a new set of requirements driven by the explosion in mobile computing. This IDC white paper explores the customer challenges associated with safeguarding data residing on various endpoint devices, including laptops, tablets, and …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date