rust/clippy_lints/src/attrs.rs

468 lines
16 KiB
Rust
Raw Normal View History

2018-10-06 11:18:06 -05:00
// Copyright 2014-2018 The Rust Project Developers. See the COPYRIGHT
// file at the top-level directory of this distribution.
//
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
// option. This file may not be copied, modified, or distributed
// except according to those terms.
//! checks for attributes
2015-05-30 08:10:19 -05:00
2018-05-30 03:15:50 -05:00
use crate::reexport::*;
2018-06-25 14:28:23 -05:00
use crate::utils::{
2018-09-10 10:09:15 -05:00
in_macro, last_line_of_span, match_def_path, opt_def_id, paths, snippet_opt, span_lint,
span_lint_and_then, without_block_comments,
2018-06-25 14:28:23 -05:00
};
2018-07-19 03:00:54 -05:00
use if_chain::if_chain;
2018-09-10 10:09:15 -05:00
use crate::rustc::hir::*;
use crate::rustc::lint::{
CheckLintNameResult, LateContext, LateLintPass, LintArray, LintContext, LintPass,
};
use crate::rustc::ty::{self, TyCtxt};
2018-09-10 10:09:15 -05:00
use crate::rustc::{declare_tool_lint, lint_array};
2016-01-08 19:05:43 -06:00
use semver::Version;
2018-09-10 10:09:15 -05:00
use crate::syntax::ast::{
AttrStyle, Attribute, Lit, LitKind, MetaItemKind, NestedMetaItem, NestedMetaItemKind,
};
use crate::syntax::source_map::Span;
use crate::rustc_errors::Applicability;
2015-05-30 08:10:19 -05:00
/// **What it does:** Checks for items annotated with `#[inline(always)]`,
/// unless the annotated function is empty or simply panics.
///
/// **Why is this bad?** While there are valid uses of this annotation (and once
/// you know when to use it, by all means `allow` this lint), it's a common
/// newbie-mistake to pepper one's code with it.
///
/// As a rule of thumb, before slapping `#[inline(always)]` on a function,
/// measure if that additional function call really affects your runtime profile
/// sufficiently to make up for the increase in compile time.
///
/// **Known problems:** False positives, big time. This lint is meant to be
/// deactivated by everyone doing serious performance work. This means having
/// done the measurement.
///
/// **Example:**
2016-07-15 17:25:44 -05:00
/// ```rust
/// #[inline(always)]
/// fn not_quite_hot_code(..) { ... }
/// ```
2018-03-28 08:24:26 -05:00
declare_clippy_lint! {
pub INLINE_ALWAYS,
2018-03-28 08:24:26 -05:00
pedantic,
"use of `#[inline(always)]`"
}
2015-05-30 08:10:19 -05:00
2017-08-09 02:30:56 -05:00
/// **What it does:** Checks for `extern crate` and `use` items annotated with
/// lint attributes.
///
/// This lint whitelists `#[allow(unused_imports)]` and `#[allow(deprecated)]` on
/// `use` items and `#[allow(unused_imports)]` on `extern crate` items with a
/// `#[macro_use]` attribute.
///
2017-08-09 02:30:56 -05:00
/// **Why is this bad?** Lint attributes have no effect on crate imports. Most
/// likely a `!` was forgotten.
///
/// **Known problems:** None.
///
/// **Example:**
/// ```rust
/// // Bad
/// #[deny(dead_code)]
/// extern crate foo;
/// #[forbid(dead_code)]
/// use foo::bar;
///
/// // Ok
/// #[allow(unused_imports)]
/// use foo::baz;
/// #[allow(unused_imports)]
/// #[macro_use]
/// extern crate baz;
/// ```
2018-03-28 08:24:26 -05:00
declare_clippy_lint! {
pub USELESS_ATTRIBUTE,
2018-03-28 08:24:26 -05:00
correctness,
"use of lint attributes on `extern crate` items"
}
/// **What it does:** Checks for `#[deprecated]` annotations with a `since`
/// field that is not a valid semantic version.
2016-01-08 19:05:43 -06:00
///
/// **Why is this bad?** For checking the version of the deprecation, it must be
/// a valid semver. Failing that, the contained information is useless.
2016-01-08 19:05:43 -06:00
///
/// **Known problems:** None.
2016-01-08 19:05:43 -06:00
///
/// **Example:**
2016-07-15 17:25:44 -05:00
/// ```rust
2016-01-08 19:05:43 -06:00
/// #[deprecated(since = "forever")]
/// fn something_else(..) { ... }
/// ```
2018-03-28 08:24:26 -05:00
declare_clippy_lint! {
pub DEPRECATED_SEMVER,
2018-03-28 08:24:26 -05:00
correctness,
"use of `#[deprecated(since = \"x\")]` where x is not semver"
}
2015-05-30 08:10:19 -05:00
/// **What it does:** Checks for empty lines after outer attributes
///
/// **Why is this bad?**
/// Most likely the attribute was meant to be an inner attribute using a '!'.
/// If it was meant to be an outer attribute, then the following item
/// should not be separated by empty lines.
///
/// **Known problems:** Can cause false positives.
///
/// From the clippy side it's difficult to detect empty lines between an attributes and the
/// following item because empty lines and comments are not part of the AST. The parsing
/// currently works for basic cases but is not perfect.
///
/// **Example:**
/// ```rust
/// // Bad
/// #[inline(always)]
///
/// fn not_quite_good_code(..) { ... }
///
/// // Good (as inner attribute)
/// #![inline(always)]
///
/// fn this_is_fine(..) { ... }
///
/// // Good (as outer attribute)
/// #[inline(always)]
/// fn this_is_fine_too(..) { ... }
/// ```
2018-03-28 08:24:26 -05:00
declare_clippy_lint! {
pub EMPTY_LINE_AFTER_OUTER_ATTR,
nursery,
"empty line after outer attribute"
}
2018-09-10 10:09:15 -05:00
/// **What it does:** Checks for `allow`/`warn`/`deny`/`forbid` attributes with scoped clippy
/// lints and if those lints exist in clippy. If there is a uppercase letter in the lint name
/// (not the tool name) and a lowercase version of this lint exists, it will suggest to lowercase
/// the lint name.
///
/// **Why is this bad?** An lint attribute with a misstyped lint name won't have an effect.
///
/// **Known problems:** None.
///
/// **Example:**
/// Bad:
/// ```rust
/// #![warn(if_not_els)]
/// #![deny(clippy::All)]
/// ```
///
/// Good:
/// ```rust
/// #![warn(if_not_else)]
/// #![deny(clippy::all)]
/// ```
declare_clippy_lint! {
pub UNKNOWN_CLIPPY_LINTS,
style,
"unknown_lints for scoped Clippy lints"
}
2017-08-09 02:30:56 -05:00
#[derive(Copy, Clone)]
2015-05-30 08:10:19 -05:00
pub struct AttrPass;
impl LintPass for AttrPass {
fn get_lints(&self) -> LintArray {
2018-05-22 03:21:42 -05:00
lint_array!(
INLINE_ALWAYS,
DEPRECATED_SEMVER,
USELESS_ATTRIBUTE,
2018-09-10 10:09:15 -05:00
EMPTY_LINE_AFTER_OUTER_ATTR,
UNKNOWN_CLIPPY_LINTS,
2018-05-22 03:21:42 -05:00
)
2015-05-30 08:10:19 -05:00
}
}
impl<'a, 'tcx> LateLintPass<'a, 'tcx> for AttrPass {
fn check_attribute(&mut self, cx: &LateContext<'a, 'tcx>, attr: &'tcx Attribute) {
if let Some(ref items) = attr.meta_item_list() {
2018-09-10 10:09:15 -05:00
match &*attr.name().as_str() {
"allow" | "warn" | "deny" | "forbid" => {
check_clippy_lint_names(cx, items);
}
_ => {}
}
2018-05-03 17:28:02 -05:00
if items.is_empty() || attr.name() != "deprecated" {
2016-01-08 19:05:43 -06:00
return;
}
2016-08-01 09:59:14 -05:00
for item in items {
if_chain! {
if let NestedMetaItemKind::MetaItem(ref mi) = item.node;
if let MetaItemKind::NameValue(ref lit) = mi.node;
2018-05-03 17:28:02 -05:00
if mi.name() == "since";
then {
check_semver(cx, item.span, lit);
}
}
2016-01-30 06:48:39 -06:00
}
2016-01-08 19:05:43 -06:00
}
}
2016-01-30 06:48:39 -06:00
fn check_item(&mut self, cx: &LateContext<'a, 'tcx>, item: &'tcx Item) {
2017-01-13 10:04:56 -06:00
if is_relevant_item(cx.tcx, item) {
check_attrs(cx, item.span, item.name, &item.attrs)
}
match item.node {
ItemKind::ExternCrate(..) | ItemKind::Use(..) => {
let skip_unused_imports = item.attrs.iter().any(|attr| attr.name() == "macro_use");
for attr in &item.attrs {
if let Some(ref lint_list) = attr.meta_item_list() {
2018-05-03 17:28:02 -05:00
match &*attr.name().as_str() {
"allow" | "warn" | "deny" | "forbid" => {
// whitelist `unused_imports` and `deprecated` for `use` items
// and `unused_imports` for `extern crate` items with `macro_use`
2018-05-03 17:28:02 -05:00
for lint in lint_list {
match item.node {
ItemKind::Use(..) => if is_word(lint, "unused_imports")
|| is_word(lint, "deprecated") {
return
},
ItemKind::ExternCrate(..) => {
if is_word(lint, "unused_imports")
&& skip_unused_imports {
return
}
if is_word(lint, "unused_extern_crates") {
return
}
}
_ => {},
}
2018-05-03 17:28:02 -05:00
}
let line_span = last_line_of_span(cx, attr.span);
2018-05-03 17:28:02 -05:00
if let Some(mut sugg) = snippet_opt(cx, line_span) {
if sugg.contains("#[") {
span_lint_and_then(
cx,
USELESS_ATTRIBUTE,
line_span,
"useless lint attribute",
|db| {
sugg = sugg.replacen("#[", "#![", 1);
db.span_suggestion_with_applicability(
line_span,
"if you just forgot a `!`, use",
sugg,
Applicability::MachineApplicable,
2018-09-16 14:01:26 -05:00
);
2018-05-03 17:28:02 -05:00
},
);
}
2018-05-03 17:28:02 -05:00
}
},
_ => {},
}
}
}
},
_ => {},
}
}
fn check_impl_item(&mut self, cx: &LateContext<'a, 'tcx>, item: &'tcx ImplItem) {
2017-01-13 10:04:56 -06:00
if is_relevant_impl(cx.tcx, item) {
2018-06-28 08:46:58 -05:00
check_attrs(cx, item.span, item.ident.name, &item.attrs)
}
}
fn check_trait_item(&mut self, cx: &LateContext<'a, 'tcx>, item: &'tcx TraitItem) {
2017-01-13 10:04:56 -06:00
if is_relevant_trait(cx.tcx, item) {
2018-06-28 08:46:58 -05:00
check_attrs(cx, item.span, item.ident.name, &item.attrs)
}
}
}
2018-09-10 10:09:15 -05:00
fn check_clippy_lint_names(cx: &LateContext<'_, '_>, items: &Vec<NestedMetaItem>) {
let lint_store = cx.lints();
for lint in items {
if_chain! {
if let Some(word) = lint.word();
if let Some(tool_name) = word.is_scoped();
if tool_name.as_str() == "clippy";
let name = word.name();
if let CheckLintNameResult::Tool(Err((None, _))) = lint_store.check_lint_name(
&name.as_str(),
Some(tool_name.as_str()),
);
then {
span_lint_and_then(
cx,
UNKNOWN_CLIPPY_LINTS,
lint.span,
&format!("unknwon clippy lint: clippy::{}", name),
|db| {
if name.as_str().chars().any(|c| c.is_uppercase()) {
let name_lower = name.as_str().to_lowercase().to_string();
match lint_store.check_lint_name(
&name_lower,
Some(tool_name.as_str())
) {
CheckLintNameResult::NoLint => {}
_ => {
db.span_suggestion(lint.span,
"lowercase the lint name",
name_lower);
}
}
}
}
);
}
};
}
}
2018-07-23 06:01:12 -05:00
fn is_relevant_item(tcx: TyCtxt<'_, '_, '_>, item: &Item) -> bool {
2018-07-16 08:07:39 -05:00
if let ItemKind::Fn(_, _, _, eid) = item.node {
2017-02-02 10:53:28 -06:00
is_relevant_expr(tcx, tcx.body_tables(eid), &tcx.hir.body(eid).value)
2016-01-03 22:26:12 -06:00
} else {
true
2016-01-03 22:26:12 -06:00
}
}
2018-07-23 06:01:12 -05:00
fn is_relevant_impl(tcx: TyCtxt<'_, '_, '_>, item: &ImplItem) -> bool {
match item.node {
2017-02-02 10:53:28 -06:00
ImplItemKind::Method(_, eid) => is_relevant_expr(tcx, tcx.body_tables(eid), &tcx.hir.body(eid).value),
2016-01-03 22:26:12 -06:00
_ => false,
}
}
2018-07-23 06:01:12 -05:00
fn is_relevant_trait(tcx: TyCtxt<'_, '_, '_>, item: &TraitItem) -> bool {
match item.node {
TraitItemKind::Method(_, TraitMethod::Required(_)) => true,
2017-01-13 10:04:56 -06:00
TraitItemKind::Method(_, TraitMethod::Provided(eid)) => {
2017-02-02 10:53:28 -06:00
is_relevant_expr(tcx, tcx.body_tables(eid), &tcx.hir.body(eid).value)
2017-01-13 10:04:56 -06:00
},
2016-01-03 22:26:12 -06:00
_ => false,
}
}
2018-07-23 06:01:12 -05:00
fn is_relevant_block(tcx: TyCtxt<'_, '_, '_>, tables: &ty::TypeckTables<'_>, block: &Block) -> bool {
2017-06-01 21:31:42 -05:00
if let Some(stmt) = block.stmts.first() {
match stmt.node {
2018-07-12 03:53:53 -05:00
StmtKind::Decl(_, _) => true,
StmtKind::Expr(ref expr, _) | StmtKind::Semi(ref expr, _) => is_relevant_expr(tcx, tables, expr),
}
2017-06-01 21:31:42 -05:00
} else {
2018-05-22 03:21:42 -05:00
block.expr.as_ref().map_or(false, |e| is_relevant_expr(tcx, tables, e))
}
}
2018-07-23 06:01:12 -05:00
fn is_relevant_expr(tcx: TyCtxt<'_, '_, '_>, tables: &ty::TypeckTables<'_>, expr: &Expr) -> bool {
match expr.node {
2018-07-12 02:30:57 -05:00
ExprKind::Block(ref block, _) => is_relevant_block(tcx, tables, block),
ExprKind::Ret(Some(ref e)) => is_relevant_expr(tcx, tables, e),
ExprKind::Ret(None) | ExprKind::Break(_, None) => false,
ExprKind::Call(ref path_expr, _) => if let ExprKind::Path(ref qpath) = path_expr.node {
2017-09-12 07:26:40 -05:00
if let Some(fun_id) = opt_def_id(tables.qpath_def(qpath, path_expr.hir_id)) {
!match_def_path(tcx, fun_id, &paths::BEGIN_PANIC)
} else {
true
}
2017-09-05 04:33:04 -05:00
} else {
true
2016-12-20 11:21:30 -06:00
},
2016-01-03 22:26:12 -06:00
_ => true,
}
2015-05-30 08:10:19 -05:00
}
2018-07-23 06:01:12 -05:00
fn check_attrs(cx: &LateContext<'_, '_>, span: Span, name: Name, attrs: &[Attribute]) {
if in_macro(span) {
2016-01-03 22:26:12 -06:00
return;
}
for attr in attrs {
if attr.is_sugared_doc {
return;
}
if attr.style == AttrStyle::Outer {
if attr.tokens.is_empty() || !is_present_in_source(cx, attr.span) {
return;
}
let begin_of_attr_to_item = Span::new(attr.span.lo(), span.lo(), span.ctxt());
let end_of_attr_to_item = Span::new(attr.span.hi(), span.lo(), span.ctxt());
if let Some(snippet) = snippet_opt(cx, end_of_attr_to_item) {
let lines = snippet.split('\n').collect::<Vec<_>>();
let lines = without_block_comments(lines);
if lines.iter().filter(|l| l.trim().is_empty()).count() > 2 {
span_lint(
cx,
EMPTY_LINE_AFTER_OUTER_ATTR,
begin_of_attr_to_item,
"Found an empty line after an outer attribute. Perhaps you forgot to add a '!' to make it an inner attribute?"
);
}
}
}
if let Some(ref values) = attr.meta_item_list() {
2018-05-03 17:28:02 -05:00
if values.len() != 1 || attr.name() != "inline" {
2016-01-03 22:26:12 -06:00
continue;
}
if is_word(&values[0], "always") {
2017-08-09 02:30:56 -05:00
span_lint(
cx,
INLINE_ALWAYS,
attr.span,
&format!(
"you have declared `#[inline(always)]` on `{}`. This is usually a bad idea",
name
),
);
}
}
}
2015-05-30 08:10:19 -05:00
}
2016-01-08 19:05:43 -06:00
2018-07-23 06:01:12 -05:00
fn check_semver(cx: &LateContext<'_, '_>, span: Span, lit: &Lit) {
2016-02-12 11:35:44 -06:00
if let LitKind::Str(ref is, _) = lit.node {
if Version::parse(&is.as_str()).is_ok() {
2016-01-08 19:05:43 -06:00
return;
}
}
2017-08-09 02:30:56 -05:00
span_lint(
cx,
DEPRECATED_SEMVER,
span,
"the since field must contain a semver-compliant version",
);
2016-01-08 19:05:43 -06:00
}
fn is_word(nmi: &NestedMetaItem, expected: &str) -> bool {
if let NestedMetaItemKind::MetaItem(ref mi) = nmi.node {
2018-05-03 17:28:02 -05:00
mi.is_word() && mi.name() == expected
} else {
false
}
}
// If the snippet is empty, it's an attribute that was inserted during macro
// expansion and we want to ignore those, because they could come from external
// sources that the user has no control over.
// For some reason these attributes don't have any expansion info on them, so
// we have to check it this way until there is a better way.
2018-07-23 06:01:12 -05:00
fn is_present_in_source(cx: &LateContext<'_, '_>, span: Span) -> bool {
if let Some(snippet) = snippet_opt(cx, span) {
if snippet.is_empty() {
return false;
}
}
true
}