rust/clippy_lints/src/unsafe_removed_from_name.rs

77 lines
2.3 KiB
Rust
Raw Normal View History

use clippy_utils::diagnostics::span_lint;
2020-05-08 06:57:01 -05:00
use rustc_ast::ast::{Item, ItemKind, UseTree, UseTreeKind};
2020-01-12 00:08:41 -06:00
use rustc_lint::{EarlyContext, EarlyLintPass};
2020-01-11 05:37:08 -06:00
use rustc_session::{declare_lint_pass, declare_tool_lint};
use rustc_span::Span;
use rustc_span::symbol::Ident;
2018-03-28 08:24:26 -05:00
declare_clippy_lint! {
/// ### What it does
/// Checks for imports that remove "unsafe" from an item's
/// name.
///
/// ### Why is this bad?
/// Renaming makes it less clear which traits and
/// structures are unsafe.
///
/// ### Example
/// ```rust,ignore
/// use std::cell::{UnsafeCell as TotallySafeCell};
///
/// extern crate crossbeam;
/// use crossbeam::{spawn_unsafe as spawn};
/// ```
#[clippy::version = "pre 1.29.0"]
pub UNSAFE_REMOVED_FROM_NAME,
2018-03-28 08:24:26 -05:00
style,
"`unsafe` removed from API names on import"
}
2019-04-08 15:43:55 -05:00
declare_lint_pass!(UnsafeNameRemoval => [UNSAFE_REMOVED_FROM_NAME]);
impl EarlyLintPass for UnsafeNameRemoval {
2018-07-23 06:01:12 -05:00
fn check_item(&mut self, cx: &EarlyContext<'_>, item: &Item) {
2019-09-27 10:16:06 -05:00
if let ItemKind::Use(ref use_tree) = item.kind {
check_use_tree(use_tree, cx, item.span);
}
}
}
2018-07-23 06:01:12 -05:00
fn check_use_tree(use_tree: &UseTree, cx: &EarlyContext<'_>, span: Span) {
match use_tree.kind {
UseTreeKind::Simple(Some(new_name)) => {
let old_name = use_tree
.prefix
.segments
.last()
.expect("use paths cannot be empty")
.ident;
unsafe_to_safe_check(old_name, new_name, cx, span);
2018-11-27 14:14:15 -06:00
},
UseTreeKind::Simple(None) | UseTreeKind::Glob => {},
UseTreeKind::Nested(ref nested_use_tree) => {
for (use_tree, _) in nested_use_tree {
check_use_tree(use_tree, cx, span);
}
2018-11-27 14:14:15 -06:00
},
}
}
2018-07-23 06:01:12 -05:00
fn unsafe_to_safe_check(old_name: Ident, new_name: Ident, cx: &EarlyContext<'_>, span: Span) {
let old_str = old_name.name.as_str();
let new_str = new_name.name.as_str();
if contains_unsafe(old_str) && !contains_unsafe(new_str) {
2017-08-09 02:30:56 -05:00
span_lint(
cx,
UNSAFE_REMOVED_FROM_NAME,
span,
&format!("removed `unsafe` from the name of `{old_str}` in use as `{new_str}`"),
2017-08-09 02:30:56 -05:00
);
}
}
#[must_use]
fn contains_unsafe(name: &str) -> bool {
name.contains("Unsafe") || name.contains("unsafe")
}