mirror of
https://github.com/rust-lang/rust-analyzer
synced 2024-12-26 04:53:34 +00:00
add completions for clippy lint in attributes
Signed-off-by: Benjamin Coenen <5719034+bnjjj@users.noreply.github.com>
This commit is contained in:
parent
c00339509d
commit
aa031e91f4
8 changed files with 240 additions and 136 deletions
|
@ -9,7 +9,7 @@ use syntax::{ast, AstNode, SyntaxKind};
|
||||||
use crate::{
|
use crate::{
|
||||||
completion_context::CompletionContext,
|
completion_context::CompletionContext,
|
||||||
completion_item::{CompletionItem, CompletionItemKind, CompletionKind, Completions},
|
completion_item::{CompletionItem, CompletionItemKind, CompletionKind, Completions},
|
||||||
generated_features::FEATURES,
|
generated_lint_completions::{CLIPPY_LINTS, FEATURES},
|
||||||
};
|
};
|
||||||
|
|
||||||
pub(super) fn complete_attribute(acc: &mut Completions, ctx: &CompletionContext) -> Option<()> {
|
pub(super) fn complete_attribute(acc: &mut Completions, ctx: &CompletionContext) -> Option<()> {
|
||||||
|
@ -23,14 +23,15 @@ pub(super) fn complete_attribute(acc: &mut Completions, ctx: &CompletionContext)
|
||||||
complete_derive(acc, ctx, token_tree)
|
complete_derive(acc, ctx, token_tree)
|
||||||
}
|
}
|
||||||
(Some(path), Some(token_tree)) if path.to_string() == "feature" => {
|
(Some(path), Some(token_tree)) if path.to_string() == "feature" => {
|
||||||
complete_lint(acc, ctx, token_tree, FEATURES)
|
complete_lint(acc, ctx, token_tree, FEATURES);
|
||||||
}
|
}
|
||||||
(Some(path), Some(token_tree))
|
(Some(path), Some(token_tree))
|
||||||
if ["allow", "warn", "deny", "forbid"]
|
if ["allow", "warn", "deny", "forbid"]
|
||||||
.iter()
|
.iter()
|
||||||
.any(|lint_level| lint_level == &path.to_string()) =>
|
.any(|lint_level| lint_level == &path.to_string()) =>
|
||||||
{
|
{
|
||||||
complete_lint(acc, ctx, token_tree, DEFAULT_LINT_COMPLETIONS)
|
complete_lint(acc, ctx, token_tree.clone(), DEFAULT_LINT_COMPLETIONS);
|
||||||
|
complete_lint(acc, ctx, token_tree, CLIPPY_LINTS);
|
||||||
}
|
}
|
||||||
(_, Some(_token_tree)) => {}
|
(_, Some(_token_tree)) => {}
|
||||||
_ => complete_attribute_start(acc, ctx, attribute),
|
_ => complete_attribute_start(acc, ctx, attribute),
|
||||||
|
@ -417,130 +418,6 @@ struct Test {}
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn empty_lint_completion() {
|
|
||||||
check(
|
|
||||||
r#"#[allow(<|>)]"#,
|
|
||||||
expect![[r#"
|
|
||||||
at absolute_paths_not_starting_with_crate fully qualified paths that start with a module name instead of `crate`, `self`, or an extern crate name
|
|
||||||
at ambiguous_associated_items ambiguous associated items
|
|
||||||
at anonymous_parameters detects anonymous parameters
|
|
||||||
at arithmetic_overflow arithmetic operation overflows
|
|
||||||
at array_into_iter detects calling `into_iter` on arrays
|
|
||||||
at asm_sub_register using only a subset of a register for inline asm inputs
|
|
||||||
at bare_trait_objects suggest using `dyn Trait` for trait objects
|
|
||||||
at bindings_with_variant_name detects pattern bindings with the same name as one of the matched variants
|
|
||||||
at box_pointers use of owned (Box type) heap memory
|
|
||||||
at cenum_impl_drop_cast a C-like enum implementing Drop is cast
|
|
||||||
at clashing_extern_declarations detects when an extern fn has been declared with the same name but different types
|
|
||||||
at coherence_leak_check distinct impls distinguished only by the leak-check code
|
|
||||||
at conflicting_repr_hints conflicts between `#[repr(..)]` hints that were previously accepted and used in practice
|
|
||||||
at confusable_idents detects visually confusable pairs between identifiers
|
|
||||||
at const_err constant evaluation detected erroneous expression
|
|
||||||
at dead_code detect unused, unexported items
|
|
||||||
at deprecated detects use of deprecated items
|
|
||||||
at deprecated_in_future detects use of items that will be deprecated in a future version
|
|
||||||
at elided_lifetimes_in_paths hidden lifetime parameters in types are deprecated
|
|
||||||
at ellipsis_inclusive_range_patterns `...` range patterns are deprecated
|
|
||||||
at explicit_outlives_requirements outlives requirements can be inferred
|
|
||||||
at exported_private_dependencies public interface leaks type from a private dependency
|
|
||||||
at ill_formed_attribute_input ill-formed attribute inputs that were previously accepted and used in practice
|
|
||||||
at illegal_floating_point_literal_pattern floating-point literals cannot be used in patterns
|
|
||||||
at improper_ctypes proper use of libc types in foreign modules
|
|
||||||
at improper_ctypes_definitions proper use of libc types in foreign item definitions
|
|
||||||
at incomplete_features incomplete features that may function improperly in some or all cases
|
|
||||||
at incomplete_include trailing content in included file
|
|
||||||
at indirect_structural_match pattern with const indirectly referencing non-structural-match type
|
|
||||||
at inline_no_sanitize detects incompatible use of `#[inline(always)]` and `#[no_sanitize(...)]`
|
|
||||||
at intra_doc_link_resolution_failure failures in resolving intra-doc link targets
|
|
||||||
at invalid_codeblock_attributes codeblock attribute looks a lot like a known one
|
|
||||||
at invalid_type_param_default type parameter default erroneously allowed in invalid location
|
|
||||||
at invalid_value an invalid value is being created (such as a NULL reference)
|
|
||||||
at irrefutable_let_patterns detects irrefutable patterns in if-let and while-let statements
|
|
||||||
at keyword_idents detects edition keywords being used as an identifier
|
|
||||||
at late_bound_lifetime_arguments detects generic lifetime arguments in path segments with late bound lifetime parameters
|
|
||||||
at macro_expanded_macro_exports_accessed_by_absolute_paths macro-expanded `macro_export` macros from the current crate cannot be referred to by absolute paths
|
|
||||||
at macro_use_extern_crate the `#[macro_use]` attribute is now deprecated in favor of using macros via the module system
|
|
||||||
at meta_variable_misuse possible meta-variable misuse at macro definition
|
|
||||||
at missing_copy_implementations detects potentially-forgotten implementations of `Copy`
|
|
||||||
at missing_crate_level_docs detects crates with no crate-level documentation
|
|
||||||
at missing_debug_implementations detects missing implementations of Debug
|
|
||||||
at missing_doc_code_examples detects publicly-exported items without code samples in their documentation
|
|
||||||
at missing_docs detects missing documentation for public members
|
|
||||||
at missing_fragment_specifier detects missing fragment specifiers in unused `macro_rules!` patterns
|
|
||||||
at mixed_script_confusables detects Unicode scripts whose mixed script confusables codepoints are solely used
|
|
||||||
at mutable_borrow_reservation_conflict reservation of a two-phased borrow conflicts with other shared borrows
|
|
||||||
at mutable_transmutes mutating transmuted &mut T from &T may cause undefined behavior
|
|
||||||
at no_mangle_const_items const items will not have their symbols exported
|
|
||||||
at no_mangle_generic_items generic items must be mangled
|
|
||||||
at non_ascii_idents detects non-ASCII identifiers
|
|
||||||
at non_camel_case_types types, variants, traits and type parameters should have camel case names
|
|
||||||
at non_shorthand_field_patterns using `Struct { x: x }` instead of `Struct { x }` in a pattern
|
|
||||||
at non_snake_case variables, methods, functions, lifetime parameters and modules should have snake case names
|
|
||||||
at non_upper_case_globals static constants should have uppercase identifiers
|
|
||||||
at order_dependent_trait_objects trait-object types were treated as different depending on marker-trait order
|
|
||||||
at overflowing_literals literal out of range for its type
|
|
||||||
at overlapping_patterns detects overlapping patterns
|
|
||||||
at path_statements path statements with no effect
|
|
||||||
at patterns_in_fns_without_body patterns in functions without body were erroneously allowed
|
|
||||||
at private_doc_tests detects code samples in docs of private items not documented by rustdoc
|
|
||||||
at private_in_public detect private items in public interfaces not caught by the old implementation
|
|
||||||
at proc_macro_derive_resolution_fallback detects proc macro derives using inaccessible names from parent modules
|
|
||||||
at pub_use_of_private_extern_crate detect public re-exports of private extern crates
|
|
||||||
at redundant_semicolons detects unnecessary trailing semicolons
|
|
||||||
at renamed_and_removed_lints lints that have been renamed or removed
|
|
||||||
at safe_packed_borrows safe borrows of fields of packed structs were erroneously allowed
|
|
||||||
at single_use_lifetimes detects lifetime parameters that are only used once
|
|
||||||
at soft_unstable a feature gate that doesn't break dependent crates
|
|
||||||
at stable_features stable features found in `#[feature]` directive
|
|
||||||
at trivial_bounds these bounds don't depend on an type parameters
|
|
||||||
at trivial_casts detects trivial casts which could be removed
|
|
||||||
at trivial_numeric_casts detects trivial casts of numeric types which could be removed
|
|
||||||
at type_alias_bounds bounds in type aliases are not enforced
|
|
||||||
at tyvar_behind_raw_pointer raw pointer to an inference variable
|
|
||||||
at unaligned_references detects unaligned references to fields of packed structs
|
|
||||||
at uncommon_codepoints detects uncommon Unicode codepoints in identifiers
|
|
||||||
at unconditional_panic operation will cause a panic at runtime
|
|
||||||
at unconditional_recursion functions that cannot return without calling themselves
|
|
||||||
at unknown_crate_types unknown crate type found in `#[crate_type]` directive
|
|
||||||
at unknown_lints unrecognized lint attribute
|
|
||||||
at unnameable_test_items detects an item that cannot be named being marked as `#[test_case]`
|
|
||||||
at unreachable_code detects unreachable code paths
|
|
||||||
at unreachable_patterns detects unreachable patterns
|
|
||||||
at unreachable_pub `pub` items not reachable from crate root
|
|
||||||
at unsafe_code usage of `unsafe` code
|
|
||||||
at unsafe_op_in_unsafe_fn unsafe operations in unsafe functions without an explicit unsafe block are deprecated
|
|
||||||
at unstable_features enabling unstable features (deprecated. do not use)
|
|
||||||
at unstable_name_collisions detects name collision with an existing but unstable method
|
|
||||||
at unused_allocation detects unnecessary allocations that can be eliminated
|
|
||||||
at unused_assignments detect assignments that will never be read
|
|
||||||
at unused_attributes detects attributes that were not used by the compiler
|
|
||||||
at unused_braces unnecessary braces around an expression
|
|
||||||
at unused_comparisons comparisons made useless by limits of the types involved
|
|
||||||
at unused_crate_dependencies crate dependencies that are never used
|
|
||||||
at unused_doc_comments detects doc comments that aren't used by rustdoc
|
|
||||||
at unused_extern_crates extern crates that are never used
|
|
||||||
at unused_features unused features found in crate-level `#[feature]` directives
|
|
||||||
at unused_import_braces unnecessary braces around an imported item
|
|
||||||
at unused_imports imports that are never used
|
|
||||||
at unused_labels detects labels that are never used
|
|
||||||
at unused_lifetimes detects lifetime parameters that are never used
|
|
||||||
at unused_macros detects macros that were not used
|
|
||||||
at unused_must_use unused result of a type flagged as `#[must_use]`
|
|
||||||
at unused_mut detect mut variables which don't need to be mutable
|
|
||||||
at unused_parens `if`, `match`, `while` and `return` do not need parentheses
|
|
||||||
at unused_qualifications detects unnecessarily qualified names
|
|
||||||
at unused_results unused result of an expression in a statement
|
|
||||||
at unused_unsafe unnecessary use of an `unsafe` block
|
|
||||||
at unused_variables detect variables which are not used in any way
|
|
||||||
at variant_size_differences detects enums with widely varying variant sizes
|
|
||||||
at warnings mass-change the level for lints which produce warnings
|
|
||||||
at where_clauses_object_safety checks the object safety of where clauses
|
|
||||||
at while_true suggest using `loop { }` instead of `while true { }`
|
|
||||||
"#]],
|
|
||||||
)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn no_completion_for_incorrect_derive() {
|
fn no_completion_for_incorrect_derive() {
|
||||||
check(
|
check(
|
||||||
|
|
File diff suppressed because one or more lines are too long
5
crates/completion/src/generated_lint_completions.rs
Normal file
5
crates/completion/src/generated_lint_completions.rs
Normal file
File diff suppressed because one or more lines are too long
|
@ -5,7 +5,7 @@ mod completion_item;
|
||||||
mod completion_context;
|
mod completion_context;
|
||||||
mod presentation;
|
mod presentation;
|
||||||
mod patterns;
|
mod patterns;
|
||||||
mod generated_features;
|
mod generated_lint_completions;
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
mod test_utils;
|
mod test_utils;
|
||||||
|
|
||||||
|
|
105
docs/user/generated_diagnostic.adoc
Normal file
105
docs/user/generated_diagnostic.adoc
Normal file
|
@ -0,0 +1,105 @@
|
||||||
|
//Generated file, do not edit by hand, see `xtask/src/codegen`
|
||||||
|
=== break-outside-of-loop
|
||||||
|
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L219[diagnostics.rs]
|
||||||
|
|
||||||
|
This diagnostic is triggered if `break` keyword is used outside of a loop.
|
||||||
|
|
||||||
|
|
||||||
|
=== incorrect-ident-case
|
||||||
|
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L319[diagnostics.rs]
|
||||||
|
|
||||||
|
This diagnostic is triggered if item name doesn't follow https://doc.rust-lang.org/1.0.0/style/style/naming/README.html[Rust naming convention].
|
||||||
|
|
||||||
|
|
||||||
|
=== mismatched-arg-count
|
||||||
|
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L267[diagnostics.rs]
|
||||||
|
|
||||||
|
This diagnostic is triggered if function is invoked with an incorrect amount of arguments.
|
||||||
|
|
||||||
|
|
||||||
|
=== missing-match-arm
|
||||||
|
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L162[diagnostics.rs]
|
||||||
|
|
||||||
|
This diagnostic is triggered if `match` block is missing one or more match arms.
|
||||||
|
|
||||||
|
|
||||||
|
=== missing-ok-in-tail-expr
|
||||||
|
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L187[diagnostics.rs]
|
||||||
|
|
||||||
|
This diagnostic is triggered if block that should return `Result` returns a value not wrapped in `Ok`.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
```rust
|
||||||
|
fn foo() -> Result<u8, ()> {
|
||||||
|
10
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
=== missing-pat-fields
|
||||||
|
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L113[diagnostics.rs]
|
||||||
|
|
||||||
|
This diagnostic is triggered if pattern lacks some fields that exist in the corresponding structure.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
```rust
|
||||||
|
struct A { a: u8, b: u8 }
|
||||||
|
|
||||||
|
let a = A { a: 10, b: 20 };
|
||||||
|
|
||||||
|
if let A { a } = a {
|
||||||
|
// ...
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
=== missing-structure-fields
|
||||||
|
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L66[diagnostics.rs]
|
||||||
|
|
||||||
|
This diagnostic is triggered if record lacks some fields that exist in the corresponding structure.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
```rust
|
||||||
|
struct A { a: u8, b: u8 }
|
||||||
|
|
||||||
|
let a = A { a: 10 };
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
=== missing-unsafe
|
||||||
|
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L243[diagnostics.rs]
|
||||||
|
|
||||||
|
This diagnostic is triggered if operation marked as `unsafe` is used outside of `unsafe` function or block.
|
||||||
|
|
||||||
|
|
||||||
|
=== no-such-field
|
||||||
|
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L39[diagnostics.rs]
|
||||||
|
|
||||||
|
This diagnostic is triggered if created structure does not have field provided in record.
|
||||||
|
|
||||||
|
|
||||||
|
=== unconfigured-code
|
||||||
|
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_def/src/diagnostics.rs#L90[diagnostics.rs]
|
||||||
|
|
||||||
|
This diagnostic is shown for code with inactive `#[cfg]` attributes.
|
||||||
|
|
||||||
|
|
||||||
|
=== unresolved-extern-crate
|
||||||
|
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_def/src/diagnostics.rs#L35[diagnostics.rs]
|
||||||
|
|
||||||
|
This diagnostic is triggered if rust-analyzer is unable to discover referred extern crate.
|
||||||
|
|
||||||
|
|
||||||
|
=== unresolved-import
|
||||||
|
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_def/src/diagnostics.rs#L59[diagnostics.rs]
|
||||||
|
|
||||||
|
This diagnostic is triggered if rust-analyzer is unable to discover imported module.
|
||||||
|
|
||||||
|
|
||||||
|
=== unresolved-module
|
||||||
|
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_def/src/diagnostics.rs#L10[diagnostics.rs]
|
||||||
|
|
||||||
|
This diagnostic is triggered if rust-analyzer is unable to discover referred module.
|
|
@ -9,7 +9,7 @@ mod gen_syntax;
|
||||||
mod gen_parser_tests;
|
mod gen_parser_tests;
|
||||||
mod gen_assists_docs;
|
mod gen_assists_docs;
|
||||||
mod gen_feature_docs;
|
mod gen_feature_docs;
|
||||||
mod gen_features;
|
mod gen_lint_completions;
|
||||||
mod gen_diagnostic_docs;
|
mod gen_diagnostic_docs;
|
||||||
|
|
||||||
use std::{
|
use std::{
|
||||||
|
@ -24,7 +24,7 @@ pub use self::{
|
||||||
gen_assists_docs::{generate_assists_docs, generate_assists_tests},
|
gen_assists_docs::{generate_assists_docs, generate_assists_tests},
|
||||||
gen_diagnostic_docs::generate_diagnostic_docs,
|
gen_diagnostic_docs::generate_diagnostic_docs,
|
||||||
gen_feature_docs::generate_feature_docs,
|
gen_feature_docs::generate_feature_docs,
|
||||||
gen_features::generate_features,
|
gen_lint_completions::generate_lint_completions,
|
||||||
gen_parser_tests::generate_parser_tests,
|
gen_parser_tests::generate_parser_tests,
|
||||||
gen_syntax::generate_syntax,
|
gen_syntax::generate_syntax,
|
||||||
};
|
};
|
||||||
|
@ -42,7 +42,7 @@ pub struct CodegenCmd {
|
||||||
impl CodegenCmd {
|
impl CodegenCmd {
|
||||||
pub fn run(self) -> Result<()> {
|
pub fn run(self) -> Result<()> {
|
||||||
if self.features {
|
if self.features {
|
||||||
generate_features(Mode::Overwrite)?;
|
generate_lint_completions(Mode::Overwrite)?;
|
||||||
}
|
}
|
||||||
generate_syntax(Mode::Overwrite)?;
|
generate_syntax(Mode::Overwrite)?;
|
||||||
generate_parser_tests(Mode::Overwrite)?;
|
generate_parser_tests(Mode::Overwrite)?;
|
||||||
|
|
113
xtask/src/codegen/gen_lint_completions.rs
Normal file
113
xtask/src/codegen/gen_lint_completions.rs
Normal file
|
@ -0,0 +1,113 @@
|
||||||
|
//! Generates descriptors structure for unstable feature from Unstable Book
|
||||||
|
use std::path::{Path, PathBuf};
|
||||||
|
|
||||||
|
use quote::quote;
|
||||||
|
use walkdir::WalkDir;
|
||||||
|
use xshell::{cmd, read_file};
|
||||||
|
|
||||||
|
use crate::{
|
||||||
|
codegen::{project_root, reformat, update, Mode, Result},
|
||||||
|
run_rustfmt,
|
||||||
|
};
|
||||||
|
|
||||||
|
pub fn generate_lint_completions(mode: Mode) -> Result<()> {
|
||||||
|
if !Path::new("./target/rust").exists() {
|
||||||
|
cmd!("git clone --depth=1 https://github.com/rust-lang/rust ./target/rust").run()?;
|
||||||
|
}
|
||||||
|
|
||||||
|
let ts_features = generate_descriptor("./target/rust/src/doc/unstable-book/src".into())?;
|
||||||
|
cmd!("curl http://rust-lang.github.io/rust-clippy/master/lints.json --output ./target/clippy_lints.json").run()?;
|
||||||
|
|
||||||
|
let ts_clippy = generate_descriptor_clippy(&Path::new("./target/clippy_lints.json"))?;
|
||||||
|
let ts = quote! {
|
||||||
|
use crate::complete_attribute::LintCompletion;
|
||||||
|
#ts_features
|
||||||
|
#ts_clippy
|
||||||
|
};
|
||||||
|
let contents = reformat(ts.to_string().as_str())?;
|
||||||
|
|
||||||
|
let destination = project_root().join("crates/completion/src/generated_lint_completions.rs");
|
||||||
|
update(destination.as_path(), &contents, mode)?;
|
||||||
|
run_rustfmt(mode)?;
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
fn generate_descriptor(src_dir: PathBuf) -> Result<proc_macro2::TokenStream> {
|
||||||
|
let definitions = ["language-features", "library-features"]
|
||||||
|
.iter()
|
||||||
|
.flat_map(|it| WalkDir::new(src_dir.join(it)))
|
||||||
|
.filter_map(|e| e.ok())
|
||||||
|
.filter(|entry| {
|
||||||
|
// Get all `.md ` files
|
||||||
|
entry.file_type().is_file() && entry.path().extension().unwrap_or_default() == "md"
|
||||||
|
})
|
||||||
|
.map(|entry| {
|
||||||
|
let path = entry.path();
|
||||||
|
let feature_ident = path.file_stem().unwrap().to_str().unwrap().replace("-", "_");
|
||||||
|
let doc = read_file(path).unwrap();
|
||||||
|
|
||||||
|
quote! { LintCompletion { label: #feature_ident, description: #doc } }
|
||||||
|
});
|
||||||
|
|
||||||
|
let ts = quote! {
|
||||||
|
pub(super) const FEATURES: &[LintCompletion] = &[
|
||||||
|
#(#definitions),*
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
Ok(ts)
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Default)]
|
||||||
|
struct ClippyLint {
|
||||||
|
help: String,
|
||||||
|
id: String,
|
||||||
|
}
|
||||||
|
|
||||||
|
fn generate_descriptor_clippy(path: &Path) -> Result<proc_macro2::TokenStream> {
|
||||||
|
let file_content = read_file(path)?;
|
||||||
|
let mut clippy_lints: Vec<ClippyLint> = vec![];
|
||||||
|
|
||||||
|
for line in file_content.lines().map(|line| line.trim()) {
|
||||||
|
if line.starts_with(r#""id":"#) {
|
||||||
|
let clippy_lint = ClippyLint {
|
||||||
|
id: line
|
||||||
|
.strip_prefix(r#""id": ""#)
|
||||||
|
.expect("should be prefixed by id")
|
||||||
|
.strip_suffix(r#"","#)
|
||||||
|
.expect("should be suffixed by comma")
|
||||||
|
.into(),
|
||||||
|
help: String::new(),
|
||||||
|
};
|
||||||
|
clippy_lints.push(clippy_lint)
|
||||||
|
} else if line.starts_with(r#""What it does":"#) {
|
||||||
|
// Typical line to strip: "What is doest": "Here is my useful content",
|
||||||
|
let prefix_to_strip = r#""What it does": ""#;
|
||||||
|
let suffix_to_strip = r#"","#;
|
||||||
|
|
||||||
|
let clippy_lint = clippy_lints.last_mut().expect("clippy lint must already exist");
|
||||||
|
clippy_lint.help = line
|
||||||
|
.strip_prefix(prefix_to_strip)
|
||||||
|
.expect("should be prefixed by what it does")
|
||||||
|
.strip_suffix(suffix_to_strip)
|
||||||
|
.expect("should be suffixed by comma")
|
||||||
|
.into();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
let definitions = clippy_lints.into_iter().map(|clippy_lint| {
|
||||||
|
let lint_ident = format!("clippy::{}", clippy_lint.id);
|
||||||
|
let doc = clippy_lint.help;
|
||||||
|
|
||||||
|
quote! { LintCompletion { label: #lint_ident, description: #doc } }
|
||||||
|
});
|
||||||
|
|
||||||
|
let ts = quote! {
|
||||||
|
pub(super) const CLIPPY_LINTS: &[LintCompletion] = &[
|
||||||
|
#(#definitions),*
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
Ok(ts)
|
||||||
|
}
|
|
@ -131,6 +131,14 @@ https://github.blog/2015-06-08-how-to-undo-almost-anything-with-git/#redo-after-
|
||||||
}
|
}
|
||||||
|
|
||||||
fn deny_clippy(path: &PathBuf, text: &String) {
|
fn deny_clippy(path: &PathBuf, text: &String) {
|
||||||
|
let ignore = &[
|
||||||
|
// The documentation in string literals may contain anything for its own purposes
|
||||||
|
"completion/src/generated_lint_completions.rs",
|
||||||
|
];
|
||||||
|
if ignore.iter().any(|p| path.ends_with(p)) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
if text.contains("[\u{61}llow(clippy") {
|
if text.contains("[\u{61}llow(clippy") {
|
||||||
panic!(
|
panic!(
|
||||||
"\n\nallowing lints is forbidden: {}.
|
"\n\nallowing lints is forbidden: {}.
|
||||||
|
@ -214,7 +222,7 @@ fn check_todo(path: &Path, text: &str) {
|
||||||
// `ast::make`.
|
// `ast::make`.
|
||||||
"ast/make.rs",
|
"ast/make.rs",
|
||||||
// The documentation in string literals may contain anything for its own purposes
|
// The documentation in string literals may contain anything for its own purposes
|
||||||
"completion/src/generated_features.rs",
|
"completion/src/generated_lint_completions.rs",
|
||||||
];
|
];
|
||||||
if need_todo.iter().any(|p| path.ends_with(p)) {
|
if need_todo.iter().any(|p| path.ends_with(p)) {
|
||||||
return;
|
return;
|
||||||
|
|
Loading…
Reference in a new issue