add completions for clippy lint in attributes

Signed-off-by: Benjamin Coenen <5719034+bnjjj@users.noreply.github.com>
This commit is contained in:
Benjamin Coenen 2020-10-20 21:29:31 +02:00
parent c00339509d
commit aa031e91f4
8 changed files with 240 additions and 136 deletions

View file

@ -9,7 +9,7 @@ use syntax::{ast, AstNode, SyntaxKind};
use crate::{ use crate::{
completion_context::CompletionContext, completion_context::CompletionContext,
completion_item::{CompletionItem, CompletionItemKind, CompletionKind, Completions}, completion_item::{CompletionItem, CompletionItemKind, CompletionKind, Completions},
generated_features::FEATURES, generated_lint_completions::{CLIPPY_LINTS, FEATURES},
}; };
pub(super) fn complete_attribute(acc: &mut Completions, ctx: &CompletionContext) -> Option<()> { pub(super) fn complete_attribute(acc: &mut Completions, ctx: &CompletionContext) -> Option<()> {
@ -23,14 +23,15 @@ pub(super) fn complete_attribute(acc: &mut Completions, ctx: &CompletionContext)
complete_derive(acc, ctx, token_tree) complete_derive(acc, ctx, token_tree)
} }
(Some(path), Some(token_tree)) if path.to_string() == "feature" => { (Some(path), Some(token_tree)) if path.to_string() == "feature" => {
complete_lint(acc, ctx, token_tree, FEATURES) complete_lint(acc, ctx, token_tree, FEATURES);
} }
(Some(path), Some(token_tree)) (Some(path), Some(token_tree))
if ["allow", "warn", "deny", "forbid"] if ["allow", "warn", "deny", "forbid"]
.iter() .iter()
.any(|lint_level| lint_level == &path.to_string()) => .any(|lint_level| lint_level == &path.to_string()) =>
{ {
complete_lint(acc, ctx, token_tree, DEFAULT_LINT_COMPLETIONS) complete_lint(acc, ctx, token_tree.clone(), DEFAULT_LINT_COMPLETIONS);
complete_lint(acc, ctx, token_tree, CLIPPY_LINTS);
} }
(_, Some(_token_tree)) => {} (_, Some(_token_tree)) => {}
_ => complete_attribute_start(acc, ctx, attribute), _ => complete_attribute_start(acc, ctx, attribute),
@ -417,130 +418,6 @@ struct Test {}
); );
} }
#[test]
fn empty_lint_completion() {
check(
r#"#[allow(<|>)]"#,
expect![[r#"
at absolute_paths_not_starting_with_crate fully qualified paths that start with a module name instead of `crate`, `self`, or an extern crate name
at ambiguous_associated_items ambiguous associated items
at anonymous_parameters detects anonymous parameters
at arithmetic_overflow arithmetic operation overflows
at array_into_iter detects calling `into_iter` on arrays
at asm_sub_register using only a subset of a register for inline asm inputs
at bare_trait_objects suggest using `dyn Trait` for trait objects
at bindings_with_variant_name detects pattern bindings with the same name as one of the matched variants
at box_pointers use of owned (Box type) heap memory
at cenum_impl_drop_cast a C-like enum implementing Drop is cast
at clashing_extern_declarations detects when an extern fn has been declared with the same name but different types
at coherence_leak_check distinct impls distinguished only by the leak-check code
at conflicting_repr_hints conflicts between `#[repr(..)]` hints that were previously accepted and used in practice
at confusable_idents detects visually confusable pairs between identifiers
at const_err constant evaluation detected erroneous expression
at dead_code detect unused, unexported items
at deprecated detects use of deprecated items
at deprecated_in_future detects use of items that will be deprecated in a future version
at elided_lifetimes_in_paths hidden lifetime parameters in types are deprecated
at ellipsis_inclusive_range_patterns `...` range patterns are deprecated
at explicit_outlives_requirements outlives requirements can be inferred
at exported_private_dependencies public interface leaks type from a private dependency
at ill_formed_attribute_input ill-formed attribute inputs that were previously accepted and used in practice
at illegal_floating_point_literal_pattern floating-point literals cannot be used in patterns
at improper_ctypes proper use of libc types in foreign modules
at improper_ctypes_definitions proper use of libc types in foreign item definitions
at incomplete_features incomplete features that may function improperly in some or all cases
at incomplete_include trailing content in included file
at indirect_structural_match pattern with const indirectly referencing non-structural-match type
at inline_no_sanitize detects incompatible use of `#[inline(always)]` and `#[no_sanitize(...)]`
at intra_doc_link_resolution_failure failures in resolving intra-doc link targets
at invalid_codeblock_attributes codeblock attribute looks a lot like a known one
at invalid_type_param_default type parameter default erroneously allowed in invalid location
at invalid_value an invalid value is being created (such as a NULL reference)
at irrefutable_let_patterns detects irrefutable patterns in if-let and while-let statements
at keyword_idents detects edition keywords being used as an identifier
at late_bound_lifetime_arguments detects generic lifetime arguments in path segments with late bound lifetime parameters
at macro_expanded_macro_exports_accessed_by_absolute_paths macro-expanded `macro_export` macros from the current crate cannot be referred to by absolute paths
at macro_use_extern_crate the `#[macro_use]` attribute is now deprecated in favor of using macros via the module system
at meta_variable_misuse possible meta-variable misuse at macro definition
at missing_copy_implementations detects potentially-forgotten implementations of `Copy`
at missing_crate_level_docs detects crates with no crate-level documentation
at missing_debug_implementations detects missing implementations of Debug
at missing_doc_code_examples detects publicly-exported items without code samples in their documentation
at missing_docs detects missing documentation for public members
at missing_fragment_specifier detects missing fragment specifiers in unused `macro_rules!` patterns
at mixed_script_confusables detects Unicode scripts whose mixed script confusables codepoints are solely used
at mutable_borrow_reservation_conflict reservation of a two-phased borrow conflicts with other shared borrows
at mutable_transmutes mutating transmuted &mut T from &T may cause undefined behavior
at no_mangle_const_items const items will not have their symbols exported
at no_mangle_generic_items generic items must be mangled
at non_ascii_idents detects non-ASCII identifiers
at non_camel_case_types types, variants, traits and type parameters should have camel case names
at non_shorthand_field_patterns using `Struct { x: x }` instead of `Struct { x }` in a pattern
at non_snake_case variables, methods, functions, lifetime parameters and modules should have snake case names
at non_upper_case_globals static constants should have uppercase identifiers
at order_dependent_trait_objects trait-object types were treated as different depending on marker-trait order
at overflowing_literals literal out of range for its type
at overlapping_patterns detects overlapping patterns
at path_statements path statements with no effect
at patterns_in_fns_without_body patterns in functions without body were erroneously allowed
at private_doc_tests detects code samples in docs of private items not documented by rustdoc
at private_in_public detect private items in public interfaces not caught by the old implementation
at proc_macro_derive_resolution_fallback detects proc macro derives using inaccessible names from parent modules
at pub_use_of_private_extern_crate detect public re-exports of private extern crates
at redundant_semicolons detects unnecessary trailing semicolons
at renamed_and_removed_lints lints that have been renamed or removed
at safe_packed_borrows safe borrows of fields of packed structs were erroneously allowed
at single_use_lifetimes detects lifetime parameters that are only used once
at soft_unstable a feature gate that doesn't break dependent crates
at stable_features stable features found in `#[feature]` directive
at trivial_bounds these bounds don't depend on an type parameters
at trivial_casts detects trivial casts which could be removed
at trivial_numeric_casts detects trivial casts of numeric types which could be removed
at type_alias_bounds bounds in type aliases are not enforced
at tyvar_behind_raw_pointer raw pointer to an inference variable
at unaligned_references detects unaligned references to fields of packed structs
at uncommon_codepoints detects uncommon Unicode codepoints in identifiers
at unconditional_panic operation will cause a panic at runtime
at unconditional_recursion functions that cannot return without calling themselves
at unknown_crate_types unknown crate type found in `#[crate_type]` directive
at unknown_lints unrecognized lint attribute
at unnameable_test_items detects an item that cannot be named being marked as `#[test_case]`
at unreachable_code detects unreachable code paths
at unreachable_patterns detects unreachable patterns
at unreachable_pub `pub` items not reachable from crate root
at unsafe_code usage of `unsafe` code
at unsafe_op_in_unsafe_fn unsafe operations in unsafe functions without an explicit unsafe block are deprecated
at unstable_features enabling unstable features (deprecated. do not use)
at unstable_name_collisions detects name collision with an existing but unstable method
at unused_allocation detects unnecessary allocations that can be eliminated
at unused_assignments detect assignments that will never be read
at unused_attributes detects attributes that were not used by the compiler
at unused_braces unnecessary braces around an expression
at unused_comparisons comparisons made useless by limits of the types involved
at unused_crate_dependencies crate dependencies that are never used
at unused_doc_comments detects doc comments that aren't used by rustdoc
at unused_extern_crates extern crates that are never used
at unused_features unused features found in crate-level `#[feature]` directives
at unused_import_braces unnecessary braces around an imported item
at unused_imports imports that are never used
at unused_labels detects labels that are never used
at unused_lifetimes detects lifetime parameters that are never used
at unused_macros detects macros that were not used
at unused_must_use unused result of a type flagged as `#[must_use]`
at unused_mut detect mut variables which don't need to be mutable
at unused_parens `if`, `match`, `while` and `return` do not need parentheses
at unused_qualifications detects unnecessarily qualified names
at unused_results unused result of an expression in a statement
at unused_unsafe unnecessary use of an `unsafe` block
at unused_variables detect variables which are not used in any way
at variant_size_differences detects enums with widely varying variant sizes
at warnings mass-change the level for lints which produce warnings
at where_clauses_object_safety checks the object safety of where clauses
at while_true suggest using `loop { }` instead of `while true { }`
"#]],
)
}
#[test] #[test]
fn no_completion_for_incorrect_derive() { fn no_completion_for_incorrect_derive() {
check( check(

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View file

@ -5,7 +5,7 @@ mod completion_item;
mod completion_context; mod completion_context;
mod presentation; mod presentation;
mod patterns; mod patterns;
mod generated_features; mod generated_lint_completions;
#[cfg(test)] #[cfg(test)]
mod test_utils; mod test_utils;

View file

@ -0,0 +1,105 @@
//Generated file, do not edit by hand, see `xtask/src/codegen`
=== break-outside-of-loop
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L219[diagnostics.rs]
This diagnostic is triggered if `break` keyword is used outside of a loop.
=== incorrect-ident-case
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L319[diagnostics.rs]
This diagnostic is triggered if item name doesn't follow https://doc.rust-lang.org/1.0.0/style/style/naming/README.html[Rust naming convention].
=== mismatched-arg-count
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L267[diagnostics.rs]
This diagnostic is triggered if function is invoked with an incorrect amount of arguments.
=== missing-match-arm
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L162[diagnostics.rs]
This diagnostic is triggered if `match` block is missing one or more match arms.
=== missing-ok-in-tail-expr
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L187[diagnostics.rs]
This diagnostic is triggered if block that should return `Result` returns a value not wrapped in `Ok`.
Example:
```rust
fn foo() -> Result<u8, ()> {
10
}
```
=== missing-pat-fields
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L113[diagnostics.rs]
This diagnostic is triggered if pattern lacks some fields that exist in the corresponding structure.
Example:
```rust
struct A { a: u8, b: u8 }
let a = A { a: 10, b: 20 };
if let A { a } = a {
// ...
}
```
=== missing-structure-fields
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L66[diagnostics.rs]
This diagnostic is triggered if record lacks some fields that exist in the corresponding structure.
Example:
```rust
struct A { a: u8, b: u8 }
let a = A { a: 10 };
```
=== missing-unsafe
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L243[diagnostics.rs]
This diagnostic is triggered if operation marked as `unsafe` is used outside of `unsafe` function or block.
=== no-such-field
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_ty/src/diagnostics.rs#L39[diagnostics.rs]
This diagnostic is triggered if created structure does not have field provided in record.
=== unconfigured-code
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_def/src/diagnostics.rs#L90[diagnostics.rs]
This diagnostic is shown for code with inactive `#[cfg]` attributes.
=== unresolved-extern-crate
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_def/src/diagnostics.rs#L35[diagnostics.rs]
This diagnostic is triggered if rust-analyzer is unable to discover referred extern crate.
=== unresolved-import
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_def/src/diagnostics.rs#L59[diagnostics.rs]
This diagnostic is triggered if rust-analyzer is unable to discover imported module.
=== unresolved-module
**Source:** https://github.com/rust-analyzer/rust-analyzer/blob/master/crates/hir_def/src/diagnostics.rs#L10[diagnostics.rs]
This diagnostic is triggered if rust-analyzer is unable to discover referred module.

View file

@ -9,7 +9,7 @@ mod gen_syntax;
mod gen_parser_tests; mod gen_parser_tests;
mod gen_assists_docs; mod gen_assists_docs;
mod gen_feature_docs; mod gen_feature_docs;
mod gen_features; mod gen_lint_completions;
mod gen_diagnostic_docs; mod gen_diagnostic_docs;
use std::{ use std::{
@ -24,7 +24,7 @@ pub use self::{
gen_assists_docs::{generate_assists_docs, generate_assists_tests}, gen_assists_docs::{generate_assists_docs, generate_assists_tests},
gen_diagnostic_docs::generate_diagnostic_docs, gen_diagnostic_docs::generate_diagnostic_docs,
gen_feature_docs::generate_feature_docs, gen_feature_docs::generate_feature_docs,
gen_features::generate_features, gen_lint_completions::generate_lint_completions,
gen_parser_tests::generate_parser_tests, gen_parser_tests::generate_parser_tests,
gen_syntax::generate_syntax, gen_syntax::generate_syntax,
}; };
@ -42,7 +42,7 @@ pub struct CodegenCmd {
impl CodegenCmd { impl CodegenCmd {
pub fn run(self) -> Result<()> { pub fn run(self) -> Result<()> {
if self.features { if self.features {
generate_features(Mode::Overwrite)?; generate_lint_completions(Mode::Overwrite)?;
} }
generate_syntax(Mode::Overwrite)?; generate_syntax(Mode::Overwrite)?;
generate_parser_tests(Mode::Overwrite)?; generate_parser_tests(Mode::Overwrite)?;

View file

@ -0,0 +1,113 @@
//! Generates descriptors structure for unstable feature from Unstable Book
use std::path::{Path, PathBuf};
use quote::quote;
use walkdir::WalkDir;
use xshell::{cmd, read_file};
use crate::{
codegen::{project_root, reformat, update, Mode, Result},
run_rustfmt,
};
pub fn generate_lint_completions(mode: Mode) -> Result<()> {
if !Path::new("./target/rust").exists() {
cmd!("git clone --depth=1 https://github.com/rust-lang/rust ./target/rust").run()?;
}
let ts_features = generate_descriptor("./target/rust/src/doc/unstable-book/src".into())?;
cmd!("curl http://rust-lang.github.io/rust-clippy/master/lints.json --output ./target/clippy_lints.json").run()?;
let ts_clippy = generate_descriptor_clippy(&Path::new("./target/clippy_lints.json"))?;
let ts = quote! {
use crate::complete_attribute::LintCompletion;
#ts_features
#ts_clippy
};
let contents = reformat(ts.to_string().as_str())?;
let destination = project_root().join("crates/completion/src/generated_lint_completions.rs");
update(destination.as_path(), &contents, mode)?;
run_rustfmt(mode)?;
Ok(())
}
fn generate_descriptor(src_dir: PathBuf) -> Result<proc_macro2::TokenStream> {
let definitions = ["language-features", "library-features"]
.iter()
.flat_map(|it| WalkDir::new(src_dir.join(it)))
.filter_map(|e| e.ok())
.filter(|entry| {
// Get all `.md ` files
entry.file_type().is_file() && entry.path().extension().unwrap_or_default() == "md"
})
.map(|entry| {
let path = entry.path();
let feature_ident = path.file_stem().unwrap().to_str().unwrap().replace("-", "_");
let doc = read_file(path).unwrap();
quote! { LintCompletion { label: #feature_ident, description: #doc } }
});
let ts = quote! {
pub(super) const FEATURES: &[LintCompletion] = &[
#(#definitions),*
];
};
Ok(ts)
}
#[derive(Default)]
struct ClippyLint {
help: String,
id: String,
}
fn generate_descriptor_clippy(path: &Path) -> Result<proc_macro2::TokenStream> {
let file_content = read_file(path)?;
let mut clippy_lints: Vec<ClippyLint> = vec![];
for line in file_content.lines().map(|line| line.trim()) {
if line.starts_with(r#""id":"#) {
let clippy_lint = ClippyLint {
id: line
.strip_prefix(r#""id": ""#)
.expect("should be prefixed by id")
.strip_suffix(r#"","#)
.expect("should be suffixed by comma")
.into(),
help: String::new(),
};
clippy_lints.push(clippy_lint)
} else if line.starts_with(r#""What it does":"#) {
// Typical line to strip: "What is doest": "Here is my useful content",
let prefix_to_strip = r#""What it does": ""#;
let suffix_to_strip = r#"","#;
let clippy_lint = clippy_lints.last_mut().expect("clippy lint must already exist");
clippy_lint.help = line
.strip_prefix(prefix_to_strip)
.expect("should be prefixed by what it does")
.strip_suffix(suffix_to_strip)
.expect("should be suffixed by comma")
.into();
}
}
let definitions = clippy_lints.into_iter().map(|clippy_lint| {
let lint_ident = format!("clippy::{}", clippy_lint.id);
let doc = clippy_lint.help;
quote! { LintCompletion { label: #lint_ident, description: #doc } }
});
let ts = quote! {
pub(super) const CLIPPY_LINTS: &[LintCompletion] = &[
#(#definitions),*
];
};
Ok(ts)
}

View file

@ -131,6 +131,14 @@ https://github.blog/2015-06-08-how-to-undo-almost-anything-with-git/#redo-after-
} }
fn deny_clippy(path: &PathBuf, text: &String) { fn deny_clippy(path: &PathBuf, text: &String) {
let ignore = &[
// The documentation in string literals may contain anything for its own purposes
"completion/src/generated_lint_completions.rs",
];
if ignore.iter().any(|p| path.ends_with(p)) {
return;
}
if text.contains("[\u{61}llow(clippy") { if text.contains("[\u{61}llow(clippy") {
panic!( panic!(
"\n\nallowing lints is forbidden: {}. "\n\nallowing lints is forbidden: {}.
@ -214,7 +222,7 @@ fn check_todo(path: &Path, text: &str) {
// `ast::make`. // `ast::make`.
"ast/make.rs", "ast/make.rs",
// The documentation in string literals may contain anything for its own purposes // The documentation in string literals may contain anything for its own purposes
"completion/src/generated_features.rs", "completion/src/generated_lint_completions.rs",
]; ];
if need_todo.iter().any(|p| path.ends_with(p)) { if need_todo.iter().any(|p| path.ends_with(p)) {
return; return;