2019-07-15 05:35:02 +00:00
|
|
|
#![cfg_attr(feature = "deny-warnings", deny(warnings))]
|
2017-09-18 10:47:33 +00:00
|
|
|
#![feature(rustc_private)]
|
|
|
|
|
2018-09-15 07:21:58 +00:00
|
|
|
// FIXME: switch to something more ergonomic here, once available.
|
2019-01-31 01:15:29 +00:00
|
|
|
// (Currently there is no way to opt into sysroot crates without `extern crate`.)
|
2018-09-15 07:21:58 +00:00
|
|
|
#[allow(unused_extern_crates)]
|
2019-09-27 05:09:12 +00:00
|
|
|
extern crate rustc;
|
|
|
|
#[allow(unused_extern_crates)]
|
2018-09-15 07:21:58 +00:00
|
|
|
extern crate rustc_driver;
|
|
|
|
#[allow(unused_extern_crates)]
|
2019-09-27 05:09:12 +00:00
|
|
|
extern crate rustc_errors;
|
|
|
|
#[allow(unused_extern_crates)]
|
2019-02-01 22:28:14 +00:00
|
|
|
extern crate rustc_interface;
|
2018-09-15 07:21:58 +00:00
|
|
|
|
2019-09-27 05:09:12 +00:00
|
|
|
use rustc::ty::TyCtxt;
|
2019-02-01 22:28:14 +00:00
|
|
|
use rustc_interface::interface;
|
2019-04-30 09:10:31 +00:00
|
|
|
use rustc_tools_util::*;
|
|
|
|
|
2019-09-27 05:09:12 +00:00
|
|
|
use lazy_static::lazy_static;
|
|
|
|
use std::borrow::Cow;
|
|
|
|
use std::panic;
|
2019-07-12 12:13:15 +00:00
|
|
|
use std::path::{Path, PathBuf};
|
2018-12-14 09:15:56 +00:00
|
|
|
use std::process::{exit, Command};
|
2017-09-18 10:47:33 +00:00
|
|
|
|
2019-06-05 00:32:03 +00:00
|
|
|
mod lintlist;
|
|
|
|
|
2019-01-15 18:56:09 +00:00
|
|
|
/// If a command-line option matches `find_arg`, then apply the predicate `pred` on its value. If
|
|
|
|
/// true, then return it. The parameter is assumed to be either `--arg=value` or `--arg value`.
|
|
|
|
fn arg_value<'a>(
|
|
|
|
args: impl IntoIterator<Item = &'a String>,
|
|
|
|
find_arg: &str,
|
|
|
|
pred: impl Fn(&str) -> bool,
|
|
|
|
) -> Option<&'a str> {
|
|
|
|
let mut args = args.into_iter().map(String::as_str);
|
|
|
|
|
|
|
|
while let Some(arg) = args.next() {
|
|
|
|
let arg: Vec<_> = arg.splitn(2, '=').collect();
|
|
|
|
if arg.get(0) != Some(&find_arg) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
let value = arg.get(1).cloned().or_else(|| args.next());
|
|
|
|
if value.as_ref().map_or(false, |p| pred(p)) {
|
|
|
|
return value;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_arg_value() {
|
|
|
|
let args: Vec<_> = ["--bar=bar", "--foobar", "123", "--foo"]
|
|
|
|
.iter()
|
2019-02-10 12:35:44 +00:00
|
|
|
.map(std::string::ToString::to_string)
|
2019-01-15 18:56:09 +00:00
|
|
|
.collect();
|
|
|
|
|
|
|
|
assert_eq!(arg_value(None, "--foobar", |_| true), None);
|
|
|
|
assert_eq!(arg_value(&args, "--bar", |_| false), None);
|
|
|
|
assert_eq!(arg_value(&args, "--bar", |_| true), Some("bar"));
|
|
|
|
assert_eq!(arg_value(&args, "--bar", |p| p == "bar"), Some("bar"));
|
|
|
|
assert_eq!(arg_value(&args, "--bar", |p| p == "foo"), None);
|
|
|
|
assert_eq!(arg_value(&args, "--foobar", |p| p == "foo"), None);
|
|
|
|
assert_eq!(arg_value(&args, "--foobar", |p| p == "123"), Some("123"));
|
|
|
|
assert_eq!(arg_value(&args, "--foo", |_| true), None);
|
|
|
|
}
|
|
|
|
|
2019-01-13 15:19:02 +00:00
|
|
|
#[allow(clippy::too_many_lines)]
|
2019-02-01 22:28:14 +00:00
|
|
|
|
|
|
|
struct ClippyCallbacks;
|
|
|
|
|
|
|
|
impl rustc_driver::Callbacks for ClippyCallbacks {
|
2019-10-11 01:46:22 +00:00
|
|
|
fn config(&mut self, config: &mut interface::Config) {
|
|
|
|
let previous = config.register_lints.take();
|
|
|
|
config.register_lints = Some(Box::new(move |sess, mut lint_store| {
|
|
|
|
// technically we're ~guaranteed that this is none but might as well call anything that
|
|
|
|
// is there already. Certainly it can't hurt.
|
|
|
|
if let Some(previous) = &previous {
|
|
|
|
(previous)(sess, lint_store);
|
|
|
|
}
|
|
|
|
|
|
|
|
let conf = clippy_lints::read_conf(&[], &sess);
|
|
|
|
clippy_lints::register_plugins(&mut lint_store, &sess, &conf);
|
|
|
|
clippy_lints::register_pre_expansion_lints(&mut lint_store, &conf);
|
|
|
|
clippy_lints::register_renamed(&mut lint_store);
|
|
|
|
}));
|
2019-11-22 13:24:38 +00:00
|
|
|
|
2019-11-23 00:26:19 +00:00
|
|
|
// FIXME: #4825; This is required, because Clippy lints that are based on MIR have to be
|
|
|
|
// run on the unoptimized MIR. On the other hand this results in some false negatives. If
|
|
|
|
// MIR passes can be enabled / disabled separately, we should figure out, what passes to
|
|
|
|
// use for Clippy.
|
2019-11-22 13:24:38 +00:00
|
|
|
config.opts.debugging_opts.mir_opt_level = 0;
|
2019-02-01 22:28:14 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-10 22:47:31 +00:00
|
|
|
#[allow(clippy::find_map, clippy::filter_map)]
|
2019-06-08 21:19:16 +00:00
|
|
|
fn describe_lints() {
|
|
|
|
use lintlist::*;
|
2019-06-08 21:49:33 +00:00
|
|
|
use std::collections::HashSet;
|
2018-11-27 20:12:13 +00:00
|
|
|
|
2019-06-08 21:19:16 +00:00
|
|
|
println!(
|
|
|
|
"
|
|
|
|
Available lint options:
|
|
|
|
-W <foo> Warn about <foo>
|
|
|
|
-A <foo> Allow <foo>
|
|
|
|
-D <foo> Deny <foo>
|
|
|
|
-F <foo> Forbid <foo> (deny <foo> and all attempts to override)
|
2018-11-27 20:12:13 +00:00
|
|
|
|
2019-06-08 21:19:16 +00:00
|
|
|
"
|
|
|
|
);
|
|
|
|
|
2019-06-09 00:08:16 +00:00
|
|
|
let lint_level = |lint: &Lint| {
|
|
|
|
LINT_LEVELS
|
|
|
|
.iter()
|
|
|
|
.find(|level_mapping| level_mapping.0 == lint.group)
|
2019-06-10 22:47:31 +00:00
|
|
|
.map(|(_, level)| match level {
|
|
|
|
Level::Allow => "allow",
|
|
|
|
Level::Warn => "warn",
|
|
|
|
Level::Deny => "deny",
|
2019-06-10 18:03:51 +00:00
|
|
|
})
|
2019-06-09 00:08:16 +00:00
|
|
|
.unwrap()
|
|
|
|
};
|
|
|
|
|
2019-06-08 21:19:16 +00:00
|
|
|
let mut lints: Vec<_> = ALL_LINTS.iter().collect();
|
|
|
|
// The sort doesn't case-fold but it's doubtful we care.
|
2019-06-09 00:08:16 +00:00
|
|
|
lints.sort_by_cached_key(|x: &&Lint| (lint_level(x), x.name));
|
2019-06-08 21:19:16 +00:00
|
|
|
|
2019-06-10 22:47:31 +00:00
|
|
|
let max_lint_name_len = lints
|
2019-06-08 21:19:16 +00:00
|
|
|
.iter()
|
|
|
|
.map(|lint| lint.name.len())
|
|
|
|
.map(|len| len + "clippy::".len())
|
|
|
|
.max()
|
|
|
|
.unwrap_or(0);
|
|
|
|
|
|
|
|
let padded = |x: &str| {
|
2019-06-10 22:47:31 +00:00
|
|
|
let mut s = " ".repeat(max_lint_name_len - x.chars().count());
|
2019-06-08 21:19:16 +00:00
|
|
|
s.push_str(x);
|
|
|
|
s
|
|
|
|
};
|
|
|
|
|
|
|
|
let scoped = |x: &str| format!("clippy::{}", x);
|
|
|
|
|
2019-06-08 21:49:33 +00:00
|
|
|
let lint_groups: HashSet<_> = lints.iter().map(|lint| lint.group).collect();
|
|
|
|
|
2019-06-08 21:19:16 +00:00
|
|
|
println!("Lint checks provided by clippy:\n");
|
|
|
|
println!(" {} {:7.7} meaning", padded("name"), "default");
|
|
|
|
println!(" {} {:7.7} -------", padded("----"), "-------");
|
|
|
|
|
2019-06-08 21:49:33 +00:00
|
|
|
let print_lints = |lints: &[&Lint]| {
|
2019-06-08 21:19:16 +00:00
|
|
|
for lint in lints {
|
|
|
|
let name = lint.name.replace("_", "-");
|
2019-06-10 18:14:54 +00:00
|
|
|
println!(
|
|
|
|
" {} {:7.7} {}",
|
|
|
|
padded(&scoped(&name)),
|
|
|
|
lint_level(lint),
|
|
|
|
lint.desc
|
|
|
|
);
|
2019-06-08 21:19:16 +00:00
|
|
|
}
|
|
|
|
println!("\n");
|
|
|
|
};
|
|
|
|
|
2019-06-08 21:49:33 +00:00
|
|
|
print_lints(&lints);
|
|
|
|
|
2019-06-10 22:47:31 +00:00
|
|
|
let max_group_name_len = std::cmp::max(
|
2019-06-12 19:29:23 +00:00
|
|
|
"clippy::all".len(),
|
2019-06-08 21:49:33 +00:00
|
|
|
lint_groups
|
|
|
|
.iter()
|
|
|
|
.map(|group| group.len())
|
|
|
|
.map(|len| len + "clippy::".len())
|
|
|
|
.max()
|
|
|
|
.unwrap_or(0),
|
|
|
|
);
|
|
|
|
|
2019-06-10 22:47:31 +00:00
|
|
|
let padded_group = |x: &str| {
|
|
|
|
let mut s = " ".repeat(max_group_name_len - x.chars().count());
|
2019-06-08 21:49:33 +00:00
|
|
|
s.push_str(x);
|
|
|
|
s
|
|
|
|
};
|
|
|
|
|
2019-06-10 18:03:51 +00:00
|
|
|
println!("Lint groups provided by clippy:\n");
|
2019-06-10 22:47:31 +00:00
|
|
|
println!(" {} sub-lints", padded_group("name"));
|
|
|
|
println!(" {} ---------", padded_group("----"));
|
|
|
|
println!(" {} the set of all clippy lints", padded_group("clippy::all"));
|
2019-06-08 21:49:33 +00:00
|
|
|
|
|
|
|
let print_lint_groups = || {
|
|
|
|
for group in lint_groups {
|
|
|
|
let name = group.to_lowercase().replace("_", "-");
|
2019-06-09 00:08:16 +00:00
|
|
|
let desc = lints
|
|
|
|
.iter()
|
2019-06-08 21:49:33 +00:00
|
|
|
.filter(|&lint| lint.group == group)
|
|
|
|
.map(|lint| lint.name)
|
|
|
|
.map(|name| name.replace("_", "-"))
|
|
|
|
.collect::<Vec<String>>()
|
|
|
|
.join(", ");
|
2019-06-10 22:47:31 +00:00
|
|
|
println!(" {} {}", padded_group(&scoped(&name)), desc);
|
2019-06-08 21:49:33 +00:00
|
|
|
}
|
|
|
|
println!("\n");
|
|
|
|
};
|
|
|
|
|
|
|
|
print_lint_groups();
|
2019-06-08 21:19:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fn display_help() {
|
|
|
|
println!(
|
|
|
|
"\
|
2019-06-05 00:32:03 +00:00
|
|
|
Checks a package to catch common mistakes and improve your Rust code.
|
|
|
|
|
|
|
|
Usage:
|
|
|
|
cargo clippy [options] [--] [<opts>...]
|
|
|
|
|
|
|
|
Common options:
|
|
|
|
-h, --help Print this message
|
|
|
|
-V, --version Print version info and exit
|
|
|
|
|
|
|
|
Other options are the same as `cargo check`.
|
|
|
|
|
|
|
|
To allow or deny a lint from the command line you can use `cargo clippy --`
|
|
|
|
with:
|
|
|
|
|
|
|
|
-W --warn OPT Set lint warnings
|
|
|
|
-A --allow OPT Set lint allowed
|
|
|
|
-D --deny OPT Set lint denied
|
|
|
|
-F --forbid OPT Set lint forbidden
|
|
|
|
|
|
|
|
You can use tool lints to allow or deny lints from your code, eg.:
|
|
|
|
|
|
|
|
#[allow(clippy::needless_lifetimes)]
|
|
|
|
"
|
2019-06-08 21:19:16 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2019-09-27 05:09:12 +00:00
|
|
|
const BUG_REPORT_URL: &str = "https://github.com/rust-lang/rust-clippy/issues/new";
|
|
|
|
|
|
|
|
lazy_static! {
|
|
|
|
static ref ICE_HOOK: Box<dyn Fn(&panic::PanicInfo<'_>) + Sync + Send + 'static> = {
|
|
|
|
let hook = panic::take_hook();
|
|
|
|
panic::set_hook(Box::new(|info| report_clippy_ice(info, BUG_REPORT_URL)));
|
|
|
|
hook
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
fn report_clippy_ice(info: &panic::PanicInfo<'_>, bug_report_url: &str) {
|
|
|
|
// Invoke our ICE handler, which prints the actual panic message and optionally a backtrace
|
|
|
|
(*ICE_HOOK)(info);
|
|
|
|
|
|
|
|
// Separate the output with an empty line
|
|
|
|
eprintln!();
|
|
|
|
|
|
|
|
let emitter = Box::new(rustc_errors::emitter::EmitterWriter::stderr(
|
|
|
|
rustc_errors::ColorConfig::Auto,
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
));
|
|
|
|
let handler = rustc_errors::Handler::with_emitter(true, None, emitter);
|
|
|
|
|
|
|
|
// a .span_bug or .bug call has already printed what
|
|
|
|
// it wants to print.
|
|
|
|
if !info.payload().is::<rustc_errors::ExplicitBug>() {
|
|
|
|
let d = rustc_errors::Diagnostic::new(rustc_errors::Level::Bug, "unexpected panic");
|
|
|
|
handler.emit_diagnostic(&d);
|
|
|
|
handler.abort_if_errors_and_should_abort();
|
|
|
|
}
|
|
|
|
|
2019-09-27 05:25:16 +00:00
|
|
|
let version_info = rustc_tools_util::get_version_info!();
|
|
|
|
|
2019-09-27 05:09:12 +00:00
|
|
|
let xs: Vec<Cow<'static, str>> = vec![
|
|
|
|
"the compiler unexpectedly panicked. this is a bug.".into(),
|
|
|
|
format!("we would appreciate a bug report: {}", bug_report_url).into(),
|
2019-09-27 05:25:16 +00:00
|
|
|
format!("Clippy version: {}", version_info).into(),
|
2019-09-27 05:09:12 +00:00
|
|
|
];
|
|
|
|
|
|
|
|
for note in &xs {
|
|
|
|
handler.note_without_error(¬e);
|
|
|
|
}
|
|
|
|
|
|
|
|
// If backtraces are enabled, also print the query stack
|
2019-10-09 18:51:45 +00:00
|
|
|
let backtrace = std::env::var_os("RUST_BACKTRACE").map_or(false, |x| &x != "0");
|
2019-09-27 05:09:12 +00:00
|
|
|
|
|
|
|
if backtrace {
|
2019-10-08 19:23:57 +00:00
|
|
|
TyCtxt::try_print_query_stack(&handler);
|
2019-09-27 05:09:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-08 21:19:16 +00:00
|
|
|
pub fn main() {
|
|
|
|
rustc_driver::init_rustc_env_logger();
|
2019-09-27 05:09:12 +00:00
|
|
|
lazy_static::initialize(&ICE_HOOK);
|
2019-06-08 21:19:16 +00:00
|
|
|
exit(
|
2019-09-15 18:07:44 +00:00
|
|
|
rustc_driver::catch_fatal_errors(move || {
|
2019-06-08 21:19:16 +00:00
|
|
|
use std::env;
|
2019-06-05 00:32:03 +00:00
|
|
|
|
2019-06-08 21:19:16 +00:00
|
|
|
if std::env::args().any(|a| a == "--version" || a == "-V") {
|
|
|
|
let version_info = rustc_tools_util::get_version_info!();
|
|
|
|
println!("{}", version_info);
|
2019-06-05 00:32:03 +00:00
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
|
2019-01-15 19:39:23 +00:00
|
|
|
let mut orig_args: Vec<String> = env::args().collect();
|
|
|
|
|
|
|
|
// Get the sysroot, looking from most specific to this invocation to the least:
|
|
|
|
// - command line
|
|
|
|
// - runtime environment
|
|
|
|
// - SYSROOT
|
|
|
|
// - RUSTUP_HOME, MULTIRUST_HOME, RUSTUP_TOOLCHAIN, MULTIRUST_TOOLCHAIN
|
|
|
|
// - sysroot from rustc in the path
|
|
|
|
// - compile-time environment
|
|
|
|
let sys_root_arg = arg_value(&orig_args, "--sysroot", |_| true);
|
|
|
|
let have_sys_root_arg = sys_root_arg.is_some();
|
|
|
|
let sys_root = sys_root_arg
|
2019-07-12 12:13:15 +00:00
|
|
|
.map(PathBuf::from)
|
|
|
|
.or_else(|| std::env::var("SYSROOT").ok().map(PathBuf::from))
|
2018-12-14 09:15:56 +00:00
|
|
|
.or_else(|| {
|
|
|
|
let home = option_env!("RUSTUP_HOME").or(option_env!("MULTIRUST_HOME"));
|
|
|
|
let toolchain = option_env!("RUSTUP_TOOLCHAIN").or(option_env!("MULTIRUST_TOOLCHAIN"));
|
2019-07-12 12:13:15 +00:00
|
|
|
home.and_then(|home| {
|
|
|
|
toolchain.map(|toolchain| {
|
|
|
|
let mut path = PathBuf::from(home);
|
|
|
|
path.push("toolchains");
|
|
|
|
path.push(toolchain);
|
|
|
|
path
|
|
|
|
})
|
|
|
|
})
|
2018-12-14 09:15:56 +00:00
|
|
|
})
|
|
|
|
.or_else(|| {
|
|
|
|
Command::new("rustc")
|
|
|
|
.arg("--print")
|
|
|
|
.arg("sysroot")
|
|
|
|
.output()
|
|
|
|
.ok()
|
|
|
|
.and_then(|out| String::from_utf8(out.stdout).ok())
|
2019-07-12 12:13:15 +00:00
|
|
|
.map(|s| PathBuf::from(s.trim()))
|
2018-12-14 09:15:56 +00:00
|
|
|
})
|
2019-07-12 12:13:15 +00:00
|
|
|
.or_else(|| option_env!("SYSROOT").map(PathBuf::from))
|
|
|
|
.map(|pb| pb.to_string_lossy().to_string())
|
2018-12-14 09:15:56 +00:00
|
|
|
.expect("need to specify SYSROOT env var during clippy compilation, or use rustup or multirust");
|
|
|
|
|
2018-11-27 20:12:13 +00:00
|
|
|
// Setting RUSTC_WRAPPER causes Cargo to pass 'rustc' as the first argument.
|
|
|
|
// We're invoking the compiler programmatically, so we ignore this/
|
2019-11-13 01:27:43 +00:00
|
|
|
let wrapper_mode = orig_args.get(1).map(Path::new).and_then(Path::file_stem) == Some("rustc".as_ref());
|
2019-06-08 21:19:16 +00:00
|
|
|
|
|
|
|
if wrapper_mode {
|
2018-11-27 20:12:13 +00:00
|
|
|
// we still want to be able to invoke it normally though
|
2018-12-14 09:15:56 +00:00
|
|
|
orig_args.remove(1);
|
2018-11-27 20:12:13 +00:00
|
|
|
}
|
2019-06-08 21:19:16 +00:00
|
|
|
|
2019-11-13 01:27:43 +00:00
|
|
|
if !wrapper_mode && (orig_args.iter().any(|a| a == "--help" || a == "-h") || orig_args.len() == 1) {
|
2019-06-08 21:19:16 +00:00
|
|
|
display_help();
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
|
2019-06-08 21:49:33 +00:00
|
|
|
let should_describe_lints = || {
|
|
|
|
let args: Vec<_> = std::env::args().collect();
|
|
|
|
args.windows(2).any(|args| {
|
2019-06-08 21:19:16 +00:00
|
|
|
args[1] == "help"
|
|
|
|
&& match args[0].as_str() {
|
|
|
|
"-W" | "-A" | "-D" | "-F" => true,
|
|
|
|
_ => false,
|
|
|
|
}
|
|
|
|
})
|
2019-06-08 21:49:33 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
if !wrapper_mode && should_describe_lints() {
|
2019-06-08 21:19:16 +00:00
|
|
|
describe_lints();
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
|
2018-12-14 09:15:56 +00:00
|
|
|
// this conditional check for the --sysroot flag is there so users can call
|
|
|
|
// `clippy_driver` directly
|
|
|
|
// without having to pass --sysroot or anything
|
2019-01-15 19:39:23 +00:00
|
|
|
let mut args: Vec<String> = if have_sys_root_arg {
|
2018-12-14 09:15:56 +00:00
|
|
|
orig_args.clone()
|
|
|
|
} else {
|
|
|
|
orig_args
|
|
|
|
.clone()
|
|
|
|
.into_iter()
|
|
|
|
.chain(Some("--sysroot".to_owned()))
|
|
|
|
.chain(Some(sys_root))
|
|
|
|
.collect()
|
|
|
|
};
|
2018-11-27 20:12:13 +00:00
|
|
|
|
|
|
|
// this check ensures that dependencies are built but not linted and the final
|
2019-11-23 01:08:36 +00:00
|
|
|
// crate is linted but not built
|
2019-11-26 14:14:28 +00:00
|
|
|
let clippy_enabled = env::var("CLIPPY_TESTS").map_or(false, |val| val == "true")
|
2019-11-23 01:08:36 +00:00
|
|
|
|| arg_value(&orig_args, "--cap-lints", |val| val == "allow").is_none();
|
2018-11-27 20:12:13 +00:00
|
|
|
|
|
|
|
if clippy_enabled {
|
|
|
|
args.extend_from_slice(&["--cfg".to_owned(), r#"feature="cargo-clippy""#.to_owned()]);
|
|
|
|
if let Ok(extra_args) = env::var("CLIPPY_ARGS") {
|
|
|
|
args.extend(extra_args.split("__CLIPPY_HACKERY__").filter_map(|s| {
|
|
|
|
if s.is_empty() {
|
2018-09-14 10:56:25 +00:00
|
|
|
None
|
|
|
|
} else {
|
|
|
|
Some(s.to_string())
|
2018-11-27 20:12:13 +00:00
|
|
|
}
|
|
|
|
}));
|
2018-08-26 13:49:08 +00:00
|
|
|
}
|
2018-11-27 20:12:13 +00:00
|
|
|
}
|
2018-06-07 20:03:15 +00:00
|
|
|
|
2019-02-01 22:28:14 +00:00
|
|
|
let mut clippy = ClippyCallbacks;
|
|
|
|
let mut default = rustc_driver::DefaultCallbacks;
|
2019-03-10 11:00:17 +00:00
|
|
|
let callbacks: &mut (dyn rustc_driver::Callbacks + Send) =
|
|
|
|
if clippy_enabled { &mut clippy } else { &mut default };
|
2018-11-27 20:12:13 +00:00
|
|
|
let args = args;
|
2019-02-01 22:28:14 +00:00
|
|
|
rustc_driver::run_compiler(&args, callbacks, None, None)
|
2019-03-10 11:00:17 +00:00
|
|
|
})
|
|
|
|
.and_then(|result| result)
|
|
|
|
.is_err() as i32,
|
2018-11-27 20:12:13 +00:00
|
|
|
)
|
2017-09-18 10:47:33 +00:00
|
|
|
}
|