2018-05-30 08:15:50 +00:00
|
|
|
use crate::utils::span_lint;
|
2018-12-29 15:04:45 +00:00
|
|
|
use rustc::lint::{EarlyContext, EarlyLintPass, LintArray, LintPass};
|
|
|
|
use rustc::{declare_tool_lint, lint_array};
|
|
|
|
use syntax::ast::*;
|
|
|
|
use syntax::source_map::Span;
|
|
|
|
use syntax::symbol::LocalInternedString;
|
2016-04-19 23:27:01 +00:00
|
|
|
|
2016-08-06 07:55:04 +00:00
|
|
|
/// **What it does:** Checks for imports that remove "unsafe" from an item's
|
|
|
|
/// name.
|
2016-04-19 23:27:01 +00:00
|
|
|
///
|
2016-08-06 07:55:04 +00:00
|
|
|
/// **Why is this bad?** Renaming makes it less clear which traits and
|
|
|
|
/// structures are unsafe.
|
2016-04-19 23:27:01 +00:00
|
|
|
///
|
|
|
|
/// **Known problems:** None.
|
|
|
|
///
|
|
|
|
/// **Example:**
|
|
|
|
/// ```rust,ignore
|
|
|
|
/// use std::cell::{UnsafeCell as TotallySafeCell};
|
|
|
|
///
|
|
|
|
/// extern crate crossbeam;
|
|
|
|
/// use crossbeam::{spawn_unsafe as spawn};
|
|
|
|
/// ```
|
2018-03-28 13:24:26 +00:00
|
|
|
declare_clippy_lint! {
|
2016-04-19 23:27:01 +00:00
|
|
|
pub UNSAFE_REMOVED_FROM_NAME,
|
2018-03-28 13:24:26 +00:00
|
|
|
style,
|
2016-08-06 08:18:36 +00:00
|
|
|
"`unsafe` removed from API names on import"
|
2016-04-19 23:27:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pub struct UnsafeNameRemoval;
|
|
|
|
|
|
|
|
impl LintPass for UnsafeNameRemoval {
|
|
|
|
fn get_lints(&self) -> LintArray {
|
|
|
|
lint_array!(UNSAFE_REMOVED_FROM_NAME)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-01 21:31:56 +00:00
|
|
|
impl EarlyLintPass for UnsafeNameRemoval {
|
2018-07-23 11:01:12 +00:00
|
|
|
fn check_item(&mut self, cx: &EarlyContext<'_>, item: &Item) {
|
2017-12-02 09:23:32 +00:00
|
|
|
if let ItemKind::Use(ref use_tree) = item.node {
|
2018-05-31 18:15:48 +00:00
|
|
|
check_use_tree(use_tree, cx, item.span);
|
2017-12-02 09:23:32 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-23 11:01:12 +00:00
|
|
|
fn check_use_tree(use_tree: &UseTree, cx: &EarlyContext<'_>, span: Span) {
|
2017-12-02 09:23:32 +00:00
|
|
|
match use_tree.kind {
|
2018-06-18 07:55:59 +00:00
|
|
|
UseTreeKind::Simple(Some(new_name), ..) => {
|
2017-12-02 09:23:32 +00:00
|
|
|
let old_name = use_tree
|
|
|
|
.prefix
|
|
|
|
.segments
|
|
|
|
.last()
|
|
|
|
.expect("use paths cannot be empty")
|
2018-04-07 05:22:23 +00:00
|
|
|
.ident;
|
2017-12-02 09:23:32 +00:00
|
|
|
unsafe_to_safe_check(old_name, new_name, cx, span);
|
2018-11-27 20:14:15 +00:00
|
|
|
},
|
|
|
|
UseTreeKind::Simple(None, ..) | UseTreeKind::Glob => {},
|
2017-12-02 09:23:32 +00:00
|
|
|
UseTreeKind::Nested(ref nested_use_tree) => {
|
|
|
|
for &(ref use_tree, _) in nested_use_tree {
|
|
|
|
check_use_tree(use_tree, cx, span);
|
2016-04-19 23:27:01 +00:00
|
|
|
}
|
2018-11-27 20:14:15 +00:00
|
|
|
},
|
2016-04-19 23:27:01 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-23 11:01:12 +00:00
|
|
|
fn unsafe_to_safe_check(old_name: Ident, new_name: Ident, cx: &EarlyContext<'_>, span: Span) {
|
2016-12-01 21:31:56 +00:00
|
|
|
let old_str = old_name.name.as_str();
|
|
|
|
let new_str = new_name.name.as_str();
|
2016-04-19 23:27:01 +00:00
|
|
|
if contains_unsafe(&old_str) && !contains_unsafe(&new_str) {
|
2017-08-09 07:30:56 +00:00
|
|
|
span_lint(
|
|
|
|
cx,
|
|
|
|
UNSAFE_REMOVED_FROM_NAME,
|
2018-05-31 18:15:48 +00:00
|
|
|
span,
|
2018-11-27 20:14:15 +00:00
|
|
|
&format!(
|
|
|
|
"removed \"unsafe\" from the name of `{}` in use as `{}`",
|
|
|
|
old_str, new_str
|
|
|
|
),
|
2017-08-09 07:30:56 +00:00
|
|
|
);
|
2016-04-19 23:27:01 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-28 10:56:31 +00:00
|
|
|
fn contains_unsafe(name: &LocalInternedString) -> bool {
|
2016-04-19 23:27:01 +00:00
|
|
|
name.contains("Unsafe") || name.contains("unsafe")
|
|
|
|
}
|