2019-12-24 05:02:53 +01:00
|
|
|
use rustc_data_structures::fx::{FxHashMap, FxHashSet};
|
2020-05-02 01:30:23 +03:00
|
|
|
use rustc_data_structures::sync::{self, Lrc};
|
2018-12-08 20:30:23 +01:00
|
|
|
use rustc_driver::abort_on_err;
|
2020-03-11 12:49:08 +01:00
|
|
|
use rustc_errors::emitter::{Emitter, EmitterWriter};
|
|
|
|
use rustc_errors::json::JsonEmitter;
|
2019-11-30 02:50:47 +01:00
|
|
|
use rustc_feature::UnstableFeatures;
|
2020-07-10 17:24:17 -04:00
|
|
|
use rustc_hir::def::{Namespace::TypeNS, Res};
|
2020-05-30 14:38:46 +01:00
|
|
|
use rustc_hir::def_id::{CrateNum, DefId, DefIndex, LocalDefId, CRATE_DEF_INDEX, LOCAL_CRATE};
|
2020-01-05 02:37:57 +01:00
|
|
|
use rustc_hir::HirId;
|
2020-07-10 17:24:17 -04:00
|
|
|
use rustc_hir::{
|
2020-07-10 17:50:03 -04:00
|
|
|
intravisit::{self, NestedVisitorMap, Visitor},
|
2020-07-10 17:24:17 -04:00
|
|
|
Path,
|
|
|
|
};
|
2020-12-11 21:46:58 -05:00
|
|
|
use rustc_interface::{interface, Queries};
|
2020-07-10 17:24:17 -04:00
|
|
|
use rustc_middle::hir::map::Map;
|
2020-03-29 17:19:48 +02:00
|
|
|
use rustc_middle::middle::privacy::AccessLevels;
|
2020-10-18 11:27:16 -04:00
|
|
|
use rustc_middle::ty::{ParamEnv, Ty, TyCtxt};
|
2015-01-11 15:03:34 +13:00
|
|
|
use rustc_resolve as resolve;
|
2020-05-02 01:30:23 +03:00
|
|
|
use rustc_session::config::{self, CrateType, ErrorOutputType};
|
2020-01-09 06:42:42 +01:00
|
|
|
use rustc_session::lint;
|
2020-03-11 12:49:08 +01:00
|
|
|
use rustc_session::DiagnosticOutput;
|
2020-05-02 01:30:23 +03:00
|
|
|
use rustc_session::Session;
|
2020-01-01 19:25:28 +01:00
|
|
|
use rustc_span::source_map;
|
2020-01-01 19:30:57 +01:00
|
|
|
use rustc_span::symbol::sym;
|
2019-12-31 20:15:40 +03:00
|
|
|
use rustc_span::DUMMY_SP;
|
2013-08-15 16:28:54 -04:00
|
|
|
|
2016-09-01 10:21:12 +03:00
|
|
|
use std::mem;
|
2018-12-08 20:30:23 +01:00
|
|
|
use std::rc::Rc;
|
2021-01-30 01:02:18 +00:00
|
|
|
use std::{
|
|
|
|
cell::{Cell, RefCell},
|
|
|
|
collections::hash_map::Entry,
|
|
|
|
};
|
2013-08-15 16:28:54 -04:00
|
|
|
|
2019-02-23 16:40:07 +09:00
|
|
|
use crate::clean;
|
2021-01-30 01:02:18 +00:00
|
|
|
use crate::clean::{AttributesExt, MAX_DEF_IDX};
|
2019-12-22 17:42:04 -05:00
|
|
|
use crate::config::{Options as RustdocOptions, RenderOptions};
|
2020-08-16 17:56:02 -04:00
|
|
|
use crate::config::{OutputFormat, RenderInfo};
|
2021-01-12 23:36:04 +01:00
|
|
|
use crate::formats::cache::Cache;
|
2020-01-04 10:58:32 -08:00
|
|
|
use crate::passes::{self, Condition::*, ConditionalPass};
|
2013-08-15 16:28:54 -04:00
|
|
|
|
2020-11-14 18:02:06 -05:00
|
|
|
crate use rustc_session::config::{DebuggingOptions, Input, Options};
|
2015-01-17 21:23:05 -08:00
|
|
|
|
2020-11-14 17:59:58 -05:00
|
|
|
crate type ExternalPaths = FxHashMap<DefId, (Vec<String>, clean::TypeKind)>;
|
2014-05-09 13:52:17 -07:00
|
|
|
|
2020-11-14 17:59:58 -05:00
|
|
|
crate struct DocContext<'tcx> {
|
|
|
|
crate tcx: TyCtxt<'tcx>,
|
|
|
|
crate resolver: Rc<RefCell<interface::BoxedResolver>>,
|
2020-10-18 11:27:16 -04:00
|
|
|
/// Used for normalization.
|
|
|
|
///
|
|
|
|
/// Most of this logic is copied from rustc_lint::late.
|
|
|
|
crate param_env: Cell<ParamEnv<'tcx>>,
|
2021-01-12 23:36:04 +01:00
|
|
|
/// Later on moved into `cache`
|
2020-11-14 17:59:58 -05:00
|
|
|
crate renderinfo: RefCell<RenderInfo>,
|
2021-01-12 23:36:04 +01:00
|
|
|
/// Later on moved through `clean::Crate` into `cache`
|
2020-11-14 17:59:58 -05:00
|
|
|
crate external_traits: Rc<RefCell<FxHashMap<DefId, clean::Trait>>>,
|
2018-02-21 18:33:42 -06:00
|
|
|
/// Used while populating `external_traits` to ensure we don't process the same trait twice at
|
|
|
|
/// the same time.
|
2020-11-14 17:59:58 -05:00
|
|
|
crate active_extern_traits: RefCell<FxHashSet<DefId>>,
|
2016-09-01 10:21:12 +03:00
|
|
|
// The current set of type and lifetime substitutions,
|
|
|
|
// for expanding type aliases at the HIR level:
|
2019-04-20 19:46:19 +03:00
|
|
|
/// Table `DefId` of type parameter -> substituted type
|
2020-11-14 17:59:58 -05:00
|
|
|
crate ty_substs: RefCell<FxHashMap<DefId, clean::Type>>,
|
2019-04-20 19:46:19 +03:00
|
|
|
/// Table `DefId` of lifetime parameter -> substituted lifetime
|
2020-11-14 17:59:58 -05:00
|
|
|
crate lt_substs: RefCell<FxHashMap<DefId, clean::Lifetime>>,
|
2019-04-20 19:46:19 +03:00
|
|
|
/// Table `DefId` of const parameter -> substituted const
|
2020-11-14 17:59:58 -05:00
|
|
|
crate ct_substs: RefCell<FxHashMap<DefId, clean::Constant>>,
|
2019-06-21 12:23:05 +09:00
|
|
|
/// Table synthetic type parameter for `impl Trait` in argument position -> bounds
|
2020-11-14 17:59:58 -05:00
|
|
|
crate impl_trait_bounds: RefCell<FxHashMap<ImplTraitParam, Vec<clean::GenericBound>>>,
|
2021-01-30 01:02:18 +00:00
|
|
|
crate fake_def_ids: RefCell<FxHashMap<CrateNum, DefIndex>>,
|
2019-04-22 22:52:51 +03:00
|
|
|
/// Auto-trait or blanket impls processed so far, as `(self_ty, trait_def_id)`.
|
|
|
|
// FIXME(eddyb) make this a `ty::TraitRef<'tcx>` set.
|
2020-11-14 17:59:58 -05:00
|
|
|
crate generated_synthetics: RefCell<FxHashSet<(Ty<'tcx>, DefId)>>,
|
|
|
|
crate auto_traits: Vec<DefId>,
|
2020-05-30 11:35:35 -04:00
|
|
|
/// The options given to rustdoc that could be relevant to a pass.
|
2020-11-14 17:59:58 -05:00
|
|
|
crate render_options: RenderOptions,
|
2020-08-08 14:57:35 -04:00
|
|
|
/// The traits in scope for a given module.
|
2020-07-29 21:11:14 -04:00
|
|
|
///
|
|
|
|
/// See `collect_intra_doc_links::traits_implemented_by` for more details.
|
2020-08-08 14:57:35 -04:00
|
|
|
/// `map<module, set<trait>>`
|
2020-11-14 17:59:58 -05:00
|
|
|
crate module_trait_cache: RefCell<FxHashMap<DefId, FxHashSet<DefId>>>,
|
2021-01-12 23:36:04 +01:00
|
|
|
/// Fake empty cache used when cache is required as parameter.
|
|
|
|
crate cache: Cache,
|
2014-03-05 16:36:01 +02:00
|
|
|
}
|
|
|
|
|
2018-12-08 20:30:23 +01:00
|
|
|
impl<'tcx> DocContext<'tcx> {
|
2021-02-12 01:59:20 -05:00
|
|
|
crate fn sess(&self) -> &'tcx Session {
|
2016-11-20 03:42:54 +02:00
|
|
|
&self.tcx.sess
|
2014-06-26 11:37:39 -07:00
|
|
|
}
|
2016-09-01 10:21:12 +03:00
|
|
|
|
2021-02-12 01:59:20 -05:00
|
|
|
crate fn with_param_env<T, F: FnOnce(&mut Self) -> T>(&mut self, def_id: DefId, f: F) -> T {
|
2020-10-18 11:27:16 -04:00
|
|
|
let old_param_env = self.param_env.replace(self.tcx.param_env(def_id));
|
2021-02-12 01:59:20 -05:00
|
|
|
let ret = f(self);
|
2020-10-18 11:27:16 -04:00
|
|
|
self.param_env.set(old_param_env);
|
|
|
|
ret
|
|
|
|
}
|
|
|
|
|
2020-11-14 17:59:58 -05:00
|
|
|
crate fn enter_resolver<F, R>(&self, f: F) -> R
|
2019-12-22 17:42:04 -05:00
|
|
|
where
|
|
|
|
F: FnOnce(&mut resolve::Resolver<'_>) -> R,
|
|
|
|
{
|
2019-07-24 14:43:40 -04:00
|
|
|
self.resolver.borrow_mut().access(f)
|
2018-12-08 20:30:23 +01:00
|
|
|
}
|
|
|
|
|
2016-09-01 10:21:12 +03:00
|
|
|
/// Call the closure with the given parameters set as
|
|
|
|
/// the substitutions for a type alias' RHS.
|
2020-11-14 17:59:58 -05:00
|
|
|
crate fn enter_alias<F, R>(
|
2021-02-12 01:59:20 -05:00
|
|
|
&mut self,
|
2019-12-22 17:42:04 -05:00
|
|
|
ty_substs: FxHashMap<DefId, clean::Type>,
|
|
|
|
lt_substs: FxHashMap<DefId, clean::Lifetime>,
|
|
|
|
ct_substs: FxHashMap<DefId, clean::Constant>,
|
|
|
|
f: F,
|
|
|
|
) -> R
|
|
|
|
where
|
2021-02-12 01:59:20 -05:00
|
|
|
F: FnOnce(&mut Self) -> R,
|
2019-12-22 17:42:04 -05:00
|
|
|
{
|
2019-02-15 22:24:00 +00:00
|
|
|
let (old_tys, old_lts, old_cts) = (
|
2021-02-12 01:59:20 -05:00
|
|
|
mem::replace(&mut *self.ty_substs.get_mut(), ty_substs),
|
|
|
|
mem::replace(&mut *self.lt_substs.get_mut(), lt_substs),
|
|
|
|
mem::replace(&mut *self.ct_substs.get_mut(), ct_substs),
|
2019-02-15 22:24:00 +00:00
|
|
|
);
|
2021-02-12 01:59:20 -05:00
|
|
|
let r = f(self);
|
|
|
|
*self.ty_substs.get_mut() = old_tys;
|
|
|
|
*self.lt_substs.get_mut() = old_lts;
|
|
|
|
*self.ct_substs.get_mut() = old_cts;
|
2016-09-01 10:21:12 +03:00
|
|
|
r
|
|
|
|
}
|
2018-08-03 22:13:05 +02:00
|
|
|
|
2021-01-05 16:32:50 -08:00
|
|
|
/// Create a new "fake" [`DefId`].
|
|
|
|
///
|
|
|
|
/// This is an ugly hack, but it's the simplest way to handle synthetic impls without greatly
|
2021-01-05 19:46:51 -08:00
|
|
|
/// refactoring either rustdoc or [`rustc_middle`]. In particular, allowing new [`DefId`]s
|
2021-01-05 16:32:50 -08:00
|
|
|
/// to be registered after the AST is constructed would require storing the [`DefId`] mapping
|
|
|
|
/// in a [`RefCell`], decreasing the performance for normal compilation for very little gain.
|
|
|
|
///
|
|
|
|
/// Instead, we construct "fake" [`DefId`]s, which start immediately after the last `DefId`.
|
|
|
|
/// In the [`Debug`] impl for [`clean::Item`], we explicitly check for fake `DefId`s,
|
|
|
|
/// as we'll end up with a panic if we use the `DefId` `Debug` impl for fake `DefId`s.
|
|
|
|
///
|
|
|
|
/// [`RefCell`]: std::cell::RefCell
|
|
|
|
/// [`Debug`]: std::fmt::Debug
|
|
|
|
/// [`clean::Item`]: crate::clean::types::Item
|
2020-11-14 17:59:58 -05:00
|
|
|
crate fn next_def_id(&self, crate_num: CrateNum) -> DefId {
|
2018-08-03 22:13:05 +02:00
|
|
|
let mut fake_ids = self.fake_def_ids.borrow_mut();
|
|
|
|
|
2021-01-30 01:02:18 +00:00
|
|
|
let def_index = match fake_ids.entry(crate_num) {
|
|
|
|
Entry::Vacant(e) => {
|
|
|
|
let num_def_idx = {
|
|
|
|
let num_def_idx = if crate_num == LOCAL_CRATE {
|
|
|
|
self.tcx.hir().definitions().def_path_table().num_def_ids()
|
|
|
|
} else {
|
|
|
|
self.enter_resolver(|r| r.cstore().num_def_ids(crate_num))
|
|
|
|
};
|
|
|
|
|
|
|
|
DefIndex::from_usize(num_def_idx)
|
|
|
|
};
|
|
|
|
|
|
|
|
MAX_DEF_IDX.with(|m| {
|
|
|
|
m.borrow_mut().insert(crate_num, num_def_idx);
|
|
|
|
});
|
|
|
|
e.insert(num_def_idx)
|
|
|
|
}
|
|
|
|
Entry::Occupied(e) => e.into_mut(),
|
|
|
|
};
|
2021-02-17 20:37:09 +01:00
|
|
|
*def_index = *def_index + 1;
|
2018-08-03 22:13:05 +02:00
|
|
|
|
2021-01-30 01:02:18 +00:00
|
|
|
DefId { krate: crate_num, index: *def_index }
|
2018-08-03 22:13:05 +02:00
|
|
|
}
|
|
|
|
|
2020-08-12 12:22:56 +02:00
|
|
|
/// Like `hir().local_def_id_to_hir_id()`, but skips calling it on fake DefIds.
|
2018-09-19 09:28:49 -05:00
|
|
|
/// (This avoids a slice-index-out-of-bounds panic.)
|
2020-11-14 17:59:58 -05:00
|
|
|
crate fn as_local_hir_id(&self, def_id: DefId) -> Option<HirId> {
|
2021-01-30 01:02:18 +00:00
|
|
|
if MAX_DEF_IDX.with(|m| {
|
|
|
|
m.borrow().get(&def_id.krate).map(|&idx| idx <= def_id.index).unwrap_or(false)
|
|
|
|
}) {
|
2019-03-04 09:00:30 +01:00
|
|
|
None
|
|
|
|
} else {
|
2020-08-12 12:22:56 +02:00
|
|
|
def_id.as_local().map(|def_id| self.tcx.hir().local_def_id_to_hir_id(def_id))
|
2019-03-04 09:00:30 +01:00
|
|
|
}
|
|
|
|
}
|
2013-08-15 16:28:54 -04:00
|
|
|
}
|
|
|
|
|
2018-04-24 18:29:04 -05:00
|
|
|
/// Creates a new diagnostic `Handler` that can be used to emit warnings and errors.
|
|
|
|
///
|
2018-08-18 12:13:35 +02:00
|
|
|
/// If the given `error_format` is `ErrorOutputType::Json` and no `SourceMap` is given, a new one
|
2018-04-24 18:29:04 -05:00
|
|
|
/// will be created for the handler.
|
2020-11-14 17:59:58 -05:00
|
|
|
crate fn new_handler(
|
2019-12-22 17:42:04 -05:00
|
|
|
error_format: ErrorOutputType,
|
|
|
|
source_map: Option<Lrc<source_map::SourceMap>>,
|
2019-12-29 23:07:23 +03:00
|
|
|
debugging_opts: &DebuggingOptions,
|
2020-01-09 11:18:47 +01:00
|
|
|
) -> rustc_errors::Handler {
|
2018-04-24 18:29:04 -05:00
|
|
|
let emitter: Box<dyn Emitter + sync::Send> = match error_format {
|
2019-03-25 11:16:58 +01:00
|
|
|
ErrorOutputType::HumanReadable(kind) => {
|
|
|
|
let (short, color_config) = kind.unzip();
|
|
|
|
Box::new(
|
|
|
|
EmitterWriter::stderr(
|
|
|
|
color_config,
|
2020-02-22 16:07:05 +02:00
|
|
|
source_map.map(|sm| sm as _),
|
2019-03-25 11:16:58 +01:00
|
|
|
short,
|
2019-12-29 23:07:23 +03:00
|
|
|
debugging_opts.teach,
|
|
|
|
debugging_opts.terminal_width,
|
2019-09-07 09:57:11 -04:00
|
|
|
false,
|
2019-12-22 17:42:04 -05:00
|
|
|
)
|
2020-04-02 16:44:47 +11:00
|
|
|
.ui_testing(debugging_opts.ui_testing),
|
2019-03-25 11:16:58 +01:00
|
|
|
)
|
2019-12-22 17:42:04 -05:00
|
|
|
}
|
2019-03-25 11:16:58 +01:00
|
|
|
ErrorOutputType::Json { pretty, json_rendered } => {
|
2019-12-22 17:42:04 -05:00
|
|
|
let source_map = source_map.unwrap_or_else(|| {
|
2019-12-29 23:07:23 +03:00
|
|
|
Lrc::new(source_map::SourceMap::new(source_map::FilePathMapping::empty()))
|
2019-12-22 17:42:04 -05:00
|
|
|
});
|
2018-04-24 18:29:04 -05:00
|
|
|
Box::new(
|
2020-06-26 13:18:16 +01:00
|
|
|
JsonEmitter::stderr(
|
|
|
|
None,
|
|
|
|
source_map,
|
|
|
|
pretty,
|
|
|
|
json_rendered,
|
|
|
|
debugging_opts.terminal_width,
|
|
|
|
false,
|
|
|
|
)
|
|
|
|
.ui_testing(debugging_opts.ui_testing),
|
2018-04-24 18:29:04 -05:00
|
|
|
)
|
2019-12-22 17:42:04 -05:00
|
|
|
}
|
2018-04-24 18:29:04 -05:00
|
|
|
};
|
|
|
|
|
2020-01-09 11:18:47 +01:00
|
|
|
rustc_errors::Handler::with_emitter_and_flags(
|
|
|
|
emitter,
|
|
|
|
debugging_opts.diagnostic_handler_flags(true),
|
|
|
|
)
|
2018-04-24 18:29:04 -05:00
|
|
|
}
|
|
|
|
|
2020-04-26 14:07:13 +02:00
|
|
|
/// This function is used to setup the lint initialization. By default, in rustdoc, everything
|
|
|
|
/// is "allowed". Depending if we run in test mode or not, we want some of them to be at their
|
2020-07-07 18:23:15 +01:00
|
|
|
/// default level. For example, the "INVALID_CODEBLOCK_ATTRIBUTES" lint is activated in both
|
2020-04-26 14:07:13 +02:00
|
|
|
/// modes.
|
|
|
|
///
|
|
|
|
/// A little detail easy to forget is that there is a way to set the lint level for all lints
|
|
|
|
/// through the "WARNINGS" lint. To prevent this to happen, we set it back to its "normal" level
|
|
|
|
/// inside this function.
|
|
|
|
///
|
|
|
|
/// It returns a tuple containing:
|
|
|
|
/// * Vector of tuples of lints' name and their associated "max" level
|
|
|
|
/// * HashMap of lint id with their associated "max" level
|
2020-08-25 10:02:16 -04:00
|
|
|
pub(crate) fn init_lints<F>(
|
2020-07-07 11:12:44 -04:00
|
|
|
mut allowed_lints: Vec<String>,
|
2020-04-26 14:07:13 +02:00
|
|
|
lint_opts: Vec<(String, lint::Level)>,
|
|
|
|
filter_call: F,
|
|
|
|
) -> (Vec<(String, lint::Level)>, FxHashMap<lint::LintId, lint::Level>)
|
|
|
|
where
|
|
|
|
F: Fn(&lint::Lint) -> Option<(String, lint::Level)>,
|
|
|
|
{
|
|
|
|
let warnings_lint_name = lint::builtin::WARNINGS.name;
|
|
|
|
|
2020-07-07 11:12:44 -04:00
|
|
|
allowed_lints.push(warnings_lint_name.to_owned());
|
|
|
|
allowed_lints.extend(lint_opts.iter().map(|(lint, _)| lint).cloned());
|
2020-04-26 14:07:13 +02:00
|
|
|
|
|
|
|
let lints = || {
|
|
|
|
lint::builtin::HardwiredLints::get_lints()
|
|
|
|
.into_iter()
|
|
|
|
.chain(rustc_lint::SoftLints::get_lints().into_iter())
|
|
|
|
};
|
|
|
|
|
|
|
|
let lint_opts = lints()
|
2020-05-27 19:32:00 +02:00
|
|
|
.filter_map(|lint| {
|
2020-07-07 11:12:44 -04:00
|
|
|
// Permit feature-gated lints to avoid feature errors when trying to
|
2020-06-03 19:16:29 -07:00
|
|
|
// allow all lints.
|
2020-08-25 10:42:24 -04:00
|
|
|
if lint.feature_gate.is_some() || allowed_lints.iter().any(|l| lint.name == l) {
|
2020-05-27 19:32:00 +02:00
|
|
|
None
|
|
|
|
} else {
|
|
|
|
filter_call(lint)
|
|
|
|
}
|
|
|
|
})
|
2020-04-26 14:07:13 +02:00
|
|
|
.chain(lint_opts.into_iter())
|
|
|
|
.collect::<Vec<_>>();
|
|
|
|
|
|
|
|
let lint_caps = lints()
|
|
|
|
.filter_map(|lint| {
|
2020-07-07 11:12:44 -04:00
|
|
|
// We don't want to allow *all* lints so let's ignore
|
|
|
|
// those ones.
|
|
|
|
if allowed_lints.iter().any(|l| lint.name == l) {
|
2020-04-26 14:07:13 +02:00
|
|
|
None
|
|
|
|
} else {
|
|
|
|
Some((lint::LintId::of(lint), lint::Allow))
|
|
|
|
}
|
|
|
|
})
|
|
|
|
.collect();
|
|
|
|
(lint_opts, lint_caps)
|
|
|
|
}
|
|
|
|
|
2020-12-11 21:37:14 -05:00
|
|
|
/// Parse, resolve, and typecheck the given crate.
|
2020-12-11 21:57:48 -05:00
|
|
|
crate fn create_config(
|
2020-12-11 21:37:14 -05:00
|
|
|
RustdocOptions {
|
2018-10-30 13:35:10 -05:00
|
|
|
input,
|
|
|
|
crate_name,
|
2019-07-20 16:34:41 -04:00
|
|
|
proc_macro_crate,
|
2018-10-30 13:35:10 -05:00
|
|
|
error_format,
|
|
|
|
libs,
|
|
|
|
externs,
|
2019-09-25 17:08:40 +02:00
|
|
|
mut cfgs,
|
2018-10-30 13:35:10 -05:00
|
|
|
codegen_options,
|
2020-08-25 09:22:26 -04:00
|
|
|
debugging_opts,
|
2018-10-30 13:35:10 -05:00
|
|
|
target,
|
|
|
|
edition,
|
|
|
|
maybe_sysroot,
|
|
|
|
lint_opts,
|
|
|
|
describe_lints,
|
|
|
|
lint_cap,
|
|
|
|
display_warnings,
|
|
|
|
..
|
2020-12-11 21:37:14 -05:00
|
|
|
}: RustdocOptions,
|
|
|
|
) -> rustc_interface::Config {
|
2019-11-06 14:48:10 +01:00
|
|
|
// Add the doc cfg into the doc build.
|
2019-11-06 18:32:51 +01:00
|
|
|
cfgs.push("doc".to_string());
|
2019-09-25 17:08:40 +02:00
|
|
|
|
2018-10-30 13:35:10 -05:00
|
|
|
let cpath = Some(input.clone());
|
|
|
|
let input = Input::File(input);
|
2013-08-15 16:28:54 -04:00
|
|
|
|
2020-11-05 13:11:50 -05:00
|
|
|
let broken_intra_doc_links = lint::builtin::BROKEN_INTRA_DOC_LINKS.name;
|
|
|
|
let private_intra_doc_links = lint::builtin::PRIVATE_INTRA_DOC_LINKS.name;
|
2018-07-05 20:06:33 +02:00
|
|
|
let missing_docs = rustc_lint::builtin::MISSING_DOCS.name;
|
2018-09-29 17:16:06 +02:00
|
|
|
let missing_doc_example = rustc_lint::builtin::MISSING_DOC_CODE_EXAMPLES.name;
|
2018-10-26 00:55:12 +02:00
|
|
|
let private_doc_tests = rustc_lint::builtin::PRIVATE_DOC_TESTS.name;
|
2020-03-22 13:04:23 +01:00
|
|
|
let no_crate_level_docs = rustc_lint::builtin::MISSING_CRATE_LEVEL_DOCS.name;
|
2020-07-13 17:11:50 +02:00
|
|
|
let invalid_codeblock_attributes_name = rustc_lint::builtin::INVALID_CODEBLOCK_ATTRIBUTES.name;
|
2020-09-23 20:25:56 +02:00
|
|
|
let invalid_html_tags = rustc_lint::builtin::INVALID_HTML_TAGS.name;
|
2020-08-25 10:02:16 -04:00
|
|
|
let renamed_and_removed_lints = rustc_lint::builtin::RENAMED_AND_REMOVED_LINTS.name;
|
2020-10-31 15:14:44 +01:00
|
|
|
let non_autolinks = rustc_lint::builtin::NON_AUTOLINKS.name;
|
2020-08-25 10:02:16 -04:00
|
|
|
let unknown_lints = rustc_lint::builtin::UNKNOWN_LINTS.name;
|
2018-07-11 00:36:31 +02:00
|
|
|
|
2020-07-07 11:12:44 -04:00
|
|
|
// In addition to those specific lints, we also need to allow those given through
|
2018-07-11 00:36:31 +02:00
|
|
|
// command line, otherwise they'll get ignored and we don't want that.
|
2020-08-25 09:18:57 -04:00
|
|
|
let lints_to_show = vec![
|
2020-11-05 13:11:50 -05:00
|
|
|
broken_intra_doc_links.to_owned(),
|
|
|
|
private_intra_doc_links.to_owned(),
|
2019-12-22 17:42:04 -05:00
|
|
|
missing_docs.to_owned(),
|
|
|
|
missing_doc_example.to_owned(),
|
|
|
|
private_doc_tests.to_owned(),
|
2020-03-22 13:04:23 +01:00
|
|
|
no_crate_level_docs.to_owned(),
|
2020-07-13 17:11:50 +02:00
|
|
|
invalid_codeblock_attributes_name.to_owned(),
|
2020-09-23 20:25:56 +02:00
|
|
|
invalid_html_tags.to_owned(),
|
2020-08-25 10:02:16 -04:00
|
|
|
renamed_and_removed_lints.to_owned(),
|
|
|
|
unknown_lints.to_owned(),
|
2020-10-31 15:14:44 +01:00
|
|
|
non_autolinks.to_owned(),
|
2019-12-22 17:42:04 -05:00
|
|
|
];
|
2018-07-11 00:36:31 +02:00
|
|
|
|
2020-08-25 09:18:57 -04:00
|
|
|
let (lint_opts, lint_caps) = init_lints(lints_to_show, lint_opts, |lint| {
|
2020-11-05 13:11:50 -05:00
|
|
|
// FIXME: why is this necessary?
|
|
|
|
if lint.name == broken_intra_doc_links || lint.name == invalid_codeblock_attributes_name {
|
2020-04-26 14:07:13 +02:00
|
|
|
None
|
|
|
|
} else {
|
|
|
|
Some((lint.name_lower(), lint::Allow))
|
|
|
|
}
|
|
|
|
});
|
2014-06-04 14:35:58 -07:00
|
|
|
|
2020-05-02 01:30:23 +03:00
|
|
|
let crate_types =
|
|
|
|
if proc_macro_crate { vec![CrateType::ProcMacro] } else { vec![CrateType::Rlib] };
|
2018-04-01 00:09:00 +02:00
|
|
|
// plays with error output here!
|
2014-05-18 16:56:13 +03:00
|
|
|
let sessopts = config::Options {
|
2017-08-06 22:54:09 -07:00
|
|
|
maybe_sysroot,
|
2018-10-30 13:35:10 -05:00
|
|
|
search_paths: libs,
|
2019-07-20 16:34:41 -04:00
|
|
|
crate_types,
|
2019-12-22 17:42:04 -05:00
|
|
|
lint_opts: if !display_warnings { lint_opts } else { vec![] },
|
2020-08-25 09:18:57 -04:00
|
|
|
lint_cap,
|
2018-10-30 13:35:10 -05:00
|
|
|
cg: codegen_options,
|
2017-08-06 22:54:09 -07:00
|
|
|
externs,
|
2019-06-11 11:06:34 -07:00
|
|
|
target_triple: target,
|
2020-10-10 14:27:52 -04:00
|
|
|
unstable_features: UnstableFeatures::from_environment(crate_name.as_deref()),
|
2016-09-29 19:10:29 -07:00
|
|
|
actually_rustdoc: true,
|
2020-08-25 09:22:26 -04:00
|
|
|
debugging_opts,
|
2018-04-01 00:09:00 +02:00
|
|
|
error_format,
|
2018-04-20 14:47:23 -07:00
|
|
|
edition,
|
2018-06-23 15:09:21 +02:00
|
|
|
describe_lints,
|
2020-11-30 22:54:20 -05:00
|
|
|
crate_name,
|
2018-07-26 12:36:11 -06:00
|
|
|
..Options::default()
|
2013-08-15 16:28:54 -04:00
|
|
|
};
|
2018-07-01 00:27:44 +02:00
|
|
|
|
2020-12-11 21:37:14 -05:00
|
|
|
interface::Config {
|
2018-12-08 20:30:23 +01:00
|
|
|
opts: sessopts,
|
2019-10-11 23:48:16 +02:00
|
|
|
crate_cfg: interface::parse_cfgspecs(cfgs),
|
2018-12-08 20:30:23 +01:00
|
|
|
input,
|
|
|
|
input_path: cpath,
|
|
|
|
output_file: None,
|
|
|
|
output_dir: None,
|
|
|
|
file_loader: None,
|
|
|
|
diagnostic_output: DiagnosticOutput::Default,
|
|
|
|
stderr: None,
|
|
|
|
lint_caps,
|
2019-10-10 19:33:00 -04:00
|
|
|
register_lints: None,
|
2020-07-11 21:50:25 -04:00
|
|
|
override_queries: Some(|_sess, providers, _external_providers| {
|
2020-07-11 00:28:42 -04:00
|
|
|
// Most lints will require typechecking, so just don't run them.
|
2020-07-11 21:50:25 -04:00
|
|
|
providers.lint_mod = |_, _| {};
|
2020-07-17 08:47:04 +00:00
|
|
|
// Prevent `rustc_typeck::check_crate` from calling `typeck` on all bodies.
|
2020-07-11 21:50:25 -04:00
|
|
|
providers.typeck_item_bodies = |_, _| {};
|
2020-07-17 08:47:04 +00:00
|
|
|
// hack so that `used_trait_imports` won't try to call typeck
|
2020-07-11 21:50:25 -04:00
|
|
|
providers.used_trait_imports = |_, _| {
|
|
|
|
lazy_static! {
|
|
|
|
static ref EMPTY_SET: FxHashSet<LocalDefId> = FxHashSet::default();
|
|
|
|
}
|
|
|
|
&EMPTY_SET
|
|
|
|
};
|
2020-07-11 00:28:42 -04:00
|
|
|
// In case typeck does end up being called, don't ICE in case there were name resolution errors
|
2020-07-17 08:47:04 +00:00
|
|
|
providers.typeck = move |tcx, def_id| {
|
2020-07-09 09:13:59 -04:00
|
|
|
// Closures' tables come from their outermost function,
|
|
|
|
// as they are part of the same "inference environment".
|
2020-07-17 08:47:04 +00:00
|
|
|
// This avoids emitting errors for the parent twice (see similar code in `typeck_with_fallback`)
|
2020-07-09 09:13:59 -04:00
|
|
|
let outer_def_id = tcx.closure_base_def_id(def_id.to_def_id()).expect_local();
|
|
|
|
if outer_def_id != def_id {
|
2020-07-17 08:47:04 +00:00
|
|
|
return tcx.typeck(outer_def_id);
|
2020-07-09 09:13:59 -04:00
|
|
|
}
|
|
|
|
|
2020-07-03 18:41:23 -04:00
|
|
|
let hir = tcx.hir();
|
2020-08-12 12:22:56 +02:00
|
|
|
let body = hir.body(hir.body_owned_by(hir.local_def_id_to_hir_id(def_id)));
|
2020-07-03 18:41:23 -04:00
|
|
|
debug!("visiting body for {:?}", def_id);
|
2020-11-30 14:39:00 -05:00
|
|
|
EmitIgnoredResolutionErrors::new(tcx).visit_body(body);
|
2020-07-17 08:47:04 +00:00
|
|
|
(rustc_interface::DEFAULT_QUERY_PROVIDERS.typeck)(tcx, def_id)
|
2020-07-03 18:41:23 -04:00
|
|
|
};
|
2020-06-20 16:41:39 -04:00
|
|
|
}),
|
2020-09-08 13:44:41 +02:00
|
|
|
make_codegen_backend: None,
|
2019-11-15 19:41:50 +01:00
|
|
|
registry: rustc_driver::diagnostics_registry(),
|
2020-12-11 21:37:14 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-11 21:57:48 -05:00
|
|
|
crate fn create_resolver<'a>(
|
2020-12-11 21:46:58 -05:00
|
|
|
externs: config::Externs,
|
|
|
|
queries: &Queries<'a>,
|
|
|
|
sess: &Session,
|
2020-12-16 16:02:15 -05:00
|
|
|
) -> Rc<RefCell<interface::BoxedResolver>> {
|
2020-12-11 21:46:58 -05:00
|
|
|
let extern_names: Vec<String> = externs
|
|
|
|
.iter()
|
|
|
|
.filter(|(_, entry)| entry.add_prelude)
|
|
|
|
.map(|(name, _)| name)
|
|
|
|
.cloned()
|
|
|
|
.collect();
|
|
|
|
|
|
|
|
let parts = abort_on_err(queries.expansion(), sess).peek();
|
|
|
|
let resolver = parts.1.borrow();
|
|
|
|
|
|
|
|
// Before we actually clone it, let's force all the extern'd crates to
|
|
|
|
// actually be loaded, just in case they're only referred to inside
|
2021-02-04 13:19:01 -08:00
|
|
|
// intra-doc links
|
2020-12-11 21:46:58 -05:00
|
|
|
resolver.borrow_mut().access(|resolver| {
|
|
|
|
sess.time("load_extern_crates", || {
|
|
|
|
for extern_name in &extern_names {
|
|
|
|
debug!("loading extern crate {}", extern_name);
|
2020-12-25 19:04:50 -05:00
|
|
|
if let Err(()) = resolver
|
2020-12-11 21:46:58 -05:00
|
|
|
.resolve_str_path_error(
|
|
|
|
DUMMY_SP,
|
|
|
|
extern_name,
|
|
|
|
TypeNS,
|
|
|
|
LocalDefId { local_def_index: CRATE_DEF_INDEX }.to_def_id(),
|
2020-12-25 19:04:50 -05:00
|
|
|
) {
|
|
|
|
warn!("unable to resolve external crate {} (do you have an unused `--extern` crate?)", extern_name)
|
|
|
|
}
|
2020-12-11 21:46:58 -05:00
|
|
|
}
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
// Now we're good to clone the resolver because everything should be loaded
|
|
|
|
resolver.clone()
|
|
|
|
}
|
|
|
|
|
2020-12-11 21:57:48 -05:00
|
|
|
crate fn run_global_ctxt(
|
2020-08-16 17:56:02 -04:00
|
|
|
tcx: TyCtxt<'_>,
|
|
|
|
resolver: Rc<RefCell<interface::BoxedResolver>>,
|
|
|
|
mut default_passes: passes::DefaultPassOption,
|
|
|
|
mut manual_passes: Vec<String>,
|
|
|
|
render_options: RenderOptions,
|
2021-01-28 18:00:07 -08:00
|
|
|
output_format: OutputFormat,
|
2020-08-16 17:56:02 -04:00
|
|
|
) -> (clean::Crate, RenderInfo, RenderOptions) {
|
2020-08-23 22:57:47 -04:00
|
|
|
// Certain queries assume that some checks were run elsewhere
|
|
|
|
// (see https://github.com/rust-lang/rust/pull/73566#issuecomment-656954425),
|
|
|
|
// so type-check everything other than function bodies in this crate before running lints.
|
|
|
|
|
|
|
|
// NOTE: this does not call `tcx.analysis()` so that we won't
|
|
|
|
// typeck function bodies or run the default rustc lints.
|
|
|
|
// (see `override_queries` in the `config`)
|
|
|
|
|
|
|
|
// HACK(jynelson) this calls an _extremely_ limited subset of `typeck`
|
|
|
|
// and might break if queries change their assumptions in the future.
|
|
|
|
|
|
|
|
// NOTE: This is copy/pasted from typeck/lib.rs and should be kept in sync with those changes.
|
|
|
|
tcx.sess.time("item_types_checking", || {
|
|
|
|
for &module in tcx.hir().krate().modules.keys() {
|
2021-01-31 17:58:57 +01:00
|
|
|
tcx.ensure().check_mod_item_types(module);
|
2020-08-23 22:57:47 -04:00
|
|
|
}
|
|
|
|
});
|
|
|
|
tcx.sess.abort_if_errors();
|
2020-08-16 17:40:47 -04:00
|
|
|
tcx.sess.time("missing_docs", || {
|
2020-08-23 22:57:47 -04:00
|
|
|
rustc_lint::check_crate(tcx, rustc_lint::builtin::MissingDoc::new);
|
|
|
|
});
|
2020-08-16 17:40:47 -04:00
|
|
|
tcx.sess.time("check_mod_attrs", || {
|
2020-08-23 22:57:47 -04:00
|
|
|
for &module in tcx.hir().krate().modules.keys() {
|
2021-01-31 17:58:57 +01:00
|
|
|
tcx.ensure().check_mod_attrs(module);
|
2020-08-23 22:57:47 -04:00
|
|
|
}
|
2020-08-16 17:40:47 -04:00
|
|
|
});
|
2019-12-22 17:42:04 -05:00
|
|
|
|
2020-08-23 22:57:47 -04:00
|
|
|
let access_levels = tcx.privacy_access_levels(LOCAL_CRATE);
|
|
|
|
// Convert from a HirId set to a DefId set since we don't always have easy access
|
|
|
|
// to the map from defid -> hirid
|
|
|
|
let access_levels = AccessLevels {
|
|
|
|
map: access_levels
|
|
|
|
.map
|
|
|
|
.iter()
|
|
|
|
.map(|(&k, &v)| (tcx.hir().local_def_id(k).to_def_id(), v))
|
|
|
|
.collect(),
|
|
|
|
};
|
|
|
|
|
|
|
|
let mut renderinfo = RenderInfo::default();
|
|
|
|
renderinfo.access_levels = access_levels;
|
|
|
|
renderinfo.output_format = output_format;
|
|
|
|
|
|
|
|
let mut ctxt = DocContext {
|
|
|
|
tcx,
|
|
|
|
resolver,
|
2020-10-18 11:27:16 -04:00
|
|
|
param_env: Cell::new(ParamEnv::empty()),
|
2020-08-23 22:57:47 -04:00
|
|
|
external_traits: Default::default(),
|
|
|
|
active_extern_traits: Default::default(),
|
|
|
|
renderinfo: RefCell::new(renderinfo),
|
|
|
|
ty_substs: Default::default(),
|
|
|
|
lt_substs: Default::default(),
|
|
|
|
ct_substs: Default::default(),
|
|
|
|
impl_trait_bounds: Default::default(),
|
|
|
|
fake_def_ids: Default::default(),
|
|
|
|
generated_synthetics: Default::default(),
|
|
|
|
auto_traits: tcx
|
|
|
|
.all_traits(LOCAL_CRATE)
|
|
|
|
.iter()
|
|
|
|
.cloned()
|
|
|
|
.filter(|trait_def_id| tcx.trait_is_auto(*trait_def_id))
|
|
|
|
.collect(),
|
|
|
|
render_options,
|
|
|
|
module_trait_cache: RefCell::new(FxHashMap::default()),
|
2021-01-12 23:36:04 +01:00
|
|
|
cache: Cache::default(),
|
2020-08-23 22:57:47 -04:00
|
|
|
};
|
|
|
|
debug!("crate: {:?}", tcx.hir().krate());
|
2019-12-22 17:42:04 -05:00
|
|
|
|
2020-08-18 16:49:37 -04:00
|
|
|
let mut krate = tcx.sess.time("clean_crate", || clean::krate(&mut ctxt));
|
2019-12-22 17:42:04 -05:00
|
|
|
|
2020-08-23 22:57:47 -04:00
|
|
|
if let Some(ref m) = krate.module {
|
2020-12-19 15:04:42 +01:00
|
|
|
if m.doc_value().map(|d| d.is_empty()).unwrap_or(true) {
|
2020-08-23 22:57:47 -04:00
|
|
|
let help = "The following guide may be of use:\n\
|
2020-08-31 13:16:50 +02:00
|
|
|
https://doc.rust-lang.org/nightly/rustdoc/how-to-write-documentation.html";
|
2020-08-23 22:57:47 -04:00
|
|
|
tcx.struct_lint_node(
|
|
|
|
rustc_lint::builtin::MISSING_CRATE_LEVEL_DOCS,
|
|
|
|
ctxt.as_local_hir_id(m.def_id).unwrap(),
|
|
|
|
|lint| {
|
2020-08-16 17:56:02 -04:00
|
|
|
let mut diag =
|
|
|
|
lint.build("no documentation found for this crate's top-level module");
|
2020-08-23 22:57:47 -04:00
|
|
|
diag.help(help);
|
|
|
|
diag.emit();
|
|
|
|
},
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
2019-12-01 20:12:49 +01:00
|
|
|
|
2020-08-23 22:57:47 -04:00
|
|
|
fn report_deprecated_attr(name: &str, diag: &rustc_errors::Handler) {
|
2020-08-16 17:56:02 -04:00
|
|
|
let mut msg = diag
|
|
|
|
.struct_warn(&format!("the `#![doc({})]` attribute is considered deprecated", name));
|
2020-08-23 22:57:47 -04:00
|
|
|
msg.warn(
|
|
|
|
"see issue #44136 <https://github.com/rust-lang/rust/issues/44136> \
|
2020-08-31 13:16:50 +02:00
|
|
|
for more information",
|
2020-08-23 22:57:47 -04:00
|
|
|
);
|
2019-12-22 17:42:04 -05:00
|
|
|
|
2020-08-23 22:57:47 -04:00
|
|
|
if name == "no_default_passes" {
|
|
|
|
msg.help("you may want to use `#![doc(document_private_items)]`");
|
|
|
|
}
|
2018-07-27 10:22:16 -05:00
|
|
|
|
2020-08-23 22:57:47 -04:00
|
|
|
msg.emit();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Process all of the crate attributes, extracting plugin metadata along
|
|
|
|
// with the passes which we are supposed to run.
|
|
|
|
for attr in krate.module.as_ref().unwrap().attrs.lists(sym::doc) {
|
|
|
|
let diag = ctxt.sess().diagnostic();
|
|
|
|
|
|
|
|
let name = attr.name_or_empty();
|
|
|
|
if attr.is_word() {
|
|
|
|
if name == sym::no_default_passes {
|
|
|
|
report_deprecated_attr("no_default_passes", diag);
|
|
|
|
if default_passes == passes::DefaultPassOption::Default {
|
|
|
|
default_passes = passes::DefaultPassOption::None;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if let Some(value) = attr.value_str() {
|
|
|
|
let sink = match name {
|
|
|
|
sym::passes => {
|
|
|
|
report_deprecated_attr("passes = \"...\"", diag);
|
|
|
|
&mut manual_passes
|
2018-07-27 10:22:16 -05:00
|
|
|
}
|
2020-08-23 22:57:47 -04:00
|
|
|
sym::plugins => {
|
|
|
|
report_deprecated_attr("plugins = \"...\"", diag);
|
|
|
|
eprintln!(
|
|
|
|
"WARNING: `#![doc(plugins = \"...\")]` \
|
2020-08-31 13:16:50 +02:00
|
|
|
no longer functions; see CVE-2018-1000622"
|
2020-08-23 22:57:47 -04:00
|
|
|
);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
_ => continue,
|
|
|
|
};
|
|
|
|
for name in value.as_str().split_whitespace() {
|
|
|
|
sink.push(name.to_string());
|
|
|
|
}
|
|
|
|
}
|
2018-07-27 10:22:16 -05:00
|
|
|
|
2020-08-23 22:57:47 -04:00
|
|
|
if attr.is_word() && name == sym::document_private_items {
|
|
|
|
ctxt.render_options.document_private = true;
|
|
|
|
}
|
|
|
|
}
|
2018-07-27 10:22:16 -05:00
|
|
|
|
2020-08-23 22:57:47 -04:00
|
|
|
let passes = passes::defaults(default_passes).iter().copied().chain(
|
|
|
|
manual_passes.into_iter().flat_map(|name| {
|
|
|
|
if let Some(pass) = passes::find_pass(&name) {
|
|
|
|
Some(ConditionalPass::always(pass))
|
|
|
|
} else {
|
|
|
|
error!("unknown pass {}, skipping", name);
|
|
|
|
None
|
|
|
|
}
|
|
|
|
}),
|
|
|
|
);
|
2019-11-26 12:16:36 +01:00
|
|
|
|
2020-08-23 22:57:47 -04:00
|
|
|
info!("Executing passes");
|
|
|
|
|
|
|
|
for p in passes {
|
|
|
|
let run = match p.condition {
|
|
|
|
Always => true,
|
|
|
|
WhenDocumentPrivate => ctxt.render_options.document_private,
|
|
|
|
WhenNotDocumentPrivate => !ctxt.render_options.document_private,
|
|
|
|
WhenNotDocumentHidden => !ctxt.render_options.document_hidden,
|
|
|
|
};
|
|
|
|
if run {
|
|
|
|
debug!("running pass {}", p.pass.name);
|
2021-02-12 01:11:32 -05:00
|
|
|
krate = ctxt.tcx.sess.time(p.pass.name, || (p.pass.run)(krate, &mut ctxt));
|
2020-08-23 22:57:47 -04:00
|
|
|
}
|
|
|
|
}
|
2018-07-27 10:22:16 -05:00
|
|
|
|
2020-08-23 22:57:47 -04:00
|
|
|
ctxt.sess().abort_if_errors();
|
2018-07-28 00:06:51 -05:00
|
|
|
|
2020-12-26 14:22:08 +01:00
|
|
|
// The main crate doc comments are always collapsed.
|
|
|
|
krate.collapsed = true;
|
|
|
|
|
2020-08-23 22:57:47 -04:00
|
|
|
(krate, ctxt.renderinfo.into_inner(), ctxt.render_options)
|
2013-08-15 16:28:54 -04:00
|
|
|
}
|
2019-06-21 12:23:05 +09:00
|
|
|
|
2020-11-05 14:33:23 +01:00
|
|
|
/// Due to <https://github.com/rust-lang/rust/pull/73566>,
|
2020-07-03 18:41:23 -04:00
|
|
|
/// the name resolution pass may find errors that are never emitted.
|
|
|
|
/// If typeck is called after this happens, then we'll get an ICE:
|
|
|
|
/// 'Res::Error found but not reported'. To avoid this, emit the errors now.
|
2020-07-10 18:07:31 -04:00
|
|
|
struct EmitIgnoredResolutionErrors<'tcx> {
|
|
|
|
tcx: TyCtxt<'tcx>,
|
2020-07-03 18:41:23 -04:00
|
|
|
}
|
|
|
|
|
2020-07-10 18:07:31 -04:00
|
|
|
impl<'tcx> EmitIgnoredResolutionErrors<'tcx> {
|
|
|
|
fn new(tcx: TyCtxt<'tcx>) -> Self {
|
2020-07-10 17:59:29 -04:00
|
|
|
Self { tcx }
|
2020-07-03 18:41:23 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-10 18:07:31 -04:00
|
|
|
impl<'tcx> Visitor<'tcx> for EmitIgnoredResolutionErrors<'tcx> {
|
2020-07-10 17:59:29 -04:00
|
|
|
type Map = Map<'tcx>;
|
2020-07-03 18:41:23 -04:00
|
|
|
|
|
|
|
fn nested_visit_map(&mut self) -> NestedVisitorMap<Self::Map> {
|
2020-07-09 09:13:59 -04:00
|
|
|
// We need to recurse into nested closures,
|
|
|
|
// since those will fallback to the parent for type checking.
|
2020-07-10 17:59:29 -04:00
|
|
|
NestedVisitorMap::OnlyBodies(self.tcx.hir())
|
2020-07-03 18:41:23 -04:00
|
|
|
}
|
|
|
|
|
2020-07-10 17:59:29 -04:00
|
|
|
fn visit_path(&mut self, path: &'tcx Path<'_>, _id: HirId) {
|
2020-07-10 17:24:17 -04:00
|
|
|
debug!("visiting path {:?}", path);
|
2020-07-03 18:41:23 -04:00
|
|
|
if path.res == Res::Err {
|
|
|
|
// We have less context here than in rustc_resolve,
|
|
|
|
// so we can only emit the name and span.
|
|
|
|
// However we can give a hint that rustc_resolve will have more info.
|
|
|
|
let label = format!(
|
|
|
|
"could not resolve path `{}`",
|
|
|
|
path.segments
|
|
|
|
.iter()
|
|
|
|
.map(|segment| segment.ident.as_str().to_string())
|
|
|
|
.collect::<Vec<_>>()
|
|
|
|
.join("::")
|
|
|
|
);
|
|
|
|
let mut err = rustc_errors::struct_span_err!(
|
2020-07-10 17:59:29 -04:00
|
|
|
self.tcx.sess,
|
2020-07-03 18:41:23 -04:00
|
|
|
path.span,
|
|
|
|
E0433,
|
|
|
|
"failed to resolve: {}",
|
|
|
|
label
|
|
|
|
);
|
|
|
|
err.span_label(path.span, label);
|
|
|
|
err.note("this error was originally ignored because you are running `rustdoc`");
|
2020-07-10 17:51:38 -04:00
|
|
|
err.note("try running again with `rustc` or `cargo check` and you may get a more detailed error");
|
2020-07-03 18:41:23 -04:00
|
|
|
err.emit();
|
|
|
|
}
|
2020-07-10 17:50:03 -04:00
|
|
|
// We could have an outer resolution that succeeded,
|
|
|
|
// but with generic parameters that failed.
|
|
|
|
// Recurse into the segments so we catch those too.
|
|
|
|
intravisit::walk_path(self, path);
|
2020-07-03 18:41:23 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-21 12:23:05 +09:00
|
|
|
/// `DefId` or parameter index (`ty::ParamTy.index`) of a synthetic type parameter
|
|
|
|
/// for `impl Trait` in argument position.
|
2019-07-09 16:37:55 +09:00
|
|
|
#[derive(Clone, Copy, PartialEq, Eq, Hash, PartialOrd, Ord)]
|
2020-11-14 17:59:58 -05:00
|
|
|
crate enum ImplTraitParam {
|
2019-06-21 12:23:05 +09:00
|
|
|
DefId(DefId),
|
|
|
|
ParamIndex(u32),
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<DefId> for ImplTraitParam {
|
|
|
|
fn from(did: DefId) -> Self {
|
|
|
|
ImplTraitParam::DefId(did)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<u32> for ImplTraitParam {
|
|
|
|
fn from(idx: u32) -> Self {
|
|
|
|
ImplTraitParam::ParamIndex(idx)
|
|
|
|
}
|
|
|
|
}
|