2015-02-25 22:44:44 +11:00
|
|
|
use rustc_lint;
|
2015-01-03 22:42:21 -05:00
|
|
|
use rustc::session::{self, config};
|
2019-11-07 23:53:56 +00:00
|
|
|
use rustc::hir::def::Namespace::TypeNS;
|
2019-05-08 22:07:12 +03:00
|
|
|
use rustc::hir::def_id::{DefId, DefIndex, CrateNum, LOCAL_CRATE};
|
2019-04-20 18:27:44 +03:00
|
|
|
use rustc::hir::HirId;
|
2018-08-03 22:13:05 +02:00
|
|
|
use rustc::middle::cstore::CrateStore;
|
2015-11-19 14:16:35 +03:00
|
|
|
use rustc::middle::privacy::AccessLevels;
|
2019-04-22 22:52:51 +03:00
|
|
|
use rustc::ty::{Ty, TyCtxt};
|
2019-10-07 18:04:05 -04:00
|
|
|
use rustc::lint;
|
2018-04-01 00:09:00 +02:00
|
|
|
use rustc::session::config::ErrorOutputType;
|
2018-12-08 20:30:23 +01:00
|
|
|
use rustc::session::DiagnosticOutput;
|
Generate documentation for auto-trait impls
A new section is added to both both struct and trait doc pages.
On struct/enum pages, a new 'Auto Trait Implementations' section displays any
synthetic implementations for auto traits. Currently, this is only done
for Send and Sync.
On trait pages, a new 'Auto Implementors' section displays all types
which automatically implement the trait. Effectively, this is a list of
all public types in the standard library.
Synthesized impls for a particular auto trait ('synthetic impls') take
into account generic bounds. For example, a type 'struct Foo<T>(T)' will
have 'impl<T> Send for Foo<T> where T: Send' generated for it.
Manual implementations of auto traits are also taken into account. If we have
the following types:
'struct Foo<T>(T)'
'struct Wrapper<T>(Foo<T>)'
'unsafe impl<T> Send for Wrapper<T>' // pretend that Wrapper<T> makes
this sound somehow
Then Wrapper will have the following impl generated:
'impl<T> Send for Wrapper<T>'
reflecting the fact that 'T: Send' need not hold for 'Wrapper<T>: Send'
to hold
Lifetimes, HRTBS, and projections (e.g. '<T as Iterator>::Item') are
taken into account by synthetic impls
However, if a type can *never* implement a particular auto trait
(e.g. 'struct MyStruct<T>(*const T)'), then a negative impl will be
generated (in this case, 'impl<T> !Send for MyStruct<T>')
All of this means that a user should be able to copy-paste a synthetic
impl into their code, without any observable changes in behavior
(assuming the rest of the program remains unchanged).
2017-11-22 16:16:55 -05:00
|
|
|
use rustc::util::nodemap::{FxHashMap, FxHashSet};
|
2018-12-08 20:30:23 +01:00
|
|
|
use rustc_interface::interface;
|
|
|
|
use rustc_driver::abort_on_err;
|
2015-01-11 15:03:34 +13:00
|
|
|
use rustc_resolve as resolve;
|
2013-08-15 16:28:54 -04:00
|
|
|
|
2019-11-07 23:53:56 +00:00
|
|
|
use syntax::ast::CRATE_NODE_ID;
|
2018-08-18 12:14:03 +02:00
|
|
|
use syntax::source_map;
|
2019-07-24 16:18:32 -04:00
|
|
|
use syntax::attr;
|
2015-06-17 17:48:16 -07:00
|
|
|
use syntax::feature_gate::UnstableFeatures;
|
2019-11-14 17:24:44 -05:00
|
|
|
use errors::json::JsonEmitter;
|
2019-05-08 13:21:18 +10:00
|
|
|
use syntax::symbol::sym;
|
2019-11-07 23:53:56 +00:00
|
|
|
use syntax_pos::DUMMY_SP;
|
2018-04-01 00:09:00 +02:00
|
|
|
use errors::emitter::{Emitter, EmitterWriter};
|
2013-08-15 16:28:54 -04:00
|
|
|
|
2018-08-07 10:10:05 -05:00
|
|
|
use std::cell::RefCell;
|
2016-09-01 10:21:12 +03:00
|
|
|
use std::mem;
|
2018-03-03 06:20:26 +01:00
|
|
|
use rustc_data_structures::sync::{self, Lrc};
|
2018-12-08 20:30:23 +01:00
|
|
|
use std::rc::Rc;
|
2013-08-15 16:28:54 -04:00
|
|
|
|
2019-02-23 16:40:07 +09:00
|
|
|
use crate::config::{Options as RustdocOptions, RenderOptions};
|
|
|
|
use crate::clean;
|
2019-08-12 07:10:55 -04:00
|
|
|
use crate::clean::{MAX_DEF_ID, AttributesExt};
|
2019-02-23 16:40:07 +09:00
|
|
|
use crate::html::render::RenderInfo;
|
|
|
|
|
|
|
|
use crate::passes;
|
2013-08-15 16:28:54 -04:00
|
|
|
|
2018-07-26 12:36:11 -06:00
|
|
|
pub use rustc::session::config::{Input, Options, CodegenOptions};
|
2018-11-22 16:33:07 +11:00
|
|
|
pub use rustc::session::search_paths::SearchPath;
|
2015-01-17 21:23:05 -08:00
|
|
|
|
2016-11-08 14:02:55 +11:00
|
|
|
pub type ExternalPaths = FxHashMap<DefId, (Vec<String>, clean::TypeKind)>;
|
2014-05-09 13:52:17 -07:00
|
|
|
|
2018-12-08 20:30:23 +01:00
|
|
|
pub struct DocContext<'tcx> {
|
|
|
|
|
2019-06-14 00:48:52 +03:00
|
|
|
pub tcx: TyCtxt<'tcx>,
|
2019-07-24 14:43:40 -04:00
|
|
|
pub resolver: Rc<RefCell<interface::BoxedResolver>>,
|
2016-04-15 16:34:48 +02:00
|
|
|
/// Later on moved into `html::render::CACHE_KEY`
|
2016-04-07 05:59:02 +02:00
|
|
|
pub renderinfo: RefCell<RenderInfo>,
|
2016-04-15 16:34:48 +02:00
|
|
|
/// Later on moved through `clean::Crate` into `html::render::CACHE_KEY`
|
2019-08-10 16:19:25 -04:00
|
|
|
pub external_traits: Rc<RefCell<FxHashMap<DefId, clean::Trait>>>,
|
2018-02-21 18:33:42 -06:00
|
|
|
/// Used while populating `external_traits` to ensure we don't process the same trait twice at
|
|
|
|
/// the same time.
|
2019-08-10 17:10:13 -04:00
|
|
|
pub active_extern_traits: RefCell<FxHashSet<DefId>>,
|
2016-09-01 10:21:12 +03:00
|
|
|
// The current set of type and lifetime substitutions,
|
|
|
|
// for expanding type aliases at the HIR level:
|
|
|
|
|
2019-04-20 19:46:19 +03:00
|
|
|
/// Table `DefId` of type parameter -> substituted type
|
|
|
|
pub ty_substs: RefCell<FxHashMap<DefId, clean::Type>>,
|
|
|
|
/// Table `DefId` of lifetime parameter -> substituted lifetime
|
2017-08-15 17:05:25 +02:00
|
|
|
pub lt_substs: RefCell<FxHashMap<DefId, clean::Lifetime>>,
|
2019-04-20 19:46:19 +03:00
|
|
|
/// Table `DefId` of const parameter -> substituted const
|
|
|
|
pub ct_substs: RefCell<FxHashMap<DefId, clean::Constant>>,
|
2019-06-21 12:23:05 +09:00
|
|
|
/// Table synthetic type parameter for `impl Trait` in argument position -> bounds
|
|
|
|
pub impl_trait_bounds: RefCell<FxHashMap<ImplTraitParam, Vec<clean::GenericBound>>>,
|
Generate documentation for auto-trait impls
A new section is added to both both struct and trait doc pages.
On struct/enum pages, a new 'Auto Trait Implementations' section displays any
synthetic implementations for auto traits. Currently, this is only done
for Send and Sync.
On trait pages, a new 'Auto Implementors' section displays all types
which automatically implement the trait. Effectively, this is a list of
all public types in the standard library.
Synthesized impls for a particular auto trait ('synthetic impls') take
into account generic bounds. For example, a type 'struct Foo<T>(T)' will
have 'impl<T> Send for Foo<T> where T: Send' generated for it.
Manual implementations of auto traits are also taken into account. If we have
the following types:
'struct Foo<T>(T)'
'struct Wrapper<T>(Foo<T>)'
'unsafe impl<T> Send for Wrapper<T>' // pretend that Wrapper<T> makes
this sound somehow
Then Wrapper will have the following impl generated:
'impl<T> Send for Wrapper<T>'
reflecting the fact that 'T: Send' need not hold for 'Wrapper<T>: Send'
to hold
Lifetimes, HRTBS, and projections (e.g. '<T as Iterator>::Item') are
taken into account by synthetic impls
However, if a type can *never* implement a particular auto trait
(e.g. 'struct MyStruct<T>(*const T)'), then a negative impl will be
generated (in this case, 'impl<T> !Send for MyStruct<T>')
All of this means that a user should be able to copy-paste a synthetic
impl into their code, without any observable changes in behavior
(assuming the rest of the program remains unchanged).
2017-11-22 16:16:55 -05:00
|
|
|
pub fake_def_ids: RefCell<FxHashMap<CrateNum, DefId>>,
|
|
|
|
pub all_fake_def_ids: RefCell<FxHashSet<DefId>>,
|
2019-04-22 22:52:51 +03:00
|
|
|
/// Auto-trait or blanket impls processed so far, as `(self_ty, trait_def_id)`.
|
|
|
|
// FIXME(eddyb) make this a `ty::TraitRef<'tcx>` set.
|
|
|
|
pub generated_synthetics: RefCell<FxHashSet<(Ty<'tcx>, DefId)>>,
|
2019-04-26 01:16:57 +03:00
|
|
|
pub auto_traits: Vec<DefId>,
|
2014-03-05 16:36:01 +02:00
|
|
|
}
|
|
|
|
|
2018-12-08 20:30:23 +01:00
|
|
|
impl<'tcx> DocContext<'tcx> {
|
2016-11-20 03:42:54 +02:00
|
|
|
pub fn sess(&self) -> &session::Session {
|
|
|
|
&self.tcx.sess
|
2014-06-26 11:37:39 -07:00
|
|
|
}
|
2016-09-01 10:21:12 +03:00
|
|
|
|
2018-12-08 20:30:23 +01:00
|
|
|
pub fn enter_resolver<F, R>(&self, f: F) -> R
|
|
|
|
where F: FnOnce(&mut resolve::Resolver<'_>) -> R {
|
2019-07-24 14:43:40 -04:00
|
|
|
self.resolver.borrow_mut().access(f)
|
2018-12-08 20:30:23 +01:00
|
|
|
}
|
|
|
|
|
2016-09-01 10:21:12 +03:00
|
|
|
/// Call the closure with the given parameters set as
|
|
|
|
/// the substitutions for a type alias' RHS.
|
|
|
|
pub fn enter_alias<F, R>(&self,
|
2019-04-20 19:46:19 +03:00
|
|
|
ty_substs: FxHashMap<DefId, clean::Type>,
|
2017-08-15 17:05:25 +02:00
|
|
|
lt_substs: FxHashMap<DefId, clean::Lifetime>,
|
2019-04-20 19:46:19 +03:00
|
|
|
ct_substs: FxHashMap<DefId, clean::Constant>,
|
2016-09-01 10:21:12 +03:00
|
|
|
f: F) -> R
|
|
|
|
where F: FnOnce() -> R {
|
2019-02-15 22:24:00 +00:00
|
|
|
let (old_tys, old_lts, old_cts) = (
|
|
|
|
mem::replace(&mut *self.ty_substs.borrow_mut(), ty_substs),
|
|
|
|
mem::replace(&mut *self.lt_substs.borrow_mut(), lt_substs),
|
|
|
|
mem::replace(&mut *self.ct_substs.borrow_mut(), ct_substs),
|
|
|
|
);
|
2016-09-01 10:21:12 +03:00
|
|
|
let r = f();
|
|
|
|
*self.ty_substs.borrow_mut() = old_tys;
|
|
|
|
*self.lt_substs.borrow_mut() = old_lts;
|
2019-02-15 22:24:00 +00:00
|
|
|
*self.ct_substs.borrow_mut() = old_cts;
|
2016-09-01 10:21:12 +03:00
|
|
|
r
|
|
|
|
}
|
2018-08-03 22:13:05 +02:00
|
|
|
|
|
|
|
// This is an ugly hack, but it's the simplest way to handle synthetic impls without greatly
|
|
|
|
// refactoring either librustdoc or librustc. In particular, allowing new DefIds to be
|
|
|
|
// registered after the AST is constructed would require storing the defid mapping in a
|
|
|
|
// RefCell, decreasing the performance for normal compilation for very little gain.
|
|
|
|
//
|
2019-05-08 22:07:12 +03:00
|
|
|
// Instead, we construct 'fake' def ids, which start immediately after the last DefId.
|
|
|
|
// In the Debug impl for clean::Item, we explicitly check for fake
|
2018-08-03 22:13:05 +02:00
|
|
|
// def ids, as we'll end up with a panic if we use the DefId Debug impl for fake DefIds
|
|
|
|
pub fn next_def_id(&self, crate_num: CrateNum) -> DefId {
|
|
|
|
let start_def_id = {
|
|
|
|
let next_id = if crate_num == LOCAL_CRATE {
|
|
|
|
self.tcx
|
2018-12-04 13:45:36 +01:00
|
|
|
.hir()
|
2018-08-03 22:13:05 +02:00
|
|
|
.definitions()
|
|
|
|
.def_path_table()
|
2019-05-08 22:07:12 +03:00
|
|
|
.next_id()
|
2018-08-03 22:13:05 +02:00
|
|
|
} else {
|
2019-10-20 03:28:36 +03:00
|
|
|
self.enter_resolver(|r| r.cstore().def_path_table(crate_num).next_id())
|
2018-08-03 22:13:05 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
DefId {
|
|
|
|
krate: crate_num,
|
|
|
|
index: next_id,
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let mut fake_ids = self.fake_def_ids.borrow_mut();
|
|
|
|
|
|
|
|
let def_id = fake_ids.entry(crate_num).or_insert(start_def_id).clone();
|
|
|
|
fake_ids.insert(
|
|
|
|
crate_num,
|
|
|
|
DefId {
|
|
|
|
krate: crate_num,
|
2019-05-18 13:19:33 +02:00
|
|
|
index: DefIndex::from(def_id.index.index() + 1),
|
2018-08-03 22:13:05 +02:00
|
|
|
},
|
|
|
|
);
|
|
|
|
|
|
|
|
MAX_DEF_ID.with(|m| {
|
|
|
|
m.borrow_mut()
|
|
|
|
.entry(def_id.krate.clone())
|
|
|
|
.or_insert(start_def_id);
|
|
|
|
});
|
|
|
|
|
|
|
|
self.all_fake_def_ids.borrow_mut().insert(def_id);
|
|
|
|
|
|
|
|
def_id.clone()
|
|
|
|
}
|
|
|
|
|
2018-09-19 09:28:49 -05:00
|
|
|
/// Like the function of the same name on the HIR map, but skips calling it on fake DefIds.
|
|
|
|
/// (This avoids a slice-index-out-of-bounds panic.)
|
2019-03-04 09:00:30 +01:00
|
|
|
pub fn as_local_hir_id(&self, def_id: DefId) -> Option<HirId> {
|
|
|
|
if self.all_fake_def_ids.borrow().contains(&def_id) {
|
|
|
|
None
|
|
|
|
} else {
|
|
|
|
self.tcx.hir().as_local_hir_id(def_id)
|
|
|
|
}
|
|
|
|
}
|
2019-07-24 16:18:32 -04:00
|
|
|
|
|
|
|
pub fn stability(&self, id: HirId) -> Option<attr::Stability> {
|
|
|
|
self.tcx.hir().opt_local_def_id(id)
|
|
|
|
.and_then(|def_id| self.tcx.lookup_stability(def_id)).cloned()
|
|
|
|
}
|
2019-07-24 16:22:48 -04:00
|
|
|
|
|
|
|
pub fn deprecation(&self, id: HirId) -> Option<attr::Deprecation> {
|
|
|
|
self.tcx.hir().opt_local_def_id(id)
|
|
|
|
.and_then(|def_id| self.tcx.lookup_deprecation(def_id))
|
|
|
|
}
|
2013-08-15 16:28:54 -04:00
|
|
|
}
|
|
|
|
|
2018-04-24 18:29:04 -05:00
|
|
|
/// Creates a new diagnostic `Handler` that can be used to emit warnings and errors.
|
|
|
|
///
|
2018-08-18 12:13:35 +02:00
|
|
|
/// If the given `error_format` is `ErrorOutputType::Json` and no `SourceMap` is given, a new one
|
2018-04-24 18:29:04 -05:00
|
|
|
/// will be created for the handler.
|
2018-09-13 23:00:10 +02:00
|
|
|
pub fn new_handler(error_format: ErrorOutputType,
|
|
|
|
source_map: Option<Lrc<source_map::SourceMap>>,
|
2019-03-06 19:49:39 -08:00
|
|
|
treat_err_as_bug: Option<usize>,
|
2018-09-19 18:39:39 -05:00
|
|
|
ui_testing: bool,
|
2018-09-13 23:00:10 +02:00
|
|
|
) -> errors::Handler {
|
2018-04-24 18:29:04 -05:00
|
|
|
// rustdoc doesn't override (or allow to override) anything from this that is relevant here, so
|
|
|
|
// stick to the defaults
|
2018-07-26 12:36:11 -06:00
|
|
|
let sessopts = Options::default();
|
2018-04-24 18:29:04 -05:00
|
|
|
let emitter: Box<dyn Emitter + sync::Send> = match error_format {
|
2019-03-25 11:16:58 +01:00
|
|
|
ErrorOutputType::HumanReadable(kind) => {
|
|
|
|
let (short, color_config) = kind.unzip();
|
|
|
|
Box::new(
|
|
|
|
EmitterWriter::stderr(
|
|
|
|
color_config,
|
|
|
|
source_map.map(|cm| cm as _),
|
|
|
|
short,
|
|
|
|
sessopts.debugging_opts.teach,
|
2019-08-14 17:57:28 -07:00
|
|
|
sessopts.debugging_opts.terminal_width,
|
2019-09-07 09:57:11 -04:00
|
|
|
false,
|
2019-03-25 11:16:58 +01:00
|
|
|
).ui_testing(ui_testing)
|
|
|
|
)
|
|
|
|
},
|
|
|
|
ErrorOutputType::Json { pretty, json_rendered } => {
|
2018-08-18 12:14:14 +02:00
|
|
|
let source_map = source_map.unwrap_or_else(
|
2018-08-18 12:14:03 +02:00
|
|
|
|| Lrc::new(source_map::SourceMap::new(sessopts.file_path_mapping())));
|
2018-04-24 18:29:04 -05:00
|
|
|
Box::new(
|
|
|
|
JsonEmitter::stderr(
|
|
|
|
None,
|
2018-08-18 12:14:14 +02:00
|
|
|
source_map,
|
2018-04-24 18:29:04 -05:00
|
|
|
pretty,
|
2019-03-25 11:16:58 +01:00
|
|
|
json_rendered,
|
2019-09-07 09:57:11 -04:00
|
|
|
false,
|
2018-09-19 18:39:39 -05:00
|
|
|
).ui_testing(ui_testing)
|
2018-04-24 18:29:04 -05:00
|
|
|
)
|
|
|
|
},
|
|
|
|
};
|
|
|
|
|
|
|
|
errors::Handler::with_emitter_and_flags(
|
|
|
|
emitter,
|
|
|
|
errors::HandlerFlags {
|
|
|
|
can_emit_warnings: true,
|
2018-09-13 23:00:10 +02:00
|
|
|
treat_err_as_bug,
|
2018-07-19 17:53:44 +02:00
|
|
|
report_delayed_bugs: false,
|
2018-04-24 18:29:04 -05:00
|
|
|
external_macro_backtrace: false,
|
|
|
|
..Default::default()
|
|
|
|
},
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2019-08-10 16:43:39 -04:00
|
|
|
pub fn run_core(options: RustdocOptions) -> (clean::Crate, RenderInfo, RenderOptions) {
|
2014-05-18 16:56:13 +03:00
|
|
|
// Parse, resolve, and typecheck the given crate.
|
|
|
|
|
2018-10-30 13:35:10 -05:00
|
|
|
let RustdocOptions {
|
|
|
|
input,
|
|
|
|
crate_name,
|
2019-07-20 16:34:41 -04:00
|
|
|
proc_macro_crate,
|
2018-10-30 13:35:10 -05:00
|
|
|
error_format,
|
|
|
|
libs,
|
|
|
|
externs,
|
2019-09-25 17:08:40 +02:00
|
|
|
mut cfgs,
|
2018-10-30 13:35:10 -05:00
|
|
|
codegen_options,
|
|
|
|
debugging_options,
|
|
|
|
target,
|
|
|
|
edition,
|
|
|
|
maybe_sysroot,
|
|
|
|
lint_opts,
|
|
|
|
describe_lints,
|
|
|
|
lint_cap,
|
|
|
|
mut default_passes,
|
|
|
|
mut manual_passes,
|
|
|
|
display_warnings,
|
|
|
|
render_options,
|
|
|
|
..
|
|
|
|
} = options;
|
|
|
|
|
2019-11-07 23:53:56 +00:00
|
|
|
let extern_names: Vec<String> = externs.iter().map(|(s,_)| s).cloned().collect();
|
|
|
|
|
2019-11-06 14:48:10 +01:00
|
|
|
// Add the doc cfg into the doc build.
|
2019-11-06 18:32:51 +01:00
|
|
|
cfgs.push("doc".to_string());
|
2019-09-25 17:08:40 +02:00
|
|
|
|
2018-10-30 13:35:10 -05:00
|
|
|
let cpath = Some(input.clone());
|
|
|
|
let input = Input::File(input);
|
2013-08-15 16:28:54 -04:00
|
|
|
|
2018-06-13 21:17:15 +02:00
|
|
|
let intra_link_resolution_failure_name = lint::builtin::INTRA_DOC_LINK_RESOLUTION_FAILURE.name;
|
2018-06-04 23:44:35 +02:00
|
|
|
let warnings_lint_name = lint::builtin::WARNINGS.name;
|
2018-07-05 20:06:33 +02:00
|
|
|
let missing_docs = rustc_lint::builtin::MISSING_DOCS.name;
|
2018-09-29 17:16:06 +02:00
|
|
|
let missing_doc_example = rustc_lint::builtin::MISSING_DOC_CODE_EXAMPLES.name;
|
2018-10-26 00:55:12 +02:00
|
|
|
let private_doc_tests = rustc_lint::builtin::PRIVATE_DOC_TESTS.name;
|
2018-07-11 00:36:31 +02:00
|
|
|
|
|
|
|
// In addition to those specific lints, we also need to whitelist those given through
|
|
|
|
// command line, otherwise they'll get ignored and we don't want that.
|
|
|
|
let mut whitelisted_lints = vec![warnings_lint_name.to_owned(),
|
|
|
|
intra_link_resolution_failure_name.to_owned(),
|
2018-09-18 00:25:50 +02:00
|
|
|
missing_docs.to_owned(),
|
2018-10-26 00:55:12 +02:00
|
|
|
missing_doc_example.to_owned(),
|
|
|
|
private_doc_tests.to_owned()];
|
2018-07-11 00:36:31 +02:00
|
|
|
|
2018-10-30 13:35:10 -05:00
|
|
|
whitelisted_lints.extend(lint_opts.iter().map(|(lint, _)| lint).cloned());
|
2018-07-11 00:36:31 +02:00
|
|
|
|
2018-12-08 20:30:23 +01:00
|
|
|
let lints = || {
|
2019-10-07 18:04:05 -04:00
|
|
|
lint::builtin::HardwiredLints::get_lints()
|
2018-12-08 20:30:23 +01:00
|
|
|
.into_iter()
|
2019-10-07 18:04:05 -04:00
|
|
|
.chain(rustc_lint::SoftLints::get_lints().into_iter())
|
2018-12-08 20:30:23 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
let lint_opts = lints().filter_map(|lint| {
|
|
|
|
if lint.name == warnings_lint_name ||
|
|
|
|
lint.name == intra_link_resolution_failure_name {
|
|
|
|
None
|
|
|
|
} else {
|
|
|
|
Some((lint.name_lower(), lint::Allow))
|
|
|
|
}
|
|
|
|
}).chain(lint_opts.into_iter()).collect::<Vec<_>>();
|
|
|
|
|
|
|
|
let lint_caps = lints().filter_map(|lint| {
|
|
|
|
// We don't want to whitelist *all* lints so let's
|
|
|
|
// ignore those ones.
|
|
|
|
if whitelisted_lints.iter().any(|l| &lint.name == l) {
|
|
|
|
None
|
|
|
|
} else {
|
|
|
|
Some((lint::LintId::of(lint), lint::Allow))
|
|
|
|
}
|
|
|
|
}).collect();
|
2014-06-04 14:35:58 -07:00
|
|
|
|
2019-07-20 16:34:41 -04:00
|
|
|
let crate_types = if proc_macro_crate {
|
|
|
|
vec![config::CrateType::ProcMacro]
|
|
|
|
} else {
|
|
|
|
vec![config::CrateType::Rlib]
|
|
|
|
};
|
2018-04-01 00:09:00 +02:00
|
|
|
// plays with error output here!
|
2014-05-18 16:56:13 +03:00
|
|
|
let sessopts = config::Options {
|
2017-08-06 22:54:09 -07:00
|
|
|
maybe_sysroot,
|
2018-10-30 13:35:10 -05:00
|
|
|
search_paths: libs,
|
2019-07-20 16:34:41 -04:00
|
|
|
crate_types,
|
2018-10-30 13:35:10 -05:00
|
|
|
lint_opts: if !display_warnings {
|
2018-12-08 20:30:23 +01:00
|
|
|
lint_opts
|
2018-06-04 23:44:35 +02:00
|
|
|
} else {
|
|
|
|
vec![]
|
|
|
|
},
|
2018-06-23 15:09:21 +02:00
|
|
|
lint_cap: Some(lint_cap.unwrap_or_else(|| lint::Forbid)),
|
2018-10-30 13:35:10 -05:00
|
|
|
cg: codegen_options,
|
2017-08-06 22:54:09 -07:00
|
|
|
externs,
|
2019-06-11 11:06:34 -07:00
|
|
|
target_triple: target,
|
Preliminary feature staging
This partially implements the feature staging described in the
[release channel RFC][rc]. It does not yet fully conform to the RFC as
written, but does accomplish its goals sufficiently for the 1.0 alpha
release.
It has three primary user-visible effects:
* On the nightly channel, use of unstable APIs generates a warning.
* On the beta channel, use of unstable APIs generates a warning.
* On the beta channel, use of feature gates generates a warning.
Code that does not trigger these warnings is considered 'stable',
modulo pre-1.0 bugs.
Disabling the warnings for unstable APIs continues to be done in the
existing (i.e. old) style, via `#[allow(...)]`, not that specified in
the RFC. I deem this marginally acceptable since any code that must do
this is not using the stable dialect of Rust.
Use of feature gates is itself gated with the new 'unstable_features'
lint, on nightly set to 'allow', and on beta 'warn'.
The attribute scheme used here corresponds to an older version of the
RFC, with the `#[staged_api]` crate attribute toggling the staging
behavior of the stability attributes, but the user impact is only
in-tree so I'm not concerned about having to make design changes later
(and I may ultimately prefer the scheme here after all, with the
`#[staged_api]` crate attribute).
Since the Rust codebase itself makes use of unstable features the
compiler and build system to a midly elaborate dance to allow it to
bootstrap while disobeying these lints (which would otherwise be
errors because Rust builds with `-D warnings`).
This patch includes one significant hack that causes a
regression. Because the `format_args!` macro emits calls to unstable
APIs it would trigger the lint. I added a hack to the lint to make it
not trigger, but this in turn causes arguments to `println!` not to be
checked for feature gates. I don't presently understand macro
expansion well enough to fix. This is bug #20661.
Closes #16678
[rc]: https://github.com/rust-lang/rfcs/blob/master/text/0507-release-channels.md
2015-01-06 06:26:08 -08:00
|
|
|
// Ensure that rustdoc works even if rustc is feature-staged
|
2015-06-17 17:48:16 -07:00
|
|
|
unstable_features: UnstableFeatures::Allow,
|
2016-09-29 19:10:29 -07:00
|
|
|
actually_rustdoc: true,
|
2019-06-08 19:06:58 +09:00
|
|
|
debugging_opts: debugging_options,
|
2018-04-01 00:09:00 +02:00
|
|
|
error_format,
|
2018-04-20 14:47:23 -07:00
|
|
|
edition,
|
2018-06-23 15:09:21 +02:00
|
|
|
describe_lints,
|
2018-07-26 12:36:11 -06:00
|
|
|
..Options::default()
|
2013-08-15 16:28:54 -04:00
|
|
|
};
|
2018-07-01 00:27:44 +02:00
|
|
|
|
2018-12-08 20:30:23 +01:00
|
|
|
let config = interface::Config {
|
|
|
|
opts: sessopts,
|
2019-10-11 23:48:16 +02:00
|
|
|
crate_cfg: interface::parse_cfgspecs(cfgs),
|
2018-12-08 20:30:23 +01:00
|
|
|
input,
|
|
|
|
input_path: cpath,
|
|
|
|
output_file: None,
|
|
|
|
output_dir: None,
|
|
|
|
file_loader: None,
|
|
|
|
diagnostic_output: DiagnosticOutput::Default,
|
|
|
|
stderr: None,
|
2019-08-10 13:44:23 -04:00
|
|
|
crate_name,
|
2018-12-08 20:30:23 +01:00
|
|
|
lint_caps,
|
2019-10-10 19:33:00 -04:00
|
|
|
register_lints: None,
|
2019-11-11 16:09:03 +01:00
|
|
|
override_queries: None,
|
2019-11-15 19:41:50 +01:00
|
|
|
registry: rustc_driver::diagnostics_registry(),
|
2018-12-08 20:30:23 +01:00
|
|
|
};
|
2018-04-26 00:49:52 +02:00
|
|
|
|
2018-12-08 20:30:23 +01:00
|
|
|
interface::run_compiler_in_existing_thread_pool(config, |compiler| {
|
|
|
|
let sess = compiler.session();
|
2018-04-26 00:49:52 +02:00
|
|
|
|
2018-12-08 20:30:23 +01:00
|
|
|
// We need to hold on to the complete resolver, so we cause everything to be
|
|
|
|
// cloned for the analysis passes to use. Suboptimal, but necessary in the
|
2018-04-26 00:49:52 +02:00
|
|
|
// current architecture.
|
2019-11-07 23:53:56 +00:00
|
|
|
let resolver = {
|
|
|
|
let parts = abort_on_err(compiler.expansion(), sess).peek();
|
|
|
|
let resolver = parts.1.borrow();
|
|
|
|
|
|
|
|
// Before we actually clone it, let's force all the extern'd crates to
|
|
|
|
// actually be loaded, just in case they're only referred to inside
|
|
|
|
// intra-doc-links
|
|
|
|
resolver.borrow_mut().access(|resolver| {
|
|
|
|
for extern_name in &extern_names {
|
|
|
|
resolver.resolve_str_path_error(DUMMY_SP, extern_name, TypeNS, CRATE_NODE_ID)
|
|
|
|
.unwrap_or_else(
|
|
|
|
|()| panic!("Unable to resolve external crate {}", extern_name)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
// Now we're good to clone the resolver because everything should be loaded
|
|
|
|
resolver.clone()
|
|
|
|
};
|
2015-06-14 04:50:23 +03:00
|
|
|
|
2019-06-22 12:44:03 +01:00
|
|
|
if sess.has_errors() {
|
2018-12-08 20:30:23 +01:00
|
|
|
sess.fatal("Compilation failed, aborting rustdoc");
|
|
|
|
}
|
2018-04-26 00:49:52 +02:00
|
|
|
|
2018-12-08 20:30:23 +01:00
|
|
|
let mut global_ctxt = abort_on_err(compiler.global_ctxt(), sess).take();
|
2018-04-26 00:49:52 +02:00
|
|
|
|
2018-12-08 20:30:23 +01:00
|
|
|
global_ctxt.enter(|tcx| {
|
|
|
|
tcx.analysis(LOCAL_CRATE).ok();
|
|
|
|
|
|
|
|
// Abort if there were any errors so far
|
|
|
|
sess.abort_if_errors();
|
|
|
|
|
|
|
|
let access_levels = tcx.privacy_access_levels(LOCAL_CRATE);
|
2019-03-11 11:03:19 +01:00
|
|
|
// Convert from a HirId set to a DefId set since we don't always have easy access
|
|
|
|
// to the map from defid -> hirid
|
2018-04-26 00:49:52 +02:00
|
|
|
let access_levels = AccessLevels {
|
|
|
|
map: access_levels.map.iter()
|
2019-06-27 11:28:14 +02:00
|
|
|
.map(|(&k, &v)| (tcx.hir().local_def_id(k), v))
|
2018-04-26 00:49:52 +02:00
|
|
|
.collect()
|
|
|
|
};
|
|
|
|
|
2018-08-30 16:46:10 -05:00
|
|
|
let mut renderinfo = RenderInfo::default();
|
|
|
|
renderinfo.access_levels = access_levels;
|
|
|
|
|
2019-08-12 07:10:55 -04:00
|
|
|
let mut ctxt = DocContext {
|
2018-04-26 00:49:52 +02:00
|
|
|
tcx,
|
2018-12-08 20:30:23 +01:00
|
|
|
resolver,
|
2018-04-26 00:49:52 +02:00
|
|
|
external_traits: Default::default(),
|
|
|
|
active_extern_traits: Default::default(),
|
2018-08-30 16:46:10 -05:00
|
|
|
renderinfo: RefCell::new(renderinfo),
|
2018-04-26 00:49:52 +02:00
|
|
|
ty_substs: Default::default(),
|
|
|
|
lt_substs: Default::default(),
|
2019-02-15 22:24:00 +00:00
|
|
|
ct_substs: Default::default(),
|
2018-04-26 00:49:52 +02:00
|
|
|
impl_trait_bounds: Default::default(),
|
2018-10-16 16:57:53 +02:00
|
|
|
fake_def_ids: Default::default(),
|
|
|
|
all_fake_def_ids: Default::default(),
|
|
|
|
generated_synthetics: Default::default(),
|
2019-08-10 16:59:21 -04:00
|
|
|
auto_traits: tcx.all_traits(LOCAL_CRATE).iter().cloned().filter(|trait_def_id| {
|
2019-04-26 01:16:57 +03:00
|
|
|
tcx.trait_is_auto(*trait_def_id)
|
|
|
|
}).collect(),
|
2018-04-26 00:49:52 +02:00
|
|
|
};
|
2018-12-04 13:45:36 +01:00
|
|
|
debug!("crate: {:?}", tcx.hir().krate());
|
2018-04-26 00:49:52 +02:00
|
|
|
|
2019-08-12 07:10:55 -04:00
|
|
|
let mut krate = clean::krate(&mut ctxt);
|
2018-04-26 00:49:52 +02:00
|
|
|
|
2018-07-27 10:22:16 -05:00
|
|
|
fn report_deprecated_attr(name: &str, diag: &errors::Handler) {
|
|
|
|
let mut msg = diag.struct_warn(&format!("the `#![doc({})]` attribute is \
|
|
|
|
considered deprecated", name));
|
|
|
|
msg.warn("please see https://github.com/rust-lang/rust/issues/44136");
|
|
|
|
|
|
|
|
if name == "no_default_passes" {
|
|
|
|
msg.help("you may want to use `#![doc(document_private_items)]`");
|
|
|
|
}
|
|
|
|
|
|
|
|
msg.emit();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Process all of the crate attributes, extracting plugin metadata along
|
|
|
|
// with the passes which we are supposed to run.
|
2019-05-08 13:21:18 +10:00
|
|
|
for attr in krate.module.as_ref().unwrap().attrs.lists(sym::doc) {
|
2018-07-27 10:22:16 -05:00
|
|
|
let diag = ctxt.sess().diagnostic();
|
|
|
|
|
2019-03-17 14:17:47 +03:00
|
|
|
let name = attr.name_or_empty();
|
2018-07-27 10:22:16 -05:00
|
|
|
if attr.is_word() {
|
2019-05-08 14:33:06 +10:00
|
|
|
if name == sym::no_default_passes {
|
2018-07-27 10:22:16 -05:00
|
|
|
report_deprecated_attr("no_default_passes", diag);
|
|
|
|
if default_passes == passes::DefaultPassOption::Default {
|
|
|
|
default_passes = passes::DefaultPassOption::None;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if let Some(value) = attr.value_str() {
|
2019-05-08 14:33:06 +10:00
|
|
|
let sink = match name {
|
|
|
|
sym::passes => {
|
2018-07-27 10:22:16 -05:00
|
|
|
report_deprecated_attr("passes = \"...\"", diag);
|
|
|
|
&mut manual_passes
|
|
|
|
},
|
2019-05-08 14:33:06 +10:00
|
|
|
sym::plugins => {
|
2018-07-27 10:22:16 -05:00
|
|
|
report_deprecated_attr("plugins = \"...\"", diag);
|
2019-07-23 20:06:00 +02:00
|
|
|
eprintln!("WARNING: `#![doc(plugins = \"...\")]` no longer functions; \
|
2018-07-27 10:22:16 -05:00
|
|
|
see CVE-2018-1000622");
|
|
|
|
continue
|
|
|
|
},
|
|
|
|
_ => continue,
|
|
|
|
};
|
2019-08-10 16:43:39 -04:00
|
|
|
for name in value.as_str().split_whitespace() {
|
|
|
|
sink.push(name.to_string());
|
2018-07-27 10:22:16 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-08 14:33:06 +10:00
|
|
|
if attr.is_word() && name == sym::document_private_items {
|
2018-07-27 10:22:16 -05:00
|
|
|
if default_passes == passes::DefaultPassOption::Default {
|
|
|
|
default_passes = passes::DefaultPassOption::Private;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-10 16:43:39 -04:00
|
|
|
let passes = passes::defaults(default_passes).iter().chain(manual_passes.into_iter()
|
|
|
|
.flat_map(|name| {
|
|
|
|
if let Some(pass) = passes::find_pass(&name) {
|
|
|
|
Some(pass)
|
|
|
|
} else {
|
|
|
|
error!("unknown pass {}, skipping", name);
|
|
|
|
None
|
|
|
|
}
|
|
|
|
}));
|
2018-07-27 10:22:16 -05:00
|
|
|
|
2019-02-23 15:10:56 -05:00
|
|
|
info!("Executing passes");
|
|
|
|
|
2019-08-10 16:43:39 -04:00
|
|
|
for pass in passes {
|
|
|
|
debug!("running pass {}", pass.name);
|
|
|
|
krate = (pass.pass)(krate, &ctxt);
|
2018-07-27 10:22:16 -05:00
|
|
|
}
|
|
|
|
|
2018-07-28 00:06:51 -05:00
|
|
|
ctxt.sess().abort_if_errors();
|
|
|
|
|
2019-08-10 16:43:39 -04:00
|
|
|
(krate, ctxt.renderinfo.into_inner(), render_options)
|
2018-12-08 20:30:23 +01:00
|
|
|
})
|
2018-04-26 00:49:52 +02:00
|
|
|
})
|
2013-08-15 16:28:54 -04:00
|
|
|
}
|
2019-06-21 12:23:05 +09:00
|
|
|
|
|
|
|
/// `DefId` or parameter index (`ty::ParamTy.index`) of a synthetic type parameter
|
|
|
|
/// for `impl Trait` in argument position.
|
2019-07-09 16:37:55 +09:00
|
|
|
#[derive(Clone, Copy, PartialEq, Eq, Hash, PartialOrd, Ord)]
|
2019-06-21 12:23:05 +09:00
|
|
|
pub enum ImplTraitParam {
|
|
|
|
DefId(DefId),
|
|
|
|
ParamIndex(u32),
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<DefId> for ImplTraitParam {
|
|
|
|
fn from(did: DefId) -> Self {
|
|
|
|
ImplTraitParam::DefId(did)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<u32> for ImplTraitParam {
|
|
|
|
fn from(idx: u32) -> Self {
|
|
|
|
ImplTraitParam::ParamIndex(idx)
|
|
|
|
}
|
|
|
|
}
|