rust/src/librustdoc/core.rs

743 lines
27 KiB
Rust
Raw Normal View History

use rustc_attr as attr;
2019-12-24 05:02:53 +01:00
use rustc_data_structures::fx::{FxHashMap, FxHashSet};
use rustc_data_structures::sync::{self, Lrc};
use rustc_driver::abort_on_err;
use rustc_errors::emitter::{Emitter, EmitterWriter};
use rustc_errors::json::JsonEmitter;
2019-11-30 02:50:47 +01:00
use rustc_feature::UnstableFeatures;
use rustc_hir::def::{Namespace::TypeNS, Res};
use rustc_hir::def_id::{CrateNum, DefId, DefIndex, LocalDefId, CRATE_DEF_INDEX, LOCAL_CRATE};
use rustc_hir::HirId;
use rustc_hir::{
2020-07-10 17:50:03 -04:00
intravisit::{self, NestedVisitorMap, Visitor},
Path,
};
2019-12-22 17:42:04 -05:00
use rustc_interface::interface;
use rustc_middle::hir::map::Map;
2020-03-29 17:19:48 +02:00
use rustc_middle::middle::cstore::CrateStore;
use rustc_middle::middle::privacy::AccessLevels;
use rustc_middle::ty::{Ty, TyCtxt};
use rustc_resolve as resolve;
use rustc_session::config::{self, CrateType, ErrorOutputType};
use rustc_session::lint;
use rustc_session::DiagnosticOutput;
use rustc_session::Session;
use rustc_span::source_map;
2020-01-01 19:30:57 +01:00
use rustc_span::symbol::sym;
use rustc_span::DUMMY_SP;
2013-08-15 16:28:54 -04:00
use std::cell::RefCell;
2016-09-01 10:21:12 +03:00
use std::mem;
use std::rc::Rc;
2013-08-15 16:28:54 -04:00
2019-02-23 16:40:07 +09:00
use crate::clean;
2019-12-22 17:42:04 -05:00
use crate::clean::{AttributesExt, MAX_DEF_ID};
use crate::config::{Options as RustdocOptions, RenderOptions};
2020-08-16 17:56:02 -04:00
use crate::config::{OutputFormat, RenderInfo};
use crate::passes::{self, Condition::*, ConditionalPass};
2013-08-15 16:28:54 -04:00
pub use rustc_session::config::{CodegenOptions, DebuggingOptions, Input, Options};
pub use rustc_session::search_paths::SearchPath;
2015-01-17 21:23:05 -08:00
pub type ExternalPaths = FxHashMap<DefId, (Vec<String>, clean::TypeKind)>;
pub struct DocContext<'tcx> {
2019-06-14 00:48:52 +03:00
pub tcx: TyCtxt<'tcx>,
2019-07-24 14:43:40 -04:00
pub resolver: Rc<RefCell<interface::BoxedResolver>>,
2020-07-27 17:34:17 -05:00
/// Later on moved into `CACHE_KEY`
pub renderinfo: RefCell<RenderInfo>,
2020-07-27 17:34:17 -05:00
/// Later on moved through `clean::Crate` into `CACHE_KEY`
pub external_traits: Rc<RefCell<FxHashMap<DefId, clean::Trait>>>,
2018-02-21 18:33:42 -06:00
/// Used while populating `external_traits` to ensure we don't process the same trait twice at
/// the same time.
2019-08-10 17:10:13 -04:00
pub active_extern_traits: RefCell<FxHashSet<DefId>>,
2016-09-01 10:21:12 +03:00
// The current set of type and lifetime substitutions,
// for expanding type aliases at the HIR level:
/// Table `DefId` of type parameter -> substituted type
pub ty_substs: RefCell<FxHashMap<DefId, clean::Type>>,
/// Table `DefId` of lifetime parameter -> substituted lifetime
pub lt_substs: RefCell<FxHashMap<DefId, clean::Lifetime>>,
/// Table `DefId` of const parameter -> substituted const
pub ct_substs: RefCell<FxHashMap<DefId, clean::Constant>>,
/// Table synthetic type parameter for `impl Trait` in argument position -> bounds
pub impl_trait_bounds: RefCell<FxHashMap<ImplTraitParam, Vec<clean::GenericBound>>>,
Generate documentation for auto-trait impls A new section is added to both both struct and trait doc pages. On struct/enum pages, a new 'Auto Trait Implementations' section displays any synthetic implementations for auto traits. Currently, this is only done for Send and Sync. On trait pages, a new 'Auto Implementors' section displays all types which automatically implement the trait. Effectively, this is a list of all public types in the standard library. Synthesized impls for a particular auto trait ('synthetic impls') take into account generic bounds. For example, a type 'struct Foo<T>(T)' will have 'impl<T> Send for Foo<T> where T: Send' generated for it. Manual implementations of auto traits are also taken into account. If we have the following types: 'struct Foo<T>(T)' 'struct Wrapper<T>(Foo<T>)' 'unsafe impl<T> Send for Wrapper<T>' // pretend that Wrapper<T> makes this sound somehow Then Wrapper will have the following impl generated: 'impl<T> Send for Wrapper<T>' reflecting the fact that 'T: Send' need not hold for 'Wrapper<T>: Send' to hold Lifetimes, HRTBS, and projections (e.g. '<T as Iterator>::Item') are taken into account by synthetic impls However, if a type can *never* implement a particular auto trait (e.g. 'struct MyStruct<T>(*const T)'), then a negative impl will be generated (in this case, 'impl<T> !Send for MyStruct<T>') All of this means that a user should be able to copy-paste a synthetic impl into their code, without any observable changes in behavior (assuming the rest of the program remains unchanged).
2017-11-22 16:16:55 -05:00
pub fake_def_ids: RefCell<FxHashMap<CrateNum, DefId>>,
pub all_fake_def_ids: RefCell<FxHashSet<DefId>>,
/// Auto-trait or blanket impls processed so far, as `(self_ty, trait_def_id)`.
// FIXME(eddyb) make this a `ty::TraitRef<'tcx>` set.
pub generated_synthetics: RefCell<FxHashSet<(Ty<'tcx>, DefId)>>,
pub auto_traits: Vec<DefId>,
/// The options given to rustdoc that could be relevant to a pass.
pub render_options: RenderOptions,
2020-08-08 14:57:35 -04:00
/// The traits in scope for a given module.
///
/// See `collect_intra_doc_links::traits_implemented_by` for more details.
2020-08-08 14:57:35 -04:00
/// `map<module, set<trait>>`
pub module_trait_cache: RefCell<FxHashMap<DefId, FxHashSet<DefId>>>,
2014-03-05 16:36:01 +02:00
}
impl<'tcx> DocContext<'tcx> {
pub fn sess(&self) -> &Session {
&self.tcx.sess
}
2016-09-01 10:21:12 +03:00
pub fn enter_resolver<F, R>(&self, f: F) -> R
2019-12-22 17:42:04 -05:00
where
F: FnOnce(&mut resolve::Resolver<'_>) -> R,
{
2019-07-24 14:43:40 -04:00
self.resolver.borrow_mut().access(f)
}
2016-09-01 10:21:12 +03:00
/// Call the closure with the given parameters set as
/// the substitutions for a type alias' RHS.
2019-12-22 17:42:04 -05:00
pub fn enter_alias<F, R>(
&self,
ty_substs: FxHashMap<DefId, clean::Type>,
lt_substs: FxHashMap<DefId, clean::Lifetime>,
ct_substs: FxHashMap<DefId, clean::Constant>,
f: F,
) -> R
where
F: FnOnce() -> R,
{
let (old_tys, old_lts, old_cts) = (
mem::replace(&mut *self.ty_substs.borrow_mut(), ty_substs),
mem::replace(&mut *self.lt_substs.borrow_mut(), lt_substs),
mem::replace(&mut *self.ct_substs.borrow_mut(), ct_substs),
);
2016-09-01 10:21:12 +03:00
let r = f();
*self.ty_substs.borrow_mut() = old_tys;
*self.lt_substs.borrow_mut() = old_lts;
*self.ct_substs.borrow_mut() = old_cts;
2016-09-01 10:21:12 +03:00
r
}
// This is an ugly hack, but it's the simplest way to handle synthetic impls without greatly
2020-03-29 15:24:45 +02:00
// refactoring either librustdoc or librustc_middle. In particular, allowing new DefIds to be
// registered after the AST is constructed would require storing the defid mapping in a
// RefCell, decreasing the performance for normal compilation for very little gain.
//
2019-05-08 22:07:12 +03:00
// Instead, we construct 'fake' def ids, which start immediately after the last DefId.
// In the Debug impl for clean::Item, we explicitly check for fake
// def ids, as we'll end up with a panic if we use the DefId Debug impl for fake DefIds
pub fn next_def_id(&self, crate_num: CrateNum) -> DefId {
let start_def_id = {
let num_def_ids = if crate_num == LOCAL_CRATE {
self.tcx.hir().definitions().def_path_table().num_def_ids()
} else {
self.enter_resolver(|r| r.cstore().num_def_ids(crate_num))
};
DefId { krate: crate_num, index: DefIndex::from_usize(num_def_ids) }
};
let mut fake_ids = self.fake_def_ids.borrow_mut();
let def_id = *fake_ids.entry(crate_num).or_insert(start_def_id);
fake_ids.insert(
crate_num,
2019-12-22 17:42:04 -05:00
DefId { krate: crate_num, index: DefIndex::from(def_id.index.index() + 1) },
);
MAX_DEF_ID.with(|m| {
m.borrow_mut().entry(def_id.krate).or_insert(start_def_id);
});
self.all_fake_def_ids.borrow_mut().insert(def_id);
def_id
}
/// Like `hir().local_def_id_to_hir_id()`, but skips calling it on fake DefIds.
2018-09-19 09:28:49 -05:00
/// (This avoids a slice-index-out-of-bounds panic.)
pub fn as_local_hir_id(&self, def_id: DefId) -> Option<HirId> {
if self.all_fake_def_ids.borrow().contains(&def_id) {
None
} else {
def_id.as_local().map(|def_id| self.tcx.hir().local_def_id_to_hir_id(def_id))
}
}
pub fn stability(&self, id: HirId) -> Option<attr::Stability> {
2019-12-22 17:42:04 -05:00
self.tcx
.hir()
.opt_local_def_id(id)
.and_then(|def_id| self.tcx.lookup_stability(def_id.to_def_id()))
2019-12-22 17:42:04 -05:00
.cloned()
}
pub fn deprecation(&self, id: HirId) -> Option<attr::Deprecation> {
self.tcx
.hir()
.opt_local_def_id(id)
.and_then(|def_id| self.tcx.lookup_deprecation(def_id.to_def_id()))
}
2013-08-15 16:28:54 -04:00
}
/// Creates a new diagnostic `Handler` that can be used to emit warnings and errors.
///
2018-08-18 12:13:35 +02:00
/// If the given `error_format` is `ErrorOutputType::Json` and no `SourceMap` is given, a new one
/// will be created for the handler.
2019-12-22 17:42:04 -05:00
pub fn new_handler(
error_format: ErrorOutputType,
source_map: Option<Lrc<source_map::SourceMap>>,
debugging_opts: &DebuggingOptions,
) -> rustc_errors::Handler {
let emitter: Box<dyn Emitter + sync::Send> = match error_format {
ErrorOutputType::HumanReadable(kind) => {
let (short, color_config) = kind.unzip();
Box::new(
EmitterWriter::stderr(
color_config,
2020-02-22 16:07:05 +02:00
source_map.map(|sm| sm as _),
short,
debugging_opts.teach,
debugging_opts.terminal_width,
false,
2019-12-22 17:42:04 -05:00
)
.ui_testing(debugging_opts.ui_testing),
)
2019-12-22 17:42:04 -05:00
}
ErrorOutputType::Json { pretty, json_rendered } => {
2019-12-22 17:42:04 -05:00
let source_map = source_map.unwrap_or_else(|| {
Lrc::new(source_map::SourceMap::new(source_map::FilePathMapping::empty()))
2019-12-22 17:42:04 -05:00
});
Box::new(
JsonEmitter::stderr(
None,
source_map,
pretty,
json_rendered,
debugging_opts.terminal_width,
false,
)
.ui_testing(debugging_opts.ui_testing),
)
2019-12-22 17:42:04 -05:00
}
};
rustc_errors::Handler::with_emitter_and_flags(
emitter,
debugging_opts.diagnostic_handler_flags(true),
)
}
2020-04-26 14:07:13 +02:00
/// This function is used to setup the lint initialization. By default, in rustdoc, everything
/// is "allowed". Depending if we run in test mode or not, we want some of them to be at their
/// default level. For example, the "INVALID_CODEBLOCK_ATTRIBUTES" lint is activated in both
2020-04-26 14:07:13 +02:00
/// modes.
///
/// A little detail easy to forget is that there is a way to set the lint level for all lints
/// through the "WARNINGS" lint. To prevent this to happen, we set it back to its "normal" level
/// inside this function.
///
/// It returns a tuple containing:
/// * Vector of tuples of lints' name and their associated "max" level
/// * HashMap of lint id with their associated "max" level
pub(crate) fn init_lints<F>(
mut allowed_lints: Vec<String>,
2020-04-26 14:07:13 +02:00
lint_opts: Vec<(String, lint::Level)>,
filter_call: F,
) -> (Vec<(String, lint::Level)>, FxHashMap<lint::LintId, lint::Level>)
where
F: Fn(&lint::Lint) -> Option<(String, lint::Level)>,
{
let warnings_lint_name = lint::builtin::WARNINGS.name;
allowed_lints.push(warnings_lint_name.to_owned());
allowed_lints.extend(lint_opts.iter().map(|(lint, _)| lint).cloned());
2020-04-26 14:07:13 +02:00
let lints = || {
lint::builtin::HardwiredLints::get_lints()
.into_iter()
.chain(rustc_lint::SoftLints::get_lints().into_iter())
};
let lint_opts = lints()
.filter_map(|lint| {
// Permit feature-gated lints to avoid feature errors when trying to
// allow all lints.
2020-08-25 10:42:24 -04:00
if lint.feature_gate.is_some() || allowed_lints.iter().any(|l| lint.name == l) {
None
} else {
filter_call(lint)
}
})
2020-04-26 14:07:13 +02:00
.chain(lint_opts.into_iter())
.collect::<Vec<_>>();
let lint_caps = lints()
.filter_map(|lint| {
// We don't want to allow *all* lints so let's ignore
// those ones.
if allowed_lints.iter().any(|l| lint.name == l) {
2020-04-26 14:07:13 +02:00
None
} else {
Some((lint::LintId::of(lint), lint::Allow))
}
})
.collect();
(lint_opts, lint_caps)
}
2020-08-16 18:41:13 -04:00
pub fn run_core(
options: RustdocOptions,
) -> (clean::Crate, RenderInfo, RenderOptions, Lrc<Session>) {
// Parse, resolve, and typecheck the given crate.
let RustdocOptions {
input,
crate_name,
proc_macro_crate,
error_format,
libs,
externs,
mut cfgs,
codegen_options,
debugging_opts,
target,
edition,
maybe_sysroot,
lint_opts,
describe_lints,
lint_cap,
default_passes,
manual_passes,
display_warnings,
render_options,
output_format,
..
} = options;
2019-12-22 17:42:04 -05:00
let extern_names: Vec<String> = externs
.iter()
2019-12-05 14:43:53 -08:00
.filter(|(_, entry)| entry.add_prelude)
2019-12-22 17:42:04 -05:00
.map(|(name, _)| name)
.cloned()
.collect();
// Add the doc cfg into the doc build.
2019-11-06 18:32:51 +01:00
cfgs.push("doc".to_string());
let cpath = Some(input.clone());
let input = Input::File(input);
2013-08-15 16:28:54 -04:00
2020-07-30 10:39:16 -07:00
let intra_link_resolution_failure_name = lint::builtin::BROKEN_INTRA_DOC_LINKS.name;
2018-07-05 20:06:33 +02:00
let missing_docs = rustc_lint::builtin::MISSING_DOCS.name;
let missing_doc_example = rustc_lint::builtin::MISSING_DOC_CODE_EXAMPLES.name;
2018-10-26 00:55:12 +02:00
let private_doc_tests = rustc_lint::builtin::PRIVATE_DOC_TESTS.name;
2020-03-22 13:04:23 +01:00
let no_crate_level_docs = rustc_lint::builtin::MISSING_CRATE_LEVEL_DOCS.name;
let invalid_codeblock_attributes_name = rustc_lint::builtin::INVALID_CODEBLOCK_ATTRIBUTES.name;
2020-09-23 20:25:56 +02:00
let invalid_html_tags = rustc_lint::builtin::INVALID_HTML_TAGS.name;
let renamed_and_removed_lints = rustc_lint::builtin::RENAMED_AND_REMOVED_LINTS.name;
2020-10-31 15:14:44 +01:00
let non_autolinks = rustc_lint::builtin::NON_AUTOLINKS.name;
let unknown_lints = rustc_lint::builtin::UNKNOWN_LINTS.name;
2018-07-11 00:36:31 +02:00
// In addition to those specific lints, we also need to allow those given through
2018-07-11 00:36:31 +02:00
// command line, otherwise they'll get ignored and we don't want that.
2020-08-25 09:18:57 -04:00
let lints_to_show = vec![
2019-12-22 17:42:04 -05:00
intra_link_resolution_failure_name.to_owned(),
missing_docs.to_owned(),
missing_doc_example.to_owned(),
private_doc_tests.to_owned(),
2020-03-22 13:04:23 +01:00
no_crate_level_docs.to_owned(),
invalid_codeblock_attributes_name.to_owned(),
2020-09-23 20:25:56 +02:00
invalid_html_tags.to_owned(),
renamed_and_removed_lints.to_owned(),
unknown_lints.to_owned(),
2020-10-31 15:14:44 +01:00
non_autolinks.to_owned(),
2019-12-22 17:42:04 -05:00
];
2018-07-11 00:36:31 +02:00
2020-08-25 09:18:57 -04:00
let (lint_opts, lint_caps) = init_lints(lints_to_show, lint_opts, |lint| {
2020-04-26 14:07:13 +02:00
if lint.name == intra_link_resolution_failure_name
|| lint.name == invalid_codeblock_attributes_name
2020-04-26 14:07:13 +02:00
{
None
} else {
Some((lint.name_lower(), lint::Allow))
}
});
let crate_types =
if proc_macro_crate { vec![CrateType::ProcMacro] } else { vec![CrateType::Rlib] };
// plays with error output here!
let sessopts = config::Options {
maybe_sysroot,
search_paths: libs,
crate_types,
2019-12-22 17:42:04 -05:00
lint_opts: if !display_warnings { lint_opts } else { vec![] },
2020-08-25 09:18:57 -04:00
lint_cap,
cg: codegen_options,
externs,
target_triple: target,
unstable_features: UnstableFeatures::from_environment(),
actually_rustdoc: true,
debugging_opts,
error_format,
2018-04-20 14:47:23 -07:00
edition,
describe_lints,
2018-07-26 12:36:11 -06:00
..Options::default()
2013-08-15 16:28:54 -04:00
};
let config = interface::Config {
opts: sessopts,
2019-10-11 23:48:16 +02:00
crate_cfg: interface::parse_cfgspecs(cfgs),
input,
input_path: cpath,
output_file: None,
output_dir: None,
file_loader: None,
diagnostic_output: DiagnosticOutput::Default,
stderr: None,
crate_name,
lint_caps,
register_lints: None,
override_queries: Some(|_sess, providers, _external_providers| {
// Most lints will require typechecking, so just don't run them.
providers.lint_mod = |_, _| {};
2020-07-17 08:47:04 +00:00
// Prevent `rustc_typeck::check_crate` from calling `typeck` on all bodies.
providers.typeck_item_bodies = |_, _| {};
2020-07-17 08:47:04 +00:00
// hack so that `used_trait_imports` won't try to call typeck
providers.used_trait_imports = |_, _| {
lazy_static! {
static ref EMPTY_SET: FxHashSet<LocalDefId> = FxHashSet::default();
}
&EMPTY_SET
};
// In case typeck does end up being called, don't ICE in case there were name resolution errors
2020-07-17 08:47:04 +00:00
providers.typeck = move |tcx, def_id| {
// Closures' tables come from their outermost function,
// as they are part of the same "inference environment".
2020-07-17 08:47:04 +00:00
// This avoids emitting errors for the parent twice (see similar code in `typeck_with_fallback`)
let outer_def_id = tcx.closure_base_def_id(def_id.to_def_id()).expect_local();
if outer_def_id != def_id {
2020-07-17 08:47:04 +00:00
return tcx.typeck(outer_def_id);
}
let hir = tcx.hir();
let body = hir.body(hir.body_owned_by(hir.local_def_id_to_hir_id(def_id)));
debug!("visiting body for {:?}", def_id);
2020-08-18 16:49:37 -04:00
tcx.sess.time("emit_ignored_resolution_errors", || {
EmitIgnoredResolutionErrors::new(tcx).visit_body(body);
Add some timing info to rustdoc There are various improvements, but the main one is to time each pass that rustdoc performs (`rustdoc::passes`). Before, these were the top five timings for `cargo doc` on the cargo repository: ``` +---------------------------------+-----------+-----------------+----------+------------+ | Item | Self time | % of total time | Time | Item count | +---------------------------------+-----------+-----------------+----------+------------+ | <unknown> | 854.70ms | 20.888 | 2.47s | 744823 | +---------------------------------+-----------+-----------------+----------+------------+ | expand_crate | 795.29ms | 19.436 | 848.00ms | 1 | +---------------------------------+-----------+-----------------+----------+------------+ | metadata_decode_entry | 256.73ms | 6.274 | 279.49ms | 518344 | +---------------------------------+-----------+-----------------+----------+------------+ | resolve_crate | 240.56ms | 5.879 | 242.86ms | 1 | +---------------------------------+-----------+-----------------+----------+------------+ | hir_lowering | 146.79ms | 3.587 | 146.79ms | 1 | +---------------------------------+-----------+-----------------+----------+------------+ ``` Now the timings are: ``` +---------------------------------+-----------+-----------------+----------+------------+ | Item | Self time | % of total time | Time | Item count | +---------------------------------+-----------+-----------------+----------+------------+ | <unknown> | 1.40s | 22.662 | 3.73s | 771430 | +---------------------------------+-----------+-----------------+----------+------------+ | collect-trait-impls | 1.34s | 21.672 | 2.87s | 1 | +---------------------------------+-----------+-----------------+----------+------------+ | expand_crate | 1.21s | 19.577 | 1.28s | 1 | +---------------------------------+-----------+-----------------+----------+------------+ | build extern trait impl | 704.66ms | 11.427 | 1.07s | 21893 | +---------------------------------+-----------+-----------------+----------+------------+ | metadata_decode_entry | 354.84ms | 5.754 | 391.81ms | 544919 | +---------------------------------+-----------+-----------------+----------+------------+ ```
2020-07-16 09:02:41 -04:00
});
2020-07-17 08:47:04 +00:00
(rustc_interface::DEFAULT_QUERY_PROVIDERS.typeck)(tcx, def_id)
};
}),
make_codegen_backend: None,
2019-11-15 19:41:50 +01:00
registry: rustc_driver::diagnostics_registry(),
};
2018-04-26 00:49:52 +02:00
interface::create_compiler_and_run(config, |compiler| {
2019-12-22 17:42:04 -05:00
compiler.enter(|queries| {
let sess = compiler.session();
// We need to hold on to the complete resolver, so we cause everything to be
// cloned for the analysis passes to use. Suboptimal, but necessary in the
// current architecture.
let resolver = {
let parts = abort_on_err(queries.expansion(), sess).peek();
let resolver = parts.1.borrow();
// Before we actually clone it, let's force all the extern'd crates to
// actually be loaded, just in case they're only referred to inside
// intra-doc-links
resolver.borrow_mut().access(|resolver| {
2020-08-18 16:49:37 -04:00
sess.time("load_extern_crates", || {
for extern_name in &extern_names {
2020-08-08 23:47:07 -04:00
debug!("loading extern crate {}", extern_name);
resolver
.resolve_str_path_error(
DUMMY_SP,
extern_name,
TypeNS,
LocalDefId { local_def_index: CRATE_DEF_INDEX }.to_def_id(),
)
.unwrap_or_else(|()| {
panic!("Unable to resolve external crate {}", extern_name)
});
}
});
});
2019-12-22 17:42:04 -05:00
// Now we're good to clone the resolver because everything should be loaded
resolver.clone()
2019-11-26 12:16:36 +01:00
};
2019-12-22 17:42:04 -05:00
if sess.has_errors() {
sess.fatal("Compilation failed, aborting rustdoc");
}
2019-11-26 12:16:36 +01:00
2019-12-22 17:42:04 -05:00
let mut global_ctxt = abort_on_err(queries.global_ctxt(), sess).take();
2020-08-16 18:41:13 -04:00
let (krate, render_info, opts) = sess.time("run_global_ctxt", || {
2020-08-16 17:56:02 -04:00
global_ctxt.enter(|tcx| {
run_global_ctxt(
tcx,
resolver,
default_passes,
manual_passes,
render_options,
output_format,
)
})
2020-08-16 18:41:13 -04:00
});
(krate, render_info, opts, Lrc::clone(sess))
})
})
}
2020-08-16 17:56:02 -04:00
fn run_global_ctxt(
tcx: TyCtxt<'_>,
resolver: Rc<RefCell<interface::BoxedResolver>>,
mut default_passes: passes::DefaultPassOption,
mut manual_passes: Vec<String>,
render_options: RenderOptions,
output_format: Option<OutputFormat>,
) -> (clean::Crate, RenderInfo, RenderOptions) {
// Certain queries assume that some checks were run elsewhere
// (see https://github.com/rust-lang/rust/pull/73566#issuecomment-656954425),
// so type-check everything other than function bodies in this crate before running lints.
// NOTE: this does not call `tcx.analysis()` so that we won't
// typeck function bodies or run the default rustc lints.
// (see `override_queries` in the `config`)
// HACK(jynelson) this calls an _extremely_ limited subset of `typeck`
// and might break if queries change their assumptions in the future.
// NOTE: This is copy/pasted from typeck/lib.rs and should be kept in sync with those changes.
tcx.sess.time("item_types_checking", || {
for &module in tcx.hir().krate().modules.keys() {
tcx.ensure().check_mod_item_types(tcx.hir().local_def_id(module));
}
});
tcx.sess.abort_if_errors();
tcx.sess.time("missing_docs", || {
rustc_lint::check_crate(tcx, rustc_lint::builtin::MissingDoc::new);
});
tcx.sess.time("check_mod_attrs", || {
for &module in tcx.hir().krate().modules.keys() {
let local_def_id = tcx.hir().local_def_id(module);
tcx.ensure().check_mod_attrs(local_def_id);
}
});
2019-12-22 17:42:04 -05:00
let access_levels = tcx.privacy_access_levels(LOCAL_CRATE);
// Convert from a HirId set to a DefId set since we don't always have easy access
// to the map from defid -> hirid
let access_levels = AccessLevels {
map: access_levels
.map
.iter()
.map(|(&k, &v)| (tcx.hir().local_def_id(k).to_def_id(), v))
.collect(),
};
let mut renderinfo = RenderInfo::default();
renderinfo.access_levels = access_levels;
renderinfo.output_format = output_format;
let mut ctxt = DocContext {
tcx,
resolver,
external_traits: Default::default(),
active_extern_traits: Default::default(),
renderinfo: RefCell::new(renderinfo),
ty_substs: Default::default(),
lt_substs: Default::default(),
ct_substs: Default::default(),
impl_trait_bounds: Default::default(),
fake_def_ids: Default::default(),
all_fake_def_ids: Default::default(),
generated_synthetics: Default::default(),
auto_traits: tcx
.all_traits(LOCAL_CRATE)
.iter()
.cloned()
.filter(|trait_def_id| tcx.trait_is_auto(*trait_def_id))
.collect(),
render_options,
module_trait_cache: RefCell::new(FxHashMap::default()),
};
debug!("crate: {:?}", tcx.hir().krate());
2019-12-22 17:42:04 -05:00
2020-08-18 16:49:37 -04:00
let mut krate = tcx.sess.time("clean_crate", || clean::krate(&mut ctxt));
2019-12-22 17:42:04 -05:00
if let Some(ref m) = krate.module {
if let None | Some("") = m.doc_value() {
let help = "The following guide may be of use:\n\
2020-08-31 13:16:50 +02:00
https://doc.rust-lang.org/nightly/rustdoc/how-to-write-documentation.html";
tcx.struct_lint_node(
rustc_lint::builtin::MISSING_CRATE_LEVEL_DOCS,
ctxt.as_local_hir_id(m.def_id).unwrap(),
|lint| {
2020-08-16 17:56:02 -04:00
let mut diag =
lint.build("no documentation found for this crate's top-level module");
diag.help(help);
diag.emit();
},
);
}
}
fn report_deprecated_attr(name: &str, diag: &rustc_errors::Handler) {
2020-08-16 17:56:02 -04:00
let mut msg = diag
.struct_warn(&format!("the `#![doc({})]` attribute is considered deprecated", name));
msg.warn(
"see issue #44136 <https://github.com/rust-lang/rust/issues/44136> \
2020-08-31 13:16:50 +02:00
for more information",
);
2019-12-22 17:42:04 -05:00
if name == "no_default_passes" {
msg.help("you may want to use `#![doc(document_private_items)]`");
}
msg.emit();
}
// Process all of the crate attributes, extracting plugin metadata along
// with the passes which we are supposed to run.
for attr in krate.module.as_ref().unwrap().attrs.lists(sym::doc) {
let diag = ctxt.sess().diagnostic();
let name = attr.name_or_empty();
if attr.is_word() {
if name == sym::no_default_passes {
report_deprecated_attr("no_default_passes", diag);
if default_passes == passes::DefaultPassOption::Default {
default_passes = passes::DefaultPassOption::None;
}
}
} else if let Some(value) = attr.value_str() {
let sink = match name {
sym::passes => {
report_deprecated_attr("passes = \"...\"", diag);
&mut manual_passes
}
sym::plugins => {
report_deprecated_attr("plugins = \"...\"", diag);
eprintln!(
"WARNING: `#![doc(plugins = \"...\")]` \
2020-08-31 13:16:50 +02:00
no longer functions; see CVE-2018-1000622"
);
continue;
}
_ => continue,
};
for name in value.as_str().split_whitespace() {
sink.push(name.to_string());
}
}
if attr.is_word() && name == sym::document_private_items {
ctxt.render_options.document_private = true;
}
}
let passes = passes::defaults(default_passes).iter().copied().chain(
manual_passes.into_iter().flat_map(|name| {
if let Some(pass) = passes::find_pass(&name) {
Some(ConditionalPass::always(pass))
} else {
error!("unknown pass {}, skipping", name);
None
}
}),
);
2019-11-26 12:16:36 +01:00
info!("Executing passes");
for p in passes {
let run = match p.condition {
Always => true,
WhenDocumentPrivate => ctxt.render_options.document_private,
WhenNotDocumentPrivate => !ctxt.render_options.document_private,
WhenNotDocumentHidden => !ctxt.render_options.document_hidden,
};
if run {
debug!("running pass {}", p.pass.name);
krate = ctxt.tcx.sess.time(p.pass.name, || (p.pass.run)(krate, &ctxt));
}
}
ctxt.sess().abort_if_errors();
(krate, ctxt.renderinfo.into_inner(), ctxt.render_options)
2013-08-15 16:28:54 -04:00
}
2020-11-05 14:33:23 +01:00
/// Due to <https://github.com/rust-lang/rust/pull/73566>,
/// the name resolution pass may find errors that are never emitted.
/// If typeck is called after this happens, then we'll get an ICE:
/// 'Res::Error found but not reported'. To avoid this, emit the errors now.
struct EmitIgnoredResolutionErrors<'tcx> {
tcx: TyCtxt<'tcx>,
}
impl<'tcx> EmitIgnoredResolutionErrors<'tcx> {
fn new(tcx: TyCtxt<'tcx>) -> Self {
Self { tcx }
}
}
impl<'tcx> Visitor<'tcx> for EmitIgnoredResolutionErrors<'tcx> {
type Map = Map<'tcx>;
fn nested_visit_map(&mut self) -> NestedVisitorMap<Self::Map> {
// We need to recurse into nested closures,
// since those will fallback to the parent for type checking.
NestedVisitorMap::OnlyBodies(self.tcx.hir())
}
fn visit_path(&mut self, path: &'tcx Path<'_>, _id: HirId) {
debug!("visiting path {:?}", path);
if path.res == Res::Err {
// We have less context here than in rustc_resolve,
// so we can only emit the name and span.
// However we can give a hint that rustc_resolve will have more info.
let label = format!(
"could not resolve path `{}`",
path.segments
.iter()
.map(|segment| segment.ident.as_str().to_string())
.collect::<Vec<_>>()
.join("::")
);
let mut err = rustc_errors::struct_span_err!(
self.tcx.sess,
path.span,
E0433,
"failed to resolve: {}",
label
);
err.span_label(path.span, label);
err.note("this error was originally ignored because you are running `rustdoc`");
2020-07-10 17:51:38 -04:00
err.note("try running again with `rustc` or `cargo check` and you may get a more detailed error");
err.emit();
}
2020-07-10 17:50:03 -04:00
// We could have an outer resolution that succeeded,
// but with generic parameters that failed.
// Recurse into the segments so we catch those too.
intravisit::walk_path(self, path);
}
}
/// `DefId` or parameter index (`ty::ParamTy.index`) of a synthetic type parameter
/// for `impl Trait` in argument position.
#[derive(Clone, Copy, PartialEq, Eq, Hash, PartialOrd, Ord)]
pub enum ImplTraitParam {
DefId(DefId),
ParamIndex(u32),
}
impl From<DefId> for ImplTraitParam {
fn from(did: DefId) -> Self {
ImplTraitParam::DefId(did)
}
}
impl From<u32> for ImplTraitParam {
fn from(idx: u32) -> Self {
ImplTraitParam::ParamIndex(idx)
}
}