| // Copyright 2018 The Go Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style |
| // license that can be found in the LICENSE file. |
| |
| package source |
| |
| import ( |
| "bytes" |
| "context" |
| "fmt" |
| "strings" |
| |
| "golang.org/x/tools/go/analysis" |
| "golang.org/x/tools/go/analysis/passes/asmdecl" |
| "golang.org/x/tools/go/analysis/passes/assign" |
| "golang.org/x/tools/go/analysis/passes/atomic" |
| "golang.org/x/tools/go/analysis/passes/atomicalign" |
| "golang.org/x/tools/go/analysis/passes/bools" |
| "golang.org/x/tools/go/analysis/passes/buildtag" |
| "golang.org/x/tools/go/analysis/passes/cgocall" |
| "golang.org/x/tools/go/analysis/passes/composite" |
| "golang.org/x/tools/go/analysis/passes/copylock" |
| "golang.org/x/tools/go/analysis/passes/httpresponse" |
| "golang.org/x/tools/go/analysis/passes/loopclosure" |
| "golang.org/x/tools/go/analysis/passes/lostcancel" |
| "golang.org/x/tools/go/analysis/passes/nilfunc" |
| "golang.org/x/tools/go/analysis/passes/printf" |
| "golang.org/x/tools/go/analysis/passes/shift" |
| "golang.org/x/tools/go/analysis/passes/sortslice" |
| "golang.org/x/tools/go/analysis/passes/stdmethods" |
| "golang.org/x/tools/go/analysis/passes/structtag" |
| "golang.org/x/tools/go/analysis/passes/tests" |
| "golang.org/x/tools/go/analysis/passes/unmarshal" |
| "golang.org/x/tools/go/analysis/passes/unreachable" |
| "golang.org/x/tools/go/analysis/passes/unsafeptr" |
| "golang.org/x/tools/go/analysis/passes/unusedresult" |
| "golang.org/x/tools/go/packages" |
| "golang.org/x/tools/internal/lsp/protocol" |
| "golang.org/x/tools/internal/lsp/telemetry" |
| "golang.org/x/tools/internal/span" |
| "golang.org/x/tools/internal/telemetry/log" |
| "golang.org/x/tools/internal/telemetry/trace" |
| errors "golang.org/x/xerrors" |
| ) |
| |
| type Diagnostic struct { |
| URI span.URI |
| Range protocol.Range |
| Message string |
| Source string |
| Severity DiagnosticSeverity |
| |
| SuggestedFixes []SuggestedFix |
| } |
| |
| type SuggestedFix struct { |
| Title string |
| Edits []protocol.TextEdit |
| } |
| |
| type DiagnosticSeverity int |
| |
| const ( |
| SeverityWarning DiagnosticSeverity = iota |
| SeverityError |
| ) |
| |
| func Diagnostics(ctx context.Context, view View, f GoFile, disabledAnalyses map[string]struct{}) (map[span.URI][]Diagnostic, string, error) { |
| ctx, done := trace.StartSpan(ctx, "source.Diagnostics", telemetry.File.Of(f.URI())) |
| defer done() |
| |
| cphs, err := f.CheckPackageHandles(ctx) |
| if err != nil { |
| return nil, "", err |
| } |
| cph := WidestCheckPackageHandle(cphs) |
| pkg, err := cph.Check(ctx) |
| if err != nil { |
| log.Error(ctx, "no package for file", err) |
| return singleDiagnostic(f.URI(), "%s is not part of a package", f.URI()), "", nil |
| } |
| |
| // Prepare the reports we will send for the files in this package. |
| reports := make(map[span.URI][]Diagnostic) |
| for _, fh := range pkg.Files() { |
| clearReports(view, reports, fh.File().Identity().URI) |
| } |
| |
| // If we have `go list` errors, we may want to offer a warning message to the user. |
| var warningMsg string |
| if hasListErrors(pkg.GetErrors()) { |
| warningMsg, err = checkCommonErrors(ctx, view, f.URI()) |
| if err != nil { |
| log.Error(ctx, "error checking common errors", err, telemetry.File.Of(f.URI)) |
| } |
| } |
| |
| // Prepare any additional reports for the errors in this package. |
| for _, err := range pkg.GetErrors() { |
| if err.Kind != packages.ListError { |
| continue |
| } |
| clearReports(view, reports, packagesErrorSpan(err).URI()) |
| } |
| |
| // Run diagnostics for the package that this URI belongs to. |
| if !diagnostics(ctx, view, pkg, reports) { |
| // If we don't have any list, parse, or type errors, run analyses. |
| if err := analyses(ctx, view, cph, disabledAnalyses, reports); err != nil { |
| log.Error(ctx, "failed to run analyses", err, telemetry.File.Of(f.URI())) |
| } |
| } |
| // Updates to the diagnostics for this package may need to be propagated. |
| revDeps := f.GetActiveReverseDeps(ctx) |
| for _, f := range revDeps { |
| cphs, err := f.CheckPackageHandles(ctx) |
| if err != nil { |
| return nil, "", err |
| } |
| cph := WidestCheckPackageHandle(cphs) |
| pkg, err := cph.Check(ctx) |
| if err != nil { |
| return nil, warningMsg, err |
| } |
| for _, fh := range pkg.Files() { |
| clearReports(view, reports, fh.File().Identity().URI) |
| } |
| diagnostics(ctx, view, pkg, reports) |
| } |
| return reports, warningMsg, nil |
| } |
| |
| type diagnosticSet struct { |
| listErrors, parseErrors, typeErrors []*Diagnostic |
| } |
| |
| func diagnostics(ctx context.Context, view View, pkg Package, reports map[span.URI][]Diagnostic) bool { |
| ctx, done := trace.StartSpan(ctx, "source.diagnostics", telemetry.Package.Of(pkg.ID())) |
| defer done() |
| |
| diagSets := make(map[span.URI]*diagnosticSet) |
| for _, err := range pkg.GetErrors() { |
| spn := packagesErrorSpan(err) |
| diag := &Diagnostic{ |
| URI: spn.URI(), |
| Message: err.Msg, |
| Source: "LSP", |
| Severity: SeverityError, |
| } |
| set, ok := diagSets[diag.URI] |
| if !ok { |
| set = &diagnosticSet{} |
| diagSets[diag.URI] = set |
| } |
| switch err.Kind { |
| case packages.ParseError: |
| set.parseErrors = append(set.parseErrors, diag) |
| case packages.TypeError: |
| set.typeErrors = append(set.typeErrors, diag) |
| default: |
| set.listErrors = append(set.listErrors, diag) |
| } |
| rng, err := spanToRange(ctx, view, pkg, spn, err.Kind == packages.TypeError) |
| if err != nil { |
| log.Error(ctx, "failed to convert span to range", err) |
| continue |
| } |
| diag.Range = rng |
| } |
| var nonEmptyDiagnostics bool // track if we actually send non-empty diagnostics |
| for uri, set := range diagSets { |
| // Don't report type errors if there are parse errors or list errors. |
| diags := set.typeErrors |
| if len(set.parseErrors) > 0 { |
| diags = set.parseErrors |
| } else if len(set.listErrors) > 0 { |
| diags = set.listErrors |
| } |
| if len(diags) > 0 { |
| nonEmptyDiagnostics = true |
| } |
| for _, diag := range diags { |
| if _, ok := reports[uri]; ok { |
| reports[uri] = append(reports[uri], *diag) |
| } |
| } |
| } |
| return nonEmptyDiagnostics |
| } |
| |
| // spanToRange converts a span.Span to a protocol.Range, |
| // assuming that the span belongs to the package whose diagnostics are being computed. |
| func spanToRange(ctx context.Context, view View, pkg Package, spn span.Span, isTypeError bool) (protocol.Range, error) { |
| ph, err := pkg.File(spn.URI()) |
| if err != nil { |
| return protocol.Range{}, err |
| } |
| _, m, _, err := ph.Cached(ctx) |
| if err != nil { |
| return protocol.Range{}, err |
| } |
| data, _, err := ph.File().Read(ctx) |
| if err != nil { |
| return protocol.Range{}, err |
| } |
| // Try to get a range for the diagnostic. |
| // TODO: Don't just limit ranges to type errors. |
| if spn.IsPoint() && isTypeError { |
| if s, err := spn.WithOffset(m.Converter); err == nil { |
| start := s.Start() |
| offset := start.Offset() |
| if width := bytes.IndexAny(data[offset:], " \n,():;[]"); width > 0 { |
| spn = span.New(spn.URI(), start, span.NewPoint(start.Line(), start.Column()+width, offset+width)) |
| } |
| } |
| } |
| return m.Range(spn) |
| } |
| |
| func analyses(ctx context.Context, view View, cph CheckPackageHandle, disabledAnalyses map[string]struct{}, reports map[span.URI][]Diagnostic) error { |
| // Type checking and parsing succeeded. Run analyses. |
| if err := runAnalyses(ctx, view, cph, disabledAnalyses, func(a *analysis.Analyzer, diag analysis.Diagnostic) error { |
| diagnostic, err := toDiagnostic(ctx, view, diag, a.Name) |
| if err != nil { |
| return err |
| } |
| addReport(view, reports, diagnostic.URI, diagnostic) |
| return nil |
| }); err != nil { |
| return err |
| } |
| return nil |
| } |
| |
| func toDiagnostic(ctx context.Context, view View, diag analysis.Diagnostic, category string) (Diagnostic, error) { |
| r := span.NewRange(view.Session().Cache().FileSet(), diag.Pos, diag.End) |
| spn, err := r.Span() |
| if err != nil { |
| // The diagnostic has an invalid position, so we don't have a valid span. |
| return Diagnostic{}, err |
| } |
| if diag.Category != "" { |
| category += "." + category |
| } |
| f, err := view.GetFile(ctx, spn.URI()) |
| if err != nil { |
| return Diagnostic{}, err |
| } |
| gof, ok := f.(GoFile) |
| if !ok { |
| return Diagnostic{}, errors.Errorf("%s is not a Go file", f.URI()) |
| } |
| // If the package has changed since these diagnostics were computed, |
| // this may be incorrect. Should the package be associated with the diagnostic? |
| cphs, err := gof.CheckPackageHandles(ctx) |
| if err != nil { |
| return Diagnostic{}, err |
| } |
| cph := NarrowestCheckPackageHandle(cphs) |
| pkg, err := cph.Cached(ctx) |
| if err != nil { |
| return Diagnostic{}, err |
| } |
| ca, err := getCodeActions(ctx, view, pkg, diag) |
| if err != nil { |
| return Diagnostic{}, err |
| } |
| |
| rng, err := spanToRange(ctx, view, pkg, spn, false) |
| if err != nil { |
| return Diagnostic{}, err |
| } |
| return Diagnostic{ |
| URI: spn.URI(), |
| Range: rng, |
| Source: category, |
| Message: diag.Message, |
| Severity: SeverityWarning, |
| SuggestedFixes: ca, |
| }, nil |
| } |
| |
| func clearReports(v View, reports map[span.URI][]Diagnostic, uri span.URI) { |
| if v.Ignore(uri) { |
| return |
| } |
| reports[uri] = []Diagnostic{} |
| } |
| |
| func addReport(v View, reports map[span.URI][]Diagnostic, uri span.URI, diagnostic Diagnostic) { |
| if v.Ignore(uri) { |
| return |
| } |
| if _, ok := reports[uri]; ok { |
| reports[uri] = append(reports[uri], diagnostic) |
| } |
| } |
| |
| func packagesErrorSpan(err packages.Error) span.Span { |
| if err.Pos == "" { |
| return parseDiagnosticMessage(err.Msg) |
| } |
| return span.Parse(err.Pos) |
| } |
| |
| // parseDiagnosticMessage attempts to parse a standard `go list` error message |
| // by stripping off the trailing error message. |
| // |
| // It works only on errors whose message is prefixed by colon, |
| // followed by a space (": "). For example: |
| // |
| // attributes.go:13:1: expected 'package', found 'type' |
| // |
| func parseDiagnosticMessage(input string) span.Span { |
| input = strings.TrimSpace(input) |
| msgIndex := strings.Index(input, ": ") |
| if msgIndex < 0 { |
| return span.Parse(input) |
| } |
| return span.Parse(input[:msgIndex]) |
| } |
| |
| func singleDiagnostic(uri span.URI, format string, a ...interface{}) map[span.URI][]Diagnostic { |
| return map[span.URI][]Diagnostic{ |
| uri: []Diagnostic{{ |
| Source: "LSP", |
| URI: uri, |
| Range: protocol.Range{}, |
| Message: fmt.Sprintf(format, a...), |
| Severity: SeverityError, |
| }}, |
| } |
| } |
| |
| var Analyzers = []*analysis.Analyzer{ |
| // The traditional vet suite: |
| asmdecl.Analyzer, |
| assign.Analyzer, |
| atomic.Analyzer, |
| atomicalign.Analyzer, |
| bools.Analyzer, |
| buildtag.Analyzer, |
| cgocall.Analyzer, |
| composite.Analyzer, |
| copylock.Analyzer, |
| httpresponse.Analyzer, |
| loopclosure.Analyzer, |
| lostcancel.Analyzer, |
| nilfunc.Analyzer, |
| printf.Analyzer, |
| shift.Analyzer, |
| stdmethods.Analyzer, |
| structtag.Analyzer, |
| tests.Analyzer, |
| unmarshal.Analyzer, |
| unreachable.Analyzer, |
| unsafeptr.Analyzer, |
| unusedresult.Analyzer, |
| // Non-vet analyzers |
| sortslice.Analyzer, |
| } |
| |
| func runAnalyses(ctx context.Context, view View, cph CheckPackageHandle, disabledAnalyses map[string]struct{}, report func(a *analysis.Analyzer, diag analysis.Diagnostic) error) error { |
| var analyzers []*analysis.Analyzer |
| for _, a := range Analyzers { |
| if _, ok := disabledAnalyses[a.Name]; ok { |
| continue |
| } |
| analyzers = append(analyzers, a) |
| } |
| |
| roots, err := analyze(ctx, view, []CheckPackageHandle{cph}, analyzers) |
| if err != nil { |
| return err |
| } |
| |
| // Report diagnostics and errors from root analyzers. |
| for _, r := range roots { |
| var sdiags []Diagnostic |
| for _, diag := range r.diagnostics { |
| if r.err != nil { |
| // TODO(matloob): This isn't quite right: we might return a failed prerequisites error, |
| // which isn't super useful... |
| return r.err |
| } |
| if err := report(r.Analyzer, diag); err != nil { |
| return err |
| } |
| sdiag, err := toDiagnostic(ctx, view, diag, r.Analyzer.Name) |
| if err != nil { |
| return err |
| } |
| sdiags = append(sdiags, sdiag) |
| } |
| pkg, err := cph.Check(ctx) |
| if err != nil { |
| return err |
| } |
| pkg.SetDiagnostics(r.Analyzer, sdiags) |
| } |
| return nil |
| } |