2 use rustc::session::{self, config};
3 use rustc::hir::def_id::{DefId, DefIndex, CrateNum, LOCAL_CRATE};
5 use rustc::middle::cstore::CrateStore;
6 use rustc::middle::privacy::AccessLevels;
7 use rustc::ty::{Ty, TyCtxt};
8 use rustc::lint::{self, LintPass};
9 use rustc::session::config::ErrorOutputType;
10 use rustc::session::DiagnosticOutput;
11 use rustc::util::nodemap::{FxHashMap, FxHashSet};
12 use rustc_interface::interface;
13 use rustc_driver::abort_on_err;
14 use rustc_resolve as resolve;
15 use rustc_metadata::cstore::CStore;
17 use syntax::source_map;
19 use syntax::feature_gate::UnstableFeatures;
20 use syntax::json::JsonEmitter;
21 use syntax::symbol::sym;
23 use errors::emitter::{Emitter, EmitterWriter};
25 use std::cell::RefCell;
27 use rustc_data_structures::sync::{self, Lrc};
30 use crate::config::{Options as RustdocOptions, RenderOptions};
32 use crate::clean::{MAX_DEF_ID, AttributesExt};
33 use crate::html::render::RenderInfo;
37 pub use rustc::session::config::{Input, Options, CodegenOptions};
38 pub use rustc::session::search_paths::SearchPath;
40 pub type ExternalPaths = FxHashMap<DefId, (Vec<String>, clean::TypeKind)>;
42 pub struct DocContext<'tcx> {
44 pub tcx: TyCtxt<'tcx>,
45 pub resolver: Rc<RefCell<interface::BoxedResolver>>,
46 pub cstore: Lrc<CStore>,
47 /// Later on moved into `html::render::CACHE_KEY`
48 pub renderinfo: RefCell<RenderInfo>,
49 /// Later on moved through `clean::Crate` into `html::render::CACHE_KEY`
50 pub external_traits: Rc<RefCell<FxHashMap<DefId, clean::Trait>>>,
51 /// Used while populating `external_traits` to ensure we don't process the same trait twice at
53 pub active_extern_traits: RefCell<FxHashSet<DefId>>,
54 // The current set of type and lifetime substitutions,
55 // for expanding type aliases at the HIR level:
57 /// Table `DefId` of type parameter -> substituted type
58 pub ty_substs: RefCell<FxHashMap<DefId, clean::Type>>,
59 /// Table `DefId` of lifetime parameter -> substituted lifetime
60 pub lt_substs: RefCell<FxHashMap<DefId, clean::Lifetime>>,
61 /// Table `DefId` of const parameter -> substituted const
62 pub ct_substs: RefCell<FxHashMap<DefId, clean::Constant>>,
63 /// Table synthetic type parameter for `impl Trait` in argument position -> bounds
64 pub impl_trait_bounds: RefCell<FxHashMap<ImplTraitParam, Vec<clean::GenericBound>>>,
65 pub fake_def_ids: RefCell<FxHashMap<CrateNum, DefId>>,
66 pub all_fake_def_ids: RefCell<FxHashSet<DefId>>,
67 /// Auto-trait or blanket impls processed so far, as `(self_ty, trait_def_id)`.
68 // FIXME(eddyb) make this a `ty::TraitRef<'tcx>` set.
69 pub generated_synthetics: RefCell<FxHashSet<(Ty<'tcx>, DefId)>>,
70 pub auto_traits: Vec<DefId>,
73 impl<'tcx> DocContext<'tcx> {
74 pub fn sess(&self) -> &session::Session {
78 pub fn enter_resolver<F, R>(&self, f: F) -> R
79 where F: FnOnce(&mut resolve::Resolver<'_>) -> R {
80 self.resolver.borrow_mut().access(f)
83 /// Call the closure with the given parameters set as
84 /// the substitutions for a type alias' RHS.
85 pub fn enter_alias<F, R>(&self,
86 ty_substs: FxHashMap<DefId, clean::Type>,
87 lt_substs: FxHashMap<DefId, clean::Lifetime>,
88 ct_substs: FxHashMap<DefId, clean::Constant>,
90 where F: FnOnce() -> R {
91 let (old_tys, old_lts, old_cts) = (
92 mem::replace(&mut *self.ty_substs.borrow_mut(), ty_substs),
93 mem::replace(&mut *self.lt_substs.borrow_mut(), lt_substs),
94 mem::replace(&mut *self.ct_substs.borrow_mut(), ct_substs),
97 *self.ty_substs.borrow_mut() = old_tys;
98 *self.lt_substs.borrow_mut() = old_lts;
99 *self.ct_substs.borrow_mut() = old_cts;
103 // This is an ugly hack, but it's the simplest way to handle synthetic impls without greatly
104 // refactoring either librustdoc or librustc. In particular, allowing new DefIds to be
105 // registered after the AST is constructed would require storing the defid mapping in a
106 // RefCell, decreasing the performance for normal compilation for very little gain.
108 // Instead, we construct 'fake' def ids, which start immediately after the last DefId.
109 // In the Debug impl for clean::Item, we explicitly check for fake
110 // def ids, as we'll end up with a panic if we use the DefId Debug impl for fake DefIds
111 pub fn next_def_id(&self, crate_num: CrateNum) -> DefId {
113 let next_id = if crate_num == LOCAL_CRATE {
121 .def_path_table(crate_num)
131 let mut fake_ids = self.fake_def_ids.borrow_mut();
133 let def_id = fake_ids.entry(crate_num).or_insert(start_def_id).clone();
138 index: DefIndex::from(def_id.index.index() + 1),
142 MAX_DEF_ID.with(|m| {
144 .entry(def_id.krate.clone())
145 .or_insert(start_def_id);
148 self.all_fake_def_ids.borrow_mut().insert(def_id);
153 /// Like the function of the same name on the HIR map, but skips calling it on fake DefIds.
154 /// (This avoids a slice-index-out-of-bounds panic.)
155 pub fn as_local_hir_id(&self, def_id: DefId) -> Option<HirId> {
156 if self.all_fake_def_ids.borrow().contains(&def_id) {
159 self.tcx.hir().as_local_hir_id(def_id)
163 pub fn stability(&self, id: HirId) -> Option<attr::Stability> {
164 self.tcx.hir().opt_local_def_id(id)
165 .and_then(|def_id| self.tcx.lookup_stability(def_id)).cloned()
168 pub fn deprecation(&self, id: HirId) -> Option<attr::Deprecation> {
169 self.tcx.hir().opt_local_def_id(id)
170 .and_then(|def_id| self.tcx.lookup_deprecation(def_id))
174 /// Creates a new diagnostic `Handler` that can be used to emit warnings and errors.
176 /// If the given `error_format` is `ErrorOutputType::Json` and no `SourceMap` is given, a new one
177 /// will be created for the handler.
178 pub fn new_handler(error_format: ErrorOutputType,
179 source_map: Option<Lrc<source_map::SourceMap>>,
180 treat_err_as_bug: Option<usize>,
182 ) -> errors::Handler {
183 // rustdoc doesn't override (or allow to override) anything from this that is relevant here, so
184 // stick to the defaults
185 let sessopts = Options::default();
186 let emitter: Box<dyn Emitter + sync::Send> = match error_format {
187 ErrorOutputType::HumanReadable(kind) => {
188 let (short, color_config) = kind.unzip();
190 EmitterWriter::stderr(
192 source_map.map(|cm| cm as _),
194 sessopts.debugging_opts.teach,
195 sessopts.debugging_opts.terminal_width,
197 ).ui_testing(ui_testing)
200 ErrorOutputType::Json { pretty, json_rendered } => {
201 let source_map = source_map.unwrap_or_else(
202 || Lrc::new(source_map::SourceMap::new(sessopts.file_path_mapping())));
210 ).ui_testing(ui_testing)
215 errors::Handler::with_emitter_and_flags(
217 errors::HandlerFlags {
218 can_emit_warnings: true,
220 report_delayed_bugs: false,
221 external_macro_backtrace: false,
227 pub fn run_core(options: RustdocOptions) -> (clean::Crate, RenderInfo, RenderOptions) {
228 // Parse, resolve, and typecheck the given crate.
253 let cpath = Some(input.clone());
254 let input = Input::File(input);
256 let intra_link_resolution_failure_name = lint::builtin::INTRA_DOC_LINK_RESOLUTION_FAILURE.name;
257 let warnings_lint_name = lint::builtin::WARNINGS.name;
258 let missing_docs = rustc_lint::builtin::MISSING_DOCS.name;
259 let missing_doc_example = rustc_lint::builtin::MISSING_DOC_CODE_EXAMPLES.name;
260 let private_doc_tests = rustc_lint::builtin::PRIVATE_DOC_TESTS.name;
262 // In addition to those specific lints, we also need to whitelist those given through
263 // command line, otherwise they'll get ignored and we don't want that.
264 let mut whitelisted_lints = vec![warnings_lint_name.to_owned(),
265 intra_link_resolution_failure_name.to_owned(),
266 missing_docs.to_owned(),
267 missing_doc_example.to_owned(),
268 private_doc_tests.to_owned()];
270 whitelisted_lints.extend(lint_opts.iter().map(|(lint, _)| lint).cloned());
273 lint::builtin::HardwiredLints
276 .chain(rustc_lint::SoftLints.get_lints().into_iter())
279 let lint_opts = lints().filter_map(|lint| {
280 if lint.name == warnings_lint_name ||
281 lint.name == intra_link_resolution_failure_name {
284 Some((lint.name_lower(), lint::Allow))
286 }).chain(lint_opts.into_iter()).collect::<Vec<_>>();
288 let lint_caps = lints().filter_map(|lint| {
289 // We don't want to whitelist *all* lints so let's
290 // ignore those ones.
291 if whitelisted_lints.iter().any(|l| &lint.name == l) {
294 Some((lint::LintId::of(lint), lint::Allow))
298 let crate_types = if proc_macro_crate {
299 vec![config::CrateType::ProcMacro]
301 vec![config::CrateType::Rlib]
303 // plays with error output here!
304 let sessopts = config::Options {
308 lint_opts: if !display_warnings {
313 lint_cap: Some(lint_cap.unwrap_or_else(|| lint::Forbid)),
316 target_triple: target,
317 // Ensure that rustdoc works even if rustc is feature-staged
318 unstable_features: UnstableFeatures::Allow,
319 actually_rustdoc: true,
320 debugging_opts: debugging_options,
327 let config = interface::Config {
329 crate_cfg: config::parse_cfgspecs(cfgs),
335 diagnostic_output: DiagnosticOutput::Default,
341 interface::run_compiler_in_existing_thread_pool(config, |compiler| {
342 let sess = compiler.session();
344 // We need to hold on to the complete resolver, so we cause everything to be
345 // cloned for the analysis passes to use. Suboptimal, but necessary in the
346 // current architecture.
347 let resolver = abort_on_err(compiler.expansion(), sess).peek().1.borrow().clone();
349 if sess.has_errors() {
350 sess.fatal("Compilation failed, aborting rustdoc");
353 let mut global_ctxt = abort_on_err(compiler.global_ctxt(), sess).take();
355 global_ctxt.enter(|tcx| {
356 tcx.analysis(LOCAL_CRATE).ok();
358 // Abort if there were any errors so far
359 sess.abort_if_errors();
361 let access_levels = tcx.privacy_access_levels(LOCAL_CRATE);
362 // Convert from a HirId set to a DefId set since we don't always have easy access
363 // to the map from defid -> hirid
364 let access_levels = AccessLevels {
365 map: access_levels.map.iter()
366 .map(|(&k, &v)| (tcx.hir().local_def_id(k), v))
370 let mut renderinfo = RenderInfo::default();
371 renderinfo.access_levels = access_levels;
373 let mut ctxt = DocContext {
376 cstore: compiler.cstore().clone(),
377 external_traits: Default::default(),
378 active_extern_traits: Default::default(),
379 renderinfo: RefCell::new(renderinfo),
380 ty_substs: Default::default(),
381 lt_substs: Default::default(),
382 ct_substs: Default::default(),
383 impl_trait_bounds: Default::default(),
384 fake_def_ids: Default::default(),
385 all_fake_def_ids: Default::default(),
386 generated_synthetics: Default::default(),
387 auto_traits: tcx.all_traits(LOCAL_CRATE).iter().cloned().filter(|trait_def_id| {
388 tcx.trait_is_auto(*trait_def_id)
391 debug!("crate: {:?}", tcx.hir().krate());
393 let mut krate = clean::krate(&mut ctxt);
395 fn report_deprecated_attr(name: &str, diag: &errors::Handler) {
396 let mut msg = diag.struct_warn(&format!("the `#![doc({})]` attribute is \
397 considered deprecated", name));
398 msg.warn("please see https://github.com/rust-lang/rust/issues/44136");
400 if name == "no_default_passes" {
401 msg.help("you may want to use `#![doc(document_private_items)]`");
407 // Process all of the crate attributes, extracting plugin metadata along
408 // with the passes which we are supposed to run.
409 for attr in krate.module.as_ref().unwrap().attrs.lists(sym::doc) {
410 let diag = ctxt.sess().diagnostic();
412 let name = attr.name_or_empty();
414 if name == sym::no_default_passes {
415 report_deprecated_attr("no_default_passes", diag);
416 if default_passes == passes::DefaultPassOption::Default {
417 default_passes = passes::DefaultPassOption::None;
420 } else if let Some(value) = attr.value_str() {
421 let sink = match name {
423 report_deprecated_attr("passes = \"...\"", diag);
427 report_deprecated_attr("plugins = \"...\"", diag);
428 eprintln!("WARNING: `#![doc(plugins = \"...\")]` no longer functions; \
429 see CVE-2018-1000622");
434 for name in value.as_str().split_whitespace() {
435 sink.push(name.to_string());
439 if attr.is_word() && name == sym::document_private_items {
440 if default_passes == passes::DefaultPassOption::Default {
441 default_passes = passes::DefaultPassOption::Private;
446 let passes = passes::defaults(default_passes).iter().chain(manual_passes.into_iter()
448 if let Some(pass) = passes::find_pass(&name) {
451 error!("unknown pass {}, skipping", name);
456 info!("Executing passes");
459 debug!("running pass {}", pass.name);
460 krate = (pass.pass)(krate, &ctxt);
463 ctxt.sess().abort_if_errors();
465 (krate, ctxt.renderinfo.into_inner(), render_options)
470 /// `DefId` or parameter index (`ty::ParamTy.index`) of a synthetic type parameter
471 /// for `impl Trait` in argument position.
472 #[derive(Clone, Copy, PartialEq, Eq, Hash, PartialOrd, Ord)]
473 pub enum ImplTraitParam {
478 impl From<DefId> for ImplTraitParam {
479 fn from(did: DefId) -> Self {
480 ImplTraitParam::DefId(did)
484 impl From<u32> for ImplTraitParam {
485 fn from(idx: u32) -> Self {
486 ImplTraitParam::ParamIndex(idx)