Skip to main content

clippy_config/
conf.rs

1use crate::ClippyConfiguration;
2use crate::types::{
3    DisallowedPath, DisallowedPathWithoutReplacement, InherentImplLintScope, MacroMatcher, MatchLintBehaviour,
4    PubUnderscoreFieldsBehaviour, Rename, SourceItemOrdering, SourceItemOrderingCategory,
5    SourceItemOrderingModuleItemGroupings, SourceItemOrderingModuleItemKind, SourceItemOrderingTraitAssocItemKind,
6    SourceItemOrderingTraitAssocItemKinds, SourceItemOrderingWithinModuleItemGroupings,
7};
8use clippy_utils::msrvs::Msrv;
9use itertools::Itertools;
10use rustc_errors::Applicability;
11use rustc_session::Session;
12use rustc_span::edit_distance::edit_distance;
13use rustc_span::{BytePos, Pos, SourceFile, Span, SyntaxContext};
14use serde::de::{IgnoredAny, IntoDeserializer, MapAccess, Visitor};
15use serde::{Deserialize, Deserializer, Serialize};
16use std::collections::HashMap;
17use std::fmt::{Debug, Display, Formatter};
18use std::ops::Range;
19use std::path::PathBuf;
20use std::str::FromStr;
21use std::sync::OnceLock;
22use std::{cmp, env, fmt, fs, io};
23
24#[rustfmt::skip]
25const DEFAULT_DOC_VALID_IDENTS: &[&str] = &[
26    "KiB", "MiB", "GiB", "TiB", "PiB", "EiB",
27    "MHz", "GHz", "THz",
28    "AccessKit",
29    "CoAP", "CoreFoundation", "CoreGraphics", "CoreText",
30    "DevOps",
31    "Direct2D", "Direct3D", "DirectWrite", "DirectX",
32    "ECMAScript",
33    "GPLv2", "GPLv3",
34    "GitHub", "GitLab",
35    "IPv4", "IPv6",
36    "InfiniBand", "RoCE",
37    "ClojureScript", "CoffeeScript", "JavaScript", "PostScript", "PureScript", "TypeScript",
38    "PowerPC", "PowerShell", "WebAssembly",
39    "NaN", "NaNs",
40    "OAuth", "GraphQL",
41    "OCaml",
42    "OpenAL", "OpenDNS", "OpenGL", "OpenMP", "OpenSSH", "OpenSSL", "OpenStreetMap", "OpenTelemetry",
43    "OpenType",
44    "WebGL", "WebGL2", "WebGPU", "WebRTC", "WebSocket", "WebTransport",
45    "WebP", "OpenExr", "YCbCr", "sRGB",
46    "TensorFlow",
47    "TrueType",
48    "iOS", "macOS", "FreeBSD", "NetBSD", "OpenBSD", "NixOS",
49    "TeX", "LaTeX", "BibTeX", "BibLaTeX",
50    "MinGW",
51    "CamelCase",
52];
53const DEFAULT_DISALLOWED_NAMES: &[&str] = &["foo", "baz", "quux"];
54const DEFAULT_ALLOWED_IDENTS_BELOW_MIN_CHARS: &[&str] = &["i", "j", "x", "y", "z", "w", "n"];
55const DEFAULT_ALLOWED_PREFIXES: &[&str] = &["to", "as", "into", "from", "try_into", "try_from"];
56const DEFAULT_ALLOWED_TRAITS_WITH_RENAMED_PARAMS: &[&str] =
57    &["core::convert::From", "core::convert::TryFrom", "core::str::FromStr"];
58const DEFAULT_MODULE_ITEM_ORDERING_GROUPS: &[(&str, &[SourceItemOrderingModuleItemKind])] = {
59    #[allow(clippy::enum_glob_use)] // Very local glob use for legibility.
60    use SourceItemOrderingModuleItemKind::*;
61    &[
62        ("modules", &[ExternCrate, Mod, ForeignMod]),
63        ("use", &[Use]),
64        ("macros", &[Macro]),
65        ("global_asm", &[GlobalAsm]),
66        ("UPPER_SNAKE_CASE", &[Static, Const]),
67        ("PascalCase", &[TyAlias, Enum, Struct, Union, Trait, TraitAlias, Impl]),
68        ("lower_snake_case", &[Fn]),
69    ]
70};
71const DEFAULT_TRAIT_ASSOC_ITEM_KINDS_ORDER: &[SourceItemOrderingTraitAssocItemKind] = {
72    #[allow(clippy::enum_glob_use)] // Very local glob use for legibility.
73    use SourceItemOrderingTraitAssocItemKind::*;
74    &[Const, Type, Fn]
75};
76const DEFAULT_SOURCE_ITEM_ORDERING: &[SourceItemOrderingCategory] = {
77    #[allow(clippy::enum_glob_use)] // Very local glob use for legibility.
78    use SourceItemOrderingCategory::*;
79    &[Enum, Impl, Module, Struct, Trait]
80};
81
82/// Conf with parse errors
83#[derive(Default)]
84struct TryConf {
85    conf: Conf,
86    value_spans: HashMap<String, Range<usize>>,
87    errors: Vec<ConfError>,
88    warnings: Vec<ConfError>,
89}
90
91impl TryConf {
92    fn from_toml_error(file: &SourceFile, error: &toml::de::Error) -> Self {
93        Self {
94            conf: Conf::default(),
95            value_spans: HashMap::default(),
96            errors: vec![ConfError::from_toml(file, error)],
97            warnings: vec![],
98        }
99    }
100}
101
102#[derive(Debug)]
103struct ConfError {
104    message: String,
105    suggestion: Option<Suggestion>,
106    span: Span,
107}
108
109impl ConfError {
110    fn from_toml(file: &SourceFile, error: &toml::de::Error) -> Self {
111        let span = error.span().unwrap_or(0..file.normalized_source_len.0 as usize);
112        Self::spanned(file, error.message(), None, span)
113    }
114
115    fn spanned(
116        file: &SourceFile,
117        message: impl Into<String>,
118        suggestion: Option<Suggestion>,
119        span: Range<usize>,
120    ) -> Self {
121        Self {
122            message: message.into(),
123            suggestion,
124            span: span_from_toml_range(file, span),
125        }
126    }
127}
128
129// Remove code tags and code behind '# 's, as they are not needed for the lint docs and --explain
130pub fn sanitize_explanation(raw_docs: &str) -> String {
131    // Remove tags and hidden code:
132    let mut explanation = String::with_capacity(128);
133    let mut in_code = false;
134    for line in raw_docs.lines() {
135        let line = line.strip_prefix(' ').unwrap_or(line);
136
137        if let Some(lang) = line.strip_prefix("```") {
138            let tag = lang.split_once(',').map_or(lang, |(left, _)| left);
139            if !in_code && matches!(tag, "" | "rust" | "ignore" | "should_panic" | "no_run" | "compile_fail") {
140                explanation += "```rust\n";
141            } else {
142                explanation += line;
143                explanation.push('\n');
144            }
145            in_code = !in_code;
146        } else if !(in_code && line.starts_with("# ")) {
147            explanation += line;
148            explanation.push('\n');
149        }
150    }
151
152    explanation
153}
154
155macro_rules! wrap_option {
156    () => {
157        None
158    };
159    ($x:literal) => {
160        Some($x)
161    };
162}
163
164macro_rules! default_text {
165    ($value:expr) => {{
166        let mut text = String::new();
167        $value.serialize(toml::ser::ValueSerializer::new(&mut text)).unwrap();
168        text
169    }};
170    ($value:expr, $override:expr) => {
171        $override.to_string()
172    };
173}
174
175macro_rules! deserialize {
176    ($map:expr, $ty:ty, $errors:expr, $file:expr) => {{
177        let raw_value = $map.next_value::<toml::Spanned<toml::Value>>()?;
178        let value_span = raw_value.span();
179        let value = match <$ty>::deserialize(raw_value.into_inner()) {
180            Err(e) => {
181                $errors.push(ConfError::spanned(
182                    $file,
183                    e.to_string().replace('\n', " ").trim(),
184                    None,
185                    value_span,
186                ));
187                continue;
188            },
189            Ok(value) => value,
190        };
191        (value, value_span)
192    }};
193
194    ($map:expr, $ty:ty, $errors:expr, $file:expr, $replacements_allowed:expr) => {{
195        let array = $map.next_value::<Vec<toml::Spanned<toml::Value>>>()?;
196        let mut disallowed_paths_span = Range {
197            start: usize::MAX,
198            end: usize::MIN,
199        };
200        let mut disallowed_paths = Vec::new();
201        for raw_value in array {
202            let value_span = raw_value.span();
203            let mut disallowed_path = match DisallowedPath::<$replacements_allowed>::deserialize(raw_value.into_inner())
204            {
205                Err(e) => {
206                    $errors.push(ConfError::spanned(
207                        $file,
208                        e.to_string().replace('\n', " ").trim(),
209                        None,
210                        value_span,
211                    ));
212                    continue;
213                },
214                Ok(disallowed_path) => disallowed_path,
215            };
216            disallowed_paths_span = union(&disallowed_paths_span, &value_span);
217            disallowed_path.set_span(span_from_toml_range($file, value_span));
218            disallowed_paths.push(disallowed_path);
219        }
220        (disallowed_paths, disallowed_paths_span)
221    }};
222}
223
224macro_rules! define_Conf {
225    ($(
226        $(#[doc = $doc:literal])+
227        $(#[conf_deprecated($dep:literal, $new_conf:ident)])?
228        $(#[default_text = $default_text:expr])?
229        $(#[disallowed_paths_allow_replacements = $replacements_allowed:expr])?
230        $(#[lints($($for_lints:ident),* $(,)?)])?
231        $name:ident: $ty:ty = $default:expr,
232    )*) => {
233        /// Clippy lint configuration
234        pub struct Conf {
235            $($(#[cfg_attr(doc, doc = $doc)])+ pub $name: $ty,)*
236        }
237
238        mod defaults {
239            use super::*;
240            $(pub fn $name() -> $ty { $default })*
241        }
242
243        impl Default for Conf {
244            fn default() -> Self {
245                Self { $($name: defaults::$name(),)* }
246            }
247        }
248
249        #[derive(Deserialize)]
250        #[serde(field_identifier, rename_all = "kebab-case")]
251        #[expect(non_camel_case_types)]
252        enum Field { $($name,)* third_party, }
253
254        struct ConfVisitor<'a>(&'a SourceFile);
255
256        impl<'de> Visitor<'de> for ConfVisitor<'_> {
257            type Value = TryConf;
258
259            fn expecting(&self, formatter: &mut fmt::Formatter<'_>) -> fmt::Result {
260                formatter.write_str("Conf")
261            }
262
263            fn visit_map<V>(self, mut map: V) -> Result<Self::Value, V::Error> where V: MapAccess<'de> {
264                let mut value_spans = HashMap::new();
265                let mut errors = Vec::new();
266                let mut warnings = Vec::new();
267
268                // Declare a local variable for each field available to a configuration file.
269                $(let mut $name = None;)*
270
271                // could get `Field` here directly, but get `String` first for diagnostics
272                while let Some(name) = map.next_key::<toml::Spanned<String>>()? {
273                    let field = match Field::deserialize(name.get_ref().as_str().into_deserializer()) {
274                        Err(e) => {
275                            let e: FieldError = e;
276                            errors.push(ConfError::spanned(self.0, e.error, e.suggestion, name.span()));
277                            continue;
278                        }
279                        Ok(field) => field
280                    };
281
282                    match field {
283                        $(Field::$name => {
284                            // Is this a deprecated field, i.e., is `$dep` set? If so, push a warning.
285                            $(warnings.push(ConfError::spanned(self.0, format!("deprecated field `{}`. {}", name.get_ref(), $dep), None, name.span()));)?
286                            let (value, value_span) =
287                                deserialize!(map, $ty, errors, self.0 $(, $replacements_allowed)?);
288                            // Was this field set previously?
289                            if $name.is_some() {
290                                errors.push(ConfError::spanned(self.0, format!("duplicate field `{}`", name.get_ref()), None, name.span()));
291                                continue;
292                            }
293                            $name = Some(value);
294                            value_spans.insert(name.get_ref().as_str().to_string(), value_span);
295                            // If this is a deprecated field, was the new field (`$new_conf`) set previously?
296                            // Note that `$new_conf` is one of the defined `$name`s.
297                            $(match $new_conf {
298                                Some(_) => errors.push(ConfError::spanned(self.0, concat!(
299                                    "duplicate field `", stringify!($new_conf),
300                                    "` (provided as `", stringify!($name), "`)"
301                                ), None, name.span())),
302                                None => $new_conf = $name.clone(),
303                            })?
304                        })*
305                        // ignore contents of the third_party key
306                        Field::third_party => drop(map.next_value::<IgnoredAny>())
307                    }
308                }
309                let conf = Conf { $($name: $name.unwrap_or_else(defaults::$name),)* };
310                Ok(TryConf { conf, value_spans, errors, warnings })
311            }
312        }
313
314        pub fn get_configuration_metadata() -> Vec<ClippyConfiguration> {
315            vec![$(
316                ClippyConfiguration {
317                    name: stringify!($name).replace('_', "-"),
318                    default: default_text!(defaults::$name() $(, $default_text)?),
319                    lints: &[$($(stringify!($for_lints)),*)?],
320                    doc: concat!($($doc, '\n',)*),
321                    deprecation_reason: wrap_option!($($dep)?)
322                },
323            )*]
324        }
325    };
326}
327
328fn union(x: &Range<usize>, y: &Range<usize>) -> Range<usize> {
329    Range {
330        start: cmp::min(x.start, y.start),
331        end: cmp::max(x.end, y.end),
332    }
333}
334
335fn span_from_toml_range(file: &SourceFile, span: Range<usize>) -> Span {
336    Span::new(
337        file.start_pos + BytePos::from_usize(span.start),
338        file.start_pos + BytePos::from_usize(span.end),
339        SyntaxContext::root(),
340        None,
341    )
342}
343
344define_Conf! {
345    /// Which crates to allow absolute paths from
346    #[lints(absolute_paths)]
347    absolute_paths_allowed_crates: Vec<String> = Vec::new(),
348    /// The maximum number of segments a path can have before being linted, anything above this will
349    /// be linted.
350    #[lints(absolute_paths)]
351    absolute_paths_max_segments: u64 = 2,
352    /// Whether to accept a safety comment to be placed above the attributes for the `unsafe` block
353    #[lints(undocumented_unsafe_blocks)]
354    accept_comment_above_attributes: bool = true,
355    /// Whether to accept a safety comment to be placed above the statement containing the `unsafe` block
356    #[lints(undocumented_unsafe_blocks)]
357    accept_comment_above_statement: bool = true,
358    /// Don't lint when comparing the result of a modulo operation to zero.
359    #[lints(modulo_arithmetic)]
360    allow_comparison_to_zero: bool = true,
361    /// Whether `dbg!` should be allowed in test functions or `#[cfg(test)]`
362    #[lints(dbg_macro)]
363    allow_dbg_in_tests: bool = false,
364    /// Whether an item should be allowed to have the same name as its containing module
365    #[lints(module_name_repetitions)]
366    allow_exact_repetitions: bool = true,
367    /// Whether `expect` should be allowed in code always evaluated at compile time
368    #[lints(expect_used)]
369    allow_expect_in_consts: bool = true,
370    /// Whether `expect` should be allowed in test functions or `#[cfg(test)]`
371    #[lints(expect_used)]
372    allow_expect_in_tests: bool = false,
373    /// Whether `indexing_slicing` should be allowed in test functions or `#[cfg(test)]`
374    #[lints(indexing_slicing)]
375    allow_indexing_slicing_in_tests: bool = false,
376    /// Whether functions inside `#[cfg(test)]` modules or test functions should be checked.
377    #[lints(large_stack_frames)]
378    allow_large_stack_frames_in_tests: bool = true,
379    /// Whether to allow mixed uninlined format args, e.g. `format!("{} {}", a, foo.bar)`
380    #[lints(uninlined_format_args)]
381    allow_mixed_uninlined_format_args: bool = true,
382    /// Whether to allow `r#""#` when `r""` can be used
383    #[lints(needless_raw_string_hashes)]
384    allow_one_hash_in_raw_strings: bool = false,
385    /// Whether `panic` should be allowed in test functions or `#[cfg(test)]`
386    #[lints(panic)]
387    allow_panic_in_tests: bool = false,
388    /// Whether print macros (ex. `println!`) should be allowed in test functions or `#[cfg(test)]`
389    #[lints(print_stderr, print_stdout)]
390    allow_print_in_tests: bool = false,
391    /// Whether to allow module inception if it's not public.
392    #[lints(module_inception)]
393    allow_private_module_inception: bool = false,
394    /// List of trait paths to ignore when checking renamed function parameters.
395    ///
396    /// #### Example
397    ///
398    /// ```toml
399    /// allow-renamed-params-for = [ "std::convert::From" ]
400    /// ```
401    ///
402    /// #### Noteworthy
403    ///
404    /// - By default, the following traits are ignored: `From`, `TryFrom`, `FromStr`
405    /// - `".."` can be used as part of the list to indicate that the configured values should be appended to the
406    /// default configuration of Clippy. By default, any configuration will replace the default value.
407    #[lints(renamed_function_params)]
408    allow_renamed_params_for: Vec<String> =
409        DEFAULT_ALLOWED_TRAITS_WITH_RENAMED_PARAMS.iter().map(ToString::to_string).collect(),
410    /// Whether `unwrap` should be allowed in code always evaluated at compile time
411    #[lints(unwrap_used)]
412    allow_unwrap_in_consts: bool = true,
413    /// Whether `unwrap` should be allowed in test functions or `#[cfg(test)]`
414    #[lints(unwrap_used)]
415    allow_unwrap_in_tests: bool = false,
416    /// List of types to allow `unwrap()` and `expect()` on.
417    ///
418    /// #### Example
419    ///
420    /// ```toml
421    /// allow-unwrap-types = [ "std::sync::LockResult" ]
422    /// ```
423    #[lints(expect_used, unwrap_used)]
424    allow_unwrap_types: Vec<String> = Vec::new(),
425    /// Whether `useless_vec` should ignore test functions or `#[cfg(test)]`
426    #[lints(useless_vec)]
427    allow_useless_vec_in_tests: bool = false,
428    /// Additional dotfiles (files or directories starting with a dot) to allow
429    #[lints(path_ends_with_ext)]
430    allowed_dotfiles: Vec<String> = Vec::default(),
431    /// A list of crate names to allow duplicates of
432    #[lints(multiple_crate_versions)]
433    allowed_duplicate_crates: Vec<String> = Vec::new(),
434    /// Allowed names below the minimum allowed characters. The value `".."` can be used as part of
435    /// the list to indicate that the configured values should be appended to the default
436    /// configuration of Clippy. By default, any configuration will replace the default value.
437    #[lints(min_ident_chars)]
438    allowed_idents_below_min_chars: Vec<String> =
439        DEFAULT_ALLOWED_IDENTS_BELOW_MIN_CHARS.iter().map(ToString::to_string).collect(),
440    /// List of prefixes to allow when determining whether an item's name ends with the module's name.
441    /// If the rest of an item's name is an allowed prefix (e.g. item `ToFoo` or `to_foo` in module `foo`),
442    /// then don't emit a warning.
443    ///
444    /// #### Example
445    ///
446    /// ```toml
447    /// allowed-prefixes = [ "to", "from" ]
448    /// ```
449    ///
450    /// #### Noteworthy
451    ///
452    /// - By default, the following prefixes are allowed: `to`, `as`, `into`, `from`, `try_into` and `try_from`
453    /// - PascalCase variant is included automatically for each snake_case variant (e.g. if `try_into` is included,
454    ///   `TryInto` will also be included)
455    /// - Use `".."` as part of the list to indicate that the configured values should be appended to the
456    /// default configuration of Clippy. By default, any configuration will replace the default value
457    #[lints(module_name_repetitions)]
458    allowed_prefixes: Vec<String> = DEFAULT_ALLOWED_PREFIXES.iter().map(ToString::to_string).collect(),
459    /// The list of unicode scripts allowed to be used in the scope.
460    #[lints(disallowed_script_idents)]
461    allowed_scripts: Vec<String> = vec!["Latin".to_string()],
462    /// List of path segments allowed to have wildcard imports.
463    ///
464    /// #### Example
465    ///
466    /// ```toml
467    /// allowed-wildcard-imports = [ "utils", "common" ]
468    /// ```
469    ///
470    /// #### Noteworthy
471    ///
472    /// 1. This configuration has no effects if used with `warn_on_all_wildcard_imports = true`.
473    /// 2. Paths with any segment that containing the word 'prelude'
474    /// are already allowed by default.
475    #[lints(wildcard_imports)]
476    allowed_wildcard_imports: Vec<String> = Vec::new(),
477    /// Suppress checking of the passed type names in all types of operations.
478    ///
479    /// If a specific operation is desired, consider using `arithmetic_side_effects_allowed_binary` or `arithmetic_side_effects_allowed_unary` instead.
480    ///
481    /// #### Example
482    ///
483    /// ```toml
484    /// arithmetic-side-effects-allowed = ["SomeType", "AnotherType"]
485    /// ```
486    ///
487    /// #### Noteworthy
488    ///
489    /// A type, say `SomeType`, listed in this configuration has the same behavior of
490    /// `["SomeType" , "*"], ["*", "SomeType"]` in `arithmetic_side_effects_allowed_binary`.
491    #[lints(arithmetic_side_effects)]
492    arithmetic_side_effects_allowed: Vec<String> = <_>::default(),
493    /// Suppress checking of the passed type pair names in binary operations like addition or
494    /// multiplication.
495    ///
496    /// Supports the "*" wildcard to indicate that a certain type won't trigger the lint regardless
497    /// of the involved counterpart. For example, `["SomeType", "*"]` or `["*", "AnotherType"]`.
498    ///
499    /// Pairs are asymmetric, which means that `["SomeType", "AnotherType"]` is not the same as
500    /// `["AnotherType", "SomeType"]`.
501    ///
502    /// #### Example
503    ///
504    /// ```toml
505    /// arithmetic-side-effects-allowed-binary = [["SomeType" , "f32"], ["AnotherType", "*"]]
506    /// ```
507    #[lints(arithmetic_side_effects)]
508    arithmetic_side_effects_allowed_binary: Vec<(String, String)> = <_>::default(),
509    /// Suppress checking of the passed type names in unary operations like "negation" (`-`).
510    ///
511    /// #### Example
512    ///
513    /// ```toml
514    /// arithmetic-side-effects-allowed-unary = ["SomeType", "AnotherType"]
515    /// ```
516    #[lints(arithmetic_side_effects)]
517    arithmetic_side_effects_allowed_unary: Vec<String> = <_>::default(),
518    /// The maximum allowed size for arrays on the stack
519    #[lints(large_const_arrays, large_stack_arrays)]
520    array_size_threshold: u64 = 16 * 1024,
521    /// Suppress lints whenever the suggested change would cause breakage for other crates.
522    #[lints(
523        box_collection,
524        enum_variant_names,
525        large_types_passed_by_value,
526        linkedlist,
527        needless_pass_by_ref_mut,
528        option_option,
529        owned_cow,
530        rc_buffer,
531        rc_mutex,
532        redundant_allocation,
533        ref_option,
534        single_call_fn,
535        trivially_copy_pass_by_ref,
536        unnecessary_box_returns,
537        unnecessary_wraps,
538        unused_self,
539        upper_case_acronyms,
540        vec_box,
541        wrong_self_convention,
542    )]
543    avoid_breaking_exported_api: bool = true,
544    /// The list of types which may not be held across an await point.
545    #[disallowed_paths_allow_replacements = false]
546    #[lints(await_holding_invalid_type)]
547    await_holding_invalid_types: Vec<DisallowedPathWithoutReplacement> = Vec::new(),
548    /// DEPRECATED LINT: BLACKLISTED_NAME.
549    ///
550    /// Use the Disallowed Names lint instead
551    #[conf_deprecated("Please use `disallowed-names` instead", disallowed_names)]
552    blacklisted_names: Vec<String> = Vec::new(),
553    /// For internal testing only, ignores the current `publish` settings in the Cargo manifest.
554    #[lints(cargo_common_metadata)]
555    cargo_ignore_publish: bool = false,
556    /// Whether to check MSRV compatibility in `#[test]` and `#[cfg(test)]` code.
557    #[lints(incompatible_msrv)]
558    check_incompatible_msrv_in_tests: bool = false,
559    /// Whether to suggest reordering constructor fields when initializers are present.
560    ///
561    /// Warnings produced by this configuration aren't necessarily fixed by just reordering the fields. Even if the
562    /// suggested code would compile, it can change semantics if the initializer expressions have side effects. The
563    /// following example [from rust-clippy#11846] shows how the suggestion can run into borrow check errors:
564    ///
565    /// ```rust
566    /// struct MyStruct {
567    ///     vector: Vec<u32>,
568    ///     length: usize
569    /// }
570    /// fn main() {
571    ///     let vector = vec![1,2,3];
572    ///     MyStruct { length: vector.len(), vector};
573    /// }
574    /// ```
575    ///
576    /// [from rust-clippy#11846]: https://github.com/rust-lang/rust-clippy/issues/11846#issuecomment-1820747924
577    #[lints(inconsistent_struct_constructor)]
578    check_inconsistent_struct_field_initializers: bool = false,
579    /// Whether to also run the listed lints on private items.
580    #[lints(missing_errors_doc, missing_panics_doc, missing_safety_doc, unnecessary_safety_doc)]
581    check_private_items: bool = false,
582    /// The maximum cognitive complexity a function can have
583    #[lints(cognitive_complexity)]
584    cognitive_complexity_threshold: u64 = 25,
585    /// The minimum digits a const float literal must have to supress the `excessive_precicion` lint
586    #[lints(excessive_precision)]
587    const_literal_digits_threshold: usize = 30,
588    /// DEPRECATED LINT: CYCLOMATIC_COMPLEXITY.
589    ///
590    /// Use the Cognitive Complexity lint instead.
591    #[conf_deprecated("Please use `cognitive-complexity-threshold` instead", cognitive_complexity_threshold)]
592    cyclomatic_complexity_threshold: u64 = 25,
593    /// The list of disallowed fields, written as fully qualified paths.
594    ///
595    /// **Fields:**
596    /// - `path` (required): the fully qualified path to the field that should be disallowed
597    /// - `reason` (optional): explanation why this field is disallowed
598    /// - `replacement` (optional): suggested alternative method
599    /// - `allow-invalid` (optional, `false` by default): when set to `true`, it will ignore this entry
600    ///   if the path doesn't exist, instead of emitting an error
601    #[disallowed_paths_allow_replacements = true]
602    #[lints(disallowed_fields)]
603    disallowed_fields: Vec<DisallowedPath> = Vec::new(),
604    /// The list of disallowed macros, written as fully qualified paths.
605    ///
606    /// **Fields:**
607    /// - `path` (required): the fully qualified path to the macro that should be disallowed
608    /// - `reason` (optional): explanation why this macro is disallowed
609    /// - `replacement` (optional): suggested alternative macro
610    /// - `allow-invalid` (optional, `false` by default): when set to `true`, it will ignore this entry
611    ///   if the path doesn't exist, instead of emitting an error
612    #[disallowed_paths_allow_replacements = true]
613    #[lints(disallowed_macros)]
614    disallowed_macros: Vec<DisallowedPath> = Vec::new(),
615    /// The list of disallowed methods, written as fully qualified paths.
616    ///
617    /// **Fields:**
618    /// - `path` (required): the fully qualified path to the method that should be disallowed
619    /// - `reason` (optional): explanation why this method is disallowed
620    /// - `replacement` (optional): suggested alternative method
621    /// - `allow-invalid` (optional, `false` by default): when set to `true`, it will ignore this entry
622    ///   if the path doesn't exist, instead of emitting an error
623    #[disallowed_paths_allow_replacements = true]
624    #[lints(disallowed_methods)]
625    disallowed_methods: Vec<DisallowedPath> = Vec::new(),
626    /// The list of disallowed names to lint about. NB: `bar` is not here since it has legitimate uses. The value
627    /// `".."` can be used as part of the list to indicate that the configured values should be appended to the
628    /// default configuration of Clippy. By default, any configuration will replace the default value.
629    #[lints(disallowed_names)]
630    disallowed_names: Vec<String> = DEFAULT_DISALLOWED_NAMES.iter().map(ToString::to_string).collect(),
631    /// The list of disallowed types, written as fully qualified paths.
632    ///
633    /// **Fields:**
634    /// - `path` (required): the fully qualified path to the type that should be disallowed
635    /// - `reason` (optional): explanation why this type is disallowed
636    /// - `replacement` (optional): suggested alternative type
637    /// - `allow-invalid` (optional, `false` by default): when set to `true`, it will ignore this entry
638    ///   if the path doesn't exist, instead of emitting an error
639    #[disallowed_paths_allow_replacements = true]
640    #[lints(disallowed_types)]
641    disallowed_types: Vec<DisallowedPath> = Vec::new(),
642    /// The list of words this lint should not consider as identifiers needing ticks. The value
643    /// `".."` can be used as part of the list to indicate that the configured values should be appended to the
644    /// default configuration of Clippy. By default, any configuration will replace the default value. For example:
645    /// * `doc-valid-idents = ["ClipPy"]` would replace the default list with `["ClipPy"]`.
646    /// * `doc-valid-idents = ["ClipPy", ".."]` would append `ClipPy` to the default list.
647    #[lints(doc_markdown)]
648    doc_valid_idents: Vec<String> = DEFAULT_DOC_VALID_IDENTS.iter().map(ToString::to_string).collect(),
649    /// Whether to apply the raw pointer heuristic to determine if a type is `Send`.
650    #[lints(non_send_fields_in_send_ty)]
651    enable_raw_pointer_heuristic_for_send: bool = true,
652    /// Whether to recommend using implicit into iter for reborrowed values.
653    ///
654    /// #### Example
655    /// ```no_run
656    /// let mut vec = vec![1, 2, 3];
657    /// let rmvec = &mut vec;
658    /// for _ in rmvec.iter() {}
659    /// for _ in rmvec.iter_mut() {}
660    /// ```
661    ///
662    /// Use instead:
663    /// ```no_run
664    /// let mut vec = vec![1, 2, 3];
665    /// let rmvec = &mut vec;
666    /// for _ in &*rmvec {}
667    /// for _ in &mut *rmvec {}
668    /// ```
669    #[lints(explicit_iter_loop)]
670    enforce_iter_loop_reborrow: bool = false,
671    /// The list of imports to always rename, a fully qualified path followed by the rename.
672    #[lints(missing_enforced_import_renames)]
673    enforced_import_renames: Vec<Rename> = Vec::new(),
674    /// The minimum number of enum variants for the lints about variant names to trigger
675    #[lints(enum_variant_names)]
676    enum_variant_name_threshold: u64 = 3,
677    /// The maximum size of an enum's variant to avoid box suggestion
678    #[lints(large_enum_variant)]
679    enum_variant_size_threshold: u64 = 200,
680    /// The maximum amount of nesting a block can reside in
681    #[lints(excessive_nesting)]
682    excessive_nesting_threshold: u64 = 0,
683    /// The maximum byte size a `Future` can have, before it triggers the `clippy::large_futures` lint
684    #[lints(large_futures)]
685    future_size_threshold: u64 = 16 * 1024,
686    /// A list of paths to types that should be treated as if they do not contain interior mutability
687    #[lints(borrow_interior_mutable_const, declare_interior_mutable_const, ifs_same_cond, mutable_key_type)]
688    ignore_interior_mutability: Vec<String> = Vec::from(["bytes::Bytes".into()]),
689    /// Sets the scope ("crate", "file", or "module") in which duplicate inherent `impl` blocks for the same type are linted.
690    #[lints(multiple_inherent_impl)]
691    inherent_impl_lint_scope: InherentImplLintScope = InherentImplLintScope::Crate,
692    /// A list of paths to types that should be ignored as overly large `Err`-variants in a
693    /// `Result` returned from a function
694    #[lints(result_large_err)]
695    large_error_ignored: Vec<String> = Vec::default(),
696    /// The maximum size of the `Err`-variant in a `Result` returned from a function
697    #[lints(result_large_err)]
698    large_error_threshold: u64 = 128,
699    /// Whether collapsible `if` and `else if` chains are linted if they contain comments inside the parts
700    /// that would be collapsed.
701    #[lints(collapsible_else_if, collapsible_if)]
702    lint_commented_code: bool = false,
703    /// Whether to suggest reordering constructor fields when initializers are present.
704    /// DEPRECATED CONFIGURATION: lint-inconsistent-struct-field-initializers
705    ///
706    /// Use the `check-inconsistent-struct-field-initializers` configuration instead.
707    #[conf_deprecated("Please use `check-inconsistent-struct-field-initializers` instead", check_inconsistent_struct_field_initializers)]
708    lint_inconsistent_struct_field_initializers: bool = false,
709    /// The lower bound for linting decimal literals
710    #[lints(decimal_literal_representation)]
711    literal_representation_threshold: u64 = 16384,
712    /// Whether the matches should be considered by the lint, and whether there should
713    /// be filtering for common types.
714    #[lints(manual_let_else)]
715    matches_for_let_else: MatchLintBehaviour = MatchLintBehaviour::WellKnownTypes,
716    /// The maximum number of bool parameters a function can have
717    #[lints(fn_params_excessive_bools)]
718    max_fn_params_bools: u64 = 3,
719    /// The maximum size of a file included via `include_bytes!()` or `include_str!()`, in bytes
720    #[lints(large_include_file)]
721    max_include_file_size: u64 = 1_000_000,
722    /// The maximum number of bool fields a struct can have
723    #[lints(struct_excessive_bools)]
724    max_struct_bools: u64 = 3,
725    /// When Clippy suggests using a slice pattern, this is the maximum number of elements allowed in
726    /// the slice pattern that is suggested. If more elements are necessary, the lint is suppressed.
727    /// For example, `[_, _, _, e, ..]` is a slice pattern with 4 elements.
728    #[lints(index_refutable_slice)]
729    max_suggested_slice_pattern_length: u64 = 3,
730    /// The maximum number of bounds a trait can have to be linted
731    #[lints(type_repetition_in_bounds)]
732    max_trait_bounds: u64 = 3,
733    /// Minimum chars an ident can have, anything below or equal to this will be linted.
734    #[lints(min_ident_chars)]
735    min_ident_chars_threshold: u64 = 1,
736    /// Whether to allow fields starting with an underscore to skip documentation requirements
737    #[lints(missing_docs_in_private_items)]
738    missing_docs_allow_unused: bool = false,
739    /// Whether to **only** check for missing documentation in items visible within the current
740    /// crate. For example, `pub(crate)` items.
741    #[lints(missing_docs_in_private_items)]
742    missing_docs_in_crate_items: bool = false,
743    /// The named groupings of different source item kinds within modules.
744    #[lints(arbitrary_source_item_ordering)]
745    module_item_order_groupings: SourceItemOrderingModuleItemGroupings = DEFAULT_MODULE_ITEM_ORDERING_GROUPS.into(),
746    /// Whether the items within module groups should be ordered alphabetically or not.
747    ///
748    /// This option can be configured to "all", "none", or a list of specific grouping names that should be checked
749    /// (e.g. only "enums").
750    #[lints(arbitrary_source_item_ordering)]
751    module_items_ordered_within_groupings: SourceItemOrderingWithinModuleItemGroupings =
752        SourceItemOrderingWithinModuleItemGroupings::None,
753    /// The minimum rust version that the project supports. Defaults to the `rust-version` field in `Cargo.toml`
754    #[default_text = "current version"]
755    #[lints(
756        allow_attributes,
757        allow_attributes_without_reason,
758        almost_complete_range,
759        approx_constant,
760        assigning_clones,
761        borrow_as_ptr,
762        cast_abs_to_unsigned,
763        checked_conversions,
764        cloned_instead_of_copied,
765        collapsible_match,
766        collapsible_str_replace,
767        deprecated_cfg_attr,
768        derivable_impls,
769        err_expect,
770        filter_map_next,
771        from_over_into,
772        if_then_some_else_none,
773        index_refutable_slice,
774        inefficient_to_string,
775        io_other_error,
776        iter_kv_map,
777        legacy_numeric_constants,
778        len_zero,
779        lines_filter_map_ok,
780        manual_abs_diff,
781        manual_bits,
782        manual_c_str_literals,
783        manual_clamp,
784        manual_div_ceil,
785        manual_flatten,
786        manual_hash_one,
787        manual_is_ascii_check,
788        manual_is_power_of_two,
789        manual_let_else,
790        manual_midpoint,
791        manual_non_exhaustive,
792        manual_option_as_slice,
793        manual_pattern_char_comparison,
794        manual_range_contains,
795        manual_rem_euclid,
796        manual_repeat_n,
797        manual_retain,
798        manual_slice_fill,
799        manual_slice_size_calculation,
800        manual_split_once,
801        manual_str_repeat,
802        manual_strip,
803        manual_take,
804        manual_try_fold,
805        map_clone,
806        map_unwrap_or,
807        map_with_unused_argument_over_ranges,
808        match_like_matches_macro,
809        mem_replace_option_with_some,
810        mem_replace_with_default,
811        missing_const_for_fn,
812        needless_borrow,
813        non_std_lazy_statics,
814        option_as_ref_deref,
815        or_fun_call,
816        ptr_as_ptr,
817        question_mark,
818        redundant_field_names,
819        redundant_static_lifetimes,
820        repeat_vec_with_capacity,
821        same_item_push,
822        seek_from_current,
823        to_digit_is_some,
824        transmute_ptr_to_ref,
825        tuple_array_conversions,
826        type_repetition_in_bounds,
827        unchecked_time_subtraction,
828        uninlined_format_args,
829        unnecessary_lazy_evaluations,
830        unnecessary_unwrap,
831        unnested_or_patterns,
832        unused_trait_names,
833        use_self,
834        zero_ptr,
835    )]
836    msrv: Msrv = Msrv::default(),
837    /// The minimum size (in bytes) to consider a type for passing by reference instead of by value.
838    #[lints(large_types_passed_by_value)]
839    pass_by_value_size_limit: u64 = 256,
840    /// Lint "public" fields in a struct that are prefixed with an underscore based on their
841    /// exported visibility, or whether they are marked as "pub".
842    #[lints(pub_underscore_fields)]
843    pub_underscore_fields_behavior: PubUnderscoreFieldsBehaviour = PubUnderscoreFieldsBehaviour::PubliclyExported,
844    /// Whether the type itself in a struct or enum should be replaced with `Self` when encountering recursive types.
845    #[lints(use_self)]
846    recursive_self_in_type_definitions: bool = true,
847    /// Whether to lint only if it's multiline.
848    #[lints(semicolon_inside_block)]
849    semicolon_inside_block_ignore_singleline: bool = false,
850    /// Whether to lint only if it's singleline.
851    #[lints(semicolon_outside_block)]
852    semicolon_outside_block_ignore_multiline: bool = false,
853    /// The maximum number of single char bindings a scope may have
854    #[lints(many_single_char_names)]
855    single_char_binding_names_threshold: u64 = 4,
856    /// Which kind of elements should be ordered internally, possible values being `enum`, `impl`, `module`, `struct`, `trait`.
857    #[lints(arbitrary_source_item_ordering)]
858    source_item_ordering: SourceItemOrdering = DEFAULT_SOURCE_ITEM_ORDERING.into(),
859    /// The maximum allowed stack size for functions in bytes
860    #[lints(large_stack_frames)]
861    stack_size_threshold: u64 = 512_000,
862    /// Enforce the named macros always use the braces specified.
863    ///
864    /// A `MacroMatcher` can be added like so `{ name = "macro_name", brace = "(" }`. If the macro
865    /// could be used with a full path two `MacroMatcher`s have to be added one with the full path
866    /// `crate_name::macro_name` and one with just the macro name.
867    #[lints(nonstandard_macro_braces)]
868    standard_macro_braces: Vec<MacroMatcher> = Vec::new(),
869    /// The minimum number of struct fields for the lints about field names to trigger
870    #[lints(struct_field_names)]
871    struct_field_name_threshold: u64 = 3,
872    /// Whether to suppress a restriction lint in constant code. In same
873    /// cases the restructured operation might not be unavoidable, as the
874    /// suggested counterparts are unavailable in constant code. This
875    /// configuration will cause restriction lints to trigger even
876    /// if no suggestion can be made.
877    #[lints(indexing_slicing)]
878    suppress_restriction_lint_in_const: bool = false,
879    /// The maximum size of objects (in bytes) that will be linted. Larger objects are ok on the heap
880    #[lints(boxed_local, useless_vec)]
881    too_large_for_stack: u64 = 200,
882    /// The maximum number of argument a function or method can have
883    #[lints(too_many_arguments)]
884    too_many_arguments_threshold: u64 = 7,
885    /// The maximum number of lines a function or method can have
886    #[lints(too_many_lines)]
887    too_many_lines_threshold: u64 = 100,
888    /// The order of associated items in traits.
889    #[lints(arbitrary_source_item_ordering)]
890    trait_assoc_item_kinds_order: SourceItemOrderingTraitAssocItemKinds = DEFAULT_TRAIT_ASSOC_ITEM_KINDS_ORDER.into(),
891    /// The maximum size (in bytes) to consider a `Copy` type for passing by value instead of by
892    /// reference.
893    #[default_text = "target_pointer_width"]
894    #[lints(trivially_copy_pass_by_ref)]
895    trivial_copy_size_limit: Option<u64> = None,
896    /// The maximum complexity a type can have
897    #[lints(type_complexity)]
898    type_complexity_threshold: u64 = 250,
899    /// The byte size a `T` in `Box<T>` can have, below which it triggers the `clippy::unnecessary_box` lint
900    #[lints(unnecessary_box_returns)]
901    unnecessary_box_size: u64 = 128,
902    /// Should the fraction of a decimal be linted to include separators.
903    #[lints(unreadable_literal)]
904    unreadable_literal_lint_fractions: bool = true,
905    /// Enables verbose mode. Triggers if there is more than one uppercase char next to each other
906    #[lints(upper_case_acronyms)]
907    upper_case_acronyms_aggressive: bool = false,
908    /// The size of the boxed type in bytes, where boxing in a `Vec` is allowed
909    #[lints(vec_box)]
910    vec_box_size_threshold: u64 = 4096,
911    /// The maximum allowed size of a bit mask before suggesting to use 'trailing_zeros'
912    #[lints(verbose_bit_mask)]
913    verbose_bit_mask_threshold: u64 = 1,
914    /// Whether to emit warnings on all wildcard imports, including those from `prelude`, from `super` in tests,
915    /// or for `pub use` reexports.
916    #[lints(wildcard_imports)]
917    warn_on_all_wildcard_imports: bool = false,
918    /// Whether to also emit warnings for unsafe blocks with metavariable expansions in **private** macros.
919    #[lints(macro_metavars_in_unsafe)]
920    warn_unsafe_macro_metavars_in_private_macros: bool = false,
921}
922
923/// Search for the configuration file.
924///
925/// # Errors
926///
927/// Returns any unexpected filesystem error encountered when searching for the config file
928pub fn lookup_conf_file() -> io::Result<(Option<PathBuf>, Vec<String>)> {
929    /// Possible filename to search for.
930    const CONFIG_FILE_NAMES: [&str; 2] = [".clippy.toml", "clippy.toml"];
931
932    // Start looking for a config file in CLIPPY_CONF_DIR, or failing that, CARGO_MANIFEST_DIR.
933    // If neither of those exist, use ".". (Update documentation if this priority changes)
934    let mut current = env::var_os("CLIPPY_CONF_DIR")
935        .or_else(|| env::var_os("CARGO_MANIFEST_DIR"))
936        .map_or_else(|| PathBuf::from("."), PathBuf::from)
937        .canonicalize()?;
938
939    let mut found_config: Option<PathBuf> = None;
940    let mut warnings = vec![];
941
942    loop {
943        for config_file_name in &CONFIG_FILE_NAMES {
944            if let Ok(config_file) = current.join(config_file_name).canonicalize() {
945                match fs::metadata(&config_file) {
946                    Err(e) if e.kind() == io::ErrorKind::NotFound => {},
947                    Err(e) => return Err(e),
948                    Ok(md) if md.is_dir() => {},
949                    Ok(_) => {
950                        // warn if we happen to find two config files #8323
951                        if let Some(ref found_config) = found_config {
952                            warnings.push(format!(
953                                "using config file `{}`, `{}` will be ignored",
954                                found_config.display(),
955                                config_file.display()
956                            ));
957                        } else {
958                            found_config = Some(config_file);
959                        }
960                    },
961                }
962            }
963        }
964
965        if found_config.is_some() {
966            return Ok((found_config, warnings));
967        }
968
969        // If the current directory has no parent, we're done searching.
970        if !current.pop() {
971            return Ok((None, warnings));
972        }
973    }
974}
975
976fn deserialize(file: &SourceFile) -> TryConf {
977    match toml::de::Deserializer::new(file.src.as_ref().unwrap()).deserialize_map(ConfVisitor(file)) {
978        Ok(mut conf) => {
979            extend_vec_if_indicator_present(&mut conf.conf.disallowed_names, DEFAULT_DISALLOWED_NAMES);
980            extend_vec_if_indicator_present(&mut conf.conf.allowed_prefixes, DEFAULT_ALLOWED_PREFIXES);
981            extend_vec_if_indicator_present(
982                &mut conf.conf.allow_renamed_params_for,
983                DEFAULT_ALLOWED_TRAITS_WITH_RENAMED_PARAMS,
984            );
985
986            // Confirms that the user has not accidentally configured ordering requirements for groups that
987            // aren't configured.
988            if let SourceItemOrderingWithinModuleItemGroupings::Custom(groupings) =
989                &conf.conf.module_items_ordered_within_groupings
990            {
991                for grouping in groupings {
992                    if !conf.conf.module_item_order_groupings.is_grouping(grouping) {
993                        // Since this isn't fixable by rustfix, don't emit a `Suggestion`. This just adds some useful
994                        // info for the user instead.
995
996                        let names = conf.conf.module_item_order_groupings.grouping_names();
997                        let suggestion = suggest_candidate(grouping, names.iter().map(String::as_str))
998                            .map(|s| format!(" perhaps you meant `{s}`?"))
999                            .unwrap_or_default();
1000                        let names = names.iter().map(|s| format!("`{s}`")).join(", ");
1001                        let message = format!(
1002                            "unknown ordering group: `{grouping}` was not specified in `module-items-ordered-within-groupings`,{suggestion} expected one of: {names}"
1003                        );
1004
1005                        let span = conf
1006                            .value_spans
1007                            .get("module_item_order_groupings")
1008                            .cloned()
1009                            .unwrap_or_default();
1010                        conf.errors.push(ConfError::spanned(file, message, None, span));
1011                    }
1012                }
1013            }
1014
1015            // TODO: THIS SHOULD BE TESTED, this comment will be gone soon
1016            if conf.conf.allowed_idents_below_min_chars.iter().any(|e| e == "..") {
1017                conf.conf
1018                    .allowed_idents_below_min_chars
1019                    .extend(DEFAULT_ALLOWED_IDENTS_BELOW_MIN_CHARS.iter().map(ToString::to_string));
1020            }
1021            if conf.conf.doc_valid_idents.iter().any(|e| e == "..") {
1022                conf.conf
1023                    .doc_valid_idents
1024                    .extend(DEFAULT_DOC_VALID_IDENTS.iter().map(ToString::to_string));
1025            }
1026
1027            conf
1028        },
1029        Err(e) => TryConf::from_toml_error(file, &e),
1030    }
1031}
1032
1033fn extend_vec_if_indicator_present(vec: &mut Vec<String>, default: &[&str]) {
1034    if vec.contains(&"..".to_string()) {
1035        vec.extend(default.iter().map(ToString::to_string));
1036    }
1037}
1038
1039impl Conf {
1040    pub fn read(sess: &Session, path: &io::Result<(Option<PathBuf>, Vec<String>)>) -> &'static Conf {
1041        static CONF: OnceLock<Conf> = OnceLock::new();
1042        CONF.get_or_init(|| Conf::read_inner(sess, path))
1043    }
1044
1045    fn read_inner(sess: &Session, path: &io::Result<(Option<PathBuf>, Vec<String>)>) -> Conf {
1046        match path {
1047            Ok((_, warnings)) => {
1048                for warning in warnings {
1049                    sess.dcx().warn(warning.clone());
1050                }
1051            },
1052            Err(error) => {
1053                sess.dcx()
1054                    .err(format!("error finding Clippy's configuration file: {error}"));
1055            },
1056        }
1057
1058        let TryConf {
1059            mut conf,
1060            value_spans: _,
1061            errors,
1062            warnings,
1063        } = match path {
1064            Ok((Some(path), _)) => match sess.source_map().load_file(path) {
1065                Ok(file) => deserialize(&file),
1066                Err(error) => {
1067                    sess.dcx().err(format!("failed to read `{}`: {error}", path.display()));
1068                    TryConf::default()
1069                },
1070            },
1071            _ => TryConf::default(),
1072        };
1073
1074        conf.msrv.read_cargo(sess);
1075
1076        // all conf errors are non-fatal, we just use the default conf in case of error
1077        for error in errors {
1078            let mut diag = sess.dcx().struct_span_err(
1079                error.span,
1080                format!("error reading Clippy's configuration file: {}", error.message),
1081            );
1082
1083            if let Some(sugg) = error.suggestion {
1084                diag.span_suggestion(error.span, sugg.message, sugg.suggestion, Applicability::MaybeIncorrect);
1085            }
1086
1087            diag.emit();
1088        }
1089
1090        for warning in warnings {
1091            sess.dcx().span_warn(
1092                warning.span,
1093                format!("error reading Clippy's configuration file: {}", warning.message),
1094            );
1095        }
1096
1097        conf
1098    }
1099}
1100
1101const SEPARATOR_WIDTH: usize = 4;
1102
1103#[derive(Debug)]
1104struct FieldError {
1105    error: String,
1106    suggestion: Option<Suggestion>,
1107}
1108
1109#[derive(Debug)]
1110struct Suggestion {
1111    message: &'static str,
1112    suggestion: &'static str,
1113}
1114
1115impl std::error::Error for FieldError {}
1116
1117impl Display for FieldError {
1118    fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
1119        f.pad(&self.error)
1120    }
1121}
1122
1123impl serde::de::Error for FieldError {
1124    fn custom<T: Display>(msg: T) -> Self {
1125        Self {
1126            error: msg.to_string(),
1127            suggestion: None,
1128        }
1129    }
1130
1131    fn unknown_field(field: &str, expected: &'static [&'static str]) -> Self {
1132        // List the available fields sorted and at least one per line, more if `CLIPPY_TERMINAL_WIDTH` is
1133        // set and allows it.
1134        use fmt::Write;
1135
1136        let metadata = get_configuration_metadata();
1137        let deprecated = metadata
1138            .iter()
1139            .filter_map(|conf| {
1140                if conf.deprecation_reason.is_some() {
1141                    Some(conf.name.as_str())
1142                } else {
1143                    None
1144                }
1145            })
1146            .collect::<Vec<_>>();
1147
1148        let mut expected = expected
1149            .iter()
1150            .copied()
1151            .filter(|name| !deprecated.contains(name))
1152            .collect::<Vec<_>>();
1153        expected.sort_unstable();
1154
1155        let (rows, column_widths) = calculate_dimensions(&expected);
1156
1157        let mut msg = format!("unknown field `{field}`, expected one of");
1158        for row in 0..rows {
1159            writeln!(msg).unwrap();
1160            for (column, column_width) in column_widths.iter().copied().enumerate() {
1161                let index = column * rows + row;
1162                let field = expected.get(index).copied().unwrap_or_default();
1163                write!(msg, "{:SEPARATOR_WIDTH$}{field:column_width$}", " ").unwrap();
1164            }
1165        }
1166
1167        let suggestion = suggest_candidate(field, expected).map(|suggestion| Suggestion {
1168            message: "perhaps you meant",
1169            suggestion,
1170        });
1171
1172        Self { error: msg, suggestion }
1173    }
1174}
1175
1176fn calculate_dimensions(fields: &[&str]) -> (usize, Vec<usize>) {
1177    let columns = env::var("CLIPPY_TERMINAL_WIDTH")
1178        .ok()
1179        .and_then(|s| <usize as FromStr>::from_str(&s).ok())
1180        .map_or(1, |terminal_width| {
1181            let max_field_width = fields.iter().map(|field| field.len()).max().unwrap();
1182            cmp::max(1, terminal_width / (SEPARATOR_WIDTH + max_field_width))
1183        });
1184
1185    let rows = fields.len().div_ceil(columns);
1186
1187    let column_widths = (0..columns)
1188        .map(|column| {
1189            if column < columns - 1 {
1190                (0..rows)
1191                    .map(|row| {
1192                        let index = column * rows + row;
1193                        let field = fields.get(index).copied().unwrap_or_default();
1194                        field.len()
1195                    })
1196                    .max()
1197                    .unwrap()
1198            } else {
1199                // Avoid adding extra space to the last column.
1200                0
1201            }
1202        })
1203        .collect::<Vec<_>>();
1204
1205    (rows, column_widths)
1206}
1207
1208/// Given a user-provided value that couldn't be matched to a known option, finds the most likely
1209/// candidate among candidates that the user might have meant.
1210fn suggest_candidate<'a, I>(value: &str, candidates: I) -> Option<&'a str>
1211where
1212    I: IntoIterator<Item = &'a str>,
1213{
1214    candidates
1215        .into_iter()
1216        .filter_map(|expected| {
1217            let dist = edit_distance(value, expected, 4)?;
1218            Some((dist, expected))
1219        })
1220        .min_by_key(|&(dist, _)| dist)
1221        .map(|(_, suggestion)| suggestion)
1222}
1223
1224#[cfg(test)]
1225mod tests {
1226    use serde::de::IgnoredAny;
1227    use std::collections::{HashMap, HashSet};
1228    use std::fs;
1229    use walkdir::WalkDir;
1230
1231    #[test]
1232    fn configs_are_tested() {
1233        let mut names: HashSet<String> = crate::get_configuration_metadata()
1234            .into_iter()
1235            .filter_map(|meta| {
1236                if meta.deprecation_reason.is_none() {
1237                    Some(meta.name.replace('_', "-"))
1238                } else {
1239                    None
1240                }
1241            })
1242            .collect();
1243
1244        let toml_files = WalkDir::new("../tests")
1245            .into_iter()
1246            .map(Result::unwrap)
1247            .filter(|entry| entry.file_name() == "clippy.toml");
1248
1249        for entry in toml_files {
1250            let file = fs::read_to_string(entry.path()).unwrap();
1251            #[expect(clippy::zero_sized_map_values)]
1252            if let Ok(map) = toml::from_str::<HashMap<String, IgnoredAny>>(&file) {
1253                for name in map.keys() {
1254                    names.remove(name.as_str());
1255                }
1256            }
1257        }
1258
1259        assert!(
1260            names.is_empty(),
1261            "Configuration variable lacks test: {names:?}\nAdd a test to `tests/ui-toml`"
1262        );
1263    }
1264}