Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add unchecked-type-assertion #889

Merged
merged 3 commits into from
Sep 17, 2023
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -464,6 +464,7 @@ List of all available rules. The rules ported from `golint` are left unchanged a
| [`context-keys-type`](./RULES_DESCRIPTIONS.md#context-key-types) | n/a | Disallows the usage of basic types in `context.WithValue`. | yes | yes |
| [`time-equal`](./RULES_DESCRIPTIONS.md#time-equal) | n/a | Suggests to use `time.Time.Equal` instead of `==` and `!=` for equality check time. | no | yes |
| [`time-naming`](./RULES_DESCRIPTIONS.md#time-naming) | n/a | Conventions around the naming of time variables. | yes | yes |
| [`unchecked-type-assertions`](./RULES_DESCRIPTIONS.md#unchecked-type-assertions) | n/a | Disallows type assertions without checking the result. | no | yes |
| [`var-declaration`](./RULES_DESCRIPTIONS.md#var-declaration) | n/a | Reduces redundancies around variable declaration. | yes | yes |
| [`unexported-return`](./RULES_DESCRIPTIONS.md#unexported-return) | n/a | Warns when a public return is from unexported type. | yes | yes |
| [`errorf`](./RULES_DESCRIPTIONS.md#errorf) | n/a | Should replace `errors.New(fmt.Sprintf())` with `fmt.Errorf()` | yes | yes |
Expand Down
23 changes: 22 additions & 1 deletion RULES_DESCRIPTIONS.md
Original file line number Diff line number Diff line change
Expand Up @@ -62,6 +62,7 @@ List of all available rules.
- [string-format](#string-format)
- [superfluous-else](#superfluous-else)
- [time-equal](#time-equal)
- [unchecked-type-assertion](#unchecked-type-assertion)
- [time-naming](#time-naming)
- [var-naming](#var-naming)
- [var-declaration](#var-declaration)
Expand Down Expand Up @@ -170,8 +171,8 @@ Example:
[rule.cognitive-complexity]
arguments =[7]
```

## comment-spacings

_Description_: Spots comments of the form:
```go
//This is a malformed comment: no space between // and the start of the sentence
Expand Down Expand Up @@ -683,6 +684,26 @@ _Description_: Using unit-specific suffix like "Secs", "Mins", ... when naming v

_Configuration_: N/A

## unchecked-type-assertion

_Description_: This rule checks whether a type assertion result is checked (the `ok` value), preventing unexpected `panic`s.

_Configuration_: list of key-value-pair-map (`[]map[string]any`).

- `acceptIgnoredAssertionResult` : (bool) default `false`, set it to `true` to accept ignored type assertion results like this:

```go
foo, _ := bar(.*Baz).
// ^
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It could be interesting to list all the cases the rule is capable to detect (switch, channel, ...)

```

Example:

```yaml
[rule.unchecked-type-assertion]
arguments = [{acceptIgnoredAssertionResult=true}]
```

## var-naming

_Description_: This rule warns when [initialism](https://github.com/golang/go/wiki/CodeReviewComments#initialisms), [variable](https://github.com/golang/go/wiki/CodeReviewComments#variable-names) or [package](https://github.com/golang/go/wiki/CodeReviewComments#package-names) naming conventions are not followed.
Expand Down
1 change: 1 addition & 0 deletions config/config.go
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
package config

Check warning on line 1 in config/config.go

View workflow job for this annotation

GitHub Actions / Lint

should have a package comment

import (
"errors"
Expand Down Expand Up @@ -80,6 +80,7 @@
&rule.FunctionLength{},
&rule.NestedStructs{},
&rule.UselessBreak{},
&rule.UncheckedTypeAssertionRule{},
&rule.TimeEqualRule{},
&rule.BannedCharsRule{},
&rule.OptimizeOperandsOrderRule{},
Expand Down
2 changes: 0 additions & 2 deletions go.sum
Original file line number Diff line number Diff line change
@@ -1,7 +1,5 @@
github.com/BurntSushi/toml v1.3.2 h1:o7IhLm0Msx3BaB+n3Ag7L8EVlByGnpq14C4YWiu/gL8=
github.com/BurntSushi/toml v1.3.2/go.mod h1:CxXYINrC8qIiEnFrOxCa7Jy5BFHlXnUU2pbicEuybxQ=
github.com/chavacava/garif v0.0.0-20230608123814-4bd63c2919ab h1:5JxePczlyGAtj6R1MUEFZ/UFud6FfsOejq7xLC2ZIb0=
github.com/chavacava/garif v0.0.0-20230608123814-4bd63c2919ab/go.mod h1:XMyYCkEL58DF0oyW4qDjjnPWONs2HBqYKI+UIPD+Gww=
github.com/chavacava/garif v0.1.0 h1:2JHa3hbYf5D9dsgseMKAmc/MZ109otzgNFk5s87H9Pc=
github.com/chavacava/garif v0.1.0/go.mod h1:XMyYCkEL58DF0oyW4qDjjnPWONs2HBqYKI+UIPD+Gww=
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
Expand Down
160 changes: 160 additions & 0 deletions rule/unchecked-type-assertion.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,160 @@
package rule

import (
"fmt"
"go/ast"
"sync"

"github.com/mgechev/revive/lint"
)

const (
ruleUTAMessagePanic = "type assertion will panic if not matched"
ruleUTAMessageIgnored = "type assertion result ignored"
)

// UncheckedTypeAssertionRule lints missing or ignored `ok`-value in danymic type casts.
type UncheckedTypeAssertionRule struct {
sync.Mutex
acceptIgnoredAssertionResult bool
}

func (u *UncheckedTypeAssertionRule) configure(arguments lint.Arguments) {
u.Lock()
defer u.Unlock()

if len(arguments) == 0 {
Copy link
Collaborator

@chavacava chavacava Sep 15, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We could add a configured field to the rule's struct to trace the rule's configuration was already processed and then quit ASAP once the rule was configured a first time.

Suggested change
if len(arguments) == 0 {
if len(arguments) == 0 || u.configured {

return
}

args, ok := arguments[0].(map[string]any)
if !ok {
panic("Unable to get arguments. Expected object of key-value-pairs.")
}

for k, v := range args {
switch k {
case "acceptIgnoredAssertionResult":
u.acceptIgnoredAssertionResult, ok = v.(bool)
if !ok {
panic(fmt.Sprintf("Unable to parse argument '%s'. Expected boolean.", k))
}
default:
panic(fmt.Sprintf("Unknown argument: %s", k))
}
}
}

// Apply applies the rule to given file.
func (u *UncheckedTypeAssertionRule) Apply(file *lint.File, args lint.Arguments) []lint.Failure {
u.configure(args)

var failures []lint.Failure

walker := &lintUnchekedTypeAssertion{
pkg: file.Pkg,
onFailure: func(failure lint.Failure) {
failures = append(failures, failure)
},
acceptIgnoredTypeAssertionResult: u.acceptIgnoredAssertionResult,
}

file.Pkg.TypeCheck()
ast.Walk(walker, file.AST)

return failures
}

// Name returns the rule name.
func (*UncheckedTypeAssertionRule) Name() string {
return "unchecked-type-assertion"
}

type lintUnchekedTypeAssertion struct {
pkg *lint.Package
onFailure func(lint.Failure)
acceptIgnoredTypeAssertionResult bool
}

func isIgnored(e ast.Expr) bool {
ident, ok := e.(*ast.Ident)
if !ok {
return false
}

return ident.Name == "_"
}

func isTypeSwitch(e *ast.TypeAssertExpr) bool {
return e.Type == nil
}

func (w *lintUnchekedTypeAssertion) requireNoTypeAssert(expr ast.Expr) {
e, ok := expr.(*ast.TypeAssertExpr)
if ok && !isTypeSwitch(e) {
w.addFailure(e, ruleUTAMessagePanic)
}
}

func (w *lintUnchekedTypeAssertion) handleSwitch(n *ast.SwitchStmt) {
w.requireNoTypeAssert(n.Tag)
}

func (w *lintUnchekedTypeAssertion) handleAssignment(n *ast.AssignStmt) {
if len(n.Rhs) == 0 {
return
}

e, ok := n.Rhs[0].(*ast.TypeAssertExpr)
if !ok || e == nil {
return
}

if isTypeSwitch(e) {
return
}

if len(n.Lhs) == 1 {
w.addFailure(e, ruleUTAMessagePanic)
}

if !w.acceptIgnoredTypeAssertionResult && len(n.Lhs) == 2 && isIgnored(n.Lhs[1]) {
w.addFailure(e, ruleUTAMessageIgnored)
}
}

// handles "return foo(.*bar)" - one of them is enough to fail as golang does not forward the type cast tuples in return statements
func (w *lintUnchekedTypeAssertion) handleReturn(n *ast.ReturnStmt) {
for _, r := range n.Results {
w.requireNoTypeAssert(r)
}
}

func (w *lintUnchekedTypeAssertion) handleRange(n *ast.RangeStmt) {
w.requireNoTypeAssert(n.X)
}

func (w *lintUnchekedTypeAssertion) Visit(node ast.Node) ast.Visitor {
switch n := node.(type) {
case *ast.RangeStmt:
w.handleRange(n)
case *ast.SwitchStmt:
w.handleSwitch(n)
case *ast.ReturnStmt:
w.handleReturn(n)
case *ast.AssignStmt:
w.handleAssignment(n)
}

return w
}

func (w *lintUnchekedTypeAssertion) addFailure(n *ast.TypeAssertExpr, why string) {
s := fmt.Sprintf("type cast result is unchecked in %v - %s", gofmt(n), why)
w.onFailure(lint.Failure{
Category: "bad practice",
Confidence: 1,
Node: n,
Failure: s,
})
}
20 changes: 20 additions & 0 deletions test/unchecked_type_assertion_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
package test

import (
"testing"

"github.com/mgechev/revive/lint"
"github.com/mgechev/revive/rule"
)

func TestUncheckedDynamicCast(t *testing.T) {
testRule(t, "unchecked-type-assertion", &rule.UncheckedTypeAssertionRule{})
}

func TestUncheckedDynamicCastWithAcceptIgnored(t *testing.T) {
args := []any{map[string]any{
"acceptIgnoredAssertionResult": true,
}}

testRule(t, "unchecked-type-assertion-accept-ignored", &rule.UncheckedTypeAssertionRule{}, &lint.RuleConfig{Arguments: args})
}
12 changes: 12 additions & 0 deletions testdata/unchecked-type-assertion-accept-ignored.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
package fixtures

var foo any = "foo"

func handleIgnoredIsOKByConfig() {
// No lint here bacuse `acceptIgnoredAssertionResult` is set to `true`
r, _ := foo.(int)
}

func handleSkippedStillFails() {
r := foo.(int) // MATCH /type cast result is unchecked in foo.(int) - type assertion will panic if not matched/
}
58 changes: 58 additions & 0 deletions testdata/unchecked-type-assertion.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
package fixtures
Dirk007 marked this conversation as resolved.
Show resolved Hide resolved

import "fmt"

var (
foo any = "foo"
bars = []any{1, 42, "some", "thing"}
)

func handleIgnored() {
r, _ := foo.(int) // MATCH /type cast result is unchecked in foo.(int) - type assertion result ignored/
}

func handleSkipped() {
r := foo.(int) // MATCH /type cast result is unchecked in foo.(int) - type assertion will panic if not matched/
}

func handleReturn() int {
return foo.(int) // MATCH /type cast result is unchecked in foo.(int) - type assertion will panic if not matched/
}

func handleSwitch() {
switch foo.(int) { // MATCH /type cast result is unchecked in foo.(int) - type assertion will panic if not matched/
Dirk007 marked this conversation as resolved.
Show resolved Hide resolved
Dirk007 marked this conversation as resolved.
Show resolved Hide resolved
case 0:
case 1:
//
}
}

func handleRange() {
var some any = bars
for _, x := range some.([]string) { // MATCH /type cast result is unchecked in some.([]string) - type assertion will panic if not matched/
fmt.Println(x)
}
}

func handleTypeSwitch() {
// Should not be a lint
switch foo.(type) {
case string:
case int:
//
}
}

func handleTypeSwitchWithAssignment() {
// Should not be a lint
switch n := foo.(type) {
case string:
case int:
//
}
}

func handleTypeSwitchReturn() {
// Should not be a lint
return foo.(type)
Dirk007 marked this conversation as resolved.
Show resolved Hide resolved
}
Loading