forked from bflad/tfproviderlint
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathR006.go
99 lines (77 loc) · 2.55 KB
/
R006.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
// Package R006 defines an Analyzer that checks for
// RetryFunc that omit retryable errors
package R006
import (
"flag"
"go/ast"
"go/types"
"strings"
"github.com/bflad/tfproviderlint/helper/astutils"
"github.com/bflad/tfproviderlint/helper/terraformtype/helper/resource"
"github.com/bflad/tfproviderlint/passes/commentignore"
"github.com/bflad/tfproviderlint/passes/helper/resource/retryfuncinfo"
"golang.org/x/tools/go/analysis"
)
const Doc = `check for RetryFunc that omit retryable errors
The R006 analyzer reports when RetryFunc declarations are missing
retryable errors and should not be used as RetryFunc.
Optional parameters:
- package-aliases Comma-separated list of additional Go import paths to consider as aliases for helper/resource, defaults to none.
`
const analyzerName = "R006"
var (
packageAliases string
)
func parseFlags() flag.FlagSet {
var flags = flag.NewFlagSet(analyzerName, flag.ExitOnError)
flags.StringVar(&packageAliases, "package-aliases", "", "Comma-separated list of additional Go import paths to consider as aliases for helper/resource")
return *flags
}
var Analyzer = &analysis.Analyzer{
Name: analyzerName,
Doc: Doc,
Flags: parseFlags(),
Requires: []*analysis.Analyzer{
commentignore.Analyzer,
retryfuncinfo.Analyzer,
},
Run: run,
}
func isPackageAliasIgnored(e ast.Expr, info *types.Info, packageAliasesList string) bool {
packageAliases := strings.Split(packageAliasesList, ",")
for _, packageAlias := range packageAliases {
if astutils.IsModulePackageFunc(e, info, packageAlias, "", resource.FuncNameRetryableError) {
return true
}
}
return false
}
func run(pass *analysis.Pass) (interface{}, error) {
ignorer := pass.ResultOf[commentignore.Analyzer].(*commentignore.Ignorer)
retryFuncs := pass.ResultOf[retryfuncinfo.Analyzer].([]*resource.RetryFuncInfo)
for _, retryFunc := range retryFuncs {
if ignorer.ShouldIgnore(analyzerName, retryFunc.Node) {
continue
}
var retryableErrorFound bool
ast.Inspect(retryFunc.Body, func(n ast.Node) bool {
callExpr, ok := n.(*ast.CallExpr)
if !ok {
return true
}
if resource.IsFunc(callExpr.Fun, pass.TypesInfo, resource.FuncNameRetryableError) {
retryableErrorFound = true
return false
}
if packageAliases != "" && isPackageAliasIgnored(callExpr.Fun, pass.TypesInfo, packageAliases) {
retryableErrorFound = true
return false
}
return true
})
if !retryableErrorFound {
pass.Reportf(retryFunc.Pos, "%s: RetryFunc should include RetryableError() handling or be removed", analyzerName)
}
}
return nil, nil
}