Files
prysm/tools/analyzers/interfacechecker/analyzer.go
Preston Van Loon 2fd6bd8150 Add golang.org/x/tools modernize static analyzer and fix violations (#15946)
* Ran gopls modernize to fix everything

go run golang.org/x/tools/gopls/internal/analysis/modernize/cmd/modernize@latest -fix -test ./...

* Override rules_go provided dependency for golang.org/x/tools to v0.38.0.

To update this, checked out rules_go, then ran `bazel run //go/tools/releaser -- upgrade-dep -mirror=false org_golang_x_tools` and copied the patches.

* Fix buildtag violations and ignore buildtag violations in external

* Introduce modernize analyzer package.

* Add modernize "any" analyzer.

* Fix violations of any analyzer

* Add modernize "appendclipped" analyzer.

* Fix violations of appendclipped

* Add modernize "bloop" analyzer.

* Add modernize "fmtappendf" analyzer.

* Add modernize "forvar" analyzer.

* Add modernize "mapsloop" analyzer.

* Add modernize "minmax" analyzer.

* Fix violations of minmax analyzer

* Add modernize "omitzero" analyzer.

* Add modernize "rangeint" analyzer.

* Fix violations of rangeint.

* Add modernize "reflecttypefor" analyzer.

* Fix violations of reflecttypefor analyzer.

* Add modernize "slicescontains" analyzer.

* Add modernize "slicessort" analyzer.

* Add modernize "slicesdelete" analyzer. This is disabled by default for now. See https://go.dev/issue/73686.

* Add modernize "stringscutprefix" analyzer.

* Add modernize "stringsbuilder" analyzer.

* Fix violations of stringsbuilder analyzer.

* Add modernize "stringsseq" analyzer.

* Add modernize "testingcontext" analyzer.

* Add modernize "waitgroup" analyzer.

* Changelog fragment

* gofmt

* gazelle

* Add modernize "newexpr" analyzer.

* Disable newexpr until go1.26

* Add more details in WORKSPACE on how to update the override

* @nalepae feedback on min()

* gofmt

* Fix violations of forvar
2025-11-14 01:27:22 +00:00

99 lines
2.4 KiB
Go

// Package interfacechecker implements a static analyzer to prevent incorrect conditional checks on select interfaces.
package interfacechecker
import (
"errors"
"go/ast"
"go/token"
"go/types"
"strings"
"golang.org/x/tools/go/analysis"
"golang.org/x/tools/go/analysis/passes/inspect"
"golang.org/x/tools/go/ast/inspector"
)
// Doc explaining the tool.
const Doc = "Enforce usage of proper conditional check for interfaces"
// Analyzer runs static analysis.
var Analyzer = &analysis.Analyzer{
Name: "interfacechecker",
Doc: Doc,
Requires: []*analysis.Analyzer{inspect.Analyzer},
Run: run,
}
// These are the selected interfaces that we want to parse through and check nilness for.
var selectedInterfaces = []string{
"interfaces.SignedBeaconBlock",
"interfaces.MetadataV0",
"interface.BeaconState",
"interface.ReadOnlyBeaconState",
"interface.WriteOnlyBeaconState",
}
func run(pass *analysis.Pass) (any, error) {
inspection, ok := pass.ResultOf[inspect.Analyzer].(*inspector.Inspector)
if !ok {
return nil, errors.New("analyzer is not type *inspector.Inspector")
}
nodeFilter := []ast.Node{
(*ast.IfStmt)(nil),
}
inspection.Preorder(nodeFilter, func(node ast.Node) {
stmt, ok := node.(*ast.IfStmt)
if !ok {
return
}
exp, ok := stmt.Cond.(*ast.BinaryExpr)
if !ok {
return
}
handleConditionalExpression(exp, pass)
})
return nil, nil
}
func handleConditionalExpression(exp *ast.BinaryExpr, pass *analysis.Pass) {
identX, ok := exp.X.(*ast.Ident)
if !ok {
return
}
identY, ok := exp.Y.(*ast.Ident)
if !ok {
return
}
typeMap := pass.TypesInfo.Types
if _, ok := typeMap[identX].Type.(*types.Slice); ok {
return
}
if _, ok := typeMap[identY].Type.(*types.Slice); ok {
return
}
for _, iface := range selectedInterfaces {
xIsIface := strings.Contains(typeMap[identX].Type.String(), iface)
xIsNil := typeMap[identX].IsNil()
yisIface := strings.Contains(typeMap[identY].Type.String(), iface)
yIsNil := typeMap[identY].IsNil()
// Exit early if neither are of the desired interface
if !xIsIface && !yisIface {
continue
}
if xIsIface && yIsNil {
reportFailure(identX.Pos(), pass)
}
if yisIface && xIsNil {
reportFailure(identY.Pos(), pass)
}
}
}
func reportFailure(pos token.Pos, pass *analysis.Pass) {
pass.Reportf(pos, "A single nilness check is being performed on an interface"+
", this check needs another accompanying nilness check on the underlying object for the interface.")
}