From 1c556df5fe87e606f8d527b4a43f4aef7636f142 Mon Sep 17 00:00:00 2001 From: Don Isaac Date: Thu, 29 Aug 2024 14:45:34 -0400 Subject: [PATCH] chore(linter): remove commented-out code --- apps/oxlint/src/lint/mod.rs | 35 ++- crates/oxc_linter/src/lib.rs | 2 +- .../oxc_linter/src/options/allow_warn_deny.rs | 15 +- crates/oxc_linter/src/options/filter.rs | 265 ++++++++++++++++++ crates/oxc_linter/src/options/mod.rs | 68 +++-- crates/oxc_linter/src/options/plugins.rs | 118 +++++--- crates/oxc_linter/src/rule.rs | 28 +- tasks/benchmark/benches/linter.rs | 6 +- 8 files changed, 452 insertions(+), 85 deletions(-) create mode 100644 crates/oxc_linter/src/options/filter.rs diff --git a/apps/oxlint/src/lint/mod.rs b/apps/oxlint/src/lint/mod.rs index 4becfd54f0e0f1..d2913a30b6f8d9 100644 --- a/apps/oxlint/src/lint/mod.rs +++ b/apps/oxlint/src/lint/mod.rs @@ -3,7 +3,8 @@ use std::{env, io::BufWriter, time::Instant}; use ignore::gitignore::Gitignore; use oxc_diagnostics::{DiagnosticService, GraphicalReportHandler}; use oxc_linter::{ - partial_loader::LINT_PARTIAL_LOADER_EXT, LintService, LintServiceOptions, Linter, OxlintOptions, + partial_loader::LINT_PARTIAL_LOADER_EXT, InvalidFilterKind, LintFilter, LintService, + LintServiceOptions, Linter, OxlintOptions, }; use oxc_span::VALID_EXTENSIONS; @@ -35,7 +36,7 @@ impl Runner for LintRunner { let LintCommand { paths, - filter, + filter: filter_args, basic_options, warning_options, ignore_options, @@ -46,6 +47,34 @@ impl Runner for LintRunner { .. } = self.options; + let mut filters = Vec::with_capacity(filter_args.len()); + for (severity, filter_arg) in filter_args { + match LintFilter::new(severity, filter_arg) { + Ok(filter) => { + filters.push(filter); + } + Err(InvalidFilterKind::Empty) => { + return CliRunResult::InvalidOptions { + message: format!("Cannot {severity} an empty filter."), + }; + } + Err(InvalidFilterKind::PluginMissing(filter)) => { + return CliRunResult::InvalidOptions { + message: format!( + "Failed to {severity} filter {filter}: Plugin name is missing. Expected /" + ), + }; + } + Err(InvalidFilterKind::RuleMissing(filter)) => { + return CliRunResult::InvalidOptions { + message: format!( + "Failed to {severity} filter {filter}: Rule name is missing. Expected /" + ), + }; + } + } + } + let mut paths = paths; let provided_path_count = paths.len(); let now = Instant::now(); @@ -93,7 +122,7 @@ impl Runner for LintRunner { let cwd = std::env::current_dir().unwrap().into_boxed_path(); let lint_options = OxlintOptions::default() - .with_filter(filter) + .with_filter(filters) .with_config_path(basic_options.config) .with_fix(fix_options.fix_kind()) .with_react_plugin(enable_plugins.react_plugin) diff --git a/crates/oxc_linter/src/lib.rs b/crates/oxc_linter/src/lib.rs index 9d91305cce22ea..a5a5604d30bb7f 100644 --- a/crates/oxc_linter/src/lib.rs +++ b/crates/oxc_linter/src/lib.rs @@ -32,7 +32,7 @@ pub use crate::{ context::LintContext, fixer::FixKind, frameworks::FrameworkFlags, - options::{AllowWarnDeny, OxlintOptions}, + options::{AllowWarnDeny, InvalidFilterKind, LintFilter, LintFilterKind, OxlintOptions}, rule::{RuleCategory, RuleFixMeta, RuleMeta, RuleWithSeverity}, service::{LintService, LintServiceOptions}, }; diff --git a/crates/oxc_linter/src/options/allow_warn_deny.rs b/crates/oxc_linter/src/options/allow_warn_deny.rs index 85cc303d366ea5..6aee260c6c1484 100644 --- a/crates/oxc_linter/src/options/allow_warn_deny.rs +++ b/crates/oxc_linter/src/options/allow_warn_deny.rs @@ -1,4 +1,4 @@ -use std::convert::From; +use std::{convert::From, fmt}; use oxc_diagnostics::{OxcDiagnostic, Severity}; use schemars::{schema::SchemaObject, JsonSchema}; @@ -19,6 +19,14 @@ impl AllowWarnDeny { pub fn is_allow(self) -> bool { self == Self::Allow } + + pub fn as_str(self) -> &'static str { + match self { + Self::Allow => "allow", + Self::Warn => "warn", + Self::Deny => "deny", + } + } } impl TryFrom<&str> for AllowWarnDeny { @@ -64,6 +72,11 @@ impl TryFrom<&Number> for AllowWarnDeny { } } } +impl fmt::Display for AllowWarnDeny { + fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { + self.as_str().fmt(f) + } +} impl JsonSchema for AllowWarnDeny { fn schema_name() -> String { diff --git a/crates/oxc_linter/src/options/filter.rs b/crates/oxc_linter/src/options/filter.rs new file mode 100644 index 00000000000000..27949756abe8bb --- /dev/null +++ b/crates/oxc_linter/src/options/filter.rs @@ -0,0 +1,265 @@ +use crate::RuleCategory; + +use super::{plugins::LintPlugins, AllowWarnDeny}; +use std::{borrow::Cow, fmt}; + +#[derive(Debug, Clone)] +#[cfg_attr(test, derive(PartialEq))] +pub struct LintFilter(AllowWarnDeny, LintFilterKind); +impl LintFilter { + /// # Errors + /// + /// If `kind` is an empty string, or is a `/` filter but is missing either the + /// plugin or the rule. + pub fn new>( + severity: AllowWarnDeny, + kind: F, + ) -> Result>::Error> { + Ok(Self(severity, kind.try_into()?)) + } + + #[must_use] + pub fn allow>(kind: F) -> Self { + Self(AllowWarnDeny::Allow, kind.into()) + } + + #[must_use] + pub fn warn>(kind: F) -> Self { + Self(AllowWarnDeny::Warn, kind.into()) + } + + #[must_use] + pub fn deny>(kind: F) -> Self { + Self(AllowWarnDeny::Deny, kind.into()) + } + + #[inline] + pub fn severity(&self) -> AllowWarnDeny { + self.0 + } + + #[inline] + pub fn kind(&self) -> &LintFilterKind { + &self.1 + } +} + +impl Default for LintFilter { + fn default() -> Self { + Self(AllowWarnDeny::Warn, LintFilterKind::Category(RuleCategory::Correctness)) + } +} + +impl From for (AllowWarnDeny, LintFilterKind) { + fn from(val: LintFilter) -> Self { + (val.0, val.1) + } +} +impl<'a> From<&'a LintFilter> for (AllowWarnDeny, &'a LintFilterKind) { + fn from(val: &'a LintFilter) -> Self { + (val.0, &val.1) + } +} + +#[derive(Debug, Clone)] +#[cfg_attr(test, derive(PartialEq))] +pub enum LintFilterKind { + Generic(Cow<'static, str>), + /// e.g. `no-const-assign` or `eslint/no-const-assign` + Rule(LintPlugins, Cow<'static, str>), + /// e.g. `correctness` + Category(RuleCategory), + // TODO: plugin + category? e.g `-A react:correctness` +} + +impl LintFilterKind { + /// # Errors + /// + /// If `filter` is an empty string, or is a `/` filter but is missing either the + /// plugin or the rule. + pub fn parse(filter: Cow<'static, str>) -> Result { + if filter.is_empty() { + return Err(InvalidFilterKind::Empty); + } + + if filter.contains('/') { + // this is an unfortunate amount of code duplication, but it needs to be done for + // `filter` to live long enough to avoid a String allocation for &'static str + let (plugin, rule) = match filter { + Cow::Borrowed(filter) => { + let mut parts = filter.splitn(2, '/'); + + let plugin = parts + .next() + .ok_or(InvalidFilterKind::PluginMissing(Cow::Borrowed(filter)))?; + if plugin.is_empty() { + return Err(InvalidFilterKind::PluginMissing(Cow::Borrowed(filter))); + } + + let rule = parts + .next() + .ok_or(InvalidFilterKind::RuleMissing(Cow::Borrowed(filter)))?; + if rule.is_empty() { + return Err(InvalidFilterKind::RuleMissing(Cow::Borrowed(filter))); + } + + (LintPlugins::from(plugin), Cow::Borrowed(rule)) + } + Cow::Owned(filter) => { + let mut parts = filter.splitn(2, '/'); + + let plugin = parts + .next() + .ok_or_else(|| InvalidFilterKind::PluginMissing(filter.clone().into()))?; + if plugin.is_empty() { + return Err(InvalidFilterKind::PluginMissing(filter.into())); + } + + let rule = parts + .next() + .ok_or_else(|| InvalidFilterKind::RuleMissing(filter.clone().into()))?; + if rule.is_empty() { + return Err(InvalidFilterKind::RuleMissing(filter.into())); + } + + (LintPlugins::from(plugin), Cow::Owned(rule.to_string())) + } + }; + Ok(LintFilterKind::Rule(plugin, rule)) + } else { + match RuleCategory::try_from(filter.as_ref()) { + Ok(category) => Ok(LintFilterKind::Category(category)), + Err(()) => Ok(LintFilterKind::Generic(filter)), + } + } + } +} + +impl TryFrom for LintFilterKind { + type Error = InvalidFilterKind; + + #[inline] + fn try_from(filter: String) -> Result { + Self::parse(Cow::Owned(filter)) + } +} + +impl TryFrom<&'static str> for LintFilterKind { + type Error = InvalidFilterKind; + + #[inline] + fn try_from(filter: &'static str) -> Result { + Self::parse(Cow::Borrowed(filter)) + } +} + +impl TryFrom> for LintFilterKind { + type Error = InvalidFilterKind; + + #[inline] + fn try_from(filter: Cow<'static, str>) -> Result { + Self::parse(filter) + } +} + +impl From for LintFilterKind { + #[inline] + fn from(category: RuleCategory) -> Self { + LintFilterKind::Category(category) + } +} + +#[derive(Debug, Clone, PartialEq, Eq)] +pub enum InvalidFilterKind { + Empty, + PluginMissing(Cow<'static, str>), + RuleMissing(Cow<'static, str>), +} + +impl fmt::Display for InvalidFilterKind { + fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { + match self { + Self::Empty => "Filter cannot be empty.".fmt(f), + Self::PluginMissing(filter) => { + write!( + f, + "Filter '{filter}' must match / but is missing a plugin name." + ) + } + Self::RuleMissing(filter) => { + write!( + f, + "Filter '{filter}' must match / but is missing a rule name." + ) + } + } + } +} + +impl std::error::Error for InvalidFilterKind {} + +#[cfg(test)] +mod test { + use super::*; + + #[test] + fn test_from_category() { + let correctness: LintFilter = LintFilter::new(AllowWarnDeny::Warn, "correctness").unwrap(); + assert_eq!(correctness.severity(), AllowWarnDeny::Warn); + assert!( + matches!(correctness.kind(), LintFilterKind::Category(RuleCategory::Correctness)), + "{:?}", + correctness.kind() + ); + } + + #[test] + fn test_eslint_deny() { + let filter = LintFilter::deny(LintFilterKind::try_from("no-const-assign").unwrap()); + assert_eq!(filter.severity(), AllowWarnDeny::Deny); + assert_eq!(filter.kind(), &LintFilterKind::Generic("no-const-assign".into())); + + let filter = LintFilter::deny(LintFilterKind::try_from("eslint/no-const-assign").unwrap()); + assert_eq!(filter.severity(), AllowWarnDeny::Deny); + assert_eq!( + filter.kind(), + &LintFilterKind::Rule(LintPlugins::from("eslint"), "no-const-assign".into()) + ); + assert!(matches!(filter.kind(), LintFilterKind::Rule(_, _))); + } + + #[test] + fn test_parse() { + let test_cases: Vec<(&'static str, LintFilterKind)> = vec![ + ("import/namespace", LintFilterKind::Rule(LintPlugins::IMPORT, "namespace".into())), + ( + "react-hooks/exhaustive-deps", + LintFilterKind::Rule(LintPlugins::REACT, "exhaustive-deps".into()), + ), + // categories + ("nursery", LintFilterKind::Category("nursery".try_into().unwrap())), + ("perf", LintFilterKind::Category("perf".try_into().unwrap())), + // misc + ("not-a-valid-filter", LintFilterKind::Generic("not-a-valid-filter".into())), + ]; + + for (input, expected) in test_cases { + let actual = LintFilterKind::try_from(input).unwrap(); + assert_eq!(actual, expected, "input: {input}"); + } + } + + #[test] + fn test_parse_invalid() { + let test_cases = vec!["/rules-of-hooks", "import/", "", "/", "//"]; + + for input in test_cases { + let actual = LintFilterKind::parse(Cow::Borrowed(input)); + assert!( + actual.is_err(), + "input '{input}' produced filter '{:?}' but it should have errored", + actual.unwrap() + ); + } + } +} diff --git a/crates/oxc_linter/src/options/mod.rs b/crates/oxc_linter/src/options/mod.rs index 80436f68d5fafb..60d7b5ff9debd0 100644 --- a/crates/oxc_linter/src/options/mod.rs +++ b/crates/oxc_linter/src/options/mod.rs @@ -1,4 +1,5 @@ mod allow_warn_deny; +mod filter; mod plugins; use std::{convert::From, path::PathBuf}; @@ -16,13 +17,14 @@ use crate::{ }; pub use allow_warn_deny::AllowWarnDeny; +pub use filter::{InvalidFilterKind, LintFilter, LintFilterKind}; pub use plugins::LintPluginOptions; #[derive(Debug)] pub struct OxlintOptions { /// Allow / Deny rules in order. [("allow" / "deny", rule name)] /// Defaults to [("deny", "correctness")] - pub filter: Vec<(AllowWarnDeny, String)>, + pub filter: Vec, pub config_path: Option, /// Enable automatic code fixes. Set to [`None`] to disable. /// @@ -45,7 +47,7 @@ pub(crate) struct LintOptions { impl Default for OxlintOptions { fn default() -> Self { Self { - filter: vec![(AllowWarnDeny::Warn, String::from("correctness"))], + filter: vec![LintFilter::warn(RuleCategory::Correctness)], config_path: None, fix: FixKind::None, plugins: LintPluginOptions::default(), @@ -70,7 +72,7 @@ impl From for LintOptions { impl OxlintOptions { #[must_use] - pub fn with_filter(mut self, filter: Vec<(AllowWarnDeny, String)>) -> Self { + pub fn with_filter(mut self, filter: Vec) -> Self { if !filter.is_empty() { self.filter = filter; } @@ -185,48 +187,60 @@ impl OxlintOptions { let mut rules: FxHashSet = FxHashSet::default(); let all_rules = self.get_filtered_rules(); - for (severity, name_or_category) in &self.filter { - let maybe_category = RuleCategory::from(name_or_category.as_str()); + for (severity, filter) in self.filter.iter().map(Into::into) { match severity { AllowWarnDeny::Deny | AllowWarnDeny::Warn => { - match maybe_category { - Some(category) => rules.extend( - all_rules - .iter() - .filter(|rule| rule.category() == category) - .map(|rule| RuleWithSeverity::new(rule.clone(), *severity)), - ), - None => { + match filter { + LintFilterKind::Category(category) => { + rules.extend( + all_rules + .iter() + .filter(|rule| rule.category() == *category) + .map(|rule| RuleWithSeverity::new(rule.clone(), severity)), + ); + } + LintFilterKind::Rule(_, name) => { + rules.extend( + all_rules + .iter() + .filter(|rule| rule.name() == name) + .map(|rule| RuleWithSeverity::new(rule.clone(), severity)), + ); + } + LintFilterKind::Generic(name_or_category) => { if name_or_category == "all" { rules.extend( all_rules .iter() .filter(|rule| rule.category() != RuleCategory::Nursery) - .map(|rule| RuleWithSeverity::new(rule.clone(), *severity)), + .map(|rule| RuleWithSeverity::new(rule.clone(), severity)), ); } else { rules.extend( all_rules .iter() .filter(|rule| rule.name() == name_or_category) - .map(|rule| RuleWithSeverity::new(rule.clone(), *severity)), + .map(|rule| RuleWithSeverity::new(rule.clone(), severity)), ); } } - }; + } } - AllowWarnDeny::Allow => { - match maybe_category { - Some(category) => rules.retain(|rule| rule.category() != category), - None => { - if name_or_category == "all" { - rules.clear(); - } else { - rules.retain(|rule| rule.name() != name_or_category); - } + AllowWarnDeny::Allow => match filter { + LintFilterKind::Category(category) => { + rules.retain(|rule| rule.category() != *category); + } + LintFilterKind::Rule(_, name) => { + rules.retain(|rule| rule.name() != name); + } + LintFilterKind::Generic(name_or_category) => { + if name_or_category == "all" { + rules.clear(); + } else { + rules.retain(|rule| rule.name() != name_or_category); } - }; - } + } + }, } } diff --git a/crates/oxc_linter/src/options/plugins.rs b/crates/oxc_linter/src/options/plugins.rs index 3bba971e23058a..b33e5318d9e135 100644 --- a/crates/oxc_linter/src/options/plugins.rs +++ b/crates/oxc_linter/src/options/plugins.rs @@ -1,18 +1,33 @@ use bitflags::bitflags; bitflags! { #[derive(Debug, Clone, Copy, PartialEq, Hash)] - pub(crate) struct LintPlugins: u32 { + pub struct LintPlugins: u32 { + /// ESLint is not a plugin, but is included for completeness. This is an alias for + /// [`LintPlugins::empty`]. + const ESLINT = 0; + /// `eslint-plugin-react` and `eslint-plugin-react-hooks` const REACT = 1 << 0; + /// `eslint-plugin-unicorn` const UNICORN = 1 << 1; + /// `@typescript-eslint/eslint-plugin` const TYPESCRIPT = 1 << 2; + /// Custom Oxc rules, plus some rules ported from Deepscan. const OXC = 1 << 3; + /// `eslint-plugin-import` const IMPORT = 1 << 4; + /// `eslint-plugin-jsdoc` const JSDOC = 1 << 5; + /// `eslint-plugin-jest` const JEST = 1 << 6; + /// `eslint-plugin-vitest` const VITEST = 1 << 7; + /// `eslint-plugin-jsx-a11y` const JSX_A11Y = 1 << 8; + /// `eslint-plugin-nextjs` const NEXTJS = 1 << 9; + /// `eslint-plugin-react-perf` const REACT_PERF = 1 << 10; + /// `eslint-plugin-promise` const PROMISE = 1 << 11; } } @@ -23,6 +38,26 @@ impl Default for LintPlugins { } } +impl LintPlugins { + /// Returns `true` if the Vitest plugin is enabled. + #[inline] + pub fn has_vitest(self) -> bool { + self.contains(LintPlugins::VITEST) + } + + /// Returns `true` if Jest or Vitest plugins are enabled. + #[inline] + pub fn has_test(self) -> bool { + self.intersects(LintPlugins::JEST.union(LintPlugins::VITEST)) + } + + /// Returns `true` if the import plugin is enabled. + #[inline] + pub fn has_import(self) -> bool { + self.contains(LintPlugins::IMPORT) + } +} + impl From for LintPlugins { fn from(options: LintPluginOptions) -> Self { let mut plugins = LintPlugins::empty(); @@ -41,24 +76,28 @@ impl From for LintPlugins { plugins } } - -impl LintPlugins { - /// Returns `true` if the Vitest plugin is enabled. - #[inline] - pub fn has_vitest(self) -> bool { - self.contains(LintPlugins::VITEST) - } - - /// Returns `true` if Jest or Vitest plugins are enabled. - #[inline] - pub fn has_test(self) -> bool { - self.intersects(LintPlugins::JEST.union(LintPlugins::VITEST)) - } - - /// Returns `true` if the import plugin is enabled. - #[inline] - pub fn has_import(self) -> bool { - self.contains(LintPlugins::IMPORT) +impl From<&str> for LintPlugins { + fn from(value: &str) -> Self { + match value { + "react" | "react-hooks" | "react_hooks" => LintPlugins::REACT, + "unicorn" => LintPlugins::UNICORN, + "typescript" | "typescript-eslint" | "typescript_eslint" | "@typescript-eslint" => { + LintPlugins::TYPESCRIPT + } + // deepscan for backwards compatibility. Those rules have been moved into oxc + "oxc" | "deepscan" => LintPlugins::OXC, + "import" => LintPlugins::IMPORT, + "jsdoc" => LintPlugins::JSDOC, + "jest" => LintPlugins::JEST, + "vitest" => LintPlugins::VITEST, + "jsx-a11y" | "jsx_a11y" => LintPlugins::JSX_A11Y, + "nextjs" => LintPlugins::NEXTJS, + "react-perf" | "react_perf" => LintPlugins::REACT_PERF, + "promise" => LintPlugins::PROMISE, + // "eslint" is not really a plugin, so it's 'empty'. This has the added benefit of + // making it the default value. + _ => LintPlugins::empty(), + } } } @@ -147,24 +186,21 @@ impl> FromIterator<(S, bool)> for LintPluginOptions { fn from_iter>(iter: I) -> Self { let mut options = Self::default(); for (s, enabled) in iter { - match s.as_ref() { - "react" | "react-hooks" => options.react = enabled, - "unicorn" => options.unicorn = enabled, - "typescript" | "typescript-eslint" | "@typescript-eslint" => { - options.typescript = enabled; - } - // deepscan for backwards compatibility. Those rules have been - // moved into oxc - "oxc" | "deepscan" => options.oxc = enabled, - "import" => options.import = enabled, - "jsdoc" => options.jsdoc = enabled, - "jest" => options.jest = enabled, - "vitest" => options.vitest = enabled, - "jsx-a11y" => options.jsx_a11y = enabled, - "nextjs" => options.nextjs = enabled, - "react-perf" => options.react_perf = enabled, - "promise" => options.promise = enabled, - _ => { /* ignored */ } + let flags = LintPlugins::from(s.as_ref()); + match flags { + LintPlugins::REACT => options.react = enabled, + LintPlugins::UNICORN => options.unicorn = enabled, + LintPlugins::TYPESCRIPT => options.typescript = enabled, + LintPlugins::OXC => options.oxc = enabled, + LintPlugins::IMPORT => options.import = enabled, + LintPlugins::JSDOC => options.jsdoc = enabled, + LintPlugins::JEST => options.jest = enabled, + LintPlugins::VITEST => options.vitest = enabled, + LintPlugins::JSX_A11Y => options.jsx_a11y = enabled, + LintPlugins::NEXTJS => options.nextjs = enabled, + LintPlugins::REACT_PERF => options.react_perf = enabled, + LintPlugins::PROMISE => options.promise = enabled, + _ => {} // ignored } } options @@ -181,6 +217,14 @@ impl<'s> FromIterator<&'s str> for LintPluginOptions { mod test { use super::*; + #[test] + fn test_eslint_as_default() { + let parsed = LintPlugins::from("eslint"); + let empty = LintPlugins::from(""); + assert_eq!(parsed, empty); + assert_eq!(parsed, LintPlugins::empty()); + } + #[test] fn test_default_conversion() { let plugins = LintPlugins::default(); diff --git a/crates/oxc_linter/src/rule.rs b/crates/oxc_linter/src/rule.rs index f30f6ab72e6479..5de801fea539c9 100644 --- a/crates/oxc_linter/src/rule.rs +++ b/crates/oxc_linter/src/rule.rs @@ -73,19 +73,6 @@ pub enum RuleCategory { } impl RuleCategory { - pub fn from(input: &str) -> Option { - match input { - "correctness" => Some(Self::Correctness), - "suspicious" => Some(Self::Suspicious), - "pedantic" => Some(Self::Pedantic), - "perf" => Some(Self::Perf), - "style" => Some(Self::Style), - "restriction" => Some(Self::Restriction), - "nursery" => Some(Self::Nursery), - _ => None, - } - } - pub fn description(self) -> &'static str { match self { Self::Correctness => "Code that is outright wrong or useless.", @@ -100,6 +87,21 @@ impl RuleCategory { } } } +impl TryFrom<&str> for RuleCategory { + type Error = (); + fn try_from(input: &str) -> Result { + match input { + "correctness" => Ok(Self::Correctness), + "suspicious" => Ok(Self::Suspicious), + "pedantic" => Ok(Self::Pedantic), + "perf" => Ok(Self::Perf), + "style" => Ok(Self::Style), + "restriction" => Ok(Self::Restriction), + "nursery" => Ok(Self::Nursery), + _ => Err(()), + } + } +} impl fmt::Display for RuleCategory { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { diff --git a/tasks/benchmark/benches/linter.rs b/tasks/benchmark/benches/linter.rs index 5cccf206ad9e51..e8182d17ae6b73 100644 --- a/tasks/benchmark/benches/linter.rs +++ b/tasks/benchmark/benches/linter.rs @@ -6,7 +6,7 @@ use std::{ use oxc_allocator::Allocator; use oxc_benchmark::{criterion_group, criterion_main, BenchmarkId, Criterion}; -use oxc_linter::{AllowWarnDeny, FixKind, Linter, OxlintOptions}; +use oxc_linter::{AllowWarnDeny, FixKind, LintFilter, Linter, OxlintOptions}; use oxc_parser::Parser; use oxc_semantic::SemanticBuilder; use oxc_span::SourceType; @@ -38,8 +38,8 @@ fn bench_linter(criterion: &mut Criterion) { .build_module_record(PathBuf::new(), program) .build(program); let filter = vec![ - (AllowWarnDeny::Deny, "all".into()), - (AllowWarnDeny::Deny, "nursery".into()), + LintFilter::new(AllowWarnDeny::Deny, "all").unwrap(), + LintFilter::new(AllowWarnDeny::Deny, "nursery").unwrap(), ]; let lint_options = OxlintOptions::default() .with_filter(filter)