Skip to content

feat: add noloopclosure #3027

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 6 commits into from
Closed

feat: add noloopclosure #3027

wants to merge 6 commits into from

Conversation

fatanugraha
Copy link
Contributor

noloopclosure is a linter that disallow reference capture of loop variable inside of a closure.

https://github.com/fatanugraha/noloopclosure

@boring-cyborg
Copy link

boring-cyborg bot commented Jul 30, 2022

Hey, thank you for opening your first Pull Request !

@CLAassistant
Copy link

CLAassistant commented Jul 30, 2022

CLA assistant check
All committers have signed the CLA.

@ldez ldez added the linter: new Support new linter label Jul 30, 2022
@ldez
Copy link
Member

ldez commented Jul 30, 2022

In order for a pull request adding a linter to be reviewed, the linter and the PR must follow some requirements.

Pull Request Description

  • It must have a link to the linter repository.
  • It must provide a short description about the linter.

Linter

  • It must not be a duplicate of another linter or a rule of a linter. (the team will help to verify that)
  • It must have a valid license and the file must contain the required information by the license, ex: author, year, etc.
  • The linter repository must have a CI and tests.
  • It must use go/analysis.
  • It must have a valid tag, ex: v1.0.0, v0.1.0.
  • It must not contain init().
  • It must not contain panic(), log.fatal(), os.exit(), or similar.
  • It must not have false positives/negatives. (the team will help to verify that)
  • It must have tests inside golangci-lint.

The Linter Tests Inside Golangci-lint

  • They must have at least one std lib import.
  • They must work with T=<name of the linter test file>.go make test_linters. (the team will help to verify that)

.golangci.reference.yml

  • The linter must be added to the list of available linters (alphabetical case-insensitive order).
    • enable and disable options
  • If the linter has a configuration, the exhaustive configuration of the linter must be added (alphabetical case-insensitive order)
    • The values must be different from the default ones.
    • The default values must be defined in a comment.
    • The option must have a short description.

Others Requirements

  • The files (tests and linter) inside golangci-lint must have the same name as the linter.
  • The .golangci.yml of golangci-lint itself must not be edited and the linter must not be added to this file.
  • The linters must be sorted in the alphabetical order (case-insensitive) in the Manager.GetAllSupportedLinterConfigs(...) and .golangci.example.yml.
  • The load mode (WithLoadMode(...)):
    • if the linter doesn't use types: goanalysis.LoadModeSyntax
    • goanalysis.LoadModeTypesInfo required WithLoadForGoAnalysis() in the Manager.GetAllSupportedLinterConfigs(...)
  • The version in WithSince(...) must be the next minor version (v1.X.0) of golangci-lint.

Recommendations

  • The linter should not use SSA. (currently, SSA does not support generics)
  • The linter repository should have a readme and linting.
  • The linter should be published as a binary. (useful to diagnose bug origins)

The golangci-lint team will edit this comment to check the boxes before and during the review.

This checklist does not imply that we will accept the linter.

@ldez
Copy link
Member

ldez commented Jul 30, 2022

Hello,

I feel like a duplicate of exportloopref or looppointer

@ldez ldez added the feedback required Requires additional feedback label Jul 30, 2022
@fatanugraha
Copy link
Contributor Author

fatanugraha commented Jul 30, 2022

Hi @ldez I checked both linters already and it seems that those linters only check whether the loop variable is captured using & operator or not.

This new linter checks whether the loop variable is captured using closure or not (not necessarily a pointer) -- to avoid accidental reference because of closures.

It will check whether a loop has function literal on it and check whether the function literal's body referenced the loop variable or not (similar to go vet's loopclosure).

For example, this linter will complain that i is a loop variable in L3

for i := 0; i < 5; i++ {
  go (func() { fmt.Println(i) })() // L3
}

I tried both linters that you mentioned for code snippet above and it passes.

@ldez
Copy link
Member

ldez commented Jul 30, 2022

We refused looppointer because of the number of false-positives, you will have to prove that don't have the same problem as looppointer

@fatanugraha
Copy link
Contributor Author

@ldez this linter is way simpler than looppointer.

What it does is basically:

  1. check all loops
  2. check whether the loop has *ast.FuncLit on it
  3. check the object (types.Object) of all *ast.Ident on the body of that *ast.FuncLit and see whether it's the same as the enclosing loop variable object.

The implementation is basically the striped-down version of go vet's loopclosure.

@ldez ldez removed the feedback required Requires additional feedback label Jul 30, 2022
@fatanugraha
Copy link
Contributor Author

We refused looppointer because of the number of false-positives, you will have to prove that don't have the same problem as looppointer

Hi @ldez what kind of proof do you require for this one?

@hawkingrei
Copy link

hawkingrei commented Oct 19, 2022

@ldez We are from TiDB. We have used noloopclosure in our repo. It is a really good linter. we don't find any false positives from noloopclosure.

I hope it can be merged into master.

@fatanugraha
Copy link
Contributor Author

fatanugraha commented Nov 4, 2022

After reading this similar issue more thoroughly, I think this linter will have the same issue that looppointer have.

These two linters will reject a valid Go code that might or might not cause a bug. The idea of these two linter is to disallow a certain practices that might introduce the bug in the first place (so it will be impossible to introduce the bug). So I wouldn't call them a false-positive (from the linter's perspective) since that's the whole point of these two linters.

Personally I think this linter will complement looppointer nicely to make sure that user's code is safe when they're migrating to Go 2 (if the Go team decided to go with this proposal) so I think these two linters can still provide some value to golangci-lint users (even though they're very opinionated).

@hawkingrei Having said all of that, I don't think this linter will be merged to master anytime soon since it cause issues to users that enables all the linter via enable-all flag. The best that we can do is to run them without golangci-lint.

@ldez Feel free to close this issue if you think we shouldn't merge this to master. Thanks!

@ldez
Copy link
Member

ldez commented Jan 21, 2023

@ldez Feel free to close this issue if you think we shouldn't merge this to master. Thanks!

Closed for now

@ldez ldez closed this Jan 21, 2023
@ldez ldez added the declined label Jan 21, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
declined linter: new Support new linter
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants