Skip to main content

alint_rules/
filename_case.rs

1//! `filename_case` — every file in scope must have a basename whose stem
2//! matches a case convention.
3//!
4//! The check runs on the *stem* (filename with the final extension removed),
5//! matching ls-lint precedent. For files with compound extensions like
6//! `foo.spec.ts`, the stem is `foo.spec`, which will fail most case checks —
7//! use `filename_regex` for finer control in those situations.
8
9use alint_core::{Context, Error, FixSpec, Fixer, Level, Result, Rule, RuleSpec, Scope, Violation};
10use serde::Deserialize;
11
12use crate::case::CaseConvention;
13use crate::fixers::FileRenameFixer;
14
15#[derive(Debug, Deserialize)]
16struct Options {
17    case: CaseConvention,
18}
19
20#[derive(Debug)]
21pub struct FilenameCaseRule {
22    id: String,
23    level: Level,
24    policy_url: Option<String>,
25    message: Option<String>,
26    scope: Scope,
27    case: CaseConvention,
28    fixer: Option<FileRenameFixer>,
29}
30
31impl Rule for FilenameCaseRule {
32    fn id(&self) -> &str {
33        &self.id
34    }
35    fn level(&self) -> Level {
36        self.level
37    }
38    fn policy_url(&self) -> Option<&str> {
39        self.policy_url.as_deref()
40    }
41
42    fn fixer(&self) -> Option<&dyn Fixer> {
43        self.fixer.as_ref().map(|f| f as &dyn Fixer)
44    }
45
46    fn evaluate(&self, ctx: &Context<'_>) -> Result<Vec<Violation>> {
47        let mut violations = Vec::new();
48        for entry in ctx.index.files() {
49            if !self.scope.matches(&entry.path, ctx.index) {
50                continue;
51            }
52            let Some(stem) = entry.path.file_stem().and_then(|s| s.to_str()) else {
53                continue;
54            };
55            if !self.case.check(stem) {
56                let msg = self.message.clone().unwrap_or_else(|| {
57                    format!(
58                        "filename stem {:?} is not {}",
59                        stem,
60                        self.case.display_name()
61                    )
62                });
63                violations.push(Violation::new(msg).with_path(entry.path.clone()));
64            }
65        }
66        Ok(violations)
67    }
68}
69
70pub fn build(spec: &RuleSpec) -> Result<Box<dyn Rule>> {
71    let Some(_paths) = &spec.paths else {
72        return Err(Error::rule_config(
73            &spec.id,
74            "filename_case requires a `paths` field",
75        ));
76    };
77    let opts: Options = spec
78        .deserialize_options()
79        .map_err(|e| Error::rule_config(&spec.id, format!("invalid options: {e}")))?;
80    let fixer = match &spec.fix {
81        Some(FixSpec::FileRename { .. }) => Some(FileRenameFixer::new(opts.case)),
82        Some(other) => {
83            return Err(Error::rule_config(
84                &spec.id,
85                format!(
86                    "fix.{} is not compatible with filename_case",
87                    other.op_name()
88                ),
89            ));
90        }
91        None => None,
92    };
93    Ok(Box::new(FilenameCaseRule {
94        id: spec.id.clone(),
95        level: spec.level,
96        policy_url: spec.policy_url.clone(),
97        message: spec.message.clone(),
98        scope: Scope::from_spec(spec)?,
99        case: opts.case,
100        fixer,
101    }))
102}
103
104#[cfg(test)]
105mod tests {
106    use super::*;
107    use crate::test_support::{ctx, index, spec_yaml};
108    use std::path::Path;
109
110    #[test]
111    fn build_rejects_missing_paths_field() {
112        let spec = spec_yaml(
113            "id: t\n\
114             kind: filename_case\n\
115             case: snake_case\n\
116             level: error\n",
117        );
118        let err = build(&spec).unwrap_err().to_string();
119        assert!(err.contains("paths"), "unexpected: {err}");
120    }
121
122    #[test]
123    fn build_rejects_missing_case_option() {
124        let spec = spec_yaml(
125            "id: t\n\
126             kind: filename_case\n\
127             paths: \"src/**/*.rs\"\n\
128             level: error\n",
129        );
130        assert!(build(&spec).is_err(), "missing `case:` should error");
131    }
132
133    #[test]
134    fn build_rejects_incompatible_fix_op() {
135        let spec = spec_yaml(
136            "id: t\n\
137             kind: filename_case\n\
138             paths: \"src/**/*.rs\"\n\
139             case: snake_case\n\
140             level: error\n\
141             fix:\n  \
142               file_remove: {}\n",
143        );
144        let err = build(&spec).unwrap_err().to_string();
145        assert!(err.contains("file_remove"), "unexpected: {err}");
146    }
147
148    #[test]
149    fn evaluate_passes_on_canonical_snake_case() {
150        let spec = spec_yaml(
151            "id: t\n\
152             kind: filename_case\n\
153             paths: \"src/**/*.rs\"\n\
154             case: snake_case\n\
155             level: error\n",
156        );
157        let rule = build(&spec).unwrap();
158        let idx = index(&["src/main.rs", "src/lib.rs", "src/sub/mod.rs"]);
159        let v = rule.evaluate(&ctx(Path::new("/fake"), &idx)).unwrap();
160        assert!(v.is_empty(), "unexpected: {v:?}");
161    }
162
163    #[test]
164    fn evaluate_fires_on_pascal_case_when_snake_required() {
165        let spec = spec_yaml(
166            "id: t\n\
167             kind: filename_case\n\
168             paths: \"src/**/*.rs\"\n\
169             case: snake_case\n\
170             level: error\n",
171        );
172        let rule = build(&spec).unwrap();
173        let idx = index(&["src/MainModule.rs"]);
174        let v = rule.evaluate(&ctx(Path::new("/fake"), &idx)).unwrap();
175        assert_eq!(v.len(), 1);
176    }
177
178    #[test]
179    fn evaluate_skips_files_outside_scope() {
180        let spec = spec_yaml(
181            "id: t\n\
182             kind: filename_case\n\
183             paths: \"src/**/*.rs\"\n\
184             case: snake_case\n\
185             level: error\n",
186        );
187        let rule = build(&spec).unwrap();
188        // PascalCase, but outside scope.
189        let idx = index(&["docs/MainDoc.md"]);
190        let v = rule.evaluate(&ctx(Path::new("/fake"), &idx)).unwrap();
191        assert!(v.is_empty(), "out-of-scope shouldn't fire: {v:?}");
192    }
193
194    #[test]
195    fn pascal_case_matches_canonical_components() {
196        let spec = spec_yaml(
197            "id: t\n\
198             kind: filename_case\n\
199             paths: \"components/**/*.tsx\"\n\
200             case: PascalCase\n\
201             level: error\n",
202        );
203        let rule = build(&spec).unwrap();
204        let idx = index(&[
205            "components/Button.tsx",
206            "components/UserCard.tsx",
207            "components/bad_name.tsx",
208        ]);
209        let v = rule.evaluate(&ctx(Path::new("/fake"), &idx)).unwrap();
210        assert_eq!(v.len(), 1, "only `bad_name` should fire");
211    }
212
213    #[test]
214    fn scope_filter_narrows() {
215        // Two PascalCase files violating snake_case; only the
216        // one inside a directory with `marker.lock` as ancestor
217        // should fire.
218        let spec = spec_yaml(
219            "id: t\n\
220             kind: filename_case\n\
221             paths: \"**/*.rs\"\n\
222             case: snake_case\n\
223             scope_filter:\n  \
224               has_ancestor: marker.lock\n\
225             level: error\n",
226        );
227        let rule = build(&spec).unwrap();
228        let idx = index(&["pkg/marker.lock", "pkg/BadName.rs", "other/AlsoBad.rs"]);
229        let v = rule.evaluate(&ctx(Path::new("/fake"), &idx)).unwrap();
230        assert_eq!(v.len(), 1, "only in-scope file should fire: {v:?}");
231        assert_eq!(v[0].path.as_deref(), Some(Path::new("pkg/BadName.rs")));
232    }
233}