alint_rules/
filename_case.rs1use alint_core::{Context, Error, FixSpec, Fixer, Level, Result, Rule, RuleSpec, Scope, Violation};
10use serde::Deserialize;
11
12use crate::case::CaseConvention;
13use crate::fixers::FileRenameFixer;
14
15#[derive(Debug, Deserialize)]
16struct Options {
17 case: CaseConvention,
18}
19
20#[derive(Debug)]
21pub struct FilenameCaseRule {
22 id: String,
23 level: Level,
24 policy_url: Option<String>,
25 message: Option<String>,
26 scope: Scope,
27 case: CaseConvention,
28 fixer: Option<FileRenameFixer>,
29}
30
31impl Rule for FilenameCaseRule {
32 fn id(&self) -> &str {
33 &self.id
34 }
35 fn level(&self) -> Level {
36 self.level
37 }
38 fn policy_url(&self) -> Option<&str> {
39 self.policy_url.as_deref()
40 }
41
42 fn fixer(&self) -> Option<&dyn Fixer> {
43 self.fixer.as_ref().map(|f| f as &dyn Fixer)
44 }
45
46 fn evaluate(&self, ctx: &Context<'_>) -> Result<Vec<Violation>> {
47 let mut violations = Vec::new();
48 for entry in ctx.index.files() {
49 if !self.scope.matches(&entry.path, ctx.index) {
50 continue;
51 }
52 let Some(stem) = entry.path.file_stem().and_then(|s| s.to_str()) else {
53 continue;
54 };
55 if !self.case.check(stem) {
56 let msg = self.message.clone().unwrap_or_else(|| {
57 format!(
58 "filename stem {:?} is not {}",
59 stem,
60 self.case.display_name()
61 )
62 });
63 violations.push(Violation::new(msg).with_path(entry.path.clone()));
64 }
65 }
66 Ok(violations)
67 }
68}
69
70pub fn build(spec: &RuleSpec) -> Result<Box<dyn Rule>> {
71 let Some(_paths) = &spec.paths else {
72 return Err(Error::rule_config(
73 &spec.id,
74 "filename_case requires a `paths` field",
75 ));
76 };
77 let opts: Options = spec
78 .deserialize_options()
79 .map_err(|e| Error::rule_config(&spec.id, format!("invalid options: {e}")))?;
80 let fixer = match &spec.fix {
81 Some(FixSpec::FileRename { .. }) => Some(FileRenameFixer::new(opts.case)),
82 Some(other) => {
83 return Err(Error::rule_config(
84 &spec.id,
85 format!(
86 "fix.{} is not compatible with filename_case",
87 other.op_name()
88 ),
89 ));
90 }
91 None => None,
92 };
93 Ok(Box::new(FilenameCaseRule {
94 id: spec.id.clone(),
95 level: spec.level,
96 policy_url: spec.policy_url.clone(),
97 message: spec.message.clone(),
98 scope: Scope::from_spec(spec)?,
99 case: opts.case,
100 fixer,
101 }))
102}
103
104#[cfg(test)]
105mod tests {
106 use super::*;
107 use crate::test_support::{ctx, index, spec_yaml};
108 use std::path::Path;
109
110 #[test]
111 fn build_rejects_missing_paths_field() {
112 let spec = spec_yaml(
113 "id: t\n\
114 kind: filename_case\n\
115 case: snake_case\n\
116 level: error\n",
117 );
118 let err = build(&spec).unwrap_err().to_string();
119 assert!(err.contains("paths"), "unexpected: {err}");
120 }
121
122 #[test]
123 fn build_rejects_missing_case_option() {
124 let spec = spec_yaml(
125 "id: t\n\
126 kind: filename_case\n\
127 paths: \"src/**/*.rs\"\n\
128 level: error\n",
129 );
130 assert!(build(&spec).is_err(), "missing `case:` should error");
131 }
132
133 #[test]
134 fn build_rejects_incompatible_fix_op() {
135 let spec = spec_yaml(
136 "id: t\n\
137 kind: filename_case\n\
138 paths: \"src/**/*.rs\"\n\
139 case: snake_case\n\
140 level: error\n\
141 fix:\n \
142 file_remove: {}\n",
143 );
144 let err = build(&spec).unwrap_err().to_string();
145 assert!(err.contains("file_remove"), "unexpected: {err}");
146 }
147
148 #[test]
149 fn evaluate_passes_on_canonical_snake_case() {
150 let spec = spec_yaml(
151 "id: t\n\
152 kind: filename_case\n\
153 paths: \"src/**/*.rs\"\n\
154 case: snake_case\n\
155 level: error\n",
156 );
157 let rule = build(&spec).unwrap();
158 let idx = index(&["src/main.rs", "src/lib.rs", "src/sub/mod.rs"]);
159 let v = rule.evaluate(&ctx(Path::new("/fake"), &idx)).unwrap();
160 assert!(v.is_empty(), "unexpected: {v:?}");
161 }
162
163 #[test]
164 fn evaluate_fires_on_pascal_case_when_snake_required() {
165 let spec = spec_yaml(
166 "id: t\n\
167 kind: filename_case\n\
168 paths: \"src/**/*.rs\"\n\
169 case: snake_case\n\
170 level: error\n",
171 );
172 let rule = build(&spec).unwrap();
173 let idx = index(&["src/MainModule.rs"]);
174 let v = rule.evaluate(&ctx(Path::new("/fake"), &idx)).unwrap();
175 assert_eq!(v.len(), 1);
176 }
177
178 #[test]
179 fn evaluate_skips_files_outside_scope() {
180 let spec = spec_yaml(
181 "id: t\n\
182 kind: filename_case\n\
183 paths: \"src/**/*.rs\"\n\
184 case: snake_case\n\
185 level: error\n",
186 );
187 let rule = build(&spec).unwrap();
188 let idx = index(&["docs/MainDoc.md"]);
190 let v = rule.evaluate(&ctx(Path::new("/fake"), &idx)).unwrap();
191 assert!(v.is_empty(), "out-of-scope shouldn't fire: {v:?}");
192 }
193
194 #[test]
195 fn pascal_case_matches_canonical_components() {
196 let spec = spec_yaml(
197 "id: t\n\
198 kind: filename_case\n\
199 paths: \"components/**/*.tsx\"\n\
200 case: PascalCase\n\
201 level: error\n",
202 );
203 let rule = build(&spec).unwrap();
204 let idx = index(&[
205 "components/Button.tsx",
206 "components/UserCard.tsx",
207 "components/bad_name.tsx",
208 ]);
209 let v = rule.evaluate(&ctx(Path::new("/fake"), &idx)).unwrap();
210 assert_eq!(v.len(), 1, "only `bad_name` should fire");
211 }
212
213 #[test]
214 fn scope_filter_narrows() {
215 let spec = spec_yaml(
219 "id: t\n\
220 kind: filename_case\n\
221 paths: \"**/*.rs\"\n\
222 case: snake_case\n\
223 scope_filter:\n \
224 has_ancestor: marker.lock\n\
225 level: error\n",
226 );
227 let rule = build(&spec).unwrap();
228 let idx = index(&["pkg/marker.lock", "pkg/BadName.rs", "other/AlsoBad.rs"]);
229 let v = rule.evaluate(&ctx(Path::new("/fake"), &idx)).unwrap();
230 assert_eq!(v.len(), 1, "only in-scope file should fire: {v:?}");
231 assert_eq!(v[0].path.as_deref(), Some(Path::new("pkg/BadName.rs")));
232 }
233}