pub mod cfg;
mod diags;
mod gather;
use crate::diag::{CfgCoord, Check, Diagnostic, Label, Pack, Severity};
pub use gather::{Gatherer, LicenseInfo, LicenseStore, Summary};
use gather::{KrateLicense, LicenseExprInfo, LicenseExprSource};
pub use diags::Code;
use bitvec::prelude::*;
struct Hits {
allowed: BitVec<usize, LocalBits>,
exceptions: BitVec<usize, LocalBits>,
}
fn evaluate_expression(
ctx: &crate::CheckCtx<'_, cfg::ValidConfig>,
krate_lic_nfo: &KrateLicense<'_>,
expr: &spdx::Expression,
nfo: &LicenseExprInfo,
hits: &mut Hits,
) -> Diagnostic {
#[derive(Debug)]
enum Reason {
ExplicitAllowance,
ExplicitException,
NotExplicitlyAllowed,
}
let mut reasons = smallvec::SmallVec::<[(Reason, bool); 8]>::new();
macro_rules! deny {
($reason:ident) => {
reasons.push((Reason::$reason, false));
return false;
};
}
macro_rules! allow {
($reason:ident) => {
reasons.push((Reason::$reason, true));
return true;
};
}
let cfg = &ctx.cfg;
let exception_ind = cfg
.exceptions
.iter()
.position(|exc| crate::match_krate(krate_lic_nfo.krate, &exc.spec));
let eval_res = expr.evaluate_with_failures(|req| {
if let Some(ind) = exception_ind {
let exception = &cfg.exceptions[ind];
for allow in &exception.allowed {
if allow.0.value.satisfies(req) {
hits.exceptions.as_mut_bitslice().set(ind, true);
allow!(ExplicitException);
}
}
}
for (i, allow) in cfg.allowed.iter().enumerate() {
if allow.0.value.satisfies(req) {
hits.allowed.as_mut_bitslice().set(i, true);
allow!(ExplicitAllowance);
}
}
deny!(NotExplicitlyAllowed);
});
let (message, severity) = match eval_res {
Err(_) => ("failed to satisfy license requirements", Severity::Error),
Ok(_) => ("license requirements satisfied", Severity::Help),
};
let mut labels = Vec::with_capacity(reasons.len() + 1);
labels.extend(krate_lic_nfo.labels.clone());
labels.push(
Label::secondary(nfo.file_id, nfo.offset..nfo.offset + expr.as_ref().len()).with_message(
format!(
"license expression retrieved via {}",
match &nfo.source {
LicenseExprSource::Metadata => "Cargo.toml `license`".to_owned(),
LicenseExprSource::UserOverride => "user override".to_owned(),
LicenseExprSource::LicenseFiles(lfs) => lfs.join(", "),
LicenseExprSource::OverlayOverride => unreachable!(),
}
),
),
);
let mut notes = krate_lic_nfo.notes.clone();
for ((reason, accepted), failed_req) in reasons.into_iter().zip(expr.requirements()) {
if accepted && ctx.log_level < log::LevelFilter::Info {
continue;
}
if !accepted && severity == Severity::Error {
if let Some(id) = failed_req.req.license.id() {
notes.push(format!("{} - {}:", id.name, id.full_name));
let len = notes.len();
if id.is_deprecated() {
notes.push(" - **DEPRECATED**".into());
}
if id.is_osi_approved() {
notes.push(" - OSI approved".into());
}
if id.is_fsf_free_libre() {
notes.push(" - FSF Free/Libre".into());
}
if id.is_copyleft() {
notes.push(" - Copyleft".into());
}
if len == notes.len() {
notes.push(" - No additional metadata available for license".into());
}
} else {
notes.push(format!("{} is not an SPDX license", failed_req.req));
}
}
labels.push(
Label::primary(
nfo.file_id,
nfo.offset + failed_req.span.start as usize
..nfo.offset + failed_req.span.end as usize,
)
.with_message(format_args!(
"{}: {}",
if accepted { "accepted" } else { "rejected" },
match reason {
Reason::ExplicitAllowance => "license is explicitly allowed",
Reason::ExplicitException => "license is explicitly allowed via an exception",
Reason::NotExplicitlyAllowed => "license is not explicitly allowed",
}
)),
);
}
Diagnostic::new(severity)
.with_message(message)
.with_code(if severity != Severity::Error {
diags::Code::Accepted
} else {
diags::Code::Rejected
})
.with_labels(labels)
.with_notes(notes)
}
pub fn check(
ctx: crate::CheckCtx<'_, cfg::ValidConfig>,
summary: Summary<'_>,
mut sink: crate::diag::ErrorSink,
) {
let mut hits = Hits {
allowed: BitVec::repeat(false, ctx.cfg.allowed.len()),
exceptions: BitVec::repeat(false, ctx.cfg.exceptions.len()),
};
let private_registries: Vec<_> = ctx
.cfg
.private
.registries
.iter()
.map(|s| s.as_str())
.collect();
for krate_lic_nfo in summary.nfos {
let mut pack = Pack::with_kid(Check::Licenses, krate_lic_nfo.krate.id.clone());
if ctx.cfg.private.ignore
&& (krate_lic_nfo.krate.is_private(&private_registries)
|| ctx
.cfg
.ignore_sources
.iter()
.any(|url| krate_lic_nfo.krate.matches_url(url, true)))
{
pack.push(diags::SkippedPrivateWorkspaceCrate {
krate: krate_lic_nfo.krate,
});
sink.push(pack);
continue;
}
match &krate_lic_nfo.lic_info {
LicenseInfo::SpdxExpression { expr, nfo } => {
pack.push(evaluate_expression(
&ctx,
&krate_lic_nfo,
expr,
nfo,
&mut hits,
));
}
LicenseInfo::Unlicensed => {
pack.push(diags::Unlicensed {
krate: krate_lic_nfo.krate,
severity: Severity::Error,
breadcrumbs: krate_lic_nfo.labels.into_iter().collect(),
});
}
}
if !pack.is_empty() {
sink.push(pack);
}
}
{
let mut pack = Pack::new(Check::Licenses);
for exc in hits
.exceptions
.into_iter()
.zip(ctx.cfg.exceptions.into_iter())
.filter_map(|(hit, exc)| if !hit { Some(exc) } else { None })
{
if exc.file_id != ctx.cfg.file_id {
continue;
}
pack.push(diags::UnmatchedLicenseException {
license_exc_cfg: CfgCoord {
file: exc.file_id,
span: exc.spec.name.span,
},
});
}
if !pack.is_empty() {
sink.push(pack);
}
}
{
let mut pack = Pack::new(Check::Licenses);
for allowed in hits
.allowed
.into_iter()
.zip(ctx.cfg.allowed.into_iter())
.filter_map(|(hit, allowed)| if !hit { Some(allowed) } else { None })
{
pack.push(diags::UnmatchedLicenseAllowance {
severity: ctx.cfg.unused_allowed_license.into(),
allowed_license_cfg: CfgCoord {
file: ctx.cfg.file_id,
span: allowed.0.span,
},
});
}
if !pack.is_empty() {
sink.push(pack);
}
}
}