1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354
|
// Copyright 2020 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package mod
import (
"bytes"
"context"
"fmt"
"sort"
"strings"
"golang.org/x/mod/modfile"
"golang.org/x/mod/semver"
"golang.org/x/tools/gopls/internal/govulncheck"
"golang.org/x/tools/gopls/internal/lsp/protocol"
"golang.org/x/tools/gopls/internal/lsp/source"
"golang.org/x/tools/internal/event"
)
func Hover(ctx context.Context, snapshot source.Snapshot, fh source.FileHandle, position protocol.Position) (*protocol.Hover, error) {
var found bool
for _, uri := range snapshot.ModFiles() {
if fh.URI() == uri {
found = true
break
}
}
// We only provide hover information for the view's go.mod files.
if !found {
return nil, nil
}
ctx, done := event.Start(ctx, "mod.Hover")
defer done()
// Get the position of the cursor.
pm, err := snapshot.ParseMod(ctx, fh)
if err != nil {
return nil, fmt.Errorf("getting modfile handle: %w", err)
}
offset, err := pm.Mapper.Offset(position)
if err != nil {
return nil, fmt.Errorf("computing cursor position: %w", err)
}
// If the cursor position is on a module statement
if hover, ok := hoverOnModuleStatement(ctx, pm, offset, snapshot, fh); ok {
return hover, nil
}
return hoverOnRequireStatement(ctx, pm, offset, snapshot, fh)
}
func hoverOnRequireStatement(ctx context.Context, pm *source.ParsedModule, offset int, snapshot source.Snapshot, fh source.FileHandle) (*protocol.Hover, error) {
// Confirm that the cursor is at the position of a require statement.
var req *modfile.Require
var startPos, endPos int
for _, r := range pm.File.Require {
dep := []byte(r.Mod.Path)
s, e := r.Syntax.Start.Byte, r.Syntax.End.Byte
i := bytes.Index(pm.Mapper.Content[s:e], dep)
if i == -1 {
continue
}
// Shift the start position to the location of the
// dependency within the require statement.
startPos, endPos = s+i, e
if startPos <= offset && offset <= endPos {
req = r
break
}
}
// TODO(hyangah): find position for info about vulnerabilities in Go
// The cursor position is not on a require statement.
if req == nil {
return nil, nil
}
// Get the vulnerability info.
fromGovulncheck := true
vs := snapshot.View().Vulnerabilities(fh.URI())[fh.URI()]
if vs == nil && snapshot.View().Options().Vulncheck == source.ModeVulncheckImports {
var err error
vs, err = snapshot.ModVuln(ctx, fh.URI())
if err != nil {
return nil, err
}
fromGovulncheck = false
}
affecting, nonaffecting := lookupVulns(vs, req.Mod.Path, req.Mod.Version)
// Get the `go mod why` results for the given file.
why, err := snapshot.ModWhy(ctx, fh)
if err != nil {
return nil, err
}
explanation, ok := why[req.Mod.Path]
if !ok {
return nil, nil
}
// Get the range to highlight for the hover.
// TODO(hyangah): adjust the hover range to include the version number
// to match the diagnostics' range.
rng, err := pm.Mapper.OffsetRange(startPos, endPos)
if err != nil {
return nil, err
}
options := snapshot.View().Options()
isPrivate := snapshot.View().IsGoPrivatePath(req.Mod.Path)
header := formatHeader(req.Mod.Path, options)
explanation = formatExplanation(explanation, req, options, isPrivate)
vulns := formatVulnerabilities(req.Mod.Path, affecting, nonaffecting, options, fromGovulncheck)
return &protocol.Hover{
Contents: protocol.MarkupContent{
Kind: options.PreferredContentFormat,
Value: header + vulns + explanation,
},
Range: rng,
}, nil
}
func hoverOnModuleStatement(ctx context.Context, pm *source.ParsedModule, offset int, snapshot source.Snapshot, fh source.FileHandle) (*protocol.Hover, bool) {
if offset < pm.File.Module.Syntax.Start.Byte || offset > pm.File.Module.Syntax.End.Byte {
return nil, false
}
rng, err := pm.Mapper.OffsetRange(pm.File.Module.Syntax.Start.Byte, pm.File.Module.Syntax.End.Byte)
if err != nil {
return nil, false
}
fromGovulncheck := true
vs := snapshot.View().Vulnerabilities(fh.URI())[fh.URI()]
if vs == nil && snapshot.View().Options().Vulncheck == source.ModeVulncheckImports {
vs, err = snapshot.ModVuln(ctx, fh.URI())
if err != nil {
return nil, false
}
fromGovulncheck = false
}
modpath := "stdlib"
goVersion := snapshot.View().GoVersionString()
affecting, nonaffecting := lookupVulns(vs, modpath, goVersion)
options := snapshot.View().Options()
vulns := formatVulnerabilities(modpath, affecting, nonaffecting, options, fromGovulncheck)
return &protocol.Hover{
Contents: protocol.MarkupContent{
Kind: options.PreferredContentFormat,
Value: vulns,
},
Range: rng,
}, true
}
func formatHeader(modpath string, options *source.Options) string {
var b strings.Builder
// Write the heading as an H3.
b.WriteString("#### " + modpath)
if options.PreferredContentFormat == protocol.Markdown {
b.WriteString("\n\n")
} else {
b.WriteRune('\n')
}
return b.String()
}
func lookupVulns(vulns *govulncheck.Result, modpath, version string) (affecting, nonaffecting []*govulncheck.Vuln) {
if vulns == nil {
return nil, nil
}
for _, vuln := range vulns.Vulns {
for _, mod := range vuln.Modules {
if mod.Path != modpath {
continue
}
// It is possible that the source code was changed since the last
// govulncheck run and information in the `vulns` info is stale.
// For example, imagine that a user is in the middle of updating
// problematic modules detected by the govulncheck run by applying
// quick fixes. Stale diagnostics can be confusing and prevent the
// user from quickly locating the next module to fix.
// Ideally we should rerun the analysis with the updated module
// dependencies or any other code changes, but we are not yet
// in the position of automatically triggerring the analysis
// (govulncheck can take a while). We also don't know exactly what
// part of source code was changed since `vulns` was computed.
// As a heuristic, we assume that a user upgrades the affecting
// module to the version with the fix or the latest one, and if the
// version in the require statement is equal to or higher than the
// fixed version, skip the vulnerability information in the hover.
// Eventually, the user has to rerun govulncheck.
if mod.FixedVersion != "" && semver.IsValid(version) && semver.Compare(mod.FixedVersion, version) <= 0 {
continue
}
if vuln.IsCalled() {
affecting = append(affecting, vuln)
} else {
nonaffecting = append(nonaffecting, vuln)
}
}
}
sort.Slice(nonaffecting, func(i, j int) bool { return nonaffecting[i].OSV.ID < nonaffecting[j].OSV.ID })
sort.Slice(affecting, func(i, j int) bool { return affecting[i].OSV.ID < affecting[j].OSV.ID })
return affecting, nonaffecting
}
func formatVulnerabilities(modPath string, affecting, nonaffecting []*govulncheck.Vuln, options *source.Options, fromGovulncheck bool) string {
if len(affecting) == 0 && len(nonaffecting) == 0 {
return ""
}
// TODO(hyangah): can we use go templates to generate hover messages?
// Then, we can use a different template for markdown case.
useMarkdown := options.PreferredContentFormat == protocol.Markdown
var b strings.Builder
if len(affecting) > 0 {
// TODO(hyangah): make the message more eyecatching (icon/codicon/color)
if len(affecting) == 1 {
b.WriteString(fmt.Sprintf("\n**WARNING:** Found %d reachable vulnerability.\n", len(affecting)))
} else {
b.WriteString(fmt.Sprintf("\n**WARNING:** Found %d reachable vulnerabilities.\n", len(affecting)))
}
}
for _, v := range affecting {
fix := fixedVersionInfo(v, modPath)
pkgs := vulnerablePkgsInfo(v, modPath, useMarkdown)
if useMarkdown {
fmt.Fprintf(&b, "- [**%v**](%v) %v%v%v\n", v.OSV.ID, href(v.OSV), formatMessage(v), pkgs, fix)
} else {
fmt.Fprintf(&b, " - [%v] %v (%v) %v%v\n", v.OSV.ID, formatMessage(v), href(v.OSV), pkgs, fix)
}
}
if len(nonaffecting) > 0 {
if fromGovulncheck {
fmt.Fprintf(&b, "\n**Note:** The project imports packages with known vulnerabilities, but does not call the vulnerable code.\n")
} else {
fmt.Fprintf(&b, "\n**Note:** The project imports packages with known vulnerabilities. Use `govulncheck` to check if the project uses vulnerable symbols.\n")
}
}
for _, v := range nonaffecting {
fix := fixedVersionInfo(v, modPath)
pkgs := vulnerablePkgsInfo(v, modPath, useMarkdown)
if useMarkdown {
fmt.Fprintf(&b, "- [%v](%v) %v%v%v\n", v.OSV.ID, href(v.OSV), formatMessage(v), pkgs, fix)
} else {
fmt.Fprintf(&b, " - [%v] %v (%v) %v%v\n", v.OSV.ID, formatMessage(v), href(v.OSV), pkgs, fix)
}
}
b.WriteString("\n")
return b.String()
}
func vulnerablePkgsInfo(v *govulncheck.Vuln, modPath string, useMarkdown bool) string {
var b bytes.Buffer
for _, m := range v.Modules {
if m.Path != modPath {
continue
}
if c := len(m.Packages); c == 1 {
b.WriteString("\n Vulnerable package is:")
} else if c > 1 {
b.WriteString("\n Vulnerable packages are:")
}
for _, pkg := range m.Packages {
if useMarkdown {
b.WriteString("\n * `")
} else {
b.WriteString("\n ")
}
b.WriteString(pkg.Path)
if useMarkdown {
b.WriteString("`")
}
}
}
if b.Len() == 0 {
return ""
}
return b.String()
}
func fixedVersionInfo(v *govulncheck.Vuln, modPath string) string {
fix := "\n\n **No fix is available.**"
for _, m := range v.Modules {
if m.Path != modPath {
continue
}
if m.FixedVersion != "" {
fix = "\n\n Fixed in " + m.FixedVersion + "."
}
break
}
return fix
}
func formatExplanation(text string, req *modfile.Require, options *source.Options, isPrivate bool) string {
text = strings.TrimSuffix(text, "\n")
splt := strings.Split(text, "\n")
length := len(splt)
var b strings.Builder
// If the explanation is 2 lines, then it is of the form:
// # golang.org/x/text/encoding
// (main module does not need package golang.org/x/text/encoding)
if length == 2 {
b.WriteString(splt[1])
return b.String()
}
imp := splt[length-1] // import path
reference := imp
// See golang/go#36998: don't link to modules matching GOPRIVATE.
if !isPrivate && options.PreferredContentFormat == protocol.Markdown {
target := imp
if strings.ToLower(options.LinkTarget) == "pkg.go.dev" {
target = strings.Replace(target, req.Mod.Path, req.Mod.String(), 1)
}
reference = fmt.Sprintf("[%s](%s)", imp, source.BuildLink(options.LinkTarget, target, ""))
}
b.WriteString("This module is necessary because " + reference + " is imported in")
// If the explanation is 3 lines, then it is of the form:
// # golang.org/x/tools
// modtest
// golang.org/x/tools/go/packages
if length == 3 {
msg := fmt.Sprintf(" `%s`.", splt[1])
b.WriteString(msg)
return b.String()
}
// If the explanation is more than 3 lines, then it is of the form:
// # golang.org/x/text/language
// rsc.io/quote
// rsc.io/sampler
// golang.org/x/text/language
b.WriteString(":\n```text")
dash := ""
for _, imp := range splt[1 : length-1] {
dash += "-"
b.WriteString("\n" + dash + " " + imp)
}
b.WriteString("\n```")
return b.String()
}
|