1 // Copyright 2019 The Go Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style
3 // license that can be found in the LICENSE file.
14 "golang.org/x/tools/internal/jsonrpc2"
15 "golang.org/x/tools/internal/lsp/protocol"
16 "golang.org/x/tools/internal/lsp/source"
17 "golang.org/x/tools/internal/span"
18 errors "golang.org/x/xerrors"
21 // ModificationSource identifies the originating cause of a file modification.
22 type ModificationSource int
25 // FromDidOpen is a file modification caused by opening a file.
26 FromDidOpen = ModificationSource(iota)
28 // FromDidChange is a file modification caused by changing a file.
31 // FromDidChangeWatchedFiles is a file modification caused by a change to a
33 FromDidChangeWatchedFiles
35 // FromDidSave is a file modification caused by a file save.
38 // FromDidClose is a file modification caused by closing a file.
41 // FromRegenerateCgo refers to file modifications caused by regenerating
42 // the cgo sources for the workspace.
45 // FromInitialWorkspaceLoad refers to the loading of all packages in the
46 // workspace when the view is first created.
47 FromInitialWorkspaceLoad
50 func (m ModificationSource) String() string {
55 return "changed files"
56 case FromDidChangeWatchedFiles:
57 return "files changed on disk"
62 case FromRegenerateCgo:
63 return "regenerate cgo"
64 case FromInitialWorkspaceLoad:
65 return "initial workspace load"
67 return "unknown file modification"
71 func (s *Server) didOpen(ctx context.Context, params *protocol.DidOpenTextDocumentParams) error {
72 uri := params.TextDocument.URI.SpanURI()
76 // There may not be any matching view in the current session. If that's
77 // the case, try creating a new view based on the opened file path.
79 // TODO(rstambler): This seems like it would continuously add new
80 // views, but it won't because ViewOf only returns an error when there
81 // are no views in the session. I don't know if that logic should go
82 // here, or if we can continue to rely on that implementation detail.
83 if _, err := s.session.ViewOf(uri); err != nil {
84 dir := filepath.Dir(uri.Filename())
85 if err := s.addFolders(ctx, []protocol.WorkspaceFolder{{
86 URI: string(protocol.URIFromPath(dir)),
87 Name: filepath.Base(dir),
92 return s.didModifyFiles(ctx, []source.FileModification{{
95 Version: params.TextDocument.Version,
96 Text: []byte(params.TextDocument.Text),
97 LanguageID: params.TextDocument.LanguageID,
101 func (s *Server) didChange(ctx context.Context, params *protocol.DidChangeTextDocumentParams) error {
102 uri := params.TextDocument.URI.SpanURI()
107 text, err := s.changedText(ctx, uri, params.ContentChanges)
111 c := source.FileModification{
113 Action: source.Change,
114 Version: params.TextDocument.Version,
117 if err := s.didModifyFiles(ctx, []source.FileModification{c}, FromDidChange); err != nil {
120 return s.warnAboutModifyingGeneratedFiles(ctx, uri)
123 // warnAboutModifyingGeneratedFiles shows a warning if a user tries to edit a
124 // generated file for the first time.
125 func (s *Server) warnAboutModifyingGeneratedFiles(ctx context.Context, uri span.URI) error {
126 s.changedFilesMu.Lock()
127 _, ok := s.changedFiles[uri]
129 s.changedFiles[uri] = struct{}{}
131 s.changedFilesMu.Unlock()
133 // This file has already been edited before.
138 // Ideally, we should be able to specify that a generated file should
139 // be opened as read-only. Tell the user that they should not be
140 // editing a generated file.
141 view, err := s.session.ViewOf(uri)
145 snapshot, release := view.Snapshot(ctx)
146 isGenerated := source.IsGenerated(ctx, snapshot, uri)
152 return s.client.ShowMessage(ctx, &protocol.ShowMessageParams{
153 Message: fmt.Sprintf("Do not edit this file! %s is a generated file.", uri.Filename()),
154 Type: protocol.Warning,
158 func (s *Server) didChangeWatchedFiles(ctx context.Context, params *protocol.DidChangeWatchedFilesParams) error {
159 var modifications []source.FileModification
160 for _, change := range params.Changes {
161 uri := change.URI.SpanURI()
165 action := changeTypeToFileAction(change.Type)
166 modifications = append(modifications, source.FileModification{
172 return s.didModifyFiles(ctx, modifications, FromDidChangeWatchedFiles)
175 func (s *Server) didSave(ctx context.Context, params *protocol.DidSaveTextDocumentParams) error {
176 uri := params.TextDocument.URI.SpanURI()
180 c := source.FileModification{
183 Version: params.TextDocument.Version,
185 if params.Text != nil {
186 c.Text = []byte(*params.Text)
188 return s.didModifyFiles(ctx, []source.FileModification{c}, FromDidSave)
191 func (s *Server) didClose(ctx context.Context, params *protocol.DidCloseTextDocumentParams) error {
192 uri := params.TextDocument.URI.SpanURI()
196 return s.didModifyFiles(ctx, []source.FileModification{
199 Action: source.Close,
206 func (s *Server) didModifyFiles(ctx context.Context, modifications []source.FileModification, cause ModificationSource) error {
207 // diagnosticWG tracks outstanding diagnostic work as a result of this file
209 var diagnosticWG sync.WaitGroup
210 if s.session.Options().VerboseWorkDoneProgress {
211 work := s.progress.start(ctx, DiagnosticWorkTitle(cause), "Calculating file diagnostics...", nil, nil)
220 // If the set of changes included directories, expand those directories
222 modifications = s.session.ExpandModificationsToDirectories(ctx, modifications)
224 snapshots, releases, err := s.session.DidModifyFiles(ctx, modifications)
229 for snapshot, uris := range snapshots {
231 go func(snapshot source.Snapshot, uris []span.URI) {
232 defer diagnosticWG.Done()
233 s.diagnoseSnapshot(snapshot, uris, cause == FromDidChangeWatchedFiles)
239 for _, release := range releases {
244 // After any file modifications, we need to update our watched files,
245 // in case something changed. Compute the new set of directories to watch,
246 // and if it differs from the current set, send updated registrations.
247 return s.updateWatchedDirectories(ctx)
250 // DiagnosticWorkTitle returns the title of the diagnostic work resulting from a
251 // file change originating from the given cause.
252 func DiagnosticWorkTitle(cause ModificationSource) string {
253 return fmt.Sprintf("diagnosing %v", cause)
256 func (s *Server) changedText(ctx context.Context, uri span.URI, changes []protocol.TextDocumentContentChangeEvent) ([]byte, error) {
257 if len(changes) == 0 {
258 return nil, errors.Errorf("%w: no content changes provided", jsonrpc2.ErrInternal)
261 // Check if the client sent the full content of the file.
262 // We accept a full content change even if the server expected incremental changes.
263 if len(changes) == 1 && changes[0].Range == nil && changes[0].RangeLength == 0 {
264 return []byte(changes[0].Text), nil
266 return s.applyIncrementalChanges(ctx, uri, changes)
269 func (s *Server) applyIncrementalChanges(ctx context.Context, uri span.URI, changes []protocol.TextDocumentContentChangeEvent) ([]byte, error) {
270 fh, err := s.session.GetFile(ctx, uri)
274 content, err := fh.Read()
276 return nil, errors.Errorf("%w: file not found (%v)", jsonrpc2.ErrInternal, err)
278 for _, change := range changes {
279 // Make sure to update column mapper along with the content.
280 converter := span.NewContentConverter(uri.Filename(), content)
281 m := &protocol.ColumnMapper{
283 Converter: converter,
286 if change.Range == nil {
287 return nil, errors.Errorf("%w: unexpected nil range for change", jsonrpc2.ErrInternal)
289 spn, err := m.RangeSpan(*change.Range)
293 if !spn.HasOffset() {
294 return nil, errors.Errorf("%w: invalid range for content change", jsonrpc2.ErrInternal)
296 start, end := spn.Start().Offset(), spn.End().Offset()
298 return nil, errors.Errorf("%w: invalid range for content change", jsonrpc2.ErrInternal)
301 buf.Write(content[:start])
302 buf.WriteString(change.Text)
303 buf.Write(content[end:])
304 content = buf.Bytes()
309 func changeTypeToFileAction(ct protocol.FileChangeType) source.FileAction {
311 case protocol.Changed:
313 case protocol.Created:
315 case protocol.Deleted:
318 return source.UnknownFileAction