Crates.io | cargo-semver-checks |
lib.rs | cargo-semver-checks |
version | |
source | src |
created_at | 2022-07-13 04:25:34.753671 |
updated_at | 2024-12-11 16:24:25.045249 |
description | Scan your Rust crate for semver violations. |
homepage | |
repository | https://github.com/obi1kenobi/cargo-semver-checks |
max_upload_size | |
id | 624858 |
Cargo.toml error: | TOML parse error at line 27, column 1 | 27 | autolib = false | ^^^^^^^ unknown field `autolib`, expected one of `name`, `version`, `edition`, `authors`, `description`, `readme`, `license`, `repository`, `homepage`, `documentation`, `build`, `resolver`, `links`, `default-run`, `default_dash_run`, `rust-version`, `rust_dash_version`, `rust_version`, `license-file`, `license_dash_file`, `license_file`, `licenseFile`, `license_capital_file`, `forced-target`, `forced_dash_target`, `autobins`, `autotests`, `autoexamples`, `autobenches`, `publish`, `metadata`, `keywords`, `categories`, `exclude`, `include` |
size | 0 |
Lint your crate API changes for semver violations.
# If you already use `cargo-binstall` for faster tool installations:
$ cargo binstall cargo-semver-checks
# Otherwise:
$ cargo install cargo-semver-checks --locked
# Lint a new release for SemVer breakage before `cargo publish`:
$ cargo semver-checks
Or use as a GitHub Action (used in .github/workflows/ci.yml
in this repo):
- name: Check semver
uses: obi1kenobi/cargo-semver-checks-action@v2
Each failing check references specific items in the Cargo SemVer reference or other reference pages, as appropriate. It also includes the item name and file location that are the cause of the problem, as well as a link to the implementation of that query in the current version of the tool.
cargo-semver-checks
support?cargo-semver-checks
with nightly
Rust?cargo-semver-checks
enable in the tested crates?--cfg
conditional compilation. Can cargo-semver-checks
scan it?cargo-semver-checks
have false positives?cargo-semver-checks
catch every semver violation?cargo-semver-checks
similar to and different from other tools?cargo-semver-check
and cargo-semver-checks
?cargo-semver-checks
support?cargo-semver-checks
uses the rustdoc tool to analyze the crate's API.
Rustdoc's JSON output format isn't stable, and can have breaking changes in new Rust versions.
When each cargo-semver-checks
version is released, it will at minimum include support
for the then-current stable and beta Rust versions. It may, but is not guaranteed to,
additionally support some nightly Rust versions.
The GitHub Action by default uses
the most recent versions of both cargo-semver-checks
and stable Rust,
so it should be unaffected. Users using cargo-semver-checks
in other ways
are encouraged to update cargo-semver-checks
when updating Rust versions
to ensure continued compatibility.
cargo-semver-checks
with nightly
Rust?Support for nightly
Rust versions is on a best-effort basis.
It will work often, but not always. If you must use nightly
,
it's strongly recommended to pin to a specific nightly
version to avoid broken workflows.
cargo-semver-checks
relies on the rustdoc JSON format, which is unstable and changes often.
After a new rustdoc JSON format version gets shipped in nightly
, it usually takes
several days to several weeks for it to be supported in a new cargo-semver-checks
,
during which time it is not possible to use cargo-semver-checks
with those nightly
versions.
It's also possible that support for some nightly
versions may be dropped even while older
stable versions are still supported. This usually happens when a rustdoc format gets superseded by
a newer version before becoming part of any stable Rust. In that case, we may drop support for
that format to conserve maintenance bandwidth and speed up compile times.
For example, cargo-semver-checks
v0.24
supported rustdoc formats v24, v26, and v27, but did not support the nightly-only v25 format.
If you'd like extended support for older Rust versions,
or an SLA on supporting new nightly
releases, we're happy to offer those on a commercial basis.
It could be in the form of a formal support contract,
or something as simple as discussing expectations over email
and setting up a recurring GitHub sponsorship for an agreed-upon amount.
Please reach out at the email in the Cargo.toml and let us know about what projects this is for and what their needs are.
No, it does not have to be published anywhere. You'll just need to use a flag to help
cargo-semver-checks
locate the version to use as a baseline for semver-checking.
By default, cargo-semver-checks
uses crates.io to look up the previous version of the crate,
which is used as the baseline for semver-checking the current version of the crate.
The following flags can be used to explicitly specify a baseline instead:
--baseline-version <X.Y.Z>
Version from registry to lookup for a baseline
--baseline-rev <REV>
Git revision to lookup for a baseline
--baseline-root <MANIFEST_ROOT>
Directory containing baseline crate source
--baseline-rustdoc <JSON_PATH>
The rustdoc json file to use as a semver baseline
Custom registries are not currently supported (#160), so crates published on registries other than crates.io should use one of the other approaches of generating the baseline.
cargo-semver-checks
enable in the tested crates?By default, checking is done on all features except features named unstable
, nightly
, bench
, no_std
, or ones with prefix _
, unstable-
, or unstable_
, as such names are commonly used for private or unstable features.
This behaviour can be overriden. Checked feature set can be changed to:
--all-features
,--default-features
,--only-explicit-features
.Additionally, features can be enabled one-by-one, using flags --features
, --baseline-features
and --current-features
.
For example, consider crate serde, with the following features (per v1.0.163):
std
- the crate's only default feature,alloc
, derive
, rc
- optional features,unstable
- a feature that possibly breaks semver.used flags | selected feature set | explanation |
---|---|---|
none | std , alloc , derive , rc |
Feature unstable is excluded by the default heuristic. |
--features unstable |
std , alloc , derive , rc , unstable |
The flag explicitly adds unstable to the heuristic's selections. |
--all-features |
std , alloc , derive , rc , unstable |
All the features are used, disabling the default heuristic. |
--default-features |
std |
The crate has only one default feature. |
--default-features --features derive |
std , derive |
Feature derive is used along with crate's default features. |
--only-explicit-features |
none | No explicit features are passed. |
--only-explicit-features --features unstable |
unstable |
All features can be added explicitly, regardless of their name. |
--cfg
conditional compilation. Can cargo-semver-checks
scan it?Yes! You can configure the --cfg
options that cargo-semver-checks
will use
when scanning your crate by setting them in the RUSTDOCFLAGS
environment variable.
For example, you can ask cargo-semver-checks
to enable the some-option
config
by invoking it as:
RUSTDOCFLAGS="--cfg some-option" cargo semver-checks
cargo-semver-checks
have false positives?"False positive" means that cargo-semver-checks
reported a semver violation incorrectly.
A design goal of cargo-semver-checks
is to not have false positives.
If they do occur, they are considered bugs.
When cargo-semver-checks
reports a semver violation, it should always point to a specific
file and approximate line number where the specified issue occurs; failure to specify
a file and line number is also considered a bug.
If you think cargo-semver-checks
might have a false-positive but you aren't sure, please
open an issue.
Semver in Rust has many non-obvious and tricky edge cases,
especially in the presence of macros.
We'd be happy to look into it together with you to determine if it's a false positive or not.
cargo-semver-checks
catch every semver violation?No, it will not — not yet!
There are many ways to break semver, and cargo-semver-checks
doesn't yet have lints for all of them.
New lints are added frequently, and
we'd be happy to mentor you
if you'd like to contribute new lints!
Append --verbose
when semver-checking your crate to see the full list of performed semver checks.
Here are some example areas where cargo-semver-checks
currently will not catch semver violations:
Yes! See lint-level configuration.
Depending on the feature, possibly yes!
Please reach out to us ahead of time over email to discuss the scope of the feature and sponsorship.
It's possible that the feature might be deemed out of scope, too complex to build or maintain, or otherwise unsuitable. In such cases we'd like to let you know that before you've sent us money, since there are no refunds on GitHub Sponsors.
If the feature is viable and the work involved in building is commensurate to the sponsorship amount, we'd be happy to build it. At your option, we'd also be happy to give you a shout-out for sponsoring the feature when it is announced in the release notes.
cargo-semver-checks
similar to and different from other tools?rust semverver builds on top of rustc internals to build rlib's and compare their metadata. This strips the code down to the basics for identifying changes. However, is tightly coupled to specific nightly compiler versions and takes work to stay in sync. As of April 17, 2023, it appears to be deprecated and no longer maintained.
cargo breaking effectively runs
cargo expand
and re-parses the code using
syn
which requires re-implementing large
swaths of rust's semantics to then lint the API for changes.
This is limited to the feature and target the crate was compiled for.
As of November 22, 2022, it appears to be
archived and no longer maintained.
cargo-semver-checks
sources its data from rustdoc's json output. While the
json output format is unstable, the rate of change is fairly low, reducing the
churn in keeping up. The lints are also written as queries for trustfall
"query everything" engine, reducing
the work for creating and maintaining them. Because of the extra data that
rustdoc includes, some level of feature/target awareness might be able to be
introduced.
There is interest in
hosting rustdoc JSON on docs.rs
meaning
that semver-checking could one day download the baseline rustdoc JSON file instead of generating it.
Also, generally speaking, inspecting JSON data is likely going to be faster than full compilation.
cargo-public-api
uses rustdoc,
like cargo-semver-checks
, but focuses more on API diffing (showing which
items has changed) and not API linting (explaining why they have changed and
providing control over what counts).
cargo-semver-check
and cargo-semver-checks
?This crate was intended to be published under the name cargo-semver-check
, and may indeed one
day be published under that name. Due to
an unfortunate mishap,
it remains cargo-semver-checks
for the time being.
The cargo_semver_check
name is reserved on crates.io but all its versions
are intentionally yanked. Please use the cargo-semver-checks
crate instead.
MSRV bumps are not considered major changes.
cargo-semver-checks
has two Rust version bounds, since it depends on Rust
both at compile-time and at runtime:
cargo-semver-checks
("compile MSRV") is currently Rust 1.70.
This is primarily determined by our dependencies' MSRVs.As much as practically possible, changes to the runtime MSRV will come in bumps
of the middle number in the version, e.g. 0.24.1 -> 0.25.0
or 1.2.3 -> 1.3.0
.
Changes to the compile MSRV may happen in any kind of version bump. As much as practically possible, we'll aim to make them simultaneously with runtime MSRV bumps.
cargo-semver-checks
offers the ability to customize which lints are enforced, what SemVer versions they require, and whether violations of that lint produce deny / warn / allow
behavior.
As a reminder, a "lint" or "check" is a rule in cargo-semver-checks
that looks for a specific kind of issue. For example, the function_missing
lint looks for functions that no longer exist in a crate's public API. cargo-semver-checks
has many dozens of such lints.
Lints may be configured in two ways:
cargo-semver-checks
responds. The deny
level makes the lint a hard error: cargo-semver-checks
will exit with an error and will require a version bump to resolve. The warn
level will print a warning describing the issue, but will not cause cargo-semver-checks
to exit with an error code — meaning it will not block CI runs. The allow
level means the findings of the lint should be silently ignored, so the check doesn't even need to be run.deny
-level) or suggest (for warn
) when it spots an issue. For example, the function_missing
lint is major
by default, so if a public function is removed between versions, the version needs a major version bump (e.g., 1.2.3 to 2.0.0 or 0.5.2 to 0.6.0). This can be configured to major
or minor
(1.2.3 to 1.3.0 or 0.5.2 to 0.5.3). There is no "patch" setting since that is equivalent to setting an allow
lint level.To configure the level and/or required update for a lint, first find its name. This will be in snake_case
and is reported in the CLI on errors/warnings, and can also be found as the file name in the lints folder.
#[must_use]
lints warn-only#[must_use]
lints entirelycargo-semver-checks
by default considers adding #[must_use]
on an existing function to require a minor
version bump, and has level deny
. Let's say our package considers that too strict, and would prefer adding #[must_use]
to produce a warning instead of an error.
We can accomplish that by adding the following to the Cargo.toml
manifest for the package:
[package.metadata.cargo-semver-checks.lints]
function_must_use_added = "warn"
That option is shorthand notation for:
[package.metadata.cargo-semver-checks.lints]
function_must_use_added = { level = "warn" }
If we wanted to configure other lints simultaneously, we could add their configuration there as well: one lint per line.
Say we instead wanted to mandate a major version bump if #[must_use]
is added.
We'd add the following to our package's Cargo.toml
file:
[package.metadata.cargo-semver-checks.lints]
function_must_use_added = { required-update = "major" }
Of course, it's possible to combine level
and required-update
settings.
For example, the following will make the function_must_use_added
cause warnings (instead of errors) whenever #[must_use]
is added without a major version bump:
[package.metadata.cargo-semver-checks.lints]
function_must_use_added = { level = "warn", required-update = "major" }
cargo-semver-checks
allows defining your lint configuration at the workspace level, and reusing it in each of your crates.
First, add your configuration to the workspace root Cargo.toml
, noting the workspace.metadata
prefix instead of package.metadata
:
[workspace.metadata.cargo-semver-checks.lints]
function_must_use_added = { level = "warn" }
Then, to opt into the workspace configuration in individual packages, add either one of these keys to that package's Cargo.toml
:
[package.metadata.cargo-semver-checks.lints]
workspace = true
or, if your workspace already configures workspace-level lints (e.g. for clippy) at [workspace.lints]
,
[lints]
workspace = true
Using the lints.workspace
key will cause a cargo error if it is set and there is no [workspace.lints]
table in the workspace Cargo.toml. We support the lints.workspace
key to ease our transition toward merging cargo-semver-checks
into cargo
itself.
Setting workspace = false
is not valid configuration for either of these keys. To have a package opt-out from the workspace's lints configuration, omit both keys entirely from the package's Cargo.toml
.
When workspace = true
is set, it is still possible to override individual lint settings in a package.
Rule of thumb: for each config option of each lint,
For example, if we have in the workspace Cargo.toml
:
[workspace.metadata.cargo-semver-checks.lints]
function_missing = { level = "warn", required-update = "minor" }
trait_now_doc_hidden = "warn"
function_must_use_added = "warn"
and in the package Cargo.toml
:
[package.metadata.cargo-semver-checks.lints]
workspace = true
function_missing = "deny"
trait_now_doc_hidden = { required-update = "minor" }
Here's the final configuration for that package:
function_missing
:
level = "deny", required-update = "major"
.level = "warn", required-update = "minor"
.workspace = true
, then overrides to level = "deny"
.level = "deny", required-update = "minor"
.trait_now_doc_hidden
:
level = "deny", required-update = "major"
.level = warn"
, leaving required-update
unchanged.workspace = true
, then sets required-update = "minor"
.level = "deny", required-update = "minor"
.function_must_use_added
:
level = "deny", required-update = "minor"
.level = "warn"
, leaving required-update
unchanged.workspace = true
.level = "warn", required-update = "minor"
.#[must_use]
lints warn-onlyIn the default configuration, cargo-semver-checks
considers it an error to add #[must_use]
attributes in patch versions.
The rationale is that such an addition risks introducing new lints in downstream projects, and many projects consider lints as errors and may be broken as a result.
(Whether that setting is good practice for widespread use or not is outside the scope of cargo-semver-checks
.)
To downgrade all lints related to #[must_use]
from error to warnings, add the following lines to the cargo-semver-checks
configuration in your package or workspace:
function_must_use_added = "warn"
inherent_method_must_use_added = "warn"
struct_must_use_added = "warn"
enum_must_use_added = "warn"
trait_must_use_added = "warn"
union_must_use_added = "warn"
#[must_use]
lints entirelyTo skip checking #[must_use]
-related lints entirely, apply the following configuration to your package or workspace:
function_must_use_added = "allow"
inherent_method_must_use_added = "allow"
struct_must_use_added = "allow"
enum_must_use_added = "allow"
trait_must_use_added = "allow"
union_must_use_added = "allow"
When checking a package, cargo-semver-checks
uses the manifest of the current subject's Cargo.toml
file (plus its workspace configuration, if opted in).
Configuration set in the baseline version of the package (the version being compared against, such as an existing version published on crates.io) is not read and has no effect. This is because when publishing a new version, it makes sense to use the new version's configuration instead of any prior configuration.
When the --manifest-path
option is used to specify the subject package's Cargo.toml
file, that's also the file from which configuration is loaded. If that CLI flag is not specified, cargo-semver-checks
will by default attempt to find and use a Cargo.toml
file that belongs to the current directory.
If cargo-semver-checks
is executed in a way that skips reading the current manifest (such as with the --current-rustdoc
flag), it is currently not possible to configure lints. Interest in, and progress toward resolving this limitation is tracked in this issue.
This section documents common issues and the best ways to resolve them.
cargo install cargo-semver-checks --locked
produces an errorRecommendation: use cargo-binstall
to download a prebuilt binary if one is available for your platform, rather than compiling from scratch.
Specific errors and their resolutions:
libz-ng-sys vX.Y.Z
"
cmake
on your system, which is required by a transitive dependency of cargo-semver-checks
. cargo
does not currently offer a mechanism for such a binary dependency to be declared as required, nor automatically installed when needed.apt install cmake
or brew install cmake
, depending on your platform.Logo by NUMI:
Available under the Apache License (Version 2.0) or the MIT license, at your option.
Copyright 2022-present Predrag Gruevski and Project Contributors. The present date is determined by the timestamp of the most recent commit in the repository. Project Contributors are all authors and committers of commits in the repository.