rust/clippy_lints/src/eta_reduction.rs

227 lines
8.2 KiB
Rust
Raw Normal View History

use if_chain::if_chain;
use matches::matches;
2019-12-03 17:16:03 -06:00
use rustc::declare_lint_pass;
use rustc::hir::*;
use rustc::lint::{in_external_macro, LateContext, LateLintPass, LintArray, LintContext, LintPass};
2019-03-18 06:43:10 -05:00
use rustc::ty::{self, Ty};
use rustc_errors::Applicability;
2019-12-03 17:16:03 -06:00
use rustc_session::declare_tool_lint;
2015-07-26 09:53:11 -05:00
use crate::utils::{
implements_trait, is_adjusted, iter_input_pats, snippet_opt, span_lint_and_then, type_is_unsafe_function,
};
2019-01-30 19:15:29 -06:00
2018-03-28 08:24:26 -05:00
declare_clippy_lint! {
/// **What it does:** Checks for closures which just call another function where
/// the function can be called directly. `unsafe` functions or calls where types
/// get adjusted are ignored.
///
/// **Why is this bad?** Needlessly creating a closure adds code for no benefit
/// and gives the optimizer more work.
///
/// **Known problems:** If creating the closure inside the closure has a side-
/// effect then moving the closure creation out will change when that side-
/// effect runs.
2019-01-30 19:15:29 -06:00
/// See rust-lang/rust-clippy#1439 for more details.
///
/// **Example:**
2019-03-10 17:01:56 -05:00
/// ```rust,ignore
/// xs.map(|x| foo(x))
/// ```
/// where `foo(_)` is a plain function that takes the exact argument type of
/// `x`.
pub REDUNDANT_CLOSURE,
2018-03-28 08:24:26 -05:00
style,
2019-01-30 19:15:29 -06:00
"redundant closures, i.e., `|a| foo(a)` (which can be written as just `foo`)"
}
2015-05-10 00:09:04 -05:00
declare_clippy_lint! {
/// **What it does:** Checks for closures which only invoke a method on the closure
/// argument and can be replaced by referencing the method directly.
///
/// **Why is this bad?** It's unnecessary to create the closure.
///
2019-05-16 11:43:07 -05:00
/// **Known problems:** rust-lang/rust-clippy#3071, rust-lang/rust-clippy#4002,
/// rust-lang/rust-clippy#3942
///
///
/// **Example:**
/// ```rust,ignore
/// Some('a').map(|s| s.to_uppercase());
/// ```
/// may be rewritten as
/// ```rust,ignore
/// Some('a').map(char::to_uppercase);
/// ```
pub REDUNDANT_CLOSURE_FOR_METHOD_CALLS,
pedantic,
"redundant closures for method calls"
}
declare_lint_pass!(EtaReduction => [REDUNDANT_CLOSURE, REDUNDANT_CLOSURE_FOR_METHOD_CALLS]);
2015-05-10 00:09:04 -05:00
2019-04-08 15:43:55 -05:00
impl<'a, 'tcx> LateLintPass<'a, 'tcx> for EtaReduction {
2019-12-27 01:12:26 -06:00
fn check_expr(&mut self, cx: &LateContext<'a, 'tcx>, expr: &'tcx Expr<'_>) {
if in_external_macro(cx.sess(), expr.span) {
return;
}
2019-09-27 10:16:06 -05:00
match expr.kind {
2019-12-27 01:12:26 -06:00
ExprKind::Call(_, args) | ExprKind::MethodCall(_, _, args) => {
2018-11-27 14:14:15 -06:00
for arg in args {
check_closure(cx, arg)
}
2016-12-20 11:21:30 -06:00
},
_ => (),
}
}
}
2019-12-27 01:12:26 -06:00
fn check_closure(cx: &LateContext<'_, '_>, expr: &Expr<'_>) {
2019-09-27 10:16:06 -05:00
if let ExprKind::Closure(_, ref decl, eid, _, _) = expr.kind {
let body = cx.tcx.hir().body(eid);
let ex = &body.value;
if_chain!(
2019-09-27 10:16:06 -05:00
if let ExprKind::Call(ref caller, ref args) = ex.kind;
2019-09-27 10:16:06 -05:00
if let ExprKind::Path(_) = caller.kind;
// Not the same number of arguments, there is no way the closure is the same as the function return;
if args.len() == decl.inputs.len();
// Are the expression or the arguments type-adjusted? Then we need the closure
if !(is_adjusted(cx, ex) || args.iter().any(|arg| is_adjusted(cx, arg)));
2017-01-13 10:04:56 -06:00
let fn_ty = cx.tables.expr_ty(caller);
if matches!(fn_ty.kind, ty::FnDef(_, _) | ty::FnPtr(_) | ty::Closure(_, _));
if !type_is_unsafe_function(cx, fn_ty);
2019-12-27 01:12:26 -06:00
if compare_inputs(&mut iter_input_pats(decl, body), &mut args.iter());
then {
span_lint_and_then(cx, REDUNDANT_CLOSURE, expr.span, "redundant closure found", |db| {
if let Some(snippet) = snippet_opt(cx, caller.span) {
db.span_suggestion(
expr.span,
"remove closure as shown",
snippet,
Applicability::MachineApplicable,
);
}
});
}
);
if_chain!(
2019-09-27 10:16:06 -05:00
if let ExprKind::MethodCall(ref path, _, ref args) = ex.kind;
// Not the same number of arguments, there is no way the closure is the same as the function return;
if args.len() == decl.inputs.len();
// Are the expression or the arguments type-adjusted? Then we need the closure
if !(is_adjusted(cx, ex) || args.iter().skip(1).any(|arg| is_adjusted(cx, arg)));
let method_def_id = cx.tables.type_dependent_def_id(ex.hir_id).unwrap();
if !type_is_unsafe_function(cx, cx.tcx.type_of(method_def_id));
2019-12-27 01:12:26 -06:00
if compare_inputs(&mut iter_input_pats(decl, body), &mut args.iter());
if let Some(name) = get_ufcs_type_name(cx, method_def_id, &args[0]);
then {
span_lint_and_then(cx, REDUNDANT_CLOSURE_FOR_METHOD_CALLS, expr.span, "redundant closure found", |db| {
db.span_suggestion(
2018-09-18 10:07:54 -05:00
expr.span,
"remove closure as shown",
format!("{}::{}", name, path.ident.name),
Applicability::MachineApplicable,
2018-09-18 10:07:54 -05:00
);
});
}
);
}
}
/// Tries to determine the type for universal function call to be used instead of the closure
2019-12-27 01:12:26 -06:00
fn get_ufcs_type_name(cx: &LateContext<'_, '_>, method_def_id: def_id::DefId, self_arg: &Expr<'_>) -> Option<String> {
let expected_type_of_self = &cx.tcx.fn_sig(method_def_id).inputs_and_output().skip_binder()[0];
let actual_type_of_self = &cx.tables.node_type(self_arg.hir_id);
if let Some(trait_id) = cx.tcx.trait_of_item(method_def_id) {
if match_borrow_depth(expected_type_of_self, &actual_type_of_self)
&& implements_trait(cx, actual_type_of_self, trait_id, &[])
{
2019-03-15 17:43:42 -05:00
return Some(cx.tcx.def_path_str(trait_id));
}
}
cx.tcx.impl_of_method(method_def_id).and_then(|_| {
//a type may implicitly implement other type's methods (e.g. Deref)
if match_types(expected_type_of_self, &actual_type_of_self) {
return Some(get_type_name(cx, &actual_type_of_self));
}
None
})
}
2019-03-18 06:43:10 -05:00
fn match_borrow_depth(lhs: Ty<'_>, rhs: Ty<'_>) -> bool {
match (&lhs.kind, &rhs.kind) {
(ty::Ref(_, t1, mut1), ty::Ref(_, t2, mut2)) => mut1 == mut2 && match_borrow_depth(&t1, &t2),
(l, r) => match (l, r) {
(ty::Ref(_, _, _), _) | (_, ty::Ref(_, _, _)) => false,
(_, _) => true,
},
}
}
2019-03-18 06:43:10 -05:00
fn match_types(lhs: Ty<'_>, rhs: Ty<'_>) -> bool {
match (&lhs.kind, &rhs.kind) {
(ty::Bool, ty::Bool)
| (ty::Char, ty::Char)
| (ty::Int(_), ty::Int(_))
| (ty::Uint(_), ty::Uint(_))
| (ty::Str, ty::Str) => true,
(ty::Ref(_, t1, mut1), ty::Ref(_, t2, mut2)) => mut1 == mut2 && match_types(t1, t2),
(ty::Array(t1, _), ty::Array(t2, _)) | (ty::Slice(t1), ty::Slice(t2)) => match_types(t1, t2),
(ty::Adt(def1, _), ty::Adt(def2, _)) => def1 == def2,
(_, _) => false,
}
}
2019-03-18 06:43:10 -05:00
fn get_type_name(cx: &LateContext<'_, '_>, ty: Ty<'_>) -> String {
match ty.kind {
2019-03-15 17:43:42 -05:00
ty::Adt(t, _) => cx.tcx.def_path_str(t.did),
ty::Ref(_, r, _) => get_type_name(cx, &r),
_ => ty.to_string(),
}
}
2019-08-28 04:27:06 -05:00
fn compare_inputs(
2019-12-27 01:12:26 -06:00
closure_inputs: &mut dyn Iterator<Item = &Param<'_>>,
call_args: &mut dyn Iterator<Item = &Expr<'_>>,
2019-08-28 04:27:06 -05:00
) -> bool {
for (closure_input, function_arg) in closure_inputs.zip(call_args) {
2019-09-27 10:16:06 -05:00
if let PatKind::Binding(_, _, ident, _) = closure_input.pat.kind {
// XXXManishearth Should I be checking the binding mode here?
2019-09-27 10:16:06 -05:00
if let ExprKind::Path(QPath::Resolved(None, ref p)) = function_arg.kind {
if p.segments.len() != 1 {
// If it's a proper path, it can't be a local variable
return false;
2017-08-09 02:30:56 -05:00
}
if p.segments[0].ident.name != ident.name {
// The two idents should be the same
return false;
}
} else {
return false;
}
} else {
return false;
2015-05-10 00:09:04 -05:00
}
}
true
2015-05-10 00:09:04 -05:00
}