2014-01-25 01:37:51 -06:00
|
|
|
// Copyright 2012-2014 The Rust Project Developers. See the COPYRIGHT
|
2012-12-03 18:48:01 -06:00
|
|
|
// file at the top-level directory of this distribution and at
|
|
|
|
// http://rust-lang.org/COPYRIGHT.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
|
|
|
|
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
|
|
|
|
// option. This file may not be copied, modified, or distributed
|
|
|
|
// except according to those terms.
|
|
|
|
|
2013-05-17 17:28:44 -05:00
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
use driver::session::Session;
|
2013-08-21 19:26:33 -05:00
|
|
|
use metadata::csearch;
|
2013-08-31 11:13:04 -05:00
|
|
|
use metadata::decoder::{DefLike, DlDef, DlField, DlImpl};
|
2012-09-04 13:54:36 -05:00
|
|
|
use middle::lang_items::LanguageItems;
|
2014-01-09 20:29:45 -06:00
|
|
|
use middle::lint::{UnnecessaryQualification, UnusedImports};
|
2013-03-26 15:38:07 -05:00
|
|
|
use middle::pat_util::pat_bindings;
|
2012-12-23 16:41:37 -06:00
|
|
|
|
2013-04-30 00:15:17 -05:00
|
|
|
use syntax::ast::*;
|
2013-05-21 20:24:42 -05:00
|
|
|
use syntax::ast;
|
2013-09-05 16:15:00 -05:00
|
|
|
use syntax::ast_util::{def_id_of_def, local_def, mtwt_resolve};
|
2012-09-04 13:54:36 -05:00
|
|
|
use syntax::ast_util::{path_to_ident, walk_pat, trait_method_to_ty_method};
|
2014-01-31 14:25:11 -06:00
|
|
|
use syntax::parse::token::{IdentInterner, special_idents};
|
2013-05-14 19:27:27 -05:00
|
|
|
use syntax::parse::token;
|
2013-03-26 15:38:07 -05:00
|
|
|
use syntax::print::pprust::path_to_str;
|
2014-01-01 00:53:22 -06:00
|
|
|
use syntax::codemap::{Span, DUMMY_SP, Pos};
|
2013-02-14 23:50:03 -06:00
|
|
|
use syntax::opt_vec::OptVec;
|
2013-08-13 11:52:41 -05:00
|
|
|
use syntax::visit;
|
|
|
|
use syntax::visit::Visitor;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-12-20 23:14:25 -06:00
|
|
|
use std::cell::{Cell, RefCell};
|
2013-06-28 17:32:26 -05:00
|
|
|
use std::uint;
|
|
|
|
use std::hashmap::{HashMap, HashSet};
|
2014-01-31 14:35:36 -06:00
|
|
|
use std::mem::replace;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Definition mapping
|
2013-12-23 13:15:16 -06:00
|
|
|
pub type DefMap = @RefCell<HashMap<NodeId,Def>>;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
struct binding_info {
|
2013-08-31 11:13:04 -05:00
|
|
|
span: Span,
|
2013-09-01 20:45:37 -05:00
|
|
|
binding_mode: BindingMode,
|
2012-08-06 09:20:23 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Map from the name in a pattern to its binding mode.
|
2013-10-02 07:33:01 -05:00
|
|
|
type BindingMap = HashMap<Name,binding_info>;
|
2012-08-06 09:20:23 -05:00
|
|
|
|
2012-07-11 17:00:40 -05:00
|
|
|
// Trait method resolution
|
2013-12-22 16:03:39 -06:00
|
|
|
pub type TraitMap = HashMap<NodeId,@RefCell<~[DefId]>>;
|
2012-07-11 17:00:40 -05:00
|
|
|
|
2012-08-17 14:41:34 -05:00
|
|
|
// This is the replacement export map. It maps a module to all of the exports
|
|
|
|
// within.
|
2013-12-20 23:14:25 -06:00
|
|
|
pub type ExportMap2 = @RefCell<HashMap<NodeId, ~[Export2]>>;
|
2012-08-17 14:41:34 -05:00
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub struct Export2 {
|
2014-01-31 14:25:11 -06:00
|
|
|
name: ~str, // The name of the target.
|
2013-09-01 20:45:37 -05:00
|
|
|
def_id: DefId, // The definition of the target.
|
2012-08-17 14:41:34 -05:00
|
|
|
}
|
|
|
|
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
// This set contains all exported definitions from external crates. The set does
|
|
|
|
// not contain any entries from local crates.
|
|
|
|
pub type ExternalExports = HashSet<DefId>;
|
|
|
|
|
2014-01-26 02:43:42 -06:00
|
|
|
// FIXME: dox
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
pub type LastPrivateMap = HashMap<NodeId, LastPrivate>;
|
|
|
|
|
|
|
|
pub enum LastPrivate {
|
|
|
|
AllPublic,
|
|
|
|
DependsOn(DefId),
|
|
|
|
}
|
|
|
|
|
|
|
|
impl LastPrivate {
|
|
|
|
fn or(self, other: LastPrivate) -> LastPrivate {
|
|
|
|
match (self, other) {
|
|
|
|
(me, AllPublic) => me,
|
|
|
|
(_, other) => other,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-20 10:40:02 -05:00
|
|
|
#[deriving(Eq)]
|
2013-10-02 07:33:01 -05:00
|
|
|
enum PatternBindingMode {
|
2012-05-22 12:54:12 -05:00
|
|
|
RefutableMode,
|
2012-11-06 20:41:06 -06:00
|
|
|
LocalIrrefutableMode,
|
2013-04-24 03:29:46 -05:00
|
|
|
ArgumentIrrefutableMode,
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-26 21:53:33 -05:00
|
|
|
#[deriving(Eq)]
|
2013-10-02 07:33:01 -05:00
|
|
|
enum Namespace {
|
2012-05-22 12:54:12 -05:00
|
|
|
TypeNS,
|
2012-08-17 19:09:53 -05:00
|
|
|
ValueNS
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-06-23 11:48:43 -05:00
|
|
|
#[deriving(Eq)]
|
2013-10-02 07:33:01 -05:00
|
|
|
enum NamespaceError {
|
2013-06-23 11:48:43 -05:00
|
|
|
NoError,
|
|
|
|
ModuleError,
|
|
|
|
TypeError,
|
|
|
|
ValueError
|
|
|
|
}
|
|
|
|
|
2012-11-29 16:43:33 -06:00
|
|
|
/// A NamespaceResult represents the result of resolving an import in
|
|
|
|
/// a particular namespace. The result is either definitely-resolved,
|
|
|
|
/// definitely- unresolved, or unknown.
|
2013-10-02 07:33:01 -05:00
|
|
|
enum NamespaceResult {
|
2012-11-29 14:08:40 -06:00
|
|
|
/// Means that resolve hasn't gathered enough information yet to determine
|
|
|
|
/// whether the name is bound in this namespace. (That is, it hasn't
|
|
|
|
/// resolved all `use` directives yet.)
|
2012-05-22 12:54:12 -05:00
|
|
|
UnknownResult,
|
2012-11-29 16:43:33 -06:00
|
|
|
/// Means that resolve has determined that the name is definitely
|
|
|
|
/// not bound in the namespace.
|
2012-05-22 12:54:12 -05:00
|
|
|
UnboundResult,
|
2012-11-29 14:08:40 -06:00
|
|
|
/// Means that resolve has determined that the name is bound in the Module
|
|
|
|
/// argument, and specified by the NameBindings argument.
|
2013-12-21 16:20:57 -06:00
|
|
|
BoundResult(@Module, @NameBindings)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-05-31 17:17:22 -05:00
|
|
|
impl NamespaceResult {
|
2013-10-02 07:33:01 -05:00
|
|
|
fn is_unknown(&self) -> bool {
|
2013-02-22 00:41:37 -06:00
|
|
|
match *self {
|
2012-08-27 18:26:35 -05:00
|
|
|
UnknownResult => true,
|
|
|
|
_ => false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
enum NameDefinition {
|
2012-05-22 12:54:12 -05:00
|
|
|
NoNameDefinition, //< The name was unbound.
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
ChildNameDefinition(Def, LastPrivate), //< The name identifies an immediate child.
|
|
|
|
ImportNameDefinition(Def, LastPrivate) //< The name identifies an import.
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
impl Visitor<()> for Resolver {
|
2014-01-09 07:05:33 -06:00
|
|
|
fn visit_item(&mut self, item: &Item, _: ()) {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_item(item);
|
2013-08-13 11:52:41 -05:00
|
|
|
}
|
2014-01-06 06:00:46 -06:00
|
|
|
fn visit_arm(&mut self, arm: &Arm, _: ()) {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_arm(arm);
|
2013-08-13 11:52:41 -05:00
|
|
|
}
|
2014-01-06 06:00:46 -06:00
|
|
|
fn visit_block(&mut self, block: &Block, _: ()) {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_block(block);
|
2013-08-13 11:52:41 -05:00
|
|
|
}
|
2014-01-06 06:00:46 -06:00
|
|
|
fn visit_expr(&mut self, expr: &Expr, _: ()) {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_expr(expr);
|
2013-08-13 11:52:41 -05:00
|
|
|
}
|
2014-01-06 06:00:46 -06:00
|
|
|
fn visit_local(&mut self, local: &Local, _: ()) {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_local(local);
|
2013-08-13 11:52:41 -05:00
|
|
|
}
|
2014-01-06 06:00:46 -06:00
|
|
|
fn visit_ty(&mut self, ty: &Ty, _: ()) {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_type(ty);
|
2013-08-13 11:52:41 -05:00
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Contains data for specific types of import directives.
|
2013-10-02 07:33:01 -05:00
|
|
|
enum ImportDirectiveSubclass {
|
2013-09-01 19:50:59 -05:00
|
|
|
SingleImport(Ident /* target */, Ident /* source */),
|
2012-05-22 12:54:12 -05:00
|
|
|
GlobImport
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// The context that we thread through while building the reduced graph.
|
2013-07-02 14:47:32 -05:00
|
|
|
#[deriving(Clone)]
|
2013-10-02 07:33:01 -05:00
|
|
|
enum ReducedGraphParent {
|
2013-12-19 21:02:22 -06:00
|
|
|
ModuleReducedGraphParent(@Module)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-11-01 20:06:31 -05:00
|
|
|
impl ReducedGraphParent {
|
|
|
|
fn module(&self) -> @Module {
|
|
|
|
match *self {
|
|
|
|
ModuleReducedGraphParent(m) => {
|
|
|
|
m
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
enum ResolveResult<T> {
|
2012-05-22 12:54:12 -05:00
|
|
|
Failed, // Failed to resolve the name.
|
|
|
|
Indeterminate, // Couldn't determine due to unresolved globs.
|
|
|
|
Success(T) // Successfully resolved the import.
|
|
|
|
}
|
|
|
|
|
2013-05-31 17:17:22 -05:00
|
|
|
impl<T> ResolveResult<T> {
|
2013-10-02 07:33:01 -05:00
|
|
|
fn indeterminate(&self) -> bool {
|
2013-02-22 00:41:37 -06:00
|
|
|
match *self { Indeterminate => true, _ => false }
|
2012-09-07 20:53:14 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-10 01:16:18 -06:00
|
|
|
enum TypeParameters<'a> {
|
2013-03-26 21:53:33 -05:00
|
|
|
NoTypeParameters, //< No type parameters.
|
2013-12-10 01:16:18 -06:00
|
|
|
HasTypeParameters(&'a Generics, //< Type parameters.
|
2013-07-27 03:25:59 -05:00
|
|
|
NodeId, //< ID of the enclosing item
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The index to start numbering the type parameters at.
|
|
|
|
// This is zero if this is the outermost set of type
|
|
|
|
// parameters, or equal to the number of outer type
|
|
|
|
// parameters. For example, if we have:
|
|
|
|
//
|
|
|
|
// impl I<T> {
|
|
|
|
// fn method<U>() { ... }
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// The index at the method site will be 1, because the
|
|
|
|
// outer T had index 0.
|
2012-07-06 21:06:58 -05:00
|
|
|
uint,
|
|
|
|
|
|
|
|
// The kind of the rib used for type parameters.
|
|
|
|
RibKind)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// The rib kind controls the translation of argument or local definitions
|
|
|
|
// (`def_arg` or `def_local`) to upvars (`def_upvar`).
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
enum RibKind {
|
2012-05-22 12:54:12 -05:00
|
|
|
// No translation needs to be applied.
|
|
|
|
NormalRibKind,
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// We passed through a function scope at the given node ID. Translate
|
|
|
|
// upvars as appropriate.
|
2013-07-27 03:25:59 -05:00
|
|
|
FunctionRibKind(NodeId /* func id */, NodeId /* body id */),
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2012-12-10 15:47:54 -06:00
|
|
|
// We passed through an impl or trait and are now in one of its
|
2013-06-06 02:38:41 -05:00
|
|
|
// methods. Allow references to ty params that impl or trait
|
2012-07-26 16:04:03 -05:00
|
|
|
// binds. Disallow any other upvars (including other ty params that are
|
|
|
|
// upvars).
|
|
|
|
// parent; method itself
|
2013-07-27 03:25:59 -05:00
|
|
|
MethodRibKind(NodeId, MethodSort),
|
2012-07-26 16:04:03 -05:00
|
|
|
|
2012-07-06 21:06:58 -05:00
|
|
|
// We passed through a function *item* scope. Disallow upvars.
|
2012-10-15 14:27:09 -05:00
|
|
|
OpaqueFunctionRibKind,
|
|
|
|
|
|
|
|
// We're in a constant item. Can't refer to dynamic stuff.
|
|
|
|
ConstantItemRibKind
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-07-26 16:04:03 -05:00
|
|
|
// Methods can be required or provided. Required methods only occur in traits.
|
2013-10-02 07:33:01 -05:00
|
|
|
enum MethodSort {
|
2012-07-26 16:04:03 -05:00
|
|
|
Required,
|
2013-07-27 03:25:59 -05:00
|
|
|
Provided(NodeId)
|
2012-07-26 16:04:03 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
enum UseLexicalScopeFlag {
|
2012-12-13 15:05:22 -06:00
|
|
|
DontUseLexicalScope,
|
|
|
|
UseLexicalScope
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
enum SearchThroughModulesFlag {
|
2012-12-23 16:41:37 -06:00
|
|
|
DontSearchThroughModules,
|
|
|
|
SearchThroughModules
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
enum ModulePrefixResult {
|
2012-12-23 16:41:37 -06:00
|
|
|
NoPrefixFound,
|
2013-12-19 21:02:22 -06:00
|
|
|
PrefixFound(@Module, uint)
|
2012-12-13 15:05:22 -06:00
|
|
|
}
|
|
|
|
|
2013-03-20 10:40:02 -05:00
|
|
|
#[deriving(Eq)]
|
2013-03-01 12:44:43 -06:00
|
|
|
enum NameSearchType {
|
2013-05-13 18:13:20 -05:00
|
|
|
/// We're doing a name search in order to resolve a `use` directive.
|
|
|
|
ImportSearch,
|
|
|
|
|
|
|
|
/// We're doing a name search in order to resolve a path type, a path
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
/// expression, or a path pattern.
|
|
|
|
PathSearch,
|
2013-03-01 12:44:43 -06:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
enum BareIdentifierPatternResolution {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
FoundStructOrEnumVariant(Def, LastPrivate),
|
|
|
|
FoundConst(Def, LastPrivate),
|
2012-10-30 17:53:06 -05:00
|
|
|
BareIdentifierPatternUnresolved
|
2012-07-06 21:06:58 -05:00
|
|
|
}
|
|
|
|
|
2012-10-15 20:04:15 -05:00
|
|
|
// Specifies how duplicates should be handled when adding a child item if
|
|
|
|
// another item exists with the same name in some namespace.
|
2013-03-20 10:40:02 -05:00
|
|
|
#[deriving(Eq)]
|
2013-10-02 07:33:01 -05:00
|
|
|
enum DuplicateCheckingMode {
|
2012-10-15 20:04:15 -05:00
|
|
|
ForbidDuplicateModules,
|
|
|
|
ForbidDuplicateTypes,
|
|
|
|
ForbidDuplicateValues,
|
|
|
|
ForbidDuplicateTypesAndValues,
|
|
|
|
OverwriteDuplicates
|
|
|
|
}
|
|
|
|
|
2012-08-14 21:20:56 -05:00
|
|
|
/// One local scope.
|
2013-10-02 07:33:01 -05:00
|
|
|
struct Rib {
|
2013-12-21 15:58:11 -06:00
|
|
|
bindings: RefCell<HashMap<Name, DefLike>>,
|
2012-09-06 21:40:15 -05:00
|
|
|
kind: RibKind,
|
2012-09-05 17:58:43 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-08-31 11:13:04 -05:00
|
|
|
impl Rib {
|
2013-10-02 07:33:01 -05:00
|
|
|
fn new(kind: RibKind) -> Rib {
|
2013-08-31 11:13:04 -05:00
|
|
|
Rib {
|
2013-12-21 15:58:11 -06:00
|
|
|
bindings: RefCell::new(HashMap::new()),
|
2013-08-31 11:13:04 -05:00
|
|
|
kind: kind
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// One import directive.
|
2013-10-02 07:33:01 -05:00
|
|
|
struct ImportDirective {
|
2013-09-01 19:50:59 -05:00
|
|
|
module_path: ~[Ident],
|
2012-09-06 21:40:15 -05:00
|
|
|
subclass: @ImportDirectiveSubclass,
|
2013-08-31 11:13:04 -05:00
|
|
|
span: Span,
|
2013-07-27 03:25:59 -05:00
|
|
|
id: NodeId,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
is_public: bool, // see note in ImportResolution about how to use this
|
2012-09-05 17:58:43 -05:00
|
|
|
}
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2013-08-31 11:13:04 -05:00
|
|
|
impl ImportDirective {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
fn new(module_path: ~[Ident],
|
|
|
|
subclass: @ImportDirectiveSubclass,
|
|
|
|
span: Span,
|
|
|
|
id: NodeId,
|
|
|
|
is_public: bool)
|
|
|
|
-> ImportDirective {
|
2013-08-31 11:13:04 -05:00
|
|
|
ImportDirective {
|
|
|
|
module_path: module_path,
|
|
|
|
subclass: subclass,
|
|
|
|
span: span,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
id: id,
|
|
|
|
is_public: is_public,
|
2013-08-31 11:13:04 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// The item that an import resolves to.
|
2013-12-21 19:40:36 -06:00
|
|
|
#[deriving(Clone)]
|
2013-10-02 07:33:01 -05:00
|
|
|
struct Target {
|
2013-12-19 21:02:22 -06:00
|
|
|
target_module: @Module,
|
2013-12-21 16:20:57 -06:00
|
|
|
bindings: @NameBindings,
|
2012-09-05 17:58:43 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-08-31 11:13:04 -05:00
|
|
|
impl Target {
|
2013-12-21 16:20:57 -06:00
|
|
|
fn new(target_module: @Module, bindings: @NameBindings) -> Target {
|
2013-08-31 11:13:04 -05:00
|
|
|
Target {
|
|
|
|
target_module: target_module,
|
|
|
|
bindings: bindings
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
/// An ImportResolution represents a particular `use` directive.
|
2013-10-02 07:33:01 -05:00
|
|
|
struct ImportResolution {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
/// Whether this resolution came from a `use` or a `pub use`. Note that this
|
|
|
|
/// should *not* be used whenever resolution is being performed, this is
|
|
|
|
/// only looked at for glob imports statements currently. Privacy testing
|
|
|
|
/// occurs during a later phase of compilation.
|
2013-12-21 19:32:22 -06:00
|
|
|
is_public: Cell<bool>,
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// The number of outstanding references to this name. When this reaches
|
|
|
|
// zero, outside modules can count on the targets being correct. Before
|
|
|
|
// then, all bets are off; future imports could override this name.
|
2013-12-21 19:30:36 -06:00
|
|
|
outstanding_references: Cell<uint>,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
/// The value that this `use` directive names, if there is one.
|
2013-12-21 19:40:36 -06:00
|
|
|
value_target: RefCell<Option<Target>>,
|
2013-06-09 23:39:15 -05:00
|
|
|
/// The source node of the `use` directive leading to the value target
|
|
|
|
/// being non-none
|
2013-12-21 19:45:02 -06:00
|
|
|
value_id: Cell<NodeId>,
|
2013-06-09 23:39:15 -05:00
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
/// The type that this `use` directive names, if there is one.
|
2013-12-21 19:46:56 -06:00
|
|
|
type_target: RefCell<Option<Target>>,
|
2013-06-09 23:39:15 -05:00
|
|
|
/// The source node of the `use` directive leading to the type target
|
|
|
|
/// being non-none
|
2013-12-21 19:48:19 -06:00
|
|
|
type_id: Cell<NodeId>,
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-08-31 11:13:04 -05:00
|
|
|
impl ImportResolution {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
fn new(id: NodeId, is_public: bool) -> ImportResolution {
|
2013-08-31 11:13:04 -05:00
|
|
|
ImportResolution {
|
2013-12-21 19:48:19 -06:00
|
|
|
type_id: Cell::new(id),
|
2013-12-21 19:45:02 -06:00
|
|
|
value_id: Cell::new(id),
|
2013-12-21 19:30:36 -06:00
|
|
|
outstanding_references: Cell::new(0),
|
2013-12-21 19:40:36 -06:00
|
|
|
value_target: RefCell::new(None),
|
2013-12-21 19:46:56 -06:00
|
|
|
type_target: RefCell::new(None),
|
2013-12-21 19:32:22 -06:00
|
|
|
is_public: Cell::new(is_public),
|
2013-08-31 11:13:04 -05:00
|
|
|
}
|
2012-09-05 17:58:43 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn target_for_namespace(&self, namespace: Namespace)
|
2013-05-31 17:17:22 -05:00
|
|
|
-> Option<Target> {
|
2012-09-07 21:04:40 -05:00
|
|
|
match namespace {
|
2013-12-21 19:46:56 -06:00
|
|
|
TypeNS => return self.type_target.get(),
|
2013-12-21 19:40:36 -06:00
|
|
|
ValueNS => return self.value_target.get(),
|
2012-09-07 21:04:40 -05:00
|
|
|
}
|
|
|
|
}
|
2013-06-09 23:39:15 -05:00
|
|
|
|
2013-07-27 03:25:59 -05:00
|
|
|
fn id(&self, namespace: Namespace) -> NodeId {
|
2013-06-09 23:39:15 -05:00
|
|
|
match namespace {
|
2013-12-21 19:48:19 -06:00
|
|
|
TypeNS => self.type_id.get(),
|
2013-12-21 19:45:02 -06:00
|
|
|
ValueNS => self.value_id.get(),
|
2013-06-09 23:39:15 -05:00
|
|
|
}
|
|
|
|
}
|
2012-09-07 21:04:40 -05:00
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// The link from a module up to its nearest parent node.
|
2013-10-02 07:33:01 -05:00
|
|
|
enum ParentLink {
|
2012-05-22 12:54:12 -05:00
|
|
|
NoParentLink,
|
2013-12-19 21:02:22 -06:00
|
|
|
ModuleParentLink(@Module, Ident),
|
|
|
|
BlockParentLink(@Module, NodeId)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-12-23 16:41:37 -06:00
|
|
|
/// The type of module this is.
|
2013-06-09 06:35:24 -05:00
|
|
|
#[deriving(Eq)]
|
2013-10-02 07:33:01 -05:00
|
|
|
enum ModuleKind {
|
2012-12-23 16:41:37 -06:00
|
|
|
NormalModuleKind,
|
|
|
|
ExternModuleKind,
|
|
|
|
TraitModuleKind,
|
2013-05-13 18:13:20 -05:00
|
|
|
ImplModuleKind,
|
2012-12-23 16:41:37 -06:00
|
|
|
AnonymousModuleKind,
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// One node in the tree of modules.
|
2013-10-02 07:33:01 -05:00
|
|
|
struct Module {
|
2012-09-06 21:40:15 -05:00
|
|
|
parent_link: ParentLink,
|
2013-12-19 20:56:20 -06:00
|
|
|
def_id: Cell<Option<DefId>>,
|
2013-12-19 20:52:35 -06:00
|
|
|
kind: Cell<ModuleKind>,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
is_public: bool,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-12-21 17:32:44 -06:00
|
|
|
children: RefCell<HashMap<Name, @NameBindings>>,
|
2013-12-22 18:39:46 -06:00
|
|
|
imports: RefCell<~[@ImportDirective]>,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-03-26 21:53:33 -05:00
|
|
|
// The external module children of this node that were declared with
|
|
|
|
// `extern mod`.
|
2013-12-21 16:05:26 -06:00
|
|
|
external_module_children: RefCell<HashMap<Name, @Module>>,
|
2013-03-26 21:53:33 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// The anonymous children of this node. Anonymous children are pseudo-
|
|
|
|
// modules that are implicitly created around items contained within
|
|
|
|
// blocks.
|
|
|
|
//
|
|
|
|
// For example, if we have this:
|
|
|
|
//
|
|
|
|
// fn f() {
|
|
|
|
// fn g() {
|
|
|
|
// ...
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// There will be an anonymous module created around `g` with the ID of the
|
|
|
|
// entry block for `f`.
|
2013-12-21 16:23:40 -06:00
|
|
|
anonymous_children: RefCell<HashMap<NodeId,@Module>>,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The status of resolving each import in this module.
|
2013-12-21 19:49:43 -06:00
|
|
|
import_resolutions: RefCell<HashMap<Name, @ImportResolution>>,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The number of unresolved globs that this module exports.
|
2013-12-19 20:59:03 -06:00
|
|
|
glob_count: Cell<uint>,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The index of the import we're resolving.
|
2013-12-19 21:01:02 -06:00
|
|
|
resolved_import_count: Cell<uint>,
|
2013-08-21 20:39:30 -05:00
|
|
|
|
|
|
|
// Whether this module is populated. If not populated, any attempt to
|
|
|
|
// access the children must be preceded with a
|
|
|
|
// `populate_module_if_necessary` call.
|
2013-12-19 20:53:59 -06:00
|
|
|
populated: Cell<bool>,
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-08-31 11:13:04 -05:00
|
|
|
impl Module {
|
2013-10-02 07:33:01 -05:00
|
|
|
fn new(parent_link: ParentLink,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
def_id: Option<DefId>,
|
|
|
|
kind: ModuleKind,
|
|
|
|
external: bool,
|
|
|
|
is_public: bool)
|
2013-12-19 20:52:35 -06:00
|
|
|
-> Module {
|
2013-08-31 11:13:04 -05:00
|
|
|
Module {
|
|
|
|
parent_link: parent_link,
|
2013-12-19 20:56:20 -06:00
|
|
|
def_id: Cell::new(def_id),
|
2013-12-19 20:52:35 -06:00
|
|
|
kind: Cell::new(kind),
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
is_public: is_public,
|
2013-12-21 17:32:44 -06:00
|
|
|
children: RefCell::new(HashMap::new()),
|
2013-12-22 18:39:46 -06:00
|
|
|
imports: RefCell::new(~[]),
|
2013-12-21 16:05:26 -06:00
|
|
|
external_module_children: RefCell::new(HashMap::new()),
|
2013-12-21 16:23:40 -06:00
|
|
|
anonymous_children: RefCell::new(HashMap::new()),
|
2013-12-21 17:15:54 -06:00
|
|
|
import_resolutions: RefCell::new(HashMap::new()),
|
2013-12-19 20:59:03 -06:00
|
|
|
glob_count: Cell::new(0),
|
2013-12-19 21:01:02 -06:00
|
|
|
resolved_import_count: Cell::new(0),
|
2013-12-19 20:53:59 -06:00
|
|
|
populated: Cell::new(!external),
|
2013-08-31 11:13:04 -05:00
|
|
|
}
|
2012-09-05 17:58:43 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn all_imports_resolved(&self) -> bool {
|
2013-12-22 18:39:46 -06:00
|
|
|
let mut imports = self.imports.borrow_mut();
|
|
|
|
return imports.get().len() == self.resolved_import_count.get();
|
2012-09-07 21:04:40 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
// Records a possibly-private type definition.
|
2013-12-21 16:13:06 -06:00
|
|
|
#[deriving(Clone)]
|
2013-10-02 07:33:01 -05:00
|
|
|
struct TypeNsDef {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
is_public: bool, // see note in ImportResolution about how to use this
|
2013-12-19 21:02:22 -06:00
|
|
|
module_def: Option<@Module>,
|
2013-09-01 20:45:37 -05:00
|
|
|
type_def: Option<Def>,
|
2013-08-31 11:13:04 -05:00
|
|
|
type_span: Option<Span>
|
2012-10-15 16:56:42 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Records a possibly-private value definition.
|
2013-12-21 16:15:07 -06:00
|
|
|
#[deriving(Clone)]
|
2013-10-02 07:33:01 -05:00
|
|
|
struct ValueNsDef {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
is_public: bool, // see note in ImportResolution about how to use this
|
2013-09-01 20:45:37 -05:00
|
|
|
def: Def,
|
2013-08-31 11:13:04 -05:00
|
|
|
value_span: Option<Span>,
|
2012-08-17 19:55:34 -05:00
|
|
|
}
|
|
|
|
|
2012-07-06 21:06:58 -05:00
|
|
|
// Records the definitions (at most one for each namespace) that a name is
|
|
|
|
// bound to.
|
2013-10-02 07:33:01 -05:00
|
|
|
struct NameBindings {
|
2013-12-21 16:13:06 -06:00
|
|
|
type_def: RefCell<Option<TypeNsDef>>, //< Meaning in type namespace.
|
2013-12-21 16:15:07 -06:00
|
|
|
value_def: RefCell<Option<ValueNsDef>>, //< Meaning in value namespace.
|
2012-09-07 21:04:40 -05:00
|
|
|
}
|
|
|
|
|
2013-07-03 16:16:08 -05:00
|
|
|
/// Ways in which a trait can be referenced
|
|
|
|
enum TraitReferenceType {
|
|
|
|
TraitImplementation, // impl SomeTrait for T { ... }
|
|
|
|
TraitDerivation, // trait T : SomeTrait { ... }
|
|
|
|
TraitBoundingTypeParameter, // fn f<T:SomeTrait>() { ... }
|
|
|
|
}
|
|
|
|
|
2013-05-31 17:17:22 -05:00
|
|
|
impl NameBindings {
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Creates a new module in this set of name bindings.
|
2013-12-21 16:20:57 -06:00
|
|
|
fn define_module(&self,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
parent_link: ParentLink,
|
|
|
|
def_id: Option<DefId>,
|
|
|
|
kind: ModuleKind,
|
|
|
|
external: bool,
|
|
|
|
is_public: bool,
|
|
|
|
sp: Span) {
|
2012-10-15 20:04:15 -05:00
|
|
|
// Merges the module with the existing type def or creates a new one.
|
2013-12-19 21:02:22 -06:00
|
|
|
let module_ = @Module::new(parent_link, def_id, kind, external,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
is_public);
|
2013-12-21 16:13:06 -06:00
|
|
|
match self.type_def.get() {
|
2012-10-15 20:04:15 -05:00
|
|
|
None => {
|
2013-12-21 16:13:06 -06:00
|
|
|
self.type_def.set(Some(TypeNsDef {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
is_public: is_public,
|
2012-10-15 20:04:15 -05:00
|
|
|
module_def: Some(module_),
|
2013-05-14 23:49:30 -05:00
|
|
|
type_def: None,
|
|
|
|
type_span: Some(sp)
|
2013-12-21 16:13:06 -06:00
|
|
|
}));
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
2013-05-29 18:59:33 -05:00
|
|
|
Some(type_def) => {
|
2013-12-21 16:13:06 -06:00
|
|
|
self.type_def.set(Some(TypeNsDef {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
is_public: is_public,
|
2012-10-15 20:04:15 -05:00
|
|
|
module_def: Some(module_),
|
2013-05-14 23:49:30 -05:00
|
|
|
type_span: Some(sp),
|
2013-05-29 18:59:33 -05:00
|
|
|
type_def: type_def.type_def
|
2013-12-21 16:13:06 -06:00
|
|
|
}));
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-13 18:13:20 -05:00
|
|
|
/// Sets the kind of the module, creating a new one if necessary.
|
2013-12-21 16:20:57 -06:00
|
|
|
fn set_module_kind(&self,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
parent_link: ParentLink,
|
|
|
|
def_id: Option<DefId>,
|
|
|
|
kind: ModuleKind,
|
|
|
|
external: bool,
|
|
|
|
is_public: bool,
|
|
|
|
_sp: Span) {
|
2013-12-21 16:13:06 -06:00
|
|
|
match self.type_def.get() {
|
2013-05-13 18:13:20 -05:00
|
|
|
None => {
|
2013-12-19 21:02:22 -06:00
|
|
|
let module = @Module::new(parent_link, def_id, kind,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
external, is_public);
|
2013-12-21 16:13:06 -06:00
|
|
|
self.type_def.set(Some(TypeNsDef {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
is_public: is_public,
|
2013-05-13 18:13:20 -05:00
|
|
|
module_def: Some(module),
|
2013-05-16 17:37:52 -05:00
|
|
|
type_def: None,
|
|
|
|
type_span: None,
|
2013-12-21 16:13:06 -06:00
|
|
|
}))
|
2013-05-13 18:13:20 -05:00
|
|
|
}
|
|
|
|
Some(type_def) => {
|
|
|
|
match type_def.module_def {
|
|
|
|
None => {
|
2013-12-19 21:02:22 -06:00
|
|
|
let module = @Module::new(parent_link,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
def_id,
|
|
|
|
kind,
|
|
|
|
external,
|
|
|
|
is_public);
|
2013-12-21 16:13:06 -06:00
|
|
|
self.type_def.set(Some(TypeNsDef {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
is_public: is_public,
|
2013-05-13 18:13:20 -05:00
|
|
|
module_def: Some(module),
|
2013-05-16 17:37:52 -05:00
|
|
|
type_def: type_def.type_def,
|
|
|
|
type_span: None,
|
2013-12-21 16:13:06 -06:00
|
|
|
}))
|
2013-05-13 18:13:20 -05:00
|
|
|
}
|
2013-12-19 20:52:35 -06:00
|
|
|
Some(module_def) => module_def.kind.set(kind),
|
2013-05-13 18:13:20 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Records a type definition.
|
2013-12-21 16:20:57 -06:00
|
|
|
fn define_type(&self, def: Def, sp: Span, is_public: bool) {
|
2012-10-15 20:04:15 -05:00
|
|
|
// Merges the type with the existing type def or creates a new one.
|
2013-12-21 16:13:06 -06:00
|
|
|
match self.type_def.get() {
|
2012-10-15 20:04:15 -05:00
|
|
|
None => {
|
2013-12-21 16:13:06 -06:00
|
|
|
self.type_def.set(Some(TypeNsDef {
|
2012-10-15 20:04:15 -05:00
|
|
|
module_def: None,
|
2013-05-14 23:49:30 -05:00
|
|
|
type_def: Some(def),
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
type_span: Some(sp),
|
|
|
|
is_public: is_public,
|
2013-12-21 16:13:06 -06:00
|
|
|
}));
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
2013-05-29 18:59:33 -05:00
|
|
|
Some(type_def) => {
|
2013-12-21 16:13:06 -06:00
|
|
|
self.type_def.set(Some(TypeNsDef {
|
2012-10-15 20:04:15 -05:00
|
|
|
type_def: Some(def),
|
2013-05-14 23:49:30 -05:00
|
|
|
type_span: Some(sp),
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
module_def: type_def.module_def,
|
|
|
|
is_public: is_public,
|
2013-12-21 16:13:06 -06:00
|
|
|
}));
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Records a value definition.
|
2013-12-21 16:20:57 -06:00
|
|
|
fn define_value(&self, def: Def, sp: Span, is_public: bool) {
|
2013-12-21 16:15:07 -06:00
|
|
|
self.value_def.set(Some(ValueNsDef {
|
|
|
|
def: def,
|
|
|
|
value_span: Some(sp),
|
|
|
|
is_public: is_public,
|
|
|
|
}));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Returns the module node if applicable.
|
2013-12-19 21:02:22 -06:00
|
|
|
fn get_module_if_available(&self) -> Option<@Module> {
|
2013-12-21 16:13:06 -06:00
|
|
|
let type_def = self.type_def.borrow();
|
|
|
|
match *type_def.get() {
|
2012-12-04 12:50:00 -06:00
|
|
|
Some(ref type_def) => (*type_def).module_def,
|
2012-10-15 20:04:15 -05:00
|
|
|
None => None
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/**
|
|
|
|
* Returns the module node. Fails if this node does not have a module
|
|
|
|
* definition.
|
|
|
|
*/
|
2013-12-21 16:20:57 -06:00
|
|
|
fn get_module(&self) -> @Module {
|
2012-10-15 20:04:15 -05:00
|
|
|
match self.get_module_if_available() {
|
|
|
|
None => {
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!("get_module called on a node with no module \
|
2013-01-31 19:51:01 -06:00
|
|
|
definition!")
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-10-15 20:04:15 -05:00
|
|
|
Some(module_def) => module_def
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn defined_in_namespace(&self, namespace: Namespace) -> bool {
|
2012-08-06 14:34:08 -05:00
|
|
|
match namespace {
|
2013-12-21 16:13:06 -06:00
|
|
|
TypeNS => return self.type_def.get().is_some(),
|
2013-12-21 16:15:07 -06:00
|
|
|
ValueNS => return self.value_def.get().is_some()
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn defined_in_public_namespace(&self, namespace: Namespace) -> bool {
|
2013-02-25 23:34:45 -06:00
|
|
|
match namespace {
|
2013-12-21 16:13:06 -06:00
|
|
|
TypeNS => match self.type_def.get() {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Some(def) => def.is_public, None => false
|
2013-02-25 23:34:45 -06:00
|
|
|
},
|
2013-12-21 16:15:07 -06:00
|
|
|
ValueNS => match self.value_def.get() {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Some(def) => def.is_public, None => false
|
2013-02-25 23:34:45 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn def_for_namespace(&self, namespace: Namespace) -> Option<Def> {
|
2012-08-06 14:34:08 -05:00
|
|
|
match namespace {
|
2012-10-15 16:56:42 -05:00
|
|
|
TypeNS => {
|
2013-12-21 16:13:06 -06:00
|
|
|
match self.type_def.get() {
|
2012-10-15 16:56:42 -05:00
|
|
|
None => None,
|
2013-12-21 16:13:06 -06:00
|
|
|
Some(type_def) => {
|
|
|
|
match type_def.type_def {
|
2012-10-15 20:04:15 -05:00
|
|
|
Some(type_def) => Some(type_def),
|
2013-06-18 11:39:16 -05:00
|
|
|
None => {
|
|
|
|
match type_def.module_def {
|
|
|
|
Some(module) => {
|
2013-12-19 20:56:20 -06:00
|
|
|
match module.def_id.get() {
|
2013-09-01 20:45:37 -05:00
|
|
|
Some(did) => Some(DefMod(did)),
|
2013-06-18 11:39:16 -05:00
|
|
|
None => None,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None => None,
|
|
|
|
}
|
|
|
|
}
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
2012-08-17 19:55:34 -05:00
|
|
|
}
|
|
|
|
}
|
2012-10-15 16:56:42 -05:00
|
|
|
}
|
|
|
|
ValueNS => {
|
2013-12-21 16:15:07 -06:00
|
|
|
match self.value_def.get() {
|
2012-10-15 16:56:42 -05:00
|
|
|
None => None,
|
|
|
|
Some(value_def) => Some(value_def.def)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn span_for_namespace(&self, namespace: Namespace) -> Option<Span> {
|
2012-10-15 16:56:42 -05:00
|
|
|
if self.defined_in_namespace(namespace) {
|
2012-08-06 18:10:56 -05:00
|
|
|
match namespace {
|
2013-05-14 23:49:30 -05:00
|
|
|
TypeNS => {
|
2013-12-21 16:13:06 -06:00
|
|
|
match self.type_def.get() {
|
2013-05-14 23:49:30 -05:00
|
|
|
None => None,
|
|
|
|
Some(type_def) => type_def.type_span
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ValueNS => {
|
2013-12-21 16:15:07 -06:00
|
|
|
match self.value_def.get() {
|
2013-05-14 23:49:30 -05:00
|
|
|
None => None,
|
|
|
|
Some(value_def) => value_def.value_span
|
|
|
|
}
|
|
|
|
}
|
2012-08-06 18:10:56 -05:00
|
|
|
}
|
2012-10-15 16:56:42 -05:00
|
|
|
} else {
|
|
|
|
None
|
2012-08-06 18:10:56 -05:00
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn NameBindings() -> NameBindings {
|
2012-09-05 17:58:43 -05:00
|
|
|
NameBindings {
|
2013-12-21 16:13:06 -06:00
|
|
|
type_def: RefCell::new(None),
|
2013-12-21 16:15:07 -06:00
|
|
|
value_def: RefCell::new(None),
|
2012-09-05 17:58:43 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Interns the names of the primitive types.
|
2013-10-02 07:33:01 -05:00
|
|
|
struct PrimitiveTypeTable {
|
2014-01-09 07:05:33 -06:00
|
|
|
primitive_types: HashMap<Name, PrimTy>,
|
2012-09-07 21:04:40 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-05-31 17:17:22 -05:00
|
|
|
impl PrimitiveTypeTable {
|
2014-01-09 07:05:33 -06:00
|
|
|
fn intern(&mut self, string: &str, primitive_type: PrimTy) {
|
2013-06-26 17:56:13 -05:00
|
|
|
self.primitive_types.insert(token::intern(string), primitive_type);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn PrimitiveTypeTable() -> PrimitiveTypeTable {
|
2013-03-22 21:26:41 -05:00
|
|
|
let mut table = PrimitiveTypeTable {
|
2013-04-03 08:28:36 -05:00
|
|
|
primitive_types: HashMap::new()
|
2012-09-05 17:58:43 -05:00
|
|
|
};
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
table.intern("bool", TyBool);
|
|
|
|
table.intern("char", TyChar);
|
|
|
|
table.intern("f32", TyFloat(TyF32));
|
|
|
|
table.intern("f64", TyFloat(TyF64));
|
|
|
|
table.intern("int", TyInt(TyI));
|
|
|
|
table.intern("i8", TyInt(TyI8));
|
|
|
|
table.intern("i16", TyInt(TyI16));
|
|
|
|
table.intern("i32", TyInt(TyI32));
|
|
|
|
table.intern("i64", TyInt(TyI64));
|
|
|
|
table.intern("str", TyStr);
|
|
|
|
table.intern("uint", TyUint(TyU));
|
|
|
|
table.intern("u8", TyUint(TyU8));
|
|
|
|
table.intern("u16", TyUint(TyU16));
|
|
|
|
table.intern("u32", TyUint(TyU32));
|
|
|
|
table.intern("u64", TyUint(TyU64));
|
2012-09-05 17:58:43 -05:00
|
|
|
|
|
|
|
return table;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn namespace_error_to_str(ns: NamespaceError) -> &'static str {
|
2012-08-06 18:10:56 -05:00
|
|
|
match ns {
|
2013-06-23 11:48:43 -05:00
|
|
|
NoError => "",
|
|
|
|
ModuleError => "module",
|
|
|
|
TypeError => "type",
|
|
|
|
ValueError => "value",
|
2012-08-06 18:10:56 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn Resolver(session: Session,
|
2014-01-07 22:39:15 -06:00
|
|
|
lang_items: @LanguageItems,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
crate_span: Span) -> Resolver {
|
2013-12-21 16:20:57 -06:00
|
|
|
let graph_root = @NameBindings();
|
2012-09-05 17:58:43 -05:00
|
|
|
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
graph_root.define_module(NoParentLink,
|
2013-09-01 20:45:37 -05:00
|
|
|
Some(DefId { crate: 0, node: 0 }),
|
2013-02-04 16:02:01 -06:00
|
|
|
NormalModuleKind,
|
2013-08-21 20:39:30 -05:00
|
|
|
false,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
true,
|
2013-09-27 21:46:09 -05:00
|
|
|
crate_span);
|
2012-09-05 17:58:43 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
let current_module = graph_root.get_module();
|
2012-09-05 17:58:43 -05:00
|
|
|
|
2013-05-10 17:15:06 -05:00
|
|
|
let this = Resolver {
|
2013-02-21 13:08:50 -06:00
|
|
|
session: @session,
|
2013-06-27 19:41:35 -05:00
|
|
|
lang_items: lang_items,
|
2012-09-05 17:58:43 -05:00
|
|
|
|
|
|
|
// The outermost module has def ID 0; this is not reflected in the
|
|
|
|
// AST.
|
|
|
|
|
|
|
|
graph_root: graph_root,
|
|
|
|
|
2013-12-21 19:04:42 -06:00
|
|
|
method_map: @RefCell::new(HashMap::new()),
|
2013-04-03 08:28:36 -05:00
|
|
|
structs: HashSet::new(),
|
2012-09-05 17:58:43 -05:00
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
unresolved_imports: 0,
|
2012-09-05 17:58:43 -05:00
|
|
|
|
|
|
|
current_module: current_module,
|
2013-12-22 18:48:05 -06:00
|
|
|
value_ribs: @RefCell::new(~[]),
|
|
|
|
type_ribs: @RefCell::new(~[]),
|
2013-12-22 16:31:49 -06:00
|
|
|
label_ribs: @RefCell::new(~[]),
|
2012-09-05 17:58:43 -05:00
|
|
|
|
|
|
|
current_trait_refs: None,
|
|
|
|
|
2012-12-23 16:41:37 -06:00
|
|
|
self_ident: special_idents::self_,
|
2013-01-09 16:12:28 -06:00
|
|
|
type_self_ident: special_idents::type_self,
|
|
|
|
|
2013-06-04 17:14:56 -05:00
|
|
|
primitive_type_table: @PrimitiveTypeTable(),
|
2012-09-05 17:58:43 -05:00
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
namespaces: ~[ TypeNS, ValueNS ],
|
2012-09-05 17:58:43 -05:00
|
|
|
|
2013-12-23 13:15:16 -06:00
|
|
|
def_map: @RefCell::new(HashMap::new()),
|
2013-12-20 23:14:25 -06:00
|
|
|
export_map2: @RefCell::new(HashMap::new()),
|
2013-04-03 08:28:36 -05:00
|
|
|
trait_map: HashMap::new(),
|
2013-04-30 00:15:17 -05:00
|
|
|
used_imports: HashSet::new(),
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
external_exports: HashSet::new(),
|
|
|
|
last_private: HashMap::new(),
|
2012-09-05 17:58:43 -05:00
|
|
|
|
2013-08-13 19:54:14 -05:00
|
|
|
emit_errors: true,
|
2012-09-05 17:58:43 -05:00
|
|
|
intr: session.intr()
|
|
|
|
};
|
|
|
|
|
2013-05-10 17:15:06 -05:00
|
|
|
this
|
2012-09-05 17:58:43 -05:00
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// The main resolver class.
|
2013-10-02 07:33:01 -05:00
|
|
|
struct Resolver {
|
2013-02-21 13:08:50 -06:00
|
|
|
session: @Session,
|
2014-01-07 22:39:15 -06:00
|
|
|
lang_items: @LanguageItems,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
intr: @IdentInterner,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-12-21 16:20:57 -06:00
|
|
|
graph_root: @NameBindings,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-12-21 19:04:42 -06:00
|
|
|
method_map: @RefCell<HashMap<Name, HashSet<DefId>>>,
|
2013-09-01 20:45:37 -05:00
|
|
|
structs: HashSet<DefId>,
|
2012-07-11 17:00:40 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// The number of imports that are currently unresolved.
|
2013-02-21 13:08:50 -06:00
|
|
|
unresolved_imports: uint,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The module that represents the current item scope.
|
2013-12-19 21:02:22 -06:00
|
|
|
current_module: @Module,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The current set of local scopes, for values.
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4948: Reuse ribs to avoid allocation.
|
2013-12-22 18:48:05 -06:00
|
|
|
value_ribs: @RefCell<~[@Rib]>,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The current set of local scopes, for types.
|
2013-12-22 18:48:05 -06:00
|
|
|
type_ribs: @RefCell<~[@Rib]>,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-14 21:20:56 -05:00
|
|
|
// The current set of local scopes, for labels.
|
2013-12-22 16:31:49 -06:00
|
|
|
label_ribs: @RefCell<~[@Rib]>,
|
2012-08-14 21:20:56 -05:00
|
|
|
|
2012-07-11 17:00:40 -05:00
|
|
|
// The trait that the current context can refer to.
|
2013-09-01 20:45:37 -05:00
|
|
|
current_trait_refs: Option<~[DefId]>,
|
2012-07-11 17:00:40 -05:00
|
|
|
|
2012-09-19 20:52:49 -05:00
|
|
|
// The ident for the keyword "self".
|
2013-09-01 19:50:59 -05:00
|
|
|
self_ident: Ident,
|
2013-01-09 16:12:28 -06:00
|
|
|
// The ident for the non-keyword "Self".
|
2013-09-01 19:50:59 -05:00
|
|
|
type_self_ident: Ident,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-09-19 20:52:49 -05:00
|
|
|
// The idents for the primitive types.
|
2012-09-06 21:40:15 -05:00
|
|
|
primitive_type_table: @PrimitiveTypeTable,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The four namespaces.
|
2012-09-06 21:40:15 -05:00
|
|
|
namespaces: ~[Namespace],
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-03-22 21:26:41 -05:00
|
|
|
def_map: DefMap,
|
|
|
|
export_map2: ExportMap2,
|
2012-09-06 21:40:15 -05:00
|
|
|
trait_map: TraitMap,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
external_exports: ExternalExports,
|
|
|
|
last_private: LastPrivateMap,
|
2013-04-30 00:15:17 -05:00
|
|
|
|
2013-08-13 19:54:14 -05:00
|
|
|
// Whether or not to print error messages. Can be set to true
|
|
|
|
// when getting additional info for error message suggestions,
|
|
|
|
// so as to avoid printing duplicate errors
|
|
|
|
emit_errors: bool,
|
|
|
|
|
2013-07-27 03:25:59 -05:00
|
|
|
used_imports: HashSet<NodeId>,
|
2012-09-07 21:04:40 -05:00
|
|
|
}
|
|
|
|
|
2013-12-10 01:16:18 -06:00
|
|
|
struct BuildReducedGraphVisitor<'a> {
|
|
|
|
resolver: &'a mut Resolver,
|
2013-08-13 11:52:41 -05:00
|
|
|
}
|
|
|
|
|
2013-12-10 01:16:18 -06:00
|
|
|
impl<'a> Visitor<ReducedGraphParent> for BuildReducedGraphVisitor<'a> {
|
2013-08-13 11:52:41 -05:00
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
fn visit_item(&mut self, item: &Item, context: ReducedGraphParent) {
|
2013-09-26 21:10:16 -05:00
|
|
|
let p = self.resolver.build_reduced_graph_for_item(item, context);
|
|
|
|
visit::walk_item(self, item, p);
|
2013-08-13 11:52:41 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
fn visit_foreign_item(&mut self, foreign_item: &ForeignItem,
|
2014-01-06 06:00:46 -06:00
|
|
|
context: ReducedGraphParent) {
|
2013-11-21 17:42:55 -06:00
|
|
|
self.resolver.build_reduced_graph_for_foreign_item(foreign_item,
|
|
|
|
context,
|
|
|
|
|r, c| {
|
2013-09-26 21:10:16 -05:00
|
|
|
let mut v = BuildReducedGraphVisitor{ resolver: r };
|
|
|
|
visit::walk_foreign_item(&mut v, foreign_item, c);
|
2013-11-21 17:42:55 -06:00
|
|
|
})
|
2013-08-13 11:52:41 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
fn visit_view_item(&mut self, view_item: &ViewItem, context: ReducedGraphParent) {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolver.build_reduced_graph_for_view_item(view_item, context);
|
2013-08-13 11:52:41 -05:00
|
|
|
}
|
|
|
|
|
2014-01-06 06:00:46 -06:00
|
|
|
fn visit_block(&mut self, block: &Block, context: ReducedGraphParent) {
|
2013-09-26 21:10:16 -05:00
|
|
|
let np = self.resolver.build_reduced_graph_for_block(block, context);
|
|
|
|
visit::walk_block(self, block, np);
|
2013-08-13 11:52:41 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-12-10 01:16:18 -06:00
|
|
|
struct UnusedImportCheckVisitor<'a> { resolver: &'a Resolver }
|
2013-08-13 11:52:41 -05:00
|
|
|
|
2013-12-10 01:16:18 -06:00
|
|
|
impl<'a> Visitor<()> for UnusedImportCheckVisitor<'a> {
|
2014-01-09 07:05:33 -06:00
|
|
|
fn visit_view_item(&mut self, vi: &ViewItem, _: ()) {
|
2013-08-13 11:52:41 -05:00
|
|
|
self.resolver.check_for_item_unused_imports(vi);
|
|
|
|
visit::walk_view_item(self, vi, ());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-31 17:17:22 -05:00
|
|
|
impl Resolver {
|
2012-07-04 16:53:12 -05:00
|
|
|
/// The main name resolution procedure.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve(&mut self, crate: &ast::Crate) {
|
2013-09-27 21:46:09 -05:00
|
|
|
self.build_reduced_graph(crate);
|
2012-07-06 21:06:58 -05:00
|
|
|
self.session.abort_if_errors();
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
self.resolve_imports();
|
2012-07-06 21:06:58 -05:00
|
|
|
self.session.abort_if_errors();
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_exports();
|
2012-07-06 21:06:58 -05:00
|
|
|
self.session.abort_if_errors();
|
|
|
|
|
2013-09-27 21:46:09 -05:00
|
|
|
self.resolve_crate(crate);
|
2012-07-06 21:06:58 -05:00
|
|
|
self.session.abort_if_errors();
|
|
|
|
|
2013-09-27 21:46:09 -05:00
|
|
|
self.check_for_unused_imports(crate);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Reduced graph building
|
|
|
|
//
|
|
|
|
// Here we build the "reduced graph": the graph of the module tree without
|
|
|
|
// any imports resolved.
|
|
|
|
//
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Constructs the reduced graph for the entire crate.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn build_reduced_graph(&mut self, crate: &ast::Crate) {
|
2012-05-22 12:54:12 -05:00
|
|
|
let initial_parent =
|
2013-02-04 16:02:01 -06:00
|
|
|
ModuleReducedGraphParent(self.graph_root.get_module());
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-08-13 11:52:41 -05:00
|
|
|
let mut visitor = BuildReducedGraphVisitor { resolver: self, };
|
2013-09-27 21:46:09 -05:00
|
|
|
visit::walk_crate(&mut visitor, crate, initial_parent);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Returns the current module tracked by the reduced graph parent.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn get_module_from_parent(&mut self,
|
2013-05-31 17:17:22 -05:00
|
|
|
reduced_graph_parent: ReducedGraphParent)
|
2013-12-19 21:02:22 -06:00
|
|
|
-> @Module {
|
2012-08-06 14:34:08 -05:00
|
|
|
match reduced_graph_parent {
|
2012-08-03 21:59:04 -05:00
|
|
|
ModuleReducedGraphParent(module_) => {
|
2012-08-01 19:30:05 -05:00
|
|
|
return module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/**
|
|
|
|
* Adds a new child item to the module definition of the parent node and
|
|
|
|
* returns its corresponding name bindings as well as the current parent.
|
|
|
|
* Or, if we're inside a block, creates (or reuses) an anonymous module
|
|
|
|
* corresponding to the innermost block ID and returns the name bindings
|
|
|
|
* as well as the newly-created parent.
|
|
|
|
*
|
|
|
|
* If this node does not have a module definition and we are not inside
|
|
|
|
* a block, fails.
|
|
|
|
*/
|
2013-10-02 07:33:01 -05:00
|
|
|
fn add_child(&mut self,
|
2013-09-01 19:50:59 -05:00
|
|
|
name: Ident,
|
2013-05-31 17:17:22 -05:00
|
|
|
reduced_graph_parent: ReducedGraphParent,
|
|
|
|
duplicate_checking_mode: DuplicateCheckingMode,
|
|
|
|
// For printing errors
|
2013-08-31 11:13:04 -05:00
|
|
|
sp: Span)
|
2013-12-21 16:20:57 -06:00
|
|
|
-> (@NameBindings, ReducedGraphParent) {
|
2012-05-22 12:54:12 -05:00
|
|
|
// If this is the immediate descendant of a module, then we add the
|
|
|
|
// child name directly. Otherwise, we create or reuse an anonymous
|
|
|
|
// module and add the child to that.
|
|
|
|
|
2013-04-12 00:15:30 -05:00
|
|
|
let module_;
|
2012-08-06 14:34:08 -05:00
|
|
|
match reduced_graph_parent {
|
2012-08-03 21:59:04 -05:00
|
|
|
ModuleReducedGraphParent(parent_module) => {
|
2012-07-31 18:38:41 -05:00
|
|
|
module_ = parent_module;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add or reuse the child.
|
2012-07-31 18:38:41 -05:00
|
|
|
let new_parent = ModuleReducedGraphParent(module_);
|
2013-12-21 17:32:44 -06:00
|
|
|
let child_opt = {
|
|
|
|
let children = module_.children.borrow();
|
|
|
|
children.get().find_copy(&name.name)
|
|
|
|
};
|
|
|
|
match child_opt {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-12-21 16:20:57 -06:00
|
|
|
let child = @NameBindings();
|
2013-12-21 17:32:44 -06:00
|
|
|
let mut children = module_.children.borrow_mut();
|
|
|
|
children.get().insert(name.name, child);
|
2012-10-15 20:04:15 -05:00
|
|
|
return (child, new_parent);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-12-21 17:32:44 -06:00
|
|
|
Some(child) => {
|
2013-03-26 21:53:33 -05:00
|
|
|
// Enforce the duplicate checking mode:
|
|
|
|
//
|
|
|
|
// * If we're requesting duplicate module checking, check that
|
|
|
|
// there isn't a module in the module with the same name.
|
|
|
|
//
|
|
|
|
// * If we're requesting duplicate type checking, check that
|
|
|
|
// there isn't a type in the module with the same name.
|
|
|
|
//
|
|
|
|
// * If we're requesting duplicate value checking, check that
|
|
|
|
// there isn't a value in the module with the same name.
|
|
|
|
//
|
|
|
|
// * If we're requesting duplicate type checking and duplicate
|
|
|
|
// value checking, check that there isn't a duplicate type
|
|
|
|
// and a duplicate value with the same name.
|
|
|
|
//
|
|
|
|
// * If no duplicate checking was requested at all, do
|
|
|
|
// nothing.
|
2012-10-15 20:04:15 -05:00
|
|
|
|
2013-06-23 11:48:43 -05:00
|
|
|
let mut duplicate_type = NoError;
|
2013-06-10 17:00:57 -05:00
|
|
|
let ns = match duplicate_checking_mode {
|
2012-10-15 20:04:15 -05:00
|
|
|
ForbidDuplicateModules => {
|
2014-01-19 02:21:14 -06:00
|
|
|
if child.get_module_if_available().is_some() {
|
2013-06-23 11:48:43 -05:00
|
|
|
duplicate_type = ModuleError;
|
|
|
|
}
|
2013-06-10 17:00:57 -05:00
|
|
|
Some(TypeNS)
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
|
|
|
ForbidDuplicateTypes => {
|
|
|
|
match child.def_for_namespace(TypeNS) {
|
2013-09-01 20:45:37 -05:00
|
|
|
Some(DefMod(_)) | None => {}
|
2013-06-23 11:48:43 -05:00
|
|
|
Some(_) => duplicate_type = TypeError
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
2013-06-10 17:00:57 -05:00
|
|
|
Some(TypeNS)
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
|
|
|
ForbidDuplicateValues => {
|
2013-06-23 11:48:43 -05:00
|
|
|
if child.defined_in_namespace(ValueNS) {
|
|
|
|
duplicate_type = ValueError;
|
|
|
|
}
|
2013-06-10 17:00:57 -05:00
|
|
|
Some(ValueNS)
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
|
|
|
ForbidDuplicateTypesAndValues => {
|
2013-06-10 17:00:57 -05:00
|
|
|
let mut n = None;
|
2012-10-15 20:04:15 -05:00
|
|
|
match child.def_for_namespace(TypeNS) {
|
2013-09-01 20:45:37 -05:00
|
|
|
Some(DefMod(_)) | None => {}
|
2013-06-10 17:00:57 -05:00
|
|
|
Some(_) => {
|
|
|
|
n = Some(TypeNS);
|
2013-06-23 11:48:43 -05:00
|
|
|
duplicate_type = TypeError;
|
2013-06-10 17:00:57 -05:00
|
|
|
}
|
2012-10-15 20:04:15 -05:00
|
|
|
};
|
|
|
|
if child.defined_in_namespace(ValueNS) {
|
2013-06-23 11:48:43 -05:00
|
|
|
duplicate_type = ValueError;
|
2013-06-10 17:00:57 -05:00
|
|
|
n = Some(ValueNS);
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
2013-06-10 17:00:57 -05:00
|
|
|
n
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
2013-06-10 17:00:57 -05:00
|
|
|
OverwriteDuplicates => None
|
|
|
|
};
|
2014-01-19 02:21:14 -06:00
|
|
|
if duplicate_type != NoError {
|
2012-10-15 20:04:15 -05:00
|
|
|
// Return an error here by looking up the namespace that
|
|
|
|
// had the duplicate.
|
2013-06-10 17:00:57 -05:00
|
|
|
let ns = ns.unwrap();
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(sp,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("duplicate definition of {} `{}`",
|
2013-06-23 11:48:43 -05:00
|
|
|
namespace_error_to_str(duplicate_type),
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(name)));
|
2013-06-10 16:50:12 -05:00
|
|
|
{
|
|
|
|
let r = child.span_for_namespace(ns);
|
2013-08-03 11:45:23 -05:00
|
|
|
for sp in r.iter() {
|
2013-06-10 16:50:12 -05:00
|
|
|
self.session.span_note(*sp,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("first definition of {} `{}` here",
|
2013-06-23 11:48:43 -05:00
|
|
|
namespace_error_to_str(duplicate_type),
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(name)));
|
2013-06-10 16:50:12 -05:00
|
|
|
}
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
2012-08-06 18:10:56 -05:00
|
|
|
}
|
2013-03-15 14:24:24 -05:00
|
|
|
return (child, new_parent);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn block_needs_anonymous_module(&mut self, block: &Block) -> bool {
|
2012-05-22 12:54:12 -05:00
|
|
|
// If the block has view items, we need an anonymous module.
|
2013-07-16 13:08:35 -05:00
|
|
|
if block.view_items.len() > 0 {
|
2012-08-01 19:30:05 -05:00
|
|
|
return true;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check each statement.
|
2013-08-03 11:45:23 -05:00
|
|
|
for statement in block.stmts.iter() {
|
2012-08-06 14:34:08 -05:00
|
|
|
match statement.node {
|
2013-09-01 20:45:37 -05:00
|
|
|
StmtDecl(declaration, _) => {
|
2012-08-06 14:34:08 -05:00
|
|
|
match declaration.node {
|
2013-09-01 20:45:37 -05:00
|
|
|
DeclItem(_) => {
|
2012-08-01 19:30:05 -05:00
|
|
|
return true;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Keep searching.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Keep searching.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we found neither view items nor items, we don't need to create
|
|
|
|
// an anonymous module.
|
|
|
|
|
2012-08-01 19:30:05 -05:00
|
|
|
return false;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn get_parent_link(&mut self, parent: ReducedGraphParent, name: Ident)
|
2013-05-31 17:17:22 -05:00
|
|
|
-> ParentLink {
|
2012-08-06 14:34:08 -05:00
|
|
|
match parent {
|
2012-08-03 21:59:04 -05:00
|
|
|
ModuleReducedGraphParent(module_) => {
|
2012-08-01 19:30:05 -05:00
|
|
|
return ModuleParentLink(module_, name);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Constructs the reduced graph for one item.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn build_reduced_graph_for_item(&mut self,
|
2014-01-09 07:05:33 -06:00
|
|
|
item: &Item,
|
|
|
|
parent: ReducedGraphParent)
|
|
|
|
-> ReducedGraphParent
|
2013-09-26 21:10:16 -05:00
|
|
|
{
|
2012-09-19 20:52:49 -05:00
|
|
|
let ident = item.ident;
|
2012-08-06 18:10:56 -05:00
|
|
|
let sp = item.span;
|
2014-01-09 07:05:33 -06:00
|
|
|
let is_public = item.vis == ast::Public;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-03-20 00:17:42 -05:00
|
|
|
match item.node {
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemMod(..) => {
|
2012-10-15 16:56:42 -05:00
|
|
|
let (name_bindings, new_parent) =
|
2012-10-15 20:04:15 -05:00
|
|
|
self.add_child(ident, parent, ForbidDuplicateModules, sp);
|
2012-08-06 18:10:56 -05:00
|
|
|
|
2012-09-19 20:52:49 -05:00
|
|
|
let parent_link = self.get_parent_link(new_parent, ident);
|
2013-09-01 20:45:37 -05:00
|
|
|
let def_id = DefId { crate: 0, node: item.id };
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name_bindings.define_module(parent_link,
|
2013-02-04 16:02:01 -06:00
|
|
|
Some(def_id),
|
|
|
|
NormalModuleKind,
|
2013-08-21 20:39:30 -05:00
|
|
|
false,
|
2014-01-09 07:05:33 -06:00
|
|
|
item.vis == ast::Public,
|
2013-02-04 16:02:01 -06:00
|
|
|
sp);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
ModuleReducedGraphParent(name_bindings.get_module())
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-10-15 20:04:15 -05:00
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemForeignMod(..) => parent,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// These items live in the value namespace.
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemStatic(_, m, _) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
let (name_bindings, _) =
|
|
|
|
self.add_child(ident, parent, ForbidDuplicateValues, sp);
|
2013-09-01 20:45:37 -05:00
|
|
|
let mutbl = m == ast::MutMutable;
|
2012-08-06 18:10:56 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
name_bindings.define_value
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
(DefStatic(local_def(item.id), mutbl), sp, is_public);
|
2013-09-26 21:10:16 -05:00
|
|
|
parent
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemFn(_, purity, _, _, _) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
let (name_bindings, new_parent) =
|
|
|
|
self.add_child(ident, parent, ForbidDuplicateValues, sp);
|
2012-08-06 18:10:56 -05:00
|
|
|
|
2013-09-01 20:45:37 -05:00
|
|
|
let def = DefFn(local_def(item.id), purity);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name_bindings.define_value(def, sp, is_public);
|
2013-09-26 21:10:16 -05:00
|
|
|
new_parent
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// These items live in the type namespace.
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemTy(..) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
let (name_bindings, _) =
|
|
|
|
self.add_child(ident, parent, ForbidDuplicateTypes, sp);
|
2012-08-06 18:10:56 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
name_bindings.define_type
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
(DefTy(local_def(item.id)), sp, is_public);
|
2013-09-26 21:10:16 -05:00
|
|
|
parent
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemEnum(ref enum_definition, _) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
let (name_bindings, new_parent) =
|
|
|
|
self.add_child(ident, parent, ForbidDuplicateTypes, sp);
|
2012-08-06 18:10:56 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
name_bindings.define_type
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
(DefTy(local_def(item.id)), sp, is_public);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-11-30 16:00:39 -06:00
|
|
|
for &variant in (*enum_definition).variants.iter() {
|
2013-06-11 21:55:16 -05:00
|
|
|
self.build_reduced_graph_for_variant(
|
|
|
|
variant,
|
2012-11-29 14:08:40 -06:00
|
|
|
local_def(item.id),
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
new_parent,
|
|
|
|
is_public);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-09-26 21:10:16 -05:00
|
|
|
parent
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-13 17:17:35 -05:00
|
|
|
|
|
|
|
// These items live in both the type and value namespaces.
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemStruct(struct_def, _) => {
|
2013-06-10 16:29:48 -05:00
|
|
|
// Adding to both Type and Value namespaces or just Type?
|
|
|
|
let (forbid, ctor_id) = match struct_def.ctor_id {
|
|
|
|
Some(ctor_id) => (ForbidDuplicateTypesAndValues, Some(ctor_id)),
|
|
|
|
None => (ForbidDuplicateTypes, None)
|
|
|
|
};
|
2012-08-08 13:52:23 -05:00
|
|
|
|
2013-06-10 16:29:48 -05:00
|
|
|
let (name_bindings, new_parent) = self.add_child(ident, parent, forbid, sp);
|
|
|
|
|
|
|
|
// Define a name in the type namespace.
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name_bindings.define_type(DefTy(local_def(item.id)), sp, is_public);
|
2013-06-10 16:29:48 -05:00
|
|
|
|
|
|
|
// If this is a newtype or unit-like struct, define a name
|
|
|
|
// in the value namespace as well
|
2013-11-21 17:42:55 -06:00
|
|
|
ctor_id.while_some(|cid| {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name_bindings.define_value(DefStruct(local_def(cid)), sp,
|
|
|
|
is_public);
|
2013-06-10 16:29:48 -05:00
|
|
|
None
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-23 20:44:59 -05:00
|
|
|
// Record the def ID of this struct.
|
2013-03-22 21:26:41 -05:00
|
|
|
self.structs.insert(local_def(item.id));
|
2012-07-23 20:44:59 -05:00
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
new_parent
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemImpl(_, None, ty, ref methods) => {
|
2013-06-14 20:21:47 -05:00
|
|
|
// If this implements an anonymous trait, then add all the
|
|
|
|
// methods within to a new module, if the type was defined
|
|
|
|
// within this module.
|
2012-10-15 20:04:15 -05:00
|
|
|
//
|
|
|
|
// FIXME (#3785): This is quite unsatisfactory. Perhaps we
|
|
|
|
// should modify anonymous traits to only be implementable in
|
|
|
|
// the same module that declared the type.
|
|
|
|
|
2013-06-14 20:21:47 -05:00
|
|
|
// Create the module and add all methods.
|
2013-11-30 16:00:39 -06:00
|
|
|
match ty.node {
|
2014-01-09 07:05:33 -06:00
|
|
|
TyPath(ref path, _, _) if path.segments.len() == 1 => {
|
2012-10-15 20:04:15 -05:00
|
|
|
let name = path_to_ident(path);
|
|
|
|
|
2013-12-21 17:32:44 -06:00
|
|
|
let existing_parent_opt = {
|
2013-11-01 20:06:31 -05:00
|
|
|
let children = parent.module().children.borrow();
|
2013-12-21 17:32:44 -06:00
|
|
|
children.get().find_copy(&name.name)
|
|
|
|
};
|
|
|
|
let new_parent = match existing_parent_opt {
|
2013-06-09 06:35:24 -05:00
|
|
|
// It already exists
|
2013-12-21 17:32:44 -06:00
|
|
|
Some(child) if child.get_module_if_available()
|
|
|
|
.is_some() &&
|
|
|
|
child.get_module().kind.get() ==
|
2013-06-14 20:21:47 -05:00
|
|
|
ImplModuleKind => {
|
2013-06-09 06:35:24 -05:00
|
|
|
ModuleReducedGraphParent(child.get_module())
|
|
|
|
}
|
|
|
|
// Create the module
|
|
|
|
_ => {
|
|
|
|
let (name_bindings, new_parent) =
|
|
|
|
self.add_child(name,
|
|
|
|
parent,
|
|
|
|
ForbidDuplicateModules,
|
|
|
|
sp);
|
|
|
|
|
2013-06-14 20:21:47 -05:00
|
|
|
let parent_link =
|
|
|
|
self.get_parent_link(new_parent, ident);
|
2013-06-09 06:35:24 -05:00
|
|
|
let def_id = local_def(item.id);
|
2013-12-17 01:32:37 -06:00
|
|
|
let ns = TypeNS;
|
|
|
|
let is_public =
|
|
|
|
!name_bindings.defined_in_namespace(ns) ||
|
|
|
|
name_bindings.defined_in_public_namespace(ns);
|
|
|
|
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name_bindings.define_module(parent_link,
|
2013-06-09 06:35:24 -05:00
|
|
|
Some(def_id),
|
|
|
|
ImplModuleKind,
|
2013-08-21 20:39:30 -05:00
|
|
|
false,
|
2013-12-17 01:32:37 -06:00
|
|
|
is_public,
|
2013-06-09 06:35:24 -05:00
|
|
|
sp);
|
|
|
|
|
2013-06-14 20:21:47 -05:00
|
|
|
ModuleReducedGraphParent(
|
|
|
|
name_bindings.get_module())
|
2013-06-09 06:35:24 -05:00
|
|
|
}
|
|
|
|
};
|
2012-10-15 20:04:15 -05:00
|
|
|
|
2013-06-14 20:21:47 -05:00
|
|
|
// For each method...
|
2013-08-03 11:45:23 -05:00
|
|
|
for method in methods.iter() {
|
2013-06-14 20:21:47 -05:00
|
|
|
// Add the method to the module.
|
|
|
|
let ident = method.ident;
|
|
|
|
let (method_name_bindings, _) =
|
|
|
|
self.add_child(ident,
|
|
|
|
new_parent,
|
|
|
|
ForbidDuplicateValues,
|
|
|
|
method.span);
|
|
|
|
let def = match method.explicit_self.node {
|
2014-01-09 07:05:33 -06:00
|
|
|
SelfStatic => {
|
2013-08-08 13:38:10 -05:00
|
|
|
// Static methods become
|
|
|
|
// `def_static_method`s.
|
2013-09-01 20:45:37 -05:00
|
|
|
DefStaticMethod(local_def(method.id),
|
2013-08-08 13:38:10 -05:00
|
|
|
FromImpl(local_def(
|
|
|
|
item.id)),
|
|
|
|
method.purity)
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
2013-06-14 20:21:47 -05:00
|
|
|
_ => {
|
|
|
|
// Non-static methods become
|
|
|
|
// `def_method`s.
|
2013-09-01 20:45:37 -05:00
|
|
|
DefMethod(local_def(method.id), None)
|
2013-06-14 20:21:47 -05:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
let is_public = method.vis == ast::Public;
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
method_name_bindings.define_value(def,
|
|
|
|
method.span,
|
|
|
|
is_public);
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
}
|
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
parent
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemImpl(_, Some(_), _, _) => parent,
|
2013-06-14 20:21:47 -05:00
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemTrait(_, _, ref methods) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
let (name_bindings, new_parent) =
|
|
|
|
self.add_child(ident, parent, ForbidDuplicateTypes, sp);
|
2012-08-06 18:10:56 -05:00
|
|
|
|
2013-06-14 20:21:47 -05:00
|
|
|
// Add all the methods within to a new module.
|
|
|
|
let parent_link = self.get_parent_link(parent, ident);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name_bindings.define_module(parent_link,
|
2013-06-14 20:21:47 -05:00
|
|
|
Some(local_def(item.id)),
|
|
|
|
TraitModuleKind,
|
2013-08-21 20:39:30 -05:00
|
|
|
false,
|
2014-01-09 07:05:33 -06:00
|
|
|
item.vis == ast::Public,
|
2013-06-14 20:21:47 -05:00
|
|
|
sp);
|
|
|
|
let module_parent = ModuleReducedGraphParent(name_bindings.
|
|
|
|
get_module());
|
2012-11-12 14:15:08 -06:00
|
|
|
|
2012-07-11 17:00:40 -05:00
|
|
|
// Add the names of all the methods to the trait info.
|
2013-06-11 13:19:47 -05:00
|
|
|
let mut method_names = HashMap::new();
|
2013-08-03 11:45:23 -05:00
|
|
|
for method in methods.iter() {
|
2013-02-18 00:20:36 -06:00
|
|
|
let ty_m = trait_method_to_ty_method(method);
|
2012-08-02 18:01:38 -05:00
|
|
|
|
2012-09-19 20:52:49 -05:00
|
|
|
let ident = ty_m.ident;
|
2012-11-12 14:15:08 -06:00
|
|
|
|
2013-06-14 20:21:47 -05:00
|
|
|
// Add it as a name in the trait module.
|
|
|
|
let def = match ty_m.explicit_self.node {
|
2014-01-09 07:05:33 -06:00
|
|
|
SelfStatic => {
|
2013-06-14 20:21:47 -05:00
|
|
|
// Static methods become `def_static_method`s.
|
2013-09-01 20:45:37 -05:00
|
|
|
DefStaticMethod(local_def(ty_m.id),
|
2013-08-08 13:38:10 -05:00
|
|
|
FromTrait(local_def(item.id)),
|
2013-06-14 20:21:47 -05:00
|
|
|
ty_m.purity)
|
2012-11-12 14:15:08 -06:00
|
|
|
}
|
|
|
|
_ => {
|
2013-06-14 20:21:47 -05:00
|
|
|
// Non-static methods become `def_method`s.
|
2013-09-01 20:45:37 -05:00
|
|
|
DefMethod(local_def(ty_m.id),
|
2013-06-14 20:21:47 -05:00
|
|
|
Some(local_def(item.id)))
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let (method_name_bindings, _) =
|
|
|
|
self.add_child(ident,
|
|
|
|
module_parent,
|
|
|
|
ForbidDuplicateValues,
|
|
|
|
ty_m.span);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
method_name_bindings.define_value(def, ty_m.span, true);
|
2013-06-14 20:21:47 -05:00
|
|
|
|
|
|
|
// Add it to the trait info if not static.
|
|
|
|
match ty_m.explicit_self.node {
|
2014-01-09 07:05:33 -06:00
|
|
|
SelfStatic => {}
|
2013-06-14 20:21:47 -05:00
|
|
|
_ => {
|
2013-06-26 17:56:13 -05:00
|
|
|
method_names.insert(ident.name, ());
|
2012-11-12 14:15:08 -06:00
|
|
|
}
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let def_id = local_def(item.id);
|
2013-08-03 11:45:23 -05:00
|
|
|
for (name, _) in method_names.iter() {
|
2013-12-21 19:04:42 -06:00
|
|
|
let mut method_map = self.method_map.borrow_mut();
|
|
|
|
if !method_map.get().contains_key(name) {
|
|
|
|
method_map.get().insert(*name, HashSet::new());
|
2013-05-20 11:41:20 -05:00
|
|
|
}
|
2013-12-21 19:04:42 -06:00
|
|
|
match method_map.get().find_mut(name) {
|
2013-05-20 11:41:20 -05:00
|
|
|
Some(s) => { s.insert(def_id); },
|
2014-02-06 03:38:08 -06:00
|
|
|
_ => fail!("can't happen"),
|
2013-05-20 11:41:20 -05:00
|
|
|
}
|
|
|
|
}
|
2012-07-11 17:00:40 -05:00
|
|
|
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name_bindings.define_type(DefTrait(def_id), sp, is_public);
|
2013-09-26 21:10:16 -05:00
|
|
|
new_parent
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-12-25 12:10:33 -06:00
|
|
|
ItemMac(..) => parent
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-07 21:12:58 -05:00
|
|
|
// Constructs the reduced graph for one variant. Variants exist in the
|
|
|
|
// type and/or value namespaces.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn build_reduced_graph_for_variant(&mut self,
|
2014-01-09 07:05:33 -06:00
|
|
|
variant: &Variant,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
item_id: DefId,
|
|
|
|
parent: ReducedGraphParent,
|
|
|
|
parent_public: bool) {
|
2012-09-19 20:52:49 -05:00
|
|
|
let ident = variant.node.name;
|
2014-01-26 02:43:42 -06:00
|
|
|
// FIXME: this is unfortunate to have to do this privacy calculation
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
// here. This should be living in middle::privacy, but it's
|
|
|
|
// necessary to keep around in some form becaues of glob imports...
|
2014-01-09 07:05:33 -06:00
|
|
|
let is_public = parent_public && variant.node.vis != ast::Private;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-07 21:12:58 -05:00
|
|
|
match variant.node.kind {
|
2014-01-09 07:05:33 -06:00
|
|
|
TupleVariantKind(_) => {
|
2013-06-20 18:14:57 -05:00
|
|
|
let (child, _) = self.add_child(ident, parent, ForbidDuplicateValues,
|
|
|
|
variant.span);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
child.define_value(DefVariant(item_id,
|
|
|
|
local_def(variant.node.id), false),
|
|
|
|
variant.span, is_public);
|
2012-08-07 21:12:58 -05:00
|
|
|
}
|
2014-01-09 07:05:33 -06:00
|
|
|
StructVariantKind(_) => {
|
2013-06-20 18:14:57 -05:00
|
|
|
let (child, _) = self.add_child(ident, parent, ForbidDuplicateTypesAndValues,
|
|
|
|
variant.span);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
child.define_type(DefVariant(item_id,
|
|
|
|
local_def(variant.node.id), true),
|
|
|
|
variant.span, is_public);
|
2013-03-22 21:26:41 -05:00
|
|
|
self.structs.insert(local_def(variant.node.id));
|
2012-08-07 21:12:58 -05:00
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-05-16 17:37:52 -05:00
|
|
|
/// Constructs the reduced graph for one 'view item'. View items consist
|
|
|
|
/// of imports and use directives.
|
2014-01-09 07:05:33 -06:00
|
|
|
fn build_reduced_graph_for_view_item(&mut self, view_item: &ViewItem,
|
|
|
|
parent: ReducedGraphParent) {
|
2013-03-20 00:17:42 -05:00
|
|
|
match view_item.node {
|
2014-01-09 07:05:33 -06:00
|
|
|
ViewItemUse(ref view_paths) => {
|
2013-08-03 11:45:23 -05:00
|
|
|
for view_path in view_paths.iter() {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Extract and intern the module part of the path. For
|
|
|
|
// globs and lists, the path is found directly in the AST;
|
|
|
|
// for simple paths we have to munge the path a little.
|
|
|
|
|
2013-03-07 17:37:14 -06:00
|
|
|
let mut module_path = ~[];
|
2012-08-06 14:34:08 -05:00
|
|
|
match view_path.node {
|
2014-01-09 07:05:33 -06:00
|
|
|
ViewPathSimple(_, ref full_path, _) => {
|
2013-08-07 11:47:28 -05:00
|
|
|
let path_len = full_path.segments.len();
|
2013-03-28 20:39:09 -05:00
|
|
|
assert!(path_len != 0);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-08-07 11:47:28 -05:00
|
|
|
for (i, segment) in full_path.segments
|
|
|
|
.iter()
|
|
|
|
.enumerate() {
|
2012-11-29 14:08:40 -06:00
|
|
|
if i != path_len - 1 {
|
2013-08-07 11:47:28 -05:00
|
|
|
module_path.push(segment.identifier)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ViewPathGlob(ref module_ident_path, _) |
|
|
|
|
ViewPathList(ref module_ident_path, _, _) => {
|
2013-08-07 11:47:28 -05:00
|
|
|
for segment in module_ident_path.segments.iter() {
|
|
|
|
module_path.push(segment.identifier)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build up the import directives.
|
2012-07-31 18:38:41 -05:00
|
|
|
let module_ = self.get_module_from_parent(parent);
|
2014-01-09 07:05:33 -06:00
|
|
|
let is_public = view_item.vis == ast::Public;
|
2012-08-06 14:34:08 -05:00
|
|
|
match view_path.node {
|
2014-01-09 07:05:33 -06:00
|
|
|
ViewPathSimple(binding, ref full_path, id) => {
|
2013-08-07 11:47:28 -05:00
|
|
|
let source_ident =
|
2013-12-23 08:08:23 -06:00
|
|
|
full_path.segments.last().unwrap().identifier;
|
2012-07-18 18:18:02 -05:00
|
|
|
let subclass = @SingleImport(binding,
|
2013-03-26 21:53:33 -05:00
|
|
|
source_ident);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.build_import_directive(module_,
|
2012-05-22 12:54:12 -05:00
|
|
|
module_path,
|
2012-07-06 21:06:58 -05:00
|
|
|
subclass,
|
2013-04-30 00:15:17 -05:00
|
|
|
view_path.span,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
id,
|
|
|
|
is_public);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2014-01-09 07:05:33 -06:00
|
|
|
ViewPathList(_, ref source_idents, _) => {
|
2013-08-03 11:45:23 -05:00
|
|
|
for source_ident in source_idents.iter() {
|
2012-05-22 12:54:12 -05:00
|
|
|
let name = source_ident.node.name;
|
2013-03-26 21:53:33 -05:00
|
|
|
let subclass = @SingleImport(name, name);
|
2013-07-02 14:47:32 -05:00
|
|
|
self.build_import_directive(
|
|
|
|
module_,
|
|
|
|
module_path.clone(),
|
|
|
|
subclass,
|
|
|
|
source_ident.span,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
source_ident.node.id,
|
|
|
|
is_public);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2014-01-09 07:05:33 -06:00
|
|
|
ViewPathGlob(_, id) => {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.build_import_directive(module_,
|
2012-05-22 12:54:12 -05:00
|
|
|
module_path,
|
2012-07-06 21:06:58 -05:00
|
|
|
@GlobImport,
|
2013-04-30 00:15:17 -05:00
|
|
|
view_path.span,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
id,
|
|
|
|
is_public);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ViewItemExternMod(name, _, node_id) => {
|
2013-07-31 15:47:32 -05:00
|
|
|
// n.b. we don't need to look at the path option here, because cstore already did
|
2013-12-25 14:08:04 -06:00
|
|
|
match self.session.cstore.find_extern_mod_stmt_cnum(node_id) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(crate_id) => {
|
2013-09-01 20:45:37 -05:00
|
|
|
let def_id = DefId { crate: crate_id, node: 0 };
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.external_exports.insert(def_id);
|
2012-05-22 12:54:12 -05:00
|
|
|
let parent_link = ModuleParentLink
|
2013-03-26 21:53:33 -05:00
|
|
|
(self.get_module_from_parent(parent), name);
|
2013-12-19 21:02:22 -06:00
|
|
|
let external_module = @Module::new(parent_link,
|
2013-01-30 19:20:02 -06:00
|
|
|
Some(def_id),
|
2013-08-21 20:39:30 -05:00
|
|
|
NormalModuleKind,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
false,
|
|
|
|
true);
|
2013-03-26 21:53:33 -05:00
|
|
|
|
2013-12-21 16:05:26 -06:00
|
|
|
{
|
|
|
|
let mut external_module_children =
|
2013-11-01 20:06:31 -05:00
|
|
|
parent.module().external_module_children.borrow_mut();
|
2013-12-21 16:05:26 -06:00
|
|
|
external_module_children.get().insert(
|
|
|
|
name.name,
|
|
|
|
external_module);
|
|
|
|
}
|
2013-03-26 21:53:33 -05:00
|
|
|
|
|
|
|
self.build_reduced_graph_for_external_crate(
|
|
|
|
external_module);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-26 21:53:33 -05:00
|
|
|
None => {} // Ignore.
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Constructs the reduced graph for one foreign item.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn build_reduced_graph_for_foreign_item(&mut self,
|
2014-01-09 07:05:33 -06:00
|
|
|
foreign_item: &ForeignItem,
|
2013-11-19 15:22:03 -06:00
|
|
|
parent: ReducedGraphParent,
|
|
|
|
f: |&mut Resolver,
|
|
|
|
ReducedGraphParent|) {
|
2012-07-18 18:18:02 -05:00
|
|
|
let name = foreign_item.ident;
|
2014-01-09 07:05:33 -06:00
|
|
|
let is_public = foreign_item.vis == ast::Public;
|
2012-08-25 17:09:33 -05:00
|
|
|
let (name_bindings, new_parent) =
|
2012-10-15 20:04:15 -05:00
|
|
|
self.add_child(name, parent, ForbidDuplicateValues,
|
|
|
|
foreign_item.span);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-14 23:50:03 -06:00
|
|
|
match foreign_item.node {
|
2014-01-09 07:05:33 -06:00
|
|
|
ForeignItemFn(_, ref generics) => {
|
|
|
|
let def = DefFn(local_def(foreign_item.id), UnsafeFn);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name_bindings.define_value(def, foreign_item.span, is_public);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-11-21 17:42:55 -06:00
|
|
|
self.with_type_parameter_rib(
|
|
|
|
HasTypeParameters(generics,
|
|
|
|
foreign_item.id,
|
|
|
|
0,
|
|
|
|
NormalRibKind),
|
|
|
|
|this| f(this, new_parent));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2014-01-09 07:05:33 -06:00
|
|
|
ForeignItemStatic(_, m) => {
|
2013-09-01 20:45:37 -05:00
|
|
|
let def = DefStatic(local_def(foreign_item.id), m);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name_bindings.define_value(def, foreign_item.span, is_public);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
f(self, new_parent)
|
2012-08-25 17:09:33 -05:00
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn build_reduced_graph_for_block(&mut self,
|
2013-07-19 00:38:55 -05:00
|
|
|
block: &Block,
|
2013-09-26 21:10:16 -05:00
|
|
|
parent: ReducedGraphParent)
|
|
|
|
-> ReducedGraphParent
|
|
|
|
{
|
2012-05-22 12:54:12 -05:00
|
|
|
if self.block_needs_anonymous_module(block) {
|
2013-07-16 13:08:35 -05:00
|
|
|
let block_id = block.id;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for block) creating a new \
|
2013-09-28 00:38:08 -05:00
|
|
|
anonymous module for block {}",
|
2012-08-22 19:24:52 -05:00
|
|
|
block_id);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
let parent_module = self.get_module_from_parent(parent);
|
2013-12-19 21:02:22 -06:00
|
|
|
let new_module = @Module::new(
|
2013-02-21 13:08:50 -06:00
|
|
|
BlockParentLink(parent_module, block_id),
|
|
|
|
None,
|
2013-08-21 20:39:30 -05:00
|
|
|
AnonymousModuleKind,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
false,
|
2013-08-21 20:39:30 -05:00
|
|
|
false);
|
2013-12-21 16:23:40 -06:00
|
|
|
{
|
|
|
|
let mut anonymous_children = parent_module.anonymous_children
|
|
|
|
.borrow_mut();
|
|
|
|
anonymous_children.get().insert(block_id, new_module);
|
|
|
|
ModuleReducedGraphParent(new_module)
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
} else {
|
2013-09-26 21:10:16 -05:00
|
|
|
parent
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
fn handle_external_def(&mut self,
|
2013-09-01 20:45:37 -05:00
|
|
|
def: Def,
|
2014-01-09 07:05:33 -06:00
|
|
|
vis: Visibility,
|
2013-12-21 16:20:57 -06:00
|
|
|
child_name_bindings: @NameBindings,
|
2013-08-21 19:26:33 -05:00
|
|
|
final_ident: &str,
|
2013-09-01 19:50:59 -05:00
|
|
|
ident: Ident,
|
2013-08-21 19:26:33 -05:00
|
|
|
new_parent: ReducedGraphParent) {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for \
|
2013-09-28 00:38:08 -05:00
|
|
|
external crate) building external def, priv {:?}",
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
vis);
|
2014-01-09 07:05:33 -06:00
|
|
|
let is_public = vis == ast::Public;
|
2013-10-07 15:01:47 -05:00
|
|
|
let is_exported = is_public && match new_parent {
|
|
|
|
ModuleReducedGraphParent(module) => {
|
2013-12-19 20:56:20 -06:00
|
|
|
match module.def_id.get() {
|
2013-10-07 15:01:47 -05:00
|
|
|
None => true,
|
|
|
|
Some(did) => self.external_exports.contains(&did)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
if is_exported {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.external_exports.insert(def_id_of_def(def));
|
|
|
|
}
|
2012-08-02 18:01:38 -05:00
|
|
|
match def {
|
2013-09-01 20:45:37 -05:00
|
|
|
DefMod(def_id) | DefForeignMod(def_id) | DefStruct(def_id) |
|
|
|
|
DefTy(def_id) => {
|
2013-12-21 16:13:06 -06:00
|
|
|
match child_name_bindings.type_def.get() {
|
2013-11-28 14:22:53 -06:00
|
|
|
Some(TypeNsDef { module_def: Some(module_def), .. }) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for external crate) \
|
2012-10-15 20:04:15 -05:00
|
|
|
already created module");
|
2013-12-19 20:56:20 -06:00
|
|
|
module_def.def_id.set(Some(def_id));
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
|
|
|
Some(_) | None => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for \
|
2012-08-02 18:01:38 -05:00
|
|
|
external crate) building module \
|
2013-09-28 00:38:08 -05:00
|
|
|
{}", final_ident);
|
2012-09-19 20:52:49 -05:00
|
|
|
let parent_link = self.get_parent_link(new_parent, ident);
|
2012-08-02 18:01:38 -05:00
|
|
|
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
child_name_bindings.define_module(parent_link,
|
2013-08-21 19:26:33 -05:00
|
|
|
Some(def_id),
|
|
|
|
NormalModuleKind,
|
2013-08-21 20:39:30 -05:00
|
|
|
true,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
is_public,
|
2014-01-01 00:53:22 -06:00
|
|
|
DUMMY_SP);
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-08-23 20:31:43 -05:00
|
|
|
_ => {}
|
|
|
|
}
|
|
|
|
|
|
|
|
match def {
|
2013-09-01 20:45:37 -05:00
|
|
|
DefMod(_) | DefForeignMod(_) => {}
|
2013-09-08 19:36:01 -05:00
|
|
|
DefVariant(_, variant_id, is_struct) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for external crate) building \
|
2013-09-28 00:38:08 -05:00
|
|
|
variant {}",
|
2013-05-16 17:37:52 -05:00
|
|
|
final_ident);
|
|
|
|
// We assume the parent is visible, or else we wouldn't have seen
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
// it. Also variants are public-by-default if the parent was also
|
|
|
|
// public.
|
2014-01-09 07:05:33 -06:00
|
|
|
let is_public = vis != ast::Private;
|
2013-09-08 19:36:01 -05:00
|
|
|
if is_struct {
|
2014-01-01 00:53:22 -06:00
|
|
|
child_name_bindings.define_type(def, DUMMY_SP, is_public);
|
2013-09-08 19:36:01 -05:00
|
|
|
self.structs.insert(variant_id);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
} else {
|
2014-01-01 00:53:22 -06:00
|
|
|
child_name_bindings.define_value(def, DUMMY_SP, is_public);
|
2013-09-08 19:36:01 -05:00
|
|
|
}
|
2013-05-16 17:37:52 -05:00
|
|
|
}
|
2013-11-28 14:22:53 -06:00
|
|
|
DefFn(..) | DefStaticMethod(..) | DefStatic(..) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for external \
|
2013-09-28 00:38:08 -05:00
|
|
|
crate) building value (fn/static) {}", final_ident);
|
2014-01-01 00:53:22 -06:00
|
|
|
child_name_bindings.define_value(def, DUMMY_SP, is_public);
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
DefTrait(def_id) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for external \
|
2013-09-28 00:38:08 -05:00
|
|
|
crate) building type {}", final_ident);
|
2013-03-27 09:26:57 -05:00
|
|
|
|
|
|
|
// If this is a trait, add all the method names
|
|
|
|
// to the trait info.
|
|
|
|
|
2013-05-13 18:13:20 -05:00
|
|
|
let method_def_ids =
|
2013-12-25 14:08:04 -06:00
|
|
|
csearch::get_trait_method_def_ids(self.session.cstore, def_id);
|
2013-03-27 09:26:57 -05:00
|
|
|
let mut interned_method_names = HashSet::new();
|
2013-08-03 11:45:23 -05:00
|
|
|
for &method_def_id in method_def_ids.iter() {
|
2013-04-30 10:49:48 -05:00
|
|
|
let (method_name, explicit_self) =
|
2013-12-25 14:08:04 -06:00
|
|
|
csearch::get_method_name_and_explicit_self(self.session.cstore,
|
|
|
|
method_def_id);
|
2013-03-27 09:26:57 -05:00
|
|
|
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for \
|
2013-03-27 09:26:57 -05:00
|
|
|
external crate) ... adding \
|
2013-09-28 00:38:08 -05:00
|
|
|
trait method '{}'",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(method_name));
|
2013-03-27 09:26:57 -05:00
|
|
|
|
|
|
|
// Add it to the trait info if not static.
|
2014-01-09 07:05:33 -06:00
|
|
|
if explicit_self != SelfStatic {
|
2013-06-26 17:56:13 -05:00
|
|
|
interned_method_names.insert(method_name.name);
|
2013-03-27 09:26:57 -05:00
|
|
|
}
|
2013-10-07 15:01:47 -05:00
|
|
|
if is_exported {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.external_exports.insert(method_def_id);
|
|
|
|
}
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
2013-08-03 11:45:23 -05:00
|
|
|
for name in interned_method_names.iter() {
|
2013-12-21 19:04:42 -06:00
|
|
|
let mut method_map = self.method_map.borrow_mut();
|
|
|
|
if !method_map.get().contains_key(name) {
|
|
|
|
method_map.get().insert(*name, HashSet::new());
|
2013-05-20 11:41:20 -05:00
|
|
|
}
|
2013-12-21 19:04:42 -06:00
|
|
|
match method_map.get().find_mut(name) {
|
2013-05-20 11:41:20 -05:00
|
|
|
Some(s) => { s.insert(def_id); },
|
2014-02-06 03:38:08 -06:00
|
|
|
_ => fail!("can't happen"),
|
2013-05-20 11:41:20 -05:00
|
|
|
}
|
|
|
|
}
|
2012-08-02 18:01:38 -05:00
|
|
|
|
2014-01-01 00:53:22 -06:00
|
|
|
child_name_bindings.define_type(def, DUMMY_SP, is_public);
|
2013-05-13 18:13:20 -05:00
|
|
|
|
|
|
|
// Define a module if necessary.
|
|
|
|
let parent_link = self.get_parent_link(new_parent, ident);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
child_name_bindings.set_module_kind(parent_link,
|
2013-05-13 18:13:20 -05:00
|
|
|
Some(def_id),
|
|
|
|
TraitModuleKind,
|
2013-08-21 20:39:30 -05:00
|
|
|
true,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
is_public,
|
2014-01-01 00:53:22 -06:00
|
|
|
DUMMY_SP)
|
2013-03-27 09:26:57 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
DefTy(_) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for external \
|
2013-09-28 00:38:08 -05:00
|
|
|
crate) building type {}", final_ident);
|
2013-03-27 09:26:57 -05:00
|
|
|
|
2014-01-01 00:53:22 -06:00
|
|
|
child_name_bindings.define_type(def, DUMMY_SP, is_public);
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
DefStruct(def_id) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for external \
|
2013-09-28 00:38:08 -05:00
|
|
|
crate) building type and value for {}",
|
2012-10-08 13:49:01 -05:00
|
|
|
final_ident);
|
2014-01-01 00:53:22 -06:00
|
|
|
child_name_bindings.define_type(def, DUMMY_SP, is_public);
|
2013-12-25 14:08:04 -06:00
|
|
|
if csearch::get_struct_fields(self.session.cstore, def_id).len() == 0 {
|
2014-01-01 00:53:22 -06:00
|
|
|
child_name_bindings.define_value(def, DUMMY_SP, is_public);
|
2013-08-07 13:52:33 -05:00
|
|
|
}
|
2013-03-22 21:26:41 -05:00
|
|
|
self.structs.insert(def_id);
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
2013-11-28 14:22:53 -06:00
|
|
|
DefMethod(..) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for external crate) \
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
ignoring {:?}", def);
|
|
|
|
// Ignored; handled elsewhere.
|
2013-06-14 20:21:47 -05:00
|
|
|
}
|
2014-01-27 06:18:36 -06:00
|
|
|
DefArg(..) | DefLocal(..) | DefPrimTy(..) |
|
|
|
|
DefTyParam(..) | DefBinding(..) |
|
2013-11-28 14:22:53 -06:00
|
|
|
DefUse(..) | DefUpvar(..) | DefRegion(..) |
|
|
|
|
DefTyParamBinder(..) | DefLabel(..) | DefSelfTy(..) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!("didn't expect `{:?}`", def);
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-21 19:26:33 -05:00
|
|
|
/// Builds the reduced graph for a single item in an external crate.
|
2013-09-26 21:10:16 -05:00
|
|
|
fn build_reduced_graph_for_external_crate_def(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
root: @Module,
|
2013-08-31 11:13:04 -05:00
|
|
|
def_like: DefLike,
|
2013-08-07 02:11:34 -05:00
|
|
|
ident: Ident,
|
2014-01-09 07:05:33 -06:00
|
|
|
visibility: Visibility) {
|
2013-08-21 19:26:33 -05:00
|
|
|
match def_like {
|
2013-08-31 11:13:04 -05:00
|
|
|
DlDef(def) => {
|
2013-08-21 19:26:33 -05:00
|
|
|
// Add the new child item, if necessary.
|
2013-08-21 20:39:30 -05:00
|
|
|
match def {
|
2013-09-01 20:45:37 -05:00
|
|
|
DefForeignMod(def_id) => {
|
2013-08-21 20:39:30 -05:00
|
|
|
// Foreign modules have no names. Recur and populate
|
|
|
|
// eagerly.
|
2013-11-21 17:42:55 -06:00
|
|
|
csearch::each_child_of_item(self.session.cstore,
|
|
|
|
def_id,
|
|
|
|
|def_like,
|
|
|
|
child_ident,
|
|
|
|
vis| {
|
2013-08-21 20:39:30 -05:00
|
|
|
self.build_reduced_graph_for_external_crate_def(
|
|
|
|
root,
|
|
|
|
def_like,
|
2013-08-07 02:11:34 -05:00
|
|
|
child_ident,
|
|
|
|
vis)
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2013-08-21 20:39:30 -05:00
|
|
|
}
|
2013-08-21 19:26:33 -05:00
|
|
|
_ => {
|
|
|
|
let (child_name_bindings, new_parent) =
|
|
|
|
self.add_child(ident,
|
|
|
|
ModuleReducedGraphParent(root),
|
|
|
|
OverwriteDuplicates,
|
2014-01-01 00:53:22 -06:00
|
|
|
DUMMY_SP);
|
2013-08-21 19:26:33 -05:00
|
|
|
|
|
|
|
self.handle_external_def(def,
|
2013-08-07 02:11:34 -05:00
|
|
|
visibility,
|
2013-08-21 19:26:33 -05:00
|
|
|
child_name_bindings,
|
|
|
|
self.session.str_of(ident),
|
|
|
|
ident,
|
|
|
|
new_parent);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-08-31 11:13:04 -05:00
|
|
|
DlImpl(def) => {
|
2013-08-21 19:26:33 -05:00
|
|
|
// We only process static methods of impls here.
|
2013-12-25 14:08:04 -06:00
|
|
|
match csearch::get_type_name_if_impl(self.session.cstore, def) {
|
2013-08-21 19:26:33 -05:00
|
|
|
None => {}
|
|
|
|
Some(final_ident) => {
|
|
|
|
let static_methods_opt =
|
2013-12-25 14:08:04 -06:00
|
|
|
csearch::get_static_methods_if_impl(self.session.cstore, def);
|
2013-08-21 19:26:33 -05:00
|
|
|
match static_methods_opt {
|
|
|
|
Some(ref static_methods) if
|
|
|
|
static_methods.len() >= 1 => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for \
|
2013-08-21 19:26:33 -05:00
|
|
|
external crate) processing \
|
2013-09-28 00:38:08 -05:00
|
|
|
static methods for type name {}",
|
2013-08-21 19:26:33 -05:00
|
|
|
self.session.str_of(
|
|
|
|
final_ident));
|
|
|
|
|
|
|
|
let (child_name_bindings, new_parent) =
|
|
|
|
self.add_child(
|
|
|
|
final_ident,
|
|
|
|
ModuleReducedGraphParent(root),
|
|
|
|
OverwriteDuplicates,
|
2014-01-01 00:53:22 -06:00
|
|
|
DUMMY_SP);
|
2013-08-21 19:26:33 -05:00
|
|
|
|
|
|
|
// Process the static methods. First,
|
|
|
|
// create the module.
|
|
|
|
let type_module;
|
2013-12-21 16:13:06 -06:00
|
|
|
match child_name_bindings.type_def.get() {
|
2013-08-21 19:26:33 -05:00
|
|
|
Some(TypeNsDef {
|
|
|
|
module_def: Some(module_def),
|
2013-11-28 14:22:53 -06:00
|
|
|
..
|
2013-08-21 19:26:33 -05:00
|
|
|
}) => {
|
|
|
|
// We already have a module. This
|
|
|
|
// is OK.
|
|
|
|
type_module = module_def;
|
|
|
|
|
|
|
|
// Mark it as an impl module if
|
|
|
|
// necessary.
|
2013-12-19 20:52:35 -06:00
|
|
|
type_module.kind.set(ImplModuleKind);
|
2012-10-18 15:29:34 -05:00
|
|
|
}
|
2013-08-21 19:26:33 -05:00
|
|
|
Some(_) | None => {
|
|
|
|
let parent_link =
|
|
|
|
self.get_parent_link(new_parent,
|
|
|
|
final_ident);
|
|
|
|
child_name_bindings.define_module(
|
|
|
|
parent_link,
|
|
|
|
Some(def),
|
|
|
|
ImplModuleKind,
|
2013-08-21 20:39:30 -05:00
|
|
|
true,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
true,
|
2014-01-01 00:53:22 -06:00
|
|
|
DUMMY_SP);
|
2013-08-21 19:26:33 -05:00
|
|
|
type_module =
|
|
|
|
child_name_bindings.
|
|
|
|
get_module();
|
2012-10-18 15:29:34 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-21 19:26:33 -05:00
|
|
|
// Add each static method to the module.
|
|
|
|
let new_parent =
|
|
|
|
ModuleReducedGraphParent(type_module);
|
|
|
|
for static_method_info in
|
|
|
|
static_methods.iter() {
|
|
|
|
let ident = static_method_info.ident;
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for \
|
2013-08-21 19:26:33 -05:00
|
|
|
external crate) creating \
|
2013-09-28 00:38:08 -05:00
|
|
|
static method '{}'",
|
2013-08-21 19:26:33 -05:00
|
|
|
self.session.str_of(ident));
|
|
|
|
|
|
|
|
let (method_name_bindings, _) =
|
|
|
|
self.add_child(ident,
|
|
|
|
new_parent,
|
|
|
|
OverwriteDuplicates,
|
2014-01-01 00:53:22 -06:00
|
|
|
DUMMY_SP);
|
2013-09-01 20:45:37 -05:00
|
|
|
let def = DefFn(
|
2013-08-21 19:26:33 -05:00
|
|
|
static_method_info.def_id,
|
|
|
|
static_method_info.purity);
|
2013-08-07 02:11:34 -05:00
|
|
|
|
2013-08-21 19:26:33 -05:00
|
|
|
method_name_bindings.define_value(
|
2014-01-01 00:53:22 -06:00
|
|
|
def, DUMMY_SP,
|
2014-01-09 07:05:33 -06:00
|
|
|
visibility == ast::Public);
|
2013-08-21 19:26:33 -05:00
|
|
|
}
|
2012-10-18 15:29:34 -05:00
|
|
|
}
|
2013-08-21 19:26:33 -05:00
|
|
|
|
|
|
|
// Otherwise, do nothing.
|
|
|
|
Some(_) | None => {}
|
2012-10-18 15:29:34 -05:00
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-08-31 11:13:04 -05:00
|
|
|
DlField => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building reduced graph for external crate) \
|
2013-08-21 19:26:33 -05:00
|
|
|
ignoring field");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-21 20:39:30 -05:00
|
|
|
/// Builds the reduced graph rooted at the given external module.
|
2013-12-19 21:02:22 -06:00
|
|
|
fn populate_external_module(&mut self, module: @Module) {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(populating external module) attempting to populate {}",
|
2013-08-23 20:31:43 -05:00
|
|
|
self.module_to_str(module));
|
|
|
|
|
2013-12-19 20:56:20 -06:00
|
|
|
let def_id = match module.def_id.get() {
|
2013-08-23 20:31:43 -05:00
|
|
|
None => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(populating external module) ... no def ID!");
|
2013-08-23 20:31:43 -05:00
|
|
|
return
|
|
|
|
}
|
2013-08-21 20:39:30 -05:00
|
|
|
Some(def_id) => def_id,
|
|
|
|
};
|
|
|
|
|
2013-11-21 17:42:55 -06:00
|
|
|
csearch::each_child_of_item(self.session.cstore,
|
|
|
|
def_id,
|
|
|
|
|def_like, child_ident, visibility| {
|
2014-01-31 15:48:49 -06:00
|
|
|
let child_ident_string = token::get_ident(child_ident.name);
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(populating external module) ... found ident: {}",
|
2014-01-31 15:48:49 -06:00
|
|
|
child_ident_string.get());
|
2013-08-21 20:39:30 -05:00
|
|
|
self.build_reduced_graph_for_external_crate_def(module,
|
|
|
|
def_like,
|
2013-08-07 02:11:34 -05:00
|
|
|
child_ident,
|
|
|
|
visibility)
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2013-12-19 20:53:59 -06:00
|
|
|
module.populated.set(true)
|
2013-08-21 20:39:30 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Ensures that the reduced graph rooted at the given external module
|
|
|
|
/// is built, building it if it is not.
|
2013-12-19 21:02:22 -06:00
|
|
|
fn populate_module_if_necessary(&mut self, module: @Module) {
|
2013-12-19 20:53:59 -06:00
|
|
|
if !module.populated.get() {
|
2013-08-21 20:39:30 -05:00
|
|
|
self.populate_external_module(module)
|
|
|
|
}
|
2013-12-19 20:53:59 -06:00
|
|
|
assert!(module.populated.get())
|
2013-08-21 20:39:30 -05:00
|
|
|
}
|
|
|
|
|
2013-08-21 19:26:33 -05:00
|
|
|
/// Builds the reduced graph rooted at the 'use' directive for an external
|
|
|
|
/// crate.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn build_reduced_graph_for_external_crate(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
root: @Module) {
|
2013-11-21 17:42:55 -06:00
|
|
|
csearch::each_top_level_item_of_crate(self.session.cstore,
|
2013-12-19 20:56:20 -06:00
|
|
|
root.def_id
|
|
|
|
.get()
|
|
|
|
.unwrap()
|
|
|
|
.crate,
|
2013-11-21 17:42:55 -06:00
|
|
|
|def_like, ident, visibility| {
|
2013-08-21 19:26:33 -05:00
|
|
|
self.build_reduced_graph_for_external_crate_def(root,
|
|
|
|
def_like,
|
2013-08-07 02:11:34 -05:00
|
|
|
ident,
|
|
|
|
visibility)
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Creates and adds an import directive to the given module.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn build_import_directive(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
module_: @Module,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
module_path: ~[Ident],
|
|
|
|
subclass: @ImportDirectiveSubclass,
|
|
|
|
span: Span,
|
|
|
|
id: NodeId,
|
|
|
|
is_public: bool) {
|
|
|
|
let directive = @ImportDirective::new(module_path,
|
|
|
|
subclass, span, id,
|
|
|
|
is_public);
|
2013-12-22 18:39:46 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
let mut imports = module_.imports.borrow_mut();
|
|
|
|
imports.get().push(directive);
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Bump the reference count on the name. Or, if this is a glob, set
|
|
|
|
// the appropriate flag.
|
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match *subclass {
|
2013-03-26 21:53:33 -05:00
|
|
|
SingleImport(target, _) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building import directive) building import \
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
directive: {}::{}",
|
2013-03-07 17:37:14 -06:00
|
|
|
self.idents_to_str(directive.module_path),
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(target));
|
2012-10-02 20:13:56 -05:00
|
|
|
|
2013-12-21 17:15:54 -06:00
|
|
|
let mut import_resolutions = module_.import_resolutions
|
|
|
|
.borrow_mut();
|
|
|
|
match import_resolutions.get().find(&target.name) {
|
2013-03-15 14:24:24 -05:00
|
|
|
Some(&resolution) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building import directive) bumping \
|
2012-10-02 20:13:56 -05:00
|
|
|
reference");
|
2013-12-21 19:30:36 -06:00
|
|
|
resolution.outstanding_references.set(
|
|
|
|
resolution.outstanding_references.get() + 1);
|
2013-05-20 13:02:08 -05:00
|
|
|
|
|
|
|
// the source of this name is different now
|
2013-12-21 19:48:19 -06:00
|
|
|
resolution.type_id.set(id);
|
2013-12-21 19:45:02 -06:00
|
|
|
resolution.value_id.set(id);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(building import directive) creating new");
|
2013-12-21 19:49:43 -06:00
|
|
|
let resolution = @ImportResolution::new(id, is_public);
|
2013-12-21 19:30:36 -06:00
|
|
|
resolution.outstanding_references.set(1);
|
2013-12-21 17:15:54 -06:00
|
|
|
import_resolutions.get().insert(target.name,
|
|
|
|
resolution);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
GlobImport => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Set the glob flag. This tells us that we don't know the
|
|
|
|
// module's exports ahead of time.
|
|
|
|
|
2013-12-19 20:59:03 -06:00
|
|
|
module_.glob_count.set(module_.glob_count.get() + 1);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
self.unresolved_imports += 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Import resolution
|
|
|
|
//
|
|
|
|
// This is a fixed-point algorithm. We resolve imports until our efforts
|
|
|
|
// are stymied by an unresolved import; then we bail out of the current
|
|
|
|
// module and continue. We terminate successfully once no more imports
|
|
|
|
// remain or unsuccessfully when no forward progress in resolving imports
|
|
|
|
// is made.
|
|
|
|
|
2013-05-13 18:13:20 -05:00
|
|
|
/// Resolves all imports for the crate. This method performs the fixed-
|
|
|
|
/// point iteration.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_imports(&mut self) {
|
2012-11-29 14:08:40 -06:00
|
|
|
let mut i = 0;
|
|
|
|
let mut prev_unresolved_imports = 0;
|
2012-05-22 12:54:12 -05:00
|
|
|
loop {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving imports) iteration {}, {} imports left",
|
2012-08-22 19:24:52 -05:00
|
|
|
i, self.unresolved_imports);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
let module_root = self.graph_root.get_module();
|
2012-05-22 12:54:12 -05:00
|
|
|
self.resolve_imports_for_module_subtree(module_root);
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
if self.unresolved_imports == 0 {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving imports) success");
|
2012-05-22 12:54:12 -05:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if self.unresolved_imports == prev_unresolved_imports {
|
|
|
|
self.report_unresolved_imports(module_root);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
i += 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
prev_unresolved_imports = self.unresolved_imports;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Attempts to resolve imports for the given module and all of its
|
|
|
|
/// submodules.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_imports_for_module_subtree(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
module_: @Module) {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving imports for module subtree) resolving {}",
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-07-31 18:38:41 -05:00
|
|
|
self.resolve_imports_for_module(module_);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-08-21 20:39:30 -05:00
|
|
|
self.populate_module_if_necessary(module_);
|
2013-12-21 17:32:44 -06:00
|
|
|
{
|
|
|
|
let children = module_.children.borrow();
|
|
|
|
for (_, &child_node) in children.get().iter() {
|
|
|
|
match child_node.get_module_if_available() {
|
|
|
|
None => {
|
|
|
|
// Nothing to do.
|
|
|
|
}
|
|
|
|
Some(child_module) => {
|
|
|
|
self.resolve_imports_for_module_subtree(child_module);
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-21 16:23:40 -06:00
|
|
|
let anonymous_children = module_.anonymous_children.borrow();
|
|
|
|
for (_, &child_module) in anonymous_children.get().iter() {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.resolve_imports_for_module_subtree(child_module);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Attempts to resolve imports for the given module only.
|
2013-12-19 21:02:22 -06:00
|
|
|
fn resolve_imports_for_module(&mut self, module: @Module) {
|
2013-03-01 12:44:43 -06:00
|
|
|
if module.all_imports_resolved() {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving imports for module) all imports resolved for \
|
2013-09-28 00:38:08 -05:00
|
|
|
{}",
|
2013-03-01 12:44:43 -06:00
|
|
|
self.module_to_str(module));
|
2012-08-01 19:30:05 -05:00
|
|
|
return;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-12-22 18:39:46 -06:00
|
|
|
let mut imports = module.imports.borrow_mut();
|
|
|
|
let import_count = imports.get().len();
|
2013-12-19 21:01:02 -06:00
|
|
|
while module.resolved_import_count.get() < import_count {
|
|
|
|
let import_index = module.resolved_import_count.get();
|
2013-12-22 18:39:46 -06:00
|
|
|
let import_directive = imports.get()[import_index];
|
2013-03-01 12:44:43 -06:00
|
|
|
match self.resolve_import_for_module(module, import_directive) {
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// We presumably emitted an error. Continue.
|
2013-09-28 00:38:08 -05:00
|
|
|
let msg = format!("failed to resolve import `{}`",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.import_path_to_str(
|
2013-03-07 17:37:14 -06:00
|
|
|
import_directive.module_path,
|
2013-02-10 18:33:16 -06:00
|
|
|
*import_directive.subclass));
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(import_directive.span, msg);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Bail out. We'll come around next time.
|
|
|
|
break;
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Success(()) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Good. Continue.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-19 21:01:02 -06:00
|
|
|
module.resolved_import_count
|
|
|
|
.set(module.resolved_import_count.get() + 1);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn idents_to_str(&mut self, idents: &[Ident]) -> ~str {
|
2013-03-20 00:17:42 -05:00
|
|
|
let mut first = true;
|
|
|
|
let mut result = ~"";
|
2013-08-03 11:45:23 -05:00
|
|
|
for ident in idents.iter() {
|
2013-06-11 21:13:42 -05:00
|
|
|
if first {
|
|
|
|
first = false
|
|
|
|
} else {
|
|
|
|
result.push_str("::")
|
|
|
|
}
|
2013-06-14 21:40:11 -05:00
|
|
|
result.push_str(self.session.str_of(*ident));
|
2013-02-10 18:33:16 -06:00
|
|
|
};
|
2013-03-20 00:17:42 -05:00
|
|
|
return result;
|
2012-07-18 18:18:02 -05:00
|
|
|
}
|
2012-12-29 05:44:02 -06:00
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
fn path_idents_to_str(&mut self, path: &Path) -> ~str {
|
2013-09-01 19:50:59 -05:00
|
|
|
let identifiers: ~[ast::Ident] = path.segments
|
2013-08-07 11:47:28 -05:00
|
|
|
.iter()
|
2013-08-08 13:38:10 -05:00
|
|
|
.map(|seg| seg.identifier)
|
2013-08-07 11:47:28 -05:00
|
|
|
.collect();
|
|
|
|
self.idents_to_str(identifiers)
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn import_directive_subclass_to_str(&mut self,
|
2014-01-31 14:25:11 -06:00
|
|
|
subclass: ImportDirectiveSubclass)
|
|
|
|
-> ~str {
|
2012-12-27 13:54:34 -06:00
|
|
|
match subclass {
|
2014-01-31 14:25:11 -06:00
|
|
|
SingleImport(_target, source) => {
|
|
|
|
self.session.str_of(source).to_str()
|
|
|
|
}
|
|
|
|
GlobImport => ~"*"
|
2012-12-27 13:54:34 -06:00
|
|
|
}
|
|
|
|
}
|
2012-12-29 05:44:02 -06:00
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn import_path_to_str(&mut self,
|
2014-01-31 14:25:11 -06:00
|
|
|
idents: &[Ident],
|
|
|
|
subclass: ImportDirectiveSubclass)
|
|
|
|
-> ~str {
|
2012-12-27 13:54:34 -06:00
|
|
|
if idents.is_empty() {
|
|
|
|
self.import_directive_subclass_to_str(subclass)
|
|
|
|
} else {
|
2013-09-28 00:38:08 -05:00
|
|
|
(format!("{}::{}",
|
2014-01-31 14:25:11 -06:00
|
|
|
self.idents_to_str(idents),
|
|
|
|
self.import_directive_subclass_to_str(subclass)))
|
2012-12-27 13:54:34 -06:00
|
|
|
}
|
|
|
|
}
|
2012-12-29 05:44:02 -06:00
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Attempts to resolve the given import. The return value indicates
|
|
|
|
/// failure if we're certain the name does not exist, indeterminate if we
|
|
|
|
/// don't know whether the name exists at the moment due to other
|
|
|
|
/// currently-unresolved imports, or success if we know the name exists.
|
|
|
|
/// If successful, the resolved bindings are written into the module.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_import_for_module(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
module_: @Module,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
import_directive: @ImportDirective)
|
2013-12-22 18:39:46 -06:00
|
|
|
-> ResolveResult<()> {
|
2013-03-01 12:44:43 -06:00
|
|
|
let mut resolution_result = Failed;
|
2013-03-07 17:37:14 -06:00
|
|
|
let module_path = &import_directive.module_path;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving import for module) resolving import `{}::...` in \
|
2013-09-28 00:38:08 -05:00
|
|
|
`{}`",
|
2013-03-07 17:37:14 -06:00
|
|
|
self.idents_to_str(*module_path),
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
// First, resolve the module path for the directive, if necessary.
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let container = if module_path.len() == 0 {
|
2013-03-01 12:44:43 -06:00
|
|
|
// Use the crate root.
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Some((self.graph_root.get_module(), AllPublic))
|
2012-05-22 12:54:12 -05:00
|
|
|
} else {
|
2013-05-13 18:13:20 -05:00
|
|
|
match self.resolve_module_path(module_,
|
|
|
|
*module_path,
|
|
|
|
DontUseLexicalScope,
|
|
|
|
import_directive.span,
|
|
|
|
ImportSearch) {
|
2012-07-03 17:55:26 -05:00
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
Failed => None,
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2012-05-22 12:54:12 -05:00
|
|
|
resolution_result = Indeterminate;
|
2013-03-01 12:44:43 -06:00
|
|
|
None
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Success(container) => Some(container),
|
2013-03-01 12:44:43 -06:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
match container {
|
2013-03-01 12:44:43 -06:00
|
|
|
None => {}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Some((containing_module, lp)) => {
|
2013-03-01 12:44:43 -06:00
|
|
|
// We found the module that the target is contained
|
|
|
|
// within. Attempt to resolve the import within it.
|
|
|
|
|
|
|
|
match *import_directive.subclass {
|
2013-03-26 21:53:33 -05:00
|
|
|
SingleImport(target, source) => {
|
2013-03-01 12:44:43 -06:00
|
|
|
resolution_result =
|
|
|
|
self.resolve_single_import(module_,
|
|
|
|
containing_module,
|
|
|
|
target,
|
2013-05-14 13:19:59 -05:00
|
|
|
source,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
import_directive,
|
|
|
|
lp);
|
2013-03-01 12:44:43 -06:00
|
|
|
}
|
|
|
|
GlobImport => {
|
|
|
|
resolution_result =
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.resolve_glob_import(module_,
|
2013-03-01 12:44:43 -06:00
|
|
|
containing_module,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
import_directive.id,
|
|
|
|
import_directive.is_public,
|
|
|
|
lp);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Decrement the count of unresolved imports.
|
2012-08-06 14:34:08 -05:00
|
|
|
match resolution_result {
|
2012-08-03 21:59:04 -05:00
|
|
|
Success(()) => {
|
2013-03-28 20:39:09 -05:00
|
|
|
assert!(self.unresolved_imports >= 1);
|
2012-11-29 14:08:40 -06:00
|
|
|
self.unresolved_imports -= 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do here; just return the error.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Decrement the count of unresolved globs if necessary. But only if
|
|
|
|
// the resolution result is indeterminate -- otherwise we'll stop
|
|
|
|
// processing imports here. (See the loop in
|
|
|
|
// resolve_imports_for_module.)
|
|
|
|
|
2012-09-07 20:53:14 -05:00
|
|
|
if !resolution_result.indeterminate() {
|
2012-08-06 14:34:08 -05:00
|
|
|
match *import_directive.subclass {
|
2012-08-03 21:59:04 -05:00
|
|
|
GlobImport => {
|
2013-12-19 20:59:03 -06:00
|
|
|
assert!(module_.glob_count.get() >= 1);
|
|
|
|
module_.glob_count.set(module_.glob_count.get() - 1);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-11-28 14:22:53 -06:00
|
|
|
SingleImport(..) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Ignore.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-01 19:30:05 -05:00
|
|
|
return resolution_result;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-12-21 16:20:57 -06:00
|
|
|
fn create_name_bindings_from_module(module: @Module) -> NameBindings {
|
2013-03-26 21:53:33 -05:00
|
|
|
NameBindings {
|
2013-12-21 16:13:06 -06:00
|
|
|
type_def: RefCell::new(Some(TypeNsDef {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
is_public: false,
|
2013-03-26 21:53:33 -05:00
|
|
|
module_def: Some(module),
|
|
|
|
type_def: None,
|
2013-05-14 23:49:30 -05:00
|
|
|
type_span: None
|
2013-12-21 16:13:06 -06:00
|
|
|
})),
|
2013-12-21 16:15:07 -06:00
|
|
|
value_def: RefCell::new(None),
|
2013-03-26 21:53:33 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_single_import(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
module_: @Module,
|
|
|
|
containing_module: @Module,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
target: Ident,
|
|
|
|
source: Ident,
|
|
|
|
directive: &ImportDirective,
|
|
|
|
lp: LastPrivate)
|
2013-05-31 17:17:22 -05:00
|
|
|
-> ResolveResult<()> {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving single import) resolving `{}` = `{}::{}` from \
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
`{}` id {}, last private {:?}",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(target),
|
2012-05-22 12:54:12 -05:00
|
|
|
self.module_to_str(containing_module),
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(source),
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.module_to_str(module_),
|
|
|
|
directive.id,
|
|
|
|
lp);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
// We need to resolve both namespaces for this to succeed.
|
2012-05-22 12:54:12 -05:00
|
|
|
//
|
|
|
|
|
|
|
|
let mut value_result = UnknownResult;
|
|
|
|
let mut type_result = UnknownResult;
|
|
|
|
|
|
|
|
// Search for direct children of the containing module.
|
2013-08-21 20:39:30 -05:00
|
|
|
self.populate_module_if_necessary(containing_module);
|
2013-12-21 17:32:44 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
let children = containing_module.children.borrow();
|
|
|
|
match children.get().find(&source.name) {
|
|
|
|
None => {
|
|
|
|
// Continue.
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-12-21 17:32:44 -06:00
|
|
|
Some(child_name_bindings) => {
|
|
|
|
if child_name_bindings.defined_in_namespace(ValueNS) {
|
|
|
|
value_result = BoundResult(containing_module,
|
|
|
|
*child_name_bindings);
|
|
|
|
}
|
|
|
|
if child_name_bindings.defined_in_namespace(TypeNS) {
|
|
|
|
type_result = BoundResult(containing_module,
|
|
|
|
*child_name_bindings);
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
// Unless we managed to find a result in both namespaces (unlikely),
|
|
|
|
// search imports as well.
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let mut used_reexport = false;
|
2012-10-15 16:56:42 -05:00
|
|
|
match (value_result, type_result) {
|
2013-11-28 14:22:53 -06:00
|
|
|
(BoundResult(..), BoundResult(..)) => {} // Continue.
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// If there is an unresolved glob at this point in the
|
|
|
|
// containing module, bail out. We don't know enough to be
|
|
|
|
// able to resolve this import.
|
|
|
|
|
2013-12-19 20:59:03 -06:00
|
|
|
if containing_module.glob_count.get() > 0 {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving single import) unresolved glob; \
|
2012-08-22 19:24:52 -05:00
|
|
|
bailing out");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Now search the exported imports within the containing
|
|
|
|
// module.
|
|
|
|
|
2013-12-21 17:15:54 -06:00
|
|
|
let import_resolutions = containing_module.import_resolutions
|
|
|
|
.borrow();
|
|
|
|
match import_resolutions.get().find(&source.name) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// The containing module definitely doesn't have an
|
|
|
|
// exported import with the name in question. We can
|
|
|
|
// therefore accurately report that the names are
|
|
|
|
// unbound.
|
|
|
|
|
2012-08-27 18:26:35 -05:00
|
|
|
if value_result.is_unknown() {
|
2012-05-22 12:54:12 -05:00
|
|
|
value_result = UnboundResult;
|
|
|
|
}
|
2012-08-27 18:26:35 -05:00
|
|
|
if type_result.is_unknown() {
|
2012-05-22 12:54:12 -05:00
|
|
|
type_result = UnboundResult;
|
|
|
|
}
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(import_resolution)
|
2013-12-21 19:30:36 -06:00
|
|
|
if import_resolution.outstanding_references.get()
|
2012-11-29 14:08:40 -06:00
|
|
|
== 0 => {
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
fn get_binding(this: &mut Resolver,
|
2013-12-21 19:49:43 -06:00
|
|
|
import_resolution: @ImportResolution,
|
2012-05-22 12:54:12 -05:00
|
|
|
namespace: Namespace)
|
|
|
|
-> NamespaceResult {
|
2012-11-29 14:08:40 -06:00
|
|
|
|
2012-10-02 20:13:56 -05:00
|
|
|
// Import resolutions must be declared with "pub"
|
|
|
|
// in order to be exported.
|
2013-12-21 19:32:22 -06:00
|
|
|
if !import_resolution.is_public.get() {
|
2012-10-02 20:13:56 -05:00
|
|
|
return UnboundResult;
|
|
|
|
}
|
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match (*import_resolution).
|
2012-05-22 12:54:12 -05:00
|
|
|
target_for_namespace(namespace) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-08-01 19:30:05 -05:00
|
|
|
return UnboundResult;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(target) => {
|
2013-06-09 23:39:15 -05:00
|
|
|
let id = import_resolution.id(namespace);
|
|
|
|
this.used_imports.insert(id);
|
2012-08-01 19:30:05 -05:00
|
|
|
return BoundResult(target.target_module,
|
2013-06-09 23:39:15 -05:00
|
|
|
target.bindings);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// The name is an import which has been fully
|
|
|
|
// resolved. We can, therefore, just follow it.
|
2012-08-27 18:26:35 -05:00
|
|
|
if value_result.is_unknown() {
|
2013-04-30 00:15:17 -05:00
|
|
|
value_result = get_binding(self, *import_resolution,
|
2012-05-22 12:54:12 -05:00
|
|
|
ValueNS);
|
2013-12-21 19:32:22 -06:00
|
|
|
used_reexport = import_resolution.is_public.get();
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-27 18:26:35 -05:00
|
|
|
if type_result.is_unknown() {
|
2013-04-30 00:15:17 -05:00
|
|
|
type_result = get_binding(self, *import_resolution,
|
2012-05-22 12:54:12 -05:00
|
|
|
TypeNS);
|
2013-12-21 19:32:22 -06:00
|
|
|
used_reexport = import_resolution.is_public.get();
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(_) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// The import is unresolved. Bail out.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving single import) unresolved import; \
|
2012-08-22 19:24:52 -05:00
|
|
|
bailing out");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-26 21:53:33 -05:00
|
|
|
// If we didn't find a result in the type namespace, search the
|
|
|
|
// external modules.
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let mut used_public = false;
|
2013-03-26 21:53:33 -05:00
|
|
|
match type_result {
|
2013-11-28 14:22:53 -06:00
|
|
|
BoundResult(..) => {}
|
2013-03-26 21:53:33 -05:00
|
|
|
_ => {
|
2013-12-21 16:05:26 -06:00
|
|
|
let module_opt = {
|
|
|
|
let mut external_module_children =
|
|
|
|
containing_module.external_module_children
|
|
|
|
.borrow_mut();
|
|
|
|
external_module_children.get().find_copy(&source.name)
|
|
|
|
};
|
|
|
|
match module_opt {
|
2013-03-26 21:53:33 -05:00
|
|
|
None => {} // Continue.
|
|
|
|
Some(module) => {
|
|
|
|
let name_bindings =
|
2013-12-21 16:20:57 -06:00
|
|
|
@Resolver::create_name_bindings_from_module(
|
2013-12-21 16:05:26 -06:00
|
|
|
module);
|
2013-03-26 21:53:33 -05:00
|
|
|
type_result = BoundResult(containing_module,
|
|
|
|
name_bindings);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
used_public = true;
|
2013-03-26 21:53:33 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// We've successfully resolved the import. Write the results in.
|
2013-12-21 17:15:54 -06:00
|
|
|
let import_resolution = {
|
|
|
|
let import_resolutions = module_.import_resolutions.borrow();
|
|
|
|
assert!(import_resolutions.get().contains_key(&target.name));
|
|
|
|
import_resolutions.get().get_copy(&target.name)
|
|
|
|
};
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match value_result {
|
2012-08-03 21:59:04 -05:00
|
|
|
BoundResult(target_module, name_bindings) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving single import) found value target");
|
2013-12-21 19:40:36 -06:00
|
|
|
import_resolution.value_target.set(
|
|
|
|
Some(Target::new(target_module, name_bindings)));
|
2013-12-21 19:45:02 -06:00
|
|
|
import_resolution.value_id.set(directive.id);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
used_public = name_bindings.defined_in_public_namespace(ValueNS);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
UnboundResult => { /* Continue. */ }
|
|
|
|
UnknownResult => {
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!("value result should be known at this point");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2012-08-06 14:34:08 -05:00
|
|
|
match type_result {
|
2012-08-03 21:59:04 -05:00
|
|
|
BoundResult(target_module, name_bindings) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving single import) found type target: {:?}",
|
2014-01-15 13:39:08 -06:00
|
|
|
{name_bindings.type_def.get().unwrap().type_def});
|
2013-12-21 19:46:56 -06:00
|
|
|
import_resolution.type_target.set(
|
|
|
|
Some(Target::new(target_module, name_bindings)));
|
2013-12-21 19:48:19 -06:00
|
|
|
import_resolution.type_id.set(directive.id);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
used_public = name_bindings.defined_in_public_namespace(TypeNS);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
UnboundResult => { /* Continue. */ }
|
|
|
|
UnknownResult => {
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!("type result should be known at this point");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-21 19:40:36 -06:00
|
|
|
if import_resolution.value_target.get().is_none() &&
|
2013-12-21 19:46:56 -06:00
|
|
|
import_resolution.type_target.get().is_none() {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let msg = format!("unresolved import: there is no \
|
|
|
|
`{}` in `{}`",
|
2013-09-28 00:38:08 -05:00
|
|
|
self.session.str_of(source),
|
|
|
|
self.module_to_str(containing_module));
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.resolve_error(directive.span, msg);
|
2013-05-12 08:03:39 -05:00
|
|
|
return Failed;
|
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let used_public = used_reexport || used_public;
|
2013-05-12 08:03:39 -05:00
|
|
|
|
2013-12-21 19:30:36 -06:00
|
|
|
assert!(import_resolution.outstanding_references.get() >= 1);
|
|
|
|
import_resolution.outstanding_references.set(
|
|
|
|
import_resolution.outstanding_references.get() - 1);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-09-24 15:56:52 -05:00
|
|
|
// record what this import resolves to for later uses in documentation,
|
|
|
|
// this may resolve to either a value or a type, but for documentation
|
|
|
|
// purposes it's good enough to just favor one over the other.
|
2013-12-21 19:40:36 -06:00
|
|
|
match import_resolution.value_target.get() {
|
2013-09-24 15:56:52 -05:00
|
|
|
Some(target) => {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let def = target.bindings.def_for_namespace(ValueNS).unwrap();
|
2013-12-23 13:15:16 -06:00
|
|
|
let mut def_map = self.def_map.borrow_mut();
|
|
|
|
def_map.get().insert(directive.id, def);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let did = def_id_of_def(def);
|
|
|
|
self.last_private.insert(directive.id,
|
|
|
|
if used_public {lp} else {DependsOn(did)});
|
2013-09-24 15:56:52 -05:00
|
|
|
}
|
|
|
|
None => {}
|
|
|
|
}
|
2013-12-21 19:46:56 -06:00
|
|
|
match import_resolution.type_target.get() {
|
2013-09-24 15:56:52 -05:00
|
|
|
Some(target) => {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let def = target.bindings.def_for_namespace(TypeNS).unwrap();
|
2013-12-23 13:15:16 -06:00
|
|
|
let mut def_map = self.def_map.borrow_mut();
|
|
|
|
def_map.get().insert(directive.id, def);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let did = def_id_of_def(def);
|
|
|
|
self.last_private.insert(directive.id,
|
|
|
|
if used_public {lp} else {DependsOn(did)});
|
2013-09-24 15:56:52 -05:00
|
|
|
}
|
|
|
|
None => {}
|
|
|
|
}
|
|
|
|
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving single import) successfully resolved import");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Success(());
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-26 21:53:33 -05:00
|
|
|
// Resolves a glob import. Note that this function cannot fail; it either
|
|
|
|
// succeeds or bails out (as importing * from an empty module or a module
|
|
|
|
// that exports nothing is valid).
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_glob_import(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
module_: @Module,
|
|
|
|
containing_module: @Module,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
id: NodeId,
|
|
|
|
is_public: bool,
|
|
|
|
lp: LastPrivate)
|
|
|
|
-> ResolveResult<()> {
|
2012-05-22 12:54:12 -05:00
|
|
|
// This function works in a highly imperative manner; it eagerly adds
|
|
|
|
// everything it can to the list of import resolutions of the module
|
|
|
|
// node.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving glob import) resolving glob import {}", id);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// We must bail out if the node has unresolved imports of any kind
|
|
|
|
// (including globs).
|
|
|
|
if !(*containing_module).all_imports_resolved() {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving glob import) target module has unresolved \
|
2012-08-22 19:24:52 -05:00
|
|
|
imports; bailing out");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-12-19 20:59:03 -06:00
|
|
|
assert_eq!(containing_module.glob_count.get(), 0);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Add all resolved imports from the containing module.
|
2013-12-21 17:15:54 -06:00
|
|
|
let import_resolutions = containing_module.import_resolutions
|
|
|
|
.borrow();
|
|
|
|
for (ident, target_import_resolution) in import_resolutions.get()
|
|
|
|
.iter() {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving glob import) writing module resolution \
|
2013-09-28 00:38:08 -05:00
|
|
|
{:?} into `{}`",
|
2013-12-21 19:46:56 -06:00
|
|
|
target_import_resolution.type_target.get().is_none(),
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-12-21 19:32:22 -06:00
|
|
|
if !target_import_resolution.is_public.get() {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving glob import) nevermind, just kidding");
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// Here we merge two import resolutions.
|
2013-12-21 17:15:54 -06:00
|
|
|
let mut import_resolutions = module_.import_resolutions
|
|
|
|
.borrow_mut();
|
|
|
|
match import_resolutions.get().find(ident) {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Simple: just copy the old import resolution.
|
2012-07-06 21:06:58 -05:00
|
|
|
let new_import_resolution =
|
2013-12-21 19:49:43 -06:00
|
|
|
@ImportResolution::new(id, is_public);
|
2013-12-21 19:40:36 -06:00
|
|
|
new_import_resolution.value_target.set(
|
|
|
|
target_import_resolution.value_target.get());
|
2013-12-21 19:46:56 -06:00
|
|
|
new_import_resolution.type_target.set(
|
|
|
|
target_import_resolution.type_target.get());
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-12-21 17:15:54 -06:00
|
|
|
import_resolutions.get().insert
|
2013-03-21 03:10:57 -05:00
|
|
|
(*ident, new_import_resolution);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-15 14:24:24 -05:00
|
|
|
Some(&dest_import_resolution) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Merge the two import resolutions at a finer-grained
|
|
|
|
// level.
|
|
|
|
|
2013-12-21 19:40:36 -06:00
|
|
|
match target_import_resolution.value_target.get() {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
2013-05-29 18:59:33 -05:00
|
|
|
Some(value_target) => {
|
2013-12-21 19:40:36 -06:00
|
|
|
dest_import_resolution.value_target.set(
|
|
|
|
Some(value_target));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-12-21 19:46:56 -06:00
|
|
|
match target_import_resolution.type_target.get() {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
2013-05-29 18:59:33 -05:00
|
|
|
Some(type_target) => {
|
2013-12-21 19:46:56 -06:00
|
|
|
dest_import_resolution.type_target.set(
|
|
|
|
Some(type_target));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-12-21 19:32:22 -06:00
|
|
|
dest_import_resolution.is_public.set(is_public);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-26 21:53:33 -05:00
|
|
|
// Add all children from the containing module.
|
2013-08-21 20:39:30 -05:00
|
|
|
self.populate_module_if_necessary(containing_module);
|
2013-12-21 17:32:44 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
let children = containing_module.children.borrow();
|
|
|
|
for (&name, name_bindings) in children.get().iter() {
|
2014-02-07 13:45:18 -06:00
|
|
|
self.merge_import_resolution(module_, containing_module,
|
|
|
|
id, is_public,
|
|
|
|
name, *name_bindings);
|
2013-12-21 17:32:44 -06:00
|
|
|
}
|
2013-03-26 21:53:33 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Add external module children from the containing module.
|
2013-12-21 16:05:26 -06:00
|
|
|
{
|
|
|
|
let external_module_children =
|
|
|
|
containing_module.external_module_children.borrow();
|
|
|
|
for (&name, module) in external_module_children.get().iter() {
|
|
|
|
let name_bindings =
|
2013-12-21 16:20:57 -06:00
|
|
|
@Resolver::create_name_bindings_from_module(*module);
|
2014-02-07 13:45:18 -06:00
|
|
|
self.merge_import_resolution(module_, containing_module,
|
|
|
|
id, is_public,
|
|
|
|
name, name_bindings);
|
2013-12-21 16:05:26 -06:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-09-24 15:56:52 -05:00
|
|
|
// Record the destination of this import
|
2013-12-19 20:56:20 -06:00
|
|
|
match containing_module.def_id.get() {
|
2013-09-24 15:56:52 -05:00
|
|
|
Some(did) => {
|
2013-12-23 13:15:16 -06:00
|
|
|
let mut def_map = self.def_map.borrow_mut();
|
|
|
|
def_map.get().insert(id, DefMod(did));
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.last_private.insert(id, lp);
|
2013-09-24 15:56:52 -05:00
|
|
|
}
|
|
|
|
None => {}
|
|
|
|
}
|
|
|
|
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving glob import) successfully resolved import");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Success(());
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-02-07 13:45:18 -06:00
|
|
|
fn merge_import_resolution(&mut self,
|
|
|
|
module_: @Module,
|
|
|
|
containing_module: @Module,
|
|
|
|
id: NodeId,
|
|
|
|
is_public: bool,
|
|
|
|
name: Name,
|
|
|
|
name_bindings: @NameBindings) {
|
|
|
|
let dest_import_resolution;
|
|
|
|
let mut import_resolutions = module_.import_resolutions.borrow_mut();
|
|
|
|
match import_resolutions.get().find(&name) {
|
|
|
|
None => {
|
|
|
|
// Create a new import resolution from this child.
|
|
|
|
dest_import_resolution =
|
|
|
|
@ImportResolution::new(id, is_public);
|
|
|
|
import_resolutions.get().insert(name,
|
|
|
|
dest_import_resolution);
|
|
|
|
}
|
|
|
|
Some(&existing_import_resolution) => {
|
|
|
|
dest_import_resolution = existing_import_resolution;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
debug!("(resolving glob import) writing resolution `{}` in `{}` \
|
|
|
|
to `{}`",
|
|
|
|
token::get_ident(name).get().to_str(),
|
|
|
|
self.module_to_str(containing_module),
|
|
|
|
self.module_to_str(module_));
|
|
|
|
|
|
|
|
// Merge the child item into the import resolution.
|
|
|
|
if name_bindings.defined_in_public_namespace(ValueNS) {
|
|
|
|
debug!("(resolving glob import) ... for value target");
|
|
|
|
dest_import_resolution.value_target.set(
|
|
|
|
Some(Target::new(containing_module, name_bindings)));
|
|
|
|
dest_import_resolution.value_id.set(id);
|
|
|
|
}
|
|
|
|
if name_bindings.defined_in_public_namespace(TypeNS) {
|
|
|
|
debug!("(resolving glob import) ... for type target");
|
|
|
|
dest_import_resolution.type_target.set(
|
|
|
|
Some(Target::new(containing_module, name_bindings)));
|
|
|
|
dest_import_resolution.type_id.set(id);
|
|
|
|
}
|
|
|
|
dest_import_resolution.is_public.set(is_public);
|
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Resolves the given module path from the given root `module_`.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_module_path_from_root(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
module_: @Module,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
module_path: &[Ident],
|
|
|
|
index: uint,
|
|
|
|
span: Span,
|
|
|
|
name_search_type: NameSearchType,
|
|
|
|
lp: LastPrivate)
|
2013-12-19 21:02:22 -06:00
|
|
|
-> ResolveResult<(@Module, LastPrivate)> {
|
2012-07-31 18:38:41 -05:00
|
|
|
let mut search_module = module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
let mut index = index;
|
2013-03-07 17:37:14 -06:00
|
|
|
let module_path_len = module_path.len();
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let mut closest_private = lp;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Resolve the module part of the path. This does not involve looking
|
|
|
|
// upward though scope chains; we simply resolve names directly in
|
|
|
|
// modules as we go.
|
|
|
|
while index < module_path_len {
|
2013-03-07 17:37:14 -06:00
|
|
|
let name = module_path[index];
|
2012-12-13 15:05:22 -06:00
|
|
|
match self.resolve_name_in_module(search_module,
|
|
|
|
name,
|
|
|
|
TypeNS,
|
2013-03-01 12:44:43 -06:00
|
|
|
name_search_type) {
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2013-05-08 20:47:34 -05:00
|
|
|
let segment_name = self.session.str_of(name);
|
|
|
|
let module_name = self.module_to_str(search_module);
|
2013-05-13 18:13:20 -05:00
|
|
|
if "???" == module_name {
|
2013-08-31 11:13:04 -05:00
|
|
|
let span = Span {
|
2013-05-13 18:13:20 -05:00
|
|
|
lo: span.lo,
|
2013-11-19 11:15:49 -06:00
|
|
|
hi: span.lo + Pos::from_uint(segment_name.len()),
|
2013-05-13 18:13:20 -05:00
|
|
|
expn_info: span.expn_info,
|
|
|
|
};
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("unresolved import. maybe \
|
2013-05-13 18:13:20 -05:00
|
|
|
a missing `extern mod \
|
2013-09-28 00:38:08 -05:00
|
|
|
{}`?",
|
2013-06-12 12:02:55 -05:00
|
|
|
segment_name));
|
2013-05-08 20:47:34 -05:00
|
|
|
return Failed;
|
|
|
|
}
|
2013-09-28 00:38:08 -05:00
|
|
|
self.resolve_error(span, format!("unresolved import: could not find `{}` in \
|
|
|
|
`{}`.", segment_name, module_name));
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving module path for import) module \
|
2013-09-28 00:38:08 -05:00
|
|
|
resolution is indeterminate: {}",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(name));
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Success((target, used_proxy)) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
// Check to see whether there are type bindings, and, if
|
|
|
|
// so, whether there is a module within.
|
2013-12-21 16:13:06 -06:00
|
|
|
match target.bindings.type_def.get() {
|
2013-05-29 18:59:33 -05:00
|
|
|
Some(type_def) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
match type_def.module_def {
|
|
|
|
None => {
|
|
|
|
// Not a module.
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("not a \
|
|
|
|
module `{}`",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.
|
2012-10-15 20:04:15 -05:00
|
|
|
str_of(
|
|
|
|
name)));
|
|
|
|
return Failed;
|
|
|
|
}
|
2013-05-13 18:13:20 -05:00
|
|
|
Some(module_def) => {
|
|
|
|
// If we're doing the search for an
|
|
|
|
// import, do not allow traits and impls
|
|
|
|
// to be selected.
|
|
|
|
match (name_search_type,
|
2013-12-19 20:52:35 -06:00
|
|
|
module_def.kind.get()) {
|
2013-05-13 18:13:20 -05:00
|
|
|
(ImportSearch, TraitModuleKind) |
|
|
|
|
(ImportSearch, ImplModuleKind) => {
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(
|
2013-05-13 18:13:20 -05:00
|
|
|
span,
|
2013-05-23 11:39:10 -05:00
|
|
|
"cannot import from a trait \
|
|
|
|
or type implementation");
|
2013-05-13 18:13:20 -05:00
|
|
|
return Failed;
|
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
(_, _) => {
|
|
|
|
search_module = module_def;
|
|
|
|
|
|
|
|
// Keep track of the closest
|
|
|
|
// private module used when
|
|
|
|
// resolving this import chain.
|
|
|
|
if !used_proxy &&
|
|
|
|
!search_module.is_public {
|
2013-12-19 20:56:20 -06:00
|
|
|
match search_module.def_id
|
|
|
|
.get() {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Some(did) => {
|
|
|
|
closest_private =
|
|
|
|
DependsOn(did);
|
|
|
|
}
|
|
|
|
None => {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-05-13 18:13:20 -05:00
|
|
|
}
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None => {
|
|
|
|
// There are no type bindings at all.
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("not a module `{}`",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(
|
2012-10-15 20:04:15 -05:00
|
|
|
name)));
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
index += 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
return Success((search_module, closest_private));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Attempts to resolve the module part of an import directive or path
|
|
|
|
/// rooted at the given module.
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
///
|
|
|
|
/// On success, returns the resolved module, and the closest *private*
|
|
|
|
/// module found to the destination when resolving this path.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_module_path(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
module_: @Module,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
module_path: &[Ident],
|
|
|
|
use_lexical_scope: UseLexicalScopeFlag,
|
|
|
|
span: Span,
|
|
|
|
name_search_type: NameSearchType)
|
2013-12-19 21:02:22 -06:00
|
|
|
-> ResolveResult<(@Module, LastPrivate)> {
|
2013-03-01 12:44:43 -06:00
|
|
|
let module_path_len = module_path.len();
|
2013-03-28 20:39:09 -05:00
|
|
|
assert!(module_path_len > 0);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving module path for import) processing `{}` rooted at \
|
2013-09-28 00:38:08 -05:00
|
|
|
`{}`",
|
2013-03-07 17:37:14 -06:00
|
|
|
self.idents_to_str(module_path),
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-12-23 16:41:37 -06:00
|
|
|
// Resolve the module prefix, if any.
|
|
|
|
let module_prefix_result = self.resolve_module_prefix(module_,
|
|
|
|
module_path);
|
2012-12-13 15:05:22 -06:00
|
|
|
|
2013-04-12 00:15:30 -05:00
|
|
|
let search_module;
|
|
|
|
let start_index;
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let last_private;
|
2012-12-23 16:41:37 -06:00
|
|
|
match module_prefix_result {
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2013-05-13 22:18:27 -05:00
|
|
|
let mpath = self.idents_to_str(module_path);
|
2013-06-11 06:37:22 -05:00
|
|
|
match mpath.rfind(':') {
|
2013-05-14 18:49:04 -05:00
|
|
|
Some(idx) => {
|
2013-09-28 00:38:08 -05:00
|
|
|
self.resolve_error(span, format!("unresolved import: could not find `{}` \
|
|
|
|
in `{}`",
|
2013-06-11 06:37:22 -05:00
|
|
|
// idx +- 1 to account for the colons
|
|
|
|
// on either side
|
|
|
|
mpath.slice_from(idx + 1),
|
|
|
|
mpath.slice_to(idx - 1)));
|
2013-05-14 18:49:04 -05:00
|
|
|
},
|
|
|
|
None => (),
|
|
|
|
};
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving module path for import) indeterminate; \
|
2012-08-22 19:24:52 -05:00
|
|
|
bailing");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-12-23 16:41:37 -06:00
|
|
|
Success(NoPrefixFound) => {
|
|
|
|
// There was no prefix, so we're considering the first element
|
|
|
|
// of the path. How we handle this depends on whether we were
|
|
|
|
// instructed to use lexical scope or not.
|
|
|
|
match use_lexical_scope {
|
|
|
|
DontUseLexicalScope => {
|
|
|
|
// This is a crate-relative path. We will start the
|
|
|
|
// resolution process at index zero.
|
|
|
|
search_module = self.graph_root.get_module();
|
|
|
|
start_index = 0;
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
last_private = AllPublic;
|
2012-12-23 16:41:37 -06:00
|
|
|
}
|
|
|
|
UseLexicalScope => {
|
|
|
|
// This is not a crate-relative path. We resolve the
|
|
|
|
// first component of the path in the current lexical
|
|
|
|
// scope and then proceed to resolve below that.
|
|
|
|
let result = self.resolve_module_in_lexical_scope(
|
|
|
|
module_,
|
2013-03-07 17:37:14 -06:00
|
|
|
module_path[0]);
|
2012-12-23 16:41:37 -06:00
|
|
|
match result {
|
|
|
|
Failed => {
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(span, "unresolved name");
|
2012-12-23 16:41:37 -06:00
|
|
|
return Failed;
|
|
|
|
}
|
|
|
|
Indeterminate => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving module path for import) \
|
2012-12-23 16:41:37 -06:00
|
|
|
indeterminate; bailing");
|
|
|
|
return Indeterminate;
|
|
|
|
}
|
|
|
|
Success(containing_module) => {
|
|
|
|
search_module = containing_module;
|
|
|
|
start_index = 1;
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
last_private = AllPublic;
|
2012-12-23 16:41:37 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Success(PrefixFound(containing_module, index)) => {
|
|
|
|
search_module = containing_module;
|
|
|
|
start_index = index;
|
2013-12-19 20:56:20 -06:00
|
|
|
last_private = DependsOn(containing_module.def_id
|
|
|
|
.get()
|
|
|
|
.unwrap());
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
self.resolve_module_path_from_root(search_module,
|
|
|
|
module_path,
|
|
|
|
start_index,
|
|
|
|
span,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name_search_type,
|
|
|
|
last_private)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Invariant: This must only be called during main resolution, not during
|
|
|
|
/// import resolution.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_item_in_lexical_scope(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
module_: @Module,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name: Ident,
|
|
|
|
namespace: Namespace,
|
|
|
|
search_through_modules:
|
|
|
|
SearchThroughModulesFlag)
|
|
|
|
-> ResolveResult<(Target, bool)> {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving item in lexical scope) resolving `{}` in \
|
2013-09-28 00:38:08 -05:00
|
|
|
namespace {:?} in `{}`",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(name),
|
2012-05-22 12:54:12 -05:00
|
|
|
namespace,
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The current module node is handled specially. First, check for
|
|
|
|
// its immediate children.
|
2013-08-21 20:39:30 -05:00
|
|
|
self.populate_module_if_necessary(module_);
|
2013-12-21 17:32:44 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
let children = module_.children.borrow();
|
|
|
|
match children.get().find(&name.name) {
|
|
|
|
Some(name_bindings)
|
|
|
|
if name_bindings.defined_in_namespace(namespace) => {
|
|
|
|
debug!("top name bindings succeeded");
|
|
|
|
return Success((Target::new(module_, *name_bindings),
|
|
|
|
false));
|
|
|
|
}
|
|
|
|
Some(_) | None => { /* Not found; continue. */ }
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now check for its import directives. We don't have to have resolved
|
|
|
|
// all its imports in the usual way; this is because chains of
|
|
|
|
// adjacent import statements are processed as though they mutated the
|
|
|
|
// current scope.
|
2013-12-21 17:15:54 -06:00
|
|
|
let import_resolutions = module_.import_resolutions.borrow();
|
|
|
|
match import_resolutions.get().find(&name.name) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Not found; continue.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(import_resolution) => {
|
2012-08-06 14:34:08 -05:00
|
|
|
match (*import_resolution).target_for_namespace(namespace) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Not found; continue.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving item in lexical scope) found \
|
2013-09-28 00:38:08 -05:00
|
|
|
import resolution, but not in namespace {:?}",
|
2012-08-22 19:24:52 -05:00
|
|
|
namespace);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(target) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving item in lexical scope) using \
|
2013-02-25 13:10:42 -06:00
|
|
|
import resolution");
|
2013-06-09 23:39:15 -05:00
|
|
|
self.used_imports.insert(import_resolution.id(namespace));
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
return Success((target, false));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-26 21:53:33 -05:00
|
|
|
// Search for external modules.
|
|
|
|
if namespace == TypeNS {
|
2013-12-21 16:05:26 -06:00
|
|
|
let module_opt = {
|
|
|
|
let external_module_children =
|
|
|
|
module_.external_module_children.borrow();
|
|
|
|
external_module_children.get().find_copy(&name.name)
|
|
|
|
};
|
|
|
|
match module_opt {
|
2013-03-26 21:53:33 -05:00
|
|
|
None => {}
|
|
|
|
Some(module) => {
|
|
|
|
let name_bindings =
|
2013-12-21 16:20:57 -06:00
|
|
|
@Resolver::create_name_bindings_from_module(module);
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("lower name bindings succeeded");
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
return Success((Target::new(module_, name_bindings), false));
|
2013-03-26 21:53:33 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// Finally, proceed up the scope chain looking for parent modules.
|
2012-07-31 18:38:41 -05:00
|
|
|
let mut search_module = module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
loop {
|
|
|
|
// Go to the next parent.
|
2012-08-06 14:34:08 -05:00
|
|
|
match search_module.parent_link {
|
2012-08-03 21:59:04 -05:00
|
|
|
NoParentLink => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// No more parents. This module was unresolved.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving item in lexical scope) unresolved \
|
2012-08-22 19:24:52 -05:00
|
|
|
module");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-12-23 16:41:37 -06:00
|
|
|
ModuleParentLink(parent_module_node, _) => {
|
|
|
|
match search_through_modules {
|
|
|
|
DontSearchThroughModules => {
|
2013-12-19 20:52:35 -06:00
|
|
|
match search_module.kind.get() {
|
2012-12-23 16:41:37 -06:00
|
|
|
NormalModuleKind => {
|
|
|
|
// We stop the search here.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving item in lexical \
|
2012-12-23 16:41:37 -06:00
|
|
|
scope) unresolved module: not \
|
|
|
|
searching through module \
|
|
|
|
parents");
|
|
|
|
return Failed;
|
|
|
|
}
|
|
|
|
ExternModuleKind |
|
|
|
|
TraitModuleKind |
|
2013-05-13 18:13:20 -05:00
|
|
|
ImplModuleKind |
|
2012-12-23 16:41:37 -06:00
|
|
|
AnonymousModuleKind => {
|
|
|
|
search_module = parent_module_node;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
SearchThroughModules => {
|
|
|
|
search_module = parent_module_node;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
BlockParentLink(parent_module_node, _) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
search_module = parent_module_node;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Resolve the name in the parent module.
|
2012-12-13 15:05:22 -06:00
|
|
|
match self.resolve_name_in_module(search_module,
|
|
|
|
name,
|
|
|
|
namespace,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
PathSearch) {
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue up the search chain.
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// We couldn't see through the higher scope because of an
|
|
|
|
// unresolved import higher up. Bail.
|
|
|
|
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving item in lexical scope) indeterminate \
|
2012-08-22 19:24:52 -05:00
|
|
|
higher scope; bailing");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Success((target, used_reexport)) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// We found the module.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving item in lexical scope) found name \
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
in module, done");
|
|
|
|
return Success((target, used_reexport));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-31 17:17:22 -05:00
|
|
|
/// Resolves a module name in the current lexical scope.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_module_in_lexical_scope(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
module_: @Module,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name: Ident)
|
2013-12-19 21:02:22 -06:00
|
|
|
-> ResolveResult<@Module> {
|
2012-12-13 15:05:22 -06:00
|
|
|
// If this module is an anonymous module, resolve the item in the
|
|
|
|
// lexical scope. Otherwise, resolve the item from the crate root.
|
2012-12-23 16:41:37 -06:00
|
|
|
let resolve_result = self.resolve_item_in_lexical_scope(
|
|
|
|
module_, name, TypeNS, DontSearchThroughModules);
|
2012-12-13 15:05:22 -06:00
|
|
|
match resolve_result {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Success((target, _)) => {
|
2013-12-21 16:20:57 -06:00
|
|
|
let bindings = &*target.bindings;
|
2013-12-21 16:13:06 -06:00
|
|
|
match bindings.type_def.get() {
|
|
|
|
Some(type_def) => {
|
|
|
|
match type_def.module_def {
|
2012-10-15 20:04:15 -05:00
|
|
|
None => {
|
2013-10-21 15:08:31 -05:00
|
|
|
error!("!!! (resolving module in lexical \
|
2012-10-15 20:04:15 -05:00
|
|
|
scope) module wasn't actually a \
|
|
|
|
module!");
|
|
|
|
return Failed;
|
|
|
|
}
|
|
|
|
Some(module_def) => {
|
|
|
|
return Success(module_def);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None => {
|
2013-10-21 15:08:31 -05:00
|
|
|
error!("!!! (resolving module in lexical scope) module
|
2012-08-22 19:24:52 -05:00
|
|
|
wasn't actually a module!");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving module in lexical scope) indeterminate; \
|
2012-08-22 19:24:52 -05:00
|
|
|
bailing");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving module in lexical scope) failed to \
|
2012-08-22 19:24:52 -05:00
|
|
|
resolve");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-31 17:17:22 -05:00
|
|
|
/// Returns the nearest normal module parent of the given module.
|
2013-12-19 21:02:22 -06:00
|
|
|
fn get_nearest_normal_module_parent(&mut self, module_: @Module)
|
|
|
|
-> Option<@Module> {
|
2012-12-23 16:41:37 -06:00
|
|
|
let mut module_ = module_;
|
|
|
|
loop {
|
|
|
|
match module_.parent_link {
|
|
|
|
NoParentLink => return None,
|
|
|
|
ModuleParentLink(new_module, _) |
|
|
|
|
BlockParentLink(new_module, _) => {
|
2013-12-19 20:52:35 -06:00
|
|
|
match new_module.kind.get() {
|
2012-12-23 16:41:37 -06:00
|
|
|
NormalModuleKind => return Some(new_module),
|
|
|
|
ExternModuleKind |
|
|
|
|
TraitModuleKind |
|
2013-05-13 18:13:20 -05:00
|
|
|
ImplModuleKind |
|
2012-12-23 16:41:37 -06:00
|
|
|
AnonymousModuleKind => module_ = new_module,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-31 17:17:22 -05:00
|
|
|
/// Returns the nearest normal module parent of the given module, or the
|
|
|
|
/// module itself if it is a normal module.
|
2013-12-19 21:02:22 -06:00
|
|
|
fn get_nearest_normal_module_parent_or_self(&mut self, module_: @Module)
|
|
|
|
-> @Module {
|
2013-12-19 20:52:35 -06:00
|
|
|
match module_.kind.get() {
|
2012-12-23 16:41:37 -06:00
|
|
|
NormalModuleKind => return module_,
|
2013-05-13 18:13:20 -05:00
|
|
|
ExternModuleKind |
|
|
|
|
TraitModuleKind |
|
|
|
|
ImplModuleKind |
|
|
|
|
AnonymousModuleKind => {
|
2012-12-23 16:41:37 -06:00
|
|
|
match self.get_nearest_normal_module_parent(module_) {
|
|
|
|
None => module_,
|
|
|
|
Some(new_module) => new_module
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-06-26 17:56:13 -05:00
|
|
|
/// Resolves a "module prefix". A module prefix is one or both of (a) `self::`;
|
2013-05-31 17:17:22 -05:00
|
|
|
/// (b) some chain of `super::`.
|
2013-06-26 17:56:13 -05:00
|
|
|
/// grammar: (SELF MOD_SEP ) ? (SUPER MOD_SEP) *
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_module_prefix(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
module_: @Module,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
module_path: &[Ident])
|
2013-05-31 17:17:22 -05:00
|
|
|
-> ResolveResult<ModulePrefixResult> {
|
2012-12-23 16:41:37 -06:00
|
|
|
// Start at the current module if we see `self` or `super`, or at the
|
|
|
|
// top of the crate otherwise.
|
|
|
|
let mut containing_module;
|
|
|
|
let mut i;
|
2014-01-31 15:48:49 -06:00
|
|
|
let first_module_path_string = token::get_ident(module_path[0].name);
|
|
|
|
if "self" == first_module_path_string.get() {
|
2012-12-23 16:41:37 -06:00
|
|
|
containing_module =
|
|
|
|
self.get_nearest_normal_module_parent_or_self(module_);
|
|
|
|
i = 1;
|
2014-01-31 15:48:49 -06:00
|
|
|
} else if "super" == first_module_path_string.get() {
|
2012-12-23 16:41:37 -06:00
|
|
|
containing_module =
|
|
|
|
self.get_nearest_normal_module_parent_or_self(module_);
|
|
|
|
i = 0; // We'll handle `super` below.
|
|
|
|
} else {
|
|
|
|
return Success(NoPrefixFound);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now loop through all the `super`s we find.
|
2014-01-31 15:48:49 -06:00
|
|
|
while i < module_path.len() {
|
|
|
|
let string = token::get_ident(module_path[i].name);
|
|
|
|
if "super" != string.get() {
|
|
|
|
break
|
|
|
|
}
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving module prefix) resolving `super` at {}",
|
2012-12-23 16:41:37 -06:00
|
|
|
self.module_to_str(containing_module));
|
|
|
|
match self.get_nearest_normal_module_parent(containing_module) {
|
|
|
|
None => return Failed,
|
|
|
|
Some(new_module) => {
|
|
|
|
containing_module = new_module;
|
|
|
|
i += 1;
|
2012-12-13 15:05:22 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving module prefix) finished resolving prefix at {}",
|
2012-12-23 16:41:37 -06:00
|
|
|
self.module_to_str(containing_module));
|
|
|
|
|
|
|
|
return Success(PrefixFound(containing_module, i));
|
2012-12-13 15:05:22 -06:00
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Attempts to resolve the supplied name in the given module for the
|
|
|
|
/// given namespace. If successful, returns the target corresponding to
|
|
|
|
/// the name.
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
///
|
|
|
|
/// The boolean returned on success is an indicator of whether this lookup
|
|
|
|
/// passed through a public re-export proxy.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_name_in_module(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
module_: @Module,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name: Ident,
|
|
|
|
namespace: Namespace,
|
|
|
|
name_search_type: NameSearchType)
|
|
|
|
-> ResolveResult<(Target, bool)> {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving name in module) resolving `{}` in `{}`",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(name),
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// First, check the direct children of the module.
|
2013-08-21 20:39:30 -05:00
|
|
|
self.populate_module_if_necessary(module_);
|
2013-12-21 17:32:44 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
let children = module_.children.borrow();
|
|
|
|
match children.get().find(&name.name) {
|
|
|
|
Some(name_bindings)
|
|
|
|
if name_bindings.defined_in_namespace(namespace) => {
|
|
|
|
debug!("(resolving name in module) found node as child");
|
|
|
|
return Success((Target::new(module_, *name_bindings),
|
|
|
|
false));
|
|
|
|
}
|
|
|
|
Some(_) | None => {
|
|
|
|
// Continue.
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
// Next, check the module's imports if necessary.
|
|
|
|
|
|
|
|
// If this is a search of all imports, we should be done with glob
|
|
|
|
// resolution at this point.
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
if name_search_type == PathSearch {
|
2013-12-19 20:59:03 -06:00
|
|
|
assert_eq!(module_.glob_count.get(), 0);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
// Check the list of resolved imports.
|
2013-12-21 17:15:54 -06:00
|
|
|
let import_resolutions = module_.import_resolutions.borrow();
|
|
|
|
match import_resolutions.get().find(&name.name) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(import_resolution) => {
|
2013-12-21 19:32:22 -06:00
|
|
|
if import_resolution.is_public.get() &&
|
2013-12-21 19:30:36 -06:00
|
|
|
import_resolution.outstanding_references.get() != 0 {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving name in module) import \
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
unresolved; bailing out");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-01 12:44:43 -06:00
|
|
|
match import_resolution.target_for_namespace(namespace) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving name in module) name found, \
|
2013-09-28 00:38:08 -05:00
|
|
|
but not in namespace {:?}",
|
2012-08-22 19:24:52 -05:00
|
|
|
namespace);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Some(target) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving name in module) resolved to \
|
2012-08-22 19:24:52 -05:00
|
|
|
import");
|
2013-06-09 23:39:15 -05:00
|
|
|
self.used_imports.insert(import_resolution.id(namespace));
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
return Success((target, true));
|
2013-03-01 12:44:43 -06:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-03-26 21:53:33 -05:00
|
|
|
None => {} // Continue.
|
|
|
|
}
|
|
|
|
|
|
|
|
// Finally, search through external children.
|
|
|
|
if namespace == TypeNS {
|
2013-12-21 16:05:26 -06:00
|
|
|
let module_opt = {
|
|
|
|
let external_module_children =
|
|
|
|
module_.external_module_children.borrow();
|
|
|
|
external_module_children.get().find_copy(&name.name)
|
|
|
|
};
|
|
|
|
match module_opt {
|
2013-03-26 21:53:33 -05:00
|
|
|
None => {}
|
|
|
|
Some(module) => {
|
|
|
|
let name_bindings =
|
2013-12-21 16:20:57 -06:00
|
|
|
@Resolver::create_name_bindings_from_module(module);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
return Success((Target::new(module_, name_bindings), false));
|
2013-03-26 21:53:33 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// We're out of luck.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving name in module) failed to resolve `{}`",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(name));
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-12-19 21:02:22 -06:00
|
|
|
fn report_unresolved_imports(&mut self, module_: @Module) {
|
2013-12-19 21:01:02 -06:00
|
|
|
let index = module_.resolved_import_count.get();
|
2013-12-22 18:39:46 -06:00
|
|
|
let mut imports = module_.imports.borrow_mut();
|
|
|
|
let import_count = imports.get().len();
|
2012-05-22 12:54:12 -05:00
|
|
|
if index != import_count {
|
2013-12-22 18:39:46 -06:00
|
|
|
let sn = self.session
|
|
|
|
.codemap
|
|
|
|
.span_to_snippet(imports.get()[index].span)
|
|
|
|
.unwrap();
|
2013-06-10 02:32:36 -05:00
|
|
|
if sn.contains("::") {
|
2013-12-22 18:39:46 -06:00
|
|
|
self.resolve_error(imports.get()[index].span,
|
|
|
|
"unresolved import");
|
2013-04-26 03:59:28 -05:00
|
|
|
} else {
|
2013-09-28 00:38:08 -05:00
|
|
|
let err = format!("unresolved import (maybe you meant `{}::*`?)",
|
2013-05-31 09:39:02 -05:00
|
|
|
sn.slice(0, sn.len()));
|
2013-12-22 18:39:46 -06:00
|
|
|
self.resolve_error(imports.get()[index].span, err);
|
2013-04-26 03:59:28 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Descend into children and anonymous children.
|
2013-08-21 20:39:30 -05:00
|
|
|
self.populate_module_if_necessary(module_);
|
2013-12-21 17:32:44 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
let children = module_.children.borrow();
|
|
|
|
for (_, &child_node) in children.get().iter() {
|
|
|
|
match child_node.get_module_if_available() {
|
|
|
|
None => {
|
|
|
|
// Continue.
|
|
|
|
}
|
|
|
|
Some(child_module) => {
|
|
|
|
self.report_unresolved_imports(child_module);
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-21 16:23:40 -06:00
|
|
|
let anonymous_children = module_.anonymous_children.borrow();
|
|
|
|
for (_, &module_) in anonymous_children.get().iter() {
|
2012-07-31 18:38:41 -05:00
|
|
|
self.report_unresolved_imports(module_);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Export recording
|
|
|
|
//
|
|
|
|
// This pass simply determines what all "export" keywords refer to and
|
|
|
|
// writes the results into the export map.
|
|
|
|
//
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4953 This pass will be removed once exports change to per-item.
|
|
|
|
// Then this operation can simply be performed as part of item (or import)
|
2012-05-22 12:54:12 -05:00
|
|
|
// processing.
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn record_exports(&mut self) {
|
2013-02-04 16:02:01 -06:00
|
|
|
let root_module = self.graph_root.get_module();
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_exports_for_module_subtree(root_module);
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn record_exports_for_module_subtree(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
module_: @Module) {
|
2012-05-22 12:54:12 -05:00
|
|
|
// If this isn't a local crate, then bail out. We don't need to record
|
2012-11-13 17:43:54 -06:00
|
|
|
// exports for nonlocal crates.
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-12-19 20:56:20 -06:00
|
|
|
match module_.def_id.get() {
|
2013-07-27 03:25:59 -05:00
|
|
|
Some(def_id) if def_id.crate == LOCAL_CRATE => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// OK. Continue.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(recording exports for module subtree) recording \
|
2013-09-28 00:38:08 -05:00
|
|
|
exports for local module `{}`",
|
2013-06-18 11:39:16 -05:00
|
|
|
self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Record exports for the root module.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(recording exports for module subtree) recording \
|
2013-09-28 00:38:08 -05:00
|
|
|
exports for root module `{}`",
|
2013-06-18 11:39:16 -05:00
|
|
|
self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(_) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Bail out.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(recording exports for module subtree) not recording \
|
2013-09-28 00:38:08 -05:00
|
|
|
exports for `{}`",
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-08-01 19:30:05 -05:00
|
|
|
return;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-31 18:38:41 -05:00
|
|
|
self.record_exports_for_module(module_);
|
2013-08-21 20:39:30 -05:00
|
|
|
self.populate_module_if_necessary(module_);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-12-21 17:32:44 -06:00
|
|
|
{
|
|
|
|
let children = module_.children.borrow();
|
|
|
|
for (_, &child_name_bindings) in children.get().iter() {
|
|
|
|
match child_name_bindings.get_module_if_available() {
|
|
|
|
None => {
|
|
|
|
// Nothing to do.
|
|
|
|
}
|
|
|
|
Some(child_module) => {
|
|
|
|
self.record_exports_for_module_subtree(child_module);
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-21 16:23:40 -06:00
|
|
|
let anonymous_children = module_.anonymous_children.borrow();
|
|
|
|
for (_, &child_module) in anonymous_children.get().iter() {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_exports_for_module_subtree(child_module);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-19 21:02:22 -06:00
|
|
|
fn record_exports_for_module(&mut self, module_: @Module) {
|
2012-08-17 14:41:34 -05:00
|
|
|
let mut exports2 = ~[];
|
2012-09-24 19:29:20 -05:00
|
|
|
|
2013-01-30 19:20:02 -06:00
|
|
|
self.add_exports_for_module(&mut exports2, module_);
|
2013-12-19 20:56:20 -06:00
|
|
|
match module_.def_id.get() {
|
2012-09-24 19:29:20 -05:00
|
|
|
Some(def_id) => {
|
2013-12-20 23:14:25 -06:00
|
|
|
let mut export_map2 = self.export_map2.borrow_mut();
|
|
|
|
export_map2.get().insert(def_id.node, exports2);
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(computing exports) writing exports for {} (some)",
|
2012-09-24 19:29:20 -05:00
|
|
|
def_id.node);
|
|
|
|
}
|
|
|
|
None => {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn add_exports_of_namebindings(&mut self,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
exports2: &mut ~[Export2],
|
|
|
|
name: Name,
|
2013-12-21 16:20:57 -06:00
|
|
|
namebindings: @NameBindings,
|
2014-01-24 05:46:19 -06:00
|
|
|
ns: Namespace) {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
match namebindings.def_for_namespace(ns) {
|
|
|
|
Some(d) => {
|
2014-01-24 05:46:19 -06:00
|
|
|
debug!("(computing exports) YES: export '{}' => {:?}",
|
2014-01-31 14:25:11 -06:00
|
|
|
token::get_ident(name).get().to_str(),
|
2012-11-15 18:59:43 -06:00
|
|
|
def_id_of_def(d));
|
|
|
|
exports2.push(Export2 {
|
2014-01-31 14:25:11 -06:00
|
|
|
name: token::get_ident(name).get().to_str(),
|
2012-11-15 18:59:43 -06:00
|
|
|
def_id: def_id_of_def(d)
|
|
|
|
});
|
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
d_opt => {
|
2014-01-24 05:46:19 -06:00
|
|
|
debug!("(computing exports) NO: {:?}", d_opt);
|
2012-09-24 19:29:20 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn add_exports_for_module(&mut self,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
exports2: &mut ~[Export2],
|
2013-12-19 21:02:22 -06:00
|
|
|
module_: @Module) {
|
2013-12-21 17:15:54 -06:00
|
|
|
let import_resolutions = module_.import_resolutions.borrow();
|
|
|
|
for (name, importresolution) in import_resolutions.get().iter() {
|
2013-12-21 19:32:22 -06:00
|
|
|
if !importresolution.is_public.get() {
|
2013-12-21 17:15:54 -06:00
|
|
|
continue
|
|
|
|
}
|
2013-06-21 07:29:53 -05:00
|
|
|
let xs = [TypeNS, ValueNS];
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
for &ns in xs.iter() {
|
|
|
|
match importresolution.target_for_namespace(ns) {
|
2012-09-24 19:29:20 -05:00
|
|
|
Some(target) => {
|
2014-01-24 05:46:19 -06:00
|
|
|
debug!("(computing exports) maybe export '{}'",
|
2014-01-31 14:25:11 -06:00
|
|
|
token::get_ident(*name).get().to_str());
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.add_exports_of_namebindings(exports2,
|
2013-06-26 17:56:13 -05:00
|
|
|
*name,
|
2012-09-24 19:29:20 -05:00
|
|
|
target.bindings,
|
2014-01-24 05:46:19 -06:00
|
|
|
ns)
|
2012-09-24 19:29:20 -05:00
|
|
|
}
|
|
|
|
_ => ()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// AST resolution
|
|
|
|
//
|
2012-07-06 21:06:58 -05:00
|
|
|
// We maintain a list of value ribs and type ribs.
|
2012-05-22 12:54:12 -05:00
|
|
|
//
|
|
|
|
// Simultaneously, we keep track of the current position in the module
|
|
|
|
// graph in the `current_module` pointer. When we go to resolve a name in
|
|
|
|
// the value or type namespaces, we first look through all the ribs and
|
|
|
|
// then query the module graph. When we resolve a name in the module
|
|
|
|
// namespace, we can skip all the ribs (since nested modules are not
|
|
|
|
// allowed within blocks in Rust) and jump straight to the current module
|
|
|
|
// graph node.
|
|
|
|
//
|
|
|
|
// Named implementations are handled separately. When we find a method
|
|
|
|
// call, we consult the module node to find all of the implementations in
|
|
|
|
// scope. This information is lazily cached in the module node. We then
|
|
|
|
// generate a fake "implementation scope" containing all the
|
|
|
|
// implementations thus found, for compatibility with old resolve pass.
|
|
|
|
|
2013-11-19 15:22:03 -06:00
|
|
|
fn with_scope(&mut self, name: Option<Ident>, f: |&mut Resolver|) {
|
2012-05-22 12:54:12 -05:00
|
|
|
let orig_module = self.current_module;
|
|
|
|
|
|
|
|
// Move down in the graph.
|
2012-08-06 14:34:08 -05:00
|
|
|
match name {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-07-11 17:00:40 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(name) => {
|
2013-08-21 20:39:30 -05:00
|
|
|
self.populate_module_if_necessary(orig_module);
|
2013-12-21 17:32:44 -06:00
|
|
|
|
|
|
|
let children = orig_module.children.borrow();
|
|
|
|
match children.get().find(&name.name) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("!!! (with scope) didn't find `{}` in `{}`",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(name),
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(orig_module));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(name_bindings) => {
|
2012-08-06 14:34:08 -05:00
|
|
|
match (*name_bindings).get_module_if_available() {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("!!! (with scope) didn't find module \
|
2013-09-28 00:38:08 -05:00
|
|
|
for `{}` in `{}`",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(name),
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(orig_module));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(module_) => {
|
2012-07-31 18:38:41 -05:00
|
|
|
self.current_module = module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
f(self);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
self.current_module = orig_module;
|
|
|
|
}
|
|
|
|
|
2013-05-31 17:17:22 -05:00
|
|
|
/// Wraps the given definition in the appropriate number of `def_upvar`
|
|
|
|
/// wrappers.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn upvarify(&mut self,
|
2013-05-31 17:17:22 -05:00
|
|
|
ribs: &mut ~[@Rib],
|
|
|
|
rib_index: uint,
|
2013-08-31 11:13:04 -05:00
|
|
|
def_like: DefLike,
|
2014-01-27 06:18:36 -06:00
|
|
|
span: Span)
|
2013-08-31 11:13:04 -05:00
|
|
|
-> Option<DefLike> {
|
2012-05-22 12:54:12 -05:00
|
|
|
let mut def;
|
2013-04-12 00:15:30 -05:00
|
|
|
let is_ty_param;
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match def_like {
|
2013-11-28 14:22:53 -06:00
|
|
|
DlDef(d @ DefLocal(..)) | DlDef(d @ DefUpvar(..)) |
|
|
|
|
DlDef(d @ DefArg(..)) | DlDef(d @ DefBinding(..)) => {
|
2012-07-06 21:06:58 -05:00
|
|
|
def = d;
|
|
|
|
is_ty_param = false;
|
|
|
|
}
|
2013-11-28 14:22:53 -06:00
|
|
|
DlDef(d @ DefTyParam(..)) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
def = d;
|
2012-07-06 21:06:58 -05:00
|
|
|
is_ty_param = true;
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-08-20 14:23:37 -05:00
|
|
|
return Some(def_like);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
let mut rib_index = rib_index + 1;
|
2013-03-07 17:37:14 -06:00
|
|
|
while rib_index < ribs.len() {
|
|
|
|
match ribs[rib_index].kind {
|
2012-08-03 21:59:04 -05:00
|
|
|
NormalRibKind => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do. Continue.
|
|
|
|
}
|
2012-08-20 18:53:33 -05:00
|
|
|
FunctionRibKind(function_id, body_id) => {
|
2012-07-06 21:06:58 -05:00
|
|
|
if !is_ty_param {
|
2013-09-01 20:45:37 -05:00
|
|
|
def = DefUpvar(def_id_of_def(def).node,
|
2012-07-06 21:06:58 -05:00
|
|
|
@def,
|
2012-08-20 18:53:33 -05:00
|
|
|
function_id,
|
|
|
|
body_id);
|
2012-07-06 21:06:58 -05:00
|
|
|
}
|
|
|
|
}
|
2012-08-26 14:12:05 -05:00
|
|
|
MethodRibKind(item_id, _) => {
|
2012-07-26 16:04:03 -05:00
|
|
|
// If the def is a ty param, and came from the parent
|
|
|
|
// item, it's ok
|
2012-08-06 14:34:08 -05:00
|
|
|
match def {
|
2013-12-23 13:15:16 -06:00
|
|
|
DefTyParam(did, _) if {
|
|
|
|
let def_map = self.def_map.borrow();
|
|
|
|
def_map.get().find(&did.node).map(|x| *x)
|
|
|
|
== Some(DefTyParamBinder(item_id))
|
|
|
|
} => {
|
2012-07-26 16:04:03 -05:00
|
|
|
// ok
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-07-26 16:04:03 -05:00
|
|
|
if !is_ty_param {
|
|
|
|
// This was an attempt to access an upvar inside a
|
|
|
|
// named function item. This is not allowed, so we
|
|
|
|
// report an error.
|
|
|
|
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(
|
2012-07-26 16:04:03 -05:00
|
|
|
span,
|
2013-07-01 12:47:43 -05:00
|
|
|
"can't capture dynamic environment in a fn item; \
|
|
|
|
use the || { ... } closure form instead");
|
2012-07-26 16:04:03 -05:00
|
|
|
} else {
|
|
|
|
// This was an attempt to use a type parameter outside
|
|
|
|
// its scope.
|
|
|
|
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(span,
|
2013-05-19 00:07:44 -05:00
|
|
|
"attempt to use a type \
|
|
|
|
argument out of scope");
|
2012-07-26 16:04:03 -05:00
|
|
|
}
|
|
|
|
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-07-26 16:04:03 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
OpaqueFunctionRibKind => {
|
2012-07-06 21:06:58 -05:00
|
|
|
if !is_ty_param {
|
|
|
|
// This was an attempt to access an upvar inside a
|
|
|
|
// named function item. This is not allowed, so we
|
|
|
|
// report an error.
|
|
|
|
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(
|
2012-07-14 00:57:48 -05:00
|
|
|
span,
|
2013-07-01 12:47:43 -05:00
|
|
|
"can't capture dynamic environment in a fn item; \
|
|
|
|
use the || { ... } closure form instead");
|
2012-07-06 21:06:58 -05:00
|
|
|
} else {
|
|
|
|
// This was an attempt to use a type parameter outside
|
|
|
|
// its scope.
|
|
|
|
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(span,
|
2013-05-19 00:07:44 -05:00
|
|
|
"attempt to use a type \
|
|
|
|
argument out of scope");
|
2012-07-06 21:06:58 -05:00
|
|
|
}
|
|
|
|
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-10-15 14:27:09 -05:00
|
|
|
ConstantItemRibKind => {
|
2013-10-30 18:44:55 -05:00
|
|
|
if is_ty_param {
|
|
|
|
// see #9186
|
|
|
|
self.resolve_error(span,
|
|
|
|
"cannot use an outer type \
|
|
|
|
parameter in this context");
|
|
|
|
} else {
|
|
|
|
// Still doesn't deal with upvars
|
|
|
|
self.resolve_error(span,
|
|
|
|
"attempt to use a non-constant \
|
|
|
|
value in a constant");
|
|
|
|
}
|
2012-10-15 14:27:09 -05:00
|
|
|
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-10-15 14:27:09 -05:00
|
|
|
rib_index += 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-08-31 11:13:04 -05:00
|
|
|
return Some(DlDef(def));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn search_ribs(&mut self,
|
2013-05-31 17:17:22 -05:00
|
|
|
ribs: &mut ~[@Rib],
|
2013-06-26 17:56:13 -05:00
|
|
|
name: Name,
|
2014-01-27 06:18:36 -06:00
|
|
|
span: Span)
|
2013-08-31 11:13:04 -05:00
|
|
|
-> Option<DefLike> {
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4950: This should not use a while loop.
|
|
|
|
// FIXME #4950: Try caching?
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-03-07 17:37:14 -06:00
|
|
|
let mut i = ribs.len();
|
2012-10-15 14:27:09 -05:00
|
|
|
while i != 0 {
|
|
|
|
i -= 1;
|
2013-12-21 15:58:11 -06:00
|
|
|
let binding_opt = {
|
|
|
|
let bindings = ribs[i].bindings.borrow();
|
|
|
|
bindings.get().find_copy(&name)
|
|
|
|
};
|
|
|
|
match binding_opt {
|
|
|
|
Some(def_like) => {
|
2014-01-27 06:18:36 -06:00
|
|
|
return self.upvarify(ribs, i, def_like, span);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_crate(&mut self, crate: &ast::Crate) {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving crate) starting");
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-09-27 21:46:09 -05:00
|
|
|
visit::walk_crate(self, crate, ());
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
fn resolve_item(&mut self, item: &Item) {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving item) resolving {}",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(item.ident));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-03-20 00:17:42 -05:00
|
|
|
match item.node {
|
2012-10-15 14:27:09 -05:00
|
|
|
|
|
|
|
// enum item: resolve all the variants' discrs,
|
|
|
|
// then resolve the ty params
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemEnum(ref enum_def, ref generics) => {
|
2013-08-03 11:45:23 -05:00
|
|
|
for variant in (*enum_def).variants.iter() {
|
|
|
|
for dis_expr in variant.node.disr_expr.iter() {
|
2012-10-15 14:27:09 -05:00
|
|
|
// resolve the discriminator expr
|
|
|
|
// as a constant
|
2013-09-26 21:10:16 -05:00
|
|
|
self.with_constant_rib(|this| {
|
|
|
|
this.resolve_expr(*dis_expr);
|
2012-10-15 14:27:09 -05:00
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// n.b. the discr expr gets visted twice.
|
|
|
|
// but maybe it's okay since the first time will signal an
|
|
|
|
// error if there is one? -- tjc
|
2013-11-21 17:42:55 -06:00
|
|
|
self.with_type_parameter_rib(HasTypeParameters(generics,
|
|
|
|
item.id,
|
|
|
|
0,
|
|
|
|
NormalRibKind),
|
|
|
|
|this| {
|
2013-09-26 21:10:16 -05:00
|
|
|
visit::walk_item(this, item, ());
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-10-15 14:27:09 -05:00
|
|
|
}
|
2012-10-15 15:14:23 -05:00
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemTy(_, ref generics) => {
|
2013-11-21 17:42:55 -06:00
|
|
|
self.with_type_parameter_rib(HasTypeParameters(generics,
|
|
|
|
item.id,
|
|
|
|
0,
|
|
|
|
NormalRibKind),
|
|
|
|
|this| {
|
2013-09-26 21:10:16 -05:00
|
|
|
visit::walk_item(this, item, ());
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemImpl(ref generics,
|
2013-07-05 19:47:42 -05:00
|
|
|
ref implemented_traits,
|
2013-11-30 16:00:39 -06:00
|
|
|
self_type,
|
2013-02-14 23:50:03 -06:00
|
|
|
ref methods) => {
|
2012-10-22 19:57:10 -05:00
|
|
|
self.resolve_implementation(item.id,
|
2013-02-14 23:50:03 -06:00
|
|
|
generics,
|
2012-07-18 18:28:31 -05:00
|
|
|
implemented_traits,
|
2012-10-22 19:57:10 -05:00
|
|
|
self_type,
|
2013-09-26 21:10:16 -05:00
|
|
|
*methods);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemTrait(ref generics, ref traits, ref methods) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Create a new rib for the self type.
|
2013-08-31 11:13:04 -05:00
|
|
|
let self_type_rib = @Rib::new(NormalRibKind);
|
2013-12-22 18:48:05 -06:00
|
|
|
{
|
|
|
|
let mut type_ribs = self.type_ribs.borrow_mut();
|
|
|
|
type_ribs.get().push(self_type_rib);
|
|
|
|
}
|
2013-06-26 17:56:13 -05:00
|
|
|
// plain insert (no renaming)
|
|
|
|
let name = self.type_self_ident.name;
|
2013-12-21 15:58:11 -06:00
|
|
|
{
|
|
|
|
let mut bindings = self_type_rib.bindings.borrow_mut();
|
|
|
|
bindings.get().insert(name, DlDef(DefSelfTy(item.id)));
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-31 12:27:51 -05:00
|
|
|
// Create a new rib for the trait-wide type parameters.
|
2013-11-21 17:42:55 -06:00
|
|
|
self.with_type_parameter_rib(HasTypeParameters(generics,
|
|
|
|
item.id,
|
|
|
|
0,
|
|
|
|
NormalRibKind),
|
|
|
|
|this| {
|
2013-09-26 21:10:16 -05:00
|
|
|
this.resolve_type_parameters(&generics.ty_params);
|
2012-07-12 20:04:40 -05:00
|
|
|
|
2012-08-03 17:02:01 -05:00
|
|
|
// Resolve derived traits.
|
2013-08-03 11:45:23 -05:00
|
|
|
for trt in traits.iter() {
|
2013-09-26 21:10:16 -05:00
|
|
|
this.resolve_trait_reference(item.id, trt, TraitDerivation);
|
2012-08-03 17:02:01 -05:00
|
|
|
}
|
|
|
|
|
2013-08-03 11:45:23 -05:00
|
|
|
for method in (*methods).iter() {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Create a new rib for the method-specific type
|
|
|
|
// parameters.
|
|
|
|
//
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4951: Do we need a node ID here?
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-09-19 18:55:01 -05:00
|
|
|
match *method {
|
2014-01-09 07:05:33 -06:00
|
|
|
ast::Required(ref ty_m) => {
|
2013-11-21 17:42:55 -06:00
|
|
|
this.with_type_parameter_rib
|
2013-02-14 23:50:03 -06:00
|
|
|
(HasTypeParameters(&ty_m.generics,
|
2012-05-22 12:54:12 -05:00
|
|
|
item.id,
|
2013-02-14 23:50:03 -06:00
|
|
|
generics.ty_params.len(),
|
2013-11-21 17:42:55 -06:00
|
|
|
MethodRibKind(item.id, Required)),
|
|
|
|
|this| {
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-10 15:44:20 -05:00
|
|
|
// Resolve the method-specific type
|
|
|
|
// parameters.
|
2013-09-26 21:10:16 -05:00
|
|
|
this.resolve_type_parameters(
|
|
|
|
&ty_m.generics.ty_params);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-08-03 11:45:23 -05:00
|
|
|
for argument in ty_m.decl.inputs.iter() {
|
2013-11-30 16:00:39 -06:00
|
|
|
this.resolve_type(argument.ty);
|
2012-07-10 15:44:20 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-11-30 16:00:39 -06:00
|
|
|
this.resolve_type(ty_m.decl.output);
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-07-10 15:44:20 -05:00
|
|
|
}
|
2014-01-09 07:05:33 -06:00
|
|
|
ast::Provided(m) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
this.resolve_method(MethodRibKind(item.id,
|
2012-07-26 16:04:03 -05:00
|
|
|
Provided(m.id)),
|
2012-07-10 15:44:20 -05:00
|
|
|
m,
|
2013-09-26 21:10:16 -05:00
|
|
|
generics.ty_params.len())
|
2012-07-10 15:44:20 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-12-22 18:48:05 -06:00
|
|
|
let mut type_ribs = self.type_ribs.borrow_mut();
|
|
|
|
type_ribs.get().pop();
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemStruct(ref struct_def, ref generics) => {
|
2012-12-10 15:47:54 -06:00
|
|
|
self.resolve_struct(item.id,
|
2013-02-14 23:50:03 -06:00
|
|
|
generics,
|
2013-09-26 21:10:16 -05:00
|
|
|
struct_def.fields);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemMod(ref module_) => {
|
2013-11-21 17:42:55 -06:00
|
|
|
self.with_scope(Some(item.ident), |this| {
|
2013-09-26 21:10:16 -05:00
|
|
|
this.resolve_module(module_, item.span, item.ident,
|
|
|
|
item.id);
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemForeignMod(ref foreign_module) => {
|
2013-11-21 17:42:55 -06:00
|
|
|
self.with_scope(Some(item.ident), |this| {
|
2013-08-03 11:45:23 -05:00
|
|
|
for foreign_item in foreign_module.items.iter() {
|
2013-02-14 23:50:03 -06:00
|
|
|
match foreign_item.node {
|
2014-01-09 07:05:33 -06:00
|
|
|
ForeignItemFn(_, ref generics) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
this.with_type_parameter_rib(
|
2013-02-14 23:50:03 -06:00
|
|
|
HasTypeParameters(
|
|
|
|
generics, foreign_item.id, 0,
|
|
|
|
NormalRibKind),
|
2013-09-26 21:10:16 -05:00
|
|
|
|this| visit::walk_foreign_item(this,
|
2013-08-13 11:52:41 -05:00
|
|
|
*foreign_item,
|
|
|
|
()));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2014-01-09 07:05:33 -06:00
|
|
|
ForeignItemStatic(..) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
visit::walk_foreign_item(this,
|
2013-08-13 11:52:41 -05:00
|
|
|
*foreign_item,
|
|
|
|
());
|
2012-08-25 17:09:33 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemFn(fn_decl, _, _, ref generics, block) => {
|
2012-07-06 21:06:58 -05:00
|
|
|
self.resolve_function(OpaqueFunctionRibKind,
|
2013-03-20 00:17:42 -05:00
|
|
|
Some(fn_decl),
|
2012-07-06 21:06:58 -05:00
|
|
|
HasTypeParameters
|
2013-02-14 23:50:03 -06:00
|
|
|
(generics,
|
2012-07-06 21:06:58 -05:00
|
|
|
item.id,
|
2012-11-29 14:08:40 -06:00
|
|
|
0,
|
2012-07-06 21:06:58 -05:00
|
|
|
OpaqueFunctionRibKind),
|
2014-01-27 06:18:36 -06:00
|
|
|
block);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ItemStatic(..) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.with_constant_rib(|this| {
|
|
|
|
visit::walk_item(this, item, ());
|
2012-10-15 14:27:09 -05:00
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-07-05 14:10:33 -05:00
|
|
|
|
2013-12-25 12:10:33 -06:00
|
|
|
ItemMac(..) => {
|
|
|
|
// do nothing, these are just around to be encoded
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn with_type_parameter_rib(&mut self,
|
2013-11-19 15:22:03 -06:00
|
|
|
type_parameters: TypeParameters,
|
|
|
|
f: |&mut Resolver|) {
|
2012-08-06 14:34:08 -05:00
|
|
|
match type_parameters {
|
2013-02-14 23:50:03 -06:00
|
|
|
HasTypeParameters(generics, node_id, initial_index,
|
2012-08-03 21:59:04 -05:00
|
|
|
rib_kind) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-08-31 11:13:04 -05:00
|
|
|
let function_type_rib = @Rib::new(rib_kind);
|
2013-12-22 18:48:05 -06:00
|
|
|
{
|
|
|
|
let mut type_ribs = self.type_ribs.borrow_mut();
|
|
|
|
type_ribs.get().push(function_type_rib);
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-08-03 11:45:23 -05:00
|
|
|
for (index, type_parameter) in generics.ty_params.iter().enumerate() {
|
2013-06-05 21:49:41 -05:00
|
|
|
let ident = type_parameter.ident;
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("with_type_parameter_rib: {} {}", node_id,
|
2012-08-22 19:24:52 -05:00
|
|
|
type_parameter.id);
|
2013-09-01 20:45:37 -05:00
|
|
|
let def_like = DlDef(DefTyParam
|
2012-05-22 12:54:12 -05:00
|
|
|
(local_def(type_parameter.id),
|
|
|
|
index + initial_index));
|
2012-07-26 16:04:03 -05:00
|
|
|
// Associate this type parameter with
|
|
|
|
// the item that bound it
|
|
|
|
self.record_def(type_parameter.id,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
(DefTyParamBinder(node_id), AllPublic));
|
2013-06-26 17:56:13 -05:00
|
|
|
// plain insert (no renaming)
|
2013-12-21 15:58:11 -06:00
|
|
|
let mut bindings = function_type_rib.bindings
|
|
|
|
.borrow_mut();
|
|
|
|
bindings.get().insert(ident.name, def_like);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
NoTypeParameters => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
f(self);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match type_parameters {
|
2013-11-28 14:22:53 -06:00
|
|
|
HasTypeParameters(..) => {
|
2013-12-22 18:48:05 -06:00
|
|
|
let mut type_ribs = self.type_ribs.borrow_mut();
|
|
|
|
type_ribs.get().pop();
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-14 21:20:56 -05:00
|
|
|
NoTypeParameters => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-19 15:22:03 -06:00
|
|
|
fn with_label_rib(&mut self, f: |&mut Resolver|) {
|
2013-12-22 16:31:49 -06:00
|
|
|
{
|
|
|
|
let mut label_ribs = self.label_ribs.borrow_mut();
|
|
|
|
label_ribs.get().push(@Rib::new(NormalRibKind));
|
|
|
|
}
|
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
f(self);
|
2013-12-22 16:31:49 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
let mut label_ribs = self.label_ribs.borrow_mut();
|
|
|
|
label_ribs.get().pop();
|
|
|
|
}
|
2012-08-14 21:20:56 -05:00
|
|
|
}
|
2013-02-21 13:08:50 -06:00
|
|
|
|
2013-11-19 15:22:03 -06:00
|
|
|
fn with_constant_rib(&mut self, f: |&mut Resolver|) {
|
2013-12-22 18:48:05 -06:00
|
|
|
{
|
|
|
|
let mut value_ribs = self.value_ribs.borrow_mut();
|
|
|
|
let mut type_ribs = self.type_ribs.borrow_mut();
|
|
|
|
value_ribs.get().push(@Rib::new(ConstantItemRibKind));
|
|
|
|
type_ribs.get().push(@Rib::new(ConstantItemRibKind));
|
|
|
|
}
|
2013-09-26 21:10:16 -05:00
|
|
|
f(self);
|
2013-12-22 18:48:05 -06:00
|
|
|
{
|
|
|
|
let mut value_ribs = self.value_ribs.borrow_mut();
|
|
|
|
let mut type_ribs = self.type_ribs.borrow_mut();
|
|
|
|
type_ribs.get().pop();
|
|
|
|
value_ribs.get().pop();
|
|
|
|
}
|
2012-10-15 14:27:09 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_function(&mut self,
|
2014-01-27 06:18:36 -06:00
|
|
|
rib_kind: RibKind,
|
|
|
|
optional_declaration: Option<P<FnDecl>>,
|
|
|
|
type_parameters: TypeParameters,
|
|
|
|
block: P<Block>) {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Create a value rib for the function.
|
2013-08-31 11:13:04 -05:00
|
|
|
let function_value_rib = @Rib::new(rib_kind);
|
2013-12-22 18:48:05 -06:00
|
|
|
{
|
|
|
|
let mut value_ribs = self.value_ribs.borrow_mut();
|
|
|
|
value_ribs.get().push(function_value_rib);
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-14 21:20:56 -05:00
|
|
|
// Create a label rib for the function.
|
2013-12-22 16:31:49 -06:00
|
|
|
{
|
|
|
|
let mut label_ribs = self.label_ribs.borrow_mut();
|
|
|
|
let function_label_rib = @Rib::new(rib_kind);
|
|
|
|
label_ribs.get().push(function_label_rib);
|
|
|
|
}
|
2012-08-14 21:20:56 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// If this function has type parameters, add them now.
|
2013-11-21 17:42:55 -06:00
|
|
|
self.with_type_parameter_rib(type_parameters, |this| {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Resolve the type parameters.
|
2012-08-06 14:34:08 -05:00
|
|
|
match type_parameters {
|
2012-08-03 21:59:04 -05:00
|
|
|
NoTypeParameters => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
2013-02-14 23:50:03 -06:00
|
|
|
HasTypeParameters(ref generics, _, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
this.resolve_type_parameters(&generics.ty_params);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add each argument to the rib.
|
2012-08-06 14:34:08 -05:00
|
|
|
match optional_declaration {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(declaration) => {
|
2013-08-03 11:45:23 -05:00
|
|
|
for argument in declaration.inputs.iter() {
|
2013-04-24 03:29:46 -05:00
|
|
|
let binding_mode = ArgumentIrrefutableMode;
|
2013-09-26 21:10:16 -05:00
|
|
|
this.resolve_pattern(argument.pat,
|
2012-11-06 20:41:06 -06:00
|
|
|
binding_mode,
|
2013-09-26 21:10:16 -05:00
|
|
|
None);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-11-30 16:00:39 -06:00
|
|
|
this.resolve_type(argument.ty);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving function) recorded argument");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-11-30 16:00:39 -06:00
|
|
|
this.resolve_type(declaration.output);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Resolve the function body.
|
2013-09-26 21:10:16 -05:00
|
|
|
this.resolve_block(block);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving function) leaving function");
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-12-22 16:31:49 -06:00
|
|
|
let mut label_ribs = self.label_ribs.borrow_mut();
|
|
|
|
label_ribs.get().pop();
|
2013-12-22 18:48:05 -06:00
|
|
|
|
|
|
|
let mut value_ribs = self.value_ribs.borrow_mut();
|
|
|
|
value_ribs.get().pop();
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_type_parameters(&mut self,
|
2013-09-26 21:10:16 -05:00
|
|
|
type_parameters: &OptVec<TyParam>) {
|
2013-08-03 11:45:23 -05:00
|
|
|
for type_parameter in type_parameters.iter() {
|
|
|
|
for bound in type_parameter.bounds.iter() {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_type_parameter_bound(type_parameter.id, bound);
|
2013-05-10 14:57:27 -05:00
|
|
|
}
|
2014-01-30 11:28:02 -06:00
|
|
|
match type_parameter.default {
|
|
|
|
Some(ty) => self.resolve_type(ty),
|
|
|
|
None => {}
|
|
|
|
}
|
2013-05-10 14:57:27 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_type_parameter_bound(&mut self,
|
2013-07-27 03:25:59 -05:00
|
|
|
id: NodeId,
|
2013-09-26 21:10:16 -05:00
|
|
|
type_parameter_bound: &TyParamBound) {
|
2013-05-10 14:57:27 -05:00
|
|
|
match *type_parameter_bound {
|
2013-07-05 19:47:42 -05:00
|
|
|
TraitTyParamBound(ref tref) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_trait_reference(id, tref, TraitBoundingTypeParameter)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-05-10 14:57:27 -05:00
|
|
|
RegionTyParamBound => {}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_trait_reference(&mut self,
|
2013-07-27 03:25:59 -05:00
|
|
|
id: NodeId,
|
2014-01-09 07:05:33 -06:00
|
|
|
trait_reference: &TraitRef,
|
2013-07-03 16:16:08 -05:00
|
|
|
reference_type: TraitReferenceType) {
|
2013-09-26 21:10:16 -05:00
|
|
|
match self.resolve_path(id, &trait_reference.path, TypeNS, true) {
|
2013-03-27 05:16:28 -05:00
|
|
|
None => {
|
2013-08-07 11:47:28 -05:00
|
|
|
let path_str = self.path_idents_to_str(&trait_reference.path);
|
2013-07-03 16:16:08 -05:00
|
|
|
let usage_str = match reference_type {
|
2013-07-03 17:43:03 -05:00
|
|
|
TraitBoundingTypeParameter => "bound type parameter with",
|
2013-07-03 16:16:08 -05:00
|
|
|
TraitImplementation => "implement",
|
|
|
|
TraitDerivation => "derive"
|
|
|
|
};
|
|
|
|
|
2013-09-28 00:38:08 -05:00
|
|
|
let msg = format!("attempt to {} a nonexistent trait `{}`", usage_str, path_str);
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(trait_reference.path.span, msg);
|
2013-03-27 05:16:28 -05:00
|
|
|
}
|
|
|
|
Some(def) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving trait) found trait def: {:?}", def);
|
2013-03-27 05:16:28 -05:00
|
|
|
self.record_def(trait_reference.ref_id, def);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_struct(&mut self,
|
2013-07-27 03:25:59 -05:00
|
|
|
id: NodeId,
|
2013-05-31 17:17:22 -05:00
|
|
|
generics: &Generics,
|
2014-01-09 07:05:33 -06:00
|
|
|
fields: &[StructField]) {
|
|
|
|
let mut ident_map: HashMap<ast::Ident, &StructField> = HashMap::new();
|
2013-11-30 10:27:25 -06:00
|
|
|
for field in fields.iter() {
|
2013-06-27 19:27:56 -05:00
|
|
|
match field.node.kind {
|
2014-01-09 07:05:33 -06:00
|
|
|
NamedField(ident, _) => {
|
2013-06-27 19:27:56 -05:00
|
|
|
match ident_map.find(&ident) {
|
|
|
|
Some(&prev_field) => {
|
|
|
|
let ident_str = self.session.str_of(ident);
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(field.span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("field `{}` is already declared", ident_str));
|
2013-06-27 19:27:56 -05:00
|
|
|
self.session.span_note(prev_field.span,
|
2014-02-06 03:38:08 -06:00
|
|
|
"previously declared here");
|
2013-06-27 19:27:56 -05:00
|
|
|
},
|
|
|
|
None => {
|
|
|
|
ident_map.insert(ident, field);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_ => ()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// If applicable, create a rib for the type parameters.
|
2013-11-21 17:42:55 -06:00
|
|
|
self.with_type_parameter_rib(HasTypeParameters(generics,
|
|
|
|
id,
|
|
|
|
0,
|
|
|
|
OpaqueFunctionRibKind),
|
|
|
|
|this| {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Resolve the type parameters.
|
2013-09-26 21:10:16 -05:00
|
|
|
this.resolve_type_parameters(&generics.ty_params);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-15 17:53:58 -05:00
|
|
|
// Resolve fields.
|
2013-08-03 11:45:23 -05:00
|
|
|
for field in fields.iter() {
|
2013-11-30 16:00:39 -06:00
|
|
|
this.resolve_type(field.node.ty);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-07-10 15:44:20 -05:00
|
|
|
// Does this really need to take a RibKind or is it always going
|
|
|
|
// to be NormalRibKind?
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_method(&mut self,
|
2014-01-27 06:18:36 -06:00
|
|
|
rib_kind: RibKind,
|
|
|
|
method: @Method,
|
|
|
|
outer_type_parameter_count: uint) {
|
2013-02-14 23:50:03 -06:00
|
|
|
let method_generics = &method.generics;
|
2012-07-10 15:44:20 -05:00
|
|
|
let type_parameters =
|
2013-02-14 23:50:03 -06:00
|
|
|
HasTypeParameters(method_generics,
|
2012-07-10 15:44:20 -05:00
|
|
|
method.id,
|
|
|
|
outer_type_parameter_count,
|
|
|
|
rib_kind);
|
2012-08-02 18:01:38 -05:00
|
|
|
|
2014-01-27 06:18:36 -06:00
|
|
|
self.resolve_function(rib_kind, Some(method.decl), type_parameters, method.body);
|
2012-07-10 15:44:20 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_implementation(&mut self,
|
2013-07-27 03:25:59 -05:00
|
|
|
id: NodeId,
|
2013-05-31 17:17:22 -05:00
|
|
|
generics: &Generics,
|
2014-01-09 07:05:33 -06:00
|
|
|
opt_trait_reference: &Option<TraitRef>,
|
2013-07-05 23:57:11 -05:00
|
|
|
self_type: &Ty,
|
2014-01-09 07:05:33 -06:00
|
|
|
methods: &[@Method]) {
|
2012-05-22 12:54:12 -05:00
|
|
|
// If applicable, create a rib for the type parameters.
|
2013-02-14 23:50:03 -06:00
|
|
|
let outer_type_parameter_count = generics.ty_params.len();
|
2013-11-21 17:42:55 -06:00
|
|
|
self.with_type_parameter_rib(HasTypeParameters(generics,
|
|
|
|
id,
|
|
|
|
0,
|
|
|
|
NormalRibKind),
|
|
|
|
|this| {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Resolve the type parameters.
|
2013-09-26 21:10:16 -05:00
|
|
|
this.resolve_type_parameters(&generics.ty_params);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-31 12:27:51 -05:00
|
|
|
// Resolve the trait reference, if necessary.
|
2013-03-07 17:37:14 -06:00
|
|
|
let original_trait_refs;
|
2012-09-07 17:11:26 -05:00
|
|
|
match opt_trait_reference {
|
2013-07-05 19:47:42 -05:00
|
|
|
&Some(ref trait_reference) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
this.resolve_trait_reference(id, trait_reference,
|
2013-07-08 10:34:28 -05:00
|
|
|
TraitImplementation);
|
2012-07-11 17:00:40 -05:00
|
|
|
|
2012-10-15 20:04:15 -05:00
|
|
|
// Record the current set of trait references.
|
2013-03-27 05:16:28 -05:00
|
|
|
let mut new_trait_refs = ~[];
|
2013-06-10 16:50:12 -05:00
|
|
|
{
|
2013-12-23 13:15:16 -06:00
|
|
|
let def_map = this.def_map.borrow();
|
|
|
|
let r = def_map.get().find(&trait_reference.ref_id);
|
2013-08-03 11:45:23 -05:00
|
|
|
for &def in r.iter() {
|
2013-06-10 16:50:12 -05:00
|
|
|
new_trait_refs.push(def_id_of_def(*def));
|
|
|
|
}
|
2013-03-27 05:16:28 -05:00
|
|
|
}
|
2014-01-31 14:35:36 -06:00
|
|
|
original_trait_refs = Some(replace(
|
2013-09-26 21:10:16 -05:00
|
|
|
&mut this.current_trait_refs,
|
2013-03-27 05:16:28 -05:00
|
|
|
Some(new_trait_refs)));
|
2013-03-07 17:37:14 -06:00
|
|
|
}
|
2013-07-05 19:47:42 -05:00
|
|
|
&None => {
|
2013-03-07 17:37:14 -06:00
|
|
|
original_trait_refs = None;
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
2012-09-07 17:11:26 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Resolve the self type.
|
2013-09-26 21:10:16 -05:00
|
|
|
this.resolve_type(self_type);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-08-03 11:45:23 -05:00
|
|
|
for method in methods.iter() {
|
2012-11-13 21:08:01 -06:00
|
|
|
// We also need a new scope for the method-specific
|
|
|
|
// type parameters.
|
2013-09-26 21:10:16 -05:00
|
|
|
this.resolve_method(MethodRibKind(
|
2012-11-13 21:08:01 -06:00
|
|
|
id,
|
|
|
|
Provided(method.id)),
|
|
|
|
*method,
|
2013-09-26 21:10:16 -05:00
|
|
|
outer_type_parameter_count);
|
2012-08-02 18:01:38 -05:00
|
|
|
/*
|
2012-10-22 19:57:10 -05:00
|
|
|
let borrowed_type_parameters = &method.tps;
|
|
|
|
self.resolve_function(MethodRibKind(
|
|
|
|
id,
|
|
|
|
Provided(method.id)),
|
2013-11-30 16:00:39 -06:00
|
|
|
Some(method.decl),
|
2012-10-22 19:57:10 -05:00
|
|
|
HasTypeParameters
|
|
|
|
(borrowed_type_parameters,
|
|
|
|
method.id,
|
|
|
|
outer_type_parameter_count,
|
|
|
|
NormalRibKind),
|
2014-01-27 06:18:36 -06:00
|
|
|
method.body);
|
2012-08-02 18:01:38 -05:00
|
|
|
*/
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-07-11 17:00:40 -05:00
|
|
|
|
2012-07-18 18:28:31 -05:00
|
|
|
// Restore the original trait references.
|
2013-03-07 17:37:14 -06:00
|
|
|
match original_trait_refs {
|
2013-09-26 21:10:16 -05:00
|
|
|
Some(r) => { this.current_trait_refs = r; }
|
2013-03-07 17:37:14 -06:00
|
|
|
None => ()
|
|
|
|
}
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
fn resolve_module(&mut self, module: &Mod, _span: Span,
|
|
|
|
_name: Ident, id: NodeId) {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Write the implementations in scope into the module metadata.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving module) resolving module ID {}", id);
|
2014-01-09 07:05:33 -06:00
|
|
|
visit::walk_mod(self, module, ());
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-06 06:00:46 -06:00
|
|
|
fn resolve_local(&mut self, local: &Local) {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Resolve the type.
|
2013-11-30 16:00:39 -06:00
|
|
|
self.resolve_type(local.ty);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Resolve the initializer, if necessary.
|
2013-07-19 00:38:55 -05:00
|
|
|
match local.init {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(initializer) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_expr(initializer);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Resolve the pattern.
|
2013-10-20 07:31:23 -05:00
|
|
|
self.resolve_pattern(local.pat, LocalIrrefutableMode, None);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-09-05 16:15:00 -05:00
|
|
|
// build a map from pattern identifiers to binding-info's.
|
|
|
|
// this is done hygienically. This could arise for a macro
|
|
|
|
// that expands into an or-pattern where one 'x' was from the
|
|
|
|
// user and one 'x' came from the macro.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn binding_mode_map(&mut self, pat: @Pat) -> BindingMap {
|
2013-04-03 08:28:36 -05:00
|
|
|
let mut result = HashMap::new();
|
2013-11-21 17:42:55 -06:00
|
|
|
pat_bindings(self.def_map, pat, |binding_mode, _id, sp, path| {
|
2013-09-05 16:15:00 -05:00
|
|
|
let name = mtwt_resolve(path_to_ident(path));
|
2013-06-26 17:56:13 -05:00
|
|
|
result.insert(name,
|
2012-08-06 09:20:23 -05:00
|
|
|
binding_info {span: sp,
|
|
|
|
binding_mode: binding_mode});
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-08-06 09:20:23 -05:00
|
|
|
return result;
|
2012-07-10 20:24:41 -05:00
|
|
|
}
|
|
|
|
|
2013-09-05 16:15:00 -05:00
|
|
|
// check that all of the arms in an or-pattern have exactly the
|
|
|
|
// same set of bindings, with the same binding modes for each.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn check_consistent_bindings(&mut self, arm: &Arm) {
|
2012-08-06 09:20:23 -05:00
|
|
|
if arm.pats.len() == 0 { return; }
|
|
|
|
let map_0 = self.binding_mode_map(arm.pats[0]);
|
2013-08-03 11:45:23 -05:00
|
|
|
for (i, p) in arm.pats.iter().enumerate() {
|
2012-09-21 20:43:30 -05:00
|
|
|
let map_i = self.binding_mode_map(*p);
|
2012-08-06 09:20:23 -05:00
|
|
|
|
2013-08-03 11:45:23 -05:00
|
|
|
for (&key, &binding_0) in map_0.iter() {
|
2013-02-03 22:29:17 -06:00
|
|
|
match map_i.find(&key) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2014-01-31 14:25:11 -06:00
|
|
|
let string = token::get_ident(key);
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(
|
2012-08-06 09:20:23 -05:00
|
|
|
p.span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("variable `{}` from pattern \\#1 is \
|
|
|
|
not bound in pattern \\#{}",
|
2014-01-31 14:25:11 -06:00
|
|
|
string.get(),
|
|
|
|
i + 1));
|
2012-08-06 09:20:23 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(binding_i) => {
|
2012-08-06 09:20:23 -05:00
|
|
|
if binding_0.binding_mode != binding_i.binding_mode {
|
2014-01-31 14:25:11 -06:00
|
|
|
let string = token::get_ident(key);
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(
|
2012-08-06 09:20:23 -05:00
|
|
|
binding_i.span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("variable `{}` is bound with different \
|
|
|
|
mode in pattern \\#{} than in pattern \\#1",
|
2014-01-31 14:25:11 -06:00
|
|
|
string.get(),
|
|
|
|
i + 1));
|
2012-08-06 09:20:23 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-03 11:45:23 -05:00
|
|
|
for (&key, &binding) in map_i.iter() {
|
2013-02-08 16:08:02 -06:00
|
|
|
if !map_0.contains_key(&key) {
|
2014-01-31 14:25:11 -06:00
|
|
|
let string = token::get_ident(key);
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(
|
2012-08-06 09:20:23 -05:00
|
|
|
binding.span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("variable `{}` from pattern \\#{} is \
|
|
|
|
not bound in pattern \\#1",
|
2014-01-31 14:25:11 -06:00
|
|
|
string.get(),
|
|
|
|
i + 1));
|
2012-08-06 09:20:23 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-07-10 20:24:41 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_arm(&mut self, arm: &Arm) {
|
2013-12-22 18:48:05 -06:00
|
|
|
{
|
|
|
|
let mut value_ribs = self.value_ribs.borrow_mut();
|
|
|
|
value_ribs.get().push(@Rib::new(NormalRibKind));
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-12-21 17:27:26 -06:00
|
|
|
let mut bindings_list = HashMap::new();
|
2013-08-03 11:45:23 -05:00
|
|
|
for pattern in arm.pats.iter() {
|
2013-12-21 17:27:26 -06:00
|
|
|
self.resolve_pattern(*pattern,
|
|
|
|
RefutableMode,
|
|
|
|
Some(&mut bindings_list));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-07-10 20:24:41 -05:00
|
|
|
// This has to happen *after* we determine which
|
|
|
|
// pat_idents are variants
|
|
|
|
self.check_consistent_bindings(arm);
|
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
visit::walk_expr_opt(self, arm.guard, ());
|
2013-11-30 16:00:39 -06:00
|
|
|
self.resolve_block(arm.body);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-12-22 18:48:05 -06:00
|
|
|
let mut value_ribs = self.value_ribs.borrow_mut();
|
|
|
|
value_ribs.get().pop();
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-06 06:00:46 -06:00
|
|
|
fn resolve_block(&mut self, block: &Block) {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving block) entering block");
|
2013-12-22 18:48:05 -06:00
|
|
|
{
|
|
|
|
let mut value_ribs = self.value_ribs.borrow_mut();
|
|
|
|
value_ribs.get().push(@Rib::new(NormalRibKind));
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Move down in the graph, if there's an anonymous module rooted here.
|
|
|
|
let orig_module = self.current_module;
|
2013-12-21 16:23:40 -06:00
|
|
|
let anonymous_children = self.current_module
|
|
|
|
.anonymous_children
|
|
|
|
.borrow();
|
|
|
|
match anonymous_children.get().find(&block.id) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => { /* Nothing to do. */ }
|
2013-03-22 21:26:41 -05:00
|
|
|
Some(&anonymous_module) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving block) found anonymous module, moving \
|
2012-08-22 19:24:52 -05:00
|
|
|
down");
|
2012-05-22 12:54:12 -05:00
|
|
|
self.current_module = anonymous_module;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Descend into the block.
|
2013-09-26 21:10:16 -05:00
|
|
|
visit::walk_block(self, block, ());
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Move back up.
|
|
|
|
self.current_module = orig_module;
|
|
|
|
|
2013-12-22 18:48:05 -06:00
|
|
|
let mut value_ribs = self.value_ribs.borrow_mut();
|
|
|
|
value_ribs.get().pop();
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving block) leaving block");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_type(&mut self, ty: &Ty) {
|
2012-08-06 14:34:08 -05:00
|
|
|
match ty.node {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Like path expressions, the interpretation of path types depends
|
|
|
|
// on whether the path has multiple elements in it or not.
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
TyPath(ref path, ref bounds, path_id) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// This is a path in the type namespace. Walk through scopes
|
|
|
|
// scopes looking for it.
|
2012-10-15 16:56:42 -05:00
|
|
|
let mut result_def = None;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
// First, check to see whether the name is a primitive type.
|
2013-08-07 11:47:28 -05:00
|
|
|
if path.segments.len() == 1 {
|
2013-12-23 08:08:23 -06:00
|
|
|
let id = path.segments.last().unwrap().identifier;
|
2012-10-15 16:56:42 -05:00
|
|
|
|
|
|
|
match self.primitive_type_table
|
|
|
|
.primitive_types
|
2013-06-26 17:56:13 -05:00
|
|
|
.find(&id.name) {
|
2012-10-15 16:56:42 -05:00
|
|
|
|
2013-03-22 21:26:41 -05:00
|
|
|
Some(&primitive_type) => {
|
2012-10-15 16:56:42 -05:00
|
|
|
result_def =
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Some((DefPrimTy(primitive_type), AllPublic));
|
2013-08-08 13:38:10 -05:00
|
|
|
|
|
|
|
if path.segments
|
|
|
|
.iter()
|
2013-10-29 05:03:32 -05:00
|
|
|
.any(|s| !s.lifetimes.is_empty()) {
|
2013-08-08 13:38:10 -05:00
|
|
|
self.session.span_err(path.span,
|
|
|
|
"lifetime parameters \
|
|
|
|
are not allowed on \
|
|
|
|
this type")
|
|
|
|
} else if path.segments
|
|
|
|
.iter()
|
|
|
|
.any(|s| s.types.len() > 0) {
|
|
|
|
self.session.span_err(path.span,
|
|
|
|
"type parameters are \
|
|
|
|
not allowed on this \
|
|
|
|
type")
|
|
|
|
}
|
2012-10-15 16:56:42 -05:00
|
|
|
}
|
|
|
|
None => {
|
|
|
|
// Continue.
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match result_def {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
match self.resolve_path(ty.id, path, TypeNS, true) {
|
2012-10-15 16:56:42 -05:00
|
|
|
Some(def) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving type) resolved `{}` to \
|
2013-09-28 00:38:08 -05:00
|
|
|
type {:?}",
|
2013-08-08 13:38:10 -05:00
|
|
|
self.session.str_of(path.segments
|
2013-12-23 08:08:23 -06:00
|
|
|
.last().unwrap()
|
2013-08-08 13:38:10 -05:00
|
|
|
.identifier),
|
2012-10-18 15:29:34 -05:00
|
|
|
def);
|
2012-10-15 16:56:42 -05:00
|
|
|
result_def = Some(def);
|
|
|
|
}
|
|
|
|
None => {
|
|
|
|
result_def = None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-08-08 13:38:10 -05:00
|
|
|
Some(_) => {} // Continue.
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-20 00:17:42 -05:00
|
|
|
match result_def {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Write the result into the def map.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving type) writing resolution for `{}` \
|
2013-09-28 00:38:08 -05:00
|
|
|
(id {})",
|
2013-08-07 11:47:28 -05:00
|
|
|
self.path_idents_to_str(path),
|
2012-08-22 19:24:52 -05:00
|
|
|
path_id);
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_def(path_id, def);
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-09-28 00:38:08 -05:00
|
|
|
let msg = format!("use of undeclared type name `{}`",
|
|
|
|
self.path_idents_to_str(path));
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_error(ty.span, msg);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-06-17 14:16:30 -05:00
|
|
|
|
2013-11-21 17:42:55 -06:00
|
|
|
bounds.as_ref().map(|bound_vec| {
|
2013-08-03 11:45:23 -05:00
|
|
|
for bound in bound_vec.iter() {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_type_parameter_bound(ty.id, bound);
|
2013-06-20 17:23:25 -05:00
|
|
|
}
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
TyClosure(c) => {
|
2013-11-21 17:42:55 -06:00
|
|
|
c.bounds.as_ref().map(|bounds| {
|
2013-08-03 11:45:23 -05:00
|
|
|
for bound in bounds.iter() {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_type_parameter_bound(ty.id, bound);
|
2013-06-20 17:23:25 -05:00
|
|
|
}
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2013-09-26 21:10:16 -05:00
|
|
|
visit::walk_ty(self, ty, ());
|
2013-05-10 14:57:27 -05:00
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Just resolve embedded types.
|
2013-09-26 21:10:16 -05:00
|
|
|
visit::walk_ty(self, ty, ());
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_pattern(&mut self,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
pattern: @Pat,
|
|
|
|
mode: PatternBindingMode,
|
|
|
|
// Maps idents to the node ID for the (outermost)
|
|
|
|
// pattern that binds them
|
2013-12-21 17:27:26 -06:00
|
|
|
mut bindings_list: Option<&mut HashMap<Name,NodeId>>) {
|
2012-07-27 15:03:04 -05:00
|
|
|
let pat_id = pattern.id;
|
2013-11-21 17:42:55 -06:00
|
|
|
walk_pat(pattern, |pattern| {
|
2012-08-06 14:34:08 -05:00
|
|
|
match pattern.node {
|
2013-09-01 20:45:37 -05:00
|
|
|
PatIdent(binding_mode, ref path, _)
|
2013-08-07 11:47:28 -05:00
|
|
|
if !path.global && path.segments.len() == 1 => {
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The meaning of pat_ident with no type parameters
|
2012-10-30 17:53:06 -05:00
|
|
|
// depends on whether an enum variant or unit-like struct
|
|
|
|
// with that name is in scope. The probing lookup has to
|
|
|
|
// be careful not to emit spurious errors. Only matching
|
|
|
|
// patterns (match) can match nullary variants or
|
|
|
|
// unit-like structs. For binding patterns (let), matching
|
|
|
|
// such a value is simply disallowed (since it's rarely
|
|
|
|
// what you want).
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-08-07 11:47:28 -05:00
|
|
|
let ident = path.segments[0].identifier;
|
2013-09-05 16:15:00 -05:00
|
|
|
let renamed = mtwt_resolve(ident);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-10-30 17:53:06 -05:00
|
|
|
match self.resolve_bare_identifier_pattern(ident) {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
FoundStructOrEnumVariant(def, lp)
|
2012-10-30 17:53:06 -05:00
|
|
|
if mode == RefutableMode => {
|
2014-01-31 14:25:11 -06:00
|
|
|
let string = token::get_ident(renamed);
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving pattern) resolving `{}` to \
|
2012-10-30 17:53:06 -05:00
|
|
|
struct or enum variant",
|
2014-01-31 14:25:11 -06:00
|
|
|
string.get());
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-01-24 18:24:45 -06:00
|
|
|
self.enforce_default_binding_mode(
|
|
|
|
pattern,
|
|
|
|
binding_mode,
|
|
|
|
"an enum variant");
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.record_def(pattern.id, (def, lp));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-11-28 14:22:53 -06:00
|
|
|
FoundStructOrEnumVariant(..) => {
|
2014-01-31 14:25:11 -06:00
|
|
|
let string = token::get_ident(renamed);
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(pattern.span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("declaration of `{}` \
|
2012-07-06 21:06:58 -05:00
|
|
|
shadows an enum \
|
2012-10-30 17:53:06 -05:00
|
|
|
variant or unit-like \
|
|
|
|
struct in scope",
|
2014-01-31 14:25:11 -06:00
|
|
|
string.get()));
|
2012-07-06 21:06:58 -05:00
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
FoundConst(def, lp) if mode == RefutableMode => {
|
2014-01-31 14:25:11 -06:00
|
|
|
let string = token::get_ident(renamed);
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving pattern) resolving `{}` to \
|
2012-11-13 00:10:15 -06:00
|
|
|
constant",
|
2014-01-31 14:25:11 -06:00
|
|
|
string.get());
|
2012-11-13 00:10:15 -06:00
|
|
|
|
2013-01-24 18:24:45 -06:00
|
|
|
self.enforce_default_binding_mode(
|
|
|
|
pattern,
|
|
|
|
binding_mode,
|
|
|
|
"a constant");
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.record_def(pattern.id, (def, lp));
|
2012-11-13 00:10:15 -06:00
|
|
|
}
|
2013-11-28 14:22:53 -06:00
|
|
|
FoundConst(..) => {
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(pattern.span,
|
2013-10-02 07:33:01 -05:00
|
|
|
"only irrefutable patterns \
|
2013-05-19 00:07:44 -05:00
|
|
|
allowed here");
|
2012-07-06 21:06:58 -05:00
|
|
|
}
|
2012-10-30 17:53:06 -05:00
|
|
|
BareIdentifierPatternUnresolved => {
|
2014-01-31 14:25:11 -06:00
|
|
|
let string = token::get_ident(renamed);
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving pattern) binding `{}`",
|
2014-01-31 14:25:11 -06:00
|
|
|
string.get());
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
let def = match mode {
|
2012-08-03 21:59:04 -05:00
|
|
|
RefutableMode => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// For pattern arms, we must use
|
|
|
|
// `def_binding` definitions.
|
|
|
|
|
2013-09-01 20:45:37 -05:00
|
|
|
DefBinding(pattern.id, binding_mode)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-11-06 20:41:06 -06:00
|
|
|
LocalIrrefutableMode => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// But for locals, we use `def_local`.
|
2013-10-20 07:31:23 -05:00
|
|
|
DefLocal(pattern.id, binding_mode)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-04-24 03:29:46 -05:00
|
|
|
ArgumentIrrefutableMode => {
|
2012-11-06 20:41:06 -06:00
|
|
|
// And for function arguments, `def_arg`.
|
2013-10-20 07:31:23 -05:00
|
|
|
DefArg(pattern.id, binding_mode)
|
2012-11-06 20:41:06 -06:00
|
|
|
}
|
2012-07-27 15:03:04 -05:00
|
|
|
};
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Record the definition so that later passes
|
|
|
|
// will be able to distinguish variants from
|
|
|
|
// locals in patterns.
|
|
|
|
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.record_def(pattern.id, (def, AllPublic));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Add the binding to the local ribs, if it
|
|
|
|
// doesn't already exist in the bindings list. (We
|
|
|
|
// must not add it if it's in the bindings list
|
|
|
|
// because that breaks the assumptions later
|
|
|
|
// passes make about or-patterns.)
|
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match bindings_list {
|
2013-12-21 17:27:26 -06:00
|
|
|
Some(ref mut bindings_list)
|
2013-06-26 17:56:13 -05:00
|
|
|
if !bindings_list.contains_key(&renamed) => {
|
2013-03-16 13:11:31 -05:00
|
|
|
let this = &mut *self;
|
2013-12-21 15:58:11 -06:00
|
|
|
{
|
2013-12-22 18:48:05 -06:00
|
|
|
let mut value_ribs =
|
|
|
|
this.value_ribs.borrow_mut();
|
|
|
|
let last_rib = value_ribs.get()[
|
|
|
|
value_ribs.get().len() - 1];
|
2013-12-21 15:58:11 -06:00
|
|
|
let mut bindings =
|
|
|
|
last_rib.bindings.borrow_mut();
|
|
|
|
bindings.get().insert(renamed,
|
|
|
|
DlDef(def));
|
|
|
|
}
|
2013-06-26 17:56:13 -05:00
|
|
|
bindings_list.insert(renamed, pat_id);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-12-21 17:27:26 -06:00
|
|
|
Some(ref mut b) => {
|
2013-06-26 17:56:13 -05:00
|
|
|
if b.find(&renamed) == Some(&pat_id) {
|
2012-07-27 15:03:04 -05:00
|
|
|
// Then this is a duplicate variable
|
|
|
|
// in the same disjunct, which is an
|
|
|
|
// error
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(pattern.span,
|
2014-02-06 03:38:08 -06:00
|
|
|
format!("identifier `{}` is bound more \
|
2012-07-27 15:03:04 -05:00
|
|
|
than once in the same pattern",
|
2012-07-18 18:18:02 -05:00
|
|
|
path_to_str(path, self.session
|
2012-08-22 19:24:52 -05:00
|
|
|
.intr())));
|
2012-07-27 15:03:04 -05:00
|
|
|
}
|
|
|
|
// Not bound in the same pattern: do nothing
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-03-16 13:11:31 -05:00
|
|
|
let this = &mut *self;
|
2013-12-21 15:58:11 -06:00
|
|
|
{
|
2013-12-22 18:48:05 -06:00
|
|
|
let mut value_ribs =
|
|
|
|
this.value_ribs.borrow_mut();
|
|
|
|
let last_rib = value_ribs.get()[
|
|
|
|
value_ribs.get().len() - 1];
|
2013-12-21 15:58:11 -06:00
|
|
|
let mut bindings =
|
|
|
|
last_rib.bindings.borrow_mut();
|
|
|
|
bindings.get().insert(renamed,
|
|
|
|
DlDef(def));
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the types in the path pattern.
|
2013-11-30 16:00:39 -06:00
|
|
|
for &ty in path.segments
|
2013-08-07 11:47:28 -05:00
|
|
|
.iter()
|
2013-08-08 13:38:10 -05:00
|
|
|
.flat_map(|seg| seg.types.iter()) {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_type(ty);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-01 20:45:37 -05:00
|
|
|
PatIdent(binding_mode, ref path, _) => {
|
2013-03-13 00:39:32 -05:00
|
|
|
// This must be an enum variant, struct, or constant.
|
2013-09-26 21:10:16 -05:00
|
|
|
match self.resolve_path(pat_id, path, ValueNS, false) {
|
2013-11-28 14:22:53 -06:00
|
|
|
Some(def @ (DefVariant(..), _)) |
|
|
|
|
Some(def @ (DefStruct(..), _)) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_def(pattern.id, def);
|
|
|
|
}
|
2013-11-28 14:22:53 -06:00
|
|
|
Some(def @ (DefStatic(..), _)) => {
|
2013-03-13 00:39:32 -05:00
|
|
|
self.enforce_default_binding_mode(
|
|
|
|
pattern,
|
|
|
|
binding_mode,
|
|
|
|
"a constant");
|
|
|
|
self.record_def(pattern.id, def);
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(_) => {
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(
|
2012-07-18 18:18:02 -05:00
|
|
|
path.span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("`{}` is not an enum variant or constant",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(
|
2013-12-23 08:08:23 -06:00
|
|
|
path.segments.last().unwrap().identifier)))
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(path.span,
|
2013-05-19 00:07:44 -05:00
|
|
|
"unresolved enum variant");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the types in the path pattern.
|
2013-11-30 16:00:39 -06:00
|
|
|
for &ty in path.segments
|
2013-08-07 11:47:28 -05:00
|
|
|
.iter()
|
2013-08-08 13:38:10 -05:00
|
|
|
.flat_map(|s| s.types.iter()) {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_type(ty);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-01 20:45:37 -05:00
|
|
|
PatEnum(ref path, _) => {
|
2013-03-21 02:27:26 -05:00
|
|
|
// This must be an enum variant, struct or const.
|
2013-09-26 21:10:16 -05:00
|
|
|
match self.resolve_path(pat_id, path, ValueNS, false) {
|
2013-11-28 14:22:53 -06:00
|
|
|
Some(def @ (DefFn(..), _)) |
|
|
|
|
Some(def @ (DefVariant(..), _)) |
|
|
|
|
Some(def @ (DefStruct(..), _)) |
|
|
|
|
Some(def @ (DefStatic(..), _)) => {
|
2013-03-13 00:39:32 -05:00
|
|
|
self.record_def(pattern.id, def);
|
|
|
|
}
|
|
|
|
Some(_) => {
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(
|
2013-03-13 00:39:32 -05:00
|
|
|
path.span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("`{}` is not an enum variant, struct or const",
|
2013-08-07 11:47:28 -05:00
|
|
|
self.session
|
|
|
|
.str_of(path.segments
|
2013-12-23 08:08:23 -06:00
|
|
|
.last().unwrap()
|
2013-08-07 11:47:28 -05:00
|
|
|
.identifier)));
|
2013-03-13 00:39:32 -05:00
|
|
|
}
|
|
|
|
None => {
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(path.span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("unresolved enum variant, \
|
|
|
|
struct or const `{}`",
|
2013-09-01 20:45:37 -05:00
|
|
|
self.session
|
|
|
|
.str_of(path.segments
|
2013-12-23 08:08:23 -06:00
|
|
|
.last().unwrap()
|
2013-09-01 20:45:37 -05:00
|
|
|
.identifier)));
|
2013-03-13 00:39:32 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the types in the path pattern.
|
2013-11-30 16:00:39 -06:00
|
|
|
for &ty in path.segments
|
2013-08-07 11:47:28 -05:00
|
|
|
.iter()
|
2013-08-08 13:38:10 -05:00
|
|
|
.flat_map(|s| s.types.iter()) {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_type(ty);
|
2013-03-13 00:39:32 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-01 20:45:37 -05:00
|
|
|
PatLit(expr) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_expr(expr);
|
2012-07-10 14:29:30 -05:00
|
|
|
}
|
|
|
|
|
2013-09-01 20:45:37 -05:00
|
|
|
PatRange(first_expr, last_expr) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_expr(first_expr);
|
|
|
|
self.resolve_expr(last_expr);
|
2012-07-10 14:29:30 -05:00
|
|
|
}
|
|
|
|
|
2013-09-01 20:45:37 -05:00
|
|
|
PatStruct(ref path, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
match self.resolve_path(pat_id, path, TypeNS, false) {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Some((DefTy(class_id), lp))
|
2013-05-02 13:32:37 -05:00
|
|
|
if self.structs.contains(&class_id) => {
|
2013-09-01 20:45:37 -05:00
|
|
|
let class_def = DefStruct(class_id);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.record_def(pattern.id, (class_def, lp));
|
2012-08-06 19:01:14 -05:00
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Some(definition @ (DefStruct(class_id), _)) => {
|
2013-05-02 13:32:37 -05:00
|
|
|
assert!(self.structs.contains(&class_id));
|
2012-12-10 14:37:50 -06:00
|
|
|
self.record_def(pattern.id, definition);
|
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Some(definition @ (DefVariant(_, variant_id, _), _))
|
2013-05-02 13:32:37 -05:00
|
|
|
if self.structs.contains(&variant_id) => {
|
2012-08-07 21:12:58 -05:00
|
|
|
self.record_def(pattern.id, definition);
|
|
|
|
}
|
2012-12-10 14:37:50 -06:00
|
|
|
result => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving pattern) didn't find struct \
|
2013-09-28 00:38:08 -05:00
|
|
|
def: {:?}", result);
|
|
|
|
let msg = format!("`{}` does not name a structure",
|
|
|
|
self.path_idents_to_str(path));
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_error(path.span, msg);
|
2012-08-06 19:01:14 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-31 21:25:24 -05:00
|
|
|
_ => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
|
|
|
}
|
2013-08-02 01:17:20 -05:00
|
|
|
true
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_bare_identifier_pattern(&mut self, name: Ident)
|
2013-05-31 17:17:22 -05:00
|
|
|
->
|
|
|
|
BareIdentifierPatternResolution {
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_item_in_lexical_scope(self.current_module,
|
2012-10-30 17:53:06 -05:00
|
|
|
name,
|
2012-12-23 16:41:37 -06:00
|
|
|
ValueNS,
|
|
|
|
SearchThroughModules) {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Success((target, _)) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolve bare identifier pattern) succeeded in \
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
finding {} at {:?}",
|
2013-12-21 16:15:07 -06:00
|
|
|
self.session.str_of(name),
|
|
|
|
target.bindings.value_def.get());
|
|
|
|
match target.bindings.value_def.get() {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!("resolved name in the value namespace to a \
|
2013-02-11 21:26:38 -06:00
|
|
|
set of name bindings with no def?!");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def) => {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
// For the two success cases, this lookup can be
|
|
|
|
// considered as not having a private component because
|
|
|
|
// the lookup happened only within the current module.
|
2012-08-17 19:55:34 -05:00
|
|
|
match def.def {
|
2013-11-28 14:22:53 -06:00
|
|
|
def @ DefVariant(..) | def @ DefStruct(..) => {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
return FoundStructOrEnumVariant(def, AllPublic);
|
2012-08-17 19:55:34 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
def @ DefStatic(_, false) => {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
return FoundConst(def, AllPublic);
|
2012-08-17 19:55:34 -05:00
|
|
|
}
|
|
|
|
_ => {
|
2012-10-30 17:53:06 -05:00
|
|
|
return BareIdentifierPatternUnresolved;
|
2012-08-17 19:55:34 -05:00
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!("unexpected indeterminate result");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolve bare identifier pattern) failed to find {}",
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.session.str_of(name));
|
2012-10-30 17:53:06 -05:00
|
|
|
return BareIdentifierPatternUnresolved;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// If `check_ribs` is true, checks the local definitions first; i.e.
|
|
|
|
/// doesn't skip straight to the containing module.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_path(&mut self,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
id: NodeId,
|
|
|
|
path: &Path,
|
|
|
|
namespace: Namespace,
|
|
|
|
check_ribs: bool) -> Option<(Def, LastPrivate)> {
|
2012-05-22 12:54:12 -05:00
|
|
|
// First, resolve the types.
|
2013-11-30 16:00:39 -06:00
|
|
|
for &ty in path.segments.iter().flat_map(|s| s.types.iter()) {
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_type(ty);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if path.global {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
return self.resolve_crate_relative_path(path, namespace);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let unqualified_def =
|
|
|
|
self.resolve_identifier(path.segments
|
2013-12-23 08:08:23 -06:00
|
|
|
.last().unwrap()
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
.identifier,
|
|
|
|
namespace,
|
|
|
|
check_ribs,
|
|
|
|
path.span);
|
2013-07-08 10:34:28 -05:00
|
|
|
|
2013-08-07 11:47:28 -05:00
|
|
|
if path.segments.len() > 1 {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let def = self.resolve_module_relative_path(path, namespace);
|
2013-07-08 10:34:28 -05:00
|
|
|
match (def, unqualified_def) {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
(Some((d, _)), Some((ud, _))) if d == ud => {
|
2014-01-09 20:29:45 -06:00
|
|
|
self.session.add_lint(UnnecessaryQualification,
|
2013-08-08 13:38:10 -05:00
|
|
|
id,
|
|
|
|
path.span,
|
2013-07-08 10:34:28 -05:00
|
|
|
~"unnecessary qualification");
|
|
|
|
}
|
|
|
|
_ => ()
|
|
|
|
}
|
2013-08-08 13:38:10 -05:00
|
|
|
|
2013-07-08 10:34:28 -05:00
|
|
|
return def;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-07-08 10:34:28 -05:00
|
|
|
return unqualified_def;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-05-30 19:46:25 -05:00
|
|
|
// resolve a single identifier (used as a varref)
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_identifier(&mut self,
|
2013-09-01 19:50:59 -05:00
|
|
|
identifier: Ident,
|
2013-05-31 17:17:22 -05:00
|
|
|
namespace: Namespace,
|
|
|
|
check_ribs: bool,
|
2013-08-31 11:13:04 -05:00
|
|
|
span: Span)
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
-> Option<(Def, LastPrivate)> {
|
2012-05-22 12:54:12 -05:00
|
|
|
if check_ribs {
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_identifier_in_local_ribs(identifier,
|
2012-07-06 21:06:58 -05:00
|
|
|
namespace,
|
|
|
|
span) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def) => {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
return Some((def, AllPublic));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-01 19:30:05 -05:00
|
|
|
return self.resolve_item_by_identifier_in_lexical_scope(identifier,
|
2013-01-08 21:37:25 -06:00
|
|
|
namespace);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4952: Merge me with resolve_name_in_module?
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_definition_of_name_in_module(&mut self,
|
2013-12-19 21:02:22 -06:00
|
|
|
containing_module: @Module,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
name: Ident,
|
|
|
|
namespace: Namespace)
|
2013-05-31 17:17:22 -05:00
|
|
|
-> NameDefinition {
|
2012-05-22 12:54:12 -05:00
|
|
|
// First, search children.
|
2013-08-21 20:39:30 -05:00
|
|
|
self.populate_module_if_necessary(containing_module);
|
2013-12-21 17:32:44 -06:00
|
|
|
|
|
|
|
{
|
|
|
|
let children = containing_module.children.borrow();
|
|
|
|
match children.get().find(&name.name) {
|
|
|
|
Some(child_name_bindings) => {
|
|
|
|
match child_name_bindings.def_for_namespace(namespace) {
|
|
|
|
Some(def) => {
|
|
|
|
// Found it. Stop the search here.
|
|
|
|
let p = child_name_bindings.defined_in_public_namespace(
|
|
|
|
namespace);
|
|
|
|
let lp = if p {AllPublic} else {
|
|
|
|
DependsOn(def_id_of_def(def))
|
|
|
|
};
|
|
|
|
return ChildNameDefinition(def, lp);
|
|
|
|
}
|
|
|
|
None => {}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-12-21 17:32:44 -06:00
|
|
|
None => {}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Next, search import resolutions.
|
2013-12-21 17:15:54 -06:00
|
|
|
let import_resolutions = containing_module.import_resolutions
|
|
|
|
.borrow();
|
|
|
|
match import_resolutions.get().find(&name.name) {
|
2013-12-21 19:32:22 -06:00
|
|
|
Some(import_resolution) if import_resolution.is_public.get() => {
|
2012-08-06 14:34:08 -05:00
|
|
|
match (*import_resolution).target_for_namespace(namespace) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(target) => {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
match target.bindings.def_for_namespace(namespace) {
|
|
|
|
Some(def) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Found it.
|
2013-06-09 23:39:15 -05:00
|
|
|
let id = import_resolution.id(namespace);
|
|
|
|
self.used_imports.insert(id);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
return ImportNameDefinition(def, AllPublic);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
None => {
|
2012-07-11 17:00:40 -05:00
|
|
|
// This can happen with external impls, due to
|
|
|
|
// the imperfect way we read the metadata.
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-03-26 21:53:33 -05:00
|
|
|
None => {}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-11-28 14:22:53 -06:00
|
|
|
Some(..) | None => {} // Continue.
|
2013-03-26 21:53:33 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Finally, search through external children.
|
|
|
|
if namespace == TypeNS {
|
2013-12-21 16:05:26 -06:00
|
|
|
let module_opt = {
|
|
|
|
let external_module_children =
|
|
|
|
containing_module.external_module_children.borrow();
|
|
|
|
external_module_children.get().find_copy(&name.name)
|
|
|
|
};
|
|
|
|
match module_opt {
|
2013-03-26 21:53:33 -05:00
|
|
|
None => {}
|
|
|
|
Some(module) => {
|
2013-12-19 20:56:20 -06:00
|
|
|
match module.def_id.get() {
|
2013-03-26 21:53:33 -05:00
|
|
|
None => {} // Continue.
|
|
|
|
Some(def_id) => {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let lp = if module.is_public {AllPublic} else {
|
|
|
|
DependsOn(def_id)
|
|
|
|
};
|
|
|
|
return ChildNameDefinition(DefMod(def_id), lp);
|
2013-03-26 21:53:33 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-03-26 21:53:33 -05:00
|
|
|
|
|
|
|
return NoNameDefinition;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-06-26 13:16:09 -05:00
|
|
|
// resolve a "module-relative" path, e.g. a::b::c
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_module_relative_path(&mut self,
|
2013-07-05 05:15:21 -05:00
|
|
|
path: &Path,
|
2013-05-31 17:17:22 -05:00
|
|
|
namespace: Namespace)
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
-> Option<(Def, LastPrivate)> {
|
2013-06-26 13:16:09 -05:00
|
|
|
let module_path_idents = path.segments.init().map(|ps| ps.identifier);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-04-12 00:15:30 -05:00
|
|
|
let containing_module;
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let last_private;
|
2013-05-13 18:13:20 -05:00
|
|
|
match self.resolve_module_path(self.current_module,
|
|
|
|
module_path_idents,
|
|
|
|
UseLexicalScope,
|
|
|
|
path.span,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
PathSearch) {
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2013-09-28 00:38:08 -05:00
|
|
|
let msg = format!("use of undeclared module `{}`",
|
|
|
|
self.idents_to_str(module_path_idents));
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_error(path.span, msg);
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!("indeterminate unexpected");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Success((resulting_module, resulting_last_private)) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
containing_module = resulting_module;
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
last_private = resulting_last_private;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-23 08:08:23 -06:00
|
|
|
let ident = path.segments.last().unwrap().identifier;
|
2013-06-03 06:31:43 -05:00
|
|
|
let def = match self.resolve_definition_of_name_in_module(containing_module,
|
2013-06-26 17:56:13 -05:00
|
|
|
ident,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
namespace) {
|
2012-08-03 21:59:04 -05:00
|
|
|
NoNameDefinition => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// We failed to resolve the name. Report an error.
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
ChildNameDefinition(def, lp) | ImportNameDefinition(def, lp) => {
|
|
|
|
(def, last_private.or(lp))
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-06-03 06:31:43 -05:00
|
|
|
};
|
2013-12-19 20:52:35 -06:00
|
|
|
match containing_module.kind.get() {
|
2013-06-03 06:31:43 -05:00
|
|
|
TraitModuleKind | ImplModuleKind => {
|
2013-12-21 19:04:42 -06:00
|
|
|
let method_map = self.method_map.borrow();
|
|
|
|
match method_map.get().find(&ident.name) {
|
2013-06-03 06:31:43 -05:00
|
|
|
Some(s) => {
|
2013-12-19 20:56:20 -06:00
|
|
|
match containing_module.def_id.get() {
|
2013-06-03 06:31:43 -05:00
|
|
|
Some(def_id) if s.contains(&def_id) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("containing module was a trait or impl \
|
2013-06-03 06:31:43 -05:00
|
|
|
and name was a method -> not resolved");
|
|
|
|
return None;
|
|
|
|
},
|
|
|
|
_ => (),
|
|
|
|
}
|
|
|
|
},
|
|
|
|
None => (),
|
|
|
|
}
|
|
|
|
},
|
|
|
|
_ => (),
|
|
|
|
};
|
|
|
|
return Some(def);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Invariant: This must be called only during main resolution, not during
|
|
|
|
/// import resolution.
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_crate_relative_path(&mut self,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
path: &Path,
|
|
|
|
namespace: Namespace)
|
|
|
|
-> Option<(Def, LastPrivate)> {
|
2013-06-26 13:16:09 -05:00
|
|
|
let module_path_idents = path.segments.init().map(|ps| ps.identifier);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
let root_module = self.graph_root.get_module();
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-04-12 00:15:30 -05:00
|
|
|
let containing_module;
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let last_private;
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_module_path_from_root(root_module,
|
2012-12-23 16:41:37 -06:00
|
|
|
module_path_idents,
|
|
|
|
0,
|
2013-03-01 12:44:43 -06:00
|
|
|
path.span,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
PathSearch,
|
|
|
|
AllPublic) {
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2013-09-28 00:38:08 -05:00
|
|
|
let msg = format!("use of undeclared module `::{}`",
|
|
|
|
self.idents_to_str(module_path_idents));
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_error(path.span, msg);
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!("indeterminate unexpected");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Success((resulting_module, resulting_last_private)) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
containing_module = resulting_module;
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
last_private = resulting_last_private;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-23 08:08:23 -06:00
|
|
|
let name = path.segments.last().unwrap().identifier;
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_definition_of_name_in_module(containing_module,
|
2012-12-23 16:41:37 -06:00
|
|
|
name,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
namespace) {
|
2012-08-03 21:59:04 -05:00
|
|
|
NoNameDefinition => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// We failed to resolve the name. Report an error.
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
ChildNameDefinition(def, lp) | ImportNameDefinition(def, lp) => {
|
|
|
|
return Some((def, last_private.or(lp)));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_identifier_in_local_ribs(&mut self,
|
2013-09-01 19:50:59 -05:00
|
|
|
ident: Ident,
|
2013-05-31 17:17:22 -05:00
|
|
|
namespace: Namespace,
|
2013-08-31 11:13:04 -05:00
|
|
|
span: Span)
|
2013-09-01 20:45:37 -05:00
|
|
|
-> Option<Def> {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Check the local set of ribs.
|
2013-04-12 00:15:30 -05:00
|
|
|
let search_result;
|
2012-08-06 14:34:08 -05:00
|
|
|
match namespace {
|
2012-08-03 21:59:04 -05:00
|
|
|
ValueNS => {
|
2013-09-05 16:15:00 -05:00
|
|
|
let renamed = mtwt_resolve(ident);
|
2013-12-22 18:48:05 -06:00
|
|
|
let mut value_ribs = self.value_ribs.borrow_mut();
|
|
|
|
search_result = self.search_ribs(value_ribs.get(),
|
|
|
|
renamed,
|
2014-01-27 06:18:36 -06:00
|
|
|
span);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
TypeNS => {
|
2013-06-26 17:56:13 -05:00
|
|
|
let name = ident.name;
|
2013-12-22 18:48:05 -06:00
|
|
|
let mut type_ribs = self.type_ribs.borrow_mut();
|
|
|
|
search_result = self.search_ribs(type_ribs.get(),
|
|
|
|
name,
|
2014-01-27 06:18:36 -06:00
|
|
|
span);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-20 00:17:42 -05:00
|
|
|
match search_result {
|
2013-08-31 11:13:04 -05:00
|
|
|
Some(DlDef(def)) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving path in local ribs) resolved `{}` to \
|
2013-09-28 00:38:08 -05:00
|
|
|
local: {:?}",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(ident),
|
2012-08-22 19:24:52 -05:00
|
|
|
def);
|
2012-08-20 14:23:37 -05:00
|
|
|
return Some(def);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-08-31 11:13:04 -05:00
|
|
|
Some(DlField) | Some(DlImpl(_)) | None => {
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn resolve_item_by_identifier_in_lexical_scope(&mut self,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
ident: Ident,
|
|
|
|
namespace: Namespace)
|
|
|
|
-> Option<(Def, LastPrivate)> {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Check the items.
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_item_in_lexical_scope(self.current_module,
|
2012-12-23 16:41:37 -06:00
|
|
|
ident,
|
|
|
|
namespace,
|
2013-01-08 21:37:25 -06:00
|
|
|
DontSearchThroughModules) {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Success((target, _)) => {
|
2012-08-06 14:34:08 -05:00
|
|
|
match (*target.bindings).def_for_namespace(namespace) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-10-15 16:56:42 -05:00
|
|
|
// This can happen if we were looking for a type and
|
|
|
|
// found a module instead. Modules don't have defs.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving item path by identifier in lexical \
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
scope) failed to resolve {} after success...",
|
|
|
|
self.session.str_of(ident));
|
2012-10-15 16:56:42 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving item path in lexical scope) \
|
2013-09-28 00:38:08 -05:00
|
|
|
resolved `{}` to item",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(ident));
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
// This lookup is "all public" because it only searched
|
|
|
|
// for one identifier in the current module (couldn't
|
|
|
|
// have passed through reexports or anything like that.
|
|
|
|
return Some((def, AllPublic));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2013-10-21 15:08:31 -05:00
|
|
|
fail!("unexpected indeterminate result");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving item path by identifier in lexical scope) \
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
failed to resolve {}", self.session.str_of(ident));
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-19 15:22:03 -06:00
|
|
|
fn with_no_errors<T>(&mut self, f: |&mut Resolver| -> T) -> T {
|
2013-08-13 19:54:14 -05:00
|
|
|
self.emit_errors = false;
|
2013-09-26 21:10:16 -05:00
|
|
|
let rs = f(self);
|
2013-08-13 19:54:14 -05:00
|
|
|
self.emit_errors = true;
|
|
|
|
rs
|
|
|
|
}
|
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
fn resolve_error(&mut self, span: Span, s: &str) {
|
2013-08-13 19:54:14 -05:00
|
|
|
if self.emit_errors {
|
|
|
|
self.session.span_err(span, s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-19 15:22:03 -06:00
|
|
|
fn find_best_match_for_name(&mut self, name: &str, max_distance: uint)
|
2014-01-31 14:25:11 -06:00
|
|
|
-> Option<~str> {
|
2013-03-16 13:11:31 -05:00
|
|
|
let this = &mut *self;
|
|
|
|
|
2014-01-31 14:25:11 -06:00
|
|
|
let mut maybes: ~[~str] = ~[];
|
2013-02-23 02:22:51 -06:00
|
|
|
let mut values: ~[uint] = ~[];
|
|
|
|
|
2013-12-22 18:48:05 -06:00
|
|
|
let mut j = {
|
|
|
|
let value_ribs = this.value_ribs.borrow();
|
|
|
|
value_ribs.get().len()
|
|
|
|
};
|
2013-02-23 02:22:51 -06:00
|
|
|
while j != 0 {
|
|
|
|
j -= 1;
|
2013-12-22 18:48:05 -06:00
|
|
|
let value_ribs = this.value_ribs.borrow();
|
|
|
|
let bindings = value_ribs.get()[j].bindings.borrow();
|
2013-12-21 15:58:11 -06:00
|
|
|
for (&k, _) in bindings.get().iter() {
|
2014-01-31 14:25:11 -06:00
|
|
|
let string = token::get_ident(k);
|
|
|
|
maybes.push(string.get().to_str());
|
2014-01-25 01:37:51 -06:00
|
|
|
values.push(uint::MAX);
|
2013-02-23 02:22:51 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut smallest = 0;
|
2014-01-31 14:25:11 -06:00
|
|
|
for (i, other) in maybes.iter().enumerate() {
|
|
|
|
values[i] = name.lev_distance(*other);
|
2013-02-23 02:22:51 -06:00
|
|
|
|
|
|
|
if values[i] <= values[smallest] {
|
|
|
|
smallest = i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-14 04:52:12 -05:00
|
|
|
if values.len() > 0 &&
|
2014-01-25 01:37:51 -06:00
|
|
|
values[smallest] != uint::MAX &&
|
2013-06-09 09:44:58 -05:00
|
|
|
values[smallest] < name.len() + 2 &&
|
2013-03-27 02:15:59 -05:00
|
|
|
values[smallest] <= max_distance &&
|
2013-06-12 12:02:55 -05:00
|
|
|
name != maybes[smallest] {
|
2013-02-23 02:22:51 -06:00
|
|
|
|
2013-06-27 07:59:52 -05:00
|
|
|
Some(maybes.swap_remove(smallest))
|
2013-02-23 02:22:51 -06:00
|
|
|
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-06 06:00:46 -06:00
|
|
|
fn resolve_expr(&mut self, expr: &Expr) {
|
2012-08-17 18:53:07 -05:00
|
|
|
// First, record candidate traits for this expression if it could
|
|
|
|
// result in the invocation of a method call.
|
2012-07-11 17:00:40 -05:00
|
|
|
|
|
|
|
self.record_candidate_traits_for_expr_if_necessary(expr);
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// Next, resolve the node.
|
2012-08-06 14:34:08 -05:00
|
|
|
match expr.node {
|
2012-05-22 12:54:12 -05:00
|
|
|
// The interpretation of paths depends on whether the path has
|
|
|
|
// multiple elements in it or not.
|
|
|
|
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprPath(ref path) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// This is a local path in the value namespace. Walk through
|
|
|
|
// scopes looking for it.
|
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
match self.resolve_path(expr.id, path, ValueNS, true) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Write the result into the def map.
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving expr) resolved `{}`",
|
2013-08-07 11:47:28 -05:00
|
|
|
self.path_idents_to_str(path));
|
2013-06-14 20:21:47 -05:00
|
|
|
|
|
|
|
// First-class methods are not supported yet; error
|
|
|
|
// out here.
|
|
|
|
match def {
|
2013-11-28 14:22:53 -06:00
|
|
|
(DefMethod(..), _) => {
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(expr.span,
|
2013-06-14 20:21:47 -05:00
|
|
|
"first-class methods \
|
|
|
|
are not supported");
|
|
|
|
self.session.span_note(expr.span,
|
|
|
|
"call the method \
|
|
|
|
using the `.` \
|
|
|
|
syntax");
|
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
}
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_def(expr.id, def);
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-08-07 11:47:28 -05:00
|
|
|
let wrong_name = self.path_idents_to_str(path);
|
2013-09-27 21:46:09 -05:00
|
|
|
// Be helpful if the name refers to a struct
|
|
|
|
// (The pattern matching def_tys where the id is in self.structs
|
|
|
|
// matches on regular structs while excluding tuple- and enum-like
|
|
|
|
// structs, which wouldn't result in this error.)
|
|
|
|
match self.with_no_errors(|this|
|
|
|
|
this.resolve_path(expr.id, path, TypeNS, false)) {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Some((DefTy(struct_id), _))
|
2013-09-27 21:46:09 -05:00
|
|
|
if self.structs.contains(&struct_id) => {
|
|
|
|
self.resolve_error(expr.span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("`{}` is a structure name, but \
|
|
|
|
this expression \
|
|
|
|
uses it like a function name",
|
|
|
|
wrong_name));
|
2013-09-27 21:46:09 -05:00
|
|
|
|
2013-09-28 00:38:08 -05:00
|
|
|
self.session.span_note(expr.span,
|
|
|
|
format!("Did you mean to write: \
|
|
|
|
`{} \\{ /* fields */ \\}`?",
|
|
|
|
wrong_name));
|
2013-08-13 19:54:14 -05:00
|
|
|
|
2013-02-23 02:22:51 -06:00
|
|
|
}
|
2013-09-27 21:46:09 -05:00
|
|
|
_ =>
|
|
|
|
// limit search to 5 to reduce the number
|
|
|
|
// of stupid suggestions
|
|
|
|
match self.find_best_match_for_name(wrong_name, 5) {
|
|
|
|
Some(m) => {
|
|
|
|
self.resolve_error(expr.span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("unresolved name `{}`. \
|
|
|
|
Did you mean `{}`?",
|
|
|
|
wrong_name, m));
|
2013-09-27 21:46:09 -05:00
|
|
|
}
|
|
|
|
None => {
|
|
|
|
self.resolve_error(expr.span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("unresolved name `{}`.",
|
|
|
|
wrong_name));
|
2013-09-27 21:46:09 -05:00
|
|
|
}
|
|
|
|
}
|
2012-08-22 13:40:42 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
visit::walk_expr(self, expr, ());
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-11-30 16:00:39 -06:00
|
|
|
ExprFnBlock(fn_decl, block) |
|
|
|
|
ExprProc(fn_decl, block) => {
|
2013-07-16 13:08:35 -05:00
|
|
|
self.resolve_function(FunctionRibKind(expr.id, block.id),
|
2014-01-27 06:18:36 -06:00
|
|
|
Some(fn_decl), NoTypeParameters,
|
|
|
|
block);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprStruct(ref path, _, _) => {
|
2012-07-23 20:44:59 -05:00
|
|
|
// Resolve the path to the structure it goes to.
|
2013-09-26 21:10:16 -05:00
|
|
|
match self.resolve_path(expr.id, path, TypeNS, false) {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Some((DefTy(class_id), lp)) | Some((DefStruct(class_id), lp))
|
2013-05-02 13:32:37 -05:00
|
|
|
if self.structs.contains(&class_id) => {
|
2013-09-01 20:45:37 -05:00
|
|
|
let class_def = DefStruct(class_id);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.record_def(expr.id, (class_def, lp));
|
2012-07-23 20:44:59 -05:00
|
|
|
}
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
Some(definition @ (DefVariant(_, class_id, _), _))
|
2013-05-02 13:32:37 -05:00
|
|
|
if self.structs.contains(&class_id) => {
|
2012-08-07 21:12:58 -05:00
|
|
|
self.record_def(expr.id, definition);
|
|
|
|
}
|
2013-08-06 23:50:23 -05:00
|
|
|
result => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(resolving expression) didn't find struct \
|
2013-09-28 00:38:08 -05:00
|
|
|
def: {:?}", result);
|
|
|
|
let msg = format!("`{}` does not name a structure",
|
|
|
|
self.path_idents_to_str(path));
|
2013-09-26 21:10:16 -05:00
|
|
|
self.resolve_error(path.span, msg);
|
2012-07-23 20:44:59 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
visit::walk_expr(self, expr, ());
|
2012-07-23 20:44:59 -05:00
|
|
|
}
|
|
|
|
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprLoop(_, Some(label)) => {
|
2013-11-21 17:42:55 -06:00
|
|
|
self.with_label_rib(|this| {
|
2013-09-26 21:10:16 -05:00
|
|
|
let def_like = DlDef(DefLabel(expr.id));
|
|
|
|
// plain insert (no renaming)
|
2013-12-21 15:58:11 -06:00
|
|
|
{
|
2013-12-22 16:31:49 -06:00
|
|
|
let mut label_ribs = this.label_ribs.borrow_mut();
|
|
|
|
let rib = label_ribs.get()[label_ribs.get().len() -
|
|
|
|
1];
|
2013-12-21 15:58:11 -06:00
|
|
|
let mut bindings = rib.bindings.borrow_mut();
|
|
|
|
bindings.get().insert(label.name, def_like);
|
|
|
|
}
|
2012-08-14 21:20:56 -05:00
|
|
|
|
2013-09-26 21:10:16 -05:00
|
|
|
visit::walk_expr(this, expr, ());
|
2013-11-21 17:42:55 -06:00
|
|
|
})
|
2012-08-14 21:20:56 -05:00
|
|
|
}
|
|
|
|
|
2013-11-28 14:22:53 -06:00
|
|
|
ExprForLoop(..) => fail!("non-desugared expr_for_loop"),
|
2013-07-29 19:25:00 -05:00
|
|
|
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprBreak(Some(label)) | ExprAgain(Some(label)) => {
|
2013-12-22 16:31:49 -06:00
|
|
|
let mut label_ribs = self.label_ribs.borrow_mut();
|
2014-01-27 06:18:36 -06:00
|
|
|
match self.search_ribs(label_ribs.get(), label, expr.span) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None =>
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(expr.span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("use of undeclared label \
|
|
|
|
`{}`",
|
2014-01-31 14:25:11 -06:00
|
|
|
token::get_ident(label)
|
|
|
|
.get()
|
|
|
|
.to_str())),
|
2013-09-01 20:45:37 -05:00
|
|
|
Some(DlDef(def @ DefLabel(_))) => {
|
2014-01-26 02:43:42 -06:00
|
|
|
// FIXME: is AllPublic correct?
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
self.record_def(expr.id, (def, AllPublic))
|
2013-05-10 17:15:06 -05:00
|
|
|
}
|
|
|
|
Some(_) => {
|
2012-08-14 21:20:56 -05:00
|
|
|
self.session.span_bug(expr.span,
|
2013-05-19 00:07:44 -05:00
|
|
|
"label wasn't mapped to a \
|
|
|
|
label def!")
|
2013-05-10 17:15:06 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2013-09-26 21:10:16 -05:00
|
|
|
visit::walk_expr(self, expr, ());
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-06 06:00:46 -06:00
|
|
|
fn record_candidate_traits_for_expr_if_necessary(&mut self, expr: &Expr) {
|
2012-08-06 14:34:08 -05:00
|
|
|
match expr.node {
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprField(_, ident, _) => {
|
2013-06-01 17:31:56 -05:00
|
|
|
// FIXME(#6890): Even though you can't treat a method like a
|
|
|
|
// field, we need to add any trait methods we find that match
|
|
|
|
// the field name so that we can do some nice error reporting
|
|
|
|
// later on in typeck.
|
2012-07-18 18:18:02 -05:00
|
|
|
let traits = self.search_for_traits_containing_method(ident);
|
2013-12-22 16:03:39 -06:00
|
|
|
self.trait_map.insert(expr.id, @RefCell::new(traits));
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
2014-01-27 06:18:36 -06:00
|
|
|
ExprMethodCall(_, ident, _, _, _) => {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(recording candidate traits for expr) recording \
|
2013-09-28 00:38:08 -05:00
|
|
|
traits for {}",
|
2013-06-18 11:39:16 -05:00
|
|
|
expr.id);
|
2012-11-30 13:18:25 -06:00
|
|
|
let traits = self.search_for_traits_containing_method(ident);
|
2013-12-22 16:03:39 -06:00
|
|
|
self.trait_map.insert(expr.id, @RefCell::new(traits));
|
2012-11-30 13:18:25 -06:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprBinary(_, BiAdd, _, _) | ExprAssignOp(_, BiAdd, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.add_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprBinary(_, BiSub, _, _) | ExprAssignOp(_, BiSub, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.sub_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprBinary(_, BiMul, _, _) | ExprAssignOp(_, BiMul, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.mul_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprBinary(_, BiDiv, _, _) | ExprAssignOp(_, BiDiv, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.div_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprBinary(_, BiRem, _, _) | ExprAssignOp(_, BiRem, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.rem_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprBinary(_, BiBitXor, _, _) | ExprAssignOp(_, BiBitXor, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.bitxor_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprBinary(_, BiBitAnd, _, _) | ExprAssignOp(_, BiBitAnd, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.bitand_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprBinary(_, BiBitOr, _, _) | ExprAssignOp(_, BiBitOr, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.bitor_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprBinary(_, BiShl, _, _) | ExprAssignOp(_, BiShl, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.shl_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprBinary(_, BiShr, _, _) | ExprAssignOp(_, BiShr, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.shr_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprBinary(_, BiLt, _, _) | ExprBinary(_, BiLe, _, _) |
|
|
|
|
ExprBinary(_, BiGe, _, _) | ExprBinary(_, BiGt, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.ord_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-08-27 18:26:35 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprBinary(_, BiEq, _, _) | ExprBinary(_, BiNe, _, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.eq_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-08-27 18:26:35 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprUnary(_, UnNeg, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.neg_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2013-09-01 20:45:37 -05:00
|
|
|
ExprUnary(_, UnNot, _) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.not_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2013-01-11 11:16:58 -06:00
|
|
|
}
|
2013-11-28 14:22:53 -06:00
|
|
|
ExprIndex(..) => {
|
2013-09-26 21:10:16 -05:00
|
|
|
let i = self.lang_items.index_trait();
|
|
|
|
self.add_fixed_trait_for_expr(expr.id, i);
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
|
|
|
_ => {
|
2012-07-11 17:00:40 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-06 18:48:13 -06:00
|
|
|
fn search_for_traits_containing_method(&mut self, name: Ident) -> ~[DefId] {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(searching for traits containing method) looking for '{}'",
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(name));
|
2012-10-08 14:39:30 -05:00
|
|
|
|
2013-03-07 17:37:14 -06:00
|
|
|
let mut found_traits = ~[];
|
2012-07-11 17:00:40 -05:00
|
|
|
let mut search_module = self.current_module;
|
2013-12-21 19:04:42 -06:00
|
|
|
let method_map = self.method_map.borrow();
|
|
|
|
match method_map.get().find(&name.name) {
|
2013-05-20 11:41:20 -05:00
|
|
|
Some(candidate_traits) => loop {
|
|
|
|
// Look for the current trait.
|
2013-07-02 14:47:32 -05:00
|
|
|
match self.current_trait_refs {
|
|
|
|
Some(ref trait_def_ids) => {
|
2013-08-03 11:45:23 -05:00
|
|
|
for trait_def_id in trait_def_ids.iter() {
|
2013-05-20 11:41:20 -05:00
|
|
|
if candidate_traits.contains(trait_def_id) {
|
2013-07-02 14:47:32 -05:00
|
|
|
self.add_trait_info(&mut found_traits,
|
|
|
|
*trait_def_id,
|
|
|
|
name);
|
2012-08-17 19:55:34 -05:00
|
|
|
}
|
|
|
|
}
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-05-20 11:41:20 -05:00
|
|
|
// Nothing to do.
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-20 11:41:20 -05:00
|
|
|
// Look for trait children.
|
2013-08-21 20:39:30 -05:00
|
|
|
self.populate_module_if_necessary(search_module);
|
2013-12-21 17:32:44 -06:00
|
|
|
|
|
|
|
let children = search_module.children.borrow();
|
2014-01-06 18:48:13 -06:00
|
|
|
for (_, &child_names) in children.get().iter() {
|
|
|
|
let def = match child_names.def_for_namespace(TypeNS) {
|
|
|
|
Some(def) => def,
|
|
|
|
None => continue
|
|
|
|
};
|
|
|
|
let trait_def_id = match def {
|
|
|
|
DefTrait(trait_def_id) => trait_def_id,
|
|
|
|
_ => continue,
|
|
|
|
};
|
|
|
|
if candidate_traits.contains(&trait_def_id) {
|
|
|
|
self.add_trait_info(&mut found_traits, trait_def_id,
|
|
|
|
name);
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-20 11:41:20 -05:00
|
|
|
// Look for imports.
|
2013-12-21 17:15:54 -06:00
|
|
|
let import_resolutions = search_module.import_resolutions
|
|
|
|
.borrow();
|
2014-01-06 18:48:13 -06:00
|
|
|
for (_, &import) in import_resolutions.get().iter() {
|
|
|
|
let target = match import.target_for_namespace(TypeNS) {
|
|
|
|
None => continue,
|
|
|
|
Some(target) => target,
|
|
|
|
};
|
|
|
|
let did = match target.bindings.def_for_namespace(TypeNS) {
|
|
|
|
Some(DefTrait(trait_def_id)) => trait_def_id,
|
|
|
|
Some(..) | None => continue,
|
|
|
|
};
|
|
|
|
if candidate_traits.contains(&did) {
|
|
|
|
self.add_trait_info(&mut found_traits, did, name);
|
|
|
|
self.used_imports.insert(import.type_id.get());
|
2013-05-20 11:41:20 -05:00
|
|
|
}
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
2013-05-20 11:41:20 -05:00
|
|
|
|
|
|
|
match search_module.parent_link {
|
2014-01-06 18:48:13 -06:00
|
|
|
NoParentLink | ModuleParentLink(..) => break,
|
2013-05-20 11:41:20 -05:00
|
|
|
BlockParentLink(parent_module, _) => {
|
|
|
|
search_module = parent_module;
|
|
|
|
}
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
2013-05-20 11:41:20 -05:00
|
|
|
},
|
|
|
|
_ => ()
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
|
|
|
|
2012-08-01 19:30:05 -05:00
|
|
|
return found_traits;
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn add_trait_info(&self,
|
2013-09-01 20:45:37 -05:00
|
|
|
found_traits: &mut ~[DefId],
|
|
|
|
trait_def_id: DefId,
|
2013-09-01 19:50:59 -05:00
|
|
|
name: Ident) {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(adding trait info) found trait {}:{} for method '{}'",
|
2012-10-08 14:39:30 -05:00
|
|
|
trait_def_id.crate,
|
|
|
|
trait_def_id.node,
|
2013-06-12 12:02:55 -05:00
|
|
|
self.session.str_of(name));
|
2013-05-20 11:41:20 -05:00
|
|
|
found_traits.push(trait_def_id);
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn add_fixed_trait_for_expr(&mut self,
|
2013-07-27 03:25:59 -05:00
|
|
|
expr_id: NodeId,
|
2013-09-01 20:45:37 -05:00
|
|
|
trait_id: Option<DefId>) {
|
2013-07-15 22:42:13 -05:00
|
|
|
match trait_id {
|
|
|
|
Some(trait_id) => {
|
2013-12-22 16:03:39 -06:00
|
|
|
self.trait_map.insert(expr_id, @RefCell::new(~[trait_id]));
|
2013-07-15 22:42:13 -05:00
|
|
|
}
|
|
|
|
None => {}
|
|
|
|
}
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
|
|
|
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
fn record_def(&mut self, node_id: NodeId, (def, lp): (Def, LastPrivate)) {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("(recording def) recording {:?} for {:?}, last private {:?}",
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
def, node_id, lp);
|
|
|
|
self.last_private.insert(node_id, lp);
|
2013-12-23 13:15:16 -06:00
|
|
|
let mut def_map = self.def_map.borrow_mut();
|
|
|
|
def_map.get().insert_or_update_with(node_id, def, |_, old_value| {
|
2013-09-06 21:11:55 -05:00
|
|
|
// Resolve appears to "resolve" the same ID multiple
|
|
|
|
// times, so here is a sanity check it at least comes to
|
|
|
|
// the same conclusion! - nmatsakis
|
|
|
|
if def != *old_value {
|
2013-09-28 00:38:08 -05:00
|
|
|
self.session.bug(format!("node_id {:?} resolved first to {:?} \
|
|
|
|
and then {:?}", node_id, *old_value, def));
|
2013-09-06 21:11:55 -05:00
|
|
|
}
|
2013-11-21 17:42:55 -06:00
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn enforce_default_binding_mode(&mut self,
|
2013-09-30 12:37:17 -05:00
|
|
|
pat: &Pat,
|
2013-09-01 20:45:37 -05:00
|
|
|
pat_binding_mode: BindingMode,
|
2013-05-31 17:17:22 -05:00
|
|
|
descr: &str) {
|
2013-01-24 18:24:45 -06:00
|
|
|
match pat_binding_mode {
|
2013-10-20 07:31:23 -05:00
|
|
|
BindByValue(_) => {}
|
2013-11-28 14:22:53 -06:00
|
|
|
BindByRef(..) => {
|
2013-08-13 19:54:14 -05:00
|
|
|
self.resolve_error(
|
2013-01-24 18:24:45 -06:00
|
|
|
pat.span,
|
2013-09-28 00:38:08 -05:00
|
|
|
format!("cannot use `ref` binding mode with {}",
|
2013-01-24 18:24:45 -06:00
|
|
|
descr));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-06 21:06:58 -05:00
|
|
|
//
|
|
|
|
// Unused import checking
|
|
|
|
//
|
|
|
|
// Although this is a lint pass, it lives in here because it depends on
|
|
|
|
// resolve data structures.
|
|
|
|
//
|
|
|
|
|
2013-10-02 07:33:01 -05:00
|
|
|
fn check_for_unused_imports(&self, crate: &ast::Crate) {
|
2013-08-13 11:52:41 -05:00
|
|
|
let mut visitor = UnusedImportCheckVisitor{ resolver: self };
|
2013-09-27 21:46:09 -05:00
|
|
|
visit::walk_crate(&mut visitor, crate, ());
|
2013-02-25 11:12:22 -06:00
|
|
|
}
|
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
fn check_for_item_unused_imports(&self, vi: &ViewItem) {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
// Ignore is_public import statements because there's no way to be sure
|
2013-04-30 00:15:17 -05:00
|
|
|
// whether they're used or not. Also ignore imports with a dummy span
|
|
|
|
// because this means that they were generated in some fashion by the
|
|
|
|
// compiler and we don't need to consider them.
|
2014-01-09 07:05:33 -06:00
|
|
|
if vi.vis == Public { return }
|
2014-01-01 00:53:22 -06:00
|
|
|
if vi.span == DUMMY_SP { return }
|
2013-04-30 00:15:17 -05:00
|
|
|
|
|
|
|
match vi.node {
|
2014-01-09 07:05:33 -06:00
|
|
|
ViewItemExternMod(..) => {} // ignore
|
|
|
|
ViewItemUse(ref path) => {
|
2013-08-03 11:45:23 -05:00
|
|
|
for p in path.iter() {
|
2013-04-30 00:15:17 -05:00
|
|
|
match p.node {
|
2014-01-09 07:05:33 -06:00
|
|
|
ViewPathSimple(_, _, id) | ViewPathGlob(_, id) => {
|
2013-04-30 00:15:17 -05:00
|
|
|
if !self.used_imports.contains(&id) {
|
2014-01-09 20:29:45 -06:00
|
|
|
self.session.add_lint(UnusedImports,
|
2013-05-21 05:09:22 -05:00
|
|
|
id, p.span,
|
2013-04-30 00:15:17 -05:00
|
|
|
~"unused import");
|
|
|
|
}
|
|
|
|
}
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2014-01-09 07:05:33 -06:00
|
|
|
ViewPathList(_, ref list, _) => {
|
2013-08-03 11:45:23 -05:00
|
|
|
for i in list.iter() {
|
2013-04-30 00:15:17 -05:00
|
|
|
if !self.used_imports.contains(&i.node.id) {
|
2014-01-09 20:29:45 -06:00
|
|
|
self.session.add_lint(UnusedImports,
|
2013-04-30 00:15:17 -05:00
|
|
|
i.node.id, i.span,
|
|
|
|
~"unused import");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-07-06 21:06:58 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
//
|
|
|
|
// Diagnostics
|
|
|
|
//
|
|
|
|
// Diagnostics are not particularly efficient, because they're rarely
|
|
|
|
// hit.
|
|
|
|
//
|
|
|
|
|
2012-12-29 12:25:09 -06:00
|
|
|
/// A somewhat inefficient routine to obtain the name of a module.
|
2013-12-19 21:02:22 -06:00
|
|
|
fn module_to_str(&mut self, module_: @Module) -> ~str {
|
2013-03-07 17:37:14 -06:00
|
|
|
let mut idents = ~[];
|
2012-07-31 18:38:41 -05:00
|
|
|
let mut current_module = module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
loop {
|
2012-08-06 14:34:08 -05:00
|
|
|
match current_module.parent_link {
|
2012-08-03 21:59:04 -05:00
|
|
|
NoParentLink => {
|
2012-05-22 12:54:12 -05:00
|
|
|
break;
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
ModuleParentLink(module_, name) => {
|
2012-09-19 20:52:49 -05:00
|
|
|
idents.push(name);
|
2012-07-31 18:38:41 -05:00
|
|
|
current_module = module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-26 14:12:05 -05:00
|
|
|
BlockParentLink(module_, _) => {
|
2012-12-23 16:41:37 -06:00
|
|
|
idents.push(special_idents::opaque);
|
2012-07-31 18:38:41 -05:00
|
|
|
current_module = module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
if idents.len() == 0 {
|
2012-08-01 19:30:05 -05:00
|
|
|
return ~"???";
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-09-01 19:50:59 -05:00
|
|
|
return self.idents_to_str(idents.move_rev_iter().collect::<~[ast::Ident]>());
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-12-08 01:55:28 -06:00
|
|
|
#[allow(dead_code)] // useful for debugging
|
2013-12-19 21:02:22 -06:00
|
|
|
fn dump_module(&mut self, module_: @Module) {
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("Dump of module `{}`:", self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("Children:");
|
2013-08-21 20:39:30 -05:00
|
|
|
self.populate_module_if_necessary(module_);
|
2013-12-21 17:32:44 -06:00
|
|
|
let children = module_.children.borrow();
|
|
|
|
for (&name, _) in children.get().iter() {
|
2014-01-31 14:25:11 -06:00
|
|
|
debug!("* {}", token::get_ident(name).get().to_str());
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-10-21 15:08:31 -05:00
|
|
|
debug!("Import resolutions:");
|
2013-12-21 17:15:54 -06:00
|
|
|
let import_resolutions = module_.import_resolutions.borrow();
|
|
|
|
for (name, import_resolution) in import_resolutions.get().iter() {
|
2013-04-30 15:35:01 -05:00
|
|
|
let value_repr;
|
2013-03-21 03:10:57 -05:00
|
|
|
match import_resolution.target_for_namespace(ValueNS) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => { value_repr = ~""; }
|
2012-08-26 14:12:05 -05:00
|
|
|
Some(_) => {
|
2012-07-14 00:57:48 -05:00
|
|
|
value_repr = ~" value:?";
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4954
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-04-30 15:35:01 -05:00
|
|
|
let type_repr;
|
2013-03-21 03:10:57 -05:00
|
|
|
match import_resolution.target_for_namespace(TypeNS) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => { type_repr = ~""; }
|
2012-08-26 14:12:05 -05:00
|
|
|
Some(_) => {
|
2012-07-14 00:57:48 -05:00
|
|
|
type_repr = ~" type:?";
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4954
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-31 14:25:11 -06:00
|
|
|
debug!("* {}:{}{}", token::get_ident(*name).get().to_str(),
|
2012-10-15 16:56:42 -05:00
|
|
|
value_repr, type_repr);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-19 01:40:42 -06:00
|
|
|
pub struct CrateMap {
|
|
|
|
def_map: DefMap,
|
|
|
|
exp_map2: ExportMap2,
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
trait_map: TraitMap,
|
|
|
|
external_exports: ExternalExports,
|
|
|
|
last_private_map: LastPrivateMap,
|
2013-02-19 01:40:42 -06:00
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Entry point to crate resolution.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub fn resolve_crate(session: Session,
|
2014-01-07 22:39:15 -06:00
|
|
|
lang_items: @LanguageItems,
|
2013-09-27 21:46:09 -05:00
|
|
|
crate: &Crate)
|
2013-02-19 01:40:42 -06:00
|
|
|
-> CrateMap {
|
2013-09-27 21:46:09 -05:00
|
|
|
let mut resolver = Resolver(session, lang_items, crate.span);
|
|
|
|
resolver.resolve(crate);
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
let Resolver { def_map, export_map2, trait_map, last_private,
|
2013-11-28 14:22:53 -06:00
|
|
|
external_exports, .. } = resolver;
|
2013-02-19 01:40:42 -06:00
|
|
|
CrateMap {
|
Extract privacy checking from name resolution
This commit is the culmination of my recent effort to refine Rust's notion of
privacy and visibility among crates. The major goals of this commit were to
remove privacy checking from resolve for the sake of sane error messages, and to
attempt a much more rigid and well-tested implementation of visibility
throughout rust. The implemented rules for name visibility are:
1. Everything pub from the root namespace is visible to anyone
2. You may access any private item of your ancestors.
"Accessing a private item" depends on what the item is, so for a function this
means that you can call it, but for a module it means that you can look inside
of it. Once you look inside a private module, any accessed item must be "pub
from the root" where the new root is the private module that you looked into.
These rules required some more analysis results to get propagated from trans to
privacy in the form of a few hash tables.
I added a new test in which my goal was to showcase all of the privacy nuances
of the language, and I hope to place any new bugs into this file to prevent
regressions.
Overall, I was unable to completely remove the notion of privacy from resolve.
One use of privacy is for dealing with glob imports. Essentially a glob import
can only import *public* items from the destination, and because this must be
done at namespace resolution time, resolve must maintain the notion of "what
items are public in a module". There are some sad approximations of privacy, but
I unfortunately can't see clear methods to extract them outside.
The other use case of privacy in resolve now is one that must stick around
regardless of glob imports. When dealing with privacy, checking a private path
needs to know "what the last private thing was" when looking at a path. Resolve
is the only compiler pass which knows the answer to this question, so it
maintains the answer on a per-path resolution basis (works similarly to the
def_map generated).
Closes #8215
2013-10-05 16:37:39 -05:00
|
|
|
def_map: def_map,
|
|
|
|
exp_map2: export_map2,
|
|
|
|
trait_map: trait_map,
|
|
|
|
external_exports: external_exports,
|
|
|
|
last_private_map: last_private,
|
2013-02-19 01:40:42 -06:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|