2012-12-03 18:48:01 -06:00
|
|
|
// Copyright 2012 The Rust Project Developers. See the COPYRIGHT
|
|
|
|
// file at the top-level directory of this distribution and at
|
|
|
|
// http://rust-lang.org/COPYRIGHT.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
|
|
|
|
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
|
|
|
|
// option. This file may not be copied, modified, or distributed
|
|
|
|
// except according to those terms.
|
|
|
|
|
2013-01-23 22:13:52 -06:00
|
|
|
use driver::session;
|
2012-10-15 16:56:42 -05:00
|
|
|
use driver::session::Session;
|
2013-03-27 09:26:57 -05:00
|
|
|
use metadata::csearch::{each_path, get_trait_method_def_ids};
|
|
|
|
use metadata::csearch::get_method_name_and_self_ty;
|
2013-03-26 15:38:07 -05:00
|
|
|
use metadata::csearch::get_static_methods_if_impl;
|
|
|
|
use metadata::csearch::get_type_name_if_impl;
|
2013-02-17 20:45:00 -06:00
|
|
|
use metadata::cstore::find_extern_mod_stmt_cnum;
|
2012-09-04 13:54:36 -05:00
|
|
|
use metadata::decoder::{def_like, dl_def, dl_field, dl_impl};
|
|
|
|
use middle::lang_items::LanguageItems;
|
2013-04-09 01:07:50 -05:00
|
|
|
use middle::lint::{allow, level, unused_imports};
|
2013-02-25 11:12:22 -06:00
|
|
|
use middle::lint::{get_lint_level, get_lint_settings_level};
|
2013-03-26 15:38:07 -05:00
|
|
|
use middle::pat_util::pat_bindings;
|
2012-12-23 16:41:37 -06:00
|
|
|
|
2013-01-10 13:16:54 -06:00
|
|
|
use syntax::ast::{RegionTyParamBound, TraitTyParamBound, _mod, add, arm};
|
2013-01-10 12:59:58 -06:00
|
|
|
use syntax::ast::{binding_mode, bitand, bitor, bitxor, blk};
|
|
|
|
use syntax::ast::{bind_infer, bind_by_ref, bind_by_copy};
|
2013-03-26 15:38:07 -05:00
|
|
|
use syntax::ast::{crate, decl_item, def, def_arg, def_binding};
|
2012-12-10 13:58:37 -06:00
|
|
|
use syntax::ast::{def_const, def_foreign_mod, def_fn, def_id, def_label};
|
|
|
|
use syntax::ast::{def_local, def_mod, def_prim_ty, def_region, def_self};
|
|
|
|
use syntax::ast::{def_self_ty, def_static_method, def_struct, def_ty};
|
2013-03-27 09:26:57 -05:00
|
|
|
use syntax::ast::{def_ty_param, def_typaram_binder, def_trait};
|
2012-09-04 13:54:36 -05:00
|
|
|
use syntax::ast::{def_upvar, def_use, def_variant, expr, expr_assign_op};
|
2013-03-26 15:38:07 -05:00
|
|
|
use syntax::ast::{expr_binary, expr_break, expr_field};
|
2012-11-30 13:18:25 -06:00
|
|
|
use syntax::ast::{expr_fn_block, expr_index, expr_method_call, expr_path};
|
2012-09-04 13:54:36 -05:00
|
|
|
use syntax::ast::{def_prim_ty, def_region, def_self, def_ty, def_ty_param};
|
2013-04-21 10:58:53 -05:00
|
|
|
use syntax::ast::{def_upvar, def_use, def_variant, quot, eq};
|
2013-03-28 13:29:21 -05:00
|
|
|
use syntax::ast::{expr, expr_again, expr_assign_op};
|
2013-03-01 18:59:46 -06:00
|
|
|
use syntax::ast::{expr_index, expr_loop};
|
2012-09-04 13:54:36 -05:00
|
|
|
use syntax::ast::{expr_path, expr_struct, expr_unary, fn_decl};
|
|
|
|
use syntax::ast::{foreign_item, foreign_item_const, foreign_item_fn, ge};
|
2013-03-26 15:38:07 -05:00
|
|
|
use syntax::ast::Generics;
|
|
|
|
use syntax::ast::{gt, ident, inherited, item, item_struct};
|
2012-09-04 13:54:36 -05:00
|
|
|
use syntax::ast::{item_const, item_enum, item_fn, item_foreign_mod};
|
|
|
|
use syntax::ast::{item_impl, item_mac, item_mod, item_trait, item_ty, le};
|
2013-04-24 03:29:46 -05:00
|
|
|
use syntax::ast::{local, local_crate, lt, method, mul};
|
2012-12-23 16:41:37 -06:00
|
|
|
use syntax::ast::{named_field, ne, neg, node_id, pat, pat_enum, pat_ident};
|
2013-03-26 19:00:35 -05:00
|
|
|
use syntax::ast::{Path, pat_lit, pat_range, pat_struct};
|
2013-03-26 15:38:07 -05:00
|
|
|
use syntax::ast::{prim_ty, private, provided};
|
2012-12-23 16:41:37 -06:00
|
|
|
use syntax::ast::{public, required, rem, self_ty_, shl, shr, stmt_decl};
|
2013-03-26 05:05:40 -05:00
|
|
|
use syntax::ast::{struct_dtor, struct_field, struct_variant_kind};
|
2012-12-23 16:41:37 -06:00
|
|
|
use syntax::ast::{sty_static, subtract, trait_ref, tuple_variant_kind, Ty};
|
|
|
|
use syntax::ast::{ty_bool, ty_char, ty_f, ty_f32, ty_f64, ty_float, ty_i};
|
2013-02-14 23:50:03 -06:00
|
|
|
use syntax::ast::{ty_i16, ty_i32, ty_i64, ty_i8, ty_int, TyParam, ty_path};
|
2012-12-23 16:41:37 -06:00
|
|
|
use syntax::ast::{ty_str, ty_u, ty_u16, ty_u32, ty_u64, ty_u8, ty_uint};
|
2013-03-26 15:38:07 -05:00
|
|
|
use syntax::ast::unnamed_field;
|
2013-02-17 20:45:00 -06:00
|
|
|
use syntax::ast::{variant, view_item, view_item_extern_mod};
|
2012-09-04 13:54:36 -05:00
|
|
|
use syntax::ast::{view_item_use, view_path_glob, view_path_list};
|
2013-03-26 15:38:07 -05:00
|
|
|
use syntax::ast::{view_path_simple, anonymous, named, not};
|
2013-01-23 18:29:31 -06:00
|
|
|
use syntax::ast::{unsafe_fn};
|
2013-01-30 11:56:33 -06:00
|
|
|
use syntax::ast_util::{def_id_of_def, local_def};
|
2012-09-04 13:54:36 -05:00
|
|
|
use syntax::ast_util::{path_to_ident, walk_pat, trait_method_to_ty_method};
|
2013-01-30 19:20:02 -06:00
|
|
|
use syntax::ast_util::{Privacy, Public, Private};
|
|
|
|
use syntax::ast_util::{variant_visibility_to_privacy, visibility_to_privacy};
|
2013-01-11 03:08:01 -06:00
|
|
|
use syntax::attr::{attr_metas, contains_name, attrs_contains_name};
|
2012-12-23 16:41:37 -06:00
|
|
|
use syntax::parse::token::ident_interner;
|
|
|
|
use syntax::parse::token::special_idents;
|
2013-03-26 15:38:07 -05:00
|
|
|
use syntax::print::pprust::path_to_str;
|
2013-01-30 11:56:33 -06:00
|
|
|
use syntax::codemap::{span, dummy_sp};
|
2013-03-26 15:38:07 -05:00
|
|
|
use syntax::visit::{default_visitor, mk_vt, Visitor, visit_block};
|
|
|
|
use syntax::visit::{visit_crate, visit_expr, visit_expr_opt};
|
|
|
|
use syntax::visit::{visit_foreign_item, visit_item};
|
2012-09-04 13:54:36 -05:00
|
|
|
use syntax::visit::{visit_mod, visit_ty, vt};
|
2013-02-14 23:50:03 -06:00
|
|
|
use syntax::opt_vec::OptVec;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-03-26 15:38:07 -05:00
|
|
|
use core::option::Some;
|
|
|
|
use core::str::each_split_str;
|
2013-04-03 08:28:36 -05:00
|
|
|
use core::hashmap::{HashMap, HashSet};
|
2013-03-27 05:16:28 -05:00
|
|
|
use core::util;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Definition mapping
|
2013-04-03 08:28:36 -05:00
|
|
|
pub type DefMap = @mut HashMap<node_id,def>;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub struct binding_info {
|
2012-09-07 16:50:47 -05:00
|
|
|
span: span,
|
|
|
|
binding_mode: binding_mode,
|
2012-08-06 09:20:23 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Map from the name in a pattern to its binding mode.
|
2013-04-03 08:28:36 -05:00
|
|
|
pub type BindingMap = HashMap<ident,binding_info>;
|
2012-08-06 09:20:23 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// Implementation resolution
|
2012-08-17 19:09:53 -05:00
|
|
|
//
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4946: This kind of duplicates information kept in
|
|
|
|
// ty::method. Maybe it should go away.
|
2012-08-17 19:09:53 -05:00
|
|
|
|
2013-02-19 01:40:42 -06:00
|
|
|
pub struct MethodInfo {
|
2012-07-31 18:32:37 -05:00
|
|
|
did: def_id,
|
|
|
|
n_tps: uint,
|
|
|
|
ident: ident,
|
|
|
|
self_type: self_ty_
|
2013-02-19 01:40:42 -06:00
|
|
|
}
|
2012-07-31 18:32:37 -05:00
|
|
|
|
2013-02-19 01:40:42 -06:00
|
|
|
pub struct Impl {
|
|
|
|
did: def_id,
|
|
|
|
ident: ident,
|
|
|
|
methods: ~[@MethodInfo]
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-11 17:00:40 -05:00
|
|
|
// Trait method resolution
|
2013-04-03 08:28:36 -05:00
|
|
|
pub type TraitMap = HashMap<node_id,@mut ~[def_id]>;
|
2012-07-11 17:00:40 -05:00
|
|
|
|
2012-08-17 14:41:34 -05:00
|
|
|
// This is the replacement export map. It maps a module to all of the exports
|
|
|
|
// within.
|
2013-04-03 08:28:36 -05:00
|
|
|
pub type ExportMap2 = @mut HashMap<node_id, ~[Export2]>;
|
2012-08-17 14:41:34 -05:00
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub struct Export2 {
|
2013-02-10 18:33:16 -06:00
|
|
|
name: @~str, // The name of the target.
|
2012-09-07 16:50:47 -05:00
|
|
|
def_id: def_id, // The definition of the target.
|
|
|
|
reexport: bool, // Whether this is a reexport.
|
2012-08-17 14:41:34 -05:00
|
|
|
}
|
|
|
|
|
2013-03-20 10:40:02 -05:00
|
|
|
#[deriving(Eq)]
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum PatternBindingMode {
|
2012-05-22 12:54:12 -05:00
|
|
|
RefutableMode,
|
2012-11-06 20:41:06 -06:00
|
|
|
LocalIrrefutableMode,
|
2013-04-24 03:29:46 -05:00
|
|
|
ArgumentIrrefutableMode,
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-26 21:53:33 -05:00
|
|
|
#[deriving(Eq)]
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum Namespace {
|
2012-05-22 12:54:12 -05:00
|
|
|
TypeNS,
|
2012-08-17 19:09:53 -05:00
|
|
|
ValueNS
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-11-29 16:43:33 -06:00
|
|
|
/// A NamespaceResult represents the result of resolving an import in
|
|
|
|
/// a particular namespace. The result is either definitely-resolved,
|
|
|
|
/// definitely- unresolved, or unknown.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum NamespaceResult {
|
2012-11-29 14:08:40 -06:00
|
|
|
/// Means that resolve hasn't gathered enough information yet to determine
|
|
|
|
/// whether the name is bound in this namespace. (That is, it hasn't
|
|
|
|
/// resolved all `use` directives yet.)
|
2012-05-22 12:54:12 -05:00
|
|
|
UnknownResult,
|
2012-11-29 16:43:33 -06:00
|
|
|
/// Means that resolve has determined that the name is definitely
|
|
|
|
/// not bound in the namespace.
|
2012-05-22 12:54:12 -05:00
|
|
|
UnboundResult,
|
2012-11-29 14:08:40 -06:00
|
|
|
/// Means that resolve has determined that the name is bound in the Module
|
|
|
|
/// argument, and specified by the NameBindings argument.
|
2013-02-21 13:08:50 -06:00
|
|
|
BoundResult(@mut Module, @mut NameBindings)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub impl NamespaceResult {
|
2013-03-22 13:09:13 -05:00
|
|
|
fn is_unknown(&self) -> bool {
|
2013-02-22 00:41:37 -06:00
|
|
|
match *self {
|
2012-08-27 18:26:35 -05:00
|
|
|
UnknownResult => true,
|
|
|
|
_ => false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum NameDefinition {
|
2012-05-22 12:54:12 -05:00
|
|
|
NoNameDefinition, //< The name was unbound.
|
|
|
|
ChildNameDefinition(def), //< The name identifies an immediate child.
|
|
|
|
ImportNameDefinition(def) //< The name identifies an import.
|
|
|
|
}
|
|
|
|
|
2013-03-20 10:40:02 -05:00
|
|
|
#[deriving(Eq)]
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum Mutability {
|
2012-05-22 12:54:12 -05:00
|
|
|
Mutable,
|
|
|
|
Immutable
|
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum SelfBinding {
|
2012-05-22 12:54:12 -05:00
|
|
|
NoSelfBinding,
|
2012-12-10 13:58:37 -06:00
|
|
|
HasSelfBinding(node_id, bool /* is implicit */)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub type ResolveVisitor = vt<()>;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Contains data for specific types of import directives.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum ImportDirectiveSubclass {
|
2013-03-26 21:53:33 -05:00
|
|
|
SingleImport(ident /* target */, ident /* source */),
|
2012-05-22 12:54:12 -05:00
|
|
|
GlobImport
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// The context that we thread through while building the reduced graph.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum ReducedGraphParent {
|
2013-02-21 13:08:50 -06:00
|
|
|
ModuleReducedGraphParent(@mut Module)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum ResolveResult<T> {
|
2012-05-22 12:54:12 -05:00
|
|
|
Failed, // Failed to resolve the name.
|
|
|
|
Indeterminate, // Couldn't determine due to unresolved globs.
|
|
|
|
Success(T) // Successfully resolved the import.
|
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub impl<T> ResolveResult<T> {
|
2013-02-22 00:41:37 -06:00
|
|
|
fn failed(&self) -> bool {
|
|
|
|
match *self { Failed => true, _ => false }
|
2012-09-07 20:53:14 -05:00
|
|
|
}
|
2013-02-22 00:41:37 -06:00
|
|
|
fn indeterminate(&self) -> bool {
|
|
|
|
match *self { Indeterminate => true, _ => false }
|
2012-09-07 20:53:14 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-14 14:25:48 -05:00
|
|
|
pub enum TypeParameters<'self> {
|
2013-03-26 21:53:33 -05:00
|
|
|
NoTypeParameters, //< No type parameters.
|
2013-03-14 13:22:51 -05:00
|
|
|
HasTypeParameters(&'self Generics, //< Type parameters.
|
2013-03-26 21:53:33 -05:00
|
|
|
node_id, //< ID of the enclosing item
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The index to start numbering the type parameters at.
|
|
|
|
// This is zero if this is the outermost set of type
|
|
|
|
// parameters, or equal to the number of outer type
|
|
|
|
// parameters. For example, if we have:
|
|
|
|
//
|
|
|
|
// impl I<T> {
|
|
|
|
// fn method<U>() { ... }
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// The index at the method site will be 1, because the
|
|
|
|
// outer T had index 0.
|
2012-07-06 21:06:58 -05:00
|
|
|
uint,
|
|
|
|
|
|
|
|
// The kind of the rib used for type parameters.
|
|
|
|
RibKind)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// The rib kind controls the translation of argument or local definitions
|
|
|
|
// (`def_arg` or `def_local`) to upvars (`def_upvar`).
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum RibKind {
|
2012-05-22 12:54:12 -05:00
|
|
|
// No translation needs to be applied.
|
|
|
|
NormalRibKind,
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// We passed through a function scope at the given node ID. Translate
|
|
|
|
// upvars as appropriate.
|
2012-08-20 18:53:33 -05:00
|
|
|
FunctionRibKind(node_id /* func id */, node_id /* body id */),
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2012-12-10 15:47:54 -06:00
|
|
|
// We passed through an impl or trait and are now in one of its
|
|
|
|
// methods. Allow references to ty params that that impl or trait
|
2012-07-26 16:04:03 -05:00
|
|
|
// binds. Disallow any other upvars (including other ty params that are
|
|
|
|
// upvars).
|
|
|
|
// parent; method itself
|
|
|
|
MethodRibKind(node_id, MethodSort),
|
|
|
|
|
2012-07-06 21:06:58 -05:00
|
|
|
// We passed through a function *item* scope. Disallow upvars.
|
2012-10-15 14:27:09 -05:00
|
|
|
OpaqueFunctionRibKind,
|
|
|
|
|
|
|
|
// We're in a constant item. Can't refer to dynamic stuff.
|
|
|
|
ConstantItemRibKind
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-07-26 16:04:03 -05:00
|
|
|
// Methods can be required or provided. Required methods only occur in traits.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum MethodSort {
|
2012-07-26 16:04:03 -05:00
|
|
|
Required,
|
|
|
|
Provided(node_id)
|
|
|
|
}
|
|
|
|
|
2012-07-03 17:55:26 -05:00
|
|
|
// The X-ray flag indicates that a context has the X-ray privilege, which
|
|
|
|
// allows it to reference private names. Currently, this is used for the test
|
|
|
|
// runner.
|
|
|
|
//
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4947: The X-ray flag is kind of questionable in the first
|
|
|
|
// place. It might be better to introduce an expr_xray_path instead.
|
2012-07-03 17:55:26 -05:00
|
|
|
|
2013-03-20 10:40:02 -05:00
|
|
|
#[deriving(Eq)]
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum XrayFlag {
|
2012-07-03 17:55:26 -05:00
|
|
|
NoXray, //< Private items cannot be accessed.
|
|
|
|
Xray //< Private items can be accessed.
|
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum UseLexicalScopeFlag {
|
2012-12-13 15:05:22 -06:00
|
|
|
DontUseLexicalScope,
|
|
|
|
UseLexicalScope
|
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum SearchThroughModulesFlag {
|
2012-12-23 16:41:37 -06:00
|
|
|
DontSearchThroughModules,
|
|
|
|
SearchThroughModules
|
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum ModulePrefixResult {
|
2012-12-23 16:41:37 -06:00
|
|
|
NoPrefixFound,
|
2013-02-21 13:08:50 -06:00
|
|
|
PrefixFound(@mut Module, uint)
|
2012-12-13 15:05:22 -06:00
|
|
|
}
|
|
|
|
|
2013-03-20 10:40:02 -05:00
|
|
|
#[deriving(Eq)]
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum AllowCapturingSelfFlag {
|
2012-07-06 21:06:58 -05:00
|
|
|
AllowCapturingSelf, //< The "self" definition can be captured.
|
|
|
|
DontAllowCapturingSelf, //< The "self" definition cannot be captured.
|
|
|
|
}
|
|
|
|
|
2013-03-20 10:40:02 -05:00
|
|
|
#[deriving(Eq)]
|
2013-03-01 12:44:43 -06:00
|
|
|
enum NameSearchType {
|
|
|
|
SearchItemsAndPublicImports, //< Search items and public imports.
|
|
|
|
SearchItemsAndAllImports, //< Search items and all imports.
|
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum BareIdentifierPatternResolution {
|
2012-10-30 17:53:06 -05:00
|
|
|
FoundStructOrEnumVariant(def),
|
2012-11-13 00:10:15 -06:00
|
|
|
FoundConst(def),
|
2012-10-30 17:53:06 -05:00
|
|
|
BareIdentifierPatternUnresolved
|
2012-07-06 21:06:58 -05:00
|
|
|
}
|
|
|
|
|
2012-10-15 20:04:15 -05:00
|
|
|
// Specifies how duplicates should be handled when adding a child item if
|
|
|
|
// another item exists with the same name in some namespace.
|
2013-03-20 10:40:02 -05:00
|
|
|
#[deriving(Eq)]
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum DuplicateCheckingMode {
|
2012-10-15 20:04:15 -05:00
|
|
|
ForbidDuplicateModules,
|
|
|
|
ForbidDuplicateTypes,
|
|
|
|
ForbidDuplicateValues,
|
|
|
|
ForbidDuplicateTypesAndValues,
|
|
|
|
OverwriteDuplicates
|
|
|
|
}
|
|
|
|
|
|
|
|
// Returns the namespace associated with the given duplicate checking mode,
|
|
|
|
// or fails for OverwriteDuplicates. This is used for error messages.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub fn namespace_for_duplicate_checking_mode(mode: DuplicateCheckingMode)
|
|
|
|
-> Namespace {
|
2012-10-15 20:04:15 -05:00
|
|
|
match mode {
|
|
|
|
ForbidDuplicateModules | ForbidDuplicateTypes |
|
|
|
|
ForbidDuplicateTypesAndValues => TypeNS,
|
|
|
|
ForbidDuplicateValues => ValueNS,
|
2013-02-11 21:26:38 -06:00
|
|
|
OverwriteDuplicates => fail!(~"OverwriteDuplicates has no namespace")
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-14 21:20:56 -05:00
|
|
|
/// One local scope.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub struct Rib {
|
2013-04-03 08:28:36 -05:00
|
|
|
bindings: @mut HashMap<ident,def_like>,
|
2012-09-06 21:40:15 -05:00
|
|
|
kind: RibKind,
|
2012-09-05 17:58:43 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub fn Rib(kind: RibKind) -> Rib {
|
2012-09-05 17:58:43 -05:00
|
|
|
Rib {
|
2013-04-03 08:28:36 -05:00
|
|
|
bindings: @mut HashMap::new(),
|
2012-09-05 17:58:43 -05:00
|
|
|
kind: kind
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-09-05 17:58:43 -05:00
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// One import directive.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub struct ImportDirective {
|
2012-09-25 17:22:28 -05:00
|
|
|
privacy: Privacy,
|
2013-03-07 17:37:14 -06:00
|
|
|
module_path: ~[ident],
|
2012-09-06 21:40:15 -05:00
|
|
|
subclass: @ImportDirectiveSubclass,
|
|
|
|
span: span,
|
2012-09-05 17:58:43 -05:00
|
|
|
}
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub fn ImportDirective(privacy: Privacy,
|
2013-04-17 11:15:37 -05:00
|
|
|
module_path: ~[ident],
|
2013-01-30 15:44:24 -06:00
|
|
|
subclass: @ImportDirectiveSubclass,
|
|
|
|
span: span)
|
|
|
|
-> ImportDirective {
|
2012-09-05 17:58:43 -05:00
|
|
|
ImportDirective {
|
2012-09-25 17:22:28 -05:00
|
|
|
privacy: privacy,
|
2012-09-05 17:58:43 -05:00
|
|
|
module_path: module_path,
|
|
|
|
subclass: subclass,
|
|
|
|
span: span
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// The item that an import resolves to.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub struct Target {
|
2013-02-21 13:08:50 -06:00
|
|
|
target_module: @mut Module,
|
2013-02-04 16:02:01 -06:00
|
|
|
bindings: @mut NameBindings,
|
2012-09-05 17:58:43 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
pub fn Target(target_module: @mut Module,
|
|
|
|
bindings: @mut NameBindings)
|
|
|
|
-> Target {
|
2012-09-05 17:58:43 -05:00
|
|
|
Target {
|
|
|
|
target_module: target_module,
|
|
|
|
bindings: bindings
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
/// An ImportResolution represents a particular `use` directive.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub struct ImportResolution {
|
2012-11-29 14:08:40 -06:00
|
|
|
/// The privacy of this `use` directive (whether it's `use` or
|
|
|
|
/// `pub use`.
|
2012-09-25 17:22:28 -05:00
|
|
|
privacy: Privacy,
|
2012-09-06 21:40:15 -05:00
|
|
|
span: span,
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// The number of outstanding references to this name. When this reaches
|
|
|
|
// zero, outside modules can count on the targets being correct. Before
|
|
|
|
// then, all bets are off; future imports could override this name.
|
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
outstanding_references: uint,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
/// The value that this `use` directive names, if there is one.
|
2013-02-04 16:02:01 -06:00
|
|
|
value_target: Option<Target>,
|
2012-11-29 14:08:40 -06:00
|
|
|
/// The type that this `use` directive names, if there is one.
|
2013-02-04 16:02:01 -06:00
|
|
|
type_target: Option<Target>,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-05 01:01:02 -06:00
|
|
|
/// There exists one state per import statement
|
|
|
|
state: @mut ImportState,
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
pub fn ImportResolution(privacy: Privacy,
|
2013-04-17 11:15:37 -05:00
|
|
|
span: span,
|
2013-02-05 01:01:02 -06:00
|
|
|
state: @mut ImportState) -> ImportResolution {
|
2012-09-05 17:58:43 -05:00
|
|
|
ImportResolution {
|
2012-09-25 17:22:28 -05:00
|
|
|
privacy: privacy,
|
2012-09-05 17:58:43 -05:00
|
|
|
span: span,
|
2012-11-29 14:08:40 -06:00
|
|
|
outstanding_references: 0,
|
2012-09-05 17:58:43 -05:00
|
|
|
value_target: None,
|
|
|
|
type_target: None,
|
2013-02-05 01:01:02 -06:00
|
|
|
state: state,
|
2012-09-05 17:58:43 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub impl ImportResolution {
|
2013-02-22 00:41:37 -06:00
|
|
|
fn target_for_namespace(&self, namespace: Namespace) -> Option<Target> {
|
2012-09-07 21:04:40 -05:00
|
|
|
match namespace {
|
|
|
|
TypeNS => return copy self.type_target,
|
|
|
|
ValueNS => return copy self.value_target
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-05 01:01:02 -06:00
|
|
|
pub struct ImportState {
|
|
|
|
used: bool,
|
|
|
|
warned: bool
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn ImportState() -> ImportState {
|
|
|
|
ImportState{ used: false, warned: false }
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// The link from a module up to its nearest parent node.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum ParentLink {
|
2012-05-22 12:54:12 -05:00
|
|
|
NoParentLink,
|
2013-02-21 13:08:50 -06:00
|
|
|
ModuleParentLink(@mut Module, ident),
|
|
|
|
BlockParentLink(@mut Module, node_id)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-12-23 16:41:37 -06:00
|
|
|
/// The type of module this is.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub enum ModuleKind {
|
2012-12-23 16:41:37 -06:00
|
|
|
NormalModuleKind,
|
|
|
|
ExternModuleKind,
|
|
|
|
TraitModuleKind,
|
|
|
|
AnonymousModuleKind,
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// One node in the tree of modules.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub struct Module {
|
2012-09-06 21:40:15 -05:00
|
|
|
parent_link: ParentLink,
|
2013-02-21 13:08:50 -06:00
|
|
|
def_id: Option<def_id>,
|
2012-12-23 16:41:37 -06:00
|
|
|
kind: ModuleKind,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-04-03 08:28:36 -05:00
|
|
|
children: @mut HashMap<ident, @mut NameBindings>,
|
2013-03-16 13:11:31 -05:00
|
|
|
imports: @mut ~[@ImportDirective],
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-03-26 21:53:33 -05:00
|
|
|
// The external module children of this node that were declared with
|
|
|
|
// `extern mod`.
|
2013-04-03 08:28:36 -05:00
|
|
|
external_module_children: @mut HashMap<ident, @mut Module>,
|
2013-03-26 21:53:33 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// The anonymous children of this node. Anonymous children are pseudo-
|
|
|
|
// modules that are implicitly created around items contained within
|
|
|
|
// blocks.
|
|
|
|
//
|
|
|
|
// For example, if we have this:
|
|
|
|
//
|
|
|
|
// fn f() {
|
|
|
|
// fn g() {
|
|
|
|
// ...
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// There will be an anonymous module created around `g` with the ID of the
|
|
|
|
// entry block for `f`.
|
|
|
|
|
2013-04-03 08:28:36 -05:00
|
|
|
anonymous_children: @mut HashMap<node_id,@mut Module>,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The status of resolving each import in this module.
|
2013-04-03 08:28:36 -05:00
|
|
|
import_resolutions: @mut HashMap<ident, @mut ImportResolution>,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The number of unresolved globs that this module exports.
|
2013-02-21 13:08:50 -06:00
|
|
|
glob_count: uint,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The index of the import we're resolving.
|
2013-02-21 13:08:50 -06:00
|
|
|
resolved_import_count: uint,
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub fn Module(parent_link: ParentLink,
|
|
|
|
def_id: Option<def_id>,
|
2013-01-30 19:20:02 -06:00
|
|
|
kind: ModuleKind)
|
2013-01-30 15:44:24 -06:00
|
|
|
-> Module {
|
2012-09-05 17:58:43 -05:00
|
|
|
Module {
|
|
|
|
parent_link: parent_link,
|
|
|
|
def_id: def_id,
|
2012-12-23 16:41:37 -06:00
|
|
|
kind: kind,
|
2013-04-03 08:28:36 -05:00
|
|
|
children: @mut HashMap::new(),
|
2013-03-16 13:11:31 -05:00
|
|
|
imports: @mut ~[],
|
2013-04-03 08:28:36 -05:00
|
|
|
external_module_children: @mut HashMap::new(),
|
|
|
|
anonymous_children: @mut HashMap::new(),
|
|
|
|
import_resolutions: @mut HashMap::new(),
|
2012-11-29 14:08:40 -06:00
|
|
|
glob_count: 0,
|
|
|
|
resolved_import_count: 0
|
2012-09-05 17:58:43 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub impl Module {
|
2013-02-22 00:41:37 -06:00
|
|
|
fn all_imports_resolved(&self) -> bool {
|
2013-03-16 13:11:31 -05:00
|
|
|
let imports = &mut *self.imports;
|
|
|
|
return imports.len() == self.resolved_import_count;
|
2012-09-07 21:04:40 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
// Records a possibly-private type definition.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub struct TypeNsDef {
|
2013-02-04 16:02:01 -06:00
|
|
|
privacy: Privacy,
|
2013-02-21 13:08:50 -06:00
|
|
|
module_def: Option<@mut Module>,
|
2013-02-04 16:02:01 -06:00
|
|
|
type_def: Option<def>
|
2012-10-15 16:56:42 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Records a possibly-private value definition.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub struct ValueNsDef {
|
2012-09-07 16:50:47 -05:00
|
|
|
privacy: Privacy,
|
|
|
|
def: def,
|
2012-08-17 19:55:34 -05:00
|
|
|
}
|
|
|
|
|
2012-07-06 21:06:58 -05:00
|
|
|
// Records the definitions (at most one for each namespace) that a name is
|
|
|
|
// bound to.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub struct NameBindings {
|
2013-02-04 16:02:01 -06:00
|
|
|
type_def: Option<TypeNsDef>, //< Meaning in type namespace.
|
|
|
|
value_def: Option<ValueNsDef>, //< Meaning in value namespace.
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-06 18:10:56 -05:00
|
|
|
// For error reporting
|
2012-10-15 20:04:15 -05:00
|
|
|
// FIXME (#3783): Merge me into TypeNsDef and ValueNsDef.
|
2013-02-04 16:02:01 -06:00
|
|
|
type_span: Option<span>,
|
|
|
|
value_span: Option<span>,
|
2012-09-07 21:04:40 -05:00
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub impl NameBindings {
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Creates a new module in this set of name bindings.
|
2013-02-04 16:02:01 -06:00
|
|
|
fn define_module(@mut self,
|
|
|
|
privacy: Privacy,
|
2012-09-25 17:22:28 -05:00
|
|
|
parent_link: ParentLink,
|
2012-09-21 20:10:45 -05:00
|
|
|
def_id: Option<def_id>,
|
2012-12-23 16:41:37 -06:00
|
|
|
kind: ModuleKind,
|
2012-08-06 18:10:56 -05:00
|
|
|
sp: span) {
|
2012-10-15 20:04:15 -05:00
|
|
|
// Merges the module with the existing type def or creates a new one.
|
2013-02-21 13:08:50 -06:00
|
|
|
let module_ = @mut Module(parent_link, def_id, kind);
|
2012-10-15 20:04:15 -05:00
|
|
|
match self.type_def {
|
|
|
|
None => {
|
|
|
|
self.type_def = Some(TypeNsDef {
|
|
|
|
privacy: privacy,
|
|
|
|
module_def: Some(module_),
|
|
|
|
type_def: None
|
|
|
|
});
|
|
|
|
}
|
|
|
|
Some(copy type_def) => {
|
|
|
|
self.type_def = Some(TypeNsDef {
|
|
|
|
privacy: privacy,
|
|
|
|
module_def: Some(module_),
|
|
|
|
.. type_def
|
|
|
|
});
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-10-15 20:04:15 -05:00
|
|
|
self.type_span = Some(sp);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Records a type definition.
|
2013-02-04 16:02:01 -06:00
|
|
|
fn define_type(@mut self, privacy: Privacy, def: def, sp: span) {
|
2012-10-15 20:04:15 -05:00
|
|
|
// Merges the type with the existing type def or creates a new one.
|
|
|
|
match self.type_def {
|
|
|
|
None => {
|
|
|
|
self.type_def = Some(TypeNsDef {
|
|
|
|
privacy: privacy,
|
|
|
|
module_def: None,
|
|
|
|
type_def: Some(def)
|
|
|
|
});
|
|
|
|
}
|
|
|
|
Some(copy type_def) => {
|
|
|
|
self.type_def = Some(TypeNsDef {
|
|
|
|
privacy: privacy,
|
|
|
|
type_def: Some(def),
|
|
|
|
.. type_def
|
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
self.type_span = Some(sp);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Records a value definition.
|
2013-02-04 16:02:01 -06:00
|
|
|
fn define_value(@mut self, privacy: Privacy, def: def, sp: span) {
|
2012-10-15 16:56:42 -05:00
|
|
|
self.value_def = Some(ValueNsDef { privacy: privacy, def: def });
|
2012-08-20 14:23:37 -05:00
|
|
|
self.value_span = Some(sp);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Returns the module node if applicable.
|
2013-03-08 18:34:39 -06:00
|
|
|
fn get_module_if_available(&self) -> Option<@mut Module> {
|
2012-10-15 16:56:42 -05:00
|
|
|
match self.type_def {
|
2012-12-04 12:50:00 -06:00
|
|
|
Some(ref type_def) => (*type_def).module_def,
|
2012-10-15 20:04:15 -05:00
|
|
|
None => None
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/**
|
|
|
|
* Returns the module node. Fails if this node does not have a module
|
|
|
|
* definition.
|
|
|
|
*/
|
2013-02-21 13:08:50 -06:00
|
|
|
fn get_module(@mut self) -> @mut Module {
|
2012-10-15 20:04:15 -05:00
|
|
|
match self.get_module_if_available() {
|
|
|
|
None => {
|
2013-02-11 21:26:38 -06:00
|
|
|
fail!(~"get_module called on a node with no module \
|
2013-01-31 19:51:01 -06:00
|
|
|
definition!")
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-10-15 20:04:15 -05:00
|
|
|
Some(module_def) => module_def
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-08 18:34:39 -06:00
|
|
|
fn defined_in_namespace(&self, namespace: Namespace) -> bool {
|
2012-08-06 14:34:08 -05:00
|
|
|
match namespace {
|
2012-09-07 20:53:14 -05:00
|
|
|
TypeNS => return self.type_def.is_some(),
|
|
|
|
ValueNS => return self.value_def.is_some()
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-08 18:34:39 -06:00
|
|
|
fn defined_in_public_namespace(&self, namespace: Namespace) -> bool {
|
2013-02-25 23:34:45 -06:00
|
|
|
match namespace {
|
|
|
|
TypeNS => match self.type_def {
|
|
|
|
Some(def) => def.privacy != Private,
|
|
|
|
None => false
|
|
|
|
},
|
|
|
|
ValueNS => match self.value_def {
|
|
|
|
Some(def) => def.privacy != Private,
|
|
|
|
None => false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-08 18:34:39 -06:00
|
|
|
fn def_for_namespace(&self, namespace: Namespace) -> Option<def> {
|
2012-08-06 14:34:08 -05:00
|
|
|
match namespace {
|
2012-10-15 16:56:42 -05:00
|
|
|
TypeNS => {
|
|
|
|
match self.type_def {
|
|
|
|
None => None,
|
2012-12-04 12:50:00 -06:00
|
|
|
Some(ref type_def) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
// FIXME (#3784): This is reallllly questionable.
|
|
|
|
// Perhaps the right thing to do is to merge def_mod
|
|
|
|
// and def_ty.
|
2012-12-04 12:50:00 -06:00
|
|
|
match (*type_def).type_def {
|
2012-10-15 20:04:15 -05:00
|
|
|
Some(type_def) => Some(type_def),
|
|
|
|
None => {
|
2012-12-04 12:50:00 -06:00
|
|
|
match (*type_def).module_def {
|
2012-10-15 20:04:15 -05:00
|
|
|
Some(module_def) => {
|
2013-03-16 13:11:31 -05:00
|
|
|
let module_def = &mut *module_def;
|
2012-10-15 20:04:15 -05:00
|
|
|
module_def.def_id.map(|def_id|
|
|
|
|
def_mod(*def_id))
|
|
|
|
}
|
|
|
|
None => None
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-17 19:55:34 -05:00
|
|
|
}
|
|
|
|
}
|
2012-10-15 16:56:42 -05:00
|
|
|
}
|
|
|
|
ValueNS => {
|
|
|
|
match self.value_def {
|
|
|
|
None => None,
|
|
|
|
Some(value_def) => Some(value_def.def)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-08 18:34:39 -06:00
|
|
|
fn privacy_for_namespace(&self, namespace: Namespace) -> Option<Privacy> {
|
2012-10-15 16:56:42 -05:00
|
|
|
match namespace {
|
|
|
|
TypeNS => {
|
|
|
|
match self.type_def {
|
|
|
|
None => None,
|
2012-12-04 12:50:00 -06:00
|
|
|
Some(ref type_def) => Some((*type_def).privacy)
|
2012-10-15 16:56:42 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
ValueNS => {
|
|
|
|
match self.value_def {
|
|
|
|
None => None,
|
|
|
|
Some(value_def) => Some(value_def.privacy)
|
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2012-08-06 18:10:56 -05:00
|
|
|
|
2013-03-08 18:34:39 -06:00
|
|
|
fn span_for_namespace(&self, namespace: Namespace) -> Option<span> {
|
2012-10-15 16:56:42 -05:00
|
|
|
if self.defined_in_namespace(namespace) {
|
2012-08-06 18:10:56 -05:00
|
|
|
match namespace {
|
2012-10-15 16:56:42 -05:00
|
|
|
TypeNS => self.type_span,
|
|
|
|
ValueNS => self.value_span,
|
2012-08-06 18:10:56 -05:00
|
|
|
}
|
2012-10-15 16:56:42 -05:00
|
|
|
} else {
|
|
|
|
None
|
2012-08-06 18:10:56 -05:00
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub fn NameBindings() -> NameBindings {
|
2012-09-05 17:58:43 -05:00
|
|
|
NameBindings {
|
|
|
|
type_def: None,
|
|
|
|
value_def: None,
|
|
|
|
type_span: None,
|
|
|
|
value_span: None
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Interns the names of the primitive types.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub struct PrimitiveTypeTable {
|
2013-04-03 08:28:36 -05:00
|
|
|
primitive_types: HashMap<ident,prim_ty>,
|
2012-09-07 21:04:40 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub impl PrimitiveTypeTable {
|
2013-03-22 21:26:41 -05:00
|
|
|
fn intern(&mut self, intr: @ident_interner, string: @~str,
|
2012-07-12 01:42:26 -05:00
|
|
|
primitive_type: prim_ty) {
|
2012-09-19 20:52:49 -05:00
|
|
|
let ident = intr.intern(string);
|
|
|
|
self.primitive_types.insert(ident, primitive_type);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub fn PrimitiveTypeTable(intr: @ident_interner) -> PrimitiveTypeTable {
|
2013-03-22 21:26:41 -05:00
|
|
|
let mut table = PrimitiveTypeTable {
|
2013-04-03 08:28:36 -05:00
|
|
|
primitive_types: HashMap::new()
|
2012-09-05 17:58:43 -05:00
|
|
|
};
|
|
|
|
|
|
|
|
table.intern(intr, @~"bool", ty_bool);
|
|
|
|
table.intern(intr, @~"char", ty_int(ty_char));
|
|
|
|
table.intern(intr, @~"float", ty_float(ty_f));
|
|
|
|
table.intern(intr, @~"f32", ty_float(ty_f32));
|
|
|
|
table.intern(intr, @~"f64", ty_float(ty_f64));
|
|
|
|
table.intern(intr, @~"int", ty_int(ty_i));
|
|
|
|
table.intern(intr, @~"i8", ty_int(ty_i8));
|
|
|
|
table.intern(intr, @~"i16", ty_int(ty_i16));
|
|
|
|
table.intern(intr, @~"i32", ty_int(ty_i32));
|
|
|
|
table.intern(intr, @~"i64", ty_int(ty_i64));
|
|
|
|
table.intern(intr, @~"str", ty_str);
|
|
|
|
table.intern(intr, @~"uint", ty_uint(ty_u));
|
|
|
|
table.intern(intr, @~"u8", ty_uint(ty_u8));
|
|
|
|
table.intern(intr, @~"u16", ty_uint(ty_u16));
|
|
|
|
table.intern(intr, @~"u32", ty_uint(ty_u32));
|
|
|
|
table.intern(intr, @~"u64", ty_uint(ty_u64));
|
|
|
|
|
|
|
|
return table;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub fn namespace_to_str(ns: Namespace) -> ~str {
|
2012-08-06 18:10:56 -05:00
|
|
|
match ns {
|
2012-10-15 16:56:42 -05:00
|
|
|
TypeNS => ~"type",
|
|
|
|
ValueNS => ~"value",
|
2012-08-06 18:10:56 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub fn Resolver(session: Session,
|
|
|
|
lang_items: LanguageItems,
|
|
|
|
crate: @crate)
|
|
|
|
-> Resolver {
|
2013-02-04 16:02:01 -06:00
|
|
|
let graph_root = @mut NameBindings();
|
2012-09-05 17:58:43 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
graph_root.define_module(Public,
|
|
|
|
NoParentLink,
|
|
|
|
Some(def_id { crate: 0, node: 0 }),
|
|
|
|
NormalModuleKind,
|
|
|
|
crate.span);
|
2012-09-05 17:58:43 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
let current_module = graph_root.get_module();
|
2012-09-05 17:58:43 -05:00
|
|
|
|
|
|
|
let self = Resolver {
|
2013-02-21 13:08:50 -06:00
|
|
|
session: @session,
|
2012-09-05 17:58:43 -05:00
|
|
|
lang_items: copy lang_items,
|
|
|
|
crate: crate,
|
|
|
|
|
|
|
|
// The outermost module has def ID 0; this is not reflected in the
|
|
|
|
// AST.
|
|
|
|
|
|
|
|
graph_root: graph_root,
|
|
|
|
|
2013-04-03 08:28:36 -05:00
|
|
|
trait_info: HashMap::new(),
|
|
|
|
structs: HashSet::new(),
|
2012-09-05 17:58:43 -05:00
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
unresolved_imports: 0,
|
2012-09-05 17:58:43 -05:00
|
|
|
|
|
|
|
current_module: current_module,
|
2013-03-07 17:37:14 -06:00
|
|
|
value_ribs: ~[],
|
|
|
|
type_ribs: ~[],
|
|
|
|
label_ribs: ~[],
|
2012-09-05 17:58:43 -05:00
|
|
|
|
|
|
|
xray_context: NoXray,
|
|
|
|
current_trait_refs: None,
|
|
|
|
|
2012-12-23 16:41:37 -06:00
|
|
|
self_ident: special_idents::self_,
|
2013-01-09 16:12:28 -06:00
|
|
|
type_self_ident: special_idents::type_self,
|
|
|
|
|
2012-09-05 17:58:43 -05:00
|
|
|
primitive_type_table: @PrimitiveTypeTable(session.
|
|
|
|
parse_sess.interner),
|
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
namespaces: ~[ TypeNS, ValueNS ],
|
2012-09-05 17:58:43 -05:00
|
|
|
|
2013-01-11 03:08:01 -06:00
|
|
|
attr_main_fn: None,
|
|
|
|
main_fns: ~[],
|
|
|
|
|
2013-04-09 03:16:06 -05:00
|
|
|
start_fn: None,
|
|
|
|
|
2013-04-03 08:28:36 -05:00
|
|
|
def_map: @mut HashMap::new(),
|
|
|
|
export_map2: @mut HashMap::new(),
|
|
|
|
trait_map: HashMap::new(),
|
2012-09-05 17:58:43 -05:00
|
|
|
|
|
|
|
intr: session.intr()
|
|
|
|
};
|
|
|
|
|
2013-02-15 03:14:34 -06:00
|
|
|
self
|
2012-09-05 17:58:43 -05:00
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// The main resolver class.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub struct Resolver {
|
2013-02-21 13:08:50 -06:00
|
|
|
session: @Session,
|
2012-09-06 21:40:15 -05:00
|
|
|
lang_items: LanguageItems,
|
|
|
|
crate: @crate,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-09-19 20:50:24 -05:00
|
|
|
intr: @ident_interner,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
graph_root: @mut NameBindings,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-04-03 08:28:36 -05:00
|
|
|
trait_info: HashMap<def_id, HashSet<ident>>,
|
|
|
|
structs: HashSet<def_id>,
|
2012-07-11 17:00:40 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// The number of imports that are currently unresolved.
|
2013-02-21 13:08:50 -06:00
|
|
|
unresolved_imports: uint,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The module that represents the current item scope.
|
2013-02-21 13:08:50 -06:00
|
|
|
current_module: @mut Module,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The current set of local scopes, for values.
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4948: Reuse ribs to avoid allocation.
|
2013-03-07 17:37:14 -06:00
|
|
|
value_ribs: ~[@Rib],
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The current set of local scopes, for types.
|
2013-03-07 17:37:14 -06:00
|
|
|
type_ribs: ~[@Rib],
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-14 21:20:56 -05:00
|
|
|
// The current set of local scopes, for labels.
|
2013-03-07 17:37:14 -06:00
|
|
|
label_ribs: ~[@Rib],
|
2012-08-14 21:20:56 -05:00
|
|
|
|
2012-07-03 17:55:26 -05:00
|
|
|
// Whether the current context is an X-ray context. An X-ray context is
|
|
|
|
// allowed to access private names of any module.
|
2013-02-21 13:08:50 -06:00
|
|
|
xray_context: XrayFlag,
|
2012-07-03 17:55:26 -05:00
|
|
|
|
2012-07-11 17:00:40 -05:00
|
|
|
// The trait that the current context can refer to.
|
2013-03-07 17:37:14 -06:00
|
|
|
current_trait_refs: Option<~[def_id]>,
|
2012-07-11 17:00:40 -05:00
|
|
|
|
2012-09-19 20:52:49 -05:00
|
|
|
// The ident for the keyword "self".
|
|
|
|
self_ident: ident,
|
2013-01-09 16:12:28 -06:00
|
|
|
// The ident for the non-keyword "Self".
|
|
|
|
type_self_ident: ident,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-09-19 20:52:49 -05:00
|
|
|
// The idents for the primitive types.
|
2012-09-06 21:40:15 -05:00
|
|
|
primitive_type_table: @PrimitiveTypeTable,
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The four namespaces.
|
2012-09-06 21:40:15 -05:00
|
|
|
namespaces: ~[Namespace],
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-01-11 03:08:01 -06:00
|
|
|
// The function that has attribute named 'main'
|
2013-02-21 13:08:50 -06:00
|
|
|
attr_main_fn: Option<(node_id, span)>,
|
2013-04-09 03:16:06 -05:00
|
|
|
|
|
|
|
// The functions that could be main functions
|
2013-02-21 13:08:50 -06:00
|
|
|
main_fns: ~[Option<(node_id, span)>],
|
2013-01-11 03:08:01 -06:00
|
|
|
|
2013-04-09 03:16:06 -05:00
|
|
|
// The function that has the attribute 'start' on it
|
|
|
|
start_fn: Option<(node_id, span)>,
|
|
|
|
|
2013-03-22 21:26:41 -05:00
|
|
|
def_map: DefMap,
|
|
|
|
export_map2: ExportMap2,
|
2012-09-06 21:40:15 -05:00
|
|
|
trait_map: TraitMap,
|
2012-09-07 21:04:40 -05:00
|
|
|
}
|
|
|
|
|
2013-01-30 15:44:24 -06:00
|
|
|
pub impl Resolver {
|
2012-07-04 16:53:12 -05:00
|
|
|
/// The main name resolution procedure.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve(@mut self) {
|
|
|
|
self.build_reduced_graph();
|
2012-07-06 21:06:58 -05:00
|
|
|
self.session.abort_if_errors();
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
self.resolve_imports();
|
2012-07-06 21:06:58 -05:00
|
|
|
self.session.abort_if_errors();
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_exports();
|
2012-07-06 21:06:58 -05:00
|
|
|
self.session.abort_if_errors();
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
self.resolve_crate();
|
2012-07-06 21:06:58 -05:00
|
|
|
self.session.abort_if_errors();
|
|
|
|
|
2013-01-11 03:08:01 -06:00
|
|
|
self.check_duplicate_main();
|
2012-07-06 21:06:58 -05:00
|
|
|
self.check_for_unused_imports_if_necessary();
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Reduced graph building
|
|
|
|
//
|
|
|
|
// Here we build the "reduced graph": the graph of the module tree without
|
|
|
|
// any imports resolved.
|
|
|
|
//
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Constructs the reduced graph for the entire crate.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn build_reduced_graph(@mut self) {
|
2012-05-22 12:54:12 -05:00
|
|
|
let initial_parent =
|
2013-02-04 16:02:01 -06:00
|
|
|
ModuleReducedGraphParent(self.graph_root.get_module());
|
2013-04-17 11:15:37 -05:00
|
|
|
visit_crate(self.crate, initial_parent, mk_vt(@Visitor {
|
2012-05-22 12:54:12 -05:00
|
|
|
visit_item: |item, context, visitor|
|
2013-02-21 13:08:50 -06:00
|
|
|
self.build_reduced_graph_for_item(item, context, visitor),
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
visit_foreign_item: |foreign_item, context, visitor|
|
2013-02-21 13:08:50 -06:00
|
|
|
self.build_reduced_graph_for_foreign_item(foreign_item,
|
2012-05-22 12:54:12 -05:00
|
|
|
context,
|
|
|
|
visitor),
|
|
|
|
|
|
|
|
visit_view_item: |view_item, context, visitor|
|
2013-02-21 13:08:50 -06:00
|
|
|
self.build_reduced_graph_for_view_item(view_item,
|
2012-05-22 12:54:12 -05:00
|
|
|
context,
|
|
|
|
visitor),
|
|
|
|
|
|
|
|
visit_block: |block, context, visitor|
|
2013-02-21 13:08:50 -06:00
|
|
|
self.build_reduced_graph_for_block(block,
|
2012-05-22 12:54:12 -05:00
|
|
|
context,
|
2012-09-04 15:29:32 -05:00
|
|
|
visitor),
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-09-04 15:29:32 -05:00
|
|
|
.. *default_visitor()
|
2012-05-22 12:54:12 -05:00
|
|
|
}));
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Returns the current module tracked by the reduced graph parent.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn get_module_from_parent(@mut self,
|
|
|
|
reduced_graph_parent: ReducedGraphParent)
|
|
|
|
-> @mut Module {
|
2012-08-06 14:34:08 -05:00
|
|
|
match reduced_graph_parent {
|
2012-08-03 21:59:04 -05:00
|
|
|
ModuleReducedGraphParent(module_) => {
|
2012-08-01 19:30:05 -05:00
|
|
|
return module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/**
|
|
|
|
* Adds a new child item to the module definition of the parent node and
|
|
|
|
* returns its corresponding name bindings as well as the current parent.
|
|
|
|
* Or, if we're inside a block, creates (or reuses) an anonymous module
|
|
|
|
* corresponding to the innermost block ID and returns the name bindings
|
|
|
|
* as well as the newly-created parent.
|
|
|
|
*
|
|
|
|
* If this node does not have a module definition and we are not inside
|
|
|
|
* a block, fails.
|
|
|
|
*/
|
2013-02-21 13:08:50 -06:00
|
|
|
fn add_child(@mut self,
|
|
|
|
name: ident,
|
2012-08-06 18:10:56 -05:00
|
|
|
reduced_graph_parent: ReducedGraphParent,
|
2012-10-15 20:04:15 -05:00
|
|
|
duplicate_checking_mode: DuplicateCheckingMode,
|
2012-08-06 18:10:56 -05:00
|
|
|
// For printing errors
|
|
|
|
sp: span)
|
2013-02-04 16:02:01 -06:00
|
|
|
-> (@mut NameBindings, ReducedGraphParent) {
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// If this is the immediate descendant of a module, then we add the
|
|
|
|
// child name directly. Otherwise, we create or reuse an anonymous
|
|
|
|
// module and add the child to that.
|
|
|
|
|
2013-04-12 00:15:30 -05:00
|
|
|
let module_;
|
2012-08-06 14:34:08 -05:00
|
|
|
match reduced_graph_parent {
|
2012-08-03 21:59:04 -05:00
|
|
|
ModuleReducedGraphParent(parent_module) => {
|
2012-07-31 18:38:41 -05:00
|
|
|
module_ = parent_module;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add or reuse the child.
|
2012-07-31 18:38:41 -05:00
|
|
|
let new_parent = ModuleReducedGraphParent(module_);
|
2013-02-03 22:29:17 -06:00
|
|
|
match module_.children.find(&name) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-02-04 16:02:01 -06:00
|
|
|
let child = @mut NameBindings();
|
2012-10-15 20:04:15 -05:00
|
|
|
module_.children.insert(name, child);
|
|
|
|
return (child, new_parent);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-15 14:24:24 -05:00
|
|
|
Some(&child) => {
|
2013-03-26 21:53:33 -05:00
|
|
|
// Enforce the duplicate checking mode:
|
|
|
|
//
|
|
|
|
// * If we're requesting duplicate module checking, check that
|
|
|
|
// there isn't a module in the module with the same name.
|
|
|
|
//
|
|
|
|
// * If we're requesting duplicate type checking, check that
|
|
|
|
// there isn't a type in the module with the same name.
|
|
|
|
//
|
|
|
|
// * If we're requesting duplicate value checking, check that
|
|
|
|
// there isn't a value in the module with the same name.
|
|
|
|
//
|
|
|
|
// * If we're requesting duplicate type checking and duplicate
|
|
|
|
// value checking, check that there isn't a duplicate type
|
|
|
|
// and a duplicate value with the same name.
|
|
|
|
//
|
|
|
|
// * If no duplicate checking was requested at all, do
|
|
|
|
// nothing.
|
2012-10-15 20:04:15 -05:00
|
|
|
|
|
|
|
let mut is_duplicate = false;
|
|
|
|
match duplicate_checking_mode {
|
|
|
|
ForbidDuplicateModules => {
|
|
|
|
is_duplicate =
|
|
|
|
child.get_module_if_available().is_some();
|
|
|
|
}
|
|
|
|
ForbidDuplicateTypes => {
|
|
|
|
match child.def_for_namespace(TypeNS) {
|
|
|
|
Some(def_mod(_)) | None => {}
|
|
|
|
Some(_) => is_duplicate = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ForbidDuplicateValues => {
|
|
|
|
is_duplicate = child.defined_in_namespace(ValueNS);
|
|
|
|
}
|
|
|
|
ForbidDuplicateTypesAndValues => {
|
|
|
|
match child.def_for_namespace(TypeNS) {
|
|
|
|
Some(def_mod(_)) | None => {}
|
|
|
|
Some(_) => is_duplicate = true
|
|
|
|
};
|
|
|
|
if child.defined_in_namespace(ValueNS) {
|
|
|
|
is_duplicate = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
OverwriteDuplicates => {}
|
|
|
|
}
|
|
|
|
if duplicate_checking_mode != OverwriteDuplicates &&
|
|
|
|
is_duplicate {
|
|
|
|
// Return an error here by looking up the namespace that
|
|
|
|
// had the duplicate.
|
|
|
|
let ns = namespace_for_duplicate_checking_mode(
|
|
|
|
duplicate_checking_mode);
|
|
|
|
self.session.span_err(sp,
|
|
|
|
fmt!("duplicate definition of %s %s",
|
|
|
|
namespace_to_str(ns),
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(name)));
|
2013-03-03 06:33:39 -06:00
|
|
|
for child.span_for_namespace(ns).each |sp| {
|
2012-10-15 20:04:15 -05:00
|
|
|
self.session.span_note(*sp,
|
|
|
|
fmt!("first definition of %s %s here:",
|
|
|
|
namespace_to_str(ns),
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(name)));
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
2012-08-06 18:10:56 -05:00
|
|
|
}
|
2013-03-15 14:24:24 -05:00
|
|
|
return (child, new_parent);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-18 00:20:36 -06:00
|
|
|
fn block_needs_anonymous_module(@mut self, block: &blk) -> bool {
|
2012-05-22 12:54:12 -05:00
|
|
|
// If the block has view items, we need an anonymous module.
|
2012-11-29 14:08:40 -06:00
|
|
|
if block.node.view_items.len() > 0 {
|
2012-08-01 19:30:05 -05:00
|
|
|
return true;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check each statement.
|
|
|
|
for block.node.stmts.each |statement| {
|
2012-08-06 14:34:08 -05:00
|
|
|
match statement.node {
|
2012-08-03 21:59:04 -05:00
|
|
|
stmt_decl(declaration, _) => {
|
2012-08-06 14:34:08 -05:00
|
|
|
match declaration.node {
|
2012-08-03 21:59:04 -05:00
|
|
|
decl_item(_) => {
|
2012-08-01 19:30:05 -05:00
|
|
|
return true;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Keep searching.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Keep searching.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we found neither view items nor items, we don't need to create
|
|
|
|
// an anonymous module.
|
|
|
|
|
2012-08-01 19:30:05 -05:00
|
|
|
return false;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn get_parent_link(@mut self,
|
|
|
|
parent: ReducedGraphParent,
|
|
|
|
name: ident)
|
|
|
|
-> ParentLink {
|
2012-08-06 14:34:08 -05:00
|
|
|
match parent {
|
2012-08-03 21:59:04 -05:00
|
|
|
ModuleReducedGraphParent(module_) => {
|
2012-08-01 19:30:05 -05:00
|
|
|
return ModuleParentLink(module_, name);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Constructs the reduced graph for one item.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn build_reduced_graph_for_item(@mut self,
|
|
|
|
item: @item,
|
2012-05-22 12:54:12 -05:00
|
|
|
parent: ReducedGraphParent,
|
2013-04-17 11:15:37 -05:00
|
|
|
visitor: vt<ReducedGraphParent>) {
|
2012-09-19 20:52:49 -05:00
|
|
|
let ident = item.ident;
|
2012-08-06 18:10:56 -05:00
|
|
|
let sp = item.span;
|
2013-01-30 19:20:02 -06:00
|
|
|
let privacy = visibility_to_privacy(item.vis);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-03-20 00:17:42 -05:00
|
|
|
match item.node {
|
2013-02-18 23:25:44 -06:00
|
|
|
item_mod(ref module_) => {
|
2012-10-15 16:56:42 -05:00
|
|
|
let (name_bindings, new_parent) =
|
2012-10-15 20:04:15 -05:00
|
|
|
self.add_child(ident, parent, ForbidDuplicateModules, sp);
|
2012-08-06 18:10:56 -05:00
|
|
|
|
2012-09-19 20:52:49 -05:00
|
|
|
let parent_link = self.get_parent_link(new_parent, ident);
|
2013-01-13 13:05:40 -06:00
|
|
|
let def_id = def_id { crate: 0, node: item.id };
|
2013-02-04 16:02:01 -06:00
|
|
|
name_bindings.define_module(privacy,
|
|
|
|
parent_link,
|
|
|
|
Some(def_id),
|
|
|
|
NormalModuleKind,
|
|
|
|
sp);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
let new_parent =
|
2013-02-04 16:02:01 -06:00
|
|
|
ModuleReducedGraphParent(name_bindings.get_module());
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-06 18:10:56 -05:00
|
|
|
visit_mod(module_, sp, item.id, new_parent, visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-10-15 20:04:15 -05:00
|
|
|
|
2013-03-20 00:17:42 -05:00
|
|
|
item_foreign_mod(ref fm) => {
|
2012-10-15 16:56:42 -05:00
|
|
|
let new_parent = match fm.sort {
|
|
|
|
named => {
|
|
|
|
let (name_bindings, new_parent) =
|
2012-10-15 20:04:15 -05:00
|
|
|
self.add_child(ident, parent,
|
|
|
|
ForbidDuplicateModules, sp);
|
2012-08-29 14:22:05 -05:00
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
let parent_link = self.get_parent_link(new_parent,
|
|
|
|
ident);
|
2013-01-13 13:05:40 -06:00
|
|
|
let def_id = def_id { crate: 0, node: item.id };
|
2013-02-04 16:02:01 -06:00
|
|
|
name_bindings.define_module(privacy,
|
|
|
|
parent_link,
|
|
|
|
Some(def_id),
|
|
|
|
ExternModuleKind,
|
|
|
|
sp);
|
2012-10-15 16:56:42 -05:00
|
|
|
|
|
|
|
ModuleReducedGraphParent(name_bindings.get_module())
|
|
|
|
}
|
2012-08-29 14:22:05 -05:00
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
// For anon foreign mods, the contents just go in the
|
|
|
|
// current scope
|
|
|
|
anonymous => parent
|
|
|
|
};
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
visit_item(item, new_parent, visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// These items live in the value namespace.
|
2012-08-03 21:59:04 -05:00
|
|
|
item_const(*) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
let (name_bindings, _) =
|
|
|
|
self.add_child(ident, parent, ForbidDuplicateValues, sp);
|
2012-08-06 18:10:56 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
name_bindings.define_value
|
2012-09-25 17:22:28 -05:00
|
|
|
(privacy, def_const(local_def(item.id)), sp);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-13 21:25:28 -05:00
|
|
|
item_fn(_, purity, _, _, _) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
let (name_bindings, new_parent) =
|
|
|
|
self.add_child(ident, parent, ForbidDuplicateValues, sp);
|
2012-08-06 18:10:56 -05:00
|
|
|
|
2012-08-23 20:17:16 -05:00
|
|
|
let def = def_fn(local_def(item.id), purity);
|
2013-02-04 16:02:01 -06:00
|
|
|
name_bindings.define_value(privacy, def, sp);
|
2012-05-22 12:54:12 -05:00
|
|
|
visit_item(item, new_parent, visitor);
|
|
|
|
}
|
|
|
|
|
|
|
|
// These items live in the type namespace.
|
2012-08-03 21:59:04 -05:00
|
|
|
item_ty(*) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
let (name_bindings, _) =
|
|
|
|
self.add_child(ident, parent, ForbidDuplicateTypes, sp);
|
2012-08-06 18:10:56 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
name_bindings.define_type
|
2012-09-25 17:22:28 -05:00
|
|
|
(privacy, def_ty(local_def(item.id)), sp);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-12-04 12:50:00 -06:00
|
|
|
item_enum(ref enum_definition, _) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
let (name_bindings, new_parent) =
|
|
|
|
self.add_child(ident, parent, ForbidDuplicateTypes, sp);
|
2012-08-06 18:10:56 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
name_bindings.define_type
|
2012-09-25 17:22:28 -05:00
|
|
|
(privacy, def_ty(local_def(item.id)), sp);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-12-04 12:50:00 -06:00
|
|
|
for (*enum_definition).variants.each |variant| {
|
2013-04-17 11:15:37 -05:00
|
|
|
self.build_reduced_graph_for_variant(variant,
|
2012-11-29 14:08:40 -06:00
|
|
|
local_def(item.id),
|
|
|
|
// inherited => privacy of the enum item
|
2013-01-30 19:20:02 -06:00
|
|
|
variant_visibility_to_privacy(variant.node.vis,
|
|
|
|
privacy == Public),
|
|
|
|
new_parent,
|
|
|
|
visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2012-08-13 17:17:35 -05:00
|
|
|
|
|
|
|
// These items live in both the type and value namespaces.
|
2012-12-10 15:47:54 -06:00
|
|
|
item_struct(struct_def, _) => {
|
2012-10-08 13:49:01 -05:00
|
|
|
let (name_bindings, new_parent) =
|
2012-10-15 20:04:15 -05:00
|
|
|
self.add_child(ident, parent, ForbidDuplicateTypes, sp);
|
2012-08-08 13:52:23 -05:00
|
|
|
|
2012-10-23 21:18:18 -05:00
|
|
|
name_bindings.define_type(
|
|
|
|
privacy, def_ty(local_def(item.id)), sp);
|
|
|
|
|
|
|
|
// If this struct is tuple-like or enum-like, define a name
|
|
|
|
// in the value namespace.
|
2012-10-24 16:36:00 -05:00
|
|
|
match struct_def.ctor_id {
|
|
|
|
None => {}
|
|
|
|
Some(ctor_id) => {
|
|
|
|
name_bindings.define_value(
|
|
|
|
privacy,
|
2012-12-10 15:47:54 -06:00
|
|
|
def_struct(local_def(ctor_id)),
|
2012-10-24 16:36:00 -05:00
|
|
|
sp);
|
|
|
|
}
|
2012-10-23 21:18:18 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-23 20:44:59 -05:00
|
|
|
// Record the def ID of this struct.
|
2013-03-22 21:26:41 -05:00
|
|
|
self.structs.insert(local_def(item.id));
|
2012-07-23 20:44:59 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
visit_item(item, new_parent, visitor);
|
|
|
|
}
|
|
|
|
|
2013-03-20 00:17:42 -05:00
|
|
|
item_impl(_, trait_ref_opt, ty, ref methods) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
// If this implements an anonymous trait and it has static
|
|
|
|
// methods, then add all the static methods within to a new
|
|
|
|
// module, if the type was defined within this module.
|
|
|
|
//
|
|
|
|
// FIXME (#3785): This is quite unsatisfactory. Perhaps we
|
|
|
|
// should modify anonymous traits to only be implementable in
|
|
|
|
// the same module that declared the type.
|
|
|
|
|
|
|
|
// Bail out early if there are no static methods.
|
|
|
|
let mut has_static_methods = false;
|
2012-11-13 21:08:01 -06:00
|
|
|
for methods.each |method| {
|
|
|
|
match method.self_ty.node {
|
|
|
|
sty_static => has_static_methods = true,
|
|
|
|
_ => {}
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If there are static methods, then create the module
|
|
|
|
// and add them.
|
|
|
|
match (trait_ref_opt, ty) {
|
2013-01-15 16:59:39 -06:00
|
|
|
(None, @Ty { node: ty_path(path, _), _ }) if
|
2012-10-15 20:04:15 -05:00
|
|
|
has_static_methods && path.idents.len() == 1 => {
|
|
|
|
// Create the module.
|
|
|
|
let name = path_to_ident(path);
|
|
|
|
let (name_bindings, new_parent) =
|
|
|
|
self.add_child(name,
|
|
|
|
parent,
|
|
|
|
ForbidDuplicateModules,
|
|
|
|
sp);
|
|
|
|
|
|
|
|
let parent_link = self.get_parent_link(new_parent,
|
|
|
|
ident);
|
|
|
|
let def_id = local_def(item.id);
|
2013-01-31 14:40:05 -06:00
|
|
|
name_bindings.define_module(Public,
|
2012-12-23 16:41:37 -06:00
|
|
|
parent_link,
|
|
|
|
Some(def_id),
|
|
|
|
TraitModuleKind,
|
|
|
|
sp);
|
2012-10-15 20:04:15 -05:00
|
|
|
|
|
|
|
let new_parent = ModuleReducedGraphParent(
|
|
|
|
name_bindings.get_module());
|
|
|
|
|
|
|
|
// For each static method...
|
2012-11-13 21:08:01 -06:00
|
|
|
for methods.each |method| {
|
|
|
|
match method.self_ty.node {
|
|
|
|
sty_static => {
|
|
|
|
// Add the static method to the
|
|
|
|
// module.
|
|
|
|
let ident = method.ident;
|
|
|
|
let (method_name_bindings, _) =
|
|
|
|
self.add_child(
|
|
|
|
ident,
|
|
|
|
new_parent,
|
|
|
|
ForbidDuplicateValues,
|
|
|
|
method.span);
|
|
|
|
let def = def_fn(local_def(method.id),
|
|
|
|
method.purity);
|
|
|
|
method_name_bindings.define_value(
|
|
|
|
Public, def, method.span);
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
2012-11-13 21:08:01 -06:00
|
|
|
_ => {}
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
}
|
|
|
|
|
2012-08-17 19:09:53 -05:00
|
|
|
visit_item(item, parent, visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-12-04 12:50:00 -06:00
|
|
|
item_trait(_, _, ref methods) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
let (name_bindings, new_parent) =
|
|
|
|
self.add_child(ident, parent, ForbidDuplicateTypes, sp);
|
2012-08-06 18:10:56 -05:00
|
|
|
|
2012-11-12 14:15:08 -06:00
|
|
|
// If the trait has static methods, then add all the static
|
|
|
|
// methods within to a new module.
|
|
|
|
//
|
|
|
|
// We only need to create the module if the trait has static
|
|
|
|
// methods, so check that first.
|
|
|
|
let mut has_static_methods = false;
|
2012-12-04 12:50:00 -06:00
|
|
|
for (*methods).each |method| {
|
2013-02-18 00:20:36 -06:00
|
|
|
let ty_m = trait_method_to_ty_method(method);
|
2012-11-12 14:15:08 -06:00
|
|
|
match ty_m.self_ty.node {
|
|
|
|
sty_static => {
|
|
|
|
has_static_methods = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the module if necessary.
|
|
|
|
let module_parent_opt;
|
|
|
|
if has_static_methods {
|
|
|
|
let parent_link = self.get_parent_link(parent, ident);
|
|
|
|
name_bindings.define_module(privacy,
|
|
|
|
parent_link,
|
|
|
|
Some(local_def(item.id)),
|
2012-12-23 16:41:37 -06:00
|
|
|
TraitModuleKind,
|
2012-11-12 14:15:08 -06:00
|
|
|
sp);
|
|
|
|
module_parent_opt = Some(ModuleReducedGraphParent(
|
|
|
|
name_bindings.get_module()));
|
|
|
|
} else {
|
|
|
|
module_parent_opt = None;
|
|
|
|
}
|
|
|
|
|
2012-07-11 17:00:40 -05:00
|
|
|
// Add the names of all the methods to the trait info.
|
2013-04-03 08:28:36 -05:00
|
|
|
let mut method_names = HashSet::new();
|
2013-03-22 21:26:41 -05:00
|
|
|
for methods.each |method| {
|
2013-02-18 00:20:36 -06:00
|
|
|
let ty_m = trait_method_to_ty_method(method);
|
2012-08-02 18:01:38 -05:00
|
|
|
|
2012-09-19 20:52:49 -05:00
|
|
|
let ident = ty_m.ident;
|
2012-08-02 18:01:38 -05:00
|
|
|
// Add it to the trait info if not static,
|
2012-11-12 14:15:08 -06:00
|
|
|
// add it as a name in the trait module otherwise.
|
2012-08-02 18:01:38 -05:00
|
|
|
match ty_m.self_ty.node {
|
2012-11-12 14:15:08 -06:00
|
|
|
sty_static => {
|
|
|
|
let def = def_static_method(
|
|
|
|
local_def(ty_m.id),
|
|
|
|
Some(local_def(item.id)),
|
|
|
|
ty_m.purity);
|
|
|
|
|
|
|
|
let (method_name_bindings, _) =
|
|
|
|
self.add_child(ident,
|
|
|
|
module_parent_opt.get(),
|
|
|
|
ForbidDuplicateValues,
|
|
|
|
ty_m.span);
|
|
|
|
method_name_bindings.define_value(Public,
|
|
|
|
def,
|
|
|
|
ty_m.span);
|
|
|
|
}
|
|
|
|
_ => {
|
2013-03-22 21:26:41 -05:00
|
|
|
method_names.insert(ident);
|
2012-11-12 14:15:08 -06:00
|
|
|
}
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let def_id = local_def(item.id);
|
|
|
|
self.trait_info.insert(def_id, method_names);
|
|
|
|
|
2013-03-27 09:26:57 -05:00
|
|
|
name_bindings.define_type(privacy, def_trait(def_id), sp);
|
2012-05-22 12:54:12 -05:00
|
|
|
visit_item(item, new_parent, visitor);
|
|
|
|
}
|
2012-07-05 14:10:33 -05:00
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
item_mac(*) => {
|
2013-02-11 21:26:38 -06:00
|
|
|
fail!(~"item macros unimplemented")
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-07 21:12:58 -05:00
|
|
|
// Constructs the reduced graph for one variant. Variants exist in the
|
|
|
|
// type and/or value namespaces.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn build_reduced_graph_for_variant(@mut self,
|
2013-04-17 11:15:37 -05:00
|
|
|
variant: &variant,
|
2012-05-22 12:54:12 -05:00
|
|
|
item_id: def_id,
|
2013-04-17 11:15:37 -05:00
|
|
|
parent_privacy: Privacy,
|
2012-05-22 12:54:12 -05:00
|
|
|
parent: ReducedGraphParent,
|
2013-04-17 11:15:37 -05:00
|
|
|
_visitor: vt<ReducedGraphParent>) {
|
2012-09-19 20:52:49 -05:00
|
|
|
let ident = variant.node.name;
|
2012-10-15 20:04:15 -05:00
|
|
|
let (child, _) = self.add_child(ident, parent, ForbidDuplicateValues,
|
2012-08-06 18:10:56 -05:00
|
|
|
variant.span);
|
2012-09-27 19:42:25 -05:00
|
|
|
|
|
|
|
let privacy;
|
|
|
|
match variant.node.vis {
|
|
|
|
public => privacy = Public,
|
|
|
|
private => privacy = Private,
|
|
|
|
inherited => privacy = parent_privacy
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-07 21:12:58 -05:00
|
|
|
match variant.node.kind {
|
|
|
|
tuple_variant_kind(_) => {
|
2013-02-04 16:02:01 -06:00
|
|
|
child.define_value(privacy,
|
|
|
|
def_variant(item_id,
|
|
|
|
local_def(variant.node.id)),
|
|
|
|
variant.span);
|
2012-08-07 21:12:58 -05:00
|
|
|
}
|
|
|
|
struct_variant_kind(_) => {
|
2013-02-04 16:02:01 -06:00
|
|
|
child.define_type(privacy,
|
|
|
|
def_variant(item_id,
|
|
|
|
local_def(variant.node.id)),
|
|
|
|
variant.span);
|
2013-03-22 21:26:41 -05:00
|
|
|
self.structs.insert(local_def(variant.node.id));
|
2012-08-07 21:12:58 -05:00
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/**
|
|
|
|
* Constructs the reduced graph for one 'view item'. View items consist
|
|
|
|
* of imports and use directives.
|
|
|
|
*/
|
2013-02-21 13:08:50 -06:00
|
|
|
fn build_reduced_graph_for_view_item(@mut self,
|
|
|
|
view_item: @view_item,
|
2012-05-22 12:54:12 -05:00
|
|
|
parent: ReducedGraphParent,
|
2013-04-17 11:15:37 -05:00
|
|
|
_visitor: vt<ReducedGraphParent>) {
|
2013-01-30 19:20:02 -06:00
|
|
|
let privacy = visibility_to_privacy(view_item.vis);
|
2013-03-20 00:17:42 -05:00
|
|
|
match view_item.node {
|
|
|
|
view_item_use(ref view_paths) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
for view_paths.each |view_path| {
|
|
|
|
// Extract and intern the module part of the path. For
|
|
|
|
// globs and lists, the path is found directly in the AST;
|
|
|
|
// for simple paths we have to munge the path a little.
|
|
|
|
|
2013-03-07 17:37:14 -06:00
|
|
|
let mut module_path = ~[];
|
2012-08-06 14:34:08 -05:00
|
|
|
match view_path.node {
|
2013-04-22 14:32:59 -05:00
|
|
|
view_path_simple(_, full_path, _) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
let path_len = full_path.idents.len();
|
2013-03-28 20:39:09 -05:00
|
|
|
assert!(path_len != 0);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
for full_path.idents.eachi |i, ident| {
|
2012-11-29 14:08:40 -06:00
|
|
|
if i != path_len - 1 {
|
2013-03-07 17:37:14 -06:00
|
|
|
module_path.push(*ident);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
view_path_glob(module_ident_path, _) |
|
2012-08-03 21:59:04 -05:00
|
|
|
view_path_list(module_ident_path, _, _) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
for module_ident_path.idents.each |ident| {
|
2013-03-07 17:37:14 -06:00
|
|
|
module_path.push(*ident);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build up the import directives.
|
2012-07-31 18:38:41 -05:00
|
|
|
let module_ = self.get_module_from_parent(parent);
|
2012-08-06 14:34:08 -05:00
|
|
|
match view_path.node {
|
2013-04-22 14:32:59 -05:00
|
|
|
view_path_simple(binding, full_path, _) => {
|
2013-03-05 21:39:18 -06:00
|
|
|
let source_ident = *full_path.idents.last();
|
2012-07-18 18:18:02 -05:00
|
|
|
let subclass = @SingleImport(binding,
|
2013-03-26 21:53:33 -05:00
|
|
|
source_ident);
|
2012-09-25 17:22:28 -05:00
|
|
|
self.build_import_directive(privacy,
|
|
|
|
module_,
|
2012-05-22 12:54:12 -05:00
|
|
|
module_path,
|
2012-07-06 21:06:58 -05:00
|
|
|
subclass,
|
2013-03-26 15:08:59 -05:00
|
|
|
view_path.span);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-12-04 12:50:00 -06:00
|
|
|
view_path_list(_, ref source_idents, _) => {
|
2013-03-26 15:08:59 -05:00
|
|
|
for source_idents.each |source_ident| {
|
2012-05-22 12:54:12 -05:00
|
|
|
let name = source_ident.node.name;
|
2013-03-26 21:53:33 -05:00
|
|
|
let subclass = @SingleImport(name, name);
|
2012-09-25 17:22:28 -05:00
|
|
|
self.build_import_directive(privacy,
|
|
|
|
module_,
|
2013-03-07 17:37:14 -06:00
|
|
|
copy module_path,
|
2012-07-06 21:06:58 -05:00
|
|
|
subclass,
|
2013-03-26 15:08:59 -05:00
|
|
|
source_ident.span);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
view_path_glob(_, _) => {
|
2012-09-25 17:22:28 -05:00
|
|
|
self.build_import_directive(privacy,
|
|
|
|
module_,
|
2012-05-22 12:54:12 -05:00
|
|
|
module_path,
|
2012-07-06 21:06:58 -05:00
|
|
|
@GlobImport,
|
2013-03-26 15:08:59 -05:00
|
|
|
view_path.span);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-17 20:45:00 -06:00
|
|
|
view_item_extern_mod(name, _, node_id) => {
|
2013-02-17 20:53:29 -06:00
|
|
|
match find_extern_mod_stmt_cnum(self.session.cstore,
|
|
|
|
node_id) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(crate_id) => {
|
2013-01-13 13:05:40 -06:00
|
|
|
let def_id = def_id { crate: crate_id, node: 0 };
|
2012-05-22 12:54:12 -05:00
|
|
|
let parent_link = ModuleParentLink
|
2013-03-26 21:53:33 -05:00
|
|
|
(self.get_module_from_parent(parent), name);
|
|
|
|
let external_module = @mut Module(parent_link,
|
2013-01-30 19:20:02 -06:00
|
|
|
Some(def_id),
|
2013-03-26 21:53:33 -05:00
|
|
|
NormalModuleKind);
|
|
|
|
|
|
|
|
parent.external_module_children.insert(
|
|
|
|
name,
|
|
|
|
external_module);
|
|
|
|
|
|
|
|
self.build_reduced_graph_for_external_crate(
|
|
|
|
external_module);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-26 21:53:33 -05:00
|
|
|
None => {} // Ignore.
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Constructs the reduced graph for one foreign item.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn build_reduced_graph_for_foreign_item(@mut self,
|
|
|
|
foreign_item: @foreign_item,
|
2012-05-22 12:54:12 -05:00
|
|
|
parent: ReducedGraphParent,
|
2013-04-17 11:15:37 -05:00
|
|
|
visitor:
|
2012-05-22 12:54:12 -05:00
|
|
|
vt<ReducedGraphParent>) {
|
2012-07-18 18:18:02 -05:00
|
|
|
let name = foreign_item.ident;
|
2012-08-25 17:09:33 -05:00
|
|
|
let (name_bindings, new_parent) =
|
2012-10-15 20:04:15 -05:00
|
|
|
self.add_child(name, parent, ForbidDuplicateValues,
|
|
|
|
foreign_item.span);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-14 23:50:03 -06:00
|
|
|
match foreign_item.node {
|
|
|
|
foreign_item_fn(_, _, ref generics) => {
|
2013-01-23 18:29:31 -06:00
|
|
|
let def = def_fn(local_def(foreign_item.id), unsafe_fn);
|
2013-02-04 16:02:01 -06:00
|
|
|
name_bindings.define_value(Public, def, foreign_item.span);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-14 23:50:03 -06:00
|
|
|
do self.with_type_parameter_rib(
|
|
|
|
HasTypeParameters(
|
|
|
|
generics, foreign_item.id, 0, NormalRibKind))
|
|
|
|
{
|
2012-05-22 12:54:12 -05:00
|
|
|
visit_foreign_item(foreign_item, new_parent, visitor);
|
|
|
|
}
|
|
|
|
}
|
2012-08-26 14:12:05 -05:00
|
|
|
foreign_item_const(*) => {
|
2012-08-25 17:09:33 -05:00
|
|
|
let def = def_const(local_def(foreign_item.id));
|
2013-02-04 16:02:01 -06:00
|
|
|
name_bindings.define_value(Public, def, foreign_item.span);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-25 17:09:33 -05:00
|
|
|
visit_foreign_item(foreign_item, new_parent, visitor);
|
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn build_reduced_graph_for_block(@mut self,
|
2013-02-18 00:20:36 -06:00
|
|
|
block: &blk,
|
2012-05-22 12:54:12 -05:00
|
|
|
parent: ReducedGraphParent,
|
2013-04-17 11:15:37 -05:00
|
|
|
visitor: vt<ReducedGraphParent>) {
|
2013-04-12 00:15:30 -05:00
|
|
|
let new_parent;
|
2012-05-22 12:54:12 -05:00
|
|
|
if self.block_needs_anonymous_module(block) {
|
|
|
|
let block_id = block.node.id;
|
|
|
|
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(building reduced graph for block) creating a new \
|
2012-05-22 12:54:12 -05:00
|
|
|
anonymous module for block %d",
|
2012-08-22 19:24:52 -05:00
|
|
|
block_id);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
let parent_module = self.get_module_from_parent(parent);
|
2013-02-21 13:08:50 -06:00
|
|
|
let new_module = @mut Module(
|
|
|
|
BlockParentLink(parent_module, block_id),
|
|
|
|
None,
|
|
|
|
AnonymousModuleKind);
|
2012-05-22 12:54:12 -05:00
|
|
|
parent_module.anonymous_children.insert(block_id, new_module);
|
|
|
|
new_parent = ModuleReducedGraphParent(new_module);
|
|
|
|
} else {
|
|
|
|
new_parent = parent;
|
|
|
|
}
|
|
|
|
|
|
|
|
visit_block(block, new_parent, visitor);
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn handle_external_def(@mut self,
|
|
|
|
def: def,
|
2013-04-03 08:28:36 -05:00
|
|
|
modules: &mut HashMap<def_id, @mut Module>,
|
2013-02-04 16:02:01 -06:00
|
|
|
child_name_bindings: @mut NameBindings,
|
2013-02-10 18:33:16 -06:00
|
|
|
final_ident: &str,
|
2013-02-04 16:02:01 -06:00
|
|
|
ident: ident,
|
|
|
|
new_parent: ReducedGraphParent) {
|
2012-08-02 18:01:38 -05:00
|
|
|
match def {
|
|
|
|
def_mod(def_id) | def_foreign_mod(def_id) => {
|
2013-03-20 00:17:42 -05:00
|
|
|
match child_name_bindings.type_def {
|
2012-10-15 20:04:15 -05:00
|
|
|
Some(TypeNsDef { module_def: Some(copy module_def), _ }) => {
|
|
|
|
debug!("(building reduced graph for external crate) \
|
|
|
|
already created module");
|
|
|
|
module_def.def_id = Some(def_id);
|
|
|
|
modules.insert(def_id, module_def);
|
|
|
|
}
|
|
|
|
Some(_) | None => {
|
2012-08-02 18:01:38 -05:00
|
|
|
debug!("(building reduced graph for \
|
|
|
|
external crate) building module \
|
|
|
|
%s", final_ident);
|
2012-09-19 20:52:49 -05:00
|
|
|
let parent_link = self.get_parent_link(new_parent, ident);
|
2012-08-02 18:01:38 -05:00
|
|
|
|
2013-03-22 21:26:41 -05:00
|
|
|
// FIXME (#5074): this should be a match on find
|
|
|
|
if !modules.contains_key(&def_id) {
|
2012-09-25 17:22:28 -05:00
|
|
|
child_name_bindings.define_module(Public,
|
|
|
|
parent_link,
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def_id),
|
2012-12-23 16:41:37 -06:00
|
|
|
NormalModuleKind,
|
2012-08-02 18:01:38 -05:00
|
|
|
dummy_sp());
|
|
|
|
modules.insert(def_id,
|
|
|
|
child_name_bindings.get_module());
|
2013-03-22 21:26:41 -05:00
|
|
|
} else {
|
|
|
|
let existing_module = *modules.get(&def_id);
|
2012-08-02 18:01:38 -05:00
|
|
|
// Create an import resolution to
|
|
|
|
// avoid creating cycles in the
|
|
|
|
// module graph.
|
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
let resolution =
|
|
|
|
@mut ImportResolution(Public,
|
|
|
|
dummy_sp(),
|
|
|
|
@mut ImportState());
|
2012-08-02 18:01:38 -05:00
|
|
|
resolution.outstanding_references = 0;
|
|
|
|
|
|
|
|
match existing_module.parent_link {
|
|
|
|
NoParentLink |
|
|
|
|
BlockParentLink(*) => {
|
2013-02-11 21:26:38 -06:00
|
|
|
fail!(~"can't happen");
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
2012-09-19 20:52:49 -05:00
|
|
|
ModuleParentLink(parent_module, ident) => {
|
2013-02-03 22:29:17 -06:00
|
|
|
let name_bindings = parent_module.children.get(
|
|
|
|
&ident);
|
2012-10-15 16:56:42 -05:00
|
|
|
resolution.type_target =
|
2013-03-21 02:26:38 -05:00
|
|
|
Some(Target(parent_module, *name_bindings));
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
debug!("(building reduced graph for external crate) \
|
|
|
|
... creating import resolution");
|
|
|
|
|
2012-09-19 20:52:49 -05:00
|
|
|
new_parent.import_resolutions.insert(ident, resolution);
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-26 14:12:05 -05:00
|
|
|
def_fn(*) | def_static_method(*) | def_const(*) |
|
|
|
|
def_variant(*) => {
|
2012-08-02 18:01:38 -05:00
|
|
|
debug!("(building reduced graph for external \
|
|
|
|
crate) building value %s", final_ident);
|
2013-02-04 16:02:01 -06:00
|
|
|
child_name_bindings.define_value(Public, def, dummy_sp());
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
2013-03-27 09:26:57 -05:00
|
|
|
def_trait(def_id) => {
|
|
|
|
debug!("(building reduced graph for external \
|
|
|
|
crate) building type %s", final_ident);
|
|
|
|
|
|
|
|
// If this is a trait, add all the method names
|
|
|
|
// to the trait info.
|
|
|
|
|
|
|
|
let method_def_ids = get_trait_method_def_ids(self.session.cstore,
|
|
|
|
def_id);
|
|
|
|
let mut interned_method_names = HashSet::new();
|
|
|
|
for method_def_ids.each |&method_def_id| {
|
|
|
|
let (method_name, self_ty) =
|
|
|
|
get_method_name_and_self_ty(self.session.cstore,
|
|
|
|
method_def_id);
|
|
|
|
|
|
|
|
debug!("(building reduced graph for \
|
|
|
|
external crate) ... adding \
|
|
|
|
trait method '%s'",
|
|
|
|
*self.session.str_of(method_name));
|
|
|
|
|
|
|
|
// Add it to the trait info if not static.
|
|
|
|
if self_ty != sty_static {
|
|
|
|
interned_method_names.insert(method_name);
|
|
|
|
}
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
2013-03-27 09:26:57 -05:00
|
|
|
self.trait_info.insert(def_id, interned_method_names);
|
2012-08-02 18:01:38 -05:00
|
|
|
|
2013-03-27 09:26:57 -05:00
|
|
|
child_name_bindings.define_type(Public, def, dummy_sp());
|
|
|
|
}
|
|
|
|
def_ty(_) => {
|
|
|
|
debug!("(building reduced graph for external \
|
|
|
|
crate) building type %s", final_ident);
|
|
|
|
|
|
|
|
child_name_bindings.define_type(Public, def, dummy_sp());
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
2012-12-10 15:47:54 -06:00
|
|
|
def_struct(def_id) => {
|
2012-08-02 18:01:38 -05:00
|
|
|
debug!("(building reduced graph for external \
|
2012-10-08 13:49:01 -05:00
|
|
|
crate) building type %s",
|
|
|
|
final_ident);
|
2012-08-17 19:55:34 -05:00
|
|
|
child_name_bindings.define_type(Public, def, dummy_sp());
|
2013-03-22 21:26:41 -05:00
|
|
|
self.structs.insert(def_id);
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
|
|
|
def_self(*) | def_arg(*) | def_local(*) |
|
|
|
|
def_prim_ty(*) | def_ty_param(*) | def_binding(*) |
|
|
|
|
def_use(*) | def_upvar(*) | def_region(*) |
|
2012-12-10 13:58:37 -06:00
|
|
|
def_typaram_binder(*) | def_label(*) | def_self_ty(*) => {
|
2013-02-11 21:26:38 -06:00
|
|
|
fail!(fmt!("didn't expect `%?`", def));
|
2012-08-02 18:01:38 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/**
|
|
|
|
* Builds the reduced graph rooted at the 'use' directive for an external
|
|
|
|
* crate.
|
|
|
|
*/
|
2013-02-21 13:08:50 -06:00
|
|
|
fn build_reduced_graph_for_external_crate(@mut self, root: @mut Module) {
|
2013-04-03 08:28:36 -05:00
|
|
|
let mut modules = HashMap::new();
|
2012-07-09 18:00:27 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// Create all the items reachable by paths.
|
2012-09-21 21:37:57 -05:00
|
|
|
for each_path(self.session.cstore, root.def_id.get().crate)
|
2013-01-21 22:32:13 -06:00
|
|
|
|path_string, def_like| {
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-18 18:18:02 -05:00
|
|
|
debug!("(building reduced graph for external crate) found path \
|
|
|
|
entry: %s (%?)",
|
2013-01-21 22:32:13 -06:00
|
|
|
path_string, def_like);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-03-24 01:51:18 -05:00
|
|
|
let mut pieces = ~[];
|
|
|
|
for each_split_str(path_string, "::") |s| { pieces.push(s.to_owned()) }
|
2012-09-28 00:20:47 -05:00
|
|
|
let final_ident_str = pieces.pop();
|
2012-07-18 18:18:02 -05:00
|
|
|
let final_ident = self.session.ident_of(final_ident_str);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Find the module we need, creating modules along the way if we
|
|
|
|
// need to.
|
|
|
|
|
|
|
|
let mut current_module = root;
|
2012-07-18 18:18:02 -05:00
|
|
|
for pieces.each |ident_str| {
|
2013-01-07 16:16:52 -06:00
|
|
|
let ident = self.session.ident_of(/*bad*/copy *ident_str);
|
2012-05-22 12:54:12 -05:00
|
|
|
// Create or reuse a graph node for the child.
|
|
|
|
let (child_name_bindings, new_parent) =
|
2012-07-18 18:18:02 -05:00
|
|
|
self.add_child(ident,
|
2012-08-06 18:10:56 -05:00
|
|
|
ModuleReducedGraphParent(current_module),
|
2012-10-15 20:04:15 -05:00
|
|
|
OverwriteDuplicates,
|
|
|
|
dummy_sp());
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Define or reuse the module node.
|
2012-10-15 16:56:42 -05:00
|
|
|
match child_name_bindings.type_def {
|
|
|
|
None => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(building reduced graph for external crate) \
|
2012-11-07 16:27:07 -06:00
|
|
|
autovivifying missing type def %s",
|
|
|
|
*ident_str);
|
2012-05-22 12:54:12 -05:00
|
|
|
let parent_link = self.get_parent_link(new_parent,
|
2012-07-18 18:18:02 -05:00
|
|
|
ident);
|
2013-01-30 19:20:02 -06:00
|
|
|
child_name_bindings.define_module(Public,
|
|
|
|
parent_link,
|
|
|
|
None,
|
|
|
|
NormalModuleKind,
|
|
|
|
dummy_sp());
|
2012-11-07 16:27:07 -06:00
|
|
|
}
|
|
|
|
Some(copy type_ns_def)
|
|
|
|
if type_ns_def.module_def.is_none() => {
|
|
|
|
debug!("(building reduced graph for external crate) \
|
|
|
|
autovivifying missing module def %s",
|
|
|
|
*ident_str);
|
|
|
|
let parent_link = self.get_parent_link(new_parent,
|
|
|
|
ident);
|
2013-01-30 19:20:02 -06:00
|
|
|
child_name_bindings.define_module(Public,
|
|
|
|
parent_link,
|
|
|
|
None,
|
|
|
|
NormalModuleKind,
|
|
|
|
dummy_sp());
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-11-07 16:27:07 -06:00
|
|
|
_ => {} // Fall through.
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
current_module = child_name_bindings.get_module();
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-01-21 22:32:13 -06:00
|
|
|
match def_like {
|
2012-08-03 21:59:04 -05:00
|
|
|
dl_def(def) => {
|
2012-10-18 15:29:34 -05:00
|
|
|
// Add the new child item.
|
|
|
|
let (child_name_bindings, new_parent) =
|
|
|
|
self.add_child(final_ident,
|
|
|
|
ModuleReducedGraphParent(
|
|
|
|
current_module),
|
|
|
|
OverwriteDuplicates,
|
|
|
|
dummy_sp());
|
|
|
|
|
2013-02-11 18:28:39 -06:00
|
|
|
self.handle_external_def(def,
|
2013-03-22 21:26:41 -05:00
|
|
|
&mut modules,
|
2012-08-02 18:01:38 -05:00
|
|
|
child_name_bindings,
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(
|
|
|
|
final_ident),
|
2013-02-11 18:28:39 -06:00
|
|
|
final_ident,
|
|
|
|
new_parent);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-10-18 15:29:34 -05:00
|
|
|
dl_impl(def) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
// We only process static methods of impls here.
|
2012-10-18 15:29:34 -05:00
|
|
|
match get_type_name_if_impl(self.session.cstore, def) {
|
|
|
|
None => {}
|
|
|
|
Some(final_ident) => {
|
|
|
|
let static_methods_opt =
|
|
|
|
get_static_methods_if_impl(
|
|
|
|
self.session.cstore, def);
|
|
|
|
match static_methods_opt {
|
2013-01-07 16:16:52 -06:00
|
|
|
Some(ref static_methods) if
|
2012-10-18 15:29:34 -05:00
|
|
|
static_methods.len() >= 1 => {
|
|
|
|
debug!("(building reduced graph for \
|
|
|
|
external crate) processing \
|
|
|
|
static methods for type name %s",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(
|
|
|
|
final_ident));
|
2012-10-18 15:29:34 -05:00
|
|
|
|
|
|
|
let (child_name_bindings, new_parent) =
|
|
|
|
self.add_child(final_ident,
|
|
|
|
ModuleReducedGraphParent(
|
|
|
|
current_module),
|
|
|
|
OverwriteDuplicates,
|
|
|
|
dummy_sp());
|
|
|
|
|
|
|
|
// Process the static methods. First,
|
|
|
|
// create the module.
|
|
|
|
let type_module;
|
2013-03-20 00:17:42 -05:00
|
|
|
match child_name_bindings.type_def {
|
2012-10-18 15:29:34 -05:00
|
|
|
Some(TypeNsDef {
|
|
|
|
module_def: Some(copy module_def),
|
|
|
|
_
|
|
|
|
}) => {
|
|
|
|
// We already have a module. This
|
|
|
|
// is OK.
|
|
|
|
type_module = module_def;
|
|
|
|
}
|
|
|
|
Some(_) | None => {
|
|
|
|
let parent_link =
|
|
|
|
self.get_parent_link(
|
|
|
|
new_parent, final_ident);
|
|
|
|
child_name_bindings.define_module(
|
|
|
|
Public,
|
|
|
|
parent_link,
|
|
|
|
Some(def),
|
2012-12-23 16:41:37 -06:00
|
|
|
NormalModuleKind,
|
2012-10-18 15:29:34 -05:00
|
|
|
dummy_sp());
|
|
|
|
type_module =
|
|
|
|
child_name_bindings.
|
|
|
|
get_module();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add each static method to the module.
|
|
|
|
let new_parent = ModuleReducedGraphParent(
|
|
|
|
type_module);
|
|
|
|
for static_methods.each
|
|
|
|
|static_method_info| {
|
|
|
|
let ident = static_method_info.ident;
|
|
|
|
debug!("(building reduced graph for \
|
|
|
|
external crate) creating \
|
|
|
|
static method '%s'",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(ident));
|
2012-10-18 15:29:34 -05:00
|
|
|
|
|
|
|
let (method_name_bindings, _) =
|
|
|
|
self.add_child(
|
|
|
|
ident,
|
|
|
|
new_parent,
|
|
|
|
OverwriteDuplicates,
|
|
|
|
dummy_sp());
|
|
|
|
let def = def_fn(
|
|
|
|
static_method_info.def_id,
|
|
|
|
static_method_info.purity);
|
|
|
|
method_name_bindings.define_value(
|
|
|
|
Public, def, dummy_sp());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, do nothing.
|
|
|
|
Some(_) | None => {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
dl_field => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(building reduced graph for external crate) \
|
2013-01-07 16:16:52 -06:00
|
|
|
ignoring field");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Creates and adds an import directive to the given module.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn build_import_directive(@mut self,
|
|
|
|
privacy: Privacy,
|
|
|
|
module_: @mut Module,
|
2013-04-17 11:15:37 -05:00
|
|
|
module_path: ~[ident],
|
2012-07-06 21:06:58 -05:00
|
|
|
subclass: @ImportDirectiveSubclass,
|
2013-03-26 15:08:59 -05:00
|
|
|
span: span) {
|
2012-09-25 17:22:28 -05:00
|
|
|
let directive = @ImportDirective(privacy, module_path,
|
|
|
|
subclass, span);
|
2012-07-31 18:38:41 -05:00
|
|
|
module_.imports.push(directive);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Bump the reference count on the name. Or, if this is a glob, set
|
|
|
|
// the appropriate flag.
|
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match *subclass {
|
2013-03-26 21:53:33 -05:00
|
|
|
SingleImport(target, _) => {
|
2012-10-02 20:13:56 -05:00
|
|
|
debug!("(building import directive) building import \
|
|
|
|
directive: privacy %? %s::%s",
|
|
|
|
privacy,
|
2013-03-07 17:37:14 -06:00
|
|
|
self.idents_to_str(directive.module_path),
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(target));
|
2012-10-02 20:13:56 -05:00
|
|
|
|
2013-02-03 22:29:17 -06:00
|
|
|
match module_.import_resolutions.find(&target) {
|
2013-03-15 14:24:24 -05:00
|
|
|
Some(&resolution) => {
|
2012-10-02 20:13:56 -05:00
|
|
|
debug!("(building import directive) bumping \
|
|
|
|
reference");
|
2012-11-29 14:08:40 -06:00
|
|
|
resolution.outstanding_references += 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-10-02 20:13:56 -05:00
|
|
|
debug!("(building import directive) creating new");
|
2013-03-26 15:08:59 -05:00
|
|
|
let state = @mut ImportState();
|
2013-02-04 16:02:01 -06:00
|
|
|
let resolution = @mut ImportResolution(privacy,
|
|
|
|
span,
|
|
|
|
state);
|
2013-03-07 17:37:14 -06:00
|
|
|
let name = self.idents_to_str(directive.module_path);
|
2013-02-05 01:01:02 -06:00
|
|
|
// Don't warn about unused intrinsics because they're
|
|
|
|
// automatically appended to all files
|
|
|
|
if name == ~"intrinsic::rusti" {
|
|
|
|
resolution.state.warned = true;
|
|
|
|
}
|
2012-11-29 14:08:40 -06:00
|
|
|
resolution.outstanding_references = 1;
|
2012-07-31 18:38:41 -05:00
|
|
|
module_.import_resolutions.insert(target, resolution);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
GlobImport => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Set the glob flag. This tells us that we don't know the
|
|
|
|
// module's exports ahead of time.
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
module_.glob_count += 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
self.unresolved_imports += 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Import resolution
|
|
|
|
//
|
|
|
|
// This is a fixed-point algorithm. We resolve imports until our efforts
|
|
|
|
// are stymied by an unresolved import; then we bail out of the current
|
|
|
|
// module and continue. We terminate successfully once no more imports
|
|
|
|
// remain or unsuccessfully when no forward progress in resolving imports
|
|
|
|
// is made.
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/**
|
|
|
|
* Resolves all imports for the crate. This method performs the fixed-
|
|
|
|
* point iteration.
|
|
|
|
*/
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_imports(@mut self) {
|
2012-11-29 14:08:40 -06:00
|
|
|
let mut i = 0;
|
|
|
|
let mut prev_unresolved_imports = 0;
|
2012-05-22 12:54:12 -05:00
|
|
|
loop {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving imports) iteration %u, %u imports left",
|
|
|
|
i, self.unresolved_imports);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
let module_root = self.graph_root.get_module();
|
2012-05-22 12:54:12 -05:00
|
|
|
self.resolve_imports_for_module_subtree(module_root);
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
if self.unresolved_imports == 0 {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving imports) success");
|
2012-05-22 12:54:12 -05:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if self.unresolved_imports == prev_unresolved_imports {
|
2012-07-14 00:57:48 -05:00
|
|
|
self.session.err(~"failed to resolve imports");
|
2012-05-22 12:54:12 -05:00
|
|
|
self.report_unresolved_imports(module_root);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
i += 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
prev_unresolved_imports = self.unresolved_imports;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Attempts to resolve imports for the given module and all of its
|
|
|
|
/// submodules.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_imports_for_module_subtree(@mut self, module_: @mut Module) {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving imports for module subtree) resolving %s",
|
|
|
|
self.module_to_str(module_));
|
2012-07-31 18:38:41 -05:00
|
|
|
self.resolve_imports_for_module(module_);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-08 16:08:02 -06:00
|
|
|
for module_.children.each_value |&child_node| {
|
2012-09-19 18:55:01 -05:00
|
|
|
match child_node.get_module_if_available() {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(child_module) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.resolve_imports_for_module_subtree(child_module);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-08 16:08:02 -06:00
|
|
|
for module_.anonymous_children.each_value |&child_module| {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.resolve_imports_for_module_subtree(child_module);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Attempts to resolve imports for the given module only.
|
2013-03-01 12:44:43 -06:00
|
|
|
fn resolve_imports_for_module(@mut self, module: @mut Module) {
|
|
|
|
if module.all_imports_resolved() {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving imports for module) all imports resolved for \
|
2012-05-22 12:54:12 -05:00
|
|
|
%s",
|
2013-03-01 12:44:43 -06:00
|
|
|
self.module_to_str(module));
|
2012-08-01 19:30:05 -05:00
|
|
|
return;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-16 13:11:31 -05:00
|
|
|
let imports = &mut *module.imports;
|
|
|
|
let import_count = imports.len();
|
2013-03-01 12:44:43 -06:00
|
|
|
while module.resolved_import_count < import_count {
|
|
|
|
let import_index = module.resolved_import_count;
|
2013-03-16 13:11:31 -05:00
|
|
|
let import_directive = imports[import_index];
|
2013-03-01 12:44:43 -06:00
|
|
|
match self.resolve_import_for_module(module, import_directive) {
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// We presumably emitted an error. Continue.
|
2012-12-27 13:54:34 -06:00
|
|
|
let msg = fmt!("failed to resolve import: %s",
|
2013-03-07 17:37:14 -06:00
|
|
|
*self.import_path_to_str(
|
|
|
|
import_directive.module_path,
|
2013-02-10 18:33:16 -06:00
|
|
|
*import_directive.subclass));
|
2012-12-27 13:54:34 -06:00
|
|
|
self.session.span_err(import_directive.span, msg);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Bail out. We'll come around next time.
|
|
|
|
break;
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Success(()) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Good. Continue.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
module.resolved_import_count += 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-07 17:37:14 -06:00
|
|
|
fn idents_to_str(@mut self, idents: &[ident]) -> ~str {
|
2013-03-20 00:17:42 -05:00
|
|
|
let mut first = true;
|
|
|
|
let mut result = ~"";
|
|
|
|
for idents.each |ident| {
|
|
|
|
if first { first = false; } else { result += "::" };
|
|
|
|
result += *self.session.str_of(*ident);
|
2013-02-10 18:33:16 -06:00
|
|
|
};
|
2013-03-20 00:17:42 -05:00
|
|
|
return result;
|
2012-07-18 18:18:02 -05:00
|
|
|
}
|
2012-12-29 05:44:02 -06:00
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn import_directive_subclass_to_str(@mut self,
|
|
|
|
subclass: ImportDirectiveSubclass)
|
|
|
|
-> @~str {
|
2012-12-27 13:54:34 -06:00
|
|
|
match subclass {
|
2013-03-26 21:53:33 -05:00
|
|
|
SingleImport(_target, source) => self.session.str_of(source),
|
2013-02-10 18:33:16 -06:00
|
|
|
GlobImport => @~"*"
|
2012-12-27 13:54:34 -06:00
|
|
|
}
|
|
|
|
}
|
2012-12-29 05:44:02 -06:00
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn import_path_to_str(@mut self,
|
2013-03-10 10:02:16 -05:00
|
|
|
idents: &[ident],
|
2013-02-21 13:08:50 -06:00
|
|
|
subclass: ImportDirectiveSubclass)
|
|
|
|
-> @~str {
|
2012-12-27 13:54:34 -06:00
|
|
|
if idents.is_empty() {
|
|
|
|
self.import_directive_subclass_to_str(subclass)
|
|
|
|
} else {
|
2013-02-10 18:33:16 -06:00
|
|
|
@fmt!("%s::%s",
|
2012-12-27 13:54:34 -06:00
|
|
|
self.idents_to_str(idents),
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.import_directive_subclass_to_str(subclass))
|
2012-12-27 13:54:34 -06:00
|
|
|
}
|
|
|
|
}
|
2012-12-29 05:44:02 -06:00
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Attempts to resolve the given import. The return value indicates
|
|
|
|
/// failure if we're certain the name does not exist, indeterminate if we
|
|
|
|
/// don't know whether the name exists at the moment due to other
|
|
|
|
/// currently-unresolved imports, or success if we know the name exists.
|
|
|
|
/// If successful, the resolved bindings are written into the module.
|
|
|
|
fn resolve_import_for_module(@mut self, module_: @mut Module,
|
2012-05-22 12:54:12 -05:00
|
|
|
import_directive: @ImportDirective)
|
|
|
|
-> ResolveResult<()> {
|
2013-03-01 12:44:43 -06:00
|
|
|
let mut resolution_result = Failed;
|
2013-03-07 17:37:14 -06:00
|
|
|
let module_path = &import_directive.module_path;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving import for module) resolving import `%s::...` in \
|
2012-07-13 15:20:49 -05:00
|
|
|
`%s`",
|
2013-03-07 17:37:14 -06:00
|
|
|
self.idents_to_str(*module_path),
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
// First, resolve the module path for the directive, if necessary.
|
|
|
|
let containing_module = if module_path.len() == 0 {
|
|
|
|
// Use the crate root.
|
|
|
|
Some(self.graph_root.get_module())
|
2012-05-22 12:54:12 -05:00
|
|
|
} else {
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_module_path_for_import(module_,
|
2013-03-07 17:37:14 -06:00
|
|
|
*module_path,
|
2012-12-13 15:05:22 -06:00
|
|
|
DontUseLexicalScope,
|
|
|
|
import_directive.span) {
|
2012-07-03 17:55:26 -05:00
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
Failed => None,
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2012-05-22 12:54:12 -05:00
|
|
|
resolution_result = Indeterminate;
|
2013-03-01 12:44:43 -06:00
|
|
|
None
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-01 12:44:43 -06:00
|
|
|
Success(containing_module) => Some(containing_module),
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
match containing_module {
|
|
|
|
None => {}
|
|
|
|
Some(containing_module) => {
|
|
|
|
// We found the module that the target is contained
|
|
|
|
// within. Attempt to resolve the import within it.
|
|
|
|
|
|
|
|
match *import_directive.subclass {
|
2013-03-26 21:53:33 -05:00
|
|
|
SingleImport(target, source) => {
|
2013-03-01 12:44:43 -06:00
|
|
|
resolution_result =
|
|
|
|
self.resolve_single_import(module_,
|
|
|
|
containing_module,
|
|
|
|
target,
|
|
|
|
source);
|
|
|
|
}
|
|
|
|
GlobImport => {
|
|
|
|
let span = import_directive.span;
|
|
|
|
let privacy = import_directive.privacy;
|
|
|
|
resolution_result =
|
|
|
|
self.resolve_glob_import(privacy,
|
|
|
|
module_,
|
|
|
|
containing_module,
|
|
|
|
span);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Decrement the count of unresolved imports.
|
2012-08-06 14:34:08 -05:00
|
|
|
match resolution_result {
|
2012-08-03 21:59:04 -05:00
|
|
|
Success(()) => {
|
2013-03-28 20:39:09 -05:00
|
|
|
assert!(self.unresolved_imports >= 1);
|
2012-11-29 14:08:40 -06:00
|
|
|
self.unresolved_imports -= 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do here; just return the error.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Decrement the count of unresolved globs if necessary. But only if
|
|
|
|
// the resolution result is indeterminate -- otherwise we'll stop
|
|
|
|
// processing imports here. (See the loop in
|
|
|
|
// resolve_imports_for_module.)
|
|
|
|
|
2012-09-07 20:53:14 -05:00
|
|
|
if !resolution_result.indeterminate() {
|
2012-08-06 14:34:08 -05:00
|
|
|
match *import_directive.subclass {
|
2012-08-03 21:59:04 -05:00
|
|
|
GlobImport => {
|
2013-03-28 20:39:09 -05:00
|
|
|
assert!(module_.glob_count >= 1);
|
2012-11-29 14:08:40 -06:00
|
|
|
module_.glob_count -= 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
SingleImport(*) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Ignore.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-01 19:30:05 -05:00
|
|
|
return resolution_result;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-26 21:53:33 -05:00
|
|
|
fn create_name_bindings_from_module(module: @mut Module) -> NameBindings {
|
|
|
|
NameBindings {
|
|
|
|
type_def: Some(TypeNsDef {
|
|
|
|
privacy: Public,
|
|
|
|
module_def: Some(module),
|
|
|
|
type_def: None,
|
|
|
|
}),
|
|
|
|
value_def: None,
|
|
|
|
type_span: None,
|
|
|
|
value_span: None,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_single_import(@mut self,
|
|
|
|
module_: @mut Module,
|
|
|
|
containing_module: @mut Module,
|
2012-09-19 20:52:49 -05:00
|
|
|
target: ident,
|
|
|
|
source: ident)
|
2012-05-22 12:54:12 -05:00
|
|
|
-> ResolveResult<()> {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving single import) resolving `%s` = `%s::%s` from \
|
2012-07-13 15:20:49 -05:00
|
|
|
`%s`",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(target),
|
2012-05-22 12:54:12 -05:00
|
|
|
self.module_to_str(containing_module),
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(source),
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
// We need to resolve both namespaces for this to succeed.
|
2012-05-22 12:54:12 -05:00
|
|
|
//
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4949: See if there's some way of handling namespaces in
|
|
|
|
// a more generic way. We have two of them; it seems worth
|
|
|
|
// doing...
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
let mut value_result = UnknownResult;
|
|
|
|
let mut type_result = UnknownResult;
|
|
|
|
|
|
|
|
// Search for direct children of the containing module.
|
2013-02-03 22:29:17 -06:00
|
|
|
match containing_module.children.find(&source) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(child_name_bindings) => {
|
2013-03-21 02:26:38 -05:00
|
|
|
if child_name_bindings.defined_in_namespace(ValueNS) {
|
2012-05-22 12:54:12 -05:00
|
|
|
value_result = BoundResult(containing_module,
|
2013-03-21 02:26:38 -05:00
|
|
|
*child_name_bindings);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-21 02:26:38 -05:00
|
|
|
if child_name_bindings.defined_in_namespace(TypeNS) {
|
2012-05-22 12:54:12 -05:00
|
|
|
type_result = BoundResult(containing_module,
|
2013-03-21 02:26:38 -05:00
|
|
|
*child_name_bindings);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
// Unless we managed to find a result in both namespaces (unlikely),
|
|
|
|
// search imports as well.
|
|
|
|
match (value_result, type_result) {
|
|
|
|
(BoundResult(*), BoundResult(*)) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// If there is an unresolved glob at this point in the
|
|
|
|
// containing module, bail out. We don't know enough to be
|
|
|
|
// able to resolve this import.
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
if containing_module.glob_count > 0 {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving single import) unresolved glob; \
|
|
|
|
bailing out");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Now search the exported imports within the containing
|
|
|
|
// module.
|
|
|
|
|
2013-02-03 22:29:17 -06:00
|
|
|
match containing_module.import_resolutions.find(&source) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// The containing module definitely doesn't have an
|
|
|
|
// exported import with the name in question. We can
|
|
|
|
// therefore accurately report that the names are
|
|
|
|
// unbound.
|
|
|
|
|
2012-08-27 18:26:35 -05:00
|
|
|
if value_result.is_unknown() {
|
2012-05-22 12:54:12 -05:00
|
|
|
value_result = UnboundResult;
|
|
|
|
}
|
2012-08-27 18:26:35 -05:00
|
|
|
if type_result.is_unknown() {
|
2012-05-22 12:54:12 -05:00
|
|
|
type_result = UnboundResult;
|
|
|
|
}
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(import_resolution)
|
2012-05-22 12:54:12 -05:00
|
|
|
if import_resolution.outstanding_references
|
2012-11-29 14:08:40 -06:00
|
|
|
== 0 => {
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
fn get_binding(import_resolution:
|
|
|
|
@mut ImportResolution,
|
2012-05-22 12:54:12 -05:00
|
|
|
namespace: Namespace)
|
|
|
|
-> NamespaceResult {
|
2012-11-29 14:08:40 -06:00
|
|
|
|
2012-10-02 20:13:56 -05:00
|
|
|
// Import resolutions must be declared with "pub"
|
|
|
|
// in order to be exported.
|
|
|
|
if import_resolution.privacy == Private {
|
|
|
|
return UnboundResult;
|
|
|
|
}
|
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match (*import_resolution).
|
2012-05-22 12:54:12 -05:00
|
|
|
target_for_namespace(namespace) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-08-01 19:30:05 -05:00
|
|
|
return UnboundResult;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(target) => {
|
2013-02-05 01:01:02 -06:00
|
|
|
import_resolution.state.used = true;
|
2012-08-01 19:30:05 -05:00
|
|
|
return BoundResult(target.target_module,
|
2012-05-22 12:54:12 -05:00
|
|
|
target.bindings);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// The name is an import which has been fully
|
|
|
|
// resolved. We can, therefore, just follow it.
|
2012-08-27 18:26:35 -05:00
|
|
|
if value_result.is_unknown() {
|
2013-03-21 03:10:57 -05:00
|
|
|
value_result = get_binding(*import_resolution,
|
2012-05-22 12:54:12 -05:00
|
|
|
ValueNS);
|
|
|
|
}
|
2012-08-27 18:26:35 -05:00
|
|
|
if type_result.is_unknown() {
|
2013-03-21 03:10:57 -05:00
|
|
|
type_result = get_binding(*import_resolution,
|
2012-05-22 12:54:12 -05:00
|
|
|
TypeNS);
|
|
|
|
}
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(_) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// The import is unresolved. Bail out.
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving single import) unresolved import; \
|
|
|
|
bailing out");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-26 21:53:33 -05:00
|
|
|
// If we didn't find a result in the type namespace, search the
|
|
|
|
// external modules.
|
|
|
|
match type_result {
|
|
|
|
BoundResult(*) => {}
|
|
|
|
_ => {
|
|
|
|
match containing_module.external_module_children
|
|
|
|
.find(&source) {
|
|
|
|
None => {} // Continue.
|
|
|
|
Some(module) => {
|
|
|
|
let name_bindings =
|
|
|
|
@mut Resolver::create_name_bindings_from_module(
|
|
|
|
*module);
|
|
|
|
type_result = BoundResult(containing_module,
|
|
|
|
name_bindings);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// We've successfully resolved the import. Write the results in.
|
2013-03-28 20:39:09 -05:00
|
|
|
assert!(module_.import_resolutions.contains_key(&target));
|
2013-02-03 22:29:17 -06:00
|
|
|
let import_resolution = module_.import_resolutions.get(&target);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match value_result {
|
2012-08-03 21:59:04 -05:00
|
|
|
BoundResult(target_module, name_bindings) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
import_resolution.value_target =
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(Target(target_module, name_bindings));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
UnboundResult => { /* Continue. */ }
|
|
|
|
UnknownResult => {
|
2013-02-11 21:26:38 -06:00
|
|
|
fail!(~"value result should be known at this point");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2012-08-06 14:34:08 -05:00
|
|
|
match type_result {
|
2012-08-03 21:59:04 -05:00
|
|
|
BoundResult(target_module, name_bindings) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
import_resolution.type_target =
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(Target(target_module, name_bindings));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
UnboundResult => { /* Continue. */ }
|
|
|
|
UnknownResult => {
|
2013-02-11 21:26:38 -06:00
|
|
|
fail!(~"type result should be known at this point");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-18 17:14:23 -05:00
|
|
|
let i = import_resolution;
|
2012-10-15 16:56:42 -05:00
|
|
|
match (i.value_target, i.type_target) {
|
2012-11-29 14:08:40 -06:00
|
|
|
// If this name wasn't found in either namespace, it's definitely
|
|
|
|
// unresolved.
|
|
|
|
(None, None) => { return Failed; }
|
|
|
|
// If it's private, it's also unresolved.
|
|
|
|
(Some(t), None) | (None, Some(t)) => {
|
2013-03-16 13:11:31 -05:00
|
|
|
let bindings = &mut *t.bindings;
|
|
|
|
match bindings.type_def {
|
2012-11-29 14:08:40 -06:00
|
|
|
Some(ref type_def) => {
|
|
|
|
if type_def.privacy == Private {
|
|
|
|
return Failed;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_ => ()
|
|
|
|
}
|
2013-03-16 13:11:31 -05:00
|
|
|
match bindings.value_def {
|
2012-11-29 14:08:40 -06:00
|
|
|
Some(ref value_def) => {
|
|
|
|
if value_def.privacy == Private {
|
|
|
|
return Failed;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_ => ()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// It's also an error if there's both a type and a value with this
|
|
|
|
// name, but both are private
|
|
|
|
(Some(val), Some(ty)) => {
|
|
|
|
match (val.bindings.value_def, ty.bindings.value_def) {
|
|
|
|
(Some(ref value_def), Some(ref type_def)) =>
|
|
|
|
if value_def.privacy == Private
|
|
|
|
&& type_def.privacy == Private {
|
|
|
|
return Failed;
|
|
|
|
},
|
|
|
|
_ => ()
|
|
|
|
}
|
|
|
|
}
|
2012-07-18 17:14:23 -05:00
|
|
|
}
|
|
|
|
|
2013-03-28 20:39:09 -05:00
|
|
|
assert!(import_resolution.outstanding_references >= 1);
|
2012-11-29 14:08:40 -06:00
|
|
|
import_resolution.outstanding_references -= 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving single import) successfully resolved import");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Success(());
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-26 21:53:33 -05:00
|
|
|
// Resolves a glob import. Note that this function cannot fail; it either
|
|
|
|
// succeeds or bails out (as importing * from an empty module or a module
|
|
|
|
// that exports nothing is valid).
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_glob_import(@mut self,
|
|
|
|
privacy: Privacy,
|
|
|
|
module_: @mut Module,
|
|
|
|
containing_module: @mut Module,
|
2012-07-06 21:06:58 -05:00
|
|
|
span: span)
|
2012-05-22 12:54:12 -05:00
|
|
|
-> ResolveResult<()> {
|
|
|
|
// This function works in a highly imperative manner; it eagerly adds
|
|
|
|
// everything it can to the list of import resolutions of the module
|
|
|
|
// node.
|
2012-11-13 17:43:54 -06:00
|
|
|
debug!("(resolving glob import) resolving %? glob import", privacy);
|
2013-02-05 01:01:02 -06:00
|
|
|
let state = @mut ImportState();
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// We must bail out if the node has unresolved imports of any kind
|
|
|
|
// (including globs).
|
|
|
|
if !(*containing_module).all_imports_resolved() {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving glob import) target module has unresolved \
|
|
|
|
imports; bailing out");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-28 20:39:09 -05:00
|
|
|
assert!(containing_module.glob_count == 0);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Add all resolved imports from the containing module.
|
2013-02-08 16:08:02 -06:00
|
|
|
for containing_module.import_resolutions.each
|
2013-04-06 10:22:36 -05:00
|
|
|
|ident, target_import_resolution| {
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving glob import) writing module resolution \
|
2012-07-13 15:20:49 -05:00
|
|
|
%? into `%s`",
|
2013-03-16 14:49:12 -05:00
|
|
|
target_import_resolution.type_target.is_none(),
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Here we merge two import resolutions.
|
2013-03-21 03:10:57 -05:00
|
|
|
match module_.import_resolutions.find(ident) {
|
2013-02-25 13:10:42 -06:00
|
|
|
None if target_import_resolution.privacy == Public => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Simple: just copy the old import resolution.
|
2012-07-06 21:06:58 -05:00
|
|
|
let new_import_resolution =
|
2013-02-04 16:02:01 -06:00
|
|
|
@mut ImportResolution(privacy,
|
|
|
|
target_import_resolution.span,
|
|
|
|
state);
|
2012-05-22 12:54:12 -05:00
|
|
|
new_import_resolution.value_target =
|
|
|
|
copy target_import_resolution.value_target;
|
|
|
|
new_import_resolution.type_target =
|
|
|
|
copy target_import_resolution.type_target;
|
|
|
|
|
2012-07-31 18:38:41 -05:00
|
|
|
module_.import_resolutions.insert
|
2013-03-21 03:10:57 -05:00
|
|
|
(*ident, new_import_resolution);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-02-25 13:10:42 -06:00
|
|
|
None => { /* continue ... */ }
|
2013-03-15 14:24:24 -05:00
|
|
|
Some(&dest_import_resolution) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Merge the two import resolutions at a finer-grained
|
|
|
|
// level.
|
|
|
|
|
2013-03-20 00:17:42 -05:00
|
|
|
match target_import_resolution.value_target {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
2013-03-20 00:17:42 -05:00
|
|
|
Some(copy value_target) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
dest_import_resolution.value_target =
|
2013-03-20 00:17:42 -05:00
|
|
|
Some(value_target);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-03-20 00:17:42 -05:00
|
|
|
match target_import_resolution.type_target {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
2013-03-20 00:17:42 -05:00
|
|
|
Some(copy type_target) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
dest_import_resolution.type_target =
|
2013-03-20 00:17:42 -05:00
|
|
|
Some(type_target);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-26 21:53:33 -05:00
|
|
|
let merge_import_resolution = |ident,
|
|
|
|
name_bindings: @mut NameBindings| {
|
2013-04-12 00:15:30 -05:00
|
|
|
let dest_import_resolution;
|
2013-03-21 02:26:38 -05:00
|
|
|
match module_.import_resolutions.find(ident) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Create a new import resolution from this child.
|
2013-02-04 16:02:01 -06:00
|
|
|
dest_import_resolution = @mut ImportResolution(privacy,
|
|
|
|
span,
|
|
|
|
state);
|
2012-07-31 18:38:41 -05:00
|
|
|
module_.import_resolutions.insert
|
2013-03-21 02:26:38 -05:00
|
|
|
(*ident, dest_import_resolution);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-15 14:24:24 -05:00
|
|
|
Some(&existing_import_resolution) => {
|
|
|
|
dest_import_resolution = existing_import_resolution;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving glob import) writing resolution `%s` in `%s` \
|
2012-11-13 17:43:54 -06:00
|
|
|
to `%s`, privacy=%?",
|
2013-03-21 02:26:38 -05:00
|
|
|
*self.session.str_of(*ident),
|
2012-05-22 12:54:12 -05:00
|
|
|
self.module_to_str(containing_module),
|
2012-11-13 17:43:54 -06:00
|
|
|
self.module_to_str(module_),
|
2013-03-16 13:11:31 -05:00
|
|
|
copy dest_import_resolution.privacy);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Merge the child item into the import resolution.
|
2013-03-21 02:26:38 -05:00
|
|
|
if name_bindings.defined_in_public_namespace(ValueNS) {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving glob import) ... for value target");
|
2012-05-22 12:54:12 -05:00
|
|
|
dest_import_resolution.value_target =
|
2013-03-26 21:53:33 -05:00
|
|
|
Some(Target(containing_module, name_bindings));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-21 02:26:38 -05:00
|
|
|
if name_bindings.defined_in_public_namespace(TypeNS) {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving glob import) ... for type target");
|
2012-05-22 12:54:12 -05:00
|
|
|
dest_import_resolution.type_target =
|
2013-03-26 21:53:33 -05:00
|
|
|
Some(Target(containing_module, name_bindings));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-26 21:53:33 -05:00
|
|
|
};
|
|
|
|
|
|
|
|
// Add all children from the containing module.
|
2013-04-06 10:22:36 -05:00
|
|
|
for containing_module.children.each |ident, name_bindings| {
|
2013-03-26 21:53:33 -05:00
|
|
|
merge_import_resolution(ident, *name_bindings);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add external module children from the containing module.
|
|
|
|
for containing_module.external_module_children.each
|
2013-04-06 10:22:36 -05:00
|
|
|
|ident, module| {
|
2013-03-26 21:53:33 -05:00
|
|
|
let name_bindings =
|
|
|
|
@mut Resolver::create_name_bindings_from_module(*module);
|
|
|
|
merge_import_resolution(ident, name_bindings);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving glob import) successfully resolved import");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Success(());
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Resolves the given module path from the given root `module_`.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_module_path_from_root(@mut self,
|
|
|
|
module_: @mut Module,
|
2013-03-10 10:02:16 -05:00
|
|
|
module_path: &[ident],
|
2012-07-03 17:55:26 -05:00
|
|
|
index: uint,
|
2013-03-01 12:44:43 -06:00
|
|
|
span: span,
|
|
|
|
mut name_search_type: NameSearchType)
|
2013-02-21 13:08:50 -06:00
|
|
|
-> ResolveResult<@mut Module> {
|
2012-07-31 18:38:41 -05:00
|
|
|
let mut search_module = module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
let mut index = index;
|
2013-03-07 17:37:14 -06:00
|
|
|
let module_path_len = module_path.len();
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Resolve the module part of the path. This does not involve looking
|
|
|
|
// upward though scope chains; we simply resolve names directly in
|
|
|
|
// modules as we go.
|
|
|
|
|
|
|
|
while index < module_path_len {
|
2013-03-07 17:37:14 -06:00
|
|
|
let name = module_path[index];
|
2012-12-13 15:05:22 -06:00
|
|
|
match self.resolve_name_in_module(search_module,
|
|
|
|
name,
|
|
|
|
TypeNS,
|
2013-03-01 12:44:43 -06:00
|
|
|
name_search_type) {
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2012-07-14 00:57:48 -05:00
|
|
|
self.session.span_err(span, ~"unresolved name");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving module path for import) module \
|
2012-05-22 12:54:12 -05:00
|
|
|
resolution is indeterminate: %s",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(name));
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Success(target) => {
|
2012-10-15 20:04:15 -05:00
|
|
|
// Check to see whether there are type bindings, and, if
|
|
|
|
// so, whether there is a module within.
|
2012-10-15 16:56:42 -05:00
|
|
|
match target.bindings.type_def {
|
2012-10-15 20:04:15 -05:00
|
|
|
Some(copy type_def) => {
|
|
|
|
match type_def.module_def {
|
|
|
|
None => {
|
|
|
|
// Not a module.
|
|
|
|
self.session.span_err(span,
|
|
|
|
fmt!("not a \
|
|
|
|
module: %s",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.
|
2012-10-15 20:04:15 -05:00
|
|
|
str_of(
|
|
|
|
name)));
|
|
|
|
return Failed;
|
|
|
|
}
|
|
|
|
Some(copy module_def) => {
|
|
|
|
search_module = module_def;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None => {
|
|
|
|
// There are no type bindings at all.
|
2012-07-06 21:06:58 -05:00
|
|
|
self.session.span_err(span,
|
2012-08-22 19:24:52 -05:00
|
|
|
fmt!("not a module: %s",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(
|
2012-10-15 20:04:15 -05:00
|
|
|
name)));
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
index += 1;
|
2013-03-01 12:44:43 -06:00
|
|
|
|
|
|
|
// After the first element of the path, allow searching through
|
|
|
|
// items and imports unconditionally. This allows things like:
|
|
|
|
//
|
|
|
|
// pub mod core {
|
|
|
|
// pub use vec;
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// pub mod something_else {
|
|
|
|
// use core::vec;
|
|
|
|
// }
|
|
|
|
|
|
|
|
name_search_type = SearchItemsAndPublicImports;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-01 19:30:05 -05:00
|
|
|
return Success(search_module);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Attempts to resolve the module part of an import directive or path
|
|
|
|
/// rooted at the given module.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_module_path_for_import(@mut self,
|
|
|
|
module_: @mut Module,
|
2013-03-10 10:02:16 -05:00
|
|
|
module_path: &[ident],
|
2012-12-13 15:05:22 -06:00
|
|
|
use_lexical_scope: UseLexicalScopeFlag,
|
2012-07-06 21:06:58 -05:00
|
|
|
span: span)
|
2013-02-21 13:08:50 -06:00
|
|
|
-> ResolveResult<@mut Module> {
|
2013-03-01 12:44:43 -06:00
|
|
|
let module_path_len = module_path.len();
|
2013-03-28 20:39:09 -05:00
|
|
|
assert!(module_path_len > 0);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving module path for import) processing `%s` rooted at \
|
2012-07-13 15:20:49 -05:00
|
|
|
`%s`",
|
2013-03-07 17:37:14 -06:00
|
|
|
self.idents_to_str(module_path),
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-12-23 16:41:37 -06:00
|
|
|
// Resolve the module prefix, if any.
|
|
|
|
let module_prefix_result = self.resolve_module_prefix(module_,
|
|
|
|
module_path);
|
2012-12-13 15:05:22 -06:00
|
|
|
|
2013-04-12 00:15:30 -05:00
|
|
|
let search_module;
|
|
|
|
let start_index;
|
2012-12-23 16:41:37 -06:00
|
|
|
match module_prefix_result {
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2012-07-14 00:57:48 -05:00
|
|
|
self.session.span_err(span, ~"unresolved name");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving module path for import) indeterminate; \
|
|
|
|
bailing");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-12-23 16:41:37 -06:00
|
|
|
Success(NoPrefixFound) => {
|
|
|
|
// There was no prefix, so we're considering the first element
|
|
|
|
// of the path. How we handle this depends on whether we were
|
|
|
|
// instructed to use lexical scope or not.
|
|
|
|
match use_lexical_scope {
|
|
|
|
DontUseLexicalScope => {
|
|
|
|
// This is a crate-relative path. We will start the
|
|
|
|
// resolution process at index zero.
|
|
|
|
search_module = self.graph_root.get_module();
|
|
|
|
start_index = 0;
|
|
|
|
}
|
|
|
|
UseLexicalScope => {
|
|
|
|
// This is not a crate-relative path. We resolve the
|
|
|
|
// first component of the path in the current lexical
|
|
|
|
// scope and then proceed to resolve below that.
|
|
|
|
let result = self.resolve_module_in_lexical_scope(
|
|
|
|
module_,
|
2013-03-07 17:37:14 -06:00
|
|
|
module_path[0]);
|
2012-12-23 16:41:37 -06:00
|
|
|
match result {
|
|
|
|
Failed => {
|
|
|
|
self.session.span_err(span,
|
|
|
|
~"unresolved name");
|
|
|
|
return Failed;
|
|
|
|
}
|
|
|
|
Indeterminate => {
|
|
|
|
debug!("(resolving module path for import) \
|
|
|
|
indeterminate; bailing");
|
|
|
|
return Indeterminate;
|
|
|
|
}
|
|
|
|
Success(containing_module) => {
|
|
|
|
search_module = containing_module;
|
|
|
|
start_index = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Success(PrefixFound(containing_module, index)) => {
|
|
|
|
search_module = containing_module;
|
|
|
|
start_index = index;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
self.resolve_module_path_from_root(search_module,
|
|
|
|
module_path,
|
|
|
|
start_index,
|
|
|
|
span,
|
|
|
|
SearchItemsAndPublicImports)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Invariant: This must only be called during main resolution, not during
|
|
|
|
/// import resolution.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_item_in_lexical_scope(@mut self,
|
|
|
|
module_: @mut Module,
|
2012-09-19 20:52:49 -05:00
|
|
|
name: ident,
|
2012-12-23 16:41:37 -06:00
|
|
|
namespace: Namespace,
|
|
|
|
search_through_modules:
|
|
|
|
SearchThroughModulesFlag)
|
2012-05-22 12:54:12 -05:00
|
|
|
-> ResolveResult<Target> {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving item in lexical scope) resolving `%s` in \
|
2012-07-13 15:20:49 -05:00
|
|
|
namespace %? in `%s`",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(name),
|
2012-05-22 12:54:12 -05:00
|
|
|
namespace,
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The current module node is handled specially. First, check for
|
|
|
|
// its immediate children.
|
2013-02-03 22:29:17 -06:00
|
|
|
match module_.children.find(&name) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(name_bindings)
|
2013-03-21 02:26:38 -05:00
|
|
|
if name_bindings.defined_in_namespace(namespace) => {
|
|
|
|
return Success(Target(module_, *name_bindings));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(_) | None => { /* Not found; continue. */ }
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Now check for its import directives. We don't have to have resolved
|
|
|
|
// all its imports in the usual way; this is because chains of
|
|
|
|
// adjacent import statements are processed as though they mutated the
|
|
|
|
// current scope.
|
2013-02-03 22:29:17 -06:00
|
|
|
match module_.import_resolutions.find(&name) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Not found; continue.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(import_resolution) => {
|
2012-08-06 14:34:08 -05:00
|
|
|
match (*import_resolution).target_for_namespace(namespace) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Not found; continue.
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving item in lexical scope) found \
|
2012-05-22 12:54:12 -05:00
|
|
|
import resolution, but not in namespace %?",
|
2012-08-22 19:24:52 -05:00
|
|
|
namespace);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(target) => {
|
2013-02-25 13:10:42 -06:00
|
|
|
debug!("(resolving item in lexical scope) using \
|
|
|
|
import resolution");
|
2013-02-05 01:01:02 -06:00
|
|
|
import_resolution.state.used = true;
|
2012-08-01 19:30:05 -05:00
|
|
|
return Success(copy target);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-26 21:53:33 -05:00
|
|
|
// Search for external modules.
|
|
|
|
if namespace == TypeNS {
|
|
|
|
match module_.external_module_children.find(&name) {
|
|
|
|
None => {}
|
|
|
|
Some(module) => {
|
|
|
|
let name_bindings =
|
|
|
|
@mut Resolver::create_name_bindings_from_module(
|
|
|
|
*module);
|
|
|
|
return Success(Target(module_, name_bindings));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// Finally, proceed up the scope chain looking for parent modules.
|
2012-07-31 18:38:41 -05:00
|
|
|
let mut search_module = module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
loop {
|
|
|
|
// Go to the next parent.
|
2012-08-06 14:34:08 -05:00
|
|
|
match search_module.parent_link {
|
2012-08-03 21:59:04 -05:00
|
|
|
NoParentLink => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// No more parents. This module was unresolved.
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving item in lexical scope) unresolved \
|
|
|
|
module");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-12-23 16:41:37 -06:00
|
|
|
ModuleParentLink(parent_module_node, _) => {
|
|
|
|
match search_through_modules {
|
|
|
|
DontSearchThroughModules => {
|
|
|
|
match search_module.kind {
|
|
|
|
NormalModuleKind => {
|
|
|
|
// We stop the search here.
|
|
|
|
debug!("(resolving item in lexical \
|
|
|
|
scope) unresolved module: not \
|
|
|
|
searching through module \
|
|
|
|
parents");
|
|
|
|
return Failed;
|
|
|
|
}
|
|
|
|
ExternModuleKind |
|
|
|
|
TraitModuleKind |
|
|
|
|
AnonymousModuleKind => {
|
|
|
|
search_module = parent_module_node;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
SearchThroughModules => {
|
|
|
|
search_module = parent_module_node;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
BlockParentLink(parent_module_node, _) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
search_module = parent_module_node;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Resolve the name in the parent module.
|
2012-12-13 15:05:22 -06:00
|
|
|
match self.resolve_name_in_module(search_module,
|
|
|
|
name,
|
|
|
|
namespace,
|
2013-03-01 12:44:43 -06:00
|
|
|
SearchItemsAndAllImports) {
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue up the search chain.
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// We couldn't see through the higher scope because of an
|
|
|
|
// unresolved import higher up. Bail.
|
|
|
|
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving item in lexical scope) indeterminate \
|
|
|
|
higher scope; bailing");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Success(target) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// We found the module.
|
2012-08-01 19:30:05 -05:00
|
|
|
return Success(copy target);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-12-13 15:05:22 -06:00
|
|
|
/** Resolves a module name in the current lexical scope. */
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_module_in_lexical_scope(@mut self,
|
|
|
|
module_: @mut Module,
|
|
|
|
name: ident)
|
|
|
|
-> ResolveResult<@mut Module> {
|
2012-12-13 15:05:22 -06:00
|
|
|
// If this module is an anonymous module, resolve the item in the
|
|
|
|
// lexical scope. Otherwise, resolve the item from the crate root.
|
2012-12-23 16:41:37 -06:00
|
|
|
let resolve_result = self.resolve_item_in_lexical_scope(
|
|
|
|
module_, name, TypeNS, DontSearchThroughModules);
|
2012-12-13 15:05:22 -06:00
|
|
|
match resolve_result {
|
2012-08-03 21:59:04 -05:00
|
|
|
Success(target) => {
|
2013-03-16 13:11:31 -05:00
|
|
|
let bindings = &mut *target.bindings;
|
|
|
|
match bindings.type_def {
|
2012-12-04 12:50:00 -06:00
|
|
|
Some(ref type_def) => {
|
|
|
|
match (*type_def).module_def {
|
2012-10-15 20:04:15 -05:00
|
|
|
None => {
|
|
|
|
error!("!!! (resolving module in lexical \
|
|
|
|
scope) module wasn't actually a \
|
|
|
|
module!");
|
|
|
|
return Failed;
|
|
|
|
}
|
|
|
|
Some(module_def) => {
|
|
|
|
return Success(module_def);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None => {
|
2012-08-22 19:24:52 -05:00
|
|
|
error!("!!! (resolving module in lexical scope) module
|
|
|
|
wasn't actually a module!");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving module in lexical scope) indeterminate; \
|
|
|
|
bailing");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving module in lexical scope) failed to \
|
|
|
|
resolve");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-12-13 15:05:22 -06:00
|
|
|
/**
|
2012-12-23 16:41:37 -06:00
|
|
|
* Returns the nearest normal module parent of the given module.
|
|
|
|
*/
|
2013-02-21 13:08:50 -06:00
|
|
|
fn get_nearest_normal_module_parent(@mut self, module_: @mut Module)
|
|
|
|
-> Option<@mut Module> {
|
2012-12-23 16:41:37 -06:00
|
|
|
let mut module_ = module_;
|
|
|
|
loop {
|
|
|
|
match module_.parent_link {
|
|
|
|
NoParentLink => return None,
|
|
|
|
ModuleParentLink(new_module, _) |
|
|
|
|
BlockParentLink(new_module, _) => {
|
|
|
|
match new_module.kind {
|
|
|
|
NormalModuleKind => return Some(new_module),
|
|
|
|
ExternModuleKind |
|
|
|
|
TraitModuleKind |
|
|
|
|
AnonymousModuleKind => module_ = new_module,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the nearest normal module parent of the given module, or the
|
|
|
|
* module itself if it is a normal module.
|
|
|
|
*/
|
2013-02-21 13:08:50 -06:00
|
|
|
fn get_nearest_normal_module_parent_or_self(@mut self,
|
|
|
|
module_: @mut Module)
|
|
|
|
-> @mut Module {
|
2012-12-23 16:41:37 -06:00
|
|
|
match module_.kind {
|
|
|
|
NormalModuleKind => return module_,
|
|
|
|
ExternModuleKind | TraitModuleKind | AnonymousModuleKind => {
|
|
|
|
match self.get_nearest_normal_module_parent(module_) {
|
|
|
|
None => module_,
|
|
|
|
Some(new_module) => new_module
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Resolves a "module prefix". A module prefix is one of (a) `self::`;
|
|
|
|
* (b) some chain of `super::`.
|
2012-12-13 15:05:22 -06:00
|
|
|
*/
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_module_prefix(@mut self,
|
|
|
|
module_: @mut Module,
|
2013-03-10 10:02:16 -05:00
|
|
|
module_path: &[ident])
|
2012-12-23 16:41:37 -06:00
|
|
|
-> ResolveResult<ModulePrefixResult> {
|
2012-12-13 15:05:22 -06:00
|
|
|
let interner = self.session.parse_sess.interner;
|
|
|
|
|
2012-12-23 16:41:37 -06:00
|
|
|
// Start at the current module if we see `self` or `super`, or at the
|
|
|
|
// top of the crate otherwise.
|
|
|
|
let mut containing_module;
|
|
|
|
let mut i;
|
2013-03-07 17:37:14 -06:00
|
|
|
if *interner.get(module_path[0]) == ~"self" {
|
2012-12-23 16:41:37 -06:00
|
|
|
containing_module =
|
|
|
|
self.get_nearest_normal_module_parent_or_self(module_);
|
|
|
|
i = 1;
|
2013-03-07 17:37:14 -06:00
|
|
|
} else if *interner.get(module_path[0]) == ~"super" {
|
2012-12-23 16:41:37 -06:00
|
|
|
containing_module =
|
|
|
|
self.get_nearest_normal_module_parent_or_self(module_);
|
|
|
|
i = 0; // We'll handle `super` below.
|
|
|
|
} else {
|
|
|
|
return Success(NoPrefixFound);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now loop through all the `super`s we find.
|
|
|
|
while i < module_path.len() &&
|
2013-03-07 17:37:14 -06:00
|
|
|
*interner.get(module_path[i]) == ~"super" {
|
2012-12-23 16:41:37 -06:00
|
|
|
debug!("(resolving module prefix) resolving `super` at %s",
|
|
|
|
self.module_to_str(containing_module));
|
|
|
|
match self.get_nearest_normal_module_parent(containing_module) {
|
|
|
|
None => return Failed,
|
|
|
|
Some(new_module) => {
|
|
|
|
containing_module = new_module;
|
|
|
|
i += 1;
|
2012-12-13 15:05:22 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-12-23 16:41:37 -06:00
|
|
|
debug!("(resolving module prefix) finished resolving prefix at %s",
|
|
|
|
self.module_to_str(containing_module));
|
|
|
|
|
|
|
|
return Success(PrefixFound(containing_module, i));
|
2012-12-13 15:05:22 -06:00
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Attempts to resolve the supplied name in the given module for the
|
|
|
|
/// given namespace. If successful, returns the target corresponding to
|
|
|
|
/// the name.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_name_in_module(@mut self,
|
|
|
|
module_: @mut Module,
|
2012-09-19 20:52:49 -05:00
|
|
|
name: ident,
|
2012-05-22 12:54:12 -05:00
|
|
|
namespace: Namespace,
|
2013-04-17 11:15:37 -05:00
|
|
|
name_search_type: NameSearchType)
|
2012-05-22 12:54:12 -05:00
|
|
|
-> ResolveResult<Target> {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving name in module) resolving `%s` in `%s`",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(name),
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// First, check the direct children of the module.
|
2013-02-03 22:29:17 -06:00
|
|
|
match module_.children.find(&name) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(name_bindings)
|
2013-03-21 02:26:38 -05:00
|
|
|
if name_bindings.defined_in_namespace(namespace) => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving name in module) found node as child");
|
2013-03-21 02:26:38 -05:00
|
|
|
return Success(Target(module_, *name_bindings));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(_) | None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
// Next, check the module's imports if necessary.
|
|
|
|
|
|
|
|
// If this is a search of all imports, we should be done with glob
|
|
|
|
// resolution at this point.
|
|
|
|
if name_search_type == SearchItemsAndAllImports {
|
2013-03-28 20:39:09 -05:00
|
|
|
assert!(module_.glob_count == 0);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
// Check the list of resolved imports.
|
2013-02-03 22:29:17 -06:00
|
|
|
match module_.import_resolutions.find(&name) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(import_resolution) => {
|
2013-03-26 21:53:33 -05:00
|
|
|
if import_resolution.privacy == Public &&
|
|
|
|
import_resolution.outstanding_references != 0 {
|
2013-03-01 12:44:43 -06:00
|
|
|
debug!("(resolving name in module) import \
|
|
|
|
unresolved; bailing out");
|
2012-08-01 19:30:05 -05:00
|
|
|
return Indeterminate;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
match import_resolution.target_for_namespace(namespace) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-03-01 12:44:43 -06:00
|
|
|
debug!("(resolving name in module) name found, \
|
|
|
|
but not in namespace %?",
|
2012-08-22 19:24:52 -05:00
|
|
|
namespace);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-01 12:44:43 -06:00
|
|
|
Some(target)
|
|
|
|
if name_search_type ==
|
|
|
|
SearchItemsAndAllImports ||
|
|
|
|
import_resolution.privacy == Public => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving name in module) resolved to \
|
|
|
|
import");
|
2013-02-05 01:01:02 -06:00
|
|
|
import_resolution.state.used = true;
|
2012-08-01 19:30:05 -05:00
|
|
|
return Success(copy target);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-01 12:44:43 -06:00
|
|
|
Some(_) => {
|
|
|
|
debug!("(resolving name in module) name found, \
|
|
|
|
but not public");
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-03-26 21:53:33 -05:00
|
|
|
None => {} // Continue.
|
|
|
|
}
|
|
|
|
|
|
|
|
// Finally, search through external children.
|
|
|
|
if namespace == TypeNS {
|
|
|
|
match module_.external_module_children.find(&name) {
|
|
|
|
None => {}
|
|
|
|
Some(module) => {
|
|
|
|
let name_bindings =
|
|
|
|
@mut Resolver::create_name_bindings_from_module(
|
|
|
|
*module);
|
|
|
|
return Success(Target(module_, name_bindings));
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// We're out of luck.
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving name in module) failed to resolve %s",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(name));
|
2012-08-01 19:30:05 -05:00
|
|
|
return Failed;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn report_unresolved_imports(@mut self, module_: @mut Module) {
|
2012-07-31 18:38:41 -05:00
|
|
|
let index = module_.resolved_import_count;
|
2013-03-16 13:11:31 -05:00
|
|
|
let imports: &mut ~[@ImportDirective] = &mut *module_.imports;
|
|
|
|
let import_count = imports.len();
|
2012-05-22 12:54:12 -05:00
|
|
|
if index != import_count {
|
2013-04-26 03:59:28 -05:00
|
|
|
let sn = self.session.codemap.span_to_snippet(imports[index].span);
|
|
|
|
if str::contains(sn, "::") {
|
|
|
|
self.session.span_err(imports[index].span, ~"unresolved import");
|
|
|
|
} else {
|
|
|
|
let err = fmt!("unresolved import (maybe you meant `%s::*`?)",
|
2013-04-26 04:28:43 -05:00
|
|
|
sn.slice(0, sn.len() - 1)); // -1 to adjust for semicolon
|
2013-04-26 03:59:28 -05:00
|
|
|
self.session.span_err(imports[index].span, err);
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Descend into children and anonymous children.
|
2013-02-08 16:08:02 -06:00
|
|
|
for module_.children.each_value |&child_node| {
|
2012-09-19 18:55:01 -05:00
|
|
|
match child_node.get_module_if_available() {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(child_module) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.report_unresolved_imports(child_module);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-08 16:08:02 -06:00
|
|
|
for module_.anonymous_children.each_value |&module_| {
|
2012-07-31 18:38:41 -05:00
|
|
|
self.report_unresolved_imports(module_);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Export recording
|
|
|
|
//
|
|
|
|
// This pass simply determines what all "export" keywords refer to and
|
|
|
|
// writes the results into the export map.
|
|
|
|
//
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4953 This pass will be removed once exports change to per-item.
|
|
|
|
// Then this operation can simply be performed as part of item (or import)
|
2012-05-22 12:54:12 -05:00
|
|
|
// processing.
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn record_exports(@mut self) {
|
2013-02-04 16:02:01 -06:00
|
|
|
let root_module = self.graph_root.get_module();
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_exports_for_module_subtree(root_module);
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn record_exports_for_module_subtree(@mut self, module_: @mut Module) {
|
2012-05-22 12:54:12 -05:00
|
|
|
// If this isn't a local crate, then bail out. We don't need to record
|
2012-11-13 17:43:54 -06:00
|
|
|
// exports for nonlocal crates.
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match module_.def_id {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def_id) if def_id.crate == local_crate => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// OK. Continue.
|
2012-11-13 17:43:54 -06:00
|
|
|
debug!("(recording exports for module subtree) recording \
|
|
|
|
exports for local module");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Record exports for the root module.
|
2012-11-13 17:43:54 -06:00
|
|
|
debug!("(recording exports for module subtree) recording \
|
|
|
|
exports for root module");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(_) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Bail out.
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(recording exports for module subtree) not recording \
|
2012-07-13 15:20:49 -05:00
|
|
|
exports for `%s`",
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-08-01 19:30:05 -05:00
|
|
|
return;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-31 18:38:41 -05:00
|
|
|
self.record_exports_for_module(module_);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-08 16:08:02 -06:00
|
|
|
for module_.children.each_value |&child_name_bindings| {
|
2012-09-19 18:55:01 -05:00
|
|
|
match child_name_bindings.get_module_if_available() {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(child_module) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_exports_for_module_subtree(child_module);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-08 16:08:02 -06:00
|
|
|
for module_.anonymous_children.each_value |&child_module| {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_exports_for_module_subtree(child_module);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn record_exports_for_module(@mut self, module_: @mut Module) {
|
2012-08-17 14:41:34 -05:00
|
|
|
let mut exports2 = ~[];
|
2012-09-24 19:29:20 -05:00
|
|
|
|
2013-01-30 19:20:02 -06:00
|
|
|
self.add_exports_for_module(&mut exports2, module_);
|
2013-03-20 00:17:42 -05:00
|
|
|
match /*bad*/copy module_.def_id {
|
2012-09-24 19:29:20 -05:00
|
|
|
Some(def_id) => {
|
2013-02-15 03:14:34 -06:00
|
|
|
self.export_map2.insert(def_id.node, exports2);
|
2012-09-24 19:29:20 -05:00
|
|
|
debug!("(computing exports) writing exports for %d (some)",
|
|
|
|
def_id.node);
|
|
|
|
}
|
|
|
|
None => {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn add_exports_of_namebindings(@mut self,
|
|
|
|
exports2: &mut ~[Export2],
|
2012-09-19 20:52:49 -05:00
|
|
|
ident: ident,
|
2013-02-04 16:02:01 -06:00
|
|
|
namebindings: @mut NameBindings,
|
2012-11-15 18:59:43 -06:00
|
|
|
ns: Namespace,
|
2012-09-24 19:29:20 -05:00
|
|
|
reexport: bool) {
|
2012-11-15 18:59:43 -06:00
|
|
|
match (namebindings.def_for_namespace(ns),
|
|
|
|
namebindings.privacy_for_namespace(ns)) {
|
|
|
|
(Some(d), Some(Public)) => {
|
|
|
|
debug!("(computing exports) YES: %s '%s' => %?",
|
|
|
|
if reexport { ~"reexport" } else { ~"export"},
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(ident),
|
2012-11-15 18:59:43 -06:00
|
|
|
def_id_of_def(d));
|
|
|
|
exports2.push(Export2 {
|
|
|
|
reexport: reexport,
|
|
|
|
name: self.session.str_of(ident),
|
|
|
|
def_id: def_id_of_def(d)
|
|
|
|
});
|
|
|
|
}
|
|
|
|
(Some(_), Some(privacy)) => {
|
|
|
|
debug!("(computing reexports) NO: privacy %?", privacy);
|
|
|
|
}
|
|
|
|
(d_opt, p_opt) => {
|
|
|
|
debug!("(computing reexports) NO: %?, %?", d_opt, p_opt);
|
2012-09-24 19:29:20 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn add_exports_for_module(@mut self,
|
|
|
|
exports2: &mut ~[Export2],
|
|
|
|
module_: @mut Module) {
|
2013-04-06 10:22:36 -05:00
|
|
|
for module_.children.each |ident, namebindings| {
|
2012-09-25 17:22:28 -05:00
|
|
|
debug!("(computing exports) maybe export '%s'",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(*ident));
|
2013-01-11 23:01:42 -06:00
|
|
|
self.add_exports_of_namebindings(&mut *exports2,
|
2012-11-13 17:43:54 -06:00
|
|
|
*ident,
|
|
|
|
*namebindings,
|
2012-11-15 18:59:43 -06:00
|
|
|
TypeNS,
|
|
|
|
false);
|
2013-01-11 23:01:42 -06:00
|
|
|
self.add_exports_of_namebindings(&mut *exports2,
|
2012-11-15 18:59:43 -06:00
|
|
|
*ident,
|
|
|
|
*namebindings,
|
|
|
|
ValueNS,
|
|
|
|
false);
|
2012-09-24 19:29:20 -05:00
|
|
|
}
|
|
|
|
|
2013-04-06 10:22:36 -05:00
|
|
|
for module_.import_resolutions.each |ident, importresolution| {
|
2012-11-13 17:43:54 -06:00
|
|
|
if importresolution.privacy != Public {
|
|
|
|
debug!("(computing exports) not reexporting private `%s`",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(*ident));
|
2012-11-13 17:43:54 -06:00
|
|
|
loop;
|
|
|
|
}
|
2012-10-15 16:56:42 -05:00
|
|
|
for [ TypeNS, ValueNS ].each |ns| {
|
2012-09-24 19:29:20 -05:00
|
|
|
match importresolution.target_for_namespace(*ns) {
|
|
|
|
Some(target) => {
|
2012-09-25 17:22:28 -05:00
|
|
|
debug!("(computing exports) maybe reexport '%s'",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(*ident));
|
2013-01-11 23:01:42 -06:00
|
|
|
self.add_exports_of_namebindings(&mut *exports2,
|
2012-10-15 16:56:42 -05:00
|
|
|
*ident,
|
2012-09-24 19:29:20 -05:00
|
|
|
target.bindings,
|
2012-11-15 18:59:43 -06:00
|
|
|
*ns,
|
2012-09-24 19:29:20 -05:00
|
|
|
true)
|
|
|
|
}
|
|
|
|
_ => ()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// AST resolution
|
|
|
|
//
|
2012-07-06 21:06:58 -05:00
|
|
|
// We maintain a list of value ribs and type ribs.
|
2012-05-22 12:54:12 -05:00
|
|
|
//
|
|
|
|
// Simultaneously, we keep track of the current position in the module
|
|
|
|
// graph in the `current_module` pointer. When we go to resolve a name in
|
|
|
|
// the value or type namespaces, we first look through all the ribs and
|
|
|
|
// then query the module graph. When we resolve a name in the module
|
|
|
|
// namespace, we can skip all the ribs (since nested modules are not
|
|
|
|
// allowed within blocks in Rust) and jump straight to the current module
|
|
|
|
// graph node.
|
|
|
|
//
|
|
|
|
// Named implementations are handled separately. When we find a method
|
|
|
|
// call, we consult the module node to find all of the implementations in
|
|
|
|
// scope. This information is lazily cached in the module node. We then
|
|
|
|
// generate a fake "implementation scope" containing all the
|
|
|
|
// implementations thus found, for compatibility with old resolve pass.
|
|
|
|
|
2013-03-07 16:38:38 -06:00
|
|
|
fn with_scope(@mut self, name: Option<ident>, f: &fn()) {
|
2012-05-22 12:54:12 -05:00
|
|
|
let orig_module = self.current_module;
|
|
|
|
|
|
|
|
// Move down in the graph.
|
2012-08-06 14:34:08 -05:00
|
|
|
match name {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-07-11 17:00:40 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(name) => {
|
2013-02-03 22:29:17 -06:00
|
|
|
match orig_module.children.find(&name) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("!!! (with scope) didn't find `%s` in `%s`",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(name),
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(orig_module));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(name_bindings) => {
|
2012-08-06 14:34:08 -05:00
|
|
|
match (*name_bindings).get_module_if_available() {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("!!! (with scope) didn't find module \
|
2012-07-13 15:20:49 -05:00
|
|
|
for `%s` in `%s`",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(name),
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(orig_module));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(module_) => {
|
2012-07-31 18:38:41 -05:00
|
|
|
self.current_module = module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
f();
|
|
|
|
|
|
|
|
self.current_module = orig_module;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wraps the given definition in the appropriate number of `def_upvar`
|
|
|
|
// wrappers.
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn upvarify(@mut self,
|
2013-03-07 17:37:14 -06:00
|
|
|
ribs: &mut ~[@Rib],
|
2013-02-21 13:08:50 -06:00
|
|
|
rib_index: uint,
|
|
|
|
def_like: def_like,
|
|
|
|
span: span,
|
|
|
|
allow_capturing_self: AllowCapturingSelfFlag)
|
2012-08-20 14:23:37 -05:00
|
|
|
-> Option<def_like> {
|
2012-05-22 12:54:12 -05:00
|
|
|
let mut def;
|
2013-04-12 00:15:30 -05:00
|
|
|
let is_ty_param;
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match def_like {
|
2012-05-22 12:54:12 -05:00
|
|
|
dl_def(d @ def_local(*)) | dl_def(d @ def_upvar(*)) |
|
2012-08-03 21:59:04 -05:00
|
|
|
dl_def(d @ def_arg(*)) | dl_def(d @ def_binding(*)) => {
|
2012-07-06 21:06:58 -05:00
|
|
|
def = d;
|
|
|
|
is_ty_param = false;
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
dl_def(d @ def_ty_param(*)) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
def = d;
|
2012-07-06 21:06:58 -05:00
|
|
|
is_ty_param = true;
|
|
|
|
}
|
|
|
|
dl_def(d @ def_self(*))
|
2012-08-03 21:59:04 -05:00
|
|
|
if allow_capturing_self == DontAllowCapturingSelf => {
|
2012-07-06 21:06:58 -05:00
|
|
|
def = d;
|
|
|
|
is_ty_param = false;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-08-20 14:23:37 -05:00
|
|
|
return Some(def_like);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
let mut rib_index = rib_index + 1;
|
2013-03-07 17:37:14 -06:00
|
|
|
while rib_index < ribs.len() {
|
|
|
|
match ribs[rib_index].kind {
|
2012-08-03 21:59:04 -05:00
|
|
|
NormalRibKind => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do. Continue.
|
|
|
|
}
|
2012-08-20 18:53:33 -05:00
|
|
|
FunctionRibKind(function_id, body_id) => {
|
2012-07-06 21:06:58 -05:00
|
|
|
if !is_ty_param {
|
|
|
|
def = def_upvar(def_id_of_def(def).node,
|
|
|
|
@def,
|
2012-08-20 18:53:33 -05:00
|
|
|
function_id,
|
|
|
|
body_id);
|
2012-07-06 21:06:58 -05:00
|
|
|
}
|
|
|
|
}
|
2012-08-26 14:12:05 -05:00
|
|
|
MethodRibKind(item_id, _) => {
|
2012-07-26 16:04:03 -05:00
|
|
|
// If the def is a ty param, and came from the parent
|
|
|
|
// item, it's ok
|
2012-08-06 14:34:08 -05:00
|
|
|
match def {
|
2013-03-22 21:26:41 -05:00
|
|
|
def_ty_param(did, _)
|
|
|
|
if self.def_map.find(&did.node).map_consume(|x| *x)
|
|
|
|
== Some(def_typaram_binder(item_id)) => {
|
2012-07-26 16:04:03 -05:00
|
|
|
// ok
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-07-26 16:04:03 -05:00
|
|
|
if !is_ty_param {
|
|
|
|
// This was an attempt to access an upvar inside a
|
|
|
|
// named function item. This is not allowed, so we
|
|
|
|
// report an error.
|
|
|
|
|
|
|
|
self.session.span_err(
|
|
|
|
span,
|
|
|
|
~"attempted dynamic environment-capture");
|
|
|
|
} else {
|
|
|
|
// This was an attempt to use a type parameter outside
|
|
|
|
// its scope.
|
|
|
|
|
|
|
|
self.session.span_err(span,
|
|
|
|
~"attempt to use a type \
|
|
|
|
argument out of scope");
|
|
|
|
}
|
|
|
|
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-07-26 16:04:03 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
OpaqueFunctionRibKind => {
|
2012-07-06 21:06:58 -05:00
|
|
|
if !is_ty_param {
|
|
|
|
// This was an attempt to access an upvar inside a
|
|
|
|
// named function item. This is not allowed, so we
|
|
|
|
// report an error.
|
|
|
|
|
2012-07-14 00:57:48 -05:00
|
|
|
self.session.span_err(
|
|
|
|
span,
|
|
|
|
~"attempted dynamic environment-capture");
|
2012-07-06 21:06:58 -05:00
|
|
|
} else {
|
|
|
|
// This was an attempt to use a type parameter outside
|
|
|
|
// its scope.
|
|
|
|
|
|
|
|
self.session.span_err(span,
|
2012-07-14 00:57:48 -05:00
|
|
|
~"attempt to use a type \
|
2012-07-06 21:06:58 -05:00
|
|
|
argument out of scope");
|
|
|
|
}
|
|
|
|
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-10-15 14:27:09 -05:00
|
|
|
ConstantItemRibKind => {
|
|
|
|
// Still doesn't deal with upvars
|
|
|
|
self.session.span_err(span,
|
|
|
|
~"attempt to use a non-constant \
|
|
|
|
value in a constant");
|
|
|
|
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-10-15 14:27:09 -05:00
|
|
|
rib_index += 1;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-20 14:23:37 -05:00
|
|
|
return Some(dl_def(def));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn search_ribs(@mut self,
|
2013-03-07 17:37:14 -06:00
|
|
|
ribs: &mut ~[@Rib],
|
2013-02-21 13:08:50 -06:00
|
|
|
name: ident,
|
|
|
|
span: span,
|
2012-07-06 21:06:58 -05:00
|
|
|
allow_capturing_self: AllowCapturingSelfFlag)
|
2012-08-20 14:23:37 -05:00
|
|
|
-> Option<def_like> {
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4950: This should not use a while loop.
|
|
|
|
// FIXME #4950: Try caching?
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-03-07 17:37:14 -06:00
|
|
|
let mut i = ribs.len();
|
2012-10-15 14:27:09 -05:00
|
|
|
while i != 0 {
|
|
|
|
i -= 1;
|
2013-03-07 17:37:14 -06:00
|
|
|
match ribs[i].bindings.find(&name) {
|
2013-03-22 21:26:41 -05:00
|
|
|
Some(&def_like) => {
|
2012-08-01 19:30:05 -05:00
|
|
|
return self.upvarify(ribs, i, def_like, span,
|
2013-03-07 17:37:14 -06:00
|
|
|
allow_capturing_self);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_crate(@mut self) {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving crate) starting");
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-04-17 11:15:37 -05:00
|
|
|
visit_crate(self.crate, (), mk_vt(@Visitor {
|
2012-05-22 12:54:12 -05:00
|
|
|
visit_item: |item, _context, visitor|
|
2012-08-24 14:17:14 -05:00
|
|
|
self.resolve_item(item, visitor),
|
2012-05-22 12:54:12 -05:00
|
|
|
visit_arm: |arm, _context, visitor|
|
2012-08-24 14:17:14 -05:00
|
|
|
self.resolve_arm(arm, visitor),
|
2012-05-22 12:54:12 -05:00
|
|
|
visit_block: |block, _context, visitor|
|
2012-08-24 14:17:14 -05:00
|
|
|
self.resolve_block(block, visitor),
|
2012-05-22 12:54:12 -05:00
|
|
|
visit_expr: |expr, _context, visitor|
|
2012-08-24 14:17:14 -05:00
|
|
|
self.resolve_expr(expr, visitor),
|
2012-05-22 12:54:12 -05:00
|
|
|
visit_local: |local, _context, visitor|
|
2012-08-24 14:17:14 -05:00
|
|
|
self.resolve_local(local, visitor),
|
2012-05-22 12:54:12 -05:00
|
|
|
visit_ty: |ty, _context, visitor|
|
2012-09-04 15:29:32 -05:00
|
|
|
self.resolve_type(ty, visitor),
|
|
|
|
.. *default_visitor()
|
2012-05-22 12:54:12 -05:00
|
|
|
}));
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_item(@mut self, item: @item, visitor: ResolveVisitor) {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving item) resolving %s",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(item.ident));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-03 17:55:26 -05:00
|
|
|
// Items with the !resolve_unexported attribute are X-ray contexts.
|
|
|
|
// This is used to allow the test runner to run unexported tests.
|
|
|
|
let orig_xray_flag = self.xray_context;
|
2013-03-20 00:17:42 -05:00
|
|
|
if contains_name(attr_metas(item.attrs),
|
2013-01-07 16:16:52 -06:00
|
|
|
~"!resolve_unexported") {
|
2012-07-03 17:55:26 -05:00
|
|
|
self.xray_context = Xray;
|
|
|
|
}
|
|
|
|
|
2013-03-20 00:17:42 -05:00
|
|
|
match item.node {
|
2012-10-15 14:27:09 -05:00
|
|
|
|
|
|
|
// enum item: resolve all the variants' discrs,
|
|
|
|
// then resolve the ty params
|
2013-02-14 23:50:03 -06:00
|
|
|
item_enum(ref enum_def, ref generics) => {
|
2012-12-04 12:50:00 -06:00
|
|
|
for (*enum_def).variants.each() |variant| {
|
2013-03-03 06:33:39 -06:00
|
|
|
for variant.node.disr_expr.each |dis_expr| {
|
2012-10-15 14:27:09 -05:00
|
|
|
// resolve the discriminator expr
|
|
|
|
// as a constant
|
|
|
|
self.with_constant_rib(|| {
|
2012-10-15 15:14:23 -05:00
|
|
|
self.resolve_expr(*dis_expr, visitor);
|
2012-10-15 14:27:09 -05:00
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// n.b. the discr expr gets visted twice.
|
|
|
|
// but maybe it's okay since the first time will signal an
|
|
|
|
// error if there is one? -- tjc
|
2013-01-07 16:16:52 -06:00
|
|
|
do self.with_type_parameter_rib(
|
|
|
|
HasTypeParameters(
|
2013-02-14 23:50:03 -06:00
|
|
|
generics, item.id, 0, NormalRibKind)) {
|
2012-10-15 14:27:09 -05:00
|
|
|
visit_item(item, (), visitor);
|
|
|
|
}
|
|
|
|
}
|
2012-10-15 15:14:23 -05:00
|
|
|
|
2013-02-14 23:50:03 -06:00
|
|
|
item_ty(_, ref generics) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
do self.with_type_parameter_rib
|
2013-02-14 23:50:03 -06:00
|
|
|
(HasTypeParameters(generics, item.id, 0,
|
2012-07-06 21:06:58 -05:00
|
|
|
NormalRibKind))
|
2012-05-22 12:54:12 -05:00
|
|
|
|| {
|
|
|
|
|
|
|
|
visit_item(item, (), visitor);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-14 23:50:03 -06:00
|
|
|
item_impl(ref generics,
|
2012-11-13 21:08:01 -06:00
|
|
|
implemented_traits,
|
|
|
|
self_type,
|
2013-02-14 23:50:03 -06:00
|
|
|
ref methods) => {
|
2012-10-22 19:57:10 -05:00
|
|
|
self.resolve_implementation(item.id,
|
2013-02-14 23:50:03 -06:00
|
|
|
generics,
|
2012-07-18 18:28:31 -05:00
|
|
|
implemented_traits,
|
2012-10-22 19:57:10 -05:00
|
|
|
self_type,
|
2013-02-14 23:50:03 -06:00
|
|
|
*methods,
|
2012-10-22 19:57:10 -05:00
|
|
|
visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-14 23:50:03 -06:00
|
|
|
item_trait(ref generics, ref traits, ref methods) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Create a new rib for the self type.
|
|
|
|
let self_type_rib = @Rib(NormalRibKind);
|
2013-03-07 17:37:14 -06:00
|
|
|
self.type_ribs.push(self_type_rib);
|
2013-01-09 16:12:28 -06:00
|
|
|
self_type_rib.bindings.insert(self.type_self_ident,
|
|
|
|
dl_def(def_self_ty(item.id)));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-31 12:27:51 -05:00
|
|
|
// Create a new rib for the trait-wide type parameters.
|
2012-05-22 12:54:12 -05:00
|
|
|
do self.with_type_parameter_rib
|
2013-02-14 23:50:03 -06:00
|
|
|
(HasTypeParameters(generics, item.id, 0,
|
2012-07-11 17:00:40 -05:00
|
|
|
NormalRibKind)) {
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-14 23:50:03 -06:00
|
|
|
self.resolve_type_parameters(&generics.ty_params,
|
2013-01-07 16:16:52 -06:00
|
|
|
visitor);
|
2012-07-12 20:04:40 -05:00
|
|
|
|
2012-08-03 17:02:01 -05:00
|
|
|
// Resolve derived traits.
|
|
|
|
for traits.each |trt| {
|
|
|
|
match self.resolve_path(trt.path, TypeNS, true,
|
|
|
|
visitor) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None =>
|
2012-08-03 17:02:01 -05:00
|
|
|
self.session.span_err(trt.path.span,
|
|
|
|
~"attempt to derive a \
|
|
|
|
nonexistent trait"),
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def) => {
|
2012-08-03 17:02:01 -05:00
|
|
|
// Write a mapping from the trait ID to the
|
|
|
|
// definition of the trait into the definition
|
|
|
|
// map.
|
|
|
|
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving trait) found trait def: \
|
|
|
|
%?", def);
|
2012-08-03 17:02:01 -05:00
|
|
|
|
|
|
|
self.record_def(trt.ref_id, def);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-12-04 12:50:00 -06:00
|
|
|
for (*methods).each |method| {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Create a new rib for the method-specific type
|
|
|
|
// parameters.
|
|
|
|
//
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4951: Do we need a node ID here?
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-09-19 18:55:01 -05:00
|
|
|
match *method {
|
2012-12-04 12:50:00 -06:00
|
|
|
required(ref ty_m) => {
|
2012-07-10 15:44:20 -05:00
|
|
|
do self.with_type_parameter_rib
|
2013-02-14 23:50:03 -06:00
|
|
|
(HasTypeParameters(&ty_m.generics,
|
2012-05-22 12:54:12 -05:00
|
|
|
item.id,
|
2013-02-14 23:50:03 -06:00
|
|
|
generics.ty_params.len(),
|
2012-07-26 16:04:03 -05:00
|
|
|
MethodRibKind(item.id, Required))) {
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-10 15:44:20 -05:00
|
|
|
// Resolve the method-specific type
|
|
|
|
// parameters.
|
2013-01-07 16:16:52 -06:00
|
|
|
self.resolve_type_parameters(
|
2013-02-14 23:50:03 -06:00
|
|
|
&ty_m.generics.ty_params,
|
2013-01-07 16:16:52 -06:00
|
|
|
visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-14 23:50:03 -06:00
|
|
|
for ty_m.decl.inputs.each |argument| {
|
2012-07-10 15:44:20 -05:00
|
|
|
self.resolve_type(argument.ty, visitor);
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-12-04 23:13:02 -06:00
|
|
|
self.resolve_type(ty_m.decl.output, visitor);
|
2012-07-10 15:44:20 -05:00
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
provided(m) => {
|
2012-07-26 16:04:03 -05:00
|
|
|
self.resolve_method(MethodRibKind(item.id,
|
|
|
|
Provided(m.id)),
|
2012-07-10 15:44:20 -05:00
|
|
|
m,
|
2013-02-14 23:50:03 -06:00
|
|
|
generics.ty_params.len(),
|
2012-07-10 15:44:20 -05:00
|
|
|
visitor)
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-07 17:37:14 -06:00
|
|
|
self.type_ribs.pop();
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-20 00:17:42 -05:00
|
|
|
item_struct(ref struct_def, ref generics) => {
|
2012-12-10 15:47:54 -06:00
|
|
|
self.resolve_struct(item.id,
|
2013-02-14 23:50:03 -06:00
|
|
|
generics,
|
|
|
|
struct_def.fields,
|
2013-04-17 11:15:37 -05:00
|
|
|
&struct_def.dtor,
|
2013-02-14 23:50:03 -06:00
|
|
|
visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-18 23:25:44 -06:00
|
|
|
item_mod(ref module_) => {
|
2012-08-20 14:23:37 -05:00
|
|
|
do self.with_scope(Some(item.ident)) {
|
2012-07-31 18:38:41 -05:00
|
|
|
self.resolve_module(module_, item.span, item.ident,
|
2012-05-22 12:54:12 -05:00
|
|
|
item.id, visitor);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-20 00:17:42 -05:00
|
|
|
item_foreign_mod(ref foreign_module) => {
|
2012-08-20 14:23:37 -05:00
|
|
|
do self.with_scope(Some(item.ident)) {
|
2012-05-22 12:54:12 -05:00
|
|
|
for foreign_module.items.each |foreign_item| {
|
2013-02-14 23:50:03 -06:00
|
|
|
match foreign_item.node {
|
|
|
|
foreign_item_fn(_, _, ref generics) => {
|
|
|
|
self.with_type_parameter_rib(
|
|
|
|
HasTypeParameters(
|
|
|
|
generics, foreign_item.id, 0,
|
|
|
|
NormalRibKind),
|
|
|
|
|| visit_foreign_item(*foreign_item, (),
|
|
|
|
visitor));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-26 14:12:05 -05:00
|
|
|
foreign_item_const(_) => {
|
2012-09-19 18:55:01 -05:00
|
|
|
visit_foreign_item(*foreign_item, (),
|
2012-08-25 17:09:33 -05:00
|
|
|
visitor);
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-13 21:25:28 -05:00
|
|
|
item_fn(ref fn_decl, _, _, ref generics, ref block) => {
|
2012-07-03 14:20:15 -05:00
|
|
|
// If this is the main function, we must record it in the
|
|
|
|
// session.
|
2013-04-09 03:16:06 -05:00
|
|
|
|
2013-01-23 22:13:52 -06:00
|
|
|
// FIXME #4404 android JNI hacks
|
2013-02-04 16:02:01 -06:00
|
|
|
if !*self.session.building_library ||
|
2013-01-23 22:13:52 -06:00
|
|
|
self.session.targ_cfg.os == session::os_android {
|
|
|
|
|
2013-01-11 03:08:01 -06:00
|
|
|
if self.attr_main_fn.is_none() &&
|
|
|
|
item.ident == special_idents::main {
|
2012-07-03 14:20:15 -05:00
|
|
|
|
2013-01-11 03:08:01 -06:00
|
|
|
self.main_fns.push(Some((item.id, item.span)));
|
|
|
|
}
|
2012-07-03 14:20:15 -05:00
|
|
|
|
2013-01-11 03:08:01 -06:00
|
|
|
if attrs_contains_name(item.attrs, ~"main") {
|
|
|
|
if self.attr_main_fn.is_none() {
|
|
|
|
self.attr_main_fn = Some((item.id, item.span));
|
|
|
|
} else {
|
|
|
|
self.session.span_err(
|
|
|
|
item.span,
|
|
|
|
~"multiple 'main' functions");
|
|
|
|
}
|
|
|
|
}
|
2013-04-09 03:16:06 -05:00
|
|
|
|
|
|
|
if attrs_contains_name(item.attrs, ~"start") {
|
|
|
|
if self.start_fn.is_none() {
|
|
|
|
self.start_fn = Some((item.id, item.span));
|
|
|
|
} else {
|
|
|
|
self.session.span_err(
|
|
|
|
item.span,
|
|
|
|
~"multiple 'start' functions");
|
|
|
|
}
|
|
|
|
}
|
2012-07-03 14:20:15 -05:00
|
|
|
}
|
|
|
|
|
2012-07-06 21:06:58 -05:00
|
|
|
self.resolve_function(OpaqueFunctionRibKind,
|
2013-03-20 00:17:42 -05:00
|
|
|
Some(fn_decl),
|
2012-07-06 21:06:58 -05:00
|
|
|
HasTypeParameters
|
2013-02-14 23:50:03 -06:00
|
|
|
(generics,
|
2012-07-06 21:06:58 -05:00
|
|
|
item.id,
|
2012-11-29 14:08:40 -06:00
|
|
|
0,
|
2012-07-06 21:06:58 -05:00
|
|
|
OpaqueFunctionRibKind),
|
2013-02-18 00:20:36 -06:00
|
|
|
block,
|
2012-05-22 12:54:12 -05:00
|
|
|
NoSelfBinding,
|
|
|
|
visitor);
|
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
item_const(*) => {
|
2012-10-15 14:27:09 -05:00
|
|
|
self.with_constant_rib(|| {
|
|
|
|
visit_item(item, (), visitor);
|
|
|
|
});
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-07-05 14:10:33 -05:00
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
item_mac(*) => {
|
2013-02-11 21:26:38 -06:00
|
|
|
fail!(~"item macros unimplemented")
|
2012-07-05 14:10:33 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-07-03 17:55:26 -05:00
|
|
|
|
|
|
|
self.xray_context = orig_xray_flag;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn with_type_parameter_rib(@mut self,
|
|
|
|
type_parameters: TypeParameters,
|
2013-03-07 16:38:38 -06:00
|
|
|
f: &fn()) {
|
2012-08-06 14:34:08 -05:00
|
|
|
match type_parameters {
|
2013-02-14 23:50:03 -06:00
|
|
|
HasTypeParameters(generics, node_id, initial_index,
|
2012-08-03 21:59:04 -05:00
|
|
|
rib_kind) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-06 21:06:58 -05:00
|
|
|
let function_type_rib = @Rib(rib_kind);
|
2013-02-14 23:50:03 -06:00
|
|
|
self.type_ribs.push(function_type_rib);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-14 23:50:03 -06:00
|
|
|
for generics.ty_params.eachi |index, type_parameter| {
|
2012-07-18 18:18:02 -05:00
|
|
|
let name = type_parameter.ident;
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("with_type_parameter_rib: %d %d", node_id,
|
|
|
|
type_parameter.id);
|
2012-05-22 12:54:12 -05:00
|
|
|
let def_like = dl_def(def_ty_param
|
|
|
|
(local_def(type_parameter.id),
|
|
|
|
index + initial_index));
|
2012-07-26 16:04:03 -05:00
|
|
|
// Associate this type parameter with
|
|
|
|
// the item that bound it
|
|
|
|
self.record_def(type_parameter.id,
|
|
|
|
def_typaram_binder(node_id));
|
2013-02-14 23:50:03 -06:00
|
|
|
function_type_rib.bindings.insert(name, def_like);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
NoTypeParameters => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
f();
|
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match type_parameters {
|
2012-08-26 14:12:05 -05:00
|
|
|
HasTypeParameters(*) => {
|
2013-02-14 23:50:03 -06:00
|
|
|
self.type_ribs.pop();
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-14 21:20:56 -05:00
|
|
|
NoTypeParameters => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-07 16:38:38 -06:00
|
|
|
fn with_label_rib(@mut self, f: &fn()) {
|
2013-03-07 17:37:14 -06:00
|
|
|
self.label_ribs.push(@Rib(NormalRibKind));
|
2012-08-14 21:20:56 -05:00
|
|
|
f();
|
2013-03-07 17:37:14 -06:00
|
|
|
self.label_ribs.pop();
|
2012-08-14 21:20:56 -05:00
|
|
|
}
|
2013-02-21 13:08:50 -06:00
|
|
|
|
2013-03-07 16:38:38 -06:00
|
|
|
fn with_constant_rib(@mut self, f: &fn()) {
|
2013-03-07 17:37:14 -06:00
|
|
|
self.value_ribs.push(@Rib(ConstantItemRibKind));
|
2012-10-15 14:27:09 -05:00
|
|
|
f();
|
2013-03-07 17:37:14 -06:00
|
|
|
self.value_ribs.pop();
|
2012-10-15 14:27:09 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_function(@mut self,
|
|
|
|
rib_kind: RibKind,
|
2013-03-20 00:17:42 -05:00
|
|
|
optional_declaration: Option<&fn_decl>,
|
2012-05-22 12:54:12 -05:00
|
|
|
type_parameters: TypeParameters,
|
2013-02-18 00:20:36 -06:00
|
|
|
block: &blk,
|
2012-05-22 12:54:12 -05:00
|
|
|
self_binding: SelfBinding,
|
|
|
|
visitor: ResolveVisitor) {
|
|
|
|
// Create a value rib for the function.
|
|
|
|
let function_value_rib = @Rib(rib_kind);
|
2013-03-07 17:37:14 -06:00
|
|
|
self.value_ribs.push(function_value_rib);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-14 21:20:56 -05:00
|
|
|
// Create a label rib for the function.
|
|
|
|
let function_label_rib = @Rib(rib_kind);
|
2013-03-07 17:37:14 -06:00
|
|
|
self.label_ribs.push(function_label_rib);
|
2012-08-14 21:20:56 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// If this function has type parameters, add them now.
|
2012-07-04 14:04:28 -05:00
|
|
|
do self.with_type_parameter_rib(type_parameters) {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Resolve the type parameters.
|
2012-08-06 14:34:08 -05:00
|
|
|
match type_parameters {
|
2012-08-03 21:59:04 -05:00
|
|
|
NoTypeParameters => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
2013-02-14 23:50:03 -06:00
|
|
|
HasTypeParameters(ref generics, _, _, _) => {
|
|
|
|
self.resolve_type_parameters(&generics.ty_params,
|
2013-01-07 16:16:52 -06:00
|
|
|
visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add self to the rib, if necessary.
|
2012-08-06 14:34:08 -05:00
|
|
|
match self_binding {
|
2012-08-03 21:59:04 -05:00
|
|
|
NoSelfBinding => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
2012-12-10 13:58:37 -06:00
|
|
|
HasSelfBinding(self_node_id, is_implicit) => {
|
|
|
|
let def_like = dl_def(def_self(self_node_id,
|
|
|
|
is_implicit));
|
2012-09-19 20:52:49 -05:00
|
|
|
(*function_value_rib).bindings.insert(self.self_ident,
|
2012-05-22 12:54:12 -05:00
|
|
|
def_like);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add each argument to the rib.
|
2012-08-06 14:34:08 -05:00
|
|
|
match optional_declaration {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(declaration) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
for declaration.inputs.each |argument| {
|
2013-04-24 03:29:46 -05:00
|
|
|
let binding_mode = ArgumentIrrefutableMode;
|
2013-01-03 22:20:56 -06:00
|
|
|
let mutability =
|
|
|
|
if argument.is_mutbl {Mutable} else {Immutable};
|
2012-11-06 20:41:06 -06:00
|
|
|
self.resolve_pattern(argument.pat,
|
|
|
|
binding_mode,
|
2013-01-03 22:20:56 -06:00
|
|
|
mutability,
|
2012-11-06 20:41:06 -06:00
|
|
|
None,
|
|
|
|
visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
self.resolve_type(argument.ty, visitor);
|
|
|
|
|
2012-11-06 20:41:06 -06:00
|
|
|
debug!("(resolving function) recorded argument");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
self.resolve_type(declaration.output, visitor);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Resolve the function body.
|
|
|
|
self.resolve_block(block, visitor);
|
|
|
|
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving function) leaving function");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-07 17:37:14 -06:00
|
|
|
self.label_ribs.pop();
|
|
|
|
self.value_ribs.pop();
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_type_parameters(@mut self,
|
2013-02-14 23:50:03 -06:00
|
|
|
type_parameters: &OptVec<TyParam>,
|
2012-05-22 12:54:12 -05:00
|
|
|
visitor: ResolveVisitor) {
|
|
|
|
for type_parameters.each |type_parameter| {
|
2013-01-10 13:16:54 -06:00
|
|
|
for type_parameter.bounds.each |&bound| {
|
|
|
|
match bound {
|
2013-03-27 05:16:28 -05:00
|
|
|
TraitTyParamBound(tref) => {
|
|
|
|
self.resolve_trait_reference(tref, visitor)
|
|
|
|
}
|
2013-01-10 13:16:54 -06:00
|
|
|
RegionTyParamBound => {}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-27 05:16:28 -05:00
|
|
|
fn resolve_trait_reference(@mut self,
|
|
|
|
trait_reference: &trait_ref,
|
|
|
|
visitor: ResolveVisitor) {
|
|
|
|
match self.resolve_path(trait_reference.path, TypeNS, true, visitor) {
|
|
|
|
None => {
|
|
|
|
self.session.span_err(trait_reference.path.span,
|
|
|
|
~"attempt to implement an \
|
|
|
|
unknown trait");
|
|
|
|
}
|
|
|
|
Some(def) => {
|
|
|
|
self.record_def(trait_reference.ref_id, def);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_struct(@mut self,
|
|
|
|
id: node_id,
|
2013-02-14 23:50:03 -06:00
|
|
|
generics: &Generics,
|
|
|
|
fields: &[@struct_field],
|
2013-04-17 11:15:37 -05:00
|
|
|
optional_destructor: &Option<struct_dtor>,
|
2013-02-21 13:08:50 -06:00
|
|
|
visitor: ResolveVisitor) {
|
2012-05-22 12:54:12 -05:00
|
|
|
// If applicable, create a rib for the type parameters.
|
|
|
|
do self.with_type_parameter_rib(HasTypeParameters
|
2013-02-14 23:50:03 -06:00
|
|
|
(generics, id, 0,
|
2012-10-15 17:29:45 -05:00
|
|
|
OpaqueFunctionRibKind)) {
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Resolve the type parameters.
|
2013-02-14 23:50:03 -06:00
|
|
|
self.resolve_type_parameters(&generics.ty_params, visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-15 17:53:58 -05:00
|
|
|
// Resolve fields.
|
|
|
|
for fields.each |field| {
|
|
|
|
self.resolve_type(field.node.ty, visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Resolve the destructor, if applicable.
|
2013-04-17 11:15:37 -05:00
|
|
|
match *optional_destructor {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
2012-12-04 12:50:00 -06:00
|
|
|
Some(ref destructor) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.resolve_function(NormalRibKind,
|
2012-08-20 14:23:37 -05:00
|
|
|
None,
|
2012-05-22 12:54:12 -05:00
|
|
|
NoTypeParameters,
|
2013-02-18 00:20:36 -06:00
|
|
|
&destructor.node.body,
|
2012-05-22 12:54:12 -05:00
|
|
|
HasSelfBinding
|
2012-12-10 13:58:37 -06:00
|
|
|
((*destructor).node.self_id,
|
|
|
|
true),
|
2012-05-22 12:54:12 -05:00
|
|
|
visitor);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-10 15:44:20 -05:00
|
|
|
// Does this really need to take a RibKind or is it always going
|
|
|
|
// to be NormalRibKind?
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_method(@mut self,
|
|
|
|
rib_kind: RibKind,
|
2012-07-10 15:44:20 -05:00
|
|
|
method: @method,
|
|
|
|
outer_type_parameter_count: uint,
|
|
|
|
visitor: ResolveVisitor) {
|
2013-02-14 23:50:03 -06:00
|
|
|
let method_generics = &method.generics;
|
2012-07-10 15:44:20 -05:00
|
|
|
let type_parameters =
|
2013-02-14 23:50:03 -06:00
|
|
|
HasTypeParameters(method_generics,
|
2012-07-10 15:44:20 -05:00
|
|
|
method.id,
|
|
|
|
outer_type_parameter_count,
|
|
|
|
rib_kind);
|
2012-08-02 18:01:38 -05:00
|
|
|
// we only have self ty if it is a non static method
|
|
|
|
let self_binding = match method.self_ty.node {
|
|
|
|
sty_static => { NoSelfBinding }
|
2012-12-10 13:58:37 -06:00
|
|
|
_ => { HasSelfBinding(method.self_id, false) }
|
2012-08-02 18:01:38 -05:00
|
|
|
};
|
|
|
|
|
2012-07-10 15:44:20 -05:00
|
|
|
self.resolve_function(rib_kind,
|
2013-03-20 00:17:42 -05:00
|
|
|
Some(&method.decl),
|
2012-07-10 15:44:20 -05:00
|
|
|
type_parameters,
|
2013-02-18 00:20:36 -06:00
|
|
|
&method.body,
|
2012-08-02 18:01:38 -05:00
|
|
|
self_binding,
|
2012-07-10 15:44:20 -05:00
|
|
|
visitor);
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_implementation(@mut self,
|
|
|
|
id: node_id,
|
2013-02-14 23:50:03 -06:00
|
|
|
generics: &Generics,
|
2012-09-07 17:11:26 -05:00
|
|
|
opt_trait_reference: Option<@trait_ref>,
|
2012-10-15 16:56:42 -05:00
|
|
|
self_type: @Ty,
|
2013-03-10 10:02:16 -05:00
|
|
|
methods: &[@method],
|
2012-05-22 12:54:12 -05:00
|
|
|
visitor: ResolveVisitor) {
|
|
|
|
// If applicable, create a rib for the type parameters.
|
2013-02-14 23:50:03 -06:00
|
|
|
let outer_type_parameter_count = generics.ty_params.len();
|
2012-05-22 12:54:12 -05:00
|
|
|
do self.with_type_parameter_rib(HasTypeParameters
|
2013-02-14 23:50:03 -06:00
|
|
|
(generics, id, 0,
|
2012-07-11 17:00:40 -05:00
|
|
|
NormalRibKind)) {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Resolve the type parameters.
|
2013-02-14 23:50:03 -06:00
|
|
|
self.resolve_type_parameters(&generics.ty_params,
|
2013-01-07 16:16:52 -06:00
|
|
|
visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-07-31 12:27:51 -05:00
|
|
|
// Resolve the trait reference, if necessary.
|
2013-03-07 17:37:14 -06:00
|
|
|
let original_trait_refs;
|
2012-09-07 17:11:26 -05:00
|
|
|
match opt_trait_reference {
|
2012-10-15 20:04:15 -05:00
|
|
|
Some(trait_reference) => {
|
2013-03-27 05:16:28 -05:00
|
|
|
self.resolve_trait_reference(trait_reference, visitor);
|
2012-07-11 17:00:40 -05:00
|
|
|
|
2012-10-15 20:04:15 -05:00
|
|
|
// Record the current set of trait references.
|
2013-03-27 05:16:28 -05:00
|
|
|
let mut new_trait_refs = ~[];
|
|
|
|
for self.def_map.find(&trait_reference.ref_id).each |&def| {
|
|
|
|
new_trait_refs.push(def_id_of_def(*def));
|
|
|
|
}
|
|
|
|
original_trait_refs = Some(util::replace(
|
|
|
|
&mut self.current_trait_refs,
|
|
|
|
Some(new_trait_refs)));
|
2013-03-07 17:37:14 -06:00
|
|
|
}
|
|
|
|
None => {
|
|
|
|
original_trait_refs = None;
|
2012-10-15 20:04:15 -05:00
|
|
|
}
|
2012-09-07 17:11:26 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Resolve the self type.
|
|
|
|
self.resolve_type(self_type, visitor);
|
|
|
|
|
2012-11-13 21:08:01 -06:00
|
|
|
for methods.each |method| {
|
|
|
|
// We also need a new scope for the method-specific
|
|
|
|
// type parameters.
|
|
|
|
self.resolve_method(MethodRibKind(
|
|
|
|
id,
|
|
|
|
Provided(method.id)),
|
|
|
|
*method,
|
|
|
|
outer_type_parameter_count,
|
|
|
|
visitor);
|
2012-08-02 18:01:38 -05:00
|
|
|
/*
|
2012-10-22 19:57:10 -05:00
|
|
|
let borrowed_type_parameters = &method.tps;
|
|
|
|
self.resolve_function(MethodRibKind(
|
|
|
|
id,
|
|
|
|
Provided(method.id)),
|
|
|
|
Some(@method.decl),
|
|
|
|
HasTypeParameters
|
|
|
|
(borrowed_type_parameters,
|
|
|
|
method.id,
|
|
|
|
outer_type_parameter_count,
|
|
|
|
NormalRibKind),
|
|
|
|
method.body,
|
|
|
|
HasSelfBinding(method.self_id),
|
|
|
|
visitor);
|
2012-08-02 18:01:38 -05:00
|
|
|
*/
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-07-11 17:00:40 -05:00
|
|
|
|
2012-07-18 18:28:31 -05:00
|
|
|
// Restore the original trait references.
|
2013-03-07 17:37:14 -06:00
|
|
|
match original_trait_refs {
|
|
|
|
Some(r) => { self.current_trait_refs = r; }
|
|
|
|
None => ()
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_module(@mut self,
|
2013-02-18 23:25:44 -06:00
|
|
|
module_: &_mod,
|
2013-02-21 13:08:50 -06:00
|
|
|
span: span,
|
|
|
|
_name: ident,
|
|
|
|
id: node_id,
|
2012-05-22 12:54:12 -05:00
|
|
|
visitor: ResolveVisitor) {
|
|
|
|
// Write the implementations in scope into the module metadata.
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving module) resolving module ID %d", id);
|
2012-07-31 18:38:41 -05:00
|
|
|
visit_mod(module_, span, id, (), visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_local(@mut self, local: @local, visitor: ResolveVisitor) {
|
2013-01-03 22:20:56 -06:00
|
|
|
let mutability = if local.node.is_mutbl {Mutable} else {Immutable};
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Resolve the type.
|
|
|
|
self.resolve_type(local.node.ty, visitor);
|
|
|
|
|
|
|
|
// Resolve the initializer, if necessary.
|
2012-08-06 14:34:08 -05:00
|
|
|
match local.node.init {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(initializer) => {
|
2012-10-23 13:28:20 -05:00
|
|
|
self.resolve_expr(initializer, visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Resolve the pattern.
|
2012-11-06 20:41:06 -06:00
|
|
|
self.resolve_pattern(local.node.pat, LocalIrrefutableMode, mutability,
|
2012-08-20 14:23:37 -05:00
|
|
|
None, visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn binding_mode_map(@mut self, pat: @pat) -> BindingMap {
|
2013-04-03 08:28:36 -05:00
|
|
|
let mut result = HashMap::new();
|
2013-03-22 21:26:41 -05:00
|
|
|
do pat_bindings(self.def_map, pat) |binding_mode, _id, sp, path| {
|
2012-08-06 09:20:23 -05:00
|
|
|
let ident = path_to_ident(path);
|
|
|
|
result.insert(ident,
|
|
|
|
binding_info {span: sp,
|
|
|
|
binding_mode: binding_mode});
|
|
|
|
}
|
|
|
|
return result;
|
2012-07-10 20:24:41 -05:00
|
|
|
}
|
|
|
|
|
2013-02-18 00:20:36 -06:00
|
|
|
fn check_consistent_bindings(@mut self, arm: &arm) {
|
2012-08-06 09:20:23 -05:00
|
|
|
if arm.pats.len() == 0 { return; }
|
|
|
|
let map_0 = self.binding_mode_map(arm.pats[0]);
|
2012-09-21 20:43:30 -05:00
|
|
|
for arm.pats.eachi() |i, p| {
|
|
|
|
let map_i = self.binding_mode_map(*p);
|
2012-08-06 09:20:23 -05:00
|
|
|
|
2013-04-06 10:22:36 -05:00
|
|
|
for map_0.each |&key, &binding_0| {
|
2013-02-03 22:29:17 -06:00
|
|
|
match map_i.find(&key) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-08-06 09:20:23 -05:00
|
|
|
self.session.span_err(
|
|
|
|
p.span,
|
2012-08-22 19:24:52 -05:00
|
|
|
fmt!("variable `%s` from pattern #1 is \
|
2012-08-06 09:20:23 -05:00
|
|
|
not bound in pattern #%u",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(key), i + 1));
|
2012-08-06 09:20:23 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(binding_i) => {
|
2012-08-06 09:20:23 -05:00
|
|
|
if binding_0.binding_mode != binding_i.binding_mode {
|
|
|
|
self.session.span_err(
|
|
|
|
binding_i.span,
|
2012-08-22 19:24:52 -05:00
|
|
|
fmt!("variable `%s` is bound with different \
|
2012-08-06 09:20:23 -05:00
|
|
|
mode in pattern #%u than in pattern #1",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(key), i + 1));
|
2012-08-06 09:20:23 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-04-06 10:22:36 -05:00
|
|
|
for map_i.each |&key, &binding| {
|
2013-02-08 16:08:02 -06:00
|
|
|
if !map_0.contains_key(&key) {
|
2012-08-06 09:20:23 -05:00
|
|
|
self.session.span_err(
|
|
|
|
binding.span,
|
2012-08-22 19:24:52 -05:00
|
|
|
fmt!("variable `%s` from pattern #%u is \
|
2012-08-06 09:20:23 -05:00
|
|
|
not bound in pattern #1",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(key), i + 1));
|
2012-08-06 09:20:23 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-07-10 20:24:41 -05:00
|
|
|
}
|
|
|
|
|
2013-02-18 00:20:36 -06:00
|
|
|
fn resolve_arm(@mut self, arm: &arm, visitor: ResolveVisitor) {
|
2013-03-07 17:37:14 -06:00
|
|
|
self.value_ribs.push(@Rib(NormalRibKind));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-04-03 08:28:36 -05:00
|
|
|
let bindings_list = @mut HashMap::new();
|
2012-05-22 12:54:12 -05:00
|
|
|
for arm.pats.each |pattern| {
|
2012-09-19 18:55:01 -05:00
|
|
|
self.resolve_pattern(*pattern, RefutableMode, Immutable,
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(bindings_list), visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-07-10 20:24:41 -05:00
|
|
|
// This has to happen *after* we determine which
|
|
|
|
// pat_idents are variants
|
|
|
|
self.check_consistent_bindings(arm);
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
visit_expr_opt(arm.guard, (), visitor);
|
2013-02-18 00:20:36 -06:00
|
|
|
self.resolve_block(&arm.body, visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-03-07 17:37:14 -06:00
|
|
|
self.value_ribs.pop();
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-18 00:20:36 -06:00
|
|
|
fn resolve_block(@mut self, block: &blk, visitor: ResolveVisitor) {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving block) entering block");
|
2013-03-07 17:37:14 -06:00
|
|
|
self.value_ribs.push(@Rib(NormalRibKind));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Move down in the graph, if there's an anonymous module rooted here.
|
|
|
|
let orig_module = self.current_module;
|
2013-02-03 22:29:17 -06:00
|
|
|
match self.current_module.anonymous_children.find(&block.node.id) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => { /* Nothing to do. */ }
|
2013-03-22 21:26:41 -05:00
|
|
|
Some(&anonymous_module) => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving block) found anonymous module, moving \
|
|
|
|
down");
|
2012-05-22 12:54:12 -05:00
|
|
|
self.current_module = anonymous_module;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Descend into the block.
|
|
|
|
visit_block(block, (), visitor);
|
|
|
|
|
|
|
|
// Move back up.
|
|
|
|
self.current_module = orig_module;
|
|
|
|
|
2013-03-07 17:37:14 -06:00
|
|
|
self.value_ribs.pop();
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving block) leaving block");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_type(@mut self, ty: @Ty, visitor: ResolveVisitor) {
|
2012-08-06 14:34:08 -05:00
|
|
|
match ty.node {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Like path expressions, the interpretation of path types depends
|
|
|
|
// on whether the path has multiple elements in it or not.
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
ty_path(path, path_id) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// This is a path in the type namespace. Walk through scopes
|
|
|
|
// scopes looking for it.
|
2012-10-15 16:56:42 -05:00
|
|
|
let mut result_def = None;
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-10-15 16:56:42 -05:00
|
|
|
// First, check to see whether the name is a primitive type.
|
2012-10-17 00:14:59 -05:00
|
|
|
if path.idents.len() == 1 {
|
2013-03-05 21:39:18 -06:00
|
|
|
let name = *path.idents.last();
|
2012-10-15 16:56:42 -05:00
|
|
|
|
|
|
|
match self.primitive_type_table
|
|
|
|
.primitive_types
|
2013-02-03 22:29:17 -06:00
|
|
|
.find(&name) {
|
2012-10-15 16:56:42 -05:00
|
|
|
|
2013-03-22 21:26:41 -05:00
|
|
|
Some(&primitive_type) => {
|
2012-10-15 16:56:42 -05:00
|
|
|
result_def =
|
|
|
|
Some(def_prim_ty(primitive_type));
|
|
|
|
}
|
|
|
|
None => {
|
|
|
|
// Continue.
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match result_def {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-10-15 16:56:42 -05:00
|
|
|
match self.resolve_path(path, TypeNS, true, visitor) {
|
|
|
|
Some(def) => {
|
|
|
|
debug!("(resolving type) resolved `%s` to \
|
2012-10-18 15:29:34 -05:00
|
|
|
type %?",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(
|
2013-03-05 21:39:18 -06:00
|
|
|
*path.idents.last()),
|
2012-10-18 15:29:34 -05:00
|
|
|
def);
|
2012-10-15 16:56:42 -05:00
|
|
|
result_def = Some(def);
|
|
|
|
}
|
|
|
|
None => {
|
|
|
|
result_def = None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-10-15 16:56:42 -05:00
|
|
|
Some(_) => {
|
|
|
|
// Continue.
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-20 00:17:42 -05:00
|
|
|
match result_def {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Write the result into the def map.
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving type) writing resolution for `%s` \
|
2012-05-22 12:54:12 -05:00
|
|
|
(id %d)",
|
2012-12-29 12:25:09 -06:00
|
|
|
self.idents_to_str(path.idents),
|
2012-08-22 19:24:52 -05:00
|
|
|
path_id);
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_def(path_id, def);
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.session.span_err
|
2012-08-22 19:24:52 -05:00
|
|
|
(ty.span, fmt!("use of undeclared type name `%s`",
|
2012-12-29 12:25:09 -06:00
|
|
|
self.idents_to_str(path.idents)));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Just resolve embedded types.
|
|
|
|
visit_ty(ty, (), visitor);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_pattern(@mut self,
|
|
|
|
pattern: @pat,
|
2012-05-22 12:54:12 -05:00
|
|
|
mode: PatternBindingMode,
|
|
|
|
mutability: Mutability,
|
2012-07-27 15:03:04 -05:00
|
|
|
// Maps idents to the node ID for the (outermost)
|
|
|
|
// pattern that binds them
|
2013-04-03 08:28:36 -05:00
|
|
|
bindings_list: Option<@mut HashMap<ident,node_id>>,
|
2012-05-22 12:54:12 -05:00
|
|
|
visitor: ResolveVisitor) {
|
2012-07-27 15:03:04 -05:00
|
|
|
let pat_id = pattern.id;
|
2012-05-22 12:54:12 -05:00
|
|
|
do walk_pat(pattern) |pattern| {
|
2012-08-06 14:34:08 -05:00
|
|
|
match pattern.node {
|
2012-08-02 18:00:45 -05:00
|
|
|
pat_ident(binding_mode, path, _)
|
2012-11-29 14:08:40 -06:00
|
|
|
if !path.global && path.idents.len() == 1 => {
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// The meaning of pat_ident with no type parameters
|
2012-10-30 17:53:06 -05:00
|
|
|
// depends on whether an enum variant or unit-like struct
|
|
|
|
// with that name is in scope. The probing lookup has to
|
|
|
|
// be careful not to emit spurious errors. Only matching
|
|
|
|
// patterns (match) can match nullary variants or
|
|
|
|
// unit-like structs. For binding patterns (let), matching
|
|
|
|
// such a value is simply disallowed (since it's rarely
|
|
|
|
// what you want).
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-09-19 20:52:49 -05:00
|
|
|
let ident = path.idents[0];
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-10-30 17:53:06 -05:00
|
|
|
match self.resolve_bare_identifier_pattern(ident) {
|
|
|
|
FoundStructOrEnumVariant(def)
|
|
|
|
if mode == RefutableMode => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving pattern) resolving `%s` to \
|
2012-10-30 17:53:06 -05:00
|
|
|
struct or enum variant",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(ident));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-01-24 18:24:45 -06:00
|
|
|
self.enforce_default_binding_mode(
|
|
|
|
pattern,
|
|
|
|
binding_mode,
|
|
|
|
"an enum variant");
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_def(pattern.id, def);
|
|
|
|
}
|
2012-10-30 17:53:06 -05:00
|
|
|
FoundStructOrEnumVariant(_) => {
|
2012-07-06 21:06:58 -05:00
|
|
|
self.session.span_err(pattern.span,
|
2012-08-22 19:24:52 -05:00
|
|
|
fmt!("declaration of `%s` \
|
2012-07-06 21:06:58 -05:00
|
|
|
shadows an enum \
|
2012-10-30 17:53:06 -05:00
|
|
|
variant or unit-like \
|
|
|
|
struct in scope",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session
|
|
|
|
.str_of(ident)));
|
2012-07-06 21:06:58 -05:00
|
|
|
}
|
2012-11-13 00:10:15 -06:00
|
|
|
FoundConst(def) if mode == RefutableMode => {
|
|
|
|
debug!("(resolving pattern) resolving `%s` to \
|
|
|
|
constant",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(ident));
|
2012-11-13 00:10:15 -06:00
|
|
|
|
2013-01-24 18:24:45 -06:00
|
|
|
self.enforce_default_binding_mode(
|
|
|
|
pattern,
|
|
|
|
binding_mode,
|
|
|
|
"a constant");
|
2012-11-13 00:10:15 -06:00
|
|
|
self.record_def(pattern.id, def);
|
|
|
|
}
|
|
|
|
FoundConst(_) => {
|
2012-07-06 21:06:58 -05:00
|
|
|
self.session.span_err(pattern.span,
|
2012-11-13 00:10:15 -06:00
|
|
|
~"only refutable patterns \
|
|
|
|
allowed here");
|
2012-07-06 21:06:58 -05:00
|
|
|
}
|
2012-10-30 17:53:06 -05:00
|
|
|
BareIdentifierPatternUnresolved => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving pattern) binding `%s`",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(ident));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
let is_mutable = mutability == Mutable;
|
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
let def = match mode {
|
2012-08-03 21:59:04 -05:00
|
|
|
RefutableMode => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// For pattern arms, we must use
|
|
|
|
// `def_binding` definitions.
|
|
|
|
|
2012-08-02 18:00:45 -05:00
|
|
|
def_binding(pattern.id, binding_mode)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-11-06 20:41:06 -06:00
|
|
|
LocalIrrefutableMode => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// But for locals, we use `def_local`.
|
2012-07-27 15:03:04 -05:00
|
|
|
def_local(pattern.id, is_mutable)
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-04-24 03:29:46 -05:00
|
|
|
ArgumentIrrefutableMode => {
|
2012-11-06 20:41:06 -06:00
|
|
|
// And for function arguments, `def_arg`.
|
2013-04-24 03:29:46 -05:00
|
|
|
def_arg(pattern.id, is_mutable)
|
2012-11-06 20:41:06 -06:00
|
|
|
}
|
2012-07-27 15:03:04 -05:00
|
|
|
};
|
2012-05-22 12:54:12 -05:00
|
|
|
|
|
|
|
// Record the definition so that later passes
|
|
|
|
// will be able to distinguish variants from
|
|
|
|
// locals in patterns.
|
|
|
|
|
|
|
|
self.record_def(pattern.id, def);
|
|
|
|
|
|
|
|
// Add the binding to the local ribs, if it
|
|
|
|
// doesn't already exist in the bindings list. (We
|
|
|
|
// must not add it if it's in the bindings list
|
|
|
|
// because that breaks the assumptions later
|
|
|
|
// passes make about or-patterns.)
|
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match bindings_list {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(bindings_list)
|
2013-03-16 13:11:31 -05:00
|
|
|
if !bindings_list.contains_key(&ident) => {
|
|
|
|
let this = &mut *self;
|
|
|
|
let last_rib = this.value_ribs[
|
|
|
|
this.value_ribs.len() - 1];
|
2012-09-19 20:52:49 -05:00
|
|
|
last_rib.bindings.insert(ident,
|
2012-05-22 12:54:12 -05:00
|
|
|
dl_def(def));
|
2012-09-19 20:52:49 -05:00
|
|
|
bindings_list.insert(ident, pat_id);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(b) => {
|
2013-03-22 21:26:41 -05:00
|
|
|
if b.find(&ident) == Some(&pat_id) {
|
2012-07-27 15:03:04 -05:00
|
|
|
// Then this is a duplicate variable
|
|
|
|
// in the same disjunct, which is an
|
|
|
|
// error
|
|
|
|
self.session.span_err(pattern.span,
|
2012-08-22 19:24:52 -05:00
|
|
|
fmt!("Identifier %s is bound more \
|
2012-07-27 15:03:04 -05:00
|
|
|
than once in the same pattern",
|
2012-07-18 18:18:02 -05:00
|
|
|
path_to_str(path, self.session
|
2012-08-22 19:24:52 -05:00
|
|
|
.intr())));
|
2012-07-27 15:03:04 -05:00
|
|
|
}
|
|
|
|
// Not bound in the same pattern: do nothing
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-03-16 13:11:31 -05:00
|
|
|
let this = &mut *self;
|
|
|
|
let last_rib = this.value_ribs[
|
|
|
|
this.value_ribs.len() - 1];
|
2012-09-19 20:52:49 -05:00
|
|
|
last_rib.bindings.insert(ident,
|
2012-05-22 12:54:12 -05:00
|
|
|
dl_def(def));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the types in the path pattern.
|
|
|
|
for path.types.each |ty| {
|
2012-09-19 18:55:01 -05:00
|
|
|
self.resolve_type(*ty, visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-13 00:39:32 -05:00
|
|
|
pat_ident(binding_mode, path, _) => {
|
|
|
|
// This must be an enum variant, struct, or constant.
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_path(path, ValueNS, false, visitor) {
|
2012-11-02 11:56:09 -05:00
|
|
|
Some(def @ def_variant(*)) |
|
2012-12-10 15:47:54 -06:00
|
|
|
Some(def @ def_struct(*)) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_def(pattern.id, def);
|
|
|
|
}
|
2013-03-13 00:39:32 -05:00
|
|
|
Some(def @ def_const(*)) => {
|
|
|
|
self.enforce_default_binding_mode(
|
|
|
|
pattern,
|
|
|
|
binding_mode,
|
|
|
|
"a constant");
|
|
|
|
self.record_def(pattern.id, def);
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(_) => {
|
2012-07-18 18:18:02 -05:00
|
|
|
self.session.span_err(
|
|
|
|
path.span,
|
2013-03-13 00:39:32 -05:00
|
|
|
fmt!("not an enum variant or constant: %s",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(
|
2013-03-05 21:39:18 -06:00
|
|
|
*path.idents.last())));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.session.span_err(path.span,
|
2012-07-14 00:57:48 -05:00
|
|
|
~"unresolved enum variant");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the types in the path pattern.
|
|
|
|
for path.types.each |ty| {
|
2012-09-19 18:55:01 -05:00
|
|
|
self.resolve_type(*ty, visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-13 00:39:32 -05:00
|
|
|
pat_enum(path, _) => {
|
2013-03-21 02:27:26 -05:00
|
|
|
// This must be an enum variant, struct or const.
|
2013-03-13 00:39:32 -05:00
|
|
|
match self.resolve_path(path, ValueNS, false, visitor) {
|
2013-04-29 19:21:59 -05:00
|
|
|
Some(def @ def_fn(*)) |
|
2013-03-13 00:39:32 -05:00
|
|
|
Some(def @ def_variant(*)) |
|
2013-03-21 02:27:26 -05:00
|
|
|
Some(def @ def_struct(*)) |
|
|
|
|
Some(def @ def_const(*)) => {
|
2013-03-13 00:39:32 -05:00
|
|
|
self.record_def(pattern.id, def);
|
|
|
|
}
|
|
|
|
Some(_) => {
|
|
|
|
self.session.span_err(
|
|
|
|
path.span,
|
2013-03-21 02:27:26 -05:00
|
|
|
fmt!("not an enum variant, struct or const: %s",
|
2013-03-13 00:39:32 -05:00
|
|
|
*self.session.str_of(
|
|
|
|
*path.idents.last())));
|
|
|
|
}
|
|
|
|
None => {
|
|
|
|
self.session.span_err(path.span,
|
2013-03-21 02:27:26 -05:00
|
|
|
~"unresolved enum variant, \
|
|
|
|
struct or const");
|
2013-03-13 00:39:32 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the types in the path pattern.
|
|
|
|
for path.types.each |ty| {
|
|
|
|
self.resolve_type(*ty, visitor);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-31 21:25:24 -05:00
|
|
|
pat_lit(expr) => {
|
2012-07-10 14:29:30 -05:00
|
|
|
self.resolve_expr(expr, visitor);
|
|
|
|
}
|
|
|
|
|
2012-07-31 21:25:24 -05:00
|
|
|
pat_range(first_expr, last_expr) => {
|
2012-07-10 14:29:30 -05:00
|
|
|
self.resolve_expr(first_expr, visitor);
|
|
|
|
self.resolve_expr(last_expr, visitor);
|
|
|
|
}
|
|
|
|
|
2012-08-06 19:01:14 -05:00
|
|
|
pat_struct(path, _, _) => {
|
2013-04-03 08:28:36 -05:00
|
|
|
let structs: &mut HashSet<def_id> = &mut self.structs;
|
2012-08-06 19:01:14 -05:00
|
|
|
match self.resolve_path(path, TypeNS, false, visitor) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def_ty(class_id))
|
2013-03-22 21:26:41 -05:00
|
|
|
if structs.contains(&class_id) => {
|
2012-12-10 15:47:54 -06:00
|
|
|
let class_def = def_struct(class_id);
|
2012-08-06 19:01:14 -05:00
|
|
|
self.record_def(pattern.id, class_def);
|
|
|
|
}
|
2012-12-10 15:47:54 -06:00
|
|
|
Some(definition @ def_struct(class_id))
|
2013-03-22 21:26:41 -05:00
|
|
|
if structs.contains(&class_id) => {
|
2012-12-10 14:37:50 -06:00
|
|
|
self.record_def(pattern.id, definition);
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(definition @ def_variant(_, variant_id))
|
2013-03-22 21:26:41 -05:00
|
|
|
if structs.contains(&variant_id) => {
|
2012-08-07 21:12:58 -05:00
|
|
|
self.record_def(pattern.id, definition);
|
|
|
|
}
|
2012-12-10 14:37:50 -06:00
|
|
|
result => {
|
|
|
|
debug!("(resolving pattern) didn't find struct \
|
|
|
|
def: %?", result);
|
2012-07-18 18:18:02 -05:00
|
|
|
self.session.span_err(
|
|
|
|
path.span,
|
|
|
|
fmt!("`%s` does not name a structure",
|
2012-12-29 12:25:09 -06:00
|
|
|
self.idents_to_str(path.idents)));
|
2012-08-06 19:01:14 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-31 21:25:24 -05:00
|
|
|
_ => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_bare_identifier_pattern(@mut self, name: ident)
|
2012-10-30 17:53:06 -05:00
|
|
|
-> BareIdentifierPatternResolution {
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_item_in_lexical_scope(self.current_module,
|
2012-10-30 17:53:06 -05:00
|
|
|
name,
|
2012-12-23 16:41:37 -06:00
|
|
|
ValueNS,
|
|
|
|
SearchThroughModules) {
|
2012-08-03 21:59:04 -05:00
|
|
|
Success(target) => {
|
2012-08-06 14:34:08 -05:00
|
|
|
match target.bindings.value_def {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-02-11 21:26:38 -06:00
|
|
|
fail!(~"resolved name in the value namespace to a \
|
|
|
|
set of name bindings with no def?!");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def) => {
|
2012-08-17 19:55:34 -05:00
|
|
|
match def.def {
|
2012-12-10 15:47:54 -06:00
|
|
|
def @ def_variant(*) | def @ def_struct(*) => {
|
2012-10-30 17:53:06 -05:00
|
|
|
return FoundStructOrEnumVariant(def);
|
2012-08-17 19:55:34 -05:00
|
|
|
}
|
2012-11-13 00:10:15 -06:00
|
|
|
def @ def_const(*) => {
|
|
|
|
return FoundConst(def);
|
2012-08-17 19:55:34 -05:00
|
|
|
}
|
|
|
|
_ => {
|
2012-10-30 17:53:06 -05:00
|
|
|
return BareIdentifierPatternUnresolved;
|
2012-08-17 19:55:34 -05:00
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2013-02-11 21:26:38 -06:00
|
|
|
fail!(~"unexpected indeterminate result");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2012-10-30 17:53:06 -05:00
|
|
|
return BareIdentifierPatternUnresolved;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// If `check_ribs` is true, checks the local definitions first; i.e.
|
|
|
|
/// doesn't skip straight to the containing module.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_path(@mut self,
|
2013-03-26 19:00:35 -05:00
|
|
|
path: @Path,
|
2012-12-23 16:41:37 -06:00
|
|
|
namespace: Namespace,
|
|
|
|
check_ribs: bool,
|
2012-05-22 12:54:12 -05:00
|
|
|
visitor: ResolveVisitor)
|
2012-08-20 14:23:37 -05:00
|
|
|
-> Option<def> {
|
2012-05-22 12:54:12 -05:00
|
|
|
// First, resolve the types.
|
|
|
|
for path.types.each |ty| {
|
2012-09-19 18:55:01 -05:00
|
|
|
self.resolve_type(*ty, visitor);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if path.global {
|
2012-08-01 19:30:05 -05:00
|
|
|
return self.resolve_crate_relative_path(path,
|
2012-07-03 17:55:26 -05:00
|
|
|
self.xray_context,
|
|
|
|
namespace);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-10-15 14:27:09 -05:00
|
|
|
if path.idents.len() > 1 {
|
2012-08-01 19:30:05 -05:00
|
|
|
return self.resolve_module_relative_path(path,
|
2012-12-23 16:41:37 -06:00
|
|
|
self.xray_context,
|
|
|
|
namespace);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-05 21:39:18 -06:00
|
|
|
return self.resolve_identifier(*path.idents.last(),
|
2012-10-05 13:50:53 -05:00
|
|
|
namespace,
|
|
|
|
check_ribs,
|
|
|
|
path.span);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_identifier(@mut self,
|
|
|
|
identifier: ident,
|
2012-05-22 12:54:12 -05:00
|
|
|
namespace: Namespace,
|
2012-07-06 21:06:58 -05:00
|
|
|
check_ribs: bool,
|
|
|
|
span: span)
|
2012-08-20 14:23:37 -05:00
|
|
|
-> Option<def> {
|
2012-05-22 12:54:12 -05:00
|
|
|
if check_ribs {
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_identifier_in_local_ribs(identifier,
|
2012-07-06 21:06:58 -05:00
|
|
|
namespace,
|
|
|
|
span) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def) => {
|
|
|
|
return Some(def);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-01 19:30:05 -05:00
|
|
|
return self.resolve_item_by_identifier_in_lexical_scope(identifier,
|
2013-01-08 21:37:25 -06:00
|
|
|
namespace);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4952: Merge me with resolve_name_in_module?
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_definition_of_name_in_module(@mut self,
|
|
|
|
containing_module: @mut Module,
|
2012-09-19 20:52:49 -05:00
|
|
|
name: ident,
|
2012-07-06 21:06:58 -05:00
|
|
|
namespace: Namespace,
|
|
|
|
xray: XrayFlag)
|
2012-05-22 12:54:12 -05:00
|
|
|
-> NameDefinition {
|
|
|
|
// First, search children.
|
2013-02-03 22:29:17 -06:00
|
|
|
match containing_module.children.find(&name) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(child_name_bindings) => {
|
2012-10-15 16:56:42 -05:00
|
|
|
match (child_name_bindings.def_for_namespace(namespace),
|
|
|
|
child_name_bindings.privacy_for_namespace(namespace)) {
|
|
|
|
(Some(def), Some(Public)) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Found it. Stop the search here.
|
2012-10-15 16:56:42 -05:00
|
|
|
return ChildNameDefinition(def);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-10-15 16:56:42 -05:00
|
|
|
(Some(def), _) if xray == Xray => {
|
|
|
|
// Found it. Stop the search here.
|
|
|
|
return ChildNameDefinition(def);
|
|
|
|
}
|
|
|
|
(Some(_), _) | (None, _) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Next, search import resolutions.
|
2013-02-03 22:29:17 -06:00
|
|
|
match containing_module.import_resolutions.find(&name) {
|
2012-10-02 20:13:56 -05:00
|
|
|
Some(import_resolution) if import_resolution.privacy == Public ||
|
|
|
|
xray == Xray => {
|
2012-08-06 14:34:08 -05:00
|
|
|
match (*import_resolution).target_for_namespace(namespace) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(target) => {
|
2012-10-15 16:56:42 -05:00
|
|
|
match (target.bindings.def_for_namespace(namespace),
|
|
|
|
target.bindings.privacy_for_namespace(
|
|
|
|
namespace)) {
|
|
|
|
(Some(def), Some(Public)) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Found it.
|
2013-02-05 01:01:02 -06:00
|
|
|
import_resolution.state.used = true;
|
2012-10-15 16:56:42 -05:00
|
|
|
return ImportNameDefinition(def);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-10-15 16:56:42 -05:00
|
|
|
(Some(_), _) | (None, _) => {
|
2012-07-11 17:00:40 -05:00
|
|
|
// This can happen with external impls, due to
|
|
|
|
// the imperfect way we read the metadata.
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-03-26 21:53:33 -05:00
|
|
|
None => {}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-03-26 21:53:33 -05:00
|
|
|
Some(_) | None => {} // Continue.
|
|
|
|
}
|
|
|
|
|
|
|
|
// Finally, search through external children.
|
|
|
|
if namespace == TypeNS {
|
|
|
|
match containing_module.external_module_children.find(&name) {
|
|
|
|
None => {}
|
|
|
|
Some(module) => {
|
|
|
|
match module.def_id {
|
|
|
|
None => {} // Continue.
|
|
|
|
Some(def_id) => {
|
|
|
|
return ChildNameDefinition(def_mod(def_id));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
2013-03-26 21:53:33 -05:00
|
|
|
|
|
|
|
return NoNameDefinition;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-03-26 19:00:35 -05:00
|
|
|
fn intern_module_part_of_path(@mut self, path: @Path) -> ~[ident] {
|
2013-03-07 17:37:14 -06:00
|
|
|
let mut module_path_idents = ~[];
|
2012-05-22 12:54:12 -05:00
|
|
|
for path.idents.eachi |index, ident| {
|
2012-11-29 14:08:40 -06:00
|
|
|
if index == path.idents.len() - 1 {
|
2012-05-22 12:54:12 -05:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2013-03-07 17:37:14 -06:00
|
|
|
module_path_idents.push(*ident);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-09-19 20:52:49 -05:00
|
|
|
return module_path_idents;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_module_relative_path(@mut self,
|
2013-03-26 19:00:35 -05:00
|
|
|
path: @Path,
|
2013-04-17 11:15:37 -05:00
|
|
|
xray: XrayFlag,
|
2012-07-03 17:55:26 -05:00
|
|
|
namespace: Namespace)
|
2012-08-20 14:23:37 -05:00
|
|
|
-> Option<def> {
|
2012-09-19 20:52:49 -05:00
|
|
|
let module_path_idents = self.intern_module_part_of_path(path);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-04-12 00:15:30 -05:00
|
|
|
let containing_module;
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_module_path_for_import(self.current_module,
|
2012-12-13 15:05:22 -06:00
|
|
|
module_path_idents,
|
|
|
|
UseLexicalScope,
|
|
|
|
path.span) {
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.session.span_err(path.span,
|
2012-08-22 19:24:52 -05:00
|
|
|
fmt!("use of undeclared module `%s`",
|
2012-09-19 20:52:49 -05:00
|
|
|
self.idents_to_str(
|
2013-03-07 17:37:14 -06:00
|
|
|
module_path_idents)));
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2013-02-11 21:26:38 -06:00
|
|
|
fail!(~"indeterminate unexpected");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
Success(resulting_module) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
containing_module = resulting_module;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-05 21:39:18 -06:00
|
|
|
let name = *path.idents.last();
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_definition_of_name_in_module(containing_module,
|
2012-07-18 18:18:02 -05:00
|
|
|
name,
|
|
|
|
namespace,
|
|
|
|
xray) {
|
2012-08-03 21:59:04 -05:00
|
|
|
NoNameDefinition => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// We failed to resolve the name. Report an error.
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
ChildNameDefinition(def) | ImportNameDefinition(def) => {
|
2012-08-20 14:23:37 -05:00
|
|
|
return Some(def);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-01 12:44:43 -06:00
|
|
|
/// Invariant: This must be called only during main resolution, not during
|
|
|
|
/// import resolution.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_crate_relative_path(@mut self,
|
2013-03-26 19:00:35 -05:00
|
|
|
path: @Path,
|
2013-04-17 11:15:37 -05:00
|
|
|
xray: XrayFlag,
|
2012-07-03 17:55:26 -05:00
|
|
|
namespace: Namespace)
|
2012-08-20 14:23:37 -05:00
|
|
|
-> Option<def> {
|
2012-09-19 20:52:49 -05:00
|
|
|
let module_path_idents = self.intern_module_part_of_path(path);
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
let root_module = self.graph_root.get_module();
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2013-04-12 00:15:30 -05:00
|
|
|
let containing_module;
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_module_path_from_root(root_module,
|
2012-12-23 16:41:37 -06:00
|
|
|
module_path_idents,
|
|
|
|
0,
|
2013-03-01 12:44:43 -06:00
|
|
|
path.span,
|
|
|
|
SearchItemsAndAllImports) {
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2012-05-22 12:54:12 -05:00
|
|
|
self.session.span_err(path.span,
|
2012-08-22 19:24:52 -05:00
|
|
|
fmt!("use of undeclared module `::%s`",
|
2013-03-07 17:37:14 -06:00
|
|
|
self.idents_to_str(
|
|
|
|
module_path_idents)));
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2013-02-11 21:26:38 -06:00
|
|
|
fail!(~"indeterminate unexpected");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
Success(resulting_module) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
containing_module = resulting_module;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-05 21:39:18 -06:00
|
|
|
let name = *path.idents.last();
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_definition_of_name_in_module(containing_module,
|
2012-12-23 16:41:37 -06:00
|
|
|
name,
|
|
|
|
namespace,
|
|
|
|
xray) {
|
2012-08-03 21:59:04 -05:00
|
|
|
NoNameDefinition => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// We failed to resolve the name. Report an error.
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
ChildNameDefinition(def) | ImportNameDefinition(def) => {
|
2012-08-20 14:23:37 -05:00
|
|
|
return Some(def);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_identifier_in_local_ribs(@mut self,
|
|
|
|
ident: ident,
|
2012-07-06 21:06:58 -05:00
|
|
|
namespace: Namespace,
|
|
|
|
span: span)
|
2012-08-20 14:23:37 -05:00
|
|
|
-> Option<def> {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Check the local set of ribs.
|
2013-04-12 00:15:30 -05:00
|
|
|
let search_result;
|
2012-08-06 14:34:08 -05:00
|
|
|
match namespace {
|
2012-08-03 21:59:04 -05:00
|
|
|
ValueNS => {
|
2013-03-07 17:37:14 -06:00
|
|
|
search_result = self.search_ribs(&mut self.value_ribs, ident,
|
|
|
|
span,
|
2012-07-06 21:06:58 -05:00
|
|
|
DontAllowCapturingSelf);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
TypeNS => {
|
2013-03-07 17:37:14 -06:00
|
|
|
search_result = self.search_ribs(&mut self.type_ribs, ident,
|
|
|
|
span, AllowCapturingSelf);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-20 00:17:42 -05:00
|
|
|
match search_result {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(dl_def(def)) => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving path in local ribs) resolved `%s` to \
|
2012-05-22 12:54:12 -05:00
|
|
|
local: %?",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(ident),
|
2012-08-22 19:24:52 -05:00
|
|
|
def);
|
2012-08-20 14:23:37 -05:00
|
|
|
return Some(def);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(dl_field) | Some(dl_impl(_)) | None => {
|
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_item_by_identifier_in_lexical_scope(@mut self,
|
|
|
|
ident: ident,
|
2012-05-22 12:54:12 -05:00
|
|
|
namespace: Namespace)
|
2012-08-20 14:23:37 -05:00
|
|
|
-> Option<def> {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Check the items.
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_item_in_lexical_scope(self.current_module,
|
2012-12-23 16:41:37 -06:00
|
|
|
ident,
|
|
|
|
namespace,
|
2013-01-08 21:37:25 -06:00
|
|
|
DontSearchThroughModules) {
|
2012-08-03 21:59:04 -05:00
|
|
|
Success(target) => {
|
2012-08-06 14:34:08 -05:00
|
|
|
match (*target.bindings).def_for_namespace(namespace) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-10-15 16:56:42 -05:00
|
|
|
// This can happen if we were looking for a type and
|
|
|
|
// found a module instead. Modules don't have defs.
|
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def) => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving item path in lexical scope) \
|
2012-07-13 15:20:49 -05:00
|
|
|
resolved `%s` to item",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(ident));
|
2012-10-15 16:56:42 -05:00
|
|
|
return Some(def);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Indeterminate => {
|
2013-02-11 21:26:38 -06:00
|
|
|
fail!(~"unexpected indeterminate result");
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
Failed => {
|
2012-08-20 14:23:37 -05:00
|
|
|
return None;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-27 02:15:59 -05:00
|
|
|
fn find_best_match_for_name(@mut self, name: &str, max_distance: uint) -> Option<~str> {
|
2013-03-16 13:11:31 -05:00
|
|
|
let this = &mut *self;
|
|
|
|
|
2013-02-23 02:22:51 -06:00
|
|
|
let mut maybes: ~[~str] = ~[];
|
|
|
|
let mut values: ~[uint] = ~[];
|
|
|
|
|
2013-03-16 13:11:31 -05:00
|
|
|
let mut j = this.value_ribs.len();
|
2013-02-23 02:22:51 -06:00
|
|
|
while j != 0 {
|
|
|
|
j -= 1;
|
2013-03-22 20:15:28 -05:00
|
|
|
for this.value_ribs[j].bindings.each_key |&k| {
|
|
|
|
vec::push(&mut maybes, copy *this.session.str_of(k));
|
2013-02-23 02:22:51 -06:00
|
|
|
vec::push(&mut values, uint::max_value);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut smallest = 0;
|
|
|
|
for vec::eachi(maybes) |i, &other| {
|
|
|
|
|
2013-02-24 22:44:01 -06:00
|
|
|
values[i] = str::levdistance(name, other);
|
2013-02-23 02:22:51 -06:00
|
|
|
|
|
|
|
if values[i] <= values[smallest] {
|
|
|
|
smallest = i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if vec::len(values) > 0 &&
|
|
|
|
values[smallest] != uint::max_value &&
|
2013-02-26 19:23:12 -06:00
|
|
|
values[smallest] < str::len(name) + 2 &&
|
2013-03-27 02:15:59 -05:00
|
|
|
values[smallest] <= max_distance &&
|
2013-02-26 19:23:12 -06:00
|
|
|
maybes[smallest] != name.to_owned() {
|
2013-02-23 02:22:51 -06:00
|
|
|
|
|
|
|
Some(vec::swap_remove(&mut maybes, smallest))
|
|
|
|
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn name_exists_in_scope_struct(@mut self, name: &str) -> bool {
|
2013-03-16 13:11:31 -05:00
|
|
|
let this = &mut *self;
|
|
|
|
|
|
|
|
let mut i = this.type_ribs.len();
|
2012-08-22 13:40:42 -05:00
|
|
|
while i != 0 {
|
|
|
|
i -= 1;
|
2013-03-16 13:11:31 -05:00
|
|
|
match this.type_ribs[i].kind {
|
2012-08-22 13:40:42 -05:00
|
|
|
MethodRibKind(node_id, _) =>
|
2013-03-16 13:11:31 -05:00
|
|
|
for this.crate.node.module.items.each |item| {
|
2012-08-22 13:40:42 -05:00
|
|
|
if item.id == node_id {
|
|
|
|
match item.node {
|
2012-12-10 15:47:54 -06:00
|
|
|
item_struct(class_def, _) => {
|
2012-09-18 23:41:13 -05:00
|
|
|
for vec::each(class_def.fields) |field| {
|
2012-08-22 13:40:42 -05:00
|
|
|
match field.node.kind {
|
2012-12-23 16:41:37 -06:00
|
|
|
unnamed_field => {},
|
|
|
|
named_field(ident, _, _) => {
|
2013-03-16 13:11:31 -05:00
|
|
|
if str::eq_slice(*this.session.str_of(ident),
|
2012-08-22 13:40:42 -05:00
|
|
|
name) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
_ => {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn resolve_expr(@mut self, expr: @expr, visitor: ResolveVisitor) {
|
2012-08-17 18:53:07 -05:00
|
|
|
// First, record candidate traits for this expression if it could
|
|
|
|
// result in the invocation of a method call.
|
2012-07-11 17:00:40 -05:00
|
|
|
|
|
|
|
self.record_candidate_traits_for_expr_if_necessary(expr);
|
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
// Next, resolve the node.
|
2012-08-06 14:34:08 -05:00
|
|
|
match expr.node {
|
2012-05-22 12:54:12 -05:00
|
|
|
// The interpretation of paths depends on whether the path has
|
|
|
|
// multiple elements in it or not.
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
expr_path(path) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// This is a local path in the value namespace. Walk through
|
|
|
|
// scopes looking for it.
|
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_path(path, ValueNS, true, visitor) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def) => {
|
2012-05-22 12:54:12 -05:00
|
|
|
// Write the result into the def map.
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(resolving expr) resolved `%s`",
|
2012-12-29 12:25:09 -06:00
|
|
|
self.idents_to_str(path.idents));
|
2012-05-22 12:54:12 -05:00
|
|
|
self.record_def(expr.id, def);
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2013-01-07 16:16:52 -06:00
|
|
|
let wrong_name = self.idents_to_str(
|
2013-03-20 00:17:42 -05:00
|
|
|
path.idents);
|
2012-12-10 15:47:54 -06:00
|
|
|
if self.name_exists_in_scope_struct(wrong_name) {
|
2012-08-22 13:40:42 -05:00
|
|
|
self.session.span_err(expr.span,
|
2012-08-25 11:15:26 -05:00
|
|
|
fmt!("unresolved name: `%s`. \
|
|
|
|
Did you mean: `self.%s`?",
|
2012-08-22 13:40:42 -05:00
|
|
|
wrong_name,
|
|
|
|
wrong_name));
|
|
|
|
}
|
|
|
|
else {
|
2013-03-27 02:15:59 -05:00
|
|
|
// limit search to 5 to reduce the number
|
|
|
|
// of stupid suggestions
|
|
|
|
match self.find_best_match_for_name(wrong_name, 5) {
|
2013-02-23 02:22:51 -06:00
|
|
|
Some(m) => {
|
|
|
|
self.session.span_err(expr.span,
|
|
|
|
fmt!("unresolved name: `%s`. \
|
|
|
|
Did you mean: `%s`?",
|
|
|
|
wrong_name, m));
|
|
|
|
}
|
|
|
|
None => {
|
|
|
|
self.session.span_err(expr.span,
|
|
|
|
fmt!("unresolved name: `%s`.",
|
2012-08-22 13:40:42 -05:00
|
|
|
wrong_name));
|
2013-02-23 02:22:51 -06:00
|
|
|
}
|
|
|
|
}
|
2012-08-22 13:40:42 -05:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
visit_expr(expr, (), visitor);
|
|
|
|
}
|
|
|
|
|
2013-01-10 12:59:58 -06:00
|
|
|
expr_fn_block(ref fn_decl, ref block) => {
|
2012-12-04 23:13:02 -06:00
|
|
|
self.resolve_function(FunctionRibKind(expr.id, block.node.id),
|
2013-03-20 00:17:42 -05:00
|
|
|
Some(fn_decl),
|
2012-05-22 12:54:12 -05:00
|
|
|
NoTypeParameters,
|
2013-02-18 00:20:36 -06:00
|
|
|
block,
|
2012-05-22 12:54:12 -05:00
|
|
|
NoSelfBinding,
|
|
|
|
visitor);
|
|
|
|
}
|
|
|
|
|
2012-08-06 15:15:40 -05:00
|
|
|
expr_struct(path, _, _) => {
|
2012-07-23 20:44:59 -05:00
|
|
|
// Resolve the path to the structure it goes to.
|
2013-04-03 08:28:36 -05:00
|
|
|
let structs: &mut HashSet<def_id> = &mut self.structs;
|
2012-08-06 14:34:08 -05:00
|
|
|
match self.resolve_path(path, TypeNS, false, visitor) {
|
2012-12-10 15:47:54 -06:00
|
|
|
Some(def_ty(class_id)) | Some(def_struct(class_id))
|
2013-03-22 21:26:41 -05:00
|
|
|
if structs.contains(&class_id) => {
|
2012-12-10 15:47:54 -06:00
|
|
|
let class_def = def_struct(class_id);
|
2012-07-26 17:29:33 -05:00
|
|
|
self.record_def(expr.id, class_def);
|
2012-07-23 20:44:59 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(definition @ def_variant(_, class_id))
|
2013-03-22 21:26:41 -05:00
|
|
|
if structs.contains(&class_id) => {
|
2012-08-07 21:12:58 -05:00
|
|
|
self.record_def(expr.id, definition);
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-07-18 18:18:02 -05:00
|
|
|
self.session.span_err(
|
|
|
|
path.span,
|
2012-08-22 19:24:52 -05:00
|
|
|
fmt!("`%s` does not name a structure",
|
2012-12-29 12:25:09 -06:00
|
|
|
self.idents_to_str(path.idents)));
|
2012-07-23 20:44:59 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
visit_expr(expr, (), visitor);
|
|
|
|
}
|
|
|
|
|
2012-08-20 14:23:37 -05:00
|
|
|
expr_loop(_, Some(label)) => {
|
2012-08-14 21:20:56 -05:00
|
|
|
do self.with_label_rib {
|
2013-03-16 13:11:31 -05:00
|
|
|
let this = &mut *self;
|
2012-08-14 21:20:56 -05:00
|
|
|
let def_like = dl_def(def_label(expr.id));
|
2013-03-16 13:11:31 -05:00
|
|
|
let rib = this.label_ribs[this.label_ribs.len() - 1];
|
2013-03-07 17:37:14 -06:00
|
|
|
rib.bindings.insert(label, def_like);
|
2012-08-14 21:20:56 -05:00
|
|
|
|
|
|
|
visit_expr(expr, (), visitor);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-20 14:23:37 -05:00
|
|
|
expr_break(Some(label)) | expr_again(Some(label)) => {
|
2013-03-07 17:37:14 -06:00
|
|
|
match self.search_ribs(&mut self.label_ribs, label, expr.span,
|
2012-08-14 21:20:56 -05:00
|
|
|
DontAllowCapturingSelf) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None =>
|
2012-08-14 21:20:56 -05:00
|
|
|
self.session.span_err(expr.span,
|
|
|
|
fmt!("use of undeclared label \
|
2013-02-10 18:33:16 -06:00
|
|
|
`%s`",
|
|
|
|
*self.session.str_of(
|
|
|
|
label))),
|
2012-08-26 14:12:05 -05:00
|
|
|
Some(dl_def(def @ def_label(_))) =>
|
2012-08-14 21:20:56 -05:00
|
|
|
self.record_def(expr.id, def),
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(_) =>
|
2012-08-14 21:20:56 -05:00
|
|
|
self.session.span_bug(expr.span,
|
|
|
|
~"label wasn't mapped to a \
|
|
|
|
label def!")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-03 21:59:04 -05:00
|
|
|
_ => {
|
2012-05-22 12:54:12 -05:00
|
|
|
visit_expr(expr, (), visitor);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn record_candidate_traits_for_expr_if_necessary(@mut self, expr: @expr) {
|
2012-08-06 14:34:08 -05:00
|
|
|
match expr.node {
|
2012-07-27 21:32:42 -05:00
|
|
|
expr_field(_, ident, _) => {
|
2012-07-18 18:18:02 -05:00
|
|
|
let traits = self.search_for_traits_containing_method(ident);
|
2013-03-07 17:37:14 -06:00
|
|
|
self.trait_map.insert(expr.id, @mut traits);
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
2012-11-30 13:18:25 -06:00
|
|
|
expr_method_call(_, ident, _, _, _) => {
|
|
|
|
let traits = self.search_for_traits_containing_method(ident);
|
2013-03-07 17:37:14 -06:00
|
|
|
self.trait_map.insert(expr.id, @mut traits);
|
2012-11-30 13:18:25 -06:00
|
|
|
}
|
2012-07-27 21:32:42 -05:00
|
|
|
expr_binary(add, _, _) | expr_assign_op(add, _, _) => {
|
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-01-06 14:05:34 -06:00
|
|
|
self.lang_items.add_trait());
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
|
|
|
expr_binary(subtract, _, _) | expr_assign_op(subtract, _, _) => {
|
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-01-06 14:05:34 -06:00
|
|
|
self.lang_items.sub_trait());
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
|
|
|
expr_binary(mul, _, _) | expr_assign_op(mul, _, _) => {
|
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-01-06 14:05:34 -06:00
|
|
|
self.lang_items.mul_trait());
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2013-04-21 10:58:53 -05:00
|
|
|
expr_binary(quot, _, _) | expr_assign_op(quot, _, _) => {
|
2012-07-27 21:32:42 -05:00
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-04-21 10:58:53 -05:00
|
|
|
self.lang_items.quot_trait());
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
|
|
|
expr_binary(rem, _, _) | expr_assign_op(rem, _, _) => {
|
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-04-21 10:58:53 -05:00
|
|
|
self.lang_items.rem_trait());
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
|
|
|
expr_binary(bitxor, _, _) | expr_assign_op(bitxor, _, _) => {
|
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-01-06 14:05:34 -06:00
|
|
|
self.lang_items.bitxor_trait());
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
|
|
|
expr_binary(bitand, _, _) | expr_assign_op(bitand, _, _) => {
|
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-01-06 14:05:34 -06:00
|
|
|
self.lang_items.bitand_trait());
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
|
|
|
expr_binary(bitor, _, _) | expr_assign_op(bitor, _, _) => {
|
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-01-06 14:05:34 -06:00
|
|
|
self.lang_items.bitor_trait());
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
|
|
|
expr_binary(shl, _, _) | expr_assign_op(shl, _, _) => {
|
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-01-06 14:05:34 -06:00
|
|
|
self.lang_items.shl_trait());
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
|
|
|
expr_binary(shr, _, _) | expr_assign_op(shr, _, _) => {
|
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-01-06 14:05:34 -06:00
|
|
|
self.lang_items.shr_trait());
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2012-08-29 21:23:15 -05:00
|
|
|
expr_binary(lt, _, _) | expr_binary(le, _, _) |
|
|
|
|
expr_binary(ge, _, _) | expr_binary(gt, _, _) => {
|
2012-08-27 18:26:35 -05:00
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-01-06 14:05:34 -06:00
|
|
|
self.lang_items.ord_trait());
|
2012-08-27 18:26:35 -05:00
|
|
|
}
|
2012-09-07 14:44:53 -05:00
|
|
|
expr_binary(eq, _, _) | expr_binary(ne, _, _) => {
|
2012-08-27 18:26:35 -05:00
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-01-06 14:05:34 -06:00
|
|
|
self.lang_items.eq_trait());
|
2012-08-27 18:26:35 -05:00
|
|
|
}
|
2012-07-27 21:32:42 -05:00
|
|
|
expr_unary(neg, _) => {
|
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-01-06 14:05:34 -06:00
|
|
|
self.lang_items.neg_trait());
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
2013-01-11 11:16:58 -06:00
|
|
|
expr_unary(not, _) => {
|
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
|
|
|
self.lang_items.not_trait());
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
expr_index(*) => {
|
2012-07-27 21:32:42 -05:00
|
|
|
self.add_fixed_trait_for_expr(expr.id,
|
2013-01-06 14:05:34 -06:00
|
|
|
self.lang_items.index_trait());
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
|
|
|
_ => {
|
2012-07-11 17:00:40 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn search_for_traits_containing_method(@mut self,
|
|
|
|
name: ident)
|
2013-03-07 17:37:14 -06:00
|
|
|
-> ~[def_id] {
|
2012-10-08 14:39:30 -05:00
|
|
|
debug!("(searching for traits containing method) looking for '%s'",
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(name));
|
2012-10-08 14:39:30 -05:00
|
|
|
|
2013-03-07 17:37:14 -06:00
|
|
|
let mut found_traits = ~[];
|
2012-07-11 17:00:40 -05:00
|
|
|
let mut search_module = self.current_module;
|
|
|
|
loop {
|
|
|
|
// Look for the current trait.
|
2013-03-20 00:17:42 -05:00
|
|
|
match /*bad*/copy self.current_trait_refs {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(trait_def_ids) => {
|
2012-07-18 18:28:31 -05:00
|
|
|
for trait_def_ids.each |trait_def_id| {
|
2012-10-08 14:39:30 -05:00
|
|
|
self.add_trait_info_if_containing_method(
|
2013-03-07 17:37:14 -06:00
|
|
|
&mut found_traits, *trait_def_id, name);
|
2012-07-18 18:28:31 -05:00
|
|
|
}
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-07-11 17:00:40 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Look for trait children.
|
2013-02-08 16:08:02 -06:00
|
|
|
for search_module.children.each_value |&child_name_bindings| {
|
2012-08-06 14:34:08 -05:00
|
|
|
match child_name_bindings.def_for_namespace(TypeNS) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def) => {
|
2012-10-15 16:56:42 -05:00
|
|
|
match def {
|
2013-03-27 09:26:57 -05:00
|
|
|
def_trait(trait_def_id) => {
|
2012-10-08 14:39:30 -05:00
|
|
|
self.add_trait_info_if_containing_method(
|
2013-03-07 17:37:14 -06:00
|
|
|
&mut found_traits, trait_def_id, name);
|
2012-08-17 19:55:34 -05:00
|
|
|
}
|
|
|
|
_ => {
|
|
|
|
// Continue.
|
|
|
|
}
|
|
|
|
}
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-07-11 17:00:40 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Look for imports.
|
2013-02-08 16:08:02 -06:00
|
|
|
for search_module.import_resolutions.each_value
|
2013-02-02 13:47:41 -06:00
|
|
|
|&import_resolution| {
|
2012-07-11 17:00:40 -05:00
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match import_resolution.target_for_namespace(TypeNS) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-07-11 17:00:40 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(target) => {
|
2012-08-06 14:34:08 -05:00
|
|
|
match target.bindings.def_for_namespace(TypeNS) {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def) => {
|
2012-10-15 16:56:42 -05:00
|
|
|
match def {
|
2013-03-27 09:26:57 -05:00
|
|
|
def_trait(trait_def_id) => {
|
2013-02-05 11:29:45 -06:00
|
|
|
let added = self.
|
2012-10-08 14:39:30 -05:00
|
|
|
add_trait_info_if_containing_method(
|
2013-03-07 17:37:14 -06:00
|
|
|
&mut found_traits,
|
|
|
|
trait_def_id, name);
|
2013-02-05 11:29:45 -06:00
|
|
|
if added {
|
|
|
|
import_resolution.state.used =
|
|
|
|
true;
|
|
|
|
}
|
2012-08-17 19:55:34 -05:00
|
|
|
}
|
|
|
|
_ => {
|
|
|
|
// Continue.
|
|
|
|
}
|
|
|
|
}
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-07-11 17:00:40 -05:00
|
|
|
// Continue.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Move to the next parent.
|
2012-08-06 14:34:08 -05:00
|
|
|
match search_module.parent_link {
|
2012-08-03 21:59:04 -05:00
|
|
|
NoParentLink => {
|
2012-07-11 17:00:40 -05:00
|
|
|
// Done.
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
ModuleParentLink(parent_module, _) |
|
2012-08-03 21:59:04 -05:00
|
|
|
BlockParentLink(parent_module, _) => {
|
2012-07-11 17:00:40 -05:00
|
|
|
search_module = parent_module;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-01 19:30:05 -05:00
|
|
|
return found_traits;
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
|
|
|
|
2013-03-22 21:26:41 -05:00
|
|
|
fn add_trait_info_if_containing_method(&self,
|
2013-03-07 17:37:14 -06:00
|
|
|
found_traits: &mut ~[def_id],
|
2012-07-11 17:00:40 -05:00
|
|
|
trait_def_id: def_id,
|
2013-02-21 13:08:50 -06:00
|
|
|
name: ident)
|
|
|
|
-> bool {
|
2012-10-08 14:39:30 -05:00
|
|
|
debug!("(adding trait info if containing method) trying trait %d:%d \
|
|
|
|
for method '%s'",
|
|
|
|
trait_def_id.crate,
|
|
|
|
trait_def_id.node,
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(name));
|
2012-10-08 14:39:30 -05:00
|
|
|
|
2013-02-03 22:29:17 -06:00
|
|
|
match self.trait_info.find(&trait_def_id) {
|
2013-03-22 21:26:41 -05:00
|
|
|
Some(trait_info) if trait_info.contains(&name) => {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(adding trait info if containing method) found trait \
|
2012-07-11 17:00:40 -05:00
|
|
|
%d:%d for method '%s'",
|
|
|
|
trait_def_id.crate,
|
|
|
|
trait_def_id.node,
|
2013-02-10 18:33:16 -06:00
|
|
|
*self.session.str_of(name));
|
2013-03-07 17:37:14 -06:00
|
|
|
found_traits.push(trait_def_id);
|
2013-02-05 11:29:45 -06:00
|
|
|
true
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(_) | None => {
|
2013-02-05 11:29:45 -06:00
|
|
|
false
|
2012-07-11 17:00:40 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn add_fixed_trait_for_expr(@mut self,
|
|
|
|
expr_id: node_id,
|
2013-04-17 11:15:37 -05:00
|
|
|
trait_id: def_id) {
|
2013-03-07 17:37:14 -06:00
|
|
|
self.trait_map.insert(expr_id, @mut ~[trait_id]);
|
2012-07-27 21:32:42 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn record_def(@mut self, node_id: node_id, def: def) {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(recording def) recording %? for %?", def, node_id);
|
2012-05-22 12:54:12 -05:00
|
|
|
self.def_map.insert(node_id, def);
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn enforce_default_binding_mode(@mut self,
|
|
|
|
pat: @pat,
|
2013-01-24 18:24:45 -06:00
|
|
|
pat_binding_mode: binding_mode,
|
|
|
|
descr: &str) {
|
|
|
|
match pat_binding_mode {
|
|
|
|
bind_infer => {}
|
2013-01-10 12:59:58 -06:00
|
|
|
bind_by_copy => {
|
2013-01-24 18:24:45 -06:00
|
|
|
self.session.span_err(
|
|
|
|
pat.span,
|
|
|
|
fmt!("cannot use `copy` binding mode with %s",
|
|
|
|
descr));
|
|
|
|
}
|
|
|
|
bind_by_ref(*) => {
|
|
|
|
self.session.span_err(
|
|
|
|
pat.span,
|
|
|
|
fmt!("cannot use `ref` binding mode with %s",
|
|
|
|
descr));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-01-11 03:08:01 -06:00
|
|
|
//
|
|
|
|
// main function checking
|
|
|
|
//
|
|
|
|
// be sure that there is only one main function
|
|
|
|
//
|
2013-02-21 13:08:50 -06:00
|
|
|
fn check_duplicate_main(@mut self) {
|
2013-03-16 13:11:31 -05:00
|
|
|
let this = &mut *self;
|
2013-04-09 03:16:06 -05:00
|
|
|
if this.attr_main_fn.is_none() && this.start_fn.is_none() {
|
2013-03-16 13:11:31 -05:00
|
|
|
if this.main_fns.len() >= 1u {
|
2013-01-11 03:08:01 -06:00
|
|
|
let mut i = 1u;
|
2013-03-16 13:11:31 -05:00
|
|
|
while i < this.main_fns.len() {
|
2013-03-16 14:49:12 -05:00
|
|
|
let (_, dup_main_span) = this.main_fns[i].unwrap();
|
2013-03-16 13:11:31 -05:00
|
|
|
this.session.span_err(
|
2013-01-11 03:08:01 -06:00
|
|
|
dup_main_span,
|
|
|
|
~"multiple 'main' functions");
|
|
|
|
i += 1;
|
|
|
|
}
|
2013-04-09 03:16:06 -05:00
|
|
|
*this.session.entry_fn = this.main_fns[0];
|
|
|
|
*this.session.entry_type = Some(session::EntryMain);
|
2013-01-11 03:08:01 -06:00
|
|
|
}
|
2013-04-09 03:16:06 -05:00
|
|
|
} else if !this.start_fn.is_none() {
|
|
|
|
*this.session.entry_fn = this.start_fn;
|
|
|
|
*this.session.entry_type = Some(session::EntryStart);
|
2013-01-11 03:08:01 -06:00
|
|
|
} else {
|
2013-04-09 03:16:06 -05:00
|
|
|
*this.session.entry_fn = this.attr_main_fn;
|
|
|
|
*this.session.entry_type = Some(session::EntryMain);
|
2013-01-11 03:08:01 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-06 21:06:58 -05:00
|
|
|
//
|
|
|
|
// Unused import checking
|
|
|
|
//
|
|
|
|
// Although this is a lint pass, it lives in here because it depends on
|
|
|
|
// resolve data structures.
|
|
|
|
//
|
|
|
|
|
2013-02-25 11:12:22 -06:00
|
|
|
fn unused_import_lint_level(@mut self, m: @mut Module) -> level {
|
|
|
|
let settings = self.session.lint_settings;
|
|
|
|
match m.def_id {
|
|
|
|
Some(def) => get_lint_settings_level(settings, unused_imports,
|
|
|
|
def.node, def.node),
|
|
|
|
None => get_lint_level(settings.default_settings, unused_imports)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn check_for_unused_imports_if_necessary(@mut self) {
|
2013-02-25 11:12:22 -06:00
|
|
|
if self.unused_import_lint_level(self.current_module) == allow {
|
2012-08-01 19:30:05 -05:00
|
|
|
return;
|
2012-07-06 21:06:58 -05:00
|
|
|
}
|
|
|
|
|
2013-02-04 16:02:01 -06:00
|
|
|
let root_module = self.graph_root.get_module();
|
2012-07-06 21:06:58 -05:00
|
|
|
self.check_for_unused_imports_in_module_subtree(root_module);
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn check_for_unused_imports_in_module_subtree(@mut self,
|
|
|
|
module_: @mut Module) {
|
2012-07-06 21:06:58 -05:00
|
|
|
// If this isn't a local crate, then bail out. We don't need to check
|
|
|
|
// for unused imports in external crates.
|
|
|
|
|
2012-08-06 14:34:08 -05:00
|
|
|
match module_.def_id {
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(def_id) if def_id.crate == local_crate => {
|
2012-07-06 21:06:58 -05:00
|
|
|
// OK. Continue.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-07-06 21:06:58 -05:00
|
|
|
// Check for unused imports in the root module.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(_) => {
|
2012-07-06 21:06:58 -05:00
|
|
|
// Bail out.
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("(checking for unused imports in module subtree) not \
|
2012-07-13 15:20:49 -05:00
|
|
|
checking for unused imports for `%s`",
|
2012-08-22 19:24:52 -05:00
|
|
|
self.module_to_str(module_));
|
2012-08-01 19:30:05 -05:00
|
|
|
return;
|
2012-07-06 21:06:58 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-31 18:38:41 -05:00
|
|
|
self.check_for_unused_imports_in_module(module_);
|
2012-07-06 21:06:58 -05:00
|
|
|
|
2013-02-08 16:08:02 -06:00
|
|
|
for module_.children.each_value |&child_name_bindings| {
|
2012-08-06 14:34:08 -05:00
|
|
|
match (*child_name_bindings).get_module_if_available() {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => {
|
2012-07-06 21:06:58 -05:00
|
|
|
// Nothing to do.
|
|
|
|
}
|
2012-08-20 14:23:37 -05:00
|
|
|
Some(child_module) => {
|
2012-07-06 21:06:58 -05:00
|
|
|
self.check_for_unused_imports_in_module_subtree
|
|
|
|
(child_module);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-08 16:08:02 -06:00
|
|
|
for module_.anonymous_children.each_value |&child_module| {
|
2012-07-06 21:06:58 -05:00
|
|
|
self.check_for_unused_imports_in_module_subtree(child_module);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn check_for_unused_imports_in_module(@mut self, module_: @mut Module) {
|
2013-02-08 16:08:02 -06:00
|
|
|
for module_.import_resolutions.each_value |&import_resolution| {
|
2013-02-05 01:01:02 -06:00
|
|
|
// Ignore dummy spans for things like automatically injected
|
|
|
|
// imports for the prelude, and also don't warn about the same
|
2013-02-25 10:37:17 -06:00
|
|
|
// import statement being unused more than once. Furthermore, if
|
|
|
|
// the import is public, then we can't be sure whether it's unused
|
|
|
|
// or not so don't warn about it.
|
2013-02-05 01:01:02 -06:00
|
|
|
if !import_resolution.state.used &&
|
|
|
|
!import_resolution.state.warned &&
|
2013-02-25 10:37:17 -06:00
|
|
|
import_resolution.span != dummy_sp() &&
|
|
|
|
import_resolution.privacy != Public {
|
2013-02-05 01:01:02 -06:00
|
|
|
import_resolution.state.warned = true;
|
2013-04-09 00:31:10 -05:00
|
|
|
let span = import_resolution.span;
|
|
|
|
self.session.span_lint_level(
|
|
|
|
self.unused_import_lint_level(module_),
|
|
|
|
span,
|
|
|
|
~"unused import");
|
2012-07-06 21:06:58 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-18 18:18:02 -05:00
|
|
|
|
2012-05-22 12:54:12 -05:00
|
|
|
//
|
|
|
|
// Diagnostics
|
|
|
|
//
|
|
|
|
// Diagnostics are not particularly efficient, because they're rarely
|
|
|
|
// hit.
|
|
|
|
//
|
|
|
|
|
2012-12-29 12:25:09 -06:00
|
|
|
/// A somewhat inefficient routine to obtain the name of a module.
|
2013-02-21 13:08:50 -06:00
|
|
|
fn module_to_str(@mut self, module_: @mut Module) -> ~str {
|
2013-03-07 17:37:14 -06:00
|
|
|
let mut idents = ~[];
|
2012-07-31 18:38:41 -05:00
|
|
|
let mut current_module = module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
loop {
|
2012-08-06 14:34:08 -05:00
|
|
|
match current_module.parent_link {
|
2012-08-03 21:59:04 -05:00
|
|
|
NoParentLink => {
|
2012-05-22 12:54:12 -05:00
|
|
|
break;
|
|
|
|
}
|
2012-08-03 21:59:04 -05:00
|
|
|
ModuleParentLink(module_, name) => {
|
2012-09-19 20:52:49 -05:00
|
|
|
idents.push(name);
|
2012-07-31 18:38:41 -05:00
|
|
|
current_module = module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2012-08-26 14:12:05 -05:00
|
|
|
BlockParentLink(module_, _) => {
|
2012-12-23 16:41:37 -06:00
|
|
|
idents.push(special_idents::opaque);
|
2012-07-31 18:38:41 -05:00
|
|
|
current_module = module_;
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-29 14:08:40 -06:00
|
|
|
if idents.len() == 0 {
|
2012-08-01 19:30:05 -05:00
|
|
|
return ~"???";
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
2013-03-07 17:37:14 -06:00
|
|
|
return self.idents_to_str(vec::reversed(idents));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2013-02-21 13:08:50 -06:00
|
|
|
fn dump_module(@mut self, module_: @mut Module) {
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("Dump of module `%s`:", self.module_to_str(module_));
|
2012-05-22 12:54:12 -05:00
|
|
|
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("Children:");
|
2013-02-08 16:08:02 -06:00
|
|
|
for module_.children.each_key |&name| {
|
2013-02-10 18:33:16 -06:00
|
|
|
debug!("* %s", *self.session.str_of(name));
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
|
2012-08-22 19:24:52 -05:00
|
|
|
debug!("Import resolutions:");
|
2013-04-06 10:22:36 -05:00
|
|
|
for module_.import_resolutions.each |name, import_resolution| {
|
2012-05-22 12:54:12 -05:00
|
|
|
let mut value_repr;
|
2013-03-21 03:10:57 -05:00
|
|
|
match import_resolution.target_for_namespace(ValueNS) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => { value_repr = ~""; }
|
2012-08-26 14:12:05 -05:00
|
|
|
Some(_) => {
|
2012-07-14 00:57:48 -05:00
|
|
|
value_repr = ~" value:?";
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4954
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut type_repr;
|
2013-03-21 03:10:57 -05:00
|
|
|
match import_resolution.target_for_namespace(TypeNS) {
|
2012-08-20 14:23:37 -05:00
|
|
|
None => { type_repr = ~""; }
|
2012-08-26 14:12:05 -05:00
|
|
|
Some(_) => {
|
2012-07-14 00:57:48 -05:00
|
|
|
type_repr = ~" type:?";
|
2013-02-14 20:37:25 -06:00
|
|
|
// FIXME #4954
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-21 03:10:57 -05:00
|
|
|
debug!("* %s:%s%s", *self.session.str_of(*name),
|
2012-10-15 16:56:42 -05:00
|
|
|
value_repr, type_repr);
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-19 01:40:42 -06:00
|
|
|
pub struct CrateMap {
|
|
|
|
def_map: DefMap,
|
|
|
|
exp_map2: ExportMap2,
|
|
|
|
trait_map: TraitMap
|
|
|
|
}
|
|
|
|
|
2012-07-04 16:53:12 -05:00
|
|
|
/// Entry point to crate resolution.
|
2013-01-30 15:44:24 -06:00
|
|
|
pub fn resolve_crate(session: Session,
|
|
|
|
lang_items: LanguageItems,
|
|
|
|
crate: @crate)
|
2013-02-19 01:40:42 -06:00
|
|
|
-> CrateMap {
|
2013-02-21 13:08:50 -06:00
|
|
|
let resolver = @mut Resolver(session, lang_items, crate);
|
|
|
|
resolver.resolve();
|
2013-03-22 21:26:41 -05:00
|
|
|
let @Resolver{def_map, export_map2, trait_map, _} = resolver;
|
2013-02-19 01:40:42 -06:00
|
|
|
CrateMap {
|
2013-03-22 21:26:41 -05:00
|
|
|
def_map: def_map,
|
|
|
|
exp_map2: export_map2,
|
|
|
|
trait_map: trait_map
|
2013-02-19 01:40:42 -06:00
|
|
|
}
|
2012-05-22 12:54:12 -05:00
|
|
|
}
|