| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154 |
- // Part of the Carbon Language project, under the Apache License v2.0 with LLVM
- // Exceptions. See /LICENSE for license information.
- // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
- #include "toolchain/check/modifiers.h"
- namespace Carbon::Check {
- static auto ReportNotAllowed(Context& context, Parse::NodeId modifier_node,
- Lex::TokenKind decl_kind,
- llvm::StringRef context_string,
- Parse::NodeId context_node) -> void {
- CARBON_DIAGNOSTIC(ModifierNotAllowedOn, Error,
- "`{0}` not allowed on `{1}` declaration{2}.",
- Lex::TokenKind, Lex::TokenKind, std::string);
- auto diag = context.emitter().Build(modifier_node, ModifierNotAllowedOn,
- context.token_kind(modifier_node),
- decl_kind, context_string.str());
- if (context_node.is_valid()) {
- CARBON_DIAGNOSTIC(ModifierNotInContext, Note,
- "Containing definition here.");
- diag.Note(context_node, ModifierNotInContext);
- }
- diag.Emit();
- }
- auto LimitModifiersOnDecl(Context& context, KeywordModifierSet allowed,
- Lex::TokenKind decl_kind) -> void {
- auto& s = context.decl_state_stack().innermost();
- auto not_allowed = s.modifier_set & ~allowed;
- if (!!(not_allowed & KeywordModifierSet::Access)) {
- ReportNotAllowed(context, s.saw_access_modifier, decl_kind, "",
- Parse::NodeId::Invalid);
- not_allowed = not_allowed & ~KeywordModifierSet::Access;
- s.saw_access_modifier = Parse::NodeId::Invalid;
- }
- if (!!not_allowed) {
- ReportNotAllowed(context, s.saw_decl_modifier, decl_kind, "",
- Parse::NodeId::Invalid);
- s.saw_decl_modifier = Parse::NodeId::Invalid;
- }
- s.modifier_set &= allowed;
- }
- auto ForbidModifiersOnDecl(Context& context, KeywordModifierSet forbidden,
- Lex::TokenKind decl_kind,
- llvm::StringRef context_string,
- Parse::NodeId context_node) -> void {
- auto& s = context.decl_state_stack().innermost();
- auto not_allowed = s.modifier_set & forbidden;
- if (!!(not_allowed & KeywordModifierSet::Access)) {
- ReportNotAllowed(context, s.saw_access_modifier, decl_kind, context_string,
- context_node);
- not_allowed = not_allowed & ~KeywordModifierSet::Access;
- s.saw_access_modifier = Parse::NodeId::Invalid;
- }
- if (!!not_allowed) {
- ReportNotAllowed(context, s.saw_decl_modifier, decl_kind, context_string,
- context_node);
- s.saw_decl_modifier = Parse::NodeId::Invalid;
- }
- s.modifier_set = s.modifier_set & ~forbidden;
- }
- // Returns the instruction that owns the given scope, or Invalid if the scope is
- // not associated with an instruction.
- auto GetScopeInstId(Context& context, SemIR::NameScopeId scope_id)
- -> SemIR::InstId {
- if (!scope_id.is_valid()) {
- return SemIR::InstId::Invalid;
- }
- return context.name_scopes().Get(scope_id).inst_id;
- }
- // Returns the instruction that owns the given scope, or Invalid if the scope is
- // not associated with an instruction.
- auto GetScopeInst(Context& context, SemIR::NameScopeId scope_id)
- -> std::optional<SemIR::Inst> {
- auto inst_id = GetScopeInstId(context, scope_id);
- if (!inst_id.is_valid()) {
- return std::nullopt;
- }
- return context.insts().Get(inst_id);
- }
- auto CheckAccessModifiersOnDecl(Context& context, Lex::TokenKind decl_kind,
- SemIR::NameScopeId target_scope_id) -> void {
- auto target = GetScopeInst(context, target_scope_id);
- if (target && target->Is<SemIR::Namespace>()) {
- // TODO: This assumes that namespaces can only be declared at file scope. If
- // we add support for non-file-scope namespaces, we will need to check the
- // parents of the target scope to determine whether we're at file scope.
- ForbidModifiersOnDecl(
- context, KeywordModifierSet::Protected, decl_kind,
- " at file scope, `protected` is only allowed on class members");
- return;
- }
- if (target && target->Is<SemIR::ClassDecl>()) {
- // Both `private` and `protected` allowed in a class definition.
- return;
- }
- // Otherwise neither `private` nor `protected` allowed.
- ForbidModifiersOnDecl(context, KeywordModifierSet::Protected, decl_kind,
- ", `protected` is only allowed on class members");
- ForbidModifiersOnDecl(
- context, KeywordModifierSet::Private, decl_kind,
- ", `private` is only allowed on class members and at file scope");
- }
- // Rules for abstract, virtual, and impl, which are only allowed in classes.
- auto CheckMethodModifiersOnFunction(Context& context,
- SemIR::NameScopeId target_scope_id)
- -> void {
- const Lex::TokenKind decl_kind = Lex::TokenKind::Fn;
- auto target_id = GetScopeInstId(context, target_scope_id);
- if (target_id.is_valid()) {
- if (auto class_decl =
- context.insts().TryGetAs<SemIR::ClassDecl>(target_id)) {
- auto inheritance_kind =
- context.classes().Get(class_decl->class_id).inheritance_kind;
- if (inheritance_kind == SemIR::Class::Final) {
- ForbidModifiersOnDecl(context, KeywordModifierSet::Virtual, decl_kind,
- " in a non-abstract non-base `class` definition",
- context.insts().GetParseNode(target_id));
- }
- if (inheritance_kind != SemIR::Class::Abstract) {
- ForbidModifiersOnDecl(context, KeywordModifierSet::Abstract, decl_kind,
- " in a non-abstract `class` definition",
- context.insts().GetParseNode(target_id));
- }
- return;
- }
- }
- ForbidModifiersOnDecl(context, KeywordModifierSet::Method, decl_kind,
- " outside of a class");
- }
- auto RequireDefaultFinalOnlyInInterfaces(Context& context,
- Lex::TokenKind decl_kind,
- SemIR::NameScopeId target_scope_id)
- -> void {
- auto target = GetScopeInst(context, target_scope_id);
- if (target && target->Is<SemIR::InterfaceDecl>()) {
- // Both `default` and `final` allowed in an interface definition.
- return;
- }
- ForbidModifiersOnDecl(context, KeywordModifierSet::Interface, decl_kind,
- " outside of an interface");
- }
- } // namespace Carbon::Check
|