coffee, dart, elixir, elm: detect unclosed strings.
[jackhill/mal.git] / rpython / step5_tco.py
CommitLineData
e0529eb2
JM
1import sys, traceback
2import mal_readline
3import mal_types as types
8855a05a
JM
4from mal_types import (MalSym, MalInt, MalStr,
5 nil, true, false, _symbol, _keywordu,
6 MalList, _list, MalVector, MalHashMap, MalFunc)
e0529eb2
JM
7import reader, printer
8from env import Env
9import core
10
11# read
12def READ(str):
13 return reader.read_str(str)
14
15# eval
16def eval_ast(ast, env):
17 if types._symbol_Q(ast):
18 assert isinstance(ast, MalSym)
19 return env.get(ast)
20 elif types._list_Q(ast):
21 res = []
22 for a in ast.values:
23 res.append(EVAL(a, env))
24 return MalList(res)
8855a05a
JM
25 elif types._vector_Q(ast):
26 res = []
27 for a in ast.values:
28 res.append(EVAL(a, env))
29 return MalVector(res)
30 elif types._hash_map_Q(ast):
31 new_dct = {}
32 for k in ast.dct.keys():
33 new_dct[k] = EVAL(ast.dct[k], env)
34 return MalHashMap(new_dct)
e0529eb2
JM
35 else:
36 return ast # primitive value, return unchanged
37
38def EVAL(ast, env):
39 while True:
40 #print("EVAL %s" % printer._pr_str(ast))
41 if not types._list_Q(ast):
42 return eval_ast(ast, env)
43
44 # apply list
45 if len(ast) == 0: return ast
46 a0 = ast[0]
47 if isinstance(a0, MalSym):
48 a0sym = a0.value
49 else:
50 a0sym = u"__<*fn*>__"
51
52 if u"def!" == a0sym:
53 a1, a2 = ast[1], ast[2]
54 res = EVAL(a2, env)
55 return env.set(a1, res)
56 elif u"let*" == a0sym:
57 a1, a2 = ast[1], ast[2]
58 let_env = Env(env)
59 for i in range(0, len(a1), 2):
60 let_env.set(a1[i], EVAL(a1[i+1], let_env))
61 ast = a2
62 env = let_env # Continue loop (TCO)
63 elif u"do" == a0sym:
64 if len(ast) == 0:
65 return nil
66 elif len(ast) > 1:
67 eval_ast(ast.slice2(1, len(ast)-1), env)
68 ast = ast[-1] # Continue loop (TCO)
69 elif u"if" == a0sym:
70 a1, a2 = ast[1], ast[2]
71 cond = EVAL(a1, env)
72 if cond is nil or cond is false:
73 if len(ast) > 3: ast = ast[3] # Continue loop (TCO)
74 else: return nil
75 else:
76 ast = a2 # Continue loop (TCO)
77 elif u"fn*" == a0sym:
78 a1, a2 = ast[1], ast[2]
79 return MalFunc(None, a2, env, a1, EVAL)
80 else:
81 el = eval_ast(ast, env)
82 f = el.values[0]
83 if isinstance(f, MalFunc):
84 if f.ast:
85 ast = f.ast
86 env = f.gen_env(el.rest()) # Continue loop (TCO)
87 else:
88 return f.apply(el.rest())
89 else:
90 raise Exception("%s is not callable" % f)
91
92# print
93def PRINT(exp):
94 return printer._pr_str(exp)
95
96# repl
97def entry_point(argv):
98 repl_env = Env()
99 def REP(str, env):
100 return PRINT(EVAL(READ(str), env))
101
102 # core.py: defined using python
103 for k, v in core.ns.items():
104 repl_env.set(_symbol(unicode(k)), MalFunc(v))
105
106 # core.mal: defined using the language itself
107 REP("(def! not (fn* (a) (if a false true)))", repl_env)
108
109 while True:
110 try:
111 line = mal_readline.readline("user> ")
112 if line == "": continue
113 print(REP(line, repl_env))
114 except EOFError as e:
115 break
ab02c5bb
JM
116 except reader.Blank:
117 continue
118 except types.MalException as e:
119 print(u"Error: %s" % printer._pr_str(e.object, False))
e0529eb2 120 except Exception as e:
ab02c5bb 121 print("Error: %s" % e)
e0529eb2
JM
122 #print("".join(traceback.format_exception(*sys.exc_info())))
123 return 0
124
125# _____ Define and setup target ___
126def target(*args):
127 return entry_point
128
129# Just run entry_point if not RPython compilation
130import sys
131if not sys.argv[0].endswith('rpython'):
132 entry_point(sys.argv)