3 import mal_types
as types
4 from mal_types
import (MalSym
, MalInt
, MalStr
, _symbol
, _keywordu
,
5 MalList
, _list
, MalVector
, MalHashMap
, MalFunc
)
11 return reader
.read_str(str)
14 def eval_ast(ast
, env
):
15 if types
._symbol
_Q
(ast
):
16 assert isinstance(ast
, MalSym
)
18 elif types
._list
_Q
(ast
):
21 res
.append(EVAL(a
, env
))
23 elif types
._vector
_Q
(ast
):
26 res
.append(EVAL(a
, env
))
28 elif types
._hash
_map
_Q
(ast
):
30 for k
in ast
.dct
.keys():
31 new_dct
[k
] = EVAL(ast
.dct
[k
], env
)
32 return MalHashMap(new_dct
)
34 return ast
# primitive value, return unchanged
37 #print("EVAL %s" % printer._pr_str(ast))
38 if not types
._list
_Q
(ast
):
39 return eval_ast(ast
, env
)
42 if len(ast
) == 0: return ast
44 if not isinstance(a0
, MalSym
):
45 raise Exception("attempt to apply on non-symbol")
47 if u
"def!" == a0
.value
:
48 a1
, a2
= ast
[1], ast
[2]
50 return env
.set(a1
, res
)
51 elif u
"let*" == a0
.value
:
52 a1
, a2
= ast
[1], ast
[2]
54 for i
in range(0, len(a1
), 2):
55 let_env
.set(a1
[i
], EVAL(a1
[i
+1], let_env
))
56 return EVAL(a2
, let_env
)
58 el
= eval_ast(ast
, env
)
60 if isinstance(f
, MalFunc
):
61 return f
.apply(el
.values
[1:])
63 raise Exception("%s is not callable" % f
)
67 return printer
._pr
_str
(exp
)
72 return PRINT(EVAL(READ(str), env
))
75 a
, b
= args
[0], args
[1]
76 assert isinstance(a
, MalInt
)
77 assert isinstance(b
, MalInt
)
78 return MalInt(a
.value
+b
.value
)
80 a
, b
= args
[0], args
[1]
81 assert isinstance(a
, MalInt
)
82 assert isinstance(b
, MalInt
)
83 return MalInt(a
.value
-b
.value
)
85 a
, b
= args
[0], args
[1]
86 assert isinstance(a
, MalInt
)
87 assert isinstance(b
, MalInt
)
88 return MalInt(a
.value
*b
.value
)
90 a
, b
= args
[0], args
[1]
91 assert isinstance(a
, MalInt
)
92 assert isinstance(b
, MalInt
)
93 return MalInt(int(a
.value
/b
.value
))
94 repl_env
.set(_symbol(u
'+'), MalFunc(plus
))
95 repl_env
.set(_symbol(u
'-'), MalFunc(minus
))
96 repl_env
.set(_symbol(u
'*'), MalFunc(multiply
))
97 repl_env
.set(_symbol(u
'/'), MalFunc(divide
))
99 def entry_point(argv
):
102 line
= mal_readline
.readline("user> ")
103 if line
== "": continue
104 print(REP(line
, repl_env
))
105 except EOFError as e
:
107 except Exception as e
:
109 #print("".join(traceback.format_exception(*sys.exc_info())))
112 # _____ Define and setup target ___
116 # Just run entry_point if not RPython compilation
118 if not sys
.argv
[0].endswith('rpython'):
119 entry_point(sys
.argv
)