mirror of
https://github.com/kanaka/mal.git
synced 2024-11-11 08:56:41 +03:00
0997015d97
* ASSERT is to check for internal errors * MAL_CHECK / MAL_FAIL is to check mal code errors
112 lines
2.9 KiB
C++
112 lines
2.9 KiB
C++
#include "MAL.h"
|
|
|
|
#include "Environment.h"
|
|
#include "ReadLine.h"
|
|
#include "Types.h"
|
|
|
|
#include <iostream>
|
|
#include <memory>
|
|
|
|
malValuePtr READ(const String& input);
|
|
String PRINT(malValuePtr ast);
|
|
|
|
static ReadLine s_readLine("~/.mal-history");
|
|
|
|
int main(int argc, char* argv[])
|
|
{
|
|
String prompt = "user> ";
|
|
String input;
|
|
malEnvPtr replEnv(new malEnv);
|
|
installCore(replEnv);
|
|
while (s_readLine.get(prompt, input)) {
|
|
String out;
|
|
try {
|
|
out = rep(input, replEnv);
|
|
}
|
|
catch (malEmptyInputException&) {
|
|
continue; // no output
|
|
}
|
|
catch (String& s) {
|
|
out = s;
|
|
};
|
|
std::cout << out << "\n";
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
String rep(const String& input, malEnvPtr env)
|
|
{
|
|
return PRINT(EVAL(READ(input), env));
|
|
}
|
|
|
|
malValuePtr READ(const String& input)
|
|
{
|
|
return readStr(input);
|
|
}
|
|
|
|
malValuePtr EVAL(malValuePtr ast, malEnvPtr env)
|
|
{
|
|
const malList* list = DYNAMIC_CAST(malList, ast);
|
|
if (!list || (list->count() == 0)) {
|
|
return ast->eval(env);
|
|
}
|
|
|
|
// From here on down we are evaluating a non-empty list.
|
|
// First handle the special forms.
|
|
if (const malSymbol* symbol = DYNAMIC_CAST(malSymbol, list->item(0))) {
|
|
String special = symbol->value();
|
|
int argCount = list->count() - 1;
|
|
|
|
if (special == "def!") {
|
|
checkArgsIs("def!", 2, argCount);
|
|
const malSymbol* id = VALUE_CAST(malSymbol, list->item(1));
|
|
return env->set(id->value(), EVAL(list->item(2), env));
|
|
}
|
|
|
|
if (special == "let*") {
|
|
checkArgsIs("let*", 2, argCount);
|
|
const malSequence* bindings =
|
|
VALUE_CAST(malSequence, list->item(1));
|
|
int count = checkArgsEven("let*", bindings->count());
|
|
malEnvPtr inner(new malEnv(env));
|
|
for (int i = 0; i < count; i += 2) {
|
|
const malSymbol* var =
|
|
VALUE_CAST(malSymbol, bindings->item(i));
|
|
inner->set(var->value(), EVAL(bindings->item(i+1), inner));
|
|
}
|
|
return EVAL(list->item(2), inner);
|
|
}
|
|
}
|
|
|
|
// Now we're left with the case of a regular list to be evaluated.
|
|
std::unique_ptr<malValueVec> items(list->evalItems(env));
|
|
malValuePtr op = items->at(0);
|
|
return APPLY(op, items->begin()+1, items->end(), env);
|
|
}
|
|
|
|
String PRINT(malValuePtr ast)
|
|
{
|
|
return ast->print(true);
|
|
}
|
|
|
|
malValuePtr APPLY(malValuePtr op, malValueIter argsBegin, malValueIter argsEnd,
|
|
malEnvPtr env)
|
|
{
|
|
const malApplicable* handler = DYNAMIC_CAST(malApplicable, op);
|
|
MAL_CHECK(handler != NULL,
|
|
"\"%s\" is not applicable", op->print(true).c_str());
|
|
|
|
return handler->apply(argsBegin, argsEnd, env);
|
|
}
|
|
|
|
// Added to keep the linker happy at step A
|
|
malValuePtr readline(const String& prompt)
|
|
{
|
|
String input;
|
|
if (s_readLine.get(prompt, input)) {
|
|
return mal::string(input);
|
|
}
|
|
return mal::nilValue();
|
|
}
|
|
|