mirror of
https://github.com/kanaka/mal.git
synced 2024-11-09 18:06:35 +03:00
b31180cfd2
These implementations were double evaluating the last position of a do form (off by one). Mostly this is just a performance issue until you have something with side-effect in the last position such as prn's, swap!'s or readline's. In self-hosted mode this become apparent with large chunks of mal code in the last position. The symptoms were repeated prns and multiple levels of readline being called, etc. Add a step6 test that uses atoms to test this (should be in step 4 using prn side-effects but it's difficult to match across multiple lines in a cross-platform way so we test using an atom in step6. Also, remove cast in Kotlin that was causing a compile warning. |
||
---|---|---|
.. | ||
src/main/java/mal | ||
tests | ||
Dockerfile | ||
Makefile | ||
pom.xml | ||
run |