1
0
Fork 0
mirror of https://github.com/ton-blockchain/ton synced 2025-03-09 15:40:10 +00:00
ton/tolk/pipe-check-pure-impure.cpp
tolk-vm f3e620f48c
[Tolk] Nullable types T? and null safety
This commit introduces nullable types `T?` that are
distinct from non-nullable `T`.
Example: `int?` (int or null) and `int` are different now.
Previously, `null` could be assigned to any primitive type.
Now, it can be assigned only to `T?`.

A non-null assertion operator `!` was also introduced,
similar to `!` in TypeScript and `!!` in Kotlin.

If `int?` still occupies 1 stack slot, `(int,int)?` and
other nullable tensors occupy N+1 slots, the last for
"null precedence". `v == null` actually compares that slot.
Assigning `(int,int)` to `(int,int)?` implicitly creates
a null presence slot. Assigning `null` to `(int,int)?` widens
this null value to 3 slots. This is called "type transitioning".

All stdlib functions prototypes have been updated to reflect
whether they return/accept a nullable or a strict value.

This commit also contains refactoring from `const FunctionData*`
to `FunctionPtr` and similar.
2025-02-28 16:41:41 +03:00

93 lines
2.8 KiB
C++

/*
This file is part of TON Blockchain source code.
TON Blockchain is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License
as published by the Free Software Foundation; either version 2
of the License, or (at your option) any later version.
TON Blockchain is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with TON Blockchain. If not, see <http://www.gnu.org/licenses/>.
*/
#include "tolk.h"
#include "ast.h"
#include "ast-visitor.h"
#include "platform-utils.h"
/*
* This pipe checks for impure operations inside pure functions.
* It happens after type inferring (after methods binding) since it operates fun_ref of calls.
*/
namespace tolk {
GNU_ATTRIBUTE_NORETURN GNU_ATTRIBUTE_COLD
static void fire_error_impure_operation_inside_pure_function(AnyV v) {
v->error("an impure operation in a pure function");
}
class CheckImpureOperationsInPureFunctionVisitor final : public ASTVisitorFunctionBody {
static void fire_if_global_var(AnyExprV v) {
if (auto v_ident = v->try_as<ast_reference>()) {
if (v_ident->sym->try_as<GlobalVarPtr>()) {
fire_error_impure_operation_inside_pure_function(v);
}
}
}
void visit(V<ast_assign> v) override {
fire_if_global_var(v->get_lhs());
parent::visit(v);
}
void visit(V<ast_set_assign> v) override {
fire_if_global_var(v->get_lhs());
parent::visit(v);
}
void visit(V<ast_function_call> v) override {
// v is `globalF(args)` / `globalF<int>(args)` / `obj.method(args)` / `local_var(args)` / `getF()(args)`
if (!v->fun_maybe) {
// `local_var(args)` is always impure, no considerations about what's there at runtime
fire_error_impure_operation_inside_pure_function(v);
}
if (!v->fun_maybe->is_marked_as_pure()) {
fire_error_impure_operation_inside_pure_function(v);
}
parent::visit(v);
}
void visit(V<ast_argument> v) override {
if (v->passed_as_mutate) {
fire_if_global_var(v->get_expr());
}
parent::visit(v);
}
void visit(V<ast_throw_statement> v) override {
fire_error_impure_operation_inside_pure_function(v);
}
void visit(V<ast_assert_statement> v) override {
fire_error_impure_operation_inside_pure_function(v);
}
public:
bool should_visit_function(FunctionPtr fun_ref) override {
return fun_ref->is_code_function() && !fun_ref->is_generic_function() && fun_ref->is_marked_as_pure();
}
};
void pipeline_check_pure_impure_operations() {
visit_ast_of_all_functions<CheckImpureOperationsInPureFunctionVisitor>();
}
} // namespace tolk