Skip to content

Commit 8d5a51e

Browse files
committed
Merge pull request #3146 from alexrp/incoming
Documentation updates (typestate and pure functions).
2 parents 79b5f68 + 11c1baa commit 8d5a51e

File tree

1 file changed

+16
-48
lines changed

1 file changed

+16
-48
lines changed

doc/rust.md

Lines changed: 16 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -899,58 +899,51 @@ express that `f` requires no explicit `return`, as if it returns
899899
control to the caller, it returns a value (true because it never returns
900900
control).
901901

902-
#### Predicate functions
902+
#### Pure functions
903903

904-
Any pure boolean function is called a *predicate function*, and may be used in
905-
a [constraint](#constraints), as part of the static [typestate
906-
system](#typestate-system). A predicate declaration is identical to a function
907-
declaration, except that it is declared with the additional keyword `pure`. In
908-
addition, the typechecker checks the body of a predicate with a restricted set
909-
of typechecking rules. A predicate
904+
A pure function declaration is identical to a function declaration, except that
905+
it is declared with the additional keyword `pure`. In addition, the typechecker
906+
checks the body of a pure function with a restricted set of typechecking rules.
907+
A pure function
910908

911909
* may not contain an assignment or self-call expression; and
912-
* may only call other predicates, not general functions.
910+
* may only call other pure functions, not general functions.
913911

914-
An example of a predicate:
912+
An example of a pure function:
915913

916914
~~~~
917915
pure fn lt_42(x: int) -> bool {
918916
return (x < 42);
919917
}
920918
~~~~
921919

922-
A non-boolean function may also be declared with `pure fn`. This allows
923-
predicates to call non-boolean functions as long as they are pure. For example:
920+
Pure functions may call other pure functions:
924921

925922
~~~~{.xfail-test}
926923
pure fn pure_length<T>(ls: list<T>) -> uint { /* ... */ }
927924
928925
pure fn nonempty_list<T>(ls: list<T>) -> bool { pure_length(ls) > 0u }
929926
~~~~
930927

931-
In this example, `nonempty_list` is a predicate---it can be used in a
932-
typestate constraint---but the auxiliary function `pure_length` is
933-
not.
934-
935928
*TODO:* should actually define referential transparency.
936929

937930
The effect checking rules previously enumerated are a restricted set of
938931
typechecking rules meant to approximate the universe of observably
939932
referentially transparent Rust procedures conservatively. Sometimes, these
940933
rules are *too* restrictive. Rust allows programmers to violate these rules by
941-
writing predicates that the compiler cannot prove to be referentially
934+
writing pure functions that the compiler cannot prove to be referentially
942935
transparent, using an escape-hatch feature called "unchecked blocks". When
943936
writing code that uses unchecked blocks, programmers should always be aware
944937
that they have an obligation to show that the code *behaves* referentially
945938
transparently at all times, even if the compiler cannot *prove* automatically
946939
that the code is referentially transparent. In the presence of unchecked
947940
blocks, the compiler provides no static guarantee that the code will behave as
948941
expected at runtime. Rather, the programmer has an independent obligation to
949-
verify the semantics of the predicates they write.
942+
verify the semantics of the pure functions they write.
950943

951944
*TODO:* last two sentences are vague.
952945

953-
An example of a predicate that uses an unchecked block:
946+
An example of a pure function that uses an unchecked block:
954947

955948
~~~~
956949
# import std::list::*;
@@ -972,7 +965,7 @@ pure fn pure_length<T>(ls: list<T>) -> uint {
972965

973966
Despite its name, `pure_foldl` is a `fn`, not a `pure fn`, because there is no
974967
way in Rust to specify that the higher-order function argument `f` is a pure
975-
function. So, to use `foldl` in a pure list length function that a predicate
968+
function. So, to use `foldl` in a pure list length function that a pure function
976969
could then use, we must use an `unchecked` block wrapped around the call to
977970
`pure_foldl` in the definition of `pure_length`.
978971

@@ -1136,8 +1129,8 @@ looks like:
11361129

11371130
The only exception is that the body of the class constructor begins
11381131
with all the class's fields uninitialized, and is allowed to -- in
1139-
fact, must -- initialize all the fields. A special case in the
1140-
typestate pass enforces this invariant.
1132+
fact, must -- initialize all the fields. The compiler enforces this
1133+
invariant.
11411134

11421135
Usually, the class constructor stores its argument or arguments in the
11431136
class's named fields. In this case, the `file_descriptor`'s data field
@@ -2074,31 +2067,6 @@ A `loop` expression denotes an infinite loop:
20742067
loop_expr : "loop" '{' block '}';
20752068
~~~~~~~~
20762069

2077-
For a block `b`, the expression `loop b` is semantically equivalent to
2078-
`while true b`. However, `loop`s differ from `while` loops in that the
2079-
typestate analysis pass takes into account that `loop`s are infinite.
2080-
2081-
For example, the following (contrived) function uses a `loop` with a
2082-
`return` expression:
2083-
2084-
~~~~
2085-
fn count() -> bool {
2086-
let mut i = 0;
2087-
loop {
2088-
i += 1;
2089-
if i == 20 { return true; }
2090-
}
2091-
}
2092-
~~~~
2093-
2094-
This function compiles, because typestate recognizes that the `loop`
2095-
never terminates (except non-locally, with `return`), thus there is no
2096-
need to insert a spurious `fail` or `return` after the `loop`. If `loop`
2097-
were replaced with `while true`, the function would be rejected
2098-
because from the compiler's perspective, there would be a control path
2099-
along which `count` does not return a value (that is, if the loop
2100-
condition is always false).
2101-
21022070
### Break expressions
21032071

21042072
~~~~~~~~{.ebnf .gram}
@@ -2540,7 +2508,7 @@ macro-generated and user-written code can cause unintentional capture.
25402508
Future versions of Rust will address these issues.
25412509

25422510

2543-
# Types and typestates
2511+
# Type system
25442512

25452513
## Types
25462514

@@ -2966,7 +2934,7 @@ Local variables are not initialized when allocated; the entire frame worth of
29662934
local variables are allocated at once, on frame-entry, in an uninitialized
29672935
state. Subsequent statements within a function may or may not initialize the
29682936
local variables. Local variables can be used only after they have been
2969-
initialized; this condition is guaranteed by the typestate system.
2937+
initialized; this is enforced by the compiler.
29702938

29712939
References are created for function arguments. If the compiler can not prove
29722940
that the referred-to value will outlive the reference, it will try to set

0 commit comments

Comments
 (0)