Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Feat/expr in var origin #45

Merged
merged 18 commits into from
Mar 20, 2025
Merged

Feat/expr in var origin #45

merged 18 commits into from
Mar 20, 2025

Conversation

ascandone
Copy link
Contributor

@ascandone ascandone commented Mar 5, 2025

NOTE FOR REVIEWERS: commits are rubbish. The PR is not meant to be read commit by commit, and it'll be squashed before merge (as always, discard the antlr autogenerated part)

Specs

This PR changes the numscript grammar so that the variable origin is not just a function call but any expression. Conversely, a function call is now an expression.
This means that:

vars {
  number $b = 1 + 2
}

is now possible, and at the same time:

send balance(@alice, 42) { .. }

is now allowed as well

important caveat: it will only be possible to call the meta() function in a toplevel position of a var origin (same way as it was until this PR). This is because otherwise it would be tricky (and even trickier for the user) to determine the return type (which is needed to parse correctly the stringified meta)

feature flags: the feature is under the experimental-mid-script-function-call feature flag

Copy link

coderabbitai bot commented Mar 5, 2025

Walkthrough

This PR enhances Numscript by extending its grammar to support function calls within value expressions and broadening variable origin definitions. It refactors internal analysis and hover logic to use generalized expression checking, introduces a new mid-script function call feature flag in the CLI, and improves balance management with new types and methods. Parser components and AST definitions have been updated to handle the new application context and expression types. Additional tests validate balance operations, mid-script function calls, and error handling for invalid nested meta calls.

Changes

File(s) Change Summary
Numscript.g4 Updated grammar: added functionCall option in valueExpr, changed varOrigin rule to use valueExpr, and removed an extraneous semicolon in parenthesizedExpr.
internal/analysis/check.go,
internal/analysis/hover.go
Refactored type checking and hover logic: removed checkVarOrigin, integrated function call checks into a unified method, and updated hover to handle general expressions.
internal/cmd/run.go Introduced a new boolean flag midScriptFunctionCallFeatureFlag with corresponding command-line flag definitions.
internal/interpreter/balances.go,
.../batch_balances_query.go
Added the Balances type and methods (fetchAccountBalances, fetchBalance, has, filterQuery, mergeBalance); simplified balance query logic by filtering and merging balances.
internal/interpreter/evaluate_expr.go,
.../interpreter.go,
.../interpreter_error.go
Modified function call handling: added feature flag checks, renamed functions (e.g., handleOriginhandleFnOrigin), introduced handleFnCall, and added a new error type InvalidNestedMeta.
internal/interpreter/interpreter_test.go,
internal/parser/parser_test.go,
numscript_test.go
Expanded testing: new tests for static store, balance retrieval, mid-script balance handling, interleaved balance batching, expression evaluation in variable origins, and invalid nested meta calls.
internal/interpreter/value.go Added the NewMonetary helper function to create Monetary instances.
internal/parser/antlrParser/numscript.interp,
.../numscript_base_listener.go,
.../numscript_listener.go,
.../numscript_parser.go
Enhanced parser events: introduced a new ApplicationContext type and added listener methods (EnterApplication, ExitApplication), with adjusted state transitions for improved function call handling.
internal/parser/ast.go,
internal/parser/parser.go
Updated AST and parsing logic: FnCall now implements valueExpr and VarDeclaration.Origin accepts a generic ValueExpr; parsing now handles an ApplicationContext as part of value expressions.

Sequence Diagram(s)

Loading
sequenceDiagram
    participant Eval as evaluateExpr
    participant Flag as FeatureFlag Checker
    participant Handler as handleFnCall
    Eval ->> Flag: checkFeatureFlag("ExperimentalMidScriptFunctionCall")
    alt Feature Enabled
        Eval ->> Handler: Invoke handleFnCall(fnCall)
        Handler -->> Eval: Return evaluated value
    else Feature Disabled
        Eval -->> Eval: Return error
    end
Loading
sequenceDiagram
    participant Query as runBalancesQuery
    participant Cache as CachedBalances
    participant Store as StaticStore
    Query ->> Cache: filterQuery(currentQuery)
    Cache -->> Query: filteredQuery
    Query ->> Store: GetBalances(filteredQuery)
    Store -->> Query: queriedBalances
    Query ->> Cache: mergeBalance(queriedBalances)

Possibly related PRs

Poem

I’m a rabbit with a joyful hop,
New calls and flags make my code pop!
Grammar leaps high, balances twirl,
As functions and tests give life a whirl.
With each line refined, I cheer in delight 🐇✨
Hopping through changes all day and night!
Happy coding in our burrow of light!


📜 Recent review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between c8acd97 and f8fd8d1.

📒 Files selected for processing (1)
  • internal/interpreter/interpreter_test.go (4 hunks)
🧰 Additional context used
🧬 Code Definitions (1)
internal/interpreter/interpreter_test.go (3)
internal/interpreter/reconciler.go (2) (2)
  • t (122-122)
  • Posting (9-14)
internal/interpreter/interpreter.go (7) (7)
  • StaticStore (33-36)
  • Balances (23-23)
  • AccountBalance (22-22)
  • BalanceQuery (17-17)
  • ExperimentalMidScriptFunctionCall (218-218)
  • meta (852-883)
  • AccountsMetadata (26-26)
internal/interpreter/interpreter_error.go (2) (2)
  • InvalidNestedMeta (224-226)
  • InvalidNestedMeta (228-230)
🔇 Additional comments (8)
internal/interpreter/interpreter_test.go (8)

69-70: Added test parallelization to improve performance.

Adding t.Parallel() allows tests to run concurrently, which is good practice for improving test performance.


156-188: Good implementation of test for StaticStore.GetBalances.

This test thoroughly verifies the balance querying functionality of the StaticStore, ensuring it correctly filters and returns account balances.


2255-2284: Well-structured test for basic balance retrieval functionality.

The test correctly verifies that balance information can be retrieved from an account and then used in a transaction, confirming the proper generation of the posting with correct amount, source, and destination.


2286-2314: Good test for retrieving balance from source account.

This test ensures that when retrieving a balance from the same account that's used as the source, the transaction works correctly. It complements the previous test to verify balance retrieval is consistent in different contexts.


4046-4072: Effective test for mid-script function call feature.

This test validates the new ability to call the balance function directly within a value expression. It correctly uses the experimental feature flag and verifies the expected posting is generated.


4074-4115: Good test for balance retrieval after state change.

This test covers an important scenario where an account's balance is first decreased and then the remaining balance is retrieved and sent, ensuring the interpreter correctly tracks the updated balance during script execution.


4117-4133: Validates expression support in variable declarations.

This test confirms the core enhancement of allowing expressions in variable origins, which is a key part of the PR objectives. The test properly verifies that a simple arithmetic expression works in a variable declaration.


4135-4155: Validates restriction on nested meta calls.

This test correctly verifies the limitation mentioned in the PR that the meta() function cannot be nested within expressions, ensuring proper error handling when such nesting is attempted.

✨ Finishing Touches
  • 📝 Generate Docstrings

🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

@ascandone ascandone force-pushed the feat/expr-in-var-origin branch 4 times, most recently from 9f5a254 to 9101a5a Compare March 7, 2025 16:39
fix

fix tests

add red test

fix tests after rebase
@ascandone ascandone force-pushed the feat/expr-in-var-origin branch from 04c66df to 50d8dd2 Compare March 10, 2025 13:51
Copy link

codecov bot commented Mar 13, 2025

Codecov Report

Attention: Patch coverage is 90.75829% with 39 lines in your changes missing coverage. Please review.

Project coverage is 62.25%. Comparing base (765dd19) to head (f8fd8d1).
Report is 1 commits behind head on main.

Files with missing lines Patch % Lines
internal/parser/antlrParser/numscript_parser.go 93.44% 16 Missing and 3 partials ⚠️
internal/cmd/run.go 0.00% 7 Missing ⚠️
internal/interpreter/value.go 0.00% 5 Missing ⚠️
internal/interpreter/balances.go 91.42% 2 Missing and 1 partial ⚠️
internal/interpreter/interpreter_error.go 0.00% 2 Missing ⚠️
...rnal/parser/antlrParser/numscript_base_listener.go 0.00% 2 Missing ⚠️
internal/parser/ast.go 0.00% 1 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##             main      #45      +/-   ##
==========================================
+ Coverage   62.13%   62.25%   +0.11%     
==========================================
  Files          32       33       +1     
  Lines        7113     7235     +122     
==========================================
+ Hits         4420     4504      +84     
- Misses       2473     2505      +32     
- Partials      220      226       +6     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@ascandone ascandone requested review from gfyrag and a team March 17, 2025 15:03
@ascandone ascandone marked this pull request as ready for review March 17, 2025 15:04
Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 4

🧹 Nitpick comments (4)
internal/cmd/run.go (1)

219-219: Fix typo in feature flag description

There's a small typo in the feature flag description.

-	cmd.Flags().BoolVar(&midScriptFunctionCallFeatureFlag, interpreter.ExperimentalMidScriptFunctionCall, false, "allows to use function call as expression, and to use any expression when definining variables")
+	cmd.Flags().BoolVar(&midScriptFunctionCallFeatureFlag, interpreter.ExperimentalMidScriptFunctionCall, false, "allows to use function call as expression, and to use any expression when defining variables")
🧰 Tools
🪛 GitHub Check: codecov/patch

[warning] 219-219: internal/cmd/run.go#L219
Added line #L219 was not covered by tests

numscript_test.go (1)

420-458: Well-structured test for mid-script function calls.

This test effectively verifies the new functionality that allows balance() to be called mid-script when the feature flag is enabled. It correctly tests that the balance is properly captured in the transaction metadata.

One suggestion - consider adding a test case that verifies the error condition when meta() is called within another expression, as this was mentioned as a limitation in the PR objectives.

internal/parser/antlrParser/numscript_parser.go (1)

825-870: Add unit-test coverage for your new parse context.

The newly introduced ApplicationContext and its methods are functionally correct for capturing function calls as expressions. However, static analysis indicates that lines [839-840], [853-854], [859-862], and [865-868] lack test coverage. It’s advisable to add or expand tests to ensure these code paths are exercised (e.g., parsing expressions containing function calls) to improve overall confidence in the parser.

Would you like me to propose a sample test that parses a function call expression, ensuring coverage of these methods?

🧰 Tools
🪛 GitHub Check: codecov/patch

[warning] 839-840: internal/parser/antlrParser/numscript_parser.go#L839-L840
Added lines #L839 - L840 were not covered by tests


[warning] 853-854: internal/parser/antlrParser/numscript_parser.go#L853-L854
Added lines #L853 - L854 were not covered by tests


[warning] 859-862: internal/parser/antlrParser/numscript_parser.go#L859-L862
Added lines #L859 - L862 were not covered by tests


[warning] 865-868: internal/parser/antlrParser/numscript_parser.go#L865-L868
Added lines #L865 - L868 were not covered by tests

internal/interpreter/interpreter.go (1)

241-248: Potentially unused varOriginPosition field.

The code sets st.varOriginPosition = true and later resets it to false, but there’s no observable usage. Consider removing the field or documenting how it should be used to avoid confusion.

Also applies to: 283-283

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 765dd19 and e437588.

⛔ Files ignored due to path filters (3)
  • go.mod is excluded by !**/*.mod
  • internal/parser/__snapshots__/parser_fault_tolerance_test.snap is excluded by !**/*.snap, !**/*.snap
  • internal/parser/__snapshots__/parser_test.snap is excluded by !**/*.snap, !**/*.snap
📒 Files selected for processing (19)
  • Numscript.g4 (1 hunks)
  • internal/analysis/check.go (3 hunks)
  • internal/analysis/hover.go (2 hunks)
  • internal/cmd/run.go (3 hunks)
  • internal/interpreter/balances.go (1 hunks)
  • internal/interpreter/batch_balances_query.go (1 hunks)
  • internal/interpreter/evaluate_expr.go (1 hunks)
  • internal/interpreter/interpreter.go (11 hunks)
  • internal/interpreter/interpreter_error.go (1 hunks)
  • internal/interpreter/interpreter_test.go (3 hunks)
  • internal/interpreter/value.go (1 hunks)
  • internal/parser/antlrParser/Numscript.interp (1 hunks)
  • internal/parser/antlrParser/numscript_base_listener.go (1 hunks)
  • internal/parser/antlrParser/numscript_listener.go (2 hunks)
  • internal/parser/antlrParser/numscript_parser.go (54 hunks)
  • internal/parser/ast.go (2 hunks)
  • internal/parser/parser.go (2 hunks)
  • internal/parser/parser_test.go (1 hunks)
  • numscript_test.go (2 hunks)
🧰 Additional context used
🪛 GitHub Check: codecov/patch
internal/parser/antlrParser/numscript_base_listener.go

[warning] 54-54: internal/parser/antlrParser/numscript_base_listener.go#L54
Added line #L54 was not covered by tests


[warning] 57-57: internal/parser/antlrParser/numscript_base_listener.go#L57
Added line #L57 was not covered by tests

internal/cmd/run.go

[warning] 133-135: internal/cmd/run.go#L133-L135
Added lines #L133 - L135 were not covered by tests


[warning] 215-217: internal/cmd/run.go#L215-L217
Added lines #L215 - L217 were not covered by tests


[warning] 219-219: internal/cmd/run.go#L219
Added line #L219 was not covered by tests

internal/interpreter/value.go

[warning] 218-222: internal/interpreter/value.go#L218-L222
Added lines #L218 - L222 were not covered by tests

internal/interpreter/balances.go

[warning] 50-51: internal/interpreter/balances.go#L50-L51
Added lines #L50 - L51 were not covered by tests

internal/parser/ast.go

[warning] 21-21: internal/parser/ast.go#L21
Added line #L21 was not covered by tests

internal/parser/antlrParser/numscript_parser.go

[warning] 839-840: internal/parser/antlrParser/numscript_parser.go#L839-L840
Added lines #L839 - L840 were not covered by tests


[warning] 853-854: internal/parser/antlrParser/numscript_parser.go#L853-L854
Added lines #L853 - L854 were not covered by tests


[warning] 859-862: internal/parser/antlrParser/numscript_parser.go#L859-L862
Added lines #L859 - L862 were not covered by tests


[warning] 865-868: internal/parser/antlrParser/numscript_parser.go#L865-L868
Added lines #L865 - L868 were not covered by tests


[warning] 1411-1411: internal/parser/antlrParser/numscript_parser.go#L1411
Added line #L1411 was not covered by tests


[warning] 1441-1441: internal/parser/antlrParser/numscript_parser.go#L1441
Added line #L1441 was not covered by tests


[warning] 5497-5497: internal/parser/antlrParser/numscript_parser.go#L5497
Added line #L5497 was not covered by tests


[warning] 5500-5500: internal/parser/antlrParser/numscript_parser.go#L5500
Added line #L5500 was not covered by tests

internal/interpreter/interpreter_error.go

[warning] 228-229: internal/interpreter/interpreter_error.go#L228-L229
Added lines #L228 - L229 were not covered by tests

🔇 Additional comments (43)
internal/parser/antlrParser/Numscript.interp (1)

112-112: Auto-generated file change.

This is an expected change in the ANTLR-generated parser definition, updating the state transition value from 252 to 253 to accommodate the grammar changes for function calls in value expressions.

internal/parser/antlrParser/numscript_listener.go (2)

25-27: Added method for handling application production entry.

This addition to the listener interface is necessary to support the new grammar rule for function calls in expression contexts.


154-156: Added method for handling application production exit.

This complements the EnterApplication method, ensuring proper listener integration with the modified grammar.

internal/parser/parser_test.go (2)

441-449: Good test for expression in variable origin.

This test validates that the new grammar correctly supports using expressions (like numeric literals) in variable origins, which is one of the main objectives of this PR.


451-461: Valuable test for mid-script function calls.

This test verifies the ability to use function calls as expressions within other function calls, which is a key enhancement mentioned in the PR objectives. The test demonstrates the nested function call pattern with balance(@user, EUR/2) as an argument.

internal/parser/antlrParser/numscript_base_listener.go (1)

53-57: Implementation aligns with PR objective to support function calls in expressions.

The addition of EnterApplication and ExitApplication methods to the BaseNumscriptListener struct enables parsing support for application expressions, which is essential for the new feature allowing function calls to be treated as expressions in variable origins.

Note that these methods currently have empty implementations as they're meant to be overridden by actual listeners. The static analysis indicates these lines aren't covered by tests. Consider adding tests that exercise this new parsing functionality specifically.

🧰 Tools
🪛 GitHub Check: codecov/patch

[warning] 54-54: internal/parser/antlrParser/numscript_base_listener.go#L54
Added line #L54 was not covered by tests


[warning] 57-57: internal/parser/antlrParser/numscript_base_listener.go#L57
Added line #L57 was not covered by tests

internal/interpreter/evaluate_expr.go (1)

87-96: Well-implemented feature flag check for experimental function call usage.

The implementation correctly:

  1. Handles function calls within expressions
  2. Enforces the ExperimentalMidScriptFunctionCall feature flag when not in a variable origin position
  3. Provides a clean interface to the existing handleFnCall method

This code fulfills the PR objective to allow function calls to be treated as expressions.

internal/interpreter/interpreter_error.go (1)

224-230:

✅ Verification successful

Error handling for nested meta function restriction.

The addition of InvalidNestedMeta error type aligns with the PR objective to maintain the limitation that the meta() function can only be called at the top level of a variable origin. The error message clearly communicates this restriction to users.

The static analysis indicates these lines aren't covered by tests. Consider adding a test case that specifically verifies this error is thrown when attempting to use the meta function in a nested expression.


🏁 Script executed:

#!/bin/bash
# Check if there's a test for InvalidNestedMeta error
rg -g "*.go" "TestInvalidNestedMeta" --context=5

Length of output: 688


Action Required: Confirmed Test Coverage for Nested Meta Function Error Handling

The new InvalidNestedMeta error type in internal/interpreter/interpreter_error.go successfully enforces that the meta() function cannot be nested, and the error message is clear. Additionally, the test case TestInvalidNestedMetaCall in internal/interpreter/interpreter_test.go verifies that the restriction is enforced properly. No further tests are needed.

🧰 Tools
🪛 GitHub Check: codecov/patch

[warning] 228-229: internal/interpreter/interpreter_error.go#L228-L229
Added lines #L228 - L229 were not covered by tests

internal/analysis/hover.go (2)

78-78: Enhanced hover support for expressions in variable origins.

Changed from function call-specific handling to general expression handling for variable origins, which aligns with the PR objective to allow any valid expression in variable origins.


186-187: Added hover support for function calls in expressions.

This change ensures that hover functionality works correctly when function calls are used within expressions, completing the editor integration for the new feature.

internal/parser/ast.go (1)

310-310: Broaden the Origin field type

Changing the Origin field type from *FnCall to *ValueExpr is a key change that allows variable origins to be defined with any expression, not just function calls. This aligns with the PR objective of enhancing variable origins.

Numscript.g4 (2)

24-25: Enhance grammar to support function calls in value expressions

This change adds support for function calls to be used as value expressions, which aligns with the implementation in the AST. The semicolon has been removed from the previous line for consistent formatting.


31-31: Enhance variable origin to support any value expression

Modifying the varOrigin rule to accept any value expression instead of just function calls is a key part of the enhancement. This change allows for more flexible variable declarations such as number $b = 1 + 2.

internal/cmd/run.go (2)

32-32: Add feature flag for mid-script function calls

Adding a feature flag is appropriate for this experimental feature, aligning with the PR's intent to control this new capability.


133-135: Include the feature flag in runtime configuration

The conditional check correctly adds the feature flag to the featureFlags map when enabled, which will allow the interpreter to recognize and use the mid-script function call feature.

🧰 Tools
🪛 GitHub Check: codecov/patch

[warning] 133-135: internal/cmd/run.go#L133-L135
Added lines #L133 - L135 were not covered by tests

internal/analysis/check.go (3)

165-165: Update check method to use general expression checking

This change correctly updates the check method to use checkExpression instead of the now-removed checkVarOrigin method. This is consistent with treating variable origins as general expressions.


305-319: Add checkFnCall method to determine function return type

This method properly determines the return type of function calls, which is necessary for type checking variable origins that are function calls. The implementation correctly handles the resolution of built-in functions and arity checking.


384-386: Add function call handling to checkTypeOf

This case handles function calls in the checkTypeOf method, calling the new checkFnCall method to determine the return type. This is consistent with the overall changes to support function calls as expressions.

internal/parser/parser.go (3)

116-120: LGTM! Good refactoring to support expressions in variable origins.

This refactoring allows variable origins to be defined as any valid expression, not just function calls, which is in line with the PR objectives. The change from using parseFnCall to parseValueExpr is a good approach to enable more flexible syntax.


126-126: Origin field updated correctly.

The field assignment is properly updated to use the new origin variable of type *ValueExpr instead of the previous function call specific variable.


350-352: Good addition to support function calls as expressions.

This new case for handling ApplicationContext is essential for enabling function calls to be treated as valid expressions within value expressions, as described in the PR objectives.

numscript_test.go (2)

170-170: Good use of the constant reference.

Using the constant interpreter.ExperimentalOneofFeatureFlag instead of a string literal improves code maintainability.


460-530: Good test for interleaved balance batching.

This test thoroughly validates the complex scenario of interleaved balance batching with metadata references. It correctly verifies the postings and balance queries that result from the transaction.

The test also properly uses the ExperimentalMidScriptFunctionCall feature flag as specified in the PR objectives.

internal/interpreter/batch_balances_query.go (2)

59-59: Simplified type handling.

Good simplification of the slices.Contains call by removing the explicit type parameters, making the code cleaner.


65-80: Balance query logic refactored to use new helper methods.

The refactoring of the runBalancesQuery method to use the new filterQuery and mergeBalance methods from CachedBalances improves code modularity and reusability.

internal/interpreter/balances.go (1)

5-29: Well-structured balance access methods.

The fetchAccountBalances, fetchBalance, and has methods provide a clean API for accessing account balances with proper handling of missing data.

internal/parser/antlrParser/numscript_parser.go (1)

59-106: No issues found with auto-generated code.

These lines appear to be part of the ANTLR-generated serialized ATN data structure. Typically, we do not manually modify or add tests for this auto-generated content.

internal/interpreter/interpreter_test.go (7)

156-189: Thorough test coverage for partial retrieval from StaticStore.

These changes effectively verify that queried balances can be selectively fetched, aligning well with the new GetBalances logic. No issues found.


2255-2285: Straightforward verification of a single balance(...) usage.

This test properly checks that a mid-script balance retrieval succeeds and matches the expected posting outcome. Nicely done.


2286-2315: Ensures multiple balance references remain consistent.

While the test name suggests querying the same balance more than once, it still validates that reusing computed balance data works seamlessly. No concerns here.


4045-4072: Validates mid-script balance sending.

This test confirms that send balance(@acc, USD/2) results in the correct posting, demonstrating the new mid-script function call feature. Good coverage.


4074-4115: Checks updated balance after intermediate decrease.

By subtracting from the account before calling balance, the test ensures the interpreter respects the new lower balance. Implementation looks solid.


4117-4133: Tests arithmetic expression in a variable origin.

This verifies that expressions like number $x = 1 + 2 parse and evaluate correctly at variable declaration time under the new feature flag. Looks good.


4135-4155: Verifies that nested meta() calls fail as intended.

This test accurately checks the interpreter’s rejection of nested meta() usage. The negative path is well-covered.

internal/interpreter/interpreter.go (9)

38-59: Refined GetBalances method logic.

The new approach returns only requested balances, avoiding extraneous accounts/currencies. This appears correct and aligns with the associated tests.


134-148: Properly enforces feature flag for mid-script function calls.

By checking ExperimentalMidScriptFunctionCall for non-meta() function origins, the interpreter cleanly separates top-level meta() usage from experimental calls. Nicely structured.


150-166: Clear handling of meta-based variable origins.

This logic rejects invalid nested meta() usage and correctly parses valid metadata calls. Implementation seems solid.


218-218: New feature flag constant.

Introducing ExperimentalMidScriptFunctionCall clearly separates mid-script call functionality from default behavior. No concerns.


367-367: Switched to CachedBalances.fetchBalance.

This aligns with the unified approach of fetching balances consistently and helps simplify code paths. Implementation is fine.

Also applies to: 370-370


387-387: Consistent balance fetching.

Using fetchBalance(*account, *asset) improves clarity and matches the refactoring effort. No issues noticed.


473-473: Further alignment with fetchBalance.

All references now route through CachedBalances, reducing potential duplication. Looks good.


570-570: Maintaining uniform fetch strategy.

Again, this change ensures consistent usage of fetchBalance. Implementation is straightforward and coherent.


896-896: Standardized balance retrieval.

Replacing direct map access with the helper function keeps the code uniform and maintainable. Approved.

Comment on lines +46 to +57
func (b Balances) mergeBalance(update Balances) {
// merge queried balance
for acc, accBalances := range update {
cachedAcc := defaultMapGet(b, acc, func() AccountBalance {
return AccountBalance{}
})

for curr, amt := range accBalances {
cachedAcc[curr] = amt
}
}
}
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Verification agent

🧩 Analysis chain

Effective balance merging implementation.

The mergeBalance method effectively combines balances from multiple sources, which is crucial for maintaining accurate state during script execution.

Note: Static analysis suggests lines 50-51 are not covered by tests. Consider adding a test case that exercises the scenario where a new account is added during a merge operation.


🏁 Script executed:

#!/bin/bash
# Check test coverage for the mergeBalance method, specifically for lines 50-51

# Find test files that might test the mergeBalance function
echo "Looking for tests that might cover the mergeBalance function..."
grep -r "mergeBalance" --include="*_test.go" .

Length of output: 183


Action: Add test coverage for the mergeBalance update scenario.

The current implementation in internal/interpreter/balances.go (lines 46-57) correctly merges balance updates; however, our grep check shows no test case covers the branch where a new account is introduced (specifically affecting lines 50-51). Please add a unit test that exercises this scenario to ensure that when an account does not exist in the cached balance, it is correctly initialized and updated.

  • File: internal/interpreter/balances.go (lines 46-57)
  • Concern: The merging logic for adding new accounts (lines 50-51) lacks test coverage.
  • Recommendation: Add a test case in the appropriate *_test.go file that simulates merging an update with a new account.
🧰 Tools
🪛 GitHub Check: codecov/patch

[warning] 50-51: internal/interpreter/balances.go#L50-L51
Added lines #L50 - L51 were not covered by tests

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (1)
internal/interpreter/balances_test.go (1)

10-31: Good test coverage for filterQuery.

The test effectively verifies that filterQuery correctly identifies and returns only the currencies that aren't already cached in the balance. It covers all key scenarios: existing and non-existing currencies for existing accounts, as well as completely new accounts.

Consider adding tests for edge cases like empty balances or an empty query to ensure robust behavior in all scenarios.

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between e437588 and c8acd97.

📒 Files selected for processing (3)
  • internal/interpreter/balances.go (1 hunks)
  • internal/interpreter/balances_test.go (1 hunks)
  • internal/utils/utils.go (1 hunks)
🧰 Additional context used
🪛 GitHub Check: codecov/patch
internal/interpreter/balances.go

[warning] 56-57: internal/interpreter/balances.go#L56-L57
Added lines #L56 - L57 were not covered by tests

🔇 Additional comments (4)
internal/utils/utils.go (1)

36-44: Well-implemented generic filter function.

This is a clean implementation of a functional-style filter operation using Go's generics. The function correctly creates a new slice without modifying the original, has O(n) time complexity, and handles the generic type parameter properly.

internal/interpreter/balances.go (3)

9-49: Well-structured implementation of balance management.

The balance management functions are well-designed with appropriate handling of default values to prevent nil reference errors. The code consistently follows the pattern of defaulting to empty structures or zero values when data doesn't exist.


36-49: Improved filterQuery implementation addresses previous review feedback.

The new implementation correctly uses the Filter function to only include currencies that aren't already cached in the balance, addressing the issue mentioned in previous reviews. The approach of filtering at the currency level rather than the account level is more precise and eliminates the potential issue where all currencies for an account would be included even if only one was missing.


51-63: Add test coverage for mergeBalance new account scenario.

The mergeBalance implementation correctly handles the case where an account doesn't exist in the cached balance, but this scenario isn't covered by tests according to static analysis.

#!/bin/bash
# Check test coverage for the mergeBalance method

# Find any tests that cover the mergeBalance method
echo "Looking for existing tests for mergeBalance..."
grep -r "mergeBalance" --include="*_test.go" .

# Suggest a test implementation
echo -e "\nSuggested test implementation:"
cat << 'EOF'
func TestMergeBalance(t *testing.T) {
	// Test merging when account doesn't exist in the cached balance
	cached := Balances{
		"alice": AccountBalance{
			"EUR": big.NewInt(100),
		},
	}
	
	update := Balances{
		"bob": AccountBalance{
			"USD": big.NewInt(200),
		},
	}
	
	cached.mergeBalance(update)
	
	// Verify the new account was added
	require.Equal(t, big.NewInt(200), cached["bob"]["USD"])
	
	// Verify existing account wasn't affected
	require.Equal(t, big.NewInt(100), cached["alice"]["EUR"])
}
EOF
🧰 Tools
🪛 GitHub Check: codecov/patch

[warning] 56-57: internal/interpreter/balances.go#L56-L57
Added lines #L56 - L57 were not covered by tests

@@ -220,3 +220,11 @@ type InvalidAccountName struct {
func (e InvalidAccountName) Error() string {
return fmt.Sprintf("Invalid account name: @%s", e.Name)
}

type InvalidNestedMeta struct {
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You should implements Is(target error) bool method for your errors.
It allow callers (the ledger for example) to check for concrete errors.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@@ -2218,6 +2252,67 @@ func TestVariableBalance(t *testing.T) {
// test(t, tc)
// }

func TestBalanceSimple(t *testing.T) {
script := `
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

add t.Parallel() call on your tests except if it's not parallelizable, but I guess it is the case here

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

oh yeah that's true.. yeah I think so far 100% of the tests are parallelizable, but I keep forgetting about adding it.. is there a way to declare that the whole module is parallelizable ?

@@ -32,3 +32,13 @@ func MaxBigInt(a *big.Int, b *big.Int) *big.Int {

return &max
}

func Filter[T any](slice []T, predicate func(x T) bool) []T {
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You have some helpers in go libs to play with generics.
https://github.com/formancehq/go-libs/tree/main/collectionutils

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yeah I'm aware of this lib but for such simple utilities that are basically one-liners it's just better to duplicate them
(I've also tried to avoid this so far because I though it's sort of non-idiomatic in go, but it's just so much clearer this way..)

@ascandone ascandone merged commit 0d7e4f3 into main Mar 20, 2025
6 checks passed
@ascandone ascandone deleted the feat/expr-in-var-origin branch March 20, 2025 11:25
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants