2025-08-14 13:16:12 +00:00
|
|
|
/*!
|
|
|
|
|
* Execution Runner Module - Nyash File and Mode Execution Coordinator
|
2025-09-17 07:43:07 +09:00
|
|
|
*
|
2025-08-14 13:16:12 +00:00
|
|
|
* This module handles all execution logic, backend selection, and mode coordination,
|
|
|
|
|
* separated from CLI parsing and the main entry point.
|
|
|
|
|
*/
|
|
|
|
|
|
2025-08-19 05:36:01 +09:00
|
|
|
use nyash_rust::cli::CliConfig;
|
2025-09-16 06:13:44 +09:00
|
|
|
// prune heavy unused imports here; modules import what they need locally
|
|
|
|
|
// pruned unused runtime imports in this module
|
2025-08-18 09:14:39 +00:00
|
|
|
|
2025-08-19 16:48:45 +09:00
|
|
|
#[cfg(feature = "wasm-backend")]
|
2025-09-17 07:43:07 +09:00
|
|
|
use nyash_rust::backend::{aot::AotBackend, wasm::WasmBackend};
|
2025-08-19 16:48:45 +09:00
|
|
|
|
2025-09-14 00:44:28 +09:00
|
|
|
#[cfg(feature = "llvm-inkwell-legacy")]
|
2025-09-17 07:43:07 +09:00
|
|
|
use nyash_rust::backend::llvm_compile_and_execute;
|
2025-08-14 13:16:12 +00:00
|
|
|
use std::{fs, process};
|
2025-09-17 07:43:07 +09:00
|
|
|
mod box_index;
|
|
|
|
|
mod build;
|
2025-11-01 20:58:26 +09:00
|
|
|
pub(crate) mod child_env;
|
2025-09-17 07:43:07 +09:00
|
|
|
mod cli_directives;
|
2025-09-03 01:37:38 +09:00
|
|
|
mod demos;
|
2025-09-17 07:43:07 +09:00
|
|
|
mod dispatch;
|
2025-11-03 16:09:19 +09:00
|
|
|
pub mod json_v0_bridge;
|
2025-11-01 07:02:04 +09:00
|
|
|
mod json_v1_bridge;
|
2025-11-03 23:21:48 +09:00
|
|
|
pub mod mir_json { pub mod common; }
|
|
|
|
|
mod mir_json_v0;
|
2025-11-03 16:09:19 +09:00
|
|
|
pub mod mir_json_emit;
|
2025-09-22 07:54:25 +09:00
|
|
|
pub mod modes;
|
2025-09-16 00:01:31 +09:00
|
|
|
mod pipe_io;
|
2025-11-04 20:46:43 +09:00
|
|
|
pub mod core_executor;
|
2025-09-16 00:01:31 +09:00
|
|
|
mod pipeline;
|
2025-09-22 07:54:25 +09:00
|
|
|
mod jit_direct;
|
2025-09-16 00:01:31 +09:00
|
|
|
mod selfhost;
|
2025-09-17 07:43:07 +09:00
|
|
|
mod tasks;
|
|
|
|
|
mod trace;
|
2025-09-22 21:52:39 +09:00
|
|
|
mod plugins;
|
2025-08-14 13:16:12 +00:00
|
|
|
|
2025-08-19 05:16:40 +09:00
|
|
|
// v2 plugin system imports
|
2025-08-26 04:34:14 +09:00
|
|
|
use nyash_rust::runner_plugin_init;
|
2025-09-17 07:43:07 +09:00
|
|
|
use nyash_rust::runtime;
|
2025-09-16 03:54:44 +09:00
|
|
|
// use std::path::PathBuf; // not used in current runner
|
2025-08-18 11:07:03 +09:00
|
|
|
|
2025-09-08 04:35:50 +09:00
|
|
|
/// Resolve a using target according to priority: modules > relative > using-paths
|
|
|
|
|
/// Returns Ok(resolved_path_or_token). On strict mode, ambiguous matches cause error.
|
2025-09-22 21:52:39 +09:00
|
|
|
// use pipeline::resolve_using_target; // resolved within helpers; avoid unused warning
|
2025-09-08 04:35:50 +09:00
|
|
|
|
2025-08-14 13:16:12 +00:00
|
|
|
/// Main execution coordinator
|
|
|
|
|
pub struct NyashRunner {
|
|
|
|
|
config: CliConfig,
|
|
|
|
|
}
|
|
|
|
|
|
2025-11-02 17:50:06 +09:00
|
|
|
/// Minimal task runner: read hako.toml (preferred) or nyash.toml [env]/[tasks], run the named task via shell
|
2025-09-16 01:54:00 +09:00
|
|
|
use tasks::run_named_task;
|
2025-09-01 23:44:34 +09:00
|
|
|
|
2025-09-22 21:52:39 +09:00
|
|
|
#[cfg(not(feature = "jit-direct-only"))]
|
2025-08-14 13:16:12 +00:00
|
|
|
impl NyashRunner {
|
|
|
|
|
/// Create a new runner with the given configuration
|
|
|
|
|
pub fn new(config: CliConfig) -> Self {
|
|
|
|
|
Self { config }
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Run Nyash based on the configuration
|
|
|
|
|
pub fn run(&self) {
|
2025-09-22 21:52:39 +09:00
|
|
|
// New behavior-preserving delegator
|
|
|
|
|
self.run_refactored();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// init_bid_plugins moved to runner_plugin_init.rs
|
|
|
|
|
|
|
|
|
|
/// Execute file-based mode with backend selection
|
|
|
|
|
pub(crate) fn run_file(&self, filename: &str) {
|
|
|
|
|
dispatch::execute_file_with_backend(self, filename);
|
|
|
|
|
}
|
|
|
|
|
|
2025-11-02 17:50:06 +09:00
|
|
|
/// Minimal AOT build pipeline driven by hako.toml/nyash.toml (mvp)
|
2025-09-22 21:52:39 +09:00
|
|
|
fn run_build_mvp(&self, cfg_path: &str) -> Result<(), String> {
|
|
|
|
|
build::run_build_mvp_impl(self, cfg_path)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(not(feature = "jit-direct-only"))]
|
|
|
|
|
impl NyashRunner {
|
|
|
|
|
/// New behavior-preserving refactor of run(): structured into smaller helpers
|
|
|
|
|
fn run_refactored(&self) {
|
|
|
|
|
// Early: macro child
|
2025-09-19 22:27:59 +09:00
|
|
|
if let Some(ref macro_file) = self.config.macro_expand_child {
|
|
|
|
|
crate::runner::modes::macro_child::run_macro_child(macro_file);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2025-09-19 15:11:57 +09:00
|
|
|
let groups = self.config.as_groups();
|
2025-11-03 23:21:48 +09:00
|
|
|
// Early: direct MIR JSON execution (no source file). Experimental diagnostics/exec.
|
|
|
|
|
if let Some(path) = groups.parser.mir_json_file.as_ref() {
|
|
|
|
|
match std::fs::read_to_string(path) {
|
|
|
|
|
Ok(text) => {
|
|
|
|
|
match crate::runner::json_v1_bridge::try_parse_v1_to_module(&text) {
|
|
|
|
|
Ok(Some(module)) => { let rc = self.execute_mir_module_quiet_exit(&module); std::process::exit(rc); }
|
|
|
|
|
Ok(None) => {
|
|
|
|
|
if text.contains("\"functions\"") && text.contains("\"blocks\"") {
|
|
|
|
|
match crate::runner::mir_json_v0::parse_mir_v0_to_module(&text) {
|
|
|
|
|
Ok(module) => { let rc = self.execute_mir_module_quiet_exit(&module); std::process::exit(rc); }
|
|
|
|
|
Err(e) => { eprintln!("❌ MIR JSON v0 parse error: {}", e); std::process::exit(1); }
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
eprintln!("❌ MIR JSON invalid or unsupported shape: {}", path);
|
|
|
|
|
std::process::exit(1);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
Err(e) => { eprintln!("❌ MIR JSON parse error (v1): {}", e); std::process::exit(1); }
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
Err(e) => { eprintln!("❌ Error reading MIR JSON {}: {}", path, e); std::process::exit(1); }
|
|
|
|
|
}
|
|
|
|
|
}
|
2025-09-22 21:52:39 +09:00
|
|
|
// Early: build
|
2025-09-19 15:11:57 +09:00
|
|
|
if let Some(cfg_path) = groups.build.path.clone() {
|
2025-09-06 16:53:12 +09:00
|
|
|
if let Err(e) = self.run_build_mvp(&cfg_path) {
|
|
|
|
|
eprintln!("❌ build error: {}", e);
|
|
|
|
|
std::process::exit(1);
|
|
|
|
|
}
|
|
|
|
|
return;
|
|
|
|
|
}
|
2025-09-22 21:52:39 +09:00
|
|
|
// Preprocess usings and directives (includes dep-tree log)
|
|
|
|
|
self.preprocess_usings_and_directives(&groups);
|
|
|
|
|
// JSON v0 bridge
|
|
|
|
|
if self.try_run_json_v0_pipe() { return; }
|
|
|
|
|
// Named task
|
|
|
|
|
if let Some(task) = groups.run_task.clone() {
|
|
|
|
|
if let Err(e) = run_named_task(&task) {
|
|
|
|
|
eprintln!("❌ Task error: {}", e);
|
|
|
|
|
process::exit(1);
|
|
|
|
|
}
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
// Common env + runtime/plugins
|
|
|
|
|
self.apply_common_env(&groups);
|
|
|
|
|
self.init_runtime_and_plugins(&groups);
|
|
|
|
|
// Backend config + policy
|
|
|
|
|
self.configure_backend(&groups);
|
|
|
|
|
self.enforce_runtime_jit_policy(&groups);
|
|
|
|
|
// Benchmark
|
|
|
|
|
if self.maybe_run_benchmark(&groups) { return; }
|
|
|
|
|
// Dispatch
|
|
|
|
|
self.dispatch_entry(&groups);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// ---- Helpers (extracted from original run) ----
|
|
|
|
|
|
|
|
|
|
fn preprocess_usings_and_directives(&self, groups: &crate::cli::CliGroups) {
|
|
|
|
|
use pipeline::resolve_using_target;
|
|
|
|
|
// Initialize UsingContext (defaults + nyash.toml + env)
|
2025-09-16 00:01:31 +09:00
|
|
|
let mut using_ctx = self.init_using_context();
|
2025-09-22 21:52:39 +09:00
|
|
|
// Collect CLI --using SPEC into (target, alias)
|
2025-09-16 14:57:05 +09:00
|
|
|
let mut pending_using: Vec<(String, Option<String>)> = Vec::new();
|
2025-09-19 15:11:57 +09:00
|
|
|
for spec in &groups.input.cli_usings {
|
2025-09-16 14:57:05 +09:00
|
|
|
let s = spec.trim();
|
2025-09-22 21:52:39 +09:00
|
|
|
if s.is_empty() { continue; }
|
2025-09-16 14:57:05 +09:00
|
|
|
let (target, alias) = if let Some(pos) = s.find(" as ") {
|
2025-09-22 21:52:39 +09:00
|
|
|
(s[..pos].trim().to_string(), Some(s[pos + 4..].trim().to_string()))
|
|
|
|
|
} else { (s.to_string(), None) };
|
|
|
|
|
let is_path = target.starts_with('"') || target.starts_with("./") || target.starts_with('/') || target.ends_with(".nyash");
|
2025-09-16 14:57:05 +09:00
|
|
|
if is_path {
|
|
|
|
|
let path = target.trim_matches('"').to_string();
|
|
|
|
|
let name = alias.clone().unwrap_or_else(|| {
|
2025-09-22 21:52:39 +09:00
|
|
|
std::path::Path::new(&path).file_stem().and_then(|s| s.to_str()).unwrap_or("module").to_string()
|
2025-09-16 14:57:05 +09:00
|
|
|
});
|
|
|
|
|
pending_using.push((name, Some(path)));
|
|
|
|
|
} else {
|
|
|
|
|
pending_using.push((target, alias));
|
|
|
|
|
}
|
|
|
|
|
}
|
2025-09-22 21:52:39 +09:00
|
|
|
// Apply pending modules (from context) to registry as StringBox
|
2025-09-16 00:01:31 +09:00
|
|
|
for (ns, path) in using_ctx.pending_modules.iter() {
|
2025-09-08 11:20:13 +09:00
|
|
|
let sb = crate::box_trait::StringBox::new(path.clone());
|
|
|
|
|
crate::runtime::modules_registry::set(ns.clone(), Box::new(sb));
|
|
|
|
|
}
|
2025-09-22 21:52:39 +09:00
|
|
|
// Optional dependency tree bridge (log-only)
|
2025-09-08 04:35:50 +09:00
|
|
|
if let Ok(dep_path) = std::env::var("NYASH_DEPS_JSON") {
|
|
|
|
|
match std::fs::read_to_string(&dep_path) {
|
|
|
|
|
Ok(s) => {
|
|
|
|
|
let bytes = s.as_bytes().len();
|
|
|
|
|
let mut root_info = String::new();
|
|
|
|
|
if let Ok(v) = serde_json::from_str::<serde_json::Value>(&s) {
|
2025-09-17 07:43:07 +09:00
|
|
|
if let Some(r) = v.get("root_path").and_then(|x| x.as_str()) {
|
|
|
|
|
root_info = format!(" root='{}'", r);
|
|
|
|
|
}
|
2025-09-08 04:35:50 +09:00
|
|
|
}
|
2025-09-22 21:52:39 +09:00
|
|
|
crate::cli_v!("[deps] loaded {} bytes from{} {}", bytes, if root_info.is_empty() { "" } else { ":" }, root_info);
|
2025-09-08 04:35:50 +09:00
|
|
|
}
|
2025-09-22 21:52:39 +09:00
|
|
|
Err(e) => { crate::cli_v!("[deps] read error: {}", e); }
|
2025-09-17 20:33:19 +09:00
|
|
|
}
|
|
|
|
|
}
|
2025-09-22 21:52:39 +09:00
|
|
|
// If a file is provided, apply script-level directives and late using/env merges
|
2025-09-19 15:11:57 +09:00
|
|
|
if let Some(ref filename) = groups.input.file {
|
2025-08-29 21:39:47 +09:00
|
|
|
if let Ok(code) = fs::read_to_string(filename) {
|
2025-09-22 21:52:39 +09:00
|
|
|
// Apply directives and lint
|
|
|
|
|
let strict_fields = std::env::var("NYASH_FIELDS_TOP_STRICT").ok().as_deref() == Some("1");
|
|
|
|
|
if let Err(e) = cli_directives::apply_cli_directives_from_source(&code, strict_fields, groups.debug.cli_verbose) {
|
2025-09-17 05:56:33 +09:00
|
|
|
eprintln!("❌ Lint/Directive error: {}", e);
|
2025-09-16 14:57:05 +09:00
|
|
|
std::process::exit(1);
|
|
|
|
|
}
|
2025-09-22 21:52:39 +09:00
|
|
|
// Late env overrides (paths/modules)
|
2025-09-08 04:35:50 +09:00
|
|
|
if let Ok(paths) = std::env::var("NYASH_USING_PATH") {
|
2025-09-22 21:52:39 +09:00
|
|
|
for p in paths.split(':') { let p = p.trim(); if !p.is_empty() { using_ctx.using_paths.push(p.to_string()); } }
|
2025-09-08 04:35:50 +09:00
|
|
|
}
|
|
|
|
|
if let Ok(mods) = std::env::var("NYASH_MODULES") {
|
|
|
|
|
for ent in mods.split(',') {
|
2025-09-17 07:43:07 +09:00
|
|
|
if let Some((k, v)) = ent.split_once('=') {
|
2025-09-22 21:52:39 +09:00
|
|
|
let k = k.trim(); let v = v.trim();
|
|
|
|
|
if !k.is_empty() && !v.is_empty() { using_ctx.pending_modules.push((k.to_string(), v.to_string())); }
|
2025-09-08 04:35:50 +09:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2025-09-22 21:52:39 +09:00
|
|
|
// Re-apply pending modules in case env added more (idempotent)
|
2025-09-16 00:01:31 +09:00
|
|
|
for (ns, path) in using_ctx.pending_modules.iter() {
|
2025-09-08 04:35:50 +09:00
|
|
|
let sb = nyash_rust::box_trait::StringBox::new(path.clone());
|
|
|
|
|
nyash_rust::runtime::modules_registry::set(ns.clone(), Box::new(sb));
|
|
|
|
|
}
|
2025-09-22 21:52:39 +09:00
|
|
|
// Resolve CLI --using entries against context and register values (with aliasing)
|
2025-09-08 04:35:50 +09:00
|
|
|
let strict = std::env::var("NYASH_USING_STRICT").ok().as_deref() == Some("1");
|
2025-09-19 02:07:38 +09:00
|
|
|
let verbose = crate::config::env::cli_verbose();
|
2025-09-08 04:35:50 +09:00
|
|
|
let ctx = std::path::Path::new(filename).parent();
|
|
|
|
|
for (ns, alias) in pending_using.iter() {
|
2025-09-24 21:45:27 +09:00
|
|
|
let value = match resolve_using_target(ns, false, &using_ctx.pending_modules, &using_ctx.using_paths, &using_ctx.aliases, &using_ctx.packages, ctx, strict, verbose) {
|
2025-09-08 04:35:50 +09:00
|
|
|
Ok(v) => v,
|
2025-09-22 21:52:39 +09:00
|
|
|
Err(e) => { eprintln!("❌ using: {}", e); std::process::exit(1); }
|
2025-09-08 04:35:50 +09:00
|
|
|
};
|
|
|
|
|
let sb = nyash_rust::box_trait::StringBox::new(value.clone());
|
|
|
|
|
nyash_rust::runtime::modules_registry::set(ns.clone(), Box::new(sb));
|
|
|
|
|
if let Some(a) = alias {
|
|
|
|
|
let sb2 = nyash_rust::box_trait::StringBox::new(value);
|
|
|
|
|
nyash_rust::runtime::modules_registry::set(a.clone(), Box::new(sb2));
|
|
|
|
|
}
|
|
|
|
|
}
|
2025-08-29 21:39:47 +09:00
|
|
|
}
|
|
|
|
|
}
|
2025-09-22 21:52:39 +09:00
|
|
|
}
|
2025-08-29 21:39:47 +09:00
|
|
|
|
2025-09-22 21:52:39 +09:00
|
|
|
/// Apply early environment toggles that affect CLI behavior and VM stats.
|
|
|
|
|
/// Side effects: sets `NYASH_CLI_VERBOSE`, `NYASH_GC_MODE` when specified by CLI groups.
|
|
|
|
|
fn apply_common_env(&self, groups: &crate::cli::CliGroups) {
|
|
|
|
|
if groups.debug.cli_verbose { std::env::set_var("NYASH_CLI_VERBOSE", "1"); }
|
|
|
|
|
if let Some(ref m) = groups.gc_mode { if !m.trim().is_empty() { std::env::set_var("NYASH_GC_MODE", m); } }
|
|
|
|
|
}
|
2025-09-05 13:29:17 +09:00
|
|
|
|
2025-09-22 21:52:39 +09:00
|
|
|
// init_runtime_and_plugins moved to runner/plugins.rs
|
2025-08-23 03:40:17 +09:00
|
|
|
|
2025-09-24 21:57:12 +09:00
|
|
|
/// Configure backend knobs (VM) from CLI flags and env.
|
|
|
|
|
/// JIT configuration removed with JIT/Cranelift archival.
|
2025-09-22 21:52:39 +09:00
|
|
|
fn configure_backend(&self, groups: &crate::cli::CliGroups) {
|
|
|
|
|
if groups.backend.vm_stats { std::env::set_var("NYASH_VM_STATS", "1"); }
|
|
|
|
|
if groups.backend.vm_stats_json { std::env::set_var("NYASH_VM_STATS_JSON", "1"); }
|
2025-09-24 21:57:12 +09:00
|
|
|
// JIT configuration removed - archived to archive/jit-cranelift/
|
2025-09-22 21:52:39 +09:00
|
|
|
}
|
|
|
|
|
|
2025-09-24 21:57:12 +09:00
|
|
|
/// JIT runtime policy enforcement removed with JIT/Cranelift archival.
|
|
|
|
|
fn enforce_runtime_jit_policy(&self, _groups: &crate::cli::CliGroups) {
|
|
|
|
|
// JIT policy enforcement removed - archived to archive/jit-cranelift/
|
2025-09-22 21:52:39 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Optionally run the benchmark suite and exit, depending on CLI flags.
|
|
|
|
|
/// Returns true when a benchmark run occurred.
|
|
|
|
|
fn maybe_run_benchmark(&self, groups: &crate::cli::CliGroups) -> bool {
|
2025-09-19 15:11:57 +09:00
|
|
|
if groups.benchmark {
|
2025-08-14 13:16:12 +00:00
|
|
|
println!("📊 Nyash Performance Benchmark Suite");
|
|
|
|
|
println!("====================================");
|
2025-09-19 15:11:57 +09:00
|
|
|
println!("Running {} iterations per test...", groups.iterations);
|
2025-08-14 13:16:12 +00:00
|
|
|
println!();
|
2025-09-24 21:57:12 +09:00
|
|
|
// VM-legacy removed - benchmark mode no longer available
|
|
|
|
|
eprintln!("❌ Benchmark mode removed with vm-legacy. Use regular execution modes instead.");
|
|
|
|
|
std::process::exit(1);
|
2025-08-14 13:16:12 +00:00
|
|
|
}
|
2025-09-22 21:52:39 +09:00
|
|
|
false
|
|
|
|
|
}
|
2025-08-14 13:16:12 +00:00
|
|
|
|
2025-09-22 21:52:39 +09:00
|
|
|
/// Final dispatch to selected execution mode (file/JIT-direct or demos).
|
|
|
|
|
fn dispatch_entry(&self, groups: &crate::cli::CliGroups) {
|
2025-09-19 15:11:57 +09:00
|
|
|
if let Some(ref filename) = groups.input.file {
|
2025-09-22 21:52:39 +09:00
|
|
|
if groups.backend.jit.direct { self.run_file_jit_direct(filename); return; }
|
2025-08-26 04:42:52 +09:00
|
|
|
self.run_file(filename);
|
2025-09-22 21:52:39 +09:00
|
|
|
} else { demos::run_all_demos(); }
|
2025-09-06 16:53:12 +09:00
|
|
|
}
|
2025-08-14 13:16:12 +00:00
|
|
|
}
|
|
|
|
|
|
2025-08-28 09:26:58 +09:00
|
|
|
impl NyashRunner {
|
|
|
|
|
/// Run a file through independent JIT engine (no VM execute loop)
|
2025-09-23 02:26:33 +09:00
|
|
|
/// ARCHIVED: JIT/Cranelift functionality disabled for Phase 15
|
2025-08-28 09:26:58 +09:00
|
|
|
fn run_file_jit_direct(&self, filename: &str) {
|
2025-09-23 02:26:33 +09:00
|
|
|
eprintln!("❌ JIT-direct mode is archived for Phase 15. JIT/Cranelift moved to archive/jit-cranelift/");
|
|
|
|
|
eprintln!(" Use VM backend instead: nyash {}", filename);
|
|
|
|
|
eprintln!(" Or use LLVM backend: nyash --backend llvm {}", filename);
|
|
|
|
|
std::process::exit(1);
|
2025-08-28 09:26:58 +09:00
|
|
|
}
|
|
|
|
|
}
|
2025-09-03 01:37:38 +09:00
|
|
|
// moved to demos.rs
|
2025-08-14 13:16:12 +00:00
|
|
|
|
2025-09-03 01:37:38 +09:00
|
|
|
// moved to demos.rs
|
2025-08-14 13:16:12 +00:00
|
|
|
|
2025-09-03 01:37:38 +09:00
|
|
|
// moved to demos.rs
|
2025-08-14 13:16:12 +00:00
|
|
|
|
2025-09-03 01:37:38 +09:00
|
|
|
// moved to demos.rs
|
2025-08-14 13:16:12 +00:00
|
|
|
|
2025-09-03 01:37:38 +09:00
|
|
|
// moved to demos.rs
|
2025-08-14 13:16:12 +00:00
|
|
|
|
2025-09-03 01:37:38 +09:00
|
|
|
// moved to demos.rs
|