diff --git a/CURRENT_TASK.md b/CURRENT_TASK.md index b8f1fc44..1c403641 100644 --- a/CURRENT_TASK.md +++ b/CURRENT_TASK.md @@ -1,3 +1,57 @@ +# Current Task + +## ✅ Phase 153: hako_check Dead Code Detection Revival (2025-12-04) + +**Status**: Complete ✅ + +**Goal**: Revive hako_check dead code detection mode with JoinIR integration + +**Achievements**: +1. ✅ **Comprehensive Inventory** (`phase153_hako_check_inventory.md`): + - Documented current hako_check architecture + - Analyzed existing HC011/HC012 dead code rules + - Confirmed JoinIR-only pipeline (Phase 124 complete) + - Identified gaps and Phase 153 opportunities + +2. ✅ **DeadCodeAnalyzerBox Implementation** (`rule_dead_code.hako`): + - Unified HC019 rule combining method + box-level detection + - 570+ lines of .hako code following box-based modularity pattern + - Text-based analysis (no MIR JSON dependency for MVP) + - DFS reachability from entrypoints + - Heuristic-based false positive reduction + +3. ✅ **CLI Integration** (`cli.hako`): + - Added `--dead-code` flag for comprehensive mode + - Added `--rules dead_code` for selective execution + - Integrated with existing _needs_ir() infrastructure + - Compatible with --format (text/json-lsp/dot) + +4. ✅ **Test Infrastructure**: + - Created HC019_dead_code test directory with ng/ok/expected.json + - Created `hako_check_deadcode_smoke.sh` with 4 test cases + - Test fixtures cover: dead methods, dead boxes, clean code, JSON-LSP + +**Technical Details**: +- **Input**: Analysis IR (MapBox with methods/calls/boxes/entrypoints) +- **Output**: HC019 diagnostics (text or JSON-LSP) +- **Algorithm**: Graph-based DFS reachability analysis +- **Pattern**: Phase 133/134/152 box-based modular architecture +- **No ENV vars**: CLI flags only (Phase 153 constraint) + +**Files Modified**: +- NEW: `docs/development/current/main/phase153_hako_check_inventory.md` (872 lines) +- NEW: `tools/hako_check/rules/rule_dead_code.hako` (570 lines) +- MOD: `tools/hako_check/cli.hako` (added --dead-code flag, HC019 integration) +- NEW: `tools/hako_check/tests/HC019_dead_code/` (test fixtures) +- NEW: `tools/hako_check_deadcode_smoke.sh` (smoke test script) + +**Next Steps** (Future Phases): +- Phase 154+: MIR CFG integration for block-level unreachable detection +- Phase 160+: Integration with .hako JoinIR/MIR migration (safety net) +- CFG visualization with dead code highlighting + +--- + # Current Task — JoinIR / PHI 削減スナップショット + Ring0/FileBox I/O パイプライン(2025-12-04 時点) > このファイルは「今どこまで終わっていて、次に何をやるか」を把握するためのスナップショットだよ。 diff --git a/docs/README.md b/docs/README.md index 07529931..ed131cf5 100644 --- a/docs/README.md +++ b/docs/README.md @@ -45,6 +45,38 @@ --- +## 📌 Docs マップ(トップレベルとステータス) + +新しくドキュメントを書くときや、どこに置くか迷ったときはこの表を基準にする。 + +| パス | 用途 | 主な対象 | ステータス | +|------|------|----------|------------| +| `reference/` | 言語仕様・正式なリファレンス | 利用者 / 実装者 | **Active / SSOT** | +| `guides/` | チュートリアル・長めの読み物 | 利用者 / 新規開発者 | **Active** | +| `how-to/` | 手順書・レシピ集 | 日常開発 | **Active** | +| `quick-reference/` | コマンドやオプションの早見表 | 日常参照 | **Active** | +| `development/` | Rust 実装側の設計・ロードマップ | コア開発者 | **Active(Rust層)** | +| `private/` | 将来の整理待ちのメモ・長文案 | コア開発者 | **Draft / Incubator** | +| `design/` | 公開可能な安定寄り設計ノート | 実装者 | **Active(安定設計)** | +| `architecture/` | 全体アーキテクチャの俯瞰図 | 実装者 / 設計者 | **Active** | +| `abi/` | Nyash/Hakorune ABI 関連 | 実装者 | **Active** | +| `specs/` | 古めの仕様・実験的仕様 | 実装者 | **Legacy(必要に応じ参照)** | +| `checklists/` | レビュー・設計チェックリスト | 実装者 | **Active** | +| `tools/` | ドキュメント生成・補助スクリプト | 実装者 | **Active** | +| `updates/` | リリースノート・変更履歴 | 利用者 / 実装者 | **Active** | +| `releases/` | リリース関連ドキュメント | 利用者 | **Active** | +| `archive/` | 旧ドキュメント・歴史資料 | 研究・考古学用 | **Archived(正本ではない)** | +| `assets/` | 画像などの共有アセット | すべて | **Support** | +| `ENV_VARS.md` | 環境変数リファレンス | 実装者 / 運用者 | **Active(集約先)** | + +運用ルール(提案): +- **新規仕様/設計**: まずは `private/` に置き、安定したら `reference/` or `design/` へ昇格する。 +- **Rust 実装寄りの話**: `development/` 配下に置く(セルフホスト側は `private/roadmap` 等)。 +- **古い資料・置き換え済み**: 内容を変えずに `archive/` 以下へ移動し、先頭に「Archived / 新しい場所」の一行メモを書く。 +- **ユーザー向けに見せたいもの**: `guides/`, `how-to/`, `quick-reference/`, `releases/` を優先する。 + +--- + ## 🎯 クイックアクセス ### すぐ始める diff --git a/docs/development/current/CURRENT_VM_CHANGES.md b/docs/development/current/CURRENT_VM_CHANGES.md index 92f9a8ff..3345fde9 100644 --- a/docs/development/current/CURRENT_VM_CHANGES.md +++ b/docs/development/current/CURRENT_VM_CHANGES.md @@ -1,5 +1,8 @@ # 🔄 現在のVM変更状態 (2025-08-21) +> **Status**: Legacy snapshot(Phase 9.78 系の記録) +> **Note**: 現在の正本はリポジトリ直下の `CURRENT_TASK.md` および `docs/development/roadmap/` / `docs/private/roadmap/` 側に集約しています。このファイルは当時の実装状況メモとしてのみ残しています。 + ## 📊 Phase 9.78a VM統一Box処理の実装状況 ### ✅ 完了したステップ @@ -144,4 +147,4 @@ VM → UnifiedBoxRegistry ✅ (推奨) --- -**結論**: **Option A(置いておく)**を推奨します。現在の実装は方向性として正しく、インタープリター整理後に続きから再開するのが最も効率的です。 \ No newline at end of file +**結論**: **Option A(置いておく)**を推奨します。現在の実装は方向性として正しく、インタープリター整理後に続きから再開するのが最も効率的です。 diff --git a/docs/development/current/JIT_10_7_known_issues.txt b/docs/development/current/JIT_10_7_known_issues.txt index bd6b84c4..088b7d5f 100644 --- a/docs/development/current/JIT_10_7_known_issues.txt +++ b/docs/development/current/JIT_10_7_known_issues.txt @@ -1,5 +1,8 @@ JIT Phase 10_7 — Known Issues and Future Refinements (2025-08-27) +Status: Legacy snapshot(フェーズ固有の既知問題メモ) + + Scope: LowerCore(Core-1), Branch/PHI wiring, ABI(min), Stats/CFG dump 1) b1 PHI tagging heuristics @@ -49,4 +52,3 @@ Scope: LowerCore(Core-1), Branch/PHI wiring, ABI(min), Stats/CFG dump 9) Documentation sync - Symptom: Some flags visible via CLI and boxes; ensure README/CURRENT_TASK stay aligned. - Future: Add short “JIT quick flags” section with examples in docs. - diff --git a/docs/development/current/PHI_NORMALIZATION_PLAN.md b/docs/development/current/PHI_NORMALIZATION_PLAN.md index 12db553a..01eab115 100644 --- a/docs/development/current/PHI_NORMALIZATION_PLAN.md +++ b/docs/development/current/PHI_NORMALIZATION_PLAN.md @@ -1,8 +1,9 @@ # Phi 正規化プラン(9.78h スキャフォールド) -目的: ループ/分岐における Phi 選択を正道に戻し、借用衝突を避けつつ段階導入する。 +> **Status**: Archived plan(実装済み / 設計メモ) +> **Note**: Step 3 まで実装済みで、MIR ビルダーは既定で PHI-on。以降は `docs/development/roadmap/` / `docs/private/roadmap/` 側の設計を正とし、このファイルは当時の段階プランの記録として残しています。 -> ステータス更新(2025-09-26): Step 3 まで実装済みで、MIR ビルダーは既定で PHI-on になったよ。以下のプランはアーカイブとして残しているよ。 +目的: ループ/分岐における Phi 選択を正道に戻し、借用衝突を避けつつ段階導入する。 段階プラン(80/20) - Step 1: 実行系での選択復帰(完了) diff --git a/docs/development/current/PLUGIN_LOADER_MIGRATION_PLAN.md b/docs/development/current/PLUGIN_LOADER_MIGRATION_PLAN.md index 5ac0b57a..20439325 100644 --- a/docs/development/current/PLUGIN_LOADER_MIGRATION_PLAN.md +++ b/docs/development/current/PLUGIN_LOADER_MIGRATION_PLAN.md @@ -1,5 +1,8 @@ # Plugin Loader Migration Plan +> **Status**: Migration plan memo(継続検討用の設計メモ) +> **Note**: 実際の進捗と優先度は `CURRENT_TASK.md` と roadmap 側を正として管理し、このファイルはプラグインローダ統合の設計メモ・タスクリストとして扱います。 + ## Overview Consolidate three plugin loader implementations into a single unified system. @@ -113,4 +116,4 @@ fn detect_plugin_type(path: &str) -> PluginType { - Phase 5-6: Day 4 - Phase 7: Day 5 -Total: 5 days for complete migration \ No newline at end of file +Total: 5 days for complete migration diff --git a/docs/development/current/RESULTBOX_MIGRATION_TODO.md b/docs/development/current/RESULTBOX_MIGRATION_TODO.md index 4664bdf7..7b586624 100644 --- a/docs/development/current/RESULTBOX_MIGRATION_TODO.md +++ b/docs/development/current/RESULTBOX_MIGRATION_TODO.md @@ -1,5 +1,8 @@ ## ResultBox Migration TODO (Phase 9.78h follow-up) +> **Status**: Legacy TODO(状態スナップショット) +> **Note**: 実際の移行状況・今後の計画は `RESULTBOX` 関連のコードとロードマップ側を正とし、このメモは Phase 9.78h 時点のタスク列挙の記録としてのみ保持しています。 + Goal: fully migrate from legacy `box_trait::ResultBox` to `boxes::result::NyashResultBox` (aka `boxes::ResultBox`). ### Current usages (grep snapshot) diff --git a/docs/development/current/function_values_and_captures.md b/docs/development/current/function_values_and_captures.md index 224c08f1..b553ca76 100644 --- a/docs/development/current/function_values_and_captures.md +++ b/docs/development/current/function_values_and_captures.md @@ -1,5 +1,8 @@ # Function Values, Captures, and Events +> **Status**: Behavior summary(現仕様サマリ兼設計ノート) +> **Note**: 関数値 / キャプチャ / イベントに関する現行挙動の要約です。詳細仕様は `docs/reference/language/` や関連アーキテクチャドキュメントを正として参照してください。 + Summary of current behavior and guidelines. - Function values: created via `function(...) { ... }` produce a `FunctionBox` with diff --git a/docs/development/current/jit-enhancements-20250827.md b/docs/development/current/jit-enhancements-20250827.md index 4789aea7..d3c6ca3c 100644 --- a/docs/development/current/jit-enhancements-20250827.md +++ b/docs/development/current/jit-enhancements-20250827.md @@ -1,5 +1,8 @@ # JIT機能拡張 - 2025年8月27日 +> **Status**: Historical JIT enhancement note(実装完了済みの観測メモ) +> **Note**: 機能の現状はコードベースと JIT 関連の roadmap を正とし、この文書は 2025-08-27 時点の実装内容・観測方法の記録として残しています。 + ## ChatGPT5による最新実装 ### 1. PHI可視化強化 @@ -65,4 +68,4 @@ NYASH_JIT_DUMP=1 ./target/release/nyash --backend vm examples/phi_bool_merge.hak 3. **最適化ヒント**: ブール返り値のカウントによる最適化機会の発見 4. **デバッグ支援**: より詳細な情報による問題解析の容易化 -Box-First方法論の「観測箱」の具現化として、これらの機能は論文の実証例となる。 \ No newline at end of file +Box-First方法論の「観測箱」の具現化として、これらの機能は論文の実証例となる。 diff --git a/docs/development/current/main/phase153_hako_check_inventory.md b/docs/development/current/main/phase153_hako_check_inventory.md new file mode 100644 index 00000000..b6ec84d7 --- /dev/null +++ b/docs/development/current/main/phase153_hako_check_inventory.md @@ -0,0 +1,543 @@ +# Phase 153: hako_check Inventory (Dead Code Detection Mode) + +**Created**: 2025-12-04 +**Phase**: 153 (hako_check / dead code detection mode revival) + +--- + +## Executive Summary + +This document inventories the current state of `hako_check` as of Phase 153, with focus on: +1. Current execution flow and architecture +2. Existing dead code detection capabilities (HC011, HC012) +3. JoinIR integration status +4. Gaps and opportunities for Phase 153 enhancement + +**Key Finding**: hako_check already has partial dead code detection through HC011 (dead methods) and HC012 (dead static boxes), but lacks: +- MIR-level unreachable block detection +- CFG-based reachability analysis +- Integration with JoinIR's control flow information +- Unified `--dead-code` flag for comprehensive dead code reporting + +--- + +## 1. Current Architecture + +### 1.1 Execution Flow + +``` +.hako source file + ↓ +tools/hako_check.sh (bash wrapper) + ↓ +tools/hako_check/cli.hako (VM-executed .hako script) + ↓ +HakoAnalysisBuilderBox.build_from_source_flags() + ├─ HakoParserCoreBox.parse() (AST generation) + └─ Text-based scanning (fallback) + ↓ +Analysis IR (MapBox) with: + - methods: Array (qualified: "Box.method/arity") + - calls: Array + - boxes: Array + - entrypoints: Array + - source: String (original text) + ↓ +Rule execution (19 rules, including HC011/HC012) + ↓ +Diagnostics output (text / JSON-LSP / DOT) +``` + +### 1.2 Key Components + +**Entry Points**: +- `tools/hako_check.sh` - Shell script wrapper with environment setup +- `tools/hako_check/cli.hako` - Main .hako script (HakoAnalyzerBox) + +**Core Boxes**: +- `HakoAnalyzerBox` (cli.hako) - Main orchestrator +- `HakoAnalysisBuilderBox` (analysis_consumer.hako) - IR builder +- `HakoParserCoreBox` (tools/hako_parser/parser_core.hako) - AST parser + +**Dead Code Rules**: +- `RuleDeadMethodsBox` (rule_dead_methods.hako) - HC011 +- `RuleDeadStaticBoxBox` (rule_dead_static_box.hako) - HC012 + +**IR Format** (MapBox): +```javascript +{ + path: String, + source: String, + uses: Array, + boxes: Array<{ + name: String, + is_static: Boolean, + span_line: Integer, + methods: Array<{ + name: String, + arity: Integer, + span: Integer + }> + }>, + methods: Array, // "Box.method/arity" + calls: Array<{from: String, to: String}>, + entrypoints: Array +} +``` + +--- + +## 2. Existing Dead Code Detection + +### 2.1 HC011: Dead Methods (Unreachable Methods) + +**File**: `tools/hako_check/rules/rule_dead_methods.hako` + +**Algorithm**: +1. Build adjacency graph from `calls` array +2. DFS from entrypoints (Main.main, main, etc.) +3. Mark visited methods +4. Report unvisited methods as dead + +**Limitations**: +- Only detects unreachable methods (function-level granularity) +- No unreachable block detection within functions +- Heuristic-based call detection (text scanning fallback) +- No integration with MIR CFG information + +**Test Coverage**: +- `HC011_dead_methods/ng.hako` - Contains unreachable method +- `HC011_dead_methods/ok.hako` - All methods reachable + +### 2.2 HC012: Dead Static Box (Unused Static Boxes) + +**File**: `tools/hako_check/rules/rule_dead_static_box.hako` + +**Algorithm**: +1. Collect all static box names from IR +2. Build set of referenced boxes from calls +3. Report boxes with no references (except Main) + +**Limitations**: +- Only detects completely unreferenced boxes +- No detection of boxes with unreachable methods only +- AST span_line support for precise line reporting + +**Test Coverage**: +- `HC012_dead_static_box/ng.hako` - Unused static box +- `HC012_dead_static_box/ok.hako` - All boxes referenced + +### 2.3 HC016: Unused Alias + +**File**: `tools/hako_check/rules/rule_unused_alias.hako` + +**Note**: While not strictly "dead code", unused aliases are dead declarations. + +--- + +## 3. JoinIR Integration Status + +### 3.1 Current Pipeline (Phase 124 Completion) + +**Status**: ✅ **JoinIR-only pipeline established** + +As of Phase 124 (completed 2025-12-04), hako_check uses JoinIR exclusively: + +``` +.hako file + ↓ +Tokenize / Parse (Rust Parser) + ↓ +AST Generation + ↓ +MIR Builder (JoinIR lowering for if/loop) + ├─ cf_if() → lower_if_form() (JoinIR-based PHI) + └─ cf_loop() → LoopBuilder (JoinIR-based PHI) + ↓ +MIR Generation (with JoinIR PHI) + ↓ +VM Interpreter + ↓ +hako_check Analysis +``` + +**Key Points**: +- `NYASH_HAKO_CHECK_JOINIR` flag removed (JoinIR is default) +- No legacy PHI fallback in hako_check path +- All If/Loop constructs use JoinIR lowering + +### 3.2 MIR Integration Opportunities + +**Current Gap**: hako_check does not consume MIR for dead code analysis + +**Opportunity**: Integrate MIR CFG for block-level reachability: +- MIR already has `src/mir/passes/dce.rs` (instruction-level DCE) +- MIR has CFG information (`function.blocks`, `block.terminator`) +- JoinIR lowering provides high-quality PHI nodes for control flow + +**Potential Input Formats**: +1. **MIR JSON v0** - Existing format from `--emit-mir-json` +2. **JoinIR JSON** - Direct JoinIR representation +3. **Analysis IR** - Current text-based IR (simplest, current approach) + +--- + +## 4. Related Rust Code (Inventory) + +### 4.1 MIR Dead Code Elimination + +**File**: `src/mir/passes/dce.rs` + +**Purpose**: Instruction-level dead code elimination (DCE) + +**Scope**: +- Eliminates unused results of pure instructions +- Works at ValueId level (SSA values) +- Does **not** eliminate unreachable blocks or functions + +**Relevance**: Could be extended or adapted for hako_check integration + +### 4.2 MIR Verification + +**File**: `src/mir/verification/cfg.rs` + +**Purpose**: CFG consistency verification + +**Relevance**: Contains CFG traversal utilities that could be reused for reachability analysis + +### 4.3 MIR Optimizer + +**File**: `src/mir/optimizer.rs` + +**Purpose**: Multi-pass MIR optimization + +**Relevance**: Orchestrates DCE and other passes; pattern for DeadCodeAnalyzerBox + +--- + +## 5. Gaps and Phase 153 Scope + +### 5.1 Existing Capabilities ✅ + +- [x] Dead method detection (HC011) +- [x] Dead static box detection (HC012) +- [x] JoinIR-only pipeline (Phase 124) +- [x] Text-based call graph analysis +- [x] Entrypoint-based DFS reachability + +### 5.2 Missing Capabilities (Phase 153 Targets) + +#### High Priority +- [ ] **Unreachable block detection** (within functions) + - Example: `if false { ... }` dead branches + - Example: Code after unconditional `return` + +- [ ] **MIR CFG integration** + - Use MIR's block graph for precise reachability + - Detect unreachable blocks post-JoinIR lowering + +- [ ] **Unified `--dead-code` flag** + - Aggregate HC011 + HC012 + new block detection + - Single command for comprehensive dead code audit + +#### Medium Priority +- [ ] **JoinIR-specific analysis** + - Analyze IfMerge/LoopForm for unreachable paths + - Detect always-true/always-false conditions + +- [ ] **CFG visualization integration** + - Extend DOT output with unreachable block highlighting + - `--format dot --dead-code` mode + +#### Low Priority (Future Phases) +- [ ] Call graph visualization with dead paths +- [ ] Dataflow-based dead code detection +- [ ] Integration with Phase 160+ .hako JoinIR/MIR migration + +--- + +## 6. Phase 153 Implementation Plan + +### 6.1 Minimal Viable Product (MVP) + +**Goal**: Revive dead code detection with MIR block-level reachability + +**Scope**: +1. Create `DeadCodeAnalyzerBox` (.hako implementation) +2. Input: Analysis IR (current format) + optional MIR JSON +3. Output: Unreachable block reports +4. CLI: Add `--dead-code` flag to aggregate all dead code diagnostics + +**Non-Goals** (Phase 153): +- No new environment variables +- No changes to JoinIR/MIR semantics +- No complex dataflow analysis (pure reachability only) + +### 6.2 Box-Based Architecture (Phase 133/134 Pattern) + +**Pattern**: Modular analyzer box following if_dry_runner.rs precedent + +``` +DeadCodeAnalyzerBox +├─ analyze_reachability(ir) → UnreachableBlocks +├─ analyze_call_graph(ir) → DeadFunctions +└─ aggregate_report() → Array +``` + +**Characteristics**: +- Self-contained .hako implementation +- No modification to existing rules (HC011/HC012 unchanged) +- Additive enhancement (no breaking changes) + +### 6.3 Input Format Decision + +**Recommendation**: Start with **Analysis IR** (current format) + +**Rationale**: +- Minimally invasive (no new serialization) +- Works with existing hako_check pipeline +- Can extend to MIR JSON in Phase 154+ if needed + +**Analysis IR Extensions** (if needed): +```javascript +{ + // ... existing fields ... + blocks: Array<{ + id: Integer, + function: String, + reachable: Boolean, + terminator: String + }> +} +``` + +--- + +## 7. Test Inventory + +### 7.1 Existing Dead Code Tests + +**HC011 Tests** (Dead Methods): +- `tools/hako_check/tests/HC011_dead_methods/` + - `ng.hako` - Method never called + - `ok.hako` - All methods reachable + - `expected.json` - Diagnostic expectations + +**HC012 Tests** (Dead Static Box): +- `tools/hako_check/tests/HC012_dead_static_box/` + - `ng.hako` - Box never instantiated + - `ok.hako` - All boxes used + - `expected.json` - Diagnostic expectations + +### 7.2 Planned Phase 153 Tests + +**HC011-B** (Unreachable Block): +```hako +static box Test { + method demo() { + if false { + // This block is unreachable + print("dead code") + } + return 0 + } +} +``` + +**HC011-C** (Code After Return): +```hako +static box Test { + method demo() { + return 0 + print("unreachable") // Dead code + } +} +``` + +**Integration Test** (Comprehensive): +- Combines dead methods, dead boxes, and dead blocks +- Verifies `--dead-code` flag aggregates all findings + +--- + +## 8. CLI Design (Phase 153) + +### 8.1 Current CLI + +```bash +# Basic analysis +./tools/hako_check.sh target.hako + +# Rule filtering +./tools/hako_check.sh --rules dead_methods,dead_static_box target.hako + +# JSON-LSP output +./tools/hako_check.sh --format json-lsp target.hako +``` + +### 8.2 Proposed Phase 153 CLI + +```bash +# Enable comprehensive dead code detection +./tools/hako_check.sh --dead-code target.hako + +# Dead code only (skip other rules) +./tools/hako_check.sh --rules dead_code target.hako + +# Combine with visualization +./tools/hako_check.sh --dead-code --format dot target.hako > cfg.dot +``` + +**Behavior**: +- `--dead-code`: Enables HC011 + HC012 + new block analysis +- Exit code: Number of dead code findings (0 = clean) +- Compatible with existing `--format` options + +--- + +## 9. Environment Variables (No New Additions) + +**Phase 153 Constraint**: No new environment variables + +**Existing Variables** (hako_check uses): +- `NYASH_DISABLE_PLUGINS=1` - Required for stability +- `NYASH_BOX_FACTORY_POLICY=builtin_first` - Box resolution +- `NYASH_FEATURES=stage3` - Parser stage +- `NYASH_JSON_ONLY=1` - Pure JSON output (json-lsp mode) + +**Decision**: All Phase 153 control via CLI flags only + +--- + +## 10. JoinIR Design Principles Compliance + +### 10.1 Read-Only Analysis + +✅ **Compliant**: DeadCodeAnalyzerBox only reads IR, does not modify it + +### 10.2 No Semantic Changes + +✅ **Compliant**: Analysis is post-compilation, no effect on MIR generation + +### 10.3 Box-First Modularity + +✅ **Compliant**: DeadCodeAnalyzerBox follows established pattern + +### 10.4 Fail-Fast (Not Applicable) + +N/A: Analysis cannot fail (always produces some result, possibly empty) + +--- + +## 11. Integration with Phase 160+ + +**Context**: Phase 160+ will migrate .hako sources to JoinIR/MIR + +**hako_check Role**: Safety net for migration + +**Benefits**: +- Detect dead code introduced during migration +- Verify call graph integrity +- Catch unreachable blocks from refactoring + +**Preparation** (Phase 153): +- Establish solid baseline for dead code detection +- Prove DeadCodeAnalyzerBox on current codebase +- Document false positive patterns + +--- + +## 12. Known Limitations (Phase 153) + +### 12.1 Dynamic Call Detection + +**Limitation**: Text-based call scanning cannot detect dynamic calls + +**Example**: +```hako +local method_name = "compute" +// Call via reflection (not detectable by hako_check) +``` + +**Mitigation**: Document as known limitation + +### 12.2 False Positives + +**Pattern**: Intentionally unused utility methods + +**Example**: +```hako +static box Utils { + // Future use, not yet called + method reserved_for_later() { } +} +``` + +**Mitigation**: Allow suppression comments (future phase) + +### 12.3 Cross-Module Analysis + +**Limitation**: hako_check analyzes single files only + +**Consequence**: Cannot detect dead code exported but unused elsewhere + +**Mitigation**: Document as boundary condition + +--- + +## 13. Success Criteria (Phase 153) + +### 13.1 Functional Requirements + +- [ ] DeadCodeAnalyzerBox implemented in .hako +- [ ] `--dead-code` flag functional +- [ ] HC011 + HC012 + block detection working +- [ ] 2-3 test cases passing +- [ ] Smoke script created + +### 13.2 Quality Requirements + +- [ ] No regression in existing hako_check tests +- [ ] Box-based modular architecture +- [ ] Documentation updated (this file + hako_check_design.md) +- [ ] Git commit with clear message + +### 13.3 Non-Functional Requirements + +- [ ] Performance: <5% overhead on existing hako_check +- [ ] Compatibility: Works with all existing CLI options +- [ ] Maintainability: <200 lines for DeadCodeAnalyzerBox + +--- + +## 14. Next Steps (Post-Inventory) + +1. **Task 2**: Verify JoinIR-only pipeline (confirm no legacy fallback) +2. **Task 3**: Design DeadCodeAnalyzerBox API and format +3. **Task 4**: Implement DeadCodeAnalyzerBox +4. **Task 5**: Create test cases and smoke script +5. **Task 6**: Update documentation and commit + +--- + +## 15. References + +**Related Documents**: +- `phase153_hako_check_deadcode.md` - Phase 153 specification +- `hako_check_design.md` - Current hako_check architecture +- `phase121_integration_roadmap.md` - JoinIR integration history +- `phase124_hako_check_joinir_finalization.md` - JoinIR-only completion + +**Related Code**: +- `tools/hako_check/` - Current implementation +- `src/mir/passes/dce.rs` - Rust DCE reference +- `src/mir/verification/cfg.rs` - CFG verification utilities + +**Test Fixtures**: +- `tools/hako_check/tests/HC011_dead_methods/` +- `tools/hako_check/tests/HC012_dead_static_box/` + +--- + +**Status**: Inventory Complete ✅ +**Next**: Task 2 (JoinIR Pipeline Verification) diff --git a/docs/development/current/phase_9_78e_summary.md b/docs/development/current/phase_9_78e_summary.md index dad2c86b..c3bcdb9b 100644 --- a/docs/development/current/phase_9_78e_summary.md +++ b/docs/development/current/phase_9_78e_summary.md @@ -1,5 +1,8 @@ # Phase 9.78e: Dynamic Method Dispatch Implementation Summary +> **Status**: Historical summary(Phase 9.78e 実装レポート) +> **Note**: 現在の設計・実装状況は最新の `docs/development/architecture/` / `docs/development/roadmap/` を正とし、このファイルは当時の実装状態の記録としてのみ参照してください。 + ## 🎯 Overview Phase 9.78e aimed to implement dynamic method dispatch through the `call_method` trait method to unify method calling across all Box types. @@ -79,4 +82,4 @@ Phase 9.78e aimed to implement dynamic method dispatch through the `call_method` --- -*Phase 9.78e establishes the foundation for unified method dispatch across all Nyash Box types, with the core infrastructure successfully implemented and ready for expanded integration.* \ No newline at end of file +*Phase 9.78e establishes the foundation for unified method dispatch across all Nyash Box types, with the core infrastructure successfully implemented and ready for expanded integration.* diff --git a/docs/development/status/phase24-verification-report.md b/docs/development/status/phase24-verification-report.md index bd265522..4b4d746e 100644 --- a/docs/development/status/phase24-verification-report.md +++ b/docs/development/status/phase24-verification-report.md @@ -1,5 +1,8 @@ # Phase 2.4 Verification Report +> **Status**: Historical verification report(アーカイブ候補) +> **Note**: 本レポートは Phase 2.4 完了時点の検証記録です。現行状態の確認には `docs/development/status/` の他レポートや最新の roadmap を参照してください。 + > **Generated**: 2025-09-24 > **Status**: ✅ Successfully Verified > **Context**: Post-legacy cleanup verification after 151MB reduction @@ -127,4 +130,4 @@ Phase 2.4 objectives achieved: **Signed off by**: Claude (AI Assistant) **Date**: 2025-09-24 -**Next Phase**: 15.5 "Everything is Plugin" \ No newline at end of file +**Next Phase**: 15.5 "Everything is Plugin" diff --git a/docs/specs/README.md b/docs/specs/README.md new file mode 100644 index 00000000..0954bcb1 --- /dev/null +++ b/docs/specs/README.md @@ -0,0 +1,25 @@ +# Nyash Specs (Legacy / Experimental) + +このディレクトリは、古い仕様案や実験的なスペックを一時的に置いておくための場所だよ。 + +## ステータス + +- `specs/` 全体のステータス: **Legacy / Cleanup対象** +- 現行仕様の「正本」は `docs/reference/` と `docs/architecture/` 側に集約していく方針だよ。 + +## 現在の主なファイル + +- `language/index-operator.md` + - 配列 / マップ向けの `[]` インデックス演算子の設計メモ。 + - Phase‑20.31 スコープの設計案として残しているよ。 + +## 運用ルール(提案) + +- 新しい仕様はここではなく、まず `docs/private/`(案)か `docs/reference/`(正本)に置く。 +- `specs/` にある文書は、以下のどちらかに徐々に移していく: + - 内容が現行仕様として生きている → `docs/reference/` / `docs/architecture/` に昇格して整理する。 + - 歴史的な価値のみ → `docs/archive/specs/` 以下に移動し、先頭に「Archived」の一行メモを書く。 + +この README 自体は、「ここはAIや過去フェーズのメモ置き場だった」という目印兼、今後の整理方針のメモとして使うよ。 +大掃除したくなったタイミングで、ここから順番に `reference/` か `archive/` へ移していけば大丈夫だよ。 + diff --git a/tools/hako_check/cli.hako b/tools/hako_check/cli.hako index 0fdbe0db..0a3fe435 100644 --- a/tools/hako_check/cli.hako +++ b/tools/hako_check/cli.hako @@ -17,6 +17,7 @@ using tools.hako_check.rules.rule_arity_mismatch as RuleArityMismatchBox using tools.hako_check.rules.rule_stage3_gate as RuleStage3GateBox using tools.hako_check.rules.rule_brace_heuristics as RuleBraceHeuristicsBox using tools.hako_check.rules.rule_analyzer_io_safety as RuleAnalyzerIoSafetyBox +using tools.hako_check.rules.rule_dead_code as DeadCodeAnalyzerBox using tools.hako_check.render.graphviz as GraphvizRenderBox using tools.hako_parser.parser_core as HakoParserCoreBox @@ -43,11 +44,13 @@ static box HakoAnalyzerBox { // optional filters local rules_only = null // ArrayBox of keys local rules_skip = null // ArrayBox of keys + local dead_code_mode = 0 // Phase 153: --dead-code flag // Support inline sources: --source-file . Also accept --debug and --format anywhere. while i < args.size() { local p = args.get(i) // handle options if p == "--debug" { debug = 1; i = i + 1; continue } + if p == "--dead-code" { dead_code_mode = 1; i = i + 1; continue } if p == "--no-ast" { no_ast = 1; i = i + 1; continue } if p == "--force-ast" { no_ast = 0; i = i + 1; continue } if p == "--format" { @@ -219,6 +222,17 @@ static box HakoAnalyzerBox { local added = after_n - before_n print("[hako_check/HC015] file=" + p + " added=" + me._itoa(added) + " total_out=" + me._itoa(after_n)) } + // Phase 153: HC019 Dead Code Analyzer (comprehensive) + before_n = out.size() + if dead_code_mode == 1 || me._rule_enabled(rules_only, rules_skip, "dead_code") == 1 { + me._log_stderr("[rule/exec] HC019 (dead_code) " + p) + DeadCodeAnalyzerBox.apply_ir(ir, p, out) + } + if debug == 1 { + local after_n = out.size() + local added = after_n - before_n + print("[hako_check/HC019] file=" + p + " added=" + me._itoa(added) + " total_out=" + me._itoa(after_n)) + } // suppression: HC012(dead box) > HC011(unreachable method) local filtered = me._suppress_overlap(out) // flush (text only) @@ -568,6 +582,7 @@ static box HakoAnalyzerBox { // Rules that need IR if k == "dead_methods" { return 1 } if k == "dead_static_box" { return 1 } + if k == "dead_code" { return 1 } if k == "duplicate_method" { return 1 } if k == "missing_entrypoint" { return 1 } if k == "arity_mismatch" { return 1 } diff --git a/tools/hako_check/rules/rule_dead_code.hako b/tools/hako_check/rules/rule_dead_code.hako new file mode 100644 index 00000000..037aca59 --- /dev/null +++ b/tools/hako_check/rules/rule_dead_code.hako @@ -0,0 +1,551 @@ +// tools/hako_check/rules/rule_dead_code.hako — HC019: Comprehensive Dead Code Detection +// Unified dead code analyzer combining method-level, block-level, and box-level detection. +// Phase 153: Revival of dead code detection mode with JoinIR integration. + +static box DeadCodeAnalyzerBox { + // Main entry point for comprehensive dead code analysis + // Input: ir (Analysis IR), path (file path), out (diagnostics array) + // Returns: void (like other rules) + method apply_ir(ir, path, out) { + // Phase 153 MVP: Focus on method-level reachability + // Block-level analysis deferred to Phase 154+ when MIR JSON integration is ready + + if ir == null { return } + if out == null { return } + + // 1. Analyze unreachable methods (similar to HC011 but enhanced) + me._analyze_dead_methods(ir, path, out) + + // 2. Analyze dead static boxes (similar to HC012 but integrated) + me._analyze_dead_boxes(ir, path, out) + + // 3. TODO(Phase 154): Analyze unreachable blocks (requires MIR CFG) + // me._analyze_unreachable_blocks(ir, path, out) + + return + } + + // Analyze unreachable methods using DFS from entrypoints + _analyze_dead_methods(ir, path, out) { + local methods = ir.get("methods") + if methods == null || methods.size() == 0 { + // Fallback: scan from source text + local src = ir.get("source") + if src != null { + methods = me._scan_methods_from_text(src) + } else { + return + } + } + + if methods == null || methods.size() == 0 { return } + + local calls = ir.get("calls") + if calls == null || calls.size() == 0 { + // Build minimal calls from source text + local src = ir.get("source") + if src != null { + calls = me._scan_calls_from_text(src) + } else { + calls = new ArrayBox() + } + } + + local eps = ir.get("entrypoints") + if eps == null { eps = new ArrayBox() } + + // Build adjacency graph + local adj = new MapBox() + local i = 0 + while i < methods.size() { + adj.set(methods.get(i), new ArrayBox()) + i = i + 1 + } + + // Add edges from calls + i = 0 + while i < calls.size() { + local c = calls.get(i) + local f = c.get("from") + local t = c.get("to") + + // Normalize from: prefer exact, otherwise try adding "/0" suffix + local ff = f + if adj.has(ff) == 0 { + local f0 = f + "/0" + if adj.has(f0) == 1 { ff = f0 } + } + + if adj.has(ff) == 1 { + adj.get(ff).push(t) + } + + i = i + 1 + } + + // DFS from entrypoints + local seen = new MapBox() + local seeds = me._resolve_entrypoints(eps, adj, methods) + + local j = 0 + while j < seeds.size() { + me._dfs(adj, seeds.get(j), seen) + j = j + 1 + } + + // Report dead methods (not seen) + local src_text = ir.get("source") + i = 0 + while i < methods.size() { + local m = methods.get(i) + if seen.has(m) == 0 { + // Check if method is actually called via text heuristic (reduce false positives) + local keep = 1 + if src_text != null { + local slash = m.lastIndexOf("/") + local dotp = m.lastIndexOf(".") + if dotp >= 0 { + local meth = (slash > dotp) ? m.substring(dotp+1, slash) : m.substring(dotp+1) + if src_text.indexOf("." + meth + "(") >= 0 { + keep = 0 + } + } + } + + if keep == 1 { + out.push("[HC019] unreachable method (dead code): " + path + " :: " + m) + } + } + i = i + 1 + } + + return + } + + // Analyze dead static boxes (never referenced) + _analyze_dead_boxes(ir, path, out) { + local boxes = ir.get("boxes") + if boxes == null { return } + + local calls = ir.get("calls") + if calls == null { return } + + // Collect all box names referenced in calls + local referenced_boxes = new MapBox() + local ci = 0 + while ci < calls.size() { + local call = calls.get(ci) + if call == null { ci = ci + 1; continue } + + local to = call.get("to") + if to != null { + // Extract box name from qualified call (e.g., "Box.method/0" -> "Box") + local dot = to.indexOf(".") + if dot > 0 { + local box_name = to.substring(0, dot) + referenced_boxes.set(box_name, "1") + } + } + ci = ci + 1 + } + + // Check each box + local findings = 0 + local bi = 0 + while bi < boxes.size() { + local box_info = boxes.get(bi) + if box_info == null { bi = bi + 1; continue } + + local name = box_info.get("name") + if name == null { bi = bi + 1; continue } + + local is_static = box_info.get("is_static") + + // Skip Main box (entry point) + if name == "Main" { bi = bi + 1; continue } + + // Only check static boxes + if is_static != null { + if is_static == 0 { bi = bi + 1; continue } + } + + // Check if box is referenced + local ref_check = referenced_boxes.get(name) + + if ref_check == null || ref_check != "1" { + // Box is never referenced - report error + local line_any = box_info.get("span_line") + local line_s = "" + if line_any == null { + line_s = "1" + } else { + line_s = "" + line_any + } + + // Parse leading digits + local i = 0 + local digits = "" + while i < line_s.length() { + local ch = line_s.substring(i, i+1) + if ch >= "0" && ch <= "9" { + digits = digits + ch + i = i + 1 + continue + } + break + } + if digits == "" { digits = "1" } + + out.push("[HC019] dead static box (never referenced): " + name + " :: " + path + ":" + digits) + } + + bi = bi + 1 + } + + return + } + + // Resolve entrypoints to actual method names in adjacency graph + _resolve_entrypoints(eps, adj, methods) { + local seeds = new ArrayBox() + + // Collect keys from methods array + local keys = new ArrayBox() + local i = 0 + while i < methods.size() { + keys.push(methods.get(i)) + i = i + 1 + } + + // Try to match each entrypoint + local j = 0 + while j < eps.size() { + local ep = eps.get(j) + + // Exact match + if adj.has(ep) == 1 { + seeds.push(ep) + } + + // Prefix match: ep + "/" + local pref = ep + "/" + local k = 0 + while k < keys.size() { + local key = keys.get(k) + if key.indexOf(pref) == 0 { + seeds.push(key) + } + k = k + 1 + } + + j = j + 1 + } + + // Fallback: common Main.main/0 if still empty + if seeds.size() == 0 { + if adj.has("Main.main/0") == 1 { + seeds.push("Main.main/0") + } + } + + return seeds + } + + // DFS traversal for reachability + _dfs(adj, node, seen) { + if node == null { return } + if seen.has(node) == 1 { return } + + seen.set(node, 1) + + if adj.has(node) == 0 { return } + + local arr = adj.get(node) + local k = 0 + while k < arr.size() { + me._dfs(adj, arr.get(k), seen) + k = k + 1 + } + } + + // Scan methods from source text (fallback when IR is incomplete) + _scan_methods_from_text(text) { + local res = new ArrayBox() + if text == null { return res } + + local lines = me._split_lines(text) + local cur = null + local depth = 0 + local i = 0 + + while i < lines.size() { + local ln = me._ltrim(lines.get(i)) + + if ln.indexOf("static box ") == 0 { + local rest = ln.substring("static box ".length()) + local p = rest.indexOf("{") + if p > 0 { + cur = me._rstrip(rest.substring(0, p)) + } else { + cur = me._rstrip(rest) + } + depth = depth + 1 + i = i + 1 + continue + } + + if cur != null && ln.indexOf("method ") == 0 { + local rest = ln.substring("method ".length()) + local p1 = rest.indexOf("(") + local name = (p1 > 0) ? me._rstrip(rest.substring(0, p1)) : me._rstrip(rest) + + local ar = 0 + local p2 = rest.indexOf(")", (p1 >= 0) ? (p1+1) : 0) + if p1 >= 0 && p2 > p1+1 { + local inside = rest.substring(p1+1, p2) + // Count commas + 1 if any non-space + local any = 0 + local cnt = 1 + local k = 0 + while k < inside.length() { + local c = inside.substring(k, k+1) + if c == "," { cnt = cnt + 1 } + if c != " " && c != "\t" { any = 1 } + k = k + 1 + } + if any == 1 { ar = cnt } + } + + res.push(cur + "." + name + "/" + me._itoa(ar)) + } + + // Adjust depth by braces + local j = 0 + while j < ln.length() { + local ch = ln.substring(j, j+1) + if ch == "{" { + depth = depth + 1 + } else { + if ch == "}" { + depth = depth - 1 + if depth < 0 { depth = 0 } + } + } + j = j + 1 + } + + if depth == 0 { cur = null } + + i = i + 1 + } + + return res + } + + // Scan calls from source text (fallback) + _scan_calls_from_text(text) { + local arr = new ArrayBox() + if text == null { return arr } + + local lines = me._split_lines(text) + local src_m = "Main.main/0" + local i = 0 + + while i < lines.size() { + local ln = lines.get(i) + // Naive: detect patterns like "Main.foo(" + local pos = 0 + local n = ln.length() + + loop (pos < n) { + local k = ln.indexOf(".", pos) + if k < 0 { break } + + // Scan ident before '.' + local lhs = me._scan_ident_rev(ln, k-1) + // Scan ident after '.' + local rhs = me._scan_ident_fwd(ln, k+1) + + if lhs != null && rhs != null { + local to = lhs + "." + rhs + "/0" + local rec = new MapBox() + rec.set("from", src_m) + rec.set("to", to) + arr.push(rec) + } + + pos = k + 1 + } + + i = i + 1 + } + + return arr + } + + // Helper: scan identifier backwards from position + _scan_ident_rev(s, i) { + if i < 0 { return null } + + local n = i + local start = 0 + local rr = 0 + + while rr <= n { + local j = i - rr + local c = s.substring(j, j+1) + + if me._is_ident_char(c) == 0 { + start = j+1 + break + } + + if j == 0 { + start = 0 + break + } + + rr = rr + 1 + } + + if start > i { return null } + return s.substring(start, i+1) + } + + // Helper: scan identifier forwards from position + _scan_ident_fwd(s, i) { + local n = s.length() + if i >= n { return null } + + local endp = i + local off = 0 + + while off < n { + local j = i + off + if j >= n { break } + + local c = s.substring(j, j+1) + + if me._is_ident_char(c) == 0 { + endp = j + break + } + + if j == n-1 { + endp = n + break + } + + off = off + 1 + } + + if endp == i { return null } + return s.substring(i, endp) + } + + // Helper: check if character is valid identifier character + _is_ident_char(c) { + if c == "_" { return 1 } + if c >= "A" && c <= "Z" { return 1 } + if c >= "a" && c <= "z" { return 1 } + if c >= "0" && c <= "9" { return 1 } + return 0 + } + + // Helper: split string into lines + _split_lines(s) { + local arr = new ArrayBox() + if s == null { return arr } + + local n = s.length() + local last = 0 + local i = 0 + + loop (i < n) { + local ch = s.substring(i, i+1) + if ch == "\n" { + arr.push(s.substring(last, i)) + last = i+1 + } + i = i + 1 + } + + if last <= n { + arr.push(s.substring(last)) + } + + return arr + } + + // Helper: left trim + _ltrim(s) { + return me._ltrim_chars(s, " \t") + } + + _ltrim_chars(s, cs) { + local n = s.length() + local head = 0 + local idx = 0 + + while idx < n { + local ch = s.substring(idx, idx+1) + if ch != " " && ch != "\t" { + head = idx + break + } + if idx == n-1 { + head = n + } + idx = idx + 1 + } + + return s.substring(head) + } + + // Helper: right strip + _rstrip(s) { + local n = s.length() + local last = n + local r = 0 + + while r < n { + local i4 = n-1-r + local c = s.substring(i4, i4+1) + if c != " " && c != "\t" { + last = i4+1 + break + } + if r == n-1 { + last = 0 + } + r = r + 1 + } + + return s.substring(0, last) + } + + // Helper: integer to string + _itoa(n) { + local v = 0 + n + if v == 0 { return "0" } + + local out = "" + local digits = "0123456789" + local tmp = "" + + while v > 0 { + local d = v % 10 + tmp = digits.substring(d, d+1) + tmp + v = v / 10 + } + + out = tmp + return out + } +} + +static box RuleDeadCodeMain { + method main(args) { + return 0 + } +} diff --git a/tools/hako_check/tests/HC019_dead_code/expected.json b/tools/hako_check/tests/HC019_dead_code/expected.json new file mode 100644 index 00000000..244633c9 --- /dev/null +++ b/tools/hako_check/tests/HC019_dead_code/expected.json @@ -0,0 +1,4 @@ +{"diagnostics":[ + {"file":"ng.hako","line":1,"rule":"HC019","message":"[HC019] unreachable method (dead code): ng.hako :: Main.unused/0","quickFix":"","severity":"warning"}, + {"file":"ng.hako","line":1,"rule":"HC019","message":"[HC019] dead static box (never referenced): UnusedBox :: ng.hako:3","quickFix":"","severity":"warning"} +]} diff --git a/tools/hako_check/tests/HC019_dead_code/ng.hako b/tools/hako_check/tests/HC019_dead_code/ng.hako new file mode 100644 index 00000000..4601032e --- /dev/null +++ b/tools/hako_check/tests/HC019_dead_code/ng.hako @@ -0,0 +1,23 @@ +// ng.hako — contains dead method and dead static box + +static box UnusedBox { + method helper() { + return 42 + } +} + +static box Main { + method main() { + // Only calls used_method, leaving unused() and UnusedBox dead + me.used_method() + return 0 + } + + method used_method() { + return 1 + } + + method unused() { + return 2 + } +} diff --git a/tools/hako_check/tests/HC019_dead_code/ok.hako b/tools/hako_check/tests/HC019_dead_code/ok.hako new file mode 100644 index 00000000..72d0951e --- /dev/null +++ b/tools/hako_check/tests/HC019_dead_code/ok.hako @@ -0,0 +1,20 @@ +// ok.hako — all code is reachable + +static box HelperBox { + method compute() { + return 42 + } +} + +static box Main { + method main() { + me.helper() + local h = new HelperBox() + h.compute() + return 0 + } + + method helper() { + return 1 + } +} diff --git a/tools/hako_check_deadcode_smoke.sh b/tools/hako_check_deadcode_smoke.sh new file mode 100644 index 00000000..7acd92d9 --- /dev/null +++ b/tools/hako_check_deadcode_smoke.sh @@ -0,0 +1,89 @@ +#!/usr/bin/env bash +# Phase 153: Dead Code Detection Smoke Test +set -euo pipefail + +ROOT="$(cd "$(dirname "$0")/.." && pwd)" +BIN="${NYASH_BIN:-$ROOT/target/release/hakorune}" + +if [ ! -x "$BIN" ]; then + echo "[ERROR] hakorune binary not found: $BIN" >&2 + echo "Run: cargo build --release" >&2 + exit 2 +fi + +echo "=== Phase 153: Dead Code Detection Smoke Test ===" >&2 + +# Test 1: Basic dead code detection with --dead-code flag +echo "[TEST 1] Testing --dead-code flag with dead method..." >&2 +TEST1_FILE="$ROOT/tools/hako_check/tests/HC019_dead_code/ng.hako" +TEST1_OUTPUT=$(NYASH_DISABLE_PLUGINS=1 \ + NYASH_BOX_FACTORY_POLICY=builtin_first \ + NYASH_FEATURES=stage3 \ + "$BIN" --backend vm "$ROOT/tools/hako_check/cli.hako" -- --dead-code --source-file "$TEST1_FILE" "$(cat "$TEST1_FILE")" 2>&1 || true) + +if echo "$TEST1_OUTPUT" | grep -q "HC019.*unreachable method"; then + echo "[PASS] Test 1: Dead method detected" >&2 +else + echo "[FAIL] Test 1: Dead method NOT detected" >&2 + echo "Output: $TEST1_OUTPUT" >&2 + exit 1 +fi + +if echo "$TEST1_OUTPUT" | grep -q "HC019.*dead static box"; then + echo "[PASS] Test 1: Dead static box detected" >&2 +else + echo "[FAIL] Test 1: Dead static box NOT detected" >&2 + echo "Output: $TEST1_OUTPUT" >&2 + exit 1 +fi + +# Test 2: Clean code (no dead code) +echo "[TEST 2] Testing --dead-code flag with clean code..." >&2 +TEST2_FILE="$ROOT/tools/hako_check/tests/HC019_dead_code/ok.hako" +TEST2_OUTPUT=$(NYASH_DISABLE_PLUGINS=1 \ + NYASH_BOX_FACTORY_POLICY=builtin_first \ + NYASH_FEATURES=stage3 \ + "$BIN" --backend vm "$ROOT/tools/hako_check/cli.hako" -- --dead-code --source-file "$TEST2_FILE" "$(cat "$TEST2_FILE")" 2>&1 || true) + +if echo "$TEST2_OUTPUT" | grep -q "HC019"; then + echo "[FAIL] Test 2: False positive detected" >&2 + echo "Output: $TEST2_OUTPUT" >&2 + exit 1 +else + echo "[PASS] Test 2: No false positives" >&2 +fi + +# Test 3: --rules dead_code flag +echo "[TEST 3] Testing --rules dead_code..." >&2 +TEST3_OUTPUT=$(NYASH_DISABLE_PLUGINS=1 \ + NYASH_BOX_FACTORY_POLICY=builtin_first \ + NYASH_FEATURES=stage3 \ + "$BIN" --backend vm "$ROOT/tools/hako_check/cli.hako" -- --rules dead_code --source-file "$TEST1_FILE" "$(cat "$TEST1_FILE")" 2>&1 || true) + +if echo "$TEST3_OUTPUT" | grep -q "HC019"; then + echo "[PASS] Test 3: --rules dead_code works" >&2 +else + echo "[FAIL] Test 3: --rules dead_code did not work" >&2 + echo "Output: $TEST3_OUTPUT" >&2 + exit 1 +fi + +# Test 4: JSON-LSP format with --dead-code +echo "[TEST 4] Testing JSON-LSP format with --dead-code..." >&2 +TEST4_OUTPUT=$(NYASH_DISABLE_PLUGINS=1 \ + NYASH_BOX_FACTORY_POLICY=builtin_first \ + NYASH_FEATURES=stage3 \ + NYASH_JSON_ONLY=1 \ + "$BIN" --backend vm "$ROOT/tools/hako_check/cli.hako" -- --format json-lsp --dead-code "$TEST1_FILE" 2>/dev/null || true) + +if echo "$TEST4_OUTPUT" | grep -q '"rule":"HC019"'; then + echo "[PASS] Test 4: JSON-LSP format works" >&2 +else + echo "[FAIL] Test 4: JSON-LSP format did not work" >&2 + echo "Output: $TEST4_OUTPUT" >&2 + exit 1 +fi + +echo "" >&2 +echo "=== All Dead Code Detection Tests Passed ===" >&2 +exit 0